GLORIA

GEOMAR Library Ocean Research Information Access

Sie haben 0 gespeicherte Treffer.
Markieren Sie die Treffer und klicken Sie auf "Zur Merkliste hinzufügen", um sie in dieser Liste zu speichern.
feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (532 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811558870
    Serie: Advances in Intelligent Systems and Computing Series ; v.1185
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Intelligent Computing -- Multi-SoftMax Convolutional Neural Network and Its Application in the Diagnosis of Planetary Gearbox Complicated Faults -- 1 Introduction -- 2 Fault Tree Structure and Muti-SoftMax Convolutional Neural Network -- 2.1 Fault Tree Structure -- 2.2 Working Parallel Structure -- 2.3 Structure of Multi-SoftMax Convolutional Neural Network -- 3 Process of Planetary Gearbox Fault Diagnosis -- 4 Example of Planetary Gearbox Fault Diagnosis -- 4.1 Structure of Convolutional Neural Network -- 4.2 Structure of Mutil-SoftMax Convolutional Neural Network -- 5 Experiment -- 6 Conclusion -- References -- Signal Complexity Measure Based on Construction Creep Rate in 3s Feature Space -- 1 Introduction -- 2 Methodology -- 2.1 0-1 Test for Chaos Review -- 2.2 New Algorithm (Spring Test) Block of 3s Plot and CC Rate -- 2.3 Two Equations as Test Cases -- 3 Results and Discussions -- 3.1 Results from pq-Plot of 0-1 Test to 3s Plot and CC Rate in Spring Test -- 3.2 Key Self-similarity Measure Threshold γ Locking in Max Complexity -- 4 Conclusions -- References -- Research on Partition Technology of Real-Time Database in Big Data Environment -- 1 The Introduction -- 2 Design of Tual-Time Partition Database System for Flow Computing -- 3 Implementation of Real-Time Partition System -- 4 Audit and Effect of System Effectiveness -- 5 Summary -- References -- RCS Sequence Period Estimation Method Based on Constant False Alarm Detection -- 1 Introduction -- 2 Periodic Movement Target Characteristics -- 3 Periodic Discriminant Method for Constant False Alarm Detection -- 3.1 Periodic Discriminant Method for Constant False Alarm Detection -- 3.2 Effectiveness Analysis -- 4 Experimental Verification -- References -- Target Recognition of RCS Sequence Based on Neural Network. , 1 Introduction -- 2 Build the Attitude Angle Template -- 3 Feature Extraction and Classifier Design -- 4 Neural Network Design -- References -- Encouraging Cooperation in Participatory Sensing with Reputation and Game Analysis -- 1 Introduction -- 2 System Model -- 3 Trust Model and Game Analysis -- 3.1 Trust Model -- 3.2 Game Model -- 3.3 Repeated Game Analysis -- 4 Conclusion -- References -- Multi-granularity Attribute Sentiment Analysis Based on Neural Network -- 1 Introduction -- 2 Related Work -- 3 Multi-granularity Sentiment Analysis Model -- 3.1 Task Definition -- 3.2 Model -- 3.3 Multi-granularity Attention Mechanism -- 3.4 Model Training -- 4 Experiment -- 4.1 Experimental Data and Parameter Configuration -- 4.2 Method Comparison -- 4.3 Analysis of Experimental Results -- 5 Conclusion -- References -- Study on Fuzzy Crop Planning Problems Based on Credibility Theory -- 1 Introduction -- 2 Basic Principles -- 3 Fuzzy Crop Planning Problem -- 3.1 Problem with Fuzzy Income Coefficients -- 3.2 Method -- 4 Conclusion -- References -- Empirical Research on the Antecedents of Enterprise IS Users' Voice Behavior Based on the Work Behavior Theory -- 1 Introduction -- 2 Theoretical Background and Hypotheses -- 3 Research Method -- 4 Research Results -- 5 Discussion and Conclusion -- References -- Image Fusion Based on Masked Online Convolutional Dictionary Learning with Surrogate Function Approach -- 1 Introduction -- 2 The Proposed Fused Algorithm -- 2.1 Masked Online Dictionary Learning Using Surrogate Function Approach with Sparse Matrix Computation -- 2.2 The Fusion Framework -- 3 Experimental -- 4 Conclusion -- References -- The Liquid Cooling Technique Based on Foam Metal Copper -- 1 Introduction -- 2 Liquid Cooling Module Design Optimization -- 2.1 Liquid Cooling Module -- 2.2 Liquid-Cooled Radiator -- 3 Liquid Cooling Module Testing. , 3.1 Comparison Test of Liquid Cooling Module Heat Dissipation Performance Based on Liquid Cooling System -- 3.2 Comparison Test of Heat Dissipation Performance of Liquid Cooling Module Based on Self-circulating Cooling System -- 4 Conclusion -- References -- Study on the Forecast of Driving Reaction Based on PNN and FCM -- 1 Introduction -- 2 Driving Reaction Relations -- 3 Driving Reaction Sample Unified Disposal -- 4 Driving Reaction Neural Network -- 5 Road Test Data Acquisition -- 6 Applying Analyses -- 7 Conclusions -- References -- Android Malware Detection via Behavior-Based Features -- 1 Introduction -- 2 Existing Malware Detection Technology -- 2.1 Static Testing Technology of the Existing Malware Detection -- 2.2 Existing Dynamic Malware Detection Technology -- 3 The Behavior-Based Feature Recognition of Detection Technology -- 3.1 The Overall Technical Program -- 3.2 User Operator Behavior Monitoring Module -- 3.3 Software Behavior Monitoring Module -- 3.4 The Malicious Behavior Feature Recognition Module -- 4 Conclusion -- References -- Analysis of the Power Converter Used in Wind Power Generator System -- 1 Introduction -- 2 Power Converter Topology for Wind Power System -- 2.1 Two-Level Voltage Source Converter -- 2.2 Multilevel Voltage Source Converter -- 2.3 Matrix Converter -- 2.4 Current Source Converter -- 3 Application Status of Converters in Variable Speed Constant Frequency Wind Power System -- 3.1 Converters Commonly Used in Medium and Low Voltage Wind Power Systems -- 3.2 Control Strategy of Common Converters in Wind Power System -- 4 Development Trend of Wind Power Converter -- 5 Conclusions -- References -- Evaluation of New Energy Theory Based on Data Recovery -- 1 Introduction -- 1.1 Research Background -- 1.2 Research Methods -- 2 Data Introduction -- 2.1 Data Sources -- 2.2 Data Processing. , 3 Theoretical Power Calculation -- 4 Conclusions -- References -- Summary, Reflection, and Prospect of Wind Power Development in China -- 1 Introduction -- 2 Wind Power Development History -- 3 Wind Power Consumption Situation -- 3.1 Wind Power Generation in Provinces -- 3.2 Accommodation Capacity Index -- 3.3 Abandoned Wind Power and Abandoned Rate -- 4 Development Summary -- 5 Suggestions -- References -- Time-Varying Probability Distribution Model of High Permeability Wind Power Considering Non-stationary Characteristics -- 1 Introduction -- 2 Time-Varying Characteristics of Wind Power Probability Distribution and Spatial Correlation Coefficient -- 2.1 Time-Varying Characteristics of Probability Distribution of Single Wind Farm -- 2.2 Time-Varying Characteristics of Rank Correlation Coefficients of Multi-wind Farms -- 3 Off-Line Conditional Dependence Model Set of Edge Probability Distribution and Rank Correlation Coefficient Matrix -- 3.1 Off-Line Conditional Dependence Model Set of Probability Distribution of Single Wind Farm -- 3.2 Off-Line Conditional Dependence Model Set of Rank Correlation Coefficient Matrix of Multi-wind Farms -- 4 Time-Varying Probability Distribution Sampling Algorithm -- 5 Validity Analysis of Time-Varying Probability Distribution Modeling -- 5.1 Simulation System -- 5.2 Effect of Time-Varying Characteristics on Wind Power Characteristic Modeling -- References -- An Adaptive T-Distribution Variation Based HS Algorithm for Power System ED -- 1 Introduction -- 2 The HS Based on Adaptive T-Distribution Mutation (t-LHS) -- 2.1 HS Algorithm -- 2.2 Variation Principle of T-Distribution -- 2.3 A HS Algorithm Based on Adaptive T-Distribution Mutation (t-LHS) -- 3 The Steps of t-LHS Algorithm for Solving ED Problems -- 4 Results and Comparison -- 4.1 3-Generator System -- 4.2 40-Generator System -- 5 Conclusions -- References. , Application of Improved Particle Swarm Optimization in Economic Dispatch of Power System -- 1 Introduction -- 2 Improved Particle Swarm Optimization (IMPSO) -- 2.1 Adjustment of Parameters -- 2.2 Optimal Learning Strategies -- 2.3 Objective Function -- 2.4 Constraints -- 2.5 Steps of IMPSO Algorithms for Solving ED Problems -- 3 Experimental Analysis and Results -- 4 Conclusions -- References -- Design of an Ultra-Short-Term Wind Power Forecasting Model Combined with CNN and LSTM Networks -- 1 Introduction -- 2 Related Works -- 2.1 Wind Power Generation Power -- 2.2 CNN Network -- 2.3 LSTM Network -- 3 The Description of the Experimental Progress -- 3.1 Data Preprocessing -- 3.2 CNN Layer -- 3.3 LSTM Layer -- References -- An Algorithm for Intelligent Attack Decision-Making -- 1 Introduction -- 2 Underlying Factors -- 3 Modeling for Intelligent Decision-Making -- 4 The Process of Intelligent Decision-Making -- 5 Achievement of the System -- 6 Conclusion -- References -- Wavelet Packet Energy Entropy Based Feature Analysis of Seismic Signals from Vehicle Targets -- 1 Foreword -- 2 Time-Frequency Feature of Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 2.1 Test for Seismic Signals from Vehicle Targets -- 2.2 Wavelet Packet Transformation of Seismic Signals from Vehicle Targets -- 3 Energy Entropy Feature Extraction for Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 3.1 Wavelet Packet Transformed Energy Entropy -- 3.2 Extraction of Energy Entropy Feature of Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 4 Conclusion -- References -- Group Decision-Making Approach Under Interval-Valued Dual Hesitant Fuzzy Unbalanced Uncertain Linguistic Environments and Its Application to Community Tourism Resilience Evaluation -- 1 Introduction. , 2 Weighted Power Aggregation Operator with IVDHFUUBLS Information.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Cloud computing-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (676 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811562020
    Serie: Smart Innovation, Systems and Technologies Series ; v.153
    DDC: 004
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- About the Editors -- Internet of Things (IOT) -- An Energy-Efficient Data Routing in Weight-Balanced Tree-Based Fog Network -- 1 Introduction -- 1.1 Fog Computing -- 1.2 Tree-Based Architecture -- 1.3 Data Routing -- 1.4 Green Computing -- 2 Related Works -- 3 Proposed Architecture Towards Fog Networks -- 4 Discussions -- 5 Conclusions and Future Work -- References -- A Systematic Overview of Fault Tolerance in Cloud Computing -- 1 Introduction -- 2 Basic Components of Cloud Computing -- 3 Characteristics of Cloud Computing -- 4 Cloud Deployment Models -- 5 Cloud Service Models -- 6 Fault Tolerance -- 7 Fault Tolerance in Cloud Computing -- 7.1 Fault Tolerance Approaches -- 7.2 Fault Tolerance Parameters -- 8 Conclusion -- References -- An EPIC Mechanism for Advertising the Tourist Spots in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 System Model and Problem Formulation -- 4 Tourist Spots Advertisement Problem: Posted Price Mechanism -- 4.1 Outline of PPM-TSAP -- 4.2 Detailing of PPM-TSAP -- 4.3 Illustrative Example -- 4.4 Running Time of PPM-TSAP -- 5 Conclusion and Future Work -- References -- Data Analysis and Prediction of Terror Component Using Web Services -- 1 Introduction -- 2 Background -- 2.1 Intrusion Detection System (IDS) -- 2.2 Vector Space Model -- 2.3 Receiver Operator Characteristic (ROC) Curve -- 3 Content-Based Detection of Terror-Related Activity -- 3.1 Detection Environment -- 4 Detection of Typical Terrorist Behavior -- 5 Experimental Settings -- 5.1 Evaluation Measure -- 6 Result Summarization -- 7 Deployment Issues -- 8 Conclusion -- References -- Facial Expression Recognition System (FERS): A Survey -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Discussion and Comparison of Results -- 5 Conclusion -- References. , Load Balancing of Tasks in Cloud Computing Using Fault-Tolerant Honey Bee Foraging Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Load Balancing in Cloud Computing -- 2.2 Fault Tolerance in Cloud Computing -- 2.3 Honey Bee Behaviour Inspired Load Balancing -- 2.4 Motivation -- 3 Proposed Work and Implementation -- 4 Conclusion and Future Work -- References -- Flip Learning: A Novel IoT-Based Learning Initiative -- 1 Introduction -- 2 Related Works -- 3 Level-Based Approach -- 3.1 Collaborative Learning Within the Campus -- 3.2 Middle Product -- 3.3 Customized Learning Out of the Campus -- 4 Technical Aspects -- 4.1 Mix of IoT and Cloud -- 4.2 Information Management Framework -- 4.3 Content Delivery Network -- 4.4 Use of AI -- 4.5 Virtual and Augmented Reality -- 4.6 Data Security in Network -- 5 Conclusion -- References -- Improvement of Load Balancing in Shared-Memory Multiprocessor Systems -- 1 Introduction -- 2 Overview on Prior Algorithms and Techniques -- 2.1 Static Scheduling -- 2.2 Dynamic Scheduling -- 3 Result and Discussion -- 3.1 The Mandelbrot Set [3] -- 4 Conclusion -- References -- Building Amazon Web Services Infrastructure from the Scratch for an Organization -- 1 Introduction -- 2 Proposed Work and Implementation -- 3 Conclusion and Future Work -- References -- Fault Detection for VANET Using Vehicular Cloud -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Simulation Result and Discussion -- 5 Conclusion and Future Scope -- References -- An Approach to Cohort Selection in Cloud for Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of the Proposed Approach -- 4 Cohort Selection Mechanism -- 4.1 Feature Extraction -- 4.2 Finding of Match Score -- 5 Database and Results -- 6 Conclusion -- References. , Internet of Things (IoT) Framework Deployment Template for Cloud-Based Harbor Surveillance and Ferry Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Model Building -- 3.1 Data Set and Test -- 4 Discussions -- 5 Conclusion -- References -- Art of Style Transfer Using Convolutional Neural Network: A Deep Learning Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Used -- 2.2 Model for Image Classification -- 2.3 Convolutional Neural Network Training Process for Style Transfer -- 3 Experimental Results -- 3.1 Experimental Steps -- 4 Conclusion and Findings -- References -- Impact of Internet of Things (IoT) on 5G -- 1 Introduction -- 2 IoT Challenges -- 3 5G Challenges -- 4 5G Characteristics and Their Values/Applications -- 4.1 5G on IoT: A Single Network for Millions of Applications -- 4.2 The Importance of 5G on the IoT -- 4.3 Application of 5G Over IoT -- 5 The Impact of 5G on IoT -- 5.1 Establishing a 5G-IoT Ecosystem -- 5.2 Future of IoT -- 5.3 Aspects of IoT on Updated 5G Technologies -- 6 Conclusion -- References -- Prediction of Exchange Rate in a Cloud Computing Environment Using Machine Learning Tools -- 1 Introduction -- 2 Machine Learning Techniques Used for Prediction Modeling Data -- 2.1 Linear Regression -- 2.2 Regression Trees -- 2.3 Decision Tree Regression -- 2.4 Boosted Trees Regression -- 2.5 Random Forest Regression -- 2.6 Neural Network Regression -- 2.7 Cloud Computing Tools -- 3 Experimental Works -- 3.1 Data set Analysis -- 3.2 Result Analysis -- 4 Conclusion -- References -- Survey on Stock Price Forecasting Using Regression Analysis -- 1 Introduction -- 2 Literature Review -- 3 Regression -- 4 Regression Methodologies -- 4.1 Linear Regression -- 4.2 Polynomial Regression -- 4.3 Logistic Regression -- 4.4 Ridge Regression -- 4.5 Stepwise Regression -- 4.6 LASSO Regression. , 4.7 Elastic Net Regression -- 5 Conclusions -- References -- Intrusion Detection and Classification Using Decision Tree-Based Feature Selection Classifiers -- 1 Introduction -- 2 Intrusion Detection System -- 3 Data Mining-Based Approach -- 3.1 Decision Tree -- 3.2 Feature Selection -- 4 Dataset Used -- 5 Result Analysis -- 6 Conclusion -- References -- Role of Cloud Computing for Big Data: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Model -- 2.2 Cloud Deployment Model -- 2.3 Challenges and Issues of Cloud Computing -- 3 Big Data -- 3.1 Technologies Supported by Big Data -- 3.2 Challenges in Big Data -- 4 Conclusion -- References -- Role of Cloud Computing in Geotechnical Engineering -- 1 Introduction -- 2 Direct Role of Cloud Computing in Geotechnical Engineering -- 2.1 State-of-the-Art Cloud Computing -- 2.2 State of the Art Approaches for Geotechnical Cloud Computing -- 3 Cloud Computing and Parameter Identification Integrated in System Identification -- 3.1 System Identification -- 3.2 Component of SI -- 4 Inverse Analysis and Parameter Identification Supported by Cloud Computing -- 4.1 General Formulation of Parameter Identification Process -- 4.2 Inverse Analysis and Parameter Identification -- 5 Research Scope and Challenges -- 6 Conclusion -- References -- Energy-Efficient Clustering with Rotational Supporter in WSN -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Step 1-Clustering of Nodes -- 3.2 Step 2-Selection of CH -- 3.3 Step 3-Selection of NCH -- 3.4 Step 4-Selection of SCH -- 4 Simulation -- 5 Conclusion -- References -- A Review on Mobile Cloud Computing -- 1 Introduction -- 2 Need of MCC -- 3 Architecture -- 4 Background -- 4.1 Service Miniatures of MCC -- 4.2 Deployment Miniatures of MCC -- 5 Features of Mobile Cloud and Its Computing -- 5.1 Scalability -- 5.2 Mobility. , 5.3 Mobile Cyber Security with Privacy -- 5.4 Enhancing Reliability with Mobile Computing -- 5.5 Reduced Cost -- 5.6 Multiple Occupancy -- 5.7 Imbalance Web Transmission -- 6 Why Mobile Cloud Computing? -- 7 Issues in MCC -- 7.1 Scarcity of Mobile Appliances -- 7.2 Safety and Seclusion -- 7.3 Short Data Transferral Rate (Bandwidth) -- 7.4 Offloading -- 7.5 Quality of Communication and Broadcasting -- 8 Conclusion -- References -- Corroborating the Veracity of Body Fat Percentage and Classification of Sarcopenia Using Island Differential Evolution Algorithm -- 1 Introduction -- 2 Methodology -- 3 Optimization of the Formula and Techniques Used -- 4 Regression and Genetic Algorithm -- 5 Residuals and Goodness-of-Fit -- 6 Identification and Classification of Sarcopenia -- 7 Island Differential Evolution Algorithm -- 8 Results Obtained -- 9 Conclusion -- References -- Design of Compact Super-Wideband Monopole Antenna for Spectrum Sensing Applications -- 1 Introduction -- 2 Antenna Configuration -- 2.1 SWB QSCA -- 2.2 QSCA with Notch Bands -- 3 Results Discussion -- 4 Conclusion -- References -- Probabilistic and Distance-Aware Clustering Approach to Decrease the Effect of Hot Spot in WSN -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 WSN Challenges -- 1.3 Energy Efficiency -- 1.4 Clustering -- 1.5 LEACH -- 2 Distance Effect -- 2.1 Hot-Spot Effect -- 2.2 Residual-Energy-Based Clustering -- 3 Related Work -- 4 Proposed Protocol -- 5 Results -- 6 Conclusion -- References -- A Real-Time Sentiments Analysis System Using Twitter Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Tweepy Stream Listener -- 3.2 Preprocessing -- 3.3 Sentimental Analysis -- 3.4 Representation -- 3.5 Tweet Storage -- 4 Case Studies -- 4.1 Qualifying 3-Spanish Grand Prix 2019 -- 4.2 Indian Election Results-2019 -- 5 Conclusion and Future Scope. , References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (834 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811559716
    Serie: Smart Innovation, Systems and Technologies Series ; v.194
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- About the Editors -- Intelligent and Cloud Computing -- M-Throttled: Dynamic Load Balancing Algorithm for Cloud Computing -- 1 Introduction -- 2 Literature Survey -- 3 Existing Algorithms -- 3.1 Throttled Load Balancing -- 3.2 Round-Robin Load Balancing -- 3.3 SJF Load Balancing -- 4 Proposed Algorithm: M-throttled -- 5 Implementation -- 6 Conclusion -- References -- iGateLink: A Gateway Library for Linking IoT, Edge, Fog, and Cloud Computing Environments -- 1 Introduction -- 2 Related Work -- 3 System Model and Architecture -- 3.1 Implementation Details -- 4 Case Studies -- 5 Conclusions and Future Work -- References -- Hetero Leach: Leach Protocol with Heterogeneous Energy Constraint -- 1 Introduction -- 2 Routing Algorithm -- 2.1 LEACH -- 2.2 Hetero Leach -- 3 Simulation and Result -- 4 Conclusion -- References -- A Semantic Matchmaking Technique for Cloud Service Discovery and Selection Using Ontology Based on Service-Oriented Architecture -- 1 Introduction -- 2 Service-Oriented Computing -- 2.1 Service-Oriented Architecture -- 3 Proposed Model -- 3.1 Client Request -- 3.2 Cloud Service Discovery -- 3.3 Cloud Service Selection -- 3.4 Cloud Ontology Triple Store -- 4 Proposed Matchmaking Technique -- 5 Conclusion and Future Work -- References -- An Intelligent Approach to Detect Cracks on a Surface in an Image -- 1 Introduction -- 2 Literature Review -- 3 Min-Max Gray Level Discrimination Method -- 4 Proposed Model for Crack Detection -- 5 Conclusion -- References -- A Study of Machine Learning Techniques in Short Term Load Forecasting Using ANN -- 1 Introduction -- 2 ANN in STLF -- 2.1 Multilayer Perceptron Network (MLP) -- 2.2 Learning -- 2.3 Generalization -- 2.4 MLP Organizes in Burden Estimating -- 3 Proposed Work -- 3.1 Back Propagation (BP) by ANN -- 3.2 Fuzzy Logic by ANN. , 3.3 Hereditary Calculation (HC) by ANN -- 3.4 Particle Swarm Optimization (PSO) by ANN -- 4 Conclusion -- References -- A Review for the Development of ANN Based Solar Radiation Estimation Models -- 1 Introduction -- 2 Basics of Artificial Neural Network (ANN) -- 3 ANN for Solar Radiation Estimation -- 4 Review of Global Radiation Estimation Using ANN -- 5 Comparative Study of All the Models -- 6 Identified Research Gap in Solar Radiation Estimation -- 7 Conclusion -- References -- Analysis and Study of Solar Radiation Using Artificial Neural Networks -- 1 Introduction -- 2 ANN Fundamentals -- 2.1 What is ANN? -- 2.2 Nodal Configuration -- 2.3 ANN Types -- 2.4 Learning Stuff -- 3 ANN Working Principle and Architecture -- 3.1 Introduction -- 4 Applications, Advantages, and Disadvantages -- 4.1 Applications -- 4.2 Advantages -- 4.3 Disadvantages -- 5 Methodology -- 5.1 ANN for Predicting Solar Radiation -- 5.2 Data Considered -- 5.3 Operating Stages -- 5.4 Performance -- 6 Comparison Between ANN-Based and Existing Modeling -- 7 Conclusion -- References -- A Scheme to Enhance the Security and Efficiency of MQTT Protocol -- 1 Introduction -- 2 Literature Review -- 2.1 Security Requirements of IoT -- 2.2 Privacy Concerns in IoT -- 2.3 MQ Telemetry Transport (MQTT) -- 2.4 Architecture of MQTT -- 2.5 MQTT Quality of Service -- 2.6 Security Issues with MQTT -- 2.7 Hash Functions and Digital Signatures -- 2.8 Channel Encryption -- 2.9 Summary of Findings -- 2.10 Problem Statement -- 3 Proposed Scheme -- 3.1 Registration Process -- 4 Result and Discussions -- 5 Conclusions -- References -- Software Fault Prediction Using Random Forests -- 1 Introduction -- 1.1 Random Forests (RF) -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Evaluation Criteria -- 4 Implementation and Results -- 5 Conclusion -- References. , A Power Optimization Technique for WSN with the Help of Hybrid Meta-heuristic Algorithm Targeting Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution Methodology -- 3.1 Design Efficient WSN Nodes -- 3.2 Clusterization of the Target Area -- 3.3 Deployment of WSN Nodes Using Spiral Pattern WSN Node Deployment Policy -- 4 Numerical Result Analysis -- 5 Conclusion and Future Work -- References -- A Model for Probabilistic Prediction of Paddy Crop Disease Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Paddy Crop Disease Classification -- 3.1 Brown Spot -- 3.2 Bacterial Leaf Blight -- 3.3 Leaf Smut -- 4 Implementation of the Model -- 4.1 Image Generation and Augmentation -- 4.2 Convolution Steps -- 4.3 Pooling Step -- 4.4 Fully Connected Layers -- 4.5 Disease Prediction -- 4.6 Process Flow Model -- 5 Algorithm of the Model -- 6 Experimental Results -- 7 Conclusions and Future Work -- References -- A Hybridized ELM-Elitism-Based Self-Adaptive Multi-Population Jaya Model for Currency Forecasting -- 1 Introduction -- 2 Methodology Adopted -- 2.1 ELM -- 2.2 Jaya -- 3 Dataset Description -- 4 Experimental Analysis -- 4.1 Abstract View of the Proposed Model -- 4.2 Proposed ELM-ESAMPJ Algorithm for Exchange Rate Analysis -- 4.3 Result Analysis -- 5 Discussions -- 6 Conclusion and Future Work -- References -- A Fruit Fly Optimization-Based Extreme Learning Machine for Biomedical Data Classification -- 1 Introduction -- 2 Machine Learning Techniques for Biomedical Data Classification -- 2.1 Extreme Learning Machine (ELM) -- 2.2 Fruit Fly Optimization (FFO) -- 2.3 The Proposed FFO-ELM Models -- 3 Result and Discussion -- 3.1 Data Description -- 3.2 Performance Evaluation -- 3.3 Result Analysis -- 4 Conclusion -- References -- Partial Reconfiguration Feature in Crypto Algorithm for Cloud Application. , 1 Introduction -- 2 Generations of Crypto Core -- 3 State of the Art -- 4 Architecture and Implementation -- 4.1 Low Processing Platform (LP) -- 4.2 Fog -- 4.3 Cloud -- 5 Conclusion -- References -- Proactive Content Caching for Streaming over Information-Centric Network -- 1 Introduction -- 2 System Model -- 3 Proposed Solution -- 3.1 Content Store (CS) -- 3.2 Ant Colony Process -- 4 Experimental Results -- 5 Conclusion -- References -- Performance Analysis of ERWCA-Based FLANN Model for Exchange Rate Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 FLANN Model -- 2.2 Evaporation Rate-Based Water Cycle Algorithm (ERWCA) -- 2.3 FLANN/ERWCA Model -- 3 Simulation Study -- 4 Conclusion -- References -- Multi-document Summarization Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experiment and Results Analysis -- 5 Conclusion -- References -- A Convolutional Neural Network Framework for Brain Tumor Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Input Image -- 3.2 Convolution Layer -- 3.3 Pooling Layer -- 3.4 Fully Connected Layer -- 3.5 Output Layer -- 4 Experimental Setup and Results -- 4.1 Dataset Description -- 4.2 Initial Kernel Weights -- 4.3 Activation Function -- 4.4 Loss Function Computation -- 4.5 Training -- 4.6 Model Parameters -- 4.7 Simulation Results -- 5 Conclusion -- References -- Load Balancing in Cloud Computing Environment Using CloudSim -- 1 Introduction -- 2 Related Work -- 3 Objective of Load Balancing in Cloud Computing -- 4 Necessity of Load Balancing -- 5 Verification of Load Balancing Using Cloud Simulator -- 5.1 Various Features of CloudSim Tool -- 5.2 Primary Elements of CloudSim Tool -- 5.3 Algorithm Utilized in CloudSim Tool for Load Balancing -- 6 Experimental Results -- 7 Conclusion -- References. , Assessment of Load in Cloud Computing Environment Using C-means Clustering Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Resource Allocation -- 3.2 Algorithm -- 4 Result Analysis -- 5 Conclusion -- References -- Parallel Implementation of Algebraic Curve for Data Security in Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Explicit Addition Formulation -- 4 Implementation -- 4.1 Sequential Implementation Methodology -- 4.2 Parallel Implementation Methodology -- 5 Experimental Results and Analysis -- 5.1 Sequential Implementation of Elliptic Curve Addition -- 5.2 Sequential Implementation of Hyperelliptic Curve Addition -- 5.3 Parallel Implementation of Hyperelliptic Curve Addition -- 6 Performance Comparison of Sequential and Parallel Implementation -- 7 Conclusion -- References -- A Design Towards an Energy-Efficient and Lightweight Data Security Model in Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Proposed Approach and Related Discussions -- 4.1 Lightweight Authentication Using CA Based Scheme -- 4.2 Lightweight Cryptography Using CA Based Scheme -- 5 Conclusions and Future Work -- References -- Fuzzification-Based Routing Protocol for Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- Fuzzy-Based Strategy Management in Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- A TWV Classifier Ensemble Framework -- 1 Introduction -- 2 Proposed TWV Classifier Ensemble -- 3 Experimental Setup and Result Analysis -- 4 Conclusion -- References -- Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based Devices. , 1 Introduction to Continuous Authentication (CA).
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Schlagwort(e): Decision making-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (694 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811625022
    Serie: Advances in Intelligent Systems and Computing Series ; v.1391
    DDC: 327.120971
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Decision Support System -- Recommended Model of Pollution Information Based on Collaborative Filtering Algorithm -- 1 Introduction -- 2 Calculation of the Similarity of Pollution Information -- 3 Default Prediction Complement -- 4 Obtaining the Similarity Matrix Between Users -- 5 The Solution of the Model -- 6 Analysis of Model Results -- References -- Research on the Evaluation of TCM Service Level in Various Regions of China -- 1 Introduction -- 2 Data Sources and Methods -- 2.1 Data Sources -- 2.2 Methods -- 3 Results -- 3.1 Principal Component Analysis -- 3.2 Cluster Analysis -- 4 Discussion -- 4.1 Regional Disparities in TCM Service Levels -- 4.2 The Effect of Health Services is not Commensurate with the Level of Economic Development -- References -- A Method for Evaluating Health Status of Rail Transit Signaling Equipment Based on Group Decision -- 1 Introduction -- 2 Related Work -- 3 Establishing Rules for an Evaluation System -- 3.1 Defining an Evaluation Organization -- 3.2 Defining the Evaluation Scope -- 3.3 Establishing the Weight Coefficient Vector -- 3.4 Establishing Alarm Rules to Monitor Equipment Faults -- 3.5 Setting Parameters for an Equipment Type -- 4 Implementation of an Evaluation System -- 4.1 Fault Monitoring Cycle -- 4.2 Health Evaluation Cycle -- 5 Conclusion -- References -- Intelligent Decision Support System for Precision Medicine (IDSS 4 PM) -- 1 Introduction -- 2 Theoretical Foundation-Simon's Model of Decision-Making -- 3 Intelligent Decision Support Systems (IDSSs) -- 4 Precision Medicine: An Emerging Approach in Medical Decision-Making -- 5 How Technologies Are Advancing Precision Medicine? -- 5.1 Business Analytics -- 5.2 Cognitive Computing -- 6 Theory Practice and Discussion -- 7 Characteristics of IDSS 4 PM -- 8 Conclusion. , References -- A Study of Result-Oriented Performance Appraisal-Taking Huawei as an Example -- 1 Introduction -- 2 Increasing Flexibility of Bonus Package -- 2.1 Reducing Long-Term Returns and Increasing Short-Term Returns -- 2.2 Widening the Gap and Clarifying the Hierarchy -- 2.3 Awarding the Current Contribution Immediately -- 3 Abandoning the Cumbersome Human Resource Assessment -- 3.1 Assessment by Objectives -- 3.2 Avoiding Establishing KPI Indicators in Isolation for Each Department -- 4 Taking the Responsibility and Result-Oriented Method -- 4.1 Good Performance and Good Return -- 4.2 Combination of Performance Evaluation and Reverse Evaluation -- 4.3 Eliminating Pretending Hard-Working -- 5 The Conclusion -- References -- Under a Management Perspective: Analysis of the Relationship Between Trust and Behavior Decision-Making -- 1 Introduction -- 2 Data and Measurement -- 2.1 Data Sources -- 2.2 Variable Description and Reliability Validity Test -- 3 Data Analysis and Discussion -- 3.1 The Difference of Public Trust Under Different Demographic Variables -- 3.2 The Differences in the Ways of Public Behavior Decision-Making Under Different Demographic Variables -- 3.3 The Relationship Between Trust and Behavior Decision-Making -- 4 Conclusion -- References -- Research on the Regulation of Industrial Structure in the Mid-Southern Liaoning Urban Agglomeration from the Perspective of Spatial Connection -- 1 Introduction -- 2 Research Area and Data Sources -- 2.1 Overview of the Study Area -- 2.2 Data Sources -- 3 Research Method -- 3.1 Spatial Shift-Share Model -- 3.2 Determination and Improvement of Spatial Weight -- 4 Result Analysis -- 4.1 Analysis of the Temporal and Spatial Pattern of Urban Spatial Interaction -- 4.2 Analysis of Shift Share of Industrial Structure -- 5 Conclusions -- References. , Research on the Influence Mechanism of Family-Supportive Supervisor Behaviors on Employees' Intention to Stay from the Perspective of Dual Scenario Embeddedness -- 1 Introduction -- 2 Theoretical Basis and Research Hypothesis -- 2.1 FSSB and Employees' Intention to Stay -- 2.2 The Mediating Role of Dual Scenario Embeddedness -- 2.3 The Moderating Role of Employees' Gratitude as a Trait -- 3 Study Design -- 3.1 Participants and Survey Methods -- 3.2 Variable Measurement -- 4 Research Results -- 4.1 Descriptive Statistical Analysis -- 4.2 Discrimination Validity Analysis and Common Method Test -- 4.3 Hypothesis Testing -- 5 Conclusion -- 5.1 Theoretical Contribution -- 5.2 Management Implications -- 5.3 Research Limitations and Prospects -- References -- Policy Burden, Industry Competition, and Corporate Risk-Taking -- 1 Introduction -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 Policy Burden and Corporate Risk-Taking -- 2.2 The Regulating Effect of Industry Competition -- 3 Research Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Selection and Model Design -- 4 Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Analysis of Regression Results -- 5 Endogenous Control and Robustness Test -- 5.1 Endogenous Problems -- 5.2 Robustness Analysis -- 6 Research Conclusions -- References -- Blended Teaching Mode of Tourism English Based on TPACK -- 1 Introduction -- 2 TPACK Theory -- 3 ESP and Tourism English -- 4 Research Design -- 4.1 Design Concept -- 4.2 Problem Design -- 4.3 Subjects and Teaching Contents -- 4.4 Research Steps -- 5 Experimental Conclusion -- References -- Technology and Innovation Management -- Research on Privacy Protection of Internet of Things Search Data Based on Fine-Grained Authorization -- 1 Introduction -- 2 Background Knowledge -- 2.1 Secret Search -- 2.2 Attribute-Based Encryption Scheme. , 3 System Program -- 3.1 System Architecture -- 3.2 Program Process -- 4 Safety and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Concluding Remarks -- References -- Design of Emergency Rescue Deduction System for Bus Fire Accident Based on Virtual Reality -- 1 Introduction -- 2 The Functional Requirements of Deducing System -- 3 The Design of Deduce System Architecture -- 4 Function Design of Deducing System -- 4.1 Scene Editing Module -- 4.2 Deduce Management Module -- 4.3 Client Operation Module -- 5 Composition of the Deduction System -- 6 Conclusion -- References -- Application of Game Theory in the Field of Technology Innovation -- 1 Introduction -- 2 The Application of Oligopoly Model in Technological Innovations -- 2.1 The Development of Cournot Model in Technological Innovations -- 2.2 Application and Development of Stackelberg in Technological Innovations -- 2.3 Application of Option Game Oligopoly Model in Technology Innovations -- 3 Research on Evolutionary Game Model in Technological Innovations -- 3.1 The Application of Evolutionary Game in Technological Innovations -- 3.2 The Development of Evolutionary Game Model in Technological Innovations -- 4 The Development Direction of Game Theory in Technological Innovations -- References -- Research on Innovation Mechanism of Corporate Volunteering in China -- 1 Introduction -- 2 The Concept and Connotation of Corporate Volunteering -- 3 The Status Quo of Volunteering in Chinese Enterprises -- 3.1 The Integration of Business Objectives Is Important for the Business Development Plan -- 3.2 Win the Sense of Belonging of Employees and the Identity of External Customers -- 3.3 Corporate Public Services Take from Society and Use for Society -- 3.4 Volunteering of Different Enterprises Vary Greatly -- 3.5 Long-Term Development of Volunteering Projects. , 3.6 Undertaking Government Public Service -- 4 Problems in the Development of Enterprise Volunteering in China -- 4.1 Insufficient Government Guidance -- 4.2 Information Guidance is not Strong -- 4.3 Lack of Corporate Volunteering Standards -- 4.4 Imbalance Between Long-Term and Short-Term Benefits -- 5 Development Trend of Corporate Volunteering -- 5.1 Internetization of Corporate Volunteering -- 5.2 Normalization of Corporate Volunteering -- 5.3 Diversification of Corporate Volunteering -- 5.4 Establish Self-organization of Corporate Volunteers -- 5.5 Corporate Volunteering Are Becoming More Standardized and Strict -- 6 Innovation of Corporate Volunteering Mechanism -- 6.1 Building Communication Network and Innovating Corporate Volunteering Mechanism -- 6.2 Taxation Policy -- 6.3 Expense Subsidies -- 6.4 Performance Evaluation -- 6.5 Establish a Sound Education and Training Mechanism -- 6.6 Establish a Sound Guarantee Mechanism to Protect the Volunteering of Enterprises -- References -- Research on the Differential Incentive Effect of Patent Pool on Specific Technology Learning -- 1 Research Background -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 The Impact of Patent Pool Formation on Specific Technology Learning -- 3 Research Design -- 3.1 Data and Samples -- 3.2 Variables and Their Measurement -- 4 Empirical Results and Analysis -- 4.1 Descriptive Statistical Analysis -- 4.2 Hypothesis Testing -- 5 Conclusion and Inspiration -- 5.1 Research Conclusion -- 5.2 Management Suggestions -- References -- Research on Present Situation and the Countermeasure Analysis of Football Training in University -- 1 Introduction -- 2 The Present Situation of Campus Football Training in China -- 3 Problems in the Development of Campus Football Activities in China -- 3.1 Students' Poor Awareness for Football Activities. , 3.2 Unreasonable Arrangement of Football Activities.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Mechatronics-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (604 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811618437
    Serie: Advances in Intelligent Systems and Computing Series ; v.1220
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- About the Editors -- Mechatronics -- 1 Simulation of Off-Wheel Problem of Triangle Tracked Vehicle Based on RecurDyn -- Abstract -- 1 Introduction -- 2 Structure and Relevant Technical Parameters of Triangular Track -- 3 Simulation Test -- 3.1 Virtual Prototype Modeling -- 3.2 Simulation Test on off-Wheel Problem of Track -- 3.3 Simulation Test on Vehicle S Bend -- 4 Conclusion -- References -- 2 Brief Design Requirements of Screen Printing Stencil -- Abstract -- 1 Introduction -- 2 Stencil Design -- 2.1 Frame Design of Circuit Board Stencil -- 2.2 Design of Stencil Tension Net -- 2.3 Mark Point Design of Stencil -- 2.4 Aperture Design of Stencil -- 2.5 Thickness Design of Stencil -- 3 Requirements for Opening Size and Shape of Stencil -- 3.1 Chip Components-Resistors, Inductors, Capacitors -- 3.2 Power MOSFET -- 3.3 QFP, SOP, QFN, IC -- 3.4 BGA -- 4 Conclusion -- References -- 3 Review of Improved Collaborative Filtering Recommendation Algorithms -- Abstract -- 1 Introduction -- 2 Overview of Traditional Collaborative Filtering Algorithms -- 2.1 User-Based Collaborative Filtering Recommendation Algorithm -- 2.2 Item-Based Collaborative Filtering Recommendation Algorithm -- 2.3 Model-Based Collaborative Filtering Recommendation Algorithm -- 3 Improvement and Application of Collaborative Filtering Algorithm -- 3.1 The New Theory Is Introduced into Collaborative Filtering -- 3.2 Data Dynamic Analysis Combined with Collaborative Filtering -- 3.3 Combination of Data Rule Mining and Collaborative Filtering -- 4 Conclusion -- References -- 4 A Preliminary Study on the Application of Computer Technology in Physical Education -- Abstract -- 1 Introduction -- 2 Design of Instructional Model of Autonomous Physical Education Based on Computer Technology -- 2.1 Part Before Class -- 2.2 Part in Class -- 2.3 Part After Class. , 3 Application Analysis of Physical Education Teaching Model Based on Computer Technology -- 3.1 Experimental Subject -- 3.2 Experimental Procedure -- 3.3 Experimental Method -- 3.4 Experimental Result -- 4 Conclusion -- References -- Intelligent Systems -- 5 Design of Archives Management System for Teaching -- Abstract -- 1 Introduction -- 2 Requirement Analysis of System and Database Design -- 2.1 Requirement Analysis -- 2.2 System Functional Structure Design -- 2.3 Database Design -- 3 System Function Realization -- 3.1 Login Module Design -- 3.2 Registration Module Design -- 4 System Test and Operation Result Analysis -- 5 Conclusion -- Acknowledgements -- References -- 6 An Algorithm for Distinguishing Between Speech and Music -- Abstract -- 1 Introduction -- 2 Audio-Related Features -- 3 Algorithm Steps -- 4 Experimental Result -- 5 Summary -- Acknowledgements -- References -- 7 Research on Multiple Overlapping Speakers Number Recognition Based on X-Vector -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 X-Vector -- 2.2 Data Preprocessing -- 2.3 Improving of Feature Extraction -- 3 Experimental Results -- 4 Conclusions -- References -- 8 Discussion on Production Technology and Testing Technology of 1553B Bus Cable Net for Satellite -- Abstract -- 1 Introduction -- 2 Composition of 1553B Bus Cable -- 2.1 1553B Cable Structure -- 2.2 Composition of 1553B Bus Cable -- 3 1553B Bus Cable Network Assembly Process -- 4 1553B Bus Cable Network Installation Quality Test -- 4.1 Bus Cable Net Appearance Inspection -- 4.2 1553B Bus Cable Network Static Performance Test -- 4.3 1553B Bus Cable Network Dynamic Performance Test -- 5 Conclusion -- References -- 9 Feasibility Analysis of Venture Capital Committee in the Innovative Design of Class Management in Colleges and Universities -- Abstract -- 1 Introduction. , 2 Major Pain Points of Class Management in Colleges and Universities -- 2.1 Different Opinions About Head Teacher's Impact on Class -- 2.2 Weak Initiative of Class Cadre -- 2.3 A General Lack of Class Fee -- 2.4 Little Contact with Classes After Graduation -- 3 Pain Points Analysis of Class Management in Colleges and Universities -- 3.1 Urgent Need of System Construction Innovation -- 3.2 Difference in Value Proposition -- 3.3 Foundation -- 3.4 Repulsion and Practical Difficulties -- 4 Innovative Design of Class Management in Colleges and Universities -- 4.1 Description of Class Management Tools -- 4.2 The Feasibility Analysis of Innovative Design -- 5 Conclusions -- Acknowledgements -- References -- 10 A Survey and Study on Satisfaction and Influencing Factors Using Ant Credit Pay via Intelligent Processing -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Data Analysis Method and Theoretical Basis -- 3.1 Chi-Square Test Principle -- 3.2 Principle of Correlation Analysis -- 3.3 Satisfaction Principle -- 3.4 Establishing the Satisfaction Index System -- 4 Analysis on the Satisfaction and Influencing Factors -- 4.1 Reliability Analysis and Validity Analysis of Data -- 4.2 Analysis of College Students' Satisfaction with Using "Ant Credit Pay" -- 4.3 Analysis of College Students' Satisfaction -- 4.4 Analysis of Influencing Factors -- 5 Some Suggestions -- 5.1 Individual Consumption Needs to Be Tailored -- 5.2 Pay Attention to Self-credit and Enhance Self-protection Consciousness -- 5.3 Appropriately Reduce the Withdrawal Procedure Rate and Expand the Use of "Ant Credit Pay" in Daily Life -- References -- 11 A Review on Main Optimization Method of ALBERT in Natural Language Processing -- Abstract -- 1 Introduction -- 2 Recent Development -- 3 Solve the Problem of Insufficient Text Word Vector Learning by Classifying the Output Features of ALBERT. , 4 Solve the Problem of Gradient Explosion and Disappearance in the Process of Long Text Training by Combining the Bi-LSTM Model -- 5 By Combining CRF Model to Better Recognize Long Texts -- 6 By Combining the BiGRU Model to Maximize the Preservation of the Semantic Association of Word Vectors in Long Texts -- 7 Conclusion -- References -- 12 Study on the Influencing Factors of Customer Loyalty in Large Smart Home Furnishing Stores -- Abstract -- 1 Introduction -- 2 Related Theory of Influencing Factors of Customer Loyalty -- 2.1 Experience Marketing -- 2.2 Customer Satisfaction -- 2.3 Measurement of Customer Loyalty -- 3 Establishment of Influencing Factor Model of Customer Loyalty -- 3.1 Selection of Modeling Dimension -- 3.2 Research Hypothesis -- 3.3 Description of Research Model -- 4 Data Analysis on Influencing Factors of Customer Loyalty -- 4.1 Reliability Test -- 4.2 Correlation Analysis -- 4.3 Regression Analysis -- 5 Summary -- References -- 13 A Detection Algorithm of Lung Nodule Based on Faster R-CNN -- Abstract -- 1 Introduction -- 2 Deep Learning Detection Framework and Faster R-CNN -- 2.1 Feature Extraction Network -- 2.2 RPN -- 2.3 ROI Pooling -- 2.4 Classifier -- 3 Pulmonary Nodule Detection Network -- 3.1 Improvement of Feature Extraction Network -- 3.2 Modify Anchors -- 4 Experimental Data and Result Verification -- 4.1 Dataset -- 4.2 Evaluation Criterion -- 4.3 Experimental Result -- 5 Conclusion -- References -- 14 Information Extraction from Contract Based on BERT-BiLSTM-CRF -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Algorithm Model -- 3.1 Contract-Based Language Model (BERT) -- 3.2 BiLSTM-CRF Method Based on Migration Optimization -- 4 Test Results and Analysis -- 5 Concluding Remarks -- References -- 15 Research on Linear Detection Technology for Massive MIMO in Wireless Communications -- Abstract. , 1 Introduction -- 2 Model of Massive MIMO Uplink System -- 3 Linear Detection Algorithm for Massive MIMO System -- 3.1 Linear Detection Algorithm -- 3.1.1 Maximum Ratio Combining Algorithm (MRC) -- 3.1.2 Zero-Forcing Algorithm (ZF) -- 3.1.3 Minimum Mean Square Error Detection Algorithm (MMSE) -- 3.2 Simulation -- 4 Conclusion -- References -- 16 Research on Intelligent Reconfiguration and Recognition Technology of Mobile Environment for Substation Operation -- Abstract -- 1 Introduction -- 2 Object Scanning and Modeling -- 3 Modeling and Scanning Modeling of Dynamic Complex Environment -- 4 Weak Supervision Instance Segmentation of Substation Equipment Based on RGB-T Self Labeling -- 5 Model Compression and Acceleration for Edge Devices -- 6 Research and Development of Environment Intelligent Reconfiguration and Recognition Prototype System for Mobile Side Software and Hardware Platform -- 7 Conclusion -- References -- 17 Development and Application of Power Grid Disaster Intelligent Perception and Emergency Command System -- Abstract -- 1 Introduction -- 2 Electric Power Disaster Emergency Situation Map and 3D Visual Command Technology -- 3 Research and Development of Power Grid Disaster Intelligent Perception and Emergency Command Prototype System -- 4 Conclusions -- Acknowledgements -- References -- 18 Research on State Perception of Power Grid Equipment Based on Intelligent Analysis of Multi-Spectral Data -- Abstract -- 1 Introduction -- 2 Feature Distribution and Time-Domain Correlation of PoWer Equipment Status Under Different Spectrums -- 3 Online Monitoring and Fault Warning of Electrical Equipment Status of Stations and Transmission Lines -- 4 Establish a Sample Library of Power Equipment Faults Based on Three-Light Fusion Imaging -- 5 Comprehensive Evaluation Method of Multi-Spectral Data Analysis Model -- 6 Conclusions -- Acknowledgements. , References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Decision making-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (398 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811393303
    Serie: Advances in Intelligent Systems and Computing Series ; v.1005
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Data Science and Analytics -- Quality Index Evaluation Model Based on Index Screening Model -- 1 Introduction -- 2 Three-Parameter Interval Principal Component Analysis -- 2.1 Principal Component Analysis -- 2.2 Calculation Steps -- 2.3 M-PCA Three-Parameter Interval Principal Component Analysis -- 2.4 Calculation Steps -- 2.5 The Determination of Subjective Index Weight Based on Analytic Hierarchy Process -- 2.6 Index Evaluation -- 3 Analysis of Examples -- 4 Conclusion -- References -- Selection of Software Development Methodologies (SDMs) Using Bayesian Analysis -- 1 Introduction -- 2 Proposed Work -- 3 Proposed Model -- 3.1 Experimental Result -- 4 Conclusion -- 5 Future Scope -- References -- Role of Social Media in Employer Branding-A Study on Selected Engineering Colleges (Private) in Bhubaneswar -- 1 Introduction -- 2 Objective -- 3 Methodology -- 4 Literature Review -- 4.1 Employer Branding -- 5 Cases of Private Institute -- 5.1 Case 1: Institute of Technical Education and Research, SOA University, Bhubaneswar -- 5.2 Case 2: Centurion University of Technology and Management (CUTM), Bhubaneswar -- 5.3 Case 3: Silicon Institute of Technology -- 5.4 Case 4: Gandhi Engineering College (GEC) Bhubaneswar -- 5.5 Case 5: Hi-Tech Institute of Technology (HIT), Bhubaneswar -- 6 Conclusion of the Study -- References -- A Novel Approach for Artifact Removal from Brain Signal -- 1 Introduction -- 2 Overview of Proposed Method -- 2.1 Kurtosis -- 2.2 Multiscale Entropy (MSE) -- 2.3 Artifact Channel Identification -- 2.4 Artifact Denoising -- 3 Results and Discussion -- 4 Conclusion -- References -- A Novel Approach to Heterogeneous Multi-class SVM Classification -- 1 Introduction -- 2 Literature Review -- 3 Classification Problem -- 4 Proposed Novel Approach for Heterogeneous Data. , 5 Experimental Results -- 6 Conclusion -- References -- An Empirical Study of Big Data: Opportunities, Challenges and Technologies -- 1 Introduction -- 2 Importance of Big Data -- 2.1 Importance to National Development -- 2.2 Importance to Industrialized Upgrades -- 2.3 Importance to Technical Research -- 2.4 Importance to Interdisciplinary Research -- 2.5 Importance to Better Predict the Future -- 3 Big Data Characteristics -- 3.1 Volume -- 3.2 Velocity -- 3.3 Variety -- 3.4 Veracity -- 3.5 Validity -- 3.6 Volatility -- 3.7 Value -- 4 Hadoop: Way to Process Big Data -- 4.1 Hadoop Distributed File System -- 4.2 MapReduce -- 5 Challenges of Big Data -- 5.1 Data Challenges -- 5.2 Processing Challenges -- 5.3 Management Challenges -- 6 Big Data Techniques -- 7 Big Data Hadoop-Based Tools -- 7.1 Apache Hadoop -- 7.2 Apache Mahout -- 7.3 Storm -- 7.4 S4 -- 7.5 Apache Kafka -- 8 Conclusion -- References -- Forecasting World Petroleum Fuel Crisis by Nonlinear Autoregressive Network -- 1 Introduction -- 2 Data Sources -- 3 Methodology -- 3.1 Time Series Prediction Using Artificial Neural Network (ANN) -- 3.2 Comparisons of General Prediction Models -- 3.3 Predictive Model Flow Control Diagram -- 3.4 Predictive Model Structure -- 4 Performance Measurement -- 5 Result and Analysis -- 6 Comparison and Discussion -- 7 Hypothesis Testing -- 8 Conclusion -- References -- Stock Market Price Prediction Employing Artificial Neural Network Optimized by Gray Wolf Optimization -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Dataset -- 3.2 Normalization -- 3.3 Artificial Neural Network -- 3.4 Gray Wolf Optimization -- 4 Proposed Approach -- 5 Experimental Setup and Simulation Result -- 6 Conclusion -- References -- Analysis of Techniques for Credit Card Fraud Detection: A Data Mining Perspective -- 1 Introduction -- 2 Literature Review. , 2.1 Dataset Collection -- 2.2 Various Methodology of Fraud Detection in Credit Card -- 3 Challenges in Credit Card Fraud Detection -- 4 Conclusion -- References -- Predictive Analytics for Weather Forecasting Using Back Propagation and Resilient Back Propagation Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Supervised Learning Algorithms -- 4 Artificial Neural Network -- 4.1 Back Propagation Algorithm -- 4.2 Resilient Back Propagation -- 5 Results and Discussion -- 5.1 Backprop and Rprop Implemented in RStudio -- 5.2 Receiver Operating Characteristic Curve (ROC) and Area Under Curve (AUC) -- 5.3 ggplot -- 6 Conclusion -- Appendix -- References -- Analysis of the Leadership of Undergraduate Freshmen in Military Schools from the Perspective of Space -- 1 Introduction -- 2 Research Methods -- 2.1 Research Tools -- 2.2 Research Procedures -- 3 The Results Analysis -- 3.1 Reliability and Validity Test -- 3.2 Overall Analysis of Leadership -- 3.3 Analysis of the Correlation Between Leadership and Per Capita Income -- 3.4 Analysis of the Correlation Between Leadership and Per Capita Income -- 4 Result Analysis -- 5 Concluding Remarks -- References -- Correlation Analysis for CSI300 Index Return and Realized Volatility -- 1 Introduction -- 2 Model Construction -- 2.1 Model Realized Estimate -- 2.2 Edge Distribution Model Construction -- 2.3 Construction of Time Change D-Vine Copula -- 3 Empirical Analysis -- 3.1 Characteristic Analysis -- 3.2 Parameter Estimation -- 3.3 Parameter Estimation for Continuous-Time Volatility and the Jump Volatility Models -- 3.4 Correlation Analysis -- 4 Conclusion -- References -- Prescription Basket Analysis: Identifying Association Rule Among Drugs in Prescription of Dentist in Bhubaneswar City -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 4 Conclusion -- References. , Decision Science and Management -- Impact of Decision Science on e-Governance: A Study on Odisha Land Records System -- 1 Introduction -- 1.1 e-Governance -- 1.2 Odisha Right to Public Services Act -- 2 Literature Review -- 2.1 Brainstorming -- 2.2 Committee Meetings -- 2.3 Delphi -- 2.4 Electronic Meeting -- 2.5 Survey -- 2.6 Decision Tree and Decision Tables -- 2.7 Game Theory -- 2.8 Simulation -- 3 Decision Science for e-Governance -- 3.1 Risk Analysis -- 3.2 Decision Analysis -- 3.3 Cost-Effectiveness Analysis -- 4 Key Findings of the Paper -- 5 Conclusion -- References -- HR Value Proposition Using Predictive Analytics: An Overview -- 1 Introduction -- 2 Data Analytics -- 2.1 Descriptive Analytics -- 2.2 Predictive Analytics -- 2.3 Prescriptive Analytics -- 3 Literature Review -- 3.1 HR Analytics -- 4 Findings and Discussion -- 4.1 Importance of Analytics in HR -- 5 Conclusions -- 6 Originality -- 7 Declaration -- References -- Determination of Time-Dependent Quadratic Demand by Using Optimal Ordering Policy, Salvage Value Under Partial Backlogging, Time-Proportional Deterioration, Time-Varying Holding Cost -- 1 Introduction -- 2 Assumptions -- 3 Modeling -- 3.1 Notations -- 3.2 Mathematical Formulation -- 4 Numerical Examples -- 5 Sensitivity Analysis -- 6 Conclusions -- References -- Inventory Control for Materials Management Functions-A Conceptual Study -- 1 Introduction -- 2 Review of the Literature -- 2.1 Inventory Management -- 2.2 Material Management -- 3 Conclusion -- References -- ACO-Based Secure Routing Protocols in MANETs -- 1 Introduction -- 2 Ant Colony Optimization -- 3 Security Aware ACO Routing Protocols -- 3.1 Secure Antnet Routing Algorithm for Scalable Ad Hoc Networks Using Elliptic Curve Cryptography -- 3.2 Secure Power Aware Ant Routing Algorithm -- 3.3 Swarm-Based Detection and Defence Technique. , 3.4 Detection and Prevention of Blackhole Attack in MANET Using ACO Routing -- 3.5 Autonomous Bio-inspired Public Key Management Protocol -- 3.6 ANT-Based Trustworthy Routing -- 3.7 Pair-Wise Key Agreement and Hop-by-Hop Authentication Protocol -- 4 Comparison and Analysis of Security Aware ACO Routing Protocols -- 5 Conclusion and Future Work -- References -- An Approach Toward Integration of Big Data into Decision Making Process -- 1 Introduction -- 2 Background -- 3 Challenges During Big Data Analytics for Decision Making -- 4 Integrated Framework of Big Data Analytics with Decision Making Process -- 4.1 Proposed Approach -- 5 Conclusion and Future Aspects -- References -- Big Data Analysis and Classification of Biomedical Signal Using Random Forest Algorithm -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of the Signal -- 4 Feature Extraction -- 5 Random Forest -- 6 Classification Result -- 7 Conclusion -- References -- An Intelligent Framework for Analysing Terrorism Actions Using Cloud -- 1 Introduction -- 2 Motivation -- 3 Objective -- 4 Literature Review -- 5 Comparison of Models -- 6 Conclusion -- References -- Research on Optimization of J Company Warehouse Storage Process -- 1 Introduction -- 2 Analysis on the Current Situation of J Company -- 2.1 Warehouse Storage Process -- 2.2 Problems with Warehouse Storage Process -- 3 Optimized Warehouse Storage Process -- 4 Petri Net Model -- 5 Conclusion -- References -- The Influence of Psychological Contract on the Willingness to Share Tacit Knowledge -- 1 Introduction -- 2 Psychological Contract -- 2.1 Knowledge Sharing -- 2.2 Hypothesis -- 3 Method -- 3.1 Measurement Tools -- 4 Result -- 5 Hypothesis Testing -- 6 Discussion -- 7 Limitations and Future Research -- References -- Research on the Role of Government Management in Chinese Public Indemnificatory Housing System. , References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (1040 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811394065
    Serie: Advances in Intelligent Systems and Computing Series ; v.1006
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Intelligent Computing -- 1 Global Stability of a Viral Dynamical Model -- Abstract -- 1 Introduction -- 2 Model -- 3 The Existence of Equilibria -- 4 The Global Stability of Equilibria -- Acknowledgements -- References -- 2 Research on Construction of the Software Technology Profession in Vocational Institutes Based on the External Vision -- Abstract -- 1 Introduction -- 2 Professional Construction Ideas Based on the External Vision -- 3 Versatile Teaching Team Construction Based on the Strengths of Teachers -- 4 Social Service Ability Construction Based on Demands of Social Markets -- 5 Construction of School Training Bases Integrated Into Occupation Job Elements and the Construction of the Public Off-Campus Training Bases -- Acknowledgements -- References -- 3 Numerical Study on the Expanded Mixed Covolume Method for One-Dimensional Sobolev Equation -- Abstract -- 1 The Expanded Mixed Covolume Method -- 1.1 The Semi-discrete Scheme -- 1.2 The Fully Discrete Scheme -- 2 Numerical Invariants -- 2.1 A Single Solitary Wave -- 2.2 Interaction of Two Solitary Waves -- References -- 4 Research on the Control Method of Coal Sample Blanking Based on the BP Neural Network and the PID Algorithm -- Abstract -- 1 Introduction -- 2 Control Method of Coal Sample Blanking Based on the BP Neural Network and the PID Algorithm -- 2.1 PID Control Algorithm -- 2.2 BP Neural Network Algorithm -- 3 Experimental Verification -- Acknowledgements -- References -- 5 A Practice on Neural Machine Translation from Indonesian to Chinese -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Lore Translator -- 4 Experiments -- 4.1 Corpus -- 4.2 Training -- 4.3 Experimental Results and Discussion -- 4.4 Demo System -- 5 Conclusion -- Acknowledgements -- References. , 6 Keyword-Based Indonesian Text Summarization -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 The Development of Automatic Summarization -- 2.2 Existing Systems -- 3 Keyword Contribution Method -- 3.1 Overall Architecture -- 3.2 Algorithm -- 4 Experiment -- 5 Conclusion -- Acknowledgements -- References -- 7 Automatic Decision Support for Public Opinion Governance of Urban Public Events -- Abstract -- 1 Introduction -- 2 Implementation -- 2.1 Data Collection Layer -- 2.2 Information Analysis Layer -- 2.3 Public Opinion Government Layer -- 3 Conclusion -- Acknowledgements -- References -- 8 Improved Local Morphology Fitting Active Contour with Weighted Data Term for Vessel Segmentation -- Abstract -- 1 Introduction -- 2 Related Local Region-Based Models -- 3 Proposed Method -- 4 Results -- 5 Conclusion -- References -- 9 3D Point Cloud Data Splicing Algorithm Based on Feature Corner Model -- Abstract -- 1 Introduction -- 2 3D Point Cloud Data Splicing Algorithm Based on Feature Corner Model -- 2.1 Model Innovation and Data Mining -- 2.2 The Overall Structure of the System -- 2.3 Point Cloud Data Splicing Algorithm -- 3 Conclusion -- Acknowledgements -- References -- 10 A Preliminary Study on Mobile Learning -- Abstract -- 1 The Concept, Characteristics, and Composition of Mobile Learning -- 2 The Feasibility of Mobile Learning -- 2.1 The Characteristics of Mobile Learning -- 2.2 The Inherent Advantages of the Network Environment -- 2.3 The Needs of Professional Construction -- 3 Potential Problems and Solutions in Mobile Learning -- 4 Conclusion -- References -- 11 Design and Implementation of Real-Time Inquiry System of the Stock Market -- Abstract -- 1 Introduction -- 2 Relative Technologies -- 2.1 Hadoop -- 2.2 HBase -- 3 Requirement Analysis and Design -- 3.1 System Function Analysis -- 3.2 Overall Design of the System. , 3.3 Database Design -- 4 Implementation of the Key Modules of the System -- 4.1 The Real-Time Prompt Module of Fuzzy Query of Stock Information -- 4.2 News Information Module -- 4.3 Query Module of Large Quantities of Historical Data -- 5 Conclusion -- Acknowledgements -- References -- 12 An Improved Feature Selection Algorithm for Fault Level Identification -- Abstract -- 1 Introduction -- 2 Basic Concepts of Ordinal Classification -- 3 Feature Selection Algorithm for Ordinal Classification -- 4 Feature Selection and Classification Results -- 5 Conclusions -- Acknowledgements -- References -- 13 Computing Model of Musical Multiple Perception Based on Memory Mapping Perception Inversion -- Abstract -- 1 Introduction -- 2 Fuzzy Perception of Music -- 2.1 Fuzziness of Music -- 2.2 Memory Mapping and Perception Inversion (MMPI) -- 3 Music Intelligence Based on Fuzzy Perception -- 3.1 Musical Feature Index -- 3.2 The Basic Type of Music Perception -- 4 Experimental Results -- 5 Conclusions -- Acknowledgements -- References -- 14 A Natural Immersive Closed-Loop Interaction Method for Human-Robot "Rock-Paper-Scissors" Game -- Abstract -- 1 Introduction -- 2 System Description -- 2.1 The Natural Interaction Implementation -- 2.2 The Real-Time Performance Implementation -- 2.3 The Immersion Mode Implementation -- 3 The Closed-Loop Characteristics -- 4 System Testing and Evaluation -- 5 Conclusion -- References -- 15 Capsule Network-Based Facial Expression Recognition Method for a Humanoid Robot -- Abstract -- 1 Introduction -- 2 Advantages and Properties of the Capsule Net -- 2.1 The Differences -- 2.2 The Properties of the Capsule Net -- 3 CK+ Dataset and NAO Robot Experiments -- 3.1 CK+ Dataset -- 3.2 NAO Robot -- 3.3 Experiments -- 4 Conclusions -- Acknowledgements -- References. , 16 Equipment Maintenance Mode Decision Based on Fuzzy Multi-attribute Decision Method -- Abstract -- 1 Introduction -- 2 Fuzzy Multi-attribute Decision Model -- 3 Fuzzy Multi-attribute Decision Process -- 4 Fuzzy Multi-attribute Decision Method -- 5 Example Analysis -- 6 Conclusion -- References -- 17 A Method for Facial Kinship Verification Based on Deep Learning -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Channel Backbone Network -- 2.2 Multi-channel Model -- 2.2.1 Binary-Channel Model -- 2.2.2 Elastic Multi-channel Model -- 2.3 Training -- 3 Experiments and Results -- 4 Conclusion -- Acknowledgements -- References -- 18 A Domain-Adapting Word Representation Method for Word Clustering -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Frequently Co-occurring Entropy -- 3.2 Fuzzy Bag-of-Words Model -- 4 Experimental Results -- 5 Conclusion -- Acknowledgments -- References -- 19 Fitting Complex Nonlinear Function with Belief Rule Base -- Abstract -- 1 Introduction -- 1.1 The Basic BRB Model -- 1.2 BRB Inference Using ER Approach -- 2 Constructing BRB Model for Nonlinear Function -- 2.1 Nonlinear Function -- 2.2 Transformation Techniques for Quantitative Data -- 3 Parameter Training for BRB -- 4 Experiments Study -- 5 Conclusion -- References -- 20 Approximate Kernel Regression Based on Distributed ADMM Algorithm -- Abstract -- 1 Introduction -- 2 Method -- 2.1 Kernel Regression -- 2.2 ADMM Algorithm -- 2.3 Kernel Regression Based on ADMM Algorithm -- 2.4 Approximate Kernel Matrix -- 3 Experiments -- 4 Conclusion -- Acknowledgements -- References -- 21 Detection for Mixed-Characters Based on Machine Learning -- Abstract -- 1 Introduction -- 2 The Composition of the Detection System -- 3 Character Preprocessing -- 3.1 Binarization -- 3.2 Character Segmentation -- 3.3 The Character Normalization -- 4 Data Set Production. , 5 Neural Network Design -- 6 Experimental Results and Analysis -- 7 Conclusion -- References -- 22 Research on 3D Terminal Rendering Technology Based on Power Equipment Business Features -- Abstract -- 1 Introduction -- 2 3D Model High-Speed Rendering Technology -- 3 3D Model Real-Time High-Speed Rendering Technology for Terminal and Grid Business Application Requirements -- 3.1 Scene Organization -- 3.2 Rendering Process -- 3.3 3D Engine Cross-Platform Technology -- 4 Conclusions -- Acknowledgements -- References -- 23 Community Detection Based on Improved Bee Evolutionary Genetic Algorithm -- Abstract -- 1 Introduction -- 2 Algorithm Structure and Algorithm Description -- 3 Improved Bee Evolutionary Genetic Algorithm -- 3.1 Fitness Function -- 3.2 Encoding -- 3.3 Population Initialization -- 3.4 Crossover Operator -- 3.5 Mutation Operator -- 3.6 Selection Operator -- 3.7 Optimization of Random Population Size -- 4 Simulation and Analysis -- 4.1 Community Detection of the LFR Benchmark Network -- 4.2 Community Detection of the Karate Club Network -- 4.3 Community Detection of the dolphin Network -- 5 Conclusion -- Acknowledgments -- References -- 24 Named Entity Recognition for Chinese Management Case Texts -- Abstract -- 1 Introduction -- 2 Semi-supervised Learning Method -- 2.1 Bootstrapped Framework -- 2.2 BI-LSTM-CRF Model -- 2.3 Evaluating Rule -- 3 Experiment -- 3.1 Dataset -- 3.2 Results and Analysis -- 4 Conclusion and Discussion -- Acknowledgements -- References -- 25 Application of Virtual Simulation Platform in Basic Medical Teaching -- Abstract -- 1 Introduction -- 2 Significance of Basic Medical Virtual Simulation Experimental Platform -- 2.1 Reduce the Cost of Experiment -- 2.2 Provide an Open Experimental Environment -- 2.3 Enhance Classroom Fun -- 3 Construction of Basic Medical Virtual Simulation Platform. , 3.1 Functionality Virtual Simulation Experiment Platform.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Schlagwort(e): Computational intelligence. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (504 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811538636
    Serie: Smart Innovation, Systems and Technologies Series ; v.179
    DDC: 6.3
    Sprache: Englisch
    Anmerkung: Intro -- International Program Committee -- Honorary Chair -- General Chairs -- Organizing Chair -- International Advisory Chair -- Founder of IRNet China -- Co-founder of IRNet China -- TPC Members -- Sponsors -- Preface -- Contents -- About the Editors -- 1 Study Optimization of Thermal Analysis of Anisotropic Materials in 3D Field Based on One-Dimensional Heat Conduction Equation Model -- 1.1 Introduction -- 1.2 Heat Transfer Mode and Process Analysis -- 1.3 Optimization Model of Protective Clothing Design for High-Temperature Engineering Work -- 1.3.1 The Establishment of the Model and the Proposal of the Hypothesis Conditions -- 1.3.2 Optimization Model Based on Inversion Method -- 1.4 Conclusion -- References -- 2 Shape Retrieval for 3D Models Based on MRF -- 2.1 Introduction -- 2.2 Feature Descriptor -- 2.3 Framework of Retrieval -- 2.3.1 Notations -- 2.3.2 Formulation -- 2.3.3 Potential Function -- 2.4 Spatial Consistency Test -- 2.4.1 Training -- 2.4.2 Testing -- 2.4.3 Index Based on Random Forest -- 2.4.4 Measure Similarity -- 2.5 Experiments -- 2.6 Conclusions -- References -- 3 Numerical Conformal Mapping Based on Improved Hermitian and Skew-Hermitian Splitting Method -- 3.1 Introduction -- 3.2 Numerical Conformal Mapping Based on the Charge Simulation Method -- 3.3 Improved HSS Method Based on (k, j)-Padé Iteration Method -- 3.4 Numerical Examples -- 3.5 Conclusions -- References -- 4 Hierarchical Clustering-Based Video Summarization -- 4.1 Introduction -- 4.2 Feature Extraction -- 4.2.1 Color Feature -- 4.2.2 Texture Feature -- 4.3 The Proposed Algorithm -- 4.3.1 Hierarchical Clustering Method -- 4.3.2 Optimize Initial Clustering Results to Extract Video Summary Key Frames -- 4.4 Experimental Results and Discussion -- 4.4.1 Evaluation Standard -- 4.4.2 Experimental Results -- 4.5 Conclusion -- References. , 5 Research on Multi-objective Optimization Problem of Engineering Project in 3D Field Based on Improved Particle Swarm Optimization Algorithm -- 5.1 Introduction -- 5.2 IPSO Algorithms -- 5.3 Model -- 5.4 Engineering Calculation and the Result Analysis -- 5.5 Conclusions -- References -- 6 3D Path Planning Based on Improved Particle Swarm Optimization Algorithm -- 6.1 Introduction -- 6.2 Path Planning Environment Modeling and Fitness Function -- 6.2.1 Environmental Modeling -- 6.2.2 Fitness Function -- 6.3 Improved PSO Algorithm -- 6.3.1 Basic PSO Algorithm -- 6.3.2 BFO Algorithm -- 6.3.3 Hybrid Algorithm -- 6.4 Simulation Verification -- 6.5 Conclusion -- References -- 7 Improving Parallel Magnetic Resonance Imaging Reconstruction Using Nonlinear Time Series Analysis -- 7.1 Introduction -- 7.2 Background -- 7.3 Method -- 7.4 Experimental Results -- 7.5 Conclusion -- References -- 8 Low Computational Complexity Third-Order Tensor Representation Through Inverse Spectrum Pyramid -- 8.1 Introduction -- 8.2 Method for Third-Order Tensor Representation Through 3D Reduced ISP -- 8.2.1 Representation of a Tensor of Size 4 × 4 × 4 -- 8.2.2 Representation of the Tensor of Size N × N × N Through N-Level 3D-RISP -- 8.3 Characteristics of the Spectrum Tensor Representation -- 8.4 Conclusions -- References -- 9 Spectral Reconstruction Based on Bayesian Regulation Neural Network -- 9.1 Introduction -- 9.2 Principle of Spectral Reflectance Reconstruction -- 9.2.1 Polynomial Regression -- 9.2.2 Bayesian Regularization BP Neural Network Algorithm -- 9.3 Experimental Results and Analysis -- 9.3.1 Experiment Process -- 9.3.2 Analysis and Comparison of Results -- 9.4 Conclusion -- References -- 10 Loose Hand Gesture Recognition Using CNN -- 10.1 Introduction -- 10.2 The Proposed Method -- 10.2.1 Training Data Preparation. , 10.2.2 The Proposed Neural Network Architecture -- 10.2.3 Loss Function -- 10.3 Experiments -- 10.3.1 CNN with Input RGB-D Images -- 10.3.2 CNN with Multi-resolution Features -- 10.3.3 Compared with Other Popular CNN Models -- 10.4 Conclusions -- References -- 11 Multi-focus Image Fusion Method Based on NSST and BP Neural Network -- 11.1 Introduction -- 11.2 Image Fusion Method -- 11.2.1 NSST Transformation -- 11.2.2 Feature Extraction and NSST Contrast -- 11.2.3 BP Neural Network Training -- 11.2.4 Algorithm Framework and Steps -- 11.3 Experiments Results -- 11.4 Conclusions -- References -- 12 Classification of 3D Remote Sensing Images Through Dimensionality Reduction and Semantic Segmentation Network -- 12.1 Introduction -- 12.2 Proposed Method -- 12.2.1 The Whole Approach Framework -- 12.2.2 Rasterization -- 12.2.3 Normalization and Hat Transform -- 12.2.4 DSM Post-processing -- 12.2.5 Network for Classification -- 12.3 Experiment -- 12.3.1 Training Deeplabv3+ -- 12.3.2 Post-processing by NDSM -- 12.3.3 Visualization of 3D Remote Sensing Images -- 12.4 Conclusion -- References -- 13 Research on Deep Learning Algorithm and Application Based on Convolutional Neural Network -- 13.1 Introduction -- 13.2 Convolutional Neural Network -- 13.2.1 Local Connection of Convolutional Neural Networks -- 13.2.2 Weight Sharing in Convolutional Neural Networks -- 13.3 The Overall Structure of the Convolutional Neural Network -- 13.4 The Application of Deep Learning Algorithm Based on Convolutional Neural Network -- 13.4.1 Application in the Field of Natural Language Processing -- 13.4.2 Application in the Field of Image Recognition -- 13.4.3 Application in the Field of Speech Recognition -- 13.5 The Conclusion -- References -- 14 Object Attribute Recognition Based on Hard Negative Mining and Convolutional Neural Network -- 14.1 Introduction. , 14.2 Object Location Based on Improved Faster R-CNN Model -- 14.2.1 Hard Negative Mining Strategy -- 14.2.2 OHEM-Faster R-CNN Object Location Model -- 14.3 Object Attribute Recognition Method Based on Improved Cascade Convolution Neural Network Model CS-CNN Model -- 14.3.1 Improved Activation Function and Loss Function -- 14.3.2 Improved CS-CNN Model Object Attribute Recognition Method -- 14.4 Experimental Simulations -- 14.4.1 Model Parameters -- 14.4.2 Experimental Simulations of Object Location -- 14.4.3 Contrastive Experimental Simulations of Object Attribute Recognition -- 14.5 Conclusion -- References -- 15 Research on Intelligent Identification Method of Power Equipment Based on Deep Learning -- 15.1 Introduction -- 15.1.1 Background -- 15.1.2 Purpose and Significance -- 15.1.3 Summary of Research Level at Home and Abroad -- 15.2 Solutions and Key Technologies -- 15.2.1 Power Equipment Image Processing and Feature Extraction -- 15.2.2 Power Equipment Classification -- 15.2.3 Establish a Standardized Image Analysis Library -- 15.3 Conclusion -- References -- 16 Chinese Color Name Identification from Images Using a Convolutional Neural Network -- 16.1 Introduction -- 16.2 Color Vocabulary Labeled Data Set -- 16.3 The Model of Color Recognition -- 16.3.1 Design of Multi-label Convolutional Neural Networks -- 16.3.2 Evaluation Criteria -- 16.3.3 Choosing the Appropriate Threshold -- 16.4 Conclusion -- References -- 17 Research and Design of a Key Technology for Accelerating Convolution Computation for FPGA-Based CNN -- 17.1 Introduction to Relevant Theories -- 17.1.1 Introduction to Convolution Neural Network -- 17.1.2 The Training Process -- 17.2 SpNet Model -- 17.3 Research on Correlation Algorithm Research -- 17.3.1 Im2col Algorithm -- 17.3.2 Strassen Algorithm -- 17.3.3 Improved Strassen Algorithm. , 17.4 An Accelerated Convolution Calculation Scheme Based on FPGA -- 17.4.1 Design of Training Architecture of Convolutional Neural Network Based on FPGA -- 17.4.2 Design and Implementation of Convolution Computing Module -- 17.4.3 Testing the Convolutional Neural Network -- 17.5 Summary -- References -- 18 Research on Voice Mark Recognition Algorithms Based on Optimized BP Neural Network -- 18.1 Introduction -- 18.2 Wavelet Transform of Voice Signal -- 18.3 Basic Conception of BP-GA -- 18.3.1 Construction of BP Neural Network VoicePrint Recognition -- 18.4 Design of Genetic Algorithm -- 18.5 Simulation Analyses of an Example with BP-GA Algorithm -- 18.6 Conclusions -- References -- 19 Single Image Super Resolution via Deep Convolutional Dual Upscaling Branches with Different Focus -- 19.1 Introduction -- 19.2 Related Works -- 19.2.1 Variant Shortcuts -- 19.2.2 Skillfully Nesting Modules -- 19.3 Proposed Method -- 19.3.1 The Entire Structure -- 19.3.2 Residual Learning Branch -- 19.3.3 Planar Component Branch -- 19.3.4 Mathematical Formulation -- 19.4 Experimental Results -- 19.4.1 Datasets -- 19.4.2 Parameters Settings -- 19.4.3 Results and Comparisons -- 19.4.4 Ablation Analysis -- 19.5 Conclusions -- References -- 20 Human Heart Model Rendering Based on BRDF Algorithm -- 20.1 Introduction -- 20.2 Theoretical Research and Experimental Methods -- 20.2.1 Theoretical Research -- 20.2.2 Experimental Method -- 20.3 Experimental Results -- 20.3.1 Experimental Conditions -- 20.3.2 Rendering Results and Analysis -- 20.4 Conclusions and Discussion -- References -- 21 Level Set Segmentation Algorithm for Cyst Images with Intensity Inhomogeneity -- 21.1 Introduction -- 21.2 C-V Model -- 21.3 Improved C-V Level Set Model -- 21.3.1 Local Information -- 21.3.2 Speed Function -- 21.3.3 Overall Energy Functional -- 21.4 Experimental Results and Analysis. , 21.5 Conclusion.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Blockchains (Databases). ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (244 pages)
    Ausgabe: 1st ed.
    ISBN: 9789813364707
    Serie: Smart Innovation, Systems and Technologies Series ; v.219
    DDC: 658.05574
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Editorial -- Contents -- About the Editors -- 1 Introduction to Blockchain Evolution, Architecture and Application with Use Cases -- 1.1 Layman's Introduction to Blockchain -- 1.2 The Blockchain Technology -- 1.3 Types of Blockchain -- 1.4 Evolution of Blockchain -- 1.4.1 Blockchain 1.0: Programmable Money and Cryptocurrencies -- 1.4.2 Blockchain 2.0: Smart Contracts -- 1.4.3 Blockchain 3.0: Decentralised Web -- 1.5 Ledger System for Blockchain -- 1.5.1 Centralized Ledger Systems -- 1.5.2 Distributed Ledger Systems -- 1.6 Layers of Blockchain -- 1.6.1 Hardware or Infrastructure Layer -- 1.6.2 Data Layer -- 1.6.3 Network Layer -- 1.6.4 Consensus Layer -- 1.6.5 Application Layer -- 1.7 Use Cases and Applications of Blockchain -- 1.8 Development Tools for Blockchain -- 1.9 Summary -- References -- 2 Blockchain: A Technology in Search of Legitimacy -- 2.1 Introduction -- 2.2 Theoretical Background -- 2.3 Research Design and Methodology -- 2.4 Results -- 2.5 Discussion and Conclusion -- References -- 3 Using Blockchain in Intermittently Connected Network Environments -- 3.1 Introduction -- 3.2 Overview of Delay Tolerant Networks -- 3.2.1 Features -- 3.2.2 Architecture -- 3.2.3 Routing -- 3.2.4 Applications -- 3.3 Rudimentary Elements of Blockchain -- 3.3.1 Blocks -- 3.3.2 Transaction -- 3.3.3 Mining -- 3.3.4 Ethereum and Smart Contracts -- 3.4 Integration of Blockchain Technology with DTNs -- 3.4.1 System Components -- 3.4.2 Generation and Transmission of Shelter Needs -- 3.4.3 Need Validation and Creation of Local Blockchain -- 3.4.4 Block Conversion Through API -- 3.4.5 Mining Blocks and Deploying to Global Blockchain -- 3.5 Open Research Areas -- 3.6 Conclusion -- References -- 4 Slaying the Crypto Dragons: Towards a CryptoSure Trust Model for Crypto-economics -- 4.1 Introduction: Blockchain and the Right to Be Forgotten. , 4.2 The New 'Crypto-economy'-A Fraudsters' Playground? -- 4.3 Blockchain: Sceptical ICT Professionalism and Legal Due Diligence -- 4.4 The Need for Trusted Third Parties and for Probative Electronic Evidence -- 4.5 Towards a CryptoSure Trust Model for Crypto-economics -- 4.6 Conclusions: Blockchain Versus Trust-The Expert Issues in Disputes Over Crypto Assets -- 5 Decentralized Governance for Smart Contract Platform Enabling Mobile Lite Wallets Using a Proof-of-Stake Consensus Algorithm -- 5.1 Introduction -- 5.2 Preliminaries for Qtum Decentralized Blockchain Governance -- 5.3 Qtum Basic Requirement Sets for Decentralized Governance -- 5.3.1 UTXO Versus Account Model -- 5.3.2 Consensus Management -- 5.3.3 Mutualized Proof-of-Stake -- 5.3.4 AAL and EVM Integration -- 5.4 Scalability Extension of the Virtual Machine Through Decentralized Governance -- 5.4.1 Qtum Transaction Processing Using Virtual Machine -- 5.4.2 Decentralised Governance Protocol -- 5.5 Qtum Account Abstraction Layer -- 5.6 Discussion of the Technical Governance Realization -- 5.6.1 Hard fork Update -- 5.6.2 Qtum X86 Virtual Machine -- 5.7 Conclusions -- References -- 6 Blockchain Technology: Security and Privacy Issues -- 6.1 Introduction -- 6.2 Distributed Ledger Technology -- 6.2.1 Blockchain Benefits -- 6.2.2 How Blockchain Works -- 6.2.3 Consensus Algorithms -- 6.3 Blockchain Pros and Cons -- 6.4 Applications of Blockchain -- 6.4.1 Blockchain 1.0 -- 6.4.2 Blockchain 2.0 -- 6.5 Blockchain Security Issues -- 6.5.1 Cryptojacking Attacks -- 6.5.2 51% Attack -- 6.5.3 Smart Contract Attacks -- 6.6 Discussion -- 6.6.1 Voting and Blockchain -- 6.6.2 Energy and Blockchain -- 6.6.3 Web 3.0 and Blockchain -- 6.7 Conclusions -- References -- 7 Personal Data Protection in Blockchain with Zero-Knowledge Proof -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Background About Blockchain. , 7.4 Personal Data Protection and Blockchain -- 7.5 Zero-Knowledge Proof on Blockchain -- 7.5.1 Zerocoin Protocol -- 7.5.2 Zerocash Protocol -- 7.5.3 Zcash and Zk-SNARK -- 7.6 Conclusion -- References -- 8 Design and Verification of Privacy Patterns for Business Process Models -- 8.1 Introduction -- 8.2 A Privacy-Aware System Using Blockchain -- 8.2.1 Scenario: A Cloud-Based Order System -- 8.3 GDPR Verification -- 8.3.1 Design Time Verification -- 8.3.2 Runtime Verification -- 8.4 Experimental Results -- 8.4.1 Evaluation of Design Time Verification -- 8.4.2 Evaluation of Runtime Verification -- 8.5 Conclusion -- References -- 9 Blockchain Technology in Energy Field: Opportunities and Challenges -- 9.1 Introduction -- 9.2 Blockchain Solutions for Energy Internet -- 9.3 Application Scenarios of Blockchain Technology in the Energy Industry -- 9.4 Challenges -- 9.5 Conclusions -- References -- 10 BlockChainTechnology for Energy Transition -- 10.1 Introduction -- 10.2 What Is the "Energy Transition"? -- 10.2.1 Business Models in the Energy Sector -- 10.2.2 New Business Models for Energy Transition -- 10.3 BlockChain and Smart Contracts in the Energy Sector -- 10.3.1 Types of Applications of BlockChain and Smart Contracts in the Energy Sector -- 10.3.2 New Business Models Enabled by BlockChain in the Energy Market -- 10.3.3 Risks and Issues Related to BlockChain and Smart Contracts -- 10.4 The Framework -- 10.4.1 The Business Model Canvas -- 10.4.2 The Use Case Selection -- 10.4.3 Impact Analysis of the Two Selected Use Cases -- 10.4.4 The Business Models for the Use Cases -- 10.4.5 Microgrid Business Model (Elaborated After the Workshop) -- 10.4.6 Discussion of the Results -- 10.5 Current Trends and Future Scenarios -- 10.5.1 P2P Distributed Energy Trading for Residential Microgrids. , 10.5.2 Bridging Industrial and Residential Microgrids Through Electric Vehicles -- 10.6 Conclusions -- References -- 11 The Feasibility and Significance of Employing Blockchain-Based Identity Solutions in Health Care -- 11.1 Introduction -- 11.2 A Brief History of Identities in the Digital Age -- 11.2.1 Fully Centralized Identity Management -- 11.2.2 Federated Identity Management -- 11.2.3 User-Centric Identity Management -- 11.3 The Main Ideas Behind Decentralized Identity Management -- 11.3.1 Decentralized Identifier Based on Blockchain -- 11.3.2 Zero-Knowledge Proof -- 11.3.3 Decentralized Blockchains and the Internet -- 11.4 The Technical Architecture of Decentralized Identity Management -- 11.4.1 Architecture Overview -- 11.4.2 Blockchain-Based DID Service -- 11.4.3 Standardization of DIDs -- 11.4.4 Examples of DID Frameworks -- 11.5 The Potential of Applying Blockchain-Based DID Solutions in Health Care -- 11.5.1 Addressing the Patient Mismatching Problem -- 11.5.2 Facilitating Patient Recruitment in Clinical Research Using DID -- 11.5.3 The Safer Use of Medical Devices -- 11.5.4 Limitations Facing Current Blockchain-Based DID Solutions -- 11.6 Conclusion -- References -- 12 Toward eHealth with Blockchain: Success Factors for Crowdfunding with ICOs -- 12.1 Introduction -- 12.2 Theoretical Background -- 12.2.1 eHealth -- 12.2.2 Initial Coin Offerings (ICOs) and Blockchain -- 12.2.3 Signaling Theory -- 12.3 Research Method -- 12.3.1 Related Work -- 12.4 Research Hypotheses -- 12.4.1 Data and Variables -- 12.5 Results and Discussion -- 12.5.1 Descriptive Statistics of the ICO Data -- 12.5.2 Multivariate Analysis of the Factors Influencing the Success -- 12.6 Discussion -- 12.7 Conclusion -- References -- 13 Blockchain Track and Trace System (BTTS) for Pharmaceutical Supply Chain -- 13.1 Introduction -- 13.2 Related Works. , 13.3 Overview of Bitcoin, Blockchain Platforms and Smart Contracts -- 13.4 The Proposal Model -- 13.4.1 Structure of Blockchain Track and Trace System (BTTS) -- 13.4.2 The Proposed Smart Contracts -- 13.5 Conclusion and Future Works -- References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Schlagwort(e): Three-dimensional imaging-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (512 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811538674
    Serie: Smart Innovation, Systems and Technologies Series ; v.180
    DDC: 621.36699999999996
    Sprache: Englisch
    Anmerkung: Intro -- International Program Committee -- Honorary Chair -- General Chairs -- Organizing Chair -- International Advisory Chair -- Founder of IRNet China -- Co-founder of IRNet China -- TPC Members -- Sponsors -- Preface -- Contents -- About the Editors -- 1 3D-DIC Technique for Strain Measurement in FRP Strip Externally Bonded to Concrete Specimens -- 1.1 Introduction -- 1.2 Basic Principle and Advantages of 3D-DIC System -- 1.2.1 Basic Principle and Test Setup of 3D-DIC System -- 1.2.2 Advantages -- 1.3 Operation Process of 3D-DIC -- 1.3.1 Speckle Marking -- 1.3.2 Operation Process -- 1.4 Specimens and Materials -- 1.5 Results and Analysis -- 1.5.1 Strain Distribution of FRP Strips -- 1.5.2 Bond-Slip Relation -- 1.6 Conclusions -- References -- 2 Establishment of Quality Detection and 3D Evaluation Model of Wool Fabric Based on Machine Vision -- 2.1 Introduction -- 2.2 Fluffy Surface Quality Measurement Principle -- 2.2.1 Measurement System Principle Introduction -- 2.2.2 Thickness Measurement Principle -- 2.3 Extraction of the Upper Edge of the Fluff and the Baseline -- 2.4 Villus Surface Quality Estimation Parameter Model -- 2.4.1 Selection of Parameter Model -- 2.5 Test -- 2.5.1 Test Platform -- 2.5.2 Test Data Analysis -- 2.6 Conclusion -- References -- 3 The Research and Design of Wage Supervision Service Platform for Migrant Workers Based on Big Data and Iris Recognition Technology -- 3.1 Background Introduction -- 3.2 Technology Introduction -- 3.2.1 Big Data Technology -- 3.2.2 Iris Recognition Technology -- 3.3 Functional Demand Analysis of Wage Supervision Platform -- 3.4 Logical Architecture Design of Wage Supervision Platform -- 3.5 Network Topology Structure Design of Wage Supervision Platform -- 3.6 Conclusion -- References -- 4 Research on Block Segmentation and Assembly Technology of 3D Printing Structure -- 4.1 Introduction. , 4.2 3D Printing Technology -- 4.2.1 Introduction to Three Technologies Commonly Used in 3D Printing -- 4.2.2 Four Common Data Formats for 3D Printing -- 4.2.3 Basic Requirements for 3D Printing STL Data Format -- 4.3 Block Segmentation and Assembly Technology of 3D Printing Component -- 4.3.1 Block Segmentation and Assembly Process of 3D Printing Component -- 4.3.2 Selection of 3D Printing Sub-block Direction and Position -- 4.4 Printing Cases -- 4.5 Conclusion -- References -- 5 A Study on 3D Reconstruction Method for Common View Field in Hybrid Vision System -- 5.1 Introduction -- 5.2 Hybrid Vision System -- 5.2.1 Introduction of Hybrid Vision System Model -- 5.2.2 The Imaging Principle of RGB-D Camera -- 5.2.3 The Imaging Principle of Panoramic Camera -- 5.3 The Feature Points 3D Reconstruction -- 5.3.1 SURF Feature Extraction -- 5.3.2 SURF Feature Matching -- 5.3.3 3D Reconstruction of Feature Points -- 5.4 Results -- 5.4.1 Feature Matching Point 3D Reconstruction -- 5.4.2 Discussion -- 5.5 Conclusion -- References -- 6 Three-Dimensional Characteristics Observation of Ocean Waves in Coastal Areas by Microwave Doppler Radar -- 6.1 Introduction -- 6.2 3D Spectrum Pre-processing -- 6.3 Radar Data -- 6.4 3D Characteristics of Ocean Wave -- 6.5 Conclusion -- References -- 7 Three-Dimensional Reconstruction Based on Left Right Objects -- 7.1 Research Background and Significance -- 7.2 Technical Route -- 7.2.1 Offline Calibration -- 7.2.2 Stereo Correspond -- 7.3 Results and Analysis -- 7.4 Conclusion -- References -- 8 Research on 3D Scene Dynamic Scanning Modeling Technology of Substation Based on Depth Vision -- 8.1 Introduction -- 8.2 Deep Visual 3D Scanning Modeling Algorithm for Indoor and Outdoor Environments of Substation Operations -- 8.2.1 Semi-dense SLAM Based on RGB-D in Complex Indoor Working Environment. , 8.2.2 Sparse SLAM Based on Binocular Camera in Complex Outdoor Working Environment -- 8.3 Hybrid Hierarchical Scanning Modeling for Large-Scale Scenes -- 8.4 Regional Learning and Substation Environment Understanding Under Scene Point Cloud -- 8.4.1 Point Cloud Pretreatment -- 8.4.2 Point Cloud Clustering -- 8.5 Conclusions -- References -- 9 Fusion and Localization Technology of 3D Model Attitude and Real Physical Environment Visualization Information of Power Inspection Site -- 9.1 Introduction -- 9.2 Binocular Posture and Visual Information Fusion Positioning Technology -- 9.3 Conclusions -- References -- 10 The Research and Design of Big Data Monitoring Platform for Enterprise Growth -- 10.1 Background Introduction -- 10.2 Introduction to Big Data Technology -- 10.3 Functional Demand Analysis -- 10.4 System Development and Design -- 10.4.1 Overall Architecture Design -- 10.4.2 System Functional Architecture Design -- 10.4.3 Network Topology Structure Design -- 10.5 Conclusion -- References -- 11 Application Analysis of Big Data in Library Management and Service -- 11.1 Introduction -- 11.2 Big Data Technology Overview -- 11.3 Analysis of Library Management Service Problems -- 11.3.1 Computational Ability Is Weak -- 11.3.2 Lack of Optimization of Network Resources -- 11.4 The Advantages of Big Data in Library Management and Services -- 11.4.1 Improve the Efficiency of Collection and Integration of Books and Resources -- 11.4.2 Optimize Library Service Projects -- 11.4.3 Promote Resource Sharing and Form a Library Sharing System -- 11.5 The Difficulties and Solutions of Big Data Applied to Libraries -- 11.5.1 The Library Big Data System Is not Perfect -- 11.5.2 Lack of Skills in Librarians -- 11.5.3 Management Mode Is Old Curing -- 11.6 The Conclusion -- References. , 12 Application of Virtual Reality Technology in the Teaching of 3D Animation Course -- 12.1 Virtual Reality Technology -- 12.2 Integration of Virtual Reality Technology and 3D Animation Technology -- 12.3 The Importance of Virtual Reality Technology to the Teaching of 3D Animation Courses -- 12.3.1 Innovation in Teaching Ideas -- 12.3.2 Abundance of Teaching Methods -- 12.3.3 Motivate Learners to Learn Independently -- 12.3.4 Implementation of Interactive Learning -- 12.4 The Importance of Virtual Reality Technology to the Teaching of 3D Animation Courses -- 12.4.1 Teaching of 3D Animation Course Theory -- 12.4.2 Teaching of 3D Animation Course Practice -- 12.5 Conclusion -- References -- 13 Study on Properties of Polymer Materials Based on 3D Printing Technology -- 13.1 Introduction -- 13.2 Experimental Methods -- 13.2.1 3D Printing Specimen -- 13.2.2 Tensile Test -- 13.3 Results and Discussions -- 13.4 Conclusion -- References -- 14 Improved SSD-Based Multi-scale Pedestrian Detection Algorithm -- 14.1 Introduction -- 14.2 Improved SSD Pedestrian Detection Model -- 14.2.1 Introduction of Context Information -- 14.2.2 SSD Improvement Layer Network Structure Design -- 14.3 Model Training and Analysis of Experimental Results -- 14.3.1 Data Preprocessing and Parameter Setting -- 14.3.2 Performance Evaluation Index -- 14.3.3 Experimental Results -- 14.4 Conclusion -- References -- 15 Activity Recognition System Optimisation Using Triaxial Accelerometers -- 15.1 Introduction -- 15.2 Related Works -- 15.3 Data Description -- 15.4 Results and Analysis -- 15.5 Conclusion -- References -- 16 Near-Duplicate Video Detection Based on Temporal and Spatial Key Points -- 16.1 Introduction -- 16.2 The Classic Key Frame Extraction and Video Shot Segmentation Technology -- 16.2.1 Video-Shot-Based Method -- 16.2.2 Visual-Feature-Based Method. , 16.2.3 Cluster-Based Method -- 16.3 Temporal and Visual Feature Extraction -- 16.3.1 Video Segmentation -- 16.3.2 Video Segment Feature Extraction -- 16.3.3 Video Segment Matching -- 16.4 Two Classification Methods -- 16.4.1 Similar Detection for Given Samples -- 16.4.2 Similar Video Automatic Classification -- 16.5 Experimental Results -- 16.5.1 Dataset Introduction and Experiment Procedure -- 16.5.2 Analysis of Results -- 16.6 Conclusion -- References -- 17 Surface Defect Detection Method for the E-TPU Midsole Based on Machine Vision -- 17.1 Introduction -- 17.2 Relevant Knowledge -- 17.2.1 E-TPU Material -- 17.2.2 The Theory of Second-Order Difference Method -- 17.3 Proposed Method -- 17.3.1 The Theory of Second-Time Difference -- 17.3.2 Detection Algorithm -- 17.4 Experiment and Analysis -- 17.4.1 Experimental Conditions and Methods -- 17.4.2 The Experiment Content and Result -- 17.4.3 Analysis of Experimental Results -- 17.5 Conclusion -- References -- 18 A Multi-view Learning Approach for Glioblastoma Image Contrast Enhancement -- 18.1 Introduction -- 18.2 Background -- 18.3 Proposed Method -- 18.4 Experimental Results -- 18.5 Conclusion -- References -- 19 Multi-focus Image Fusion Based on Convolutional Sparse Representation with Mask Simulation -- 19.1 Introduction -- 19.2 Convolutional BPDN Dictionary Learning with Mask Simulation -- 19.3 Proposed CSRMS-Based Fusion Method -- 19.3.1 Source Multi-focus Image Decomposition -- 19.3.2 Fusion of High-Frequency Components -- 19.3.3 Fusion of Low-Frequency Components -- 19.3.4 Image Reconstruction -- 19.4 Experiments and Analysis -- 19.5 Conclusion -- References -- 20 A Collaborative Sparse Representation-Based Approach for Pattern Classification -- 20.1 Introduction -- 20.2 Related Work -- 20.2.1 Sparse Representation-Based Classification. , 20.2.2 Weighted Group Sparse Representation Classification.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...