GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • Singapore :Springer,  (7)
  • New Delhi :Springer (India) Private Limited,  (5)
  • 1
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (255 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811977428
    Serie: Smart Innovation, Systems and Technologies Series ; v.330
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- AIVR 2022 Organization -- Preface -- Contents -- About the Editors -- Part I Invited Paper -- 1 Paraconsistency and Paracompleteness in AI: Review Paper -- 1.1 Introduction -- 1.1.1 Classical and Non-classical Logic -- 1.2 Paraconsistent and Paracomplete Logic -- 1.3 AI and Formal Systems -- 1.4 Paraconsistent Annotated Evidential Logic Eτ -- 1.5 Application in Robotics -- 1.5.1 Description of the Prototype -- 1.5.2 Development of the Paraconsistent Annotated Logic Algorithm -- 1.6 Multi-criteria Decision Analysis (MCDA) in Health Care -- 1.7 Conclusions -- References -- Part II Regular Papers -- 2 Decision Support Multi-agent Modeling and Simulation of Aeronautic Marine Oil Spill Response -- 2.1 Introduction -- 2.2 Modeling and Simulation -- 2.2.1 Marine Oil Spill Response Process -- 2.2.2 DEVS and Multi-agent Modeling -- 2.3 Response Plan Evaluation -- 2.3.1 Response Plan Agent -- 2.3.2 Evaluation Indicators System -- 2.4 Instance Analysis -- 2.4.1 Simulation Scenario -- 2.4.2 Simulation-Based Evaluation for Decision Support -- 2.5 Conclusion -- References -- 3 Transferring Dense Object Detection Models To Event-Based Data -- 3.1 Introduction -- 3.1.1 Contributions and Outline -- 3.2 Dataset and Frame Representation -- 3.2.1 KITTI Vision Dataset -- 3.2.2 Optical Event Data and Histograms -- 3.3 Implementation -- 3.3.1 Sparseconvnet Extensions -- 3.3.2 Asynet Extensions -- 3.3.3 Dataloader -- 3.4 Error Analysis -- 3.4.1 Sparse YOLO Versus Dense YOLO -- 3.4.2 Sparse Versus Dense Convolutions -- 3.4.3 Event-Window Size -- 3.5 Runtime Analysis -- 3.5.1 Dense Versus Sparse -- 3.5.2 Batch Size -- 3.5.3 Synchronous Versus Asynchronous -- 3.5.4 Asynchronous Sequence Count -- 3.5.5 Theoretical Runtime -- 3.6 Conclusion -- References. , 4 Diagnosing Parkinson's Disease Based on Voice Recordings: Comparative Study Using Machine Learning Techniques -- 4.1 Introduction -- 4.2 Related Research Work -- 4.2.1 Logistic Regression -- 4.2.2 Random Forest -- 4.2.3 SVM -- 4.2.4 KNN -- 4.2.5 Gradient-boosted Decision Trees -- 4.3 Dataset -- 4.4 Methodology -- 4.5 Results -- 4.6 Conclusion -- References -- 5 Elements of Continuous Reassessment and Uncertainty Self-awareness: A Narrow Implementation for Face and Facial Expression Recognition -- 5.1 Introduction -- 5.2 Proposed Solution -- 5.3 Data Set -- 5.4 Experiments -- 5.4.1 Trusted Accuracy Metrics -- 5.5 Results -- 5.6 Discussion, Conclusions, and Future Work -- References -- 6 Topic-Aware Networks for Answer Selection -- 6.1 Introduction -- 6.2 Related Works -- 6.2.1 Topic Embedding Generation -- 6.2.2 Answer Selection -- 6.3 Methodology -- 6.3.1 Topic Embedding -- 6.3.2 Topic-Aware Networks -- 6.3.3 Triplet Loss -- 6.4 Experiments -- 6.4.1 Dataset -- 6.4.2 Experiment Settings -- 6.4.3 Results and Discussion -- 6.5 Conclusion and Future Work -- References -- 7 Design and Implementation of Multi-scene Immersive Ancient Style Interaction System Based on Unreal Engine Platform -- 7.1 Introduction -- 7.2 Technical Basis -- 7.2.1 Lighting Model -- 7.2.2 From Physical Phenomena to BRDF -- 7.2.3 Physical-based Environment Lighting -- 7.3 Conceive Preparation -- 7.3.1 Research on the Current Situation of UE4 Used for Developing This Work -- 7.3.2 Storyboard -- 7.3.3 Design Process -- 7.4 The Main Scene Building Part -- 7.4.1 The Idea of Building a Scene of the Tang Dynasty -- 7.4.2 Collider -- 7.4.3 Light Effect of Dusk -- 7.4.4 Particle Effects -- 7.5 Functional Design -- 7.5.1 Sequence Animation in Scene -- 7.5.2 Release Kongming Lanterns -- 7.5.3 Large Amounts of Kongming Lanterns Take off -- 7.6 Artwork Display and Rendering Resource Analysis. , 7.6.1 Project Framework Diagram and Interactive Display Screenshots -- 7.6.2 Project Performance Analysis -- 7.6.3 Project Innovation -- 7.7 Conclusion -- 8 Auxiliary Figure Presentation Associated with Sweating on a Viewer's Hand in Order to Reduce VR Sickness -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Experiment to Select Physiological Signal that Correlates with VR Sickness -- 8.3.1 Physiological Signals -- 8.3.2 Experiment Environment and Task -- 8.3.3 Result -- 8.3.4 Analyses and Discussions -- 8.4 Design of Auxiliary Figure Control System -- 8.5 Evaluation Experiment -- 8.5.1 Procedure and Task -- 8.5.2 Results -- 8.5.3 Discussions -- 8.6 Conclusions -- References -- 9 Design and Implementation of Immersive Display Interactive System Based on New Virtual Reality Development Platform -- 9.1 Introduction -- 9.2 System Methodology -- 9.2.1 Demand Analysis -- 9.2.2 Analysis of Our Developing Platform -- 9.2.3 Development Processing -- 9.3 Analysis of Key Technologies -- 9.3.1 Model Construction and Import -- 9.3.2 Real Shading in Unreal Engine 4 -- 9.3.3 Making Interactive Experiences -- 9.4 Conclusion -- References -- 10 360-Degree Virtual Reality Videos in EFL Teaching: Student Experiences -- 10.1 Introduction -- 10.2 Literature Review -- 10.2.1 Different VR Types -- 10.2.2 VR in Higher Education -- 10.2.3 VR Embedded Language Learning -- 10.3 Research Methods -- 10.3.1 Participants -- 10.3.2 Instruments -- 10.3.3 Procedures -- 10.3.4 Data Analysis -- 10.4 Results -- 10.4.1 Results of Two Interview Questions -- 10.5 Discussion -- 10.6 Conclusions -- References -- 11 Medical-Network (Med-Net): A Neural Network for Breast Cancer Segmentation in Ultrasound Image -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Proposed Breast Ultrasound Segmentation Model (Med-Net) -- 11.3.1 Encoder Architecture -- 11.3.2 Attention Module. , 11.3.3 Decoder Architecture -- 11.3.4 Implementation Details -- 11.3.5 Dataset -- 11.4 Discussion -- 11.5 Conclusion -- References -- 12 Auxiliary Squat Training Method Based on Object Tracking -- 12.1 Introduction -- 12.2 Material and Methods -- 12.2.1 The Basic Force Arm of Deep Squat -- 12.2.2 Object Tracking -- 12.2.3 Action Analysis -- 12.3 Results -- 12.3.1 Sagittal Plane Motion Analysis -- 12.3.2 Coronal Plane Motion Analysis -- 12.4 Discussion -- 12.5 Conclusion -- References -- 13 Study on the Visualization Modeling of Aviation Emergency Rescue System Based on Systems Engineering -- 13.1 Introduction -- 13.2 Aviation Emergency Rescue System Architecture Analysis -- 13.2.1 Disaster Prevention and Early Warning Stage -- 13.2.2 Disaster Preparation Stage -- 13.2.3 Emergency Response Stage -- 13.2.4 Recovery and Reconstruction Stage -- 13.3 Aviation Emergency Rescue System Visualization Model -- 13.3.1 Operational Viewpoint DoDAF-Described Models -- 13.3.2 Capability Viewpoint DoDAF-Described Models -- 13.4 Conclusion -- References -- 14 An AI-Based System Offering Automatic DR-Enhanced AR for Indoor Scenes -- 14.1 Introduction -- 14.2 System Overview -- 14.2.1 Object Segmentation Component -- 14.2.2 Layout Estimation Component -- 14.2.3 Inpainting Component -- 14.2.4 Super-Resolution Component -- 14.2.5 Implementation and Orchestration -- 14.3 Experimental Setup Methodology -- 14.3.1 Component Ablation -- 14.3.2 User Study -- 14.4 Results and Discussion -- 14.4.1 Objective Evaluation -- 14.4.2 Subjective Evaluation -- 14.5 Conclusion -- References -- 15 Extending Mirror Therapy into Mixed Reality-Design and Implementation of the Application PhantomAR to Alleviate Phantom Limb Pain in Upper Limb Amputees -- 15.1 Introduction -- 15.2 Methods and Materials -- 15.2.1 Study Setup and Protocol -- 15.3 Gameplay and Technical Implementation. , 15.3.1 Game Design and Interaction Scenes -- 15.3.2 Spatial Mapping -- 15.3.3 Virtual Arm and Non-Anthropomorphic Feedback -- 15.3.4 Virtual Arm Movement -- 15.3.5 Virtual Hand Movement -- 15.3.6 Calibration -- 15.3.7 Interaction with Virtual Environment -- 15.3.8 Remote Connection for Therapeutic Intervention -- 15.4 Results -- 15.5 Discussion -- 15.6 Conclusion -- References -- 16 An Analysis of Trends and Problems of Information Technology Application Research in China's Accounting Field Based on CiteSpace -- 16.1 Questions Posed -- 16.2 Text Mining and Visual Analysis of Research Trends in Information Technology in the Field of Accounting in China -- 16.2.1 Research Tools -- 16.2.2 Source of Data -- 16.2.3 Text Mining and Visual Analysis of Related Research Based on Classification -- 16.3 A Review of Major Issues Discovered by Research and Analysis Regarding the Application of Information Technology in Accounting -- 16.3.1 Few Studies Have Been Conducted on the Application of Information Technology to Accounting in SMEs -- 16.3.2 The Number and Quality of Information-Based Accounting Education Research is Low and Declining -- 16.4 Conclusions and Recommendations of the Research on the Application of Information Technology in Accounting -- 16.4.1 Conclusions of the Research -- 16.4.2 Research Recommendations for Advancing the Application of Information Technology in Accounting -- References -- 17 Augmented Reality Framework and Application for Aviation Emergency Rescue Based on Multi-Agent and Service -- 17.1 Introduction -- 17.2 Framework of Augmented Reality System -- 17.2.1 System Framework -- 17.2.2 Service-Oriented Architecture -- 17.2.3 Multi-Agent Architecture -- 17.3 Construction of Aviation Emergency Rescue Augmented System -- 17.3.1 Construction of System -- 17.3.2 Services Development -- 17.3.3 Entity Development. , 17.4 Simulation of Aviation Emergency Rescue.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Schlagwort(e): Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (858 pages)
    Ausgabe: 1st ed.
    ISBN: 9788132217596
    Serie: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    New Delhi :Springer (India) Private Limited,
    Schlagwort(e): User interfaces (Computer systems). ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (525 pages)
    Ausgabe: 1st ed.
    ISBN: 9788132220091
    Serie: Advances in Intelligent Systems and Computing Series ; v.309
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 1.1 Data Aggregation -- 1.2 Data Aggregation Security Concerns -- 2…Secure Data Aggregation Protocols -- 2.1 Secure Data Aggregation Based on Cryptographic Techniques -- 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography -- 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography -- 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function -- 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes -- 2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation -- 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques -- 3…Comparison of Secure Data Aggregation Protocols -- 4…Conclusion -- References -- 2 Secure and Dynamic IP Address Configuration Scheme in MANET -- Abstract -- 1…Introduction -- 2…Related Work Review -- 3…Proposed Work -- 4…Conclusion -- References -- 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Proposed Scheme -- 4…Conclusion -- References -- 4 Dual Security Against Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Route Discovery Phase Detection -- 3.2 Data Transmission Phase -- 4…Conclusion and Future Scope -- References -- 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Proposed Detection Algorithm -- 4…Conclusion and Future Work -- References -- 6 Frequency Domain Incremental Strategies Over Distributed Network -- Abstract -- 1…Introduction -- 2…Estimation Problem and the Adaptive Distributed Solution. , 3…Frequency-Domain Adaptive Distributed Solution -- 3.1 DCT-LMS and DFT-LMS Algorithm -- 4…Simulation -- 5…Conclusion -- References -- 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- Abstract -- 1…Introduction -- 1.1 MAC Layer Architecture -- 1.2 QoS Classes -- 1.3 Scheduler at MAC Layer -- 2…Literature Survey -- 3…Methodology -- 3.1 Design of Scheduler -- 4…Mathematical Model -- 4.1 Probability of Packets Being Served -- 4.2 Average Waiting Time -- 4.3 Average Time Spent by a Packet in Queue Ws -- 5…Result Analysis -- 6…Conclusion -- References -- 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Proposed Architecture and Methodology -- 3…Result Analysis -- 4…Conclusion -- References -- 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Abstract -- 1…Introduction -- 2…Literature Review -- 3…The Procedure -- 3.1 Initialization Phase -- 3.2 Detection and Reporting Phase -- 3.3 Action Phase -- 4…Implementation and Result Analysis -- 5…Conclusion -- References -- 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Wireless Sensor Network Routing Algorithms -- 2.1 Flat Routing Protocols -- 2.2 Hierarchical Routing Algorithms -- 2.3 Location-Based Protocols -- 2.4 Related Work -- 3…Simulation Setup -- 3.1 Result and Analysis -- 4…Conclusion -- References -- 11 Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic -- Abstract -- 1…Introduction -- 1.1 IEEE 802.11 Mechanism -- 1.2 IEEE 802.11e Mechanism -- 2…Simulation Model and Performance Analysis -- 2.1 Simulation Model -- 2.2 Simulation Parameter -- 2.3 Results -- 3…Conclusion -- References. , 12 A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range -- Abstract -- 1…Introduction -- 2…Related Work on Connected Dominating Set -- 3…Proposed Algorithm -- 3.1 Network Model -- 3.2 Proposed Approach -- 3.2.1 Algorithm: Determination of P-CDS of a Graph -- 3.2.2 Diagrammatical Illustration of Algorithm -- 4…Performance Analysis -- 5…Conclusion -- References -- 13 Token Based Group Local Mutual Exclusion Algorithm in MANETs -- Abstract -- 1…Introduction -- 2…Related Works -- 3…GLME Algorithm -- 3.1 Working -- 3.2 Data Structure -- 3.3 Messages -- 3.4 Pseudocode of Algorithm at Node i -- 4…Performance Analysis -- 5…Conclusions and Future Scope -- References -- 14 A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Coverage Algorithm for Anchor Node Deployment -- 3…Encryption and Decryption -- 4…Route Discovery Process -- 5…Performance Evaluation -- 6…Conclusions -- References -- 15 Characteristic Function for Variable-Bit-Rate Multimedia QoS -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Model for Mapping QoS of Variable-Bit-Rate Multimedia -- 4…Numerical Results -- 5…Conclusion -- References -- 16 A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition -- Abstract -- 1…Introduction -- 2…Preliminaries -- 2.1 Vector Decomposition Problem -- 2.2 Trapdoor VDP -- 3…Proposed Oblivious Transfer Using Vector Decomposition -- 3.1 Correctness of Our OT Scheme -- 4…Conclusion and Future Work -- References -- 17 Query by Humming System Through Multiscale Music Entropy -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Proposed Query by Humming System -- 3.1 Preprocessing -- 3.2 Framing -- 4…Entropy Estimation -- 4.1 Shannon Entropy -- 4.2 Multiscale Entropy -- 4.3 Multiscale Music Entropy. , 5…Kd Tree-Based Indexing -- 6…Query Processing and Searching -- 7…Results and Discussions -- 7.1 Performance Analysis -- 8…Conclusions -- References -- 18 An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Discrete Wavelet Transform for EEG Signal Decomposition -- 4…Training Algorithms for MLPNN -- 4.1 Backpropagation -- 4.2 Manhattan Update Rule -- 4.3 Resilient Propagation -- 5…Experimental Study, Results, and Analysis -- 6…Summary and Conclusion -- 19 Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Envisioned Query by Humming System -- 4…Perceptual Analysis -- 4.1 Spectral Centroid -- 4.2 Spectral Spread -- 4.3 Pitch Class Profile or Chroma -- 4.3.1 Preprocessing -- 4.3.2 Frequency Mapping -- 4.3.3 Postprocessing -- 4.4 Harmonicity -- 4.4.1 Harmonic Spectral Centroid -- 4.4.2 Harmonic Spectral Spread -- 5…Context Drift Information Analysis -- 5.1 Perceptual Feature Space -- 5.2 Transfer Entropy Estimation -- 6…Results and Discussions -- 7…Conclusions -- References -- 20 First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm -- Abstract -- 1…Introduction -- 2…Basic Concepts -- 3…SRM-FF Algorithm -- 4…Evaluations -- 5…Conclusion -- References -- 21 A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks -- Abstract -- 1…Introduction -- 2…Proposed Work -- 2.1 Proposed Work Architecture -- 2.2 Proposed Algorithm -- 2.3 Proposed Embedding Scheme -- 3…Experimental Results and Comparison Analysis -- 3.1 Evaluation Based on Stego-Image Quality and Payload Capacity. , 3.2 Evaluation Based on Resistance to Stastical Attacks -- 4…Conclusions -- References -- 22 A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Area-Based Stereo Matching -- 4…Experiment Results -- 4.1 Method of Evaluation -- 4.2 Robustness to Change in Illumination -- 4.3 Robustness to Change in Exposure -- 5…Conclusion -- Acknowledgement -- References -- 23 A Hybrid Motion Based-Object Tracking Algorithm for VTS -- Abstract -- 1…Introduction -- 2…The VTS and Its Challenges -- 3…Motion-Based Object Tracking Scheme -- 4…Simulation Results -- 5…Conclusion and Future Work -- References -- 24 Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi's Method -- Abstract -- 1…Introduction -- 2…Taguchi's Optimization Method -- 2.1 Designing of Input Parameter Using OA -- 2.2 Building of Response Table -- 2.3 Optimal Level Values Identification and Confirmation Experiment -- 2.4 Reducing the Optimization Range -- 2.5 Checking of Level Values and Termination Criteria -- 3…Experimental Results -- 4…Conclusion -- References -- 25 A Novel Approach for Jamming and Tracking of Mobile Objects -- Abstract -- 1…Introduction -- 2…Smart Antenna -- 3…Algorithm Applied in the System -- 4…Simulation Results -- 5…Conclusion -- References -- 26 Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System -- Abstract -- 1…Introduction -- 2…Mathematical Model -- 2.1 STBC Encoding Scheme -- 3…Communication System Model -- 3.1 STBC Decoding Scheme -- 4…Results and Discussion -- 5…Conclusions -- References -- 27 On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application -- Abstract -- 1…Introduction -- 2…Antenna Design and Parametric Study -- 3…Results and Discussion -- 3.1 Return Loss. , 3.2 Current Distribution.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Schlagwort(e): Soft computing -- Congresses. ; Problem solving -- Data processing -- Congresses. ; Engineering. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (571 pages)
    Ausgabe: 1st ed.
    ISBN: 9788132216957
    Serie: Advances in Intelligent Systems and Computing Series ; v.250
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organizing Committee -- Contents -- 1 Research on Hierarchical Clustering Algorithm Based on Cluster Outline -- Abstract -- 1…Introduction -- 2…Definition and Solution -- 2.1 The Definition of Boundary Point and Cluster Outline -- 2.2 The Solution of Cluster Outline -- 3…The Design of Hierarchical Clustering Algorithm Based on Cluster Outline -- 3.1 The Clustering Between Clusters -- 3.2 The Clustering Between Clusters and Outliers -- 3.3 The Process of the Algorithm -- 4…The Experimental Analysis -- 5…Conclusions -- Acknowledgments -- References -- 2 Exploration of Fault Diagnosis Technology for Air Compressor Based on Internet of Things -- Abstract -- 1…Introduction -- 2…The Remote Diagnosis System Designment of the Air Compressor Using Internet of Things -- 3…Field Information Collection with the Internet of Things Technology -- 4…To Realize Remote Monitoring Using Communication Technology -- 5…To Build Fault Model -- 6…To Establish Fault Diagnosis Expert System -- 7…Summary -- Acknowledgments -- References -- 3 An Enhancement Algorithm Based on Fuzzy Sets Algorithm Using Computer Vision System for Chip Image Processing -- Abstract -- 1…Introduction -- 2…Related Works -- 2.1 Image Enhancement -- 2.2 Vision-Based Detection System -- 2.3 Image Edge -- 3…Methodology -- 3.1 Introduction of Fuzzy Sets -- 4…Results and Discussion -- 5…Conclusions -- References -- 4 Development of DDoS Attack Defense System Based on IKEv2 Protocol -- Abstract -- 1…Introduction -- 2…IKEv2 Protocol Analysis and Design -- 3…Development of DDoS Attack Defense System Based on IKEv2 Protocol -- 4…Conclusions -- References -- 5 Power Data Network Dynamic Simulation Platform -- Abstract -- 1…Introduction -- 2…Introduction of Existing Simulation Technology -- 3…Dynamic Simulation Platform for the Design of the Electric Power Data Network. , 3.1 Logical Structure -- 3.2 Hierarchy -- 4…Working Mechanism of Power Data Network Dynamic Simulation Platform -- 4.1 Simulate the Dynamic Interaction Objects -- 4.2 Dynamic Mock Object -- 4.3 Different Levels of Dynamic Change Agreement -- 4.4 Simulation Performance Improvements -- 5…Conclusions -- Acknowledgments -- 6 An Emotional Model Based on Multiple Factors -- Abstract -- 1…Introduction -- 2…Problem Description and Approach -- 2.1 Problem Description -- 2.2 Perception Module -- 2.3 Subconscious Module -- 2.4 Inside Variable Module -- 2.5 Character Module -- 2.6 Mood Module -- 2.7 Emotion Module -- 2.8 Behavior Module -- 3…Experiments and Results -- 3.1 Experiments -- 3.2 Results -- 4…Conclusions -- 7 Multi-Source and Heterogeneous Knowledge Organization and Representation for Knowledge Fusion in Cloud Manufacturing -- Abstract -- 1…Introduction -- 1.1 Cloud Manufacturing -- 1.2 Knowledge Fusion and Service -- 2…Analysis of Knowledge Resources and Requirements for Knowledge Organization and Representation of Group Corporation in Cloud Manufacturing -- 2.1 Features of Group Corporation Knowledge Management and Knowledge Resource Classification -- 2.2 Requirement Analysis of Knowledge Organization and Representation in Group Corporation -- 3…Knowledge Organization and Representation Model for Knowledge Fusion -- 3.1 Knowledge Unit -- 3.2 Fusion Knowledge -- 4…Framework of Knowledge Fusion and Service in Cloud Manufacturing -- 5…Conclusions -- References -- 8 Research of Dynamics and Deploying Control Method on Tethered Satellite -- Abstract -- 1…Introduction -- 2…A System Dynamics Model -- 3…Analyze the Values of System Parameters -- 4…Simulation and Analysis -- 5…Conclusions -- References -- 9 Using Auto-Associative Neural Networks for Signal Recognition Technology on Sky Screen -- Abstract -- 1…Introduction. , 2…Hopfield Associative Neural Network -- 2.1 Discrete Hopfield Network Theory -- 3…Application of Hopfield Network for Typical Projectile Signal -- 3.1 Extraction of Pattern Feature -- 3.2 Associative Memory Algorithm for Discrete Hopfield Neural Networks -- 3.3 Simulation and Application for Typical Signal of Sky Screens -- 4…Results -- References -- 10 Research on the Hotspot Information Push System for the Online Journal Based on Open-Source Framework -- Abstract -- 1…Introduction -- 2…Key Technologies -- 2.1 HttpClient -- 2.2 HTMLParser -- 2.3 IKAnalyzer -- 3…The Realization of the System Framework -- 4…Examples -- 5…Summary -- Acknowledgments -- References -- 11 Development of Control System of Wheel Type Backhoe Loader -- Abstract -- 1…Introduction -- 2…The Features of CAN Bus Control System -- 3…Design of the Architecture of CAN Bus Control System -- 3.1 Typical Architecture of CAN Bus Control System -- 3.2 The Architecture of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4…Principle and Functions of the CAN Bus Control System of Wheel Type Backhoe Loader -- 4.1 The Control of Loading Operation -- 4.2 The Control of Excavating Operation -- 4.3 System Indication and Failure Alarm Control -- 5…The Features of the Control System of Wheel Type Backhoe Loader -- 6…Conclusions -- References -- 12 Some Results on Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Abstract -- 1…Introduction -- 2…Review of Preliminaries -- 3…Fuzzy Weak Boolean Filters of Non-commutative Residuated Lattice -- Acknowledgments -- References -- 13 CGPS: A Collaborative Game in Parking-Lot Search -- Abstract -- 1…Introduction -- 2…The Parking-Lot Searching Scenario -- 3…Algorithm Analysis -- 3.1 Opponent Selection -- 3.2 Game Analysis -- 4…Simulation Analysis -- 5…Conclusions -- References. , 14 A Fuzzy-Based Context-Aware Privacy Preserving Scheme for Mobile Computing Services -- Abstract -- 1…Introduction -- 2…Privacy Challenge of Mobile Computing -- 3…System Overview -- 3.1 Architecture -- 3.2 Context Modeling -- 3.3 Fuzzy-Reasoning Process -- 4…Evaluation -- 5…Conclusions -- Acknowledgments -- References -- 15 Research and Application of Trust Management System -- Abstract -- 1…Introduction -- 2…Trust Management Architecture -- 3…Trust Evaluation Method -- 4…Simulation and Application -- 4.1 A Simulation -- 4.2 Performance Discussion -- 5…Conclusions and Future Work -- Acknowledgments -- References -- 16 Ranaad-Xek: A Prototype Design of Traditional Thai Musical Instrument Application for Android Tablet PC -- Abstract -- 1…Introduction -- 2…Ranaad-Xek -- 2.1 Ranaad-Xek's Composition -- 2.2 Ranaad-Xek Percussions -- 3…Application Specification and Architecture -- 3.1 Framework -- 3.2 Application Specification -- 3.3 Application Architecture -- 3.4 The Playing Mode -- 3.5 Recording System -- 3.6 GUI Design -- 4…Conclusions -- Acknowledgments -- References -- 17 Identifying Accurate Refactoring Opportunities Using Metrics -- Abstract -- 1…Introduction -- 2…Relate Work -- 2.1 Cloned Code -- 2.2 The Difficulties of Identifying Refactoring Opportunities -- 3…An Approach to Identifying Refactoring Opportunities with Metrics -- 3.1 Benefits -- 3.2 Costs -- 3.3 Evaluation of the Benefit and Cost -- 4…Future Work -- Acknowledgments -- References -- 18 Research on Neural Network Predictive Control of Induction Motor Servo System for Robot -- Abstract -- 1…Introduction -- 2…Servo System Modeling -- 3…The Predictive Control Servo System Based on BP Neural Network -- 3.1 Control Structures -- 3.2 Neural Network Predictive Model -- 3.3 Feedback Correction -- 3.4 Scroll Optimization -- 3.5 Neural Network Predictive Control Algorithm Steps. , 4…MATLAB Simulation and Analysis -- Acknowledgments -- References -- 19 Research on Scale-Out Workloads and Optimal Design of Multicore Processors -- Abstract -- 1…Introduction -- 2…Scale-out Workloads -- 3…Experiment and Analysis -- 3.1 Throughput -- 3.2 Latency -- 4…Optimal Design of Multicore Processors for Scale-out Workloads -- 5…Related Work -- 6…Conclusions -- Acknowledgments -- References -- 20 Study of Modified Montgomery's Algorithm and Its Application to 1,024-bit RSA -- Abstract -- 1…Introduction -- 2…RSA Cryptosystem -- 2.1 Montgomery Algorithm and Modified Montgomery Algorithm -- 2.2 Four-to-two CSA -- 2.3 Modified R-L Binary Algorithm -- 3…Algorithm Implementation -- 3.1 Four-to-two Architecture -- 3.2 Modified R-L Binary Architecture -- 4…Conclusions -- References -- 21 A MVS-Based Object Relational Model of the Internet of Things -- Abstract -- 1…Introduction -- 2…MVS-Based Object Relational Model of the Internet of Things -- 2.1 Construction of Basic Data Model -- 2.2 Calculation of Properties' Characteristics of the Internet of Things -- 3…Experimental Verification and Conclusion -- References -- 22 Rateless Code-Based Unequal Loss Protection for Layer-Coded Media Delivery -- Abstract -- 1…Introduction -- 2…ULP-Strider Coding System -- 2.1 Decoding Algorithm -- 2.2 Encoding Process -- 2.3 Analyzing the Construction of Redundancy -- 3…Simulation -- 3.1 Random Sequence Versus Fine-Designed Sequence -- 3.2 Extra Information from Soft Hint -- 3.3 Strider Versus ULP-Strider -- 4…Conclusions -- Acknowledgments -- References -- 23 Construction of the Grade-3 System for GJB5000A-2008 -- Abstract -- 1…Current Software Engineering Process Overview -- 2…Analysis of the Correlation and the Necessity of Fusion Between GJB5000A-2008 and Software Engineering Process -- 3…Built Process System Based on the Software Engineering. , 4…Process Instance Analysis.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    New Delhi :Springer (India) Private Limited,
    Schlagwort(e): Artificial intelligence -- Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (797 pages)
    Ausgabe: 1st ed.
    ISBN: 9788132220121
    Serie: Advances in Intelligent Systems and Computing Series ; v.308
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 Neutrosophic Logic Applied to Decision Making -- Abstract -- 1…Introduction -- 2…Neutrosophic Decision Making Strategies -- 3…Complex Metrics for Digital Learning Object Evaluation -- 4…Practical Experience -- 5…Conclusion -- Acknowledgments -- References -- 2 Transforming e-Government to Smart Government: A South Australian Perspective -- Abstract -- 1…Introduction -- 2…Open Data: Social and Economic Benefits -- 3…Developing Smart Government Through Open Data -- 3.1 Community Engagement and Coproduction -- 3.2 Financial Investment -- 3.3 Automation -- 3.4 Collaboration -- 3.5 Governance -- 4…Conclusion -- References -- 3 An Online Content Syndication Tool with Built-in Search and Social Sharing -- Abstract -- 1…Introduction -- 2…Architecture -- 2.1 RSS Source Listener -- 2.2 Subscription -- 2.3 RESTful Web Service APIs -- 3…Conclusions -- Acknowledgment -- References -- 4 Customizing EPCglobal to Fit Local ONS Requirements -- Abstract -- 1…Introduction -- 2…EPC Framework -- 3…Related Work -- 4…Proposed System and Implementation -- 4.1 Sample Implementation -- 5…Conclusion -- References -- 5 Distributed CloudIMS: Future-Generation Network with Internet of Thing Based on Distributed Cloud Computing -- Abstract -- 1…Introduction -- 2…Evolution of Network and Application -- 2.1 Evolution of Telecommunication (NGN) -- 2.2 Evolution of Cloud Computing -- 2.3 The Internet of Thing: Machine to Machine the Future Internet -- 2.4 Related Work on IMS, IoT, and Cloud Computing -- 3…The CloudIMS Framework Architecture: Our Proposed Future Network -- 3.1 Our Vision of CloudIMS Platform -- 3.2 Architecture of CloudIMS Platform -- 3.3 Operation, Administration, and Maintenance (OA& -- M) of CloudIMS. , 3.4 Discussion and Motivation of Proposed CloudIMS Features and Use Case Study Characteristics -- 4…Conclusion -- References -- 6 Genetic Algorithm-Based Query Expansion for Improved Information Retrieval -- Abstract -- 1…Introduction -- 2…Proposed Approach -- 2.1 Construction of Term Pool -- 2.2 Genetic Algorithm for Selecting Expansion Terms -- 2.2.1 Representation of Chromosome -- 2.2.2 Fitness Function -- 2.2.3 Algorithm for GABQE -- 3…Experiments and Results -- 4…Conclusion -- References -- 7 Genetic Algorithm-Based Adaptive PID Controller -- Abstract -- 1…Introduction -- 2…The Proposed PID Controller -- 2.1 The Conventional PID Controller -- 2.2 The Adaptive PID Controller -- 2.3 GA-Optimized APID -- 2.3.1 Objective Function of the Genetic Algorithm -- 2.3.2 Different Operations Used in GA -- 3…Results -- 4…Conclusion -- References -- 8 Text Mining for Phishing E-mail Detection -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Data set Preparation -- 3.2 Feature Extraction Using Text Mining -- 3.3 Feature Selection -- 3.4 Classification -- 4…Implementation -- 5…Conclusion -- References -- 9 A Multi-objective Cat Swarm Optimization Algorithm for Workflow Scheduling in Cloud Computing Environment -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Workflow Design -- 4…Multi-objective Scheduling Model -- 5…General CSO Algorithm -- 6…Proposed Algorithm -- 6.1 Seeking Mode -- 6.2 Tracing Mode -- 7…Input Data for Experiment -- 8…Results and Discussion -- 8.1 Output Graphs Generated by MATLAB -- 8.2 Analysis of Resultant Graphs -- 9…Conclusion and Future Scope -- References -- 10 A Case Study of User Behavior in Information Retrieval -- Abstract -- 1…Introduction -- 2…User Behavior in Information Retrieval -- 3…Case Study -- 3.1 Scoring -- 4…Approaches to Incorporating Implicit Feedback -- 5…Conclusion -- References. , 11 Fuzzy Mapping of Robotic Arm Based on LabVIEW -- Abstract -- 1…Introduction -- 2…Implementation of System -- 3…Designing Fuzzy Systems -- 4…A Table LookUp Scheme -- 5…Fuzzy System Design for Robotic Arm -- 6…Mapping for Base of Robotic Arm -- 7…Mapping for Gripping of Object -- 8…Kinematics of Robotic Arm -- 9…Conclusion and Future Work -- References -- 12 An Improvement on NSGA-II for Finding Fast the Better Optimal Solution in Multi-objective Optimization Problem -- Abstract -- 1…Introduction -- 2…A Brief Review on Existing Work -- 3…Proposed Methodology -- 3.1 Algorithm Steps -- 4…Implementation and Result Analysis -- 4.1 Test Problems -- 4.2 Results and Comparison with Other Clustering Methods -- 5…Conclusion and Future Work -- References -- 13 Test Case Creation from UML Sequence Diagram: A Soft Computing Approach -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Work -- 3.1 Proposed Framework -- 3.2 UML Diagram for Design Document -- 3.3 Message Control Flow Graph -- 3.4 Algorithm to Create Test Cases Using GA -- 4…Implementation and Results -- 4.1 Optimization of Test Paths Using GA -- 4.2 Test Case Creation -- 5…Conclusion -- References -- 14 Solving Nonlinear Constrained Optimization Problems Using Invasive Weed Optimization -- Abstract -- 1…Introduction -- 2…Invasive Weed Optimization -- 3…Multistage Penalty Function -- 4…Results and Discussion -- 5…Conclusions -- References -- 15 ESEC: An Ideal Secret Sharing Scheme -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Non-threshold Secret Sharing Scheme Using ECC -- 4…A Multilevel Secret Sharing Scheme -- 5…Implementation and Analysis -- 5.1 Implementation -- 5.2 Analysis -- 6…Conclusion -- References -- 16 Extended Service Registry to Support I/O Parameter-Based Service Search -- Abstract -- 1…Introduction -- 2…Object Relational Database for Service Registry. , 2.1 WSDL and UDDI Relationship -- 2.2 Object Relational Database as Service Registry -- 2.3 Extended Service Registry -- 2.4 I/O Parameter-Based Service Search -- 2.5 Process of Parameter-Based Service Search -- 3…Experimental Results -- 3.1 Experimental Setup -- 3.2 Comparison of Basic Keyword Search in Registries---JUDDI Versus ESR Approach -- 3.3 Performance of Output Parameter-Based Service Search -- 4…Related Work -- 5…Conclusion -- References -- 17 Realizing New Hybrid Rough Fuzzy Association Rule Mining Algorithm (RFA) Over Apriori Algorithm -- Abstract -- 1…Introduction -- 1.1 Data Mining and Association Rule Mining -- 1.2 Fuzzy ARM Concepts and Rough ARM Concepts -- 2…Theoretical Aspects -- 2.1 Rough Set Concepts and Reducts -- 2.2 Information System and Decision System -- 2.3 Fuzzy c-Means Clustering -- 3…Proposed Algorithm -- 3.1 Algorithm Description -- 3.2 Pseudo Code -- 3.3 Analysis -- 4…Conclusion and Future Work -- References -- 18 Modal Analysis of Hand-Arm Vibration (Humerus Bone) for Biodynamic Response Using Varying Boundary Conditions Based on FEA -- Abstract -- 1…Introduction -- 2…The CAD Model -- 3…Boundary Conditions and Material Properties -- 4…Results and Discussion -- 5…Conclusion -- References -- 19 Preserving Privacy in Healthcare Web Services Paradigm Through Hippocratic Databases -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Example Scenario -- 4…Enhancement of Hippocratic Databases Through Analytical Hierarchy Processing -- 5…Conclusions -- References -- 20 Generation of Array Passwords Using Petri Net for Effective Network and Information Security -- Abstract -- 1…Introduction -- 2…Types of Existing Authentication Methods -- 3…Limitations of Existing Methods -- 4…Need of a Good Password -- 5…Petri Net -- 6…Array Token Petri Net Structure -- 6.1 Basic Notations -- 6.2 Catenation Rule -- 6.3 Firing Rules. , 6.4 Set of Labels -- 7…Model Formulation and Generation of Array Passwords -- 7.1 Petri Net to Generate All Possible 2 x 2 Arrays Over the Alphabet {a, b} -- 7.2 Firing Sequences -- 8…Conclusion -- References -- 21 Application of Genetic Algorithm for Component Optimization to Deploy Geoprocessing Web -- Abstract -- 1…Introduction -- 2…Approaches for Geoprocessing -- 3…The Geoprocessing Web and Component Optimization -- 4…Proposed Work -- 5…Conclusions -- References -- 22 DNA-Based Cryptographic Approach Toward Information Security -- Abstract -- 1…Introduction -- 2…Brief Idea of DNA -- 3…Literature Review -- 4…Proposed Method -- 4.1 Encryption -- 4.1.1 Algorithmic Steps -- 4.2 Embedding -- 4.2.1 Algorithmic Steps -- 5…Algorithmic Presentation -- 5.1 Key Selection -- 5.2 Message Encryption -- 6…Conclusion -- References -- 23 Design a Fuzzy Logic Controller with a Non-fuzzy Tuning Scheme for Swing up and Stabilization of Inverted Pendulum -- Abstract -- 1…Introduction -- 2…Inverted Pendulum Description -- 3…Controller Design -- 4…Proposed Tuning Scheme -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 24 Use of Machine Learning Algorithms with SIEM for Attack Prediction -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Frame Work -- 3.1 OSSIM -- 3.2 Dataset and Feature Selection -- 3.3 Find Feature Set Using Information Gain -- 3.4 Classification and Prediction -- 4…Conclusion -- References -- 25 Performance Comparison of Single-Layer Perceptron and FLANN-Based Structure for Isolated Digit Recognition -- Abstract -- 1…Introduction -- 2…Data Set and Feature Extraction -- 2.1 Calculation of Gradient [13] -- 2.2 Generation of Feature Vector [13] -- 2.3 Dimension Reduction -- 3…Classification -- 3.1 Single-Layer Perceptron Structure -- 3.2 FLANN Structure -- 4…Simulation Result -- 5…Conclusion -- References. , 26 Computational Techniques for Predicting Cyber Threats.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Schlagwort(e): Computer science -- Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (1263 pages)
    Ausgabe: 1st ed.
    ISBN: 9788132216650
    Serie: Advances in Intelligent Systems and Computing Series ; v.243
    DDC: 004
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Committee -- Contents -- 1 Image and Template Security for Palmprint -- Abstract -- 1…Introduction -- 2…Image Protection -- 2.1 Chaotic Mixing -- 2.2 Watermarking -- 3…Template Security -- 3.1 Proposed System -- 4…Conclusion -- References -- 2 Extending Network Lifetime by Time-Constrained Data Aggregation in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…System Model and Problem Definition -- 4…Solution and Implementation -- 5…Conclusion -- References -- 3 The Complex Network Analysis of Power Grid: A Case Study of the West Bengal Power Network -- Abstract -- 1…Introduction -- 2…Fundamentals of Power System as a Graph Theoretic Model -- 3…Modeling the Topology of Power Grid as a Complex Network -- 3.1 Topological Analysis of Power Grid -- 3.1.1 Number of Links (m) -- 3.1.2 Average Nodal Degree ( \langle k \rangle ) -- 3.1.3 Ratio Parameter (r) -- 3.1.4 Pearson Coefficient ( \rho ) -- 3.1.5 Degree Distribution -- 3.1.6 Clustering Coefficient -- 3.1.7 Average Shortest Path -- 3.2 Random Graphs (ER) -- 3.3 Preferential Attachment (PA) -- 4…Experimental Results and Discussions -- 5…Conclusions -- References -- 4 Comparison and Analysis of Node Deployment for Efficient Coverage in Sensor Network -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 2.1 Efficient Coverage Area Ratio Calculation -- 2.2 Sensor and Coverage Model -- 3…Sensor Node Deployment and Coverage Area Calculation -- 3.1 Sensor Node Deployment Based on Square Pattern -- 3.1.1 Nine Sensors at the Vertices of Square -- 3.1.2 Sensor Nodes at the Center of Sixteen Circles -- 3.2 Sensor Node Deployments Based on Triangular Pattern -- 3.2.1 Sensor Deployment at the Three Vertices of a Triangle -- 3.2.2 Sensor Deployment at Vertexes of the Rhomb -- 3.2.3 Sensor Deployment at a Meeting Circle of Six Circles. , 4…Comparison and Result Analysis -- 4.1 Total Coverage Area Versus Number of Nodes -- 4.2 Net Efficient Coverage Area Ratio Versus Number of Nodes -- 5…Conclusion -- References -- 5 Performance Analysis of Routing Protocols for VANETs with Real Vehicular Traces -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Overview of LAR, DSR, and AODV Protocols -- 4…Problem Formulation -- 4.1 Assumption -- 4.2 Intelligent Driver Model with Intersection Management -- 5…Simulation Environments and Result Analysis -- 5.1 Packet Delivery Ratio -- 6…Conclusions -- References -- 6 A Bluetooth-Based Autonomous Mining System -- Abstract -- 1…Motivation -- 2…Why a Wireless System? -- 3…Why Bluetooth? -- 4…Methodology -- 5…Flowcharts -- 6…Algorithms -- 6.1 Database Entry -- 6.2 Advance Search -- 6.3 Scanning -- 7…Results/Conclusion -- 8…Related Work -- 8.1 Tracking Systems Based on Triangulation Method -- 8.2 Tracking Systems Based on Scanning Technique -- 8.3 Epidemic Communication -- References -- 7 Transistor Representation of a Low-Power Reversible 32-Bit Comparator -- Abstract -- 1…Introduction -- 2…Reversible Logic Gates -- 3…Literature Survey -- 4…Proposed 3 x 3 Reversible Gates -- 4.1 Proposed Reversible Gate1 -- 4.2 Proposed Reversible Gate2 -- 4.3 Realization of the Classical Operations -- 5…Transistor Implementation of the Proposed Reversible Gates Using GDI Method -- 5.1 Transistor Implementation of Proposed Reversible Gate1 -- 5.2 Transistor Implementation of Proposed Reversible Gate2 -- 6…Proposed Design of 1-Bit Comparator -- 7…Realization of Proposed 4-Bit Comparator -- 7.1 Logic Diagram to Find the Greater of Two 4-Bit Numbers -- 7.2 Logic Diagram to Find the Equality of Two 4-Bit Numbers -- 7.3 Logic Diagram to Find the Smaller of Two 4-Bit Numbers -- 8…Realization of 32-Bit Comparator -- 9…Simulation Results -- 10…Conclusion. , 8 Performance Enhancement of Brillouin Distributed Temperature Sensor Using Optimized Fiber -- Abstract -- 1…Introduction -- 2…Optimization -- 3…Proposed Model -- 4…Results -- 5…Conclusion -- References -- 9 To Study the Architectural Designs of a Proposed Comprehensive Software Extractor for Reengineering Tool: A Literature Survey -- Abstract -- 1…Introduction -- 2…Functional Requirement for Reengineering Tool -- 3…Extractor in Details -- 4…Conclusions -- References -- 10 Detection of Web-Based Attacks by Analyzing Web Server Log Files -- Abstract -- 1…Introduction and Background -- 2…Web-Based Attacks -- 3…Web Server Log Files -- 4…Problem Formulations -- 4.1 iFrame Injection Attack -- 4.2 Buffer Overflow Attack -- 5…Experimental Works and Result Analysis -- 5.1 Experimental Works -- 5.1.1 iFrame Injection Attack -- 5.1.2 Buffer Overflow Attack -- 5.2 Result Analysis -- 6…Conclusion -- References -- 11 A Survey of Energy-Aware Routing Protocols and Mechanisms for Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Energy or Power Consumption in MANETs -- 3…Energy-Aware Routing Mechanisms -- 4…Routing Protocols Based on Node Energy Status -- 5…Routing Protocols Based on Transmission Power Control -- 6…Conclusion -- References -- 12 Lexical Ontology-Based Computational Model to Find Semantic Similarity -- Abstract -- 1…Introduction -- 2…Lexical Ontology and Semantic Similarity -- 2.1 Semantic Similarity Aspects Using WordNet Lexical Ontology -- 2.2 Indo WordNet Structure -- 3…Proposed Semantic Similarity Module -- 3.1 Framework for Proposed Module -- 3.2 Proposed Algorithms -- 4…Experiments and Results -- 4.1 The Benchmark Data Set -- 4.2 Results -- 5…Conclusion and Future Work -- References -- 13 Energy-Efficient Cluster-Based Aggregation Protocol for Heterogeneous Wireless Sensor Networks -- Abstract -- 1…Introduction. , 2…Review on Cluster-Based Data Aggregation Techniques -- 3…Wireless Sensor Network Model -- 4…Radio Energy Dissipation Model -- 4.1 Two-Level Heterogeneous Networks -- 5…Objective and Scope -- 5.1 Proposed Approach -- 6…Implementation and Performance Evaluation -- 7…Results -- 8…Conclusion and Future Scope -- References -- 14 Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques -- Abstract -- 1…Introduction -- 2…Proposed Watermarking Algorithms -- 2.1 Magic Square Procedure -- 2.2 Method 1 -- 2.3 Method 2 -- 3…Results -- 4…Conclusion -- References -- 15 Circle of Trust: One-Hop-Trust-Based Security Paradigm for Resource-Constraint MANET -- Abstract -- 1…Introduction -- 2…The Trust-Based Security Solution -- 2.1 The Environment -- 2.2 The Trust Model and the Node Evaluation Scheme -- 2.3 The Architecture -- 3…Security Analysis of the Solution -- 3.1 The Secure Routing Protocol -- 3.2 Analysis Based on Known Attacks -- 4…Discussion -- 5…Conclusion and Future Work -- References -- 16 Design of a Biometric Security System Using Support Vector Machine Classifier -- Abstract -- 1…Introduction -- 2…Feature Extraction for the Biometric System -- 2.1 ZCPA Feature Extraction for Input Speech -- 2.2 PCA Feature Extraction for Input Image -- 3…Support Vector Machine Classifier -- 4…Working of Biometric Security System -- 5…Results -- 6…Conclusion -- Acknowledgment -- References -- 17 Impact of Distance Measures on the Performance of Clustering Algorithms -- Abstract -- 1…Introduction -- 2…Clustering Algorithms -- 3…Distance Measures -- 3.1 Euclidean Distance -- 3.2 Standardized Euclidean Distance -- 3.3 Manhattan Distance -- 3.4 Mahalanobis Distance -- 3.5 Cosine Distance -- 3.6 Correlation Distance -- 4…Experimental Results and Discussions -- 4.1 Datasets Used -- 4.2 Evaluation on Clustering Efficiency -- 5…Conclusions -- References. , 18 Gender Identification Using Gait Biometrics -- Abstract -- 1…Introduction -- 2…Methodology -- 2.1 Silhouette Extraction -- 2.1.1 Feature Extraction -- 3…Network Structure -- 3.1 Feed-Forward Back-Propagation Neural Network -- 3.2 Cascade-Forward (CF) Back-Propagation Network -- 4…Computational Analysis -- 5…Conclusion and Future Work -- References -- 19 A Survey on Business Context -- Abstract -- 1…Introduction -- 2…Context -- 3…Context Awareness -- 3.1 Sensor and Context Types -- 4…Business Context -- 4.1 Business Context Awareness -- 5…Context Modeling -- 5.1 Key Value Models -- 5.2 Markup Scheme Models -- 5.3 Graphical Models -- 5.4 Object-Oriented Models -- 5.5 Logic-Based Models -- 5.6 Ontology-Based Models -- 5.7 Guideline for Business Context Modeling -- 6…Conclusion -- Acknowledgment -- References -- 20 Enhanced Caching for Geocast Routing in Vehicular Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Work -- 3.1 Protocol Design -- 3.2 Improved Caching Technique -- 3.3 Transmission with Full Radio Transmission Range Power -- 4…Simulation Results and Performance Analysis -- 5…Conclusion and Future Work -- References -- 21 Cooperation Enforcement and Collaboration Inducement in Mobile Ad Hoc Networks -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Trust, Activity, and Strategy -- 3.1 Evaluating Trust Level -- 3.2 Evaluating Activity Level -- 3.3 Strategy Coding -- 4…Game Model Based on Trust and Activity -- 4.1 The Game on Network -- 4.2 Payoff for Participants -- 4.3 The Fitness Function -- 5…The Tournament -- 6…Evolution of Strategy Using Genetic Algorithm -- 7…Experiments -- 8…Conclusions and Future Work -- References -- 22 Uncoupling of Mobile Cloud Computing Services: An Architectural Perspective -- Abstract -- 1…Introduction -- 2…Overview of Tuple Space Model. , 3…Proposed Approach of Uncoupling of Mobile Cloud Computing Services.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Singapore :Springer,
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (377 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811922770
    Serie: Advances in Sustainability Science and Technology Series
    DDC: 004
    Sprache: Englisch
    Anmerkung: Intro -- Committee Members -- Preface -- Contents -- About the Editors -- IOT, Big Data and Cloud Computing -- Big Data: A Boon to Fight Against Cancer Using Map Reduce Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 MapReduce Architecture -- 4 Conclusion -- References -- Security Attacks and Its Countermeasures in RPL -- 1 Introduction -- 2 Related Work -- 3 About RPL -- 3.1 Control Messages in RPL -- 3.2 Traffic and Modes of Operation in RPL -- 4 Attacks in RPL -- 4.1 Attacks Against Resources -- 4.2 Attacks Against Topology -- 4.3 Attacks Against Traffic -- 5 Analysis -- 6 Conclusion and Future Scope -- References -- An Optimal Policy with Parabolic Demand Carry Forwarded with Three-Parameter Weibull Distribution Deterioration Rate, Scarcity and Salvage Value -- 1 Introduction -- 2 Model Formulation -- 2.1 Assumptions -- 2.2 Notations -- 2.3 Mathematical Formulation -- 3 Numerical Examples -- 3.1 Sensitivity Analysis -- 4 Conclusion -- References -- Information Actions Use for System Activity: Action Modeling Schemas -- 1 Introduction -- 2 The Need in Information Actions Use for System Activity -- 3 Action Modeling Schemas for the Theory of Information Actions Use for System Activity -- 4 Conclusion -- References -- High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique -- 1 Introduction -- 2 Requirements of Hiding Information Digitally -- 3 Digital Image Forensic Techniques for Feature Extraction -- 4 Spatial Transform Techniques -- 5 Conclusion -- References -- Performance Evaluation of FSO Under Different Atmospheric Conditions -- 1 Introduction -- 2 Simulation Setup -- 2.1 Simulation Result and Analysis -- 3 Conclusion -- References -- Smart Communication -- Design and Performance Analysis of High Reliability QOS-Oriented Adaptive Routing Protocol for MANET. , 1 Introduction -- 2 MANET -- 2.1 MANETS Characteristics -- 2.2 Application Areas of MANETS -- 2.3 Link Stability -- 3 Literature Survey -- 4 QOS-Oriented Adaptive Routing Protocol for 'MANET' -- 4.1 Formulas -- 4.2 Algorithm -- 5 Results -- 6 Conclusion -- References -- Circular Patch Antenna with Perturbed Slots for Various Wireless Applications -- 1 Introduction -- 2 Parameters for the Proposed Design -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- A Secure Handshaking AODV Routing Protocol (SHS-AODV) with Reinforcement Authentication in MANET -- 1 Introduction -- 2 Ad Hoc on Demand Distance Vector -- 2.1 Path Discovery -- 2.2 Reverse-Path Setup -- 2.3 Forward-Path Setup -- 2.4 Route Table Management -- 2.5 Path Maintenance -- 2.6 Local Connectivity Management -- 3 Literature Survey -- 4 SHS-AODV Routing Protocol -- 4.1 Key Generation -- 4.2 Elliptic Curve Cryptographic Algorithm (Ecc) -- 4.3 Algorithm -- 5 Results -- 5.1 Simulation Environment -- 5.2 Performance Metrics -- 6 Conclusion -- References -- AI-Powered Smart Routers -- 1 Introduction -- 2 Related Work -- 2.1 Ununified Routing (Loosely Coupled Mono-Cum-Multi-agent Evolution Strategies) -- 2.2 Unified Routing (Close-Coupled Single-Cum-Multi-agent Evolution Strategies) -- 3 AI-Powered Network Routing -- 3.1 Regenerative Control Paradigm -- 3.2 Unified and Ununified AI-Powered Networking -- 4 Brainy (SMART/Intelligent) Network -- 4.1 Unified and Ununified AI-Powered Networking -- 5 Simulation -- 6 AI-Powered and Brainy Hardware Routers -- 6.1 Framework Design Formulation -- 6.2 Simulation Results -- 7 Conclusion -- References -- Modified Sierpinski Gasket Monopole Fractal Antenna for Sub 6 GHz 5G Applications -- 1 Introduction -- 2 Evaluation of Antenna Design -- 3 Performance Analysis of Proposed Antenna -- 4 Performance Analysis of Proposed Antenna -- 5 Conclusion. , References -- Design of a Dual-Ring Resonator Antenna for WBAN Applications -- 1 Introduction -- 2 Implementation of Dual-Ring Resonator -- 3 Results -- 4 Conclusion -- References -- Performance Analysis of MIMO Antenna for Isolation Improvement -- 1 Introduction -- 2 Single Antenna Design Calculations -- 3 Design of MIMO Antenna -- 4 Analysis of the Space Diversity of MIMO Antenna -- 5 Analysis of Prototype Orthogonal MIMO -- 6 Conclusion -- References -- Low Power and High-Speed Full Adder with Complemented Logic and Complemented XOR Gate -- 1 Introduction -- 2 Review of Full Adders -- 2.1 Hybrid Full Adder [9] -- 3 Proposed Full Adder -- 3.1 Sum Output Generation Using XNOR Cell -- 3.2 Carry Output Using XNOR Cell -- 4 Delay Analysis -- 5 4-Bit Adder -- 6 Power Analysis -- 7 Conclusion -- References -- Determining the Number of Bit Encryption That Is Optimum for Image Steganography in 8 Bit Images -- 1 Introduction -- 2 Various Techniques of Image Steganography -- 2.1 LSB Method -- 2.2 Palette-Based Technique -- 2.3 Secure Cover Selection -- 3 Terms Used -- 4 Proposed Method -- 5 Result -- 6 Discussion -- 7 Conclusion -- References -- Design and Analysis of 2nd-Order Bandpass Filters Using SIW and Microstrip Patch Transitions with Stub Matching -- 1 Introduction -- 2 Design-1 -- 3 Design 2 -- 4 Results Analysis -- 5 Conclusions -- References -- Planar Split Ring Resonating Antenna Design -- 1 Introduction -- 2 Antenna Design -- 3 Simulation Results -- 4 Conclusion -- References -- Pentagonal Microstrip Patch Antenna with Circular Slot for 9 GHz Applications -- 1 Introduction -- 2 Design of Pentagonal Patch with Slot -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- Simulation and Analysis of an Optical Communication System Implementing DCF with Various Pulse Generators -- 1 Introduction -- 2 Simulation and Design. , 3 Result and Discussion -- 4 Conclusion -- References -- Simulation and Analysis of an 8 Channel CWDM Optical Network Suitable for Smart City Applications -- 1 Introduction -- 1.1 Multiplexing -- 1.2 DWDM -- 1.3 CWDM -- 2 Simulation Setup -- 3 Result and Discussion -- 4 Conclusion -- References -- Design of Low-Power Dynamic Threshold MOSFET (DTMOS) Push-Pull Inverter -- 1 Introduction -- 2 Proposed Design and Analysis -- 3 Simulation Results -- 4 Conclusion -- References -- Epileptic Seizure Detection Using Deep Learning Architecture -- 1 Introduction -- 2 Literature Review -- 3 Method Initiation with Improved Techniques -- 3.1 Data Extraction -- 3.2 Data Classification -- 4 Proposed Model -- 5 Result and Discussion -- 6 Conclusion -- References -- Ultra High Rate Inter-Satellite Optical Wireless Transmission Using DP-QPSK -- 1 Introduction -- 2 Modulation Format and Inter-Satellite Link -- 3 Proposed Set up -- 4 Results and Discussion -- 5 Conclusion -- References -- Investigation on Reactive Power Compensation Using STATCOM -- 1 Introduction -- 2 Research Method -- 2.1 Block Description and Operational Strategy -- 2.2 Network Description and Simulation -- 3 Results and Discussion -- 4 Conclusion -- References -- Smart Energy Systems -- Optimization of Set-Point Deviation and Current Ripple of PMSM by CCS-MPC Method -- 1 Introduction -- 2 PMSM Model Description -- 3 Model Description of CCS-MPC Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Study, Design and Performance Analysis of Grid-Connected Solar PV System of Two Different Places Using PV syst Software -- 1 Introduction -- 2 Grid-Tied PV System -- 3 Methodology -- 3.1 PV Syst Software -- 3.2 Case Study -- 4 Input Requirement -- 4.1 Location -- 4.2 Tilt Angle -- 4.3 Albedo -- 4.4 Module and Inverter Specification -- 4.5 Economics Analysis. , 5 Simulation and Result -- 6 Conclusion -- References -- Transparent Solar Cell: A Powerful Device of Upcoming Era -- 1 Introduction -- 2 Discussion -- 2.1 Working Principle of Transparent Solar Cells -- 2.2 Different Types of Transparent Solar Cell -- 3 Applications -- 4 Conclusion -- References -- Machine Learning Techniques and Applications -- An Adaptive Firefly Optimization Algorithm for Human Gait Recognition -- 1 Introduction -- 2 Framework of the Proposed Approach -- 2.1 Gait Template Extraction -- 2.2 Introduction to Standard Firefly Algorithm (FA) -- 2.3 Adaptive Firefly Algorithm for Feature Selection -- 2.4 Pseudo-Code of an Adaptive Firefly Algorithm for Feature Selection -- 2.5 Combination of PCA and LDA -- 3 Experimental Analysis -- 3.1 Parameter Setting -- 3.2 Performance Evaluation Metrics of Classification -- 3.3 Results and Discussion -- 4 Conclusion -- References -- Job Prediction Astrology for Using Classification Techniques in Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Set (HOROSCOPE) -- 3.2 Feature Extraction -- 4 Data Processing Techniques -- 4.1 Logistic Regression -- 4.2 Naïve Bayes Classification -- 4.3 DTNB -- 5 Experiments and Analysis -- 6 Conclusion -- References -- Developed Face and Fingerprint-Based Multimodal Biometrics System to Enhance the Accuracy by SVM -- 1 Introduction -- 1.1 Face Recognition -- 1.2 Fingerprint Recognition -- 1.3 Fusion -- 2 Literature Review -- 3 Methodology -- 3.1 Face -- 3.2 Finger -- 3.3 Principal Component Analysis -- 3.4 SVM Classifier -- 4 Result and Experiments -- 5 Conclusion -- References -- A Survey on Deep Learning Techniques for Anomaly Detection in Human Activity Recognition -- 1 Introduction -- 2 Deep Learning -- 3 Methods and Implementation -- 4 Discussions -- 5 Conclusion -- References. , Evaluation of Different Paradigms of Machine Learning Classification for Detection of Breast Carcinoma.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Online-Ressource
    Online-Ressource
    Singapore :Springer,
    Schlagwort(e): Medicine-Data processing-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (491 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811960680
    Serie: Smart Innovation, Systems and Technologies Series ; v.317
    DDC: 610.285
    Sprache: Englisch
    Anmerkung: Intro -- ICAIHC Committee -- Preface -- Acknowledgements -- Contents -- About the Editors -- 1 An Adaptive Fuzzy-Based Clustering Model for Healthcare Wireless Sensor Networks -- 1.1 Introduction -- 1.1.1 Resource Management in WSN -- 1.2 Related Work -- 1.3 Proposed Model -- 1.3.1 Fuzzy Sets and Neuro-fuzzy Logic Theory -- 1.4 Simulation and Results -- 1.5 Conclusion and Future Work -- References -- 2 Artificial Pancreas (AP) Based on the JAYA Optimized PI Controller (JAYA-PIC) -- 2.1 Introduction -- 2.2 Problem Statements Formulations -- 2.2.1 Clinical Information -- 2.2.2 Simulation Model -- 2.2.3 MID -- 2.2.4 Patient Output -- 2.3 Control Algorithms -- 2.3.1 Development of JAYA-PIC -- 2.4 Results -- 2.4.1 JAYA-PIC Action in Patient -- 2.4.2 Analysis of Control Actions -- 2.5 Conclusions -- References -- 3 Security Issues and Solutions for Reliable WBAN-Based e-Healthcare Systems: A Systematic Review -- 3.1 Introduction -- 3.2 Methodology -- 3.3 Secured WBAN Requirements -- 3.3.1 Security Paradigms for WBAN -- 3.3.2 Security Needs in WBAN -- 3.4 Security Solutions -- 3.5 Case Studies on WBAN Prototypes -- 3.6 Conclusion -- References -- 4 Brain Tumour Detection by Multilevel Thresholding Using Opposition Equilibrium Optimizer -- 4.1 Introduction -- 4.2 Multilevel Thresholding Based on Entropy -- 4.2.1 Multilevel Thresholding: A Mathematical Approach -- 4.2.2 Entropy Functions -- 4.3 Opposition Equilibrium Optimizer (OEO) -- 4.4 Proposed Brain Tumour Detection Method Using OEO-Based Multilevel Thresholding Approach -- 4.5 Results and Discussion -- 4.6 Conclusion -- References -- 5 RescuePlus -- 5.1 Introduction -- 5.2 Literature Review -- 5.3 Existing Solution -- 5.4 Proposed Solution -- 5.5 Result -- 5.6 Future Scope -- 5.7 Conclusion -- References -- 6 Skeletal Bone Age Determination Using Deep Learning -- 6.1 Introduction -- 6.2 Methodology. , 6.2.1 Data Set Selection -- 6.2.2 Data Pre-processing -- 6.3 Custom Model -- 6.3.1 Model Architecture -- 6.3.2 Approaches -- 6.4 Experiments -- 6.4.1 Loss Functions -- 6.4.2 Comparing with Pre-trained Models -- 6.5 Conclusion -- References -- 7 Chimp Optimization Algorithm-Based Feature Selection for Cardiac Image-Based Heart Disease Diagnosis -- 7.1 Introduction -- 7.2 Chimp Optimization Algorithm-Based Feature Selection for Heart Disease Diagnosis -- 7.2.1 Pre-processing -- 7.2.2 Feature Extraction -- 7.2.3 Feature Selection Using ChOA -- 7.2.4 Classification Using SVNN -- 7.3 Results and Discussion -- 7.4 Conclusion -- References -- 8 The Hospitality Industry's Impact on the COVID-19 Epidemic: A Case Study of Ukraine -- 8.1 Introduction -- 8.2 Literature Review -- 8.3 Research Methods -- 8.4 Results -- 8.4.1 State and Legal Measures -- 8.5 Conclusion -- References -- 9 Society in Front of a COVID-19 Pandemic: India Versus Ukraine -- 9.1 Introduction -- 9.1.1 Research Background -- 9.2 Research Methods and Materials -- 9.3 Results -- 9.3.1 The Speed of Virus Spreading -- 9.3.2 The Risk and Danger Rate Estimation -- 9.4 The Level of Trust in the National Healthcare System and the Satisfaction of Government's Response to COVID-19 Situation -- 9.5 The Emotions and General Psychological State of Respondents -- 9.6 Conclusions -- Notes -- References -- 10 Breast Cancer Detection Using Concatenated Deep Learning Model -- 10.1 Introduction -- 10.2 Proposed Methodology -- 10.2.1 Convolutional Neural Network -- 10.2.2 LSTM -- 10.3 Result Analysis -- 10.3.1 Dataset Description -- 10.4 Conclusion -- References -- 11 Recommendation of Pesticides Based on Automation Detection of Citrus Fruits and Leaves Diseases Using Deep Learning -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Proposed Work -- 11.3.1 Image Acquisition and Preprocessing. , 11.3.2 Image Segmentation -- 11.3.3 Diseases Prediction -- 11.3.4 Experimental Results -- 11.3.5 Fertilizer Recommendation -- 11.4 Conclusion -- References -- 12 Comprehensive Information Retrieval Using Fine-Tuned Bert Model and Topic-Assisted Query Expansion -- 12.1 Introduction -- 12.2 Review of Literature -- 12.3 Comprehensive Information Retrieval -- 12.3.1 BERT Model -- 12.3.2 Topic Modelling Using Latent Dirichlet Allocation -- 12.3.3 The Proposed CIR Architecture -- 12.4 The Proposed Approach -- 12.5 Experimental Results -- 12.5.1 Dataset -- 12.5.2 Evaluation Metrics -- 12.5.3 Performance Evaluations -- 12.5.4 Performance Comparison -- 12.5.5 Discussions -- 12.6 Conclusion -- References -- 13 Diabetic Retinopathy Detection Using CNN Model -- 13.1 Introduction -- 13.2 Related Work -- 13.3 Dataset Used -- 13.3.1 Overview -- 13.3.2 Augmentation -- 13.4 Defining CNN Model -- 13.4.1 Summary of Model Architecture -- 13.4.2 Model Layers -- 13.4.3 Loss Function -- 13.5 Result -- 13.6 Conclusion -- References -- 14 Digi-CANE-An IoT Savior for Visually Sensitive -- 14.1 Introduction -- 14.2 Literature Survey -- 14.3 Objective -- 14.4 General Flowchart -- 14.5 The Sensory Architecture -- 14.5.1 Emergency Sensor (Gyroscope) -- 14.5.2 Cane Module -- 14.5.3 Ultrasonic Sensor -- 14.5.4 Buzzer -- 14.5.5 Arduino Uno -- 14.5.6 Working -- 14.6 Circuit Diagram -- 14.6.1 Hardware Details -- 14.6.2 Working of Ultrasonic Sensor (HC-SR04) -- 14.6.3 Software Requirement Arduino IDE -- 14.7 Conclusion and Future Scope -- References -- 15 Link Performance in Community Detection Using Social Network -- 15.1 Introduction -- 15.2 Literature Review -- 15.3 Methods -- 15.4 Metrics -- 15.5 Experimental Results -- 15.6 Discussion -- 15.7 Conclusion -- References -- 16 Analyze Ego-Centric Nodes in Social Network Using Machine Learning Technique -- 16.1 Introduction. , 16.2 Review of Literature -- 16.3 Materials and Method -- 16.4 Link Influence Strategies -- 16.5 Result and Discussion -- 16.6 Conclusion -- 16.7 Future Enhancement -- References -- 17 5G Revolution Transforming the Delivery in Healthcare -- 17.1 Introduction -- 17.2 Literature Review -- 17.3 Features of 5G Technology -- 17.4 Problems Posed by Current Healthcare Industry -- 17.4.1 Lack of Universal Access -- 17.4.2 Long-Term Chronic Care Burden -- 17.4.3 Aging Population -- 17.4.4 Resource Constraints and Healthcare Disparities -- 17.5 Areas in Healthcare that 5G Will Boost -- 17.5.1 Imaging -- 17.5.2 Diagnostics -- 17.5.3 Data Analytics and Treatment -- 17.6 New Realms that 5G Will Enable -- 17.7 Real-World Trials -- 17.8 Positive Impacts of 5G on Our Healthcare System -- 17.9 Recommendations -- 17.10 Conclusion and Future Works -- References -- 18 A Systematic Review of AI Privileges to Combat Widen Threat of Flavivirus -- 18.1 Significance of AI in Flavivirus Disease Eradication -- 18.1.1 AI in Healthcare -- 18.1.2 Flavivirus-A Detailed Synopsis -- 18.1.3 Flavivirus Characteristics -- 18.1.4 Flavivirus Lifecycle -- 18.1.5 Flavivirus Epidemiology -- 18.2 Detection and Estimation of Flavivirus Disease with Machine Learning Models -- 18.3 Conclusions and Future Direction -- References -- 19 Early Detection of Sepsis Using LSTM Neural Network with Electronic Health Record -- 19.1 First Section -- 19.2 Method -- 19.2.1 Sepsis Data Preprocessing -- 19.2.2 LSTM Model -- 19.3 Result and Discussion -- 19.4 Conclusion -- References -- 20 Detection of COVID-19 Infection from Clinical Findings Using Machine Learning Algorithm -- 20.1 Introduction -- 20.2 Related Works -- 20.3 Materials and Methods -- 20.3.1 Medical Dataset Used -- 20.3.2 Data Preprocessing -- 20.3.3 Feature Selection -- 20.3.4 Classification Algorithms. , 20.4 Performance Evaluation and Results -- 20.4.1 Evaluation Measures -- 20.4.2 Results -- 20.5 Conclusion -- References -- 21 Development of Real-Time Cloud Based Smart Remote Healthcare Monitoring System -- 21.1 Introduction -- 21.2 System Framework -- 21.3 System Modeling -- 21.4 Results and Discussion -- 21.5 Conclusion -- References -- 22 Performance Analysis of Hyperparameters of Convolutional Neural Networks for COVID-19 X-ray Image Classification -- 22.1 Introduction -- 22.2 CNN and Its Optimizers -- 22.3 Experimental Results -- 22.4 Conclusion -- References -- 23 Sequence Rule Mining for Insulin Dose Prediction Using Temporal Dataset -- 23.1 Introduction -- 23.2 Literature Review -- 23.3 Definitions -- 23.3.1 Sequential Rule Mining -- 23.3.2 Support and Confidence -- 23.3.3 Sequence Rule Mining Algorithms -- 23.4 Methodology -- 23.5 Experiment Work -- 23.5.1 Dataset Used -- 23.5.2 Result and Discussion -- 23.6 Conclusion -- 23.7 Future Scope -- References -- 24 Ensemble Deep Learning Approach with Attention Mechanism for COVID-19 Detection and Prediction -- 24.1 Introduction -- 24.2 Related Work -- 24.3 Proposed Model -- 24.4 Data sets, Experiments, and Results -- 24.5 Conclusion and Future Scope -- References -- 25 Semantic Segmentation of Cardiac Structures from USG Images Using Few-Shot Prototype Learner Guided Deep Networks -- 25.1 Introduction -- 25.2 Proposed Work -- 25.2.1 Prototype Learner -- 25.2.2 Segmentor -- 25.3 Experiments -- 25.3.1 Dataset Description and Measures Used -- 25.3.2 Parameters -- 25.3.3 Results and Analysis -- 25.4 Conclusion -- References -- 26 Quantification of Homa Effect on Air Quality in NCR, India: Pollution and Pandemic Challenges in Cities and Healthcare Remedies -- 26.1 Introduction -- 26.1.1 Air Quality Global Challenge in Twenty-First Century -- 26.1.2 How Yajna and Vedic Rituals May Curb Pollution. , 26.2 Literature Review.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Schlagwort(e): Decision making-Data processing. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (617 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811927683
    Serie: Smart Innovation, Systems and Technologies Series ; v.260
    DDC: 658.403
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- About the Editors -- Decision Support Systems -- Enterprise Performance Management Optimization Based on Big Data -- 1 The Role of Big Data in the Optimization of Enterprise Performance Management -- 2 Problems Existing in the Implementation of Enterprise Performance Management in the Context of Big Data -- 3 Optimize the Path of Enterprise Performance Management -- 3.1 Improve Enterprise Human Resource Management Mode -- 3.2 Improve Performance Management Awareness -- 3.3 The Construction of Information System -- 3.4 Big Data Technology Should Be Combined with Business Philosophy -- 3.5 Establish a Corporate Culture System Matching Big Data Performance Management -- 4 Conclusion -- References -- The Study on Optimal Green Supply Chain of New Energy Vehicles -- 1 Introduction -- 2 Model Construction and Analysis -- 2.1 Model Assumptions -- 2.2 Model Construction -- 2.3 Single Factor Allocation Scheme -- 2.4 Comprehensive Factors Benefit Distribution Plan -- 3 Rationality and Feasibility Analysis of the Model -- 3.1 Overview of the Case Enterprise and Profit Distribution -- 3.2 Calculation of Profit Distribution of Case Enterprise and Supply Chain Benefit Distribution of Single Factor -- 3.3 Profit Distribution of Comprehensive Factors -- 3.4 Comparative Analysis of Benefit Distribution Results -- 4 Conclusion and Recommendations -- References -- Research on the Application of Big Data Technology in the Process of Cross-Border E-Commerce Product Selection -- 1 The Basic Cognition of Big Data Technology in Cross-Border E-Commerce Field -- 1.1 Conceptual Recognition of Big Data Technology -- 1.2 The Application Value of Big Data in Cross-Border E-Commerce -- 2 The Main Problems of Cross-Border E-Commerce Product Selection -- 2.1 Isolated Data Islands -- 2.2 Product Homogenization. , 2.3 Localization of Product Selection -- 3 Data Dimension Analysis When Big Data Technology Is Applied to Cross-Border E-Commerce Product Selection -- 3.1 Data Dimension Analysis on Cross-Border E-Commerce Platforms -- 3.2 Dimensional Analysis of Cross-Border E-Commerce Customer Data -- 4 Cross-Border E-Commerce Product Selection Strategies Using Big Data Technology -- 4.1 Determine the Product Line on the Cross-Border E-Commerce Platforms -- 4.2 Determine the Target Customer Group -- 4.3 Combine Marketing and Promotion Strategies -- 5 Prospects of Applying Big Data Technology to Cross-Border E-Commerce Product Selection -- References -- Construction of a Decision Model for the Evaluation System of Practical Teaching Quality Based on AHP -- 1 Introduction -- 2 General Situation of the Practical Teaching Mode of Vocational Education -- 2.1 General Situation of Foreign Vocational Education Practice Teaching Mode -- 2.2 General Situation of Practical Teaching Mode in Domestic -- 3 Analysis of the Quality Evaluation of Practical Teaching -- 4 AHP Model Overview -- 4.1 Construct the Hierarchical Model -- 4.2 Construct a Pairwise Comparison Judgment Matrix and Assign Values -- 4.3 Hierarchical List Sorting and Consistency Check -- 4.4 Level Total Ranking and Consistency Test -- 5 Construction of Evaluation System of Practical Training -- 5.1 Constructing the Evaluation Model -- 5.2 Constructing the Evaluation Index System of Practical Teaching Quality -- 5.3 Scoring Criteria for Secondary Indicators -- 6 Conclusion -- References -- Live Stream and Willingness to Buy: The Interactivity Between Loneliness and Para-social Interaction -- 1 Introduction -- 2 Literature Review and Research Hypothesis -- 2.1 Literature Review -- 2.2 Research Hypothesis -- 3 Study I -- 3.1 Study Design and Process -- 3.2 Data Results and Discussion -- 4 Study II. , 4.1 Study Design and Process -- 4.2 Data Results and Discussion -- 5 Conclusions and Discussion -- 5.1 Conclusion -- 5.2 Theoretical Contributions -- 5.3 Management Implications -- 5.4 Research Shortcomings and Future Perspectives -- References -- Research on Support Capability Evaluation of Road Emergency Transport Support Series Equipment Based on Disaster Condition Emergency Transport Task -- 1 Introduction -- 2 Equipment Support Capability Model Based on Disaster Conditions -- 2.1 Equipment Support Task Analysis -- 2.2 Equipment Support Capability Indicators -- 3 Fuzzy Comprehensive Evaluation Model -- 3.1 Determine the Factor Domain of the Evaluation Object -- 3.2 Determine the Grading Theory Domain of Comments -- 3.3 Establish Fuzzy Relation Matrix -- 3.4 Determine the Weight Vector of Evaluation Factors -- 3.5 Synthesize the Fuzzy Comprehensive Evaluation Result Vector -- 4 Application Analysis of Road Emergency Transport Equipment Support Capability -- 4.1 Weight Analysis -- 4.2 Quantitative Analysis of Indicators -- 4.3 Evaluation Results -- 5 Conclusion -- References -- Research on Emergency Decision-Making Ability of College Student Management Team Based on Prospect Theory -- 1 The Basic Model and Applicability Analysis of Prospect Theory -- 1.1 Basic Model of Prospect Theory -- 1.2 Analysis of the Applicability of Prospect Theory in the Emergency Decision-Making Ability of College Student Management Teams -- 2 The Status Quo of Emergency Management Decision-Making of College and University Student Teams Based on Prospect Theory -- 2.1 The Pre-prevention and Response to Emergency Management in Colleges and Universities Is Insufficient -- 2.2 Improper Response to Emergency Management in Colleges and Universities -- 2.3 The Ability of Colleges and Universities to Guide Emergency Management After the Fact Is Weak. , 3 The Impact and Challenge of Emergencies on the Decision-Making Ability of Emergency Management in Colleges and Universities -- 3.1 Impact on the Organization of Early Warning Emergency Monitoring and Emergency Decision-Making -- 3.2 Challenges to Emergency Management Work Plans, Decision-Making Ability and Working Procedures -- 4 Optimize the Path of Emergency Management for University Student Management Team to Deal with Emergencies -- 4.1 Improve the Emergency Decision-Making Management Organization and the Emergency Decision-Making System -- 4.2 Prevent Online Public Opinions of Emergencies, Improve Work Plans and Standardize Decision-Making Procedures of Emergency Management -- 4.3 Unblock Emergency Information Channels, Do a Good Job in Summarizing Afterward, and Restore Campus Order -- References -- Analysis on the Present Situation and Countermeasures of Employment Decision-Making of College Graduates -- 1 Introduction -- 2 Current Situation of College Graduates' Employment Decision-Making -- 3 Analysis and Integration of Related Research -- 4 Problems Existing in Employment Decision-Making of College Graduates -- 4.1 Cognitive Limitations -- 4.2 Insufficient Employment Information Obtained -- 4.3 Lack of Ability to Make Employment Decisions -- 5 Effective Countermeasures for Employment Decision-Making of College Graduates -- 5.1 Improve the Metacognitive Level of Graduates -- 5.2 Broaden Access to Employment Information -- 5.3 Broaden Access to Employment Information -- 6 Research Implications and Prospects -- References -- Research on Multi-objective Decision Making of Hydropower Station Group Based on CRITIC-TOPSIS Method -- 1 Introduction -- 2 Principle -- 2.1 Comprehensive Evaluation Method Based on CRITIC Weight -- 2.2 Distance-Based Multi-objective Decision-Making Method -- 3 Methods and Procedures. , 3.1 Index Weight Is Obtained Through CRITIC -- 3.2 Solution Ranking Preferences Using the TOPSIS Method -- 4 Case Analysis -- 4.1 Determination of Evaluation Indicators and Attribute Values -- 4.2 Program Evaluation Results -- 4.3 Comparative Analysis of Results with Traditional Multi-objective Decision-Making Methods -- 4.4 Further Preferences in Context -- 5 Conclusion -- References -- Analysis of Influencing Factors of Resident Consumption Level and Establishment of Decision-Making Management Mechanism-Taking Shaanxi Province as an Example -- 1 Research Background -- 1.1 Research Purpose and Significance -- 1.2 Research Contents and Methods -- 2 Current Consumption Level of Residents in Shaanxi Province -- 2.1 Empirical Analysis -- 2.2 Parameter Estimation of the Model -- 2.3 Correlation Analysis -- 3 Analysis Results and Conclusions -- 4 Establish a Scientific Decision-Making Management Mechanism -- 4.1 Developing Industries with Distinctive Features -- 4.2 Narrow the Gap Between Rich and Poor -- 4.3 The Country Should Enhance the Willingness to Consume -- References -- Research on Social Atomization Risk and Governance Decision Making in Emerging Community -- 1 Research Status of Social Atomized and Complex Agent Network Models -- 1.1 Research Status of Social Atomization -- 1.2 Research Status of Complex Agent Network Models -- 1.3 Comprehensive Review -- 2 Investigation and Hypothesis of Atomization of Emerging Community Society -- 2.1 Assumption of Model Construction -- 2.2 Artificial Network Social Evolution Simulation Process -- 2.3 Countermeasure Pilot Experiment and Simulation Test -- 3 Summary and Analysis -- References -- An Empirical Study on the Influence of Internal Control Environment on the Quality of Accounting Information of Listed Companies -- 1 Introduction. , 2 The Theoretical Basis of the Influence of Internal Control Environment on Accounting Information Quality.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Singapore :Springer,
    Schlagwort(e): Intelligent agents (Computer software). ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (626 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811698736
    Serie: Smart Innovation, Systems and Technologies Series ; v.286
    DDC: 004.6782
    Sprache: Englisch
    Anmerkung: Intro -- Committees -- Chief Patron -- Patrons -- Finance Chair -- General Chair -- International Advisory Committee -- Program Chair -- Program Committee -- Organizing Chair -- Organizing Co-chair -- Conference Coordinator -- Convener -- Co-convenor -- Technical Program Committee Chairs -- Preface -- Contents -- About the Editors -- Part I Cloud Computing, Image Processing, and Software -- 1 An Intelligent Online Attendance Tracking System Through Facial Recognition Technique Using Edge Computing -- 1.1 Introduction -- 1.1.1 Motivation and Contribution -- 1.1.2 Organization of the Paper -- 1.2 Related Works -- 1.2.1 In the Year 2017 -- 1.2.2 In the Year 2018 -- 1.2.3 In the Year 2019 -- 1.2.4 In the Year 2020 -- 1.3 Significance of Edge Computing for Online Attendance Tracking System -- 1.4 Methodology -- 1.4.1 Student Registration -- 1.4.2 Faculty Registration -- 1.4.3 Image Capture -- 1.4.4 Face Detection -- 1.4.5 Extraction of Face Encodings -- 1.4.6 Face Recognition -- 1.4.7 Attendance Updation -- 1.5 Practical Implementation -- 1.6 Results and Discussion -- 1.7 Conclusion and Future Work -- References -- 2 Cloud Analytics: An Outline of Tools and Practices -- 2.1 Introduction -- 2.2 Related Work -- 2.3 Exploring the Ideology in Cloud-Based Analytics -- 2.4 Cloud Analytics Platforms -- 2.4.1 Qlik Sense Enterprise -- 2.4.2 Tableau -- 2.4.3 IBM Watson Analytics -- 2.4.4 Microsoft Power BI -- 2.4.5 TIBCO Spotfire X -- 2.4.6 SAS Business Analytics -- 2.5 Discussions -- 2.5.1 Benefits to Cloud-Based Analytics -- 2.5.2 Overview of Emerging Trends -- 2.6 Conclusion -- References -- 3 An Enhanced Fault-Tolerant Load Balancing Process for a Distributed System -- 3.1 Introduction -- 3.2 Background -- 3.2.1 Related Work -- 3.3 Proposed Enhanced Load Balancing Scheme with Resource Failure Rate Consideration -- 3.4 Simulated Results -- 3.4.1 Results. , 3.5 Conclusion -- References -- 4 HeartFog: Fog Computing Enabled Ensemble Deep Learning Framework for Automatic Heart Disease Diagnosis -- 4.1 Introduction -- 4.2 Related Works -- 4.3 HeartFog Architecture -- 4.3.1 Technology Used -- 4.3.2 Hardware Components Used -- 4.3.3 Software Components Used -- 4.4 HeartFog Design -- 4.4.1 Dataset -- 4.4.2 Heart Patient Data Pre-processing -- 4.4.3 Ensemble DL Application -- 4.4.4 Android Interface and Communication -- 4.4.5 Experimental Set-Up -- 4.4.6 Implementation -- 4.5 Results and a Discussion -- 4.6 Conclusion and Future Scope -- References -- 5 A Cloud Native SOS Alert System Model Using Distributed Data Grid and Distributed Messaging Platform -- 5.1 Introduction -- 5.2 Related Work -- 5.3 Preliminaries -- 5.3.1 ZooKeeper as Cluster Coordinator -- 5.3.2 Kafka as a Data Streaming Platform -- 5.3.3 Ignite as the In-Memory Data Grid -- 5.4 Proposed Architecture -- 5.5 Implementation -- 5.6 Conclusion -- References -- 6 Efficient Peer-to-Peer Content Dispersal by Spontaneously Newly Combined Fingerprints -- 6.1 Introduction -- 6.2 Literature Review -- 6.3 Proposed Work -- 6.3.1 Overview -- 6.3.2 Framework Architecture -- 6.3.3 Content Uploading and Splitting -- 6.3.4 Fingerprint Detection -- 6.3.5 Content Distribution -- 6.3.6 Anonymous Communication Protocol -- 6.3.7 Identification of Illegal Distribution -- 6.4 Experimental Results -- 6.4.1 Content Uploading and Splitting -- 6.4.2 Fingerprint Generation -- 6.4.3 Content Distribution -- 6.4.4 Identifying and Preventing Illegal Redistribution -- 6.5 Conclusion -- References -- 7 An Integrated Facemask Detection with Face Recognition and Alert System Using MobileNetV2 -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Methodology -- 7.3.1 Facemask Detection Model -- 7.3.2 The Face-Recognition Model -- 7.3.3 Database -- 7.3.4 Web Application -- 7.4 Results. , 7.5 Conclusion -- References -- 8 Test Case Generation Using Metamorphic Relationship -- 8.1 Introduction -- 8.2 Usability of Successful Test Cases -- 8.3 The Formalization and Insight of Metamorphic Testing -- 8.4 Conclusion -- References -- Part II IoT/Network -- 9 IRHMP: IoT-Based Remote Health Monitoring and Prescriber System -- 9.1 Introduction -- 9.2 Previous Work -- 9.2.1 Architecture -- 9.2.2 Communication Protocol -- 9.3 IRHMP-IoT-Based Remote Health Monitoring and Prescriber System -- 9.3.1 Architecture -- 9.3.2 Functionalities Doctor -- 9.3.3 Implementation Working -- 9.4 Conclusion -- References -- 10 On Boundary-Effects at Cellular Automata-Based Road-Traffic Model Towards Uses in Smart City -- 10.1 Introduction -- 10.2 Review of the State-of-the-Art Available Works -- 10.3 Proposed Empirical Investigation -- 10.3.1 Search for More ECA Rules Toward Uses in Road-Traffic Simulation -- 10.3.2 Investigations on ECA Dynamics Toward Road-Traffic Simulation at Various Fixed-Boundary Situations -- 10.4 Detailed Discussions -- 10.5 Conclusive Remarks -- References -- 11 An Optimized Planning Model for Management of Distributed Microgrid Systems -- 11.1 Introduction -- 11.1.1 Components of a Micro Grid -- 11.1.2 Type of Micro Grid -- 11.2 Literature Survey -- 11.3 Proposed Model -- 11.3.1 Methodology -- 11.4 Results and Discussion -- 11.4.1 For PV System -- 11.4.2 For Wind System -- 11.4.3 For Fuel Cells Power Generating Systems -- 11.5 Conclusions -- References -- 12 Hard and Soft Fault Detection Using Cloud Based VANET -- 12.1 Introduction -- 12.2 Literature Study -- 12.3 Proposed Approach -- 12.3.1 Hard Permanent Fault Detection -- 12.3.2 Soft Fault Diagnosis -- 12.3.3 Fault Status Transmission Through Vehicular Cloud -- 12.4 Simulation Experiments and Discussions -- 12.5 Conclusion -- References. , 13 A Novel Intelligent Street Light Control System Using IoT -- 13.1 Introduction -- 13.2 Related Works -- 13.3 State of Art -- 13.3.1 Node MCU -- 13.3.2 PIR Sensor -- 13.3.3 Channel Relay -- 13.3.4 LDR -- 13.4 Proposed System -- 13.5 Features of Smart Street Light System -- 13.6 Results and Discussion -- 13.7 Conclusion and Future Scope -- References -- 14 Enhancing QoS of Wireless Edge Video Distribution using Friend-Nodes -- 14.1 Introduction -- 14.2 System Model -- 14.3 Video Dissemination Architecture -- 14.4 Simulation and Results -- 14.5 Conclusion -- References -- 15 Groundwater Monitoring and Irrigation Scheduling Using WSN -- 15.1 Introduction -- 15.2 Materials and Method -- 15.2.1 System Design -- 15.2.2 Data Collection -- 15.2.3 Hardware -- 15.2.4 Software and Database -- 15.2.5 Groundwater Level Measurement and Pumping Time -- 15.2.6 Crop Water Demand -- 15.2.7 Irrigation Water Requirements -- 15.2.8 Energy Consumption -- 15.2.9 Process Flow Diagram -- 15.2.10 Dashboard -- 15.3 Results -- 15.3.1 Discharge and Recharge of Groundwater -- 15.3.2 Electricity Consumption -- 15.3.3 Crop Water Demand -- 15.4 Conclusion -- References -- 16 A Soft Coalition Algorithm for Interference Alignment Under Massive MIMO -- 16.1 Introduction -- 16.2 System Model -- 16.3 Proposed Model -- 16.4 Experiment Results -- 16.5 Conclusion -- References -- Part III Optimization and Nature Inspired Methods -- 17 Improved Grasshopper Optimization Algorithm Using Crazy Factor -- 17.1 Introduction -- 17.2 Grasshopper Optimization Algorithms -- 17.2.1 Basic Grasshopper Optimization Algorithm (GOA) -- 17.2.2 Improved GOA with Crazy Factor (Crazy-GOA) -- 17.3 Result Analysis -- 17.4 Conclusion -- References -- 18 Reliability Estimation Using Fuzzy Failure Rate -- 18.1 Introduction -- 18.2 Reliability Using Fuzzy System -- 18.3 Discussion -- 18.4 Illustration. , 18.5 Conclusion -- References -- 19 A Sine Cosine Learning Algorithm for Performance Improvement of a CPNN Based CCFD Model -- 19.1 Introduction -- 19.2 Proposed SCA-CPNN-Based CCFD Model -- 19.2.1 Evaluation Criteria -- 19.3 Experimental Result Discussion -- 19.4 Conclusion -- References -- 20 Quality Control Pipeline for Next Generation Sequencing Data Analysis -- 20.1 Introduction -- 20.2 Background and Related Work -- 20.3 Datasets -- 20.4 Methods and Material -- 20.4.1 Duplicate Removal and Trimming -- 20.4.2 NGS Dataset -- 20.4.3 NULL Value Removal -- 20.4.4 Normalization -- 20.4.5 Dimensionality Reduction -- 20.5 Result Discussion -- 20.5.1 The Differentially Expressed Genes and Outlier Detection Visualization -- 20.5.2 The Differentially Expressed Gene Selection Using Dimension Reduction -- 20.6 Conclusion and Future Work -- References -- 21 Fittest Secret Key Selection Using Genetic Algorithm in Modern Cryptosystem -- 21.1 Introduction -- 21.1.1 Background -- 21.1.2 Motivation -- 21.1.3 Contribution -- 21.2 Preliminaries -- 21.2.1 Illustration of AVK -- 21.2.2 Genetic Algorithm -- 21.3 Proposed Work -- 21.4 Experiment Examples -- 21.5 Experiment Results -- 21.6 Performance Analysis -- 21.7 Randomness Verification -- 21.8 Conclusion -- 21.9 Future Work -- References -- 22 Variable Step Size Firefly Algorithm for Automatic Data Clustering -- 22.1 Introduction -- 22.2 Related Work -- 22.3 Variable Step Size Firefly Algorithm -- 22.4 Result Analysis -- 22.5 Conclusion -- References -- 23 GWO Based Test Sequence Generation and Prioritization -- 23.1 Introduction -- 23.1.1 Motivation -- 23.2 Basic Concept -- 23.2.1 GWO Algorithm -- 23.2.2 Adjacency Matrix -- 23.2.3 Objective Function/Fitness Function -- 23.3 Proposed Approach -- 23.3.1 Overview -- 23.3.2 Generation of Control Flow Graph -- 23.4 Implementation -- 23.4.1 Experimental Result. , 23.4.2 Prioritization.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...