GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1263 pages)
    Edition: 1st ed.
    ISBN: 9788132216650
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.243
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Committee -- Contents -- 1 Image and Template Security for Palmprint -- Abstract -- 1…Introduction -- 2…Image Protection -- 2.1 Chaotic Mixing -- 2.2 Watermarking -- 3…Template Security -- 3.1 Proposed System -- 4…Conclusion -- References -- 2 Extending Network Lifetime by Time-Constrained Data Aggregation in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Model and Problem Definition -- 4…Solution and Implementation -- 5…Conclusion -- References -- 3 The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Abstract -- 1…Introduction -- 2…Fundamentals of Power System as a Graph Theoretic Model -- 3…Modeling the Topology of Power Grid as a Complex Network -- 3.1 Topological Analysis of Power Grid -- 3.1.1 Number of Links (m) -- 3.1.2 Average Nodal Degree ( \langle k \rangle ) -- 3.1.3 Ratio Parameter (r) -- 3.1.4 Pearson Coefficient ( \rho ) -- 3.1.5 Degree Distribution -- 3.1.6 Clustering Coefficient -- 3.1.7 Average Shortest Path -- 3.2 Random Graphs (ER) -- 3.3 Preferential Attachment (PA) -- 4…Experimental Results and Discussions -- 5…Conclusions -- References -- 4 Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 2.1 Efficient Coverage Area Ratio Calculation -- 2.2 Sensor and Coverage Model -- 3…Sensor Node Deployment and Coverage Area Calculation -- 3.1 Sensor Node Deployment Based on Square Pattern -- 3.1.1 Nine Sensors at the Vertices of Square -- 3.1.2 Sensor Nodes at the Center of Sixteen Circles -- 3.2 Sensor Node Deployments Based on Triangular Pattern -- 3.2.1 Sensor Deployment at the Three Vertices of a Triangle -- 3.2.2 Sensor Deployment at Vertexes of the Rhomb -- 3.2.3 Sensor Deployment at a Meeting Circle of Six Circles. , 4…Comparison and Result Analysis -- 4.1 Total Coverage Area Versus Number of Nodes -- 4.2 Net Efficient Coverage Area Ratio Versus Number of Nodes -- 5…Conclusion -- References -- 5 Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Overview of LAR, DSR, and AODV Protocols -- 4…Problem Formulation -- 4.1 Assumption -- 4.2 Intelligent Driver Model with Intersection Management -- 5…Simulation Environments and Result Analysis -- 5.1 Packet Delivery Ratio -- 6…Conclusions -- References -- 6 A Bluetooth-Based Autonomous Mining System -- Abstract -- 1…Motivation -- 2…Why a Wireless System? -- 3…Why Bluetooth? -- 4…Methodology -- 5…Flowcharts -- 6…Algorithms -- 6.1 Database Entry -- 6.2 Advance Search -- 6.3 Scanning -- 7…Results/Conclusion -- 8…Related Work -- 8.1 Tracking Systems Based on Triangulation Method -- 8.2 Tracking Systems Based on Scanning Technique -- 8.3 Epidemic Communication -- References -- 7 Transistor Representation of a Low-Power Reversible 32-Bit Comparator -- Abstract -- 1…Introduction -- 2…Reversible Logic Gates -- 3…Literature Survey -- 4…Proposed 3 x 3 Reversible Gates -- 4.1 Proposed Reversible Gate1 -- 4.2 Proposed Reversible Gate2 -- 4.3 Realization of the Classical Operations -- 5…Transistor Implementation of the Proposed Reversible Gates Using GDI Method -- 5.1 Transistor Implementation of Proposed Reversible Gate1 -- 5.2 Transistor Implementation of Proposed Reversible Gate2 -- 6…Proposed Design of 1-Bit Comparator -- 7…Realization of Proposed 4-Bit Comparator -- 7.1 Logic Diagram to Find the Greater of Two 4-Bit Numbers -- 7.2 Logic Diagram to Find the Equality of Two 4-Bit Numbers -- 7.3 Logic Diagram to Find the Smaller of Two 4-Bit Numbers -- 8…Realization of 32-Bit Comparator -- 9…Simulation Results -- 10…Conclusion. , 8 Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- Abstract -- 1…Introduction -- 2…Optimization -- 3…Proposed Model -- 4…Results -- 5…Conclusion -- References -- 9 To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Reengineering Tool: A Literature Survey -- Abstract -- 1…Introduction -- 2…Functional Requirement for Reengineering Tool -- 3…Extractor in Details -- 4…Conclusions -- References -- 10 Detection of Web-Based Attacks by Analyzing Web Server Log Files -- Abstract -- 1…Introduction and Background -- 2…Web-Based Attacks -- 3…Web Server Log Files -- 4…Problem Formulations -- 4.1 iFrame Injection Attack -- 4.2 Buffer Overflow Attack -- 5…Experimental Works and Result Analysis -- 5.1 Experimental Works -- 5.1.1 iFrame Injection Attack -- 5.1.2 Buffer Overflow Attack -- 5.2 Result Analysis -- 6…Conclusion -- References -- 11 A Survey of Energy-Aware Routing Protocols and Mechanisms for Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Energy or Power Consumption in MANETs -- 3…Energy-Aware Routing Mechanisms -- 4…Routing Protocols Based on Node Energy Status -- 5…Routing Protocols Based on Transmission Power Control -- 6…Conclusion -- References -- 12 Lexical Ontology-Based Computational Model to Find Semantic Similarity -- Abstract -- 1…Introduction -- 2…Lexical Ontology and Semantic Similarity -- 2.1 Semantic Similarity Aspects Using WordNet Lexical Ontology -- 2.2 Indo WordNet Structure -- 3…Proposed Semantic Similarity Module -- 3.1 Framework for Proposed Module -- 3.2 Proposed Algorithms -- 4…Experiments and Results -- 4.1 The Benchmark Data Set -- 4.2 Results -- 5…Conclusion and Future Work -- References -- 13 Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks -- Abstract -- 1…Introduction. , 2…Review on Cluster-Based Data Aggregation Techniques -- 3…Wireless Sensor Network Model -- 4…Radio Energy Dissipation Model -- 4.1 Two-Level Heterogeneous Networks -- 5…Objective and Scope -- 5.1 Proposed Approach -- 6…Implementation and Performance Evaluation -- 7…Results -- 8…Conclusion and Future Scope -- References -- 14 Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Abstract -- 1…Introduction -- 2…Proposed Watermarking Algorithms -- 2.1 Magic Square Procedure -- 2.2 Method 1 -- 2.3 Method 2 -- 3…Results -- 4…Conclusion -- References -- 15 Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET -- Abstract -- 1…Introduction -- 2…The Trust-Based Security Solution -- 2.1 The Environment -- 2.2 The Trust Model and the Node Evaluation Scheme -- 2.3 The Architecture -- 3…Security Analysis of the Solution -- 3.1 The Secure Routing Protocol -- 3.2 Analysis Based on Known Attacks -- 4…Discussion -- 5…Conclusion and Future Work -- References -- 16 Design of a Biometric Security System Using Support Vector Machine Classifier -- Abstract -- 1…Introduction -- 2…Feature Extraction for the Biometric System -- 2.1 ZCPA Feature Extraction for Input Speech -- 2.2 PCA Feature Extraction for Input Image -- 3…Support Vector Machine Classifier -- 4…Working of Biometric Security System -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 17 Impact of Distance Measures on the Performance of Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 3…Distance Measures -- 3.1 Euclidean Distance -- 3.2 Standardized Euclidean Distance -- 3.3 Manhattan Distance -- 3.4 Mahalanobis Distance -- 3.5 Cosine Distance -- 3.6 Correlation Distance -- 4…Experimental Results and Discussions -- 4.1 Datasets Used -- 4.2 Evaluation on Clustering Efficiency -- 5…Conclusions -- References. , 18 Gender Identification Using Gait Biometrics -- Abstract -- 1…Introduction -- 2…Methodology -- 2.1 Silhouette Extraction -- 2.1.1 Feature Extraction -- 3…Network Structure -- 3.1 Feed-Forward Back-Propagation Neural Network -- 3.2 Cascade-Forward (CF) Back-Propagation Network -- 4…Computational Analysis -- 5…Conclusion and Future Work -- References -- 19 A Survey on Business Context -- Abstract -- 1…Introduction -- 2…Context -- 3…Context Awareness -- 3.1 Sensor and Context Types -- 4…Business Context -- 4.1 Business Context Awareness -- 5…Context Modeling -- 5.1 Key Value Models -- 5.2 Markup Scheme Models -- 5.3 Graphical Models -- 5.4 Object-Oriented Models -- 5.5 Logic-Based Models -- 5.6 Ontology-Based Models -- 5.7 Guideline for Business Context Modeling -- 6…Conclusion -- Acknowledgment -- References -- 20 Enhanced Caching for Geocast Routing in Vehicular Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Work -- 3.1 Protocol Design -- 3.2 Improved Caching Technique -- 3.3 Transmission with Full Radio Transmission Range Power -- 4…Simulation Results and Performance Analysis -- 5…Conclusion and Future Work -- References -- 21 Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Trust, Activity, and Strategy -- 3.1 Evaluating Trust Level -- 3.2 Evaluating Activity Level -- 3.3 Strategy Coding -- 4…Game Model Based on Trust and Activity -- 4.1 The Game on Network -- 4.2 Payoff for Participants -- 4.3 The Fitness Function -- 5…The Tournament -- 6…Evolution of Strategy Using Genetic Algorithm -- 7…Experiments -- 8…Conclusions and Future Work -- References -- 22 Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Abstract -- 1…Introduction -- 2…Overview of Tuple Space Model. , 3…Proposed Approach of Uncoupling of Mobile Cloud Computing Services.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Mechatronics--Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (582 pages)
    Edition: 1st ed.
    ISBN: 9783319709901
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.691
    DDC: 621
    Language: English
    Note: Intro -- Preface -- Conference Organizing Committee -- Acknowledgement -- Contents -- Mechatronics -- Research on the Application of Beidou System in Aviation Ammunition Support -- Abstract -- 1 Introduction -- 2 Beidou Navigation and Positioning System Structure -- 3 Beidou Positioning Principle -- 4 Beidou System Application Solution -- 4.1 Security Command Center + Beidou User Machine (Including the Beidou Mobile Command Users and Bei ... -- 4.2 Mobile Command User + Beidou Basic User -- References -- Research on the Aviation Ammunition Support Technology of American Air Force -- Abstract -- 1 Introduction -- 2 The Present Situation of American Aviation Ammunition Support Technology -- 3 GPS Application -- 4 RFID Application Plan of U.S -- References -- The Assembly Redesign of Cage Rotor Separator -- Abstract -- 1 Preface -- 2 Three-Dimensional Design and Assembly Design Analysis of Cage Rotor Separator -- 3 Redevelopment of Fan Blades and Auxiliary Fan Blades of Cage Type Rotor -- 4 Application as an Example, Production and Evaluation -- 5 Application as an Example, Production and Evaluation -- 6 Conclusions and Improvements -- References -- Design and Analysis of Double-Arc Tooth Profile Harmonic Drive -- Abstract -- 1 Introduction -- 2 Design and Modeling of Double-Arc Tooth Profile HD -- 2.1 Design of Flexspline Tooth Profile -- 2.2 Conjugating Profile of Circular Spline (CS) -- 3 Theoretical Analysis of Deformation and Contact Force -- 3.1 Theoretical Analysis of Deformation of the Neutral Layer Line -- 3.2 Theoretical Distribution of Contact Force -- 4 Simulation and Analysis of Double-Arc HD with FEM -- 4.1 Simulation of the Assembling and Meshing -- 4.2 Deformation and Stress Analysis -- 4.3 Analysis of Contact Force Distribution and FS Cup Torsion -- 5 Conclusion -- Acknowledgements -- References. , Second Order Difference Aided CRC Check Stopping Criterion for Turbo Decoding -- Abstract -- 1 Introduction -- 2 Second Order Difference Aided CRC Check Stopping Criterion -- 3 Simulation Results and System Complexity Analysis -- 4 Conclusion -- References -- Comparative Study on Energy Efficiency Evaluation Methods of Variable Frequency Motor System -- Abstract -- 1 Introduction -- 2 Introduction to Common Methods for Energy Efficiency Evaluation of Motor Systems -- 2.1 Nameplate Method -- 2.2 Slip Method -- 2.3 Current Method -- 2.4 Equivalent Circuit Method -- 3 The Evaluation Energy Consumption of Variable Frequency Motor System Based on Loss Analysis -- 4 Comparison and Verification of Different Energy Efficiency Evaluation Methods for 37 kw Variable F ... -- 4.1 Comparison of Measured and Evaluated Results Under 37 KW Frequency -- 4.2 Comparison of Experimental Results -- 5 Conclusion -- References -- Integrated Optimal Speed Change Law of Hydro-Mechanical Continuously Variable Transmission Tractor -- Abstract -- 1 Introduction -- 2 Productivity-Economy Integrated Optimal Evaluation Index -- 3 The HMCVT Speed Change Law -- 4 Optimization Calculation of the Optimal Productivity-Economy -- 5 Conclusion -- Acknowledgment -- References -- Dynamic Three Parameter Range Shifting Law of the Multi-range Hydro-Mechanical CVT -- Abstract -- 1 Introduction -- 2 Analysis and Evaluation Index of Range Shifting Process -- 3 Mathematical Model of the Range Shifting Process -- 4 Dynamic Three Parameter Ranges Shifting Law -- 5 Simulation Analysis -- 6 Conclusion -- Acknowledgment -- References -- Study on Control Strategy of Microquadcopter -- Abstract -- 1 Introduction -- 2 The Controller Design of Microquadcopter -- 2.1 PID Control of Microquadcopter -- 2.2 Fuzzy Control of Microquadcopter -- 2.2.1 The Selection of Structure. , 2.2.2 The Fuzzification of System Variables -- 2.2.3 The Algorithm Design of Fuzzy Reasoning -- 2.2.4 The Defuzzification of Output Variables -- 2.3 Fuzzy PID Control of Microquadcopter -- 2.3.1 The Selection of the Structure of the Fuzzy Controller -- 2.3.2 The Fuzzification of Input and Output Variables -- 2.3.3 The Algorithm Design of Fuzzy Reasoning -- 2.3.4 The Defuzzification of Output Variables -- 3 The Analysis of Simulation Results for Microquadcopter -- 3.1 Simulation of Traditional PID Control for Microquadcopter -- 3.2 Simulation of Fuzzy Control for Microquadcopter -- 3.3 Simulation of Fuzzy PID Control for Microquadcopter -- 3.4 The Analysis of Simulation Results for Microquadcopter -- 4 Conclusions -- Acknowledgments -- References -- Research and Simulation Analysis on Dynamic Matching Characteristics of Electric Vehicle Transmissio ... -- Abstract -- 1 Introduction -- 2 Dynamic System Model and Simulation of Electric Vehicle -- 2.1 Motor Characteristics Experimental Data Processing and Modeling -- 2.2 Battery Model -- 3 Matching Model of Continuously Variable Transmission and Motor -- 3.1 Mathematical Model of Axial Clamping Force of Main and Driven Pulley -- 3.2 EMCVT Speed Ratio Control Strategy -- 4 Conclusion -- Acknowledgement -- References -- The Clutch Control Strategy of EMCVT in AC Power Generation System -- Abstract -- 1 Introduction -- 2 The Control Requirements of EMCVT Clutch in the Alternator -- 3 The Establishment of the Clutch Model -- 3.1 Dynamic Model of the Clutch -- 3.2 Control Objectives and Control Parameters -- 4 The Fuzzy Controller Design of EMCVT -- 4.1 Control Strategy of Clutch Engaging Fuzzy -- 4.2 Selection of Input and Output Variable in Fuzzy Control -- 4.3 Fuzzification of the Input Variables -- 4.4 Establishment of the Fuzzy Control Table -- 4.5 Solve the Fuzzy Process -- 5 Experimental Research. , 6 Conclusion -- Acknowledgement -- References -- Efficient Optimization Strategy of Fuzzy Search for Asynchronous Motor Vector Control System -- Abstract -- 1 Introduction -- 2 Efficiency Optimization Principle of Asynchronous Motor -- 3 Efficiency Optimization Strategies of Fuzzy Search -- 4 Design of Fuzzy Search Controller -- 5 Simulation -- 6 Conclusion -- References -- Analysis of Anti Interference of Channel Control Measure in 2.4 GHz-Band Network -- Abstract -- 1 Introduction -- 2 Literature Survey -- 3 Channel for Three Kinds of Systems and Channel Fusion Model -- 3.1 Wi-Fi System for Modulation and Demodulation of Software Simulation -- 3.2 ZigBee System for Modulation and Demodulation of Software Simulation -- 3.3 Bluetooth System for Modulation and Demodulation of Software Simulation -- 4 Proposed Method -- 4.1 Original Model of the Channel -- 4.2 Channel Control Mechanism Model -- 4.3 Channel Conflict and Control During Parallel Output of Three Kinds of Systems -- 5 Experimental Results -- 5.1 BER of Each Kind of System with Three Users Access -- 6 Conclusion -- References -- A Curve Fitting Method for Evaluating Pilot Operation Quality -- Abstract -- 1 Introduction -- 2 Proposed Method -- 3 Conclusion -- References -- Modeling and Simulation -- Simulation Design of Improved OPTA Thinnin Algorithm -- Abstract -- 1 Introduction -- 2 The Principle of OPTA Thinning Algorithm and the Improved Algorithm Design -- 2.1 OPTA Thinning Algorithm Principle -- 2.2 Serial Parallel Hybrid Algorithm Based on OPTA -- 3 Algorithm Validation -- 3.1 Fingerprint Image Source -- 3.2 Fingerprint Image Simulation -- 4 Conclusion -- References -- Fusion Evaluation of Ammunition Based on Bayes Method -- Abstract -- 1 Introduction -- 2 Fusion Evaluation Method for Ammunition Storage Reliability -- 2.1 Fusion Evaluation Algorithm. , 2.2 Integral Approximate Calculation -- 2.3 The Example Analysis -- 3 Conclusion -- References -- Fault Diagnosis of Analog Circuits Based on Multi Classification SVDD Aliasing Region Identification -- Abstract -- 1 Introduction -- 2 MSVDD Algorithm and Its Shortcomings -- 3 MSVDD Algorithm with Heterogeneous Samples -- 3.1 NSVDD -- 3.2 Process of NMSVDD Algorithm -- 4 Case Analyses -- 5 Conclusions -- References -- A Kind of New Method to Measure Tank Capacity -- Abstract -- 1 Introduction -- 2 Questions to Solve -- 2.1 System Design -- 2.2 National Standard and Technical Index of Storage Tank Volume -- 3 Proposed Methods -- 3.1 Model Hypothesis -- 3.2 System Analysis -- 4 Analysis of Model's Reliability -- 5 Conclusion -- Acknowledgment -- References -- Design of a Compact Electrically Tunable Band-Pass Filter with Wide Tuning Range -- Abstract -- 1 Introduction -- 2 Principle of Electrically Tunable Filter -- 2.1 Analysis of Filter Model -- 2.2 Improvement of Filter Model -- 3 Modeling of Varactor Diodes -- 3.1 Varactor Diode Model -- 3.2 Simulation of Diode Model -- 4 The Results and Analysis of Filter Structure Simulation -- 5 Conclusion Hardware Circuit and Test Results -- 6 Conclusion -- References -- Research on Growth Evaluation of New OTC Market of Science and Technology Enterprises -- Abstract -- 1 Introduction -- 2 Construction of Growth Evaluation Index -- 3 Enterprise Growth Evaluation Model Based on Factor Analysis Method -- 3.1 Mathematical Model of Factor Analysis -- 3.2 Steps of Factor Analysis Method -- 4 Empirical Research -- 4.1 Suitability Testing of Samples -- 4.2 Extracting Main Factor -- 4.3 Name of Factor -- 4.4 Factor Score -- 5 Suggestions and Conclusions -- 5.1 Suggestions -- 5.2 Conclusions -- References -- A WSN Semantic Web Service Discovery Method Based on User Context -- Abstract -- 1 Introduction. , 2 Semantic Web Service Architecture.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Mechatronics-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (628 pages)
    Edition: 1st ed.
    ISBN: 9783319659787
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.690
    DDC: 621
    Language: English
    Note: Intro -- Preface -- Conference Organizing Committee -- General Chair -- Programme Chair -- Organizing Chair -- Technical Programme Committee -- Invited Speakers -- Acknowledgement -- Contents -- Intelligent Systems -- Modified Chaos Particle Swarm Algorithm Using Interpolation of Zadoff-Chu Sequence -- Abstract -- 1 Introduction -- 2 Intelligent Lock Software -- 3 Circuit of Hardware -- 4 Comparisons Between New Ones and Original Ones -- 5 Summary -- References -- Air Quality Index Prediction Using Error Back Propagation Algorithm and Improved Particle Swarm Opti ... -- Abstract -- 1 Introduction -- 2 Standard BP Neural Network -- 3 Improved PSO Algorithm -- 4 Simulation Design and Analysis -- 5 Conclusion -- References -- Picture Reconstruction Optimization Using Neural Networks -- Abstract -- 1 Introduction -- 2 Initial Architecture Design of the Network -- 3 Optimal Sampling Strategy -- 4 Optimal Methods on Avoid Overtraining -- 5 Optimal Methods on Increasing Learning Rate -- 5.1 Learning-Rate Annealing Schedules -- 5.2 Momentum Constant -- 6 Conclusion -- Acknowledgments -- References -- An Architecture Design for Fighting Method Decision Based on Course of Action -- Abstract -- 1 Introduction -- 2 A COA Semantic Model -- 3 A COA-Based Design Process -- 4 Mathematic Expression of Decision Problem -- 5 Conclusion -- Acknowledgements -- References -- Trajectory Generation and Optimization of Slider Crank for Servo Press Based on Bezier Curve Model a ... -- Abstract -- 1 Introduction -- 2 Bezier Curve Model of Slider-Crank Servo Press -- 3 Optimization -- 3.1 Fitness Function -- 3.2 Constraint Function -- 3.3 Result -- 3.3.1 Defining Number of Variables -- 3.3.2 Required Displacement -- 3.3.3 Constant Output Velocity -- 3.3.4 Restricted Velocity -- 3.3.5 Restricted Acceleration -- 3.3.6 Multi-constraint Optimization -- 4 Experimental Testing. , 5 Conclusion -- References -- Double Half-Orientation Code and Nonlinear Matching Scheme for Palmprint Recognition -- Abstract -- 1 Introduction -- 2 Double Half-Orientation Code Method -- 3 Double Half-Orientation Nonlinear Matching -- 4 Experimental Results Test -- 4.1 Palmprint Verification -- 4.2 Comparison Between Nonlinear Matching and Hamming Distance Measurement -- 5 Conclusion -- References -- Design of Digital Filters for the Contactless Conductivity Detection of Micro-fluidic Electrophoresi ... -- Abstract -- 1 Introduction -- 2 Principle of CCD for Micro-fluidic Chip -- 3 The Basic Principle of CIC Filter and FIR Filter -- 4 Analysis and Discussion -- 4.1 CCD Chromatographic Peak Signal Simulation of Micro-fluidic Chip -- 4.2 Filter Performance Analysis -- 4.3 Performance Analysis of CIC and FIR Cascaded Digital Filters -- 5 Testing and Verification -- 6 Conclusion -- Acknowledgements -- References -- An Improved Artificial Fish-Swarm Algorithm Using Cluster Analysis -- Abstract -- 1 Introduction -- 2 Proposed Method -- 3 Conclusion -- Acknowledgments -- References -- The Heart Rate Monitoring Based On Adaptive Cancellation Method -- Abstract -- 1 Introduction -- 2 Analysis of PPG Signal -- 3 Adaptive Cancellation Method -- 3.1 Adaptive Filtering Algorithm and Improvement -- 3.2 Generating the Reference Signal -- 3.3 Analysis and Results -- 4 Conclusion -- Acknowledgements -- References -- An Intelligent Heating Device Using Central Heating Technique for Northern China Family -- Abstract -- 1 Introduction -- 2 The System Requirements of Proposed Device -- 3 The Design of Proposed Device -- 4 Conclusion -- Acknowledgements -- References -- Study on Estimation Method of Oil-Immersed Transformer Insulation -- Abstract -- 1 Introduction -- 2 Transformer Oil-Paper Insulation Equivalent Model -- 2.1 Extend Debye Model. , 3 Preparation of Samples -- 4 Result and Analysis -- 4.1 Effect on Parameters of Debye Model Caused by Aged Transformer Oil -- 4.1.1 Variation of Resistance Ri -- 4.1.2 Variation of Capacitance Ci -- 4.2 Effect on Parameters of Debye Model Caused by Aged Insulation Paper -- 4.2.1 Variation of Resistance Ri -- 4.2.2 Variation of Capacitance Ci -- 5 Determination of Threshold for Oil Changing -- 5.1 Variation Ratio of Capacitance -- 5.2 Experiment Result -- 6 Conclusions -- References -- Development of a Wireless Security Monitoring System for CCEL -- Abstract -- 1 Introduction -- 2 Framework Design of Wireless Security Monitoring System -- 3 Hardware Design of the Wireless Security Monitoring System -- 4 Software Design of Wireless Security Monitoring System -- 5 Test of the Indoor Security Monitoring Node -- 6 Conclusion -- Acknowledgements -- References -- Research and Application of a Developing Approach for PIMS Software -- Abstract -- 1 Introduction -- 2 Design -- 2.1 System Structure Design -- 2.2 System Function Design and Implementation -- 3 Application -- 3.1 Chlortetracycline Fermentation Process Information Management System -- 3.2 Tread Production Process Information Management System -- 4 Discussion -- 5 Conclusions -- Acknowledgments -- References -- Study of Prediction Methods for Contamination in the Chlortetracycline Fermentation Process -- Abstract -- 1 Introduction -- 2 Contamination Prediction Method -- 2.1 Soft Sensor Model Solution of Contamination Prediction in the CTC Fermentation Process -- 2.2 Fusing Contamination Information in the CTC Fermentation Process -- 3 Experiment Analysis -- 4 Conclusions -- Acknowledgments -- References -- Technical Study of an Improved PWM Controlling DC/DC Converter -- Abstract -- 1 Introduction -- 2 The Work Principle of Improved PWM DC/DC Converter -- 3 The Experiment Results and Analysis. , 4 Conclusion -- References -- Head-Related Transfer Function Individualization Based on Locally Linear Embedding -- Abstract -- 1 Introduction -- 2 Personalized Method of HRTF -- 2.1 LLE Dimensionality Reduction Processing -- 2.2 Selection of Key Human Body Parameters -- 3 Experiment Analysis -- References -- A Research on Information Security of University Libraries in the Era of Big Data -- Abstract -- 1 Introduction -- 2 Information Security Problems that University Libraries are Facing with in the Era of Big Data -- 2.1 The Surrounding Environment and Equipment Configuration -- 2.2 Virus Risks -- 2.3 Security Problems Teachers and Students are Facing with in Network Resources Usages in the Era o ... -- 3 Information Security Protection Measures for University Libraries in the Big Data Era -- 3.1 Strengthen Environmental Protections and Purchase Advanced Equipment -- 3.2 Prevent Virus Intrusion -- 3.3 Teachers and Students Should Use Resources Correctly in the Network Resources in the Era of Big Data -- 3.4 Strengthen Managements -- 4 Conclusion -- Acknowledgement -- References -- An Improved PID Algorithm Based on BP Neural Network of Ambient Temperature Controller -- Abstract -- 1 Introduction -- 2 The Design of Overall Control Program -- 3 BP Neural Network Control -- 4 The Improved PID Algorithm -- 4.1 Anti Integral Saturation -- 4.2 Flexible Use of Differential Terms -- 4.3 The Overall Structure of the Improved PID Control Algorithm -- 5 The PID Algorithm Based on BP Neural Network -- 5.1 The Selection of Controlled Object -- 5.2 PID Parameter Adjustment -- 6 Experimental Test -- 7 Conclusion -- References -- Study on Security of Mobile Payment -- Abstract -- 1 Introduction -- 2 Mobile Payment Scene Analysis -- 2.1 The Mode of Mobile Payment -- 2.2 Mobile Payment Application Scene Analysis -- 3 Mobile Payment Security Threats. , 3.1 Higher Risk of Mobile Internet -- 3.2 The More Vulnerability of Mobile Phone -- 3.3 Comprehensive Threats of Mobile Payment -- 3.4 The Weak of User Security Awareness -- 4 The Security Precautions of Mobile Payment -- 4.1 Improve Safety Awareness and Skills -- 4.2 Scientific Management and Use -- 4.3 Effective Emergency Measures -- 5 Conclusion -- Acknowledgement -- References -- An Undetermined Coefficients Method for a Class of Ordinary Differential Equation with Initial Values -- Abstract -- 1 Introduction -- 2 The Method of Undetermined Coefficients -- 3 Numerical Examples -- 4 Conclusions -- References -- A Gaussian-Surface Fit to Oceanic Mesoscale Eddies -- Abstract -- 1 Introduction -- 2 Data and Method -- 2.1 Data -- 2.2 Method -- 3 Result -- 3.1 Mononuclear Eddy Fitting -- 3.2 Multiple Eddy Fitting -- 4 Discussion -- References -- Recurrent Neural Networks for Solving Real-Time Linear System of Equations -- Abstract -- 1 Introduction -- 2 Proposed Recurrent Neural Network -- 3 Global Exponential Convergence of the Presented Model -- 4 Simulation Results -- 5 Conclusion -- References -- Analysis of Relationships Between Amount of Physical Activity of Patients in Rehabilitation and Thei ... -- Abstract -- 1 Introduction -- 2 Data for Analysis -- 3 Correlation Analysis -- 3.1 Construction of Data Matrix -- 3.2 Analyzing Result of Data Matrix -- 4 Analysis Using MPCA -- 4.1 PCA and MPCA -- 4.2 Definition of Tensor -- 4.3 Construction of Data Tensor and General Flow of Analysis -- 4.4 Calculation Procedure of MPCA -- 4.4.1 Standardization of Tensor -- 4.4.2 HOSVD Calculation -- 4.4.3 Calculation of Principal Component Scores -- 4.5 Analyzing Result of Data Tensor -- 4.5.1 Principal Component Coefficients -- 4.5.2 Principal Component Scores -- 4.5.3 Correlation Among Principal Components. , 4.5.4 Detailed Analysis of Relationships Between Principal Components.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Engineering-Data processing. ; Electronic books.
    Description / Table of Contents: This book details recent research on soft computing techniques in vision science. It presents basic research extending to visual perception and visual system, cognitive psychology and psychophysics.
    Type of Medium: Online Resource
    Pages: 1 online resource (208 pages)
    Edition: 1st ed.
    ISBN: 9783319046938
    Series Statement: Studies in Computational Intelligence Series ; v.543
    DDC: 620.00285
    Language: English
    Note: Intro -- Contents -- 1 Machine Vision Solutions in Automotive Industry -- Abstract -- 1…Introduction -- 2…Machine Vision -- 2.1 Basics of Machine Vision System -- 2.2 Camera, Lens and Illumination -- 2.2.1 Camera -- 2.2.2 Lens -- 2.2.3 Illumination -- 2.2.4 3-D Imaging System -- 2.3 Software -- 2.4 Interface to Production Environment -- 2.5 Interface to Management Information System -- 3…Applications -- 3.1 Application: Inspection of Spline Gear -- 3.2 Application: Inspection and Control of Flywheel Press System -- 4…Other Applications -- 5…Conclusions -- References -- 2 Kinect Quality Enhancement for Triangular Mesh Reconstruction with a Medical Image Application -- Abstract -- 1…Introduction -- 2…Methods -- 2.1 System Overview -- 2.2 A Background and the Characteristics of Microsoft Kinect -- 3…A Comprehensive Kinect Calibration Method -- 3.1 Calibration of RGB/Depth Camera -- 3.2 Calibration of Depth Sensor -- 3.3 Mapping Between RGB and Depth Image -- 4…The Tri-States Segmentation -- 5…Triangular Mesh Reconstruction -- 5.1 Average Filter -- 5.2 Marching Cubes Algorithm -- 5.3 Area Calculation -- 6…Experimental Result -- 7…Conclusion -- References -- 3 A Matlab GUI Package for Comparing Data Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 2.1 k-Means -- 2.2 Fuzzy c-Means -- 2.3 Hierarchical Clustering -- 2.4 Multiobjective Clustering with Support Vector Machine -- 3…Cluster Validity Index -- 3.1 Internal Validity Index -- 3.1.1 J Index -- 3.1.2 Davis-Bouldin Index -- 3.1.3 Dunn Index -- 3.1.4 Xie-Beni Index -- 3.1.5 I Index -- 3.1.6 Silhouette Index -- 3.2 External Validity Index -- 3.2.1 Minkowski Index -- 3.2.2 Adjusted Rand Index -- 3.2.3 Percentage of Correctly Classified Pairs -- 4…Demonstration of Cluster Package -- 4.1 Initial Window -- 4.2 k-Means Window -- 4.3 Fuzzy c-Means Window. , 4.4 Hierarchical Clustering Window -- 4.5 MocSvm Clustering -- 4.6 Report Table i.e. Result window -- 4.7 All Cluster Running Window -- 5…Conclusion -- References -- 4 Multi Objective Line Symmetry Based Evolutionary Clustering Approach -- Abstract -- 1…Introduction -- 2…Proposed Symmetry Based Distances -- 3…Multiple Randomized Kd Trees Based Nearest Neighbor Search -- 4…Multi Objective Line Symmetry Based Genetic Clustering Approach -- 4.1 Chromosome Representation -- 4.2 Fitness Computation -- 4.3 Genetic Operators -- 4.3.1 Selection -- 4.3.2 Crossover -- 4.3.3 Mutation -- 4.4 Termination Criterion -- 5…Data Sets and Experimental Results -- 5.1 Artificial Data Sets -- 5.2 Real Data Sets -- 6…Conclusion -- References -- 5 An Efficient Method for Contrast Enhancement of Digital Mammographic Images -- Abstract -- 1…Introduction -- 2…MIAS Database -- 3…Proposed Method -- 4…Simulation Results and Discussions -- 5…Conclusions -- References -- 6 Simulation of Obstacle Detection and Speed Control for Autonomous Robotic Vehicle -- Abstract -- 1…Introduction -- 2…Obstacle Detection and Avoidance -- 2.1 Image Processing Based Obstacle Detection -- 2.1.1 Stereo Vision -- 2.1.2 Monocular Vision -- 2.2 Proposed Method for Obstacle Avoidance -- 2.3 Digital Image Processing -- 2.3.1 Basic Relationships Between Pixels -- 2.3.2 Neighbours of a Pixel -- 2.3.3 Connectivity Between Pixels -- 2.3.4 Adjacency Between Pixels -- 2.3.5 Region -- 2.4 Algorithm for Obstacle Detection -- 2.4.1 Thresholding and Region Growing based Image Segmentation -- 3…Pid Controller Based Speed Control of PMDC Motor -- 3.1 PID Controller Overview -- 3.1.1 Proportional -- 3.1.2 Integral -- 3.1.3 Differential (Derivative) -- 3.2 Motor Parameters -- 3.3 Experimental Calculation of Motor Parameters -- 3.3.1 Electric Resistance and Inductance of Armature -- 3.3.2 Electromotive Force Constant. , 3.3.3 Moment of Inertia -- 3.3.4 Damping Ratio of the Mechanical System -- 3.4 PMDC Motor Equations -- 3.5 Tuning of Discrete PID Controller -- 3.5.1 Simulation Result -- 3.5.2 Computed Parameters -- 4…Matlab Simulink Based Image Processing for Obstacle Detection -- 4.1 MATLAB Simulink Model -- 4.1.1 RGB to Gray-Scale Conversion -- 4.1.2 Thresholding -- 4.2 Simulation Results -- 5…Results -- 5.1 PID Controller Module -- 5.2 Video Processing Module -- 6…Conclusion -- References -- 7 A Review of Global Path Planning Algorithms for Planar Navigation of Autonomous Underwater Robots -- Abstract -- 1…Introduction -- 2…Global Path Planning Algorithms -- 2.1 Breadth First Search (BFS) Algorithm -- 2.2 Depth First Search (DFS) Algorithm -- 2.3 A* Algorithm -- 2.4 Dijkstra's Algorithm -- 2.5 Wall Following Algorithm -- 3…Results and Discussion -- 3.1 Path Planning Through Randomly Located Obstacles -- 3.2 Maze Solving: A Comparison -- 3.3 Maze Solving by Wall Following Algorithm -- 3.4 Breadth First Search (BFS) and Depth First Search (DFS): A Comparison -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 8 Pseudo-Fractional Tap-Length Learning Based Applied Soft Computing for Structure Adaptation of LMS in High Noise Environment -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Existing Algorithms for Dynamic Tap-Length Selection -- 3.1 The Fractional Variable Tap-Length Learning Algorithm -- 4…The VT-VSLMS Algorithm -- 5…Dynamic Tap-Length Optimization -- 6…Proposed Pseudo-Fractional Tap-Length Optimization -- 7…Simulation Setup -- 8…Results and Discussion -- 9…Conclusion -- References -- 9 Medical Image Analysis Using Soft Computing Techniques -- Abstract -- 1…Introduction -- 2…Image Database -- 3…Methodology -- 3.1 Algorithms for Brain Image Segmentation -- 3.2 Algorithms for Retinal Image Classification. , 4…Experimental Results and Discussions -- 4.1 Result Analysis of Brain Image Segmentation -- 4.2 Result Analysis of Retinal Image Classification -- 5…Conclusion -- Acknowledgments -- References -- 10 Selection of Robotic Grippers Under MCDM Environment: An Optimized Trade Off Technique -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Problem Formulation -- 4…MCDM Methodologies -- 4.1 Analytic Hierarchy Process -- 4.2 TOPSIS -- 4.3 VIKOR -- 5…Solution Using AHP -- 6…Solution Using TOPSIS Methodology -- 7…Solution Using VIKOR Methodology -- 8…Conclusion -- References -- 11 Numerical Study of Viscous Flow in the Hydraulic System of Electro Optical Tracking System -- Abstract -- 1…Introduction -- 1.1 Description of the Hydraulic Systems -- 1.1.1 Oil Reservoir -- 1.1.2 Gear Pump -- 1.1.3 Manifold Block -- 1.1.4 Valves -- 1.1.5 Hydraulic Rotary Actuators -- 1.1.6 Electrical Panel -- 1.2 Selection of Fluid -- 2…Problem Formulation -- 2.1 Mathematical Modeling of Flow -- 2.2 Finite Difference Method for Solving the EOTS Pipeline Axial Flow -- 2.3 Problem Solving -- 3…Numerical Results and Analysis -- 3.1 Axial Velocity Distribution of EOTS Pipeline Axial Flow Field -- 3.2 Relationship Curve Between Axial Velocity and Cross Sectional Length of EOTS Pipeline Flow -- 3.3 Relationship Curve Between Wall Shear Stress and Cross Sectional Width and Height -- 3.4 Computation of f Re -- 4…Conclusion -- Acknowledgments -- A.x(118). Appendix: A -- A.x(118). Appendix: B -- References -- 12 Comparison of Edge Detection Algorithm for Part Identification in a Vision Guided Robotic Assembly System -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Structure -- 4…Edge Detection -- 4.1 Sobel Operator -- 4.2 Robert's Cross Operator -- 4.3 Prewitt's Operator -- 4.4 Laplacian of Gaussian Operator -- 4.5 Canny's Edge Detection Algorithm. , 5…Region Growing Algorithm -- 6…Shape Descriptor -- 7…Results and Discussion -- 7.1 Result of Canny's Operator -- 7.2 Result of LOG Operator -- 7.3 Result of Prewitt Operator -- 7.4 Result of Sobel Operator -- 7.5 Result of Roberts Operator -- 7.6 Comparision of Results -- 8…Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: User interfaces (Computer systems). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (525 pages)
    Edition: 1st ed.
    ISBN: 9788132220091
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.309
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 1.1 Data Aggregation -- 1.2 Data Aggregation Security Concerns -- 2…Secure Data Aggregation Protocols -- 2.1 Secure Data Aggregation Based on Cryptographic Techniques -- 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography -- 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography -- 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function -- 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes -- 2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation -- 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques -- 3…Comparison of Secure Data Aggregation Protocols -- 4…Conclusion -- References -- 2 Secure and Dynamic IP Address Configuration Scheme in MANET -- Abstract -- 1…Introduction -- 2…Related Work Review -- 3…Proposed Work -- 4…Conclusion -- References -- 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Proposed Scheme -- 4…Conclusion -- References -- 4 Dual Security Against Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Route Discovery Phase Detection -- 3.2 Data Transmission Phase -- 4…Conclusion and Future Scope -- References -- 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Proposed Detection Algorithm -- 4…Conclusion and Future Work -- References -- 6 Frequency Domain Incremental Strategies Over Distributed Network -- Abstract -- 1…Introduction -- 2…Estimation Problem and the Adaptive Distributed Solution. , 3…Frequency-Domain Adaptive Distributed Solution -- 3.1 DCT-LMS and DFT-LMS Algorithm -- 4…Simulation -- 5…Conclusion -- References -- 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- Abstract -- 1…Introduction -- 1.1 MAC Layer Architecture -- 1.2 QoS Classes -- 1.3 Scheduler at MAC Layer -- 2…Literature Survey -- 3…Methodology -- 3.1 Design of Scheduler -- 4…Mathematical Model -- 4.1 Probability of Packets Being Served -- 4.2 Average Waiting Time -- 4.3 Average Time Spent by a Packet in Queue Ws -- 5…Result Analysis -- 6…Conclusion -- References -- 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Proposed Architecture and Methodology -- 3…Result Analysis -- 4…Conclusion -- References -- 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Abstract -- 1…Introduction -- 2…Literature Review -- 3…The Procedure -- 3.1 Initialization Phase -- 3.2 Detection and Reporting Phase -- 3.3 Action Phase -- 4…Implementation and Result Analysis -- 5…Conclusion -- References -- 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Wireless Sensor Network Routing Algorithms -- 2.1 Flat Routing Protocols -- 2.2 Hierarchical Routing Algorithms -- 2.3 Location-Based Protocols -- 2.4 Related Work -- 3…Simulation Setup -- 3.1 Result and Analysis -- 4…Conclusion -- References -- 11 Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic -- Abstract -- 1…Introduction -- 1.1 IEEE 802.11 Mechanism -- 1.2 IEEE 802.11e Mechanism -- 2…Simulation Model and Performance Analysis -- 2.1 Simulation Model -- 2.2 Simulation Parameter -- 2.3 Results -- 3…Conclusion -- References. , 12 A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range -- Abstract -- 1…Introduction -- 2…Related Work on Connected Dominating Set -- 3…Proposed Algorithm -- 3.1 Network Model -- 3.2 Proposed Approach -- 3.2.1 Algorithm: Determination of P-CDS of a Graph -- 3.2.2 Diagrammatical Illustration of Algorithm -- 4…Performance Analysis -- 5…Conclusion -- References -- 13 Token Based Group Local Mutual Exclusion Algorithm in MANETs -- Abstract -- 1…Introduction -- 2…Related Works -- 3…GLME Algorithm -- 3.1 Working -- 3.2 Data Structure -- 3.3 Messages -- 3.4 Pseudocode of Algorithm at Node i -- 4…Performance Analysis -- 5…Conclusions and Future Scope -- References -- 14 A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Coverage Algorithm for Anchor Node Deployment -- 3…Encryption and Decryption -- 4…Route Discovery Process -- 5…Performance Evaluation -- 6…Conclusions -- References -- 15 Characteristic Function for Variable-Bit-Rate Multimedia QoS -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Model for Mapping QoS of Variable-Bit-Rate Multimedia -- 4…Numerical Results -- 5…Conclusion -- References -- 16 A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition -- Abstract -- 1…Introduction -- 2…Preliminaries -- 2.1 Vector Decomposition Problem -- 2.2 Trapdoor VDP -- 3…Proposed Oblivious Transfer Using Vector Decomposition -- 3.1 Correctness of Our OT Scheme -- 4…Conclusion and Future Work -- References -- 17 Query by Humming System Through Multiscale Music Entropy -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Proposed Query by Humming System -- 3.1 Preprocessing -- 3.2 Framing -- 4…Entropy Estimation -- 4.1 Shannon Entropy -- 4.2 Multiscale Entropy -- 4.3 Multiscale Music Entropy. , 5…Kd Tree-Based Indexing -- 6…Query Processing and Searching -- 7…Results and Discussions -- 7.1 Performance Analysis -- 8…Conclusions -- References -- 18 An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Discrete Wavelet Transform for EEG Signal Decomposition -- 4…Training Algorithms for MLPNN -- 4.1 Backpropagation -- 4.2 Manhattan Update Rule -- 4.3 Resilient Propagation -- 5…Experimental Study, Results, and Analysis -- 6…Summary and Conclusion -- 19 Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Envisioned Query by Humming System -- 4…Perceptual Analysis -- 4.1 Spectral Centroid -- 4.2 Spectral Spread -- 4.3 Pitch Class Profile or Chroma -- 4.3.1 Preprocessing -- 4.3.2 Frequency Mapping -- 4.3.3 Postprocessing -- 4.4 Harmonicity -- 4.4.1 Harmonic Spectral Centroid -- 4.4.2 Harmonic Spectral Spread -- 5…Context Drift Information Analysis -- 5.1 Perceptual Feature Space -- 5.2 Transfer Entropy Estimation -- 6…Results and Discussions -- 7…Conclusions -- References -- 20 First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm -- Abstract -- 1…Introduction -- 2…Basic Concepts -- 3…SRM-FF Algorithm -- 4…Evaluations -- 5…Conclusion -- References -- 21 A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks -- Abstract -- 1…Introduction -- 2…Proposed Work -- 2.1 Proposed Work Architecture -- 2.2 Proposed Algorithm -- 2.3 Proposed Embedding Scheme -- 3…Experimental Results and Comparison Analysis -- 3.1 Evaluation Based on Stego-Image Quality and Payload Capacity. , 3.2 Evaluation Based on Resistance to Stastical Attacks -- 4…Conclusions -- References -- 22 A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Area-Based Stereo Matching -- 4…Experiment Results -- 4.1 Method of Evaluation -- 4.2 Robustness to Change in Illumination -- 4.3 Robustness to Change in Exposure -- 5…Conclusion -- Acknowledgement -- References -- 23 A Hybrid Motion Based-Object Tracking Algorithm for VTS -- Abstract -- 1…Introduction -- 2…The VTS and Its Challenges -- 3…Motion-Based Object Tracking Scheme -- 4…Simulation Results -- 5…Conclusion and Future Work -- References -- 24 Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi's Method -- Abstract -- 1…Introduction -- 2…Taguchi's Optimization Method -- 2.1 Designing of Input Parameter Using OA -- 2.2 Building of Response Table -- 2.3 Optimal Level Values Identification and Confirmation Experiment -- 2.4 Reducing the Optimization Range -- 2.5 Checking of Level Values and Termination Criteria -- 3…Experimental Results -- 4…Conclusion -- References -- 25 A Novel Approach for Jamming and Tracking of Mobile Objects -- Abstract -- 1…Introduction -- 2…Smart Antenna -- 3…Algorithm Applied in the System -- 4…Simulation Results -- 5…Conclusion -- References -- 26 Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System -- Abstract -- 1…Introduction -- 2…Mathematical Model -- 2.1 STBC Encoding Scheme -- 3…Communication System Model -- 3.1 STBC Decoding Scheme -- 4…Results and Discussion -- 5…Conclusions -- References -- 27 On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application -- Abstract -- 1…Introduction -- 2…Antenna Design and Parametric Study -- 3…Results and Discussion -- 3.1 Return Loss. , 3.2 Current Distribution.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Paleobiology-India. ; Plate tectonics-India. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (472 pages)
    Edition: 1st ed.
    ISBN: 9783030497538
    Series Statement: Vertebrate Paleobiology and Paleoanthropology Series
    Language: English
    Note: Intro -- Foreword -- References -- Preface -- Contents of the Volume -- References (those listed in Prof. Ashok Sahni's bibliography below are not included here) -- Bibliography of Ashok Sahni -- Contents -- Contributors -- 1 First Ornithischian and Theropod Dinosaur Teeth from the Middle Jurassic Kota Formation of India: Paleobiogeographic Relationships -- Abstract -- Introduction -- Geological Setting -- Age -- Methods and Materials -- Locality Information -- Fossils Collected -- Institutional Abbreviations -- Systematic Paleontology -- Discussion -- Biogeographic Links of the Kota Vertebrate Fauna -- Conclusions -- Acknowledgements -- References -- 2 Upper Gondwana (Jurassic to Early Cretaceous) Palynoflora of India: Its Correlation with Other Gondwana Continents and Phytogeographical Implications -- Abstract -- Introduction -- Geological Setting and Lithostratigraphy -- Jurassic -- Early Cretaceous -- Palynosequencing of the Jurassic and Early Cretaceous Deposits -- Jurassic -- Inter-basinal Correlation -- Jurassic-Cretaceous Boundary -- Early Cretaceous -- Inter-basinal Correlation -- Tectonics Versus Eustasy -- Intra-Gondwanan Correlation -- Paleovegetation and Paleoenvironment -- Phytogeography -- Conclusions -- Acknowledgements -- References -- 3 A Third, Remarkably Small, Tribosphenic Mammal from the Mesozoic of Australia -- Abstract -- Introduction -- Methods -- Type Locality -- Type Horizon, Rock Unit and Age -- Institutional Abbreviation -- Systematic Paleontology -- Discussion and Conclusions -- Acknowledgements -- References -- 4 Evidence for a Remarkably Large Toothed-Monotreme from the Early Cretaceous of Lightning Ridge, NSW, Australia -- Abstract -- Introduction -- Institutional Abbreviations -- Systematic Paleontology -- Conclusions -- Acknowledgements -- References. , 5 Role of Plate Tectonics and Global Climate Change in the Evolution of Angiosperms -- Abstract -- Introduction -- Palynological Records -- Pre-cretaceous Records -- Early Cretaceous Records -- Late Cretaceous Records -- Discussion -- Evolution of Angiosperm -- Angiosperm Evolution versus Tectonics -- Paleobotanical Records of Angiosperm Evolution -- Future Prospects -- Acknowledgements -- References -- 6 Anuran Lissamphibian and Squamate Reptiles from the Upper Cretaceous (Maastrichtian) Deccan Intertrappean Sites in Central India, with a Review of Lissamphibian and Squamate Diversity in the Northward Drifting Indian Plate -- Abstract -- Introduction -- Repository -- Systematic Paleontology -- Taxonomic Status of Amphibians and Squamates from the Maastrichtian of India: An Overview -- Amphibians -- Squamates -- Comparison with the Anuran and Squamate Diversities in Other Continents -- Conclusions -- Acknowledgements -- References -- 7 Chelonian Pelomedusoides Remains from the Late Cretaceous of Upparhatti (Southwestern India): Systematics and Paleobiogeographical Implications -- Abstract -- Introduction -- Geology -- Turtle Yielding Cretaceous Localities of India -- Southwestern India -- Upparhatti, Belgaum District, Karnataka State (Fig. 7.1G) -- Western India -- Worli Hill (Fig. 7.1C) -- Amboli (Fig. 7.1B) -- Lakshmipur, Kachchh, Gujarat State (Fig. 7.1A) -- Central India -- Kisalpuri, Dindori District, Madhya Pradesh State (Fig. 7.1D) -- Pisdura Area, Chandrapur District, Maharashtra State (Fig. 7.1F). -- Dongargaon, Chandrapur District, Maharashtra State (Fig. 7.1F) -- Southeastern India -- Kunnam Locality, Perambalur District., Tamil Nadu State (Fig. 7.1H) -- Kallamedu Locality -- Material and Methods -- Abbreviations -- Systematic Paleontology -- Discussion -- Conclusion -- Taxonomic Implications -- Paleobiogeographical Implications. , Acknowledgements -- Appendix: Other Horizons of the Indian Subcontinent (Outside India) from Which a Pleurodiran was Documented -- References -- 8 The Age of Dinosaurs in the Land of Gonds -- Abstract -- Introduction -- Dinosaurs in Gondwana and Post-Gondwana Formations -- Dawn: The Beginnings of Dinosaurs in the Late Triassic -- Discovery of Indian Dinosaurs -- Lower Maleri Formation (Late Carnian-Early Norian) -- Upper Maleri Formation (Late Norian) -- Lower Dharmaram Formation (Rhaetian) -- End-Triassic Mass Extinction Event -- Day: Triumph of the Dinosaurs in the Jurassic -- Upper Dharmaram Formation (Early Jurassic, Hettangian) -- Lower Kota Formation (Sinemurian-Toarcian) -- Upper Kota Formation -- Upper Jurassic Bagra Formation -- Origin and Early Evolution of Sauropodomorpha -- Evening: Dinosaurs in the Drifting Indian Plate During the Cretaceous -- Nimar Sandstone (Cenomanian-Turonian) -- Lameta Formation (Maastrichtian) -- A Passage to India: Discovery of Cretaceous Dinosaurs -- The Lameta Dinosaurs -- Titanosaurs -- Abelisaurs -- Ankylosaurs -- Kallamedu Formation -- Dinosaur Eggs and Babies -- Dinosaur Coprolites and Food Preference -- Night: Death of the Dinosaurs -- Asteroid Impacts -- Chicxulub Crater, Yucatan Peninsula, Mexico -- Shiva Crater, Mumbai Offshore Basin, India -- Killing Mechanism -- Deccan Volcanism -- Impact-Induced Volcanism -- Aftermath of the K-Pg Extinction -- Acknowledgements -- References -- 9 Leaving Gondwana: The Changing Position of the Indian Subcontinent in the Global Faunal Network -- Abstract -- Introduction -- Methods -- Faunal Similarity Networks -- Global Patterns -- Data Collection -- Results and Discussion -- The Late Cretaceous of the Indian Subcontinent -- The Paleocene of the Indian Subcontinent -- The Eocene of the Indian Subcontinent -- Global Faunal Network of the Cretaceous and Paleogene. , Density, Centrality, and Modularity -- A Theoretical Paleocene Fauna from the Indian Subcontinent -- Conclusions -- Acknowledgments -- Appendix 1: Data and Bins -- Appendix 2: Faunal Network Function -- References -- 10 Island Africa and Vertebrate Evolution: A Review of Data and Working Hypotheses -- Abstract -- Introduction -- The Native African Fauna (Fig. 10.2) -- The Fauna of the Island Africa -- The Fate of the Native Fauna (Fig. 10.2) -- The Island Africa: an Underpopulated Biotic Province? -- Colonization of Island Africa by Newcomers (Figs. 10.4, 10.5) -- Africa as a Secondary Cradle -- The End of Isolation of Africa -- Conclusions -- Acknowledgements -- References -- 11 Contrasting Biomarker Signatures of Cretaceous and Early Paleogene Coal-Bearing Sediments During the Northward Flight of India -- Abstract -- Introduction -- Material and Methods -- Sampling -- Analytical Method -- Results -- Terpenoid Composition of Early Cretaceous Sediments -- Aliphatic Fraction -- Aromatic Fraction -- Terpenoid Composition of Eocene Sediments -- Aliphatic Fraction -- Aromatic Fraction -- Discussion -- Inferences from Early Cretaceous Terpenoids -- Inferences from Eocene Terpenoids -- Implications for Early Cretaceous and Eocene Vegetation of India -- Conclusions -- Acknowledgements -- References -- 12 New Specimens of Frugivastodon (Mammalia: Apatotheria) from the Early Eocene of India Confirm Its Apatemyid Status and Elucidate Dispersal of Apatemyidae -- Abstract -- Introduction -- Material and Methods -- Abbreviations -- Institutional Abbreviations -- Measurements -- Systematic Paleontology -- Phylogenetic Analysis -- Objectives and Methodology -- Results -- Discussion -- Discussion -- Relationships of Frugivastodon -- Geographic Origin of Frugivastodon and the Dispersal of Apatemyids -- Conclusions -- Acknowledgements -- References. , 13 Size Variation Amongst the Non-volant Mammals from the Early Eocene Cambay Shale Deposits of Western India: Paleobiogeographic implications -- Abstract -- Introduction -- Methodology -- Timing of India-Eurasia Collision -- A Brief Historical Background of Biogeographically Important Vertebrate Fossil Record (Including Mammals) from the Cretaceous-Paleogene (K-Pg) Interval of India -- Age of the Cambay Shale Mammals -- Size Variation Amongst the Non-volant Mammalian Groups Known from the Cambay Shale -- Evolutionary Relationship(s) of the Large-Sized Component (Perissodactyls) from the Cambay Shale -- Discussion -- Caveats -- Acknowledgements -- Appendix -- References -- 14 Indohyus, Endemic Radiation of Raoellid Artiodactyls in the Eocene of India and Pakistan -- Abstract -- Introduction -- Materials and Methods -- Acronyms -- Systematic Paleontology -- Discussion -- References -- 15 The Murine Cradle -- Abstract -- Introduction -- Previous Work -- Materials and Methods -- Systematics -- Great Morphological Variation of Early Murines -- Early Murine Evolution in the Semi-isolated Cradle of the Indian Subcontinent -- Interpretation -- Acknowledgments -- References -- 16 New Data on the Siwalik Murines, Rhizomyines and Ctenodactylines (Rodentia) from the Indian Subcontinent -- Abstract -- Introduction -- Previous Work -- Muridae -- Spalacidae -- Ctenodactylidae -- Material and Methods -- Systematics -- Phylogenetic Analyses -- Characters -- Spalacids -- Characters -- Paleobiogeography -- Conclusions -- Acknowledgements -- References -- 17 Dispersal of Miocene Hominoids (and Pliopithecoids) from Africa to Eurasia in Light of Changing Tectonics and Climate -- Abstract -- Introduction -- Hominoid Systematics -- The First Eurasian Apes: Early Catarrhine Dispersals Out of Africa in the Miocene. , How Many Transcontinental Ape Dispersal Events Occurred and Between Which Continents? Biogeographic Links to Phylogeny, Tectonics, and Climate.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (902 pages)
    Edition: 1st ed.
    ISBN: 9783319690964
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.686
    DDC: 006.3 23
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Autonomous Systems -- Prediction of Rolling Force Based on a Fusion of Extreme Learning Machine and Self Learning Model of Rolling Force -- Abstract -- 1 Introduction -- 2 ELM Algorithm -- 3 Rolling Force Mathematical Model -- 4 Rolling Force Model Self Learning of Finishing Mill -- 5 Forecasting Experiment and Result Based on Rolling Force of ELM -- 6 Conclusion -- References -- User Behavior Profiles Establishment in Electric Power Industry -- Abstract -- 1 Introduction -- 2 Related Work -- 3 User Label System of Electric Power Industry -- 3.1 Behavior Label -- 3.2 Behavior Description Label -- 3.3 Behavior Prediction and User Classification Label -- 4 Label Generation Technique -- 4.1 Label Generation Technique Based on Clustering Algorithm -- 5 Experiment and Analysis -- 5.1 Generate the Behavior Label -- 5.2 Generate the Behavior Description Label -- 5.3 Generate the Behavior Prediction Label and User Classification Label -- 6 Conclusion -- References -- The Optimal Pan for Baking Brownie -- Abstract -- 1 Introduction -- 2 The Distribution of Heat for Pan -- 2.1 Finite Element Analysis -- 2.2 Edge Cutting Model -- 3 Conclusion -- Acknowledgements -- References -- Intelligent Steering Control Based the Mathematical Motion Models of Collision Avoidance for Fishing Vessel -- Abstract -- 1 Introduction -- 2 Intelligent Steering Control Based the Mathematical Motion Models of Collision Avoidance for Fishing Vessel -- 2.1 Merchant Ship Maneuvering Motion Equation -- 2.2 Merchant Ship Intelligent Steering Control -- 2.3 Acquisition of Collision Avoidance Elements -- 3 Application -- 3.1 Simulation Object and Conditions Setting -- 3.2 Simulation Results and Analysis -- 4 Conclusion -- Acknowledgements -- References -- Dynamical Analysis of Fractional-Order Hyper-chaotic System -- Abstract. , 1 Introduction -- 2 Related Work -- 2.1 Fractional-Order Hyper-chaotic Complex System -- 2.2 Dynamic Behavior Analysis of the System -- 2.2.1 System Equilibrium Point -- 2.2.2 The Influence of System Order Variation on the System -- 2.2.3 The Influence of System Parameter Change on the System -- 3 Conclusion -- References -- Evaluating the Performance of the Logistics Parks: A State-of-the-Art Review -- Abstract -- 1 Introduction -- 2 Review on the Evaluation Index System -- 2.1 Establishment of the Evaluation Index System -- 2.2 Discussion on the Evaluation Index System -- 3 Review on the Evaluation Models -- 3.1 Analysis on the Evaluation Models -- 3.2 Discussion on the Evaluation Models -- 4 Conclusions -- Acknowledgements -- References -- A Tabu Search Algorithm for Loading Containers on Double-Stack Cars -- Abstract -- 1 Introduction -- 2 Problem Description -- 2.1 Background Information -- 2.2 Optimization Strategy -- 3 Tabu Search Algorithm for the Container Loading Problem -- 3.1 Introduction to the Algorithm -- 3.2 Tabu Search Algorithm Design -- 4 Numerical Cases -- 5 Conclusions -- Acknowledgements -- References -- Optimization Model Under Grouping Batch for Prefabricated Components Production Cost -- Abstract -- 1 Introduction -- 2 Problem Description and Variables Defining -- 2.1 Problem Description -- 2.2 Variables Defining -- 3 Model Establishing -- 4 Application Instance and Comparative Analysis -- 4.1 Application Instance -- 4.2 Comparative Analysis -- 5 Conclusion -- Acknowledgements -- References -- Air Quality Evaluation System Based on Stacked Auto-Encoder -- Abstract -- 1 Introduction -- 2 The Methods -- 2.1 Introduction to Traditional Method -- 2.2 AQES-SAE System -- 3 The Experiments -- 3.1 Classification with Improved K-means Algorithm -- 3.2 Identification with the SAE Model -- 4 The Results -- 4.1 Clustering Analysis. , 4.2 Superiority of the AQES-SAE System -- 5 Summary -- References -- Pattern Recognition and Vision Systems -- Urban-Rural Difference of the Coupling Between Social-Economic Development and Landscape Pattern in Chengdu Plain -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 2.1 Study Area and Data Source -- 2.2 Coupling Model -- 3 Results -- 3.1 Urban-Rural Differences in Landscape Pattern -- 3.2 Urban-Rural Coupling Differences Between the Landscape Pattern and the Social-economic Development -- Acknowledgments -- References -- A New Model and Algorithm for Clustering -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 New Model of Clustering -- 2.2 Compact Homogenizing of Class -- 2.2.1 The Establishment of Similar Graph Matrix -- 2.2.2 The Establishment of Compact Homogenizing Between Class -- 2.3 Size Similarity Between Class -- 2.4 Cluster Model -- 3 Algorithm -- References -- Gibbs Phenomenon for Bi-orthogonal Wavelets -- Abstract -- 1 Introduction -- 2 Preliminaries -- 3 Gibbs Phenomenon of Biorthogonal Wavelet Expansion -- 4 Conclusion -- Acknowledgments -- References -- {{\varvec \upalpha}} -Convergence Theory -- Abstract -- 1 Introduction -- 2 {{\varvec \upalpha}} -Adherence Dots and {{\varvec \upalpha}} -Accumulation Dots -- 3 {{\varvec \upalpha}} -Convergence of Nets -- 4 {{\varvec \upalpha}} -Convergence of Ideals -- 5 {{\varvec \upalpha}} -Convergence of Filters -- 6 Relations Among Nets, Ideals, Filters -- 7 Applications of {{\varvec \upalpha}} -Convergence Theory of Nets -- References -- Feature Selection Optimization Based on Atomic Set and Genetic Algorithm in Software Product Line -- Abstract -- 1 Introduction -- 2 Basic Concept -- 2.1 Feature Models -- 2.2 Atomic Sets -- 3 Atomic Sets Computation -- 4 Genetic Algorithm for Feature Selection Optimization -- 4.1 Initial Population -- 4.2 Fitness Function. , 4.3 Crossover Operation -- 4.4 Selection Operation -- 4.5 Mutation Operation -- 4.6 The Flow Diagram of Genetic Algorithm -- 5 Experiment and Analysis -- 5.1 Test Model -- 5.2 Experiment Result and Analysis -- 5.2.1 The Simulation Results of Atomic Set -- 5.2.2 The Simulation Results of Genetic Algorithm -- 6 Related Work -- 7 Conclusion -- Acknowledgments -- References -- Product Configuration based on Feature Model -- Abstract -- 1 Introduction -- 2 Configuration Architecture Model -- 3 Feature Modeling -- 3.1 Feature Diagram -- 3.1.1 Basic Feature Diagram -- 3.1.2 Cardinality-Based Feature Diagram -- 3.2 Constraints -- 3.2.1 Boolean Constraints -- 3.2.2 Non-Boolean Constraints -- 4 Automated Support -- 4.1 SAT -- 4.2 BDD -- 4.3 CSP -- 5 Feature Selection -- 5.1 Non-collaborative Configuration -- 5.2 Collaborative Configuration -- 6 Conclusion -- Acknowledgments -- References -- Research on Fast Browsing for Massive Image -- Abstract -- 1 Introduction -- 2 Distributed Computing and Image Pyramid -- 2.1 Distributed Computing -- 2.2 MapReduce -- 2.3 Image Pyramid -- 3 MapReduce Model for Massive Image -- 3.1 Data Blocking Prepared for MapReduce -- 3.2 MapReduce Image Model -- 4 Experiment -- 4.1 Experimental Data and Equipment -- 4.2 Experimental Result -- Acknowledgments -- References -- RVM for Recognition of QRS Complexes in Electrocardiogram -- Abstract -- 1 Introduction -- 2 RVM Classifier -- 3 QRS Detection -- 4 Implementation and Performance Evaluation -- 5 Conclusions -- Acknowledgments -- The Architecture of the RFID-Based Intelligent Parking System -- Abstract -- 1 Introduction -- 2 The Research Status of the Intelligent Parking System -- 3 The Overall Configuration of the System -- 3.1 The Basic Flow of the Intelligent Parking System -- 3.1.1 The Parking Process of the Vehicle with Legal e-tag. , 3.1.2 The Parking Process of the Vehicle Without Legal e-tag -- 3.1.3 The Parking Process of the Vehicle Without Enough Electronic Balance -- 3.2 The Design of the Intelligent Parking Management System -- 3.3 The Basic Requirements for the Intelligent Parking System -- 4 Summary -- References -- A Review of Cognitive Psychology Applied in Robotics -- Abstract -- 1 Introduction -- 2 Robot Affective Computing and Interaction -- 2.1 Emotion Recognition -- 2.2 Affective Modeling -- 2.3 Emotion Expression -- 3 Application of Robot Cognition -- 3.1 Robot Autism Intervention -- 3.2 Robot Education -- 3.3 Household and Nursing Robot -- 4 Conclusion and Prospect -- Acknowledgments -- References -- Robot Vision Navigation Based on Improved ORB Algorithm -- Abstract -- 1 Introduction -- 2 Improved ORB Algorithm -- 2.1 Extreme Points in Scale Space Detection -- 2.2 Extract Stable Feature Points -- 3 Visual Navigation Method -- 4 Experimental Results -- 5 Conclusion -- References -- An Improved Multi-label Relief Feature Selection Algorithm for Unbalanced Datasets -- Abstract -- 1 Introduction -- 2 ReliefF Algorithm -- 3 UBML-ReliefF Algorithm -- 4 Experiment -- 4.1 Datasets -- 4.2 Performance Evaluation Index -- 4.3 Experiment and Results Analysis -- 5 Conclusion -- Acknowledgements -- References -- Area Topic Model -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Area-LDA Topic Model -- 3.1 Overall Design of Area-LDA -- 3.2 Process of Estimator -- 4 Experiments -- 4.1 Dataset -- 4.2 Experiment Settings -- 4.3 Experimental Restuls -- 5 Conclusions -- References -- Predicting Popularity of Topic Based on Similarity Relation and Co-occurrence Relation -- Abstract -- 1 Introduction -- 2 The SCW Method for Prediction of Topic Popularity -- 2.1 Definition -- 2.2 The Description of Topic Popularity -- 2.3 The Analysis of Similarity Relation. , 2.4 The Analysis of Co-occurrence Relation.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (475 pages)
    Edition: 1st ed.
    ISBN: 9783319495682
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.541
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgments -- Contents -- Autonomous Systems -- Testing Paper Optimization Based on Improved Particle Swarm Optimization -- Abstract -- 1 Introduction -- 2 Background and Relative Researches -- 3 Testing Paper Optimization -- 3.1 Particle Swarm Optimization (PSO) -- 3.2 Parameter Initialization -- 3.3 Evaluation Function of the TPOPSO -- 3.4 The Global and Local Optimum -- 4 Experiment and Discussion -- 4.1 Examination Question Database -- 4.2 The Performance of the TPOPSO -- 5 Conclusion -- References -- The Null Space Pursuit Algorithm Based on an Arbitrary Order Differential Operator -- Abstract -- 1 Introduction -- 2 The Null Space Pursuit Algorithm Based on an Arbitrary Order Differential Operator -- 3 Experiment Result and Analysis -- 4 Summary -- Acknowledgement -- References -- Parameters Estimation of Regression Model Based on the Improved AFSA -- Abstract -- 1 Introduction -- 2 Multiple Linear Regression Model -- 3 AFSA -- 4 The Improved AFSA -- 4.1 The Improvement of Algorithm Parameters -- 4.2 The Improved Swarming Behavior -- 4.3 The Definition of Artificial Fish Individuals and Fitness Function -- 4.4 The Process of the Improved AFSA -- 5 Results and Conclusion -- Acknowledgment -- References -- Research on Hysteresis Modeling for Piezoelectric Displacement Actuators -- Abstract -- 1 Introduction -- 2 The Symmetry and Features of Hysteretic Loop Curves for a PZT Patch -- 2.1 Hysteretic Loop and Central Symmetry -- 2.2 Foldback Point and Centrosymmetric Center -- 2.3 The Variation of Loops, Their Upgrading/Degrading and Emerging/Vanishing -- 3 Mathematic Model -- 4 Experimental Results -- 5 Conclusions -- Acknowledgements -- References -- An Iterative Method for the Least Squares Anti-bisymmetric Solution of the Matrix Equation -- Abstract -- 1 Introduction -- 2 An Iterative Method for Solving Problem I. , 3 The Solution for Problem II -- References -- Parallelization of the Conical Area Evolutionary Algorithm on Message-Passing Clusters -- Abstract -- 1 Introduction -- 2 Partially Evolved Parallelization of CAEA -- 2.1 Partially Evolved Island Model -- 2.2 Elitist Migration Among Islands -- 2.3 Dynamic Directional Migration Topology -- 2.4 Procedure of PeCAEA -- 3 Experimental Results and Analysis -- 4 Conclusions -- Acknowledgments -- References -- Design of Heat Preservation Bathtub with Water Saving -- Abstract -- 1 Introduction -- 2 Problem Description -- 3 The Model -- 3.1 Analysis of Bath Process -- 3.2 Analysis of Heat Gain and Loss -- 3.3 A Double Multi-objective Optimization Model -- 3.4 Effect of Bubble Bath Agent -- 4 Sensitivity Analysis -- 5 Conclusion -- References -- A Label-Correlated Multi-label Classification Algorithm Based on Spearman Rank Correlation Coefficient -- Abstract -- 1 Introduction -- 2 An Introduction to Related Algorithms -- 2.1 Spearman Rank Correlation Coefficient -- 2.2 Confidence and Confidence Interval -- 2.3 Multi-label Classification Strategy of Adaboost-SVM -- 3 Label-Correlated Multi-label Classification Model Algorithm (LC-ASVM) -- 3.1 General Design -- 3.2 Correlation Analysis of Characteristics -- 3.3 Confidence Form Multi-label SVM -- 3.4 Build LC-ASVM Model -- 4 Experiment and Analysis -- 4.1 Experimental Datasets -- 4.2 Experimental Results and Analysis -- 5 Conclusions -- References -- Effect of Film Thickness on Load-Carrying Property of Seawater Dynamic-Hydrostatic Hybrid Thrust Bearing -- Abstract -- 1 Introduction -- 2 Brief of Seawater-Lubricated Hydrostatic-Dynamic Thrust Bearing -- 2.1 Lubricate Flow Through the Channel in the Sector Opposed Supporting Ladder-Cavity -- 2.2 Supporting Mechanism for Opposed Supporting Ladder-Cavity -- 2.3 Initial Design Parameters of the Thrust Bearing. , 3 Property Index of the Thrust Bearing -- 3.1 Static Property Index -- 3.2 Dynamic Property Index -- 3.3 Vibration Property Index -- 4 Influence of Shallow Cavity Depth on Static Performance -- 5 Influence of Film Thickness on Dynamic Property Index -- 6 Influence of Film Thickness on Vibration Property Index -- 7 Conclusion -- Acknowledgement -- References -- Research on Static Performance of Water-Lubricated Hybrid Bearing with Constant Flow Supply -- Abstract -- 1 Introduction -- 2 Static Performance Analysis -- 2.1 Flow Condition -- 2.2 Bearing Force Calculation -- 2.3 Static Performance Indexes -- 2.4 Influence of Parameter on Static Index -- 3 Conclusion -- Acknowledgement -- References -- A New Method for Desiccant Package Quality Check -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Correct the Captured Image -- 2.2 Wipe Out the Contaminated Samples -- 2.3 Detect the Integrity of the Packaging -- 3 Experiment Result -- 4 Conclusion -- Acknowledgments -- References -- A Novel Algorithm for Laser Spot Detection Based on Quaternion Discrete Cosine Transform -- Abstract -- 1 Introduction -- 2 The Quaternion Discrete Cosine Transform Based Laser Spot Detection -- 2.1 Quaternion Discrete Cosine Transform -- 2.2 Image Moment Method (IMM) -- 3 Experiment -- 4 Conclusions -- References -- Natural Frequency Modification Using Frequency-Shift Combined Approximations Algorithm -- Abstract -- 1 Introduction -- 2 Formulation and Solution -- 2.1 Natural Frequency Sensitivity Analysis Using FSCA Method -- 2.2 Natural Frequency Modification Based on Taylor Series Expansion -- 3 Numerical Example -- 4 Conclusion -- Acknowledgements -- References -- Adaptive Stochastic Ranking Schemes for Constrained Evolutionary Optimization -- Abstract -- 1 Introduction -- 2 Theoretical Analysis and Proposed Approach -- 3 Experimental Results -- 4 Conclusion. , Acknowledgments -- References -- A Case-Based Reasoning Method with Relative Entropy and TOPSIS Integration -- Abstract -- 1 Introduction -- 2 Related Work -- 3 CBR Framwork with Relative Entropy and TOPSIS -- 3.1 Similarity Measure -- 3.2 A New Ensemble Measure -- 4 RTCBR Algorithm -- 5 Experiment Study and Analysis -- 5.1 Experiment Design -- 5.2 Result Analysis -- 6 Conclusion -- Acknowledgment -- References -- An Algorithm Design for Electrical Impedance Tomography Based on Levenberg Method -- Abstract -- 1 Introduction -- 2 Levenberg-Marpuardt Algorithm (L-Algorithm) -- 3 Construct Differential Matrix in L-Algorithm -- 4 Construction of Improved Algorithm for Electrical Impedance Tomography -- 5 Proposed Algorithm and Further Considerations -- 6 Conclusion -- References -- A Return-Value-Unchecked Vulnerability Detection Method Based on Property Graph -- Abstract -- 1 Introduction -- 2 System Design -- 3 Property Graph Representation for Binary Software -- 3.1 Intermediate Representation -- 3.2 Static Analysis Based on Intermediate Representation -- 3.3 Property Graph Generation -- 4 Vulnerability Model and Detect Based on Property Graph -- 4.1 Vulnerability Model -- 4.2 Vulnerability Detection -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Summary -- References -- GA Based Optimization of Sign Regressor FLANN Model for Channel Equalization -- Abstract -- 1 Introduction -- 2 Channel Equalization Model -- 2.1 FLANN Model -- 2.2 Optimization Using GA -- 3 Result and Discussion -- 4 Conclusion -- References -- Research of Chemical Fabric Style Prediction System Based on Integrated Neural Network -- Abstract -- 1 Introduction -- 2 Processing of the Samples Data -- 2.1 Preprocessing of Fabric Structure Parameters -- 2.2 Introduction of Fabric Structure Complexity Factor -- 2.3 Method for Dividing Fabric Subset. , 3 Comparison of Two Predictive Methods -- 3.1 Single BP Neural Network Prediction -- 3.2 Integrated Neural Network Prediction -- 4 Conclusion -- Acknowledgements -- References -- Internet and Cloud Computing -- The Influencing Factor Analysis of Micro-blog User Adding Attend Object -- Abstract -- 1 Introduction -- 2 Relationship Between User Intimacy and Attended Objects -- 2.1 Influence Factors of Intimacy and the Representation -- 2.1.1 Basic Factors -- 2.1.2 Considering Factors -- 2.1.3 Influent Factors -- 2.2 The Definition and Computation of Intimation -- 2.3 The Relationship Between User Intimacy and the Attended Object -- 3 The Relationship Between User's Interest Degree and Attended Object -- 3.1 Interest Similarity Calculation -- 3.2 Recommendation Based on Interest Similarity Relationship -- 4 Experiment and Analyzing -- 4.1 Experimental Environment -- 4.2 Evalution Index of Result -- 4.3 Experimental Results -- 5 Conclusion -- Acknowledgement -- References -- History Path Reconstruction Analysis of Topic Diffusion on Microblog -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 2.1 Basic Definition -- 2.2 Topic Detection -- 2.3 Probabilistic Score Based Diffusion Model -- 3 Experiment Results and Discussion -- 3.1 Experiment Realization -- 3.2 Experimental Results and Analysis -- 4 Conclusion -- Acknowledgements -- References -- A Novel Session Identification Scheme with Tabbed Browsing -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Traditional Browsing and Tabbed Browsing -- 2.2 Survey of Users' Browsing Modes -- 2.3 Tabbed Browsing and Session Identification -- 3 Fixed Threshold Session Identification Scheme -- 4 Novel Session Identification Scheme -- 5 Experiment and Evaluation -- 5.1 Date Preprocessing -- 5.2 Metrics -- 5.3 Performance Evaluation -- 6 Conclusion -- Acknowledgement -- References. , Research of Optimizing the System Partition in Android System.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Management-Data processing. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (678 pages)
    Edition: 1st ed.
    ISBN: 9783030729295
    Series Statement: Modeling and Optimization in Science and Technologies Series ; v.18
    DDC: 658.0563
    Language: English
    Note: Preface -- About This Book -- Contents -- Part I Computational Modelling -- 1 Computational Management-An Overview -- 1.1 Introduction -- 1.2 Computational Intelligence Techniques -- 1.2.1 Fuzzy Logic -- 1.2.2 Artificial Neural Networks -- 1.2.3 Evolutionary Computing -- 1.2.4 Learning Theories -- 1.2.5 Probabilistic Methods -- 1.3 Computational Aspects of Business Management -- 1.3.1 Marketing -- 1.3.2 Sales -- 1.3.3 Customer Relationship Management (CRM) -- 1.3.4 Finance -- 1.3.5 Human Resources -- 1.3.6 Manufacturing -- 1.3.7 Maintenance and Service -- 1.3.8 Research and Development -- 1.4 Benefits and Limitations of Computational Intelligence in Business -- 1.5 Applications of Computational Intelligence in Business -- 1.5.1 Applications of Computational Intelligence in the Field of Marketing -- 1.5.2 Computational Intelligence and Human Resource -- 1.5.3 Computational Intelligence and Finance -- 1.5.4 Computational Intelligence in Operations Management -- 1.6 Conclusion and Future Scope -- References -- 2 Mathematical and Computational Approaches for Stochastic Control of River Environment and Ecology: From Fisheries Viewpoint -- 2.1 Introduction -- 2.2 Stochastic Control -- 2.2.1 Stochastic Differential Equation -- 2.2.2 Performance Index and Value Function -- 2.2.3 HJB Equation -- 2.2.4 Remarks -- 2.3 Specific Problems -- 2.3.1 "Non-renewable" Fishery Resource Management -- 2.3.2 Dam-Reservoir System Management -- 2.3.3 Algae Growth Management -- 2.3.4 Sediment Storage Management -- 2.4 Coupled Problem -- 2.4.1 Overview -- 2.4.2 Control Problem -- 2.4.3 Numerical Scheme -- 2.4.4 Computational Conditions -- 2.4.5 Numerical Computation -- 2.5 Conclusions -- References -- 3 Models and Tools of Knowledge Acquisition -- 3.1 Introduction -- 3.1.1 Knowledge Economy -- 3.2 Literature Review -- 3.2.1 The Role and Importance of Knowledge Acquisition. , 3.2.2 Digitizing Knowledge Acquisition -- 3.3 Knowledge Management and Firm Strategy -- 3.3.1 Strategic Knowledge-An Internal and External Perspective -- 3.3.2 Competitive Intelligence -- 3.4 Knowledge Acquisition: Sources and Techniques -- 3.4.1 External Sources of Knowledge -- 3.4.2 Techniques of Knowledge Acquisition -- 3.5 Role of Technology in Knowledge Acquisition and Management -- 3.5.1 The Emergence of API Economy -- 3.5.2 Artificial Intelligence -- 3.6 Conclusion -- References -- 4 Profits Are in the Eyes of the Beholder: Entropy-Based Volatility Indicators and Portfolio Rotation Strategies -- 4.1 Introduction -- 4.2 Entropy and Its Applications to the VIX -- 4.3 Literature Review -- 4.4 Research Objectives -- 4.5 Theoretical Framework -- 4.6 Data Variables, Measurements, and Sources -- 4.7 Methods and Measures -- 4.8 Empirical Results -- 4.9 Formulation and Testing of Trading Strategies -- 4.10 Summary and Concluding Remarks -- Appendix 1: Trading Strategies Using India VIX Change and the Entropies (Both Approximate and Sample Entropies) Tested Through Simulations -- References -- 5 Asymmetric Spillovers Between the Stock Risk Series: Case of CESEE Stock Markets -- 5.1 Introduction -- 5.2 Related Literature Review -- 5.2.1 (M)GARCH Approaches to Modelling -- 5.2.2 Causality Testing and Cointegration -- 5.2.3 Spillover Methodology Approach -- 5.3 Methodology Description -- 5.3.1 VAR Models and Spillover Index -- 5.3.2 Asymmetric Spillovers -- 5.4 Empirical Results -- 5.4.1 Variable Description -- 5.4.2 Static Results -- 5.4.3 Dynamic Analysis -- 5.4.4 Robustness Checking -- 5.4.5 Simulation of Investment Strategies -- 5.5 Discussion and Conclusion -- Appendix -- References -- 6 Millennial Customers and Hangout Joints: An Empirical Study Using the Kano Quantitative Model -- 6.1 Introduction -- 6.1.1 Motivations of the Study. , 6.1.2 Background of the Study -- 6.2 Literature Review -- 6.3 Model Development -- 6.3.1 Research Gap -- 6.3.2 Research Objectives -- 6.3.3 The Kano Model -- 6.3.4 Research Design -- 6.3.5 Survey Instrument -- 6.4 Results and Discussion -- 6.4.1 Exploratory Factor Analysis Results -- 6.4.2 Reliability Analysis Results -- 6.4.3 Kano Quantitative Analysis Results -- 6.5 Conclusions and Future Scope -- 6.5.1 Conclusions -- 6.5.2 Future Scope -- References -- 7 The Effects of Oil Shocks on Macroeconomic Uncertainty: Evidence from a Large Panel Dataset of US States -- 7.1 Introduction -- 7.2 Data and Methodology -- 7.3 Results and Analysis -- 7.3.1 Linear Impulse Responses -- 7.3.2 Responses of Uncertainty Contingent on High- Versus Low-Oil Dependence States -- 7.3.3 Responses of Uncertainty at Different Horizons Conditioning on Aggregate US Uncertainty Spillovers -- 7.4 Conclusion -- Appendix -- References -- 8 Understanding and Predicting View Counts of YouTube Videos Using Epidemic Modelling Framework -- 8.1 Introduction -- 8.1.1 Literature Review -- 8.2 Building Block for Proposed Epidemic Modelling -- 8.2.1 Epidemic Modelling -- 8.2.2 Assumptions -- 8.2.3 Modelling Information Diffusion as Susceptibility Process -- 8.2.4 Modeling Viewing as Infection Process -- 8.2.5 Particular Case -- 8.3 Numerical Illustration -- 8.4 Results and Interpretation -- References -- 9 Gross Domestic Product Modeling Using ``Panel-Data'' Concept -- 9.1 Introduction -- 9.2 Materials -- 9.3 Statistical Preliminaries and Methods -- 9.4 Results -- 9.5 Concluding Remarks -- References -- 10 Supply Chain Scheduling Using an EOQ Model for a Two-Stage Trade Credit Financing with Dynamic Demand -- 10.1 Introduction -- 10.2 Literature Review -- 10.3 Assumptions and Notations -- 10.3.1 Assumptions: -- 10.3.2 Notations -- 10.4 Mathematical Formulation -- 10.5 Numerical Illustrations. , 10.6 Graphical Representations -- 10.7 Conclusion and Managerial Implications -- References -- 11 Software Engineering Analytics-The Need of Post COVID-19 Business: An Academic Review -- 11.1 Introduction -- 11.2 COVID19-Effects in Business -- 11.2.1 Tourism and Hospitality -- 11.2.2 Airlines and Aviation -- 11.2.3 Oil and Gas -- 11.2.4 Automotive Manufacturing -- 11.2.5 Consumer Products -- 11.2.6 Education -- 11.2.7 Software Industry -- 11.3 Research Methodology -- 11.4 Software Development Life Cycle (SDLC) -- 11.4.1 Software Requirements Analysis -- 11.4.2 Software Design -- 11.4.3 Software Implementation -- 11.4.4 Software Testing -- 11.4.5 Software Deployment -- 11.4.6 Software Maintenance -- 11.5 Software Analytics -- 11.5.1 Literature Analysis -- 11.5.2 Journal Publications with Frequency -- 11.5.3 Citations/Year -- 11.5.4 Software Engineering Analytics: Connotes -- 11.6 Conclusion -- References -- 12 The Rise and Fall of the SCOR Model: What After the Pandemic? -- 12.1 Introduction: The SCOR Model as a Supply Chain Management Foundation -- 12.2 The Evolution of Supply Chain Management -- 12.3 The SCOR Model-A Foundation for Supply Chain Management -- 12.3.1 Supply Chain Optimisation in the Digital Supply Chain Era -- 12.4 Is the Scor Model Still Relevant? -- 12.4.1 The Evolution of the Scor Model -- 12.4.2 The Fall of the Scor Model -- 12.4.3 Is the Resurrection of the Scor Model Possible? -- 12.5 Re-designing the Future of Supply Chains Using Scor -- 12.5.1 Re-designing for Supply Chain Reliability -- 12.5.2 Re-designing for Supply Chain Agility and Responsiveness -- 12.5.3 Re-designing for Supply Chain Asset Management -- 12.6 Concluding Remarks -- References -- Part II Management Optimization -- 13 A Comparative Study on Multi-objective Evolutionary Algorithms for Tri-objective Mean-Risk-Cardinality Portfolio Optimization Problems. , 13.1 Introduction -- 13.2 Portfolio Optimization -- 13.3 Multi-objective Evolutionary Algorithms -- 13.4 Multi-objective Evolutionary Algorithms for Portfolio Optimization Problems-A Literature Review -- 13.4.1 Mean-Variance Portfolio Optimization Using MOEAs -- 13.4.2 Mean-Risk Portfolio Optimization Using MOEAs -- 13.4.3 Three-Objective Portfolio Optimization Using MOEAs -- 13.5 Experimental Results -- 13.6 Conclusion -- References -- 14 Portfolio Insurance and Intelligent Algorithms -- 14.1 Introduction -- 14.2 Portfolio Insurance -- 14.2.1 Multi-period Portfolio Insurance Under Transaction Costs -- 14.3 Intelligent Algorithms -- 14.3.1 Beetle Antennae Search Algorithm -- 14.3.2 Popular Meta-Heuristic Algorithms -- 14.3.3 Multi-objective Optimization -- 14.3.4 The Main Algorithm for the MPMCPITC Problem -- 14.4 Portfolios' Applications with Real-World Data -- 14.4.1 Application in 4 Stocks' Portfolio -- 14.4.2 Application in 8 Stocks' Portfolio -- 14.4.3 Application in 12 Stocks' Portfolio -- 14.4.4 Application in 16 Stocks' Portfolio -- 14.4.5 Results and Performance Comparison of BAS, BA, FA and GA -- 14.5 Conclusion -- References -- 15 On Interval-Valued Multiobjective Programming Problems and Vector Variational-Like Inequalities Using Limiting Subdifferential -- 15.1 Introduction -- 15.2 Definitions and Preliminaries -- 15.3 Relationship Between (GMVVLI), (GSVVLI) and (IVMPP) -- 15.4 Relationship Between (WGMVVLI), (WGSVVLI) and (IVMPP) -- 15.5 Existence Results for (GMVVLI) and (GSVVLI) -- 15.6 Conclusions -- References -- 16 Portfolio Optimization Using Multi Criteria Decision Making -- 16.1 Introduction -- 16.2 An Overview of Multi Criteria Decision Making (MCDM) Process -- 16.3 Classification of Multi Criteria Decision Making Processes -- 16.4 Quantitative Techniques Applied for the MCDM -- 16.5 Financial Decision Problem. , 16.6 Risk Modeling and SWOT Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: Artificial intelligence -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (797 pages)
    Edition: 1st ed.
    ISBN: 9788132220121
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.308
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 Neutrosophic Logic Applied to Decision Making -- Abstract -- 1…Introduction -- 2…Neutrosophic Decision Making Strategies -- 3…Complex Metrics for Digital Learning Object Evaluation -- 4…Practical Experience -- 5…Conclusion -- Acknowledgments -- References -- 2 Transforming e-Government to Smart Government: A South Australian Perspective -- Abstract -- 1…Introduction -- 2…Open Data: Social and Economic Benefits -- 3…Developing Smart Government Through Open Data -- 3.1 Community Engagement and Coproduction -- 3.2 Financial Investment -- 3.3 Automation -- 3.4 Collaboration -- 3.5 Governance -- 4…Conclusion -- References -- 3 An Online Content Syndication Tool with Built-in Search and Social Sharing -- Abstract -- 1…Introduction -- 2…Architecture -- 2.1 RSS Source Listener -- 2.2 Subscription -- 2.3 RESTful Web Service APIs -- 3…Conclusions -- Acknowledgment -- References -- 4 Customizing EPCglobal to Fit Local ONS Requirements -- Abstract -- 1…Introduction -- 2…EPC Framework -- 3…Related Work -- 4…Proposed System and Implementation -- 4.1 Sample Implementation -- 5…Conclusion -- References -- 5 Distributed CloudIMS: Future-Generation Network with Internet of Thing Based on Distributed Cloud Computing -- Abstract -- 1…Introduction -- 2…Evolution of Network and Application -- 2.1 Evolution of Telecommunication (NGN) -- 2.2 Evolution of Cloud Computing -- 2.3 The Internet of Thing: Machine to Machine the Future Internet -- 2.4 Related Work on IMS, IoT, and Cloud Computing -- 3…The CloudIMS Framework Architecture: Our Proposed Future Network -- 3.1 Our Vision of CloudIMS Platform -- 3.2 Architecture of CloudIMS Platform -- 3.3 Operation, Administration, and Maintenance (OA& -- M) of CloudIMS. , 3.4 Discussion and Motivation of Proposed CloudIMS Features and Use Case Study Characteristics -- 4…Conclusion -- References -- 6 Genetic Algorithm-Based Query Expansion for Improved Information Retrieval -- Abstract -- 1…Introduction -- 2…Proposed Approach -- 2.1 Construction of Term Pool -- 2.2 Genetic Algorithm for Selecting Expansion Terms -- 2.2.1 Representation of Chromosome -- 2.2.2 Fitness Function -- 2.2.3 Algorithm for GABQE -- 3…Experiments and Results -- 4…Conclusion -- References -- 7 Genetic Algorithm-Based Adaptive PID Controller -- Abstract -- 1…Introduction -- 2…The Proposed PID Controller -- 2.1 The Conventional PID Controller -- 2.2 The Adaptive PID Controller -- 2.3 GA-Optimized APID -- 2.3.1 Objective Function of the Genetic Algorithm -- 2.3.2 Different Operations Used in GA -- 3…Results -- 4…Conclusion -- References -- 8 Text Mining for Phishing E-mail Detection -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Data set Preparation -- 3.2 Feature Extraction Using Text Mining -- 3.3 Feature Selection -- 3.4 Classification -- 4…Implementation -- 5…Conclusion -- References -- 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Workflow Design -- 4…Multi-objective Scheduling Model -- 5…General CSO Algorithm -- 6…Proposed Algorithm -- 6.1 Seeking Mode -- 6.2 Tracing Mode -- 7…Input Data for Experiment -- 8…Results and Discussion -- 8.1 Output Graphs Generated by MATLAB -- 8.2 Analysis of Resultant Graphs -- 9…Conclusion and Future Scope -- References -- 10 A Case Study of User Behavior in Information Retrieval -- Abstract -- 1…Introduction -- 2…User Behavior in Information Retrieval -- 3…Case Study -- 3.1 Scoring -- 4…Approaches to Incorporating Implicit Feedback -- 5…Conclusion -- References. , 11 Fuzzy Mapping of Robotic Arm Based on LabVIEW -- Abstract -- 1…Introduction -- 2…Implementation of System -- 3…Designing Fuzzy Systems -- 4…A Table LookUp Scheme -- 5…Fuzzy System Design for Robotic Arm -- 6…Mapping for Base of Robotic Arm -- 7…Mapping for Gripping of Object -- 8…Kinematics of Robotic Arm -- 9…Conclusion and Future Work -- References -- 12 An Improvement on NSGA-II for Finding Fast the Better Optimal Solution in Multi-objective Optimization Problem -- Abstract -- 1…Introduction -- 2…A Brief Review on Existing Work -- 3…Proposed Methodology -- 3.1 Algorithm Steps -- 4…Implementation and Result Analysis -- 4.1 Test Problems -- 4.2 Results and Comparison with Other Clustering Methods -- 5…Conclusion and Future Work -- References -- 13 Test Case Creation from UML Sequence Diagram: A Soft Computing Approach -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Work -- 3.1 Proposed Framework -- 3.2 UML Diagram for Design Document -- 3.3 Message Control Flow Graph -- 3.4 Algorithm to Create Test Cases Using GA -- 4…Implementation and Results -- 4.1 Optimization of Test Paths Using GA -- 4.2 Test Case Creation -- 5…Conclusion -- References -- 14 Solving Nonlinear Constrained Optimization Problems Using Invasive Weed Optimization -- Abstract -- 1…Introduction -- 2…Invasive Weed Optimization -- 3…Multistage Penalty Function -- 4…Results and Discussion -- 5…Conclusions -- References -- 15 ESEC: An Ideal Secret Sharing Scheme -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Non-threshold Secret Sharing Scheme Using ECC -- 4…A Multilevel Secret Sharing Scheme -- 5…Implementation and Analysis -- 5.1 Implementation -- 5.2 Analysis -- 6…Conclusion -- References -- 16 Extended Service Registry to Support I/O Parameter-Based Service Search -- Abstract -- 1…Introduction -- 2…Object Relational Database for Service Registry. , 2.1 WSDL and UDDI Relationship -- 2.2 Object Relational Database as Service Registry -- 2.3 Extended Service Registry -- 2.4 I/O Parameter-Based Service Search -- 2.5 Process of Parameter-Based Service Search -- 3…Experimental Results -- 3.1 Experimental Setup -- 3.2 Comparison of Basic Keyword Search in Registries---JUDDI Versus ESR Approach -- 3.3 Performance of Output Parameter-Based Service Search -- 4…Related Work -- 5…Conclusion -- References -- 17 Realizing New Hybrid Rough Fuzzy Association Rule Mining Algorithm (RFA) Over Apriori Algorithm -- Abstract -- 1…Introduction -- 1.1 Data Mining and Association Rule Mining -- 1.2 Fuzzy ARM Concepts and Rough ARM Concepts -- 2…Theoretical Aspects -- 2.1 Rough Set Concepts and Reducts -- 2.2 Information System and Decision System -- 2.3 Fuzzy c-Means Clustering -- 3…Proposed Algorithm -- 3.1 Algorithm Description -- 3.2 Pseudo Code -- 3.3 Analysis -- 4…Conclusion and Future Work -- References -- 18 Modal Analysis of Hand-Arm Vibration (Humerus Bone) for Biodynamic Response Using Varying Boundary Conditions Based on FEA -- Abstract -- 1…Introduction -- 2…The CAD Model -- 3…Boundary Conditions and Material Properties -- 4…Results and Discussion -- 5…Conclusion -- References -- 19 Preserving Privacy in Healthcare Web Services Paradigm Through Hippocratic Databases -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Example Scenario -- 4…Enhancement of Hippocratic Databases Through Analytical Hierarchy Processing -- 5…Conclusions -- References -- 20 Generation of Array Passwords Using Petri Net for Effective Network and Information Security -- Abstract -- 1…Introduction -- 2…Types of Existing Authentication Methods -- 3…Limitations of Existing Methods -- 4…Need of a Good Password -- 5…Petri Net -- 6…Array Token Petri Net Structure -- 6.1 Basic Notations -- 6.2 Catenation Rule -- 6.3 Firing Rules. , 6.4 Set of Labels -- 7…Model Formulation and Generation of Array Passwords -- 7.1 Petri Net to Generate All Possible 2 x 2 Arrays Over the Alphabet {a, b} -- 7.2 Firing Sequences -- 8…Conclusion -- References -- 21 Application of Genetic Algorithm for Component Optimization to Deploy Geoprocessing Web -- Abstract -- 1…Introduction -- 2…Approaches for Geoprocessing -- 3…The Geoprocessing Web and Component Optimization -- 4…Proposed Work -- 5…Conclusions -- References -- 22 DNA-Based Cryptographic Approach Toward Information Security -- Abstract -- 1…Introduction -- 2…Brief Idea of DNA -- 3…Literature Review -- 4…Proposed Method -- 4.1 Encryption -- 4.1.1 Algorithmic Steps -- 4.2 Embedding -- 4.2.1 Algorithmic Steps -- 5…Algorithmic Presentation -- 5.1 Key Selection -- 5.2 Message Encryption -- 6…Conclusion -- References -- 23 Design a Fuzzy Logic Controller with a Non-fuzzy Tuning Scheme for Swing up and Stabilization of Inverted Pendulum -- Abstract -- 1…Introduction -- 2…Inverted Pendulum Description -- 3…Controller Design -- 4…Proposed Tuning Scheme -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 24 Use of Machine Learning Algorithms with SIEM for Attack Prediction -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Frame Work -- 3.1 OSSIM -- 3.2 Dataset and Feature Selection -- 3.3 Find Feature Set Using Information Gain -- 3.4 Classification and Prediction -- 4…Conclusion -- References -- 25 Performance Comparison of Single-Layer Perceptron and FLANN-Based Structure for Isolated Digit Recognition -- Abstract -- 1…Introduction -- 2…Data Set and Feature Extraction -- 2.1 Calculation of Gradient [13] -- 2.2 Generation of Feature Vector [13] -- 2.3 Dimension Reduction -- 3…Classification -- 3.1 Single-Layer Perceptron Structure -- 3.2 FLANN Structure -- 4…Simulation Result -- 5…Conclusion -- References. , 26 Computational Techniques for Predicting Cyber Threats.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...