GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (856 pages)
    Edition: 1st ed.
    ISBN: 9783030343873
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1084
    DDC: 006.3
    Language: English
    Note: Intro -- 4th International Conference on Intelligent and Interactive Systems and Applications (IISA2019) -- Editorial -- Acknowledgements -- Contents -- Intelligent Systems -- Recognition of Voiceprint Using Deep Neural Network Combined with Support Vector Machine -- Abstract -- 1 Introduction -- 2 Methods -- 3 Voiceprint Recognition Based on DBN-SVM -- 3.1 Experimental Procedures and Processes -- 3.2 Corpus Description and MFCC Extraction -- 3.3 DBN Training and Deep Feature Extraction -- 3.4 Experimental Result and Analysis -- 4 Conclusion -- Acknowledgments -- References -- Research on Intelligent Patent Classification Scheme Based on Title Analysis -- Abstract -- 1 Introduction -- 2 Topic-Based Patent Classification Scheme -- 2.1 The Process of Topic-Based Patent Classification Scheme -- 2.2 Results and Discussion -- 3 Title Word-Frequency-Based Patent Classification Scheme -- 3.1 The Process of Title Word-Frequency-based Patent Classification Scheme -- 3.2 Results and Discussion -- 4 Conclusions -- References -- Study on Intelligent Recognition Matching and Fusion Interaction Technology of Electrical Equipment Model -- Abstract -- 1 Introduction -- 1.1 Background -- 1.2 Purpose and Significance -- 1.3 Overseas Research Levels -- 1.4 Domestic Research Levels -- 2 Solutions and Key Technologies -- 2.1 Power Equipment Model Identification -- 2.2 Panoramic Model and Background Real-Time Monitoring Data Fusion Interaction -- 2.3 Physical Device Model Overlay and Virtual Integration -- 2.4 Model Control Interaction -- 3 Conclusion -- Acknowledgments -- References -- Deep Knowledge Tracing Based on Bayesian Neural Network -- Abstract -- 1 Introduction -- 2 Related Works -- 3 BDKT -- 3.1 BDKT Input Data -- 3.2 BDKT Model Structure -- 3.3 BDKT Parameter Learning -- 4 Results and Discussion -- 4.1 BDKT Vs DKT. , 4.2 BDKT Parameter Randomness and Model Uncertainty -- 4.3 Relationship Between the Students' Behaviors -- 5 Conclusion -- Acknowledgment -- References -- Co-simulation of Sub-frame of the Intelligent Fire Truck Based on SolidWorks and ANSYS Workbench -- Abstract -- 1 Introduction -- 2 Main Technical Difficulties -- 2.1 The Connection Problem -- 2.2 Contact Settings -- 2.3 Meshing -- 3 Load Loading -- 4 Simulation Results -- 4.1 Static Simulation Without Impact Force -- 4.2 Static Simulation with Impact Force -- 4.3 Modal Analysis of the Overall Structure -- 5 Conclusion -- Acknowledgments -- References -- Design of Framework on Intelligent Simulation and Test Platform for High Power Microwave Sources -- Abstract -- 1 Introduction -- 2 Requirement Analyses -- 2.1 User Requirements -- 2.2 Functional Requirements -- 2.3 Interface Requirements -- 3 Frame Design -- 3.1 Development Language Selection -- 3.2 Design Model -- 3.3 Design Method -- 3.4 Computing Model -- 4 Technical Support -- Acknowledgments -- References -- Design of Intelligent Meter Life Cycle Management System Based on RFID -- Abstract -- 1 Introduction -- 2 Anti-collision Algorithm Processing of RFID Signal -- 3 Composition of the Life Cycle Management System -- 3.1 Cloud Platform Management System -- 3.2 RFID Intelligent Meter Storage System -- 3.3 RFID Smart Meter On-Site Data Copying System -- 4 Design of RFID Electronic Tag Antenna -- 5 Conclusion -- Acknowledgements -- References -- Design of Single-Phase Intelligent Meter Based on RFID Semi Active Technology -- Abstract -- 1 Introduction -- 2 Overall Design of Smart Meter -- 3 Hardware Design of Smart Meter -- 3.1 CPU Module -- 3.2 Metering Module -- 3.3 Communication Module -- 3.4 Clock and Storage Module -- 4 Software Design -- 4.1 Overall Structure of the Software -- 4.2 RFID Interface Design Based on Three-Tier Architecture. , 5 System Debugging -- 6 Conclusion -- Acknowledgements -- References -- Research on Anti-fall Algorithms of Substation Intelligent Inspection Robot -- Abstract -- 1 Introduction -- 2 Design of Inspection Platform -- 3 Ranging Principle of Binocular Camera -- 4 Application Principle of Anti-falling -- 5 Design and Analysis of Algorithms -- 6 Conclusion -- References -- Research and Application of Process Object Modeling Method Based on Deep Learning -- Abstract -- 1 Introduction -- 2 DNN Deep Learning Algorithms -- 3 Modeling of DNN Deep Learning Network -- 3.1 Open-Loop Modeling Method Based on Multiple Inertial Filters -- 3.2 Closed-Loop Modeling Method Based on Two DNN Models -- 4 Conclusion -- References -- Performance Assessment of Smart Electricity Meters Based on Max Margin Bayesian Classifiers -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Feature Selection Based on Genetic Algorithm -- 2.2 Learning Max-Margin Bayesian Classifiers Based on Bagging Ensemble -- 2.3 Selecting Max Margin Bayesian Classifiers Subset Based on Clustering Algorithm -- 3 Experimental Results and Analysis -- 4 Conclusions and Future Works -- References -- Operating Performance Assessment of Smart Meters Based on Bayesian Networks and Convex Evidence Theory -- Abstract -- 1 Introduction -- 2 The Proposed Methodology -- 2.1 Discretization -- 2.2 Training of Bayesian Networks from Historical Data of Smart Electricity Meters -- 2.3 Using the Convex Evidence Theory to Integrate the Assessment Results of Bayesian Networks -- 3 Experimental Results and Analysis -- 4 Conclusions and Future Works -- Acknowledgments -- References -- Research on Object-Oriented Design Defect Detection Method Based on Machine Learning -- Abstract -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 2 Software Design Defects -- 2.1 Related Concepts -- 2.2 Related Definition. , 3 Design Defect Detection Method -- 3.1 Design Defect Detection -- 3.2 Feature Extraction -- 3.3 Design Defect Classifier Algorithms -- 3.4 Design Defect Detection Algorithms -- 4 Experiment and Evaluation -- 4.1 Experiment -- 4.2 Result Analysis -- Acknowledgments -- References -- Design of Electromagnetic Energy-Saving Intelligent Vehicle -- Abstract -- 1 Introduction -- 2 Principles of Operation -- 3 Test Results -- 4 Conclusion -- Acknowledgments -- References -- New Energy Vehicle Reliability Research by Large Data -- Abstract -- 1 Introduction -- 2 Reliability Analysis Theory -- 3 Acquisition of Automobile Fault Data -- 4 Calculation of Equivalent Fault Number Change Curve of Automobile in Different Mileage Ranges -- 4.1 Establishing the Curve of Vehicle Type Changing with the Number of Mileage Faults -- 4.2 Classification of Fault Hazard Degree -- 4.3 Calculation of Equivalent Fault Number Change Curve of Automobile in Different Mileage Ranges -- 5 Calculation of Reliability Evaluation Index of Vehicle Type -- 6 Establishment of Comprehensive Evaluation Model of Vehicle Type Reliability -- 7 Conclusion -- References -- One-Step Prediction for GM(1,1) with a Sliding Data Window -- Abstract -- 1 Introduction -- 2 The GM(1,1) Model -- 3 Introducing the Sliding Data Window to GM(1,1) -- 4 The Requirements of Data Samples for GM(1,1) -- 5 Experimental Results -- 6 Conclusions -- Acknowledgement -- References -- Evaluation on Well-Canal Combined Irrigation Modes for Cotton Fields in the South of Xinjiang, China Based on an Algorithm of Fuzzy Neutral Network -- Abstract -- 1 Background -- 2 Flow and Steps of the Algorithm -- 2.1 Flow of Algorithm for Fuzzy Neural Network -- 2.2 Steps of the Algorithm -- 3 Mathematical Principles of the Algorithm -- 3.1 Principles of Fuzzy Mathematics and FNN -- 3.2 Fuzzy Function and FNN -- 4 Empirical Analysis. , 4.1 Prediction Image of Training Data Based on FNN Algorithm -- 4.2 Results -- 5 Conclusions -- Acknowledgements -- References -- Grape Downy Mildew On-line Detection Based on Accurate Image Processing Method Preformed on Embedded Ambient Intelligence System -- Abstract -- 1 Introduction -- 2 Intelligent Image Processing -- 2.1 Holistic Methods Organization Chart -- 2.2 Image Processing -- 2.3 Decrease of Disturbance of Leaf Vein -- 3 System Design -- 4 GDM Diagnose, Grading and Preventive Measures -- 5 Conclusion -- Acknowledgments -- References -- An Improved Bisecting K-Means Text Clustering Method -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Data Processing -- 3.1 Corpus Acquisition -- 3.2 Data Extraction Using Word2Vec -- 3.3 Using TF-IDF to Select Feature Word Vector -- 4 The Improved Bisecting K-Means Text Clustering Method -- 4.1 Bisecting K-Means Clustering -- 4.2 Improved Bisecting K-Means Algorithm -- 5 Experimental Results Analysis -- 5.1 Experimental Process -- 5.2 Experimental Results -- 6 Conclusion -- Acknowledgements -- References -- PLC-Based Control System Design of Intelligent and Efficient Multiple Parking Device -- Abstract -- 1 Introduction -- 2 Structure and Principle of Intelligent and High Efficiency Multiple Parking Device -- 3 Design of Control System -- 4 Design of System Hardware -- 5 Design of System Software -- 5.1 The Initialization of System -- 5.2 The Procedure of Storage Car -- 5.3 The Rotation of Motor -- 6 Conclusion -- Acknowledgement -- References -- Sparse Acceleration Algorithm Based on Likelihood Upper Bound -- Abstract -- 1 Introduction -- 2 Acceleration Based on Likelihood Upper Bound Filtering -- 2.1 Sparse Expression Target Tracking -- 2.2 Observation Likelihood Upper Bound -- 2.3 Bounded Particle Resampling -- 3 Experimental Results and Analysis -- 3.1 Experimental Data and Algorithm Description. , 3.2 Evaluation Criteria.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: User interfaces (Computer systems). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (525 pages)
    Edition: 1st ed.
    ISBN: 9788132220091
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.309
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 1.1 Data Aggregation -- 1.2 Data Aggregation Security Concerns -- 2…Secure Data Aggregation Protocols -- 2.1 Secure Data Aggregation Based on Cryptographic Techniques -- 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography -- 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography -- 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function -- 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes -- 2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation -- 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques -- 3…Comparison of Secure Data Aggregation Protocols -- 4…Conclusion -- References -- 2 Secure and Dynamic IP Address Configuration Scheme in MANET -- Abstract -- 1…Introduction -- 2…Related Work Review -- 3…Proposed Work -- 4…Conclusion -- References -- 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Proposed Scheme -- 4…Conclusion -- References -- 4 Dual Security Against Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Route Discovery Phase Detection -- 3.2 Data Transmission Phase -- 4…Conclusion and Future Scope -- References -- 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Proposed Detection Algorithm -- 4…Conclusion and Future Work -- References -- 6 Frequency Domain Incremental Strategies Over Distributed Network -- Abstract -- 1…Introduction -- 2…Estimation Problem and the Adaptive Distributed Solution. , 3…Frequency-Domain Adaptive Distributed Solution -- 3.1 DCT-LMS and DFT-LMS Algorithm -- 4…Simulation -- 5…Conclusion -- References -- 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- Abstract -- 1…Introduction -- 1.1 MAC Layer Architecture -- 1.2 QoS Classes -- 1.3 Scheduler at MAC Layer -- 2…Literature Survey -- 3…Methodology -- 3.1 Design of Scheduler -- 4…Mathematical Model -- 4.1 Probability of Packets Being Served -- 4.2 Average Waiting Time -- 4.3 Average Time Spent by a Packet in Queue Ws -- 5…Result Analysis -- 6…Conclusion -- References -- 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Proposed Architecture and Methodology -- 3…Result Analysis -- 4…Conclusion -- References -- 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Abstract -- 1…Introduction -- 2…Literature Review -- 3…The Procedure -- 3.1 Initialization Phase -- 3.2 Detection and Reporting Phase -- 3.3 Action Phase -- 4…Implementation and Result Analysis -- 5…Conclusion -- References -- 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Wireless Sensor Network Routing Algorithms -- 2.1 Flat Routing Protocols -- 2.2 Hierarchical Routing Algorithms -- 2.3 Location-Based Protocols -- 2.4 Related Work -- 3…Simulation Setup -- 3.1 Result and Analysis -- 4…Conclusion -- References -- 11 Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic -- Abstract -- 1…Introduction -- 1.1 IEEE 802.11 Mechanism -- 1.2 IEEE 802.11e Mechanism -- 2…Simulation Model and Performance Analysis -- 2.1 Simulation Model -- 2.2 Simulation Parameter -- 2.3 Results -- 3…Conclusion -- References. , 12 A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range -- Abstract -- 1…Introduction -- 2…Related Work on Connected Dominating Set -- 3…Proposed Algorithm -- 3.1 Network Model -- 3.2 Proposed Approach -- 3.2.1 Algorithm: Determination of P-CDS of a Graph -- 3.2.2 Diagrammatical Illustration of Algorithm -- 4…Performance Analysis -- 5…Conclusion -- References -- 13 Token Based Group Local Mutual Exclusion Algorithm in MANETs -- Abstract -- 1…Introduction -- 2…Related Works -- 3…GLME Algorithm -- 3.1 Working -- 3.2 Data Structure -- 3.3 Messages -- 3.4 Pseudocode of Algorithm at Node i -- 4…Performance Analysis -- 5…Conclusions and Future Scope -- References -- 14 A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Coverage Algorithm for Anchor Node Deployment -- 3…Encryption and Decryption -- 4…Route Discovery Process -- 5…Performance Evaluation -- 6…Conclusions -- References -- 15 Characteristic Function for Variable-Bit-Rate Multimedia QoS -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Model for Mapping QoS of Variable-Bit-Rate Multimedia -- 4…Numerical Results -- 5…Conclusion -- References -- 16 A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition -- Abstract -- 1…Introduction -- 2…Preliminaries -- 2.1 Vector Decomposition Problem -- 2.2 Trapdoor VDP -- 3…Proposed Oblivious Transfer Using Vector Decomposition -- 3.1 Correctness of Our OT Scheme -- 4…Conclusion and Future Work -- References -- 17 Query by Humming System Through Multiscale Music Entropy -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Proposed Query by Humming System -- 3.1 Preprocessing -- 3.2 Framing -- 4…Entropy Estimation -- 4.1 Shannon Entropy -- 4.2 Multiscale Entropy -- 4.3 Multiscale Music Entropy. , 5…Kd Tree-Based Indexing -- 6…Query Processing and Searching -- 7…Results and Discussions -- 7.1 Performance Analysis -- 8…Conclusions -- References -- 18 An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Discrete Wavelet Transform for EEG Signal Decomposition -- 4…Training Algorithms for MLPNN -- 4.1 Backpropagation -- 4.2 Manhattan Update Rule -- 4.3 Resilient Propagation -- 5…Experimental Study, Results, and Analysis -- 6…Summary and Conclusion -- 19 Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Envisioned Query by Humming System -- 4…Perceptual Analysis -- 4.1 Spectral Centroid -- 4.2 Spectral Spread -- 4.3 Pitch Class Profile or Chroma -- 4.3.1 Preprocessing -- 4.3.2 Frequency Mapping -- 4.3.3 Postprocessing -- 4.4 Harmonicity -- 4.4.1 Harmonic Spectral Centroid -- 4.4.2 Harmonic Spectral Spread -- 5…Context Drift Information Analysis -- 5.1 Perceptual Feature Space -- 5.2 Transfer Entropy Estimation -- 6…Results and Discussions -- 7…Conclusions -- References -- 20 First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm -- Abstract -- 1…Introduction -- 2…Basic Concepts -- 3…SRM-FF Algorithm -- 4…Evaluations -- 5…Conclusion -- References -- 21 A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks -- Abstract -- 1…Introduction -- 2…Proposed Work -- 2.1 Proposed Work Architecture -- 2.2 Proposed Algorithm -- 2.3 Proposed Embedding Scheme -- 3…Experimental Results and Comparison Analysis -- 3.1 Evaluation Based on Stego-Image Quality and Payload Capacity. , 3.2 Evaluation Based on Resistance to Stastical Attacks -- 4…Conclusions -- References -- 22 A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Area-Based Stereo Matching -- 4…Experiment Results -- 4.1 Method of Evaluation -- 4.2 Robustness to Change in Illumination -- 4.3 Robustness to Change in Exposure -- 5…Conclusion -- Acknowledgement -- References -- 23 A Hybrid Motion Based-Object Tracking Algorithm for VTS -- Abstract -- 1…Introduction -- 2…The VTS and Its Challenges -- 3…Motion-Based Object Tracking Scheme -- 4…Simulation Results -- 5…Conclusion and Future Work -- References -- 24 Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi's Method -- Abstract -- 1…Introduction -- 2…Taguchi's Optimization Method -- 2.1 Designing of Input Parameter Using OA -- 2.2 Building of Response Table -- 2.3 Optimal Level Values Identification and Confirmation Experiment -- 2.4 Reducing the Optimization Range -- 2.5 Checking of Level Values and Termination Criteria -- 3…Experimental Results -- 4…Conclusion -- References -- 25 A Novel Approach for Jamming and Tracking of Mobile Objects -- Abstract -- 1…Introduction -- 2…Smart Antenna -- 3…Algorithm Applied in the System -- 4…Simulation Results -- 5…Conclusion -- References -- 26 Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System -- Abstract -- 1…Introduction -- 2…Mathematical Model -- 2.1 STBC Encoding Scheme -- 3…Communication System Model -- 3.1 STBC Decoding Scheme -- 4…Results and Discussion -- 5…Conclusions -- References -- 27 On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application -- Abstract -- 1…Introduction -- 2…Antenna Design and Parametric Study -- 3…Results and Discussion -- 3.1 Return Loss. , 3.2 Current Distribution.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Engineering-Data processing. ; Electronic books.
    Description / Table of Contents: This book details recent research on soft computing techniques in vision science. It presents basic research extending to visual perception and visual system, cognitive psychology and psychophysics.
    Type of Medium: Online Resource
    Pages: 1 online resource (208 pages)
    Edition: 1st ed.
    ISBN: 9783319046938
    Series Statement: Studies in Computational Intelligence Series ; v.543
    DDC: 620.00285
    Language: English
    Note: Intro -- Contents -- 1 Machine Vision Solutions in Automotive Industry -- Abstract -- 1…Introduction -- 2…Machine Vision -- 2.1 Basics of Machine Vision System -- 2.2 Camera, Lens and Illumination -- 2.2.1 Camera -- 2.2.2 Lens -- 2.2.3 Illumination -- 2.2.4 3-D Imaging System -- 2.3 Software -- 2.4 Interface to Production Environment -- 2.5 Interface to Management Information System -- 3…Applications -- 3.1 Application: Inspection of Spline Gear -- 3.2 Application: Inspection and Control of Flywheel Press System -- 4…Other Applications -- 5…Conclusions -- References -- 2 Kinect Quality Enhancement for Triangular Mesh Reconstruction with a Medical Image Application -- Abstract -- 1…Introduction -- 2…Methods -- 2.1 System Overview -- 2.2 A Background and the Characteristics of Microsoft Kinect -- 3…A Comprehensive Kinect Calibration Method -- 3.1 Calibration of RGB/Depth Camera -- 3.2 Calibration of Depth Sensor -- 3.3 Mapping Between RGB and Depth Image -- 4…The Tri-States Segmentation -- 5…Triangular Mesh Reconstruction -- 5.1 Average Filter -- 5.2 Marching Cubes Algorithm -- 5.3 Area Calculation -- 6…Experimental Result -- 7…Conclusion -- References -- 3 A Matlab GUI Package for Comparing Data Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 2.1 k-Means -- 2.2 Fuzzy c-Means -- 2.3 Hierarchical Clustering -- 2.4 Multiobjective Clustering with Support Vector Machine -- 3…Cluster Validity Index -- 3.1 Internal Validity Index -- 3.1.1 J Index -- 3.1.2 Davis-Bouldin Index -- 3.1.3 Dunn Index -- 3.1.4 Xie-Beni Index -- 3.1.5 I Index -- 3.1.6 Silhouette Index -- 3.2 External Validity Index -- 3.2.1 Minkowski Index -- 3.2.2 Adjusted Rand Index -- 3.2.3 Percentage of Correctly Classified Pairs -- 4…Demonstration of Cluster Package -- 4.1 Initial Window -- 4.2 k-Means Window -- 4.3 Fuzzy c-Means Window. , 4.4 Hierarchical Clustering Window -- 4.5 MocSvm Clustering -- 4.6 Report Table i.e. Result window -- 4.7 All Cluster Running Window -- 5…Conclusion -- References -- 4 Multi Objective Line Symmetry Based Evolutionary Clustering Approach -- Abstract -- 1…Introduction -- 2…Proposed Symmetry Based Distances -- 3…Multiple Randomized Kd Trees Based Nearest Neighbor Search -- 4…Multi Objective Line Symmetry Based Genetic Clustering Approach -- 4.1 Chromosome Representation -- 4.2 Fitness Computation -- 4.3 Genetic Operators -- 4.3.1 Selection -- 4.3.2 Crossover -- 4.3.3 Mutation -- 4.4 Termination Criterion -- 5…Data Sets and Experimental Results -- 5.1 Artificial Data Sets -- 5.2 Real Data Sets -- 6…Conclusion -- References -- 5 An Efficient Method for Contrast Enhancement of Digital Mammographic Images -- Abstract -- 1…Introduction -- 2…MIAS Database -- 3…Proposed Method -- 4…Simulation Results and Discussions -- 5…Conclusions -- References -- 6 Simulation of Obstacle Detection and Speed Control for Autonomous Robotic Vehicle -- Abstract -- 1…Introduction -- 2…Obstacle Detection and Avoidance -- 2.1 Image Processing Based Obstacle Detection -- 2.1.1 Stereo Vision -- 2.1.2 Monocular Vision -- 2.2 Proposed Method for Obstacle Avoidance -- 2.3 Digital Image Processing -- 2.3.1 Basic Relationships Between Pixels -- 2.3.2 Neighbours of a Pixel -- 2.3.3 Connectivity Between Pixels -- 2.3.4 Adjacency Between Pixels -- 2.3.5 Region -- 2.4 Algorithm for Obstacle Detection -- 2.4.1 Thresholding and Region Growing based Image Segmentation -- 3…Pid Controller Based Speed Control of PMDC Motor -- 3.1 PID Controller Overview -- 3.1.1 Proportional -- 3.1.2 Integral -- 3.1.3 Differential (Derivative) -- 3.2 Motor Parameters -- 3.3 Experimental Calculation of Motor Parameters -- 3.3.1 Electric Resistance and Inductance of Armature -- 3.3.2 Electromotive Force Constant. , 3.3.3 Moment of Inertia -- 3.3.4 Damping Ratio of the Mechanical System -- 3.4 PMDC Motor Equations -- 3.5 Tuning of Discrete PID Controller -- 3.5.1 Simulation Result -- 3.5.2 Computed Parameters -- 4…Matlab Simulink Based Image Processing for Obstacle Detection -- 4.1 MATLAB Simulink Model -- 4.1.1 RGB to Gray-Scale Conversion -- 4.1.2 Thresholding -- 4.2 Simulation Results -- 5…Results -- 5.1 PID Controller Module -- 5.2 Video Processing Module -- 6…Conclusion -- References -- 7 A Review of Global Path Planning Algorithms for Planar Navigation of Autonomous Underwater Robots -- Abstract -- 1…Introduction -- 2…Global Path Planning Algorithms -- 2.1 Breadth First Search (BFS) Algorithm -- 2.2 Depth First Search (DFS) Algorithm -- 2.3 A* Algorithm -- 2.4 Dijkstra's Algorithm -- 2.5 Wall Following Algorithm -- 3…Results and Discussion -- 3.1 Path Planning Through Randomly Located Obstacles -- 3.2 Maze Solving: A Comparison -- 3.3 Maze Solving by Wall Following Algorithm -- 3.4 Breadth First Search (BFS) and Depth First Search (DFS): A Comparison -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 8 Pseudo-Fractional Tap-Length Learning Based Applied Soft Computing for Structure Adaptation of LMS in High Noise Environment -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Existing Algorithms for Dynamic Tap-Length Selection -- 3.1 The Fractional Variable Tap-Length Learning Algorithm -- 4…The VT-VSLMS Algorithm -- 5…Dynamic Tap-Length Optimization -- 6…Proposed Pseudo-Fractional Tap-Length Optimization -- 7…Simulation Setup -- 8…Results and Discussion -- 9…Conclusion -- References -- 9 Medical Image Analysis Using Soft Computing Techniques -- Abstract -- 1…Introduction -- 2…Image Database -- 3…Methodology -- 3.1 Algorithms for Brain Image Segmentation -- 3.2 Algorithms for Retinal Image Classification. , 4…Experimental Results and Discussions -- 4.1 Result Analysis of Brain Image Segmentation -- 4.2 Result Analysis of Retinal Image Classification -- 5…Conclusion -- Acknowledgments -- References -- 10 Selection of Robotic Grippers Under MCDM Environment: An Optimized Trade Off Technique -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Problem Formulation -- 4…MCDM Methodologies -- 4.1 Analytic Hierarchy Process -- 4.2 TOPSIS -- 4.3 VIKOR -- 5…Solution Using AHP -- 6…Solution Using TOPSIS Methodology -- 7…Solution Using VIKOR Methodology -- 8…Conclusion -- References -- 11 Numerical Study of Viscous Flow in the Hydraulic System of Electro Optical Tracking System -- Abstract -- 1…Introduction -- 1.1 Description of the Hydraulic Systems -- 1.1.1 Oil Reservoir -- 1.1.2 Gear Pump -- 1.1.3 Manifold Block -- 1.1.4 Valves -- 1.1.5 Hydraulic Rotary Actuators -- 1.1.6 Electrical Panel -- 1.2 Selection of Fluid -- 2…Problem Formulation -- 2.1 Mathematical Modeling of Flow -- 2.2 Finite Difference Method for Solving the EOTS Pipeline Axial Flow -- 2.3 Problem Solving -- 3…Numerical Results and Analysis -- 3.1 Axial Velocity Distribution of EOTS Pipeline Axial Flow Field -- 3.2 Relationship Curve Between Axial Velocity and Cross Sectional Length of EOTS Pipeline Flow -- 3.3 Relationship Curve Between Wall Shear Stress and Cross Sectional Width and Height -- 3.4 Computation of f Re -- 4…Conclusion -- Acknowledgments -- A.x(118). Appendix: A -- A.x(118). Appendix: B -- References -- 12 Comparison of Edge Detection Algorithm for Part Identification in a Vision Guided Robotic Assembly System -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Structure -- 4…Edge Detection -- 4.1 Sobel Operator -- 4.2 Robert's Cross Operator -- 4.3 Prewitt's Operator -- 4.4 Laplacian of Gaussian Operator -- 4.5 Canny's Edge Detection Algorithm. , 5…Region Growing Algorithm -- 6…Shape Descriptor -- 7…Results and Discussion -- 7.1 Result of Canny's Operator -- 7.2 Result of LOG Operator -- 7.3 Result of Prewitt Operator -- 7.4 Result of Sobel Operator -- 7.5 Result of Roberts Operator -- 7.6 Comparision of Results -- 8…Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: Artificial intelligence -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (797 pages)
    Edition: 1st ed.
    ISBN: 9788132220121
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.308
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 Neutrosophic Logic Applied to Decision Making -- Abstract -- 1…Introduction -- 2…Neutrosophic Decision Making Strategies -- 3…Complex Metrics for Digital Learning Object Evaluation -- 4…Practical Experience -- 5…Conclusion -- Acknowledgments -- References -- 2 Transforming e-Government to Smart Government: A South Australian Perspective -- Abstract -- 1…Introduction -- 2…Open Data: Social and Economic Benefits -- 3…Developing Smart Government Through Open Data -- 3.1 Community Engagement and Coproduction -- 3.2 Financial Investment -- 3.3 Automation -- 3.4 Collaboration -- 3.5 Governance -- 4…Conclusion -- References -- 3 An Online Content Syndication Tool with Built-in Search and Social Sharing -- Abstract -- 1…Introduction -- 2…Architecture -- 2.1 RSS Source Listener -- 2.2 Subscription -- 2.3 RESTful Web Service APIs -- 3…Conclusions -- Acknowledgment -- References -- 4 Customizing EPCglobal to Fit Local ONS Requirements -- Abstract -- 1…Introduction -- 2…EPC Framework -- 3…Related Work -- 4…Proposed System and Implementation -- 4.1 Sample Implementation -- 5…Conclusion -- References -- 5 Distributed CloudIMS: Future-Generation Network with Internet of Thing Based on Distributed Cloud Computing -- Abstract -- 1…Introduction -- 2…Evolution of Network and Application -- 2.1 Evolution of Telecommunication (NGN) -- 2.2 Evolution of Cloud Computing -- 2.3 The Internet of Thing: Machine to Machine the Future Internet -- 2.4 Related Work on IMS, IoT, and Cloud Computing -- 3…The CloudIMS Framework Architecture: Our Proposed Future Network -- 3.1 Our Vision of CloudIMS Platform -- 3.2 Architecture of CloudIMS Platform -- 3.3 Operation, Administration, and Maintenance (OA& -- M) of CloudIMS. , 3.4 Discussion and Motivation of Proposed CloudIMS Features and Use Case Study Characteristics -- 4…Conclusion -- References -- 6 Genetic Algorithm-Based Query Expansion for Improved Information Retrieval -- Abstract -- 1…Introduction -- 2…Proposed Approach -- 2.1 Construction of Term Pool -- 2.2 Genetic Algorithm for Selecting Expansion Terms -- 2.2.1 Representation of Chromosome -- 2.2.2 Fitness Function -- 2.2.3 Algorithm for GABQE -- 3…Experiments and Results -- 4…Conclusion -- References -- 7 Genetic Algorithm-Based Adaptive PID Controller -- Abstract -- 1…Introduction -- 2…The Proposed PID Controller -- 2.1 The Conventional PID Controller -- 2.2 The Adaptive PID Controller -- 2.3 GA-Optimized APID -- 2.3.1 Objective Function of the Genetic Algorithm -- 2.3.2 Different Operations Used in GA -- 3…Results -- 4…Conclusion -- References -- 8 Text Mining for Phishing E-mail Detection -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Data set Preparation -- 3.2 Feature Extraction Using Text Mining -- 3.3 Feature Selection -- 3.4 Classification -- 4…Implementation -- 5…Conclusion -- References -- 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Workflow Design -- 4…Multi-objective Scheduling Model -- 5…General CSO Algorithm -- 6…Proposed Algorithm -- 6.1 Seeking Mode -- 6.2 Tracing Mode -- 7…Input Data for Experiment -- 8…Results and Discussion -- 8.1 Output Graphs Generated by MATLAB -- 8.2 Analysis of Resultant Graphs -- 9…Conclusion and Future Scope -- References -- 10 A Case Study of User Behavior in Information Retrieval -- Abstract -- 1…Introduction -- 2…User Behavior in Information Retrieval -- 3…Case Study -- 3.1 Scoring -- 4…Approaches to Incorporating Implicit Feedback -- 5…Conclusion -- References. , 11 Fuzzy Mapping of Robotic Arm Based on LabVIEW -- Abstract -- 1…Introduction -- 2…Implementation of System -- 3…Designing Fuzzy Systems -- 4…A Table LookUp Scheme -- 5…Fuzzy System Design for Robotic Arm -- 6…Mapping for Base of Robotic Arm -- 7…Mapping for Gripping of Object -- 8…Kinematics of Robotic Arm -- 9…Conclusion and Future Work -- References -- 12 An Improvement on NSGA-II for Finding Fast the Better Optimal Solution in Multi-objective Optimization Problem -- Abstract -- 1…Introduction -- 2…A Brief Review on Existing Work -- 3…Proposed Methodology -- 3.1 Algorithm Steps -- 4…Implementation and Result Analysis -- 4.1 Test Problems -- 4.2 Results and Comparison with Other Clustering Methods -- 5…Conclusion and Future Work -- References -- 13 Test Case Creation from UML Sequence Diagram: A Soft Computing Approach -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Work -- 3.1 Proposed Framework -- 3.2 UML Diagram for Design Document -- 3.3 Message Control Flow Graph -- 3.4 Algorithm to Create Test Cases Using GA -- 4…Implementation and Results -- 4.1 Optimization of Test Paths Using GA -- 4.2 Test Case Creation -- 5…Conclusion -- References -- 14 Solving Nonlinear Constrained Optimization Problems Using Invasive Weed Optimization -- Abstract -- 1…Introduction -- 2…Invasive Weed Optimization -- 3…Multistage Penalty Function -- 4…Results and Discussion -- 5…Conclusions -- References -- 15 ESEC: An Ideal Secret Sharing Scheme -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Non-threshold Secret Sharing Scheme Using ECC -- 4…A Multilevel Secret Sharing Scheme -- 5…Implementation and Analysis -- 5.1 Implementation -- 5.2 Analysis -- 6…Conclusion -- References -- 16 Extended Service Registry to Support I/O Parameter-Based Service Search -- Abstract -- 1…Introduction -- 2…Object Relational Database for Service Registry. , 2.1 WSDL and UDDI Relationship -- 2.2 Object Relational Database as Service Registry -- 2.3 Extended Service Registry -- 2.4 I/O Parameter-Based Service Search -- 2.5 Process of Parameter-Based Service Search -- 3…Experimental Results -- 3.1 Experimental Setup -- 3.2 Comparison of Basic Keyword Search in Registries---JUDDI Versus ESR Approach -- 3.3 Performance of Output Parameter-Based Service Search -- 4…Related Work -- 5…Conclusion -- References -- 17 Realizing New Hybrid Rough Fuzzy Association Rule Mining Algorithm (RFA) Over Apriori Algorithm -- Abstract -- 1…Introduction -- 1.1 Data Mining and Association Rule Mining -- 1.2 Fuzzy ARM Concepts and Rough ARM Concepts -- 2…Theoretical Aspects -- 2.1 Rough Set Concepts and Reducts -- 2.2 Information System and Decision System -- 2.3 Fuzzy c-Means Clustering -- 3…Proposed Algorithm -- 3.1 Algorithm Description -- 3.2 Pseudo Code -- 3.3 Analysis -- 4…Conclusion and Future Work -- References -- 18 Modal Analysis of Hand-Arm Vibration (Humerus Bone) for Biodynamic Response Using Varying Boundary Conditions Based on FEA -- Abstract -- 1…Introduction -- 2…The CAD Model -- 3…Boundary Conditions and Material Properties -- 4…Results and Discussion -- 5…Conclusion -- References -- 19 Preserving Privacy in Healthcare Web Services Paradigm Through Hippocratic Databases -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Example Scenario -- 4…Enhancement of Hippocratic Databases Through Analytical Hierarchy Processing -- 5…Conclusions -- References -- 20 Generation of Array Passwords Using Petri Net for Effective Network and Information Security -- Abstract -- 1…Introduction -- 2…Types of Existing Authentication Methods -- 3…Limitations of Existing Methods -- 4…Need of a Good Password -- 5…Petri Net -- 6…Array Token Petri Net Structure -- 6.1 Basic Notations -- 6.2 Catenation Rule -- 6.3 Firing Rules. , 6.4 Set of Labels -- 7…Model Formulation and Generation of Array Passwords -- 7.1 Petri Net to Generate All Possible 2 x 2 Arrays Over the Alphabet {a, b} -- 7.2 Firing Sequences -- 8…Conclusion -- References -- 21 Application of Genetic Algorithm for Component Optimization to Deploy Geoprocessing Web -- Abstract -- 1…Introduction -- 2…Approaches for Geoprocessing -- 3…The Geoprocessing Web and Component Optimization -- 4…Proposed Work -- 5…Conclusions -- References -- 22 DNA-Based Cryptographic Approach Toward Information Security -- Abstract -- 1…Introduction -- 2…Brief Idea of DNA -- 3…Literature Review -- 4…Proposed Method -- 4.1 Encryption -- 4.1.1 Algorithmic Steps -- 4.2 Embedding -- 4.2.1 Algorithmic Steps -- 5…Algorithmic Presentation -- 5.1 Key Selection -- 5.2 Message Encryption -- 6…Conclusion -- References -- 23 Design a Fuzzy Logic Controller with a Non-fuzzy Tuning Scheme for Swing up and Stabilization of Inverted Pendulum -- Abstract -- 1…Introduction -- 2…Inverted Pendulum Description -- 3…Controller Design -- 4…Proposed Tuning Scheme -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 24 Use of Machine Learning Algorithms with SIEM for Attack Prediction -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Frame Work -- 3.1 OSSIM -- 3.2 Dataset and Feature Selection -- 3.3 Find Feature Set Using Information Gain -- 3.4 Classification and Prediction -- 4…Conclusion -- References -- 25 Performance Comparison of Single-Layer Perceptron and FLANN-Based Structure for Isolated Digit Recognition -- Abstract -- 1…Introduction -- 2…Data Set and Feature Extraction -- 2.1 Calculation of Gradient [13] -- 2.2 Generation of Feature Vector [13] -- 2.3 Dimension Reduction -- 3…Classification -- 3.1 Single-Layer Perceptron Structure -- 3.2 FLANN Structure -- 4…Simulation Result -- 5…Conclusion -- References. , 26 Computational Techniques for Predicting Cyber Threats.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (858 pages)
    Edition: 1st ed.
    ISBN: 9788132217596
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Soft computing -- Congresses. ; Problem solving -- Data processing -- Congresses. ; Engineering. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (571 pages)
    Edition: 1st ed.
    ISBN: 9788132216957
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.250
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- 1 Research on Hierarchical Clustering Algorithm Based on Cluster Outline -- Abstract -- 1…Introduction -- 2…Definition and Solution -- 2.1 The Definition of Boundary Point and Cluster Outline -- 2.2 The Solution of Cluster Outline -- 3…The Design of Hierarchical Clustering Algorithm Based on Cluster Outline -- 3.1 The Clustering Between Clusters -- 3.2 The Clustering Between Clusters and Outliers -- 3.3 The Process of the Algorithm -- 4…The Experimental Analysis -- 5…Conclusions -- Acknowledgments -- References -- 2 Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things -- Abstract -- 1…Introduction -- 2…The Remote Diagnosis System Designment of the Air Compressor Using Internet of Things -- 3…Field Information Collection with the Internet of Things Technology -- 4…To Realize Remote Monitoring Using Communication Technology -- 5…To Build Fault Model -- 6…To Establish Fault Diagnosis Expert System -- 7…Summary -- Acknowledgments -- References -- 3 An Enhancement Algorithm Based on Fuzzy Sets Algorithm Using Computer Vision System for Chip Image Processing -- Abstract -- 1…Introduction -- 2…Related Works -- 2.1 Image Enhancement -- 2.2 Vision-Based Detection System -- 2.3 Image Edge -- 3…Methodology -- 3.1 Introduction of Fuzzy Sets -- 4…Results and Discussion -- 5…Conclusions -- References -- 4 Development of DDoS Attack Defense System Based on IKEv2 Protocol -- Abstract -- 1…Introduction -- 2…IKEv2 Protocol Analysis and Design -- 3…Development of DDoS Attack Defense System Based on IKEv2 Protocol -- 4…Conclusions -- References -- 5 Power Data Network Dynamic Simulation Platform -- Abstract -- 1…Introduction -- 2…Introduction of Existing Simulation Technology -- 3…Dynamic Simulation Platform for the Design of the Electric Power Data Network. , 3.1 Logical Structure -- 3.2 Hierarchy -- 4…Working Mechanism of Power Data Network Dynamic Simulation Platform -- 4.1 Simulate the Dynamic Interaction Objects -- 4.2 Dynamic Mock Object -- 4.3 Different Levels of Dynamic Change Agreement -- 4.4 Simulation Performance Improvements -- 5…Conclusions -- Acknowledgments -- 6 An Emotional Model Based on Multiple Factors -- Abstract -- 1…Introduction -- 2…Problem Description and Approach -- 2.1 Problem Description -- 2.2 Perception Module -- 2.3 Subconscious Module -- 2.4 Inside Variable Module -- 2.5 Character Module -- 2.6 Mood Module -- 2.7 Emotion Module -- 2.8 Behavior Module -- 3…Experiments and Results -- 3.1 Experiments -- 3.2 Results -- 4…Conclusions -- 7 Multi-Source and Heterogeneous Knowledge Organization and Representation for Knowledge Fusion in Cloud Manufacturing -- Abstract -- 1…Introduction -- 1.1 Cloud Manufacturing -- 1.2 Knowledge Fusion and Service -- 2…Analysis of Knowledge Resources and Requirements for Knowledge Organization and Representation of Group Corporation in Cloud Manufacturing -- 2.1 Features of Group Corporation Knowledge Management and Knowledge Resource Classification -- 2.2 Requirement Analysis of Knowledge Organization and Representation in Group Corporation -- 3…Knowledge Organization and Representation Model for Knowledge Fusion -- 3.1 Knowledge Unit -- 3.2 Fusion Knowledge -- 4…Framework of Knowledge Fusion and Service in Cloud Manufacturing -- 5…Conclusions -- References -- 8 Research of Dynamics and Deploying Control Method on Tethered Satellite -- Abstract -- 1…Introduction -- 2…A System Dynamics Model -- 3…Analyze the Values of System Parameters -- 4…Simulation and Analysis -- 5…Conclusions -- References -- 9 Using Auto-Associative Neural Networks for Signal Recognition Technology on Sky Screen -- Abstract -- 1…Introduction. , 2…Hopfield Associative Neural Network -- 2.1 Discrete Hopfield Network Theory -- 3…Application of Hopfield Network for Typical Projectile Signal -- 3.1 Extraction of Pattern Feature -- 3.2 Associative Memory Algorithm for Discrete Hopfield Neural Networks -- 3.3 Simulation and Application for Typical Signal of Sky Screens -- 4…Results -- References -- 10 Research on the Hotspot Information Push System for the Online Journal Based on Open-Source Framework -- Abstract -- 1…Introduction -- 2…Key Technologies -- 2.1 HttpClient -- 2.2 HTMLParser -- 2.3 IKAnalyzer -- 3…The Realization of the System Framework -- 4…Examples -- 5…Summary -- Acknowledgments -- References -- 11 Development of Control System of Wheel Type Backhoe Loader -- Abstract -- 1…Introduction -- 2…The Features of CAN Bus Control System -- 3…Design of the Architecture of CAN Bus Control System -- 3.1 Typical Architecture of CAN Bus Control System -- 3.2 The Architecture of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4…Principle and Functions of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4.1 The Control of Loading Operation -- 4.2 The Control of Excavating Operation -- 4.3 System Indication and Failure Alarm Control -- 5…The Features of the Control System of Wheel Type Backhoe Loader -- 6…Conclusions -- References -- 12 Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Abstract -- 1…Introduction -- 2…Review of Preliminaries -- 3…Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Acknowledgments -- References -- 13 CGPS: A Collaborative Game in Parking-Lot Search -- Abstract -- 1…Introduction -- 2…The Parking-Lot Searching Scenario -- 3…Algorithm Analysis -- 3.1 Opponent Selection -- 3.2 Game Analysis -- 4…Simulation Analysis -- 5…Conclusions -- References. , 14 A Fuzzy-Based Context-Aware Privacy Preserving Scheme for Mobile Computing Services -- Abstract -- 1…Introduction -- 2…Privacy Challenge of Mobile Computing -- 3…System Overview -- 3.1 Architecture -- 3.2 Context Modeling -- 3.3 Fuzzy-Reasoning Process -- 4…Evaluation -- 5…Conclusions -- Acknowledgments -- References -- 15 Research and Application of Trust Management System -- Abstract -- 1…Introduction -- 2…Trust Management Architecture -- 3…Trust Evaluation Method -- 4…Simulation and Application -- 4.1 A Simulation -- 4.2 Performance Discussion -- 5…Conclusions and Future Work -- Acknowledgments -- References -- 16 Ranaad-Xek: A Prototype Design of Traditional Thai Musical Instrument Application for Android Tablet PC -- Abstract -- 1…Introduction -- 2…Ranaad-Xek -- 2.1 Ranaad-Xek's Composition -- 2.2 Ranaad-Xek Percussions -- 3…Application Specification and Architecture -- 3.1 Framework -- 3.2 Application Specification -- 3.3 Application Architecture -- 3.4 The Playing Mode -- 3.5 Recording System -- 3.6 GUI Design -- 4…Conclusions -- Acknowledgments -- References -- 17 Identifying Accurate Refactoring Opportunities Using Metrics -- Abstract -- 1…Introduction -- 2…Relate Work -- 2.1 Cloned Code -- 2.2 The Difficulties of Identifying Refactoring Opportunities -- 3…An Approach to Identifying Refactoring Opportunities with Metrics -- 3.1 Benefits -- 3.2 Costs -- 3.3 Evaluation of the Benefit and Cost -- 4…Future Work -- Acknowledgments -- References -- 18 Research on Neural Network Predictive Control of Induction Motor Servo System for Robot -- Abstract -- 1…Introduction -- 2…Servo System Modeling -- 3…The Predictive Control Servo System Based on BP Neural Network -- 3.1 Control Structures -- 3.2 Neural Network Predictive Model -- 3.3 Feedback Correction -- 3.4 Scroll Optimization -- 3.5 Neural Network Predictive Control Algorithm Steps. , 4…MATLAB Simulation and Analysis -- Acknowledgments -- References -- 19 Research on Scale-Out Workloads and Optimal Design of Multicore Processors -- Abstract -- 1…Introduction -- 2…Scale-out Workloads -- 3…Experiment and Analysis -- 3.1 Throughput -- 3.2 Latency -- 4…Optimal Design of Multicore Processors for Scale-out Workloads -- 5…Related Work -- 6…Conclusions -- Acknowledgments -- References -- 20 Study of Modified Montgomery's Algorithm and Its Application to 1,024-bit RSA -- Abstract -- 1…Introduction -- 2…RSA Cryptosystem -- 2.1 Montgomery Algorithm and Modified Montgomery Algorithm -- 2.2 Four-to-two CSA -- 2.3 Modified R-L Binary Algorithm -- 3…Algorithm Implementation -- 3.1 Four-to-two Architecture -- 3.2 Modified R-L Binary Architecture -- 4…Conclusions -- References -- 21 A MVS-Based Object Relational Model of the Internet of Things -- Abstract -- 1…Introduction -- 2…MVS-Based Object Relational Model of the Internet of Things -- 2.1 Construction of Basic Data Model -- 2.2 Calculation of Properties' Characteristics of the Internet of Things -- 3…Experimental Verification and Conclusion -- References -- 22 Rateless Code-Based Unequal Loss Protection for Layer-Coded Media Delivery -- Abstract -- 1…Introduction -- 2…ULP-Strider Coding System -- 2.1 Decoding Algorithm -- 2.2 Encoding Process -- 2.3 Analyzing the Construction of Redundancy -- 3…Simulation -- 3.1 Random Sequence Versus Fine-Designed Sequence -- 3.2 Extra Information from Soft Hint -- 3.3 Strider Versus ULP-Strider -- 4…Conclusions -- Acknowledgments -- References -- 23 Construction of the Grade-3 System for GJB5000A-2008 -- Abstract -- 1…Current Software Engineering Process Overview -- 2…Analysis of the Correlation and the Necessity of Fusion Between GJB5000A-2008 and Software Engineering Process -- 3…Built Process System Based on the Software Engineering. , 4…Process Instance Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Management-Data processing. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (678 pages)
    Edition: 1st ed.
    ISBN: 9783030729295
    Series Statement: Modeling and Optimization in Science and Technologies Series ; v.18
    DDC: 658.0563
    Language: English
    Note: Preface -- About This Book -- Contents -- Part I Computational Modelling -- 1 Computational Management-An Overview -- 1.1 Introduction -- 1.2 Computational Intelligence Techniques -- 1.2.1 Fuzzy Logic -- 1.2.2 Artificial Neural Networks -- 1.2.3 Evolutionary Computing -- 1.2.4 Learning Theories -- 1.2.5 Probabilistic Methods -- 1.3 Computational Aspects of Business Management -- 1.3.1 Marketing -- 1.3.2 Sales -- 1.3.3 Customer Relationship Management (CRM) -- 1.3.4 Finance -- 1.3.5 Human Resources -- 1.3.6 Manufacturing -- 1.3.7 Maintenance and Service -- 1.3.8 Research and Development -- 1.4 Benefits and Limitations of Computational Intelligence in Business -- 1.5 Applications of Computational Intelligence in Business -- 1.5.1 Applications of Computational Intelligence in the Field of Marketing -- 1.5.2 Computational Intelligence and Human Resource -- 1.5.3 Computational Intelligence and Finance -- 1.5.4 Computational Intelligence in Operations Management -- 1.6 Conclusion and Future Scope -- References -- 2 Mathematical and Computational Approaches for Stochastic Control of River Environment and Ecology: From Fisheries Viewpoint -- 2.1 Introduction -- 2.2 Stochastic Control -- 2.2.1 Stochastic Differential Equation -- 2.2.2 Performance Index and Value Function -- 2.2.3 HJB Equation -- 2.2.4 Remarks -- 2.3 Specific Problems -- 2.3.1 "Non-renewable" Fishery Resource Management -- 2.3.2 Dam-Reservoir System Management -- 2.3.3 Algae Growth Management -- 2.3.4 Sediment Storage Management -- 2.4 Coupled Problem -- 2.4.1 Overview -- 2.4.2 Control Problem -- 2.4.3 Numerical Scheme -- 2.4.4 Computational Conditions -- 2.4.5 Numerical Computation -- 2.5 Conclusions -- References -- 3 Models and Tools of Knowledge Acquisition -- 3.1 Introduction -- 3.1.1 Knowledge Economy -- 3.2 Literature Review -- 3.2.1 The Role and Importance of Knowledge Acquisition. , 3.2.2 Digitizing Knowledge Acquisition -- 3.3 Knowledge Management and Firm Strategy -- 3.3.1 Strategic Knowledge-An Internal and External Perspective -- 3.3.2 Competitive Intelligence -- 3.4 Knowledge Acquisition: Sources and Techniques -- 3.4.1 External Sources of Knowledge -- 3.4.2 Techniques of Knowledge Acquisition -- 3.5 Role of Technology in Knowledge Acquisition and Management -- 3.5.1 The Emergence of API Economy -- 3.5.2 Artificial Intelligence -- 3.6 Conclusion -- References -- 4 Profits Are in the Eyes of the Beholder: Entropy-Based Volatility Indicators and Portfolio Rotation Strategies -- 4.1 Introduction -- 4.2 Entropy and Its Applications to the VIX -- 4.3 Literature Review -- 4.4 Research Objectives -- 4.5 Theoretical Framework -- 4.6 Data Variables, Measurements, and Sources -- 4.7 Methods and Measures -- 4.8 Empirical Results -- 4.9 Formulation and Testing of Trading Strategies -- 4.10 Summary and Concluding Remarks -- Appendix 1: Trading Strategies Using India VIX Change and the Entropies (Both Approximate and Sample Entropies) Tested Through Simulations -- References -- 5 Asymmetric Spillovers Between the Stock Risk Series: Case of CESEE Stock Markets -- 5.1 Introduction -- 5.2 Related Literature Review -- 5.2.1 (M)GARCH Approaches to Modelling -- 5.2.2 Causality Testing and Cointegration -- 5.2.3 Spillover Methodology Approach -- 5.3 Methodology Description -- 5.3.1 VAR Models and Spillover Index -- 5.3.2 Asymmetric Spillovers -- 5.4 Empirical Results -- 5.4.1 Variable Description -- 5.4.2 Static Results -- 5.4.3 Dynamic Analysis -- 5.4.4 Robustness Checking -- 5.4.5 Simulation of Investment Strategies -- 5.5 Discussion and Conclusion -- Appendix -- References -- 6 Millennial Customers and Hangout Joints: An Empirical Study Using the Kano Quantitative Model -- 6.1 Introduction -- 6.1.1 Motivations of the Study. , 6.1.2 Background of the Study -- 6.2 Literature Review -- 6.3 Model Development -- 6.3.1 Research Gap -- 6.3.2 Research Objectives -- 6.3.3 The Kano Model -- 6.3.4 Research Design -- 6.3.5 Survey Instrument -- 6.4 Results and Discussion -- 6.4.1 Exploratory Factor Analysis Results -- 6.4.2 Reliability Analysis Results -- 6.4.3 Kano Quantitative Analysis Results -- 6.5 Conclusions and Future Scope -- 6.5.1 Conclusions -- 6.5.2 Future Scope -- References -- 7 The Effects of Oil Shocks on Macroeconomic Uncertainty: Evidence from a Large Panel Dataset of US States -- 7.1 Introduction -- 7.2 Data and Methodology -- 7.3 Results and Analysis -- 7.3.1 Linear Impulse Responses -- 7.3.2 Responses of Uncertainty Contingent on High- Versus Low-Oil Dependence States -- 7.3.3 Responses of Uncertainty at Different Horizons Conditioning on Aggregate US Uncertainty Spillovers -- 7.4 Conclusion -- Appendix -- References -- 8 Understanding and Predicting View Counts of YouTube Videos Using Epidemic Modelling Framework -- 8.1 Introduction -- 8.1.1 Literature Review -- 8.2 Building Block for Proposed Epidemic Modelling -- 8.2.1 Epidemic Modelling -- 8.2.2 Assumptions -- 8.2.3 Modelling Information Diffusion as Susceptibility Process -- 8.2.4 Modeling Viewing as Infection Process -- 8.2.5 Particular Case -- 8.3 Numerical Illustration -- 8.4 Results and Interpretation -- References -- 9 Gross Domestic Product Modeling Using ``Panel-Data'' Concept -- 9.1 Introduction -- 9.2 Materials -- 9.3 Statistical Preliminaries and Methods -- 9.4 Results -- 9.5 Concluding Remarks -- References -- 10 Supply Chain Scheduling Using an EOQ Model for a Two-Stage Trade Credit Financing with Dynamic Demand -- 10.1 Introduction -- 10.2 Literature Review -- 10.3 Assumptions and Notations -- 10.3.1 Assumptions: -- 10.3.2 Notations -- 10.4 Mathematical Formulation -- 10.5 Numerical Illustrations. , 10.6 Graphical Representations -- 10.7 Conclusion and Managerial Implications -- References -- 11 Software Engineering Analytics-The Need of Post COVID-19 Business: An Academic Review -- 11.1 Introduction -- 11.2 COVID19-Effects in Business -- 11.2.1 Tourism and Hospitality -- 11.2.2 Airlines and Aviation -- 11.2.3 Oil and Gas -- 11.2.4 Automotive Manufacturing -- 11.2.5 Consumer Products -- 11.2.6 Education -- 11.2.7 Software Industry -- 11.3 Research Methodology -- 11.4 Software Development Life Cycle (SDLC) -- 11.4.1 Software Requirements Analysis -- 11.4.2 Software Design -- 11.4.3 Software Implementation -- 11.4.4 Software Testing -- 11.4.5 Software Deployment -- 11.4.6 Software Maintenance -- 11.5 Software Analytics -- 11.5.1 Literature Analysis -- 11.5.2 Journal Publications with Frequency -- 11.5.3 Citations/Year -- 11.5.4 Software Engineering Analytics: Connotes -- 11.6 Conclusion -- References -- 12 The Rise and Fall of the SCOR Model: What After the Pandemic? -- 12.1 Introduction: The SCOR Model as a Supply Chain Management Foundation -- 12.2 The Evolution of Supply Chain Management -- 12.3 The SCOR Model-A Foundation for Supply Chain Management -- 12.3.1 Supply Chain Optimisation in the Digital Supply Chain Era -- 12.4 Is the Scor Model Still Relevant? -- 12.4.1 The Evolution of the Scor Model -- 12.4.2 The Fall of the Scor Model -- 12.4.3 Is the Resurrection of the Scor Model Possible? -- 12.5 Re-designing the Future of Supply Chains Using Scor -- 12.5.1 Re-designing for Supply Chain Reliability -- 12.5.2 Re-designing for Supply Chain Agility and Responsiveness -- 12.5.3 Re-designing for Supply Chain Asset Management -- 12.6 Concluding Remarks -- References -- Part II Management Optimization -- 13 A Comparative Study on Multi-objective Evolutionary Algorithms for Tri-objective Mean-Risk-Cardinality Portfolio Optimization Problems. , 13.1 Introduction -- 13.2 Portfolio Optimization -- 13.3 Multi-objective Evolutionary Algorithms -- 13.4 Multi-objective Evolutionary Algorithms for Portfolio Optimization Problems-A Literature Review -- 13.4.1 Mean-Variance Portfolio Optimization Using MOEAs -- 13.4.2 Mean-Risk Portfolio Optimization Using MOEAs -- 13.4.3 Three-Objective Portfolio Optimization Using MOEAs -- 13.5 Experimental Results -- 13.6 Conclusion -- References -- 14 Portfolio Insurance and Intelligent Algorithms -- 14.1 Introduction -- 14.2 Portfolio Insurance -- 14.2.1 Multi-period Portfolio Insurance Under Transaction Costs -- 14.3 Intelligent Algorithms -- 14.3.1 Beetle Antennae Search Algorithm -- 14.3.2 Popular Meta-Heuristic Algorithms -- 14.3.3 Multi-objective Optimization -- 14.3.4 The Main Algorithm for the MPMCPITC Problem -- 14.4 Portfolios' Applications with Real-World Data -- 14.4.1 Application in 4 Stocks' Portfolio -- 14.4.2 Application in 8 Stocks' Portfolio -- 14.4.3 Application in 12 Stocks' Portfolio -- 14.4.4 Application in 16 Stocks' Portfolio -- 14.4.5 Results and Performance Comparison of BAS, BA, FA and GA -- 14.5 Conclusion -- References -- 15 On Interval-Valued Multiobjective Programming Problems and Vector Variational-Like Inequalities Using Limiting Subdifferential -- 15.1 Introduction -- 15.2 Definitions and Preliminaries -- 15.3 Relationship Between (GMVVLI), (GSVVLI) and (IVMPP) -- 15.4 Relationship Between (WGMVVLI), (WGSVVLI) and (IVMPP) -- 15.5 Existence Results for (GMVVLI) and (GSVVLI) -- 15.6 Conclusions -- References -- 16 Portfolio Optimization Using Multi Criteria Decision Making -- 16.1 Introduction -- 16.2 An Overview of Multi Criteria Decision Making (MCDM) Process -- 16.3 Classification of Multi Criteria Decision Making Processes -- 16.4 Quantitative Techniques Applied for the MCDM -- 16.5 Financial Decision Problem. , 16.6 Risk Modeling and SWOT Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Paleobiology-India. ; Plate tectonics-India. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (472 pages)
    Edition: 1st ed.
    ISBN: 9783030497538
    Series Statement: Vertebrate Paleobiology and Paleoanthropology Series
    Language: English
    Note: Intro -- Foreword -- References -- Preface -- Contents of the Volume -- References (those listed in Prof. Ashok Sahni's bibliography below are not included here) -- Bibliography of Ashok Sahni -- Contents -- Contributors -- 1 First Ornithischian and Theropod Dinosaur Teeth from the Middle Jurassic Kota Formation of India: Paleobiogeographic Relationships -- Abstract -- Introduction -- Geological Setting -- Age -- Methods and Materials -- Locality Information -- Fossils Collected -- Institutional Abbreviations -- Systematic Paleontology -- Discussion -- Biogeographic Links of the Kota Vertebrate Fauna -- Conclusions -- Acknowledgements -- References -- 2 Upper Gondwana (Jurassic to Early Cretaceous) Palynoflora of India: Its Correlation with Other Gondwana Continents and Phytogeographical Implications -- Abstract -- Introduction -- Geological Setting and Lithostratigraphy -- Jurassic -- Early Cretaceous -- Palynosequencing of the Jurassic and Early Cretaceous Deposits -- Jurassic -- Inter-basinal Correlation -- Jurassic-Cretaceous Boundary -- Early Cretaceous -- Inter-basinal Correlation -- Tectonics Versus Eustasy -- Intra-Gondwanan Correlation -- Paleovegetation and Paleoenvironment -- Phytogeography -- Conclusions -- Acknowledgements -- References -- 3 A Third, Remarkably Small, Tribosphenic Mammal from the Mesozoic of Australia -- Abstract -- Introduction -- Methods -- Type Locality -- Type Horizon, Rock Unit and Age -- Institutional Abbreviation -- Systematic Paleontology -- Discussion and Conclusions -- Acknowledgements -- References -- 4 Evidence for a Remarkably Large Toothed-Monotreme from the Early Cretaceous of Lightning Ridge, NSW, Australia -- Abstract -- Introduction -- Institutional Abbreviations -- Systematic Paleontology -- Conclusions -- Acknowledgements -- References. , 5 Role of Plate Tectonics and Global Climate Change in the Evolution of Angiosperms -- Abstract -- Introduction -- Palynological Records -- Pre-cretaceous Records -- Early Cretaceous Records -- Late Cretaceous Records -- Discussion -- Evolution of Angiosperm -- Angiosperm Evolution versus Tectonics -- Paleobotanical Records of Angiosperm Evolution -- Future Prospects -- Acknowledgements -- References -- 6 Anuran Lissamphibian and Squamate Reptiles from the Upper Cretaceous (Maastrichtian) Deccan Intertrappean Sites in Central India, with a Review of Lissamphibian and Squamate Diversity in the Northward Drifting Indian Plate -- Abstract -- Introduction -- Repository -- Systematic Paleontology -- Taxonomic Status of Amphibians and Squamates from the Maastrichtian of India: An Overview -- Amphibians -- Squamates -- Comparison with the Anuran and Squamate Diversities in Other Continents -- Conclusions -- Acknowledgements -- References -- 7 Chelonian Pelomedusoides Remains from the Late Cretaceous of Upparhatti (Southwestern India): Systematics and Paleobiogeographical Implications -- Abstract -- Introduction -- Geology -- Turtle Yielding Cretaceous Localities of India -- Southwestern India -- Upparhatti, Belgaum District, Karnataka State (Fig. 7.1G) -- Western India -- Worli Hill (Fig. 7.1C) -- Amboli (Fig. 7.1B) -- Lakshmipur, Kachchh, Gujarat State (Fig. 7.1A) -- Central India -- Kisalpuri, Dindori District, Madhya Pradesh State (Fig. 7.1D) -- Pisdura Area, Chandrapur District, Maharashtra State (Fig. 7.1F). -- Dongargaon, Chandrapur District, Maharashtra State (Fig. 7.1F) -- Southeastern India -- Kunnam Locality, Perambalur District., Tamil Nadu State (Fig. 7.1H) -- Kallamedu Locality -- Material and Methods -- Abbreviations -- Systematic Paleontology -- Discussion -- Conclusion -- Taxonomic Implications -- Paleobiogeographical Implications. , Acknowledgements -- Appendix: Other Horizons of the Indian Subcontinent (Outside India) from Which a Pleurodiran was Documented -- References -- 8 The Age of Dinosaurs in the Land of Gonds -- Abstract -- Introduction -- Dinosaurs in Gondwana and Post-Gondwana Formations -- Dawn: The Beginnings of Dinosaurs in the Late Triassic -- Discovery of Indian Dinosaurs -- Lower Maleri Formation (Late Carnian-Early Norian) -- Upper Maleri Formation (Late Norian) -- Lower Dharmaram Formation (Rhaetian) -- End-Triassic Mass Extinction Event -- Day: Triumph of the Dinosaurs in the Jurassic -- Upper Dharmaram Formation (Early Jurassic, Hettangian) -- Lower Kota Formation (Sinemurian-Toarcian) -- Upper Kota Formation -- Upper Jurassic Bagra Formation -- Origin and Early Evolution of Sauropodomorpha -- Evening: Dinosaurs in the Drifting Indian Plate During the Cretaceous -- Nimar Sandstone (Cenomanian-Turonian) -- Lameta Formation (Maastrichtian) -- A Passage to India: Discovery of Cretaceous Dinosaurs -- The Lameta Dinosaurs -- Titanosaurs -- Abelisaurs -- Ankylosaurs -- Kallamedu Formation -- Dinosaur Eggs and Babies -- Dinosaur Coprolites and Food Preference -- Night: Death of the Dinosaurs -- Asteroid Impacts -- Chicxulub Crater, Yucatan Peninsula, Mexico -- Shiva Crater, Mumbai Offshore Basin, India -- Killing Mechanism -- Deccan Volcanism -- Impact-Induced Volcanism -- Aftermath of the K-Pg Extinction -- Acknowledgements -- References -- 9 Leaving Gondwana: The Changing Position of the Indian Subcontinent in the Global Faunal Network -- Abstract -- Introduction -- Methods -- Faunal Similarity Networks -- Global Patterns -- Data Collection -- Results and Discussion -- The Late Cretaceous of the Indian Subcontinent -- The Paleocene of the Indian Subcontinent -- The Eocene of the Indian Subcontinent -- Global Faunal Network of the Cretaceous and Paleogene. , Density, Centrality, and Modularity -- A Theoretical Paleocene Fauna from the Indian Subcontinent -- Conclusions -- Acknowledgments -- Appendix 1: Data and Bins -- Appendix 2: Faunal Network Function -- References -- 10 Island Africa and Vertebrate Evolution: A Review of Data and Working Hypotheses -- Abstract -- Introduction -- The Native African Fauna (Fig. 10.2) -- The Fauna of the Island Africa -- The Fate of the Native Fauna (Fig. 10.2) -- The Island Africa: an Underpopulated Biotic Province? -- Colonization of Island Africa by Newcomers (Figs. 10.4, 10.5) -- Africa as a Secondary Cradle -- The End of Isolation of Africa -- Conclusions -- Acknowledgements -- References -- 11 Contrasting Biomarker Signatures of Cretaceous and Early Paleogene Coal-Bearing Sediments During the Northward Flight of India -- Abstract -- Introduction -- Material and Methods -- Sampling -- Analytical Method -- Results -- Terpenoid Composition of Early Cretaceous Sediments -- Aliphatic Fraction -- Aromatic Fraction -- Terpenoid Composition of Eocene Sediments -- Aliphatic Fraction -- Aromatic Fraction -- Discussion -- Inferences from Early Cretaceous Terpenoids -- Inferences from Eocene Terpenoids -- Implications for Early Cretaceous and Eocene Vegetation of India -- Conclusions -- Acknowledgements -- References -- 12 New Specimens of Frugivastodon (Mammalia: Apatotheria) from the Early Eocene of India Confirm Its Apatemyid Status and Elucidate Dispersal of Apatemyidae -- Abstract -- Introduction -- Material and Methods -- Abbreviations -- Institutional Abbreviations -- Measurements -- Systematic Paleontology -- Phylogenetic Analysis -- Objectives and Methodology -- Results -- Discussion -- Discussion -- Relationships of Frugivastodon -- Geographic Origin of Frugivastodon and the Dispersal of Apatemyids -- Conclusions -- Acknowledgements -- References. , 13 Size Variation Amongst the Non-volant Mammals from the Early Eocene Cambay Shale Deposits of Western India: Paleobiogeographic implications -- Abstract -- Introduction -- Methodology -- Timing of India-Eurasia Collision -- A Brief Historical Background of Biogeographically Important Vertebrate Fossil Record (Including Mammals) from the Cretaceous-Paleogene (K-Pg) Interval of India -- Age of the Cambay Shale Mammals -- Size Variation Amongst the Non-volant Mammalian Groups Known from the Cambay Shale -- Evolutionary Relationship(s) of the Large-Sized Component (Perissodactyls) from the Cambay Shale -- Discussion -- Caveats -- Acknowledgements -- Appendix -- References -- 14 Indohyus, Endemic Radiation of Raoellid Artiodactyls in the Eocene of India and Pakistan -- Abstract -- Introduction -- Materials and Methods -- Acronyms -- Systematic Paleontology -- Discussion -- References -- 15 The Murine Cradle -- Abstract -- Introduction -- Previous Work -- Materials and Methods -- Systematics -- Great Morphological Variation of Early Murines -- Early Murine Evolution in the Semi-isolated Cradle of the Indian Subcontinent -- Interpretation -- Acknowledgments -- References -- 16 New Data on the Siwalik Murines, Rhizomyines and Ctenodactylines (Rodentia) from the Indian Subcontinent -- Abstract -- Introduction -- Previous Work -- Muridae -- Spalacidae -- Ctenodactylidae -- Material and Methods -- Systematics -- Phylogenetic Analyses -- Characters -- Spalacids -- Characters -- Paleobiogeography -- Conclusions -- Acknowledgements -- References -- 17 Dispersal of Miocene Hominoids (and Pliopithecoids) from Africa to Eurasia in Light of Changing Tectonics and Climate -- Abstract -- Introduction -- Hominoid Systematics -- The First Eurasian Apes: Early Catarrhine Dispersals Out of Africa in the Miocene. , How Many Transcontinental Ape Dispersal Events Occurred and Between Which Continents? Biogeographic Links to Phylogeny, Tectonics, and Climate.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Industries-Technological innovations-21st century. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (187 pages)
    Edition: 1st ed.
    ISBN: 9783030257781
    Series Statement: Studies in Big Data Series ; v.64
    DDC: 338.6
    Language: English
    Note: Intro -- Editorial -- Acknowledgements -- Contents -- Management of V.U.C.A. (Volatility, Uncertainty, Complexity and Ambiguity) Using Machine Learning Techniques in Industry 4.0 Paradigm -- 1 Introduction -- 1.1 Industry 4.0 Paradigm -- 1.2 V.U.C.A. Factors -- 1.3 Applied Machine Learning -- 2 Role of Some Common ML Techniques Applied in Industry 4.0 Platforms for V.U.C.A. Management -- 2.1 The Role of Linear Regression -- 2.2 The Role of Logistic Regression -- 2.3 The Role of Decision Tree -- 2.4 The Role of Random Forest -- 2.5 The Role of SVM -- 2.6 The Role of Naïve Bayes -- 2.7 The Role of kNN (k-Nearest Neighbors) -- 2.8 The Role of k-Means -- 3 V.U.C.A. Management in Industry 4.0 -- 4 Conclusion -- References -- Role of Industry 4.0 in Performance Improvement of Furniture Cluster -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Discussion and Conclusion -- Annexure: Explanation of Factors -- References -- Imparting Hands-on Industry 4.0 Education at Low Cost Using Open Source Tools and Python Eco-System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Strength Areas -- 4.1 MS Excel -- 4.2 IBM SPSS -- 4.3 R -- 4.4 GRETL -- 4.5 Python -- 5 Conclusion -- References -- Decision Support Framework for Smart Implementation of Green Supply Chain Management Practices -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Fuzzy DEMATEL -- 3.2 Fuzzy TOPSIS -- 3.3 Fuzzy SWARA -- 4 Problem Description -- 5 Proposed Framework to Rank Criteria -- 5.1 Phase I: Identification Key GSCM Criteria -- 5.2 Phase II: Ranking Criteria by Fuzzy DEMATEL -- 5.3 Phase III: Determining Weights by Fuzzy SWARA -- 5.4 Phase IV: Comparison of the Results -- 6 Implementation of Proposed Framework -- 6.1 Ranking the Criteria by Fuzzy DEMATEL -- 6.2 Ranking the Criteria by Fuzzy TOPSIS. , 6.3 Computing Weights by Fuzzy SWARA -- 6.4 Fuzzy TOPSIS for Ranking the Criteria -- 7 Results and Discussions -- 8 Managerial Implications -- 9 Conclusions -- References -- Decision Support System for Supply Chain Performance Measurement: Case of Textile Industry -- 1 Introduction -- 2 Supply Chain Management and Performance Measurement Systems -- 3 Textile Supply Chain -- 4 Decision Support System Using Balanced Score Card and Analytic Hierarchy Process -- 5 Research Case Problem -- 6 Methodology Used in Developing DSS -- 7 Case Study -- 8 Data Analysis -- 9 Results and Discussion -- 10 Managerial Implication -- 11 Conclusion -- 12 Limitation -- Appendix -- References -- A Review Study of Condition Monitoring and Maintenance Approaches for Diagnosis Corrosive Sulphur Deposition in Oil-Filled Electrical Transformers -- 1 Introduction -- 2 Literature Survey -- 2.1 Corrosive Sulphur Problem and Consequence -- 3 Currently Applied CM Techniques -- 3.1 Oil Analysis Technique -- 3.2 Electrical Testing Technique -- 3.3 Reaction Mechanism of Formation CSD -- 3.4 Maintenance Approaches -- 4 Result and Discussion -- 4.1 Gap in Implementation Relevant Oil Analysis -- 4.2 Gap in Implementation Relevant Electrical Testing -- 4.3 Gap in Relevant Corrosion Reaction Mechanism -- 4.4 Gap in Detection Relevant Gases By-Products -- 4.5 Outline of Capabilities and Shortcomings -- 5 Conclusion -- References -- Principal Components Based Multivariate Statistical Process Monitoring of Machining Process Using Machine Vision Approach -- 1 Introduction -- 2 Related Research Work -- 3 Multivariate Statistical Control Charts -- 3.1 Hotelling T2 Charts for Individual Observations -- 4 Data Dimensionality Reduction Using Principal Components Analysis -- 5 Machine Vision Approach for Extraction of Quality Parameters -- 6 PC Based MSPM Using MVS: A Case Study. , 6.1 Extraction of Dimensions -- 6.2 Extraction of Surface Texture -- 7 Methodology for PC Based MSPM Using MV -- 8 Results and Discussion -- 9 Conclusion -- References -- Green IS-Exploring Environmental Sensitive IS Through the Lens of Enterprise Architecture -- 1 Introduction -- 2 Green IS-IS Supporting Environmental Care in Firms -- 2.1 Green IS-The Need of a "Big Picture" -- 2.2 Organization Information Space and IS Information Fields -- 3 EA as a Meta-Architecture and Modelling of Green IS -- 4 Green IS as a Functioning Enterprise-EA View -- 4.1 Environmentally Sensitive Business Model (Row 2-Owner's Perspective) -- 4.2 Environmentally Supportive Systems Model (Row 3-Designer's Perspective) -- 4.3 Environmentally Enhanced Technology Model (Row 4-Builder's Perspective) -- 4.4 Scope of Green IS (Row 1-Scope or Planner's View) -- 5 Discussions -- 5.1 Green IS-Connecting the Views Together -- 5.2 OIC and Green IS-Interconnectivity -- 6 Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (480 pages)
    Edition: 1st ed.
    ISBN: 9783319939407
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies Series ; v.21
    DDC: 658.05
    Language: English
    Note: Intro -- Preface -- Editorial -- Contents -- About the Editors -- Digital Business Transformation -- Towards Algorithmic Business: A Paradigm Shift in Digital Business -- 1 Introduction -- 2 Emergence of Algorithms in Business -- 3 Digital to Algorithmic Transformation -- 4 Deployment Strategies of IoT -- 5 Business Algorithms -- 5.1 Google's Algorithms -- 5.2 Amazon's Algorithm -- 5.3 Face Book's News Feed Algorithm -- 6 Applications -- 6.1 Manufacturing Industries -- 6.2 Health Care Industries -- 6.3 Smart Products -- 6.4 Retail and E-Commerce Industries -- 6.5 Smart Cities -- 6.6 Education Industries -- 6.7 Airline Industry -- 6.8 Human Resources -- 6.9 Transportation -- 6.10 Stock Trading -- 7 Challenges -- 8 Conclusion -- References -- A Decentralized Business Ecosystem Model for Complex Products -- 1 Introduction -- 2 Background and Methodology -- 2.1 Business Ecosystems -- 2.2 Methodology -- 3 Overall Objectives -- 3.1 Complex Product Scenarios -- 3.2 Business Goals -- 3.3 Requirements -- 4 Related Work -- 5 Outlining a Decentralized Business Ecosystem for Complex Products -- 5.1 Model and Concept -- 5.2 Ecosystem Structure -- 6 Ecosystem Architecture -- 6.1 High-Level Overview -- 6.2 Peer Application -- 6.3 Decentralized Market Space (DMS) -- 6.4 Inner Workings: Transaction Process for Complex Products -- 6.5 Demonstrator -- 7 Conclusions and Outlook -- References -- Compliance Management in Business Processes -- 1 Introduction or Overview -- 2 Compliance Management-Concepts and Terminology -- 3 Case Study -- 4 The Compliance Management Lifecycle -- 4.1 Elicitation -- 4.2 Formalization (Specification) -- 4.3 Implementation -- 4.4 Supervision -- 4.5 Improvement -- 5 Compliance Monitoring Functionalities (CMFs) -- 6 Challenges -- 7 Conclusion -- References -- Cloud Computing. , Sustainable Cloud Computing Realization for Different Applications: A Manifesto -- 1 Introduction -- 2 Sustainable Cloud Computing: Architecture -- 3 State-of-the-Art: Application Management -- 4 Taxonomy of Application Management for Sustainable Cloud Computing -- 4.1 QoS Parameter -- 4.2 Application Parameters -- 4.3 Application Scheduling -- 4.4 Application Category -- 4.5 Application Domain -- 4.6 Resource Administration -- 4.7 Coordination -- 4.8 Application Model -- 5 Gap Analysis and Future Research Directions -- 5.1 Application Modeling -- 5.2 Resource Management -- 5.3 Energy Efficiency -- 5.4 Reliability and Fault Tolerance -- 5.5 Security and Privacy -- 5.6 Scalability -- 5.7 Latency -- 5.8 Data Management -- 5.9 Auditing -- 5.10 New Technological Developments -- 6 Summary and Conclusions -- References -- Auction Based Scheme for Resource Allotment in Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 A Taxonomy of Market Technical Aspects -- 2.2 Auction Theory -- 3 Market-Based Resource Management Model -- 4 Objective and Design of Proposed Algorithm -- 4.1 Architecture of Cloud -- 4.2 Proposed Resource Allocation Algorithm -- 4.3 Simulation Parameters -- 5 Result and Discussion -- 6 Conclusion -- Appendix: Flow Chart of the Proposed Auction Algorithm -- References -- M-Cloud Computing Based Agriculture Management System -- 1 Introduction -- 2 Problem in Agriculture -- 2.1 Linkage Problems -- 2.2 Weather Information -- 2.3 Transportation and Infrastructure -- 2.4 Agriculture Marketing -- 2.5 Credit Facilities -- 2.6 Storage of Food Grains -- 3 Cloud Computing -- 4 Agriculture with M-Cloud Computing -- 4.1 Crop Disease Identification Management -- 4.2 Smarter Agricultural Practices -- 4.3 Supporting Vegetable and Crop Production -- 5 M-Cloud Computing with Big Data -- 6 Advantages of M-Cloud Computing in Agriculture -- 7 Conclusion. , References -- IOT & -- Mobility -- Detection and Analysis of Drowsiness in Human Beings Using Multimodal Signals -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Databases -- 3.2 Drowsiness Detection -- 3.3 EEG Signal Classification -- 3.4 SVM Classifier -- 3.5 Yawning Detection -- 4 Results and Conclusion -- 4.1 Using EEG Signals -- 4.2 Using Video Signals -- 5 Conclusion -- References -- Enhancing Security and Privacy in Enterprises Network by Using Biometrics Technologies -- 1 Introduction -- 2 Inter-entreprises Cooperation -- 3 Interest of Business Networks -- 3.1 Business Networks and Internet Worldwide -- 3.2 Sensitive Business Information -- 4 Information Security and Privacy -- 4.1 Cryptography Process -- 4.2 Biometrics Process -- 4.3 Crypto-Biometric Security System -- 5 Crypto-Biometric Based EN Security -- 6 Proposed Security Solution for Enterprises Information -- 6.1 Preliminary -- 6.2 Encryption and Key Embedded Process -- 6.3 Decryption and Key Retrieval Process -- 7 Experimental Setup -- 8 Security Analysis -- 8.1 Unimodal Biometric Cryptosystem -- 8.2 Multimodal Biometric Cryptosystem -- 9 Conclusion and Further Works -- References -- Lightweight Context-Based Web-Service Composition Model for Mobile Devices -- 1 Introduction -- 2 Related Work -- 3 Overview -- 3.1 Parts of Speech (POS) Tagging -- 3.2 Markov Chain Probabilistic Model -- 3.3 Trie Data Structure -- 4 Methodology and Implementation -- 4.1 Get Natural Language Query from the User -- 4.2 Preparing the Corpus -- 4.3 Framing Sample Sentences -- 4.4 Using Markov Chain Probabilistic Model -- 4.5 Identifying Service Names from the Sentence -- 4.6 API's and Libraries Used in Web Service -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- On Weighted Extended Cumulative Residual Entropy of k-th Upper Record -- 1 Introduction. , 2 WECREn and Its Dynamic Form -- 3 Characterization Results -- 4 Empirical Approach -- 5 Conclusion and Future Work -- References -- Impact of Mobility in IoT Devices for Healthcare -- 1 Introduction -- 1.1 Research Description -- 1.2 Extent amp Objectives of the Research -- 1.3 Significance of the Research -- 1.4 Applications of the Research -- 2 Literature Survey -- 3 Problem Statement for Impacts of Mobility in IoT Devices for Healthcare -- 3.1 Difficulties Which Impact of Mobility in IOT Devices for Healthcare Sector -- 3.2 Existing System Scenarios -- 3.3 Disadvantages of Existing System -- 3.4 Proposed System -- 3.5 Advantages of Proposed System -- 4 System Security Standards -- 5 Security Healthcare Challenges -- 6 Mobility Issues -- 7 System Design -- 8 Performance Analysis -- 9 Disadvantages in Traditional Method -- 10 Conclusion -- 11 Future Work -- Bibliography -- Multiple Mobile Elements Based Energy Efficient Data Gathering Technique in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Practical Understanding of Unresolved Issues -- 3.1 Motivation -- 4 Proposed Solution -- 4.1 Overview of the Proposed Work EEDGMME -- 4.2 Detailed Explanation of Inclusive Algorithms -- 5 Simulation Experiments -- 5.1 Simulation Model for EEDG and EEDGMME Techniques -- 5.2 Performance Metrics -- 5.3 Performance Analysis of EEDGMME and EEDG Techniques -- 5.4 Comparative Performance Analysis -- 6 Conclusion and Future Work -- References -- Information Management & -- Social Media -- Online Social Communities -- 1 Introduction -- 2 Types of Social Communities -- 3 Evolution of Technology for ONSC -- 4 Online Social Community -- 4.1 Pre-requisite for ONSC -- 4.2 Types of ONSC -- 5 Online Social Community Management -- 5.1 User Acquisition Factor -- 5.2 User Engagement Factor -- 5.3 User Retention Factors -- 5.4 ONSC and User's Perspective. , 5.5 Recommender Systems from ONSC -- 5.6 ONSC User Engagement Tools -- 6 ONSC Structure Detection -- 6.1 Detection of Communities in Static Networks -- 6.2 Detection of Communities in Dynamic Networks -- 7 Applications -- 8 Conclusion -- References -- The 'Verticals', 'Horizontals', and 'Diagonals' in Organisational Communication: Developing Models to Mitigate Communication Barriers Through Social Media Applications -- 1 Introduction -- 2 Review of Literature -- 2.1 History of Communication Skills -- 2.2 New Capitalism: Services Sector and Linguistic Requirements -- 2.3 Rhetorics of Communication and Workplace Demands -- 3 Communication Model and the Channels: A Brief Review -- 3.1 The Model of Communication -- 3.2 Communication Flows -- 3.3 Barriers to Communication -- 4 New Technologies for Communication -- 4.1 Technologisation of Communication -- 4.2 Capitalising Social Tools as an Organisational Discourse -- 5 Social Tools -- 6 Conclusion: Scope, Limitations, and Future Directions -- References -- Subjective Interestingness in Association Rule Mining: A Theoretical Analysis -- 1 Introduction -- 2 Knowledge Discovery in Databases -- 2.1 Association Rule Mining -- 3 Interestingness -- 3.1 Objective Interestingness -- 3.2 Subjective Interestingness -- 4 Classification Framework for Subjective Interestingness -- 5 Discussion and Conclusions -- References -- Identifying Sentiment of Malayalam Tweets Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Support Vector Machines -- 3.2 Random Mapping: Random Kitchen Sink Method -- 3.3 Regularized Least Square Method for Classification (RLSC) -- 3.4 Deep Learning Methods-CNN, LSTM -- 4 Experimental Setup -- 4.1 Dataset Description -- 4.2 Preprocessing -- 4.3 Models -- 4.4 Evaluation -- 5 Result and Analysis -- 6 Conclusion -- References. , Twitter Based Sentiment Analysis of GST Implementation by Indian Government.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...