GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Artificial intelligence-Congresses. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (498 pages)
    Edition: 1st ed.
    ISBN: 9789811500770
    Series Statement: Smart Innovation, Systems and Technologies Series ; v.165
    Language: English
    Note: Intro -- Organizing Committee -- Preface -- Contents -- About the Editors -- 1 Comparison of Different Image Segmentation Techniques on MRI Image -- 1.1 Introduction -- 1.2 Methodology -- 1.2.1 Preprocessing -- 1.2.2 Segmentation Techniques -- 1.3 Results and Discussion -- 1.4 Conclusion -- References -- 2 PSO-ANN-Based Computer-Aided Diagnosis and Classification of Diabetes -- 2.1 Introduction -- 2.1.1 Literature Survey -- 2.2 Feature Selection Approaches -- 2.3 Particle Swarm Optimization (PSO) -- 2.4 Proposed Feature Selection Algorithm -- 2.5 Experimental Results -- 2.6 Conclusion -- References -- 3 Round Robin Scheduling Based on Remaining Time and Median (RRRT& -- M) for Cloud Computing -- 3.1 Introduction -- 3.2 Related Works -- 3.3 Scheduling Algorithms -- 3.4 Experimental Setup and Result Discussions -- 3.4.1 Experimental Setup -- 3.4.2 Performance Metrics -- 3.4.3 Result Discussions -- 3.5 Summary -- References -- 4 Business-Driven Blockchain-Mempool Model for Cooperative Optimization in Smart Grids -- 4.1 Introduction -- 4.2 Related Work -- 4.3 Virtual Power Plant Dispatch Schedules -- 4.3.1 Cost Function Based Optimization -- 4.4 Blockchain -- 4.4.1 Consensus -- 4.5 Consensus and Cooperative Scheduling -- 4.6 Mempool Model -- 4.7 Evaluation and Future Work -- 4.8 Conclusion -- References -- 5 Research of Institutional Technology Diffusion Rules Based on Patent Citation Network-A Case Study of AI Field -- 5.1 Introduction -- 5.2 Data and Method -- 5.3 Results and Discussion -- 5.3.1 Comparative Analysis of Technical Force -- 5.3.2 Technology Diffusion Network and Visualization -- 5.3.3 Measurement of Technology Diffusion Capacity -- 5.4 Conclusion and Limitation -- References -- 6 Impact on the Information Security Management Due to the Use of Social Networks in a Public Organization in Ecuador -- 6.1 Introduction. , 6.2 Materials and Methods -- 6.2.1 Materials -- 6.2.2 Methods -- 6.3 Results -- 6.4 Discussion -- 6.5 Future Work and Conclusion -- References -- 7 Appropriate Security Protocols to Mitigate the Risks in Electronic Money Management -- 7.1 Introduction -- 7.2 Materials and Methods -- 7.2.1 Materials -- 7.2.2 Methods -- 7.3 Results -- 7.4 Discussion -- 7.5 Future Works and Conclusion -- 7.5.1 Future Works -- 7.5.2 Conclusions -- References -- 8 Acceptance and Readiness of Thai Farmers Toward Digital Technology -- 8.1 Introduction -- 8.2 Research Model -- 8.3 Method -- 8.3.1 Questionnaire Instrument -- 8.3.2 Data Analysis -- 8.4 Results -- 8.5 Conclusion -- References -- 9 Neural Network Classifier for Diagnosis of Diabetic Retinopathy -- 9.1 Introduction -- 9.2 Classification -- 9.3 Conclusion -- References -- 10 Comparative Analysis of Data Mining Classification Techniques for Prediction of Heart Disease Using the Weka and SPSS Modeler Tools -- 10.1 Introduction -- 10.2 Literature Review -- 10.2.1 Data Mining Classification Techniques -- 10.3 Experimental Analysis -- 10.3.1 Dataset -- 10.3.2 Result Analysis -- References -- 11 An Automated Framework to Uncover Malicious Traffic for University Campus Network -- 11.1 Introduction -- 11.2 Study Goals -- 11.3 Methodology -- 11.4 Experimental Setup -- 11.5 Observations and Analysis of Framework in Campus Network on Real-Time Basis -- 11.5.1 Dashboard Visualization for Analysis -- 11.6 Conclusion -- 11.7 Future Scope -- References -- 12 Comparative Analysis of K-Means Algorithm and Particle Swarm Optimization for Search Result Clustering -- 12.1 Introduction -- 12.2 Related Work -- 12.3 Experimental Result and Analysis -- 12.3.1 Dataset Details -- 12.3.2 Preprocessing -- 12.3.3 Performance Evaluation -- 12.4 Conclusion -- References. , 13 Design and Implementation of Rule-Based Hindi Stemmer for Hindi Information Retrieval -- 13.1 Introduction -- 13.2 Stemming Approaches -- 13.2.1 Affix Removal Approach -- 13.2.2 N-Gram -- 13.2.3 Suffix Stripping Approach -- 13.2.4 Suffix Substitution Approach -- 13.2.5 Brute-Force Approach -- 13.2.6 Hybrid Approach -- 13.3 Related Work -- 13.4 Proposed Methodology and Implementation -- 13.5 Analysis and Conclusion -- References -- 14 Research on the Development Trend of Ship Integrated Power System Based on Patent Analysis -- 14.1 Introduction -- 14.2 Data and Methods -- 14.3 Results and Discussion -- 14.3.1 Life Cycle Analysis of Patent Technology Development of Foreign Ship Integrated Power System -- 14.3.2 Analysis of Patent Technology Research and Development Direction of Foreign Ship Integrated Power System -- 14.4 Summary -- References -- 15 Detection of Data Anomalies in Fog Computing Architectures -- 15.1 Introduction -- 15.2 Fog Architecture Overview -- 15.3 Anomaly Detection -- 15.3.1 Anomalies -- 15.3.2 Preliminaries for Detection Algorithm -- 15.3.3 Detection Procedure -- 15.4 Computation Algorithm -- 15.5 Related Work -- 15.6 Conclusion -- References -- 16 Cloud Data for Marketing in Tourism Sector -- 16.1 Introduction -- 16.2 Consumer Behavioral Study for the Tourism Industry -- 16.3 Sources of Data -- 16.3.1 Methods of Sourcing Data from Internet -- 16.4 Model for Marketing Data Capture -- 16.4.1 Prediction Theories -- 16.4.2 Marketing -- 16.5 Results -- 16.6 Conclusion -- References -- 17 Road Travel Time Prediction Method Based on Random Forest Model -- 17.1 Introduction -- 17.2 The Principle of Random Forest Algorithm -- 17.3 The Principle of DBSCAN -- 17.4 The Prediction Model of RF-DBSCAN -- 17.4.1 Data Sources -- 17.4.2 Feature Selection -- 17.4.3 The Principle of RF-DBSCAN -- 17.4.4 Comparison of Experiment Results. , 17.5 Conclusions -- References -- 18 Video Synchronization and Alignment Using Motion Detection and Contour Filtering -- 18.1 Introduction -- 18.1.1 Overview -- 18.1.2 Problem Statement -- 18.1.3 Objectives -- 18.1.4 Existing System -- 18.1.5 Proposed System -- 18.2 Literature Survey -- 18.3 System Design -- 18.4 Dataflow of Video Change Detection -- 18.5 Class Diagrams -- 18.6 Experimental Results -- 18.7 Conclusion -- References -- 19 Mutichain Enabled EHR Management System and Predictive Analytics -- 19.1 Introduction -- 19.2 Related Work -- 19.2.1 Verifying the Authenticity of Returned Drugs by Tracking Supply of Authorized Drugs in Supply Chain -- 19.2.2 Transparency and Traceability of Consent in Clinical Trials -- 19.2.3 Incentivized Access to Medical Data -- 19.3 Problem Setting -- 19.4 Proposed Architecture -- 19.4.1 Multichain -- 19.4.2 Off-Chain Storage -- 19.4.3 Hashing -- 19.4.4 Data Analysis -- 19.4.5 Machine Learning -- 19.4.6 Workflow -- 19.5 Conclusion -- References -- 20 Quick Insight of Research Literature Using Topic Modeling -- 20.1 Introduction -- 20.2 Literature Survey -- 20.3 Methodology -- 20.3.1 Preprocessing-Natural Language Processing -- 20.3.2 Topic Modeling -- 20.3.3 Latent Dirichlet Allocation -- 20.4 System Development -- 20.5 Experimental Results -- 20.6 Conclusion -- References -- 21 Secure Cloud-Based E-Healthcare System Using Ciphertext-Policy Identity-Based Encryption (CP-IBE) -- 21.1 Introduction -- 21.1.1 An Overview -- 21.2 Related Work -- 21.3 Proposed Methodology -- 21.3.1 Developing an Efficient Data Storage Scheme -- 21.3.2 Developing a Ciphertext Database Scheme -- 21.4 Conclusion -- References -- 22 Security Vulnerabilities of OpenStack Cloud and Security Assessment Using Different Software Tools -- 22.1 Introduction -- 22.2 Software Architecture -- 22.2.1 Components of OpenStack. , 22.2.2 OpenStack Usage in Cloud Platform -- 22.3 Vulnerabilities in OpenStack -- 22.3.1 Known Vulnerabilities in OpenStack -- 22.3.2 Assessment for Security -- 22.3.3 Network Vulnerability Scanners -- 22.4 Conclusion -- References -- 23 Smart Physical Intruder Detection System for Highly Sensitive Area -- 23.1 Introduction -- 23.2 Literature Survey -- 23.3 Proposed Methodology -- 23.3.1 Working of PIR Motion Sensor -- 23.3.2 Face Recognition Using Viola-Jones Algorithm and KNN Algorithm -- 23.4 Conclusion and Future Scope -- References -- 24 Two-level Classification of Radar Targets Using Machine Learning -- 24.1 Introduction -- 24.2 Phased Array Radar -- 24.3 Design of Multilevel Classifier -- 24.3.1 Signal Level Classification: Level ``0'' -- 24.3.2 Classification Level 1 Using Raw Detection -- 24.3.3 Level 2 Classifier Using Track Data -- 24.4 Fusion of Information with Signal Level Classifier -- 24.5 Simulation and Results -- 24.5.1 Results for Level 1 Classification -- 24.5.2 Classification Level 2 Using Radar Track and Signal Data -- 24.6 Conclusion -- References -- 25 A Cognitive Semantic-Based Approach for Human Event Detection in Videos -- 25.1 Introduction -- 25.2 Methodology -- 25.2.1 Frame Generation -- 25.2.2 Fuzzy C-Mean Clustering (FCM) -- 25.2.3 Feature Extraction -- 25.2.4 CNN Classifier -- 25.3 Test Results and Discussions -- 25.4 Conclusions -- References -- 26 Analysis of Adequate Bandwidths to Guarantee an Electoral Process in Ecuador -- 26.1 Introduction -- 26.2 Materials and Methods -- 26.2.1 Materials -- 26.2.2 Methods -- 26.3 Results -- 26.4 Discussion -- 26.5 Work Futures and Conclusions -- References -- 27 Load and Renewable Energy Forecasting for System Modelling, an Effort in Reducing Renewable Energy Curtailment -- 27.1 Introduction -- 27.2 Literature Review -- 27.3 Proposed Work. , 27.3.1 Neural Network-Based Load Forecasting.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...