GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Electronic books.  (28)
  • Anthracenes/pharmacology/therapeutic use  (1)
  • Enzyme Activation
  • 2020-2024  (19)
  • 2010-2014  (10)
  • 1945-1949
  • 1
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Management-Data processing. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (678 pages)
    Edition: 1st ed.
    ISBN: 9783030729295
    Series Statement: Modeling and Optimization in Science and Technologies Series ; v.18
    DDC: 658.0563
    Language: English
    Note: Preface -- About This Book -- Contents -- Part I Computational Modelling -- 1 Computational Management-An Overview -- 1.1 Introduction -- 1.2 Computational Intelligence Techniques -- 1.2.1 Fuzzy Logic -- 1.2.2 Artificial Neural Networks -- 1.2.3 Evolutionary Computing -- 1.2.4 Learning Theories -- 1.2.5 Probabilistic Methods -- 1.3 Computational Aspects of Business Management -- 1.3.1 Marketing -- 1.3.2 Sales -- 1.3.3 Customer Relationship Management (CRM) -- 1.3.4 Finance -- 1.3.5 Human Resources -- 1.3.6 Manufacturing -- 1.3.7 Maintenance and Service -- 1.3.8 Research and Development -- 1.4 Benefits and Limitations of Computational Intelligence in Business -- 1.5 Applications of Computational Intelligence in Business -- 1.5.1 Applications of Computational Intelligence in the Field of Marketing -- 1.5.2 Computational Intelligence and Human Resource -- 1.5.3 Computational Intelligence and Finance -- 1.5.4 Computational Intelligence in Operations Management -- 1.6 Conclusion and Future Scope -- References -- 2 Mathematical and Computational Approaches for Stochastic Control of River Environment and Ecology: From Fisheries Viewpoint -- 2.1 Introduction -- 2.2 Stochastic Control -- 2.2.1 Stochastic Differential Equation -- 2.2.2 Performance Index and Value Function -- 2.2.3 HJB Equation -- 2.2.4 Remarks -- 2.3 Specific Problems -- 2.3.1 "Non-renewable" Fishery Resource Management -- 2.3.2 Dam-Reservoir System Management -- 2.3.3 Algae Growth Management -- 2.3.4 Sediment Storage Management -- 2.4 Coupled Problem -- 2.4.1 Overview -- 2.4.2 Control Problem -- 2.4.3 Numerical Scheme -- 2.4.4 Computational Conditions -- 2.4.5 Numerical Computation -- 2.5 Conclusions -- References -- 3 Models and Tools of Knowledge Acquisition -- 3.1 Introduction -- 3.1.1 Knowledge Economy -- 3.2 Literature Review -- 3.2.1 The Role and Importance of Knowledge Acquisition. , 3.2.2 Digitizing Knowledge Acquisition -- 3.3 Knowledge Management and Firm Strategy -- 3.3.1 Strategic Knowledge-An Internal and External Perspective -- 3.3.2 Competitive Intelligence -- 3.4 Knowledge Acquisition: Sources and Techniques -- 3.4.1 External Sources of Knowledge -- 3.4.2 Techniques of Knowledge Acquisition -- 3.5 Role of Technology in Knowledge Acquisition and Management -- 3.5.1 The Emergence of API Economy -- 3.5.2 Artificial Intelligence -- 3.6 Conclusion -- References -- 4 Profits Are in the Eyes of the Beholder: Entropy-Based Volatility Indicators and Portfolio Rotation Strategies -- 4.1 Introduction -- 4.2 Entropy and Its Applications to the VIX -- 4.3 Literature Review -- 4.4 Research Objectives -- 4.5 Theoretical Framework -- 4.6 Data Variables, Measurements, and Sources -- 4.7 Methods and Measures -- 4.8 Empirical Results -- 4.9 Formulation and Testing of Trading Strategies -- 4.10 Summary and Concluding Remarks -- Appendix 1: Trading Strategies Using India VIX Change and the Entropies (Both Approximate and Sample Entropies) Tested Through Simulations -- References -- 5 Asymmetric Spillovers Between the Stock Risk Series: Case of CESEE Stock Markets -- 5.1 Introduction -- 5.2 Related Literature Review -- 5.2.1 (M)GARCH Approaches to Modelling -- 5.2.2 Causality Testing and Cointegration -- 5.2.3 Spillover Methodology Approach -- 5.3 Methodology Description -- 5.3.1 VAR Models and Spillover Index -- 5.3.2 Asymmetric Spillovers -- 5.4 Empirical Results -- 5.4.1 Variable Description -- 5.4.2 Static Results -- 5.4.3 Dynamic Analysis -- 5.4.4 Robustness Checking -- 5.4.5 Simulation of Investment Strategies -- 5.5 Discussion and Conclusion -- Appendix -- References -- 6 Millennial Customers and Hangout Joints: An Empirical Study Using the Kano Quantitative Model -- 6.1 Introduction -- 6.1.1 Motivations of the Study. , 6.1.2 Background of the Study -- 6.2 Literature Review -- 6.3 Model Development -- 6.3.1 Research Gap -- 6.3.2 Research Objectives -- 6.3.3 The Kano Model -- 6.3.4 Research Design -- 6.3.5 Survey Instrument -- 6.4 Results and Discussion -- 6.4.1 Exploratory Factor Analysis Results -- 6.4.2 Reliability Analysis Results -- 6.4.3 Kano Quantitative Analysis Results -- 6.5 Conclusions and Future Scope -- 6.5.1 Conclusions -- 6.5.2 Future Scope -- References -- 7 The Effects of Oil Shocks on Macroeconomic Uncertainty: Evidence from a Large Panel Dataset of US States -- 7.1 Introduction -- 7.2 Data and Methodology -- 7.3 Results and Analysis -- 7.3.1 Linear Impulse Responses -- 7.3.2 Responses of Uncertainty Contingent on High- Versus Low-Oil Dependence States -- 7.3.3 Responses of Uncertainty at Different Horizons Conditioning on Aggregate US Uncertainty Spillovers -- 7.4 Conclusion -- Appendix -- References -- 8 Understanding and Predicting View Counts of YouTube Videos Using Epidemic Modelling Framework -- 8.1 Introduction -- 8.1.1 Literature Review -- 8.2 Building Block for Proposed Epidemic Modelling -- 8.2.1 Epidemic Modelling -- 8.2.2 Assumptions -- 8.2.3 Modelling Information Diffusion as Susceptibility Process -- 8.2.4 Modeling Viewing as Infection Process -- 8.2.5 Particular Case -- 8.3 Numerical Illustration -- 8.4 Results and Interpretation -- References -- 9 Gross Domestic Product Modeling Using ``Panel-Data'' Concept -- 9.1 Introduction -- 9.2 Materials -- 9.3 Statistical Preliminaries and Methods -- 9.4 Results -- 9.5 Concluding Remarks -- References -- 10 Supply Chain Scheduling Using an EOQ Model for a Two-Stage Trade Credit Financing with Dynamic Demand -- 10.1 Introduction -- 10.2 Literature Review -- 10.3 Assumptions and Notations -- 10.3.1 Assumptions: -- 10.3.2 Notations -- 10.4 Mathematical Formulation -- 10.5 Numerical Illustrations. , 10.6 Graphical Representations -- 10.7 Conclusion and Managerial Implications -- References -- 11 Software Engineering Analytics-The Need of Post COVID-19 Business: An Academic Review -- 11.1 Introduction -- 11.2 COVID19-Effects in Business -- 11.2.1 Tourism and Hospitality -- 11.2.2 Airlines and Aviation -- 11.2.3 Oil and Gas -- 11.2.4 Automotive Manufacturing -- 11.2.5 Consumer Products -- 11.2.6 Education -- 11.2.7 Software Industry -- 11.3 Research Methodology -- 11.4 Software Development Life Cycle (SDLC) -- 11.4.1 Software Requirements Analysis -- 11.4.2 Software Design -- 11.4.3 Software Implementation -- 11.4.4 Software Testing -- 11.4.5 Software Deployment -- 11.4.6 Software Maintenance -- 11.5 Software Analytics -- 11.5.1 Literature Analysis -- 11.5.2 Journal Publications with Frequency -- 11.5.3 Citations/Year -- 11.5.4 Software Engineering Analytics: Connotes -- 11.6 Conclusion -- References -- 12 The Rise and Fall of the SCOR Model: What After the Pandemic? -- 12.1 Introduction: The SCOR Model as a Supply Chain Management Foundation -- 12.2 The Evolution of Supply Chain Management -- 12.3 The SCOR Model-A Foundation for Supply Chain Management -- 12.3.1 Supply Chain Optimisation in the Digital Supply Chain Era -- 12.4 Is the Scor Model Still Relevant? -- 12.4.1 The Evolution of the Scor Model -- 12.4.2 The Fall of the Scor Model -- 12.4.3 Is the Resurrection of the Scor Model Possible? -- 12.5 Re-designing the Future of Supply Chains Using Scor -- 12.5.1 Re-designing for Supply Chain Reliability -- 12.5.2 Re-designing for Supply Chain Agility and Responsiveness -- 12.5.3 Re-designing for Supply Chain Asset Management -- 12.6 Concluding Remarks -- References -- Part II Management Optimization -- 13 A Comparative Study on Multi-objective Evolutionary Algorithms for Tri-objective Mean-Risk-Cardinality Portfolio Optimization Problems. , 13.1 Introduction -- 13.2 Portfolio Optimization -- 13.3 Multi-objective Evolutionary Algorithms -- 13.4 Multi-objective Evolutionary Algorithms for Portfolio Optimization Problems-A Literature Review -- 13.4.1 Mean-Variance Portfolio Optimization Using MOEAs -- 13.4.2 Mean-Risk Portfolio Optimization Using MOEAs -- 13.4.3 Three-Objective Portfolio Optimization Using MOEAs -- 13.5 Experimental Results -- 13.6 Conclusion -- References -- 14 Portfolio Insurance and Intelligent Algorithms -- 14.1 Introduction -- 14.2 Portfolio Insurance -- 14.2.1 Multi-period Portfolio Insurance Under Transaction Costs -- 14.3 Intelligent Algorithms -- 14.3.1 Beetle Antennae Search Algorithm -- 14.3.2 Popular Meta-Heuristic Algorithms -- 14.3.3 Multi-objective Optimization -- 14.3.4 The Main Algorithm for the MPMCPITC Problem -- 14.4 Portfolios' Applications with Real-World Data -- 14.4.1 Application in 4 Stocks' Portfolio -- 14.4.2 Application in 8 Stocks' Portfolio -- 14.4.3 Application in 12 Stocks' Portfolio -- 14.4.4 Application in 16 Stocks' Portfolio -- 14.4.5 Results and Performance Comparison of BAS, BA, FA and GA -- 14.5 Conclusion -- References -- 15 On Interval-Valued Multiobjective Programming Problems and Vector Variational-Like Inequalities Using Limiting Subdifferential -- 15.1 Introduction -- 15.2 Definitions and Preliminaries -- 15.3 Relationship Between (GMVVLI), (GSVVLI) and (IVMPP) -- 15.4 Relationship Between (WGMVVLI), (WGSVVLI) and (IVMPP) -- 15.5 Existence Results for (GMVVLI) and (GSVVLI) -- 15.6 Conclusions -- References -- 16 Portfolio Optimization Using Multi Criteria Decision Making -- 16.1 Introduction -- 16.2 An Overview of Multi Criteria Decision Making (MCDM) Process -- 16.3 Classification of Multi Criteria Decision Making Processes -- 16.4 Quantitative Techniques Applied for the MCDM -- 16.5 Financial Decision Problem. , 16.6 Risk Modeling and SWOT Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Medicine-Data processing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (491 pages)
    Edition: 1st ed.
    ISBN: 9789811960680
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.317
    DDC: 610.285
    Language: English
    Note: Intro -- ICAIHC Committee -- Preface -- Acknowledgements -- Contents -- About the Editors -- 1 An Adaptive Fuzzy-Based Clustering Model for Healthcare Wireless Sensor Networks -- 1.1 Introduction -- 1.1.1 Resource Management in WSN -- 1.2 Related Work -- 1.3 Proposed Model -- 1.3.1 Fuzzy Sets and Neuro-fuzzy Logic Theory -- 1.4 Simulation and Results -- 1.5 Conclusion and Future Work -- References -- 2 Artificial Pancreas (AP) Based on the JAYA Optimized PI Controller (JAYA-PIC) -- 2.1 Introduction -- 2.2 Problem Statements Formulations -- 2.2.1 Clinical Information -- 2.2.2 Simulation Model -- 2.2.3 MID -- 2.2.4 Patient Output -- 2.3 Control Algorithms -- 2.3.1 Development of JAYA-PIC -- 2.4 Results -- 2.4.1 JAYA-PIC Action in Patient -- 2.4.2 Analysis of Control Actions -- 2.5 Conclusions -- References -- 3 Security Issues and Solutions for Reliable WBAN-Based e-Healthcare Systems: A Systematic Review -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Secured WBAN Requirements -- 3.3.1 Security Paradigms for WBAN -- 3.3.2 Security Needs in WBAN -- 3.4 Security Solutions -- 3.5 Case Studies on WBAN Prototypes -- 3.6 Conclusion -- References -- 4 Brain Tumour Detection by Multilevel Thresholding Using Opposition Equilibrium Optimizer -- 4.1 Introduction -- 4.2 Multilevel Thresholding Based on Entropy -- 4.2.1 Multilevel Thresholding: A Mathematical Approach -- 4.2.2 Entropy Functions -- 4.3 Opposition Equilibrium Optimizer (OEO) -- 4.4 Proposed Brain Tumour Detection Method Using OEO-Based Multilevel Thresholding Approach -- 4.5 Results and Discussion -- 4.6 Conclusion -- References -- 5 RescuePlus -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Existing Solution -- 5.4 Proposed Solution -- 5.5 Result -- 5.6 Future Scope -- 5.7 Conclusion -- References -- 6 Skeletal Bone Age Determination Using Deep Learning -- 6.1 Introduction -- 6.2 Methodology. , 6.2.1 Data Set Selection -- 6.2.2 Data Pre-processing -- 6.3 Custom Model -- 6.3.1 Model Architecture -- 6.3.2 Approaches -- 6.4 Experiments -- 6.4.1 Loss Functions -- 6.4.2 Comparing with Pre-trained Models -- 6.5 Conclusion -- References -- 7 Chimp Optimization Algorithm-Based Feature Selection for Cardiac Image-Based Heart Disease Diagnosis -- 7.1 Introduction -- 7.2 Chimp Optimization Algorithm-Based Feature Selection for Heart Disease Diagnosis -- 7.2.1 Pre-processing -- 7.2.2 Feature Extraction -- 7.2.3 Feature Selection Using ChOA -- 7.2.4 Classification Using SVNN -- 7.3 Results and Discussion -- 7.4 Conclusion -- References -- 8 The Hospitality Industry's Impact on the COVID-19 Epidemic: A Case Study of Ukraine -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Research Methods -- 8.4 Results -- 8.4.1 State and Legal Measures -- 8.5 Conclusion -- References -- 9 Society in Front of a COVID-19 Pandemic: India Versus Ukraine -- 9.1 Introduction -- 9.1.1 Research Background -- 9.2 Research Methods and Materials -- 9.3 Results -- 9.3.1 The Speed of Virus Spreading -- 9.3.2 The Risk and Danger Rate Estimation -- 9.4 The Level of Trust in the National Healthcare System and the Satisfaction of Government's Response to COVID-19 Situation -- 9.5 The Emotions and General Psychological State of Respondents -- 9.6 Conclusions -- Notes -- References -- 10 Breast Cancer Detection Using Concatenated Deep Learning Model -- 10.1 Introduction -- 10.2 Proposed Methodology -- 10.2.1 Convolutional Neural Network -- 10.2.2 LSTM -- 10.3 Result Analysis -- 10.3.1 Dataset Description -- 10.4 Conclusion -- References -- 11 Recommendation of Pesticides Based on Automation Detection of Citrus Fruits and Leaves Diseases Using Deep Learning -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Proposed Work -- 11.3.1 Image Acquisition and Preprocessing. , 11.3.2 Image Segmentation -- 11.3.3 Diseases Prediction -- 11.3.4 Experimental Results -- 11.3.5 Fertilizer Recommendation -- 11.4 Conclusion -- References -- 12 Comprehensive Information Retrieval Using Fine-Tuned Bert Model and Topic-Assisted Query Expansion -- 12.1 Introduction -- 12.2 Review of Literature -- 12.3 Comprehensive Information Retrieval -- 12.3.1 BERT Model -- 12.3.2 Topic Modelling Using Latent Dirichlet Allocation -- 12.3.3 The Proposed CIR Architecture -- 12.4 The Proposed Approach -- 12.5 Experimental Results -- 12.5.1 Dataset -- 12.5.2 Evaluation Metrics -- 12.5.3 Performance Evaluations -- 12.5.4 Performance Comparison -- 12.5.5 Discussions -- 12.6 Conclusion -- References -- 13 Diabetic Retinopathy Detection Using CNN Model -- 13.1 Introduction -- 13.2 Related Work -- 13.3 Dataset Used -- 13.3.1 Overview -- 13.3.2 Augmentation -- 13.4 Defining CNN Model -- 13.4.1 Summary of Model Architecture -- 13.4.2 Model Layers -- 13.4.3 Loss Function -- 13.5 Result -- 13.6 Conclusion -- References -- 14 Digi-CANE-An IoT Savior for Visually Sensitive -- 14.1 Introduction -- 14.2 Literature Survey -- 14.3 Objective -- 14.4 General Flowchart -- 14.5 The Sensory Architecture -- 14.5.1 Emergency Sensor (Gyroscope) -- 14.5.2 Cane Module -- 14.5.3 Ultrasonic Sensor -- 14.5.4 Buzzer -- 14.5.5 Arduino Uno -- 14.5.6 Working -- 14.6 Circuit Diagram -- 14.6.1 Hardware Details -- 14.6.2 Working of Ultrasonic Sensor (HC-SR04) -- 14.6.3 Software Requirement Arduino IDE -- 14.7 Conclusion and Future Scope -- References -- 15 Link Performance in Community Detection Using Social Network -- 15.1 Introduction -- 15.2 Literature Review -- 15.3 Methods -- 15.4 Metrics -- 15.5 Experimental Results -- 15.6 Discussion -- 15.7 Conclusion -- References -- 16 Analyze Ego-Centric Nodes in Social Network Using Machine Learning Technique -- 16.1 Introduction. , 16.2 Review of Literature -- 16.3 Materials and Method -- 16.4 Link Influence Strategies -- 16.5 Result and Discussion -- 16.6 Conclusion -- 16.7 Future Enhancement -- References -- 17 5G Revolution Transforming the Delivery in Healthcare -- 17.1 Introduction -- 17.2 Literature Review -- 17.3 Features of 5G Technology -- 17.4 Problems Posed by Current Healthcare Industry -- 17.4.1 Lack of Universal Access -- 17.4.2 Long-Term Chronic Care Burden -- 17.4.3 Aging Population -- 17.4.4 Resource Constraints and Healthcare Disparities -- 17.5 Areas in Healthcare that 5G Will Boost -- 17.5.1 Imaging -- 17.5.2 Diagnostics -- 17.5.3 Data Analytics and Treatment -- 17.6 New Realms that 5G Will Enable -- 17.7 Real-World Trials -- 17.8 Positive Impacts of 5G on Our Healthcare System -- 17.9 Recommendations -- 17.10 Conclusion and Future Works -- References -- 18 A Systematic Review of AI Privileges to Combat Widen Threat of Flavivirus -- 18.1 Significance of AI in Flavivirus Disease Eradication -- 18.1.1 AI in Healthcare -- 18.1.2 Flavivirus-A Detailed Synopsis -- 18.1.3 Flavivirus Characteristics -- 18.1.4 Flavivirus Lifecycle -- 18.1.5 Flavivirus Epidemiology -- 18.2 Detection and Estimation of Flavivirus Disease with Machine Learning Models -- 18.3 Conclusions and Future Direction -- References -- 19 Early Detection of Sepsis Using LSTM Neural Network with Electronic Health Record -- 19.1 First Section -- 19.2 Method -- 19.2.1 Sepsis Data Preprocessing -- 19.2.2 LSTM Model -- 19.3 Result and Discussion -- 19.4 Conclusion -- References -- 20 Detection of COVID-19 Infection from Clinical Findings Using Machine Learning Algorithm -- 20.1 Introduction -- 20.2 Related Works -- 20.3 Materials and Methods -- 20.3.1 Medical Dataset Used -- 20.3.2 Data Preprocessing -- 20.3.3 Feature Selection -- 20.3.4 Classification Algorithms. , 20.4 Performance Evaluation and Results -- 20.4.1 Evaluation Measures -- 20.4.2 Results -- 20.5 Conclusion -- References -- 21 Development of Real-Time Cloud Based Smart Remote Healthcare Monitoring System -- 21.1 Introduction -- 21.2 System Framework -- 21.3 System Modeling -- 21.4 Results and Discussion -- 21.5 Conclusion -- References -- 22 Performance Analysis of Hyperparameters of Convolutional Neural Networks for COVID-19 X-ray Image Classification -- 22.1 Introduction -- 22.2 CNN and Its Optimizers -- 22.3 Experimental Results -- 22.4 Conclusion -- References -- 23 Sequence Rule Mining for Insulin Dose Prediction Using Temporal Dataset -- 23.1 Introduction -- 23.2 Literature Review -- 23.3 Definitions -- 23.3.1 Sequential Rule Mining -- 23.3.2 Support and Confidence -- 23.3.3 Sequence Rule Mining Algorithms -- 23.4 Methodology -- 23.5 Experiment Work -- 23.5.1 Dataset Used -- 23.5.2 Result and Discussion -- 23.6 Conclusion -- 23.7 Future Scope -- References -- 24 Ensemble Deep Learning Approach with Attention Mechanism for COVID-19 Detection and Prediction -- 24.1 Introduction -- 24.2 Related Work -- 24.3 Proposed Model -- 24.4 Data sets, Experiments, and Results -- 24.5 Conclusion and Future Scope -- References -- 25 Semantic Segmentation of Cardiac Structures from USG Images Using Few-Shot Prototype Learner Guided Deep Networks -- 25.1 Introduction -- 25.2 Proposed Work -- 25.2.1 Prototype Learner -- 25.2.2 Segmentor -- 25.3 Experiments -- 25.3.1 Dataset Description and Measures Used -- 25.3.2 Parameters -- 25.3.3 Results and Analysis -- 25.4 Conclusion -- References -- 26 Quantification of Homa Effect on Air Quality in NCR, India: Pollution and Pandemic Challenges in Cities and Healthcare Remedies -- 26.1 Introduction -- 26.1.1 Air Quality Global Challenge in Twenty-First Century -- 26.1.2 How Yajna and Vedic Rituals May Curb Pollution. , 26.2 Literature Review.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Paleobiology-India. ; Plate tectonics-India. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (472 pages)
    Edition: 1st ed.
    ISBN: 9783030497538
    Series Statement: Vertebrate Paleobiology and Paleoanthropology Series
    Language: English
    Note: Intro -- Foreword -- References -- Preface -- Contents of the Volume -- References (those listed in Prof. Ashok Sahni's bibliography below are not included here) -- Bibliography of Ashok Sahni -- Contents -- Contributors -- 1 First Ornithischian and Theropod Dinosaur Teeth from the Middle Jurassic Kota Formation of India: Paleobiogeographic Relationships -- Abstract -- Introduction -- Geological Setting -- Age -- Methods and Materials -- Locality Information -- Fossils Collected -- Institutional Abbreviations -- Systematic Paleontology -- Discussion -- Biogeographic Links of the Kota Vertebrate Fauna -- Conclusions -- Acknowledgements -- References -- 2 Upper Gondwana (Jurassic to Early Cretaceous) Palynoflora of India: Its Correlation with Other Gondwana Continents and Phytogeographical Implications -- Abstract -- Introduction -- Geological Setting and Lithostratigraphy -- Jurassic -- Early Cretaceous -- Palynosequencing of the Jurassic and Early Cretaceous Deposits -- Jurassic -- Inter-basinal Correlation -- Jurassic-Cretaceous Boundary -- Early Cretaceous -- Inter-basinal Correlation -- Tectonics Versus Eustasy -- Intra-Gondwanan Correlation -- Paleovegetation and Paleoenvironment -- Phytogeography -- Conclusions -- Acknowledgements -- References -- 3 A Third, Remarkably Small, Tribosphenic Mammal from the Mesozoic of Australia -- Abstract -- Introduction -- Methods -- Type Locality -- Type Horizon, Rock Unit and Age -- Institutional Abbreviation -- Systematic Paleontology -- Discussion and Conclusions -- Acknowledgements -- References -- 4 Evidence for a Remarkably Large Toothed-Monotreme from the Early Cretaceous of Lightning Ridge, NSW, Australia -- Abstract -- Introduction -- Institutional Abbreviations -- Systematic Paleontology -- Conclusions -- Acknowledgements -- References. , 5 Role of Plate Tectonics and Global Climate Change in the Evolution of Angiosperms -- Abstract -- Introduction -- Palynological Records -- Pre-cretaceous Records -- Early Cretaceous Records -- Late Cretaceous Records -- Discussion -- Evolution of Angiosperm -- Angiosperm Evolution versus Tectonics -- Paleobotanical Records of Angiosperm Evolution -- Future Prospects -- Acknowledgements -- References -- 6 Anuran Lissamphibian and Squamate Reptiles from the Upper Cretaceous (Maastrichtian) Deccan Intertrappean Sites in Central India, with a Review of Lissamphibian and Squamate Diversity in the Northward Drifting Indian Plate -- Abstract -- Introduction -- Repository -- Systematic Paleontology -- Taxonomic Status of Amphibians and Squamates from the Maastrichtian of India: An Overview -- Amphibians -- Squamates -- Comparison with the Anuran and Squamate Diversities in Other Continents -- Conclusions -- Acknowledgements -- References -- 7 Chelonian Pelomedusoides Remains from the Late Cretaceous of Upparhatti (Southwestern India): Systematics and Paleobiogeographical Implications -- Abstract -- Introduction -- Geology -- Turtle Yielding Cretaceous Localities of India -- Southwestern India -- Upparhatti, Belgaum District, Karnataka State (Fig. 7.1G) -- Western India -- Worli Hill (Fig. 7.1C) -- Amboli (Fig. 7.1B) -- Lakshmipur, Kachchh, Gujarat State (Fig. 7.1A) -- Central India -- Kisalpuri, Dindori District, Madhya Pradesh State (Fig. 7.1D) -- Pisdura Area, Chandrapur District, Maharashtra State (Fig. 7.1F). -- Dongargaon, Chandrapur District, Maharashtra State (Fig. 7.1F) -- Southeastern India -- Kunnam Locality, Perambalur District., Tamil Nadu State (Fig. 7.1H) -- Kallamedu Locality -- Material and Methods -- Abbreviations -- Systematic Paleontology -- Discussion -- Conclusion -- Taxonomic Implications -- Paleobiogeographical Implications. , Acknowledgements -- Appendix: Other Horizons of the Indian Subcontinent (Outside India) from Which a Pleurodiran was Documented -- References -- 8 The Age of Dinosaurs in the Land of Gonds -- Abstract -- Introduction -- Dinosaurs in Gondwana and Post-Gondwana Formations -- Dawn: The Beginnings of Dinosaurs in the Late Triassic -- Discovery of Indian Dinosaurs -- Lower Maleri Formation (Late Carnian-Early Norian) -- Upper Maleri Formation (Late Norian) -- Lower Dharmaram Formation (Rhaetian) -- End-Triassic Mass Extinction Event -- Day: Triumph of the Dinosaurs in the Jurassic -- Upper Dharmaram Formation (Early Jurassic, Hettangian) -- Lower Kota Formation (Sinemurian-Toarcian) -- Upper Kota Formation -- Upper Jurassic Bagra Formation -- Origin and Early Evolution of Sauropodomorpha -- Evening: Dinosaurs in the Drifting Indian Plate During the Cretaceous -- Nimar Sandstone (Cenomanian-Turonian) -- Lameta Formation (Maastrichtian) -- A Passage to India: Discovery of Cretaceous Dinosaurs -- The Lameta Dinosaurs -- Titanosaurs -- Abelisaurs -- Ankylosaurs -- Kallamedu Formation -- Dinosaur Eggs and Babies -- Dinosaur Coprolites and Food Preference -- Night: Death of the Dinosaurs -- Asteroid Impacts -- Chicxulub Crater, Yucatan Peninsula, Mexico -- Shiva Crater, Mumbai Offshore Basin, India -- Killing Mechanism -- Deccan Volcanism -- Impact-Induced Volcanism -- Aftermath of the K-Pg Extinction -- Acknowledgements -- References -- 9 Leaving Gondwana: The Changing Position of the Indian Subcontinent in the Global Faunal Network -- Abstract -- Introduction -- Methods -- Faunal Similarity Networks -- Global Patterns -- Data Collection -- Results and Discussion -- The Late Cretaceous of the Indian Subcontinent -- The Paleocene of the Indian Subcontinent -- The Eocene of the Indian Subcontinent -- Global Faunal Network of the Cretaceous and Paleogene. , Density, Centrality, and Modularity -- A Theoretical Paleocene Fauna from the Indian Subcontinent -- Conclusions -- Acknowledgments -- Appendix 1: Data and Bins -- Appendix 2: Faunal Network Function -- References -- 10 Island Africa and Vertebrate Evolution: A Review of Data and Working Hypotheses -- Abstract -- Introduction -- The Native African Fauna (Fig. 10.2) -- The Fauna of the Island Africa -- The Fate of the Native Fauna (Fig. 10.2) -- The Island Africa: an Underpopulated Biotic Province? -- Colonization of Island Africa by Newcomers (Figs. 10.4, 10.5) -- Africa as a Secondary Cradle -- The End of Isolation of Africa -- Conclusions -- Acknowledgements -- References -- 11 Contrasting Biomarker Signatures of Cretaceous and Early Paleogene Coal-Bearing Sediments During the Northward Flight of India -- Abstract -- Introduction -- Material and Methods -- Sampling -- Analytical Method -- Results -- Terpenoid Composition of Early Cretaceous Sediments -- Aliphatic Fraction -- Aromatic Fraction -- Terpenoid Composition of Eocene Sediments -- Aliphatic Fraction -- Aromatic Fraction -- Discussion -- Inferences from Early Cretaceous Terpenoids -- Inferences from Eocene Terpenoids -- Implications for Early Cretaceous and Eocene Vegetation of India -- Conclusions -- Acknowledgements -- References -- 12 New Specimens of Frugivastodon (Mammalia: Apatotheria) from the Early Eocene of India Confirm Its Apatemyid Status and Elucidate Dispersal of Apatemyidae -- Abstract -- Introduction -- Material and Methods -- Abbreviations -- Institutional Abbreviations -- Measurements -- Systematic Paleontology -- Phylogenetic Analysis -- Objectives and Methodology -- Results -- Discussion -- Discussion -- Relationships of Frugivastodon -- Geographic Origin of Frugivastodon and the Dispersal of Apatemyids -- Conclusions -- Acknowledgements -- References. , 13 Size Variation Amongst the Non-volant Mammals from the Early Eocene Cambay Shale Deposits of Western India: Paleobiogeographic implications -- Abstract -- Introduction -- Methodology -- Timing of India-Eurasia Collision -- A Brief Historical Background of Biogeographically Important Vertebrate Fossil Record (Including Mammals) from the Cretaceous-Paleogene (K-Pg) Interval of India -- Age of the Cambay Shale Mammals -- Size Variation Amongst the Non-volant Mammalian Groups Known from the Cambay Shale -- Evolutionary Relationship(s) of the Large-Sized Component (Perissodactyls) from the Cambay Shale -- Discussion -- Caveats -- Acknowledgements -- Appendix -- References -- 14 Indohyus, Endemic Radiation of Raoellid Artiodactyls in the Eocene of India and Pakistan -- Abstract -- Introduction -- Materials and Methods -- Acronyms -- Systematic Paleontology -- Discussion -- References -- 15 The Murine Cradle -- Abstract -- Introduction -- Previous Work -- Materials and Methods -- Systematics -- Great Morphological Variation of Early Murines -- Early Murine Evolution in the Semi-isolated Cradle of the Indian Subcontinent -- Interpretation -- Acknowledgments -- References -- 16 New Data on the Siwalik Murines, Rhizomyines and Ctenodactylines (Rodentia) from the Indian Subcontinent -- Abstract -- Introduction -- Previous Work -- Muridae -- Spalacidae -- Ctenodactylidae -- Material and Methods -- Systematics -- Phylogenetic Analyses -- Characters -- Spalacids -- Characters -- Paleobiogeography -- Conclusions -- Acknowledgements -- References -- 17 Dispersal of Miocene Hominoids (and Pliopithecoids) from Africa to Eurasia in Light of Changing Tectonics and Climate -- Abstract -- Introduction -- Hominoid Systematics -- The First Eurasian Apes: Early Catarrhine Dispersals Out of Africa in the Miocene. , How Many Transcontinental Ape Dispersal Events Occurred and Between Which Continents? Biogeographic Links to Phylogeny, Tectonics, and Climate.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Blockchains (Databases). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (244 pages)
    Edition: 1st ed.
    ISBN: 9789813364707
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.219
    DDC: 658.05574
    Language: English
    Note: Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten. , 4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain. , 7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids. , 10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works. , 13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (858 pages)
    Edition: 1st ed.
    ISBN: 9788132217596
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cloud computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (676 pages)
    Edition: 1st ed.
    ISBN: 9789811562020
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.153
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Internet of Things (IOT) -- An Energy-Efficient Data Routing in Weight-Balanced Tree-Based Fog Network -- 1 Introduction -- 1.1 Fog Computing -- 1.2 Tree-Based Architecture -- 1.3 Data Routing -- 1.4 Green Computing -- 2 Related Works -- 3 Proposed Architecture Towards Fog Networks -- 4 Discussions -- 5 Conclusions and Future Work -- References -- A Systematic Overview of Fault Tolerance in Cloud Computing -- 1 Introduction -- 2 Basic Components of Cloud Computing -- 3 Characteristics of Cloud Computing -- 4 Cloud Deployment Models -- 5 Cloud Service Models -- 6 Fault Tolerance -- 7 Fault Tolerance in Cloud Computing -- 7.1 Fault Tolerance Approaches -- 7.2 Fault Tolerance Parameters -- 8 Conclusion -- References -- An EPIC Mechanism for Advertising the Tourist Spots in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 System Model and Problem Formulation -- 4 Tourist Spots Advertisement Problem: Posted Price Mechanism -- 4.1 Outline of PPM-TSAP -- 4.2 Detailing of PPM-TSAP -- 4.3 Illustrative Example -- 4.4 Running Time of PPM-TSAP -- 5 Conclusion and Future Work -- References -- Data Analysis and Prediction of Terror Component Using Web Services -- 1 Introduction -- 2 Background -- 2.1 Intrusion Detection System (IDS) -- 2.2 Vector Space Model -- 2.3 Receiver Operator Characteristic (ROC) Curve -- 3 Content-Based Detection of Terror-Related Activity -- 3.1 Detection Environment -- 4 Detection of Typical Terrorist Behavior -- 5 Experimental Settings -- 5.1 Evaluation Measure -- 6 Result Summarization -- 7 Deployment Issues -- 8 Conclusion -- References -- Facial Expression Recognition System (FERS): A Survey -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Discussion and Comparison of Results -- 5 Conclusion -- References. , Load Balancing of Tasks in Cloud Computing Using Fault-Tolerant Honey Bee Foraging Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Load Balancing in Cloud Computing -- 2.2 Fault Tolerance in Cloud Computing -- 2.3 Honey Bee Behaviour Inspired Load Balancing -- 2.4 Motivation -- 3 Proposed Work and Implementation -- 4 Conclusion and Future Work -- References -- Flip Learning: A Novel IoT-Based Learning Initiative -- 1 Introduction -- 2 Related Works -- 3 Level-Based Approach -- 3.1 Collaborative Learning Within the Campus -- 3.2 Middle Product -- 3.3 Customized Learning Out of the Campus -- 4 Technical Aspects -- 4.1 Mix of IoT and Cloud -- 4.2 Information Management Framework -- 4.3 Content Delivery Network -- 4.4 Use of AI -- 4.5 Virtual and Augmented Reality -- 4.6 Data Security in Network -- 5 Conclusion -- References -- Improvement of Load Balancing in Shared-Memory Multiprocessor Systems -- 1 Introduction -- 2 Overview on Prior Algorithms and Techniques -- 2.1 Static Scheduling -- 2.2 Dynamic Scheduling -- 3 Result and Discussion -- 3.1 The Mandelbrot Set [3] -- 4 Conclusion -- References -- Building Amazon Web Services Infrastructure from the Scratch for an Organization -- 1 Introduction -- 2 Proposed Work and Implementation -- 3 Conclusion and Future Work -- References -- Fault Detection for VANET Using Vehicular Cloud -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Simulation Result and Discussion -- 5 Conclusion and Future Scope -- References -- An Approach to Cohort Selection in Cloud for Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of the Proposed Approach -- 4 Cohort Selection Mechanism -- 4.1 Feature Extraction -- 4.2 Finding of Match Score -- 5 Database and Results -- 6 Conclusion -- References. , Internet of Things (IoT) Framework Deployment Template for Cloud-Based Harbor Surveillance and Ferry Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Model Building -- 3.1 Data Set and Test -- 4 Discussions -- 5 Conclusion -- References -- Art of Style Transfer Using Convolutional Neural Network: A Deep Learning Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Used -- 2.2 Model for Image Classification -- 2.3 Convolutional Neural Network Training Process for Style Transfer -- 3 Experimental Results -- 3.1 Experimental Steps -- 4 Conclusion and Findings -- References -- Impact of Internet of Things (IoT) on 5G -- 1 Introduction -- 2 IoT Challenges -- 3 5G Challenges -- 4 5G Characteristics and Their Values/Applications -- 4.1 5G on IoT: A Single Network for Millions of Applications -- 4.2 The Importance of 5G on the IoT -- 4.3 Application of 5G Over IoT -- 5 The Impact of 5G on IoT -- 5.1 Establishing a 5G-IoT Ecosystem -- 5.2 Future of IoT -- 5.3 Aspects of IoT on Updated 5G Technologies -- 6 Conclusion -- References -- Prediction of Exchange Rate in a Cloud Computing Environment Using Machine Learning Tools -- 1 Introduction -- 2 Machine Learning Techniques Used for Prediction Modeling Data -- 2.1 Linear Regression -- 2.2 Regression Trees -- 2.3 Decision Tree Regression -- 2.4 Boosted Trees Regression -- 2.5 Random Forest Regression -- 2.6 Neural Network Regression -- 2.7 Cloud Computing Tools -- 3 Experimental Works -- 3.1 Data set Analysis -- 3.2 Result Analysis -- 4 Conclusion -- References -- Survey on Stock Price Forecasting Using Regression Analysis -- 1 Introduction -- 2 Literature Review -- 3 Regression -- 4 Regression Methodologies -- 4.1 Linear Regression -- 4.2 Polynomial Regression -- 4.3 Logistic Regression -- 4.4 Ridge Regression -- 4.5 Stepwise Regression -- 4.6 LASSO Regression. , 4.7 Elastic Net Regression -- 5 Conclusions -- References -- Intrusion Detection and Classification Using Decision Tree-Based Feature Selection Classifiers -- 1 Introduction -- 2 Intrusion Detection System -- 3 Data Mining-Based Approach -- 3.1 Decision Tree -- 3.2 Feature Selection -- 4 Dataset Used -- 5 Result Analysis -- 6 Conclusion -- References -- Role of Cloud Computing for Big Data: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Model -- 2.2 Cloud Deployment Model -- 2.3 Challenges and Issues of Cloud Computing -- 3 Big Data -- 3.1 Technologies Supported by Big Data -- 3.2 Challenges in Big Data -- 4 Conclusion -- References -- Role of Cloud Computing in Geotechnical Engineering -- 1 Introduction -- 2 Direct Role of Cloud Computing in Geotechnical Engineering -- 2.1 State-of-the-Art Cloud Computing -- 2.2 State of the Art Approaches for Geotechnical Cloud Computing -- 3 Cloud Computing and Parameter Identification Integrated in System Identification -- 3.1 System Identification -- 3.2 Component of SI -- 4 Inverse Analysis and Parameter Identification Supported by Cloud Computing -- 4.1 General Formulation of Parameter Identification Process -- 4.2 Inverse Analysis and Parameter Identification -- 5 Research Scope and Challenges -- 6 Conclusion -- References -- Energy-Efficient Clustering with Rotational Supporter in WSN -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Step 1-Clustering of Nodes -- 3.2 Step 2-Selection of CH -- 3.3 Step 3-Selection of NCH -- 3.4 Step 4-Selection of SCH -- 4 Simulation -- 5 Conclusion -- References -- A Review on Mobile Cloud Computing -- 1 Introduction -- 2 Need of MCC -- 3 Architecture -- 4 Background -- 4.1 Service Miniatures of MCC -- 4.2 Deployment Miniatures of MCC -- 5 Features of Mobile Cloud and Its Computing -- 5.1 Scalability -- 5.2 Mobility. , 5.3 Mobile Cyber Security with Privacy -- 5.4 Enhancing Reliability with Mobile Computing -- 5.5 Reduced Cost -- 5.6 Multiple Occupancy -- 5.7 Imbalance Web Transmission -- 6 Why Mobile Cloud Computing? -- 7 Issues in MCC -- 7.1 Scarcity of Mobile Appliances -- 7.2 Safety and Seclusion -- 7.3 Short Data Transferral Rate (Bandwidth) -- 7.4 Offloading -- 7.5 Quality of Communication and Broadcasting -- 8 Conclusion -- References -- Corroborating the Veracity of Body Fat Percentage and Classification of Sarcopenia Using Island Differential Evolution Algorithm -- 1 Introduction -- 2 Methodology -- 3 Optimization of the Formula and Techniques Used -- 4 Regression and Genetic Algorithm -- 5 Residuals and Goodness-of-Fit -- 6 Identification and Classification of Sarcopenia -- 7 Island Differential Evolution Algorithm -- 8 Results Obtained -- 9 Conclusion -- References -- Design of Compact Super-Wideband Monopole Antenna for Spectrum Sensing Applications -- 1 Introduction -- 2 Antenna Configuration -- 2.1 SWB QSCA -- 2.2 QSCA with Notch Bands -- 3 Results Discussion -- 4 Conclusion -- References -- Probabilistic and Distance-Aware Clustering Approach to Decrease the Effect of Hot Spot in WSN -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 WSN Challenges -- 1.3 Energy Efficiency -- 1.4 Clustering -- 1.5 LEACH -- 2 Distance Effect -- 2.1 Hot-Spot Effect -- 2.2 Residual-Energy-Based Clustering -- 3 Related Work -- 4 Proposed Protocol -- 5 Results -- 6 Conclusion -- References -- A Real-Time Sentiments Analysis System Using Twitter Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Tweepy Stream Listener -- 3.2 Preprocessing -- 3.3 Sentimental Analysis -- 3.4 Representation -- 3.5 Tweet Storage -- 4 Case Studies -- 4.1 Qualifying 3-Spanish Grand Prix 2019 -- 4.2 Indian Election Results-2019 -- 5 Conclusion and Future Scope. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (532 pages)
    Edition: 1st ed.
    ISBN: 9789811558870
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1185
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Intelligent Computing -- Multi-SoftMax Convolutional Neural Network and Its Application in the Diagnosis of Planetary Gearbox Complicated Faults -- 1 Introduction -- 2 Fault Tree Structure and Muti-SoftMax Convolutional Neural Network -- 2.1 Fault Tree Structure -- 2.2 Working Parallel Structure -- 2.3 Structure of Multi-SoftMax Convolutional Neural Network -- 3 Process of Planetary Gearbox Fault Diagnosis -- 4 Example of Planetary Gearbox Fault Diagnosis -- 4.1 Structure of Convolutional Neural Network -- 4.2 Structure of Mutil-SoftMax Convolutional Neural Network -- 5 Experiment -- 6 Conclusion -- References -- Signal Complexity Measure Based on Construction Creep Rate in 3s Feature Space -- 1 Introduction -- 2 Methodology -- 2.1 0-1 Test for Chaos Review -- 2.2 New Algorithm (Spring Test) Block of 3s Plot and CC Rate -- 2.3 Two Equations as Test Cases -- 3 Results and Discussions -- 3.1 Results from pq-Plot of 0-1 Test to 3s Plot and CC Rate in Spring Test -- 3.2 Key Self-similarity Measure Threshold γ Locking in Max Complexity -- 4 Conclusions -- References -- Research on Partition Technology of Real-Time Database in Big Data Environment -- 1 The Introduction -- 2 Design of Tual-Time Partition Database System for Flow Computing -- 3 Implementation of Real-Time Partition System -- 4 Audit and Effect of System Effectiveness -- 5 Summary -- References -- RCS Sequence Period Estimation Method Based on Constant False Alarm Detection -- 1 Introduction -- 2 Periodic Movement Target Characteristics -- 3 Periodic Discriminant Method for Constant False Alarm Detection -- 3.1 Periodic Discriminant Method for Constant False Alarm Detection -- 3.2 Effectiveness Analysis -- 4 Experimental Verification -- References -- Target Recognition of RCS Sequence Based on Neural Network. , 1 Introduction -- 2 Build the Attitude Angle Template -- 3 Feature Extraction and Classifier Design -- 4 Neural Network Design -- References -- Encouraging Cooperation in Participatory Sensing with Reputation and Game Analysis -- 1 Introduction -- 2 System Model -- 3 Trust Model and Game Analysis -- 3.1 Trust Model -- 3.2 Game Model -- 3.3 Repeated Game Analysis -- 4 Conclusion -- References -- Multi-granularity Attribute Sentiment Analysis Based on Neural Network -- 1 Introduction -- 2 Related Work -- 3 Multi-granularity Sentiment Analysis Model -- 3.1 Task Definition -- 3.2 Model -- 3.3 Multi-granularity Attention Mechanism -- 3.4 Model Training -- 4 Experiment -- 4.1 Experimental Data and Parameter Configuration -- 4.2 Method Comparison -- 4.3 Analysis of Experimental Results -- 5 Conclusion -- References -- Study on Fuzzy Crop Planning Problems Based on Credibility Theory -- 1 Introduction -- 2 Basic Principles -- 3 Fuzzy Crop Planning Problem -- 3.1 Problem with Fuzzy Income Coefficients -- 3.2 Method -- 4 Conclusion -- References -- Empirical Research on the Antecedents of Enterprise IS Users' Voice Behavior Based on the Work Behavior Theory -- 1 Introduction -- 2 Theoretical Background and Hypotheses -- 3 Research Method -- 4 Research Results -- 5 Discussion and Conclusion -- References -- Image Fusion Based on Masked Online Convolutional Dictionary Learning with Surrogate Function Approach -- 1 Introduction -- 2 The Proposed Fused Algorithm -- 2.1 Masked Online Dictionary Learning Using Surrogate Function Approach with Sparse Matrix Computation -- 2.2 The Fusion Framework -- 3 Experimental -- 4 Conclusion -- References -- The Liquid Cooling Technique Based on Foam Metal Copper -- 1 Introduction -- 2 Liquid Cooling Module Design Optimization -- 2.1 Liquid Cooling Module -- 2.2 Liquid-Cooled Radiator -- 3 Liquid Cooling Module Testing. , 3.1 Comparison Test of Liquid Cooling Module Heat Dissipation Performance Based on Liquid Cooling System -- 3.2 Comparison Test of Heat Dissipation Performance of Liquid Cooling Module Based on Self-circulating Cooling System -- 4 Conclusion -- References -- Study on the Forecast of Driving Reaction Based on PNN and FCM -- 1 Introduction -- 2 Driving Reaction Relations -- 3 Driving Reaction Sample Unified Disposal -- 4 Driving Reaction Neural Network -- 5 Road Test Data Acquisition -- 6 Applying Analyses -- 7 Conclusions -- References -- Android Malware Detection via Behavior-Based Features -- 1 Introduction -- 2 Existing Malware Detection Technology -- 2.1 Static Testing Technology of the Existing Malware Detection -- 2.2 Existing Dynamic Malware Detection Technology -- 3 The Behavior-Based Feature Recognition of Detection Technology -- 3.1 The Overall Technical Program -- 3.2 User Operator Behavior Monitoring Module -- 3.3 Software Behavior Monitoring Module -- 3.4 The Malicious Behavior Feature Recognition Module -- 4 Conclusion -- References -- Analysis of the Power Converter Used in Wind Power Generator System -- 1 Introduction -- 2 Power Converter Topology for Wind Power System -- 2.1 Two-Level Voltage Source Converter -- 2.2 Multilevel Voltage Source Converter -- 2.3 Matrix Converter -- 2.4 Current Source Converter -- 3 Application Status of Converters in Variable Speed Constant Frequency Wind Power System -- 3.1 Converters Commonly Used in Medium and Low Voltage Wind Power Systems -- 3.2 Control Strategy of Common Converters in Wind Power System -- 4 Development Trend of Wind Power Converter -- 5 Conclusions -- References -- Evaluation of New Energy Theory Based on Data Recovery -- 1 Introduction -- 1.1 Research Background -- 1.2 Research Methods -- 2 Data Introduction -- 2.1 Data Sources -- 2.2 Data Processing. , 3 Theoretical Power Calculation -- 4 Conclusions -- References -- Summary, Reflection, and Prospect of Wind Power Development in China -- 1 Introduction -- 2 Wind Power Development History -- 3 Wind Power Consumption Situation -- 3.1 Wind Power Generation in Provinces -- 3.2 Accommodation Capacity Index -- 3.3 Abandoned Wind Power and Abandoned Rate -- 4 Development Summary -- 5 Suggestions -- References -- Time-Varying Probability Distribution Model of High Permeability Wind Power Considering Non-stationary Characteristics -- 1 Introduction -- 2 Time-Varying Characteristics of Wind Power Probability Distribution and Spatial Correlation Coefficient -- 2.1 Time-Varying Characteristics of Probability Distribution of Single Wind Farm -- 2.2 Time-Varying Characteristics of Rank Correlation Coefficients of Multi-wind Farms -- 3 Off-Line Conditional Dependence Model Set of Edge Probability Distribution and Rank Correlation Coefficient Matrix -- 3.1 Off-Line Conditional Dependence Model Set of Probability Distribution of Single Wind Farm -- 3.2 Off-Line Conditional Dependence Model Set of Rank Correlation Coefficient Matrix of Multi-wind Farms -- 4 Time-Varying Probability Distribution Sampling Algorithm -- 5 Validity Analysis of Time-Varying Probability Distribution Modeling -- 5.1 Simulation System -- 5.2 Effect of Time-Varying Characteristics on Wind Power Characteristic Modeling -- References -- An Adaptive T-Distribution Variation Based HS Algorithm for Power System ED -- 1 Introduction -- 2 The HS Based on Adaptive T-Distribution Mutation (t-LHS) -- 2.1 HS Algorithm -- 2.2 Variation Principle of T-Distribution -- 2.3 A HS Algorithm Based on Adaptive T-Distribution Mutation (t-LHS) -- 3 The Steps of t-LHS Algorithm for Solving ED Problems -- 4 Results and Comparison -- 4.1 3-Generator System -- 4.2 40-Generator System -- 5 Conclusions -- References. , Application of Improved Particle Swarm Optimization in Economic Dispatch of Power System -- 1 Introduction -- 2 Improved Particle Swarm Optimization (IMPSO) -- 2.1 Adjustment of Parameters -- 2.2 Optimal Learning Strategies -- 2.3 Objective Function -- 2.4 Constraints -- 2.5 Steps of IMPSO Algorithms for Solving ED Problems -- 3 Experimental Analysis and Results -- 4 Conclusions -- References -- Design of an Ultra-Short-Term Wind Power Forecasting Model Combined with CNN and LSTM Networks -- 1 Introduction -- 2 Related Works -- 2.1 Wind Power Generation Power -- 2.2 CNN Network -- 2.3 LSTM Network -- 3 The Description of the Experimental Progress -- 3.1 Data Preprocessing -- 3.2 CNN Layer -- 3.3 LSTM Layer -- References -- An Algorithm for Intelligent Attack Decision-Making -- 1 Introduction -- 2 Underlying Factors -- 3 Modeling for Intelligent Decision-Making -- 4 The Process of Intelligent Decision-Making -- 5 Achievement of the System -- 6 Conclusion -- References -- Wavelet Packet Energy Entropy Based Feature Analysis of Seismic Signals from Vehicle Targets -- 1 Foreword -- 2 Time-Frequency Feature of Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 2.1 Test for Seismic Signals from Vehicle Targets -- 2.2 Wavelet Packet Transformation of Seismic Signals from Vehicle Targets -- 3 Energy Entropy Feature Extraction for Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 3.1 Wavelet Packet Transformed Energy Entropy -- 3.2 Extraction of Energy Entropy Feature of Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 4 Conclusion -- References -- Group Decision-Making Approach Under Interval-Valued Dual Hesitant Fuzzy Unbalanced Uncertain Linguistic Environments and Its Application to Community Tourism Resilience Evaluation -- 1 Introduction. , 2 Weighted Power Aggregation Operator with IVDHFUUBLS Information.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Soft computing. ; Computer vision. ; Electronic books.
    Description / Table of Contents: Covering the latest research on soft computing techniques in the emerging field of vision science, this publication features contributions from leading experts and covers a range of topics including frequent pattern mining and 4D stereo camera systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (221 pages)
    Edition: 1st ed.
    ISBN: 9783642255076
    Series Statement: Studies in Computational Intelligence Series ; v.395
    DDC: 006.37
    Language: English
    Note: Title Page -- Foreword -- Preface -- Editorial -- Contents -- Genetic Algorithm Based Fuzzy Frequent Pattern Mining from Gene Expression Data -- Introduction -- Goal of the Paper -- Proposed Model -- Paper Layout -- Related Work -- Preliminaries -- Apriori Algorithm -- FP-Growth Algorithm -- Fuzzy FP-Growth Tree -- Genetic Algorithm -- Experimental Evaluation -- Conclusion and Future Work -- References -- Prediction of Protein Tertiary Structure Using Genetic Algorithm -- Introduction -- Related Work -- Proposed Scheme -- Protein Conformation Representation -- Energy Function -- The Algorithm -- Experiments and Results -- Conclusion and Future Work -- References -- Hybrid Image Mining Methods to Classify the Abnormality in Complete Field Image Mammograms Based on Normal Regions -- Introduction -- Full-Field Mammogram Analysis -- Mammogram Database -- Enhancement Based on H Representation -- Regional Feature Extraction -- A Cascading Classifier for Identifying Normal Regions -- Full-Field Analysis Using Overlapped Regions -- Results -- Conclusion -- References -- Handwritten Script Recognition Using DCT, Gabor Filter and Wavelet Features at Line Level -- Introduction -- Method Description -- Data Collection and Preprocessing -- Feature Extraction -- Script Recognition -- Experimental Results -- Conclusion -- References -- Character Recognition Using 2D View and Support Vector Machine -- Introduction -- Character Recognition System -- Image Acquisition -- Preprocessing -- Segmentation -- Feature Extraction -- Classification and Recognition Using Support Vector Machine -- Experimental Result -- Conclusion -- References -- Automatic Localization of Pupil Using Histogram Thresholding and Region Based Mask Filter -- Introduction -- Proposed Method -- Algorithm -- Experimental Results -- Conclusion and Future Work -- References. , A Comparative Analysis on Edge Detection of Colloid Cyst: A Medical Imaging Approach -- Introduction -- Review of Previous Work -- Edge Detection Operators -- Sobel Operator -- Robert's Cross Operator -- Prewitt's Operator -- Laplacian of Gaussian -- Canny's Edge Detection Algorithm -- Performance of Edge Detection Algorithms -- Morphological Analysis -- Implementation of the Method -- Analysis-1 -- Analysis 2 -- Results -- References -- Automatic Localization and Segmentation of Left Ventricle from Short Axis Cine MR Images: An Image Driven Method -- Introduction -- Materials -- Methodology -- Automatic Cropping -- LV Segmentation -- Level Set Method -- Implementation Details -- Experimental Results -- Conclusion -- References -- Performance Analysis of Neural Network and ANFIS in Brain MR Image Classification -- Introduction -- Medical Image Classification -- Block Diagram of the System -- Transformation of Image to Data Form -- Principal Component Analysis -- Adaptive Neuro Fuzzy Inference System -- Neuro Fuzzy Model -- ANFIS Architecture -- Learning Algorithm of ANFIS -- ANFIS Classifier -- Results -- Conclusion -- References -- Hybrid Algorithm Using Fuzzy C-Means and Local Binary Patterns for Image Indexing and Retrieval -- Introduction -- Motivation -- Related Work -- Main Contribution -- Fuzzy C-Means Algorithms -- Local Binary Patterns -- Proposed System Framework (FLBP) -- Similarity Measurement -- Experimental Results and Discussions -- Database DB1 -- Database DB2 -- Conclusions -- References -- Artificial Neural Network (ANN) Based Object Recognition Using Multiple Feature Sets -- Introduction -- Some of the Relevant Works -- System Model -- Input and Pre-processing -- Feature Extraction -- Artificial Neural Network (ANN) -- Experiential Results and Discussion -- Conclusion -- References. , Protein Structure Prediction Using Multiple Artificial Neural Network Classifier -- Introduction -- Basic Biological Concept -- Necessities of PSSP -- Basics of Artificial Neural Network -- Methodology -- System Model -- Results -- Conclusions -- References -- An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection -- Introduction -- Literature Survey -- Intelligent Agent Based Approach -- System Architecture -- Feature Selection Agent -- Fuzzy Rough Set Based Outlier Detection -- Fuzzy Rough Set Based Outlier Detection Algorithm -- Decision Manager -- Fuzzy Rough Set Based SVM (FRSVM) -- Results and Discussion -- Conclusion -- References -- Application of Ant Colony Algorithm for Classification and Rule Generation of Data -- Introduction -- Social Insects and Real Ant Colonies -- Ant Colony Optimization -- Ant-Miner.ACO Algorithm for Data Mining -- General Description of Ant-Miner -- Heuristic Function -- Rule Pruning -- Pheromone Updating -- Computational Results -- Dataset -- Test Setup -- Test Results -- Conclusion an Future Work -- References -- Immunised Navigational Controller for Mobile Robot Navigation -- Introduction -- Background -- The Primary and Secondary Response of the Immune System -- Antibodies -- Antibody-Antigen Binding -- Artifical Immune System for Robots -- System Architecture -- Immune Network Formulation -- Selection of Antibodies and Antigens -- Paratope and Idiotope Matrices -- Results and Discussion -- Reinforcement Learning -- Conclusion -- References -- Modified A* Algorithm for Mobile Robot Path Planning -- Introduction -- Related Works -- Proposed Approach -- Assumptions -- Algorithm of Path Planning -- Results and Discussions -- Case I: Obstacle Free Environment -- Case II: Obstacle Avoidance -- Conclusion -- References. , Artificial Immune System Based Path Planning of Mobile Robot -- Introduction -- Biological Immune System -- Concept of Immune System -- Idiotopic Network -- Path Planning Algorithm -- Defining Antibody and Antigen -- Mutual Action of Among Antibodies -- Mobile Robot Path Planning Algorithm Based on AIN -- The Proposed GA -- GA Operators -- Demonstrations -- Collision Free Movements in a Cluttered Environment -- Collision Free Movements in a Simple Environment -- Comparison between the Different Types of Fuzzy Controllers and Neuro-Fuzzy Controller -- Conclusion and Future Works -- References -- Facial Feature Extraction Using a 4D Stereo Camera System -- Introduction -- Face Acquisition -- The 4D Camera System and the Dimensional Imaging Software -- Obj File Format -- Facial Feature Extraction -- Detection of 'Tip of the Nose' -- Detection of the Point Where Nose Meets the Forehead -- Detection of Near Corners of the Two Eyes -- Results -- Future Work -- Discussion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computational intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (504 pages)
    Edition: 1st ed.
    ISBN: 9789811538636
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.179
    DDC: 6.3
    Language: English
    Note: Intro -- International Program Committee -- Honorary Chair -- General Chairs -- Organizing Chair -- International Advisory Chair -- Founder of IRNet China -- Co-founder of IRNet China -- TPC Members -- Sponsors -- Preface -- Contents -- About the Editors -- 1 Study Optimization of Thermal Analysis of Anisotropic Materials in 3D Field Based on One-Dimensional Heat Conduction Equation Model -- 1.1 Introduction -- 1.2 Heat Transfer Mode and Process Analysis -- 1.3 Optimization Model of Protective Clothing Design for High-Temperature Engineering Work -- 1.3.1 The Establishment of the Model and the Proposal of the Hypothesis Conditions -- 1.3.2 Optimization Model Based on Inversion Method -- 1.4 Conclusion -- References -- 2 Shape Retrieval for 3D Models Based on MRF -- 2.1 Introduction -- 2.2 Feature Descriptor -- 2.3 Framework of Retrieval -- 2.3.1 Notations -- 2.3.2 Formulation -- 2.3.3 Potential Function -- 2.4 Spatial Consistency Test -- 2.4.1 Training -- 2.4.2 Testing -- 2.4.3 Index Based on Random Forest -- 2.4.4 Measure Similarity -- 2.5 Experiments -- 2.6 Conclusions -- References -- 3 Numerical Conformal Mapping Based on Improved Hermitian and Skew-Hermitian Splitting Method -- 3.1 Introduction -- 3.2 Numerical Conformal Mapping Based on the Charge Simulation Method -- 3.3 Improved HSS Method Based on (k, j)-Padé Iteration Method -- 3.4 Numerical Examples -- 3.5 Conclusions -- References -- 4 Hierarchical Clustering-Based Video Summarization -- 4.1 Introduction -- 4.2 Feature Extraction -- 4.2.1 Color Feature -- 4.2.2 Texture Feature -- 4.3 The Proposed Algorithm -- 4.3.1 Hierarchical Clustering Method -- 4.3.2 Optimize Initial Clustering Results to Extract Video Summary Key Frames -- 4.4 Experimental Results and Discussion -- 4.4.1 Evaluation Standard -- 4.4.2 Experimental Results -- 4.5 Conclusion -- References. , 5 Research on Multi-objective Optimization Problem of Engineering Project in 3D Field Based on Improved Particle Swarm Optimization Algorithm -- 5.1 Introduction -- 5.2 IPSO Algorithms -- 5.3 Model -- 5.4 Engineering Calculation and the Result Analysis -- 5.5 Conclusions -- References -- 6 3D Path Planning Based on Improved Particle Swarm Optimization Algorithm -- 6.1 Introduction -- 6.2 Path Planning Environment Modeling and Fitness Function -- 6.2.1 Environmental Modeling -- 6.2.2 Fitness Function -- 6.3 Improved PSO Algorithm -- 6.3.1 Basic PSO Algorithm -- 6.3.2 BFO Algorithm -- 6.3.3 Hybrid Algorithm -- 6.4 Simulation Verification -- 6.5 Conclusion -- References -- 7 Improving Parallel Magnetic Resonance Imaging Reconstruction Using Nonlinear Time Series Analysis -- 7.1 Introduction -- 7.2 Background -- 7.3 Method -- 7.4 Experimental Results -- 7.5 Conclusion -- References -- 8 Low Computational Complexity Third-Order Tensor Representation Through Inverse Spectrum Pyramid -- 8.1 Introduction -- 8.2 Method for Third-Order Tensor Representation Through 3D Reduced ISP -- 8.2.1 Representation of a Tensor of Size 4 × 4 × 4 -- 8.2.2 Representation of the Tensor of Size N × N × N Through N-Level 3D-RISP -- 8.3 Characteristics of the Spectrum Tensor Representation -- 8.4 Conclusions -- References -- 9 Spectral Reconstruction Based on Bayesian Regulation Neural Network -- 9.1 Introduction -- 9.2 Principle of Spectral Reflectance Reconstruction -- 9.2.1 Polynomial Regression -- 9.2.2 Bayesian Regularization BP Neural Network Algorithm -- 9.3 Experimental Results and Analysis -- 9.3.1 Experiment Process -- 9.3.2 Analysis and Comparison of Results -- 9.4 Conclusion -- References -- 10 Loose Hand Gesture Recognition Using CNN -- 10.1 Introduction -- 10.2 The Proposed Method -- 10.2.1 Training Data Preparation. , 10.2.2 The Proposed Neural Network Architecture -- 10.2.3 Loss Function -- 10.3 Experiments -- 10.3.1 CNN with Input RGB-D Images -- 10.3.2 CNN with Multi-resolution Features -- 10.3.3 Compared with Other Popular CNN Models -- 10.4 Conclusions -- References -- 11 Multi-focus Image Fusion Method Based on NSST and BP Neural Network -- 11.1 Introduction -- 11.2 Image Fusion Method -- 11.2.1 NSST Transformation -- 11.2.2 Feature Extraction and NSST Contrast -- 11.2.3 BP Neural Network Training -- 11.2.4 Algorithm Framework and Steps -- 11.3 Experiments Results -- 11.4 Conclusions -- References -- 12 Classification of 3D Remote Sensing Images Through Dimensionality Reduction and Semantic Segmentation Network -- 12.1 Introduction -- 12.2 Proposed Method -- 12.2.1 The Whole Approach Framework -- 12.2.2 Rasterization -- 12.2.3 Normalization and Hat Transform -- 12.2.4 DSM Post-processing -- 12.2.5 Network for Classification -- 12.3 Experiment -- 12.3.1 Training Deeplabv3+ -- 12.3.2 Post-processing by NDSM -- 12.3.3 Visualization of 3D Remote Sensing Images -- 12.4 Conclusion -- References -- 13 Research on Deep Learning Algorithm and Application Based on Convolutional Neural Network -- 13.1 Introduction -- 13.2 Convolutional Neural Network -- 13.2.1 Local Connection of Convolutional Neural Networks -- 13.2.2 Weight Sharing in Convolutional Neural Networks -- 13.3 The Overall Structure of the Convolutional Neural Network -- 13.4 The Application of Deep Learning Algorithm Based on Convolutional Neural Network -- 13.4.1 Application in the Field of Natural Language Processing -- 13.4.2 Application in the Field of Image Recognition -- 13.4.3 Application in the Field of Speech Recognition -- 13.5 The Conclusion -- References -- 14 Object Attribute Recognition Based on Hard Negative Mining and Convolutional Neural Network -- 14.1 Introduction. , 14.2 Object Location Based on Improved Faster R-CNN Model -- 14.2.1 Hard Negative Mining Strategy -- 14.2.2 OHEM-Faster R-CNN Object Location Model -- 14.3 Object Attribute Recognition Method Based on Improved Cascade Convolution Neural Network Model CS-CNN Model -- 14.3.1 Improved Activation Function and Loss Function -- 14.3.2 Improved CS-CNN Model Object Attribute Recognition Method -- 14.4 Experimental Simulations -- 14.4.1 Model Parameters -- 14.4.2 Experimental Simulations of Object Location -- 14.4.3 Contrastive Experimental Simulations of Object Attribute Recognition -- 14.5 Conclusion -- References -- 15 Research on Intelligent Identification Method of Power Equipment Based on Deep Learning -- 15.1 Introduction -- 15.1.1 Background -- 15.1.2 Purpose and Significance -- 15.1.3 Summary of Research Level at Home and Abroad -- 15.2 Solutions and Key Technologies -- 15.2.1 Power Equipment Image Processing and Feature Extraction -- 15.2.2 Power Equipment Classification -- 15.2.3 Establish a Standardized Image Analysis Library -- 15.3 Conclusion -- References -- 16 Chinese Color Name Identification from Images Using a Convolutional Neural Network -- 16.1 Introduction -- 16.2 Color Vocabulary Labeled Data Set -- 16.3 The Model of Color Recognition -- 16.3.1 Design of Multi-label Convolutional Neural Networks -- 16.3.2 Evaluation Criteria -- 16.3.3 Choosing the Appropriate Threshold -- 16.4 Conclusion -- References -- 17 Research and Design of a Key Technology for Accelerating Convolution Computation for FPGA-Based CNN -- 17.1 Introduction to Relevant Theories -- 17.1.1 Introduction to Convolution Neural Network -- 17.1.2 The Training Process -- 17.2 SpNet Model -- 17.3 Research on Correlation Algorithm Research -- 17.3.1 Im2col Algorithm -- 17.3.2 Strassen Algorithm -- 17.3.3 Improved Strassen Algorithm. , 17.4 An Accelerated Convolution Calculation Scheme Based on FPGA -- 17.4.1 Design of Training Architecture of Convolutional Neural Network Based on FPGA -- 17.4.2 Design and Implementation of Convolution Computing Module -- 17.4.3 Testing the Convolutional Neural Network -- 17.5 Summary -- References -- 18 Research on Voice Mark Recognition Algorithms Based on Optimized BP Neural Network -- 18.1 Introduction -- 18.2 Wavelet Transform of Voice Signal -- 18.3 Basic Conception of BP-GA -- 18.3.1 Construction of BP Neural Network VoicePrint Recognition -- 18.4 Design of Genetic Algorithm -- 18.5 Simulation Analyses of an Example with BP-GA Algorithm -- 18.6 Conclusions -- References -- 19 Single Image Super Resolution via Deep Convolutional Dual Upscaling Branches with Different Focus -- 19.1 Introduction -- 19.2 Related Works -- 19.2.1 Variant Shortcuts -- 19.2.2 Skillfully Nesting Modules -- 19.3 Proposed Method -- 19.3.1 The Entire Structure -- 19.3.2 Residual Learning Branch -- 19.3.3 Planar Component Branch -- 19.3.4 Mathematical Formulation -- 19.4 Experimental Results -- 19.4.1 Datasets -- 19.4.2 Parameters Settings -- 19.4.3 Results and Comparisons -- 19.4.4 Ablation Analysis -- 19.5 Conclusions -- References -- 20 Human Heart Model Rendering Based on BRDF Algorithm -- 20.1 Introduction -- 20.2 Theoretical Research and Experimental Methods -- 20.2.1 Theoretical Research -- 20.2.2 Experimental Method -- 20.3 Experimental Results -- 20.3.1 Experimental Conditions -- 20.3.2 Rendering Results and Analysis -- 20.4 Conclusions and Discussion -- References -- 21 Level Set Segmentation Algorithm for Cyst Images with Intensity Inhomogeneity -- 21.1 Introduction -- 21.2 C-V Model -- 21.3 Improved C-V Level Set Model -- 21.3.1 Local Information -- 21.3.2 Speed Function -- 21.3.3 Overall Energy Functional -- 21.4 Experimental Results and Analysis. , 21.5 Conclusion.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Electronic data processing -- Distributed processing. ; Electronic books.
    Description / Table of Contents: This book examines leading research and developments in Internet technology, including contributions from academic researchers as well as industry experts discussing new paradigms in Software, Protocols, Supply Chain Management, Security and Cloud Computing.
    Type of Medium: Online Resource
    Pages: 1 online resource (83 pages)
    Edition: 1st ed.
    ISBN: 9783642354618
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.203
    Language: English
    Note: Title Page -- Preface -- Contents -- Enhanced Mobile Ad hoc Routing Protocol Using Cross Layer Design in Wireless Sensor Networks -- Introduction -- Theory -- IEEE 802.15.4 Standard -- Ad hoc On-Demand Distance Vector (AODV) Protocol -- Cross Layer Design -- Propose Energy Weigh - AODV Protocol -- The Simulation -- Result and Performance Analysis -- Conclusion -- References -- Decision Support in Supply Chain Management for Disaster Relief in Somalia -- Introduction -- The Importance of Disaster Management -- Somalia as a Case Study -- Literature Review -- Problem Variants -- Existing Solutions -- Preemptive Multiobjective Programming -- Research Methodology -- Preemptive Optimization -- Data Gathering -- Results and Findings -- Conclusion and Future Work -- References -- Challenges in Cloud Environment -- System Quality Attributes -- Portability -- Recoverability -- Maintainability -- Transparency and Control -- Security -- OS Support -- RHEL Migration on AWS Cloud - An Experience -- Amazon as-is Architecture -- Migration from DevPay to Hourly on Demand -- Infrastructure as Code -- Recommendations -- Manageability -- Configurability -- Maintainability -- Portability -- Conclusion -- Challenges on Amazon Cloud in Load Balancing, Performance Testing and Upgrading -- Hosting a Web Application on Cloud -- Issues with Traditional Infrastructure -- Typical Web Application Topology -- Web Application on AWS -- Components Used -- Learning and Recommendations -- Load Balancers -- Auto Discovery of EC2 Nodes -- Performance Testing Environment -- Application Setup -- Load Generation Strategy -- Measurable Parameters -- Test Results -- Observations -- Recommendation -- Learning -- Conclusion -- A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment -- Introduction -- Objectives -- Resource Manager -- Related Work. , Rule Based Resource Manager -- Experimental Evaluation -- Conclusion -- References -- Browser Based IDE to Code in the Cloud -- Introduction -- Cloud Computing -- Integrated Development Environment -- Browser Based Integrated Development Environment -- Real Time Collaboration -- Forums -- Technical Blogs -- Existing Browser Based Coding Environment -- Cloud9 IDE -- CodeRun Studio [7] -- Eclipse Orion [8] -- Ideone -- eXo Cloud IDE -- Proposed System -- Design -- Real Time Collaboration -- Integrated Forum -- Technical Blogs -- Conclusion -- Zero Knowledge Password Authentication Protocol -- Introduction -- Motivation -- Contribution -- Organization of Paper -- Notations and Definitions -- Notations -- Definitions -- Relevance to Prior Work -- Cryptographic Primitives -- The Proposed Security Protocol : Zero Knowledge Password Authentication Protocol (ZK-PAP) -- ZK-PAP with PKE -- Conclusion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...