GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2020-2024  (2)
  • 1
    Keywords: Natural computation-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (398 pages)
    Edition: 1st ed.
    ISBN: 9783030493394
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1180
    DDC: 6
    Language: English
    Note: Intro -- Welcome Message -- Organization -- IBICA-WICT 2019 Organization -- Chief Patrons -- Patrons -- Honorary Chairs -- General Chairs -- Program Chairs -- Web Chair -- Publication Chair -- Publicity Chairs -- IBICA Program Committee -- IBICA Additional Reviewers -- WICT Program Committee -- WICT Additional Reviewers -- Contents -- Towards the Speed Enhancement of Association Rule Mining Algorithm for Intrusion Detection System -- 1 Introduction -- 2 Overview of Intrusion Detection System -- 3 Related Work -- 4 Proposed Methodology -- 4.1 Dataset -- 4.2 Technology Used for Experimental Purpose -- 4.3 Experimental Approach -- 4.4 Experimental Result -- 5 Analysis of Result and Discussion -- 6 Conclusion -- References -- Image Retrieval Using Bat Optimization and Image Entropy -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Entropy -- 3.2 Bat Algorithm -- 4 Experimental Observations and Discussions -- 5 Conclusion -- References -- Logistic Regression on Hadoop Using PySpark -- 1 Introduction -- 2 Logistic Regression -- 2.1 Computation of Cost Function and Its Gradient -- 2.2 Optimization of the Cost Function -- 3 Implementation -- 4 Results -- 4.1 Comparing Test Performance -- 5 Conclusion -- References -- Analysis of Pre-processing Techniques for Odia Character Recognition -- 1 Introduction -- 1.1 Optical Character Recognition (OCR) -- 2 Odia Character Recognition -- 3 Factors Affecting the Quality of Odia Character Recognition and Significance of Pre-processing -- 3.1 Types of Pre-processing Techniques -- 4 Analysis of Different Pre-processing Techniques -- 5 Conclusions -- References -- Cluster-Based Under-Sampling Using Farthest Neighbour Technique for Imbalanced Datasets -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experimental and Simulation Results -- 4.1 Results -- 5 Conclusion. , References -- Vehicle Detection and Classification: A Review -- 1 Introduction -- 2 Methods Used for Vehicle Detection -- 2.1 Motion-Based Features -- 2.2 Appearance Based Features -- 2.3 Neural Networks -- 3 Methods Used for Vehicle Classification -- 3.1 Geometry-Based Approaches -- 3.2 Appearance-Based Approaches -- 3.3 Approaches Based on Texture -- 3.4 Mixed Approaches -- 4 Database -- 5 Conclusion -- References -- Methods for Automatic Gait Recognition: A Review -- 1 Introduction -- 2 Important Steps in a Gait Recognition System -- 2.1 Feature Extraction -- 2.2 Feature Selection -- 2.3 Classification -- 3 Model-Based Methods -- 4 Model-Free Methods -- 4.1 Gait Energy Image (GEI) -- 5 Gait Recognition Challenges -- 6 Existing Gait Databases -- 7 Conclusion -- References -- Comparative Performance Exploration and Prediction of Fibrosis, Malign Lymph, Metastases, Normal Lymphogram Using Machine Learning Method -- 1 Introduction -- 2 Flow Chart of the System -- 3 Description of the Dataset -- 4 Result Analysis -- 4.1 Evaluation and Predictions Results -- 4.2 Classification Tree -- 4.3 Distribution Plot -- 4.4 Scatter Plot for Lymphogram -- 4.5 Box Plot Analysis -- 5 Conclusion -- References -- Decision Forest Classifier with Flower Search Optimization Algorithm for Efficient Detection of BHP Flooding Attacks in Optical Burst Switching Network -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Datasets -- 3.2 Methodologies Used -- 4 Experiments -- 5 Results and Discussion -- 6 Conclusion and Future Scope -- References -- Review and Implementation of 1-Bit Adder in CMOS and Hybrid Structures -- 1 Introduction -- 2 Review of Full Adders -- 2.1 Standard CMOS Full Adder [1] -- 2.2 Hybrid Full Adder [2] -- 3 Implementation of Full Adder -- 3.1 XNOR Cell -- 3.2 4-T Cell -- 3.3 6-T Cell (Carry) -- 3.4 6-T Cell (Sum) -- 3.5 Full Adder. , 4 Performance Analysis -- 5 Conclusion -- References -- Design and Analysis of LOL-P Textile Antenna -- 1 Introduction -- 2 Proposed Design -- 2.1 Analysis of Circular Textile Antenna -- 3 Results and Discussions -- 3.1 Optimization Results -- 3.2 Analysis of Optimized Steps -- 3.3 Comparison Results of Various Substrate Materials -- 3.4 Fabrication Results -- 4 Conclusions and Future Scope -- References -- Analytical Study of Scalability in Coastal Communication Using Hybridization of Mobile Ad-hoc Network: An Assessment to Coastal Bed of Odisha -- 1 Introduction -- 1.1 Vulnerability of the Odisha Coastal Zone -- 1.2 Marine and Coastal Lines of Odisha -- 1.3 Objective -- 2 Literature Survey -- 2.1 Disaster Response System -- 2.2 Pre-disaster Communication -- 2.3 Post-disaster Communication -- 3 MANET in Rescue Communication, the Most Challenging Trend -- 3.1 Node Based Communications System -- 3.2 Cellular Based Communications System -- 4 Propose Method of Communication -- 4.1 Scalable Node Selection Method -- 4.2 Optimized Geographical Multicast Routing Protocol (OGMRP) -- 5 Methodology -- 6 Performance Evaluation -- 7 Simulation Analysis -- 8 Conclusion -- References -- Effect of Environmental and Occupational Exposures on Human Telomere Length and Aging: A Review -- 1 Introduction -- 1.1 Environmental and Occupational Exposures -- 2 What Are Telomeres? -- 3 Telomere Length Measurement -- 4 Telomere Length: A Biomarker of Aging -- 5 Association Between Telomere Length Shortening and Aging During Environmental or Occupational Exposures: Overview -- 6 Future Directions -- References -- A Review on VLSI Implementation in Biomedical Application -- 1 Introduction -- 2 Literature Review -- 3 Results and Comparison -- 4 Conclusion -- References. , Comparative Analysis of a Dispersion Compensating Fiber Optic Link Using FBG Based on Different Grating Length and Extinction Ratio for Long Haul Communication -- 1 Introduction -- 2 System Description and Simulation Design -- 3 Result and Analysis -- 4 Conclusion -- References -- Unsupervised Learning Method for Mineral Identification from Hyperspectral Data -- 1 Introduction -- 2 Related Work -- 3 HSI Model -- 4 Classification Approach -- 5 Possibilistic Fuzzy C-Means -- 6 Experiment and Result -- 7 Conclusion and Future Work -- References -- Short Term Load Forecasting Using Empirical Mode Decomposition (EMD), Particle Swarm Optimization (PSO) and Adaptive Network-Based Fuzzy Interference Systems (ANFIS) -- 1 Introduction -- 2 Proposed Work -- 3 IMF Formation in Decomposition of EMD -- 4 Working of ANFIS -- 5 Results and Discussion -- 6 Conclusion -- Appendix -- References -- Energy Conservation Perspective for Recharging Cell Phone Battery Utilizing Speech Through Piezoelectric System -- 1 Introduction -- 2 Existing Background -- 3 Basic Theory of Concept -- 4 Structural Modelling of System -- 4.1 Nano Generator -- 4.2 Piezoelectric Substrate -- 4.3 ZnO Electrodes -- 5 Methodology and Design -- 6 Analysis and Outcomes -- 7 Conclusions -- References -- A Progressive Method Based Approach to Understand Sleep Disorders in the Adult Healthy Population -- 1 Introduction -- 2 Process -- 2.1 Approaching Healthy Adults -- 2.2 Subject Inclusion and Exclusion Criteria -- 2.3 Meeting Subject -- 3 Screening Questionnaire -- 3.1 The Epworth Sleepiness Scale -- 3.2 Sleep Quiz -- 4 Screening Tools -- 4.1 Actigraphy and Sleep Diary -- 5 Administration of Neuropsychological Test Battery -- 5.1 Psychomotor Vigilance Test (PVT) -- 5.2 Forward Digit Span Test -- 5.3 IOWA Gambling Task -- 5.4 Wisconsin Card Sorting Task (WCST) -- 5.5 Tower of London Test (TOL). , 5.6 Stroop Test -- 5.7 Auditory Verbal Learning Test -- 6 Nocturnal Polysomnogram -- 7 Productivity Scale -- 8 A Case Study on the Indian Population -- 8.1 Utilization of Neuropsychology Test Battery -- 9 Conclusion -- References -- Semantic-Based Process Mining: A Conceptual Model Analysis and Framework -- 1 Introduction -- 2 Preliminaries -- 2.1 Semantic Web Search Technologies (SWS) -- 2.2 Data Labelling and Linking (Integration) -- 3 Systematic Mapping Study: Main Application Areas of the Process Mining and Semantic Modelling Tools/Methods -- 4 SPM-Based Framework and Design -- 5 Experimentation Analysis and Results -- 6 Discussion -- 7 Conclusion -- References -- Educational Process Intelligence: A Process Mining Approach and Model Analysis -- 1 Introduction -- 2 Related Works -- 3 Educational Process Intelligence (EPI) Model -- 4 Formalization of the EPI Algorithm -- 5 Analysis and Case Study Implementation -- 6 Discussion -- 7 Conclusion -- References -- Design and Development of a Mobile App as a Learning Strategy in Engineering Education -- 1 Introduction -- 1.1 Innovation in Engineering Education -- 1.2 Educational Innovation: Integration of Technology in the Classroom -- 2 A Novel Approach to Learn Thermodynamics -- 2.1 Thermodynamics Course in Engineering Curricula -- 2.2 Case of Study: Developing a Mobile App as an OER by Undergrad Engineering Students -- 2.3 Design and Implementation of the Mobile App -- 2.4 Results: Academic Performance of the Group -- 3 Conclusions -- References -- Beyond Things: A Systematic Study of Internet of Everything -- 1 Introduction -- 1.1 Internet of Everything: Connecting the Unconnected Things and People -- 1.2 Internet of Everything Ecosystem: Role of Big Data and Cloud -- 1.3 Role of Internet of Things in Internet of Everything Ecosystem -- 2 Related Work -- 3 Motivation. , 4 Importance of Internet of Everything (Over Internet of Things) in 21st century.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Soft computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (470 pages)
    Edition: 1st ed.
    ISBN: 9783030493363
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1179
    DDC: 006.3
    Language: English
    Note: Intro -- Welcome Message -- HIS-IAS 2019 Organization -- Chief Patron -- Patrons -- Advisors -- General Chairs -- Program Chairs -- Organizing Chairs -- Web Master -- Program Committee -- Additional Reviewers -- Contents -- Dimension Reduction with Extraction Methods (Principal Component Analysis - Self Organizing Map - Isometric Mapping) in Indonesian Language Text Documents Clustering -- 1 Introduction -- 2 Research Methodologies -- 2.1 Data -- 2.2 Clustering by k-Means with an Optimal k Value -- 2.3 Dimension Reduction Using PCA -- 2.4 Dimension Reduction Using SOM -- 2.5 Dimension Reduction Using Isomap -- 3 Results and Discussions -- 4 Conclusion -- References -- Reducing Data Volume in Instance Based Learning -- 1 Introduction -- 2 Some Considerations About IBL Algorithms -- 3 IBL Algorithms with Data Reduction -- 4 Data, Methodology, Experiments and Results -- 5 Conclusions -- References -- State Estimation of Moving Vehicle Using Extended Kalman Filter: A Cyber Physical Aspect -- 1 Introduction -- 2 Problem Formulation -- 2.1 Modelling of the Plant -- 2.2 Vehicular Network Model -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- ADAL System: Aspect Detection for Arabic Language -- 1 Introduction -- 2 Aspect Extraction Problems -- 3 Related Work -- 4 Proposed Method -- 5 Experiments and Results -- 5.1 Data -- 5.2 System's Outputs -- 5.3 Experimentation -- 6 Conclusion -- References -- Modelling, Analysis and Simulation of a Patient Admission Problem: A Social Network Approach -- 1 Introduction -- 2 Case Study Description -- 2.1 Data Collection -- 3 Model Formulation -- 3.1 Mathematical Model Representation -- 4 Social Network Analysis Method and Flexsim Healthcare Simulation System -- 4.1 Modelling of Collaborative Networks -- 4.2 Social Network Analysis for Collaborative Networks -- 5 Results and Discussion. , 5.1 Validation of SNAM by FlexSim Healthcare Simulation -- 6 Conclusions and Future Work -- References -- Short-Term Load Forecasting: An Intelligent Approach Based on Recurrent Neural Network -- 1 Introduction -- 2 Related Works -- 3 An Overview of Recurrent Neural Networks -- 3.1 Recurrent Neural Networks (RNNs) -- 3.2 RNN with Long-Short-Term Memory (LSTM) -- 4 Hourly Peak Load Forecasting: Proposed Approach -- 4.1 Data Pre-processing -- 4.2 RNN-LSTM Analysis -- 4.3 Knowledge-Driven Tuning of Forecast Values -- 5 Experimental Evaluation -- 5.1 Study Area and Dataset -- 5.2 Experimental Setup -- 5.3 Results and Discussions -- 6 Conclusions -- References -- Design and Analysis of Anti-windup Techniques for Anti-lock Braking System -- 1 Introduction -- 2 Problem Formulation -- 2.1 Modelling of the Plant ch7Nouillant2002 -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- Wind-Power Intra-day Statistical Predictions Using Sum PDE Models of Polynomial Networks Combining the PDE Decomposition with Operational Calculus Transforms -- 1 Introduction -- 2 Intra-day Multi-step Wind Power Prediction -- 3 A Polynomial PDE Substitution Using Operational Calculus -- 4 PDE Decomposition Using Backward Differential Network -- 5 Prediction Experiments Using the Estimated Daily Data Periods -- 6 Conclusions -- References -- Heterogeneous Engineering in Intelligent Logistics -- 1 Introduction -- 2 ANT and Multi-agent Systems -- 3 Heterogeneous Engineering as an Assembly Tool in Intelligent Logistics -- 3.1 Intelligent Logistics Systems as Networks of Heterogeneous Actors -- 3.2 Intelligent Logistics Architectures -- 4 Conclusions -- References -- Extracting Unknown Repeated Pattern in Tiled Images -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Auto-Correlation of Image -- 3.2 Sliding a Template Strip and Comparing. , 3.3 Proposed Method: Cyclic Bitwise XOR-ing -- 4 Results and Analysis -- 4.1 Tiled and Non Tiled Image Classification -- 4.2 Horizontal Lining Pattern -- 4.3 Vertical Lining Pattern -- 4.4 Validation of Algorithm -- 5 Conclusion -- References -- Convolutional Deep Learning Network for Handwritten Arabic Script Recognition -- 1 Introduction and Related Works -- 2 Deep Models for Handwritten Recognition -- 2.1 Restricted Boltzmann Machine (RBM) -- 2.2 Convolutional Restricted Boltzmann Machine (CRBM) -- 2.3 Regularization Methods -- 2.4 Model Settings -- 3 Experiments with Proposed Model -- 3.1 Dataset Description and Experimental Setting -- 3.2 Experimental Results and Comparison -- 4 Discussion -- 5 Conclusion -- References -- Diversity in Recommendation System: A Cluster Based Approach -- 1 Introduction -- 2 Related Work -- 2.1 Diversity in Recommendation System: State of Art -- 3 Proposed Approach -- 3.1 Diversification Algorithm -- 4 Experiment and Results -- 5 Conclusion -- References -- Contribution on Arabic Handwriting Recognition Using Deep Neural Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Feature Extraction -- 3.2 Sequence Modeling -- 4 Experiments and Discussion -- 4.1 KHATT Database -- 4.2 System Settings -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Analyzing and Enhancing Processing Speed of K-Medoid Algorithm Using Efficient Large Scale Processing Frameworks -- 1 Introduction -- 2 Related Work -- 3 Spark Architecture -- 3.1 Resilient Distributed Dataset (RDD) -- 3.2 Distributed Acyclic Graph (DAG) -- 4 Benefits of Spark over Hadoop -- 5 Proposed Modified K-Medoid++ Algorithm -- 5.1 Benefits of New Modified K-Medoid++ Algorithm over K-Medoid Algorithm -- 5.2 Flow Diagram of New Modified K-Medoid++ Algorithm -- 6 Experimental Analysis -- 7 Conclusion and Future Work -- References. , Multiple Criteria Fake Reviews Detection Based on Spammers' Indicators Within the Belief Function Theory -- 1 Introduction -- 2 Belief Function Theory -- 3 Multiple Criteria Fake Reviews Detection Based on Spammers' Indicators Within the Belief Function Theory -- 3.1 Modeling the Reviewer's Opinion Trustworthiness -- 3.2 Modeling the Reviewer Spamicity -- 3.3 Distinguishing Between the Fake and the Genuine Reviews -- 4 Experimentation and Results -- 4.1 Experimentation Tools -- 4.2 Experimental Results -- 5 Conclusion -- References -- Data Clustering Using Environmental Adaptation Method -- 1 Introduction -- 2 Preliminaries -- 2.1 Clustering -- 3 Description of Proposed Approach -- 4 Experimental Setup and Datasets -- 5 Result Analysis -- 6 Conclusion -- References -- Soft Computing, Data Mining, and Machine Learning Approaches in Detection of Heart Disease: A Review -- 1 Introduction -- 2 Literature Review -- 3 Discussion and Future Direction -- 4 Conclusion -- References -- A Novel CAD System for Breast DCE-MRI Based on Textural Analysis Using Several Machine Learning Methods -- 1 Introduction and Related Work -- 2 Proposed MRI-Based CAD System -- 2.1 Feature Extraction and Fusion -- 2.2 Feature Selection -- 2.3 Machine Learning Classifiers-Based Classification Model -- 3 Experimental Results and Evaluation -- 3.1 Materials -- 3.2 Experimental Setting and Evaluation Metrics -- 3.3 Experimental Results -- 4 Conclusion and Future Directions -- References -- An Adversarial Learning Mechanism for Dealing with the Class-Imbalance Problem in Land-Cover Classification -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Generation of Artificial Samples Using Adversarial Auto-Encoder -- 2.2 A Semi-supervised Algorithm for Choosing Synthetic Samples to Be Included in the Balanced Training Set -- 3 Experimental Results -- 3.1 Dataset Description. , 3.2 Experimental Details and Analysis of Results -- 4 Conclusion -- References -- An Integrated Fuzzy ANP-TOPSIS Approach to Rank and Assess E-Commerce Web Sites -- 1 Introduction -- 2 Related Works -- 3 The Proposed Approach -- 3.1 Criteria Identification -- 3.2 Criteria Weights Distribution Using Fuzzy ANP -- 3.3 Ranking and Assessment Using Fuzzy TOPSIS -- 4 Application of the Fuzzy Integrated ANP-TOPSIS Approach -- 5 Analysis and Discussion of Results -- 6 Conclusion -- Appendix -- References -- Implementation of Block Chain Technology in Public Distribution System -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Working of Block Chain -- 3.2 Existing System Working -- 3.3 Proposed System -- 4 Working -- 5 Conclusion -- References -- Chaotic Salp Swarm Optimization Using SVM for Class Imbalance Problems -- 1 Introduction -- 2 Salp Swarm Optimization (SSA) -- 3 Chaotic Map -- 4 Performance Metrics for Skewed Data Distribution -- 5 CSSA: The Working Model -- 5.1 Feature Selection Phase Using Chaotic Salp Swarm Algorithm (CSSA) -- 5.2 Classification Phase -- 6 Result and Analysis -- 6.1 Data Set -- 6.2 Results -- 7 Conclusion -- References -- Three-Layer Security for Password Protection Using RDH, AES and ECC -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 3.1 Encrypting Key of AES Using ECC -- 3.2 Hiding the Encrypted Data in a JPEG Image Using Reversible Data Hiding -- 4 Methodology -- 5 Results -- 5.1 Time Complexity of RDH -- 5.2 Time Complexity of AES -- 5.3 Time Complexity of ECC -- 5.4 Time Complexity of the Proposed Algorithm -- 6 Tabulation of Results -- 7 Conclusion -- References -- Clothing Classification Using Deep CNN Architecture Based on Transfer Learning -- 1 Introduction -- 2 Proposed Method -- 2.1 Inception-v3 Architecture -- 2.2 Transfer Learning -- 3 Experiments and Results -- 3.1 Dataset. , 3.2 Experimental Settings.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...