Keywords:
Soft computing-Congresses.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (470 pages)
Edition:
1st ed.
ISBN:
9783030493363
Series Statement:
Advances in Intelligent Systems and Computing Series ; v.1179
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=6299453
DDC:
006.3
Language:
English
Note:
Intro -- Welcome Message -- HIS-IAS 2019 Organization -- Chief Patron -- Patrons -- Advisors -- General Chairs -- Program Chairs -- Organizing Chairs -- Web Master -- Program Committee -- Additional Reviewers -- Contents -- Dimension Reduction with Extraction Methods (Principal Component Analysis - Self Organizing Map - Isometric Mapping) in Indonesian Language Text Documents Clustering -- 1 Introduction -- 2 Research Methodologies -- 2.1 Data -- 2.2 Clustering by k-Means with an Optimal k Value -- 2.3 Dimension Reduction Using PCA -- 2.4 Dimension Reduction Using SOM -- 2.5 Dimension Reduction Using Isomap -- 3 Results and Discussions -- 4 Conclusion -- References -- Reducing Data Volume in Instance Based Learning -- 1 Introduction -- 2 Some Considerations About IBL Algorithms -- 3 IBL Algorithms with Data Reduction -- 4 Data, Methodology, Experiments and Results -- 5 Conclusions -- References -- State Estimation of Moving Vehicle Using Extended Kalman Filter: A Cyber Physical Aspect -- 1 Introduction -- 2 Problem Formulation -- 2.1 Modelling of the Plant -- 2.2 Vehicular Network Model -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- ADAL System: Aspect Detection for Arabic Language -- 1 Introduction -- 2 Aspect Extraction Problems -- 3 Related Work -- 4 Proposed Method -- 5 Experiments and Results -- 5.1 Data -- 5.2 System's Outputs -- 5.3 Experimentation -- 6 Conclusion -- References -- Modelling, Analysis and Simulation of a Patient Admission Problem: A Social Network Approach -- 1 Introduction -- 2 Case Study Description -- 2.1 Data Collection -- 3 Model Formulation -- 3.1 Mathematical Model Representation -- 4 Social Network Analysis Method and Flexsim Healthcare Simulation System -- 4.1 Modelling of Collaborative Networks -- 4.2 Social Network Analysis for Collaborative Networks -- 5 Results and Discussion.
,
5.1 Validation of SNAM by FlexSim Healthcare Simulation -- 6 Conclusions and Future Work -- References -- Short-Term Load Forecasting: An Intelligent Approach Based on Recurrent Neural Network -- 1 Introduction -- 2 Related Works -- 3 An Overview of Recurrent Neural Networks -- 3.1 Recurrent Neural Networks (RNNs) -- 3.2 RNN with Long-Short-Term Memory (LSTM) -- 4 Hourly Peak Load Forecasting: Proposed Approach -- 4.1 Data Pre-processing -- 4.2 RNN-LSTM Analysis -- 4.3 Knowledge-Driven Tuning of Forecast Values -- 5 Experimental Evaluation -- 5.1 Study Area and Dataset -- 5.2 Experimental Setup -- 5.3 Results and Discussions -- 6 Conclusions -- References -- Design and Analysis of Anti-windup Techniques for Anti-lock Braking System -- 1 Introduction -- 2 Problem Formulation -- 2.1 Modelling of the Plant ch7Nouillant2002 -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- Wind-Power Intra-day Statistical Predictions Using Sum PDE Models of Polynomial Networks Combining the PDE Decomposition with Operational Calculus Transforms -- 1 Introduction -- 2 Intra-day Multi-step Wind Power Prediction -- 3 A Polynomial PDE Substitution Using Operational Calculus -- 4 PDE Decomposition Using Backward Differential Network -- 5 Prediction Experiments Using the Estimated Daily Data Periods -- 6 Conclusions -- References -- Heterogeneous Engineering in Intelligent Logistics -- 1 Introduction -- 2 ANT and Multi-agent Systems -- 3 Heterogeneous Engineering as an Assembly Tool in Intelligent Logistics -- 3.1 Intelligent Logistics Systems as Networks of Heterogeneous Actors -- 3.2 Intelligent Logistics Architectures -- 4 Conclusions -- References -- Extracting Unknown Repeated Pattern in Tiled Images -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Auto-Correlation of Image -- 3.2 Sliding a Template Strip and Comparing.
,
3.3 Proposed Method: Cyclic Bitwise XOR-ing -- 4 Results and Analysis -- 4.1 Tiled and Non Tiled Image Classification -- 4.2 Horizontal Lining Pattern -- 4.3 Vertical Lining Pattern -- 4.4 Validation of Algorithm -- 5 Conclusion -- References -- Convolutional Deep Learning Network for Handwritten Arabic Script Recognition -- 1 Introduction and Related Works -- 2 Deep Models for Handwritten Recognition -- 2.1 Restricted Boltzmann Machine (RBM) -- 2.2 Convolutional Restricted Boltzmann Machine (CRBM) -- 2.3 Regularization Methods -- 2.4 Model Settings -- 3 Experiments with Proposed Model -- 3.1 Dataset Description and Experimental Setting -- 3.2 Experimental Results and Comparison -- 4 Discussion -- 5 Conclusion -- References -- Diversity in Recommendation System: A Cluster Based Approach -- 1 Introduction -- 2 Related Work -- 2.1 Diversity in Recommendation System: State of Art -- 3 Proposed Approach -- 3.1 Diversification Algorithm -- 4 Experiment and Results -- 5 Conclusion -- References -- Contribution on Arabic Handwriting Recognition Using Deep Neural Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Feature Extraction -- 3.2 Sequence Modeling -- 4 Experiments and Discussion -- 4.1 KHATT Database -- 4.2 System Settings -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Analyzing and Enhancing Processing Speed of K-Medoid Algorithm Using Efficient Large Scale Processing Frameworks -- 1 Introduction -- 2 Related Work -- 3 Spark Architecture -- 3.1 Resilient Distributed Dataset (RDD) -- 3.2 Distributed Acyclic Graph (DAG) -- 4 Benefits of Spark over Hadoop -- 5 Proposed Modified K-Medoid++ Algorithm -- 5.1 Benefits of New Modified K-Medoid++ Algorithm over K-Medoid Algorithm -- 5.2 Flow Diagram of New Modified K-Medoid++ Algorithm -- 6 Experimental Analysis -- 7 Conclusion and Future Work -- References.
,
Multiple Criteria Fake Reviews Detection Based on Spammers' Indicators Within the Belief Function Theory -- 1 Introduction -- 2 Belief Function Theory -- 3 Multiple Criteria Fake Reviews Detection Based on Spammers' Indicators Within the Belief Function Theory -- 3.1 Modeling the Reviewer's Opinion Trustworthiness -- 3.2 Modeling the Reviewer Spamicity -- 3.3 Distinguishing Between the Fake and the Genuine Reviews -- 4 Experimentation and Results -- 4.1 Experimentation Tools -- 4.2 Experimental Results -- 5 Conclusion -- References -- Data Clustering Using Environmental Adaptation Method -- 1 Introduction -- 2 Preliminaries -- 2.1 Clustering -- 3 Description of Proposed Approach -- 4 Experimental Setup and Datasets -- 5 Result Analysis -- 6 Conclusion -- References -- Soft Computing, Data Mining, and Machine Learning Approaches in Detection of Heart Disease: A Review -- 1 Introduction -- 2 Literature Review -- 3 Discussion and Future Direction -- 4 Conclusion -- References -- A Novel CAD System for Breast DCE-MRI Based on Textural Analysis Using Several Machine Learning Methods -- 1 Introduction and Related Work -- 2 Proposed MRI-Based CAD System -- 2.1 Feature Extraction and Fusion -- 2.2 Feature Selection -- 2.3 Machine Learning Classifiers-Based Classification Model -- 3 Experimental Results and Evaluation -- 3.1 Materials -- 3.2 Experimental Setting and Evaluation Metrics -- 3.3 Experimental Results -- 4 Conclusion and Future Directions -- References -- An Adversarial Learning Mechanism for Dealing with the Class-Imbalance Problem in Land-Cover Classification -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Generation of Artificial Samples Using Adversarial Auto-Encoder -- 2.2 A Semi-supervised Algorithm for Choosing Synthetic Samples to Be Included in the Balanced Training Set -- 3 Experimental Results -- 3.1 Dataset Description.
,
3.2 Experimental Details and Analysis of Results -- 4 Conclusion -- References -- An Integrated Fuzzy ANP-TOPSIS Approach to Rank and Assess E-Commerce Web Sites -- 1 Introduction -- 2 Related Works -- 3 The Proposed Approach -- 3.1 Criteria Identification -- 3.2 Criteria Weights Distribution Using Fuzzy ANP -- 3.3 Ranking and Assessment Using Fuzzy TOPSIS -- 4 Application of the Fuzzy Integrated ANP-TOPSIS Approach -- 5 Analysis and Discussion of Results -- 6 Conclusion -- Appendix -- References -- Implementation of Block Chain Technology in Public Distribution System -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Working of Block Chain -- 3.2 Existing System Working -- 3.3 Proposed System -- 4 Working -- 5 Conclusion -- References -- Chaotic Salp Swarm Optimization Using SVM for Class Imbalance Problems -- 1 Introduction -- 2 Salp Swarm Optimization (SSA) -- 3 Chaotic Map -- 4 Performance Metrics for Skewed Data Distribution -- 5 CSSA: The Working Model -- 5.1 Feature Selection Phase Using Chaotic Salp Swarm Algorithm (CSSA) -- 5.2 Classification Phase -- 6 Result and Analysis -- 6.1 Data Set -- 6.2 Results -- 7 Conclusion -- References -- Three-Layer Security for Password Protection Using RDH, AES and ECC -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 3.1 Encrypting Key of AES Using ECC -- 3.2 Hiding the Encrypted Data in a JPEG Image Using Reversible Data Hiding -- 4 Methodology -- 5 Results -- 5.1 Time Complexity of RDH -- 5.2 Time Complexity of AES -- 5.3 Time Complexity of ECC -- 5.4 Time Complexity of the Proposed Algorithm -- 6 Tabulation of Results -- 7 Conclusion -- References -- Clothing Classification Using Deep CNN Architecture Based on Transfer Learning -- 1 Introduction -- 2 Proposed Method -- 2.1 Inception-v3 Architecture -- 2.2 Transfer Learning -- 3 Experiments and Results -- 3.1 Dataset.
,
3.2 Experimental Settings.
Permalink