GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Industrialization -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (381 pages)
    Edition: 1st ed.
    ISBN: 9783319135724
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.334
    DDC: 338.91
    Language: English
    Note: Intro -- Preface -- Organization -- Contents -- Feature Subset Selection Approach by Gray-Wolf Optimization -- 1 Introduction -- 2 Preliminaries -- 3 The Proposed Algorithm -- 4 Experimental Results and Discussion -- 5 Conclusions and Future Work -- References -- Optimization of Wind Direction Distribution Parameters Using Particle Swarm Optimization -- 1 Introduction -- 2 Related Work -- 3 Circular Data Statistics -- 4 Particle Swarm Optimization -- 5 Experiments -- 6 Conclusions -- References -- A Perspective of the Cellular Network of the Future: Cloud-RAN -- 1 Introduction -- 2 Cloud Radio Ac ccess Network (C-RAN) -- 3 Need for C-RAN Architecture -- 4 Characteristics of C-RAN Technology -- 5 C-RAN Perception by Leading Telecom Operators -- 6 C-RAN Deployment Methodologies -- 7 Advantages of C-RAN -- 8 Suggestions to Improve -- 9 Conclusion -- References -- Reliable Data Transmission for Multi-source Multi-sink Wireless Sensor Networks -- 1 Introduction -- 2 Literature Review -- 3 ProtocolDesign -- 4 Simulation Results and Performance Evaluation -- 5 Conclusion and Future Work -- References -- Extraction of Fetal ECG from Abdominal ECG and Heart Rate Variability Analysis -- 1 Introduction -- 2 FECG Detection -- 3 Heart Rate Variability Analysis -- 4 Materials and Methods -- 5 Results and Discussion -- 6 Conclusion and Feature Work -- References -- Addition of Static Aspects to the Intuitive Mapping of UML Activity Diagram to CPN -- 1 Introduction -- 2 State of the Art -- 3 Proposed Approach of Extended Intuitive Mapping from Semi-formal to Formal Model -- 4 Benefits of the Approach -- 5 Conclusion and Future Work -- References -- Flash Assisted Segmented Bloom Filter for Deduplication -- 1 Introduction -- 2 Literature Review -- 3 Architecture and Design of FASBF -- 4 Prototype Implementation and Evaluation -- 5 Conclusion -- References. , A Train Run Simulation with the Aid of the EMTP - ATP Programme -- 1 Introduction -- 2 Train Data -- 3 Data of Traction Mains and Traction Substations -- 4 The Simulation of the 182 Type Locomotive Run in the Grygov - -- Track Segment -- 5 Calculation of Electrical Energy Consumption of a Freight Train and the Grygov and -- Substations -- 6 Conclusion -- References -- Comparative Assessment of Temperature Based ANN and Angstrom Type Models for Predicting Global Solar Radiation -- 1 Introduction -- 2 Background -- 3 Analysis -- 4 Results and Discussion -- 5 Conclusions -- References -- Position Control and Tracking of Ball and Plate System Using Fuzzy Sliding Mode Controller -- 1 Introduction -- 2 Controller Design -- 3 Simulation Studies -- References -- A Simulation of Project Completion Probability Using Different Probability Distribution Functions -- 1 Introduction -- 2 Methodology -- 3 Simulation of Project Completion Time (PCT) -- 4 Conclusion -- References -- Dynamic Simulation of T-Track: Under Moving Loads -- 1 Introduction -- 2 T-Track (Tubular Modular) -- 3 Track Modelling -- 4 T-Track for Ethiopian Railway Projects -- 5 Conclusion -- References -- Utilizing Text Similarity Measurement for Data Compression to Detect Plagiarism in Czech -- 1 Introduction -- 2 Methods of Plagiarism Detection -- 3 Similarity of Text Plagiarism Detection by Compression -- 4 Creating Dictionaries out of Documents -- 5 Comparison of Documents -- 6 Experimental Setup -- 7 Results -- 8 The PlagTool and Visualization of Document Similarity in PlagTool -- 9 Conclusion -- References -- AJAX Speed Up vs. JSP in Portal - Case Study -- 1 Introduction -- 2 Examined Application and Overload Peaks -- 3 Performance Test Configuration -- 4 Performance Tests Runs -- 5 Conclusion -- References -- Intelligent Decision Support for Real Time Health Care Monitoring System. , 1 Introduction -- 2 Computational Intelligence -- 3 Experimental Results -- 4 Discussions -- 5 Conclusions -- References -- An Efficient Segmentation Algorithm for Arabic Handwritten Characters Recognition System -- 1 Introduction -- 2 Methodology -- 3 Segmentation M Model -- 4 Conclusion -- References -- Graph Drawing Using Dimension Reduction Methods -- 1 Introduction -- 2 GraphDrawing -- 3 Dimension Reduction -- 4 ProposedMethod -- 5 Experiments and Results -- 6 Conclusion -- References -- Design of a Single Stage Thermoelectric Power Generator Module with Specific Application on the Automotive Industry -- 1 Introduction -- 2 Background -- 3 Design of the Proposed TEG Module -- 4 TEG Module Electric Circuit Performance Analysis -- 5 Conclusion -- References -- Ethiopian Livestock Husbandry Cluster Identification Using FUZZY-AHP Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References -- Thermal Analysis, Design and Experimental Investigation of Parabolic Trough Solar Collector -- 1 Introduction -- 2 Statement of the Problem -- 3 Significance of the Research -- 4 Solar Energy -- 5 Mathematical Modeling of the Parabolic Trough -- 6 Setup of Experimental Components -- 6.3 -- 7 Results -- 8 Conclusion -- References -- Performance Improvement by Scheduling Techniques: A Case of Leather Industry Development Institute -- 1 Introduction -- 2 Material and Methods -- 3 Discussions and Results -- 4 Conclusion -- References -- Response Time Reduction in the Leather Products Manufacturing Industry Using Arena Simulation Method -- 1 Introduction -- 2 Material and Methods -- 3 Discussion and Results -- 4 Conclusion -- References -- Lead Time Prediction Using Simulation in Leather Shoe Manufacturing -- 1 Introduction -- 2 Material and Methods -- 3 Discussion and Results -- Model Formulatio. , 4 Model Validation -- 5 Conclusion -- References -- Ensemble Neurocomputing Based Oil Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 4 Experiments -- 5 Experimental Results -- 6 Conclusions -- References -- Internet of Things Communication Reference Model and Traffic Engineer System (TES) -- 1 Introduction -- 2 Best Path for Final Destination -- 3 Traffic Engineer System -- 4 Results and Discussions -- 5 Conclusions -- References -- Modeling Cloud Computing Risk Assessment Using Machine Learning -- 1 Introduction -- 2 Cloud Computing Risk Factors -- 3 Feature Selection -- 4 Risk Assessment Algorithms -- 5 Experimentation Results -- 6 Conclusions -- References -- Adaptation of Turtle Graphics Method for Visualization of the Process Execution -- 1 Introduction -- 2 State of the Art -- 3 Process Context -- 4 Proposed Approach -- 5 Experiments and Results -- 6 Conclusion and Future Work -- References -- NFL Results Predictor as a Smart Mobile Application -- 1 Introduction -- 2 Results Forecasting of NFL Games -- 3 Existing Applications -- 4 Suggestion for the Mobile Application -- 5 Implementation of the Mobile Application -- 6 Conclusion -- References -- Security Issues of Mobile Application Using Cloud Computing -- 1 Introduction -- 2 Security of Phon ne and Cloud Communication -- 3 Advantages and Disadvantages of Public Cloud Server -- 4 Safety in Service Run in Cloud Environment -- 5 Conclusions -- References -- SIFT-Based Arabic Sign Language Recognition System -- 1 Introduction -- 2 Preliminaries -- 2.1 Scale Invariant Features Transform (SIFT) -- 2.2 Linear Discriminant Analysis (LDA) -- 2.3 Classifiers -- 3 The Proposed ArSL Recognition System -- 4 Experimental Results -- 4.1 Experiment Scenarios and Discussions -- 5 Conclusions -- Stock Market Forecasting Using LASSO Linear Regression Model -- 1 Introduction. , 2 Related Works -- 3 Generalized Linear Models -- 4 Suggested Linear Model -- 5 Experimentation Results -- 6 Conclusions -- References -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Artificial intelligence-Vocational guidance. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (862 pages)
    Edition: 1st ed.
    ISBN: 9783030037666
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.891
    DDC: 006.3023
    Language: English
    Note: Intro -- Preface -- Organizing Committee -- Honorary Chairs -- Advisory Committee Chair -- Conference Chairs -- Program Chairs -- Publication Chairs -- Local Organization Chairs -- Finance Chairs -- Program Committees -- Contents -- Complex Network Control -- Truncation Error Correction for Dynamic Matrix Control Based on RBF Neural Network -- Abstract -- 1 Introduction -- 2 Dynamic Matrix Control Algorithm -- 3 Truncation Error Correction Based on Neural Network -- 3.1 Analysis of Truncation Error -- 3.2 Radial Basis Function Neural Network (RBF) Modeling -- 4 The Simulation Analysis -- 5 Conclusion -- Acknowledgements -- References -- Research on Temperature Compensation Technology of Micro-Electro-Mechanical Systems Gyroscope in Strap-Down Inertial Measurement Unit -- Abstract -- 1 Introduction -- 2 Error Analysis of MEMS Gyroscope -- 3 MEMS Gyroscope Temperature Drift Modeling Compensation -- 4 Experimental Results and Analysis -- 5 Conclusion -- Acknowledgements -- References -- A Network Security Situation Awareness Model Based on Risk Assessment -- Abstract -- 1 Introduction -- 2 Related Works and Motivation -- 3 Modeling of RA-NSSA -- 3.1 Function of Perception Level -- 3.2 Function of Comprehension Level -- 3.3 Function of Projection Level -- 4 Implementation Example -- 5 Conclusion -- Acknowledgement -- References -- An Algorithm of Crowdsourcing Answer Integration Based on Specialty Categories of Workers -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Crowdsourcing Answer Integration Based on Specialty Categories of Workers -- 3.1 Task Difficulty -- 3.2 Answer Accuracy -- 3.3 Detecting Specialty Categories of Workers -- 3.4 Specialized Accuracy -- 3.5 Algorithm Steps -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Parameter Sensitivity Analysis -- 4.2.1 \mu -- 4.2.2 \varepsilon -- 4.3 Algorithm Accuracy Comparison. , 4.4 Algorithm Operation Efficiency Evaluation -- 5 Conclusions -- Acknowledgements -- References -- A Dynamic Load Balancing Strategy Based on HAProxy and TCP Long Connection Multiplexing Technology -- Abstract -- 1 Introduction -- 2 Data Storage Module -- 3 TCP Long Connection Multiplexing Technology -- 3.1 TCP Protocol -- 3.2 TCP Long Connection Multiplexing Technology -- 4 Dynamic Load Balancing Strategy -- 4.1 Load Information Quantification -- 4.2 Processing Capacity Quantification -- 4.3 Comprehensive Quantitative Index of Server -- 5 Experimental Analysis -- 6 Conclusion -- Acknowledgements -- References -- An Improved LBG Algorithm for User Clustering in Ultra-Dense Network -- Abstract -- 1 Introduction -- 2 User Clustering Algorithms -- 2.1 Interference Weight Design -- 2.2 Improved LBG Algorithm in Clustering -- 3 Simulation and Analysis -- 4 Conclusion -- Acknowledgement -- References -- Quadrotors Finite-Time Formation by Nonsingular Terminal Sliding Mode Control with a High-Gain Observer -- Abstract -- 1 Introduction -- 2 Problem Formulation and Preliminaries -- 2.1 Graph Theory -- 2.2 Problem Formulation -- 3 Main Results -- 3.1 Relative Velocity Measurement -- 3.2 NTSM Control of Position Subsystem -- 3.3 NTSM Control of Attitude Subsystem -- 3.4 Stability Analysis -- 4 Simulation Results -- 5 Conclusion -- Acknowledgments -- References -- Flight Control of Tilt Rotor UAV During Transition Mode Based on Finite-Time Control Theory -- Abstract -- 1 Introduction -- 2 Model of a Tilt Rotor UAV -- 3 Transition Flight Control -- 3.1 Control Strategies -- 3.2 Non-singular Terminal Sliding Mode Control Law Based on ESO -- 3.3 Control Allocation -- 4 Simulation and Analysis -- 5 Conclusion -- Acknowledgments -- References -- Energizing Topics and Applications in Computer Sciences. , A Minimum Spanning Tree Algorithm Based on Fuzzy Weighted Distance -- Abstract -- 1 Introduction -- 1.1 Minimum Spanning Tree (MST) -- 1.2 Indeterminacy -- 2 Related Work -- 2.1 The Basic Concepts of the Indeterminacy Tet -- 2.2 Traditional Clustering Algorithm Based on MST -- 3 MST Clustering Algorithm Based on Fuzzy Weighted Distance (FWMSTClust) -- 3.1 Fuzzy Weighted Distance Metric Based on Indeterminacy Set -- 3.2 The Improved MST Clustering Algorithm in This Paper -- 4 Experimental Analysis -- 5 Conclusion -- Acknowledgement -- References -- Cuckoo Search Algorithm Based on Stochastic Gradient Descent -- Abstract -- 1 Introduction -- 2 Cuckoo Search -- 3 Cuckoo Search Algorithm Based on Stochastic Gradient Descent -- 4 Experiment Results and Analysis -- 5 Conclusions -- Acknowledgement -- References -- Chaotic Time Series Prediction Method Based on BP Neural Network and Extended Kalman Filter -- Abstract -- 1 Introduction -- 2 BP Neural Network Structure -- 3 Extended Kalman Filtering Method -- 3.1 Nonlinear Model Linearization -- 3.2 Mathematical Calculation of the Extended Kalman Filter Algorithm -- 4 Mathematical Models and Experimental Results of Chaotic Time Series Prediction -- 4.1 Mathematical Model of Chaotic Time Series Prediction -- 4.2 Simulation Results of Chaotic Time Series Prediction -- 5 Conclusion -- Acknowledgement -- References -- Machine Learning Techniques for Single-Line-to-Ground Fault Classification in Nonintrusive Fault Detection of Extra High-Voltage Transmission Network Systems -- Abstract -- 1 Introduction -- 2 Proposed Methods -- 2.1 Power-Spectrum-Based Hyperbolic S-Transform -- 2.2 BP-ANN -- 2.3 SVM -- 2.4 k-NN -- 3 Simulations and Results -- 3.1 Environment -- 3.2 Results -- 4 Conclusion -- Acknowledgement -- References -- Crime Prediction of Bicycle Theft Based on Online Search Data -- Abstract -- 1 Introduction. , 2 Related Literature -- 3 Temporal Pattern of Bicycle Theft Crime -- 4 The Correlation Between Related Factors and Bicycle Theft Crime -- 5 Multiple Linear Regression Analysis of the Number of Theft Cases -- 6 Conclusions -- Acknowledgement -- References -- Parametric Method for Improving Stability of Electric Power Systems -- Abstract -- 1 Introduction -- 2 Design Principle of Robust Parametric Method -- 2.1 Parametric Expression of Control Laws -- 2.2 Improvement of the Objective Function -- 2.3 Poles Assignment Based on the Damping Ratio -- 3 Application of Robust Control in Excitation Control -- 3.1 Mathematical Model of the Excitation System -- 3.2 Simulation and Design of Excitation Controller for a Single Machine Infinite System -- 4 Conclusions -- Acknowledgements -- References -- Application of Emergency Communication Technology in Marine Seismic Detection -- Abstract -- 1 Introduction -- 2 Mission Target -- 3 Demand Analysis -- 4 Mission Solution -- 5 Task Implementation -- 6 Conclusion -- Acknowledgement -- References -- Electrical Energy Prediction with Regression-Oriented Models -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Experimental Method and Results -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 Regression Models for Energy Prediction -- 3.4 Model Evaluation and Results -- 4 Conclusion -- Acknowledgment -- References -- A Strategy of Deploying Constant Number Relay Node for Wireless Sensor Network -- 1 Introduction -- 2 Related Works -- 3 Deploying Relay Nodes Process -- 4 Experimental Results -- 5 Conclusion -- References -- Noise-Robust Speech Recognition Based on LPMCC Feature and RBF Neural Network -- Abstract -- 1 Introduction -- 2 RBF Neural Network Training Algorithm -- 2.1 Clustering Algorithm -- 2.2 Entire-Supervised Training Algorithm Clustering Algorithm -- 3 Experimental Results -- 3.1 Speech Data. , 3.2 Network Training -- 3.3 Network Recognition -- 3.4 Results and Conclusions -- References -- Research on Web Service Selection Based on User Preference -- Abstract -- 1 Introduction -- 2 Determination of Weight -- 2.1 G1 Method and Steps -- 2.2 Fuzzy Number Improvement G1 Method -- 2.3 Objective QoS Weight -- 2.4 Comprehensive QoS Weight Calculation -- 3 The Improved TOPSIS to Select Services -- 4 Experimental Analysis -- 4.1 Simulation Experiment -- 4.2 Experimental Analysis -- 5 Conclusion -- Acknowledgments -- References -- Discovery of Key Production Nodes in Multi-objective Job Shop Based on Entropy Weight Fuzzy Comprehensive Evaluation -- Abstract -- 1 Introduction -- 2 Multi-objective Job Shop Complex Networks Model -- 2.1 Data Preprocessing -- 2.2 The Establishment of Complex Networks Model -- 3 Entropy Weight Fuzzy Comprehensive Evaluation Method -- 3.1 Complex Networks Key Nodes Evaluation Index -- 3.2 Determine the Weight of the Index -- 3.3 Entropy Weight Method Correction -- 4 Simulation Experiment Analysis -- 4.1 Complex Networks Model -- 4.2 Simulation Experiment -- 5 Summary -- Acknowledgments -- References -- A Data Fusion Algorithm Based on Clustering Evidence Theory -- Abstract -- 1 Introduction -- 2 Data Fusion Algorithm -- 2.1 Clustering Algorithm -- 2.2 The Basic Idea of Evidence Theory -- 2.3 Algorithm Description -- 3 Experimental Simulation -- 4 Conclusion -- Acknowledgements -- References -- Low-Illumination Color Image Enhancement Using Intuitionistic Fuzzy Sets -- Abstract -- 1 Introduction -- 2 HSV Color Space Model -- 3 Intuitionistic Fuzzy Set Enhancement Algorithm -- 3.1 Intuitionistic Fuzzy Set Algorithm -- 3.2 Selection of Threshold -- 3.3 Fuzzy Domain Image Processing -- 4 Intuitionistic Fuzzy Set Enhancement Algorithm Based on HSV Color Model -- 5 Experimental Results and Analysis -- 6 Conclusion. , Acknowledgements.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Artificial intelligence--Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (403 pages)
    Edition: 1st ed.
    ISBN: 9783319685274
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.682
    DDC: 620
    Language: English
    Note: Intro -- Preface -- Organization -- Honorary Chair -- Advisory Committee Chair -- Conference Chairs -- Program Committee Chairs -- Invited Session Chairs -- Local Organizing Chairs -- Publicity and Electronic Media Chair -- Publication Chairs -- International Program Committee -- Sponsoring Institutions -- Contents -- Image Processing and Applications -- Research on Eye Detection and Fatigue Early Warning Technologies -- Abstract -- 1 Introduction -- 2 System Overviewfirst -- 2.1 Research and Analytical -- 2.2 Research Data -- 3 Conclusion -- References -- Face Recognition Based on HOG and Fast PCA Algorithm -- Abstract -- 1 Introduction -- 2 Raw Data Preprocessing -- 2.1 Extract Raw Data -- 2.2 Face Detection and Extraction -- 3 HOG Feature Extraction and PCA Dimensionality Reduction -- 3.1 HOG Feature Extraction -- 3.2 PCA Dimensionality Reduction -- 4 Face Recognition -- 4.1 Data Normalization -- 4.2 Face Recognition Based on SVM -- 5 Experiment -- 5.1 Experimental Environment -- 5.2 Experimental Database -- 5.3 Comparison and Analysis of Experimental Results -- 6 Conclusions -- Acknowledgements -- References -- Day and Night Image Stitching and Rendering -- Abstract -- 1 Introduction -- 2 Image Stitching -- 3 Time Lapse Rendering -- 4 Experimental Results -- 5 Conclusion -- References -- Application of Image Preprocessing in Soil Mesostructure -- Abstract -- 1 Introduction -- 2 Image Processing of Soil Mesostructure -- 2.1 Images Fusion Based on the Wavelet Transform -- 2.2 Image Mosaic Based on the Module Matching -- 3 Conclusions -- Acknowledgments -- References -- Application of Image Proccessing in Soil's Shear Zone Mesostructure -- Abstract -- 1 Introduction -- 2 Image Segmentation Based on Hue Separation -- 2.1 The Method of Average Gray Value and the Method of Maximum Variance Automatic Threshold. , 2.2 Image Segmentation Based on Hue Separation -- 2.3 The Extraction Method of Mesostructure Quantization Characteristic Parameters -- 3 Conclusion -- Acknowledgments -- References -- Protocols for Data Security and Processing -- An Improved Scheme of Secure Access and Detection of Cloud Front-End Device -- Abstract -- 1 Introduction -- 2 Access of Device to Cloud Service -- 2.1 Concept and Framework of Cloud Service -- 2.2 Front-End Device Access Cloud Service -- 2.3 Analysis of Security Problems -- 3 Improved the Scheme of Accessing Using the Smart Card -- 3.1 Preliminaries -- 3.2 Identifier Generation -- 3.3 Improved Process of Access Session -- 3.4 Using ECC Algorithm to Achieve Authentication and Regular Detection -- 4 Cipher-Text Transmission of AES -- 4.1 AES Cryptography and the Session Shared Key -- 4.2 Encryption and Decryption -- 4.3 Updating the Session Shared Key -- 5 Analysis of Security and Efficiency -- 5.1 Analysis of Security -- 5.2 Analysis of Efficiency -- 6 Conclusions -- Acknowledgements -- References -- The Order and Failure Estimation of Redundancy System Based on Cobweb Model -- Abstract -- 1 Introduction -- 2 The Definition of the Main Indicators of Reliability -- 3 Approximate Estimation of Order and Failure Rate of Redundancy System -- 4 Conclusion -- Acknowledgments -- References -- Comments on Yu et al's Shared Data Integrity Verification Protocol -- 1 Introduction -- 2 Review the SDIVIP2 Protocol -- 2.1 Settings -- 2.2 Preliminaries and Notation -- 2.3 Description of the Protocol -- 3 Cryptanalysis on SDIVIP2 -- 4 Possible Quick Fix -- 5 Conclusion -- References -- Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards -- 1 Introduction -- 2 Security Weakness in the S2APA Protocols -- 2.1 Review of the S2APA Protocol -- 2.2 A Credential Forgery Attack -- 3 The Proposed APAKE Protocol. , 4 Security and Efficiency Analysis -- 5 Conclusions -- References -- Digital Certificate Based Security Payment for QR Code Applications -- 1 Introduction -- 2 Problem Statement and Preliminaries -- 3 Authenticated QR Code Based on Digital Signatures -- 3.1 Digital Certificate Generation Phase -- 3.2 Authenticated QR Code Generation Phase -- 3.3 Authenticated QR Code Verification Phase -- 4 Experimental Results -- 5 Conclusions -- References -- New Methods for Intelligent Data Analysis -- A Novel Region Selection Algorithm for Auto-focusing Method Based on Depth from Focus -- Abstract -- 1 Introduction -- 2 Proposed Region Selection Algorithm -- 2.1 Gradient Image Through Scharr Operator with Improved Templates -- 2.2 Focusing Region Selection -- 3 Experiment and Analysis -- 3.1 Fixation of Region Size -- 3.2 Performance of Global Searching with Fixed Step -- 3.3 Comparison with Different Algorithms -- 4 Conclusion -- Acknowledgement -- References -- Graph Theory Modeling -- A Petri Nets Based Approach -- 1 Introduction -- 2 Problem Statement and Preliminaries -- 2.1 Flow Networks and Flows -- 2.2 Petri Nets -- 3 Modeling of Maximum Flow Using Petri Nets -- 3.1 Modeling for Flow Network -- 3.2 Modeling of Residual Networks -- 4 The Petri Nets Based Maximum Flow Solution -- 5 Conclusion and Future Works -- References -- Sampling as a Method of Comparing Real and Generated Networks -- 1 Introduction -- 2 Related Work -- 2.1 Network Sampling -- 2.2 Network Models -- 3 3-Lambda Model -- 4 Experiments -- 4.1 Data -- 4.2 Measured Properties -- 4.3 Sampling Methods -- 4.4 Results -- 5 Conclusion -- References -- The Relative Homogeneity Between-class Thresholding Method Based on Shape Measure -- Abstract -- 1 Introduction -- 2 Thresholding Method Based on Relative Homogeneity Between-class -- 2.1 Binarization Focusing on Objects. , 2.2 Thresholding Based on Relative Homogeneity Between-class -- 3 Relative Homogeneity Measure Method Based on Shape Measure -- 3.1 Shape Measure Function -- 3.2 Relative Homogeneity Thresholding Method Based on Shape Measure -- 4 Results and Analysis -- 4.1 Experimental Analysis -- 4.2 Performance Evaluation -- 5 Conclusion -- Acknowledgements -- References -- Mining of Multiple Fuzzy Frequent Itemsets with Transaction Insertion -- 1 Introduction -- 2 Preliminaries and Problem Statement -- 3 Proposed Incremental Algorithm -- 4 Experimental Results -- 4.1 Runtime -- 5 Conclusion -- References -- Applications of Intelligent Data Analysis -- Efficient Mobile Middleware for Seamless Communication of Prehospital Emergency Medicine -- Abstract -- 1 Introduction and Related Work -- 2 Methods -- 2.1 Channel Decision Algorithm -- 2.2 Protocol -- 2.3 Overall Architecture of the System -- 3 Field Experiment Results -- 4 Discussion -- 5 Conclusion -- References -- A Method to Evaluate the Research Direction of University -- Abstract -- 1 Introduction -- 2 Data Sources and Research Methods -- 2.1 Data Collection and Cleaning -- 2.2 Research Methods and Tools -- 2.3 Research Process -- 3 Analysis of the Results -- 4 Conclusion and Discussion -- Acknowledgements -- References -- Design and Implementation of a Course Selection System that Based on Node.js -- Abstract -- 1 Introduction -- 2 System Requirements -- 3 System Module Design -- 3.1 The Function Design of Role Module -- 3.2 Database Design -- 4 System Design and Implementation -- 4.1 The Utilization of Single-Threaded Concurrency -- 4.2 System Implementation -- 4.3 System Deployment -- 5 Conclusion -- Acknowledgements -- References -- A Prototype System for Three-Dimensional Cardiac Modeling and Printing with Clinical Computed Tomography Angiography -- Abstract -- 1 Introduction. , 2 Working Flow of the Prototype System -- 3 Format and Segmentation of CTA Data -- 3.1 The Structure of DICOM File -- 3.2 Read DICOM File Within Matlab -- 3.3 Conversion of Data Format -- 3.4 Image Segmentation with the Region Growing -- 4 3-D Modeling and Volume Rendering -- 4.1 3-D Modeling of Segmented Volume Images -- 4.2 3-D Volume Rendering of Segmented Volume Images -- 5 Generation of STL File -- 5.1 Introduction of STL File -- 5.2 The Rules Obeyed by STL File -- 6 3-D Printing of Physical Model -- 7 Design and Implementation of the System -- 7.1 Analysis on Demand of System Design -- 7.2 System GUI -- 8 Discussions and Conclusions -- Acknowledgments -- References -- Design of Wisdom Home System for the Aged Living Alone -- Abstract -- 1 Introduction -- 2 System Architecture -- 3 Designs and Implementation of Health Assistant Management Function -- 4 Rule Self-learning Method -- 5 Mobile Terminal Services -- 6 Conclusion -- Acknowledgement -- References -- Decision Support System in Orthopedics Using Methodology Based on a Combination of Machine Learning Methods -- 1 Introduction -- 2 Related Work -- 3 Methodology and Tools -- 3.1 Methodology -- 4 Methodology Application -- 4.1 Dataset -- 4.2 Univariate Data Analysis -- 4.3 Network Visualization -- 4.4 Feature Selection -- 4.5 Model of the System -- 4.6 Classification -- 4.7 Decision Support Tool -- 5 Conclusion -- References -- Sensor Technology and Signal Processing -- Wireless Sensor Network Routing Protocol Research for High Voltage Transmission Line Monitoring System -- Abstract -- 1 Introduction -- 2 The Network Mode of Wireless Sensor Network Monitoring System -- 3 Routing Algorithm for High Voltage Transmission Line Monitoring Network -- 4 Network Energy Optimization -- 5 Simulation -- 6 Conclusion -- References. , Near/Far-Field Polarization-Dependent Responses from Plasmonic Nanoparticle Antennas.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Evolutionary computation -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (409 pages)
    Edition: 1st ed.
    ISBN: 9783319017969
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.238
    DDC: 006.31
    Language: English
    Note: Intro -- Preface -- Organization -- Contents -- Forecast Models of Partial Differential Equations Using Polynomial Networks -- 1 Introduction -- 2 General Partial Differential Equation Composition -- 3 Differential Polynomial Neural Network -- 4 Test Experiments -- 5 Real Data Multi-parametric Models -- 6 Time-Series Predictions -- 7 Conclusion -- References -- PSO-2S Optimization Algorithm for Brain MRI Segmentation -- 1 Introduction -- 2 Presentation of the PSO-2S Algorithm -- 2.1 Review of the Standard PSO -- 2.2 PSO Improved Variant: PSO-2S -- 3 TheProblematHand -- 4 Image Segmentation Criterion -- 5 Experimental Protocol and Parameter Setting -- 6 Experimental Results and Discussion -- 7 Conclusion -- References -- Task Scheduling in Grid Computing Environments -- 1 Introduction -- 2 Problem Definition -- 2.1 DAG Modeling -- 2.2 Makespan -- 3 Proposed Method -- 3.1 The Representation of Solutions -- 3.2 TSGA -- 4 Experimental Results -- 5 Conclusion -- References -- A Swarm Random Walk Algorithm for Global Continuous Optimization -- 1 Introduction -- 2 Related Work -- 3 The Proposed Algorithm -- 3.1 Proposed Method -- 3.2 Definition -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- A Sampling-PSO-K-means Algorithm for Document Clustering -- 1 Introduction -- 2 PSO-K-means Algorithm -- 2.1 PSO Module -- 2.2 K-means Module -- 3 Sample-PSO-K-means Algorithm: Our Contribution -- 4 Implementation -- 4.1 Web Document Preprocessing -- 4.2 Representation of the Different Components -- 4.3 Evaluation of the Solutions -- 5 Experimentation and Results -- 5.1 Experimentation -- 5.2 Parameters -- 5.3 Results -- 6 Conclusion -- References -- A New Algorithm for Data Clustering Based on Cuckoo Search Optimization -- 1 Introduction -- 2 Related Works -- 3 Cluster Analysis -- 4 Basics of Cuckoo Search Algorithm. , 5 Clustering with Cuckoo Search -- 6 Implementation and Results -- 6.1 Iris Dataset -- 6.2 Wine Dataset -- 6.3 Cancer Dataset -- 6.4 Vowel Dataset -- 7 Conclusion -- References -- Object Detection Using Scale Invariant Feature Transform -- 1 Introduction -- 2 Feature Extraction Method -- 2.1 Scale Invariant Feature Transform -- 2.2 Feature Extraction Using SIFT for Human Detection Problem -- 3 Support Vector Machine -- 4 Experiments and Results -- 5 Conclusions -- References -- Nearest Feature Line and Extended Nearest Feature Line with Half Face -- 1 Introduction -- 2 Background -- 2.1 Nearest Feature Line -- 2.2 Extended Nearest Feature Line -- 2.3 Shortest Feature Line Segment -- 3 The Proposed Methods -- 3.1 The Idea of Nearest Feature Line with Half Face -- 3.2 The Idea of Extended Nearest Feature Line with Half Face -- 4 Complexity Analysis -- 5 Experimental Results -- 6 Conclusion -- References -- Studying Common Developmental Genomes in Hybrid and Symbiotic Formations -- 1 Introduction -- 2 The Common Genetic Representation -- 2.1 An L-system for the Genetic Representation -- 2.2 The L-system for the First Chromosome -- 2.3 The L-system for the Second Chromosome -- 3 The Hybrid Architecture Model -- 4 The Symbiosis Model -- 5 Experimental Setup -- 6 Results and Discussion -- 7 Conclusion -- References -- Routing and Wavelength Assignment in Optical Networks from Maximum Edge-Disjoint Paths -- 1 Introduction -- 2 Related Works -- 2.1 Bin-Packing Based Methods for RWA -- 3 Solving RWA Using Edge-Disjoint Paths -- 4 Benchmark Instances -- 5 Computational Experiments -- 6 Conclusions and Future Work -- References -- Robust Self-organized Wireless Sensor Network: A Gene Regulatory Network Bio-Inspired Approach -- 1 Introduction -- 2 Related Work -- 3 Controller Structure -- 3.1 Genome -- 3.2 Proteins -- 3.3 Output Function -- 4 System Simulation. , 4.1 Scenario -- 4.2 Energetic Considerations -- 4.3 Genetic Algorithm -- 5 Results -- 6 Conclusion and Future Work -- References -- Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Particle Swarm Optimization (PSO) -- 1 Introduction -- 2 Background -- 3 Proposed Approach for Test Data Generation -- 4 The Proposed Tool -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Boosting Scheme for Detecting Region Duplication Forgery in Digital Images -- 1 Introduction -- 2 The Proposed Algorithm -- 2.1 Proposed Boosting Scheme -- 2.2 Feature Extraction and Similarity Matching -- 2.3 The Proposed Algorithm -- 3 Experimental Results -- 4 Conclusions -- References -- Robust Watermarking Scheme for Colour Images Using Radius-Weighted Mean Based on Integer Wavelet Transform -- 1 Introduction -- 2 Review of RWM -- 3 The Proposed Method -- 3.1 The Primary-Rule -- 3.2 The Secondary-Rule -- 3.3 Bit Embedding -- 3.4 Bit Extraction -- 4 Experimental Results -- 5 Conclusions -- References -- A Novel Data Hiding Method Using Sphere Encoding -- 1 Introduction -- 2 The Proposed Method -- 3 Experimental Results -- 4 Conclusion -- References -- Non-expanding Friendly Visual Cryptography -- 1 Introduction -- 2 Visual Cryptography -- 3 Halftone Method -- 4 Proposed Method -- 5 Experimental Results -- 6 Discussion and Conclusions -- References -- An Embedded 3D Face Recognition System Using a Dual Prism and a Camera -- 1 Introduction -- 2 System Overview -- 2.1 Embedded Platform -- 2.2 Imaging Device -- 2.3 Camera Calibration -- 3 Proposed Method -- 3.1 Face Detection -- 3.2 Facial Features Extraction -- 3.3 Depth Calculation -- 3.4 3D Feature Extraction -- 3.5 Face Recognition -- 4 Experimental Results -- 4.1 Measurement of the Execution Time -- 4.2 Face Recognition. , 4.3 Classification Performance Evaluation -- 4.4 Testing of 2D Image -- 5 Conclusion -- References -- Robust Watermarking for Multiple Images and Users Based on Visual Cryptography -- 1 Introduction -- 2 Related Work -- 2.1 Polynomial-Based Secret Share -- 2.2 Discrete Wavelet Transform -- 2.3 Chaotic Map -- 2.4 Median Filter -- 3 Proposed Method -- 3.1 Key Generation -- 3.2 Embedding -- 3.3 Extracting -- 4 Experimental Results -- 5 Conclusion -- References -- A Tailor-Made Encryption Scheme for High-Dynamic Range Images -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 4 Experimental Results and Discussion -- 5 Conclusions -- References -- NBA All-Star Prediction Using Twitter Sentiment Analysis -- 1 Introduction -- 2 Literature Review -- 2.1 Microblogging -- 2.2 Sentiment Analysis -- 2.3 Rank Correlation Coefficient -- 3 Research Method -- 4 Experimental Result -- 5 Conclusion -- References -- Information Hiding Based on Binary Encoding Methods and Crossover Mechanism of Genetic Algorithms -- 1 Introduction -- 2 Crossover Mechanism of Genetic Algorithm for EncodingImages -- 3 Binary Encoding Methods for Hiding Crossover-OperatedMatrices -- 4 Simulations -- 5 Discussions -- 6 Conclusions -- References -- A Modified Method for Constructing Minimum Size Homogeneous Wireless Sensor Networks with Relay Nodes to Fully Cover Critical Square Grids -- 1 Introduction -- 2 Network Model and Problem Definition -- 3 OurMethod -- 4 Simulation Result -- 5 Conclusion -- References -- Relative Location Estimation over Wireless SensorNetworks with Principal Component Analysis Technique -- 1 Introduction -- 2 Wireless Channel Model and Well-Known LocalizationAlgorithms -- 2.1 Lognormal-Distributed Wireless Channel -- 2.2 Minimum Mean Square Error Estimation (MMSE) -- 2.3 Maximum Likelihood Estimation (ML) -- 2.4 Maximum A Posteriori Estimation (MAP). , 3 Proposed PCA-Based Maximum Likelihood Localization -- 3.1 Principal Component Analysis -- 3.2 Probabilistic Principle Component Analysis (PPCA) -- 3.3 Proposed Location Estimation Procedure -- 4 Performance Evaluation and Comparison -- 4.1 Effects of Noise Power -- 4.2 Effects of Channel Correlation -- 4.3 Effects of Selected Anchor Nodes -- 4.4 Effects of Path-Loss Exponent -- 5 Conclusions -- Appendix -- Hierarchical Particle Swarm Optimization Algorithm of IPSVR Problem -- 1 Introduction -- 2 The Proposed Mathematical Model -- 3 The Proposed Method -- 4 Conclusions -- References -- An Approach to Mobile Multimedia Digital Rights Management Based on Android -- 1 Introduction -- 2 Related Works -- 3 Audio and Video Protection Solution for the Android Platform -- 3.1 Server Side -- 3.2 Mobile Terminal -- 4 Performance Assessment -- 4.1 Speed Tests of Decryption and Encryption -- 4.2 System Safety Analysis -- 5 Conclusion -- References -- A Path-Combination Based Routing Scheme for Cognitive Radio Networks -- 1 Introduction -- 2 Network Model -- 2.1 Obtain Sensing Results -- 2.2 Gather Sensing Results -- 3 A Path-Combination Based Routing Scheme for Cognitive Radio Networks -- 3.1 Path Generation -- 3.2 Spectrum Allocation -- 4 Simulation and Performance -- 5 Conclusion -- References -- Digital Rights Management and Access Control in Multimedia Social Networks -- 1 Introduction -- 2 Digital Rights Management and Content Distribution -- 2.1 Security Technologies for Digital Rights Management -- 2.2 Distribution and Dissemination of the Digital Content (Right) -- 3 Access Control and Copyright Protection in Multimedia Social Network -- 3.1 Features of Traditional Access Control and Social Networking -- 3.2 Relationship-Based Access Control -- 3.3 Trust-Based Access Control -- 3.4 Media Content Copyright Protection -- 4 Conclusion -- References. , Modeling of Human Saccadic Scanpaths Based on Visual Saliency.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Neural networks (Computer science) -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (306 pages)
    Edition: 1st ed.
    ISBN: 9783319017815
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.237
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organization -- Contents -- Power Output Models of Ordinary Differential Equations by Polynomial and Recurrent Neural Networks -- 1 Introduction -- 2 Modeling and Forecasting of Energy Production -- 3 General Differential Equation Composition -- 4 Differential Polynomial Neural Network -- 5 Power Plant Output Model Experiments -- 6 Wind Speed Model Experiments -- 7 Conclusion -- References -- An Experimental Analysis of Reservoir Parameters of the Echo State Queueing Network Model -- 1 Introduction -- 2 Reservoir Computing Models -- 2.1 Description of the Echo State Queuing Network model -- 3 Experimental Analysis of the ESQN Reservoir Dynamics -- 3.1 Benchmark Descriptions -- 3.2 Result Analysis -- 4 Conclusions and Future Works -- References -- Measuring Phenotypic Structural Complexity of Artificial Cellular Organisms -- 1 Introduction -- 2 Background and Motivation -- 3 Cellular Automata -- 4 Measuring Structural Complexity -- 4.1 Kolmogorov Complexity -- 4.2 Incomputability Theorem -- 4.3 Lempel-Ziv Compression Algorithm -- 5 Cellular Developmental Model -- 6 Experimental Setup -- 7 Discussion -- 8 Conclusion -- References -- Fuzzy Rules and SVM Approach to the Estimation of Use Case Parameters -- 1 Introduction -- 1.1 State of the Art -- 2 Brief Introduction of Methods -- 2.1 Evolutionary Fuzzy Rules -- 2.2 Support Vector Machines -- 3 Logic of the Approach -- 4 Experiments and Results -- 5 Conclusion and Future Work -- References -- Multi Objective Optimization Strategy Suitable for Virtual Cells as a Service -- 1 Introduction -- 2 Virtual Infrastructure Cell -- 3 Related Works -- 4 Multi Objective Optimization for vCAAS -- 4.1 Formulating the GA -- 5 Results -- 6 Conclusion -- References -- An Application of Process Mining to Invoice Verification Process in SAP -- 1 Introduction -- 2 State of the Art. , 2.1 Related Work - Case Studies -- 3 Case Study -- 3.1 Context -- 3.2 Data Obtaining and Data Structure -- 3.3 Preprocessing of Data -- 3.4 Summary of the Log and Adjustment of Data -- 3.5 Analysis of the Process Characteristics -- 3.6 Analysis of Interesting Paths -- 3.7 Results and Retrospect to Real Business -- 4 Conclusion and Future Work -- References -- Emergent Induction of Deterministic Context-Free L-system Grammar -- 1 Introduction -- 2 Background -- 3 LGIC2: Emergent Induction of L-system Grammar -- 4 Experiments -- 5 Conclusion -- References -- Double Expert System for Monitoring and Re-adaptation of PID Controllers -- 1 Introduction -- 2 Monitoring System -- 2.1 Inputs - Relative Overshoot and Relative Settling Time -- 2.2 Output - Score -- 2.3 Knowledge Base -- 3 PID Parameter Design System -- 4 The Description of Implemented Algorithm -- 5 Verification of Created System -- 6 Conclusion -- References -- Multiplier System in the Tile Assembly Model with Reduced Tileset-Size -- 1 Introduction -- 1.1 Background and Related Work -- 1.2 Tile-Assembly Model -- 1.3 Preliminary Algorithms -- 2 Subsystems of Multiplier System -- 2.1 Shifter Tile System -- 2.2 Adder Tile System -- 2.3 Shifter-Adder Tile System -- 3 Multiplier Tile System -- 3.1 Multiplier Tile System: Version 1 -- 3.2 Multiplier Tile System: Version 2 -- 3.3 Discussion -- 4 Conclusion -- References -- A Bezier Curve-Based Approach for PathPlanning in Robot Soccer -- 1 Introduction -- 2 Path Planning in Robot Soccer -- 3 Bezier Path Planning -- 4 Optimized Bezier Path Planning -- 5 Conclusion -- References -- Adaptively Nearest Feature Point Classifier for Face Recognition -- 1 Introduction -- 2 Background -- 2.1 Nearest Feature Line -- 2.2 Nearest Feature Centre -- 2.3 Extended Nearest Feature Line -- 3 The Proposed Methods -- 4 Experimental Results -- 5 Conclusion -- References. , Comparison of Classification Algorithms for Physical Activity Recognition -- 1 Introduction -- 2 Previous Work -- 3 Dataset -- 4 Classification Method -- 4.1 Random Forest -- 4.2 K-Nearest Neighbours -- 4.3 Linear Discriminant Analysis -- 5 Feature Extraction -- 5.1 Feature Filter - Correlation Feature Selection Method -- 5.2 Principle Components Analysis -- 6 Testing and Results -- 7 Conclusion -- References -- Modular Algorithm in Tile Self-assembly Model -- 1 Introduction -- 1.1 Background and Related Work -- 1.2 Tile-Assembly Model -- 1.3 Preliminary Algorithms -- 2 Subsystems of Modular System -- 2.1 Connector System -- 2.2 Shift-Comparer System -- 2.3 Extended Subtractor System -- 3 Modular System -- 3.1 Definition and Sample Execution -- 3.2 Discussion -- 4 Conclusion -- References -- LLLA: New Efficient Channel Assignment Method in Wireless Mesh Networks -- 1 Introduction -- 2 Related Research -- 3 The Proposed Method -- 4 Experimental Results -- 4.1 Simulation Scenario -- 4.2 Network Environment -- 5 Conclusion and the Future Work -- References -- Binary Matrix Pseudo-division and Its Applications -- 1 Introduction -- 2 Binary Matrix Pseudo-division -- 2.1 Notation -- 2.2 Problem Definition -- 3 Algorithms -- 3.1 Algorithm #1: Simple Approach -- 3.2 Algorithm #2: Row-by-Row -- 3.3 Algorithm #3: Classification of Candidates -- 4 Complexity Analysis -- 4.1 Algorithm #1: Simple Approach -- 4.2 Algorithm #2: Row-by-Row -- 4.3 Algorithm #3: Classification of Candidates -- 5 Applications -- 5.1 Blind Search BFA -- 5.2 Formal Concepts Based BFA -- 5.3 Genetic Algorithm Based BFA -- 5.4 Spurious Attractors of Neural Network -- 6 Summary -- References -- Nature Inspired Phenotype Analysis with 3D Model Representation Optimization -- 1 Introduction -- 2 Methodology for Model Optimization -- 2.1 Contour Interpolation -- 2.2 3D Surface Reconstruction. , 2.3 Phenotype Measurement -- 3 Result -- 3.1 Case Study 1: Zebrafish Embryo, Measurement Verification -- 3.2 Case Study 2: Mouse Lactiferous Duct, Phenotype Analysis -- 4 Discussion and Conclusion -- References -- Multi-class SVM Based Classification Approach for Tomato Ripeness -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Principal Component Analysis (PCA) -- 3.2 Color Features -- 3.3 Support Vector Machine (SVM) -- 4 The Proposed Classification System -- 4.1 Pre-processing Phase -- 4.2 Feature Extraction Phase -- 4.3 Classification Phase -- 5 Experimental Results -- 6 Conclusions -- References -- Solving Stochastic Vehicle Routing Problem with Real Simultaneous Pickup and Delivery Using Differential Evolution -- 1 Introduction -- 2 Literature Review -- 2.1 Differential Evolution -- 3 ModelFormulation -- 4 Model Input Parameters -- 4.1 From-to-Distance -- 4.2 Stochastic Passengers Demand -- 5 Differential Evolution for SVRPSPD -- 5.1 Experiments -- 6 Conclusions -- References -- An Intelligent Multi-agent Recommender System -- 1 Introduction -- 2 Background -- 2.1 Rough Mereology -- 2.2 Recommendation Algorithms -- 3 The Proposed Multi-agent Recommender System -- 3.1 Matching Agent -- 3.2 Recommendation Agent -- 3.3 Integration of Agents and User Interface -- 4 Evaluation and Discussion -- 5 Conclusions and Future Work -- References -- Geodata Scale Restriction Using Genetic Algorithm -- 1 Introduction -- 2 State of the Art -- 2.1 Scale Restrictions in Geosciences -- 2.2 Genetic Algorithms -- 3 Scale Restriction Using Genetic Algorithms -- 3.1 Number of Possible Scale Restrictions - An Estimation -- 3.2 Problem Formalization -- 4 Experimental Results -- 4.1 Experimental Data -- 4.2 Comparison of GA Results with Jenks Algorithm -- 5 Conclusion -- References. , Principal Component Analysis Neural Network Hybrid Classification Approach for Galaxies Images -- 1 Introduction -- 2 Preliminaries -- 2.1 Rough Sets -- 2.2 Principal Component Analysis (PCA) Neural Network -- 3 The Proposed Approach for Galaxies Images Classification -- 3.1 Image Denoising Phase -- 3.2 Feature Extraction Phase -- 3.3 Reduct Generation Phase -- 3.4 Classification Phase -- 4 Experimental Results and Discussion -- 4.1 Data Collection -- 4.2 Performance Measures -- 5 Conclusions and Future Work -- References -- Comparison of Crisp, Fuzzy and Possibilistic Threshold in Spatial Queries -- 1 Introduction -- 2 Fuzzy Sets -- 3 Possibility and Necessity Measures -- 3.1 Comparing Real Numbers to Possibility Distribution -- 4 Spatial Queries -- 4.1 Crisp Queries -- 4.2 Fuzzy Queries -- 4.3 Possibilistic Queries -- 5 Case Study -- 6 Future Work -- 7 Conclusion -- References -- Visualizing Clusters in the Photovoltaic Power Station Data by Sammon's Projection -- 1 Introduction -- 2 Related Work -- 3 Sammon's Projection -- 4 Preprocessing Data -- 4.1 Dependency Measuring -- 4.2 Conversion intoWeighted Undirected Network -- 4.3 Dependency-Based Vertex Distance (DDST) -- 5 Experiments -- 5.1 Input Data Collection -- 5.2 Evaluation of Main Clusters -- 5.3 Evaluation of Selected Clusters -- 6 Conclusion and Future Work -- References -- Rough Power Set Tree for Feature Selection and Classification: Case Study on MRI Brain Tumor -- 1 Introduction -- 2 Background -- 2.1 Rough Sets -- 2.2 Power Set Tree (PS-tree) -- 2.3 Artificial Neural Network (ANN) -- 3 Proposed Feature Selection and Classification Approach -- 3.1 K-Means 2D Slice Clustering Phase -- 3.2 2D Feature Extraction Phase -- 3.3 PS-tree Reduct Generation Phase -- 3.4 Multilayer Perceptron Neural Network Classification Phase -- 4 Experimental Results -- 5 Conclusions and Future Work. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (571 pages)
    Edition: 1st ed.
    ISBN: 9783319280318
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.424
    DDC: 006.382
    Language: English
    Note: Intro -- Preface -- Bio-inspired Computing -- Emerging Technologies and Applications -- Intelligent Distributed and High-Performance Architecture -- General Chairs -- Program Chairs -- Contents -- 1 Multiset Genetic Algorithm Approach to Grid Resource Allocation -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Multisets Fundamentals -- 3.1 Relations and Operations with Multisets -- 3.2 Multiset and Genetic Algorithm -- 3.3 Search Mechanism -- 4 System Description -- 5 Genetic Algorithm Parameters -- 6 Experimental Configuration -- 7 Conclusions and Future Work -- Acknowledgments -- References -- 2 Secure Cloud Multi-tenant Applications with Cache in PaaS -- Abstract -- 1 Introduction -- 2 Multi-tenant Application -- 3 Data Store -- 3.1 i-Meta Data -- 3.2 Cache and Replication -- 4 Security Oriented Cache Approach -- 5 Experimental Setup and Results -- 5.1 Experimental Design -- 5.2 Performance Calculation -- 6 Conclusion -- References -- 3 HAWK EYE: Intelligent Analysis of Socio Inspired Cohorts for Plagiarism -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Our Approach and Contributions -- 4 Methodology for Hawk Eye -- 5 Methodology for Genetic Search and Cohort Intelligence -- 5.1 Possible Cases of Source Code Plagiarism -- 5.2 Procedure for Genetic Search Algorithm [16] -- 5.2.1 Implementation of GA on Different Cases of Source Code Plagiarism -- 5.3 Procedure for Cohort Intelligence -- 5.3.1 Results Based on Cohort Analysis Tools -- 6 Why Genetic Search and Cohort Intelligence [15, 17] -- 7 Conclusion -- References -- Mechanism of Fuzzy ARMS on Chemical Reaction -- 1 Introduction -- 2 Preliminaries -- 2.1 P System with Fuzzy Data [11] -- 2.2 P System with Fuzzy Multiset Rewriting Rules [11] -- 2.3 ARMS (Abstract Rewriting System on Multisets) [9] -- 3 Fuzzy ARMS -- 3.1 Definition -- 3.2 Example. , 4 FARMS in ACS with Hierarchically Structurable Membrane -- 4.1 Definition -- 4.2 Mechanism for Sulfides Oxidation in FACSH -- 4.3 Mechanism for Sulfoxides Oxidation in FACSH -- 4.4 FARMS in ACS with Hierarchically Structurable Membrane (FACSH - B) -- 4.5 Behaviour of FACSH - B -- 5 Conclusion -- References -- The Power of Hybridity and Context Free in HP System -- 1 Introduction -- 2 Preliminaries -- 2.1 Context-Free Puzzle Grammar (CFPG) [15] -- 2.2 Hybrid Prescribed Team CD Grammar System [11] -- 2.3 Array P Systems [1] -- 2.4 Hybrid Prescribed Teams Context-Free Puzzle Grammar System [12] -- 3 Hybrid P System with CFPG -- 3.1 Definition -- 3.2 Example -- 4 Generative Power -- 4.1 Theorem -- 4.2 Theorem -- 4.3 Theorem -- 4.4 Theorem -- 5 Conclusion -- References -- 6 Enhanced Bee Colony Algorithm for Efficient Load Balancing and Scheduling in Cloud -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Modified Bee Colony Algorithm for Load Balancing -- 3.1 VM Current Load Calculation -- 3.2 Load Balancing and Scheduling Decision -- 3.3 VM Grouping -- 3.4 Task Scheduling -- 4 Experimental Results -- 5 Conclusion -- References -- Robust Optimized Artificial Neural Network Based PEM Fuelcell Voltage Tracking -- 1 Introduction -- 2 PEMFC Model -- 3 Controller Design -- 3.1 Neural Network Controller -- 3.2 Harmony Search Algorithm -- 4 Simulation Results and Discussions -- 5 Conclusion -- References -- Gravitational Search Algorithm to Solve Open Vehicle Routing Problem -- 1 Introduction and Backgrounds -- 2 Problem Definition and Notation -- 3 The Proposed Algorithm -- 4 Performance Evaluation -- 4.1 Computational Results -- 5 Conclusion -- References -- 9 PIRIDS: A Model on Intrusion Response System Based on Biologically Inspired Response Mechanism in Plants -- Abstract -- 1 Introduction -- 2 Overview of Defense and Response Mechanism in Plants. , 3 Pirids (Plant Based Inspiration of Response in Intrusion Detection System) -- 4 Conclusion -- References -- 10 Particle Swarm Optimization Method Based Consistency Checking in UML Class and Activity Diagrams -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Particle Swarm Optimization -- 4 Consistency Checking -- 4.1 Attribute Missing Inconsistency -- 4.2 Attribute Specification Inconsistency -- 5 Consistency Checking Using Particle Swarm Optimization Algorithm -- 5.1 Algorithm -- 5.2 Particle Initialization -- 5.3 Fitness Function -- 5.4 Position/Velocity Adjustment -- 5.5 Case Study -- 6 Conclusion -- References -- 11 Data Centric Text Processing Using MapReduce -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Multithreaded MapReduce Model -- 3.1 MapReduce Programming Model -- 3.2 Data Triggered Multithreaded Programming -- 4 Case Study of Authors Dataset -- 5 Conclusion -- References -- Request Reply Detection Mechanism for Malicious MANETs -- 1 Introduction -- 2 Current Research Directions -- 3 Proposed Methodology -- 3.1 Handling Selfish Nodes -- 3.2 Handling Incapacitated Nodes -- 3.3 Handling Packet Dropping Nodes -- 3.4 Handling Routing Issues -- 4 Performance Evaluation -- 4.1 Scenarios for Simulation -- 4.2 Simulation Parameters -- 4.3 Simulation Results -- 5 Conclusion -- 6 Future Work -- References -- 13 Ensemble of Flexible Neural Trees for Predicting Risk in Grid Computing Environment -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Risk Assessment in Grid-Computing Environment -- 3.2 Flexible Neural Tree -- 3.3 Ensemble of FNT -- 4 Experimental Set-up and Results -- 5 Discussions -- 6 Conclusions -- Acknowledgments -- References -- A Novel Approach for Malicious Node Detection in MANET -- 1 Introduction -- 2 Literature Survey -- 2.1 Security Issues -- 2.2 Intrusion Detection System. , 2.3 Limitation of Existing IDS -- 3 Proposed System -- 3.1 Acknowledgement Mode -- 3.2 Conviction Mode -- 3.3 Confirmation Mode -- 3.4 Broadcast Mode -- 3.5 Malicious Node List -- 4 Conclusion -- References -- 15 Improving the Productivity in Global Software Development -- Abstract -- 1 Introduction -- 2 Project Size Estimation -- 3 Challenges in GSD -- 3.1 Communication -- 3.2 Coordination -- 3.3 Control -- 4 Productivity -- 5 Discussion -- 6 Conclusion -- References -- 16 Prediction of Heart Disease Using Random Forest and Feature Subset Selection -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Literature Review -- 3.1 Heart Disease -- 3.2 Random Forest (RF) -- 3.3 Chi-Square Method -- 4 Proposed Method -- 5 Experimental Results -- 6 Conclusion -- References -- 17 Software Requirement Elicitation Using Natural Language Processing -- Abstract -- 1 Introduction -- 2 Proposed Methodology -- 3 Open Natural Language Processing (OpenNLP) -- 3.1 General Library Structure -- 3.2 Methods Used in Our Concept Are -- 4 SBVR -- 4.1 SBVR Vocabulary and Rules -- 5 Model Design -- 6 SBVR Rules Generation -- 7 Object Oriented Analysis of SBVR -- 8 Experiment and Result -- 9 Conclusion -- References -- Application of Hexagonal Coordinate Systems for Searching the K-NN in 2D Space -- 1 Related Work -- 2 Background -- 2.1 Hexagonal Grids -- 2.2 Hexagonal Coordinate Systems -- 3 Our Approach -- 3.1 Initialization Phase -- 3.2 Building of Searching Structure -- 3.3 Searching the Nearest Neighbors -- 4 Experiments and Discussion -- 5 Conclusion -- References -- Locality Aware MapReduce -- 1 Introduction -- 2 Background -- 2.1 HDFS -- 2.2 MapReduce -- 2.3 Input Splitting -- 2.4 Scheduling -- 3 Implementation -- 3.1 Improved Input Splitting method -- 3.2 Locality Aware Scheduling -- 4 Results -- 5 Conclusion -- References. , 20 Hybrid Feature Selection Using Correlation Coefficient and Particle Swarm Optimization on Microarray Gene Expression Data -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 2.1 Correlation Coefficient -- 2.2 Particle Swarm Optimization -- 3 Experimental Framework -- 3.1 Preprocessing -- 3.2 Hybrid Approach to Feature Selection -- 3.3 Extreme Learning Machines Classifier -- 4 Results and Discussion -- 5 Conclusion -- References -- Resource Aware Adaptive Scheduler for Heterogeneous Workload with Task Based Job Sampling -- 1 Introduction -- 2 Scheduling In Hadoop: Related Works -- 3 Resource Aware Adaptive Scheduler -- 3.1 Scheduler Architecture -- 3.2 Placement Algorithm and Utility Calculator -- 3.3 Task Tracker Profiling -- 3.4 Job Sampling in Task -- 3.5 Task Scheduler -- 4 Evaluation and Discussion -- 4.1 Experiment Environment -- 4.2 Experimental Results -- 5 Conclusion -- References -- Generating Picture Arrays Based on Grammar Systems with Flat Splicing Operation -- 1 Introduction -- 2 Preliminaries -- 3 Flat Splicing Regular Array Grammar System -- 4 Application to Generation of Floor Designs -- 5 Conclusion and Discussion -- References -- Identification of Multimodal Human-Robot Interaction Using Combined Kernels -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Feature Extraction -- 4 SVM Classifier with Combined Kernels -- 4.1 Multiclass Classifier Based on SVM One-Class Classifiers -- 4.2 Kernel Selection -- 4.3 Construction of the Combined Kernel -- 5 Implementation and Results -- 5.1 Kernel Selection -- 5.2 Construction of the Multiclass SVM Using Combined Kernel -- 5.3 Validation -- 5.4 Analysis of Noise in Generalization -- 6 Conclusions -- References -- 24 Debris Detection and Tracking System in Water Bodies Using Motion Estimation Technique -- Abstract -- 1 Introduction. , 2 Literature Survey.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Soft computing -- Congresses. ; Soft computing -- Industrial applications -- Congresses. ; Electronic books.
    Description / Table of Contents: This book presents some 33 rigorously reviewed, high quality research papers on soft computing, presented at WSC17, the 17th Online World Conference on Soft Computing in Industrial Applications, which was held from December 2012 to January 2013.
    Type of Medium: Online Resource
    Pages: 1 online resource (382 pages)
    Edition: 1st ed.
    ISBN: 9783319009308
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.223
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Organization -- Contents -- Part ISoft Computing in Industrial Applications -- 1 Advanced Methods for 3D Magnetic Localization in Industrial Process Distributed Data-Logging with a Sparse Distance Matrix -- Abstract -- 1…Introduction -- 2…The Localization System Setup -- 2.1 Sensor Node -- 2.2 Magnetic Field Generation -- 2.3 Distance Calculation -- 3…Localization -- 3.1 MDS Mapping -- 3.2 NLMR -- 4…Results -- 5…Conclusion -- Acknowledgments -- References -- 2 Neural Network Ensemble Based on Feature Selection for Non-Invasive Recognition of Liver Fibrosis Stage -- Abstract -- 1…Introduction -- 2…Liver Fibrosis Recognition -- 3…Neural Network Ensemble -- 3.1 Creating the Pool of Classifiers -- 3.2 Ensemble Pruning -- 3.3 Fusion of Individual Classifiers -- 4…Experimental Results -- 4.1 Set-up -- 4.2 Results -- 4.3 Results Discussion -- 5…Conclusions -- References -- 3 Cooperative and Non-cooperative Equilibrium Problems with Equilibrium Constraints: Applications in Economics and Transportation -- Abstract -- 1…Introduction -- 2…Notation -- 3…Cooperative EPECs (MOPECS) -- 4…Non Cooperative EPECs (NCEPECS) -- 5…Mapping Non Cooperative to Cooperative Solution -- 6…Numerical Examples -- 6.1 Example 1: Competition between Producers -- 6.2 Example 2: Competition between Authorities -- 7…Conclusions -- References -- 4 Statistical Genetic Programming: The Role of Diversity -- Abstract -- 1…Introduction -- 2…Statistical Genetic Programming -- 2.1 Statistical Information of a GP Tree -- 2.2 Correlation Based Crossover -- 2.3 Correlation Based Mutation -- 2.4 Variance Based Editing -- 3…Diversity in Genetic Programming -- 4…Experimental Results and Discussion -- 4.1 Test Problems and GP Parameter Settings -- 4.2 Accuracy Evaluation -- 4.3 Diversity and SGP -- 5…Conclusions -- References. , 5 Breast MRI Tumour Segmentation Using Modified Automatic Seeded Region Growing Based on Particle Swarm Optimization Image Clustering -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Image Pre-Processing -- 3.2 Breast Skin Detection and Deletion -- 3.3 A Modified Automatic SRG Based On PSO Image Clustering -- 3.3.1 Seeded Region Growing -- 3.3.2 Particle Swarm Optimization (PSO) Image Clustering -- 3.3.3 The Proposed Automatic SRG Initial Seed Selection. -- 3.3.4 The Proposed Automatic SRG Threshold Value Selection. -- 4…Experimental Results and Discussion -- 5…Conclusion -- References -- 6 Differential Evolution and Tabu Search to Find Multiple Solutions of Multimodal Optimization Problems -- Abstract -- 1…Introduction -- 2…Differential Evolution -- 2.1 Standard Differential Evolution -- 2.2 Differential Evolution with Ring Topology -- 3…Proposed Method -- 4…Simulation Results -- 4.1 Experimental Settings -- 4.2 Results Discussion -- 5…Conclusions -- References -- 7 A New RBFNDDA-KNN Network and Its Application to Medical Pattern Classification -- Abstract -- 1…Introduction -- 2…Classification Methods -- 2.1 Radial Basis Function Neural Network with Dynamic Decay Adjustment -- 2.2 The k-Nearest Neighbour (KNN) Algorithm -- 2.3 The RBFNDDA-KNN Network -- 3…Experimental Study -- 3.1 Benchmark Medical Problems -- 3.2 A Real Medical Problem -- 4…Summary -- References -- 8 An Approach to Fuzzy Modeling of Anti-lock Braking Systems -- Abstract -- 1…Introduction -- 2…ABS Process Models -- 3…Simulated Annealing Algorithm -- 4…Experimental Results -- 5…Conclusions -- Acknowledgments -- References -- 9 An Improved Evolutionary Algorithm to Sequence Operations on an ASRS Warehouse -- Abstract -- 1…Introduction -- 2…The Storage System -- 3…Job Shop Scheduling Problem -- 4…Methodology -- 4.1 Constructive Algorithm. , 4.2 The Evolutionary Algorithm Structure -- 5…Computational Experiments -- 6…Conclusions -- Acknowledgments -- References -- 10 Fuzzy Reliability Analysis of Washing Unit in a Paper Plant Using Soft-Computing Based Hybridized Techniques -- Abstract -- 1…Introduction -- 2…A Brief Overview of FLT, GABLT and NGABLT Techniques -- 2.1 FLT Technique -- 2.2 GABLT Technique -- 2.3 NGABLT Technique -- 3…Washing System Description -- 4…Result and Discussion -- 5…Conclusion -- References -- 11 Multi-objective Algorithms for the Single Machine Scheduling Problem with Sequence-dependent Family Setups -- Abstract -- 1…Introduction -- 2…Problem Description -- 3…Methodology -- 3.1 Algorithms Based on MOVNS -- 3.2 Algorithms Based on PILS -- 4…Computational Experiments -- 4.1 Instances -- 4.2 Performance Assessment Metrics -- 4.3 Results -- 5…Conclusions -- Acknowledgments -- References -- 12 Multi-Sensor Soft-Computing System for Driver Drowsiness Detection -- Abstract -- 1…Introduction -- 2…Driving Scene Modeling and Hardware Setup -- 3…Software Components and Algorithms -- 3.1 Depth Camera Based Driver Status Monitoring -- 3.2 Steering Behavior and Physiological Measurements -- 3.3 Feature Computation, Sensor Fusion, Pattern Classification -- 4…Experimental Results -- 5…Conclusion and Future Work -- Acknowledgments -- References -- 13 A New Evolving Tree for Text Document Clustering and Visualization -- Abstract -- 1…Introduction -- 2…Background -- 2.1 The Structure of ETree -- 2.2 The Learning Algorithm of ETree -- 2.3 A Framework for ETree Implementation Implementation -- 3…Text Document Clustering and Visualization Using the ETree -- 4…Case Study -- 4.1 (a) Growing (evolving) of tree -- 4.2 (b) Computation complexity -- 4.3 (c) Remarks -- 5…Summary -- References. , 14 Brain--Computer Interface Based on Motor Imagery: The Most Relevant Sources of Electrical Brain Activity -- Abstract -- 1…Introduction -- 2…Methods -- 3…Results -- 4…Discussion -- Acknowledgments -- References -- 15 A Single Input Rule Modules Connected Fuzzy FMEA Methodology for Edible Bird Nest Processing -- Abstract -- 1…Introduction -- 2…Background -- 2.1 The Zero-Order SIRMs Connected FIS Model -- 2.2 The \alpha -Level Set and Comparable Fuzzy Sets -- 2.3 The Monotonicity Property -- 3…The Proposed Fuzzy FMEA Methodology -- 3.1 The Proposed Fuzzy FMEA Procedure -- 3.2 Modelling of the SIRMs Connected FIS-Based RPN Model -- 4…Results and Discussion -- 4.1 An Analysis on Fuzzy Rule Reduction -- 4.2 An Analysis on the Risk Evaluation Results -- 5…Summary -- References -- 16 A Novel Energy-Efficient and Distance-Based Clustering Approach for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Problem Statement -- 3…The EEDC Approach -- 4…Performance Evaluation -- 5…Conclusion and Future Work -- References -- 17 Characterization of Coronary Plaque by Using 2D Frequency Histogram of RF Signal -- Abstract -- 1…Introduction -- 2…Methodology -- 2.1 IVUS Method -- 2.2 2D Histogram -- 2.3 k-Nearest Neighbor Method -- 3…Tissue Characterization by Proposed Method -- 4…Experiments -- 4.1 Experimental Settings -- 4.2 Experimental Results -- 5…Discussions -- 6…Conclusions -- Acknowledgments -- References -- 18 Face Recognition Using Convolutional Neural Network and Simple Logistic Classifier -- Abstract -- 1…Introduction -- 2…Logistic Regression, Convolutional Neural Networks -- 2.1 Convolution Neural Networks -- 2.2 Logistic Regression Classifier -- 3…Proposed Method -- 4…Dataset -- 5…Simulation Results and Discussions -- 6…Conclusion -- References -- 19 Continuous Features Discretization for Anomaly Intrusion Detectors Generation -- Abstract. , 1…Introduction -- 2…Background -- 2.1 Anomaly Intrusion Detection -- 2.2 Genetic Algorithms -- 2.3 Negative Selection Approach -- 2.4 Equal-Width Binning Algorithm -- 3…Related Work -- 4…Proposed Approach -- 4.1 Motivation -- 4.2 Suggested Approach -- 5…Experiment -- 5.1 Data Set -- 5.2 Experiment Settings -- 5.3 Results -- 6…Conclusion and Future Work -- Open Access -- References -- 20 Visualisation of High Dimensional Data by Use of Genetic Programming: Application to On-line Infrared Spectroscopy Based Process Monitoring -- Abstract -- 1…Introduction -- 2…Topological Mapping for Visualization of High Dimensional Data -- 3…Visualisation by Use of Genetic Programming -- 4…Application Example: Visualization of Spectral Database -- 5…Conclusions -- Acknowledgments -- References -- 21 Radial Basis Artificial Neural Network Models for Predicting Solubility Index of Roller Dried Goat Whole Milk Powder -- Abstract -- 1…Introduction -- 2…Review of Literature -- 2.1 Butter -- 2.2 Cheese -- 2.3 Processed Cheese -- 2.4 Milk -- 2.5 Burfi -- 2.6 ANN Modelling in Other Foodstuffs -- 3…Method Material -- 4…Results and Discussion -- 5…Conclusion -- References -- 22 Online Prediction of Wear on Rolls of a Bar Rolling Mill Based on Semi-Analytical Equations and Artificial Neural Networks -- Abstract -- 1…Introduction -- 2…Semi-Analytical Models for Spread and Wear -- 3…Experimental Data -- 4…Neural Network Model -- 5…Results and Discussion -- 6…Conclusions -- References -- Part IIHybrid Machine Learning for Non-stationary and Complex Data -- 23 Real-Time Analysis of Non-stationary and Complex Network Related Data for Injection Attempts Detection -- Abstract -- 1…Rationale -- 2…Current SQLIA Attack Detection Methods and Tools -- 3…Genetic Algorithm Description -- 4…Experiments -- 5…Results -- 6…Conclusions -- Acknowledgments -- References. , 24 Recommending People to Follow Using Asymmetric Factor Models with Social Graphs.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...