GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    Schlagwort(e): Local area networks (Computer networks). ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (313 pages)
    Ausgabe: 1st ed.
    ISBN: 9783319051642
    Serie: Intelligent Systems Reference Library ; v.65
    DDC: 620
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- Diffusion of Information in Social Networks -- 1 Introduction -- 2 Models of Information Diffusion in Social Networks -- 2.1 Mathematical Modeling of Information Diffusion -- 2.2 Influencers in Social Networks -- 2.3 Influencers and Controlling Mis-information Spread in Social Networks -- 2.4 Multiple Sources of Diffusion and the Problem of Information Confusion -- 3 Locating the Source of Diffusion -- 4 Summary -- References -- Structure and Evolution of Online Social Networks -- 1 Introduction -- 2 Topological Properties of Social Networks -- 2.1 Topological Properties Used to Characterize Large Networks -- 2.2 Topological Properties of OSNs -- 3 Evolution of Social Networks -- 3.1 Evolution Models for Complex Networks -- 3.2 Evolution Models for OSNs -- 4 Evolution of OSNs in Presence of Restrictions on Node-degree -- 4.1 The Restriction in Twitter and Its Effects -- 4.2 Evolution Model in Presence of Restrictions on Node-degree -- 5 Summary -- References -- Machine Learning for Auspicious Social Network Mining -- 1 Introduction -- 2 Representation of Network Data -- 3 Different Aspects of Social Network Analysis -- 3.1 Different Measures of Social Network -- 3.2 Essential Problems and Algorithms -- 4 Statistical Models for Social Network Analysis: Probability and Random Walks -- 5 Groups and Substructures in Social Networks -- 5.1 Bipartite Cores - Identifying Communities -- 6 Machine Learning Based Approaches for Networked Data Mining -- 6.1 Social Analytical Data Preparation with Machine Learning -- 6.2 Machine Learning for Networked Data Mining -- 6.3 Some Highlited Research and Findings Using Machine Learning -- 7 Conclusion -- References -- Testing Community Detection Algorithms: A Closer Look at Datasets -- 1 Introduction -- 2 Evaluating Community Detection Methods. , 2.1 Quality Measures -- 2.2 Similarity Measure -- 3 Social Network Datasets -- 3.1 The Zachary Karate Club -- 3.2 The Bottlenose Dolphin Network -- 3.3 American College Football Network -- 3.4 Online Social Networks -- 4 Conclusion -- References -- Societal Networks: The Networks of Dynamics of Interpersonal Associations -- 1 Introduction -- 2 Background -- 3 Graphs and Digraphs -- 3.1 Representations of Sigraphs and Sidigraphs -- 3.2 Dynamics of a Social System -- 3.3 Cognitive Balance and Sidigraphs -- 3.4 The Phenomenon of Clustering -- 4 Social Networks -- 5 Societal Networks -- 5.1 The Key Principle -- 5.2 The Origin -- 5.3 Extension to a Formal Model -- 5.4 Structural Equivalence -- 5.5 Reduced Networks -- 5.6 Class Structures -- 5.7 Self-balancing Networks -- 5.8 Long-Term Evaluation -- 6 Some Recent Developments in Dynamic Social Networks -- 6.1 Mining Periodic Behaviour in Dynamic Social Networks -- 6.2 Periodic Subgraph Mining Problem -- 6.3 Framework for Analysis of Dynamic Social Networks -- 7 Problems for Further Study -- 8 Conclusion -- References -- Methods of Tracking Online Community in Social Network -- 1 Introduction -- 2 Related Work -- 2.1 Subgroup Identification -- 2.2 Clustering and Partitioning of Subgroups -- 2.3 Similarity -- 2.4 Behavioural Measures of Community -- 3 Existing Methods and Framework for Tracking Communities -- 3.1 Social Cohesion Analysis of Networks (SCAN) -- 3.2 DISSECT (Data-Intensive Socially Similar Evolving Community Tracker) -- 3.3 Framework for DISSECT Method -- 4 Conclusion -- References -- Social Network Analysis Approach for Studying Caste, Class and Social Support in Rural Jharkhand andWest Bengal: An Empirical Attempt -- 1 Introduction -- 2 Methodology -- 2.1 Village Selection for the Study -- 2.2 Data Collection and Level of Analysis. , 2.3 Limitations of Analysis by Exact Caste Community (CC) and Source of Livelihood (SL) -- 2.4 Formation of Categories of CC and SL -- 3 Brief Historical Background of the Villages -- 3.1 Location and other Facilities -- 3.2 Settlement Patterns of the Villages -- 4 Social Stratification of the Villages -- 4.1 By Caste Community -- 4.2 Stratification by Source of Livelihood (SL) Categories and Ownership of Land -- 4.3 What Patterns Observed -- 4.4 Inter-relationship of CC and SL Categories in Villages -- 5 Parameters of Life and Living of the Villagers Required for Social Network -- 5.1 Type and Timing of Needs and Urgencies -- 5.2 Availability of Help from Formal Institutions to Satisfy Urgent Needs -- 5.3 How One Decides to Approach Whom for Help or Support -- 5.4 Why Help Is Provided -- 5.5 Distance of Spread of Sources of Helps and Assistance -- 6 Findings from Social Network Analysis -- 6.1 From Whom Help Was Sought -- 6.2 Amount/Quantity and Type of Help Sought -- 6.3 Purpose of Help -- 7 Conclusions -- References -- Evaluating the Propagation Strength of Malicious Metaphor in Social Network: Flow Through Inspiring Influence of Members -- 1 Introduction -- 2 Fundamental of Social Network: Graph Theory Perspective -- 2.1 Co-Evolution of Social and Affiliation Network -- 3 Exploring Mathematical Treatments -- 3.1 Proposed Algorithm -- 3.2 Experimental Results and Discussion -- 3.3 Comparison with Statistical Model -- 4 Graphical Representation -- 5 Conclusion and Further Scope of Research -- References -- Social Network Analysis: A Methodology for Studying Terrorism -- 1 Introduction -- 2 Two Phases in the Development of Social Network Analysis -- 3 Social Network Analysis and Terrorism -- 4 Data Collection and Data Sources -- 4.1 Structured Data Sources -- 4.2 Unstructured Relational Data Sources. , 5 Simulation, Modelling and Computational Terrorism -- 6 Essentials of Social Networks and Centrality Measures -- 7 Case Studies -- 7.1 Case I: The 9/11 Attack on the Trade Towers in New York -- 7.2 Case II: Mapping a Network of Terrorist Organizations in India -- 8 Conclusions -- References -- Privacy and Anonymization in Social Networks -- 1 Introduction -- 1.1 Chapter Structure -- 2 Social Networks -- 3 Privacy in Social Networks -- 3.1 How Users Lose Control of Their Privacy -- 4 Privacy in Published Social Network Data -- 4.1 Social Network Representation -- 4.2 Social Network Analysis -- 4.3 Anonymization -- 4.4 Challenges in Anonymizing Social Networks Data -- 5 Private Information in Published Social Network Data -- 6 Background-Knowledge Attacks -- 6.1 Background Knowledge of Adversaries -- 7 Related Work -- 8 Problem Formulation -- 9 GASNA: Greedy Algorithm for Social Network Anonymization [24,27] -- 9.1 Clustering Phase -- 9.2 Adjustment Phase -- 9.3 Anonymization Phase -- 10 Empirical Evaluation of GASNA -- 11 Comparison with the Literature -- 12 Conclusion and Future Issues -- 12.1 Varying k Value for k-anonymity According to the Degree of the Nodes Being Considered -- 12.2 Anonymity in Modern Social Networks -- 12.3 Partial Anonymity -- References -- On the Use of Brokerage Approach to Discover Influencing Nodes in Terrorist Networks -- 1 Motivation -- 2 Background -- 3 Terrorist Network Mining -- 4 Calculating Centrality Measures -- 4.1 Degree Centrality -- 4.2 Betweenness Centrality -- 4.3 Closeness Centrality -- 4.4 Eigenvector Centrality -- 5 Brokerage -- 6 Roles Detected by Brokerage Approach -- 6.1 Coordinator -- 6.2 Consultant -- 6.3 Gatekeeper -- 6.4 Representative -- 6.5 Liaison -- 7 Experimental Analysis through Brokerage -- 8 Conclusion and Future Work -- References -- Index.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Schlagwort(e): Digital communications. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (438 pages)
    Ausgabe: 1st ed.
    ISBN: 9783031232336
    Serie: Communications in Computer and Information Science Series ; v.1737
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organization -- Keynote Address -- Industry 4.0 Meets Data Science: The Pathway for Society 5.0 -- Continual Learning for Intelligent Systems in Changing Environments -- Where is the Research on Evolutionary Multi-objective Optimization Heading to? -- Designing a Software Framework Based on an Object Detection Model and a Fuzzy Logic System for Weed Detection and Pasture Assessment -- An Overview of Machine Learning Based Intelligent Computing and Applications -- Semisupervised Learning with Spatial Information and Granular Neural Networks -- IoT Based General Purpose Sensing Application for Smart Home Environment -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Emerging Topics in Wireless and Network Communications - A Standards Perspective -- Contents -- Intelligent Computing -- Ensemble Learning Model for EEG Based Emotion Classification -- 1 Introduction -- 2 Related Works -- 3 System Model and Methodology -- 3.1 Feature Extraction -- 3.2 Deep Learning Model Implementation -- 4 Dataset Description -- 5 Experimental Setup and Results -- 6 Conclusion -- References -- Foundation for the Future of Higher Education or 'Misplaced Optimism'? Being Human in the Age of Artificial Intelligence -- 1 Introduction -- 2 Education Using Artificial Intelligence (AIEd) -- 3 Methods -- 3.1 Search Strategy -- 3.2 Reliability of Agreement Amongst Raters -- 3.3 Collection, Codification, and Analysis of Data -- 3.4 Limitations -- 4 Results -- 4.1 Forecasting and Characterising -- 4.2 Curriculum Technology that Uses Artificial Intelligence -- 4.3 Constant Re-Evaluation -- 4.4 A System that May Change to Fit the USER'S Needs -- 5 Conclusion and Way Forward -- References -- AI Enabled Internet of Medical Things Framework for Smart Healthcare -- 1 Introduction -- 2 AI Based IoMT Health Domains. , 3 AI Enabled IoMT Architectures for Smart Healthcare Systems -- 4 Research Challenges of AI Enabled Smart Healthcare Systems -- 4.1 Data Accuracy -- 4.2 Data Security -- 4.3 System Efficiency -- 4.4 Quality of Service -- 5 Conclusion -- References -- Metaverse and Posthuman Animated Avatars for Teaching-Learning Process: Interperception in Virtual Universe for Educational Transformation -- 1 Introduction -- 2 Objectives of the Research and Knowledge Gap -- 3 Methods and Methodology -- 4 Results and Discussion -- 4.1 Educational Metaverse: A Categorical Analysis -- 4.2 A Wide Variety of Virtual Worlds for Use in Education -- 4.3 Situations for Learning, Tiers of Education, and VR Learning Environments -- 4.4 Students' Avatars (Digital Personas) in the Metaverse -- 4.5 Alterations in Educational Multiverse -- 5 Conclusion and Way Forward -- References -- Tuning Functional Link Artificial Neural Network for Software Development Effort Estimation -- 1 Introduction -- 2 Functional Link ANN-based SDEE -- 2.1 Justification of the Use of Chebyshev Polynomial as the Orthogonal Basis Function -- 3 Swarm Intelligence-Based Learning Algorithms for the CFLANN -- 3.1 Classical PSO -- 3.2 Improved PSO Technique -- 3.3 Adaptive PSO -- 3.4 GA -- 3.5 BP -- 4 Performance Evaluation Metrics -- 5 Description of the Dataset -- 6 Experiments and Results -- 7 Conclusion and Future Work -- References -- METBAG - A Web Based Business Application -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps and Solutions -- 2.2 Deep Neural Networks (DNN) and LSTM -- 3 Architecture of the System -- 3.1 Architecture of the User Side of the System -- 3.2 Architecture of the Admin Side of the System -- 4 Workflow Diagrams -- 5 Procedures -- 5.1 Procedure: Price Prediction -- 5.2 Procedure: Password Security -- 5.3 Procedure: Dashboard -- 6 Result Analysis -- 6.1 Price Prediction. , 6.2 Password Security -- 7 Conclusions and Future Work -- References -- Designing Smart Voice Command Interface for Geographic Information System -- 1 Introduction -- 1.1 Review of Literature on Voice Command Interface -- 2 Design and Implementation -- 2.1 Review of Literature on Voice Command Interface -- 2.2 Modules Used -- 2.3 Methodology -- 2.4 Implementation -- 3 Results and Discussion -- 3.1 Testing Model by Creating a War Zone like Environment -- 3.2 Spectrogram and Waveform Samples for Spoken Voice -- 3.3 Comparative Analysis Based on Word Error Rate -- 4 Conclusion -- References -- Smart Garbage Classification -- 1 Introduction -- 2 Literature Review -- 2.1 Gaps in Literature -- 3 System Details -- 3.1 Waste Scanning Through Camera -- 3.2 Waste is Segregated and the Lid Opens -- 3.3 Moving of Hands and Trash Being Put into Respective Compartment -- 4 Component Modules and Description -- 5 Algorithmic Steps -- 6 Result and Analysis -- 7 Conclusions -- References -- Optical Sensor Based on MicroSphere Coated with Agarose for Heavy Metal Ion Detection -- 1 Introduction -- 2 Sensing Principle -- 3 Sensor Design -- 4 Results and Discussions -- 5 Conclusion -- References -- Influential Factor Finding for Engineering Student Motivation -- 1 Introduction -- 2 Related Studies -- 3 Experiment -- 3.1 Logistic Regression -- 4 Discussion -- 5 Conclusion -- References -- Prediction of Software Reliability Using Particle Swarm Optimization -- 1 Introduction -- 2 Related Work -- 3 Reliability Prediction Algorithm Using PSO -- 4 Experimental Result and Comparison -- 5 Conclusions -- References -- An Effective Optimization of EMG Based Artificial Prosthetic Limbs -- 1 Introduction -- 2 Literature Review -- 3 Design and Manufacturing -- 3.1 Cad Model -- 3.2 Manufacturing and Assembly -- 4 Electrical Components and Design -- 4.1 Electromyography Sensing. , 5 Artificial Intelligence -- 5.1 Gesture Recognition -- 5.2 Grasping Capacity (According to Size) -- 5.3 Analysis of EMG Signals -- 6 Conclusion -- References -- Communications -- Performance Analysis of Fading Channels in a Wireless Communication -- 1 Introduction -- 2 Fading Channels -- 2.1 Performance Analysis of Rayleigh Fading -- 2.2 Description of the Performance of Rician Fading Channel -- 2.3 Performance Analysis of NAKAGAMI-M Fading Channel. -- 3 Experimentation and Result Analysis -- 3.1 Simulation and Discussion of Rayleigh Fading Channel -- 3.2 Simulation Results of Rician Fading Channel -- 3.3 Simulation Results of Nakagami-M Fading Channel -- 4 Conclusion -- References -- Power Conscious Clustering Algorithm Using Fuzzy Logic in Wireless Sensor Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 4 Simulation Setup and Evaluation -- 5 Conclusions -- References -- Cryptanalysis on ``An Improved RFID-based Authentication Protocol for Rail Transit'' -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Preliminary -- 2.1 Secure Requirements -- 2.2 Threat Model -- 3 Review of Zhu et al.'s Protocol -- 3.1 Set up Phase -- 3.2 Authentication Phase -- 4 Weakness of Zhu et al.'s Protocol -- 4.1 Known Session-Specific Temporary Information Attack -- 4.2 Lack of Scalability -- 5 Conclusion -- References -- A Novel Approach to Detect Rank Attack in IoT Ecosystem -- 1 Introduction -- 2 Background -- 2.1 Generic IoT Network Architecture -- 2.2 RPL Protocol -- 2.3 Rank Attack in IoT -- 2.4 IDS for IoT Ecosystem -- 3 Related Work -- 4 Proposed Security Approach -- 4.1 Proposed Approach Assumption -- 4.2 Security Model -- 4.3 Proposed Rank Attack Detection Solution -- 5 Experiments and Results Analysis -- 5.1 Setup and Execution of Experiments. , 5.2 After Proposed Security Solution Implementation Performance Analysis -- 5.3 Comparison of the Suggested Security Solution to Similar Works -- 6 Conclusion -- References -- Energy Efficient Adaptive Mobile Wireless Sensor Network in Smart Monitoring Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Mobile Sensor Node Architecture -- 4 Simulation and Result Analysis -- 4.1 Simulation Set Up -- 4.2 Experimental Analysis -- 5 Conclusion -- References -- Orthogonal Chirp Division Multiplexing: An Emerging Multi Carrier Modulation Scheme -- 1 Introduction -- 2 Compatibility with OFDM -- 3 Computational Complexity -- 3.1 Computational Complexity of OCDM -- 3.2 Computational Complexity of OFDM -- 4 Applications of OCDM -- 4.1 OCDM for Wireless Communication -- 4.2 OCDM for Optical Fiber Communication -- 4.3 OCDM for IM/DD Based Short Reach Systems -- 4.4 OCDM for Underwater Acoustic Communication -- 4.5 OCDM for Baseband Data Communication -- 4.6 OCDM for MIMO Communication -- 5 Simulation Results -- 6 Conclusion -- References -- Machine Learning and Data Analytics -- COVID-19 Outbreak Estimation Approach Using Hybrid Time Series Modelling -- 1 Introduction -- 2 Background -- 2.1 LSTM Network for Modelling Time Series -- 2.2 ARIMA Model -- 2.3 Seasonal ARIMA Model -- 3 Proposed Model -- 4 Implementation and Results Discussion -- 4.1 Prediction Using LSTM Model -- 4.2 Prediction Using ARIMA Model -- 4.3 Prediction Using Hybrid Model -- 5 Conclusion -- References -- Analysis of Depression, Anxiety, and Stress Chaos Among Children and Adolescents Using Machine Learning Algorithms -- 1 Introduction -- 1.1 Background -- 1.2 Motivation and Objective of the Work -- 2 Literature Review -- 3 Methodology -- 3.1 Data Set Description -- 3.2 Implementation -- 4 Results and Discussion -- 4.1 Classification Results for Depression. , 4.2 Classification Results for Anxiety.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Schlagwort(e): Natural computation-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (398 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030493394
    Serie: Advances in Intelligent Systems and Computing Series ; v.1180
    DDC: 6
    Sprache: Englisch
    Anmerkung: Intro -- Welcome Message -- Organization -- IBICA-WICT 2019 Organization -- Chief Patrons -- Patrons -- Honorary Chairs -- General Chairs -- Program Chairs -- Web Chair -- Publication Chair -- Publicity Chairs -- IBICA Program Committee -- IBICA Additional Reviewers -- WICT Program Committee -- WICT Additional Reviewers -- Contents -- Towards the Speed Enhancement of Association Rule Mining Algorithm for Intrusion Detection System -- 1 Introduction -- 2 Overview of Intrusion Detection System -- 3 Related Work -- 4 Proposed Methodology -- 4.1 Dataset -- 4.2 Technology Used for Experimental Purpose -- 4.3 Experimental Approach -- 4.4 Experimental Result -- 5 Analysis of Result and Discussion -- 6 Conclusion -- References -- Image Retrieval Using Bat Optimization and Image Entropy -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Entropy -- 3.2 Bat Algorithm -- 4 Experimental Observations and Discussions -- 5 Conclusion -- References -- Logistic Regression on Hadoop Using PySpark -- 1 Introduction -- 2 Logistic Regression -- 2.1 Computation of Cost Function and Its Gradient -- 2.2 Optimization of the Cost Function -- 3 Implementation -- 4 Results -- 4.1 Comparing Test Performance -- 5 Conclusion -- References -- Analysis of Pre-processing Techniques for Odia Character Recognition -- 1 Introduction -- 1.1 Optical Character Recognition (OCR) -- 2 Odia Character Recognition -- 3 Factors Affecting the Quality of Odia Character Recognition and Significance of Pre-processing -- 3.1 Types of Pre-processing Techniques -- 4 Analysis of Different Pre-processing Techniques -- 5 Conclusions -- References -- Cluster-Based Under-Sampling Using Farthest Neighbour Technique for Imbalanced Datasets -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experimental and Simulation Results -- 4.1 Results -- 5 Conclusion. , References -- Vehicle Detection and Classification: A Review -- 1 Introduction -- 2 Methods Used for Vehicle Detection -- 2.1 Motion-Based Features -- 2.2 Appearance Based Features -- 2.3 Neural Networks -- 3 Methods Used for Vehicle Classification -- 3.1 Geometry-Based Approaches -- 3.2 Appearance-Based Approaches -- 3.3 Approaches Based on Texture -- 3.4 Mixed Approaches -- 4 Database -- 5 Conclusion -- References -- Methods for Automatic Gait Recognition: A Review -- 1 Introduction -- 2 Important Steps in a Gait Recognition System -- 2.1 Feature Extraction -- 2.2 Feature Selection -- 2.3 Classification -- 3 Model-Based Methods -- 4 Model-Free Methods -- 4.1 Gait Energy Image (GEI) -- 5 Gait Recognition Challenges -- 6 Existing Gait Databases -- 7 Conclusion -- References -- Comparative Performance Exploration and Prediction of Fibrosis, Malign Lymph, Metastases, Normal Lymphogram Using Machine Learning Method -- 1 Introduction -- 2 Flow Chart of the System -- 3 Description of the Dataset -- 4 Result Analysis -- 4.1 Evaluation and Predictions Results -- 4.2 Classification Tree -- 4.3 Distribution Plot -- 4.4 Scatter Plot for Lymphogram -- 4.5 Box Plot Analysis -- 5 Conclusion -- References -- Decision Forest Classifier with Flower Search Optimization Algorithm for Efficient Detection of BHP Flooding Attacks in Optical Burst Switching Network -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Datasets -- 3.2 Methodologies Used -- 4 Experiments -- 5 Results and Discussion -- 6 Conclusion and Future Scope -- References -- Review and Implementation of 1-Bit Adder in CMOS and Hybrid Structures -- 1 Introduction -- 2 Review of Full Adders -- 2.1 Standard CMOS Full Adder [1] -- 2.2 Hybrid Full Adder [2] -- 3 Implementation of Full Adder -- 3.1 XNOR Cell -- 3.2 4-T Cell -- 3.3 6-T Cell (Carry) -- 3.4 6-T Cell (Sum) -- 3.5 Full Adder. , 4 Performance Analysis -- 5 Conclusion -- References -- Design and Analysis of LOL-P Textile Antenna -- 1 Introduction -- 2 Proposed Design -- 2.1 Analysis of Circular Textile Antenna -- 3 Results and Discussions -- 3.1 Optimization Results -- 3.2 Analysis of Optimized Steps -- 3.3 Comparison Results of Various Substrate Materials -- 3.4 Fabrication Results -- 4 Conclusions and Future Scope -- References -- Analytical Study of Scalability in Coastal Communication Using Hybridization of Mobile Ad-hoc Network: An Assessment to Coastal Bed of Odisha -- 1 Introduction -- 1.1 Vulnerability of the Odisha Coastal Zone -- 1.2 Marine and Coastal Lines of Odisha -- 1.3 Objective -- 2 Literature Survey -- 2.1 Disaster Response System -- 2.2 Pre-disaster Communication -- 2.3 Post-disaster Communication -- 3 MANET in Rescue Communication, the Most Challenging Trend -- 3.1 Node Based Communications System -- 3.2 Cellular Based Communications System -- 4 Propose Method of Communication -- 4.1 Scalable Node Selection Method -- 4.2 Optimized Geographical Multicast Routing Protocol (OGMRP) -- 5 Methodology -- 6 Performance Evaluation -- 7 Simulation Analysis -- 8 Conclusion -- References -- Effect of Environmental and Occupational Exposures on Human Telomere Length and Aging: A Review -- 1 Introduction -- 1.1 Environmental and Occupational Exposures -- 2 What Are Telomeres? -- 3 Telomere Length Measurement -- 4 Telomere Length: A Biomarker of Aging -- 5 Association Between Telomere Length Shortening and Aging During Environmental or Occupational Exposures: Overview -- 6 Future Directions -- References -- A Review on VLSI Implementation in Biomedical Application -- 1 Introduction -- 2 Literature Review -- 3 Results and Comparison -- 4 Conclusion -- References. , Comparative Analysis of a Dispersion Compensating Fiber Optic Link Using FBG Based on Different Grating Length and Extinction Ratio for Long Haul Communication -- 1 Introduction -- 2 System Description and Simulation Design -- 3 Result and Analysis -- 4 Conclusion -- References -- Unsupervised Learning Method for Mineral Identification from Hyperspectral Data -- 1 Introduction -- 2 Related Work -- 3 HSI Model -- 4 Classification Approach -- 5 Possibilistic Fuzzy C-Means -- 6 Experiment and Result -- 7 Conclusion and Future Work -- References -- Short Term Load Forecasting Using Empirical Mode Decomposition (EMD), Particle Swarm Optimization (PSO) and Adaptive Network-Based Fuzzy Interference Systems (ANFIS) -- 1 Introduction -- 2 Proposed Work -- 3 IMF Formation in Decomposition of EMD -- 4 Working of ANFIS -- 5 Results and Discussion -- 6 Conclusion -- Appendix -- References -- Energy Conservation Perspective for Recharging Cell Phone Battery Utilizing Speech Through Piezoelectric System -- 1 Introduction -- 2 Existing Background -- 3 Basic Theory of Concept -- 4 Structural Modelling of System -- 4.1 Nano Generator -- 4.2 Piezoelectric Substrate -- 4.3 ZnO Electrodes -- 5 Methodology and Design -- 6 Analysis and Outcomes -- 7 Conclusions -- References -- A Progressive Method Based Approach to Understand Sleep Disorders in the Adult Healthy Population -- 1 Introduction -- 2 Process -- 2.1 Approaching Healthy Adults -- 2.2 Subject Inclusion and Exclusion Criteria -- 2.3 Meeting Subject -- 3 Screening Questionnaire -- 3.1 The Epworth Sleepiness Scale -- 3.2 Sleep Quiz -- 4 Screening Tools -- 4.1 Actigraphy and Sleep Diary -- 5 Administration of Neuropsychological Test Battery -- 5.1 Psychomotor Vigilance Test (PVT) -- 5.2 Forward Digit Span Test -- 5.3 IOWA Gambling Task -- 5.4 Wisconsin Card Sorting Task (WCST) -- 5.5 Tower of London Test (TOL). , 5.6 Stroop Test -- 5.7 Auditory Verbal Learning Test -- 6 Nocturnal Polysomnogram -- 7 Productivity Scale -- 8 A Case Study on the Indian Population -- 8.1 Utilization of Neuropsychology Test Battery -- 9 Conclusion -- References -- Semantic-Based Process Mining: A Conceptual Model Analysis and Framework -- 1 Introduction -- 2 Preliminaries -- 2.1 Semantic Web Search Technologies (SWS) -- 2.2 Data Labelling and Linking (Integration) -- 3 Systematic Mapping Study: Main Application Areas of the Process Mining and Semantic Modelling Tools/Methods -- 4 SPM-Based Framework and Design -- 5 Experimentation Analysis and Results -- 6 Discussion -- 7 Conclusion -- References -- Educational Process Intelligence: A Process Mining Approach and Model Analysis -- 1 Introduction -- 2 Related Works -- 3 Educational Process Intelligence (EPI) Model -- 4 Formalization of the EPI Algorithm -- 5 Analysis and Case Study Implementation -- 6 Discussion -- 7 Conclusion -- References -- Design and Development of a Mobile App as a Learning Strategy in Engineering Education -- 1 Introduction -- 1.1 Innovation in Engineering Education -- 1.2 Educational Innovation: Integration of Technology in the Classroom -- 2 A Novel Approach to Learn Thermodynamics -- 2.1 Thermodynamics Course in Engineering Curricula -- 2.2 Case of Study: Developing a Mobile App as an OER by Undergrad Engineering Students -- 2.3 Design and Implementation of the Mobile App -- 2.4 Results: Academic Performance of the Group -- 3 Conclusions -- References -- Beyond Things: A Systematic Study of Internet of Everything -- 1 Introduction -- 1.1 Internet of Everything: Connecting the Unconnected Things and People -- 1.2 Internet of Everything Ecosystem: Role of Big Data and Cloud -- 1.3 Role of Internet of Things in Internet of Everything Ecosystem -- 2 Related Work -- 3 Motivation. , 4 Importance of Internet of Everything (Over Internet of Things) in 21st century.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Schlagwort(e): Swarm intelligence. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (209 pages)
    Ausgabe: 1st ed.
    ISBN: 9783662463093
    Serie: Studies in Computational Intelligence Series ; v.592
    DDC: 006.3824
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- A Comprehensive Review on Bacteria Foraging Optimization Technique -- 1 Introduction -- 2 Behavior of Bacterial Colony -- 2.1 Phases in the Life Cycle of Bacteria -- 2.2 Communication Among Bacteria -- 2.3 Types of Bacteria -- 3 E.coli Bacterial Colonies -- 3.1 Biological Inspiration -- 4 Description of BFO -- 4.1 Chemotaxis -- 4.2 Swarming -- 4.3 Reproduction -- 4.4 Elimination-Dispersal -- 4.5 Convergence -- 5 Optimization Based on E.coli Bacterial Colony -- 6 Classification of BFO Algorithm -- 6.1 Conventional BFO -- 6.2 Revised BFO -- 6.3 Hybrid BFO -- 7 Multi-objective Optimization Based on BF -- 7.1 Multi-objective Optimization -- 7.2 Multi-objective BFO Algorithm -- 8 An Overview of BFO Applications -- 9 Conclusion -- References -- Swarm Intelligence in Multiple and Many Objectives Optimization: A Survey and Topical Study on EEG Signal Analysis -- 1 Introduction -- 1.1 Outline of Swarm Intelligence -- 1.2 Multi-objective versus Many-objective Optimization -- 2 Swarm Intelligence for Multi Objective Problems -- 2.1 ACO for Multiple Objective Problems -- 2.2 PSO for Multiple Objective Problem -- 2.3 ABC for Multiple Objective Problem -- 3 Swarm Intelligence for Many Objective Optimization -- 4 Study of Swarm Intelligence for EEG Signal -- 4.1 ACO in EEG Signal Analysis -- 4.2 PSO in EEG Signal Analysis -- 4.3 ABC in EEG Signal Analysis -- 4.4 Towards Multiple and Many Objectives of EEG Signal -- 5 Discussion and Future Research -- References -- Comparison of Various Approaches in Multi-objective Particle Swarm Optimization (MOPSO): Empirical Study -- 1 Introduction -- 2 General Multi-objective Problem -- 3 Particle Swarm Optimization -- 4 PSO for Multiple Objectives -- 5 Approaches of MOPSO -- 5.1 Algorithms That Exploit Each Objective Function Separately -- 5.2 Objective Function Aggregation Approaches. , 5.3 Non-Pareto, Vector Evaluated Approaches -- 5.4 Pareto Dominance Approach -- 5.5 Weighted Sum Approach -- 5.6 Lexicographic Approach -- 5.7 Subpopulation Approach -- 5.8 Pareto Based Approach -- 6 A Variant of MOPSO -- 7 Comparative Study -- 7.1 Performance Evaluation -- 7.2 Conclusion and Future Work -- References -- Binary Ant Colony Optimization for Subset Problems -- 1 Introduction -- 2 Ant Colony Optimization -- 3 Feature Selection -- 4 Solution Representations for Subset Problems Using Ant Colony Optimization -- 5 Binary ACO -- 6 Computational Experiments -- 6.1 Fitness Function -- 6.2 Cross Validation (CV) -- 6.3 Datasets -- 6.4 Method -- 6.5 Datasets -- 6.6 Comparisons with Other Algorithms -- 7 Discussion -- 8 Conclusion -- 9 Future Work -- References -- Ant Colony for Locality Foraging in Image Enhancement -- 1 Introduction -- 2 Retinex Theory -- 3 Termite Retinex -- 4 Termite Retinex Locality -- 5 Termite Retinex Properties -- 5.1 Computational Complexity -- 5.2 Dynamic Range Stretching -- 5.3 Color Constancy and Color Correction -- 5.4 HDR Tone Rendering -- 6 Conclusions -- References -- Uncertainty Based Hybrid Particle Swarm Optimization Techniques and Their Applications -- 1 Introduction -- 2 Implementation of PSO -- 2.1 PSO Algorithm -- 3 Variants of PSO -- 3.1 Discrete Binary PSO (DBPSO) -- 3.2 Adaptive PSO -- 3.3 Multi-objective PSO -- 4 PSO in Feature Selection -- 5 PSO in Classification -- 5.1 Algorithm to Extract Best Classification Rule Begin -- 5.2 Rule Induction Algorithm -- 6 PSO in Hybrid Computing -- 6.1 Fuzzy PSO -- 6.2 Rough PSO -- 6.3 Rough Fuzzy PSO -- 7 Implementation and Results -- 8 Applications of PSO -- 9 Conclusion -- References -- Hybridization of Evolutionary and Swarm Intelligence Techniques for Job Scheduling Problem -- 1 Introduction -- 2 Evolutionary Algorithms -- 2.1 Genetic Algorithm. , 3 Swarm Intelligence -- 3.1 Ant Colony Optimization -- 3.2 Particle Swarm Optimization -- 3.3 Artificial Bee Colony Optimization -- 4 Related Work on Hybrid Techniques for Job Scheduling -- 4.1 Introduction -- 4.2 Experimental Results and Discussion -- 5 Proposed Hybrid Technique -- 5.1 Introduction -- 5.2 Adaptive ABC Algorithm -- 5.3 Adaptive ABC for Job Scheduling Problem -- 6 Experimental Results -- 6.1 Environment Infrastructure -- 6.2 Implementation and Results -- 7 Multiobjective Problems -- 8 Conclusion -- References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...