GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Cytology ; Radiology, Medical ; Human Physiology ; Human physiology ; Neurosciences ; Stem cells ; Nanotechnology ; Oxidative stress. ; Radiology. ; Stroke physiopathology ; Stroke therapy ; Risk Factors
    Description / Table of Contents: Chapter 1. Cerebral stroke: An Introduction -- Chapter 2. Inflammation, oxidative stress, and neurodegeneration -- Chapter 3. Stroke induced blood brain barrier damage -- Chapter 4. Regulation of calcium ions in ischemic neuronal cell -- Chapter 5. Ischemic stroke induced endoplasmic reticulum stress -- Chapter 6. The role of autophagy in ischemic stroke: friend or foe?- Chapter 7. Critical role of mitochondrial autophagy in cerebral stroke -- Chapter 8. Application of neuroimaging in the identification of the pinpoint location of blockage -- Chapter 9. Emerging role of the electromagnetic field in stroke -- Chapter 10. Stem cell therapies for stroke -- Chapter 11. MicroRNA: Significance to stroke diagnosis, prognosis, and therapy -- Chapter 12. Therapeutic Aspects of Nanomedicines in Stroke Treatment -- Chapter 13. Neuroprotective potential of small molecule phytochemicals against stroke -- Chapter 14. Role of UV irradiation on neuroprotective potential of phytochemicals -- Chapter 15. Post-stroke treatment strategies, management, and rehabilitation
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (VIII, 189 p. 23 illus., 12 illus. in color)
    ISBN: 9789811314537
    Series Statement: Springer eBooks
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Mechatronics-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (604 pages)
    Edition: 1st ed.
    ISBN: 9789811618437
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1220
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Mechatronics -- 1 Simulation of Off-Wheel Problem of Triangle Tracked Vehicle Based on RecurDyn -- Abstract -- 1 Introduction -- 2 Structure and Relevant Technical Parameters of Triangular Track -- 3 Simulation Test -- 3.1 Virtual Prototype Modeling -- 3.2 Simulation Test on off-Wheel Problem of Track -- 3.3 Simulation Test on Vehicle S Bend -- 4 Conclusion -- References -- 2 Brief Design Requirements of Screen Printing Stencil -- Abstract -- 1 Introduction -- 2 Stencil Design -- 2.1 Frame Design of Circuit Board Stencil -- 2.2 Design of Stencil Tension Net -- 2.3 Mark Point Design of Stencil -- 2.4 Aperture Design of Stencil -- 2.5 Thickness Design of Stencil -- 3 Requirements for Opening Size and Shape of Stencil -- 3.1 Chip Components-Resistors, Inductors, Capacitors -- 3.2 Power MOSFET -- 3.3 QFP, SOP, QFN, IC -- 3.4 BGA -- 4 Conclusion -- References -- 3 Review of Improved Collaborative Filtering Recommendation Algorithms -- Abstract -- 1 Introduction -- 2 Overview of Traditional Collaborative Filtering Algorithms -- 2.1 User-Based Collaborative Filtering Recommendation Algorithm -- 2.2 Item-Based Collaborative Filtering Recommendation Algorithm -- 2.3 Model-Based Collaborative Filtering Recommendation Algorithm -- 3 Improvement and Application of Collaborative Filtering Algorithm -- 3.1 The New Theory Is Introduced into Collaborative Filtering -- 3.2 Data Dynamic Analysis Combined with Collaborative Filtering -- 3.3 Combination of Data Rule Mining and Collaborative Filtering -- 4 Conclusion -- References -- 4 A Preliminary Study on the Application of Computer Technology in Physical Education -- Abstract -- 1 Introduction -- 2 Design of Instructional Model of Autonomous Physical Education Based on Computer Technology -- 2.1 Part Before Class -- 2.2 Part in Class -- 2.3 Part After Class. , 3 Application Analysis of Physical Education Teaching Model Based on Computer Technology -- 3.1 Experimental Subject -- 3.2 Experimental Procedure -- 3.3 Experimental Method -- 3.4 Experimental Result -- 4 Conclusion -- References -- Intelligent Systems -- 5 Design of Archives Management System for Teaching -- Abstract -- 1 Introduction -- 2 Requirement Analysis of System and Database Design -- 2.1 Requirement Analysis -- 2.2 System Functional Structure Design -- 2.3 Database Design -- 3 System Function Realization -- 3.1 Login Module Design -- 3.2 Registration Module Design -- 4 System Test and Operation Result Analysis -- 5 Conclusion -- Acknowledgements -- References -- 6 An Algorithm for Distinguishing Between Speech and Music -- Abstract -- 1 Introduction -- 2 Audio-Related Features -- 3 Algorithm Steps -- 4 Experimental Result -- 5 Summary -- Acknowledgements -- References -- 7 Research on Multiple Overlapping Speakers Number Recognition Based on X-Vector -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 X-Vector -- 2.2 Data Preprocessing -- 2.3 Improving of Feature Extraction -- 3 Experimental Results -- 4 Conclusions -- References -- 8 Discussion on Production Technology and Testing Technology of 1553B Bus Cable Net for Satellite -- Abstract -- 1 Introduction -- 2 Composition of 1553B Bus Cable -- 2.1 1553B Cable Structure -- 2.2 Composition of 1553B Bus Cable -- 3 1553B Bus Cable Network Assembly Process -- 4 1553B Bus Cable Network Installation Quality Test -- 4.1 Bus Cable Net Appearance Inspection -- 4.2 1553B Bus Cable Network Static Performance Test -- 4.3 1553B Bus Cable Network Dynamic Performance Test -- 5 Conclusion -- References -- 9 Feasibility Analysis of Venture Capital Committee in the Innovative Design of Class Management in Colleges and Universities -- Abstract -- 1 Introduction. , 2 Major Pain Points of Class Management in Colleges and Universities -- 2.1 Different Opinions About Head Teacher's Impact on Class -- 2.2 Weak Initiative of Class Cadre -- 2.3 A General Lack of Class Fee -- 2.4 Little Contact with Classes After Graduation -- 3 Pain Points Analysis of Class Management in Colleges and Universities -- 3.1 Urgent Need of System Construction Innovation -- 3.2 Difference in Value Proposition -- 3.3 Foundation -- 3.4 Repulsion and Practical Difficulties -- 4 Innovative Design of Class Management in Colleges and Universities -- 4.1 Description of Class Management Tools -- 4.2 The Feasibility Analysis of Innovative Design -- 5 Conclusions -- Acknowledgements -- References -- 10 A Survey and Study on Satisfaction and Influencing Factors Using Ant Credit Pay via Intelligent Processing -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Data Analysis Method and Theoretical Basis -- 3.1 Chi-Square Test Principle -- 3.2 Principle of Correlation Analysis -- 3.3 Satisfaction Principle -- 3.4 Establishing the Satisfaction Index System -- 4 Analysis on the Satisfaction and Influencing Factors -- 4.1 Reliability Analysis and Validity Analysis of Data -- 4.2 Analysis of College Students' Satisfaction with Using "Ant Credit Pay" -- 4.3 Analysis of College Students' Satisfaction -- 4.4 Analysis of Influencing Factors -- 5 Some Suggestions -- 5.1 Individual Consumption Needs to Be Tailored -- 5.2 Pay Attention to Self-credit and Enhance Self-protection Consciousness -- 5.3 Appropriately Reduce the Withdrawal Procedure Rate and Expand the Use of "Ant Credit Pay" in Daily Life -- References -- 11 A Review on Main Optimization Method of ALBERT in Natural Language Processing -- Abstract -- 1 Introduction -- 2 Recent Development -- 3 Solve the Problem of Insufficient Text Word Vector Learning by Classifying the Output Features of ALBERT. , 4 Solve the Problem of Gradient Explosion and Disappearance in the Process of Long Text Training by Combining the Bi-LSTM Model -- 5 By Combining CRF Model to Better Recognize Long Texts -- 6 By Combining the BiGRU Model to Maximize the Preservation of the Semantic Association of Word Vectors in Long Texts -- 7 Conclusion -- References -- 12 Study on the Influencing Factors of Customer Loyalty in Large Smart Home Furnishing Stores -- Abstract -- 1 Introduction -- 2 Related Theory of Influencing Factors of Customer Loyalty -- 2.1 Experience Marketing -- 2.2 Customer Satisfaction -- 2.3 Measurement of Customer Loyalty -- 3 Establishment of Influencing Factor Model of Customer Loyalty -- 3.1 Selection of Modeling Dimension -- 3.2 Research Hypothesis -- 3.3 Description of Research Model -- 4 Data Analysis on Influencing Factors of Customer Loyalty -- 4.1 Reliability Test -- 4.2 Correlation Analysis -- 4.3 Regression Analysis -- 5 Summary -- References -- 13 A Detection Algorithm of Lung Nodule Based on Faster R-CNN -- Abstract -- 1 Introduction -- 2 Deep Learning Detection Framework and Faster R-CNN -- 2.1 Feature Extraction Network -- 2.2 RPN -- 2.3 ROI Pooling -- 2.4 Classifier -- 3 Pulmonary Nodule Detection Network -- 3.1 Improvement of Feature Extraction Network -- 3.2 Modify Anchors -- 4 Experimental Data and Result Verification -- 4.1 Dataset -- 4.2 Evaluation Criterion -- 4.3 Experimental Result -- 5 Conclusion -- References -- 14 Information Extraction from Contract Based on BERT-BiLSTM-CRF -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Algorithm Model -- 3.1 Contract-Based Language Model (BERT) -- 3.2 BiLSTM-CRF Method Based on Migration Optimization -- 4 Test Results and Analysis -- 5 Concluding Remarks -- References -- 15 Research on Linear Detection Technology for Massive MIMO in Wireless Communications -- Abstract. , 1 Introduction -- 2 Model of Massive MIMO Uplink System -- 3 Linear Detection Algorithm for Massive MIMO System -- 3.1 Linear Detection Algorithm -- 3.1.1 Maximum Ratio Combining Algorithm (MRC) -- 3.1.2 Zero-Forcing Algorithm (ZF) -- 3.1.3 Minimum Mean Square Error Detection Algorithm (MMSE) -- 3.2 Simulation -- 4 Conclusion -- References -- 16 Research on Intelligent Reconfiguration and Recognition Technology of Mobile Environment for Substation Operation -- Abstract -- 1 Introduction -- 2 Object Scanning and Modeling -- 3 Modeling and Scanning Modeling of Dynamic Complex Environment -- 4 Weak Supervision Instance Segmentation of Substation Equipment Based on RGB-T Self Labeling -- 5 Model Compression and Acceleration for Edge Devices -- 6 Research and Development of Environment Intelligent Reconfiguration and Recognition Prototype System for Mobile Side Software and Hardware Platform -- 7 Conclusion -- References -- 17 Development and Application of Power Grid Disaster Intelligent Perception and Emergency Command System -- Abstract -- 1 Introduction -- 2 Electric Power Disaster Emergency Situation Map and 3D Visual Command Technology -- 3 Research and Development of Power Grid Disaster Intelligent Perception and Emergency Command Prototype System -- 4 Conclusions -- Acknowledgements -- References -- 18 Research on State Perception of Power Grid Equipment Based on Intelligent Analysis of Multi-Spectral Data -- Abstract -- 1 Introduction -- 2 Feature Distribution and Time-Domain Correlation of PoWer Equipment Status Under Different Spectrums -- 3 Online Monitoring and Fault Warning of Electrical Equipment Status of Stations and Transmission Lines -- 4 Establish a Sample Library of Power Equipment Faults Based on Three-Light Fusion Imaging -- 5 Comprehensive Evaluation Method of Multi-Spectral Data Analysis Model -- 6 Conclusions -- Acknowledgements. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (856 pages)
    Edition: 1st ed.
    ISBN: 9783030343873
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1084
    DDC: 006.3
    Language: English
    Note: Intro -- 4th International Conference on Intelligent and Interactive Systems and Applications (IISA2019) -- Editorial -- Acknowledgements -- Contents -- Intelligent Systems -- Recognition of Voiceprint Using Deep Neural Network Combined with Support Vector Machine -- Abstract -- 1 Introduction -- 2 Methods -- 3 Voiceprint Recognition Based on DBN-SVM -- 3.1 Experimental Procedures and Processes -- 3.2 Corpus Description and MFCC Extraction -- 3.3 DBN Training and Deep Feature Extraction -- 3.4 Experimental Result and Analysis -- 4 Conclusion -- Acknowledgments -- References -- Research on Intelligent Patent Classification Scheme Based on Title Analysis -- Abstract -- 1 Introduction -- 2 Topic-Based Patent Classification Scheme -- 2.1 The Process of Topic-Based Patent Classification Scheme -- 2.2 Results and Discussion -- 3 Title Word-Frequency-Based Patent Classification Scheme -- 3.1 The Process of Title Word-Frequency-based Patent Classification Scheme -- 3.2 Results and Discussion -- 4 Conclusions -- References -- Study on Intelligent Recognition Matching and Fusion Interaction Technology of Electrical Equipment Model -- Abstract -- 1 Introduction -- 1.1 Background -- 1.2 Purpose and Significance -- 1.3 Overseas Research Levels -- 1.4 Domestic Research Levels -- 2 Solutions and Key Technologies -- 2.1 Power Equipment Model Identification -- 2.2 Panoramic Model and Background Real-Time Monitoring Data Fusion Interaction -- 2.3 Physical Device Model Overlay and Virtual Integration -- 2.4 Model Control Interaction -- 3 Conclusion -- Acknowledgments -- References -- Deep Knowledge Tracing Based on Bayesian Neural Network -- Abstract -- 1 Introduction -- 2 Related Works -- 3 BDKT -- 3.1 BDKT Input Data -- 3.2 BDKT Model Structure -- 3.3 BDKT Parameter Learning -- 4 Results and Discussion -- 4.1 BDKT Vs DKT. , 4.2 BDKT Parameter Randomness and Model Uncertainty -- 4.3 Relationship Between the Students' Behaviors -- 5 Conclusion -- Acknowledgment -- References -- Co-simulation of Sub-frame of the Intelligent Fire Truck Based on SolidWorks and ANSYS Workbench -- Abstract -- 1 Introduction -- 2 Main Technical Difficulties -- 2.1 The Connection Problem -- 2.2 Contact Settings -- 2.3 Meshing -- 3 Load Loading -- 4 Simulation Results -- 4.1 Static Simulation Without Impact Force -- 4.2 Static Simulation with Impact Force -- 4.3 Modal Analysis of the Overall Structure -- 5 Conclusion -- Acknowledgments -- References -- Design of Framework on Intelligent Simulation and Test Platform for High Power Microwave Sources -- Abstract -- 1 Introduction -- 2 Requirement Analyses -- 2.1 User Requirements -- 2.2 Functional Requirements -- 2.3 Interface Requirements -- 3 Frame Design -- 3.1 Development Language Selection -- 3.2 Design Model -- 3.3 Design Method -- 3.4 Computing Model -- 4 Technical Support -- Acknowledgments -- References -- Design of Intelligent Meter Life Cycle Management System Based on RFID -- Abstract -- 1 Introduction -- 2 Anti-collision Algorithm Processing of RFID Signal -- 3 Composition of the Life Cycle Management System -- 3.1 Cloud Platform Management System -- 3.2 RFID Intelligent Meter Storage System -- 3.3 RFID Smart Meter On-Site Data Copying System -- 4 Design of RFID Electronic Tag Antenna -- 5 Conclusion -- Acknowledgements -- References -- Design of Single-Phase Intelligent Meter Based on RFID Semi Active Technology -- Abstract -- 1 Introduction -- 2 Overall Design of Smart Meter -- 3 Hardware Design of Smart Meter -- 3.1 CPU Module -- 3.2 Metering Module -- 3.3 Communication Module -- 3.4 Clock and Storage Module -- 4 Software Design -- 4.1 Overall Structure of the Software -- 4.2 RFID Interface Design Based on Three-Tier Architecture. , 5 System Debugging -- 6 Conclusion -- Acknowledgements -- References -- Research on Anti-fall Algorithms of Substation Intelligent Inspection Robot -- Abstract -- 1 Introduction -- 2 Design of Inspection Platform -- 3 Ranging Principle of Binocular Camera -- 4 Application Principle of Anti-falling -- 5 Design and Analysis of Algorithms -- 6 Conclusion -- References -- Research and Application of Process Object Modeling Method Based on Deep Learning -- Abstract -- 1 Introduction -- 2 DNN Deep Learning Algorithms -- 3 Modeling of DNN Deep Learning Network -- 3.1 Open-Loop Modeling Method Based on Multiple Inertial Filters -- 3.2 Closed-Loop Modeling Method Based on Two DNN Models -- 4 Conclusion -- References -- Performance Assessment of Smart Electricity Meters Based on Max Margin Bayesian Classifiers -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Feature Selection Based on Genetic Algorithm -- 2.2 Learning Max-Margin Bayesian Classifiers Based on Bagging Ensemble -- 2.3 Selecting Max Margin Bayesian Classifiers Subset Based on Clustering Algorithm -- 3 Experimental Results and Analysis -- 4 Conclusions and Future Works -- References -- Operating Performance Assessment of Smart Meters Based on Bayesian Networks and Convex Evidence Theory -- Abstract -- 1 Introduction -- 2 The Proposed Methodology -- 2.1 Discretization -- 2.2 Training of Bayesian Networks from Historical Data of Smart Electricity Meters -- 2.3 Using the Convex Evidence Theory to Integrate the Assessment Results of Bayesian Networks -- 3 Experimental Results and Analysis -- 4 Conclusions and Future Works -- Acknowledgments -- References -- Research on Object-Oriented Design Defect Detection Method Based on Machine Learning -- Abstract -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 2 Software Design Defects -- 2.1 Related Concepts -- 2.2 Related Definition. , 3 Design Defect Detection Method -- 3.1 Design Defect Detection -- 3.2 Feature Extraction -- 3.3 Design Defect Classifier Algorithms -- 3.4 Design Defect Detection Algorithms -- 4 Experiment and Evaluation -- 4.1 Experiment -- 4.2 Result Analysis -- Acknowledgments -- References -- Design of Electromagnetic Energy-Saving Intelligent Vehicle -- Abstract -- 1 Introduction -- 2 Principles of Operation -- 3 Test Results -- 4 Conclusion -- Acknowledgments -- References -- New Energy Vehicle Reliability Research by Large Data -- Abstract -- 1 Introduction -- 2 Reliability Analysis Theory -- 3 Acquisition of Automobile Fault Data -- 4 Calculation of Equivalent Fault Number Change Curve of Automobile in Different Mileage Ranges -- 4.1 Establishing the Curve of Vehicle Type Changing with the Number of Mileage Faults -- 4.2 Classification of Fault Hazard Degree -- 4.3 Calculation of Equivalent Fault Number Change Curve of Automobile in Different Mileage Ranges -- 5 Calculation of Reliability Evaluation Index of Vehicle Type -- 6 Establishment of Comprehensive Evaluation Model of Vehicle Type Reliability -- 7 Conclusion -- References -- One-Step Prediction for GM(1,1) with a Sliding Data Window -- Abstract -- 1 Introduction -- 2 The GM(1,1) Model -- 3 Introducing the Sliding Data Window to GM(1,1) -- 4 The Requirements of Data Samples for GM(1,1) -- 5 Experimental Results -- 6 Conclusions -- Acknowledgement -- References -- Evaluation on Well-Canal Combined Irrigation Modes for Cotton Fields in the South of Xinjiang, China Based on an Algorithm of Fuzzy Neutral Network -- Abstract -- 1 Background -- 2 Flow and Steps of the Algorithm -- 2.1 Flow of Algorithm for Fuzzy Neural Network -- 2.2 Steps of the Algorithm -- 3 Mathematical Principles of the Algorithm -- 3.1 Principles of Fuzzy Mathematics and FNN -- 3.2 Fuzzy Function and FNN -- 4 Empirical Analysis. , 4.1 Prediction Image of Training Data Based on FNN Algorithm -- 4.2 Results -- 5 Conclusions -- Acknowledgements -- References -- Grape Downy Mildew On-line Detection Based on Accurate Image Processing Method Preformed on Embedded Ambient Intelligence System -- Abstract -- 1 Introduction -- 2 Intelligent Image Processing -- 2.1 Holistic Methods Organization Chart -- 2.2 Image Processing -- 2.3 Decrease of Disturbance of Leaf Vein -- 3 System Design -- 4 GDM Diagnose, Grading and Preventive Measures -- 5 Conclusion -- Acknowledgments -- References -- An Improved Bisecting K-Means Text Clustering Method -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Data Processing -- 3.1 Corpus Acquisition -- 3.2 Data Extraction Using Word2Vec -- 3.3 Using TF-IDF to Select Feature Word Vector -- 4 The Improved Bisecting K-Means Text Clustering Method -- 4.1 Bisecting K-Means Clustering -- 4.2 Improved Bisecting K-Means Algorithm -- 5 Experimental Results Analysis -- 5.1 Experimental Process -- 5.2 Experimental Results -- 6 Conclusion -- Acknowledgements -- References -- PLC-Based Control System Design of Intelligent and Efficient Multiple Parking Device -- Abstract -- 1 Introduction -- 2 Structure and Principle of Intelligent and High Efficiency Multiple Parking Device -- 3 Design of Control System -- 4 Design of System Hardware -- 5 Design of System Software -- 5.1 The Initialization of System -- 5.2 The Procedure of Storage Car -- 5.3 The Rotation of Motor -- 6 Conclusion -- Acknowledgement -- References -- Sparse Acceleration Algorithm Based on Likelihood Upper Bound -- Abstract -- 1 Introduction -- 2 Acceleration Based on Likelihood Upper Bound Filtering -- 2.1 Sparse Expression Target Tracking -- 2.2 Observation Likelihood Upper Bound -- 2.3 Bounded Particle Resampling -- 3 Experimental Results and Analysis -- 3.1 Experimental Data and Algorithm Description. , 3.2 Evaluation Criteria.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (377 pages)
    Edition: 1st ed.
    ISBN: 9789811922770
    Series Statement: Advances in Sustainability Science and Technology Series
    DDC: 004
    Language: English
    Note: Intro -- Committee Members -- Preface -- Contents -- About the Editors -- IOT, Big Data and Cloud Computing -- Big Data: A Boon to Fight Against Cancer Using Map Reduce Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 MapReduce Architecture -- 4 Conclusion -- References -- Security Attacks and Its Countermeasures in RPL -- 1 Introduction -- 2 Related Work -- 3 About RPL -- 3.1 Control Messages in RPL -- 3.2 Traffic and Modes of Operation in RPL -- 4 Attacks in RPL -- 4.1 Attacks Against Resources -- 4.2 Attacks Against Topology -- 4.3 Attacks Against Traffic -- 5 Analysis -- 6 Conclusion and Future Scope -- References -- An Optimal Policy with Parabolic Demand Carry Forwarded with Three-Parameter Weibull Distribution Deterioration Rate, Scarcity and Salvage Value -- 1 Introduction -- 2 Model Formulation -- 2.1 Assumptions -- 2.2 Notations -- 2.3 Mathematical Formulation -- 3 Numerical Examples -- 3.1 Sensitivity Analysis -- 4 Conclusion -- References -- Information Actions Use for System Activity: Action Modeling Schemas -- 1 Introduction -- 2 The Need in Information Actions Use for System Activity -- 3 Action Modeling Schemas for the Theory of Information Actions Use for System Activity -- 4 Conclusion -- References -- High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique -- 1 Introduction -- 2 Requirements of Hiding Information Digitally -- 3 Digital Image Forensic Techniques for Feature Extraction -- 4 Spatial Transform Techniques -- 5 Conclusion -- References -- Performance Evaluation of FSO Under Different Atmospheric Conditions -- 1 Introduction -- 2 Simulation Setup -- 2.1 Simulation Result and Analysis -- 3 Conclusion -- References -- Smart Communication -- Design and Performance Analysis of High Reliability QOS-Oriented Adaptive Routing Protocol for MANET. , 1 Introduction -- 2 MANET -- 2.1 MANETS Characteristics -- 2.2 Application Areas of MANETS -- 2.3 Link Stability -- 3 Literature Survey -- 4 QOS-Oriented Adaptive Routing Protocol for 'MANET' -- 4.1 Formulas -- 4.2 Algorithm -- 5 Results -- 6 Conclusion -- References -- Circular Patch Antenna with Perturbed Slots for Various Wireless Applications -- 1 Introduction -- 2 Parameters for the Proposed Design -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- A Secure Handshaking AODV Routing Protocol (SHS-AODV) with Reinforcement Authentication in MANET -- 1 Introduction -- 2 Ad Hoc on Demand Distance Vector -- 2.1 Path Discovery -- 2.2 Reverse-Path Setup -- 2.3 Forward-Path Setup -- 2.4 Route Table Management -- 2.5 Path Maintenance -- 2.6 Local Connectivity Management -- 3 Literature Survey -- 4 SHS-AODV Routing Protocol -- 4.1 Key Generation -- 4.2 Elliptic Curve Cryptographic Algorithm (Ecc) -- 4.3 Algorithm -- 5 Results -- 5.1 Simulation Environment -- 5.2 Performance Metrics -- 6 Conclusion -- References -- AI-Powered Smart Routers -- 1 Introduction -- 2 Related Work -- 2.1 Ununified Routing (Loosely Coupled Mono-Cum-Multi-agent Evolution Strategies) -- 2.2 Unified Routing (Close-Coupled Single-Cum-Multi-agent Evolution Strategies) -- 3 AI-Powered Network Routing -- 3.1 Regenerative Control Paradigm -- 3.2 Unified and Ununified AI-Powered Networking -- 4 Brainy (SMART/Intelligent) Network -- 4.1 Unified and Ununified AI-Powered Networking -- 5 Simulation -- 6 AI-Powered and Brainy Hardware Routers -- 6.1 Framework Design Formulation -- 6.2 Simulation Results -- 7 Conclusion -- References -- Modified Sierpinski Gasket Monopole Fractal Antenna for Sub 6 GHz 5G Applications -- 1 Introduction -- 2 Evaluation of Antenna Design -- 3 Performance Analysis of Proposed Antenna -- 4 Performance Analysis of Proposed Antenna -- 5 Conclusion. , References -- Design of a Dual-Ring Resonator Antenna for WBAN Applications -- 1 Introduction -- 2 Implementation of Dual-Ring Resonator -- 3 Results -- 4 Conclusion -- References -- Performance Analysis of MIMO Antenna for Isolation Improvement -- 1 Introduction -- 2 Single Antenna Design Calculations -- 3 Design of MIMO Antenna -- 4 Analysis of the Space Diversity of MIMO Antenna -- 5 Analysis of Prototype Orthogonal MIMO -- 6 Conclusion -- References -- Low Power and High-Speed Full Adder with Complemented Logic and Complemented XOR Gate -- 1 Introduction -- 2 Review of Full Adders -- 2.1 Hybrid Full Adder [9] -- 3 Proposed Full Adder -- 3.1 Sum Output Generation Using XNOR Cell -- 3.2 Carry Output Using XNOR Cell -- 4 Delay Analysis -- 5 4-Bit Adder -- 6 Power Analysis -- 7 Conclusion -- References -- Determining the Number of Bit Encryption That Is Optimum for Image Steganography in 8 Bit Images -- 1 Introduction -- 2 Various Techniques of Image Steganography -- 2.1 LSB Method -- 2.2 Palette-Based Technique -- 2.3 Secure Cover Selection -- 3 Terms Used -- 4 Proposed Method -- 5 Result -- 6 Discussion -- 7 Conclusion -- References -- Design and Analysis of 2nd-Order Bandpass Filters Using SIW and Microstrip Patch Transitions with Stub Matching -- 1 Introduction -- 2 Design-1 -- 3 Design 2 -- 4 Results Analysis -- 5 Conclusions -- References -- Planar Split Ring Resonating Antenna Design -- 1 Introduction -- 2 Antenna Design -- 3 Simulation Results -- 4 Conclusion -- References -- Pentagonal Microstrip Patch Antenna with Circular Slot for 9 GHz Applications -- 1 Introduction -- 2 Design of Pentagonal Patch with Slot -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- Simulation and Analysis of an Optical Communication System Implementing DCF with Various Pulse Generators -- 1 Introduction -- 2 Simulation and Design. , 3 Result and Discussion -- 4 Conclusion -- References -- Simulation and Analysis of an 8 Channel CWDM Optical Network Suitable for Smart City Applications -- 1 Introduction -- 1.1 Multiplexing -- 1.2 DWDM -- 1.3 CWDM -- 2 Simulation Setup -- 3 Result and Discussion -- 4 Conclusion -- References -- Design of Low-Power Dynamic Threshold MOSFET (DTMOS) Push-Pull Inverter -- 1 Introduction -- 2 Proposed Design and Analysis -- 3 Simulation Results -- 4 Conclusion -- References -- Epileptic Seizure Detection Using Deep Learning Architecture -- 1 Introduction -- 2 Literature Review -- 3 Method Initiation with Improved Techniques -- 3.1 Data Extraction -- 3.2 Data Classification -- 4 Proposed Model -- 5 Result and Discussion -- 6 Conclusion -- References -- Ultra High Rate Inter-Satellite Optical Wireless Transmission Using DP-QPSK -- 1 Introduction -- 2 Modulation Format and Inter-Satellite Link -- 3 Proposed Set up -- 4 Results and Discussion -- 5 Conclusion -- References -- Investigation on Reactive Power Compensation Using STATCOM -- 1 Introduction -- 2 Research Method -- 2.1 Block Description and Operational Strategy -- 2.2 Network Description and Simulation -- 3 Results and Discussion -- 4 Conclusion -- References -- Smart Energy Systems -- Optimization of Set-Point Deviation and Current Ripple of PMSM by CCS-MPC Method -- 1 Introduction -- 2 PMSM Model Description -- 3 Model Description of CCS-MPC Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Study, Design and Performance Analysis of Grid-Connected Solar PV System of Two Different Places Using PV syst Software -- 1 Introduction -- 2 Grid-Tied PV System -- 3 Methodology -- 3.1 PV Syst Software -- 3.2 Case Study -- 4 Input Requirement -- 4.1 Location -- 4.2 Tilt Angle -- 4.3 Albedo -- 4.4 Module and Inverter Specification -- 4.5 Economics Analysis. , 5 Simulation and Result -- 6 Conclusion -- References -- Transparent Solar Cell: A Powerful Device of Upcoming Era -- 1 Introduction -- 2 Discussion -- 2.1 Working Principle of Transparent Solar Cells -- 2.2 Different Types of Transparent Solar Cell -- 3 Applications -- 4 Conclusion -- References -- Machine Learning Techniques and Applications -- An Adaptive Firefly Optimization Algorithm for Human Gait Recognition -- 1 Introduction -- 2 Framework of the Proposed Approach -- 2.1 Gait Template Extraction -- 2.2 Introduction to Standard Firefly Algorithm (FA) -- 2.3 Adaptive Firefly Algorithm for Feature Selection -- 2.4 Pseudo-Code of an Adaptive Firefly Algorithm for Feature Selection -- 2.5 Combination of PCA and LDA -- 3 Experimental Analysis -- 3.1 Parameter Setting -- 3.2 Performance Evaluation Metrics of Classification -- 3.3 Results and Discussion -- 4 Conclusion -- References -- Job Prediction Astrology for Using Classification Techniques in Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Set (HOROSCOPE) -- 3.2 Feature Extraction -- 4 Data Processing Techniques -- 4.1 Logistic Regression -- 4.2 Naïve Bayes Classification -- 4.3 DTNB -- 5 Experiments and Analysis -- 6 Conclusion -- References -- Developed Face and Fingerprint-Based Multimodal Biometrics System to Enhance the Accuracy by SVM -- 1 Introduction -- 1.1 Face Recognition -- 1.2 Fingerprint Recognition -- 1.3 Fusion -- 2 Literature Review -- 3 Methodology -- 3.1 Face -- 3.2 Finger -- 3.3 Principal Component Analysis -- 3.4 SVM Classifier -- 4 Result and Experiments -- 5 Conclusion -- References -- A Survey on Deep Learning Techniques for Anomaly Detection in Human Activity Recognition -- 1 Introduction -- 2 Deep Learning -- 3 Methods and Implementation -- 4 Discussions -- 5 Conclusion -- References. , Evaluation of Different Paradigms of Machine Learning Classification for Detection of Breast Carcinoma.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Mechatronics-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (892 pages)
    Edition: 1st ed.
    ISBN: 9789811502385
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1060
    DDC: 621
    Language: English
    Note: Intro -- Editorial -- Preface -- Contents -- About the Editors -- Mechatronics -- Dynamics Modeling of Active Full-Wheel Steering Vehicle Based on Simulink -- 1 Introduction -- 2 Dynamic Analysis and Modeling for Four-Wheel Steering Vehicle -- 2.1 Vehicle Coordinate System and Modeling Assumptions -- 2.2 Dynamic Differential Equations for Active Four-Wheel Steering Vehicle -- 2.3 Calculation of Normal Load of Each Wheel for 4WS Vehicle -- 2.4 Tire Model -- 3 Simulink Realization of Vehicle Dynamics Model -- 3.1 Wheel Velocity and Sideslip Angle Subsystem -- 3.2 Wheel Normal Load Subsystem -- 3.3 Tire Force Calculation Subsystem -- 3.4 Wheel Rotation Dynamics Subsystem -- 3.5 Roll Angle Calculation Subsystem -- 3.6 Body Dynamics Subsystem -- 4 Simulation Verification of Vehicle Dynamics Model -- 5 Conclusion -- References -- Modal Analysis and Dynamics Simulation of Elliptical Trainer -- 1 Introduction -- 2 Elliptical Structure and Simplification -- 3 Elliptical Trainer Simulation Analysis -- 3.1 Modal Analysis -- 3.2 Dynamics Simulation -- 4 Conclusion -- References -- Research and Design of Vehicle Simulation Subsystem of Testing Platform for CBTC System Based on Linux PowerPC -- 1 Introduction -- 2 Vehicle Simulation Subsystem -- 3 Unit Adapter -- 3.1 Hardware Platform Design -- 3.2 BSP Driver Development -- 4 Train Kinematics Simulation -- 4.1 Traction Calculation Model -- 4.2 Resistance Calculation Model -- 4.3 Braking Force Calculation Model -- 5 Implementation of Vehicle Simulation Subsystem -- 5.1 Environment Construction of Vehicle Subsystem -- 5.2 Implementation and Verification of Vehicle Subsystem -- 6 Conclusion -- References -- Analysis and Compensation of Angular Position Error in Servo Assembly -- 1 Introduction -- 1.1 Design of the High-precision Brushless Servo Assembly -- 2 Angular Position Error Analysis of the Servo Assembly. , 2.1 Analysis of Mechanical Factors Affecting Performance of Servo Assemblies -- 2.2 Shafting Error Analysis -- 3 Test Verification -- 3.1 Data Collection -- 3.2 Error Compensation Verification -- 4 Conclusion -- References -- Research on Exploratory Modeling of Combat Capability of Weapon SoS Based on Synergy -- 1 Introduction -- 2 Weapon System of Systems (SoS) -- 3 Exploratory Synergy Mechanism of Weapon SoS -- 3.1 The Characteristics of the Equipment System Synergy -- 3.2 Exploratory Synergetic Modeling of System Combat Capability -- 4 Explorative Modeling of Weapon SoS Combat Capability -- 4.1 Exploratory Construction of the Main Unit Model of the System's Combat Capability -- 4.2 Judgment Method of Relevant Relations of Operational Capability Subject Units -- 5 Conclusion -- References -- Research on Vibration Responses of Gear System with Backlash -- 1 Introduction -- 2 Mathematical Model -- 3 Numerical Simulation -- 4 Conclusion -- References -- Research on Application of CAN Bus Technology in Truck -- 1 Introduction -- 2 CAN Bus Technology Characteristics -- 3 Classification of Vehicle Networks -- 3.1 Class A Bus -- 3.2 Class B Bus -- 3.3 Class C Bus -- 4 Truck Bus Control System Network Scheme -- 5 Node Design -- 6 The Foreground and Developing Trend of Bus Technology in Automobile Network System Application -- References -- Design and Research of Calibration Method for Driving Loading Device of Single-Machine Thermal Vacuum Test System -- 1 Introduction -- 2 Overall Structure of Test System -- 3 Analysis of Calibration Principle -- 4 Design of Calibration Device for the Test System -- 4.1 Design of Support Frame -- 4.2 Installation Design of Calibration Arm -- 4.3 Design of the Loading of Weights -- 4.4 Design of Torque Calibration for Initial Position -- 4.5 Compensation Correction of Test System -- 5 Static Analysis -- 6 Conclusion. , References -- Wind Power and Hydropower Coordinated Operation Control Strategy Involving Electric Vehicles -- 1 Introduction -- 2 A Collaborative Optimal Scheduling Model for EV Charging and Wind Power and Hydropower -- 2.1 The Impact of Unordered Charging of Electric Vehicles on the Power Grid -- 2.2 Wind-EV-Hydro Control Principle -- 2.3 The Objective Function -- 2.4 The Constraint -- 2.5 Turbine Controller -- 3 The Example Analysis -- 4 Conclusions -- References -- Research on Intelligent Control System of Plate Straightening Based on Knowledge Acquisition -- 1 Introduction -- 2 Problem Solving and Analysis -- 3 Project Design of Straightening Machine Control System -- 3.1 Description and Analysis of the Method for Acquiring Shape Information -- 3.2 Analysis of Straightening Machine Intelligent Control System -- 3.3 Intelligent Control System Design -- 4 Analysis of Effect of Application of Shape Detection System -- 5 Conclusions -- References -- Numerical Simulation of Submarine Shaft-Rate Electric Field Based on COMSOL Finite Element -- 1 Introduction -- 2 Modeling of Ship in COMSOL -- 2.1 Model Simplification and Assumptions -- 2.2 Model Parameter -- 3 Simulation of Shaft-Rate Electric Field -- 3.1 Component Distribution of Electric Field -- 3.2 Electric Field Modes at Different Depths -- 4 Simulation of Different ICCP Protection Currents -- 4.1 Potential Distribution of Ship Hull Under Different ICCP Currents -- 4.2 Shaft-Rate Electric Field Under Different Cathodic Protection Currents -- 5 Conclusion -- References -- Gauss-Hermite PHD Maneuvering Multi-target Tracking Algorithm -- 1 Introduction -- 2 Probability Hypothesis Density Filter -- 2.1 Multi-target Tracking Stochastic Finite Set Theory -- 2.2 Mixed Gauss PHD -- 3 Gaussian-Hermitian PHD Algorithm Based on Interactive Multiple Models -- 3.1 Gaussian-Hermitian Filtering. , 3.2 Gaussian-Hermitian PHD Filtering Based on Interactive Multi-model -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- Research on Driving State Monitoring Based on Vehicle-Road Collaborative Wireless Positioning Technology -- 1 Introduction -- 2 The Vehicle Wireless Positioning Technology -- 3 Vehicle Wireless Positioning Principle Based on TDOA Ranging Method -- 3.1 TDOA Ranging Method -- 3.2 Vehicle Wireless Positioning Principle -- 3.3 Vehicle Motion State Monitoring Based on Vehicle-Road Coordination -- 4 Test Verification -- 5 Conclusion -- References -- Intelligent Systems -- Reliability Analysis of On-Board ATP System in Metro Based on Fuzzy Dynamic Fault Tree -- 1 Introduction -- 2 Methods and Materials -- 2.1 Analysis of Structure and Conditions of Metro ATP System -- 2.2 The Principle of Fuzzy Dynamic Fault Tree -- 2.3 Fuzzy Number Theory -- 3 Modeling and Solving of on-Board ATP System -- 3.1 Establishment of Dynamic Fault Tree Model -- 3.2 Fuzzy Calculation of Failure Rate and Maintenance Rate -- 3.3 Module Partitioning of Dynamic Fault Tree -- 3.4 Module Solution -- 3.5 Comparison and Analysis of Results -- 4 Conclusion -- References -- Image Fusion Based on Convolutional Sparse Representation with Mask Decoupling -- 1 Introduction -- 2 Convolutional BPDN Dictionary Learning with Mask Decoupling -- 3 Proposed CSRMD-Based Fusion Method -- 4 Experiments and Analysis -- 5 Conclusion -- References -- Research of the Test Algorithms of Servo System Frequency Characteristics -- 1 Introduction -- 2 Testing Sweep Signal of Servo System -- 3 Calculation of Frequency Characteristic -- 3.1 Fast Fourier Transform -- 3.2 Correlation Analysis -- 3.3 Power Spectrum Estimation -- 3.4 Least Squares Fitting -- 4 Conclusion -- References -- Utilization Factor Calculation Method Based on Adam Algorithm and Neural Network. , 1 Introduction -- 2 Model Establishment -- 2.1 Network Structure -- 2.2 Adam Optimization Algorithm -- 3 Model Training and Testing -- 3.1 Dataset -- 3.2 Model Parameters -- 3.3 Model Training and Testing -- 4 Conclusion -- References -- Demand Forecasting of Helicopter Aviation Materials Based on Multi-model Reliability Analysis -- 1 Introduction -- 2 Aviation Material Demand Forecast -- 2.1 Analysis and Forecast of High-Frequency Trouble Components -- 2.2 Analysis and Forecast of Reliability Growth Component -- 2.3 Analysis and Prediction of Basic Repairable Components -- 3 Application Example -- 3.1 Example 1 -- 3.2 Example 2 -- 4 Conclusion -- References -- A Fracture Model Established by Finite Element Simulation and Non-dominated Sorting Genetic Algorithm II for an Al Alloy -- 1 Introduction -- 2 Experiments and Methods -- 3 The Establishment of the Fracture Model -- 3.1 GTN Model -- 3.2 Determination of Model Parameters -- 4 Conclusions -- References -- Research on Fatigue-Magnetic Effect of High-Speed Train Wheelset Based on Metal Magnetic Memory -- 1 Introduction -- 2 ANSYS Fatigue Simulation and Analysis -- 2.1 Principle of Metal Magnetic Memory Detection and Fatigue Simulation Ideas -- 2.2 Boundary Conditions for Fatigue Simulation -- 2.3 Analysis Results of Fatigue Simulation -- 3 Test and Analysis -- 3.1 Acquisition of Test Data -- 3.2 Test Results and Analysis -- 4 Comparison Between Simulation and Test -- 5 Conclusions -- References -- Intelligent Manufacturing Information Security Sharing Model Based on Blockchain -- 1 Introduction -- 2 Related Works -- 3 Blockchain-Based Model for Intelligent Manufacturing -- 3.1 Architecture for Intelligent Manufacturing -- 3.2 System Model for Intelligent Manufacturing -- 3.3 Evaluation Index for Smart Manufacture -- 4 Example -- 5 Conclusion and Future Works -- References. , Research into Effects of Pearl Oyster Cultivation in Freshwater with Extensible Mind Mapping.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    San Diego :Elsevier Science & Technology,
    Keywords: Textile industry-Waste disposal. ; Clothing trade-Waste disposal. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (360 pages)
    Edition: 1st ed.
    ISBN: 9780128187593
    Series Statement: The Textile Institute Book Series
    DDC: 363.728
    Language: English
    Note: Intro -- Waste Management in the Fashion and Textile Industries -- Copyright -- Contents -- Contributors -- Part One: Introduction -- Chapter 1: Fashion waste management problem and sustainability: A developing country perspective -- 1.1. Introduction -- 1.2. Waste management -- 1.2.1. 3R approach -- 1.2.2. Exchange and renting -- 1.2.3. Upcycling concept -- 1.2.4. Controlling waste by lean concepts -- 1.2.4.1. Minimizing process waste -- 1.2.4.2. Minimizing material waste -- 1.2.5. Effluent treatment -- 1.2.6. Fashion consumption and consumer attitude -- 1.2.7. Product life cycle assessment -- 1.2.8. Recyclability -- 1.3. Recycling of plastics (polyester and nylon) -- 1.4. Survey findings -- 1.5. Conclusions and future directions -- Acknowledgment -- References -- Chapter 2: Hazards of fashion and textile waste: Approaches for effective waste management -- 2.1. Introduction -- 2.2. Problems and hazards associated with raw material types -- 2.3. Hazards of wasteful utilization of toxic chemicals-Land, water, and air pollution -- 2.3.1. Problems and hazards associated with toxic chemicals -- 2.3.2. Problems and hazards associated with water and air pollution -- 2.3.3. Problems and hazards associated with soil infertility and degradation -- 2.4. Problems and hazards caused by textile and fashion waste -- 2.4.1. Textile waste and associated hazards -- 2.4.2. Hazards and waste from fashion industry -- 2.4.3. Hazards of overproduction in fashion industry -- 2.4.4. Deleterious impacts of fast fashion on environment -- 2.4.5. Hazards due to transport and shipment of fashion merchandise -- 2.4.6. Hazards due to improper buying and usage behavior of consumers -- 2.4.7. Hazards due to problematic recycling -- 2.4.8. Hazards associated with fashion waste -- 2.5. Waste management strategies to combat textile and fashion hazards. , 2.5.1. Role of designers in waste management -- 2.5.2. Waste management at the raw material procurement stage -- 2.5.3. Role of manufacturers in waste management -- 2.5.4. Waste management by minimal and effective utilization of chemicals and water -- 2.5.5. Waste management by effective utilization of water -- 2.5.6. Wastewater recycling and treatment -- 2.5.6.1. Wastewater treatment -- 2.5.7. Waste elimination at source and waste minimization -- 2.5.7.1. Product changes as means of waste minimization -- 2.5.7.2. Process changes as means of waste minimization -- 2.5.8. Waste management by recycling and regeneration -- 2.5.8.1. Recycling and regeneration techniques -- 2.5.9. Innovative approaches by fashion industry for waste management -- 2.5.9.1. Emergence of smart fashion -- 2.5.9.2. Introducing the concept of slow fashion -- 2.5.9.3. Principle of sharing economy -- 2.5.9.4. Extended producer responsibility (EPR) and in-store collection -- 2.5.9.5. Endorsing closed loop system -- 2.5.9.6. Raising consumer awareness -- 2.5.10. Role of brands in waste management -- 2.5.11. Role of consumers in waste management -- 2.5.12. Disposal ecology for waste management -- 2.6. Conclusions -- Further reading -- Part Two: Waste management technologies in manufacturing -- Chapter 3: Management of spinning and weaving wastes -- 3.1. Introduction -- 3.2. Classification of waste -- 3.3. Waste in spinning -- 3.3.1. Blow room -- 3.3.2. Carding -- 3.3.3. Draw frame -- 3.3.4. Combing -- 3.3.5. Simplex -- 3.3.6. Ring frame -- 3.3.7. Winding -- 3.4. Waste in weaving -- 3.4.1. Warping -- 3.4.2. Sizing -- 3.4.3. Knotting -- 3.4.4. Gaiting/tying-in wastage -- 3.4.5. Selvedge -- 3.4.6. Chindi -- 3.4.7. Beam residual wastage -- 3.5. Recycling of spinning and weaving waste -- 3.6. Machine for waste management -- 3.6.1. Willow machine -- 3.6.2. Marzoli trash analyzer. , 3.6.3. Marzoli recycling waste reopener (RWR) -- 3.6.4. Roving stripping and opening machine -- 3.6.5. Thread extractor (Bhatia, 2017) -- 3.6.6. Garnetting machine -- 3.7. Conclusions -- Acknowledgment -- References -- Chapter 4: Management of wastes in garment manufacturing -- 4.1. Introduction -- 4.2. The importance of marker planning and fabric waste management -- 4.3. Recycling fiber, yarn, and fabric wastes and recent trends -- 4.4. Bangladesh using cotton waste as a source of biogas -- 4.5. Solid waste from the Ethiopian leather sector -- 4.6. The control measures in waste management -- 4.6.1. What can be done to minimize wastes? -- Garneting -- Web preparation -- 3D weaving -- Composite manufacturing -- Compression molding -- Seamless garments -- 4.7. Conclusions and future directions -- References -- Chapter 5: Technologies for the management of wastewater generated in wet processing -- 5.1. Introduction -- 5.2. Control of effluent quality -- 5.2.1. Equalization -- 5.2.2. Recovery of by-products -- 5.2.3. Process modification -- 5.2.4. Loss of chemicals -- 5.2.5. Segregation -- 5.3. Effluent treatment methods -- 5.3.1. Coagulation, flocculation, and precipitation -- 5.3.2. Adsorption methods -- 5.3.3. Synthetic ion exchangers -- 5.3.3.1. Fiber-based synthetic bioabsorbents -- 5.3.4. Biological treatments -- 5.3.5. Oxidation techniques -- 5.3.6. Membrane separation -- 5.3.6.1. Microfiltration (MF) -- 5.3.6.2. Ultrafiltration (UF) -- 5.3.6.3. Nanofiltration (NF) -- 5.3.6.4. Hyperfiltration (HF)/reverse osmosis (RO) -- 5.3.7. Electrochemical processes -- 5.3.7.1. Electrodialysis -- 5.4. Effluent treatment plant -- 5.5. Conclusions -- References -- Chapter 6: Management of air quality -- 6.1. Introduction -- 6.2. Effluent gas -- 6.2.1. CO2 removal -- 6.2.1.1. Amine scrubbing -- 6.2.1.2. CO2 storage -- 6.2.2. SOx removal -- 6.2.3. NOx removal. , 6.2.4. Mercury removal -- 6.3. Volatile organic compounds (VOCs) -- 6.4. Activated carbon fibers -- 6.5. Alternative technologies -- 6.6. Conclusions -- Funding -- References -- Part Three: Retail and consumer waste management technologies -- Chapter 7: Packaging waste and their management technologies -- 7.1. Introduction -- 7.2. Packaging defined -- 7.3. Functions of packaging -- 7.4. Materials used for packaging -- 7.5. Consumer attitudes -- 7.6. Managing package waste -- 7.6.1. Recycle -- 7.6.2. Waste prevention or material minimization -- 7.6.3. Reuse -- 7.6.4. Compostable -- 7.6.5. Energy recovery -- 7.7. Conclusions and future directions -- References -- Chapter 8: End of life clothes and their management -- 8.1. Introduction -- 8.2. Collection of used clothing -- 8.3. Reuse of secondhand clothing -- 8.4. Redesign and remanufacturing -- 8.5. Recycling -- 8.5.1. Mechanical recycling -- 8.5.2. Thermal recycling -- 8.5.3. Chemical recycling -- 8.6. Energy recovery -- 8.7. Disposal to landfill -- 8.8. Conclusions -- References -- Chapter 9: Organizations and standards related to textile and fashion waste management and sustainability -- 9.1. Introduction -- 9.1.1. Waste management and sustainability -- 9.1.1.1. Green manufacturing and recycling in fashion -- Organic cotton -- Organic cotton production across the globe -- The opportunities and setting standards for organic cotton -- 9.1.1.2. Green distribution -- 9.1.1.3. Green retailing -- 9.2. Organizations for waste management and sustainability -- 9.2.1. Fashion brands -- 9.2.1.1. HandM -- 9.2.1.2. Marks and Spencer -- 9.2.1.3. Patagonia -- 9.2.1.4. Nike -- 9.2.2. Few other fashion brands -- 9.3. Standards for waste management and sustainability -- 9.3.1. Global organic textile standards (GOTS) -- 9.3.2. Sustainable textile production (STeP) by OEKO-TEX. , 9.3.3. Eco-label certification such as STANDARD 100 by OEKO-TEX -- 9.3.4. Bluesign -- 9.3.5. Cradle to cradle -- 9.3.6. International standards organization -- 9.3.7. Higg index and sustainable apparel coalition -- 9.4. Other organizations and events -- 9.4.1. Zero discharge of hazardous chemicals (ZDHC) -- 9.4.2. UNGC code of conduct for the fashion and textile industry -- 9.4.3. Copenhagen fashion summit -- 9.4.4. Dow Jones sustainability world index -- 9.4.5. Fashion transparency index -- 9.4.6. Youth fashion summit -- 9.4.7. Specific codes of conduct in Australia -- 9.4.8. Specific codes of conduct in Germany -- 9.5. Extended producer responsibility (EPR) for textiles -- 9.5.1. EPR program for postconsumer textiles and clothing recovery -- 9.6. Challenges and opportunities in waste management with Indian paradigms -- 9.6.1. Upasana studio, Auroville, India -- 9.6.1.1. Tsunamika -- 9.6.1.2. Small steps -- 9.6.2. Fabric Monde, Bengaluru -- 9.6.3. Pratibha Syntex, Indore -- 9.6.4. Stylumia, Bengaluru -- 9.7. Conclusions and future directions -- 9.7.1. Significant findings -- 9.7.2. Future directions -- References -- Part Four: Other waste management technologies -- Chapter 10: Automotive waste management technologies -- 10.1. Introduction -- 10.2. Automotive waste -- 10.2.1. Recycling and energy recovery -- 10.2.2. Mechanical recycling -- 10.2.3. Argon process -- 10.2.4. Thermal treatment process -- 10.2.4.1. Pyrolysis process -- 10.2.4.2. Sequential gasification and combustion -- 10.2.5. Injecting molding with automobile shredder residue -- 10.3. Recycling automotive composites and components -- 10.4. End of life (EOL) -- 10.5. Other applications -- 10.6. Conclusions -- Funding -- References -- Chapter 11: Waste management in coated and laminated textiles -- 11.1. Introduction -- 11.2. Coated and laminated textiles -- 11.2.1. Coated textiles. , 11.2.2. Nanomaterial incorporated coated textiles.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: User interfaces (Computer systems). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (525 pages)
    Edition: 1st ed.
    ISBN: 9788132220091
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.309
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 1.1 Data Aggregation -- 1.2 Data Aggregation Security Concerns -- 2…Secure Data Aggregation Protocols -- 2.1 Secure Data Aggregation Based on Cryptographic Techniques -- 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography -- 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography -- 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function -- 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes -- 2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation -- 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques -- 3…Comparison of Secure Data Aggregation Protocols -- 4…Conclusion -- References -- 2 Secure and Dynamic IP Address Configuration Scheme in MANET -- Abstract -- 1…Introduction -- 2…Related Work Review -- 3…Proposed Work -- 4…Conclusion -- References -- 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Proposed Scheme -- 4…Conclusion -- References -- 4 Dual Security Against Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Route Discovery Phase Detection -- 3.2 Data Transmission Phase -- 4…Conclusion and Future Scope -- References -- 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Proposed Detection Algorithm -- 4…Conclusion and Future Work -- References -- 6 Frequency Domain Incremental Strategies Over Distributed Network -- Abstract -- 1…Introduction -- 2…Estimation Problem and the Adaptive Distributed Solution. , 3…Frequency-Domain Adaptive Distributed Solution -- 3.1 DCT-LMS and DFT-LMS Algorithm -- 4…Simulation -- 5…Conclusion -- References -- 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- Abstract -- 1…Introduction -- 1.1 MAC Layer Architecture -- 1.2 QoS Classes -- 1.3 Scheduler at MAC Layer -- 2…Literature Survey -- 3…Methodology -- 3.1 Design of Scheduler -- 4…Mathematical Model -- 4.1 Probability of Packets Being Served -- 4.2 Average Waiting Time -- 4.3 Average Time Spent by a Packet in Queue Ws -- 5…Result Analysis -- 6…Conclusion -- References -- 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Proposed Architecture and Methodology -- 3…Result Analysis -- 4…Conclusion -- References -- 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Abstract -- 1…Introduction -- 2…Literature Review -- 3…The Procedure -- 3.1 Initialization Phase -- 3.2 Detection and Reporting Phase -- 3.3 Action Phase -- 4…Implementation and Result Analysis -- 5…Conclusion -- References -- 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Wireless Sensor Network Routing Algorithms -- 2.1 Flat Routing Protocols -- 2.2 Hierarchical Routing Algorithms -- 2.3 Location-Based Protocols -- 2.4 Related Work -- 3…Simulation Setup -- 3.1 Result and Analysis -- 4…Conclusion -- References -- 11 Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic -- Abstract -- 1…Introduction -- 1.1 IEEE 802.11 Mechanism -- 1.2 IEEE 802.11e Mechanism -- 2…Simulation Model and Performance Analysis -- 2.1 Simulation Model -- 2.2 Simulation Parameter -- 2.3 Results -- 3…Conclusion -- References. , 12 A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range -- Abstract -- 1…Introduction -- 2…Related Work on Connected Dominating Set -- 3…Proposed Algorithm -- 3.1 Network Model -- 3.2 Proposed Approach -- 3.2.1 Algorithm: Determination of P-CDS of a Graph -- 3.2.2 Diagrammatical Illustration of Algorithm -- 4…Performance Analysis -- 5…Conclusion -- References -- 13 Token Based Group Local Mutual Exclusion Algorithm in MANETs -- Abstract -- 1…Introduction -- 2…Related Works -- 3…GLME Algorithm -- 3.1 Working -- 3.2 Data Structure -- 3.3 Messages -- 3.4 Pseudocode of Algorithm at Node i -- 4…Performance Analysis -- 5…Conclusions and Future Scope -- References -- 14 A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Coverage Algorithm for Anchor Node Deployment -- 3…Encryption and Decryption -- 4…Route Discovery Process -- 5…Performance Evaluation -- 6…Conclusions -- References -- 15 Characteristic Function for Variable-Bit-Rate Multimedia QoS -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Model for Mapping QoS of Variable-Bit-Rate Multimedia -- 4…Numerical Results -- 5…Conclusion -- References -- 16 A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition -- Abstract -- 1…Introduction -- 2…Preliminaries -- 2.1 Vector Decomposition Problem -- 2.2 Trapdoor VDP -- 3…Proposed Oblivious Transfer Using Vector Decomposition -- 3.1 Correctness of Our OT Scheme -- 4…Conclusion and Future Work -- References -- 17 Query by Humming System Through Multiscale Music Entropy -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Proposed Query by Humming System -- 3.1 Preprocessing -- 3.2 Framing -- 4…Entropy Estimation -- 4.1 Shannon Entropy -- 4.2 Multiscale Entropy -- 4.3 Multiscale Music Entropy. , 5…Kd Tree-Based Indexing -- 6…Query Processing and Searching -- 7…Results and Discussions -- 7.1 Performance Analysis -- 8…Conclusions -- References -- 18 An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Discrete Wavelet Transform for EEG Signal Decomposition -- 4…Training Algorithms for MLPNN -- 4.1 Backpropagation -- 4.2 Manhattan Update Rule -- 4.3 Resilient Propagation -- 5…Experimental Study, Results, and Analysis -- 6…Summary and Conclusion -- 19 Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Envisioned Query by Humming System -- 4…Perceptual Analysis -- 4.1 Spectral Centroid -- 4.2 Spectral Spread -- 4.3 Pitch Class Profile or Chroma -- 4.3.1 Preprocessing -- 4.3.2 Frequency Mapping -- 4.3.3 Postprocessing -- 4.4 Harmonicity -- 4.4.1 Harmonic Spectral Centroid -- 4.4.2 Harmonic Spectral Spread -- 5…Context Drift Information Analysis -- 5.1 Perceptual Feature Space -- 5.2 Transfer Entropy Estimation -- 6…Results and Discussions -- 7…Conclusions -- References -- 20 First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm -- Abstract -- 1…Introduction -- 2…Basic Concepts -- 3…SRM-FF Algorithm -- 4…Evaluations -- 5…Conclusion -- References -- 21 A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks -- Abstract -- 1…Introduction -- 2…Proposed Work -- 2.1 Proposed Work Architecture -- 2.2 Proposed Algorithm -- 2.3 Proposed Embedding Scheme -- 3…Experimental Results and Comparison Analysis -- 3.1 Evaluation Based on Stego-Image Quality and Payload Capacity. , 3.2 Evaluation Based on Resistance to Stastical Attacks -- 4…Conclusions -- References -- 22 A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Area-Based Stereo Matching -- 4…Experiment Results -- 4.1 Method of Evaluation -- 4.2 Robustness to Change in Illumination -- 4.3 Robustness to Change in Exposure -- 5…Conclusion -- Acknowledgement -- References -- 23 A Hybrid Motion Based-Object Tracking Algorithm for VTS -- Abstract -- 1…Introduction -- 2…The VTS and Its Challenges -- 3…Motion-Based Object Tracking Scheme -- 4…Simulation Results -- 5…Conclusion and Future Work -- References -- 24 Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi's Method -- Abstract -- 1…Introduction -- 2…Taguchi's Optimization Method -- 2.1 Designing of Input Parameter Using OA -- 2.2 Building of Response Table -- 2.3 Optimal Level Values Identification and Confirmation Experiment -- 2.4 Reducing the Optimization Range -- 2.5 Checking of Level Values and Termination Criteria -- 3…Experimental Results -- 4…Conclusion -- References -- 25 A Novel Approach for Jamming and Tracking of Mobile Objects -- Abstract -- 1…Introduction -- 2…Smart Antenna -- 3…Algorithm Applied in the System -- 4…Simulation Results -- 5…Conclusion -- References -- 26 Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System -- Abstract -- 1…Introduction -- 2…Mathematical Model -- 2.1 STBC Encoding Scheme -- 3…Communication System Model -- 3.1 STBC Decoding Scheme -- 4…Results and Discussion -- 5…Conclusions -- References -- 27 On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application -- Abstract -- 1…Introduction -- 2…Antenna Design and Parametric Study -- 3…Results and Discussion -- 3.1 Return Loss. , 3.2 Current Distribution.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Engineering-Data processing. ; Electronic books.
    Description / Table of Contents: This book details recent research on soft computing techniques in vision science. It presents basic research extending to visual perception and visual system, cognitive psychology and psychophysics.
    Type of Medium: Online Resource
    Pages: 1 online resource (208 pages)
    Edition: 1st ed.
    ISBN: 9783319046938
    Series Statement: Studies in Computational Intelligence Series ; v.543
    DDC: 620.00285
    Language: English
    Note: Intro -- Contents -- 1 Machine Vision Solutions in Automotive Industry -- Abstract -- 1…Introduction -- 2…Machine Vision -- 2.1 Basics of Machine Vision System -- 2.2 Camera, Lens and Illumination -- 2.2.1 Camera -- 2.2.2 Lens -- 2.2.3 Illumination -- 2.2.4 3-D Imaging System -- 2.3 Software -- 2.4 Interface to Production Environment -- 2.5 Interface to Management Information System -- 3…Applications -- 3.1 Application: Inspection of Spline Gear -- 3.2 Application: Inspection and Control of Flywheel Press System -- 4…Other Applications -- 5…Conclusions -- References -- 2 Kinect Quality Enhancement for Triangular Mesh Reconstruction with a Medical Image Application -- Abstract -- 1…Introduction -- 2…Methods -- 2.1 System Overview -- 2.2 A Background and the Characteristics of Microsoft Kinect -- 3…A Comprehensive Kinect Calibration Method -- 3.1 Calibration of RGB/Depth Camera -- 3.2 Calibration of Depth Sensor -- 3.3 Mapping Between RGB and Depth Image -- 4…The Tri-States Segmentation -- 5…Triangular Mesh Reconstruction -- 5.1 Average Filter -- 5.2 Marching Cubes Algorithm -- 5.3 Area Calculation -- 6…Experimental Result -- 7…Conclusion -- References -- 3 A Matlab GUI Package for Comparing Data Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 2.1 k-Means -- 2.2 Fuzzy c-Means -- 2.3 Hierarchical Clustering -- 2.4 Multiobjective Clustering with Support Vector Machine -- 3…Cluster Validity Index -- 3.1 Internal Validity Index -- 3.1.1 J Index -- 3.1.2 Davis-Bouldin Index -- 3.1.3 Dunn Index -- 3.1.4 Xie-Beni Index -- 3.1.5 I Index -- 3.1.6 Silhouette Index -- 3.2 External Validity Index -- 3.2.1 Minkowski Index -- 3.2.2 Adjusted Rand Index -- 3.2.3 Percentage of Correctly Classified Pairs -- 4…Demonstration of Cluster Package -- 4.1 Initial Window -- 4.2 k-Means Window -- 4.3 Fuzzy c-Means Window. , 4.4 Hierarchical Clustering Window -- 4.5 MocSvm Clustering -- 4.6 Report Table i.e. Result window -- 4.7 All Cluster Running Window -- 5…Conclusion -- References -- 4 Multi Objective Line Symmetry Based Evolutionary Clustering Approach -- Abstract -- 1…Introduction -- 2…Proposed Symmetry Based Distances -- 3…Multiple Randomized Kd Trees Based Nearest Neighbor Search -- 4…Multi Objective Line Symmetry Based Genetic Clustering Approach -- 4.1 Chromosome Representation -- 4.2 Fitness Computation -- 4.3 Genetic Operators -- 4.3.1 Selection -- 4.3.2 Crossover -- 4.3.3 Mutation -- 4.4 Termination Criterion -- 5…Data Sets and Experimental Results -- 5.1 Artificial Data Sets -- 5.2 Real Data Sets -- 6…Conclusion -- References -- 5 An Efficient Method for Contrast Enhancement of Digital Mammographic Images -- Abstract -- 1…Introduction -- 2…MIAS Database -- 3…Proposed Method -- 4…Simulation Results and Discussions -- 5…Conclusions -- References -- 6 Simulation of Obstacle Detection and Speed Control for Autonomous Robotic Vehicle -- Abstract -- 1…Introduction -- 2…Obstacle Detection and Avoidance -- 2.1 Image Processing Based Obstacle Detection -- 2.1.1 Stereo Vision -- 2.1.2 Monocular Vision -- 2.2 Proposed Method for Obstacle Avoidance -- 2.3 Digital Image Processing -- 2.3.1 Basic Relationships Between Pixels -- 2.3.2 Neighbours of a Pixel -- 2.3.3 Connectivity Between Pixels -- 2.3.4 Adjacency Between Pixels -- 2.3.5 Region -- 2.4 Algorithm for Obstacle Detection -- 2.4.1 Thresholding and Region Growing based Image Segmentation -- 3…Pid Controller Based Speed Control of PMDC Motor -- 3.1 PID Controller Overview -- 3.1.1 Proportional -- 3.1.2 Integral -- 3.1.3 Differential (Derivative) -- 3.2 Motor Parameters -- 3.3 Experimental Calculation of Motor Parameters -- 3.3.1 Electric Resistance and Inductance of Armature -- 3.3.2 Electromotive Force Constant. , 3.3.3 Moment of Inertia -- 3.3.4 Damping Ratio of the Mechanical System -- 3.4 PMDC Motor Equations -- 3.5 Tuning of Discrete PID Controller -- 3.5.1 Simulation Result -- 3.5.2 Computed Parameters -- 4…Matlab Simulink Based Image Processing for Obstacle Detection -- 4.1 MATLAB Simulink Model -- 4.1.1 RGB to Gray-Scale Conversion -- 4.1.2 Thresholding -- 4.2 Simulation Results -- 5…Results -- 5.1 PID Controller Module -- 5.2 Video Processing Module -- 6…Conclusion -- References -- 7 A Review of Global Path Planning Algorithms for Planar Navigation of Autonomous Underwater Robots -- Abstract -- 1…Introduction -- 2…Global Path Planning Algorithms -- 2.1 Breadth First Search (BFS) Algorithm -- 2.2 Depth First Search (DFS) Algorithm -- 2.3 A* Algorithm -- 2.4 Dijkstra's Algorithm -- 2.5 Wall Following Algorithm -- 3…Results and Discussion -- 3.1 Path Planning Through Randomly Located Obstacles -- 3.2 Maze Solving: A Comparison -- 3.3 Maze Solving by Wall Following Algorithm -- 3.4 Breadth First Search (BFS) and Depth First Search (DFS): A Comparison -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 8 Pseudo-Fractional Tap-Length Learning Based Applied Soft Computing for Structure Adaptation of LMS in High Noise Environment -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Existing Algorithms for Dynamic Tap-Length Selection -- 3.1 The Fractional Variable Tap-Length Learning Algorithm -- 4…The VT-VSLMS Algorithm -- 5…Dynamic Tap-Length Optimization -- 6…Proposed Pseudo-Fractional Tap-Length Optimization -- 7…Simulation Setup -- 8…Results and Discussion -- 9…Conclusion -- References -- 9 Medical Image Analysis Using Soft Computing Techniques -- Abstract -- 1…Introduction -- 2…Image Database -- 3…Methodology -- 3.1 Algorithms for Brain Image Segmentation -- 3.2 Algorithms for Retinal Image Classification. , 4…Experimental Results and Discussions -- 4.1 Result Analysis of Brain Image Segmentation -- 4.2 Result Analysis of Retinal Image Classification -- 5…Conclusion -- Acknowledgments -- References -- 10 Selection of Robotic Grippers Under MCDM Environment: An Optimized Trade Off Technique -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Problem Formulation -- 4…MCDM Methodologies -- 4.1 Analytic Hierarchy Process -- 4.2 TOPSIS -- 4.3 VIKOR -- 5…Solution Using AHP -- 6…Solution Using TOPSIS Methodology -- 7…Solution Using VIKOR Methodology -- 8…Conclusion -- References -- 11 Numerical Study of Viscous Flow in the Hydraulic System of Electro Optical Tracking System -- Abstract -- 1…Introduction -- 1.1 Description of the Hydraulic Systems -- 1.1.1 Oil Reservoir -- 1.1.2 Gear Pump -- 1.1.3 Manifold Block -- 1.1.4 Valves -- 1.1.5 Hydraulic Rotary Actuators -- 1.1.6 Electrical Panel -- 1.2 Selection of Fluid -- 2…Problem Formulation -- 2.1 Mathematical Modeling of Flow -- 2.2 Finite Difference Method for Solving the EOTS Pipeline Axial Flow -- 2.3 Problem Solving -- 3…Numerical Results and Analysis -- 3.1 Axial Velocity Distribution of EOTS Pipeline Axial Flow Field -- 3.2 Relationship Curve Between Axial Velocity and Cross Sectional Length of EOTS Pipeline Flow -- 3.3 Relationship Curve Between Wall Shear Stress and Cross Sectional Width and Height -- 3.4 Computation of f Re -- 4…Conclusion -- Acknowledgments -- A.x(118). Appendix: A -- A.x(118). Appendix: B -- References -- 12 Comparison of Edge Detection Algorithm for Part Identification in a Vision Guided Robotic Assembly System -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Structure -- 4…Edge Detection -- 4.1 Sobel Operator -- 4.2 Robert's Cross Operator -- 4.3 Prewitt's Operator -- 4.4 Laplacian of Gaussian Operator -- 4.5 Canny's Edge Detection Algorithm. , 5…Region Growing Algorithm -- 6…Shape Descriptor -- 7…Results and Discussion -- 7.1 Result of Canny's Operator -- 7.2 Result of LOG Operator -- 7.3 Result of Prewitt Operator -- 7.4 Result of Sobel Operator -- 7.5 Result of Roberts Operator -- 7.6 Comparision of Results -- 8…Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (834 pages)
    Edition: 1st ed.
    ISBN: 9789811559716
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.194
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Intelligent and Cloud Computing -- M-Throttled: Dynamic Load Balancing Algorithm for Cloud Computing -- 1 Introduction -- 2 Literature Survey -- 3 Existing Algorithms -- 3.1 Throttled Load Balancing -- 3.2 Round-Robin Load Balancing -- 3.3 SJF Load Balancing -- 4 Proposed Algorithm: M-throttled -- 5 Implementation -- 6 Conclusion -- References -- iGateLink: A Gateway Library for Linking IoT, Edge, Fog, and Cloud Computing Environments -- 1 Introduction -- 2 Related Work -- 3 System Model and Architecture -- 3.1 Implementation Details -- 4 Case Studies -- 5 Conclusions and Future Work -- References -- Hetero Leach: Leach Protocol with Heterogeneous Energy Constraint -- 1 Introduction -- 2 Routing Algorithm -- 2.1 LEACH -- 2.2 Hetero Leach -- 3 Simulation and Result -- 4 Conclusion -- References -- A Semantic Matchmaking Technique for Cloud Service Discovery and Selection Using Ontology Based on Service-Oriented Architecture -- 1 Introduction -- 2 Service-Oriented Computing -- 2.1 Service-Oriented Architecture -- 3 Proposed Model -- 3.1 Client Request -- 3.2 Cloud Service Discovery -- 3.3 Cloud Service Selection -- 3.4 Cloud Ontology Triple Store -- 4 Proposed Matchmaking Technique -- 5 Conclusion and Future Work -- References -- An Intelligent Approach to Detect Cracks on a Surface in an Image -- 1 Introduction -- 2 Literature Review -- 3 Min-Max Gray Level Discrimination Method -- 4 Proposed Model for Crack Detection -- 5 Conclusion -- References -- A Study of Machine Learning Techniques in Short Term Load Forecasting Using ANN -- 1 Introduction -- 2 ANN in STLF -- 2.1 Multilayer Perceptron Network (MLP) -- 2.2 Learning -- 2.3 Generalization -- 2.4 MLP Organizes in Burden Estimating -- 3 Proposed Work -- 3.1 Back Propagation (BP) by ANN -- 3.2 Fuzzy Logic by ANN. , 3.3 Hereditary Calculation (HC) by ANN -- 3.4 Particle Swarm Optimization (PSO) by ANN -- 4 Conclusion -- References -- A Review for the Development of ANN Based Solar Radiation Estimation Models -- 1 Introduction -- 2 Basics of Artificial Neural Network (ANN) -- 3 ANN for Solar Radiation Estimation -- 4 Review of Global Radiation Estimation Using ANN -- 5 Comparative Study of All the Models -- 6 Identified Research Gap in Solar Radiation Estimation -- 7 Conclusion -- References -- Analysis and Study of Solar Radiation Using Artificial Neural Networks -- 1 Introduction -- 2 ANN Fundamentals -- 2.1 What is ANN? -- 2.2 Nodal Configuration -- 2.3 ANN Types -- 2.4 Learning Stuff -- 3 ANN Working Principle and Architecture -- 3.1 Introduction -- 4 Applications, Advantages, and Disadvantages -- 4.1 Applications -- 4.2 Advantages -- 4.3 Disadvantages -- 5 Methodology -- 5.1 ANN for Predicting Solar Radiation -- 5.2 Data Considered -- 5.3 Operating Stages -- 5.4 Performance -- 6 Comparison Between ANN-Based and Existing Modeling -- 7 Conclusion -- References -- A Scheme to Enhance the Security and Efficiency of MQTT Protocol -- 1 Introduction -- 2 Literature Review -- 2.1 Security Requirements of IoT -- 2.2 Privacy Concerns in IoT -- 2.3 MQ Telemetry Transport (MQTT) -- 2.4 Architecture of MQTT -- 2.5 MQTT Quality of Service -- 2.6 Security Issues with MQTT -- 2.7 Hash Functions and Digital Signatures -- 2.8 Channel Encryption -- 2.9 Summary of Findings -- 2.10 Problem Statement -- 3 Proposed Scheme -- 3.1 Registration Process -- 4 Result and Discussions -- 5 Conclusions -- References -- Software Fault Prediction Using Random Forests -- 1 Introduction -- 1.1 Random Forests (RF) -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Evaluation Criteria -- 4 Implementation and Results -- 5 Conclusion -- References. , A Power Optimization Technique for WSN with the Help of Hybrid Meta-heuristic Algorithm Targeting Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution Methodology -- 3.1 Design Efficient WSN Nodes -- 3.2 Clusterization of the Target Area -- 3.3 Deployment of WSN Nodes Using Spiral Pattern WSN Node Deployment Policy -- 4 Numerical Result Analysis -- 5 Conclusion and Future Work -- References -- A Model for Probabilistic Prediction of Paddy Crop Disease Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Paddy Crop Disease Classification -- 3.1 Brown Spot -- 3.2 Bacterial Leaf Blight -- 3.3 Leaf Smut -- 4 Implementation of the Model -- 4.1 Image Generation and Augmentation -- 4.2 Convolution Steps -- 4.3 Pooling Step -- 4.4 Fully Connected Layers -- 4.5 Disease Prediction -- 4.6 Process Flow Model -- 5 Algorithm of the Model -- 6 Experimental Results -- 7 Conclusions and Future Work -- References -- A Hybridized ELM-Elitism-Based Self-Adaptive Multi-Population Jaya Model for Currency Forecasting -- 1 Introduction -- 2 Methodology Adopted -- 2.1 ELM -- 2.2 Jaya -- 3 Dataset Description -- 4 Experimental Analysis -- 4.1 Abstract View of the Proposed Model -- 4.2 Proposed ELM-ESAMPJ Algorithm for Exchange Rate Analysis -- 4.3 Result Analysis -- 5 Discussions -- 6 Conclusion and Future Work -- References -- A Fruit Fly Optimization-Based Extreme Learning Machine for Biomedical Data Classification -- 1 Introduction -- 2 Machine Learning Techniques for Biomedical Data Classification -- 2.1 Extreme Learning Machine (ELM) -- 2.2 Fruit Fly Optimization (FFO) -- 2.3 The Proposed FFO-ELM Models -- 3 Result and Discussion -- 3.1 Data Description -- 3.2 Performance Evaluation -- 3.3 Result Analysis -- 4 Conclusion -- References -- Partial Reconfiguration Feature in Crypto Algorithm for Cloud Application. , 1 Introduction -- 2 Generations of Crypto Core -- 3 State of the Art -- 4 Architecture and Implementation -- 4.1 Low Processing Platform (LP) -- 4.2 Fog -- 4.3 Cloud -- 5 Conclusion -- References -- Proactive Content Caching for Streaming over Information-Centric Network -- 1 Introduction -- 2 System Model -- 3 Proposed Solution -- 3.1 Content Store (CS) -- 3.2 Ant Colony Process -- 4 Experimental Results -- 5 Conclusion -- References -- Performance Analysis of ERWCA-Based FLANN Model for Exchange Rate Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 FLANN Model -- 2.2 Evaporation Rate-Based Water Cycle Algorithm (ERWCA) -- 2.3 FLANN/ERWCA Model -- 3 Simulation Study -- 4 Conclusion -- References -- Multi-document Summarization Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experiment and Results Analysis -- 5 Conclusion -- References -- A Convolutional Neural Network Framework for Brain Tumor Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Input Image -- 3.2 Convolution Layer -- 3.3 Pooling Layer -- 3.4 Fully Connected Layer -- 3.5 Output Layer -- 4 Experimental Setup and Results -- 4.1 Dataset Description -- 4.2 Initial Kernel Weights -- 4.3 Activation Function -- 4.4 Loss Function Computation -- 4.5 Training -- 4.6 Model Parameters -- 4.7 Simulation Results -- 5 Conclusion -- References -- Load Balancing in Cloud Computing Environment Using CloudSim -- 1 Introduction -- 2 Related Work -- 3 Objective of Load Balancing in Cloud Computing -- 4 Necessity of Load Balancing -- 5 Verification of Load Balancing Using Cloud Simulator -- 5.1 Various Features of CloudSim Tool -- 5.2 Primary Elements of CloudSim Tool -- 5.3 Algorithm Utilized in CloudSim Tool for Load Balancing -- 6 Experimental Results -- 7 Conclusion -- References. , Assessment of Load in Cloud Computing Environment Using C-means Clustering Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Resource Allocation -- 3.2 Algorithm -- 4 Result Analysis -- 5 Conclusion -- References -- Parallel Implementation of Algebraic Curve for Data Security in Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Explicit Addition Formulation -- 4 Implementation -- 4.1 Sequential Implementation Methodology -- 4.2 Parallel Implementation Methodology -- 5 Experimental Results and Analysis -- 5.1 Sequential Implementation of Elliptic Curve Addition -- 5.2 Sequential Implementation of Hyperelliptic Curve Addition -- 5.3 Parallel Implementation of Hyperelliptic Curve Addition -- 6 Performance Comparison of Sequential and Parallel Implementation -- 7 Conclusion -- References -- A Design Towards an Energy-Efficient and Lightweight Data Security Model in Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Proposed Approach and Related Discussions -- 4.1 Lightweight Authentication Using CA Based Scheme -- 4.2 Lightweight Cryptography Using CA Based Scheme -- 5 Conclusions and Future Work -- References -- Fuzzification-Based Routing Protocol for Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- Fuzzy-Based Strategy Management in Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- A TWV Classifier Ensemble Framework -- 1 Introduction -- 2 Proposed TWV Classifier Ensemble -- 3 Experimental Setup and Result Analysis -- 4 Conclusion -- References -- Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based Devices. , 1 Introduction to Continuous Authentication (CA).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: Artificial intelligence -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (797 pages)
    Edition: 1st ed.
    ISBN: 9788132220121
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.308
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 Neutrosophic Logic Applied to Decision Making -- Abstract -- 1…Introduction -- 2…Neutrosophic Decision Making Strategies -- 3…Complex Metrics for Digital Learning Object Evaluation -- 4…Practical Experience -- 5…Conclusion -- Acknowledgments -- References -- 2 Transforming e-Government to Smart Government: A South Australian Perspective -- Abstract -- 1…Introduction -- 2…Open Data: Social and Economic Benefits -- 3…Developing Smart Government Through Open Data -- 3.1 Community Engagement and Coproduction -- 3.2 Financial Investment -- 3.3 Automation -- 3.4 Collaboration -- 3.5 Governance -- 4…Conclusion -- References -- 3 An Online Content Syndication Tool with Built-in Search and Social Sharing -- Abstract -- 1…Introduction -- 2…Architecture -- 2.1 RSS Source Listener -- 2.2 Subscription -- 2.3 RESTful Web Service APIs -- 3…Conclusions -- Acknowledgment -- References -- 4 Customizing EPCglobal to Fit Local ONS Requirements -- Abstract -- 1…Introduction -- 2…EPC Framework -- 3…Related Work -- 4…Proposed System and Implementation -- 4.1 Sample Implementation -- 5…Conclusion -- References -- 5 Distributed CloudIMS: Future-Generation Network with Internet of Thing Based on Distributed Cloud Computing -- Abstract -- 1…Introduction -- 2…Evolution of Network and Application -- 2.1 Evolution of Telecommunication (NGN) -- 2.2 Evolution of Cloud Computing -- 2.3 The Internet of Thing: Machine to Machine the Future Internet -- 2.4 Related Work on IMS, IoT, and Cloud Computing -- 3…The CloudIMS Framework Architecture: Our Proposed Future Network -- 3.1 Our Vision of CloudIMS Platform -- 3.2 Architecture of CloudIMS Platform -- 3.3 Operation, Administration, and Maintenance (OA& -- M) of CloudIMS. , 3.4 Discussion and Motivation of Proposed CloudIMS Features and Use Case Study Characteristics -- 4…Conclusion -- References -- 6 Genetic Algorithm-Based Query Expansion for Improved Information Retrieval -- Abstract -- 1…Introduction -- 2…Proposed Approach -- 2.1 Construction of Term Pool -- 2.2 Genetic Algorithm for Selecting Expansion Terms -- 2.2.1 Representation of Chromosome -- 2.2.2 Fitness Function -- 2.2.3 Algorithm for GABQE -- 3…Experiments and Results -- 4…Conclusion -- References -- 7 Genetic Algorithm-Based Adaptive PID Controller -- Abstract -- 1…Introduction -- 2…The Proposed PID Controller -- 2.1 The Conventional PID Controller -- 2.2 The Adaptive PID Controller -- 2.3 GA-Optimized APID -- 2.3.1 Objective Function of the Genetic Algorithm -- 2.3.2 Different Operations Used in GA -- 3…Results -- 4…Conclusion -- References -- 8 Text Mining for Phishing E-mail Detection -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Data set Preparation -- 3.2 Feature Extraction Using Text Mining -- 3.3 Feature Selection -- 3.4 Classification -- 4…Implementation -- 5…Conclusion -- References -- 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Workflow Design -- 4…Multi-objective Scheduling Model -- 5…General CSO Algorithm -- 6…Proposed Algorithm -- 6.1 Seeking Mode -- 6.2 Tracing Mode -- 7…Input Data for Experiment -- 8…Results and Discussion -- 8.1 Output Graphs Generated by MATLAB -- 8.2 Analysis of Resultant Graphs -- 9…Conclusion and Future Scope -- References -- 10 A Case Study of User Behavior in Information Retrieval -- Abstract -- 1…Introduction -- 2…User Behavior in Information Retrieval -- 3…Case Study -- 3.1 Scoring -- 4…Approaches to Incorporating Implicit Feedback -- 5…Conclusion -- References. , 11 Fuzzy Mapping of Robotic Arm Based on LabVIEW -- Abstract -- 1…Introduction -- 2…Implementation of System -- 3…Designing Fuzzy Systems -- 4…A Table LookUp Scheme -- 5…Fuzzy System Design for Robotic Arm -- 6…Mapping for Base of Robotic Arm -- 7…Mapping for Gripping of Object -- 8…Kinematics of Robotic Arm -- 9…Conclusion and Future Work -- References -- 12 An Improvement on NSGA-II for Finding Fast the Better Optimal Solution in Multi-objective Optimization Problem -- Abstract -- 1…Introduction -- 2…A Brief Review on Existing Work -- 3…Proposed Methodology -- 3.1 Algorithm Steps -- 4…Implementation and Result Analysis -- 4.1 Test Problems -- 4.2 Results and Comparison with Other Clustering Methods -- 5…Conclusion and Future Work -- References -- 13 Test Case Creation from UML Sequence Diagram: A Soft Computing Approach -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Work -- 3.1 Proposed Framework -- 3.2 UML Diagram for Design Document -- 3.3 Message Control Flow Graph -- 3.4 Algorithm to Create Test Cases Using GA -- 4…Implementation and Results -- 4.1 Optimization of Test Paths Using GA -- 4.2 Test Case Creation -- 5…Conclusion -- References -- 14 Solving Nonlinear Constrained Optimization Problems Using Invasive Weed Optimization -- Abstract -- 1…Introduction -- 2…Invasive Weed Optimization -- 3…Multistage Penalty Function -- 4…Results and Discussion -- 5…Conclusions -- References -- 15 ESEC: An Ideal Secret Sharing Scheme -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Non-threshold Secret Sharing Scheme Using ECC -- 4…A Multilevel Secret Sharing Scheme -- 5…Implementation and Analysis -- 5.1 Implementation -- 5.2 Analysis -- 6…Conclusion -- References -- 16 Extended Service Registry to Support I/O Parameter-Based Service Search -- Abstract -- 1…Introduction -- 2…Object Relational Database for Service Registry. , 2.1 WSDL and UDDI Relationship -- 2.2 Object Relational Database as Service Registry -- 2.3 Extended Service Registry -- 2.4 I/O Parameter-Based Service Search -- 2.5 Process of Parameter-Based Service Search -- 3…Experimental Results -- 3.1 Experimental Setup -- 3.2 Comparison of Basic Keyword Search in Registries---JUDDI Versus ESR Approach -- 3.3 Performance of Output Parameter-Based Service Search -- 4…Related Work -- 5…Conclusion -- References -- 17 Realizing New Hybrid Rough Fuzzy Association Rule Mining Algorithm (RFA) Over Apriori Algorithm -- Abstract -- 1…Introduction -- 1.1 Data Mining and Association Rule Mining -- 1.2 Fuzzy ARM Concepts and Rough ARM Concepts -- 2…Theoretical Aspects -- 2.1 Rough Set Concepts and Reducts -- 2.2 Information System and Decision System -- 2.3 Fuzzy c-Means Clustering -- 3…Proposed Algorithm -- 3.1 Algorithm Description -- 3.2 Pseudo Code -- 3.3 Analysis -- 4…Conclusion and Future Work -- References -- 18 Modal Analysis of Hand-Arm Vibration (Humerus Bone) for Biodynamic Response Using Varying Boundary Conditions Based on FEA -- Abstract -- 1…Introduction -- 2…The CAD Model -- 3…Boundary Conditions and Material Properties -- 4…Results and Discussion -- 5…Conclusion -- References -- 19 Preserving Privacy in Healthcare Web Services Paradigm Through Hippocratic Databases -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Example Scenario -- 4…Enhancement of Hippocratic Databases Through Analytical Hierarchy Processing -- 5…Conclusions -- References -- 20 Generation of Array Passwords Using Petri Net for Effective Network and Information Security -- Abstract -- 1…Introduction -- 2…Types of Existing Authentication Methods -- 3…Limitations of Existing Methods -- 4…Need of a Good Password -- 5…Petri Net -- 6…Array Token Petri Net Structure -- 6.1 Basic Notations -- 6.2 Catenation Rule -- 6.3 Firing Rules. , 6.4 Set of Labels -- 7…Model Formulation and Generation of Array Passwords -- 7.1 Petri Net to Generate All Possible 2 x 2 Arrays Over the Alphabet {a, b} -- 7.2 Firing Sequences -- 8…Conclusion -- References -- 21 Application of Genetic Algorithm for Component Optimization to Deploy Geoprocessing Web -- Abstract -- 1…Introduction -- 2…Approaches for Geoprocessing -- 3…The Geoprocessing Web and Component Optimization -- 4…Proposed Work -- 5…Conclusions -- References -- 22 DNA-Based Cryptographic Approach Toward Information Security -- Abstract -- 1…Introduction -- 2…Brief Idea of DNA -- 3…Literature Review -- 4…Proposed Method -- 4.1 Encryption -- 4.1.1 Algorithmic Steps -- 4.2 Embedding -- 4.2.1 Algorithmic Steps -- 5…Algorithmic Presentation -- 5.1 Key Selection -- 5.2 Message Encryption -- 6…Conclusion -- References -- 23 Design a Fuzzy Logic Controller with a Non-fuzzy Tuning Scheme for Swing up and Stabilization of Inverted Pendulum -- Abstract -- 1…Introduction -- 2…Inverted Pendulum Description -- 3…Controller Design -- 4…Proposed Tuning Scheme -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 24 Use of Machine Learning Algorithms with SIEM for Attack Prediction -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Frame Work -- 3.1 OSSIM -- 3.2 Dataset and Feature Selection -- 3.3 Find Feature Set Using Information Gain -- 3.4 Classification and Prediction -- 4…Conclusion -- References -- 25 Performance Comparison of Single-Layer Perceptron and FLANN-Based Structure for Isolated Digit Recognition -- Abstract -- 1…Introduction -- 2…Data Set and Feature Extraction -- 2.1 Calculation of Gradient [13] -- 2.2 Generation of Feature Vector [13] -- 2.3 Dimension Reduction -- 3…Classification -- 3.1 Single-Layer Perceptron Structure -- 3.2 FLANN Structure -- 4…Simulation Result -- 5…Conclusion -- References. , 26 Computational Techniques for Predicting Cyber Threats.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...