GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (909 pages)
    Edition: 1st ed.
    ISBN: 9789811923470
    Series Statement: Lecture Notes on Data Engineering and Communications Technologies Series ; v.132
    DDC: 006.3
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (786 pages)
    Edition: 1st ed.
    ISBN: 9789813340879
    Series Statement: Algorithms for Intelligent Systems Series
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- 1 Probabilistic Machine Learning Using Social Network Analysis -- 1 Introduction -- 2 Related Works -- 3 Link Probability Model -- 4 Classification of Nominal Nodes -- 5 The Outlook of Likelihood Features -- 6 Maximum Likelihood Training -- 7 Result and Discussion -- 8 Conclusion and Future Work -- References -- 2 Prioritization of Disaster Recovery Aspects Implementing DEMATEL Technique -- 1 Introduction -- 2 Methodology Adopted -- 2.1 Business Continuity and Disaster Recovery -- 2.2 DEMATEL Technique -- 3 Prioritization of Attributes -- 4 Observations -- 5 Conclusion -- References -- 3 A Study on Machine Learning-Based Predictive Modelling for Pick Profiling at Distribution Centers -- 1 Introduction -- 1.1 Customer Segmentation -- 1.2 Distribution Center Handling Types (Pick Profile) -- 2 Solution -- 2.1 Modelling Specifics and Suggested Framework -- 2.2 Evidence the Solution Works -- 3 Current Scenario -- 4 Next Steps -- References -- 4 Analysis of Computational Intelligence Techniques in Smart Cities -- 1 Introduction -- 1.1 What is Computational Intelligence? -- 1.2 Computational Intelligence Techniques -- 1.3 What Are Smart Cities? -- 1.4 Technology Used in Smart Cities -- 1.5 What Are the Advantages and Disadvantages of These Technologies? -- 2 Literature Review -- 2.1 Smart Cities -- 2.2 How Secure Are Smart City Technologies? -- 2.3 Data in Smart City [11] -- 2.4 Collection of Data -- 2.5 Importance of Analyzing the Data Collected [13] -- 2.6 Challenges in Analyzing Big Data [14] -- 2.7 Use of CI Techniques in Smart Cities -- 2.8 Applications of CI and Big Data in Smart Cities -- 3 Comparative Analysis of CI Techniques in Smart Cities -- 4 Summary and Conclusion -- References -- 5 Proposed End-to-End Automated E-Voting Through Blockchain Technology to Increase Voter's Turnout. , 1 Introduction -- 2 Literature Survey -- 3 Background Knowledge of Cryptography and Blockchain -- 3.1 Cryptography -- 3.2 Blockchain -- 4 Proposed Methodology -- 4.1 Voter Registration Through EC's Portal -- 4.2 Exchange of Data Using Public Private Key Cryptography -- 4.3 Display of Voter List -- 4.4 Creation of Blocks -- 4.5 Chaining and Sealing the Blocks -- 4.6 Voting Result Display -- 5 Analysis and Metrics Evaluation of Proposed Framework -- 6 Limitations and Assumptions -- 7 Discussion and Conclusion -- References -- 6 Future of Data Generated by Interactive Media -- 1 Introduction -- 2 Recommendation Systems -- 3 Interactive Media -- 4 How Interactive Movies Collect Data -- 5 Marketing Aspect of Interactive Movies -- 6 Psychological Aspect of Interactive Movies -- 7 Future of Interactive Movies -- 8 Privacy -- 9 Conclusion -- 10 Applications -- References -- 7 Efficient Load Optimization Method Using VM Migration in Cloud Environment -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 VM Migration -- 3.2 Fuzzy Logic Based PM Selection -- 4 Implementation -- 5 Result and Discussion -- 5.1 Comparative Analysis -- 6 Conclusion -- References -- 8 Analysis of Search Space in the Domain of Swarm Intelligence -- 1 Introduction -- 2 Complexity of Search Space in Swarm Intelligence -- 3 Literature Analysis -- 3.1 Information Sharing -- 3.2 Change in Structure -- 4 Current Problems and Future Opportunities -- References -- 9 Smart Cane 1.0 IoT-Based Walking Stick -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Conclusions -- References -- 10 Web Crawler for Ranking of Websites Based on Web Traffic and Page Views -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Simulation Results -- 5 Conclusion -- References -- 11 Semantic Enrichment for Non-factoid Question Answering -- 1 Introduction. , 2 Importance of Semantic Relations -- 3 Role of Lexical-Semantic Relations in Different Parts of Question Answering -- 4 Classification of Semantic Relations -- 5 Addressing Challenges in Identifying Semantic Relations and Approach Method to Tackle Them -- 6 Brief on Research Utilizing Semantics in Different Modules of QAS -- 7 Conclusion and Future Work -- References -- 12 Genre-Based Recommendation on Community Cloud Using Apriori Algorithm -- 1 Introduction -- 2 Social Networks Analysis: Properties -- 3 Literature Review -- 4 Motivation for Network Analysis of YouTube and Directing to Community Cloud -- 5 Research Objectives -- 5.1 Research Objective 1 -- 5.2 Research Objective 2 -- 5.3 Research Objective 3 -- 6 Dataset -- 7 Proposed Technique -- 7.1 Strategy for Research Objective 1 -- 7.2 Strategy for Research Objective 2 -- 7.3 Strategy for Research Objective 3 -- 8 Results -- 8.1 Results for Research Objective 1 -- 8.2 Results for Research Objective 2 -- 9 Conclusion and Future Work -- References -- 13 AntVMp: An Approach for Energy-Efficient Placement of Virtual Machines Using Max-Min Ant System -- 1 Introduction -- 2 Literature Survey -- 3 The Proposed Method of VM Placement (AntVMp) -- 3.1 Heuristic Function Design -- 3.2 Probabilistic Function -- 3.3 Pheromone Initialization and Updating -- 3.4 Objective Function -- 3.5 Algorithm Description -- 4 Simulation Environment -- 5 Simulation Results and Discussion -- 6 Conclusion -- References -- 14 CPU Performance Prediction Using Various Regression Algorithms -- 1 Introduction -- 2 Methodology -- 2.1 Data Acquisition -- 2.2 Data Preprocessing and Feature Selection -- 2.3 Training Regression Models -- 2.4 CPU performance Prediction -- 3 Result Analysis -- 3.1 Metrices -- 3.2 Results -- 4 Conclusion -- References -- 15 IBM Watson: Redefining Artificial Intelligence Through Cognitive Computing. , 1 Introduction -- 1.1 IBM Watson Health -- 1.2 Watson's Working -- 1.3 Watsons Shortcomings and Main Reasons for the Negative Publicity -- 1.4 IBM's Defense -- 1.5 Solutions -- 2 Watsons Alternative-Comparisons -- 2.1 Amazon ML-Predictive Analysis -- 2.2 Amazon SageMaker -- 2.3 Google Cloud AutoML -- 2.4 IBM Watson ML Studio -- 3 IBM Watson Products and Services -- 4 Growth of AI Market -- 5 Conclusion -- References -- 16 An Improved Multi-objective Water Cycle Algorithm to Modify Inconsistent Matrix in Analytic Hierarchy Process -- 1 Introduction -- 2 Related Work -- 3 Proposed Multi-objective Algorithm (MOA) -- 3.1 Objective Function -- 3.2 Improved Evaporation Rate -- 4 Experiments and Results -- 4.1 Performance Comparison Among the Proposed MOA and Existing Algorithms -- 5 Statistical Significance Test -- 6 Conclusion -- References -- 17 Comparative Approach of Response Surface Methodology and Particle Swarm Optimization-Artificial Neural Network (PSO-ANN) in Rehydration Ratio Optimization for Bael (Aegle marmelos (L) Correa) Powder Production -- 1 Introduction -- 2 Materials and Methods -- 2.1 Preparation of Hot Air Dried Bael (HAD) -- 2.2 Preparation of Microwave Dried Bael (MWD) -- 2.3 Preparation of Freeze Dried Bael (FD) -- 2.4 Preparation of Sun Dried Bael (SD) -- 2.5 Preparation of Bael Powder -- 2.6 Rehydration Ratio -- 2.7 Response Surface Methodology (RSM) Optimization -- 2.8 Particle Swarm optimization-Artificial Neural Network (PSO-ANN) -- 3 Results and Discussion -- 4 Conclusion -- References -- 18 Load Balancing with the Help of Round Robin and Shortest Job First Scheduling Algorithm in Cloud Computing -- 1 Introduction -- 2 Work Done -- 3 Proposed Algorithm -- 4 Conclusion and Future Work -- References -- 19 Downlink Performance Improvement Using Base Station Cooperation for Multicell Cellular Networks -- 1 Introduction. , 2 System Model -- 2.1 Multicell Cooperation Scheme -- 2.2 Inter-Cell Interference (ICI) -- 2.3 Multicell Network for Case of Frequency Reuse: Cell Interior Performance -- 2.4 Cell Interior SINR and Channel Capacity -- 2.5 Analysis for Multicell Network Performance with ICI -- 2.6 Power Constraints for Every BS -- 3 Simulation Parameters -- 3.1 Simulation Results -- 4 Conclusion -- References -- 20 A Survey on Moving Object Detection in Video Using a Moving Camera for Smart Surveillance System -- 1 Introduction -- 2 Application of Moving Object Detection -- 3 Moving Object Detection Methods -- 3.1 Spatio-Temporal Difference Method -- 3.2 Background Subtraction Method -- 3.3 Optical Flow (Differential Method) -- 4 Challenging Issues in Moving Object Detection -- 5 Comparison of Moving Object Detection Method -- 6 Publicly Available Datasets -- 7 Performance Analysis Parameters -- 8 Conclusion and Future Directions -- References -- 21 Tomato Leaf Features Extraction for Early Disease Detection -- 1 Introduction -- 2 Related Work -- 3 Diseases in Tomato Leaves -- 3.1 Early Blight -- 3.2 Mosaic Virus -- 3.3 Target Spot -- 3.4 Yellow Leaf Curl Virus -- 4 Methodology -- 4.1 Image Acquisition -- 4.2 Image Pre-processing -- 4.3 Disease Segmentation -- 4.4 Feature Extraction -- 4.5 Identification of Disease in Tomato Plant -- 5 Results and Discussions -- 6 Conclusions -- References -- 22 Cardiac MRI Segmentation and Analysis in Fuzzy Domain -- 1 Introduction -- 2 Literature Review -- 3 Proposed Algorithm for RV Extraction -- 4 Experimental Results -- 5 Conclusions -- References -- 23 Color Masking Method for Variable Luminosity in Videos with Application in Lane Detection Systems -- 1 Introduction -- 2 Literature Review -- 3 Luminosity Filter -- 4 Variable Color Masking -- 5 Results -- 6 Limitations -- 7 Conclusion -- References. , 24 An Automated IoT Enabled Parking System.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Newark :John Wiley & Sons, Incorporated,
    Keywords: Bioinformatics. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (544 pages)
    Edition: 1st ed.
    ISBN: 9781119785613
    DDC: 570.285
    Language: English
    Note: Cover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Acknowledgement -- Part 1: THE COMMENCEMENT OF MACHINE LEARNING SOLICITATION TO BIOINFORMATICS -- 1 Introduction to Supervised Learning -- 1.1 Introduction -- 1.2 Learning Process & -- its Methodologies -- 1.2.1 Supervised Learning -- 1.2.2 Unsupervised Learning -- 1.2.3 Reinforcement Learning -- 1.3 Classification and its Types -- 1.4 Regression -- 1.4.1 Logistic Regression -- 1.4.2 Difference between Linear & -- Logistic Regression -- 1.5 Random Forest -- 1.6 K-Nearest Neighbor -- 1.7 Decision Trees -- 1.8 Support Vector Machines -- 1.9 Neural Networks -- 1.10 Comparison of Numerical Interpretation -- 1.11 Conclusion & -- Future Scope -- References -- 2 Introduction to Unsupervised Learning in Bioinformatics -- 2.1 Introduction -- 2.2 Clustering in Unsupervised Learning -- 2.3 Clustering in Bioinformatics-Genetic Data -- 2.3.1 Microarray Analysis -- 2.3.2 Clustering Algorithms -- 2.3.3 Partition Algorithms -- 2.3.4 Hierarchical Clustering Algorithms -- 2.3.5 Density-Based Approach -- 2.3.6 Model-Based Approach -- 2.3.7 Grid-Based Clustering -- 2.3.8 Soft Clustering -- 2.4 Conclusion -- References -- 3 A Critical Review on the Application of Artificial Neural Network in Bioinformatics -- 3.1 Introduction -- 3.1.1 Different Areas of Application of Bioinformatics -- 3.1.2 Bioinformatics in Real World -- 3.1.3 Issues with Bioinformatics -- 3.2 Biological Datasets -- 3.3 Building Computational Model -- 3.3.1 Data Pre-Processing and its Necessity -- 3.3.2 Biological Data Classification -- 3.3.3 ML in Bioinformatics -- 3.3.4 Introduction to ANN -- 3.3.5 Application of ANN in Bioinformatics -- 3.3.6 Broadly Used Supervised Machine Learning Techniques -- 3.4 Literature Review. , 3.4.1 Comparative Analysis of ANN With Broadly Used Traditional ML Algorithms -- 3.5 Critical Analysis -- 3.6 Conclusion -- References -- Part 2: MACHINE LEARNING AND GENOMIC TECHNOLOGY, FEATURE SELECTION AND DIMENSIONALITY REDUCTION -- 4 Dimensionality Reduction Techniques: Principles, Benefits, and Limitations -- 4.1 Introduction -- 4.2 The Benefits and Limitations of Dimension Reduction Methods -- 4.3 Components of Dimension Reduction -- 4.3.1 Feature Selection -- 4.3.2 Feature Reduction -- 4.4 Methods of Dimensionality Reduction -- 4.4.1 Principal Component Analysis (PCA) -- 4.4.2 Missing Values Ratio (MVR) -- 4.4.3 Linear Discriminant Analysis (LDA) -- 4.4.4 Backward Feature Elimination (BFE) -- 4.4.5 Forward Feature Construction (FFC) -- 4.4.6 Independent Component Analysis (ICA) -- 4.4.7 Low Variance Filter (LVF) -- 4.4.8 High Correlation Filter -- 4.4.9 Random Forests (RF)/Ensemble Trees -- 4.4.10 t-Distributed Stochastic Neighbor Embedding (t-SNE) -- 4.4.11 Autoencoder -- 4.4.12 Factor Analysis (FA) -- 4.4.13 Uniform Manifold Approximation and Projection (UMAP) -- 4.4.14 Information Gain (IG) -- 4.4.15 Vector Quantization (VQ) -- 4.5 Conclusion -- References -- 5 Plant Disease Detection Using Machine Learning Tools With an Overview on Dimensionality Reduction -- 5.1 Introduction -- 5.2 Flowchart -- 5.3 Machine Learning (ML) in Rapid Stress Phenotyping -- 5.4 Dimensionality Reduction -- 5.4.1 Feature Extraction -- 5.5 Literature Survey -- 5.6 Types of Plant Stress -- 5.6.1 Biotic Stress -- 5.7 Implementation I: Numerical Dataset -- 5.7.1 Dataset Description -- 5.7.2 Results -- 5.7.3 Discussion -- 5.8 Implementation II: Image Dataset -- 5.8.1 Dataset Description -- 5.8.2 Method Used -- 5.8.3 Results -- 5.8.4 Discussions -- 5.9 Conclusion -- References -- 6 Gene Selection Using Integrative Analysis of Multi-Level Omics Data: A Systematic Review. , 6.1 Introduction -- 6.2 Approaches for Gene Selection -- 6.3 Multi-Level Omics Data Integration -- 6.3.1 Horizontal Integration -- 6.3.2 Vertical Integration -- 6.4 Machine Learning Approaches for Multi-Level Data Integration -- 6.4.1 Unsupervised Integration of Omics Data -- 6.4.2 Supervised Integration of Omics Data -- 6.5 Critical Observation -- 6.6 Conclusion -- References -- 7 Random Forest Algorithm in Imbalance Genomics Classification -- 7.1 Introduction -- 7.2 Methodological Issues -- 7.2.1 Decision Tree (DT) Classifier -- 7.2.2 Ensemble Techniques -- 7.2.3 Mathematical Formulation of Ensemble Technique -- 7.2.4 Bagging -- 7.2.5 Bagging Pseudocode -- 7.2.6 Random Forest -- 7.3 Biological Terminologies -- 7.3.1 DNA -- 7.3.2 Genomics -- 7.3.3 Proteins -- 7.4 Proposed Model -- 7.4.1 Balancing the Data -- 7.4.2 Ensembling of Trees -- 7.5 Experimental Analysis -- 7.6 Current and Future Scope of ML in Genomics -- 7.6.1 Gene Sequencing -- 7.6.2 Services to Consumer -- 7.6.3 Gene Editing -- 7.6.4 Pharmacy Genomics -- 7.6.5 Newborn Genetic Screening -- 7.7 Conclusion -- References -- 8 Feature Selection and Random Forest Classification for Breast Cancer Disease -- 8.1 Introduction -- 8.2 Literature Survey -- 8.3 Machine Learning -- 8.4 Feature Engineering -- 8.5 Methodology -- 8.5.1 Dataset Collection -- 8.5.2 Proposed Work -- 8.6 Result Analysis -- 8.7 Conclusion -- References -- 9 A Comprehensive Study on the Application of Grey Wolf Optimization for Microarray Data -- 9.1 Introduction -- 9.2 Microarray Data -- 9.3 Grey Wolf Optimization (GWO) Algorithm -- 9.3.1 Principle of GWO -- 9.3.2 Mathematical Model of GWO -- 9.3.3 Algorithm and Flow Chart of GWO -- 9.4 Studies on GWO Variants -- 9.4.1 Hybridization -- 9.4.2 Extensions -- 9.4.3 Modification -- 9.5 Application of GWO in Medical Domain -- 9.6 Application of GWO in Microarray Data. , 9.7 Conclusion and Future Work -- References -- 10 The Cluster Analysis and Feature Selection: Perspective of Machine Learning and Image Processing -- 10.1 Introduction -- 10.2 Various Image Segmentation Techniques -- 10.2.1 Clustering -- 10.2.2 Thresholding -- 10.2.3 Edge-Based Segmentation -- 10.2.4 Region-Based Image Segmentation -- 10.2.5 Watershed -- 10.3 How to Deal With Image Dataset -- 10.3.1 Introduction -- 10.3.2 Image Acquisition -- 10.3.3 Image Pre-Processing -- 10.3.4 Image Enhancement -- 10.3.5 Image Segmentation -- 10.3.6 K-Mean Clustering -- 10.3.7 Density-Based Spatial Clustering of Application With Noise (DBSCAN) -- 10.3.8 SVM Classifier -- 10.4 Class Imbalance Problem -- 10.4.1 Resampling Approaches -- 10.5 Optimization of Hyperparameter -- 10.6 Case Study -- 10.6.1 Pancreatic and Lung Tumor Prediction in the Machine Learning Era: Unique Supervised and Unsupervised Methodologies -- 10.6.2 Pancreatic Cysts (IPMN) -- 10.7 Using AI to Detect Coronavirus -- 10.7.1 BlueDot AI Technology -- 10.8 Using Artificial Intelligence (AI), CT Scan and X-Ray -- 10.9 Conclusion -- References -- Part 3: MACHINE LEARNING AND HEALTHCARE APPLICATIONS -- 11 Artificial Intelligence and Machine Learning for Healthcare Solutions -- 11.1 Introduction -- 11.2 Using Machine Learning Approaches for Different Purposes -- 11.3 Various Resources of Medical Dataset for Research -- 11.4 Deep Learning in Healthcare -- 11.5 Various Projects in Medical Imaging and Diagnostics -- 11.6 Conclusion -- References -- 12 Forecasting of Novel Corona Virus Disease (Covid-19) Using LSTM and XG Boosting Algorithms -- 12.1 Introduction -- 12.2 Machine Learning Algorithms for Forecasting -- 12.3 Proposed Method -- 12.3.1 LSTM (Longest Short-Term Memory) -- 12.3.2 XG Boost (eXtreme Gradient Boosting) Algorithm -- 12.3.3 Polynomial Regression -- 12.3.4 Performance Metrics. , 12.4 Implementation -- 12.4.1 The Main Python Code for LSTM -- 12.4.2 The Main Python Code for Polynomial Regression -- 12.4.3 The Main Python Code for XG Boosting Algorithm -- 12.4.4 Libraries or Methods Used in the Proposed Work -- 12.5 Results and Discussion -- 12.6 Conclusion and Future Work -- References -- 13 An Innovative Machine Learning Approach to Diagnose Cancer at an Early Stage -- 13.1 Introduction -- 13.1.1 Multiscale Cancer Detection -- 13.2 Related Work -- 13.3 Materials and Methods -- 13.4 System Design -- 13.4.1 Artificial Neural Network -- 13.4.2 Back Propagation Network (BPN) -- 13.4.3 Support Vector Machine (SVM) -- 13.4.4 Pre-Processing -- 13.4.5 Feature Extraction -- 13.4.6 Database Updation -- 13.4.7 Classification -- 13.4.8 Clustering -- 13.4.9 Segmentation Using FCM Clustering -- 13.5 Results and Discussion -- 13.6 Conclusion -- References -- 14 A Study of Human Sleep Staging Behavior Based on Polysomnography Using Machine Learning Techniques -- 14.1 Introduction -- 14.2 Polysomnography Signal Analysis -- 14.3 Case Study on Automated Sleep Stage Scoring -- 14.3.1 Experimental Data -- 14.3.2 The Methodology -- 14.3.3 Experimental Results and Discussion -- 14.4 Summary and Conclusion -- References -- 15 Detection of Schizophrenia Using EEG Signals -- 15.1 Introduction -- 15.1.1 The Human Brain -- 15.1.2 Schizophrenia -- 15.1.3 Electroencephalograph (EEG) -- 15.2 Methodology -- 15.2.1 EEG Signal Processing -- 15.2.2 Removing the Artifacts -- 15.2.3 Feature Extraction -- 15.2.4 Normalization -- 15.2.5 Feature Selection/Reduction -- 15.2.6 Feature Classification -- 15.3 Literature Review -- 15.4 Discussion -- 15.5 Conclusion -- References -- 16 Performance Analysis of Signal Processing Techniques in Bioinformatics for Medical Applications Using Machine Learning Concepts -- 16.1 Introduction. , 16.1.1 Role of Machine Learning in Bioinformatics.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (586 pages)
    Edition: 1st ed.
    ISBN: 9789811598739
    Series Statement: Studies in Autonomic, Data-Driven and Industrial Computing Series
    DDC: 006.3
    Language: English
    Note: Intro -- Contents -- About the Editors -- Design and Fabrication of Hybrid Land-Air Vehicle -- 1 Introduction -- 2 Material and Methods -- 2.1 Quad Rotor Design -- 2.2 Bldc Motor -- 2.3 Li-Po -- 2.4 Propellers -- 3 Design Calculations -- 3.1 Now for Our Li-Po Battery -- 3.2 Wireless Joystick Control -- 3.3 XBee Series 2 Radio Modules -- 3.4 Arduino UNO -- 3.5 L293D Motor Driver -- 4 Result and Discussion -- 5 Hardware and Software Integration -- 6 Discussion -- 7 Results -- 8 Conclusion -- References -- Pixel Value Differencing of Image Steganography in Substitution Technique: A Survey -- 1 Introduction -- 2 Literature Review -- 3 Steganography -- 4 Pixel Value Differencing Methods -- 5 Comparison of PVD Methods -- 6 Conclusion -- References -- Newspaper Text Recognition Printed in Gurumukhi Script: SVM Versus MLP -- 1 Introduction -- 2 Related Work -- 3 Characteristics of Devanagari Script -- 4 Phases of OCR for Newspaper Recognition -- 5 Database Collection -- 6 Feature Extraction Techniques -- 7 Classification Techniques -- 8 Experimental Results -- 9 Conclusion -- References -- Bound Constructive Fraud and Implementing Dual Accessibility Approach on Biometric Credit/Debit Cards -- 1 Introduction -- 2 Preliminaries -- 2.1 Biometric Cards -- 2.2 Joint Access of Biometric Cards -- 3 Literature Survey -- 4 The Proposed Approach -- 4.1 Architecture -- 4.2 Process Work Flow -- 5 Conclusions and Future Work -- References -- Automatic Dimension Detection of Fish Images -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Grayscale Conversion -- 3.2 Ruler Detection -- 3.3 Pixel Per Metric Ratio -- 3.4 Background Removal -- 3.5 Estimating the Dimension of the Fish -- 4 Experimental Analysis -- 4.1 Experimental Settings -- 4.2 Dataset -- 4.3 Result and Discussion -- 5 Conclusion and Future Work -- References. , Mitigating Security Challenges in Smart Home Management Through Smart Lock -- 1 Introduction -- 2 IoT in Smart Home Management -- 3 Smart Lock -- 4 Smart Home Protocols -- 5 Security Threats in Smart Home -- 6 Challenges Related to Security and Privacy -- 6.1 Issues of Device -- 6.2 Issues of Communication -- 6.3 Issues of Service -- 7 Smart Lock Introduction and Issues -- 8 Conclusion -- References -- Quality Efficiency of VoIP Application Using Hybrid Co-ordination Function -- 1 Introduction -- 2 802.11e for QoS -- 3 DCF Versus HCF -- 4 Implementation and Analysis -- 5 Conclusion -- References -- A Review of Algorithms for Secure Data Transmission in IoT Devices -- 1 Introduction -- 2 IoT Devices and Security -- 2.1 Raspberry Pi -- 2.2 Security Features -- 2.3 Security Requirements -- 3 Techniques -- 4 Privacy -- 4.1 Protection of Privacy -- 4.2 Algorithms -- 5 Survey -- 6 Experimental Results -- 7 Observations -- 8 Work Ahead -- 9 Conclusion -- References -- The New Phase of Manufacturing: Industry 4.0 -- 1 Introduction -- 2 Literature Review -- 2.1 Smart Manufacturing Systems in Industry 4.0: Framework and Demonstrative Scenarios -- 2.2 Challenges and Future Perspectives -- 3 Smart Manufacturing at a Glance -- 3.1 CPS and Its Applications in Smart Manufacturing -- 3.2 Big Data 4.0 and Machine Learning -- 3.3 Artificial Intelligence in Smart Manufacturing -- 4 Challenges Faced by Industry 4.0 -- 5 Future Perspectives and Industry 5.0 -- 6 Conclusion -- References -- Summarization and Analysis of Text Using Network Theory -- 1 Introduction -- 2 Related Work -- 3 Motivation -- 4 Methodology -- 5 Proposed Work -- 5.1 Text Summarization Using TextRank Algorithm -- 5.2 Text Summarization Using NLTK and TF-IDF Algorithm -- 6 Result and Analysis -- 7 Conclusion and Future Scope -- References. , Predictive Analysis of Customers' Satisfaction Toward Modern Retail Outlet in Delhi-NCR -- 1 Introduction -- 1.1 Need and Scope of the Study -- 1.2 The Objective of Study -- 1.3 Scope of Research -- 2 Literature Review -- 3 Research Approach -- 3.1 Research Strategy -- 3.2 Research Instrument -- 3.3 Collection of Primary Data -- 3.4 Data Usage -- 3.5 Research Strategy -- 3.6 Cronbach's Alpha Test -- 3.7 Interpretation of Table 2 -- 3.8 Interpretation of Table 3 -- 3.9 The Generalize Chi-Square Test -- 3.10 Interpretation of Table 5 -- 3.11 Interpretation of Table 6 -- 4 Result and Implication -- 5 Limitation of Research -- 6 Conclusion -- 7 Further Work -- References -- Feature Selection through Clustering to Classify High-Dimensional Data -- 1 Introduction -- 2 Related Work -- 3 Datasets -- 4 Preliminaries and Basic Definitions -- 4.1 SVM Classifier -- 4.2 Relief Feature Selection Approach -- 4.3 Info-Gain Feature Selection Approach -- 5 Methodology -- 6 Performance Analysis of the Generated Model -- 7 Summary -- References -- Neural Network for Performance Prediction of Biogas Production from Municipal Solid Wastes -- 1 Introduction -- 2 Materials and Methods -- 2.1 Biogas Production Techniques -- 2.2 Mathematical Modelling of Biogas Systems -- 3 Simulation and Result Analysis -- 4 Conclusion -- References -- Multi-Criteria-Based Selection of Fast Moving Consumer Goods Using Intelligent Techniques with Linguistic Inputs -- 1 Introduction -- 2 Need for Type 2 Fuzzy Logic -- 3 Related Work Done -- 4 Proposed Work -- 5 Experiment -- 6 Result Discussion -- 7  Conclusion -- References -- Advertising and Spams: How to Recognize the Lie and Reality in Social Media -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experimental Setup and Analysis -- 4.1 Data Set -- 4.2 Classifiers Implemented -- 5 Results -- 6 Conclusions -- 7 Future Work. , References -- Blockchain Technology for Managing COVID-19 Pandemic: Challenges and Solutions -- 1 Introduction -- 2 Blockchain Technology -- 3 Impact of COVID-19 on Healthcare Industry and Their Corresponding Blockchain Technology-Based Solutions -- 4 Conclusion -- References -- Advanced Real-Time Automated Smart Parking System for Smart Cities -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Methodology -- 5 K-Means Clustering Algorithm -- 6 Results -- 7 Conclusions -- References -- Designing Cellular Automata-Based Pattern Classifier for Imbalance Dataset -- 1 Introduction -- 2 Study of Imbalance Classification Problem and Cellular Automata -- 2.1 Background of Imbalance Classification Problem -- 2.2 Preliminary of CA -- 3 Synthesis of Point Attractor Cellular Automata -- 3.1 Null Boundary -- 3.2 Periodic Boundary -- 4 Designing of CA-Based Pattern Classifier -- 4.1 Propose Method -- 4.2 Experimental Setup -- 5 Conclusion -- References -- Real-Time Inventory Management Using Hadoop -- 1 Introduction -- 2 Real-Time Inventory Management -- 2.1 Challenges in Real-Time Inventory Management -- 2.2 Solution of the Above Challenges -- 3 Proposed Architecture of Real-Time Inventory Management -- 4 Block Diagram of Real-Time Inventory Management -- 4.1 Point of Sale (POS) -- 4.2 Hadoop Enabled Centralized System -- 5 Conclusion -- References -- Internet of Things (IoT) and Security: Challenges Ahead -- 1 Introduction -- 2 Current Research Work -- 3 Emerging Cyber-Threats -- 3.1 Network Layer Security Problems -- 3.2 DDoS Attacks -- 3.3 Poor Network Segmentation -- 3.4 Malware -- 3.5 Weak Password Protection -- 3.6 Lack of Encryption -- 3.7 Cloud Threats -- 4 Attack Mitigation Techniques -- 4.1 Network Layer Security Measures -- 4.2 Design Security -- 4.3 Anti-malware and Secure Coding -- 4.4 Two-Way Authentication Technique. , 4.5 Digital Certificates -- 4.6 Firewall Implementation Technique -- 5 Technical Challenges -- 5.1 Poor and Ineffective Network Performance -- 5.2 Ineffective and Obsolete Security Systems -- 5.3 Configuration Management -- 5.4 Cost Management -- 5.5 Emergence of the New Technologies -- 6 Opinions on Future Direction -- 7 Conclusion -- References -- NB-IoT Powered Last-Mile Delivery Framework for Cold Supply Chain -- 1 Introduction -- 1.1 Technology Adoption in Cold Chain -- 2 Literature Review -- 3 Proposed Technology -- 4 Conceptual Framework -- 5 Hardware and Software Structural Design -- 6 Conclusion -- References -- Switching Behaviour for Traditional and Online Mode of Purchase: Analysis of Choices for Switching Consumer Behaviour -- 1 Introduction -- 2 Literature Review and Hypothesis -- 3 Methods and Models -- 4 Empirical Analysis -- 5 Findings -- 6 Discussion and Conclusion -- Annexure -- References -- Wireless Sensor Network Application for IoT-Based Healthcare System -- 1 Introduction -- 1.1 Internet of Things (IoT) -- 1.2 Layout of IoT in Health Care -- 1.3 Wireless Sensor Network for IoT-Based Healthcare System -- 2 Literature Review -- 2.1 Related Works -- 2.2 Problem Statement -- 3 Methodology Used in Health Care -- 3.1 Different Sensors Used in Health Care -- 3.2 Current IoT Application to Interact with IoT Devices -- 4 Applications of Wireless Sensor Network in Current Healthcare System -- 4.1 Monitoring of Patients in Medical Surroundings -- 4.2 Care Center for Monitoring Chronic and Elderly Patients -- 4.3 Collection of Databases of Health Data -- 4.4 Telemedicine -- 4.5 Wireless Body Area Network -- 5 Integration of Concepts of WSN in Utah Valley University Curriculum -- 6 Outcome -- 6.1 Benefits -- 6.2 Limitations -- 6.3 Challenges -- 7 Conclusion -- 8 Future Works -- References. , Short Text Mining Method Based on Sub-semantic Space.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Geography. ; Geographic information systems. ; Artificial intelligence. ; Big data. ; Natural disasters.
    Description / Table of Contents: Chapter 1 An Introduction to Artificial Intelligence and its Applications towards Remote sensing -- Chapter 2 GIS and remote sensing application for vegetation mapping -- Chapter 3 Evaluation of Spatio-temporal Trend of Tropical Cyclones (TCs) in Bay of Bengal Basin, India -- Chapter 4 Application of geospatial technologies and AHP technique in the identification of soil erosion-prone zones in the Rift Valley, Southern Ethiopia -- Chapter 5 Shoreline changes along Bhitarkanika Sanctuary, North Odisha coast, India -- Chapter 6 One-dimensional shoreline evolution modeling at sea turtle nesting ground near Rushikulya estuary, Southern Odisha coast, India -- Chapter 7 Analysis of sea surface temperature and Chlorophyll-a concentration along the coastline of the Indian peninsula using remote sensing data -- Chapter 8 Landslide Susceptibility Mapping through Hyperparameter Optimized Bagging and Boosting Ensembles -- Chapter 9 Flash Floods Assessment in Hill Region -- Chapter 10 Mapping Flood Hazard in Marinduque, Philippines using Maximum Entropy Approach -- Chapter 11 GIS mapping and Groundwater Quality Assessment near solid waste dump site -- Chapter 12 Assessment of Groundwater Potential using an Integrated approach of GIS, Fuzzy AHP and Remote Sensing: A case study of Madurai City in India -- Chapter 13 Developing Sustainable Livelihood Index for the Coastal Belt of Indian Sunderbans -- Chapter 14 A Geo-Spatial approach for the development of sustainable watershed management -- Chapter 15 An Efficient Image Compression Algorithm using Neural Networks -- Chapter 16 Computer Vision based Autonomous Underwater Vehicle with Robotic Arm for Garbage Detection and Cleaning -- Chapter 17 Visual Media Super-Resolution Using Super Resolution Generative Adversarial Networks.
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource(VI, 310 p. 161 illus., 137 illus. in color.)
    Edition: 1st ed. 2024.
    ISBN: 9783031537639
    Series Statement: Advances in Geographic Information Science
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...