GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Document type
Language
  • 1
    Keywords: Forschungsbericht
    Type of Medium: Online Resource
    Pages: Online-Ressource (PDF-Datei: 18 S., 3.396 KB)
    Language: German
    Note: Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden , Förderkennzeichen BMBF 50 OR 1103. - Engl. Berichtsbl. u.d.T.: LoCuSS: Completing a volume-limited sample of massive galaxy clusters with XMM-NEWTON and Subaru , Systemvoraussetzungen: Acrobat reader. , Zsfassung in dt. u. engl. Sprache
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Forschungsbericht
    Type of Medium: Online Resource
    Pages: Online-Ressource (PDF-Datei: 11 S., 185 KB)
    Language: German
    Note: Auch als gedr. Ausg. vorh. - Unterschiede zwischen dem gedruckten Dokument und der elektronischen Ressource können nicht ausgeschlossen werden , Förderkennzeichen BMBF 50 OR 1005. - Engl. Berichtsbl. u.d.T.: A joint XMM-Newton Subaru study of galaxy cluster scaling relations , Systemvoraussetzungen: Acrobat reader.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Computer networks-Congresses. ; Wireless communication systems-Congresses. ; Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (752 pages)
    Edition: 1st ed.
    ISBN: 9789811640162
    Series Statement: Lecture Notes in Networks and Systems Series ; v.286
    DDC: 004.6
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Influencing User Intention of Plant-Based Sensing System Adoption in Public Vocational High Schools of Indonesia Using TAM -- 1 Introduction -- 2 Literature Review -- 2.1 The Plant-Based Sensing System Proposed -- 2.2 The Theory of Technology Acceptance Model -- 3 Methodology -- 4 Research Model and Hypothesis -- 4.1 External Variable of Model -- 4.2 Perceived Ease of Use, Perceived Usefulness, Attitude, and Behavioral Intention -- 5 Results -- 5.1 Reliability Analysis -- 5.2 Regression Analysis -- 6 Conclusion -- References -- An Empirical Study of Critical Success Factors for the Adoption of m-Government Services in Tanzania -- 1 Introduction -- 2 Literature Review and Hypothesis Development -- 2.1 m-Government Services in Tanzania -- 2.2 Mobile Services Acceptance Model (MSAM) -- 2.3 Hypotheses Development -- 3 Methodology -- 4 Findings -- 5 Discussion -- 6 Conclusion -- References -- Smart City Based on LoRaWAN: Coverage Study for Cusco Urban Area -- 1 Introduction -- 2 LoRaWAN Technology -- 3 Cusco Urban Area Coverage Simulation -- 4 Data Collection -- 5 Analysis of Experimental Measurements -- 5.1 Efficiency Analysis for SF12 -- 5.2 RSSI Analysis for SF12 -- 5.3 Efficiency and RSSI Analysis for SF7 -- 6 Conclusion -- References -- Digital Transformation in Education in Knowledge Society -- 1 Introduction -- 1.1 Basic Considerations -- 2 Materials and Methods -- 3 Results -- 4 Conclusion -- References -- Induction Motor Overload Recognition Based on Sound Analysis -- 1 Introduction -- 2 Related Works -- 3 The Corpus -- 4 The Experiments -- 4.1 Frame-by-Frame Classification -- 4.2 One-Second Segment Classification -- 4.3 Half-a-Second Segment Classification -- 4.4 The Selected Classifier -- 5 Conclusions -- References. , Simulation of an All-Terrain Vehicle Driving Experience Using Virtual Reality -- 1 Introduction -- 2 Materials and Methods -- 2.1 Conception of the Virtual Experience -- 2.2 Learning Programming Tools -- 2.3 Virtual Environment Validation -- 2.4 Conception of the Immersive Environment -- 3 Results -- 4 Discussion -- 5 Conclusions and Recommendations -- References -- Safety-Centric and Smart Outdoor Workplace: A New Research Direction and Its Technical Challenges -- 1 Introduction -- 2 The Need of Dedicated Focus on Smart Outdoor Workplace -- 2.1 Smart Workplace -- 2.2 Smart Outdoor Workplace -- 2.3 Divergent Technology Streams -- 3 Technical Challenges -- 3.1 Diverse and Incompatible Sensors and Devices -- 3.2 Growing Gap Between Battery Technologies and Power Requirements -- 4 Research Prospects Driven by the Identified Challenges -- 4.1 Sandwich Approach to a Knowledge Architecture for Smart Outdoor Workplace -- 4.2 Model-Driven Simulation and Optimization of Energy Consumption in Smart Outdoor Workplace -- 5 Conclusions and Future Work -- References -- Devising Auxiliary Glyph Schemas Combined with XOR Filters for Improvised Font Delivery and Reliable Dynamic Font Augmentation -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology and Algorithm -- 3.1 Basic Font Subsetting Solution and Problems -- 3.2 Client Side: Proposed Data Structures -- 3.3 Font Subsetting and Augmentation Workflows Using Proposed Solution -- 3.4 Flow for an Application Session with the Proposed Solution -- 3.5 XOR Filter Processing for Subset or Font Portion Serving on Server Side -- 4 Conclusion -- References -- Multiple Sequence Alignment Algorithms in Bioinformatics -- 1 Introduction -- 2 Multiple Sequence Alignment (MSA) -- 3 Multiple Sequence Alignment Algorithms (MSA) -- 3.1 ClustalW -- 3.2 Clustal Omega -- 3.3 T-Coffee -- 3.4 MAFFT -- 3.5 Kalign. , 3.6 MUSCLE -- 3.7 Probcons -- 3.8 Genetic Algorithms -- 4 Evaluation of MSA -- 5 Conclusion -- References -- Design and Implementation of a Machine Learning-Based Technique to Detect Unipolar and Bipolar Depression Using Motor Activity Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Underwater Magnetic Release System -- 1 Overview -- 2 System Components -- 2.1 The Software -- 3 Power Considerations -- 4 Design Specifics -- 5 Conclusion -- References -- An Optimal Route for People with Ambulant Disabilities Using Mathematical Risk Modeling and Analytic Hierarchy Process -- 1 Introduction -- 2 Methods -- 2.1 Factors Affecting the Selection of Best Route -- 2.2 Mathematical Risk Modeling -- 2.3 AHP Technique -- 3 Results and Discussion -- 4 Conclusion -- References -- The Innovation in Manufacturing Areas of Electronics Industry of Mexicali Using PLC -- 1 Introduction -- 2 Technological Innovation -- 3 Technology Development -- 4 Improving Competitiveness -- 5 Software Quality in the Electronics Industry -- 6 Limitations of the Investigation -- 7 Methodology -- 8 Results -- 9 PLC Analysis -- 10 Correlation Analysis of Industrial Parameters -- 11 Conclusions -- References -- Assistive Autonomous Electric Vehicle for Disaster Management -- 1 Introduction -- 2 Mechanical System Design -- 2.1 Overview -- 2.2 Frame Design -- 2.3 Assembly for the Wheels -- 2.4 Sensors Stand -- 2.5 Body Housing -- 3 Electronics System Design -- 3.1 Brief Overview -- 3.2 Electronic Suite Description -- 4 Working of the Circuit -- 5 Software and Control System -- 5.1 Brief Overview -- 5.2 Main Software Pipeline -- 5.3 Lane Detection and Path Mapping -- 5.4 Object Discovery Pipeline -- 5.5 Arduino Communication -- 5.6 Motor Driving -- 6 Advantage and Applications -- 6.1 Advantages -- 6.2 Applications. , 7 Conclusion -- References -- On the Existing and New Potential Methods for Partial Discharge Source Monitoring in Electrical Power Grids -- 1 Introduction -- 2 Theoretical Aspects -- 2.1 Spectrogram -- 2.2 Wavelet Transform -- 2.3 Compressive Sensing -- 2.4 Phase-Diagram-Based Analysis -- 3 Experimental Configuration and Results -- 4 Conclusions -- References -- Efficient Approach for Block-Based Copy-Move Forgery Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Discussion and Conclusion -- References -- Smart IoT Sensor Network for Monitoring of Cultural Heritage Monuments -- 1 Introduction -- 2 Sensor Design -- 3 Visualization Platform -- 4 Conclusions -- References -- MorArch: A Software Architecture for Interoperability to Improve the Communication in the Edge Layer of a Smart IoT Ecosystem -- 1 Introduction -- 2 Present Context and Previous Works -- 2.1 Interoperability Architectures -- 2.2 Interoperability Protocols -- 3 Proposal -- 4 Experiments -- 4.1 File System -- 4.2 Data Flow Inside Our Fog Ecosystem -- 4.3 Results -- 5 Conclusions -- References -- A Design of an IoT-Based Smart Home with Auto-sanitization System -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Modeling -- 4 Working Procedure -- 4.1 Remote Access -- 4.2 Voice Command Access -- 5 Implementation of the Prototype -- 5.1 Software Implementation -- 5.2 Hardware Implementation -- 5.3 Visual Models of a Smart Home with Auto-sanitization -- 6 Future Developments, Scopes, and Social Impact -- 7 Results and Data Analysis -- 8 Conclusion -- References -- An Experiment Study on Federated Learning Testbed -- 1 A Novel PPML Framework: Federated Learning -- 2 Methodology and System Implementation -- 3 Results on Efficiency Test -- 3.1 Training Speed -- 3.2 Communication Cost -- 4 Privacy Analysis -- 5 Conclusion. , References -- Visual Quality Comparison of Ocean Wave Effects at Different Camera Distances -- 1 Introduction -- 2 Material and Method -- 2.1 Setting in Houdini -- 2.2 Setting in Unreal -- 2.3 Minor Conclusion -- 3 Result -- 4 Conclusion -- References -- Control System to International Parental Child Abduction, Case: Colombia -- 1 Introduction -- 2 Background -- 3 Design and Method for Colombia -- 4 Results -- 5 Analysis of the Results -- 6 Conclusions and Further Work -- References -- It is not Always Ethical: Data Manipulation to Justify Public Policy Choices in COVID-19 Response -- 1 Introduction -- 2 Background -- 3 Cases of COVID-19 Data Manipulation -- 4 Florida's COVID-19 Data Portal -- 5 Georgia's COVID-19 Data Portal -- 6 Arizona's COVID-19 Data Portal -- 7 Texas, Virginia, and Vermont's COVID-19 Data Portals -- 8 Implications of Data Manipulation -- 9 Conclusion -- References -- BPMN2EVENTB Supporting Transformation from BPMN2.0 to Event B Using Kermeta -- 1 Introduction -- 2 The Proposed Approach -- 3 Subset of Mapping Rules BPMN-Event B -- 4 Illustration -- 5 Conclusion and Future Work -- References -- Teaching Neuroscience Through Flipped Classroom: Systematizing an Experience with Students of the Professional Career of Elementary Education -- 1 Introduction -- 1.1 Contributions of Neuroscience to Education -- 1.2 Teaching Neuroscience Through Digital Resources -- 2 Methodology -- 2.1 Procedures -- 2.2 Participants -- 2.3 Measures -- 3 Results -- 3.1 Analysis of Means and Variation Coefficients -- 3.2 Exploratory Analysis with Boxplots -- 3.3 Analysis of Some Items -- 4 Discussion -- 5 Conclusions and Future Works -- References -- Low-Cost IoT Platform for Telemedicine Applications -- 1 Introduction -- 2 Related Works -- 3 Case of Study -- 4 Implementation of the Proposal -- 4.1 Wearable Device -- 4.2 Android TV App -- 4.3 Cloud Service. , 5 Discussion of Results.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Singapore : Springer Singapore | Singapore : Imprint: Springer
    Keywords: Plants—Evolution. ; Plant ecology. ; Biodiversity.
    Description / Table of Contents: Chimonocalamus -- Drepanostachyum -- Ampelocalamus -- Thamnocalamus -- Fargesia.-Gaoligonshania -- Yushania -- Acidosasa -- Oligostachyum -- Pseudosasa -- Menstruocalamus.-Pleioblastus -- Bashania -- Gelidocalamus -- Sasa -- Sasaella -- Ferrocalamus -- Indocalamus.
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource(292 illus., 261 illus. in color. eReference.)
    Edition: 1st ed. 2022.
    ISBN: 9789811627583
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (495 pages)
    Edition: 1st ed.
    ISBN: 9789811552243
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.182
    DDC: 004.6
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- 1 Accurate Detection of Facial Landmark Points Using Local Intensity Information for Emotion Detection -- 1.1 Introduction -- 1.2 Materials and Methods -- 1.2.1 Materials -- 1.2.2 Proposed Methodology -- 1.3 Performance Metrics -- 1.4 Results -- 1.4.1 Eye Centers -- 1.4.2 Eyebrows -- 1.4.3 Lip Corners -- 1.5 Discussion -- 1.6 Conclusion -- References -- 2 Statistical Approach to Detect Alzheimer's Disease and Autism Spectrum-Related Neurological Disorder Using Machine Learning -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Methodology -- 2.4 Result -- 2.5 Conclusion -- 2.6 Future Work -- References -- 3 The Development and Gap of Chinese and American Open Access Journals: From the Perspective of Network Influence -- 3.1 Introduction -- 3.2 Data and Method -- 3.2.1 Sample Selection Method -- 3.2.2 Data Acquisition Platform -- 3.2.3 Data Collection Method -- 3.3 Results and Discussion -- 3.4 Comparison of Network Influence Based on Principal Component Analysis -- 3.5 Conclusion -- 3.6 Limited -- Appendix -- References -- 4 The Use of Mobile Apps to Facilitate Customers' Choice-Making When Grocery Shopping -- 4.1 Introduction -- 4.2 Method -- 4.2.1 Participants -- 4.2.2 Apparatus and Setting -- 4.2.3 Attributes -- 4.2.4 Procedure -- 4.2.5 Analysis -- 4.3 Findings -- 4.4 Discussion -- 4.4.1 Practical Implications -- 4.4.2 Limitations and Future Research -- References -- 5 Implementation of Best Hybrid Adaptive and Intelligent MIMO Detector on Reconfigurable Architecture for 5G LTE/IoT Environment -- 5.1 Introduction -- 5.2 Proposed B-HAI MIMO Detector -- 5.3 System Model -- 5.4 Architecture of HAI Detector -- 5.5 Computational Complexity Reduction -- 5.6 Performance Evaluation -- 5.7 Conclusions -- References. , 6 Automated Detection of Retinal Hemorrhage Based on Supervised Classifiers and Implementation in Hardware -- 6.1 Introduction -- 6.2 Methodology -- 6.2.1 Feature Extraction from Splats -- 6.2.2 Preliminary Feature Selection and Classification -- 6.3 Results and Discussions -- 6.3.1 Classification of Splats Using kNN and ANN Classifiers -- 6.3.2 Implementation in Hardware -- 6.4 Conclusion -- References -- 7 Data Encryption as Security Measure in IoT-Enabled Healthcare -- 7.1 Introduction -- 7.2 IoT Data in Healthcare -- 7.3 IoT Data Encryption and Compression -- 7.3.1 Basic Philosophy -- 7.3.2 Basic Details DRT and IDRT -- 7.3.3 Inverse Discrete Rajan Transform -- 7.3.4 Sparsing of Data by Retaining CPI Alone -- 7.4 Summary -- References -- 8 Agents-Based Service Restoration in Electrical Secondary Distribution Network -- 8.1 Introduction -- 8.2 Study Approach -- 8.3 Current Status of the Tanzanian Secondary Distribution Network -- 8.4 Proposed Distributed Control Model for Service Restoration -- 8.4.1 Objective Functions -- 8.4.2 Recommendations for the Improvement of the SDN -- 8.4.3 Design for the Equipment Specifications to Be Installed to Support Service Restoration in the Pilot Site -- 8.5 Conclusion -- References -- 9 Packet-Level and Physical-Level Cross-Technology Communications: A Brief Introduction -- 9.1 Introduction -- 9.2 Packet-Level CTC -- 9.2.1 FreeBee -- 9.2.2 ZigFi -- 9.3 Physical-Level CTC -- 9.4 Conclusion -- References -- 10 Smart Traffic Navigation System (STNS) to Reduce Travel Time by Integrating Signals from Navigation and Traffic Systems -- 10.1 Introduction -- 10.2 Related Work -- 10.3 Design of the Proposed Model -- 10.4 Experimental Setup -- 10.5 Implementation -- 10.5.1 Vehicle -- 10.5.2 Traffic Signal -- 10.6 Experiments and Results -- 10.6.1 Test Cases -- 10.6.2 Test System Specifications -- 10.6.3 Results. , 10.7 Conclusion -- References -- 11 Selective Sensor Control via Cauchy Schwarz Divergence -- 11.1 Introduction -- 11.2 Background and Problem Statement -- 11.2.1 Sensor Control Framework -- 11.2.2 Labeled MB Filter -- 11.2.3 Notation -- 11.2.4 Labeled-MB RFS -- 11.2.5 Labeled-MB Filter -- 11.3 Selective Sensor Control via CS-Divergence -- 11.3.1 CS-Divergence -- 11.4 Numerical Results -- 11.5 Discussion and Conclusion -- References -- 12 Step-Factor Resampling Technique for Imbalanced Sequence Data Classification -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Methodology -- 12.3.1 Smoothing Technique -- 12.3.2 Resampling Technique -- 12.4 Experimental Results -- 12.4.1 Model Tuning with Smoothing Factor -- 12.4.2 Model Tuning with Resampling Technique -- 12.4.3 Performance Evaluation of Models -- 12.4.4 Best Performing Model -- 12.5 Conclusions -- References -- 13 Rice Disease Detection Based on Image Processing Technique -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 Methodology -- 13.3.1 Working Diagram -- 13.3.2 Dataset Collection -- 13.3.3 Neural Network -- 13.3.4 Building Model -- 13.3.5 Compiling the Model -- 13.3.6 Training and Testing the Model -- 13.4 Result and Outcome -- 13.4.1 Learning Rate -- 13.4.2 Confusion Matrix -- 13.4.3 Classification -- 13.5 Conclusions -- References -- 14 Electromagnetic Radiation from Cell Phones Used in Dhaka City -- 14.1 Introduction -- 14.1.1 Motivation -- 14.1.2 Novelty and Contribution -- 14.2 Materials and Methods -- 14.2.1 Experimental Setup -- 14.3 Results -- 14.3.1 Epidemiological Data from Cell Phones -- 14.3.2 Radiated Power Measurement from Cell Phones -- 14.4 Discussions -- 14.5 Conclusion -- 14.5.1 Limitations -- References -- 15 Expressing Opinions Application: A Case Study at Rajamangala University of Technology, Isan, Khon Kaen Campus -- 15.1 Introduction -- 15.2 Tools and Theories. , 15.2.1 Flutter -- 15.2.2 Spring Framework -- 15.2.3 Java Script Object Notation (JSON) -- 15.2.4 SQL -- 15.3 Procedure -- 15.3.1 The Operation of the System -- 15.3.2 System Design and Development -- 15.4 Login Page -- 15.4.1 Adding Topics and Comments -- 15.4.2 Tools for System Development -- 15.5 Experimental Results -- 15.6 Conclusion -- References -- 16 Toward Clarifying Human Information Processing by Analyzing Big Data: Comparing Response Time to Questionnaires Included Heteronym Word for Problem Solving Between Visually and Auditory Types -- 16.1 Introduction -- 16.2 Problems -- 16.3 Design -- 16.4 Results -- 16.5 Discussion -- 16.6 Conclusion -- References -- 17 Mango Species Detection from Raw Leaves Using Image Processing System -- 17.1 Introduction -- 17.2 Literature Review -- 17.3 Proposed Methodology -- 17.3.1 Primary Steps for Mango Species Detection -- 17.3.2 Image Acquisition -- 17.3.3 Image Pre-processing and Classification -- 17.3.4 Architecture Model -- 17.4 Result -- 17.4.1 Statistical Analysis -- 17.4.2 Accuracy Graph -- 17.4.3 Confusion Matrix -- 17.4.4 Layer Visualization -- 17.4.5 Species Detection -- 17.5 Conclusion -- References -- 18 Frequency Reconfigurable Planner Antennas for Wireless Applications: A Review -- 18.1 Introduction -- 18.1.1 Reconfigurable Antennas -- 18.1.2 Multiple Frequency Reconfigurable Antennas -- 18.2 Ultra-Wide Band Reconfigurable Antennas -- 18.3 Conclusion -- References -- 19 Room Temperature Pt-Modified WO3/p-Si Film Gas Sensor for Detection of Methanol -- 19.1 Introduction -- 19.2 Preparation of Thin Film -- 19.3 Results and Discussions -- 19.4 Conclusions -- References -- 20 Graph Degree Linkage Clustering for Identify Student's Performance on Kompetisi Sains Madrasah in Indonesia -- 20.1 Introduction -- 20.2 Graph Degree Linkage -- 20.2.1 Algorithm Overview -- 20.2.2 Neighborhood Graph. , 20.2.3 Adjacency Measure -- 20.3 Clustering Evaluation: Silhouette -- 20.4 Result and Discussion -- 20.5 Conclusion -- References -- 21 Stepwise Iterative Maximum Likelihood Clustering Based on Kompetisi Sains Madrasah' Scores for Identifying Quality of Junior High School Grading Distribution -- 21.1 Introduction -- 21.2 Stepwise Iterative Maximum Likelihood (SIML) -- 21.3 Silhouette -- 21.4 Results and Discussion -- 21.5 Conclusion -- References -- 22 Detecting the Width of Pap Smear Cytoplasm Image Based on GLCM Feature -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Method -- 22.4 Results and Discussion -- 22.4.1 Result -- 22.4.2 Discussion -- 22.5 Conclusion -- References -- 23 Design of a Novel Wideband Dipole Antenna for mm-Wave Frequencies -- 23.1 Introduction -- 23.2 Antenna Geometry and Design Formulae -- 23.3 Result and Analysis -- 23.4 Conclusion -- References -- 24 Forecasting Sea Surface Temperature in Java Sea Using Generalized Regression Neural Networks -- 24.1 Introduction -- 24.2 Sea Surface Temperature -- 24.3 GRNN -- 24.4 Results and Discussion -- 24.5 Conclusion -- References -- 25 Natural Disaster Predictions of Whirlwinds in Cilacap Region of Central Java Using Adaptive Neighborhood Modified Backpropagation (ANMBP) -- 25.1 Introduction -- 25.2 Principal Component Analysis (PCA) -- 25.3 Adaptive Neighborhood Modified Backpropagation (ANMBP) -- 25.4 Results and Discussion -- 25.4.1 Preprocessing Data -- 25.4.2 Whirlwind Predictions Using ANMBP -- 25.5 Discussion -- 25.6 Conclusion -- References -- 26 Designing Memristor-Based Timing Circuits and Performance Comparison with CMOS Counterparts -- 26.1 Introduction -- 26.2 Memristive Device Modeling -- 26.3 Logic Gates -- 26.3.1 AND and NAND Gate -- 26.3.2 OR and NOR Gate -- 26.4 Multivibrators -- 26.5 Voltage-Controlled Oscillator (VCO) -- 26.6 Conclusions -- References. , 27 Identify Elementary Student Distribution Based on Kompetisi Sains Madrasah Data Using Probabilistic Distance Clustering.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (577 pages)
    Edition: 1st ed.
    ISBN: 9789811948633
    Series Statement: Lecture Notes in Networks and Systems Series ; v.494
    DDC: 006.3
    Language: English
    Note: Intro -- Conference Organization Commitees -- Preface -- Contents -- Editors and Contributors -- A Framework for Early Recognition of Alzheimer's Using Machine Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Model Diagram -- 3.2 CatBoost Classifier -- 3.3 Model Evaluation -- 4 Environmental Setup -- 5 Results and Discussion -- 5.1 Accuracy -- 5.2 Precision -- 5.3 Recall -- 5.4 F1-Score -- 6 Conclusion and Future Direction -- References -- On the Studies and Analyzes of Facial Detection and Recognition Using Machine Learning Algorithms -- 1 Introduction -- 2 Related Study -- 3 Facial Detection and Recognition Methods -- 3.1 Machine Learning Approach -- 3.2 Deep Learning Approach -- 4 Implementation -- 4.1 Face Detection: Haar Cascade Detection Algorithm -- 4.2 Face Recognition: Local Binary Pattern Histogram (LBPH) Algorithm -- 4.3 Detection and Recognition by GoogLeNet -- 5 Results and Discussion -- 5.1 Haar Cascade Face Detection (Machine Learning Approach) -- 5.2 LBPH Face Recognition in Real Time (Machine Learning Approach) -- 5.3 GoogLeNet Image-Based Analysis (Deep Learning Approach) -- 6 Conclusion -- References -- IPL Analysis and Match Prediction -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Processing the Datasets -- 3.2 Match Analysis -- 3.3 Visualization -- 3.4 Match Prediction -- 3.5 User Interface Creation -- 4 Results and Discussion -- 5 Conclusion -- References -- Application of ANN Combined with Machine Learning for Early Recognition of Parkinson's Disease -- 1 Introduction -- 2 Literature Work -- 3 Methodology -- 4 Experimental Setup -- 5 Performance Analysis and Experimentation Results -- 6 Conclusion and Future Work -- References -- People Count from Surveillance Video Using Convolution Neural Net -- 1 Introduction -- 2 Literature Review -- 3 Dataset. , 4 Proposed Methodology -- 5 Results -- 6 Conclusion -- References -- Detection of Pneumonia and COVID-19 from Chest X-Ray Images Using Neural Networks and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 CNN Architectures -- 4 Proposed CNN Model -- 5 Experimentation and Results -- 5.1 Dataset -- 5.2 Experiment Setup -- 5.3 Results -- 5.4 Performance Evaluation -- 6 Conclusion -- References -- Plant Leaf Disease Detection and Classification Using Deep Learning Technique -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System Architecture -- 3.1 Image Acquisition -- 3.2 Image Preprocessing -- 3.3 Feature Extraction Using CNN -- 3.4 Detect and Classify Disease -- 4 Result and Analysis -- 5 Conclusion -- References -- Breast Mass Classification Using Convolutional Neural Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 About Dataset -- 3.2 Architecture of CNN -- 4 Results and Discussion -- 5 Conclusions -- References -- Deep Generative Models Under GAN: Variants, Applications, and Privacy Issues -- 1 Introduction -- 2 Generative Adversarial Networks (GANs) -- 2.1 GAN Architecture -- 2.2 Objective Function -- 3 Existing Models and Applications -- 3.1 GAN Models -- 3.2 Applications -- 4 GANs in Privacy -- 4.1 Privacy in Data -- 4.2 Privacy in Model -- 5 Future Works -- 6 Conclusion -- References -- Fusion-Based Celebrity Profiling Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Evaluation Measure -- 3.3 Stylistic Features -- 3.4 Word Embedding -- 3.5 Method -- 4 Results and Discussion -- 5 Conclusion -- References -- DeepLeaf: Analysis of Plant Leaves Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Feature Extraction -- 3.2 CNN and VGG16 -- 4 Results and Discussion -- 4.1 Comparative Analysis with Respect to Accuracy -- 5 Conclusion. , References -- Potential Assessment of Wind Power Generation Using Machine Learning Algorithms for Southern Region of India -- 1 Introduction -- 2 Wind Power Technology -- 3 Methodology -- 3.1 Linear Regression -- 3.2 Support Vector Regression -- 3.3 K-Nearest Neighbour Algorithm -- 3.4 Decision Trees Regression -- 4 Performance Indices -- 4.1 Mean Absolute Error (MAE) -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 R2 Score -- 5 Results and Discussions -- 6 Conclusions -- References -- OCR-LSTM: An Efficient Number Plate Detection System -- 1 Introduction -- 1.1 Tesseract -- 1.2 Opencv -- 1.3 Lstm -- 2 Literature Review -- 2.1 Problem Statement -- 2.2 Objective -- 3 System Model -- 3.1 Conversion of RGB Image to Gray Scale Image -- 3.2 Bilateral Filter -- 3.3 Lstm -- 4 Results and Discussion -- 5 Conclusions -- References -- Artificial Neural Network Alert Classifier for Construction Equipments Telematics (CET) -- 1 Introduction -- 2 Related Works -- 3 Problem Statement -- 4 System Model -- 4.1 Problem Formulation -- 5 Proposed Design and Methodology -- 6 Results and Discussion -- 6.1 Data Set -- 6.2 Results -- 7 Conclusions -- References -- Hybrid Approach of Modified IWD and Machine Learning Techniques for Android Malware Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed Modified Version of IWD Algorithm -- 3.1 Step 1: The Static Parameters and Dynamic Parameters are Initialized -- 3.2 Step 2: Modified Edge Selection Process -- 3.3 Step 3: Updating Velocity and Soil Values -- 3.4 Step 4: Reinforcement and Termination Phase -- 4 Feature Selection Procedure Using Modified IWD -- 5 Dataset Prepossessing and Experimental Environment -- 5.1 Dataset and Preprocessing -- 5.2 Experimental Environment -- 6 Performance Evaluation Matrix -- 7 Result and Discussions -- 8 Conclusion and Future Work -- References. , Intuitionistic Fuzzy 9 Intersection Matrix for Obtaining the Relationship Between Indeterminate Objects -- 1 Introduction -- 2 Preliminary Concepts -- 2.1 Intuitionistic Fuzzy Set -- 2.2 Intuitionistic Fuzzy Topological Spaces -- 2.3 Related Studies -- 3 Intuitionistic Fuzzy 9 Intersection Matrix -- 4 Application of the Proposed Definitions -- 4.1 Importance of the Proposed Definition -- 4.2 Intuitionistic Fuzzy 9 Intersection Matrix -- 5 Conclusion and Future Work -- References -- A Hybrid Model of Latent Semantic Analysis with Graph-Based Text Summarization on Telugu Text -- 1 Introduction -- 2 Related Work -- 3 Latent Semantic Analysis -- 4 Text Rank Algorithm -- 5 Proposed Algorithm -- 6 Evaluation and Experimental Results -- 7 Conclusion -- References -- A Combined Approach of Steganography and Cryptography with Generative Adversarial Networks: Survey -- 1 Introduction -- 2 Background Works -- 3 Advanced Techniques -- 4 Fallouts and Discussion -- 5 Conclusion -- References -- Real-Time Accident Detection and Intimation System Using Deep Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 4 Results and Discussion -- 5 Conclusion -- References -- Design of Cu-Doped SnO2 Thick-Film Gas Sensor for Methanol Using ANN Technique -- 1 Introduction -- 2 Proposed Experiment -- 3 Result and Discussion -- 4 Conclusion -- References -- Detect Traffic Lane Image Using Geospatial LiDAR Data Point Clouds with Machine Learning Analysis -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Land-Usage/Land-Coverage Change Analysis -- 4 Interpretation Concept -- 5 Conclusion and Future Scope -- References -- Classification of High-Dimensionality Data Using Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Techniques -- 3.1 Naive Bayes Algorithm -- 3.2 Support Vector Machine (SVM). , 3.3 K-Nearest Neighbor (KNN) Algorithm -- 3.4 Principal Component Analysis (PCA) -- 4 Proposed Model -- 5 Performance Evaluation Metrics -- 6 Result Analysis -- 7 Conclusion -- References -- To Detect Plant Disease Identification on Leaf Using Machine Learning Algorithms -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Dataset and Attributes -- 5 Application of the Outcomes -- 6 Result Analysis -- 7 Conclusion -- References -- Association and Correlation Analysis for Predicting the Anomaly in the Stock Market -- 1 Introduction -- 2 Related Work -- 3 Data Preparation -- 4 Methodology -- 4.1 Data Mining Association Rule -- 5 Results and Discussion -- 6 Conclusion -- References -- Early Identification of Diabetic Retinopathy Using Deep Learning Techniques -- 1 Introduction -- 1.1 Types of Diabetic Retinopathy -- 2 Literature Review -- 3 Methodology -- 4 Experimentation Setup -- 5 Dataset -- 6 Image Processing -- 6.1 Input Fundus Images -- 6.2 Gray Fundus Images -- 6.3 Gaussian Blur -- 7 Convolution Neural Network Models -- 7.1 Training Using ResNet50 and VGG16 -- 8 Result -- 8.1 Result of ResNet50 -- 8.2 Result of VGG16 -- 8.3 Comparison of Results -- 9 Conclusion -- 10 Future Work -- 11 Competing Interest -- References -- Performance Evaluation of MLP and CNN Models for Flood Prediction -- 1 Introduction -- 2 Study Area -- 3 Methodology -- 3.1 Mlp -- 3.2 CNN -- 3.3 Evaluating Constraint -- 4 Results and Discussions -- 5 Conclusion -- References -- Bidirectional LSTM-Based Sentiment Analysis of Context-Sensitive Lexicon for Imbalanced Text -- 1 Introduction -- 2 Related Work -- 2.1 Classification of Sentiments -- 2.2 Techniques of Supervised Learning -- 2.3 Techniques with No Supervision -- 2.4 Techniques for Semi-Supervised Learning -- 2.5 Ensemble Techniques -- 3 Proposed Methodology -- 3.1 Bidirectional Long Short-Term Memory (BLSTM). , 3.2 Calculating Sentiment Scores.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Keywords: Coding and Information Theory. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (612 pages)
    Edition: 1st ed.
    ISBN: 9783030690663
    Series Statement: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series ; v.356
    DDC: 621.382
    Language: English
    Note: Intro -- Preface -- Conference Organization -- Contents -- Deep Learning/Machine Learning on Information and Signal Processing -- Cell Detection and Counting Method Based on Connected Domain of Binary Image -- Abstract -- 1 Introduction -- 2 Cell Image Preprocessing -- 2.1 Gray -- 2.2 USM Sharpening Processing -- 3 Cell Segmentation -- 3.1 Binarization -- 3.2 Morphological Treatment -- 4 Cell Counting -- 5 Experimental Results and Analysis -- 6 Conclusions -- References -- 2D DOA Estimation Based on Modified Compressed Sensing Algorithm -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 2D Multitasking CS Algorithm Based on SVD -- 3.1 2D Off-Grid Algorithm Based on Taylor Expansion -- 3.2 OMP Reconstruction Method Based on SVD -- 3.3 Multi-task Processing -- 4 Performance Study -- 5 Concluding Remarks -- References -- Perceptual Quality Enhancement with Multi-scale Deep Learning for Video Transmission: A QoE Perspective -- 1 Introduction -- 2 Related Work -- 3 Perceptual Quality Enhancement Model -- 3.1 Network Architecture -- 3.2 Perceptual Quality Optimization -- 3.3 Multi-scale Deep Learning Model -- 4 Experiments -- 4.1 Settings -- 4.2 Performance of the Proposed Approach -- 4.3 Ablation Study -- 5 Conclusions -- References -- Indoor Map Construction Method Based on Geomagnetic Signals and Smartphones -- Abstract -- 1 Introduction -- 2 Related Work -- 3 IMC-GSS Algorithm -- 3.1 Pedestrian Track Atomization -- 3.2 Hierarchical Clustering -- 3.3 Multi-track Fusion -- 3.4 Map Construction Based on Graphic Extension Algorithm -- 4 Simulation and Results Analysis -- 4.1 Experimental Setup -- 4.2 Evaluation of Performance -- 5 Conclusion -- References -- An Improved Generation Method of Adversarial Example to Deceive NLP Deep Learning Classifiers -- Abstract -- 1 Introduction. , 2 Performance and Problem Analysis of DeepWordBug Adversarial Example Generation Algorithm -- 2.1 Introduction of DeepWordBug -- 2.2 Performance of DeepWordBug -- 2.3 Problem Analysis -- 3 Improvement Strategy -- 3.1 Improvement of DeepWordBug -- 3.2 Further Improvement -- 4 Conclusion -- Acknowledgements -- References -- Encryption Analysis of Different Measurement Matrices Based on Compressed Sensing -- Abstract -- 1 Introduction -- 2 Theoretical Basis -- 2.1 Compressed Sensing Model -- 2.2 Chaotic Mapping -- 2.3 Measurement Matrix -- 3 Encryption Scheme -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- Indoor Visual Positioning Based on Image Retrieval in Dense Connected Convolutional Network -- Abstract -- 1 Introduction -- 2 System Description -- 2.1 Resnet Structure -- 2.2 DenseNet Network Structure -- 3 Experimental Results -- 3.1 Dataset Preparation -- 3.2 Feature Extraction -- 3.3 Performance Analysis -- 4 Conclusion -- References -- Coin Recognition Based on Physical Detection and Template Matching -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 Equipment Selection in the Imaging System -- 2.2 Coin Classification System (Image Processing System) -- 2.3 Template Matching -- 3 Results -- 4 Conclusion -- Acknowledgement -- References -- Generative Adversarial Network for Generating Time-Frequency Images -- Abstract -- 1 Introduction -- 2 Time-Frequency Analysis Generates Time-Frequency Images -- 3 Generative Adversarial Network Secondary Generation Time-Frequency Image -- 4 Validity Test Using Singular Values -- 5 Experiment and Analysis -- 6 Conclusion -- Acknowledgment -- References -- Research on Weak Signal Detection Method Based on Duffing Oscillator in Narrowband Noise -- Abstract -- 1 Introduction -- 2 Related Research Work -- 3 Duffing Oscillator Weak Signal Detection Theory. , 3.1 Basic Theory of Duffing Oscillator -- 3.2 Using Duffing Oscillator to Detect Communication Signals -- 4 Weak Signal Frequency Detection Method Under Narrowband Noise -- 5 Conclusion -- References -- AI in Ubiquitous Mobile Wireless Communications -- Research on an Intelligent Routing Strategy for Industrial Internet of Things -- Abstract -- 1 Introduction -- 2 Research Background -- 3 Industrial IoT Model -- 3.1 Model Structure Analysis -- 3.2 Quality Analysis of Node Communication Link -- 4 Research on Intelligent Routing Strategy -- 4.1 Routing Metric EEM -- 4.2 Optimization Strategy -- 5 Experimental Simulation -- 5.1 Simulation Environment -- 6 Conclusion -- References -- Joint Equalization and Raptor Decoding for Underwater Acoustic Communication -- Abstract -- 1 Introduction -- 2 System Model -- 2.1 LDPC Encoding -- 2.2 LT Encoding -- 3 Joint Equalization and Raptor Decoding -- 4 Simulation Results and Discussion -- 5 Conclusions -- Acknowledgments -- References -- Design of Wireless Communication System for CNC Machine Tools -- Abstract -- 1 Introduction -- 2 Design of Wireless Control System Based on ZigBee Star Network -- 2.1 Brief Introduction of ZigBee -- 2.2 Design Scheme -- 3 Hardware System Design for CNC Machine -- 3.1 System Design -- 3.2 Hardware Selection -- 3.3 Uboot Startup Program -- 3.4 Operating System -- 3.5 Linux Kernel Tailoring and System Porting -- 3.6 Wireless Network Card Driver Transplantation and Configuration -- 3.7 Writing Application Software -- References -- Energy Efficiency Optimization for Subcarrier Allocation-Based SWIPT in OFDM Communications -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Optimal Solution -- 3.1 Optimizing p with Fixed G -- 3.2 Obtaining the Optimal G -- 4 Simulations Result -- 5 Conclusions -- References. , Comparative Analysis of Communication Links Between Earth-Moon and Earth-Mars -- Abstract -- 1 Introduction -- 2 Similarities and Differences in the Communication Environment Between Earth-Moon and Earth-Mars -- 3 Analysis and Simulation of Mars Channel Fading Characteristics -- 3.1 Atmospheric Loss in the Mars Channel -- 3.2 Sandstorm Loss in the Mars Channel -- 4 The Characteristics of Radio Wave Transmission on the Surface of Moon and Mars -- 5 Conclusion -- References -- Compact Miniature MIMO Array Antenna Towards Millimeter Wave -- Abstract -- 1 Introduction -- 2 77 GHz Microstrip Feed Patch MIMO Antenna -- 2.1 The Structure of MIMO Antenna -- 2.2 Design of MIMO Antenna -- 3 77 GHz Series-Fed MIMO Antenna for Chebyshev Distribution -- 3.1 The Structure of MIMO Antenna -- 3.2 Design of MIMO Antenna -- 4 Conclusion -- Acknowledgement -- References -- Adaptive Technologies of Hybrid Carrier Based on WFRFT Facing Coverage and Spectral Efficiency Balance -- Abstract -- 1 Introduction -- 2 HC System Based on WFRFT -- 2.1 HC Communication System -- 2.2 The Structure Diagrams of Transmitter and Receiver -- 3 The Relationships Between Coverage and Spectral Efficiency in the Flat Fading Channel -- 3.1 PAPR and MATP -- 3.2 The Relationships Between Coverage and Spectral Efficiency -- 4 Switching Strategy of Carrier Schemes and MCSs Under Power Control in the Frequency-Selective Fading Channel -- 4.1 Power Control -- 4.2 BLER Performances of Different Carrier Schemes and MCSs -- 4.3 Switching Strategy of Carrier Schemes and MCSs Under Power Control -- 5 Conclusion -- Acknowledgement -- References -- Towards Knowledge-Driven Mobility Support -- 1 Introduction -- 2 Background -- 2.1 IP and NDN Architecture -- 2.2 The Mobility Support Problem and Solution Space -- 3 Cross-architectural Host Dimension Approaches -- 3.1 Proxy-Based Approach (Proxy). , 3.2 Resolution-Based Approach (Resolution) -- 3.3 Routing-Based Approach (Routing) -- 3.4 Trace-Based Approach (Trace) -- 4 The Knowledge Dimension of Mobility Support -- 4.1 Topology-Driven Intermediate Placement (TIP) -- 4.2 Trajectory-Driven Reachability Update (TRU) -- 4.3 Architectural Requirements of Supporting the Knowledge Dimension -- 5 A Quantitative Cross-architectural Mobility Support Performance Evaluation Framework -- 5.1 Basic Models -- 5.2 Metric Definition and Calculation -- 5.3 Compound Scenario - Upload -- 6 Evaluation -- 6.1 Network Topology Settings -- 6.2 Movement Pattern Settings -- 6.3 Results -- 6.4 The Effectiveness of KD Approaches -- 7 Related Work -- 8 Concluding Remarks -- References -- An Efficient Energy Efficiency Power Allocation Algorithm for Space-Terrestrial Satellite NOMA Networks -- 1 Introduction -- 2 System Model and Problem Formulation Scheme -- 2.1 System Model -- 2.2 Problem Formulation Scheme -- 3 Stacklberg Game Formulation and Energy Efficiency Optimization -- 3.1 Stacklberg Game -- 3.2 Problem Optimization -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- Research and Equilibrium Optimization of AODV Routing Protocol in Ad Hoc Network -- Abstract -- 1 Introduction -- 2 AODV Protocol and Working Principle -- 2.1 The Advantages and Inadequate of AODV Protocol -- 2.2 The Working Process of AODV Protocol -- 3 Optimization of AODV Routing Protocol -- 3.1 Optimization of Routing Discovery Process -- 3.2 Optimization of Route Maintenance -- 4 Simulation Analysis -- 5 Conclusions -- References -- AI in UAV-Assisted Wireless Communications -- Optimization of OLSR Protocol in UAV Network -- Abstract -- 1 Introduction -- 2 MPRs Selection Algorithm -- 3 Optimization of HELLO Message and TC Packet Transmission -- 3.1 Optimization of HELLO Message Sending Interval. , 3.2 Adaptive Optimization of TC Grouping.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    San Diego :Elsevier Science & Technology,
    Keywords: Fractional calculus. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (352 pages)
    Edition: 1st ed.
    ISBN: 9780323886161
    DDC: 511.352
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (774 pages)
    Edition: 1st ed.
    ISBN: 9789811619410
    Series Statement: Lecture Notes in Networks and Systems Series ; v.215
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Implementation of Healthcare System Using Android Application Storing Health Records in Cloud -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Healthcare Using IoT -- 1.3 Security in Healthcare System -- 2 Existing System -- 2.1 Disadvantages -- 3 Proposed System -- 3.1 Advantages -- 4 Doctor Application -- 4.1 Doctor Registration Page -- 4.2 Second Page -- 4.3 Patient Application -- 5 Conclusion -- References -- Threshold and Segmentation-Based X-ray Imaging Analysis for Covid-19 Detection -- 1 Introduction -- 2 Image Enhancement -- 3 Segmentation of Lungs from X-ray -- 4 Conclusion -- References -- Feature-Based Squids Classification Using Fuzzy Logic -- 1 Introduction -- 2 Image Acquisition -- 3 Fuzzy Rule-Based System -- 4 Result Analysis -- 5 Conclusion -- References -- In Silico Platforms for Systems Toxicology -- 1 Introduction -- 2 Mechanisms of Toxicity -- 3 Systems or Predictive Toxicology -- 3.1 The Phenomenon of Systems/Predictive Toxicology -- 3.2 Molecular-Level Assessment of Adverse Effects -- 4 Computational Platforms for Systems Toxicology -- 4.1 CADD -- 4.2 CRDD -- 4.3 Current Computational Toxicological Works -- 5 Limitations -- 6 Conclusion -- References -- Comparative Analysis on Factors Affecting Accuracy of Seizure Detection Using EEG Signal Processing -- 1 Introduction -- 2 Review of EEG Datasets Available -- 2.1 CHB-MIT Dataset [1] -- 2.2 Dataset of Bonn University, Germany [2, 3] -- 2.3 Freiburg Hospital -- 2.4 Temple University Dataset -- 2.5 Karunya University [5] -- 2.6 EPILEPSIAE -- 3 Seizure Detection Features: Various Domains -- 3.1 Features in Time Domain -- 3.2 Features in Frequency Domain: Comparison -- 3.3 Time-Frequency Features -- 3.4 Statistical Features -- 4 Classification Techniques -- 5 Conclusion -- References. , Identification of Coronavirus (COVID-19) Long Non-coding RNAs (lncRNAs) Using Machine and Deep Learning Approaches -- 1 Introduction -- 2 About Long Non-coding RNA -- 2.1 COVID-19-Associated lncRNAs Analysis -- 3 The Analysis of lncRNA-Associated Diseases Using Machine and Deep Learning Approaches -- 4 The COVID-19-Associated lncRNAs Identification Using Machine and Deep Learning Approaches -- 5 Conclusion -- References -- Predictive Analysis of Damage Occurred Due to Natural Disasters Using Whale-Optimization Algorithm-Based Hybrid Computation -- 1 Introduction -- 2 Materials and Methods -- 2.1 Whale Optimization Algorithm (WOA) -- 2.2 Selection of Mathematical Model for Searching Path -- 2.3 Dataset -- 3 Modified Whale Optimization Algorithm (MWOA) -- 4 Proposed Hybrid Prediction Model (MWOA-MLP) -- 5 Results and Analysis -- 6 Conclusion -- References -- Remote Access for Advanced Mobile Communication Systems -- 1 Introduction -- 1.1 General -- 1.2 Objective and Scope of Work -- 2 Global Systems for Mobile Communications -- 2.1 GSM Network Architecture -- 2.2 Basics of Network Performance and Optimization -- 3 Operation Support Subsystem -- 3.1 Network Management System -- 3.2 Network Management Architecture -- 3.3 Network Planning -- 3.4 RBS Operation and Maintenance -- 3.5 OMCR Functions -- 4 Radio Base Station Hardware Unit -- 4.1 RBS Functions -- 4.2 RBS Implementation -- 5 Remote Access Tool -- 5.1 General -- 5.2 Designers -- 5.3 Microsoft Visual C# -- 5.4 Installation -- 6 Conclusion -- References -- A Statistical Study on Coronary Artery Disease Using Discriminant Analysis -- 1 Introduction to Heart Disease -- 2 Overview -- 3 Methodology -- 3.1 Data Collection -- 3.2 About the Software -- 3.3 Uses and Advantages -- 4 Empirical Work -- 5 Conclusion -- References. , A Study to Assess the Knowledge and Opinion of Mid-Level Health Providers of Chittoor District Regarding m-Health -- 1 Introduction -- 2 Need for the Study -- 3 Objectives: To Assess -- 4 Review of Literature -- 5 Study Methodology -- 6 Data Analysis -- 7 Discussion and Conclusion -- References -- Machine Learning Techniques for Identifying Diabetes and Its Complications Based on Long Non-coding RNAs -- 1 Introduction -- 2 Diabetes Mellitus -- 2.1 Types of Diabetes -- 3 lncRNA -- 3.1 lncRNAs Classifications and Functions -- 3.2 lncRNAs in Diabetes Complications -- 3.3 Future of lncRNAs in Diabetic Complications -- 4 Machine Learning -- 4.1 Machine Learning Categories -- 4.2 Literature Review -- 4.3 LncRNA Identification Tools by Machine Learning Algorithms -- 5 Conclusions -- References -- Computational Method on Breast Cancer Survival Data Using Binary Classification Models -- 1 Introduction -- 2 Data Collection -- 3 About Software -- 4 Statistical Tools Used Under Study -- 4.1 Logistic Regression -- 4.2 Logistic Regression in SPSS -- 4.3 Decision Tree Analysis Method -- 4.4 Decision Tree in SPSS -- 5 Experimental Results -- 5.1 Logistic Regression -- 5.2 Decision Tree Output -- 6 Conclusion -- References -- Percentage Nucleotide Concentration and Classification of SARS-Corona Viruses -- 1 Introduction -- 2 Data Used for Analysis -- 2.1 Severe Acute Respiratory Syndrome Corona Virus 2 2019-nCoVPHnCOV20026 N Gene for Nucleocapsid Phosphoprotein, Partial Cds -- 2.2 Wuhan Seafood Market Pneumonia Virus Genome Assembly, Chromosome: WholeGenome -- 3 Percentage Nucleotide Concentration -- 3.1 Some Important Observations from pA, pT, pG and pC -- 4 Changes in Percentage Nucleotide Concentration -- 5 Conclusions -- References -- The Role of Law and Regulation on the Intersection of Bioprospecting and Bio Piracy -- 1 Introduction. , 2 Colonial Origins of Bio Piracy -- 3 Indigenous Methods and Bioprospecting -- 4 Regulation of Bioprospecting -- 5 Global and National Efforts to Combat Bio Piracy -- 6 Conclusion -- References -- Robust Face Recognition Using Multi-scale Feature Pattern Sparse Representation with Extreme Learning Machine -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Multi-scale Feature Pattern-Based ELM -- 4 Experimental Results and Analysis -- 4.1 Data Set Description -- 4.2 Result Analysis -- 5 Conclusions -- References -- A Review of Diabetic Retinopathy Screening Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Research Challenges -- 2.2 Performance Evaluation Metrics -- 3 Generalized System Architecture -- 3.1 Image Acquisition -- 3.2 Preprocessing -- 3.3 Segmentation -- 3.4 Feature Extraction -- 3.5 Feature Selection -- 3.6 Classification -- 4 Conclusion -- References -- A Novel Framework for Modeling Medical-Sensitive Big Data Using Document-Based Database -- 1 Introduction -- 2 Literature Review -- 3 Modeling Medical-Sensitive Big Data -- 4 Conclusion -- References -- Studies on Effect of Leaf Roller (Diaphania pulverulentalis) Infestation on the Mineral Composition of Mulberry (Morus Sp.) Varieties -- 1 Introduction -- 2 Materials and Methodology -- 2.1 Estimation of Nitrogen in Mulberry Leaves -- 2.2 Estimation of Phosphorous in Mulberry Leaves -- 2.3 Estimation of Potassium in Mulberry Leaves -- 3 Results and Discussion -- 3.1 Macronutrients -- 3.2 Micronutrients -- 4 Conclusion -- References -- Performance Comparison of Semantic Web Data Using Virtual and Cloud Services -- 1 Introduction -- 2 Overview of Map-Reduce -- 3 Literature Survey -- 3.1 Node Management -- 4 Experimental Work -- 4.1 Virtual Node Management -- 4.2 Cloud Node Management -- 5 Conclusion -- References. , Analysis of Bio Vanillin Production from Waste Material by HPTLC -- 1 Introduction -- 2 Materials and Methods -- 2.1 Collection and Milling of Raw Materials -- 2.2 Extraction of Ferulic Acid from Wheat Bran [5] -- 2.3 Ferulic Acid Was Extracted from Wheat Bran by Solvent Method -- 2.4 Bioconversion of Ferulic Acid to Vanillin [6] -- 2.5 Separation of Vanillin from Fermentation Medium -- 2.6 High-Performance Thin Layer Chromatography Analysis [7] -- 3 Results -- 3.1 Collection of Raw Materials -- 3.2 Extraction of Ferulic Acid from Wheat Bran -- 3.3 Ferulic Acid Was Extracted from Wheat Bran by Solvent Method -- 3.4 Bioconversion of Ferulic Acid into Vanillin -- 3.5 Biotransformation of Ferulic Acid by Positive Strain -- 3.6 High-Performance Thin Layer Chromatography Analysis -- 3.7 System Suitability -- 3.8 Linearity -- 3.9 Detection and Limit of Quantification -- 3.10 Accuracy and Precision -- 3.11 Roughness and Toughness -- 4 Results and Discussion -- 5 Conclusion -- References -- Phytochemical Studies and In Vitro Biological Activity of Citrus and Pomegranate Peel Extracts -- 1 Introduction -- 2 Materials and Methods -- 2.1 Collection of Orange Peels and Pomegranate Peels -- 2.2 Preparation of Extracts -- 2.3 Phytochemical Screening -- 2.4 Fourier Transform Infrared Spectrometer (FT-IR) -- 2.5 Antioxidant Activity -- 2.6 Anti-inflammatory Activity -- 3 Results -- 3.1 Phytochemical Studies -- 3.2 FTIR Analysis -- 3.3 Anti-inflammatory Activity -- 4 Discussion -- 5 Conclusion -- References -- Present and Future Prospectives of Microbial Fibrinolytic Enzyme Production and Its Applications -- 1 Introduction -- 2 Types of Cardiovascular Diseases -- 2.1 Mechanism of Fibrinolytic Enzyme -- 2.2 Applications of Fibrinolytic Enzyme -- 2.3 Fibrinolytic Agents -- 2.4 Demerits of Anticoagulants -- 3 Origin of Fibrinolytic Enzymes. , 3.1 Recent Status in Fibrinolytic-Producing Microorganisms.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Computational intelligence-Congresses. ; Evolutionary computation-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (780 pages)
    Edition: 1st ed.
    ISBN: 9789811557880
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1176
    DDC: 006.3
    Language: English
    Note: Intro -- Organization -- Chief Patrons -- Patrons -- Organizing Chairs -- Publicity Chairs -- Advisory Committee -- Technical Program Committee -- Preface -- Contents -- About the Editors -- Faster Result Retrieval from Health Care Product Sales Data Warehouse Using Materialized Queries -- 1 Introduction -- 2 Implementation of MQDB for Bioteknika Healthcare Pvt. Ltd -- 3 Experimental Results -- 4 Conclusion -- References -- Sense Scheduling for Robotics Cognitive Intelligence -- 1 Introduction -- 2 Related Work -- 3 Human Though Process Test -- 4 Proposed System Architecture -- 5 Proposed Methodology -- 6 Result and Discussion -- 7 Conclusion -- 8 Conclusion -- References -- Feature Selection Using Ant Colony Optimization and Weighted Visibility Graph -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Work and Experiment -- 3.1 Feature Extraction -- 3.2 Feature Selection -- 4 Performance Analysis -- 4.1 Precision, Recall, Specificity, and F1-Score -- 4.2 Accuracy -- 4.3 False Positive Rate(FPR) and False Negative Rate(FNR) -- 5 Conclusion -- References -- From Generic to Custom: A Survey on Role of Machine Learning in Pharmacogenomics, Its Applications and Challenges -- 1 Introduction -- 2 Genomics -- 2.1 Understanding the Disease -- 2.2 Challenges -- 2.3 Data Sharing -- 3 Pharmacogenomics -- 4 Machine Learning in Pharmacogenomics -- 4.1 Genome-Wide Association Study (GWAS) -- 4.2 Evolutionary Conservation -- 4.3 Applications of Genomics in Diabetes -- 5 Conclusion -- References -- Personalised Structure Balance Theory-Based Movie Recommendation System -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Pre-processing Module -- 3.2 Product-Based Recommendation Module -- 3.3 User-Based Recommendation Module -- 3.4 Prediction Module -- 4 Results -- 5 Conclusion -- References. , Machine Learning Techniques for the Investigation of Phishing Websites -- 1 Introduction -- 2 Literature Review -- 3 Materials and Method -- 3.1 Dataset -- 3.2 Data Preparation and Preprocessing -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Feature Extraction and Classification of Gestures from Myo-Electric Data Using a Neural Network Classifier -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Data Segmentation -- 3.3 Feature Extraction and Classification -- 4 Discussion and Results -- 5 Conclusion -- References -- Text-Convolutional Neural Networks for Fake News Detection in Tweets -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Preprocessing -- 3.2 Embedding Matrix -- 3.3 Classification -- 4 Experiments -- 4.1 Dataset -- 4.2 Feature Extraction -- 5 Results and Discussion -- 6 Conclusion -- References -- Effect of Soil and Climatic Attribute on Greenhouse Gas Emission from Agriculture Sector -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Database Creation -- 3.3 Data Preprocessing -- 3.4 Feature Extraction -- 3.5 Analysis of Features -- 3.6 Prediction Model -- 4 Result Analysis -- 4.1 Crop-Wise GHGs Emission -- 4.2 Season-Wise GHGs Emission -- 4.3 Most Influencing Parameter for Prediction of GHGs Emission -- 4.4 Using Deep Learning Approach -- 5 Conclusion -- References -- Optimal Image Feature Ranking and Fusion for Visual Question Answering -- 1 Introduction -- 2 Related Work -- 2.1 Visual Question Answering -- 2.2 Image Feature Extraction -- 3 Ranking and Feature Fusion (RFF) Framework -- 3.1 Overall Architecture -- 3.2 Feature Ranking -- 3.3 Feature Fusion -- 4 Results and Discussions -- 5 Conclusion -- References -- An Investigation on Indoor Navigation Systems -- 1 Introduction. , 2 Path Selection Taxonomy -- 2.1 Uninformed Search Algorithm -- 2.2 Informed Search Algorithm -- 3 Object or Obstacle Detection Taxonomy -- 3.1 CNN Algorithm -- 3.2 RCNN Algorithm -- 3.3 Fast RCNN Algorithm -- 3.4 Faster RCNN Algorithm -- 3.5 YOLO -- 4 Conclusion -- References -- Conceptualization and Design of Remotely-Accessible Hardware Interface (RAHI) Laboratory -- 1 Introduction -- 1.1 Background and Problem Identification -- 1.2 Literature Review and Proposed Solution -- 2 Technical Description -- 2.1 Server -- 2.2 Raspberry Pi and Hardware -- 2.3 Web Application -- 3 Discussion -- 3.1 Testing -- 3.2 Analysis -- 4 Future Scope -- 5 Conclusion -- References -- A Non-invasive approach for Driver Drowsiness Detection using Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Disaster Severity Analysis from Micro-Blog Texts Using Deep-NN -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Input Layer -- 3.2 Convolution Layer -- 3.3 Max-Pooling Layer -- 3.4 RNN Layer -- 3.5 Fully Connected Layer -- 4 Experimental Setup -- 4.1 Preparation of Datasets -- 4.2 Word-Embeddings -- 4.3 Network Training -- 5 Results and Discussion -- 6 Conclusion -- References -- WEKA Result Reader-A Smart Tool for Reading and Summarizing WEKA Simulator Files -- 1 Introduction -- 2 The WEKA Result Reader (WRR) -- 3 Performance Evaluation -- 3.1 Application-Level Testing of WRR Tools -- 3.2 System-Level Testing of WRR Tools -- 4 Conclusion -- References -- Predicting Reliability of Web Services Using Hidden Markov Model -- 1 Introduction -- 2 Models of NHPP -- 3 Hidden Markov Model for Reliability Model -- 3.1 Modeling the Failure Process with HMM -- 3.2 Parameter Estimation -- 3.3 Restoration of Hidden States. , 3.4 Bayesian Information Criterion (BIC) -- 4 Experiments -- 5 Conclusion -- References -- Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels -- 1 Introduction -- 2 Recursive Visual Cryptography Scheme -- 2.1 The RVCS Model -- 2.2 Working Example of RVCS -- 3 The Proposed Model: Size-Invariant RVCS with PRWP -- 3.1 Experimental Results -- 3.2 Analysis of Experimental Results -- 4 Conclusion -- References -- Performance Analysis of Brain Imaging Using Enriched CGLS and MRNSD in Microwave Tomography -- 1 Introduction -- 1.1 Related Works -- 2 Formulation of the Proposed Forward Process -- 3 Importance of Enriched CGLS and MRNSD Regularization Methods -- 4 Numerical Results and Discussion -- 4.1 Simulation Setup and Dataset -- 4.2 Performance Analysis on Varying Number of Antennas and Frequencies -- 4.3 Performance Analysis on Noise Distortion -- 5 Conclusion -- References -- Analysis and Identification of EEG Features for Mental Stress -- 1 Introduction -- 2 Methodology -- 2.1 Brief Procedure -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 3 Results -- 4 Discussion -- 5 Conclusion -- 6 Future Work -- References -- Blockchain-Based Grievance Management System -- 1 Introduction -- 2 Benefits Over Current System -- 3 Approach -- 3.1 Working -- 3.2 System Architecture -- 3.3 Mathematical Model -- 4 Implementation -- 5 Conclusion -- References -- Utility of Neural Embeddings in Semantic Similarity of Text Data -- 1 Introduction -- 2 Neural Embedding Techniques -- 3 Methodology -- 4 Data Management -- 5 Experimental Results -- 5.1 Similarity Score Distribution -- 5.2 D-Prime -- 6 Conclusion -- References -- Big Data and Machine Learning Analytics to Detect Epileptic Seizures with Minimum Delay Using Random Window Optimization -- 1 Introduction -- 2 Big Datasets and Machine Learning. , 3 Epileptic Seizure Detection -- 4 Related Work -- 5 Methods -- 5.1 Support Vector Machine -- 5.2 Artificial Neural Network -- 6 Methodology -- 6.1 Top-K Amplitude Measure -- 6.2 Multiwindow Measure -- 6.3 Workflow -- 7 Results and Discussion -- 8 Conclusion -- References -- An Efficient Evaluation of Spatial Search on Road Networks Using G-Tree -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 G-Tree Indexing for Finding SPSP Based on Distance -- 4 Experimental Evaluation and Results -- 5 Conclusion -- References -- Investigation into the Efficacy of Various Machine Learning Techniques for Mitigation in Credit Card Fraud Detection -- 1 Introduction -- 2 Related Works -- 2.1 Machine Learning Algorithms -- 3 Proposed Methodology -- 4 Experimental Study -- 4.1 Credit Card Dataset -- 4.2 Design of Experiments -- 4.3 Performance Evaluation Measures -- 5 Results and Discussions -- 6 Conclusion and Future Work -- References -- Temporal Modeling of On-Street Parking Data for Detection of Parking Violation in Smart Cities -- 1 Introduction -- 2 Related Work -- 3 Data Collection and Preliminary Analysis -- 4 Problem Formulation -- 5 Proposed Approach -- 5.1 Proposed Detection Model -- 5.2 Proposed Algorithm -- 6 Simulation Results and Analysis -- 7 Conclusion and Future Work -- References -- Performance Optimization of Big Data Applications Using Parameter Tuning of Data Platform Features Through Feature Selection Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experiments and Results -- 5 Conclusion -- References -- Development of Emotional Decision-Making Model Using EEG Signals -- 1 Introduction -- 2 Methodology -- 2.1 Design of Experiment -- 3 Decision-Making Model -- 4 Conclusion -- References -- HMM Classifier Object Recognizing System in Brain-Computer Interface -- 1 Introduction -- 2 State of Art Development. , 3 Background.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...