GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Machine learning. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (204 pages)
    Edition: 1st ed.
    ISBN: 9783031223716
    Series Statement: Intelligent Systems Reference Library ; v.236
    DDC: 006.31
    Language: English
    Note: Intro -- Foreword -- References -- Preface -- Contents -- 1 Introduction to Fusion of Machine Learning Paradigms -- 1.1 Editorial -- References -- Part I Recent Application Areas of Fusion of Machine Learning Paradigms -- 2 Artificial Intelligence as Dual-Use Technology -- 2.1 Introduction -- 2.2 What Is DUT -- 2.3 AI: Concepts, Models and Technology -- 2.4 Agent-Based AI and Autonomous System -- 2.4.1 Basic Model of Agent-Based AI -- 2.4.2 Conceptual Model of Autonomous Weapon System -- 2.5 Dual-Use Technology and DARPA -- 2.5.1 Historical View and Role of DARPA -- 2.5.2 DARPA's Contribution to DUT R& -- D on AI -- 2.6 DARPA-Like Organizations in Major Countries -- 2.7 Dual-Use Dilemma -- 2.8 Concluding Remarks -- References -- 3 Diabetic Retinopathy Detection Using Transfer and Reinforcement Learning with Effective Image Preprocessing and Data Augmentation Techniques -- 3.1 Introduction -- 3.2 Background -- 3.2.1 Deep Learning for Diabetic Retinopathy -- 3.2.2 Image Preprocessing Techniques -- 3.2.3 Reinforcement Learning and Deep Learning -- 3.3 Data Augmentation Techniques -- 3.3.1 Traditional Data Augmentation -- 3.3.2 SMOTE-Based Data Augmentation -- 3.3.3 Data Augmentation Using Generative Adversarial Networks -- 3.4 Datasets of Eye Fundus Images -- 3.5 Transfer Learning Experiments -- 3.5.1 Dataset -- 3.5.2 Image Preprocessing -- 3.5.3 Image Augmentation -- 3.5.4 Deep Learning Experiments -- 3.5.5 Reinforcement Learning Experiments -- 3.6 Conclusion and Future Work -- References -- 4 A Novel Approach for Non-linear Deep Fuzzy Rule-Based Model and Its Applications in Biomedical Analyses -- 4.1 Introduction -- 4.2 Method -- 4.2.1 Preliminaries -- 4.2.2 Hierarchical Fuzzy Structure -- 4.2.3 Stacked Deep Fuzzy Rule-Based System (SD-FRBS) -- 4.2.4 Adaptation of the First-Order TSK Structure in SD-FRBS. , 4.2.5 Concatenated Deep Fuzzy Rule-Based System (CD-FRBS) -- 4.3 Data Description and Results -- 4.3.1 MIMIC-III Dataset -- 4.3.2 SD-FRBS as a Multivariate Regressor for Granger Causality Estimation-In EEG Connectivity Index Extraction -- 4.3.3 CD-FRBS in Staging Depression Severity -- 4.4 Discussion and Conclusion -- 4.4.1 Suggested Future Works -- References -- 5 Harmony Search-Based Approaches for Fine-Tuning Deep Belief Networks -- 5.1 Introduction -- 5.2 Theoretical Background -- 5.2.1 Deep Belief Networks -- 5.2.2 Harmony Search -- 5.3 Methodology -- 5.3.1 Datasets -- 5.3.2 Experimental Setup -- 5.4 Experimental Results -- 5.5 Conclusions -- References -- 6 Toward Smart Energy Systems: The Case of Relevance Vector Regression Models in Hourly Solar Power Forecasting -- 6.1 Introduction -- 6.2 Relevance Vector Regression -- 6.3 RVR Based Day Ahead Forecasting -- 6.4 Results -- 6.5 Conclusion -- References -- 7 Domain-Integrated Machine Learning for IC Image Analysis -- 7.1 Introduction -- 7.2 Hierarchical Multi-classifier System -- 7.2.1 Architecture of Hierarchical Multi-classifier System -- 7.2.2 Result and Discussion on Case Study -- 7.3 Deep Learning with Pseudo Labels -- 7.3.1 Methodology -- 7.3.2 Application to IC Image Analysis -- 7.4 Conclusions and Future Works -- References -- Part II Applications that Can Clearly Benefit from Fusion of Machine Learning Paradigms -- 8 Fleshing Out Learning Analytics and Educational Data Mining with Data and ML Pipelines -- 8.1 Introduction -- 8.2 Data and ML Pipelines -- 8.3 Related Work -- 8.4 An Automated EDM and LA Methodology -- 8.4.1 A Data Pipeline Scenario -- 8.4.2 An ML Pipeline Scenario -- 8.5 Experiments and Results -- 8.6 Conclusions and Future Work -- References -- 9 Neural Networks Based Throughput Estimation of Short Production Lines Without Intermediate Buffers -- 9.1 Introduction. , 9.2 Data Sets of i-Stage Production Line Problems -- 9.3 Deep Learning and Multilayer Perceptron -- 9.4 Experimental Process of Deep Learning Approach -- 9.5 Results of Deep Learning Approach -- 9.6 Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (566 pages)
    Edition: 1st ed.
    ISBN: 9789811086366
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.708
    DDC: 006.3
    Language: English
    Note: Intro -- Foreword -- Message from the General Chairs Dr. Modi Chirag Navinchandra and Dr. Pankaj Kumar Sa -- Preface -- In Memoriam: Prof. S. K. Jena (1954-2017) -- Committee: ICACNI 2017 -- Advisory Board Members -- Chief Patron -- Patron -- General Chairs -- Organizing Co-chairs -- Program Co-chairs -- Technical Program Committee -- Organizing Committee -- Contents -- About the Editors -- Research on Optical Networks, Wireless Sensor Networks, VANETs, and MANETs -- 1 Multichannel Assignment Algorithm for Minimizing Imbalanced Channel Utilization in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Model and Problem Definition -- 2.1 Network Model and Assumptions -- 2.2 Problem Definition -- 3 Proposed Multichannel Assignment Algorithm -- 3.1 Phase I: Root Selection -- 3.2 Phase II: Node Ordering -- 3.3 Phase III: Channel Selection -- 4 Results and Discussion -- 5 Conclusions -- References -- MWPR: Minimal Weighted Path Routing Algorithm for Network on Chip -- 1 Introduction -- 2 Related Work -- 3 Virtual Channel(VC) Router Architecture -- 4 Minimal Weighted Path Routing Algorithm (MWPR): -- 5 Experimental Results -- 6 Conclusion -- References -- 3 An IoT-VANET-Based Traffic Management System for Emergency Vehicles in a Smart City -- Abstract -- 1 Introduction -- 2 State-of-the-Art Reviews -- 3 Proposed Framework Model -- 4 Proposed Solution -- 5 Implementation and Results -- 6 Conclusion and Future Work -- References -- 4 Analysis of Wormhole Attacks in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Wormhole Attacks -- 3 Comparison of Wormhole Attack Modes -- 4 Detection Mechanism Analysis -- 4.1 Using Location Information -- 4.2 Using Neighborhood Information -- 4.3 Using Hop Count/Distance -- 4.4 Using Time Information -- 4.5 Using Connectivity Information -- 5 Security Comparison of Various Approaches -- 6 Conclusion. , Acknowledgements -- References -- 5 Handover Latency Improvement and Packet Loss Reduction in Wireless Networks Using Scanning Algorithm -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Performance Evaluation -- 5 Conclusion and Future Scope -- References -- 6 Optimized Location for On-Body Sink for PRPLC Protocol in WBAN -- Abstract -- 1 Introduction -- 2 Probabilistic Routing with Postural Link Cost (PRPLC) -- 3 Simulation Parameters -- 4 Results and Discussion -- 5 Conclusion -- Acknowledgements -- References -- A Machine Learning Approach to Find the Optimal Routes Through Analysis of GPS Traces of Mobile City Traffic -- 1 Introduction -- 2 Architecture of the Proposed Framework -- 2.1 GPS Data Pre-processing -- 2.2 Analysis of Traffic Condition -- 2.3 Traffic Congestion Computation -- 2.4 Road-Segment Graph Analysis -- 3 Experimentation -- 3.1 Data set -- 3.2 Results and Discussion -- 4 Conclusion and Future Work -- References -- Zigbee-Based Wearable Device for Elderly Health Monitoring with Fall Detection -- 1 Introduction -- 2 Methodology -- 3 Fall Detection Algorithm-Threshold Based -- 3.1 Threshold Selection -- 4 Fall Detection Algorithm-Artificial Neural Network -- 4.1 Feature Extraction -- 4.2 Feature Maps -- 5 Results and Analysis -- 5.1 Threshold Approach -- 5.2 Neural Network Approach -- 6 Conclusion and Future Work -- 7 Declaration -- References -- A Colored Petri Net Based Modeling and Analysis of Packet Dropping Scenario for Wireless Network -- 1 Introduction -- 2 Background -- 3 Proposed Model -- 4 Formal Definition -- 5 Simulation Using CPN Tools -- 6 Performance Analysis -- 7 Conclusion -- References -- 10 Hole Detection in Wireless Sensor Network: A Review -- Abstract -- 1 Introduction -- 2 Overview of Hole -- 3 Category of Holes in WSN -- 4 Algorithms for Hole Detection -- 5 Summarization. , 6 Conclusion -- References -- A Two-Tailed Chain Topology in Wireless Sensor Networks for Efficient Monitoring of Food Grain Storage -- 1 Introduction -- 2 Survey of WSN Topologies -- 3 Issues in Food Grain Depots -- 3.1 Infrastructure Details of Food Grain Depot -- 4 Suitability of Existing Topologies -- 5 Proposed Work -- 5.1 Energy-Efficient Data Collection Mechanism -- 6 Analysis -- 6.1 Number of Sensor Nodes Required -- 6.2 Energy Consumption -- 6.3 Node Failure -- 7 Simulation and Results -- 8 Conclusion -- References -- 12 Designing an Adaptive Vehicular Density-Based Traffic Signal Controlling System -- Abstract -- 1 Introduction -- 2 Existing Traffic Monitoring and Signal Processing Systems -- 3 Proposed Approach -- 3.1 Video Preprocessing -- 3.2 Object Detection -- 3.3 Control Algorithm -- 4 Conclusions -- References -- 13 Moving Object Detection and Tracking in Traffic Surveillance Video Sequences -- Abstract -- 1 Introduction -- 2 Proposed Variance-Based Method for Multiple Object Detection -- 2.1 Five-Frame Difference Method -- 2.2 Five-Frame Background Subtraction Method -- 2.3 Binarization and Morphological Operation -- 2.4 Variance Calculation -- 3 Simulation Results and Discussion -- 3.1 True-False Analysis and Algorithm Comparison -- 3.2 Reconstructed Images and the Bar Chart Representation of Simulated Results -- 4 Conclusion -- References -- 14 Dynamic Distance-Based Cluster Head Election for Maximizing Efficiency in Wireless Sensor Networks Using Artificial Neural Networks -- Abstract -- 1 Introduction -- 2 Literature Review on ANN-Based Networking with WSN -- 3 Proposed System Model -- 3.1 Algorithm for Dynamic Cluster Head Election-Based on Shortest Distance Factor Using ANN -- 3.1.1 Assumptions -- 3.1.2 Algorithm -- 3.2 Energy and Throughput Profile for Proposed System with Number of Nodes -- 4 Conclusion and Future Scope. , References -- Implementation of FPGA-Based Network Synchronization Using IEEE 1588 Precision Time Protocol (PTP) -- 1 Introduction -- 1.1 IEEE1588 Precision Time Protocol (PTP) -- 2 System Description -- 2.1 FPGA-Based Implementation of PTP Protocol -- 2.2 Follow_Up PTP Packet Is Not Required in FPGA-Based Implementation -- 2.3 High Precision of Accuracy Can Be Achieved Using VHDL/VERILOG on FPGA-Based Platform -- 3 Test Methodology and Results -- 4 Conclusion -- References -- 16 A Cloud-Based Intelligent Transportation System's Framework to Support Advanced Traveler Information Systems -- Abstract -- 1 Introduction -- 2 Advanced Traveler Information Systems (ATISs) -- 3 Cloud-Based Intelligent Transportation Systems (CITSs) -- 4 A Generic Framework for Cloud-Based ITS -- 4.1 A Novel Framework for CITS -- 4.2 Information Flow Diagram Description -- 5 Challenges of CITS -- 6 Conclusion -- References -- Communication Systems, Antenna Research, and Cognitive Radio, Signal Processing -- Statistical-Based Dynamic Radio Resource Allocation for Sectored Cells in MIMO-OFDMA System -- 1 Introduction -- 2 System Model -- 3 Frequency Planning -- 4 Resource Allocation -- 4.1 Subcarrier Allocation -- 4.2 Power Allocation -- 5 Discussion of Results -- 6 Conclusion -- References -- Classification of Protein Sequences by Means of an Ensemble Classifier with an Improved Feature Selection Strategy -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Building Knowledge Base -- 3.2 Segmentation -- 3.3 Incremental Classifier Selection Strategy -- 3.4 Feature Selection -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- 19 Spectrum Aware-Based Distributed Handover Algorithm in Cognitive Radio Network -- Abstract -- 1 Introduction -- 2 System Model -- 3 Proposed Algorithm -- 3.1 Switching Algorithm with Description. , 3.2 Next Channel Selection Algorithm with Description -- 4 Simulation Results -- 5 Conclusion -- References -- A Reputation-Based Trust Management Model in Multi-hop Cognitive Radio Networks -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Model -- 3.1 Proposed Algorithms -- 4 Performance Evaluation -- 5 Security Observations -- 5.1 Modification Attack -- 5.2 Replay Attack -- 5.3 Man-in-the-Middle Attack -- 6 Conclusion -- References -- 21 A Study: Various NP-Hard Problems in VLSI and the Need for Biologically Inspired Heuristics -- Abstract -- 1 Introduction -- 2 NP-Hard Problems -- 3 NP-Hard Problems in VLSI -- 3.1 Area Minimization -- 3.2 Wirelength Minimization -- 3.3 Dead Space Minimization -- 3.4 Via Minimization -- 3.5 Multi-objective Problems -- 4 Bio-Inspired Heuristics -- 4.1 Genetic Algorithm -- 4.2 Particle Swarm Optimization -- 4.3 Ant Colony Optimization -- 4.4 Clonal Selection (CS) Algorithm -- 5 Results and Tabulation -- 5.1 Simulation Platform Details -- 5.2 Benchmark Circuits -- 5.3 As SOO Problem -- 5.4 As MOO Problem -- 6 Conclusion -- References -- ESMGB: Efficient and Secure Modified Group-Based AKA Protocol for Maritime Communication Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed ESMGB-AKA Protocol -- 3.1 Group Formation and Initialization -- 3.2 Registration Phase -- 3.3 Authentication and Key Agreement Phase -- 4 Formal Verification and Security Analysis of Proposed Protocol -- 4.1 Formal Verification Using AVISPA Tool -- 4.2 Security Analysis of Proposed Protocol -- 5 Performance Analysis of Proposed Protocol -- 6 Conclusion and Future Work -- References -- 23 Reduced Latency Square-Root Calculation for Signal Processing Using Radix-4 Hyperbolic CORDIC -- Abstract -- 1 Introduction -- 2 CORDIC Algorithms -- 3 Proposed Architecture for Radix '4' Hyperbolic CORDIC Algorithm. , 4 Results of Implementation in FPGA.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Computer networks-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (611 pages)
    Edition: 1st ed.
    ISBN: 9789811086397
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.707
    DDC: 006.3
    Language: English
    Note: Intro -- Foreword -- Message from the General Chairs Dr. Modi Chirag Navinchandra and Dr. Pankaj Kumar Sa -- Preface -- In Memoriam: Prof. S. K. Jena (1954-2017) -- Committee: ICACNI 2017 -- Advisory Board Members -- Chief Patron -- Patron -- General Chairs -- Organizing Co-chairs -- Program Co-chairs -- Technical Program Committee -- Organizing Committee -- About the Book -- Contents -- About the Editors -- Authentication Methods, Cryptography and Security Analysis -- Windows Physical Memory Analysis to Detect the Presence of Malicious Code -- 1 Introduction -- 2 Related Research -- 2.1 Existing Research -- 2.2 Existing Tool -- 3 Analyzing the Volatile Memory -- 3.1 Memory Mapped Information -- 3.2 Locating Code Section of the Process -- 4 The Framework for Detecting Malicious Process -- 5 The Experimentation -- 6 Conclusion -- References -- Signcrypting the Group Signature with Non-transitive Proxy Re-encryption in VANET -- 1 Introduction -- 1.1 Recent Trends -- 1.2 Our Core Contribution -- 1.3 Paper Organization -- 2 Literature Review -- 3 Our Proposed Scheme -- 4 Result and Discussion -- 4.1 Security Check -- 4.2 Result Analysis -- 5 Conclusion and Future Work -- References -- Digital Forensic Approach for Investigation of Cybercrimes in Private Cloud Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Results Analysis and Discussions -- 5 Conclusion -- References -- Cryptanalysis of a Multifactor Authentication Protocol -- 1 Introduction -- 2 Review of Mishra et al.'s Scheme -- 2.1 Initialization Phase -- 2.2 Registration Phase -- 2.3 Authentication Phase -- 3 Cryptanalysis of the Mishra et al. -- 3.1 User Anonymity -- 3.2 Insider Attack -- 3.3 Stolen Smart Card Attack -- 3.4 Man-in-Middle and Impersonation Attack -- 4 Conclusion -- References -- Dual-Core Implementation of Right-to-Left Modular Exponentiation. , 1 Introduction -- 2 Related Works -- 2.1 Montgomery Multiplication Method -- 2.2 Modular Exponentiation -- 3 Implementation of Right-to-Left Modular Exponentiation in Dual Core -- 3.1 The Modified Right-to-Left Binary Exponential Algorithm -- 3.2 High-Radix Montgomery Multiplication Method -- 4 Performance Analysis and Comparison -- 4.1 High-Radix Montgomery Multiplication -- 4.2 Right-to-Left Binary Exponential Method -- 5 Conclusion -- References -- Investigation of Privacy Issues in Location-Based Services -- 1 Introduction -- 2 Literature Survey -- 2.1 Basic Information Flow Model -- 2.2 Privacy Requirement -- 2.3 Efficiency Requirement -- 2.4 Categorization of Crypto-Based Privacy Model for LBS -- 3 Motivation of Proposed Approach -- 3.1 Problem Statement -- 3.2 Proposed Approach -- 4 Conclusion -- References -- Forensic Implications of Cortana Application in Windows 10 -- 1 Introduction -- 2 Technical Details: Cortana Artifacts, Format and Their Location -- 2.1 Extracting Tables from an ESE Database -- 2.2 IndexedDB.edb Database -- 2.3 CortanaCoreDb.dat Database -- 2.4 Decoding Columns in a Table -- 3 Research Methodology -- 3.1 Test Environment and Requirements -- 4 Experiments and Results -- 4.1 Tracking Reminders: When Got Finalized? -- 4.2 Tracking Reminders: Identifying Type of Reminders -- 4.3 Tracking Reminders: Where Got Finalized? -- 4.4 Tracking Person-Based Reminders -- 4.5 Constructing Location Timeline -- 5 Conclusion and Future Research -- References -- Secure Data Transfer by Implementing Mixed Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 A Brief Description of Proposed Algorithm -- 3.2 Proposed Methodology -- 4 Example -- 5 Simulation Work -- 6 Conclusion and Future Work -- References -- Android Malware Detection Mechanism Based on Bayesian Model Averaging -- 1 Introduction -- 2 Literature Review. , 2.1 Static Analysis -- 2.2 Dynamic Analysis -- 3 Methodology -- 3.1 Probability Estimation -- 3.2 Classifier Fusion -- 4 Results -- 5 Conclusion -- References -- A Provably Secure Re-encryption-Based Access Control in Hierarchy -- 1 Introduction -- 2 Related Work -- 3 Proposed Unidirectional Re-encryption Scheme with Rekey Derivation -- 3.1 Preliminaries -- 3.2 Construction for the Proposed Proxy Re-encryption Scheme -- 3.3 Correctness of Decryption -- 3.4 Re-encryption -- 3.5 Re-encryption Key Derivation -- 3.6 Security Analysis -- 4 Dynamic Access Control in Hierarchy -- 4.1 Proposed Approach for Access Control in Hierarchy -- 4.2 Handling Dynamics -- 4.3 Security of the Proposed Approach -- 4.4 Performance Analysis -- 5 Conclusion -- References -- Prevention of Hardware Trojan by Reducing Unused Pins and AES in FPGA -- 1 Introduction -- 2 Related Work -- 3 Overview of Hardware Trojan -- 4 Proposed Technique -- 5 Results and Discussion -- 6 Conclusion and Future Scope -- References -- Scrabble-O-Graphy: An Encryption Technique for Security Enhancement -- 1 Introduction -- 1.1 Scrabble Game -- 1.2 Cryptography -- 1.3 Cryptanalysis Attacks -- 2 Scrabble-O-Graphy Ideology -- 3 Scrabble-O-Graphy Algorithm and Illustration -- 4 Multilevel and Variable Key Generation -- 5 The Decryption Process -- 6 Complexity and Analysis -- 7 Conclusion -- References -- Vertex Magic Total Labelling and Its Application in Cryptography -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experimental Analysis -- 5 Conclusion -- 6 Future Scope -- References -- Hybrid Traceback Scheme for DDoS Attacks -- 1 Introduction -- 2 Similar Work -- 3 Proposed Approach -- 3.1 Attack Path Construction -- 4 Results and Discussion -- 5 Conclusion -- References -- Dynamic Detection and Prevention of Denial of Service and Peer Attacks with IP Address Processing and Scrutinizing. , 1 Introduction -- 1.1 Internet Control Message Protocol Flood -- 1.2 Synchronize/Transmission Control Protocol Flood -- 1.3 User Datagram Protocol Flood -- 1.4 Distributed Denial of Service -- 2 Overview -- 3 Algorithm -- 3.1 Phase 1 -- 3.2 Phase 2 -- 3.3 Phase 3 -- 4 Analysis and Complexity -- 4.1 Inserting an IP Address -- 4.2 Searching an IP Address -- 4.3 Deleting an IP Address -- 5 Future Scope -- 6 Conclusion -- References -- Comparative Study of ECG-Based Key Agreement Schemes in Wireless Body Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Implementation of ECG-Based Key Agreement Schemes -- 4 Results and Performance Analysis -- 5 Conclusion -- References -- Wireless Device Authentication Using Fingerprinting Technique -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Feature Selection -- 3.2 Signature Construction -- 3.3 Enrollment -- 3.4 Device Authentication -- 4 Evaluation -- 4.1 Impelmentation -- 4.2 Results -- 4.3 Attacks -- 5 Conclusion -- References -- Identity Management in Digital Systems -- An Improved Framework for Human Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Research Methodology -- 4 Conclusion -- References -- A Semantic Approach to Text Steganography in Sanskrit Using Numerical Encoding -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 Numeric Coding -- 3.3 Encoding -- 3.4 Decoding -- 4 Implementation -- 4.1 Morphological Analyzer and Generator -- 4.2 Knowledge Base -- 4.3 Example-Encoding -- 4.4 Example-Decoding -- 5 Results -- 6 Conclusion -- References -- A Novel Real-Time Face Detection System Using Modified Affine Transformation and Haar Cascades -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Affine Transformation -- 3.2 Proposed Algorithm -- 4 Experimental Setup -- 4.1 Datasets Used. , 4.2 Webcam and System Requirement -- 5 Results and Analysis -- 6 Conclusion and Future Work -- References -- Palmprint Identification and Verification System Based on Euclidean Distance and 2D Locality Preserving Projection Method -- 1 Introduction -- 2 Methodology -- 2.1 Preprocessing Stage -- 2.2 Feature Extraction Stage Using 2DLPP -- 2.3 Matching Stage -- 3 Experiment and Result Analysis -- 4 Conclusion and Future Work -- References -- An Improved Remote User Authentication Scheme for Multiserver Environment Using Smart Cards -- 1 Introduction -- 2 Cryptanalysis of Lee et al.'s Scheme -- 2.1 Offline Password Guessing Attack -- 2.2 Online Password-Guessing Attack -- 2.3 Mutual Authentication -- 2.4 Session Key Attack -- 3 The Proposed Scheme -- 3.1 Registration Phase -- 3.2 Login Phase -- 3.3 Authentication Phase -- 3.4 Password Change Phase -- 4 Security Analysis of the Proposed Scheme -- 4.1 User Anonymity -- 4.2 Offline Password Guessing Attack -- 4.3 Stolen Smart Card Attack -- 4.4 Mutual Authentication -- 4.5 Replay Attack -- 4.6 Session Key Security -- 5 Conclusion -- References -- A Bibliometric Analysis of Recent Research on Machine Learning for Medical Science -- 1 Introduction -- 2 Graph Interpretation -- 2.1 Percentage of Papers Published by Different Countries -- 2.2 Percentage of Publishers -- 2.3 Citation per Publisher -- 2.4 Conference Papers Versus Journals -- 2.5 Frequency of Number of Authors -- 2.6 Objective Wise Frequency -- 2.7 Objective-Wise Percentage of Citations -- 2.8 Methods or Algorithms Used for Research -- 2.9 Paper Efficiency/Ranking -- 3 Conclusion -- References -- Linear Prediction Model for Joint Movement of Lower Extremity -- 1 Introduction -- 2 Experimental Setup -- 3 Model Development -- 3.1 Univariate-Based Time Series Model -- 3.2 Multivariate Time Series Model -- 4 Results and Discussion -- 5 Conclusion. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (588 pages)
    Edition: 1st ed.
    ISBN: 9789811086335
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.709
    DDC: 006.3
    Language: English
    Note: Intro -- Foreword -- Message from the General Chairs Dr. Modi Chirag Navinchandra and Dr. Pankaj Kumar Sa -- Preface -- In Memoriam: Prof. S. K. Jena (1954-2017) -- Committee: ICACNI 2017 -- Advisory Board Members -- Chief Patron -- Patron -- General Chairs -- Organizing Co-chairs -- Program Co-chairs -- Technical Program Committee -- Organizing Committee -- Contents -- About the Editors -- Data Mining, NLP, Text Mining, Social Media Analysis -- 1 Ashtadhyayi-An Experimental Approach to Enhance Programming Languages and Compiler Design Using Panini's Grammar -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Experimental Results -- 4 Conclusion -- Acknowledgements -- References -- Movie Box-Office Gross Revenue Estimation -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Data Cleaning -- 3.3 Data Transformation -- 4 Estimation Using Regression-Based Modeling -- 4.1 Training Split on the Basis of Genre -- 4.2 Feature Selection -- 5 Multi-genre Analysis -- 5.1 Training Split on the Basis of TomatoRating and Screens -- 5.2 Local Regression Models -- 6 Conclusion -- 7 Test on Recent Releases of 2016 -- References -- 3 Classification of Short Text Using Various Preprocessing Techniques: An Empirical Evaluation -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Tweet Preprocessing -- 3.2 Representation -- 3.3 Classification -- 4 Experimental Results and Discussion -- 4.1 Dataset Description -- 4.2 Experimentation -- 4.3 Discussion -- 5 Conclusion and Future Work -- References -- 4 Named Entity Recognition in Text Documents Using a Modified Conditional Random Field -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Solutions -- 3.1 Document to Text Converter -- 3.2 Pre-processing -- 3.3 Belief Network Creation -- 3.4 Word Feature Extraction Approaches. , 3.5 Modified Conditional Random Field -- 4 Experiments and Results -- 4.1 Named Entity Recognition Efficiency -- 4.2 Accuracy Measure -- 5 Conclusion -- Acknowledgements -- References -- 5 Knowledge-Based Text Mining in Getting Perfect Preferences in Job Finding -- Abstract -- 1 Introduction -- 2 Text Mining -- 2.1 Knowledge-Based Text Mining -- 2.2 R Tool -- 3 Problem Identification -- 4 Solution to the Problem -- 5 Conclusion -- References -- 6 A Distributed Framework for Real-Time Twitter Sentiment Analysis and Visualization -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Evaluation Results -- 5 Conclusion -- References -- 7 Building an Information Retrieval Apparatus for Kannada Language: A Rule-Based Machine Interpretation System with Noise Suppression -- Abstract -- 1 Introduction -- 1.1 Approaches to Machine Interpretation -- 2 Literature Survey -- 3 Proposed System -- 3.1 Dialect Identification -- 3.2 Elucidation -- 3.3 Interpretation -- 4 Kannada Classification of Suffixes -- 5 Conclusion -- References -- 8 A Context-Aware Fuzzy Classification Technique for OLAP Text Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Proposed Context Navigation and Lookup Table in OLAP -- 4.1 Context Navigation -- 4.2 Look-up Table -- 5 Proposed Context Based Fuzzy Classification Technique -- 5.1 Proposed Algorithm Fuzzy Classification in a Concept Hierarchy -- 5.2 Time Complexity Analysis of Proposed Classifier -- 6 Experiment and Result Analysis -- 6.1 Data Set Used for Experiment -- 6.2 Experimental Metric Used -- 6.3 Results and Discussion -- 6.3.1 Experiment-1 -- 6.3.2 Experiment-2 -- Queries for Drill-Down -- Query Set for Roll-up Operation -- Slice Operation -- Dice Operation -- Discussion of Results -- 7 Conclusion and Future Scope -- References. , A Survey on Event Detection Methods on Various Social Media -- 1 Introduction -- 2 Literature Survey -- 3 Conclusion -- References -- 10 A Comparative Study of Online Resources for Extracting Target Language Translation -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Online Translation Resources -- 3.1 Hindi WordNet, Indo WordNet and Concept Net -- 3.2 Online Dictionaries and Wikipedia Based Translation -- 4 Results and Discussion -- 5 Conclusion -- References -- A Fuzzy Document Clustering Model Based on Relevant Ranked Terms -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Feature Identification and Extraction -- 3.2 Dimensionality Reduction -- 3.3 Similarity Evaluation -- 3.4 Fuzzy Document Clustering -- 4 Experimentation -- 4.1 SStress Criteria -- 4.2 Proper Cutoff for Clusters -- 5 Result and Analysis -- 6 Conclusion -- References -- 12 Euclidean Distance Based Particle Swarm Optimization -- Abstract -- 1 Introduction -- 2 Background -- 3 Proposed Inertia Weight Law -- 4 Experimental Setup -- 4.1 Benchmark Functions -- 4.2 Algorithms Compared -- 4.3 Evaluation and Comparison Criteria -- 4.4 Results and Discussion -- 5 Conclusions -- References -- 13 Clustering and Visualization on Web Search Results: A Survey -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Query Occurrence Visualization -- 2.2 TileBars -- 2.3 Tag Clouds -- 2.4 Hotmap -- 2.5 Rank Spiral -- 2.6 Resultmaps -- 2.7 Clustering on Similarity Measure -- 3 Design Rationale -- 3.1 Arrangement Based on Similarity -- 3.2 Ranking of Documents -- 3.3 Uncluttered Layout -- 4 System Architecture -- 5 Conclusion -- References -- Sentiment Analysis Using Weight Model Based on SentiWordNet 3.0 -- 1 Introduction -- 2 Literature Survey -- 3 Data Description -- 4 Methodology -- 5 Our Approach -- 5.1 Preprocessing -- 5.2 Weight Model. , 5.3 Weight Assignment and Feature Combination Selection Model -- 6 Results -- 7 Conclusion -- References -- Privacy of Organization in Online Social Networks -- 1 Introduction -- 2 Related Work -- 3 DataSet -- 4 Solution Architecture -- 4.1 Identifying Features of Confidential Information -- 4.2 Preprocessing the Data from the Sources -- 4.3 Semantic Graph Construction -- 4.4 Edge Weighing Mechanisms -- 4.5 Scoring the Social Stream -- 5 Results -- 6 Conclusion -- References -- Summary-Based Document Classification -- 1 Introduction -- 2 Literature Survey -- 2.1 Text Summarization -- 2.2 Document Classification -- 3 Proposed System -- 3.1 Summarizer -- 3.2 Classifier -- 4 Experimental Setup -- 5 Experimental Result -- 6 Conclusion -- References -- A Document Similarity Computation Method Based on Word Embedding and Citation Analysis -- 1 Introduction -- 2 Related Works -- 2.1 Word Embedding -- 2.2 Word2vec -- 2.3 Word Mover's Distance -- 3 Proposed Methodology -- 3.1 Document Preprocessing -- 3.2 Content Expansion -- 3.3 Word Embedding Generation -- 3.4 Distance Computation -- 4 Experimental Setup and Results -- 5 Conclusion -- References -- Extractive Text Summarization Using Deep Auto-encoders -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Summary Generation -- 3.3 Training and Testing -- 4 Experiments and Results -- 5 Conclusion -- References -- 19 Rating Prediction Model for Reviews Using a Novel Weighted Textual Feature Method -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Preprocessing -- 3.2 Feature Extraction -- 3.3 Deriving a Weighted Feature Vector -- 3.4 Regression Model for Learning and Prediction -- 3.5 Corpus Statistics and Parameter Setting -- 4 Experimental Results and Analysis -- 5 Conclusion -- References. , RCE-OIE: Open Information Extraction Using a Rule-Based Clause Extraction Engine for Semantic Applications -- 1 Introduction -- 2 Related Work -- 3 RCE-OIE: A Rule-Based Clause Extraction Engine for Open Information Extraction -- 4 Performance Comparison of RCE-OIE with State-of-the-Art OIE Systems -- 5 Performance Comparison of RCE-OIE with ClausIE (An Existing OIE System) in Paraphrase Identification -- 6 Conclusions -- References -- An Efficient Approach of Knowledge Representation Using Paninian Rules of Sanskrit Grammar -- 1 Introduction -- 2 Knowledge Representation in NLP -- 3 dhAtu Roop-A Verbal Root -- 4 Proposed Approach of Knowledge Representation Using Sanskrit Root-Words -- 5 Conclusion -- References -- Sentence Boundary Detection for Hindi-English Social Media Text -- 1 Introduction -- 2 Related Works -- 3 Data Collection -- 4 System Description -- 4.1 Rule-Based Approach -- 4.2 Implementation -- 5 Experimental Evaluation -- 6 Discussion -- 7 Conclusion and Future Works -- References -- Text Categorization Using a Novel Feature Selection Technique Combined with ELM -- 1 Introduction -- 2 Background -- 2.1 Extreme Learning Machine -- 2.2 Fuzzy C-Means -- 3 Proposed Approach -- 4 Experimental Analysis -- 4.1 Experimental Setup -- 4.2 Parameters for Performance Measurement -- 4.3 Discussion -- 5 Conclusion -- References -- 24 Survey of Challenges in Sentiment Analysis -- Abstract -- 1 Introduction -- 1.1 Sentiment Classification Techniques -- 2 Challenges in Sentiment Analysis -- 2.1 Sarcasm and Conditional Sentences -- 2.2 Spam Detection -- 2.3 Anaphora Resolution -- 2.4 Negation Handling -- 2.5 Word Sense Disambiguation -- 3 Conclusion and Future Scope -- References -- 25 Data Mining Techniques for Smart Mobility-A Survey -- Abstract -- 1 Introduction -- 1.1 Smart Mobility -- 1.2 Use of Data Mining. , 2 Smart Applications of Data Mining Techniques to Smart Mobility.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...