Vai al contenuto principale della pagina

Innovative Methods in Computer Science and Computational Applications in the Era of Industry 5.0 : Proceedings of the 5th International Conference on Artificial Intelligence and Applied Mathematics in Engineering ICAIAME 2023, Volume 2 / / edited by D. Jude Hemanth, Utku Kose, Bogdan Patrut, Mevlut Ersoy



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Innovative Methods in Computer Science and Computational Applications in the Era of Industry 5.0 : Proceedings of the 5th International Conference on Artificial Intelligence and Applied Mathematics in Engineering ICAIAME 2023, Volume 2 / / edited by D. Jude Hemanth, Utku Kose, Bogdan Patrut, Mevlut Ersoy Visualizza cluster
Pubblicazione: Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Edizione: 1st ed. 2024.
Descrizione fisica: 1 online resource (317 pages)
Disciplina: 620.00151
Soggetto topico: Computational intelligence
Artificial intelligence
Engineering - Data processing
Computational Intelligence
Artificial Intelligence
Data Engineering
Persona (resp. second.): HemanthD. Jude
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Foreword -- Preface -- Contents -- Multimodal Classification Algorithm for Turkish Document Archiving: Improving Digital Document Storage by Unifying Image and Text-Based Classifiers -- 1 Introduction -- 2 Methodology -- 2.1 Obtainment of Data-Set -- 2.2 Image Based Model -- 2.3 Text Based Model -- 2.4 Unified Model -- 3 Conclusion -- References -- Optimizing Technical Analysis Indicator Parameters with Grey Wolf Optimization -- 1 Introduction -- 2 Methodology -- 2.1 RSI -- 2.2 Grey Wolf Optimization (GWO) -- 2.3 Backtesting -- 2.4 Data and Benchmark -- 2.5 Implementation of GWO Algorithm -- 3 Results -- 3.1 Financial Evaluation -- 3.2 Results of Optimization -- 4 Conclusion -- References -- Performance Analysis of Machine Learning Algorithms for Intrusion Detection in Wireless Sensor Networks -- 1 Introduction -- 2 Related Studies -- 3 Materials and Methods -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 Data Balancing -- 3.4 Machine Learning Algorithms -- 3.5 Evaluation Metrics -- 4 Experiment and Results -- 4.1 Model Parameters -- 4.2 Experiment Results -- 4.3 Effect of Data Balancing on Intrusion Detection in Wireless Sensor Networks -- 5 Conclusion and Future Work -- References -- Predicting, Profiling and Analysing Burnout of Nursery Staff -- 1 Introduction -- 2 Method and Material -- 2.1 Participants and Procedures -- 2.2 Measures -- 2.3 Statistical and Machine Learning-Based Analysis -- 3 Results and Discussion -- 4 Conclusions -- References -- Reasoning on Relational Database and Its Respective Knowledge Graph: A Comparison of the Results -- 1 Introduction -- 2 Dataset and Algorithms -- 2.1 Hetionet Dataset -- 2.2 Algorithms -- 3 Results and Discussion -- 4 Conclusion -- References -- Snippet Generation Using Local Alignment for Information Retrieval (LAIR) -- 1 Introduction -- 2 Related Work -- 3 Method and Material.
3.1 Sequence Alignment's Applicability to Information Retrieval -- 3.2 Document and Query Preprocessing Steps -- 3.3 Adapting Local Sequence Alignment to IR -- 3.4 Combining Local Sequence Alignment and Snippet Generation -- 4 Evaluation of Snippet Quality -- 5 Adaptation of LAIR for YouTube Search -- 6 Conclusions and Future Work -- References -- The Impact of Emotional Intelligence on Students with Extracurricular Activities and Regular Students -- 1 Introduction -- 2 Literature Review -- 3 Method and Material -- 3.1 Research Results - Students who Participate in Extracurricular Activities During their Studies -- 3.2 Research Results - Regular Students -- 3.3 Comparative Analysis -- 4 Discussion and Results -- 5 Conclusions and Future Work -- References -- The Relevance of Artificial Intelligence in Project Management -- 1 Introduction -- 2 Bibliographic Analysis -- 3 Findings -- 3.1 Information About Articles -- 3.2 Results of the Bibliometric Analysis -- 4 Conclusion -- References -- Weakly Supervised Relation Extraction -- 1 Introduction -- 2 Related Works -- 3 Method and Material -- 3.1 REPEL -- 3.2 Proposed Model -- 4 Discussion and Results -- 5 Conclusions and Future Work -- References -- Fitness Distance Balance Based Kepler Optimization Algorithm -- 1 Introduction -- 2 Method and Material -- 2.1 Preliminaries of the Metaheuristic Optimization Process -- 2.2 Kepler Optimization Algorithm -- 2.3 Fitness-Distance Balance -- 2.4 Fitness Distance Balance Based Kepler Optimization Algorithm -- 3 Results and Analysis -- 3.1 CEC2014 Benchmark Functions -- 3.2 CEC2017 Benchmark Functions -- 3.3 CEC2020 Benchmark Functions -- 3.4 CEC2022 Benchmark Functions -- 4 Conclusions -- References -- Analysis of Cervical Neoplasia with Artificial Intelligence -- 1 Introduction -- 2 Materials and Methods -- 2.1 Design of the Study and Patient Selection.
2.2 Smear Test and Hr HPV DNA Analysis -- 2.3 Analysis of Data and Application of Artificial Intelligence Technique -- 3 Results and Conclusions -- References -- Estimation of Meteorological Parameters Using Data Driven Methods -- 1 Introduction -- 2 Related Works -- 3 Method and Material -- 3.1 Random Forest Algorithm -- 3.2 Long Short-Term Memory -- 3.3 Geographical Characteristics of the Research Area -- 3.4 Data Preparation -- 4 Research Findings and Discussion -- 4.1 Data Preprocessing with Data Mining -- 4.2 Random Forest Algorithm Temperature Analysis Results -- 4.3 LSTM İle Sıcaklık Analiz Sonuçları -- 5 Conclusion -- References -- Deep Learning Based Anomaly Detection in the 3D Modeling Production Process -- 1 Introduction -- 2 Related Works -- 3 Material and Method -- 3.1 Material -- 3.2 Method -- 4 Research Findings -- 5 Discussion and Results -- References -- Least Core Computation of Weighted Voting Games -- 1 Introduction -- 2 Preliminaries -- 2.1 Weighted Voting Games -- 2.2 Bin Packing Problems -- 3 Least Core Computation of Weighted Voting Games -- 4 Sample Applications -- 4.1 Simple Weighted Voting Game -- 4.2 Multiple Weighted Voting Game -- 4.3 Disjunction of Weighted Voting Games -- 5 Conclusion -- References -- Evaluation of Authentication and Key Agreement Approaches of 5G Networks -- 1 Introduction -- 2 Architecture of 5G Networks -- 3 Architecture of 5G-AKA Protocol -- 3.1 5G-AKA Protocol -- 3.2 EAP-AKA Protocol -- 4 Security Services of the 5G Network -- 5 Security Loopholes in the 5G Network and 5G-AKA Protocol -- 5.1 Protection and Privacy in 5G -- 5.2 Bogus SN Attack -- 5.3 ToRPEDO Attack -- 5.4 SQN Mismatch Attack -- 5.5 SUCI Replay Attack -- 6 Related Work -- 7 Conclusion -- References -- Machine Learning Based Detection of Forest Fires Using Sensors Placed in Forests -- 1 Introduction -- 2 Material and Method.
2.1 Data Set -- 2.2 Feature Selection -- 2.3 Machine Learning -- 2.4 Performance Evaluation Criteria -- 3 Findings -- 4 Discussion -- 5 Conclusion -- References -- Exploring the Potential Interplay of GPT, Edge AI, and the Defense Industry -- 1 Introduction -- 2 Method and Material -- 2.1 GPT: Definition and Core Attributes -- 2.2 GPT: Applications Within Defense Operations -- 2.3 GPT: Challenges and Considerations -- 2.4 Edge AI: Transforming Decentralized Data Processing -- 2.5 Edge AI: Advantages for Defense Applications -- 2.6 Edge AI: Challenges and Considerations -- 3 Discussion, Conclusions, and Future Prospects -- References -- Examination of Tensile Strength of Polylactic Acid (PLA) Materials Processed by Fused Deposition Modeling (FDM) Additive Manufacturing Method at Different Production Parameters -- 1 Introduction -- 2 Method and Material -- 2.1 Fused Deposition Modeling (FDM) -- 2.2 Experimental Design -- 2.3 Tensile Strength Test -- 3 Discussion and Results -- 4 Conclusion -- References -- The Evolution of Technology in Artificial Intelligence and Its Impact on Project Management -- 1 Introduction -- 2 Fundamentals of AI -- 2.1 Defining AI -- 2.2 Machine Learning -- 2.3 Deep Learning (DL) -- 2.4 Optimization Algorithms and Hybrid Approaches -- 2.5 AI Application Fields -- 3 Methodology -- 3.1 Systematic Literature Review -- 3.2 Research Questions -- 3.3 Search Execution and Queries -- 4 Results -- 4.1 The Evolution of AI Technologies -- 4.2 The Evolution of AI Technologies in PM -- 4.3 Impact of AI on PM -- 5 Discussion -- 6 Conclusion -- References -- Laveraging Machine Learning for Improved Project Inspections and Internal Control Systems -- 1 Introduction -- 2 Methodology -- 3 Theoretical Background -- 3.1 The New Era of Project Audit Risk Management -- 3.2 Problem Identification and Predictive Insights.
3.3 The Power of Real-Time Auditing -- 3.4 Changing Role of Project Auditors -- 4 Challenges and Forward Path -- 5 Conclusions and Future Work -- References -- Author Index.
Sommario/riassunto: This book provides a wide collection of the recent studies triggering innovative ways to advance computer science and computational applications. The collection enables readers to understand more about technological conditions advancing industrial perspectives towards Industry 5.0. The research studies included in the book were accepted and presented in the 5th International Conference on Artificial Intelligence and Applied Mathematics in Engineering (ICAIAME 2023), which was held in Belek, Antalya, Turkey (on 3–4–5 November 2023). By covering the scientific scope of the conference, the book informs the readers about the cutting-edge data-driven solution aspects, intelligent algorithms, and mathematical background applied for solving different kinds of engineering problems. The book is used as a reference source by the wide readership including international researchers, professionals, practitioners from industry, degree students, and experts from all engineering disciplines.
Titolo autorizzato: Innovative Methods in Computer Science and Computational Applications in the Era of Industry 5.0  Visualizza cluster
ISBN: 3-031-56322-0
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910847598703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Engineering Cyber-Physical Systems and Critical Infrastructures, . 2731-5010 ; ; 10