GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Springer  (90)
  • Singapore :Springer Singapore Pte. Limited,  (14)
  • American Chemical Society (ACS)  (10)
Document type
Language
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cloud computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (676 pages)
    Edition: 1st ed.
    ISBN: 9789811562020
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.153
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Internet of Things (IOT) -- An Energy-Efficient Data Routing in Weight-Balanced Tree-Based Fog Network -- 1 Introduction -- 1.1 Fog Computing -- 1.2 Tree-Based Architecture -- 1.3 Data Routing -- 1.4 Green Computing -- 2 Related Works -- 3 Proposed Architecture Towards Fog Networks -- 4 Discussions -- 5 Conclusions and Future Work -- References -- A Systematic Overview of Fault Tolerance in Cloud Computing -- 1 Introduction -- 2 Basic Components of Cloud Computing -- 3 Characteristics of Cloud Computing -- 4 Cloud Deployment Models -- 5 Cloud Service Models -- 6 Fault Tolerance -- 7 Fault Tolerance in Cloud Computing -- 7.1 Fault Tolerance Approaches -- 7.2 Fault Tolerance Parameters -- 8 Conclusion -- References -- An EPIC Mechanism for Advertising the Tourist Spots in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 System Model and Problem Formulation -- 4 Tourist Spots Advertisement Problem: Posted Price Mechanism -- 4.1 Outline of PPM-TSAP -- 4.2 Detailing of PPM-TSAP -- 4.3 Illustrative Example -- 4.4 Running Time of PPM-TSAP -- 5 Conclusion and Future Work -- References -- Data Analysis and Prediction of Terror Component Using Web Services -- 1 Introduction -- 2 Background -- 2.1 Intrusion Detection System (IDS) -- 2.2 Vector Space Model -- 2.3 Receiver Operator Characteristic (ROC) Curve -- 3 Content-Based Detection of Terror-Related Activity -- 3.1 Detection Environment -- 4 Detection of Typical Terrorist Behavior -- 5 Experimental Settings -- 5.1 Evaluation Measure -- 6 Result Summarization -- 7 Deployment Issues -- 8 Conclusion -- References -- Facial Expression Recognition System (FERS): A Survey -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Discussion and Comparison of Results -- 5 Conclusion -- References. , Load Balancing of Tasks in Cloud Computing Using Fault-Tolerant Honey Bee Foraging Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Load Balancing in Cloud Computing -- 2.2 Fault Tolerance in Cloud Computing -- 2.3 Honey Bee Behaviour Inspired Load Balancing -- 2.4 Motivation -- 3 Proposed Work and Implementation -- 4 Conclusion and Future Work -- References -- Flip Learning: A Novel IoT-Based Learning Initiative -- 1 Introduction -- 2 Related Works -- 3 Level-Based Approach -- 3.1 Collaborative Learning Within the Campus -- 3.2 Middle Product -- 3.3 Customized Learning Out of the Campus -- 4 Technical Aspects -- 4.1 Mix of IoT and Cloud -- 4.2 Information Management Framework -- 4.3 Content Delivery Network -- 4.4 Use of AI -- 4.5 Virtual and Augmented Reality -- 4.6 Data Security in Network -- 5 Conclusion -- References -- Improvement of Load Balancing in Shared-Memory Multiprocessor Systems -- 1 Introduction -- 2 Overview on Prior Algorithms and Techniques -- 2.1 Static Scheduling -- 2.2 Dynamic Scheduling -- 3 Result and Discussion -- 3.1 The Mandelbrot Set [3] -- 4 Conclusion -- References -- Building Amazon Web Services Infrastructure from the Scratch for an Organization -- 1 Introduction -- 2 Proposed Work and Implementation -- 3 Conclusion and Future Work -- References -- Fault Detection for VANET Using Vehicular Cloud -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Simulation Result and Discussion -- 5 Conclusion and Future Scope -- References -- An Approach to Cohort Selection in Cloud for Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of the Proposed Approach -- 4 Cohort Selection Mechanism -- 4.1 Feature Extraction -- 4.2 Finding of Match Score -- 5 Database and Results -- 6 Conclusion -- References. , Internet of Things (IoT) Framework Deployment Template for Cloud-Based Harbor Surveillance and Ferry Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Model Building -- 3.1 Data Set and Test -- 4 Discussions -- 5 Conclusion -- References -- Art of Style Transfer Using Convolutional Neural Network: A Deep Learning Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Used -- 2.2 Model for Image Classification -- 2.3 Convolutional Neural Network Training Process for Style Transfer -- 3 Experimental Results -- 3.1 Experimental Steps -- 4 Conclusion and Findings -- References -- Impact of Internet of Things (IoT) on 5G -- 1 Introduction -- 2 IoT Challenges -- 3 5G Challenges -- 4 5G Characteristics and Their Values/Applications -- 4.1 5G on IoT: A Single Network for Millions of Applications -- 4.2 The Importance of 5G on the IoT -- 4.3 Application of 5G Over IoT -- 5 The Impact of 5G on IoT -- 5.1 Establishing a 5G-IoT Ecosystem -- 5.2 Future of IoT -- 5.3 Aspects of IoT on Updated 5G Technologies -- 6 Conclusion -- References -- Prediction of Exchange Rate in a Cloud Computing Environment Using Machine Learning Tools -- 1 Introduction -- 2 Machine Learning Techniques Used for Prediction Modeling Data -- 2.1 Linear Regression -- 2.2 Regression Trees -- 2.3 Decision Tree Regression -- 2.4 Boosted Trees Regression -- 2.5 Random Forest Regression -- 2.6 Neural Network Regression -- 2.7 Cloud Computing Tools -- 3 Experimental Works -- 3.1 Data set Analysis -- 3.2 Result Analysis -- 4 Conclusion -- References -- Survey on Stock Price Forecasting Using Regression Analysis -- 1 Introduction -- 2 Literature Review -- 3 Regression -- 4 Regression Methodologies -- 4.1 Linear Regression -- 4.2 Polynomial Regression -- 4.3 Logistic Regression -- 4.4 Ridge Regression -- 4.5 Stepwise Regression -- 4.6 LASSO Regression. , 4.7 Elastic Net Regression -- 5 Conclusions -- References -- Intrusion Detection and Classification Using Decision Tree-Based Feature Selection Classifiers -- 1 Introduction -- 2 Intrusion Detection System -- 3 Data Mining-Based Approach -- 3.1 Decision Tree -- 3.2 Feature Selection -- 4 Dataset Used -- 5 Result Analysis -- 6 Conclusion -- References -- Role of Cloud Computing for Big Data: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Model -- 2.2 Cloud Deployment Model -- 2.3 Challenges and Issues of Cloud Computing -- 3 Big Data -- 3.1 Technologies Supported by Big Data -- 3.2 Challenges in Big Data -- 4 Conclusion -- References -- Role of Cloud Computing in Geotechnical Engineering -- 1 Introduction -- 2 Direct Role of Cloud Computing in Geotechnical Engineering -- 2.1 State-of-the-Art Cloud Computing -- 2.2 State of the Art Approaches for Geotechnical Cloud Computing -- 3 Cloud Computing and Parameter Identification Integrated in System Identification -- 3.1 System Identification -- 3.2 Component of SI -- 4 Inverse Analysis and Parameter Identification Supported by Cloud Computing -- 4.1 General Formulation of Parameter Identification Process -- 4.2 Inverse Analysis and Parameter Identification -- 5 Research Scope and Challenges -- 6 Conclusion -- References -- Energy-Efficient Clustering with Rotational Supporter in WSN -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Step 1-Clustering of Nodes -- 3.2 Step 2-Selection of CH -- 3.3 Step 3-Selection of NCH -- 3.4 Step 4-Selection of SCH -- 4 Simulation -- 5 Conclusion -- References -- A Review on Mobile Cloud Computing -- 1 Introduction -- 2 Need of MCC -- 3 Architecture -- 4 Background -- 4.1 Service Miniatures of MCC -- 4.2 Deployment Miniatures of MCC -- 5 Features of Mobile Cloud and Its Computing -- 5.1 Scalability -- 5.2 Mobility. , 5.3 Mobile Cyber Security with Privacy -- 5.4 Enhancing Reliability with Mobile Computing -- 5.5 Reduced Cost -- 5.6 Multiple Occupancy -- 5.7 Imbalance Web Transmission -- 6 Why Mobile Cloud Computing? -- 7 Issues in MCC -- 7.1 Scarcity of Mobile Appliances -- 7.2 Safety and Seclusion -- 7.3 Short Data Transferral Rate (Bandwidth) -- 7.4 Offloading -- 7.5 Quality of Communication and Broadcasting -- 8 Conclusion -- References -- Corroborating the Veracity of Body Fat Percentage and Classification of Sarcopenia Using Island Differential Evolution Algorithm -- 1 Introduction -- 2 Methodology -- 3 Optimization of the Formula and Techniques Used -- 4 Regression and Genetic Algorithm -- 5 Residuals and Goodness-of-Fit -- 6 Identification and Classification of Sarcopenia -- 7 Island Differential Evolution Algorithm -- 8 Results Obtained -- 9 Conclusion -- References -- Design of Compact Super-Wideband Monopole Antenna for Spectrum Sensing Applications -- 1 Introduction -- 2 Antenna Configuration -- 2.1 SWB QSCA -- 2.2 QSCA with Notch Bands -- 3 Results Discussion -- 4 Conclusion -- References -- Probabilistic and Distance-Aware Clustering Approach to Decrease the Effect of Hot Spot in WSN -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 WSN Challenges -- 1.3 Energy Efficiency -- 1.4 Clustering -- 1.5 LEACH -- 2 Distance Effect -- 2.1 Hot-Spot Effect -- 2.2 Residual-Energy-Based Clustering -- 3 Related Work -- 4 Proposed Protocol -- 5 Results -- 6 Conclusion -- References -- A Real-Time Sentiments Analysis System Using Twitter Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Tweepy Stream Listener -- 3.2 Preprocessing -- 3.3 Sentimental Analysis -- 3.4 Representation -- 3.5 Tweet Storage -- 4 Case Studies -- 4.1 Qualifying 3-Spanish Grand Prix 2019 -- 4.2 Indian Election Results-2019 -- 5 Conclusion and Future Scope. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cerebrovascular disease. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (188 pages)
    Edition: 1st ed.
    ISBN: 9789811314537
    Language: English
    Note: Intro -- Contents -- About the Editors -- Chapter 1: Cerebral Stroke: An Introduction -- 1.1 Introduction -- 1.2 Types of Stroke -- 1.2.1 Ischemic Stroke -- 1.2.2 Hemorrhagic Stroke -- 1.2.3 Transient Ischemic Attack -- 1.3 Stroke Pathophysiology -- 1.4 Current Treatment Option for Stroke Patients -- 1.5 Neuroprotective Agents in Preclinical and Clinical Trials -- 1.6 Stroke-Induced BBB Disruption -- 1.7 Ischemic Stroke-Induced ER Stress -- 1.8 The Emerging Role of mi-RNA in Stroke Pathophysiology -- 1.9 Neuroprotective Potential of Low-Frequency Electromagnetic Field -- 1.10 Stem Cell Therapies for Cerebral Stroke -- 1.11 Conclusion -- References -- Chapter 2: Inflammation, Oxidative Stress, and Cerebral Stroke: Basic Principles -- 2.1 Introduction -- 2.2 Inflammation -- 2.3 Inflammatory Role of Cytokines and Chemokines During Cerebral Stroke -- 2.4 Oxidative Stress -- 2.5 Treatment Strategy for Stroke -- 2.5.1 Targeting Antioxidant Enzyme as a Therapeutic Strategy for Ischemic Stroke -- 2.5.2 Regulation of Microglial Activation in Stroke -- 2.5.3 Targeting the Cholinergic Anti-inflammatory Pathway -- References -- Chapter 3: Stroke Induced Blood-Brain Barrier Disruption -- 3.1 Introduction -- 3.2 BBB Anatomy -- 3.3 BBB Junctional Complexes -- 3.3.1 Adherens Junctions (AJs) -- 3.3.2 Tight Junctions (TJs) -- 3.3.3 Gap Junctions -- 3.3.3.1 Junctional Adhesion Molecule (JAM) -- 3.3.3.2 Occludin -- 3.3.3.3 Claudins -- 3.3.4 Membrane-Associated Guanylate Kinase (MAGUK)-Like Proteins -- 3.3.5 Accessory Proteins -- 3.4 Calcium Modulation of TJ and TJ Proteins -- 3.5 Phosphorylation: A Novel Regulatory Mechanism of TJ Proteins -- 3.6 Impairment of BBB Integrity in Neuropathological Disorder -- 3.6.1 Alteration of BBB Integrity in Stroke Injury -- 3.7 Evaluation of BBB Disruption in Rodent Ischemic Stroke. , 3.8 Quantitative Evaluation of BBB in Ischemic Stroke Using Dynamic Contrast-Enhanced (DCE) MRI -- 3.9 Conclusion -- References -- Chapter 4: Ischemic Stroke-Induced Endoplasmic Reticulum Stress -- 4.1 Introduction -- 4.2 ER Stress, UPR, and Ischemia -- 4.2.1 Components of UPR in Ischemia -- 4.2.1.1 GRP78 -- 4.2.1.2 PERK -- 4.2.1.3 ATF6 -- 4.2.1.4 IRE1 -- 4.3 Chronic ER Stress, UPR, and Pro-apoptotic Signaling in IR Injury -- 4.3.1 CHOP -- 4.3.2 Caspase 12 -- 4.3.3 JNK -- 4.4 ER Stress and Autophagy in IR Injury -- 4.5 ER Stress and miRNAs in IR Injury -- 4.6 Conclusion -- References -- Chapter 5: The Role of Autophagy in Ischaemic Stroke: Friend or Foe? -- 5.1 Introduction -- 5.2 Pathophysiology of Ischaemic Stroke -- 5.3 Various Animal Models to Study IS -- 5.3.1 Intra-arterial Suture Middle Cerebral Arterial Occlusion Model -- 5.3.2 Craniotomy Model -- 5.3.3 Photothrombosis Model -- 5.3.4 Endothelin-I Model -- 5.3.5 Clot Embolic Model of Stroke -- 5.4 Autophagy and Its Machinery -- 5.5 Autophagy and Its Role in Cerebral Ischaemia -- 5.5.1 Autophagy Activation in Ischaemic Stroke Protects Neurons -- 5.5.2 Autophagy Is Also Responsible for Neuronal Death After Ischaemic Stroke -- 5.5.3 Degree of Autophagy Is Critical in Ischaemic Stroke -- 5.5.4 Autophagy Contributes to Ischaemic Tolerance After Preconditioning -- 5.5.5 Autophagy May Be Disrupted During Ischaemia -- 5.6 Concluding Remarks -- References -- Chapter 6: Critical Role of Mitochondrial Autophagy in Cerebral Stroke -- 6.1 Introduction -- 6.2 Autophagy -- 6.3 Nonselective Autophagy and Mitophagy -- 6.4 Mitochondria Dynamics: Fission and Fusion of Mitochondria -- 6.5 Molecular Mechanisms of Mitophagy -- 6.6 Mitophagy in Cerebral Ischemia -- 6.7 Effect of Cerebral Ischemia in Mitochondrial Dynamic Mediators -- 6.8 Mitophagy Regulation: An Anti-inflammation Approach in Cerebral Ischemia. , 6.9 Mitophagy Regulation: A Neuroprotective Approach in Cerebral Ischemia -- 6.10 Conclusion -- References -- Chapter 7: Application of Neuroimaging Tools in Identification of Pinpoint Location of Blockage -- 7.1 Introduction -- 7.2 Neuroimaging Modalities for Stroke Detection -- 7.3 Hardware-Based Imaging Modalities -- 7.3.1 Computed Tomography (CT) -- 7.3.2 Magnetic Resonance Imaging(MRI) -- 7.3.3 Microwave-Based Imaging(MW) -- 7.3.4 Single-Photon Emission Computed Tomography (SPECT) -- 7.3.5 Positron Emission Tomography (PET) -- 7.3.6 Cranial Ultrasound -- 7.4 Software-Based Image Processing Modalities -- 7.4.1 Image Filtering -- 7.4.2 Image Enhancement -- 7.4.3 Image Segmentation -- 7.4.4 Image Compression -- 7.5 Computer-Aided Automatic Detection -- 7.5.1 Graphical User Interface Based (GUI) -- 7.5.2 Computer-Aided Algorithm-Based Detection -- 7.6 Comparison of Neuroimaging Modalities -- 7.7 Conclusion -- References -- Chapter 8: Emerging Role of Electromagnetic Field Therapy in Stroke -- 8.1 Introduction -- 8.2 Importance of Electromagnetic Therapy -- 8.3 Physical Basis of the Generation of a Magnetic Field -- 8.3.1 Stationary Magnetic Field -- 8.3.2 Pulsed Electromagnetic Field -- 8.4 Primary Biological Effects of Magnetic Fields -- 8.4.1 Cell Proliferation and Cell Cycle Regulation -- 8.4.2 Genotoxic Effects -- 8.4.3 Effects on Cellular Membrane Permeability -- 8.5 Role of Electromagnetic Therapy in Ischemic Stroke -- 8.6 Conclusion -- Basic Terminology -- References -- Chapter 9: Stem Cell-Based Therapy for Ischemic Stroke -- 9.1 Introduction -- 9.2 Stem Cell Transplantation for Stroke -- 9.3 Neural Stem Cells -- 9.4 Embryonic Stem Cells -- 9.5 Mesenchymal Stem Cells -- 9.5.1 Bone Marrow-Derived Mesenchymal Stem Cells -- 9.5.2 Adipose Mesenchymal Stem Cells -- 9.5.3 Human Umbilical Cord Mesenchymal Stem Cells. , 9.5.4 Menstrual Blood-Derived Mesenchymal Stem Cells -- 9.6 Hematopoietic Stem Cells -- 9.7 Inducible Pluripotent Stem Cells -- 9.7.1 Reprogramming Methods for Human Somatic Cells into iPSCs -- 9.8 Preconditioning Strategy in Stem Cell Transplantation Therapy -- 9.9 Conclusion -- References -- Chapter 10: Emerging Role of microRNAs in Cerebral Stroke Pathophysiology -- 10.1 Introduction -- 10.2 MicroRNA Biogenesis -- 10.3 Current Therapy and the Possible Role of miRNA in Neuroprotection -- 10.4 Development of Therapeutic Approaches Using miRNA Mimics and Inhibitors -- 10.5 Techniques for miRNA Expression Analysis -- 10.6 Computational Target Gene Prediction -- 10.7 Experimental Approaches to miRNA Target Validation -- 10.8 miRNA as a Prognostic Biomarker in Ischemic Stroke -- 10.9 Circular RNA -- References -- Chapter 11: Therapeutic Aspects of Nanomedicines in Stroke Treatment -- 11.1 Introduction -- 11.2 Secondary Neuronal Damage After Stroke and BBB Breakdown -- 11.3 Existing Treatment of Stroke -- 11.4 Drug Delivery Through BBB During Stroke -- 11.5 NP-Based Drug Delivery -- 11.6 NP-Based Chemical Agents -- 11.7 A Hope: NPs as a Diagnostic Tool in Stroke -- 11.8 Composition of Nanocarrier Used in Stroke Therapy -- 11.9 Lipid Nanoparticles -- 11.10 Polymer Carriers -- 11.10.1 Inorganic-Based Nanocarriers -- 11.11 Nanocarriers-Based Thrombolytic Therapy: Preclinical Development -- 11.12 Streptokinase -- 11.13 Nanocarriers Loaded with SK -- 11.14 Urokinase (UK) -- 11.15 Urokinase-Loaded Nanocarriers -- 11.16 Tissue Plasminogen Recombinant (tPA, rtPA) -- 11.17 rtPA-Loaded Nanocarriers -- 11.18 Conclusion -- References -- Chapter 12: Neuroprotective Potential of Small Molecule Phytochemicals in Stroke Therapy -- 12.1 Introduction -- 12.2 Role of Molecular Mediators in Apoptotic, Necrotic, and Necroptotic Neuronal Cell Death. , 12.3 Impact of Neurodegeneration in Neurological Disorders Including Stroke -- 12.4 Small Molecule Bioactive Phytochemicals as Neuroprotective Agents in Ischemic Stroke -- 12.4.1 Flavonoids -- 12.4.2 Terpenoids -- 12.4.3 Alkaloids -- 12.4.4 Withanolides -- 12.5 Conclusion -- References -- Chapter 13: Post-Stroke Treatment Strategies, Management, and Rehabilitation: Where We Stand? -- 13.1 Introduction -- 13.2 Types of Stroke -- 13.3 Treatments -- 13.3.1 In hospital -- 13.3.1.1 Thrombolysis -- 13.3.1.1.1 Intravenous Thrombolytic Therapy -- 13.3.1.1.2 Intra-arterial Thrombolysis -- 13.3.1.2 Aspirin Treatment -- 13.3.1.3 Therapeutic Hypothermia -- 13.3.1.4 Blood Pressure Management -- 13.3.1.5 Antiplatelet Strategies -- 13.3.1.6 Surgery for Cerebral Edema -- 13.3.1.7 Antithrombotic Therapy -- 13.3.2 Post-discharge -- 13.3.2.1 Lifestyle Physical Activity -- 13.3.2.1.1 Smoking -- 13.3.2.1.2 Alcohol -- 13.3.2.1.3 Diet -- 13.3.2.1.4 Physical Activity -- 13.3.2.2 Blood Glucose Management -- 13.3.2.3 Cholesterol Management -- 13.3.2.4 Blood Pressure Management -- 13.3.2.5 Anticoagulation and Antiplatelet Therapy -- 13.3.2.6 Herbal Neuroprotective Intervention -- 13.4 Limitations of Treatment -- 13.5 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (694 pages)
    Edition: 1st ed.
    ISBN: 9789811625022
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1391
    DDC: 327.120971
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Decision Support System -- Recommended Model of Pollution Information Based on Collaborative Filtering Algorithm -- 1 Introduction -- 2 Calculation of the Similarity of Pollution Information -- 3 Default Prediction Complement -- 4 Obtaining the Similarity Matrix Between Users -- 5 The Solution of the Model -- 6 Analysis of Model Results -- References -- Research on the Evaluation of TCM Service Level in Various Regions of China -- 1 Introduction -- 2 Data Sources and Methods -- 2.1 Data Sources -- 2.2 Methods -- 3 Results -- 3.1 Principal Component Analysis -- 3.2 Cluster Analysis -- 4 Discussion -- 4.1 Regional Disparities in TCM Service Levels -- 4.2 The Effect of Health Services is not Commensurate with the Level of Economic Development -- References -- A Method for Evaluating Health Status of Rail Transit Signaling Equipment Based on Group Decision -- 1 Introduction -- 2 Related Work -- 3 Establishing Rules for an Evaluation System -- 3.1 Defining an Evaluation Organization -- 3.2 Defining the Evaluation Scope -- 3.3 Establishing the Weight Coefficient Vector -- 3.4 Establishing Alarm Rules to Monitor Equipment Faults -- 3.5 Setting Parameters for an Equipment Type -- 4 Implementation of an Evaluation System -- 4.1 Fault Monitoring Cycle -- 4.2 Health Evaluation Cycle -- 5 Conclusion -- References -- Intelligent Decision Support System for Precision Medicine (IDSS 4 PM) -- 1 Introduction -- 2 Theoretical Foundation-Simon's Model of Decision-Making -- 3 Intelligent Decision Support Systems (IDSSs) -- 4 Precision Medicine: An Emerging Approach in Medical Decision-Making -- 5 How Technologies Are Advancing Precision Medicine? -- 5.1 Business Analytics -- 5.2 Cognitive Computing -- 6 Theory Practice and Discussion -- 7 Characteristics of IDSS 4 PM -- 8 Conclusion. , References -- A Study of Result-Oriented Performance Appraisal-Taking Huawei as an Example -- 1 Introduction -- 2 Increasing Flexibility of Bonus Package -- 2.1 Reducing Long-Term Returns and Increasing Short-Term Returns -- 2.2 Widening the Gap and Clarifying the Hierarchy -- 2.3 Awarding the Current Contribution Immediately -- 3 Abandoning the Cumbersome Human Resource Assessment -- 3.1 Assessment by Objectives -- 3.2 Avoiding Establishing KPI Indicators in Isolation for Each Department -- 4 Taking the Responsibility and Result-Oriented Method -- 4.1 Good Performance and Good Return -- 4.2 Combination of Performance Evaluation and Reverse Evaluation -- 4.3 Eliminating Pretending Hard-Working -- 5 The Conclusion -- References -- Under a Management Perspective: Analysis of the Relationship Between Trust and Behavior Decision-Making -- 1 Introduction -- 2 Data and Measurement -- 2.1 Data Sources -- 2.2 Variable Description and Reliability Validity Test -- 3 Data Analysis and Discussion -- 3.1 The Difference of Public Trust Under Different Demographic Variables -- 3.2 The Differences in the Ways of Public Behavior Decision-Making Under Different Demographic Variables -- 3.3 The Relationship Between Trust and Behavior Decision-Making -- 4 Conclusion -- References -- Research on the Regulation of Industrial Structure in the Mid-Southern Liaoning Urban Agglomeration from the Perspective of Spatial Connection -- 1 Introduction -- 2 Research Area and Data Sources -- 2.1 Overview of the Study Area -- 2.2 Data Sources -- 3 Research Method -- 3.1 Spatial Shift-Share Model -- 3.2 Determination and Improvement of Spatial Weight -- 4 Result Analysis -- 4.1 Analysis of the Temporal and Spatial Pattern of Urban Spatial Interaction -- 4.2 Analysis of Shift Share of Industrial Structure -- 5 Conclusions -- References. , Research on the Influence Mechanism of Family-Supportive Supervisor Behaviors on Employees' Intention to Stay from the Perspective of Dual Scenario Embeddedness -- 1 Introduction -- 2 Theoretical Basis and Research Hypothesis -- 2.1 FSSB and Employees' Intention to Stay -- 2.2 The Mediating Role of Dual Scenario Embeddedness -- 2.3 The Moderating Role of Employees' Gratitude as a Trait -- 3 Study Design -- 3.1 Participants and Survey Methods -- 3.2 Variable Measurement -- 4 Research Results -- 4.1 Descriptive Statistical Analysis -- 4.2 Discrimination Validity Analysis and Common Method Test -- 4.3 Hypothesis Testing -- 5 Conclusion -- 5.1 Theoretical Contribution -- 5.2 Management Implications -- 5.3 Research Limitations and Prospects -- References -- Policy Burden, Industry Competition, and Corporate Risk-Taking -- 1 Introduction -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 Policy Burden and Corporate Risk-Taking -- 2.2 The Regulating Effect of Industry Competition -- 3 Research Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Selection and Model Design -- 4 Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Analysis of Regression Results -- 5 Endogenous Control and Robustness Test -- 5.1 Endogenous Problems -- 5.2 Robustness Analysis -- 6 Research Conclusions -- References -- Blended Teaching Mode of Tourism English Based on TPACK -- 1 Introduction -- 2 TPACK Theory -- 3 ESP and Tourism English -- 4 Research Design -- 4.1 Design Concept -- 4.2 Problem Design -- 4.3 Subjects and Teaching Contents -- 4.4 Research Steps -- 5 Experimental Conclusion -- References -- Technology and Innovation Management -- Research on Privacy Protection of Internet of Things Search Data Based on Fine-Grained Authorization -- 1 Introduction -- 2 Background Knowledge -- 2.1 Secret Search -- 2.2 Attribute-Based Encryption Scheme. , 3 System Program -- 3.1 System Architecture -- 3.2 Program Process -- 4 Safety and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Concluding Remarks -- References -- Design of Emergency Rescue Deduction System for Bus Fire Accident Based on Virtual Reality -- 1 Introduction -- 2 The Functional Requirements of Deducing System -- 3 The Design of Deduce System Architecture -- 4 Function Design of Deducing System -- 4.1 Scene Editing Module -- 4.2 Deduce Management Module -- 4.3 Client Operation Module -- 5 Composition of the Deduction System -- 6 Conclusion -- References -- Application of Game Theory in the Field of Technology Innovation -- 1 Introduction -- 2 The Application of Oligopoly Model in Technological Innovations -- 2.1 The Development of Cournot Model in Technological Innovations -- 2.2 Application and Development of Stackelberg in Technological Innovations -- 2.3 Application of Option Game Oligopoly Model in Technology Innovations -- 3 Research on Evolutionary Game Model in Technological Innovations -- 3.1 The Application of Evolutionary Game in Technological Innovations -- 3.2 The Development of Evolutionary Game Model in Technological Innovations -- 4 The Development Direction of Game Theory in Technological Innovations -- References -- Research on Innovation Mechanism of Corporate Volunteering in China -- 1 Introduction -- 2 The Concept and Connotation of Corporate Volunteering -- 3 The Status Quo of Volunteering in Chinese Enterprises -- 3.1 The Integration of Business Objectives Is Important for the Business Development Plan -- 3.2 Win the Sense of Belonging of Employees and the Identity of External Customers -- 3.3 Corporate Public Services Take from Society and Use for Society -- 3.4 Volunteering of Different Enterprises Vary Greatly -- 3.5 Long-Term Development of Volunteering Projects. , 3.6 Undertaking Government Public Service -- 4 Problems in the Development of Enterprise Volunteering in China -- 4.1 Insufficient Government Guidance -- 4.2 Information Guidance is not Strong -- 4.3 Lack of Corporate Volunteering Standards -- 4.4 Imbalance Between Long-Term and Short-Term Benefits -- 5 Development Trend of Corporate Volunteering -- 5.1 Internetization of Corporate Volunteering -- 5.2 Normalization of Corporate Volunteering -- 5.3 Diversification of Corporate Volunteering -- 5.4 Establish Self-organization of Corporate Volunteers -- 5.5 Corporate Volunteering Are Becoming More Standardized and Strict -- 6 Innovation of Corporate Volunteering Mechanism -- 6.1 Building Communication Network and Innovating Corporate Volunteering Mechanism -- 6.2 Taxation Policy -- 6.3 Expense Subsidies -- 6.4 Performance Evaluation -- 6.5 Establish a Sound Education and Training Mechanism -- 6.6 Establish a Sound Guarantee Mechanism to Protect the Volunteering of Enterprises -- References -- Research on the Differential Incentive Effect of Patent Pool on Specific Technology Learning -- 1 Research Background -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 The Impact of Patent Pool Formation on Specific Technology Learning -- 3 Research Design -- 3.1 Data and Samples -- 3.2 Variables and Their Measurement -- 4 Empirical Results and Analysis -- 4.1 Descriptive Statistical Analysis -- 4.2 Hypothesis Testing -- 5 Conclusion and Inspiration -- 5.1 Research Conclusion -- 5.2 Management Suggestions -- References -- Research on Present Situation and the Countermeasure Analysis of Football Training in University -- 1 Introduction -- 2 The Present Situation of Campus Football Training in China -- 3 Problems in the Development of Campus Football Activities in China -- 3.1 Students' Poor Awareness for Football Activities. , 3.2 Unreasonable Arrangement of Football Activities.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Mechatronics-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (892 pages)
    Edition: 1st ed.
    ISBN: 9789811502385
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1060
    DDC: 621
    Language: English
    Note: Intro -- Editorial -- Preface -- Contents -- About the Editors -- Mechatronics -- Dynamics Modeling of Active Full-Wheel Steering Vehicle Based on Simulink -- 1 Introduction -- 2 Dynamic Analysis and Modeling for Four-Wheel Steering Vehicle -- 2.1 Vehicle Coordinate System and Modeling Assumptions -- 2.2 Dynamic Differential Equations for Active Four-Wheel Steering Vehicle -- 2.3 Calculation of Normal Load of Each Wheel for 4WS Vehicle -- 2.4 Tire Model -- 3 Simulink Realization of Vehicle Dynamics Model -- 3.1 Wheel Velocity and Sideslip Angle Subsystem -- 3.2 Wheel Normal Load Subsystem -- 3.3 Tire Force Calculation Subsystem -- 3.4 Wheel Rotation Dynamics Subsystem -- 3.5 Roll Angle Calculation Subsystem -- 3.6 Body Dynamics Subsystem -- 4 Simulation Verification of Vehicle Dynamics Model -- 5 Conclusion -- References -- Modal Analysis and Dynamics Simulation of Elliptical Trainer -- 1 Introduction -- 2 Elliptical Structure and Simplification -- 3 Elliptical Trainer Simulation Analysis -- 3.1 Modal Analysis -- 3.2 Dynamics Simulation -- 4 Conclusion -- References -- Research and Design of Vehicle Simulation Subsystem of Testing Platform for CBTC System Based on Linux PowerPC -- 1 Introduction -- 2 Vehicle Simulation Subsystem -- 3 Unit Adapter -- 3.1 Hardware Platform Design -- 3.2 BSP Driver Development -- 4 Train Kinematics Simulation -- 4.1 Traction Calculation Model -- 4.2 Resistance Calculation Model -- 4.3 Braking Force Calculation Model -- 5 Implementation of Vehicle Simulation Subsystem -- 5.1 Environment Construction of Vehicle Subsystem -- 5.2 Implementation and Verification of Vehicle Subsystem -- 6 Conclusion -- References -- Analysis and Compensation of Angular Position Error in Servo Assembly -- 1 Introduction -- 1.1 Design of the High-precision Brushless Servo Assembly -- 2 Angular Position Error Analysis of the Servo Assembly. , 2.1 Analysis of Mechanical Factors Affecting Performance of Servo Assemblies -- 2.2 Shafting Error Analysis -- 3 Test Verification -- 3.1 Data Collection -- 3.2 Error Compensation Verification -- 4 Conclusion -- References -- Research on Exploratory Modeling of Combat Capability of Weapon SoS Based on Synergy -- 1 Introduction -- 2 Weapon System of Systems (SoS) -- 3 Exploratory Synergy Mechanism of Weapon SoS -- 3.1 The Characteristics of the Equipment System Synergy -- 3.2 Exploratory Synergetic Modeling of System Combat Capability -- 4 Explorative Modeling of Weapon SoS Combat Capability -- 4.1 Exploratory Construction of the Main Unit Model of the System's Combat Capability -- 4.2 Judgment Method of Relevant Relations of Operational Capability Subject Units -- 5 Conclusion -- References -- Research on Vibration Responses of Gear System with Backlash -- 1 Introduction -- 2 Mathematical Model -- 3 Numerical Simulation -- 4 Conclusion -- References -- Research on Application of CAN Bus Technology in Truck -- 1 Introduction -- 2 CAN Bus Technology Characteristics -- 3 Classification of Vehicle Networks -- 3.1 Class A Bus -- 3.2 Class B Bus -- 3.3 Class C Bus -- 4 Truck Bus Control System Network Scheme -- 5 Node Design -- 6 The Foreground and Developing Trend of Bus Technology in Automobile Network System Application -- References -- Design and Research of Calibration Method for Driving Loading Device of Single-Machine Thermal Vacuum Test System -- 1 Introduction -- 2 Overall Structure of Test System -- 3 Analysis of Calibration Principle -- 4 Design of Calibration Device for the Test System -- 4.1 Design of Support Frame -- 4.2 Installation Design of Calibration Arm -- 4.3 Design of the Loading of Weights -- 4.4 Design of Torque Calibration for Initial Position -- 4.5 Compensation Correction of Test System -- 5 Static Analysis -- 6 Conclusion. , References -- Wind Power and Hydropower Coordinated Operation Control Strategy Involving Electric Vehicles -- 1 Introduction -- 2 A Collaborative Optimal Scheduling Model for EV Charging and Wind Power and Hydropower -- 2.1 The Impact of Unordered Charging of Electric Vehicles on the Power Grid -- 2.2 Wind-EV-Hydro Control Principle -- 2.3 The Objective Function -- 2.4 The Constraint -- 2.5 Turbine Controller -- 3 The Example Analysis -- 4 Conclusions -- References -- Research on Intelligent Control System of Plate Straightening Based on Knowledge Acquisition -- 1 Introduction -- 2 Problem Solving and Analysis -- 3 Project Design of Straightening Machine Control System -- 3.1 Description and Analysis of the Method for Acquiring Shape Information -- 3.2 Analysis of Straightening Machine Intelligent Control System -- 3.3 Intelligent Control System Design -- 4 Analysis of Effect of Application of Shape Detection System -- 5 Conclusions -- References -- Numerical Simulation of Submarine Shaft-Rate Electric Field Based on COMSOL Finite Element -- 1 Introduction -- 2 Modeling of Ship in COMSOL -- 2.1 Model Simplification and Assumptions -- 2.2 Model Parameter -- 3 Simulation of Shaft-Rate Electric Field -- 3.1 Component Distribution of Electric Field -- 3.2 Electric Field Modes at Different Depths -- 4 Simulation of Different ICCP Protection Currents -- 4.1 Potential Distribution of Ship Hull Under Different ICCP Currents -- 4.2 Shaft-Rate Electric Field Under Different Cathodic Protection Currents -- 5 Conclusion -- References -- Gauss-Hermite PHD Maneuvering Multi-target Tracking Algorithm -- 1 Introduction -- 2 Probability Hypothesis Density Filter -- 2.1 Multi-target Tracking Stochastic Finite Set Theory -- 2.2 Mixed Gauss PHD -- 3 Gaussian-Hermitian PHD Algorithm Based on Interactive Multiple Models -- 3.1 Gaussian-Hermitian Filtering. , 3.2 Gaussian-Hermitian PHD Filtering Based on Interactive Multi-model -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- Research on Driving State Monitoring Based on Vehicle-Road Collaborative Wireless Positioning Technology -- 1 Introduction -- 2 The Vehicle Wireless Positioning Technology -- 3 Vehicle Wireless Positioning Principle Based on TDOA Ranging Method -- 3.1 TDOA Ranging Method -- 3.2 Vehicle Wireless Positioning Principle -- 3.3 Vehicle Motion State Monitoring Based on Vehicle-Road Coordination -- 4 Test Verification -- 5 Conclusion -- References -- Intelligent Systems -- Reliability Analysis of On-Board ATP System in Metro Based on Fuzzy Dynamic Fault Tree -- 1 Introduction -- 2 Methods and Materials -- 2.1 Analysis of Structure and Conditions of Metro ATP System -- 2.2 The Principle of Fuzzy Dynamic Fault Tree -- 2.3 Fuzzy Number Theory -- 3 Modeling and Solving of on-Board ATP System -- 3.1 Establishment of Dynamic Fault Tree Model -- 3.2 Fuzzy Calculation of Failure Rate and Maintenance Rate -- 3.3 Module Partitioning of Dynamic Fault Tree -- 3.4 Module Solution -- 3.5 Comparison and Analysis of Results -- 4 Conclusion -- References -- Image Fusion Based on Convolutional Sparse Representation with Mask Decoupling -- 1 Introduction -- 2 Convolutional BPDN Dictionary Learning with Mask Decoupling -- 3 Proposed CSRMD-Based Fusion Method -- 4 Experiments and Analysis -- 5 Conclusion -- References -- Research of the Test Algorithms of Servo System Frequency Characteristics -- 1 Introduction -- 2 Testing Sweep Signal of Servo System -- 3 Calculation of Frequency Characteristic -- 3.1 Fast Fourier Transform -- 3.2 Correlation Analysis -- 3.3 Power Spectrum Estimation -- 3.4 Least Squares Fitting -- 4 Conclusion -- References -- Utilization Factor Calculation Method Based on Adam Algorithm and Neural Network. , 1 Introduction -- 2 Model Establishment -- 2.1 Network Structure -- 2.2 Adam Optimization Algorithm -- 3 Model Training and Testing -- 3.1 Dataset -- 3.2 Model Parameters -- 3.3 Model Training and Testing -- 4 Conclusion -- References -- Demand Forecasting of Helicopter Aviation Materials Based on Multi-model Reliability Analysis -- 1 Introduction -- 2 Aviation Material Demand Forecast -- 2.1 Analysis and Forecast of High-Frequency Trouble Components -- 2.2 Analysis and Forecast of Reliability Growth Component -- 2.3 Analysis and Prediction of Basic Repairable Components -- 3 Application Example -- 3.1 Example 1 -- 3.2 Example 2 -- 4 Conclusion -- References -- A Fracture Model Established by Finite Element Simulation and Non-dominated Sorting Genetic Algorithm II for an Al Alloy -- 1 Introduction -- 2 Experiments and Methods -- 3 The Establishment of the Fracture Model -- 3.1 GTN Model -- 3.2 Determination of Model Parameters -- 4 Conclusions -- References -- Research on Fatigue-Magnetic Effect of High-Speed Train Wheelset Based on Metal Magnetic Memory -- 1 Introduction -- 2 ANSYS Fatigue Simulation and Analysis -- 2.1 Principle of Metal Magnetic Memory Detection and Fatigue Simulation Ideas -- 2.2 Boundary Conditions for Fatigue Simulation -- 2.3 Analysis Results of Fatigue Simulation -- 3 Test and Analysis -- 3.1 Acquisition of Test Data -- 3.2 Test Results and Analysis -- 4 Comparison Between Simulation and Test -- 5 Conclusions -- References -- Intelligent Manufacturing Information Security Sharing Model Based on Blockchain -- 1 Introduction -- 2 Related Works -- 3 Blockchain-Based Model for Intelligent Manufacturing -- 3.1 Architecture for Intelligent Manufacturing -- 3.2 System Model for Intelligent Manufacturing -- 3.3 Evaluation Index for Smart Manufacture -- 4 Example -- 5 Conclusion and Future Works -- References. , Research into Effects of Pearl Oyster Cultivation in Freshwater with Extensible Mind Mapping.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Data mining. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (172 pages)
    Edition: 1st ed.
    ISBN: 9789811037795
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.555
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- About the Book -- Contents -- About the Editors -- 1 Research on SaaS-Based Mine Emergency Rescue Preplan and Case Management System -- Abstract -- 1 Introduction -- 2 SaaS and Service-Oriented Architecture -- 3 The Architecture of System -- 4 The Components of System -- 5 System Implementation and Testing -- 6 Conclusion -- Acknowledgements -- References -- 2 An Investigation of Matching Approaches in Fingerprints Identification -- Abstract -- 1 Introduction -- 2 Research Method -- 2.1 Research Questions -- 2.2 Research Strategies -- 3 Fingerprints Matching Approaches -- 3.1 Taxonomy of the Study -- 3.2 Generic Process of Three Main Types of Fingerprints Matching -- 4 Current Issues of the Matching Approaches -- Acknowledgements -- References -- 3 Figure Plagiarism Detection Using Content-Based Features -- Abstract -- 1 Introduction -- 2 Content-Based Feature Extraction -- 3 Similarity Detection -- 4 Result and Evaluation -- 5 Conclusions -- Acknowledgements -- References -- 4 An Efficient Content-Based Image Retrieval (CBIR) Using GLCM for Feature Extraction -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Preprocessing Phase -- 2.2 Feature Extraction Phase -- 3 Methodology -- 4 Similarity Feature Extraction -- 5 Algorithm for GLCM -- 6 Results and Discussion -- 7 Comparative Analysis -- 8 Conclusions -- References -- 5 Emotion Recognition System Based on Facial Expressions Using SVM -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Emotion Recognition -- 3.1 Image Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Selection -- 3.4 Expression Recognition -- 3.5 Experiments Results -- 4 Conclusion -- References -- 6 An AES-CHAOS-Based Hybrid Approach to Encrypt Multiple Images -- Abstract -- 1 Introduction -- 1.1 Fast Chaotic Algorithm -- 1.2 AES Image Encryption -- 1.3 Cramer's Rule. , 2 Literature Review -- 3 Proposed Algorithm -- 4 Results -- 5 Conclusion -- References -- 7 Automatic Text Summarization of Video Lectures Using Subtitles -- Abstract -- 1 Introduction -- 2 Proposed System -- 2.1 Proposed Architecture -- 2.1.1 Data Preprocessing -- 2.1.2 Feature Selection for Summarization -- 2.1.3 Processing After Feature Selection for Summarization -- 3 Conclusion -- References -- 8 Classification of EMG Signals Using ANFIS for the Detection of Neuromuscular Disorders -- Abstract -- 1 Introduction -- 2 Proposed Model -- 2.1 Preprocessing of the EMG Signal -- 2.2 Processing or Feature Extraction of EMG Signal -- 2.3 Classification of EMG Signal -- 3 Results and Analysis -- 4 Conclusion -- References -- 9 Evaluating Similarity of Websites Using Genetic Algorithm for Web Design Reorganisation -- Abstract -- 1 Introduction -- 2 Web Mining-A Background -- 2.1 Web Mining Taxonomy -- 2.2 Web Mining Tasks -- 3 Literature Survey -- 4 Proposed Methodology -- 5 Experimental Evaluation -- 5.1 Proposed Genetic Algorithm -- 5.2 Computation of Similarity -- 6 Conclusion -- References -- 10 Fusion of Misuse Detection with Anomaly Detection Technique for Novel Hybrid Network Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Proposed Hybrid Intrusion Detection Methodology -- 2.1 Feature Preparation Module -- 2.2 Misuse Analyzer Module -- 2.3 Anomaly Analyzer Module -- 3 Simulation Results -- 4 Conclusion -- References -- 11 Analysis of Reconfigurable Fabric Architecture with Cryptographic Application Using Hashing Techniques -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Implementation of Reconfigurable Fabric -- 4 Interconnect Topologies -- 5 Operation -- 6 Results -- 6.1 Hashing Function -- 7 Conclusion -- References -- 12 Privacy Preservation of Infrequent Itemsets Mining Using GA Approach -- Abstract -- 1 Introduction. , 2 Literature Survey -- 3 Problem Definition -- 4 Proposed Framework -- 5 Proposed Algorithm -- 5.1 Illustrated Example -- 6 Result Analysis -- 7 Conclusion -- References -- 13 A Quinphone-Based Context-Dependent Acoustic Modeling for LVCSR -- Abstract -- 1 Introduction -- 2 Working of ASR -- 3 Phonetic Representation of Speech Signals -- 3.1 Modeling Using Monophones -- 3.2 Modeling Using Triphones -- 3.3 Modeling Using Quinphones -- 4 Implementation -- 4.1 Speech Data Preparation -- 4.2 Training -- 4.3 ASR Performance Analysis -- 5 Experiments -- 5.1 Testing with Varying Vocabulary Sizes -- 5.2 Testing with Varying Gaussian Mixtures -- 6 Conclusion -- References -- 14 Slot-Loaded Microstrip Antenna: A Possible Solution for Wide Banding and Attaining Low Cross-Polarization -- Abstract -- 1 Introduction -- 2 Theoretical Background -- 3 Proposed Structure -- 4 Results and Discussions -- 5 Conclusions -- Acknowledgements -- References -- 15 Fractal PKC-Based Key Management Scheme for Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 System Model -- 3.2 Fractal-based Key Pair Generation and Key Exchange -- 4 Fractal PKC-based Key Management Scheme: FPKM -- 4.1 Set-up Phase -- 4.2 Clustering Phase -- 4.3 Rekeying Phase -- 5 The Performance Evaluation of Proposed Scheme -- 6 Conclusion -- References -- 16 Histogram-Based Human Segmentation Technique for Infrared Images -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Selection of ROIs -- 2.2 Human Candidates Segmentation -- 3 Experiment Results -- 4 Conclusion -- References -- 17 Medical Image Segmentation Based on Beta Mixture Distribution for Effective Identification of Lesions -- Abstract -- 1 Introduction -- 2 Probability Distribution Functions of Beta Mixture Model Using the EM Algorithm -- 3 Clustering Algorithm Based on Fuzzy c-Means. , 4 Dataset -- 5 Segmentation Algorithm -- 5.1 Experimentation -- 6 Results Derived and Performance Analysis -- 7 Conclusion -- References -- 18 Toward Segmentation of Images Based on Non-Normal Mixture Models Based on Bivariate Skew Distribution -- Abstract -- 1 Introduction -- 2 Bivariate Skew Gaussian Mixture Model -- 3 k-Means Algorithm -- 4 Data Set Considered -- 5 Feature Selection -- 6 Experiment Result and Performance Evolution -- 7 Conclusion -- References -- 19 Development of Video Surveillance System in All-Black Environment Based on Infrared Laser Light -- Abstract -- 1 Introduction -- 2 Design of Video Capture System -- 2.1 IR Laser Aiding Light Module -- 2.2 Photoelectric Sensor Module -- 2.3 Central Control Module -- 3 System Testing -- 4 Conclusion -- Acknowledgements -- References -- 20 Data Preprocessing Techniques for Research Performance Analysis -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Business Intelligence -- 2.2 Data Preprocessing -- 3 Research Performance Analysis -- 3.1 Data Preprocessing Approach -- 4 Conclusion -- Acknowledgements -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (834 pages)
    Edition: 1st ed.
    ISBN: 9789811559716
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.194
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Intelligent and Cloud Computing -- M-Throttled: Dynamic Load Balancing Algorithm for Cloud Computing -- 1 Introduction -- 2 Literature Survey -- 3 Existing Algorithms -- 3.1 Throttled Load Balancing -- 3.2 Round-Robin Load Balancing -- 3.3 SJF Load Balancing -- 4 Proposed Algorithm: M-throttled -- 5 Implementation -- 6 Conclusion -- References -- iGateLink: A Gateway Library for Linking IoT, Edge, Fog, and Cloud Computing Environments -- 1 Introduction -- 2 Related Work -- 3 System Model and Architecture -- 3.1 Implementation Details -- 4 Case Studies -- 5 Conclusions and Future Work -- References -- Hetero Leach: Leach Protocol with Heterogeneous Energy Constraint -- 1 Introduction -- 2 Routing Algorithm -- 2.1 LEACH -- 2.2 Hetero Leach -- 3 Simulation and Result -- 4 Conclusion -- References -- A Semantic Matchmaking Technique for Cloud Service Discovery and Selection Using Ontology Based on Service-Oriented Architecture -- 1 Introduction -- 2 Service-Oriented Computing -- 2.1 Service-Oriented Architecture -- 3 Proposed Model -- 3.1 Client Request -- 3.2 Cloud Service Discovery -- 3.3 Cloud Service Selection -- 3.4 Cloud Ontology Triple Store -- 4 Proposed Matchmaking Technique -- 5 Conclusion and Future Work -- References -- An Intelligent Approach to Detect Cracks on a Surface in an Image -- 1 Introduction -- 2 Literature Review -- 3 Min-Max Gray Level Discrimination Method -- 4 Proposed Model for Crack Detection -- 5 Conclusion -- References -- A Study of Machine Learning Techniques in Short Term Load Forecasting Using ANN -- 1 Introduction -- 2 ANN in STLF -- 2.1 Multilayer Perceptron Network (MLP) -- 2.2 Learning -- 2.3 Generalization -- 2.4 MLP Organizes in Burden Estimating -- 3 Proposed Work -- 3.1 Back Propagation (BP) by ANN -- 3.2 Fuzzy Logic by ANN. , 3.3 Hereditary Calculation (HC) by ANN -- 3.4 Particle Swarm Optimization (PSO) by ANN -- 4 Conclusion -- References -- A Review for the Development of ANN Based Solar Radiation Estimation Models -- 1 Introduction -- 2 Basics of Artificial Neural Network (ANN) -- 3 ANN for Solar Radiation Estimation -- 4 Review of Global Radiation Estimation Using ANN -- 5 Comparative Study of All the Models -- 6 Identified Research Gap in Solar Radiation Estimation -- 7 Conclusion -- References -- Analysis and Study of Solar Radiation Using Artificial Neural Networks -- 1 Introduction -- 2 ANN Fundamentals -- 2.1 What is ANN? -- 2.2 Nodal Configuration -- 2.3 ANN Types -- 2.4 Learning Stuff -- 3 ANN Working Principle and Architecture -- 3.1 Introduction -- 4 Applications, Advantages, and Disadvantages -- 4.1 Applications -- 4.2 Advantages -- 4.3 Disadvantages -- 5 Methodology -- 5.1 ANN for Predicting Solar Radiation -- 5.2 Data Considered -- 5.3 Operating Stages -- 5.4 Performance -- 6 Comparison Between ANN-Based and Existing Modeling -- 7 Conclusion -- References -- A Scheme to Enhance the Security and Efficiency of MQTT Protocol -- 1 Introduction -- 2 Literature Review -- 2.1 Security Requirements of IoT -- 2.2 Privacy Concerns in IoT -- 2.3 MQ Telemetry Transport (MQTT) -- 2.4 Architecture of MQTT -- 2.5 MQTT Quality of Service -- 2.6 Security Issues with MQTT -- 2.7 Hash Functions and Digital Signatures -- 2.8 Channel Encryption -- 2.9 Summary of Findings -- 2.10 Problem Statement -- 3 Proposed Scheme -- 3.1 Registration Process -- 4 Result and Discussions -- 5 Conclusions -- References -- Software Fault Prediction Using Random Forests -- 1 Introduction -- 1.1 Random Forests (RF) -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Evaluation Criteria -- 4 Implementation and Results -- 5 Conclusion -- References. , A Power Optimization Technique for WSN with the Help of Hybrid Meta-heuristic Algorithm Targeting Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution Methodology -- 3.1 Design Efficient WSN Nodes -- 3.2 Clusterization of the Target Area -- 3.3 Deployment of WSN Nodes Using Spiral Pattern WSN Node Deployment Policy -- 4 Numerical Result Analysis -- 5 Conclusion and Future Work -- References -- A Model for Probabilistic Prediction of Paddy Crop Disease Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Paddy Crop Disease Classification -- 3.1 Brown Spot -- 3.2 Bacterial Leaf Blight -- 3.3 Leaf Smut -- 4 Implementation of the Model -- 4.1 Image Generation and Augmentation -- 4.2 Convolution Steps -- 4.3 Pooling Step -- 4.4 Fully Connected Layers -- 4.5 Disease Prediction -- 4.6 Process Flow Model -- 5 Algorithm of the Model -- 6 Experimental Results -- 7 Conclusions and Future Work -- References -- A Hybridized ELM-Elitism-Based Self-Adaptive Multi-Population Jaya Model for Currency Forecasting -- 1 Introduction -- 2 Methodology Adopted -- 2.1 ELM -- 2.2 Jaya -- 3 Dataset Description -- 4 Experimental Analysis -- 4.1 Abstract View of the Proposed Model -- 4.2 Proposed ELM-ESAMPJ Algorithm for Exchange Rate Analysis -- 4.3 Result Analysis -- 5 Discussions -- 6 Conclusion and Future Work -- References -- A Fruit Fly Optimization-Based Extreme Learning Machine for Biomedical Data Classification -- 1 Introduction -- 2 Machine Learning Techniques for Biomedical Data Classification -- 2.1 Extreme Learning Machine (ELM) -- 2.2 Fruit Fly Optimization (FFO) -- 2.3 The Proposed FFO-ELM Models -- 3 Result and Discussion -- 3.1 Data Description -- 3.2 Performance Evaluation -- 3.3 Result Analysis -- 4 Conclusion -- References -- Partial Reconfiguration Feature in Crypto Algorithm for Cloud Application. , 1 Introduction -- 2 Generations of Crypto Core -- 3 State of the Art -- 4 Architecture and Implementation -- 4.1 Low Processing Platform (LP) -- 4.2 Fog -- 4.3 Cloud -- 5 Conclusion -- References -- Proactive Content Caching for Streaming over Information-Centric Network -- 1 Introduction -- 2 System Model -- 3 Proposed Solution -- 3.1 Content Store (CS) -- 3.2 Ant Colony Process -- 4 Experimental Results -- 5 Conclusion -- References -- Performance Analysis of ERWCA-Based FLANN Model for Exchange Rate Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 FLANN Model -- 2.2 Evaporation Rate-Based Water Cycle Algorithm (ERWCA) -- 2.3 FLANN/ERWCA Model -- 3 Simulation Study -- 4 Conclusion -- References -- Multi-document Summarization Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experiment and Results Analysis -- 5 Conclusion -- References -- A Convolutional Neural Network Framework for Brain Tumor Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Input Image -- 3.2 Convolution Layer -- 3.3 Pooling Layer -- 3.4 Fully Connected Layer -- 3.5 Output Layer -- 4 Experimental Setup and Results -- 4.1 Dataset Description -- 4.2 Initial Kernel Weights -- 4.3 Activation Function -- 4.4 Loss Function Computation -- 4.5 Training -- 4.6 Model Parameters -- 4.7 Simulation Results -- 5 Conclusion -- References -- Load Balancing in Cloud Computing Environment Using CloudSim -- 1 Introduction -- 2 Related Work -- 3 Objective of Load Balancing in Cloud Computing -- 4 Necessity of Load Balancing -- 5 Verification of Load Balancing Using Cloud Simulator -- 5.1 Various Features of CloudSim Tool -- 5.2 Primary Elements of CloudSim Tool -- 5.3 Algorithm Utilized in CloudSim Tool for Load Balancing -- 6 Experimental Results -- 7 Conclusion -- References. , Assessment of Load in Cloud Computing Environment Using C-means Clustering Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Resource Allocation -- 3.2 Algorithm -- 4 Result Analysis -- 5 Conclusion -- References -- Parallel Implementation of Algebraic Curve for Data Security in Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Explicit Addition Formulation -- 4 Implementation -- 4.1 Sequential Implementation Methodology -- 4.2 Parallel Implementation Methodology -- 5 Experimental Results and Analysis -- 5.1 Sequential Implementation of Elliptic Curve Addition -- 5.2 Sequential Implementation of Hyperelliptic Curve Addition -- 5.3 Parallel Implementation of Hyperelliptic Curve Addition -- 6 Performance Comparison of Sequential and Parallel Implementation -- 7 Conclusion -- References -- A Design Towards an Energy-Efficient and Lightweight Data Security Model in Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Proposed Approach and Related Discussions -- 4.1 Lightweight Authentication Using CA Based Scheme -- 4.2 Lightweight Cryptography Using CA Based Scheme -- 5 Conclusions and Future Work -- References -- Fuzzification-Based Routing Protocol for Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- Fuzzy-Based Strategy Management in Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- A TWV Classifier Ensemble Framework -- 1 Introduction -- 2 Proposed TWV Classifier Ensemble -- 3 Experimental Setup and Result Analysis -- 4 Conclusion -- References -- Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based Devices. , 1 Introduction to Continuous Authentication (CA).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1040 pages)
    Edition: 1st ed.
    ISBN: 9789811394065
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1006
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Intelligent Computing -- 1 Global Stability of a Viral Dynamical Model -- Abstract -- 1 Introduction -- 2 Model -- 3 The Existence of Equilibria -- 4 The Global Stability of Equilibria -- Acknowledgements -- References -- 2 Research on Construction of the Software Technology Profession in Vocational Institutes Based on the External Vision -- Abstract -- 1 Introduction -- 2 Professional Construction Ideas Based on the External Vision -- 3 Versatile Teaching Team Construction Based on the Strengths of Teachers -- 4 Social Service Ability Construction Based on Demands of Social Markets -- 5 Construction of School Training Bases Integrated Into Occupation Job Elements and the Construction of the Public Off-Campus Training Bases -- Acknowledgements -- References -- 3 Numerical Study on the Expanded Mixed Covolume Method for One-Dimensional Sobolev Equation -- Abstract -- 1 The Expanded Mixed Covolume Method -- 1.1 The Semi-discrete Scheme -- 1.2 The Fully Discrete Scheme -- 2 Numerical Invariants -- 2.1 A Single Solitary Wave -- 2.2 Interaction of Two Solitary Waves -- References -- 4 Research on the Control Method of Coal Sample Blanking Based on the BP Neural Network and the PID Algorithm -- Abstract -- 1 Introduction -- 2 Control Method of Coal Sample Blanking Based on the BP Neural Network and the PID Algorithm -- 2.1 PID Control Algorithm -- 2.2 BP Neural Network Algorithm -- 3 Experimental Verification -- Acknowledgements -- References -- 5 A Practice on Neural Machine Translation from Indonesian to Chinese -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Lore Translator -- 4 Experiments -- 4.1 Corpus -- 4.2 Training -- 4.3 Experimental Results and Discussion -- 4.4 Demo System -- 5 Conclusion -- Acknowledgements -- References. , 6 Keyword-Based Indonesian Text Summarization -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 The Development of Automatic Summarization -- 2.2 Existing Systems -- 3 Keyword Contribution Method -- 3.1 Overall Architecture -- 3.2 Algorithm -- 4 Experiment -- 5 Conclusion -- Acknowledgements -- References -- 7 Automatic Decision Support for Public Opinion Governance of Urban Public Events -- Abstract -- 1 Introduction -- 2 Implementation -- 2.1 Data Collection Layer -- 2.2 Information Analysis Layer -- 2.3 Public Opinion Government Layer -- 3 Conclusion -- Acknowledgements -- References -- 8 Improved Local Morphology Fitting Active Contour with Weighted Data Term for Vessel Segmentation -- Abstract -- 1 Introduction -- 2 Related Local Region-Based Models -- 3 Proposed Method -- 4 Results -- 5 Conclusion -- References -- 9 3D Point Cloud Data Splicing Algorithm Based on Feature Corner Model -- Abstract -- 1 Introduction -- 2 3D Point Cloud Data Splicing Algorithm Based on Feature Corner Model -- 2.1 Model Innovation and Data Mining -- 2.2 The Overall Structure of the System -- 2.3 Point Cloud Data Splicing Algorithm -- 3 Conclusion -- Acknowledgements -- References -- 10 A Preliminary Study on Mobile Learning -- Abstract -- 1 The Concept, Characteristics, and Composition of Mobile Learning -- 2 The Feasibility of Mobile Learning -- 2.1 The Characteristics of Mobile Learning -- 2.2 The Inherent Advantages of the Network Environment -- 2.3 The Needs of Professional Construction -- 3 Potential Problems and Solutions in Mobile Learning -- 4 Conclusion -- References -- 11 Design and Implementation of Real-Time Inquiry System of the Stock Market -- Abstract -- 1 Introduction -- 2 Relative Technologies -- 2.1 Hadoop -- 2.2 HBase -- 3 Requirement Analysis and Design -- 3.1 System Function Analysis -- 3.2 Overall Design of the System. , 3.3 Database Design -- 4 Implementation of the Key Modules of the System -- 4.1 The Real-Time Prompt Module of Fuzzy Query of Stock Information -- 4.2 News Information Module -- 4.3 Query Module of Large Quantities of Historical Data -- 5 Conclusion -- Acknowledgements -- References -- 12 An Improved Feature Selection Algorithm for Fault Level Identification -- Abstract -- 1 Introduction -- 2 Basic Concepts of Ordinal Classification -- 3 Feature Selection Algorithm for Ordinal Classification -- 4 Feature Selection and Classification Results -- 5 Conclusions -- Acknowledgements -- References -- 13 Computing Model of Musical Multiple Perception Based on Memory Mapping Perception Inversion -- Abstract -- 1 Introduction -- 2 Fuzzy Perception of Music -- 2.1 Fuzziness of Music -- 2.2 Memory Mapping and Perception Inversion (MMPI) -- 3 Music Intelligence Based on Fuzzy Perception -- 3.1 Musical Feature Index -- 3.2 The Basic Type of Music Perception -- 4 Experimental Results -- 5 Conclusions -- Acknowledgements -- References -- 14 A Natural Immersive Closed-Loop Interaction Method for Human-Robot "Rock-Paper-Scissors" Game -- Abstract -- 1 Introduction -- 2 System Description -- 2.1 The Natural Interaction Implementation -- 2.2 The Real-Time Performance Implementation -- 2.3 The Immersion Mode Implementation -- 3 The Closed-Loop Characteristics -- 4 System Testing and Evaluation -- 5 Conclusion -- References -- 15 Capsule Network-Based Facial Expression Recognition Method for a Humanoid Robot -- Abstract -- 1 Introduction -- 2 Advantages and Properties of the Capsule Net -- 2.1 The Differences -- 2.2 The Properties of the Capsule Net -- 3 CK+ Dataset and NAO Robot Experiments -- 3.1 CK+ Dataset -- 3.2 NAO Robot -- 3.3 Experiments -- 4 Conclusions -- Acknowledgements -- References. , 16 Equipment Maintenance Mode Decision Based on Fuzzy Multi-attribute Decision Method -- Abstract -- 1 Introduction -- 2 Fuzzy Multi-attribute Decision Model -- 3 Fuzzy Multi-attribute Decision Process -- 4 Fuzzy Multi-attribute Decision Method -- 5 Example Analysis -- 6 Conclusion -- References -- 17 A Method for Facial Kinship Verification Based on Deep Learning -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Channel Backbone Network -- 2.2 Multi-channel Model -- 2.2.1 Binary-Channel Model -- 2.2.2 Elastic Multi-channel Model -- 2.3 Training -- 3 Experiments and Results -- 4 Conclusion -- Acknowledgements -- References -- 18 A Domain-Adapting Word Representation Method for Word Clustering -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Frequently Co-occurring Entropy -- 3.2 Fuzzy Bag-of-Words Model -- 4 Experimental Results -- 5 Conclusion -- Acknowledgments -- References -- 19 Fitting Complex Nonlinear Function with Belief Rule Base -- Abstract -- 1 Introduction -- 1.1 The Basic BRB Model -- 1.2 BRB Inference Using ER Approach -- 2 Constructing BRB Model for Nonlinear Function -- 2.1 Nonlinear Function -- 2.2 Transformation Techniques for Quantitative Data -- 3 Parameter Training for BRB -- 4 Experiments Study -- 5 Conclusion -- References -- 20 Approximate Kernel Regression Based on Distributed ADMM Algorithm -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Kernel Regression -- 2.2 ADMM Algorithm -- 2.3 Kernel Regression Based on ADMM Algorithm -- 2.4 Approximate Kernel Matrix -- 3 Experiments -- 4 Conclusion -- Acknowledgements -- References -- 21 Detection for Mixed-Characters Based on Machine Learning -- Abstract -- 1 Introduction -- 2 The Composition of the Detection System -- 3 Character Preprocessing -- 3.1 Binarization -- 3.2 Character Segmentation -- 3.3 The Character Normalization -- 4 Data Set Production. , 5 Neural Network Design -- 6 Experimental Results and Analysis -- 7 Conclusion -- References -- 22 Research on 3D Terminal Rendering Technology Based on Power Equipment Business Features -- Abstract -- 1 Introduction -- 2 3D Model High-Speed Rendering Technology -- 3 3D Model Real-Time High-Speed Rendering Technology for Terminal and Grid Business Application Requirements -- 3.1 Scene Organization -- 3.2 Rendering Process -- 3.3 3D Engine Cross-Platform Technology -- 4 Conclusions -- Acknowledgements -- References -- 23 Community Detection Based on Improved Bee Evolutionary Genetic Algorithm -- Abstract -- 1 Introduction -- 2 Algorithm Structure and Algorithm Description -- 3 Improved Bee Evolutionary Genetic Algorithm -- 3.1 Fitness Function -- 3.2 Encoding -- 3.3 Population Initialization -- 3.4 Crossover Operator -- 3.5 Mutation Operator -- 3.6 Selection Operator -- 3.7 Optimization of Random Population Size -- 4 Simulation and Analysis -- 4.1 Community Detection of the LFR Benchmark Network -- 4.2 Community Detection of the Karate Club Network -- 4.3 Community Detection of the dolphin Network -- 5 Conclusion -- Acknowledgments -- References -- 24 Named Entity Recognition for Chinese Management Case Texts -- Abstract -- 1 Introduction -- 2 Semi-supervised Learning Method -- 2.1 Bootstrapped Framework -- 2.2 BI-LSTM-CRF Model -- 2.3 Evaluating Rule -- 3 Experiment -- 3.1 Dataset -- 3.2 Results and Analysis -- 4 Conclusion and Discussion -- Acknowledgements -- References -- 25 Application of Virtual Simulation Platform in Basic Medical Teaching -- Abstract -- 1 Introduction -- 2 Significance of Basic Medical Virtual Simulation Experimental Platform -- 2.1 Reduce the Cost of Experiment -- 2.2 Provide an Open Experimental Environment -- 2.3 Enhance Classroom Fun -- 3 Construction of Basic Medical Virtual Simulation Platform. , 3.1 Functionality Virtual Simulation Experiment Platform.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (398 pages)
    Edition: 1st ed.
    ISBN: 9789811393303
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1005
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Data Science and Analytics -- Quality Index Evaluation Model Based on Index Screening Model -- 1 Introduction -- 2 Three-Parameter Interval Principal Component Analysis -- 2.1 Principal Component Analysis -- 2.2 Calculation Steps -- 2.3 M-PCA Three-Parameter Interval Principal Component Analysis -- 2.4 Calculation Steps -- 2.5 The Determination of Subjective Index Weight Based on Analytic Hierarchy Process -- 2.6 Index Evaluation -- 3 Analysis of Examples -- 4 Conclusion -- References -- Selection of Software Development Methodologies (SDMs) Using Bayesian Analysis -- 1 Introduction -- 2 Proposed Work -- 3 Proposed Model -- 3.1 Experimental Result -- 4 Conclusion -- 5 Future Scope -- References -- Role of Social Media in Employer Branding-A Study on Selected Engineering Colleges (Private) in Bhubaneswar -- 1 Introduction -- 2 Objective -- 3 Methodology -- 4 Literature Review -- 4.1 Employer Branding -- 5 Cases of Private Institute -- 5.1 Case 1: Institute of Technical Education and Research, SOA University, Bhubaneswar -- 5.2 Case 2: Centurion University of Technology and Management (CUTM), Bhubaneswar -- 5.3 Case 3: Silicon Institute of Technology -- 5.4 Case 4: Gandhi Engineering College (GEC) Bhubaneswar -- 5.5 Case 5: Hi-Tech Institute of Technology (HIT), Bhubaneswar -- 6 Conclusion of the Study -- References -- A Novel Approach for Artifact Removal from Brain Signal -- 1 Introduction -- 2 Overview of Proposed Method -- 2.1 Kurtosis -- 2.2 Multiscale Entropy (MSE) -- 2.3 Artifact Channel Identification -- 2.4 Artifact Denoising -- 3 Results and Discussion -- 4 Conclusion -- References -- A Novel Approach to Heterogeneous Multi-class SVM Classification -- 1 Introduction -- 2 Literature Review -- 3 Classification Problem -- 4 Proposed Novel Approach for Heterogeneous Data. , 5 Experimental Results -- 6 Conclusion -- References -- An Empirical Study of Big Data: Opportunities, Challenges and Technologies -- 1 Introduction -- 2 Importance of Big Data -- 2.1 Importance to National Development -- 2.2 Importance to Industrialized Upgrades -- 2.3 Importance to Technical Research -- 2.4 Importance to Interdisciplinary Research -- 2.5 Importance to Better Predict the Future -- 3 Big Data Characteristics -- 3.1 Volume -- 3.2 Velocity -- 3.3 Variety -- 3.4 Veracity -- 3.5 Validity -- 3.6 Volatility -- 3.7 Value -- 4 Hadoop: Way to Process Big Data -- 4.1 Hadoop Distributed File System -- 4.2 MapReduce -- 5 Challenges of Big Data -- 5.1 Data Challenges -- 5.2 Processing Challenges -- 5.3 Management Challenges -- 6 Big Data Techniques -- 7 Big Data Hadoop-Based Tools -- 7.1 Apache Hadoop -- 7.2 Apache Mahout -- 7.3 Storm -- 7.4 S4 -- 7.5 Apache Kafka -- 8 Conclusion -- References -- Forecasting World Petroleum Fuel Crisis by Nonlinear Autoregressive Network -- 1 Introduction -- 2 Data Sources -- 3 Methodology -- 3.1 Time Series Prediction Using Artificial Neural Network (ANN) -- 3.2 Comparisons of General Prediction Models -- 3.3 Predictive Model Flow Control Diagram -- 3.4 Predictive Model Structure -- 4 Performance Measurement -- 5 Result and Analysis -- 6 Comparison and Discussion -- 7 Hypothesis Testing -- 8 Conclusion -- References -- Stock Market Price Prediction Employing Artificial Neural Network Optimized by Gray Wolf Optimization -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Dataset -- 3.2 Normalization -- 3.3 Artificial Neural Network -- 3.4 Gray Wolf Optimization -- 4 Proposed Approach -- 5 Experimental Setup and Simulation Result -- 6 Conclusion -- References -- Analysis of Techniques for Credit Card Fraud Detection: A Data Mining Perspective -- 1 Introduction -- 2 Literature Review. , 2.1 Dataset Collection -- 2.2 Various Methodology of Fraud Detection in Credit Card -- 3 Challenges in Credit Card Fraud Detection -- 4 Conclusion -- References -- Predictive Analytics for Weather Forecasting Using Back Propagation and Resilient Back Propagation Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Supervised Learning Algorithms -- 4 Artificial Neural Network -- 4.1 Back Propagation Algorithm -- 4.2 Resilient Back Propagation -- 5 Results and Discussion -- 5.1 Backprop and Rprop Implemented in RStudio -- 5.2 Receiver Operating Characteristic Curve (ROC) and Area Under Curve (AUC) -- 5.3 ggplot -- 6 Conclusion -- Appendix -- References -- Analysis of the Leadership of Undergraduate Freshmen in Military Schools from the Perspective of Space -- 1 Introduction -- 2 Research Methods -- 2.1 Research Tools -- 2.2 Research Procedures -- 3 The Results Analysis -- 3.1 Reliability and Validity Test -- 3.2 Overall Analysis of Leadership -- 3.3 Analysis of the Correlation Between Leadership and Per Capita Income -- 3.4 Analysis of the Correlation Between Leadership and Per Capita Income -- 4 Result Analysis -- 5 Concluding Remarks -- References -- Correlation Analysis for CSI300 Index Return and Realized Volatility -- 1 Introduction -- 2 Model Construction -- 2.1 Model Realized Estimate -- 2.2 Edge Distribution Model Construction -- 2.3 Construction of Time Change D-Vine Copula -- 3 Empirical Analysis -- 3.1 Characteristic Analysis -- 3.2 Parameter Estimation -- 3.3 Parameter Estimation for Continuous-Time Volatility and the Jump Volatility Models -- 3.4 Correlation Analysis -- 4 Conclusion -- References -- Prescription Basket Analysis: Identifying Association Rule Among Drugs in Prescription of Dentist in Bhubaneswar City -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 4 Conclusion -- References. , Decision Science and Management -- Impact of Decision Science on e-Governance: A Study on Odisha Land Records System -- 1 Introduction -- 1.1 e-Governance -- 1.2 Odisha Right to Public Services Act -- 2 Literature Review -- 2.1 Brainstorming -- 2.2 Committee Meetings -- 2.3 Delphi -- 2.4 Electronic Meeting -- 2.5 Survey -- 2.6 Decision Tree and Decision Tables -- 2.7 Game Theory -- 2.8 Simulation -- 3 Decision Science for e-Governance -- 3.1 Risk Analysis -- 3.2 Decision Analysis -- 3.3 Cost-Effectiveness Analysis -- 4 Key Findings of the Paper -- 5 Conclusion -- References -- HR Value Proposition Using Predictive Analytics: An Overview -- 1 Introduction -- 2 Data Analytics -- 2.1 Descriptive Analytics -- 2.2 Predictive Analytics -- 2.3 Prescriptive Analytics -- 3 Literature Review -- 3.1 HR Analytics -- 4 Findings and Discussion -- 4.1 Importance of Analytics in HR -- 5 Conclusions -- 6 Originality -- 7 Declaration -- References -- Determination of Time-Dependent Quadratic Demand by Using Optimal Ordering Policy, Salvage Value Under Partial Backlogging, Time-Proportional Deterioration, Time-Varying Holding Cost -- 1 Introduction -- 2 Assumptions -- 3 Modeling -- 3.1 Notations -- 3.2 Mathematical Formulation -- 4 Numerical Examples -- 5 Sensitivity Analysis -- 6 Conclusions -- References -- Inventory Control for Materials Management Functions-A Conceptual Study -- 1 Introduction -- 2 Review of the Literature -- 2.1 Inventory Management -- 2.2 Material Management -- 3 Conclusion -- References -- ACO-Based Secure Routing Protocols in MANETs -- 1 Introduction -- 2 Ant Colony Optimization -- 3 Security Aware ACO Routing Protocols -- 3.1 Secure Antnet Routing Algorithm for Scalable Ad Hoc Networks Using Elliptic Curve Cryptography -- 3.2 Secure Power Aware Ant Routing Algorithm -- 3.3 Swarm-Based Detection and Defence Technique. , 3.4 Detection and Prevention of Blackhole Attack in MANET Using ACO Routing -- 3.5 Autonomous Bio-inspired Public Key Management Protocol -- 3.6 ANT-Based Trustworthy Routing -- 3.7 Pair-Wise Key Agreement and Hop-by-Hop Authentication Protocol -- 4 Comparison and Analysis of Security Aware ACO Routing Protocols -- 5 Conclusion and Future Work -- References -- An Approach Toward Integration of Big Data into Decision Making Process -- 1 Introduction -- 2 Background -- 3 Challenges During Big Data Analytics for Decision Making -- 4 Integrated Framework of Big Data Analytics with Decision Making Process -- 4.1 Proposed Approach -- 5 Conclusion and Future Aspects -- References -- Big Data Analysis and Classification of Biomedical Signal Using Random Forest Algorithm -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of the Signal -- 4 Feature Extraction -- 5 Random Forest -- 6 Classification Result -- 7 Conclusion -- References -- An Intelligent Framework for Analysing Terrorism Actions Using Cloud -- 1 Introduction -- 2 Motivation -- 3 Objective -- 4 Literature Review -- 5 Comparison of Models -- 6 Conclusion -- References -- Research on Optimization of J Company Warehouse Storage Process -- 1 Introduction -- 2 Analysis on the Current Situation of J Company -- 2.1 Warehouse Storage Process -- 2.2 Problems with Warehouse Storage Process -- 3 Optimized Warehouse Storage Process -- 4 Petri Net Model -- 5 Conclusion -- References -- The Influence of Psychological Contract on the Willingness to Share Tacit Knowledge -- 1 Introduction -- 2 Psychological Contract -- 2.1 Knowledge Sharing -- 2.2 Hypothesis -- 3 Method -- 3.1 Measurement Tools -- 4 Result -- 5 Hypothesis Testing -- 6 Discussion -- 7 Limitations and Future Research -- References -- Research on the Role of Government Management in Chinese Public Indemnificatory Housing System. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Mechatronics-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (604 pages)
    Edition: 1st ed.
    ISBN: 9789811618437
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1220
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Mechatronics -- 1 Simulation of Off-Wheel Problem of Triangle Tracked Vehicle Based on RecurDyn -- Abstract -- 1 Introduction -- 2 Structure and Relevant Technical Parameters of Triangular Track -- 3 Simulation Test -- 3.1 Virtual Prototype Modeling -- 3.2 Simulation Test on off-Wheel Problem of Track -- 3.3 Simulation Test on Vehicle S Bend -- 4 Conclusion -- References -- 2 Brief Design Requirements of Screen Printing Stencil -- Abstract -- 1 Introduction -- 2 Stencil Design -- 2.1 Frame Design of Circuit Board Stencil -- 2.2 Design of Stencil Tension Net -- 2.3 Mark Point Design of Stencil -- 2.4 Aperture Design of Stencil -- 2.5 Thickness Design of Stencil -- 3 Requirements for Opening Size and Shape of Stencil -- 3.1 Chip Components-Resistors, Inductors, Capacitors -- 3.2 Power MOSFET -- 3.3 QFP, SOP, QFN, IC -- 3.4 BGA -- 4 Conclusion -- References -- 3 Review of Improved Collaborative Filtering Recommendation Algorithms -- Abstract -- 1 Introduction -- 2 Overview of Traditional Collaborative Filtering Algorithms -- 2.1 User-Based Collaborative Filtering Recommendation Algorithm -- 2.2 Item-Based Collaborative Filtering Recommendation Algorithm -- 2.3 Model-Based Collaborative Filtering Recommendation Algorithm -- 3 Improvement and Application of Collaborative Filtering Algorithm -- 3.1 The New Theory Is Introduced into Collaborative Filtering -- 3.2 Data Dynamic Analysis Combined with Collaborative Filtering -- 3.3 Combination of Data Rule Mining and Collaborative Filtering -- 4 Conclusion -- References -- 4 A Preliminary Study on the Application of Computer Technology in Physical Education -- Abstract -- 1 Introduction -- 2 Design of Instructional Model of Autonomous Physical Education Based on Computer Technology -- 2.1 Part Before Class -- 2.2 Part in Class -- 2.3 Part After Class. , 3 Application Analysis of Physical Education Teaching Model Based on Computer Technology -- 3.1 Experimental Subject -- 3.2 Experimental Procedure -- 3.3 Experimental Method -- 3.4 Experimental Result -- 4 Conclusion -- References -- Intelligent Systems -- 5 Design of Archives Management System for Teaching -- Abstract -- 1 Introduction -- 2 Requirement Analysis of System and Database Design -- 2.1 Requirement Analysis -- 2.2 System Functional Structure Design -- 2.3 Database Design -- 3 System Function Realization -- 3.1 Login Module Design -- 3.2 Registration Module Design -- 4 System Test and Operation Result Analysis -- 5 Conclusion -- Acknowledgements -- References -- 6 An Algorithm for Distinguishing Between Speech and Music -- Abstract -- 1 Introduction -- 2 Audio-Related Features -- 3 Algorithm Steps -- 4 Experimental Result -- 5 Summary -- Acknowledgements -- References -- 7 Research on Multiple Overlapping Speakers Number Recognition Based on X-Vector -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 X-Vector -- 2.2 Data Preprocessing -- 2.3 Improving of Feature Extraction -- 3 Experimental Results -- 4 Conclusions -- References -- 8 Discussion on Production Technology and Testing Technology of 1553B Bus Cable Net for Satellite -- Abstract -- 1 Introduction -- 2 Composition of 1553B Bus Cable -- 2.1 1553B Cable Structure -- 2.2 Composition of 1553B Bus Cable -- 3 1553B Bus Cable Network Assembly Process -- 4 1553B Bus Cable Network Installation Quality Test -- 4.1 Bus Cable Net Appearance Inspection -- 4.2 1553B Bus Cable Network Static Performance Test -- 4.3 1553B Bus Cable Network Dynamic Performance Test -- 5 Conclusion -- References -- 9 Feasibility Analysis of Venture Capital Committee in the Innovative Design of Class Management in Colleges and Universities -- Abstract -- 1 Introduction. , 2 Major Pain Points of Class Management in Colleges and Universities -- 2.1 Different Opinions About Head Teacher's Impact on Class -- 2.2 Weak Initiative of Class Cadre -- 2.3 A General Lack of Class Fee -- 2.4 Little Contact with Classes After Graduation -- 3 Pain Points Analysis of Class Management in Colleges and Universities -- 3.1 Urgent Need of System Construction Innovation -- 3.2 Difference in Value Proposition -- 3.3 Foundation -- 3.4 Repulsion and Practical Difficulties -- 4 Innovative Design of Class Management in Colleges and Universities -- 4.1 Description of Class Management Tools -- 4.2 The Feasibility Analysis of Innovative Design -- 5 Conclusions -- Acknowledgements -- References -- 10 A Survey and Study on Satisfaction and Influencing Factors Using Ant Credit Pay via Intelligent Processing -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Data Analysis Method and Theoretical Basis -- 3.1 Chi-Square Test Principle -- 3.2 Principle of Correlation Analysis -- 3.3 Satisfaction Principle -- 3.4 Establishing the Satisfaction Index System -- 4 Analysis on the Satisfaction and Influencing Factors -- 4.1 Reliability Analysis and Validity Analysis of Data -- 4.2 Analysis of College Students' Satisfaction with Using "Ant Credit Pay" -- 4.3 Analysis of College Students' Satisfaction -- 4.4 Analysis of Influencing Factors -- 5 Some Suggestions -- 5.1 Individual Consumption Needs to Be Tailored -- 5.2 Pay Attention to Self-credit and Enhance Self-protection Consciousness -- 5.3 Appropriately Reduce the Withdrawal Procedure Rate and Expand the Use of "Ant Credit Pay" in Daily Life -- References -- 11 A Review on Main Optimization Method of ALBERT in Natural Language Processing -- Abstract -- 1 Introduction -- 2 Recent Development -- 3 Solve the Problem of Insufficient Text Word Vector Learning by Classifying the Output Features of ALBERT. , 4 Solve the Problem of Gradient Explosion and Disappearance in the Process of Long Text Training by Combining the Bi-LSTM Model -- 5 By Combining CRF Model to Better Recognize Long Texts -- 6 By Combining the BiGRU Model to Maximize the Preservation of the Semantic Association of Word Vectors in Long Texts -- 7 Conclusion -- References -- 12 Study on the Influencing Factors of Customer Loyalty in Large Smart Home Furnishing Stores -- Abstract -- 1 Introduction -- 2 Related Theory of Influencing Factors of Customer Loyalty -- 2.1 Experience Marketing -- 2.2 Customer Satisfaction -- 2.3 Measurement of Customer Loyalty -- 3 Establishment of Influencing Factor Model of Customer Loyalty -- 3.1 Selection of Modeling Dimension -- 3.2 Research Hypothesis -- 3.3 Description of Research Model -- 4 Data Analysis on Influencing Factors of Customer Loyalty -- 4.1 Reliability Test -- 4.2 Correlation Analysis -- 4.3 Regression Analysis -- 5 Summary -- References -- 13 A Detection Algorithm of Lung Nodule Based on Faster R-CNN -- Abstract -- 1 Introduction -- 2 Deep Learning Detection Framework and Faster R-CNN -- 2.1 Feature Extraction Network -- 2.2 RPN -- 2.3 ROI Pooling -- 2.4 Classifier -- 3 Pulmonary Nodule Detection Network -- 3.1 Improvement of Feature Extraction Network -- 3.2 Modify Anchors -- 4 Experimental Data and Result Verification -- 4.1 Dataset -- 4.2 Evaluation Criterion -- 4.3 Experimental Result -- 5 Conclusion -- References -- 14 Information Extraction from Contract Based on BERT-BiLSTM-CRF -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Algorithm Model -- 3.1 Contract-Based Language Model (BERT) -- 3.2 BiLSTM-CRF Method Based on Migration Optimization -- 4 Test Results and Analysis -- 5 Concluding Remarks -- References -- 15 Research on Linear Detection Technology for Massive MIMO in Wireless Communications -- Abstract. , 1 Introduction -- 2 Model of Massive MIMO Uplink System -- 3 Linear Detection Algorithm for Massive MIMO System -- 3.1 Linear Detection Algorithm -- 3.1.1 Maximum Ratio Combining Algorithm (MRC) -- 3.1.2 Zero-Forcing Algorithm (ZF) -- 3.1.3 Minimum Mean Square Error Detection Algorithm (MMSE) -- 3.2 Simulation -- 4 Conclusion -- References -- 16 Research on Intelligent Reconfiguration and Recognition Technology of Mobile Environment for Substation Operation -- Abstract -- 1 Introduction -- 2 Object Scanning and Modeling -- 3 Modeling and Scanning Modeling of Dynamic Complex Environment -- 4 Weak Supervision Instance Segmentation of Substation Equipment Based on RGB-T Self Labeling -- 5 Model Compression and Acceleration for Edge Devices -- 6 Research and Development of Environment Intelligent Reconfiguration and Recognition Prototype System for Mobile Side Software and Hardware Platform -- 7 Conclusion -- References -- 17 Development and Application of Power Grid Disaster Intelligent Perception and Emergency Command System -- Abstract -- 1 Introduction -- 2 Electric Power Disaster Emergency Situation Map and 3D Visual Command Technology -- 3 Research and Development of Power Grid Disaster Intelligent Perception and Emergency Command Prototype System -- 4 Conclusions -- Acknowledgements -- References -- 18 Research on State Perception of Power Grid Equipment Based on Intelligent Analysis of Multi-Spectral Data -- Abstract -- 1 Introduction -- 2 Feature Distribution and Time-Domain Correlation of PoWer Equipment Status Under Different Spectrums -- 3 Online Monitoring and Fault Warning of Electrical Equipment Status of Stations and Transmission Lines -- 4 Establish a Sample Library of Power Equipment Faults Based on Three-Light Fusion Imaging -- 5 Comprehensive Evaluation Method of Multi-Spectral Data Analysis Model -- 6 Conclusions -- Acknowledgements. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Three-dimensional imaging-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (512 pages)
    Edition: 1st ed.
    ISBN: 9789811538674
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.180
    DDC: 621.36699999999996
    Language: English
    Note: Intro -- International Program Committee -- Honorary Chair -- General Chairs -- Organizing Chair -- International Advisory Chair -- Founder of IRNet China -- Co-founder of IRNet China -- TPC Members -- Sponsors -- Preface -- Contents -- About the Editors -- 1 3D-DIC Technique for Strain Measurement in FRP Strip Externally Bonded to Concrete Specimens -- 1.1 Introduction -- 1.2 Basic Principle and Advantages of 3D-DIC System -- 1.2.1 Basic Principle and Test Setup of 3D-DIC System -- 1.2.2 Advantages -- 1.3 Operation Process of 3D-DIC -- 1.3.1 Speckle Marking -- 1.3.2 Operation Process -- 1.4 Specimens and Materials -- 1.5 Results and Analysis -- 1.5.1 Strain Distribution of FRP Strips -- 1.5.2 Bond-Slip Relation -- 1.6 Conclusions -- References -- 2 Establishment of Quality Detection and 3D Evaluation Model of Wool Fabric Based on Machine Vision -- 2.1 Introduction -- 2.2 Fluffy Surface Quality Measurement Principle -- 2.2.1 Measurement System Principle Introduction -- 2.2.2 Thickness Measurement Principle -- 2.3 Extraction of the Upper Edge of the Fluff and the Baseline -- 2.4 Villus Surface Quality Estimation Parameter Model -- 2.4.1 Selection of Parameter Model -- 2.5 Test -- 2.5.1 Test Platform -- 2.5.2 Test Data Analysis -- 2.6 Conclusion -- References -- 3 The Research and Design of Wage Supervision Service Platform for Migrant Workers Based on Big Data and Iris Recognition Technology -- 3.1 Background Introduction -- 3.2 Technology Introduction -- 3.2.1 Big Data Technology -- 3.2.2 Iris Recognition Technology -- 3.3 Functional Demand Analysis of Wage Supervision Platform -- 3.4 Logical Architecture Design of Wage Supervision Platform -- 3.5 Network Topology Structure Design of Wage Supervision Platform -- 3.6 Conclusion -- References -- 4 Research on Block Segmentation and Assembly Technology of 3D Printing Structure -- 4.1 Introduction. , 4.2 3D Printing Technology -- 4.2.1 Introduction to Three Technologies Commonly Used in 3D Printing -- 4.2.2 Four Common Data Formats for 3D Printing -- 4.2.3 Basic Requirements for 3D Printing STL Data Format -- 4.3 Block Segmentation and Assembly Technology of 3D Printing Component -- 4.3.1 Block Segmentation and Assembly Process of 3D Printing Component -- 4.3.2 Selection of 3D Printing Sub-block Direction and Position -- 4.4 Printing Cases -- 4.5 Conclusion -- References -- 5 A Study on 3D Reconstruction Method for Common View Field in Hybrid Vision System -- 5.1 Introduction -- 5.2 Hybrid Vision System -- 5.2.1 Introduction of Hybrid Vision System Model -- 5.2.2 The Imaging Principle of RGB-D Camera -- 5.2.3 The Imaging Principle of Panoramic Camera -- 5.3 The Feature Points 3D Reconstruction -- 5.3.1 SURF Feature Extraction -- 5.3.2 SURF Feature Matching -- 5.3.3 3D Reconstruction of Feature Points -- 5.4 Results -- 5.4.1 Feature Matching Point 3D Reconstruction -- 5.4.2 Discussion -- 5.5 Conclusion -- References -- 6 Three-Dimensional Characteristics Observation of Ocean Waves in Coastal Areas by Microwave Doppler Radar -- 6.1 Introduction -- 6.2 3D Spectrum Pre-processing -- 6.3 Radar Data -- 6.4 3D Characteristics of Ocean Wave -- 6.5 Conclusion -- References -- 7 Three-Dimensional Reconstruction Based on Left Right Objects -- 7.1 Research Background and Significance -- 7.2 Technical Route -- 7.2.1 Offline Calibration -- 7.2.2 Stereo Correspond -- 7.3 Results and Analysis -- 7.4 Conclusion -- References -- 8 Research on 3D Scene Dynamic Scanning Modeling Technology of Substation Based on Depth Vision -- 8.1 Introduction -- 8.2 Deep Visual 3D Scanning Modeling Algorithm for Indoor and Outdoor Environments of Substation Operations -- 8.2.1 Semi-dense SLAM Based on RGB-D in Complex Indoor Working Environment. , 8.2.2 Sparse SLAM Based on Binocular Camera in Complex Outdoor Working Environment -- 8.3 Hybrid Hierarchical Scanning Modeling for Large-Scale Scenes -- 8.4 Regional Learning and Substation Environment Understanding Under Scene Point Cloud -- 8.4.1 Point Cloud Pretreatment -- 8.4.2 Point Cloud Clustering -- 8.5 Conclusions -- References -- 9 Fusion and Localization Technology of 3D Model Attitude and Real Physical Environment Visualization Information of Power Inspection Site -- 9.1 Introduction -- 9.2 Binocular Posture and Visual Information Fusion Positioning Technology -- 9.3 Conclusions -- References -- 10 The Research and Design of Big Data Monitoring Platform for Enterprise Growth -- 10.1 Background Introduction -- 10.2 Introduction to Big Data Technology -- 10.3 Functional Demand Analysis -- 10.4 System Development and Design -- 10.4.1 Overall Architecture Design -- 10.4.2 System Functional Architecture Design -- 10.4.3 Network Topology Structure Design -- 10.5 Conclusion -- References -- 11 Application Analysis of Big Data in Library Management and Service -- 11.1 Introduction -- 11.2 Big Data Technology Overview -- 11.3 Analysis of Library Management Service Problems -- 11.3.1 Computational Ability Is Weak -- 11.3.2 Lack of Optimization of Network Resources -- 11.4 The Advantages of Big Data in Library Management and Services -- 11.4.1 Improve the Efficiency of Collection and Integration of Books and Resources -- 11.4.2 Optimize Library Service Projects -- 11.4.3 Promote Resource Sharing and Form a Library Sharing System -- 11.5 The Difficulties and Solutions of Big Data Applied to Libraries -- 11.5.1 The Library Big Data System Is not Perfect -- 11.5.2 Lack of Skills in Librarians -- 11.5.3 Management Mode Is Old Curing -- 11.6 The Conclusion -- References. , 12 Application of Virtual Reality Technology in the Teaching of 3D Animation Course -- 12.1 Virtual Reality Technology -- 12.2 Integration of Virtual Reality Technology and 3D Animation Technology -- 12.3 The Importance of Virtual Reality Technology to the Teaching of 3D Animation Courses -- 12.3.1 Innovation in Teaching Ideas -- 12.3.2 Abundance of Teaching Methods -- 12.3.3 Motivate Learners to Learn Independently -- 12.3.4 Implementation of Interactive Learning -- 12.4 The Importance of Virtual Reality Technology to the Teaching of 3D Animation Courses -- 12.4.1 Teaching of 3D Animation Course Theory -- 12.4.2 Teaching of 3D Animation Course Practice -- 12.5 Conclusion -- References -- 13 Study on Properties of Polymer Materials Based on 3D Printing Technology -- 13.1 Introduction -- 13.2 Experimental Methods -- 13.2.1 3D Printing Specimen -- 13.2.2 Tensile Test -- 13.3 Results and Discussions -- 13.4 Conclusion -- References -- 14 Improved SSD-Based Multi-scale Pedestrian Detection Algorithm -- 14.1 Introduction -- 14.2 Improved SSD Pedestrian Detection Model -- 14.2.1 Introduction of Context Information -- 14.2.2 SSD Improvement Layer Network Structure Design -- 14.3 Model Training and Analysis of Experimental Results -- 14.3.1 Data Preprocessing and Parameter Setting -- 14.3.2 Performance Evaluation Index -- 14.3.3 Experimental Results -- 14.4 Conclusion -- References -- 15 Activity Recognition System Optimisation Using Triaxial Accelerometers -- 15.1 Introduction -- 15.2 Related Works -- 15.3 Data Description -- 15.4 Results and Analysis -- 15.5 Conclusion -- References -- 16 Near-Duplicate Video Detection Based on Temporal and Spatial Key Points -- 16.1 Introduction -- 16.2 The Classic Key Frame Extraction and Video Shot Segmentation Technology -- 16.2.1 Video-Shot-Based Method -- 16.2.2 Visual-Feature-Based Method. , 16.2.3 Cluster-Based Method -- 16.3 Temporal and Visual Feature Extraction -- 16.3.1 Video Segmentation -- 16.3.2 Video Segment Feature Extraction -- 16.3.3 Video Segment Matching -- 16.4 Two Classification Methods -- 16.4.1 Similar Detection for Given Samples -- 16.4.2 Similar Video Automatic Classification -- 16.5 Experimental Results -- 16.5.1 Dataset Introduction and Experiment Procedure -- 16.5.2 Analysis of Results -- 16.6 Conclusion -- References -- 17 Surface Defect Detection Method for the E-TPU Midsole Based on Machine Vision -- 17.1 Introduction -- 17.2 Relevant Knowledge -- 17.2.1 E-TPU Material -- 17.2.2 The Theory of Second-Order Difference Method -- 17.3 Proposed Method -- 17.3.1 The Theory of Second-Time Difference -- 17.3.2 Detection Algorithm -- 17.4 Experiment and Analysis -- 17.4.1 Experimental Conditions and Methods -- 17.4.2 The Experiment Content and Result -- 17.4.3 Analysis of Experimental Results -- 17.5 Conclusion -- References -- 18 A Multi-view Learning Approach for Glioblastoma Image Contrast Enhancement -- 18.1 Introduction -- 18.2 Background -- 18.3 Proposed Method -- 18.4 Experimental Results -- 18.5 Conclusion -- References -- 19 Multi-focus Image Fusion Based on Convolutional Sparse Representation with Mask Simulation -- 19.1 Introduction -- 19.2 Convolutional BPDN Dictionary Learning with Mask Simulation -- 19.3 Proposed CSRMS-Based Fusion Method -- 19.3.1 Source Multi-focus Image Decomposition -- 19.3.2 Fusion of High-Frequency Components -- 19.3.3 Fusion of Low-Frequency Components -- 19.3.4 Image Reconstruction -- 19.4 Experiments and Analysis -- 19.5 Conclusion -- References -- 20 A Collaborative Sparse Representation-Based Approach for Pattern Classification -- 20.1 Introduction -- 20.2 Related Work -- 20.2.1 Sparse Representation-Based Classification. , 20.2.2 Weighted Group Sparse Representation Classification.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...