GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Document type
Language
  • 1
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (577 pages)
    Edition: 1st ed.
    ISBN: 9789811948633
    Series Statement: Lecture Notes in Networks and Systems Series ; v.494
    DDC: 006.3
    Language: English
    Note: Intro -- Conference Organization Commitees -- Preface -- Contents -- Editors and Contributors -- A Framework for Early Recognition of Alzheimer's Using Machine Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Model Diagram -- 3.2 CatBoost Classifier -- 3.3 Model Evaluation -- 4 Environmental Setup -- 5 Results and Discussion -- 5.1 Accuracy -- 5.2 Precision -- 5.3 Recall -- 5.4 F1-Score -- 6 Conclusion and Future Direction -- References -- On the Studies and Analyzes of Facial Detection and Recognition Using Machine Learning Algorithms -- 1 Introduction -- 2 Related Study -- 3 Facial Detection and Recognition Methods -- 3.1 Machine Learning Approach -- 3.2 Deep Learning Approach -- 4 Implementation -- 4.1 Face Detection: Haar Cascade Detection Algorithm -- 4.2 Face Recognition: Local Binary Pattern Histogram (LBPH) Algorithm -- 4.3 Detection and Recognition by GoogLeNet -- 5 Results and Discussion -- 5.1 Haar Cascade Face Detection (Machine Learning Approach) -- 5.2 LBPH Face Recognition in Real Time (Machine Learning Approach) -- 5.3 GoogLeNet Image-Based Analysis (Deep Learning Approach) -- 6 Conclusion -- References -- IPL Analysis and Match Prediction -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Processing the Datasets -- 3.2 Match Analysis -- 3.3 Visualization -- 3.4 Match Prediction -- 3.5 User Interface Creation -- 4 Results and Discussion -- 5 Conclusion -- References -- Application of ANN Combined with Machine Learning for Early Recognition of Parkinson's Disease -- 1 Introduction -- 2 Literature Work -- 3 Methodology -- 4 Experimental Setup -- 5 Performance Analysis and Experimentation Results -- 6 Conclusion and Future Work -- References -- People Count from Surveillance Video Using Convolution Neural Net -- 1 Introduction -- 2 Literature Review -- 3 Dataset. , 4 Proposed Methodology -- 5 Results -- 6 Conclusion -- References -- Detection of Pneumonia and COVID-19 from Chest X-Ray Images Using Neural Networks and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 CNN Architectures -- 4 Proposed CNN Model -- 5 Experimentation and Results -- 5.1 Dataset -- 5.2 Experiment Setup -- 5.3 Results -- 5.4 Performance Evaluation -- 6 Conclusion -- References -- Plant Leaf Disease Detection and Classification Using Deep Learning Technique -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System Architecture -- 3.1 Image Acquisition -- 3.2 Image Preprocessing -- 3.3 Feature Extraction Using CNN -- 3.4 Detect and Classify Disease -- 4 Result and Analysis -- 5 Conclusion -- References -- Breast Mass Classification Using Convolutional Neural Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 About Dataset -- 3.2 Architecture of CNN -- 4 Results and Discussion -- 5 Conclusions -- References -- Deep Generative Models Under GAN: Variants, Applications, and Privacy Issues -- 1 Introduction -- 2 Generative Adversarial Networks (GANs) -- 2.1 GAN Architecture -- 2.2 Objective Function -- 3 Existing Models and Applications -- 3.1 GAN Models -- 3.2 Applications -- 4 GANs in Privacy -- 4.1 Privacy in Data -- 4.2 Privacy in Model -- 5 Future Works -- 6 Conclusion -- References -- Fusion-Based Celebrity Profiling Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Evaluation Measure -- 3.3 Stylistic Features -- 3.4 Word Embedding -- 3.5 Method -- 4 Results and Discussion -- 5 Conclusion -- References -- DeepLeaf: Analysis of Plant Leaves Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Feature Extraction -- 3.2 CNN and VGG16 -- 4 Results and Discussion -- 4.1 Comparative Analysis with Respect to Accuracy -- 5 Conclusion. , References -- Potential Assessment of Wind Power Generation Using Machine Learning Algorithms for Southern Region of India -- 1 Introduction -- 2 Wind Power Technology -- 3 Methodology -- 3.1 Linear Regression -- 3.2 Support Vector Regression -- 3.3 K-Nearest Neighbour Algorithm -- 3.4 Decision Trees Regression -- 4 Performance Indices -- 4.1 Mean Absolute Error (MAE) -- 4.2 Mean Square Error (MSE) -- 4.3 Root Mean Square Error (RMSE) -- 4.4 R2 Score -- 5 Results and Discussions -- 6 Conclusions -- References -- OCR-LSTM: An Efficient Number Plate Detection System -- 1 Introduction -- 1.1 Tesseract -- 1.2 Opencv -- 1.3 Lstm -- 2 Literature Review -- 2.1 Problem Statement -- 2.2 Objective -- 3 System Model -- 3.1 Conversion of RGB Image to Gray Scale Image -- 3.2 Bilateral Filter -- 3.3 Lstm -- 4 Results and Discussion -- 5 Conclusions -- References -- Artificial Neural Network Alert Classifier for Construction Equipments Telematics (CET) -- 1 Introduction -- 2 Related Works -- 3 Problem Statement -- 4 System Model -- 4.1 Problem Formulation -- 5 Proposed Design and Methodology -- 6 Results and Discussion -- 6.1 Data Set -- 6.2 Results -- 7 Conclusions -- References -- Hybrid Approach of Modified IWD and Machine Learning Techniques for Android Malware Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed Modified Version of IWD Algorithm -- 3.1 Step 1: The Static Parameters and Dynamic Parameters are Initialized -- 3.2 Step 2: Modified Edge Selection Process -- 3.3 Step 3: Updating Velocity and Soil Values -- 3.4 Step 4: Reinforcement and Termination Phase -- 4 Feature Selection Procedure Using Modified IWD -- 5 Dataset Prepossessing and Experimental Environment -- 5.1 Dataset and Preprocessing -- 5.2 Experimental Environment -- 6 Performance Evaluation Matrix -- 7 Result and Discussions -- 8 Conclusion and Future Work -- References. , Intuitionistic Fuzzy 9 Intersection Matrix for Obtaining the Relationship Between Indeterminate Objects -- 1 Introduction -- 2 Preliminary Concepts -- 2.1 Intuitionistic Fuzzy Set -- 2.2 Intuitionistic Fuzzy Topological Spaces -- 2.3 Related Studies -- 3 Intuitionistic Fuzzy 9 Intersection Matrix -- 4 Application of the Proposed Definitions -- 4.1 Importance of the Proposed Definition -- 4.2 Intuitionistic Fuzzy 9 Intersection Matrix -- 5 Conclusion and Future Work -- References -- A Hybrid Model of Latent Semantic Analysis with Graph-Based Text Summarization on Telugu Text -- 1 Introduction -- 2 Related Work -- 3 Latent Semantic Analysis -- 4 Text Rank Algorithm -- 5 Proposed Algorithm -- 6 Evaluation and Experimental Results -- 7 Conclusion -- References -- A Combined Approach of Steganography and Cryptography with Generative Adversarial Networks: Survey -- 1 Introduction -- 2 Background Works -- 3 Advanced Techniques -- 4 Fallouts and Discussion -- 5 Conclusion -- References -- Real-Time Accident Detection and Intimation System Using Deep Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 4 Results and Discussion -- 5 Conclusion -- References -- Design of Cu-Doped SnO2 Thick-Film Gas Sensor for Methanol Using ANN Technique -- 1 Introduction -- 2 Proposed Experiment -- 3 Result and Discussion -- 4 Conclusion -- References -- Detect Traffic Lane Image Using Geospatial LiDAR Data Point Clouds with Machine Learning Analysis -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Land-Usage/Land-Coverage Change Analysis -- 4 Interpretation Concept -- 5 Conclusion and Future Scope -- References -- Classification of High-Dimensionality Data Using Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Techniques -- 3.1 Naive Bayes Algorithm -- 3.2 Support Vector Machine (SVM). , 3.3 K-Nearest Neighbor (KNN) Algorithm -- 3.4 Principal Component Analysis (PCA) -- 4 Proposed Model -- 5 Performance Evaluation Metrics -- 6 Result Analysis -- 7 Conclusion -- References -- To Detect Plant Disease Identification on Leaf Using Machine Learning Algorithms -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Dataset and Attributes -- 5 Application of the Outcomes -- 6 Result Analysis -- 7 Conclusion -- References -- Association and Correlation Analysis for Predicting the Anomaly in the Stock Market -- 1 Introduction -- 2 Related Work -- 3 Data Preparation -- 4 Methodology -- 4.1 Data Mining Association Rule -- 5 Results and Discussion -- 6 Conclusion -- References -- Early Identification of Diabetic Retinopathy Using Deep Learning Techniques -- 1 Introduction -- 1.1 Types of Diabetic Retinopathy -- 2 Literature Review -- 3 Methodology -- 4 Experimentation Setup -- 5 Dataset -- 6 Image Processing -- 6.1 Input Fundus Images -- 6.2 Gray Fundus Images -- 6.3 Gaussian Blur -- 7 Convolution Neural Network Models -- 7.1 Training Using ResNet50 and VGG16 -- 8 Result -- 8.1 Result of ResNet50 -- 8.2 Result of VGG16 -- 8.3 Comparison of Results -- 9 Conclusion -- 10 Future Work -- 11 Competing Interest -- References -- Performance Evaluation of MLP and CNN Models for Flood Prediction -- 1 Introduction -- 2 Study Area -- 3 Methodology -- 3.1 Mlp -- 3.2 CNN -- 3.3 Evaluating Constraint -- 4 Results and Discussions -- 5 Conclusion -- References -- Bidirectional LSTM-Based Sentiment Analysis of Context-Sensitive Lexicon for Imbalanced Text -- 1 Introduction -- 2 Related Work -- 2.1 Classification of Sentiments -- 2.2 Techniques of Supervised Learning -- 2.3 Techniques with No Supervision -- 2.4 Techniques for Semi-Supervised Learning -- 2.5 Ensemble Techniques -- 3 Proposed Methodology -- 3.1 Bidirectional Long Short-Term Memory (BLSTM). , 3.2 Calculating Sentiment Scores.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (498 pages)
    Edition: 1st ed.
    ISBN: 9789811500770
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.165
    Language: English
    Note: Intro -- Organizing Committee -- Preface -- Contents -- About the Editors -- 1 Comparison of Different Image Segmentation Techniques on MRI Image -- 1.1 Introduction -- 1.2 Methodology -- 1.2.1 Preprocessing -- 1.2.2 Segmentation Techniques -- 1.3 Results and Discussion -- 1.4 Conclusion -- References -- 2 PSO-ANN-Based Computer-Aided Diagnosis and Classification of Diabetes -- 2.1 Introduction -- 2.1.1 Literature Survey -- 2.2 Feature Selection Approaches -- 2.3 Particle Swarm Optimization (PSO) -- 2.4 Proposed Feature Selection Algorithm -- 2.5 Experimental Results -- 2.6 Conclusion -- References -- 3 Round Robin Scheduling Based on Remaining Time and Median (RRRT& -- M) for Cloud Computing -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Scheduling Algorithms -- 3.4 Experimental Setup and Result Discussions -- 3.4.1 Experimental Setup -- 3.4.2 Performance Metrics -- 3.4.3 Result Discussions -- 3.5 Summary -- References -- 4 Business-Driven Blockchain-Mempool Model for Cooperative Optimization in Smart Grids -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Virtual Power Plant Dispatch Schedules -- 4.3.1 Cost Function Based Optimization -- 4.4 Blockchain -- 4.4.1 Consensus -- 4.5 Consensus and Cooperative Scheduling -- 4.6 Mempool Model -- 4.7 Evaluation and Future Work -- 4.8 Conclusion -- References -- 5 Research of Institutional Technology Diffusion Rules Based on Patent Citation Network-A Case Study of AI Field -- 5.1 Introduction -- 5.2 Data and Method -- 5.3 Results and Discussion -- 5.3.1 Comparative Analysis of Technical Force -- 5.3.2 Technology Diffusion Network and Visualization -- 5.3.3 Measurement of Technology Diffusion Capacity -- 5.4 Conclusion and Limitation -- References -- 6 Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador -- 6.1 Introduction. , 6.2 Materials and Methods -- 6.2.1 Materials -- 6.2.2 Methods -- 6.3 Results -- 6.4 Discussion -- 6.5 Future Work and Conclusion -- References -- 7 Appropriate Security Protocols to Mitigate the Risks in Electronic Money Management -- 7.1 Introduction -- 7.2 Materials and Methods -- 7.2.1 Materials -- 7.2.2 Methods -- 7.3 Results -- 7.4 Discussion -- 7.5 Future Works and Conclusion -- 7.5.1 Future Works -- 7.5.2 Conclusions -- References -- 8 Acceptance and Readiness of Thai Farmers Toward Digital Technology -- 8.1 Introduction -- 8.2 Research Model -- 8.3 Method -- 8.3.1 Questionnaire Instrument -- 8.3.2 Data Analysis -- 8.4 Results -- 8.5 Conclusion -- References -- 9 Neural Network Classifier for Diagnosis of Diabetic Retinopathy -- 9.1 Introduction -- 9.2 Classification -- 9.3 Conclusion -- References -- 10 Comparative Analysis of Data Mining Classification Techniques for Prediction of Heart Disease Using the Weka and SPSS Modeler Tools -- 10.1 Introduction -- 10.2 Literature Review -- 10.2.1 Data Mining Classification Techniques -- 10.3 Experimental Analysis -- 10.3.1 Dataset -- 10.3.2 Result Analysis -- References -- 11 An Automated Framework to Uncover Malicious Traffic for University Campus Network -- 11.1 Introduction -- 11.2 Study Goals -- 11.3 Methodology -- 11.4 Experimental Setup -- 11.5 Observations and Analysis of Framework in Campus Network on Real-Time Basis -- 11.5.1 Dashboard Visualization for Analysis -- 11.6 Conclusion -- 11.7 Future Scope -- References -- 12 Comparative Analysis of K-Means Algorithm and Particle Swarm Optimization for Search Result Clustering -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Experimental Result and Analysis -- 12.3.1 Dataset Details -- 12.3.2 Preprocessing -- 12.3.3 Performance Evaluation -- 12.4 Conclusion -- References. , 13 Design and Implementation of Rule-Based Hindi Stemmer for Hindi Information Retrieval -- 13.1 Introduction -- 13.2 Stemming Approaches -- 13.2.1 Affix Removal Approach -- 13.2.2 N-Gram -- 13.2.3 Suffix Stripping Approach -- 13.2.4 Suffix Substitution Approach -- 13.2.5 Brute-Force Approach -- 13.2.6 Hybrid Approach -- 13.3 Related Work -- 13.4 Proposed Methodology and Implementation -- 13.5 Analysis and Conclusion -- References -- 14 Research on the Development Trend of Ship Integrated Power System Based on Patent Analysis -- 14.1 Introduction -- 14.2 Data and Methods -- 14.3 Results and Discussion -- 14.3.1 Life Cycle Analysis of Patent Technology Development of Foreign Ship Integrated Power System -- 14.3.2 Analysis of Patent Technology Research and Development Direction of Foreign Ship Integrated Power System -- 14.4 Summary -- References -- 15 Detection of Data Anomalies in Fog Computing Architectures -- 15.1 Introduction -- 15.2 Fog Architecture Overview -- 15.3 Anomaly Detection -- 15.3.1 Anomalies -- 15.3.2 Preliminaries for Detection Algorithm -- 15.3.3 Detection Procedure -- 15.4 Computation Algorithm -- 15.5 Related Work -- 15.6 Conclusion -- References -- 16 Cloud Data for Marketing in Tourism Sector -- 16.1 Introduction -- 16.2 Consumer Behavioral Study for the Tourism Industry -- 16.3 Sources of Data -- 16.3.1 Methods of Sourcing Data from Internet -- 16.4 Model for Marketing Data Capture -- 16.4.1 Prediction Theories -- 16.4.2 Marketing -- 16.5 Results -- 16.6 Conclusion -- References -- 17 Road Travel Time Prediction Method Based on Random Forest Model -- 17.1 Introduction -- 17.2 The Principle of Random Forest Algorithm -- 17.3 The Principle of DBSCAN -- 17.4 The Prediction Model of RF-DBSCAN -- 17.4.1 Data Sources -- 17.4.2 Feature Selection -- 17.4.3 The Principle of RF-DBSCAN -- 17.4.4 Comparison of Experiment Results. , 17.5 Conclusions -- References -- 18 Video Synchronization and Alignment Using Motion Detection and Contour Filtering -- 18.1 Introduction -- 18.1.1 Overview -- 18.1.2 Problem Statement -- 18.1.3 Objectives -- 18.1.4 Existing System -- 18.1.5 Proposed System -- 18.2 Literature Survey -- 18.3 System Design -- 18.4 Dataflow of Video Change Detection -- 18.5 Class Diagrams -- 18.6 Experimental Results -- 18.7 Conclusion -- References -- 19 Mutichain Enabled EHR Management System and Predictive Analytics -- 19.1 Introduction -- 19.2 Related Work -- 19.2.1 Verifying the Authenticity of Returned Drugs by Tracking Supply of Authorized Drugs in Supply Chain -- 19.2.2 Transparency and Traceability of Consent in Clinical Trials -- 19.2.3 Incentivized Access to Medical Data -- 19.3 Problem Setting -- 19.4 Proposed Architecture -- 19.4.1 Multichain -- 19.4.2 Off-Chain Storage -- 19.4.3 Hashing -- 19.4.4 Data Analysis -- 19.4.5 Machine Learning -- 19.4.6 Workflow -- 19.5 Conclusion -- References -- 20 Quick Insight of Research Literature Using Topic Modeling -- 20.1 Introduction -- 20.2 Literature Survey -- 20.3 Methodology -- 20.3.1 Preprocessing-Natural Language Processing -- 20.3.2 Topic Modeling -- 20.3.3 Latent Dirichlet Allocation -- 20.4 System Development -- 20.5 Experimental Results -- 20.6 Conclusion -- References -- 21 Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE) -- 21.1 Introduction -- 21.1.1 An Overview -- 21.2 Related Work -- 21.3 Proposed Methodology -- 21.3.1 Developing an Efficient Data Storage Scheme -- 21.3.2 Developing a Ciphertext Database Scheme -- 21.4 Conclusion -- References -- 22 Security Vulnerabilities of OpenStack Cloud and Security Assessment Using Different Software Tools -- 22.1 Introduction -- 22.2 Software Architecture -- 22.2.1 Components of OpenStack. , 22.2.2 OpenStack Usage in Cloud Platform -- 22.3 Vulnerabilities in OpenStack -- 22.3.1 Known Vulnerabilities in OpenStack -- 22.3.2 Assessment for Security -- 22.3.3 Network Vulnerability Scanners -- 22.4 Conclusion -- References -- 23 Smart Physical Intruder Detection System for Highly Sensitive Area -- 23.1 Introduction -- 23.2 Literature Survey -- 23.3 Proposed Methodology -- 23.3.1 Working of PIR Motion Sensor -- 23.3.2 Face Recognition Using Viola-Jones Algorithm and KNN Algorithm -- 23.4 Conclusion and Future Scope -- References -- 24 Two-level Classification of Radar Targets Using Machine Learning -- 24.1 Introduction -- 24.2 Phased Array Radar -- 24.3 Design of Multilevel Classifier -- 24.3.1 Signal Level Classification: Level ``0'' -- 24.3.2 Classification Level 1 Using Raw Detection -- 24.3.3 Level 2 Classifier Using Track Data -- 24.4 Fusion of Information with Signal Level Classifier -- 24.5 Simulation and Results -- 24.5.1 Results for Level 1 Classification -- 24.5.2 Classification Level 2 Using Radar Track and Signal Data -- 24.6 Conclusion -- References -- 25 A Cognitive Semantic-Based Approach for Human Event Detection in Videos -- 25.1 Introduction -- 25.2 Methodology -- 25.2.1 Frame Generation -- 25.2.2 Fuzzy C-Mean Clustering (FCM) -- 25.2.3 Feature Extraction -- 25.2.4 CNN Classifier -- 25.3 Test Results and Discussions -- 25.4 Conclusions -- References -- 26 Analysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador -- 26.1 Introduction -- 26.2 Materials and Methods -- 26.2.1 Materials -- 26.2.2 Methods -- 26.3 Results -- 26.4 Discussion -- 26.5 Work Futures and Conclusions -- References -- 27 Load and Renewable Energy Forecasting for System Modelling, an Effort in Reducing Renewable Energy Curtailment -- 27.1 Introduction -- 27.2 Literature Review -- 27.3 Proposed Work. , 27.3.1 Neural Network-Based Load Forecasting.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Keywords: Computational intelligence-Congresses. ; Evolutionary computation-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (780 pages)
    Edition: 1st ed.
    ISBN: 9789811557880
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1176
    DDC: 006.3
    Language: English
    Note: Intro -- Organization -- Chief Patrons -- Patrons -- Organizing Chairs -- Publicity Chairs -- Advisory Committee -- Technical Program Committee -- Preface -- Contents -- About the Editors -- Faster Result Retrieval from Health Care Product Sales Data Warehouse Using Materialized Queries -- 1 Introduction -- 2 Implementation of MQDB for Bioteknika Healthcare Pvt. Ltd -- 3 Experimental Results -- 4 Conclusion -- References -- Sense Scheduling for Robotics Cognitive Intelligence -- 1 Introduction -- 2 Related Work -- 3 Human Though Process Test -- 4 Proposed System Architecture -- 5 Proposed Methodology -- 6 Result and Discussion -- 7 Conclusion -- 8 Conclusion -- References -- Feature Selection Using Ant Colony Optimization and Weighted Visibility Graph -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Work and Experiment -- 3.1 Feature Extraction -- 3.2 Feature Selection -- 4 Performance Analysis -- 4.1 Precision, Recall, Specificity, and F1-Score -- 4.2 Accuracy -- 4.3 False Positive Rate(FPR) and False Negative Rate(FNR) -- 5 Conclusion -- References -- From Generic to Custom: A Survey on Role of Machine Learning in Pharmacogenomics, Its Applications and Challenges -- 1 Introduction -- 2 Genomics -- 2.1 Understanding the Disease -- 2.2 Challenges -- 2.3 Data Sharing -- 3 Pharmacogenomics -- 4 Machine Learning in Pharmacogenomics -- 4.1 Genome-Wide Association Study (GWAS) -- 4.2 Evolutionary Conservation -- 4.3 Applications of Genomics in Diabetes -- 5 Conclusion -- References -- Personalised Structure Balance Theory-Based Movie Recommendation System -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Pre-processing Module -- 3.2 Product-Based Recommendation Module -- 3.3 User-Based Recommendation Module -- 3.4 Prediction Module -- 4 Results -- 5 Conclusion -- References. , Machine Learning Techniques for the Investigation of Phishing Websites -- 1 Introduction -- 2 Literature Review -- 3 Materials and Method -- 3.1 Dataset -- 3.2 Data Preparation and Preprocessing -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Feature Extraction and Classification of Gestures from Myo-Electric Data Using a Neural Network Classifier -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Data Acquisition -- 3.2 Data Segmentation -- 3.3 Feature Extraction and Classification -- 4 Discussion and Results -- 5 Conclusion -- References -- Text-Convolutional Neural Networks for Fake News Detection in Tweets -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Preprocessing -- 3.2 Embedding Matrix -- 3.3 Classification -- 4 Experiments -- 4.1 Dataset -- 4.2 Feature Extraction -- 5 Results and Discussion -- 6 Conclusion -- References -- Effect of Soil and Climatic Attribute on Greenhouse Gas Emission from Agriculture Sector -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Database Creation -- 3.3 Data Preprocessing -- 3.4 Feature Extraction -- 3.5 Analysis of Features -- 3.6 Prediction Model -- 4 Result Analysis -- 4.1 Crop-Wise GHGs Emission -- 4.2 Season-Wise GHGs Emission -- 4.3 Most Influencing Parameter for Prediction of GHGs Emission -- 4.4 Using Deep Learning Approach -- 5 Conclusion -- References -- Optimal Image Feature Ranking and Fusion for Visual Question Answering -- 1 Introduction -- 2 Related Work -- 2.1 Visual Question Answering -- 2.2 Image Feature Extraction -- 3 Ranking and Feature Fusion (RFF) Framework -- 3.1 Overall Architecture -- 3.2 Feature Ranking -- 3.3 Feature Fusion -- 4 Results and Discussions -- 5 Conclusion -- References -- An Investigation on Indoor Navigation Systems -- 1 Introduction. , 2 Path Selection Taxonomy -- 2.1 Uninformed Search Algorithm -- 2.2 Informed Search Algorithm -- 3 Object or Obstacle Detection Taxonomy -- 3.1 CNN Algorithm -- 3.2 RCNN Algorithm -- 3.3 Fast RCNN Algorithm -- 3.4 Faster RCNN Algorithm -- 3.5 YOLO -- 4 Conclusion -- References -- Conceptualization and Design of Remotely-Accessible Hardware Interface (RAHI) Laboratory -- 1 Introduction -- 1.1 Background and Problem Identification -- 1.2 Literature Review and Proposed Solution -- 2 Technical Description -- 2.1 Server -- 2.2 Raspberry Pi and Hardware -- 2.3 Web Application -- 3 Discussion -- 3.1 Testing -- 3.2 Analysis -- 4 Future Scope -- 5 Conclusion -- References -- A Non-invasive approach for Driver Drowsiness Detection using Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Disaster Severity Analysis from Micro-Blog Texts Using Deep-NN -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Input Layer -- 3.2 Convolution Layer -- 3.3 Max-Pooling Layer -- 3.4 RNN Layer -- 3.5 Fully Connected Layer -- 4 Experimental Setup -- 4.1 Preparation of Datasets -- 4.2 Word-Embeddings -- 4.3 Network Training -- 5 Results and Discussion -- 6 Conclusion -- References -- WEKA Result Reader-A Smart Tool for Reading and Summarizing WEKA Simulator Files -- 1 Introduction -- 2 The WEKA Result Reader (WRR) -- 3 Performance Evaluation -- 3.1 Application-Level Testing of WRR Tools -- 3.2 System-Level Testing of WRR Tools -- 4 Conclusion -- References -- Predicting Reliability of Web Services Using Hidden Markov Model -- 1 Introduction -- 2 Models of NHPP -- 3 Hidden Markov Model for Reliability Model -- 3.1 Modeling the Failure Process with HMM -- 3.2 Parameter Estimation -- 3.3 Restoration of Hidden States. , 3.4 Bayesian Information Criterion (BIC) -- 4 Experiments -- 5 Conclusion -- References -- Optimal Contrast and Size-Invariant Recursive VCS Using Perfect Reconstruction of White Pixels -- 1 Introduction -- 2 Recursive Visual Cryptography Scheme -- 2.1 The RVCS Model -- 2.2 Working Example of RVCS -- 3 The Proposed Model: Size-Invariant RVCS with PRWP -- 3.1 Experimental Results -- 3.2 Analysis of Experimental Results -- 4 Conclusion -- References -- Performance Analysis of Brain Imaging Using Enriched CGLS and MRNSD in Microwave Tomography -- 1 Introduction -- 1.1 Related Works -- 2 Formulation of the Proposed Forward Process -- 3 Importance of Enriched CGLS and MRNSD Regularization Methods -- 4 Numerical Results and Discussion -- 4.1 Simulation Setup and Dataset -- 4.2 Performance Analysis on Varying Number of Antennas and Frequencies -- 4.3 Performance Analysis on Noise Distortion -- 5 Conclusion -- References -- Analysis and Identification of EEG Features for Mental Stress -- 1 Introduction -- 2 Methodology -- 2.1 Brief Procedure -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 3 Results -- 4 Discussion -- 5 Conclusion -- 6 Future Work -- References -- Blockchain-Based Grievance Management System -- 1 Introduction -- 2 Benefits Over Current System -- 3 Approach -- 3.1 Working -- 3.2 System Architecture -- 3.3 Mathematical Model -- 4 Implementation -- 5 Conclusion -- References -- Utility of Neural Embeddings in Semantic Similarity of Text Data -- 1 Introduction -- 2 Neural Embedding Techniques -- 3 Methodology -- 4 Data Management -- 5 Experimental Results -- 5.1 Similarity Score Distribution -- 5.2 D-Prime -- 6 Conclusion -- References -- Big Data and Machine Learning Analytics to Detect Epileptic Seizures with Minimum Delay Using Random Window Optimization -- 1 Introduction -- 2 Big Datasets and Machine Learning. , 3 Epileptic Seizure Detection -- 4 Related Work -- 5 Methods -- 5.1 Support Vector Machine -- 5.2 Artificial Neural Network -- 6 Methodology -- 6.1 Top-K Amplitude Measure -- 6.2 Multiwindow Measure -- 6.3 Workflow -- 7 Results and Discussion -- 8 Conclusion -- References -- An Efficient Evaluation of Spatial Search on Road Networks Using G-Tree -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 G-Tree Indexing for Finding SPSP Based on Distance -- 4 Experimental Evaluation and Results -- 5 Conclusion -- References -- Investigation into the Efficacy of Various Machine Learning Techniques for Mitigation in Credit Card Fraud Detection -- 1 Introduction -- 2 Related Works -- 2.1 Machine Learning Algorithms -- 3 Proposed Methodology -- 4 Experimental Study -- 4.1 Credit Card Dataset -- 4.2 Design of Experiments -- 4.3 Performance Evaluation Measures -- 5 Results and Discussions -- 6 Conclusion and Future Work -- References -- Temporal Modeling of On-Street Parking Data for Detection of Parking Violation in Smart Cities -- 1 Introduction -- 2 Related Work -- 3 Data Collection and Preliminary Analysis -- 4 Problem Formulation -- 5 Proposed Approach -- 5.1 Proposed Detection Model -- 5.2 Proposed Algorithm -- 6 Simulation Results and Analysis -- 7 Conclusion and Future Work -- References -- Performance Optimization of Big Data Applications Using Parameter Tuning of Data Platform Features Through Feature Selection Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experiments and Results -- 5 Conclusion -- References -- Development of Emotional Decision-Making Model Using EEG Signals -- 1 Introduction -- 2 Methodology -- 2.1 Design of Experiment -- 3 Decision-Making Model -- 4 Conclusion -- References -- HMM Classifier Object Recognizing System in Brain-Computer Interface -- 1 Introduction -- 2 State of Art Development. , 3 Background.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Keywords: Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (740 pages)
    Edition: 1st ed.
    ISBN: 9789811556791
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.1177
    Language: English
    Note: Intro -- Organization -- Chief Patrons -- Patrons -- Organizing Chairs -- Publicity Chairs -- Advisory Committee -- Technical Program Committee -- Preface -- About This Book -- Contents -- About the Editors -- Classification of Dry/Wet Snow Using Sentinel-2 High Spatial Resolution Optical Data -- 1 Introduction -- 2 Data Used and Study Area -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Potential of Robust Face Recognition from Real-Time CCTV Video Stream for Biometric Attendance Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Contributions -- 4 Proposed System -- 5 Algorithm -- 6 Results -- 7 Conclusion -- References -- ATM Theft Investigation Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Data Processing and Data Set -- 5 Results and Analysis -- 6 Conclusion and Future Work -- References -- Classification and Prediction of Rice Crop Diseases Using CNN and PNN -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Algorithms -- 5 Result and Discussion -- 6 Conclusion -- References -- SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach to Intrusion Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed SAGRU Approach -- 3.1 Stacked Autoencoder Feature Extraction (SAFE) -- 3.2 Gated Recurrent Unit Learning (GRUL) -- 3.3 SAGRU-Based Intrusion Detection -- 4 Performance Analysis -- 5 Conclusion -- References -- Comparison of KNN and SVM Algorithms to Detect Clinical Mastitis in Cows Using Internet of Animal Health Things -- 1 Introduction -- 2 Literature Study -- 3 Methodology -- 4 A Sack for Data Acquisition and Testing -- 5 Result -- 6 Conclusion -- References -- Two-Way Face Scrutinizing System for Elimination of Proxy Attendances Using Deep Learning -- 1 Introduction -- 1.1 Comparison with Previous Works. , 2 Methodology -- 2.1 Encoding Faces Present in an Image -- 2.2 Face Recognition -- 3 Algorithm for Eliminating Proxies -- 4 Blynk -- 5 Validation -- 6 Conclusion -- References -- Ontology-Driven Sentiment Analysis in Indian Healthcare Sector -- 1 Introduction -- 2 Literature Overview -- 3 Ayushman Bharat Yojana (PM Jan Arogya Yojana) -- 3.1 Key Benefits of the Scheme -- 3.2 Beneficiaries of the Scheme -- 3.3 Impact of the Scheme on the Beneficiaries -- 4 An Overview of the Ontology -- 4.1 Tools and Resources Used -- 4.2 Ontology: An Overview -- 5 Proposed Work -- 5.1 Data Acquisition -- 5.2 Data Cleaning and Preprocessing -- 5.3 Extracting Features -- 5.4 Training the Model -- 6 Observations and Results -- 7 Conclusion -- 8 Future Work -- References -- Segmentation of Nuclei in Microscopy Images Across Varied Experimental Systems -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Dataset Used -- 3.2 Data Augmentation Used -- 3.3 Model Architecture -- 3.4 Loss Function Used -- 3.5 Evaluation Metric Used -- 4 Experiments and Results -- 5 Conclusion -- References -- Transitional and Parallel Approach of PSO and SGO for Solving Optimization Problems -- 1 Introduction -- 1.1 Traditional Optimization Tools -- 1.2 Non-traditional Optimization Tools -- 2 Preliminaries -- 2.1 Function Optimization -- 2.2 Benchmark Functions -- 2.3 Evolutionary Technique -- 3 Proposed Approach: Hybridization PSO with SGO -- 4 Simulation Results and Discussion -- 5 Conclusion -- References -- Remote Sensing-Based Crop Identification Using Deep Learning -- 1 Introduction -- 2 Literature Study -- 3 Methodology -- 3.1 Overview of Proposed Method -- 3.2 Convolution -- 3.3 Max pooling -- 3.4 Dense Node -- 3.5 Softmax -- 4 Results and Discussion -- 5 Conclusion -- References. , Three-Level Hierarchical Classification Scheme: Its Application to Fractal Image Compression Technique -- 1 Introduction -- 2 Basic FIC Technique -- 3 Proposed Three-Level Hierarchical Classification (3-LHC) Scheme -- 3.1 Elementary Analysis -- 3.2 Proposed Modification -- 4 Results and Analysis -- 5 Conclusion -- References -- Prediction of POS Tagging for Unknown Words for Specific Hindi and Marathi Language -- 1 Introduction -- 1.1 POS Tagging -- 1.2 Limitations of Current POS Tagging System -- 2 Related Work -- 3 Contributions -- 4 Proposed Methodology -- 4.1 Hidden Markov Model -- 4.2 Viterbi Algorithm -- 4.3 Naïve Bayes Algorithm -- 5 Result and Analysis -- 6 Conclusion -- 7 Future Work -- References -- Modified Multi-cohort Intelligence Algorithm with Panoptic Learning for Unconstrained Problems -- 1 Introduction and Literature Review -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Sentiment Analysis on Movie Review Using Deep Learning RNN Method -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 4 Implementation Tools -- 5 Performance Analysis -- 6 Conclusions and Future Work -- References -- Super Sort Algorithm Using MPI and CUDA -- 1 Introduction -- 2 Sorting Algorithm -- 3 Result -- 4 Conclusion and Future Work -- References -- Significance of Network Properties of Function Words in Author Attribution -- 1 Introduction -- 2 Author Identification Problem -- 3 Related Works -- 4 Complex Network Approach to Author Identification Problem -- 4.1 Methodology -- 5 Results and Discussions -- 6 Conclusion -- References -- Performance Analysis of Periodic Defected Ground Structure for CPW-Fed Microstrip Antenna -- 1 Introduction -- 2 Design of CPW-Fed Microstrip Antenna -- 3 Circular-Shaped PDGS Structure -- 4 Fabrication and Validation of Antenna -- 5 Conclusion -- References. , Energy Aware Task Consolidation in Fog Computing Environment -- 1 Introduction -- 2 Related Works -- 3 Fog Computing Architecture -- 4 Proposed Energy-Saving Task Consolidation Algorithm -- 5 Simulation Results -- 6 Conclusion -- References -- Modelling CPU Execution Time of AES Encryption Algorithm as Employed Over a Mobile Environment -- 1 Introduction -- 2 Related Literature -- 3 Description of Our Model -- 3.1 Scheme 1 -- 3.2 Scheme 2 -- 4 Experimental Analysis of Data -- 4.1 Scheme 1 -- 4.2 Scheme 2 -- 5 Comparison of Models -- 5.1 Scheme 1 -- 5.2 Scheme 2 -- 5.3 Comparison Between Scheme 1 and Scheme 2 -- 6 Conclusions -- References -- Gradient-Based Feature Extraction for Early Termination and Fast Intra Prediction Mode Decision in HEVC -- 1 Introduction -- 2 Proposed Algorithm -- 3 Experimental Results -- 4 Conclusion -- References -- A Variance Model for Risk Assessment During Software Maintenance -- 1 Introduction -- 2 Risks in Software Development and Maintenance -- 3 Factors in Software Risk Assessment During Maintenance -- 3.1 Testing-Related Risk Factors -- 4 Variance Model for Software Risk Assessment -- 5 Discussion of the Variance Model -- 5.1 Development of a Risk Measurement Toolkit -- 5.2 Maturing of the Risk Model: An Aquatic Profile for Risk Maturity Management (APRMM) -- 6 Conclusions -- References -- Cyber Attack Detection Framework for Cloud Computing -- 1 Introduction -- 2 Cloud Security Attacks -- 3 Proposed Framework -- 3.1 Data Capturing -- 3.2 Filtering and Feature Extraction -- 3.3 Intrusion Detection Model Design -- 3.4 Knowledge Extraction Block -- 4 Performance Evaluation of Proposed Framework -- 4.1 Result Analysis -- 5 Conclusion -- References -- Benchmarking Semantic, Centroid, and Graph-Based Approaches for Multi-document Summarization -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology. , 3.1 Sort by Importance Score Algorithm -- 3.2 K-Means Clustering -- 3.3 Gaussian Mixture Method -- 3.4 Graph-Based Approach -- 4 Experimental Results and Analysis -- 5 Conclusion and Future Work -- References -- Water Availability Prediction in Chennai City Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Support Vector Regression -- 4 Experimental Results and Analysis -- 4.1 Analysis of Water Levels of Reservoirs -- 4.2 Analysis of Rainfall Levels of Reservoir Regions -- 4.3 Analysis of Chennai Population -- 4.4 Prediction of Water Availability per Person -- 5 Conclusion and Future Work -- References -- Field Extraction and Logo Recognition on Indian Bank Cheques Using Convolution Neural Networks -- 1 Introduction -- 2 Background -- 2.1 Object Detection -- 3 Proposed Methodology -- 3.1 Preprocessing -- 3.2 Localization -- 3.3 Bank Name and Logo Recognition -- 3.4 Experimental Setting -- 4 Dataset Description -- 4.1 Evaluation Metrics -- 5 Results and Discussions -- 6 Conclusions -- References -- A Genetic Algorithm Based Medical Image Watermarking for Improving Robustness and Fidelity in Wavelet Domain -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 3.1 Proposed Multiple Watermarks Embedding in Wavelet Domain -- 3.2 Proposed Chromosome-Based Encoding for Finding Optimal Embedding Location -- 3.3 Chromosome Selection -- 3.4 Crossover and Mutation -- 4 Watermark Extraction and Genetic Algorithm Process -- 5 Experimental Results and Discussions -- 6 Conclusion -- References -- Developing Dialog Manager in Chatbots via Hybrid Deep Learning Architectures -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Preparation -- 3.2 Word2Vec Embedding + 1DCNN + LSTM (W1CNNL) -- 3.3 Word2Vec + CNN Embedding + LSTM (WCNNL). , 3.4 Word2Vec + BiLSTM with Attention Embedding + LSTM (WBWAL).
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Keywords: Coding and Information Theory. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (612 pages)
    Edition: 1st ed.
    ISBN: 9783030690663
    Series Statement: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series ; v.356
    DDC: 621.382
    Language: English
    Note: Intro -- Preface -- Conference Organization -- Contents -- Deep Learning/Machine Learning on Information and Signal Processing -- Cell Detection and Counting Method Based on Connected Domain of Binary Image -- Abstract -- 1 Introduction -- 2 Cell Image Preprocessing -- 2.1 Gray -- 2.2 USM Sharpening Processing -- 3 Cell Segmentation -- 3.1 Binarization -- 3.2 Morphological Treatment -- 4 Cell Counting -- 5 Experimental Results and Analysis -- 6 Conclusions -- References -- 2D DOA Estimation Based on Modified Compressed Sensing Algorithm -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 2D Multitasking CS Algorithm Based on SVD -- 3.1 2D Off-Grid Algorithm Based on Taylor Expansion -- 3.2 OMP Reconstruction Method Based on SVD -- 3.3 Multi-task Processing -- 4 Performance Study -- 5 Concluding Remarks -- References -- Perceptual Quality Enhancement with Multi-scale Deep Learning for Video Transmission: A QoE Perspective -- 1 Introduction -- 2 Related Work -- 3 Perceptual Quality Enhancement Model -- 3.1 Network Architecture -- 3.2 Perceptual Quality Optimization -- 3.3 Multi-scale Deep Learning Model -- 4 Experiments -- 4.1 Settings -- 4.2 Performance of the Proposed Approach -- 4.3 Ablation Study -- 5 Conclusions -- References -- Indoor Map Construction Method Based on Geomagnetic Signals and Smartphones -- Abstract -- 1 Introduction -- 2 Related Work -- 3 IMC-GSS Algorithm -- 3.1 Pedestrian Track Atomization -- 3.2 Hierarchical Clustering -- 3.3 Multi-track Fusion -- 3.4 Map Construction Based on Graphic Extension Algorithm -- 4 Simulation and Results Analysis -- 4.1 Experimental Setup -- 4.2 Evaluation of Performance -- 5 Conclusion -- References -- An Improved Generation Method of Adversarial Example to Deceive NLP Deep Learning Classifiers -- Abstract -- 1 Introduction. , 2 Performance and Problem Analysis of DeepWordBug Adversarial Example Generation Algorithm -- 2.1 Introduction of DeepWordBug -- 2.2 Performance of DeepWordBug -- 2.3 Problem Analysis -- 3 Improvement Strategy -- 3.1 Improvement of DeepWordBug -- 3.2 Further Improvement -- 4 Conclusion -- Acknowledgements -- References -- Encryption Analysis of Different Measurement Matrices Based on Compressed Sensing -- Abstract -- 1 Introduction -- 2 Theoretical Basis -- 2.1 Compressed Sensing Model -- 2.2 Chaotic Mapping -- 2.3 Measurement Matrix -- 3 Encryption Scheme -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- Indoor Visual Positioning Based on Image Retrieval in Dense Connected Convolutional Network -- Abstract -- 1 Introduction -- 2 System Description -- 2.1 Resnet Structure -- 2.2 DenseNet Network Structure -- 3 Experimental Results -- 3.1 Dataset Preparation -- 3.2 Feature Extraction -- 3.3 Performance Analysis -- 4 Conclusion -- References -- Coin Recognition Based on Physical Detection and Template Matching -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 Equipment Selection in the Imaging System -- 2.2 Coin Classification System (Image Processing System) -- 2.3 Template Matching -- 3 Results -- 4 Conclusion -- Acknowledgement -- References -- Generative Adversarial Network for Generating Time-Frequency Images -- Abstract -- 1 Introduction -- 2 Time-Frequency Analysis Generates Time-Frequency Images -- 3 Generative Adversarial Network Secondary Generation Time-Frequency Image -- 4 Validity Test Using Singular Values -- 5 Experiment and Analysis -- 6 Conclusion -- Acknowledgment -- References -- Research on Weak Signal Detection Method Based on Duffing Oscillator in Narrowband Noise -- Abstract -- 1 Introduction -- 2 Related Research Work -- 3 Duffing Oscillator Weak Signal Detection Theory. , 3.1 Basic Theory of Duffing Oscillator -- 3.2 Using Duffing Oscillator to Detect Communication Signals -- 4 Weak Signal Frequency Detection Method Under Narrowband Noise -- 5 Conclusion -- References -- AI in Ubiquitous Mobile Wireless Communications -- Research on an Intelligent Routing Strategy for Industrial Internet of Things -- Abstract -- 1 Introduction -- 2 Research Background -- 3 Industrial IoT Model -- 3.1 Model Structure Analysis -- 3.2 Quality Analysis of Node Communication Link -- 4 Research on Intelligent Routing Strategy -- 4.1 Routing Metric EEM -- 4.2 Optimization Strategy -- 5 Experimental Simulation -- 5.1 Simulation Environment -- 6 Conclusion -- References -- Joint Equalization and Raptor Decoding for Underwater Acoustic Communication -- Abstract -- 1 Introduction -- 2 System Model -- 2.1 LDPC Encoding -- 2.2 LT Encoding -- 3 Joint Equalization and Raptor Decoding -- 4 Simulation Results and Discussion -- 5 Conclusions -- Acknowledgments -- References -- Design of Wireless Communication System for CNC Machine Tools -- Abstract -- 1 Introduction -- 2 Design of Wireless Control System Based on ZigBee Star Network -- 2.1 Brief Introduction of ZigBee -- 2.2 Design Scheme -- 3 Hardware System Design for CNC Machine -- 3.1 System Design -- 3.2 Hardware Selection -- 3.3 Uboot Startup Program -- 3.4 Operating System -- 3.5 Linux Kernel Tailoring and System Porting -- 3.6 Wireless Network Card Driver Transplantation and Configuration -- 3.7 Writing Application Software -- References -- Energy Efficiency Optimization for Subcarrier Allocation-Based SWIPT in OFDM Communications -- 1 Introduction -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Optimal Solution -- 3.1 Optimizing p with Fixed G -- 3.2 Obtaining the Optimal G -- 4 Simulations Result -- 5 Conclusions -- References. , Comparative Analysis of Communication Links Between Earth-Moon and Earth-Mars -- Abstract -- 1 Introduction -- 2 Similarities and Differences in the Communication Environment Between Earth-Moon and Earth-Mars -- 3 Analysis and Simulation of Mars Channel Fading Characteristics -- 3.1 Atmospheric Loss in the Mars Channel -- 3.2 Sandstorm Loss in the Mars Channel -- 4 The Characteristics of Radio Wave Transmission on the Surface of Moon and Mars -- 5 Conclusion -- References -- Compact Miniature MIMO Array Antenna Towards Millimeter Wave -- Abstract -- 1 Introduction -- 2 77 GHz Microstrip Feed Patch MIMO Antenna -- 2.1 The Structure of MIMO Antenna -- 2.2 Design of MIMO Antenna -- 3 77 GHz Series-Fed MIMO Antenna for Chebyshev Distribution -- 3.1 The Structure of MIMO Antenna -- 3.2 Design of MIMO Antenna -- 4 Conclusion -- Acknowledgement -- References -- Adaptive Technologies of Hybrid Carrier Based on WFRFT Facing Coverage and Spectral Efficiency Balance -- Abstract -- 1 Introduction -- 2 HC System Based on WFRFT -- 2.1 HC Communication System -- 2.2 The Structure Diagrams of Transmitter and Receiver -- 3 The Relationships Between Coverage and Spectral Efficiency in the Flat Fading Channel -- 3.1 PAPR and MATP -- 3.2 The Relationships Between Coverage and Spectral Efficiency -- 4 Switching Strategy of Carrier Schemes and MCSs Under Power Control in the Frequency-Selective Fading Channel -- 4.1 Power Control -- 4.2 BLER Performances of Different Carrier Schemes and MCSs -- 4.3 Switching Strategy of Carrier Schemes and MCSs Under Power Control -- 5 Conclusion -- Acknowledgement -- References -- Towards Knowledge-Driven Mobility Support -- 1 Introduction -- 2 Background -- 2.1 IP and NDN Architecture -- 2.2 The Mobility Support Problem and Solution Space -- 3 Cross-architectural Host Dimension Approaches -- 3.1 Proxy-Based Approach (Proxy). , 3.2 Resolution-Based Approach (Resolution) -- 3.3 Routing-Based Approach (Routing) -- 3.4 Trace-Based Approach (Trace) -- 4 The Knowledge Dimension of Mobility Support -- 4.1 Topology-Driven Intermediate Placement (TIP) -- 4.2 Trajectory-Driven Reachability Update (TRU) -- 4.3 Architectural Requirements of Supporting the Knowledge Dimension -- 5 A Quantitative Cross-architectural Mobility Support Performance Evaluation Framework -- 5.1 Basic Models -- 5.2 Metric Definition and Calculation -- 5.3 Compound Scenario - Upload -- 6 Evaluation -- 6.1 Network Topology Settings -- 6.2 Movement Pattern Settings -- 6.3 Results -- 6.4 The Effectiveness of KD Approaches -- 7 Related Work -- 8 Concluding Remarks -- References -- An Efficient Energy Efficiency Power Allocation Algorithm for Space-Terrestrial Satellite NOMA Networks -- 1 Introduction -- 2 System Model and Problem Formulation Scheme -- 2.1 System Model -- 2.2 Problem Formulation Scheme -- 3 Stacklberg Game Formulation and Energy Efficiency Optimization -- 3.1 Stacklberg Game -- 3.2 Problem Optimization -- 4 Simulation Results and Analysis -- 5 Conclusion -- References -- Research and Equilibrium Optimization of AODV Routing Protocol in Ad Hoc Network -- Abstract -- 1 Introduction -- 2 AODV Protocol and Working Principle -- 2.1 The Advantages and Inadequate of AODV Protocol -- 2.2 The Working Process of AODV Protocol -- 3 Optimization of AODV Routing Protocol -- 3.1 Optimization of Routing Discovery Process -- 3.2 Optimization of Route Maintenance -- 4 Simulation Analysis -- 5 Conclusions -- References -- AI in UAV-Assisted Wireless Communications -- Optimization of OLSR Protocol in UAV Network -- Abstract -- 1 Introduction -- 2 MPRs Selection Algorithm -- 3 Optimization of HELLO Message and TC Packet Transmission -- 3.1 Optimization of HELLO Message Sending Interval. , 3.2 Adaptive Optimization of TC Grouping.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Keywords: Computer science-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (774 pages)
    Edition: 1st ed.
    ISBN: 9789811619410
    Series Statement: Lecture Notes in Networks and Systems Series ; v.215
    DDC: 004
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Implementation of Healthcare System Using Android Application Storing Health Records in Cloud -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Healthcare Using IoT -- 1.3 Security in Healthcare System -- 2 Existing System -- 2.1 Disadvantages -- 3 Proposed System -- 3.1 Advantages -- 4 Doctor Application -- 4.1 Doctor Registration Page -- 4.2 Second Page -- 4.3 Patient Application -- 5 Conclusion -- References -- Threshold and Segmentation-Based X-ray Imaging Analysis for Covid-19 Detection -- 1 Introduction -- 2 Image Enhancement -- 3 Segmentation of Lungs from X-ray -- 4 Conclusion -- References -- Feature-Based Squids Classification Using Fuzzy Logic -- 1 Introduction -- 2 Image Acquisition -- 3 Fuzzy Rule-Based System -- 4 Result Analysis -- 5 Conclusion -- References -- In Silico Platforms for Systems Toxicology -- 1 Introduction -- 2 Mechanisms of Toxicity -- 3 Systems or Predictive Toxicology -- 3.1 The Phenomenon of Systems/Predictive Toxicology -- 3.2 Molecular-Level Assessment of Adverse Effects -- 4 Computational Platforms for Systems Toxicology -- 4.1 CADD -- 4.2 CRDD -- 4.3 Current Computational Toxicological Works -- 5 Limitations -- 6 Conclusion -- References -- Comparative Analysis on Factors Affecting Accuracy of Seizure Detection Using EEG Signal Processing -- 1 Introduction -- 2 Review of EEG Datasets Available -- 2.1 CHB-MIT Dataset [1] -- 2.2 Dataset of Bonn University, Germany [2, 3] -- 2.3 Freiburg Hospital -- 2.4 Temple University Dataset -- 2.5 Karunya University [5] -- 2.6 EPILEPSIAE -- 3 Seizure Detection Features: Various Domains -- 3.1 Features in Time Domain -- 3.2 Features in Frequency Domain: Comparison -- 3.3 Time-Frequency Features -- 3.4 Statistical Features -- 4 Classification Techniques -- 5 Conclusion -- References. , Identification of Coronavirus (COVID-19) Long Non-coding RNAs (lncRNAs) Using Machine and Deep Learning Approaches -- 1 Introduction -- 2 About Long Non-coding RNA -- 2.1 COVID-19-Associated lncRNAs Analysis -- 3 The Analysis of lncRNA-Associated Diseases Using Machine and Deep Learning Approaches -- 4 The COVID-19-Associated lncRNAs Identification Using Machine and Deep Learning Approaches -- 5 Conclusion -- References -- Predictive Analysis of Damage Occurred Due to Natural Disasters Using Whale-Optimization Algorithm-Based Hybrid Computation -- 1 Introduction -- 2 Materials and Methods -- 2.1 Whale Optimization Algorithm (WOA) -- 2.2 Selection of Mathematical Model for Searching Path -- 2.3 Dataset -- 3 Modified Whale Optimization Algorithm (MWOA) -- 4 Proposed Hybrid Prediction Model (MWOA-MLP) -- 5 Results and Analysis -- 6 Conclusion -- References -- Remote Access for Advanced Mobile Communication Systems -- 1 Introduction -- 1.1 General -- 1.2 Objective and Scope of Work -- 2 Global Systems for Mobile Communications -- 2.1 GSM Network Architecture -- 2.2 Basics of Network Performance and Optimization -- 3 Operation Support Subsystem -- 3.1 Network Management System -- 3.2 Network Management Architecture -- 3.3 Network Planning -- 3.4 RBS Operation and Maintenance -- 3.5 OMCR Functions -- 4 Radio Base Station Hardware Unit -- 4.1 RBS Functions -- 4.2 RBS Implementation -- 5 Remote Access Tool -- 5.1 General -- 5.2 Designers -- 5.3 Microsoft Visual C# -- 5.4 Installation -- 6 Conclusion -- References -- A Statistical Study on Coronary Artery Disease Using Discriminant Analysis -- 1 Introduction to Heart Disease -- 2 Overview -- 3 Methodology -- 3.1 Data Collection -- 3.2 About the Software -- 3.3 Uses and Advantages -- 4 Empirical Work -- 5 Conclusion -- References. , A Study to Assess the Knowledge and Opinion of Mid-Level Health Providers of Chittoor District Regarding m-Health -- 1 Introduction -- 2 Need for the Study -- 3 Objectives: To Assess -- 4 Review of Literature -- 5 Study Methodology -- 6 Data Analysis -- 7 Discussion and Conclusion -- References -- Machine Learning Techniques for Identifying Diabetes and Its Complications Based on Long Non-coding RNAs -- 1 Introduction -- 2 Diabetes Mellitus -- 2.1 Types of Diabetes -- 3 lncRNA -- 3.1 lncRNAs Classifications and Functions -- 3.2 lncRNAs in Diabetes Complications -- 3.3 Future of lncRNAs in Diabetic Complications -- 4 Machine Learning -- 4.1 Machine Learning Categories -- 4.2 Literature Review -- 4.3 LncRNA Identification Tools by Machine Learning Algorithms -- 5 Conclusions -- References -- Computational Method on Breast Cancer Survival Data Using Binary Classification Models -- 1 Introduction -- 2 Data Collection -- 3 About Software -- 4 Statistical Tools Used Under Study -- 4.1 Logistic Regression -- 4.2 Logistic Regression in SPSS -- 4.3 Decision Tree Analysis Method -- 4.4 Decision Tree in SPSS -- 5 Experimental Results -- 5.1 Logistic Regression -- 5.2 Decision Tree Output -- 6 Conclusion -- References -- Percentage Nucleotide Concentration and Classification of SARS-Corona Viruses -- 1 Introduction -- 2 Data Used for Analysis -- 2.1 Severe Acute Respiratory Syndrome Corona Virus 2 2019-nCoVPHnCOV20026 N Gene for Nucleocapsid Phosphoprotein, Partial Cds -- 2.2 Wuhan Seafood Market Pneumonia Virus Genome Assembly, Chromosome: WholeGenome -- 3 Percentage Nucleotide Concentration -- 3.1 Some Important Observations from pA, pT, pG and pC -- 4 Changes in Percentage Nucleotide Concentration -- 5 Conclusions -- References -- The Role of Law and Regulation on the Intersection of Bioprospecting and Bio Piracy -- 1 Introduction. , 2 Colonial Origins of Bio Piracy -- 3 Indigenous Methods and Bioprospecting -- 4 Regulation of Bioprospecting -- 5 Global and National Efforts to Combat Bio Piracy -- 6 Conclusion -- References -- Robust Face Recognition Using Multi-scale Feature Pattern Sparse Representation with Extreme Learning Machine -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Multi-scale Feature Pattern-Based ELM -- 4 Experimental Results and Analysis -- 4.1 Data Set Description -- 4.2 Result Analysis -- 5 Conclusions -- References -- A Review of Diabetic Retinopathy Screening Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Research Challenges -- 2.2 Performance Evaluation Metrics -- 3 Generalized System Architecture -- 3.1 Image Acquisition -- 3.2 Preprocessing -- 3.3 Segmentation -- 3.4 Feature Extraction -- 3.5 Feature Selection -- 3.6 Classification -- 4 Conclusion -- References -- A Novel Framework for Modeling Medical-Sensitive Big Data Using Document-Based Database -- 1 Introduction -- 2 Literature Review -- 3 Modeling Medical-Sensitive Big Data -- 4 Conclusion -- References -- Studies on Effect of Leaf Roller (Diaphania pulverulentalis) Infestation on the Mineral Composition of Mulberry (Morus Sp.) Varieties -- 1 Introduction -- 2 Materials and Methodology -- 2.1 Estimation of Nitrogen in Mulberry Leaves -- 2.2 Estimation of Phosphorous in Mulberry Leaves -- 2.3 Estimation of Potassium in Mulberry Leaves -- 3 Results and Discussion -- 3.1 Macronutrients -- 3.2 Micronutrients -- 4 Conclusion -- References -- Performance Comparison of Semantic Web Data Using Virtual and Cloud Services -- 1 Introduction -- 2 Overview of Map-Reduce -- 3 Literature Survey -- 3.1 Node Management -- 4 Experimental Work -- 4.1 Virtual Node Management -- 4.2 Cloud Node Management -- 5 Conclusion -- References. , Analysis of Bio Vanillin Production from Waste Material by HPTLC -- 1 Introduction -- 2 Materials and Methods -- 2.1 Collection and Milling of Raw Materials -- 2.2 Extraction of Ferulic Acid from Wheat Bran [5] -- 2.3 Ferulic Acid Was Extracted from Wheat Bran by Solvent Method -- 2.4 Bioconversion of Ferulic Acid to Vanillin [6] -- 2.5 Separation of Vanillin from Fermentation Medium -- 2.6 High-Performance Thin Layer Chromatography Analysis [7] -- 3 Results -- 3.1 Collection of Raw Materials -- 3.2 Extraction of Ferulic Acid from Wheat Bran -- 3.3 Ferulic Acid Was Extracted from Wheat Bran by Solvent Method -- 3.4 Bioconversion of Ferulic Acid into Vanillin -- 3.5 Biotransformation of Ferulic Acid by Positive Strain -- 3.6 High-Performance Thin Layer Chromatography Analysis -- 3.7 System Suitability -- 3.8 Linearity -- 3.9 Detection and Limit of Quantification -- 3.10 Accuracy and Precision -- 3.11 Roughness and Toughness -- 4 Results and Discussion -- 5 Conclusion -- References -- Phytochemical Studies and In Vitro Biological Activity of Citrus and Pomegranate Peel Extracts -- 1 Introduction -- 2 Materials and Methods -- 2.1 Collection of Orange Peels and Pomegranate Peels -- 2.2 Preparation of Extracts -- 2.3 Phytochemical Screening -- 2.4 Fourier Transform Infrared Spectrometer (FT-IR) -- 2.5 Antioxidant Activity -- 2.6 Anti-inflammatory Activity -- 3 Results -- 3.1 Phytochemical Studies -- 3.2 FTIR Analysis -- 3.3 Anti-inflammatory Activity -- 4 Discussion -- 5 Conclusion -- References -- Present and Future Prospectives of Microbial Fibrinolytic Enzyme Production and Its Applications -- 1 Introduction -- 2 Types of Cardiovascular Diseases -- 2.1 Mechanism of Fibrinolytic Enzyme -- 2.2 Applications of Fibrinolytic Enzyme -- 2.3 Fibrinolytic Agents -- 2.4 Demerits of Anticoagulants -- 3 Origin of Fibrinolytic Enzymes. , 3.1 Recent Status in Fibrinolytic-Producing Microorganisms.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Computer networks-Congresses. ; Wireless communication systems-Congresses. ; Computational intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (752 pages)
    Edition: 1st ed.
    ISBN: 9789811640162
    Series Statement: Lecture Notes in Networks and Systems Series ; v.286
    DDC: 004.6
    Language: English
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Influencing User Intention of Plant-Based Sensing System Adoption in Public Vocational High Schools of Indonesia Using TAM -- 1 Introduction -- 2 Literature Review -- 2.1 The Plant-Based Sensing System Proposed -- 2.2 The Theory of Technology Acceptance Model -- 3 Methodology -- 4 Research Model and Hypothesis -- 4.1 External Variable of Model -- 4.2 Perceived Ease of Use, Perceived Usefulness, Attitude, and Behavioral Intention -- 5 Results -- 5.1 Reliability Analysis -- 5.2 Regression Analysis -- 6 Conclusion -- References -- An Empirical Study of Critical Success Factors for the Adoption of m-Government Services in Tanzania -- 1 Introduction -- 2 Literature Review and Hypothesis Development -- 2.1 m-Government Services in Tanzania -- 2.2 Mobile Services Acceptance Model (MSAM) -- 2.3 Hypotheses Development -- 3 Methodology -- 4 Findings -- 5 Discussion -- 6 Conclusion -- References -- Smart City Based on LoRaWAN: Coverage Study for Cusco Urban Area -- 1 Introduction -- 2 LoRaWAN Technology -- 3 Cusco Urban Area Coverage Simulation -- 4 Data Collection -- 5 Analysis of Experimental Measurements -- 5.1 Efficiency Analysis for SF12 -- 5.2 RSSI Analysis for SF12 -- 5.3 Efficiency and RSSI Analysis for SF7 -- 6 Conclusion -- References -- Digital Transformation in Education in Knowledge Society -- 1 Introduction -- 1.1 Basic Considerations -- 2 Materials and Methods -- 3 Results -- 4 Conclusion -- References -- Induction Motor Overload Recognition Based on Sound Analysis -- 1 Introduction -- 2 Related Works -- 3 The Corpus -- 4 The Experiments -- 4.1 Frame-by-Frame Classification -- 4.2 One-Second Segment Classification -- 4.3 Half-a-Second Segment Classification -- 4.4 The Selected Classifier -- 5 Conclusions -- References. , Simulation of an All-Terrain Vehicle Driving Experience Using Virtual Reality -- 1 Introduction -- 2 Materials and Methods -- 2.1 Conception of the Virtual Experience -- 2.2 Learning Programming Tools -- 2.3 Virtual Environment Validation -- 2.4 Conception of the Immersive Environment -- 3 Results -- 4 Discussion -- 5 Conclusions and Recommendations -- References -- Safety-Centric and Smart Outdoor Workplace: A New Research Direction and Its Technical Challenges -- 1 Introduction -- 2 The Need of Dedicated Focus on Smart Outdoor Workplace -- 2.1 Smart Workplace -- 2.2 Smart Outdoor Workplace -- 2.3 Divergent Technology Streams -- 3 Technical Challenges -- 3.1 Diverse and Incompatible Sensors and Devices -- 3.2 Growing Gap Between Battery Technologies and Power Requirements -- 4 Research Prospects Driven by the Identified Challenges -- 4.1 Sandwich Approach to a Knowledge Architecture for Smart Outdoor Workplace -- 4.2 Model-Driven Simulation and Optimization of Energy Consumption in Smart Outdoor Workplace -- 5 Conclusions and Future Work -- References -- Devising Auxiliary Glyph Schemas Combined with XOR Filters for Improvised Font Delivery and Reliable Dynamic Font Augmentation -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology and Algorithm -- 3.1 Basic Font Subsetting Solution and Problems -- 3.2 Client Side: Proposed Data Structures -- 3.3 Font Subsetting and Augmentation Workflows Using Proposed Solution -- 3.4 Flow for an Application Session with the Proposed Solution -- 3.5 XOR Filter Processing for Subset or Font Portion Serving on Server Side -- 4 Conclusion -- References -- Multiple Sequence Alignment Algorithms in Bioinformatics -- 1 Introduction -- 2 Multiple Sequence Alignment (MSA) -- 3 Multiple Sequence Alignment Algorithms (MSA) -- 3.1 ClustalW -- 3.2 Clustal Omega -- 3.3 T-Coffee -- 3.4 MAFFT -- 3.5 Kalign. , 3.6 MUSCLE -- 3.7 Probcons -- 3.8 Genetic Algorithms -- 4 Evaluation of MSA -- 5 Conclusion -- References -- Design and Implementation of a Machine Learning-Based Technique to Detect Unipolar and Bipolar Depression Using Motor Activity Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Underwater Magnetic Release System -- 1 Overview -- 2 System Components -- 2.1 The Software -- 3 Power Considerations -- 4 Design Specifics -- 5 Conclusion -- References -- An Optimal Route for People with Ambulant Disabilities Using Mathematical Risk Modeling and Analytic Hierarchy Process -- 1 Introduction -- 2 Methods -- 2.1 Factors Affecting the Selection of Best Route -- 2.2 Mathematical Risk Modeling -- 2.3 AHP Technique -- 3 Results and Discussion -- 4 Conclusion -- References -- The Innovation in Manufacturing Areas of Electronics Industry of Mexicali Using PLC -- 1 Introduction -- 2 Technological Innovation -- 3 Technology Development -- 4 Improving Competitiveness -- 5 Software Quality in the Electronics Industry -- 6 Limitations of the Investigation -- 7 Methodology -- 8 Results -- 9 PLC Analysis -- 10 Correlation Analysis of Industrial Parameters -- 11 Conclusions -- References -- Assistive Autonomous Electric Vehicle for Disaster Management -- 1 Introduction -- 2 Mechanical System Design -- 2.1 Overview -- 2.2 Frame Design -- 2.3 Assembly for the Wheels -- 2.4 Sensors Stand -- 2.5 Body Housing -- 3 Electronics System Design -- 3.1 Brief Overview -- 3.2 Electronic Suite Description -- 4 Working of the Circuit -- 5 Software and Control System -- 5.1 Brief Overview -- 5.2 Main Software Pipeline -- 5.3 Lane Detection and Path Mapping -- 5.4 Object Discovery Pipeline -- 5.5 Arduino Communication -- 5.6 Motor Driving -- 6 Advantage and Applications -- 6.1 Advantages -- 6.2 Applications. , 7 Conclusion -- References -- On the Existing and New Potential Methods for Partial Discharge Source Monitoring in Electrical Power Grids -- 1 Introduction -- 2 Theoretical Aspects -- 2.1 Spectrogram -- 2.2 Wavelet Transform -- 2.3 Compressive Sensing -- 2.4 Phase-Diagram-Based Analysis -- 3 Experimental Configuration and Results -- 4 Conclusions -- References -- Efficient Approach for Block-Based Copy-Move Forgery Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Discussion and Conclusion -- References -- Smart IoT Sensor Network for Monitoring of Cultural Heritage Monuments -- 1 Introduction -- 2 Sensor Design -- 3 Visualization Platform -- 4 Conclusions -- References -- MorArch: A Software Architecture for Interoperability to Improve the Communication in the Edge Layer of a Smart IoT Ecosystem -- 1 Introduction -- 2 Present Context and Previous Works -- 2.1 Interoperability Architectures -- 2.2 Interoperability Protocols -- 3 Proposal -- 4 Experiments -- 4.1 File System -- 4.2 Data Flow Inside Our Fog Ecosystem -- 4.3 Results -- 5 Conclusions -- References -- A Design of an IoT-Based Smart Home with Auto-sanitization System -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Modeling -- 4 Working Procedure -- 4.1 Remote Access -- 4.2 Voice Command Access -- 5 Implementation of the Prototype -- 5.1 Software Implementation -- 5.2 Hardware Implementation -- 5.3 Visual Models of a Smart Home with Auto-sanitization -- 6 Future Developments, Scopes, and Social Impact -- 7 Results and Data Analysis -- 8 Conclusion -- References -- An Experiment Study on Federated Learning Testbed -- 1 A Novel PPML Framework: Federated Learning -- 2 Methodology and System Implementation -- 3 Results on Efficiency Test -- 3.1 Training Speed -- 3.2 Communication Cost -- 4 Privacy Analysis -- 5 Conclusion. , References -- Visual Quality Comparison of Ocean Wave Effects at Different Camera Distances -- 1 Introduction -- 2 Material and Method -- 2.1 Setting in Houdini -- 2.2 Setting in Unreal -- 2.3 Minor Conclusion -- 3 Result -- 4 Conclusion -- References -- Control System to International Parental Child Abduction, Case: Colombia -- 1 Introduction -- 2 Background -- 3 Design and Method for Colombia -- 4 Results -- 5 Analysis of the Results -- 6 Conclusions and Further Work -- References -- It is not Always Ethical: Data Manipulation to Justify Public Policy Choices in COVID-19 Response -- 1 Introduction -- 2 Background -- 3 Cases of COVID-19 Data Manipulation -- 4 Florida's COVID-19 Data Portal -- 5 Georgia's COVID-19 Data Portal -- 6 Arizona's COVID-19 Data Portal -- 7 Texas, Virginia, and Vermont's COVID-19 Data Portals -- 8 Implications of Data Manipulation -- 9 Conclusion -- References -- BPMN2EVENTB Supporting Transformation from BPMN2.0 to Event B Using Kermeta -- 1 Introduction -- 2 The Proposed Approach -- 3 Subset of Mapping Rules BPMN-Event B -- 4 Illustration -- 5 Conclusion and Future Work -- References -- Teaching Neuroscience Through Flipped Classroom: Systematizing an Experience with Students of the Professional Career of Elementary Education -- 1 Introduction -- 1.1 Contributions of Neuroscience to Education -- 1.2 Teaching Neuroscience Through Digital Resources -- 2 Methodology -- 2.1 Procedures -- 2.2 Participants -- 2.3 Measures -- 3 Results -- 3.1 Analysis of Means and Variation Coefficients -- 3.2 Exploratory Analysis with Boxplots -- 3.3 Analysis of Some Items -- 4 Discussion -- 5 Conclusions and Future Works -- References -- Low-Cost IoT Platform for Telemedicine Applications -- 1 Introduction -- 2 Related Works -- 3 Case of Study -- 4 Implementation of the Proposal -- 4.1 Wearable Device -- 4.2 Android TV App -- 4.3 Cloud Service. , 5 Discussion of Results.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (495 pages)
    Edition: 1st ed.
    ISBN: 9789811552243
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.182
    DDC: 004.6
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- 1 Accurate Detection of Facial Landmark Points Using Local Intensity Information for Emotion Detection -- 1.1 Introduction -- 1.2 Materials and Methods -- 1.2.1 Materials -- 1.2.2 Proposed Methodology -- 1.3 Performance Metrics -- 1.4 Results -- 1.4.1 Eye Centers -- 1.4.2 Eyebrows -- 1.4.3 Lip Corners -- 1.5 Discussion -- 1.6 Conclusion -- References -- 2 Statistical Approach to Detect Alzheimer's Disease and Autism Spectrum-Related Neurological Disorder Using Machine Learning -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Methodology -- 2.4 Result -- 2.5 Conclusion -- 2.6 Future Work -- References -- 3 The Development and Gap of Chinese and American Open Access Journals: From the Perspective of Network Influence -- 3.1 Introduction -- 3.2 Data and Method -- 3.2.1 Sample Selection Method -- 3.2.2 Data Acquisition Platform -- 3.2.3 Data Collection Method -- 3.3 Results and Discussion -- 3.4 Comparison of Network Influence Based on Principal Component Analysis -- 3.5 Conclusion -- 3.6 Limited -- Appendix -- References -- 4 The Use of Mobile Apps to Facilitate Customers' Choice-Making When Grocery Shopping -- 4.1 Introduction -- 4.2 Method -- 4.2.1 Participants -- 4.2.2 Apparatus and Setting -- 4.2.3 Attributes -- 4.2.4 Procedure -- 4.2.5 Analysis -- 4.3 Findings -- 4.4 Discussion -- 4.4.1 Practical Implications -- 4.4.2 Limitations and Future Research -- References -- 5 Implementation of Best Hybrid Adaptive and Intelligent MIMO Detector on Reconfigurable Architecture for 5G LTE/IoT Environment -- 5.1 Introduction -- 5.2 Proposed B-HAI MIMO Detector -- 5.3 System Model -- 5.4 Architecture of HAI Detector -- 5.5 Computational Complexity Reduction -- 5.6 Performance Evaluation -- 5.7 Conclusions -- References. , 6 Automated Detection of Retinal Hemorrhage Based on Supervised Classifiers and Implementation in Hardware -- 6.1 Introduction -- 6.2 Methodology -- 6.2.1 Feature Extraction from Splats -- 6.2.2 Preliminary Feature Selection and Classification -- 6.3 Results and Discussions -- 6.3.1 Classification of Splats Using kNN and ANN Classifiers -- 6.3.2 Implementation in Hardware -- 6.4 Conclusion -- References -- 7 Data Encryption as Security Measure in IoT-Enabled Healthcare -- 7.1 Introduction -- 7.2 IoT Data in Healthcare -- 7.3 IoT Data Encryption and Compression -- 7.3.1 Basic Philosophy -- 7.3.2 Basic Details DRT and IDRT -- 7.3.3 Inverse Discrete Rajan Transform -- 7.3.4 Sparsing of Data by Retaining CPI Alone -- 7.4 Summary -- References -- 8 Agents-Based Service Restoration in Electrical Secondary Distribution Network -- 8.1 Introduction -- 8.2 Study Approach -- 8.3 Current Status of the Tanzanian Secondary Distribution Network -- 8.4 Proposed Distributed Control Model for Service Restoration -- 8.4.1 Objective Functions -- 8.4.2 Recommendations for the Improvement of the SDN -- 8.4.3 Design for the Equipment Specifications to Be Installed to Support Service Restoration in the Pilot Site -- 8.5 Conclusion -- References -- 9 Packet-Level and Physical-Level Cross-Technology Communications: A Brief Introduction -- 9.1 Introduction -- 9.2 Packet-Level CTC -- 9.2.1 FreeBee -- 9.2.2 ZigFi -- 9.3 Physical-Level CTC -- 9.4 Conclusion -- References -- 10 Smart Traffic Navigation System (STNS) to Reduce Travel Time by Integrating Signals from Navigation and Traffic Systems -- 10.1 Introduction -- 10.2 Related Work -- 10.3 Design of the Proposed Model -- 10.4 Experimental Setup -- 10.5 Implementation -- 10.5.1 Vehicle -- 10.5.2 Traffic Signal -- 10.6 Experiments and Results -- 10.6.1 Test Cases -- 10.6.2 Test System Specifications -- 10.6.3 Results. , 10.7 Conclusion -- References -- 11 Selective Sensor Control via Cauchy Schwarz Divergence -- 11.1 Introduction -- 11.2 Background and Problem Statement -- 11.2.1 Sensor Control Framework -- 11.2.2 Labeled MB Filter -- 11.2.3 Notation -- 11.2.4 Labeled-MB RFS -- 11.2.5 Labeled-MB Filter -- 11.3 Selective Sensor Control via CS-Divergence -- 11.3.1 CS-Divergence -- 11.4 Numerical Results -- 11.5 Discussion and Conclusion -- References -- 12 Step-Factor Resampling Technique for Imbalanced Sequence Data Classification -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Methodology -- 12.3.1 Smoothing Technique -- 12.3.2 Resampling Technique -- 12.4 Experimental Results -- 12.4.1 Model Tuning with Smoothing Factor -- 12.4.2 Model Tuning with Resampling Technique -- 12.4.3 Performance Evaluation of Models -- 12.4.4 Best Performing Model -- 12.5 Conclusions -- References -- 13 Rice Disease Detection Based on Image Processing Technique -- 13.1 Introduction -- 13.2 Literature Review -- 13.3 Methodology -- 13.3.1 Working Diagram -- 13.3.2 Dataset Collection -- 13.3.3 Neural Network -- 13.3.4 Building Model -- 13.3.5 Compiling the Model -- 13.3.6 Training and Testing the Model -- 13.4 Result and Outcome -- 13.4.1 Learning Rate -- 13.4.2 Confusion Matrix -- 13.4.3 Classification -- 13.5 Conclusions -- References -- 14 Electromagnetic Radiation from Cell Phones Used in Dhaka City -- 14.1 Introduction -- 14.1.1 Motivation -- 14.1.2 Novelty and Contribution -- 14.2 Materials and Methods -- 14.2.1 Experimental Setup -- 14.3 Results -- 14.3.1 Epidemiological Data from Cell Phones -- 14.3.2 Radiated Power Measurement from Cell Phones -- 14.4 Discussions -- 14.5 Conclusion -- 14.5.1 Limitations -- References -- 15 Expressing Opinions Application: A Case Study at Rajamangala University of Technology, Isan, Khon Kaen Campus -- 15.1 Introduction -- 15.2 Tools and Theories. , 15.2.1 Flutter -- 15.2.2 Spring Framework -- 15.2.3 Java Script Object Notation (JSON) -- 15.2.4 SQL -- 15.3 Procedure -- 15.3.1 The Operation of the System -- 15.3.2 System Design and Development -- 15.4 Login Page -- 15.4.1 Adding Topics and Comments -- 15.4.2 Tools for System Development -- 15.5 Experimental Results -- 15.6 Conclusion -- References -- 16 Toward Clarifying Human Information Processing by Analyzing Big Data: Comparing Response Time to Questionnaires Included Heteronym Word for Problem Solving Between Visually and Auditory Types -- 16.1 Introduction -- 16.2 Problems -- 16.3 Design -- 16.4 Results -- 16.5 Discussion -- 16.6 Conclusion -- References -- 17 Mango Species Detection from Raw Leaves Using Image Processing System -- 17.1 Introduction -- 17.2 Literature Review -- 17.3 Proposed Methodology -- 17.3.1 Primary Steps for Mango Species Detection -- 17.3.2 Image Acquisition -- 17.3.3 Image Pre-processing and Classification -- 17.3.4 Architecture Model -- 17.4 Result -- 17.4.1 Statistical Analysis -- 17.4.2 Accuracy Graph -- 17.4.3 Confusion Matrix -- 17.4.4 Layer Visualization -- 17.4.5 Species Detection -- 17.5 Conclusion -- References -- 18 Frequency Reconfigurable Planner Antennas for Wireless Applications: A Review -- 18.1 Introduction -- 18.1.1 Reconfigurable Antennas -- 18.1.2 Multiple Frequency Reconfigurable Antennas -- 18.2 Ultra-Wide Band Reconfigurable Antennas -- 18.3 Conclusion -- References -- 19 Room Temperature Pt-Modified WO3/p-Si Film Gas Sensor for Detection of Methanol -- 19.1 Introduction -- 19.2 Preparation of Thin Film -- 19.3 Results and Discussions -- 19.4 Conclusions -- References -- 20 Graph Degree Linkage Clustering for Identify Student's Performance on Kompetisi Sains Madrasah in Indonesia -- 20.1 Introduction -- 20.2 Graph Degree Linkage -- 20.2.1 Algorithm Overview -- 20.2.2 Neighborhood Graph. , 20.2.3 Adjacency Measure -- 20.3 Clustering Evaluation: Silhouette -- 20.4 Result and Discussion -- 20.5 Conclusion -- References -- 21 Stepwise Iterative Maximum Likelihood Clustering Based on Kompetisi Sains Madrasah' Scores for Identifying Quality of Junior High School Grading Distribution -- 21.1 Introduction -- 21.2 Stepwise Iterative Maximum Likelihood (SIML) -- 21.3 Silhouette -- 21.4 Results and Discussion -- 21.5 Conclusion -- References -- 22 Detecting the Width of Pap Smear Cytoplasm Image Based on GLCM Feature -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Method -- 22.4 Results and Discussion -- 22.4.1 Result -- 22.4.2 Discussion -- 22.5 Conclusion -- References -- 23 Design of a Novel Wideband Dipole Antenna for mm-Wave Frequencies -- 23.1 Introduction -- 23.2 Antenna Geometry and Design Formulae -- 23.3 Result and Analysis -- 23.4 Conclusion -- References -- 24 Forecasting Sea Surface Temperature in Java Sea Using Generalized Regression Neural Networks -- 24.1 Introduction -- 24.2 Sea Surface Temperature -- 24.3 GRNN -- 24.4 Results and Discussion -- 24.5 Conclusion -- References -- 25 Natural Disaster Predictions of Whirlwinds in Cilacap Region of Central Java Using Adaptive Neighborhood Modified Backpropagation (ANMBP) -- 25.1 Introduction -- 25.2 Principal Component Analysis (PCA) -- 25.3 Adaptive Neighborhood Modified Backpropagation (ANMBP) -- 25.4 Results and Discussion -- 25.4.1 Preprocessing Data -- 25.4.2 Whirlwind Predictions Using ANMBP -- 25.5 Discussion -- 25.6 Conclusion -- References -- 26 Designing Memristor-Based Timing Circuits and Performance Comparison with CMOS Counterparts -- 26.1 Introduction -- 26.2 Memristive Device Modeling -- 26.3 Logic Gates -- 26.3.1 AND and NAND Gate -- 26.3.2 OR and NOR Gate -- 26.4 Multivibrators -- 26.5 Voltage-Controlled Oscillator (VCO) -- 26.6 Conclusions -- References. , 27 Identify Elementary Student Distribution Based on Kompetisi Sains Madrasah Data Using Probabilistic Distance Clustering.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Translocation (Genetics). ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (171 pages)
    Edition: 1st ed.
    ISBN: 9789811305931
    Series Statement: Advances in Experimental Medicine and Biology Series ; v.1044
    DDC: 572.877
    Language: English
    Note: Intro -- Contents -- 1: Historical and Clinical Perspectives on Chromosomal Translocations -- 1.1 Introduction and Background -- 1.2 Early Observations of Translocations -- 1.3 Clinical Relevance of Translocations -- 1.3.1 Balanced Translocation Carriers Have Higher Risks of Infertility, Miscarriage, and Unbalanced Progeny -- 1.3.2 Some Somatic Translocations Initiate Transformation of Cancer Cells -- 1.3.3 Balanced Reciprocal Translocations Are Etiologic for Many Clinical Phenotypes -- 1.3.4 Resolution of Translocation Breakpoints by Sequencing Provides New Information -- 1.3.5 Mapping the Regulatory Genome with Translocations -- 1.4 Summary -- References -- 2: Induction of Chromosomal Translocations with CRISPR-Cas9 and Other Nucleases: Understanding the Repair Mechanisms That Give Rise to Translocations -- 2.1 Introduction -- 2.2 Multiple DSB Repair Pathways: Repairing a Dangerous Lesion -- 2.3 Elucidation of Translocation Mechanisms in Mouse Cells Using a Rare-Cutting Endonuclease -- 2.4 When ZFNs Then TALENs Arrived on the Scene: Tailored Nucleases for Tailored Translocations -- 2.5 The CRISPR-Cas9 Revolution: When Easy Is Made Easier -- 2.6 Isolating Translocation Clones -- 2.7 Modeling Oncogenesis Using Programmable Nucleases: First Steps Towards Full Transformation In Vivo -- 2.8 Elucidation of Translocation Mechanisms in Human Cells Using Programmable Nucleases -- 2.9 How Model Systems Recapitulate Patient Breakpoints -- References -- 3: Dynamics of Double-Strand Breaks: Implications for the Formation of Chromosome Translocations -- 3.1 Introduction -- 3.2 Chromatin Motion -- 3.3 Double-Strand Break Dynamics: Lessons from Yeast and Mammalian Cells -- 3.4 The Role of Cytoskeletal Components in Motion of Intact Chromosome Loci and DSBs: Random or Directed Motion?. , 3.5 Partner Search, Clustering and Synapsis of DSBs in the Nucleus -- 3.6 Dynamics of DSBs and Translocation Formation -- 3.7 Conclusions -- References -- 4: The CRISPR/Cas9 System as a Tool to Engineer Chromosomal Translocation In Vivo -- 4.1 Introduction of CRISPR/Cas9 System -- 4.2 Applications of Nucleases to Engineer Chromosomal Rearrangements -- 4.3 Model Genomic Rearrangements Engineered with the CRISPR/Cas9 System In Vitro -- 4.3.1 Chromosomal Translocations -- 4.3.2 Genomic Deletions and Insertions -- 4.3.3 Genomic Inversions -- 4.4 Model Chromosomal Rearrangements Engineered by the CRISPR/Cas9 System In Vivo -- 4.4.1 Mouse Models of Cancer and Genetic Diseases -- 4.4.2 Mouse Models by Embryonic Stem (ES) Cells Engineering -- 4.5 Conclusions -- References -- 5: Generation of Genomic Alteration from Cytidine Deamination -- 5.1 AID/APOBEC Deaminase Family -- 5.1.1 RNA or DNA Deamination Model -- 5.1.2 Cytidine Deaminase Domain and Structure -- 5.1.3 DNA Sequence Motif Preference and Deamination Signature -- 5.2 Programmed DNA Lesion in Immunity -- 5.2.1 Secondary Immune Cell Receptor Diversification Initiated by AID -- 5.2.2 Innate Anti-viral Activity of APOBEC3s -- 5.3 Collateral Effects of Cytidine Deamination -- 5.3.1 Discovery of AID-dependent Translocations and Mutations -- 5.3.2 Systematic Identification of AID Off-targets -- 5.3.3 Pervasive APOBEC3 Signature in Cancer Genomes -- 5.4 Multilayer Regulation of AID Deamination -- 5.4.1 Regulation of AID Expression -- 5.4.2 Intracellular Localization of AID Protein -- 5.4.3 Post-translation Modification of AID Protein -- 5.4.4 Specific Genomic Targeting of AID -- 5.4.5 AID Cofactors and Activity Regulation -- 5.5 Future -- References -- 6: The Role for the DSB Response Pathway in Regulating Chromosome Translocations. , 6.1 The DNA Damage Response (DDR) at Sites of Double-­Strand Breaks (DSBs) -- 6.1.1 Overview: ATM Orchestrates the DDR in Mammalian Cells -- 6.1.2 General Mechanisms of Translocation Suppression by the DDR -- 6.2 Mammalian Genetic Models to Study Roles for the DDR in Translocation Suppression -- 6.2.1 Genetically Engineered Mouse Models (GEMM) of DDR Deficiency -- 6.2.2 Human Genetic Syndromes of DDR Deficiency: Ataxia-Telangiectasia -- 6.3 The DDR Suppresses Chromosomal Translocations During V(D)J Recombination -- 6.3.1 Mechanisms of V(D)J Recombination -- 6.3.2 RAG-Dependent Breaks and Translocations in DDR-­Deficient Mice -- 6.3.3 RAG-Dependent Break and Translocations in Ataxia-­Telangiectasia Patients -- 6.4 The DDR Suppresses Chromosomal Translocations During Class Switch Recombination -- 6.4.1 Mechanisms of Class Switch Recombination -- 6.4.2 AID-Dependent Breaks and Translocations in DDR-­Deficient Mice -- 6.4.3 AID-Dependent Breaks and Translocations in A-T Patients -- References -- 7: Telomeres and Chromosomal Translocations -- 7.1 Introduction -- 7.2 DNA Damage -- 7.3 DNA Repair -- 7.3.1 DNA Repair Involving Only a Single Strand -- 7.3.2 DNA Double-Strand Break Repair -- 7.3.2.1 C-NHEJ -- 7.3.2.2 A-NHEJ -- 7.3.2.3 HDR -- 7.4 Translocations -- 7.4.1 DSBs and Translocations -- 7.4.1.1 Of Men, Mice and Translocations -- 7.4.1.2 Spatial Karma and Translocations -- 7.4.1.3 Selection, Not the Translocation, Drives Cancer -- 7.4.2 Considerations for When One DSB is a Telomeric End -- 7.4.2.1 Telomeres Stabilize the Genome -- 7.4.2.2 Translocations Involving Telomeres are Mechanistically Distinct -- 7.4.2.3 Translocations Involving Human Telomeres can be Mediated by LIGIII or LIGIV -- 7.4.2.4 Translocations Involving Human Telomeres can be Mediated by LIGI -- 7.5 Summary and Future Considerations -- References. , 8: 3D Genome Organization Influences the Chromosome Translocation Pattern -- 8.1 Introduction -- 8.2 The Impact of Spatial Proximity on Partner Selection in DNA Break Repair -- 8.2.1 Evidence from Imaging Methods -- 8.2.2 Implications of DNA DSB Movement -- 8.3 Conceptual Contributions from Chromosome Conformation Capture -- 8.3.1 Characterizing Pre-existing 3D Genome Structure Before Translocations to Link Translocation Frequency to 3D Structure -- 8.3.2 3C-Based Methods for Agnostic Translocation Identification -- 8.3.3 Interpreting the Biological/Medical Impact of Translocations -- 8.4 Importance of Heterogeneity in Interpreting the Influence of 3D Genome Organization -- 8.5 Widespread DSBs Exacerbate 3D Genome Proximity Effects on Translocations: Implications for Radiation-­Induced Translocations -- 8.6 3D Genome Contributions to DSB Incidence and Control of DNA Repair -- 8.7 Key Persistent Questions -- 8.7.1 How Can We Reconcile 3D DSB Movement with 3D Genome Stability and Influence on Translocations? -- 8.7.2 How Much Do DSBs and Translocations Affect Existing 3D Genome Structure? -- 8.7.3 Do Pre-cancerous 3D Genome Organization Changes Affect Which Translocations Occur and Thus Affect Cancer Phenotype or Outcome? -- 8.8 Conclusion -- References -- 9: The Role of Chromosome Deletions in Human Cancers -- 9.1 Introduction -- 9.2 Chromosome Deletions Are Frequent in Human Cancers and Associated with Poor Prognosis -- 9.2.1 The Boveri's Hypothesis on the Origin of Cancer -- 9.2.2 Chromosome Deletions Are a Hallmark of Human Cancers -- 9.2.3 Chromosome Deletions Are Associated with Poor Prognosis in Some Cancers -- 9.3 Identifying Tumor Suppressors in Chromosome Deletions -- 9.3.1 Knudson Theory -- 9.3.2 Haploinsufficient Tumor Suppressors -- 9.4 The Role of Chromosome Deletions as a Whole in Carcinogenesis. , 9.4.1 Modeling Chromosome Deletions with Genetic Engineered Mouse Models -- 9.4.2 Modeling Chromosome Deletions in Human Cell Models -- 9.4.3 The Collaborative Effect of Multiple Tumor Suppressors in Chromosome Deletions -- 9.5 Perspective -- References -- 10: Processing-Challenges Generated by Clusters of DNA Double-Strand Breaks Underpin Increased Effectiveness of High-LET Radiation and Chromothripsis -- 10.1 Introduction -- 10.2 Forms of DSBs and DSB Clusters -- 10.3 Physiological Processes That Require the Generation of DSB Clusters -- 10.4 DSB Cluster Formation and Carcinogenesis: The Phenomenon of Chromothripsis -- 10.5 DSB Processing Pathways -- 10.6 DSB Repair Pathway Choice in Cells Exposed to High LET IR -- 10.7 A Model of Defined DSB-­Clusters at Fixed Genomic Locations -- 10.8 Summary and Conclusions -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    San Diego :Elsevier Science & Technology,
    Keywords: Fractional calculus. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (352 pages)
    Edition: 1st ed.
    ISBN: 9780323886161
    DDC: 511.352
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...