GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 11
    Keywords: Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (740 pages)
    Edition: 1st ed.
    ISBN: 9789811556791
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1177
    Language: English
    Note: Intro -- Organization -- Chief Patrons -- Patrons -- Organizing Chairs -- Publicity Chairs -- Advisory Committee -- Technical Program Committee -- Preface -- About This Book -- Contents -- About the Editors -- Classification of Dry/Wet Snow Using Sentinel-2 High Spatial Resolution Optical Data -- 1 Introduction -- 2 Data Used and Study Area -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Potential of Robust Face Recognition from Real-Time CCTV Video Stream for Biometric Attendance Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Contributions -- 4 Proposed System -- 5 Algorithm -- 6 Results -- 7 Conclusion -- References -- ATM Theft Investigation Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Data Processing and Data Set -- 5 Results and Analysis -- 6 Conclusion and Future Work -- References -- Classification and Prediction of Rice Crop Diseases Using CNN and PNN -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Algorithms -- 5 Result and Discussion -- 6 Conclusion -- References -- SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed SAGRU Approach -- 3.1 Stacked Autoencoder Feature Extraction (SAFE) -- 3.2 Gated Recurrent Unit Learning (GRUL) -- 3.3 SAGRU-Based Intrusion Detection -- 4 Performance Analysis -- 5 Conclusion -- References -- Comparison of KNN and SVM Algorithms to Detect Clinical Mastitis in Cows Using Internet of Animal Health Things -- 1 Introduction -- 2 Literature Study -- 3 Methodology -- 4 A Sack for Data Acquisition and Testing -- 5 Result -- 6 Conclusion -- References -- Two-Way Face Scrutinizing System for Elimination of Proxy Attendances Using Deep Learning -- 1 Introduction -- 1.1 Comparison with Previous Works. , 2 Methodology -- 2.1 Encoding Faces Present in an Image -- 2.2 Face Recognition -- 3 Algorithm for Eliminating Proxies -- 4 Blynk -- 5 Validation -- 6 Conclusion -- References -- Ontology-Driven Sentiment Analysis in Indian Healthcare Sector -- 1 Introduction -- 2 Literature Overview -- 3 Ayushman Bharat Yojana (PM Jan Arogya Yojana) -- 3.1 Key Benefits of the Scheme -- 3.2 Beneficiaries of the Scheme -- 3.3 Impact of the Scheme on the Beneficiaries -- 4 An Overview of the Ontology -- 4.1 Tools and Resources Used -- 4.2 Ontology: An Overview -- 5 Proposed Work -- 5.1 Data Acquisition -- 5.2 Data Cleaning and Preprocessing -- 5.3 Extracting Features -- 5.4 Training the Model -- 6 Observations and Results -- 7 Conclusion -- 8 Future Work -- References -- Segmentation of Nuclei in Microscopy Images Across Varied Experimental Systems -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Dataset Used -- 3.2 Data Augmentation Used -- 3.3 Model Architecture -- 3.4 Loss Function Used -- 3.5 Evaluation Metric Used -- 4 Experiments and Results -- 5 Conclusion -- References -- Transitional and Parallel Approach of PSO and SGO for Solving Optimization Problems -- 1 Introduction -- 1.1 Traditional Optimization Tools -- 1.2 Non-traditional Optimization Tools -- 2 Preliminaries -- 2.1 Function Optimization -- 2.2 Benchmark Functions -- 2.3 Evolutionary Technique -- 3 Proposed Approach: Hybridization PSO with SGO -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- Remote Sensing-Based Crop Identification Using Deep Learning -- 1 Introduction -- 2 Literature Study -- 3 Methodology -- 3.1 Overview of Proposed Method -- 3.2 Convolution -- 3.3 Max pooling -- 3.4 Dense Node -- 3.5 Softmax -- 4 Results and Discussion -- 5 Conclusion -- References. , Three-Level Hierarchical Classification Scheme: Its Application to Fractal Image Compression Technique -- 1 Introduction -- 2 Basic FIC Technique -- 3 Proposed Three-Level Hierarchical Classification (3-LHC) Scheme -- 3.1 Elementary Analysis -- 3.2 Proposed Modification -- 4 Results and Analysis -- 5 Conclusion -- References -- Prediction of POS Tagging for Unknown Words for Specific Hindi and Marathi Language -- 1 Introduction -- 1.1 POS Tagging -- 1.2 Limitations of Current POS Tagging System -- 2 Related Work -- 3 Contributions -- 4 Proposed Methodology -- 4.1 Hidden Markov Model -- 4.2 Viterbi Algorithm -- 4.3 Naïve Bayes Algorithm -- 5 Result and Analysis -- 6 Conclusion -- 7 Future Work -- References -- Modified Multi-cohort Intelligence Algorithm with Panoptic Learning for Unconstrained Problems -- 1 Introduction and Literature Review -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Sentiment Analysis on Movie Review Using Deep Learning RNN Method -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 4 Implementation Tools -- 5 Performance Analysis -- 6 Conclusions and Future Work -- References -- Super Sort Algorithm Using MPI and CUDA -- 1 Introduction -- 2 Sorting Algorithm -- 3 Result -- 4 Conclusion and Future Work -- References -- Significance of Network Properties of Function Words in Author Attribution -- 1 Introduction -- 2 Author Identification Problem -- 3 Related Works -- 4 Complex Network Approach to Author Identification Problem -- 4.1 Methodology -- 5 Results and Discussions -- 6 Conclusion -- References -- Performance Analysis of Periodic Defected Ground Structure for CPW-Fed Microstrip Antenna -- 1 Introduction -- 2 Design of CPW-Fed Microstrip Antenna -- 3 Circular-Shaped PDGS Structure -- 4 Fabrication and Validation of Antenna -- 5 Conclusion -- References. , Energy Aware Task Consolidation in Fog Computing Environment -- 1 Introduction -- 2 Related Works -- 3 Fog Computing Architecture -- 4 Proposed Energy-Saving Task Consolidation Algorithm -- 5 Simulation Results -- 6 Conclusion -- References -- Modelling CPU Execution Time of AES Encryption Algorithm as Employed Over a Mobile Environment -- 1 Introduction -- 2 Related Literature -- 3 Description of Our Model -- 3.1 Scheme 1 -- 3.2 Scheme 2 -- 4 Experimental Analysis of Data -- 4.1 Scheme 1 -- 4.2 Scheme 2 -- 5 Comparison of Models -- 5.1 Scheme 1 -- 5.2 Scheme 2 -- 5.3 Comparison Between Scheme 1 and Scheme 2 -- 6 Conclusions -- References -- Gradient-Based Feature Extraction for Early Termination and Fast Intra Prediction Mode Decision in HEVC -- 1 Introduction -- 2 Proposed Algorithm -- 3 Experimental Results -- 4 Conclusion -- References -- A Variance Model for Risk Assessment During Software Maintenance -- 1 Introduction -- 2 Risks in Software Development and Maintenance -- 3 Factors in Software Risk Assessment During Maintenance -- 3.1 Testing-Related Risk Factors -- 4 Variance Model for Software Risk Assessment -- 5 Discussion of the Variance Model -- 5.1 Development of a Risk Measurement Toolkit -- 5.2 Maturing of the Risk Model: An Aquatic Profile for Risk Maturity Management (APRMM) -- 6 Conclusions -- References -- Cyber Attack Detection Framework for Cloud Computing -- 1 Introduction -- 2 Cloud Security Attacks -- 3 Proposed Framework -- 3.1 Data Capturing -- 3.2 Filtering and Feature Extraction -- 3.3 Intrusion Detection Model Design -- 3.4 Knowledge Extraction Block -- 4 Performance Evaluation of Proposed Framework -- 4.1 Result Analysis -- 5 Conclusion -- References -- Benchmarking Semantic, Centroid, and Graph-Based Approaches for Multi-document Summarization -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology. , 3.1 Sort by Importance Score Algorithm -- 3.2 K-Means Clustering -- 3.3 Gaussian Mixture Method -- 3.4 Graph-Based Approach -- 4 Experimental Results and Analysis -- 5 Conclusion and Future Work -- References -- Water Availability Prediction in Chennai City Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Support Vector Regression -- 4 Experimental Results and Analysis -- 4.1 Analysis of Water Levels of Reservoirs -- 4.2 Analysis of Rainfall Levels of Reservoir Regions -- 4.3 Analysis of Chennai Population -- 4.4 Prediction of Water Availability per Person -- 5 Conclusion and Future Work -- References -- Field Extraction and Logo Recognition on Indian Bank Cheques Using Convolution Neural Networks -- 1 Introduction -- 2 Background -- 2.1 Object Detection -- 3 Proposed Methodology -- 3.1 Preprocessing -- 3.2 Localization -- 3.3 Bank Name and Logo Recognition -- 3.4 Experimental Setting -- 4 Dataset Description -- 4.1 Evaluation Metrics -- 5 Results and Discussions -- 6 Conclusions -- References -- A Genetic Algorithm Based Medical Image Watermarking for Improving Robustness and Fidelity in Wavelet Domain -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 3.1 Proposed Multiple Watermarks Embedding in Wavelet Domain -- 3.2 Proposed Chromosome-Based Encoding for Finding Optimal Embedding Location -- 3.3 Chromosome Selection -- 3.4 Crossover and Mutation -- 4 Watermark Extraction and Genetic Algorithm Process -- 5 Experimental Results and Discussions -- 6 Conclusion -- References -- Developing Dialog Manager in Chatbots via Hybrid Deep Learning Architectures -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Preparation -- 3.2 Word2Vec Embedding + 1DCNN + LSTM (W1CNNL) -- 3.3 Word2Vec + CNN Embedding + LSTM (WCNNL). , 3.4 Word2Vec + BiLSTM with Attention Embedding + LSTM (WBWAL).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (498 pages)
    Edition: 1st ed.
    ISBN: 9789811500770
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.165
    Language: English
    Note: Intro -- Organizing Committee -- Preface -- Contents -- About the Editors -- 1 Comparison of Different Image Segmentation Techniques on MRI Image -- 1.1 Introduction -- 1.2 Methodology -- 1.2.1 Preprocessing -- 1.2.2 Segmentation Techniques -- 1.3 Results and Discussion -- 1.4 Conclusion -- References -- 2 PSO-ANN-Based Computer-Aided Diagnosis and Classification of Diabetes -- 2.1 Introduction -- 2.1.1 Literature Survey -- 2.2 Feature Selection Approaches -- 2.3 Particle Swarm Optimization (PSO) -- 2.4 Proposed Feature Selection Algorithm -- 2.5 Experimental Results -- 2.6 Conclusion -- References -- 3 Round Robin Scheduling Based on Remaining Time and Median (RRRT& -- M) for Cloud Computing -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Scheduling Algorithms -- 3.4 Experimental Setup and Result Discussions -- 3.4.1 Experimental Setup -- 3.4.2 Performance Metrics -- 3.4.3 Result Discussions -- 3.5 Summary -- References -- 4 Business-Driven Blockchain-Mempool Model for Cooperative Optimization in Smart Grids -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Virtual Power Plant Dispatch Schedules -- 4.3.1 Cost Function Based Optimization -- 4.4 Blockchain -- 4.4.1 Consensus -- 4.5 Consensus and Cooperative Scheduling -- 4.6 Mempool Model -- 4.7 Evaluation and Future Work -- 4.8 Conclusion -- References -- 5 Research of Institutional Technology Diffusion Rules Based on Patent Citation Network-A Case Study of AI Field -- 5.1 Introduction -- 5.2 Data and Method -- 5.3 Results and Discussion -- 5.3.1 Comparative Analysis of Technical Force -- 5.3.2 Technology Diffusion Network and Visualization -- 5.3.3 Measurement of Technology Diffusion Capacity -- 5.4 Conclusion and Limitation -- References -- 6 Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador -- 6.1 Introduction. , 6.2 Materials and Methods -- 6.2.1 Materials -- 6.2.2 Methods -- 6.3 Results -- 6.4 Discussion -- 6.5 Future Work and Conclusion -- References -- 7 Appropriate Security Protocols to Mitigate the Risks in Electronic Money Management -- 7.1 Introduction -- 7.2 Materials and Methods -- 7.2.1 Materials -- 7.2.2 Methods -- 7.3 Results -- 7.4 Discussion -- 7.5 Future Works and Conclusion -- 7.5.1 Future Works -- 7.5.2 Conclusions -- References -- 8 Acceptance and Readiness of Thai Farmers Toward Digital Technology -- 8.1 Introduction -- 8.2 Research Model -- 8.3 Method -- 8.3.1 Questionnaire Instrument -- 8.3.2 Data Analysis -- 8.4 Results -- 8.5 Conclusion -- References -- 9 Neural Network Classifier for Diagnosis of Diabetic Retinopathy -- 9.1 Introduction -- 9.2 Classification -- 9.3 Conclusion -- References -- 10 Comparative Analysis of Data Mining Classification Techniques for Prediction of Heart Disease Using the Weka and SPSS Modeler Tools -- 10.1 Introduction -- 10.2 Literature Review -- 10.2.1 Data Mining Classification Techniques -- 10.3 Experimental Analysis -- 10.3.1 Dataset -- 10.3.2 Result Analysis -- References -- 11 An Automated Framework to Uncover Malicious Traffic for University Campus Network -- 11.1 Introduction -- 11.2 Study Goals -- 11.3 Methodology -- 11.4 Experimental Setup -- 11.5 Observations and Analysis of Framework in Campus Network on Real-Time Basis -- 11.5.1 Dashboard Visualization for Analysis -- 11.6 Conclusion -- 11.7 Future Scope -- References -- 12 Comparative Analysis of K-Means Algorithm and Particle Swarm Optimization for Search Result Clustering -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Experimental Result and Analysis -- 12.3.1 Dataset Details -- 12.3.2 Preprocessing -- 12.3.3 Performance Evaluation -- 12.4 Conclusion -- References. , 13 Design and Implementation of Rule-Based Hindi Stemmer for Hindi Information Retrieval -- 13.1 Introduction -- 13.2 Stemming Approaches -- 13.2.1 Affix Removal Approach -- 13.2.2 N-Gram -- 13.2.3 Suffix Stripping Approach -- 13.2.4 Suffix Substitution Approach -- 13.2.5 Brute-Force Approach -- 13.2.6 Hybrid Approach -- 13.3 Related Work -- 13.4 Proposed Methodology and Implementation -- 13.5 Analysis and Conclusion -- References -- 14 Research on the Development Trend of Ship Integrated Power System Based on Patent Analysis -- 14.1 Introduction -- 14.2 Data and Methods -- 14.3 Results and Discussion -- 14.3.1 Life Cycle Analysis of Patent Technology Development of Foreign Ship Integrated Power System -- 14.3.2 Analysis of Patent Technology Research and Development Direction of Foreign Ship Integrated Power System -- 14.4 Summary -- References -- 15 Detection of Data Anomalies in Fog Computing Architectures -- 15.1 Introduction -- 15.2 Fog Architecture Overview -- 15.3 Anomaly Detection -- 15.3.1 Anomalies -- 15.3.2 Preliminaries for Detection Algorithm -- 15.3.3 Detection Procedure -- 15.4 Computation Algorithm -- 15.5 Related Work -- 15.6 Conclusion -- References -- 16 Cloud Data for Marketing in Tourism Sector -- 16.1 Introduction -- 16.2 Consumer Behavioral Study for the Tourism Industry -- 16.3 Sources of Data -- 16.3.1 Methods of Sourcing Data from Internet -- 16.4 Model for Marketing Data Capture -- 16.4.1 Prediction Theories -- 16.4.2 Marketing -- 16.5 Results -- 16.6 Conclusion -- References -- 17 Road Travel Time Prediction Method Based on Random Forest Model -- 17.1 Introduction -- 17.2 The Principle of Random Forest Algorithm -- 17.3 The Principle of DBSCAN -- 17.4 The Prediction Model of RF-DBSCAN -- 17.4.1 Data Sources -- 17.4.2 Feature Selection -- 17.4.3 The Principle of RF-DBSCAN -- 17.4.4 Comparison of Experiment Results. , 17.5 Conclusions -- References -- 18 Video Synchronization and Alignment Using Motion Detection and Contour Filtering -- 18.1 Introduction -- 18.1.1 Overview -- 18.1.2 Problem Statement -- 18.1.3 Objectives -- 18.1.4 Existing System -- 18.1.5 Proposed System -- 18.2 Literature Survey -- 18.3 System Design -- 18.4 Dataflow of Video Change Detection -- 18.5 Class Diagrams -- 18.6 Experimental Results -- 18.7 Conclusion -- References -- 19 Mutichain Enabled EHR Management System and Predictive Analytics -- 19.1 Introduction -- 19.2 Related Work -- 19.2.1 Verifying the Authenticity of Returned Drugs by Tracking Supply of Authorized Drugs in Supply Chain -- 19.2.2 Transparency and Traceability of Consent in Clinical Trials -- 19.2.3 Incentivized Access to Medical Data -- 19.3 Problem Setting -- 19.4 Proposed Architecture -- 19.4.1 Multichain -- 19.4.2 Off-Chain Storage -- 19.4.3 Hashing -- 19.4.4 Data Analysis -- 19.4.5 Machine Learning -- 19.4.6 Workflow -- 19.5 Conclusion -- References -- 20 Quick Insight of Research Literature Using Topic Modeling -- 20.1 Introduction -- 20.2 Literature Survey -- 20.3 Methodology -- 20.3.1 Preprocessing-Natural Language Processing -- 20.3.2 Topic Modeling -- 20.3.3 Latent Dirichlet Allocation -- 20.4 System Development -- 20.5 Experimental Results -- 20.6 Conclusion -- References -- 21 Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE) -- 21.1 Introduction -- 21.1.1 An Overview -- 21.2 Related Work -- 21.3 Proposed Methodology -- 21.3.1 Developing an Efficient Data Storage Scheme -- 21.3.2 Developing a Ciphertext Database Scheme -- 21.4 Conclusion -- References -- 22 Security Vulnerabilities of OpenStack Cloud and Security Assessment Using Different Software Tools -- 22.1 Introduction -- 22.2 Software Architecture -- 22.2.1 Components of OpenStack. , 22.2.2 OpenStack Usage in Cloud Platform -- 22.3 Vulnerabilities in OpenStack -- 22.3.1 Known Vulnerabilities in OpenStack -- 22.3.2 Assessment for Security -- 22.3.3 Network Vulnerability Scanners -- 22.4 Conclusion -- References -- 23 Smart Physical Intruder Detection System for Highly Sensitive Area -- 23.1 Introduction -- 23.2 Literature Survey -- 23.3 Proposed Methodology -- 23.3.1 Working of PIR Motion Sensor -- 23.3.2 Face Recognition Using Viola-Jones Algorithm and KNN Algorithm -- 23.4 Conclusion and Future Scope -- References -- 24 Two-level Classification of Radar Targets Using Machine Learning -- 24.1 Introduction -- 24.2 Phased Array Radar -- 24.3 Design of Multilevel Classifier -- 24.3.1 Signal Level Classification: Level ``0'' -- 24.3.2 Classification Level 1 Using Raw Detection -- 24.3.3 Level 2 Classifier Using Track Data -- 24.4 Fusion of Information with Signal Level Classifier -- 24.5 Simulation and Results -- 24.5.1 Results for Level 1 Classification -- 24.5.2 Classification Level 2 Using Radar Track and Signal Data -- 24.6 Conclusion -- References -- 25 A Cognitive Semantic-Based Approach for Human Event Detection in Videos -- 25.1 Introduction -- 25.2 Methodology -- 25.2.1 Frame Generation -- 25.2.2 Fuzzy C-Mean Clustering (FCM) -- 25.2.3 Feature Extraction -- 25.2.4 CNN Classifier -- 25.3 Test Results and Discussions -- 25.4 Conclusions -- References -- 26 Analysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador -- 26.1 Introduction -- 26.2 Materials and Methods -- 26.2.1 Materials -- 26.2.2 Methods -- 26.3 Results -- 26.4 Discussion -- 26.5 Work Futures and Conclusions -- References -- 27 Load and Renewable Energy Forecasting for System Modelling, an Effort in Reducing Renewable Energy Curtailment -- 27.1 Introduction -- 27.2 Literature Review -- 27.3 Proposed Work. , 27.3.1 Neural Network-Based Load Forecasting.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 13
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (835 pages)
    Edition: 1st ed.
    ISBN: 9789811510847
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1034
    Language: English
    Note: Intro -- Conference Organization Committees -- Chief Patrons -- Patrons -- Honorary Chairs -- General Chair -- Publication Chair -- Organizing Chairs -- Technical Program Chair -- Organizing Secretaries -- Program Secretaries -- Advisory Committee -- Technical Program Committee -- Preface -- About This Book -- Contents -- About the Editors -- Task Scheduling in Heterogeneous Cloud Environment-A Survey -- 1 Introduction -- 2 Classification of Task Scheduling -- 3 Scheduling Model in the Cloud Datacenters -- 4 Existing Task Scheduling Algorithms -- 4.1 Heuristic Task Scheduling -- 5 Scheduling Parameters -- 6 Comparison of Existing Scheduling Algorithm -- 7 Conclusion -- References -- Improving the Efficiency of Ensemble Classifier Adaptive Random Forest with Meta Level Learning for Real-Time Data Streams -- 1 Introduction -- 2 Problem Statements -- 3 Related Works -- 4 The Proposed Modified Adaptive Random Forest Algorithm -- 5 Experimental Settings -- 6 Results and Conclusion -- References -- Plain Text Encryption Using Sudoku Cipher -- 1 Introduction -- 2 Techniques for Solving Sudoku Puzzle -- 3 Proposed Algorithm for Plaintext Encryption Using Sudoku Puzzle -- 4 Experimental Results -- 4.1 Computational Complexity of the Proposed Algorithm -- 5 Conclusion -- References -- Performance Comparison Between Different Dispersion Compensation Methods in an Optical Link -- 1 Introduction -- 2 Dispersion Compensating Fiber (DCF) and Polarization Controller (PC) -- 3 Simulation Setup -- 4 Results and Discussions -- 5 Conclusions -- References -- First Steps in the Automatic Classification of Legal Sentences -- 1 Introduction -- 2 State of the Art -- 3 Methodology -- 4 Experimentation -- 5 Conclusions -- References -- The Dissociation Between Polarity and Emotional Tone as an Early Indicator of Cognitive Impairment: Second Round -- 1 Introduction. , 2 Methodology -- 3 Experimentation -- 4 Conclusions and Future Work -- References -- Congestion Control in Optical Burst Switching Networks Using Differential Evolution Optimization -- 1 Introduction -- 2 Related Works -- 3 System Methodology -- 4 Experimental Results -- 5 Conclusion -- References -- Locality Parameters for Privacy Preserving Protocol and Detection of Malicious Third-Party Auditors in Cloud Computing -- 1 Introduction -- 2 Related Works -- 3 Proposed Algorithm -- 4 Results and Discussions -- 5 Conclusion -- References -- Analysis of NaCl Electrolyte Based SOI-ISFET pH Sensor -- 1 Introduction -- 2 ISFET Overview -- 2.1 ISFET Geometry -- 2.2 ISFET Parameters -- 2.3 ISFET Operating Principle -- 3 ISFET DC and AC Equations -- 4 Results and Discussion -- 5 Conclusion -- References -- Quantitative Modeling and Simulation for Stator Inter-turn Fault Detection in Industrial Machine -- 1 Introduction -- 2 Methodology -- 2.1 Experimental Setup -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 2.4 Fault Classification -- 3 Modeling and Simulation -- 3.1 Mathematical Modeling of Induction Machine -- 3.2 Simulation Results -- 4 Validation -- 5 Conclusion -- 6 Future Scope -- References -- CMOS-Based XOR Gate Design for Full Swing Output Voltage and Minimum Power Delay Product (PDP) -- 1 Introduction -- 1.1 Review of XOR/XNOR Gate -- 2 Proposed XOR/XNOR Circuits -- 3 Power-Delay Product (PDP) Optimization -- 4 Simulation and Performance Analysis of XOR Circuit -- 5 Conclusion -- References -- Potential Threat Detection from Industrial Accident Reports Using Text Mining -- 1 Introduction -- 2 Overview of Methodology -- 2.1 Data Preprocessing -- 2.2 Text Mining -- 3 Case Study -- 3.1 Dataset -- 3.2 Sample Output -- 3.3 Performance Measures -- 3.4 Results and Discussions -- 4 Conclusion -- References. , Bagging for Improving Accuracy of Diabetes Classification -- 1 Introduction -- 2 Literature Survey -- 3 Mathematical Model of the Bagged Prediction Method -- 4 Algorithm to Train a Bagged Logistic Regression for Improving Predictions -- 5 Results -- 5.1 Receiver Operating Characteristics (ROC) -- 5.2 Comparison -- 6 Conclusions -- References -- Two-Way Handshake User Authentication Scheme for e-Banking System -- 1 Introduction -- 2 Previous Study -- 3 Proposed System -- 4 Results and Conclusion -- References -- Periocular Biometrics for Non-ideal Images Using Deep Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experiments and Results -- 5 Discussion -- 5.1 Comparison with Already Existing Work in Literature -- 6 Conclusion and Future Work -- 7 Future Work -- References -- An Elliptic Curve Cryptography-Based Multi-Server Authentication Scheme Using Cancelable Biometrics -- 1 Introduction -- 2 Proposed Scheme -- 2.1 Server Registration Phase -- 2.2 User Registration Phase -- 2.3 Login Phase -- 2.4 Mutual Authentication and Key Exchange Phase -- 2.5 Password and Biometric Change Phase -- 2.6 Smart Card Revocation Phase -- 3 Security Analysis -- 3.1 Formal Security Analysis -- 3.2 Informal Security Analysis -- 3.3 Performance Analysis -- 4 Conclusion -- References -- Dynamic TDMA Scheduling for Topology Controlled Clustering in Wireless Sensor Networks -- 1 Introduction -- 2 TL-LEACH: A Hierarchical Routing Protocol -- 3 Proposed Solution -- 4 Algorithm -- 5 Simulation and Result Analysis -- 6 Conclusion and Future Scope -- References -- Deep Learning-Based Music Chord Family Identification -- 1 Introduction -- 2 Dataset -- 3 Proposed Method -- 3.1 Preprocessing -- 4 Feature Extraction -- 4.1 Deep Learning-Based Classification -- 5 Result and Analysis -- 6 Conclusion -- References. , A Multilevel CNN Architecture for Character Recognition from Palm Leaf Images -- 1 Introduction -- 2 Related Work -- 3 Multilevel CNN Architecture -- 3.1 Image Pyramid Layer -- 3.2 CNN Layers -- 3.3 Concatenation Layer -- 3.4 Fully Connected Layers -- 4 Experimental Analysis -- 5 Conclusion -- References -- Novel Multimodel Approach for Marathi Speech Emotion Detection -- 1 Introduction -- 2 Database Creation -- 3 Formulating Problem Statement: Block Diagram of SER -- 4 Proposed Work--Preprocessing -- 5 Proposed Work--Feature Extraction -- 6 Proposed Work--Artificial Neural Network (ANN) -- 7 Results -- 8 Conclusion -- References -- Assessment of Autistic Disorder Using Machine Learning Approach -- 1 Introduction -- 2 Literature Survey -- 3 Data Collection and Description -- 3.1 WEKA -- 4 Methodology -- 5 Result and Discussions -- 6 Conclusion -- References -- Use of Data Mining Techniques for Data Balancing and Fraud Detection in Automobile Insurance Claims -- 1 Introduction -- 2 Related Work -- 3 Background Study -- 3.1 Fuzzy C-Means Clustering (FCM) -- 3.2 Box and Whisker Plot -- 3.3 Synthetic Minority Oversampling (SMOTE) -- 3.4 Majority Voting -- 4 Proposed Approach -- 5 Results and Discussions -- 5.1 Explanation and Preprocessing of Insurance Fraud Dataset -- 5.2 Performance Analysis -- 6 Conclusions -- References -- Application of Generalized Possibilistic Fuzzy C-Means Clustering for User Profiling in Mobile Networks -- 1 Introduction -- 2 Related Work -- 3 Background Study -- 4 Proposed Approach -- 5 Experimental Results and Discussions -- 5.1 Cluster Validation -- 5.2 Cluster Analysis -- 6 Conclusions -- References -- A Method to Detect Blink from the EEG Signal -- 1 Introduction -- 2 Data Acquisition -- 2.1 Process of EEG Data Acquisition -- 2.2 EOG Data Acquisition -- 3 Blink Detection -- 4 Results -- 5 Applications -- 6 Conclusions. , References -- Power-Efficient Reversible Logic Design of S-Box for N-Bit AES -- 1 Introduction -- 1.1 Reversible Logic -- 2 S-Box Design Methodology -- 2.1 Multiplicative Inverse -- 2.2 Isomorphic Mapping and Inverse Isomorphic Mapping -- 2.3 Arithmetic Operations in Composite Field -- 2.4 Multiplication with Constant λ -- 2.5 Multiplication in GF(24) -- 2.6 Multiplication in GF(22) -- 2.7 Multiplication with Constant φ -- 2.8 Multiplicative Inversion in GF(24) -- 2.9 Affine Transformation and Its Inverse -- 3 Testing Environment -- 4 Conclusion -- References -- Salient Edge(s) and Region(s) Extraction for RGB-D Image -- 1 Introduction -- 2 Proposed System -- 2.1 Salient Edge Extraction from Depth Map -- 2.2 Colour Saliency Map Extraction from the RGB Image -- 2.3 Fusion of Salient Edge and Colour Saliency Map Resume -- 3 Experimental Results and Analysis -- 3.1 Evaluation Metrics -- 4 Conclusion -- References -- Web Text Categorization: A LSTM-RNN Approach -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Feature -- 3.4 Deep Learning-Based Classification -- 4 Results and Discussion -- 4.1 Comparison with Existing Methods -- 5 Conclusion -- References -- Closed-Set Device-Independent Speaker Identification Using CNN -- 1 Introduction -- 2 Audio Preprocessing -- 2.1 Preemphasis -- 2.2 Silence Frame Removal -- 2.3 Log-Spectrogram -- 3 CNN Architecture -- 4 Experiment, Results, and Discussion -- 4.1 Data Preparation -- 4.2 CNN Model Training -- 4.3 Identification Using CNN -- 4.4 Performance Measure -- 4.5 Results -- 5 Conclusion -- References -- A Novel and Efficient Spatiotemporal Oxygen Production Estimation Based on Land Vegetation Using PNN and Convolutional Autoencoder -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Forest Cover Detection and Forest Change. , 3.2 Dimensionality Reduction.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Translocation (Genetics). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (171 pages)
    Edition: 1st ed.
    ISBN: 9789811305931
    Series Statement: Advances in Experimental Medicine and Biology Series ; v.1044
    DDC: 572.877
    Language: English
    Note: Intro -- Contents -- 1: Historical and Clinical Perspectives on Chromosomal Translocations -- 1.1 Introduction and Background -- 1.2 Early Observations of Translocations -- 1.3 Clinical Relevance of Translocations -- 1.3.1 Balanced Translocation Carriers Have Higher Risks of Infertility, Miscarriage, and Unbalanced Progeny -- 1.3.2 Some Somatic Translocations Initiate Transformation of Cancer Cells -- 1.3.3 Balanced Reciprocal Translocations Are Etiologic for Many Clinical Phenotypes -- 1.3.4 Resolution of Translocation Breakpoints by Sequencing Provides New Information -- 1.3.5 Mapping the Regulatory Genome with Translocations -- 1.4 Summary -- References -- 2: Induction of Chromosomal Translocations with CRISPR-Cas9 and Other Nucleases: Understanding the Repair Mechanisms That Give Rise to Translocations -- 2.1 Introduction -- 2.2 Multiple DSB Repair Pathways: Repairing a Dangerous Lesion -- 2.3 Elucidation of Translocation Mechanisms in Mouse Cells Using a Rare-Cutting Endonuclease -- 2.4 When ZFNs Then TALENs Arrived on the Scene: Tailored Nucleases for Tailored Translocations -- 2.5 The CRISPR-Cas9 Revolution: When Easy Is Made Easier -- 2.6 Isolating Translocation Clones -- 2.7 Modeling Oncogenesis Using Programmable Nucleases: First Steps Towards Full Transformation In Vivo -- 2.8 Elucidation of Translocation Mechanisms in Human Cells Using Programmable Nucleases -- 2.9 How Model Systems Recapitulate Patient Breakpoints -- References -- 3: Dynamics of Double-Strand Breaks: Implications for the Formation of Chromosome Translocations -- 3.1 Introduction -- 3.2 Chromatin Motion -- 3.3 Double-Strand Break Dynamics: Lessons from Yeast and Mammalian Cells -- 3.4 The Role of Cytoskeletal Components in Motion of Intact Chromosome Loci and DSBs: Random or Directed Motion?. , 3.5 Partner Search, Clustering and Synapsis of DSBs in the Nucleus -- 3.6 Dynamics of DSBs and Translocation Formation -- 3.7 Conclusions -- References -- 4: The CRISPR/Cas9 System as a Tool to Engineer Chromosomal Translocation In Vivo -- 4.1 Introduction of CRISPR/Cas9 System -- 4.2 Applications of Nucleases to Engineer Chromosomal Rearrangements -- 4.3 Model Genomic Rearrangements Engineered with the CRISPR/Cas9 System In Vitro -- 4.3.1 Chromosomal Translocations -- 4.3.2 Genomic Deletions and Insertions -- 4.3.3 Genomic Inversions -- 4.4 Model Chromosomal Rearrangements Engineered by the CRISPR/Cas9 System In Vivo -- 4.4.1 Mouse Models of Cancer and Genetic Diseases -- 4.4.2 Mouse Models by Embryonic Stem (ES) Cells Engineering -- 4.5 Conclusions -- References -- 5: Generation of Genomic Alteration from Cytidine Deamination -- 5.1 AID/APOBEC Deaminase Family -- 5.1.1 RNA or DNA Deamination Model -- 5.1.2 Cytidine Deaminase Domain and Structure -- 5.1.3 DNA Sequence Motif Preference and Deamination Signature -- 5.2 Programmed DNA Lesion in Immunity -- 5.2.1 Secondary Immune Cell Receptor Diversification Initiated by AID -- 5.2.2 Innate Anti-viral Activity of APOBEC3s -- 5.3 Collateral Effects of Cytidine Deamination -- 5.3.1 Discovery of AID-dependent Translocations and Mutations -- 5.3.2 Systematic Identification of AID Off-targets -- 5.3.3 Pervasive APOBEC3 Signature in Cancer Genomes -- 5.4 Multilayer Regulation of AID Deamination -- 5.4.1 Regulation of AID Expression -- 5.4.2 Intracellular Localization of AID Protein -- 5.4.3 Post-translation Modification of AID Protein -- 5.4.4 Specific Genomic Targeting of AID -- 5.4.5 AID Cofactors and Activity Regulation -- 5.5 Future -- References -- 6: The Role for the DSB Response Pathway in Regulating Chromosome Translocations. , 6.1 The DNA Damage Response (DDR) at Sites of Double-­Strand Breaks (DSBs) -- 6.1.1 Overview: ATM Orchestrates the DDR in Mammalian Cells -- 6.1.2 General Mechanisms of Translocation Suppression by the DDR -- 6.2 Mammalian Genetic Models to Study Roles for the DDR in Translocation Suppression -- 6.2.1 Genetically Engineered Mouse Models (GEMM) of DDR Deficiency -- 6.2.2 Human Genetic Syndromes of DDR Deficiency: Ataxia-Telangiectasia -- 6.3 The DDR Suppresses Chromosomal Translocations During V(D)J Recombination -- 6.3.1 Mechanisms of V(D)J Recombination -- 6.3.2 RAG-Dependent Breaks and Translocations in DDR-­Deficient Mice -- 6.3.3 RAG-Dependent Break and Translocations in Ataxia-­Telangiectasia Patients -- 6.4 The DDR Suppresses Chromosomal Translocations During Class Switch Recombination -- 6.4.1 Mechanisms of Class Switch Recombination -- 6.4.2 AID-Dependent Breaks and Translocations in DDR-­Deficient Mice -- 6.4.3 AID-Dependent Breaks and Translocations in A-T Patients -- References -- 7: Telomeres and Chromosomal Translocations -- 7.1 Introduction -- 7.2 DNA Damage -- 7.3 DNA Repair -- 7.3.1 DNA Repair Involving Only a Single Strand -- 7.3.2 DNA Double-Strand Break Repair -- 7.3.2.1 C-NHEJ -- 7.3.2.2 A-NHEJ -- 7.3.2.3 HDR -- 7.4 Translocations -- 7.4.1 DSBs and Translocations -- 7.4.1.1 Of Men, Mice and Translocations -- 7.4.1.2 Spatial Karma and Translocations -- 7.4.1.3 Selection, Not the Translocation, Drives Cancer -- 7.4.2 Considerations for When One DSB is a Telomeric End -- 7.4.2.1 Telomeres Stabilize the Genome -- 7.4.2.2 Translocations Involving Telomeres are Mechanistically Distinct -- 7.4.2.3 Translocations Involving Human Telomeres can be Mediated by LIGIII or LIGIV -- 7.4.2.4 Translocations Involving Human Telomeres can be Mediated by LIGI -- 7.5 Summary and Future Considerations -- References. , 8: 3D Genome Organization Influences the Chromosome Translocation Pattern -- 8.1 Introduction -- 8.2 The Impact of Spatial Proximity on Partner Selection in DNA Break Repair -- 8.2.1 Evidence from Imaging Methods -- 8.2.2 Implications of DNA DSB Movement -- 8.3 Conceptual Contributions from Chromosome Conformation Capture -- 8.3.1 Characterizing Pre-existing 3D Genome Structure Before Translocations to Link Translocation Frequency to 3D Structure -- 8.3.2 3C-Based Methods for Agnostic Translocation Identification -- 8.3.3 Interpreting the Biological/Medical Impact of Translocations -- 8.4 Importance of Heterogeneity in Interpreting the Influence of 3D Genome Organization -- 8.5 Widespread DSBs Exacerbate 3D Genome Proximity Effects on Translocations: Implications for Radiation-­Induced Translocations -- 8.6 3D Genome Contributions to DSB Incidence and Control of DNA Repair -- 8.7 Key Persistent Questions -- 8.7.1 How Can We Reconcile 3D DSB Movement with 3D Genome Stability and Influence on Translocations? -- 8.7.2 How Much Do DSBs and Translocations Affect Existing 3D Genome Structure? -- 8.7.3 Do Pre-cancerous 3D Genome Organization Changes Affect Which Translocations Occur and Thus Affect Cancer Phenotype or Outcome? -- 8.8 Conclusion -- References -- 9: The Role of Chromosome Deletions in Human Cancers -- 9.1 Introduction -- 9.2 Chromosome Deletions Are Frequent in Human Cancers and Associated with Poor Prognosis -- 9.2.1 The Boveri's Hypothesis on the Origin of Cancer -- 9.2.2 Chromosome Deletions Are a Hallmark of Human Cancers -- 9.2.3 Chromosome Deletions Are Associated with Poor Prognosis in Some Cancers -- 9.3 Identifying Tumor Suppressors in Chromosome Deletions -- 9.3.1 Knudson Theory -- 9.3.2 Haploinsufficient Tumor Suppressors -- 9.4 The Role of Chromosome Deletions as a Whole in Carcinogenesis. , 9.4.1 Modeling Chromosome Deletions with Genetic Engineered Mouse Models -- 9.4.2 Modeling Chromosome Deletions in Human Cell Models -- 9.4.3 The Collaborative Effect of Multiple Tumor Suppressors in Chromosome Deletions -- 9.5 Perspective -- References -- 10: Processing-Challenges Generated by Clusters of DNA Double-Strand Breaks Underpin Increased Effectiveness of High-LET Radiation and Chromothripsis -- 10.1 Introduction -- 10.2 Forms of DSBs and DSB Clusters -- 10.3 Physiological Processes That Require the Generation of DSB Clusters -- 10.4 DSB Cluster Formation and Carcinogenesis: The Phenomenon of Chromothripsis -- 10.5 DSB Processing Pathways -- 10.6 DSB Repair Pathway Choice in Cells Exposed to High LET IR -- 10.7 A Model of Defined DSB-­Clusters at Fixed Genomic Locations -- 10.8 Summary and Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 15
    Description / Table of Contents: Intro -- Preface -- Organization -- Contents -- Peer-Review Statements -- 1 REVIEW PROCEDURE -- 2 QUALITY CRITERIA -- 3 KEY METRICS -- 4 COMPETING INTERESTS -- Cutting Process Mechanics Experimental Study ofPick-cutting Coal Seams -- Study on the fusion degree of old and new asphalt based on rod-like thin layer chromatography -- Parameter Optimization Analysis of The New Straw Brick Based on Thermal Performance -- Research on Urban Water Infrastructure Optimization Based on Artificial Intelligent -- Stability analysis of high soil slope in a pumping and storage power station -- Numerical simulation of dynamic characteristics of radial gates considering the effect of the pier -- Study on Creep Test and Constitutive Model of Layered Soft Rock -- Key Technology of the Prefabricated Pipe Gallery Under-passing the Railway -- Field test study on deep soft soil reinforcement by vacuum preloading without sand cushion -- The corrosion resistance performance of reinforcing steel in autoclaved aerated concrete -- Research on pre-processing of geotechnical engineering safety monitoring data -- Comparative analysis of field test of dredger fill foundation reinforced by vacuum preloading method without sand cushion -- Deformation of an existing metro station attachment structure under the influence of adjacent construction of a covered excavation pit -- Overhead Space Layout Strategy of Enclosed Teaching Building Based on Wind Environment Performance Optimization -- Application of ultrathin asphalt overlay technology with 4.75-mm nominal maximum aggregate size -- Inverse analysis of seepage Safety for earth dams based on monitoring data -- A Brief Analysis of Traditional Chinese Woven Timber Arch System -- Research on BIM Digital Collaborative Design under the Background of Intelligent Construction.
    Type of Medium: Online Resource
    Pages: 1 online resource (871 pages)
    Edition: 1st ed.
    ISBN: 9789464633368
    Series Statement: Advances in Engineering Research Series v.228
    Language: English
    Note: Description based on publisher supplied metadata and other sources
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Singapore : Springer
    Keywords: Medicine ; Biomedicine ; Medicine ; Human genetics ; Cell biology ; Human genetics ; Cell biology ; Tanslocation, Genetic physiology
    Description / Table of Contents: This volume discusses various aspects of mechanisms and methodologies of chromosome translocations, ranging from a historical and clinical overview of chromosome translocations to the rapid development of the next-generation sequencing technologies, which has dramatically increased our understanding of the spectrum of chromosome translocations in human diseases. The book also introduces the mechanistic studies on chromosome deletions and their implications in cancer, and discusses the mechanisms of regulating chromothripsis, a unique complex type of chromosome translocation. It is a valuable resource for students and researchers alike, providing insights into chromosome translocations and, potentially, other genomic aberrations involved in understanding and curing human diseases
    Type of Medium: Online Resource
    Pages: Online-Ressource (V, 168 p. 29 illus., 27 illus. in color, online resource)
    ISBN: 9789811305931
    Series Statement: Advances in Experimental Medicine and Biology 1044
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...