Vai al contenuto principale della pagina

Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors Visualizza cluster
Pubblicazione: Gateway East, Singapore : , : Springer, , [2021]
©2021
Descrizione fisica: 1 online resource (789 pages)
Disciplina: 006.3
Soggetto topico: Artificial intelligence
Intel·ligència artificial
Internet de les coses
Seguretat informàtica
Computació en núvol
Soggetto genere / forma: Congressos
Llibres electrònics
Persona (resp. second.): SharmaHarish
Nota di contenuto: Intro -- Preface -- Contents -- About the Editors -- Modelling Subjective Happiness with a Survey Poisson Model and XGBoost Using an Economic Security Approach -- 1 Introduction -- 2 Data and Descriptive Statistics -- 3 Methodology -- 3.1 Survey Poisson Model -- 3.2 XGBoost -- 3.3 Missing Data -- 4 Results -- 4.1 Results of the Sensitivity Analysis of Missing Data -- 4.2 Predicted Subjective Happiness -- 4.3 Regression Analysis -- 5 Conclusions -- References -- Monitoring Web-Based Evaluation of Online Reputation in Barcelona -- 1 Introduction -- 2 Methodology Description -- 2.1 Principal Component Analysis -- 2.2 Robust Compositional Regression Model -- 3 Data Description -- 4 Discussion of Results -- 5 Conclusions and Managerial Implications -- Appendix 1: Abbreviation and Corresponding Meaning of Fig. 1 -- Appendix 2: Abbreviation and Corresponding Meaning of Fig. 2 -- References -- Information Technology for the Synthesis of Optimal Spatial Configurations with Visualization of the Decision-Making Process -- 1 Introduction -- 2 Basic Concepts and Definitions -- 3 Configuration Space of Geometric Objects Based on Geometric Information -- 4 Information Technology Model for the Synthesis of Spatial Configurations -- 5 The Software Package Description -- 6 An Example of Implementing the Results -- 7 Conclusion -- References -- Hybrid Approach to Combinatorial and Logic Graph Problems -- 1 Introduction -- 2 The Problem Description -- 3 The Hybrid Approach -- 4 Hybrid Three-Level Algorithm -- 5 Objective Function -- 6 Experiments -- 7 Conclusion -- References -- Energy-Efficient Algorithms Used in Datacenters: A Survey -- 1 Introduction -- 2 Techniques Used in Datacenters to Maintain Energy Efficiency -- 3 Energy Efficiency Metrics Used in Datacenters -- 4 Different Types of Algorithms Used in Datacenters -- 5 Related Work -- 6 Conclusion.
References -- Software Log Anomaly Detection Method Using HTM Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Log Parser -- 3.2 Method Overview -- 4 Evaluation -- 4.1 Experiment Setting -- 4.2 Input Format -- 4.3 Results -- 5 Conclusion -- References -- Logical Inference in Predicate Calculus with the Definition of Previous Statements -- 1 Introduction -- 2 Definition of the Problem -- 2.1 Meaningful Definition of the Problem -- 2.2 Formal Definition of the Problem -- 3 Basic Processing Procedures -- 3.1 Partial "Disjuncts Division" -- 3.2 Complete "Disjunct Division" -- 4 Procedure of Inference -- 5 Method of Inference -- 6 Conclusion -- References -- Congestion Management Considering Demand Response Programs Using Multi-objective Grasshopper Optimization Algorithm -- 1 Introduction -- 2 Materials and Methods -- 2.1 Demand Response Programs Cost -- 3 Multi-objective Grasshopper Optimization Algorithm -- 4 Results and Discussions -- 5 Conclusion -- Appendix: Parameters of MOGOA -- References -- A Hardware Accelerator Implementation of Multilayer Perceptron -- 1 Introduction -- 2 Literature Review -- 3 FFNN Computation Algorithm -- 4 Hardware Architecture -- 4.1 Neural Processing Element -- 4.2 Activation Function Block (AFB) -- 4.3 Network Control Sequences -- 4.4 Number of Clock Cycles of Execution -- 5 Results and Discussion -- 5.1 Hardware Blocks -- 5.2 Hardware Architecture of 3times3times2 MLP -- 5.3 Resource Utilization and Performance Evaluation -- 6 Application -- 7 Conclusion -- References -- Building a Classifier of Behavior Patterns for Semantic Search Based on Cuckoo Search Meta-heuristics -- 1 Introduction -- 2 Formulation of the Problem -- 3 Method for Building the Classifier of Behavior Pattern -- 4 Bio-inspired Algorithm Based on Cuckoo Search -- 5 Experimental Research -- 6 Conclusion -- References.
TETRA Enhancement Based on Adaptive Modulation -- 1 Introduction -- 2 The Proposed TETRA Modules Layers -- 3 The Proposed TETRA System Structure -- 4 Proposal Frame of Adaptive TETRA System -- 5 Simulation and Results -- 6 Conclusion -- References -- Dynamic Stability Enhancement of Grid Connected Wind System Using Grey Wolf Optimization Technique -- 1 Introduction -- 2 Grid Connected Wind Turbine System -- 3 Modeling of SMEs System -- 3.1 Modeling of VSC -- 3.2 Modeling of Chopper -- 4 Grey Wolf Optimization (GWO) Technique -- 5 Control Strategy of Wind System Using GWO -- 6 Simulation Results -- 7 Conclusion -- References -- A Comparative Analysis on Wide-Area Power System Control with Mitigation the Effects of an Imperfect Medium -- 1 Introduction -- 2 Modelling of the Test Power System -- 2.1 Kundur's Two-Area Four-Machine Test System -- 2.2 Selection of Control Location and Wide-Area Remote Signal -- 3 Control Techniques -- 3.1 Conventional PSS (CPSS) -- 3.2 Multi-band-based PSS (MB-PSS4B) -- 3.3 Linear Quadratic Gaussian (LQG) Controller -- 4 Noise in System -- 5 Results and Discussions -- 6 Conclusions -- References -- Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT) -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 3.1 Delineation of IoT Adware Attacks Classification and Identification Using (DL-SVM-IoT) -- 4 Experimental Results and Comparison -- 5 Conclusion and Future Work -- References -- Intrusion Detection System for Securing Computer Networks Using Machine Learning: A Literature Review -- 1 Introduction -- 1.1 Machine Learning for IDS -- 1.2 Types of IDS -- 2 Review Questions -- 3 Papers in Review -- 4 Discussions -- 5 Conclusion -- References -- An Exploration of Entropy Techniques for Envisioning Announcement Period of Open Source Software -- 1 Introduction.
1.1 Information Measures -- 2 Predicting Bugs and Estimating Release Time of Software -- 3 Conclusion -- References -- Occurrence Prediction of Pests and Diseases in Rice of Weather Factors Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Modeling of Data for Testing and Training Purpose -- 3.4 Machine Learning -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- A Literature Review on Generative Adversarial Networks with Its Applications in Healthcare -- 1 Introduction -- 2 What are Generative Adversarial Networks or GANs -- 2.1 Generative Model -- 2.2 Discriminative Model -- 3 Applications of GANs or Generative Adversarial Networks in Healthcare -- 3.1 Electronic Health Record -- 3.2 Retinal Image Synthesis -- 3.3 Skin Lesion Analysis -- 3.4 Medical Image Segmentation -- 4 Discussion -- 4.1 Advantages -- 4.2 Disadvantages -- 4.3 Future Scope -- 5 Conclusion -- References -- A Federated Search System for Online Property Listings Based on SIFT Algorithm -- 1 Introduction -- 2 Online Federated Search System -- 2.1 Source Crawling -- 2.2 Collection Creation -- 2.3 User Interface -- 3 Implementing the Property Federated Search System -- 4 Evaluation and Discussions -- 5 Conclusions -- References -- Digital Brain Building a Key to Improve Cognitive Functions by an EEG-Controlled Videogames as Interactive Learning Platform -- 1 Introduction -- 1.1 User State Monitoring -- 1.2 Neurogaming Using NeuroSky -- 1.3 EEG Acquisition -- 1.4 Neuroergonomics Application -- 2 Methodology -- 2.1 Mathematical Model -- 2.2 Neurogame and Educational Concept -- 2.3 Brain Runner -- 2.4 Hybrid BCI -- 2.5 Interactive Session -- 3 Results -- 4 Conclusion -- References -- Intelligent Car Cabin Safety System Through IoT Application -- 1 Introduction -- 2 IoT (Internet of Things).
3 System Description and Principal -- 4 Methodology -- 5 Results and Discussions -- 6 Conclusions -- References -- Utilization of Delmia Software for Saving Cycle Time in Robotics Spot Welding -- 1 Introduction -- 2 Problem Statement -- 3 Evolutionary Approach -- 4 Simulation Experiments -- 5 Conclusion -- References -- Data Protection Techniques Over Multi-cloud Environment-A Review -- 1 Introduction -- 2 Literature Survey -- 3 Comparative Analysis or Research Scope -- 4 Visibility of Comparative Study -- 4.1 Description of Different Cloud Framework Used -- 4.2 Issued Addressed -- 4.3 Benefits -- 5 Identified Gaps in Literature Survey -- 6 Mathematical Model -- 7 Proposed Methodology or Related Work -- 8 Conclusion -- References -- Hierarchical Ontology Based on Word Sense Disambiguation of English to Hindi Language -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of English/Hindi Questions File and Dictionary -- 3.1 Preprocessing -- 3.2 Dictionary Preprocessing -- 4 Ontology Development Module -- 4.1 Collection of Senses -- 4.2 Calculation of Weight TF -- 4.3 Hierarchical Ontology -- 5 Proposed Hierarchical Ontology Algorithm -- 5.1 Proposed Algorithm -- 6 Experiment and Results -- 7 Conclusion -- References -- Review Paper: Error Detection and Correction Onboard Nanosatellites -- 1 Introduction -- 2 Methodology -- 2.1 Space Radiation -- 2.2 Glitches and Upsets -- 2.3 Geomagnetism -- 2.4 EDAC Schemes -- 2.5 Implementing EDAC Systems -- 3 Discussion -- 4 Conclusion -- References -- Kerala Floods: Twitter Analysis Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Cleaning -- 3.3 Data Labeling -- 3.4 Data Division and Separation -- 4 Implementation and Results -- 5 Conclusion -- References -- An Improved DVFS Circuit & -- Error Correction Technique -- 1 Introduction.
2 Charge Pump Circuit.
Titolo autorizzato: Congress on intelligent systems  Visualizza cluster
ISBN: 981-336-981-7
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910483511903321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Advances in Intelligent Systems and Computing