Keywords:
Computational intelligence-Congresses.
;
Evolutionary computation-Congresses.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (780 pages)
Edition:
1st ed.
ISBN:
9789811557880
Series Statement:
Advances in Intelligent Systems and Computing Series ; v.1176
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=6346713
DDC:
006.3
Language:
English
Note:
Intro -- Organization -- Chief Patrons -- Patrons -- Organizing Chairs -- Publicity Chairs -- Advisory Committee -- Technical Program Committee -- Preface -- Contents -- About the Editors -- Faster Result Retrieval from Health Care Product Sales Data Warehouse Using Materialized Queries -- 1 Introduction -- 2 Implementation of MQDB for Bioteknika Healthcare Pvt. Ltd -- 3 Experimental Results -- 4 Conclusion -- References -- Sense Scheduling for Robotics Cognitive Intelligence -- 1 Introduction -- 2 Related Work -- 3 Human Though Process Test -- 4 Proposed System Architecture -- 5 Proposed Methodology -- 6 Result and Discussion -- 7 Conclusion -- 8 Conclusion -- References -- Feature Selection Using Ant Colony Optimization and Weighted Visibility Graph -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Work and Experiment -- 3.1 Feature Extraction -- 3.2 Feature Selection -- 4 Performance Analysis -- 4.1 Precision, Recall, Specificity, and F1-Score -- 4.2 Accuracy -- 4.3 False Positive Rate(FPR) and False Negative Rate(FNR) -- 5 Conclusion -- References -- From Generic to Custom: A Survey on Role of Machine Learning in Pharmacogenomics, Its Applications and Challenges -- 1 Introduction -- 2 Genomics -- 2.1 Understanding the Disease -- 2.2 Challenges -- 2.3 Data Sharing -- 3 Pharmacogenomics -- 4 Machine Learning in Pharmacogenomics -- 4.1 Genome-Wide Association Study (GWAS) -- 4.2 Evolutionary Conservation -- 4.3 Applications of Genomics in Diabetes -- 5 Conclusion -- References -- Personalised Structure Balance Theory-Based Movie Recommendation System -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Pre-processing Module -- 3.2 Product-Based Recommendation Module -- 3.3 User-Based Recommendation Module -- 3.4 Prediction Module -- 4 Results -- 5 Conclusion -- References.
,
Machine Learning Techniques for the Investigation of Phishing Websites -- 1 Introduction -- 2 Literature Review -- 3 Materials and Method -- 3.1 Dataset -- 3.2 Data Preparation and Preprocessing -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Feature Extraction and Classification of Gestures from Myo-Electric Data Using a Neural Network Classifier -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Data Segmentation -- 3.3 Feature Extraction and Classification -- 4 Discussion and Results -- 5 Conclusion -- References -- Text-Convolutional Neural Networks for Fake News Detection in Tweets -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Preprocessing -- 3.2 Embedding Matrix -- 3.3 Classification -- 4 Experiments -- 4.1 Dataset -- 4.2 Feature Extraction -- 5 Results and Discussion -- 6 Conclusion -- References -- Effect of Soil and Climatic Attribute on Greenhouse Gas Emission from Agriculture Sector -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Database Creation -- 3.3 Data Preprocessing -- 3.4 Feature Extraction -- 3.5 Analysis of Features -- 3.6 Prediction Model -- 4 Result Analysis -- 4.1 Crop-Wise GHGs Emission -- 4.2 Season-Wise GHGs Emission -- 4.3 Most Influencing Parameter for Prediction of GHGs Emission -- 4.4 Using Deep Learning Approach -- 5 Conclusion -- References -- Optimal Image Feature Ranking and Fusion for Visual Question Answering -- 1 Introduction -- 2 Related Work -- 2.1 Visual Question Answering -- 2.2 Image Feature Extraction -- 3 Ranking and Feature Fusion (RFF) Framework -- 3.1 Overall Architecture -- 3.2 Feature Ranking -- 3.3 Feature Fusion -- 4 Results and Discussions -- 5 Conclusion -- References -- An Investigation on Indoor Navigation Systems -- 1 Introduction.
,
2 Path Selection Taxonomy -- 2.1 Uninformed Search Algorithm -- 2.2 Informed Search Algorithm -- 3 Object or Obstacle Detection Taxonomy -- 3.1 CNN Algorithm -- 3.2 RCNN Algorithm -- 3.3 Fast RCNN Algorithm -- 3.4 Faster RCNN Algorithm -- 3.5 YOLO -- 4 Conclusion -- References -- Conceptualization and Design of Remotely-Accessible Hardware Interface (RAHI) Laboratory -- 1 Introduction -- 1.1 Background and Problem Identification -- 1.2 Literature Review and Proposed Solution -- 2 Technical Description -- 2.1 Server -- 2.2 Raspberry Pi and Hardware -- 2.3 Web Application -- 3 Discussion -- 3.1 Testing -- 3.2 Analysis -- 4 Future Scope -- 5 Conclusion -- References -- A Non-invasive approach for Driver Drowsiness Detection using Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Disaster Severity Analysis from Micro-Blog Texts Using Deep-NN -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Input Layer -- 3.2 Convolution Layer -- 3.3 Max-Pooling Layer -- 3.4 RNN Layer -- 3.5 Fully Connected Layer -- 4 Experimental Setup -- 4.1 Preparation of Datasets -- 4.2 Word-Embeddings -- 4.3 Network Training -- 5 Results and Discussion -- 6 Conclusion -- References -- WEKA Result Reader-A Smart Tool for Reading and Summarizing WEKA Simulator Files -- 1 Introduction -- 2 The WEKA Result Reader (WRR) -- 3 Performance Evaluation -- 3.1 Application-Level Testing of WRR Tools -- 3.2 System-Level Testing of WRR Tools -- 4 Conclusion -- References -- Predicting Reliability of Web Services Using Hidden Markov Model -- 1 Introduction -- 2 Models of NHPP -- 3 Hidden Markov Model for Reliability Model -- 3.1 Modeling the Failure Process with HMM -- 3.2 Parameter Estimation -- 3.3 Restoration of Hidden States.
,
3.4 Bayesian Information Criterion (BIC) -- 4 Experiments -- 5 Conclusion -- References -- Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels -- 1 Introduction -- 2 Recursive Visual Cryptography Scheme -- 2.1 The RVCS Model -- 2.2 Working Example of RVCS -- 3 The Proposed Model: Size-Invariant RVCS with PRWP -- 3.1 Experimental Results -- 3.2 Analysis of Experimental Results -- 4 Conclusion -- References -- Performance Analysis of Brain Imaging Using Enriched CGLS and MRNSD in Microwave Tomography -- 1 Introduction -- 1.1 Related Works -- 2 Formulation of the Proposed Forward Process -- 3 Importance of Enriched CGLS and MRNSD Regularization Methods -- 4 Numerical Results and Discussion -- 4.1 Simulation Setup and Dataset -- 4.2 Performance Analysis on Varying Number of Antennas and Frequencies -- 4.3 Performance Analysis on Noise Distortion -- 5 Conclusion -- References -- Analysis and Identification of EEG Features for Mental Stress -- 1 Introduction -- 2 Methodology -- 2.1 Brief Procedure -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 3 Results -- 4 Discussion -- 5 Conclusion -- 6 Future Work -- References -- Blockchain-Based Grievance Management System -- 1 Introduction -- 2 Benefits Over Current System -- 3 Approach -- 3.1 Working -- 3.2 System Architecture -- 3.3 Mathematical Model -- 4 Implementation -- 5 Conclusion -- References -- Utility of Neural Embeddings in Semantic Similarity of Text Data -- 1 Introduction -- 2 Neural Embedding Techniques -- 3 Methodology -- 4 Data Management -- 5 Experimental Results -- 5.1 Similarity Score Distribution -- 5.2 D-Prime -- 6 Conclusion -- References -- Big Data and Machine Learning Analytics to Detect Epileptic Seizures with Minimum Delay Using Random Window Optimization -- 1 Introduction -- 2 Big Datasets and Machine Learning.
,
3 Epileptic Seizure Detection -- 4 Related Work -- 5 Methods -- 5.1 Support Vector Machine -- 5.2 Artificial Neural Network -- 6 Methodology -- 6.1 Top-K Amplitude Measure -- 6.2 Multiwindow Measure -- 6.3 Workflow -- 7 Results and Discussion -- 8 Conclusion -- References -- An Efficient Evaluation of Spatial Search on Road Networks Using G-Tree -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 G-Tree Indexing for Finding SPSP Based on Distance -- 4 Experimental Evaluation and Results -- 5 Conclusion -- References -- Investigation into the Efficacy of Various Machine Learning Techniques for Mitigation in Credit Card Fraud Detection -- 1 Introduction -- 2 Related Works -- 2.1 Machine Learning Algorithms -- 3 Proposed Methodology -- 4 Experimental Study -- 4.1 Credit Card Dataset -- 4.2 Design of Experiments -- 4.3 Performance Evaluation Measures -- 5 Results and Discussions -- 6 Conclusion and Future Work -- References -- Temporal Modeling of On-Street Parking Data for Detection of Parking Violation in Smart Cities -- 1 Introduction -- 2 Related Work -- 3 Data Collection and Preliminary Analysis -- 4 Problem Formulation -- 5 Proposed Approach -- 5.1 Proposed Detection Model -- 5.2 Proposed Algorithm -- 6 Simulation Results and Analysis -- 7 Conclusion and Future Work -- References -- Performance Optimization of Big Data Applications Using Parameter Tuning of Data Platform Features Through Feature Selection Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experiments and Results -- 5 Conclusion -- References -- Development of Emotional Decision-Making Model Using EEG Signals -- 1 Introduction -- 2 Methodology -- 2.1 Design of Experiment -- 3 Decision-Making Model -- 4 Conclusion -- References -- HMM Classifier Object Recognizing System in Brain-Computer Interface -- 1 Introduction -- 2 State of Art Development.
,
3 Background.
Permalink