GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Description / Table of Contents: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 REVIEW PROCEDURE -- 2 QUALITY CRITERIA -- 3 KEY METRICS -- 4 COMPETING INTERESTS -- Cutting Process Mechanics Experimental Study ofPick-cutting Coal Seams -- Study on the fusion degree of old and new asphalt based on rod-like thin layer chromatography -- Parameter Optimization Analysis of The New Straw Brick Based on Thermal Performance -- Research on Urban Water Infrastructure Optimization Based on Artificial Intelligent -- Stability analysis of high soil slope in a pumping and storage power station -- Numerical simulation of dynamic characteristics of radial gates considering the effect of the pier -- Study on Creep Test and Constitutive Model of Layered Soft Rock -- Key Technology of the Prefabricated Pipe Gallery Under-passing the Railway -- Field test study on deep soft soil reinforcement by vacuum preloading without sand cushion -- The corrosion resistance performance of reinforcing steel in autoclaved aerated concrete -- Research on pre-processing of geotechnical engineering safety monitoring data -- Comparative analysis of field test of dredger fill foundation reinforced by vacuum preloading method without sand cushion -- Deformation of an existing metro station attachment structure under the influence of adjacent construction of a covered excavation pit -- Overhead Space Layout Strategy of Enclosed Teaching Building Based on Wind Environment Performance Optimization -- Application of ultrathin asphalt overlay technology with 4.75-mm nominal maximum aggregate size -- Inverse analysis of seepage Safety for earth dams based on monitoring data -- A Brief Analysis of Traditional Chinese Woven Timber Arch System -- Research on BIM Digital Collaborative Design under the Background of Intelligent Construction.
    Type of Medium: Online Resource
    Pages: 1 online resource (871 pages)
    Edition: 1st ed.
    ISBN: 9789464633368
    Series Statement: Advances in Engineering Research Series v.228
    Language: English
    Note: Description based on publisher supplied metadata and other sources
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore : Springer
    Keywords: Medicine ; Biomedicine ; Medicine ; Human genetics ; Cell biology ; Human genetics ; Cell biology ; Tanslocation, Genetic physiology
    Description / Table of Contents: This volume discusses various aspects of mechanisms and methodologies of chromosome translocations, ranging from a historical and clinical overview of chromosome translocations to the rapid development of the next-generation sequencing technologies, which has dramatically increased our understanding of the spectrum of chromosome translocations in human diseases. The book also introduces the mechanistic studies on chromosome deletions and their implications in cancer, and discusses the mechanisms of regulating chromothripsis, a unique complex type of chromosome translocation. It is a valuable resource for students and researchers alike, providing insights into chromosome translocations and, potentially, other genomic aberrations involved in understanding and curing human diseases
    Type of Medium: Online Resource
    Pages: Online-Ressource (V, 168 p. 29 illus., 27 illus. in color, online resource)
    ISBN: 9789811305931
    Series Statement: Advances in Experimental Medicine and Biology 1044
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Forschungsbericht
    Type of Medium: Online Resource
    Pages: Online-Ressource (PDF-Datei: 18 S., 3.396 KB)
    Language: German
    Note: Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden , Förderkennzeichen BMBF 50 OR 1103. - Engl. Berichtsbl. u.d.T.: LoCuSS: Completing a volume-limited sample of massive galaxy clusters with XMM-NEWTON and Subaru , Systemvoraussetzungen: Acrobat reader. , Zsfassung in dt. u. engl. Sprache
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Forschungsbericht
    Type of Medium: Online Resource
    Pages: Online-Ressource (PDF-Datei: 11 S., 185 KB)
    Language: German
    Note: Auch als gedr. Ausg. vorh. - Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden , Förderkennzeichen BMBF 50 OR 1005. - Engl. Berichtsbl. u.d.T.: A joint XMM-Newton Subaru study of galaxy cluster scaling relations , Systemvoraussetzungen: Acrobat reader.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore : Springer Singapore | Singapore : Imprint: Springer
    Keywords: Plants—Evolution. ; Plant ecology. ; Biodiversity.
    Description / Table of Contents: Chimonocalamus -- Drepanostachyum -- Ampelocalamus -- Thamnocalamus -- Fargesia.-Gaoligonshania -- Yushania -- Acidosasa -- Oligostachyum -- Pseudosasa -- Menstruocalamus.-Pleioblastus -- Bashania -- Gelidocalamus -- Sasa -- Sasaella -- Ferrocalamus -- Indocalamus.
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource(292 illus., 261 illus. in color. eReference.)
    Edition: 1st ed. 2022.
    ISBN: 9789811627583
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    San Diego :Elsevier Science & Technology,
    Keywords: Fractional calculus. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (352 pages)
    Edition: 1st ed.
    ISBN: 9780323886161
    DDC: 511.352
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Computer networks-Congresses. ; Wireless communication systems-Congresses. ; Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (752 pages)
    Edition: 1st ed.
    ISBN: 9789811640162
    Series Statement: Lecture Notes in Networks and Systems Series ; v.286
    DDC: 004.6
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Influencing User Intention of Plant-Based Sensing System Adoption in Public Vocational High Schools of Indonesia Using TAM -- 1 Introduction -- 2 Literature Review -- 2.1 The Plant-Based Sensing System Proposed -- 2.2 The Theory of Technology Acceptance Model -- 3 Methodology -- 4 Research Model and Hypothesis -- 4.1 External Variable of Model -- 4.2 Perceived Ease of Use, Perceived Usefulness, Attitude, and Behavioral Intention -- 5 Results -- 5.1 Reliability Analysis -- 5.2 Regression Analysis -- 6 Conclusion -- References -- An Empirical Study of Critical Success Factors for the Adoption of m-Government Services in Tanzania -- 1 Introduction -- 2 Literature Review and Hypothesis Development -- 2.1 m-Government Services in Tanzania -- 2.2 Mobile Services Acceptance Model (MSAM) -- 2.3 Hypotheses Development -- 3 Methodology -- 4 Findings -- 5 Discussion -- 6 Conclusion -- References -- Smart City Based on LoRaWAN: Coverage Study for Cusco Urban Area -- 1 Introduction -- 2 LoRaWAN Technology -- 3 Cusco Urban Area Coverage Simulation -- 4 Data Collection -- 5 Analysis of Experimental Measurements -- 5.1 Efficiency Analysis for SF12 -- 5.2 RSSI Analysis for SF12 -- 5.3 Efficiency and RSSI Analysis for SF7 -- 6 Conclusion -- References -- Digital Transformation in Education in Knowledge Society -- 1 Introduction -- 1.1 Basic Considerations -- 2 Materials and Methods -- 3 Results -- 4 Conclusion -- References -- Induction Motor Overload Recognition Based on Sound Analysis -- 1 Introduction -- 2 Related Works -- 3 The Corpus -- 4 The Experiments -- 4.1 Frame-by-Frame Classification -- 4.2 One-Second Segment Classification -- 4.3 Half-a-Second Segment Classification -- 4.4 The Selected Classifier -- 5 Conclusions -- References. , Simulation of an All-Terrain Vehicle Driving Experience Using Virtual Reality -- 1 Introduction -- 2 Materials and Methods -- 2.1 Conception of the Virtual Experience -- 2.2 Learning Programming Tools -- 2.3 Virtual Environment Validation -- 2.4 Conception of the Immersive Environment -- 3 Results -- 4 Discussion -- 5 Conclusions and Recommendations -- References -- Safety-Centric and Smart Outdoor Workplace: A New Research Direction and Its Technical Challenges -- 1 Introduction -- 2 The Need of Dedicated Focus on Smart Outdoor Workplace -- 2.1 Smart Workplace -- 2.2 Smart Outdoor Workplace -- 2.3 Divergent Technology Streams -- 3 Technical Challenges -- 3.1 Diverse and Incompatible Sensors and Devices -- 3.2 Growing Gap Between Battery Technologies and Power Requirements -- 4 Research Prospects Driven by the Identified Challenges -- 4.1 Sandwich Approach to a Knowledge Architecture for Smart Outdoor Workplace -- 4.2 Model-Driven Simulation and Optimization of Energy Consumption in Smart Outdoor Workplace -- 5 Conclusions and Future Work -- References -- Devising Auxiliary Glyph Schemas Combined with XOR Filters for Improvised Font Delivery and Reliable Dynamic Font Augmentation -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology and Algorithm -- 3.1 Basic Font Subsetting Solution and Problems -- 3.2 Client Side: Proposed Data Structures -- 3.3 Font Subsetting and Augmentation Workflows Using Proposed Solution -- 3.4 Flow for an Application Session with the Proposed Solution -- 3.5 XOR Filter Processing for Subset or Font Portion Serving on Server Side -- 4 Conclusion -- References -- Multiple Sequence Alignment Algorithms in Bioinformatics -- 1 Introduction -- 2 Multiple Sequence Alignment (MSA) -- 3 Multiple Sequence Alignment Algorithms (MSA) -- 3.1 ClustalW -- 3.2 Clustal Omega -- 3.3 T-Coffee -- 3.4 MAFFT -- 3.5 Kalign. , 3.6 MUSCLE -- 3.7 Probcons -- 3.8 Genetic Algorithms -- 4 Evaluation of MSA -- 5 Conclusion -- References -- Design and Implementation of a Machine Learning-Based Technique to Detect Unipolar and Bipolar Depression Using Motor Activity Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Underwater Magnetic Release System -- 1 Overview -- 2 System Components -- 2.1 The Software -- 3 Power Considerations -- 4 Design Specifics -- 5 Conclusion -- References -- An Optimal Route for People with Ambulant Disabilities Using Mathematical Risk Modeling and Analytic Hierarchy Process -- 1 Introduction -- 2 Methods -- 2.1 Factors Affecting the Selection of Best Route -- 2.2 Mathematical Risk Modeling -- 2.3 AHP Technique -- 3 Results and Discussion -- 4 Conclusion -- References -- The Innovation in Manufacturing Areas of Electronics Industry of Mexicali Using PLC -- 1 Introduction -- 2 Technological Innovation -- 3 Technology Development -- 4 Improving Competitiveness -- 5 Software Quality in the Electronics Industry -- 6 Limitations of the Investigation -- 7 Methodology -- 8 Results -- 9 PLC Analysis -- 10 Correlation Analysis of Industrial Parameters -- 11 Conclusions -- References -- Assistive Autonomous Electric Vehicle for Disaster Management -- 1 Introduction -- 2 Mechanical System Design -- 2.1 Overview -- 2.2 Frame Design -- 2.3 Assembly for the Wheels -- 2.4 Sensors Stand -- 2.5 Body Housing -- 3 Electronics System Design -- 3.1 Brief Overview -- 3.2 Electronic Suite Description -- 4 Working of the Circuit -- 5 Software and Control System -- 5.1 Brief Overview -- 5.2 Main Software Pipeline -- 5.3 Lane Detection and Path Mapping -- 5.4 Object Discovery Pipeline -- 5.5 Arduino Communication -- 5.6 Motor Driving -- 6 Advantage and Applications -- 6.1 Advantages -- 6.2 Applications. , 7 Conclusion -- References -- On the Existing and New Potential Methods for Partial Discharge Source Monitoring in Electrical Power Grids -- 1 Introduction -- 2 Theoretical Aspects -- 2.1 Spectrogram -- 2.2 Wavelet Transform -- 2.3 Compressive Sensing -- 2.4 Phase-Diagram-Based Analysis -- 3 Experimental Configuration and Results -- 4 Conclusions -- References -- Efficient Approach for Block-Based Copy-Move Forgery Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Discussion and Conclusion -- References -- Smart IoT Sensor Network for Monitoring of Cultural Heritage Monuments -- 1 Introduction -- 2 Sensor Design -- 3 Visualization Platform -- 4 Conclusions -- References -- MorArch: A Software Architecture for Interoperability to Improve the Communication in the Edge Layer of a Smart IoT Ecosystem -- 1 Introduction -- 2 Present Context and Previous Works -- 2.1 Interoperability Architectures -- 2.2 Interoperability Protocols -- 3 Proposal -- 4 Experiments -- 4.1 File System -- 4.2 Data Flow Inside Our Fog Ecosystem -- 4.3 Results -- 5 Conclusions -- References -- A Design of an IoT-Based Smart Home with Auto-sanitization System -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Modeling -- 4 Working Procedure -- 4.1 Remote Access -- 4.2 Voice Command Access -- 5 Implementation of the Prototype -- 5.1 Software Implementation -- 5.2 Hardware Implementation -- 5.3 Visual Models of a Smart Home with Auto-sanitization -- 6 Future Developments, Scopes, and Social Impact -- 7 Results and Data Analysis -- 8 Conclusion -- References -- An Experiment Study on Federated Learning Testbed -- 1 A Novel PPML Framework: Federated Learning -- 2 Methodology and System Implementation -- 3 Results on Efficiency Test -- 3.1 Training Speed -- 3.2 Communication Cost -- 4 Privacy Analysis -- 5 Conclusion. , References -- Visual Quality Comparison of Ocean Wave Effects at Different Camera Distances -- 1 Introduction -- 2 Material and Method -- 2.1 Setting in Houdini -- 2.2 Setting in Unreal -- 2.3 Minor Conclusion -- 3 Result -- 4 Conclusion -- References -- Control System to International Parental Child Abduction, Case: Colombia -- 1 Introduction -- 2 Background -- 3 Design and Method for Colombia -- 4 Results -- 5 Analysis of the Results -- 6 Conclusions and Further Work -- References -- It is not Always Ethical: Data Manipulation to Justify Public Policy Choices in COVID-19 Response -- 1 Introduction -- 2 Background -- 3 Cases of COVID-19 Data Manipulation -- 4 Florida's COVID-19 Data Portal -- 5 Georgia's COVID-19 Data Portal -- 6 Arizona's COVID-19 Data Portal -- 7 Texas, Virginia, and Vermont's COVID-19 Data Portals -- 8 Implications of Data Manipulation -- 9 Conclusion -- References -- BPMN2EVENTB Supporting Transformation from BPMN2.0 to Event B Using Kermeta -- 1 Introduction -- 2 The Proposed Approach -- 3 Subset of Mapping Rules BPMN-Event B -- 4 Illustration -- 5 Conclusion and Future Work -- References -- Teaching Neuroscience Through Flipped Classroom: Systematizing an Experience with Students of the Professional Career of Elementary Education -- 1 Introduction -- 1.1 Contributions of Neuroscience to Education -- 1.2 Teaching Neuroscience Through Digital Resources -- 2 Methodology -- 2.1 Procedures -- 2.2 Participants -- 2.3 Measures -- 3 Results -- 3.1 Analysis of Means and Variation Coefficients -- 3.2 Exploratory Analysis with Boxplots -- 3.3 Analysis of Some Items -- 4 Discussion -- 5 Conclusions and Future Works -- References -- Low-Cost IoT Platform for Telemedicine Applications -- 1 Introduction -- 2 Related Works -- 3 Case of Study -- 4 Implementation of the Proposal -- 4.1 Wearable Device -- 4.2 Android TV App -- 4.3 Cloud Service. , 5 Discussion of Results.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (498 pages)
    Edition: 1st ed.
    ISBN: 9789811500770
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.165
    Language: English
    Note: Intro -- Organizing Committee -- Preface -- Contents -- About the Editors -- 1 Comparison of Different Image Segmentation Techniques on MRI Image -- 1.1 Introduction -- 1.2 Methodology -- 1.2.1 Preprocessing -- 1.2.2 Segmentation Techniques -- 1.3 Results and Discussion -- 1.4 Conclusion -- References -- 2 PSO-ANN-Based Computer-Aided Diagnosis and Classification of Diabetes -- 2.1 Introduction -- 2.1.1 Literature Survey -- 2.2 Feature Selection Approaches -- 2.3 Particle Swarm Optimization (PSO) -- 2.4 Proposed Feature Selection Algorithm -- 2.5 Experimental Results -- 2.6 Conclusion -- References -- 3 Round Robin Scheduling Based on Remaining Time and Median (RRRT& -- M) for Cloud Computing -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Scheduling Algorithms -- 3.4 Experimental Setup and Result Discussions -- 3.4.1 Experimental Setup -- 3.4.2 Performance Metrics -- 3.4.3 Result Discussions -- 3.5 Summary -- References -- 4 Business-Driven Blockchain-Mempool Model for Cooperative Optimization in Smart Grids -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Virtual Power Plant Dispatch Schedules -- 4.3.1 Cost Function Based Optimization -- 4.4 Blockchain -- 4.4.1 Consensus -- 4.5 Consensus and Cooperative Scheduling -- 4.6 Mempool Model -- 4.7 Evaluation and Future Work -- 4.8 Conclusion -- References -- 5 Research of Institutional Technology Diffusion Rules Based on Patent Citation Network-A Case Study of AI Field -- 5.1 Introduction -- 5.2 Data and Method -- 5.3 Results and Discussion -- 5.3.1 Comparative Analysis of Technical Force -- 5.3.2 Technology Diffusion Network and Visualization -- 5.3.3 Measurement of Technology Diffusion Capacity -- 5.4 Conclusion and Limitation -- References -- 6 Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador -- 6.1 Introduction. , 6.2 Materials and Methods -- 6.2.1 Materials -- 6.2.2 Methods -- 6.3 Results -- 6.4 Discussion -- 6.5 Future Work and Conclusion -- References -- 7 Appropriate Security Protocols to Mitigate the Risks in Electronic Money Management -- 7.1 Introduction -- 7.2 Materials and Methods -- 7.2.1 Materials -- 7.2.2 Methods -- 7.3 Results -- 7.4 Discussion -- 7.5 Future Works and Conclusion -- 7.5.1 Future Works -- 7.5.2 Conclusions -- References -- 8 Acceptance and Readiness of Thai Farmers Toward Digital Technology -- 8.1 Introduction -- 8.2 Research Model -- 8.3 Method -- 8.3.1 Questionnaire Instrument -- 8.3.2 Data Analysis -- 8.4 Results -- 8.5 Conclusion -- References -- 9 Neural Network Classifier for Diagnosis of Diabetic Retinopathy -- 9.1 Introduction -- 9.2 Classification -- 9.3 Conclusion -- References -- 10 Comparative Analysis of Data Mining Classification Techniques for Prediction of Heart Disease Using the Weka and SPSS Modeler Tools -- 10.1 Introduction -- 10.2 Literature Review -- 10.2.1 Data Mining Classification Techniques -- 10.3 Experimental Analysis -- 10.3.1 Dataset -- 10.3.2 Result Analysis -- References -- 11 An Automated Framework to Uncover Malicious Traffic for University Campus Network -- 11.1 Introduction -- 11.2 Study Goals -- 11.3 Methodology -- 11.4 Experimental Setup -- 11.5 Observations and Analysis of Framework in Campus Network on Real-Time Basis -- 11.5.1 Dashboard Visualization for Analysis -- 11.6 Conclusion -- 11.7 Future Scope -- References -- 12 Comparative Analysis of K-Means Algorithm and Particle Swarm Optimization for Search Result Clustering -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Experimental Result and Analysis -- 12.3.1 Dataset Details -- 12.3.2 Preprocessing -- 12.3.3 Performance Evaluation -- 12.4 Conclusion -- References. , 13 Design and Implementation of Rule-Based Hindi Stemmer for Hindi Information Retrieval -- 13.1 Introduction -- 13.2 Stemming Approaches -- 13.2.1 Affix Removal Approach -- 13.2.2 N-Gram -- 13.2.3 Suffix Stripping Approach -- 13.2.4 Suffix Substitution Approach -- 13.2.5 Brute-Force Approach -- 13.2.6 Hybrid Approach -- 13.3 Related Work -- 13.4 Proposed Methodology and Implementation -- 13.5 Analysis and Conclusion -- References -- 14 Research on the Development Trend of Ship Integrated Power System Based on Patent Analysis -- 14.1 Introduction -- 14.2 Data and Methods -- 14.3 Results and Discussion -- 14.3.1 Life Cycle Analysis of Patent Technology Development of Foreign Ship Integrated Power System -- 14.3.2 Analysis of Patent Technology Research and Development Direction of Foreign Ship Integrated Power System -- 14.4 Summary -- References -- 15 Detection of Data Anomalies in Fog Computing Architectures -- 15.1 Introduction -- 15.2 Fog Architecture Overview -- 15.3 Anomaly Detection -- 15.3.1 Anomalies -- 15.3.2 Preliminaries for Detection Algorithm -- 15.3.3 Detection Procedure -- 15.4 Computation Algorithm -- 15.5 Related Work -- 15.6 Conclusion -- References -- 16 Cloud Data for Marketing in Tourism Sector -- 16.1 Introduction -- 16.2 Consumer Behavioral Study for the Tourism Industry -- 16.3 Sources of Data -- 16.3.1 Methods of Sourcing Data from Internet -- 16.4 Model for Marketing Data Capture -- 16.4.1 Prediction Theories -- 16.4.2 Marketing -- 16.5 Results -- 16.6 Conclusion -- References -- 17 Road Travel Time Prediction Method Based on Random Forest Model -- 17.1 Introduction -- 17.2 The Principle of Random Forest Algorithm -- 17.3 The Principle of DBSCAN -- 17.4 The Prediction Model of RF-DBSCAN -- 17.4.1 Data Sources -- 17.4.2 Feature Selection -- 17.4.3 The Principle of RF-DBSCAN -- 17.4.4 Comparison of Experiment Results. , 17.5 Conclusions -- References -- 18 Video Synchronization and Alignment Using Motion Detection and Contour Filtering -- 18.1 Introduction -- 18.1.1 Overview -- 18.1.2 Problem Statement -- 18.1.3 Objectives -- 18.1.4 Existing System -- 18.1.5 Proposed System -- 18.2 Literature Survey -- 18.3 System Design -- 18.4 Dataflow of Video Change Detection -- 18.5 Class Diagrams -- 18.6 Experimental Results -- 18.7 Conclusion -- References -- 19 Mutichain Enabled EHR Management System and Predictive Analytics -- 19.1 Introduction -- 19.2 Related Work -- 19.2.1 Verifying the Authenticity of Returned Drugs by Tracking Supply of Authorized Drugs in Supply Chain -- 19.2.2 Transparency and Traceability of Consent in Clinical Trials -- 19.2.3 Incentivized Access to Medical Data -- 19.3 Problem Setting -- 19.4 Proposed Architecture -- 19.4.1 Multichain -- 19.4.2 Off-Chain Storage -- 19.4.3 Hashing -- 19.4.4 Data Analysis -- 19.4.5 Machine Learning -- 19.4.6 Workflow -- 19.5 Conclusion -- References -- 20 Quick Insight of Research Literature Using Topic Modeling -- 20.1 Introduction -- 20.2 Literature Survey -- 20.3 Methodology -- 20.3.1 Preprocessing-Natural Language Processing -- 20.3.2 Topic Modeling -- 20.3.3 Latent Dirichlet Allocation -- 20.4 System Development -- 20.5 Experimental Results -- 20.6 Conclusion -- References -- 21 Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE) -- 21.1 Introduction -- 21.1.1 An Overview -- 21.2 Related Work -- 21.3 Proposed Methodology -- 21.3.1 Developing an Efficient Data Storage Scheme -- 21.3.2 Developing a Ciphertext Database Scheme -- 21.4 Conclusion -- References -- 22 Security Vulnerabilities of OpenStack Cloud and Security Assessment Using Different Software Tools -- 22.1 Introduction -- 22.2 Software Architecture -- 22.2.1 Components of OpenStack. , 22.2.2 OpenStack Usage in Cloud Platform -- 22.3 Vulnerabilities in OpenStack -- 22.3.1 Known Vulnerabilities in OpenStack -- 22.3.2 Assessment for Security -- 22.3.3 Network Vulnerability Scanners -- 22.4 Conclusion -- References -- 23 Smart Physical Intruder Detection System for Highly Sensitive Area -- 23.1 Introduction -- 23.2 Literature Survey -- 23.3 Proposed Methodology -- 23.3.1 Working of PIR Motion Sensor -- 23.3.2 Face Recognition Using Viola-Jones Algorithm and KNN Algorithm -- 23.4 Conclusion and Future Scope -- References -- 24 Two-level Classification of Radar Targets Using Machine Learning -- 24.1 Introduction -- 24.2 Phased Array Radar -- 24.3 Design of Multilevel Classifier -- 24.3.1 Signal Level Classification: Level ``0'' -- 24.3.2 Classification Level 1 Using Raw Detection -- 24.3.3 Level 2 Classifier Using Track Data -- 24.4 Fusion of Information with Signal Level Classifier -- 24.5 Simulation and Results -- 24.5.1 Results for Level 1 Classification -- 24.5.2 Classification Level 2 Using Radar Track and Signal Data -- 24.6 Conclusion -- References -- 25 A Cognitive Semantic-Based Approach for Human Event Detection in Videos -- 25.1 Introduction -- 25.2 Methodology -- 25.2.1 Frame Generation -- 25.2.2 Fuzzy C-Mean Clustering (FCM) -- 25.2.3 Feature Extraction -- 25.2.4 CNN Classifier -- 25.3 Test Results and Discussions -- 25.4 Conclusions -- References -- 26 Analysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador -- 26.1 Introduction -- 26.2 Materials and Methods -- 26.2.1 Materials -- 26.2.2 Methods -- 26.3 Results -- 26.4 Discussion -- 26.5 Work Futures and Conclusions -- References -- 27 Load and Renewable Energy Forecasting for System Modelling, an Effort in Reducing Renewable Energy Curtailment -- 27.1 Introduction -- 27.2 Literature Review -- 27.3 Proposed Work. , 27.3.1 Neural Network-Based Load Forecasting.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (577 pages)
    Edition: 1st ed.
    ISBN: 9789811948633
    Series Statement: Lecture Notes in Networks and Systems Series ; v.494
    DDC: 006.3
    Language: English
    Note: Intro -- Conference Organization Commitees -- Preface -- Contents -- Editors and Contributors -- A Framework for Early Recognition of Alzheimer's Using Machine Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Model Diagram -- 3.2 CatBoost Classifier -- 3.3 Model Evaluation -- 4 Environmental Setup -- 5 Results and Discussion -- 5.1 Accuracy -- 5.2 Precision -- 5.3 Recall -- 5.4 F1-Score -- 6 Conclusion and Future Direction -- References -- On the Studies and Analyzes of Facial Detection and Recognition Using Machine Learning Algorithms -- 1 Introduction -- 2 Related Study -- 3 Facial Detection and Recognition Methods -- 3.1 Machine Learning Approach -- 3.2 Deep Learning Approach -- 4 Implementation -- 4.1 Face Detection: Haar Cascade Detection Algorithm -- 4.2 Face Recognition: Local Binary Pattern Histogram (LBPH) Algorithm -- 4.3 Detection and Recognition by GoogLeNet -- 5 Results and Discussion -- 5.1 Haar Cascade Face Detection (Machine Learning Approach) -- 5.2 LBPH Face Recognition in Real Time (Machine Learning Approach) -- 5.3 GoogLeNet Image-Based Analysis (Deep Learning Approach) -- 6 Conclusion -- References -- IPL Analysis and Match Prediction -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Processing the Datasets -- 3.2 Match Analysis -- 3.3 Visualization -- 3.4 Match Prediction -- 3.5 User Interface Creation -- 4 Results and Discussion -- 5 Conclusion -- References -- Application of ANN Combined with Machine Learning for Early Recognition of Parkinson's Disease -- 1 Introduction -- 2 Literature Work -- 3 Methodology -- 4 Experimental Setup -- 5 Performance Analysis and Experimentation Results -- 6 Conclusion and Future Work -- References -- People Count from Surveillance Video Using Convolution Neural Net -- 1 Introduction -- 2 Literature Review -- 3 Dataset. , 4 Proposed Methodology -- 5 Results -- 6 Conclusion -- References -- Detection of Pneumonia and COVID-19 from Chest X-Ray Images Using Neural Networks and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 CNN Architectures -- 4 Proposed CNN Model -- 5 Experimentation and Results -- 5.1 Dataset -- 5.2 Experiment Setup -- 5.3 Results -- 5.4 Performance Evaluation -- 6 Conclusion -- References -- Plant Leaf Disease Detection and Classification Using Deep Learning Technique -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System Architecture -- 3.1 Image Acquisition -- 3.2 Image Preprocessing -- 3.3 Feature Extraction Using CNN -- 3.4 Detect and Classify Disease -- 4 Result and Analysis -- 5 Conclusion -- References -- Breast Mass Classification Using Convolutional Neural Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 About Dataset -- 3.2 Architecture of CNN -- 4 Results and Discussion -- 5 Conclusions -- References -- Deep Generative Models Under GAN: Variants, Applications, and Privacy Issues -- 1 Introduction -- 2 Generative Adversarial Networks (GANs) -- 2.1 GAN Architecture -- 2.2 Objective Function -- 3 Existing Models and Applications -- 3.1 GAN Models -- 3.2 Applications -- 4 GANs in Privacy -- 4.1 Privacy in Data -- 4.2 Privacy in Model -- 5 Future Works -- 6 Conclusion -- References -- Fusion-Based Celebrity Profiling Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Evaluation Measure -- 3.3 Stylistic Features -- 3.4 Word Embedding -- 3.5 Method -- 4 Results and Discussion -- 5 Conclusion -- References -- DeepLeaf: Analysis of Plant Leaves Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Feature Extraction -- 3.2 CNN and VGG16 -- 4 Results and Discussion -- 4.1 Comparative Analysis with Respect to Accuracy -- 5 Conclusion. , References -- Potential Assessment of Wind Power Generation Using Machine Learning Algorithms for Southern Region of India -- 1 Introduction -- 2 Wind Power Technology -- 3 Methodology -- 3.1 Linear Regression -- 3.2 Support Vector Regression -- 3.3 K-Nearest Neighbour Algorithm -- 3.4 Decision Trees Regression -- 4 Performance Indices -- 4.1 Mean Absolute Error (MAE) -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 R2 Score -- 5 Results and Discussions -- 6 Conclusions -- References -- OCR-LSTM: An Efficient Number Plate Detection System -- 1 Introduction -- 1.1 Tesseract -- 1.2 Opencv -- 1.3 Lstm -- 2 Literature Review -- 2.1 Problem Statement -- 2.2 Objective -- 3 System Model -- 3.1 Conversion of RGB Image to Gray Scale Image -- 3.2 Bilateral Filter -- 3.3 Lstm -- 4 Results and Discussion -- 5 Conclusions -- References -- Artificial Neural Network Alert Classifier for Construction Equipments Telematics (CET) -- 1 Introduction -- 2 Related Works -- 3 Problem Statement -- 4 System Model -- 4.1 Problem Formulation -- 5 Proposed Design and Methodology -- 6 Results and Discussion -- 6.1 Data Set -- 6.2 Results -- 7 Conclusions -- References -- Hybrid Approach of Modified IWD and Machine Learning Techniques for Android Malware Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed Modified Version of IWD Algorithm -- 3.1 Step 1: The Static Parameters and Dynamic Parameters are Initialized -- 3.2 Step 2: Modified Edge Selection Process -- 3.3 Step 3: Updating Velocity and Soil Values -- 3.4 Step 4: Reinforcement and Termination Phase -- 4 Feature Selection Procedure Using Modified IWD -- 5 Dataset Prepossessing and Experimental Environment -- 5.1 Dataset and Preprocessing -- 5.2 Experimental Environment -- 6 Performance Evaluation Matrix -- 7 Result and Discussions -- 8 Conclusion and Future Work -- References. , Intuitionistic Fuzzy 9 Intersection Matrix for Obtaining the Relationship Between Indeterminate Objects -- 1 Introduction -- 2 Preliminary Concepts -- 2.1 Intuitionistic Fuzzy Set -- 2.2 Intuitionistic Fuzzy Topological Spaces -- 2.3 Related Studies -- 3 Intuitionistic Fuzzy 9 Intersection Matrix -- 4 Application of the Proposed Definitions -- 4.1 Importance of the Proposed Definition -- 4.2 Intuitionistic Fuzzy 9 Intersection Matrix -- 5 Conclusion and Future Work -- References -- A Hybrid Model of Latent Semantic Analysis with Graph-Based Text Summarization on Telugu Text -- 1 Introduction -- 2 Related Work -- 3 Latent Semantic Analysis -- 4 Text Rank Algorithm -- 5 Proposed Algorithm -- 6 Evaluation and Experimental Results -- 7 Conclusion -- References -- A Combined Approach of Steganography and Cryptography with Generative Adversarial Networks: Survey -- 1 Introduction -- 2 Background Works -- 3 Advanced Techniques -- 4 Fallouts and Discussion -- 5 Conclusion -- References -- Real-Time Accident Detection and Intimation System Using Deep Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 4 Results and Discussion -- 5 Conclusion -- References -- Design of Cu-Doped SnO2 Thick-Film Gas Sensor for Methanol Using ANN Technique -- 1 Introduction -- 2 Proposed Experiment -- 3 Result and Discussion -- 4 Conclusion -- References -- Detect Traffic Lane Image Using Geospatial LiDAR Data Point Clouds with Machine Learning Analysis -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Land-Usage/Land-Coverage Change Analysis -- 4 Interpretation Concept -- 5 Conclusion and Future Scope -- References -- Classification of High-Dimensionality Data Using Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Techniques -- 3.1 Naive Bayes Algorithm -- 3.2 Support Vector Machine (SVM). , 3.3 K-Nearest Neighbor (KNN) Algorithm -- 3.4 Principal Component Analysis (PCA) -- 4 Proposed Model -- 5 Performance Evaluation Metrics -- 6 Result Analysis -- 7 Conclusion -- References -- To Detect Plant Disease Identification on Leaf Using Machine Learning Algorithms -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Dataset and Attributes -- 5 Application of the Outcomes -- 6 Result Analysis -- 7 Conclusion -- References -- Association and Correlation Analysis for Predicting the Anomaly in the Stock Market -- 1 Introduction -- 2 Related Work -- 3 Data Preparation -- 4 Methodology -- 4.1 Data Mining Association Rule -- 5 Results and Discussion -- 6 Conclusion -- References -- Early Identification of Diabetic Retinopathy Using Deep Learning Techniques -- 1 Introduction -- 1.1 Types of Diabetic Retinopathy -- 2 Literature Review -- 3 Methodology -- 4 Experimentation Setup -- 5 Dataset -- 6 Image Processing -- 6.1 Input Fundus Images -- 6.2 Gray Fundus Images -- 6.3 Gaussian Blur -- 7 Convolution Neural Network Models -- 7.1 Training Using ResNet50 and VGG16 -- 8 Result -- 8.1 Result of ResNet50 -- 8.2 Result of VGG16 -- 8.3 Comparison of Results -- 9 Conclusion -- 10 Future Work -- 11 Competing Interest -- References -- Performance Evaluation of MLP and CNN Models for Flood Prediction -- 1 Introduction -- 2 Study Area -- 3 Methodology -- 3.1 Mlp -- 3.2 CNN -- 3.3 Evaluating Constraint -- 4 Results and Discussions -- 5 Conclusion -- References -- Bidirectional LSTM-Based Sentiment Analysis of Context-Sensitive Lexicon for Imbalanced Text -- 1 Introduction -- 2 Related Work -- 2.1 Classification of Sentiments -- 2.2 Techniques of Supervised Learning -- 2.3 Techniques with No Supervision -- 2.4 Techniques for Semi-Supervised Learning -- 2.5 Ensemble Techniques -- 3 Proposed Methodology -- 3.1 Bidirectional Long Short-Term Memory (BLSTM). , 3.2 Calculating Sentiment Scores.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Computational intelligence-Congresses. ; Evolutionary computation-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (780 pages)
    Edition: 1st ed.
    ISBN: 9789811557880
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1176
    DDC: 006.3
    Language: English
    Note: Intro -- Organization -- Chief Patrons -- Patrons -- Organizing Chairs -- Publicity Chairs -- Advisory Committee -- Technical Program Committee -- Preface -- Contents -- About the Editors -- Faster Result Retrieval from Health Care Product Sales Data Warehouse Using Materialized Queries -- 1 Introduction -- 2 Implementation of MQDB for Bioteknika Healthcare Pvt. Ltd -- 3 Experimental Results -- 4 Conclusion -- References -- Sense Scheduling for Robotics Cognitive Intelligence -- 1 Introduction -- 2 Related Work -- 3 Human Though Process Test -- 4 Proposed System Architecture -- 5 Proposed Methodology -- 6 Result and Discussion -- 7 Conclusion -- 8 Conclusion -- References -- Feature Selection Using Ant Colony Optimization and Weighted Visibility Graph -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Work and Experiment -- 3.1 Feature Extraction -- 3.2 Feature Selection -- 4 Performance Analysis -- 4.1 Precision, Recall, Specificity, and F1-Score -- 4.2 Accuracy -- 4.3 False Positive Rate(FPR) and False Negative Rate(FNR) -- 5 Conclusion -- References -- From Generic to Custom: A Survey on Role of Machine Learning in Pharmacogenomics, Its Applications and Challenges -- 1 Introduction -- 2 Genomics -- 2.1 Understanding the Disease -- 2.2 Challenges -- 2.3 Data Sharing -- 3 Pharmacogenomics -- 4 Machine Learning in Pharmacogenomics -- 4.1 Genome-Wide Association Study (GWAS) -- 4.2 Evolutionary Conservation -- 4.3 Applications of Genomics in Diabetes -- 5 Conclusion -- References -- Personalised Structure Balance Theory-Based Movie Recommendation System -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Pre-processing Module -- 3.2 Product-Based Recommendation Module -- 3.3 User-Based Recommendation Module -- 3.4 Prediction Module -- 4 Results -- 5 Conclusion -- References. , Machine Learning Techniques for the Investigation of Phishing Websites -- 1 Introduction -- 2 Literature Review -- 3 Materials and Method -- 3.1 Dataset -- 3.2 Data Preparation and Preprocessing -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Feature Extraction and Classification of Gestures from Myo-Electric Data Using a Neural Network Classifier -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Data Segmentation -- 3.3 Feature Extraction and Classification -- 4 Discussion and Results -- 5 Conclusion -- References -- Text-Convolutional Neural Networks for Fake News Detection in Tweets -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Preprocessing -- 3.2 Embedding Matrix -- 3.3 Classification -- 4 Experiments -- 4.1 Dataset -- 4.2 Feature Extraction -- 5 Results and Discussion -- 6 Conclusion -- References -- Effect of Soil and Climatic Attribute on Greenhouse Gas Emission from Agriculture Sector -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Database Creation -- 3.3 Data Preprocessing -- 3.4 Feature Extraction -- 3.5 Analysis of Features -- 3.6 Prediction Model -- 4 Result Analysis -- 4.1 Crop-Wise GHGs Emission -- 4.2 Season-Wise GHGs Emission -- 4.3 Most Influencing Parameter for Prediction of GHGs Emission -- 4.4 Using Deep Learning Approach -- 5 Conclusion -- References -- Optimal Image Feature Ranking and Fusion for Visual Question Answering -- 1 Introduction -- 2 Related Work -- 2.1 Visual Question Answering -- 2.2 Image Feature Extraction -- 3 Ranking and Feature Fusion (RFF) Framework -- 3.1 Overall Architecture -- 3.2 Feature Ranking -- 3.3 Feature Fusion -- 4 Results and Discussions -- 5 Conclusion -- References -- An Investigation on Indoor Navigation Systems -- 1 Introduction. , 2 Path Selection Taxonomy -- 2.1 Uninformed Search Algorithm -- 2.2 Informed Search Algorithm -- 3 Object or Obstacle Detection Taxonomy -- 3.1 CNN Algorithm -- 3.2 RCNN Algorithm -- 3.3 Fast RCNN Algorithm -- 3.4 Faster RCNN Algorithm -- 3.5 YOLO -- 4 Conclusion -- References -- Conceptualization and Design of Remotely-Accessible Hardware Interface (RAHI) Laboratory -- 1 Introduction -- 1.1 Background and Problem Identification -- 1.2 Literature Review and Proposed Solution -- 2 Technical Description -- 2.1 Server -- 2.2 Raspberry Pi and Hardware -- 2.3 Web Application -- 3 Discussion -- 3.1 Testing -- 3.2 Analysis -- 4 Future Scope -- 5 Conclusion -- References -- A Non-invasive approach for Driver Drowsiness Detection using Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Disaster Severity Analysis from Micro-Blog Texts Using Deep-NN -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Input Layer -- 3.2 Convolution Layer -- 3.3 Max-Pooling Layer -- 3.4 RNN Layer -- 3.5 Fully Connected Layer -- 4 Experimental Setup -- 4.1 Preparation of Datasets -- 4.2 Word-Embeddings -- 4.3 Network Training -- 5 Results and Discussion -- 6 Conclusion -- References -- WEKA Result Reader-A Smart Tool for Reading and Summarizing WEKA Simulator Files -- 1 Introduction -- 2 The WEKA Result Reader (WRR) -- 3 Performance Evaluation -- 3.1 Application-Level Testing of WRR Tools -- 3.2 System-Level Testing of WRR Tools -- 4 Conclusion -- References -- Predicting Reliability of Web Services Using Hidden Markov Model -- 1 Introduction -- 2 Models of NHPP -- 3 Hidden Markov Model for Reliability Model -- 3.1 Modeling the Failure Process with HMM -- 3.2 Parameter Estimation -- 3.3 Restoration of Hidden States. , 3.4 Bayesian Information Criterion (BIC) -- 4 Experiments -- 5 Conclusion -- References -- Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels -- 1 Introduction -- 2 Recursive Visual Cryptography Scheme -- 2.1 The RVCS Model -- 2.2 Working Example of RVCS -- 3 The Proposed Model: Size-Invariant RVCS with PRWP -- 3.1 Experimental Results -- 3.2 Analysis of Experimental Results -- 4 Conclusion -- References -- Performance Analysis of Brain Imaging Using Enriched CGLS and MRNSD in Microwave Tomography -- 1 Introduction -- 1.1 Related Works -- 2 Formulation of the Proposed Forward Process -- 3 Importance of Enriched CGLS and MRNSD Regularization Methods -- 4 Numerical Results and Discussion -- 4.1 Simulation Setup and Dataset -- 4.2 Performance Analysis on Varying Number of Antennas and Frequencies -- 4.3 Performance Analysis on Noise Distortion -- 5 Conclusion -- References -- Analysis and Identification of EEG Features for Mental Stress -- 1 Introduction -- 2 Methodology -- 2.1 Brief Procedure -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 3 Results -- 4 Discussion -- 5 Conclusion -- 6 Future Work -- References -- Blockchain-Based Grievance Management System -- 1 Introduction -- 2 Benefits Over Current System -- 3 Approach -- 3.1 Working -- 3.2 System Architecture -- 3.3 Mathematical Model -- 4 Implementation -- 5 Conclusion -- References -- Utility of Neural Embeddings in Semantic Similarity of Text Data -- 1 Introduction -- 2 Neural Embedding Techniques -- 3 Methodology -- 4 Data Management -- 5 Experimental Results -- 5.1 Similarity Score Distribution -- 5.2 D-Prime -- 6 Conclusion -- References -- Big Data and Machine Learning Analytics to Detect Epileptic Seizures with Minimum Delay Using Random Window Optimization -- 1 Introduction -- 2 Big Datasets and Machine Learning. , 3 Epileptic Seizure Detection -- 4 Related Work -- 5 Methods -- 5.1 Support Vector Machine -- 5.2 Artificial Neural Network -- 6 Methodology -- 6.1 Top-K Amplitude Measure -- 6.2 Multiwindow Measure -- 6.3 Workflow -- 7 Results and Discussion -- 8 Conclusion -- References -- An Efficient Evaluation of Spatial Search on Road Networks Using G-Tree -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 G-Tree Indexing for Finding SPSP Based on Distance -- 4 Experimental Evaluation and Results -- 5 Conclusion -- References -- Investigation into the Efficacy of Various Machine Learning Techniques for Mitigation in Credit Card Fraud Detection -- 1 Introduction -- 2 Related Works -- 2.1 Machine Learning Algorithms -- 3 Proposed Methodology -- 4 Experimental Study -- 4.1 Credit Card Dataset -- 4.2 Design of Experiments -- 4.3 Performance Evaluation Measures -- 5 Results and Discussions -- 6 Conclusion and Future Work -- References -- Temporal Modeling of On-Street Parking Data for Detection of Parking Violation in Smart Cities -- 1 Introduction -- 2 Related Work -- 3 Data Collection and Preliminary Analysis -- 4 Problem Formulation -- 5 Proposed Approach -- 5.1 Proposed Detection Model -- 5.2 Proposed Algorithm -- 6 Simulation Results and Analysis -- 7 Conclusion and Future Work -- References -- Performance Optimization of Big Data Applications Using Parameter Tuning of Data Platform Features Through Feature Selection Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experiments and Results -- 5 Conclusion -- References -- Development of Emotional Decision-Making Model Using EEG Signals -- 1 Introduction -- 2 Methodology -- 2.1 Design of Experiment -- 3 Decision-Making Model -- 4 Conclusion -- References -- HMM Classifier Object Recognizing System in Brain-Computer Interface -- 1 Introduction -- 2 State of Art Development. , 3 Background.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...