GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Data protection. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (414 pages)
    Edition: 1st ed.
    ISBN: 9783319442709
    Series Statement: Intelligent Systems Reference Library ; v.115
    Language: English
    Note: Intro -- Preface -- Contents -- Contributors -- Forensic Analysis in Cloud Computing -- 1 Cloud Computing Forensic Analysis: Trends and Challenges -- Abstract -- 1 Introduction -- 2 Cloud Computing Environment -- 2.1 The Cloud Models -- 2.2 The Cloud Structure and Services -- 3 Digital Forensics -- 3.1 Digital Forensics Common Phases -- 3.1.1 Identification -- 3.1.2 Acquisition and Preservation -- 3.1.3 Analysis -- 3.1.4 Presentation -- 3.2 Digital Evidence -- 3.3 Digital Forensic Analysis -- 4 Forensic Analysis in the Cloud Environment -- 4.1 Isolation of Crime Scene in Cloud -- 4.2 Pros and Cons of Forensic Analysis in Cloud -- 4.3 Challenges of Analysis and Examination -- 4.4 Conclusions and Open Research Issues -- References -- Data Storage Security Service in Cloud Computing: Challenges and Solutions -- 1 Introduction -- 2 Data Storage Auditing Methods -- 2.1 Public Auditing Versus Private Auditing -- 2.2 Auditing Single-Copy Versus Multiple-Copy Data -- 2.3 Static Versus Dynamic Data Auditing -- 3 Access Control Methods -- 3.1 Traditional Encryption -- 3.2 Broadcast Encryption -- 3.3 Identity-Based Encryption -- 3.4 Hierarchical Identity-Based Encryption -- 3.5 Attribute-Based Encryption -- 3.6 Hierarchical Attribute-Based Encryption -- 3.7 Role-Based Access Control -- 4 Comparative Analysis of Security Methods on Cloud Data Storage -- 4.1 Performance Analysis of Data Storage Auditing Methods -- 4.2 Performance Analysis of Access Control Methods -- 5 Discussions and Concluding Remarks -- 6 Conclusion -- References -- Homomorphic Cryptosystems for Securing Data in Public Cloud Computing -- 1 Introduction -- 2 Cloud Computing -- 3 Security Issues in Cloud Computing -- 4 Why Homomorphic Encryption (HE)? -- 5 Homomorphic Encryption (HE) -- 6 Different Encryption Cryptosystem -- 6.1 Somewhat Homomorphic Encryption (SHE). , 6.2 Fully Homomorphic Encryption (FHE) -- 7 Result and Discussion -- 8 Conclusion -- References -- 4 An Enhanced Cloud Based View Materialization Approach for Peer-to-Peer Architecture -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Solutions and Recommendations -- 4 The Experimental Results -- 5 Future Research Directions -- 6 Conclusion -- Appendix -- References -- 5 Distributed Database System (DSS) Design Over a Cloud Environment -- Abstract -- 1 Introduction -- 2 Background -- 3 Research Issues -- 4 Solutions and Recommendations -- 4.1 Application Client Layer -- 4.2 Distributed Database System Manager Layer -- 4.3 Distributed Database Clusters Layer -- 5 Enhanced Allocation and Replication Technique -- 6 Experimental Results -- 7 Clustering Distributed Database Sites -- 7.1 Clustering Distributed Database Sites Based on Region Fields -- 7.2 Clustering Distributed Database Sites Based on Communication Costs Between Network Sites -- 8 Future Research Directions -- 9 Conclusions -- References -- Additional Reading -- 6 A New Stemming Algorithm for Efficient Information Retrieval Systems and Web Search Engines -- Abstract -- 1 Introduction -- 2 Background -- 3 The System Methodology -- 3.1 The System Architecture -- 3.2 The Enhance Porter Stemming Algorithm (EPSA) -- 3.3 The Ranking Algorithm -- 4 Performance Studies -- 4.1 Evaluation of the EPSA Algorithm -- 4.2 Experimental Results -- 5 Conclusion -- References -- Forensics Multimedia and Watermarking Techniques -- 7 Face Recognition via Taxonomy of Illumination Normalization -- Abstract -- 1 Introduction -- 2 Illumination Normalization Face Recognition -- 2.1 Illumination Normalization -- 2.1.1 Wavelet-Based (WA) -- 2.1.2 Steerable Filtering-Based -- 2.1.3 Non-local Means Based -- 2.1.4 Adoptive Non-local Mean -- 2.2 Illumination Modeling -- 2.2.1 Single Scale Retinex (SSR). , 2.2.2 Multi Scale Retinex (MSR) -- 2.2.3 Adaptive Single Scale Retinex (ASR) -- 2.3 Illumination Invariant Feature Extraction -- 2.3.1 Homomorphic Filtering-Based Normalization (HOMO) -- 2.3.2 Discrete Cosine Transformation (DCT) -- 2.3.3 Isotropic Diffusion-Based Normalization -- 2.3.4 Modified Anisotropic Diffusion (MAD) -- 2.3.5 Difference of Gaussian (DoG) -- 3 Current Trends -- 4 Comparisons -- 5 Discussion -- 6 Conclusion -- References -- 8 Detecting Significant Changes in Image Sequences -- Abstract -- 1 Introduction -- 2 Background Feature Analysis -- 3 Problem Statement and Legacy Techniques for Solution -- 4 Image Content Interpretation and Comparison -- 4.1 Construction of Voronoi Diagrams on Salient Image Points -- 4.2 Similarity Metrics for Voronoi Diagram Comparison -- 4.3 Procedure of Image Change Detection -- 5 Test Collections, Processing Evaluation and Development Trends -- 6 Conclusion -- References -- 9 VW16E: A Robust Video Watermarking Technique Using Simulated Blocks -- Abstract -- 1 Introduction -- 2 Block Simulation -- 3 Test the Imperceptibility -- 3.1 Test Results of VW16E Technique for the Video Sample 1 -- 3.2 Test Results of VW16E Technique for the Video Sample 2 -- 3.3 Test Results of VW16E Technique for the Video Sample 3 -- 3.4 Test Results of VW16E Technique for the Video Sample 4 -- 3.5 Test Results of VW16E Technique for the Video Sample 5 -- 3.6 Test Results of VW16E Technique for the Video Sample 6 -- 3.7 Test Results of VW16E Technique for the Video Sample 7 -- 3.8 Test Results of VW16E Technique for the Video Sample 8 -- 3.9 Test Results of VW16E Technique for the Video Sample 9 -- 3.10 Test Results of VW16E Technique for the Video Sample 10 -- 3.11 Test Results of VW16E Technique for the Video Sample 11 -- 3.12 Test Results of VW16E Technique for the Video Sample 12. , 3.13 Test Results of VW16E Technique for the Video Sample 13 -- 3.14 Test Results of VW16E Technique for the Video Sample 14 -- 4 Discussion and Analysis on Test and Evaluation -- 4.1 Attacks on Video Sample No 1 -- 4.1.1 Crop Attack on Video Sample No 1 -- 4.1.2 Frame Deletion Attack on Video Sample No 1 -- 4.1.3 Frame Exchange Attack on Video Sample No 1 -- 4.1.4 Frame Insert Attack on Video Sample No 1 -- 4.1.5 Rotate Attack on Video Sample No 1 -- 4.1.6 Reverse Rotate Attack on Video Sample No 1 -- 4.1.7 Salt and Pepper Attack on Video Sample No 1 -- 4.1.8 Shift Frames Attack on Video Sample No 1 -- 4.1.9 Superimpose Attack on Video Sample No 1 -- 5 Conclusion -- References -- 10 A Robust and Computationally Efficient Digital Watermarking Technique Using Inter Block Pixel Differencing -- Abstract -- 1 Introduction -- 2 Related Literature -- 3 Proposed Watermarking Algorithm -- 3.1 Block Pre-processing -- 3.2 Watermark Embedding -- 3.3 Watermark Extraction -- 4 Experimental Results and Discussions -- 4.1 Imperceptivity Analysis -- 4.2 Payload Analysis -- 4.3 Robustness Analysis -- 4.3.1 Salt and Pepper Noise -- 4.3.2 Addition of Gaussian Noise -- 4.3.3 Sharpening -- 4.3.4 Cropping -- 4.3.5 Rotation Attack -- 4.3.6 JPEG Compression -- 4.3.7 Rotation + Cropping -- 4.3.8 Salt and Pepper Noise + Gaussian Noise -- 4.3.9 Salt and Pepper Noise + Gaussian Noise + Sharpening -- 4.4 Computational Complexity Analysis -- 5 Conclusion -- Acknowledgments -- References -- 11 JPEG2000 Compatible Layered Block Cipher -- Abstract -- 1 Introduction -- 1.1 Background -- 2 Literature Review -- 2.1 Applications -- 2.2 Approaches -- 3 Proposed Approach -- 4 Performance Analysis -- 5 Discussion and Conclusions -- References -- Digital Forensic Applications -- 12 Data Streams Processing Techniques -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Data Streams. , 2.2 Data Steams Processing -- 2.3 Sliding Windows -- 2.4 Continuous Query Optimization -- 3 Continuous Queries Processing -- 3.1 Continuous Queries Processing Based on Multiple Query Plans -- 3.2 Continuous Queries with Probabilistic Guarantees -- 3.3 Continuous Bounded Queries Processing -- 3.4 Continuous Queries Processing Over Sliding Window Join -- 3.5 Continuous Pattern Mining -- 3.6 Continuous Top-K Queries Processing -- 3.7 Continuous Nearest Neighbor Queries Processing -- 3.8 Continuous Queries Processing Based Tree Structure -- 3.9 Continuous Skyline Queries Processing -- 3.10 Multi Continuous Queries Processing -- 4 Data Streams Execution Environments -- 4.1 Parallel and Distributed Stream Processing -- 4.1.1 Data Streams Processing Based on Map Reduce Framework -- 4.1.2 Data Streams Processing Based on the Query Mega Graph (QMG) -- 4.1.3 Data Streams Processing Based on Task Graph Structure -- 4.1.4 Data Streams Processing in Traffic Distributed Networks -- 4.1.5 Controlling Streams Processing on Overload Conditions -- 4.2 Data Streams Processing Based on Cloud Environment -- 5 Research Issues -- 6 Solutions and Recommendations -- 7 Future Research Directions -- 8 Conclusion -- References -- Evidence Evaluation of Gait Biometrics for Forensic Investigation -- 1 Introduction -- 2 Gait Biometrics -- 2.1 Gait Datasets -- 2.2 Gait Recognition Methods -- 3 Gait Analysis for Forensics -- 3.1 Descriptive-Based Methods -- 3.2 Metric-Based Methods -- 4 Evidence Evaluation and Challenges -- 5 Conclusions -- References -- 14 Formal Acceptability of Digital Evidence -- Abstract -- 1 Introduction -- 2 Research Goals -- 2.1 Research methodology -- 3 Data Collection and Sample Characteristic -- 4 Research Results -- 5 Defining the Formal Acceptability of Digital Evidence -- 6 Implementing Rules Through DEMF -- 7 Conclusion -- References. , A Comprehensive Android Evidence Acquisition Framework.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Natural language processing (Computer science). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (763 pages)
    Edition: 1st ed.
    ISBN: 9783319670560
    Series Statement: Studies in Computational Intelligence Series ; v.740
    DDC: 006.35
    Language: English
    Note: Intro -- Preface -- Contents -- Sentiment Analysis -- 1 Using Deep Neural Networks for Extracting Sentiment Targets in Arabic Tweets -- Abstract -- 1 Introduction -- 2 Background -- 3 Data Collection and Annotation -- 4 Building Word Embeddings -- 5 The Implemented Models -- 5.1 The Baseline Model -- 5.2 The Deep Neural Network Model -- 5.2.1 Bidirectional Long Short-Term Memory Networks (BI-LSTMs) -- 5.2.2 The Conditional Random Fields (CRF) Tagging Model -- 5.2.3 BI-LSTM-CRF -- 6 Performance Evaluation -- 7 Conclusion -- Acknowledgements -- References -- 2 Evaluation and Enrichment of Arabic Sentiment Analysis -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Challenges Arabic Sentiment Analysis -- 3.1 Encoding -- 3.2 Sentiment Analysis Impacted Due to Unavailability of Punctuations -- 3.3 Excess Resources Required -- 3.4 Sarcastic Tamper -- 3.5 One Word Represents Two Polarities -- 3.6 Indifferent Writing Style -- 3.7 Free Writing Style -- 3.8 Word Short Forms -- 3.9 Same Word Usage for Both Polarities -- 4 Data Collection -- 5 Implementation of Arabic Sentiment Analysis -- 6 Evaluation and Results -- 7 Conclusion -- References -- 3 Hotel Arabic-Reviews Dataset Construction for Sentiment Analysis Applications -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Arabic Sentiment Analysis -- 4 Hotel Arabic Reviews Dataset (HARD) -- 4.1 Collection -- 4.2 Properties -- 5 Sentiment Analysis -- 5.1 Text Pre-processing -- 5.2 Feature Extraction -- 5.3 Classifiers -- 6 Experimental Results -- 6.1 Bag of Words -- 6.2 Lexicon-Based Classification -- 7 Conclusions -- References -- 4 Using Twitter to Monitor Political Sentiment for Arabic Slang -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Corpus Collection and Preparation -- 3.2 Pre-processing -- 3.3 Text Classification -- 4 Results and Evaluation. , 5 Conclusion and Future Work -- References -- Estimating Time to Event of Future Events Based on Linguistic Cues on Twitter -- 1 Introduction -- 2 Related Research -- 3 Time-to-Event Estimation Method -- 4 Experimental Set-Up -- 4.1 Data Sets -- 4.2 Features -- 4.3 Training and Test Regimes -- 4.4 Evaluation and Baselines -- 4.5 Hyperparameter Optimization -- 5 Test Results -- 6 Discussion -- 7 Conclusions and Future Work -- References -- Machine Translation -- Automatic Machine Translation for Arabic Tweets -- 1 Introduction -- 2 Arabic Language Challenges Within NLP and Social Media -- 2.1 Modern Standard Arabic Challenges for MT -- 2.2 Arabic Language in Microblogs -- 3 Overview of Statistical Machine Translation -- 3.1 Language Model -- 3.2 Word Alignment -- 3.3 Translation Model -- 3.4 Decoding -- 4 Translating Arabic Tweets -- 4.1 Data Collection -- 4.2 Data Collection -- 4.3 Experiments -- 4.4 Results -- 4.5 Discussion -- 5 Conclusion and Future Work -- References -- Developing a Transfer-Based System for Arabic Dialects Translation -- 1 Introduction -- 2 Related Studies -- 3 Arabic Language Variation -- 4 Machine Translation Paradigms -- 4.1 Rule Based MT -- 4.2 Statistical MT -- 4.3 Hybrid MT -- 5 (ALMoFseH) Arabic Dialects Machine Translation -- 6 Methodology -- 6.1 Building a Lexical Database -- 6.2 The Transfer System -- 6.3 Naive Bayesian Classifier (NB) -- 6.4 Rewrite Rules for Dialectal Normalization -- 6.5 Functional Model -- 7 Evaluation of the System -- 8 Results -- 9 Conclusion -- References -- 8 The Key Challenges for Arabic Machine Translation -- Abstract -- 1 Introduction -- 2 Challenges for Arabic Translation -- 2.1 Classical Arabic -- 2.2 Modern Standard Arabic -- 2.3 Dialect Arabic -- 3 Machine Translation in Natural Language Processing -- 3.1 Metaphor Translation -- 3.2 Metaphor in Holy Quran. , 3.3 Metaphor in Modern Standard Arabic -- 3.4 Metaphor in Dialect Arabic -- 4 Named Entity Recognition Translation -- 5 Word Sense Disambiguation Translation -- 6 Conclusion -- References -- Information Extraction -- Graph-Based Keyword Extraction -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Overview -- 3.2 The Proposed Methodology -- 3.3 Dataset -- 3.4 Data Processing -- 3.5 Learn Classifier and TF/IDF -- 3.6 Performance Evaluation -- 4 Discussion -- 5 Conclusion and Future Prospects -- References -- 10 CasANER: Arabic Named Entity Recognition Tool -- Abstract -- 1 Introduction -- 2 State of the Art on NER Systems -- 2.1 Previous NE Categorization -- 2.2 NER Approaches and Systems -- 3 ANE Identification and Categorization -- 3.1 Identification of the ANE Forms and Categories -- 3.2 Relationship Between ANEs -- 4 Proposed Method -- 4.1 Analysis Transducer Establishment -- 4.2 Synthesis Transducer Establishment -- 5 Implementation and Evaluation -- 6 Conclusion -- References -- 11 Semantic Relations Extraction and Ontology Learning from Arabic Texts-A Survey -- Abstract -- 1 Introduction -- 2 Arabic Semantic Relation Extraction and Ontology Learning -- 3 Arabic Semantic Relation Extraction -- 3.1 Semantic Relation Extraction Between Arabic Named Entities -- 3.1.1 Rule-Based Approach -- 3.1.2 Machine Learning Approach -- 3.1.3 Hybrid Approach -- 3.2 Semantic Relation Extraction Between Arabic Ontological Concepts -- 4 Arabic Ontology Learning -- 4.1 Upper Ontology -- 4.1.1 Arabic WordNet Ontology -- 4.1.2 Formal Arabic Ontology -- 4.2 Domain Ontology -- 4.2.1 General Domains -- Manual Approach -- Statistical Approach -- Linguistic Approach -- Hybrid Approach -- Uncategorized -- 4.2.2 Islamic Domain -- Quran Ontology -- Hadith Ontology -- 5 Conclusion -- Information Retrieval and Question Answering. , 12 A New Semantic Distance Measure for the VSM-Based Information Retrieval Systems -- Abstract -- 1 Introduction -- 2 The Proposed Approach -- 2.1 A Novel Indexing Approach -- 2.2 The Significance Level of a Concept (SLC) -- 2.3 Semantic Distance Between Query and CS -- 3 System Architecture -- 4 Experimental Analysis -- 4.1 Experimental Setup -- 4.2 Experiments, Results, and Evaluation -- 4.2.1 The Conceptualization Levels -- 4.2.2 The Retrieval Capability -- 4.2.3 The Ranking Accuracy -- 5 Conclusion and Future Work -- Appendix: The Implementation Algorithms -- References -- An Empirical Study of Documents Information Retrieval Using DWT -- 1 Introduction -- 2 Background -- 2.1 Term Signal -- 2.2 Weighting Scheme -- 2.3 Document Segmentation -- 2.4 Wavelet Transform Algorithm -- 3 Design Issues and Implementation of Information Retrieval Using DWT -- 3.1 Problems and Design Issues -- 3.2 Implementation of the Suggested Model -- 3.3 Document Segmentation -- 3.4 Term Weighting -- 4 Experiments and Results -- 5 Conclusion -- References -- 14 A Review of the State of the Art in Hindi Question Answering Systems -- Abstract -- 1 Introduction -- 2 A Typical Pipeline Architecture of a Question Answering System -- 2.1 Question Processing -- 2.1.1 Question Classification -- 2.2 Answer Type Determination -- 2.3 Keyword Extraction -- 2.4 Query Expansion -- 2.5 Document Processing -- 2.5.1 Passage Retrieval -- 2.6 Answer Extraction -- 2.6.1 Named Entity Recognition -- 2.6.2 Answer Scoring and Ranking -- 2.6.3 Answer Presentation -- 3 Developments in Hindi Question Answering System -- 3.1 Developments in Tasks of Question Answering Systems -- 4 Introduction to Hindi Language and Its Challenges for QASs -- 5 Tools and Resources for Hindi Question Answering -- 6 Future Scopes -- References -- Text Classification. , 15 Machine Learning Implementations in Arabic Text Classification -- Abstract -- 1 Introduction -- 2 Problem Definition -- 2.1 Problem Scope, Input and Output -- 2.2 Problem Formalization -- 3 Text Classification Steps -- 3.1 Data Selection and Preparation -- 3.2 Text Preprocessing -- 3.3 Document Indexing and Term Weighting Methods -- 3.4 Feature Reduction -- 4 Classification Algorithms -- 5 Arabic Text Classification -- 6 Directions for Further Research -- 7 Conclusion -- References -- Authorship and Time Attribution of Arabic Texts Using JGAAP -- 1 Introduction -- 2 Background -- 2.1 Authorship Attribution and NLP -- 2.2 Authorship Attribution in Arabic -- 3 Data -- 3.1 Corpus Description -- 3.2 Selection of Texts -- 4 Methods -- 4.1 JGAAP -- 4.2 Canonicizers -- 4.3 Event Drivers -- 4.4 Analysis Methods -- 5 Results -- 5.1 Character n-grams -- 5.2 Word n-grams -- 5.3 Word Length -- 5.4 Rare Words -- 5.5 Most Common Words -- 6 Analysis of Errors -- 7 Future Work and Conclusions -- References -- 17 Automatic Text Classification Using Neural Network and Statistical Approaches -- Abstract -- 1 Reviewing the Previous Work -- 2 Preprocessing Procedures for the Two Proposed Classifiers -- 2.1 Word Extraction -- 2.2 Stop Words Removal -- 2.3 Word Stemming -- 2.4 Improvements -- 2.5 Reuters 21,758 Test Collection for Text Categorization -- 2.6 Term Weighting Techniques -- 3 The Proposed Statistical Classifier -- 3.1 Converting the Text Documents into a Database -- 3.2 The Resulting Database Model -- 3.3 Weighting Techniques -- 3.4 Improvements for Weighting -- 3.5 Experimental Details -- 4 Neural Network Based Classifier -- 4.1 Dimensionality Reduction for Text Categorization -- 4.2 The Proposed Neural Network Based Text Classifier -- 4.3 Experimental Details -- 5 Comparison Between Proposed Statistical Classifier and the Neural Network Based Classifier. , 6 Conclusions.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Internet of things. ; Drone aircraft-Automatic control. ; Aerial surveillance-Automatic control. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (275 pages)
    Edition: 1st ed.
    ISBN: 9783030633394
    Series Statement: Studies in Systems, Decision and Control Series ; v.332
    DDC: 629.1333902854678
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- The Swarm Is More Than the Sum of Its Drones -- 1 Introduction -- 1.1 From Drones to Swarms -- 1.2 The Challenge of Deploying a Swarm Indoors -- 1.3 Contributions of This Chapter -- 1.4 Situating the Chapter in the Context of the Literature -- 1.5 The Intended Audience for this Chapter -- 2 Background -- 2.1 An Internet of Drones -- 2.2 Application Areas for Drones, and Swarms of Drones -- 2.3 Swarming Behaviour in Natural Sciences -- 2.4 Summary -- 3 Modelling Indoor WSN Deployment -- 3.1 The Model for the Drones -- 3.2 The Model for the Application -- 3.3 The Model for the Scenario/Environments -- 3.4 Performance Measures -- 3.5 Defining Characteristics of the Approach -- 4 A Decentralised and Self-organising Approach -- 4.1 Inspiration from Nature -- 4.2 A Voronoi Tessellation-Based Approach -- 4.3 Defining Characteristics -- 4.4 The BISON Algorithm Family -- 4.5 Materials and Methods -- 4.6 Results and Discussion -- 5 The World Is a Messy Place (Full of Uncertainty and Noise) -- 5.1 The Impact of Noise -- 5.2 Materials and Methods -- 5.3 Results and Discussion -- 6 Swarm Behaviour: Drift and Diffusion -- 6.1 Measuring Group Behaviour in Biology: Drift and Diffusion -- 6.2 Materials and Methods -- 6.3 Results and Discussion -- 7 Conclusion -- 7.1 Towards an InterNET of Drones: Swarming Behaviour -- 7.2 A Word of Caution -- 8 Abbreviations and Notations -- References -- Underwater Drones for Acoustic Sensor Network -- 1 Introduction -- 2 Dynamics of Drone Modeling -- 3 Underwater Acoustic Architecture -- 3.1 Static Two-Dimensional UW-ANs -- 3.2 Static Three-Dimensional UW-ANs -- 3.3 Three-Dimensional Hybrid UW-ANs -- 4 Control and Navigation of Drone Vehicle -- 4.1 Control Law Subsystem -- 4.2 Control Allocation Subsystem -- 4.3 Navigation of AUV's -- 5 Design Issues of Acoustic Drones. , 6 Underwater Network Challenges -- 7 Emerging Applications of Underwater Drones -- 8 Conclusion and Discussion -- References -- Smart Agriculture Using IoD: Insights, Trends and Road Ahead -- 1 Introduction -- 2 Remote Sensing and Digital Image Processing for Environment Monitoring by Drones -- 2.1 Remote Sensing -- 2.2 Remote Sensing Platforms in Agriculture -- 2.3 Digital Image Processing -- 3 Drone Technology and Developments -- 3.1 Drone Systems -- 3.2 Components of an Agricultural Internet of Drone -- 3.3 Imaging Cameras Used by Agricultural Drones -- 4 Applications of Drones in Agriculture -- 4.1 Soil Properties Analysis -- 4.2 Planting and Weed Control -- 4.3 Crop Spraying -- 4.4 Crop Monitoring -- 4.5 Irrigation -- 4.6 Health Assessment -- 5 Case Study -- 6 Challenges in IoD -- 7 Conclusion -- 8 Future Work -- References -- Towards a Smarter Surveillance Solution: The Convergence of Smart City and Energy Efficient Unmanned Aerial Vehicle Technologies -- 1 Introduction -- 2 Related Work -- 2.1 Smart City and Challenges in Surveillance Use Case -- 2.2 Unmanned Aerial Vehicles -- 2.3 Internet of Drones -- 2.4 Energy Conservation in Drones -- 3 Energy Management Proposed Framework for UAVs -- 3.1 Tilt-Rotor Drone-Based Energy Conservation Framework for UAVs in Smart City Surveillance -- 4 Case Study on IoD Based Surveillance -- 4.1 Case Study on Singapore: An Energy-Efficient Smart City -- 4.2 Case Study on India: Smart City Surveillance in India -- 5 Potential Implications and Suggestion for Future Research in Smart City Surveillance -- 6 Conclusion -- References -- Efficient Design of Airfoil Employing XFLR for Smooth Aerodynamics of Drone -- 1 Introduction -- 1.1 Airfoil: Heart of Aircraft -- 2 Motivation -- 3 Science-Behind Drone Flight -- 4 Understanding the Heart of Aircraft-Airfoil -- 5 Results -- 6 Future Scope -- 7 Conclusion. , References -- Drone-Based Monitoring and Redirecting System -- 1 Introduction -- 2 Related Work -- 3 Case Studies -- 4 Conclusion -- References -- Drone Application in Smart Cities: The General Overview of Security Vulnerabilities and Countermeasures for Data Communication -- 1 Introduction -- 2 Background -- 2.1 Smart City -- 2.2 Drones -- 2.3 Challenges for Drones in Smart Cities -- 2.4 Data Communication Methods -- 3 Cybersecurity -- 3.1 Threats and Attacks -- 4 Security Countermeasures -- 4.1 Detection Measures -- 4.2 Defense Mechanisms -- 5 Conclusion -- References -- Cloud-Based Drone Management System in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 Cloud-Based Drone Management System -- 3.1 Physical Layer -- 3.2 Cloud Layer -- 3.3 Control Layer -- 4 Components of Drone -- 4.1 Software -- 4.2 Hardware -- 4.3 Communication Method -- 5 Experimental Study and Evaluation -- 5.1 Experimental Setup -- 5.2 Experimental Results -- 5.3 Discussion and Future Research Directions -- 6 Conclusion -- References -- Smart Agriculture: IoD Based Disease Diagnosis Using WPCA and ANN -- 1 Introduction -- 2 Literature Review -- 3 Proposed System Design -- 3.1 The IoD Based System Architecture -- 4 Result and Discussion -- 5 Performance Analysis -- 6 Conclusion -- References -- DroneMap: An IoT Network Security in Internet of Drones -- 1 Introduction -- 2 Overview of IoD and UAV -- 2.1 Layers of UAV Drone -- 2.2 UAV Sensor Technologies in 5G Networks -- 3 Security Threats and Attacks of IoDT (Internet of Drones Things) -- 4 Security Issues Associated by IoD -- 5 Evaluation of IoD Control Sensors -- 6 Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (517 pages)
    Edition: 1st ed.
    ISBN: 9783319266909
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.407
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- Part IIntelligent Systems and Informatics (I) -- 1 Automatic Rules Generation Approach for Data Cleaning in Medical Applications -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Data Quality in Medical Applications -- 4 Proposed Approach -- 5 Experimental Study -- 5.1 Experimental Setting -- 5.2 Experimental Results -- 6 Conclusions -- References -- 2 Action Classification Using Weighted Directional Wavelet LBP Histograms -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Action Representation and Description -- 3.1 Weighted Directional Wavelet Local Binary Pattern Histogram -- 3.2 Global Description Using Invariant Moments -- 4 Experimental Results -- 4.1 Human Action Dataset -- 4.2 Experiments and Results -- 5 Conclusions -- References -- 3 Markerless Tracking for Augmented Reality Using Different Classifiers -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 4 Methodology -- 4.1 Camera Calibration -- 4.2 Camera Pose Estimation -- 4.3 System Framework -- 4.4 Implementation Details -- 5 Experimental Results -- 6 Conclusion -- References -- 4 An Experimental Comparison Between Seven Classification Algorithms for Activity Recognition -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Classification Methods -- 3.1 Naïve Bayes Classification -- 3.2 K-Nearest Neighbor Classification -- 3.3 Neural Network -- 3.4 Support Vector Machine -- 3.5 Dynamic Time Warping -- 3.6 1 Gesture Recognition -- 3.7 D1 Recognition -- 4 Experimental Methodology and Results -- 5 Discussion and Conclusion -- References -- Machine Learning Based Classification Approach for Predicting Students Performance in Blended Learning -- 1 Introduction -- 2 Core Concepts -- 2.1 Support Vector Machines (SVMs) -- 2.2 Random Forests (RF) -- 3 The Proposed Classification System -- 3.1 Pre-processing Phase. , 3.2 Feature Extraction Phase -- 3.3 Classification Phase -- 4 Experimental Results -- 5 Conclusions and Future Work -- References -- 6 Detection of Dead Stained Microscopic Cells Based on Color Intensity and Contrast -- Abstract -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Result and Discussion -- 5 Conclusion -- Acknowledgment -- References -- Digital Opportunities for 1st Year University Students' Educational Support and Motivational Enhancement -- 1 Introduction -- 2 Testbed -- 3 Getting of the Raw Data -- 4 Results of Feedback -- 5 Numerical Results of Student Activities -- 6 Conclusions -- References -- 8 Building Numbers with Rods: Lesson Plans with Cuisenaire Method -- Abstract -- 1 Introduction -- 2 Lesson Plans -- 2.1 Worksheet 1 -- 2.2 Worksheet 2 -- 3 Application in the Field of ICT -- 4 Conclusion -- References -- Part IIMultimedia Computingand Social Networks -- Telepresence Robot Using Microsoft Kinect Sensor and Video Glasses -- 1 Introduction -- 2 The Proposed System -- 2.1 Human--Robot Interaction Using Microsoft Kinect Sensor -- 2.2 Compositing User's Video and Robot Scene's Video -- 2.3 Telepresence Using Video Glasses -- 3 Experiment Results -- 4 Conclusions -- References -- Video Flash Matting: Video Foreground Object Extraction Using an Intermittent Flash -- 1 Introduction -- 2 Video Flash Matting -- 3 Experiments and Discussions -- 4 Conclusions and Future Work -- References -- Enhanced Region Growing Segmentation for CT Liver Images -- 1 Introduction -- 2 Morphological Operations -- 3 Filtering Techniques: Preliminaries -- 4 Region Growing Segmentation -- 5 CT Liver Segmentation Proposed Approach -- 5.1 Preprocessing Phase: Applying Filters and Ribs Boundary Detection -- 5.2 Region Growing Phase -- 6 Experimental Results and Discussion -- 7 Conclusion and Future Work -- References. , A Multi-Objective Genetic Algorithm for Community Detection in Multidimensional Social Network -- 1 Introduction -- 2 Related Work -- 3 Community Detection in M-D Networks Problem -- 4 Algorithm Description -- 5 Experimental Results -- 5.1 Synthetic Network Dataset -- 5.2 Real World Social Network Data -- 5.3 Further Analysis -- 6 Conclusion and Future Work -- References -- 13 Creativity in the Era of Social Networking: A Case Study at Tertiary Education in the Greek Context -- Abstract -- 1 Introduction -- 2 Literature Review on Creativity and Social Network Tools -- 3 Research Methodology -- 4 Data Analysis and Discussion -- 5 Conclusions -- References -- OCR System for Poor Quality Images Using Chain-Code Representation -- 1 Introduction -- 2 The Proposed System -- 2.1 Characters Extraction -- 2.2 Characters Recognition -- 2.3 Estimated Text Correction -- 3 Experiment Results -- 3.1 Datasets -- 3.2 Results of Chain-Code Representation -- 3.3 Results of the Proposed System -- 4 Conclusions -- References -- Human Thermal Face Extraction Based on SuperPixel Technique -- 1 Introduction -- 2 Theoretical Background -- 2.1 Quick-Shift Method -- 2.2 Otsu's Thresholding Method -- 3 Proposed Thermal Face Extraction Model -- 4 Experimental Results and Discussion -- 5 Conclusion -- References -- Unsupervised Brain MRI Tumor Segmentation with Deformation-Based Feature -- 1 Background -- 2 Methods -- 2.1 Segmentation of Lateral Ventricles -- 2.2 3-Dimensional Alignment -- 2.3 Transforming Lateral Ventricular Deformation to Feature -- 3 Experiments -- 3.1 Experimental Settings and Evaluation Methods -- 3.2 Results and Discussion -- 4 Conclusion -- References -- Face Sketch Synthesis and Recognition Based on Linear Regression Transformation and Multi-Classifier Technique -- 1 Introduction -- 2 Preliminaries -- 2.1 Gabor Features. , 2.2 Linear Discriminant Analysis (LDA) -- 2.3 Classifier Fusion -- 3 Proposed Model -- 3.1 Photo to Sketch Transformation -- 3.2 Training Phase -- 3.3 Testing Phase -- 4 Experimental Results and Discussion -- 4.1 Experimental Setup -- 4.2 First Experiment (Photo to Pseudo-Sketch Transformation) -- 4.3 Second Experiment (Face Sketch Recognition) -- 4.4 Discussion -- 5 Conclusions and Future Work -- References -- Part IIISwarms Optimization and Applications -- A New Learning Strategy for Complex-Valued Neural Networks Using Particle Swarm Optimization -- 1 Introduction -- 2 Complex-Valued Neural Networks -- 3 Particle Swarm Optimization -- 4 Problem Formulation -- 5 Data Description and Processing -- 6 Experimental Results -- 7 Conclusions -- References -- A XOR-Based ABC Algorithm for Solving Set Covering Problems -- 1 Introduction -- 2 Problem Description -- 3 Artificial Bee Colony Algorithm -- 4 Improving Solution Quality and Solving Speed -- 5 Experiments and Results -- 6 Conclusions -- References -- 20 Abdominal CT Liver Parenchyma Segmentation Based on Particle Swarm Optimization -- Abstract -- 1 Introduction -- 2 Preliminaries -- 3 The Proposed Segmentation Approach -- 3.1 Preprocessing Phase -- 3.2 CT Image Clustering Based on PSO Phase -- 3.3 Post-Processing Phase: Morphological Operators -- 3.4 Region of Interest Extraction Phase -- 3.5 Evaluation Phase -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Works -- References -- Grey Wolf Optimizer and Case-Based Reasoning Model for Water Quality Assessment -- 1 Introduction -- 2 The Proposed GWO-CBR Hybrid Classification Model -- 2.1 Case Representation Phase -- 2.2 Retrieve Phase -- 2.3 Reuse/Adapt Phase -- 2.4 Revise Phase -- 2.5 Retrain Phase -- 3 Experimental Analysis and Discussion -- 4 Conclusions and Future Work -- References. , New Rough Set Attribute Reduction Algorithm Based on Grey Wolf Optimization -- 1 Introduction -- 2 Preliminaries -- 2.1 Rough Set Theory -- 2.2 Grey Wolf Optimization -- 3 Rough Set Based on Gray Wolf for Attribute Reduction (GWORSAR) -- 4 Experimental Results and Discussions -- 5 Conclusion -- References -- Solving Manufacturing Cell Design Problems Using a Shuffled Frog Leaping Algorithm -- 1 Introduction -- 2 Related Work -- 3 Manufacturing Cell Design Problem -- 3.1 Similarity Matrices -- 4 Shuffled Frog Leaping Algorithm -- 4.1 Discretization of Decision Variables -- 5 Experimental Result -- 6 Conclusion and Future Work -- References -- A Hybrid Bat-Regularized Kaczmarz Algorithm to Solve Ill-Posed Geomagnetic Inverse Problem -- 1 Introduction -- 2 The Proposed Regularized Kaczmarz Model -- 3 Experimental Results and Discussion -- 4 Conclusion and Future Work -- References -- A Fish Detection Approach Based on BAT Algorithm -- 1 Introduction -- 2 The Bat Algorithm: An Overview -- 3 The Proposed Approach -- 4 Experimental Results and Discussion -- 5 Conclusions and Future Directions -- References -- Part IVHybrid Intelligent Systems -- Hybrid Differential Evolution and Simulated Annealing Algorithm for Minimizing Molecular Potential Energy Function -- 1 Introduction -- 2 The Problem of Minimizing Molecular Potential Energy Function -- 3 Hybrid Differential Evolution Algorithm for Minimizing Molecular Potential Energy Function -- 3.1 The Proposed HDESA Algorithm -- 4 Numerical Experiments -- 4.1 Parameter Setting -- 4.2 The General Performance of the Proposed HDESA with the Minimization of Molecular Potential Energy Function Problem -- 4.3 Comparison Between the Proposed HDESA Algorithm and Other Algorithms -- 5 Conclusion -- References -- A Hybrid Classification Model for EMG Signals Using Grey Wolf Optimizer and SVMs -- 1 Introduction. , 2 Related Work.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Computational intelligence. ; Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (856 pages)
    Edition: 1st ed.
    ISBN: 9789811931482
    Series Statement: Lecture Notes in Networks and Systems Series ; v.479
    DDC: 006.3
    Language: English
    Note: Intro -- DoSCI-2022 Steering Committee Members -- Preface -- Contents -- Editors and Contributors -- TransCRF-Hybrid Approach for Adverse Event Extraction -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 2 Related Work -- 3 Proposed Method -- 3.1 Preprocessing and Feature Engineering -- 3.2 Phrase Extraction -- 4 Experimental Results -- 4.1 Datasets -- 4.2 Metrics -- 4.3 Evaluation -- 5 Conclusions -- References -- Process of Recognition of Plant Diseases by Using Hue Histogram, K-Means Clustering and Forward-Propagation Deep Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Preprocessing -- 3.2 Hue-Based Disease Spot Identification -- 3.3 Hue Histogram and K-means-Based Segmentation -- 3.4 Features Extraction -- 3.5 Disease Classification Using FPNN -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Result of Segmentation Algorithms -- 4.3 Neural Network Performance -- 5 Conclusions -- References -- Analysis of Variants of BERT and Big Bird on Question Answering Datasets in the Context of Scientific Research Article Reviews -- 1 Introduction -- 2 Related Works -- 3 BERT and Big Bird a Quick View -- 3.1 BERT -- 3.2 Big Bird -- 3.3 Question Answering Datasets -- 4 Evaluation and Comparison of Various BERT and Big Bird Models -- 5 Conclusions and Observations -- References -- Twitter Opinion Mining on COVID-19 Vaccinations by Machine Learning Presence -- 1 Introduction -- 1.1 Valence Aware Dictionary and Sentiment Reasoner (VADER) -- 1.2 Word to Vector (W-V) -- 1.3 Term Frequency-Inverse Document Frequency (TF-IDF) -- 2 Background Study -- 3 Methodologies -- 3.1 Data Collection (DC) -- 3.2 Text Preparation (TP) -- 3.3 Feature Engineering (FE) and Exploratory Data Analysis (EDA) -- 3.4 Sentiment Analysis (SA)/Opinion Mining (OM) -- 3.5 Sentiment Analysis (SA)/Opinion Mining (OM) with VADER. , 3.6 Lexicon-based Models -- 3.7 Function to Clean and Remove Noise -- 3.8 Summary of VADER Lexicon Analysis (SVLA) -- 3.9 Analysis of Time Based -- 3.10 Inference Based on Probability -- 3.11 VADER Sentiment Analysis -- 3.12 Exploratory Data Analysis -- 3.13 Probabilistic Inference (PI) -- 3.14 Analysis of Correlation -- 3.15 Analyses of Users -- 3.16 Analysis of Word Decomposition -- 3.17 Long Short-term Memory (LSTM) with Confusion Matrix -- 3.18 Matrix of Confusion -- 4 Conclusion -- References -- Blockchain-Based Efficient and Secured Framework for Logistic Management -- 1 Introduction -- 2 Background of Research -- 2.1 Overview of Blockchain -- 2.2 Properties of Blockchain -- 2.3 Types of Blockchain Network -- 3 Cryptographic Method Used in Blockchain -- 4 Blockchain Application in Different Domain -- 5 Review of Literature and Related Work -- 6 Research Problems -- 7 Research Questions -- 8 Research Objectives -- 9 Research Methodology -- 10 Expected Impact -- 11 Conclusion and Future Recommendation -- References -- Blockchain-Based Framework to Handle Security and Privacy for IoT System -- 1 Introduction -- 2 Literature Survey -- 2.1 An Overview of IoT -- 2.2 An Overview of Blockchain -- 3 Research Problem -- 3.1 Research Questions -- 3.2 Research Objectives -- 3.3 Research Methodology -- 4 Expected Impact -- 5 Conclusion -- References -- Knowledge Management Using Blockchain Technology for Digital Resources -- 1 Introduction -- 1.1 Introduction to Blockchain -- 1.2 Blockchain Technology's Characteristics -- 1.3 The Six-Layer Technical Model of the Blockchain -- 2 Research Problem -- 2.1 Research Questions -- 2.2 Research Objectives -- 3 Research Methodology -- 4 Expected Impact -- 5 Conclusion -- References -- Blockchain Mechanism for Resolving Privacy Issues in a Smart City -- 1 Introduction -- 1.1 A Subsection Sample -- 2 Literature Survey. , 2.1 Smart Cities -- 2.2 Security and Privacy Issues in Smart Cities -- 2.3 Blockchain -- 2.4 Types of Blockchain -- 2.5 Use Cases of Blockchain to Handle Security and Privacy in Different Domains -- 3 Research Problem -- 3.1 Research Questions -- 3.2 Research Objectives -- 3.3 Research Methodology -- 4 Expected Impact -- 5 Conclusion -- References -- Design and Analysis of 50 Channel by 40 Gbps DWDM-RoF System for 5G Communication Based on Fronthaul Scenario -- 1 Introduction -- 2 Previous Publications -- 3 Methodologies -- 4 The Proposed System -- 4.1 Tx Part -- 4.2 Transmission Part -- 4.3 Rx Part -- 5 Results and Discussion -- 6 Conclusion -- References -- A Semantic Approach to Data Integration from Clinical Polystore -- 1 Introduction -- 2 Background -- 2.1 R2RML and RML Data Mappings -- 2.2 Ontology -- 3 Related Work -- 4 Architecture for Semantic Data Integration -- 5 Clinical Data Integration Through Query Translation -- 5.1 Motivating Scenerio -- 5.2 Ontology-Based Clinical Data Integration -- 6 Conclusion -- References -- Service Matter Judgement Prediction Using Machine Learning -- 1 Introduction -- 2 Machine Learning Model -- 3 Judgement Prediction Model -- 4 Dataset and Feature Identification -- 5 Feature Impact Analysis -- 6 Experimental Results -- 7 Outcome Analysis and Discussion -- 8 Conclusion and Future Scope -- References -- Predicting Smart Building Occupancy Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Dataset and Machine Learning Model Used for Experiment -- 3.1 Dataset -- 3.2 Machine Learning Model -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- References -- Formal Specification of Dynamic Load-Based Coordinator Selection Algorithm with Recovery in Distributed Systems -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 Formal Modeling Technique: Event-B. , 5 Formal Specification of the Proposed Algorithm Using Refinement Levels -- 6 Conclusion and Future Work -- References -- Smart Cities Population Classification Using Hadoop MapReduce -- 1 Introduction -- 1.1 Management of Big Data in Smart City -- 1.2 Hadoop MapReduce -- 2 Related Works -- 3 Problem Statement -- 4 Aim of Study and Objectives -- 5 Objectives -- 6 Proposed System -- 7 Methodology -- 7.1 First Experiment -- 7.2 Second Experiment -- 7.3 Third Experiment -- 7.4 Fourth Experiment -- 7.5 Fifth Experiment -- 8 Conclusion -- References -- Performance Evaluation of Optimizers in the Classification of Marble Surface Quality Using CNN -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Collection and Preprocessing -- 2.2 Methodology -- 2.3 Model Training -- 3 Results -- 3.1 Analysis of Machine Learning Algorithms with Base and Augmented Dataset -- 4 Conclusion -- References -- Predictive Analysis on Customer Churn Using Machine Learning Algorithms -- 1 Introduction -- 2 Related Works -- 2.1 Data Mining Techniques -- 2.2 Churn Models Developed -- 3 Methodology -- 4 Result -- 4.1 Random Forest -- 4.2 XGBOOST Classifier -- 4.3 Hybrid Model -- 5 Conclusion -- References -- Data Fusion-Based Smart Condition Monitoring of Critically Applied Rotating Machines -- 1 Introduction -- 2 Methodology -- 3 Technique Used -- 3.1 Feature Extraction in the Time Domain -- 3.2 Feature Selection Techniques -- 3.3 Classification Techniques -- 4 Results and Discussion -- 5 Conclusion -- References -- Depression Level Determination Using Deep Learning to Help Students in the COVID-19 Pandemic Situation -- 1 Introduction -- 2 Background Study -- 3 Proposed System -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- Recognition and Classification of Facial Expressions Using Artificial Neural Networks -- 1 Introduction -- 2 Related Works. , 3 State of the Art -- 3.1 Emotion Recognition -- 3.2 SFEW and Recognition -- 4 Generative Adversarial Networks -- 4.1 Good Representations of the Data -- 4.2 DCGAN's Work Contributes in Several Ways to the State of the Art -- 5 Datasets -- 5.1 FER 2013 -- 5.2 CASIA -- 5.3 CK+ -- 5.4 SFEW 2015 -- 6 Methodology -- 6.1 First Pre-processing Methodology -- 6.2 Second Pre-processing Methodology -- 7 Experimentation -- 7.1 Conventional Knowledge Transfer -- 7.2 Knowledge Transfer Using GANs -- 8 Results and Discussion -- 9 Conclusion -- References -- Maize Leaf Disease Detection Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Dataset Description -- 3.2 Convolutional Neural Network -- 3.3 Xception Architecture -- 3.4 Inception Architecture -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Works -- References -- Yield Forecast of Soyabean Crop Using Peephole LSTM Framework -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Dataset -- 5 Experimentation Settings -- 6 Results -- 7 Conclusion and Future Scope -- References -- Vehicle Object Detection Using Open CV -- 1 Introduction -- 2 Related Work on Vehicle Tracking -- 3 Related Works on Vehicle Detection -- 4 System Architecture -- 5 Vehicle Dataset -- 6 Proposed Methodology -- 6.1 YOLO for Object Detection -- 6.2 Open CV -- 6.3 Coco Dataset -- 7 Experimental Results -- 8 Conclusion and Future Scope -- References -- Using AI-Based Approaches in Health Care for Predicting Health Issues in Pregnant Women -- 1 Introduction -- 2 Literature Survey -- 3 Experimental Setup Used for the Research Work -- 4 Forecasting of Length of Stay Using Machine Learning Approaches -- 4.1 Building Classification Predictive Model -- 4.2 Experimentation -- 4.3 Dataset Used -- 4.4 Performance Analysis of Data Mining Models -- 5 Conclusion -- References. , Industrial IoT with Secure Authentication Mechanism Through Blockchain Technology.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computational intelligence-Congresses. ; Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (812 pages)
    Edition: 1st ed.
    ISBN: 9789811625978
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1388
    Language: English
    Note: Intro -- ICICC-2021 Steering Committee Members -- Preface -- Contents -- About the Editors -- Automatic Removal of Eye Blink Artefacts from EEG Data Using Spatio-Temporal Features -- 1 Introduction -- 2 Experimental Design and Data Acquisition -- 3 Proposed Enhanced Artefact Elimination Algorithm -- 3.1 EEG Data Pre-Processing -- 3.2 EEG Dataset Epoching -- 3.3 Independent Components Extraction and Artefact Removal Success Indicator Calculation -- 3.4 Artefact Removal and Success Indicator Calculation -- 4 Results -- 5 Conclusion -- References -- Autoencoder-Based Model for Detecting Accounting Statement Fraud -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Data and Variables -- 4 Data Analysis and Interpretation -- 4.1 Artificial Neural Network -- 4.2 Autoencoder -- 4.3 Network Training -- 5 Fraud Detection -- 6 Discussion -- 7 Conclusion -- References -- Increase in Mental Health Cases Post COVID Outbreak -- 1 Introduction -- 2 Background Study -- 3 Methodology -- 3.1 About the Dataset -- 3.2 Environmental Setup -- 3.3 Libraries Used -- 4 Results and Discussion -- 4.1 Dataset Evaluation -- 4.2 Heat Map Comparison -- 4.3 KNN Result -- 5 Future Scope -- 6 Conclusion -- References -- An Efficient Approach to Predict Fear of Human's Mind During COVID-19 Outbreaks Utilizing Data Mining Technique -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Handling -- 3.4 Classifier Selection -- 4 Outcomes -- 5 Conclusion -- References -- Evolutionary Algorithms for Face Recognition with Mask -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 3 Data Augmentation -- 4 Feature Extraction and Normalization -- 5 Feature Selection -- 5.1 Crow Search Algorithm (CSA) -- 5.2 Cuttle Fish Algorithm (CFA) -- 5.3 Classification -- 6 Results -- 7 Conclusion and Future Scope. , References -- Stock Price Prediction Using Reinforcement Learning -- 1 Introduction -- 2 Related Works -- 3 Reinforcement Learning -- 4 Stock Price Prediction -- 5 Methodology -- 6 Experimental Work -- 7 Conclusion -- References -- Sentiment Analysis of Bangla Text Using Gated Recurrent Neural Network -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Collection -- 3.2 Features Extraction -- 3.3 Dataset Training -- 3.4 Gated Recurrent Unit Network (GRU) -- 4 Result and Analysis -- 5 Conclusion -- References -- Leveraging User Comments in Tweets for Rumor Detection -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach of Leveraging User Comments for Rumor Detection -- 4 Results and Discussion -- 5 Conclusion -- References -- A Cost-Efficient QCA XOR Function Based Arithmetic Logic Unit for Nanotechnology Applications -- 1 Introduction -- 2 A Brief Oversight of Quantum-Dot Cellular Automata -- 2.1 Majority Gate -- 2.2 QCA Clocking -- 2.3 QCA Designer -- 3 QCA-based Proposed Logic Design -- 3.1 Reviews on XOR Gate -- 3.2 Proposed QCA Architecture of XOR Gate Topology -- 3.3 Proposed Full Adder Usıng Proposed XOR (N7) Gate -- 3.4 Proposed Full Subtractor Using Proposed XOR Gate (N7) -- 3.5 1-bit ALU Architecture -- 4 Simulation Result and Discussion -- 5 Conclusıon -- References -- Forecasting of PM10 Using Intelligent Crow Search Algorithm Tuned Feed-Forward Neural Network -- 1 Introduction -- 2 Intelligent Crow Search Algorithm -- 3 Construction of the Forecasting Architecture Model -- 4 Results -- 5 Conclusion -- References -- A Hybrid Fusion-Based Algorithm for Underwater Image Enhancement Using Fog Aware Density Evaluator and Mean Saturation -- 1 Introduction -- 2 Proposed Method -- 2.1 Multiscale Fusion -- 2.2 Gray World White Balancing Algorithm -- 2.3 Red-Compensated White Balancing Algorithm+Gray World Algorithm. , 2.4 Edge Preserving Decomposition-Based Single Image Haze Removal Algorithm -- 2.5 Fog Aware Density Evaluator -- 3 Results and Discussion -- 4 Conclusion -- References -- Application of Hybridized Whale Optimization for Protein Structure Prediction -- 1 Introduction -- 2 Protein Structure Prediction Problem (PSP) -- 2.1 Problem Formulation -- 3 Hybrid Whale Optimization Algorithm -- 4 Results -- 4.1 Wilcoxon Rank-Sum Test -- 4.2 Convergence Property Analysis -- 4.3 Box Plot Analysis -- 5 Conclusion -- References -- Clinical Named Entity Recognition Methods: An Overview -- 1 Introduction -- 2 Literature Review -- 2.1 Machine-Learning-Based Methods -- 2.2 Deep-Learning-Based Methods -- 2.3 Active-Learning-Based Methods -- 2.4 Other Clinical Named Entity Recognition Methods -- 3 Research Gap and Issues -- 4 Analysis and Discussion -- 4.1 Analysis Using Published year -- 4.2 Analysis Using Methods -- 4.3 Analysis Using Evaluation Metrics -- 4.4 Analysis Using Values of Performance Metrics -- 5 Conclusion -- References -- Mobile Phone SMS Notification Behavior Analysis Using Machine Learning Technique -- 1 Introduction and Background -- 2 Literature Review -- 3 Methodology -- 3.1 Overview of Dataset -- 3.2 Block Diagram -- 3.3 Dataset Preprocessing -- 3.4 Noise Reduction from Dataset -- 3.5 Classification Methods -- 4 Performance Analysis -- 4.1 Assessment Metric -- 4.2 Assessment Results -- 5 Conclusion -- References -- Computer Vision with Deep Learning Techniques for Neurodegenerative Diseases Analysis Using Neuroimaging: A Survey -- 1 Introduction -- 2 Neurodegenerative Diseases and Types -- 3 Neuroimaging in Disease Diagnosis -- 4 Computer Vision-Based Framework for Medical Image Analysis -- 5 Related Work -- 6 Challenges or Research Questions -- 7 Conclusion and Future Work -- References. , Breast Cancer Risk Prediction Using Different Clustering Techniques -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Instances and Dataset -- 3.2 Missing Data Handling -- 3.3 Find the Optimal Number of Clusters -- 3.4 Elbow Method (WCSS Method) -- 3.5 Dendrogram -- 3.6 Applying Principal Component Analysis (PCA) with Kernel -- 3.7 Radial Basis Function Kernel (RBF) -- 3.8 Applying Clustering -- 3.9 K-Means Cluster -- 3.10 Hierarchical Clustering (HC) -- 4 Experimented Analysis and Discussions -- 4.1 Accuracy (ACCR) -- 4.2 Precision (PRC) -- 4.3 Recall (Sensitivity) (RECL) -- 4.4 F1-Score -- 4.5 Specificity (SPE) -- 4.6 Explanation of the Analysis -- 5 Conclusion -- References -- Learner Model of Intelligent Tutoring System Based on Bayesian Network -- 1 Introduction -- 2 Overview of Intelligent Tutoring System -- 2.1 ITS Mechanisms -- 3 Learner Model of ITS Based on Bayesian Network -- 3.1 Bayesian Network -- 4 Bayesian Learner Model Assessment -- 5 Conclusion -- References -- CADBAIG: Context-Aware Dictionary-Based Automated Insight Generator -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach: CADBAIG (Context-Aware Dictionary-Based Automated Insight Generator) -- 4 Working of CADBAIG on a Sample Research Paper -- 5 Results and Comparative Analysis -- 6 Conclusion and Future Work -- References -- Human Depression Prediction Using Association Rule Mining Technique -- 1 Introduction -- 2 Existing Works -- 3 Methodology -- 3.1 Collection of Data -- 3.2 Data Preprocessing -- 3.3 Chi-Square Correlation -- 3.4 Association Rule Mining -- 3.5 Simulation Environment -- 3.6 R Packages -- 4 Outcomes -- 5 Conclusion -- References -- Implementation of A Smart Helmet with Alcohol and Fall Detection and Navigation System -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Fall Detection System -- 3.2 Alcohol Detection System. , 3.3 Navigation System -- 3.4 Microcontroller and Implementation -- 4 Algorithm -- 5 Analysis and Results -- 6 Conclusion -- References -- BlockFITS: A Federated Data Augmentation Modelling for Blockchain-Based IoVT Systems -- 1 Introduction -- 2 Literature Review -- 2.1 Internet of Vehicular Things (IoVT) -- 2.2 Blockchain -- 2.3 Federated Learning -- 2.4 Data Augmentation -- 3 System Model -- 3.1 Requisite Definitions -- 3.2 Workflow of the System -- 4 Conclusion -- References -- Comparative Analysis for Improving Accuracy of Image Classification Using Deep Learning Architectures -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem Identification -- 1.3 Solution -- 2 Dataset -- 3 Related Architecture Work -- 4 Result Analysis -- 5 Model Compilation, Training, and Model Evaluation -- 6 Discussion and Comparison -- 7 Future Scope -- 8 Experiment Approach -- 9 Limitation and Precaution -- 10 Conclusion -- References -- Infrared Thermography-Based Facial Classification Using Machine Learning -- 1 Introduction -- 2 Infrared Thermography-Based Face Recognition -- 2.1 Discrete Wavelet Transform (DWT) -- 3 Feature Extraction -- 4 Feature Reduction and Selection -- 5 Results and Discussion -- 6 Conclusion -- References -- An Efficient Cluster Assignment Algorithm for Scaling Support Vector Clustering -- 1 Introduction -- 2 Background Literature -- 2.1 Background: Core Vector Machines -- 2.2 Background: Ball Vector Machine -- 3 Efficient Cluster Computation : Proposed Approach -- 3.1 Proposed Efficient Clustering Approach -- 3.2 Experimental Setup -- 4 Results and Discussions -- 5 Conclusions -- References -- In Silico Analysis of Plant-Derived Medicinal Compounds Against Spike Protein of SARS-CoV-2 and Ace2 -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection and Preparation -- 2.2 Binding Site Selection and Preparation -- 2.3 Molecular Docking. , 3 Results.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (933 pages)
    Edition: 1st ed.
    ISBN: 9783319483085
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.533
    DDC: 006.3
    Language: English
    Note: Preface -- Organization -- Honarary Chair -- General Chair -- International Advisory Board -- Track Chairs -- Publicity Chairs -- International Program Committee -- Workshop/Special Session Chair -- Local Arrangement Committee -- Plenary Speakers -- The Story and Future of WiFi -- Biography -- A Look at the Working World of Tomorrow's Digital Society -- Biography -- Tutorial -- Pattern Recognition in Intelligent Systems -- Biography -- Contents -- Intelligent Language Processing Track -- Further Investigations for Documents Information Retrieval Based on DWT -- 1 Introduction -- 2 Background -- 2.1 Term Signal -- 2.2 Weighting Scheme -- 2.3 Applying Wavelet Transform -- 3 A Further Investigation to DWT -- 3.1 Document Segmentation -- 3.2 Term Weighting -- 4 Experiments and Results -- 5 Conclusion -- References -- Knowledge Representation in Intelligent Tutoring System -- 1 Introduction -- 2 Features of the Knowledge Representation in ITS -- 3 Comparison Between Knowledge Representation Approaches -- 4 Approaches Analysis -- 5 Representing a Bayesian Network with the Taxonomy -- 6 Conclusions -- References -- Multimodal Graph-Based Dependency Parsing of Natural Language -- Abstract -- 1 Introduction and Motivation -- 2 Previous Work -- 2.1 Dependency Parsing -- 2.2 Context Representation -- 3 Context-Integrating Dependency Parser -- 4 Solution Architecture -- 5 Experiments -- 5.1 Dataset Preparation -- 5.2 Experiments Results -- 6 Conclusion -- 7 Future Work -- References -- Arabic Text Classification Based on Word and Document Embeddings -- 1 Introduction -- 2 Related Work -- 3 Neural Embedding Models -- 3.1 Continuous Bag-of-Words Model (CBOW) -- 3.2 Skip-Gram Model -- 3.3 Glove Model -- 3.4 Document Embedding -- 3.5 Document Embeddings Based on Word Vectors Averaging -- 4 Experimental Results -- 4.1 Evaluation Method and Data. , 4.2 Evaluation Results -- 5 Conclusion -- References -- An Enhanced Distance Based Similarity Measure for User Based Recommendations -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Enhanced Distance Based Similarity Measure -- 4 Experimental Evaluation -- 4.1 Datasets -- 4.2 Experiment Setup -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- Semantic-Based Feature Reduction Approach for E-mail Classification -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Feature Reduction and Weighting -- 5 Classifiers -- 5.1 Naïve Bayes -- 5.2 Support Vector Machine -- 5.3 J48 Classifier -- 5.4 Logistic Regression -- 5.5 Random Forest -- 6 Experimental Evaluation and Discussion -- 6.1 Evaluation Measures -- 6.2 Results and Discussion -- 7 Conclusion and Future Work -- References -- A New Method for Interoperability Between Lexical Resources Using MDA Approach -- Abstract -- 1 Introduction -- 2 State of the Art -- 2.1 Lexical Resources -- 2.2 MDA Transformation -- 2.3 Interoperability Issue -- 3 Proposed Method -- 3.1 Achievement of the Two Independent Models PIM (Source and Target) of Each LR and Source PSM -- 3.2 Achievement of the Transformation Module in ATL -- 3.3 Generation of the Specific Model PSM (OWL-DL) -- 4 Implantation: Transformation of LMF Lexicon to OWL-DL Ontology Using MDA Approach -- 5 Discussions -- 6 Conclusion -- References -- Statistical Machine Translation Context Modelling with Recurrent Neural Network and LDA -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Data Sets and Experimental Setup -- 3.2 Proposed Model -- 3.3 Latent Dirichlet Allocation for Context Modeling -- 4 Experiment -- 5 Results -- 6 Conclusion and Future Work -- Optimizing Fuzzy Inference Systems for Improving Speech Emotion Recognition -- 1 Introduction. , 2 Speech Material -- 3 The Proposed Optimization Method -- 3.1 Particle Swarm Optimization Method for Cluster Radii -- 4 Speech Emotion Recognition System -- 4.1 Emotion Dimension Estimation -- 4.2 Emotional Classification -- 5 Conclusion -- References -- Tree-Based HMM State Tying for Arabic Continuous Speech Recognition -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Approach -- 3.1 Context Independent Stage -- 3.2 Context Dependent Stage -- 3.3 HMM State Tying Using Arabic Phonetic Decision Tree -- 4 Experiments and Results -- 5 Conclusion and Future Work -- References -- Arabic Fine-Grained Opinion Categorization Using Discriminative Machine Learning Technique -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 English Fine-Grained Categorization -- 2.2 Arabic Fine Grained Categorization -- 3 Our Proposed Approach -- 3.1 Dataset -- 3.2 Arabic Opinion Taxonomy -- 3.3 OPINAR Lexicon -- 4 Experiments on Arabic Opinion Categorization Using CRF -- 4.1 CRF (Conditional Random Fields) -- 4.2 Tasks -- 4.3 Interpretations -- 5 Conclusion -- References -- Towards Improving Sentiment Analysis in Arabic -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 4 Implementation of Arabic Sentiment Analysis -- 5 Evaluation and Results -- 6 Error Analysis -- 7 Conclusion -- References -- A Spell Correction Model for OCR Errors for Arabic Text -- Abstract -- 1 Introduction -- 1.1 Arabic Orthographic Properties -- 1.2 OCR Errors -- 2 The Previous Work -- 3 The Proposed Model Description -- 3.1 Constructing the "Wrong Shape" Table -- 3.2 Normalization -- 3.3 Alignment -- 3.4 Calculating the Probability -- 4 Using the Character Model in Correcting Arabic OCR Errors -- 4.1 Segmentation -- 4.2 Replacement Characters and Generate Candidates -- 4.3 Calculate the Bayes' Rule -- 5 Experimental Results -- 5.1 Training and Test Data. , 6 Conclusion and Future Work -- Acknowledgements -- References -- AKEA: An Arabic Keyphrase Extraction Algorithm -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Arabic Keyphrase Extractor Algorithm (AKEA) -- 4 Evaluation -- 4.1 Data Set -- 4.2 Evaluation Metrics -- 4.3 Evaluation Results -- 5 Conclusion -- Lexicon Free Arabic Speech Recognition Recipe -- 1 Introduction -- 2 Related Work -- 3 Arabic Speech Recognition System -- 3.1 Acoustic Model -- 3.2 Language Model -- 3.3 Decoding -- 4 Front-End Preparation -- 4.1 Convert the Arabic Text to Latin (Transcription Process) -- 4.2 Convert the Transcription to Alias -- 4.3 Voice Feature Extraction -- 5 The Experiment -- 6 Results -- 7 Conclusion -- References -- Agent Productivity Measurement in Call Center Using Machine Learning -- 1 Introduction -- 2 Proposed Framework -- 2.1 Productivity Measurement Definition -- 2.2 Speech Recognition and Speaker Diarization -- 2.3 Sentiment Analysis -- 2.4 Data Validity -- 3 Front-End Preparation -- 3.1 Audio Diarization and Speech Recognition -- 3.2 Converting the Arabic Text into Latin (Transcription Process) -- 3.3 Training the Naïve Bayes Classifier -- 4 The Experiment -- 5 Results -- 6 Conclusion -- References -- Natural Language Processing for Arabic Metaphors: A Conceptual Approach -- Abstract -- 1 Introduction -- 1.1 Definition of Metaphors -- 1.2 Types of Metaphors -- 2 Arabic Language -- 2.1 Classical Arabic -- 2.2 Modern Standard Arabic -- 2.3 Dialect Arabic -- 3 Metaphors in Arabic -- 3.1 Metaphors in MSA -- 3.2 Metaphors in Holy Qura'n -- 3.3 Metaphors in Dialect Arabic -- 4 Arabic Metaphors in Natural Language Processing -- 4.1 Machine Translation for Arabic Metaphors -- 5 Conclusion -- References -- Alserag: An Automatic Diacritization System for Arabic -- Abstract -- 1 Introduction -- 2 System Architecture. , 3 Development of the System Resources -- 3.1 Dictionary -- 3.2 The Linguistic Rules -- 4 Evaluation and Benchmarking -- 5 Conclusion -- References -- Using Text Mining to Analyze Real Estate Classifieds -- 1 Introduction -- 2 Data Preparation -- 3 Using Text Mining to Analyze Classifieds -- 3.1 Text Mining -- 3.2 Feature Selection and Preprocessing -- 3.3 Linear Regression -- 4 Analysis -- 5 Related Work -- 6 Conclusion and Future Work -- References -- Intelligent Systems Track -- Mitigating Malware Attacks via Secure Routing in Intelligent Device-to-Device Communications -- 1 Introduction -- 1.1 Problem Definition and Related Work -- 1.2 Summary of Contributions -- 2 System Model -- 2.1 Environment -- 2.2 Network Set-Up -- 3 Repeated Malware-Defense Secure Routing Games (RMSR) -- 4 Repeated Malware-Defense Secure Routing Protocol -- 5 Performance Evaluation -- 6 Conclusion and Future Work -- References -- An Efficient System for Finding Functional Motifs in Genomic DNA Sequences by Using Nature-Inspired Algorithms -- Abstract -- 1 Introduction -- 2 Problem Definition and Related Work -- 2.1 The Motif Finding Problem -- 2.2 Current Motif Finding Algorithms and Related Work -- 3 Methods and Materials -- 3.1 Cuckoo Search Algorithm (CS) -- 3.2 Modified Adaptive Cuckoo Search (MACS) -- 3.3 Hybridizing GSA and PSO -- 4 Problem Formulation -- 4.1 Motifs Representation -- 4.2 Objective Function -- 5 Experimental Results -- 6 Results and Discussions -- 7 Discussion -- 8 Conclusions -- References -- Security as a Service Model for Cloud Storage -- Abstract -- 1 Introduction -- 2 Related Work -- 3 The Proposed Security as a Service Model -- 3.1 The Proposed Authentication Sub-system -- 3.2 The Proposed Access Control Sub-system -- 3.3 The Proposed Auditing Sub-system -- 3.4 The Proposed Data Management Sub-system -- 4 Experiments and Discussion. , 5 Conclusion.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Soft computing -- Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (620 pages)
    Edition: 1st ed.
    ISBN: 9783642196447
    Series Statement: Advances in Intelligent and Soft Computing Series ; v.87
    DDC: 006.3
    Language: English
    Note: Intro -- Title Page -- Preface -- Organization -- Contents -- Invited Papers -- Sequence Package Analysis and Soft Computing: Introducing a New Hybrid Method to Adjust to the Fluid and Dynamic Nature of Human Speech -- Introduction -- A New Hybrid Method -- BNF (Backus-Naur Form) -- Domain-Independent -- Language-Independent -- Granularity -- Illustrations -- High Anger Level -- Moderate Anger Level -- Coda -- References -- Controller Tuning Using a Cauchy Mutated Artificial Bee Colony Algorithm -- Introduction -- Permanent Magnet Synchronous Motor -- Problem Formulation -- Artificial Bee Colony Algorithm -- Modified Artificial Bee Colony Algorithm -- Experimental Results -- Application to Parameter Estimation of PI Controller in PMSM Drive -- Conclusions -- References -- Image Analysis and Processing -- Automatic Detection of White Grapes in Natural Environment Using Image Processing -- Introduction -- DDR Unique Characteristics and Their Impact on the System -- The Grape Recognition System -- Results and Discussion -- Conclusions and OngoingWork -- References -- Securing Patients Medical Images and Authentication System Based on Public Key Infrastructure -- Introduction -- Securing Patients Medical Images and Authentication System -- The RSA Encryption/Decryption Algorithm -- DCT Embedding/Extracting Watermarked Algorithm -- Experimental Results and Performance Analysis -- Conclusions -- References -- Image Segmentation Using Ant System-Based Clustering Algorithm -- Introduction -- Related Work -- Ant System-Based Clustering Algorithm -- Pheromone Accumulation -- Local Pheromone Summing -- Data Labeling -- Experimental Results and Discussion -- Conclusions -- References -- Validation of a Hyperspectral Content-Based Information Retrieval (RS-CBIR) System Upon Scarce Data -- Introduction -- Hyperspectral CBIR System -- The DAMA Strategy. , RS-CBIR Validation -- CBIR Quality Assessment -- Proposed Validation Strategy -- Experiment and Results -- Conclusions -- References -- A Robust Algorithm for Enhancement of Remotely Sensed Images Based on Wavelet Transform -- Introduction -- Related Work -- Wavelet Transform -- Wavelet Shrinkage -- Wavelet-Based Denoising Algorithm -- Experiment -- Preprocessing -- Results and Discussion -- Conclusion and Future Work -- References -- ARIAS: Automated Retinal Image Analysis System -- Introduction -- AnOverview -- Automated Retinal Image Analysis System (ARIAS) -- Pre-processing Phase -- Segmentation Phase -- Vessel Tree Tracking Phase -- Identification Phase -- Experimental Results and Discussion -- Conclusions and Future Work -- References -- Contrast Enhancement of Breast MRI Images Based on Fuzzy Type-II -- Introduction -- An Overview -- MRI Breast Imaging Technology -- Fuzzy Image Processing -- Type-II Fuzzy Sets Enhancement Algorithm -- Experimental Results -- Conclusions -- References -- Intelligent Systems -- Tree Generation Methods Comparison in GAP Problems with Low Quality Data -- Introduction -- White Box Models SAP Learning with LQD -- Tree-Generation Algorithms -- Experimentation and Results -- Conclusions and Future Work -- References -- Neural-Network- Based Modeling of Electric Discharge Machining Process -- Introduction -- Artificial Neural Network -- Neural Network Modeling Considerations -- Network Architecture -- Learning Rate Coefficient -- Momentum Term -- Data Preprocessing -- Experiments -- Neural Network Training -- Results -- Conclusion -- References -- An Adaptive Sigmoidal Activation Function Cascading Neural Networks -- Introduction -- The Proposed Algorithm -- Network Growing Strategy and Adaptive Sigmoidal Activation Function -- Adaptive Sigmoidal Activation Function Cascading Neural Network -- Experimental Design. , Results and Discussions -- Conclusion -- References -- Loop Strategies and Application of Rough Set Theory in Robot Soccer Game -- Introduction -- Strategy Description -- Loop Strategy Detection -- Detection of Loop Strategies -- Conclusion -- References -- Learning Patterns from Data by an Evolutionary-Fuzzy Approach -- Introduction -- Genetic Programming for Classifier Evolution -- Fuzzy Classifier -- Experiments -- Conclusions -- References -- A Predictive Control System for Concrete Plants. Application of RBF Neural Networks for Reduce Dosing Inaccuracies -- Introduction -- System Description -- Application of RBF in Predicting Radial -- Results -- References -- Weighted Cross-Validation Evolving Artificial Neural Networks to Forecast Time Series -- Introduction -- Time Series Forecasting with Artificial Neural Networks (ANN) -- Automatic Design of Artificial Neural Networks (ADANN) -- Cross-Validation -- Ensembles -- Experiments and Results -- Conclusions -- References -- Multi-agents and Ambient Intelligence -- Role Playing Games and Emotions in Dispute Resolution Environments -- Introduction -- Ambient Intelligence and Online Dispute Resolution -- Intelligent Environments for Dispute Resolution -- Simulation of Users -- Simulation of Emotions -- Conclusion and Future Work -- References -- Image Processing to Detect and Classify Situations and States of Elderly People -- Introduction -- Detector Agent -- Preprocess, Extraction of Relevant Information -- Mixture of Classifiers, General Process -- Classifiers -- Relevant Factors -- Classification Model -- Results and Conclusions -- References -- Soft Computing Models for the Development of Commercial Conversational Agents -- Introduction -- Our Proposal to Introduce Soft Computing Models in Commercial Conversational Agents. , Soft Computing Approach Proposed for the Implementation of the Dialog Manager -- Development of a Railway Information System Using the Proposed Technique -- Evaluation of the Developed Conversational Agent -- Conclusions -- References -- Regulatory Model for AAL -- Introduction -- Legal Issues in Biometric Identification -- Principles of a Regulatory Model -- Regulatory Model for AAL Developments -- Conclusions -- References -- Classification and Clustering Methods -- Austenitic Stainless Steel EN 1.4404 Corrosion Detection Using Classification Techniques -- Introduction -- Methodology -- Experimental Procedure -- Results -- Conclusions -- References -- Prediction of Peak Concentrations of PM10 in the Area of Campo de Gibraltar (Spain) Using Classification Models -- Introduction -- The Study Area and the Data -- Methodology -- Experimental Procedure -- Results and Discussion -- Conclusions -- References -- A Rough Clustering Algorithm Based on Entropy Information -- Introduction -- Rough Sets: Foundations -- Discretization -- Discretization Method Selection -- Proposed Clustering Algorithm -- Implementation and Experiments -- Evaluation Criteria and Performance Analysis -- Evaluation Criteria -- Performance Analysis -- Conclusions and Future Work -- References -- Credit Scoring Data for Information Asset Analysis -- Introduction -- Related Work -- Models -- Algorithms -- Tools and Frameworks -- Problem Description -- Classification Algorithms -- Multilayer Perceptron -- Feature Selection Algorithm -- Neural Networks with Feature Selection -- Analysis -- Suggestive System -- Case Study -- Proposed Algorithm -- Results -- Conclusion -- References -- Evolutionary Computation -- Improving Steel Industrial Processes Using Genetic Algorithms and Finite Element Method -- Introduction -- Experiences and Results -- Tuning traightening rocess of teel ections. , Optimising Tension evelling rocess -- Optimising the Material Behaviour Model in Finite Element Models -- Conclusion -- References -- Genetic Algorithms Combined with the Finite Elements Method as an Efficient Methodology for the Design of Tapered Roller Bearings -- Introduction -- Proposed Methodology -- Creating the Reduced Non-linear Model. Step 1 -- Replacing the Rollers by Beams. Step 2 -- Application of Genetic Algorithms. Step 3 -- Replacement of Beams and Plates in Full Model -- Case Study and Results -- Conclusions -- References -- An Interactive Genetic Algorithm for the Unequal Area Facility Layout Problem -- Introduction -- Problem Formulation -- Suggested Approach -- Layout Representation -- Encoding Structure -- Interactive Genetic Algorithm -- Test Example -- Test Methodology -- Conclusions -- References -- Combining Evolutionary Generalized Radial Basis Function and Logistic Regression Methods for Classification -- Introduction -- Generalized Radial Basis Function -- Neuro-Logistic models -- Estimation of Neuro-Logistic Parameters -- Experiments -- Database Description -- Experimental Design and Statistical Analysis -- Conclusions -- References -- Applications -- Short-Term Wind Energy Forecasting Using Support Vector Regression -- Introduction -- Problem Description -- Formalization -- NREL Data -- Related Work -- Support Vector Regression -- Experimental Analysis -- Loss Function Parameter Study -- Small-Scale Analysis: Wind Grid Point Level -- Large-Scale Analysis: Wind Park Level -- Conclusion -- References -- An Efficient Hybrid Soft Computing Approach to the Generalized Vehicle Routing Problem -- Introduction -- The Local-Global Approach to the GVRP -- An Efficient Algorithm for Solving the Generalized Vehicle Routing Problem -- Genetic Representation -- The Fitness Value -- Initial Population -- Genetic Operators. , Genetic Parameters.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Machine learning. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (472 pages)
    Edition: 1st ed.
    ISBN: 9783030023577
    Series Statement: Studies in Computational Intelligence Series ; v.801
    DDC: 6.31
    Language: English
    Note: Intro -- Preface -- Contents -- Machine Learning in Feature Selection -- Hybrid Feature Selection Method Based on the Genetic Algorithm and Pearson Correlation Coefficient -- 1 Introduction -- 2 Feature Selection Based on Hybridization -- 2.1 Evolutionary Algorithms -- 2.2 The Genetic Algorithm -- 2.3 Hybrid Feature Selection -- 3 The Proposed Approach: Hybrid Feature Selection Based on the GA and PCC -- 3.1 GA for the Proposed Method -- 3.2 Pearson Correlation Coefficient (PCC) -- 3.3 Merging Feature Subsplits -- 4 Experimetal Study -- 4.1 Datasets -- 4.2 Performance Measures -- 4.3 Experiments and Discussion -- 5 Conclusion -- References -- Weighting Attributes and Decision Rules Through Rankings and Discretisation Parameters -- 1 Introduction -- 2 Background -- 2.1 Nature of Stylometric Data -- 2.2 Ranking of Features -- 2.3 Supervised Discretisation -- 2.4 CRSA Classifiers -- 2.5 Weighting Rules -- 3 Framework of Experiments -- 3.1 Weighting Features -- 3.2 CRSA Decision Rules -- 3.3 Weighting Rules -- 4 Test Results -- 5 Conclusions -- References -- Greedy Selection of Attributes to Be Discretised -- 1 Introduction -- 2 Discretisation -- 2.1 Supervised Discretisation -- 2.2 Test Sets Discretisation -- 3 Greedy Methods for Selection of Attributes -- 3.1 Forward Sequential Selection -- 3.2 Backward Sequential Selection -- 4 Experiments and Results -- 4.1 Classifier -- 4.2 Experimental Datasets -- 4.3 Results -- 5 Conclusions -- References -- Machine Learning in Classification and Ontology -- Machine Learning for Enhancement Land Cover and Crop Types Classification -- 1 Introduction -- 2 Related Work -- 3 Materials and Classifiers -- 3.1 Study Area and Satellite Images -- 3.2 Ground Truth Datasets -- 3.3 Classifiers -- 4 Experimental Results -- 4.1 Experiments Setup -- 4.2 Parallel Processing Setup -- 4.3 Results. , 4.4 Overall Classification Performance -- 5 Conclusion -- References -- An Optimal Machine Learning Classification Model for Flash Memory Bit Error Prediction -- 1 Introduction -- 2 Related Research -- 3 Experimental Setup -- 3.1 Data Collection -- 3.2 Data Analysis -- 4 Classification Models -- 4.1 Model Inputs and Outputs -- 4.2 Data Subsampling -- 4.3 Machine Learning Methods -- 4.4 Classification Methodology -- 4.5 Results Comparison -- 5 Ensemble Classifier -- 5.1 Ensembling Introduction -- 5.2 Base Classifier 1: Gradient Boosting, Random Subsampling -- 5.3 Base Classifier 2: Gradient Boosting, Inverse PDF-based Subsampling -- 5.4 Base Classifier 3: Weighted SVM, Random Subsampling -- 5.5 Ensemble Process -- 5.6 Ensemble Results -- 6 Knowledge-Based Optimisation -- 6.1 Overview -- 6.2 Algorithm Results -- 6.3 Final Algorithm -- 7 Summary and Conclusions -- References -- Comparative Analysis of the Fault Diagnosis in CHMLI Using k-NN Classifier Based on Different Feature Extractions -- 1 Introduction -- 2 Open Circuit (OC) Fault Analysis of CHMLI -- 3 Proposed Fault Diagnosis Method -- 3.1 Probabilistic PCA Based Feature Extraction -- 3.2 K-Nearest Neighbor (k-NN) -- 4 Simulation and Experimental Results and Discussion -- 5 Conclusion -- References -- Design and Development of an Intelligent Ontology-Based Solution for Energy Management in the Home -- 1 Introduction -- 2 Energy -- 2.1 Non-renewable Energies -- 2.2 Renewable Energies -- 3 Production and Consumption of Electricity in Algeria -- 3.1 Electricity Generation in Algeria Based on Renewable Energies -- 3.2 Demand and Forecasts Electricity in Algeria -- 4 The Smart Home -- 4.1 The Smart Home Operations -- 4.2 The Criteria for Selecting a Home Automation System -- 4.3 The Smart Home Benefits -- 5 Ontology -- 5.1 The Ontology History -- 5.2 Ontology and Semantic Web Architecture. , 5.3 The Ontology Components -- 5.4 Ontology Editors -- 5.5 Ontology Development Methods -- 5.6 Anomalies and Ontology Evaluation -- 6 Solution Design -- 6.1 Presentation of the Domain, Objectives, and Research on Similar Work-Based Ontology -- 6.2 Designate Interesting Terms and Explain the Ontology Classes -- 6.3 Design Properties with Facets, Instances, and Relations of Ontology -- 7 Implementation of the Solution -- 7.1 Implementation in Protégé 5 -- 7.2 Implementation of Reasoning Rules -- 8 Case Study -- 8.1 Presentation of the Environment -- 8.2 Energy Consumption Scenarios -- 8.3 Analysis and Discussion -- 9 Conclusion and Perspectives -- References -- Towards a Personalized Learning Experience Using Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 Reinforcement Learning -- 4 Proposed Approach -- 4.1 Main Components -- 4.2 State-Action-Reward -- 5 Evaluations -- 6 Opportunities That Big Data Offer to PL -- 7 Conclusions and Future Work -- References -- Towards Objective-Dependent Performance Analysis on Online Sentiment Review -- 1 Introduction -- 2 State of Art -- 2.1 Online Sentiment Analysis Process -- 2.2 Online Sentiment Evaluation -- 2.3 Sentiment Analysis Challenges -- 2.4 Sentiment Analysis Performance -- 3 Sentiment Performance Criteria -- 3.1 Proposed Performance Criteria -- 3.2 The Sentiment Accuracy-Performance Type (F-measure) -- 3.3 The Runtime-Performance Type -- 3.4 The Sentiment Performance Perspectives Criteria -- 3.5 Compared Techniques -- 4 Experiments and Results -- 4.1 Datasets -- 4.2 Accuracy and Performance Comparison -- 4.3 Experiments Results -- 5 Conclusion -- References -- Enhancing Performance of Hybrid Named Entity Recognition for Amazighe Language -- 1 Introduction -- 2 Literature Review -- 2.1 Rule-Based Approach -- 2.2 Machine Learning (ML) Approach -- 2.3 Hybrid Approach -- 3 Amazighe Language. , 4 Amazighe Named Entity Recognition Challenges -- 5 Experimental Setup -- 5.1 System Architecture -- 5.2 The Rule Based Component -- 5.3 The Machine-Learning Component -- 6 Results and Discussions -- 6.1 Experiment Data Sets: The Amazighe Data -- 6.2 Performance Evaluation of the Hybrid System -- 6.3 Evaluation Results -- 6.4 Speed Discussion -- 7 Conclusion and Future Directions -- References -- A Real-Time Aspect-Based Sentiment Analysis System of YouTube Cooking Recipes -- 1 Introduction -- 2 Related Works -- 3 The Proposed System Overview -- 4 Methodology -- 4.1 Pre-processing -- 4.2 Subjectivity Detection -- 4.3 Feature Extraction from YouTube Cooking Recipes Reviews -- 4.4 Sentiment Classification -- 5 Experiments -- 5.1 Data Collection and Analysis -- 5.2 Evaluation -- 6 Results and Discussion -- 6.1 Experiment with the Subjectivity Detection Training Model -- 6.2 Evaluation on Aspect Extraction -- 6.3 Evaluation on Sentiment Classifications -- 7 Conclusion and Future Works -- References -- Detection of Palm Tree Pests Using Thermal Imaging: A Review -- 1 Introduction -- 2 Traditional Detection Methods -- 2.1 Visual Inspection -- 2.2 Acoustic Detection -- 2.3 Chemical Detection -- 3 Thermal Detection Methods -- 3.1 Thermal Imaging Detection -- 3.2 Thermal Infested Palm Detection -- 4 Analysis -- 5 Conclusion -- References -- Unleashing Machine Learning onto Big Data: Issues, Challenges and Trends -- 1 Introduction -- 1.1 An Overview on Big Data -- 1.2 An Introduction to Machine Learning -- 2 Processing Big Data -- 2.1 Issues, Challenges and Opportunities in Big Data Processing Using Machine Learning -- 2.2 Trends and Open Issues in Big Data Processing Using Machine Learning -- 3 Conclusions -- References -- Bio-inspiring Optimization and Applications -- Bio-inspired Based Task Scheduling in Cloud Computing -- 1 Introduction -- 2 Related Work. , 3 The Proposed H_BAC Algorithm -- 4 System Implementation -- 4.1 Simulation Environment -- 4.2 Performance Metrics -- 5 Simulation Results -- 5.1 First Experiment -- 5.2 Second Experiment -- 6 Conclusions -- References -- Parameters Optimization of Support Vector Machine Based on the Optimal Foraging Theory -- 1 Introduction -- 2 Basic Knowledge -- 2.1 Support Vector Machine -- 2.2 Optimal Foraging Algorithm -- 3 The Proposed OFA for SVM Parameter Optimization Algorithm -- 3.1 Parameters Initialization -- 3.2 Fitness Function, Positions Updates and Termination Criteria -- 4 Experimental Results and Discussion -- 4.1 Datasets Description -- 4.2 Results and Discussion -- 5 Conclusion -- References -- Solving Constrained Non-linear Integer and Mixed-Integer Global Optimization Problems Using Enhanced Directed Differential Evolution Algorithm -- 1 Introduction -- 2 Problem Statement and Constraint Handling -- 3 Differential Evolutions -- 3.1 Initialization of a Population -- 3.2 Mutation -- 3.3 Recombination (Crossover) -- 3.4 Selection -- 4 The Proposed Algorithm (MI-EDDE) -- 4.1 Novel Mutation Scheme -- 4.2 Constraint Handling -- 4.3 Integer Variables Handling -- 5 Experiments and Discussion -- 6 Conclusions -- References -- Optimizing Support Vector Machine Parameters Using Bat Optimization Algorithm -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Support Vector Machine (SVM) Classifier -- 3.2 Bat Algorithm (BA) -- 4 The Proposed Model: BA-SVM -- 5 Experimental Results and Discussion -- 5.1 Illustrative Example -- 5.2 Real Data Experiments -- 5.3 Experimental results -- 6 Conclusions and Future Work -- References -- Performance Evaluation of Sine-Cosine Optimization Versus Particle Swarm Optimization for Global Sequence Alignment Problem -- 1 Introduction -- 2 Pairwise Sequence Alignment -- 3 Sine-Cosine Optimization Algorithm (SCA). , 4 Particle Swarm Optimization (PSO).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Keywords: Information technology-Technological innovations. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (394 pages)
    Edition: 1st ed.
    ISBN: 9789811323249
    Series Statement: Lecture Notes in Networks and Systems Series ; v.55
    DDC: 004
    Language: English
    Note: Intro -- ICICC-2018 Steering Committee Members -- ICICC-2018 Advisory Committee -- Preface -- About the Book (Volume 1) -- Contents -- About the Editors -- Designing an Intelligent Jammer for Targeted 802.11b/g/n based Network Devices -- 1 Introduction -- 2 Related Work -- 3 Jamming Techniques -- 4 Methodology -- 4.1 Algorithm -- 5 Results and Analysis -- 6 Conclusion -- References -- Hardware Implementation of Public Key Cryptography for Small-Scale Devices -- 1 Introduction -- 2 Literature Review -- 2.1 Encryption -- 2.2 Hashing -- 3 Proposed Work -- 3.1 Implementation Details -- 4 Conclusion -- References -- Proof-of-Participation: Implementation of Proof-of-Stake Through Proof-of-Work -- 1 Introduction -- 2 Background -- 2.1 Proof-Work (PoW) -- 2.2 Limitations of PoW -- 2.3 Proof-of-Stake (PoS) -- 2.4 Limitations of PoS -- 3 Proof-of-Participation Protocol -- 4 Reward Distribution -- 5 Discussion -- 6 Conclusion -- References -- Unfolding the Mystery of Ransomware -- 1 Introduction -- 2 Background -- 3 Process of Ransomware -- 4 Prevention Techniques -- 5 Conclusion and Future Work -- References -- IOT-Based Smart Museum Using Wearable Device -- 1 Introduction -- 1.1 Existing Methodologies -- 1.2 Objective -- 2 Literature Survey -- 3 Proposed Method -- 3.1 Image Acquisition -- 3.2 Converting the Videos into Frames by Frames -- 3.3 Image Matching Technique Using SIFT and SURF -- 4 Result and Discussion -- 4.1 Setup -- 4.2 Experiment -- 4.3 Performance Evaluation Based on Execution Time -- 5 Conclusion -- References -- A Survey on Cross-Layer Design Approach for Secure Wireless Sensor Networks -- 1 Introduction -- 2 Demand for Cross-Layer Design Approach -- 3 A Scenario of Cross-Layer Design -- 4 Comparative Study of Cross-Layer Protocols in WSN -- 5 Challenges and Issues in Cross-Layer Design -- 6 Performance Variations -- 7 Conclusion. , References -- Consumer Behavior Toward Mobile Phone Handsets -- 1 Introduction -- 2 Literature Review -- 3 Objectives -- 4 Research Gap -- 5 Hypothesis -- 6 Research Methodology -- 7 Analysis and Interpretation -- 8 Findings -- 9 Conclusions -- 10 Limitations -- References -- Security on Cloud Computing Using Split Algorithm Along with Cryptography and Steganography -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Proposed Algorithm -- 5 Implementation Figures -- 6 Conclusion and Future Work -- References -- A Decentralized Self-detection Mechanism to Defend Selfish Behavior in Spray and Wait Protocol -- 1 Introduction -- 2 Related Work -- 3 Background -- 4 Proposed Methodology -- 4.1 Add Selfish Behavior -- 4.2 Detection and Mitigation of Selfish Behavior -- 5 Simulation and Results -- 5.1 Effect on Overhead Ratio -- 5.2 Effect on Delivery Ratio -- 5.3 Effect on Latency -- 6 Conclusion -- References -- Multithreaded Query Processing Using Quadtree -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result and Analysis -- 5 Time-Space Complexity -- 6 Conclusion and Future Scope -- References -- Automated Trashcan -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Approach -- 3.1 For Automatic Overflow Detection System -- 3.2 For Reduce Time and Money Used in Waste Collection -- 3.3 For Automatic Waste Segregation -- 4 Software and Hardware Modules -- 4.1 Software Module -- 5 Hardware Components -- 6 Implementation -- 6.1 Overflow Detection Module -- 6.2 Module for Optimization of Fuel and Time -- 6.3 Waste Segregation Module -- 7 Results -- 7.1 Overflow Detection Module -- 7.2 Module for Optimization of Fuel and Time -- 7.3 Waste Segregation Module -- 8 Conclusion -- References -- LP-ACO Technique for Link Stability in VANETs -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results. , 5 Conclusion -- References -- Improvement of Lifespan of Ad hoc Network with Congestion Control and Magnetic Resonance Concept -- 1 Introduction -- 2 Related Work -- 3 Wireless Power Generation and Transmission Technique -- 4 Problem Statement About Congestion -- 5 Proposed Solution -- 5.1 Power Efficient Congestion Control Algorithm -- 6 Simulation Parameters and Results -- 6.1 Energy Consumed -- 6.2 Network Lifetime -- 6.3 Delay -- 7 Conclusion -- References -- A Critical Review of Routing Protocols for VANETs -- 1 Introduction -- 2 Routing Protocols Based on Real-Time Scenarios -- 3 Mobility Model Generators -- 3.1 VanetMobiSim -- 3.2 MOVE -- 4 Mobility Models -- 5 Conclusion -- References -- Street Light Energy Saver -- 1 Introduction -- 2 Literature Review -- 3 Outline of Proposed System -- 4 Hardware and Software Specifications -- 5 Result -- 6 Conclusion -- References -- BioSenHealth 1.0: A Novel Internet of Medical Things (IoMT)-Based Patient Health Monitoring System -- 1 Introduction -- 2 Background -- 3 Biosensor-Definition and Its Working -- 3.1 Introduction and History -- 4 BioSenHealth 1.0: IoMT (Internet of Medical Things)-Based Health Monitoring System -- 4.1 Definition -- 4.2 Components -- 5 Working Prototype and Results-BioSenHealth 1.0 Intelligent Health Monitoring System -- 6 Conclusion and Future Scope -- References -- Analysis of Simulation Tools for Underwater Sensor Networks (UWSNs) -- 1 Introduction -- 2 Underwater Sensor Networks (UWSNs)-Architecture -- 2.1 1D-UWSN Architecture -- 2.2 2D-UWSN Architecture -- 2.3 3D-UWSN Architecture -- 2.4 4D-UWSN Architecture -- 3 Underwater Sensor Networks (UWSNs)-Design Parameters -- 3.1 Transmission Medium -- 3.2 Mobility of Sensor Nodes -- 3.3 Physical Layer -- 3.4 MAC Protocol -- 3.5 Network Protocol -- 3.6 Application Layer -- 3.7 Operational Environment. , 4 Underwater Sensor Networks (UWSNs)-Simulation Tools -- 4.1 NS-2 (Network Simulator 2) -- 4.2 UWSim -- 4.3 AQUA-Sim -- 4.4 AQUA-3D -- 4.5 AQUA-Net -- 4.6 AQUA-Tools -- 4.7 AQUA-Lab -- 4.8 AQUA Tune -- 4.9 SUNSET -- 4.10 DESERT -- 4.11 USNeT -- 4.12 UANT -- 4.13 WOSS -- 4.14 SAMON -- 4.15 SUNRISE -- 4.16 NS-Miracle -- 5 Underwater Sensor Networks (UWSNs)-Simulation Tools Comparison -- 6 Conclusion and Future Scope -- References -- Recent Advances in Networks and Data Security Survey on Various Mobile Operating Systems -- 1 Introduction -- 2 Background Study -- 2.1 Android OS -- 2.2 Bada (Samsung Electronics) -- 2.3 Blackberry OS -- 2.4 IOS -- 2.5 Sailfish OS -- 2.6 Palm OS -- 2.7 Symbian OS (Nokia) -- 2.8 Windows Mobile -- 3 Comparative Analysis of Various Mobile Operating Systems -- 3.1 Market Share -- 3.2 Basic Features -- 3.3 Security -- 3.4 Communication and Connectivity -- 3.5 Audio, Camera and Video Recording -- 4 Conclusion -- References -- TRAX: Smart Mobile Application to Improve the Safety and Security of Automobile Vehicles -- 1 Introduction -- 2 Component of Innovation/Concept Behind the Work -- 3 Working Details -- 4 Block Diagram -- 5 Features -- 6 Working of Each Component -- 7 Innovation of Proposed Approach -- 8 Results and Its Features Discussion -- 9 Conclusions -- References -- Shortest Path Analysis on Geospatial Data Using PgRouting -- 1 Introduction -- 2 Related Work/Background -- 3 Methodology -- 3.1 Data Used for Network Analysis (Shapefile) -- 3.2 Key Database Components and Methods Used for Network Analysis (Shapefile) -- 3.3 PgRouting Supported Algorithmic (Shortest Path) Functions -- 3.4 Approach and Procedure Used -- 4 Results -- 4.1 Visualization of Various Routing Algorithms on Logics Canvas for Same LAT/LONG -- 5 Conclusion -- 5.1 Visual Comparison of Results (Road Graph Versus Shortest Path Analyzer) -- References. , Implementation of Mobile Robot Navigation Mechanism Using FPGA: An Edge Detection-Based Approach -- 1 Introduction -- 2 Navigation of Service Robots -- 3 Proposed Mechanism -- 3.1 Concept Machination -- 3.2 Movement Actualization -- 4 Results and Discussion -- 5 Conclusion -- References -- A Complete Study on the Security Aspects of Wireless Sensor Networks -- 1 WSN Introduction -- 1.1 Architecture -- 1.2 Security Goals of WSN -- 2 Various Attacks on WSN -- 3 Countermeasure of Attack -- 4 Conclusion and Future Scope -- References -- A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing -- 1 Introduction -- 2 Literature Review -- 2.1 Attacks on Cloud Computing Systems -- 2.2 Techniques for Intrusion Detection in Cloud Computing -- 3 Classification of Cloud Computing-Based IDS Systems -- 3.1 Host-Based Intrusion Detection Systems (HIDS) -- 3.2 Network-Based Intrusion Detection System (NIDS) -- 3.3 Distributed Intrusion Detection System (DIDS) -- 3.4 Hypervisor-Based Intrusion Detection Systems -- 4 Comparative Analysis of Cloud Computing IDPS -- 5 IDPS Challenges in Cloud Computing -- 5.1 Handling with Distributed Datacenters -- 5.2 Organizational Challenges and Limitations -- 5.3 Security and Trust Issues -- 5.4 Managing the Control Mechanism at Various Cloud Levels -- 5.5 Synching Automated Sensors -- 5.6 Scalability and Handling with Large-Scale Systems -- 6 Conclusion -- References -- Pentaplicative Cipher Technique -- 1 Introduction -- 2 Proposed System -- 3 Methodology -- 4 Mathematical Modeling -- 5 Result -- 6 Conclusion -- References -- K-Means-Based Method for Clustering and Validating Wireless Sensor Network -- 1 Introduction -- 2 Related Work -- 3 Grouping Validation -- 4 System Model -- 5 K-Means Clustering -- 6 Simulation and Results -- 6.1 Clustering Validation. , 6.2 Simulation Scenarios and Discussion.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...