GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Singapore :Springer,  (7)
  • New Delhi :Springer (India) Private Limited,  (5)
  • Hindawi  (3)
  • 1
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (585 pages)
    Edition: 1st ed.
    ISBN: 9789811697357
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.285
    DDC: 006.3
    Language: English
    Note: Intro -- ICAIT-2021 Organization -- Preface -- Contents -- About the Editors -- Part I Invited Papers -- 1 Utilization of the Open-Source Arduino Platform to Control Based on Logic Eτ -- 1.1 Introduction -- 1.2 Theoretical Reference -- 1.2.1 Irrigation System -- 1.2.2 Irrigation Methods and Systems -- 1.2.3 Localized Irrigation -- 1.2.4 Paraconsistent Logic -- 1.2.5 Paraconsistent Annotated Evidential Logic Eτ -- 1.2.6 Para-Analyser Algorithm -- 1.2.7 Arduino -- 1.3 Methodology -- 1.4 Results -- 1.5 Conclusion -- References -- 2 Ontology Implementation of OPC UA and AutomationML: A Review -- 2.1 Introduction -- 2.2 Research Method -- 2.3 Results Analysis -- 2.4 Discussions -- 2.5 Conclusions -- References -- Part II Regular Papers -- 3 Airport Cab Scheduling Model Based on Queuing Theory -- 3.1 Problem Restatement -- 3.1.1 Problem Background -- 3.1.2 Problem Requirements -- 3.2 Model Assumptions -- 3.3 Symbol Description -- 3.4 Problem Analysis -- 3.4.1 Problem One Analysis -- 3.4.2 Problem Two Analysis -- 3.4.3 Problem Three Analysis -- 3.4.4 Problem Four Analysis -- 3.5 Model Building and Solving -- 3.5.1 Give the Taxi Driver's Decision Model in the Two Choices of A and B -- 3.5.2 Analyze the Rationality of the Model Through the Relevant Data of a Domestic Airport and Its City Taxi -- 3.5.3 How to Set the "Boarding Point" to Maximize the Efficiency of the Ride -- 3.5.4 A Theoretical Analysis of the Scale of "Boarding Points" and Lane Sides -- 3.5.5 According to the Difference in the Mileage of Different Taxis, Develop a "Priority" Arrangement Plan to Maximize Time and Revenue -- References -- 4 Machine Reading Comprehension Model Based on Multi-head Attention Mechanism -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 DuReader Dataset -- 4.2.2 DuReader Baseline Model -- 4.2.3 Multi-headed Attention Mechanism -- 4.3 Multi-head Attention Mechanism. , 4.3.1 Multi-head Attention Presidential Structure -- 4.3.2 Scaled Dot-Product Attention -- 4.4 Model Structure -- 4.4.1 Task Definition -- 4.4.2 Embedded Layer -- 4.4.3 Coding Layer -- 4.4.4 Matching Layer -- 4.4.5 Modeling Layer -- 4.4.6 Output Layer -- 4.5 Experiments and Results -- 4.5.1 Evaluation Criteria -- 4.5.2 Dataset -- 4.5.3 Experiments and Results -- 4.6 Conclusion -- References -- 5 Design of Military Physical Fitness Evaluation System Based on Big Data Clustering Algorithm -- 5.1 Introduction -- 5.2 Hardware Unit Design of Military Physical Fitness Evaluation System -- 5.3 Software Module Design of Military Physical Fitness Evaluation System -- 5.3.1 Construction Module of Military Physical Fitness Evaluation Index System -- 5.3.2 Application Module of Big Data Clustering Algorithm -- 5.3.3 Database Building Module -- 5.4 Experiment and Result Analysis -- 5.4.1 Construction of Experimental Environment -- 5.4.2 Experimental Data Analysis -- 5.4.3 Acquisition of Experimental Results -- 5.5 Conclusion -- References -- 6 ResNet-Based Multiscale U-Net for Human Parsing -- 6.1 Introduction -- 6.2 Related Work -- 6.3 Our Proposed Method -- 6.3.1 Encoder -- 6.3.2 Decoder -- 6.3.3 Multiscale Feature Fusion -- 6.4 Experiments -- 6.4.1 Datasets -- 6.4.2 Evaluation Metrics -- 6.4.3 Results -- 6.5 Conclusion -- References -- 7 Short-Term Electricity Price Forecast Based on SSA-SVM Model -- 7.1 The Introduction -- 7.2 SSA -- 7.3 SVM -- 7.4 The SSA-SVM Model -- 7.5 Example Analysis -- 7.5.1 Data Processing -- 7.5.2 Data Normalization -- 7.5.3 Evaluation Indicators -- 7.5.4 Analysis of Prediction Results -- 7.6 Conclusion -- References -- 8 Research on Mobile Advertising Click-Through Rate Estimation Based on Neural Network -- 8.1 Pricing and Placement of Advertisements -- 8.2 The AUC Indicators. , 8.3 Estimating Click-Through Rates of Mobile Ads Based on Neural Networks -- 8.3.1 Model -- 8.3.2 Objective Function and Algorithm -- 8.3.3 Key Points of Optimization -- 8.3.4 Result Analysis -- 8.4 Conclusion -- References -- 9 Research on Macroeconomic Prediction Technology Based on Wavelet Neural Network -- 9.1 Prediction Technology -- 9.2 Optimized Wavelet Neural Network Model -- 9.3 Case Study -- 9.3.1 Specific Introduction -- 9.3.2 Training of Learning Samples -- 9.3.3 Analyze the Macroeconomic Forecast Results -- 9.4 Conclusion -- References -- 10 Design Research on Financial Risk Control Model Based on CNN -- 10.1 Risk Control Model in Unbalanced Data Environment -- 10.1.1 Features of Financial Data -- 10.1.2 Pretreatment -- 10.1.3 Risk Control Model -- 10.2 Convolutional Neural Network (CNN) is Used to Build a Financial Risk Control Model -- 10.2.1 Design Network Structure -- 10.2.2 Result Analysis -- 10.2.3 Innovative Analysis -- 10.3 Conclusion -- References -- 11 Application of Multi-objective Optimization Algorithm in Financial Market Portfolio -- 11.1 Genetic Algorithm Analysis of Multi-objective Programming -- 11.2 Analysis of Portfolio Optimization Model Based on Genetic Algorithm -- 11.2.1 Model Framework -- 11.2.2 Factor Analysis -- 11.2.3 Risk Indicators -- 11.3 Application Results -- 11.3.1 Data Processing -- 11.3.2 Optimal Solution of Investment Portfolio -- 11.3.3 Comparative Analysis -- 11.4 Conclusion -- References -- 12 Research on Success Factors of Long Rental Apartment Based on SEM-ANN -- 12.1 Introduction -- 12.2 Methods -- 12.2.1 SEM Model -- 12.2.2 ANN Model -- 12.2.3 Research Model Based on SEM-ANN -- 12.3 Result Analysis -- 12.4 Conclusion -- References -- 13 T-AGP: A Kind of Music-Researching Method Based on Data-Driven Comprehensive System of Network Analysis -- 13.1 Introduction. , 13.2 Structure and General Description -- 13.3 The Influencer Network and Influence Analysis -- 13.3.1 Influence Measures -- 13.3.2 Subnetwork Analysis -- 13.4 Similarity Measure -- 13.4.1 The Exploration of Core Features -- 13.4.2 Micro-Similarity Between Two Pieces of Music -- 13.4.3 Macro-Similarity Between Two Genres -- 13.5 Similarity and Difference Between Genres -- 13.5.1 Genre Similarity Analysis -- 13.5.2 Genre Influence Analysis -- 13.5.3 What Distinguishes a Genre -- 13.5.4 Relationships Between Genres -- 13.5.5 Genres' Changes Over Time -- 13.6 The Mechanism of Influence from Influencer to Follower in Music -- 13.7 Dynamic Analysis Over Time and Identification of Major Leaps in Music -- 13.7.1 Dynamic Analysis of the Network -- 13.7.2 Music Characteristics' Evolution Over Time -- 13.8 Cultural Influence on Music -- 13.8.1 Influence from Technology -- 13.8.2 Influence from Social and Political Revolution -- 13.9 Conclusions and Prospects -- 13.9.1 Conclusions -- 13.9.2 Weakness -- 13.9.3 Prospects -- References -- 14 Application of Improved Algorithm of BP Neural Network -- 14.1 Model Analysis of BP Neural Network -- 14.2 Improve the Algorithm -- 14.3 Specific Application -- 14.3.1 PI Parameter Tuning of Valve Positioner -- 14.3.2 Shipboard Navigation System -- 14.4 Conclusion -- References -- 15 Application of Improved Harmony Search Algorithm in Photovoltaic MPPT Under Partial Shadow Conditions -- 15.1 Introduction -- 15.2 Analysis of Output Characteristics of Photovoltaic Cells Array in Partial Shadow -- 15.3 Harmony Search (HS) Algorithm -- 15.3.1 Traditional Harmony Search Algorithm -- 15.3.2 Improvement of Traditional HS Algorithm -- 15.3.3 MPPT Control Method Based on IHS Algorithm -- 15.4 Simulation Experiment Analysis -- 15.5 Conclusion -- References -- 16 A Traditional Butterfly Optimization Algorithm MPPT Method. , 16.1 Introduction -- 16.2 Multi-peak Output Characteristics of Photovoltaic Cells Under Local Shade -- 16.2.1 Mathematical Models of Multiple Photovoltaic Cells -- 16.2.2 Multi-peak Output Characteristics -- 16.3 MPPT Flow Chart Based on BOA -- 16.4 Simulation and Result Analysis -- 16.4.1 Simulation -- 16.4.2 Result Analysis -- 16.5 The Conclusion -- 1. References -- 17 Crops Plantation Problem in Uncertain Environment -- 17.1 Introduction -- 17.1.1 Motivation -- 17.1.2 Literature Review -- 17.1.3 Proposed Approaches -- 17.2 Basic Principles -- 17.3 Uncertain Crops Plantation Problem -- 17.4 Method -- 17.5 Conclusion -- References -- 18 Simplified Full-Newton Step Method with a Kernel Function -- 18.1 Introduction -- 18.2 Preliminaries -- 18.2.1 The Central Path of the Perturbed Problems -- 18.2.2 Search Directions -- 18.2.3 The Iterative Process of the Algorithm -- 18.3 The Properties of Simple Function and the Proximity Function -- 18.4 Algorithm Analysis -- 18.4.1 The Feasibility Step -- 18.4.2 Upper Bounds for paralleldxfparallel -- 18.4.3 Values of θ and τ -- 18.4.4 Centering Steps -- 18.4.5 Total Number of Main Iterations -- 18.5 Conclusion -- References -- 19 Marine Ship Identification Algorithm Based on Object Detection and Fine-Grained Recognition -- 19.1 Introduction -- 19.2 Overall Process -- 19.3 Design Scheme -- 19.3.1 Construction of Data Sets -- 19.3.2 Target Detection Network -- 19.3.3 Fine-Grained Identification Network -- 19.4 Experimental Verification -- 19.5 Conclusions and Prospects -- References -- 20 Automatic Detection of Safety Helmet Based on Improved YOLO Deep Model -- 20.1 Introduction -- 20.2 YOLOv5 Network Model -- 20.2.1 Input -- 20.2.2 Backbone -- 20.2.3 Neck -- 20.2.4 Output -- 20.3 Improvements -- 20.3.1 Anchor Boxes and Detection Scale -- 20.3.2 Loss Function -- 20.4 Experimental Result and Analysis. , 20.4.1 Dataset.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1263 pages)
    Edition: 1st ed.
    ISBN: 9788132216650
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.243
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Committee -- Contents -- 1 Image and Template Security for Palmprint -- Abstract -- 1…Introduction -- 2…Image Protection -- 2.1 Chaotic Mixing -- 2.2 Watermarking -- 3…Template Security -- 3.1 Proposed System -- 4…Conclusion -- References -- 2 Extending Network Lifetime by Time-Constrained Data Aggregation in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Model and Problem Definition -- 4…Solution and Implementation -- 5…Conclusion -- References -- 3 The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Abstract -- 1…Introduction -- 2…Fundamentals of Power System as a Graph Theoretic Model -- 3…Modeling the Topology of Power Grid as a Complex Network -- 3.1 Topological Analysis of Power Grid -- 3.1.1 Number of Links (m) -- 3.1.2 Average Nodal Degree ( \langle k \rangle ) -- 3.1.3 Ratio Parameter (r) -- 3.1.4 Pearson Coefficient ( \rho ) -- 3.1.5 Degree Distribution -- 3.1.6 Clustering Coefficient -- 3.1.7 Average Shortest Path -- 3.2 Random Graphs (ER) -- 3.3 Preferential Attachment (PA) -- 4…Experimental Results and Discussions -- 5…Conclusions -- References -- 4 Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 2.1 Efficient Coverage Area Ratio Calculation -- 2.2 Sensor and Coverage Model -- 3…Sensor Node Deployment and Coverage Area Calculation -- 3.1 Sensor Node Deployment Based on Square Pattern -- 3.1.1 Nine Sensors at the Vertices of Square -- 3.1.2 Sensor Nodes at the Center of Sixteen Circles -- 3.2 Sensor Node Deployments Based on Triangular Pattern -- 3.2.1 Sensor Deployment at the Three Vertices of a Triangle -- 3.2.2 Sensor Deployment at Vertexes of the Rhomb -- 3.2.3 Sensor Deployment at a Meeting Circle of Six Circles. , 4…Comparison and Result Analysis -- 4.1 Total Coverage Area Versus Number of Nodes -- 4.2 Net Efficient Coverage Area Ratio Versus Number of Nodes -- 5…Conclusion -- References -- 5 Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Overview of LAR, DSR, and AODV Protocols -- 4…Problem Formulation -- 4.1 Assumption -- 4.2 Intelligent Driver Model with Intersection Management -- 5…Simulation Environments and Result Analysis -- 5.1 Packet Delivery Ratio -- 6…Conclusions -- References -- 6 A Bluetooth-Based Autonomous Mining System -- Abstract -- 1…Motivation -- 2…Why a Wireless System? -- 3…Why Bluetooth? -- 4…Methodology -- 5…Flowcharts -- 6…Algorithms -- 6.1 Database Entry -- 6.2 Advance Search -- 6.3 Scanning -- 7…Results/Conclusion -- 8…Related Work -- 8.1 Tracking Systems Based on Triangulation Method -- 8.2 Tracking Systems Based on Scanning Technique -- 8.3 Epidemic Communication -- References -- 7 Transistor Representation of a Low-Power Reversible 32-Bit Comparator -- Abstract -- 1…Introduction -- 2…Reversible Logic Gates -- 3…Literature Survey -- 4…Proposed 3 x 3 Reversible Gates -- 4.1 Proposed Reversible Gate1 -- 4.2 Proposed Reversible Gate2 -- 4.3 Realization of the Classical Operations -- 5…Transistor Implementation of the Proposed Reversible Gates Using GDI Method -- 5.1 Transistor Implementation of Proposed Reversible Gate1 -- 5.2 Transistor Implementation of Proposed Reversible Gate2 -- 6…Proposed Design of 1-Bit Comparator -- 7…Realization of Proposed 4-Bit Comparator -- 7.1 Logic Diagram to Find the Greater of Two 4-Bit Numbers -- 7.2 Logic Diagram to Find the Equality of Two 4-Bit Numbers -- 7.3 Logic Diagram to Find the Smaller of Two 4-Bit Numbers -- 8…Realization of 32-Bit Comparator -- 9…Simulation Results -- 10…Conclusion. , 8 Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- Abstract -- 1…Introduction -- 2…Optimization -- 3…Proposed Model -- 4…Results -- 5…Conclusion -- References -- 9 To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Reengineering Tool: A Literature Survey -- Abstract -- 1…Introduction -- 2…Functional Requirement for Reengineering Tool -- 3…Extractor in Details -- 4…Conclusions -- References -- 10 Detection of Web-Based Attacks by Analyzing Web Server Log Files -- Abstract -- 1…Introduction and Background -- 2…Web-Based Attacks -- 3…Web Server Log Files -- 4…Problem Formulations -- 4.1 iFrame Injection Attack -- 4.2 Buffer Overflow Attack -- 5…Experimental Works and Result Analysis -- 5.1 Experimental Works -- 5.1.1 iFrame Injection Attack -- 5.1.2 Buffer Overflow Attack -- 5.2 Result Analysis -- 6…Conclusion -- References -- 11 A Survey of Energy-Aware Routing Protocols and Mechanisms for Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Energy or Power Consumption in MANETs -- 3…Energy-Aware Routing Mechanisms -- 4…Routing Protocols Based on Node Energy Status -- 5…Routing Protocols Based on Transmission Power Control -- 6…Conclusion -- References -- 12 Lexical Ontology-Based Computational Model to Find Semantic Similarity -- Abstract -- 1…Introduction -- 2…Lexical Ontology and Semantic Similarity -- 2.1 Semantic Similarity Aspects Using WordNet Lexical Ontology -- 2.2 Indo WordNet Structure -- 3…Proposed Semantic Similarity Module -- 3.1 Framework for Proposed Module -- 3.2 Proposed Algorithms -- 4…Experiments and Results -- 4.1 The Benchmark Data Set -- 4.2 Results -- 5…Conclusion and Future Work -- References -- 13 Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks -- Abstract -- 1…Introduction. , 2…Review on Cluster-Based Data Aggregation Techniques -- 3…Wireless Sensor Network Model -- 4…Radio Energy Dissipation Model -- 4.1 Two-Level Heterogeneous Networks -- 5…Objective and Scope -- 5.1 Proposed Approach -- 6…Implementation and Performance Evaluation -- 7…Results -- 8…Conclusion and Future Scope -- References -- 14 Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Abstract -- 1…Introduction -- 2…Proposed Watermarking Algorithms -- 2.1 Magic Square Procedure -- 2.2 Method 1 -- 2.3 Method 2 -- 3…Results -- 4…Conclusion -- References -- 15 Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET -- Abstract -- 1…Introduction -- 2…The Trust-Based Security Solution -- 2.1 The Environment -- 2.2 The Trust Model and the Node Evaluation Scheme -- 2.3 The Architecture -- 3…Security Analysis of the Solution -- 3.1 The Secure Routing Protocol -- 3.2 Analysis Based on Known Attacks -- 4…Discussion -- 5…Conclusion and Future Work -- References -- 16 Design of a Biometric Security System Using Support Vector Machine Classifier -- Abstract -- 1…Introduction -- 2…Feature Extraction for the Biometric System -- 2.1 ZCPA Feature Extraction for Input Speech -- 2.2 PCA Feature Extraction for Input Image -- 3…Support Vector Machine Classifier -- 4…Working of Biometric Security System -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 17 Impact of Distance Measures on the Performance of Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 3…Distance Measures -- 3.1 Euclidean Distance -- 3.2 Standardized Euclidean Distance -- 3.3 Manhattan Distance -- 3.4 Mahalanobis Distance -- 3.5 Cosine Distance -- 3.6 Correlation Distance -- 4…Experimental Results and Discussions -- 4.1 Datasets Used -- 4.2 Evaluation on Clustering Efficiency -- 5…Conclusions -- References. , 18 Gender Identification Using Gait Biometrics -- Abstract -- 1…Introduction -- 2…Methodology -- 2.1 Silhouette Extraction -- 2.1.1 Feature Extraction -- 3…Network Structure -- 3.1 Feed-Forward Back-Propagation Neural Network -- 3.2 Cascade-Forward (CF) Back-Propagation Network -- 4…Computational Analysis -- 5…Conclusion and Future Work -- References -- 19 A Survey on Business Context -- Abstract -- 1…Introduction -- 2…Context -- 3…Context Awareness -- 3.1 Sensor and Context Types -- 4…Business Context -- 4.1 Business Context Awareness -- 5…Context Modeling -- 5.1 Key Value Models -- 5.2 Markup Scheme Models -- 5.3 Graphical Models -- 5.4 Object-Oriented Models -- 5.5 Logic-Based Models -- 5.6 Ontology-Based Models -- 5.7 Guideline for Business Context Modeling -- 6…Conclusion -- Acknowledgment -- References -- 20 Enhanced Caching for Geocast Routing in Vehicular Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Work -- 3.1 Protocol Design -- 3.2 Improved Caching Technique -- 3.3 Transmission with Full Radio Transmission Range Power -- 4…Simulation Results and Performance Analysis -- 5…Conclusion and Future Work -- References -- 21 Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Trust, Activity, and Strategy -- 3.1 Evaluating Trust Level -- 3.2 Evaluating Activity Level -- 3.3 Strategy Coding -- 4…Game Model Based on Trust and Activity -- 4.1 The Game on Network -- 4.2 Payoff for Participants -- 4.3 The Fitness Function -- 5…The Tournament -- 6…Evolution of Strategy Using Genetic Algorithm -- 7…Experiments -- 8…Conclusions and Future Work -- References -- 22 Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Abstract -- 1…Introduction -- 2…Overview of Tuple Space Model. , 3…Proposed Approach of Uncoupling of Mobile Cloud Computing Services.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Intelligent agents (Computer software). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (626 pages)
    Edition: 1st ed.
    ISBN: 9789811698736
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.286
    DDC: 004.6782
    Language: English
    Note: Intro -- Committees -- Chief Patron -- Patrons -- Finance Chair -- General Chair -- International Advisory Committee -- Program Chair -- Program Committee -- Organizing Chair -- Organizing Co-chair -- Conference Coordinator -- Convener -- Co-convenor -- Technical Program Committee Chairs -- Preface -- Contents -- About the Editors -- Part I Cloud Computing, Image Processing, and Software -- 1 An Intelligent Online Attendance Tracking System Through Facial Recognition Technique Using Edge Computing -- 1.1 Introduction -- 1.1.1 Motivation and Contribution -- 1.1.2 Organization of the Paper -- 1.2 Related Works -- 1.2.1 In the Year 2017 -- 1.2.2 In the Year 2018 -- 1.2.3 In the Year 2019 -- 1.2.4 In the Year 2020 -- 1.3 Significance of Edge Computing for Online Attendance Tracking System -- 1.4 Methodology -- 1.4.1 Student Registration -- 1.4.2 Faculty Registration -- 1.4.3 Image Capture -- 1.4.4 Face Detection -- 1.4.5 Extraction of Face Encodings -- 1.4.6 Face Recognition -- 1.4.7 Attendance Updation -- 1.5 Practical Implementation -- 1.6 Results and Discussion -- 1.7 Conclusion and Future Work -- References -- 2 Cloud Analytics: An Outline of Tools and Practices -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Exploring the Ideology in Cloud-Based Analytics -- 2.4 Cloud Analytics Platforms -- 2.4.1 Qlik Sense Enterprise -- 2.4.2 Tableau -- 2.4.3 IBM Watson Analytics -- 2.4.4 Microsoft Power BI -- 2.4.5 TIBCO Spotfire X -- 2.4.6 SAS Business Analytics -- 2.5 Discussions -- 2.5.1 Benefits to Cloud-Based Analytics -- 2.5.2 Overview of Emerging Trends -- 2.6 Conclusion -- References -- 3 An Enhanced Fault-Tolerant Load Balancing Process for a Distributed System -- 3.1 Introduction -- 3.2 Background -- 3.2.1 Related Work -- 3.3 Proposed Enhanced Load Balancing Scheme with Resource Failure Rate Consideration -- 3.4 Simulated Results -- 3.4.1 Results. , 3.5 Conclusion -- References -- 4 HeartFog: Fog Computing Enabled Ensemble Deep Learning Framework for Automatic Heart Disease Diagnosis -- 4.1 Introduction -- 4.2 Related Works -- 4.3 HeartFog Architecture -- 4.3.1 Technology Used -- 4.3.2 Hardware Components Used -- 4.3.3 Software Components Used -- 4.4 HeartFog Design -- 4.4.1 Dataset -- 4.4.2 Heart Patient Data Pre-processing -- 4.4.3 Ensemble DL Application -- 4.4.4 Android Interface and Communication -- 4.4.5 Experimental Set-Up -- 4.4.6 Implementation -- 4.5 Results and a Discussion -- 4.6 Conclusion and Future Scope -- References -- 5 A Cloud Native SOS Alert System Model Using Distributed Data Grid and Distributed Messaging Platform -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Preliminaries -- 5.3.1 ZooKeeper as Cluster Coordinator -- 5.3.2 Kafka as a Data Streaming Platform -- 5.3.3 Ignite as the In-Memory Data Grid -- 5.4 Proposed Architecture -- 5.5 Implementation -- 5.6 Conclusion -- References -- 6 Efficient Peer-to-Peer Content Dispersal by Spontaneously Newly Combined Fingerprints -- 6.1 Introduction -- 6.2 Literature Review -- 6.3 Proposed Work -- 6.3.1 Overview -- 6.3.2 Framework Architecture -- 6.3.3 Content Uploading and Splitting -- 6.3.4 Fingerprint Detection -- 6.3.5 Content Distribution -- 6.3.6 Anonymous Communication Protocol -- 6.3.7 Identification of Illegal Distribution -- 6.4 Experimental Results -- 6.4.1 Content Uploading and Splitting -- 6.4.2 Fingerprint Generation -- 6.4.3 Content Distribution -- 6.4.4 Identifying and Preventing Illegal Redistribution -- 6.5 Conclusion -- References -- 7 An Integrated Facemask Detection with Face Recognition and Alert System Using MobileNetV2 -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Methodology -- 7.3.1 Facemask Detection Model -- 7.3.2 The Face-Recognition Model -- 7.3.3 Database -- 7.3.4 Web Application -- 7.4 Results. , 7.5 Conclusion -- References -- 8 Test Case Generation Using Metamorphic Relationship -- 8.1 Introduction -- 8.2 Usability of Successful Test Cases -- 8.3 The Formalization and Insight of Metamorphic Testing -- 8.4 Conclusion -- References -- Part II IoT/Network -- 9 IRHMP: IoT-Based Remote Health Monitoring and Prescriber System -- 9.1 Introduction -- 9.2 Previous Work -- 9.2.1 Architecture -- 9.2.2 Communication Protocol -- 9.3 IRHMP-IoT-Based Remote Health Monitoring and Prescriber System -- 9.3.1 Architecture -- 9.3.2 Functionalities Doctor -- 9.3.3 Implementation Working -- 9.4 Conclusion -- References -- 10 On Boundary-Effects at Cellular Automata-Based Road-Traffic Model Towards Uses in Smart City -- 10.1 Introduction -- 10.2 Review of the State-of-the-Art Available Works -- 10.3 Proposed Empirical Investigation -- 10.3.1 Search for More ECA Rules Toward Uses in Road-Traffic Simulation -- 10.3.2 Investigations on ECA Dynamics Toward Road-Traffic Simulation at Various Fixed-Boundary Situations -- 10.4 Detailed Discussions -- 10.5 Conclusive Remarks -- References -- 11 An Optimized Planning Model for Management of Distributed Microgrid Systems -- 11.1 Introduction -- 11.1.1 Components of a Micro Grid -- 11.1.2 Type of Micro Grid -- 11.2 Literature Survey -- 11.3 Proposed Model -- 11.3.1 Methodology -- 11.4 Results and Discussion -- 11.4.1 For PV System -- 11.4.2 For Wind System -- 11.4.3 For Fuel Cells Power Generating Systems -- 11.5 Conclusions -- References -- 12 Hard and Soft Fault Detection Using Cloud Based VANET -- 12.1 Introduction -- 12.2 Literature Study -- 12.3 Proposed Approach -- 12.3.1 Hard Permanent Fault Detection -- 12.3.2 Soft Fault Diagnosis -- 12.3.3 Fault Status Transmission Through Vehicular Cloud -- 12.4 Simulation Experiments and Discussions -- 12.5 Conclusion -- References. , 13 A Novel Intelligent Street Light Control System Using IoT -- 13.1 Introduction -- 13.2 Related Works -- 13.3 State of Art -- 13.3.1 Node MCU -- 13.3.2 PIR Sensor -- 13.3.3 Channel Relay -- 13.3.4 LDR -- 13.4 Proposed System -- 13.5 Features of Smart Street Light System -- 13.6 Results and Discussion -- 13.7 Conclusion and Future Scope -- References -- 14 Enhancing QoS of Wireless Edge Video Distribution using Friend-Nodes -- 14.1 Introduction -- 14.2 System Model -- 14.3 Video Dissemination Architecture -- 14.4 Simulation and Results -- 14.5 Conclusion -- References -- 15 Groundwater Monitoring and Irrigation Scheduling Using WSN -- 15.1 Introduction -- 15.2 Materials and Method -- 15.2.1 System Design -- 15.2.2 Data Collection -- 15.2.3 Hardware -- 15.2.4 Software and Database -- 15.2.5 Groundwater Level Measurement and Pumping Time -- 15.2.6 Crop Water Demand -- 15.2.7 Irrigation Water Requirements -- 15.2.8 Energy Consumption -- 15.2.9 Process Flow Diagram -- 15.2.10 Dashboard -- 15.3 Results -- 15.3.1 Discharge and Recharge of Groundwater -- 15.3.2 Electricity Consumption -- 15.3.3 Crop Water Demand -- 15.4 Conclusion -- References -- 16 A Soft Coalition Algorithm for Interference Alignment Under Massive MIMO -- 16.1 Introduction -- 16.2 System Model -- 16.3 Proposed Model -- 16.4 Experiment Results -- 16.5 Conclusion -- References -- Part III Optimization and Nature Inspired Methods -- 17 Improved Grasshopper Optimization Algorithm Using Crazy Factor -- 17.1 Introduction -- 17.2 Grasshopper Optimization Algorithms -- 17.2.1 Basic Grasshopper Optimization Algorithm (GOA) -- 17.2.2 Improved GOA with Crazy Factor (Crazy-GOA) -- 17.3 Result Analysis -- 17.4 Conclusion -- References -- 18 Reliability Estimation Using Fuzzy Failure Rate -- 18.1 Introduction -- 18.2 Reliability Using Fuzzy System -- 18.3 Discussion -- 18.4 Illustration. , 18.5 Conclusion -- References -- 19 A Sine Cosine Learning Algorithm for Performance Improvement of a CPNN Based CCFD Model -- 19.1 Introduction -- 19.2 Proposed SCA-CPNN-Based CCFD Model -- 19.2.1 Evaluation Criteria -- 19.3 Experimental Result Discussion -- 19.4 Conclusion -- References -- 20 Quality Control Pipeline for Next Generation Sequencing Data Analysis -- 20.1 Introduction -- 20.2 Background and Related Work -- 20.3 Datasets -- 20.4 Methods and Material -- 20.4.1 Duplicate Removal and Trimming -- 20.4.2 NGS Dataset -- 20.4.3 NULL Value Removal -- 20.4.4 Normalization -- 20.4.5 Dimensionality Reduction -- 20.5 Result Discussion -- 20.5.1 The Differentially Expressed Genes and Outlier Detection Visualization -- 20.5.2 The Differentially Expressed Gene Selection Using Dimension Reduction -- 20.6 Conclusion and Future Work -- References -- 21 Fittest Secret Key Selection Using Genetic Algorithm in Modern Cryptosystem -- 21.1 Introduction -- 21.1.1 Background -- 21.1.2 Motivation -- 21.1.3 Contribution -- 21.2 Preliminaries -- 21.2.1 Illustration of AVK -- 21.2.2 Genetic Algorithm -- 21.3 Proposed Work -- 21.4 Experiment Examples -- 21.5 Experiment Results -- 21.6 Performance Analysis -- 21.7 Randomness Verification -- 21.8 Conclusion -- 21.9 Future Work -- References -- 22 Variable Step Size Firefly Algorithm for Automatic Data Clustering -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Variable Step Size Firefly Algorithm -- 22.4 Result Analysis -- 22.5 Conclusion -- References -- 23 GWO Based Test Sequence Generation and Prioritization -- 23.1 Introduction -- 23.1.1 Motivation -- 23.2 Basic Concept -- 23.2.1 GWO Algorithm -- 23.2.2 Adjacency Matrix -- 23.2.3 Objective Function/Fitness Function -- 23.3 Proposed Approach -- 23.3.1 Overview -- 23.3.2 Generation of Control Flow Graph -- 23.4 Implementation -- 23.4.1 Experimental Result. , 23.4.2 Prioritization.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: User interfaces (Computer systems). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (525 pages)
    Edition: 1st ed.
    ISBN: 9788132220091
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.309
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 1.1 Data Aggregation -- 1.2 Data Aggregation Security Concerns -- 2…Secure Data Aggregation Protocols -- 2.1 Secure Data Aggregation Based on Cryptographic Techniques -- 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography -- 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography -- 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function -- 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes -- 2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation -- 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques -- 3…Comparison of Secure Data Aggregation Protocols -- 4…Conclusion -- References -- 2 Secure and Dynamic IP Address Configuration Scheme in MANET -- Abstract -- 1…Introduction -- 2…Related Work Review -- 3…Proposed Work -- 4…Conclusion -- References -- 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Proposed Scheme -- 4…Conclusion -- References -- 4 Dual Security Against Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Route Discovery Phase Detection -- 3.2 Data Transmission Phase -- 4…Conclusion and Future Scope -- References -- 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Proposed Detection Algorithm -- 4…Conclusion and Future Work -- References -- 6 Frequency Domain Incremental Strategies Over Distributed Network -- Abstract -- 1…Introduction -- 2…Estimation Problem and the Adaptive Distributed Solution. , 3…Frequency-Domain Adaptive Distributed Solution -- 3.1 DCT-LMS and DFT-LMS Algorithm -- 4…Simulation -- 5…Conclusion -- References -- 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- Abstract -- 1…Introduction -- 1.1 MAC Layer Architecture -- 1.2 QoS Classes -- 1.3 Scheduler at MAC Layer -- 2…Literature Survey -- 3…Methodology -- 3.1 Design of Scheduler -- 4…Mathematical Model -- 4.1 Probability of Packets Being Served -- 4.2 Average Waiting Time -- 4.3 Average Time Spent by a Packet in Queue Ws -- 5…Result Analysis -- 6…Conclusion -- References -- 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Proposed Architecture and Methodology -- 3…Result Analysis -- 4…Conclusion -- References -- 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Abstract -- 1…Introduction -- 2…Literature Review -- 3…The Procedure -- 3.1 Initialization Phase -- 3.2 Detection and Reporting Phase -- 3.3 Action Phase -- 4…Implementation and Result Analysis -- 5…Conclusion -- References -- 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Wireless Sensor Network Routing Algorithms -- 2.1 Flat Routing Protocols -- 2.2 Hierarchical Routing Algorithms -- 2.3 Location-Based Protocols -- 2.4 Related Work -- 3…Simulation Setup -- 3.1 Result and Analysis -- 4…Conclusion -- References -- 11 Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic -- Abstract -- 1…Introduction -- 1.1 IEEE 802.11 Mechanism -- 1.2 IEEE 802.11e Mechanism -- 2…Simulation Model and Performance Analysis -- 2.1 Simulation Model -- 2.2 Simulation Parameter -- 2.3 Results -- 3…Conclusion -- References. , 12 A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range -- Abstract -- 1…Introduction -- 2…Related Work on Connected Dominating Set -- 3…Proposed Algorithm -- 3.1 Network Model -- 3.2 Proposed Approach -- 3.2.1 Algorithm: Determination of P-CDS of a Graph -- 3.2.2 Diagrammatical Illustration of Algorithm -- 4…Performance Analysis -- 5…Conclusion -- References -- 13 Token Based Group Local Mutual Exclusion Algorithm in MANETs -- Abstract -- 1…Introduction -- 2…Related Works -- 3…GLME Algorithm -- 3.1 Working -- 3.2 Data Structure -- 3.3 Messages -- 3.4 Pseudocode of Algorithm at Node i -- 4…Performance Analysis -- 5…Conclusions and Future Scope -- References -- 14 A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Coverage Algorithm for Anchor Node Deployment -- 3…Encryption and Decryption -- 4…Route Discovery Process -- 5…Performance Evaluation -- 6…Conclusions -- References -- 15 Characteristic Function for Variable-Bit-Rate Multimedia QoS -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Model for Mapping QoS of Variable-Bit-Rate Multimedia -- 4…Numerical Results -- 5…Conclusion -- References -- 16 A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition -- Abstract -- 1…Introduction -- 2…Preliminaries -- 2.1 Vector Decomposition Problem -- 2.2 Trapdoor VDP -- 3…Proposed Oblivious Transfer Using Vector Decomposition -- 3.1 Correctness of Our OT Scheme -- 4…Conclusion and Future Work -- References -- 17 Query by Humming System Through Multiscale Music Entropy -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Proposed Query by Humming System -- 3.1 Preprocessing -- 3.2 Framing -- 4…Entropy Estimation -- 4.1 Shannon Entropy -- 4.2 Multiscale Entropy -- 4.3 Multiscale Music Entropy. , 5…Kd Tree-Based Indexing -- 6…Query Processing and Searching -- 7…Results and Discussions -- 7.1 Performance Analysis -- 8…Conclusions -- References -- 18 An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Discrete Wavelet Transform for EEG Signal Decomposition -- 4…Training Algorithms for MLPNN -- 4.1 Backpropagation -- 4.2 Manhattan Update Rule -- 4.3 Resilient Propagation -- 5…Experimental Study, Results, and Analysis -- 6…Summary and Conclusion -- 19 Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Envisioned Query by Humming System -- 4…Perceptual Analysis -- 4.1 Spectral Centroid -- 4.2 Spectral Spread -- 4.3 Pitch Class Profile or Chroma -- 4.3.1 Preprocessing -- 4.3.2 Frequency Mapping -- 4.3.3 Postprocessing -- 4.4 Harmonicity -- 4.4.1 Harmonic Spectral Centroid -- 4.4.2 Harmonic Spectral Spread -- 5…Context Drift Information Analysis -- 5.1 Perceptual Feature Space -- 5.2 Transfer Entropy Estimation -- 6…Results and Discussions -- 7…Conclusions -- References -- 20 First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm -- Abstract -- 1…Introduction -- 2…Basic Concepts -- 3…SRM-FF Algorithm -- 4…Evaluations -- 5…Conclusion -- References -- 21 A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks -- Abstract -- 1…Introduction -- 2…Proposed Work -- 2.1 Proposed Work Architecture -- 2.2 Proposed Algorithm -- 2.3 Proposed Embedding Scheme -- 3…Experimental Results and Comparison Analysis -- 3.1 Evaluation Based on Stego-Image Quality and Payload Capacity. , 3.2 Evaluation Based on Resistance to Stastical Attacks -- 4…Conclusions -- References -- 22 A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Area-Based Stereo Matching -- 4…Experiment Results -- 4.1 Method of Evaluation -- 4.2 Robustness to Change in Illumination -- 4.3 Robustness to Change in Exposure -- 5…Conclusion -- Acknowledgement -- References -- 23 A Hybrid Motion Based-Object Tracking Algorithm for VTS -- Abstract -- 1…Introduction -- 2…The VTS and Its Challenges -- 3…Motion-Based Object Tracking Scheme -- 4…Simulation Results -- 5…Conclusion and Future Work -- References -- 24 Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi's Method -- Abstract -- 1…Introduction -- 2…Taguchi's Optimization Method -- 2.1 Designing of Input Parameter Using OA -- 2.2 Building of Response Table -- 2.3 Optimal Level Values Identification and Confirmation Experiment -- 2.4 Reducing the Optimization Range -- 2.5 Checking of Level Values and Termination Criteria -- 3…Experimental Results -- 4…Conclusion -- References -- 25 A Novel Approach for Jamming and Tracking of Mobile Objects -- Abstract -- 1…Introduction -- 2…Smart Antenna -- 3…Algorithm Applied in the System -- 4…Simulation Results -- 5…Conclusion -- References -- 26 Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System -- Abstract -- 1…Introduction -- 2…Mathematical Model -- 2.1 STBC Encoding Scheme -- 3…Communication System Model -- 3.1 STBC Decoding Scheme -- 4…Results and Discussion -- 5…Conclusions -- References -- 27 On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application -- Abstract -- 1…Introduction -- 2…Antenna Design and Parametric Study -- 3…Results and Discussion -- 3.1 Return Loss. , 3.2 Current Distribution.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Medicine-Data processing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (491 pages)
    Edition: 1st ed.
    ISBN: 9789811960680
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.317
    DDC: 610.285
    Language: English
    Note: Intro -- ICAIHC Committee -- Preface -- Acknowledgements -- Contents -- About the Editors -- 1 An Adaptive Fuzzy-Based Clustering Model for Healthcare Wireless Sensor Networks -- 1.1 Introduction -- 1.1.1 Resource Management in WSN -- 1.2 Related Work -- 1.3 Proposed Model -- 1.3.1 Fuzzy Sets and Neuro-fuzzy Logic Theory -- 1.4 Simulation and Results -- 1.5 Conclusion and Future Work -- References -- 2 Artificial Pancreas (AP) Based on the JAYA Optimized PI Controller (JAYA-PIC) -- 2.1 Introduction -- 2.2 Problem Statements Formulations -- 2.2.1 Clinical Information -- 2.2.2 Simulation Model -- 2.2.3 MID -- 2.2.4 Patient Output -- 2.3 Control Algorithms -- 2.3.1 Development of JAYA-PIC -- 2.4 Results -- 2.4.1 JAYA-PIC Action in Patient -- 2.4.2 Analysis of Control Actions -- 2.5 Conclusions -- References -- 3 Security Issues and Solutions for Reliable WBAN-Based e-Healthcare Systems: A Systematic Review -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Secured WBAN Requirements -- 3.3.1 Security Paradigms for WBAN -- 3.3.2 Security Needs in WBAN -- 3.4 Security Solutions -- 3.5 Case Studies on WBAN Prototypes -- 3.6 Conclusion -- References -- 4 Brain Tumour Detection by Multilevel Thresholding Using Opposition Equilibrium Optimizer -- 4.1 Introduction -- 4.2 Multilevel Thresholding Based on Entropy -- 4.2.1 Multilevel Thresholding: A Mathematical Approach -- 4.2.2 Entropy Functions -- 4.3 Opposition Equilibrium Optimizer (OEO) -- 4.4 Proposed Brain Tumour Detection Method Using OEO-Based Multilevel Thresholding Approach -- 4.5 Results and Discussion -- 4.6 Conclusion -- References -- 5 RescuePlus -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Existing Solution -- 5.4 Proposed Solution -- 5.5 Result -- 5.6 Future Scope -- 5.7 Conclusion -- References -- 6 Skeletal Bone Age Determination Using Deep Learning -- 6.1 Introduction -- 6.2 Methodology. , 6.2.1 Data Set Selection -- 6.2.2 Data Pre-processing -- 6.3 Custom Model -- 6.3.1 Model Architecture -- 6.3.2 Approaches -- 6.4 Experiments -- 6.4.1 Loss Functions -- 6.4.2 Comparing with Pre-trained Models -- 6.5 Conclusion -- References -- 7 Chimp Optimization Algorithm-Based Feature Selection for Cardiac Image-Based Heart Disease Diagnosis -- 7.1 Introduction -- 7.2 Chimp Optimization Algorithm-Based Feature Selection for Heart Disease Diagnosis -- 7.2.1 Pre-processing -- 7.2.2 Feature Extraction -- 7.2.3 Feature Selection Using ChOA -- 7.2.4 Classification Using SVNN -- 7.3 Results and Discussion -- 7.4 Conclusion -- References -- 8 The Hospitality Industry's Impact on the COVID-19 Epidemic: A Case Study of Ukraine -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Research Methods -- 8.4 Results -- 8.4.1 State and Legal Measures -- 8.5 Conclusion -- References -- 9 Society in Front of a COVID-19 Pandemic: India Versus Ukraine -- 9.1 Introduction -- 9.1.1 Research Background -- 9.2 Research Methods and Materials -- 9.3 Results -- 9.3.1 The Speed of Virus Spreading -- 9.3.2 The Risk and Danger Rate Estimation -- 9.4 The Level of Trust in the National Healthcare System and the Satisfaction of Government's Response to COVID-19 Situation -- 9.5 The Emotions and General Psychological State of Respondents -- 9.6 Conclusions -- Notes -- References -- 10 Breast Cancer Detection Using Concatenated Deep Learning Model -- 10.1 Introduction -- 10.2 Proposed Methodology -- 10.2.1 Convolutional Neural Network -- 10.2.2 LSTM -- 10.3 Result Analysis -- 10.3.1 Dataset Description -- 10.4 Conclusion -- References -- 11 Recommendation of Pesticides Based on Automation Detection of Citrus Fruits and Leaves Diseases Using Deep Learning -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Proposed Work -- 11.3.1 Image Acquisition and Preprocessing. , 11.3.2 Image Segmentation -- 11.3.3 Diseases Prediction -- 11.3.4 Experimental Results -- 11.3.5 Fertilizer Recommendation -- 11.4 Conclusion -- References -- 12 Comprehensive Information Retrieval Using Fine-Tuned Bert Model and Topic-Assisted Query Expansion -- 12.1 Introduction -- 12.2 Review of Literature -- 12.3 Comprehensive Information Retrieval -- 12.3.1 BERT Model -- 12.3.2 Topic Modelling Using Latent Dirichlet Allocation -- 12.3.3 The Proposed CIR Architecture -- 12.4 The Proposed Approach -- 12.5 Experimental Results -- 12.5.1 Dataset -- 12.5.2 Evaluation Metrics -- 12.5.3 Performance Evaluations -- 12.5.4 Performance Comparison -- 12.5.5 Discussions -- 12.6 Conclusion -- References -- 13 Diabetic Retinopathy Detection Using CNN Model -- 13.1 Introduction -- 13.2 Related Work -- 13.3 Dataset Used -- 13.3.1 Overview -- 13.3.2 Augmentation -- 13.4 Defining CNN Model -- 13.4.1 Summary of Model Architecture -- 13.4.2 Model Layers -- 13.4.3 Loss Function -- 13.5 Result -- 13.6 Conclusion -- References -- 14 Digi-CANE-An IoT Savior for Visually Sensitive -- 14.1 Introduction -- 14.2 Literature Survey -- 14.3 Objective -- 14.4 General Flowchart -- 14.5 The Sensory Architecture -- 14.5.1 Emergency Sensor (Gyroscope) -- 14.5.2 Cane Module -- 14.5.3 Ultrasonic Sensor -- 14.5.4 Buzzer -- 14.5.5 Arduino Uno -- 14.5.6 Working -- 14.6 Circuit Diagram -- 14.6.1 Hardware Details -- 14.6.2 Working of Ultrasonic Sensor (HC-SR04) -- 14.6.3 Software Requirement Arduino IDE -- 14.7 Conclusion and Future Scope -- References -- 15 Link Performance in Community Detection Using Social Network -- 15.1 Introduction -- 15.2 Literature Review -- 15.3 Methods -- 15.4 Metrics -- 15.5 Experimental Results -- 15.6 Discussion -- 15.7 Conclusion -- References -- 16 Analyze Ego-Centric Nodes in Social Network Using Machine Learning Technique -- 16.1 Introduction. , 16.2 Review of Literature -- 16.3 Materials and Method -- 16.4 Link Influence Strategies -- 16.5 Result and Discussion -- 16.6 Conclusion -- 16.7 Future Enhancement -- References -- 17 5G Revolution Transforming the Delivery in Healthcare -- 17.1 Introduction -- 17.2 Literature Review -- 17.3 Features of 5G Technology -- 17.4 Problems Posed by Current Healthcare Industry -- 17.4.1 Lack of Universal Access -- 17.4.2 Long-Term Chronic Care Burden -- 17.4.3 Aging Population -- 17.4.4 Resource Constraints and Healthcare Disparities -- 17.5 Areas in Healthcare that 5G Will Boost -- 17.5.1 Imaging -- 17.5.2 Diagnostics -- 17.5.3 Data Analytics and Treatment -- 17.6 New Realms that 5G Will Enable -- 17.7 Real-World Trials -- 17.8 Positive Impacts of 5G on Our Healthcare System -- 17.9 Recommendations -- 17.10 Conclusion and Future Works -- References -- 18 A Systematic Review of AI Privileges to Combat Widen Threat of Flavivirus -- 18.1 Significance of AI in Flavivirus Disease Eradication -- 18.1.1 AI in Healthcare -- 18.1.2 Flavivirus-A Detailed Synopsis -- 18.1.3 Flavivirus Characteristics -- 18.1.4 Flavivirus Lifecycle -- 18.1.5 Flavivirus Epidemiology -- 18.2 Detection and Estimation of Flavivirus Disease with Machine Learning Models -- 18.3 Conclusions and Future Direction -- References -- 19 Early Detection of Sepsis Using LSTM Neural Network with Electronic Health Record -- 19.1 First Section -- 19.2 Method -- 19.2.1 Sepsis Data Preprocessing -- 19.2.2 LSTM Model -- 19.3 Result and Discussion -- 19.4 Conclusion -- References -- 20 Detection of COVID-19 Infection from Clinical Findings Using Machine Learning Algorithm -- 20.1 Introduction -- 20.2 Related Works -- 20.3 Materials and Methods -- 20.3.1 Medical Dataset Used -- 20.3.2 Data Preprocessing -- 20.3.3 Feature Selection -- 20.3.4 Classification Algorithms. , 20.4 Performance Evaluation and Results -- 20.4.1 Evaluation Measures -- 20.4.2 Results -- 20.5 Conclusion -- References -- 21 Development of Real-Time Cloud Based Smart Remote Healthcare Monitoring System -- 21.1 Introduction -- 21.2 System Framework -- 21.3 System Modeling -- 21.4 Results and Discussion -- 21.5 Conclusion -- References -- 22 Performance Analysis of Hyperparameters of Convolutional Neural Networks for COVID-19 X-ray Image Classification -- 22.1 Introduction -- 22.2 CNN and Its Optimizers -- 22.3 Experimental Results -- 22.4 Conclusion -- References -- 23 Sequence Rule Mining for Insulin Dose Prediction Using Temporal Dataset -- 23.1 Introduction -- 23.2 Literature Review -- 23.3 Definitions -- 23.3.1 Sequential Rule Mining -- 23.3.2 Support and Confidence -- 23.3.3 Sequence Rule Mining Algorithms -- 23.4 Methodology -- 23.5 Experiment Work -- 23.5.1 Dataset Used -- 23.5.2 Result and Discussion -- 23.6 Conclusion -- 23.7 Future Scope -- References -- 24 Ensemble Deep Learning Approach with Attention Mechanism for COVID-19 Detection and Prediction -- 24.1 Introduction -- 24.2 Related Work -- 24.3 Proposed Model -- 24.4 Data sets, Experiments, and Results -- 24.5 Conclusion and Future Scope -- References -- 25 Semantic Segmentation of Cardiac Structures from USG Images Using Few-Shot Prototype Learner Guided Deep Networks -- 25.1 Introduction -- 25.2 Proposed Work -- 25.2.1 Prototype Learner -- 25.2.2 Segmentor -- 25.3 Experiments -- 25.3.1 Dataset Description and Measures Used -- 25.3.2 Parameters -- 25.3.3 Results and Analysis -- 25.4 Conclusion -- References -- 26 Quantification of Homa Effect on Air Quality in NCR, India: Pollution and Pandemic Challenges in Cities and Healthcare Remedies -- 26.1 Introduction -- 26.1.1 Air Quality Global Challenge in Twenty-First Century -- 26.1.2 How Yajna and Vedic Rituals May Curb Pollution. , 26.2 Literature Review.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (377 pages)
    Edition: 1st ed.
    ISBN: 9789811922770
    Series Statement: Advances in Sustainability Science and Technology Series
    DDC: 004
    Language: English
    Note: Intro -- Committee Members -- Preface -- Contents -- About the Editors -- IOT, Big Data and Cloud Computing -- Big Data: A Boon to Fight Against Cancer Using Map Reduce Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 MapReduce Architecture -- 4 Conclusion -- References -- Security Attacks and Its Countermeasures in RPL -- 1 Introduction -- 2 Related Work -- 3 About RPL -- 3.1 Control Messages in RPL -- 3.2 Traffic and Modes of Operation in RPL -- 4 Attacks in RPL -- 4.1 Attacks Against Resources -- 4.2 Attacks Against Topology -- 4.3 Attacks Against Traffic -- 5 Analysis -- 6 Conclusion and Future Scope -- References -- An Optimal Policy with Parabolic Demand Carry Forwarded with Three-Parameter Weibull Distribution Deterioration Rate, Scarcity and Salvage Value -- 1 Introduction -- 2 Model Formulation -- 2.1 Assumptions -- 2.2 Notations -- 2.3 Mathematical Formulation -- 3 Numerical Examples -- 3.1 Sensitivity Analysis -- 4 Conclusion -- References -- Information Actions Use for System Activity: Action Modeling Schemas -- 1 Introduction -- 2 The Need in Information Actions Use for System Activity -- 3 Action Modeling Schemas for the Theory of Information Actions Use for System Activity -- 4 Conclusion -- References -- High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique -- 1 Introduction -- 2 Requirements of Hiding Information Digitally -- 3 Digital Image Forensic Techniques for Feature Extraction -- 4 Spatial Transform Techniques -- 5 Conclusion -- References -- Performance Evaluation of FSO Under Different Atmospheric Conditions -- 1 Introduction -- 2 Simulation Setup -- 2.1 Simulation Result and Analysis -- 3 Conclusion -- References -- Smart Communication -- Design and Performance Analysis of High Reliability QOS-Oriented Adaptive Routing Protocol for MANET. , 1 Introduction -- 2 MANET -- 2.1 MANETS Characteristics -- 2.2 Application Areas of MANETS -- 2.3 Link Stability -- 3 Literature Survey -- 4 QOS-Oriented Adaptive Routing Protocol for 'MANET' -- 4.1 Formulas -- 4.2 Algorithm -- 5 Results -- 6 Conclusion -- References -- Circular Patch Antenna with Perturbed Slots for Various Wireless Applications -- 1 Introduction -- 2 Parameters for the Proposed Design -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- A Secure Handshaking AODV Routing Protocol (SHS-AODV) with Reinforcement Authentication in MANET -- 1 Introduction -- 2 Ad Hoc on Demand Distance Vector -- 2.1 Path Discovery -- 2.2 Reverse-Path Setup -- 2.3 Forward-Path Setup -- 2.4 Route Table Management -- 2.5 Path Maintenance -- 2.6 Local Connectivity Management -- 3 Literature Survey -- 4 SHS-AODV Routing Protocol -- 4.1 Key Generation -- 4.2 Elliptic Curve Cryptographic Algorithm (Ecc) -- 4.3 Algorithm -- 5 Results -- 5.1 Simulation Environment -- 5.2 Performance Metrics -- 6 Conclusion -- References -- AI-Powered Smart Routers -- 1 Introduction -- 2 Related Work -- 2.1 Ununified Routing (Loosely Coupled Mono-Cum-Multi-agent Evolution Strategies) -- 2.2 Unified Routing (Close-Coupled Single-Cum-Multi-agent Evolution Strategies) -- 3 AI-Powered Network Routing -- 3.1 Regenerative Control Paradigm -- 3.2 Unified and Ununified AI-Powered Networking -- 4 Brainy (SMART/Intelligent) Network -- 4.1 Unified and Ununified AI-Powered Networking -- 5 Simulation -- 6 AI-Powered and Brainy Hardware Routers -- 6.1 Framework Design Formulation -- 6.2 Simulation Results -- 7 Conclusion -- References -- Modified Sierpinski Gasket Monopole Fractal Antenna for Sub 6 GHz 5G Applications -- 1 Introduction -- 2 Evaluation of Antenna Design -- 3 Performance Analysis of Proposed Antenna -- 4 Performance Analysis of Proposed Antenna -- 5 Conclusion. , References -- Design of a Dual-Ring Resonator Antenna for WBAN Applications -- 1 Introduction -- 2 Implementation of Dual-Ring Resonator -- 3 Results -- 4 Conclusion -- References -- Performance Analysis of MIMO Antenna for Isolation Improvement -- 1 Introduction -- 2 Single Antenna Design Calculations -- 3 Design of MIMO Antenna -- 4 Analysis of the Space Diversity of MIMO Antenna -- 5 Analysis of Prototype Orthogonal MIMO -- 6 Conclusion -- References -- Low Power and High-Speed Full Adder with Complemented Logic and Complemented XOR Gate -- 1 Introduction -- 2 Review of Full Adders -- 2.1 Hybrid Full Adder [9] -- 3 Proposed Full Adder -- 3.1 Sum Output Generation Using XNOR Cell -- 3.2 Carry Output Using XNOR Cell -- 4 Delay Analysis -- 5 4-Bit Adder -- 6 Power Analysis -- 7 Conclusion -- References -- Determining the Number of Bit Encryption That Is Optimum for Image Steganography in 8 Bit Images -- 1 Introduction -- 2 Various Techniques of Image Steganography -- 2.1 LSB Method -- 2.2 Palette-Based Technique -- 2.3 Secure Cover Selection -- 3 Terms Used -- 4 Proposed Method -- 5 Result -- 6 Discussion -- 7 Conclusion -- References -- Design and Analysis of 2nd-Order Bandpass Filters Using SIW and Microstrip Patch Transitions with Stub Matching -- 1 Introduction -- 2 Design-1 -- 3 Design 2 -- 4 Results Analysis -- 5 Conclusions -- References -- Planar Split Ring Resonating Antenna Design -- 1 Introduction -- 2 Antenna Design -- 3 Simulation Results -- 4 Conclusion -- References -- Pentagonal Microstrip Patch Antenna with Circular Slot for 9 GHz Applications -- 1 Introduction -- 2 Design of Pentagonal Patch with Slot -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- Simulation and Analysis of an Optical Communication System Implementing DCF with Various Pulse Generators -- 1 Introduction -- 2 Simulation and Design. , 3 Result and Discussion -- 4 Conclusion -- References -- Simulation and Analysis of an 8 Channel CWDM Optical Network Suitable for Smart City Applications -- 1 Introduction -- 1.1 Multiplexing -- 1.2 DWDM -- 1.3 CWDM -- 2 Simulation Setup -- 3 Result and Discussion -- 4 Conclusion -- References -- Design of Low-Power Dynamic Threshold MOSFET (DTMOS) Push-Pull Inverter -- 1 Introduction -- 2 Proposed Design and Analysis -- 3 Simulation Results -- 4 Conclusion -- References -- Epileptic Seizure Detection Using Deep Learning Architecture -- 1 Introduction -- 2 Literature Review -- 3 Method Initiation with Improved Techniques -- 3.1 Data Extraction -- 3.2 Data Classification -- 4 Proposed Model -- 5 Result and Discussion -- 6 Conclusion -- References -- Ultra High Rate Inter-Satellite Optical Wireless Transmission Using DP-QPSK -- 1 Introduction -- 2 Modulation Format and Inter-Satellite Link -- 3 Proposed Set up -- 4 Results and Discussion -- 5 Conclusion -- References -- Investigation on Reactive Power Compensation Using STATCOM -- 1 Introduction -- 2 Research Method -- 2.1 Block Description and Operational Strategy -- 2.2 Network Description and Simulation -- 3 Results and Discussion -- 4 Conclusion -- References -- Smart Energy Systems -- Optimization of Set-Point Deviation and Current Ripple of PMSM by CCS-MPC Method -- 1 Introduction -- 2 PMSM Model Description -- 3 Model Description of CCS-MPC Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Study, Design and Performance Analysis of Grid-Connected Solar PV System of Two Different Places Using PV syst Software -- 1 Introduction -- 2 Grid-Tied PV System -- 3 Methodology -- 3.1 PV Syst Software -- 3.2 Case Study -- 4 Input Requirement -- 4.1 Location -- 4.2 Tilt Angle -- 4.3 Albedo -- 4.4 Module and Inverter Specification -- 4.5 Economics Analysis. , 5 Simulation and Result -- 6 Conclusion -- References -- Transparent Solar Cell: A Powerful Device of Upcoming Era -- 1 Introduction -- 2 Discussion -- 2.1 Working Principle of Transparent Solar Cells -- 2.2 Different Types of Transparent Solar Cell -- 3 Applications -- 4 Conclusion -- References -- Machine Learning Techniques and Applications -- An Adaptive Firefly Optimization Algorithm for Human Gait Recognition -- 1 Introduction -- 2 Framework of the Proposed Approach -- 2.1 Gait Template Extraction -- 2.2 Introduction to Standard Firefly Algorithm (FA) -- 2.3 Adaptive Firefly Algorithm for Feature Selection -- 2.4 Pseudo-Code of an Adaptive Firefly Algorithm for Feature Selection -- 2.5 Combination of PCA and LDA -- 3 Experimental Analysis -- 3.1 Parameter Setting -- 3.2 Performance Evaluation Metrics of Classification -- 3.3 Results and Discussion -- 4 Conclusion -- References -- Job Prediction Astrology for Using Classification Techniques in Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Set (HOROSCOPE) -- 3.2 Feature Extraction -- 4 Data Processing Techniques -- 4.1 Logistic Regression -- 4.2 Naïve Bayes Classification -- 4.3 DTNB -- 5 Experiments and Analysis -- 6 Conclusion -- References -- Developed Face and Fingerprint-Based Multimodal Biometrics System to Enhance the Accuracy by SVM -- 1 Introduction -- 1.1 Face Recognition -- 1.2 Fingerprint Recognition -- 1.3 Fusion -- 2 Literature Review -- 3 Methodology -- 3.1 Face -- 3.2 Finger -- 3.3 Principal Component Analysis -- 3.4 SVM Classifier -- 4 Result and Experiments -- 5 Conclusion -- References -- A Survey on Deep Learning Techniques for Anomaly Detection in Human Activity Recognition -- 1 Introduction -- 2 Deep Learning -- 3 Methods and Implementation -- 4 Discussions -- 5 Conclusion -- References. , Evaluation of Different Paradigms of Machine Learning Classification for Detection of Breast Carcinoma.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Information technology-Social aspects. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (471 pages)
    Edition: 1st ed.
    ISBN: 9789811911460
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.294
    DDC: 307.760285
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    New Delhi :Springer (India) Private Limited,
    Keywords: Artificial intelligence -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (797 pages)
    Edition: 1st ed.
    ISBN: 9788132220121
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.308
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 Neutrosophic Logic Applied to Decision Making -- Abstract -- 1…Introduction -- 2…Neutrosophic Decision Making Strategies -- 3…Complex Metrics for Digital Learning Object Evaluation -- 4…Practical Experience -- 5…Conclusion -- Acknowledgments -- References -- 2 Transforming e-Government to Smart Government: A South Australian Perspective -- Abstract -- 1…Introduction -- 2…Open Data: Social and Economic Benefits -- 3…Developing Smart Government Through Open Data -- 3.1 Community Engagement and Coproduction -- 3.2 Financial Investment -- 3.3 Automation -- 3.4 Collaboration -- 3.5 Governance -- 4…Conclusion -- References -- 3 An Online Content Syndication Tool with Built-in Search and Social Sharing -- Abstract -- 1…Introduction -- 2…Architecture -- 2.1 RSS Source Listener -- 2.2 Subscription -- 2.3 RESTful Web Service APIs -- 3…Conclusions -- Acknowledgment -- References -- 4 Customizing EPCglobal to Fit Local ONS Requirements -- Abstract -- 1…Introduction -- 2…EPC Framework -- 3…Related Work -- 4…Proposed System and Implementation -- 4.1 Sample Implementation -- 5…Conclusion -- References -- 5 Distributed CloudIMS: Future-Generation Network with Internet of Thing Based on Distributed Cloud Computing -- Abstract -- 1…Introduction -- 2…Evolution of Network and Application -- 2.1 Evolution of Telecommunication (NGN) -- 2.2 Evolution of Cloud Computing -- 2.3 The Internet of Thing: Machine to Machine the Future Internet -- 2.4 Related Work on IMS, IoT, and Cloud Computing -- 3…The CloudIMS Framework Architecture: Our Proposed Future Network -- 3.1 Our Vision of CloudIMS Platform -- 3.2 Architecture of CloudIMS Platform -- 3.3 Operation, Administration, and Maintenance (OA& -- M) of CloudIMS. , 3.4 Discussion and Motivation of Proposed CloudIMS Features and Use Case Study Characteristics -- 4…Conclusion -- References -- 6 Genetic Algorithm-Based Query Expansion for Improved Information Retrieval -- Abstract -- 1…Introduction -- 2…Proposed Approach -- 2.1 Construction of Term Pool -- 2.2 Genetic Algorithm for Selecting Expansion Terms -- 2.2.1 Representation of Chromosome -- 2.2.2 Fitness Function -- 2.2.3 Algorithm for GABQE -- 3…Experiments and Results -- 4…Conclusion -- References -- 7 Genetic Algorithm-Based Adaptive PID Controller -- Abstract -- 1…Introduction -- 2…The Proposed PID Controller -- 2.1 The Conventional PID Controller -- 2.2 The Adaptive PID Controller -- 2.3 GA-Optimized APID -- 2.3.1 Objective Function of the Genetic Algorithm -- 2.3.2 Different Operations Used in GA -- 3…Results -- 4…Conclusion -- References -- 8 Text Mining for Phishing E-mail Detection -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Data set Preparation -- 3.2 Feature Extraction Using Text Mining -- 3.3 Feature Selection -- 3.4 Classification -- 4…Implementation -- 5…Conclusion -- References -- 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Workflow Design -- 4…Multi-objective Scheduling Model -- 5…General CSO Algorithm -- 6…Proposed Algorithm -- 6.1 Seeking Mode -- 6.2 Tracing Mode -- 7…Input Data for Experiment -- 8…Results and Discussion -- 8.1 Output Graphs Generated by MATLAB -- 8.2 Analysis of Resultant Graphs -- 9…Conclusion and Future Scope -- References -- 10 A Case Study of User Behavior in Information Retrieval -- Abstract -- 1…Introduction -- 2…User Behavior in Information Retrieval -- 3…Case Study -- 3.1 Scoring -- 4…Approaches to Incorporating Implicit Feedback -- 5…Conclusion -- References. , 11 Fuzzy Mapping of Robotic Arm Based on LabVIEW -- Abstract -- 1…Introduction -- 2…Implementation of System -- 3…Designing Fuzzy Systems -- 4…A Table LookUp Scheme -- 5…Fuzzy System Design for Robotic Arm -- 6…Mapping for Base of Robotic Arm -- 7…Mapping for Gripping of Object -- 8…Kinematics of Robotic Arm -- 9…Conclusion and Future Work -- References -- 12 An Improvement on NSGA-II for Finding Fast the Better Optimal Solution in Multi-objective Optimization Problem -- Abstract -- 1…Introduction -- 2…A Brief Review on Existing Work -- 3…Proposed Methodology -- 3.1 Algorithm Steps -- 4…Implementation and Result Analysis -- 4.1 Test Problems -- 4.2 Results and Comparison with Other Clustering Methods -- 5…Conclusion and Future Work -- References -- 13 Test Case Creation from UML Sequence Diagram: A Soft Computing Approach -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Work -- 3.1 Proposed Framework -- 3.2 UML Diagram for Design Document -- 3.3 Message Control Flow Graph -- 3.4 Algorithm to Create Test Cases Using GA -- 4…Implementation and Results -- 4.1 Optimization of Test Paths Using GA -- 4.2 Test Case Creation -- 5…Conclusion -- References -- 14 Solving Nonlinear Constrained Optimization Problems Using Invasive Weed Optimization -- Abstract -- 1…Introduction -- 2…Invasive Weed Optimization -- 3…Multistage Penalty Function -- 4…Results and Discussion -- 5…Conclusions -- References -- 15 ESEC: An Ideal Secret Sharing Scheme -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Non-threshold Secret Sharing Scheme Using ECC -- 4…A Multilevel Secret Sharing Scheme -- 5…Implementation and Analysis -- 5.1 Implementation -- 5.2 Analysis -- 6…Conclusion -- References -- 16 Extended Service Registry to Support I/O Parameter-Based Service Search -- Abstract -- 1…Introduction -- 2…Object Relational Database for Service Registry. , 2.1 WSDL and UDDI Relationship -- 2.2 Object Relational Database as Service Registry -- 2.3 Extended Service Registry -- 2.4 I/O Parameter-Based Service Search -- 2.5 Process of Parameter-Based Service Search -- 3…Experimental Results -- 3.1 Experimental Setup -- 3.2 Comparison of Basic Keyword Search in Registries---JUDDI Versus ESR Approach -- 3.3 Performance of Output Parameter-Based Service Search -- 4…Related Work -- 5…Conclusion -- References -- 17 Realizing New Hybrid Rough Fuzzy Association Rule Mining Algorithm (RFA) Over Apriori Algorithm -- Abstract -- 1…Introduction -- 1.1 Data Mining and Association Rule Mining -- 1.2 Fuzzy ARM Concepts and Rough ARM Concepts -- 2…Theoretical Aspects -- 2.1 Rough Set Concepts and Reducts -- 2.2 Information System and Decision System -- 2.3 Fuzzy c-Means Clustering -- 3…Proposed Algorithm -- 3.1 Algorithm Description -- 3.2 Pseudo Code -- 3.3 Analysis -- 4…Conclusion and Future Work -- References -- 18 Modal Analysis of Hand-Arm Vibration (Humerus Bone) for Biodynamic Response Using Varying Boundary Conditions Based on FEA -- Abstract -- 1…Introduction -- 2…The CAD Model -- 3…Boundary Conditions and Material Properties -- 4…Results and Discussion -- 5…Conclusion -- References -- 19 Preserving Privacy in Healthcare Web Services Paradigm Through Hippocratic Databases -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Example Scenario -- 4…Enhancement of Hippocratic Databases Through Analytical Hierarchy Processing -- 5…Conclusions -- References -- 20 Generation of Array Passwords Using Petri Net for Effective Network and Information Security -- Abstract -- 1…Introduction -- 2…Types of Existing Authentication Methods -- 3…Limitations of Existing Methods -- 4…Need of a Good Password -- 5…Petri Net -- 6…Array Token Petri Net Structure -- 6.1 Basic Notations -- 6.2 Catenation Rule -- 6.3 Firing Rules. , 6.4 Set of Labels -- 7…Model Formulation and Generation of Array Passwords -- 7.1 Petri Net to Generate All Possible 2 x 2 Arrays Over the Alphabet {a, b} -- 7.2 Firing Sequences -- 8…Conclusion -- References -- 21 Application of Genetic Algorithm for Component Optimization to Deploy Geoprocessing Web -- Abstract -- 1…Introduction -- 2…Approaches for Geoprocessing -- 3…The Geoprocessing Web and Component Optimization -- 4…Proposed Work -- 5…Conclusions -- References -- 22 DNA-Based Cryptographic Approach Toward Information Security -- Abstract -- 1…Introduction -- 2…Brief Idea of DNA -- 3…Literature Review -- 4…Proposed Method -- 4.1 Encryption -- 4.1.1 Algorithmic Steps -- 4.2 Embedding -- 4.2.1 Algorithmic Steps -- 5…Algorithmic Presentation -- 5.1 Key Selection -- 5.2 Message Encryption -- 6…Conclusion -- References -- 23 Design a Fuzzy Logic Controller with a Non-fuzzy Tuning Scheme for Swing up and Stabilization of Inverted Pendulum -- Abstract -- 1…Introduction -- 2…Inverted Pendulum Description -- 3…Controller Design -- 4…Proposed Tuning Scheme -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 24 Use of Machine Learning Algorithms with SIEM for Attack Prediction -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Frame Work -- 3.1 OSSIM -- 3.2 Dataset and Feature Selection -- 3.3 Find Feature Set Using Information Gain -- 3.4 Classification and Prediction -- 4…Conclusion -- References -- 25 Performance Comparison of Single-Layer Perceptron and FLANN-Based Structure for Isolated Digit Recognition -- Abstract -- 1…Introduction -- 2…Data Set and Feature Extraction -- 2.1 Calculation of Gradient [13] -- 2.2 Generation of Feature Vector [13] -- 2.3 Dimension Reduction -- 3…Classification -- 3.1 Single-Layer Perceptron Structure -- 3.2 FLANN Structure -- 4…Simulation Result -- 5…Conclusion -- References. , 26 Computational Techniques for Predicting Cyber Threats.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (858 pages)
    Edition: 1st ed.
    ISBN: 9788132217596
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Soft computing -- Congresses. ; Problem solving -- Data processing -- Congresses. ; Engineering. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (571 pages)
    Edition: 1st ed.
    ISBN: 9788132216957
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.250
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Contents -- 1 Research on Hierarchical Clustering Algorithm Based on Cluster Outline -- Abstract -- 1…Introduction -- 2…Definition and Solution -- 2.1 The Definition of Boundary Point and Cluster Outline -- 2.2 The Solution of Cluster Outline -- 3…The Design of Hierarchical Clustering Algorithm Based on Cluster Outline -- 3.1 The Clustering Between Clusters -- 3.2 The Clustering Between Clusters and Outliers -- 3.3 The Process of the Algorithm -- 4…The Experimental Analysis -- 5…Conclusions -- Acknowledgments -- References -- 2 Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things -- Abstract -- 1…Introduction -- 2…The Remote Diagnosis System Designment of the Air Compressor Using Internet of Things -- 3…Field Information Collection with the Internet of Things Technology -- 4…To Realize Remote Monitoring Using Communication Technology -- 5…To Build Fault Model -- 6…To Establish Fault Diagnosis Expert System -- 7…Summary -- Acknowledgments -- References -- 3 An Enhancement Algorithm Based on Fuzzy Sets Algorithm Using Computer Vision System for Chip Image Processing -- Abstract -- 1…Introduction -- 2…Related Works -- 2.1 Image Enhancement -- 2.2 Vision-Based Detection System -- 2.3 Image Edge -- 3…Methodology -- 3.1 Introduction of Fuzzy Sets -- 4…Results and Discussion -- 5…Conclusions -- References -- 4 Development of DDoS Attack Defense System Based on IKEv2 Protocol -- Abstract -- 1…Introduction -- 2…IKEv2 Protocol Analysis and Design -- 3…Development of DDoS Attack Defense System Based on IKEv2 Protocol -- 4…Conclusions -- References -- 5 Power Data Network Dynamic Simulation Platform -- Abstract -- 1…Introduction -- 2…Introduction of Existing Simulation Technology -- 3…Dynamic Simulation Platform for the Design of the Electric Power Data Network. , 3.1 Logical Structure -- 3.2 Hierarchy -- 4…Working Mechanism of Power Data Network Dynamic Simulation Platform -- 4.1 Simulate the Dynamic Interaction Objects -- 4.2 Dynamic Mock Object -- 4.3 Different Levels of Dynamic Change Agreement -- 4.4 Simulation Performance Improvements -- 5…Conclusions -- Acknowledgments -- 6 An Emotional Model Based on Multiple Factors -- Abstract -- 1…Introduction -- 2…Problem Description and Approach -- 2.1 Problem Description -- 2.2 Perception Module -- 2.3 Subconscious Module -- 2.4 Inside Variable Module -- 2.5 Character Module -- 2.6 Mood Module -- 2.7 Emotion Module -- 2.8 Behavior Module -- 3…Experiments and Results -- 3.1 Experiments -- 3.2 Results -- 4…Conclusions -- 7 Multi-Source and Heterogeneous Knowledge Organization and Representation for Knowledge Fusion in Cloud Manufacturing -- Abstract -- 1…Introduction -- 1.1 Cloud Manufacturing -- 1.2 Knowledge Fusion and Service -- 2…Analysis of Knowledge Resources and Requirements for Knowledge Organization and Representation of Group Corporation in Cloud Manufacturing -- 2.1 Features of Group Corporation Knowledge Management and Knowledge Resource Classification -- 2.2 Requirement Analysis of Knowledge Organization and Representation in Group Corporation -- 3…Knowledge Organization and Representation Model for Knowledge Fusion -- 3.1 Knowledge Unit -- 3.2 Fusion Knowledge -- 4…Framework of Knowledge Fusion and Service in Cloud Manufacturing -- 5…Conclusions -- References -- 8 Research of Dynamics and Deploying Control Method on Tethered Satellite -- Abstract -- 1…Introduction -- 2…A System Dynamics Model -- 3…Analyze the Values of System Parameters -- 4…Simulation and Analysis -- 5…Conclusions -- References -- 9 Using Auto-Associative Neural Networks for Signal Recognition Technology on Sky Screen -- Abstract -- 1…Introduction. , 2…Hopfield Associative Neural Network -- 2.1 Discrete Hopfield Network Theory -- 3…Application of Hopfield Network for Typical Projectile Signal -- 3.1 Extraction of Pattern Feature -- 3.2 Associative Memory Algorithm for Discrete Hopfield Neural Networks -- 3.3 Simulation and Application for Typical Signal of Sky Screens -- 4…Results -- References -- 10 Research on the Hotspot Information Push System for the Online Journal Based on Open-Source Framework -- Abstract -- 1…Introduction -- 2…Key Technologies -- 2.1 HttpClient -- 2.2 HTMLParser -- 2.3 IKAnalyzer -- 3…The Realization of the System Framework -- 4…Examples -- 5…Summary -- Acknowledgments -- References -- 11 Development of Control System of Wheel Type Backhoe Loader -- Abstract -- 1…Introduction -- 2…The Features of CAN Bus Control System -- 3…Design of the Architecture of CAN Bus Control System -- 3.1 Typical Architecture of CAN Bus Control System -- 3.2 The Architecture of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4…Principle and Functions of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4.1 The Control of Loading Operation -- 4.2 The Control of Excavating Operation -- 4.3 System Indication and Failure Alarm Control -- 5…The Features of the Control System of Wheel Type Backhoe Loader -- 6…Conclusions -- References -- 12 Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Abstract -- 1…Introduction -- 2…Review of Preliminaries -- 3…Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Acknowledgments -- References -- 13 CGPS: A Collaborative Game in Parking-Lot Search -- Abstract -- 1…Introduction -- 2…The Parking-Lot Searching Scenario -- 3…Algorithm Analysis -- 3.1 Opponent Selection -- 3.2 Game Analysis -- 4…Simulation Analysis -- 5…Conclusions -- References. , 14 A Fuzzy-Based Context-Aware Privacy Preserving Scheme for Mobile Computing Services -- Abstract -- 1…Introduction -- 2…Privacy Challenge of Mobile Computing -- 3…System Overview -- 3.1 Architecture -- 3.2 Context Modeling -- 3.3 Fuzzy-Reasoning Process -- 4…Evaluation -- 5…Conclusions -- Acknowledgments -- References -- 15 Research and Application of Trust Management System -- Abstract -- 1…Introduction -- 2…Trust Management Architecture -- 3…Trust Evaluation Method -- 4…Simulation and Application -- 4.1 A Simulation -- 4.2 Performance Discussion -- 5…Conclusions and Future Work -- Acknowledgments -- References -- 16 Ranaad-Xek: A Prototype Design of Traditional Thai Musical Instrument Application for Android Tablet PC -- Abstract -- 1…Introduction -- 2…Ranaad-Xek -- 2.1 Ranaad-Xek's Composition -- 2.2 Ranaad-Xek Percussions -- 3…Application Specification and Architecture -- 3.1 Framework -- 3.2 Application Specification -- 3.3 Application Architecture -- 3.4 The Playing Mode -- 3.5 Recording System -- 3.6 GUI Design -- 4…Conclusions -- Acknowledgments -- References -- 17 Identifying Accurate Refactoring Opportunities Using Metrics -- Abstract -- 1…Introduction -- 2…Relate Work -- 2.1 Cloned Code -- 2.2 The Difficulties of Identifying Refactoring Opportunities -- 3…An Approach to Identifying Refactoring Opportunities with Metrics -- 3.1 Benefits -- 3.2 Costs -- 3.3 Evaluation of the Benefit and Cost -- 4…Future Work -- Acknowledgments -- References -- 18 Research on Neural Network Predictive Control of Induction Motor Servo System for Robot -- Abstract -- 1…Introduction -- 2…Servo System Modeling -- 3…The Predictive Control Servo System Based on BP Neural Network -- 3.1 Control Structures -- 3.2 Neural Network Predictive Model -- 3.3 Feedback Correction -- 3.4 Scroll Optimization -- 3.5 Neural Network Predictive Control Algorithm Steps. , 4…MATLAB Simulation and Analysis -- Acknowledgments -- References -- 19 Research on Scale-Out Workloads and Optimal Design of Multicore Processors -- Abstract -- 1…Introduction -- 2…Scale-out Workloads -- 3…Experiment and Analysis -- 3.1 Throughput -- 3.2 Latency -- 4…Optimal Design of Multicore Processors for Scale-out Workloads -- 5…Related Work -- 6…Conclusions -- Acknowledgments -- References -- 20 Study of Modified Montgomery's Algorithm and Its Application to 1,024-bit RSA -- Abstract -- 1…Introduction -- 2…RSA Cryptosystem -- 2.1 Montgomery Algorithm and Modified Montgomery Algorithm -- 2.2 Four-to-two CSA -- 2.3 Modified R-L Binary Algorithm -- 3…Algorithm Implementation -- 3.1 Four-to-two Architecture -- 3.2 Modified R-L Binary Architecture -- 4…Conclusions -- References -- 21 A MVS-Based Object Relational Model of the Internet of Things -- Abstract -- 1…Introduction -- 2…MVS-Based Object Relational Model of the Internet of Things -- 2.1 Construction of Basic Data Model -- 2.2 Calculation of Properties' Characteristics of the Internet of Things -- 3…Experimental Verification and Conclusion -- References -- 22 Rateless Code-Based Unequal Loss Protection for Layer-Coded Media Delivery -- Abstract -- 1…Introduction -- 2…ULP-Strider Coding System -- 2.1 Decoding Algorithm -- 2.2 Encoding Process -- 2.3 Analyzing the Construction of Redundancy -- 3…Simulation -- 3.1 Random Sequence Versus Fine-Designed Sequence -- 3.2 Extra Information from Soft Hint -- 3.3 Strider Versus ULP-Strider -- 4…Conclusions -- Acknowledgments -- References -- 23 Construction of the Grade-3 System for GJB5000A-2008 -- Abstract -- 1…Current Software Engineering Process Overview -- 2…Analysis of the Correlation and the Necessity of Fusion Between GJB5000A-2008 and Software Engineering Process -- 3…Built Process System Based on the Software Engineering. , 4…Process Instance Analysis.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...