GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Computer networks-Security measures-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (588 pages)
    Edition: 1st ed.
    ISBN: 9783030009793
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.866
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- А System for Monitoring the Number and Duration of Power Outages and Power Quality in 0.38 kV Electrical Networks -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 3 Results -- 4 Discussions -- 5 Conclusions -- References -- A Novel Application of System Survival Signature in Reliability Assessment of Offshore Structures -- 1 Introduction -- 2 The Survival Signature -- 2.1 System Reliability Applying the Survival Signature -- 2.2 Obtaining the Survival Signature from Structural Simulations -- 3 Reliability of an Offshore Jacket Platform -- 3.1 Structural Model -- 3.2 Generation of Failure Tress -- 3.3 CDF of Component Types -- 4 Summary -- References -- Security Assurance Against Cybercrime Ransomware -- Abstract -- 1 Introduction -- 2 Background -- 3 Study of Ransomware -- 3.1 Types of Ransomware -- 3.2 Activities of Ransomware -- 4 WannaCry Ransomware -- 5 From Security to Safety -- 5.1 Insufficient Security Measures -- 5.2 Genesis -- 5.3 Security Assurance -- 5.4 Theoretical Basis for High Assurance Framework -- 6 Conclusion and Future Direction -- References -- SAR: A Graph-Based System with Text Stream Burst Detection and Visualization -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Document Stream -- 2.2 Burst Detection -- 3 System Design -- 3.1 Context Introduction -- 4 System Architecture -- 4.1 System Algorithm -- 5 Experimental Results and Evaluation -- 5.1 Programming Framework -- 5.2 Main Functions -- 6 System Testing and Evaluation -- 7 Conclusion and Future Work -- Acknowledgements -- References -- Detection of Black Hole Attacks in Mobile Ad Hoc Networks via HSA-CBDS Method -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results and Discussion -- 5 Conclusions -- Acknowledgements -- References. , Network Intrusion Detection Framework Based on Whale Swarm Algorithm and Artificial Neural Network in Cloud Computing -- Abstract -- 1 Introduction -- 2 Proposed Framework -- 2.1 Bubble-Net Attacking Method (Exploitation Phase) -- 2.2 Searching for Prey (Exploration Phase) -- 3 Classifier Design -- 3.1 BFGS Quasi-Newton Backpropagation -- 4 Model for N-IDS In-Eucalyptus Cloud Computing -- 5 Classifier Process in MATLAB -- 6 Conclusions -- Acknowledgments -- References -- The 'Smart' as a Project for the City Smart Technologies for Territorial Management Planning Strategies -- Abstract -- 1 Introduction -- 2 Intelligent Urban Mobility in the Smart City -- 3 The Case Study: Smart Mobility in the City Center of Rome -- 4 Experience of Using Smart Mobility in Rome -- 5 Smart Mobility for Urban Regeneration -- 6 Conclusions -- References -- The 'Governance' for Smart City Strategies and Territorial Planning -- Abstract -- 1 "Territorial Planning" as a Premise of the Smart City -- 2 The Smart City as a New City Model -- 3 Governance (Democracy, Technology, Technocracy) -- References -- T-MPP: A Novel Topic-Driven Meta-path-Based Approach for Co-authorship Prediction in Large-Scale Content-Based Heterogeneous Bibliographic Network in Distributed Computing Framework by Spark -- Abstract -- 1 Introduction -- 2 Related Works and Motivations -- 3 Methodology and System Architecture -- 3.1 Topic Similarity Evaluation Between Content-Based Nodes -- 3.2 Topic-Driven Meta-path-Based Topological Feature Extraction -- 3.3 Distributed Computing on Meta-path Count with Spark Graph-Frames -- 4 Experimental Studies and Discussions -- 4.1 Experimental Dataset Usage and Setup -- 4.2 Experimental Results and Discussions -- 5 Conclusion and Future Work -- Acknowledgements -- References -- Optimization of Hybrid Wind and Solar Renewable Energy System by Iteration Method. , 1 Introduction -- 2 Optimization Formulation -- 3 Constraints -- 4 Iterative Method -- 4.1 Numerical Datasets -- 5 Results -- 6 Conclusion -- References -- Modeling of Solar Photovoltaic Thermal Modules -- Abstract -- 1 Introduction -- 2 Method for Creating Three-Dimensional Models of Solar Photovoltaic Thermal Modules of Various Designs for Stationary and Mobile Power Generation -- 3 Implementation of the Method for Creating Three-Dimensional Models of Solar Photovoltaic Thermal Modules -- 4 Method of the Thermal Calculation of the Photovoltaic Thermal Solar Modules of Planar and Concentrator Types Using Simulation and Visualization of Processes in the Software Complex Ansys -- 5 Method of Manufacturing of Three-Dimensional Solid-State Prototypes of Components of Solar Modules Using Layered Printing -- References -- Thermo Physical Principles of Cogeneration Technology with Concentration of Solar Radiation -- Abstract -- 1 Introduction -- 2 Methods and Calculations -- 2.1 Design of the Load-Bearing Platform -- 2.2 Optical Concentrators -- 2.3 Linear PV Modules -- 3 Conclusions -- References -- Artificial Bee Colony Algorithm for Solving the Knight's Tour Problem -- Abstract -- 1 Introduction -- 2 Background and Knowledge -- 2.1 Knight's Tour Problem -- 2.2 Artificial Bee Colony Algorithm -- 3 Solving the Knight's Tour Problem by Using ABC -- 4 Experimental Settings and Results -- 5 Conclusions -- References -- The Model of Optimization of Grain Drying with Use of Eletroactivated Air -- Abstract -- 1 Introduction -- 2 Main Part -- 2.1 Research Method -- 2.2 Calculation of Criteria -- 2.3 Laboratory Setup -- 3 Conclusions -- References -- Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System -- Abstract -- 1 Introduction -- 2 Overview of Fast Learning Network -- 3 Overview of the Methodology -- 3.1 Fast Learning Network. , 3.2 Kernel Fast Learning Network -- 3.3 Particle Swarm Optimization -- 4 Experiments and Analysis -- 4.1 Implementing of Multi Kernel Based on Fast Learning Network -- 4.2 Experiments of Optimization Multi Kernel Fast Learning Network -- 5 Summary -- References -- Vehicular Ad Hoc Network: An Intensive Review -- Abstract -- 1 Introduction -- 1.1 VANET Architecture -- 1.2 VANET Application -- 1.3 VANET Infrastructure -- 2 VANET Security and Privacy -- 3 Conclusion -- References -- Optimization of the Parameters of the Elastic Damping Mechanism in Class 1,4 Tractor Transmission for Work in the Main Agricultural Operations -- Abstract -- 1 Introduction -- 2 Main Part -- 3 Conclusions -- References -- Energy-Efficient Pasteurizer of Liquid Products Using IR and UV Radiation -- Abstract -- 1 Introduction -- 2 Methods and Results of Research -- 2.1 Method of Calculation of Pasteurizer -- 2.2 Experimental Data -- 3 Conclusion -- References -- CAIAS Simulator: Self-driving Vehicle Simulator for AI Research -- Abstract -- 1 Introduction -- 2 Development of Simulation Engine -- 2.1 Interactive -- 2.2 Kinematic Bicycle Model -- 2.3 Number of Environments -- 2.4 Types and Construction of Sensors -- 2.5 Auxiliary Setting and Other Appliance -- 3 Result -- 3.1 Debugging and Performance Analysis in Unity -- 3.2 Test Result Evaluation from the Performance -- 4 Conclusion -- 4.1 Future Modification for More Robust Result -- Acknowledgments -- References -- Vision-Based Driver's Attention Monitoring System for Smart Vehicles -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Processing -- 3.2 Cues Extraction -- 3.3 Attention Estimation of Driver -- 3.4 Monitoring and Decision Making -- 4 Experimental Results -- 4.1 Accuracy of Estimating Attentional Status -- 4.2 Overall System Accuracy -- 5 Conclusion -- References. , Characterizing Current Features of Malicious Threats on Websites -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Characteristic Representation -- 3.1 URL Based Features and Classification -- 3.1.1 Features/Attributes of URLs -- 3.2 Content Based Features and Classification -- 3.2.1 Features/Attributes of JavaScript and HTML in Webpages -- 3.3 Network Protocol Features/HTTP Response Features of Suspected Malicious Performed in Webpages -- 4 Conclusion -- Acknowledgement -- References -- A Deep Learning Framework on Generation of Image Descriptions with Bidirectional Recurrent Neural Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Convolutional Neural Network (CNN) -- 2.2 Recurrent Neural Network (RNN) -- 2.3 Proposed Model -- 2.4 Annotation of Dataset -- 3 Methodology -- 4 Evaluation -- 5 Conclusion -- References -- Feature of Operation PV Installations with Parallel and Mixed Commutation Photocells -- Abstract -- 1 Introduction -- 2 Research -- 3 Conclusion -- References -- The Functional Dependencies of the Drying Coefficient for the Use in Modeling of Heat and Moisture-Exchange Processes -- Abstract -- 1 Existing Approaches to Modeling of Grain Drying -- 2 Brief Description of Experimental Studies -- 3 Obtaining Regression Equations -- 4 Conclusions -- References -- Investigation Model for Locating Data Remnants on Cloud Storage -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Cybercrime Evidence Collection Model -- 4 Experiment Results and Analysis -- 4.1 Box Cloud Base Images Created by Firefox Browser -- 4.2 Evidence Directories -- 4.3 Anti-forensic Techniques and Uninstallation of Box Client Software -- 4.4 Comparative Evaluation -- 5 Conclusion and Future Works -- Acknowledgements -- References -- An Intelligent Expert System for Management Information System Failure Diagnosis -- Abstract -- 1 Introduction. , 2 Theoretical Foundations.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (707 pages)
    Edition: 1st ed.
    ISBN: 9783030335854
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1072
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- A Timetabling Application for the Assignment of School Classrooms -- Abstract -- 1 Introduction -- 2 Development -- 2.1 Methodology -- 2.2 Constraints -- 3 Model -- 3.1 Variables -- 3.2 Objective Function -- 3.3 Constraints -- 3.4 Form Filling -- 4 Mathematical Programming Model in Worksheet -- 5 Conclusions -- References -- Estimation of Electricity Prices in the Mexican Market -- Abstract -- 1 Introduction -- 2 Alpha Stable Regression -- 3 Estimation of Electricity Price in Mexico -- 4 Conclusions -- References -- Predicting the Quality of MIS Characteristics and End-Users' Perceptions Using Artificial Intelligence Tools: Expert Systems and Neural Network -- Abstract -- 1 Introduction -- 2 Theoretical Foundations -- 2.1 Assessment Factors of IS -- 2.2 Expert System Concepts -- 3 Methodology -- 4 Design and Implementation of Knowledge -- 5 ANN Prediction Model of End-Users Perceptions -- 5.1 Factors of the Prediction Model -- 6 Result and Conclusion -- Appendix A: CLIPS Code of the Developed Expert System -- References -- Fuzzy Logic Controller for Modeling of Wind Energy Harvesting System for Remote Areas -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Description of Wind Energy Harvesting System -- 4 Fuzzy Logic Controller -- 5 Simulation and Results -- 6 Conclusion -- References -- Developing a Technique to Select Potential Candidates Using a Combination of Rough Sets and Fuzzy Sets -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Data Pre-processing Module -- 3.2 Query Execution Module -- 3.3 Analysis and Output Module -- 3.3.1 Dimension Reduction Using Rough Set -- 3.3.2 Fuzzy Clustering -- 3.3.3 Output Generation -- 4 Implementation and Experiments -- 5 Conclusion -- References -- Distributed Multi Cloud Storage System to Improve Data Security with Hybrid Encryption. , 1 Introduction -- 2 Cloud Attacks -- 3 Related Work -- 4 System Architecture and Design -- 4.1 Encryption and Decryption Module -- 4.2 Storage Module -- 4.3 Key Management Server -- 5 Experimental Setup -- 5.1 Storing Data -- 5.2 Retrieving Data -- 5.3 Cost and Data Availability -- 5.4 User Control -- 6 Performance Evaluations -- 7 Conclusion -- References -- Examining the Impact of Land Use/Land Cover Characteristics on Flood Losses: A Case Study of Surat City -- Abstract -- 1 Introduction -- 2 Study Area -- 3 Data Collection -- 3.1 Flood Scenarios at Surat City -- 4 Methodology -- 4.1 LULC for the Study Area -- 4.2 Flood Losses -- 5 Result and Conclusion -- References -- On the Development of Model for Grain Seed Reaction on Pre Sowing Treatment -- Abstract -- 1 Existing Approaches to the Construction of Models of Biological Objects -- 2 Developed Model -- 3 Conclusion -- References -- Development of a Laboratory Unit for Assessing the Energy Intensity of Grain Drying Using Microwave -- Abstract -- 1 Introduction -- 2 Main Part -- 2.1 Driving Forces of Heat and Moisture Transfer -- 2.2 Research Method -- 2.3 Results and Discussion -- 3 Conclusions -- References -- Intelligent Electrophysiological Control of Cows Milk Reflex by Registration Electrical Skin Activity -- Abstract -- 1 Introduction -- 1.1 Background -- 1.2 Objective -- 2 Method -- 2.1 The Research of Cows CNS Response While the Frequency Modulation of HFF on the Udder Take Place -- 2.2 Discussion and Research -- 2.3 The Application of HFF Influence in Regimes 15 and 30 Watts (W) at the Cows Udder Gave Various Effects -- 3 Results -- 4 Conclusions -- References -- Use of Computing Techniques for Flood Management in a Coastal Region of South Gujarat-A Case Study of Navsari District -- Abstract -- 1 Introduction -- 1.1 Use of Computational Techniques in Water Resources Engineering. , 1.2 Computational Techniques Used Flood Management -- 2 Case Study Area -- 2.1 Mapping of Flood and Its Management -- 3 Data Collection -- 3.1 HEC-RAS -- 3.2 ArcGIS -- 3.3 Boundary Condition -- 4 Methodology -- 4.1 Pre-Processing (Arc-GIS and HEC-GeoRAS) -- 4.1.1 DEM (Digital Elevation Model) -- 4.1.2 Georeferencing -- 4.1.3 Shapefiles -- 4.1.4 Mosaic -- 4.2 HEC-RAS Model Execution -- 5 Results and Discussion -- 5.1 Advantages and Limitation of HEC-RAS -- 6 Conclusion -- References -- Structural Design of an LMU Using Approximate Model and Satisficing Trade-Off Method -- Abstract -- 1 Introduction -- 2 Stiffness Analysis and Design of Experiments (DOE) -- 3 Generation of Hybrid Metamodel -- 3.1 Kriging -- 3.2 Response Surface Methodology -- 3.3 Hybrid Metamodel -- 4 Determination of the Reinforcement Steel Plates Using Multiobjective Optimization -- 4.1 Satisficing Trade-Off Method -- 4.2 Optimization Formulation -- 4.3 Optimization Results and Comparisons -- 5 Conclusion -- Acknowledgment -- References -- Recognition of Cow Teats Using the 3D-ToF Camera When Milking in the "Herringbone" Milking Parlor -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 4 Research Results -- 5 Conclusion -- 6 Future Work -- References -- Changes in Heart Rate Dynamics with Menstrual Cycles -- Abstract -- 1 Introduction -- 2 Methods -- 2.1 Study Subjects -- 2.2 Protocol -- 2.3 Measurements -- 2.4 Analysis of HRV and Heart Rate Dynamics -- 2.5 Statistical Analysis -- 3 Results -- 3.1 Basic Findings of 24-h ECG -- 3.2 Time Domain and Frequency Domain Analysis of HRV -- 3.3 Nonlinear Indices of Heart Rate Dynamics -- 3.4 Basal and Percentile Heart Rate -- 3.5 HRV Makers of Sleep Stage and Sleep Disordered Breathing -- 4 Discussions -- References -- Verifying the Gaming Strategy of Self-learning Game by Using PRISM-Games -- Abstract. , 1 Introduction -- 2 Background Theories -- 2.1 Reinforcement Learning -- 2.2 Safe Reinforcement Learning via Shielding -- 2.3 Q-learning -- 2.4 Monte Carlo Tree Search (MCTS) -- 2.5 Model Checking -- 2.6 Probabilistic Model Checking Using PRISM-Games -- 3 Related System -- 4 Applied Area -- 5 Purposed System -- 6 Experimental Results -- 7 Conclusion -- Acknowledgments -- References -- Optimization of Parquetting of the Concentrator of Photovoltaic Thermal Module -- Abstract -- 1 Introduction -- 2 The Method of Three-Dimensional Parquetting the Surface of a Parabolic Concentrator -- 3 Method of Fan-Shaped Parqueting of Surface of the Parabolic Concentrator -- 4 Parabolic Concentrator for Photovoltaic Thermal Receiver -- 5 Conclusion -- References -- Optimization of the Process of Anaerobic Bioconversion of Liquid Organic Wastes -- Abstract -- 1 Introduction -- 2 Background -- 3 Results of Investigations -- 4 Conclusion -- Acknowledgment -- References -- Efficiency Optimization of Indoor Air Disinfection by Radiation Exposure for Poultry Breeding -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 4 Research Results -- 5 Conclusions -- 6 Future Work -- References -- Optimal Power Flow Considering Cost of Wind and Solar Power Uncertainty Using Particle Swarm Optimization -- 1 Introduction -- 2 Modelling Wind and Solar Generation Costs -- 2.1 Wind Farm Power Output Probability Distribution -- 2.2 Solar Farm Power Output Probability Distribution -- 2.3 Opportunity Costs for Wind and Solar Shortage -- 2.4 Opportunity Costs for Wind and Solar Surplus -- 3 OPF Incorporating Renewable Generation Cost -- 3.1 Mathematical Model -- 4 Results and Discussions -- 5 Conclusion -- References. , Improvement of the Numerical Simulation of the Machine-Tractor Unit Functioning with an Elastic-Damping Mechanism in the Tractor Transmission of a Small Class of Traction (14 kN) -- Abstract -- 1 Introduction -- 2 Purpose of Research -- 3 Materials and Methods -- 4 Discussion Results -- 5 Conclusions -- Acknowledgements -- References -- Decomposition Algorithm for Irregular Placement Problems -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 A Solution Strategy -- 4 Conclusions -- References -- Smart Homes: Methodology of IoT Integration in the Architectural and Interior Design Process - A Case Study in the Historical Center of Athens -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Case Study: N Apartment and the Design Strategy of a Smart Home -- 3.1 New Forms of Design Stages Emerged - The Interaction Design and the Formation of Smart Space -- 4 'Enhanced' Architectural Design Emerging from the Integration of IoT in the Interior Design Process -- 5 Conclusion -- References -- The Mechanism of Intensification of Heat and Moisture Transfer During Microwave-Convective Processing Grain -- Abstract -- 1 Introduction -- 2 Main Part -- 2.1 The Mechanism of Removing Moisture -- 2.2 Regularities of Heat Transfer -- 2.3 Heat Moisture Transfer with Microwave Heating -- 3 Conclusions -- References -- Application of the Topological Optimization Method of a Connecting Rod Forming by the BESO Technique in ANSYS APDL -- Abstract -- 1 Introduction -- 2 Problem State -- 3 Description of the Optimization Method -- 4 Getting a New Part Shape -- 5 Optimization the Shape of an Existing Part -- 6 Conclusion -- References -- The Concept of Information Modeling in Interactive Intelligence Systems -- Abstract -- 1 Introduction -- 2 Problem State -- 3 Description of the Concept of Information Modeling in Interactive Intelligence Systems -- 4 Conclusion. , References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1341 pages)
    Edition: 1st ed.
    ISBN: 9783030681548
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1324
    DDC: 016.403
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- Sustainable Clean Energy System -- Adaptive Neuro-Fuzzy Inference Based Modeling of Wind Energy Harvesting System for Remote Areas -- Abstract -- 1 Introduction -- 2 Motivation and Objective of Research -- 3 Related Work -- 4 Wind Energy Harvesting System -- 4.1 Modelling of Wind Turbine -- 4.2 Modeling of the PMSG -- 5 Adaptive Neuro-Fuzzy Inference System -- 6 Simulation Results and Discussion -- 6.1 Limitation of Research -- 7 Conclusion and Future Scope -- Acknowledgments -- References -- Features of Distributed Energy Integration in Agriculture -- Abstract -- 1 Introduction -- 2 Problems of Integration of Distributed Energy Projects in Agriculture -- 3 Discussion and Results -- 4 Conclusions -- References -- Concept of Multi-contact Switching System -- Abstract -- 1 Introduction -- 2 MCSS -- 3 Discussion -- 4 Conclusions -- References -- The Design of Optimum Modes of Grain Drying in Microwave-Convective Effect -- Abstract -- 1 Introduction -- 2 Main Part -- 2.1 Research Method -- 2.2 Experiment -- 2.3 Results and Discussion -- 3 Conclusions -- References -- Isolated Agroecosystems as a Way to Solve the Problems of Feed, Ecology and Energy Supply of Livestock Farming -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 3 Conclusions -- References -- Laboratory-Scale Implementation of Ethereum Based Decentralized Application for Solar Energy Trading -- Abstract -- 1 Introduction -- 2 Implement of DApp Using the Ethereum Open-Source Platform -- 2.1 Set Up the Ethereum Environment -- 2.2 Set Up React -- 2.3 Set Up Identities with Ganache and Wallets with Metamask for Participants -- 3 Implement of ERC20 Token -- 4 Implement Energy Trading -- 4.1 The User Uses ET Token to Do Both Sell Orders and Buy Orders -- 4.2 Trading -- 5 Deployment and Experimental Result -- 6 Conclusion. , References -- Solar Module with Photoreceiver Combined with Concentrator -- Abstract -- 1 Introduction -- 2 Creation of the Geometry of Working Profile of the Paraboloid Type Solar Radiation Concentrator -- 3 Results of Calculating the Profile of the Concentrator Paraboloid Type -- 4 Conclusion -- Acknowledgment -- References -- Modeling of Bilateral Photoreceiver of the Concentrator Photovoltaic Thermal Module -- Abstract -- 1 Introduction -- 2 Three-Dimensional Modeling of Bilateral Photoreceivers of Photovoltaic Thermal Solar Modules -- 3 Modeling and Visualization of the Thermal State of the Bilateral Photoreceiver of the Concentrator Photovoltaic Thermal Module -- 4 Conclusion -- Acknowledgment -- References -- Formation of Surface of the Paraboloid Type Concentrator of Solar Radiation by the Method of Orthogonal Parquetting -- Abstract -- 1 Introduction -- 2 Paraboloid Type Concentrators of the Solar Radiation -- 3 Method of the Orthogonal Parqueting of Surface of the Paraboloid Type Concentrator of the Solar Radiation -- 4 Paraboloid Type Concentrators of the Solar Radiation for Various Photoreceivers -- 5 Conclusion -- Acknowledgment -- References -- Determination of the Efficiency of Photovoltaic Converters Adequate to Solar Radiation by Using Their Spectral Characteristics -- Abstract -- 1 Introduction -- 2 Comparison of the Spectral Densities of Current Photoresponses of a Reference Silicon Photovoltaic Converter Under Various Exposure Conditions -- 3 Averaged Spectral Densities of Power of the Photoactive Part of the Spectrum for Silicon -- 4 Comparison of the Spectral Densities of Current Photoresponses of the Silicon Photovoltaic Converters -- 5 Dependence of the Efficiency of the Silicon Photovoltaic Converter Versus the Wavelength -- 6 Conclusion -- Acknowledgment -- References. , Modeling of the Thermal State of Systems of Solar-Thermal Regeneration of Adsorbents -- Abstract -- 1 Introduction -- 2 Research Problem Statement -- 3 Research Results -- 4 Conclusion -- References -- Economic Aspects and Factors of Solar Energy Development in Ukraine -- Abstract -- 1 Conclusions -- References -- A Method for Ensuring Technical Feasibility of Distributed Balancing in Power Systems, Considering Peer-to-Peer Balancing Energy Trade -- Abstract -- 1 Introduction -- 2 Notion of Power Flow and Its Feasibility -- 3 Proposed Method -- 3.1 Optimal Power Flow Problem (OPF) -- 3.2 Formulation (2) - Identification of Most Problematic Unit -- 3.2.1 Addition of New Constraint -- 3.3 Formulation (3) - Operator's Corrective Actions -- 4 Assessment of the Method -- 4.1 Measure of Market Effectiveness -- 4.2 Simulation Results -- 4.2.1 Numerical Results -- 5 Conclusions and Discussion -- References -- Sustainable Optimization, Metaheuristics and Computing for Expert System -- The Results of a Compromise Solution, Which Were Obtained on the Basis of the Method of Uncertain Lagrange Multipliers to Determine the Influence of Design Factors of the Elastic-Damping Mechanism in the Tractor Transmission -- Abstract -- 1 Introduction -- 2 Purpose of Research -- 3 Materials and Methods -- 4 Discussion Results -- 5 Conclusions -- Acknowledgments -- References -- Multiobjective Lévy-Flight Firefly Algorithm for Multiobjective Optimization -- Abstract -- 1 Introduction -- 2 Multiobjective Lévy-Flight Firefly Algorithm -- 2.1 Original FA Algorithm -- 2.2 LFFA Algorithm -- 2.3 mLFFA Algorithm -- 3 Multiobjective Test Functions -- 4 Results and Discussions -- 5 Conclusions -- References -- Cooperative FPA-ATS Algorithm for Global Optimization -- Abstract -- 1 Introduction -- 2 Cooperative FPA-ATS Algorithm -- 2.1 FPA Algorithm -- 2.2 ATS Algorithm. , 2.3 Cooperative FPA-ATS Algorithm -- 3 Benchmark Functions -- 4 Results and Discussions -- 5 Conclusions -- References -- Bayesian Optimization for Reverse Stress Testing -- Abstract -- 1 Introduction -- 1.1 Problem Statement -- 2 Supporting Literature -- 2.1 Other Optimization Methods -- 3 Bayesian Optimization: Overview -- 3.1 The LCB Acquisition Function -- 4 Changes to LCB Acquisition -- 4.1 Rationalization of the ZERO Acquisition Function -- 4.2 Definition: Run Length -- 5 Results -- 5.1 Discussion -- 6 Conclusion and Future Scope -- Appendix A -- References -- Modified Flower Pollination Algorithm for Function Optimization -- Abstract -- 1 Introduction -- 2 FPA and MoFPA Algorithms -- 2.1 Original FPA Algorithm -- 2.2 Proposed MoFPA Algorithm -- 3 Selected Benchmark Functions -- 4 Results and Discussions -- 5 Conclusions -- References -- Improved Nature-Inspired Algorithms for Numeric Association Rule Mining -- 1 Introduction -- 2 Background Information -- 2.1 Association Rule Mining -- 2.2 Differential Evolution for ARM Using Mixed Attributes -- 3 Improved DE for NARM -- 4 Experiments and Results -- 4.1 Discussion -- 5 Conclusion -- References -- Verification of the Adequacy of the Topological Optimization Method of the Connecting Rod Shaping by the BESO Method in ANSYS APDL System -- Abstract -- 1 Introduction -- 2 Analysis of Publications -- 3 Description of the Developed Optimization Method -- 4 Assessment of the Adequacy of the Developed Method -- 5 Conclusion -- References -- Method for Optimizing the Maintenance Process of Complex Technical Systems of the Railway Transport -- Abstract -- 1 Introduction -- 2 Block Diagram of the Method for Optimizing the Parameters of the Maintenance System -- 3 Monitoring of the Technical Condition of the Technical System -- 4 Automatic Identification System "PALM". , 5 Automation of Obtaining the Necessary Initial Data to Optimize Maintenance Periods -- 6 Set of Operations for Maintenance -- 7 Conclusion -- References -- Optimization of Power Supply System of Agricultural Enterprise with Solar Distributed Generation -- Abstract -- 1 Introduction -- 2 Materials and Methods -- 3 Results and Their Discussion -- 4 Conclusion -- References -- Crack Detection of Iron and Steel Bar Using Natural Frequencies: A CFD Approach -- Abstract -- 1 Introduction -- 2 Mathematical Modeling -- 2.1 Governing Equation -- 2.2 Equation of Free Vibration -- 2.3 Boundary Conditions -- 3 Computational Domain and Mesh Generation -- 4 Numerical Results and Discussion -- 5 Conclusion -- 6 Future Study -- Acknowledgement -- References -- Belief Rule-Based Expert System to Identify the Crime Zones -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Crime Zone Prediction -- 3.2 Crime Zone -- 3.3 Purpose of Identifying Crime Zone -- 3.4 Types of Crime Zone -- 3.5 Crime Zone Prediction Techniques -- 3.6 Factors Related to Crime Zone -- 3.7 Design of BRB for Identifying Crime Zone -- 4 Implementation of Expert System -- 4.1 Initial Rule Base for X -- 4.2 User Interface -- 5 Results and Discussion -- 6 Conclusion -- References -- Parameter Tuning of Nature-Inspired Meta-Heuristic Algorithms for PID Control of a Stabilized Gimbal -- 1 Introduction -- 2 Description of the Control System -- 2.1 The Plant -- 2.2 Fitness Function Used for Meta-Heuristic Algorithms -- 3 Nature-Inspired Algorithms -- 3.1 Flower Pollination Algorithm -- 3.2 Teaching-Learning-Based Optimization Algorithm -- 4 Computational Experimental Design -- 5 Results and Discussions -- 5.1 Parameter Optimization -- 5.2 Robustness Analysis -- 5.3 Suggestions for Future Practitioners -- 6 Conclusion -- References. , Solving an Integer Program by Using the Nonfeasible Basis Method Combined with the Cutting Plane Method.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Newark :John Wiley & Sons, Incorporated,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (941 pages)
    Edition: 1st ed.
    ISBN: 9781119792635
    DDC: 338.9270285
    Language: English
    Note: Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Foreword -- Preface -- Acknowledgment -- Part I: Intelligent Computing and Applications -- 1 Assessing Mental Workload Using Eye Tracking Technology and Deep Learning Models -- 1.1 Introduction -- 1.2 Data Acquisition Method -- 1.2.1 Data Acquisition Experiment -- 1.3 Feature Extraction -- 1.4 Deep Learning Models -- 1.4.1 Artificial Neural Network -- 1.4.1.1 Training of a Neural Network -- 1.4.2 Bernoulli's Restricted Boltzmann Machines -- 1.5 Results -- 1.6 Discussion -- 1.7 Advantages and Disadvantages of the Study -- 1.8 Limitations of the Study -- 1.9 Conclusion -- References -- 2 Artificial Neural Networks in DNA Computing and Implementation of DNA Logic Gates -- 2.1 Introduction -- 2.2 Biological Neurons -- 2.3 Artificial Neural Networks -- 2.3.1 McCulloch-Pitts Neural Model -- 2.3.2 The Perceptron -- 2.3.3 ANN With Continuous Characteristics -- 2.3.4 Single-Layer Neural Network -- 2.3.5 Multilayer Neural Network -- 2.3.6 Learning Process -- 2.4 DNA Neural Networks -- 2.4.1 Formation of Axon by DNA Oligonucleotide and Generation of Output Sequence -- 2.4.2 Design Strategy of DNA Perceptron -- 2.4.2.1 Algorithm -- 2.4.2.2 Implementation of the Algorithm -- 2.5 DNA Logic Gates -- 2.5.1 Logic Gates Using Deoxyribozymes -- 2.5.1.1 Catalytic Activity of Deoxyribozyme -- 2.5.1.2 Controlling Deoxyribozyme Logic Gate -- 2.5.1.3 YES Gate -- 2.5.1.4 NOT Gate -- 2.5.1.5 AND Gate -- 2.5.1.6 ANDANDNOT Gates -- 2.5.2 Enzyme-Free DNA Logic Circuits -- 2.5.2.1 Construction of Enzyme-Free DNA Logic Gate -- 2.5.2.2 DNA Logic Circuits -- 2.5.3 DNA Logic Circuits Using DNA Polymerase and Nicking Enzyme -- 2.5.3.1 AND Reaction -- 2.5.3.2 OR Reaction -- 2.5.3.3 PROPAGATE (PROP) Reaction -- 2.5.4 Applications of DNA Logic Gate. , 2.5.4.1 Playing Tic-Tac-Toe by DNA -- 2.5.4.2 Medical Application of the Concept of DNA Logic Gate -- 2.6 Advantages and Limitations -- 2.7 Conclusion -- Acknowledgment -- References -- 3 Intelligent Garment Detection Using Deep Learning -- 3.1 Introduction -- 3.2 Literature -- 3.3 Methodology -- 3.3.1 Obtaining the Foreground Information -- 3.3.1.1 GMG Background Subtraction -- 3.3.1.2 Person Detection -- 3.3.2 Detection of Active Garments -- 3.3.3 Identification of Garments of Interest -- 3.3.3.1 Centroid Tracking -- 3.3.3.2 Pose Estimation -- 3.3.3.3 Calculation of Confidence Score -- 3.4 Experimental Results -- 3.4.1 Dataset Used -- 3.4.2 Experimental Results and Statistics -- 3.4.3 Analysis of the Proposed Approach -- 3.5 Highlights -- 3.6 Conclusion and Future Works -- Acknowledgements -- References -- 4 Intelligent Computing on Complex Numbers for Cryptographic Applications -- 4.1 Introduction -- 4.2 Modular Arithmetic -- 4.2.1 Introduction -- 4.2.2 Congruence -- 4.2.3 Modular Arithmetic Operations -- 4.2.4 Inverses -- 4.3 Complex Plane -- 4.3.1 Introduction -- 4.3.2 Complex Number Arithmetic Operations and Inverses -- 4.4 Matrix Algebra -- 4.4.1 Introduction -- 4.4.2 Matrix Arithmetic Operations -- 4.4.3 Inverses -- 4.5 Elliptic Curve Arithmetic -- 4.5.1 Introduction -- 4.5.2 Arithmetic Operations on E(GF(p)) -- 4.6 Cryptographic Applications -- 4.6.1 Hill Cipher -- 4.6.2 Elliptic Curve Cryptography -- 4.6.2.1 Elliptic Curve Encryption Scheme -- 4.6.2.2 Elliptic Curve Signature Scheme -- 4.6.3 Quantum Cryptography -- 4.7 Conclusion -- References -- 5 Application of Machine Learning Framework for Next-Generation Wireless Networks: Challenges and Case Studies -- 5.1 Introduction -- 5.2 Machine/Deep Learning for Future Wireless Communication -- 5.2.1 Automatic Modulation Classification -- 5.2.2 Resource Allocation (RA). , 5.2.3 Channel Estimation/Signal Detection -- 5.2.4 Millimeter Wave -- 5.3 Case Studies -- 5.3.1 Case Study-1: Automatic Modulation Classification -- 5.3.1.1 System Model -- 5.3.1.2 CNN Architectures for Modulation Classification -- 5.3.1.3 Results and Discussion -- 5.3.2 Case Study 2: CSI Feedback for FDD Massive MIMO Systems -- 5.3.2.1 Proposed Network Model -- 5.3.2.2 Results and Discussion -- 5.4 Major Findings -- 5.5 Future Research Directions -- 5.6 Conclusion -- References -- 6 Designing of Routing Protocol for Crowd Associated Networks (CrANs) -- 6.1 Introduction -- 6.1.2 Challenges -- 6.1.2.1 Limitation of Research -- 6.2 Background Study -- 6.2.1 AdHoc Network -- 6.2.2 WSN -- 6.2.3 MANETs -- 6.2.4 VANETs -- 6.2.5 FANETs -- 6.2.6 Overview of Routing Protocols -- 6.2.6.1 MANET -- 6.2.6.2 VANET -- 6.2.6.3 FANETs -- 6.2.6.4 MANETs -- 6.2.6.5 VANETs -- 6.2.6.6 FANETs -- 6.2.7 Mobility Model -- 6.2.7.1 MANETs -- 6.2.7.2 VANETs -- 6.2.7.3 FANETs -- 6.2.8 Types of Communication -- 6.2.8.1 MANET -- 6.2.8.2 VANET -- 6.2.9 QOS -- 6.2.9.1 Packet Loss -- 6.2.9.2 Bandwidth -- 6.2.9.3 Data Rate -- 6.2.9.4 Frequency -- 6.2.9.5 Packet Delivery Ratio (PDR) -- 6.2.9.6 Bit Noise Ratio -- 6.3 CrANs -- 6.3.1 Structure of CrANs -- 6.3.2 Routing -- 6.3.2.1 Single Hop -- 6.3.2.2 Multiple Hop -- 6.3.3 Classification of Routing Protocol -- 6.3.3.1 Location Base Protocol -- 6.3.3.2 Route Discovery -- 6.3.3.3 Protocol Operation -- 6.3.4 Challenge -- 6.3.4.1 Latency -- 6.3.4.2 Reliability -- 6.3.4.3 Security -- 6.3.4.4 Power Consumption -- 6.3.4.5 Energy -- 6.3.5 Applications -- 6.3.5.1 Monitoring -- 6.3.5.2 Control and Automation -- 6.3.5.3 Safety -- 6.3.5.4 Nuclear Power Plants -- 6.3.5.5 Deserts -- 6.3.5.6 Recovery Structure -- 6.3.5.7 Earth Quake -- 6.3.5.8 Road Blasts -- 6.4 Simulation of MANET Network -- 6.4.1 Deployment Area. , 6.4.2 Divide Deployment Area Into Equal Zones -- 6.4.3 Getting Positions of the Sensor Nodes -- 6.4.4 Mesh Formation -- 6.4.5 Getting the Minimum Spanning Tree for the Whole Placement Area -- 6.4.6 Energy Calculation -- 6.4.7 Average Delay -- 6.4.8 Throughput -- 6.5 Simulation of VANET Network -- 6.5.1 Placement of Nodes -- 6.5.2 Sender Node and Receiver Node -- 6.5.3 Euclidean Distance Between Two Coordinates -- 6.5.4 Separation of Faulty Nodes -- 6.5.5 Best Match of the Node -- 6.5.6 Cases of Simulation -- 6.5.7 Delay -- 6.5.8 Packet Delivery Ratio -- 6.5.9 Throughput -- 6.6 CrANs -- 6.6.1 Deploy of Nodes -- 6.6.2 Info Transfer 1 -- 6.6.3 Calculate the Fitness Function -- 6.6.4 Routing Nodes -- 6.7 Conclusion -- References -- 7 Application of Group Method of Data Handling- Based Neural Network (GMDH-NN) for Forecasting Permeate Flux (%) of Disc-Shaped Membrane -- 7.1 Introduction -- 7.1.1 Motivation, Background and Literature Review -- 7.1.2 Novelty and Objective of the Chapter -- 7.1.3 Research Contribution -- 7.1.4 Organization of the Chapter -- 7.2 Experimental Procedure -- 7.3 Methodology -- 7.3.1 Generation of Data -- 7.3.2 Group Method of Data Handling-Based Neural Network -- 7.3.3 Artificial Neural Network -- 7.3.4 Normalization of the Data -- 7.3.5 Analysis of Error -- 7.3.6 Advantages and Disadvantages of the Study -- 7.4 Results and Discussions -- 7.4.1 Development of GMDH Model -- 7.4.2 Analysis of Error -- 7.4.3 Comparative Study -- 7.4.4 Sensitivity Analysis -- 7.4.5 Major Findings -- 7.5 Conclusions -- 7.5.1 Limitation -- 7.5.2 Future Research Direction -- Acknowledgements -- References -- 8 Automated Extraction of Non-Functional Requirements From Text Files: A Supervised Learning Approach -- 8.1 Introduction -- 8.1.1 Requirements Descriptions are as Follows -- 8.1.1.1 Business Requirements -- 8.1.1.2 Requirements of Users. , 8.1.1.3 System Requirements -- 8.1.1.4 Functional Requirements -- 8.1.1.5 Non-Functional Requirements -- 8.1.2 Examples of Non-Functional Requirements -- 8.1.2.1 Benefits of Non-Functional Requirements -- 8.1.2.2 Drawbacks of Non-Functional Requirements -- 8.1.3 Problem Statement -- 8.1.4 Research Objectives -- 8.1.5 Scope of Work -- 8.2 Literature Survey -- 8.3 Methodology -- 8.3.1 Search String Planning -- 8.3.2 Classifier Configuration -- 8.3.2.1 Supervised Machine Learning -- 8.3.2.2 Supervised Learning Algorithms -- 8.4 Dataset -- 8.5 Evaluation -- 8.6 Conclusion -- References -- 9 Image Classification by Reinforcement Learning With Two-State Q-Learning -- 9.1 Introduction -- 9.2 Proposed Approach -- 9.3 Datasets Used -- 9.3.1 ImageNet -- 9.3.2 Cats and Dogs Dataset -- 9.3.3 Caltech-101 -- 9.4 Experimentation -- 9.5 Conclusion -- References -- 10 Design and Development of Neural-Fuzzy Control Model for Computer-Based Control Systems in a Multivariable Chemical Process -- 10.1 Introduction -- 10.1.1 Programmable Logic Controller -- 10.1.1.1 Merits of PLC Over Relay Logic -- 10.1.1.2 Various Modules of PLC -- 10.1.1.3 Working of PLC -- 10.2 Distributed Control System -- 10.2.1 DCS Evolution -- 10.2.2 DCS Provisions -- 10.2.3 Main Components of DCS -- 10.2.4 Different Hierarchy Levels of DCS -- 10.2.5 Advantages of DCS -- 10.3 Fuzzy Logic -- 10.4 Artificial Neural Network -- 10.4.1 Artificial Neural Network's Framework -- 10.5 Neuro-Fuzzy -- 10.5.1 Neural Network, Fuzzy Logic, and Neuro-Fuzzy Concepts -- 10.5.2 Design of Neuro-Fuzzy Controller -- 10.5.3 Software Used -- 10.6 Case Study -- 10.6.1 Objective -- 10.6.2 Description -- 10.6.3 Formulation of Control Problem -- 10.6.4 Formulation of Control Strategy -- 10.6.5 Level of Instrumentation in Case Study -- 10.7 Software Implementation on Graphical User Interface -- 10.8 Results and Discussion. , 10.9 Discussion.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Computer science-Mathematics. ; Computational intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (342 pages)
    Edition: 1st ed.
    ISBN: 9783319669847
    Series Statement: Studies in Computational Intelligence Series ; v.741
    DDC: 004.0151
    Language: English
    Note: Intro -- Foreword -- Preface -- Acknowledgements -- Contents -- A Performance Analysis of DF Model in the Energy Harvesting Half-Duplex and Full-Duplex Relay Networks -- 1 Introduction -- 2 Network Model -- 2.1 The Full Duplex Relaying Model -- 2.2 The Half-Duplex Relaying -- 3 The Outage Probability and Throughput Analysis -- 3.1 The Outage Probability Analysis -- 3.2 The Throughput Analysis -- 4 Numerical Results -- 5 Conclusion -- References -- 2 A Model of Swarm Intelligence Based Optimization Framework Adjustable According to Problems -- Abstract -- 1 Introduction -- 2 Background -- 2.1 The Concept of Intelligent Optimization -- 2.2 Swarm Intelligence -- 2.3 Essentials of Swarm Intelligence Based Techniques-Algorithms -- 3 A Model of Swarm Intelligence Based Optimization Framework -- 3.1 Programming Approach -- 3.2 General Model Structure -- 4 General Working Mechanism of the Framework -- 4.1 Intelligent Behaviors -- 4.2 Parser -- 4.3 Algorithm Infrastructure -- 4.4 Visual Support -- 4.5 An Example Scenario -- 5 Discussion -- 6 Future Research Directions -- 7 Conclusion -- Acknowledgements -- References -- Domain Model Definition for Domain-Specific Rule Generation Using Variability Model -- 1 Introduction -- 2 Related Work -- 3 Business Process Models and Constraints -- 4 Ontology-Based Conceptual Domain Model -- 5 Language Definition of a Domain Model -- 5.1 Language Description -- 5.2 Syntax -- 5.3 Abstract Syntax -- 5.4 Concrete Syntax -- 6 Rule Language Definition -- 7 Implementation of Principle Architecture of DSRL Generator -- 7.1 Architecture -- 7.2 Mappings Domain Model and Domain-Specific Rule Language -- 7.3 Domain Model Translation into DSR -- 8 Generated Rule Analysis and Evaluation -- 9 Discussion -- References -- A Set-Partitioning-Based Model to Save Cost on the Import Processes -- 1 Introduction -- 2 Background. , 2.1 Supply Chain -- 2.2 Regulations -- 2.3 Regulations and Supply Chain -- 2.4 Certification Process -- 3 Proposal -- 3.1 Current Problem -- 3.2 Whole Applied Programming -- 3.3 Set Partitioning Problem -- 3.4 SPaP example -- 4 Proposed Mathematical Model -- 5 Computational Experimentation -- 5.1 Equipment -- 5.2 Test Cases -- 5.3 Analysis and Results -- 5.4 Conclusions -- 6 Future Research Directions -- References -- Combining Genetic Algorithm with Variable Neighborhood Search for MAX-SAT -- 1 Introduction -- 2 Maximum Satisfiability Problem (MAX-SAT) -- 3 Basic Variable Neighborhood Search (VNS) -- 4 A Variable Neighborhood Search Structure Based Genetic Algorithm (VNS-GA) -- 5 Experimental Results -- 5.1 Test Suite and Parameter Settings -- 5.2 Observed Behavior -- 5.3 Statistical Analysis -- 6 Conclusions -- References -- 6 Enzyme Classification on DUD-E Database Using Logistic Regression Ensemble (Lorens) -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Binary Logistic Regression -- 2.2 Logistic Regression Classification by Ensembles from Random Partitions (LR-CERP) -- 2.3 Logistic Regression Ensemble (Lorens) -- 2.4 Cross Validation -- 3 Materials and Method -- 3.1 Data Source -- 3.2 Variable -- 3.3 Analysis Steps -- 4 Results and Discussion -- 4.1 Characteristic of Enzymes on DUD-E Database -- 4.2 Binary Logistic Analysis for Enzymes on DUD-E Database -- 4.3 Analysis Logistic Regression Ensembles (Lorens) to Classify DUD-E Database -- 4.4 Random Partition and Model Building -- 4.5 Classification by Cross Validation -- 5 Conclusion -- Acknowledgements -- References -- 7 Consolidation of Host-Based Mobility Management Protocols with Wireless Mesh Network -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Terminology -- 3.1 Host-Based Mobility Management Protocols -- 3.2 Wireless Mesh Network -- 4 Simulation Design. , 4.1 Simulation Setup -- 4.2 Performance Metrics -- 5 Results and Discussion -- 6 Conclusion -- Acknowledgements -- References -- Application of Parallel Computing Technologies for Numerical Simulation of Air Transport in the Human Nasal Cavity -- 1 Introduction -- 2 Background -- 3 Statement of the Physical Problem -- 4 The Numerical Algorithm -- 5 Algorithm of Parallelization -- 6 Results of Numerical Simulation -- 7 Future Research Directions -- 8 Conclusion -- References -- 9 Genetic Algorithms-Based Techniques for Solving Dynamic Optimization Problems with Unknown Active Variables and Boundaries -- Abstract -- 1 Introduction -- 2 Dynamic Optimization Problems with Unknown Active Variables and Boundaries (DOPUAVBs) -- 3 Genetic-Based Algorithms for Solving DOPUAVBs -- 3.1 SGA -- 3.2 GAUAV -- 3.3 GAUB -- 3.4 GAUAVB -- 4 Experimental Setup, Analysis and Discussion -- 4.1 Comparison Based on the Quality of Solutions -- 4.2 Comparison Based on Feasibility -- 5 Conclusions and Future Work -- References -- 10 Text Segmentation Techniques: A Critical Review -- Abstract -- 1 Introduction -- 2 Review Method -- 3 Results -- 4 Discussion -- 5 Conclusion -- Acknowledgements -- References -- On-Line Power Systems Security Assessment Using Data Stream Random Forest Algorithm Modification -- 1 Introduction -- 2 Problem Formulation -- 2.1 Existing Approaches to Emergency and Operational Control -- 3 Proposed Approach -- 3.1 Base Classifier Weighting Function -- 3.2 Forgetting Strategy -- 3.3 Proximity Driven Streaming Random Forest -- 4 Structure of an Automatic Intelligent System -- 5 Experimental Evaluation -- 5.1 L-index -- 5.2 Failure Scenarios and Results on IEEE 118-Bus Test System -- 6 Conclusions -- References -- 12 Enhanced Security of Internet Banking Authentication with EXtended Honey Encryption (XHE) Scheme -- Abstract -- 1 Introduction. , 2 Attack Models on Password-Based Authentication System and Its Countermeasures -- 3 A Survey of Malaysian Online Banking Authentication Systems and Theirs Countermeasures -- 4 Extended Honey Encryption (HE) Scheme -- 4.1 Preliminaries -- 4.2 Extended Honey Encryption (XHE) Scheme -- 5 Extended Honey Encryption in Enhancing Security of Internet Banking Authentication System -- 6 Conclusion -- Acknowledgements -- References -- 13 An Enhanced Possibilistic Programming Model with Fuzzy Random Confidence-Interval for Multi-objective Problem -- Abstract -- 1 Introduction -- 2 Preliminary Studies and Definitions -- 2.1 Fuzzy Random Regression -- 2.2 Possibilistic Programming -- 2.2.1 Possibility and Necessity Measures -- 2.2.2 Handling Uncertainties Through Necessity Measure -- 3 Solution Approach: Modality Approach for Solving Multi-objective Possibilistic Problem with Fuzzy Random Confidence-Interval -- 3.1 Terminology and Notation -- 3.2 Solving Multi-objective Possibilistic Problem -- 3.3 Weighting Method for Multi-objective Linear Fractional Problem -- 4 Numerical Experimentation -- 5 Discussion and Future Direction -- 6 Conclusion -- Acknowledgements -- References -- 14 A Crowdsourcing Approach for Volunteering System Using Delphi Method -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Volunteers -- 2.2 Volunteer Management -- 2.3 Recruitment and Selection for Volunteers -- 2.4 Volunteer Management Systems and Platforms -- 2.5 Crowdsourcing -- 2.6 The Process of Crowdsourcing -- 3 Proposed Framework for Volunteering System -- 3.1 Framework -- 3.2 Volunteer in Crowdsourcing -- 4 Selecting Volunteer Criteria Using Delphi Method -- 4.1 Delphi Method -- 4.2 Expert Panel -- 4.3 Research Design -- 4.3.1 Phase 1: Literature Review -- 4.3.2 Phase 2: Narrowing Down -- 4.3.3 Phase 3: Ranking -- 5 Results -- 6 Discussion -- 7 Conclusion. , Acknowledgements -- References -- 15 One Dimensional Vehicle Tracking Analysis in Vehicular Ad hoc Networks -- Abstract -- 1 Introduction -- 2 Background -- 3 Estimated Filter -- 4 Kalman Filter on VANET System -- 5 Mathematical Overview of Kalman Filter -- 6 Vehicle Tracking Algorithm -- 7 Simulation and Results -- 7.1 When New Estimation not Calculated (Initial Condition) -- 7.1.1 Accurate Estimation (Medium Speed Vehicle) -- 7.1.2 Less Accurate Estimation (Lower Speed Vehicle) -- 7.1.3 Less Accurate Estimation (High Speed Vehicle) -- 7.1.4 Case of Moving Velocity Vehicle -- 7.1.5 Case of Noisy Prediction (Don't Sure About the Exact Velocity) -- 8 Conclusion -- Acknowledgements -- References -- 16 Parallel Coordinates Visualization Tool on the Air Pollution Data for Northern Malaysia -- Abstract -- 1 Introduction -- 2 Literature Review -- 2.1 Related Work -- 3 Methodology -- 3.1 APVT Parameters Organization and Display -- 3.2 Design Goals -- 3.3 Data Collection -- 3.4 Relationship with Parallel Coordinates -- 4 Visualization Techniques -- 4.1 Parallel Coordinates -- 4.2 Implementation -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- 17 Application of Artificial Bee Colony Algorithm for Model Parameter Identification -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Artificial Bee Colony Optimization -- 2.2 Problem Formulation -- 3 Numerical Results -- 4 Discussion -- 5 Conclusions -- 6 Future Research Directions -- Acknowledgements -- References -- 18 A Novel Weighting Scheme Applied to Improve the Text Document Clustering Techniques -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Text Clustering Method -- 4 Evaluation Measures -- 5 Experimental Results -- 6 Conclusion -- Acknowledgements -- References -- 19 A Methodological Framework to Emulate the Visual of Malaysian Shadow Play With Computer-Generated Imagery. , Abstract.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Computational intelligence-Congresses. ; Digital communications-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1215 pages)
    Edition: 1st ed.
    ISBN: 9783031199585
    Series Statement: Lecture Notes in Networks and Systems Series ; v.569
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Newark :John Wiley & Sons, Incorporated,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (492 pages)
    Edition: 1st ed.
    ISBN: 9781119771517
    DDC: 621.042028563
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    New York :Nova Science Publishers, Incorporated,
    Keywords: Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (362 pages)
    Edition: 1st ed.
    ISBN: 9781685073039
    Series Statement: Computer Science, Technology and Applications Series
    DDC: 333.794
    Language: English
    Note: Intro -- Contents -- Preface -- Part A: Clean Energy -- Part B: Transportation Industry -- Part A: Clean Energy -- Chapter 1 -- RES-Based Multipurpose Plant for Hydrogen Production -- Abstract -- Notations and Abbreviations -- Introduction -- Concept of RES-Based Plant for Hydrogen Production -- Power Generation and Utilization in the Plant -- Production of the Distilled Water -- Hydrogen Production, Usage and Realisation -- Matching of the Capacities of the Plant's Technological Equipment -- Control System of the Technological Processes -- Further Research Directions -- Conclusion -- Acknowledgments -- References -- Chapter 2 -- Developing a Bayesian Network to Model Environmental, Organizational, and Human Risk Factors: A Case Study on Wind Turbines -- Abstract -- Introduction -- The Structure of Wind Turbines -- BN (Background, Concepts and Applications) -- BN Background -- BN Concept -- BN Application -- Building a BN -- Developing a BN for Risk Assessment of Wind Turbines -- Model Implementation and Discussion -- Impact of Environmental Factors on Reliability -- Impacts of Organizational and Human Factors on Reliability -- Conclusion -- References -- Chapter 3 -- Digital Technologies for the Implementation of Intelligent Diagnostics of the Insulation of Power Supply Systems with Insulated Neutral in Operating Mode -- Abstract -- Introduction -- Materials and Methods -- Conclusion -- Future Research Works -- References -- Chapter 4 -- Irrigation System of Agricultural Fields with the Use of Solar Energy -- Abstract -- Introduction -- Purpose of the Study -- Materials and Methods -- Discussion Results -- Description of the Developed Irrigation System -- Сonclusion -- References -- Chapter 5 -- Strategies Hybrid Simulation for Regional Market Development of Renewable Energy -- Abstract -- Introduction -- Literature Review -- Method. , Proposed Methodology for Evaluating the Functional Safety Analysis -- Results and Discussion -- Conclusion -- Acknowledgments -- References -- Chapter 6 -- RES-Based Power Plants versus Polluting Power Plants: Pros and Cons -- Abstract -- List of Notations and Abbreviations -- Introduction -- RES-Based Power Plants -- Solar Power Plants -- Wind Power Plants -- Hydroelectric Power Plants -- Environment Polluting Power Plants -- Coal Power Plants -- Natural Gas Power Plants -- Nuclear Power Plants -- Comparison of the RES-Based and Polluting Power Plants -- Other Advantages of the RES-Based Power Plants -- Conclusion -- Acknowledgments -- References -- Chapter 7 -- A Comprehensive Study of System Building Blocks for Radio Frequency Energy Harvesting -- Abstract -- 1. Introduction -- 2. Overview of an RFEH System -- 2.1. Power Conversion Efficiency -- 2.2. Sensitivity -- 2.3. Frequency Bands and Availability -- 2.4. Near and Far-Field Radiations -- 3. Antenna -- 3.1. Parameters of Interest -- 3.2. Developments in Design -- 4. Impedance Matching -- 4.1. Q Factor and Tuning -- 4.2. Reflection Coefficient and Efficiency -- 5. Rectifier -- 5.1. Diodes in Rectifier -- 5.2. CMOS -- 5.3. Active Diodes -- 6. Load/Energy Storage Devices -- 6.1. Battery Charging -- 6.2. Effect of Load on Efficiency -- 7. Power Management -- 8. Challenges and Limitations -- Conclusion -- References -- Part B: Transportation Industry -- Chapter 8 -- The Management of Community Participation in Rural Infrastructure Development in the Mekong River Delta, Vietnam -- Abstract -- Introduction -- Community Participation in Rural Infrastructure Development -- Community and Community Participation -- Community -- Community Participation -- Rural Transport Infrastructure Development -- Rural Transport Infrastructure -- Rural Transport Infrastructure Development. , Community Participation in Rural Transport Infrastructure Development -- Forms of Community Participation in Rural Transport Infrastructure Development -- The Role of Community Participation in Rural Transport Infrastructure Development -- Different Types of Community Participation in Rural Transport Infrastructure Development -- The Management of Community Participation in Rural Infrastructure Development and Its Influential Factors -- The Management of Community Participation in Rural Transport Infrastructure Development -- Influential Factors of the Management for Community Participation in Rural Transport Infrastructure Development -- Community Management Qualifications and Experience -- Mechanism and Model of Community Participation Management -- Methods and Organization of Community Participation Management -- Objects and Characteristics of the Community Involved -- Other Factors That Influence Participation Management -- Practical Experience For Managing Community Participation in Rural Transport Infrastructure Development -- Experience of Some Localities in Vietnam on Managing Community Participation in Rural Transport Infrastructure Development -- The Management of Community Participation in the Development of Rural Community Infrastructure in Mekong River Delta, Vietnam -- Introduction to the Mekong Delta, Vietnam -- Current Situation of Community Participation Management in Rural Transport Infrastructure Development in the Mekong Delta, Vietnam -- Community Management Qualifications in Rural Transport Infrastructure Development -- Mechanism and Management Model in Rural Transport Infrastructure Development -- Characteristics of Rural Transport Infrastructure with Participatory Management from the Community -- Methods and Management Organization in Rural Transport Infrastructure Development. , Objects and Characteristics of the Community in Rural Transport Infrastructure Development -- Model of Community Participation Management in Rural Transport Infrastructure Development -- Effective Management of Community Participation in Rural Transport Infrastructure Development -- Solutions to Promote Management Community Participation in Rural Infrastructure Development in Community Provinces in the Mekong River, Vietnam -- Building Models and Coordination Mechanisms for Community Representatives to Manage Community Participation in Rural Transport Infrastructure Development -- Improve Management Qualifications for Community Representatives to Manage Participation in Rural Transport Infrastructure Development -- Develop Methods and Organize the Management of Community Participation in Rural Transport Infrastructure Development -- Regularly Train Community Representatives to Manage and Advocate for the Community and to Participate in the Management and Contribution For Rural Transport Infrastructure Development -- Limitations and Future Research -- Conclusions and Recommendations -- Conclusions -- Recommendations -- For the State -- For Localities -- Acknowledgment -- References -- Chapter 9 -- Warning System for Cracked Pipes in Autonomous Vehicles -- Abstract -- 1. Introduction -- 2. Axis Aligned Bounding Boxes -- 3. Assumptions -- 4. Implementation -- 5. Results -- 6. Limitations -- 7. Future Research Directions -- Conclusion -- References -- Chapter 10 -- Contribution of Machine Learning to Rail Transport Safety -- Abstract -- Introduction -- Analytical Framework -- Literature Review -- Motivations, Objectives and Contributions with Respect the State of the Art -- Method 1: Proposed Methodology for Evaluating the Functional Safety Analysis -- Acquisition and Modelling of Safety Knowledge -- Classification of Accident Scenarios. , Evaluation of Accident Scenarios -- Method 2: Proposed Methodology for Assessment the Safety of Critical Software -- Acquisition and Modelling of Knowledge -- Definition of the Description Language of the SEEA Examples -- Developing the SEEA Case Base -- Parameterization of the CBR Process -- Entering the New SEEA Target Case for Evaluation -- Indexing of the SEEA Case Base -- Extraction of Similar SEEA Cases -- Adaptation of Extracted Cases (Source Cases) -- Updating the SEEA Base -- Results and Discussion -- Validation -- Discussion -- Contributions and Benefits of Results -- Limitations -- Directions/Future Research Work -- Conclusion -- References -- Chapter 11 -- The Power of Variable Freeing and Variable Sum Bounds in Solving the Linear Knapsack Problem -- Abstract -- 1. Introduction -- 2. Applications of the Knapsack Model -- 3. The Linear Integer Problem -- 3.1. The General Linear Integer Problem -- 3.1.1. Continuous Optimal Solution of the General Integer Problem -- 3.2. Knapsack Problem and Statement of Problem -- 3.2.1. Continuous Optimal Solution -- 3.2.2. The Upper Bound of the Objective Value -- 3.2.3. Variable Sum Bounds -- 4. Variable Freeing -- 4.1. Variable Freeing Theorem -- 4.2. Strength of Variable Freeing in a Branch and Bound Setting -- 5. Reformulation of a Knapsack Problem -- 5.1. Reformulation by Introducing Binary Variables -- 5.2. Reformulation as a Bounded Variable -- 6. Proposed Algorithm -- 6.1. Numerical Illustration -- 7. Computational Experiments -- 8. Limitations -- Conclusion -- Further Research -- References -- About the Editors -- Index -- Blank Page -- Blank Page.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computational intelligence-Congresses. ; Computational intelligence-Simulation methods. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1020 pages)
    Edition: 1st ed.
    ISBN: 9783030932473
    Series Statement: Lecture Notes in Networks and Systems Series ; v.371
    DDC: 006.3
    Language: English
    Note: Intro -- Conference Committees ICO'2021 -- Steering Committee -- General Chair -- Honorary Chairs -- TPC Chairs -- Special Sessions Chairs -- Keynote Chairs and Panel Chairs -- Publicity and Social Media Chairs -- Workshops and Tutorials Chairs -- Posters and Demos Chairs -- Sponsorship and Exhibition Chairs -- Publications Chairs -- Webinar Coordinator -- Web Editor -- Reviewers -- Contents -- Editors -- Sustainable Artificial Intelligence Applications -- Low-Light Image Enhancement with Artificial Bee Colony Method -- Abstract -- 1 Introduction -- 2 Image Contrast -- 3 Enhancement of Image Contrast by Using ABC -- 4 Experimental Settings and Results -- 5 Conclusions -- References -- Optimal State-Feedback Controller Design for Tractor Active Suspension System via Lévy-Flight Intensified Current Search Algorithm -- Abstract -- 1 Introduction -- 2 Dynamic Model of Tractor Active Suspension System -- 3 Problem Formulation -- 4 Results and Discussions -- 5 Conclusions -- References -- The Artificial Intelligence Platform with the Use of DNN to Detect Flames: A Case of Acoustic Extinguisher -- Abstract -- 1 Introduction -- 2 The Use of Deep Neural Networks for Flame Detection -- 3 Architecture of Neural Networks Used -- 4 Conclusion -- References -- Adaptive Harmony Search for Cost Optimization of Reinforced Concrete Columns -- Abstract -- 1 Introduction -- 2 Methodology -- 3 Numerical Example -- 4 Conclusion -- Acknowledgments -- References -- Efficient Traffic Signs Recognition Based on CNN Model for Self-Driving Cars -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Model -- 4 Experimental Work -- 4.1 Used Dataset -- 4.2 Programming Tools -- 4.3 Evaluation -- 5 Illustration of the Obtained Results -- 6 Discussion -- 7 Conclusion and Future Suggestions -- References. , Optimisation and Prediction of Glucose Production from Oil Palm Trunk via Simultaneous Enzymatic Hydrolysis -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Material -- 2.2 Preparation of Immobilized Beads of Enzymes -- 2.3 Extraction of Starch and Enzymatic Hydrolysis -- 2.4 Experimental Design and Statistical Analysis by Response Surface Methodology (RSM) -- 2.5 Glucose Prediction by RSM and Artificial Neuron Network (ANN) -- 3 Result and Discussion -- 3.1 Morphology of Immobilised Enzymes -- 3.2 Hydrolysis Performance of Immobilised Enzymes -- 3.3 Prediction of Glucose Production -- 3.3.1 RSM Modelling -- 3.3.2 ANN Modelling -- 3.3.3 Comparison of Fitting Results -- 4 Conclusion -- Acknowledgement -- References -- Synthetic Data Augmentation of Cycling Sport Training Datasets -- 1 Introduction -- 2 Problem Statement -- 2.1 Data Augmentation -- 2.2 Basics of Cycling Training -- 3 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Hybrid Pooling Based Convolutional Neural Network for Multi-class Classification of MR Brain Tumor Images -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Benchmark Data Set -- 2.2 Hybrid Pooling Based CNN Architecture -- 2.2.1 Hybrid Pooling -- 2.3 Model Validation -- 3 Results and Performance Analysis -- 4 Conclusion -- References -- Importance of Fuzzy Logic in Traffic and Transportation Engineering -- Abstract -- 1 Introduction -- 1.1 What is the Need to Use Fuzzy Logic? -- 1.2 Objectives -- 2 Motivation and Reason for Choosing Goa as the Study Area -- 3 History of Fuzzy Logic -- 4 Literature Review -- 5 Main Focus of the Paper Along with Issues and Problems -- 6 Architecture of the System of Fuzzy Logic -- 7 Methodology -- 8 Membership Function in Fuzzy Logic -- 9 Fuzzy Control -- 10 Applications of the System of Fuzzy Logic -- 11 Result and Discussion. , 12 Major Advantages of Fuzzy Logic -- 13 Major Disadvantages of Fuzzy Logic -- 14 Conclusion -- References -- A Fuzzy Based Clustering Approach to Prolong the Network Lifetime in Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Modified LEACH Protocol Design -- 3.1 Network Model -- 3.2 Design of Fuzzy Logic Controller (FLC) -- 3.3 Operation of the Modified LEACH Protocol -- 4 Simulation Results -- 5 Conclusions -- References -- Visual Expression Analysis from Face Images Using Morphological Processing -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Dataset -- 4 Methodology -- 4.1 Face Detection -- 4.2 Pre-processing -- 4.2.1 Cropping and Augmentation -- 4.2.2 Morphological Processing -- 4.3 Classical Machine Learning Approaches -- 4.4 Deep Learning (CNN) Approach -- 5 Result Analysis -- 6 Visualization -- 7 Conclusion and Future Work -- References -- Detection of Invertebrate Virus Carriers Using Deep Learning Networks to Prevent Emerging Pandemic-Prone Disease in Tropical Regions -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Wing GeometricMorphometric -- 2.2 Convolutional Neural Networks -- 2.3 Convolutional Layers -- 2.4 Fully Connected Layers -- 3 Methodology -- 4 Implementation -- 5 Experimental Results -- 6 Conclusion -- Acknowledgement -- References -- Classification and Detection of Plant Leaf Diseases Using Various Deep Learning Techniques and Convolutional Neural Network -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 3.1 Dataset -- 3.2 Measurement of Performance -- 3.3 Approach -- 3.4 Results -- 4 Conclusion -- References -- Deep Learning and Machine Learning Applications -- Distributed Self-triggered Optimization for Multi-agent Systems -- 1 Introduction -- 2 Preliminaries and Graph Theory -- 3 System Model -- 4 Distributed Event-Triggered Algorithm. , 5 Distributed Self-triggered Algorithm -- 5.1 Communication Delays -- 6 Numerical Example -- 7 Conclusion -- References -- Automatic Categorization of News Articles and Headlines Using Multi-layer Perceptron -- 1 Introduction -- 2 Related Work -- 3 News Corpus Development -- 3.1 Data Statistics -- 4 News Classification Framework -- 4.1 Data Preprocessing -- 4.2 Word Embedding -- 4.3 Classifier Model Generation -- 4.4 Prediction -- 5 Experiments -- 6 Results Analysis -- 7 Comparison with Existing Approaches -- 8 Error Analysis -- 9 Conclusion -- References -- Using Machine Learning Techniques for Estimating the Electrical Power of a New-Style of Savonius Rotor: A Comparative Study -- Abstract -- 1 Introduction -- 2 Experimental Data -- 3 Prediction Methods -- 4 Results and Discussions -- 4.1 Artificial Models -- 4.2 Performance Evaluation of Empirical Models for Testing Data -- 5 Conclusions -- References -- Tree-Like Branching Network for Multi-class Classification -- 1 Introduction -- 2 Relation to Prior Work -- 2.1 Multi-task Learning -- 2.2 Knowledge Distillation -- 2.3 Neural Trees -- 3 Method -- 3.1 Problem Setup -- 3.2 Step 1: Class Relationship from Trained Networks -- 3.3 Step 2: Building Branching Networks -- 3.4 Step 3: Training with Knowledge Distillation -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Datasets and Experimental Results -- 5 Conclusion -- References -- Multi-resolution Dense Residual Networks with High-Modularization for Monocular Depth Estimation -- Abstract -- 1 Introduction -- 2 Three Layered Regular Modules for Multi-resolution DNN -- 3 High-Modularized Multi-resolution Architecture -- 4 Experiments -- 5 Conclusion -- Acknowledgments -- References -- A Decentralized Federated Learning Paradigm for Semantic Segmentation of Geospatial Data -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Algorithm. , 3.2 Model -- 3.3 Loss Function and Evaluation Metrics -- 4 Experiments -- 4.1 Dataset -- 4.2 Implementation and Results -- 5 Conclusion -- References -- Development of Contact Angle Prediction for Cellulosic Membrane -- Abstract -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection -- 2.2 Model Development -- 3 Result and Discussion -- 3.1 Effect of Filtration Process -- 3.2 Effect of Neuron Size and TVT Data Split -- 3.3 Optimization via Normality Approach -- 4 Conclusion -- Acknowledgments -- References -- Feature Engineering Based Credit Card Fraud Detection for Risk Minimization in E-Commerce -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 Data Preprocessing Module -- 2.3 Feature Selection -- 2.4 Applying Machine Learning Techniques -- 3 Performance Evaluation -- 4 Conclusion and Future Work -- References -- DCNN-LSTM Based Audio Classification Combining Multiple Feature Engineering and Data Augmentation Techniques -- 1 Introduction -- 2 Methodology -- 2.1 Data Augmentation -- 2.2 Spectral Feature Extraction -- 2.3 Deep CNN-LSTM Model Architecture -- 3 Results -- 4 Conclusion -- References -- Sentiment Analysis: Developing an Efficient Model Based on Machine Learning and Deep Learning Approaches -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Sentiment Analysis Process -- 4 The Proposed Sentiment Analysis Model -- 5 Experimental Work -- 5.1 Used Dataset -- 5.2 Programming Tools -- 5.3 Evaluation -- 5.4 The Obtained Results -- 6 Discussion -- 7 Comparison Between ML and DL Approaches -- 8 Conclusion and Future Suggestions -- References -- Improved Face Detection System -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Input Image -- 3.2 Contrast Stretching -- 3.3 Extract Facial Part -- 3.4 Extract Features -- 3.5 SVM Classifier -- 4 Result and Analysis -- 5 Conclusion and Future Works -- References. , Paddy Price Prediction in the South-Western Region of Bangladesh.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...