GLORIA

GEOMAR Library Ocean Research Information Access

Sprache
Bevorzugter Suchindex
Ergebnisse pro Seite
Sortieren nach
Sortierung
Anzahl gespeicherter Suchen in der Suchhistorie
E-Mail-Adresse
Voreingestelltes Exportformat
Voreingestellte Zeichencodierung für Export
Anordnung der Filter
Maximale Anzahl angezeigter Filter
Autovervollständigung
Themen (Es wird nur nach Zeitschriften und Artikeln gesucht, die zu einem oder mehreren der ausgewählten Themen gehören)
Feed-Format
Anzahl der Ergebnisse pro Feed
feed icon rss

Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    Schlagwort(e): Artificial intelligence. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (475 pages)
    Ausgabe: 1st ed.
    ISBN: 9783319495682
    Serie: Advances in Intelligent Systems and Computing Series ; v.541
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgments -- Contents -- Autonomous Systems -- Testing Paper Optimization Based on Improved Particle Swarm Optimization -- Abstract -- 1 Introduction -- 2 Background and Relative Researches -- 3 Testing Paper Optimization -- 3.1 Particle Swarm Optimization (PSO) -- 3.2 Parameter Initialization -- 3.3 Evaluation Function of the TPOPSO -- 3.4 The Global and Local Optimum -- 4 Experiment and Discussion -- 4.1 Examination Question Database -- 4.2 The Performance of the TPOPSO -- 5 Conclusion -- References -- The Null Space Pursuit Algorithm Based on an Arbitrary Order Differential Operator -- Abstract -- 1 Introduction -- 2 The Null Space Pursuit Algorithm Based on an Arbitrary Order Differential Operator -- 3 Experiment Result and Analysis -- 4 Summary -- Acknowledgement -- References -- Parameters Estimation of Regression Model Based on the Improved AFSA -- Abstract -- 1 Introduction -- 2 Multiple Linear Regression Model -- 3 AFSA -- 4 The Improved AFSA -- 4.1 The Improvement of Algorithm Parameters -- 4.2 The Improved Swarming Behavior -- 4.3 The Definition of Artificial Fish Individuals and Fitness Function -- 4.4 The Process of the Improved AFSA -- 5 Results and Conclusion -- Acknowledgment -- References -- Research on Hysteresis Modeling for Piezoelectric Displacement Actuators -- Abstract -- 1 Introduction -- 2 The Symmetry and Features of Hysteretic Loop Curves for a PZT Patch -- 2.1 Hysteretic Loop and Central Symmetry -- 2.2 Foldback Point and Centrosymmetric Center -- 2.3 The Variation of Loops, Their Upgrading/Degrading and Emerging/Vanishing -- 3 Mathematic Model -- 4 Experimental Results -- 5 Conclusions -- Acknowledgements -- References -- An Iterative Method for the Least Squares Anti-bisymmetric Solution of the Matrix Equation -- Abstract -- 1 Introduction -- 2 An Iterative Method for Solving Problem I. , 3 The Solution for Problem II -- References -- Parallelization of the Conical Area Evolutionary Algorithm on Message-Passing Clusters -- Abstract -- 1 Introduction -- 2 Partially Evolved Parallelization of CAEA -- 2.1 Partially Evolved Island Model -- 2.2 Elitist Migration Among Islands -- 2.3 Dynamic Directional Migration Topology -- 2.4 Procedure of PeCAEA -- 3 Experimental Results and Analysis -- 4 Conclusions -- Acknowledgments -- References -- Design of Heat Preservation Bathtub with Water Saving -- Abstract -- 1 Introduction -- 2 Problem Description -- 3 The Model -- 3.1 Analysis of Bath Process -- 3.2 Analysis of Heat Gain and Loss -- 3.3 A Double Multi-objective Optimization Model -- 3.4 Effect of Bubble Bath Agent -- 4 Sensitivity Analysis -- 5 Conclusion -- References -- A Label-Correlated Multi-label Classification Algorithm Based on Spearman Rank Correlation Coefficient -- Abstract -- 1 Introduction -- 2 An Introduction to Related Algorithms -- 2.1 Spearman Rank Correlation Coefficient -- 2.2 Confidence and Confidence Interval -- 2.3 Multi-label Classification Strategy of Adaboost-SVM -- 3 Label-Correlated Multi-label Classification Model Algorithm (LC-ASVM) -- 3.1 General Design -- 3.2 Correlation Analysis of Characteristics -- 3.3 Confidence Form Multi-label SVM -- 3.4 Build LC-ASVM Model -- 4 Experiment and Analysis -- 4.1 Experimental Datasets -- 4.2 Experimental Results and Analysis -- 5 Conclusions -- References -- Effect of Film Thickness on Load-Carrying Property of Seawater Dynamic-Hydrostatic Hybrid Thrust Bearing -- Abstract -- 1 Introduction -- 2 Brief of Seawater-Lubricated Hydrostatic-Dynamic Thrust Bearing -- 2.1 Lubricate Flow Through the Channel in the Sector Opposed Supporting Ladder-Cavity -- 2.2 Supporting Mechanism for Opposed Supporting Ladder-Cavity -- 2.3 Initial Design Parameters of the Thrust Bearing. , 3 Property Index of the Thrust Bearing -- 3.1 Static Property Index -- 3.2 Dynamic Property Index -- 3.3 Vibration Property Index -- 4 Influence of Shallow Cavity Depth on Static Performance -- 5 Influence of Film Thickness on Dynamic Property Index -- 6 Influence of Film Thickness on Vibration Property Index -- 7 Conclusion -- Acknowledgement -- References -- Research on Static Performance of Water-Lubricated Hybrid Bearing with Constant Flow Supply -- Abstract -- 1 Introduction -- 2 Static Performance Analysis -- 2.1 Flow Condition -- 2.2 Bearing Force Calculation -- 2.3 Static Performance Indexes -- 2.4 Influence of Parameter on Static Index -- 3 Conclusion -- Acknowledgement -- References -- A New Method for Desiccant Package Quality Check -- Abstract -- 1 Introduction -- 2 The Proposed Method -- 2.1 Correct the Captured Image -- 2.2 Wipe Out the Contaminated Samples -- 2.3 Detect the Integrity of the Packaging -- 3 Experiment Result -- 4 Conclusion -- Acknowledgments -- References -- A Novel Algorithm for Laser Spot Detection Based on Quaternion Discrete Cosine Transform -- Abstract -- 1 Introduction -- 2 The Quaternion Discrete Cosine Transform Based Laser Spot Detection -- 2.1 Quaternion Discrete Cosine Transform -- 2.2 Image Moment Method (IMM) -- 3 Experiment -- 4 Conclusions -- References -- Natural Frequency Modification Using Frequency-Shift Combined Approximations Algorithm -- Abstract -- 1 Introduction -- 2 Formulation and Solution -- 2.1 Natural Frequency Sensitivity Analysis Using FSCA Method -- 2.2 Natural Frequency Modification Based on Taylor Series Expansion -- 3 Numerical Example -- 4 Conclusion -- Acknowledgements -- References -- Adaptive Stochastic Ranking Schemes for Constrained Evolutionary Optimization -- Abstract -- 1 Introduction -- 2 Theoretical Analysis and Proposed Approach -- 3 Experimental Results -- 4 Conclusion. , Acknowledgments -- References -- A Case-Based Reasoning Method with Relative Entropy and TOPSIS Integration -- Abstract -- 1 Introduction -- 2 Related Work -- 3 CBR Framwork with Relative Entropy and TOPSIS -- 3.1 Similarity Measure -- 3.2 A New Ensemble Measure -- 4 RTCBR Algorithm -- 5 Experiment Study and Analysis -- 5.1 Experiment Design -- 5.2 Result Analysis -- 6 Conclusion -- Acknowledgment -- References -- An Algorithm Design for Electrical Impedance Tomography Based on Levenberg Method -- Abstract -- 1 Introduction -- 2 Levenberg-Marpuardt Algorithm (L-Algorithm) -- 3 Construct Differential Matrix in L-Algorithm -- 4 Construction of Improved Algorithm for Electrical Impedance Tomography -- 5 Proposed Algorithm and Further Considerations -- 6 Conclusion -- References -- A Return-Value-Unchecked Vulnerability Detection Method Based on Property Graph -- Abstract -- 1 Introduction -- 2 System Design -- 3 Property Graph Representation for Binary Software -- 3.1 Intermediate Representation -- 3.2 Static Analysis Based on Intermediate Representation -- 3.3 Property Graph Generation -- 4 Vulnerability Model and Detect Based on Property Graph -- 4.1 Vulnerability Model -- 4.2 Vulnerability Detection -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Summary -- References -- GA Based Optimization of Sign Regressor FLANN Model for Channel Equalization -- Abstract -- 1 Introduction -- 2 Channel Equalization Model -- 2.1 FLANN Model -- 2.2 Optimization Using GA -- 3 Result and Discussion -- 4 Conclusion -- References -- Research of Chemical Fabric Style Prediction System Based on Integrated Neural Network -- Abstract -- 1 Introduction -- 2 Processing of the Samples Data -- 2.1 Preprocessing of Fabric Structure Parameters -- 2.2 Introduction of Fabric Structure Complexity Factor -- 2.3 Method for Dividing Fabric Subset. , 3 Comparison of Two Predictive Methods -- 3.1 Single BP Neural Network Prediction -- 3.2 Integrated Neural Network Prediction -- 4 Conclusion -- Acknowledgements -- References -- Internet and Cloud Computing -- The Influencing Factor Analysis of Micro-blog User Adding Attend Object -- Abstract -- 1 Introduction -- 2 Relationship Between User Intimacy and Attended Objects -- 2.1 Influence Factors of Intimacy and the Representation -- 2.1.1 Basic Factors -- 2.1.2 Considering Factors -- 2.1.3 Influent Factors -- 2.2 The Definition and Computation of Intimation -- 2.3 The Relationship Between User Intimacy and the Attended Object -- 3 The Relationship Between User's Interest Degree and Attended Object -- 3.1 Interest Similarity Calculation -- 3.2 Recommendation Based on Interest Similarity Relationship -- 4 Experiment and Analyzing -- 4.1 Experimental Environment -- 4.2 Evalution Index of Result -- 4.3 Experimental Results -- 5 Conclusion -- Acknowledgement -- References -- History Path Reconstruction Analysis of Topic Diffusion on Microblog -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 2.1 Basic Definition -- 2.2 Topic Detection -- 2.3 Probabilistic Score Based Diffusion Model -- 3 Experiment Results and Discussion -- 3.1 Experiment Realization -- 3.2 Experimental Results and Analysis -- 4 Conclusion -- Acknowledgements -- References -- A Novel Session Identification Scheme with Tabbed Browsing -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Traditional Browsing and Tabbed Browsing -- 2.2 Survey of Users' Browsing Modes -- 2.3 Tabbed Browsing and Session Identification -- 3 Fixed Threshold Session Identification Scheme -- 4 Novel Session Identification Scheme -- 5 Experiment and Evaluation -- 5.1 Date Preprocessing -- 5.2 Metrics -- 5.3 Performance Evaluation -- 6 Conclusion -- Acknowledgement -- References. , Research of Optimizing the System Partition in Android System.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (255 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811977428
    Serie: Smart Innovation, Systems and Technologies Series ; v.330
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- AIVR 2022 Organization -- Preface -- Contents -- About the Editors -- Part I Invited Paper -- 1 Paraconsistency and Paracompleteness in AI: Review Paper -- 1.1 Introduction -- 1.1.1 Classical and Non-classical Logic -- 1.2 Paraconsistent and Paracomplete Logic -- 1.3 AI and Formal Systems -- 1.4 Paraconsistent Annotated Evidential Logic Eτ -- 1.5 Application in Robotics -- 1.5.1 Description of the Prototype -- 1.5.2 Development of the Paraconsistent Annotated Logic Algorithm -- 1.6 Multi-criteria Decision Analysis (MCDA) in Health Care -- 1.7 Conclusions -- References -- Part II Regular Papers -- 2 Decision Support Multi-agent Modeling and Simulation of Aeronautic Marine Oil Spill Response -- 2.1 Introduction -- 2.2 Modeling and Simulation -- 2.2.1 Marine Oil Spill Response Process -- 2.2.2 DEVS and Multi-agent Modeling -- 2.3 Response Plan Evaluation -- 2.3.1 Response Plan Agent -- 2.3.2 Evaluation Indicators System -- 2.4 Instance Analysis -- 2.4.1 Simulation Scenario -- 2.4.2 Simulation-Based Evaluation for Decision Support -- 2.5 Conclusion -- References -- 3 Transferring Dense Object Detection Models To Event-Based Data -- 3.1 Introduction -- 3.1.1 Contributions and Outline -- 3.2 Dataset and Frame Representation -- 3.2.1 KITTI Vision Dataset -- 3.2.2 Optical Event Data and Histograms -- 3.3 Implementation -- 3.3.1 Sparseconvnet Extensions -- 3.3.2 Asynet Extensions -- 3.3.3 Dataloader -- 3.4 Error Analysis -- 3.4.1 Sparse YOLO Versus Dense YOLO -- 3.4.2 Sparse Versus Dense Convolutions -- 3.4.3 Event-Window Size -- 3.5 Runtime Analysis -- 3.5.1 Dense Versus Sparse -- 3.5.2 Batch Size -- 3.5.3 Synchronous Versus Asynchronous -- 3.5.4 Asynchronous Sequence Count -- 3.5.5 Theoretical Runtime -- 3.6 Conclusion -- References. , 4 Diagnosing Parkinson's Disease Based on Voice Recordings: Comparative Study Using Machine Learning Techniques -- 4.1 Introduction -- 4.2 Related Research Work -- 4.2.1 Logistic Regression -- 4.2.2 Random Forest -- 4.2.3 SVM -- 4.2.4 KNN -- 4.2.5 Gradient-boosted Decision Trees -- 4.3 Dataset -- 4.4 Methodology -- 4.5 Results -- 4.6 Conclusion -- References -- 5 Elements of Continuous Reassessment and Uncertainty Self-awareness: A Narrow Implementation for Face and Facial Expression Recognition -- 5.1 Introduction -- 5.2 Proposed Solution -- 5.3 Data Set -- 5.4 Experiments -- 5.4.1 Trusted Accuracy Metrics -- 5.5 Results -- 5.6 Discussion, Conclusions, and Future Work -- References -- 6 Topic-Aware Networks for Answer Selection -- 6.1 Introduction -- 6.2 Related Works -- 6.2.1 Topic Embedding Generation -- 6.2.2 Answer Selection -- 6.3 Methodology -- 6.3.1 Topic Embedding -- 6.3.2 Topic-Aware Networks -- 6.3.3 Triplet Loss -- 6.4 Experiments -- 6.4.1 Dataset -- 6.4.2 Experiment Settings -- 6.4.3 Results and Discussion -- 6.5 Conclusion and Future Work -- References -- 7 Design and Implementation of Multi-scene Immersive Ancient Style Interaction System Based on Unreal Engine Platform -- 7.1 Introduction -- 7.2 Technical Basis -- 7.2.1 Lighting Model -- 7.2.2 From Physical Phenomena to BRDF -- 7.2.3 Physical-based Environment Lighting -- 7.3 Conceive Preparation -- 7.3.1 Research on the Current Situation of UE4 Used for Developing This Work -- 7.3.2 Storyboard -- 7.3.3 Design Process -- 7.4 The Main Scene Building Part -- 7.4.1 The Idea of Building a Scene of the Tang Dynasty -- 7.4.2 Collider -- 7.4.3 Light Effect of Dusk -- 7.4.4 Particle Effects -- 7.5 Functional Design -- 7.5.1 Sequence Animation in Scene -- 7.5.2 Release Kongming Lanterns -- 7.5.3 Large Amounts of Kongming Lanterns Take off -- 7.6 Artwork Display and Rendering Resource Analysis. , 7.6.1 Project Framework Diagram and Interactive Display Screenshots -- 7.6.2 Project Performance Analysis -- 7.6.3 Project Innovation -- 7.7 Conclusion -- 8 Auxiliary Figure Presentation Associated with Sweating on a Viewer's Hand in Order to Reduce VR Sickness -- 8.1 Introduction -- 8.2 Related Work -- 8.3 Experiment to Select Physiological Signal that Correlates with VR Sickness -- 8.3.1 Physiological Signals -- 8.3.2 Experiment Environment and Task -- 8.3.3 Result -- 8.3.4 Analyses and Discussions -- 8.4 Design of Auxiliary Figure Control System -- 8.5 Evaluation Experiment -- 8.5.1 Procedure and Task -- 8.5.2 Results -- 8.5.3 Discussions -- 8.6 Conclusions -- References -- 9 Design and Implementation of Immersive Display Interactive System Based on New Virtual Reality Development Platform -- 9.1 Introduction -- 9.2 System Methodology -- 9.2.1 Demand Analysis -- 9.2.2 Analysis of Our Developing Platform -- 9.2.3 Development Processing -- 9.3 Analysis of Key Technologies -- 9.3.1 Model Construction and Import -- 9.3.2 Real Shading in Unreal Engine 4 -- 9.3.3 Making Interactive Experiences -- 9.4 Conclusion -- References -- 10 360-Degree Virtual Reality Videos in EFL Teaching: Student Experiences -- 10.1 Introduction -- 10.2 Literature Review -- 10.2.1 Different VR Types -- 10.2.2 VR in Higher Education -- 10.2.3 VR Embedded Language Learning -- 10.3 Research Methods -- 10.3.1 Participants -- 10.3.2 Instruments -- 10.3.3 Procedures -- 10.3.4 Data Analysis -- 10.4 Results -- 10.4.1 Results of Two Interview Questions -- 10.5 Discussion -- 10.6 Conclusions -- References -- 11 Medical-Network (Med-Net): A Neural Network for Breast Cancer Segmentation in Ultrasound Image -- 11.1 Introduction -- 11.2 Related Work -- 11.3 Proposed Breast Ultrasound Segmentation Model (Med-Net) -- 11.3.1 Encoder Architecture -- 11.3.2 Attention Module. , 11.3.3 Decoder Architecture -- 11.3.4 Implementation Details -- 11.3.5 Dataset -- 11.4 Discussion -- 11.5 Conclusion -- References -- 12 Auxiliary Squat Training Method Based on Object Tracking -- 12.1 Introduction -- 12.2 Material and Methods -- 12.2.1 The Basic Force Arm of Deep Squat -- 12.2.2 Object Tracking -- 12.2.3 Action Analysis -- 12.3 Results -- 12.3.1 Sagittal Plane Motion Analysis -- 12.3.2 Coronal Plane Motion Analysis -- 12.4 Discussion -- 12.5 Conclusion -- References -- 13 Study on the Visualization Modeling of Aviation Emergency Rescue System Based on Systems Engineering -- 13.1 Introduction -- 13.2 Aviation Emergency Rescue System Architecture Analysis -- 13.2.1 Disaster Prevention and Early Warning Stage -- 13.2.2 Disaster Preparation Stage -- 13.2.3 Emergency Response Stage -- 13.2.4 Recovery and Reconstruction Stage -- 13.3 Aviation Emergency Rescue System Visualization Model -- 13.3.1 Operational Viewpoint DoDAF-Described Models -- 13.3.2 Capability Viewpoint DoDAF-Described Models -- 13.4 Conclusion -- References -- 14 An AI-Based System Offering Automatic DR-Enhanced AR for Indoor Scenes -- 14.1 Introduction -- 14.2 System Overview -- 14.2.1 Object Segmentation Component -- 14.2.2 Layout Estimation Component -- 14.2.3 Inpainting Component -- 14.2.4 Super-Resolution Component -- 14.2.5 Implementation and Orchestration -- 14.3 Experimental Setup Methodology -- 14.3.1 Component Ablation -- 14.3.2 User Study -- 14.4 Results and Discussion -- 14.4.1 Objective Evaluation -- 14.4.2 Subjective Evaluation -- 14.5 Conclusion -- References -- 15 Extending Mirror Therapy into Mixed Reality-Design and Implementation of the Application PhantomAR to Alleviate Phantom Limb Pain in Upper Limb Amputees -- 15.1 Introduction -- 15.2 Methods and Materials -- 15.2.1 Study Setup and Protocol -- 15.3 Gameplay and Technical Implementation. , 15.3.1 Game Design and Interaction Scenes -- 15.3.2 Spatial Mapping -- 15.3.3 Virtual Arm and Non-Anthropomorphic Feedback -- 15.3.4 Virtual Arm Movement -- 15.3.5 Virtual Hand Movement -- 15.3.6 Calibration -- 15.3.7 Interaction with Virtual Environment -- 15.3.8 Remote Connection for Therapeutic Intervention -- 15.4 Results -- 15.5 Discussion -- 15.6 Conclusion -- References -- 16 An Analysis of Trends and Problems of Information Technology Application Research in China's Accounting Field Based on CiteSpace -- 16.1 Questions Posed -- 16.2 Text Mining and Visual Analysis of Research Trends in Information Technology in the Field of Accounting in China -- 16.2.1 Research Tools -- 16.2.2 Source of Data -- 16.2.3 Text Mining and Visual Analysis of Related Research Based on Classification -- 16.3 A Review of Major Issues Discovered by Research and Analysis Regarding the Application of Information Technology in Accounting -- 16.3.1 Few Studies Have Been Conducted on the Application of Information Technology to Accounting in SMEs -- 16.3.2 The Number and Quality of Information-Based Accounting Education Research is Low and Declining -- 16.4 Conclusions and Recommendations of the Research on the Application of Information Technology in Accounting -- 16.4.1 Conclusions of the Research -- 16.4.2 Research Recommendations for Advancing the Application of Information Technology in Accounting -- References -- 17 Augmented Reality Framework and Application for Aviation Emergency Rescue Based on Multi-Agent and Service -- 17.1 Introduction -- 17.2 Framework of Augmented Reality System -- 17.2.1 System Framework -- 17.2.2 Service-Oriented Architecture -- 17.2.3 Multi-Agent Architecture -- 17.3 Construction of Aviation Emergency Rescue Augmented System -- 17.3.1 Construction of System -- 17.3.2 Services Development -- 17.3.3 Entity Development. , 17.4 Simulation of Aviation Emergency Rescue.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (532 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811558870
    Serie: Advances in Intelligent Systems and Computing Series ; v.1185
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Intelligent Computing -- Multi-SoftMax Convolutional Neural Network and Its Application in the Diagnosis of Planetary Gearbox Complicated Faults -- 1 Introduction -- 2 Fault Tree Structure and Muti-SoftMax Convolutional Neural Network -- 2.1 Fault Tree Structure -- 2.2 Working Parallel Structure -- 2.3 Structure of Multi-SoftMax Convolutional Neural Network -- 3 Process of Planetary Gearbox Fault Diagnosis -- 4 Example of Planetary Gearbox Fault Diagnosis -- 4.1 Structure of Convolutional Neural Network -- 4.2 Structure of Mutil-SoftMax Convolutional Neural Network -- 5 Experiment -- 6 Conclusion -- References -- Signal Complexity Measure Based on Construction Creep Rate in 3s Feature Space -- 1 Introduction -- 2 Methodology -- 2.1 0-1 Test for Chaos Review -- 2.2 New Algorithm (Spring Test) Block of 3s Plot and CC Rate -- 2.3 Two Equations as Test Cases -- 3 Results and Discussions -- 3.1 Results from pq-Plot of 0-1 Test to 3s Plot and CC Rate in Spring Test -- 3.2 Key Self-similarity Measure Threshold γ Locking in Max Complexity -- 4 Conclusions -- References -- Research on Partition Technology of Real-Time Database in Big Data Environment -- 1 The Introduction -- 2 Design of Tual-Time Partition Database System for Flow Computing -- 3 Implementation of Real-Time Partition System -- 4 Audit and Effect of System Effectiveness -- 5 Summary -- References -- RCS Sequence Period Estimation Method Based on Constant False Alarm Detection -- 1 Introduction -- 2 Periodic Movement Target Characteristics -- 3 Periodic Discriminant Method for Constant False Alarm Detection -- 3.1 Periodic Discriminant Method for Constant False Alarm Detection -- 3.2 Effectiveness Analysis -- 4 Experimental Verification -- References -- Target Recognition of RCS Sequence Based on Neural Network. , 1 Introduction -- 2 Build the Attitude Angle Template -- 3 Feature Extraction and Classifier Design -- 4 Neural Network Design -- References -- Encouraging Cooperation in Participatory Sensing with Reputation and Game Analysis -- 1 Introduction -- 2 System Model -- 3 Trust Model and Game Analysis -- 3.1 Trust Model -- 3.2 Game Model -- 3.3 Repeated Game Analysis -- 4 Conclusion -- References -- Multi-granularity Attribute Sentiment Analysis Based on Neural Network -- 1 Introduction -- 2 Related Work -- 3 Multi-granularity Sentiment Analysis Model -- 3.1 Task Definition -- 3.2 Model -- 3.3 Multi-granularity Attention Mechanism -- 3.4 Model Training -- 4 Experiment -- 4.1 Experimental Data and Parameter Configuration -- 4.2 Method Comparison -- 4.3 Analysis of Experimental Results -- 5 Conclusion -- References -- Study on Fuzzy Crop Planning Problems Based on Credibility Theory -- 1 Introduction -- 2 Basic Principles -- 3 Fuzzy Crop Planning Problem -- 3.1 Problem with Fuzzy Income Coefficients -- 3.2 Method -- 4 Conclusion -- References -- Empirical Research on the Antecedents of Enterprise IS Users' Voice Behavior Based on the Work Behavior Theory -- 1 Introduction -- 2 Theoretical Background and Hypotheses -- 3 Research Method -- 4 Research Results -- 5 Discussion and Conclusion -- References -- Image Fusion Based on Masked Online Convolutional Dictionary Learning with Surrogate Function Approach -- 1 Introduction -- 2 The Proposed Fused Algorithm -- 2.1 Masked Online Dictionary Learning Using Surrogate Function Approach with Sparse Matrix Computation -- 2.2 The Fusion Framework -- 3 Experimental -- 4 Conclusion -- References -- The Liquid Cooling Technique Based on Foam Metal Copper -- 1 Introduction -- 2 Liquid Cooling Module Design Optimization -- 2.1 Liquid Cooling Module -- 2.2 Liquid-Cooled Radiator -- 3 Liquid Cooling Module Testing. , 3.1 Comparison Test of Liquid Cooling Module Heat Dissipation Performance Based on Liquid Cooling System -- 3.2 Comparison Test of Heat Dissipation Performance of Liquid Cooling Module Based on Self-circulating Cooling System -- 4 Conclusion -- References -- Study on the Forecast of Driving Reaction Based on PNN and FCM -- 1 Introduction -- 2 Driving Reaction Relations -- 3 Driving Reaction Sample Unified Disposal -- 4 Driving Reaction Neural Network -- 5 Road Test Data Acquisition -- 6 Applying Analyses -- 7 Conclusions -- References -- Android Malware Detection via Behavior-Based Features -- 1 Introduction -- 2 Existing Malware Detection Technology -- 2.1 Static Testing Technology of the Existing Malware Detection -- 2.2 Existing Dynamic Malware Detection Technology -- 3 The Behavior-Based Feature Recognition of Detection Technology -- 3.1 The Overall Technical Program -- 3.2 User Operator Behavior Monitoring Module -- 3.3 Software Behavior Monitoring Module -- 3.4 The Malicious Behavior Feature Recognition Module -- 4 Conclusion -- References -- Analysis of the Power Converter Used in Wind Power Generator System -- 1 Introduction -- 2 Power Converter Topology for Wind Power System -- 2.1 Two-Level Voltage Source Converter -- 2.2 Multilevel Voltage Source Converter -- 2.3 Matrix Converter -- 2.4 Current Source Converter -- 3 Application Status of Converters in Variable Speed Constant Frequency Wind Power System -- 3.1 Converters Commonly Used in Medium and Low Voltage Wind Power Systems -- 3.2 Control Strategy of Common Converters in Wind Power System -- 4 Development Trend of Wind Power Converter -- 5 Conclusions -- References -- Evaluation of New Energy Theory Based on Data Recovery -- 1 Introduction -- 1.1 Research Background -- 1.2 Research Methods -- 2 Data Introduction -- 2.1 Data Sources -- 2.2 Data Processing. , 3 Theoretical Power Calculation -- 4 Conclusions -- References -- Summary, Reflection, and Prospect of Wind Power Development in China -- 1 Introduction -- 2 Wind Power Development History -- 3 Wind Power Consumption Situation -- 3.1 Wind Power Generation in Provinces -- 3.2 Accommodation Capacity Index -- 3.3 Abandoned Wind Power and Abandoned Rate -- 4 Development Summary -- 5 Suggestions -- References -- Time-Varying Probability Distribution Model of High Permeability Wind Power Considering Non-stationary Characteristics -- 1 Introduction -- 2 Time-Varying Characteristics of Wind Power Probability Distribution and Spatial Correlation Coefficient -- 2.1 Time-Varying Characteristics of Probability Distribution of Single Wind Farm -- 2.2 Time-Varying Characteristics of Rank Correlation Coefficients of Multi-wind Farms -- 3 Off-Line Conditional Dependence Model Set of Edge Probability Distribution and Rank Correlation Coefficient Matrix -- 3.1 Off-Line Conditional Dependence Model Set of Probability Distribution of Single Wind Farm -- 3.2 Off-Line Conditional Dependence Model Set of Rank Correlation Coefficient Matrix of Multi-wind Farms -- 4 Time-Varying Probability Distribution Sampling Algorithm -- 5 Validity Analysis of Time-Varying Probability Distribution Modeling -- 5.1 Simulation System -- 5.2 Effect of Time-Varying Characteristics on Wind Power Characteristic Modeling -- References -- An Adaptive T-Distribution Variation Based HS Algorithm for Power System ED -- 1 Introduction -- 2 The HS Based on Adaptive T-Distribution Mutation (t-LHS) -- 2.1 HS Algorithm -- 2.2 Variation Principle of T-Distribution -- 2.3 A HS Algorithm Based on Adaptive T-Distribution Mutation (t-LHS) -- 3 The Steps of t-LHS Algorithm for Solving ED Problems -- 4 Results and Comparison -- 4.1 3-Generator System -- 4.2 40-Generator System -- 5 Conclusions -- References. , Application of Improved Particle Swarm Optimization in Economic Dispatch of Power System -- 1 Introduction -- 2 Improved Particle Swarm Optimization (IMPSO) -- 2.1 Adjustment of Parameters -- 2.2 Optimal Learning Strategies -- 2.3 Objective Function -- 2.4 Constraints -- 2.5 Steps of IMPSO Algorithms for Solving ED Problems -- 3 Experimental Analysis and Results -- 4 Conclusions -- References -- Design of an Ultra-Short-Term Wind Power Forecasting Model Combined with CNN and LSTM Networks -- 1 Introduction -- 2 Related Works -- 2.1 Wind Power Generation Power -- 2.2 CNN Network -- 2.3 LSTM Network -- 3 The Description of the Experimental Progress -- 3.1 Data Preprocessing -- 3.2 CNN Layer -- 3.3 LSTM Layer -- References -- An Algorithm for Intelligent Attack Decision-Making -- 1 Introduction -- 2 Underlying Factors -- 3 Modeling for Intelligent Decision-Making -- 4 The Process of Intelligent Decision-Making -- 5 Achievement of the System -- 6 Conclusion -- References -- Wavelet Packet Energy Entropy Based Feature Analysis of Seismic Signals from Vehicle Targets -- 1 Foreword -- 2 Time-Frequency Feature of Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 2.1 Test for Seismic Signals from Vehicle Targets -- 2.2 Wavelet Packet Transformation of Seismic Signals from Vehicle Targets -- 3 Energy Entropy Feature Extraction for Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 3.1 Wavelet Packet Transformed Energy Entropy -- 3.2 Extraction of Energy Entropy Feature of Seismic Signals from Vehicle Targets Based on Wavelet Packet Transformation -- 4 Conclusion -- References -- Group Decision-Making Approach Under Interval-Valued Dual Hesitant Fuzzy Unbalanced Uncertain Linguistic Environments and Its Application to Community Tourism Resilience Evaluation -- 1 Introduction. , 2 Weighted Power Aggregation Operator with IVDHFUUBLS Information.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Cloud computing-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (676 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811562020
    Serie: Smart Innovation, Systems and Technologies Series ; v.153
    DDC: 004
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- About the Editors -- Internet of Things (IOT) -- An Energy-Efficient Data Routing in Weight-Balanced Tree-Based Fog Network -- 1 Introduction -- 1.1 Fog Computing -- 1.2 Tree-Based Architecture -- 1.3 Data Routing -- 1.4 Green Computing -- 2 Related Works -- 3 Proposed Architecture Towards Fog Networks -- 4 Discussions -- 5 Conclusions and Future Work -- References -- A Systematic Overview of Fault Tolerance in Cloud Computing -- 1 Introduction -- 2 Basic Components of Cloud Computing -- 3 Characteristics of Cloud Computing -- 4 Cloud Deployment Models -- 5 Cloud Service Models -- 6 Fault Tolerance -- 7 Fault Tolerance in Cloud Computing -- 7.1 Fault Tolerance Approaches -- 7.2 Fault Tolerance Parameters -- 8 Conclusion -- References -- An EPIC Mechanism for Advertising the Tourist Spots in Smart Cities -- 1 Introduction -- 2 Related Works -- 3 System Model and Problem Formulation -- 4 Tourist Spots Advertisement Problem: Posted Price Mechanism -- 4.1 Outline of PPM-TSAP -- 4.2 Detailing of PPM-TSAP -- 4.3 Illustrative Example -- 4.4 Running Time of PPM-TSAP -- 5 Conclusion and Future Work -- References -- Data Analysis and Prediction of Terror Component Using Web Services -- 1 Introduction -- 2 Background -- 2.1 Intrusion Detection System (IDS) -- 2.2 Vector Space Model -- 2.3 Receiver Operator Characteristic (ROC) Curve -- 3 Content-Based Detection of Terror-Related Activity -- 3.1 Detection Environment -- 4 Detection of Typical Terrorist Behavior -- 5 Experimental Settings -- 5.1 Evaluation Measure -- 6 Result Summarization -- 7 Deployment Issues -- 8 Conclusion -- References -- Facial Expression Recognition System (FERS): A Survey -- 1 Introduction -- 2 Related Work -- 3 Dataset Used -- 4 Discussion and Comparison of Results -- 5 Conclusion -- References. , Load Balancing of Tasks in Cloud Computing Using Fault-Tolerant Honey Bee Foraging Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Load Balancing in Cloud Computing -- 2.2 Fault Tolerance in Cloud Computing -- 2.3 Honey Bee Behaviour Inspired Load Balancing -- 2.4 Motivation -- 3 Proposed Work and Implementation -- 4 Conclusion and Future Work -- References -- Flip Learning: A Novel IoT-Based Learning Initiative -- 1 Introduction -- 2 Related Works -- 3 Level-Based Approach -- 3.1 Collaborative Learning Within the Campus -- 3.2 Middle Product -- 3.3 Customized Learning Out of the Campus -- 4 Technical Aspects -- 4.1 Mix of IoT and Cloud -- 4.2 Information Management Framework -- 4.3 Content Delivery Network -- 4.4 Use of AI -- 4.5 Virtual and Augmented Reality -- 4.6 Data Security in Network -- 5 Conclusion -- References -- Improvement of Load Balancing in Shared-Memory Multiprocessor Systems -- 1 Introduction -- 2 Overview on Prior Algorithms and Techniques -- 2.1 Static Scheduling -- 2.2 Dynamic Scheduling -- 3 Result and Discussion -- 3.1 The Mandelbrot Set [3] -- 4 Conclusion -- References -- Building Amazon Web Services Infrastructure from the Scratch for an Organization -- 1 Introduction -- 2 Proposed Work and Implementation -- 3 Conclusion and Future Work -- References -- Fault Detection for VANET Using Vehicular Cloud -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Simulation Result and Discussion -- 5 Conclusion and Future Scope -- References -- An Approach to Cohort Selection in Cloud for Face Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Architecture of the Proposed Approach -- 4 Cohort Selection Mechanism -- 4.1 Feature Extraction -- 4.2 Finding of Match Score -- 5 Database and Results -- 6 Conclusion -- References. , Internet of Things (IoT) Framework Deployment Template for Cloud-Based Harbor Surveillance and Ferry Monitoring System -- 1 Introduction -- 2 Proposed System -- 3 Model Building -- 3.1 Data Set and Test -- 4 Discussions -- 5 Conclusion -- References -- Art of Style Transfer Using Convolutional Neural Network: A Deep Learning Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Used -- 2.2 Model for Image Classification -- 2.3 Convolutional Neural Network Training Process for Style Transfer -- 3 Experimental Results -- 3.1 Experimental Steps -- 4 Conclusion and Findings -- References -- Impact of Internet of Things (IoT) on 5G -- 1 Introduction -- 2 IoT Challenges -- 3 5G Challenges -- 4 5G Characteristics and Their Values/Applications -- 4.1 5G on IoT: A Single Network for Millions of Applications -- 4.2 The Importance of 5G on the IoT -- 4.3 Application of 5G Over IoT -- 5 The Impact of 5G on IoT -- 5.1 Establishing a 5G-IoT Ecosystem -- 5.2 Future of IoT -- 5.3 Aspects of IoT on Updated 5G Technologies -- 6 Conclusion -- References -- Prediction of Exchange Rate in a Cloud Computing Environment Using Machine Learning Tools -- 1 Introduction -- 2 Machine Learning Techniques Used for Prediction Modeling Data -- 2.1 Linear Regression -- 2.2 Regression Trees -- 2.3 Decision Tree Regression -- 2.4 Boosted Trees Regression -- 2.5 Random Forest Regression -- 2.6 Neural Network Regression -- 2.7 Cloud Computing Tools -- 3 Experimental Works -- 3.1 Data set Analysis -- 3.2 Result Analysis -- 4 Conclusion -- References -- Survey on Stock Price Forecasting Using Regression Analysis -- 1 Introduction -- 2 Literature Review -- 3 Regression -- 4 Regression Methodologies -- 4.1 Linear Regression -- 4.2 Polynomial Regression -- 4.3 Logistic Regression -- 4.4 Ridge Regression -- 4.5 Stepwise Regression -- 4.6 LASSO Regression. , 4.7 Elastic Net Regression -- 5 Conclusions -- References -- Intrusion Detection and Classification Using Decision Tree-Based Feature Selection Classifiers -- 1 Introduction -- 2 Intrusion Detection System -- 3 Data Mining-Based Approach -- 3.1 Decision Tree -- 3.2 Feature Selection -- 4 Dataset Used -- 5 Result Analysis -- 6 Conclusion -- References -- Role of Cloud Computing for Big Data: A Review -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Model -- 2.2 Cloud Deployment Model -- 2.3 Challenges and Issues of Cloud Computing -- 3 Big Data -- 3.1 Technologies Supported by Big Data -- 3.2 Challenges in Big Data -- 4 Conclusion -- References -- Role of Cloud Computing in Geotechnical Engineering -- 1 Introduction -- 2 Direct Role of Cloud Computing in Geotechnical Engineering -- 2.1 State-of-the-Art Cloud Computing -- 2.2 State of the Art Approaches for Geotechnical Cloud Computing -- 3 Cloud Computing and Parameter Identification Integrated in System Identification -- 3.1 System Identification -- 3.2 Component of SI -- 4 Inverse Analysis and Parameter Identification Supported by Cloud Computing -- 4.1 General Formulation of Parameter Identification Process -- 4.2 Inverse Analysis and Parameter Identification -- 5 Research Scope and Challenges -- 6 Conclusion -- References -- Energy-Efficient Clustering with Rotational Supporter in WSN -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Step 1-Clustering of Nodes -- 3.2 Step 2-Selection of CH -- 3.3 Step 3-Selection of NCH -- 3.4 Step 4-Selection of SCH -- 4 Simulation -- 5 Conclusion -- References -- A Review on Mobile Cloud Computing -- 1 Introduction -- 2 Need of MCC -- 3 Architecture -- 4 Background -- 4.1 Service Miniatures of MCC -- 4.2 Deployment Miniatures of MCC -- 5 Features of Mobile Cloud and Its Computing -- 5.1 Scalability -- 5.2 Mobility. , 5.3 Mobile Cyber Security with Privacy -- 5.4 Enhancing Reliability with Mobile Computing -- 5.5 Reduced Cost -- 5.6 Multiple Occupancy -- 5.7 Imbalance Web Transmission -- 6 Why Mobile Cloud Computing? -- 7 Issues in MCC -- 7.1 Scarcity of Mobile Appliances -- 7.2 Safety and Seclusion -- 7.3 Short Data Transferral Rate (Bandwidth) -- 7.4 Offloading -- 7.5 Quality of Communication and Broadcasting -- 8 Conclusion -- References -- Corroborating the Veracity of Body Fat Percentage and Classification of Sarcopenia Using Island Differential Evolution Algorithm -- 1 Introduction -- 2 Methodology -- 3 Optimization of the Formula and Techniques Used -- 4 Regression and Genetic Algorithm -- 5 Residuals and Goodness-of-Fit -- 6 Identification and Classification of Sarcopenia -- 7 Island Differential Evolution Algorithm -- 8 Results Obtained -- 9 Conclusion -- References -- Design of Compact Super-Wideband Monopole Antenna for Spectrum Sensing Applications -- 1 Introduction -- 2 Antenna Configuration -- 2.1 SWB QSCA -- 2.2 QSCA with Notch Bands -- 3 Results Discussion -- 4 Conclusion -- References -- Probabilistic and Distance-Aware Clustering Approach to Decrease the Effect of Hot Spot in WSN -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 WSN Challenges -- 1.3 Energy Efficiency -- 1.4 Clustering -- 1.5 LEACH -- 2 Distance Effect -- 2.1 Hot-Spot Effect -- 2.2 Residual-Energy-Based Clustering -- 3 Related Work -- 4 Proposed Protocol -- 5 Results -- 6 Conclusion -- References -- A Real-Time Sentiments Analysis System Using Twitter Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Tweepy Stream Listener -- 3.2 Preprocessing -- 3.3 Sentimental Analysis -- 3.4 Representation -- 3.5 Tweet Storage -- 4 Case Studies -- 4.1 Qualifying 3-Spanish Grand Prix 2019 -- 4.2 Indian Election Results-2019 -- 5 Conclusion and Future Scope. , References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Artificial intelligence-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (834 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811559716
    Serie: Smart Innovation, Systems and Technologies Series ; v.194
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- About the Editors -- Intelligent and Cloud Computing -- M-Throttled: Dynamic Load Balancing Algorithm for Cloud Computing -- 1 Introduction -- 2 Literature Survey -- 3 Existing Algorithms -- 3.1 Throttled Load Balancing -- 3.2 Round-Robin Load Balancing -- 3.3 SJF Load Balancing -- 4 Proposed Algorithm: M-throttled -- 5 Implementation -- 6 Conclusion -- References -- iGateLink: A Gateway Library for Linking IoT, Edge, Fog, and Cloud Computing Environments -- 1 Introduction -- 2 Related Work -- 3 System Model and Architecture -- 3.1 Implementation Details -- 4 Case Studies -- 5 Conclusions and Future Work -- References -- Hetero Leach: Leach Protocol with Heterogeneous Energy Constraint -- 1 Introduction -- 2 Routing Algorithm -- 2.1 LEACH -- 2.2 Hetero Leach -- 3 Simulation and Result -- 4 Conclusion -- References -- A Semantic Matchmaking Technique for Cloud Service Discovery and Selection Using Ontology Based on Service-Oriented Architecture -- 1 Introduction -- 2 Service-Oriented Computing -- 2.1 Service-Oriented Architecture -- 3 Proposed Model -- 3.1 Client Request -- 3.2 Cloud Service Discovery -- 3.3 Cloud Service Selection -- 3.4 Cloud Ontology Triple Store -- 4 Proposed Matchmaking Technique -- 5 Conclusion and Future Work -- References -- An Intelligent Approach to Detect Cracks on a Surface in an Image -- 1 Introduction -- 2 Literature Review -- 3 Min-Max Gray Level Discrimination Method -- 4 Proposed Model for Crack Detection -- 5 Conclusion -- References -- A Study of Machine Learning Techniques in Short Term Load Forecasting Using ANN -- 1 Introduction -- 2 ANN in STLF -- 2.1 Multilayer Perceptron Network (MLP) -- 2.2 Learning -- 2.3 Generalization -- 2.4 MLP Organizes in Burden Estimating -- 3 Proposed Work -- 3.1 Back Propagation (BP) by ANN -- 3.2 Fuzzy Logic by ANN. , 3.3 Hereditary Calculation (HC) by ANN -- 3.4 Particle Swarm Optimization (PSO) by ANN -- 4 Conclusion -- References -- A Review for the Development of ANN Based Solar Radiation Estimation Models -- 1 Introduction -- 2 Basics of Artificial Neural Network (ANN) -- 3 ANN for Solar Radiation Estimation -- 4 Review of Global Radiation Estimation Using ANN -- 5 Comparative Study of All the Models -- 6 Identified Research Gap in Solar Radiation Estimation -- 7 Conclusion -- References -- Analysis and Study of Solar Radiation Using Artificial Neural Networks -- 1 Introduction -- 2 ANN Fundamentals -- 2.1 What is ANN? -- 2.2 Nodal Configuration -- 2.3 ANN Types -- 2.4 Learning Stuff -- 3 ANN Working Principle and Architecture -- 3.1 Introduction -- 4 Applications, Advantages, and Disadvantages -- 4.1 Applications -- 4.2 Advantages -- 4.3 Disadvantages -- 5 Methodology -- 5.1 ANN for Predicting Solar Radiation -- 5.2 Data Considered -- 5.3 Operating Stages -- 5.4 Performance -- 6 Comparison Between ANN-Based and Existing Modeling -- 7 Conclusion -- References -- A Scheme to Enhance the Security and Efficiency of MQTT Protocol -- 1 Introduction -- 2 Literature Review -- 2.1 Security Requirements of IoT -- 2.2 Privacy Concerns in IoT -- 2.3 MQ Telemetry Transport (MQTT) -- 2.4 Architecture of MQTT -- 2.5 MQTT Quality of Service -- 2.6 Security Issues with MQTT -- 2.7 Hash Functions and Digital Signatures -- 2.8 Channel Encryption -- 2.9 Summary of Findings -- 2.10 Problem Statement -- 3 Proposed Scheme -- 3.1 Registration Process -- 4 Result and Discussions -- 5 Conclusions -- References -- Software Fault Prediction Using Random Forests -- 1 Introduction -- 1.1 Random Forests (RF) -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Datasets -- 3.2 Evaluation Criteria -- 4 Implementation and Results -- 5 Conclusion -- References. , A Power Optimization Technique for WSN with the Help of Hybrid Meta-heuristic Algorithm Targeting Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution Methodology -- 3.1 Design Efficient WSN Nodes -- 3.2 Clusterization of the Target Area -- 3.3 Deployment of WSN Nodes Using Spiral Pattern WSN Node Deployment Policy -- 4 Numerical Result Analysis -- 5 Conclusion and Future Work -- References -- A Model for Probabilistic Prediction of Paddy Crop Disease Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Paddy Crop Disease Classification -- 3.1 Brown Spot -- 3.2 Bacterial Leaf Blight -- 3.3 Leaf Smut -- 4 Implementation of the Model -- 4.1 Image Generation and Augmentation -- 4.2 Convolution Steps -- 4.3 Pooling Step -- 4.4 Fully Connected Layers -- 4.5 Disease Prediction -- 4.6 Process Flow Model -- 5 Algorithm of the Model -- 6 Experimental Results -- 7 Conclusions and Future Work -- References -- A Hybridized ELM-Elitism-Based Self-Adaptive Multi-Population Jaya Model for Currency Forecasting -- 1 Introduction -- 2 Methodology Adopted -- 2.1 ELM -- 2.2 Jaya -- 3 Dataset Description -- 4 Experimental Analysis -- 4.1 Abstract View of the Proposed Model -- 4.2 Proposed ELM-ESAMPJ Algorithm for Exchange Rate Analysis -- 4.3 Result Analysis -- 5 Discussions -- 6 Conclusion and Future Work -- References -- A Fruit Fly Optimization-Based Extreme Learning Machine for Biomedical Data Classification -- 1 Introduction -- 2 Machine Learning Techniques for Biomedical Data Classification -- 2.1 Extreme Learning Machine (ELM) -- 2.2 Fruit Fly Optimization (FFO) -- 2.3 The Proposed FFO-ELM Models -- 3 Result and Discussion -- 3.1 Data Description -- 3.2 Performance Evaluation -- 3.3 Result Analysis -- 4 Conclusion -- References -- Partial Reconfiguration Feature in Crypto Algorithm for Cloud Application. , 1 Introduction -- 2 Generations of Crypto Core -- 3 State of the Art -- 4 Architecture and Implementation -- 4.1 Low Processing Platform (LP) -- 4.2 Fog -- 4.3 Cloud -- 5 Conclusion -- References -- Proactive Content Caching for Streaming over Information-Centric Network -- 1 Introduction -- 2 System Model -- 3 Proposed Solution -- 3.1 Content Store (CS) -- 3.2 Ant Colony Process -- 4 Experimental Results -- 5 Conclusion -- References -- Performance Analysis of ERWCA-Based FLANN Model for Exchange Rate Forecasting -- 1 Introduction -- 2 Methodology -- 2.1 FLANN Model -- 2.2 Evaporation Rate-Based Water Cycle Algorithm (ERWCA) -- 2.3 FLANN/ERWCA Model -- 3 Simulation Study -- 4 Conclusion -- References -- Multi-document Summarization Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Experiment and Results Analysis -- 5 Conclusion -- References -- A Convolutional Neural Network Framework for Brain Tumor Classification -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Input Image -- 3.2 Convolution Layer -- 3.3 Pooling Layer -- 3.4 Fully Connected Layer -- 3.5 Output Layer -- 4 Experimental Setup and Results -- 4.1 Dataset Description -- 4.2 Initial Kernel Weights -- 4.3 Activation Function -- 4.4 Loss Function Computation -- 4.5 Training -- 4.6 Model Parameters -- 4.7 Simulation Results -- 5 Conclusion -- References -- Load Balancing in Cloud Computing Environment Using CloudSim -- 1 Introduction -- 2 Related Work -- 3 Objective of Load Balancing in Cloud Computing -- 4 Necessity of Load Balancing -- 5 Verification of Load Balancing Using Cloud Simulator -- 5.1 Various Features of CloudSim Tool -- 5.2 Primary Elements of CloudSim Tool -- 5.3 Algorithm Utilized in CloudSim Tool for Load Balancing -- 6 Experimental Results -- 7 Conclusion -- References. , Assessment of Load in Cloud Computing Environment Using C-means Clustering Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Resource Allocation -- 3.2 Algorithm -- 4 Result Analysis -- 5 Conclusion -- References -- Parallel Implementation of Algebraic Curve for Data Security in Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Explicit Addition Formulation -- 4 Implementation -- 4.1 Sequential Implementation Methodology -- 4.2 Parallel Implementation Methodology -- 5 Experimental Results and Analysis -- 5.1 Sequential Implementation of Elliptic Curve Addition -- 5.2 Sequential Implementation of Hyperelliptic Curve Addition -- 5.3 Parallel Implementation of Hyperelliptic Curve Addition -- 6 Performance Comparison of Sequential and Parallel Implementation -- 7 Conclusion -- References -- A Design Towards an Energy-Efficient and Lightweight Data Security Model in Fog Networks -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 Proposed Approach and Related Discussions -- 4.1 Lightweight Authentication Using CA Based Scheme -- 4.2 Lightweight Cryptography Using CA Based Scheme -- 5 Conclusions and Future Work -- References -- Fuzzification-Based Routing Protocol for Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- Fuzzy-Based Strategy Management in Wireless Ad Hoc Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Simulation Analysis -- 5 Conclusion and Future Work -- References -- A TWV Classifier Ensemble Framework -- 1 Introduction -- 2 Proposed TWV Classifier Ensemble -- 3 Experimental Setup and Result Analysis -- 4 Conclusion -- References -- Recent Advancements in Continuous Authentication Techniques for Mobile-Touchscreen-Based Devices. , 1 Introduction to Continuous Authentication (CA).
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Schlagwort(e): Information technology -- Congresses. ; Computer science -- Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (858 pages)
    Ausgabe: 1st ed.
    ISBN: 9788132217596
    Serie: Advances in Intelligent Systems and Computing Series ; v.255
    DDC: 004
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Organizing Committee -- Contents -- Part ISignal and Image Processing -- 1 The PSF Measurement for Motion-Blurred Image Based on Analyzing the Frequency Spectrum -- Abstract -- 1…Introduction -- 2…Theoretical Analysis -- 2.1 The Relationship Between the PSF and Blurred Image Spectrum -- 2.2 Snake Model -- 2.3 Hough Transform in Polar Coordinate -- 3…The Point Spread Function Measurement for Motion-Blurred Image -- 3.1 The Steps for Solving Point Spread Function -- 3.2 Analysis of Experimental Results -- 4…Conclusion -- References -- 2 EBR Analysis of Digital Image Watermarking -- Abstract -- 1…Introduction -- 2…Watermarking Communication Model -- 3…Analysis of Watermarking Channel -- 4…Payload Capacity and EBR of Watermark Detection -- 5…Conclusions -- Acknowledgments -- References -- 3 Image Descriptors Based on Statistical Thermodynamics and Applications -- Abstract -- 1…Introduction -- 2…Research Ideas and the Main Content -- 2.1 Image Descriptor -- 2.2 Image Descriptor: Image Energy -- 2.3 Image Descriptor: Image Mass -- 2.4 Image Descriptor: Image Pressure -- 2.5 Image Descriptor: Image Temperature -- 3…Experiments and Analysis -- 3.1 Description of the Digital Image -- 3.2 Clustering Applications -- 3.3 Content-Based Image Retrieval -- 4…Conclusions -- Acknowledgments -- References -- 4 A Novel Image Retrieval Method Based on Fractal Code and Fuzzy Set -- Abstract -- 1…Introduction -- 2…Fractal Coding -- 3…Fuzzy Set Measure -- 3.1 Fuzzy Classifier -- 3.2 Proposed Algorithm -- 4…Similarity Measure -- 5…Experiment -- 6…Conclusion -- References -- 5 Velocity Evaluation in Traffic Accidents Occurred at the Road Intersection Based on Image Processing -- Abstract -- 1…Introduction -- 2…Algorithm Principle -- 3…Main Steps of Algorithm -- 3.1 Obtain Frame Sequences -- 3.2 Accurate Velocity of the Vehicle Calculation. , 3.3 Range Velocity of the Vehicle Calculation -- 4…Conclusion -- References -- 6 A Hybrid Method for Extracting Liver from 3D CT Image -- Abstract -- 1…Introduction -- 2…Related Research -- 3…Proposed Method -- 3.1 Three-Dimensional Region-Growing Algorithm -- 3.2 Image Morphology -- 4…Experimental Results -- 5…Summary -- References -- 7 A New Image-Fusion Technique Based on Blocked Sparse Representation -- Abstract -- 1…Introduction -- 2…Sparse-Coding Model -- 2.1 Selection of the Dictionary -- 2.2 Sparse Coding of Signals -- 3…Proposed Fusion Scheme -- 3.1 Fusion Framework Based on Sparse Coding -- 3.2 Fusion Rule -- 4…Experimental Results -- 5…Conclusion -- Acknowledgments -- References -- 8 The Studying of the Restoration of Defocused Images -- Abstract -- 1…Introduction -- 2…Disk Defocus Model -- 3…Gauss Defocus Model -- 4…Improved Defocus Model -- 5…Conclusion -- References -- 9 High-Order Total Variation-Based Image Restoration with Spatially Adapted Parameter Selection -- Abstract -- 1…Introduction -- 2…Problem Formulation -- 3…Implementation Details -- 4…Numerical Experiments -- Acknowledgments -- References -- 10 Research of Vehicle Identification Based on Adaptive Corner Detection -- Abstract -- 1…Introduction -- 2…Adaptive Harris Corner Detection -- 2.1 Harris Corner Detection Principle -- 2.2 Adaptive Harris Corner Detection Algorithm -- 3…Vehicle Classification and Recognition -- 3.1 Vehicle Matching Based on Hausdorff Distance -- 3.2 Experimental simulation and analysis -- 4…Conclusion -- References -- 11 Knowledge-Aided Bayesian Optimum Radar Detector -- Abstract -- 1…Introduction -- 2…Bayesian Optimum Radar Detector -- 3…Estimation Method for Detector Priori Distribution Parameter -- 3.1 PDF Fit-Based Method -- 3.2 Method of Fractional Moment -- 3.3 Method Based on Maximal Likelihood Estimation. , 4…KA-BORD Algorithm Performance Analysis -- 4.1 Algorithm Performance Analysis Based on Computer Simulation Data -- 4.2 Algorithm Performance Analysis Based on Sea-Clutter-Measured Data -- 5…Conclusion -- References -- Part IIComputer Security -- 12 An Improvement of an Identity-Based Key-insulated Signcryption -- Abstract -- 1…Introduction -- 2…Analysis of the Chen et al.'s Scheme -- 2.1 Review of the Chen et al.'s Scheme -- 2.2 Analysis -- 3…An Improved Scheme -- 3.1 Security Proof -- 4…Conclusion -- Acknowledgments -- References -- 13 Stability Analysis of a Rapid Scanning Worm Propagation Model with Quarantine Strategy -- Abstract -- 1…Introduction -- 2…Mathematical Model Formulation -- 3…The Stability Analysis for Equilibriums -- 3.1 Worm-Free Equilibrium and Its Stability -- 3.2 Endemic Equilibrium and Its Stability -- 4…Numerical Simulations -- 5…Conclusions -- Acknowledgments -- References -- 14 A Fuzzy Bayesian Approach to Enhance SCADA Network Security -- Abstract -- 1…Introduction -- 2…Architecture -- 3…Normal System Behavior Profiling -- 4…Anomaly Detection Algorithm -- 5…Simulations and Results -- Acknowledgments -- References -- 15 Trusted Network Access Authentication Scheme Based on the Label -- Abstract -- 1…Introduction -- 2…Summary of the Trusted Networks -- 3…Trusted Network Access Authentication Scheme Based on the Label -- 3.1 Scene Setting -- 3.2 Trusted Label -- 3.3 Access Authentication -- 4…Security Analysis -- 5…Conclusion -- References -- 16 A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms -- Abstract -- 1…Introduction -- 2…System Architecture -- 3…Authentication Process -- 3.1 Mobile User Registration -- 3.2 Authentication -- 3.3 Mobile User Unregistration -- 4…Scheme Analyze -- 4.1 Security Analyze -- 4.2 Performance Analysis -- 5…Conclusion -- Acknowledgments -- References. , 17 Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- Abstract -- 1…Introduction -- 2…Wormhole Detection Algorithm Based on RTT and Neighborhood Information -- 2.1 Detecting Suspicious Neighbors -- 2.2 Looking for Abnormal Topology -- 2.3 Isolating False Neighbors -- 3…Simulation and Performance Analysis -- 4…Conclusion -- Acknowledgments -- References -- 18 Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network -- Abstract -- 1…Introduction -- 2…Wormhole Path-Tracking Algorithm Based on Detecting Nodes -- 2.1 The Specific Detection Algorithm Structuring -- 3…The Simulation -- 4…Conclusion -- Acknowledgments -- References -- 19 Ad hoc Eavesdropping Algorithm-Based Network Coding -- Abstract -- 1…Introduction and Related Research -- 2…Ad hoc Hacking Attack Resistance of Secure Network Coding -- 2.1 Network Model -- 2.2 Attack Model -- 2.3 Algorithm Ideas -- 2.4 Algorithm Ideas -- 3…Secure Proof -- 4…Communication Overhead -- 5…Conclusion and Outlook -- Acknowledgments -- References -- 20 Improved Halftone Visual Cryptography by Random Grids -- Abstract -- 1…Introduction -- 2…The Proposed Schemes -- 2.1 Random Position Selection -- 2.2 Homogeneous Distribution of SIPs -- 2.3 Generation of Halftone Shares -- 3…Simulation Results and Discussions -- 4…Discussions -- 5…Conclusions -- References -- 21 Statistical Tests for Combined Secret Key Sequence -- Abstract -- 1…Introduction -- 2…Binary Sequence Generation for Test -- 2.1 Combined Secret Key Generation -- 2.2 Generate and Save the Binary Sequence -- 3…Statistical Test and Assessment for CSK Sequences -- 3.1 Frequency (Monobit) Test -- 3.2 Runs Test -- 3.3 Serial Test -- 4…Conclusions -- Acknowledgments -- References -- Part IIICommunication and Networking -- 22 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- Abstract. , 1…Introduction -- 2…The Return Communication System -- 2.1 The Basic Frame of Method -- 2.2 Interactive Satellite Remote Education System Based on Bluetooth and GPRS -- 2.3 Data Interaction Process of System -- 3…The Design and Implementation of Core Modules -- 3.1 Terminal Node -- 3.2 Gateway -- 3.3 Mobile Node (Mobile) -- 4…Conclusions -- References -- 23 A Study of Smart Grid Communication Architecture -- Abstract -- 1…Introduction -- 2…SG Communications Requirements -- 3…SGICA -- 4…Information and Communication Technologies for SGICA -- 5…IP-Based Communications for SG -- 6…Summary -- Acknowledgments -- References -- 24 Green Router: Power-Efficient Router Design -- Abstract -- 1…Introduction -- 2…Architectural Design -- 3…Operation Mechanism -- 3.1 Dynamic Sleep and Wakeup -- 3.2 Dispatching Policy -- 4…Modeling and Evaluation -- 4.1 Modeling -- 4.2 Experiment and Evaluation -- 5…Conclusion -- References -- 25 Design and Implementation of Web Service for Scenario Data Service System in War Gaming -- Abstract -- 1…Introduction -- 2…Approach of Technology -- 3…Architecture of the System -- 4…Design and Implementation of Web Layer -- 4.1 Web Service Design -- 4.2 Index Service Design -- 5…Conclusion -- Acknowledgments -- References -- 26 Gateway of Internet of Things for Intelligent Warehouse Management System Based on Embedded Web Server -- Abstract -- 1…Introduction -- 2…Use Scenario and Functional Requirements of IOTGW -- 2.1 IOT Architecture of Intelligent Warehouse Management System -- 2.2 Functional Requirements of IOT Gateway -- 3…Design of Multiprotocol IOT-Gateway Based on Embedded Web Server -- 3.1 Design Elements and Principles -- 3.2 Architecture of Hardware and Software -- 4…Conclusions and Future Work -- Acknowledgments -- References -- 27 Research of Wireless Transmission Strategy for High-Speed Railway -- Abstract -- 1…Introduction. , 2…Research Environment and Content.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    New Delhi :Springer (India) Private Limited,
    Schlagwort(e): User interfaces (Computer systems). ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (525 pages)
    Ausgabe: 1st ed.
    ISBN: 9788132220091
    Serie: Advances in Intelligent Systems and Computing Series ; v.309
    DDC: 006.3
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- ICCD-2014 Conference Committee -- About the Editors -- 1 A Survey of Security Concerns in Various Data Aggregation Techniques in Wireless Sensor Networks -- Abstract -- 1…Introduction -- 1.1 Data Aggregation -- 1.2 Data Aggregation Security Concerns -- 2…Secure Data Aggregation Protocols -- 2.1 Secure Data Aggregation Based on Cryptographic Techniques -- 2.1.1 Secure Data Aggregation Based on Symmetric Key Cryptography -- 2.1.2 Secure Data Aggregation Protocol Based on Asymmetric Key Cryptography -- 2.1.3 Secure Data Aggregation Protocol Based on MAC/Hash Function -- 2.2 Secure Data Aggregation Protocols Based on Non-Cryptographic Schemes -- 2.2.1 Secure Data Aggregation Protocols Based on Trust/Reputation -- 2.2.2 Secure Data Aggregation Protocols Based on Soft Computing Techniques -- 3…Comparison of Secure Data Aggregation Protocols -- 4…Conclusion -- References -- 2 Secure and Dynamic IP Address Configuration Scheme in MANET -- Abstract -- 1…Introduction -- 2…Related Work Review -- 3…Proposed Work -- 4…Conclusion -- References -- 3 A Novel Distributed Dynamic IP Configuration Scheme for MANET -- Abstract -- 1…Introduction -- 2…Literature Survey -- 3…Proposed Scheme -- 4…Conclusion -- References -- 4 Dual Security Against Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Methodology -- 3.1 Route Discovery Phase Detection -- 3.2 Data Transmission Phase -- 4…Conclusion and Future Scope -- References -- 5 I-EDRI Scheme to Mitigate Grayhole Attack in MANETs -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Proposed Approach -- 3.1 Proposed Detection Algorithm -- 4…Conclusion and Future Work -- References -- 6 Frequency Domain Incremental Strategies Over Distributed Network -- Abstract -- 1…Introduction -- 2…Estimation Problem and the Adaptive Distributed Solution. , 3…Frequency-Domain Adaptive Distributed Solution -- 3.1 DCT-LMS and DFT-LMS Algorithm -- 4…Simulation -- 5…Conclusion -- References -- 7 Modeling and Analysis of Cross-Layer Uplink Scheduler in IEEE 802.16e Standard -- Abstract -- 1…Introduction -- 1.1 MAC Layer Architecture -- 1.2 QoS Classes -- 1.3 Scheduler at MAC Layer -- 2…Literature Survey -- 3…Methodology -- 3.1 Design of Scheduler -- 4…Mathematical Model -- 4.1 Probability of Packets Being Served -- 4.2 Average Waiting Time -- 4.3 Average Time Spent by a Packet in Queue Ws -- 5…Result Analysis -- 6…Conclusion -- References -- 8 A Probabilistic Packet Filtering-Based Approach for Distributed Denial of Service Attack in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Proposed Architecture and Methodology -- 3…Result Analysis -- 4…Conclusion -- References -- 9 Location-Based Coordinated Routing Protocol for Wireless Sensor and Actor Networks -- Abstract -- 1…Introduction -- 2…Literature Review -- 3…The Procedure -- 3.1 Initialization Phase -- 3.2 Detection and Reporting Phase -- 3.3 Action Phase -- 4…Implementation and Result Analysis -- 5…Conclusion -- References -- 10 Energy Saving Performance Analysis of Hierarchical Data Aggregation Protocols Used in Wireless Sensor Network -- Abstract -- 1…Introduction -- 2…Wireless Sensor Network Routing Algorithms -- 2.1 Flat Routing Protocols -- 2.2 Hierarchical Routing Algorithms -- 2.3 Location-Based Protocols -- 2.4 Related Work -- 3…Simulation Setup -- 3.1 Result and Analysis -- 4…Conclusion -- References -- 11 Performance Analysis of IEEE 802.11 DCF and IEEE 802.11e EDCF Under Same Type of Traffic -- Abstract -- 1…Introduction -- 1.1 IEEE 802.11 Mechanism -- 1.2 IEEE 802.11e Mechanism -- 2…Simulation Model and Performance Analysis -- 2.1 Simulation Model -- 2.2 Simulation Parameter -- 2.3 Results -- 3…Conclusion -- References. , 12 A Distributed Prime Node-ID Connected Dominating Set for Target Coverage Using Adjustable Sensing Range -- Abstract -- 1…Introduction -- 2…Related Work on Connected Dominating Set -- 3…Proposed Algorithm -- 3.1 Network Model -- 3.2 Proposed Approach -- 3.2.1 Algorithm: Determination of P-CDS of a Graph -- 3.2.2 Diagrammatical Illustration of Algorithm -- 4…Performance Analysis -- 5…Conclusion -- References -- 13 Token Based Group Local Mutual Exclusion Algorithm in MANETs -- Abstract -- 1…Introduction -- 2…Related Works -- 3…GLME Algorithm -- 3.1 Working -- 3.2 Data Structure -- 3.3 Messages -- 3.4 Pseudocode of Algorithm at Node i -- 4…Performance Analysis -- 5…Conclusions and Future Scope -- References -- 14 A Distributed Secured Localization Scheme for Wireless Sensor Networks -- Abstract -- 1…Introduction -- 2…Coverage Algorithm for Anchor Node Deployment -- 3…Encryption and Decryption -- 4…Route Discovery Process -- 5…Performance Evaluation -- 6…Conclusions -- References -- 15 Characteristic Function for Variable-Bit-Rate Multimedia QoS -- Abstract -- 1…Introduction -- 2…Related Works -- 3…Proposed Model for Mapping QoS of Variable-Bit-Rate Multimedia -- 4…Numerical Results -- 5…Conclusion -- References -- 16 A Fully Simulatable Oblivious Transfer Scheme Using Vector Decomposition -- Abstract -- 1…Introduction -- 2…Preliminaries -- 2.1 Vector Decomposition Problem -- 2.2 Trapdoor VDP -- 3…Proposed Oblivious Transfer Using Vector Decomposition -- 3.1 Correctness of Our OT Scheme -- 4…Conclusion and Future Work -- References -- 17 Query by Humming System Through Multiscale Music Entropy -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Proposed Query by Humming System -- 3.1 Preprocessing -- 3.2 Framing -- 4…Entropy Estimation -- 4.1 Shannon Entropy -- 4.2 Multiscale Entropy -- 4.3 Multiscale Music Entropy. , 5…Kd Tree-Based Indexing -- 6…Query Processing and Searching -- 7…Results and Discussions -- 7.1 Performance Analysis -- 8…Conclusions -- References -- 18 An Empirical Analysis of Training Algorithms of Neural Networks: A Case Study of EEG Signal Classification Using Java Framework -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Discrete Wavelet Transform for EEG Signal Decomposition -- 4…Training Algorithms for MLPNN -- 4.1 Backpropagation -- 4.2 Manhattan Update Rule -- 4.3 Resilient Propagation -- 5…Experimental Study, Results, and Analysis -- 6…Summary and Conclusion -- 19 Relating Perceptual Feature Space and Context Drift Information in Query by Humming System -- Abstract -- 1…Introduction -- 2…Comprehension of Related Contributions -- 3…Envisioned Query by Humming System -- 4…Perceptual Analysis -- 4.1 Spectral Centroid -- 4.2 Spectral Spread -- 4.3 Pitch Class Profile or Chroma -- 4.3.1 Preprocessing -- 4.3.2 Frequency Mapping -- 4.3.3 Postprocessing -- 4.4 Harmonicity -- 4.4.1 Harmonic Spectral Centroid -- 4.4.2 Harmonic Spectral Spread -- 5…Context Drift Information Analysis -- 5.1 Perceptual Feature Space -- 5.2 Transfer Entropy Estimation -- 6…Results and Discussions -- 7…Conclusions -- References -- 20 First-Fit Semi-partitioned Scheduling Based on Rate Monotonic Algorithm -- Abstract -- 1…Introduction -- 2…Basic Concepts -- 3…SRM-FF Algorithm -- 4…Evaluations -- 5…Conclusion -- References -- 21 A Novel Approach for Data Hiding in Color Images Using LSB Based Steganography with Improved Capacity and Resistance to Statistical Attacks -- Abstract -- 1…Introduction -- 2…Proposed Work -- 2.1 Proposed Work Architecture -- 2.2 Proposed Algorithm -- 2.3 Proposed Embedding Scheme -- 3…Experimental Results and Comparison Analysis -- 3.1 Evaluation Based on Stego-Image Quality and Payload Capacity. , 3.2 Evaluation Based on Resistance to Stastical Attacks -- 4…Conclusions -- References -- 22 A Comparative Study of Correlation Based Stereo Matching Algorithms: Illumination and Exposure -- Abstract -- 1…Introduction -- 2…Related Work -- 3…Area-Based Stereo Matching -- 4…Experiment Results -- 4.1 Method of Evaluation -- 4.2 Robustness to Change in Illumination -- 4.3 Robustness to Change in Exposure -- 5…Conclusion -- Acknowledgement -- References -- 23 A Hybrid Motion Based-Object Tracking Algorithm for VTS -- Abstract -- 1…Introduction -- 2…The VTS and Its Challenges -- 3…Motion-Based Object Tracking Scheme -- 4…Simulation Results -- 5…Conclusion and Future Work -- References -- 24 Side Lobe Level and Null Control Design of Linear Antenna Array Using Taguchi's Method -- Abstract -- 1…Introduction -- 2…Taguchi's Optimization Method -- 2.1 Designing of Input Parameter Using OA -- 2.2 Building of Response Table -- 2.3 Optimal Level Values Identification and Confirmation Experiment -- 2.4 Reducing the Optimization Range -- 2.5 Checking of Level Values and Termination Criteria -- 3…Experimental Results -- 4…Conclusion -- References -- 25 A Novel Approach for Jamming and Tracking of Mobile Objects -- Abstract -- 1…Introduction -- 2…Smart Antenna -- 3…Algorithm Applied in the System -- 4…Simulation Results -- 5…Conclusion -- References -- 26 Performance Analysis of Low-Complexity Multiuser STBC MC-CDMA System -- Abstract -- 1…Introduction -- 2…Mathematical Model -- 2.1 STBC Encoding Scheme -- 3…Communication System Model -- 3.1 STBC Decoding Scheme -- 4…Results and Discussion -- 5…Conclusions -- References -- 27 On the Design an Enhanced Bandwidth of Elliptical Shape CPW-Fed Fractal Monopole Antenna for UWB Application -- Abstract -- 1…Introduction -- 2…Antenna Design and Parametric Study -- 3…Results and Discussion -- 3.1 Return Loss. , 3.2 Current Distribution.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 8
    Schlagwort(e): Decision making-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (694 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811625022
    Serie: Advances in Intelligent Systems and Computing Series ; v.1391
    DDC: 327.120971
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Decision Support System -- Recommended Model of Pollution Information Based on Collaborative Filtering Algorithm -- 1 Introduction -- 2 Calculation of the Similarity of Pollution Information -- 3 Default Prediction Complement -- 4 Obtaining the Similarity Matrix Between Users -- 5 The Solution of the Model -- 6 Analysis of Model Results -- References -- Research on the Evaluation of TCM Service Level in Various Regions of China -- 1 Introduction -- 2 Data Sources and Methods -- 2.1 Data Sources -- 2.2 Methods -- 3 Results -- 3.1 Principal Component Analysis -- 3.2 Cluster Analysis -- 4 Discussion -- 4.1 Regional Disparities in TCM Service Levels -- 4.2 The Effect of Health Services is not Commensurate with the Level of Economic Development -- References -- A Method for Evaluating Health Status of Rail Transit Signaling Equipment Based on Group Decision -- 1 Introduction -- 2 Related Work -- 3 Establishing Rules for an Evaluation System -- 3.1 Defining an Evaluation Organization -- 3.2 Defining the Evaluation Scope -- 3.3 Establishing the Weight Coefficient Vector -- 3.4 Establishing Alarm Rules to Monitor Equipment Faults -- 3.5 Setting Parameters for an Equipment Type -- 4 Implementation of an Evaluation System -- 4.1 Fault Monitoring Cycle -- 4.2 Health Evaluation Cycle -- 5 Conclusion -- References -- Intelligent Decision Support System for Precision Medicine (IDSS 4 PM) -- 1 Introduction -- 2 Theoretical Foundation-Simon's Model of Decision-Making -- 3 Intelligent Decision Support Systems (IDSSs) -- 4 Precision Medicine: An Emerging Approach in Medical Decision-Making -- 5 How Technologies Are Advancing Precision Medicine? -- 5.1 Business Analytics -- 5.2 Cognitive Computing -- 6 Theory Practice and Discussion -- 7 Characteristics of IDSS 4 PM -- 8 Conclusion. , References -- A Study of Result-Oriented Performance Appraisal-Taking Huawei as an Example -- 1 Introduction -- 2 Increasing Flexibility of Bonus Package -- 2.1 Reducing Long-Term Returns and Increasing Short-Term Returns -- 2.2 Widening the Gap and Clarifying the Hierarchy -- 2.3 Awarding the Current Contribution Immediately -- 3 Abandoning the Cumbersome Human Resource Assessment -- 3.1 Assessment by Objectives -- 3.2 Avoiding Establishing KPI Indicators in Isolation for Each Department -- 4 Taking the Responsibility and Result-Oriented Method -- 4.1 Good Performance and Good Return -- 4.2 Combination of Performance Evaluation and Reverse Evaluation -- 4.3 Eliminating Pretending Hard-Working -- 5 The Conclusion -- References -- Under a Management Perspective: Analysis of the Relationship Between Trust and Behavior Decision-Making -- 1 Introduction -- 2 Data and Measurement -- 2.1 Data Sources -- 2.2 Variable Description and Reliability Validity Test -- 3 Data Analysis and Discussion -- 3.1 The Difference of Public Trust Under Different Demographic Variables -- 3.2 The Differences in the Ways of Public Behavior Decision-Making Under Different Demographic Variables -- 3.3 The Relationship Between Trust and Behavior Decision-Making -- 4 Conclusion -- References -- Research on the Regulation of Industrial Structure in the Mid-Southern Liaoning Urban Agglomeration from the Perspective of Spatial Connection -- 1 Introduction -- 2 Research Area and Data Sources -- 2.1 Overview of the Study Area -- 2.2 Data Sources -- 3 Research Method -- 3.1 Spatial Shift-Share Model -- 3.2 Determination and Improvement of Spatial Weight -- 4 Result Analysis -- 4.1 Analysis of the Temporal and Spatial Pattern of Urban Spatial Interaction -- 4.2 Analysis of Shift Share of Industrial Structure -- 5 Conclusions -- References. , Research on the Influence Mechanism of Family-Supportive Supervisor Behaviors on Employees' Intention to Stay from the Perspective of Dual Scenario Embeddedness -- 1 Introduction -- 2 Theoretical Basis and Research Hypothesis -- 2.1 FSSB and Employees' Intention to Stay -- 2.2 The Mediating Role of Dual Scenario Embeddedness -- 2.3 The Moderating Role of Employees' Gratitude as a Trait -- 3 Study Design -- 3.1 Participants and Survey Methods -- 3.2 Variable Measurement -- 4 Research Results -- 4.1 Descriptive Statistical Analysis -- 4.2 Discrimination Validity Analysis and Common Method Test -- 4.3 Hypothesis Testing -- 5 Conclusion -- 5.1 Theoretical Contribution -- 5.2 Management Implications -- 5.3 Research Limitations and Prospects -- References -- Policy Burden, Industry Competition, and Corporate Risk-Taking -- 1 Introduction -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 Policy Burden and Corporate Risk-Taking -- 2.2 The Regulating Effect of Industry Competition -- 3 Research Design -- 3.1 Sample Selection and Data Sources -- 3.2 Variable Selection and Model Design -- 4 Empirical Results -- 4.1 Descriptive Statistics -- 4.2 Analysis of Regression Results -- 5 Endogenous Control and Robustness Test -- 5.1 Endogenous Problems -- 5.2 Robustness Analysis -- 6 Research Conclusions -- References -- Blended Teaching Mode of Tourism English Based on TPACK -- 1 Introduction -- 2 TPACK Theory -- 3 ESP and Tourism English -- 4 Research Design -- 4.1 Design Concept -- 4.2 Problem Design -- 4.3 Subjects and Teaching Contents -- 4.4 Research Steps -- 5 Experimental Conclusion -- References -- Technology and Innovation Management -- Research on Privacy Protection of Internet of Things Search Data Based on Fine-Grained Authorization -- 1 Introduction -- 2 Background Knowledge -- 2.1 Secret Search -- 2.2 Attribute-Based Encryption Scheme. , 3 System Program -- 3.1 System Architecture -- 3.2 Program Process -- 4 Safety and Performance Analysis -- 4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Concluding Remarks -- References -- Design of Emergency Rescue Deduction System for Bus Fire Accident Based on Virtual Reality -- 1 Introduction -- 2 The Functional Requirements of Deducing System -- 3 The Design of Deduce System Architecture -- 4 Function Design of Deducing System -- 4.1 Scene Editing Module -- 4.2 Deduce Management Module -- 4.3 Client Operation Module -- 5 Composition of the Deduction System -- 6 Conclusion -- References -- Application of Game Theory in the Field of Technology Innovation -- 1 Introduction -- 2 The Application of Oligopoly Model in Technological Innovations -- 2.1 The Development of Cournot Model in Technological Innovations -- 2.2 Application and Development of Stackelberg in Technological Innovations -- 2.3 Application of Option Game Oligopoly Model in Technology Innovations -- 3 Research on Evolutionary Game Model in Technological Innovations -- 3.1 The Application of Evolutionary Game in Technological Innovations -- 3.2 The Development of Evolutionary Game Model in Technological Innovations -- 4 The Development Direction of Game Theory in Technological Innovations -- References -- Research on Innovation Mechanism of Corporate Volunteering in China -- 1 Introduction -- 2 The Concept and Connotation of Corporate Volunteering -- 3 The Status Quo of Volunteering in Chinese Enterprises -- 3.1 The Integration of Business Objectives Is Important for the Business Development Plan -- 3.2 Win the Sense of Belonging of Employees and the Identity of External Customers -- 3.3 Corporate Public Services Take from Society and Use for Society -- 3.4 Volunteering of Different Enterprises Vary Greatly -- 3.5 Long-Term Development of Volunteering Projects. , 3.6 Undertaking Government Public Service -- 4 Problems in the Development of Enterprise Volunteering in China -- 4.1 Insufficient Government Guidance -- 4.2 Information Guidance is not Strong -- 4.3 Lack of Corporate Volunteering Standards -- 4.4 Imbalance Between Long-Term and Short-Term Benefits -- 5 Development Trend of Corporate Volunteering -- 5.1 Internetization of Corporate Volunteering -- 5.2 Normalization of Corporate Volunteering -- 5.3 Diversification of Corporate Volunteering -- 5.4 Establish Self-organization of Corporate Volunteers -- 5.5 Corporate Volunteering Are Becoming More Standardized and Strict -- 6 Innovation of Corporate Volunteering Mechanism -- 6.1 Building Communication Network and Innovating Corporate Volunteering Mechanism -- 6.2 Taxation Policy -- 6.3 Expense Subsidies -- 6.4 Performance Evaluation -- 6.5 Establish a Sound Education and Training Mechanism -- 6.6 Establish a Sound Guarantee Mechanism to Protect the Volunteering of Enterprises -- References -- Research on the Differential Incentive Effect of Patent Pool on Specific Technology Learning -- 1 Research Background -- 2 Theoretical Analysis and Research Hypothesis -- 2.1 The Impact of Patent Pool Formation on Specific Technology Learning -- 3 Research Design -- 3.1 Data and Samples -- 3.2 Variables and Their Measurement -- 4 Empirical Results and Analysis -- 4.1 Descriptive Statistical Analysis -- 4.2 Hypothesis Testing -- 5 Conclusion and Inspiration -- 5.1 Research Conclusion -- 5.2 Management Suggestions -- References -- Research on Present Situation and the Countermeasure Analysis of Football Training in University -- 1 Introduction -- 2 The Present Situation of Campus Football Training in China -- 3 Problems in the Development of Campus Football Activities in China -- 3.1 Students' Poor Awareness for Football Activities. , 3.2 Unreasonable Arrangement of Football Activities.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 9
    Online-Ressource
    Online-Ressource
    Cham :Springer International Publishing AG,
    Schlagwort(e): Management-Data processing. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (678 pages)
    Ausgabe: 1st ed.
    ISBN: 9783030729295
    Serie: Modeling and Optimization in Science and Technologies Series ; v.18
    DDC: 658.0563
    Sprache: Englisch
    Anmerkung: Preface -- About This Book -- Contents -- Part I Computational Modelling -- 1 Computational Management-An Overview -- 1.1 Introduction -- 1.2 Computational Intelligence Techniques -- 1.2.1 Fuzzy Logic -- 1.2.2 Artificial Neural Networks -- 1.2.3 Evolutionary Computing -- 1.2.4 Learning Theories -- 1.2.5 Probabilistic Methods -- 1.3 Computational Aspects of Business Management -- 1.3.1 Marketing -- 1.3.2 Sales -- 1.3.3 Customer Relationship Management (CRM) -- 1.3.4 Finance -- 1.3.5 Human Resources -- 1.3.6 Manufacturing -- 1.3.7 Maintenance and Service -- 1.3.8 Research and Development -- 1.4 Benefits and Limitations of Computational Intelligence in Business -- 1.5 Applications of Computational Intelligence in Business -- 1.5.1 Applications of Computational Intelligence in the Field of Marketing -- 1.5.2 Computational Intelligence and Human Resource -- 1.5.3 Computational Intelligence and Finance -- 1.5.4 Computational Intelligence in Operations Management -- 1.6 Conclusion and Future Scope -- References -- 2 Mathematical and Computational Approaches for Stochastic Control of River Environment and Ecology: From Fisheries Viewpoint -- 2.1 Introduction -- 2.2 Stochastic Control -- 2.2.1 Stochastic Differential Equation -- 2.2.2 Performance Index and Value Function -- 2.2.3 HJB Equation -- 2.2.4 Remarks -- 2.3 Specific Problems -- 2.3.1 "Non-renewable" Fishery Resource Management -- 2.3.2 Dam-Reservoir System Management -- 2.3.3 Algae Growth Management -- 2.3.4 Sediment Storage Management -- 2.4 Coupled Problem -- 2.4.1 Overview -- 2.4.2 Control Problem -- 2.4.3 Numerical Scheme -- 2.4.4 Computational Conditions -- 2.4.5 Numerical Computation -- 2.5 Conclusions -- References -- 3 Models and Tools of Knowledge Acquisition -- 3.1 Introduction -- 3.1.1 Knowledge Economy -- 3.2 Literature Review -- 3.2.1 The Role and Importance of Knowledge Acquisition. , 3.2.2 Digitizing Knowledge Acquisition -- 3.3 Knowledge Management and Firm Strategy -- 3.3.1 Strategic Knowledge-An Internal and External Perspective -- 3.3.2 Competitive Intelligence -- 3.4 Knowledge Acquisition: Sources and Techniques -- 3.4.1 External Sources of Knowledge -- 3.4.2 Techniques of Knowledge Acquisition -- 3.5 Role of Technology in Knowledge Acquisition and Management -- 3.5.1 The Emergence of API Economy -- 3.5.2 Artificial Intelligence -- 3.6 Conclusion -- References -- 4 Profits Are in the Eyes of the Beholder: Entropy-Based Volatility Indicators and Portfolio Rotation Strategies -- 4.1 Introduction -- 4.2 Entropy and Its Applications to the VIX -- 4.3 Literature Review -- 4.4 Research Objectives -- 4.5 Theoretical Framework -- 4.6 Data Variables, Measurements, and Sources -- 4.7 Methods and Measures -- 4.8 Empirical Results -- 4.9 Formulation and Testing of Trading Strategies -- 4.10 Summary and Concluding Remarks -- Appendix 1: Trading Strategies Using India VIX Change and the Entropies (Both Approximate and Sample Entropies) Tested Through Simulations -- References -- 5 Asymmetric Spillovers Between the Stock Risk Series: Case of CESEE Stock Markets -- 5.1 Introduction -- 5.2 Related Literature Review -- 5.2.1 (M)GARCH Approaches to Modelling -- 5.2.2 Causality Testing and Cointegration -- 5.2.3 Spillover Methodology Approach -- 5.3 Methodology Description -- 5.3.1 VAR Models and Spillover Index -- 5.3.2 Asymmetric Spillovers -- 5.4 Empirical Results -- 5.4.1 Variable Description -- 5.4.2 Static Results -- 5.4.3 Dynamic Analysis -- 5.4.4 Robustness Checking -- 5.4.5 Simulation of Investment Strategies -- 5.5 Discussion and Conclusion -- Appendix -- References -- 6 Millennial Customers and Hangout Joints: An Empirical Study Using the Kano Quantitative Model -- 6.1 Introduction -- 6.1.1 Motivations of the Study. , 6.1.2 Background of the Study -- 6.2 Literature Review -- 6.3 Model Development -- 6.3.1 Research Gap -- 6.3.2 Research Objectives -- 6.3.3 The Kano Model -- 6.3.4 Research Design -- 6.3.5 Survey Instrument -- 6.4 Results and Discussion -- 6.4.1 Exploratory Factor Analysis Results -- 6.4.2 Reliability Analysis Results -- 6.4.3 Kano Quantitative Analysis Results -- 6.5 Conclusions and Future Scope -- 6.5.1 Conclusions -- 6.5.2 Future Scope -- References -- 7 The Effects of Oil Shocks on Macroeconomic Uncertainty: Evidence from a Large Panel Dataset of US States -- 7.1 Introduction -- 7.2 Data and Methodology -- 7.3 Results and Analysis -- 7.3.1 Linear Impulse Responses -- 7.3.2 Responses of Uncertainty Contingent on High- Versus Low-Oil Dependence States -- 7.3.3 Responses of Uncertainty at Different Horizons Conditioning on Aggregate US Uncertainty Spillovers -- 7.4 Conclusion -- Appendix -- References -- 8 Understanding and Predicting View Counts of YouTube Videos Using Epidemic Modelling Framework -- 8.1 Introduction -- 8.1.1 Literature Review -- 8.2 Building Block for Proposed Epidemic Modelling -- 8.2.1 Epidemic Modelling -- 8.2.2 Assumptions -- 8.2.3 Modelling Information Diffusion as Susceptibility Process -- 8.2.4 Modeling Viewing as Infection Process -- 8.2.5 Particular Case -- 8.3 Numerical Illustration -- 8.4 Results and Interpretation -- References -- 9 Gross Domestic Product Modeling Using ``Panel-Data'' Concept -- 9.1 Introduction -- 9.2 Materials -- 9.3 Statistical Preliminaries and Methods -- 9.4 Results -- 9.5 Concluding Remarks -- References -- 10 Supply Chain Scheduling Using an EOQ Model for a Two-Stage Trade Credit Financing with Dynamic Demand -- 10.1 Introduction -- 10.2 Literature Review -- 10.3 Assumptions and Notations -- 10.3.1 Assumptions: -- 10.3.2 Notations -- 10.4 Mathematical Formulation -- 10.5 Numerical Illustrations. , 10.6 Graphical Representations -- 10.7 Conclusion and Managerial Implications -- References -- 11 Software Engineering Analytics-The Need of Post COVID-19 Business: An Academic Review -- 11.1 Introduction -- 11.2 COVID19-Effects in Business -- 11.2.1 Tourism and Hospitality -- 11.2.2 Airlines and Aviation -- 11.2.3 Oil and Gas -- 11.2.4 Automotive Manufacturing -- 11.2.5 Consumer Products -- 11.2.6 Education -- 11.2.7 Software Industry -- 11.3 Research Methodology -- 11.4 Software Development Life Cycle (SDLC) -- 11.4.1 Software Requirements Analysis -- 11.4.2 Software Design -- 11.4.3 Software Implementation -- 11.4.4 Software Testing -- 11.4.5 Software Deployment -- 11.4.6 Software Maintenance -- 11.5 Software Analytics -- 11.5.1 Literature Analysis -- 11.5.2 Journal Publications with Frequency -- 11.5.3 Citations/Year -- 11.5.4 Software Engineering Analytics: Connotes -- 11.6 Conclusion -- References -- 12 The Rise and Fall of the SCOR Model: What After the Pandemic? -- 12.1 Introduction: The SCOR Model as a Supply Chain Management Foundation -- 12.2 The Evolution of Supply Chain Management -- 12.3 The SCOR Model-A Foundation for Supply Chain Management -- 12.3.1 Supply Chain Optimisation in the Digital Supply Chain Era -- 12.4 Is the Scor Model Still Relevant? -- 12.4.1 The Evolution of the Scor Model -- 12.4.2 The Fall of the Scor Model -- 12.4.3 Is the Resurrection of the Scor Model Possible? -- 12.5 Re-designing the Future of Supply Chains Using Scor -- 12.5.1 Re-designing for Supply Chain Reliability -- 12.5.2 Re-designing for Supply Chain Agility and Responsiveness -- 12.5.3 Re-designing for Supply Chain Asset Management -- 12.6 Concluding Remarks -- References -- Part II Management Optimization -- 13 A Comparative Study on Multi-objective Evolutionary Algorithms for Tri-objective Mean-Risk-Cardinality Portfolio Optimization Problems. , 13.1 Introduction -- 13.2 Portfolio Optimization -- 13.3 Multi-objective Evolutionary Algorithms -- 13.4 Multi-objective Evolutionary Algorithms for Portfolio Optimization Problems-A Literature Review -- 13.4.1 Mean-Variance Portfolio Optimization Using MOEAs -- 13.4.2 Mean-Risk Portfolio Optimization Using MOEAs -- 13.4.3 Three-Objective Portfolio Optimization Using MOEAs -- 13.5 Experimental Results -- 13.6 Conclusion -- References -- 14 Portfolio Insurance and Intelligent Algorithms -- 14.1 Introduction -- 14.2 Portfolio Insurance -- 14.2.1 Multi-period Portfolio Insurance Under Transaction Costs -- 14.3 Intelligent Algorithms -- 14.3.1 Beetle Antennae Search Algorithm -- 14.3.2 Popular Meta-Heuristic Algorithms -- 14.3.3 Multi-objective Optimization -- 14.3.4 The Main Algorithm for the MPMCPITC Problem -- 14.4 Portfolios' Applications with Real-World Data -- 14.4.1 Application in 4 Stocks' Portfolio -- 14.4.2 Application in 8 Stocks' Portfolio -- 14.4.3 Application in 12 Stocks' Portfolio -- 14.4.4 Application in 16 Stocks' Portfolio -- 14.4.5 Results and Performance Comparison of BAS, BA, FA and GA -- 14.5 Conclusion -- References -- 15 On Interval-Valued Multiobjective Programming Problems and Vector Variational-Like Inequalities Using Limiting Subdifferential -- 15.1 Introduction -- 15.2 Definitions and Preliminaries -- 15.3 Relationship Between (GMVVLI), (GSVVLI) and (IVMPP) -- 15.4 Relationship Between (WGMVVLI), (WGSVVLI) and (IVMPP) -- 15.5 Existence Results for (GMVVLI) and (GSVVLI) -- 15.6 Conclusions -- References -- 16 Portfolio Optimization Using Multi Criteria Decision Making -- 16.1 Introduction -- 16.2 An Overview of Multi Criteria Decision Making (MCDM) Process -- 16.3 Classification of Multi Criteria Decision Making Processes -- 16.4 Quantitative Techniques Applied for the MCDM -- 16.5 Financial Decision Problem. , 16.6 Risk Modeling and SWOT Analysis.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 10
    Online-Ressource
    Online-Ressource
    Singapore :Springer Singapore Pte. Limited,
    Schlagwort(e): Mechatronics-Congresses. ; Electronic books.
    Materialart: Online-Ressource
    Seiten: 1 online resource (604 pages)
    Ausgabe: 1st ed.
    ISBN: 9789811618437
    Serie: Advances in Intelligent Systems and Computing Series ; v.1220
    Sprache: Englisch
    Anmerkung: Intro -- Preface -- Contents -- About the Editors -- Mechatronics -- 1 Simulation of Off-Wheel Problem of Triangle Tracked Vehicle Based on RecurDyn -- Abstract -- 1 Introduction -- 2 Structure and Relevant Technical Parameters of Triangular Track -- 3 Simulation Test -- 3.1 Virtual Prototype Modeling -- 3.2 Simulation Test on off-Wheel Problem of Track -- 3.3 Simulation Test on Vehicle S Bend -- 4 Conclusion -- References -- 2 Brief Design Requirements of Screen Printing Stencil -- Abstract -- 1 Introduction -- 2 Stencil Design -- 2.1 Frame Design of Circuit Board Stencil -- 2.2 Design of Stencil Tension Net -- 2.3 Mark Point Design of Stencil -- 2.4 Aperture Design of Stencil -- 2.5 Thickness Design of Stencil -- 3 Requirements for Opening Size and Shape of Stencil -- 3.1 Chip Components-Resistors, Inductors, Capacitors -- 3.2 Power MOSFET -- 3.3 QFP, SOP, QFN, IC -- 3.4 BGA -- 4 Conclusion -- References -- 3 Review of Improved Collaborative Filtering Recommendation Algorithms -- Abstract -- 1 Introduction -- 2 Overview of Traditional Collaborative Filtering Algorithms -- 2.1 User-Based Collaborative Filtering Recommendation Algorithm -- 2.2 Item-Based Collaborative Filtering Recommendation Algorithm -- 2.3 Model-Based Collaborative Filtering Recommendation Algorithm -- 3 Improvement and Application of Collaborative Filtering Algorithm -- 3.1 The New Theory Is Introduced into Collaborative Filtering -- 3.2 Data Dynamic Analysis Combined with Collaborative Filtering -- 3.3 Combination of Data Rule Mining and Collaborative Filtering -- 4 Conclusion -- References -- 4 A Preliminary Study on the Application of Computer Technology in Physical Education -- Abstract -- 1 Introduction -- 2 Design of Instructional Model of Autonomous Physical Education Based on Computer Technology -- 2.1 Part Before Class -- 2.2 Part in Class -- 2.3 Part After Class. , 3 Application Analysis of Physical Education Teaching Model Based on Computer Technology -- 3.1 Experimental Subject -- 3.2 Experimental Procedure -- 3.3 Experimental Method -- 3.4 Experimental Result -- 4 Conclusion -- References -- Intelligent Systems -- 5 Design of Archives Management System for Teaching -- Abstract -- 1 Introduction -- 2 Requirement Analysis of System and Database Design -- 2.1 Requirement Analysis -- 2.2 System Functional Structure Design -- 2.3 Database Design -- 3 System Function Realization -- 3.1 Login Module Design -- 3.2 Registration Module Design -- 4 System Test and Operation Result Analysis -- 5 Conclusion -- Acknowledgements -- References -- 6 An Algorithm for Distinguishing Between Speech and Music -- Abstract -- 1 Introduction -- 2 Audio-Related Features -- 3 Algorithm Steps -- 4 Experimental Result -- 5 Summary -- Acknowledgements -- References -- 7 Research on Multiple Overlapping Speakers Number Recognition Based on X-Vector -- Abstract -- 1 Introduction -- 2 Approach -- 2.1 X-Vector -- 2.2 Data Preprocessing -- 2.3 Improving of Feature Extraction -- 3 Experimental Results -- 4 Conclusions -- References -- 8 Discussion on Production Technology and Testing Technology of 1553B Bus Cable Net for Satellite -- Abstract -- 1 Introduction -- 2 Composition of 1553B Bus Cable -- 2.1 1553B Cable Structure -- 2.2 Composition of 1553B Bus Cable -- 3 1553B Bus Cable Network Assembly Process -- 4 1553B Bus Cable Network Installation Quality Test -- 4.1 Bus Cable Net Appearance Inspection -- 4.2 1553B Bus Cable Network Static Performance Test -- 4.3 1553B Bus Cable Network Dynamic Performance Test -- 5 Conclusion -- References -- 9 Feasibility Analysis of Venture Capital Committee in the Innovative Design of Class Management in Colleges and Universities -- Abstract -- 1 Introduction. , 2 Major Pain Points of Class Management in Colleges and Universities -- 2.1 Different Opinions About Head Teacher's Impact on Class -- 2.2 Weak Initiative of Class Cadre -- 2.3 A General Lack of Class Fee -- 2.4 Little Contact with Classes After Graduation -- 3 Pain Points Analysis of Class Management in Colleges and Universities -- 3.1 Urgent Need of System Construction Innovation -- 3.2 Difference in Value Proposition -- 3.3 Foundation -- 3.4 Repulsion and Practical Difficulties -- 4 Innovative Design of Class Management in Colleges and Universities -- 4.1 Description of Class Management Tools -- 4.2 The Feasibility Analysis of Innovative Design -- 5 Conclusions -- Acknowledgements -- References -- 10 A Survey and Study on Satisfaction and Influencing Factors Using Ant Credit Pay via Intelligent Processing -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Data Analysis Method and Theoretical Basis -- 3.1 Chi-Square Test Principle -- 3.2 Principle of Correlation Analysis -- 3.3 Satisfaction Principle -- 3.4 Establishing the Satisfaction Index System -- 4 Analysis on the Satisfaction and Influencing Factors -- 4.1 Reliability Analysis and Validity Analysis of Data -- 4.2 Analysis of College Students' Satisfaction with Using "Ant Credit Pay" -- 4.3 Analysis of College Students' Satisfaction -- 4.4 Analysis of Influencing Factors -- 5 Some Suggestions -- 5.1 Individual Consumption Needs to Be Tailored -- 5.2 Pay Attention to Self-credit and Enhance Self-protection Consciousness -- 5.3 Appropriately Reduce the Withdrawal Procedure Rate and Expand the Use of "Ant Credit Pay" in Daily Life -- References -- 11 A Review on Main Optimization Method of ALBERT in Natural Language Processing -- Abstract -- 1 Introduction -- 2 Recent Development -- 3 Solve the Problem of Insufficient Text Word Vector Learning by Classifying the Output Features of ALBERT. , 4 Solve the Problem of Gradient Explosion and Disappearance in the Process of Long Text Training by Combining the Bi-LSTM Model -- 5 By Combining CRF Model to Better Recognize Long Texts -- 6 By Combining the BiGRU Model to Maximize the Preservation of the Semantic Association of Word Vectors in Long Texts -- 7 Conclusion -- References -- 12 Study on the Influencing Factors of Customer Loyalty in Large Smart Home Furnishing Stores -- Abstract -- 1 Introduction -- 2 Related Theory of Influencing Factors of Customer Loyalty -- 2.1 Experience Marketing -- 2.2 Customer Satisfaction -- 2.3 Measurement of Customer Loyalty -- 3 Establishment of Influencing Factor Model of Customer Loyalty -- 3.1 Selection of Modeling Dimension -- 3.2 Research Hypothesis -- 3.3 Description of Research Model -- 4 Data Analysis on Influencing Factors of Customer Loyalty -- 4.1 Reliability Test -- 4.2 Correlation Analysis -- 4.3 Regression Analysis -- 5 Summary -- References -- 13 A Detection Algorithm of Lung Nodule Based on Faster R-CNN -- Abstract -- 1 Introduction -- 2 Deep Learning Detection Framework and Faster R-CNN -- 2.1 Feature Extraction Network -- 2.2 RPN -- 2.3 ROI Pooling -- 2.4 Classifier -- 3 Pulmonary Nodule Detection Network -- 3.1 Improvement of Feature Extraction Network -- 3.2 Modify Anchors -- 4 Experimental Data and Result Verification -- 4.1 Dataset -- 4.2 Evaluation Criterion -- 4.3 Experimental Result -- 5 Conclusion -- References -- 14 Information Extraction from Contract Based on BERT-BiLSTM-CRF -- Abstract -- 1 Introduction -- 2 Related Research -- 3 Algorithm Model -- 3.1 Contract-Based Language Model (BERT) -- 3.2 BiLSTM-CRF Method Based on Migration Optimization -- 4 Test Results and Analysis -- 5 Concluding Remarks -- References -- 15 Research on Linear Detection Technology for Massive MIMO in Wireless Communications -- Abstract. , 1 Introduction -- 2 Model of Massive MIMO Uplink System -- 3 Linear Detection Algorithm for Massive MIMO System -- 3.1 Linear Detection Algorithm -- 3.1.1 Maximum Ratio Combining Algorithm (MRC) -- 3.1.2 Zero-Forcing Algorithm (ZF) -- 3.1.3 Minimum Mean Square Error Detection Algorithm (MMSE) -- 3.2 Simulation -- 4 Conclusion -- References -- 16 Research on Intelligent Reconfiguration and Recognition Technology of Mobile Environment for Substation Operation -- Abstract -- 1 Introduction -- 2 Object Scanning and Modeling -- 3 Modeling and Scanning Modeling of Dynamic Complex Environment -- 4 Weak Supervision Instance Segmentation of Substation Equipment Based on RGB-T Self Labeling -- 5 Model Compression and Acceleration for Edge Devices -- 6 Research and Development of Environment Intelligent Reconfiguration and Recognition Prototype System for Mobile Side Software and Hardware Platform -- 7 Conclusion -- References -- 17 Development and Application of Power Grid Disaster Intelligent Perception and Emergency Command System -- Abstract -- 1 Introduction -- 2 Electric Power Disaster Emergency Situation Map and 3D Visual Command Technology -- 3 Research and Development of Power Grid Disaster Intelligent Perception and Emergency Command Prototype System -- 4 Conclusions -- Acknowledgements -- References -- 18 Research on State Perception of Power Grid Equipment Based on Intelligent Analysis of Multi-Spectral Data -- Abstract -- 1 Introduction -- 2 Feature Distribution and Time-Domain Correlation of PoWer Equipment Status Under Different Spectrums -- 3 Online Monitoring and Fault Warning of Electrical Equipment Status of Stations and Transmission Lines -- 4 Establish a Sample Library of Power Equipment Faults Based on Three-Light Fusion Imaging -- 5 Comprehensive Evaluation Method of Multi-Spectral Data Analysis Model -- 6 Conclusions -- Acknowledgements. , References.
    Standort Signatur Einschränkungen Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie hier...