GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    San Diego :Elsevier,
    Keywords: Water-Pollution. ; Water-supply. ; Water-supply-Management. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (606 pages)
    Edition: 1st ed.
    ISBN: 9780323903219
    Series Statement: Issn Series
    DDC: 333.91
    Language: English
    Note: Intro -- Water Scarcity, Contamination and Management -- Copyright -- Contents -- Contributors -- About the editors -- Preface -- Section 1: Water resources scarcity -- Chapter 1: Climate change implications on groundwater resources in East Khasi Hills, with special reference to greater Sh ... -- 1. Introduction -- 2. Hydrogeology -- 3. Materials and methods -- 4. Pattern of annual rainfall at Umiam -- 5. Extreme climatic events -- 6. Predicted rainfall from climate model -- 7. Groundwater level -- 8. Groundwater recharge -- 9. Discussion -- 10. Conclusion -- References -- Further reading -- Chapter 2: Status of hydrogeochemistry of water quality in Mizoram: A review -- 1. Introduction -- 1.1. Location and extend of Mizoram -- 2. Discussion -- 3. Concluding remarks -- References -- Further reading -- Chapter 3: Surface and groundwater interactions: Methodology and changing chemical processes -- 1. Introduction -- 2. Methods/tools to identify SW-GW interactions -- 2.1. Radon -- 2.2. Stable isotopes -- 2.3. Chlorofluorocarbons (CFCs) and sulfur hexafluoride (SF6) -- 2.4. Noble gases -- 2.5. Environmental tritium and carbon dating -- 2.6. Ions -- 2.7. Temperature -- 3. Processes evolved by the interactions of surface and groundwater -- 3.1. Physiochemical characteristics of surface and groundwater -- 3.2. Influences of groundwater contribution on surface water bodies -- 3.2.1. Eutrophication -- 3.2.2. Habitat for fish -- 3.2.3. Movement of nutrients and metals -- 3.2.4. Changes in wetland chemistry -- 3.3. Influences of surface water contribution on groundwater -- 3.3.1. Salinization -- 3.3.2. Movement of pesticides and emerging contaminants -- 4. Conclusion -- 5. Recommendation for future work -- References -- Further reading -- Chapter 4: Impact of climate change on water resources -- 1. Introduction -- 2. Climate change. , 2.1. Emission of greenhouse gases -- 2.2. Excessive use of fossil fuels: For electricity, transportation and heat -- 2.3. Change in land use -- 2.4. Deforestation -- 2.4.1. Population growth -- 3. Impact of climate change -- 3.1. Global warming-rising temperatures -- 3.2. Melting of glaciers and ice sheets and rising sea levels -- 3.3. Ocean acidification -- 3.4. Frequent floods and droughts -- 4. Impact of climate change on water resources -- 4.1. Impact on ground water resources -- 4.2. Management options -- References -- Further reading -- Chapter 5: Cooperative management of Himalayan rivers among the riparian states -- 1. Introduction -- 2. The hydrogeology of the IGB system -- 3. Controlling factors of material fluxes -- 4. Distribution of erosion and sedimentation -- 5. Environmental constraints -- 6. Sharing of information to check flash flood and water availability -- 7. Water management strategies and ways forward -- 7.1. Water sharing treaties for mutual cooperation -- 8. Conclusion -- References -- Further reading -- Chapter 6: An assessment of the aquatic environment quality of the urban water bodies using system analysis methods based ... -- 1. Introduction -- 2. Materials -- 2.1. Study area -- 2.2. Satellite data -- 2.3. Sampling -- 3. Methods -- 3.1. Spectral indices -- 3.1.1. Normalized Difference Pond Index (NDPI) -- 3.1.2. Normalized Difference Turbidity Index (NDTI) -- 3.1.3. Normalized Difference Algae Index (NDAI) -- 3.1.4. Temperature maps of the reservoir's surfaces -- 3.2. Methods of measuring and calculating ground indicators -- 3.3. Methods of system analysis -- 3.3.1. Multi-criteria optimization method -- 3.3.2. Statistical criterion (SC) -- 4. Results and discussion -- 5. Conclusions -- Acknowledgments -- References -- Section 2: Contamination of water resources -- Chapter 7: Agricultural contamination -- References. , Chapter 8: Metal contamination in groundwater of Bangladesh -- 1. Introduction -- 1.1. What is groundwater? -- 1.1.1. How much do we depend on groundwater? -- 1.2. What is groundwater contamination? -- 1.2.1. Sources of heavy metal contamination in groundwater natural sources -- 1.2.2. Anthropogenic sources of contamination -- 2. Metal contamination scenarios in groundwater of Bangladesh -- 3. Major contaminants occurrence in groundwater -- 3.1. Arsenic -- 4. Other contaminants -- 4.1. Manganese -- 4.2. Chromium -- 4.3. Copper -- 4.4. Cadmium -- 4.5. Lead -- 4.6. Iron -- 4.7. Zinc -- 4.8. Nickel -- 5. Dangers of contaminated groundwater -- 6. Effects of ground water contamination -- 7. Potential health problems -- 8. Environmental legislation: Bangladesh perspective -- 9. Conclusion -- Declarations -- Author contribution statement -- References -- Chapter 9: A study on impact of progressive urban expansion on groundwater quality by using graphical, statistical and WQ ... -- 1. Introduction -- 1.1. Research motive -- 1.2. Context of research -- 2. Study area -- 3. Methodology -- 3.1. Sampling and analytical techniques -- 3.2. Graphical representation -- 3.3. Statistical analysis -- 3.4. Water quality index -- 4. Results and discussion -- 4.1. Population growth -- 4.2. Change in land use practice -- 4.3. Interaction between urbanization and groundwater quality -- 4.4. Comparative analysis of water quality within one decade -- 4.4.1. Major ion chemistry -- 4.4.2. Spatiotemporal distribution and suitability of groundwater for drinking purpose -- Total dissolved solids (TDS) -- Total hardness -- Nitrate (NO3-) -- Fluoride (F-) -- 4.4.3. Classification and genesis of groundwater -- Soltan classification -- Piper's classification -- 4.4.4. Statistical analysis -- Principal component analysis -- 4.4.5. Water quality index (WQI) -- 5. Conclusion. , Acknowledgment -- References -- Further reading -- Chapter 10: Contamination of water resources: With special reference to groundwater pollution -- 1. Introduction -- 2. Why is groundwater important? -- 3. How does groundwater become contaminated? -- 4. Types of groundwater contamination -- 4.1. Geogenic contamination -- 4.2. Anthropogenic contamination -- 5. Potential sources of groundwater contamination -- 5.1. Natural sources -- 5.2. Storage tanks -- 5.3. Septic systems -- 5.4. Improper disposal of hazardous waste -- 5.5. Landfills -- 5.6. Chemicals and road salts -- 5.7. Mining and quarrying -- 5.8. Saltwater contamination -- 5.9. Atmospheric contaminants -- 6. Pollution of groundwater -- 7. Types of groundwater pollution -- 7.1. Geogenic pollution of groundwater -- 7.2. Anthropogenic pollution of groundwater -- 7.2.1. Point-source pollution -- 7.2.2. Nonpoint-source pollution -- 8. Arsenic -- 9. Sources of arsenic in groundwater -- 10. Occurrences of arsenic in groundwater -- 11. Mobilization mechanisms of arsenic -- 12. Arsenic contamination in groundwater in India -- 13. Health effects -- 14. Remedial measures -- 14.1. Subsurface arsenic remedy -- 14.1.1. The SAR (subterranean arsenic removal) -- 14.2. Ex-situ arsenic remedy -- 14.3. Use of alternative water source -- 14.4. Tapping arsenic-free safe aquifers -- 14.4.1. Will the deep aquifers remain arsenic-free? -- 15. Conclusion -- 16. Recommendations -- References -- Chapter 11: Impact of mining on groundwater quality of India using indexing techniques and its assessment -- 1. Introduction -- 2. Overview of indexing techniques for assessing water quality -- 2.1. Water quality index (WQI) -- 2.1.1. Effective weight percentage (Efi) -- 2.2. Heavy metal indexing -- 2.2.1. Heavy metal pollution index (HPI) -- 2.2.2. Heavy metal evaluation index (HEI) -- 2.2.3. Contamination index (Cd). , 2.2.4. PCA-based metal index -- Non-standardized PCA metal index (NSPMI) -- Standardized PCA-based metal index (PMI) -- Water parameter index (WPI) -- 2.2.5. Modified heavy metal index -- Modified heavy metal pollution index (m-HPI) using fuzzy entropy weight method -- Heavy metal contamination index (HCI) for evaluating heavy metal contamination in groundwater -- 2.3. Calculation of risk assessment -- 2.3.1. Hazard quotient (HQ) -- 2.3.2. Hazard index (HI) -- 3. Impact assessment of mining on groundwater quality of India by indexing techniques -- 3.1. Coal mining -- 3.1.1. Brajrajnagar coal mining, Odisha -- 3.1.2. Jharia coalfields, Dhanbad, Jharkhand -- 3.1.3. Underground coal mines, Khliehriat, Jaintia hills district, Meghalaya -- 3.1.4. East Bokaro coalfield, Jharkhand -- 3.1.5. West Bokaro -- 3.1.6. North Karanpura -- 3.1.7. Coal mines in Sonebhadra and Singrauli districts, Uttar Pradesh, Madhya Pradesh -- 3.1.8. Korba coalfield, Korba district, Chhattisgarh -- 3.1.9. Singrauli coal mining, Odisha -- 3.2. Copper mining -- 3.3. Limestone mining belt in the Sirmour district of Himachal Pradesh -- 3.4. Iron mining -- 3.4.1. Iron, steel industries and coal mining, Angul district, Odisha -- 3.4.2. Mining region Goa -- 3.4.3. Iron-ore mining, Odisha -- 4. Risk assessment of mining in India by hazard index and hazard quotient -- 4.1. Uranium mining -- 4.2. Coal mining -- 4.3. Copper mining -- 5. Conclusion and recommendations -- References -- Chapter 12: Recent scenario of agricultural contaminants on water resources -- 1. Introduction -- 2. Nutrients -- 3. Pesticides -- 4. Heavy metals -- 5. Pathogens -- 6. Salts -- 7. Sediments -- 8. Organic matters -- 9. New generation pollutants -- 10. Conclusion -- 11. Recommendations -- References. , Chapter 13: Potential tools for identification of saltwater intrusion into the coastal aquifers: A case study from East C.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (706 pages)
    Edition: 1st ed.
    ISBN: 9789811923586
    Series Statement: Cognitive Science and Technology Series
    DDC: 006.3
    Language: English
    Note: Intro -- Contents -- Teaching English as a Second Language: Improving Digital Literacy Skills -- 1 Introduction -- 2 Literature Review -- 3 Findings -- 4 Methods -- 4.1 Contemporary Practices -- 5 Results -- 6 Conclusion -- References: -- ICT-Based Collaborative Learning Approach: Enhancing Students' Language Skills -- 1 Introduction -- 2 Literature Review -- 3 Need of ICT in the Teaching and Learning Process -- 4 Methodology -- 4.1 Warm-Up -- 4.2 Student Roles -- 4.3 Grouping Students -- 4.4 Language Focused Task -- 4.5 Monitoring Groups -- 4.6 Collecting Responses Checking for Accuracy -- 4.7 Changing Roles -- 4.8 Listening Activity Through Audio Aids -- 4.9 Collecting Responses and Checking for Comprehension -- 4.10 Changing Roles Again -- 4.11 Solving the Mystery -- 4.12 Collecting Answers -- 4.13 Final Comprehension Check -- 4.14 Wrap Up -- 5 Data Collection Procedures -- 6 Results -- 6.1 Results for the Effectiveness of CL on Students' Integrating Language Skills Through Questionnaire Are as Follows -- 7 Conclusion -- References -- Modified Sierpinski Carpet Fractal Antenna for the Wireless Applications -- 1 Overview -- 2 Design of Antenna -- 3 Results and Discussion -- 3.1 Simulated and Experimental Results -- 4 Conclusion -- References -- COVID-19 Recovery Prediction Using Regression-Based Machine Learning Approaches -- 1 Introduction -- 2 Methods Used -- 2.1 Linear Regression (LR) -- 2.2 Ridge Regression -- 2.3 Elastic Net -- 2.4 Support Vector Regression -- 2.5 Decision Trees -- 2.6 Random Forests -- 2.7 Extra Trees -- 2.8 Deep Learning Multilayer Perceptron -- 3 Data and Methodology -- 3.1 Data Description -- 3.2 Data Preprocessing and Visualization -- 4 Methodology Used -- 4.1 Performance Metrics -- 5 Predictions and Results -- 6 Conclusion -- References. , Regression to Forecast: An In-Play Outcome Prediction for One-Day Cricket Matches -- 1 Introduction -- 2 Background and Related Works -- 3 Proposed Metric to Quantify Player Quality -- 4 Form and Batting Resource of the Team -- 5 Model to Forecast Win Probability -- 6 Model Predictions and Results -- 7 Conclusion -- References -- Analysis of OFDMA Over AWGN and Rician Channels -- 1 Introduction -- 2 Proposed Technique -- 2.1 OFDM with AWGN Channel -- 2.2 OFDMA with Rician Channel -- 3 System Development -- 3.1 Result Analysis -- 4 Conclusion -- References -- A Review on Internet of Wearable Things for Pervasive E-Health Care: Energy Efficiency and Prospects -- 1 Introduction -- 2 Related Works -- 3 Background of IoWT -- 3.1 Requirements -- 3.2 Application Scenarios -- 4 Energy Efficiency Improving Schemes -- 4.1 Task-Offloading -- 4.2 Duty Cycling -- 4.3 Energy-Aware Routing -- 4.4 Low-Power Embedded Design -- 4.5 Low-Power Communications -- 4.6 Adaptive Transmission Power Control -- 4.7 Compressive Sensing -- 4.8 IoWT Data Compression -- 4.9 Approximate Computing -- 4.10 Lightweight Security -- 5 Key Challenges and Future Directions -- 5.1 Challenges -- 5.2 Future Directions -- 6 Conclusion -- References -- An Analysis on Tesla's Stock Price Forecasting Using ARIMA Model -- 1 Introduction -- 2 Related Work -- 2.1 ARIMA Model -- 2.2 Performance Metrics -- 3 Experimental Results and Discussion -- 3.1 ARIMA Model for Tesla Stock Price -- 4 Conclusion -- References -- Multi-regressions Based-Traditional Machine Learning Approach for Energy Forecasting System -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Result -- 5 Conclusion -- References -- Comparative Study of Various Machine Learning and Deep Learning Techniques for Energy Prediction and Consumption Using IoT Modules -- 1 Introduction -- 2 Related Works -- 3 Conclusion. , References -- Emulating SoCs for Accelerating Pre-Si Validation -- 1 Introduction -- 2 HW/SW Co-Design -- 3 Experimental Platform -- 4 Profiling -- 5 Implementation Flow -- 6 Simulation Time/Speed up for Benchmark Design -- 7 Results and Discussions -- References -- Optimization of Power Flow in DC Microgrid Connected to Electric Vehicle Charging Station -- 1 Introduction -- 2 Energy Management for EV Charging -- 3 System Description -- 4 Result and Discussion -- 5 Conclusion -- References -- Static Hand Gesture Prediction Using Inception V3 -- 1 Introduction -- 2 Literature Review -- 3 Static Hand Gesture Recognition System -- 3.1 ASL Data -- 3.2 Implementation -- 4 Result -- 5 Conclusion -- References -- Evaluation on Radiation Exposure in Human Eye Tissue Model with IFA -- 1 Introduction -- 1.1 Specific Absorption Rate -- 1.2 Inverted F Antenna -- 2 Tissue Modeling and Experimental Setup -- 2.1 Modeling Background -- 2.2 Geometry and Dimensions of IFA -- 2.3 Dielectric Properties of Eye Tissues -- 3 Results and Validation -- 3.1 Operation Characteristics -- 3.2 Far field in 3D -- 3.3 Gain and Near Field -- 3.4 SAR Comparison -- 4 Conclusion -- References -- A Novel Approach for Sentiment Analysis and Opinion Mining on Social Media Tweets -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussions -- 4.1 Word-Level Sentiment Analysis -- 4.2 Querying Sentiment Words -- 4.3 Sentence-Level Sentiment Classification -- 5 Conclusion -- References -- Cloud Control Cold Storage System -- 1 Introduction -- 2 Implementation of Cloud Control Cold Storage System -- 3 Simulation -- 4 Hardware Implementation -- 5 Conclusion -- References -- Comparative Study of Neural Networks (G/C/RNN) and Traditional Machine Learning Models on EEG Datasets -- 1 Introduction -- 1.1 Literature Survey -- 2 Materials and Methods -- 2.1 EEG Datasets. , 2.2 Machine Learning Models -- 3 Result -- 4 Discussion -- 5 Conclusion -- References -- Artificial Intelligent Models for Automatic Diagnosis of Foetal Cardiac Anomalies: A Meta-Analysis -- 1 Introduction -- 2 Background Study -- 3 Literature Review -- 3.1 Medical Literatures Suggesting Technological Interventions -- 3.2 Review of Articles Related to Diagnosing Diseases Using Machine Learning/Deep Learning and Ultrasound Scan Images -- 4 Methodology -- 4.1 Phase 1: Model for Preliminary Classification and Screening -- 4.2 Phase 2: Diagnostic Model -- 5 Results and Discussions -- 6 Conclusion -- References -- DLoader: Migration of Data from SQL to NoSQL Databases -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Relational Databases -- 3.2 NoSQL Databases -- 3.3 SQL to NoSQL Transformation -- 4 Experimentation -- 5 Conclusion -- References -- Maximum Boost Control of Quasi-Z-Source Inverter with DSTATCOM for a Wind Energy System -- 1 Introduction -- 2 Operation of Maximum Boost Control of Single-Phase Enhanced Quasi-Z-Source -- 2.1 Wind Energy System -- 2.2 Enhanced Boost Quasi-Z-Source Inverter -- 2.3 DSTATCOM -- 3 Simulation Results -- 4 Conclusion -- References -- Design and Development of Multi-copter Drone Incorporating with Multispectral Sensor for Agricultural Application -- 1 Introduction -- 2 AIMS and Objectives -- 3 UAV System and Payload Description -- 3.1 UAV Platform -- 3.2 Sensor Platform -- 4 Proposed Methodology -- 4.1 Study Area -- 5 Process of UAV Data Collection -- 6 UAV Data Processing -- 6.1 Multispectral Calibration Reflectance Panel for Radiometric Calibration -- 6.2 Creating Toolbox for Calculating Vegetation Indices -- 6.3 Data Processing -- 7 Results and Discussions -- 7.1 Vegetation Analysis for Different Vegetation Indices -- 8 Conclusion -- References. , Mitigation of RSSI Variations Using Frequency Analysis and Kalman Filtering -- 1 Introduction -- 2 Related Work -- 3 Preliminary Study -- 3.1 RSSI -- 3.2 RSSI Filtering -- 4 System Design -- 5 Experiment and Analysis -- 5.1 Setup for Experiments -- 5.2 RSSI Fluctuation -- 5.3 Analysis of Various Filters -- 6 Conclusion -- References -- A Novel Approach for High Authentication in Digital Watermarking Technique -- 1 Introduction -- 2 Related Survey -- 3 Proposed System -- 4 Conclusion and Future Work -- References -- Exploring the Impact of Indian Revenues During COVID-19 Using Social Network Analysis -- 1 Introduction -- 2 Data and Methods -- 3 Related Work -- 4 Proposed Work -- 5 Observation and Discussion -- 6 Conclusion -- References -- Fingerprint Image Enhancement for Crime Detection Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Image Pre-processing -- 3.2 Image Classification -- 4 Results and Discussion -- 5 Conclusion -- References -- Semantic Segmentation of Retinal Vasculature Using Light Patch-Based Dilated CNN -- 1 Introduction -- 2 Dataset -- 3 Methodology -- 3.1 Patched Input -- 3.2 Dilated Convolution -- 3.3 Light Patch-Based Network -- 4 Result and Discussion -- 5 Conclusion -- References -- A Novel Study on Tools and Frameworks for Mitigating Bias in Multimodal Datasets -- 1 Introduction -- 2 Need of Identifying Bias in Datasets -- 3 Tools and Frameworks for Mitigating Bias in Datasets -- 3.1 REVISE (REvealing VIsual BiaSEs) -- 3.2 FairML -- 3.3 IBM AI Fairness 360 -- 3.4 Accenture's "Teach and Test" Methodology -- 3.5 Google's What-If Tool -- 3.6 Microsoft's Fairlearn -- 4 Conclusion -- References -- Machine Learning Framework for Stagewise Classification of Alzheimer's Disease -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Dataset. , 3.2 EDA (Univariate, Bivariate, Multivariate Analysis).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (875 pages)
    Edition: 1st ed.
    ISBN: 9789811959363
    Series Statement: Lecture Notes in Electrical Engineering Series ; v.947
    DDC: 006.31
    Language: English
    Note: Intro -- Preface -- Contents -- Road Accident Detection and Indication System -- 1 Introduction -- 2 Existing Models -- 3 Proposed Model -- 4 The Design of Vehicle Crash Alert System -- 5 Conclusion -- References -- Attendance System Based on Face Recognition Using Haar Cascade and LBPH Algorithm -- 1 Introduction -- 2 Problem Definition -- 3 Proposed System -- 4 Dataset and Methodology -- 5 Results and Outcome -- 6 Conclusion -- References -- Different Thresholding Techniques in Image Processing : A Review -- 1 Introduction -- 2 Thresholding -- 2.1 Global Thresholding -- 2.2 Multi-thresholding -- 2.3 Adaptive Thresholding -- 3 Choosing a Thresholding Method -- 4 Conclusion -- References -- Dynamic Weighting Selection for Predictive Torque and Flux Control of Industrial Drives -- 1 Introduction -- 2 Predictive Torque and Flux Control -- 3 Proposed Dynamic Weighting Factor Selection -- 4 Simulation Results -- 5 Conclusion -- References -- Population Index and Analysis Based on Different Geographies -- Using Distance Measurement, Social Distancing, and Deep Learning -- 1 Introduction -- 1.1 How is Social Distancing Efficient? -- 1.2 Social Distancing -- 2 Research Background and Relevant Work -- 2.1 Pedestrian Detection and Distance Measurement -- 2.2 Object Detection -- 2.3 Social Distancing for COVID-19 -- 3 Object Detection and Distance Measurement -- 3.1 Object Detection -- 3.2 Distance Measurement Between Detected Objects -- 4 Proposed Methodology -- 4.1 Stage I: Detecting Violators -- 4.2 Stage II: Finding Busy Hours -- 5 Experiment and Result Analysis -- 5.1 YOLO Outputs -- 5.2 Database of Violations -- 5.3 Busy Hours -- 5.4 Discussion -- 6 Conclusion -- 7 Future Scope -- References -- On the Discriminability of Samples Using Binarized ReLU Activations -- 1 Introduction -- 1.1 Contributions -- 2 Metrics Used in the Experimental Setup. , 3 Experiments -- 3.1 Influence of Number of Layers -- 3.2 Influence of Sample Size and Number of Training Labels -- 4 Conclusion and Future Work -- References -- Supervised and Unsupervised Machine Learning Approaches-A Survey -- 1 Introduction -- 2 Different Kinds of Learning -- 2.1 Supervised Machine Learning -- 2.2 Unsupervised Machine Learning Algorithm -- 3 Conclusion -- References -- Skin Cancer Classification Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 3 Objectives -- 4 Existing System -- 5 Proposed Approach -- 6 Conclusion -- References -- Crop Yield Prediction Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Idea -- 4 Data Flow Diagram -- 5 Training Specifications -- 6 Performance Evaluation -- 7 Experimental Results -- 8 Discussion and Conclusions -- References -- Real-Time Tweets Streaming and Comparison Using Naïve Bayes Classifier -- 1 Introduction -- 2 Problem Definition -- 3 Literature Survey -- 4 Proposed Work -- 5 Conclusion and Future Enhancement -- References -- Smart Shopping Trolley for Billing System -- 1 Introduction -- 2 Related Work -- 3 Objective -- 4 Problem Statement -- 5 Proposed Architecture Design -- 6 Implementation and Results -- 7 Conclusion and Future Work -- References -- A Survey on IoT Protocol in Real-Time Applications and Its Architectures -- 1 Introduction -- 2 Functional Overview of IOT -- 2.1 Sensing -- 2.2 Communication -- 2.3 Computation -- 2.4 Analysis -- 3 Standards -- 3.1 Application Protocols -- 3.2 Constrained Application Protocol (CoAP) -- 3.3 Message Queuing Telemetry Transport (MQTT) -- 3.4 Advanced Message Queuing Protocol (AMQP) -- 4 AMQP and MQTT Comparative Analysis -- 5 Conclusion -- References -- Safe Characteristic Signature Systems with Different Jurisdiction Using Blockchain in E-Health Records -- 1 Introduction -- 2 Existing System. , 3 Proposed System -- 4 System Design -- 5 Flow Chart Diagram -- 6 Class Diagram -- 7 Modules Description -- 7.1 Admin -- 7.2 Admin Module -- 7.3 User Module -- 7.4 Auditor -- 8 Conclusion -- References -- Web-Based Trash Segregation Using Deep Learning Algorithm -- 1 Introduction -- 2 Proposed System -- 3 Implementation -- 4 Analysis and Benefits of Proposed System -- 5 System Design and Flowcharts -- 6 Conclusion -- 7 Future Enhancement -- References -- Home Automation Using Face Recognition for Wireless Security -- 1 Introduction -- 2 Related Work -- 2.1 Bluetooth-Based IoT Home Automation System -- 2.2 Voice Recognition-Based IoT Home Automation -- 2.3 GSM-Based Home Automation System -- 3 Proposed Work -- 3.1 Hardware Components -- 3.2 Software Requirements -- 4 Implementation Details -- 5 Result -- 6 Conclusion -- Bibliography -- Hybrid-Network Intrusion Detection (H-NID) Model Using Machine Learning Techniques (MLTs) -- 1 Introduction -- 2 Related Work -- 3 Methodology and Proposed Framework -- 3.1 Classification Algorithms Used -- 4 Experiments and Results -- 5 Conclusions -- References -- Impact of Using Partial Gait Energy Images for Human Recognition by Gait Analysis -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Gait Energy Image (GEI) -- 3.3 Principal Component Analysis -- 3.4 Experimental Setup -- 4 Results -- 5 Conclusion -- References -- Several Routing Protocols, Features and Limitations for Wireless Mesh Network (WMN): A Review -- 1 Introduction -- 2 Literature Review -- 3 Limitations and Features of WMNs -- 3.1 Limitations of WMNs -- 3.2 Features of WMNs -- 4 Preliminaries on Routing Protocols for WMNs -- 4.1 Hop Counting Routing Protocols -- 4.2 Link Level Routing Protocols -- 4.3 End-to-End QoS Routing Protocols -- 5 Conclusion and Future Scope -- References. , A Deep Meta-model for Environmental Sound Recognition -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Base Models -- 3.2 The Proposed Deep Meta-model -- 4 Experimental Evaluation -- 4.1 Dataset Used -- 4.2 Performance Measures Used for Evaluation -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Spatial Computing: Next Big Thing of Physical and Digital World -- 1 Introduction -- 2 Role of Spatial Computing in Various Fields -- 2.1 Industry -- 2.2 Manufacturing -- 2.3 Automotive Industry -- 3 Benefits of Spatial Computing -- 4 Difference Between Spatial Computing, Augmented Reality (AR) and Mixed Reality (MR) -- 5 Spatial Computing as a Digital Era -- 6 SAR Technology -- 7 Spatial Computing With IoT -- 8 Spatial Web Technology -- 9 Conclusion -- References -- Cloud Accessing Based on IOT Oriented WSNs for Optimal Water Conservation in Farming -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System for Irrigation with IoT -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- S-Extension Patch: A Simple and Efficient Way to Extend an Object Detection Model -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Similarity Threshold Check (Compatibility Check) -- 3.2 Compatible Classes Selection -- 3.3 Dual-Parallel Inference Technique -- 3.4 Technique with Trackers -- 3.5 Model Architectures -- 3.6 Training Environment -- 4 Experiments and Discussions -- 4.1 Dual-Parallel Inference Technique -- 4.2 Technique with Trackers -- 5 Future Works and Llimitations -- 6 Conclusion -- References -- Roles and Impact of ASHA Workers in Combating COVID-19: Case Study Bhubaneswar -- 1 Introduction -- 1.1 Fund Allocation to Public Healthcare and Human Development Index -- 1.2 Health Status and Global Hunger Index of India -- 1.3 Role of Anganwadis and ASHA Workers -- 2 Literature Review -- 3 Research Gap. , 4 Methodology -- 5 Conclusion -- References -- Challenges and Requirements for Integrating Renewable Energy Systems with the Grid -- 1 Introduction -- 2 Grid Interconnection Stages -- 3 Requirements for Compliance with Grid Code -- 4 Analysis for Integration Challenges -- 5 Conclusion -- References -- Design of Progressive Monitoring Overhead Water Tank -- 1 Introduction -- 2 Architectural Details of Proposed System -- 3 Proposed System -- 3.1 Raspberry Pi Zero W -- 3.2 Arduino Uno -- 3.3 Ultrasonic Sensor -- 3.4 Flow Sensor -- 3.5 Turbidity Sensor -- 3.6 TDS Sensor -- 3.7 PH Sensor -- 3.8 Motor and Motor Driver -- 3.9 Setup -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- An Anchor-Based Fuzzy Rough Feature Selection for Text Categorization -- 1 Introduction -- 2 Brief Review of Concepts -- 2.1 Anchor Graph -- 3 Fuzzy Rough Feature Selection -- 4 Proposed Hybrid Anchor-Based Fuzzy Rough Feature Selection (ABFRFS) -- 5 Experimental Results -- 5.1 Dataset -- 6 Evaluation Metrics -- 7 Experiments and Analysis -- 8 Conclusions -- References -- Fabric Variation and Visualization Using Light Dependent Factor -- 1 Introduction -- 2 Literature Survey -- 3 Documentation of LDR Sensor After Analysis -- 4 Procedure -- 5 Experimental Section -- 6 Block Diagram -- 7 Algorithm -- 8 Results -- 9 Conclusion -- 10 Future Scope -- References -- Pulse Rate Estimation with a Smartphone Camera Using Image Processing Algorithm -- 1 Introduction -- 2 Methodology -- 2.1 Threshold Calculation -- 2.2 Centroid Point Computation -- 2.3 Computation and Estimation of Pulse Rate -- 3 Simulated Results -- 4 Conclusion -- References -- Multilayer Perceptron Based Early On-Site Estimation of PGA During an Earthquake -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 3 Data Munging -- 3.1 Feature Window Population. , 3.2 MLP-Based Back Propagation Neural Network (MLP-BPNN).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Newark :John Wiley & Sons, Incorporated,
    Keywords: Recycling (Waste, etc.)-Technological innovations. ; Sustainable development. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (339 pages)
    Edition: 1st ed.
    ISBN: 9783527816422
    DDC: 363.7288
    Language: English
    Note: Cover -- Title Page -- Copyright -- Contents -- Preface -- Chapter 1 Introduction, Vision, and Opportunities -- 1.1 Background -- 1.2 E‐Waste -- 1.3 Outline -- References -- Chapter 2 e‐Waste Management and Practices in Developed and Developing Countries* -- 2.1 Introduction -- 2.2 Overview on WEEE Management and Practices -- 2.3 International WEEE Management and Transboundary Movement -- 2.4 WEEE Management and Practices - Developed and Developing Countries -- 2.5 Developed Countries -- 2.5.1 Switzerland -- 2.5.2 Japan -- 2.5.3 Australia -- 2.6 Developing Countries -- 2.6.1 Brazil -- 2.6.2 India -- 2.6.3 South Africa -- 2.6.4 Nigeria -- 2.6.5 Taiwan -- 2.7 Conclusions -- References -- Chapter 3 e‐Waste Transboundary Movement Regulations in Various Jurisdictions* -- 3.1 Background -- 3.2 International Legislation and Transboundary Movement -- 3.3 Extended Producer Responsibility (EPR) -- 3.4 Regulations in Various Jurisdictions -- 3.4.1 Europe -- 3.4.1.1 France -- 3.4.1.2 Germany -- 3.4.1.3 Switzerland -- 3.4.1.4 Norway -- 3.4.2 Americas -- 3.4.2.1 United States of America -- 3.4.2.2 Canada -- 3.4.2.3 Brazil -- 3.4.3 Asia -- 3.4.3.1 Japan -- 3.4.3.2 China -- 3.4.3.3 Taiwan -- 3.4.3.4 India -- 3.4.4 Africa -- 3.4.4.1 South Africa -- 3.4.4.2 Nigeria -- 3.4.5 Australia -- 3.5 Conclusions -- References -- Chapter 4 Approach for Estimating e‐Waste Generation -- 4.1 Background -- 4.2 Econometric Analysis -- 4.3 Consumption and Use/Leaching/Approximation 1 Method -- 4.4 The Sales/Approximation 2 Method -- 4.5 Market Supply Method -- 4.5.1 Simple Delay -- 4.5.2 Distribution Delay Method -- 4.5.3 Carnegie Mellon Method/Mass Balance Method -- 4.6 Time‐Step Method -- 4.7 Summary of Estimation Methods -- 4.8 Lifespan of Electronic Products -- 4.9 Global e‐Waste Estimation -- References. , Chapter 5 Materials Used in Electronic Equipment and Manufacturing Perspectives* -- 5.1 Introduction -- 5.2 Large Household Appliances (LHA) -- 5.3 Small Household Appliance (SHA) -- 5.4 IT and Telecommunications Equipment -- 5.4.1 Computers and Notebooks -- 5.4.2 Monitors and Screens -- 5.4.3 Mobile Phones (MP) -- 5.4.4 Printed Circuit Boards (PCB) -- 5.5 Photovoltaic (PV) Panels -- 5.6 Lighting Equipment -- 5.7 Toys, Leisure, and Sport -- 5.8 Future Trends in WEEE - Manufacturing, Design, and Demand -- References -- Chapter 6 Recycling Technologies - Physical Separation -- 6.1 Introduction -- 6.2 Dismantling -- 6.3 Comminution/Size Reduction -- 6.3.1 Shredders -- 6.3.2 Hammer Mills -- 6.3.3 High‐Voltage Fragmentation -- 6.3.4 Knife Mills -- 6.3.5 Cryogrinding -- 6.4 Particle Size Analysis -- 6.5 Size Separation/Classification -- 6.5.1 Screening -- 6.5.2 Classification -- 6.5.2.1 Centrifugal Classifier -- 6.5.2.2 Gravitational Classifiers -- 6.6 Magnetic Separation -- 6.6.1 Low‐Intensity Magnetic Separators -- 6.6.2 High‐Intensity Magnetic Separators -- 6.7 Electrical Separation -- 6.7.1 Corona Electrostatic Separation -- 6.7.2 Triboelectric Separation -- 6.7.3 Eddy Current Separation -- 6.8 Gravity Separation -- 6.8.1 Jigs -- 6.8.2 Spirals -- 6.8.3 Shaking Tables -- 6.8.4 Zig‐Zag Classifiers -- 6.8.5 Centrifugal Concentrators -- 6.8.6 Dense Medium Separation (DM Bath/Cyclone) -- 6.9 Froth Flotation -- 6.10 Sensor‐Based Sorting -- 6.11 Example Flowsheets -- References -- Chapter 7 Pyrometallurgical Processes for Recycling Waste Electrical and Electronic Equipment -- 7.1 Introduction -- 7.2 Printed Circuit Boards -- 7.3 Pyrometallurgical Processes -- 7.3.1 Smelting -- 7.3.1.1 Copper‐Smelting Processes - Sulfide Route -- 7.3.1.2 Copper‐Smelting Processes - Secondary Smelters -- 7.3.1.3 Lead‐Smelting Processes. , 7.3.1.4 Advantages and Limitations of Smelting Processes -- 7.3.2 Electrochemical Processes -- 7.3.2.1 High‐Temperature Electrolysis -- 7.3.2.2 Low‐Temperature Electrolysis -- 7.3.3 Other Pyrometallurgical Operations Used in Electronic Waste Recycling -- 7.3.3.1 Roasting -- 7.3.3.2 Molten Salt Oxidation Treatment -- 7.3.3.3 Distillation -- 7.3.3.4 Pyrolysis -- References -- Chapter 8 Recycling Technologies - Hydrometallurgy -- 8.1 Background -- 8.2 Waste Printed Circuit Boards (WPCBs) -- 8.3 Photovoltaic Modules (PV) -- 8.4 Batteries -- 8.5 Light‐Emitting Diodes (LEDs) -- 8.6 Trends -- References -- Chapter 9 Recycling Technologies - Biohydrometallurgy -- 9.1 Introduction -- 9.2 Bioleaching: Metal Winning with Microbes -- 9.3 Biosorption: Selective Metal Recovery from Waste Waters -- 9.3.1 Biosorption Via Metal Selective Peptides -- 9.3.2 Chelators Derived from Nature -- 9.4 Bioflotation: Separation of Particles with Biological Means -- 9.5 Bioreduction and Bioaccumulation: Nanomaterials from Waste -- 9.6 Conclusion -- References -- Chapter 10 Processing of Nonmetal Fraction from Printed Circuit Boards and Reutilization -- 10.1 Background -- 10.2 Nonmetal Fraction Composition -- 10.3 Benefits of NMF Recycling -- 10.3.1 Economic Benefits -- 10.3.2 Environmental Protection and Public Health -- 10.4 Recycling of NMF -- 10.4.1 Physical Recycling -- 10.4.1.1 Size Classification -- 10.4.1.2 Gravity Separation -- 10.4.1.3 Magnetic Separation -- 10.4.1.4 Electrical Separation -- 10.4.1.5 Froth Flotation -- 10.4.2 Chemical Recycling -- 10.5 Potential Usage -- References -- Chapter 11 Life Cycle Assessment of e‐Waste - Waste Cellphone Recycling -- 11.1 Introduction -- 11.2 Background -- 11.2.1 Theory of Life Cycle Assessment -- 11.3 LCA Studies on WEEE -- 11.3.1 Applications on WEEE Management Strategy -- 11.3.2 Applications on WEEE Management System. , 11.3.3 Applications on Hazardous Potential of WEEE Management and Recycling -- 11.4 Case Study -- 11.4.1 Goal and Scope Definition -- 11.4.1.1 Functional Unit -- 11.4.1.2 System Boundary -- 11.4.2 Life Cycle Inventory -- 11.4.2.1 Formal Collection -- 11.4.2.2 Informal Collection -- 11.4.2.3 Mechanical Dismantling -- 11.4.2.4 Plastic Recycling -- 11.4.2.5 Screen Glass Recycling -- 11.4.2.6 Battery Disposal -- 11.4.2.7 Electronic Refining for Materials -- 11.4.3 Life Cycle Impact Assessment -- 11.4.4 Results -- 11.4.4.1 Feature Phone Formal Collection Scenario -- 11.4.4.2 Feature Phone Informal Collection Scenario -- 11.4.4.3 Smartphone Formal Collection Scenario -- 11.4.4.4 Smartphone Informal Collection Scenario -- 11.4.5 Discussion -- 11.5 Conclusion -- References -- Chapter 12 Biodegradability and Compostability Aspects of Organic Electronic Materials and Devices -- 12.1 Introduction -- 12.1.1 Technological Innovation and Waste -- 12.1.2 Eco‐friendliness -- 12.1.3 Organic Electronics -- 12.1.4 Opportunities for Green Organic Electronics -- 12.2 State of the Art in Biodegradable Electronics -- 12.3 Organic Field‐Effect Transistors (OFETs) -- 12.3.1 Fundamentals -- 12.3.2 Anthraquinone, Benzoquinone, and Acenequinone -- 12.3.3 Quinacridones -- 12.4 Electrochemical Energy Storage -- 12.4.1 Quinones -- 12.4.2 Dopamine -- 12.4.3 Melanins -- 12.4.4 Tannins -- 12.4.5 Lignin -- 12.5 Biodegradation in Natural and Industrial Ecosystems -- 12.5.1 Degradation and Biodegradation -- 12.5.2 Composting Process -- 12.5.3 Materials Half‐Life Under Composting Conditions -- 12.5.4 Biodegradation in the Environment -- 12.6 Microbiome in Natural and Industrial Ecosystems -- 12.6.1 The Ruminant-Hay Natural Ecosystem -- 12.6.2 The Termite-Wood Natural Ecosystem -- 12.6.3 The Industrial Composter-Biowaste Ecosystem -- 12.6.3.1 Municipal Composting Facility. , 12.6.3.2 Engineered Composting Facility -- 12.6.4 Specialized Inoculant Adapted to Organic Matter -- 12.6.5 Specialized Inoculant Adapted to Heavy Metals -- 12.7 Concluding Remarks and Perspectives -- Acknowledgment -- References -- Chapter 13 Circular Economy in Electronics and the Future of e‐Waste -- 13.1 Introduction -- 13.2 Digitalization and the Need for Electronic Devices -- 13.3 Recycling and Circular Economy -- 13.4 Challenges for e‐Waste Recycling and Circular Economy -- 13.5 Drivers for Change - Circular Economy -- 13.6 Demand for Recyclable Products -- 13.7 Summary -- References -- Index -- EULA.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (512 pages)
    Edition: 1st ed.
    ISBN: 9789811684845
    Series Statement: Lecture Notes in Electrical Engineering Series ; v.834
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Machine Learning-Based Project Resource Allocation Fitment Analysis System (ML-PRAFS) -- 1 Introduction -- 1.1 Outlook -- 1.2 Purpose of the Research -- 1.3 Outline of the Proposed Model -- 1.4 Organizing of the Paper -- 2 AI-Based PMP -- 2.1 Effective Utilization of Resources -- 2.2 More Effective Planning -- 2.3 Effective Cost Management -- 2.4 Project Dynamics -- 3 Framework for the Proposed Model -- 3.1 Fundamental Elements of the Model -- 3.2 Metrics for the Models -- 3.3 Data Classifiers and Training Model -- 3.4 Algorithm for the Proposed Model -- 3.5 Datasets -- 4 Test Result Analysis -- 5 Conclusion -- References -- Electric Theft Detection Using Unsupervised Machine Learning-Based Matrix Profile and K-Means Clustering Technique -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Matrix Profile -- 2.2 K-Means Clustering Algorithm -- 2.3 Results and Discussion -- 3 Conclusion -- References -- Placement Analysis-A New Approach to Ease the Recruitment Process -- 1 Introduction -- 2 Literature Survey -- 2.1 PAT -- 2.2 Workable -- 3 Proposed Methodology -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- Continuous Assessment Analyzer Using Django -- 1 Introduction -- 2 Existing System -- 3 Proposed Methodology -- 4 Result of the Interface and Functionality -- 5 Conclusion -- 6 Future Scope -- References -- Fuzzy Logic in Battery Energy Storage System (BESS) -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Research Goal -- 1.3 Objective -- 1.4 Scope of the Project -- 2 Literature Review -- 2.1 Introduction -- 2.2 Battery -- 2.3 Fuzzy Logic Controller -- 3 Methodology -- 3.1 Battery -- 3.2 Proteus Simulation -- 3.3 MATLAB/Simulink Simulation -- 3.4 Fuzzy Logic Designer -- 3.5 Hardware Development -- 3.6 Box Storage for the Battery Energy Storage System. , 3.7 Battery Energy Storage System Flowchart -- 4 Results and Discussion -- 4.1 Battery Energy Storage System (BESS) with Conventional Sequential Algorithm -- 4.2 Results Using Conventional Sequential Algorithm -- 4.3 Fuzzy Logic in Battery Energy Storage System (BESS) -- 5 Conclusion -- References -- Fault Classification of Cooling Fans Using a CNN-Based Approach -- 1 Introduction -- 2 Research Background -- 3 Methodology -- 3.1 System Overview -- 3.2 Experimental Setup -- 3.3 Fault Classification Using Image Encoding and CNN -- 4 Results and Analysis -- 4.1 Application of Convolutional Neural Network -- 5 Conclusion -- References -- Violence Recognition Using Convolutional Neural Networks -- 1 Introduction -- 2 Related Works -- 2.1 Deep Learning -- 2.2 Convolutional Neural Networks (CNNs) -- 2.3 The Previous Studies on Action Classification Frameworks -- 3 Research Methodology -- 4 Model Design and Development -- 5 Discussions and Result -- 5.1 Analysis on VGG19 Model -- 5.2 Analysis on MobileNetV2 Model -- 5.3 Analysis on InceptionResNetV2 Model -- 5.4 Comparison of Analysis Between VGG19, MobileNetV2, and InceptionResNetV2 -- 6 Conclusion -- References -- Automated Grading of Citrus suhuiensis Fruit Using Deep Learning Method -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Acquisition -- 3 Classification Using Convolutional Neural Network -- 4 Results and Discussion -- 5 Conclusion -- References -- The Future of Car Automation Field with Smart Driverless Technologies -- 1 Introduction -- 1.1 Need -- 1.2 What Would Happen When the Whole City's Car and Transportation Become Driverless? -- 2 The Five Principles of Swarm Intelligence -- 3 Major Advance Work in Real-Time Top Autonomous Car's and Its Advance Features Areas -- 3.1 Mercedes-Benz F015 Luxury in Motion -- 3.2 Volvo Cars Unified Interface for Self-driving Cars -- 3.3 Tesla Autopilot. , 3.4 Google Self-driving Car -- 4 Artificial Intelligence System in Car Automation Field -- 5 IOI-Based Car Automation System -- 6 Limitation's with Self-driving Cars and Real Practical Actual Accidents till Now -- 7 Conclusion -- References -- Diagnosis and Medicine Prediction for COVID-19 Using Machine Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Materials and Methodology -- 3.1 Dataset Used -- 3.2 Methodology -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Automated Guided Vehicle Robot Localization with Sensor Fusion -- 1 Introduction -- 2 Methodology -- 3 Experiments and Result -- 4 Conclusion -- References -- Implementation of Industrial Automation Water Distribution System Utilizing PLC: A Laboratory Setup -- 1 Introduction -- 2 Automation by Programmable Logic Controller -- 3 Hardware Development -- 4 Supervisory Control and Data Acquisition System (SCADA) -- 5 Conclusion -- References -- Control of Thin McKibben Muscles in an Antagonistic Pair Configuration -- 1 Introduction -- 2 Thin McKibben Muscle Platform -- 3 Control Strategy of Thin McKibben Muscle Platform -- 4 Experimental Results -- 5 Conclusion -- References -- Defect Severity Classification of Complex Composites Using CWT and CNN -- 1 Introduction -- 2 Signal Preprocessing Using Continuous Wavelet Transform -- 3 Classification Using Convolutional Neural Network -- 4 Results and Discussion -- 5 Conclusion -- References -- Detection of Mobile Phone Usage While Driving Using Computer Vision and Deep Learning -- 1 Introduction -- 2 Research Methodology -- 2.1 Image Acquisition -- 2.2 Data Preprocessing -- 2.3 Proposed Methodology -- 3 Experimental Results -- 3.1 Faster R-CNN Model Results -- 3.2 Performance Evaluation Between Existing Works and Proposed Work -- 4 Conclusion -- References. , Industry Revolution 4.0 Knowledge Assessment in Malaysia -- 1 Introduction -- 2 Building Skills 4.0 Through University and Enterprise Collaboration (SHYFTE) -- 3 Industry Revolution 4.0 Knowledge Assessment Methodology -- 4 Results and Discussions -- 4.1 Vision of Digital Transformation and IR4.0 Technology Importance Assessment -- 4.2 IR4.0 Skills Assessment -- 4.3 IR4 Establishment and Willingness to Adopt -- 4.4 Technology Adoption -- 5 Conclusions -- References -- Practical Approaches: User Stories Domain Prediction and Keyword Extraction for Insights -- 1 Introduction -- 1.1 Natural Language Processing -- 1.2 Natural Language Generation -- 1.3 Named Entity Recognition -- 2 Related Work -- 3 Practical Implementation on Domain Classification and Keyword Extraction -- 3.1 Data Collection -- 3.2 Algorithm Implementation -- 3.3 Keyword Extraction -- 3.4 API Building -- 4 Conclusion -- References -- An Improved Content-Based Image Retrieval System for Tomato Leaf Disease Classification -- 1 Introduction -- 2 Methodology -- 2.1 Pre-processing -- 2.2 Feature Extraction -- 2.3 Feature Combination -- 2.4 Disease Classification -- 3 Results -- 3.1 Implementation -- 3.2 Classification -- 4 Conclusion -- References -- Plant Disease Identification Using Discrete Wavelet Transform and Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 System Requirements -- 3.3 Experimental Setup -- 4 Results and Discussion -- 4.1 Comparative Results -- 5 Conclusion and Scope of Further Study -- References -- Recognizing Art Style Automatically in Painting Using Convolutional Neural Network -- 1 Introduction -- 2 Related Works -- 3 The Proposed Framework -- 3.1 Model Explanation -- 3.2 Classification Loss Function -- 4 Experimental Results -- 4.1 Datasets -- 4.2 Experimental Analysis and Comparison -- 5 Conclusion. , References -- Depressive Bangla Text Detection from Social Media Post Using Different Data Mining Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Text Preprocessing -- 3.3 Feature Extraction Method -- 3.4 Supervised Learning and Classifier -- 4 Result Analysis -- 5 Conclusion -- References -- Implementation of Optimized PID Controllers in Real Time for Magnetic Levitation System -- 1 Introduction -- 2 Modeling of MAGLEV System -- 2.1 Brief Description of the MAGLEV Hardware Plant -- 2.2 Mathematical Model of the MAGLEV System -- 3 Optimized PID Design Algorithm -- 4 Simulation and Real-Time Results -- 5 Conclusions -- References -- Anomalous Behavior Detection in Examination -- 1 Introduction -- 2 Related Works -- 3 Design of New Work -- 4 Conclusions -- References -- A Survey on DDoS Attacks from Compromised Devices to Enhance IoT Security -- 1 Introduction -- 2 Related Work -- 3 Classification of DDoS Attacks -- 4 Appliance of DDoS Attacks -- 5 Artificial Intelligence in Identification of DDoS Attacks -- 6 Conclusion -- References -- A Study of Glaucoma Diagnosis Using Brain-Computer Interface Technology -- 1 Introduction -- 2 Related Works -- 3 Emerging Technology in Visual Field Test -- 3.1 Cambridge Glaucoma Visual Function Test -- 3.2 Visual Function Test Using Virtual Reality Goggle -- 3.3 Perimetry Analysis Using Tablet -- 3.4 Tablet Perimetry with Gaze Tracking -- 3.5 Visual Field Test Using Robot -- 4 How SSVEP-Based BCI Best for Glaucoma Diagnosis -- 5 Conclusion -- References -- Seafloor Habitat Mapping Using Machine Learning and Underwater Acoustic Sonar -- 1 Introduction -- 2 Methodology -- 2.1 Study Area -- 2.2 Data Collection -- 2.3 Data Processing -- 2.4 Machine Learning -- 3 Results and Discussion -- 4 Conclusion -- References. , Smart Irrigation for Enhanced Agriculture Production Using IoT.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computational intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (593 pages)
    Edition: 1st ed.
    ISBN: 9789811531255
    Series Statement: Lecture Notes in Electrical Engineering Series ; v.643
    DDC: 6.3
    Language: English
    Note: Intro -- Contents -- Artificial Neural Network and Partial Pattern Recognition to Detect Malware -- 1 Introduction -- 2 Literature Review -- 2.1 Signature-Based Malware Detection -- 2.2 Behavior-Based Malware Detection -- 2.3 Heuristic-Based Malware Detection -- 3 Methodology -- 3.1 Opcode Extraction -- 3.2 Feature Selection -- 3.3 Constructing Feature Vector -- 3.4 Feature Classifier -- 3.5 Training the Model -- 3.6 Testing -- 4 Dataset Used -- 5 Results -- References -- Epidemiology and Forecasting of Cholera Incidence in North India -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Collection -- 2.2 Application of Software Used for Data Analysis -- 2.3 Methods -- 3 Epidemiological Features -- 3.1 Agent -- 3.2 Mode of Transmission (Vibrio) -- 3.3 Environmental Factors -- 4 Results and Discussions -- 5 Conclusion -- References -- A Novel Approach for Improving Routing Efficiency and Minimizing Propagation Mean Delay for DADCQ Protocol in VANET -- 1 Introduction -- 1.1 Literature Review -- 2 Application Distance Method for 1D and 2D Networks -- 2.1 Analysis of Spatial Distribution in VANET -- 2.2 Adaption of Node Distribution Pattern for 1D and 2D Uniform Distributions -- 3 Reduction of Fading and It's Analysis in the Network -- 4 Design of Quadrant-Based Threshold -- 5 Analysis of Routing Efficiency and It's Improvement for DADCQ Protocol in VANET -- 6 Analysis and Minimizing Mean Delay for DADCQ Under Eavesdropping and DDoS Attacks -- 7 Conclusion -- References -- Human Computer Interaction as a Mode of Improvement in Human Lifestyle -- References -- New Fast and Efficient Techniques for Image Denoising Using VQ, PCA, SVD, Soft Thresholding and Wiener Filter -- 1 Introduction -- 2 Proposed Techniques -- 2.1 Vector Quantization -- 2.2 PCA -- 2.3 PCA for Denoising -- 2.4 SVD -- 2.5 Soft Thresholding [15, 16] -- 2.6 Wiener Filter [17]. , 3 Results and Analysis -- 4 Complexity Analysis of Proposed LBGPCASTW and LBGSVDSTW with LPGPCA -- 5 Conclusions -- References -- Elicitation and Analysis of Security Requirements and Patterns for IoT Based Health Monitor -- 1 Introduction -- 2 Related Work -- 3 Design and Functioning of Health Monitor Using IOT -- 4 Security Requirements Elicitation -- 5 Identification of Security Requirement Patterns for Security in Requirements Phase -- 6 Security Requirements Patterns Analysis and Its Impact on Security Objectives of IoT Health Monitor -- 7 Conclusion and Future Work -- References -- Classification of Remote Sensing Images Based on K-Means Clustering and Artificial Bee Colony Optimization -- 1 Introduction -- 2 Methodology -- 3 Classification Methods -- 4 Results and Discussions -- 5 Conclusion -- References -- Internet of Things and Its Applications: An Overview -- 1 Introduction -- 2 Related Work -- 3 Elements of IoT -- 4 Framework-Architecture -- 5 Analysis, Monitoring, and Reporting -- 6 Case Studies-Applications -- 7 Conclusion and Future Scope -- References -- Smart KYC Using Blockchain and IPFS -- 1 Introduction -- 1.1 IPFS -- 1.2 DLT -- 2 Present Versus Proposed System -- 3 Proposed Architecture -- 3.1 Document Submission -- 3.2 Notary Verification -- 3.3 Third Party Verification -- 4 Benefits of the System -- 5 Future Aspects -- 6 Conclusion -- References -- Lexical Analysis and Mathematical Modelling for Analysing Depression Detection of Social Media Reviews -- 1 Introduction -- 2 Related Study -- 3 Our Proposed Model -- 4 Result Analysis -- 5 Conclusion -- 6 Future Enhancement -- References -- Application of Neural Networks and Lifting Wavelet Transform for Long Term Solar Radiation Power Prediction -- 1 Introduction -- 2 Overview of Basics -- 2.1 Recurrent Neural Networks -- 2.2 Wavelet Transforms. , 2.3 Construction of Second Generation Wavelets (Lifting Scheme) [7] -- 2.4 Multi-resolution Analysis (MRA) [18] -- 3 Construction of Lifting Wavelet Transform -- 4 Experiment -- 4.1 Solar Radiation Prediction with Neural Networks -- 4.2 Modeling of NARX Neural Network -- 4.3 Results -- 5 Conclusion -- References -- Modeling Sustainable Mobility Using Fuzzy Logic: An Application to Selected Indian States -- 1 Introduction -- 2 Methodology -- 2.1 Development of Sustainable Mobility Indicators -- 2.2 Normalization, Weighting and Mathematical Integration -- 2.3 Integrating the Sub-indices with Fuzzy Logic -- 3 Study Areas and Data Collection -- 4 Results and Discussions -- 5 Conclusion -- References -- Shravya-A Framework for Enunciation of Sanskrit Shlokas and Phrases -- 1 Introduction -- 2 Literature Survey -- 2.1 Sandhi Vicched -- 2.2 Enunciation-Shloka Generation -- 3 Shravya -- 3.1 Sandhi Vicched Module -- 3.2 Shloka Audio Generation -- 3.3 Training -- 3.4 Esting -- 4 Conclusion -- 5 Future Scope -- References -- Energy-Efficiency in WSN Based on SCMC Protocol -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Proposed System Architecture -- 3.2 Proposed Design Goal -- 3.3 Dynamic Cluster Formation -- 4 Experimental Results -- 5 Conclusion -- References -- Extending Bidirectional Language Model for Enhancing the Performance of Sentiment Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Word Embedding Using Bidirectional Language Model -- 3.2 Sentiment Analysis Approach -- 4 Result Analysis -- 5 Conclusion and Future Work -- References -- Energy-Efficiency Driven Strategy for Resource Aggregation Based on Future Resource-Usage Inference in a Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Proposed Model -- 5 Implementation Details -- 6 Evaluation with Assessment. , 6.1 Simulation Details -- 6.2 Result Analysis -- 7 Conclusion -- References -- A Comparison of Deep Learning Algorithms for Plant Disease Classification -- 1 Introduction -- 2 Literature Survey -- 2.1 Dataset -- 3 Model Architecture -- 3.1 LeNet -- 3.2 AlexNet -- 3.3 Inception V3 -- 4 Experiments and Results -- 5 Conclusion -- References -- Active Learning Using Margin Sampling Strategy for Entity Recognition -- 1 Introduction -- 2 Related Work -- 3 Corpus Details -- 4 Feature Extraction and Classifier Used -- 5 Active Learning Algorithm Steps -- 6 Result and Discussion -- 7 Conclusion -- References -- Design of QoS and Energy Efficient VM Consolidation Framework for Cloud Data Centers -- 1 Introduction -- 2 Related Works -- 3 CloudSim VM Consolidation -- 4 Proposed VM Consolidation System -- 4.1 Novel Load Detection Algorithm -- 4.2 VM Selection Algorithm -- 4.3 PSO Based VM Placement -- 5 Conclusion and Future Work -- References -- Cyberbullying Detection on Multiple SMPs Using Modular Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Dataset Preprocessing -- 3.2 Architecture -- 4 Experiments and Results -- 5 Conclusion -- References -- Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment -- 1 Introduction -- 2 Related Work -- 3 Revisiting Amin and Biswas's Algorithm -- 4 Proposed Protocol -- 4.1 System Setup and Initialization Phase -- 4.2 User Registration Phase -- 4.3 Login Phase -- 4.4 Authentication and Session Key Generation Phase -- 5 Analysis of the Proposed Protocol -- 5.1 Prevents All Session Hi-Jacking Due to Sensor Capture Attack -- 5.2 Preventing Gateway Impersonation Attack [23, 27] -- 5.3 Avoiding Sensor Node Impersonation Attack [27] -- 6 Conclusion and Future Scope -- References. , An Empirical Evaluation of Correlation Based Feature Selection for Tweet Sentiment Classification -- 1 Introduction -- 2 Evaluation Methods and Model -- 2.1 Dataset -- 2.2 Data Preprocessing -- 2.3 Feature Selection Methods -- 2.4 Sentiment Classification -- 3 Experimental Results -- 4 Conclusion -- References -- Automatic Traffic Sign Detection and Classification of Indian Traffic Signage's Based on Multi-feature Fusion -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Preprocessing and Segmentation -- 3.2 Feature Extraction Methods -- 3.3 Feature Fusion -- 3.4 Classification -- 4 Results -- 5 Conclusion -- References -- Extended Local Ternary Pattern for Face Anti-spoofing -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Spoofing Detection Using ELTP -- 4 Results and Discussions -- 5 Conclusion -- References -- Enhancing Data Security in Cloud Computing Using Threshold Cryptography Technique -- 1 Introduction -- 2 Problem Statement -- 3 Literature Survey -- 3.1 Existing Systems -- 3.2 Proposed System -- 4 Objectives -- 5 Methodology and Assumptions -- 6 Implementation -- 7 Security and Performance Analysis -- 7.1 Data Confidentiality -- 7.2 Entity Authentication -- 7.3 Data Integrity -- 7.4 Data Access Control -- 7.5 Performance Analysis -- 8 Conclusion -- References -- Multi-resolution Hierarchical Clustering by Vector Quantization -- 1 Introduction -- 2 Principles and Methodology -- 2.1 The Proposed Clustering Algorithm for Vector Quantization -- 2.2 Complexity Analysis -- 3 Multi-resolution Clustering -- 4 Experiment and Results -- 5 Conclusion -- References -- Certificate Verification System Using Blockchain -- 1 Introduction -- 1.1 Blockchain -- 1.2 Ethereum -- 1.3 Smart Contract -- 2 Related Works -- 3 Proposed System -- 3.1 Process -- 4 Conclusion -- References. , IoT Based Automatic Plant Watering System Through Soil Moisture Sensing-A Technique to Support Farmers' Cultivation in Rural India.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (237 pages)
    Edition: 1st ed.
    ISBN: 9789811914843
    Series Statement: Algorithms for Intelligent Systems Series
    DDC: 006.3
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Machine learning. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1600 pages)
    Edition: 1st ed.
    ISBN: 9789811636905
    Series Statement: Lecture Notes in Electrical Engineering Series ; v.783
    DDC: 006.31
    Language: English
    Note: Intro -- Preface -- Contents -- Automatic Notes Generation from Lecture Videos -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Procedure -- 4.1 Extraction of Audio and Speech Recognition -- 4.2 Punctuating the Text and Preprocessing -- 4.3 Dividing into Subtopics -- 4.4 Generating PDF and PPT -- 5 Results -- 6 Conclusion and Future Work -- References -- Correlation Between Code Smells for Open Source Java Projects -- 1 Introduction -- 2 Related Study -- 3 Research Methodology -- 3.1 Datasets -- 3.2 Code Smells -- 3.3 Correlation -- 4 Results -- 5 Conclusions and Future Scope -- References -- Throughput Improvement in Energy Efficient Heterogeneous Wireless Sensor Network -- 1 Introduction -- 1.1 Sensor Node -- 1.2 Energy Saving Mechanisms in WSN -- 1.3 Routing Protocols -- 1.4 Energy Efficiency in Mac Protocols in WSN -- 1.5 Motivation -- 2 Literature Review -- 3 Energy Consumption Model -- 4 EEC Network Model -- 4.1 Cluster Formation and Cluster Head Selection -- 5 Proposed Protocol -- 6 Simulation Parameters -- 7 Simulation Results and Discussion -- 7.1 Network Initialization and Neighbour Discovery -- 7.2 Cluster Formation and CH Selection -- 8 Performance Analysis -- 8.1 Energy Graph -- 8.2 Packet Delivery Ratio -- 8.3 Throughput -- 9 Conclusions -- References -- Deep Learning Models for Rubik's Cube with Entropy Modelling -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Data Structure Generation -- 3.2 Data Set Generation Using Standard Algorithms -- 3.3 Deep Learning Models (RL/CNN/LSTM) Implementation -- 3.4 Entropy Modelling Traversal -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Detecting Diabetic Retinopathy Using Deep Learning Technique with Resnet-50 -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Feature Extraction in Fundus Image. , 3.2 Fundus Image Classification -- 4 Results -- 4.1 Symptoms Identification -- 4.2 Disease Severity Classification -- 5 Conclusion and Future Scope -- References -- Restoration of Rician Corrupted MR Data Using Improved Hybrid Model -- 1 Introduction -- 2 Background -- 2.1 Rician Distribution in Molecular Imaging -- 2.2 Application of Hybrid Filter in MR Imaging -- 3 Experimental Results -- 3.1 Hybrid Model Applied to Thorax MR Images -- 3.2 Hybrid Model Applied to Brain MR Images -- 4 Conclusion -- References -- Flight Delay Prediction Using Random Forest Classifier -- 1 Introduction -- 2 Related Work -- 2.1 Dataset -- 3 System Implementation and Results -- 4 Conclusion -- 5 Future Enhancement -- References -- A Framework Using Markov-Bayes' Model for Intrusion Detection in Wireless Sensor Network -- 1 Introduction -- 2 Related Research -- 3 The Model -- 4 Hidden Markov and Bayesian Network Model -- 5 Simulation Experiments and Result Analysis -- 6 Conclusion -- References -- Effective Text Comment Classification Using Novel ML Algorithm-Modified Lazy Random Forest -- 1 Introduction -- 2 Literature Review -- 3 System Design -- 3.1 Data Pre-Processing -- 3.2 Training with the Model -- 3.3 SPAM Classification -- 4 Proposed Algorithm -- 5 Experiment and Results -- 6 Results with HOLD-OUT Method: Youtube and SMS Dataset -- 6.1 Hold-Out Method Results on Youtube Dataset -- 6.2 Hold-Out Method Results on SMS Dataset -- 7 Results with K-Fold CV Method: YouTube and SMS Dataset -- 7.1 K-Fold CV Method Results on YouTube Dataset -- 7.2 Lazy Random Forest -- 7.3 Native Bayes -- 8 Conclusion -- References -- Unraveling Deep Learning Performance in Cross-Sensor Iris Recognition -- 1 Introduction -- 2 Proposed Work -- 2.1 Description of Standard CNN Models -- 2.2 Image Augmentation -- 2.3 Feature Extraction -- 2.4 Classification -- 3 Experiments. , 3.1 Dataset Description -- 3.2 Experimental Design -- 4 Experimental Outcomes -- 5 Conclusion -- References -- Travelling Salesman Problem Using GA-ACO Hybrid Approach: A Review -- 1 Introduction -- 2 Travelling Salesman Problem (TSP) -- 3 Approaches to Solve TSP -- 3.1 Genetic Algorithm (GA) -- 3.2 Ant Colony Optimization (ACO) -- 3.3 Hybridization -- 4 Conclusion -- Bibliography -- Efficient and Robust Indian Number Plate Recognition Through Modified and Tuned LPRNet -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach: Modified LPRNet -- 3.1 Existing LPRNet Model -- 3.2 Modified LPRNet Model -- 3.3 Post Processing -- 4 Experiment Setup -- 4.1 Dataset -- 4.2 Training Details -- 5 Results -- 5.1 Synthetic Data Results -- 5.2 Transfer Learning on Real Data -- 5.3 Confusion Matrix and Test Accuracy -- 5.4 Sample Results -- 6 Conclusion and Future Work -- References -- An Improved Machine Learning Prediction Model for Diabetes -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Toolkit -- 3.2 Dataset Description -- 3.3 Proposed Approach -- 3.4 Kmeans Clustering Algorithm -- 3.5 Voting Classifier -- 4 Results -- 5 Conclusions and Future Scope -- References -- University Recommendation System for Higher Studies in USA -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Scope of the Project -- 2 Literature Survey -- 3 Our University Recommendation System -- 4 System Architecture -- 4.1 DataSet -- 4.2 Data Cleaning -- 5 Algorithms Used -- 5.1 Collaborative Filtering -- 5.2 Content Based Filtering -- 5.3 Similarity and Distance -- 5.4 K Nearest Neighbor -- 5.5 Random Forest Classifier -- 6 Result and Analysis -- 7 Conclusion and Future Scope -- References -- Comparison of Performances of Regression Model-Based Prediction of Meteorological Conditions -- 1 Introduction -- 1.1 Linear Regression -- 1.2 Logistic Regression. , 1.3 K-Means Clustering -- 2 Procedure -- 2.1 Dataset Extraction -- 2.2 Linear Regression -- 2.3 Logistic Regression -- 2.4 Clustering -- 3 Flow Chart -- 3.1 Linear Regression -- 3.2 Logistic Regression -- 3.3 Clustering -- 4 Results -- 4.1 Linear Regression -- 4.2 Logistic Regression -- 4.3 Clustering -- 5 Conclusion -- References -- Vocal Source Builds Divergence in Gender Recognition -- 1 Introduction -- 2 Methodology -- 2.1 Multi Layered Perceptron (MLP) -- 2.2 RandomForest -- 2.3 DecisionTree -- 2.4 LogisticRegression -- 3 Procedure -- 3.1 Multi Layered Perceptron (MLP) -- 3.2 Random Forest -- 3.3 Decision Tree -- 3.4 Logistic Regression -- 4 Results -- 4.1 Multi Layered Perceptron(MLP) -- 4.2 Random Forest -- 4.3 Decision Tree -- 4.4 Logistic Regression -- 5 Conclusions -- References -- An Analytical Prediction of Breast Cancer Using Machine Learning -- 1 Introduction -- 2 Methodology -- 2.1 K-Nearest Neighbour -- 2.2 Random Forest -- 2.3 Artificial Neural Network -- 3 Procedure -- 3.1 Data Set and Pre-processing -- 3.2 Decision Tree -- 3.3 Gaussian Naïve Bayes -- 3.4 Artificial Neural Network -- 4 Results -- 4.1 K-Nearest Neighbor Evaluation -- 4.2 Logistic Regression Evaluation -- 4.3 Naïve Bayes Evaluation -- 4.4 SVC Evaluation -- 4.5 Decision Tree Evaluation -- 4.6 Random Forest Evaluatıon -- 5 Conclusion -- References -- A Synopsis of Monocular Depth Estimation -- 1 Introduction -- 2 Datasets -- 2.1 NYU-Depth V2 -- 2.2 KITTI Dataset -- 2.3 Make3D -- 2.4 Gamehook Mod -- 2.5 Synthia Dataset -- 3 Methods -- 3.1 Supervised -- 3.2 Unsupervised -- 3.3 Semi-supervised -- 3.4 Self-supervised -- 4 Prominent Work Done -- 4.1 Intel-ISL MiDaS -- 4.2 Consistent Video Depth Estimation -- 5 Comparative Study -- 6 Scope -- 6.1 3D Reconstruction and Point Cloud -- 6.2 Virtual Effects -- 6.3 Object Trajectory -- 6.4 Absolute Depth -- 6.5 Parallax Simulation. , 6.6 Drawbacks of Traditional Methods -- 7 Conclusion -- References -- Automated Car Parking System Using Deep Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Methodology Used -- 3.1 Creation of CNN Model -- 3.2 Creation of Training and Test Labelled Dataset -- 3.3 Experimentation -- 4 Result and Discussions -- 5 Conclusion and Future Scope -- References -- Currency Exchange Rate Prediction Using Multi-layer Perceptron -- 1 Introduction -- 2 Acquiring and Preparing Data -- 3 Building the MLP Model with Keras -- 4 Training and Testing of the Model -- 5 Results and Conclusion -- References -- Analysis of Web Application Firewalls, Challenges, and Research Opportunities -- 1 Introduction -- 1.1 Web Application Firewall -- 1.2 Web Application Security Risk -- 2 Related Work -- 2.1 Critcal Analysis of Web Application Firewall -- 2.2 APO Technique -- 2.3 Dataset -- 2.4 ANN based Web Application Firewall -- 3 Comparison of Web Application Firewalls -- 4 Proposed Approaches -- 4.1 Multimodal Networks -- 4.2 Attention-Based Mechanism -- 4.3 Heuristic Based Selection -- 5 Followings Are the Key Finding from Above Survey -- 6 Conclusion -- References -- A Comparative Study for Predicting Burned Areas of a Forest Fire Using Soft Computing Techniques -- 1 Introduction -- 2 Materials and Methods -- 2.1 Description of Dataset -- 2.2 Methods -- 3 Results and Discussion -- 3.1 Data Preparation -- 3.2 Performance Analysis -- 3.3 Computational Execution Time -- 4 Conclusion -- References -- Shill Bidding Detection in Online Auction -- 1 Introduction -- 2 Literature Survey -- 3 Proposal -- 3.1 Patterns Observed in Real Time Online Auctions -- 3.2 Security Perspective -- 4 Result Analysis -- 5 Conclusion -- References -- An Optimal Region Growing Segmentation Algorithm with Decision Tree Tumor Classifier -- 1 Introduction -- 2 Literature Survey. , 3 Proposed Methodology.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Milton :Taylor & Francis Group,
    Keywords: Refuse and refuse disposal. ; Sewage sludge. ; Sewage. ; Electronic books.
    Description / Table of Contents: The book examines environmental issues and their solutions with advancements in biotechnology and nanotechnology. This book will focus on environmental friendly waste management, wastewater treatment and utilization of wastes for energy.
    Type of Medium: Online Resource
    Pages: 1 online resource (277 pages)
    Edition: 1st ed.
    ISBN: 9781000342567
    DDC: 363.728
    Language: English
    Note: Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Editors -- Contributors -- Chapter 1: Global Environmental Issues and the Role of Nanobiotechnology for the Sustainable Environment -- Chapter 2: Municipal Solid Waste Management: Recent Practices -- Chapter 3: Recent Advances in the Structural Modifications of Nanoparticles to Enhance Photocatalytic Activity -- Chapter 4: Microbiological Degradation of Organic Pollutants from Industrial Wastewater -- Chapter 5: Lignocellulosic Biomass Wastes to Bioenergy: Role of Microbial Enzymes for Second Generation Biofuels -- Chapter 6: Microbiological Removal of Heavy Metals from the Environment: An Eco-Friendly Approach -- Chapter 7: Recent Trends in Solar Photocatalytic Degradation of Organic Pollutants using TiO2 Nanomaterials -- Chapter 8: Recent Advancement in Phytoremediation for Removal of Toxic Compounds -- Chapter 9: Utilization of Nanoparticle-Loaded Adsorbable Materials for Leachate Treatment -- Chapter 10: Application of Fe-TiO2 Nanoparticle Composite Encompassing the Dual Effect -- Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (427 pages)
    Edition: 1st ed.
    ISBN: 9789813366916
    Series Statement: Algorithms for Intelligent Systems Series
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- IOT Smart Locker -- 1 Introduction -- 2 Literature Review -- 3 Workflow of the System -- 3.1 To Open This Smart Locker, the User Has to Go Under These Steps to Access the Locker -- 3.2 Tool Kit -- 3.3 Proposed Model -- 4 Result from Observation -- 5 Conclusion -- References -- Brief Analysis on Human Activity Recognition -- 1 Introduction -- 1.1 Human Activity Recognition (HAR) -- 2 Related Work -- 3 Deep Neural Network (DNN) -- 4 System Design -- 5 Result -- 6 Conclusion -- References -- Lora-Based Smart Garbbage Alert Monitoring System Using ATMEGA 328, 2560, 128 -- 1 Introduction -- 2 Literature Review -- 3 Existing System -- 4 Proposed System -- 5 Working -- 6 Cloud Database -- 7 Simulated Output of the System on the Cloud -- 8 Components Required -- 9 IR Sensor -- 10 LoRaWAN -- 11 Principle of Operation -- 12 Conclusion -- References -- Pre-birth Prognostication of Education and Learning of a Fetus While in the Uterus of the Mother Using Machine Learning -- 1 Introduction -- 2 Why Subsidizing in Early Brain Development? -- 2.1 Literature Survey -- 2.2 The Three Key Aspects What Baby Learns -- 2.3 How Early Staged Career Guidance Can Shape Future -- 3 How the Future Learning Can Be Predicted -- 3.1 Applying Decision Tree to Predict Educational Stream -- 3.2 Merits and Demerits of This Predication -- 4 Conclusion -- References -- Performance Analysis of Single-Stage PV Connected Three-Phase Grid System Under Steady State and Dynamic Conditions -- 1 Introduction -- 2 Photovoltaic System -- 2.1 PV System -- 2.2 Power Electronic Converter -- 2.3 MPPT Method -- 3 Simulation Result Analysis -- 4 Conclusions -- References -- Delay Feedback H_infty Control for Neutral Stochastic Fuzzy Systems with Time Delays -- 1 Introduction -- 2 Problem Description -- 3 Main Results -- 4 Numerical Example. , 5 Conclusion -- References -- Modeling Crosstalk of Tau and ROS Implicated in Parkinson's Disease Using Biochemical Systems Theory -- 1 Introduction -- 2 Methods -- 2.1 Generalized Mass Action Kinetics -- 2.2 Michaelis-Menten's Kinetics -- 2.3 Hill Equation -- 3 Results -- 3.1 Increased Concentration Levels of ROS, Alpha Synuclein Aggregation and Oxidized DJ-1 in Diseased Conditions -- 3.2 Mitochondrial Dysfunction Leads to NFT Production in Diseased Conditions -- 4 Discussion -- 5 Conclusion -- References -- IoT-Based Patient Vital Measuring System -- 1 Introduction -- 2 Literature Survey -- 3 Hardware and Software Platform -- 4 Result and Performance Analysis -- 5 Security Compliance -- 6 Conclusion and Future Work -- References -- IoT-Enabled Logistics for E-waste Management and Sustainability -- 1 Introduction -- 2 Literature Review -- 3 E-waste Management Network -- 4 Conclusion -- References -- Navigation Through Proxy Measurement of Location by Surface Detection -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Feature Extraction -- 3.4 Model Selection -- 3.5 Performance Evaluation -- 4 Conclusion and Future Enhancements -- References -- Unsupervised Learning Algorithms for Hydropower's Sensor Data -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 One Class Support Vector Machine -- 3.2 Isolation Forest -- 4 Conclusion -- References -- Feature Construction Through Inductive Transfer Learning in Computer Vision -- 1 Introduction -- 2 Deep Learning -- 3 Transfer Learning -- 4 Target Dataset-Place Dataset -- 5 Overall Approach -- 5.1 Data Pre-processing -- 5.2 Model Transfer -- 5.3 Training the Datasets -- 5.4 Figures and Tables -- 6 Result -- 7 Conclusion and Future Work -- References. , Decoding Motor Behavior Biosignatures of Arm Movement Tasks Using Electroencephalography -- 1 Introduction -- 2 Methods -- 2.1 Subject Summary and Data Collection -- 2.2 Design of Experiment and Execution Steps -- 2.3 Design of Experiment and Execution Steps -- 3 Results -- 3.1 Increased Θ and γ Activity in Frontal and Temporal Regions in Motor Planning Phase of Cognitive Tasks -- 3.2 Behavioral Variations in Θ and γ Rhythms in Frontal, Temporal and Parietal Lobes in Motor Execution Phase of Cognitive Motor Performances -- 3.3 Activity Related Increase of Theta and Gamma Waves in Frontal and Temporal Regions in Linear and Complex Motor Actions -- 4 Discussion -- 5 Conclusion -- References -- Emergency Robot -- 1 Introduction -- 1.1 Literature Survey -- 2 Description of Vehicle Section -- 2.1 Gas detector -- 2.2 Metal Detector -- 2.3 Web Camera -- 2.4 Gun Control -- 3 System Implementation -- 3.1 Work Flow of the Model -- 3.2 Troubleshooting -- 4 Proposed System -- 4.1 Controlling Section -- 5 Hardware Implementation -- 5.1 Circuit Diagram -- 6 Result -- 7 Conclusion -- 8 Future Scope -- References -- Type Inference in Java: Characteristics and Limitations -- 1 Introduction -- 2 Type Inference in Java -- 2.1 Java 5 -- 2.2 Java 7 -- 2.3 Java 8 -- 2.4 Java 10 -- 3 Limitations -- 3.1 Wildcard as Return Type -- 3.2 Chained Method Call -- 3.3 Local Variable Inference -- 4 Discussion -- 5 Conclusion -- References -- Detection and Correction of Potholes Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Support Vector Machine -- 4.1 Working of SVM -- 4.2 Working of Pothole Detection Robot -- 5 Results and Discussions -- 5.1 Normal Support Vector Classifier (SVC) Where no Features Are Used Gives 62.5% Accuracy. -- 5.2 SVC with Corner Detection Gives 62.5% Accuracy. , 5.3 SVC with Canny Edge Detection is 75% Accuracy. -- 5.4 SVC with Canny Edge Detection and Corner Detection 68.75% Accuracy. -- 6 Future Scope -- 7 Conclusion -- References -- Detecting COVID-19 Using Convolution Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Data Preprocessing -- 3.2 Implementation -- 4 Results and Discussions -- 5 Conclusion -- References -- Electroencephalography Measurements and Analysis of Cortical Activations Among Musicians and Non-musicians for Happy and Sad Indian Classical Music -- 1 Introduction -- 2 Methods -- 2.1 Subject Selection and Screening -- 2.2 Auditory Stimuli -- 2.3 Experiment Design -- 2.4 EEG Data Acquisition and Computational Analysis -- 3 Results -- 3.1 Brain Rhythms Shifts from Gamma-Alpha in Happy Music Perception and Alpha-Beta-Gamma for Other Auditory Cues in Musicians and Non-musicians -- 3.2 Behavioural Pattern Variations of Brain Rhythms for Sad Music Stimuli and Other Auditory Cues in Musicians and Non-musicians -- 4 Discussion -- 5 Conclusion -- References -- Signal Processing in Yoga-Related Neural Circuits and Implications of Stretching and Sitting Asana on Brain Function -- 1 Introduction -- 2 Methods -- 2.1 Experimental Protocol and Characteristics -- 3 Results -- 3.1 Increased Changes Attributed to Memory and Attention Observed in Practitioners -- 3.2 Statistical Analysis on the Task Scores Shows Homogenous Performance Between the Genders -- 3.3 Statistical Analysis on the Task Scores Shows There is Significant Difference Between the Groups -- 4 Discussion -- 5 Conclusion -- References -- Automation of Answer Scripts Evaluation-A Review -- 1 Introduction -- 2 Related Work -- 3 Challenges -- 4 Conclusion -- References -- Diabetes Mellitus Detection and Diagnosis Using AI Classifier -- 1 Introduction -- 2 Proposed Methodology -- 3 Results and Discussion. , 4 Conclusion -- References -- Review on Unit Selection-Based Concatenation Approach in Text to Speech Synthesis System -- 1 Introduction -- 2 The Process of Speech Production -- 2.1 Basic TTS System -- 3 Different Synthesizer Technologies -- 3.1 Concatenative Synthesis -- 3.2 Unit Selection Synthesis -- 3.3 Unit Selection and Specification Process -- 4 Comparison of Different Synthesis Methods -- 5 Conclusion -- References -- Enhancing the Security of Confidential Data Using Video Steganography -- 1 Introduction -- 2 Steganography and Cryptography -- 2.1 Steganography -- 2.2 Cryptography -- 3 Related Work -- 4 Frame Selection Approach -- 5 Methodology -- 6 Parameter Metrices -- 7 Results and Discussion -- 8 Conclusion -- References -- Data Mining and Analysis of Reddit User Data -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 4 Result and Discussion -- 5 Conclusion -- 6 Future Scope -- References -- Analysis of DNA Sequence Pattern Matching: A Brief Survey -- 1 Introduction -- 2 Literature Review -- 3 Conclusion -- References -- Sensor-Based Analysis of Gait and Assessment of Impacts of Backpack Load on Walking -- 1 Introduction -- 2 Methods -- 2.1 Effect of Backpack on Lower Body -- 3 Results -- 3.1 Measured Gait Variability Across Different Subject Groups Using Froude Analysis -- 3.2 Attribute Selection to Classify Gait -- 3.3 Gender-Based Classification with Respect to Fr Number. -- 3.4 Effect of Backpack Load on Pelvis during Walking to Understand the Gait Pathological Condition -- 4 Discussion -- 5 Conclusion -- References -- Wireless Battery Monitoring System for Electric Vehicle -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 System Block Diagram -- 4.1 Sensors -- 4.2 Wi-Fi Module -- 5 System Flow Chart -- 5.1 Electric Vehicle Battery Specification -- 6 Result -- 7 Software Preparation -- 7.1 Arduino IDE. , 7.2 AVR Studio.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...