GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (872 pages)
    Edition: 1st ed.
    ISBN: 9789811625947
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1387
    Language: English
    Note: Intro -- ICICC-2021 Steering Committee Members -- Preface -- Contents -- About the Editors -- Building Virtual High-Performance Computing Clusters with Docker: An Application Study at the University of Economics Ho Chi Minh City -- 1 Introduction -- 2 Literature Review -- 3 Virtual High-Performance Computing Based on Virtual Clusters and Docker -- 4 Conclusions -- References -- Implementing Multilevel Graphical Password Authentication Scheme in Combination with One Time Password -- 1 Introduction -- 2 Related Works -- 3 Projected Scheme -- 4 Results and Usability Study -- 5 Comparative Analysis -- 6 Conclusion -- 7 Future Scope -- References -- State of Geographic Information Science (GIS), Spatial Analysis (SA) and Remote Sensing (RS) in India: A Machine Learning Perspective -- 1 Introduction -- 1.1 Status Quo in Indian Resources -- 1.2 Natural Disasters in India -- 1.3 The Role of GIS, RS, and SA Via ML Vis-à-Vis India -- 2 GIS Mappings: An Insight into Indian Studies -- 3 Geospatial Abridgement: ML Studies at a Glance -- 4 Conclusion and Future Scope -- References -- Application of Noise Reduction Techniques to Improve Speaker Verification to Multi-Speaker Text-to-Speech Input -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Encoder -- 3.2 Synthesizer -- 3.3 Vocoder -- 3.4 Database -- 4 Methodology -- 4.1 System Architecture -- 5 Implementation -- 6 Results -- 6.1 Noise Reduction Using Power -- 6.2 Noise Reduction Using Centroid Analysis (No Boost) -- 6.3 Noise Reduction Using Centroid Analysis (with Boost) -- 6.4 Noise Reduction Using Mel-Frequency Cepstral Coefficient (MFCC) Down -- 6.5 Noise Reduction Using Mel-Frequency Cepstral Coefficient (MFCC) Up -- 6.6 Noise Reduction Using Median -- 6.7 Final Result -- 7 Conclusion -- References -- Utilization of Machine Learning Algorithms for Thyroid Disease Prediction. , 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 K-Nearest Neighbor Algorithm -- 3.2 Linear Discriminant Analysis -- 3.3 Logistic Regression -- 3.4 Naïve Bayes -- 3.5 Support Vector Machine -- 4 Methodology -- 4.1 Dataset -- 4.2 Applying Algorithms -- 4.3 Accuracy -- 4.4 Cross-Validation -- 5 Results -- 5.1 Cross-Validation -- 5.2 Accuracy -- 6 Conclusion -- References -- Detection of Hepatitis C Virus Progressed Patient's Liver Condition Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Exploratory Data Analysis -- 3.4 Machine Learning for Classification -- 4 Results and Discussion -- 5 Conclusion -- References -- Energy Performance Prediction of Residential Buildings Using Nonlinear Machine Learning Technique -- 1 Introduction -- 2 Data Mining Algorithms -- 2.1 Artificial Neural Networks -- 2.2 Chi-Square Automatic Interaction Detector (CHASID) -- 2.3 Classification and Regression Tree (CART) -- 2.4 Support Vector Regression (SVR) -- 2.5 General Linear Regression (GLR) -- 3 Proposed Algorithm -- 3.1 Deep Learning -- 4 Experimental Results and Discussion -- 5 Conclusion -- References -- Cloud Image Prior: Single Image Cloud Removal -- 1 Introduction -- 2 Problem Formulation -- 3 Proposed Framework and Methodology -- 3.1 Cloud Segmentation -- 3.2 Cloud Removal -- 4 Dataset -- 5 Architecture -- 6 Training -- 6.1 Cloud Segmentation -- 6.2 Cloud Removal -- 7 Results -- 8 Conclusions -- References -- Prioritizing Python Code Smells for Efficient Refactoring Using Multi-criteria Decision-Making Approach -- 1 Introduction -- 1.1 Research Contributions -- 2 Related Studies -- 3 Research Methodology -- 4 Context Selection -- 4.1 Python Software System Selection -- 4.2 Python-Based Code Smell Selection and Detection -- 5 Experimental Setup. , 5.1 Data Pre-processing -- 5.2 Weight Estimation -- 5.3 VIKOR MCDM Techniques -- 6 Results and Discussion -- 7 Threats to Validity -- 8 Conclusion -- 9 Future Scope -- References -- Forecasting Rate of Spread of Covid-19 Using Linear Regression and LSTM -- 1 Introduction -- 2 Literature Review -- 2.1 Our Work -- 3 Methods and Models -- 3.1 Data -- 3.2 Evaluation Metrics -- 3.3 Method -- 4 Experimental Result -- 4.1 Comparing with Other Studies -- 5 Conclusion and Future Scope -- References -- Employment of New Cryptography Algorithm by the Use of Spur Gear Dimensional Formula and NATO Phonetic Alphabet -- 1 Introduction -- 2 Proposed Work -- 2.1 Key Engendering -- 2.2 Encryption -- 2.3 Decryption -- 3 Result Analysis -- 4 Conclusion -- References -- Security Framework for Enhancing Security and Privacy in Healthcare Data Using Blockchain Technology -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Performance Analysis -- 5 Conclusion -- References -- American Sign Language Identification Using Hand Trackpoint Analysis -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 3.1 Feature Extraction -- 4 Preprocessing -- 4.1 Normalization of Coordinates -- 4.2 Rounding Off -- 5 Method -- 5.1 k-Nearest Neighbours Classifier (k-NN) -- 5.2 Random Forest Classifier -- 5.3 Neural Network -- 6 Observations -- 6.1 k-NN -- 6.2 Random Forest -- 6.3 Neural Network -- 7 Results and Discussion -- 8 Conclusion and Future Work -- References -- Brain Tumor Detection Using Deep Neural Network-Based Classifier -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Faster R-CNN-Based Approach for Segmentation of Images -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Detecting Diseases in Mango Leaves Using Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Requirements. , 3.2 Preparing the Data -- 3.3 Image Manipulation -- 4 Model Design -- 4.1 Approach -- 4.2 Model Summary -- 5 Results -- 6 Conclusions and Future Scope -- References -- Recommending the Title of a Research Paper Based on Its Abstract Using Deep Learning-Based Text Summarization Approaches -- 1 Introduction -- 2 Related Work -- 3 Data Set -- 4 Methodology -- 4.1 Sequence-to-Sequence Model -- 4.2 Recurrent Neural Networks -- 5 Results -- 6 Conclusion -- References -- An Empirical Analysis of Survival Predictors for Cancer Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection and Preprocessing -- 3.2 Classification Techniques -- 4 Results and Discussion -- 5 Conclusion -- References -- Epitope Prediction for Peptide Vaccine Against Chikungunya and Dengue Virus, Using Immunoinformatics Tools -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Airflow Control and Gas Leakage Detection System -- 1 Introduction -- 2 Related Work -- 3 Hardware and Software -- 4 Implementation -- 5 Conclusion -- References -- Impact of Lightweight Machine Learning Models for Speech Emotion Recognition -- 1 Introduction -- 2 Related Work -- 3 Experimental Setup -- 3.1 Dataset -- 3.2 Architecture -- 3.3 Data Preprocessing -- 3.4 Building Audio Vectors and Feature Extraction -- 3.5 Classifiers -- 4 Score Calculation -- 5 Implementation Details -- 6 Results -- 7 Discussion and Limitation -- 8 Conclusion and Future Work -- References -- Impact of COVID-19 Pandemic on Mental Health Using Machine Learning and Artificial Intelligence -- 1 Introduction -- 2 Material and Method -- 2.1 Preprocessing of Data -- 3 Results and Discussion -- 4 Conclusion -- References -- Identification of Student Group Activities in Educational Institute Using Cognitive Analytics -- 1 Introduction -- 2 Related Work. , 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preparation -- 3.3 Algorithm -- 3.4 Correlation Matrix Plot -- 3.5 Groups Versus Individual -- 4 Results -- 4.1 Takeaways from the Inferences and Correlation Matrix -- 4.2 Takeaways from the Variance Distribution Graph -- 5 Conclusion and Future Work -- Appendix -- References -- A Machine Learning Model for Automated Classification of Sleep Stages using Polysomnography Signals -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 3.1 Experimental Data -- 3.2 Model Architecture -- 3.3 Preprocessing -- 3.4 Features Extraction -- 3.5 Feature Selection -- 3.6 Classification -- 3.7 Model Performance Evaluation -- 4 Results and Discussion -- 4.1 Using Combinations of EEG+EMG+EOG Signals -- 5 Conclusion -- References -- An Efficient Approach for Brain Tumor Detection Using Deep Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 Deep Learning -- 3.1 Convolutional Neural Network -- 3.2 Convolutional Layer -- 3.3 Pooling Layer -- 3.4 Flatten and Dense Layer -- 3.5 Strides -- 3.6 Padding -- 4 CNN Architectural Model -- 5 Data -- 5.1 Data Augmentation -- 6 Computer Vision -- 6.1 Mask R-CNN -- 7 Model Implementation -- 8 Model Output -- 9 Conclusion -- References -- Real-Time Detection of Student Engagement: Deep Learning-Based System -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 The Architecture of the Student Engagement System -- 3.2 Dataset -- 3.3 Preprocessing -- 3.4 The Architecture of Pre-training Model -- 4 Experimental Results -- 4.1 Training and Testing -- 4.2 Classifier Evaluation -- 4.3 Confusion Matrix -- 4.4 Real-Time engaged detector -- 5 Discussion -- 6 Conclusion -- References -- Bangla Handwritten Digit Recognition Based on Different Pixel Matrices -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Dataset Collection -- 4 Dataset Preparation. , 4.1 Different Pixel Image Generation.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (891 pages)
    Edition: 1st ed.
    ISBN: 9789811512865
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1087
    DDC: 4
    Language: English
    Note: Intro -- Organizing Committee -- ICICC 2019 Steering Committee Members -- ICICC 2019 Advisory Committee -- Preface -- About This Book -- Contents -- About the Editors -- Improving the Accuracy of Collaborative Filtering-Based Recommendations by Considering the Temporal Variance of Top-N Neighbors -- 1 Introduction -- 1.1 Problem Definition -- 1.2 Proposed Solution Approach -- 1.3 Advantage of the Proposed Approach -- 1.4 Contribution of This Paper -- 1.5 Organization of the Paper -- 2 Background and Related Work -- 3 Proposed Recommendation Approach -- 4 Comparative Analysis -- 5 Conclusion -- References -- Exploring the Effect of Tasks Difficulty on Usability Scores of Academic Websites Computed Using SUS -- 1 Introduction -- 2 Research Methodology -- 2.1 End-Users Details -- 2.2 Three Subsets of Tasks Considered for Usability Evaluation -- 2.3 Procedure -- 3 Experimental Results -- 3.1 Comparative Analysis -- 3.2 Correlation and Regression -- 4 Conclusions and Future Directions -- 5 Appendix -- References -- Prediction and Estimation of Dominant Factors Contributing to Lesion Malignancy Using Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Results -- 5 Conclusion -- References -- Prediction of Tuberculosis Using Supervised Learning Techniques Under Pakistani Patients -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Cleaning and Transformation -- 3.2 Environmental Setup -- 4 Results -- 5 Conclusion -- References -- Automatic Retail Invoicing and Recommendations -- 1 Introduction -- 1.1 Challenges of This Research -- 2 Related Work -- 3 Activity Recognition and Adaptation Conceptualization -- 3.1 How Indoor Environments Detect an Object's Position in Adverse GNSS Conditions? -- 3.2 What Policy Will Make Positioning Accuracy in LBS Applications?. , 3.3 How LBS-Generated Data Analysis Works (Tracking Social Media Data) -- 4 Product Recommendation as Per Body Parameters -- 4.1 Age and Height Probability Determination -- 4.2 Age and Weight Probability Assessment -- 5 Summary and Future Challenges -- References -- Modeling Open Data Usage: Decision Tree Approach -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Data Description -- 3.2 Regression Tree -- 4 Research Results -- 5 Conclusion -- References -- Technology-Driven Smart Support System for Tourist Destination Management Organizations -- 1 Introduction -- 1.1 Overtourism -- 1.2 Digital Technologies in Hospitality and Tourism -- 2 Destination Management Systems and Tools -- 3 Technology-Driven Smart Support System for DMO -- 3.1 eDestination -- 4 Šibenik Smart Destination Case -- 4.1 Scenario 1: Visitor Satisfaction Survey eDestination -- 4.2 Scenario 2: Movement Behavior -- 4.3 Scenario 3: Advanced Visualization of Overnights -- 5 Future Research -- References -- Ortho-Expert: A Fuzzy Rule-Based Medical Expert System for Diagnosing Inflammatory Diseases of the Knee -- 1 Introduction -- 1.1 Orthopaedic Diseases -- 1.2 Knee and Knee Category -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Knowledge Engineering -- 3.2 Fuzzification of Inputs and Outputs -- 3.3 Fuzzy Rule Base Model -- 3.4 Fuzzy Inference -- 3.5 Defuzzification -- 4 Graphical User Interface -- 5 Testing -- 5.1 Predictive Values -- 6 Discussion and Conclusion -- References -- GA with k-Medoid Approach for Optimal Seed Selection to Maximize Social Influence -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Dynamic Edge Strength Score -- 2.2 Generate Initial Population Using k-Medoid Algorithm -- 2.3 Optimal Seed Selection Using Genetic Algorithm -- 3 Experiments and Results -- 3.1 Evaluation Parameter -- 3.2 Analysis of Results. , 4 Conclusion and Future Work -- References -- Sentiment Analysis on Kerala Floods -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Twitter Data Set -- 3.2 Sentiment Analysis -- 4 Results and Discussion -- 4.1 Word Cloud -- 4.2 Intensity Index -- 4.3 Comparative Word Cloud -- 4.4 Comparison Study -- 5 Result Analysis -- 6 Conclusion -- References -- Recommendation System Using Community Identification -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experimental Setup -- 5 Results -- 6 Conclusion -- References -- Comparison of Deep Learning and Random Forest for Rumor Identification in Social Networks -- 1 Introduction -- 2 Related Work -- 3 Rumor Detection Algorithm -- 3.1 Data Set -- 3.2 Rumor Detection Features -- 3.3 Pre-processing -- 3.4 Random Forest Algorithm -- 3.5 Rumor Identification Algorithm -- 4 Experimental Results -- 4.1 Rumor Identification Evaluation -- 4.2 Performance Metrics -- 5 Conclusion -- References -- Ontological Approach to Analyze Traveler's Interest Towards Adventures Club -- 1 Introduction -- 2 Existing Systems -- 3 Our System -- 4 Methodology -- 5 Algorithm -- 6 Declaration Algorithm -- 7 Model Building of Personalized Recommendation Based on Ontology -- 8 Ontology Graph -- 9 Database Architecture -- 10 Prototype Interface -- 11 Results -- 12 Conclusion -- References -- Performance Analysis of Off-Line Signature Verification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Gathering Database -- 3.2 Feature Extraction -- 3.3 Classifier -- 4 Experimental Setup -- 4.1 Experiment Using Combinations of Four Features (Average Object Area, Mean, Euler No. and Area) -- 4.2 The Effect of Varying Sample Size -- 4.3 The Effect of User Dependent Model -- 5 Conclusion -- References -- Fibroid Detection in Ultrasound Uterus Images Using Image Processing -- 1 Introduction -- 2 Related Works. , 3 Methodology -- 3.1 Fibroid Image -- 3.2 Preprocessing -- 3.3 Proposed Algorithm -- 3.4 Feature Extraction -- 4 Results and Discussion -- 5 Conclusion -- References -- Progressive Generative Adversarial Binary Networks for Music Generation -- 1 Introduction -- 2 Background -- 2.1 Generative Adversarial Networks -- 2.2 Progressive Growing of GANs -- 2.3 Deterministic Binary Neurons -- 2.4 Straight-Through Estimator -- 3 Proposed Model -- 3.1 Input Data -- 3.2 Generator -- 3.3 Refiner -- 3.4 Discriminator -- 4 Analysis -- 4.1 Implementation and Training -- 4.2 Results -- 4.3 User Study -- 5 Conclusion -- References -- Machine Learning Approach for Diagnosis of Autism Spectrum Disorders -- 1 Introduction -- 2 Literature Survey -- 3 Data Acquisition and Preprocessing -- 4 Methodologies -- 4.1 Decision Tree -- 4.2 Random Forest (RF) -- 4.3 Logistic Regression -- 4.4 Support Vector Machine Classifier (SVM) -- 4.5 Gaussian Naive Bayes (GNB) -- 4.6 K-Nearest Neighbor Algorithm (KNN) -- 4.7 Perceptron Learning -- 4.8 Extreme Random Forest (ERF) -- 5 Implementation -- 5.1 Classification Model -- 5.2 Backend -- 5.3 Android Application -- 6 Result -- 7 Future Work -- 8 Conclusion -- References -- Methodologies for Epilepsy Detection: Survey and Review -- 1 Introduction -- 2 Methodologies -- 2.1 Artificial Neural Network (ANN) -- 2.2 K-Means Clustering -- 2.3 Radial Basis Function Neural Network (RBFNN) -- 2.4 Approximate Entropy (ApEn) -- 2.5 Principal Component Analysis (PCA) -- 2.6 Empirical Mode Decomposition (EMD) -- 2.7 Backpropagation Neural Network (BPNN) -- 3 Comparative Study -- 3.1 Using Wavelet Decomposition -- 3.2 Using ApEn for Evaluation -- 3.3 Using PCA Technique -- 3.4 Using Empirical Mode Decomposition -- 3.5 Using Backpropagation Neural Network -- 3.6 Using Epilepsy Spectrum Device -- 4 Results and Discussions -- 5 Conclusion -- References. , Scene Understanding Using Deep Neural Networks-Objects, Actions, and Events: A Review -- 1 Introduction -- 2 Evolution of Scene Understanding -- 2.1 Image Classification -- 2.2 Object Detection -- 2.3 Semantic Segmentation -- 2.4 Instance Segmentation -- 2.5 Event Recognition -- 3 Dataset -- 4 Conclusions -- References -- Scene Text Recognition: A Preliminary Investigation on Various Techniques and Implementation Using Deep Learning Classifiers -- 1 Introduction -- 2 Architectural Framework -- 3 Scene Text Localization and Recognition Methodologies -- 4 Table Giving the Literature Review of Papers with Dataset -- 5 Results and Discussions -- 6 Conclusions -- References -- Computer-Aided Diagnosis System for Investigation and Detection of Epilepsy Using Machine Learning Techniques -- 1 Introduction -- 1.1 Detection and Diagnosis of Epilepsy -- 2 Literature Survey -- 3 Architecture for Epilepsy Classification -- 3.1 EEG Data -- 3.2 Signal Classification -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Moments-Based Feature Vector Extraction for Iris Recognition -- 1 Introduction -- 2 Proposed Moments for Iris Recognition -- 2.1 Hu Moments -- 2.2 TChebyshev Moments -- 2.3 Coiflet Moments -- 2.4 Gabor Moments -- 2.5 Affine and Blur Invariant Moments -- 3 Experimental Results and Discussions -- 4 Conclusions -- References -- A Novel Approach to Improve Website Ranking Using Digital Marketing -- 1 Introduction -- 2 Search Engines -- 2.1 Types -- 2.2 Factors Affecting Search Engine Ranking of a Website -- 3 Net Market Share Analysis -- 4 Sem Techniques -- 5 Proposed Approach -- 6 Conclusion and Future Work -- References -- A Comparative Study on Different Skull Stripping Techniques from Brain Magnetic Resonance Imaging -- 1 Introduction -- 2 Brain MRI Skull Stripping Methodologies -- 2.1 Mathematical Morphology-Based Methods. , 2.2 Intensity Based Methods.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (599 pages)
    Edition: 1st ed.
    ISBN: 9789811503245
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1059
    DDC: 004
    Language: English
    Note: Intro -- ICICC-2019 Steering Committee Members -- General Chairs -- Honorary Chair -- Conference/Symposium Chair -- Technical Program Chairs -- Conveners -- Publicity Chairs -- Publication Chairs -- Co-conveners -- ICICC-2019 Advisory Committee -- Preface -- About This Book (Volume 2) -- Contents -- About the Editors -- Implementation of Square-Odd Scanning Technique in WBAN for Energy Conservation -- 1 Introduction -- 2 Square-Odd Scanning Algorithm -- 3 Conclusion -- 4 Future Scope -- References -- Experimental Analysis of OpenStack Effect on Host Resources Utilization -- 1 Introduction -- 2 Related Work -- 3 Experimental Design -- 3.1 Scenario 1 (S1) -- 3.2 Scenario 2 (S2) -- 4 Results and Discussion -- 4.1 Scenario 1 Results -- 4.2 Scenario 2 Results -- 5 Conclusions -- References -- Effect of Dropout and Batch Normalization in Siamese Network for Face Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Face Recognition-Via Deep Learning -- 2.2 Siamese Convolutional Network -- 2.3 Computationally Effective Methods for Face Recognition -- 2.4 Dropout -- 2.5 Batch Normalization -- 3 Outlines of Present Work -- 3.1 Data Acquisition -- 3.2 Data Preprocessing -- 3.3 Designing the Computation Graph -- 3.4 Network Optimization -- 4 Experimental Results and Analysis -- 4.1 Loss Variation with Changing Dropout Values -- 4.2 Dropout Versus Batch Normalization -- 4.3 Experiment Using Serialized Dropout and Normalization Layers -- 4.4 Comparing Normalization with Dropout After Batch Normalization -- 4.5 Deciding the Order of Batch Normalization and Activation Layer -- 5 Key Outcomes -- 6 Conclusion -- References -- A Flag-Shaped Microstrip Patch Antenna for Multiband Operation -- 1 Introduction and Literature Survey -- 2 Proposed Antenna Design -- 3 Experimental Results and Discussions -- 4 Conclusion -- References. , Design of Low-Power and High-Frequency Operational Transconductance Amplifier for Filter Applications -- 1 Introduction -- 2 Design Methodology -- 3 Computation of Parameters -- 4 OTA Applications -- 5 Conclusion -- References -- Design of Low Power Operational Amplifier for ECG Recording -- 1 Introduction -- 2 Design Methodology -- 2.1 Transistor Level Design: Folded Cascode Operational Amplifier -- 2.2 Modified Architecture Using Nulling Resistor Approach -- 3 Design Procedure for Folded Cascode and Fully Differential Op-Amp -- 3.1 Design of Folded Cascode Op-Amp -- 3.2 Design of Fully Differential Amplifier -- 4 Simulation Results -- 5 Conclusion -- References -- Evasion Attack for Fingerprint Biometric System and Countermeasure -- 1 Introduction -- 2 Summary of Literature -- 3 Proposed Methodology -- 4 Results and Inferences -- 5 Conclusion -- References -- Current-Phase Synthesis of Linear Antenna Arrays Using Particle Swarm Optimization Variants -- 1 Introduction -- 2 Problem Definition -- 2.1 Array Factor and Design Parameters of Linear Arrays -- 2.2 Definition of the Objective Function -- 3 Adopted PSO Variants and Conditions of Simulation Run -- 3.1 Conditions of Simulation Run -- 4 Simulation Run Statistics -- 4.1 Results -- 4.2 Discussions -- 5 Conclusions -- References -- Fair Channel Distribution-Based Congestion Control in Vehicular Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 4 Simulation Results -- 5 Conclusion -- References -- Comparative Study of TDMA-Based MAC Protocols in VANET: A Mirror Review -- 1 Introduction -- 1.1 VANET MAC Protocol Configuration Issues -- 1.2 Performance Metrics -- 2 Literature Survey -- 3 MAC Protocols for VANETs -- 3.1 Classification of TDMA-Based MAC Protocols -- 3.2 TDMA-Based MAC Protocols in a Fully Distributed VANET (TDV). , 3.3 TDMA-Based MAC Protocols in a Cluster-Based Topology (TCBT) -- 3.4 TDMA-Based MAC Protocols in Centralized Topology (TCT) -- 4 Conclusion -- References -- Node Authentication in IoT-Enabled Sensor Network Using Middleware -- 1 Introduction -- 2 Background -- 3 Proposed Technique -- 4 Experimental Results -- 5 Conclusion -- References -- An Efficient Data Aggregation Approach for Prolonging Lifetime of Wireless Sensor Network -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Criteria for Cluster Head Selection in Proposed MESA2DA Approach -- 3.2 Life Road of MESA2DA Approach -- 3.3 Criteria for Aggregation and Cluster Head Data Collection in Proposed MESA2DA Approach -- 3.4 MESA2DA Algorithm for Cluster Head Formation and Data Collection -- 3.5 Data Aggregation by Proposed MESA2DA Approach -- 3.6 Communication Energy -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- A Comprehensive Review of Keystroke Dynamics-Based Authentication Mechanism -- 1 Introduction -- 2 Background of Keystroke Dynamics -- 3 Keystroke Dynamics Features -- 4 Classification Methods -- 5 Metrics and Datasets for Evaluation -- 6 Conclusion and Future Work -- References -- Performance Analysis of Routing Protocols in Wireless Sensor Networks -- 1 Introduction -- 2 Routing Protocols in WSNs -- 3 Simulation Setup and Results -- 4 Discussion -- 5 Conclusion -- References -- Controlled Access Energy Coding (CAEC) for Wireless Adhoc Network -- 1 Introduction -- 2 Access Interference Problem -- 3 Objectives -- 4 Controlled Access Energy Coding (CAEC) -- 5 Results and Observations -- 5.1 Simulation -- 5.2 The Effect of CAEC of Generated Scattered Network -- 5.3 The Effect of CAEC of Throughput Plot -- 5.4 The Effect of CAEC of Energy Consumption Plot -- 5.5 The Effect of CAEC of Simultaneous Transmission Probability. , 5.6 The Effect of CAEC of Communication Delay Plot -- 5.7 Real-Time Implementation -- 6 Conclusion -- References -- IoT-Based HelpAgeSensor Device for Senior Citizens -- 1 Introduction -- 2 Related Works -- 3 System Description and Components -- 4 Proposed Framework of HelpAgeSensor Device -- 5 Conclusion -- References -- Optimization of LEACH for Developing Effective Energy-Efficient Protocol in WSN -- 1 Introduction -- 2 Related Work -- 3 Network Model Evolution -- 4 Improved LEACH -- 4.1 Network Construction Phase -- 4.2 Network Construction Phase -- 4.3 Network Construction Phase -- 4.4 Data Transmission -- 5 Simulation Model and Results -- 6 Conclusion -- References -- Automated Vehicle Management System Using Wireless Technology -- 1 Introduction -- 2 Some Previous Works -- 3 Simulation Algorithm -- 4 Hardware Device Specification -- 5 Software Specification-Otsu's Method -- 6 Results and Discussions -- 7 Conclusion -- References -- A Supply Chain Replenishment Inflationary Inventory Model with Trade Credit -- 1 Introduction -- 2 Postulates and Terminology -- 2.1 Postulates -- 2.2 Terminology -- 3 Model Approach and Analysis -- 4 Optimality Condition for PWTCrN and PWTCsJ -- 4.1 Numerical Exercise -- 5 Sensitivity Analysis -- 6 Conclusions -- References -- Customer Churn Prediction in Telecommunications Using Gradient Boosted Trees -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Ensemble Learning -- 3.2 Bagging and Boosting -- 3.3 Gradient Boosting -- 3.4 XGBoost -- 4 Experiments -- 4.1 About the Dataset -- 4.2 Data Preprocessing -- 4.3 Model Building -- 5 Evaluation and Results -- 6 Conclusion -- 7 Future Scope -- References -- Efficient Evolutionary Approach for Virtual Machine Placement in Cloud Data Center -- 1 Introduction -- 2 Cloud Data Center Hierarchical Network Model -- 3 PSO Algorithm -- 3.1 Particle Representation. , 4 Distributed PSO Algorithm -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- SCiJP: Solving Computing Issues by Java Design Pattern -- 1 Introduction -- 2 Related Work -- 3 Gang of Four (GoF) -- 3.1 Favor Object Composition over Inheritance -- 3.2 Program to an Interface Not an Implementation -- 4 Classification of Design Patterns -- 5 Proposed Design Pattern Approach for Java Cryptography Architecture (JCA) -- 5.1 DES (Data Encryption Standard) -- 5.2 Design and Implementation -- 6 Advantages of Design Pattern -- 7 Drawbacks of Design Pattern -- 8 Conclusion -- References -- Permissioned Blockchain-Based Agriculture Network in Rootnet Protocol -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Rootnet Protocol -- 4.1 Blockchain -- 4.2 Permissioned Blockchain -- 4.3 Rootnet Architecture -- 5 System Design -- 5.1 Rootnet Registration -- 5.2 Rootnet Transactions -- 5.3 Consumers -- 5.4 Producers -- 6 Conclusion -- References -- Load Balancing and Fault Tolerance-Based Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Load Balancing Phase -- 3.2 Fault Tolerance Phase -- 4 Simulation Results -- 5 Conclusion and Future Scope -- References -- A Novel Context Migration Model for Fog-Enabled Cross-Vertical IoT Applications -- 1 Introduction -- 2 Uses of Fog Layer for Real-Time Cross-Vertical IoT Application -- 2.1 Fog Node Architecture -- 3 Context Management in Fog Node -- 3.1 Application Migration Problem -- 4 Resource Aware and Forecast-Based Context Migration -- 5 Simulation Setup and Result Discussion -- 6 Conclusion -- References -- Equity Data Distribution Algorithms on Identical Routers -- 1 Introduction -- 2 Problem Description -- 3 Heuristics -- 3.1 Non-decreasing Size Order Heuristic (NDS) -- 3.2 Non-increasing Size Order Heuristic (NIS). , 3.3 Sizing Multi-fit-Based Heuristic(SMF).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1152 pages)
    Edition: 1st ed.
    ISBN: 9789811551130
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1165
    DDC: 004
    Language: English
    Note: Intro -- ICICC-2020 Steering Committee Members -- Patrons -- General Chairs -- Honorary Chairs -- Conference Chairs -- Technical Program Chairs -- Editorial Chairs -- Conveners -- Publication Chairs -- Publicity Chairs -- Co-convener -- Organizing Chairs -- Organizing Team -- Preface -- About This Book -- Contents -- About the Editors -- Systematic Analysis and Prediction of Air Quality Index in Delhi -- 1 Introduction -- 2 Literature Review -- 2.1 Pollutants: A Study on the Effects on Human Health -- 3 Pollutant Data Collection for the City of Delhi -- 3.1 Area Selected -- 3.2 Method of Pollutant Data Collection -- 3.3 Air Quality Index Assessment -- 4 Data Analysis Results -- 4.1 Factor Identification -- 4.2 Analysis and Results -- 5 Prediction of Future Pollution Data -- 5.1 Holt-Winter Model -- 5.2 Application of Holt-Winter to Predicted Results and Discussion -- 6 Conclusions -- References -- Proof of Game (PoG): A Proof of Work (PoW)'s Extended Consensus Algorithm for Healthcare Application -- 1 Introduction -- 2 Literature Survey -- 3 Proposed PoG Approach -- 4 PoG Integrated Proposed Healthcare Application Model -- 5 Analysis -- 6 Conclusion -- References -- Analysis of Diabetes and Heart Disease in Big Data Using MapReduce Framework -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- 6 Future Scope -- References -- User Interface of a Drawing App for Children: Design and Effectiveness -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 The App -- 3.2 Study Design -- 3.3 Statistical Analysis -- 4 Results -- 4.1 Quantitative Results -- 4.2 Analysis of the Children's Drawings -- 5 Discussion -- 6 Conclusion -- References -- Rank Aggregation Using Moth Search for Web -- 1 Introduction -- 2 Rank Aggregation (RA) Methods for MetaSearch -- 3 Genetic Algorithm (GA). , 4 Proposed Moth Search Algorithm (MSA)-Based Aggregation Approach -- 5 Results and Discussion -- 5.1 Comparative Analysis of MSA and GA Approach -- 5.2 Query Analysis for Best Optimized Aggregated List -- 6 Conclusion and Future Scope -- References -- A Predictive Approach to Academic Performance Analysis of Students Based on Parental Influence -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Formula -- 3.2 Data Interpretation -- 4 Results and Discussions -- 5 Predictive Modelling -- 6 Conclusions -- References -- Handling Class Imbalance Problem in Heterogeneous Cross-Project Defect Prediction -- 1 Introduction -- 2 Basic Terminologies -- 2.1 Heterogeneous Cross-Project Defect Prediction (HCPDP) Model -- 2.2 Class Imbalance Problem -- 3 Related Work -- 4 Proposed Work -- 5 Experimental Results and Discussion -- 6 Conclusion -- References -- A Heterogeneous Dynamic Scheduling Minimize Energy-HDSME -- 1 Introduction -- 2 Related Work -- 3 Architecture of HDSME and Model of the System -- 3.1 The Reference Architecture of HDSME -- 3.2 Resources Required for Computation -- 3.3 Usage of Power in HDSME -- 4 Result and Analysis -- 5 Conclusion -- References -- A Generic Framework for Evolution of Deep Neural Networks Using Genetic Algorithms -- 1 Introduction -- 2 Basics of Deep Neural Networks -- 2.1 Deep Neural Networks -- 2.2 DNN Hyperparameters -- 2.3 Dropout Layer -- 2.4 Applications of DNNs -- 3 Genetic Algorithms -- 3.1 Population Initialization -- 3.2 Selection -- 3.3 Crossover -- 3.4 Mutation -- 3.5 Fitness Function -- 4 Proposed Methodology -- 4.1 Proposed Chromosome Structure -- 4.2 Proposed Framework -- 4.3 Fitness Evaluation -- 5 Results -- 6 Conclusion -- References -- Online Economy on the Move: The Future of Blockchain in the Modern Banking System -- 1 Introduction -- 1.1 Banking System Prevalent in India Today. , 1.2 Problems Faced by the Banking Systems Today -- 1.3 Blockchain -- 1.4 Blockchain Consensus Protocols -- 2 Methodology Adopted -- 2.1 Designing Two-Hop Blockchain Consensus Model -- 2.2 Types of Blockchain Platforms Applicable to the Banking System -- 2.3 Assessment of the Blockchain Platform -- 3 Results and Discussion -- 3.1 Designing Two-Hop Blockchain Consensus Model -- 3.2 Types of Blockchain Platforms Applicable to the Banking System -- 3.3 Assessment of the Blockchain Platform -- 4 Conclusion -- 5 Future Work -- References -- A Novel Framework for Distributed Stream Processing and Analysis of Twitter Data -- 1 Introduction -- 2 Related Work -- 2.1 Study of Architectures for Stream Processing -- 2.2 Study of Frameworks for Stream Processing -- 2.3 Study of in-Memory Computing Framework -- 3 Proposed Framework -- 3.1 Setting up Twitter Account -- 3.2 Integrating with Apache Kafka -- 3.3 Integrating with Apache Cassandra -- 4 Illustrations -- 4.1 Setting up Spark -- 4.2 Stream Live Tweets with Spark Streaming -- 5 Module Analysis -- 5.1 Print Tweets Module Analysis -- 5.2 Average Tweet Length Analysis -- 5.3 Most Popular Hashtag Analysis -- 6 Results -- 7 Conclusion -- References -- Turbo Code with Hybrid Interleaver in the Presence of Impulsive Noise -- 1 Introduction -- 2 Symmetric Alpha-Stable Noise (SαS) -- 3 Interleaver Design -- 4 Simulation Results -- 5 Conclusion -- References -- Performance Evaluation of Weighted Fair Queuing Model for Bandwidth Allocation -- 1 Introduction -- 2 Iterative Bandwidth Allocation Model -- 3 Simulation Setup -- 4 Performance Evaluation -- 5 Conclusion -- References -- Modified Bio-Inspired Algorithms for Intrusion Detection System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work/Methodology -- 3.1 Binary Particle Swarm Optimization (BPSO) -- 3.2 Binary Firefly Algorithm (BFA). , 3.3 Modified Cuttlefish Algorithm (MCFA) -- 4 Implementation and Results -- 4.1 Dataset -- 4.2 Machine Learning Classifiers -- 5 Results -- 6 Conclusion -- References -- An Analysis on Incompetent Search Engine and Its Search Engine Optimization (SEO) -- 1 Introduction -- 2 Search Engine Optimization -- 2.1 Page Ranking -- 2.2 On-Page Optimization -- 2.3 Off-Page Optimization -- 3 Proposed Problem: Differ Google Results on Different Platform -- 3.1 Differ Search Results in Different Browsers -- 3.2 Differ Search Results in Multilingual Mode -- 3.3 Differ Search Results in Low End Devices -- 4 Conclusion -- References -- Infotainment System Using CAN Protocol and System on Module with Qt Application for Formula-Style Electric Vehicles -- 1 Introduction -- 2 Motivation -- 3 Design -- 4 Specifications of the Automobile Developed -- 4.1 Accumulator -- 4.2 Motor -- 4.3 Control and Safety Circuits -- 5 Methodology and Setup -- 6 Results and Discussion -- 7 Conclusion -- References -- A Novel Approach for SQL Injection Avoidance Using Two-Level Restricted Application Prevention (TRAP) Technique -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed Work -- 4.1 Introduction to Proposed Work -- 4.2 Two-Level Restricted Application Prevention (TRAP) Technique Architecture -- 4.3 Two-Level Restricted Application Prevention (TRAP) Technique Working Methodology -- 5 Results and Discussion -- 5.1 Time Comparison of Time-Based Attacks -- 5.2 Time Comparison of Union-Based Attacks -- 5.3 KPI Comparison of TRAP Technique with Existing Techniques -- 6 Conclusion and Future Work -- References -- Prediction of Cardiovascular Disease Through Cutting-Edge Deep Learning Technologies: An Empirical Study Based on TENSORFLOW, PYTORCH and KERAS -- 1 Introduction -- 2 Related Work -- 3 Empirical Examination of Conventional and Deep Learning Practices. , 3.1 Performance of Conventional Classifiers in Predicting the Disease -- 3.2 Exploitation of Cutting-Edge Technologies Encompassing of TENSORFLOW, PYTORCH and KERAS -- 3.3 Data Visualization -- 4 Conclusion -- References -- Study and Analysis of Time Series of Weather Data of Classification and Clustering Techniques -- 1 Introduction -- 2 Methodology -- 2.1 Rotation Estimation -- 2.2 Rotation Estimation-Based Navie Bayes -- 2.3 Rotation Estimation-Based J48 -- 2.4 Rotation Estimation-Based LIBSVM -- 2.5 K-Means Clustering -- 2.6 EM Clustering -- 2.7 Hierarchical Clustering -- 3 Results and Discussions -- 4 Conclusion -- References -- Convection Dynamics of Nanofluids for Temperature and Magnetic Field Variations -- 1 Introduction -- 2 Mathematical Modeling -- 2.1 Linear Stability Analysis -- 3 Numerical Simulation -- 4 Conclusion -- References -- A Lightweight Secure Authentication Protocol for Wireless Sensor Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Scheme -- 3.1 User Registration Phase -- 3.2 User Login Phase -- 3.3 Authentication Phase -- 4 Experimental Results -- 4.1 Security Analysis -- 5 Conclusion -- References -- Movie Recommendation Using Content-Based and Collaborative Filtering -- 1 Introduction -- 1.1 What Is a Recommender Engine? -- 2 Related Work -- 3 Proposed Work -- 3.1 Overview -- 3.2 Data Acquisition -- 3.3 Data Cleaning -- 3.4 The Proposed Algorithm -- 3.5 The Algorithm -- 4 Related Technologies -- 5 Result Analysis -- 6 Conclusion and Future Work -- References -- Feature Selection Algorithms and Student Academic Performance: A Study -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Experimental Setup -- 3.2 Feature Selection Algorithm and Classifiers -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References. , MobiSamadhaan-Intelligent Vision-Based Smart City Solution.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1158 pages)
    Edition: 1st ed.
    ISBN: 9789811551482
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1166
    DDC: 004
    Language: English
    Note: Intro -- ICICC-2020 Steering Committee Members -- Patrons -- General Chairs -- Honorary Chairs -- Conference Chairs -- Technical Program Chairs -- Editorial Chairs -- Conveners -- Publication Chairs -- Publicity Chairs -- Co-convener -- Organizing Chairs -- Organizing Team -- Preface -- About This Book -- Contents -- About the Editors -- A Dummy Location Generation Model for Location Privacy in Vehicular Ad hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Our Threat Model and Dummy Generation -- 3.1 Threat Model -- 3.2 The Dummy Generation Scheme -- 3.3 Our Attack Model -- 4 Our Proposed Work -- 4.1 Generating Frequent Visited Locations of Vehicles -- 4.2 Assessment of Vulnerable Time/Location Pairs -- 5 Experimental Design and Evaluation -- 5.1 Experimental Settings -- 5.2 Experimental Results -- 6 Conclusion and Future Aspects -- References -- Evaluating User Influence in Social Networks Using k-core -- 1 Introduction -- 2 Influence Maximization -- 3 Existing Work -- 4 Proposed Method -- 5 Datasets -- 6 Experimental Results -- 7 Conclusion -- References -- Depression Anatomy Using Combinational Deep Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Model Architecture -- 5 Result -- 6 Conclusion and Future Scope -- References -- A Hybrid Cost-Effective Genetic and Firefly Algorithm for Workflow Scheduling in Cloud -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Result and Discussions -- 4.1 Analysis in Terms of Finish Time -- 4.2 Analysis in Terms of Execution Cost -- 4.3 Analysis in Terms of Termination Delay -- 5 Conclusion -- References -- Flexible Dielectric Resonator Antenna Using Polydimethylsiloxane Substrate as Dielectric Resonator for Breast Cancer Diagnostics -- 1 Introduction -- 2 Proposed DRA Antenna Design and Specifications -- 2.1 Step by Step Implementation of Proposed Antenna. , 2.2 Performance of DRA Without Bending and With Bending -- 3 Effects of Human Body on Designed DRA -- 4 Breast Cancer Detection Using Designed DRA -- 5 Conclusion -- References -- Machine Learning-Based Prototype for Restaurant Rating Prediction and Cuisine Selection -- 1 Introduction -- 2 Technologies Used -- 3 State of Art -- 4 Architecture Design -- 5 Implementation and Results -- 6 Conclusion -- 7 Future Works -- References -- Deeper into Image Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Investigation of Ionospheric Total Electron Content (TEC) During Summer Months for Ionosphere Modeling in Indian Region Using Dual-Frequency NavIC System -- 1 Introduction -- 2 Estimation of STEC and VTEC -- 2.1 Smoothing and True STEC -- 2.2 Estimation of VTEC -- 3 Analysis of STEC and VTEC -- 4 Conclusion -- References -- An Improved Terrain Profiling System with High-Precision Range Measurement Method for Underwater Surveyor Robot -- 1 Introduction -- 2 Design of Underwater Surveyor Robot -- 2.1 Hardware -- 2.2 High-Precision Range Measurement Methods -- 3 Result -- 4 Conclusion -- References -- Prediction of Diabetes Mellitus: Comparative Study of Various Machine Learning Models -- 1 Introduction -- 2 Problem Statement -- 3 Machine Learning Techniques -- 4 Validation Techniques -- 4.1 k-fold Cross-Validation -- 4.2 Percentage Split -- 5 Findings/Literature Review -- 6 Results and Discussion -- 7 Conclusion -- 8 Challenges, Future Directions and Limitations -- References -- Tracking of Soccer Players Using Optical Flow -- 1 Introduction -- 2 Literature Survey -- 2.1 Soccer Game Dataset -- 3 Methodology -- 3.1 Hierarchical Part Based Segmentation -- 3.2 Optical Flow Analysis -- 4 Experimental Result -- 5 Conclusion -- References. , Selection of Probabilistic Data Structures for SPV Wallet Filtering -- 1 Introduction -- 1.1 Bloom Filter -- 2 Literature Review -- 3 Working -- 3.1 Cuckoo Filter -- 4 Implementation -- 5 Comparison -- 6 Conclusion -- References -- Hybrid BF-PSO Algorithm for Automatic Voltage Regulator System -- 1 Introduction -- 2 AVR System -- 3 Bacteria Foraging -- 4 Particle Swarm Optimization -- 5 Self-tuning BFO Based PSO Optimization Algorithm for PID Controller -- 6 Simulation Results -- 7 Conclusion -- References -- Malware Classification Using Multi-layer Perceptron Model -- 1 Introduction -- 2 Related Work -- 3 Multi-layer Perceptron -- 3.1 Steps in the Training of MLP Model -- 4 Methodology -- 4.1 Data Sample Collection -- 4.2 Experiment Setup -- 4.3 Processing of Runtime Features -- 4.4 Parameter Tuning of MLP Model -- 5 Results and Discussion -- 6 Conclusion -- References -- Protocol Random Forest Model to Enhance the Effectiveness of Intrusion Detection Identification -- 1 Introduction -- 2 Related Work -- 3 Intrusion Datasets for Experimental Work -- 3.1 The NSL-KDD Dataset -- 3.2 Three Protocol Datasets -- 4 Methodologies -- 4.1 Feature Selection Process Using Genetic Algorithm -- 4.2 Random Forest -- 4.3 Evaluation Metrics -- 5 Result and Conclusion -- 5.1 Performance Comparison of Different Tree Sizes -- 5.2 Performance Comparison with Other Research Work -- 6 Conclusion -- References -- Detecting User's Spreading Influence Using Community Structure and Label Propagation -- 1 Introduction -- 2 Methodologies -- 2.1 Independent Cascade (IC) Model -- 2.2 h-Index Centrality -- 3 Proposed Method -- 3.1 Seeding Phase -- 3.2 Label Propagation Phase -- 3.3 Finding k-Influential Nodes -- 4 Experimental Results and Discussion -- 5 Conclusion -- References -- Bagging- and Boosting-Based Latent Fingerprint Image Classification and Segmentation. , 1 Introduction -- 2 Classifiers -- 2.1 Bagging Versus Boosting Techniques -- 2.2 Random Decision Forest Classifier (RDF) Versus Adaboost -- 3 Proposed Method -- 4 Experimentation and Results -- 4.1 Experimental Setup -- 4.2 Preparing Data -- 4.3 Classification Performance -- 4.4 Results -- 5 Conclusion -- References -- Selecting Social Robot by Understanding Human-Robot Interaction -- 1 Introduction -- 2 Knowing Your Robot -- 3 Selecting Your Robot -- 4 MCDM Method -- 5 Conclusion -- References -- Flooding and Forwarding Based on Efficient Routing Protocol -- 1 Introduction -- 2 Related Work -- 3 Proposed Protocol -- 4 Experimental Results -- 4.1 Delivery Rate -- 4.2 Average Duration of Inter-contact -- 4.3 Delivery Delay -- 4.4 Overhead -- 4.5 Hop Count -- 4.6 Comparisons B/W the Protocols -- 5 Conclusion and Future Work -- References -- Hardware-Based Parallelism Scheme for Image Steganography Speed up -- 1 Introduction -- 2 Related Work -- 3 Image Steganography -- 4 Implementation Details -- 4.1 Image Steganography Algorithm -- 4.2 GPU Parallelism -- 4.3 Experimental Results of Using GPUs -- 4.4 Experimental Results of NOC -- 5 Conclusion -- References -- Predicting Group Size for Software Issues in an Open-Source Software Development Environment -- 1 Introduction -- 2 Related Work and Background -- 2.1 Classification and Regression Trees (CaRT) -- 2.2 Social Information Foraging -- 3 Research Methodology -- 3.1 Project Selection and Data Extraction -- 3.2 Prediction Models -- 4 Evaluation and Result Analysis -- 5 Conclusion -- References -- Wireless CNC Plotter for PCB Using Android Application -- 1 Introduction -- 2 Previous Work -- 3 System Architecture -- 3.1 Overview -- 3.2 Microcontroller -- 3.3 Bluetooth -- 3.4 Motor Driver -- 3.5 Stepper Motor -- 3.6 16 × 2 LCD -- 3.7 Stepper Motor -- 3.8 Secure Digital Card -- 3.9 Indicators. , 3.10 Power Drive -- 3.11 Android Application -- 4 System Implementations -- 5 Conclusions -- References -- Epileptic Seizure Detection Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 EEG Dataset Description -- 3.2 Machine Learning Classifiers -- 4 Experimental Results and Discussion -- 4.1 Experimental Results -- 5 Conclusion -- References -- Analysis of Minimum Support Price Prediction for Indian Crops Using Machine Learning and Numerical Methods -- 1 Introduction -- 2 Background Work -- 3 Methodologies -- 3.1 Linear Regression -- 3.2 Recurrent Neural Network -- 3.3 Newton's Forward Interpolation -- 3.4 Newton's Gregory Backward Interpolation -- 3.5 Lagrange's Interpolation Method -- 3.6 Exponential Smoothing -- 4 Experimental Data Set -- 5 Results -- 6 Conclusion -- References -- A Robust Methodology for Creating Large Image Datasets Using a Universal Format -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Gray-Scaling and Inversion -- 3.2 Dilation/Erosion -- 3.3 Canny Edge Detection -- 3.4 Contours -- 3.5 Mapping Pixel Comparison -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- A Comparative Empirical Evaluation of Topic Modeling Techniques -- 1 Introduction -- 2 Topic Modeling Techniques -- 2.1 Latent Semantic Analysis -- 2.2 Latent Dirichlet Allocation -- 2.3 Correlated Topic Model -- 3 Comparison Methodology for Topic Modeling Techniques -- 3.1 Data Set -- 3.2 Pre-processing -- 3.3 Hyperparameter Selection -- 3.4 Implementation Details -- 4 Evaluation Metrics -- 4.1 Probabilistic Coherence -- 4.2 Prevalence Score -- 5 Result and Evaluation -- 5.1 Probabilistic Coherence Score -- 6 Conclusion -- References -- An Analysis of Machine Learning Techniques for Flood Mitigation -- 1 Introduction -- 2 Related Work -- 2.1 Flood Early Warning System. , 2.2 Data Collection for Early Warning System.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (550 pages)
    Edition: 1st ed.
    ISBN: 9789811323546
    Series Statement: Lecture Notes in Networks and Systems Series ; v.56
    DDC: 004
    Language: English
    Note: Intro -- ICICC-2018 Steering Committee Members -- ICICC-2018 Advisory Committee -- Preface -- About This Book (Volume 2) -- Contents -- Editors and Contributors -- An Optimization Technique for Unsupervised Automatic Extractive Bug Report Summarization -- 1 Introduction -- 2 Related Work -- 2.1 Supervised Learning Methods -- 2.2 Unsupervised Learning Methods -- 3 Proposed Summarization System -- 3.1 Proposed Approach -- 3.2 Proposed Algorithm -- 4 Experimental Result -- 5 Conclusion -- References -- Prediction of Air Quality Using Time Series Data Mining -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preprocessing -- 2.3 Data Reduction -- 2.4 Pattern Extraction Using CTSPD Algorithm -- 3 Experiments and Results -- 4 Conclusion -- References -- Optimisation of C5.0 Using Association Rules and Prediction of Employee Attrition -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Association Technique -- 3.2 Decision Tree -- 4 Proposed Research -- 5 Performance Comparison and Result -- 6 Future Work -- 7 Conclusion -- References -- Stress Analysis Using Speech Signal -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System Model -- 4 Mathematical Modulation -- 5 Corpus Selections -- 6 Result and Discussion -- 7 Conclusion -- References -- Subject-Independent Emotion Detection from EEG Signals Using Deep Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 DEAP Database -- 3.2 Wavelet Coefficients as Features -- 3.3 Classification -- 4 Implementation -- 5 Conclusion -- References -- SoundEx Algorithm Revisited for Indian Language -- 1 Introduction -- 2 Related Work -- 3 Phonetic Algorithms -- 4 Proposed Approach: Improved SoundEx Algorithm for Hindi Language -- 5 Result -- 6 Conclusion -- References. , Sentiment Analysis and Feature Extraction Using Rule-Based Model (RBM) -- 1 Introduction -- 1.1 Statement of the Problem -- 1.2 The Process of Sentiment Analysis and Classification -- 1.3 Factors that Affect Sentiment Analysis and Classification -- 2 Related Work -- 3 Results and Discussion -- 3.1 Datasets -- 3.2 Result -- 4 Conclusion -- References -- The Role of Big Data Predictive Analytics Acceptance and Radio Frequency Identification Acceptance in Supply Chain Performance -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Sample and Data Collection Procedure -- 3.2 Research Instrument -- 3.3 Measurement Model -- 4 Results -- 5 Conclusion and Discussion -- References -- Peering Through the Fog: An Inter-fog Communication Approach for Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Case Study -- 5 Simulation Results and Performance Comparison -- 6 Conclusion and Future Scope -- References -- Leaf Identification Using HOG, KNN, and Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Image Preprocessing -- 3.2 Feature Extraction -- 3.3 Classification -- 4 Results -- 5 Conclusion and Future Work -- References -- Meta-heuristic Techniques to Solve Resource-Constrained Project Scheduling Problem -- 1 Introduction -- 2 Resource-Constrained Project Scheduling Problem -- 3 Literature Review -- 3.1 Heuristic Techniques for RCPSP -- 3.2 Swarm Intelligence Meta-heuristics to Solve RCPSP -- 3.3 Use of SI Meta-heuristics to Solve Optimization Problems in Other Domains -- 4 Research Challenges and Future Directions -- 5 Conclusion -- References -- A Novel Approach to Find the Saturation Point of n-Gram Encoding Method for Protein Sequence Classification Involving Data Mining -- 1 Introduction -- 2 Literature Review -- 3 Feature Extraction Using n-Gram Encoding Method. , 4 Problem Analysis and Experimental Result -- 5 Conclusion -- References -- A Comparative Evaluation of QoS-Based Network Selection Between TOPSIS and VIKOR -- 1 Introduction -- 1.1 TOSIS Network Selection Process -- 1.2 VIKOR Network Selection Process -- 2 Simulations and Result Analysis -- 3 Conclusion -- References -- Analysis and Implementation of the Bray-Curtis Distance-Based Similarity Measure for Retrieving Information from the Medical Repository -- 1 Introduction -- 2 Information Retrieval -- 2.1 Information Retrieval Tasks -- 2.2 IR Process -- 3 Similarity Measure -- 4 Bray-Curtis Distance-Based Similarity Measure -- 5 Experimental Results and Discussion -- 6 Conclusion -- References -- Information Retrieval on Green Mining Dataset Using Divergence from Randomness Models -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Data Collection and Transformation -- 3.2 Tool Used: Terrier IR Tool v4.2 -- 3.3 Procedure -- 4 Results and Discussions -- 5 Conclusion -- References -- Handling Big Data Using MapReduce Over Hybrid Cloud -- 1 Introduction -- 2 Review of Literature -- 3 Implementation -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- Statistical Survey of Data Mining Techniques: A Walk-Through Approach Using MongoDB -- 1 Introduction -- 2 Literature Survey -- 3 Simulation and Analysis -- 4 Conclusion and Future Work -- References -- Fuzzy Risk Assessment Information System for Coronary Heart Disease -- 1 Introduction -- 2 Material and Methodology -- 2.1 Key Rule for the Proposed Fuzzy Information System -- 3 Risk Factors for Risk Assessment Fuzzy Information System of Coronary Heart Disease (CHD) -- 4 Fuzzy Relations for Risk Assessment Information System of Coronary Heart Disease (CHD) -- 5 Result and Discussion -- 6 Conclusion -- References. , A Soft Computing-Based Approach to Group Relationship Analysis Using Weighted Arithmetic and Geometric Mean -- 1 Introduction -- 2 Related Work -- 3 Fuzzy Graphs -- 4 Proposed Work -- 5 Conclusion -- References -- Hand Gesture Recognition Using Convolutional Neural Network -- 1 Introduction -- 2 Proposed Method -- 2.1 Experimental Setup -- 2.2 Feature Extraction -- 2.3 Dataset Collection -- 2.4 Training the Neural Network -- 2.5 Testing the Application for Recognition -- 3 Observations -- 4 Results -- 5 Conclusion -- References -- Arrhenius Artificial Bee Colony Algorithm -- 1 Introduction -- 2 ABC Algorithm -- 2.1 Steps of ABC Algorithm -- 2.2 Recent Modifications in ABC Algorithm -- 3 Arrhenius ABC Algorithm -- 4 Experimental Settings and Result Analysis -- 4.1 Experimental Settings -- 4.2 Result Analysis -- 5 Conclusions -- References -- Analysis of Refactoring Effect on Software Quality of Object-Oriented Systems -- 1 Introduction -- 2 Related Work -- 3 Refactoring and Software Quality -- 3.1 Refactoring Techniques -- 3.2 Software Quality Attributes -- 4 Research Methodology -- 4.1 Dataset Collection -- 4.2 Experimental Design -- 5 Results and Discussions -- 5.1 Analysis of Impact of Refactoring Techniques on Internal Quality Attributes -- 5.2 Analysis of Impact of Refactoring Techniques on External Quality Attributes -- 6 Threats to Validity -- 7 Conclusions and Future Work -- References -- Rumor Detection Using Machine Learning Techniques on Social Media -- 1 Introduction -- 2 Rumor Detection on Social Media -- 2.1 Types of Rumors -- 3 Process of Rumor Detection -- 3.1 Data Collection -- 3.2 Preprocessing -- 3.3 Feature Extraction -- 3.4 Classification -- 4 Machine Learning-Based Techniques for Rumor Detection on Social Media -- 4.1 Issues and Challenges -- 5 Conclusion -- References. , Empirical Analysis of Supervised Machine Learning Techniques for Cyberbullying Detection -- 1 Introduction -- 2 Background Work -- 3 Proposed Approach -- 4 Evaluation and Results -- 5 Conclusion and Future Scope -- References -- Implementation of MapReduce Using Pig for Election Analysis -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Problem Statement -- 2.2 Objectives -- 2.3 Working -- 3 Algorithm -- 4 Results -- 5 Conclusion -- References -- Primary Healthcare Using Artificial Intelligence -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Motivation -- 3.2 Problem Statement -- 3.3 Objectives -- 3.4 Working -- 3.5 Algorithm -- 3.6 Comparative Study -- 4 Significance -- 5 Future Scope -- 6 Conclusion -- References -- A Brief Survey on Random Forest Ensembles in Classification Model -- 1 Introduction -- 2 An Overview of Random Forest Model -- 2.1 Visual Representation of Random Forest -- 2.2 Advantages of Random Forest Algorithm -- 2.3 Random Forest Applications -- 2.4 Limitations of Random Forest Model -- 3 A Brief Survey on Random Forest Ensembles -- 3.1 Discussion -- 3.2 List of Research Gaps Identified by the Survey on Random Forests -- 4 Conclusion -- References -- Big Data in Healthcare -- 1 Introduction -- 2 Related Work Done -- 3 Application of Big Data -- 3.1 Pathway Analysis -- 3.2 Transforming Data to Information, and Vice Versa -- 3.3 Supporting Providers, Improving Patient Care -- 3.4 Awareness -- 4 Big Data Initiatives Healthcare -- 5 Challenges Faced by Big Data in Healthcare -- 6 Future Prospects of Big Data -- 7 Conclusion -- References -- Speedroid: A Novel Automation Testing Tool for Mobile Apps -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 The Proposed Tool -- 4.1 Test Suite Editor -- 4.2 Test Journey Creator -- 4.3 Test Definition Generator -- 4.4 Test Executor -- 4.5 Configuration Panel. , 4.6 Reporting.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...