GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2020-2024  (20)
  • 1990-1994  (35)
  • 1985-1989  (18)
Document type
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cloud computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (676 pages)
    Edition: 1st ed.
    ISBN: 9789811562020
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.153
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Internet of Things (IOT) -- An Energy-Efficient Data Routing in Weight-Balanced Tree-Based Fog Network -- 1 Introduction -- 1.1 Fog Computing -- 1.2 Tree-Based Architecture -- 1.3 Data Routing -- 1.4 Green Computing -- 2 Related Works -- 3 Proposed Architecture Towards Fog Networks -- 4 Discussions -- 5 Conclusions and Future Work -- References -- A Systematic Overview of Fault Tolerance in Cloud Computing -- 1 Introduction -- 2 Basic Components of Cloud Computing -- 3 Characteristics of Cloud Computing -- 4 Cloud Deployment Models -- 5 Cloud Service Models -- 6 Fault Tolerance -- 7 Fault Tolerance in Cloud Computing -- 7.1 Fault Tolerance Approaches -- 7.2 Fault Tolerance Parameters -- 8 Conclusion -- References -- An EPIC Mechanism for Advertising the Tourist Spots in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 System Model and Problem Formulation -- 4 Tourist Spots Advertisement Problem: Posted Price Mechanism -- 4.1 Outline of PPM-TSAP -- 4.2 Detailing of PPM-TSAP -- 4.3 Illustrative Example -- 4.4 Running Time of PPM-TSAP -- 5 Conclusion and Future Work -- References -- Data Analysis and Prediction of Terror Component Using Web Services -- 1 Introduction -- 2 Background -- 2.1 Intrusion Detection System (IDS) -- 2.2 Vector Space Model -- 2.3 Receiver Operator Characteristic (ROC) Curve -- 3 Content-Based Detection of Terror-Related Activity -- 3.1 Detection Environment -- 4 Detection of Typical Terrorist Behavior -- 5 Experimental Settings -- 5.1 Evaluation Measure -- 6 Result Summarization -- 7 Deployment Issues -- 8 Conclusion -- References -- Facial Expression Recognition System (FERS): A Survey -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Discussion and Comparison of Results -- 5 Conclusion -- References. , Load Balancing of Tasks in Cloud Computing Using Fault-Tolerant Honey Bee Foraging Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Load Balancing in Cloud Computing -- 2.2 Fault Tolerance in Cloud Computing -- 2.3 Honey Bee Behaviour Inspired Load Balancing -- 2.4 Motivation -- 3 Proposed Work and Implementation -- 4 Conclusion and Future Work -- References -- Flip Learning: A Novel IoT-Based Learning Initiative -- 1 Introduction -- 2 Related Works -- 3 Level-Based Approach -- 3.1 Collaborative Learning Within the Campus -- 3.2 Middle Product -- 3.3 Customized Learning Out of the Campus -- 4 Technical Aspects -- 4.1 Mix of IoT and Cloud -- 4.2 Information Management Framework -- 4.3 Content Delivery Network -- 4.4 Use of AI -- 4.5 Virtual and Augmented Reality -- 4.6 Data Security in Network -- 5 Conclusion -- References -- Improvement of Load Balancing in Shared-Memory Multiprocessor Systems -- 1 Introduction -- 2 Overview on Prior Algorithms and Techniques -- 2.1 Static Scheduling -- 2.2 Dynamic Scheduling -- 3 Result and Discussion -- 3.1 The Mandelbrot Set [3] -- 4 Conclusion -- References -- Building Amazon Web Services Infrastructure from the Scratch for an Organization -- 1 Introduction -- 2 Proposed Work and Implementation -- 3 Conclusion and Future Work -- References -- Fault Detection for VANET Using Vehicular Cloud -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Simulation Result and Discussion -- 5 Conclusion and Future Scope -- References -- An Approach to Cohort Selection in Cloud for Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of the Proposed Approach -- 4 Cohort Selection Mechanism -- 4.1 Feature Extraction -- 4.2 Finding of Match Score -- 5 Database and Results -- 6 Conclusion -- References. , Internet of Things (IoT) Framework Deployment Template for Cloud-Based Harbor Surveillance and Ferry Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Model Building -- 3.1 Data Set and Test -- 4 Discussions -- 5 Conclusion -- References -- Art of Style Transfer Using Convolutional Neural Network: A Deep Learning Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Used -- 2.2 Model for Image Classification -- 2.3 Convolutional Neural Network Training Process for Style Transfer -- 3 Experimental Results -- 3.1 Experimental Steps -- 4 Conclusion and Findings -- References -- Impact of Internet of Things (IoT) on 5G -- 1 Introduction -- 2 IoT Challenges -- 3 5G Challenges -- 4 5G Characteristics and Their Values/Applications -- 4.1 5G on IoT: A Single Network for Millions of Applications -- 4.2 The Importance of 5G on the IoT -- 4.3 Application of 5G Over IoT -- 5 The Impact of 5G on IoT -- 5.1 Establishing a 5G-IoT Ecosystem -- 5.2 Future of IoT -- 5.3 Aspects of IoT on Updated 5G Technologies -- 6 Conclusion -- References -- Prediction of Exchange Rate in a Cloud Computing Environment Using Machine Learning Tools -- 1 Introduction -- 2 Machine Learning Techniques Used for Prediction Modeling Data -- 2.1 Linear Regression -- 2.2 Regression Trees -- 2.3 Decision Tree Regression -- 2.4 Boosted Trees Regression -- 2.5 Random Forest Regression -- 2.6 Neural Network Regression -- 2.7 Cloud Computing Tools -- 3 Experimental Works -- 3.1 Data set Analysis -- 3.2 Result Analysis -- 4 Conclusion -- References -- Survey on Stock Price Forecasting Using Regression Analysis -- 1 Introduction -- 2 Literature Review -- 3 Regression -- 4 Regression Methodologies -- 4.1 Linear Regression -- 4.2 Polynomial Regression -- 4.3 Logistic Regression -- 4.4 Ridge Regression -- 4.5 Stepwise Regression -- 4.6 LASSO Regression. , 4.7 Elastic Net Regression -- 5 Conclusions -- References -- Intrusion Detection and Classification Using Decision Tree-Based Feature Selection Classifiers -- 1 Introduction -- 2 Intrusion Detection System -- 3 Data Mining-Based Approach -- 3.1 Decision Tree -- 3.2 Feature Selection -- 4 Dataset Used -- 5 Result Analysis -- 6 Conclusion -- References -- Role of Cloud Computing for Big Data: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Model -- 2.2 Cloud Deployment Model -- 2.3 Challenges and Issues of Cloud Computing -- 3 Big Data -- 3.1 Technologies Supported by Big Data -- 3.2 Challenges in Big Data -- 4 Conclusion -- References -- Role of Cloud Computing in Geotechnical Engineering -- 1 Introduction -- 2 Direct Role of Cloud Computing in Geotechnical Engineering -- 2.1 State-of-the-Art Cloud Computing -- 2.2 State of the Art Approaches for Geotechnical Cloud Computing -- 3 Cloud Computing and Parameter Identification Integrated in System Identification -- 3.1 System Identification -- 3.2 Component of SI -- 4 Inverse Analysis and Parameter Identification Supported by Cloud Computing -- 4.1 General Formulation of Parameter Identification Process -- 4.2 Inverse Analysis and Parameter Identification -- 5 Research Scope and Challenges -- 6 Conclusion -- References -- Energy-Efficient Clustering with Rotational Supporter in WSN -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Step 1-Clustering of Nodes -- 3.2 Step 2-Selection of CH -- 3.3 Step 3-Selection of NCH -- 3.4 Step 4-Selection of SCH -- 4 Simulation -- 5 Conclusion -- References -- A Review on Mobile Cloud Computing -- 1 Introduction -- 2 Need of MCC -- 3 Architecture -- 4 Background -- 4.1 Service Miniatures of MCC -- 4.2 Deployment Miniatures of MCC -- 5 Features of Mobile Cloud and Its Computing -- 5.1 Scalability -- 5.2 Mobility. , 5.3 Mobile Cyber Security with Privacy -- 5.4 Enhancing Reliability with Mobile Computing -- 5.5 Reduced Cost -- 5.6 Multiple Occupancy -- 5.7 Imbalance Web Transmission -- 6 Why Mobile Cloud Computing? -- 7 Issues in MCC -- 7.1 Scarcity of Mobile Appliances -- 7.2 Safety and Seclusion -- 7.3 Short Data Transferral Rate (Bandwidth) -- 7.4 Offloading -- 7.5 Quality of Communication and Broadcasting -- 8 Conclusion -- References -- Corroborating the Veracity of Body Fat Percentage and Classification of Sarcopenia Using Island Differential Evolution Algorithm -- 1 Introduction -- 2 Methodology -- 3 Optimization of the Formula and Techniques Used -- 4 Regression and Genetic Algorithm -- 5 Residuals and Goodness-of-Fit -- 6 Identification and Classification of Sarcopenia -- 7 Island Differential Evolution Algorithm -- 8 Results Obtained -- 9 Conclusion -- References -- Design of Compact Super-Wideband Monopole Antenna for Spectrum Sensing Applications -- 1 Introduction -- 2 Antenna Configuration -- 2.1 SWB QSCA -- 2.2 QSCA with Notch Bands -- 3 Results Discussion -- 4 Conclusion -- References -- Probabilistic and Distance-Aware Clustering Approach to Decrease the Effect of Hot Spot in WSN -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 WSN Challenges -- 1.3 Energy Efficiency -- 1.4 Clustering -- 1.5 LEACH -- 2 Distance Effect -- 2.1 Hot-Spot Effect -- 2.2 Residual-Energy-Based Clustering -- 3 Related Work -- 4 Proposed Protocol -- 5 Results -- 6 Conclusion -- References -- A Real-Time Sentiments Analysis System Using Twitter Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Tweepy Stream Listener -- 3.2 Preprocessing -- 3.3 Sentimental Analysis -- 3.4 Representation -- 3.5 Tweet Storage -- 4 Case Studies -- 4.1 Qualifying 3-Spanish Grand Prix 2019 -- 4.2 Indian Election Results-2019 -- 5 Conclusion and Future Scope. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (585 pages)
    Edition: 1st ed.
    ISBN: 9789811697357
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.285
    DDC: 006.3
    Language: English
    Note: Intro -- ICAIT-2021 Organization -- Preface -- Contents -- About the Editors -- Part I Invited Papers -- 1 Utilization of the Open-Source Arduino Platform to Control Based on Logic Eτ -- 1.1 Introduction -- 1.2 Theoretical Reference -- 1.2.1 Irrigation System -- 1.2.2 Irrigation Methods and Systems -- 1.2.3 Localized Irrigation -- 1.2.4 Paraconsistent Logic -- 1.2.5 Paraconsistent Annotated Evidential Logic Eτ -- 1.2.6 Para-Analyser Algorithm -- 1.2.7 Arduino -- 1.3 Methodology -- 1.4 Results -- 1.5 Conclusion -- References -- 2 Ontology Implementation of OPC UA and AutomationML: A Review -- 2.1 Introduction -- 2.2 Research Method -- 2.3 Results Analysis -- 2.4 Discussions -- 2.5 Conclusions -- References -- Part II Regular Papers -- 3 Airport Cab Scheduling Model Based on Queuing Theory -- 3.1 Problem Restatement -- 3.1.1 Problem Background -- 3.1.2 Problem Requirements -- 3.2 Model Assumptions -- 3.3 Symbol Description -- 3.4 Problem Analysis -- 3.4.1 Problem One Analysis -- 3.4.2 Problem Two Analysis -- 3.4.3 Problem Three Analysis -- 3.4.4 Problem Four Analysis -- 3.5 Model Building and Solving -- 3.5.1 Give the Taxi Driver's Decision Model in the Two Choices of A and B -- 3.5.2 Analyze the Rationality of the Model Through the Relevant Data of a Domestic Airport and Its City Taxi -- 3.5.3 How to Set the "Boarding Point" to Maximize the Efficiency of the Ride -- 3.5.4 A Theoretical Analysis of the Scale of "Boarding Points" and Lane Sides -- 3.5.5 According to the Difference in the Mileage of Different Taxis, Develop a "Priority" Arrangement Plan to Maximize Time and Revenue -- References -- 4 Machine Reading Comprehension Model Based on Multi-head Attention Mechanism -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 DuReader Dataset -- 4.2.2 DuReader Baseline Model -- 4.2.3 Multi-headed Attention Mechanism -- 4.3 Multi-head Attention Mechanism. , 4.3.1 Multi-head Attention Presidential Structure -- 4.3.2 Scaled Dot-Product Attention -- 4.4 Model Structure -- 4.4.1 Task Definition -- 4.4.2 Embedded Layer -- 4.4.3 Coding Layer -- 4.4.4 Matching Layer -- 4.4.5 Modeling Layer -- 4.4.6 Output Layer -- 4.5 Experiments and Results -- 4.5.1 Evaluation Criteria -- 4.5.2 Dataset -- 4.5.3 Experiments and Results -- 4.6 Conclusion -- References -- 5 Design of Military Physical Fitness Evaluation System Based on Big Data Clustering Algorithm -- 5.1 Introduction -- 5.2 Hardware Unit Design of Military Physical Fitness Evaluation System -- 5.3 Software Module Design of Military Physical Fitness Evaluation System -- 5.3.1 Construction Module of Military Physical Fitness Evaluation Index System -- 5.3.2 Application Module of Big Data Clustering Algorithm -- 5.3.3 Database Building Module -- 5.4 Experiment and Result Analysis -- 5.4.1 Construction of Experimental Environment -- 5.4.2 Experimental Data Analysis -- 5.4.3 Acquisition of Experimental Results -- 5.5 Conclusion -- References -- 6 ResNet-Based Multiscale U-Net for Human Parsing -- 6.1 Introduction -- 6.2 Related Work -- 6.3 Our Proposed Method -- 6.3.1 Encoder -- 6.3.2 Decoder -- 6.3.3 Multiscale Feature Fusion -- 6.4 Experiments -- 6.4.1 Datasets -- 6.4.2 Evaluation Metrics -- 6.4.3 Results -- 6.5 Conclusion -- References -- 7 Short-Term Electricity Price Forecast Based on SSA-SVM Model -- 7.1 The Introduction -- 7.2 SSA -- 7.3 SVM -- 7.4 The SSA-SVM Model -- 7.5 Example Analysis -- 7.5.1 Data Processing -- 7.5.2 Data Normalization -- 7.5.3 Evaluation Indicators -- 7.5.4 Analysis of Prediction Results -- 7.6 Conclusion -- References -- 8 Research on Mobile Advertising Click-Through Rate Estimation Based on Neural Network -- 8.1 Pricing and Placement of Advertisements -- 8.2 The AUC Indicators. , 8.3 Estimating Click-Through Rates of Mobile Ads Based on Neural Networks -- 8.3.1 Model -- 8.3.2 Objective Function and Algorithm -- 8.3.3 Key Points of Optimization -- 8.3.4 Result Analysis -- 8.4 Conclusion -- References -- 9 Research on Macroeconomic Prediction Technology Based on Wavelet Neural Network -- 9.1 Prediction Technology -- 9.2 Optimized Wavelet Neural Network Model -- 9.3 Case Study -- 9.3.1 Specific Introduction -- 9.3.2 Training of Learning Samples -- 9.3.3 Analyze the Macroeconomic Forecast Results -- 9.4 Conclusion -- References -- 10 Design Research on Financial Risk Control Model Based on CNN -- 10.1 Risk Control Model in Unbalanced Data Environment -- 10.1.1 Features of Financial Data -- 10.1.2 Pretreatment -- 10.1.3 Risk Control Model -- 10.2 Convolutional Neural Network (CNN) is Used to Build a Financial Risk Control Model -- 10.2.1 Design Network Structure -- 10.2.2 Result Analysis -- 10.2.3 Innovative Analysis -- 10.3 Conclusion -- References -- 11 Application of Multi-objective Optimization Algorithm in Financial Market Portfolio -- 11.1 Genetic Algorithm Analysis of Multi-objective Programming -- 11.2 Analysis of Portfolio Optimization Model Based on Genetic Algorithm -- 11.2.1 Model Framework -- 11.2.2 Factor Analysis -- 11.2.3 Risk Indicators -- 11.3 Application Results -- 11.3.1 Data Processing -- 11.3.2 Optimal Solution of Investment Portfolio -- 11.3.3 Comparative Analysis -- 11.4 Conclusion -- References -- 12 Research on Success Factors of Long Rental Apartment Based on SEM-ANN -- 12.1 Introduction -- 12.2 Methods -- 12.2.1 SEM Model -- 12.2.2 ANN Model -- 12.2.3 Research Model Based on SEM-ANN -- 12.3 Result Analysis -- 12.4 Conclusion -- References -- 13 T-AGP: A Kind of Music-Researching Method Based on Data-Driven Comprehensive System of Network Analysis -- 13.1 Introduction. , 13.2 Structure and General Description -- 13.3 The Influencer Network and Influence Analysis -- 13.3.1 Influence Measures -- 13.3.2 Subnetwork Analysis -- 13.4 Similarity Measure -- 13.4.1 The Exploration of Core Features -- 13.4.2 Micro-Similarity Between Two Pieces of Music -- 13.4.3 Macro-Similarity Between Two Genres -- 13.5 Similarity and Difference Between Genres -- 13.5.1 Genre Similarity Analysis -- 13.5.2 Genre Influence Analysis -- 13.5.3 What Distinguishes a Genre -- 13.5.4 Relationships Between Genres -- 13.5.5 Genres' Changes Over Time -- 13.6 The Mechanism of Influence from Influencer to Follower in Music -- 13.7 Dynamic Analysis Over Time and Identification of Major Leaps in Music -- 13.7.1 Dynamic Analysis of the Network -- 13.7.2 Music Characteristics' Evolution Over Time -- 13.8 Cultural Influence on Music -- 13.8.1 Influence from Technology -- 13.8.2 Influence from Social and Political Revolution -- 13.9 Conclusions and Prospects -- 13.9.1 Conclusions -- 13.9.2 Weakness -- 13.9.3 Prospects -- References -- 14 Application of Improved Algorithm of BP Neural Network -- 14.1 Model Analysis of BP Neural Network -- 14.2 Improve the Algorithm -- 14.3 Specific Application -- 14.3.1 PI Parameter Tuning of Valve Positioner -- 14.3.2 Shipboard Navigation System -- 14.4 Conclusion -- References -- 15 Application of Improved Harmony Search Algorithm in Photovoltaic MPPT Under Partial Shadow Conditions -- 15.1 Introduction -- 15.2 Analysis of Output Characteristics of Photovoltaic Cells Array in Partial Shadow -- 15.3 Harmony Search (HS) Algorithm -- 15.3.1 Traditional Harmony Search Algorithm -- 15.3.2 Improvement of Traditional HS Algorithm -- 15.3.3 MPPT Control Method Based on IHS Algorithm -- 15.4 Simulation Experiment Analysis -- 15.5 Conclusion -- References -- 16 A Traditional Butterfly Optimization Algorithm MPPT Method. , 16.1 Introduction -- 16.2 Multi-peak Output Characteristics of Photovoltaic Cells Under Local Shade -- 16.2.1 Mathematical Models of Multiple Photovoltaic Cells -- 16.2.2 Multi-peak Output Characteristics -- 16.3 MPPT Flow Chart Based on BOA -- 16.4 Simulation and Result Analysis -- 16.4.1 Simulation -- 16.4.2 Result Analysis -- 16.5 The Conclusion -- 1. References -- 17 Crops Plantation Problem in Uncertain Environment -- 17.1 Introduction -- 17.1.1 Motivation -- 17.1.2 Literature Review -- 17.1.3 Proposed Approaches -- 17.2 Basic Principles -- 17.3 Uncertain Crops Plantation Problem -- 17.4 Method -- 17.5 Conclusion -- References -- 18 Simplified Full-Newton Step Method with a Kernel Function -- 18.1 Introduction -- 18.2 Preliminaries -- 18.2.1 The Central Path of the Perturbed Problems -- 18.2.2 Search Directions -- 18.2.3 The Iterative Process of the Algorithm -- 18.3 The Properties of Simple Function and the Proximity Function -- 18.4 Algorithm Analysis -- 18.4.1 The Feasibility Step -- 18.4.2 Upper Bounds for paralleldxfparallel -- 18.4.3 Values of θ and τ -- 18.4.4 Centering Steps -- 18.4.5 Total Number of Main Iterations -- 18.5 Conclusion -- References -- 19 Marine Ship Identification Algorithm Based on Object Detection and Fine-Grained Recognition -- 19.1 Introduction -- 19.2 Overall Process -- 19.3 Design Scheme -- 19.3.1 Construction of Data Sets -- 19.3.2 Target Detection Network -- 19.3.3 Fine-Grained Identification Network -- 19.4 Experimental Verification -- 19.5 Conclusions and Prospects -- References -- 20 Automatic Detection of Safety Helmet Based on Improved YOLO Deep Model -- 20.1 Introduction -- 20.2 YOLOv5 Network Model -- 20.2.1 Input -- 20.2.2 Backbone -- 20.2.3 Neck -- 20.2.4 Output -- 20.3 Improvements -- 20.3.1 Anchor Boxes and Detection Scale -- 20.3.2 Loss Function -- 20.4 Experimental Result and Analysis. , 20.4.1 Dataset.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (694 pages)
    Edition: 1st ed.
    ISBN: 9789811625022
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1391
    DDC: 327.120971
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Decision Support System -- Recommended Model of Pollution Information Based on Collaborative Filtering Algorithm -- 1 Introduction -- 2 Calculation of the Similarity of Pollution Information -- 3 Default Prediction Complement -- 4 Obtaining the Similarity Matrix Between Users -- 5 The Solution of the Model -- 6 Analysis of Model Results -- References -- Research on the Evaluation of TCM Service Level in Various Regions of China -- 1 Introduction -- 2 Data Sources and Methods -- 2.1 Data Sources -- 2.2 Methods -- 3 Results -- 3.1 Principal Component Analysis -- 3.2 Cluster Analysis -- 4 Discussion -- 4.1 Regional Disparities in TCM Service Levels -- 4.2 The Effect of Health Services is not Commensurate with the Level of Economic Development -- References -- A Method for Evaluating Health Status of Rail Transit Signaling Equipment Based on Group Decision -- 1 Introduction -- 2 Related Work -- 3 Establishing Rules for an Evaluation System -- 3.1 Defining an Evaluation Organization -- 3.2 Defining the Evaluation Scope -- 3.3 Establishing the Weight Coefficient Vector -- 3.4 Establishing Alarm Rules to Monitor Equipment Faults -- 3.5 Setting Parameters for an Equipment Type -- 4 Implementation of an Evaluation System -- 4.1 Fault Monitoring Cycle -- 4.2 Health Evaluation Cycle -- 5 Conclusion -- References -- Intelligent Decision Support System for Precision Medicine (IDSS 4 PM) -- 1 Introduction -- 2 Theoretical Foundation-Simon's Model of Decision-Making -- 3 Intelligent Decision Support Systems (IDSSs) -- 4 Precision Medicine: An Emerging Approach in Medical Decision-Making -- 5 How Technologies Are Advancing Precision Medicine? -- 5.1 Business Analytics -- 5.2 Cognitive Computing -- 6 Theory Practice and Discussion -- 7 Characteristics of IDSS 4 PM -- 8 Conclusion. , References -- A Study of Result-Oriented Performance Appraisal-Taking Huawei as an Example -- 1 Introduction -- 2 Increasing Flexibility of Bonus Package -- 2.1 Reducing Long-Term Returns and Increasing Short-Term Returns -- 2.2 Widening the Gap and Clarifying the Hierarchy -- 2.3 Awarding the Current Contribution Immediately -- 3 Abandoning the Cumbersome Human Resource Assessment -- 3.1 Assessment by Objectives -- 3.2 Avoiding Establishing KPI Indicators in Isolation for Each Department -- 4 Taking the Responsibility and Result-Oriented Method -- 4.1 Good Performance and Good Return -- 4.2 Combination of Performance Evaluation and Reverse Evaluation -- 4.3 Eliminating Pretending Hard-Working -- 5 The Conclusion -- References -- Under a Management Perspective: Analysis of the Relationship Between Trust and Behavior Decision-Making -- 1 Introduction -- 2 Data and Measurement -- 2.1 Data Sources -- 2.2 Variable Description and Reliability Validity Test -- 3 Data Analysis and Discussion -- 3.1 The Difference of Public Trust Under Different Demographic Variables -- 3.2 The Differences in the Ways of Public Behavior Decision-Making Under Different Demographic Variables -- 3.3 The Relationship Between Trust and Behavior Decision-Making -- 4 Conclusion -- References -- Research on the Regulation of Industrial Structure in the Mid-Southern Liaoning Urban Agglomeration from the Perspective of Spatial Connection -- 1 Introduction -- 2 Research Area and Data Sources -- 2.1 Overview of the Study Area -- 2.2 Data Sources -- 3 Research Method -- 3.1 Spatial Shift-Share Model -- 3.2 Determination and Improvement of Spatial Weight -- 4 Result Analysis -- 4.1 Analysis of the Temporal and Spatial Pattern of Urban Spatial Interaction -- 4.2 Analysis of Shift Share of Industrial Structure -- 5 Conclusions -- References. , Research on the Influence Mechanism of Family-Supportive Supervisor Behaviors on Employees' Intention to Stay from the Perspective of Dual Scenario Embeddedness -- 1 Introduction -- 2 Theoretical Basis and Research Hypothesis -- 2.1 FSSB and Employees' Intention to Stay -- 2.2 The Mediating Role of Dual Scenario Embeddedness -- 2.3 The Moderating Role of Employees' Gratitude as a Trait -- 3 Study Design -- 3.1 Participants and Survey Methods -- 3.2 Variable Measurement -- 4 Research Results -- 4.1 Descriptive Statistical Analysis -- 4.2 Discrimination Validity Analysis and Common Method Test -- 4.3 Hypothesis Testing -- 5 Conclusion -- 5.1 Theoretical Contribution -- 5.2 Management Implications -- 5.3 Research Limitations and Prospects -- References -- Policy Burden, Industry Competition, and Corporate Risk-Taking -- 1 Introduction -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 Policy Burden and Corporate Risk-Taking -- 2.2 The Regulating Effect of Industry Competition -- 3 Research Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Selection and Model Design -- 4 Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Analysis of Regression Results -- 5 Endogenous Control and Robustness Test -- 5.1 Endogenous Problems -- 5.2 Robustness Analysis -- 6 Research Conclusions -- References -- Blended Teaching Mode of Tourism English Based on TPACK -- 1 Introduction -- 2 TPACK Theory -- 3 ESP and Tourism English -- 4 Research Design -- 4.1 Design Concept -- 4.2 Problem Design -- 4.3 Subjects and Teaching Contents -- 4.4 Research Steps -- 5 Experimental Conclusion -- References -- Technology and Innovation Management -- Research on Privacy Protection of Internet of Things Search Data Based on Fine-Grained Authorization -- 1 Introduction -- 2 Background Knowledge -- 2.1 Secret Search -- 2.2 Attribute-Based Encryption Scheme. , 3 System Program -- 3.1 System Architecture -- 3.2 Program Process -- 4 Safety and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Concluding Remarks -- References -- Design of Emergency Rescue Deduction System for Bus Fire Accident Based on Virtual Reality -- 1 Introduction -- 2 The Functional Requirements of Deducing System -- 3 The Design of Deduce System Architecture -- 4 Function Design of Deducing System -- 4.1 Scene Editing Module -- 4.2 Deduce Management Module -- 4.3 Client Operation Module -- 5 Composition of the Deduction System -- 6 Conclusion -- References -- Application of Game Theory in the Field of Technology Innovation -- 1 Introduction -- 2 The Application of Oligopoly Model in Technological Innovations -- 2.1 The Development of Cournot Model in Technological Innovations -- 2.2 Application and Development of Stackelberg in Technological Innovations -- 2.3 Application of Option Game Oligopoly Model in Technology Innovations -- 3 Research on Evolutionary Game Model in Technological Innovations -- 3.1 The Application of Evolutionary Game in Technological Innovations -- 3.2 The Development of Evolutionary Game Model in Technological Innovations -- 4 The Development Direction of Game Theory in Technological Innovations -- References -- Research on Innovation Mechanism of Corporate Volunteering in China -- 1 Introduction -- 2 The Concept and Connotation of Corporate Volunteering -- 3 The Status Quo of Volunteering in Chinese Enterprises -- 3.1 The Integration of Business Objectives Is Important for the Business Development Plan -- 3.2 Win the Sense of Belonging of Employees and the Identity of External Customers -- 3.3 Corporate Public Services Take from Society and Use for Society -- 3.4 Volunteering of Different Enterprises Vary Greatly -- 3.5 Long-Term Development of Volunteering Projects. , 3.6 Undertaking Government Public Service -- 4 Problems in the Development of Enterprise Volunteering in China -- 4.1 Insufficient Government Guidance -- 4.2 Information Guidance is not Strong -- 4.3 Lack of Corporate Volunteering Standards -- 4.4 Imbalance Between Long-Term and Short-Term Benefits -- 5 Development Trend of Corporate Volunteering -- 5.1 Internetization of Corporate Volunteering -- 5.2 Normalization of Corporate Volunteering -- 5.3 Diversification of Corporate Volunteering -- 5.4 Establish Self-organization of Corporate Volunteers -- 5.5 Corporate Volunteering Are Becoming More Standardized and Strict -- 6 Innovation of Corporate Volunteering Mechanism -- 6.1 Building Communication Network and Innovating Corporate Volunteering Mechanism -- 6.2 Taxation Policy -- 6.3 Expense Subsidies -- 6.4 Performance Evaluation -- 6.5 Establish a Sound Education and Training Mechanism -- 6.6 Establish a Sound Guarantee Mechanism to Protect the Volunteering of Enterprises -- References -- Research on the Differential Incentive Effect of Patent Pool on Specific Technology Learning -- 1 Research Background -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 The Impact of Patent Pool Formation on Specific Technology Learning -- 3 Research Design -- 3.1 Data and Samples -- 3.2 Variables and Their Measurement -- 4 Empirical Results and Analysis -- 4.1 Descriptive Statistical Analysis -- 4.2 Hypothesis Testing -- 5 Conclusion and Inspiration -- 5.1 Research Conclusion -- 5.2 Management Suggestions -- References -- Research on Present Situation and the Countermeasure Analysis of Football Training in University -- 1 Introduction -- 2 The Present Situation of Campus Football Training in China -- 3 Problems in the Development of Campus Football Activities in China -- 3.1 Students' Poor Awareness for Football Activities. , 3.2 Unreasonable Arrangement of Football Activities.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Intelligent agents (Computer software). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (626 pages)
    Edition: 1st ed.
    ISBN: 9789811698736
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.286
    DDC: 004.6782
    Language: English
    Note: Intro -- Committees -- Chief Patron -- Patrons -- Finance Chair -- General Chair -- International Advisory Committee -- Program Chair -- Program Committee -- Organizing Chair -- Organizing Co-chair -- Conference Coordinator -- Convener -- Co-convenor -- Technical Program Committee Chairs -- Preface -- Contents -- About the Editors -- Part I Cloud Computing, Image Processing, and Software -- 1 An Intelligent Online Attendance Tracking System Through Facial Recognition Technique Using Edge Computing -- 1.1 Introduction -- 1.1.1 Motivation and Contribution -- 1.1.2 Organization of the Paper -- 1.2 Related Works -- 1.2.1 In the Year 2017 -- 1.2.2 In the Year 2018 -- 1.2.3 In the Year 2019 -- 1.2.4 In the Year 2020 -- 1.3 Significance of Edge Computing for Online Attendance Tracking System -- 1.4 Methodology -- 1.4.1 Student Registration -- 1.4.2 Faculty Registration -- 1.4.3 Image Capture -- 1.4.4 Face Detection -- 1.4.5 Extraction of Face Encodings -- 1.4.6 Face Recognition -- 1.4.7 Attendance Updation -- 1.5 Practical Implementation -- 1.6 Results and Discussion -- 1.7 Conclusion and Future Work -- References -- 2 Cloud Analytics: An Outline of Tools and Practices -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Exploring the Ideology in Cloud-Based Analytics -- 2.4 Cloud Analytics Platforms -- 2.4.1 Qlik Sense Enterprise -- 2.4.2 Tableau -- 2.4.3 IBM Watson Analytics -- 2.4.4 Microsoft Power BI -- 2.4.5 TIBCO Spotfire X -- 2.4.6 SAS Business Analytics -- 2.5 Discussions -- 2.5.1 Benefits to Cloud-Based Analytics -- 2.5.2 Overview of Emerging Trends -- 2.6 Conclusion -- References -- 3 An Enhanced Fault-Tolerant Load Balancing Process for a Distributed System -- 3.1 Introduction -- 3.2 Background -- 3.2.1 Related Work -- 3.3 Proposed Enhanced Load Balancing Scheme with Resource Failure Rate Consideration -- 3.4 Simulated Results -- 3.4.1 Results. , 3.5 Conclusion -- References -- 4 HeartFog: Fog Computing Enabled Ensemble Deep Learning Framework for Automatic Heart Disease Diagnosis -- 4.1 Introduction -- 4.2 Related Works -- 4.3 HeartFog Architecture -- 4.3.1 Technology Used -- 4.3.2 Hardware Components Used -- 4.3.3 Software Components Used -- 4.4 HeartFog Design -- 4.4.1 Dataset -- 4.4.2 Heart Patient Data Pre-processing -- 4.4.3 Ensemble DL Application -- 4.4.4 Android Interface and Communication -- 4.4.5 Experimental Set-Up -- 4.4.6 Implementation -- 4.5 Results and a Discussion -- 4.6 Conclusion and Future Scope -- References -- 5 A Cloud Native SOS Alert System Model Using Distributed Data Grid and Distributed Messaging Platform -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Preliminaries -- 5.3.1 ZooKeeper as Cluster Coordinator -- 5.3.2 Kafka as a Data Streaming Platform -- 5.3.3 Ignite as the In-Memory Data Grid -- 5.4 Proposed Architecture -- 5.5 Implementation -- 5.6 Conclusion -- References -- 6 Efficient Peer-to-Peer Content Dispersal by Spontaneously Newly Combined Fingerprints -- 6.1 Introduction -- 6.2 Literature Review -- 6.3 Proposed Work -- 6.3.1 Overview -- 6.3.2 Framework Architecture -- 6.3.3 Content Uploading and Splitting -- 6.3.4 Fingerprint Detection -- 6.3.5 Content Distribution -- 6.3.6 Anonymous Communication Protocol -- 6.3.7 Identification of Illegal Distribution -- 6.4 Experimental Results -- 6.4.1 Content Uploading and Splitting -- 6.4.2 Fingerprint Generation -- 6.4.3 Content Distribution -- 6.4.4 Identifying and Preventing Illegal Redistribution -- 6.5 Conclusion -- References -- 7 An Integrated Facemask Detection with Face Recognition and Alert System Using MobileNetV2 -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Methodology -- 7.3.1 Facemask Detection Model -- 7.3.2 The Face-Recognition Model -- 7.3.3 Database -- 7.3.4 Web Application -- 7.4 Results. , 7.5 Conclusion -- References -- 8 Test Case Generation Using Metamorphic Relationship -- 8.1 Introduction -- 8.2 Usability of Successful Test Cases -- 8.3 The Formalization and Insight of Metamorphic Testing -- 8.4 Conclusion -- References -- Part II IoT/Network -- 9 IRHMP: IoT-Based Remote Health Monitoring and Prescriber System -- 9.1 Introduction -- 9.2 Previous Work -- 9.2.1 Architecture -- 9.2.2 Communication Protocol -- 9.3 IRHMP-IoT-Based Remote Health Monitoring and Prescriber System -- 9.3.1 Architecture -- 9.3.2 Functionalities Doctor -- 9.3.3 Implementation Working -- 9.4 Conclusion -- References -- 10 On Boundary-Effects at Cellular Automata-Based Road-Traffic Model Towards Uses in Smart City -- 10.1 Introduction -- 10.2 Review of the State-of-the-Art Available Works -- 10.3 Proposed Empirical Investigation -- 10.3.1 Search for More ECA Rules Toward Uses in Road-Traffic Simulation -- 10.3.2 Investigations on ECA Dynamics Toward Road-Traffic Simulation at Various Fixed-Boundary Situations -- 10.4 Detailed Discussions -- 10.5 Conclusive Remarks -- References -- 11 An Optimized Planning Model for Management of Distributed Microgrid Systems -- 11.1 Introduction -- 11.1.1 Components of a Micro Grid -- 11.1.2 Type of Micro Grid -- 11.2 Literature Survey -- 11.3 Proposed Model -- 11.3.1 Methodology -- 11.4 Results and Discussion -- 11.4.1 For PV System -- 11.4.2 For Wind System -- 11.4.3 For Fuel Cells Power Generating Systems -- 11.5 Conclusions -- References -- 12 Hard and Soft Fault Detection Using Cloud Based VANET -- 12.1 Introduction -- 12.2 Literature Study -- 12.3 Proposed Approach -- 12.3.1 Hard Permanent Fault Detection -- 12.3.2 Soft Fault Diagnosis -- 12.3.3 Fault Status Transmission Through Vehicular Cloud -- 12.4 Simulation Experiments and Discussions -- 12.5 Conclusion -- References. , 13 A Novel Intelligent Street Light Control System Using IoT -- 13.1 Introduction -- 13.2 Related Works -- 13.3 State of Art -- 13.3.1 Node MCU -- 13.3.2 PIR Sensor -- 13.3.3 Channel Relay -- 13.3.4 LDR -- 13.4 Proposed System -- 13.5 Features of Smart Street Light System -- 13.6 Results and Discussion -- 13.7 Conclusion and Future Scope -- References -- 14 Enhancing QoS of Wireless Edge Video Distribution using Friend-Nodes -- 14.1 Introduction -- 14.2 System Model -- 14.3 Video Dissemination Architecture -- 14.4 Simulation and Results -- 14.5 Conclusion -- References -- 15 Groundwater Monitoring and Irrigation Scheduling Using WSN -- 15.1 Introduction -- 15.2 Materials and Method -- 15.2.1 System Design -- 15.2.2 Data Collection -- 15.2.3 Hardware -- 15.2.4 Software and Database -- 15.2.5 Groundwater Level Measurement and Pumping Time -- 15.2.6 Crop Water Demand -- 15.2.7 Irrigation Water Requirements -- 15.2.8 Energy Consumption -- 15.2.9 Process Flow Diagram -- 15.2.10 Dashboard -- 15.3 Results -- 15.3.1 Discharge and Recharge of Groundwater -- 15.3.2 Electricity Consumption -- 15.3.3 Crop Water Demand -- 15.4 Conclusion -- References -- 16 A Soft Coalition Algorithm for Interference Alignment Under Massive MIMO -- 16.1 Introduction -- 16.2 System Model -- 16.3 Proposed Model -- 16.4 Experiment Results -- 16.5 Conclusion -- References -- Part III Optimization and Nature Inspired Methods -- 17 Improved Grasshopper Optimization Algorithm Using Crazy Factor -- 17.1 Introduction -- 17.2 Grasshopper Optimization Algorithms -- 17.2.1 Basic Grasshopper Optimization Algorithm (GOA) -- 17.2.2 Improved GOA with Crazy Factor (Crazy-GOA) -- 17.3 Result Analysis -- 17.4 Conclusion -- References -- 18 Reliability Estimation Using Fuzzy Failure Rate -- 18.1 Introduction -- 18.2 Reliability Using Fuzzy System -- 18.3 Discussion -- 18.4 Illustration. , 18.5 Conclusion -- References -- 19 A Sine Cosine Learning Algorithm for Performance Improvement of a CPNN Based CCFD Model -- 19.1 Introduction -- 19.2 Proposed SCA-CPNN-Based CCFD Model -- 19.2.1 Evaluation Criteria -- 19.3 Experimental Result Discussion -- 19.4 Conclusion -- References -- 20 Quality Control Pipeline for Next Generation Sequencing Data Analysis -- 20.1 Introduction -- 20.2 Background and Related Work -- 20.3 Datasets -- 20.4 Methods and Material -- 20.4.1 Duplicate Removal and Trimming -- 20.4.2 NGS Dataset -- 20.4.3 NULL Value Removal -- 20.4.4 Normalization -- 20.4.5 Dimensionality Reduction -- 20.5 Result Discussion -- 20.5.1 The Differentially Expressed Genes and Outlier Detection Visualization -- 20.5.2 The Differentially Expressed Gene Selection Using Dimension Reduction -- 20.6 Conclusion and Future Work -- References -- 21 Fittest Secret Key Selection Using Genetic Algorithm in Modern Cryptosystem -- 21.1 Introduction -- 21.1.1 Background -- 21.1.2 Motivation -- 21.1.3 Contribution -- 21.2 Preliminaries -- 21.2.1 Illustration of AVK -- 21.2.2 Genetic Algorithm -- 21.3 Proposed Work -- 21.4 Experiment Examples -- 21.5 Experiment Results -- 21.6 Performance Analysis -- 21.7 Randomness Verification -- 21.8 Conclusion -- 21.9 Future Work -- References -- 22 Variable Step Size Firefly Algorithm for Automatic Data Clustering -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Variable Step Size Firefly Algorithm -- 22.4 Result Analysis -- 22.5 Conclusion -- References -- 23 GWO Based Test Sequence Generation and Prioritization -- 23.1 Introduction -- 23.1.1 Motivation -- 23.2 Basic Concept -- 23.2.1 GWO Algorithm -- 23.2.2 Adjacency Matrix -- 23.2.3 Objective Function/Fitness Function -- 23.3 Proposed Approach -- 23.3.1 Overview -- 23.3.2 Generation of Control Flow Graph -- 23.4 Implementation -- 23.4.1 Experimental Result. , 23.4.2 Prioritization.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Mechatronics-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (892 pages)
    Edition: 1st ed.
    ISBN: 9789811502385
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1060
    DDC: 621
    Language: English
    Note: Intro -- Editorial -- Preface -- Contents -- About the Editors -- Mechatronics -- Dynamics Modeling of Active Full-Wheel Steering Vehicle Based on Simulink -- 1 Introduction -- 2 Dynamic Analysis and Modeling for Four-Wheel Steering Vehicle -- 2.1 Vehicle Coordinate System and Modeling Assumptions -- 2.2 Dynamic Differential Equations for Active Four-Wheel Steering Vehicle -- 2.3 Calculation of Normal Load of Each Wheel for 4WS Vehicle -- 2.4 Tire Model -- 3 Simulink Realization of Vehicle Dynamics Model -- 3.1 Wheel Velocity and Sideslip Angle Subsystem -- 3.2 Wheel Normal Load Subsystem -- 3.3 Tire Force Calculation Subsystem -- 3.4 Wheel Rotation Dynamics Subsystem -- 3.5 Roll Angle Calculation Subsystem -- 3.6 Body Dynamics Subsystem -- 4 Simulation Verification of Vehicle Dynamics Model -- 5 Conclusion -- References -- Modal Analysis and Dynamics Simulation of Elliptical Trainer -- 1 Introduction -- 2 Elliptical Structure and Simplification -- 3 Elliptical Trainer Simulation Analysis -- 3.1 Modal Analysis -- 3.2 Dynamics Simulation -- 4 Conclusion -- References -- Research and Design of Vehicle Simulation Subsystem of Testing Platform for CBTC System Based on Linux PowerPC -- 1 Introduction -- 2 Vehicle Simulation Subsystem -- 3 Unit Adapter -- 3.1 Hardware Platform Design -- 3.2 BSP Driver Development -- 4 Train Kinematics Simulation -- 4.1 Traction Calculation Model -- 4.2 Resistance Calculation Model -- 4.3 Braking Force Calculation Model -- 5 Implementation of Vehicle Simulation Subsystem -- 5.1 Environment Construction of Vehicle Subsystem -- 5.2 Implementation and Verification of Vehicle Subsystem -- 6 Conclusion -- References -- Analysis and Compensation of Angular Position Error in Servo Assembly -- 1 Introduction -- 1.1 Design of the High-precision Brushless Servo Assembly -- 2 Angular Position Error Analysis of the Servo Assembly. , 2.1 Analysis of Mechanical Factors Affecting Performance of Servo Assemblies -- 2.2 Shafting Error Analysis -- 3 Test Verification -- 3.1 Data Collection -- 3.2 Error Compensation Verification -- 4 Conclusion -- References -- Research on Exploratory Modeling of Combat Capability of Weapon SoS Based on Synergy -- 1 Introduction -- 2 Weapon System of Systems (SoS) -- 3 Exploratory Synergy Mechanism of Weapon SoS -- 3.1 The Characteristics of the Equipment System Synergy -- 3.2 Exploratory Synergetic Modeling of System Combat Capability -- 4 Explorative Modeling of Weapon SoS Combat Capability -- 4.1 Exploratory Construction of the Main Unit Model of the System's Combat Capability -- 4.2 Judgment Method of Relevant Relations of Operational Capability Subject Units -- 5 Conclusion -- References -- Research on Vibration Responses of Gear System with Backlash -- 1 Introduction -- 2 Mathematical Model -- 3 Numerical Simulation -- 4 Conclusion -- References -- Research on Application of CAN Bus Technology in Truck -- 1 Introduction -- 2 CAN Bus Technology Characteristics -- 3 Classification of Vehicle Networks -- 3.1 Class A Bus -- 3.2 Class B Bus -- 3.3 Class C Bus -- 4 Truck Bus Control System Network Scheme -- 5 Node Design -- 6 The Foreground and Developing Trend of Bus Technology in Automobile Network System Application -- References -- Design and Research of Calibration Method for Driving Loading Device of Single-Machine Thermal Vacuum Test System -- 1 Introduction -- 2 Overall Structure of Test System -- 3 Analysis of Calibration Principle -- 4 Design of Calibration Device for the Test System -- 4.1 Design of Support Frame -- 4.2 Installation Design of Calibration Arm -- 4.3 Design of the Loading of Weights -- 4.4 Design of Torque Calibration for Initial Position -- 4.5 Compensation Correction of Test System -- 5 Static Analysis -- 6 Conclusion. , References -- Wind Power and Hydropower Coordinated Operation Control Strategy Involving Electric Vehicles -- 1 Introduction -- 2 A Collaborative Optimal Scheduling Model for EV Charging and Wind Power and Hydropower -- 2.1 The Impact of Unordered Charging of Electric Vehicles on the Power Grid -- 2.2 Wind-EV-Hydro Control Principle -- 2.3 The Objective Function -- 2.4 The Constraint -- 2.5 Turbine Controller -- 3 The Example Analysis -- 4 Conclusions -- References -- Research on Intelligent Control System of Plate Straightening Based on Knowledge Acquisition -- 1 Introduction -- 2 Problem Solving and Analysis -- 3 Project Design of Straightening Machine Control System -- 3.1 Description and Analysis of the Method for Acquiring Shape Information -- 3.2 Analysis of Straightening Machine Intelligent Control System -- 3.3 Intelligent Control System Design -- 4 Analysis of Effect of Application of Shape Detection System -- 5 Conclusions -- References -- Numerical Simulation of Submarine Shaft-Rate Electric Field Based on COMSOL Finite Element -- 1 Introduction -- 2 Modeling of Ship in COMSOL -- 2.1 Model Simplification and Assumptions -- 2.2 Model Parameter -- 3 Simulation of Shaft-Rate Electric Field -- 3.1 Component Distribution of Electric Field -- 3.2 Electric Field Modes at Different Depths -- 4 Simulation of Different ICCP Protection Currents -- 4.1 Potential Distribution of Ship Hull Under Different ICCP Currents -- 4.2 Shaft-Rate Electric Field Under Different Cathodic Protection Currents -- 5 Conclusion -- References -- Gauss-Hermite PHD Maneuvering Multi-target Tracking Algorithm -- 1 Introduction -- 2 Probability Hypothesis Density Filter -- 2.1 Multi-target Tracking Stochastic Finite Set Theory -- 2.2 Mixed Gauss PHD -- 3 Gaussian-Hermitian PHD Algorithm Based on Interactive Multiple Models -- 3.1 Gaussian-Hermitian Filtering. , 3.2 Gaussian-Hermitian PHD Filtering Based on Interactive Multi-model -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- Research on Driving State Monitoring Based on Vehicle-Road Collaborative Wireless Positioning Technology -- 1 Introduction -- 2 The Vehicle Wireless Positioning Technology -- 3 Vehicle Wireless Positioning Principle Based on TDOA Ranging Method -- 3.1 TDOA Ranging Method -- 3.2 Vehicle Wireless Positioning Principle -- 3.3 Vehicle Motion State Monitoring Based on Vehicle-Road Coordination -- 4 Test Verification -- 5 Conclusion -- References -- Intelligent Systems -- Reliability Analysis of On-Board ATP System in Metro Based on Fuzzy Dynamic Fault Tree -- 1 Introduction -- 2 Methods and Materials -- 2.1 Analysis of Structure and Conditions of Metro ATP System -- 2.2 The Principle of Fuzzy Dynamic Fault Tree -- 2.3 Fuzzy Number Theory -- 3 Modeling and Solving of on-Board ATP System -- 3.1 Establishment of Dynamic Fault Tree Model -- 3.2 Fuzzy Calculation of Failure Rate and Maintenance Rate -- 3.3 Module Partitioning of Dynamic Fault Tree -- 3.4 Module Solution -- 3.5 Comparison and Analysis of Results -- 4 Conclusion -- References -- Image Fusion Based on Convolutional Sparse Representation with Mask Decoupling -- 1 Introduction -- 2 Convolutional BPDN Dictionary Learning with Mask Decoupling -- 3 Proposed CSRMD-Based Fusion Method -- 4 Experiments and Analysis -- 5 Conclusion -- References -- Research of the Test Algorithms of Servo System Frequency Characteristics -- 1 Introduction -- 2 Testing Sweep Signal of Servo System -- 3 Calculation of Frequency Characteristic -- 3.1 Fast Fourier Transform -- 3.2 Correlation Analysis -- 3.3 Power Spectrum Estimation -- 3.4 Least Squares Fitting -- 4 Conclusion -- References -- Utilization Factor Calculation Method Based on Adam Algorithm and Neural Network. , 1 Introduction -- 2 Model Establishment -- 2.1 Network Structure -- 2.2 Adam Optimization Algorithm -- 3 Model Training and Testing -- 3.1 Dataset -- 3.2 Model Parameters -- 3.3 Model Training and Testing -- 4 Conclusion -- References -- Demand Forecasting of Helicopter Aviation Materials Based on Multi-model Reliability Analysis -- 1 Introduction -- 2 Aviation Material Demand Forecast -- 2.1 Analysis and Forecast of High-Frequency Trouble Components -- 2.2 Analysis and Forecast of Reliability Growth Component -- 2.3 Analysis and Prediction of Basic Repairable Components -- 3 Application Example -- 3.1 Example 1 -- 3.2 Example 2 -- 4 Conclusion -- References -- A Fracture Model Established by Finite Element Simulation and Non-dominated Sorting Genetic Algorithm II for an Al Alloy -- 1 Introduction -- 2 Experiments and Methods -- 3 The Establishment of the Fracture Model -- 3.1 GTN Model -- 3.2 Determination of Model Parameters -- 4 Conclusions -- References -- Research on Fatigue-Magnetic Effect of High-Speed Train Wheelset Based on Metal Magnetic Memory -- 1 Introduction -- 2 ANSYS Fatigue Simulation and Analysis -- 2.1 Principle of Metal Magnetic Memory Detection and Fatigue Simulation Ideas -- 2.2 Boundary Conditions for Fatigue Simulation -- 2.3 Analysis Results of Fatigue Simulation -- 3 Test and Analysis -- 3.1 Acquisition of Test Data -- 3.2 Test Results and Analysis -- 4 Comparison Between Simulation and Test -- 5 Conclusions -- References -- Intelligent Manufacturing Information Security Sharing Model Based on Blockchain -- 1 Introduction -- 2 Related Works -- 3 Blockchain-Based Model for Intelligent Manufacturing -- 3.1 Architecture for Intelligent Manufacturing -- 3.2 System Model for Intelligent Manufacturing -- 3.3 Evaluation Index for Smart Manufacture -- 4 Example -- 5 Conclusion and Future Works -- References. , Research into Effects of Pearl Oyster Cultivation in Freshwater with Extensible Mind Mapping.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Medicine-Data processing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (491 pages)
    Edition: 1st ed.
    ISBN: 9789811960680
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.317
    DDC: 610.285
    Language: English
    Note: Intro -- ICAIHC Committee -- Preface -- Acknowledgements -- Contents -- About the Editors -- 1 An Adaptive Fuzzy-Based Clustering Model for Healthcare Wireless Sensor Networks -- 1.1 Introduction -- 1.1.1 Resource Management in WSN -- 1.2 Related Work -- 1.3 Proposed Model -- 1.3.1 Fuzzy Sets and Neuro-fuzzy Logic Theory -- 1.4 Simulation and Results -- 1.5 Conclusion and Future Work -- References -- 2 Artificial Pancreas (AP) Based on the JAYA Optimized PI Controller (JAYA-PIC) -- 2.1 Introduction -- 2.2 Problem Statements Formulations -- 2.2.1 Clinical Information -- 2.2.2 Simulation Model -- 2.2.3 MID -- 2.2.4 Patient Output -- 2.3 Control Algorithms -- 2.3.1 Development of JAYA-PIC -- 2.4 Results -- 2.4.1 JAYA-PIC Action in Patient -- 2.4.2 Analysis of Control Actions -- 2.5 Conclusions -- References -- 3 Security Issues and Solutions for Reliable WBAN-Based e-Healthcare Systems: A Systematic Review -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Secured WBAN Requirements -- 3.3.1 Security Paradigms for WBAN -- 3.3.2 Security Needs in WBAN -- 3.4 Security Solutions -- 3.5 Case Studies on WBAN Prototypes -- 3.6 Conclusion -- References -- 4 Brain Tumour Detection by Multilevel Thresholding Using Opposition Equilibrium Optimizer -- 4.1 Introduction -- 4.2 Multilevel Thresholding Based on Entropy -- 4.2.1 Multilevel Thresholding: A Mathematical Approach -- 4.2.2 Entropy Functions -- 4.3 Opposition Equilibrium Optimizer (OEO) -- 4.4 Proposed Brain Tumour Detection Method Using OEO-Based Multilevel Thresholding Approach -- 4.5 Results and Discussion -- 4.6 Conclusion -- References -- 5 RescuePlus -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Existing Solution -- 5.4 Proposed Solution -- 5.5 Result -- 5.6 Future Scope -- 5.7 Conclusion -- References -- 6 Skeletal Bone Age Determination Using Deep Learning -- 6.1 Introduction -- 6.2 Methodology. , 6.2.1 Data Set Selection -- 6.2.2 Data Pre-processing -- 6.3 Custom Model -- 6.3.1 Model Architecture -- 6.3.2 Approaches -- 6.4 Experiments -- 6.4.1 Loss Functions -- 6.4.2 Comparing with Pre-trained Models -- 6.5 Conclusion -- References -- 7 Chimp Optimization Algorithm-Based Feature Selection for Cardiac Image-Based Heart Disease Diagnosis -- 7.1 Introduction -- 7.2 Chimp Optimization Algorithm-Based Feature Selection for Heart Disease Diagnosis -- 7.2.1 Pre-processing -- 7.2.2 Feature Extraction -- 7.2.3 Feature Selection Using ChOA -- 7.2.4 Classification Using SVNN -- 7.3 Results and Discussion -- 7.4 Conclusion -- References -- 8 The Hospitality Industry's Impact on the COVID-19 Epidemic: A Case Study of Ukraine -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Research Methods -- 8.4 Results -- 8.4.1 State and Legal Measures -- 8.5 Conclusion -- References -- 9 Society in Front of a COVID-19 Pandemic: India Versus Ukraine -- 9.1 Introduction -- 9.1.1 Research Background -- 9.2 Research Methods and Materials -- 9.3 Results -- 9.3.1 The Speed of Virus Spreading -- 9.3.2 The Risk and Danger Rate Estimation -- 9.4 The Level of Trust in the National Healthcare System and the Satisfaction of Government's Response to COVID-19 Situation -- 9.5 The Emotions and General Psychological State of Respondents -- 9.6 Conclusions -- Notes -- References -- 10 Breast Cancer Detection Using Concatenated Deep Learning Model -- 10.1 Introduction -- 10.2 Proposed Methodology -- 10.2.1 Convolutional Neural Network -- 10.2.2 LSTM -- 10.3 Result Analysis -- 10.3.1 Dataset Description -- 10.4 Conclusion -- References -- 11 Recommendation of Pesticides Based on Automation Detection of Citrus Fruits and Leaves Diseases Using Deep Learning -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Proposed Work -- 11.3.1 Image Acquisition and Preprocessing. , 11.3.2 Image Segmentation -- 11.3.3 Diseases Prediction -- 11.3.4 Experimental Results -- 11.3.5 Fertilizer Recommendation -- 11.4 Conclusion -- References -- 12 Comprehensive Information Retrieval Using Fine-Tuned Bert Model and Topic-Assisted Query Expansion -- 12.1 Introduction -- 12.2 Review of Literature -- 12.3 Comprehensive Information Retrieval -- 12.3.1 BERT Model -- 12.3.2 Topic Modelling Using Latent Dirichlet Allocation -- 12.3.3 The Proposed CIR Architecture -- 12.4 The Proposed Approach -- 12.5 Experimental Results -- 12.5.1 Dataset -- 12.5.2 Evaluation Metrics -- 12.5.3 Performance Evaluations -- 12.5.4 Performance Comparison -- 12.5.5 Discussions -- 12.6 Conclusion -- References -- 13 Diabetic Retinopathy Detection Using CNN Model -- 13.1 Introduction -- 13.2 Related Work -- 13.3 Dataset Used -- 13.3.1 Overview -- 13.3.2 Augmentation -- 13.4 Defining CNN Model -- 13.4.1 Summary of Model Architecture -- 13.4.2 Model Layers -- 13.4.3 Loss Function -- 13.5 Result -- 13.6 Conclusion -- References -- 14 Digi-CANE-An IoT Savior for Visually Sensitive -- 14.1 Introduction -- 14.2 Literature Survey -- 14.3 Objective -- 14.4 General Flowchart -- 14.5 The Sensory Architecture -- 14.5.1 Emergency Sensor (Gyroscope) -- 14.5.2 Cane Module -- 14.5.3 Ultrasonic Sensor -- 14.5.4 Buzzer -- 14.5.5 Arduino Uno -- 14.5.6 Working -- 14.6 Circuit Diagram -- 14.6.1 Hardware Details -- 14.6.2 Working of Ultrasonic Sensor (HC-SR04) -- 14.6.3 Software Requirement Arduino IDE -- 14.7 Conclusion and Future Scope -- References -- 15 Link Performance in Community Detection Using Social Network -- 15.1 Introduction -- 15.2 Literature Review -- 15.3 Methods -- 15.4 Metrics -- 15.5 Experimental Results -- 15.6 Discussion -- 15.7 Conclusion -- References -- 16 Analyze Ego-Centric Nodes in Social Network Using Machine Learning Technique -- 16.1 Introduction. , 16.2 Review of Literature -- 16.3 Materials and Method -- 16.4 Link Influence Strategies -- 16.5 Result and Discussion -- 16.6 Conclusion -- 16.7 Future Enhancement -- References -- 17 5G Revolution Transforming the Delivery in Healthcare -- 17.1 Introduction -- 17.2 Literature Review -- 17.3 Features of 5G Technology -- 17.4 Problems Posed by Current Healthcare Industry -- 17.4.1 Lack of Universal Access -- 17.4.2 Long-Term Chronic Care Burden -- 17.4.3 Aging Population -- 17.4.4 Resource Constraints and Healthcare Disparities -- 17.5 Areas in Healthcare that 5G Will Boost -- 17.5.1 Imaging -- 17.5.2 Diagnostics -- 17.5.3 Data Analytics and Treatment -- 17.6 New Realms that 5G Will Enable -- 17.7 Real-World Trials -- 17.8 Positive Impacts of 5G on Our Healthcare System -- 17.9 Recommendations -- 17.10 Conclusion and Future Works -- References -- 18 A Systematic Review of AI Privileges to Combat Widen Threat of Flavivirus -- 18.1 Significance of AI in Flavivirus Disease Eradication -- 18.1.1 AI in Healthcare -- 18.1.2 Flavivirus-A Detailed Synopsis -- 18.1.3 Flavivirus Characteristics -- 18.1.4 Flavivirus Lifecycle -- 18.1.5 Flavivirus Epidemiology -- 18.2 Detection and Estimation of Flavivirus Disease with Machine Learning Models -- 18.3 Conclusions and Future Direction -- References -- 19 Early Detection of Sepsis Using LSTM Neural Network with Electronic Health Record -- 19.1 First Section -- 19.2 Method -- 19.2.1 Sepsis Data Preprocessing -- 19.2.2 LSTM Model -- 19.3 Result and Discussion -- 19.4 Conclusion -- References -- 20 Detection of COVID-19 Infection from Clinical Findings Using Machine Learning Algorithm -- 20.1 Introduction -- 20.2 Related Works -- 20.3 Materials and Methods -- 20.3.1 Medical Dataset Used -- 20.3.2 Data Preprocessing -- 20.3.3 Feature Selection -- 20.3.4 Classification Algorithms. , 20.4 Performance Evaluation and Results -- 20.4.1 Evaluation Measures -- 20.4.2 Results -- 20.5 Conclusion -- References -- 21 Development of Real-Time Cloud Based Smart Remote Healthcare Monitoring System -- 21.1 Introduction -- 21.2 System Framework -- 21.3 System Modeling -- 21.4 Results and Discussion -- 21.5 Conclusion -- References -- 22 Performance Analysis of Hyperparameters of Convolutional Neural Networks for COVID-19 X-ray Image Classification -- 22.1 Introduction -- 22.2 CNN and Its Optimizers -- 22.3 Experimental Results -- 22.4 Conclusion -- References -- 23 Sequence Rule Mining for Insulin Dose Prediction Using Temporal Dataset -- 23.1 Introduction -- 23.2 Literature Review -- 23.3 Definitions -- 23.3.1 Sequential Rule Mining -- 23.3.2 Support and Confidence -- 23.3.3 Sequence Rule Mining Algorithms -- 23.4 Methodology -- 23.5 Experiment Work -- 23.5.1 Dataset Used -- 23.5.2 Result and Discussion -- 23.6 Conclusion -- 23.7 Future Scope -- References -- 24 Ensemble Deep Learning Approach with Attention Mechanism for COVID-19 Detection and Prediction -- 24.1 Introduction -- 24.2 Related Work -- 24.3 Proposed Model -- 24.4 Data sets, Experiments, and Results -- 24.5 Conclusion and Future Scope -- References -- 25 Semantic Segmentation of Cardiac Structures from USG Images Using Few-Shot Prototype Learner Guided Deep Networks -- 25.1 Introduction -- 25.2 Proposed Work -- 25.2.1 Prototype Learner -- 25.2.2 Segmentor -- 25.3 Experiments -- 25.3.1 Dataset Description and Measures Used -- 25.3.2 Parameters -- 25.3.3 Results and Analysis -- 25.4 Conclusion -- References -- 26 Quantification of Homa Effect on Air Quality in NCR, India: Pollution and Pandemic Challenges in Cities and Healthcare Remedies -- 26.1 Introduction -- 26.1.1 Air Quality Global Challenge in Twenty-First Century -- 26.1.2 How Yajna and Vedic Rituals May Curb Pollution. , 26.2 Literature Review.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (377 pages)
    Edition: 1st ed.
    ISBN: 9789811922770
    Series Statement: Advances in Sustainability Science and Technology Series
    DDC: 004
    Language: English
    Note: Intro -- Committee Members -- Preface -- Contents -- About the Editors -- IOT, Big Data and Cloud Computing -- Big Data: A Boon to Fight Against Cancer Using Map Reduce Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 MapReduce Architecture -- 4 Conclusion -- References -- Security Attacks and Its Countermeasures in RPL -- 1 Introduction -- 2 Related Work -- 3 About RPL -- 3.1 Control Messages in RPL -- 3.2 Traffic and Modes of Operation in RPL -- 4 Attacks in RPL -- 4.1 Attacks Against Resources -- 4.2 Attacks Against Topology -- 4.3 Attacks Against Traffic -- 5 Analysis -- 6 Conclusion and Future Scope -- References -- An Optimal Policy with Parabolic Demand Carry Forwarded with Three-Parameter Weibull Distribution Deterioration Rate, Scarcity and Salvage Value -- 1 Introduction -- 2 Model Formulation -- 2.1 Assumptions -- 2.2 Notations -- 2.3 Mathematical Formulation -- 3 Numerical Examples -- 3.1 Sensitivity Analysis -- 4 Conclusion -- References -- Information Actions Use for System Activity: Action Modeling Schemas -- 1 Introduction -- 2 The Need in Information Actions Use for System Activity -- 3 Action Modeling Schemas for the Theory of Information Actions Use for System Activity -- 4 Conclusion -- References -- High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique -- 1 Introduction -- 2 Requirements of Hiding Information Digitally -- 3 Digital Image Forensic Techniques for Feature Extraction -- 4 Spatial Transform Techniques -- 5 Conclusion -- References -- Performance Evaluation of FSO Under Different Atmospheric Conditions -- 1 Introduction -- 2 Simulation Setup -- 2.1 Simulation Result and Analysis -- 3 Conclusion -- References -- Smart Communication -- Design and Performance Analysis of High Reliability QOS-Oriented Adaptive Routing Protocol for MANET. , 1 Introduction -- 2 MANET -- 2.1 MANETS Characteristics -- 2.2 Application Areas of MANETS -- 2.3 Link Stability -- 3 Literature Survey -- 4 QOS-Oriented Adaptive Routing Protocol for 'MANET' -- 4.1 Formulas -- 4.2 Algorithm -- 5 Results -- 6 Conclusion -- References -- Circular Patch Antenna with Perturbed Slots for Various Wireless Applications -- 1 Introduction -- 2 Parameters for the Proposed Design -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- A Secure Handshaking AODV Routing Protocol (SHS-AODV) with Reinforcement Authentication in MANET -- 1 Introduction -- 2 Ad Hoc on Demand Distance Vector -- 2.1 Path Discovery -- 2.2 Reverse-Path Setup -- 2.3 Forward-Path Setup -- 2.4 Route Table Management -- 2.5 Path Maintenance -- 2.6 Local Connectivity Management -- 3 Literature Survey -- 4 SHS-AODV Routing Protocol -- 4.1 Key Generation -- 4.2 Elliptic Curve Cryptographic Algorithm (Ecc) -- 4.3 Algorithm -- 5 Results -- 5.1 Simulation Environment -- 5.2 Performance Metrics -- 6 Conclusion -- References -- AI-Powered Smart Routers -- 1 Introduction -- 2 Related Work -- 2.1 Ununified Routing (Loosely Coupled Mono-Cum-Multi-agent Evolution Strategies) -- 2.2 Unified Routing (Close-Coupled Single-Cum-Multi-agent Evolution Strategies) -- 3 AI-Powered Network Routing -- 3.1 Regenerative Control Paradigm -- 3.2 Unified and Ununified AI-Powered Networking -- 4 Brainy (SMART/Intelligent) Network -- 4.1 Unified and Ununified AI-Powered Networking -- 5 Simulation -- 6 AI-Powered and Brainy Hardware Routers -- 6.1 Framework Design Formulation -- 6.2 Simulation Results -- 7 Conclusion -- References -- Modified Sierpinski Gasket Monopole Fractal Antenna for Sub 6 GHz 5G Applications -- 1 Introduction -- 2 Evaluation of Antenna Design -- 3 Performance Analysis of Proposed Antenna -- 4 Performance Analysis of Proposed Antenna -- 5 Conclusion. , References -- Design of a Dual-Ring Resonator Antenna for WBAN Applications -- 1 Introduction -- 2 Implementation of Dual-Ring Resonator -- 3 Results -- 4 Conclusion -- References -- Performance Analysis of MIMO Antenna for Isolation Improvement -- 1 Introduction -- 2 Single Antenna Design Calculations -- 3 Design of MIMO Antenna -- 4 Analysis of the Space Diversity of MIMO Antenna -- 5 Analysis of Prototype Orthogonal MIMO -- 6 Conclusion -- References -- Low Power and High-Speed Full Adder with Complemented Logic and Complemented XOR Gate -- 1 Introduction -- 2 Review of Full Adders -- 2.1 Hybrid Full Adder [9] -- 3 Proposed Full Adder -- 3.1 Sum Output Generation Using XNOR Cell -- 3.2 Carry Output Using XNOR Cell -- 4 Delay Analysis -- 5 4-Bit Adder -- 6 Power Analysis -- 7 Conclusion -- References -- Determining the Number of Bit Encryption That Is Optimum for Image Steganography in 8 Bit Images -- 1 Introduction -- 2 Various Techniques of Image Steganography -- 2.1 LSB Method -- 2.2 Palette-Based Technique -- 2.3 Secure Cover Selection -- 3 Terms Used -- 4 Proposed Method -- 5 Result -- 6 Discussion -- 7 Conclusion -- References -- Design and Analysis of 2nd-Order Bandpass Filters Using SIW and Microstrip Patch Transitions with Stub Matching -- 1 Introduction -- 2 Design-1 -- 3 Design 2 -- 4 Results Analysis -- 5 Conclusions -- References -- Planar Split Ring Resonating Antenna Design -- 1 Introduction -- 2 Antenna Design -- 3 Simulation Results -- 4 Conclusion -- References -- Pentagonal Microstrip Patch Antenna with Circular Slot for 9 GHz Applications -- 1 Introduction -- 2 Design of Pentagonal Patch with Slot -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- Simulation and Analysis of an Optical Communication System Implementing DCF with Various Pulse Generators -- 1 Introduction -- 2 Simulation and Design. , 3 Result and Discussion -- 4 Conclusion -- References -- Simulation and Analysis of an 8 Channel CWDM Optical Network Suitable for Smart City Applications -- 1 Introduction -- 1.1 Multiplexing -- 1.2 DWDM -- 1.3 CWDM -- 2 Simulation Setup -- 3 Result and Discussion -- 4 Conclusion -- References -- Design of Low-Power Dynamic Threshold MOSFET (DTMOS) Push-Pull Inverter -- 1 Introduction -- 2 Proposed Design and Analysis -- 3 Simulation Results -- 4 Conclusion -- References -- Epileptic Seizure Detection Using Deep Learning Architecture -- 1 Introduction -- 2 Literature Review -- 3 Method Initiation with Improved Techniques -- 3.1 Data Extraction -- 3.2 Data Classification -- 4 Proposed Model -- 5 Result and Discussion -- 6 Conclusion -- References -- Ultra High Rate Inter-Satellite Optical Wireless Transmission Using DP-QPSK -- 1 Introduction -- 2 Modulation Format and Inter-Satellite Link -- 3 Proposed Set up -- 4 Results and Discussion -- 5 Conclusion -- References -- Investigation on Reactive Power Compensation Using STATCOM -- 1 Introduction -- 2 Research Method -- 2.1 Block Description and Operational Strategy -- 2.2 Network Description and Simulation -- 3 Results and Discussion -- 4 Conclusion -- References -- Smart Energy Systems -- Optimization of Set-Point Deviation and Current Ripple of PMSM by CCS-MPC Method -- 1 Introduction -- 2 PMSM Model Description -- 3 Model Description of CCS-MPC Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Study, Design and Performance Analysis of Grid-Connected Solar PV System of Two Different Places Using PV syst Software -- 1 Introduction -- 2 Grid-Tied PV System -- 3 Methodology -- 3.1 PV Syst Software -- 3.2 Case Study -- 4 Input Requirement -- 4.1 Location -- 4.2 Tilt Angle -- 4.3 Albedo -- 4.4 Module and Inverter Specification -- 4.5 Economics Analysis. , 5 Simulation and Result -- 6 Conclusion -- References -- Transparent Solar Cell: A Powerful Device of Upcoming Era -- 1 Introduction -- 2 Discussion -- 2.1 Working Principle of Transparent Solar Cells -- 2.2 Different Types of Transparent Solar Cell -- 3 Applications -- 4 Conclusion -- References -- Machine Learning Techniques and Applications -- An Adaptive Firefly Optimization Algorithm for Human Gait Recognition -- 1 Introduction -- 2 Framework of the Proposed Approach -- 2.1 Gait Template Extraction -- 2.2 Introduction to Standard Firefly Algorithm (FA) -- 2.3 Adaptive Firefly Algorithm for Feature Selection -- 2.4 Pseudo-Code of an Adaptive Firefly Algorithm for Feature Selection -- 2.5 Combination of PCA and LDA -- 3 Experimental Analysis -- 3.1 Parameter Setting -- 3.2 Performance Evaluation Metrics of Classification -- 3.3 Results and Discussion -- 4 Conclusion -- References -- Job Prediction Astrology for Using Classification Techniques in Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Set (HOROSCOPE) -- 3.2 Feature Extraction -- 4 Data Processing Techniques -- 4.1 Logistic Regression -- 4.2 Naïve Bayes Classification -- 4.3 DTNB -- 5 Experiments and Analysis -- 6 Conclusion -- References -- Developed Face and Fingerprint-Based Multimodal Biometrics System to Enhance the Accuracy by SVM -- 1 Introduction -- 1.1 Face Recognition -- 1.2 Fingerprint Recognition -- 1.3 Fusion -- 2 Literature Review -- 3 Methodology -- 3.1 Face -- 3.2 Finger -- 3.3 Principal Component Analysis -- 3.4 SVM Classifier -- 4 Result and Experiments -- 5 Conclusion -- References -- A Survey on Deep Learning Techniques for Anomaly Detection in Human Activity Recognition -- 1 Introduction -- 2 Deep Learning -- 3 Methods and Implementation -- 4 Discussions -- 5 Conclusion -- References. , Evaluation of Different Paradigms of Machine Learning Classification for Detection of Breast Carcinoma.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Paleobiology-India. ; Plate tectonics-India. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (472 pages)
    Edition: 1st ed.
    ISBN: 9783030497538
    Series Statement: Vertebrate Paleobiology and Paleoanthropology Series
    Language: English
    Note: Intro -- Foreword -- References -- Preface -- Contents of the Volume -- References (those listed in Prof. Ashok Sahni's bibliography below are not included here) -- Bibliography of Ashok Sahni -- Contents -- Contributors -- 1 First Ornithischian and Theropod Dinosaur Teeth from the Middle Jurassic Kota Formation of India: Paleobiogeographic Relationships -- Abstract -- Introduction -- Geological Setting -- Age -- Methods and Materials -- Locality Information -- Fossils Collected -- Institutional Abbreviations -- Systematic Paleontology -- Discussion -- Biogeographic Links of the Kota Vertebrate Fauna -- Conclusions -- Acknowledgements -- References -- 2 Upper Gondwana (Jurassic to Early Cretaceous) Palynoflora of India: Its Correlation with Other Gondwana Continents and Phytogeographical Implications -- Abstract -- Introduction -- Geological Setting and Lithostratigraphy -- Jurassic -- Early Cretaceous -- Palynosequencing of the Jurassic and Early Cretaceous Deposits -- Jurassic -- Inter-basinal Correlation -- Jurassic-Cretaceous Boundary -- Early Cretaceous -- Inter-basinal Correlation -- Tectonics Versus Eustasy -- Intra-Gondwanan Correlation -- Paleovegetation and Paleoenvironment -- Phytogeography -- Conclusions -- Acknowledgements -- References -- 3 A Third, Remarkably Small, Tribosphenic Mammal from the Mesozoic of Australia -- Abstract -- Introduction -- Methods -- Type Locality -- Type Horizon, Rock Unit and Age -- Institutional Abbreviation -- Systematic Paleontology -- Discussion and Conclusions -- Acknowledgements -- References -- 4 Evidence for a Remarkably Large Toothed-Monotreme from the Early Cretaceous of Lightning Ridge, NSW, Australia -- Abstract -- Introduction -- Institutional Abbreviations -- Systematic Paleontology -- Conclusions -- Acknowledgements -- References. , 5 Role of Plate Tectonics and Global Climate Change in the Evolution of Angiosperms -- Abstract -- Introduction -- Palynological Records -- Pre-cretaceous Records -- Early Cretaceous Records -- Late Cretaceous Records -- Discussion -- Evolution of Angiosperm -- Angiosperm Evolution versus Tectonics -- Paleobotanical Records of Angiosperm Evolution -- Future Prospects -- Acknowledgements -- References -- 6 Anuran Lissamphibian and Squamate Reptiles from the Upper Cretaceous (Maastrichtian) Deccan Intertrappean Sites in Central India, with a Review of Lissamphibian and Squamate Diversity in the Northward Drifting Indian Plate -- Abstract -- Introduction -- Repository -- Systematic Paleontology -- Taxonomic Status of Amphibians and Squamates from the Maastrichtian of India: An Overview -- Amphibians -- Squamates -- Comparison with the Anuran and Squamate Diversities in Other Continents -- Conclusions -- Acknowledgements -- References -- 7 Chelonian Pelomedusoides Remains from the Late Cretaceous of Upparhatti (Southwestern India): Systematics and Paleobiogeographical Implications -- Abstract -- Introduction -- Geology -- Turtle Yielding Cretaceous Localities of India -- Southwestern India -- Upparhatti, Belgaum District, Karnataka State (Fig. 7.1G) -- Western India -- Worli Hill (Fig. 7.1C) -- Amboli (Fig. 7.1B) -- Lakshmipur, Kachchh, Gujarat State (Fig. 7.1A) -- Central India -- Kisalpuri, Dindori District, Madhya Pradesh State (Fig. 7.1D) -- Pisdura Area, Chandrapur District, Maharashtra State (Fig. 7.1F). -- Dongargaon, Chandrapur District, Maharashtra State (Fig. 7.1F) -- Southeastern India -- Kunnam Locality, Perambalur District., Tamil Nadu State (Fig. 7.1H) -- Kallamedu Locality -- Material and Methods -- Abbreviations -- Systematic Paleontology -- Discussion -- Conclusion -- Taxonomic Implications -- Paleobiogeographical Implications. , Acknowledgements -- Appendix: Other Horizons of the Indian Subcontinent (Outside India) from Which a Pleurodiran was Documented -- References -- 8 The Age of Dinosaurs in the Land of Gonds -- Abstract -- Introduction -- Dinosaurs in Gondwana and Post-Gondwana Formations -- Dawn: The Beginnings of Dinosaurs in the Late Triassic -- Discovery of Indian Dinosaurs -- Lower Maleri Formation (Late Carnian-Early Norian) -- Upper Maleri Formation (Late Norian) -- Lower Dharmaram Formation (Rhaetian) -- End-Triassic Mass Extinction Event -- Day: Triumph of the Dinosaurs in the Jurassic -- Upper Dharmaram Formation (Early Jurassic, Hettangian) -- Lower Kota Formation (Sinemurian-Toarcian) -- Upper Kota Formation -- Upper Jurassic Bagra Formation -- Origin and Early Evolution of Sauropodomorpha -- Evening: Dinosaurs in the Drifting Indian Plate During the Cretaceous -- Nimar Sandstone (Cenomanian-Turonian) -- Lameta Formation (Maastrichtian) -- A Passage to India: Discovery of Cretaceous Dinosaurs -- The Lameta Dinosaurs -- Titanosaurs -- Abelisaurs -- Ankylosaurs -- Kallamedu Formation -- Dinosaur Eggs and Babies -- Dinosaur Coprolites and Food Preference -- Night: Death of the Dinosaurs -- Asteroid Impacts -- Chicxulub Crater, Yucatan Peninsula, Mexico -- Shiva Crater, Mumbai Offshore Basin, India -- Killing Mechanism -- Deccan Volcanism -- Impact-Induced Volcanism -- Aftermath of the K-Pg Extinction -- Acknowledgements -- References -- 9 Leaving Gondwana: The Changing Position of the Indian Subcontinent in the Global Faunal Network -- Abstract -- Introduction -- Methods -- Faunal Similarity Networks -- Global Patterns -- Data Collection -- Results and Discussion -- The Late Cretaceous of the Indian Subcontinent -- The Paleocene of the Indian Subcontinent -- The Eocene of the Indian Subcontinent -- Global Faunal Network of the Cretaceous and Paleogene. , Density, Centrality, and Modularity -- A Theoretical Paleocene Fauna from the Indian Subcontinent -- Conclusions -- Acknowledgments -- Appendix 1: Data and Bins -- Appendix 2: Faunal Network Function -- References -- 10 Island Africa and Vertebrate Evolution: A Review of Data and Working Hypotheses -- Abstract -- Introduction -- The Native African Fauna (Fig. 10.2) -- The Fauna of the Island Africa -- The Fate of the Native Fauna (Fig. 10.2) -- The Island Africa: an Underpopulated Biotic Province? -- Colonization of Island Africa by Newcomers (Figs. 10.4, 10.5) -- Africa as a Secondary Cradle -- The End of Isolation of Africa -- Conclusions -- Acknowledgements -- References -- 11 Contrasting Biomarker Signatures of Cretaceous and Early Paleogene Coal-Bearing Sediments During the Northward Flight of India -- Abstract -- Introduction -- Material and Methods -- Sampling -- Analytical Method -- Results -- Terpenoid Composition of Early Cretaceous Sediments -- Aliphatic Fraction -- Aromatic Fraction -- Terpenoid Composition of Eocene Sediments -- Aliphatic Fraction -- Aromatic Fraction -- Discussion -- Inferences from Early Cretaceous Terpenoids -- Inferences from Eocene Terpenoids -- Implications for Early Cretaceous and Eocene Vegetation of India -- Conclusions -- Acknowledgements -- References -- 12 New Specimens of Frugivastodon (Mammalia: Apatotheria) from the Early Eocene of India Confirm Its Apatemyid Status and Elucidate Dispersal of Apatemyidae -- Abstract -- Introduction -- Material and Methods -- Abbreviations -- Institutional Abbreviations -- Measurements -- Systematic Paleontology -- Phylogenetic Analysis -- Objectives and Methodology -- Results -- Discussion -- Discussion -- Relationships of Frugivastodon -- Geographic Origin of Frugivastodon and the Dispersal of Apatemyids -- Conclusions -- Acknowledgements -- References. , 13 Size Variation Amongst the Non-volant Mammals from the Early Eocene Cambay Shale Deposits of Western India: Paleobiogeographic implications -- Abstract -- Introduction -- Methodology -- Timing of India-Eurasia Collision -- A Brief Historical Background of Biogeographically Important Vertebrate Fossil Record (Including Mammals) from the Cretaceous-Paleogene (K-Pg) Interval of India -- Age of the Cambay Shale Mammals -- Size Variation Amongst the Non-volant Mammalian Groups Known from the Cambay Shale -- Evolutionary Relationship(s) of the Large-Sized Component (Perissodactyls) from the Cambay Shale -- Discussion -- Caveats -- Acknowledgements -- Appendix -- References -- 14 Indohyus, Endemic Radiation of Raoellid Artiodactyls in the Eocene of India and Pakistan -- Abstract -- Introduction -- Materials and Methods -- Acronyms -- Systematic Paleontology -- Discussion -- References -- 15 The Murine Cradle -- Abstract -- Introduction -- Previous Work -- Materials and Methods -- Systematics -- Great Morphological Variation of Early Murines -- Early Murine Evolution in the Semi-isolated Cradle of the Indian Subcontinent -- Interpretation -- Acknowledgments -- References -- 16 New Data on the Siwalik Murines, Rhizomyines and Ctenodactylines (Rodentia) from the Indian Subcontinent -- Abstract -- Introduction -- Previous Work -- Muridae -- Spalacidae -- Ctenodactylidae -- Material and Methods -- Systematics -- Phylogenetic Analyses -- Characters -- Spalacids -- Characters -- Paleobiogeography -- Conclusions -- Acknowledgements -- References -- 17 Dispersal of Miocene Hominoids (and Pliopithecoids) from Africa to Eurasia in Light of Changing Tectonics and Climate -- Abstract -- Introduction -- Hominoid Systematics -- The First Eurasian Apes: Early Catarrhine Dispersals Out of Africa in the Miocene. , How Many Transcontinental Ape Dispersal Events Occurred and Between Which Continents? Biogeographic Links to Phylogeny, Tectonics, and Climate.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    San Diego :Elsevier Science & Technology,
    Keywords: Textile industry-Waste disposal. ; Clothing trade-Waste disposal. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (360 pages)
    Edition: 1st ed.
    ISBN: 9780128187593
    Series Statement: The Textile Institute Book Series
    DDC: 363.728
    Language: English
    Note: Intro -- Waste Management in the Fashion and Textile Industries -- Copyright -- Contents -- Contributors -- Part One: Introduction -- Chapter 1: Fashion waste management problem and sustainability: A developing country perspective -- 1.1. Introduction -- 1.2. Waste management -- 1.2.1. 3R approach -- 1.2.2. Exchange and renting -- 1.2.3. Upcycling concept -- 1.2.4. Controlling waste by lean concepts -- 1.2.4.1. Minimizing process waste -- 1.2.4.2. Minimizing material waste -- 1.2.5. Effluent treatment -- 1.2.6. Fashion consumption and consumer attitude -- 1.2.7. Product life cycle assessment -- 1.2.8. Recyclability -- 1.3. Recycling of plastics (polyester and nylon) -- 1.4. Survey findings -- 1.5. Conclusions and future directions -- Acknowledgment -- References -- Chapter 2: Hazards of fashion and textile waste: Approaches for effective waste management -- 2.1. Introduction -- 2.2. Problems and hazards associated with raw material types -- 2.3. Hazards of wasteful utilization of toxic chemicals-Land, water, and air pollution -- 2.3.1. Problems and hazards associated with toxic chemicals -- 2.3.2. Problems and hazards associated with water and air pollution -- 2.3.3. Problems and hazards associated with soil infertility and degradation -- 2.4. Problems and hazards caused by textile and fashion waste -- 2.4.1. Textile waste and associated hazards -- 2.4.2. Hazards and waste from fashion industry -- 2.4.3. Hazards of overproduction in fashion industry -- 2.4.4. Deleterious impacts of fast fashion on environment -- 2.4.5. Hazards due to transport and shipment of fashion merchandise -- 2.4.6. Hazards due to improper buying and usage behavior of consumers -- 2.4.7. Hazards due to problematic recycling -- 2.4.8. Hazards associated with fashion waste -- 2.5. Waste management strategies to combat textile and fashion hazards. , 2.5.1. Role of designers in waste management -- 2.5.2. Waste management at the raw material procurement stage -- 2.5.3. Role of manufacturers in waste management -- 2.5.4. Waste management by minimal and effective utilization of chemicals and water -- 2.5.5. Waste management by effective utilization of water -- 2.5.6. Wastewater recycling and treatment -- 2.5.6.1. Wastewater treatment -- 2.5.7. Waste elimination at source and waste minimization -- 2.5.7.1. Product changes as means of waste minimization -- 2.5.7.2. Process changes as means of waste minimization -- 2.5.8. Waste management by recycling and regeneration -- 2.5.8.1. Recycling and regeneration techniques -- 2.5.9. Innovative approaches by fashion industry for waste management -- 2.5.9.1. Emergence of smart fashion -- 2.5.9.2. Introducing the concept of slow fashion -- 2.5.9.3. Principle of sharing economy -- 2.5.9.4. Extended producer responsibility (EPR) and in-store collection -- 2.5.9.5. Endorsing closed loop system -- 2.5.9.6. Raising consumer awareness -- 2.5.10. Role of brands in waste management -- 2.5.11. Role of consumers in waste management -- 2.5.12. Disposal ecology for waste management -- 2.6. Conclusions -- Further reading -- Part Two: Waste management technologies in manufacturing -- Chapter 3: Management of spinning and weaving wastes -- 3.1. Introduction -- 3.2. Classification of waste -- 3.3. Waste in spinning -- 3.3.1. Blow room -- 3.3.2. Carding -- 3.3.3. Draw frame -- 3.3.4. Combing -- 3.3.5. Simplex -- 3.3.6. Ring frame -- 3.3.7. Winding -- 3.4. Waste in weaving -- 3.4.1. Warping -- 3.4.2. Sizing -- 3.4.3. Knotting -- 3.4.4. Gaiting/tying-in wastage -- 3.4.5. Selvedge -- 3.4.6. Chindi -- 3.4.7. Beam residual wastage -- 3.5. Recycling of spinning and weaving waste -- 3.6. Machine for waste management -- 3.6.1. Willow machine -- 3.6.2. Marzoli trash analyzer. , 3.6.3. Marzoli recycling waste reopener (RWR) -- 3.6.4. Roving stripping and opening machine -- 3.6.5. Thread extractor (Bhatia, 2017) -- 3.6.6. Garnetting machine -- 3.7. Conclusions -- Acknowledgment -- References -- Chapter 4: Management of wastes in garment manufacturing -- 4.1. Introduction -- 4.2. The importance of marker planning and fabric waste management -- 4.3. Recycling fiber, yarn, and fabric wastes and recent trends -- 4.4. Bangladesh using cotton waste as a source of biogas -- 4.5. Solid waste from the Ethiopian leather sector -- 4.6. The control measures in waste management -- 4.6.1. What can be done to minimize wastes? -- Garneting -- Web preparation -- 3D weaving -- Composite manufacturing -- Compression molding -- Seamless garments -- 4.7. Conclusions and future directions -- References -- Chapter 5: Technologies for the management of wastewater generated in wet processing -- 5.1. Introduction -- 5.2. Control of effluent quality -- 5.2.1. Equalization -- 5.2.2. Recovery of by-products -- 5.2.3. Process modification -- 5.2.4. Loss of chemicals -- 5.2.5. Segregation -- 5.3. Effluent treatment methods -- 5.3.1. Coagulation, flocculation, and precipitation -- 5.3.2. Adsorption methods -- 5.3.3. Synthetic ion exchangers -- 5.3.3.1. Fiber-based synthetic bioabsorbents -- 5.3.4. Biological treatments -- 5.3.5. Oxidation techniques -- 5.3.6. Membrane separation -- 5.3.6.1. Microfiltration (MF) -- 5.3.6.2. Ultrafiltration (UF) -- 5.3.6.3. Nanofiltration (NF) -- 5.3.6.4. Hyperfiltration (HF)/reverse osmosis (RO) -- 5.3.7. Electrochemical processes -- 5.3.7.1. Electrodialysis -- 5.4. Effluent treatment plant -- 5.5. Conclusions -- References -- Chapter 6: Management of air quality -- 6.1. Introduction -- 6.2. Effluent gas -- 6.2.1. CO2 removal -- 6.2.1.1. Amine scrubbing -- 6.2.1.2. CO2 storage -- 6.2.2. SOx removal -- 6.2.3. NOx removal. , 6.2.4. Mercury removal -- 6.3. Volatile organic compounds (VOCs) -- 6.4. Activated carbon fibers -- 6.5. Alternative technologies -- 6.6. Conclusions -- Funding -- References -- Part Three: Retail and consumer waste management technologies -- Chapter 7: Packaging waste and their management technologies -- 7.1. Introduction -- 7.2. Packaging defined -- 7.3. Functions of packaging -- 7.4. Materials used for packaging -- 7.5. Consumer attitudes -- 7.6. Managing package waste -- 7.6.1. Recycle -- 7.6.2. Waste prevention or material minimization -- 7.6.3. Reuse -- 7.6.4. Compostable -- 7.6.5. Energy recovery -- 7.7. Conclusions and future directions -- References -- Chapter 8: End of life clothes and their management -- 8.1. Introduction -- 8.2. Collection of used clothing -- 8.3. Reuse of secondhand clothing -- 8.4. Redesign and remanufacturing -- 8.5. Recycling -- 8.5.1. Mechanical recycling -- 8.5.2. Thermal recycling -- 8.5.3. Chemical recycling -- 8.6. Energy recovery -- 8.7. Disposal to landfill -- 8.8. Conclusions -- References -- Chapter 9: Organizations and standards related to textile and fashion waste management and sustainability -- 9.1. Introduction -- 9.1.1. Waste management and sustainability -- 9.1.1.1. Green manufacturing and recycling in fashion -- Organic cotton -- Organic cotton production across the globe -- The opportunities and setting standards for organic cotton -- 9.1.1.2. Green distribution -- 9.1.1.3. Green retailing -- 9.2. Organizations for waste management and sustainability -- 9.2.1. Fashion brands -- 9.2.1.1. HandM -- 9.2.1.2. Marks and Spencer -- 9.2.1.3. Patagonia -- 9.2.1.4. Nike -- 9.2.2. Few other fashion brands -- 9.3. Standards for waste management and sustainability -- 9.3.1. Global organic textile standards (GOTS) -- 9.3.2. Sustainable textile production (STeP) by OEKO-TEX. , 9.3.3. Eco-label certification such as STANDARD 100 by OEKO-TEX -- 9.3.4. Bluesign -- 9.3.5. Cradle to cradle -- 9.3.6. International standards organization -- 9.3.7. Higg index and sustainable apparel coalition -- 9.4. Other organizations and events -- 9.4.1. Zero discharge of hazardous chemicals (ZDHC) -- 9.4.2. UNGC code of conduct for the fashion and textile industry -- 9.4.3. Copenhagen fashion summit -- 9.4.4. Dow Jones sustainability world index -- 9.4.5. Fashion transparency index -- 9.4.6. Youth fashion summit -- 9.4.7. Specific codes of conduct in Australia -- 9.4.8. Specific codes of conduct in Germany -- 9.5. Extended producer responsibility (EPR) for textiles -- 9.5.1. EPR program for postconsumer textiles and clothing recovery -- 9.6. Challenges and opportunities in waste management with Indian paradigms -- 9.6.1. Upasana studio, Auroville, India -- 9.6.1.1. Tsunamika -- 9.6.1.2. Small steps -- 9.6.2. Fabric Monde, Bengaluru -- 9.6.3. Pratibha Syntex, Indore -- 9.6.4. Stylumia, Bengaluru -- 9.7. Conclusions and future directions -- 9.7.1. Significant findings -- 9.7.2. Future directions -- References -- Part Four: Other waste management technologies -- Chapter 10: Automotive waste management technologies -- 10.1. Introduction -- 10.2. Automotive waste -- 10.2.1. Recycling and energy recovery -- 10.2.2. Mechanical recycling -- 10.2.3. Argon process -- 10.2.4. Thermal treatment process -- 10.2.4.1. Pyrolysis process -- 10.2.4.2. Sequential gasification and combustion -- 10.2.5. Injecting molding with automobile shredder residue -- 10.3. Recycling automotive composites and components -- 10.4. End of life (EOL) -- 10.5. Other applications -- 10.6. Conclusions -- Funding -- References -- Chapter 11: Waste management in coated and laminated textiles -- 11.1. Introduction -- 11.2. Coated and laminated textiles -- 11.2.1. Coated textiles. , 11.2.2. Nanomaterial incorporated coated textiles.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (834 pages)
    Edition: 1st ed.
    ISBN: 9789811559716
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.194
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Intelligent and Cloud Computing -- M-Throttled: Dynamic Load Balancing Algorithm for Cloud Computing -- 1 Introduction -- 2 Literature Survey -- 3 Existing Algorithms -- 3.1 Throttled Load Balancing -- 3.2 Round-Robin Load Balancing -- 3.3 SJF Load Balancing -- 4 Proposed Algorithm: M-throttled -- 5 Implementation -- 6 Conclusion -- References -- iGateLink: A Gateway Library for Linking IoT, Edge, Fog, and Cloud Computing Environments -- 1 Introduction -- 2 Related Work -- 3 System Model and Architecture -- 3.1 Implementation Details -- 4 Case Studies -- 5 Conclusions and Future Work -- References -- Hetero Leach: Leach Protocol with Heterogeneous Energy Constraint -- 1 Introduction -- 2 Routing Algorithm -- 2.1 LEACH -- 2.2 Hetero Leach -- 3 Simulation and Result -- 4 Conclusion -- References -- A Semantic Matchmaking Technique for Cloud Service Discovery and Selection Using Ontology Based on Service-Oriented Architecture -- 1 Introduction -- 2 Service-Oriented Computing -- 2.1 Service-Oriented Architecture -- 3 Proposed Model -- 3.1 Client Request -- 3.2 Cloud Service Discovery -- 3.3 Cloud Service Selection -- 3.4 Cloud Ontology Triple Store -- 4 Proposed Matchmaking Technique -- 5 Conclusion and Future Work -- References -- An Intelligent Approach to Detect Cracks on a Surface in an Image -- 1 Introduction -- 2 Literature Review -- 3 Min-Max Gray Level Discrimination Method -- 4 Proposed Model for Crack Detection -- 5 Conclusion -- References -- A Study of Machine Learning Techniques in Short Term Load Forecasting Using ANN -- 1 Introduction -- 2 ANN in STLF -- 2.1 Multilayer Perceptron Network (MLP) -- 2.2 Learning -- 2.3 Generalization -- 2.4 MLP Organizes in Burden Estimating -- 3 Proposed Work -- 3.1 Back Propagation (BP) by ANN -- 3.2 Fuzzy Logic by ANN. , 3.3 Hereditary Calculation (HC) by ANN -- 3.4 Particle Swarm Optimization (PSO) by ANN -- 4 Conclusion -- References -- A Review for the Development of ANN Based Solar Radiation Estimation Models -- 1 Introduction -- 2 Basics of Artificial Neural Network (ANN) -- 3 ANN for Solar Radiation Estimation -- 4 Review of Global Radiation Estimation Using ANN -- 5 Comparative Study of All the Models -- 6 Identified Research Gap in Solar Radiation Estimation -- 7 Conclusion -- References -- Analysis and Study of Solar Radiation Using Artificial Neural Networks -- 1 Introduction -- 2 ANN Fundamentals -- 2.1 What is ANN? -- 2.2 Nodal Configuration -- 2.3 ANN Types -- 2.4 Learning Stuff -- 3 ANN Working Principle and Architecture -- 3.1 Introduction -- 4 Applications, Advantages, and Disadvantages -- 4.1 Applications -- 4.2 Advantages -- 4.3 Disadvantages -- 5 Methodology -- 5.1 ANN for Predicting Solar Radiation -- 5.2 Data Considered -- 5.3 Operating Stages -- 5.4 Performance -- 6 Comparison Between ANN-Based and Existing Modeling -- 7 Conclusion -- References -- A Scheme to Enhance the Security and Efficiency of MQTT Protocol -- 1 Introduction -- 2 Literature Review -- 2.1 Security Requirements of IoT -- 2.2 Privacy Concerns in IoT -- 2.3 MQ Telemetry Transport (MQTT) -- 2.4 Architecture of MQTT -- 2.5 MQTT Quality of Service -- 2.6 Security Issues with MQTT -- 2.7 Hash Functions and Digital Signatures -- 2.8 Channel Encryption -- 2.9 Summary of Findings -- 2.10 Problem Statement -- 3 Proposed Scheme -- 3.1 Registration Process -- 4 Result and Discussions -- 5 Conclusions -- References -- Software Fault Prediction Using Random Forests -- 1 Introduction -- 1.1 Random Forests (RF) -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Evaluation Criteria -- 4 Implementation and Results -- 5 Conclusion -- References. , A Power Optimization Technique for WSN with the Help of Hybrid Meta-heuristic Algorithm Targeting Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution Methodology -- 3.1 Design Efficient WSN Nodes -- 3.2 Clusterization of the Target Area -- 3.3 Deployment of WSN Nodes Using Spiral Pattern WSN Node Deployment Policy -- 4 Numerical Result Analysis -- 5 Conclusion and Future Work -- References -- A Model for Probabilistic Prediction of Paddy Crop Disease Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Paddy Crop Disease Classification -- 3.1 Brown Spot -- 3.2 Bacterial Leaf Blight -- 3.3 Leaf Smut -- 4 Implementation of the Model -- 4.1 Image Generation and Augmentation -- 4.2 Convolution Steps -- 4.3 Pooling Step -- 4.4 Fully Connected Layers -- 4.5 Disease Prediction -- 4.6 Process Flow Model -- 5 Algorithm of the Model -- 6 Experimental Results -- 7 Conclusions and Future Work -- References -- A Hybridized ELM-Elitism-Based Self-Adaptive Multi-Population Jaya Model for Currency Forecasting -- 1 Introduction -- 2 Methodology Adopted -- 2.1 ELM -- 2.2 Jaya -- 3 Dataset Description -- 4 Experimental Analysis -- 4.1 Abstract View of the Proposed Model -- 4.2 Proposed ELM-ESAMPJ Algorithm for Exchange Rate Analysis -- 4.3 Result Analysis -- 5 Discussions -- 6 Conclusion and Future Work -- References -- A Fruit Fly Optimization-Based Extreme Learning Machine for Biomedical Data Classification -- 1 Introduction -- 2 Machine Learning Techniques for Biomedical Data Classification -- 2.1 Extreme Learning Machine (ELM) -- 2.2 Fruit Fly Optimization (FFO) -- 2.3 The Proposed FFO-ELM Models -- 3 Result and Discussion -- 3.1 Data Description -- 3.2 Performance Evaluation -- 3.3 Result Analysis -- 4 Conclusion -- References -- Partial Reconfiguration Feature in Crypto Algorithm for Cloud Application. , 1 Introduction -- 2 Generations of Crypto Core -- 3 State of the Art -- 4 Architecture and Implementation -- 4.1 Low Processing Platform (LP) -- 4.2 Fog -- 4.3 Cloud -- 5 Conclusion -- References -- Proactive Content Caching for Streaming over Information-Centric Network -- 1 Introduction -- 2 System Model -- 3 Proposed Solution -- 3.1 Content Store (CS) -- 3.2 Ant Colony Process -- 4 Experimental Results -- 5 Conclusion -- References -- Performance Analysis of ERWCA-Based FLANN Model for Exchange Rate Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 FLANN Model -- 2.2 Evaporation Rate-Based Water Cycle Algorithm (ERWCA) -- 2.3 FLANN/ERWCA Model -- 3 Simulation Study -- 4 Conclusion -- References -- Multi-document Summarization Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experiment and Results Analysis -- 5 Conclusion -- References -- A Convolutional Neural Network Framework for Brain Tumor Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Input Image -- 3.2 Convolution Layer -- 3.3 Pooling Layer -- 3.4 Fully Connected Layer -- 3.5 Output Layer -- 4 Experimental Setup and Results -- 4.1 Dataset Description -- 4.2 Initial Kernel Weights -- 4.3 Activation Function -- 4.4 Loss Function Computation -- 4.5 Training -- 4.6 Model Parameters -- 4.7 Simulation Results -- 5 Conclusion -- References -- Load Balancing in Cloud Computing Environment Using CloudSim -- 1 Introduction -- 2 Related Work -- 3 Objective of Load Balancing in Cloud Computing -- 4 Necessity of Load Balancing -- 5 Verification of Load Balancing Using Cloud Simulator -- 5.1 Various Features of CloudSim Tool -- 5.2 Primary Elements of CloudSim Tool -- 5.3 Algorithm Utilized in CloudSim Tool for Load Balancing -- 6 Experimental Results -- 7 Conclusion -- References. , Assessment of Load in Cloud Computing Environment Using C-means Clustering Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Resource Allocation -- 3.2 Algorithm -- 4 Result Analysis -- 5 Conclusion -- References -- Parallel Implementation of Algebraic Curve for Data Security in Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Explicit Addition Formulation -- 4 Implementation -- 4.1 Sequential Implementation Methodology -- 4.2 Parallel Implementation Methodology -- 5 Experimental Results and Analysis -- 5.1 Sequential Implementation of Elliptic Curve Addition -- 5.2 Sequential Implementation of Hyperelliptic Curve Addition -- 5.3 Parallel Implementation of Hyperelliptic Curve Addition -- 6 Performance Comparison of Sequential and Parallel Implementation -- 7 Conclusion -- References -- A Design Towards an Energy-Efficient and Lightweight Data Security Model in Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Proposed Approach and Related Discussions -- 4.1 Lightweight Authentication Using CA Based Scheme -- 4.2 Lightweight Cryptography Using CA Based Scheme -- 5 Conclusions and Future Work -- References -- Fuzzification-Based Routing Protocol for Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- Fuzzy-Based Strategy Management in Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- A TWV Classifier Ensemble Framework -- 1 Introduction -- 2 Proposed TWV Classifier Ensemble -- 3 Experimental Setup and Result Analysis -- 4 Conclusion -- References -- Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based Devices. , 1 Introduction to Continuous Authentication (CA).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...