GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Computational intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (593 pages)
    Edition: 1st ed.
    ISBN: 9789811531255
    Series Statement: Lecture Notes in Electrical Engineering Series ; v.643
    DDC: 6.3
    Language: English
    Note: Intro -- Contents -- Artificial Neural Network and Partial Pattern Recognition to Detect Malware -- 1 Introduction -- 2 Literature Review -- 2.1 Signature-Based Malware Detection -- 2.2 Behavior-Based Malware Detection -- 2.3 Heuristic-Based Malware Detection -- 3 Methodology -- 3.1 Opcode Extraction -- 3.2 Feature Selection -- 3.3 Constructing Feature Vector -- 3.4 Feature Classifier -- 3.5 Training the Model -- 3.6 Testing -- 4 Dataset Used -- 5 Results -- References -- Epidemiology and Forecasting of Cholera Incidence in North India -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Collection -- 2.2 Application of Software Used for Data Analysis -- 2.3 Methods -- 3 Epidemiological Features -- 3.1 Agent -- 3.2 Mode of Transmission (Vibrio) -- 3.3 Environmental Factors -- 4 Results and Discussions -- 5 Conclusion -- References -- A Novel Approach for Improving Routing Efficiency and Minimizing Propagation Mean Delay for DADCQ Protocol in VANET -- 1 Introduction -- 1.1 Literature Review -- 2 Application Distance Method for 1D and 2D Networks -- 2.1 Analysis of Spatial Distribution in VANET -- 2.2 Adaption of Node Distribution Pattern for 1D and 2D Uniform Distributions -- 3 Reduction of Fading and It's Analysis in the Network -- 4 Design of Quadrant-Based Threshold -- 5 Analysis of Routing Efficiency and It's Improvement for DADCQ Protocol in VANET -- 6 Analysis and Minimizing Mean Delay for DADCQ Under Eavesdropping and DDoS Attacks -- 7 Conclusion -- References -- Human Computer Interaction as a Mode of Improvement in Human Lifestyle -- References -- New Fast and Efficient Techniques for Image Denoising Using VQ, PCA, SVD, Soft Thresholding and Wiener Filter -- 1 Introduction -- 2 Proposed Techniques -- 2.1 Vector Quantization -- 2.2 PCA -- 2.3 PCA for Denoising -- 2.4 SVD -- 2.5 Soft Thresholding [15, 16] -- 2.6 Wiener Filter [17]. , 3 Results and Analysis -- 4 Complexity Analysis of Proposed LBGPCASTW and LBGSVDSTW with LPGPCA -- 5 Conclusions -- References -- Elicitation and Analysis of Security Requirements and Patterns for IoT Based Health Monitor -- 1 Introduction -- 2 Related Work -- 3 Design and Functioning of Health Monitor Using IOT -- 4 Security Requirements Elicitation -- 5 Identification of Security Requirement Patterns for Security in Requirements Phase -- 6 Security Requirements Patterns Analysis and Its Impact on Security Objectives of IoT Health Monitor -- 7 Conclusion and Future Work -- References -- Classification of Remote Sensing Images Based on K-Means Clustering and Artificial Bee Colony Optimization -- 1 Introduction -- 2 Methodology -- 3 Classification Methods -- 4 Results and Discussions -- 5 Conclusion -- References -- Internet of Things and Its Applications: An Overview -- 1 Introduction -- 2 Related Work -- 3 Elements of IoT -- 4 Framework-Architecture -- 5 Analysis, Monitoring, and Reporting -- 6 Case Studies-Applications -- 7 Conclusion and Future Scope -- References -- Smart KYC Using Blockchain and IPFS -- 1 Introduction -- 1.1 IPFS -- 1.2 DLT -- 2 Present Versus Proposed System -- 3 Proposed Architecture -- 3.1 Document Submission -- 3.2 Notary Verification -- 3.3 Third Party Verification -- 4 Benefits of the System -- 5 Future Aspects -- 6 Conclusion -- References -- Lexical Analysis and Mathematical Modelling for Analysing Depression Detection of Social Media Reviews -- 1 Introduction -- 2 Related Study -- 3 Our Proposed Model -- 4 Result Analysis -- 5 Conclusion -- 6 Future Enhancement -- References -- Application of Neural Networks and Lifting Wavelet Transform for Long Term Solar Radiation Power Prediction -- 1 Introduction -- 2 Overview of Basics -- 2.1 Recurrent Neural Networks -- 2.2 Wavelet Transforms. , 2.3 Construction of Second Generation Wavelets (Lifting Scheme) [7] -- 2.4 Multi-resolution Analysis (MRA) [18] -- 3 Construction of Lifting Wavelet Transform -- 4 Experiment -- 4.1 Solar Radiation Prediction with Neural Networks -- 4.2 Modeling of NARX Neural Network -- 4.3 Results -- 5 Conclusion -- References -- Modeling Sustainable Mobility Using Fuzzy Logic: An Application to Selected Indian States -- 1 Introduction -- 2 Methodology -- 2.1 Development of Sustainable Mobility Indicators -- 2.2 Normalization, Weighting and Mathematical Integration -- 2.3 Integrating the Sub-indices with Fuzzy Logic -- 3 Study Areas and Data Collection -- 4 Results and Discussions -- 5 Conclusion -- References -- Shravya-A Framework for Enunciation of Sanskrit Shlokas and Phrases -- 1 Introduction -- 2 Literature Survey -- 2.1 Sandhi Vicched -- 2.2 Enunciation-Shloka Generation -- 3 Shravya -- 3.1 Sandhi Vicched Module -- 3.2 Shloka Audio Generation -- 3.3 Training -- 3.4 Esting -- 4 Conclusion -- 5 Future Scope -- References -- Energy-Efficiency in WSN Based on SCMC Protocol -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Proposed System Architecture -- 3.2 Proposed Design Goal -- 3.3 Dynamic Cluster Formation -- 4 Experimental Results -- 5 Conclusion -- References -- Extending Bidirectional Language Model for Enhancing the Performance of Sentiment Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Word Embedding Using Bidirectional Language Model -- 3.2 Sentiment Analysis Approach -- 4 Result Analysis -- 5 Conclusion and Future Work -- References -- Energy-Efficiency Driven Strategy for Resource Aggregation Based on Future Resource-Usage Inference in a Cloud Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Proposed Model -- 5 Implementation Details -- 6 Evaluation with Assessment. , 6.1 Simulation Details -- 6.2 Result Analysis -- 7 Conclusion -- References -- A Comparison of Deep Learning Algorithms for Plant Disease Classification -- 1 Introduction -- 2 Literature Survey -- 2.1 Dataset -- 3 Model Architecture -- 3.1 LeNet -- 3.2 AlexNet -- 3.3 Inception V3 -- 4 Experiments and Results -- 5 Conclusion -- References -- Active Learning Using Margin Sampling Strategy for Entity Recognition -- 1 Introduction -- 2 Related Work -- 3 Corpus Details -- 4 Feature Extraction and Classifier Used -- 5 Active Learning Algorithm Steps -- 6 Result and Discussion -- 7 Conclusion -- References -- Design of QoS and Energy Efficient VM Consolidation Framework for Cloud Data Centers -- 1 Introduction -- 2 Related Works -- 3 CloudSim VM Consolidation -- 4 Proposed VM Consolidation System -- 4.1 Novel Load Detection Algorithm -- 4.2 VM Selection Algorithm -- 4.3 PSO Based VM Placement -- 5 Conclusion and Future Work -- References -- Cyberbullying Detection on Multiple SMPs Using Modular Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Dataset Preprocessing -- 3.2 Architecture -- 4 Experiments and Results -- 5 Conclusion -- References -- Lightweight Two-factor Authentication Protocol and Session Key Generation Scheme for WSN in IoT Deployment -- 1 Introduction -- 2 Related Work -- 3 Revisiting Amin and Biswas's Algorithm -- 4 Proposed Protocol -- 4.1 System Setup and Initialization Phase -- 4.2 User Registration Phase -- 4.3 Login Phase -- 4.4 Authentication and Session Key Generation Phase -- 5 Analysis of the Proposed Protocol -- 5.1 Prevents All Session Hi-Jacking Due to Sensor Capture Attack -- 5.2 Preventing Gateway Impersonation Attack [23, 27] -- 5.3 Avoiding Sensor Node Impersonation Attack [27] -- 6 Conclusion and Future Scope -- References. , An Empirical Evaluation of Correlation Based Feature Selection for Tweet Sentiment Classification -- 1 Introduction -- 2 Evaluation Methods and Model -- 2.1 Dataset -- 2.2 Data Preprocessing -- 2.3 Feature Selection Methods -- 2.4 Sentiment Classification -- 3 Experimental Results -- 4 Conclusion -- References -- Automatic Traffic Sign Detection and Classification of Indian Traffic Signage's Based on Multi-feature Fusion -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Preprocessing and Segmentation -- 3.2 Feature Extraction Methods -- 3.3 Feature Fusion -- 3.4 Classification -- 4 Results -- 5 Conclusion -- References -- Extended Local Ternary Pattern for Face Anti-spoofing -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Spoofing Detection Using ELTP -- 4 Results and Discussions -- 5 Conclusion -- References -- Enhancing Data Security in Cloud Computing Using Threshold Cryptography Technique -- 1 Introduction -- 2 Problem Statement -- 3 Literature Survey -- 3.1 Existing Systems -- 3.2 Proposed System -- 4 Objectives -- 5 Methodology and Assumptions -- 6 Implementation -- 7 Security and Performance Analysis -- 7.1 Data Confidentiality -- 7.2 Entity Authentication -- 7.3 Data Integrity -- 7.4 Data Access Control -- 7.5 Performance Analysis -- 8 Conclusion -- References -- Multi-resolution Hierarchical Clustering by Vector Quantization -- 1 Introduction -- 2 Principles and Methodology -- 2.1 The Proposed Clustering Algorithm for Vector Quantization -- 2.2 Complexity Analysis -- 3 Multi-resolution Clustering -- 4 Experiment and Results -- 5 Conclusion -- References -- Certificate Verification System Using Blockchain -- 1 Introduction -- 1.1 Blockchain -- 1.2 Ethereum -- 1.3 Smart Contract -- 2 Related Works -- 3 Proposed System -- 3.1 Process -- 4 Conclusion -- References. , IoT Based Automatic Plant Watering System Through Soil Moisture Sensing-A Technique to Support Farmers' Cultivation in Rural India.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...