GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Document type
Language
  • 1
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (706 pages)
    Edition: 1st ed.
    ISBN: 9789811923586
    Series Statement: Cognitive Science and Technology Series
    DDC: 006.3
    Language: English
    Note: Intro -- Contents -- Teaching English as a Second Language: Improving Digital Literacy Skills -- 1 Introduction -- 2 Literature Review -- 3 Findings -- 4 Methods -- 4.1 Contemporary Practices -- 5 Results -- 6 Conclusion -- References: -- ICT-Based Collaborative Learning Approach: Enhancing Students' Language Skills -- 1 Introduction -- 2 Literature Review -- 3 Need of ICT in the Teaching and Learning Process -- 4 Methodology -- 4.1 Warm-Up -- 4.2 Student Roles -- 4.3 Grouping Students -- 4.4 Language Focused Task -- 4.5 Monitoring Groups -- 4.6 Collecting Responses Checking for Accuracy -- 4.7 Changing Roles -- 4.8 Listening Activity Through Audio Aids -- 4.9 Collecting Responses and Checking for Comprehension -- 4.10 Changing Roles Again -- 4.11 Solving the Mystery -- 4.12 Collecting Answers -- 4.13 Final Comprehension Check -- 4.14 Wrap Up -- 5 Data Collection Procedures -- 6 Results -- 6.1 Results for the Effectiveness of CL on Students' Integrating Language Skills Through Questionnaire Are as Follows -- 7 Conclusion -- References -- Modified Sierpinski Carpet Fractal Antenna for the Wireless Applications -- 1 Overview -- 2 Design of Antenna -- 3 Results and Discussion -- 3.1 Simulated and Experimental Results -- 4 Conclusion -- References -- COVID-19 Recovery Prediction Using Regression-Based Machine Learning Approaches -- 1 Introduction -- 2 Methods Used -- 2.1 Linear Regression (LR) -- 2.2 Ridge Regression -- 2.3 Elastic Net -- 2.4 Support Vector Regression -- 2.5 Decision Trees -- 2.6 Random Forests -- 2.7 Extra Trees -- 2.8 Deep Learning Multilayer Perceptron -- 3 Data and Methodology -- 3.1 Data Description -- 3.2 Data Preprocessing and Visualization -- 4 Methodology Used -- 4.1 Performance Metrics -- 5 Predictions and Results -- 6 Conclusion -- References. , Regression to Forecast: An In-Play Outcome Prediction for One-Day Cricket Matches -- 1 Introduction -- 2 Background and Related Works -- 3 Proposed Metric to Quantify Player Quality -- 4 Form and Batting Resource of the Team -- 5 Model to Forecast Win Probability -- 6 Model Predictions and Results -- 7 Conclusion -- References -- Analysis of OFDMA Over AWGN and Rician Channels -- 1 Introduction -- 2 Proposed Technique -- 2.1 OFDM with AWGN Channel -- 2.2 OFDMA with Rician Channel -- 3 System Development -- 3.1 Result Analysis -- 4 Conclusion -- References -- A Review on Internet of Wearable Things for Pervasive E-Health Care: Energy Efficiency and Prospects -- 1 Introduction -- 2 Related Works -- 3 Background of IoWT -- 3.1 Requirements -- 3.2 Application Scenarios -- 4 Energy Efficiency Improving Schemes -- 4.1 Task-Offloading -- 4.2 Duty Cycling -- 4.3 Energy-Aware Routing -- 4.4 Low-Power Embedded Design -- 4.5 Low-Power Communications -- 4.6 Adaptive Transmission Power Control -- 4.7 Compressive Sensing -- 4.8 IoWT Data Compression -- 4.9 Approximate Computing -- 4.10 Lightweight Security -- 5 Key Challenges and Future Directions -- 5.1 Challenges -- 5.2 Future Directions -- 6 Conclusion -- References -- An Analysis on Tesla's Stock Price Forecasting Using ARIMA Model -- 1 Introduction -- 2 Related Work -- 2.1 ARIMA Model -- 2.2 Performance Metrics -- 3 Experimental Results and Discussion -- 3.1 ARIMA Model for Tesla Stock Price -- 4 Conclusion -- References -- Multi-regressions Based-Traditional Machine Learning Approach for Energy Forecasting System -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Result -- 5 Conclusion -- References -- Comparative Study of Various Machine Learning and Deep Learning Techniques for Energy Prediction and Consumption Using IoT Modules -- 1 Introduction -- 2 Related Works -- 3 Conclusion. , References -- Emulating SoCs for Accelerating Pre-Si Validation -- 1 Introduction -- 2 HW/SW Co-Design -- 3 Experimental Platform -- 4 Profiling -- 5 Implementation Flow -- 6 Simulation Time/Speed up for Benchmark Design -- 7 Results and Discussions -- References -- Optimization of Power Flow in DC Microgrid Connected to Electric Vehicle Charging Station -- 1 Introduction -- 2 Energy Management for EV Charging -- 3 System Description -- 4 Result and Discussion -- 5 Conclusion -- References -- Static Hand Gesture Prediction Using Inception V3 -- 1 Introduction -- 2 Literature Review -- 3 Static Hand Gesture Recognition System -- 3.1 ASL Data -- 3.2 Implementation -- 4 Result -- 5 Conclusion -- References -- Evaluation on Radiation Exposure in Human Eye Tissue Model with IFA -- 1 Introduction -- 1.1 Specific Absorption Rate -- 1.2 Inverted F Antenna -- 2 Tissue Modeling and Experimental Setup -- 2.1 Modeling Background -- 2.2 Geometry and Dimensions of IFA -- 2.3 Dielectric Properties of Eye Tissues -- 3 Results and Validation -- 3.1 Operation Characteristics -- 3.2 Far field in 3D -- 3.3 Gain and Near Field -- 3.4 SAR Comparison -- 4 Conclusion -- References -- A Novel Approach for Sentiment Analysis and Opinion Mining on Social Media Tweets -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussions -- 4.1 Word-Level Sentiment Analysis -- 4.2 Querying Sentiment Words -- 4.3 Sentence-Level Sentiment Classification -- 5 Conclusion -- References -- Cloud Control Cold Storage System -- 1 Introduction -- 2 Implementation of Cloud Control Cold Storage System -- 3 Simulation -- 4 Hardware Implementation -- 5 Conclusion -- References -- Comparative Study of Neural Networks (G/C/RNN) and Traditional Machine Learning Models on EEG Datasets -- 1 Introduction -- 1.1 Literature Survey -- 2 Materials and Methods -- 2.1 EEG Datasets. , 2.2 Machine Learning Models -- 3 Result -- 4 Discussion -- 5 Conclusion -- References -- Artificial Intelligent Models for Automatic Diagnosis of Foetal Cardiac Anomalies: A Meta-Analysis -- 1 Introduction -- 2 Background Study -- 3 Literature Review -- 3.1 Medical Literatures Suggesting Technological Interventions -- 3.2 Review of Articles Related to Diagnosing Diseases Using Machine Learning/Deep Learning and Ultrasound Scan Images -- 4 Methodology -- 4.1 Phase 1: Model for Preliminary Classification and Screening -- 4.2 Phase 2: Diagnostic Model -- 5 Results and Discussions -- 6 Conclusion -- References -- DLoader: Migration of Data from SQL to NoSQL Databases -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Relational Databases -- 3.2 NoSQL Databases -- 3.3 SQL to NoSQL Transformation -- 4 Experimentation -- 5 Conclusion -- References -- Maximum Boost Control of Quasi-Z-Source Inverter with DSTATCOM for a Wind Energy System -- 1 Introduction -- 2 Operation of Maximum Boost Control of Single-Phase Enhanced Quasi-Z-Source -- 2.1 Wind Energy System -- 2.2 Enhanced Boost Quasi-Z-Source Inverter -- 2.3 DSTATCOM -- 3 Simulation Results -- 4 Conclusion -- References -- Design and Development of Multi-copter Drone Incorporating with Multispectral Sensor for Agricultural Application -- 1 Introduction -- 2 AIMS and Objectives -- 3 UAV System and Payload Description -- 3.1 UAV Platform -- 3.2 Sensor Platform -- 4 Proposed Methodology -- 4.1 Study Area -- 5 Process of UAV Data Collection -- 6 UAV Data Processing -- 6.1 Multispectral Calibration Reflectance Panel for Radiometric Calibration -- 6.2 Creating Toolbox for Calculating Vegetation Indices -- 6.3 Data Processing -- 7 Results and Discussions -- 7.1 Vegetation Analysis for Different Vegetation Indices -- 8 Conclusion -- References. , Mitigation of RSSI Variations Using Frequency Analysis and Kalman Filtering -- 1 Introduction -- 2 Related Work -- 3 Preliminary Study -- 3.1 RSSI -- 3.2 RSSI Filtering -- 4 System Design -- 5 Experiment and Analysis -- 5.1 Setup for Experiments -- 5.2 RSSI Fluctuation -- 5.3 Analysis of Various Filters -- 6 Conclusion -- References -- A Novel Approach for High Authentication in Digital Watermarking Technique -- 1 Introduction -- 2 Related Survey -- 3 Proposed System -- 4 Conclusion and Future Work -- References -- Exploring the Impact of Indian Revenues During COVID-19 Using Social Network Analysis -- 1 Introduction -- 2 Data and Methods -- 3 Related Work -- 4 Proposed Work -- 5 Observation and Discussion -- 6 Conclusion -- References -- Fingerprint Image Enhancement for Crime Detection Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Image Pre-processing -- 3.2 Image Classification -- 4 Results and Discussion -- 5 Conclusion -- References -- Semantic Segmentation of Retinal Vasculature Using Light Patch-Based Dilated CNN -- 1 Introduction -- 2 Dataset -- 3 Methodology -- 3.1 Patched Input -- 3.2 Dilated Convolution -- 3.3 Light Patch-Based Network -- 4 Result and Discussion -- 5 Conclusion -- References -- A Novel Study on Tools and Frameworks for Mitigating Bias in Multimodal Datasets -- 1 Introduction -- 2 Need of Identifying Bias in Datasets -- 3 Tools and Frameworks for Mitigating Bias in Datasets -- 3.1 REVISE (REvealing VIsual BiaSEs) -- 3.2 FairML -- 3.3 IBM AI Fairness 360 -- 3.4 Accenture's "Teach and Test" Methodology -- 3.5 Google's What-If Tool -- 3.6 Microsoft's Fairlearn -- 4 Conclusion -- References -- Machine Learning Framework for Stagewise Classification of Alzheimer's Disease -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Dataset. , 3.2 EDA (Univariate, Bivariate, Multivariate Analysis).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Keywords: Communication and technology. ; Engineering. ; Telecommunication. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (1152 pages)
    Edition: 1st ed.
    ISBN: 9789811980862
    Series Statement: Cognitive Science and Technology Series
    DDC: 302.2
    Language: English
    Note: Intro -- Contents -- A Methodology for Selecting Smart Contract in Blockchain-Based Applications -- 1 Introduction -- 2 Background -- 3 Smart Contract Use Cases -- 4 Challenges in Implementing Smart Contract -- 5 Proposed Methodology -- 6 Conclusion and Future Scope -- References -- Deep Learning Neural Networks for Detection of Onset Leukemia from Microscopic Images -- 1 Introduction -- 2 Literature Review -- 3 Algorithms -- 3.1 Fuzzy C-Means Algorithm -- 3.2 Active Contours -- 3.3 Convolutional Neural Network (CNN) -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- Design of 4 × 4 Butler Matrix for 5G High Band of 26 GHz -- 1 Introduction -- 2 Design of Butler Matrix and Its Subcomponents -- 2.1 Design of Branch Line Coupler -- 2.2 Design of 0 dB Crossover -- 2.3 Design of Phase Shifter -- 2.4 Design of Rectangular Patch Antenna -- 2.5 Design of Overall Butler Matrix -- 3 Results and Analysis -- 4 Conclusion -- References -- Pedestrian and Vehicle Detection for Visually Impaired People -- 1 Introduction -- 2 Methodology -- 2.1 Data Acquisition and Pre-processing -- 2.2 Feature Extraction -- 2.3 Dimensionality Reduction -- 2.4 Classification of Vehicles and Pedestrian -- 3 Results and Discussion -- 4 Conclusion -- References -- Measuring Effectiveness of CSR Activities to Reinforce Brand Equity by Using Graph-Based Analytics -- 1 Introduction -- 2 Literature Review -- 3 Pre-processing of Data -- 4 Modelling and Analysis -- 5 Results and Conclusion -- References -- Design and Implementation of Built-In Self-Test (BIST) Master Slave Communication Using I2C Protocol -- 1 Introduction -- 1.1 Background -- 1.2 Objectives -- 1.3 Need and Importance -- 2 Literature Review -- 3 Methodology -- 3.1 Existing Methods -- 3.2 Proposed Method -- 4 Results -- 5 Conclusion -- Bibliography. , Implementation of Finite Element Method in Opera Software for Design and Analysis of High-Voltage Busbar Supports -- 1 Introduction -- 2 Technical Specifications of 33 kV Busbar Are of Use -- 3 Finite Element Method -- 4 Simulation Method -- 5 Design of High-Voltage Busbar Supports in Opera -- 6 Conclusion -- References -- InterCloud: Utility-Oriented Federation of Cloud Computing Environments Through Different Application Services -- 1 Introduction -- 2 System Architecture -- 3 Elements of InterCloud -- 3.1 Cloud Coordinator (CC) -- 3.2 Cloud Broker (CB) -- 4 The Performance of the Federated Cloud Environment -- 5 Conclusion -- References -- Cross-Cultural Translation Studies in the Context of Artificial Intelligence: Challenges and Strategies -- 1 Introduction -- 1.1 Challenges -- 1.2 Strategies -- 2 Cross Cultural Translation -- 3 Contextual Artificial Intelligence -- 4 Artificial Intelligence Translators -- 4.1 Advantages of Artificial Intelligence Translation -- 4.2 Disadvantages of Artificial Intelligence Translation -- 5 Conclusion -- References -- Design of Low-Power OTA for Bio-medical Applications -- 1 Introduction -- 2 Proposed Architecture of OTA -- 3 Simulation Results -- 4 Conclusion -- References -- Analysis of the Efficiency of Parallel Prefix Adders -- 1 Introduction -- 2 Conventional Multi-bit Adders -- 2.1 Ripple-Carry Adder -- 2.2 Carry-Skip Adder -- 2.3 Carry Lookahead Adder -- 3 Parallel Prefix Adders -- 3.1 Kogge-Stone Adder -- 3.2 Brent-Kung Adder -- 3.3 Han-Carlson Adder -- 3.4 Ladner-Fischer Adder -- 4 Performance Comparison of Parallel Prefix Adders -- 4.1 Analysis of Efficiency Utilizing Xilinx's Vivado Design Suite -- 5 Conclusion -- References -- Design of Efficient 8-Bit Fixed Tree Adder -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of FL-AT and FX-AT. , 4 Architecture of Truncated Fixed-Width Adder Tree (TFX-AT) -- 5 Improved ITFX-AT Architecture -- 6 Simulation Results -- 7 Conclusion -- References -- Design of T Flip-Flop Based on QCA Technology -- 1 Introduction -- 2 Basics of QCA -- 2.1 Basic Cell in QCA -- 3 QCA Implementation of Proposed T Flip-Flop -- 4 Simulation Results -- 5 Conclusion -- References -- Efficient Image Watermarking Using Particle Swarm Optimization and Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Feature Extraction -- 3.2 Optimization Coefficient (K) -- 3.3 Embedding of Watermark -- 4 Experimental Analysis -- 5 Conclusion and Future Work -- References -- A Review on Various Cloud-Based Electronic Health Record Maintenance System for COVID-19 Patients -- 1 Introduction -- 2 Corona Virus -- 2.1 Possibilities of Transmission -- 2.2 Diagnosis Methods -- 2.3 Prevention Methods -- 2.4 Severe Coronavirus Disease Patients with Coagulopathy -- 3 Implementation of Electronic Health Record -- 3.1 Attribute-Based Encryption -- 3.2 Privacy-Preserving Attribute-Based Mechanism -- 3.3 Fuzzy-Based Keyword Search in Document -- 3.4 Dynamic Multi-keyword-Based Search in Cloud -- 4 Conclusion -- References -- Contourlet Transformed Image Fusion Based on Focused Pixels -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Existing Methods -- 3.2 Block Diagram -- 3.3 Implementation Tool -- 4 Experimental Results -- 5 Conclusion -- Bibliography -- Design of Efficient High-Speed Low-Power Consumption VLSI Architecture for Three-Operand Binary Adders -- 1 Introduction -- 2 Existing Methods -- 2.1 Carry-Save Adder -- 2.2 Han-Carlson Adder -- 3 Proposed Method -- 4 Simulation Results -- 5 Conclusion -- References -- DLCNN Model with Multi-exposure Fusion for Underwater Image Enhancement -- 1 Introduction -- 2 Related Works. , 3 DLCNN Architecture -- 4 Proposed Method -- 5 Results and Discussions -- 6 Conclusion -- References -- Machine Learning Approach-Based Plant Disease Detection and Pest Detection System -- 1 Introduction -- 2 Existing Method -- 3 Plant Leaf Disease Detection System -- 3.1 Image Acquisition -- 3.2 Image Preprocessing -- 3.3 Image Histogram -- 3.4 Image Segmentation -- 3.5 Feature Selection -- 3.6 Classifier -- 4 Pest Detection System -- 5 Results and Discussion -- 6 Conclusion -- References -- RETRACTED CHAPTER: Design of Low Voltage Pre-settable Adiabatic Flip-Flops Using Novel Resettable Adiabatic Buffers -- Raspberry Pi-Based Smart Mirror -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results -- 5 Conclusion -- References -- Deep Learning Framework for Object Detection from Drone Videos -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Training Phase -- 3.2 Inference Phase -- 4 Results -- 5 Conclusion -- References -- VoteChain: Electronic Voting with Ethereum for Multi-region Democracies -- 1 Introduction -- Design and Analysis of Multiband Self-complimentary Log Periodic Tripole Antenna (LPTA) for S and C-Band-Based Radar Applications -- 1 Introduction -- 2 Design of Self-complimentary Log Periodic Tripole Antenna (LPTA) -- 3 Results and Discussion -- 4 Conclusion -- References -- Performance of Cooperative Spectrum Sensing Techniques in Cognitive Radio Based on Machine Learning -- 1 Introduction -- 1.1 Spectrum Sensing -- 1.2 Machine Learning-Based SS -- 2 System Model -- 3 Conclusion and Future Work -- References -- Unified Power Quality Conditioner for V-V Connected Electrified Railway Traction Power Supply System -- 1 Introduction -- 1.1 Traction System Configuration -- 2 Design of D-STATCOM to Improve the Power Quality of Traction System -- 2.1 Control Algorithm of D-STATCOM. , 3 Design of UPQC Controller to Improve the Power Quality of Traction System -- 3.1 Design of DVR -- 3.2 Control Strategy of DVR -- 4 Simulation Result and Discussion -- 4.1 Without Any Compensator -- 4.2 With D-STATCOM -- 4.3 With DVR -- 4.4 With UPQC -- 5 Conclusion -- References -- Intrusion Detection System Using Deep Convolutional Neural Network and Twilio -- 1 Introduction -- 2 Proposed System -- 2.1 Objective -- 2.2 Overview -- 2.3 Tools and Methodologies Used -- 2.4 Working of the Proposed System -- 2.5 System Implementation -- 3 Experiment Results and Discussions -- 4 Conclusion and Future Scope -- Bibliography -- A Neural Network-Based Cardiovascular Disease Detection Using ECG Signals -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 ECG Signals -- 3.2 Buffering -- 3.3 Multimodal Fusion -- 3.4 Clustering -- 3.5 Extraction -- 3.6 Classification by Convolutional Neural Network -- 3.7 Train Data Set -- 4 Results -- 5 Conclusion -- References -- Detection and Classification of Lung Cancer Using Optimized Two-Channel CNN Technique -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Pre-processing -- 3.2 Segmentation with RCCN -- 3.3 Optimization by Cuckoo Search -- 3.4 Classification RCCN with Two-Channel CNN -- 3.5 Attributes -- 4 Results and Analysis -- 5 Conclusion -- References -- Design of High Efficiency FIR Filters by Using Booth Multiplier and Data-Driven Clock Gating and Multibit Flip-Flops -- 1 Introduction -- 1.1 Background -- 1.2 Objectives -- 1.3 Need and Importance -- 2 Existing Methods -- 3 Proposed Methodology -- 3.1 Using MATLAB -- 3.2 RTL Schematic Diagram -- 3.3 Data-Driven Clock Gating -- 3.4 Implementation Tool -- 4 Simulation Results -- 5 Conclusion -- References -- Detecting the Clouds and Determining the Weather Condition and Coverage Area of Cloud Simultaneously Using CNN -- 1 Introduction. , 1.1 Objectives.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (427 pages)
    Edition: 1st ed.
    ISBN: 9789813366916
    Series Statement: Algorithms for Intelligent Systems Series
    DDC: 006.3
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- IOT Smart Locker -- 1 Introduction -- 2 Literature Review -- 3 Workflow of the System -- 3.1 To Open This Smart Locker, the User Has to Go Under These Steps to Access the Locker -- 3.2 Tool Kit -- 3.3 Proposed Model -- 4 Result from Observation -- 5 Conclusion -- References -- Brief Analysis on Human Activity Recognition -- 1 Introduction -- 1.1 Human Activity Recognition (HAR) -- 2 Related Work -- 3 Deep Neural Network (DNN) -- 4 System Design -- 5 Result -- 6 Conclusion -- References -- Lora-Based Smart Garbbage Alert Monitoring System Using ATMEGA 328, 2560, 128 -- 1 Introduction -- 2 Literature Review -- 3 Existing System -- 4 Proposed System -- 5 Working -- 6 Cloud Database -- 7 Simulated Output of the System on the Cloud -- 8 Components Required -- 9 IR Sensor -- 10 LoRaWAN -- 11 Principle of Operation -- 12 Conclusion -- References -- Pre-birth Prognostication of Education and Learning of a Fetus While in the Uterus of the Mother Using Machine Learning -- 1 Introduction -- 2 Why Subsidizing in Early Brain Development? -- 2.1 Literature Survey -- 2.2 The Three Key Aspects What Baby Learns -- 2.3 How Early Staged Career Guidance Can Shape Future -- 3 How the Future Learning Can Be Predicted -- 3.1 Applying Decision Tree to Predict Educational Stream -- 3.2 Merits and Demerits of This Predication -- 4 Conclusion -- References -- Performance Analysis of Single-Stage PV Connected Three-Phase Grid System Under Steady State and Dynamic Conditions -- 1 Introduction -- 2 Photovoltaic System -- 2.1 PV System -- 2.2 Power Electronic Converter -- 2.3 MPPT Method -- 3 Simulation Result Analysis -- 4 Conclusions -- References -- Delay Feedback H_infty Control for Neutral Stochastic Fuzzy Systems with Time Delays -- 1 Introduction -- 2 Problem Description -- 3 Main Results -- 4 Numerical Example. , 5 Conclusion -- References -- Modeling Crosstalk of Tau and ROS Implicated in Parkinson's Disease Using Biochemical Systems Theory -- 1 Introduction -- 2 Methods -- 2.1 Generalized Mass Action Kinetics -- 2.2 Michaelis-Menten's Kinetics -- 2.3 Hill Equation -- 3 Results -- 3.1 Increased Concentration Levels of ROS, Alpha Synuclein Aggregation and Oxidized DJ-1 in Diseased Conditions -- 3.2 Mitochondrial Dysfunction Leads to NFT Production in Diseased Conditions -- 4 Discussion -- 5 Conclusion -- References -- IoT-Based Patient Vital Measuring System -- 1 Introduction -- 2 Literature Survey -- 3 Hardware and Software Platform -- 4 Result and Performance Analysis -- 5 Security Compliance -- 6 Conclusion and Future Work -- References -- IoT-Enabled Logistics for E-waste Management and Sustainability -- 1 Introduction -- 2 Literature Review -- 3 E-waste Management Network -- 4 Conclusion -- References -- Navigation Through Proxy Measurement of Location by Surface Detection -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Feature Extraction -- 3.4 Model Selection -- 3.5 Performance Evaluation -- 4 Conclusion and Future Enhancements -- References -- Unsupervised Learning Algorithms for Hydropower's Sensor Data -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 One Class Support Vector Machine -- 3.2 Isolation Forest -- 4 Conclusion -- References -- Feature Construction Through Inductive Transfer Learning in Computer Vision -- 1 Introduction -- 2 Deep Learning -- 3 Transfer Learning -- 4 Target Dataset-Place Dataset -- 5 Overall Approach -- 5.1 Data Pre-processing -- 5.2 Model Transfer -- 5.3 Training the Datasets -- 5.4 Figures and Tables -- 6 Result -- 7 Conclusion and Future Work -- References. , Decoding Motor Behavior Biosignatures of Arm Movement Tasks Using Electroencephalography -- 1 Introduction -- 2 Methods -- 2.1 Subject Summary and Data Collection -- 2.2 Design of Experiment and Execution Steps -- 2.3 Design of Experiment and Execution Steps -- 3 Results -- 3.1 Increased Θ and γ Activity in Frontal and Temporal Regions in Motor Planning Phase of Cognitive Tasks -- 3.2 Behavioral Variations in Θ and γ Rhythms in Frontal, Temporal and Parietal Lobes in Motor Execution Phase of Cognitive Motor Performances -- 3.3 Activity Related Increase of Theta and Gamma Waves in Frontal and Temporal Regions in Linear and Complex Motor Actions -- 4 Discussion -- 5 Conclusion -- References -- Emergency Robot -- 1 Introduction -- 1.1 Literature Survey -- 2 Description of Vehicle Section -- 2.1 Gas detector -- 2.2 Metal Detector -- 2.3 Web Camera -- 2.4 Gun Control -- 3 System Implementation -- 3.1 Work Flow of the Model -- 3.2 Troubleshooting -- 4 Proposed System -- 4.1 Controlling Section -- 5 Hardware Implementation -- 5.1 Circuit Diagram -- 6 Result -- 7 Conclusion -- 8 Future Scope -- References -- Type Inference in Java: Characteristics and Limitations -- 1 Introduction -- 2 Type Inference in Java -- 2.1 Java 5 -- 2.2 Java 7 -- 2.3 Java 8 -- 2.4 Java 10 -- 3 Limitations -- 3.1 Wildcard as Return Type -- 3.2 Chained Method Call -- 3.3 Local Variable Inference -- 4 Discussion -- 5 Conclusion -- References -- Detection and Correction of Potholes Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Support Vector Machine -- 4.1 Working of SVM -- 4.2 Working of Pothole Detection Robot -- 5 Results and Discussions -- 5.1 Normal Support Vector Classifier (SVC) Where no Features Are Used Gives 62.5% Accuracy. -- 5.2 SVC with Corner Detection Gives 62.5% Accuracy. , 5.3 SVC with Canny Edge Detection is 75% Accuracy. -- 5.4 SVC with Canny Edge Detection and Corner Detection 68.75% Accuracy. -- 6 Future Scope -- 7 Conclusion -- References -- Detecting COVID-19 Using Convolution Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Data Preprocessing -- 3.2 Implementation -- 4 Results and Discussions -- 5 Conclusion -- References -- Electroencephalography Measurements and Analysis of Cortical Activations Among Musicians and Non-musicians for Happy and Sad Indian Classical Music -- 1 Introduction -- 2 Methods -- 2.1 Subject Selection and Screening -- 2.2 Auditory Stimuli -- 2.3 Experiment Design -- 2.4 EEG Data Acquisition and Computational Analysis -- 3 Results -- 3.1 Brain Rhythms Shifts from Gamma-Alpha in Happy Music Perception and Alpha-Beta-Gamma for Other Auditory Cues in Musicians and Non-musicians -- 3.2 Behavioural Pattern Variations of Brain Rhythms for Sad Music Stimuli and Other Auditory Cues in Musicians and Non-musicians -- 4 Discussion -- 5 Conclusion -- References -- Signal Processing in Yoga-Related Neural Circuits and Implications of Stretching and Sitting Asana on Brain Function -- 1 Introduction -- 2 Methods -- 2.1 Experimental Protocol and Characteristics -- 3 Results -- 3.1 Increased Changes Attributed to Memory and Attention Observed in Practitioners -- 3.2 Statistical Analysis on the Task Scores Shows Homogenous Performance Between the Genders -- 3.3 Statistical Analysis on the Task Scores Shows There is Significant Difference Between the Groups -- 4 Discussion -- 5 Conclusion -- References -- Automation of Answer Scripts Evaluation-A Review -- 1 Introduction -- 2 Related Work -- 3 Challenges -- 4 Conclusion -- References -- Diabetes Mellitus Detection and Diagnosis Using AI Classifier -- 1 Introduction -- 2 Proposed Methodology -- 3 Results and Discussion. , 4 Conclusion -- References -- Review on Unit Selection-Based Concatenation Approach in Text to Speech Synthesis System -- 1 Introduction -- 2 The Process of Speech Production -- 2.1 Basic TTS System -- 3 Different Synthesizer Technologies -- 3.1 Concatenative Synthesis -- 3.2 Unit Selection Synthesis -- 3.3 Unit Selection and Specification Process -- 4 Comparison of Different Synthesis Methods -- 5 Conclusion -- References -- Enhancing the Security of Confidential Data Using Video Steganography -- 1 Introduction -- 2 Steganography and Cryptography -- 2.1 Steganography -- 2.2 Cryptography -- 3 Related Work -- 4 Frame Selection Approach -- 5 Methodology -- 6 Parameter Metrices -- 7 Results and Discussion -- 8 Conclusion -- References -- Data Mining and Analysis of Reddit User Data -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 4 Result and Discussion -- 5 Conclusion -- 6 Future Scope -- References -- Analysis of DNA Sequence Pattern Matching: A Brief Survey -- 1 Introduction -- 2 Literature Review -- 3 Conclusion -- References -- Sensor-Based Analysis of Gait and Assessment of Impacts of Backpack Load on Walking -- 1 Introduction -- 2 Methods -- 2.1 Effect of Backpack on Lower Body -- 3 Results -- 3.1 Measured Gait Variability Across Different Subject Groups Using Froude Analysis -- 3.2 Attribute Selection to Classify Gait -- 3.3 Gender-Based Classification with Respect to Fr Number. -- 3.4 Effect of Backpack Load on Pelvis during Walking to Understand the Gait Pathological Condition -- 4 Discussion -- 5 Conclusion -- References -- Wireless Battery Monitoring System for Electric Vehicle -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 System Block Diagram -- 4.1 Sensors -- 4.2 Wi-Fi Module -- 5 System Flow Chart -- 5.1 Electric Vehicle Battery Specification -- 6 Result -- 7 Software Preparation -- 7.1 Arduino IDE. , 7.2 AVR Studio.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Noncooperative games (Mathematics). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (175 pages)
    Edition: 1st ed.
    ISBN: 9783030161620
    Series Statement: Studies in Fuzziness and Soft Computing Series ; v.383
    DDC: 519.29999999999995
    Language: English
    Note: Intro -- Preface -- Acknowledgements -- Contents -- 1 Matrix Games with Interval Payoffs -- 1.1 Matrix Games with Interval Payoffs -- 1.2 Existing Mathematical Formulation of Matrix Games with Interval Payoffs -- 1.3 Literature Review of Matrix Game with Interval Payoffs -- 1.4 Arithmetic Operations over Intervals -- 1.5 Flaws of the Existing Methods -- 1.6 Invalidity of Existing Mathematical Formulation of Matrix Games with Interval Payoffs -- 1.6.1 Existing Method to Obtain Mathematical Formulation of Matrix Games with Interval Payoffs -- 1.6.2 Mathematically Incorrect Assumptions Considered in the Existing Method -- 1.7 Minimum and Maximum of Intervals -- 1.7.1 Minimum of Intervals -- 1.7.2 Maximum of Intervals -- 1.8 Proposed Gaurika Method -- 1.8.1 Minimum Expected Gain of Player I -- 1.8.2 Maximum Expected Loss of Player II -- 1.9 Numerical Examples -- 1.9.1 Existing Numerical Example Considered by Nayak and Pal -- 1.9.2 Existing Numerical Example Considered by Li et al. -- 1.10 Conclusion -- References -- 2 Matrix Games with Fuzzy Payoffs -- 2.1 Matrix Games with Fuzzy Payoffs -- 2.2 Preliminaries -- 2.2.1 Some Basic Definitions -- 2.2.2 Arithmetic Operations of Trapezoidal Fuzzy Numbers -- 2.2.3 Comparison of Fuzzy Numbers -- 2.3 Existing Mathematical Formulation of Matrix Games with Fuzzy Payoffs -- 2.4 Literature Review of Matrix Games with Fuzzy Payoffs -- 2.5 Flaws of the Existing Methods -- 2.6 Invalidity of Existing Mathematical Formulation of Matrix Games with Fuzzy Payoffs -- 2.7 Proposed Mehar Method -- 2.7.1 Minimum Expected Gain of Player I -- 2.7.2 Maximum Expected Loss of Player II -- 2.8 Numerical Example -- 2.8.1 Minimum Expected Gain of Player I -- 2.8.2 Maximum Expected Loss of Player II -- 2.9 Conclusion -- References -- 3 Constrained Matrix Games with Fuzzy Payoffs -- 3.1 Constrained Matrix Games with Fuzzy Payoffs. , 3.2 Existing Mathematical Formulation of Constrained Matrix Games with Fuzzy Payoffs -- 3.3 Literature Review of Constrained Matrix Games with Fuzzy Payoffs -- 3.4 Flaws of the Existing Methods -- 3.5 Proposed Vaishnavi Method -- 3.5.1 Minimum Expected Gain of Player I -- 3.5.2 Maximum Expected Loss of Player II -- 3.6 Numerical Examples -- 3.6.1 Existing Numerical Example Considered by Li and Hong -- 3.6.2 Existing Numerical Example Considered by Li and Cheng -- 3.7 Conclusion -- References -- 4 Matrix Games with Intuitionistic Fuzzy Payoffs -- 4.1 Matrix Games with Intuitionistic Fuzzy Payoffs -- 4.2 Preliminaries -- 4.2.1 Basic Definitions -- 4.2.2 Arithmetic Operations over Trapezoidal Vague Sets -- 4.3 Existing Mathematical Formulation of Matrix Games with Intuitionistic Fuzzy Payoffs -- 4.4 Literature Review of Matrix Games with Intuitionistic Fuzzy Payoffs -- 4.5 Flaws of the Existing Methods -- 4.6 Proposed Ambika Methods -- 4.6.1 Ambika Method-I -- 4.6.2 Ambika Method-II -- 4.6.3 Ambika Method-III -- 4.6.4 Ambika Method-IV -- 4.7 Numerical Examples -- 4.7.1 Existing Numerical Example Considered by Nan et al. -- 4.7.2 Existing Numerical Example Considered by Li et al. -- 4.7.3 Existing Numerical Example Considered by Nan et al. -- 4.7.4 Existing Numerical Example Considered by Nan et al. -- 4.8 Conclusion -- References -- 5 Bimatrix Games with Intuitionistic Fuzzy Payoffs -- 5.1 The Difference-Index Based Ranking Method -- 5.2 Maximum of Trapezoidal Intuitionistic Fuzzy Numbers -- 5.3 Flaws in the Existing Mathematical Formulation of Bimatrix Games with Intuitionistic Fuzzy Payoffs -- 5.3.1 Mathematical Formulation of Bimatrix Games with Intuitionistic Fuzzy Payoffs -- 5.3.2 Mathematically Incorrect Assumption Considered by Li and Yang -- 5.4 Exact Solution of Bimatrix Games with Intuitionistic Fuzzy Payoffs. , 5.4.1 Exact Mathematical Formulation of Bimatrix Games with Intuitionistic Fuzzy Payoffs -- 5.4.2 Proposed Mehar Method -- 5.4.3 Convergence of the Proposed Mehar Method -- 5.5 Numerical Example -- 5.6 Conclusion -- References -- 6 Future Scope -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    San Diego :Elsevier Science & Technology,
    Keywords: Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (288 pages)
    Edition: 1st ed.
    ISBN: 9780443194160
    DDC: 577.095496
    Language: English
    Note: Front Cover -- CLIMATE CHANGE IN THE HIMALAYAS -- CLIMATE CHANGE IN THE HIMALAYASVULNERABILITY AND RESILIENCE OF BIODIVERSITY AND FOREST ECOSYSTEMSEDITED BYAMIT KUMARSCHOOL ... -- Copyright -- Contents -- Contributors -- About the editors -- 1 - An overview of the Himalaya forests and their drivers of change -- 1. Introduction -- 2. Mountain forests -- 3. Forests of the Himalaya -- 4. Drivers of change of the Himalaya forests -- 5. Discussion and conclusion -- References -- 2 - Assessment and management of small Farmer's climate risks in the hills and plains of Nepal -- 1. Introduction -- 1.1 Theoretical framework -- 1.2 Profile of study area -- 2. Methods -- 2.1 Data collection -- 2.2 Vulnerability and risk assessment -- 3. Results and discussions -- 3.1 Demographic and socioeconomic profile -- 3.2 Climate hazard and exposure assessment -- 3.3 Sensitivity assessment -- 3.4 Adaptive capacity assessment -- 3.5 Vulnerability and risk assessment -- 3.6 Risk management -- 4. Conclusions -- References -- 3 - Comparing and contrasting characterstics of coping and adpatation response -- 1. Introduction -- 2. Methodology -- 3. Results and discussion -- 3.1 Conceptual understanding of "coping" and "adaptation." -- 3.1.1 The difference in characteristics of "coping" and "adaptation." -- 3.1.2 Consensus between coping and adaptation is outlined -- 3.1.3 How is there a conflation of response between coping and adaptation? -- 3.2 How does the progression of response frame a link between coping and adaptation? -- 3.2.1 Coping for survival -- 3.2.2 Camouflage adaptation -- 3.2.3 Discrete adaptation -- 3.2.4 Incremental and transformational adaptation -- 3.2.5 An amalgamation of coping and adaptation -- 3.3 How the link between short-term action and long-term response is drawn? -- 3.3.1 Way forward: linking short-term action to long-term response. , 3.3.1.1 Positive outcome -- 3.3.1.2 Negative outcome -- 4. Future directions -- 5. Conclusions -- References -- Further reading -- 4 - Forest transition and ecosystem services in Himalaya -- 1. Introduction -- 2. Forest transition and its relevance for the Himalaya -- 2.1 Ecosystem services under forest transition -- 3. Materials and methods -- 4. Forest transition and ecosystem services transition in the Himalaya -- 4.1 Forest transition in the Himalaya -- 4.2 Ecosystem services transition in the Himalaya -- 5. Discussion -- 6. Conclusions -- References -- 5 - Viable land use options to achieve multiple ecosystem services in the Eastern Himalayas of India -- 1. Introduction -- 2. Materials and methods -- 2.1 Study area and land uses -- 2.2 Soil sampling and analysis -- 2.3 Data analysis -- 3. Results and discussion -- 4. Conclusion -- References -- Further reading -- 6 - Species and crown density-specific variability in biomass carbon across Sindh forest landscape in the Western H ... -- 1. Introduction -- 2. Materials and methods -- 2.1 Study area -- 2.2 Methodology -- 3. Results -- 3.1 Forest biomass and carbon -- 3.2 Average biomass carbon and tree density ranges under different forest density classes -- 4. Discussion -- 4.1 Forest biomass and carbon stocks -- 5. Conclusion -- References -- 7 - Climate-resilient pathways and nature-based solutions to reduce vulnerabilities to climate change in the Indian ... -- 1. Introduction -- 2. Contributions to resilience pathways through responses to climate change -- 2.1 Climate change mitigation -- 2.2 Climate change adaptation -- 3. Nature-based solutions for disaster risk reduction -- 4. Nature-based solutions for climate change mitigation -- 4.1 Ecosystem-based adaptation -- 4.2 Ecosystem-based mitigation -- 5. Conclusion -- References. , 8 - REDD+ and its implementation in the Himalayan region: policy issues -- 1. Introduction -- 2. Development of REDD+, up to Paris Agreement (PA) and beyond -- 2.1 India's contribution in making REDD as REDD+ -- 2.2 REDD+ in Articles 5 and 6.2 of Paris Agreement (PA)-requirements for results-based payments (RBPs), elements of "authorizat ... -- 2.3 Journey of Article 6 rulebook up to glasgow -- 2.4 Glasgow Climate Pact, rulebook on Art 6.2 ITMOs, authorization, adjustment (2/CMA.3) -- 3. Issues with REDD+ -- 3.1 UNFCCC REDD+ and VM projects -- 3.2 Jurisdictional or subnational approach of REDD+projects -- 4. Future of VM in REDD+ -- 5. Implementation of REDD+ in India -- 5.1 Exclusion of tree cover in FRL -- 5.2 National forest reference level of India -- 6. Option for the Himalayan States to implement REDD+ -- 7. Potential for contribution by Himalayan States -- 8. Conclusion -- References -- 9 - Land degradation evaluation based on SDG indicators in the eastern Himalayan region: A case study from Nagaland ... -- 1. Introduction -- 2. Study site -- 3. Materials and methods -- 3.1 Data source and tools -- 3.2 Methodology -- 3.2.1 Change in land cover indicator -- 3.2.2 Land productivity indicator -- 3.2.3 Change in soil organic carbon indicator -- 3.2.4 Land degradation neutrality status -- 4. Results and discussion -- 4.1 Land cover change in the state -- 4.2 Land productivity changes in the state -- 4.3 SOC change in the state -- 4.4 Land degradation status of Nagaland -- 5. Conclusion -- References -- 10 - Leveraging on technology-driven information systems for conservation through informed decisions in the Hindu K ... -- 1. Introduction -- 2. Role of information systems -- 3. Ecological niche studies -- 3.1 Advancement in modeling algorithms -- 3.2 Advancement in data collection -- 4. Monitoring and information dissemination platforms. , 4.1 Geospatial analysis using google earth engine -- 4.2 Basic of google earth engine application development -- 5. Bioinformatics approaches -- 5.1 Identification of genes conferring disease resistance -- 5.2 Conservation strategy in the genomic era -- 5.3 Association mapping and adaptation -- 6. Opportunities for research and improvements -- 7. Conclusion -- References -- 11 - Ecosystem services of the Indian Himalayan Region in a changing environment: an overview -- 1. Introduction -- 2. Present and future impacts of climate change on ecosystem services -- 2.1 Impacts on temperature regulation -- 2.2 Impacts on biodiversity services -- 2.3 Impacts on watershed services -- 2.4 Impacts on cultural services -- 3. How the valuation of ecosystem services be helpful for IHR conservation? -- 4. Policies promoting and sustaining ecosystem services in IHR -- 4.1 Policies instruments of the forest, wildlife, and environment sectors for ecosystem services management in IHR -- 4.2 Environmental performance index -- 5. Conclusion -- Acknowledgments -- References -- 12 - Changing climatic scenarios: impacts, vulnerabilities, and perception with special reference to the Indian Him ... -- 1. Introduction -- 2. Study area -- 3. Impacts of climate change on biodiversity -- 4. Impact of climate change on glaciers/water bodies -- 5. Impact of climate change on agriculture -- 6. Impact of climate change on livelihood -- 7. Vulnerabilities and adaptations to climate change -- 8. Local perception to changing climatic scenarios -- 9. Conclusion and recommendations -- References -- Further reading -- 13 - Carbon stock inventory and biomass production in different land use systems of Northwestern Himalaya -- 1. Introduction -- 2. Biomass and carbon pools -- 3. Agroforestry systems -- 4. Forest ecosystem -- 5. Variation in land use systems -- 6. Future prospects. , 7. Conclusion -- References -- 14 - Vulnerability assessment of forest ecosystems: Climate change perspective -- 1. Introduction -- 2. Defining vulnerability, resilience, and other linked terminology with reference to climate change -- 2.1 Types of vulnerability -- 2.2 Expressing vulnerability -- 2.3 Resilience of forest ecosystems -- 3. Vulnerability assessment linked to climate change -- 3.1 Conceptual frameworks adopted for the climate change vulnerability assessment -- 3.1.1 Double structure of vulnerability -- 3.1.2 Risk hazard and pressure and release model -- 3.1.3 Turner's framework: coupled social and ecological systems -- 3.1.4 IPCC guidelines of vulnerability -- 3.1.5 Yokohama strategy -- 3.1.6 Hyogo framework -- 3.1.7 Sendai framework -- 4. Various methodologies adopted for assessing climate change vulnerability -- 4.1 The top-down or quantitative approach -- 4.2 Qualitative bottom-up local-scenario approach -- 4.3 Resilience-driven approach -- 5. Methodological advancements in assessing climate change vulnerability -- 6. Way forward -- 7. Conclusions -- References -- 15 - Synthesis and conclusions -- 1. Summary and synthesis -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Y -- Z -- Back Cover.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Zurich :Trans Tech Publications, Limited,
    Keywords: Electronic books.
    Description / Table of Contents: Nanocomposites: The Future MaterialsSpecial topic volume with invited peer reviewed papers only.
    Type of Medium: Online Resource
    Pages: 1 online resource (180 pages)
    Edition: 1st ed.
    ISBN: 9783035732566
    Series Statement: Nano Hybrids and Composites Series ; v.Volume 20
    Language: English
    Note: Intro -- Nano Hybrids and Composites Vol. 20 -- Preface -- Table of Contents -- WO3-TiO2 Nanocomposite and its Applications: A Review -- Nanocomposites in Controlled & -- Targeted Drug Delivery Systems -- Nanocomposites of Chalcogenide and their Applications -- Nanocomposites: Recent Trends and Engineering Applications -- Role of Nanocomposites in Agriculture -- Nanocomposite for Solar Energy Application -- Fabrication of Gelatin-Zr (IV) Phosphate and Alginate-Zr (IV) Phosphate Nanocomposite Based Ion Selective Membrane Electrode -- Development and Physico-Chemical Characterization of Conducting Polymeric Zirconium Based Advanced Nanocomposite Ion-Exchangers for Environmental Remediation -- Magnetic Nano-Сomposites and their Industrial Applications -- Keyword Index -- Author Index.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    Keywords: Fuzzy sets. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (235 pages)
    Edition: 1st ed.
    ISBN: 9783030266769
    Series Statement: Studies in Fuzziness and Soft Computing Series ; v.385
    Language: English
    Note: Intro -- Contents -- 1 Introduction -- 1.1 A Brief Literature Review -- 1.2 Outline of the Book -- References -- 2 A Brief Introduction to Fuzzy Sets -- 2.1 Basic Definitions and Properties of Fuzzy Sets -- 2.2 Basic Set-Theoretic Operations on Fuzzy Sets -- 2.3 Fuzzy Relations -- 2.4 Fuzzy Numbers and Fuzzy Arithmetic -- 2.5 Fuzzy Events and Their Probabilities -- 2.6 Defuzzification of Fuzzy Sets -- References -- 3 A Brief Introduction to Fuzzy Optimization and Fuzzy Mathematical Programming -- 3.1 Introductory Remarks -- 3.2 Main Approaches to Fuzzy Optimization -- 3.3 Bellman and Zadeh's General Approach to Decision Making Under Fuzziness -- 3.4 Using the α-cuts of the Fuzzy Feasible Set -- 3.5 Fuzzy Mathematical Programming -- 3.6 Fuzzy Linear Programming -- 3.7 Fuzzy Linear Programming with Fuzzy Constraints -- 3.8 Fuzzy Coefficients in the Objective Function -- 3.9 Fuzzy Coefficients in the Technological Matrix -- References -- 4 New Methods for Solving Fully Fuzzy Transportation Problems with Trapezoidal Fuzzy Parameters -- 4.1 Preliminaries -- 4.1.1 Basic Definitions Related to Fuzzy Numbers -- 4.1.2 Arithmetic Operations on the Trapezoid Fuzzy Numbers -- 4.2 A Fuzzy Linear Programming Formulation of the Balanced Fully Fuzzy Transportation Problem -- 4.3 Existing Methods for Finding a Fuzzy Optimal Solution of the Fully Fuzzy Transportation Problem -- 4.4 Liu and Kao's Method -- 4.4.1 Fully Fuzzy Transportation Problems with the Inequality Constraints -- 4.4.2 Fully Fuzzy Transportation Problems with Equality Constraints -- 4.5 A Critical Analysis of the Existing Methods -- 4.6 On Some New Methods for Solving the Fully Fuzzy Transportation Problem -- 4.6.1 A New Method Based on a Fuzzy Linear Programming Formulation -- 4.6.2 Method Based on the Tabular Representation -- 4.6.3 Advantages of the Proposed Methods over the Existing Methods. , 4.7 An Illustrative Example -- 4.7.1 Fuzzy Optimal Solution Using the Method Based on Fuzzy Linear Programming Formulation -- 4.7.2 Fuzzy Optimal Solution Using the Method Based on Tabular Representation -- 4.7.3 Interpretation of Results -- 4.8 Case Study -- 4.8.1 Description of the Problem -- 4.8.2 Results Obtained -- 4.8.3 Interpretation of Results -- 4.9 Concluding Remarks -- References -- 5 New Methods for Solving the Fully Fuzzy Transportation Problems with the LR Flat Fuzzy Numbers -- 5.1 Preliminaries -- 5.2 Basic Definitions -- 5.3 Arithmetic Operations on the LR Flat Fuzzy Numbers -- 5.4 Solution of the Fully Fuzzy Transportation Problems with Parameters Represented by the LR Fuzzy Numbers or LR Flat Fuzzy Numbers -- 5.5 New Methods -- 5.5.1 Method Based on Fuzzy Linear Programming -- 5.5.2 Method Based on the Tabular Representation -- 5.5.3 Main Advantages of the Proposed Methods -- 5.6 Illustrative Example -- 5.6.1 Determination of the Fuzzy Optimal Solution Using the Method Based on the Fuzzy Linear Programming -- 5.6.2 Determination of the Fuzzy Optimal Solution Using the Method Based on the Tabular Representation -- 5.6.3 Interpretation of Results -- 5.7 A Comparative Study -- 5.8 Concluding Remarks -- References -- 6 New Improved Methods for Solving the Fully Fuzzy Transshipment Problems with Parameters Given as the LR Flat Fuzzy Numbers -- 6.1 Fuzzy Linear Programming Formulation of the Balanced Fully Fuzzy Transshipment Problems -- 6.2 Outline of the Ghatee and Hashemi Method -- 6.3 On Some Limitations of the Existing Methods -- 6.4 New Methods -- 6.4.1 New Method Based on the Fuzzy Linear Programming Formulation -- 6.4.2 New Method Based on the Tabular Representation -- 6.4.3 Advantages of the New Methods -- 6.5 Illustrative Example. , 6.5.1 Determination of the Optimal Solution Using the Method Based on the Fuzzy Linear Programming Formulation -- 6.5.2 Determination of the Optimal Solution Using the Method Based on the Tabular Representation -- 6.5.3 Interpretation of Results -- 6.6 A Comparative Study -- 6.7 A Case Study -- 6.8 Concluding Remarks -- References -- 7 New Methods for Solving Fully Fuzzy Solid Transportation Problems with LR Fuzzy Parameters -- 7.1 Fuzzy Linear Programming Formulation of the Balanced Fully Fuzzy Solid Transportation Problems -- 7.2 Liu and Kao's Method -- 7.3 Some Shortcomings of Liu and Kao's Method -- 7.4 Limitations of the Methods Proposed in the Previous Chapters -- 7.5 New Methods -- 7.5.1 New Method Based on the Fuzzy Linear Programming Formulation -- 7.5.2 New Method Based on the Tabular Representation -- 7.5.3 Advantages of the New Methods -- 7.6 Illustrative Example -- 7.6.1 Determination of the Fuzzy Optimal Solution Using the New Method Based on the Fuzzy Linear Programming Formulation -- 7.6.2 Determination of the Fuzzy Optimal Solution Using the New Method Based on the Tabular Representation -- 7.6.3 Interpretation of Results -- 7.7 A Comparative Study -- 7.8 A Case Study -- 7.8.1 Problem Description -- 7.8.2 Results -- 7.8.3 Interpretation of Results -- 7.9 Concluding Remarks -- References -- 8 New Methods for Solving Fully Fuzzy Solid Transshipment Problems with LR Flat Fuzzy Numbers -- 8.1 New Fuzzy Linear Programming Formulation of the Balanced Fully Fuzzy Solid Transshipment Problem -- 8.2 Limitations of the Existing Method and Methods Proposed in Previous Chapters -- 8.3 New Methods -- 8.3.1 New Method Based on the Fuzzy Linear Programming Formulation -- 8.3.2 New Method Based on the Tabular Representation -- 8.3.3 Advantages of the New Methods -- 8.4 Illustrative Example. , 8.4.1 Determination of the Fuzzy Optimal Solution of the Fully Fuzzy Solid Transshipment Problem Using the Method Based on the Fuzzy Linear Programming Formulation -- 8.4.2 Determination of the Fuzzy Optimal Solution of the Fully Fuzzy Solid Transshipment Problem Using the Method Based on the Tabular Representation -- 8.4.3 Interpretation of Results -- 8.5 A Comparison of Results Obtained -- 8.6 Concluding Remarks -- References -- 9 Conclusions and Future Research Directions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (2010 pages)
    Edition: 1st ed.
    ISBN: 9789811514203
    Series Statement: Lecture Notes in Electrical Engineering Series ; v.601
    DDC: 6.3
    Language: English
    Note: Intro -- Contents -- Intrusion Detection System Using Soft Computing Techniques: A Review -- Abstract -- 1 1 Introduction -- 2 2 Soft Computing -- 3 3 Methodology -- 3.1 Sources and Search Methods -- 3.2 Scope -- 3.3 Framework -- 4 4 The Target Subject Processes -- 4.1 Software Tools -- 4.2 Approach Contribution -- 4.3 Training and Testing Dataset -- 4.4 Applied Algorithm -- 5 5 Analysis -- 6 6 Discussion -- 7 7 Conclusion -- References -- Machine Learning Based Outlook for the Analysis of SNP-SNP Interaction for Biomedical Big Data -- Abstract -- 1 Introduction -- 2 Role of SNPs in Biomedical and Healthcare -- 3 SNP-SNP Analysis Methods and Models -- 3.1 Logistic Regression Methods -- 3.2 Combinatorial Methods -- 3.3 Support Vector Machines -- 3.4 Bayesian Networks -- 4 Software Tools/Databases for SNP-SNP Interaction Analysis -- 5 Research Challenges Ahead -- 6 Conclusion -- References -- A Compendium on Network and Host Based Intrusion Detection Systems -- 1 Introduction -- 2 Big Data Analytics -- 3 Neural Networks -- 4 Deep Learning -- 5 Neural Networks and Deep Learning Techniques for Network Based IDS (NIDS) -- 6 Neural Networks and Deep Learning Techniques for Host Based IDS (HIDS) -- 7 Conclusion -- References -- Performance Evaluation of Stochastic Gammatone Filters -- Abstract -- 1 Introduction -- 2 Stochastic Gammatone Filters -- 3 Gain Balancing Techniques -- 4 Dynamic Scaling Techniques -- 5 Experimental Results and Conclusion -- References -- Optimization of Multi-way Join Cost Using System R* and SharesSkew -- Abstract -- 1 1 Introduction -- 2 2 Related Work -- 3 3 System R* Optimization -- 3.1 Description of R* Algorithm -- 3.2 Evaluation of Cost Function -- 3.3 Applying R* Algorithm on an Example -- 4 4 SharesSkew Algorithm Using MapReduce -- 4.1 Attribute Dominance -- 4.2 Relation Partition -- 4.3 Description of SharesSkew. , 4.4 Evaluation of Cost Function for Residual Joins -- 4.5 SharesSkew on Banking System -- 5 5 Conclusions -- References -- Study of K-Means Clustering Algorithm for Identification of Dengue Fever Hotspots -- Abstract -- 1 1 Introduction -- 2 2 Literature Review -- 2.1 Why K-Means Algorithm -- 2.2 Distance Metrics -- 3 3 Data Collection -- 4 4 Proposed Methodology -- 4.1 Determining Optimal Clusters -- 5 5 Results -- 6 6 Results -- References -- WhatsApp: A Business Tool in Unorganized Retail with Reference to TAM -- Abstract -- 1 Introduction -- 2 Review of Literature -- 3 Social Media and Retailing in India -- 4 Research Background -- 5 Reason for Selecting TAM -- 6 WhatsApp: A Tool for Business -- 7 Research Methodology -- 8 Data Collection and Measurement -- 9 Results and Discussion -- 9.1 Reliability and Validity Assessment -- 9.2 Confirmatory Factor Analysis (CFA) -- 9.3 Structural Equation Modeling (SEM) -- 10 Conclusion -- References -- A Framework for the RNA-Seq Based Classification and Prediction of Disease -- Abstract -- 1 Introduction -- 2 Review of Literature -- 3 The Proposed Framework -- 3.1 Quality Control -- 3.2 Read Mapping -- 3.3 Read Count -- 3.4 Differentially Expressed Genes (Features) Identification -- 3.5 Select an Appropriate Classifier -- 4 List of Available Software Tools to Implement the Framework -- 5 Discussion, Conclusion and Future Work Direction -- Acknowledgements -- References -- Bio-Inspired AI Optimization Techniques to Evaluate Data Rate and Minimize Interference in Cognitive Cellular Network -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 AI Optimization Algorithms for Channel Allocation in CCN -- 3.1 BCO Algorithm -- 3.2 TLBO Algorithm -- 4 Simulated Results -- 5 Conclusion -- References -- Reduction of PAPR in OFDM Signals Using Grey Wolf Optimization Combined with SLM -- Abstract. , 1 1 Introduction -- 2 2 Related Work -- 3 3 PAPR and Selective Mapping(SLM) -- 3.1 PAPR -- 3.2 Selective Mapping Technique -- 4 4 Grey Wolf Based SLM -- 5 5 Results and Discussion -- 6 6 Conclusion -- References -- Idiom Recommendation Using POS Tagging and Sentence Parsing -- Abstract -- 1 Introduction -- 2 Literature Survey -- 2.1 Linguistic Recommendation -- 2.2 Part-of-Speech (POS) Tagger -- 2.3 Parse Trees -- 3 Methodology -- 3.1 Segmentation -- 3.2 Analysis -- 3.3 Extraction -- 3.4 Transformation -- 4 Experimental Setup -- 4.1 Dataset -- 4.2 Evaluation Metric -- 5 Results -- 6 Conclusion -- Acknowledgements -- References -- Indian and European Script Identification: A Review -- Abstract -- 1 1 Introduction -- 2 2 Different Methods of Script Identification -- 2.1 Different Methods for Printed Documents -- 2.2 Different Methods for Handwritten Documents -- 3 3 Tables -- 4 4 Conclusion -- References -- Analysis of Iris Identification System by Using Hybrid Based PSO Classifier -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Iris Recognition System -- 4 Hybrid Based PSO Classifier -- 5 Training Module -- 5.1 Testing Module -- 6 Result Analysis -- 7 Conclusion -- Acknowledgements -- Bibliography -- A Review on Handwritten Indian Script Identification -- Abstract -- 1 Introduction -- 2 Existing Research Methodologies for Script Identification -- 3 Comparative Analysis of Script Identification Methodology -- 4 Conclusion -- References -- Intelligent Medicine Box for Medication Management Using Internet-of Things -- Abstract -- 1 Introduction -- 1.1 Existing System -- 1.2 proposed System -- 2 Methodology -- 3 Conclusion -- References -- A Novel Approach of Object Oriented Image Steganography Using LSB -- Abstract -- 1 Introduction -- 1.1 LSB Steganography -- 1.2 ROI (Region of Interest) Selection -- 2 Literature Review -- 3 Proposed Methodology. , 4 Performance Parameters -- 4.1 Peak Signal to Noise Ratio -- 4.2 Hiding Capacity -- 5 Experimental Results -- 6 Conclusion -- References -- Power-Cognizant Proactive Routing Protocol for Amending Energy in Ad-hoc Networks -- Abstract -- 1 1 Introduction -- 2 2 Related Work -- 3 3 Power-Cognizant Proactive Routing Protocol -- 4 4 Simulation Results and Analysis -- 5 5 Conclusion and Future Work -- References -- Dimensional Insight to Innovations in Security Aspects of Cloud Computing -- Abstract -- 1 Introduction -- 1.1 Motivation for Cloud Computing -- 1.2 Cloud Computing Internals -- 1.3 How Secure Is Cloud? -- 1.3.1 Security Blind Spots -- 1.3.2 Perfect Versus Imperfect Arguments -- 1.4 Security Standards -- 1.5 Cloud Infrastructure -- 1.6 Security Obstacles in Cloud Computing -- 1.6.1 Data Confidentiality -- 1.6.2 Data Integrity -- 1.6.3 Data Location -- 1.6.4 Data Loss -- 2 Techniques in Cloud Security-A Review -- 3 Conclusion -- References -- Classification and Validation of MRI Brain Tumor Using Optimised Machine Learning Approach -- Abstract -- 1 1 Introduction -- 2 2 Literature Survey -- 2.1 Segmentation -- 2.2 Feature Extraction and Classification -- 2.3 Gaps in Literature Survey -- 3 3 Flow of Proposed Methodology -- 3.1 Classification -- 3.1.1 Support Vector Machine Classifier -- 3.1.2 K-Nearest Neighbors (K-NN) -- 3.1.3 MSVM (Multi-class Support Vector Machine) -- 4 4 Performance Analysis and Discussion -- 4.1 A Radial Basis Function (RBF) -- 4.2 Linear Accuracy -- 4.3 Validation Result -- 4.3.1 Confusion Matrix -- 4.3.2 ROC -- 5 5 Conclusion -- References -- Automatic Classification of Parkinson's Disease Based on Severity Estimation -- Abstract -- 1 1 Introduction -- 2 2 Materials and Methods -- 2.1 Dataset Description -- 2.2 Data Processing -- 3 3 Feature Extraction -- 3.1 Autocorrelation Based Features -- 3.2 Data-Driven Features. , 3.3 Interdependence Between the Time Series -- 4 4 Feature Selection and Severity Estimation -- 4.1 Kendall's Rank-Correlation Coefficient -- 4.2 Model -- 5 5 Results -- 6 6 Discussion -- 7 7 Conclusion -- References -- Grocery Product Classification and Recommendation System Based on Machine Learning and Customer Profile Identity -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Classification of Reviews Based on Sentiment Analysis -- 2.2 Numerical Analysis Based Recommendations -- 3 Proposed Grocery Store Recommendations -- 3.1 Web Crawler Method -- 3.2 Data Preprocessing -- 3.3 Tokenization -- 3.4 Frequency Computation -- 3.5 Similar Words and Category Wise Frequency Across Reviews -- 3.6 Product Based Frequency Matrix -- 3.7 Review and Attribute-Based Sentiments -- 3.8 Product and Attribute Based Sentiments -- 3.9 Product Classification -- 3.10 Nutrition Questioner and Customer Classification -- 3.11 Recommendation Engine -- 4 Application Screenshots and Results -- 5 Conclusion -- References -- Enhancing Embedding Capacity of JPEG Images in Smartphones by Selection of Suitable Cover Image -- Abstract -- 1 1 Introduction -- 2 2 Background Study -- 2.1 Compression Algorithms -- 2.2 Selection of Cover Image -- 3 3 Proposed Algorithm -- 4 4 Experiment and Result -- 5 5 Conclusion -- References -- Image Compression Using Convolutional Autoencoder -- Abstract -- 1 1 Introduction -- 2 2 Proposed Methodology -- 2.1 Fetching Dataset -- 2.2 Appling the Convolutional Filters -- 2.3 Encoding and Decoding the Image -- 2.4 Compressing the Image -- 2.5 Synthesizing and Reconstruction of Image -- 2.6 Optimizing the Loss and Noise in the Reconstructed Image -- 3 3 Experimental Analysis -- 4 4 Conclusion -- References -- IoT Based Reconnaissance Framework for Utilizing Different Thresholding Algorithms for Detecting Motion by Using Raspberry Pi -- Abstract. , 1 Introduction.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Keywords: Computational intelligence-Congresses. ; Soft computing-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (899 pages)
    Edition: 1st ed.
    ISBN: 9789811923500
    Series Statement: Cognitive Science and Technology Series
    DDC: 006.3
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computational intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (593 pages)
    Edition: 1st ed.
    ISBN: 9789811531255
    Series Statement: Lecture Notes in Electrical Engineering Series ; v.643
    DDC: 6.3
    Language: English
    Note: Intro -- Contents -- Artificial Neural Network and Partial Pattern Recognition to Detect Malware -- 1 Introduction -- 2 Literature Review -- 2.1 Signature-Based Malware Detection -- 2.2 Behavior-Based Malware Detection -- 2.3 Heuristic-Based Malware Detection -- 3 Methodology -- 3.1 Opcode Extraction -- 3.2 Feature Selection -- 3.3 Constructing Feature Vector -- 3.4 Feature Classifier -- 3.5 Training the Model -- 3.6 Testing -- 4 Dataset Used -- 5 Results -- References -- Epidemiology and Forecasting of Cholera Incidence in North India -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Collection -- 2.2 Application of Software Used for Data Analysis -- 2.3 Methods -- 3 Epidemiological Features -- 3.1 Agent -- 3.2 Mode of Transmission (Vibrio) -- 3.3 Environmental Factors -- 4 Results and Discussions -- 5 Conclusion -- References -- A Novel Approach for Improving Routing Efficiency and Minimizing Propagation Mean Delay for DADCQ Protocol in VANET -- 1 Introduction -- 1.1 Literature Review -- 2 Application Distance Method for 1D and 2D Networks -- 2.1 Analysis of Spatial Distribution in VANET -- 2.2 Adaption of Node Distribution Pattern for 1D and 2D Uniform Distributions -- 3 Reduction of Fading and It's Analysis in the Network -- 4 Design of Quadrant-Based Threshold -- 5 Analysis of Routing Efficiency and It's Improvement for DADCQ Protocol in VANET -- 6 Analysis and Minimizing Mean Delay for DADCQ Under Eavesdropping and DDoS Attacks -- 7 Conclusion -- References -- Human Computer Interaction as a Mode of Improvement in Human Lifestyle -- References -- New Fast and Efficient Techniques for Image Denoising Using VQ, PCA, SVD, Soft Thresholding and Wiener Filter -- 1 Introduction -- 2 Proposed Techniques -- 2.1 Vector Quantization -- 2.2 PCA -- 2.3 PCA for Denoising -- 2.4 SVD -- 2.5 Soft Thresholding [15, 16] -- 2.6 Wiener Filter [17]. , 3 Results and Analysis -- 4 Complexity Analysis of Proposed LBGPCASTW and LBGSVDSTW with LPGPCA -- 5 Conclusions -- References -- Elicitation and Analysis of Security Requirements and Patterns for IoT Based Health Monitor -- 1 Introduction -- 2 Related Work -- 3 Design and Functioning of Health Monitor Using IOT -- 4 Security Requirements Elicitation -- 5 Identification of Security Requirement Patterns for Security in Requirements Phase -- 6 Security Requirements Patterns Analysis and Its Impact on Security Objectives of IoT Health Monitor -- 7 Conclusion and Future Work -- References -- Classification of Remote Sensing Images Based on K-Means Clustering and Artificial Bee Colony Optimization -- 1 Introduction -- 2 Methodology -- 3 Classification Methods -- 4 Results and Discussions -- 5 Conclusion -- References -- Internet of Things and Its Applications: An Overview -- 1 Introduction -- 2 Related Work -- 3 Elements of IoT -- 4 Framework-Architecture -- 5 Analysis, Monitoring, and Reporting -- 6 Case Studies-Applications -- 7 Conclusion and Future Scope -- References -- Smart KYC Using Blockchain and IPFS -- 1 Introduction -- 1.1 IPFS -- 1.2 DLT -- 2 Present Versus Proposed System -- 3 Proposed Architecture -- 3.1 Document Submission -- 3.2 Notary Verification -- 3.3 Third Party Verification -- 4 Benefits of the System -- 5 Future Aspects -- 6 Conclusion -- References -- Lexical Analysis and Mathematical Modelling for Analysing Depression Detection of Social Media Reviews -- 1 Introduction -- 2 Related Study -- 3 Our Proposed Model -- 4 Result Analysis -- 5 Conclusion -- 6 Future Enhancement -- References -- Application of Neural Networks and Lifting Wavelet Transform for Long Term Solar Radiation Power Prediction -- 1 Introduction -- 2 Overview of Basics -- 2.1 Recurrent Neural Networks -- 2.2 Wavelet Transforms. , 2.3 Construction of Second Generation Wavelets (Lifting Scheme) [7] -- 2.4 Multi-resolution Analysis (MRA) [18] -- 3 Construction of Lifting Wavelet Transform -- 4 Experiment -- 4.1 Solar Radiation Prediction with Neural Networks -- 4.2 Modeling of NARX Neural Network -- 4.3 Results -- 5 Conclusion -- References -- Modeling Sustainable Mobility Using Fuzzy Logic: An Application to Selected Indian States -- 1 Introduction -- 2 Methodology -- 2.1 Development of Sustainable Mobility Indicators -- 2.2 Normalization, Weighting and Mathematical Integration -- 2.3 Integrating the Sub-indices with Fuzzy Logic -- 3 Study Areas and Data Collection -- 4 Results and Discussions -- 5 Conclusion -- References -- Shravya-A Framework for Enunciation of Sanskrit Shlokas and Phrases -- 1 Introduction -- 2 Literature Survey -- 2.1 Sandhi Vicched -- 2.2 Enunciation-Shloka Generation -- 3 Shravya -- 3.1 Sandhi Vicched Module -- 3.2 Shloka Audio Generation -- 3.3 Training -- 3.4 Esting -- 4 Conclusion -- 5 Future Scope -- References -- Energy-Efficiency in WSN Based on SCMC Protocol -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Proposed System Architecture -- 3.2 Proposed Design Goal -- 3.3 Dynamic Cluster Formation -- 4 Experimental Results -- 5 Conclusion -- References -- Extending Bidirectional Language Model for Enhancing the Performance of Sentiment Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Word Embedding Using Bidirectional Language Model -- 3.2 Sentiment Analysis Approach -- 4 Result Analysis -- 5 Conclusion and Future Work -- References -- Energy-Efficiency Driven Strategy for Resource Aggregation Based on Future Resource-Usage Inference in a Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Proposed Model -- 5 Implementation Details -- 6 Evaluation with Assessment. , 6.1 Simulation Details -- 6.2 Result Analysis -- 7 Conclusion -- References -- A Comparison of Deep Learning Algorithms for Plant Disease Classification -- 1 Introduction -- 2 Literature Survey -- 2.1 Dataset -- 3 Model Architecture -- 3.1 LeNet -- 3.2 AlexNet -- 3.3 Inception V3 -- 4 Experiments and Results -- 5 Conclusion -- References -- Active Learning Using Margin Sampling Strategy for Entity Recognition -- 1 Introduction -- 2 Related Work -- 3 Corpus Details -- 4 Feature Extraction and Classifier Used -- 5 Active Learning Algorithm Steps -- 6 Result and Discussion -- 7 Conclusion -- References -- Design of QoS and Energy Efficient VM Consolidation Framework for Cloud Data Centers -- 1 Introduction -- 2 Related Works -- 3 CloudSim VM Consolidation -- 4 Proposed VM Consolidation System -- 4.1 Novel Load Detection Algorithm -- 4.2 VM Selection Algorithm -- 4.3 PSO Based VM Placement -- 5 Conclusion and Future Work -- References -- Cyberbullying Detection on Multiple SMPs Using Modular Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Dataset Preprocessing -- 3.2 Architecture -- 4 Experiments and Results -- 5 Conclusion -- References -- Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment -- 1 Introduction -- 2 Related Work -- 3 Revisiting Amin and Biswas's Algorithm -- 4 Proposed Protocol -- 4.1 System Setup and Initialization Phase -- 4.2 User Registration Phase -- 4.3 Login Phase -- 4.4 Authentication and Session Key Generation Phase -- 5 Analysis of the Proposed Protocol -- 5.1 Prevents All Session Hi-Jacking Due to Sensor Capture Attack -- 5.2 Preventing Gateway Impersonation Attack [23, 27] -- 5.3 Avoiding Sensor Node Impersonation Attack [27] -- 6 Conclusion and Future Scope -- References. , An Empirical Evaluation of Correlation Based Feature Selection for Tweet Sentiment Classification -- 1 Introduction -- 2 Evaluation Methods and Model -- 2.1 Dataset -- 2.2 Data Preprocessing -- 2.3 Feature Selection Methods -- 2.4 Sentiment Classification -- 3 Experimental Results -- 4 Conclusion -- References -- Automatic Traffic Sign Detection and Classification of Indian Traffic Signage's Based on Multi-feature Fusion -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Preprocessing and Segmentation -- 3.2 Feature Extraction Methods -- 3.3 Feature Fusion -- 3.4 Classification -- 4 Results -- 5 Conclusion -- References -- Extended Local Ternary Pattern for Face Anti-spoofing -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Spoofing Detection Using ELTP -- 4 Results and Discussions -- 5 Conclusion -- References -- Enhancing Data Security in Cloud Computing Using Threshold Cryptography Technique -- 1 Introduction -- 2 Problem Statement -- 3 Literature Survey -- 3.1 Existing Systems -- 3.2 Proposed System -- 4 Objectives -- 5 Methodology and Assumptions -- 6 Implementation -- 7 Security and Performance Analysis -- 7.1 Data Confidentiality -- 7.2 Entity Authentication -- 7.3 Data Integrity -- 7.4 Data Access Control -- 7.5 Performance Analysis -- 8 Conclusion -- References -- Multi-resolution Hierarchical Clustering by Vector Quantization -- 1 Introduction -- 2 Principles and Methodology -- 2.1 The Proposed Clustering Algorithm for Vector Quantization -- 2.2 Complexity Analysis -- 3 Multi-resolution Clustering -- 4 Experiment and Results -- 5 Conclusion -- References -- Certificate Verification System Using Blockchain -- 1 Introduction -- 1.1 Blockchain -- 1.2 Ethereum -- 1.3 Smart Contract -- 2 Related Works -- 3 Proposed System -- 3.1 Process -- 4 Conclusion -- References. , IoT Based Automatic Plant Watering System Through Soil Moisture Sensing-A Technique to Support Farmers' Cultivation in Rural India.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...