GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cerebrovascular disease. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (188 pages)
    Edition: 1st ed.
    ISBN: 9789811314537
    Language: English
    Note: Intro -- Contents -- About the Editors -- Chapter 1: Cerebral Stroke: An Introduction -- 1.1 Introduction -- 1.2 Types of Stroke -- 1.2.1 Ischemic Stroke -- 1.2.2 Hemorrhagic Stroke -- 1.2.3 Transient Ischemic Attack -- 1.3 Stroke Pathophysiology -- 1.4 Current Treatment Option for Stroke Patients -- 1.5 Neuroprotective Agents in Preclinical and Clinical Trials -- 1.6 Stroke-Induced BBB Disruption -- 1.7 Ischemic Stroke-Induced ER Stress -- 1.8 The Emerging Role of mi-RNA in Stroke Pathophysiology -- 1.9 Neuroprotective Potential of Low-Frequency Electromagnetic Field -- 1.10 Stem Cell Therapies for Cerebral Stroke -- 1.11 Conclusion -- References -- Chapter 2: Inflammation, Oxidative Stress, and Cerebral Stroke: Basic Principles -- 2.1 Introduction -- 2.2 Inflammation -- 2.3 Inflammatory Role of Cytokines and Chemokines During Cerebral Stroke -- 2.4 Oxidative Stress -- 2.5 Treatment Strategy for Stroke -- 2.5.1 Targeting Antioxidant Enzyme as a Therapeutic Strategy for Ischemic Stroke -- 2.5.2 Regulation of Microglial Activation in Stroke -- 2.5.3 Targeting the Cholinergic Anti-inflammatory Pathway -- References -- Chapter 3: Stroke Induced Blood-Brain Barrier Disruption -- 3.1 Introduction -- 3.2 BBB Anatomy -- 3.3 BBB Junctional Complexes -- 3.3.1 Adherens Junctions (AJs) -- 3.3.2 Tight Junctions (TJs) -- 3.3.3 Gap Junctions -- 3.3.3.1 Junctional Adhesion Molecule (JAM) -- 3.3.3.2 Occludin -- 3.3.3.3 Claudins -- 3.3.4 Membrane-Associated Guanylate Kinase (MAGUK)-Like Proteins -- 3.3.5 Accessory Proteins -- 3.4 Calcium Modulation of TJ and TJ Proteins -- 3.5 Phosphorylation: A Novel Regulatory Mechanism of TJ Proteins -- 3.6 Impairment of BBB Integrity in Neuropathological Disorder -- 3.6.1 Alteration of BBB Integrity in Stroke Injury -- 3.7 Evaluation of BBB Disruption in Rodent Ischemic Stroke. , 3.8 Quantitative Evaluation of BBB in Ischemic Stroke Using Dynamic Contrast-Enhanced (DCE) MRI -- 3.9 Conclusion -- References -- Chapter 4: Ischemic Stroke-Induced Endoplasmic Reticulum Stress -- 4.1 Introduction -- 4.2 ER Stress, UPR, and Ischemia -- 4.2.1 Components of UPR in Ischemia -- 4.2.1.1 GRP78 -- 4.2.1.2 PERK -- 4.2.1.3 ATF6 -- 4.2.1.4 IRE1 -- 4.3 Chronic ER Stress, UPR, and Pro-apoptotic Signaling in IR Injury -- 4.3.1 CHOP -- 4.3.2 Caspase 12 -- 4.3.3 JNK -- 4.4 ER Stress and Autophagy in IR Injury -- 4.5 ER Stress and miRNAs in IR Injury -- 4.6 Conclusion -- References -- Chapter 5: The Role of Autophagy in Ischaemic Stroke: Friend or Foe? -- 5.1 Introduction -- 5.2 Pathophysiology of Ischaemic Stroke -- 5.3 Various Animal Models to Study IS -- 5.3.1 Intra-arterial Suture Middle Cerebral Arterial Occlusion Model -- 5.3.2 Craniotomy Model -- 5.3.3 Photothrombosis Model -- 5.3.4 Endothelin-I Model -- 5.3.5 Clot Embolic Model of Stroke -- 5.4 Autophagy and Its Machinery -- 5.5 Autophagy and Its Role in Cerebral Ischaemia -- 5.5.1 Autophagy Activation in Ischaemic Stroke Protects Neurons -- 5.5.2 Autophagy Is Also Responsible for Neuronal Death After Ischaemic Stroke -- 5.5.3 Degree of Autophagy Is Critical in Ischaemic Stroke -- 5.5.4 Autophagy Contributes to Ischaemic Tolerance After Preconditioning -- 5.5.5 Autophagy May Be Disrupted During Ischaemia -- 5.6 Concluding Remarks -- References -- Chapter 6: Critical Role of Mitochondrial Autophagy in Cerebral Stroke -- 6.1 Introduction -- 6.2 Autophagy -- 6.3 Nonselective Autophagy and Mitophagy -- 6.4 Mitochondria Dynamics: Fission and Fusion of Mitochondria -- 6.5 Molecular Mechanisms of Mitophagy -- 6.6 Mitophagy in Cerebral Ischemia -- 6.7 Effect of Cerebral Ischemia in Mitochondrial Dynamic Mediators -- 6.8 Mitophagy Regulation: An Anti-inflammation Approach in Cerebral Ischemia. , 6.9 Mitophagy Regulation: A Neuroprotective Approach in Cerebral Ischemia -- 6.10 Conclusion -- References -- Chapter 7: Application of Neuroimaging Tools in Identification of Pinpoint Location of Blockage -- 7.1 Introduction -- 7.2 Neuroimaging Modalities for Stroke Detection -- 7.3 Hardware-Based Imaging Modalities -- 7.3.1 Computed Tomography (CT) -- 7.3.2 Magnetic Resonance Imaging(MRI) -- 7.3.3 Microwave-Based Imaging(MW) -- 7.3.4 Single-Photon Emission Computed Tomography (SPECT) -- 7.3.5 Positron Emission Tomography (PET) -- 7.3.6 Cranial Ultrasound -- 7.4 Software-Based Image Processing Modalities -- 7.4.1 Image Filtering -- 7.4.2 Image Enhancement -- 7.4.3 Image Segmentation -- 7.4.4 Image Compression -- 7.5 Computer-Aided Automatic Detection -- 7.5.1 Graphical User Interface Based (GUI) -- 7.5.2 Computer-Aided Algorithm-Based Detection -- 7.6 Comparison of Neuroimaging Modalities -- 7.7 Conclusion -- References -- Chapter 8: Emerging Role of Electromagnetic Field Therapy in Stroke -- 8.1 Introduction -- 8.2 Importance of Electromagnetic Therapy -- 8.3 Physical Basis of the Generation of a Magnetic Field -- 8.3.1 Stationary Magnetic Field -- 8.3.2 Pulsed Electromagnetic Field -- 8.4 Primary Biological Effects of Magnetic Fields -- 8.4.1 Cell Proliferation and Cell Cycle Regulation -- 8.4.2 Genotoxic Effects -- 8.4.3 Effects on Cellular Membrane Permeability -- 8.5 Role of Electromagnetic Therapy in Ischemic Stroke -- 8.6 Conclusion -- Basic Terminology -- References -- Chapter 9: Stem Cell-Based Therapy for Ischemic Stroke -- 9.1 Introduction -- 9.2 Stem Cell Transplantation for Stroke -- 9.3 Neural Stem Cells -- 9.4 Embryonic Stem Cells -- 9.5 Mesenchymal Stem Cells -- 9.5.1 Bone Marrow-Derived Mesenchymal Stem Cells -- 9.5.2 Adipose Mesenchymal Stem Cells -- 9.5.3 Human Umbilical Cord Mesenchymal Stem Cells. , 9.5.4 Menstrual Blood-Derived Mesenchymal Stem Cells -- 9.6 Hematopoietic Stem Cells -- 9.7 Inducible Pluripotent Stem Cells -- 9.7.1 Reprogramming Methods for Human Somatic Cells into iPSCs -- 9.8 Preconditioning Strategy in Stem Cell Transplantation Therapy -- 9.9 Conclusion -- References -- Chapter 10: Emerging Role of microRNAs in Cerebral Stroke Pathophysiology -- 10.1 Introduction -- 10.2 MicroRNA Biogenesis -- 10.3 Current Therapy and the Possible Role of miRNA in Neuroprotection -- 10.4 Development of Therapeutic Approaches Using miRNA Mimics and Inhibitors -- 10.5 Techniques for miRNA Expression Analysis -- 10.6 Computational Target Gene Prediction -- 10.7 Experimental Approaches to miRNA Target Validation -- 10.8 miRNA as a Prognostic Biomarker in Ischemic Stroke -- 10.9 Circular RNA -- References -- Chapter 11: Therapeutic Aspects of Nanomedicines in Stroke Treatment -- 11.1 Introduction -- 11.2 Secondary Neuronal Damage After Stroke and BBB Breakdown -- 11.3 Existing Treatment of Stroke -- 11.4 Drug Delivery Through BBB During Stroke -- 11.5 NP-Based Drug Delivery -- 11.6 NP-Based Chemical Agents -- 11.7 A Hope: NPs as a Diagnostic Tool in Stroke -- 11.8 Composition of Nanocarrier Used in Stroke Therapy -- 11.9 Lipid Nanoparticles -- 11.10 Polymer Carriers -- 11.10.1 Inorganic-Based Nanocarriers -- 11.11 Nanocarriers-Based Thrombolytic Therapy: Preclinical Development -- 11.12 Streptokinase -- 11.13 Nanocarriers Loaded with SK -- 11.14 Urokinase (UK) -- 11.15 Urokinase-Loaded Nanocarriers -- 11.16 Tissue Plasminogen Recombinant (tPA, rtPA) -- 11.17 rtPA-Loaded Nanocarriers -- 11.18 Conclusion -- References -- Chapter 12: Neuroprotective Potential of Small Molecule Phytochemicals in Stroke Therapy -- 12.1 Introduction -- 12.2 Role of Molecular Mediators in Apoptotic, Necrotic, and Necroptotic Neuronal Cell Death. , 12.3 Impact of Neurodegeneration in Neurological Disorders Including Stroke -- 12.4 Small Molecule Bioactive Phytochemicals as Neuroprotective Agents in Ischemic Stroke -- 12.4.1 Flavonoids -- 12.4.2 Terpenoids -- 12.4.3 Alkaloids -- 12.4.4 Withanolides -- 12.5 Conclusion -- References -- Chapter 13: Post-Stroke Treatment Strategies, Management, and Rehabilitation: Where We Stand? -- 13.1 Introduction -- 13.2 Types of Stroke -- 13.3 Treatments -- 13.3.1 In hospital -- 13.3.1.1 Thrombolysis -- 13.3.1.1.1 Intravenous Thrombolytic Therapy -- 13.3.1.1.2 Intra-arterial Thrombolysis -- 13.3.1.2 Aspirin Treatment -- 13.3.1.3 Therapeutic Hypothermia -- 13.3.1.4 Blood Pressure Management -- 13.3.1.5 Antiplatelet Strategies -- 13.3.1.6 Surgery for Cerebral Edema -- 13.3.1.7 Antithrombotic Therapy -- 13.3.2 Post-discharge -- 13.3.2.1 Lifestyle Physical Activity -- 13.3.2.1.1 Smoking -- 13.3.2.1.2 Alcohol -- 13.3.2.1.3 Diet -- 13.3.2.1.4 Physical Activity -- 13.3.2.2 Blood Glucose Management -- 13.3.2.3 Cholesterol Management -- 13.3.2.4 Blood Pressure Management -- 13.3.2.5 Anticoagulation and Antiplatelet Therapy -- 13.3.2.6 Herbal Neuroprotective Intervention -- 13.4 Limitations of Treatment -- 13.5 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Data mining. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (172 pages)
    Edition: 1st ed.
    ISBN: 9789811037795
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.555
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- About the Book -- Contents -- About the Editors -- 1 Research on SaaS-Based Mine Emergency Rescue Preplan and Case Management System -- Abstract -- 1 Introduction -- 2 SaaS and Service-Oriented Architecture -- 3 The Architecture of System -- 4 The Components of System -- 5 System Implementation and Testing -- 6 Conclusion -- Acknowledgements -- References -- 2 An Investigation of Matching Approaches in Fingerprints Identification -- Abstract -- 1 Introduction -- 2 Research Method -- 2.1 Research Questions -- 2.2 Research Strategies -- 3 Fingerprints Matching Approaches -- 3.1 Taxonomy of the Study -- 3.2 Generic Process of Three Main Types of Fingerprints Matching -- 4 Current Issues of the Matching Approaches -- Acknowledgements -- References -- 3 Figure Plagiarism Detection Using Content-Based Features -- Abstract -- 1 Introduction -- 2 Content-Based Feature Extraction -- 3 Similarity Detection -- 4 Result and Evaluation -- 5 Conclusions -- Acknowledgements -- References -- 4 An Efficient Content-Based Image Retrieval (CBIR) Using GLCM for Feature Extraction -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Preprocessing Phase -- 2.2 Feature Extraction Phase -- 3 Methodology -- 4 Similarity Feature Extraction -- 5 Algorithm for GLCM -- 6 Results and Discussion -- 7 Comparative Analysis -- 8 Conclusions -- References -- 5 Emotion Recognition System Based on Facial Expressions Using SVM -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Emotion Recognition -- 3.1 Image Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Selection -- 3.4 Expression Recognition -- 3.5 Experiments Results -- 4 Conclusion -- References -- 6 An AES-CHAOS-Based Hybrid Approach to Encrypt Multiple Images -- Abstract -- 1 Introduction -- 1.1 Fast Chaotic Algorithm -- 1.2 AES Image Encryption -- 1.3 Cramer's Rule. , 2 Literature Review -- 3 Proposed Algorithm -- 4 Results -- 5 Conclusion -- References -- 7 Automatic Text Summarization of Video Lectures Using Subtitles -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Proposed Architecture -- 2.1.1 Data Preprocessing -- 2.1.2 Feature Selection for Summarization -- 2.1.3 Processing After Feature Selection for Summarization -- 3 Conclusion -- References -- 8 Classification of EMG Signals Using ANFIS for the Detection of Neuromuscular Disorders -- Abstract -- 1 Introduction -- 2 Proposed Model -- 2.1 Preprocessing of the EMG Signal -- 2.2 Processing or Feature Extraction of EMG Signal -- 2.3 Classification of EMG Signal -- 3 Results and Analysis -- 4 Conclusion -- References -- 9 Evaluating Similarity of Websites Using Genetic Algorithm for Web Design Reorganisation -- Abstract -- 1 Introduction -- 2 Web Mining-A Background -- 2.1 Web Mining Taxonomy -- 2.2 Web Mining Tasks -- 3 Literature Survey -- 4 Proposed Methodology -- 5 Experimental Evaluation -- 5.1 Proposed Genetic Algorithm -- 5.2 Computation of Similarity -- 6 Conclusion -- References -- 10 Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Proposed Hybrid Intrusion Detection Methodology -- 2.1 Feature Preparation Module -- 2.2 Misuse Analyzer Module -- 2.3 Anomaly Analyzer Module -- 3 Simulation Results -- 4 Conclusion -- References -- 11 Analysis of Reconfigurable Fabric Architecture with Cryptographic Application Using Hashing Techniques -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Implementation of Reconfigurable Fabric -- 4 Interconnect Topologies -- 5 Operation -- 6 Results -- 6.1 Hashing Function -- 7 Conclusion -- References -- 12 Privacy Preservation of Infrequent Itemsets Mining Using GA Approach -- Abstract -- 1 Introduction. , 2 Literature Survey -- 3 Problem Definition -- 4 Proposed Framework -- 5 Proposed Algorithm -- 5.1 Illustrated Example -- 6 Result Analysis -- 7 Conclusion -- References -- 13 A Quinphone-Based Context-Dependent Acoustic Modeling for LVCSR -- Abstract -- 1 Introduction -- 2 Working of ASR -- 3 Phonetic Representation of Speech Signals -- 3.1 Modeling Using Monophones -- 3.2 Modeling Using Triphones -- 3.3 Modeling Using Quinphones -- 4 Implementation -- 4.1 Speech Data Preparation -- 4.2 Training -- 4.3 ASR Performance Analysis -- 5 Experiments -- 5.1 Testing with Varying Vocabulary Sizes -- 5.2 Testing with Varying Gaussian Mixtures -- 6 Conclusion -- References -- 14 Slot-Loaded Microstrip Antenna: A Possible Solution for Wide Banding and Attaining Low Cross-Polarization -- Abstract -- 1 Introduction -- 2 Theoretical Background -- 3 Proposed Structure -- 4 Results and Discussions -- 5 Conclusions -- Acknowledgements -- References -- 15 Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 System Model -- 3.2 Fractal-based Key Pair Generation and Key Exchange -- 4 Fractal PKC-based Key Management Scheme: FPKM -- 4.1 Set-up Phase -- 4.2 Clustering Phase -- 4.3 Rekeying Phase -- 5 The Performance Evaluation of Proposed Scheme -- 6 Conclusion -- References -- 16 Histogram-Based Human Segmentation Technique for Infrared Images -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Selection of ROIs -- 2.2 Human Candidates Segmentation -- 3 Experiment Results -- 4 Conclusion -- References -- 17 Medical Image Segmentation Based on Beta Mixture Distribution for Effective Identification of Lesions -- Abstract -- 1 Introduction -- 2 Probability Distribution Functions of Beta Mixture Model Using the EM Algorithm -- 3 Clustering Algorithm Based on Fuzzy c-Means. , 4 Dataset -- 5 Segmentation Algorithm -- 5.1 Experimentation -- 6 Results Derived and Performance Analysis -- 7 Conclusion -- References -- 18 Toward Segmentation of Images Based on Non-Normal Mixture Models Based on Bivariate Skew Distribution -- Abstract -- 1 Introduction -- 2 Bivariate Skew Gaussian Mixture Model -- 3 k-Means Algorithm -- 4 Data Set Considered -- 5 Feature Selection -- 6 Experiment Result and Performance Evolution -- 7 Conclusion -- References -- 19 Development of Video Surveillance System in All-Black Environment Based on Infrared Laser Light -- Abstract -- 1 Introduction -- 2 Design of Video Capture System -- 2.1 IR Laser Aiding Light Module -- 2.2 Photoelectric Sensor Module -- 2.3 Central Control Module -- 3 System Testing -- 4 Conclusion -- Acknowledgements -- References -- 20 Data Preprocessing Techniques for Research Performance Analysis -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Business Intelligence -- 2.2 Data Preprocessing -- 3 Research Performance Analysis -- 3.1 Data Preprocessing Approach -- 4 Conclusion -- Acknowledgements -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1040 pages)
    Edition: 1st ed.
    ISBN: 9789811394065
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1006
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Intelligent Computing -- 1 Global Stability of a Viral Dynamical Model -- Abstract -- 1 Introduction -- 2 Model -- 3 The Existence of Equilibria -- 4 The Global Stability of Equilibria -- Acknowledgements -- References -- 2 Research on Construction of the Software Technology Profession in Vocational Institutes Based on the External Vision -- Abstract -- 1 Introduction -- 2 Professional Construction Ideas Based on the External Vision -- 3 Versatile Teaching Team Construction Based on the Strengths of Teachers -- 4 Social Service Ability Construction Based on Demands of Social Markets -- 5 Construction of School Training Bases Integrated Into Occupation Job Elements and the Construction of the Public Off-Campus Training Bases -- Acknowledgements -- References -- 3 Numerical Study on the Expanded Mixed Covolume Method for One-Dimensional Sobolev Equation -- Abstract -- 1 The Expanded Mixed Covolume Method -- 1.1 The Semi-discrete Scheme -- 1.2 The Fully Discrete Scheme -- 2 Numerical Invariants -- 2.1 A Single Solitary Wave -- 2.2 Interaction of Two Solitary Waves -- References -- 4 Research on the Control Method of Coal Sample Blanking Based on the BP Neural Network and the PID Algorithm -- Abstract -- 1 Introduction -- 2 Control Method of Coal Sample Blanking Based on the BP Neural Network and the PID Algorithm -- 2.1 PID Control Algorithm -- 2.2 BP Neural Network Algorithm -- 3 Experimental Verification -- Acknowledgements -- References -- 5 A Practice on Neural Machine Translation from Indonesian to Chinese -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Lore Translator -- 4 Experiments -- 4.1 Corpus -- 4.2 Training -- 4.3 Experimental Results and Discussion -- 4.4 Demo System -- 5 Conclusion -- Acknowledgements -- References. , 6 Keyword-Based Indonesian Text Summarization -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 The Development of Automatic Summarization -- 2.2 Existing Systems -- 3 Keyword Contribution Method -- 3.1 Overall Architecture -- 3.2 Algorithm -- 4 Experiment -- 5 Conclusion -- Acknowledgements -- References -- 7 Automatic Decision Support for Public Opinion Governance of Urban Public Events -- Abstract -- 1 Introduction -- 2 Implementation -- 2.1 Data Collection Layer -- 2.2 Information Analysis Layer -- 2.3 Public Opinion Government Layer -- 3 Conclusion -- Acknowledgements -- References -- 8 Improved Local Morphology Fitting Active Contour with Weighted Data Term for Vessel Segmentation -- Abstract -- 1 Introduction -- 2 Related Local Region-Based Models -- 3 Proposed Method -- 4 Results -- 5 Conclusion -- References -- 9 3D Point Cloud Data Splicing Algorithm Based on Feature Corner Model -- Abstract -- 1 Introduction -- 2 3D Point Cloud Data Splicing Algorithm Based on Feature Corner Model -- 2.1 Model Innovation and Data Mining -- 2.2 The Overall Structure of the System -- 2.3 Point Cloud Data Splicing Algorithm -- 3 Conclusion -- Acknowledgements -- References -- 10 A Preliminary Study on Mobile Learning -- Abstract -- 1 The Concept, Characteristics, and Composition of Mobile Learning -- 2 The Feasibility of Mobile Learning -- 2.1 The Characteristics of Mobile Learning -- 2.2 The Inherent Advantages of the Network Environment -- 2.3 The Needs of Professional Construction -- 3 Potential Problems and Solutions in Mobile Learning -- 4 Conclusion -- References -- 11 Design and Implementation of Real-Time Inquiry System of the Stock Market -- Abstract -- 1 Introduction -- 2 Relative Technologies -- 2.1 Hadoop -- 2.2 HBase -- 3 Requirement Analysis and Design -- 3.1 System Function Analysis -- 3.2 Overall Design of the System. , 3.3 Database Design -- 4 Implementation of the Key Modules of the System -- 4.1 The Real-Time Prompt Module of Fuzzy Query of Stock Information -- 4.2 News Information Module -- 4.3 Query Module of Large Quantities of Historical Data -- 5 Conclusion -- Acknowledgements -- References -- 12 An Improved Feature Selection Algorithm for Fault Level Identification -- Abstract -- 1 Introduction -- 2 Basic Concepts of Ordinal Classification -- 3 Feature Selection Algorithm for Ordinal Classification -- 4 Feature Selection and Classification Results -- 5 Conclusions -- Acknowledgements -- References -- 13 Computing Model of Musical Multiple Perception Based on Memory Mapping Perception Inversion -- Abstract -- 1 Introduction -- 2 Fuzzy Perception of Music -- 2.1 Fuzziness of Music -- 2.2 Memory Mapping and Perception Inversion (MMPI) -- 3 Music Intelligence Based on Fuzzy Perception -- 3.1 Musical Feature Index -- 3.2 The Basic Type of Music Perception -- 4 Experimental Results -- 5 Conclusions -- Acknowledgements -- References -- 14 A Natural Immersive Closed-Loop Interaction Method for Human-Robot "Rock-Paper-Scissors" Game -- Abstract -- 1 Introduction -- 2 System Description -- 2.1 The Natural Interaction Implementation -- 2.2 The Real-Time Performance Implementation -- 2.3 The Immersion Mode Implementation -- 3 The Closed-Loop Characteristics -- 4 System Testing and Evaluation -- 5 Conclusion -- References -- 15 Capsule Network-Based Facial Expression Recognition Method for a Humanoid Robot -- Abstract -- 1 Introduction -- 2 Advantages and Properties of the Capsule Net -- 2.1 The Differences -- 2.2 The Properties of the Capsule Net -- 3 CK+ Dataset and NAO Robot Experiments -- 3.1 CK+ Dataset -- 3.2 NAO Robot -- 3.3 Experiments -- 4 Conclusions -- Acknowledgements -- References. , 16 Equipment Maintenance Mode Decision Based on Fuzzy Multi-attribute Decision Method -- Abstract -- 1 Introduction -- 2 Fuzzy Multi-attribute Decision Model -- 3 Fuzzy Multi-attribute Decision Process -- 4 Fuzzy Multi-attribute Decision Method -- 5 Example Analysis -- 6 Conclusion -- References -- 17 A Method for Facial Kinship Verification Based on Deep Learning -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Channel Backbone Network -- 2.2 Multi-channel Model -- 2.2.1 Binary-Channel Model -- 2.2.2 Elastic Multi-channel Model -- 2.3 Training -- 3 Experiments and Results -- 4 Conclusion -- Acknowledgements -- References -- 18 A Domain-Adapting Word Representation Method for Word Clustering -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Frequently Co-occurring Entropy -- 3.2 Fuzzy Bag-of-Words Model -- 4 Experimental Results -- 5 Conclusion -- Acknowledgments -- References -- 19 Fitting Complex Nonlinear Function with Belief Rule Base -- Abstract -- 1 Introduction -- 1.1 The Basic BRB Model -- 1.2 BRB Inference Using ER Approach -- 2 Constructing BRB Model for Nonlinear Function -- 2.1 Nonlinear Function -- 2.2 Transformation Techniques for Quantitative Data -- 3 Parameter Training for BRB -- 4 Experiments Study -- 5 Conclusion -- References -- 20 Approximate Kernel Regression Based on Distributed ADMM Algorithm -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Kernel Regression -- 2.2 ADMM Algorithm -- 2.3 Kernel Regression Based on ADMM Algorithm -- 2.4 Approximate Kernel Matrix -- 3 Experiments -- 4 Conclusion -- Acknowledgements -- References -- 21 Detection for Mixed-Characters Based on Machine Learning -- Abstract -- 1 Introduction -- 2 The Composition of the Detection System -- 3 Character Preprocessing -- 3.1 Binarization -- 3.2 Character Segmentation -- 3.3 The Character Normalization -- 4 Data Set Production. , 5 Neural Network Design -- 6 Experimental Results and Analysis -- 7 Conclusion -- References -- 22 Research on 3D Terminal Rendering Technology Based on Power Equipment Business Features -- Abstract -- 1 Introduction -- 2 3D Model High-Speed Rendering Technology -- 3 3D Model Real-Time High-Speed Rendering Technology for Terminal and Grid Business Application Requirements -- 3.1 Scene Organization -- 3.2 Rendering Process -- 3.3 3D Engine Cross-Platform Technology -- 4 Conclusions -- Acknowledgements -- References -- 23 Community Detection Based on Improved Bee Evolutionary Genetic Algorithm -- Abstract -- 1 Introduction -- 2 Algorithm Structure and Algorithm Description -- 3 Improved Bee Evolutionary Genetic Algorithm -- 3.1 Fitness Function -- 3.2 Encoding -- 3.3 Population Initialization -- 3.4 Crossover Operator -- 3.5 Mutation Operator -- 3.6 Selection Operator -- 3.7 Optimization of Random Population Size -- 4 Simulation and Analysis -- 4.1 Community Detection of the LFR Benchmark Network -- 4.2 Community Detection of the Karate Club Network -- 4.3 Community Detection of the dolphin Network -- 5 Conclusion -- Acknowledgments -- References -- 24 Named Entity Recognition for Chinese Management Case Texts -- Abstract -- 1 Introduction -- 2 Semi-supervised Learning Method -- 2.1 Bootstrapped Framework -- 2.2 BI-LSTM-CRF Model -- 2.3 Evaluating Rule -- 3 Experiment -- 3.1 Dataset -- 3.2 Results and Analysis -- 4 Conclusion and Discussion -- Acknowledgements -- References -- 25 Application of Virtual Simulation Platform in Basic Medical Teaching -- Abstract -- 1 Introduction -- 2 Significance of Basic Medical Virtual Simulation Experimental Platform -- 2.1 Reduce the Cost of Experiment -- 2.2 Provide an Open Experimental Environment -- 2.3 Enhance Classroom Fun -- 3 Construction of Basic Medical Virtual Simulation Platform. , 3.1 Functionality Virtual Simulation Experiment Platform.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (398 pages)
    Edition: 1st ed.
    ISBN: 9789811393303
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1005
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Data Science and Analytics -- Quality Index Evaluation Model Based on Index Screening Model -- 1 Introduction -- 2 Three-Parameter Interval Principal Component Analysis -- 2.1 Principal Component Analysis -- 2.2 Calculation Steps -- 2.3 M-PCA Three-Parameter Interval Principal Component Analysis -- 2.4 Calculation Steps -- 2.5 The Determination of Subjective Index Weight Based on Analytic Hierarchy Process -- 2.6 Index Evaluation -- 3 Analysis of Examples -- 4 Conclusion -- References -- Selection of Software Development Methodologies (SDMs) Using Bayesian Analysis -- 1 Introduction -- 2 Proposed Work -- 3 Proposed Model -- 3.1 Experimental Result -- 4 Conclusion -- 5 Future Scope -- References -- Role of Social Media in Employer Branding-A Study on Selected Engineering Colleges (Private) in Bhubaneswar -- 1 Introduction -- 2 Objective -- 3 Methodology -- 4 Literature Review -- 4.1 Employer Branding -- 5 Cases of Private Institute -- 5.1 Case 1: Institute of Technical Education and Research, SOA University, Bhubaneswar -- 5.2 Case 2: Centurion University of Technology and Management (CUTM), Bhubaneswar -- 5.3 Case 3: Silicon Institute of Technology -- 5.4 Case 4: Gandhi Engineering College (GEC) Bhubaneswar -- 5.5 Case 5: Hi-Tech Institute of Technology (HIT), Bhubaneswar -- 6 Conclusion of the Study -- References -- A Novel Approach for Artifact Removal from Brain Signal -- 1 Introduction -- 2 Overview of Proposed Method -- 2.1 Kurtosis -- 2.2 Multiscale Entropy (MSE) -- 2.3 Artifact Channel Identification -- 2.4 Artifact Denoising -- 3 Results and Discussion -- 4 Conclusion -- References -- A Novel Approach to Heterogeneous Multi-class SVM Classification -- 1 Introduction -- 2 Literature Review -- 3 Classification Problem -- 4 Proposed Novel Approach for Heterogeneous Data. , 5 Experimental Results -- 6 Conclusion -- References -- An Empirical Study of Big Data: Opportunities, Challenges and Technologies -- 1 Introduction -- 2 Importance of Big Data -- 2.1 Importance to National Development -- 2.2 Importance to Industrialized Upgrades -- 2.3 Importance to Technical Research -- 2.4 Importance to Interdisciplinary Research -- 2.5 Importance to Better Predict the Future -- 3 Big Data Characteristics -- 3.1 Volume -- 3.2 Velocity -- 3.3 Variety -- 3.4 Veracity -- 3.5 Validity -- 3.6 Volatility -- 3.7 Value -- 4 Hadoop: Way to Process Big Data -- 4.1 Hadoop Distributed File System -- 4.2 MapReduce -- 5 Challenges of Big Data -- 5.1 Data Challenges -- 5.2 Processing Challenges -- 5.3 Management Challenges -- 6 Big Data Techniques -- 7 Big Data Hadoop-Based Tools -- 7.1 Apache Hadoop -- 7.2 Apache Mahout -- 7.3 Storm -- 7.4 S4 -- 7.5 Apache Kafka -- 8 Conclusion -- References -- Forecasting World Petroleum Fuel Crisis by Nonlinear Autoregressive Network -- 1 Introduction -- 2 Data Sources -- 3 Methodology -- 3.1 Time Series Prediction Using Artificial Neural Network (ANN) -- 3.2 Comparisons of General Prediction Models -- 3.3 Predictive Model Flow Control Diagram -- 3.4 Predictive Model Structure -- 4 Performance Measurement -- 5 Result and Analysis -- 6 Comparison and Discussion -- 7 Hypothesis Testing -- 8 Conclusion -- References -- Stock Market Price Prediction Employing Artificial Neural Network Optimized by Gray Wolf Optimization -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Dataset -- 3.2 Normalization -- 3.3 Artificial Neural Network -- 3.4 Gray Wolf Optimization -- 4 Proposed Approach -- 5 Experimental Setup and Simulation Result -- 6 Conclusion -- References -- Analysis of Techniques for Credit Card Fraud Detection: A Data Mining Perspective -- 1 Introduction -- 2 Literature Review. , 2.1 Dataset Collection -- 2.2 Various Methodology of Fraud Detection in Credit Card -- 3 Challenges in Credit Card Fraud Detection -- 4 Conclusion -- References -- Predictive Analytics for Weather Forecasting Using Back Propagation and Resilient Back Propagation Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Supervised Learning Algorithms -- 4 Artificial Neural Network -- 4.1 Back Propagation Algorithm -- 4.2 Resilient Back Propagation -- 5 Results and Discussion -- 5.1 Backprop and Rprop Implemented in RStudio -- 5.2 Receiver Operating Characteristic Curve (ROC) and Area Under Curve (AUC) -- 5.3 ggplot -- 6 Conclusion -- Appendix -- References -- Analysis of the Leadership of Undergraduate Freshmen in Military Schools from the Perspective of Space -- 1 Introduction -- 2 Research Methods -- 2.1 Research Tools -- 2.2 Research Procedures -- 3 The Results Analysis -- 3.1 Reliability and Validity Test -- 3.2 Overall Analysis of Leadership -- 3.3 Analysis of the Correlation Between Leadership and Per Capita Income -- 3.4 Analysis of the Correlation Between Leadership and Per Capita Income -- 4 Result Analysis -- 5 Concluding Remarks -- References -- Correlation Analysis for CSI300 Index Return and Realized Volatility -- 1 Introduction -- 2 Model Construction -- 2.1 Model Realized Estimate -- 2.2 Edge Distribution Model Construction -- 2.3 Construction of Time Change D-Vine Copula -- 3 Empirical Analysis -- 3.1 Characteristic Analysis -- 3.2 Parameter Estimation -- 3.3 Parameter Estimation for Continuous-Time Volatility and the Jump Volatility Models -- 3.4 Correlation Analysis -- 4 Conclusion -- References -- Prescription Basket Analysis: Identifying Association Rule Among Drugs in Prescription of Dentist in Bhubaneswar City -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 4 Conclusion -- References. , Decision Science and Management -- Impact of Decision Science on e-Governance: A Study on Odisha Land Records System -- 1 Introduction -- 1.1 e-Governance -- 1.2 Odisha Right to Public Services Act -- 2 Literature Review -- 2.1 Brainstorming -- 2.2 Committee Meetings -- 2.3 Delphi -- 2.4 Electronic Meeting -- 2.5 Survey -- 2.6 Decision Tree and Decision Tables -- 2.7 Game Theory -- 2.8 Simulation -- 3 Decision Science for e-Governance -- 3.1 Risk Analysis -- 3.2 Decision Analysis -- 3.3 Cost-Effectiveness Analysis -- 4 Key Findings of the Paper -- 5 Conclusion -- References -- HR Value Proposition Using Predictive Analytics: An Overview -- 1 Introduction -- 2 Data Analytics -- 2.1 Descriptive Analytics -- 2.2 Predictive Analytics -- 2.3 Prescriptive Analytics -- 3 Literature Review -- 3.1 HR Analytics -- 4 Findings and Discussion -- 4.1 Importance of Analytics in HR -- 5 Conclusions -- 6 Originality -- 7 Declaration -- References -- Determination of Time-Dependent Quadratic Demand by Using Optimal Ordering Policy, Salvage Value Under Partial Backlogging, Time-Proportional Deterioration, Time-Varying Holding Cost -- 1 Introduction -- 2 Assumptions -- 3 Modeling -- 3.1 Notations -- 3.2 Mathematical Formulation -- 4 Numerical Examples -- 5 Sensitivity Analysis -- 6 Conclusions -- References -- Inventory Control for Materials Management Functions-A Conceptual Study -- 1 Introduction -- 2 Review of the Literature -- 2.1 Inventory Management -- 2.2 Material Management -- 3 Conclusion -- References -- ACO-Based Secure Routing Protocols in MANETs -- 1 Introduction -- 2 Ant Colony Optimization -- 3 Security Aware ACO Routing Protocols -- 3.1 Secure Antnet Routing Algorithm for Scalable Ad Hoc Networks Using Elliptic Curve Cryptography -- 3.2 Secure Power Aware Ant Routing Algorithm -- 3.3 Swarm-Based Detection and Defence Technique. , 3.4 Detection and Prevention of Blackhole Attack in MANET Using ACO Routing -- 3.5 Autonomous Bio-inspired Public Key Management Protocol -- 3.6 ANT-Based Trustworthy Routing -- 3.7 Pair-Wise Key Agreement and Hop-by-Hop Authentication Protocol -- 4 Comparison and Analysis of Security Aware ACO Routing Protocols -- 5 Conclusion and Future Work -- References -- An Approach Toward Integration of Big Data into Decision Making Process -- 1 Introduction -- 2 Background -- 3 Challenges During Big Data Analytics for Decision Making -- 4 Integrated Framework of Big Data Analytics with Decision Making Process -- 4.1 Proposed Approach -- 5 Conclusion and Future Aspects -- References -- Big Data Analysis and Classification of Biomedical Signal Using Random Forest Algorithm -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of the Signal -- 4 Feature Extraction -- 5 Random Forest -- 6 Classification Result -- 7 Conclusion -- References -- An Intelligent Framework for Analysing Terrorism Actions Using Cloud -- 1 Introduction -- 2 Motivation -- 3 Objective -- 4 Literature Review -- 5 Comparison of Models -- 6 Conclusion -- References -- Research on Optimization of J Company Warehouse Storage Process -- 1 Introduction -- 2 Analysis on the Current Situation of J Company -- 2.1 Warehouse Storage Process -- 2.2 Problems with Warehouse Storage Process -- 3 Optimized Warehouse Storage Process -- 4 Petri Net Model -- 5 Conclusion -- References -- The Influence of Psychological Contract on the Willingness to Share Tacit Knowledge -- 1 Introduction -- 2 Psychological Contract -- 2.1 Knowledge Sharing -- 2.2 Hypothesis -- 3 Method -- 3.1 Measurement Tools -- 4 Result -- 5 Hypothesis Testing -- 6 Discussion -- 7 Limitations and Future Research -- References -- Research on the Role of Government Management in Chinese Public Indemnificatory Housing System. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1216 pages)
    Edition: 1st ed.
    ISBN: 9789811089442
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.752
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Interactive Browsing of Large Image Repositories -- 1 Introduction -- 2 Image Database Navigation Systems -- 3 Hue Sphere Image Browser-Principles -- 4 Hue Sphere Image Browser-Systems -- 5 Conclusions -- References -- Intelligent Computing -- 2 Building Unmanned Plant Factory with Modular Robotic Manipulation and Logistics Systems -- Abstract -- 1 Introduction -- 2 Overview of the Integrated Logistics Systems -- 3 Unmanned Ground Vehicle (UGV) -- 3.1 Overview of the UGV -- 3.2 Hardware of the UGV -- 4 Docking System -- 5 Smart Remote-Control System -- 6 Conclusion -- Acknowledgements -- References -- 3 A Comprehensive Looks at Data Mining Techniques Contributing to Medical Data Growth: A Survey of Researcher Reviews -- Abstract -- 1 Introduction -- 2 An Overview of Data Mining -- 3 Proposed Reviews -- 4 Summary -- 5 Conclusion -- Acknowledgements -- References -- 4 Risk Evaluation in TSC Based on Fuzzy Linguistic Information and QFD -- Abstract -- 1 Introduction -- 2 Risk Evaluation in TSC Based on Fuzzy Linguistic Term -- 2.1 2-Tuple Fuzzy Linguistic Model -- 2.2 Risk Analysis Based on Quality Function Deployment -- 2.3 Risk Evaluation Based on Fuzzy QFD -- 3 Case Study -- 4 Conclusion -- References -- 5 Study on Total Factor Productivity of Nanshan District in Shenzhen -- Abstract -- 1 Foreword -- 2 The Measure of Factor Productivity -- 2.1 Model and Parameter Estimation -- 2.1.1 Selection of Production Function -- 2.1.2 Parameter Estimation of Production Function -- 2.2 Efficiency of Economic Operation -- 3 Explain the Growth Phases of Economy in Nanshan District -- 4 Conclusion -- Acknowledgements -- References -- 6 Image Spam Filtering Using Weighted Spatial Pyramid Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 ADAMM Stochastic Optimization Algorithm. , 4 WSP-Net Real-Time Image Recognition Model -- 5 Performance -- 6 Discussion and Conclusions -- Acknowledgements -- References -- 7 Research on the Technology Used to Inspect the Visual Appearance of Tropical Fruit, based on Machine Vision Color Space -- Abstract -- 1 Introduction -- 2 Characteristics of Hainan Tropical Fruit -- 3 Machine Vision (Computer Vision) Detection Technology -- 4 Applied Research -- 5 Summary -- Acknowledgements -- References -- 8 Research on the Mixed-Learning Model and the Innovative Talent Cultivation Mechanism Based on Computational Thinking -- Abstract -- 1 Introduction -- 2 Domestic and Foreign Research Status -- 3 Research on the Cultivation Mode of Ability in Computational Thinking -- 4 The Purpose of Researching Computational Thinking -- 5 Cultivating the Technical Method of Calculating Thinking -- 6 Summary -- Acknowledgements -- References -- 9 Review of Domestic and Foreign Research on the Elderly's Use of Mobile Phones -- Abstract -- 1 Introduction -- 2 Research Method -- 2.1 Literature Review and Database Selection -- 2.2 Search Term and Evaluation of Literature Relevance -- 2.3 Analysis and Reorganization -- 3 Influencing Factors for the Elderly's Use of Mobile Phones -- 3.1 Characteristics of the Elderly -- 3.2 Personal Motivation -- 3.3 Sociodemographic Factors -- 3.4 Technology Convenience -- 4 Prospects -- Acknowledgements -- References -- 10 Research on Face Detection Based on Fast R-CNN -- Abstract -- 1 Introduction -- 2 Face Detection Fast R-CNN -- 2.1 The Construction of Face Detection -- 2.2 Fast R-CNN -- 2.3 ROI Pooling Layer Calculation -- 2.4 Output Layer Regression Calculation -- 3 Experimental Part -- 3.1 Experimental Platform -- 3.2 Experimental Results and Analysis -- 4 Summary -- References -- 11 Research and Optimization of Data Sparsity in Collaborative Filtering Algorithms -- Abstract. , 1 Introduction -- 2 Cooperative Filtering Algorithm Based on Memory -- 3 Algorithm Design and Implementation -- 3.1 Problem Analysis -- 3.2 Algorithm Design and Implementation -- 4 Experimental Results and Analysis -- 4.1 Experimental Data and Environment -- 4.2 Experimental Results -- 5 Summary -- References -- 12 A Robust Image Segmentation Approach Using Fuzzy C-Means Clustering with Local Coefficient of Variation -- Abstract -- 1 Introduction -- 2 Motivation -- 3 The Proposed Method -- 4 Results and Analysis -- 4.1 Synthetic Images -- 4.2 MR Brain Images -- 5 Conclusion -- Acknowledgements -- References -- 13 A Method to Mine Frequent Dense Resources Across Multiple Real-Value Function's Resource Effectiveness Matrixes -- Abstract -- 1 Introduction -- 2 Problem Description -- 3 Mining Frequent Dense Resource Sets -- 4 Results -- 5 Conclusion -- Acknowledgements -- References -- 14 Augmenting Concolic Testing with Weighted Constraints-Based Search -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Concolic Testing -- 2.2 Search Strategies -- 3 Implementation -- 3.1 CFG Construction -- 3.2 Path Constraints Collect and Evaluate -- 3.3 Sort the Paths and Solve Constraints -- 4 Evaluation -- 5 Conclusion -- Acknowledgements -- References -- 15 Research of TDOA Cooperative Direction Finding Algorithm Based on LLS and Taylor -- Abstract -- 1 Introduction -- 2 Algorithm Description -- 2.1 Direction Finding Model Based on TDOA -- 2.2 Cooperative Algorithm Based on LLS and Taylor -- 3 Error Analysis -- 3.1 Cramer-Rao Lower Bound -- 3.2 Mean Square Error -- 4 Simulation Experiments -- 4.1 Parameter Setting -- 4.2 Estimate Results of Direction -- 5 Conclusion -- References -- 16 KCF Tracking Algorithm Based on Outlier Detection -- Abstract -- 1 Introduction -- 2 KCF Tracking Algorithm -- 2.1 Training Classifiers -- 2.2 Target Detection. , 3 Improved KCF Algorithm -- 3.1 Target Detection -- 3.2 Re-Detection and Localization Mechanism -- 4 Experimental Results and Analysis -- 4.1 Experimental Environment and Parameters -- 4.2 Assessment Criteria -- 4.3 Performance Analysis -- 5 Conclusion -- References -- 17 Spectral Clustering Algorithm Based on Attribute Weight of Information Entropy -- Abstract -- 1 Introduction -- 2 Weighted Euclid Distance Based on Information Entropy -- 3 Algorithm -- 4 Experiment -- References -- 18 Interference Location Using an Improved TDOA Algorithm with Antenna Array and Beamforming -- Abstract -- 1 Introduction -- 2 TDOA Method Description -- 3 Improved TDOA Using Array Antenna -- 4 Experiments and Conclusion -- Acknowledgements -- References -- 19 Reconstruction Algorithm of Discontinuous Point for a Class of Shallow Water Equations by MQQI -- Abstract -- 1 Introduction -- 2 Equations -- 3 Numerical Methods -- 4 Numerical Examples -- 4.1 The KDV Equation -- 4.2 The C-H Equation -- 4.3 The D-P Equation -- 5 Conclusion -- Acknowledgements -- References -- 20 Salmon Migration Optimization: A Novel Nature-Inspired Algorithm -- Abstract -- 1 Introduction -- 2 Salmon Migration Optimization (SMO) -- 2.1 Inspiration -- 2.2 Algorithm Flow and Mathematical Model -- 2.2.1 SMO Algorithm -- 2.2.2 Water Flow Oriented Heuristic -- 2.2.3 Magnetic Oriented Heuristic -- 2.2.4 Pheromone Oriented Heuristic -- 3 Results and Discussion -- 3.1 Benchmark Functions and Experimental Setting -- 3.2 Comparison Results and Analysis -- 3.2.1 Unimodal Test Functions and Exploitation Analysis -- 3.2.2 Multi-modal Test Functions and Exploration Analysis -- 3.2.3 Wilcoxon Rank-Sum Test Results and Analysis -- 4 Conclusions -- References -- 21 An Intelligent Logistic Regression Approach for Verb Expression's Sentiment Analysis -- Abstract -- 1 Introduction -- 2 Methodology. , 2.1 Verb Expression Extractor and Vectorization -- 2.2 New Feature Finding with PSO -- 2.3 Regression Coefficient Computation -- 3 Experiments -- 3.1 Datasets -- 3.2 Experimental Results -- 4 Conclusion -- Acknowledgements -- References -- 22 Lyapunov Inequality for Conformable Fractional Equation -- Abstract -- 1 Introduction -- 2 Definition, Lemma, and Remark -- 3 Main Results -- 4 Discussion -- Acknowledgements -- References -- 23 Feature Extraction and Classification of Dynamic and Static Gestures Based on RealSense -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Intel RealSense Technology -- 2.2 Hand Data Acquisition -- 2.3 Gesture Customization -- 3 Feature Analysis and Extraction -- 3.1 Gesture Feature Analysis and Calculation -- 3.2 Feature Set Selection -- 4 Experiment and Analysis -- 5 Conclusions -- Acknowledgements -- References -- 24 Research on Passive Acoustic Source Direction Finding Based on TDOA -- Abstract -- 1 Introduction -- 2 Development of Passive Acoustic Direction Finding -- 3 Direction-Finding Algorithm -- 3.1 Method of Solving Equations -- 3.2 Linear Least Square Method -- 4 The Current Direction-Finding Problems -- 5 Conclusion -- References -- 25 Evaluation of English Speech Quality Based on Deep Belief Network -- Abstract -- 1 Introduction -- 2 Speech Signal Preprocessing and Feature Extraction -- 2.1 The Preprocessing of Speech Signals -- 2.2 Extraction of Speech Feature Parameters -- 3 Multi-parameter Pronunciation Quality Evaluation Based on Deep Belief Network -- 3.1 Restricted Boltzmann Machine -- 3.2 Deep Belief Network -- 4 Experiment Simulation and Result Analysis -- 5 Conclusions -- References -- 26 Integrated Simulation Design of UAV System -- Abstract -- 1 Introduction -- 2 Scheme Design -- 2.1 Development Process of Integrated Simulation -- 2.2 Simulation Objects and Integrated Simulation System. , 3 Real-Time Simulation System Design.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...