GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (498 pages)
    Edition: 1st ed.
    ISBN: 9789811500770
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.165
    Language: English
    Note: Intro -- Organizing Committee -- Preface -- Contents -- About the Editors -- 1 Comparison of Different Image Segmentation Techniques on MRI Image -- 1.1 Introduction -- 1.2 Methodology -- 1.2.1 Preprocessing -- 1.2.2 Segmentation Techniques -- 1.3 Results and Discussion -- 1.4 Conclusion -- References -- 2 PSO-ANN-Based Computer-Aided Diagnosis and Classification of Diabetes -- 2.1 Introduction -- 2.1.1 Literature Survey -- 2.2 Feature Selection Approaches -- 2.3 Particle Swarm Optimization (PSO) -- 2.4 Proposed Feature Selection Algorithm -- 2.5 Experimental Results -- 2.6 Conclusion -- References -- 3 Round Robin Scheduling Based on Remaining Time and Median (RRRT& -- M) for Cloud Computing -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Scheduling Algorithms -- 3.4 Experimental Setup and Result Discussions -- 3.4.1 Experimental Setup -- 3.4.2 Performance Metrics -- 3.4.3 Result Discussions -- 3.5 Summary -- References -- 4 Business-Driven Blockchain-Mempool Model for Cooperative Optimization in Smart Grids -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Virtual Power Plant Dispatch Schedules -- 4.3.1 Cost Function Based Optimization -- 4.4 Blockchain -- 4.4.1 Consensus -- 4.5 Consensus and Cooperative Scheduling -- 4.6 Mempool Model -- 4.7 Evaluation and Future Work -- 4.8 Conclusion -- References -- 5 Research of Institutional Technology Diffusion Rules Based on Patent Citation Network-A Case Study of AI Field -- 5.1 Introduction -- 5.2 Data and Method -- 5.3 Results and Discussion -- 5.3.1 Comparative Analysis of Technical Force -- 5.3.2 Technology Diffusion Network and Visualization -- 5.3.3 Measurement of Technology Diffusion Capacity -- 5.4 Conclusion and Limitation -- References -- 6 Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador -- 6.1 Introduction. , 6.2 Materials and Methods -- 6.2.1 Materials -- 6.2.2 Methods -- 6.3 Results -- 6.4 Discussion -- 6.5 Future Work and Conclusion -- References -- 7 Appropriate Security Protocols to Mitigate the Risks in Electronic Money Management -- 7.1 Introduction -- 7.2 Materials and Methods -- 7.2.1 Materials -- 7.2.2 Methods -- 7.3 Results -- 7.4 Discussion -- 7.5 Future Works and Conclusion -- 7.5.1 Future Works -- 7.5.2 Conclusions -- References -- 8 Acceptance and Readiness of Thai Farmers Toward Digital Technology -- 8.1 Introduction -- 8.2 Research Model -- 8.3 Method -- 8.3.1 Questionnaire Instrument -- 8.3.2 Data Analysis -- 8.4 Results -- 8.5 Conclusion -- References -- 9 Neural Network Classifier for Diagnosis of Diabetic Retinopathy -- 9.1 Introduction -- 9.2 Classification -- 9.3 Conclusion -- References -- 10 Comparative Analysis of Data Mining Classification Techniques for Prediction of Heart Disease Using the Weka and SPSS Modeler Tools -- 10.1 Introduction -- 10.2 Literature Review -- 10.2.1 Data Mining Classification Techniques -- 10.3 Experimental Analysis -- 10.3.1 Dataset -- 10.3.2 Result Analysis -- References -- 11 An Automated Framework to Uncover Malicious Traffic for University Campus Network -- 11.1 Introduction -- 11.2 Study Goals -- 11.3 Methodology -- 11.4 Experimental Setup -- 11.5 Observations and Analysis of Framework in Campus Network on Real-Time Basis -- 11.5.1 Dashboard Visualization for Analysis -- 11.6 Conclusion -- 11.7 Future Scope -- References -- 12 Comparative Analysis of K-Means Algorithm and Particle Swarm Optimization for Search Result Clustering -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Experimental Result and Analysis -- 12.3.1 Dataset Details -- 12.3.2 Preprocessing -- 12.3.3 Performance Evaluation -- 12.4 Conclusion -- References. , 13 Design and Implementation of Rule-Based Hindi Stemmer for Hindi Information Retrieval -- 13.1 Introduction -- 13.2 Stemming Approaches -- 13.2.1 Affix Removal Approach -- 13.2.2 N-Gram -- 13.2.3 Suffix Stripping Approach -- 13.2.4 Suffix Substitution Approach -- 13.2.5 Brute-Force Approach -- 13.2.6 Hybrid Approach -- 13.3 Related Work -- 13.4 Proposed Methodology and Implementation -- 13.5 Analysis and Conclusion -- References -- 14 Research on the Development Trend of Ship Integrated Power System Based on Patent Analysis -- 14.1 Introduction -- 14.2 Data and Methods -- 14.3 Results and Discussion -- 14.3.1 Life Cycle Analysis of Patent Technology Development of Foreign Ship Integrated Power System -- 14.3.2 Analysis of Patent Technology Research and Development Direction of Foreign Ship Integrated Power System -- 14.4 Summary -- References -- 15 Detection of Data Anomalies in Fog Computing Architectures -- 15.1 Introduction -- 15.2 Fog Architecture Overview -- 15.3 Anomaly Detection -- 15.3.1 Anomalies -- 15.3.2 Preliminaries for Detection Algorithm -- 15.3.3 Detection Procedure -- 15.4 Computation Algorithm -- 15.5 Related Work -- 15.6 Conclusion -- References -- 16 Cloud Data for Marketing in Tourism Sector -- 16.1 Introduction -- 16.2 Consumer Behavioral Study for the Tourism Industry -- 16.3 Sources of Data -- 16.3.1 Methods of Sourcing Data from Internet -- 16.4 Model for Marketing Data Capture -- 16.4.1 Prediction Theories -- 16.4.2 Marketing -- 16.5 Results -- 16.6 Conclusion -- References -- 17 Road Travel Time Prediction Method Based on Random Forest Model -- 17.1 Introduction -- 17.2 The Principle of Random Forest Algorithm -- 17.3 The Principle of DBSCAN -- 17.4 The Prediction Model of RF-DBSCAN -- 17.4.1 Data Sources -- 17.4.2 Feature Selection -- 17.4.3 The Principle of RF-DBSCAN -- 17.4.4 Comparison of Experiment Results. , 17.5 Conclusions -- References -- 18 Video Synchronization and Alignment Using Motion Detection and Contour Filtering -- 18.1 Introduction -- 18.1.1 Overview -- 18.1.2 Problem Statement -- 18.1.3 Objectives -- 18.1.4 Existing System -- 18.1.5 Proposed System -- 18.2 Literature Survey -- 18.3 System Design -- 18.4 Dataflow of Video Change Detection -- 18.5 Class Diagrams -- 18.6 Experimental Results -- 18.7 Conclusion -- References -- 19 Mutichain Enabled EHR Management System and Predictive Analytics -- 19.1 Introduction -- 19.2 Related Work -- 19.2.1 Verifying the Authenticity of Returned Drugs by Tracking Supply of Authorized Drugs in Supply Chain -- 19.2.2 Transparency and Traceability of Consent in Clinical Trials -- 19.2.3 Incentivized Access to Medical Data -- 19.3 Problem Setting -- 19.4 Proposed Architecture -- 19.4.1 Multichain -- 19.4.2 Off-Chain Storage -- 19.4.3 Hashing -- 19.4.4 Data Analysis -- 19.4.5 Machine Learning -- 19.4.6 Workflow -- 19.5 Conclusion -- References -- 20 Quick Insight of Research Literature Using Topic Modeling -- 20.1 Introduction -- 20.2 Literature Survey -- 20.3 Methodology -- 20.3.1 Preprocessing-Natural Language Processing -- 20.3.2 Topic Modeling -- 20.3.3 Latent Dirichlet Allocation -- 20.4 System Development -- 20.5 Experimental Results -- 20.6 Conclusion -- References -- 21 Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE) -- 21.1 Introduction -- 21.1.1 An Overview -- 21.2 Related Work -- 21.3 Proposed Methodology -- 21.3.1 Developing an Efficient Data Storage Scheme -- 21.3.2 Developing a Ciphertext Database Scheme -- 21.4 Conclusion -- References -- 22 Security Vulnerabilities of OpenStack Cloud and Security Assessment Using Different Software Tools -- 22.1 Introduction -- 22.2 Software Architecture -- 22.2.1 Components of OpenStack. , 22.2.2 OpenStack Usage in Cloud Platform -- 22.3 Vulnerabilities in OpenStack -- 22.3.1 Known Vulnerabilities in OpenStack -- 22.3.2 Assessment for Security -- 22.3.3 Network Vulnerability Scanners -- 22.4 Conclusion -- References -- 23 Smart Physical Intruder Detection System for Highly Sensitive Area -- 23.1 Introduction -- 23.2 Literature Survey -- 23.3 Proposed Methodology -- 23.3.1 Working of PIR Motion Sensor -- 23.3.2 Face Recognition Using Viola-Jones Algorithm and KNN Algorithm -- 23.4 Conclusion and Future Scope -- References -- 24 Two-level Classification of Radar Targets Using Machine Learning -- 24.1 Introduction -- 24.2 Phased Array Radar -- 24.3 Design of Multilevel Classifier -- 24.3.1 Signal Level Classification: Level ``0'' -- 24.3.2 Classification Level 1 Using Raw Detection -- 24.3.3 Level 2 Classifier Using Track Data -- 24.4 Fusion of Information with Signal Level Classifier -- 24.5 Simulation and Results -- 24.5.1 Results for Level 1 Classification -- 24.5.2 Classification Level 2 Using Radar Track and Signal Data -- 24.6 Conclusion -- References -- 25 A Cognitive Semantic-Based Approach for Human Event Detection in Videos -- 25.1 Introduction -- 25.2 Methodology -- 25.2.1 Frame Generation -- 25.2.2 Fuzzy C-Mean Clustering (FCM) -- 25.2.3 Feature Extraction -- 25.2.4 CNN Classifier -- 25.3 Test Results and Discussions -- 25.4 Conclusions -- References -- 26 Analysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador -- 26.1 Introduction -- 26.2 Materials and Methods -- 26.2.1 Materials -- 26.2.2 Methods -- 26.3 Results -- 26.4 Discussion -- 26.5 Work Futures and Conclusions -- References -- 27 Load and Renewable Energy Forecasting for System Modelling, an Effort in Reducing Renewable Energy Curtailment -- 27.1 Introduction -- 27.2 Literature Review -- 27.3 Proposed Work. , 27.3.1 Neural Network-Based Load Forecasting.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computational intelligence-Congresses. ; Evolutionary computation-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (780 pages)
    Edition: 1st ed.
    ISBN: 9789811557880
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1176
    DDC: 006.3
    Language: English
    Note: Intro -- Organization -- Chief Patrons -- Patrons -- Organizing Chairs -- Publicity Chairs -- Advisory Committee -- Technical Program Committee -- Preface -- Contents -- About the Editors -- Faster Result Retrieval from Health Care Product Sales Data Warehouse Using Materialized Queries -- 1 Introduction -- 2 Implementation of MQDB for Bioteknika Healthcare Pvt. Ltd -- 3 Experimental Results -- 4 Conclusion -- References -- Sense Scheduling for Robotics Cognitive Intelligence -- 1 Introduction -- 2 Related Work -- 3 Human Though Process Test -- 4 Proposed System Architecture -- 5 Proposed Methodology -- 6 Result and Discussion -- 7 Conclusion -- 8 Conclusion -- References -- Feature Selection Using Ant Colony Optimization and Weighted Visibility Graph -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Work and Experiment -- 3.1 Feature Extraction -- 3.2 Feature Selection -- 4 Performance Analysis -- 4.1 Precision, Recall, Specificity, and F1-Score -- 4.2 Accuracy -- 4.3 False Positive Rate(FPR) and False Negative Rate(FNR) -- 5 Conclusion -- References -- From Generic to Custom: A Survey on Role of Machine Learning in Pharmacogenomics, Its Applications and Challenges -- 1 Introduction -- 2 Genomics -- 2.1 Understanding the Disease -- 2.2 Challenges -- 2.3 Data Sharing -- 3 Pharmacogenomics -- 4 Machine Learning in Pharmacogenomics -- 4.1 Genome-Wide Association Study (GWAS) -- 4.2 Evolutionary Conservation -- 4.3 Applications of Genomics in Diabetes -- 5 Conclusion -- References -- Personalised Structure Balance Theory-Based Movie Recommendation System -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Pre-processing Module -- 3.2 Product-Based Recommendation Module -- 3.3 User-Based Recommendation Module -- 3.4 Prediction Module -- 4 Results -- 5 Conclusion -- References. , Machine Learning Techniques for the Investigation of Phishing Websites -- 1 Introduction -- 2 Literature Review -- 3 Materials and Method -- 3.1 Dataset -- 3.2 Data Preparation and Preprocessing -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Feature Extraction and Classification of Gestures from Myo-Electric Data Using a Neural Network Classifier -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Data Segmentation -- 3.3 Feature Extraction and Classification -- 4 Discussion and Results -- 5 Conclusion -- References -- Text-Convolutional Neural Networks for Fake News Detection in Tweets -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Preprocessing -- 3.2 Embedding Matrix -- 3.3 Classification -- 4 Experiments -- 4.1 Dataset -- 4.2 Feature Extraction -- 5 Results and Discussion -- 6 Conclusion -- References -- Effect of Soil and Climatic Attribute on Greenhouse Gas Emission from Agriculture Sector -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Database Creation -- 3.3 Data Preprocessing -- 3.4 Feature Extraction -- 3.5 Analysis of Features -- 3.6 Prediction Model -- 4 Result Analysis -- 4.1 Crop-Wise GHGs Emission -- 4.2 Season-Wise GHGs Emission -- 4.3 Most Influencing Parameter for Prediction of GHGs Emission -- 4.4 Using Deep Learning Approach -- 5 Conclusion -- References -- Optimal Image Feature Ranking and Fusion for Visual Question Answering -- 1 Introduction -- 2 Related Work -- 2.1 Visual Question Answering -- 2.2 Image Feature Extraction -- 3 Ranking and Feature Fusion (RFF) Framework -- 3.1 Overall Architecture -- 3.2 Feature Ranking -- 3.3 Feature Fusion -- 4 Results and Discussions -- 5 Conclusion -- References -- An Investigation on Indoor Navigation Systems -- 1 Introduction. , 2 Path Selection Taxonomy -- 2.1 Uninformed Search Algorithm -- 2.2 Informed Search Algorithm -- 3 Object or Obstacle Detection Taxonomy -- 3.1 CNN Algorithm -- 3.2 RCNN Algorithm -- 3.3 Fast RCNN Algorithm -- 3.4 Faster RCNN Algorithm -- 3.5 YOLO -- 4 Conclusion -- References -- Conceptualization and Design of Remotely-Accessible Hardware Interface (RAHI) Laboratory -- 1 Introduction -- 1.1 Background and Problem Identification -- 1.2 Literature Review and Proposed Solution -- 2 Technical Description -- 2.1 Server -- 2.2 Raspberry Pi and Hardware -- 2.3 Web Application -- 3 Discussion -- 3.1 Testing -- 3.2 Analysis -- 4 Future Scope -- 5 Conclusion -- References -- A Non-invasive approach for Driver Drowsiness Detection using Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Disaster Severity Analysis from Micro-Blog Texts Using Deep-NN -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Input Layer -- 3.2 Convolution Layer -- 3.3 Max-Pooling Layer -- 3.4 RNN Layer -- 3.5 Fully Connected Layer -- 4 Experimental Setup -- 4.1 Preparation of Datasets -- 4.2 Word-Embeddings -- 4.3 Network Training -- 5 Results and Discussion -- 6 Conclusion -- References -- WEKA Result Reader-A Smart Tool for Reading and Summarizing WEKA Simulator Files -- 1 Introduction -- 2 The WEKA Result Reader (WRR) -- 3 Performance Evaluation -- 3.1 Application-Level Testing of WRR Tools -- 3.2 System-Level Testing of WRR Tools -- 4 Conclusion -- References -- Predicting Reliability of Web Services Using Hidden Markov Model -- 1 Introduction -- 2 Models of NHPP -- 3 Hidden Markov Model for Reliability Model -- 3.1 Modeling the Failure Process with HMM -- 3.2 Parameter Estimation -- 3.3 Restoration of Hidden States. , 3.4 Bayesian Information Criterion (BIC) -- 4 Experiments -- 5 Conclusion -- References -- Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels -- 1 Introduction -- 2 Recursive Visual Cryptography Scheme -- 2.1 The RVCS Model -- 2.2 Working Example of RVCS -- 3 The Proposed Model: Size-Invariant RVCS with PRWP -- 3.1 Experimental Results -- 3.2 Analysis of Experimental Results -- 4 Conclusion -- References -- Performance Analysis of Brain Imaging Using Enriched CGLS and MRNSD in Microwave Tomography -- 1 Introduction -- 1.1 Related Works -- 2 Formulation of the Proposed Forward Process -- 3 Importance of Enriched CGLS and MRNSD Regularization Methods -- 4 Numerical Results and Discussion -- 4.1 Simulation Setup and Dataset -- 4.2 Performance Analysis on Varying Number of Antennas and Frequencies -- 4.3 Performance Analysis on Noise Distortion -- 5 Conclusion -- References -- Analysis and Identification of EEG Features for Mental Stress -- 1 Introduction -- 2 Methodology -- 2.1 Brief Procedure -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 3 Results -- 4 Discussion -- 5 Conclusion -- 6 Future Work -- References -- Blockchain-Based Grievance Management System -- 1 Introduction -- 2 Benefits Over Current System -- 3 Approach -- 3.1 Working -- 3.2 System Architecture -- 3.3 Mathematical Model -- 4 Implementation -- 5 Conclusion -- References -- Utility of Neural Embeddings in Semantic Similarity of Text Data -- 1 Introduction -- 2 Neural Embedding Techniques -- 3 Methodology -- 4 Data Management -- 5 Experimental Results -- 5.1 Similarity Score Distribution -- 5.2 D-Prime -- 6 Conclusion -- References -- Big Data and Machine Learning Analytics to Detect Epileptic Seizures with Minimum Delay Using Random Window Optimization -- 1 Introduction -- 2 Big Datasets and Machine Learning. , 3 Epileptic Seizure Detection -- 4 Related Work -- 5 Methods -- 5.1 Support Vector Machine -- 5.2 Artificial Neural Network -- 6 Methodology -- 6.1 Top-K Amplitude Measure -- 6.2 Multiwindow Measure -- 6.3 Workflow -- 7 Results and Discussion -- 8 Conclusion -- References -- An Efficient Evaluation of Spatial Search on Road Networks Using G-Tree -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 G-Tree Indexing for Finding SPSP Based on Distance -- 4 Experimental Evaluation and Results -- 5 Conclusion -- References -- Investigation into the Efficacy of Various Machine Learning Techniques for Mitigation in Credit Card Fraud Detection -- 1 Introduction -- 2 Related Works -- 2.1 Machine Learning Algorithms -- 3 Proposed Methodology -- 4 Experimental Study -- 4.1 Credit Card Dataset -- 4.2 Design of Experiments -- 4.3 Performance Evaluation Measures -- 5 Results and Discussions -- 6 Conclusion and Future Work -- References -- Temporal Modeling of On-Street Parking Data for Detection of Parking Violation in Smart Cities -- 1 Introduction -- 2 Related Work -- 3 Data Collection and Preliminary Analysis -- 4 Problem Formulation -- 5 Proposed Approach -- 5.1 Proposed Detection Model -- 5.2 Proposed Algorithm -- 6 Simulation Results and Analysis -- 7 Conclusion and Future Work -- References -- Performance Optimization of Big Data Applications Using Parameter Tuning of Data Platform Features Through Feature Selection Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experiments and Results -- 5 Conclusion -- References -- Development of Emotional Decision-Making Model Using EEG Signals -- 1 Introduction -- 2 Methodology -- 2.1 Design of Experiment -- 3 Decision-Making Model -- 4 Conclusion -- References -- HMM Classifier Object Recognizing System in Brain-Computer Interface -- 1 Introduction -- 2 State of Art Development. , 3 Background.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (495 pages)
    Edition: 1st ed.
    ISBN: 9789811552243
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.182
    DDC: 004.6
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- 1 Accurate Detection of Facial Landmark Points Using Local Intensity Information for Emotion Detection -- 1.1 Introduction -- 1.2 Materials and Methods -- 1.2.1 Materials -- 1.2.2 Proposed Methodology -- 1.3 Performance Metrics -- 1.4 Results -- 1.4.1 Eye Centers -- 1.4.2 Eyebrows -- 1.4.3 Lip Corners -- 1.5 Discussion -- 1.6 Conclusion -- References -- 2 Statistical Approach to Detect Alzheimer's Disease and Autism Spectrum-Related Neurological Disorder Using Machine Learning -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Methodology -- 2.4 Result -- 2.5 Conclusion -- 2.6 Future Work -- References -- 3 The Development and Gap of Chinese and American Open Access Journals: From the Perspective of Network Influence -- 3.1 Introduction -- 3.2 Data and Method -- 3.2.1 Sample Selection Method -- 3.2.2 Data Acquisition Platform -- 3.2.3 Data Collection Method -- 3.3 Results and Discussion -- 3.4 Comparison of Network Influence Based on Principal Component Analysis -- 3.5 Conclusion -- 3.6 Limited -- Appendix -- References -- 4 The Use of Mobile Apps to Facilitate Customers' Choice-Making When Grocery Shopping -- 4.1 Introduction -- 4.2 Method -- 4.2.1 Participants -- 4.2.2 Apparatus and Setting -- 4.2.3 Attributes -- 4.2.4 Procedure -- 4.2.5 Analysis -- 4.3 Findings -- 4.4 Discussion -- 4.4.1 Practical Implications -- 4.4.2 Limitations and Future Research -- References -- 5 Implementation of Best Hybrid Adaptive and Intelligent MIMO Detector on Reconfigurable Architecture for 5G LTE/IoT Environment -- 5.1 Introduction -- 5.2 Proposed B-HAI MIMO Detector -- 5.3 System Model -- 5.4 Architecture of HAI Detector -- 5.5 Computational Complexity Reduction -- 5.6 Performance Evaluation -- 5.7 Conclusions -- References. , 6 Automated Detection of Retinal Hemorrhage Based on Supervised Classifiers and Implementation in Hardware -- 6.1 Introduction -- 6.2 Methodology -- 6.2.1 Feature Extraction from Splats -- 6.2.2 Preliminary Feature Selection and Classification -- 6.3 Results and Discussions -- 6.3.1 Classification of Splats Using kNN and ANN Classifiers -- 6.3.2 Implementation in Hardware -- 6.4 Conclusion -- References -- 7 Data Encryption as Security Measure in IoT-Enabled Healthcare -- 7.1 Introduction -- 7.2 IoT Data in Healthcare -- 7.3 IoT Data Encryption and Compression -- 7.3.1 Basic Philosophy -- 7.3.2 Basic Details DRT and IDRT -- 7.3.3 Inverse Discrete Rajan Transform -- 7.3.4 Sparsing of Data by Retaining CPI Alone -- 7.4 Summary -- References -- 8 Agents-Based Service Restoration in Electrical Secondary Distribution Network -- 8.1 Introduction -- 8.2 Study Approach -- 8.3 Current Status of the Tanzanian Secondary Distribution Network -- 8.4 Proposed Distributed Control Model for Service Restoration -- 8.4.1 Objective Functions -- 8.4.2 Recommendations for the Improvement of the SDN -- 8.4.3 Design for the Equipment Specifications to Be Installed to Support Service Restoration in the Pilot Site -- 8.5 Conclusion -- References -- 9 Packet-Level and Physical-Level Cross-Technology Communications: A Brief Introduction -- 9.1 Introduction -- 9.2 Packet-Level CTC -- 9.2.1 FreeBee -- 9.2.2 ZigFi -- 9.3 Physical-Level CTC -- 9.4 Conclusion -- References -- 10 Smart Traffic Navigation System (STNS) to Reduce Travel Time by Integrating Signals from Navigation and Traffic Systems -- 10.1 Introduction -- 10.2 Related Work -- 10.3 Design of the Proposed Model -- 10.4 Experimental Setup -- 10.5 Implementation -- 10.5.1 Vehicle -- 10.5.2 Traffic Signal -- 10.6 Experiments and Results -- 10.6.1 Test Cases -- 10.6.2 Test System Specifications -- 10.6.3 Results. , 10.7 Conclusion -- References -- 11 Selective Sensor Control via Cauchy Schwarz Divergence -- 11.1 Introduction -- 11.2 Background and Problem Statement -- 11.2.1 Sensor Control Framework -- 11.2.2 Labeled MB Filter -- 11.2.3 Notation -- 11.2.4 Labeled-MB RFS -- 11.2.5 Labeled-MB Filter -- 11.3 Selective Sensor Control via CS-Divergence -- 11.3.1 CS-Divergence -- 11.4 Numerical Results -- 11.5 Discussion and Conclusion -- References -- 12 Step-Factor Resampling Technique for Imbalanced Sequence Data Classification -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Methodology -- 12.3.1 Smoothing Technique -- 12.3.2 Resampling Technique -- 12.4 Experimental Results -- 12.4.1 Model Tuning with Smoothing Factor -- 12.4.2 Model Tuning with Resampling Technique -- 12.4.3 Performance Evaluation of Models -- 12.4.4 Best Performing Model -- 12.5 Conclusions -- References -- 13 Rice Disease Detection Based on Image Processing Technique -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 Methodology -- 13.3.1 Working Diagram -- 13.3.2 Dataset Collection -- 13.3.3 Neural Network -- 13.3.4 Building Model -- 13.3.5 Compiling the Model -- 13.3.6 Training and Testing the Model -- 13.4 Result and Outcome -- 13.4.1 Learning Rate -- 13.4.2 Confusion Matrix -- 13.4.3 Classification -- 13.5 Conclusions -- References -- 14 Electromagnetic Radiation from Cell Phones Used in Dhaka City -- 14.1 Introduction -- 14.1.1 Motivation -- 14.1.2 Novelty and Contribution -- 14.2 Materials and Methods -- 14.2.1 Experimental Setup -- 14.3 Results -- 14.3.1 Epidemiological Data from Cell Phones -- 14.3.2 Radiated Power Measurement from Cell Phones -- 14.4 Discussions -- 14.5 Conclusion -- 14.5.1 Limitations -- References -- 15 Expressing Opinions Application: A Case Study at Rajamangala University of Technology, Isan, Khon Kaen Campus -- 15.1 Introduction -- 15.2 Tools and Theories. , 15.2.1 Flutter -- 15.2.2 Spring Framework -- 15.2.3 Java Script Object Notation (JSON) -- 15.2.4 SQL -- 15.3 Procedure -- 15.3.1 The Operation of the System -- 15.3.2 System Design and Development -- 15.4 Login Page -- 15.4.1 Adding Topics and Comments -- 15.4.2 Tools for System Development -- 15.5 Experimental Results -- 15.6 Conclusion -- References -- 16 Toward Clarifying Human Information Processing by Analyzing Big Data: Comparing Response Time to Questionnaires Included Heteronym Word for Problem Solving Between Visually and Auditory Types -- 16.1 Introduction -- 16.2 Problems -- 16.3 Design -- 16.4 Results -- 16.5 Discussion -- 16.6 Conclusion -- References -- 17 Mango Species Detection from Raw Leaves Using Image Processing System -- 17.1 Introduction -- 17.2 Literature Review -- 17.3 Proposed Methodology -- 17.3.1 Primary Steps for Mango Species Detection -- 17.3.2 Image Acquisition -- 17.3.3 Image Pre-processing and Classification -- 17.3.4 Architecture Model -- 17.4 Result -- 17.4.1 Statistical Analysis -- 17.4.2 Accuracy Graph -- 17.4.3 Confusion Matrix -- 17.4.4 Layer Visualization -- 17.4.5 Species Detection -- 17.5 Conclusion -- References -- 18 Frequency Reconfigurable Planner Antennas for Wireless Applications: A Review -- 18.1 Introduction -- 18.1.1 Reconfigurable Antennas -- 18.1.2 Multiple Frequency Reconfigurable Antennas -- 18.2 Ultra-Wide Band Reconfigurable Antennas -- 18.3 Conclusion -- References -- 19 Room Temperature Pt-Modified WO3/p-Si Film Gas Sensor for Detection of Methanol -- 19.1 Introduction -- 19.2 Preparation of Thin Film -- 19.3 Results and Discussions -- 19.4 Conclusions -- References -- 20 Graph Degree Linkage Clustering for Identify Student's Performance on Kompetisi Sains Madrasah in Indonesia -- 20.1 Introduction -- 20.2 Graph Degree Linkage -- 20.2.1 Algorithm Overview -- 20.2.2 Neighborhood Graph. , 20.2.3 Adjacency Measure -- 20.3 Clustering Evaluation: Silhouette -- 20.4 Result and Discussion -- 20.5 Conclusion -- References -- 21 Stepwise Iterative Maximum Likelihood Clustering Based on Kompetisi Sains Madrasah' Scores for Identifying Quality of Junior High School Grading Distribution -- 21.1 Introduction -- 21.2 Stepwise Iterative Maximum Likelihood (SIML) -- 21.3 Silhouette -- 21.4 Results and Discussion -- 21.5 Conclusion -- References -- 22 Detecting the Width of Pap Smear Cytoplasm Image Based on GLCM Feature -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Method -- 22.4 Results and Discussion -- 22.4.1 Result -- 22.4.2 Discussion -- 22.5 Conclusion -- References -- 23 Design of a Novel Wideband Dipole Antenna for mm-Wave Frequencies -- 23.1 Introduction -- 23.2 Antenna Geometry and Design Formulae -- 23.3 Result and Analysis -- 23.4 Conclusion -- References -- 24 Forecasting Sea Surface Temperature in Java Sea Using Generalized Regression Neural Networks -- 24.1 Introduction -- 24.2 Sea Surface Temperature -- 24.3 GRNN -- 24.4 Results and Discussion -- 24.5 Conclusion -- References -- 25 Natural Disaster Predictions of Whirlwinds in Cilacap Region of Central Java Using Adaptive Neighborhood Modified Backpropagation (ANMBP) -- 25.1 Introduction -- 25.2 Principal Component Analysis (PCA) -- 25.3 Adaptive Neighborhood Modified Backpropagation (ANMBP) -- 25.4 Results and Discussion -- 25.4.1 Preprocessing Data -- 25.4.2 Whirlwind Predictions Using ANMBP -- 25.5 Discussion -- 25.6 Conclusion -- References -- 26 Designing Memristor-Based Timing Circuits and Performance Comparison with CMOS Counterparts -- 26.1 Introduction -- 26.2 Memristive Device Modeling -- 26.3 Logic Gates -- 26.3.1 AND and NAND Gate -- 26.3.2 OR and NOR Gate -- 26.4 Multivibrators -- 26.5 Voltage-Controlled Oscillator (VCO) -- 26.6 Conclusions -- References. , 27 Identify Elementary Student Distribution Based on Kompetisi Sains Madrasah Data Using Probabilistic Distance Clustering.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (740 pages)
    Edition: 1st ed.
    ISBN: 9789811556791
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1177
    Language: English
    Note: Intro -- Organization -- Chief Patrons -- Patrons -- Organizing Chairs -- Publicity Chairs -- Advisory Committee -- Technical Program Committee -- Preface -- About This Book -- Contents -- About the Editors -- Classification of Dry/Wet Snow Using Sentinel-2 High Spatial Resolution Optical Data -- 1 Introduction -- 2 Data Used and Study Area -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Potential of Robust Face Recognition from Real-Time CCTV Video Stream for Biometric Attendance Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Contributions -- 4 Proposed System -- 5 Algorithm -- 6 Results -- 7 Conclusion -- References -- ATM Theft Investigation Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Data Processing and Data Set -- 5 Results and Analysis -- 6 Conclusion and Future Work -- References -- Classification and Prediction of Rice Crop Diseases Using CNN and PNN -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Algorithms -- 5 Result and Discussion -- 6 Conclusion -- References -- SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed SAGRU Approach -- 3.1 Stacked Autoencoder Feature Extraction (SAFE) -- 3.2 Gated Recurrent Unit Learning (GRUL) -- 3.3 SAGRU-Based Intrusion Detection -- 4 Performance Analysis -- 5 Conclusion -- References -- Comparison of KNN and SVM Algorithms to Detect Clinical Mastitis in Cows Using Internet of Animal Health Things -- 1 Introduction -- 2 Literature Study -- 3 Methodology -- 4 A Sack for Data Acquisition and Testing -- 5 Result -- 6 Conclusion -- References -- Two-Way Face Scrutinizing System for Elimination of Proxy Attendances Using Deep Learning -- 1 Introduction -- 1.1 Comparison with Previous Works. , 2 Methodology -- 2.1 Encoding Faces Present in an Image -- 2.2 Face Recognition -- 3 Algorithm for Eliminating Proxies -- 4 Blynk -- 5 Validation -- 6 Conclusion -- References -- Ontology-Driven Sentiment Analysis in Indian Healthcare Sector -- 1 Introduction -- 2 Literature Overview -- 3 Ayushman Bharat Yojana (PM Jan Arogya Yojana) -- 3.1 Key Benefits of the Scheme -- 3.2 Beneficiaries of the Scheme -- 3.3 Impact of the Scheme on the Beneficiaries -- 4 An Overview of the Ontology -- 4.1 Tools and Resources Used -- 4.2 Ontology: An Overview -- 5 Proposed Work -- 5.1 Data Acquisition -- 5.2 Data Cleaning and Preprocessing -- 5.3 Extracting Features -- 5.4 Training the Model -- 6 Observations and Results -- 7 Conclusion -- 8 Future Work -- References -- Segmentation of Nuclei in Microscopy Images Across Varied Experimental Systems -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Dataset Used -- 3.2 Data Augmentation Used -- 3.3 Model Architecture -- 3.4 Loss Function Used -- 3.5 Evaluation Metric Used -- 4 Experiments and Results -- 5 Conclusion -- References -- Transitional and Parallel Approach of PSO and SGO for Solving Optimization Problems -- 1 Introduction -- 1.1 Traditional Optimization Tools -- 1.2 Non-traditional Optimization Tools -- 2 Preliminaries -- 2.1 Function Optimization -- 2.2 Benchmark Functions -- 2.3 Evolutionary Technique -- 3 Proposed Approach: Hybridization PSO with SGO -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- Remote Sensing-Based Crop Identification Using Deep Learning -- 1 Introduction -- 2 Literature Study -- 3 Methodology -- 3.1 Overview of Proposed Method -- 3.2 Convolution -- 3.3 Max pooling -- 3.4 Dense Node -- 3.5 Softmax -- 4 Results and Discussion -- 5 Conclusion -- References. , Three-Level Hierarchical Classification Scheme: Its Application to Fractal Image Compression Technique -- 1 Introduction -- 2 Basic FIC Technique -- 3 Proposed Three-Level Hierarchical Classification (3-LHC) Scheme -- 3.1 Elementary Analysis -- 3.2 Proposed Modification -- 4 Results and Analysis -- 5 Conclusion -- References -- Prediction of POS Tagging for Unknown Words for Specific Hindi and Marathi Language -- 1 Introduction -- 1.1 POS Tagging -- 1.2 Limitations of Current POS Tagging System -- 2 Related Work -- 3 Contributions -- 4 Proposed Methodology -- 4.1 Hidden Markov Model -- 4.2 Viterbi Algorithm -- 4.3 Naïve Bayes Algorithm -- 5 Result and Analysis -- 6 Conclusion -- 7 Future Work -- References -- Modified Multi-cohort Intelligence Algorithm with Panoptic Learning for Unconstrained Problems -- 1 Introduction and Literature Review -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Sentiment Analysis on Movie Review Using Deep Learning RNN Method -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 4 Implementation Tools -- 5 Performance Analysis -- 6 Conclusions and Future Work -- References -- Super Sort Algorithm Using MPI and CUDA -- 1 Introduction -- 2 Sorting Algorithm -- 3 Result -- 4 Conclusion and Future Work -- References -- Significance of Network Properties of Function Words in Author Attribution -- 1 Introduction -- 2 Author Identification Problem -- 3 Related Works -- 4 Complex Network Approach to Author Identification Problem -- 4.1 Methodology -- 5 Results and Discussions -- 6 Conclusion -- References -- Performance Analysis of Periodic Defected Ground Structure for CPW-Fed Microstrip Antenna -- 1 Introduction -- 2 Design of CPW-Fed Microstrip Antenna -- 3 Circular-Shaped PDGS Structure -- 4 Fabrication and Validation of Antenna -- 5 Conclusion -- References. , Energy Aware Task Consolidation in Fog Computing Environment -- 1 Introduction -- 2 Related Works -- 3 Fog Computing Architecture -- 4 Proposed Energy-Saving Task Consolidation Algorithm -- 5 Simulation Results -- 6 Conclusion -- References -- Modelling CPU Execution Time of AES Encryption Algorithm as Employed Over a Mobile Environment -- 1 Introduction -- 2 Related Literature -- 3 Description of Our Model -- 3.1 Scheme 1 -- 3.2 Scheme 2 -- 4 Experimental Analysis of Data -- 4.1 Scheme 1 -- 4.2 Scheme 2 -- 5 Comparison of Models -- 5.1 Scheme 1 -- 5.2 Scheme 2 -- 5.3 Comparison Between Scheme 1 and Scheme 2 -- 6 Conclusions -- References -- Gradient-Based Feature Extraction for Early Termination and Fast Intra Prediction Mode Decision in HEVC -- 1 Introduction -- 2 Proposed Algorithm -- 3 Experimental Results -- 4 Conclusion -- References -- A Variance Model for Risk Assessment During Software Maintenance -- 1 Introduction -- 2 Risks in Software Development and Maintenance -- 3 Factors in Software Risk Assessment During Maintenance -- 3.1 Testing-Related Risk Factors -- 4 Variance Model for Software Risk Assessment -- 5 Discussion of the Variance Model -- 5.1 Development of a Risk Measurement Toolkit -- 5.2 Maturing of the Risk Model: An Aquatic Profile for Risk Maturity Management (APRMM) -- 6 Conclusions -- References -- Cyber Attack Detection Framework for Cloud Computing -- 1 Introduction -- 2 Cloud Security Attacks -- 3 Proposed Framework -- 3.1 Data Capturing -- 3.2 Filtering and Feature Extraction -- 3.3 Intrusion Detection Model Design -- 3.4 Knowledge Extraction Block -- 4 Performance Evaluation of Proposed Framework -- 4.1 Result Analysis -- 5 Conclusion -- References -- Benchmarking Semantic, Centroid, and Graph-Based Approaches for Multi-document Summarization -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology. , 3.1 Sort by Importance Score Algorithm -- 3.2 K-Means Clustering -- 3.3 Gaussian Mixture Method -- 3.4 Graph-Based Approach -- 4 Experimental Results and Analysis -- 5 Conclusion and Future Work -- References -- Water Availability Prediction in Chennai City Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Support Vector Regression -- 4 Experimental Results and Analysis -- 4.1 Analysis of Water Levels of Reservoirs -- 4.2 Analysis of Rainfall Levels of Reservoir Regions -- 4.3 Analysis of Chennai Population -- 4.4 Prediction of Water Availability per Person -- 5 Conclusion and Future Work -- References -- Field Extraction and Logo Recognition on Indian Bank Cheques Using Convolution Neural Networks -- 1 Introduction -- 2 Background -- 2.1 Object Detection -- 3 Proposed Methodology -- 3.1 Preprocessing -- 3.2 Localization -- 3.3 Bank Name and Logo Recognition -- 3.4 Experimental Setting -- 4 Dataset Description -- 4.1 Evaluation Metrics -- 5 Results and Discussions -- 6 Conclusions -- References -- A Genetic Algorithm Based Medical Image Watermarking for Improving Robustness and Fidelity in Wavelet Domain -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 3.1 Proposed Multiple Watermarks Embedding in Wavelet Domain -- 3.2 Proposed Chromosome-Based Encoding for Finding Optimal Embedding Location -- 3.3 Chromosome Selection -- 3.4 Crossover and Mutation -- 4 Watermark Extraction and Genetic Algorithm Process -- 5 Experimental Results and Discussions -- 6 Conclusion -- References -- Developing Dialog Manager in Chatbots via Hybrid Deep Learning Architectures -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Preparation -- 3.2 Word2Vec Embedding + 1DCNN + LSTM (W1CNNL) -- 3.3 Word2Vec + CNN Embedding + LSTM (WCNNL). , 3.4 Word2Vec + BiLSTM with Attention Embedding + LSTM (WBWAL).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...