GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Cytology ; Radiology, Medical ; Human Physiology ; Human physiology ; Neurosciences ; Stem cells ; Nanotechnology ; Oxidative stress. ; Radiology. ; Stroke physiopathology ; Stroke therapy ; Risk Factors
    Description / Table of Contents: Chapter 1. Cerebral stroke: An Introduction -- Chapter 2. Inflammation, oxidative stress, and neurodegeneration -- Chapter 3. Stroke induced blood brain barrier damage -- Chapter 4. Regulation of calcium ions in ischemic neuronal cell -- Chapter 5. Ischemic stroke induced endoplasmic reticulum stress -- Chapter 6. The role of autophagy in ischemic stroke: friend or foe?- Chapter 7. Critical role of mitochondrial autophagy in cerebral stroke -- Chapter 8. Application of neuroimaging in the identification of the pinpoint location of blockage -- Chapter 9. Emerging role of the electromagnetic field in stroke -- Chapter 10. Stem cell therapies for stroke -- Chapter 11. MicroRNA: Significance to stroke diagnosis, prognosis, and therapy -- Chapter 12. Therapeutic Aspects of Nanomedicines in Stroke Treatment -- Chapter 13. Neuroprotective potential of small molecule phytochemicals against stroke -- Chapter 14. Role of UV irradiation on neuroprotective potential of phytochemicals -- Chapter 15. Post-stroke treatment strategies, management, and rehabilitation
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource (VIII, 189 p. 23 illus., 12 illus. in color)
    ISBN: 9789811314537
    Series Statement: Springer eBooks
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1216 pages)
    Edition: 1st ed.
    ISBN: 9789811089442
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.752
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Interactive Browsing of Large Image Repositories -- 1 Introduction -- 2 Image Database Navigation Systems -- 3 Hue Sphere Image Browser-Principles -- 4 Hue Sphere Image Browser-Systems -- 5 Conclusions -- References -- Intelligent Computing -- 2 Building Unmanned Plant Factory with Modular Robotic Manipulation and Logistics Systems -- Abstract -- 1 Introduction -- 2 Overview of the Integrated Logistics Systems -- 3 Unmanned Ground Vehicle (UGV) -- 3.1 Overview of the UGV -- 3.2 Hardware of the UGV -- 4 Docking System -- 5 Smart Remote-Control System -- 6 Conclusion -- Acknowledgements -- References -- 3 A Comprehensive Looks at Data Mining Techniques Contributing to Medical Data Growth: A Survey of Researcher Reviews -- Abstract -- 1 Introduction -- 2 An Overview of Data Mining -- 3 Proposed Reviews -- 4 Summary -- 5 Conclusion -- Acknowledgements -- References -- 4 Risk Evaluation in TSC Based on Fuzzy Linguistic Information and QFD -- Abstract -- 1 Introduction -- 2 Risk Evaluation in TSC Based on Fuzzy Linguistic Term -- 2.1 2-Tuple Fuzzy Linguistic Model -- 2.2 Risk Analysis Based on Quality Function Deployment -- 2.3 Risk Evaluation Based on Fuzzy QFD -- 3 Case Study -- 4 Conclusion -- References -- 5 Study on Total Factor Productivity of Nanshan District in Shenzhen -- Abstract -- 1 Foreword -- 2 The Measure of Factor Productivity -- 2.1 Model and Parameter Estimation -- 2.1.1 Selection of Production Function -- 2.1.2 Parameter Estimation of Production Function -- 2.2 Efficiency of Economic Operation -- 3 Explain the Growth Phases of Economy in Nanshan District -- 4 Conclusion -- Acknowledgements -- References -- 6 Image Spam Filtering Using Weighted Spatial Pyramid Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 ADAMM Stochastic Optimization Algorithm. , 4 WSP-Net Real-Time Image Recognition Model -- 5 Performance -- 6 Discussion and Conclusions -- Acknowledgements -- References -- 7 Research on the Technology Used to Inspect the Visual Appearance of Tropical Fruit, based on Machine Vision Color Space -- Abstract -- 1 Introduction -- 2 Characteristics of Hainan Tropical Fruit -- 3 Machine Vision (Computer Vision) Detection Technology -- 4 Applied Research -- 5 Summary -- Acknowledgements -- References -- 8 Research on the Mixed-Learning Model and the Innovative Talent Cultivation Mechanism Based on Computational Thinking -- Abstract -- 1 Introduction -- 2 Domestic and Foreign Research Status -- 3 Research on the Cultivation Mode of Ability in Computational Thinking -- 4 The Purpose of Researching Computational Thinking -- 5 Cultivating the Technical Method of Calculating Thinking -- 6 Summary -- Acknowledgements -- References -- 9 Review of Domestic and Foreign Research on the Elderly's Use of Mobile Phones -- Abstract -- 1 Introduction -- 2 Research Method -- 2.1 Literature Review and Database Selection -- 2.2 Search Term and Evaluation of Literature Relevance -- 2.3 Analysis and Reorganization -- 3 Influencing Factors for the Elderly's Use of Mobile Phones -- 3.1 Characteristics of the Elderly -- 3.2 Personal Motivation -- 3.3 Sociodemographic Factors -- 3.4 Technology Convenience -- 4 Prospects -- Acknowledgements -- References -- 10 Research on Face Detection Based on Fast R-CNN -- Abstract -- 1 Introduction -- 2 Face Detection Fast R-CNN -- 2.1 The Construction of Face Detection -- 2.2 Fast R-CNN -- 2.3 ROI Pooling Layer Calculation -- 2.4 Output Layer Regression Calculation -- 3 Experimental Part -- 3.1 Experimental Platform -- 3.2 Experimental Results and Analysis -- 4 Summary -- References -- 11 Research and Optimization of Data Sparsity in Collaborative Filtering Algorithms -- Abstract. , 1 Introduction -- 2 Cooperative Filtering Algorithm Based on Memory -- 3 Algorithm Design and Implementation -- 3.1 Problem Analysis -- 3.2 Algorithm Design and Implementation -- 4 Experimental Results and Analysis -- 4.1 Experimental Data and Environment -- 4.2 Experimental Results -- 5 Summary -- References -- 12 A Robust Image Segmentation Approach Using Fuzzy C-Means Clustering with Local Coefficient of Variation -- Abstract -- 1 Introduction -- 2 Motivation -- 3 The Proposed Method -- 4 Results and Analysis -- 4.1 Synthetic Images -- 4.2 MR Brain Images -- 5 Conclusion -- Acknowledgements -- References -- 13 A Method to Mine Frequent Dense Resources Across Multiple Real-Value Function's Resource Effectiveness Matrixes -- Abstract -- 1 Introduction -- 2 Problem Description -- 3 Mining Frequent Dense Resource Sets -- 4 Results -- 5 Conclusion -- Acknowledgements -- References -- 14 Augmenting Concolic Testing with Weighted Constraints-Based Search -- Abstract -- 1 Introduction -- 2 Overview -- 2.1 Concolic Testing -- 2.2 Search Strategies -- 3 Implementation -- 3.1 CFG Construction -- 3.2 Path Constraints Collect and Evaluate -- 3.3 Sort the Paths and Solve Constraints -- 4 Evaluation -- 5 Conclusion -- Acknowledgements -- References -- 15 Research of TDOA Cooperative Direction Finding Algorithm Based on LLS and Taylor -- Abstract -- 1 Introduction -- 2 Algorithm Description -- 2.1 Direction Finding Model Based on TDOA -- 2.2 Cooperative Algorithm Based on LLS and Taylor -- 3 Error Analysis -- 3.1 Cramer-Rao Lower Bound -- 3.2 Mean Square Error -- 4 Simulation Experiments -- 4.1 Parameter Setting -- 4.2 Estimate Results of Direction -- 5 Conclusion -- References -- 16 KCF Tracking Algorithm Based on Outlier Detection -- Abstract -- 1 Introduction -- 2 KCF Tracking Algorithm -- 2.1 Training Classifiers -- 2.2 Target Detection. , 3 Improved KCF Algorithm -- 3.1 Target Detection -- 3.2 Re-Detection and Localization Mechanism -- 4 Experimental Results and Analysis -- 4.1 Experimental Environment and Parameters -- 4.2 Assessment Criteria -- 4.3 Performance Analysis -- 5 Conclusion -- References -- 17 Spectral Clustering Algorithm Based on Attribute Weight of Information Entropy -- Abstract -- 1 Introduction -- 2 Weighted Euclid Distance Based on Information Entropy -- 3 Algorithm -- 4 Experiment -- References -- 18 Interference Location Using an Improved TDOA Algorithm with Antenna Array and Beamforming -- Abstract -- 1 Introduction -- 2 TDOA Method Description -- 3 Improved TDOA Using Array Antenna -- 4 Experiments and Conclusion -- Acknowledgements -- References -- 19 Reconstruction Algorithm of Discontinuous Point for a Class of Shallow Water Equations by MQQI -- Abstract -- 1 Introduction -- 2 Equations -- 3 Numerical Methods -- 4 Numerical Examples -- 4.1 The KDV Equation -- 4.2 The C-H Equation -- 4.3 The D-P Equation -- 5 Conclusion -- Acknowledgements -- References -- 20 Salmon Migration Optimization: A Novel Nature-Inspired Algorithm -- Abstract -- 1 Introduction -- 2 Salmon Migration Optimization (SMO) -- 2.1 Inspiration -- 2.2 Algorithm Flow and Mathematical Model -- 2.2.1 SMO Algorithm -- 2.2.2 Water Flow Oriented Heuristic -- 2.2.3 Magnetic Oriented Heuristic -- 2.2.4 Pheromone Oriented Heuristic -- 3 Results and Discussion -- 3.1 Benchmark Functions and Experimental Setting -- 3.2 Comparison Results and Analysis -- 3.2.1 Unimodal Test Functions and Exploitation Analysis -- 3.2.2 Multi-modal Test Functions and Exploration Analysis -- 3.2.3 Wilcoxon Rank-Sum Test Results and Analysis -- 4 Conclusions -- References -- 21 An Intelligent Logistic Regression Approach for Verb Expression's Sentiment Analysis -- Abstract -- 1 Introduction -- 2 Methodology. , 2.1 Verb Expression Extractor and Vectorization -- 2.2 New Feature Finding with PSO -- 2.3 Regression Coefficient Computation -- 3 Experiments -- 3.1 Datasets -- 3.2 Experimental Results -- 4 Conclusion -- Acknowledgements -- References -- 22 Lyapunov Inequality for Conformable Fractional Equation -- Abstract -- 1 Introduction -- 2 Definition, Lemma, and Remark -- 3 Main Results -- 4 Discussion -- Acknowledgements -- References -- 23 Feature Extraction and Classification of Dynamic and Static Gestures Based on RealSense -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Intel RealSense Technology -- 2.2 Hand Data Acquisition -- 2.3 Gesture Customization -- 3 Feature Analysis and Extraction -- 3.1 Gesture Feature Analysis and Calculation -- 3.2 Feature Set Selection -- 4 Experiment and Analysis -- 5 Conclusions -- Acknowledgements -- References -- 24 Research on Passive Acoustic Source Direction Finding Based on TDOA -- Abstract -- 1 Introduction -- 2 Development of Passive Acoustic Direction Finding -- 3 Direction-Finding Algorithm -- 3.1 Method of Solving Equations -- 3.2 Linear Least Square Method -- 4 The Current Direction-Finding Problems -- 5 Conclusion -- References -- 25 Evaluation of English Speech Quality Based on Deep Belief Network -- Abstract -- 1 Introduction -- 2 Speech Signal Preprocessing and Feature Extraction -- 2.1 The Preprocessing of Speech Signals -- 2.2 Extraction of Speech Feature Parameters -- 3 Multi-parameter Pronunciation Quality Evaluation Based on Deep Belief Network -- 3.1 Restricted Boltzmann Machine -- 3.2 Deep Belief Network -- 4 Experiment Simulation and Result Analysis -- 5 Conclusions -- References -- 26 Integrated Simulation Design of UAV System -- Abstract -- 1 Introduction -- 2 Scheme Design -- 2.1 Development Process of Integrated Simulation -- 2.2 Simulation Objects and Integrated Simulation System. , 3 Real-Time Simulation System Design.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (398 pages)
    Edition: 1st ed.
    ISBN: 9789811393303
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1005
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Data Science and Analytics -- Quality Index Evaluation Model Based on Index Screening Model -- 1 Introduction -- 2 Three-Parameter Interval Principal Component Analysis -- 2.1 Principal Component Analysis -- 2.2 Calculation Steps -- 2.3 M-PCA Three-Parameter Interval Principal Component Analysis -- 2.4 Calculation Steps -- 2.5 The Determination of Subjective Index Weight Based on Analytic Hierarchy Process -- 2.6 Index Evaluation -- 3 Analysis of Examples -- 4 Conclusion -- References -- Selection of Software Development Methodologies (SDMs) Using Bayesian Analysis -- 1 Introduction -- 2 Proposed Work -- 3 Proposed Model -- 3.1 Experimental Result -- 4 Conclusion -- 5 Future Scope -- References -- Role of Social Media in Employer Branding-A Study on Selected Engineering Colleges (Private) in Bhubaneswar -- 1 Introduction -- 2 Objective -- 3 Methodology -- 4 Literature Review -- 4.1 Employer Branding -- 5 Cases of Private Institute -- 5.1 Case 1: Institute of Technical Education and Research, SOA University, Bhubaneswar -- 5.2 Case 2: Centurion University of Technology and Management (CUTM), Bhubaneswar -- 5.3 Case 3: Silicon Institute of Technology -- 5.4 Case 4: Gandhi Engineering College (GEC) Bhubaneswar -- 5.5 Case 5: Hi-Tech Institute of Technology (HIT), Bhubaneswar -- 6 Conclusion of the Study -- References -- A Novel Approach for Artifact Removal from Brain Signal -- 1 Introduction -- 2 Overview of Proposed Method -- 2.1 Kurtosis -- 2.2 Multiscale Entropy (MSE) -- 2.3 Artifact Channel Identification -- 2.4 Artifact Denoising -- 3 Results and Discussion -- 4 Conclusion -- References -- A Novel Approach to Heterogeneous Multi-class SVM Classification -- 1 Introduction -- 2 Literature Review -- 3 Classification Problem -- 4 Proposed Novel Approach for Heterogeneous Data. , 5 Experimental Results -- 6 Conclusion -- References -- An Empirical Study of Big Data: Opportunities, Challenges and Technologies -- 1 Introduction -- 2 Importance of Big Data -- 2.1 Importance to National Development -- 2.2 Importance to Industrialized Upgrades -- 2.3 Importance to Technical Research -- 2.4 Importance to Interdisciplinary Research -- 2.5 Importance to Better Predict the Future -- 3 Big Data Characteristics -- 3.1 Volume -- 3.2 Velocity -- 3.3 Variety -- 3.4 Veracity -- 3.5 Validity -- 3.6 Volatility -- 3.7 Value -- 4 Hadoop: Way to Process Big Data -- 4.1 Hadoop Distributed File System -- 4.2 MapReduce -- 5 Challenges of Big Data -- 5.1 Data Challenges -- 5.2 Processing Challenges -- 5.3 Management Challenges -- 6 Big Data Techniques -- 7 Big Data Hadoop-Based Tools -- 7.1 Apache Hadoop -- 7.2 Apache Mahout -- 7.3 Storm -- 7.4 S4 -- 7.5 Apache Kafka -- 8 Conclusion -- References -- Forecasting World Petroleum Fuel Crisis by Nonlinear Autoregressive Network -- 1 Introduction -- 2 Data Sources -- 3 Methodology -- 3.1 Time Series Prediction Using Artificial Neural Network (ANN) -- 3.2 Comparisons of General Prediction Models -- 3.3 Predictive Model Flow Control Diagram -- 3.4 Predictive Model Structure -- 4 Performance Measurement -- 5 Result and Analysis -- 6 Comparison and Discussion -- 7 Hypothesis Testing -- 8 Conclusion -- References -- Stock Market Price Prediction Employing Artificial Neural Network Optimized by Gray Wolf Optimization -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Dataset -- 3.2 Normalization -- 3.3 Artificial Neural Network -- 3.4 Gray Wolf Optimization -- 4 Proposed Approach -- 5 Experimental Setup and Simulation Result -- 6 Conclusion -- References -- Analysis of Techniques for Credit Card Fraud Detection: A Data Mining Perspective -- 1 Introduction -- 2 Literature Review. , 2.1 Dataset Collection -- 2.2 Various Methodology of Fraud Detection in Credit Card -- 3 Challenges in Credit Card Fraud Detection -- 4 Conclusion -- References -- Predictive Analytics for Weather Forecasting Using Back Propagation and Resilient Back Propagation Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Supervised Learning Algorithms -- 4 Artificial Neural Network -- 4.1 Back Propagation Algorithm -- 4.2 Resilient Back Propagation -- 5 Results and Discussion -- 5.1 Backprop and Rprop Implemented in RStudio -- 5.2 Receiver Operating Characteristic Curve (ROC) and Area Under Curve (AUC) -- 5.3 ggplot -- 6 Conclusion -- Appendix -- References -- Analysis of the Leadership of Undergraduate Freshmen in Military Schools from the Perspective of Space -- 1 Introduction -- 2 Research Methods -- 2.1 Research Tools -- 2.2 Research Procedures -- 3 The Results Analysis -- 3.1 Reliability and Validity Test -- 3.2 Overall Analysis of Leadership -- 3.3 Analysis of the Correlation Between Leadership and Per Capita Income -- 3.4 Analysis of the Correlation Between Leadership and Per Capita Income -- 4 Result Analysis -- 5 Concluding Remarks -- References -- Correlation Analysis for CSI300 Index Return and Realized Volatility -- 1 Introduction -- 2 Model Construction -- 2.1 Model Realized Estimate -- 2.2 Edge Distribution Model Construction -- 2.3 Construction of Time Change D-Vine Copula -- 3 Empirical Analysis -- 3.1 Characteristic Analysis -- 3.2 Parameter Estimation -- 3.3 Parameter Estimation for Continuous-Time Volatility and the Jump Volatility Models -- 3.4 Correlation Analysis -- 4 Conclusion -- References -- Prescription Basket Analysis: Identifying Association Rule Among Drugs in Prescription of Dentist in Bhubaneswar City -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 4 Conclusion -- References. , Decision Science and Management -- Impact of Decision Science on e-Governance: A Study on Odisha Land Records System -- 1 Introduction -- 1.1 e-Governance -- 1.2 Odisha Right to Public Services Act -- 2 Literature Review -- 2.1 Brainstorming -- 2.2 Committee Meetings -- 2.3 Delphi -- 2.4 Electronic Meeting -- 2.5 Survey -- 2.6 Decision Tree and Decision Tables -- 2.7 Game Theory -- 2.8 Simulation -- 3 Decision Science for e-Governance -- 3.1 Risk Analysis -- 3.2 Decision Analysis -- 3.3 Cost-Effectiveness Analysis -- 4 Key Findings of the Paper -- 5 Conclusion -- References -- HR Value Proposition Using Predictive Analytics: An Overview -- 1 Introduction -- 2 Data Analytics -- 2.1 Descriptive Analytics -- 2.2 Predictive Analytics -- 2.3 Prescriptive Analytics -- 3 Literature Review -- 3.1 HR Analytics -- 4 Findings and Discussion -- 4.1 Importance of Analytics in HR -- 5 Conclusions -- 6 Originality -- 7 Declaration -- References -- Determination of Time-Dependent Quadratic Demand by Using Optimal Ordering Policy, Salvage Value Under Partial Backlogging, Time-Proportional Deterioration, Time-Varying Holding Cost -- 1 Introduction -- 2 Assumptions -- 3 Modeling -- 3.1 Notations -- 3.2 Mathematical Formulation -- 4 Numerical Examples -- 5 Sensitivity Analysis -- 6 Conclusions -- References -- Inventory Control for Materials Management Functions-A Conceptual Study -- 1 Introduction -- 2 Review of the Literature -- 2.1 Inventory Management -- 2.2 Material Management -- 3 Conclusion -- References -- ACO-Based Secure Routing Protocols in MANETs -- 1 Introduction -- 2 Ant Colony Optimization -- 3 Security Aware ACO Routing Protocols -- 3.1 Secure Antnet Routing Algorithm for Scalable Ad Hoc Networks Using Elliptic Curve Cryptography -- 3.2 Secure Power Aware Ant Routing Algorithm -- 3.3 Swarm-Based Detection and Defence Technique. , 3.4 Detection and Prevention of Blackhole Attack in MANET Using ACO Routing -- 3.5 Autonomous Bio-inspired Public Key Management Protocol -- 3.6 ANT-Based Trustworthy Routing -- 3.7 Pair-Wise Key Agreement and Hop-by-Hop Authentication Protocol -- 4 Comparison and Analysis of Security Aware ACO Routing Protocols -- 5 Conclusion and Future Work -- References -- An Approach Toward Integration of Big Data into Decision Making Process -- 1 Introduction -- 2 Background -- 3 Challenges During Big Data Analytics for Decision Making -- 4 Integrated Framework of Big Data Analytics with Decision Making Process -- 4.1 Proposed Approach -- 5 Conclusion and Future Aspects -- References -- Big Data Analysis and Classification of Biomedical Signal Using Random Forest Algorithm -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of the Signal -- 4 Feature Extraction -- 5 Random Forest -- 6 Classification Result -- 7 Conclusion -- References -- An Intelligent Framework for Analysing Terrorism Actions Using Cloud -- 1 Introduction -- 2 Motivation -- 3 Objective -- 4 Literature Review -- 5 Comparison of Models -- 6 Conclusion -- References -- Research on Optimization of J Company Warehouse Storage Process -- 1 Introduction -- 2 Analysis on the Current Situation of J Company -- 2.1 Warehouse Storage Process -- 2.2 Problems with Warehouse Storage Process -- 3 Optimized Warehouse Storage Process -- 4 Petri Net Model -- 5 Conclusion -- References -- The Influence of Psychological Contract on the Willingness to Share Tacit Knowledge -- 1 Introduction -- 2 Psychological Contract -- 2.1 Knowledge Sharing -- 2.2 Hypothesis -- 3 Method -- 3.1 Measurement Tools -- 4 Result -- 5 Hypothesis Testing -- 6 Discussion -- 7 Limitations and Future Research -- References -- Research on the Role of Government Management in Chinese Public Indemnificatory Housing System. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1040 pages)
    Edition: 1st ed.
    ISBN: 9789811394065
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1006
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Intelligent Computing -- 1 Global Stability of a Viral Dynamical Model -- Abstract -- 1 Introduction -- 2 Model -- 3 The Existence of Equilibria -- 4 The Global Stability of Equilibria -- Acknowledgements -- References -- 2 Research on Construction of the Software Technology Profession in Vocational Institutes Based on the External Vision -- Abstract -- 1 Introduction -- 2 Professional Construction Ideas Based on the External Vision -- 3 Versatile Teaching Team Construction Based on the Strengths of Teachers -- 4 Social Service Ability Construction Based on Demands of Social Markets -- 5 Construction of School Training Bases Integrated Into Occupation Job Elements and the Construction of the Public Off-Campus Training Bases -- Acknowledgements -- References -- 3 Numerical Study on the Expanded Mixed Covolume Method for One-Dimensional Sobolev Equation -- Abstract -- 1 The Expanded Mixed Covolume Method -- 1.1 The Semi-discrete Scheme -- 1.2 The Fully Discrete Scheme -- 2 Numerical Invariants -- 2.1 A Single Solitary Wave -- 2.2 Interaction of Two Solitary Waves -- References -- 4 Research on the Control Method of Coal Sample Blanking Based on the BP Neural Network and the PID Algorithm -- Abstract -- 1 Introduction -- 2 Control Method of Coal Sample Blanking Based on the BP Neural Network and the PID Algorithm -- 2.1 PID Control Algorithm -- 2.2 BP Neural Network Algorithm -- 3 Experimental Verification -- Acknowledgements -- References -- 5 A Practice on Neural Machine Translation from Indonesian to Chinese -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Lore Translator -- 4 Experiments -- 4.1 Corpus -- 4.2 Training -- 4.3 Experimental Results and Discussion -- 4.4 Demo System -- 5 Conclusion -- Acknowledgements -- References. , 6 Keyword-Based Indonesian Text Summarization -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 The Development of Automatic Summarization -- 2.2 Existing Systems -- 3 Keyword Contribution Method -- 3.1 Overall Architecture -- 3.2 Algorithm -- 4 Experiment -- 5 Conclusion -- Acknowledgements -- References -- 7 Automatic Decision Support for Public Opinion Governance of Urban Public Events -- Abstract -- 1 Introduction -- 2 Implementation -- 2.1 Data Collection Layer -- 2.2 Information Analysis Layer -- 2.3 Public Opinion Government Layer -- 3 Conclusion -- Acknowledgements -- References -- 8 Improved Local Morphology Fitting Active Contour with Weighted Data Term for Vessel Segmentation -- Abstract -- 1 Introduction -- 2 Related Local Region-Based Models -- 3 Proposed Method -- 4 Results -- 5 Conclusion -- References -- 9 3D Point Cloud Data Splicing Algorithm Based on Feature Corner Model -- Abstract -- 1 Introduction -- 2 3D Point Cloud Data Splicing Algorithm Based on Feature Corner Model -- 2.1 Model Innovation and Data Mining -- 2.2 The Overall Structure of the System -- 2.3 Point Cloud Data Splicing Algorithm -- 3 Conclusion -- Acknowledgements -- References -- 10 A Preliminary Study on Mobile Learning -- Abstract -- 1 The Concept, Characteristics, and Composition of Mobile Learning -- 2 The Feasibility of Mobile Learning -- 2.1 The Characteristics of Mobile Learning -- 2.2 The Inherent Advantages of the Network Environment -- 2.3 The Needs of Professional Construction -- 3 Potential Problems and Solutions in Mobile Learning -- 4 Conclusion -- References -- 11 Design and Implementation of Real-Time Inquiry System of the Stock Market -- Abstract -- 1 Introduction -- 2 Relative Technologies -- 2.1 Hadoop -- 2.2 HBase -- 3 Requirement Analysis and Design -- 3.1 System Function Analysis -- 3.2 Overall Design of the System. , 3.3 Database Design -- 4 Implementation of the Key Modules of the System -- 4.1 The Real-Time Prompt Module of Fuzzy Query of Stock Information -- 4.2 News Information Module -- 4.3 Query Module of Large Quantities of Historical Data -- 5 Conclusion -- Acknowledgements -- References -- 12 An Improved Feature Selection Algorithm for Fault Level Identification -- Abstract -- 1 Introduction -- 2 Basic Concepts of Ordinal Classification -- 3 Feature Selection Algorithm for Ordinal Classification -- 4 Feature Selection and Classification Results -- 5 Conclusions -- Acknowledgements -- References -- 13 Computing Model of Musical Multiple Perception Based on Memory Mapping Perception Inversion -- Abstract -- 1 Introduction -- 2 Fuzzy Perception of Music -- 2.1 Fuzziness of Music -- 2.2 Memory Mapping and Perception Inversion (MMPI) -- 3 Music Intelligence Based on Fuzzy Perception -- 3.1 Musical Feature Index -- 3.2 The Basic Type of Music Perception -- 4 Experimental Results -- 5 Conclusions -- Acknowledgements -- References -- 14 A Natural Immersive Closed-Loop Interaction Method for Human-Robot "Rock-Paper-Scissors" Game -- Abstract -- 1 Introduction -- 2 System Description -- 2.1 The Natural Interaction Implementation -- 2.2 The Real-Time Performance Implementation -- 2.3 The Immersion Mode Implementation -- 3 The Closed-Loop Characteristics -- 4 System Testing and Evaluation -- 5 Conclusion -- References -- 15 Capsule Network-Based Facial Expression Recognition Method for a Humanoid Robot -- Abstract -- 1 Introduction -- 2 Advantages and Properties of the Capsule Net -- 2.1 The Differences -- 2.2 The Properties of the Capsule Net -- 3 CK+ Dataset and NAO Robot Experiments -- 3.1 CK+ Dataset -- 3.2 NAO Robot -- 3.3 Experiments -- 4 Conclusions -- Acknowledgements -- References. , 16 Equipment Maintenance Mode Decision Based on Fuzzy Multi-attribute Decision Method -- Abstract -- 1 Introduction -- 2 Fuzzy Multi-attribute Decision Model -- 3 Fuzzy Multi-attribute Decision Process -- 4 Fuzzy Multi-attribute Decision Method -- 5 Example Analysis -- 6 Conclusion -- References -- 17 A Method for Facial Kinship Verification Based on Deep Learning -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Channel Backbone Network -- 2.2 Multi-channel Model -- 2.2.1 Binary-Channel Model -- 2.2.2 Elastic Multi-channel Model -- 2.3 Training -- 3 Experiments and Results -- 4 Conclusion -- Acknowledgements -- References -- 18 A Domain-Adapting Word Representation Method for Word Clustering -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Frequently Co-occurring Entropy -- 3.2 Fuzzy Bag-of-Words Model -- 4 Experimental Results -- 5 Conclusion -- Acknowledgments -- References -- 19 Fitting Complex Nonlinear Function with Belief Rule Base -- Abstract -- 1 Introduction -- 1.1 The Basic BRB Model -- 1.2 BRB Inference Using ER Approach -- 2 Constructing BRB Model for Nonlinear Function -- 2.1 Nonlinear Function -- 2.2 Transformation Techniques for Quantitative Data -- 3 Parameter Training for BRB -- 4 Experiments Study -- 5 Conclusion -- References -- 20 Approximate Kernel Regression Based on Distributed ADMM Algorithm -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Kernel Regression -- 2.2 ADMM Algorithm -- 2.3 Kernel Regression Based on ADMM Algorithm -- 2.4 Approximate Kernel Matrix -- 3 Experiments -- 4 Conclusion -- Acknowledgements -- References -- 21 Detection for Mixed-Characters Based on Machine Learning -- Abstract -- 1 Introduction -- 2 The Composition of the Detection System -- 3 Character Preprocessing -- 3.1 Binarization -- 3.2 Character Segmentation -- 3.3 The Character Normalization -- 4 Data Set Production. , 5 Neural Network Design -- 6 Experimental Results and Analysis -- 7 Conclusion -- References -- 22 Research on 3D Terminal Rendering Technology Based on Power Equipment Business Features -- Abstract -- 1 Introduction -- 2 3D Model High-Speed Rendering Technology -- 3 3D Model Real-Time High-Speed Rendering Technology for Terminal and Grid Business Application Requirements -- 3.1 Scene Organization -- 3.2 Rendering Process -- 3.3 3D Engine Cross-Platform Technology -- 4 Conclusions -- Acknowledgements -- References -- 23 Community Detection Based on Improved Bee Evolutionary Genetic Algorithm -- Abstract -- 1 Introduction -- 2 Algorithm Structure and Algorithm Description -- 3 Improved Bee Evolutionary Genetic Algorithm -- 3.1 Fitness Function -- 3.2 Encoding -- 3.3 Population Initialization -- 3.4 Crossover Operator -- 3.5 Mutation Operator -- 3.6 Selection Operator -- 3.7 Optimization of Random Population Size -- 4 Simulation and Analysis -- 4.1 Community Detection of the LFR Benchmark Network -- 4.2 Community Detection of the Karate Club Network -- 4.3 Community Detection of the dolphin Network -- 5 Conclusion -- Acknowledgments -- References -- 24 Named Entity Recognition for Chinese Management Case Texts -- Abstract -- 1 Introduction -- 2 Semi-supervised Learning Method -- 2.1 Bootstrapped Framework -- 2.2 BI-LSTM-CRF Model -- 2.3 Evaluating Rule -- 3 Experiment -- 3.1 Dataset -- 3.2 Results and Analysis -- 4 Conclusion and Discussion -- Acknowledgements -- References -- 25 Application of Virtual Simulation Platform in Basic Medical Teaching -- Abstract -- 1 Introduction -- 2 Significance of Basic Medical Virtual Simulation Experimental Platform -- 2.1 Reduce the Cost of Experiment -- 2.2 Provide an Open Experimental Environment -- 2.3 Enhance Classroom Fun -- 3 Construction of Basic Medical Virtual Simulation Platform. , 3.1 Functionality Virtual Simulation Experiment Platform.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (694 pages)
    Edition: 1st ed.
    ISBN: 9789811625022
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1391
    DDC: 327.120971
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Decision Support System -- Recommended Model of Pollution Information Based on Collaborative Filtering Algorithm -- 1 Introduction -- 2 Calculation of the Similarity of Pollution Information -- 3 Default Prediction Complement -- 4 Obtaining the Similarity Matrix Between Users -- 5 The Solution of the Model -- 6 Analysis of Model Results -- References -- Research on the Evaluation of TCM Service Level in Various Regions of China -- 1 Introduction -- 2 Data Sources and Methods -- 2.1 Data Sources -- 2.2 Methods -- 3 Results -- 3.1 Principal Component Analysis -- 3.2 Cluster Analysis -- 4 Discussion -- 4.1 Regional Disparities in TCM Service Levels -- 4.2 The Effect of Health Services is not Commensurate with the Level of Economic Development -- References -- A Method for Evaluating Health Status of Rail Transit Signaling Equipment Based on Group Decision -- 1 Introduction -- 2 Related Work -- 3 Establishing Rules for an Evaluation System -- 3.1 Defining an Evaluation Organization -- 3.2 Defining the Evaluation Scope -- 3.3 Establishing the Weight Coefficient Vector -- 3.4 Establishing Alarm Rules to Monitor Equipment Faults -- 3.5 Setting Parameters for an Equipment Type -- 4 Implementation of an Evaluation System -- 4.1 Fault Monitoring Cycle -- 4.2 Health Evaluation Cycle -- 5 Conclusion -- References -- Intelligent Decision Support System for Precision Medicine (IDSS 4 PM) -- 1 Introduction -- 2 Theoretical Foundation-Simon's Model of Decision-Making -- 3 Intelligent Decision Support Systems (IDSSs) -- 4 Precision Medicine: An Emerging Approach in Medical Decision-Making -- 5 How Technologies Are Advancing Precision Medicine? -- 5.1 Business Analytics -- 5.2 Cognitive Computing -- 6 Theory Practice and Discussion -- 7 Characteristics of IDSS 4 PM -- 8 Conclusion. , References -- A Study of Result-Oriented Performance Appraisal-Taking Huawei as an Example -- 1 Introduction -- 2 Increasing Flexibility of Bonus Package -- 2.1 Reducing Long-Term Returns and Increasing Short-Term Returns -- 2.2 Widening the Gap and Clarifying the Hierarchy -- 2.3 Awarding the Current Contribution Immediately -- 3 Abandoning the Cumbersome Human Resource Assessment -- 3.1 Assessment by Objectives -- 3.2 Avoiding Establishing KPI Indicators in Isolation for Each Department -- 4 Taking the Responsibility and Result-Oriented Method -- 4.1 Good Performance and Good Return -- 4.2 Combination of Performance Evaluation and Reverse Evaluation -- 4.3 Eliminating Pretending Hard-Working -- 5 The Conclusion -- References -- Under a Management Perspective: Analysis of the Relationship Between Trust and Behavior Decision-Making -- 1 Introduction -- 2 Data and Measurement -- 2.1 Data Sources -- 2.2 Variable Description and Reliability Validity Test -- 3 Data Analysis and Discussion -- 3.1 The Difference of Public Trust Under Different Demographic Variables -- 3.2 The Differences in the Ways of Public Behavior Decision-Making Under Different Demographic Variables -- 3.3 The Relationship Between Trust and Behavior Decision-Making -- 4 Conclusion -- References -- Research on the Regulation of Industrial Structure in the Mid-Southern Liaoning Urban Agglomeration from the Perspective of Spatial Connection -- 1 Introduction -- 2 Research Area and Data Sources -- 2.1 Overview of the Study Area -- 2.2 Data Sources -- 3 Research Method -- 3.1 Spatial Shift-Share Model -- 3.2 Determination and Improvement of Spatial Weight -- 4 Result Analysis -- 4.1 Analysis of the Temporal and Spatial Pattern of Urban Spatial Interaction -- 4.2 Analysis of Shift Share of Industrial Structure -- 5 Conclusions -- References. , Research on the Influence Mechanism of Family-Supportive Supervisor Behaviors on Employees' Intention to Stay from the Perspective of Dual Scenario Embeddedness -- 1 Introduction -- 2 Theoretical Basis and Research Hypothesis -- 2.1 FSSB and Employees' Intention to Stay -- 2.2 The Mediating Role of Dual Scenario Embeddedness -- 2.3 The Moderating Role of Employees' Gratitude as a Trait -- 3 Study Design -- 3.1 Participants and Survey Methods -- 3.2 Variable Measurement -- 4 Research Results -- 4.1 Descriptive Statistical Analysis -- 4.2 Discrimination Validity Analysis and Common Method Test -- 4.3 Hypothesis Testing -- 5 Conclusion -- 5.1 Theoretical Contribution -- 5.2 Management Implications -- 5.3 Research Limitations and Prospects -- References -- Policy Burden, Industry Competition, and Corporate Risk-Taking -- 1 Introduction -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 Policy Burden and Corporate Risk-Taking -- 2.2 The Regulating Effect of Industry Competition -- 3 Research Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Selection and Model Design -- 4 Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Analysis of Regression Results -- 5 Endogenous Control and Robustness Test -- 5.1 Endogenous Problems -- 5.2 Robustness Analysis -- 6 Research Conclusions -- References -- Blended Teaching Mode of Tourism English Based on TPACK -- 1 Introduction -- 2 TPACK Theory -- 3 ESP and Tourism English -- 4 Research Design -- 4.1 Design Concept -- 4.2 Problem Design -- 4.3 Subjects and Teaching Contents -- 4.4 Research Steps -- 5 Experimental Conclusion -- References -- Technology and Innovation Management -- Research on Privacy Protection of Internet of Things Search Data Based on Fine-Grained Authorization -- 1 Introduction -- 2 Background Knowledge -- 2.1 Secret Search -- 2.2 Attribute-Based Encryption Scheme. , 3 System Program -- 3.1 System Architecture -- 3.2 Program Process -- 4 Safety and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Concluding Remarks -- References -- Design of Emergency Rescue Deduction System for Bus Fire Accident Based on Virtual Reality -- 1 Introduction -- 2 The Functional Requirements of Deducing System -- 3 The Design of Deduce System Architecture -- 4 Function Design of Deducing System -- 4.1 Scene Editing Module -- 4.2 Deduce Management Module -- 4.3 Client Operation Module -- 5 Composition of the Deduction System -- 6 Conclusion -- References -- Application of Game Theory in the Field of Technology Innovation -- 1 Introduction -- 2 The Application of Oligopoly Model in Technological Innovations -- 2.1 The Development of Cournot Model in Technological Innovations -- 2.2 Application and Development of Stackelberg in Technological Innovations -- 2.3 Application of Option Game Oligopoly Model in Technology Innovations -- 3 Research on Evolutionary Game Model in Technological Innovations -- 3.1 The Application of Evolutionary Game in Technological Innovations -- 3.2 The Development of Evolutionary Game Model in Technological Innovations -- 4 The Development Direction of Game Theory in Technological Innovations -- References -- Research on Innovation Mechanism of Corporate Volunteering in China -- 1 Introduction -- 2 The Concept and Connotation of Corporate Volunteering -- 3 The Status Quo of Volunteering in Chinese Enterprises -- 3.1 The Integration of Business Objectives Is Important for the Business Development Plan -- 3.2 Win the Sense of Belonging of Employees and the Identity of External Customers -- 3.3 Corporate Public Services Take from Society and Use for Society -- 3.4 Volunteering of Different Enterprises Vary Greatly -- 3.5 Long-Term Development of Volunteering Projects. , 3.6 Undertaking Government Public Service -- 4 Problems in the Development of Enterprise Volunteering in China -- 4.1 Insufficient Government Guidance -- 4.2 Information Guidance is not Strong -- 4.3 Lack of Corporate Volunteering Standards -- 4.4 Imbalance Between Long-Term and Short-Term Benefits -- 5 Development Trend of Corporate Volunteering -- 5.1 Internetization of Corporate Volunteering -- 5.2 Normalization of Corporate Volunteering -- 5.3 Diversification of Corporate Volunteering -- 5.4 Establish Self-organization of Corporate Volunteers -- 5.5 Corporate Volunteering Are Becoming More Standardized and Strict -- 6 Innovation of Corporate Volunteering Mechanism -- 6.1 Building Communication Network and Innovating Corporate Volunteering Mechanism -- 6.2 Taxation Policy -- 6.3 Expense Subsidies -- 6.4 Performance Evaluation -- 6.5 Establish a Sound Education and Training Mechanism -- 6.6 Establish a Sound Guarantee Mechanism to Protect the Volunteering of Enterprises -- References -- Research on the Differential Incentive Effect of Patent Pool on Specific Technology Learning -- 1 Research Background -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 The Impact of Patent Pool Formation on Specific Technology Learning -- 3 Research Design -- 3.1 Data and Samples -- 3.2 Variables and Their Measurement -- 4 Empirical Results and Analysis -- 4.1 Descriptive Statistical Analysis -- 4.2 Hypothesis Testing -- 5 Conclusion and Inspiration -- 5.1 Research Conclusion -- 5.2 Management Suggestions -- References -- Research on Present Situation and the Countermeasure Analysis of Football Training in University -- 1 Introduction -- 2 The Present Situation of Campus Football Training in China -- 3 Problems in the Development of Campus Football Activities in China -- 3.1 Students' Poor Awareness for Football Activities. , 3.2 Unreasonable Arrangement of Football Activities.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Mechatronics-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (604 pages)
    Edition: 1st ed.
    ISBN: 9789811618437
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1220
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Mechatronics -- 1 Simulation of Off-Wheel Problem of Triangle Tracked Vehicle Based on RecurDyn -- Abstract -- 1 Introduction -- 2 Structure and Relevant Technical Parameters of Triangular Track -- 3 Simulation Test -- 3.1 Virtual Prototype Modeling -- 3.2 Simulation Test on off-Wheel Problem of Track -- 3.3 Simulation Test on Vehicle S Bend -- 4 Conclusion -- References -- 2 Brief Design Requirements of Screen Printing Stencil -- Abstract -- 1 Introduction -- 2 Stencil Design -- 2.1 Frame Design of Circuit Board Stencil -- 2.2 Design of Stencil Tension Net -- 2.3 Mark Point Design of Stencil -- 2.4 Aperture Design of Stencil -- 2.5 Thickness Design of Stencil -- 3 Requirements for Opening Size and Shape of Stencil -- 3.1 Chip Components-Resistors, Inductors, Capacitors -- 3.2 Power MOSFET -- 3.3 QFP, SOP, QFN, IC -- 3.4 BGA -- 4 Conclusion -- References -- 3 Review of Improved Collaborative Filtering Recommendation Algorithms -- Abstract -- 1 Introduction -- 2 Overview of Traditional Collaborative Filtering Algorithms -- 2.1 User-Based Collaborative Filtering Recommendation Algorithm -- 2.2 Item-Based Collaborative Filtering Recommendation Algorithm -- 2.3 Model-Based Collaborative Filtering Recommendation Algorithm -- 3 Improvement and Application of Collaborative Filtering Algorithm -- 3.1 The New Theory Is Introduced into Collaborative Filtering -- 3.2 Data Dynamic Analysis Combined with Collaborative Filtering -- 3.3 Combination of Data Rule Mining and Collaborative Filtering -- 4 Conclusion -- References -- 4 A Preliminary Study on the Application of Computer Technology in Physical Education -- Abstract -- 1 Introduction -- 2 Design of Instructional Model of Autonomous Physical Education Based on Computer Technology -- 2.1 Part Before Class -- 2.2 Part in Class -- 2.3 Part After Class. , 3 Application Analysis of Physical Education Teaching Model Based on Computer Technology -- 3.1 Experimental Subject -- 3.2 Experimental Procedure -- 3.3 Experimental Method -- 3.4 Experimental Result -- 4 Conclusion -- References -- Intelligent Systems -- 5 Design of Archives Management System for Teaching -- Abstract -- 1 Introduction -- 2 Requirement Analysis of System and Database Design -- 2.1 Requirement Analysis -- 2.2 System Functional Structure Design -- 2.3 Database Design -- 3 System Function Realization -- 3.1 Login Module Design -- 3.2 Registration Module Design -- 4 System Test and Operation Result Analysis -- 5 Conclusion -- Acknowledgements -- References -- 6 An Algorithm for Distinguishing Between Speech and Music -- Abstract -- 1 Introduction -- 2 Audio-Related Features -- 3 Algorithm Steps -- 4 Experimental Result -- 5 Summary -- Acknowledgements -- References -- 7 Research on Multiple Overlapping Speakers Number Recognition Based on X-Vector -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 X-Vector -- 2.2 Data Preprocessing -- 2.3 Improving of Feature Extraction -- 3 Experimental Results -- 4 Conclusions -- References -- 8 Discussion on Production Technology and Testing Technology of 1553B Bus Cable Net for Satellite -- Abstract -- 1 Introduction -- 2 Composition of 1553B Bus Cable -- 2.1 1553B Cable Structure -- 2.2 Composition of 1553B Bus Cable -- 3 1553B Bus Cable Network Assembly Process -- 4 1553B Bus Cable Network Installation Quality Test -- 4.1 Bus Cable Net Appearance Inspection -- 4.2 1553B Bus Cable Network Static Performance Test -- 4.3 1553B Bus Cable Network Dynamic Performance Test -- 5 Conclusion -- References -- 9 Feasibility Analysis of Venture Capital Committee in the Innovative Design of Class Management in Colleges and Universities -- Abstract -- 1 Introduction. , 2 Major Pain Points of Class Management in Colleges and Universities -- 2.1 Different Opinions About Head Teacher's Impact on Class -- 2.2 Weak Initiative of Class Cadre -- 2.3 A General Lack of Class Fee -- 2.4 Little Contact with Classes After Graduation -- 3 Pain Points Analysis of Class Management in Colleges and Universities -- 3.1 Urgent Need of System Construction Innovation -- 3.2 Difference in Value Proposition -- 3.3 Foundation -- 3.4 Repulsion and Practical Difficulties -- 4 Innovative Design of Class Management in Colleges and Universities -- 4.1 Description of Class Management Tools -- 4.2 The Feasibility Analysis of Innovative Design -- 5 Conclusions -- Acknowledgements -- References -- 10 A Survey and Study on Satisfaction and Influencing Factors Using Ant Credit Pay via Intelligent Processing -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Data Analysis Method and Theoretical Basis -- 3.1 Chi-Square Test Principle -- 3.2 Principle of Correlation Analysis -- 3.3 Satisfaction Principle -- 3.4 Establishing the Satisfaction Index System -- 4 Analysis on the Satisfaction and Influencing Factors -- 4.1 Reliability Analysis and Validity Analysis of Data -- 4.2 Analysis of College Students' Satisfaction with Using "Ant Credit Pay" -- 4.3 Analysis of College Students' Satisfaction -- 4.4 Analysis of Influencing Factors -- 5 Some Suggestions -- 5.1 Individual Consumption Needs to Be Tailored -- 5.2 Pay Attention to Self-credit and Enhance Self-protection Consciousness -- 5.3 Appropriately Reduce the Withdrawal Procedure Rate and Expand the Use of "Ant Credit Pay" in Daily Life -- References -- 11 A Review on Main Optimization Method of ALBERT in Natural Language Processing -- Abstract -- 1 Introduction -- 2 Recent Development -- 3 Solve the Problem of Insufficient Text Word Vector Learning by Classifying the Output Features of ALBERT. , 4 Solve the Problem of Gradient Explosion and Disappearance in the Process of Long Text Training by Combining the Bi-LSTM Model -- 5 By Combining CRF Model to Better Recognize Long Texts -- 6 By Combining the BiGRU Model to Maximize the Preservation of the Semantic Association of Word Vectors in Long Texts -- 7 Conclusion -- References -- 12 Study on the Influencing Factors of Customer Loyalty in Large Smart Home Furnishing Stores -- Abstract -- 1 Introduction -- 2 Related Theory of Influencing Factors of Customer Loyalty -- 2.1 Experience Marketing -- 2.2 Customer Satisfaction -- 2.3 Measurement of Customer Loyalty -- 3 Establishment of Influencing Factor Model of Customer Loyalty -- 3.1 Selection of Modeling Dimension -- 3.2 Research Hypothesis -- 3.3 Description of Research Model -- 4 Data Analysis on Influencing Factors of Customer Loyalty -- 4.1 Reliability Test -- 4.2 Correlation Analysis -- 4.3 Regression Analysis -- 5 Summary -- References -- 13 A Detection Algorithm of Lung Nodule Based on Faster R-CNN -- Abstract -- 1 Introduction -- 2 Deep Learning Detection Framework and Faster R-CNN -- 2.1 Feature Extraction Network -- 2.2 RPN -- 2.3 ROI Pooling -- 2.4 Classifier -- 3 Pulmonary Nodule Detection Network -- 3.1 Improvement of Feature Extraction Network -- 3.2 Modify Anchors -- 4 Experimental Data and Result Verification -- 4.1 Dataset -- 4.2 Evaluation Criterion -- 4.3 Experimental Result -- 5 Conclusion -- References -- 14 Information Extraction from Contract Based on BERT-BiLSTM-CRF -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Algorithm Model -- 3.1 Contract-Based Language Model (BERT) -- 3.2 BiLSTM-CRF Method Based on Migration Optimization -- 4 Test Results and Analysis -- 5 Concluding Remarks -- References -- 15 Research on Linear Detection Technology for Massive MIMO in Wireless Communications -- Abstract. , 1 Introduction -- 2 Model of Massive MIMO Uplink System -- 3 Linear Detection Algorithm for Massive MIMO System -- 3.1 Linear Detection Algorithm -- 3.1.1 Maximum Ratio Combining Algorithm (MRC) -- 3.1.2 Zero-Forcing Algorithm (ZF) -- 3.1.3 Minimum Mean Square Error Detection Algorithm (MMSE) -- 3.2 Simulation -- 4 Conclusion -- References -- 16 Research on Intelligent Reconfiguration and Recognition Technology of Mobile Environment for Substation Operation -- Abstract -- 1 Introduction -- 2 Object Scanning and Modeling -- 3 Modeling and Scanning Modeling of Dynamic Complex Environment -- 4 Weak Supervision Instance Segmentation of Substation Equipment Based on RGB-T Self Labeling -- 5 Model Compression and Acceleration for Edge Devices -- 6 Research and Development of Environment Intelligent Reconfiguration and Recognition Prototype System for Mobile Side Software and Hardware Platform -- 7 Conclusion -- References -- 17 Development and Application of Power Grid Disaster Intelligent Perception and Emergency Command System -- Abstract -- 1 Introduction -- 2 Electric Power Disaster Emergency Situation Map and 3D Visual Command Technology -- 3 Research and Development of Power Grid Disaster Intelligent Perception and Emergency Command Prototype System -- 4 Conclusions -- Acknowledgements -- References -- 18 Research on State Perception of Power Grid Equipment Based on Intelligent Analysis of Multi-Spectral Data -- Abstract -- 1 Introduction -- 2 Feature Distribution and Time-Domain Correlation of PoWer Equipment Status Under Different Spectrums -- 3 Online Monitoring and Fault Warning of Electrical Equipment Status of Stations and Transmission Lines -- 4 Establish a Sample Library of Power Equipment Faults Based on Three-Light Fusion Imaging -- 5 Comprehensive Evaluation Method of Multi-Spectral Data Analysis Model -- 6 Conclusions -- Acknowledgements. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (834 pages)
    Edition: 1st ed.
    ISBN: 9789811559716
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.194
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Intelligent and Cloud Computing -- M-Throttled: Dynamic Load Balancing Algorithm for Cloud Computing -- 1 Introduction -- 2 Literature Survey -- 3 Existing Algorithms -- 3.1 Throttled Load Balancing -- 3.2 Round-Robin Load Balancing -- 3.3 SJF Load Balancing -- 4 Proposed Algorithm: M-throttled -- 5 Implementation -- 6 Conclusion -- References -- iGateLink: A Gateway Library for Linking IoT, Edge, Fog, and Cloud Computing Environments -- 1 Introduction -- 2 Related Work -- 3 System Model and Architecture -- 3.1 Implementation Details -- 4 Case Studies -- 5 Conclusions and Future Work -- References -- Hetero Leach: Leach Protocol with Heterogeneous Energy Constraint -- 1 Introduction -- 2 Routing Algorithm -- 2.1 LEACH -- 2.2 Hetero Leach -- 3 Simulation and Result -- 4 Conclusion -- References -- A Semantic Matchmaking Technique for Cloud Service Discovery and Selection Using Ontology Based on Service-Oriented Architecture -- 1 Introduction -- 2 Service-Oriented Computing -- 2.1 Service-Oriented Architecture -- 3 Proposed Model -- 3.1 Client Request -- 3.2 Cloud Service Discovery -- 3.3 Cloud Service Selection -- 3.4 Cloud Ontology Triple Store -- 4 Proposed Matchmaking Technique -- 5 Conclusion and Future Work -- References -- An Intelligent Approach to Detect Cracks on a Surface in an Image -- 1 Introduction -- 2 Literature Review -- 3 Min-Max Gray Level Discrimination Method -- 4 Proposed Model for Crack Detection -- 5 Conclusion -- References -- A Study of Machine Learning Techniques in Short Term Load Forecasting Using ANN -- 1 Introduction -- 2 ANN in STLF -- 2.1 Multilayer Perceptron Network (MLP) -- 2.2 Learning -- 2.3 Generalization -- 2.4 MLP Organizes in Burden Estimating -- 3 Proposed Work -- 3.1 Back Propagation (BP) by ANN -- 3.2 Fuzzy Logic by ANN. , 3.3 Hereditary Calculation (HC) by ANN -- 3.4 Particle Swarm Optimization (PSO) by ANN -- 4 Conclusion -- References -- A Review for the Development of ANN Based Solar Radiation Estimation Models -- 1 Introduction -- 2 Basics of Artificial Neural Network (ANN) -- 3 ANN for Solar Radiation Estimation -- 4 Review of Global Radiation Estimation Using ANN -- 5 Comparative Study of All the Models -- 6 Identified Research Gap in Solar Radiation Estimation -- 7 Conclusion -- References -- Analysis and Study of Solar Radiation Using Artificial Neural Networks -- 1 Introduction -- 2 ANN Fundamentals -- 2.1 What is ANN? -- 2.2 Nodal Configuration -- 2.3 ANN Types -- 2.4 Learning Stuff -- 3 ANN Working Principle and Architecture -- 3.1 Introduction -- 4 Applications, Advantages, and Disadvantages -- 4.1 Applications -- 4.2 Advantages -- 4.3 Disadvantages -- 5 Methodology -- 5.1 ANN for Predicting Solar Radiation -- 5.2 Data Considered -- 5.3 Operating Stages -- 5.4 Performance -- 6 Comparison Between ANN-Based and Existing Modeling -- 7 Conclusion -- References -- A Scheme to Enhance the Security and Efficiency of MQTT Protocol -- 1 Introduction -- 2 Literature Review -- 2.1 Security Requirements of IoT -- 2.2 Privacy Concerns in IoT -- 2.3 MQ Telemetry Transport (MQTT) -- 2.4 Architecture of MQTT -- 2.5 MQTT Quality of Service -- 2.6 Security Issues with MQTT -- 2.7 Hash Functions and Digital Signatures -- 2.8 Channel Encryption -- 2.9 Summary of Findings -- 2.10 Problem Statement -- 3 Proposed Scheme -- 3.1 Registration Process -- 4 Result and Discussions -- 5 Conclusions -- References -- Software Fault Prediction Using Random Forests -- 1 Introduction -- 1.1 Random Forests (RF) -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Evaluation Criteria -- 4 Implementation and Results -- 5 Conclusion -- References. , A Power Optimization Technique for WSN with the Help of Hybrid Meta-heuristic Algorithm Targeting Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution Methodology -- 3.1 Design Efficient WSN Nodes -- 3.2 Clusterization of the Target Area -- 3.3 Deployment of WSN Nodes Using Spiral Pattern WSN Node Deployment Policy -- 4 Numerical Result Analysis -- 5 Conclusion and Future Work -- References -- A Model for Probabilistic Prediction of Paddy Crop Disease Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Paddy Crop Disease Classification -- 3.1 Brown Spot -- 3.2 Bacterial Leaf Blight -- 3.3 Leaf Smut -- 4 Implementation of the Model -- 4.1 Image Generation and Augmentation -- 4.2 Convolution Steps -- 4.3 Pooling Step -- 4.4 Fully Connected Layers -- 4.5 Disease Prediction -- 4.6 Process Flow Model -- 5 Algorithm of the Model -- 6 Experimental Results -- 7 Conclusions and Future Work -- References -- A Hybridized ELM-Elitism-Based Self-Adaptive Multi-Population Jaya Model for Currency Forecasting -- 1 Introduction -- 2 Methodology Adopted -- 2.1 ELM -- 2.2 Jaya -- 3 Dataset Description -- 4 Experimental Analysis -- 4.1 Abstract View of the Proposed Model -- 4.2 Proposed ELM-ESAMPJ Algorithm for Exchange Rate Analysis -- 4.3 Result Analysis -- 5 Discussions -- 6 Conclusion and Future Work -- References -- A Fruit Fly Optimization-Based Extreme Learning Machine for Biomedical Data Classification -- 1 Introduction -- 2 Machine Learning Techniques for Biomedical Data Classification -- 2.1 Extreme Learning Machine (ELM) -- 2.2 Fruit Fly Optimization (FFO) -- 2.3 The Proposed FFO-ELM Models -- 3 Result and Discussion -- 3.1 Data Description -- 3.2 Performance Evaluation -- 3.3 Result Analysis -- 4 Conclusion -- References -- Partial Reconfiguration Feature in Crypto Algorithm for Cloud Application. , 1 Introduction -- 2 Generations of Crypto Core -- 3 State of the Art -- 4 Architecture and Implementation -- 4.1 Low Processing Platform (LP) -- 4.2 Fog -- 4.3 Cloud -- 5 Conclusion -- References -- Proactive Content Caching for Streaming over Information-Centric Network -- 1 Introduction -- 2 System Model -- 3 Proposed Solution -- 3.1 Content Store (CS) -- 3.2 Ant Colony Process -- 4 Experimental Results -- 5 Conclusion -- References -- Performance Analysis of ERWCA-Based FLANN Model for Exchange Rate Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 FLANN Model -- 2.2 Evaporation Rate-Based Water Cycle Algorithm (ERWCA) -- 2.3 FLANN/ERWCA Model -- 3 Simulation Study -- 4 Conclusion -- References -- Multi-document Summarization Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experiment and Results Analysis -- 5 Conclusion -- References -- A Convolutional Neural Network Framework for Brain Tumor Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Input Image -- 3.2 Convolution Layer -- 3.3 Pooling Layer -- 3.4 Fully Connected Layer -- 3.5 Output Layer -- 4 Experimental Setup and Results -- 4.1 Dataset Description -- 4.2 Initial Kernel Weights -- 4.3 Activation Function -- 4.4 Loss Function Computation -- 4.5 Training -- 4.6 Model Parameters -- 4.7 Simulation Results -- 5 Conclusion -- References -- Load Balancing in Cloud Computing Environment Using CloudSim -- 1 Introduction -- 2 Related Work -- 3 Objective of Load Balancing in Cloud Computing -- 4 Necessity of Load Balancing -- 5 Verification of Load Balancing Using Cloud Simulator -- 5.1 Various Features of CloudSim Tool -- 5.2 Primary Elements of CloudSim Tool -- 5.3 Algorithm Utilized in CloudSim Tool for Load Balancing -- 6 Experimental Results -- 7 Conclusion -- References. , Assessment of Load in Cloud Computing Environment Using C-means Clustering Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Resource Allocation -- 3.2 Algorithm -- 4 Result Analysis -- 5 Conclusion -- References -- Parallel Implementation of Algebraic Curve for Data Security in Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Explicit Addition Formulation -- 4 Implementation -- 4.1 Sequential Implementation Methodology -- 4.2 Parallel Implementation Methodology -- 5 Experimental Results and Analysis -- 5.1 Sequential Implementation of Elliptic Curve Addition -- 5.2 Sequential Implementation of Hyperelliptic Curve Addition -- 5.3 Parallel Implementation of Hyperelliptic Curve Addition -- 6 Performance Comparison of Sequential and Parallel Implementation -- 7 Conclusion -- References -- A Design Towards an Energy-Efficient and Lightweight Data Security Model in Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Proposed Approach and Related Discussions -- 4.1 Lightweight Authentication Using CA Based Scheme -- 4.2 Lightweight Cryptography Using CA Based Scheme -- 5 Conclusions and Future Work -- References -- Fuzzification-Based Routing Protocol for Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- Fuzzy-Based Strategy Management in Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- A TWV Classifier Ensemble Framework -- 1 Introduction -- 2 Proposed TWV Classifier Ensemble -- 3 Experimental Setup and Result Analysis -- 4 Conclusion -- References -- Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based Devices. , 1 Introduction to Continuous Authentication (CA).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computational intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (504 pages)
    Edition: 1st ed.
    ISBN: 9789811538636
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.179
    DDC: 6.3
    Language: English
    Note: Intro -- International Program Committee -- Honorary Chair -- General Chairs -- Organizing Chair -- International Advisory Chair -- Founder of IRNet China -- Co-founder of IRNet China -- TPC Members -- Sponsors -- Preface -- Contents -- About the Editors -- 1 Study Optimization of Thermal Analysis of Anisotropic Materials in 3D Field Based on One-Dimensional Heat Conduction Equation Model -- 1.1 Introduction -- 1.2 Heat Transfer Mode and Process Analysis -- 1.3 Optimization Model of Protective Clothing Design for High-Temperature Engineering Work -- 1.3.1 The Establishment of the Model and the Proposal of the Hypothesis Conditions -- 1.3.2 Optimization Model Based on Inversion Method -- 1.4 Conclusion -- References -- 2 Shape Retrieval for 3D Models Based on MRF -- 2.1 Introduction -- 2.2 Feature Descriptor -- 2.3 Framework of Retrieval -- 2.3.1 Notations -- 2.3.2 Formulation -- 2.3.3 Potential Function -- 2.4 Spatial Consistency Test -- 2.4.1 Training -- 2.4.2 Testing -- 2.4.3 Index Based on Random Forest -- 2.4.4 Measure Similarity -- 2.5 Experiments -- 2.6 Conclusions -- References -- 3 Numerical Conformal Mapping Based on Improved Hermitian and Skew-Hermitian Splitting Method -- 3.1 Introduction -- 3.2 Numerical Conformal Mapping Based on the Charge Simulation Method -- 3.3 Improved HSS Method Based on (k, j)-Padé Iteration Method -- 3.4 Numerical Examples -- 3.5 Conclusions -- References -- 4 Hierarchical Clustering-Based Video Summarization -- 4.1 Introduction -- 4.2 Feature Extraction -- 4.2.1 Color Feature -- 4.2.2 Texture Feature -- 4.3 The Proposed Algorithm -- 4.3.1 Hierarchical Clustering Method -- 4.3.2 Optimize Initial Clustering Results to Extract Video Summary Key Frames -- 4.4 Experimental Results and Discussion -- 4.4.1 Evaluation Standard -- 4.4.2 Experimental Results -- 4.5 Conclusion -- References. , 5 Research on Multi-objective Optimization Problem of Engineering Project in 3D Field Based on Improved Particle Swarm Optimization Algorithm -- 5.1 Introduction -- 5.2 IPSO Algorithms -- 5.3 Model -- 5.4 Engineering Calculation and the Result Analysis -- 5.5 Conclusions -- References -- 6 3D Path Planning Based on Improved Particle Swarm Optimization Algorithm -- 6.1 Introduction -- 6.2 Path Planning Environment Modeling and Fitness Function -- 6.2.1 Environmental Modeling -- 6.2.2 Fitness Function -- 6.3 Improved PSO Algorithm -- 6.3.1 Basic PSO Algorithm -- 6.3.2 BFO Algorithm -- 6.3.3 Hybrid Algorithm -- 6.4 Simulation Verification -- 6.5 Conclusion -- References -- 7 Improving Parallel Magnetic Resonance Imaging Reconstruction Using Nonlinear Time Series Analysis -- 7.1 Introduction -- 7.2 Background -- 7.3 Method -- 7.4 Experimental Results -- 7.5 Conclusion -- References -- 8 Low Computational Complexity Third-Order Tensor Representation Through Inverse Spectrum Pyramid -- 8.1 Introduction -- 8.2 Method for Third-Order Tensor Representation Through 3D Reduced ISP -- 8.2.1 Representation of a Tensor of Size 4 × 4 × 4 -- 8.2.2 Representation of the Tensor of Size N × N × N Through N-Level 3D-RISP -- 8.3 Characteristics of the Spectrum Tensor Representation -- 8.4 Conclusions -- References -- 9 Spectral Reconstruction Based on Bayesian Regulation Neural Network -- 9.1 Introduction -- 9.2 Principle of Spectral Reflectance Reconstruction -- 9.2.1 Polynomial Regression -- 9.2.2 Bayesian Regularization BP Neural Network Algorithm -- 9.3 Experimental Results and Analysis -- 9.3.1 Experiment Process -- 9.3.2 Analysis and Comparison of Results -- 9.4 Conclusion -- References -- 10 Loose Hand Gesture Recognition Using CNN -- 10.1 Introduction -- 10.2 The Proposed Method -- 10.2.1 Training Data Preparation. , 10.2.2 The Proposed Neural Network Architecture -- 10.2.3 Loss Function -- 10.3 Experiments -- 10.3.1 CNN with Input RGB-D Images -- 10.3.2 CNN with Multi-resolution Features -- 10.3.3 Compared with Other Popular CNN Models -- 10.4 Conclusions -- References -- 11 Multi-focus Image Fusion Method Based on NSST and BP Neural Network -- 11.1 Introduction -- 11.2 Image Fusion Method -- 11.2.1 NSST Transformation -- 11.2.2 Feature Extraction and NSST Contrast -- 11.2.3 BP Neural Network Training -- 11.2.4 Algorithm Framework and Steps -- 11.3 Experiments Results -- 11.4 Conclusions -- References -- 12 Classification of 3D Remote Sensing Images Through Dimensionality Reduction and Semantic Segmentation Network -- 12.1 Introduction -- 12.2 Proposed Method -- 12.2.1 The Whole Approach Framework -- 12.2.2 Rasterization -- 12.2.3 Normalization and Hat Transform -- 12.2.4 DSM Post-processing -- 12.2.5 Network for Classification -- 12.3 Experiment -- 12.3.1 Training Deeplabv3+ -- 12.3.2 Post-processing by NDSM -- 12.3.3 Visualization of 3D Remote Sensing Images -- 12.4 Conclusion -- References -- 13 Research on Deep Learning Algorithm and Application Based on Convolutional Neural Network -- 13.1 Introduction -- 13.2 Convolutional Neural Network -- 13.2.1 Local Connection of Convolutional Neural Networks -- 13.2.2 Weight Sharing in Convolutional Neural Networks -- 13.3 The Overall Structure of the Convolutional Neural Network -- 13.4 The Application of Deep Learning Algorithm Based on Convolutional Neural Network -- 13.4.1 Application in the Field of Natural Language Processing -- 13.4.2 Application in the Field of Image Recognition -- 13.4.3 Application in the Field of Speech Recognition -- 13.5 The Conclusion -- References -- 14 Object Attribute Recognition Based on Hard Negative Mining and Convolutional Neural Network -- 14.1 Introduction. , 14.2 Object Location Based on Improved Faster R-CNN Model -- 14.2.1 Hard Negative Mining Strategy -- 14.2.2 OHEM-Faster R-CNN Object Location Model -- 14.3 Object Attribute Recognition Method Based on Improved Cascade Convolution Neural Network Model CS-CNN Model -- 14.3.1 Improved Activation Function and Loss Function -- 14.3.2 Improved CS-CNN Model Object Attribute Recognition Method -- 14.4 Experimental Simulations -- 14.4.1 Model Parameters -- 14.4.2 Experimental Simulations of Object Location -- 14.4.3 Contrastive Experimental Simulations of Object Attribute Recognition -- 14.5 Conclusion -- References -- 15 Research on Intelligent Identification Method of Power Equipment Based on Deep Learning -- 15.1 Introduction -- 15.1.1 Background -- 15.1.2 Purpose and Significance -- 15.1.3 Summary of Research Level at Home and Abroad -- 15.2 Solutions and Key Technologies -- 15.2.1 Power Equipment Image Processing and Feature Extraction -- 15.2.2 Power Equipment Classification -- 15.2.3 Establish a Standardized Image Analysis Library -- 15.3 Conclusion -- References -- 16 Chinese Color Name Identification from Images Using a Convolutional Neural Network -- 16.1 Introduction -- 16.2 Color Vocabulary Labeled Data Set -- 16.3 The Model of Color Recognition -- 16.3.1 Design of Multi-label Convolutional Neural Networks -- 16.3.2 Evaluation Criteria -- 16.3.3 Choosing the Appropriate Threshold -- 16.4 Conclusion -- References -- 17 Research and Design of a Key Technology for Accelerating Convolution Computation for FPGA-Based CNN -- 17.1 Introduction to Relevant Theories -- 17.1.1 Introduction to Convolution Neural Network -- 17.1.2 The Training Process -- 17.2 SpNet Model -- 17.3 Research on Correlation Algorithm Research -- 17.3.1 Im2col Algorithm -- 17.3.2 Strassen Algorithm -- 17.3.3 Improved Strassen Algorithm. , 17.4 An Accelerated Convolution Calculation Scheme Based on FPGA -- 17.4.1 Design of Training Architecture of Convolutional Neural Network Based on FPGA -- 17.4.2 Design and Implementation of Convolution Computing Module -- 17.4.3 Testing the Convolutional Neural Network -- 17.5 Summary -- References -- 18 Research on Voice Mark Recognition Algorithms Based on Optimized BP Neural Network -- 18.1 Introduction -- 18.2 Wavelet Transform of Voice Signal -- 18.3 Basic Conception of BP-GA -- 18.3.1 Construction of BP Neural Network VoicePrint Recognition -- 18.4 Design of Genetic Algorithm -- 18.5 Simulation Analyses of an Example with BP-GA Algorithm -- 18.6 Conclusions -- References -- 19 Single Image Super Resolution via Deep Convolutional Dual Upscaling Branches with Different Focus -- 19.1 Introduction -- 19.2 Related Works -- 19.2.1 Variant Shortcuts -- 19.2.2 Skillfully Nesting Modules -- 19.3 Proposed Method -- 19.3.1 The Entire Structure -- 19.3.2 Residual Learning Branch -- 19.3.3 Planar Component Branch -- 19.3.4 Mathematical Formulation -- 19.4 Experimental Results -- 19.4.1 Datasets -- 19.4.2 Parameters Settings -- 19.4.3 Results and Comparisons -- 19.4.4 Ablation Analysis -- 19.5 Conclusions -- References -- 20 Human Heart Model Rendering Based on BRDF Algorithm -- 20.1 Introduction -- 20.2 Theoretical Research and Experimental Methods -- 20.2.1 Theoretical Research -- 20.2.2 Experimental Method -- 20.3 Experimental Results -- 20.3.1 Experimental Conditions -- 20.3.2 Rendering Results and Analysis -- 20.4 Conclusions and Discussion -- References -- 21 Level Set Segmentation Algorithm for Cyst Images with Intensity Inhomogeneity -- 21.1 Introduction -- 21.2 C-V Model -- 21.3 Improved C-V Level Set Model -- 21.3.1 Local Information -- 21.3.2 Speed Function -- 21.3.3 Overall Energy Functional -- 21.4 Experimental Results and Analysis. , 21.5 Conclusion.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Blockchains (Databases). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (244 pages)
    Edition: 1st ed.
    ISBN: 9789813364707
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.219
    DDC: 658.05574
    Language: English
    Note: Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten. , 4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain. , 7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids. , 10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works. , 13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (532 pages)
    Edition: 1st ed.
    ISBN: 9789811558870
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1185
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Intelligent Computing -- Multi-SoftMax Convolutional Neural Network and Its Application in the Diagnosis of Planetary Gearbox Complicated Faults -- 1 Introduction -- 2 Fault Tree Structure and Muti-SoftMax Convolutional Neural Network -- 2.1 Fault Tree Structure -- 2.2 Working Parallel Structure -- 2.3 Structure of Multi-SoftMax Convolutional Neural Network -- 3 Process of Planetary Gearbox Fault Diagnosis -- 4 Example of Planetary Gearbox Fault Diagnosis -- 4.1 Structure of Convolutional Neural Network -- 4.2 Structure of Mutil-SoftMax Convolutional Neural Network -- 5 Experiment -- 6 Conclusion -- References -- Signal Complexity Measure Based on Construction Creep Rate in 3s Feature Space -- 1 Introduction -- 2 Methodology -- 2.1 0-1 Test for Chaos Review -- 2.2 New Algorithm (Spring Test) Block of 3s Plot and CC Rate -- 2.3 Two Equations as Test Cases -- 3 Results and Discussions -- 3.1 Results from pq-Plot of 0-1 Test to 3s Plot and CC Rate in Spring Test -- 3.2 Key Self-similarity Measure Threshold γ Locking in Max Complexity -- 4 Conclusions -- References -- Research on Partition Technology of Real-Time Database in Big Data Environment -- 1 The Introduction -- 2 Design of Tual-Time Partition Database System for Flow Computing -- 3 Implementation of Real-Time Partition System -- 4 Audit and Effect of System Effectiveness -- 5 Summary -- References -- RCS Sequence Period Estimation Method Based on Constant False Alarm Detection -- 1 Introduction -- 2 Periodic Movement Target Characteristics -- 3 Periodic Discriminant Method for Constant False Alarm Detection -- 3.1 Periodic Discriminant Method for Constant False Alarm Detection -- 3.2 Effectiveness Analysis -- 4 Experimental Verification -- References -- Target Recognition of RCS Sequence Based on Neural Network. , 1 Introduction -- 2 Build the Attitude Angle Template -- 3 Feature Extraction and Classifier Design -- 4 Neural Network Design -- References -- Encouraging Cooperation in Participatory Sensing with Reputation and Game Analysis -- 1 Introduction -- 2 System Model -- 3 Trust Model and Game Analysis -- 3.1 Trust Model -- 3.2 Game Model -- 3.3 Repeated Game Analysis -- 4 Conclusion -- References -- Multi-granularity Attribute Sentiment Analysis Based on Neural Network -- 1 Introduction -- 2 Related Work -- 3 Multi-granularity Sentiment Analysis Model -- 3.1 Task Definition -- 3.2 Model -- 3.3 Multi-granularity Attention Mechanism -- 3.4 Model Training -- 4 Experiment -- 4.1 Experimental Data and Parameter Configuration -- 4.2 Method Comparison -- 4.3 Analysis of Experimental Results -- 5 Conclusion -- References -- Study on Fuzzy Crop Planning Problems Based on Credibility Theory -- 1 Introduction -- 2 Basic Principles -- 3 Fuzzy Crop Planning Problem -- 3.1 Problem with Fuzzy Income Coefficients -- 3.2 Method -- 4 Conclusion -- References -- Empirical Research on the Antecedents of Enterprise IS Users' Voice Behavior Based on the Work Behavior Theory -- 1 Introduction -- 2 Theoretical Background and Hypotheses -- 3 Research Method -- 4 Research Results -- 5 Discussion and Conclusion -- References -- Image Fusion Based on Masked Online Convolutional Dictionary Learning with Surrogate Function Approach -- 1 Introduction -- 2 The Proposed Fused Algorithm -- 2.1 Masked Online Dictionary Learning Using Surrogate Function Approach with Sparse Matrix Computation -- 2.2 The Fusion Framework -- 3 Experimental -- 4 Conclusion -- References -- The Liquid Cooling Technique Based on Foam Metal Copper -- 1 Introduction -- 2 Liquid Cooling Module Design Optimization -- 2.1 Liquid Cooling Module -- 2.2 Liquid-Cooled Radiator -- 3 Liquid Cooling Module Testing. , 3.1 Comparison Test of Liquid Cooling Module Heat Dissipation Performance Based on Liquid Cooling System -- 3.2 Comparison Test of Heat Dissipation Performance of Liquid Cooling Module Based on Self-circulating Cooling System -- 4 Conclusion -- References -- Study on the Forecast of Driving Reaction Based on PNN and FCM -- 1 Introduction -- 2 Driving Reaction Relations -- 3 Driving Reaction Sample Unified Disposal -- 4 Driving Reaction Neural Network -- 5 Road Test Data Acquisition -- 6 Applying Analyses -- 7 Conclusions -- References -- Android Malware Detection via Behavior-Based Features -- 1 Introduction -- 2 Existing Malware Detection Technology -- 2.1 Static Testing Technology of the Existing Malware Detection -- 2.2 Existing Dynamic Malware Detection Technology -- 3 The Behavior-Based Feature Recognition of Detection Technology -- 3.1 The Overall Technical Program -- 3.2 User Operator Behavior Monitoring Module -- 3.3 Software Behavior Monitoring Module -- 3.4 The Malicious Behavior Feature Recognition Module -- 4 Conclusion -- References -- Analysis of the Power Converter Used in Wind Power Generator System -- 1 Introduction -- 2 Power Converter Topology for Wind Power System -- 2.1 Two-Level Voltage Source Converter -- 2.2 Multilevel Voltage Source Converter -- 2.3 Matrix Converter -- 2.4 Current Source Converter -- 3 Application Status of Converters in Variable Speed Constant Frequency Wind Power System -- 3.1 Converters Commonly Used in Medium and Low Voltage Wind Power Systems -- 3.2 Control Strategy of Common Converters in Wind Power System -- 4 Development Trend of Wind Power Converter -- 5 Conclusions -- References -- Evaluation of New Energy Theory Based on Data Recovery -- 1 Introduction -- 1.1 Research Background -- 1.2 Research Methods -- 2 Data Introduction -- 2.1 Data Sources -- 2.2 Data Processing. , 3 Theoretical Power Calculation -- 4 Conclusions -- References -- Summary, Reflection, and Prospect of Wind Power Development in China -- 1 Introduction -- 2 Wind Power Development History -- 3 Wind Power Consumption Situation -- 3.1 Wind Power Generation in Provinces -- 3.2 Accommodation Capacity Index -- 3.3 Abandoned Wind Power and Abandoned Rate -- 4 Development Summary -- 5 Suggestions -- References -- Time-Varying Probability Distribution Model of High Permeability Wind Power Considering Non-stationary Characteristics -- 1 Introduction -- 2 Time-Varying Characteristics of Wind Power Probability Distribution and Spatial Correlation Coefficient -- 2.1 Time-Varying Characteristics of Probability Distribution of Single Wind Farm -- 2.2 Time-Varying Characteristics of Rank Correlation Coefficients of Multi-wind Farms -- 3 Off-Line Conditional Dependence Model Set of Edge Probability Distribution and Rank Correlation Coefficient Matrix -- 3.1 Off-Line Conditional Dependence Model Set of Probability Distribution of Single Wind Farm -- 3.2 Off-Line Conditional Dependence Model Set of Rank Correlation Coefficient Matrix of Multi-wind Farms -- 4 Time-Varying Probability Distribution Sampling Algorithm -- 5 Validity Analysis of Time-Varying Probability Distribution Modeling -- 5.1 Simulation System -- 5.2 Effect of Time-Varying Characteristics on Wind Power Characteristic Modeling -- References -- An Adaptive T-Distribution Variation Based HS Algorithm for Power System ED -- 1 Introduction -- 2 The HS Based on Adaptive T-Distribution Mutation (t-LHS) -- 2.1 HS Algorithm -- 2.2 Variation Principle of T-Distribution -- 2.3 A HS Algorithm Based on Adaptive T-Distribution Mutation (t-LHS) -- 3 The Steps of t-LHS Algorithm for Solving ED Problems -- 4 Results and Comparison -- 4.1 3-Generator System -- 4.2 40-Generator System -- 5 Conclusions -- References. , Application of Improved Particle Swarm Optimization in Economic Dispatch of Power System -- 1 Introduction -- 2 Improved Particle Swarm Optimization (IMPSO) -- 2.1 Adjustment of Parameters -- 2.2 Optimal Learning Strategies -- 2.3 Objective Function -- 2.4 Constraints -- 2.5 Steps of IMPSO Algorithms for Solving ED Problems -- 3 Experimental Analysis and Results -- 4 Conclusions -- References -- Design of an Ultra-Short-Term Wind Power Forecasting Model Combined with CNN and LSTM Networks -- 1 Introduction -- 2 Related Works -- 2.1 Wind Power Generation Power -- 2.2 CNN Network -- 2.3 LSTM Network -- 3 The Description of the Experimental Progress -- 3.1 Data Preprocessing -- 3.2 CNN Layer -- 3.3 LSTM Layer -- References -- An Algorithm for Intelligent Attack Decision-Making -- 1 Introduction -- 2 Underlying Factors -- 3 Modeling for Intelligent Decision-Making -- 4 The Process of Intelligent Decision-Making -- 5 Achievement of the System -- 6 Conclusion -- References -- Wavelet Packet Energy Entropy Based Feature Analysis of Seismic Signals from Vehicle Targets -- 1 Foreword -- 2 Time-Frequency Feature of Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 2.1 Test for Seismic Signals from Vehicle Targets -- 2.2 Wavelet Packet Transformation of Seismic Signals from Vehicle Targets -- 3 Energy Entropy Feature Extraction for Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 3.1 Wavelet Packet Transformed Energy Entropy -- 3.2 Extraction of Energy Entropy Feature of Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 4 Conclusion -- References -- Group Decision-Making Approach Under Interval-Valued Dual Hesitant Fuzzy Unbalanced Uncertain Linguistic Environments and Its Application to Community Tourism Resilience Evaluation -- 1 Introduction. , 2 Weighted Power Aggregation Operator with IVDHFUUBLS Information.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...