Vai al contenuto principale della pagina

Congress on Intelligent Systems . Volume 2 : proceedings of CIS 2021 / / Mukesh Saraswat [and four others], editors



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Congress on Intelligent Systems . Volume 2 : proceedings of CIS 2021 / / Mukesh Saraswat [and four others], editors Visualizza cluster
Pubblicazione: Singapore : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (914 pages)
Disciplina: 006.3
Soggetto topico: Artificial intelligence
Internet of things
Persona (resp. second.): SaraswatMukesh
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Contents -- About the Editors -- A Comprehensive Survey on Machine Reading Comprehension: Models, Benchmarked Datasets, Evaluation Metrics, and Trends -- 1 Introduction -- 2 Materials and Methods -- 2.1 Machine Reading Comprehension Tasks -- 2.2 Types of Machine Reading Comprehension Questions -- 2.3 Latest Trends on Machine Reading Comprehension -- 3 MRC Architecture, Modules, and Baseline Models -- 3.1 Word Embedding -- 3.2 Feature Extraction -- 3.3 Context-Question Interaction -- 3.4 Answer Prediction -- 4 Performance Evaluation Metrics -- 4.1 Accuracy -- 4.2 Exact Match -- 4.3 Precision and Recall -- 4.4 F1 Score (F Score or F Measure) -- 4.5 Recall-Oriented Understudy for Gisting Evaluation (ROUGE) -- 4.6 Bilingual Evaluation Understudy (BLEU) -- 4.7 Metric for Evaluation of Translation with Explicit Ordering (METEOR) -- 4.8 Human Equivalence Score (HEQ) -- 5 Summary and Conclusion -- References -- A Novel Feature Descriptor: Color Texture Description with Diagonal Local Binary Patterns Using New Distance Metric for Image Retrieval -- 1 Introduction -- 2 Proposed Method -- 2.1 Diagonal Local Binary Pattern for Color Image -- 3 Similarity Measures -- 3.1 Proposed New Distance Metric -- 4 Analysis and Result -- 4.1 Performance and Measures -- 4.2 Datasets -- 4.3 Obtained Results -- 5 Conclusion -- References -- OntoINT: A Framework for Ontology Integration Based on Entity Linking from Heterogeneous Knowledge Sources -- 1 Introduction -- 2 Related Works -- 3 Proposed System Architecture -- 4 Implementation and Performance Evaluation -- 5 Conclusions -- References -- KnowCommerce: A Semantic Web Compliant Knowledge-driven Paradigm for Product Recommendation in E-commerce -- 1 Introduction -- 2 Related Works -- 3 Proposed System Architecture -- 4 Implementation -- 5 Performance Evaluation and Results -- 6 Conclusion.
References -- Removal of Occlusion in Face Images Using PIX2PIX Technique for Face Recognition -- 1 Introduction -- 2 Related Works -- 3 Proposed Research Methodology -- 3.1 GAN and Pix2pix -- 3.2 Proposed Architecture -- 4 Experiments -- 4.1 Case 1: Training with Occluded Images in the Dataset -- 4.2 Case 2: Training with Images by Creating an Occlusion -- 4.3 Case 3: Training With Images by Creating an Occlusion with Discriminative Receptive Field of 64 × 64 -- 5 Conclusion -- References -- Age, Gender and Emotion Estimation Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Image or Data-Set Collection -- 3.2 Function to Encode the Labels -- 3.3 Resizing and Preprocessing the Data -- 3.4 Extracting and Integrating the Features -- 3.5 Training and Testing -- 3.6 Output -- 4 Experiment and Results -- 5 Conclusions and Future Work -- References -- Qualitative Classification of Wheat Grains Using Supervised Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Segmentation -- 3.2 Feature Extraction -- 3.3 Classification Using Multilayer Perceptron (MLP) -- 4 Results -- 4.1 Dataset Description -- 4.2 Experimental Results -- 4.3 Performance Analysis -- 4.4 Comparative Analysis -- 5 Conclusion -- References -- Pandemic Simulation and Contact Tracing: Identifying Super Spreaders -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method: Pandemic Simulation and Contact Tracing: Identifying Super Spreaders -- 3.1 Initial Dataset Generation -- 3.2 Simulation -- 3.3 Visualising Data -- 3.4 Identification of Super Spreaders -- 4 Experimental Results -- 5 Experimental Results and Analysis -- 6 Future Scope -- 7 Conclusion -- References -- Assessment of Attribution in Cyber Deterrence: A Fuzzy Entropy Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Cyber Deterrence.
2.2 Cyber Attribution -- 3 A Mathematical Model -- 3.1 Numerical Example -- 4 Conclusion -- References -- Predictive Maintenance of Bearing Machinery Using MATLAB -- 1 Introduction -- 1.1 Importance -- 1.2 Motivation and Significant Statistics -- 1.3 Research Challenges/Gaps -- 1.4 Proposed Solution -- 1.5 Terms and Terminologies -- 1.6 Paper Structure -- 2 Related Work -- 2.1 Background -- 2.2 Current State of Art -- 2.3 Literature Review -- 3 Dataset -- 3.1 Data Collection -- 3.2 Data Organization -- 3.3 Exploratory Data Analysis -- 3.4 Data Features [21] -- 3.5 Data Pre-processing -- 4 Proposed Methodology -- 4.1 Architecture -- 4.2 Technical Details -- 4.3 Algorithms and Equations -- 4.4 Pseudocode -- 4.5 Methodology Steps -- 5 Results and Analysis -- 5.1 Results Organization -- 5.2 Figures -- 5.3 Graphs -- 5.4 Performance Metrics Evaluations -- 6 Challenges -- 7 Conclusion -- 7.1 Future Work -- References -- Fuzzy Keyword Search Over Encrypted Data in Cloud Computing: An Extensive Analysis -- 1 Introduction -- 1.1 Contribution of the Work -- 1.2 Organization of the Work -- 2 Background -- 2.1 Literature Survey -- 3 Industry Case Study -- 3.1 Technical Reports -- 3.2 Real-Time Scenarios -- 4 Fuzzy-Based Modified Keyword Search Model -- 4.1 Detailed Architecture -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References -- Application of Data Mining and Temporal Data Mining Techniques: A Case Study of Medicine Classification -- 1 Introduction -- 2 K‐Means Clustering -- 3 Experimental Results and Discussion -- 4 Conclusion -- References -- A Deep Learning Approach for Plagiarism Detection System Using BERT -- 1 Introduction -- 1.1 NLP and Machine Learning -- 1.2 Machine Learning and Word Embedding -- 1.3 NLP and Plagiarism -- 1.4 Organization of Paper -- 2 Related Work -- 3 Approaches to Plagiarism Detection.
4 Plagiarism Detection Methods -- 5 Word Embeddings and Plagiarism Detection -- 6 Experimental Results -- 6.1 Experimental Setup -- 6.2 Data Pre-processing -- 6.3 Dataset Preparation -- 6.4 Methodology -- 6.5 Experimental Results and Discussion -- 7 Conclusion and Future Scope -- References -- A Multi-attribute Decision Approach in Triangular Fuzzy Environment Under TOPSIS Method for All-rounder Cricket Player Selection -- 1 Introduction -- 2 Basic Definitions -- 3 Proposed Fuzzy TOPSIS Algorithm -- 3.1 A Case Study -- 3.2 Sensitivity Analysis -- 4 Conclusion -- References -- Machine Learning Techniques on Disease Detection and Prediction Using the Hepatic and Lipid Profile Panel Data -- 1 Introduction -- 1.1 Liver-related Diseases and Conditions -- 1.2 Lipid Metabolism Disorders and Conditions -- 1.3 Derangement of Enzyme Levels in Diabetes -- 2 Related Works -- 2.1 Analysis of State-of-the-art Techniques in Liver Disease Detection and Prediction Using LFT Data -- 2.2 Existing Machine Learning Techniques in Lipid Metabolism Disorders Detection and Prediction Using LPP Data as a Risk Factor -- 2.3 Literature Review for Occurrence of Abnormal Liver Function Tests in Diabetes Mellitus -- 2.4 Literature Review for Incidence of Abnormal Lipid Levels in Diabetes Mellitus -- 3 Comparative Review of Various Machine Learning Algorithms Using LFT and LPP for Diagnosing and Predicting Diseases -- 3.1 Discussion -- 4 Research Gaps -- 5 Pragmatic Implications and Recommendations -- 6 Contribution -- 7 Conclusion and Future Work -- References -- Performance Analysis of Machine Learning Algorithms for Website Anti-phishing -- 1 Introduction -- 2 Supervised Machine Learning Methods for Anti-phishing -- 3 Decision Tree Algorithm for Anti-phishing -- 4 Random Forest for Anti-phishing -- 5 Support Vector Machine Algorithm for Anti-phishing.
6 Logistic Regression for Anti-phishing -- 7 Results and Discussion -- 8 Conclusion -- References -- Analytical Analysis of Two-Warehouse Inventory Model Using Particle Swarm Optimization -- 1 Introduction -- 2 Literature Reviews -- 3 Presumption and Documentations -- 3.1 Assumption -- 4 Mathematical Formulation of Model and Analysis -- 5 Particle Swarm Optimization -- 6 Numerical Analysis -- 7 Conclusions -- References -- Towards an Enhanced Framework to Facilitate Data Security in Cloud Computing -- 1 Introduction -- 2 Cloud Computing Overview -- 2.1 Cloud Service Models -- 2.2 Cloud Deployment Models -- 3 Data Security Overview -- 3.1 Cloud Computing Security Model -- 3.2 The CIA Triad of Information Security -- 3.3 Cloud Security Alliance -- 4 Cloud Security Frameworks -- 4.1 Service-Collaboration Orientated Security Framework -- 4.2 Personal Cloud Computing Framework -- 4.3 Secure G-Cloud-Based Framework for Government Healthcare Services -- 5 Proposed Cloud Security Framework -- 6 Conclusions and Future Work -- References -- Kinematics and Control of a 3-DOF Industrial Manipulator Robot -- 1 Introduction -- 1.1 Method Description -- References -- Enhanced Energy Efficiency in Wireless Sensor Networks -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 Energy Consumption in WSNs -- 2 Related Works -- 3 Methodology -- 3.1 Improving Energy Efficiency of WSNs -- 3.2 Experimental Setup -- 4 Simulation and Analysis of Results -- 5 Discussion and Conclusion -- 5.1 Conclusion -- References -- Social Structure to Artificial Implementation: Honeybees -- 1 Introduction -- 1.1 Honeybees to Artificial Bees -- 1.2 Standard Artificial Bee Colony Optimization -- 1.3 Standard ABC and Its Different Variants -- 2 Research: Usage of Basic and Improve-ABC -- 2.1 Clustering, Routing, and Deployment in Wireless Ad Hoc Networks -- 2.2 Internet of Things (IoT).
2.3 Task Scheduling in Cloud Computing.
Titolo autorizzato: Congress on intelligent systems  Visualizza cluster
ISBN: 981-16-9113-4
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910580152703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture notes on data engineering and communications technologies ; ; Volume 111.