GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Electronic data processing -- Distributed processing. ; Electronic books.
    Description / Table of Contents: This book examines leading research and developments in Internet technology, including contributions from academic researchers as well as industry experts discussing new paradigms in Software, Protocols, Supply Chain Management, Security and Cloud Computing.
    Type of Medium: Online Resource
    Pages: 1 online resource (83 pages)
    Edition: 1st ed.
    ISBN: 9783642354618
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.203
    Language: English
    Note: Title Page -- Preface -- Contents -- Enhanced Mobile Ad hoc Routing Protocol Using Cross Layer Design in Wireless Sensor Networks -- Introduction -- Theory -- IEEE 802.15.4 Standard -- Ad hoc On-Demand Distance Vector (AODV) Protocol -- Cross Layer Design -- Propose Energy Weigh - AODV Protocol -- The Simulation -- Result and Performance Analysis -- Conclusion -- References -- Decision Support in Supply Chain Management for Disaster Relief in Somalia -- Introduction -- The Importance of Disaster Management -- Somalia as a Case Study -- Literature Review -- Problem Variants -- Existing Solutions -- Preemptive Multiobjective Programming -- Research Methodology -- Preemptive Optimization -- Data Gathering -- Results and Findings -- Conclusion and Future Work -- References -- Challenges in Cloud Environment -- System Quality Attributes -- Portability -- Recoverability -- Maintainability -- Transparency and Control -- Security -- OS Support -- RHEL Migration on AWS Cloud - An Experience -- Amazon as-is Architecture -- Migration from DevPay to Hourly on Demand -- Infrastructure as Code -- Recommendations -- Manageability -- Configurability -- Maintainability -- Portability -- Conclusion -- Challenges on Amazon Cloud in Load Balancing, Performance Testing and Upgrading -- Hosting a Web Application on Cloud -- Issues with Traditional Infrastructure -- Typical Web Application Topology -- Web Application on AWS -- Components Used -- Learning and Recommendations -- Load Balancers -- Auto Discovery of EC2 Nodes -- Performance Testing Environment -- Application Setup -- Load Generation Strategy -- Measurable Parameters -- Test Results -- Observations -- Recommendation -- Learning -- Conclusion -- A Rule-Based Approach for Effective Resource Provisioning in Hybrid Cloud Environment -- Introduction -- Objectives -- Resource Manager -- Related Work. , Rule Based Resource Manager -- Experimental Evaluation -- Conclusion -- References -- Browser Based IDE to Code in the Cloud -- Introduction -- Cloud Computing -- Integrated Development Environment -- Browser Based Integrated Development Environment -- Real Time Collaboration -- Forums -- Technical Blogs -- Existing Browser Based Coding Environment -- Cloud9 IDE -- CodeRun Studio [7] -- Eclipse Orion [8] -- Ideone -- eXo Cloud IDE -- Proposed System -- Design -- Real Time Collaboration -- Integrated Forum -- Technical Blogs -- Conclusion -- Zero Knowledge Password Authentication Protocol -- Introduction -- Motivation -- Contribution -- Organization of Paper -- Notations and Definitions -- Notations -- Definitions -- Relevance to Prior Work -- Cryptographic Primitives -- The Proposed Security Protocol : Zero Knowledge Password Authentication Protocol (ZK-PAP) -- ZK-PAP with PKE -- Conclusion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cloud computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (676 pages)
    Edition: 1st ed.
    ISBN: 9789811562020
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.153
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Internet of Things (IOT) -- An Energy-Efficient Data Routing in Weight-Balanced Tree-Based Fog Network -- 1 Introduction -- 1.1 Fog Computing -- 1.2 Tree-Based Architecture -- 1.3 Data Routing -- 1.4 Green Computing -- 2 Related Works -- 3 Proposed Architecture Towards Fog Networks -- 4 Discussions -- 5 Conclusions and Future Work -- References -- A Systematic Overview of Fault Tolerance in Cloud Computing -- 1 Introduction -- 2 Basic Components of Cloud Computing -- 3 Characteristics of Cloud Computing -- 4 Cloud Deployment Models -- 5 Cloud Service Models -- 6 Fault Tolerance -- 7 Fault Tolerance in Cloud Computing -- 7.1 Fault Tolerance Approaches -- 7.2 Fault Tolerance Parameters -- 8 Conclusion -- References -- An EPIC Mechanism for Advertising the Tourist Spots in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 System Model and Problem Formulation -- 4 Tourist Spots Advertisement Problem: Posted Price Mechanism -- 4.1 Outline of PPM-TSAP -- 4.2 Detailing of PPM-TSAP -- 4.3 Illustrative Example -- 4.4 Running Time of PPM-TSAP -- 5 Conclusion and Future Work -- References -- Data Analysis and Prediction of Terror Component Using Web Services -- 1 Introduction -- 2 Background -- 2.1 Intrusion Detection System (IDS) -- 2.2 Vector Space Model -- 2.3 Receiver Operator Characteristic (ROC) Curve -- 3 Content-Based Detection of Terror-Related Activity -- 3.1 Detection Environment -- 4 Detection of Typical Terrorist Behavior -- 5 Experimental Settings -- 5.1 Evaluation Measure -- 6 Result Summarization -- 7 Deployment Issues -- 8 Conclusion -- References -- Facial Expression Recognition System (FERS): A Survey -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Discussion and Comparison of Results -- 5 Conclusion -- References. , Load Balancing of Tasks in Cloud Computing Using Fault-Tolerant Honey Bee Foraging Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Load Balancing in Cloud Computing -- 2.2 Fault Tolerance in Cloud Computing -- 2.3 Honey Bee Behaviour Inspired Load Balancing -- 2.4 Motivation -- 3 Proposed Work and Implementation -- 4 Conclusion and Future Work -- References -- Flip Learning: A Novel IoT-Based Learning Initiative -- 1 Introduction -- 2 Related Works -- 3 Level-Based Approach -- 3.1 Collaborative Learning Within the Campus -- 3.2 Middle Product -- 3.3 Customized Learning Out of the Campus -- 4 Technical Aspects -- 4.1 Mix of IoT and Cloud -- 4.2 Information Management Framework -- 4.3 Content Delivery Network -- 4.4 Use of AI -- 4.5 Virtual and Augmented Reality -- 4.6 Data Security in Network -- 5 Conclusion -- References -- Improvement of Load Balancing in Shared-Memory Multiprocessor Systems -- 1 Introduction -- 2 Overview on Prior Algorithms and Techniques -- 2.1 Static Scheduling -- 2.2 Dynamic Scheduling -- 3 Result and Discussion -- 3.1 The Mandelbrot Set [3] -- 4 Conclusion -- References -- Building Amazon Web Services Infrastructure from the Scratch for an Organization -- 1 Introduction -- 2 Proposed Work and Implementation -- 3 Conclusion and Future Work -- References -- Fault Detection for VANET Using Vehicular Cloud -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Simulation Result and Discussion -- 5 Conclusion and Future Scope -- References -- An Approach to Cohort Selection in Cloud for Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of the Proposed Approach -- 4 Cohort Selection Mechanism -- 4.1 Feature Extraction -- 4.2 Finding of Match Score -- 5 Database and Results -- 6 Conclusion -- References. , Internet of Things (IoT) Framework Deployment Template for Cloud-Based Harbor Surveillance and Ferry Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Model Building -- 3.1 Data Set and Test -- 4 Discussions -- 5 Conclusion -- References -- Art of Style Transfer Using Convolutional Neural Network: A Deep Learning Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Used -- 2.2 Model for Image Classification -- 2.3 Convolutional Neural Network Training Process for Style Transfer -- 3 Experimental Results -- 3.1 Experimental Steps -- 4 Conclusion and Findings -- References -- Impact of Internet of Things (IoT) on 5G -- 1 Introduction -- 2 IoT Challenges -- 3 5G Challenges -- 4 5G Characteristics and Their Values/Applications -- 4.1 5G on IoT: A Single Network for Millions of Applications -- 4.2 The Importance of 5G on the IoT -- 4.3 Application of 5G Over IoT -- 5 The Impact of 5G on IoT -- 5.1 Establishing a 5G-IoT Ecosystem -- 5.2 Future of IoT -- 5.3 Aspects of IoT on Updated 5G Technologies -- 6 Conclusion -- References -- Prediction of Exchange Rate in a Cloud Computing Environment Using Machine Learning Tools -- 1 Introduction -- 2 Machine Learning Techniques Used for Prediction Modeling Data -- 2.1 Linear Regression -- 2.2 Regression Trees -- 2.3 Decision Tree Regression -- 2.4 Boosted Trees Regression -- 2.5 Random Forest Regression -- 2.6 Neural Network Regression -- 2.7 Cloud Computing Tools -- 3 Experimental Works -- 3.1 Data set Analysis -- 3.2 Result Analysis -- 4 Conclusion -- References -- Survey on Stock Price Forecasting Using Regression Analysis -- 1 Introduction -- 2 Literature Review -- 3 Regression -- 4 Regression Methodologies -- 4.1 Linear Regression -- 4.2 Polynomial Regression -- 4.3 Logistic Regression -- 4.4 Ridge Regression -- 4.5 Stepwise Regression -- 4.6 LASSO Regression. , 4.7 Elastic Net Regression -- 5 Conclusions -- References -- Intrusion Detection and Classification Using Decision Tree-Based Feature Selection Classifiers -- 1 Introduction -- 2 Intrusion Detection System -- 3 Data Mining-Based Approach -- 3.1 Decision Tree -- 3.2 Feature Selection -- 4 Dataset Used -- 5 Result Analysis -- 6 Conclusion -- References -- Role of Cloud Computing for Big Data: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Model -- 2.2 Cloud Deployment Model -- 2.3 Challenges and Issues of Cloud Computing -- 3 Big Data -- 3.1 Technologies Supported by Big Data -- 3.2 Challenges in Big Data -- 4 Conclusion -- References -- Role of Cloud Computing in Geotechnical Engineering -- 1 Introduction -- 2 Direct Role of Cloud Computing in Geotechnical Engineering -- 2.1 State-of-the-Art Cloud Computing -- 2.2 State of the Art Approaches for Geotechnical Cloud Computing -- 3 Cloud Computing and Parameter Identification Integrated in System Identification -- 3.1 System Identification -- 3.2 Component of SI -- 4 Inverse Analysis and Parameter Identification Supported by Cloud Computing -- 4.1 General Formulation of Parameter Identification Process -- 4.2 Inverse Analysis and Parameter Identification -- 5 Research Scope and Challenges -- 6 Conclusion -- References -- Energy-Efficient Clustering with Rotational Supporter in WSN -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Step 1-Clustering of Nodes -- 3.2 Step 2-Selection of CH -- 3.3 Step 3-Selection of NCH -- 3.4 Step 4-Selection of SCH -- 4 Simulation -- 5 Conclusion -- References -- A Review on Mobile Cloud Computing -- 1 Introduction -- 2 Need of MCC -- 3 Architecture -- 4 Background -- 4.1 Service Miniatures of MCC -- 4.2 Deployment Miniatures of MCC -- 5 Features of Mobile Cloud and Its Computing -- 5.1 Scalability -- 5.2 Mobility. , 5.3 Mobile Cyber Security with Privacy -- 5.4 Enhancing Reliability with Mobile Computing -- 5.5 Reduced Cost -- 5.6 Multiple Occupancy -- 5.7 Imbalance Web Transmission -- 6 Why Mobile Cloud Computing? -- 7 Issues in MCC -- 7.1 Scarcity of Mobile Appliances -- 7.2 Safety and Seclusion -- 7.3 Short Data Transferral Rate (Bandwidth) -- 7.4 Offloading -- 7.5 Quality of Communication and Broadcasting -- 8 Conclusion -- References -- Corroborating the Veracity of Body Fat Percentage and Classification of Sarcopenia Using Island Differential Evolution Algorithm -- 1 Introduction -- 2 Methodology -- 3 Optimization of the Formula and Techniques Used -- 4 Regression and Genetic Algorithm -- 5 Residuals and Goodness-of-Fit -- 6 Identification and Classification of Sarcopenia -- 7 Island Differential Evolution Algorithm -- 8 Results Obtained -- 9 Conclusion -- References -- Design of Compact Super-Wideband Monopole Antenna for Spectrum Sensing Applications -- 1 Introduction -- 2 Antenna Configuration -- 2.1 SWB QSCA -- 2.2 QSCA with Notch Bands -- 3 Results Discussion -- 4 Conclusion -- References -- Probabilistic and Distance-Aware Clustering Approach to Decrease the Effect of Hot Spot in WSN -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 WSN Challenges -- 1.3 Energy Efficiency -- 1.4 Clustering -- 1.5 LEACH -- 2 Distance Effect -- 2.1 Hot-Spot Effect -- 2.2 Residual-Energy-Based Clustering -- 3 Related Work -- 4 Proposed Protocol -- 5 Results -- 6 Conclusion -- References -- A Real-Time Sentiments Analysis System Using Twitter Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Tweepy Stream Listener -- 3.2 Preprocessing -- 3.3 Sentimental Analysis -- 3.4 Representation -- 3.5 Tweet Storage -- 4 Case Studies -- 4.1 Qualifying 3-Spanish Grand Prix 2019 -- 4.2 Indian Election Results-2019 -- 5 Conclusion and Future Scope. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (585 pages)
    Edition: 1st ed.
    ISBN: 9789811697357
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.285
    DDC: 006.3
    Language: English
    Note: Intro -- ICAIT-2021 Organization -- Preface -- Contents -- About the Editors -- Part I Invited Papers -- 1 Utilization of the Open-Source Arduino Platform to Control Based on Logic Eτ -- 1.1 Introduction -- 1.2 Theoretical Reference -- 1.2.1 Irrigation System -- 1.2.2 Irrigation Methods and Systems -- 1.2.3 Localized Irrigation -- 1.2.4 Paraconsistent Logic -- 1.2.5 Paraconsistent Annotated Evidential Logic Eτ -- 1.2.6 Para-Analyser Algorithm -- 1.2.7 Arduino -- 1.3 Methodology -- 1.4 Results -- 1.5 Conclusion -- References -- 2 Ontology Implementation of OPC UA and AutomationML: A Review -- 2.1 Introduction -- 2.2 Research Method -- 2.3 Results Analysis -- 2.4 Discussions -- 2.5 Conclusions -- References -- Part II Regular Papers -- 3 Airport Cab Scheduling Model Based on Queuing Theory -- 3.1 Problem Restatement -- 3.1.1 Problem Background -- 3.1.2 Problem Requirements -- 3.2 Model Assumptions -- 3.3 Symbol Description -- 3.4 Problem Analysis -- 3.4.1 Problem One Analysis -- 3.4.2 Problem Two Analysis -- 3.4.3 Problem Three Analysis -- 3.4.4 Problem Four Analysis -- 3.5 Model Building and Solving -- 3.5.1 Give the Taxi Driver's Decision Model in the Two Choices of A and B -- 3.5.2 Analyze the Rationality of the Model Through the Relevant Data of a Domestic Airport and Its City Taxi -- 3.5.3 How to Set the "Boarding Point" to Maximize the Efficiency of the Ride -- 3.5.4 A Theoretical Analysis of the Scale of "Boarding Points" and Lane Sides -- 3.5.5 According to the Difference in the Mileage of Different Taxis, Develop a "Priority" Arrangement Plan to Maximize Time and Revenue -- References -- 4 Machine Reading Comprehension Model Based on Multi-head Attention Mechanism -- 4.1 Introduction -- 4.2 Related Work -- 4.2.1 DuReader Dataset -- 4.2.2 DuReader Baseline Model -- 4.2.3 Multi-headed Attention Mechanism -- 4.3 Multi-head Attention Mechanism. , 4.3.1 Multi-head Attention Presidential Structure -- 4.3.2 Scaled Dot-Product Attention -- 4.4 Model Structure -- 4.4.1 Task Definition -- 4.4.2 Embedded Layer -- 4.4.3 Coding Layer -- 4.4.4 Matching Layer -- 4.4.5 Modeling Layer -- 4.4.6 Output Layer -- 4.5 Experiments and Results -- 4.5.1 Evaluation Criteria -- 4.5.2 Dataset -- 4.5.3 Experiments and Results -- 4.6 Conclusion -- References -- 5 Design of Military Physical Fitness Evaluation System Based on Big Data Clustering Algorithm -- 5.1 Introduction -- 5.2 Hardware Unit Design of Military Physical Fitness Evaluation System -- 5.3 Software Module Design of Military Physical Fitness Evaluation System -- 5.3.1 Construction Module of Military Physical Fitness Evaluation Index System -- 5.3.2 Application Module of Big Data Clustering Algorithm -- 5.3.3 Database Building Module -- 5.4 Experiment and Result Analysis -- 5.4.1 Construction of Experimental Environment -- 5.4.2 Experimental Data Analysis -- 5.4.3 Acquisition of Experimental Results -- 5.5 Conclusion -- References -- 6 ResNet-Based Multiscale U-Net for Human Parsing -- 6.1 Introduction -- 6.2 Related Work -- 6.3 Our Proposed Method -- 6.3.1 Encoder -- 6.3.2 Decoder -- 6.3.3 Multiscale Feature Fusion -- 6.4 Experiments -- 6.4.1 Datasets -- 6.4.2 Evaluation Metrics -- 6.4.3 Results -- 6.5 Conclusion -- References -- 7 Short-Term Electricity Price Forecast Based on SSA-SVM Model -- 7.1 The Introduction -- 7.2 SSA -- 7.3 SVM -- 7.4 The SSA-SVM Model -- 7.5 Example Analysis -- 7.5.1 Data Processing -- 7.5.2 Data Normalization -- 7.5.3 Evaluation Indicators -- 7.5.4 Analysis of Prediction Results -- 7.6 Conclusion -- References -- 8 Research on Mobile Advertising Click-Through Rate Estimation Based on Neural Network -- 8.1 Pricing and Placement of Advertisements -- 8.2 The AUC Indicators. , 8.3 Estimating Click-Through Rates of Mobile Ads Based on Neural Networks -- 8.3.1 Model -- 8.3.2 Objective Function and Algorithm -- 8.3.3 Key Points of Optimization -- 8.3.4 Result Analysis -- 8.4 Conclusion -- References -- 9 Research on Macroeconomic Prediction Technology Based on Wavelet Neural Network -- 9.1 Prediction Technology -- 9.2 Optimized Wavelet Neural Network Model -- 9.3 Case Study -- 9.3.1 Specific Introduction -- 9.3.2 Training of Learning Samples -- 9.3.3 Analyze the Macroeconomic Forecast Results -- 9.4 Conclusion -- References -- 10 Design Research on Financial Risk Control Model Based on CNN -- 10.1 Risk Control Model in Unbalanced Data Environment -- 10.1.1 Features of Financial Data -- 10.1.2 Pretreatment -- 10.1.3 Risk Control Model -- 10.2 Convolutional Neural Network (CNN) is Used to Build a Financial Risk Control Model -- 10.2.1 Design Network Structure -- 10.2.2 Result Analysis -- 10.2.3 Innovative Analysis -- 10.3 Conclusion -- References -- 11 Application of Multi-objective Optimization Algorithm in Financial Market Portfolio -- 11.1 Genetic Algorithm Analysis of Multi-objective Programming -- 11.2 Analysis of Portfolio Optimization Model Based on Genetic Algorithm -- 11.2.1 Model Framework -- 11.2.2 Factor Analysis -- 11.2.3 Risk Indicators -- 11.3 Application Results -- 11.3.1 Data Processing -- 11.3.2 Optimal Solution of Investment Portfolio -- 11.3.3 Comparative Analysis -- 11.4 Conclusion -- References -- 12 Research on Success Factors of Long Rental Apartment Based on SEM-ANN -- 12.1 Introduction -- 12.2 Methods -- 12.2.1 SEM Model -- 12.2.2 ANN Model -- 12.2.3 Research Model Based on SEM-ANN -- 12.3 Result Analysis -- 12.4 Conclusion -- References -- 13 T-AGP: A Kind of Music-Researching Method Based on Data-Driven Comprehensive System of Network Analysis -- 13.1 Introduction. , 13.2 Structure and General Description -- 13.3 The Influencer Network and Influence Analysis -- 13.3.1 Influence Measures -- 13.3.2 Subnetwork Analysis -- 13.4 Similarity Measure -- 13.4.1 The Exploration of Core Features -- 13.4.2 Micro-Similarity Between Two Pieces of Music -- 13.4.3 Macro-Similarity Between Two Genres -- 13.5 Similarity and Difference Between Genres -- 13.5.1 Genre Similarity Analysis -- 13.5.2 Genre Influence Analysis -- 13.5.3 What Distinguishes a Genre -- 13.5.4 Relationships Between Genres -- 13.5.5 Genres' Changes Over Time -- 13.6 The Mechanism of Influence from Influencer to Follower in Music -- 13.7 Dynamic Analysis Over Time and Identification of Major Leaps in Music -- 13.7.1 Dynamic Analysis of the Network -- 13.7.2 Music Characteristics' Evolution Over Time -- 13.8 Cultural Influence on Music -- 13.8.1 Influence from Technology -- 13.8.2 Influence from Social and Political Revolution -- 13.9 Conclusions and Prospects -- 13.9.1 Conclusions -- 13.9.2 Weakness -- 13.9.3 Prospects -- References -- 14 Application of Improved Algorithm of BP Neural Network -- 14.1 Model Analysis of BP Neural Network -- 14.2 Improve the Algorithm -- 14.3 Specific Application -- 14.3.1 PI Parameter Tuning of Valve Positioner -- 14.3.2 Shipboard Navigation System -- 14.4 Conclusion -- References -- 15 Application of Improved Harmony Search Algorithm in Photovoltaic MPPT Under Partial Shadow Conditions -- 15.1 Introduction -- 15.2 Analysis of Output Characteristics of Photovoltaic Cells Array in Partial Shadow -- 15.3 Harmony Search (HS) Algorithm -- 15.3.1 Traditional Harmony Search Algorithm -- 15.3.2 Improvement of Traditional HS Algorithm -- 15.3.3 MPPT Control Method Based on IHS Algorithm -- 15.4 Simulation Experiment Analysis -- 15.5 Conclusion -- References -- 16 A Traditional Butterfly Optimization Algorithm MPPT Method. , 16.1 Introduction -- 16.2 Multi-peak Output Characteristics of Photovoltaic Cells Under Local Shade -- 16.2.1 Mathematical Models of Multiple Photovoltaic Cells -- 16.2.2 Multi-peak Output Characteristics -- 16.3 MPPT Flow Chart Based on BOA -- 16.4 Simulation and Result Analysis -- 16.4.1 Simulation -- 16.4.2 Result Analysis -- 16.5 The Conclusion -- 1. References -- 17 Crops Plantation Problem in Uncertain Environment -- 17.1 Introduction -- 17.1.1 Motivation -- 17.1.2 Literature Review -- 17.1.3 Proposed Approaches -- 17.2 Basic Principles -- 17.3 Uncertain Crops Plantation Problem -- 17.4 Method -- 17.5 Conclusion -- References -- 18 Simplified Full-Newton Step Method with a Kernel Function -- 18.1 Introduction -- 18.2 Preliminaries -- 18.2.1 The Central Path of the Perturbed Problems -- 18.2.2 Search Directions -- 18.2.3 The Iterative Process of the Algorithm -- 18.3 The Properties of Simple Function and the Proximity Function -- 18.4 Algorithm Analysis -- 18.4.1 The Feasibility Step -- 18.4.2 Upper Bounds for paralleldxfparallel -- 18.4.3 Values of θ and τ -- 18.4.4 Centering Steps -- 18.4.5 Total Number of Main Iterations -- 18.5 Conclusion -- References -- 19 Marine Ship Identification Algorithm Based on Object Detection and Fine-Grained Recognition -- 19.1 Introduction -- 19.2 Overall Process -- 19.3 Design Scheme -- 19.3.1 Construction of Data Sets -- 19.3.2 Target Detection Network -- 19.3.3 Fine-Grained Identification Network -- 19.4 Experimental Verification -- 19.5 Conclusions and Prospects -- References -- 20 Automatic Detection of Safety Helmet Based on Improved YOLO Deep Model -- 20.1 Introduction -- 20.2 YOLOv5 Network Model -- 20.2.1 Input -- 20.2.2 Backbone -- 20.2.3 Neck -- 20.2.4 Output -- 20.3 Improvements -- 20.3.1 Anchor Boxes and Detection Scale -- 20.3.2 Loss Function -- 20.4 Experimental Result and Analysis. , 20.4.1 Dataset.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computer science -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1263 pages)
    Edition: 1st ed.
    ISBN: 9788132216650
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.243
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Committee -- Contents -- 1 Image and Template Security for Palmprint -- Abstract -- 1…Introduction -- 2…Image Protection -- 2.1 Chaotic Mixing -- 2.2 Watermarking -- 3…Template Security -- 3.1 Proposed System -- 4…Conclusion -- References -- 2 Extending Network Lifetime by Time-Constrained Data Aggregation in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Model and Problem Definition -- 4…Solution and Implementation -- 5…Conclusion -- References -- 3 The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Abstract -- 1…Introduction -- 2…Fundamentals of Power System as a Graph Theoretic Model -- 3…Modeling the Topology of Power Grid as a Complex Network -- 3.1 Topological Analysis of Power Grid -- 3.1.1 Number of Links (m) -- 3.1.2 Average Nodal Degree ( \langle k \rangle ) -- 3.1.3 Ratio Parameter (r) -- 3.1.4 Pearson Coefficient ( \rho ) -- 3.1.5 Degree Distribution -- 3.1.6 Clustering Coefficient -- 3.1.7 Average Shortest Path -- 3.2 Random Graphs (ER) -- 3.3 Preferential Attachment (PA) -- 4…Experimental Results and Discussions -- 5…Conclusions -- References -- 4 Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 2.1 Efficient Coverage Area Ratio Calculation -- 2.2 Sensor and Coverage Model -- 3…Sensor Node Deployment and Coverage Area Calculation -- 3.1 Sensor Node Deployment Based on Square Pattern -- 3.1.1 Nine Sensors at the Vertices of Square -- 3.1.2 Sensor Nodes at the Center of Sixteen Circles -- 3.2 Sensor Node Deployments Based on Triangular Pattern -- 3.2.1 Sensor Deployment at the Three Vertices of a Triangle -- 3.2.2 Sensor Deployment at Vertexes of the Rhomb -- 3.2.3 Sensor Deployment at a Meeting Circle of Six Circles. , 4…Comparison and Result Analysis -- 4.1 Total Coverage Area Versus Number of Nodes -- 4.2 Net Efficient Coverage Area Ratio Versus Number of Nodes -- 5…Conclusion -- References -- 5 Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Overview of LAR, DSR, and AODV Protocols -- 4…Problem Formulation -- 4.1 Assumption -- 4.2 Intelligent Driver Model with Intersection Management -- 5…Simulation Environments and Result Analysis -- 5.1 Packet Delivery Ratio -- 6…Conclusions -- References -- 6 A Bluetooth-Based Autonomous Mining System -- Abstract -- 1…Motivation -- 2…Why a Wireless System? -- 3…Why Bluetooth? -- 4…Methodology -- 5…Flowcharts -- 6…Algorithms -- 6.1 Database Entry -- 6.2 Advance Search -- 6.3 Scanning -- 7…Results/Conclusion -- 8…Related Work -- 8.1 Tracking Systems Based on Triangulation Method -- 8.2 Tracking Systems Based on Scanning Technique -- 8.3 Epidemic Communication -- References -- 7 Transistor Representation of a Low-Power Reversible 32-Bit Comparator -- Abstract -- 1…Introduction -- 2…Reversible Logic Gates -- 3…Literature Survey -- 4…Proposed 3 x 3 Reversible Gates -- 4.1 Proposed Reversible Gate1 -- 4.2 Proposed Reversible Gate2 -- 4.3 Realization of the Classical Operations -- 5…Transistor Implementation of the Proposed Reversible Gates Using GDI Method -- 5.1 Transistor Implementation of Proposed Reversible Gate1 -- 5.2 Transistor Implementation of Proposed Reversible Gate2 -- 6…Proposed Design of 1-Bit Comparator -- 7…Realization of Proposed 4-Bit Comparator -- 7.1 Logic Diagram to Find the Greater of Two 4-Bit Numbers -- 7.2 Logic Diagram to Find the Equality of Two 4-Bit Numbers -- 7.3 Logic Diagram to Find the Smaller of Two 4-Bit Numbers -- 8…Realization of 32-Bit Comparator -- 9…Simulation Results -- 10…Conclusion. , 8 Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- Abstract -- 1…Introduction -- 2…Optimization -- 3…Proposed Model -- 4…Results -- 5…Conclusion -- References -- 9 To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Reengineering Tool: A Literature Survey -- Abstract -- 1…Introduction -- 2…Functional Requirement for Reengineering Tool -- 3…Extractor in Details -- 4…Conclusions -- References -- 10 Detection of Web-Based Attacks by Analyzing Web Server Log Files -- Abstract -- 1…Introduction and Background -- 2…Web-Based Attacks -- 3…Web Server Log Files -- 4…Problem Formulations -- 4.1 iFrame Injection Attack -- 4.2 Buffer Overflow Attack -- 5…Experimental Works and Result Analysis -- 5.1 Experimental Works -- 5.1.1 iFrame Injection Attack -- 5.1.2 Buffer Overflow Attack -- 5.2 Result Analysis -- 6…Conclusion -- References -- 11 A Survey of Energy-Aware Routing Protocols and Mechanisms for Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Energy or Power Consumption in MANETs -- 3…Energy-Aware Routing Mechanisms -- 4…Routing Protocols Based on Node Energy Status -- 5…Routing Protocols Based on Transmission Power Control -- 6…Conclusion -- References -- 12 Lexical Ontology-Based Computational Model to Find Semantic Similarity -- Abstract -- 1…Introduction -- 2…Lexical Ontology and Semantic Similarity -- 2.1 Semantic Similarity Aspects Using WordNet Lexical Ontology -- 2.2 Indo WordNet Structure -- 3…Proposed Semantic Similarity Module -- 3.1 Framework for Proposed Module -- 3.2 Proposed Algorithms -- 4…Experiments and Results -- 4.1 The Benchmark Data Set -- 4.2 Results -- 5…Conclusion and Future Work -- References -- 13 Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks -- Abstract -- 1…Introduction. , 2…Review on Cluster-Based Data Aggregation Techniques -- 3…Wireless Sensor Network Model -- 4…Radio Energy Dissipation Model -- 4.1 Two-Level Heterogeneous Networks -- 5…Objective and Scope -- 5.1 Proposed Approach -- 6…Implementation and Performance Evaluation -- 7…Results -- 8…Conclusion and Future Scope -- References -- 14 Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Abstract -- 1…Introduction -- 2…Proposed Watermarking Algorithms -- 2.1 Magic Square Procedure -- 2.2 Method 1 -- 2.3 Method 2 -- 3…Results -- 4…Conclusion -- References -- 15 Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET -- Abstract -- 1…Introduction -- 2…The Trust-Based Security Solution -- 2.1 The Environment -- 2.2 The Trust Model and the Node Evaluation Scheme -- 2.3 The Architecture -- 3…Security Analysis of the Solution -- 3.1 The Secure Routing Protocol -- 3.2 Analysis Based on Known Attacks -- 4…Discussion -- 5…Conclusion and Future Work -- References -- 16 Design of a Biometric Security System Using Support Vector Machine Classifier -- Abstract -- 1…Introduction -- 2…Feature Extraction for the Biometric System -- 2.1 ZCPA Feature Extraction for Input Speech -- 2.2 PCA Feature Extraction for Input Image -- 3…Support Vector Machine Classifier -- 4…Working of Biometric Security System -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 17 Impact of Distance Measures on the Performance of Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 3…Distance Measures -- 3.1 Euclidean Distance -- 3.2 Standardized Euclidean Distance -- 3.3 Manhattan Distance -- 3.4 Mahalanobis Distance -- 3.5 Cosine Distance -- 3.6 Correlation Distance -- 4…Experimental Results and Discussions -- 4.1 Datasets Used -- 4.2 Evaluation on Clustering Efficiency -- 5…Conclusions -- References. , 18 Gender Identification Using Gait Biometrics -- Abstract -- 1…Introduction -- 2…Methodology -- 2.1 Silhouette Extraction -- 2.1.1 Feature Extraction -- 3…Network Structure -- 3.1 Feed-Forward Back-Propagation Neural Network -- 3.2 Cascade-Forward (CF) Back-Propagation Network -- 4…Computational Analysis -- 5…Conclusion and Future Work -- References -- 19 A Survey on Business Context -- Abstract -- 1…Introduction -- 2…Context -- 3…Context Awareness -- 3.1 Sensor and Context Types -- 4…Business Context -- 4.1 Business Context Awareness -- 5…Context Modeling -- 5.1 Key Value Models -- 5.2 Markup Scheme Models -- 5.3 Graphical Models -- 5.4 Object-Oriented Models -- 5.5 Logic-Based Models -- 5.6 Ontology-Based Models -- 5.7 Guideline for Business Context Modeling -- 6…Conclusion -- Acknowledgment -- References -- 20 Enhanced Caching for Geocast Routing in Vehicular Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Work -- 3.1 Protocol Design -- 3.2 Improved Caching Technique -- 3.3 Transmission with Full Radio Transmission Range Power -- 4…Simulation Results and Performance Analysis -- 5…Conclusion and Future Work -- References -- 21 Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Trust, Activity, and Strategy -- 3.1 Evaluating Trust Level -- 3.2 Evaluating Activity Level -- 3.3 Strategy Coding -- 4…Game Model Based on Trust and Activity -- 4.1 The Game on Network -- 4.2 Payoff for Participants -- 4.3 The Fitness Function -- 5…The Tournament -- 6…Evolution of Strategy Using Genetic Algorithm -- 7…Experiments -- 8…Conclusions and Future Work -- References -- 22 Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Abstract -- 1…Introduction -- 2…Overview of Tuple Space Model. , 3…Proposed Approach of Uncoupling of Mobile Cloud Computing Services.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Cerebrovascular disease. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (188 pages)
    Edition: 1st ed.
    ISBN: 9789811314537
    Language: English
    Note: Intro -- Contents -- About the Editors -- Chapter 1: Cerebral Stroke: An Introduction -- 1.1 Introduction -- 1.2 Types of Stroke -- 1.2.1 Ischemic Stroke -- 1.2.2 Hemorrhagic Stroke -- 1.2.3 Transient Ischemic Attack -- 1.3 Stroke Pathophysiology -- 1.4 Current Treatment Option for Stroke Patients -- 1.5 Neuroprotective Agents in Preclinical and Clinical Trials -- 1.6 Stroke-Induced BBB Disruption -- 1.7 Ischemic Stroke-Induced ER Stress -- 1.8 The Emerging Role of mi-RNA in Stroke Pathophysiology -- 1.9 Neuroprotective Potential of Low-Frequency Electromagnetic Field -- 1.10 Stem Cell Therapies for Cerebral Stroke -- 1.11 Conclusion -- References -- Chapter 2: Inflammation, Oxidative Stress, and Cerebral Stroke: Basic Principles -- 2.1 Introduction -- 2.2 Inflammation -- 2.3 Inflammatory Role of Cytokines and Chemokines During Cerebral Stroke -- 2.4 Oxidative Stress -- 2.5 Treatment Strategy for Stroke -- 2.5.1 Targeting Antioxidant Enzyme as a Therapeutic Strategy for Ischemic Stroke -- 2.5.2 Regulation of Microglial Activation in Stroke -- 2.5.3 Targeting the Cholinergic Anti-inflammatory Pathway -- References -- Chapter 3: Stroke Induced Blood-Brain Barrier Disruption -- 3.1 Introduction -- 3.2 BBB Anatomy -- 3.3 BBB Junctional Complexes -- 3.3.1 Adherens Junctions (AJs) -- 3.3.2 Tight Junctions (TJs) -- 3.3.3 Gap Junctions -- 3.3.3.1 Junctional Adhesion Molecule (JAM) -- 3.3.3.2 Occludin -- 3.3.3.3 Claudins -- 3.3.4 Membrane-Associated Guanylate Kinase (MAGUK)-Like Proteins -- 3.3.5 Accessory Proteins -- 3.4 Calcium Modulation of TJ and TJ Proteins -- 3.5 Phosphorylation: A Novel Regulatory Mechanism of TJ Proteins -- 3.6 Impairment of BBB Integrity in Neuropathological Disorder -- 3.6.1 Alteration of BBB Integrity in Stroke Injury -- 3.7 Evaluation of BBB Disruption in Rodent Ischemic Stroke. , 3.8 Quantitative Evaluation of BBB in Ischemic Stroke Using Dynamic Contrast-Enhanced (DCE) MRI -- 3.9 Conclusion -- References -- Chapter 4: Ischemic Stroke-Induced Endoplasmic Reticulum Stress -- 4.1 Introduction -- 4.2 ER Stress, UPR, and Ischemia -- 4.2.1 Components of UPR in Ischemia -- 4.2.1.1 GRP78 -- 4.2.1.2 PERK -- 4.2.1.3 ATF6 -- 4.2.1.4 IRE1 -- 4.3 Chronic ER Stress, UPR, and Pro-apoptotic Signaling in IR Injury -- 4.3.1 CHOP -- 4.3.2 Caspase 12 -- 4.3.3 JNK -- 4.4 ER Stress and Autophagy in IR Injury -- 4.5 ER Stress and miRNAs in IR Injury -- 4.6 Conclusion -- References -- Chapter 5: The Role of Autophagy in Ischaemic Stroke: Friend or Foe? -- 5.1 Introduction -- 5.2 Pathophysiology of Ischaemic Stroke -- 5.3 Various Animal Models to Study IS -- 5.3.1 Intra-arterial Suture Middle Cerebral Arterial Occlusion Model -- 5.3.2 Craniotomy Model -- 5.3.3 Photothrombosis Model -- 5.3.4 Endothelin-I Model -- 5.3.5 Clot Embolic Model of Stroke -- 5.4 Autophagy and Its Machinery -- 5.5 Autophagy and Its Role in Cerebral Ischaemia -- 5.5.1 Autophagy Activation in Ischaemic Stroke Protects Neurons -- 5.5.2 Autophagy Is Also Responsible for Neuronal Death After Ischaemic Stroke -- 5.5.3 Degree of Autophagy Is Critical in Ischaemic Stroke -- 5.5.4 Autophagy Contributes to Ischaemic Tolerance After Preconditioning -- 5.5.5 Autophagy May Be Disrupted During Ischaemia -- 5.6 Concluding Remarks -- References -- Chapter 6: Critical Role of Mitochondrial Autophagy in Cerebral Stroke -- 6.1 Introduction -- 6.2 Autophagy -- 6.3 Nonselective Autophagy and Mitophagy -- 6.4 Mitochondria Dynamics: Fission and Fusion of Mitochondria -- 6.5 Molecular Mechanisms of Mitophagy -- 6.6 Mitophagy in Cerebral Ischemia -- 6.7 Effect of Cerebral Ischemia in Mitochondrial Dynamic Mediators -- 6.8 Mitophagy Regulation: An Anti-inflammation Approach in Cerebral Ischemia. , 6.9 Mitophagy Regulation: A Neuroprotective Approach in Cerebral Ischemia -- 6.10 Conclusion -- References -- Chapter 7: Application of Neuroimaging Tools in Identification of Pinpoint Location of Blockage -- 7.1 Introduction -- 7.2 Neuroimaging Modalities for Stroke Detection -- 7.3 Hardware-Based Imaging Modalities -- 7.3.1 Computed Tomography (CT) -- 7.3.2 Magnetic Resonance Imaging(MRI) -- 7.3.3 Microwave-Based Imaging(MW) -- 7.3.4 Single-Photon Emission Computed Tomography (SPECT) -- 7.3.5 Positron Emission Tomography (PET) -- 7.3.6 Cranial Ultrasound -- 7.4 Software-Based Image Processing Modalities -- 7.4.1 Image Filtering -- 7.4.2 Image Enhancement -- 7.4.3 Image Segmentation -- 7.4.4 Image Compression -- 7.5 Computer-Aided Automatic Detection -- 7.5.1 Graphical User Interface Based (GUI) -- 7.5.2 Computer-Aided Algorithm-Based Detection -- 7.6 Comparison of Neuroimaging Modalities -- 7.7 Conclusion -- References -- Chapter 8: Emerging Role of Electromagnetic Field Therapy in Stroke -- 8.1 Introduction -- 8.2 Importance of Electromagnetic Therapy -- 8.3 Physical Basis of the Generation of a Magnetic Field -- 8.3.1 Stationary Magnetic Field -- 8.3.2 Pulsed Electromagnetic Field -- 8.4 Primary Biological Effects of Magnetic Fields -- 8.4.1 Cell Proliferation and Cell Cycle Regulation -- 8.4.2 Genotoxic Effects -- 8.4.3 Effects on Cellular Membrane Permeability -- 8.5 Role of Electromagnetic Therapy in Ischemic Stroke -- 8.6 Conclusion -- Basic Terminology -- References -- Chapter 9: Stem Cell-Based Therapy for Ischemic Stroke -- 9.1 Introduction -- 9.2 Stem Cell Transplantation for Stroke -- 9.3 Neural Stem Cells -- 9.4 Embryonic Stem Cells -- 9.5 Mesenchymal Stem Cells -- 9.5.1 Bone Marrow-Derived Mesenchymal Stem Cells -- 9.5.2 Adipose Mesenchymal Stem Cells -- 9.5.3 Human Umbilical Cord Mesenchymal Stem Cells. , 9.5.4 Menstrual Blood-Derived Mesenchymal Stem Cells -- 9.6 Hematopoietic Stem Cells -- 9.7 Inducible Pluripotent Stem Cells -- 9.7.1 Reprogramming Methods for Human Somatic Cells into iPSCs -- 9.8 Preconditioning Strategy in Stem Cell Transplantation Therapy -- 9.9 Conclusion -- References -- Chapter 10: Emerging Role of microRNAs in Cerebral Stroke Pathophysiology -- 10.1 Introduction -- 10.2 MicroRNA Biogenesis -- 10.3 Current Therapy and the Possible Role of miRNA in Neuroprotection -- 10.4 Development of Therapeutic Approaches Using miRNA Mimics and Inhibitors -- 10.5 Techniques for miRNA Expression Analysis -- 10.6 Computational Target Gene Prediction -- 10.7 Experimental Approaches to miRNA Target Validation -- 10.8 miRNA as a Prognostic Biomarker in Ischemic Stroke -- 10.9 Circular RNA -- References -- Chapter 11: Therapeutic Aspects of Nanomedicines in Stroke Treatment -- 11.1 Introduction -- 11.2 Secondary Neuronal Damage After Stroke and BBB Breakdown -- 11.3 Existing Treatment of Stroke -- 11.4 Drug Delivery Through BBB During Stroke -- 11.5 NP-Based Drug Delivery -- 11.6 NP-Based Chemical Agents -- 11.7 A Hope: NPs as a Diagnostic Tool in Stroke -- 11.8 Composition of Nanocarrier Used in Stroke Therapy -- 11.9 Lipid Nanoparticles -- 11.10 Polymer Carriers -- 11.10.1 Inorganic-Based Nanocarriers -- 11.11 Nanocarriers-Based Thrombolytic Therapy: Preclinical Development -- 11.12 Streptokinase -- 11.13 Nanocarriers Loaded with SK -- 11.14 Urokinase (UK) -- 11.15 Urokinase-Loaded Nanocarriers -- 11.16 Tissue Plasminogen Recombinant (tPA, rtPA) -- 11.17 rtPA-Loaded Nanocarriers -- 11.18 Conclusion -- References -- Chapter 12: Neuroprotective Potential of Small Molecule Phytochemicals in Stroke Therapy -- 12.1 Introduction -- 12.2 Role of Molecular Mediators in Apoptotic, Necrotic, and Necroptotic Neuronal Cell Death. , 12.3 Impact of Neurodegeneration in Neurological Disorders Including Stroke -- 12.4 Small Molecule Bioactive Phytochemicals as Neuroprotective Agents in Ischemic Stroke -- 12.4.1 Flavonoids -- 12.4.2 Terpenoids -- 12.4.3 Alkaloids -- 12.4.4 Withanolides -- 12.5 Conclusion -- References -- Chapter 13: Post-Stroke Treatment Strategies, Management, and Rehabilitation: Where We Stand? -- 13.1 Introduction -- 13.2 Types of Stroke -- 13.3 Treatments -- 13.3.1 In hospital -- 13.3.1.1 Thrombolysis -- 13.3.1.1.1 Intravenous Thrombolytic Therapy -- 13.3.1.1.2 Intra-arterial Thrombolysis -- 13.3.1.2 Aspirin Treatment -- 13.3.1.3 Therapeutic Hypothermia -- 13.3.1.4 Blood Pressure Management -- 13.3.1.5 Antiplatelet Strategies -- 13.3.1.6 Surgery for Cerebral Edema -- 13.3.1.7 Antithrombotic Therapy -- 13.3.2 Post-discharge -- 13.3.2.1 Lifestyle Physical Activity -- 13.3.2.1.1 Smoking -- 13.3.2.1.2 Alcohol -- 13.3.2.1.3 Diet -- 13.3.2.1.4 Physical Activity -- 13.3.2.2 Blood Glucose Management -- 13.3.2.3 Cholesterol Management -- 13.3.2.4 Blood Pressure Management -- 13.3.2.5 Anticoagulation and Antiplatelet Therapy -- 13.3.2.6 Herbal Neuroprotective Intervention -- 13.4 Limitations of Treatment -- 13.5 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Decision making-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (694 pages)
    Edition: 1st ed.
    ISBN: 9789811625022
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1391
    DDC: 327.120971
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Decision Support System -- Recommended Model of Pollution Information Based on Collaborative Filtering Algorithm -- 1 Introduction -- 2 Calculation of the Similarity of Pollution Information -- 3 Default Prediction Complement -- 4 Obtaining the Similarity Matrix Between Users -- 5 The Solution of the Model -- 6 Analysis of Model Results -- References -- Research on the Evaluation of TCM Service Level in Various Regions of China -- 1 Introduction -- 2 Data Sources and Methods -- 2.1 Data Sources -- 2.2 Methods -- 3 Results -- 3.1 Principal Component Analysis -- 3.2 Cluster Analysis -- 4 Discussion -- 4.1 Regional Disparities in TCM Service Levels -- 4.2 The Effect of Health Services is not Commensurate with the Level of Economic Development -- References -- A Method for Evaluating Health Status of Rail Transit Signaling Equipment Based on Group Decision -- 1 Introduction -- 2 Related Work -- 3 Establishing Rules for an Evaluation System -- 3.1 Defining an Evaluation Organization -- 3.2 Defining the Evaluation Scope -- 3.3 Establishing the Weight Coefficient Vector -- 3.4 Establishing Alarm Rules to Monitor Equipment Faults -- 3.5 Setting Parameters for an Equipment Type -- 4 Implementation of an Evaluation System -- 4.1 Fault Monitoring Cycle -- 4.2 Health Evaluation Cycle -- 5 Conclusion -- References -- Intelligent Decision Support System for Precision Medicine (IDSS 4 PM) -- 1 Introduction -- 2 Theoretical Foundation-Simon's Model of Decision-Making -- 3 Intelligent Decision Support Systems (IDSSs) -- 4 Precision Medicine: An Emerging Approach in Medical Decision-Making -- 5 How Technologies Are Advancing Precision Medicine? -- 5.1 Business Analytics -- 5.2 Cognitive Computing -- 6 Theory Practice and Discussion -- 7 Characteristics of IDSS 4 PM -- 8 Conclusion. , References -- A Study of Result-Oriented Performance Appraisal-Taking Huawei as an Example -- 1 Introduction -- 2 Increasing Flexibility of Bonus Package -- 2.1 Reducing Long-Term Returns and Increasing Short-Term Returns -- 2.2 Widening the Gap and Clarifying the Hierarchy -- 2.3 Awarding the Current Contribution Immediately -- 3 Abandoning the Cumbersome Human Resource Assessment -- 3.1 Assessment by Objectives -- 3.2 Avoiding Establishing KPI Indicators in Isolation for Each Department -- 4 Taking the Responsibility and Result-Oriented Method -- 4.1 Good Performance and Good Return -- 4.2 Combination of Performance Evaluation and Reverse Evaluation -- 4.3 Eliminating Pretending Hard-Working -- 5 The Conclusion -- References -- Under a Management Perspective: Analysis of the Relationship Between Trust and Behavior Decision-Making -- 1 Introduction -- 2 Data and Measurement -- 2.1 Data Sources -- 2.2 Variable Description and Reliability Validity Test -- 3 Data Analysis and Discussion -- 3.1 The Difference of Public Trust Under Different Demographic Variables -- 3.2 The Differences in the Ways of Public Behavior Decision-Making Under Different Demographic Variables -- 3.3 The Relationship Between Trust and Behavior Decision-Making -- 4 Conclusion -- References -- Research on the Regulation of Industrial Structure in the Mid-Southern Liaoning Urban Agglomeration from the Perspective of Spatial Connection -- 1 Introduction -- 2 Research Area and Data Sources -- 2.1 Overview of the Study Area -- 2.2 Data Sources -- 3 Research Method -- 3.1 Spatial Shift-Share Model -- 3.2 Determination and Improvement of Spatial Weight -- 4 Result Analysis -- 4.1 Analysis of the Temporal and Spatial Pattern of Urban Spatial Interaction -- 4.2 Analysis of Shift Share of Industrial Structure -- 5 Conclusions -- References. , Research on the Influence Mechanism of Family-Supportive Supervisor Behaviors on Employees' Intention to Stay from the Perspective of Dual Scenario Embeddedness -- 1 Introduction -- 2 Theoretical Basis and Research Hypothesis -- 2.1 FSSB and Employees' Intention to Stay -- 2.2 The Mediating Role of Dual Scenario Embeddedness -- 2.3 The Moderating Role of Employees' Gratitude as a Trait -- 3 Study Design -- 3.1 Participants and Survey Methods -- 3.2 Variable Measurement -- 4 Research Results -- 4.1 Descriptive Statistical Analysis -- 4.2 Discrimination Validity Analysis and Common Method Test -- 4.3 Hypothesis Testing -- 5 Conclusion -- 5.1 Theoretical Contribution -- 5.2 Management Implications -- 5.3 Research Limitations and Prospects -- References -- Policy Burden, Industry Competition, and Corporate Risk-Taking -- 1 Introduction -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 Policy Burden and Corporate Risk-Taking -- 2.2 The Regulating Effect of Industry Competition -- 3 Research Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Selection and Model Design -- 4 Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Analysis of Regression Results -- 5 Endogenous Control and Robustness Test -- 5.1 Endogenous Problems -- 5.2 Robustness Analysis -- 6 Research Conclusions -- References -- Blended Teaching Mode of Tourism English Based on TPACK -- 1 Introduction -- 2 TPACK Theory -- 3 ESP and Tourism English -- 4 Research Design -- 4.1 Design Concept -- 4.2 Problem Design -- 4.3 Subjects and Teaching Contents -- 4.4 Research Steps -- 5 Experimental Conclusion -- References -- Technology and Innovation Management -- Research on Privacy Protection of Internet of Things Search Data Based on Fine-Grained Authorization -- 1 Introduction -- 2 Background Knowledge -- 2.1 Secret Search -- 2.2 Attribute-Based Encryption Scheme. , 3 System Program -- 3.1 System Architecture -- 3.2 Program Process -- 4 Safety and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Concluding Remarks -- References -- Design of Emergency Rescue Deduction System for Bus Fire Accident Based on Virtual Reality -- 1 Introduction -- 2 The Functional Requirements of Deducing System -- 3 The Design of Deduce System Architecture -- 4 Function Design of Deducing System -- 4.1 Scene Editing Module -- 4.2 Deduce Management Module -- 4.3 Client Operation Module -- 5 Composition of the Deduction System -- 6 Conclusion -- References -- Application of Game Theory in the Field of Technology Innovation -- 1 Introduction -- 2 The Application of Oligopoly Model in Technological Innovations -- 2.1 The Development of Cournot Model in Technological Innovations -- 2.2 Application and Development of Stackelberg in Technological Innovations -- 2.3 Application of Option Game Oligopoly Model in Technology Innovations -- 3 Research on Evolutionary Game Model in Technological Innovations -- 3.1 The Application of Evolutionary Game in Technological Innovations -- 3.2 The Development of Evolutionary Game Model in Technological Innovations -- 4 The Development Direction of Game Theory in Technological Innovations -- References -- Research on Innovation Mechanism of Corporate Volunteering in China -- 1 Introduction -- 2 The Concept and Connotation of Corporate Volunteering -- 3 The Status Quo of Volunteering in Chinese Enterprises -- 3.1 The Integration of Business Objectives Is Important for the Business Development Plan -- 3.2 Win the Sense of Belonging of Employees and the Identity of External Customers -- 3.3 Corporate Public Services Take from Society and Use for Society -- 3.4 Volunteering of Different Enterprises Vary Greatly -- 3.5 Long-Term Development of Volunteering Projects. , 3.6 Undertaking Government Public Service -- 4 Problems in the Development of Enterprise Volunteering in China -- 4.1 Insufficient Government Guidance -- 4.2 Information Guidance is not Strong -- 4.3 Lack of Corporate Volunteering Standards -- 4.4 Imbalance Between Long-Term and Short-Term Benefits -- 5 Development Trend of Corporate Volunteering -- 5.1 Internetization of Corporate Volunteering -- 5.2 Normalization of Corporate Volunteering -- 5.3 Diversification of Corporate Volunteering -- 5.4 Establish Self-organization of Corporate Volunteers -- 5.5 Corporate Volunteering Are Becoming More Standardized and Strict -- 6 Innovation of Corporate Volunteering Mechanism -- 6.1 Building Communication Network and Innovating Corporate Volunteering Mechanism -- 6.2 Taxation Policy -- 6.3 Expense Subsidies -- 6.4 Performance Evaluation -- 6.5 Establish a Sound Education and Training Mechanism -- 6.6 Establish a Sound Guarantee Mechanism to Protect the Volunteering of Enterprises -- References -- Research on the Differential Incentive Effect of Patent Pool on Specific Technology Learning -- 1 Research Background -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 The Impact of Patent Pool Formation on Specific Technology Learning -- 3 Research Design -- 3.1 Data and Samples -- 3.2 Variables and Their Measurement -- 4 Empirical Results and Analysis -- 4.1 Descriptive Statistical Analysis -- 4.2 Hypothesis Testing -- 5 Conclusion and Inspiration -- 5.1 Research Conclusion -- 5.2 Management Suggestions -- References -- Research on Present Situation and the Countermeasure Analysis of Football Training in University -- 1 Introduction -- 2 The Present Situation of Campus Football Training in China -- 3 Problems in the Development of Campus Football Activities in China -- 3.1 Students' Poor Awareness for Football Activities. , 3.2 Unreasonable Arrangement of Football Activities.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Mechatronics--Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (582 pages)
    Edition: 1st ed.
    ISBN: 9783319709901
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.691
    DDC: 621
    Language: English
    Note: Intro -- Preface -- Conference Organizing Committee -- Acknowledgement -- Contents -- Mechatronics -- Research on the Application of Beidou System in Aviation Ammunition Support -- Abstract -- 1 Introduction -- 2 Beidou Navigation and Positioning System Structure -- 3 Beidou Positioning Principle -- 4 Beidou System Application Solution -- 4.1 Security Command Center + Beidou User Machine (Including the Beidou Mobile Command Users and Bei ... -- 4.2 Mobile Command User + Beidou Basic User -- References -- Research on the Aviation Ammunition Support Technology of American Air Force -- Abstract -- 1 Introduction -- 2 The Present Situation of American Aviation Ammunition Support Technology -- 3 GPS Application -- 4 RFID Application Plan of U.S -- References -- The Assembly Redesign of Cage Rotor Separator -- Abstract -- 1 Preface -- 2 Three-Dimensional Design and Assembly Design Analysis of Cage Rotor Separator -- 3 Redevelopment of Fan Blades and Auxiliary Fan Blades of Cage Type Rotor -- 4 Application as an Example, Production and Evaluation -- 5 Application as an Example, Production and Evaluation -- 6 Conclusions and Improvements -- References -- Design and Analysis of Double-Arc Tooth Profile Harmonic Drive -- Abstract -- 1 Introduction -- 2 Design and Modeling of Double-Arc Tooth Profile HD -- 2.1 Design of Flexspline Tooth Profile -- 2.2 Conjugating Profile of Circular Spline (CS) -- 3 Theoretical Analysis of Deformation and Contact Force -- 3.1 Theoretical Analysis of Deformation of the Neutral Layer Line -- 3.2 Theoretical Distribution of Contact Force -- 4 Simulation and Analysis of Double-Arc HD with FEM -- 4.1 Simulation of the Assembling and Meshing -- 4.2 Deformation and Stress Analysis -- 4.3 Analysis of Contact Force Distribution and FS Cup Torsion -- 5 Conclusion -- Acknowledgements -- References. , Second Order Difference Aided CRC Check Stopping Criterion for Turbo Decoding -- Abstract -- 1 Introduction -- 2 Second Order Difference Aided CRC Check Stopping Criterion -- 3 Simulation Results and System Complexity Analysis -- 4 Conclusion -- References -- Comparative Study on Energy Efficiency Evaluation Methods of Variable Frequency Motor System -- Abstract -- 1 Introduction -- 2 Introduction to Common Methods for Energy Efficiency Evaluation of Motor Systems -- 2.1 Nameplate Method -- 2.2 Slip Method -- 2.3 Current Method -- 2.4 Equivalent Circuit Method -- 3 The Evaluation Energy Consumption of Variable Frequency Motor System Based on Loss Analysis -- 4 Comparison and Verification of Different Energy Efficiency Evaluation Methods for 37 kw Variable F ... -- 4.1 Comparison of Measured and Evaluated Results Under 37 KW Frequency -- 4.2 Comparison of Experimental Results -- 5 Conclusion -- References -- Integrated Optimal Speed Change Law of Hydro-Mechanical Continuously Variable Transmission Tractor -- Abstract -- 1 Introduction -- 2 Productivity-Economy Integrated Optimal Evaluation Index -- 3 The HMCVT Speed Change Law -- 4 Optimization Calculation of the Optimal Productivity-Economy -- 5 Conclusion -- Acknowledgment -- References -- Dynamic Three Parameter Range Shifting Law of the Multi-range Hydro-Mechanical CVT -- Abstract -- 1 Introduction -- 2 Analysis and Evaluation Index of Range Shifting Process -- 3 Mathematical Model of the Range Shifting Process -- 4 Dynamic Three Parameter Ranges Shifting Law -- 5 Simulation Analysis -- 6 Conclusion -- Acknowledgment -- References -- Study on Control Strategy of Microquadcopter -- Abstract -- 1 Introduction -- 2 The Controller Design of Microquadcopter -- 2.1 PID Control of Microquadcopter -- 2.2 Fuzzy Control of Microquadcopter -- 2.2.1 The Selection of Structure. , 2.2.2 The Fuzzification of System Variables -- 2.2.3 The Algorithm Design of Fuzzy Reasoning -- 2.2.4 The Defuzzification of Output Variables -- 2.3 Fuzzy PID Control of Microquadcopter -- 2.3.1 The Selection of the Structure of the Fuzzy Controller -- 2.3.2 The Fuzzification of Input and Output Variables -- 2.3.3 The Algorithm Design of Fuzzy Reasoning -- 2.3.4 The Defuzzification of Output Variables -- 3 The Analysis of Simulation Results for Microquadcopter -- 3.1 Simulation of Traditional PID Control for Microquadcopter -- 3.2 Simulation of Fuzzy Control for Microquadcopter -- 3.3 Simulation of Fuzzy PID Control for Microquadcopter -- 3.4 The Analysis of Simulation Results for Microquadcopter -- 4 Conclusions -- Acknowledgments -- References -- Research and Simulation Analysis on Dynamic Matching Characteristics of Electric Vehicle Transmissio ... -- Abstract -- 1 Introduction -- 2 Dynamic System Model and Simulation of Electric Vehicle -- 2.1 Motor Characteristics Experimental Data Processing and Modeling -- 2.2 Battery Model -- 3 Matching Model of Continuously Variable Transmission and Motor -- 3.1 Mathematical Model of Axial Clamping Force of Main and Driven Pulley -- 3.2 EMCVT Speed Ratio Control Strategy -- 4 Conclusion -- Acknowledgement -- References -- The Clutch Control Strategy of EMCVT in AC Power Generation System -- Abstract -- 1 Introduction -- 2 The Control Requirements of EMCVT Clutch in the Alternator -- 3 The Establishment of the Clutch Model -- 3.1 Dynamic Model of the Clutch -- 3.2 Control Objectives and Control Parameters -- 4 The Fuzzy Controller Design of EMCVT -- 4.1 Control Strategy of Clutch Engaging Fuzzy -- 4.2 Selection of Input and Output Variable in Fuzzy Control -- 4.3 Fuzzification of the Input Variables -- 4.4 Establishment of the Fuzzy Control Table -- 4.5 Solve the Fuzzy Process -- 5 Experimental Research. , 6 Conclusion -- Acknowledgement -- References -- Efficient Optimization Strategy of Fuzzy Search for Asynchronous Motor Vector Control System -- Abstract -- 1 Introduction -- 2 Efficiency Optimization Principle of Asynchronous Motor -- 3 Efficiency Optimization Strategies of Fuzzy Search -- 4 Design of Fuzzy Search Controller -- 5 Simulation -- 6 Conclusion -- References -- Analysis of Anti Interference of Channel Control Measure in 2.4 GHz-Band Network -- Abstract -- 1 Introduction -- 2 Literature Survey -- 3 Channel for Three Kinds of Systems and Channel Fusion Model -- 3.1 Wi-Fi System for Modulation and Demodulation of Software Simulation -- 3.2 ZigBee System for Modulation and Demodulation of Software Simulation -- 3.3 Bluetooth System for Modulation and Demodulation of Software Simulation -- 4 Proposed Method -- 4.1 Original Model of the Channel -- 4.2 Channel Control Mechanism Model -- 4.3 Channel Conflict and Control During Parallel Output of Three Kinds of Systems -- 5 Experimental Results -- 5.1 BER of Each Kind of System with Three Users Access -- 6 Conclusion -- References -- A Curve Fitting Method for Evaluating Pilot Operation Quality -- Abstract -- 1 Introduction -- 2 Proposed Method -- 3 Conclusion -- References -- Modeling and Simulation -- Simulation Design of Improved OPTA Thinnin Algorithm -- Abstract -- 1 Introduction -- 2 The Principle of OPTA Thinning Algorithm and the Improved Algorithm Design -- 2.1 OPTA Thinning Algorithm Principle -- 2.2 Serial Parallel Hybrid Algorithm Based on OPTA -- 3 Algorithm Validation -- 3.1 Fingerprint Image Source -- 3.2 Fingerprint Image Simulation -- 4 Conclusion -- References -- Fusion Evaluation of Ammunition Based on Bayes Method -- Abstract -- 1 Introduction -- 2 Fusion Evaluation Method for Ammunition Storage Reliability -- 2.1 Fusion Evaluation Algorithm. , 2.2 Integral Approximate Calculation -- 2.3 The Example Analysis -- 3 Conclusion -- References -- Fault Diagnosis of Analog Circuits Based on Multi Classification SVDD Aliasing Region Identification -- Abstract -- 1 Introduction -- 2 MSVDD Algorithm and Its Shortcomings -- 3 MSVDD Algorithm with Heterogeneous Samples -- 3.1 NSVDD -- 3.2 Process of NMSVDD Algorithm -- 4 Case Analyses -- 5 Conclusions -- References -- A Kind of New Method to Measure Tank Capacity -- Abstract -- 1 Introduction -- 2 Questions to Solve -- 2.1 System Design -- 2.2 National Standard and Technical Index of Storage Tank Volume -- 3 Proposed Methods -- 3.1 Model Hypothesis -- 3.2 System Analysis -- 4 Analysis of Model's Reliability -- 5 Conclusion -- Acknowledgment -- References -- Design of a Compact Electrically Tunable Band-Pass Filter with Wide Tuning Range -- Abstract -- 1 Introduction -- 2 Principle of Electrically Tunable Filter -- 2.1 Analysis of Filter Model -- 2.2 Improvement of Filter Model -- 3 Modeling of Varactor Diodes -- 3.1 Varactor Diode Model -- 3.2 Simulation of Diode Model -- 4 The Results and Analysis of Filter Structure Simulation -- 5 Conclusion Hardware Circuit and Test Results -- 6 Conclusion -- References -- Research on Growth Evaluation of New OTC Market of Science and Technology Enterprises -- Abstract -- 1 Introduction -- 2 Construction of Growth Evaluation Index -- 3 Enterprise Growth Evaluation Model Based on Factor Analysis Method -- 3.1 Mathematical Model of Factor Analysis -- 3.2 Steps of Factor Analysis Method -- 4 Empirical Research -- 4.1 Suitability Testing of Samples -- 4.2 Extracting Main Factor -- 4.3 Name of Factor -- 4.4 Factor Score -- 5 Suggestions and Conclusions -- 5.1 Suggestions -- 5.2 Conclusions -- References -- A WSN Semantic Web Service Discovery Method Based on User Context -- Abstract -- 1 Introduction. , 2 Semantic Web Service Architecture.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Intelligent agents (Computer software). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (626 pages)
    Edition: 1st ed.
    ISBN: 9789811698736
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.286
    DDC: 004.6782
    Language: English
    Note: Intro -- Committees -- Chief Patron -- Patrons -- Finance Chair -- General Chair -- International Advisory Committee -- Program Chair -- Program Committee -- Organizing Chair -- Organizing Co-chair -- Conference Coordinator -- Convener -- Co-convenor -- Technical Program Committee Chairs -- Preface -- Contents -- About the Editors -- Part I Cloud Computing, Image Processing, and Software -- 1 An Intelligent Online Attendance Tracking System Through Facial Recognition Technique Using Edge Computing -- 1.1 Introduction -- 1.1.1 Motivation and Contribution -- 1.1.2 Organization of the Paper -- 1.2 Related Works -- 1.2.1 In the Year 2017 -- 1.2.2 In the Year 2018 -- 1.2.3 In the Year 2019 -- 1.2.4 In the Year 2020 -- 1.3 Significance of Edge Computing for Online Attendance Tracking System -- 1.4 Methodology -- 1.4.1 Student Registration -- 1.4.2 Faculty Registration -- 1.4.3 Image Capture -- 1.4.4 Face Detection -- 1.4.5 Extraction of Face Encodings -- 1.4.6 Face Recognition -- 1.4.7 Attendance Updation -- 1.5 Practical Implementation -- 1.6 Results and Discussion -- 1.7 Conclusion and Future Work -- References -- 2 Cloud Analytics: An Outline of Tools and Practices -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Exploring the Ideology in Cloud-Based Analytics -- 2.4 Cloud Analytics Platforms -- 2.4.1 Qlik Sense Enterprise -- 2.4.2 Tableau -- 2.4.3 IBM Watson Analytics -- 2.4.4 Microsoft Power BI -- 2.4.5 TIBCO Spotfire X -- 2.4.6 SAS Business Analytics -- 2.5 Discussions -- 2.5.1 Benefits to Cloud-Based Analytics -- 2.5.2 Overview of Emerging Trends -- 2.6 Conclusion -- References -- 3 An Enhanced Fault-Tolerant Load Balancing Process for a Distributed System -- 3.1 Introduction -- 3.2 Background -- 3.2.1 Related Work -- 3.3 Proposed Enhanced Load Balancing Scheme with Resource Failure Rate Consideration -- 3.4 Simulated Results -- 3.4.1 Results. , 3.5 Conclusion -- References -- 4 HeartFog: Fog Computing Enabled Ensemble Deep Learning Framework for Automatic Heart Disease Diagnosis -- 4.1 Introduction -- 4.2 Related Works -- 4.3 HeartFog Architecture -- 4.3.1 Technology Used -- 4.3.2 Hardware Components Used -- 4.3.3 Software Components Used -- 4.4 HeartFog Design -- 4.4.1 Dataset -- 4.4.2 Heart Patient Data Pre-processing -- 4.4.3 Ensemble DL Application -- 4.4.4 Android Interface and Communication -- 4.4.5 Experimental Set-Up -- 4.4.6 Implementation -- 4.5 Results and a Discussion -- 4.6 Conclusion and Future Scope -- References -- 5 A Cloud Native SOS Alert System Model Using Distributed Data Grid and Distributed Messaging Platform -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Preliminaries -- 5.3.1 ZooKeeper as Cluster Coordinator -- 5.3.2 Kafka as a Data Streaming Platform -- 5.3.3 Ignite as the In-Memory Data Grid -- 5.4 Proposed Architecture -- 5.5 Implementation -- 5.6 Conclusion -- References -- 6 Efficient Peer-to-Peer Content Dispersal by Spontaneously Newly Combined Fingerprints -- 6.1 Introduction -- 6.2 Literature Review -- 6.3 Proposed Work -- 6.3.1 Overview -- 6.3.2 Framework Architecture -- 6.3.3 Content Uploading and Splitting -- 6.3.4 Fingerprint Detection -- 6.3.5 Content Distribution -- 6.3.6 Anonymous Communication Protocol -- 6.3.7 Identification of Illegal Distribution -- 6.4 Experimental Results -- 6.4.1 Content Uploading and Splitting -- 6.4.2 Fingerprint Generation -- 6.4.3 Content Distribution -- 6.4.4 Identifying and Preventing Illegal Redistribution -- 6.5 Conclusion -- References -- 7 An Integrated Facemask Detection with Face Recognition and Alert System Using MobileNetV2 -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Methodology -- 7.3.1 Facemask Detection Model -- 7.3.2 The Face-Recognition Model -- 7.3.3 Database -- 7.3.4 Web Application -- 7.4 Results. , 7.5 Conclusion -- References -- 8 Test Case Generation Using Metamorphic Relationship -- 8.1 Introduction -- 8.2 Usability of Successful Test Cases -- 8.3 The Formalization and Insight of Metamorphic Testing -- 8.4 Conclusion -- References -- Part II IoT/Network -- 9 IRHMP: IoT-Based Remote Health Monitoring and Prescriber System -- 9.1 Introduction -- 9.2 Previous Work -- 9.2.1 Architecture -- 9.2.2 Communication Protocol -- 9.3 IRHMP-IoT-Based Remote Health Monitoring and Prescriber System -- 9.3.1 Architecture -- 9.3.2 Functionalities Doctor -- 9.3.3 Implementation Working -- 9.4 Conclusion -- References -- 10 On Boundary-Effects at Cellular Automata-Based Road-Traffic Model Towards Uses in Smart City -- 10.1 Introduction -- 10.2 Review of the State-of-the-Art Available Works -- 10.3 Proposed Empirical Investigation -- 10.3.1 Search for More ECA Rules Toward Uses in Road-Traffic Simulation -- 10.3.2 Investigations on ECA Dynamics Toward Road-Traffic Simulation at Various Fixed-Boundary Situations -- 10.4 Detailed Discussions -- 10.5 Conclusive Remarks -- References -- 11 An Optimized Planning Model for Management of Distributed Microgrid Systems -- 11.1 Introduction -- 11.1.1 Components of a Micro Grid -- 11.1.2 Type of Micro Grid -- 11.2 Literature Survey -- 11.3 Proposed Model -- 11.3.1 Methodology -- 11.4 Results and Discussion -- 11.4.1 For PV System -- 11.4.2 For Wind System -- 11.4.3 For Fuel Cells Power Generating Systems -- 11.5 Conclusions -- References -- 12 Hard and Soft Fault Detection Using Cloud Based VANET -- 12.1 Introduction -- 12.2 Literature Study -- 12.3 Proposed Approach -- 12.3.1 Hard Permanent Fault Detection -- 12.3.2 Soft Fault Diagnosis -- 12.3.3 Fault Status Transmission Through Vehicular Cloud -- 12.4 Simulation Experiments and Discussions -- 12.5 Conclusion -- References. , 13 A Novel Intelligent Street Light Control System Using IoT -- 13.1 Introduction -- 13.2 Related Works -- 13.3 State of Art -- 13.3.1 Node MCU -- 13.3.2 PIR Sensor -- 13.3.3 Channel Relay -- 13.3.4 LDR -- 13.4 Proposed System -- 13.5 Features of Smart Street Light System -- 13.6 Results and Discussion -- 13.7 Conclusion and Future Scope -- References -- 14 Enhancing QoS of Wireless Edge Video Distribution using Friend-Nodes -- 14.1 Introduction -- 14.2 System Model -- 14.3 Video Dissemination Architecture -- 14.4 Simulation and Results -- 14.5 Conclusion -- References -- 15 Groundwater Monitoring and Irrigation Scheduling Using WSN -- 15.1 Introduction -- 15.2 Materials and Method -- 15.2.1 System Design -- 15.2.2 Data Collection -- 15.2.3 Hardware -- 15.2.4 Software and Database -- 15.2.5 Groundwater Level Measurement and Pumping Time -- 15.2.6 Crop Water Demand -- 15.2.7 Irrigation Water Requirements -- 15.2.8 Energy Consumption -- 15.2.9 Process Flow Diagram -- 15.2.10 Dashboard -- 15.3 Results -- 15.3.1 Discharge and Recharge of Groundwater -- 15.3.2 Electricity Consumption -- 15.3.3 Crop Water Demand -- 15.4 Conclusion -- References -- 16 A Soft Coalition Algorithm for Interference Alignment Under Massive MIMO -- 16.1 Introduction -- 16.2 System Model -- 16.3 Proposed Model -- 16.4 Experiment Results -- 16.5 Conclusion -- References -- Part III Optimization and Nature Inspired Methods -- 17 Improved Grasshopper Optimization Algorithm Using Crazy Factor -- 17.1 Introduction -- 17.2 Grasshopper Optimization Algorithms -- 17.2.1 Basic Grasshopper Optimization Algorithm (GOA) -- 17.2.2 Improved GOA with Crazy Factor (Crazy-GOA) -- 17.3 Result Analysis -- 17.4 Conclusion -- References -- 18 Reliability Estimation Using Fuzzy Failure Rate -- 18.1 Introduction -- 18.2 Reliability Using Fuzzy System -- 18.3 Discussion -- 18.4 Illustration. , 18.5 Conclusion -- References -- 19 A Sine Cosine Learning Algorithm for Performance Improvement of a CPNN Based CCFD Model -- 19.1 Introduction -- 19.2 Proposed SCA-CPNN-Based CCFD Model -- 19.2.1 Evaluation Criteria -- 19.3 Experimental Result Discussion -- 19.4 Conclusion -- References -- 20 Quality Control Pipeline for Next Generation Sequencing Data Analysis -- 20.1 Introduction -- 20.2 Background and Related Work -- 20.3 Datasets -- 20.4 Methods and Material -- 20.4.1 Duplicate Removal and Trimming -- 20.4.2 NGS Dataset -- 20.4.3 NULL Value Removal -- 20.4.4 Normalization -- 20.4.5 Dimensionality Reduction -- 20.5 Result Discussion -- 20.5.1 The Differentially Expressed Genes and Outlier Detection Visualization -- 20.5.2 The Differentially Expressed Gene Selection Using Dimension Reduction -- 20.6 Conclusion and Future Work -- References -- 21 Fittest Secret Key Selection Using Genetic Algorithm in Modern Cryptosystem -- 21.1 Introduction -- 21.1.1 Background -- 21.1.2 Motivation -- 21.1.3 Contribution -- 21.2 Preliminaries -- 21.2.1 Illustration of AVK -- 21.2.2 Genetic Algorithm -- 21.3 Proposed Work -- 21.4 Experiment Examples -- 21.5 Experiment Results -- 21.6 Performance Analysis -- 21.7 Randomness Verification -- 21.8 Conclusion -- 21.9 Future Work -- References -- 22 Variable Step Size Firefly Algorithm for Automatic Data Clustering -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Variable Step Size Firefly Algorithm -- 22.4 Result Analysis -- 22.5 Conclusion -- References -- 23 GWO Based Test Sequence Generation and Prioritization -- 23.1 Introduction -- 23.1.1 Motivation -- 23.2 Basic Concept -- 23.2.1 GWO Algorithm -- 23.2.2 Adjacency Matrix -- 23.2.3 Objective Function/Fitness Function -- 23.3 Proposed Approach -- 23.3.1 Overview -- 23.3.2 Generation of Control Flow Graph -- 23.4 Implementation -- 23.4.1 Experimental Result. , 23.4.2 Prioritization.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Soft computing. ; Computer vision. ; Electronic books.
    Description / Table of Contents: Covering the latest research on soft computing techniques in the emerging field of vision science, this publication features contributions from leading experts and covers a range of topics including frequent pattern mining and 4D stereo camera systems.
    Type of Medium: Online Resource
    Pages: 1 online resource (221 pages)
    Edition: 1st ed.
    ISBN: 9783642255076
    Series Statement: Studies in Computational Intelligence Series ; v.395
    DDC: 006.37
    Language: English
    Note: Title Page -- Foreword -- Preface -- Editorial -- Contents -- Genetic Algorithm Based Fuzzy Frequent Pattern Mining from Gene Expression Data -- Introduction -- Goal of the Paper -- Proposed Model -- Paper Layout -- Related Work -- Preliminaries -- Apriori Algorithm -- FP-Growth Algorithm -- Fuzzy FP-Growth Tree -- Genetic Algorithm -- Experimental Evaluation -- Conclusion and Future Work -- References -- Prediction of Protein Tertiary Structure Using Genetic Algorithm -- Introduction -- Related Work -- Proposed Scheme -- Protein Conformation Representation -- Energy Function -- The Algorithm -- Experiments and Results -- Conclusion and Future Work -- References -- Hybrid Image Mining Methods to Classify the Abnormality in Complete Field Image Mammograms Based on Normal Regions -- Introduction -- Full-Field Mammogram Analysis -- Mammogram Database -- Enhancement Based on H Representation -- Regional Feature Extraction -- A Cascading Classifier for Identifying Normal Regions -- Full-Field Analysis Using Overlapped Regions -- Results -- Conclusion -- References -- Handwritten Script Recognition Using DCT, Gabor Filter and Wavelet Features at Line Level -- Introduction -- Method Description -- Data Collection and Preprocessing -- Feature Extraction -- Script Recognition -- Experimental Results -- Conclusion -- References -- Character Recognition Using 2D View and Support Vector Machine -- Introduction -- Character Recognition System -- Image Acquisition -- Preprocessing -- Segmentation -- Feature Extraction -- Classification and Recognition Using Support Vector Machine -- Experimental Result -- Conclusion -- References -- Automatic Localization of Pupil Using Histogram Thresholding and Region Based Mask Filter -- Introduction -- Proposed Method -- Algorithm -- Experimental Results -- Conclusion and Future Work -- References. , A Comparative Analysis on Edge Detection of Colloid Cyst: A Medical Imaging Approach -- Introduction -- Review of Previous Work -- Edge Detection Operators -- Sobel Operator -- Robert's Cross Operator -- Prewitt's Operator -- Laplacian of Gaussian -- Canny's Edge Detection Algorithm -- Performance of Edge Detection Algorithms -- Morphological Analysis -- Implementation of the Method -- Analysis-1 -- Analysis 2 -- Results -- References -- Automatic Localization and Segmentation of Left Ventricle from Short Axis Cine MR Images: An Image Driven Method -- Introduction -- Materials -- Methodology -- Automatic Cropping -- LV Segmentation -- Level Set Method -- Implementation Details -- Experimental Results -- Conclusion -- References -- Performance Analysis of Neural Network and ANFIS in Brain MR Image Classification -- Introduction -- Medical Image Classification -- Block Diagram of the System -- Transformation of Image to Data Form -- Principal Component Analysis -- Adaptive Neuro Fuzzy Inference System -- Neuro Fuzzy Model -- ANFIS Architecture -- Learning Algorithm of ANFIS -- ANFIS Classifier -- Results -- Conclusion -- References -- Hybrid Algorithm Using Fuzzy C-Means and Local Binary Patterns for Image Indexing and Retrieval -- Introduction -- Motivation -- Related Work -- Main Contribution -- Fuzzy C-Means Algorithms -- Local Binary Patterns -- Proposed System Framework (FLBP) -- Similarity Measurement -- Experimental Results and Discussions -- Database DB1 -- Database DB2 -- Conclusions -- References -- Artificial Neural Network (ANN) Based Object Recognition Using Multiple Feature Sets -- Introduction -- Some of the Relevant Works -- System Model -- Input and Pre-processing -- Feature Extraction -- Artificial Neural Network (ANN) -- Experiential Results and Discussion -- Conclusion -- References. , Protein Structure Prediction Using Multiple Artificial Neural Network Classifier -- Introduction -- Basic Biological Concept -- Necessities of PSSP -- Basics of Artificial Neural Network -- Methodology -- System Model -- Results -- Conclusions -- References -- An Intelligent Agent Based Intrusion Detection System Using Fuzzy Rough Set Based Outlier Detection -- Introduction -- Literature Survey -- Intelligent Agent Based Approach -- System Architecture -- Feature Selection Agent -- Fuzzy Rough Set Based Outlier Detection -- Fuzzy Rough Set Based Outlier Detection Algorithm -- Decision Manager -- Fuzzy Rough Set Based SVM (FRSVM) -- Results and Discussion -- Conclusion -- References -- Application of Ant Colony Algorithm for Classification and Rule Generation of Data -- Introduction -- Social Insects and Real Ant Colonies -- Ant Colony Optimization -- Ant-Miner.ACO Algorithm for Data Mining -- General Description of Ant-Miner -- Heuristic Function -- Rule Pruning -- Pheromone Updating -- Computational Results -- Dataset -- Test Setup -- Test Results -- Conclusion an Future Work -- References -- Immunised Navigational Controller for Mobile Robot Navigation -- Introduction -- Background -- The Primary and Secondary Response of the Immune System -- Antibodies -- Antibody-Antigen Binding -- Artifical Immune System for Robots -- System Architecture -- Immune Network Formulation -- Selection of Antibodies and Antigens -- Paratope and Idiotope Matrices -- Results and Discussion -- Reinforcement Learning -- Conclusion -- References -- Modified A* Algorithm for Mobile Robot Path Planning -- Introduction -- Related Works -- Proposed Approach -- Assumptions -- Algorithm of Path Planning -- Results and Discussions -- Case I: Obstacle Free Environment -- Case II: Obstacle Avoidance -- Conclusion -- References. , Artificial Immune System Based Path Planning of Mobile Robot -- Introduction -- Biological Immune System -- Concept of Immune System -- Idiotopic Network -- Path Planning Algorithm -- Defining Antibody and Antigen -- Mutual Action of Among Antibodies -- Mobile Robot Path Planning Algorithm Based on AIN -- The Proposed GA -- GA Operators -- Demonstrations -- Collision Free Movements in a Cluttered Environment -- Collision Free Movements in a Simple Environment -- Comparison between the Different Types of Fuzzy Controllers and Neuro-Fuzzy Controller -- Conclusion and Future Works -- References -- Facial Feature Extraction Using a 4D Stereo Camera System -- Introduction -- Face Acquisition -- The 4D Camera System and the Dimensional Imaging Software -- Obj File Format -- Facial Feature Extraction -- Detection of 'Tip of the Nose' -- Detection of the Point Where Nose Meets the Forehead -- Detection of Near Corners of the Two Eyes -- Results -- Future Work -- Discussion -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Mechatronics-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (892 pages)
    Edition: 1st ed.
    ISBN: 9789811502385
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1060
    DDC: 621
    Language: English
    Note: Intro -- Editorial -- Preface -- Contents -- About the Editors -- Mechatronics -- Dynamics Modeling of Active Full-Wheel Steering Vehicle Based on Simulink -- 1 Introduction -- 2 Dynamic Analysis and Modeling for Four-Wheel Steering Vehicle -- 2.1 Vehicle Coordinate System and Modeling Assumptions -- 2.2 Dynamic Differential Equations for Active Four-Wheel Steering Vehicle -- 2.3 Calculation of Normal Load of Each Wheel for 4WS Vehicle -- 2.4 Tire Model -- 3 Simulink Realization of Vehicle Dynamics Model -- 3.1 Wheel Velocity and Sideslip Angle Subsystem -- 3.2 Wheel Normal Load Subsystem -- 3.3 Tire Force Calculation Subsystem -- 3.4 Wheel Rotation Dynamics Subsystem -- 3.5 Roll Angle Calculation Subsystem -- 3.6 Body Dynamics Subsystem -- 4 Simulation Verification of Vehicle Dynamics Model -- 5 Conclusion -- References -- Modal Analysis and Dynamics Simulation of Elliptical Trainer -- 1 Introduction -- 2 Elliptical Structure and Simplification -- 3 Elliptical Trainer Simulation Analysis -- 3.1 Modal Analysis -- 3.2 Dynamics Simulation -- 4 Conclusion -- References -- Research and Design of Vehicle Simulation Subsystem of Testing Platform for CBTC System Based on Linux PowerPC -- 1 Introduction -- 2 Vehicle Simulation Subsystem -- 3 Unit Adapter -- 3.1 Hardware Platform Design -- 3.2 BSP Driver Development -- 4 Train Kinematics Simulation -- 4.1 Traction Calculation Model -- 4.2 Resistance Calculation Model -- 4.3 Braking Force Calculation Model -- 5 Implementation of Vehicle Simulation Subsystem -- 5.1 Environment Construction of Vehicle Subsystem -- 5.2 Implementation and Verification of Vehicle Subsystem -- 6 Conclusion -- References -- Analysis and Compensation of Angular Position Error in Servo Assembly -- 1 Introduction -- 1.1 Design of the High-precision Brushless Servo Assembly -- 2 Angular Position Error Analysis of the Servo Assembly. , 2.1 Analysis of Mechanical Factors Affecting Performance of Servo Assemblies -- 2.2 Shafting Error Analysis -- 3 Test Verification -- 3.1 Data Collection -- 3.2 Error Compensation Verification -- 4 Conclusion -- References -- Research on Exploratory Modeling of Combat Capability of Weapon SoS Based on Synergy -- 1 Introduction -- 2 Weapon System of Systems (SoS) -- 3 Exploratory Synergy Mechanism of Weapon SoS -- 3.1 The Characteristics of the Equipment System Synergy -- 3.2 Exploratory Synergetic Modeling of System Combat Capability -- 4 Explorative Modeling of Weapon SoS Combat Capability -- 4.1 Exploratory Construction of the Main Unit Model of the System's Combat Capability -- 4.2 Judgment Method of Relevant Relations of Operational Capability Subject Units -- 5 Conclusion -- References -- Research on Vibration Responses of Gear System with Backlash -- 1 Introduction -- 2 Mathematical Model -- 3 Numerical Simulation -- 4 Conclusion -- References -- Research on Application of CAN Bus Technology in Truck -- 1 Introduction -- 2 CAN Bus Technology Characteristics -- 3 Classification of Vehicle Networks -- 3.1 Class A Bus -- 3.2 Class B Bus -- 3.3 Class C Bus -- 4 Truck Bus Control System Network Scheme -- 5 Node Design -- 6 The Foreground and Developing Trend of Bus Technology in Automobile Network System Application -- References -- Design and Research of Calibration Method for Driving Loading Device of Single-Machine Thermal Vacuum Test System -- 1 Introduction -- 2 Overall Structure of Test System -- 3 Analysis of Calibration Principle -- 4 Design of Calibration Device for the Test System -- 4.1 Design of Support Frame -- 4.2 Installation Design of Calibration Arm -- 4.3 Design of the Loading of Weights -- 4.4 Design of Torque Calibration for Initial Position -- 4.5 Compensation Correction of Test System -- 5 Static Analysis -- 6 Conclusion. , References -- Wind Power and Hydropower Coordinated Operation Control Strategy Involving Electric Vehicles -- 1 Introduction -- 2 A Collaborative Optimal Scheduling Model for EV Charging and Wind Power and Hydropower -- 2.1 The Impact of Unordered Charging of Electric Vehicles on the Power Grid -- 2.2 Wind-EV-Hydro Control Principle -- 2.3 The Objective Function -- 2.4 The Constraint -- 2.5 Turbine Controller -- 3 The Example Analysis -- 4 Conclusions -- References -- Research on Intelligent Control System of Plate Straightening Based on Knowledge Acquisition -- 1 Introduction -- 2 Problem Solving and Analysis -- 3 Project Design of Straightening Machine Control System -- 3.1 Description and Analysis of the Method for Acquiring Shape Information -- 3.2 Analysis of Straightening Machine Intelligent Control System -- 3.3 Intelligent Control System Design -- 4 Analysis of Effect of Application of Shape Detection System -- 5 Conclusions -- References -- Numerical Simulation of Submarine Shaft-Rate Electric Field Based on COMSOL Finite Element -- 1 Introduction -- 2 Modeling of Ship in COMSOL -- 2.1 Model Simplification and Assumptions -- 2.2 Model Parameter -- 3 Simulation of Shaft-Rate Electric Field -- 3.1 Component Distribution of Electric Field -- 3.2 Electric Field Modes at Different Depths -- 4 Simulation of Different ICCP Protection Currents -- 4.1 Potential Distribution of Ship Hull Under Different ICCP Currents -- 4.2 Shaft-Rate Electric Field Under Different Cathodic Protection Currents -- 5 Conclusion -- References -- Gauss-Hermite PHD Maneuvering Multi-target Tracking Algorithm -- 1 Introduction -- 2 Probability Hypothesis Density Filter -- 2.1 Multi-target Tracking Stochastic Finite Set Theory -- 2.2 Mixed Gauss PHD -- 3 Gaussian-Hermitian PHD Algorithm Based on Interactive Multiple Models -- 3.1 Gaussian-Hermitian Filtering. , 3.2 Gaussian-Hermitian PHD Filtering Based on Interactive Multi-model -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- Research on Driving State Monitoring Based on Vehicle-Road Collaborative Wireless Positioning Technology -- 1 Introduction -- 2 The Vehicle Wireless Positioning Technology -- 3 Vehicle Wireless Positioning Principle Based on TDOA Ranging Method -- 3.1 TDOA Ranging Method -- 3.2 Vehicle Wireless Positioning Principle -- 3.3 Vehicle Motion State Monitoring Based on Vehicle-Road Coordination -- 4 Test Verification -- 5 Conclusion -- References -- Intelligent Systems -- Reliability Analysis of On-Board ATP System in Metro Based on Fuzzy Dynamic Fault Tree -- 1 Introduction -- 2 Methods and Materials -- 2.1 Analysis of Structure and Conditions of Metro ATP System -- 2.2 The Principle of Fuzzy Dynamic Fault Tree -- 2.3 Fuzzy Number Theory -- 3 Modeling and Solving of on-Board ATP System -- 3.1 Establishment of Dynamic Fault Tree Model -- 3.2 Fuzzy Calculation of Failure Rate and Maintenance Rate -- 3.3 Module Partitioning of Dynamic Fault Tree -- 3.4 Module Solution -- 3.5 Comparison and Analysis of Results -- 4 Conclusion -- References -- Image Fusion Based on Convolutional Sparse Representation with Mask Decoupling -- 1 Introduction -- 2 Convolutional BPDN Dictionary Learning with Mask Decoupling -- 3 Proposed CSRMD-Based Fusion Method -- 4 Experiments and Analysis -- 5 Conclusion -- References -- Research of the Test Algorithms of Servo System Frequency Characteristics -- 1 Introduction -- 2 Testing Sweep Signal of Servo System -- 3 Calculation of Frequency Characteristic -- 3.1 Fast Fourier Transform -- 3.2 Correlation Analysis -- 3.3 Power Spectrum Estimation -- 3.4 Least Squares Fitting -- 4 Conclusion -- References -- Utilization Factor Calculation Method Based on Adam Algorithm and Neural Network. , 1 Introduction -- 2 Model Establishment -- 2.1 Network Structure -- 2.2 Adam Optimization Algorithm -- 3 Model Training and Testing -- 3.1 Dataset -- 3.2 Model Parameters -- 3.3 Model Training and Testing -- 4 Conclusion -- References -- Demand Forecasting of Helicopter Aviation Materials Based on Multi-model Reliability Analysis -- 1 Introduction -- 2 Aviation Material Demand Forecast -- 2.1 Analysis and Forecast of High-Frequency Trouble Components -- 2.2 Analysis and Forecast of Reliability Growth Component -- 2.3 Analysis and Prediction of Basic Repairable Components -- 3 Application Example -- 3.1 Example 1 -- 3.2 Example 2 -- 4 Conclusion -- References -- A Fracture Model Established by Finite Element Simulation and Non-dominated Sorting Genetic Algorithm II for an Al Alloy -- 1 Introduction -- 2 Experiments and Methods -- 3 The Establishment of the Fracture Model -- 3.1 GTN Model -- 3.2 Determination of Model Parameters -- 4 Conclusions -- References -- Research on Fatigue-Magnetic Effect of High-Speed Train Wheelset Based on Metal Magnetic Memory -- 1 Introduction -- 2 ANSYS Fatigue Simulation and Analysis -- 2.1 Principle of Metal Magnetic Memory Detection and Fatigue Simulation Ideas -- 2.2 Boundary Conditions for Fatigue Simulation -- 2.3 Analysis Results of Fatigue Simulation -- 3 Test and Analysis -- 3.1 Acquisition of Test Data -- 3.2 Test Results and Analysis -- 4 Comparison Between Simulation and Test -- 5 Conclusions -- References -- Intelligent Manufacturing Information Security Sharing Model Based on Blockchain -- 1 Introduction -- 2 Related Works -- 3 Blockchain-Based Model for Intelligent Manufacturing -- 3.1 Architecture for Intelligent Manufacturing -- 3.2 System Model for Intelligent Manufacturing -- 3.3 Evaluation Index for Smart Manufacture -- 4 Example -- 5 Conclusion and Future Works -- References. , Research into Effects of Pearl Oyster Cultivation in Freshwater with Extensible Mind Mapping.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...