GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Materials science. ; Materials science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (296 pages)
    Edition: 1st ed.
    ISBN: 9789811943041
    Series Statement: Advances in Sustainability Science and Technology Series
    DDC: 620.11
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Wave Energy System Design of the Waraqocha Project -- 1 Introduction -- 2 Background of Undomotive Energy -- 3 System Conceptual Design -- 4 Cadastre Data Analysis -- 5 Mechanical Design -- 5.1 Float -- 5.2 Arm -- 5.3 Cylinders -- 6 Hydraulic Design -- 6.1 Suction System -- 6.2 Drive System -- 7 Turbine and Electric Generation -- 7.1 Pelton Turbine -- 7.2 Estimated Generation -- 8 Conclusion -- References -- Performance Characteristics of Mineral Oil Blended with Vegetable Oil -- 1 Introduction -- 2 Experimental Details -- 2.1 Oil Samples -- 2.2 Mixed/Blended Oil Sample Preparation Process -- 2.3 Measurement of Breakdown Voltage -- 2.4 Measurement of Viscosity -- 2.5 Measurement of Flash Point -- 2.6 Measurement of Pour Point -- 3 Experimental Results and Discussion -- 3.1 Properties of Base Oil Samples -- 3.2 Properties of Mixed/Blended Oil Samples -- 4 Conclusion -- References -- Design of Beam Splitters by Using 1D Defect Ternary Photonic Band Gap Structures -- 1 Introduction -- 2 Theory -- 3 Results and Discussion -- 4 Conclusion -- References -- Comparative Study Between Different Mechanisms for Determining the Flocculant Dosage in the Sedimentation of Copper Concentrates -- 1 Introduction -- 2 Adorjan Thickeners Design Method -- 2.1 Thickener Area -- 2.2 Thickener Height -- 3 Experimental Procedure -- 4 Results -- 4.1 Maximum Sedimentation Rate Method -- 4.2 Sediment Granulometry Method -- 4.3 Thickener Design Evaluation Method -- 5 Conclusion -- References -- Investigation on Critical Characteristics of Mineral Oil by Using h-BN Nanoparticles -- 1 Introduction -- 2 Experimental Details -- 3 Results and Discussions -- 4 Conclusion -- References -- Implementation of ALU Using Partial Adiabatic Logic Style -- 1 Introduction -- 2 Literature Review. , 2.1 Power Reduction of Half Adder And Half Subtractor using different Partial Adiabatic Logic Styles -- 2.2 An Alternative Approach To Low Power Application Circuits Using Adiabatic Logic -- 3 ALU -- 3.1 Logical Block of ALU -- 3.2 4-Bit Full Adder -- 3.3 4-Bit Full Subtractor -- 3.4 4-Bit ALU -- 4 Simulations and Results -- 4.1 Conventional Circuits -- 4.2 Adiabatic Logic Circuits -- 5 Power Analysis -- 6 Conclusion -- References -- High Speed Low Voltage Hybrid Full Adder for Computing Systems -- 1 Introduction -- 2 Pass Networks -- 2.1 Pass Logic Implementation of XOR Cell -- 3 Full Adder Cell -- 3.1 XOR-XNOR Cell Using Pass Transmission Logic -- 3.2 Proposed Sum Module -- 3.3 Proposed Carry Module -- 3.4 Proposed Full Adder -- 4 Simulation Results -- 5 Conclusion -- References -- Fracture Interface Observation After the Mechanical Test of Additively Manufactured CCFRTC Fabricated Under the Controlled Air Flow Cooling Effect -- 1 Introduction -- 2 Fabrication Process of CCFRPC Specimens Using Control Cooling Effect -- 3 Observation of the Manufactured Composite Specimens -- 4 Fractured Interface Analysis of the CCFRPC Specimens After Performing Mechanical Testing -- 5 Conclusion -- References -- Influence of Acetic Acids on Performance Parameters of Vegetable Oil Insulation -- 1 Introduction -- 2 Experimental Details -- 2.1 Selection of Base Oil Samples -- 2.2 Proposed Samples -- 2.3 Oil Preparation Processes -- 2.4 Measurement of Breakdown Voltage -- 2.5 Measurement of Viscosity -- 2.6 Measurement of Flash Point -- 2.7 Measurement of Pour Point -- 3 Experimental Results and Discussion -- 3.1 Properties of Base Oil Samples -- 3.2 Properties of Acid-Included Oil Samples -- 4 Conclusion -- References -- Design of Gate All Around MOS-Based RADFET Dosimeter -- 1 Introduction -- 2 Device Physics -- 2.1 Theory -- 3 Results and Discussion -- 4 Conclusion. , References -- Influence of Casting Moulds on the Tensile and Corrosion Characteristics of Palm Kernel Shell Ash Reinforced Al6063-SiC Composite -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Production of Composites -- 2.3 Mechanical Test -- 3 Results and Discussion -- 3.1 Ultimate Tensile Strength (UTS) -- 3.2 Modulus of Elasticity (MOE) -- 3.3 Elongation -- 3.4 Metallographic Examination -- 3.5 Corrosion Test -- 4 Conclusions -- References -- Design and Development of Universal Runner Cutting Machine -- 1 Introduction -- 2 Previous Work -- 3 Construction and Working of Model -- 4 Results and Analysis -- 5 Conclusion -- References -- Surface Integrity and Corrosion Resistance of AZ31B Magnesium Alloy Processed by Ultrasonic Rolling -- 1 Introduction -- 2 Experiment and Methods -- 2.1 Materials and Equipment -- 2.2 Ultrasonic Rolling Experiment Design -- 2.3 Surface Roughness and Microstructure Tests -- 2.4 Electrochemical Corrosion Test -- 3 Results and Discussion -- 3.1 Surface Roughness -- 3.2 Metallographic Microstructure -- 3.3 Electrochemical Impedance Spectroscopy -- 4 Conclusions -- References -- Wireless Interface-Based Acquisition, Analysis, and Control System Using Master-Slave Approach for Chemical Laser -- 1 Introduction -- 2 Wireless Interface-Based Acquisition, Analysis, and Control System -- 2.1 Assimilation of Acquisition, Analysis, and Control System with Flowing Laser COIL System -- 2.2 Graphical User Interface (GUI) -- 3 Conclusion -- References -- Finite Element Analysis of Isotropic & -- Functionally Graded Plate -- 1 Introduction -- 2 Methodology -- 2.1 Analysis in Abaqus -- 3 Materials & -- Properties of the FG & -- Isotropic Plates -- 4 Research & -- Analysis -- 4.1 Analysis (Static) of FG Plate -- 4.2 Analysis (Static) of Isotropic Plate -- 4.3 Modal Analysis of the FG Plate. , 5 Validation of the Analysis -- 6 Conclusion -- 7 Future Scope -- References -- Designing of an Efficient 4*4 RAM Using Binary Cell -- 1 Introduction -- 2 Binary Cell -- 3 4*4 Ram Using Binary Cell -- 4 Simulation Results -- 5 Designing SRAM Circuits Using Power Gating Methods -- 6 Comparative Study -- 7 Conclusion -- References -- Mathematical Model of Kirchhoff Mesh Nanoplate Under the Action of Electrostatic and Temperature Fields -- 1 Introduction -- 2 Statement of the Problem -- 3 Numerical Experiment -- 4 Concluding Remarks -- References -- Verification of Wishbone Compliant SPI Using System Verilog -- 1 Introduction -- 2 SPI -- 3 SPI Data Transmission -- 3.1 Diferent Modes of Transmissions -- 4 Wishbone Bus Interface -- 5 System Verification -- 5.1 UVM Testbench -- 6 SPI Master & -- Slave Working -- 7 Verification Plan -- 8 Results -- 8.1 Testbench Components -- 8.2 Testbench Results -- 9 Conclusion -- References -- Design and Simulation of MEMS-Based Two-Directional Capacitive Pressure Sensor -- 1 Introduction -- 2 Design Concepts -- 3 Design of Electrodes -- 4 Measurements of Displacement -- 5 Simulation Results -- 6 Conclusion -- References -- Memristor and Its Modelling: A Review -- 1 Introduction -- 2 Memristor Description -- 2.1 What is a Memristor? -- 2.2 Overview of the Research Areas -- 2.3 Memristor Fabrication and Modelling -- 3 Modelling of a Memristor -- 3.1 Linear Ion Drift Model -- 3.2 Nonlinear Ion Drift Model -- 3.3 Simmons Tunnel Barrier Model -- 3.4 Threshold Adaptive Memristor Model -- 3.5 Yacopcic Neuromorphic Model -- 4 Conclusıon -- References -- Performance Characteristics of Vegetable Oil and Its Blended Combinations as Alternate Liquid Insulation -- 1 Introduction -- 2 Experimental Details -- 2.1 Oil Samples -- 2.2 Blended Oil Sample Preparation Process -- 2.3 Measurement of Properties. , 3 Experimental Results and Discussion -- 3.1 Properties of Oil Samples -- 3.2 Discussion on Properties of Oil Samples -- 4 Conclusion -- References -- Bottom-Up Synthetic Biology Leads to Artificial Cells as Innovative Materials and Calls for the Adoption of Systemic Perspectives -- 1 Bottom-Up Synthetic Biology and the So-Called "Artificial Cells" (ACs) -- 2 ACs in a Nutshell: Q& -- A -- 3 Three Systemic Perspectives -- 3.1 The Internal Reaction Network -- 3.2 The AC/environment Supra-System -- 3.3 Complexity and AC Ranking -- 4 Concluding Remarks-Toward ACs 2.0 -- References -- Sensitivity Studies on Low Energetic Pyrotechnic Composition for Future Consumer Fireworks -- 1 Introduction -- 2 Accident Analysis -- 3 Materials and Methods -- 3.1 Chemicals Purchased -- 3.2 Preparation of Pyrotechnic Mixtures -- 3.3 Chemicals Mixed -- 3.4 Sensitivity Analysis -- 4 Experimental Results and Discussion -- 4.1 Impact Test -- 4.2 Friction Test -- 5 Conclusion -- References -- Investigation of Desirable Vibrational Energy Harvester Based on Design Structure and Piezoelectric Material -- 1 Introduction -- 2 Design Structures and Configurations of Energy Harvesters -- 3 Types of Piezoelectric Materials -- 4 Conclusion -- References -- Surface Characterization of Mn1.0Co1.9Fe0.1O4 (MCF) Spinel Coating on Metallic Interconnect Used in Solid Oxide Fuel Cells -- 1 Introduction -- 2 Experimental Procedure -- 2.1 Materials and Methods -- 2.2 Characterization -- 3 Results and Discussion -- 3.1 Texture Isotropy Analysis -- 3.2 Surface Morphology of MCF Coating -- 4 Conclusions -- References -- Performance Optimization of IGZO-Based Junctionless Thin Film Transistor for Low Power Application -- 1 Introduction -- 2 Device Structure and Simulation -- 2.1 Theory -- 2.2 Results and Discussion -- 2.3 Conclusion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Computational intelligence-Simulation methods. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (840 pages)
    Edition: 1st ed.
    ISBN: 9783030847609
    Series Statement: Lecture Notes in Networks and Systems Series ; v.300
    DDC: 006.3
    Language: English
    Note: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- A Survey of Machine Learning Techniques Applied for Automatic Traffic Light Recognition -- 1 Introduction -- 2 Major Challenges in Traffic Light Recognition -- 3 Traffic Light Recognition System -- 3.1 Dataset/Data Acquisition -- 3.2 Pre-processing -- 3.3 Localization -- 3.4 Feature Extraction Using Color and Shape -- 3.5 Verification -- 4 Discussion -- 5 Conclusion and Future Work -- 5.1 Concluding Remarks -- 5.2 Research Gaps and Future Work -- References -- Machine Learning Based Detection and Classification of Heart Abnormalities -- 1 Introduction -- 2 Methodology -- 2.1 Proposed Algorıthm for Detectıon and Classıfıcatıon of Abnormalıty -- 3 Results and Discussions -- 4 Conclusions -- References -- An Evaluation of Multiclass Leaf Classification Using Transfer Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Residual Network (ResNet152) -- 3.2 MobileNet -- 3.3 Inception V3 -- 3.4 DenseNet201 -- 4 Experimental Analysis and Result -- 4.1 Data -- 4.2 Implementation -- 5 Discussion -- 6 Conclusion -- References -- Scene Generated with Text Guidance (VAAB System) -- 1 Introduction -- 2 Literature Survey -- 3 Architectural Details -- 3.1 Android Application -- 3.2 Refined Novel GAN -- 4 Experimental Details -- 4.1 How to Evaluate GANs? -- 4.2 Implementation -- 4.3 Comparision with the Avant-Garde Approaches -- 5 Implementation Necessities -- 5.1 Need of POS Tagging -- 5.2 Effectiveness of Affine Combination Module -- 5.3 Effectiveness of Refined Multi-stage Architecture -- 5.4 Effectiveness of Structure Loss -- 6 Conclusion -- References -- Machine Learning Approaches for Image Quality Improvement -- 1 Introduction -- 1.1 Noise Model for Magnetic Resonance (MR) Images -- 1.2 Magnetic Resonance Imaging (MRI) -- 2 Literature Review. , 3 Results and Discussions -- 3.1 Performance Factors -- 4 Conclusion -- References -- Natural Disaster Prediction by Using Image Based Deep Learning and Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Tools and Technology for Data Collection -- 4 Proposed Predictive Model -- 5 Conclusion -- References -- A Novel Multi-objective Differential Evolution Algorithm for Clustering Data Streams -- 1 Introduction -- 2 Background -- 2.1 Data Clustering -- 2.2 Data Stream Mining Framework -- 2.3 Traditional Versus Data Stream Clustering Methods -- 3 Proposed Method: Multi-objective Based Clustering -- 3.1 Automatic Clustering by Elitism Based Multi-objective DE -- 3.2 Objective Functions Formulation -- 3.3 Population Representation and Initialization -- 3.4 Algorithm for AC-EMODE Clustering -- 4 Experimental Results -- 4.1 Datasets Used -- 4.2 Measures of Assessment -- 5 Conclusion and Future Scope -- References -- An Algorithm for Pre-processing of Areca Nut for Quality Classification -- 1 Introduction -- 2 Image Acquisition -- 3 Image Pre-processing -- 3.1 Contrast Enhancement -- 3.2 Image Filtering -- 3.3 Image Segmentation -- 3.4 Canny Edge Detection(CED) -- 3.5 Image Cropping -- 4 Results and Analysis -- 5 Conclusion -- References -- An Effect of Binarization on Handwritten Digits Recognition by Hierarchical Neural Networks -- 1 Introduction -- 2 Architecture of Convolutional Neural Network -- 3 Binarization of Images -- 3.1 Global Binarization -- 3.2 Local Binarization -- 3.3 Feature Extraction Method -- 3.4 Neural Network Performance -- 4 Hierarchical Neural Networks -- 5 Conclusion -- References -- Deep Convolutional Neural Networks (CNNs) to Detect Abnormality in Musculoskeletal Radiographs -- 1 Introduction -- 2 Related Works -- 2.1 Methodology Adopted -- 2.2 Dataset Details -- 2.3 Data Preprocessing -- 2.4 Models -- 2.5 Results. , 2.6 Conclusion and Scope of Improvement -- References -- Geospatial Object Detection for Scene Understanding Using Remote Sensing Images -- 1 Introduction -- 2 Machine Learning (ML) Based -- 3 Deep Learning (DL) Based -- 3.1 Convolution Neural Networks (CNN) -- 3.2 Transfer Learning -- 3.3 Domain Adaption -- 3.4 Metric Learning -- 4 Other Techniques -- 4.1 Object-Based Image Analysis (OBIA) -- 4.2 You Only Look Once (YOLO) -- 5 Conclusion -- References -- Antıspoofing Detection System for Online Classes and Online Meeting -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 4 Results and Discussion -- 4.1 Stage I Verification -- 4.2 Stage II Verification -- 5 Conclusion -- References -- Pre-processing Block Hardware Architecture in Image Processing Using Reconfigurable Platform -- 1 Introduction -- 2 Pre Processing Blocks in Image Processing -- 3 Pre Processing Block Hardware Architecture -- 4 Pre-procesing Block Memory -- 4.1 Write Mode -- 4.2 Read Mode -- 4.3 Additional User Choice -- 5 Experimental Evaluation Over Reconfigurable Platform -- 5.1 Convolution -- 5.2 Read and Write Mode Results -- 6 Conclusion -- References -- Deep Learning Approach to Classify Road Traffic Sign Images -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Methodology -- 4.1 Convolutional Neural Network Architecture -- 4.2 Data Augmentation -- 4.3 Batch Normalization -- 4.4 Dropout -- 5 Results -- 6 Conclusion -- 7 Future Scope -- References -- Performance Analysis of Medical Image Denoising Techniques -- 1 Introduction -- 2 Source and Corruption of Medical Image -- 2.1 Gaussian Noise -- 2.2 Speckle Noise -- 3 Noise Reduction Techniques -- 3.1 Median Filter -- 3.2 Adaptive Median Filter -- 3.3 Mean Filter -- 3.4 Fuzzy Filter -- 3.5 Wiener Filter -- 3.6 Speckle Reduction Anisotropic Diffusion Filter -- 4 Results and Discussions -- 5 Conclusion. , 6 Future Scope -- References -- Optimal Sizing and Placement of Multiple DGs in Distribution Network to Reduce Total Loss Using Cuckoo Search Optimization -- 1 Introduction -- 2 Methodology -- 3 Cuckoo Search (CS) Optımısatıon Technique -- 4 Result and Dıscussıon -- 5 Conclusion -- References -- Integrating Virtual Reality with 3D Modeling for Interactive Architectural Visualization and Photorealistic Simulation: A Direction for Future Smart Construction Design Using a Game Engine -- 1 Introduction -- 2 Background -- 2.1 Virtual Reality for Architecture -- 2.2 Unreal Engine for Architecture -- 3 Related Literature -- 4 Methodology -- 4.1 Phase I - Plan and Design -- 4.2 Phase II - Assets and Lighting -- 4.3 Phase III - Rendering -- 5 Results and Discussions -- 6 Conclusion -- References -- LBPX: A Novel Feature Extraction Method for Iris Recognition -- 1 Introduction -- 2 System Description -- 3 Literature Review -- 4 Methodology -- 5 Experimental Results -- 6 Conclusion -- References -- Multi-features Based Multi-layer Perceptron for Facial Expression Recognition System -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Multi-feature Extraction -- 3.2 Multi-layer Perceptron (MLP) Classifier -- 4 Experimental Evaluation -- 4.1 Outcomes and Discussion -- 5 Conclusion -- References -- Reducing DFT Leakage in Speech Recognition Using Pitch Segmentation -- 1 Introduction -- 2 DFT Leakage -- 2.1 Non-spectral Leakage -- 2.2 Spectral Leakage -- 3 Pitch Based Speech Segmentation -- 3.1 Short-Time Energy Waveform -- 4 Experiment -- 5 Conclusion -- References -- Musical Instrument Sound Classification Using GoogleNet with SVM and kNN Model -- 1 Introduction -- 2 Literature Review -- 3 Feature Extraction -- 3.1 Pre-trained Convolution Neural Networks -- 3.2 GoogleNet -- 4 Classifiers -- 4.1 Support Vector Machine -- 4.2 K-Nearest Neighbor. , 5 Proposed Work -- 6 Performance Measures -- 7 Experimental Results -- 7.1 Dataset -- 7.2 MISC Using GoogleNet with SVM -- 7.3 MISC Using GoogleNet with kNN -- 8 Comparative Result Analysis -- 9 Conclusion -- References -- Classification of Stages of Thyroid Nodules in Ultrasound Images Using Transfer Learning Methods -- 1 Introduction -- 2 Related Work -- 3 Image Database -- 4 Methodology -- 4.1 Convolutional Neural Network -- 4.2 Transfer Learning -- 5 Results and Outcomes -- 6 Conclusion -- References -- A Monadic and Effective Frame Work for Single Human Pose Estimation of 2D Images and Videos -- 1 Introduction -- 2 Literature Review -- 2.1 Models for Human Body Pose Estimation -- 2.2 Primary Techniques for Pose Estimation -- 2.3 Single 2D Pose Estimation -- 2.4 Deep Learning Methods for Pose Estimation -- 3 Proposed Work -- 3.1 MonadicPose Architecture -- 3.2 Algorithm for Single Pose Estimation of Image/Video -- 4 Data Sets -- 5 Experiments and Results Comparisons -- 5.1 Metrics -- 5.2 Results -- 6 Conclusion -- References -- A Review on Fruit Detection and Segmentation Techniques in Agricultural Field -- 1 Introduction -- 2 Motivation -- 3 Background -- 4 Concepts of Detection and Segmentation -- 4.1 Object Detection -- 4.2 Image Segmentation -- 5 Methodology Used for Fruit Detection and Segmentation -- 6 Results and Discussions -- 7 Conclusion -- 8 Challenges and Future Scope -- References -- A Survey on Anomaly Detection Strategies -- 1 Introduction -- 2 Overview of Anomaly Detection -- 3 Detailed Study of Anomaly Detection Techniques -- 3.1 Unsupervised Methods -- 3.2 Supervised Methods -- 3.3 Semi-supervised Methods -- 3.4 Others -- 4 Observations -- 5 Conclusion -- References -- Biometric Authentication Based Smart Bank Locker Security System -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experimental Verification. , 5 Conclusion and Future Work.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Information retrieval-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (630 pages)
    Edition: 1st ed.
    ISBN: 9789811642845
    Series Statement: Lecture Notes in Networks and Systems Series ; v.291
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Cyber Intelligence -- DTNMA: Identifying Routing Attacks in Delay-Tolerant Network -- 1 Introduction -- 2 Key Challenges of Routing Attacks -- 3 Identification of Routing Attacks -- 3.1 Packet Dropping Attack -- 3.2 Black Hole Attack -- 3.3 Worm Hole Attack -- 3.4 Gray Hole Attack -- 3.5 Jelly Fish Attack -- 3.6 Tailgating Attack -- 3.7 Packet Misrouting Attack -- 3.8 Routing Information Falsification Attack -- 3.9 Acknowledgment Falsification Attack -- 3.10 Sleep Deprivation Attack -- 3.11 Identity Impersonation Attack -- 3.12 Lack of Cooperation Attack -- 3.13 Byzantine Attack -- 3.14 Flooding Attack -- 4 Conclusion and Future Work -- References -- Security Aspects for Mutation Testing in Mobile Applications -- 1 Introduction -- 2 Mobile Applications and Testing -- 3 Mutation Testing -- 3.1 Mutation Analysis of Android Applications -- 3.2 Crashes/Bugs in Android -- 4 Mutation Operators in Android -- 4.1 Based on Bug Taxonomy -- 4.2 Fail-On-Null -- 4.3 Orientation Lock -- 4.4 Based on APP-ELEMENTS -- 5 Mutation Test Results for Sample Program -- 6 Conclusion -- References -- Classification Framework for Fraud Detection Using Hidden Markov Model -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Algorithms -- 5 Conclusion -- References -- A Review on Security Issues in Healthcare Cyber-Physical Systems -- 1 Introduction -- 2 Why Does Privacy Stand as a Major Factor in Healthcare? -- 3 MCPS and Vulnerabilities Explained -- 4 CPS in Health Care -- 4.1 Security Requirements in Case of Sensor Networks -- 5 State of Art -- 6 Possible Cyber Measures and Breaches in Healthcare -- 7 Comparative Study -- 8 Security Advancements Proposed -- 8.1 Strong Security Policies -- 8.2 Sensor Only Network -- 8.3 Future Scope -- 9 Conclusion -- References. , Analysis of the Beaufort Cipher Expansion Technique and Its Usage in Providing Data Security in Cloud -- 1 Introduction -- 1.1 Cloud Computing -- 2 Beaufort Cipher -- 2.1 Beaufort Cipher Algorithm -- 2.2 Demerits of Beaufort Cipher -- 2.3 Frequency Analysis of the Extended Beaufort Cipher Algorithm -- 3 Literature Survey -- 4 Implementation and Simulation -- 4.1 Importance of Simulation in the Cloud Environment -- 4.2 CloudSim -- 4.3 Implementation -- 5 Comparison with Other Methods -- 6 Conclusion -- References -- Distribution of Internet Banking Credentials Using Visual Cryptography and Watermarking Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Encryption -- 4.2 Decryption -- 5 Result -- 6 Conclusion -- References -- Pattern Recognition -- Virtual Keyboard Using Image Processing and Computer Vision -- 1 Introduction -- 2 Review Work -- 3 Result Analysis and Discussion -- 3.1 Masking -- 3.2 Image Feed Preprocessing -- 3.3 Threshold Binarization -- 3.4 Contour Generation -- 3.5 Finger-Pointer Detection -- 3.6 Keyboard Output and Workflow Model -- 4 Future Scope -- 5 Conclusion -- References -- Facial Expression Recognition Using Convoluted Neural Network (CNN) -- 1 Introduction -- 1.1 Background -- 2 Problem Statement -- 3 Tools and Libraries -- 4 Result Analysis and Discussion -- 5 Conclusion -- References -- Next Step to the Future of Restaurants Through Artificial Intelligence and Facial Recognition -- 1 Introduction -- 2 Literature Review -- 3 Artificial Intelligence -- 3.1 Theory of Mind -- 3.2 Reactive Machines -- 3.3 Self Awareness -- 3.4 Limited Memory -- 4 Growth of Artificial Intelligence -- 5 Applications of Artificial Intelligence -- 5.1 Application of Artificial Intelligence in Finance -- 5.2 Application of Artificial Intelligence in Banking. , 5.3 Application of Artificial Intelligence in Healthcare Services -- 5.4 Application of Artificial Intelligence in Travel -- 5.5 Artificial Intelligence in Social Media -- 5.6 Security in Artificial Intelligence -- 6 Framework for Restaurant Using Artificial Intelligence and Facial Recognition -- 6.1 Tablet Device -- 6.2 Face Recognition -- 7 Conclusion -- References -- Extensive Feature Analysis and Baseline Model for Stance Detection Task -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Vector Representation -- 3.3 Language Model Based Representations -- 3.4 Propose and Implement Alternative Features -- 3.5 Analysing Key Features -- 3.6 Train-Validate Split -- 3.7 Linear and Logistic Regression Implementation -- 3.8 Model Evaluation -- 3.9 Model Tuning and Enhancement -- 4 Results -- 4.1 Importance of Features -- 4.2 Final Baseline -- 5 Conclusion -- References -- A Comparative Study into Stock Market Prediction Through Various Sentiment Analysis Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Naïve Bayes Classifier -- 3.2 Logistic Regression -- 3.3 Support Vector Machine -- 3.4 k-Nearest Neighbor Algorithm (k-NN) -- 4 The Proposed Model -- 4.1 Data Description -- 4.2 Sentiment Analysis Component -- 4.3 Text Pre-processing -- 4.4 Abbreviation Processing -- 5 Programming Language and Simulator -- 6 Conclusion and Future Scope -- References -- The Survey on Handwritten Mathematical Expressions Recognition -- 1 Introduction -- 2 Motivation -- 3 Overview of Mathematical Symbols and Expression -- 4 Survey on Online and Offline Handwritten Mathematical Expressions -- 5 Conclusion -- References -- 13 Bangla Document Categorization Using Deep RNN Model with Attention Mechanism -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection. , 3.2 Document Classification Dataset -- 3.3 Data Preprocessing -- 3.4 Classification Model -- 4 Experimental Setup and Result Analysis -- 4.1 Result Analysis -- 4.2 Result Comparison -- 5 Conclusion -- References -- Bangla Handwritten Digit Recognition -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experimental Details -- 4.1 Data Collection -- 4.2 Dataset Preparation for Overall NumtaDB and Own Dataset -- 4.3 Dataset Preparation for Every Single Training Dataset -- 4.4 Feature Extraction and Classification Steps -- 4.5 Architecture of Model for Every Training Single Dataset -- 5 Result Analysis -- 6 Conclusion -- References -- Audio Watermarking in Linear Canonical Transform Domain Using Frequency-Dependent Clustering -- 1 Introduction -- 2 Related Work on Transform Domain Audio Watermarking -- 3 The Linear Canonical Transform: A Primer -- 3.1 Continuous Domain Transformation -- 3.2 Discrete Domain Transformation -- 4 Proposed Methodology -- 4.1 Watermark Embedding Stage -- 4.2 Watermark Detection Stage -- 5 Experimental Configuration and Simulation Parameters -- 6 Results -- 7 Conclusion -- References -- Secure Cloud Services Using Quantum-Blockchain Technology -- 1 Introduction -- 2 State-Of-The-Art -- 2.1 Research Gap -- 3 Proposed Framework -- 3.1 Significance of the Proposed Approach -- 3.2 Proposed Algorithm -- 4 Experimental Setup and Result -- 5 Conclusion -- References -- Information Retrieval -- Multi-label Classification: Detailed Analysis -- 1 Introduction -- 2 Multi-label Classification Techniques -- 3 Evaluation Metrics and Statistics -- 3.1 Bipartition Based Metrics -- 3.2 Ranking-Based Metrics -- 3.3 Label Based Metrics -- 4 Comparative Analysis of MLC Algorithms -- 5 Progress of Multi-Label Classification Techniques -- 6 Challenges -- 7 Conclusion -- References. , A Comparative Study on Sentiment Analysis Influencing Word Embedding Using SVM and KNN -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Feature Extraction -- 3.3 Classifier -- 4 Result and Analysis -- 5 Comparative Study -- 6 Conclusion -- References -- ML and GIS-Based Approaches to Flood Prediction: A Comparative Study -- 1 Introduction -- 2 Hydrological Modeling -- 3 Related Work -- 3.1 Predicting Flood Susceptibility Using Long Short-Term Memory (LSTM) Neural Network Model -- 3.2 Flood Prediction Using Support Vector Machines (SVM) -- 3.3 Artificial Neural Networks for Flood Susceptibility Mapping in Data-Scarce Urban Areas -- 3.4 Height Above the Nearest Drainage, a Hydrologically Relevant New Terrain Model -- 3.5 Flood Modeling of Mangalam River Using GIS and HEC-RAS -- 3.6 Application of ASTER DEM in Watershed Management as Flood Zonation Mapping in Koyna River of the Western Ghats -- 3.7 Terrain Analysis Enhancements to the Height Above Nearest Drainage Flood Inundation Mapping Method -- 3.8 Flood Risk Mapping Using GIS and Multi-criteria Analysis: A Greater Toronto Area Case -- 4 Analysis -- 5 The Proposed System -- 6 Conclusions -- References -- Implementation of Machine Learning in Lung Cancer Prediction and Prognosis: A Review -- 1 Introduction -- 2 Growth of Lung Cancer in Past Decade -- 3 Related Works -- 4 Comparative Analysis -- 5 Conclusion and Future Work -- References -- Fetching Information Through Crowdsourcing Within a Social Networking Site -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Problem Statement -- 5 Results and Discussion -- 6 Conclusion -- References -- Soil Nutrient Assessment and Crop Estimation with Machine Learning Method: A Survey -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Soil Fertility -- 3.2 Machine Learning Algorithm -- 4 Results -- 5 Discussion. , 6 Conclusion.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer vision ; Biomedical Engineering/Biotechnology ; Biomedical engineering ; Optical data processing. ; Signal processing. ; Image processing. ; Speech processing systems.
    Description / Table of Contents: Colonic Polyp Identification Using Pareto Depth Anomaly Detection Algorithm -- Comparative Study of Dermoscopic Hair Removal Methods -- Lower Limb Joint Angle Coordination Assessment at Sagittal Plane on Human Vertical Countermovement -- Biometric Identification Based on Forearm Vein Pattern -- Cross Recurrence Quantitative Analysis of Functional Magnetic Resonance Imaging -- Automatic Segmentation and Delineation of Intervertebral Discs on Lumbar Spine MR Images -- A Hybrid Approach For Breast Mass Categorization -- Skin Disease Diagnosis from Photographs Using Deep Learning -- Prediction of the Child’s Head Growth in the First Year of Life -- Influence of Mutual Rotation of Polarizing Filters on Light Intensity Measured With Collagen Fibres -- Automatic Extraction of Marbling Measures Using Image Analysis, for Evaluation of Beef Quality -- Layer Thickness Evaluation Between Medical Imaging and Additive Manufacturing
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (XXII, 706 p. 390 illus., 290 illus. in color)
    Edition: 1st ed. 2019
    ISBN: 9783030320409
    Series Statement: Lecture Notes in Computational Vision and Biomechanics 34
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computer vision ; Radiology, Medical ; Computer science ; Biomedical Engineering/Biotechnology ; Biomedical engineering ; Computer simulation ; Optical data processing. ; Radiology. ; Computer mathematics. ; Biomechanical Phenomena ; Biomedical Engineering ; Image Processing, Computer-Assisted ; Congress
    Description / Table of Contents: Chapter 1. The impact of patches on blood flow disorders in carotid artery -- Chapter 2. Numerical study of carotid bifurcation angle effect on blood flow disorders -- Chapter 3. Evaluating the effect of tissue anisotropy on brain tumor growth using a mechanically-coupled reaction-diffusion model -- Chapter 4. Prediction of stress and strain patterns from load rearrangement in human osteoarthritic femur head: finite element study with the integration of muscular forces and friction contact -- Chapter 5. Numerical simulation of the deployment process of a new stent produced by ultrasonic-microcasting: the role of the balloon’s constitutive modeling -- Chapter 6. New techniques for combined FEM-multibody anatomical simulation -- Chapter 7. Computational cell-based modelling and visualization of cancer development and progression -- Chapter 8. Estimation of 6 degree of freedom accelerations from head impact telemetry system outputs for computational modeling -- Chapter 9. Physiological Cybernetics: methods and applications -- Chapter 10. New computational solution to compute the uptake index from 99mTc-MDP bone scintigraphy images
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (X, 160 p. 98 illus., 88 illus. in color)
    Edition: 1st ed. 2019
    ISBN: 9783030230739
    Series Statement: Lecture Notes in Computational Vision and Biomechanics 999
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Image processing -- Data processing -- Congresses. ; Electronic books.
    Description / Table of Contents: Addressing different techniques such as optimization methods, geometry, finite element method, principal component analysis, stochastic methods, neural networks and fuzzy logic, this book is useful to researchers and students with multidisciplinary interests related to Computational Vision, Computational Mechanics, Medicine, Engineering and Architecture.
    Type of Medium: Online Resource
    Pages: 1 online resource (493 pages)
    Edition: 1st ed.
    ISBN: 9780203075371
    Language: English
    Note: Front Cover -- Computational Modelling of Objects Represented in Images: Fundamentals, Methods and Applications III -- Copyright -- Table of Contents -- Preface -- Acknowledgements -- Invited lectures -- Thematic sessions -- Scientific committee -- 3D modelling to support dental surgery -- Detection system from the driver's hands based on Address Event Representation (AER) -- Quantitative analysis on PCA-based statistical 3D face shape modeling -- Ordinary video events detection -- Sclera segmentation for gaze estimation and iris localization in unconstrained images -- Morphing billboards for accurate reproduction of shape and shading of articulated objects with an application to real-time hand tracking -- Independent multimodal background subtraction -- Perception and decision systems for autonomous UAV flight -- Flow measurement in open channels based in digital image processingto debris flow study -- Incorporating global information in active contour models -- Hexagonal parallel thinning algorithms based on sufficient conditions for topology preservation -- Evolving concepts using gene duplication -- FPGA implementation of OpenCV compatible background identification circuit -- Fourier optics approach in evaluation of the diffraction and defocus aberration in three-dimensional integral imaging -- Intensity and affine invariant statistic-based image matching -- Recognition of shock-wave patterns from shock-capturing solutions -- Fast orientation invariant template matching using centre-of-gravity information -- Evaluation of the Menzies method potential for automatic dermoscopic image analysis -- Application of UTHSCSA-Image ToolTM to estimate concrete texture -- Texture image segmentation with smooth gradients and local information -- Unsupervised self-organizing texture descriptor. , Automatic visual attributes extraction from web offers images -- Segmenting active regions on solar EUV images -- Automated Shape Analysis landmarks detection for medical image processing -- Bayesian depth map interpolation using edge driven Markov Random Fields -- Man-made objects delineation on high-resolution satellite images -- A hybrid approach to clouds and shadows removal in satellite images -- Wishart classification comparison between compact and quad-polarimetric SAR imagery using RADARSAT2 data -- Land cover differentiation using digital image processing of Landsat-7 ETM+ samples -- Comparing land cover maps obtained from remote sensing for deriving urban indicators -- Extraction of buildings in heterogeneous urban areas: Testing the value of increased spectral information of WorldView-2 imagery -- An energy minimization reconstruction algorithm for multivalued discrete tomography -- Functional near-infrared frontal cortex imaging for virtual reality neuro-rehabilitation assessment -- Mandibular nerve canal identification for preoperative planning in oral implantology -- Biomedical image interpolation based on multi-resolution transformations -- A spectral and radial basis function hybrid method for visualizing vascular flows -- Identification of models of brain glucose metabolism from 18F - Deoxyglucose PET images -- Dynamic lung modeling and tumor tracking using deformable image registration and geometric smoothing -- Motion and deformation estimation from medical imagery by modeling sub-structure interaction and constraints -- Automated and semi-automated procedures in the assessment of Coronary Arterial Disease by Computed Tomography -- Image-analysis tools in the study of morphofunctional features of neurons -- GPU computing for patient-specific model of pulmonary airflow. , Bone volume measurement of human femur head specimens by modeling the histograms of micro-CT images -- Stress and strain patterns in normal and osteoarthritic femur using finite element analysis -- A new index of cluster validity for medical images application -- Knowledge sharing in biomedical imaging using a grid computing approach -- Modeling anisotropic material property of cerebral aneurysms for fluid-structure interaction computational simulation -- Analysis of left ventricle echocardiographic movies by variational methods: Dedicated software for cardiac ECG and ECHO synchronizations -- A survey of echographic simulators -- Hip prostheses computational modeling: Mechanical behavior of a femoral stem associated with different constraint materials and configurations -- Histogram based threshold segmentation of the human femur body for patient specific acquired CT scan images -- A hybrid sampling strategy for Sparse Magnetic Resonance Imaging -- Two efficient primal-dual algorithms for MRI Rician denoising -- Graph based MRI analysis for evaluating the prognostic relevance of longitudinal brain atrophy estimation in post-traumatic diffuse axonal injury -- Hemispheric dominance evaluation by using fMRI activation weighted vector -- An automatic unsupervised fuzzy method for image segmentation -- Machining process simulation -- A least square estimator for spin-spin relaxation time in Magnetic Resonance imaging -- Numerical modelling of the abdominal wall using MRI. Application to hernia surgery -- A splitting algorithm for MR image reconstruction from sparse sampling -- A look inside the future perspectives of the digital cytology -- Radial Basis Functions for the interpolation of hemodynamics flow pattern: A quantitative analysis -- A software for analysing erythrocytes images under flow. , Flow patterns in aortic circulation following Mustard procedure -- A new workflow for patient specific image-based hemodynamics: Parametric study of the carotid bifurcation -- Radial Basis Functions for the image analysis of deformations -- Movement analysis based on virtual reality and 3D depth sensing camera for whole body rehabilitation -- People detection and tracking using depth camera -- Selected pre-processing methods to STIM-T projections -- Affine invariant descriptors for 3D reconstruction of small archaeological objects -- Establishment of the mechanical properties of aluminium alloy of sandwich plates with metal foam core by using an image correlation procedure -- Morphological characterisation of cellular materials by image analysis -- Computational modelling and 3D reconstruction of highly porous plastic foams' spatial structure -- Circularity analysis of nano-scale structures in porous silicon images -- Determination of geometrical properties of surfaces with grids virtually applied to digital images -- On the use of a differential method to analyze the displacement field by means of digital images -- Image processing approach in Zn-Ti-Fe kinetic phase evaluation -- Quantitative characterization of ferritic ductile iron damaging micromechanisms: Fatigue loadings -- Interpretative 3D digital models in architectural surveying of historical buildings -- Digital integrated models for the restoration and monitoring of the cultural heritage: The 3D Architectural Information System of the Church of Santa Maria del Carmine in Penne (Pescara, Italy) -- Cosmatesque pavement of Montecassino Abbey. History through geometric analysis -- Laser scanner surveys vs low-cost surveys. A methodological comparison -- From survey to representation. Operation guidelines -- Images for analyzing the architectural heritage. Life drawings of the city of Venice. , Back cover.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computer vision-Congresses. ; Natural computation-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (819 pages)
    Edition: 1st ed.
    ISBN: 9789811998195
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1439
    DDC: 006.37
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Medical informatics. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (401 pages)
    Edition: 1st ed.
    ISBN: 9783030008895
    Series Statement: Lecture Notes in Computer Science Series ; v.11045
    DDC: 610.285
    Language: English
    Note: Intro -- Additional Workshop Editors -- DLMIA 2018 Preface -- ML-CDS 2018 Preface -- Organization -- Contents -- 4th International Workshop on Deep Learning in Medical Image Analysis, DLMIA 2018 -- UNet++: A Nested U-Net Architecture for Medical Image Segmentation -- 1 Introduction -- 2 Related Work -- 3 Proposed Network Architecture: UNet++ -- 3.1 Re-designed Skip Pathways -- 3.2 Deep Supervision -- 4 Experiments -- 5 Conclusion -- References -- Deep Semi-supervised Segmentation with Weight-Averaged Consistency Targets -- 1 Introduction -- 2 Semi-supervised Segmentation Using Mean Teacher -- 2.1 Segmentation Data Augmentation -- 3 Experiments -- 3.1 MRI Spinal Cord Gray Matter Segmentation -- 4 Related Work -- 5 Conclusion -- References -- Handling Missing Annotations for Semantic Segmentation with Deep ConvNets -- 1 Introduction -- 2 SMILE Model -- 2.1 Handling Missing Annotations -- 2.2 Incremental Self-supervision and Relabeling -- 3 Experiments and Results -- 4 Conclusions -- References -- A Unified Framework Integrating Recurrent Fully-Convolutional Networks and Optical Flow for Segmentation of the Left Ventricle in Echocardiography Data -- 1 Introduction -- 2 Materials and Method -- 2.1 Dataset Information and Clinical Background -- 2.2 Network Architecture -- 3 Experiments -- 4 Conclusion and Discussion -- References -- Multi-scale Residual Network with Two Channels of Raw CT Image and Its Differential Excitation Component for Emphysema Classification -- Abstract -- 1 Introduction -- 2 Methods -- 2.1 Differential Excitation Component -- 2.2 MS-ResNet with Raw and Excitation Channels -- 3 Experimental Results -- 3.1 Materials -- 3.2 Evaluation of Classification Accuracy -- 3.3 Emphysema Quantification -- 4 Conclusions -- Acknowledgements -- References. , TreeNet: Multi-loss Deep Learning Network to Predict Branch Direction for Extracting 3D Anatomical Trees -- 1 Introduction -- 2 Methodology -- 3 Evaluation -- 4 Conclusion and Future Work -- References -- 3D Deep Affine-Invariant Shape Learning for Brain MR Image Segmentation -- 1 Introduction -- 2 Related Work -- 2.1 Medical Image Segmentation -- 2.2 The Utilization of Shape Information in Segmentation -- 3 Methodology -- 3.1 Overview -- 3.2 Shape-Learning Network -- 3.3 Shape-Guided Segmentation Network -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Training the Shape-Learning Network -- 4.3 Training the Segmentation Network -- 5 Conclusion -- References -- Automatic Detection of Patients with a High Risk of Systolic Cardiac Failure in Echocardiography -- 1 Introduction -- 2 Material -- 3 Methods -- 4 Results -- 5 Discussion and Conclusion -- References -- MTMR-Net: Multi-task Deep Learning with Margin Ranking Loss for Lung Nodule Analysis -- 1 Introduction -- 2 Method -- 2.1 Multi-task Learning for Lung Nodule Analysis -- 2.2 Margin Ranking Loss for Discriminating Marginal Nodules -- 2.3 Joint Training of MTMR-Net -- 3 Experiments -- 3.1 Dataset and Preprocessing -- 3.2 Results and Evaluation Comparison -- 4 Conclusion -- References -- Active Deep Learning with Fisher Information for Patch-Wise Semantic Segmentation -- 1 Introduction -- 2 Methods -- 2.1 FI-Based AL -- 2.2 Diversified FI-Based AL -- 3 Experimental Results -- 3.1 Active Semi-automatic Segmentation -- 3.2 Universal Active Learning -- 4 Conclusion -- References -- Contextual Additive Networks to Efficiently Boost 3D Image Segmentations -- 1 Introduction -- 2 Methods -- 2.1 Contextual Additive Networks -- 2.2 Why an Additive Network is Beneficial -- 2.3 3D Fully Convolution Networks -- 3 Experiments -- 3.1 Dataset and Preprocessing -- 3.2 Implementation Details. , 4 Results and Discussion -- 5 Conclusion -- References -- Unsupervised Probabilistic Deformation Modeling for Robust Diffeomorphic Registration -- 1 Introduction -- 2 Methods -- 3 Experiments -- 4 Conclusion -- References -- Rapid Training Data Generation for Tissue Segmentation Using Global Approximate Block-Matching with Self-organizing Maps -- 1 Introduction -- 2 Methods -- 2.1 The ``Global Approximate Block Matching'' Method -- 2.2 Singular Value Calculation -- 2.3 Expectation Maximization -- 2.4 Atlas and Performance Metric -- 3 Results -- 4 Discussion -- References -- Focal Dice Loss and Image Dilation for Brain Tumor Segmentation -- 1 Introduction -- 2 Methodology -- 2.1 Focal Dice Loss for Highly Unbalanced Data -- 2.2 Dilation for Coarse-to-Fine Learning -- 3 Evaluation -- 3.1 Results on the Focal Dice Loss -- 3.2 Results on Dilation -- 4 Conclusion -- References -- Deep Particle Tracker: Automatic Tracking of Particles in Fluorescence Microscopy Images Using Deep Learning -- 1 Introduction -- 2 Methods -- 2.1 Network Architecture -- 2.2 Training -- 3 Experimental Results -- 3.1 Particle Tracking Challenge Data -- 3.2 Real Fluorescence Microscopy Images of Virus Structures -- 4 Conclusion -- References -- 3D Convolutional Neural Networks for Classification of Functional Connectomes -- 1 Introduction -- 2 Materials and Methods -- 2.1 Proposed 3D CNN Approach -- 2.2 Baseline Methods -- 2.3 Experiments -- 3 Results -- 3.1 Visualization of CNN Model -- 4 Discussion -- 5 Conclusion -- References -- Segmentation of Head and Neck Organs-At-Risk in Longitudinal CT Scans Combining Deformable Registrations and Convolutional Neural Networks -- 1 Introduction -- 2 Methods -- 2.1 Available Data and Preprocessing -- 2.2 Deformable Image Registration -- 2.3 Neural Network Architecture -- 2.4 Neural Network Training -- 2.5 Postprocessing. , 3 Results and Discussion -- 4 Conclusion -- References -- Unpaired Deep Cross-Modality Synthesis with Fast Training -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Loss Design -- 2.2 Architecture of the Generator/Discriminator -- 3 Experimental Results -- 3.1 Datasets and Tasks -- 3.2 Implementation Details -- 3.3 Quantitative and Visual Comparisons -- 4 Conclusion -- Acknowledgement -- References -- UOLO - Automatic Object Detection and Segmentation in Biomedical Images -- 1 Introduction -- 2 UOLO Framework -- 2.1 Object Segmentation Module -- 2.2 Object Detection Module -- 2.3 UOLO for Joint Object Detection and Segmentation -- 3 Experiments and Results -- 3.1 Datasets and Experimental Details -- 3.2 Results and Discussion -- 4 Conclusions -- References -- Unpaired Brain MR-to-CT Synthesis Using a Structure-Constrained CycleGAN -- 1 Introduction -- 2 Method -- 2.1 Adversarial Loss -- 2.2 Cycle-Consistency Loss -- 2.3 Structure-Consistency Loss -- 2.4 Training Loss -- 2.5 Network Structure -- 2.6 Position-Based Selection Strategy -- 3 Experiments -- 3.1 Data Set -- 3.2 Experimental Results -- 4 Conclusion -- References -- Active Learning for Segmentation by Optimizing Content Information for Maximal Entropy -- 1 Introduction -- 2 Estimating Surrogate Metrics for Representativeness -- 3 Sample Selection Strategy -- 4 Experiments and Results -- 5 Discussions and Conclusions -- References -- Weakly Supervised Localisation for Fetal Ultrasound Images -- 1 Introduction -- 2 Data -- 3 Methods -- 4 Experiments and Results -- 5 Discussions -- 6 Conclusion -- References -- PIMMS: Permutation Invariant Multi-modal Segmentation -- 1 Introduction -- 2 Methods -- 3 Experiments and Results -- 4 Discussion -- 5 Conclusion -- References. , Unsupervised Feature Learning for Outlier Detection with Stacked Convolutional Autoencoders, Siamese Networks and Wasserstein Autoencoders: Application to Epilepsy Detection -- 1 Introduction -- 2 Method -- 2.1 Unsupervised Feature Extraction with Autoencoders -- 2.2 Voxel-Level Outlier Detection with Oc-SVM Classifiers -- 3 Experiments and Results -- 3.1 Dataset Description and Pre-processing -- 3.2 Feature Extraction with sCAE, rSN and WAE -- 3.3 oc-SVM Classifier Design -- 3.4 Results and Discussion -- References -- Semi-automated Extraction of Crohns Disease MR Imaging Markers Using a 3D Residual CNN with Distance Prior -- 1 Introduction -- 2 Method -- 2.1 Efficient Semi-automated Software for Generating Labeled Training Data for Pediatric Crohn's Disease -- 2.2 Segmentation of the Bowel Lumen and Wall Using a 3D Residual CNN with Distance Prior -- 3 Experiments and Results -- 4 Discussion and Conclusions -- References -- Learning Optimal Deep Projection of 18F-FDG PET Imaging for Early Differential Diagnosis of Parkinsonian Syndromes -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Preparation and Preprocessing -- 2.2 DPNN Architecture -- 2.3 Training Procedure -- 3 Experiments and Results -- 4 Conclusion -- References -- Learning to Segment Medical Images with Scribble-Supervision Alone -- 1 Introduction -- 2 Methods -- 2.1 Generation of Seed Areas by Region Growing -- 2.2 Separate CRF and Network Training -- 2.3 Integrated Network Training and (CRF-RNN) -- 2.4 Quantifying Segmentation Uncertainty -- 3 Experiments and Results -- 4 Conclusion -- References -- Learning to Decode 7T-Like MR Image Reconstruction from 3T MR Images -- 1 Introduction -- 2 Proposed Approach -- 2.1 One Encoder with Multiple Decoders -- 2.2 Updating the Weights -- 2.3 Merge Connections -- 2.4 Proposed Architecture -- 3 Experimental Results. , 3.1 Experimental Setup.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Image processing-Digital techniques. ; Image processing-Digital techniques-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (855 pages)
    Edition: 1st ed.
    ISBN: 9783031124136
    Series Statement: Lecture Notes in Networks and Systems Series ; v.514
    DDC: 621.367
    Language: English
    Note: Intro -- Preface -- Contents -- Brain-Inspired Spatiotemporal Feature Extraction Using Convolutional Legendre Memory Unit -- 1 Introduction -- 1.1 Neuromorphic Computing -- 2 Related Works -- 3 Proposed Convolutional LMU Model -- 4 Synthetic Dataset and Evaluation Measures -- 5 Results and Analysis -- 6 Conclusion -- References -- Underwater Image Enhancement Using Image Processing -- 1 Introduction -- 1.1 Problem Statement -- 2 Literature Survey -- 3 Methodology -- 4 Architecture -- 5 Conclusion -- References -- Fake News Detection on Indian Sources -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution -- 3.1 Dataset -- 3.2 Data Cleaning -- 3.3 Data Analysis -- 3.4 Text Preprocessing and Text Transformation -- 3.5 Model -- 3.6 Testing -- 4 Results -- 5 Use Cases -- 6 Future Works -- 7 Conclusion -- References -- Exploring Self-supervised Capsule Networks for Improved Classification with Data Scarcity -- 1 Introduction -- 2 Related Work -- 2.1 Functionality of Capsule Networks -- 2.2 Self-supervision and Capsule Networks -- 2.3 Pretrained Capsule Networks -- 3 Methods -- 3.1 Data Set -- 3.2 Capsule Network Model -- 3.3 Self-supervision -- 4 Results and Discussion -- 4.1 Data Scarcity -- 4.2 Learning Behaviour of the Self-supervised CapsNet -- 4.3 Data Scarcity and Imbalance -- 4.4 Correlation of Pretext and Downstream Accuracy -- 5 Conclusion -- References -- A Novel Architecture for Improving Tuberculosis Detection from Microscopic Sputum Smear Images -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Mask Generation Using SegZNet Architecture -- 3.3 Data Augmentation -- 3.4 UNet Segmentation -- 4 Result and Discussion -- 5 Conclusion -- References -- TapasQA - Question Answering on Statistical Plots Using Google TAPAS -- 1 Purpose -- 2 Previous Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Pipeline. , 4 Major Research Findings -- 4.1 Questions Handled by Our Model -- 4.2 Training Details -- 4.3 Evaluation Metric -- 5 Result Implications -- 5.1 Plot Element Detection Stage -- 5.2 Table Question Answering (QA) Stage -- 6 End-To-End Example -- 7 Value and Limitations -- 8 Conclusion and Future Work -- References -- Face Sketch-Photo Synthesis and Recognition -- 1 Introduction -- 2 Related Work -- 3 Research Gap -- 4 Data -- 4.1 CUFS Dataset -- 4.2 CelebA Dataset -- 4.3 ORL Dataset -- 5 Tools and Experimental Settings -- 6 Proposed Methodology -- 6.1 Face-Sketch Synthesis -- 6.2 Face-Photo Synthesis -- 6.3 Facial Recognition -- 7 Results -- 7.1 Face-Sketch Synthesis -- 7.2 Face-Photo Synthesis -- 7.3 Facial Recognition -- 8 Evaluation -- 8.1 Face-Sketch Synthesis -- 8.2 Face-Photo Synthesis -- 8.3 Facial Recognition -- 9 Conclusion -- 10 Future Work -- References -- Toward Robust Image Pre-processing Steps for Vehicle Plate Recognition -- 1 Introduction -- 2 The Proposed Deskew Approach -- 3 Performance Evaluation -- 4 Conclusion -- References -- Multi-focus Image Fusion Using Morphological Toggle-Gradient and Guided Filter -- 1 Introduction -- 2 Preliminaries -- 2.1 Toggle Contrast Operator -- 2.2 Spatial Frequency -- 2.3 Guided Filter -- 3 Proposed Method -- 3.1 Morphological Toggle-Gradient Based Focus Measure -- 3.2 Composite Focusing Criterion (CFC) and Initial Decision Map -- 3.3 Final Decision Map and Fusion -- 4 Experimental Results and Discussion -- 4.1 Execution Setup -- 4.2 Subjective Evaluation -- 4.3 Fusion on Synthetic Source Pairs -- 5 Conclusion -- References -- Security Enhancement of Fog Nodes in IoT Networks Using the IBF Scheme -- 1 Introduction -- 2 Related Works -- 3 IBE Based Fog Computing -- 3.1 Identity Based Encryption Using BF Scheme -- 4 Results and Discussion -- 5 Conclusion -- References. , Automatic Recognition of Plant Leaf Diseases Using Deep Learning (Multilayer CNN) and Image Processing -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Flowchart of the Methodology -- 3.2 Training the Model -- 4 Result and Discussion -- 4.1 Statistical Analysis -- 4.2 Accuracy Graph -- 4.3 Confusion Matrix -- 4.4 Comparison of Result with Other Models -- 5 Conclusion -- References -- Comparative Analysis of Feature and Intensity Based Image Registration Algorithms in Variable Agricultural Scenarios -- 1 Introduction -- 2 Literature Review -- 2.1 Overview of Feature-Based Image Registration Algorithms -- 2.2 Overview of Intensity-Based Image Registration Algorithms -- 3 Experiments and Results -- 3.1 Experimental Setup -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- 6 Supplementary Material -- References -- Non-invasive Diagnosis of Diabetes Using Chaotic Features and Genetic Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Extraction of Chaotic Geometry Features -- 3.2 Genetic Learning -- 4 Experimental Evaluation -- 5 Conclusion -- References -- Analytic for Cricket Match Winner Prediction Through Major Events Quantification -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Modeling Instantaneous Strength -- 3.2 Modeling Real Time Efficency (RTE) -- 3.3 Parameter Modeling (BSP) -- 3.4 Parameter Modeling (EBS) -- 4 Experimental Analysis -- 5 Conclusion -- References -- An Investigation of COVID-19 Diagnosis and Severity Detection Using Convolutional Neural Networks -- 1 Introduction -- 2 Convolutional Neural Networks - An Overview -- 3 Literature Survey -- 4 Numerical Comparison Analysis and Discussions -- 5 Conclusion -- References -- An Efficient Key Frame Extraction from Surveillance Videos for Real-World Anomaly Detection -- 1 Introduction -- 2 Related Works. , 3 Proposed Work -- 4 Results and Discussion -- 5 Conclusion -- References -- The XGBoost Model for Network Intrusion Detection Boosted by Enhanced Sine Cosine Algorithm -- 1 Introduction -- 2 Preliminaries and Related Work -- 2.1 XGBoost Model -- 2.2 Swarm Intelligence -- 3 Proposed Method -- 3.1 The Original Sine-Cosine Algorithm (SCA) -- 3.2 The Enhanced Sine-Cosine Algorithm (ESCA) -- 3.3 Proposed eSCA-XGBoost Model -- 4 Experiments and Comparative Analysis -- 5 Conclusion -- References -- Developing a Tool to Classify Lethal Weapons by Analyzing Images -- 1 Introduction -- 2 Related Work -- 3 System Architecture and Design -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 VGG16 Model Implementation -- 3.4 Customized Model Implementation -- 4 Implementation and Experimental Result -- 4.1 Experimental Setup -- 4.2 Implementation -- 4.3 Performance Evaluation -- 4.4 Comparison with Other Existing Frameworks -- 5 Conclusion -- References -- Selfie2Business - An Application to Identify Objects and Recommend Relevant Service Providers -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 3.1 Data Pre-processing -- 4 Methodology -- 4.1 Selfie Detector -- 4.2 Object Detector -- 4.3 Search Query Listing -- 5 Results -- 5.1 Selfie Detection -- 5.2 Object Detection -- 6 Discussion -- 7 Conclusions and Future Work -- References -- A Systematic and Novel Ensemble Construction Method for Handling Data Stream Challenges -- 1 Introduction -- 1.1 Methods for Producing Data Streams -- 1.2 Major Issues Related to Data Streams Handling -- 1.3 Types of Data Drifts -- 2 Methods to Handle Data Stream Issues -- 2.1 Preprosessing of Data Stream -- 2.2 Dealing with Data Drifts: Drift Handling Methods -- 2.3 Ensemble Designed -- 3 Proposed Method -- 4 Result Analysis -- 4.1 Experimental Setup -- 4.2 Results Discussion -- 5 Conclusion and Future Research Work. , References -- Survey on Various Performance Metrices for Lightweight Encryption Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Performance Metrices for Lightweight Encryption Algorithms -- 3.1 Hardware Performance Metrices -- 3.2 Software Performance Metrices -- 4 Conclusion -- References -- A Hybrid Approach to Facial Recognition for Online Shopping Using PCA and Haar Cascade -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Implementation -- 4.1 Admin -- 4.2 User -- 4.3 Cart -- 4.4 Input Design -- 4.5 Output Design -- 5 Experimental Results -- 6 Conclusion -- References -- Analysis of IoT Cloud Security Computerization Technology Based on Artificial Intelligence -- 1 Introduction -- 2 Mobile Robot Path Planning Method -- 2.1 Global Strategy for Path Planning -- 2.2 Artificial Intelligence Robot's Environments -- 3 IoT-Based Systems Security Model -- 4 A Machine Learning-Based Survey on IoT Security -- 5 IoT-Cloud Security Issues -- 6 Challenges in the IoT Cloud -- 7 IoT, AI, and Software Intelligence in the Smart Home -- 8 IoT, AI, and Software Intelligence in the Smart Home -- 9 Network Protection -- 10 Network Security Stored Difficulty in Understanding Investigation System Software Installation Core Tech -- 10.1 Software Development -- 10.2 Hardware Development -- 11 Conclusion -- References -- Artificial Intelligence Based Real Time Packet Analysing to Detect DOS Attacks -- 1 Introduction -- 2 Literature Survey -- 3 Implementation -- 3.1 Experimental Setup -- 3.2 Data Pre-processing -- 3.3 Dataset -- 3.4 Feature Extraction -- 3.5 Model Creation, Training and Testing -- 4 Results and Discussion -- 5 Conclusion -- References -- Decision Trees and Gender Stereotypes in University Academic Desertion -- 1 Introduction -- 2 State of the Art -- 2.1 Gender Stereotype -- 2.2 Regarding Desertion -- 2.3 Predictive Models. , 3 Methodology.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Natural computation. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (877 pages)
    Edition: 1st ed.
    ISBN: 9789811695735
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1420
    DDC: 006.37
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Molecular Docking Analysis of Selected Phytochemicals for the Treatment of Proteus Syndrome -- 1 Introduction -- 2 Methods and Materials -- 3 Results and Discussion -- 4 Conclusion and Future Prospects -- References -- A Deep Learning-Based Detection of Wrinkles on Skin -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Computer Vision -- 3.2 Convolution Neural Network (CNN) -- 3.3 Hough Trnaformer -- 4 Experimental Results -- 5 Conclusion -- References -- Image Transmission Using Leach and Security Using RSA in Wireless Sensor Networks -- 1 Introduction -- 2 Literature Survey -- 3 Leach with RSA: Proposed Scheme -- 4 Simulation Results -- 5 Conclusion -- References -- Code Injection Prevention in Content Management Systems Using Machine Learning -- 1 Introduction -- 2 Background and Related Work -- 3 Our Work -- 3.1 Data Gathering -- 3.2 Data Analysis and Feature Extraction -- 3.3 Dataset -- 3.4 Feature Selection -- 3.5 Machine Learning Using Logistic Regression Algorithm -- 4 Results -- 4.1 Model Interpretation -- 5 Conclusion -- References -- A Review of Hyperspectral Image Classification with Various Segmentation Approaches Based on Labelled Samples -- 1 Introduction -- 1.1 Organization of the Paper -- 2 Datasets and Metrics Used for Hyperspectral Image Classification -- 3 Literature Survey -- 3.1 Machine Learning Techniques -- 3.2 Neural Network Techniques -- 3.3 Analysis Dependent on Various Parameters -- 4 Discussion -- 5 Future Technologies -- 6 Conclusion -- References -- Improvements in User Targeted Offline Advertising Using CNN and Deviation-Based Queue Scheduling -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Overview -- 3.2 Convolutional Neural Network -- 3.3 Deviation-Based Queue Generation -- 4 Results and Discussion. , 5 Performance Comparison -- 5.1 Overlapping Target Audience Problem -- 5.2 Comparison of TARP 2.0 with Random Display and Display Using TARP -- 5.3 Delay Time Comparison of TARP 2.0 with TARP -- 6 Conclusion -- References -- Movie Recommendation System Using Hybrid Collaborative Filtering Model -- 1 Introduction -- 1.1 Literature Survey -- 2 Need and Applicability -- 2.1 Need -- 2.2 Applicability -- 3 Proposed Approach -- 3.1 Dataset Preparation -- 3.2 Dataset Description -- 3.3 Modeling -- 4 Results -- 5 Conclusion -- References -- Hybrid Pipeline Infinity Laplacian Plus Convolutional Stage Applied to Depth Completion -- 1 Introduction -- 1.1 Related Works -- 2 Method -- 2.1 Used Metric -- 2.2 Proposed Metric -- 3 Practical Model Implementation -- 3.1 Convolutional Stage -- 3.2 Convolutional Stage for the Completed Depth Map -- 4 Parameters Estimation -- 4.1 Learning Curve for the Complete Pipeline -- 4.2 Learning Curve for Median-Pipeline -- 4.3 Learning Curve Convolutional Stage-Median-Pipeline Simplified Metric -- 4.4 Learning Curve SC1-Median-Pipeline with Simple Metric -- 5 Experiments and Dataset -- 5.1 Dataset -- 5.2 Experiments -- 6 Results -- 7 Discussion -- 8 Conclusions -- References -- A Novel Approach of DEMOO with SLA Algorithm to Predict Protein Interactions -- 1 Introduction -- 2 Methodology -- 2.1 Feature Extraction -- 2.2 Label Propagation Algorithm -- 2.3 Incremental Depth Extension (INDEX) Approach -- 2.4 Formation of a PPI Network -- 2.5 Neighborhood Topology with Protein Interaction Prediction -- 2.6 Functional Characteristics of Protein Interaction Prediction -- 2.7 Predicting PPIs Using ASA -- 2.8 Differential Evolution Algorithm for Multi-objective Optimization -- 2.9 Stochastic Learning Automata (SLA) -- 3 Results and Discussion -- 3.1 Performance Measures. , 3.2 Performance Comparison of Existing and Proposed Methods for DIP and SCOP Datasets -- 4 Conclusion -- References -- Economic Load Dispatch Problem with Valve-Point Loading Effect Using DNLP Optimization Using GAMS -- 1 Introduction -- 2 Economic Load Dispatch Mathematical Model -- 2.1 Constraints -- 2.2 Procedure -- 2.3 Contributions of Proposed Method -- 3 Results -- 4 Conclusions -- References -- Solar Radio Spectrum Classification Based on ConvLSTM -- 1 Introduction -- 2 Solar Radio Spectrum Dataset -- 2.1 The Introduction of SBRS Dataset -- 2.2 Dataset Extension -- 3 Pre-processing of Solar Radio Spectrums -- 3.1 Channel Normalization -- 3.2 Down-Sampling -- 4 Solar Radio Spectrum Classification Model Based on ConvLSTM -- 5 Experiment Results and Analysis -- 6 Conclusion -- References -- Particle Swarm Optimization-Based Neural Network for Wireless Heterogeneous Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusion -- References -- Impact Analysis of COVID-19 on Various Indian Sectors -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Dataset -- 5 Screen time Analysis -- 5.1 Hypothesis Testing -- 6 Industrial Analysis -- 6.1 Information Technology -- 6.2 Fast-moving Consumer Goods (FMCG) -- 6.3 Hospitality -- 6.4 Aviation -- 7 Conclusion -- References -- Emotion Recognition in Speech Using MFCC and Classifiers -- 1 Introduction -- 2 Lıterature Revıew -- 3 Methodology -- 3.1 Emotions -- 3.2 Data -- 3.3 Dataset -- 3.4 Feature Extraction -- 3.5 Mel-frequency Cepstral Coefficient -- 4 Results -- 5 Conclusion -- References -- A Comparative Analysis on Image Caption Generator Using Deep Learning Architecture-ResNet and VGG16 -- 1 Introduction -- 2 Related Works -- 3 Comparison of Image Generator Using ResNet-50 and VGG16 -- 3.1 Image Preprocessing -- 3.2 Image Feature Extraction. , 4 Text Feature Understanding Using LSTM -- 5 Results and Discussion -- 6 Conclusion -- References -- Corona Warrior Smart Band -- 1 Introduction -- 2 Literature Survey -- 3 Block Diagram and Working Principle -- 4 Implementation Platform -- 5 Results -- 6 Conclusion -- References -- Cellular Learning Automata: Review and Future Trend -- 1 Introduction -- 2 Cellular Automata (CA) -- 3 Learning Automata (LA) and Reinforcement Learning (RL) -- 4 Cellular Learning Automata (CLA) -- 5 Wireless Sensor and Actuator Networks (WSAN) -- 6 Future Trends -- 7 Conclusion -- References -- Computer Vision and Machine Learning-Based Techniques for Detecting the Safety Violations of COVID-19 Scenarios: A Review -- 1 Introduction -- 2 Related Work -- 2.1 Survey on Face Mask Detection -- 2.2 Survey on Social Distancing Detection -- 2.3 Survey on People Count Detection -- 2.4 Comparison Table of Literature Review -- 3 Outcome of Literature Review -- 4 Datasets -- 5 Challenges and Future Perspectives -- 6 Conclusion -- References -- Stigmergy-Based Collision-Avoidance Algorithm for Self-Organising Swarms -- 1 Introduction -- 2 Multi-agent Collision Avoidance Based on Stigmergy -- 3 Numerical Experiments -- 4 Conclusions -- References -- Handling Security Issues in Software-defined Networks (SDNs) Using Machine Learning -- 1 Introduction -- 2 Need of SDN -- 3 SDN and NFV -- 4 Security Issues in SDN -- 4.1 Hardware Security Issues -- 4.2 Security Threats at Software Level -- 5 Early Approaches for Securing SDN -- 5.1 Intrusion Detection and Prevention System (IDPS) for SDN -- 5.2 Intrusion Tolerant System (ITS) for SDN -- 5.3 Stateful Firewall for SDN -- 5.4 Framework for DDOS Detection and Prevention -- 6 Securing SDN with Machine Learning -- 6.1 Supervised ML for SDN -- 6.2 Unsupervised ML Algorithm for SDN -- 6.3 Semi-supervised Learning Approaches for SDN. , 6.4 Machine Learning-based NIDS for SDN -- 7 Issues in Existing ML-based SDN -- 8 Conclusion -- 9 Future Scope -- References -- Multi-purpose Web Application Honeypot to Detect Multiple Types of Attacks and Expose the Attacker's Identity -- 1 Introduction -- 2 Related Work -- 3 Methods Used -- 3.1 Honeypot -- 3.2 GUI -- 3.3 Controller -- 3.4 Models -- 3.5 Sequence of Events -- 4 Proposed System -- 4.1 System Working -- 4.2 Overcoming Brute Force Script Attack -- 4.3 Overcoming Static Resource Attack -- 4.4 Overcoming Web Scraping Script (WSS) Attack -- 4.5 Overcoming GET/POST Request -- 4.6 Advantages of the Proposed Method -- 5 Experimental Results -- 6 Conclusion and Future Scope -- References -- An Empirical Approach for Tuning an Autonomous Mobile Robot in Gazebo -- 1 Introduction -- 2 Related Works -- 3 Related Theory -- 3.1 Sensors -- 3.2 Light Detection and Ranging (LIDAR) -- 3.3 Inertial Measurement Unit (IMU) -- 3.4 Adaptive Monte Carlo Localization (AMCL) -- 3.5 Navigation -- 4 Methodology -- 4.1 Costmap Parameters -- 4.2 Planner Parameters -- 5 Experimentation Result -- 6 Result Analysis -- 7 Conclusion -- References -- An Investigation on Computational Intelligent Solutions for Highly Dynamic Wireless Sensor Networks -- 1 Introduction -- 2 Computational Intelligent Paradigms -- 2.1 Fuzzy Logic (FL) -- 2.2 Evolutionary Algorithms (EA) -- 2.3 Artificial Neural Networks (ANN) -- 2.4 Swarm Intelligence (SI) -- 3 WSN Challenges -- 4 Related Work -- 4.1 CI Approaches for Energy Management -- 4.2 Heuristic Solutions for Packet Routing -- 4.3 Traffic Management with Channel Dynamics Using CI Methods -- 5 Conclusion -- References -- A Study of Underwater Image Pre-processing and Techniques -- 1 Introduction -- 2 Literature Review -- 3 Types of Image Pre-processing -- 3.1 Color Conversion -- 4 Binarization -- 5 Filtering -- 6 Resizing. , 7 Techniques of Underwater Image Processing.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...