GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Document type
Language
  • 1
    Keywords: Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (627 pages)
    Edition: 1st ed.
    ISBN: 9789811975134
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.326
    DDC: 006.3
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Swarm intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (236 pages)
    Edition: 1st ed.
    ISBN: 9789811606625
    Series Statement: Springer Tracts in Nature-Inspired Computing Series
    DDC: 006.3824
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- 1 Applied Optimization and Swarm Intelligence: A Systematic Review and Prospect Opportunities -- 1 Introduction -- 2 Swarm Intelligence in Recent Years -- 3 Swarm Intelligence and Applied Optimization -- 3.1 Swarm Intelligence in Transportation and Logistics -- 3.2 Swarm Intelligence in Industry -- 3.3 Swarm Intelligence in Medicine -- 3.4 Swarm Intelligence in Energy -- 4 Challenges and Opportunities -- 5 Conclusions -- References -- 2 A Review on Ensemble Methods and their Applications to Optimization Problems -- 1 Introduction to Ensemble Methods for Optimization -- 2 Techniques in Assembling EEMs -- 3 Main Ensemble Evolutionary Methods Proposed in Literature -- 3.1 Ensemble Differential Evolution as a Competitive Single Population EEM -- 3.2 Ensemble Genetic Algorithms as a Competitive Multi-population EEM -- 3.3 Memetic Algorithms as a Cooperative Single Population EEM -- 3.4 Coral Reef Optimization with Substrate Layer as a Cooperative Multi-population EEM -- 4 Challenges and Future Works in EEM Study -- 5 Conclusions -- References -- 3 A Brief Overview of Swarm Intelligence-Based Algorithms for Numerical Association Rule Mining -- 1 Introduction -- 2 Swarm Intelligence in a Nutshell -- 3 Overview of SI-Based Algorithm for NARM -- 3.1 Particle Swarm Optimization NARM Variants -- 3.2 Ant Colony Optimization NARM Variants -- 3.3 Bat Algorithm NARM Variants -- 3.4 Other NARM Variants -- 4 Analysis of Algorithms for Numerical Association Rule Mining -- 4.1 Representation of Solutions -- 4.2 Definition of the Fitness Function -- 4.3 Discussion -- 5 Conclusions and Future Challenges -- References -- 4 Review of Swarm Intelligence for Improving Time Series Forecasting -- 1 Introduction -- 2 Time Series Analysis -- 2.1 Nature and Use of Forecasts -- 2.2 Forecasting Process. , 2.3 Classical LInear Forecasting Models -- 3 Deep Learning for Time Series Forecasting -- 3.1 Neural Network Architecture -- 3.2 Feed Forward Neural Networks -- 3.3 Recurrent Neural Network and Long Short-Term Memory -- 4 Swarm Intelligence for Time Series Forecasting -- 4.1 Hybridization of Optimization and Time Series Prediction -- 4.2 Particle Swarm Optimization (PSO) Algorithm -- 4.3 Artificial Fish Swarm Algorithm (AFSA) -- 4.4 Artificial Bee Colony Algorithm -- 4.5 Grey Wolf Optimizer -- 4.6 Cuckoo Search -- 4.7 Other SI Algorithms -- 5 Challenges and Opportunities -- 6 Conclusion -- References -- 5 Soccer-Inspired Metaheuristics: Systematic Review of Recent Research and Applications -- 1 Introduction -- 2 Nature-Inspired Computation and Optimization Metaheuristics -- 3 Soccer-Inspired Metaheuristics: A Systematic Review -- 3.1 Football Optimization Algorithm -- 3.2 Soccer Game Optimization -- 3.3 Golden Ball Metaheuristic -- 3.4 Soccer League Competition Algorithm -- 3.5 Soccer League Optimization -- 3.6 World Cup Competition Algorithm -- 3.7 Football Game Inspired Algorithm -- 3.8 Tiki-Taka Algorithm -- 4 Conclusions -- References -- 6 Formal Cognitive Modeling of Swarm Intelligence for Decision-Making Optimization Problems -- 1 Introduction -- 1.1 Cognitive Informatics -- 1.2 Decision-Making -- 1.3 Aims and Structure of This Chapter -- 2 Swarm Intelligence -- 2.1 Particle Swarm Optimization -- 2.2 The Firefly Algorithm -- 2.3 The Cuckoo Search Algorithm -- 2.4 The Bat Algorithm -- 3 Formal Cognitive Modeling of Swarm Intelligence for Decision-Making -- 3.1 Formal Cognitive Model for Decision-Making -- 3.2 A Formal Cognitive Modeling Approach to Swarm Intelligence -- 3.3 Cognitive Model of Swarm Intelligence for Decision-Making -- 4 Discussion and Advantages of Our Cognitive Formalism -- 5 Conclusions and Future Work -- References. , 7 Nature-Inspired Optimization Algorithms for Path Planning and Fuzzy Tracking Control of Mobile Robots -- 1 Introduction -- 2 Optimal Path Planning Problem and Approach to Solve It -- 3 Optimal PI-Fuzzy Controller-Based Tracking Control Problem and Approach to Solve It -- 4 Inclusion of WOA in Optimal Path Planning and Controller Tuning Approaches -- 5 Implementation Details -- 6 Conclusions -- References -- 8 A Hardware Architecture and Physical Prototype for General-Purpose Swarm Minirobotics: Proteus II -- 1 Introduction -- 1.1 Swarm Intelligence -- 1.2 Swarm Robotics -- 1.3 A First Swarm Robotic Prototype: Proteus I -- 1.4 Aims and Structure of This Chapter -- 2 Previous Work -- 3 A General-Purpose Minirobotic Prototype for Swarm Intelligence: Proteus II -- 3.1 Conceptual Design -- 3.2 Physical Arrangement of Components -- 3.3 Hardware Architecture and Main Components -- 3.4 Programming Framework -- 4 Prototype Applicability to Swarm Minirobotics -- 5 Conclusions and Future Work -- References -- 9 Evolving a Multi-objective Optimization Framework -- 1 Introduction -- 2 The jMetal Framework -- 3 Component-Based Evolutionary Algorithm Template -- 4 Visualization -- 4.1 Plotting Fronts -- 4.2 Visualization of Comparative Studies Results -- 5 Automatic Configuration of Metaheuristics -- 6 Asynchronous Parallelism -- 7 Discussion -- 8 Conclusions -- References -- 10 Swarm Intelligence Based Optimum Design of Deep Excavation Systems -- 1 Introduction -- 2 Design of the Deep Excavation Systems -- 2.1 The Design of SRASW According to FHWA-IF-99-015 -- 2.2 The Numerical Analyses for SRASW Design -- 3 Swarm Intelligence and Particle Swarm Optimizer -- 3.1 Swarm Intelligence -- 3.2 Particle Swarm Optimizer (PSO) -- 4 The Optimum Design of a Single-Row Anchored Sheet Wall -- 4.1 Design Parameters -- 4.2 Constraints -- 4.3 Objective Functions. , 4.4 Optimization Process -- 4.5 Design Examples -- 5 Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Artificial intelligence. ; Electronic books.
    Description / Table of Contents: Joining in the centenary celebration of the life and work of Alan Turing, this book reviews the latest developments in artificial intelligence, evolutionary computation and metaheuristics, all of which can be traced back to Turing's pioneer work.
    Type of Medium: Online Resource
    Pages: 1 online resource (796 pages)
    Edition: 1st ed.
    ISBN: 9783642296949
    Series Statement: Studies in Computational Intelligence Series ; v.427
    DDC: 006.3
    Language: English
    Note: Title -- Preface -- Contents -- Part I Artificial Intelligence and Cryptography -- Turing Test as a Defining Feature of AI-Completeness -- Introduction -- The Theory of AI-Completeness -- Definitions -- Turing Test as the First AI-Complete Problem -- Reducing Other Problems to TT -- Other Probably AI-Complete Problems -- 1st AI-Hard Problem: Programming -- Beyond AI-Completeness -- Conclusions -- References -- Artificial Intelligence Evolved from Random Behaviour: Departure from the State of the Art -- Introduction -- Artificial Intelligence vs. Natural Intelligence -- Definition of Human Intelligence -- Informal Definitions of Machine Intelligence -- Formal Definitions of Machine Intelligence -- A Thought on Artificial Intelligence So-Far-Proposed -- Artificial Intelligence Evolved from Randomness -- Machiavellian Intelligence -- Hibbard's Formal Definition Revisited -- Avidian -- A Modern Interpretation of Turing Test -- During 50 Years Since the Proposal -- An Easy Way to Cheat Human? -- Turing Test These Days -- Biologically Inspired Artificial Intelligence -- A Benchmark to Evaluate Artificial Intelligence -- To Aim a Real Human-Like Machine Intelligence -- Huge Number of Neurons-From Emulation to Simulation -- Toward Real AI by Parallelism -- Conclusions -- References -- Turing: Then, Now and Still Key -- Introduction -- Simplified Model of the Human Brain -- A List of Requirements for Intelligence -- General Mechanisms and Processes for Building a Solution -- Related Work -- Conclusions -- References -- Imitation Programming Unorganised Machines -- Introduction -- Background -- Discrete Dynamical Systems -- Graph-Based Representations -- Unorganised Machines -- Imitation Programming: Cultural Search -- Experimentation -- Asynchrony -- A Comparison with Evolution -- Towards Memristive Hardware -- Implication A-Types -- Synapse. , Conclusions -- References -- Towards Machine Equivalent Consciousness -- Introduction -- Patterns of Human Perceptions -- Sensation of Sight -- Sensation of Hearing -- Sensation of Smell -- Sensation of Taste -- Sensation of Touch -- A Comparison between Human and Machine Perceptions -- Awareness as Perceived Pattern of Physical Energy Changes -- Turing's Ideas for Building a Machine with Self-awareness -- Differences in Drawing Inference between Humans and Machines -- An Unfixable Difference in Drawing Inference -- A Fixable Difference -- Conclusion -- References -- Multicriteria Models for Learning Ordinal Data: A Literature Review -- Introduction -- Terminology and Concepts -- Multicriteria Decision Analysis -- MCDA Methods -- Inductive Learning Algorithms -- Feature Selection Algorithms on Ordinal Data -- Performance Measures -- Conclusion -- References -- Diophantine and Lattice Cryptanalysis of the RSA Cryptosystem -- Introduction -- The RSA Cryptosystem -- Diophantine Approximations -- Diophantine Approximations Cryptanalysis of RSA -- Wiener's Attack on RSA -- de Weger's Generalization of Wiener's Attack -- Another Generalization of Wiener's Attack -- Nassr et al. Generalization of Wiener's Attack -- Lattices -- Small Solution of Polynomial Equations -- Howgrave-Graham's Theorem -- Coppersmith's Theorem -- Herrmann and May's Theorem for Bivariate Modular Linear Equations -- The Small Inverse Problem -- Lattice-Reduction Cryptanalysis of RSA -- Factoring the RSA Modulus with Partial Knowledge of p -- Factoring the RSA Modulus with Small Prime Difference -- Boneh and Durfee's Class of Weak Keys -- Another Generalization of Wiener's Attack on RSA -- Least Significant Bits of d Known -- The \Phi-Hiding Assumption -- Diophantine and Lattice Cryptanalysis of RSA -- Bl\"{o}mer and May's Class of Weak Keys -- Another Class of Weak Keys. , Conclusion -- References -- Artificial Intelligence Methods in Early Childhood Education -- Introduction -- Background -- Educational Technology in Early Childhood: General Issues -- Intelligent Educational Systems -- Intelligent Educational Robots for Young Children -- Case Studies of Integrating IESs in Early Childhood Settings -- Outline of IES Approaches in Early Childhood -- Discussion of Derived Results -- Case Studies of Robot Integration in Early Childhood Settings -- Approaches Integrating Robots in Typical Early Childhood Classrooms -- Robots and Young Children with Special Needs -- General Approaches Concerning Robots and Young Children -- Discussion -- Conclusions -- References -- Recursively Generated Evolutionary Turing Machines and Evolutionary Automata -- Introduction -- Basic Evolutionary Machines -- Computations by Evolutionary Machines -- Construction of Evolutionary Machines -- Conclusion -- References -- On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography -- Introduction -- On Cryptography Basics, Cremona Group and Dynamical Systems -- Symmetric Cryptography -- Idea of a Asymmetry -- On the Discrete Logarithm Problem for Special Subgroups of Cremona Group -- On the History of Constructive Multivariate Cryptography -- Dynamical Systems with Large Cycle Indicator, Related Public Keys and Key Exchange Protocols -- On the Case of Ring Extensions -- On the Velocities of Growth of Orders for Polynomial Encryption Maps Based on Dynamical Systems of Large Girth and of Large Cycle Indicator -- Conclusion -- References -- On Extremal Graph Theory, Explicit Algebraic Constructions of Extremal Graphs and Corresponding Turing Encryption Machines -- Introduction -- On Algebraic Graphs, Automata and Turing Machines Related to Algebraic Graph. , Extremal Simple Graphs of Large Girth or Large Cycle Indicator -- On Families of Digraphs of Large Girth or Large Cycle Indicator -- Explicit Algebraic Constructions of Graphs, Digraphs of Large Girth or Large Cycle Indicator and Dynamical Systems -- Polarities of Incidence Structures and Related Dynamical Systems -- Improvement of Constants, Transitivity of Some Turing Machines -- Correlation with Expansion Properties -- On the Recent Implementation of Turing Machines Related to Graph Based Dynamical Systems -- Comparison of Our Symmetric Algorithm with RC4 -- Comparison with DES -- On the Expansion of Speed Evaluation for Some Other Stream Ciphers -- Conclusion -- References -- AIML Knowledge Base Construction from Text Corpora -- Introduction: Turing Test and Conversational Agents -- Turing Test as a Regulative Idea -- Chatbot Early History and General Developments -- Chatbot Applications for Educational Purpose -- AIML Language and Architecture -- Corpus Based Chatbots and Linguistic Issues -- The Corpus -- Building a Glossary: Linguistic Issues -- Corpus Based FAQ -- Steps for Chatter-Bot Generation -- Requirements for the Chatter-Bot -- Input Set Definition -- Chatter-Bot Lexical Knowledge Base Construction -- Chatter-Bot Testing -- Discussion -- Tools and Resources -- References -- Multidisciplinary Trends in Modern Artificial Intelligence: Turing's Way -- Introduction -- Artificial Intelligence: Challenges and Multidisciplinarity -- Symbolic and Connectionist Artificial Intelligence -- In Between AI Approaches: Multi-Agent Systems -- Natural and Artificial Intelligence -- Bio-inspired Methods and Transdisciplinarity -- Dynamic and Nonlinear Artificial Intelligence -- Chaos and Artificial Intelligence -- Chaotic Neural Network Basics -- Clustering Challenges -- Evolution of CNN -- Synchronization Phenomenon and Oscillatory Clusters. , Structure Complexity and Delaunay Triangulation -- Clustering and Classification by CNN -- Fractals and Oscillatory Dynamics -- Chaotic Neural Network and Multidiscilinarity -- Turing Ideas and Hardware Implementation of CNN -- Conclusion -- References -- An Overview of Computational Sparse Models and Their Applications in Artificial Intelligence -- Introduction -- Sparse Signal Optimization -- Sparse Signal Pursuit -- Proximal Gradient Method -- Solving Basis Pursuit via PG -- Applications in Compressive Sensing -- Sparse Learning -- Low Rank Matrix Completion -- Low Rank Matrix Completion -- PG Optimization for MC -- MC Applications: A General Review -- Noisy Depth Maps Fusion via MC -- Low Rank Structure Learning from Corruptions -- Low Rank Structure Learning -- Illumination Decomposition via LRSL -- Discussions on Future Works -- References -- MiTS in Depth: An Analysis of Distinct Tabu Search Configurations for Constructing Mixed Covering Arrays -- Introduction -- Related Work -- Mixed Covering Array Problem -- Proposed Approach -- Creating the Initial Solution -- Tabu List Definitions -- Neighborhood Functions -- Evaluation Function -- Stop Criterion -- Experimental Design: Analysis and Results -- First MiTS Design for MCA -- Second MiTS Design for MCA -- Third MiTS Design for MCA -- Conclusions -- References -- Part II Evolutionary Computation and Metaheuristics -- Metaheuristic Optimization: Nature-Inspired Algorithms and Applications -- Introduction -- Metaheuristics -- Metaheuristic Algorithms -- Ant Algorithms -- Bee Algorithms -- Genetic Algorithms -- Differential Evolution -- Particle Swarm Optimization -- Firefly Algorithm -- Harmony Search -- Bat Algorithm -- Cuckoo Search -- Artificial Neural Networks -- Neural Networks -- Back Propagation Algorithm -- Characteristics of Metaheuristics -- No-Free-Lunch Theorems. , Search for Free Lunches.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Computer simulation. ; Electronic books.
    Description / Table of Contents: This volume presents ten self-contained, detailed case studies of real-world optimization problems, selected from a wide range of applications. The text consists of contributions from worldwide experts who are working in these exciting areas.
    Type of Medium: Online Resource
    Pages: 1 online resource (282 pages)
    Edition: 1st ed.
    ISBN: 9783642209864
    Series Statement: Studies in Computational Intelligence Series ; v.359
    Language: English
    Note: Intro -- 359 -- Preface -- List of Contributors -- Table of Contents -- Adjoint-Based Control of Model and Discretization Errors for Gas andWater Supply Networks -- Introduction -- Modelling -- General Aspects -- Gas Supply Networks -- Water Supply Networks -- Error Estimators -- Adaptive Error Control -- Numerical Examples -- Gas Supply Network -- Water Supply Network -- Conclusion and Outlook -- References -- Derivative-Free Optimization for Oil Field Operations -- Introduction -- Basic Methodologies -- Simulation Techniques -- Optimization Problem Statement -- Derivative-Free OptimizationMethods -- Well Control Optimization with Operational Constraints -- Constraint Handling Techniques -- Production Optimization Example -- OptimalWell Placement with Particle Swarm Optimization -- OptimizationMethodology -- Field Development Optimization Example -- Assimilation of Reservoir Data (Inverse Modeling) -- Problem Statement -- Methodologies for Data Assimilation -- Data Assimilation Example -- Concluding Remarks -- References -- Simulation-Driven Design in Microwave Engineering: Application Case Studies -- Introduction -- Surrogate-Based Design Optimization in Microwave Engineering -- Surrogate Models in Microwave Engineering -- Space Mapping -- Simulation-Based Tuning and Tuning Space Mapping -- Shape-Preserving Response Prediction -- Multi-fidelity Optimization Using Coarse-Discretization EM Models -- Optimization Using Adaptively Adjusted Design Specifications -- Surrogate-Based Design Optimization of Microwave Filters -- Optimization of a Microstrip Bandpass Filter Using Space Mapping Technique -- Optimization of a Microstrip Bandpass Filter Using Tuning Space Mapping -- Design of Dual-Band Bandpass Filter Using Shape-Preserving Response Prediction -- Surrogate-Based Design Optimization of Antennas. , Design of UWB Antipodal Vivaldi Antenna Using Coarsely-Discretized EM Models, Kriging and Space Mapping -- Design of Planar Yagi Antenna Using Adaptive Design Specifications -- Multi-fidelity Design of Microstrip Broadband Antenna -- Surrogate-Based Design Optimization of Microwave Transitions -- Multi-fidelity Design of Microstrip-to-Coplanar Waveguide Transition -- Design of Coplanar Waveguide-to-Substrate Integrated Waveguide Transition -- Conclusion -- References -- Airfoil Shape Optimization Using Variable-Fidelity Modeling and Shape-Preserving Response Prediction -- Introduction -- Airfoil Shape Optimization -- Optimization Methodology -- General Description -- Surrogate Modeling Using Shape-Preserving Response Prediction -- Objective Function -- Optimization with SPRP Surrogate -- Optimization Algorithm -- Transonic Airfoil Design -- Case Setup -- Model Setup -- Results and Discussion -- High-Lift Airfoil Design -- Case Setup -- Model Setup -- Results and Discussion -- Summary -- References -- Evolutionary Optimisation Techniques to Estimate Input Parameters in Environmental Emergency Modelling -- Introduction -- The Input Parameter Problem in Environmental Emergency Modelling -- Forest Fire Spread Prediction -- The Input Parameter Problem -- Parameter Estimation with Knowledge-Guided Genetic Algorithm -- Parallel Implementation of Hybrid Genetic Algorithm -- Knowledge Representation -- Knowledge Retrieval -- Knowledge Insertion -- Experimental Evaluation -- Conclusions and Future Work -- References -- Harmony Search Algorithms in Structural Engineering -- Introduction -- Discrete Optimum Design of Steel Space Frames to LRFD-AISC -- The Objective Function -- Strength Constraints -- Displacement Constraints -- Geometric Constraints -- Harmony Search Algorithms -- Standard Harmony Search Algorithm -- Various Harmony Search Algorithms. , Standard Harmony Search with Adaptive Error Strategy (SHSAES) -- Standard Harmony Search with Penalty Function (SHSPF) -- Adaptive Harmony Search with Penalty Function (AHSPF) -- Improved Harmony Search (IHS, Mahdavi) -- Global Best Harmony Search (GBHS, Mahdavi) -- Improved Harmony Search (IHSC, Coelho) -- Dynamic Harmony Search (DHS) -- Design Examples -- Five-Story, Two-Bay Regular Steel Space Frame -- Ten-Story, Four-Bay Steel Space Frame -- Twenty-Story, 1860-Member, Steel Space Frame -- Conclusions -- References -- Waveform Optimization for Integrated Radar and Communication Systems Using Meta-Heuristic Algorithms -- Introduction -- Meta-Heuristic Algorithms -- Particle Swarm Optimization -- Harmony Search -- Adaptive Simulated Annealing -- Artificial Bee Colony Algorithm -- Preliminaries for Waveform Design -- Polyphase Sequences and Their Applications -- Polyphase Sequences for Radar Systems -- Polyphase Sequences for Communication Systems -- Application of Oppermann Sequences for Integrated Radar and Communication Systems -- Performance Measures -- Aperiodic Correlation Measures -- Sidelobe Measures -- Numerical Examples -- Conclusions -- References -- Parameter Estimation from Laser Flash Experiment Data -- Introduction -- The Laser Flash Experiment -- Mathematical Model -- Governing Equations -- Boundary Conditions -- Numerical Methods -- Optimisation Results -- Initial Optimisation Results -- Revision of the Model -- Optimisation Results with the New Model -- Discussion -- References -- Applications of Computational Intelligence in Behavior Simulation of Concrete Materials -- Introduction -- Computational Intelligence -- Genetic Programming -- Artificial Neural Network -- Modeling Process and Parameters Setting -- Model Development Using GP-Based Methods -- Model Development Using ANN-Based Methods -- Finding the Optimum Models. , Case Studies -- Compressive Strength of Concrete -- Elastic Modulus of Concrete -- Discussion -- Conclusions -- References -- A New Approach to Network Optimization Using Chaos-Genetic Algorithm -- Introduction -- Genetic Algorithms -- Chaos Theory -- Chaos Optimization Algorithm (COA) -- Chaos-Genetic Algorithm (CGA) -- Grid Scheduling: Case Study # 1 -- Challenges of Scheduling Algorithms in Grid Computing -- Problem Description -- The Chaos-Genetic Scheduling Algorithm (CGA) -- Experimental Results -- Network-on-Chip (NoC): Case Study # 2 -- Network on Chip -- Problem Description -- Simulation Results -- Performance Analysis of One-Dimensional Chaotic Maps -- Concluding Remarks -- References -- Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Information technology-Congresses. ; Telecommunication systems-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1002 pages)
    Edition: 1st ed.
    ISBN: 9789811623806
    Series Statement: Lecture Notes in Networks and Systems Series ; v.236
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Highly Efficient Stochastic Approaches for Computation of Multiple Integrals for European Options -- 1 Introduction -- 2 Problem Settings and Motivation -- 3 Highly Efficient Stochastic Approaches Based on Lattice Rules -- 4 Numerical Examples and Results -- 5 Conclusion -- References -- Spectrum Sensing Data Falsification Attack Reputation and Q-Out-of-M Rule Security Scheme -- 1 Introduction -- 2 Related Work -- 3 Network Model -- 4 Results and Analysis -- 5 Conclusion -- References -- Lean Manufacturing Tools for Industrial Process: A Literature Review -- 1 Introduction -- 2 Research Methodology -- 3 Literature Review -- 3.1 Lean Manufacturing -- 3.2 The Lean Manufacturing Implementation Route -- 3.3 Discussion and Analysis of Results -- 4 Conclusions -- References -- Lambda Computatrix (LC)-Towards a Computational Enhanced Understanding of Production and Management -- 1 Introduction -- 1.1 How Artificial Intelligence (AI) Can Support and Regain Human Society Values -- 1.2 Production and Management -- 1.3 Theorem Proving (TP) -- 1.4 Content and Organization of This Paper -- 1.5 Goal -- 2 Lambda Computatrix (LC) -- 3 Simulation in Production and Management Methods -- 4 Theorem Proving (TP) -- 4.1 AI-Legal -- 4.2 Logistics -- 5 TP in Production and Management, Summary, Conclusions and Outlook -- References -- Behavioral Analysis of Wireless Channel Under Small-Scale Fading -- 1 Introduction -- 2 Small-Scale Fading Causing Factors -- 3 Wireless Channel Model -- 4 Results and Discussions -- 5 Conclusion -- References -- Towards a Framework to Address Enterprise Resource Planning (ERP) Challenges -- 1 Introduction -- 2 Research Question (RQs) -- 3 Methodology -- 4 Review of IS/ERP Frameworks -- 5 Evaluating Emphases and Challenges in the ERP Frameworks. , 5.1 Linking ERPs with IS Success Models -- 5.2 Summary of ERP Challenges -- 5.3 Discussion and Analysis -- 6 The Proposed Framework -- 7 Reasons for Incorporating Formal Methods (FMs) in the Proposed ERP Framework -- 8 Conclusion -- References -- Potentials of Digital Business Models in the Construction Industry-Empirical Results from German Experts -- 1 Introduction -- 2 Digitization in the Construction Industry -- 3 Background and Research Design -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- An Alternative Auction System to Generalized Second-Price for Real-Time Bidding Optimized Using Genetic Algorithms -- 1 Introduction -- 2 Our Novel Advertising Exchange System -- 2.1 Advertising Exchange System -- 2.2 Development of the Advertisement Exchange System -- 3 Calculating the Optimal Value of the Weights Using a Genetic Algorithm -- 3.1 Representation and Initial Population -- 3.2 Handling Constraints -- 3.3 Fitness Function -- 3.4 Genetic Algorithm Parameter Configuration -- 3.5 Justification for the Chosen Values of the Coefficients, Penalties and Rules -- 4 Experiments and Results -- 4.1 Preparation of the Experiments -- 4.2 Experiment I -- 4.3 Experiment II -- 5 Conclusions and Future Work -- References -- Low-Cost Fuzzy Control for Poultry Heating Systems -- 1 Introduction -- 2 Case Study -- 3 Solution Proposal -- 3.1 Fuzzy Inference Based on Linear Programming -- 3.2 LAMP Server -- 4 Results -- 5 Conclusions -- References -- Towards Empowering Business Process Redesign with Sentiment Analysis -- 1 Introduction -- 2 Related Work -- 2.1 Business Process Redesign -- 2.2 Business Process Modeling -- 2.3 BPMN -- 2.4 Data Mining, Sentiment Analysis, and Opinion Mining in Business Processes -- 3 BPM Lifecycle and SentiProMo Tool -- 3.1 Using Sentiment Analysis in BPR -- 4 Sentiment Analysis Module (SAM) -- 4.1 Evaluation. , 5 Preliminary Results -- 6 Conclusion and Outlook -- References -- An Integration of UTAUT and Task-Technology Fit Frameworks for Assessing the Acceptance of Clinical Decision Support Systems in the Context of a Developing Country -- 1 Introduction -- 1.1 Unified Theory of Acceptance and Use of Technology (UTAUT) -- 1.2 Task-Technology Fit (TTF) -- 2 Background -- 2.1 Theoretical Conceptual Framework -- 3 Methodology -- 3.1 Stage One: Initiated Requirement Generation of the Framework -- 3.2 Stage Two: Discovering the Factors of the Framework Through Perspectives -- 3.3 Stage Three: Validation of a New Proposed Framework -- 4 Data Analysis -- 5 Modified Proposed Framework -- 6 Discussion and Conclusion -- References -- Research Trends in the Implementation of eModeration Systems: A Systematic Literature Review -- 1 Introduction -- 2 Systematic Literature Review -- 3 Results and Findings -- 4 Conclusion -- References -- From E-Government to Digital Transformation: Leadership -- 1 Introduction -- 2 Background -- 2.1 Digital Transformation (DT) -- 2.2 Digital Maturity -- 2.3 Leadership -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- Application of Machine Learning Methods on IoT Parking Sensors' Data -- 1 Introduction -- 2 Related Work -- 3 Data of Parking Sensors -- 4 Application of Machine Learning and Results -- 4.1 Normalization of Parking Sensor Data -- 4.2 XGBoost -- 4.3 Neural Networks Models -- 4.4 Using Clustering to Improve Results -- 5 Conclusion -- References -- A Fast Algorithm for Image Deconvolution Based on a Rank Constrained Inverse Matrix Approximation Problem -- 1 Introduction -- 2 RCIMA Method -- 3 Fast Algorithm to Compute Pseudoinverse and Low-Rank Approximation -- 3.1 Pseudoinverse and Tensor Product Matrix -- 3.2 Low-Rank Approximation and Bilateral Random Projection -- 4 Fast-RCIMA Method. , 5 Numerical Simulation -- 5.1 Speedup and Percent Difference -- 5.2 Numerical Example for Image Deconvolution -- 6 Conclusions -- References -- On-Body Microstrip Patch Antenna for Breast Cancer Detection -- 1 Introduction -- 2 Structure and Design Method -- 2.1 Design of Antenna -- 2.2 Equations Employed in Design of Propounded Antenna -- 2.3 Human Breast Phantom Model and Tissue Properties -- 3 Antenna Characteristics Without Cancerous Tumor -- 3.1 Reflection Coefficient or S11 Parameter -- 3.2 Far-Field Radiation Pattern -- 3.3 VSWR-Voltage Standing Wave Ratio -- 3.4 SAR-Specific Absorption Rate -- 4 Antenna Characteristics with Cancerous Tumor -- 4.1 Reflection Coefficient or S11 Parameter -- 4.2 Other Characteristics -- 5 Conclusion -- References -- Machine Learning with Meteorological Variables for the Prediction of the Electric Field in East Lima, Peru -- 1 Introduction -- 1.1 Context for the Research Study -- 2 Literature Review -- 2.1 Machine Learning -- 2.2 Regression Learner App -- 3 Materials y Methods -- 3.1 Methodology -- 4 Results -- 4.1 Results of Machine Learning Models in Predicting the Electric Field -- 4.2 Description of Solar Radiation with the Electric Field -- 4.3 Description of the UV Level with the Electric Field -- 5 Conclusions -- References -- Enhanced Honeyword Generation Method Using Advanced DNA Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Background Theory -- 3.1 Enhanced Honeyword Generation -- 3.2 Enhanced DNA Algorithm -- 4 Flowchart of the Proposed System -- 5 Testing Results -- 6 Comparative Study -- 6.1 Time Complexity -- 6.2 Flatness -- 6.3 Typo Safety -- 6.4 Storage Overhead -- 7 Conclusion -- References -- A Review: How Does ICT Affect the Health and Well-Being of Teenagers in Developing Countries -- 1 Introduction -- 2 Methodology -- 2.1 Search Strategy -- 2.2 Inclusion and Exclusion Criteria. , 3 Results and Discussions -- 3.1 Adoption of ICT -- 3.2 Gender Gaps -- 3.3 Mobile Health -- 3.4 Detrimental Impacts of ICT -- 4 Conclusion and Future Works -- References -- Multi-image Crowd Counting Using Multi-column Convolutional Neural Network -- 1 Introduction -- 2 Methods -- 2.1 Pre-processing: Region of Interest (ROI) Selection -- 2.2 Pre-processing: Perspective Normalization -- 2.3 Feature Extraction: Multi-column Convolutional Neural Network (MCCNN) -- 2.4 Crowd Counting Using Modified MCNN -- 3 Experimental Setup -- 3.1 Dataset, Network Training, and Performance Criteria -- 4 Results -- 5 Conclusion -- References -- Which Features Are Helpful? The Antecedents of User Satisfaction and Net Benefits of a Learning Management System (LMS) -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Limitations and Recommendations -- References -- Performance Analysis of a Neuro-Fuzzy Algorithm in Human-Centered and Non-invasive BCI -- 1 Introduction -- 2 Theories Involved -- 2.1 Butterworth Band-Pass Filters -- 2.2 Adaptive Neuro-Fuzzy Inference System (ANFIS) -- 3 Materials and Methods -- 3.1 Generation of EEG Raw Signals -- 3.2 Retrieving and Transferring of Generated EEG Data -- 3.3 Pre-processing of Data and Feeding to Algorithm -- 4 Results and Discussion -- 4.1 Simulation Results for First EEG Dataset -- 4.2 Simulation Results for Second EEG Dataset -- 5 Conclusion and Recommendation -- References -- A Workflow-Based Support for the Automatic Creation and Selection of Energy-Efficient Task-Schedules on DVFS Processors -- 1 Introduction -- 2 Energy-Efficient Task Scheduling -- 2.1 Scheduling Problem for Independent Tasks -- 2.2 Bucket-Based Scheduling and Execution -- 2.3 Frequency Scaling for Energy Efficiency -- 3 Schedule Creation and Evaluation Framework -- 3.1 Workflow to Determine a Schedule -- 3.2 Framework Implementation. , 4 Experimental Evaluation.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Computational intelligence. ; Artificial intelligence-Engineering applications. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (301 pages)
    Edition: 1st ed.
    ISBN: 9783319964331
    DDC: 006.3019
    Language: English
    Note: Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- Contributors -- Acronyms -- 1 An Overview of the Use of Metaheuristics in Two Phase Equilibrium Calculation Problems -- 1.1 Introduction -- 1.2 Analysis of Previous Works -- 1.3 Description of the Problems -- 1.3.1 Calculation of a Reactive Azeotrope in a Ternary System (RA Problem) -- 1.3.2 Calculation of Dew Point Pressures in a Binary System with Double Retrograde Vaporization (DRV Problem) -- 1.4 Description of the Metaheuristics and Statistical Analysis -- 1.4.1 The Differential Evolution Algorithm (DE) -- 1.4.2 The Harmony Search Algorithm (HS) -- 1.4.3 Statistical Analysis -- 1.4.3.1 Comparison of Different Sets of Data -- 1.4.3.2 Paired or Unpaired Data Tests -- 1.4.3.3 Parametric or Non-parametric Tests -- 1.4.3.4 Using Non-parametric Test for Parametric Data -- 1.4.3.5 Non-parametric Unpaired Data Tests -- 1.4.3.6 Representing Results -- 1.5 Results and Discussion -- 1.5.1 Reactive Azeotrope Calculation (RA) -- 1.5.1.1 Fitness Evaluation -- 1.5.1.2 Solution Distance -- 1.5.2 Double Retrograde Vaporization Calculation -- 1.5.2.1 Fitness Evaluation -- 1.5.2.2 Solution Distance -- 1.6 Conclusions -- References -- 2 Reliability-Based Robust Optimization Applied to Engineering System Design -- 2.1 Introduction -- 2.2 Robust Design (RD) -- 2.3 Reliability-Based Optimization (RBO) -- 2.3.1 First Order Reliability Method (FORM) -- 2.3.2 Second-Order Reliability Method (SORM) -- 2.3.3 Sequential Optimization and Reliability Assessment (SORA) -- 2.3.4 Inverse Reliability Analysis (IRA) -- 2.4 Differential Evolution Algorithm (DE) -- 2.5 Methodology -- 2.6 Mathematical and Engineering Applications -- 2.6.1 Nonlinear Limit State -- 2.6.2 Highly Nonlinear Limit State -- 2.6.3 Short Column Design -- 2.6.4 Cantilever Beam Problem -- 2.6.5 Three Bar Truss Problem -- 2.7 Conclusion. , References -- 3 On Initial Populations of Differential Evolution for Practical Optimization Problems -- 3.1 Introduction -- 3.2 The Initialization Schemes -- 3.2.1 The Mersenne Twister Pseudorandom Generator -- 3.2.2 Mersenne Twister and Opposition-Based Learning -- 3.2.3 The Sobol Low-Discrepancy Sequence -- 3.3 Numerical Comparisons -- 3.3.1 The Practical Problems -- 3.3.1.1 Chemical Equilibrium Problem -- 3.3.1.2 Lennard-Jones Potential -- 3.3.1.3 Fertilizer Experiment Parameter Estimation -- 3.3.2 Implementation and Setup -- 3.3.3 Computational Results -- 3.4 Conclusions -- References -- 4 Application of Enhanced Particle Swarm Optimization in Euclidean Steiner Tree Problem Solving in RN -- 4.1 Introduction -- 4.2 Definition of Euclidean Steiner Tree Problem (ESTP) -- 4.2.1 Smith's Algorithm -- 4.3 Particle Swarm Optimization -- 4.4 Resolution of the Euclidean Tree Problem in RN with the Particle Swarm Optimization -- 4.4.1 Definition of a Particle -- 4.4.2 Overview of the Proposed Resolution -- 4.4.3 Use of the Minimum Spanning Tree and Geometry to Obtain Topology -- 4.4.3.1 Vectorial Calculus of a Steiner Point from Three Given Points -- 4.4.4 A Modified Particle Swarm Optimization for ESTP Resolution -- 4.4.4.1 Particle Velocity Based on the Spatial Characteristics of Steiner's Points -- 4.5 Computational Results -- 4.5.1 Computational Test Environment -- 4.5.2 Test Methodology -- 4.5.2.1 Results: Set of 1000 Points-Execution Time -- 4.5.2.2 Results: Set of 1000 Points-Cost Function -- 4.5.2.3 Results: Set of 10,000 Points-Execution Time -- 4.5.2.4 Results: Set of 10,000 Points-Cost Function -- 4.6 Discussion on the Experimental Results -- 4.6.1 Solution Quality -- 4.6.2 Computational Effort -- 4.7 Conclusion and Future Work -- References. , 5 Rotation-Based Multi-Particle Collision Algorithm with Hooke-Jeeves Approach Applied to the Structural Damage Identification -- 5.1 Overview -- 5.2 Hybrid Algorithm for SDI -- 5.2.1 Rotation-Based Multi-Particle Collision Algorithm with Hooke-Jeeves -- 5.2.2 Multi-Particle Collision Algorithm -- 5.2.2.1 Perturbation Function -- 5.2.2.2 Exploitation Function -- 5.2.2.3 Scattering Function -- 5.2.2.4 Blackboard Updating Function -- 5.2.3 Opposition-Based Learning and Some Derived Mechanisms -- 5.2.3.1 Rotation-Based Learning and Rotation-Based Sampling -- 5.2.3.2 Integration of MPCA and RBS -- 5.2.4 Hooke-Jeeves Pattern Search Method -- 5.2.4.1 Exploratory Move -- 5.2.4.2 Pattern Move -- 5.3 Vibration-Based Damage Identification Problem as an Optimization Problem -- 5.4 Damage Identification in a Cantilevered Beam -- 5.4.1 Cantilevered Beam -- 5.4.2 Experimental Results: Damage Identification from a Full Dataset -- 5.4.2.1 Case 1: Single Damage -- 5.4.2.2 Case 2: Mixed Multi-Damage -- 5.4.3 Experimental Results: Damage Identification from a Reduced Dataset -- 5.4.3.1 Case 1: Single Damage -- 5.4.3.2 Case 2: Mixed Multi-Damage -- 5.5 Final Remarks -- References -- 6 Optimization in Civil Engineering and Metaheuristic Algorithms: A Review of State-of-the-Art Developments -- 6.1 Introduction -- 6.2 Optimization and Metaheuristic Algorithms -- 6.2.1 Genetic Algorithm -- 6.2.2 Simulated Annealing -- 6.2.3 Particle Swarm Optimization -- 6.2.4 Harmony Search -- 6.2.5 Firefly Algorithm -- 6.2.6 Cuckoo Search -- 6.2.7 Bat Algorithm -- 6.2.8 Flower Pollination Algorithm -- 6.2.9 Other Metaheuristic Algorithms Used in Civil Engineering -- 6.3 Applications and Optimization in Civil Engineering -- 6.3.1 Truss Structures -- 6.3.2 Reinforced Concrete Members -- 6.3.3 Frame Structures -- 6.3.4 Bridges -- 6.3.5 Tuned Mass Damper -- 6.3.6 Construction Management. , 6.3.7 Hydraulics and Infrastructures -- 6.3.8 Transportation Engineering -- 6.3.9 Geotechnics -- 6.4 Conclusions -- References -- 7 A Bioreactor Fault Diagnosis Based on Metaheuristics -- 7.1 Introduction -- 7.2 Fault Diagnosis Formulated as an Optimization Problem -- 7.3 Description of the Bioreactor Benchmark Problem -- 7.3.1 FDI Formulation for the Benchmark Problem -- 7.4 Description of the Metaheuristics for the Benchmark Problem Fault Diagnosis -- 7.4.1 Ant Colony Optimization with Dispersion (ACO-d) -- 7.4.1.1 Description of the Algorithm for Continuous Problems -- 7.4.2 Differential Evolution with Particle Collision(DEwPC) -- 7.4.3 Description of the Algorithm -- 7.4.3.1 Mutation -- 7.4.3.2 Crossover -- 7.4.3.3 Selection -- 7.4.3.4 Selection with Absorption-Scattering with a Calculated Probability -- 7.4.4 Covariance Matrix Adaptation Evolution Strategy ( μw, λ) CMA-ES -- 7.4.4.1 Mutation -- 7.4.4.2 Selection -- 7.5 Test Cases Considered and Parameters Used in theMetaheuristics -- 7.5.1 Implementation of ACO-d -- 7.5.2 Implementation of DEwPC -- 7.5.3 Implementation of (μw,λ) CMA-ES -- 7.6 Results -- 7.6.1 Comparison with Other FDI Methods -- 7.7 Conclusions -- References -- 8 Optimization of Nuclear Reactors Loading Patterns with Computational Intelligence Methods -- 8.1 Introduction -- 8.2 Related Work -- 8.2.1 Particle Swarm Optimization -- 8.2.2 Cross-Entropy Algorithm -- 8.2.3 Population-Based Incremental Learning -- 8.2.4 Artificial Bee Colonies -- 8.3 Loading Pattern Optimization -- 8.4 Some Optimization Metaheuristics Applied to the LP Optimization -- 8.4.1 Particle Swarm Optimization (PSO) -- 8.4.2 Cross-Entropy Algorithm (CE) -- 8.4.3 Population-Based Incremental Learning (PBIL) -- 8.4.4 Artificial Bee Colonies (ABC) -- 8.5 Results and Discussion -- 8.5.1 Short-Run Results (PSO and CE) -- 8.5.2 Long-Run Results (PBIL and ABC). , 8.6 Conclusion -- Appendix -- Random Keys (RK) -- References -- 9 Inverse Problem of an Anomalous Diffusion Model Employing Lightning Optimization Algorithm -- 9.1 Introduction -- 9.2 Direct Problem Formulation and Solution -- 9.3 Inverse Problem -- 9.3.1 Maximum Likelihood -- 9.3.2 Lightning Optimization Algorithm (LOA) -- 9.3.2.1 Key Stages -- 9.4 Results and Discussion -- 9.5 Conclusions -- References -- 10 Study of the Impact of the Topology of Artificial Neural Networks for the Prediction of Meteorological Data -- 10.1 Introduction -- 10.2 Materials and Methods -- 10.2.1 Artificial Neural Networks -- 10.2.1.1 Artificial Neural Networks of Complex Topology -- 10.3 Methods -- 10.4 Results -- 10.5 Concluding Remarks -- References -- 11 Constructal Design Associated with Genetic Algorithm to Maximize the Performance of H-Shaped Isothermal Cavities -- 11.1 Introduction -- 11.2 H-Shaped Construct: Constructal Design and Numerical Formulation -- 11.3 Optimal H-Shaped Cavities -- 11.4 Conclusions -- References -- 12 Co-design System for Tracking Targets Using Template Matching -- 12.1 Introduction -- 12.2 Template Matching -- 12.3 Software Development -- 12.3.1 Genetic Algorithms -- 12.3.2 Particle Swarm Optimization -- 12.3.3 Comparison Between GA and PSO -- 12.4 Hardware Architecture -- 12.4.1 Dedicated Co-processor -- 12.4.1.1 First Stage -- 12.4.1.2 Second Stage -- 12.4.1.3 Third Stage -- 12.4.1.4 Square-Root Computation -- 12.4.1.5 Division Computation -- 12.4.2 Memory Controllers -- 12.5 Performance and Results -- 12.6 Conclusions -- References -- 13 A Hybrid Estimation Scheme Based on the Sequential Importance Resampling Particle Filter and the Particle Swarm Optimization (PSO-SIR) -- 13.1 Introduction -- 13.2 Physical Problem and Mathematical Formulation -- 13.3 Inverse Problem Formulation and Solution. , 13.3.1 Principle of the Sequential Monte Carlo Based Estimation.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Computational intelligence-Congresses. ; Technology-Sociological aspects-Congresses. ; Information technology-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (883 pages)
    Edition: 1st ed.
    ISBN: 9789811621024
    Series Statement: Lecture Notes in Networks and Systems Series ; v.217
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Automated Diagnosis of Multiple Sclerosis Lesions in Brain MRI Using 3D-FLAIR Acquisition -- 1 Introduction -- 2 Method Description -- 2.1 Image Acquisition -- 2.2 Multiple Sclerosis Lesions Diagnosis -- 3 Discussion -- 4 Conclusion -- References -- Geographical Information System Readiness Assessment Framework in the South African Private Health Sector for Pre- to Post-COVID-19 Pandemic Management -- 1 Introduction -- 2 Related Study -- 3 Research Model -- 4 Methodology -- 5 Data Analysis -- 5.1 Reliability Test -- 5.2 Descriptive Statistics -- 5.3 Correlation of Constructs -- 5.4 Hypothesis Testings -- 6 Findings and Conclusion -- References -- Analysis of Quality Website Content and Twitter Content Quality as Public Service Tools at the Local Level in DKI Jakarta Province, Indonesia -- 1 Introduction -- 2 Literature Review -- 2.1 e-Government -- 2.2 e-Services Public -- 2.3 Website Quality -- 3 Method -- 4 Result -- 4.1 City Government/Regency Government Website Quality -- 4.2 Social Media on Government: Official Twitter -- 5 Conclusion -- References -- Design and Implementation of an IoT-Based Electric Power Smart Meter for Monitoring and Control at Home Level -- 1 Introduction -- 2 Materials and Methodology -- 2.1 Program Configuration -- 2.2 Microcontroller Configuration -- 3 Designing Codes for the Correct Operation of the Smart Meter -- 3.1 Energy Reading -- 3.2 Python and PHP Code for Sending and Receiving Data -- 3.3 HTML Code for Data Consultation -- 3.4 Database Structure HTML Code for Data Consultation -- 4 Customer Monitoring of the Smart Meter -- 4.1 Creation of the Tunnel to the Network by Ngrok -- 4.2 Monitoring from Web Server -- 5 Result -- 6 Conclusions -- References -- Security Strategy and Research of Power Protection Equipment Based on SELinux -- 1 Introduction. , 2 SELinux Security Architecture -- 2.1 Flask Architecture -- 2.2 Basic Concepts of SELinux -- 3 SELinux Security Model -- 4 SELinux Policy Configuration -- 4.1 SELinux Policy Description Language -- 5 Safety Policy Configuration and Implementation of Power Protection Equipment -- 5.1 Introduction to Electrical Protection Equipment -- 5.2 Design and Implementation of Safety Policy for Power Protection Equipment -- 5.3 Division of Administrator Roles for Power Protection Equipment -- 5.4 Independent Processes Isolation of Power Protection Equipment -- 5.5 Restriction to File and Hardware for Power Protection Equipment Application -- 6 Conclusions -- References -- Towards an Advanced Integrated Security Framework for Cloud Computing -- 1 Introduction -- 1.1 Research Question and Objective -- 2 Research Methodology -- 3 Literature Review -- 3.1 Documented Cloud Security Threats -- 3.2 Identified Cloud Security Frameworks -- 3.3 Cloud Forensic Security -- 3.4 Autonomic Computing -- 3.5 Virtualising Cloud Security -- 4 Analyses of Table 2 Frameworks -- 5 Towards the AIC2s Framework -- 6 Towards Formalising the AIC2s Framework -- 7 Operationalising the AIC2s Framework -- 8 Conclusions -- References -- Nutrition-Mental Health Association Using Big Data Techniques -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Methodology -- 4.1 Data Set -- 4.2 Method -- 5 Results -- 6 Conclusion -- References -- An Optimized TWIN Battery Resource Management Scheme in IEEE 802.16e Networks -- 1 Introduction -- 2 The Proposed TWIN Battery Resource Management Scheme -- 2.1 The Analytical Modelling of the Optimized TWIN Battery Resource Management Scheme -- 3 Performance Evaluation and Results -- 3.1 Effect of Both Tmin and Tmax on the Arrival Rate -- 4 Conclusion -- References -- A Content-Based Recommender System for Hidden Cultural Heritage Sites Enhancing. , 1 Introduction -- 2 Background -- 2.1 Recommender Systems -- 3 Related Works -- 3.1 Average Rating Filling -- 3.2 Stochastic Gradient Descent -- 3.3 Biased Stochastic Gradient Descent -- 4 The Proposed Approach -- 4.1 The Creation of the User Profile -- 4.2 Rating Forecasts -- 4.3 Numerical Results -- 5 Conclusions and Future Works -- References -- An IoT-Based Framework for Smart Agriculture Managing and Product Enhancing -- 1 Introduction -- 2 Background -- 3 The Proposed Approach -- 4 Experimental Results -- 5 Conclusions -- References -- An Approach Based on Context and Situation Awareness to Improve Functional Safety in Complex Scenarios -- 1 Introduction -- 2 The System Architecture -- 2.1 Management and Semantic Interpretation of a Knowledge Base -- 2.2 Context and Situation Awareness Management -- 2.3 Orchestration Layer -- 2.4 Other Aspects -- 3 Experimental Phase -- 4 Conclusion -- References -- Development of an Augmented Reality Application as Support in Antenna Characterization -- 1 Introduction -- 2 Design -- 2.1 Antenna Design -- 2.2 App Augmented Reality -- 3 Results -- 4 Conclusions -- References -- Classification of Finite Groupoids of Order 3 by Using Image Patterns -- 1 Introduction -- 2 Building Image Patterns -- 3 Classification of Groupoids of Order 3 by Random Selection of Their Patterns -- 4 Conclusion -- Appendix I -- References -- Barycentric Lagrange Interpolation Matrix-Vector Form Polynomial for Solving Volterra Integral Equations of the Second Kind -- 1 Introduction -- 2 Barycentrique Lagrange Matrix-Vector Interpolation -- 3 The Convergence in the Mean -- 4 Error Estimation -- 5 Computational Results -- 6 Conclusion -- References -- Using client's Characteristics and Their Financial Products to Predict Their Usage of Banking Electronic Channels -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Data. , 5 Results -- 6 Conclusion -- References -- Business Process Re-Engineering: Strategies for Health Management Services in Puskesmas -- 1 Introduction -- 2 Literature Review -- 3 Research Method -- 4 Result and Discussions -- 4.1 Recruitment of New Doctor Admissions -- 4.2 Payment for Drug Purchases -- 5 Conclusion -- References -- Classification of Music by Genre Using Probabilistic Models and Deep Learning Models -- 1 Introduction -- 2 Related Work -- 3 Music Features -- 3.1 Feature Extraction and Representation -- 3.2 Magnitude-Based Features -- 3.3 Tempo-Based Features -- 3.4 Pitch-Based Features -- 3.5 Chordal Progression Features -- 4 Feature Selection -- 5 Automatic Music Genre Classification -- 6 Conclusion and Recommendations -- References -- Categorizing Code Review Comments Using Machine Learning -- 1 Introduction -- 2 Background Study -- 3 Research Methodology -- 3.1 Data Accumulation -- 3.2 Data Labeling -- 3.3 Preprocessing -- 3.4 Training Model -- 3.5 Cross Validation -- 4 Results and Discussion -- 4.1 Classification Results -- 4.2 Precision, Recall and F1-Score for Categories of Data Set -- 5 Conclusion -- References -- Human Praying Structure Classifıcation with Transfer Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection Process -- 3.2 Data Pre-Processing -- 4 Model Architecture -- 5 Model Evaluation -- 5.1 Training Process -- 5.2 Optimizer Selection -- 5.3 Simulation Parameter -- 5.4 Performance Evaluation -- 5.5 Prediction Result -- 6 Conclusion and Future Work -- References -- Evaluating the Performance of Hybrid Quantum-Classical Convolutional Neural Networks on NISQ Devices -- 1 Introduction -- 2 Related Work -- 2.1 Quantum Convolutional Neural Networks -- 3 Methodology -- 3.1 Data -- 3.2 Models -- 3.3 Metrics -- 3.4 Design Platform and Environments -- 4 Results and Discussion -- 5 Conclusion. , References -- Behavior Patterns of Bantul Regency Government Employees in Adoption e-Government Transformation -- 1 Introduction -- 2 Literature Review -- 2.1 e-Government -- 2.2 Technology Adoption -- 2.3 Umega -- 3 Research Method -- 4 Result and Discussion -- 5 Conclusion -- References -- Music Genre Classification: A Comparative Study Between Deep Learning and Traditional Machine Learning Approaches -- 1 Introduction -- 1.1 Motivation -- 1.2 Research Problem -- 1.3 Research Overview -- 1.4 Previous Work Results -- 2 Methodology -- 2.1 GTZAN Dataset -- 2.2 Features -- 2.3 Deep Learning Approach -- 2.4 Traditional Machine Learning Approaches -- 2.5 Evaluation Metrics -- 3 Results and Discussion -- 3.1 Classification Results -- 3.2 Evaluation of Results -- 4 Conclusion and Recommendations -- References -- The Behavior Patterns of the Yogyakarta Special Region Government Official in Reacting to e-Government Transformation -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 4 Result -- 4.1 Profile Respondent -- 4.2 Reliability -- 4.3 Path Coefficients and Hypothesis Testing -- 5 Conclusion -- References -- Proposed Framework for Implementing Cloud Computing in Yemeni Hospitals -- 1 Introduction -- 1.1 Cloud Computing Deployment Models -- 1.2 Cloud Computing Service Models -- 1.3 Software as a Service (SaaS) -- 1.4 Platform as a Service (PaaS) -- 1.5 Infrastructure as a Service (IaaS) -- 1.6 Cloud Computing in Healthcare -- 2 Related Work -- 3 The Proposed Framework -- 3.1 Description of the Proposed Framework -- 3.2 Scenario -- 4 Conclusion -- References -- A Bayesian Approach to Understanding the Influence of Traffic Congestion Given the Road Structure -- 1 Introduction -- 2 Related Work -- 2.1 Underlying Structure of Traffic -- 2.2 Structure Learning -- 2.3 Machine Learning in Traffic Prediction -- 3 Method and Data -- 3.1 Method -- 3.2 Data. , 4 Process and Results.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Computational intelligence. ; Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (627 pages)
    Edition: 1st ed.
    ISBN: 9789811975240
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.327
    DDC: 006.3
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Information technology-Congresses. ; Telecommunication systems-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (982 pages)
    Edition: 1st ed.
    ISBN: 9789811623776
    Series Statement: Lecture Notes in Networks and Systems Series ; v.235
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Techniques of Time Series Modeling in Complex Systems -- 1 Introduction -- 2 Discussion -- References -- Examining the Server's Load Average When Trying to Attack the Firewall -- 1 Introduction -- 2 Related Works -- 3 Theoretical Explanation -- 4 Experimental Environment -- 5 Results and Interpretation -- 6 Conclusions -- References -- Blockchain as a Technology Contributor: A Survey -- 1 Introduction -- 2 Literature Review -- 2.1 Advantages of Blockchain -- 2.2 Challenges of Blockchain -- 3 Blockchain Protocols -- 4 Future Discussion -- 5 Conclusion -- References -- GeLaP: German Labeled Dataset for Power Consumption -- 1 Introduction -- 2 Use Case and Disaggregation-BLADL -- 3 Methodology of Data Collection -- 3.1 Measuring Instruments -- 3.2 Data Transmission and Storage -- 3.3 Ethics and Privacy Considerations -- 4 Dataset Description -- 5 Households Overview -- 6 Data Quality Reflection -- 7 Related Datasets Survey -- 8 Conclusion and Future Work -- References -- Smart Platform Designed to Improve Poultry Productivity and Reduce Greenhouse Gas Emissions -- 1 Introduction -- 2 Solutions for Poultry Sector -- 2.1 Smart Poultry Management Systems and Role of Computer Vision and Machine Learning -- 2.2 Multi-criteria Decision-Making in the Poultry Production and Importance of GHG Reduction -- 3 Smart Platform for Improvement of Poultry Productivity and Reduction of Greenhouse Gas Emissions -- 3.1 Challenges of Implementation -- 3.2 Available Preliminary Data and Experimental Object -- 4 Conclusions -- References -- RPL-OC: Extension of RPL Protocol for LLN Networks Based on the Operator Calculus Approach -- 1 Introduction -- 2 Related Work -- 3 RPL-OC Approach -- 4 Performance Evaluation -- 5 Conclusions -- References -- Evaluating Challenges in Using Big Data in Healthcare. , 1 Introduction -- 2 Literature Review -- 2.1 Overall Challenges of Big Data -- 2.2 Application of Big Data in Healthcare -- 2.3 Challenges for Healthcare Industry -- 3 Thematic Analysis -- 4 Conclusion and Future Work -- References -- Hardware Control of the Electron Beam Energy Density by the Heating Spot -- 1 Introduction -- 2 Experimental Study -- 3 Conclusion -- References -- A Machine Learning Model for Predicting Fetal Hemoglobin Levels in Sickle Cell Disease Patients -- 1 Introduction -- 2 Background -- 2.1 Polymorphism and Hemoglobin Regulating Genes -- 2.2 Sickle Cell Anemia -- 3 Our Approach -- 3.1 Machine Learning Approach -- 3.2 Training/Test Set -- 4 Implementation -- 4.1 Previous Model Accuracy -- 4.2 K-Nearest Neighbors Algorithm Implementation -- 4.3 Model Data Processing -- 4.4 Alternative Algorithms Comparison -- 5 Results and Evaluation -- 5.1 Accuracy -- 5.2 K-Value Evaluation -- 5.3 Training Set Size and Cross-Validation -- 6 Conclusions -- 6.1 Model Applications -- 6.2 Future Work -- References -- Simulations of Instationary Schrodinger Equation with Coupled Time- and Space Splitting Methods -- 1 Introduction -- 2 Time-Space Splitting Method for Instationary Schrödinger Equations -- 3 Numerical Results -- 4 Conclusion -- References -- Prediction of Movie Success Using Twitter Temporal Mining -- 1 Introduction -- 2 Related Works -- 3 Movie Success Prediction Models -- 3.1 TweetAMovie Dataset Collection -- 3.2 Feature Preparation -- 3.3 Proposed Prediction Models -- 4 Experiments and Results -- 4.1 Experiments Results -- 5 Conclusion -- References -- The Model of Business Intelligence Development by Applying Cooperative Society Based Financial Technology -- 1 Introduction -- 2 Material and Method -- 2.1 Cooperative Society World Data -- 2.2 Relationships and BI Models to FinTech -- 3 Result and Discussions -- 4 Conclusion. , References -- A Computational Intelligent Cognition System Under Uncertainty -- 1 Introduction -- 1.1 Conception -- 1.2 Motivation, Novelty, and Contribution of the Study -- 2 The Self-Developing Computational Systemic Cognitive Memory -- 2.1 The Model of Self-Developing Computational Systemic Cognitive Memory -- 3 The Self-Developing Computational System Model of Situational Control of Mental Cognition -- 3.1 The Model of Situational Fuzzy Control of Mental Cognition -- 4 The CSSC Modeling Under Uncertainty -- 4.1 The Model of CSSC Modeling Process -- 4.2 Modeling of the CSSC -- 4.3 The Model of Computational Mapping Rules for the CSSC Modeling -- 5 Conclusion -- References -- State-of-the-Art of the Impact of HIV and Its Treatment on the Voice of PLHIV -- 1 Introduction -- 2 The Variability of the Voice in RAL -- 2.1 Technology-Related Variability -- 2.2 Conversation-Related Variability -- 2.3 Speaker-Related Variability -- 3 Does HIV and its Treatment Have an Impact on the Voice? -- 3.1 Difference Voice, Speech as Well as Their Disorders -- 3.2 Neurological Disorders and Voice Disorders -- 3.3 HIV and Voice Disorders in PLHIV -- 3.4 Medicines and Voice Disorders in PLHIV -- 4 Discussion -- 4.1 The Updated Models -- 4.2 Double Identification -- 5 Conclusion -- References -- Specifics of Digitalization Strategies for Risk Management Systems as a Transformation Factor of Russian Companies' Management Systems in the Context of the COVID-19 Pandemic -- 1 Introduction -- 2 Role and Significance of Digital Technology in Strategic Management and Risk Management Systems of Russian Companies in the Context of Pandemic -- 3 Research Method -- 4 Analysis of the Content of Processes of Introducing Digital Technology in Russian Companies' Strategic Management and Risk Management Systems in the Context of the Pandemic -- 5 Conclusion -- References. , Application of Adjusted Differential Evolution in Optimal Sensor Placement for Interior Coverage -- 1 Introduction -- 2 Mathematical Problem Formulation -- 3 A Suboptimal Sensor Location Method for IC -- 4 An Adjusted Discrete Differential Evolution for IC -- 5 Experimental Results -- 6 Conclusion -- References -- Minimizing Costs of Transportation Problems Using the Genetic Algorithm -- 1 First Section -- 1.1 Introduction -- 1.2 Research Method -- 1.3 Optimization -- 1.4 Transportation Problem -- 1.5 Genetic Algorithm -- 1.6 The Relationship Between the Genetic Algorithm and the Transfer -- 1.7 Solution -- 1.8 Results -- 1.9 Discussion -- References -- Analysis of the Most Promising Parametric Linear Methods for Studying Intellectual Competence -- 1 Introduction -- 1.1 Research Questions -- 1.2 Purpose of the Study -- 2 Study Participants -- 3 Research methods -- 3.1 Methodology for Diagnosing Conceptual Abilities: "Conceptual Synthesis" [9] -- 3.2 Methods for Identifying Metacognitive Abilities: -- 3.3 The Author's Method of Diagnostics of Intentional Abilities: "Mood" -- 3.4 Author's Methodology for Assessing Intellectual Competence: "Interpretation" -- 4 Results -- 4.1 Discriminant Analysis of Conceptual, Metacognitive, and Intentional Components of Intellectual Competence -- 4.2 Factor Structure of Intellectual Competence (Conceptual, Metacognitive, and Intentional Components) -- 4.3 Regression (Multiple) Analysis of the Components of Intellectual Competence (Conceptual, Metacognitive, and Intentional Components) -- 5 Findings -- References -- Enabling Cloud Computing to Facilitate Health Analytics Application from Local Hospitals in Thailand -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Query for Cancer, Hypertension, and Diabetic Patients -- 3.3 Data Cleaning Process. , 3.4 Relational Diagram and Violation Mapping -- 4 Results -- 5 Conclusion -- References -- Neural Network-Based TID Controller for Wheeled Mobile Robot Trajectory Tracking -- 1 Introduction -- 2 Kinematic Model of a Robot -- 3 Proposed NN-Based TID Controller -- 4 Results and Discussions -- 4.1 Case 1: Circular Trajectory -- 4.2 Case 2: Lemniscate Trajectory -- 4.3 Case 3: B Spline Trajectory -- 4.4 Case 4: Straight Line Trajectory -- 5 Conclusion -- References -- Do You Trust Me? Value and Governance in Data Sharing Business Models -- 1 Introduction -- 2 Research Questions -- 3 Methodology -- 4 Literature Review -- 4.1 Data-Sharing Literature -- 4.2 Data Governance Literature -- 4.3 Business Models Literature -- 5 Factors Determining Data Sharing -- 5.1 Intra-organizational -- 5.2 Inter-organizational -- 6 Conclusion -- References -- Knowledge Transfer in Intercultural Technical Communication in View of Translation Synergetic Paradigm -- 1 Introduction -- 2 Problem Statement and Research Goals -- 3 Methodology and Research Methods -- 4 Results and Discussions -- 5 Conclusion -- References -- User Experience Framework for Teachers Using Mobile Technologies in Resource-Constrained Environments -- 1 Introduction -- 2 Literature Review -- 2.1 User Experience -- 2.2 Exploring the UX Components -- 3 Research Methodology -- 4 Data Analysis and Findings -- 4.1 Results: User (Teacher) -- 4.2 Results: System (Mobile Technologies) -- 4.3 Results: Context (Resource-Constrained Environment-School) -- 5 Conclusion -- References -- Two-Phase Approach for Solving the Rich Vehicle Routing Problem Based on Firefly Algorithm Clustering -- 1 Introduction -- 2 Literature Review -- 3 Case Study -- 3.1 Phase I: Clustering -- 3.2 Phase II: Cluster Routing -- 4 Results -- 5 Conclusion -- References. , Controlled Social Network Adaptation: Subjective Elements in an Objective Social World.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Electronic data processing-Distributed processing. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (451 pages)
    Edition: 1st ed.
    ISBN: 9783319996264
    Series Statement: Studies in Computational Intelligence Series ; v.798
    DDC: 004.36
    Language: English
    Note: Intro -- Preface -- Organization -- General Chair -- Steering Committee -- Technical Program Chairs -- Program Committee -- Publicity Chair -- Publications Chair -- Web Chair -- Local Organizing Committee -- Contents -- Main Track -- Long Distance In-Links for Ranking Enhancement -- 1 Introduction -- 2 PageRank -- 3 Results -- 3.1 Simulation Settings -- 3.2 Simulation Results -- 4 Conclusions -- References -- Concept Tracking and Adaptation for Drifting Data Streams under Extreme Verification Latency -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed TRACE Approach -- 4 Experimental Setup -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- Adversarial Sample Crafting for Time Series Classification with Elastic Similarity Measures -- 1 Introduction -- 2 Background and Related Work -- 2.1 Adversarial Sample Crafting Techniques -- 2.2 Dynamic Time Warping -- 3 Attack Strategies for DTW Based kNN Classifiers -- 4 Experiments -- 4.1 Results and Discussion -- 5 Conclusions and Future Work -- A Appendix: Computation of P(c|Uv) gradient -- References -- Slot Co-allocation Optimization in Distributed Computing with Heterogeneous Resources -- 1 Introduction and Related Works -- 2 Resource Selection Algorithm -- 2.1 Problem Statement -- 2.2 Window Search Procedure -- 3 Simulation Study -- 3.1 Simulation Environment Setup -- 3.2 General Algorithms Comparison -- 3.3 Dependable Resources Allocation -- 4 Conclusions and Future Work -- References -- About Designing an Observer Pattern-Based Architecture for a Multi-objective Metaheuristic Optimization Framework -- 1 Introduction -- 2 The Observer Pattern -- 3 Proposed Architecture -- 3.1 Algorithm Templates in jMetal -- 3.2 Observer Pattern-Based Architecture -- 4 Implementation Details -- 5 Discussion -- 6 Conclusions -- References. , Scalable Inference of Gene Regulatory Networks with the Spark Distributed Computing Platform -- 1 Introduction -- 2 Notation and Problem Formulation -- 3 Distributed Approach -- 4 Experimental Results and Discussions -- 4.1 Speedup and Efficiency -- 4.2 Analysis of Inferred Networks -- 5 Conclusions -- References -- Finding Best Compiler Options for Critical Software Using Parallel Algorithms -- 1 Introduction -- 2 Problem Description -- 3 Our Proposed Approach -- 4 Experimental Design -- 5 Experimental Analysis -- 5.1 Quality Analysis -- 5.2 Analysis of the Selected Flags -- 6 Conclusions -- References -- Drift Detection over Non-stationary Data Streams Using Evolving Spiking Neural Networks -- 1 Introduction -- 2 Background -- 3 Evolving Spiking Neural Networks -- 4 Proposed Approach -- 5 Computer Experiments -- 6 Results and Discussion -- 7 Conclusions and Future Work -- References -- Energy -- A Hybrid Ensemble of Heterogeneous Regressors for Wind Speed Estimation in Wind Farms -- 1 Introduction -- 2 Data and Predictive Variables -- 3 A Hybrid Ensemble of Heterogeneous Regressors -- 3.1 Machine Learning Regressors Involved -- 3.2 Final Hybrid Heterogeneous Regressors Bank -- 4 Experimental Part -- 4.1 Results -- 5 Conclusions -- References -- Bio-inspired Approximation to MPPT Under Real Irradiation Conditions -- 1 Introduction -- 2 A Photovoltaic Model Under Real Conditions -- 3 Experimental Design -- 4 MPPT Based on the P& -- O Algorithm -- 5 MPPT Based on the ABC Algorithm -- 6 Results of the Simulation -- 7 Conclusions -- References -- Industry -- Decision Making in Industry 4.0 Scenarios Supported by Imbalanced Data Classification -- 1 Introduction -- 2 Description of the Use Case -- 3 Hypothesis Generation Process -- 4 Imbalanced Classification -- 4.1 Preprocessing Techniques for Imbalanced Data -- 4.2 Cost-Sensitive Classifiers. , 4.3 Ensemble Techniques for Imbalanced Data -- 5 Results and Discussion -- 6 Conclusions and Future Research -- References -- A Hybrid Optimization Algorithm for Standardization of Maintenance Plans -- Abstract -- 1 Introduction -- 2 Standardization of Maintenance Plans -- 3 The Hybrid Algorithm -- 3.1 Baseline Data -- 3.2 Plans vs Visits -- 3.3 Rules Procedures -- 3.4 Greedy Algorithms -- 3.5 Final Balance -- 4 Use Case -- 5 Conclusion -- References -- Labelling Drifts in a Fault Detection System for Wind Turbine Maintenance -- 1 Introduction -- 2 Non-stationary Data in Traditional Machine Learning -- 2.1 Concept Drift Theory -- 2.2 Adaptation Techniques -- 3 Proposed Methodology: Drift Labelling -- 3.1 Platform Overview -- 3.2 ELM Ensemble -- 3.3 Preliminary Results -- 4 Conclusions and Further Work -- References -- Time Series Forecasting in Turning Processes Using ARIMA Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Characterization of the Signal -- 3.2 Outlier Detection -- 3.3 Filtering -- 3.4 Abnormal Behavior Detection -- 3.5 Forecasting -- 4 Results -- 5 Conclusions and Future Work -- References -- A New Distributed Self-repairing Strategy for Transient Fault Cell in Embryonics Circuit -- 1 Introduction -- 2 Self-repairing Strategies of Embryonics Hardware -- 2.1 Cell Elimination Self-repairing Strategy (CESS) -- 2.2 Fault-Cell Reutilization Self-repairing Strategy (FCRSS) -- 3 Circuit Modules -- 3.1 Controller -- 3.2 Configuration Register (CR) -- 3.3 Assistant Reroute Module -- 4 Simulation and Reliability Analysis -- 4.1 I/O Simulation Results -- 4.2 Hardware Consumption and Time Consumption -- 4.3 Reliability Analysis -- 5 Conclusions -- References -- Mobility and Smart Cities -- Solving the Open-Path Asymmetric Green Traveling Salesman Problem in a Realistic Urban Environment -- 1 Introduction. , 1.1 Background and Research Contribution -- 2 Problem Definition -- 2.1 Quantifying CO2 Emission -- 3 Description of the Simulation Environment -- 4 Experiments and Results -- 5 Conclusions and Further Work -- References -- Road Traffic Forecasting Using NeuCube and Dynamic Evolving Spiking Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Initialization and Unsupervised Learning -- 2.2 Supervised Learning and Regression Outputs -- 3 Experiments and Results -- 4 Conclusions and Future Work -- References -- A Preliminary Study on Automatic Algorithm Selection for Short-Term Traffic Forecasting -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusions -- References -- Solving an Eco-efficient Vehicle Routing Problem for Waste Collection with GRASP -- 1 Introduction -- 2 Eco-efficient Vehicle Routing Problem -- 3 Solution Approach -- 3.1 Determining Fill Level -- 3.2 Designing Routes -- 4 Computational Experiments and Results -- 5 Conclusions and Further Works -- References -- Fostering Agent Cooperation in AmI: A Context-Aware Mechanism for Dealing with Multiple Intentions -- 1 Introduction -- 2 Background -- 2.1 Planning and Cooperation -- 2.2 Contextual Planning System (CPS) -- 3 Collective Contextual Planning System (CCPS) -- 3.1 Formal Framework -- 4 Experiments -- 4.1 Scenario -- 4.2 Situations and Expected Outcomes -- 4.3 Results -- 5 Conclusion and Future Work -- References -- Robotics and Video Games -- Distributed Formation Tracking of Multi Robots with Trajectory Estimation -- 1 Introduction -- 2 Graph Theory -- 3 Consensus Algorithm with Time Varying Reference State -- 4 Controller Design for Formation of Multi Robots Based on Extended Consensus Algorithm -- 5 Communication Failure -- 6 Simulation Analysis -- 6.1 Kinematic Linearization -- 6.2 Simulation Results -- 7 Conclusions -- References. , Applying Evolutionary Computation Operators for Automatic Human Motion Generation in Computer Animation and Video Games -- 1 Introduction -- 1.1 Aims and Structure of the Paper -- 2 The Skeletal Model -- 3 The Method -- 4 Experimental Results -- 5 Conclusions and Future Work -- References -- A General-Purpose Hardware Robotic Platform for Swarm Robotics -- 1 Introduction -- 1.1 Aims and Structure of This Paper -- 2 Some Popular Swarm Intelligence Algorithms -- 2.1 Particle Swarm Optimization -- 2.2 Bat Algorithm -- 2.3 Firefly Algorithm -- 2.4 Cukoo Search Algorithm -- 3 Hardware Robotic Platform for Swarm Robotics -- 3.1 Hardware Architecture and Components -- 3.2 Programming Framework -- 4 Support Features for Swarm Intelligence Algorithms -- 5 Conclusions and Future Work -- References -- Internet of Things -- A Deep Learning Approach to Device-Free People Counting from WiFi Signals -- 1 Introduction -- 2 Preliminaries and Related Work -- 3 Proposed CNN Model for Device-Free People Counting -- 4 Experimental Setup -- 5 Results and Discussion -- 6 Conclusions -- References -- Evolutionary Algorithms for Design of Virtual Private Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Mathematical Foundations -- 4 Evolutionary Algorithms -- 5 Experimental Results -- 6 Conclusion -- Acknowledgment -- References -- Forming Groups in the Cloud of Things Using Trust Measures -- 1 Introduction -- 2 Related Work -- 3 The Trust Model -- 4 The Distributed Grouping Algorithm -- 5 Experiments -- 6 Conclusions -- References -- Terrorism and War: Twitter Cascade Analysis -- 1 Introduction -- 2 Dataset Description: War and Terrorism -- 3 Dataset Analysis -- 4 Modeling the Retweet Dynamics -- 5 Conclusions -- References -- A Genetic Algorithm with Local Search Based on Label Propagation for Detecting Dynamic Communities -- 1 Introduction -- 2 Related Work. , 3 Algorithm Description.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...