Keywords:
Machine learning.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (533 pages)
Edition:
1st ed.
ISBN:
9789811518843
Series Statement:
Advances in Intelligent Systems and Computing Series ; v.1101
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=6144193
Language:
English
Note:
Intro -- Organization -- Chief Patron -- Patron -- Steering Committee -- General Chairs -- Technical Program Committee Chair -- Convener -- Organizing Chairs -- Organizing Secretaries -- Organizing Committee -- Finance Chair -- Technical Program Committee -- Preface -- Contents -- About the Editors -- Mobile Device Transmission Security Policy Decision Making Using PROMETHEE -- 1 Introduction -- 2 Need for MCDM -- 3 Literature Review -- 3.1 MCDM Procedure -- 4 An Analogy -- 4.1 Criteria -- 4.2 Result Analysis -- 5 Conclusion -- References -- Stress Detection in Speech Signal Using Machine Learning and AI -- 1 Introduction -- 2 Databases for Stress Detection in Speech -- 2.1 Berlin Database -- 2.2 Toronto Emotional Speech Set Database (TESS) -- 2.3 Database Developed -- 3 Machine Learning and AI-Based Stress Classifier Algorithm -- 3.1 Machine Learning and AI-Based Stress Classifier -- 3.2 The MLUTs Are Filled Using the Following Algorithm -- 3.3 Elimination of Noise from Speech -- 4 Results -- 4.1 ANN Classifiers -- 4.2 Stress Detection -- 4.3 Detection of Stress Types -- 4.4 Stress Detection Based on Gender -- 4.5 Network Results of GDM with FitNet and Adaptive Filtering -- 4.6 APIA Percentage Sensitivity of Classifiers for Stress Classification -- 5 Conclusions -- References -- e-Classroom Using IOT to Revolutionize the Classical Way of Knowledge Sharing -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Attendance Record -- 3.2 Speech Controlled Slide Navigation -- 3.3 Resource Management -- 3.4 Record Keeping of Lecture Notes (e-Notes) -- 4 Experimental Setup and Results -- 5 Conclusion -- References -- An Efficient Heart Disease Prediction System Using Machine Learning -- 1 Introduction -- 2 Literature -- 3 Logistic Regression -- 4 Dataset Description -- 5 Proposed System -- 5.1 Data Cleaning.
,
5.2 Data Dimensionality Reduction -- 5.3 Correlation Identification -- 5.4 Flowchart -- 5.5 Algorithm -- 6 Performance Analysis -- 7 Conclusion and Future Scope -- References -- Automatic Helmet Detection in Real-Time and Surveillance Video -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Activation Function -- 5 Performance Analysis and Result -- 6 Conclusion -- References -- Camera Model Identification Using Transfer Learning -- 1 Introduction -- 2 Literature Review -- 2.1 SmallNet Based Neural Network -- 2.2 Feed-Forward Neural Network -- 3 CNN Architecture -- 3.1 Transfer Learning -- 3.2 Experimental Details -- 4 Conclusion -- References -- Sentiment Classification of Online Mobile Reviews Using Combination of Word2vec and Bag-of-Centroids -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Data Description -- 3.2 Steps of the Proposed Method -- 4 Experimental Results and Discussion -- References -- Emotion Analysis to Provide Counseling to Students Fighting from Depression and Anxiety by Using CCTV Surveillance -- 1 Introduction -- 2 Related Works -- 3 Basic Concepts -- 3.1 Haar Cascade Algorithm -- 3.2 Local Binary Patterns (LBP) -- 4 Proposed System Architecture -- 4.1 Face Recognition -- 4.2 Face Identification -- 4.3 Emotion Analysis -- 4.4 Feedback Generation -- 5 Conclusion and Future Work -- References -- Reconstructing Obfuscated Human Faces with Conditional Adversarial Network -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Objective -- 3.2 Network Architecture -- 4 Dataset -- 5 Experiment -- 5.1 Analysis of Generator Architecture -- 5.2 Analysis of Discriminator Architecture -- 6 Evaluation -- 6.1 For 7 × 7 Kernel Size -- 6.2 For 9 × 9 Kernel Size -- 6.3 For 11 × 11 Kernel Size -- 6.4 For 7 × 7 Kernel Size -- 6.5 For 9 × 9 Kernel Size -- 7 Conclusion -- References.
,
A Proposed Wireless Technique in Vehicle-to-Vehicle Communication to Reduce a Chain of Accidents Over Road -- 1 Introduction -- 2 Background Study -- 3 Related Work -- 4 Proposed Architecture -- 5 Conclusion -- References -- Virtual Conversation with Real-Time Prediction of Body Moments/Gestures on Video Streaming Data -- 1 Introduction -- 2 Related Work -- 3 Solution Approach -- 3.1 Hand Gesture/Movement Detection -- 3.2 Other Body Movements' Detection -- 3.3 The Role of Gesture/Body Movements on Virtual Conversation -- 4 Real-Time Generation of Body Movements for Virtual Machine Understanding -- 5 Application of Human Body Movements on Virtual Machines -- 6 Conclusions and Future Work -- References -- Automatic Diagnosis of Attention Deficit/Hyperactivity Disorder -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Test 1: Completing Task -- 3.2 Test 2: Audio Questionnaire -- 3.3 Test 3: Responding to Audio and Visuals -- 3.4 Test 4: Questionnaire for Informants -- 4 Experimentation -- 5 Conclusion and Future Scope -- References -- Classification of Types of Automobile Fractures Using Convolutional Neural Networks -- 1 Introduction -- 2 Convolutional Neural Network -- 2.1 Architecture -- 2.2 Model Description and CNN Training -- 3 Experimental Analysis and Results -- 3.1 Dataset -- 3.2 Architecture -- 4 Conclusion -- References -- A Subjectivity Detection-Based Approach to Sentiment Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments -- 5 Conclusion and Future Scope -- References -- Image Processing and Machine Learning Techniques to Detect and Classify Paddy Leaf Diseases: A Review -- 1 Introduction -- 2 Disease Detection and Classification -- 2.1 Preprocessing-Based Approaches -- 2.2 Segmentation-Based Approaches -- 2.3 Feature Extraction-Based Approaches -- 2.4 Classifier-Based Approaches.
,
2.5 Application of Techniques in Research Work -- 3 Comparative Analysis -- 4 Conclusion -- References -- A Comparative Study of Classifiers for Extractive Text Summarization -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Setup and Result Analysis -- 5 Conclusion and Future Work -- References -- Capabilities of Chatbots and Its Performance Enhancements in Machine Learning -- 1 Introduction -- 2 Components of Chatbot Architecture -- 3 Machine Learning and Chatbots -- 4 Benefits of Chatbots -- 5 Drawbacks of Chatbots -- 6 Conclusion -- References -- A Deep Learning-Based Approach for Predicting the Outcome of H-1B Visa Application -- 1 Introduction -- 2 Literature Review -- 3 Problem -- 3.1 Problem Statement -- 3.2 Approach -- 4 Dataset and Data Pre-processing -- 4.1 Chosen Attributes -- 4.2 Removing Outliers -- 4.3 Balancing Dataset -- 4.4 One-Hot Encoding -- 4.5 Normalization -- 5 Experiments -- 5.1 Training and Testing -- 5.2 Results -- 6 Future Scope -- References -- Data Leakage Detection and Prevention: Review and Research Directions -- 1 Introduction -- 2 Data Leakage Detection and Prevention -- 2.1 Phases of DLDP System -- 2.2 Characterizing DLDP Systems -- 3 Literature Review -- 4 Challenges and Research Directions -- 5 Conclusions -- References -- A Blockchain Based Model to Eliminate Drug Counterfeiting -- 1 Introduction -- 2 Background -- 3 Fake Drugs and Their Entry into the Supply Chain -- 3.1 Challenges Posed by Fake Drugs -- 3.2 Challenges in the Drug Supply Chain -- 4 Blockchain: The Solution -- 5 Proposed Model -- 6 Conclusion -- References -- A Comparative Analysis of Predictive Modeling Techniques: A Case Study of Device Failure -- 1 Introduction -- 2 Literature -- 3 Dataset -- 4 Proposed System -- 4.1 Proposed Algorithm -- 4.2 Model Details -- 5 Results -- 6 Conclusion -- References.
,
Python and OpenCV in Automation of Live Surveillance -- 1 Introduction -- 2 Object Detection -- 3 Image Processing -- 4 Haar Cascade [2] -- 4.1 Haar-Like Feature and Viola-Jones -- 4.2 Mathematical Model -- 5 Literature Review -- 6 Methodology -- 6.1 Collection of Images -- 6.2 Cropping and Marking Positives -- 6.3 For Creation of Vector File -- 6.4 Training -- 7 Experimental Setup -- 8 Results and Conclusion -- 9 Future Scope -- References -- Privacy Preservation in ROI of Medical Images Using LSB Manipulation -- 1 Introduction -- 2 Image Security Techniques -- 2.1 Watermarking -- 2.2 Steganography -- 2.3 Reversible Data Hidings -- 2.4 Region-Based Analysis -- 3 Data Hiding Techniques Using ROI Analysis -- 3.1 ROI Lossless Colored Medical Image Watermarking Scheme with Secure Embedding of Patient Data -- 3.2 Watermarking and Encryption in Medical Image Through ROI Lossless Compression -- 3.3 A Novel Medical Image Watermarking Technique for Detecting Tampers Inside ROI and Recovering Original ROI -- 4 Proposed ROI Hiding Algorithm -- 4.1 ROI Selection and Data Hiding -- 4.2 ROI Selection and Data Recovery -- 5 Experimental Results -- 6 Conclusion and Future Works -- References -- Novel Approach for Measuring Nutrition Values Using Smartphone -- 1 Introduction -- 1.1 Novel Approach -- 2 Approach (TensorFlow) -- 3 Graphs for MobileNets and Inception -- 4 Implementation -- 5 Conclusion -- References -- Detection of Hate Speech in Hinglish Language -- 1 Introduction -- 2 Related Work -- 3 Dataset Collection -- 4 Proposed Methodology -- 4.1 System Workflow Overview -- 4.2 LSTM Architecture -- 4.3 System Workflow (In Detail) -- 5 Performance Analysis -- 6 Conclusion and Future Scope -- References -- Enhancing Multi-level Cache Performance Using Dynamic R-F Characteristics -- 1 Introduction -- 2 Background -- 3 Proposed Work -- 3.1 Working.
,
4 Performance Analysis.
Permalink