GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Local area networks (Computer networks). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (313 pages)
    Edition: 1st ed.
    ISBN: 9783319051642
    Series Statement: Intelligent Systems Reference Library ; v.65
    DDC: 620
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Diffusion of Information in Social Networks -- 1 Introduction -- 2 Models of Information Diffusion in Social Networks -- 2.1 Mathematical Modeling of Information Diffusion -- 2.2 Influencers in Social Networks -- 2.3 Influencers and Controlling Mis-information Spread in Social Networks -- 2.4 Multiple Sources of Diffusion and the Problem of Information Confusion -- 3 Locating the Source of Diffusion -- 4 Summary -- References -- Structure and Evolution of Online Social Networks -- 1 Introduction -- 2 Topological Properties of Social Networks -- 2.1 Topological Properties Used to Characterize Large Networks -- 2.2 Topological Properties of OSNs -- 3 Evolution of Social Networks -- 3.1 Evolution Models for Complex Networks -- 3.2 Evolution Models for OSNs -- 4 Evolution of OSNs in Presence of Restrictions on Node-degree -- 4.1 The Restriction in Twitter and Its Effects -- 4.2 Evolution Model in Presence of Restrictions on Node-degree -- 5 Summary -- References -- Machine Learning for Auspicious Social Network Mining -- 1 Introduction -- 2 Representation of Network Data -- 3 Different Aspects of Social Network Analysis -- 3.1 Different Measures of Social Network -- 3.2 Essential Problems and Algorithms -- 4 Statistical Models for Social Network Analysis: Probability and Random Walks -- 5 Groups and Substructures in Social Networks -- 5.1 Bipartite Cores - Identifying Communities -- 6 Machine Learning Based Approaches for Networked Data Mining -- 6.1 Social Analytical Data Preparation with Machine Learning -- 6.2 Machine Learning for Networked Data Mining -- 6.3 Some Highlited Research and Findings Using Machine Learning -- 7 Conclusion -- References -- Testing Community Detection Algorithms: A Closer Look at Datasets -- 1 Introduction -- 2 Evaluating Community Detection Methods. , 2.1 Quality Measures -- 2.2 Similarity Measure -- 3 Social Network Datasets -- 3.1 The Zachary Karate Club -- 3.2 The Bottlenose Dolphin Network -- 3.3 American College Football Network -- 3.4 Online Social Networks -- 4 Conclusion -- References -- Societal Networks: The Networks of Dynamics of Interpersonal Associations -- 1 Introduction -- 2 Background -- 3 Graphs and Digraphs -- 3.1 Representations of Sigraphs and Sidigraphs -- 3.2 Dynamics of a Social System -- 3.3 Cognitive Balance and Sidigraphs -- 3.4 The Phenomenon of Clustering -- 4 Social Networks -- 5 Societal Networks -- 5.1 The Key Principle -- 5.2 The Origin -- 5.3 Extension to a Formal Model -- 5.4 Structural Equivalence -- 5.5 Reduced Networks -- 5.6 Class Structures -- 5.7 Self-balancing Networks -- 5.8 Long-Term Evaluation -- 6 Some Recent Developments in Dynamic Social Networks -- 6.1 Mining Periodic Behaviour in Dynamic Social Networks -- 6.2 Periodic Subgraph Mining Problem -- 6.3 Framework for Analysis of Dynamic Social Networks -- 7 Problems for Further Study -- 8 Conclusion -- References -- Methods of Tracking Online Community in Social Network -- 1 Introduction -- 2 Related Work -- 2.1 Subgroup Identification -- 2.2 Clustering and Partitioning of Subgroups -- 2.3 Similarity -- 2.4 Behavioural Measures of Community -- 3 Existing Methods and Framework for Tracking Communities -- 3.1 Social Cohesion Analysis of Networks (SCAN) -- 3.2 DISSECT (Data-Intensive Socially Similar Evolving Community Tracker) -- 3.3 Framework for DISSECT Method -- 4 Conclusion -- References -- Social Network Analysis Approach for Studying Caste, Class and Social Support in Rural Jharkhand andWest Bengal: An Empirical Attempt -- 1 Introduction -- 2 Methodology -- 2.1 Village Selection for the Study -- 2.2 Data Collection and Level of Analysis. , 2.3 Limitations of Analysis by Exact Caste Community (CC) and Source of Livelihood (SL) -- 2.4 Formation of Categories of CC and SL -- 3 Brief Historical Background of the Villages -- 3.1 Location and other Facilities -- 3.2 Settlement Patterns of the Villages -- 4 Social Stratification of the Villages -- 4.1 By Caste Community -- 4.2 Stratification by Source of Livelihood (SL) Categories and Ownership of Land -- 4.3 What Patterns Observed -- 4.4 Inter-relationship of CC and SL Categories in Villages -- 5 Parameters of Life and Living of the Villagers Required for Social Network -- 5.1 Type and Timing of Needs and Urgencies -- 5.2 Availability of Help from Formal Institutions to Satisfy Urgent Needs -- 5.3 How One Decides to Approach Whom for Help or Support -- 5.4 Why Help Is Provided -- 5.5 Distance of Spread of Sources of Helps and Assistance -- 6 Findings from Social Network Analysis -- 6.1 From Whom Help Was Sought -- 6.2 Amount/Quantity and Type of Help Sought -- 6.3 Purpose of Help -- 7 Conclusions -- References -- Evaluating the Propagation Strength of Malicious Metaphor in Social Network: Flow Through Inspiring Influence of Members -- 1 Introduction -- 2 Fundamental of Social Network: Graph Theory Perspective -- 2.1 Co-Evolution of Social and Affiliation Network -- 3 Exploring Mathematical Treatments -- 3.1 Proposed Algorithm -- 3.2 Experimental Results and Discussion -- 3.3 Comparison with Statistical Model -- 4 Graphical Representation -- 5 Conclusion and Further Scope of Research -- References -- Social Network Analysis: A Methodology for Studying Terrorism -- 1 Introduction -- 2 Two Phases in the Development of Social Network Analysis -- 3 Social Network Analysis and Terrorism -- 4 Data Collection and Data Sources -- 4.1 Structured Data Sources -- 4.2 Unstructured Relational Data Sources. , 5 Simulation, Modelling and Computational Terrorism -- 6 Essentials of Social Networks and Centrality Measures -- 7 Case Studies -- 7.1 Case I: The 9/11 Attack on the Trade Towers in New York -- 7.2 Case II: Mapping a Network of Terrorist Organizations in India -- 8 Conclusions -- References -- Privacy and Anonymization in Social Networks -- 1 Introduction -- 1.1 Chapter Structure -- 2 Social Networks -- 3 Privacy in Social Networks -- 3.1 How Users Lose Control of Their Privacy -- 4 Privacy in Published Social Network Data -- 4.1 Social Network Representation -- 4.2 Social Network Analysis -- 4.3 Anonymization -- 4.4 Challenges in Anonymizing Social Networks Data -- 5 Private Information in Published Social Network Data -- 6 Background-Knowledge Attacks -- 6.1 Background Knowledge of Adversaries -- 7 Related Work -- 8 Problem Formulation -- 9 GASNA: Greedy Algorithm for Social Network Anonymization [24,27] -- 9.1 Clustering Phase -- 9.2 Adjustment Phase -- 9.3 Anonymization Phase -- 10 Empirical Evaluation of GASNA -- 11 Comparison with the Literature -- 12 Conclusion and Future Issues -- 12.1 Varying k Value for k-anonymity According to the Degree of the Nodes Being Considered -- 12.2 Anonymity in Modern Social Networks -- 12.3 Partial Anonymity -- References -- On the Use of Brokerage Approach to Discover Influencing Nodes in Terrorist Networks -- 1 Motivation -- 2 Background -- 3 Terrorist Network Mining -- 4 Calculating Centrality Measures -- 4.1 Degree Centrality -- 4.2 Betweenness Centrality -- 4.3 Closeness Centrality -- 4.4 Eigenvector Centrality -- 5 Brokerage -- 6 Roles Detected by Brokerage Approach -- 6.1 Coordinator -- 6.2 Consultant -- 6.3 Gatekeeper -- 6.4 Representative -- 6.5 Liaison -- 7 Experimental Analysis through Brokerage -- 8 Conclusion and Future Work -- References -- Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Digital communications. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (438 pages)
    Edition: 1st ed.
    ISBN: 9783031232336
    Series Statement: Communications in Computer and Information Science Series ; v.1737
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organization -- Keynote Address -- Industry 4.0 Meets Data Science: The Pathway for Society 5.0 -- Continual Learning for Intelligent Systems in Changing Environments -- Where is the Research on Evolutionary Multi-objective Optimization Heading to? -- Designing a Software Framework Based on an Object Detection Model and a Fuzzy Logic System for Weed Detection and Pasture Assessment -- An Overview of Machine Learning Based Intelligent Computing and Applications -- Semisupervised Learning with Spatial Information and Granular Neural Networks -- IoT Based General Purpose Sensing Application for Smart Home Environment -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Contents -- Intelligent Computing -- Ensemble Learning Model for EEG Based Emotion Classification -- 1 Introduction -- 2 Related Works -- 3 System Model and Methodology -- 3.1 Feature Extraction -- 3.2 Deep Learning Model Implementation -- 4 Dataset Description -- 5 Experimental Setup and Results -- 6 Conclusion -- References -- Foundation for the Future of Higher Education or 'Misplaced Optimism'? Being Human in the Age of Artificial Intelligence -- 1 Introduction -- 2 Education Using Artificial Intelligence (AIEd) -- 3 Methods -- 3.1 Search Strategy -- 3.2 Reliability of Agreement Amongst Raters -- 3.3 Collection, Codification, and Analysis of Data -- 3.4 Limitations -- 4 Results -- 4.1 Forecasting and Characterising -- 4.2 Curriculum Technology that Uses Artificial Intelligence -- 4.3 Constant Re-Evaluation -- 4.4 A System that May Change to Fit the USER'S Needs -- 5 Conclusion and Way Forward -- References -- AI Enabled Internet of Medical Things Framework for Smart Healthcare -- 1 Introduction -- 2 AI Based IoMT Health Domains. , 3 AI Enabled IoMT Architectures for Smart Healthcare Systems -- 4 Research Challenges of AI Enabled Smart Healthcare Systems -- 4.1 Data Accuracy -- 4.2 Data Security -- 4.3 System Efficiency -- 4.4 Quality of Service -- 5 Conclusion -- References -- Metaverse and Posthuman Animated Avatars for Teaching-Learning Process: Interperception in Virtual Universe for Educational Transformation -- 1 Introduction -- 2 Objectives of the Research and Knowledge Gap -- 3 Methods and Methodology -- 4 Results and Discussion -- 4.1 Educational Metaverse: A Categorical Analysis -- 4.2 A Wide Variety of Virtual Worlds for Use in Education -- 4.3 Situations for Learning, Tiers of Education, and VR Learning Environments -- 4.4 Students' Avatars (Digital Personas) in the Metaverse -- 4.5 Alterations in Educational Multiverse -- 5 Conclusion and Way Forward -- References -- Tuning Functional Link Artificial Neural Network for Software Development Effort Estimation -- 1 Introduction -- 2 Functional Link ANN-based SDEE -- 2.1 Justification of the Use of Chebyshev Polynomial as the Orthogonal Basis Function -- 3 Swarm Intelligence-Based Learning Algorithms for the CFLANN -- 3.1 Classical PSO -- 3.2 Improved PSO Technique -- 3.3 Adaptive PSO -- 3.4 GA -- 3.5 BP -- 4 Performance Evaluation Metrics -- 5 Description of the Dataset -- 6 Experiments and Results -- 7 Conclusion and Future Work -- References -- METBAG - A Web Based Business Application -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps and Solutions -- 2.2 Deep Neural Networks (DNN) and LSTM -- 3 Architecture of the System -- 3.1 Architecture of the User Side of the System -- 3.2 Architecture of the Admin Side of the System -- 4 Workflow Diagrams -- 5 Procedures -- 5.1 Procedure: Price Prediction -- 5.2 Procedure: Password Security -- 5.3 Procedure: Dashboard -- 6 Result Analysis -- 6.1 Price Prediction. , 6.2 Password Security -- 7 Conclusions and Future Work -- References -- Designing Smart Voice Command Interface for Geographic Information System -- 1 Introduction -- 1.1 Review of Literature on Voice Command Interface -- 2 Design and Implementation -- 2.1 Review of Literature on Voice Command Interface -- 2.2 Modules Used -- 2.3 Methodology -- 2.4 Implementation -- 3 Results and Discussion -- 3.1 Testing Model by Creating a War Zone like Environment -- 3.2 Spectrogram and Waveform Samples for Spoken Voice -- 3.3 Comparative Analysis Based on Word Error Rate -- 4 Conclusion -- References -- Smart Garbage Classification -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps in Literature -- 3 System Details -- 3.1 Waste Scanning Through Camera -- 3.2 Waste is Segregated and the Lid Opens -- 3.3 Moving of Hands and Trash Being Put into Respective Compartment -- 4 Component Modules and Description -- 5 Algorithmic Steps -- 6 Result and Analysis -- 7 Conclusions -- References -- Optical Sensor Based on MicroSphere Coated with Agarose for Heavy Metal Ion Detection -- 1 Introduction -- 2 Sensing Principle -- 3 Sensor Design -- 4 Results and Discussions -- 5 Conclusion -- References -- Influential Factor Finding for Engineering Student Motivation -- 1 Introduction -- 2 Related Studies -- 3 Experiment -- 3.1 Logistic Regression -- 4 Discussion -- 5 Conclusion -- References -- Prediction of Software Reliability Using Particle Swarm Optimization -- 1 Introduction -- 2 Related Work -- 3 Reliability Prediction Algorithm Using PSO -- 4 Experimental Result and Comparison -- 5 Conclusions -- References -- An Effective Optimization of EMG Based Artificial Prosthetic Limbs -- 1 Introduction -- 2 Literature Review -- 3 Design and Manufacturing -- 3.1 Cad Model -- 3.2 Manufacturing and Assembly -- 4 Electrical Components and Design -- 4.1 Electromyography Sensing. , 5 Artificial Intelligence -- 5.1 Gesture Recognition -- 5.2 Grasping Capacity (According to Size) -- 5.3 Analysis of EMG Signals -- 6 Conclusion -- References -- Communications -- Performance Analysis of Fading Channels in a Wireless Communication -- 1 Introduction -- 2 Fading Channels -- 2.1 Performance Analysis of Rayleigh Fading -- 2.2 Description of the Performance of Rician Fading Channel -- 2.3 Performance Analysis of NAKAGAMI-M Fading Channel. -- 3 Experimentation and Result Analysis -- 3.1 Simulation and Discussion of Rayleigh Fading Channel -- 3.2 Simulation Results of Rician Fading Channel -- 3.3 Simulation Results of Nakagami-M Fading Channel -- 4 Conclusion -- References -- Power Conscious Clustering Algorithm Using Fuzzy Logic in Wireless Sensor Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 4 Simulation Setup and Evaluation -- 5 Conclusions -- References -- Cryptanalysis on ``An Improved RFID-based Authentication Protocol for Rail Transit'' -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Preliminary -- 2.1 Secure Requirements -- 2.2 Threat Model -- 3 Review of Zhu et al.'s Protocol -- 3.1 Set up Phase -- 3.2 Authentication Phase -- 4 Weakness of Zhu et al.'s Protocol -- 4.1 Known Session-Specific Temporary Information Attack -- 4.2 Lack of Scalability -- 5 Conclusion -- References -- A Novel Approach to Detect Rank Attack in IoT Ecosystem -- 1 Introduction -- 2 Background -- 2.1 Generic IoT Network Architecture -- 2.2 RPL Protocol -- 2.3 Rank Attack in IoT -- 2.4 IDS for IoT Ecosystem -- 3 Related Work -- 4 Proposed Security Approach -- 4.1 Proposed Approach Assumption -- 4.2 Security Model -- 4.3 Proposed Rank Attack Detection Solution -- 5 Experiments and Results Analysis -- 5.1 Setup and Execution of Experiments. , 5.2 After Proposed Security Solution Implementation Performance Analysis -- 5.3 Comparison of the Suggested Security Solution to Similar Works -- 6 Conclusion -- References -- Energy Efficient Adaptive Mobile Wireless Sensor Network in Smart Monitoring Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Mobile Sensor Node Architecture -- 4 Simulation and Result Analysis -- 4.1 Simulation Set Up -- 4.2 Experimental Analysis -- 5 Conclusion -- References -- Orthogonal Chirp Division Multiplexing: An Emerging Multi Carrier Modulation Scheme -- 1 Introduction -- 2 Compatibility with OFDM -- 3 Computational Complexity -- 3.1 Computational Complexity of OCDM -- 3.2 Computational Complexity of OFDM -- 4 Applications of OCDM -- 4.1 OCDM for Wireless Communication -- 4.2 OCDM for Optical Fiber Communication -- 4.3 OCDM for IM/DD Based Short Reach Systems -- 4.4 OCDM for Underwater Acoustic Communication -- 4.5 OCDM for Baseband Data Communication -- 4.6 OCDM for MIMO Communication -- 5 Simulation Results -- 6 Conclusion -- References -- Machine Learning and Data Analytics -- COVID-19 Outbreak Estimation Approach Using Hybrid Time Series Modelling -- 1 Introduction -- 2 Background -- 2.1 LSTM Network for Modelling Time Series -- 2.2 ARIMA Model -- 2.3 Seasonal ARIMA Model -- 3 Proposed Model -- 4 Implementation and Results Discussion -- 4.1 Prediction Using LSTM Model -- 4.2 Prediction Using ARIMA Model -- 4.3 Prediction Using Hybrid Model -- 5 Conclusion -- References -- Analysis of Depression, Anxiety, and Stress Chaos Among Children and Adolescents Using Machine Learning Algorithms -- 1 Introduction -- 1.1 Background -- 1.2 Motivation and Objective of the Work -- 2 Literature Review -- 3 Methodology -- 3.1 Data Set Description -- 3.2 Implementation -- 4 Results and Discussion -- 4.1 Classification Results for Depression. , 4.2 Classification Results for Anxiety.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Natural computation-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (398 pages)
    Edition: 1st ed.
    ISBN: 9783030493394
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1180
    DDC: 6
    Language: English
    Note: Intro -- Welcome Message -- Organization -- IBICA-WICT 2019 Organization -- Chief Patrons -- Patrons -- Honorary Chairs -- General Chairs -- Program Chairs -- Web Chair -- Publication Chair -- Publicity Chairs -- IBICA Program Committee -- IBICA Additional Reviewers -- WICT Program Committee -- WICT Additional Reviewers -- Contents -- Towards the Speed Enhancement of Association Rule Mining Algorithm for Intrusion Detection System -- 1 Introduction -- 2 Overview of Intrusion Detection System -- 3 Related Work -- 4 Proposed Methodology -- 4.1 Dataset -- 4.2 Technology Used for Experimental Purpose -- 4.3 Experimental Approach -- 4.4 Experimental Result -- 5 Analysis of Result and Discussion -- 6 Conclusion -- References -- Image Retrieval Using Bat Optimization and Image Entropy -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Entropy -- 3.2 Bat Algorithm -- 4 Experimental Observations and Discussions -- 5 Conclusion -- References -- Logistic Regression on Hadoop Using PySpark -- 1 Introduction -- 2 Logistic Regression -- 2.1 Computation of Cost Function and Its Gradient -- 2.2 Optimization of the Cost Function -- 3 Implementation -- 4 Results -- 4.1 Comparing Test Performance -- 5 Conclusion -- References -- Analysis of Pre-processing Techniques for Odia Character Recognition -- 1 Introduction -- 1.1 Optical Character Recognition (OCR) -- 2 Odia Character Recognition -- 3 Factors Affecting the Quality of Odia Character Recognition and Significance of Pre-processing -- 3.1 Types of Pre-processing Techniques -- 4 Analysis of Different Pre-processing Techniques -- 5 Conclusions -- References -- Cluster-Based Under-Sampling Using Farthest Neighbour Technique for Imbalanced Datasets -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experimental and Simulation Results -- 4.1 Results -- 5 Conclusion. , References -- Vehicle Detection and Classification: A Review -- 1 Introduction -- 2 Methods Used for Vehicle Detection -- 2.1 Motion-Based Features -- 2.2 Appearance Based Features -- 2.3 Neural Networks -- 3 Methods Used for Vehicle Classification -- 3.1 Geometry-Based Approaches -- 3.2 Appearance-Based Approaches -- 3.3 Approaches Based on Texture -- 3.4 Mixed Approaches -- 4 Database -- 5 Conclusion -- References -- Methods for Automatic Gait Recognition: A Review -- 1 Introduction -- 2 Important Steps in a Gait Recognition System -- 2.1 Feature Extraction -- 2.2 Feature Selection -- 2.3 Classification -- 3 Model-Based Methods -- 4 Model-Free Methods -- 4.1 Gait Energy Image (GEI) -- 5 Gait Recognition Challenges -- 6 Existing Gait Databases -- 7 Conclusion -- References -- Comparative Performance Exploration and Prediction of Fibrosis, Malign Lymph, Metastases, Normal Lymphogram Using Machine Learning Method -- 1 Introduction -- 2 Flow Chart of the System -- 3 Description of the Dataset -- 4 Result Analysis -- 4.1 Evaluation and Predictions Results -- 4.2 Classification Tree -- 4.3 Distribution Plot -- 4.4 Scatter Plot for Lymphogram -- 4.5 Box Plot Analysis -- 5 Conclusion -- References -- Decision Forest Classifier with Flower Search Optimization Algorithm for Efficient Detection of BHP Flooding Attacks in Optical Burst Switching Network -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Datasets -- 3.2 Methodologies Used -- 4 Experiments -- 5 Results and Discussion -- 6 Conclusion and Future Scope -- References -- Review and Implementation of 1-Bit Adder in CMOS and Hybrid Structures -- 1 Introduction -- 2 Review of Full Adders -- 2.1 Standard CMOS Full Adder [1] -- 2.2 Hybrid Full Adder [2] -- 3 Implementation of Full Adder -- 3.1 XNOR Cell -- 3.2 4-T Cell -- 3.3 6-T Cell (Carry) -- 3.4 6-T Cell (Sum) -- 3.5 Full Adder. , 4 Performance Analysis -- 5 Conclusion -- References -- Design and Analysis of LOL-P Textile Antenna -- 1 Introduction -- 2 Proposed Design -- 2.1 Analysis of Circular Textile Antenna -- 3 Results and Discussions -- 3.1 Optimization Results -- 3.2 Analysis of Optimized Steps -- 3.3 Comparison Results of Various Substrate Materials -- 3.4 Fabrication Results -- 4 Conclusions and Future Scope -- References -- Analytical Study of Scalability in Coastal Communication Using Hybridization of Mobile Ad-hoc Network: An Assessment to Coastal Bed of Odisha -- 1 Introduction -- 1.1 Vulnerability of the Odisha Coastal Zone -- 1.2 Marine and Coastal Lines of Odisha -- 1.3 Objective -- 2 Literature Survey -- 2.1 Disaster Response System -- 2.2 Pre-disaster Communication -- 2.3 Post-disaster Communication -- 3 MANET in Rescue Communication, the Most Challenging Trend -- 3.1 Node Based Communications System -- 3.2 Cellular Based Communications System -- 4 Propose Method of Communication -- 4.1 Scalable Node Selection Method -- 4.2 Optimized Geographical Multicast Routing Protocol (OGMRP) -- 5 Methodology -- 6 Performance Evaluation -- 7 Simulation Analysis -- 8 Conclusion -- References -- Effect of Environmental and Occupational Exposures on Human Telomere Length and Aging: A Review -- 1 Introduction -- 1.1 Environmental and Occupational Exposures -- 2 What Are Telomeres? -- 3 Telomere Length Measurement -- 4 Telomere Length: A Biomarker of Aging -- 5 Association Between Telomere Length Shortening and Aging During Environmental or Occupational Exposures: Overview -- 6 Future Directions -- References -- A Review on VLSI Implementation in Biomedical Application -- 1 Introduction -- 2 Literature Review -- 3 Results and Comparison -- 4 Conclusion -- References. , Comparative Analysis of a Dispersion Compensating Fiber Optic Link Using FBG Based on Different Grating Length and Extinction Ratio for Long Haul Communication -- 1 Introduction -- 2 System Description and Simulation Design -- 3 Result and Analysis -- 4 Conclusion -- References -- Unsupervised Learning Method for Mineral Identification from Hyperspectral Data -- 1 Introduction -- 2 Related Work -- 3 HSI Model -- 4 Classification Approach -- 5 Possibilistic Fuzzy C-Means -- 6 Experiment and Result -- 7 Conclusion and Future Work -- References -- Short Term Load Forecasting Using Empirical Mode Decomposition (EMD), Particle Swarm Optimization (PSO) and Adaptive Network-Based Fuzzy Interference Systems (ANFIS) -- 1 Introduction -- 2 Proposed Work -- 3 IMF Formation in Decomposition of EMD -- 4 Working of ANFIS -- 5 Results and Discussion -- 6 Conclusion -- Appendix -- References -- Energy Conservation Perspective for Recharging Cell Phone Battery Utilizing Speech Through Piezoelectric System -- 1 Introduction -- 2 Existing Background -- 3 Basic Theory of Concept -- 4 Structural Modelling of System -- 4.1 Nano Generator -- 4.2 Piezoelectric Substrate -- 4.3 ZnO Electrodes -- 5 Methodology and Design -- 6 Analysis and Outcomes -- 7 Conclusions -- References -- A Progressive Method Based Approach to Understand Sleep Disorders in the Adult Healthy Population -- 1 Introduction -- 2 Process -- 2.1 Approaching Healthy Adults -- 2.2 Subject Inclusion and Exclusion Criteria -- 2.3 Meeting Subject -- 3 Screening Questionnaire -- 3.1 The Epworth Sleepiness Scale -- 3.2 Sleep Quiz -- 4 Screening Tools -- 4.1 Actigraphy and Sleep Diary -- 5 Administration of Neuropsychological Test Battery -- 5.1 Psychomotor Vigilance Test (PVT) -- 5.2 Forward Digit Span Test -- 5.3 IOWA Gambling Task -- 5.4 Wisconsin Card Sorting Task (WCST) -- 5.5 Tower of London Test (TOL). , 5.6 Stroop Test -- 5.7 Auditory Verbal Learning Test -- 6 Nocturnal Polysomnogram -- 7 Productivity Scale -- 8 A Case Study on the Indian Population -- 8.1 Utilization of Neuropsychology Test Battery -- 9 Conclusion -- References -- Semantic-Based Process Mining: A Conceptual Model Analysis and Framework -- 1 Introduction -- 2 Preliminaries -- 2.1 Semantic Web Search Technologies (SWS) -- 2.2 Data Labelling and Linking (Integration) -- 3 Systematic Mapping Study: Main Application Areas of the Process Mining and Semantic Modelling Tools/Methods -- 4 SPM-Based Framework and Design -- 5 Experimentation Analysis and Results -- 6 Discussion -- 7 Conclusion -- References -- Educational Process Intelligence: A Process Mining Approach and Model Analysis -- 1 Introduction -- 2 Related Works -- 3 Educational Process Intelligence (EPI) Model -- 4 Formalization of the EPI Algorithm -- 5 Analysis and Case Study Implementation -- 6 Discussion -- 7 Conclusion -- References -- Design and Development of a Mobile App as a Learning Strategy in Engineering Education -- 1 Introduction -- 1.1 Innovation in Engineering Education -- 1.2 Educational Innovation: Integration of Technology in the Classroom -- 2 A Novel Approach to Learn Thermodynamics -- 2.1 Thermodynamics Course in Engineering Curricula -- 2.2 Case of Study: Developing a Mobile App as an OER by Undergrad Engineering Students -- 2.3 Design and Implementation of the Mobile App -- 2.4 Results: Academic Performance of the Group -- 3 Conclusions -- References -- Beyond Things: A Systematic Study of Internet of Everything -- 1 Introduction -- 1.1 Internet of Everything: Connecting the Unconnected Things and People -- 1.2 Internet of Everything Ecosystem: Role of Big Data and Cloud -- 1.3 Role of Internet of Things in Internet of Everything Ecosystem -- 2 Related Work -- 3 Motivation. , 4 Importance of Internet of Everything (Over Internet of Things) in 21st century.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Swarm intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (209 pages)
    Edition: 1st ed.
    ISBN: 9783662463093
    Series Statement: Studies in Computational Intelligence Series ; v.592
    DDC: 006.3824
    Language: English
    Note: Intro -- Preface -- Contents -- A Comprehensive Review on Bacteria Foraging Optimization Technique -- 1 Introduction -- 2 Behavior of Bacterial Colony -- 2.1 Phases in the Life Cycle of Bacteria -- 2.2 Communication Among Bacteria -- 2.3 Types of Bacteria -- 3 E.coli Bacterial Colonies -- 3.1 Biological Inspiration -- 4 Description of BFO -- 4.1 Chemotaxis -- 4.2 Swarming -- 4.3 Reproduction -- 4.4 Elimination-Dispersal -- 4.5 Convergence -- 5 Optimization Based on E.coli Bacterial Colony -- 6 Classification of BFO Algorithm -- 6.1 Conventional BFO -- 6.2 Revised BFO -- 6.3 Hybrid BFO -- 7 Multi-objective Optimization Based on BF -- 7.1 Multi-objective Optimization -- 7.2 Multi-objective BFO Algorithm -- 8 An Overview of BFO Applications -- 9 Conclusion -- References -- Swarm Intelligence in Multiple and Many Objectives Optimization: A Survey and Topical Study on EEG Signal Analysis -- 1 Introduction -- 1.1 Outline of Swarm Intelligence -- 1.2 Multi-objective versus Many-objective Optimization -- 2 Swarm Intelligence for Multi Objective Problems -- 2.1 ACO for Multiple Objective Problems -- 2.2 PSO for Multiple Objective Problem -- 2.3 ABC for Multiple Objective Problem -- 3 Swarm Intelligence for Many Objective Optimization -- 4 Study of Swarm Intelligence for EEG Signal -- 4.1 ACO in EEG Signal Analysis -- 4.2 PSO in EEG Signal Analysis -- 4.3 ABC in EEG Signal Analysis -- 4.4 Towards Multiple and Many Objectives of EEG Signal -- 5 Discussion and Future Research -- References -- Comparison of Various Approaches in Multi-objective Particle Swarm Optimization (MOPSO): Empirical Study -- 1 Introduction -- 2 General Multi-objective Problem -- 3 Particle Swarm Optimization -- 4 PSO for Multiple Objectives -- 5 Approaches of MOPSO -- 5.1 Algorithms That Exploit Each Objective Function Separately -- 5.2 Objective Function Aggregation Approaches. , 5.3 Non-Pareto, Vector Evaluated Approaches -- 5.4 Pareto Dominance Approach -- 5.5 Weighted Sum Approach -- 5.6 Lexicographic Approach -- 5.7 Subpopulation Approach -- 5.8 Pareto Based Approach -- 6 A Variant of MOPSO -- 7 Comparative Study -- 7.1 Performance Evaluation -- 7.2 Conclusion and Future Work -- References -- Binary Ant Colony Optimization for Subset Problems -- 1 Introduction -- 2 Ant Colony Optimization -- 3 Feature Selection -- 4 Solution Representations for Subset Problems Using Ant Colony Optimization -- 5 Binary ACO -- 6 Computational Experiments -- 6.1 Fitness Function -- 6.2 Cross Validation (CV) -- 6.3 Datasets -- 6.4 Method -- 6.5 Datasets -- 6.6 Comparisons with Other Algorithms -- 7 Discussion -- 8 Conclusion -- 9 Future Work -- References -- Ant Colony for Locality Foraging in Image Enhancement -- 1 Introduction -- 2 Retinex Theory -- 3 Termite Retinex -- 4 Termite Retinex Locality -- 5 Termite Retinex Properties -- 5.1 Computational Complexity -- 5.2 Dynamic Range Stretching -- 5.3 Color Constancy and Color Correction -- 5.4 HDR Tone Rendering -- 6 Conclusions -- References -- Uncertainty Based Hybrid Particle Swarm Optimization Techniques and Their Applications -- 1 Introduction -- 2 Implementation of PSO -- 2.1 PSO Algorithm -- 3 Variants of PSO -- 3.1 Discrete Binary PSO (DBPSO) -- 3.2 Adaptive PSO -- 3.3 Multi-objective PSO -- 4 PSO in Feature Selection -- 5 PSO in Classification -- 5.1 Algorithm to Extract Best Classification Rule Begin -- 5.2 Rule Induction Algorithm -- 6 PSO in Hybrid Computing -- 6.1 Fuzzy PSO -- 6.2 Rough PSO -- 6.3 Rough Fuzzy PSO -- 7 Implementation and Results -- 8 Applications of PSO -- 9 Conclusion -- References -- Hybridization of Evolutionary and Swarm Intelligence Techniques for Job Scheduling Problem -- 1 Introduction -- 2 Evolutionary Algorithms -- 2.1 Genetic Algorithm. , 3 Swarm Intelligence -- 3.1 Ant Colony Optimization -- 3.2 Particle Swarm Optimization -- 3.3 Artificial Bee Colony Optimization -- 4 Related Work on Hybrid Techniques for Job Scheduling -- 4.1 Introduction -- 4.2 Experimental Results and Discussion -- 5 Proposed Hybrid Technique -- 5.1 Introduction -- 5.2 Adaptive ABC Algorithm -- 5.3 Adaptive ABC for Job Scheduling Problem -- 6 Experimental Results -- 6.1 Environment Infrastructure -- 6.2 Implementation and Results -- 7 Multiobjective Problems -- 8 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...