top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied soft computing and communication networks : proceedings of ACN 2020 / / Sabu M. Thampi [and five others], editors
Applied soft computing and communication networks : proceedings of ACN 2020 / / Sabu M. Thampi [and five others], editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (347 pages)
Disciplina 006.3
Collana Lecture notes in networks and systems
Soggetto topico Soft computing
Informàtica tova
Xarxes de comunicacions
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-336-173-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organized By -- Contents -- Editors and Contributors -- Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices -- 1 Introduction -- 2 Algebra of Communicating Processes -- 3 Topology Framework -- 4 Actions to be Modelled -- 4.1 Action Cloud IN -- 4.2 Action Migrate IN -- 4.3 Action Init VM -- 4.4 Action Cloud OUT -- 4.5 Action Migration OUT -- 4.6 Action Kill VM -- 5 Verification of the Models -- 6 Conclusions -- References -- A Novel Approach to Preserve DRM for Content Distribution over P2P Networks -- 1 Introduction -- 1.1 Literature Review -- 2 Challenges and Contributions -- 3 Proposed System -- 3.1 System Approach -- 3.2 Physical Architecture/Layout -- 3.3 The P2P Network -- 3.4 The Secured DRM -- 4 Discussion -- 5 Conclusion -- References -- Secure Multimodal Biometric Recognition in Principal Component Subspace -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Similarity Measure Based on Principal Components -- 3.2 Protection Scheme for Multimodal Templates -- 4 Experiments and Results -- 4.1 Face -- 4.2 Fingerprint -- 4.3 Finger Vein -- 4.4 Fusing Face, Fingerprint and Finger Vein Features -- 5 Security Analysis -- 6 Conclusion -- References -- EEG-Based Emotion Recognition and Its Interface with Augmented Reality -- 1 Introduction -- 2 Basic Principles -- 2.1 Electroencephalography (EEG) -- 2.2 EEG Data Analysis -- 2.3 10-20 EEG Positioning System -- 2.4 Augmented Reality -- 2.5 Socket Programming and Application Development -- 2.6 Valence-Arousal Model -- 3 Hardware Used -- 4 Detailed Circuit Design -- 5 Implementation -- 6 Results -- 7 Conclusions and Future Scope -- References -- Profile Verification Using Blockchain -- 1 Introduction -- 1.1 Blockchain -- 1.2 Ethereum -- 1.3 Existing Systems -- 1.4 Decentralization of Certification -- 2 Related Work -- 3 System Architecture.
3.1 Data and Process Flow -- 3.2 Smart Contract -- 3.3 Verification Protocol -- 3.4 Image Hashing -- 4 Implementation -- 4.1 Teachers and Mentors -- 4.2 Web Interface -- 4.3 Events and Transactions -- 5 Results -- 6 Conclusion -- References -- Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach -- 1 Introduction -- 2 Background and Related Work -- 2.1 DDoS Attacks and Its Detection Type -- 2.2 Machine Learning Solutions -- 3 Experimental Database and Setup -- 4 Classification Algorithms and Performance Measurements -- 4.1 Classification Algorithms -- 4.2 Performance Measurements -- 5 Results and Discussion -- 6 Conclusion -- References -- Intrusion Detection Using Deep Neural Network with AntiRectifier Layer -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution -- 2 Related Work -- 3 Deep Neural Network -- 3.1 Rectified Linear Unit -- 3.2 AntiRectifier Layer -- 3.3 Dropout and Noise Layers -- 3.4 Gaussian Dropout and Gaussian Noise -- 4 Experimental Methodology -- 4.1 Datasets for Experimentation -- 5 Results Analysis and Observations -- 6 Conclusion -- References -- CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers -- 1 Introduction -- 2 Related Work -- 2.1 Procure Knowledge -- 2.2 Family of Simulators -- 2.3 Art: Architecture -- 2.4 Techniques: Tools -- 2.5 Techniques: Language -- 2.6 Setup -- 2.7 Integrated Development Environment (IDE) -- 3 Proposed Work and Methodology -- 3.1 Framework -- 3.2 Algorithms -- 4 Results and Discussions -- 4.1 Experimental Setup -- 5 Conclusion and Future Direction -- References -- A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems -- 1 Introduction -- 1.1 Survey Methodology -- 1.2 Paper Organization -- 2 Related Work -- 3 Big Data Technologies Used in the Existing BDTCA Systems.
4 Datasets Used in the Existing BDTCA Systems -- 5 Feature Selection Algorithms Used in the Existing BDTCA Systems -- 6 Various Methods Used to Read Packet Trace Files from HDFS -- 7 Observations, Recommendations and Directions -- 7.1 Migration from Batch Processing to Stream Processing -- 7.2 Lack of Modern Datasets for Evaluation -- 7.3 Feature Selection -- 7.4 Overhead of Converting PCAP Files to Text Files -- 8 Conclusion -- References -- An Asynchronous Leader-Based Neighbor Discovery Protocol in Static Wireless Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Reference Protocols -- 4 Asynchronous Leader-Based Neighbor Discovery Protocol -- 4.1 Assumptions -- 4.2 Model -- 5 Simulation Results -- 5.1 Simulation Scenario -- 5.2 Results -- 6 Conclusion -- References -- P2P Bot Detection Based on Host Behavior and Big Data Technology -- 1 Introduction -- 1.1 Botnet -- 1.2 Peer-to-Peer Botnet -- 1.3 Big Data -- 1.4 Role of Big Data Technologies in Detecting P2P Botnets -- 1.5 Role of Machine Learning in Detecting P2P Botnets -- 2 Related Works -- 3 System Architecture -- 3.1 Data Collection -- 3.2 Parsing PCAP Files -- 3.3 Classification -- 4 Implementation -- 4.1 Dataset Used -- 4.2 Parsing PCAP Files -- 4.3 Classification -- 5 Results -- 6 Conclusion -- References -- Localization in Wireless Sensor Networks Using a Mobile Anchor and Subordinate Nodes -- 1 Introduction -- 2 Related Works -- 3 Localization in WSNs Using a Mobile Anchor and Subordinate Nodes (LWMS): A Proposed Algorithm -- 4 Simulations and Results -- 4.1 Percentage of Error at Various Stages of the Algorithm -- 4.2 Localization Error Versus Communication Range -- 4.3 Localization Error Versus Total Number of Nodes -- 5 Conclusion -- References -- Serverless Deployment of a Voice-Bot for Visually Impaired -- 1 Introduction -- 2 Related Work -- 3 Background.
3.1 Economics and Architectural Impact of Serverless Applications -- 3.2 General Bot Architecture -- 4 Blueprints for a Serverless Voice Bot for Visually Impaired -- 4.1 Overview of Technology Stack for Voice Bot -- 4.2 Overall Design Architecture of Feed-O-Back Voice Bot -- 5 Experimental Results -- 6 Conclusion -- References -- Smart Cities and Spectrum Vulnerabilities in Long-Range Unlicensed Communication Bands: A Review -- 1 Introduction -- 2 Related Works -- 3 Spectrum Management Techniques -- 4 Security Vulnerabilities of LPWANS and Proposed Solutions -- 5 Challenges of Proper Spectrum Utilization in Unlicensed Bands -- 6 Competing Incompatible Long-Range Technologies in Unlicensed Bands -- 7 Comparison and Discussion -- 8 Key Findings of the Review -- 9 Recommendations and Future Direction -- 10 Conclusion -- References -- Stability Certification of Dynamical Systems: Lyapunov Logic Learning Machine -- 1 Introduction -- 1.1 Context -- 1.2 Contribution -- 1.3 Related Works -- 2 Preliminaries -- 2.1 Lyapunov Stability -- 2.2 SOS Lyapunov Functions -- 2.3 Classical ROA Estimation -- 3 Method -- 3.1 Intelligible Analytics -- 3.2 Value Ranking -- 3.3 LLM with Zero Error -- 3.4 ROA Explanation -- 3.5 ROA Candidates for Certification -- 4 Results -- 5 Conclusion and Future Work -- References -- Two-Dimensional Angle of Arrival Estimation Using L-Shaped Array -- 1 Introduction -- 2 System Model -- 3 Proposed Method -- 3.1 Method Without Noise -- 3.2 Method with Noise -- 4 Simulation Results -- 5 Conclusion -- References -- Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter -- 1 Introduction -- 2 Related Works -- 3 Interference Modeling -- 3.1 Channel Estimation -- 4 LTE and Wi-Fi Simulation Modeling -- 4.1 Channel Model -- 4.2 LTE/LTE-A Transceiver -- 4.3 WLAN 802.11ac Transceiver.
4.4 Generation of Clean LTE and Wi-Fi Signal -- 4.5 LTE and Wi-Fi Coexistence Deployment Scenario -- 5 Performance Evaluation and Results -- 6 Conclusion and Future Work -- References -- VHF OSTBC MIMO System Used to Overcome the Effects of Irregular Terrain on Radio Signals -- 1 Introduction -- 2 Methods to Mitigate Propagation Challenges in Irregular Terrain -- 3 Proposed Model -- 4 Simulation Results -- 4.1 The Receive Signal Strength Results of the VHF OSTBC MIMO System Using Two Different VHF Frequencies -- 4.2 The Bit Error Rate Results of the OSTBC MIMO System Using Two Different MIMO Antenna Arrays -- 5 Conclusion and Discussion -- References -- Modelling Video Frames for Object Extraction Using Spatial Correlation -- 1 Introduction -- 2 Global Threshold: Otsu's Method -- 3 2D-Continuous Wavelet Analysis -- 3.1 Analysing Wavelets -- 3.2 Reproducing Kernel -- 4 Detection Theory -- 4.1 Binary Hypothesis Testing -- 5 Object Extraction -- 5.1 Implementation of Algorithm -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Speech-Based Selective Labeling of Objects in an Inventory Setting -- 1 Introduction -- 2 Experimental Methodology -- 2.1 Data Preprocessing -- 2.2 Voice-Based Object Detection -- 2.3 Faster RCNN -- 3 Results and Discussion -- 4 Conclusion -- References -- Classification and Evaluation of Goal-Oriented Requirements Analysis Methods -- 1 Introduction -- 2 Classification of GORA Methods -- 2.1 GORA Methods for the Analysis of FRs and NFRs -- 2.2 GORA Method(s) for the Analysis of NFRs -- 2.3 GORA Method(s) for Social Modeling -- 3 Evaluation of GORA Methods -- 4 Conclusion -- References -- iCREST: International Cross-Reference to Exchange-Based Stock Trend Prediction Using Long Short-Term Memory -- 1 Introduction -- 1.1 Motivation -- 2 Proposed Approach -- 2.1 Time-Series Data Collection -- 2.2 Mapping and Cleaning.
2.3 Currency Conversion.
Record Nr. UNINA-9910488690403321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence and Soft Computing : 20th International Conference, ICAISC 2021, Virtual Event, June 21–23, 2021, Proceedings, Part I / / edited by Leszek Rutkowski, Rafał Scherer, Marcin Korytkowski, Witold Pedrycz, Ryszard Tadeusiewicz, Jacek M. Zurada
Artificial Intelligence and Soft Computing : 20th International Conference, ICAISC 2021, Virtual Event, June 21–23, 2021, Proceedings, Part I / / edited by Leszek Rutkowski, Rafał Scherer, Marcin Korytkowski, Witold Pedrycz, Ryszard Tadeusiewicz, Jacek M. Zurada
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (536 pages)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Software engineering
Algorithms
Data mining
Application software
Numerical analysis
Artificial Intelligence
Software Engineering
Design and Analysis of Algorithms
Data Mining and Knowledge Discovery
Computer and Information Systems Applications
Numerical Analysis
Intel·ligència artificial
Informàtica tova
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-87986-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Neural Networks and Their Applications -- Fuzzy Systems and Their Applications -- Evolutionary Algorithms and Their Applications -- Artificial Intelligence in Modeling and Simulation -- Computer Vision, Image and Speech Analysis -- Data Mining -- Various Problems of Artificial Intelligence -- Bioinformatics, Biometrics and Medical Applications.
Record Nr. UNINA-9910502611503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence and Soft Computing : 20th International Conference, ICAISC 2021, Virtual Event, June 21–23, 2021, Proceedings, Part II / / edited by Leszek Rutkowski, Rafał Scherer, Marcin Korytkowski, Witold Pedrycz, Ryszard Tadeusiewicz, Jacek M. Zurada
Artificial Intelligence and Soft Computing : 20th International Conference, ICAISC 2021, Virtual Event, June 21–23, 2021, Proceedings, Part II / / edited by Leszek Rutkowski, Rafał Scherer, Marcin Korytkowski, Witold Pedrycz, Ryszard Tadeusiewicz, Jacek M. Zurada
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (535 pages)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Software engineering
Compilers (Computer programs)
Image processing—Digital techniques
Computer vision
Computer science
Computer science—Mathematics
Artificial Intelligence
Software Engineering
Compilers and Interpreters
Computer Imaging, Vision, Pattern Recognition and Graphics
Theory of Computation
Mathematics of Computing
Intel·ligència artificial
Informàtica tova
Soggetto genere / forma Llibres electrònics
ISBN 3-030-87897-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Neural Networks and Their Applications -- Fuzzy Systems and Their Applications -- Evolutionary Algorithms and Their Applications -- Artificial Intelligence in Modeling and Simulation -- Computer Vision, Image and Speech Analysis -- Data Mining -- Various Problems of Artificial Intelligence -- Bioinformatics, Biometrics and Medical Applications.
Record Nr. UNINA-9910502670703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence and Sustainable Computing for Smart City : First International Conference, AIS2C2 2021, Greater Noida, India, March 22–23, 2021, Revised Selected Papers / / edited by Arun Solanki, Sanjay Kumar Sharma, Sandhya Tarar, Pradeep Tomar, Sandeep Sharma, Anand Nayyar
Artificial Intelligence and Sustainable Computing for Smart City : First International Conference, AIS2C2 2021, Greater Noida, India, March 22–23, 2021, Revised Selected Papers / / edited by Arun Solanki, Sanjay Kumar Sharma, Sandhya Tarar, Pradeep Tomar, Sandeep Sharma, Anand Nayyar
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (300 pages)
Disciplina 307.760285
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Application software
Data mining
Computers
Database management
Artificial Intelligence
Computer and Information Systems Applications
Data Mining and Knowledge Discovery
Computing Milieux
Database Management
Intel·ligència artificial
Informàtica tova
Soggetto genere / forma Llibres electrònics
ISBN 3-030-82322-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Sentimental and Emotions Analysis for Smart Cities -- Smart Specialization Strategies for Smart Cities -- Security in Smart Cities -- Advances Applications for Future Smart Cities -- Healthcare in Smart Cities -- Machine Learning Applications in Smart Cities.
Record Nr. UNINA-9910495235203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cognitive informatics and soft computing : proceeding of CISC 2020 / / editors, Pradeep Kumar Mallick [and three others]
Cognitive informatics and soft computing : proceeding of CISC 2020 / / editors, Pradeep Kumar Mallick [and three others]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (960 pages)
Disciplina 006.3
Collana Advances in intelligent systems and computing
Soggetto topico Soft computing
Informàtica tova
Intel·ligència artificial
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-16-1056-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Editorial Board Members -- Preface -- Contents -- About the Editors -- A Hybrid Face Recognition Scheme in a Heterogenous and Cluttered Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Dataset Descriptions -- 5 Result Analysis -- 6 Conclusion and Future Works -- References -- Smart Critical Patient Care System with Doctor and Bystander Support with Wireless Sensor Network Using IoT and Intelligent Recommender Algorithm -- 1 Introduction -- 1.1 Related Work -- 2 Problem Identification -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- IoT-Enabled Toxic Gas Detection and Alarming System Using Wireless Sensor Network with TAGDS Smart Algorithm -- 1 Introduction -- 1.1 Related Work -- 2 Problem Identification -- 3 Proposed Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- A Deep Neural Network Model for Effective Diagnosis of Melanoma Disorder -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Sentiment Analysis and Evaluation of Movie Reviews Using Classifiers -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Result Analysis -- 5 Conclusion -- References -- Risk Factors Analysis for Real Estate Price Prediction Using Regression Approach -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Result and Analysis -- 4.1 Implementation of Multiple Regression -- 4.2 Implementation of Stepwise Regression -- 4.3 Implementation of Support Vector Regression -- 5 Parameter for Performance Analysis -- 6 Conclusion -- References -- A Support Vector Machine Approach for Effective Bicycle Sharing in Urban Zones -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Pre-processing -- 4 Proposed Prediction Model.
5 Conclusion and Future Work -- References -- Biosensor for Stress Detection Using Machine Learning -- 1 Introduction -- 1.1 Brief About Biosensors -- 1.2 Objectives of the Study -- 1.3 Applications of Biosensors and Types of Biosensors -- 1.4 Advantages and Disadvantages of Biosensors -- 2 Stress Detection Using Biosensors and Other Applications: Literature Review -- 2.1 Stress Detection: Aspects and Its Use -- 2.2 Related Work and Case Studies About Stress Detection Using Biosensors -- 3 Machine Learning Model Used in Biosensor Design -- 3.1 Data Pre-processing -- 3.2 Feature Extraction and Dimension Reduction -- 3.3 Feature Subset Selection -- 4 Various Challenges of Using ML in Biosensor Design -- 5 Conclusion and Future Work -- References -- An Accurate Automatic Traffic Signal Detector Using CNN Model -- 1 Introduction -- 2 Literature Survey -- 3 Dataset Description -- 4 Proposed Work/model with Description -- 4.1 Preparing the Training Dataset -- 4.2 Proposed Machine Learning Model -- 5 Result and Analysis -- 6 Conclusion -- References -- Classification of Arrhythmia Through Heart Rate Variability Using Logistic Regression -- 1 Introduction -- 2 Materials and Methods -- 2.1 ECG Database -- 2.2 Plotting -- 2.3 Preprocessing -- 2.4 Thresholding -- 2.5 Peak Points Detection in Ecg Signal -- 2.6 Feature Extraction -- 2.7 HRV Analysis -- 3 Classification -- 4 Conclusion -- References -- U-INS: An Android-Based Navigation System -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 4 Result and Discussion -- 5 Conclusion and Future Work -- References -- LSTM-Based Cardiovascular Disease Detection Using ECG Signal -- 1 Introduction -- 2 Research Gap, Motivation and Objectives -- 2.1 Research Gap -- 2.2 Motivation -- 2.3 Objective -- 2.4 Organization -- 3 Source and Details of the Data -- 4 Development of the Proposed LSTM Detection Method.
5 Simulation-Based Experimental Results and Discussion -- 6 Conclusion -- References -- Network Intrusion Detection Using Genetic Algorithm and Predictive Rule Mining -- 1 Introduction -- 2 Related Work -- 3 Intrusion Detection System -- 3.1 Drawbacks of the Existing System -- 4 Proposed Work: IDS Using Genetic Algorithm and Predictive Rule Mining -- 4.1 NSL-KDD Dataset -- 4.2 Feature Selection and Predictive Rule Mining -- 4.3 Data Representation -- 4.4 Evaluation Function -- 4.5 Genetic Operators -- 5 Implementation and Testing -- 6 Results and Discussion -- 6.1 Comparative Analysis -- 7 Conclusion and Future Work -- References -- A Comparison of Different Methodologies for Predicting Forest Fires -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Comparison of Results -- 5 Conclusion and Future Scope -- References -- Isolated Converters as LED Drivers -- 1 Introduction -- 2 Literature Survey -- 3 Specifications of LED Down Light -- 4 Mathematical Modeling of Flyback Converter -- 4.1 Calculation of Inductance and Capacitance -- 5 Closed Loop Operation -- 6 Mathematical Modeling of Forward Converter -- 6.1 Calculation of Inductance and Capacitance -- 7 Closed Loop Operation of Forward Converter -- 8 Results and Conclusion -- 9 Recommendation for Further Research -- References -- Fractional Order Elliptic Filter Implemented Using Optimization Technique -- 1 Introduction -- 1.1 Literature Review -- 1.2 The Objective of the Proposed Work -- 2 Optimization of Proposed Filter -- 3 Sensitivity and Stability Analysis -- 4 Simulink Simulations -- 5 Comparative Analysis -- 6 Analog Realization of Proposed Filter -- 7 Conclusion -- References -- Energy-Efficient MPLS-MANET Using Ant Colony Optimization and Harmony Search Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Multi-Protocol Local Switching -- 4 ACO-HSA Methodology.
4.1 Deployment of Routers -- 4.2 Optimal Paths Selection Using Ant Colony Optimization -- 4.3 Path Optimization Using Harmony Search Algorithm -- 4.4 Derivation of Fitness Function -- 5 Results and Discussion -- 5.1 Performance Analysis -- 5.2 Comparative Analysis -- 6 Conclusion -- References -- Performance Evaluation of Novel Feature Selection Method for Classification of Diabetic Drugs Based on Twitter Data Using SVM Algorithm -- 1 Introduction -- 2 Related Works -- 3 Feature Selection: An Overview -- 3.1 Genetic Algorithm (GA) -- 3.2 Particle Swarm Optimization (PSO) -- 3.3 Glowworm Swarm Optimization (GSO) Algorithm -- 4 Classification: SVM -- 5 Results and Discussions -- 5.1 Dataset -- 5.2 Experiments and Results -- 5.3 Evaluation Accuracy -- 5.4 Time Analysis -- 5.5 Summary of Related Articles with Social Media, Feature Selection and Classification Algorithm -- 6 Conclusion -- References -- Enhancing Periodic Storage Performance in IoT-Based Waste Management -- 1 Introduction -- 2 Related Works -- 3 Methodology and Materials -- 3.1 Block Diagram -- 3.2 Hardware Components -- 3.3 Software Tools -- 3.4 Interface -- 3.5 K-Means -- 3.6 Optimizing Periodic Clean-Ups and Dustbin Placement -- 4 Results and Analysis -- 4.1 Standard Deviation -- 4.2 Range -- 4.3 Levels of Result -- 5 Conclusion -- References -- Oil Spill Detection and Confrontation Using Instance Segmentation and Swarm Intelligence -- 1 Introduction -- 1.1 Preface -- 1.2 Problem Definition -- 2 Literature Survey -- 3 Methodology -- 3.1 Design -- 3.2 Implementation -- 3.3 Specifications -- 3.4 Working -- 4 Results -- 5 Conclusion -- References -- Impact of a Parameter Selection Using eARIMA and Ensemble by SKMC in Time Series Data Analysis -- 1 Introduction -- 2 Literature Review -- 3 Time Series Analysis -- 4 Methodology -- 4.1 eARIMA Weightage Index.
4.2 Segment K-Means Cluster Algorithm -- 5 Result and Discussion -- 6 Conclusion -- References -- Secure Transfer of Images Using Pixel-Level and Bit-Level Permutation Based on Knight Tour Path Scan Pattern and Henon Map -- 1 Introduction -- 2 Related Work -- 2.1 Knight Tour Path -- 2.2 Mutation Rule -- 2.3 Henon Map -- 2.4 Tent Map -- 2.5 Knight Travel Path Based Pixel Permutation -- 3 Proposed Method -- 4 Performance Analysis of Proposed Scheme -- 5 Discussion -- 6 Conclusion -- References -- Performance Analysis of Irregular Shaped MEMS Switch with Gold and Aluminum as Composite Cantilever Beam Material -- 1 Introduction -- 2 Switch Design and Description -- 3 Simulation Results -- 3.1 Effect of Varying Irregular Shaped Cantilever Thickness on the Pull-in Voltage -- 3.2 Effect of Varying Cantilever Length Between the Upper Cantilever and Bottom Electrode on the Pull-in Voltage -- 3.3 Effect of Varying Airgap on the Pull-in Voltage -- 3.4 Effect of Perforations on Pull-in Voltage -- 4 Conclusion -- References -- Gesture-Controlled System Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 System Model -- 3.1 Methodology -- 3.2 Flowchart -- 3.3 Proposed Work -- 4 Applications -- 5 Results and Discussion -- 6 Conclusion -- References -- A Survey on Security and Safety in Vehicular Ad hoc Networks (VANETs) Cloud -- 1 Introduction -- 2 VANET Cloud Architecture -- 3 Application of VANET Cloud -- 4 Issues in VANET Cloud -- 4.1 Architecture Creation of VANET Cloud -- 4.2 Issues in Privacy and Security of VANET Cloud -- 4.3 Issues in Policy and Operational Management -- 5 Security Challenges in VANET Cloud -- 6 Safety Challenges in VANET Cloud -- 7 Discussion -- 8 Conclusion -- References -- Overview and Analysis of RPL Protocol Objective Functions -- 1 Introduction -- 2 Related Works -- 3 An Overview of RPL.
3.1 Control Messages.
Record Nr. UNINA-9910488701903321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cognitive semantics of artificial intelligence : a new perspective / / Alexander Raikov
Cognitive semantics of artificial intelligence : a new perspective / / Alexander Raikov
Autore Raikov Alexander
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (130 pages)
Disciplina 006.3
Collana SpringerBriefs in applied sciences and technology. Computational intelligence
Soggetto topico Soft computing
Artificial intelligence
Informàtica tova
Intel·ligència artificial
Soggetto genere / forma Llibres electrònics
ISBN 981-336-750-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484357703321
Raikov Alexander  
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Complex, Intelligent and Software Intensive Systems : Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Tomoya Enokido
Complex, Intelligent and Software Intensive Systems : Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021) / / edited by Leonard Barolli, Kangbin Yim, Tomoya Enokido
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (788 pages)
Disciplina 620.00151
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Engineering - Data processing
Dynamics
Nonlinear theories
Computational Intelligence
Data Engineering
Applied Dynamical Systems
Intel·ligència artificial
Informàtica tova
Sistemes complexos
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-79725-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Welcome Message of CISIS-2021 International Conference Organizers -- Organization -- CISIS-2021 Organizing Committee -- Honorary Co-chairs -- General Co-chairs -- Program Committee Co-chairs -- International Advisory Board -- Award Co-chairs -- International Liaison Co-chairs -- Publicity Co-chairs -- Finance Chair -- Local Arrangement Co-chairs -- Web Administrator Chairs -- Steering Committee Chair -- Track Areas and PC Members -- 1. Database and Data Mining Applications -- Sec101 -- Sec102 -- 2. Artificial Intelligence and Bio-inspired Computing -- Sec104 -- Sec105 -- 3. Multimedia Systems and Virtual Reality -- Sec106 -- Sec161 -- 4. Next Generation Wireless Networks -- Sec107 -- Sec108 -- 5. Semantic Web and Web Services -- Sec109 -- Sec110 -- 6. Security and Trusted Computing -- Sec112 -- Sec113 -- 7. HPC and Cloud Computing Services and Orchestration Tools -- Sec116 -- Sec1177 -- 8. Parallel, Distributed and Multicore Computing -- Sec119 -- Sec1200 -- Sec1700 -- Sec121 -- Sec122 -- 10. Complex Systems, Software Modeling and Analytics -- Sec125 -- Sec126 -- 11. Multi-agent Systems, SLA Cloud and Social Computing -- Sec131 -- Sec138 -- 12. Internet of Everything and Machine Learning -- Sec141 -- Sec142 -- CISIS-2021 Reviewers -- CISIS-2021 Keynote Talks -- Asking AI Why: Explainable Artificial Intelligence -- Coevolution of Semantic and Blockchain Technologies -- Contents -- Four Grade Levels-Based Models with Random Forest for Student Performance Prediction at a Multidisciplinary University -- 1 Introduction -- 2 Related Work -- 3 Data Description -- 4 Proposed Approach -- 5 Experimental Results -- 6 Conclusion -- References -- The Role of Collective Engagement to Strengthen Organizational Identity -- Abstract -- 1 Introduction -- 2 Literature Review and Hypothesis Development -- 2.1 Collaboration and Competition.
2.2 Managerial Motivation and Collective Engagement -- 2.3 Engagement and Community Identity -- 2.4 Collapetition Management Practices -- 3 Method -- 4 Result and Discussion -- 5 Conclusion, Implication and Future Research -- References -- A Novel Structural and Semantic Similarity in Social Recommender Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dependency Graph of Users -- 3.2 Homophily Concept -- 3.3 User Modeling -- 3.4 Structural Information Extraction -- 4 Experiment and Results -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Trustworthy Explainability Acceptance: A New Metric to Measure the Trustworthiness of Interpretable AI Medical Diagnostic Systems -- 1 Introduction -- 2 Background and Related Work -- 2.1 Need for AI Explainability Metrics -- 2.2 Trust Mechanism -- 3 AI Trustworthy Explainability Acceptance Metric -- 4 Evaluating AI System for DCIS Recurrence Prediction -- 4.1 Background -- 4.2 Data -- 4.3 Experiments and Results -- 5 Conclusions -- References -- Entity Relation Extraction Based on Multi-attention Mechanism and BiGRU Network -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Model Structure -- 3.1 Embedding Layer -- 3.2 BiGRU Neural Network -- 3.3 Multi-attention Strategy -- 4 Experiment and Analysis -- 4.1 Dataset -- 4.2 Settings -- 4.3 Baseline -- 4.4 Results -- 5 Conclusion -- Acknowledgments -- References -- Time Series Prediction of Wind Speed Based on SARIMA and LSTM -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Establishment of Combined Prediction Model Based on SARIMA-LSTM -- 3.1 Seasonal Auto Regressive Integrated Moving Average -- 3.2 Long Short-Term Memory -- 3.2.1 Recurrent Neural Network -- 3.2.2 LSTM -- 3.3 Modeling Process -- 4 Experiment and Analysis -- 4.1 Data Source and Preprocessing.
4.2 SARIMA Model Construction and Testing -- 4.3 SARIMA-LSTM Model Wind Speed Prediction -- 4.4 Error Analysis -- 5 Conclusion -- Acknowledgments -- References -- Dimensionality Reduction on Metagenomic Data with Recursive Feature Elimination -- 1 Introduction -- 2 Related Research -- 3 Methodology -- 3.1 Implementing Process for Study -- 3.2 Using Recursive Feature Elimination for Feature Selection -- 3.3 Using Random Forest Algorithm -- 3.4 Using Feature Selection Randomly for Comparison -- 3.5 Using K-Fold Cross-Validation for Separating Training and Testing Data -- 3.6 Using Scoring Metrics to Evaluate Predicting Results -- 4 Experiments -- 4.1 Dataset -- 4.2 Using RFE with Random Forest Algorithm to Select Features and Train Model -- 4.3 Predicting Results and Comparison with Randomly Selected Features -- 5 Conclusion -- References -- The Application of Improved Grasshopper Optimization Algorithm to Flight Delay Prediction-Based on Spark -- Abstract -- 1 Introduction -- 2 Grasshopper Optimization Algorithm -- 2.1 The Adaptive Descent of S-shaped Curve -- 2.2 Sigmoid Curve Descent Based on Logistic Mapping -- 3 SPGOA-RF Algorithm -- 3.1 Distributed Grasshopper Optimization Algorithm -- 3.2 Optimization of Random Forest Parameter Based on SPGOA -- 4 Simulation Experiment and Analysis -- 4.1 Analysis of the Effectiveness of Improved GOA -- 4.2 Sample Data Set Construction -- 4.3 Flight Delay Detection Analysis -- 4.4 Analysis of Distributed Algorithm Effect -- 5 Conclusion -- Acknowledgments -- References -- Application of Distributed Seagull Optimization Improved Algorithm in Sentiment Tendency Prediction -- Abstract -- 1 Introduction -- 2 Relevant Knowledge -- 3 Improving SOA -- 3.1 Population Uniform Distribution Strategy -- 3.2 Cauchy Mutation -- 3.3 CC-SOA Based on Spark -- 4 Analysis of Experimental Results -- 4.1 Experimental Environment.
4.2 Experimental Analysis -- 5 Conclusion -- Acknowledgments -- References -- Performance Evaluation of WMNs by WMN-PSOSA-DGA Hybrid Simulation System Considering Stadium Distribution of Mesh Clients and Different Number of Mesh Routers -- 1 Introduction -- 2 Proposed and Implemented Simulation System -- 2.1 Velocities and Positions of Particles -- 2.2 Routers Replacement Methods -- 2.3 DGA Operations -- 2.4 Fitness and Migration Functions -- 2.5 Particle-Pattern and Gene Coding -- 3 Simulation Results -- 4 Conclusions -- References -- A New Scheme for Slice Overloading Cost in 5G Wireless Networks Considering Fuzzy Logic -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Outline of Fuzzy Logic -- 3.1 Linguistic Variables -- 3.2 Fuzzy Control Rules -- 3.3 Defuzzificaion Method -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- COVID-Prevention-Based Parking with Risk Factor Computation -- 1 Introduction -- 2 Related Work -- 3 Anti-COVID-Standards-Based Parking -- 3.1 First Phase: Information Loading -- 3.2 Second Phase: Parking Classification -- 3.3 Third Phase: Risk Factor Computation -- 4 Example -- 5 Conclusions -- References -- Coarse Traffic Classification for High-Bandwidth Connections in a Computer Network Using Deep Learning Techniques -- Abstract -- 1 Introduction -- 2 The Proposed Approach -- 2.1 Research Stand -- 2.2 Acquiring Data -- 2.3 Adjusting the Data -- 2.4 Adjusting the Data -- 2.5 Predictive Model -- 2.6 Interpretation of the Results Obtained -- 3 Examples of Application -- 4 Conclusion -- Acknowledgments -- References -- A Privacy Preserving Hybrid Blockchain Based Announcement Scheme for Vehicular Energy Network -- 1 Introduction -- 2 Related Work -- 2.1 Authentication -- 2.2 Trust Management -- 2.3 Privacy -- 2.4 Efficiency -- 3 Problem Statement.
4 System Model -- 4.1 Entities -- 4.2 Conclusion -- References -- Prediction of Wide Area Road State Using Measurement Sensor Data and Meteorological Mesh Data -- Abstract -- 1 Introduction -- 2 Related Works -- 3 Road State Sensor System -- 4 Temporal and Geological Prediction of Road Conditions -- 4.1 Temporal Prediction Method of Road State -- 4.2 Geological Prediction Method of Road State -- 5 Conclusions and Future Works -- Acknowledgments -- References -- A Coverage Construction and Hill Climbing Approach for Mesh Router Placement Optimization: Simulation Results for Different Number of Mesh Routers and Instances Considering Normal Distribution of Mesh Clients -- 1 Introduction -- 2 Mesh Router Placement Problem -- 3 Proposed System -- 3.1 CCM for Mesh Router Placement Optimization -- 3.2 CCM-based HC for Mesh Router Placement Optimization -- 4 Simulation Results -- 5 Conclusion -- References -- Related Entity Expansion and Ranking Using Knowledge Graph -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Search Log-Based Model -- 5 Search Log and Knowledge Graph-Based Model -- 6 Evaluation -- 7 Conclusion -- References -- Zero Trust Security in the Mist Architecture -- Abstract -- 1 Introduction -- 2 Related Works -- 2.1 Mist Architecture -- 2.2 Zero Trust Network -- 3 Mist Architecture for ZTN -- 3.1 System Overview -- 3.2 IAM -- 3.3 IAP and IAP Connector -- 3.4 SIEM -- 3.5 MDM -- 3.6 Others -- 4 Evaluations -- 5 Conclusions -- Acknowledgments -- References -- Blockchain Based Authentication for End-Nodes and Efficient Cluster Head Selection in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Registration and Authentication of Nodes -- 2.2 Storage Issues in Network Nodes -- 2.3 Data Privacy of Nodes -- 2.4 Excessive Energy Consumption -- 2.5 Malicious Nodes Detection and Removal from Networks.
2.6 Single Point of Failure Issue Due to Centralized Authority.
Record Nr. UNINA-9910488715903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Fuzzy logic hybrid extensions of neural and optimization algorithms : theory and applications / / editors, Oscar Castillo, Patricia Melin
Fuzzy logic hybrid extensions of neural and optimization algorithms : theory and applications / / editors, Oscar Castillo, Patricia Melin
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (ix, 383 pages) : illustrations
Disciplina 511.3
Collana Studies in computational intelligence
Soggetto topico Fuzzy logic
Neural networks (Computer science)
Soft computing
Lògica difusa
Xarxes neuronals (Informàtica)
Optimització matemàtica
Informàtica tova
Algorismes
Soggetto genere / forma Llibres electrònics
ISBN 3-030-68776-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Estimation of the Number of Filters in the Convolution Layers of a Convolutional Neural Network Using a Fuzzy Logic System -- 1 Introduction -- 2 Literature Review -- 2.1 Convolutional Neural Networks -- 2.2 GSA -- 2.3 FGSA -- 3 Proposed Method -- 4 Results and Discussion -- 5 Conclusions -- References -- Optimization of Membership Function Parameters for Fuzzy Controllers in Cruise Control Problem Using the Multi-verse Optimizer -- 1 Introduction -- 2 Fuzzy Systems -- 2.1 Mamdani Model -- 2.2 Sugeno Model -- 3 Control Systems -- 4 Metaheuristics and Multi-verse Optimizer -- 4.1 Multi-verse Optimizer -- 4.2 Applications of MVO -- 5 Test and Results -- 5.1 Benchmark Function Test and Results -- 5.2 Applications Test and Results -- 6 Conclusions -- References -- Performance Analysis of a Distributed Steady-State Genetic Algorithm Using Low-Power Computers -- 1 Introduction -- 2 Distributed Steady-State Genetic Algorithm -- 2.1 Application of Distributed Steady-State Genetic Algorithm in the n-Queens Problem -- 2.2 Application of Distributed Steady-State Genetic Algorithm in the Travelling Salesman Problem -- 3 Master-Slave Low Power Architecture -- 3.1 Rationale on Master-Slave Architecture Starting Procedure -- 3.2 Function Evaluation Task on Slave-Devices -- 3.3 Fail-Safe Algorithm on Master-Device -- 4 Computational Results -- 4.1 Experimental Setup -- 4.2 n-Queens Problem Experimental Arrangement Results -- 4.3 Travelling Salesman Problem Results -- 5 Conclusions and Future Work -- References -- Ensemble Recurrent Neural Networks for Complex Time Series Prediction with Integration Methods -- 1 Introduction -- 2 Problem Statement and Proposed Method -- 2.1 Analyze the Time Series -- 2.2 Creation of the Recurrent Neural Network -- 2.3 Integration by Average -- 2.4 Integration by Weighted Average.
2.5 Integration by Gating Network -- 2.6 Type-1 and Type-2 Fuzzy System Integration -- 2.7 Generalized Type-2 Fuzzy System -- 3 Simulation Results -- 4 Conclusions -- References -- Genetic Optimization of Ensemble Neural Network Architectures for Prediction of COVID-19 Confirmed and Death Cases -- 1 Introduction -- 2 Basic Concepts -- 2.1 Artificial Neural Networks -- 2.2 Nonlinear Autoregressive Neural Network -- 2.3 Fuzzy Logic -- 2.4 Genetic Algorithms -- 3 Proposed Method -- 4 Results of the Experiment -- 4.1 Genetic Algorithms -- 5 Conclusions -- References -- Optimization of Modular Neural Networks for the Diagnosis of Cardiovascular Risk -- 1 Introduction -- 2 Literature Review -- 2.1 Flower Pollination Algorithm -- 2.2 Bird Swarm Algorithm -- 2.3 Blood Pressure and Hypertension -- 2.4 Cardiovascular Disease and Heart Age -- 2.5 Framingham Heart Study -- 3 Proposed Method -- 4 Results -- 5 Conclusions and Future Work -- References -- A Review on the Cuckoo Search Algorithm -- 1 Introduction -- 2 An Analogy with Nature -- 2.1 Cuckoo Search Algorithm -- 2.2 Algorithm Rules -- 2.3 Levy Flights -- 2.4 Mathematical Formulas -- 2.5 Flowchart CS -- 3 Implementation of Levy Flights in Other Algorithms -- 4 Variants of the Cuckoo Search Algorithm -- 5 Applications -- 6 Conclusions -- References -- An Improved Convolutional Neural Network Based on a Parameter Modification of the Convolution Layer -- 1 Introduction -- 2 Background and Basic Concepts -- 2.1 Convolutional Neural Network Concepts -- 2.2 Edge Detectors -- 2.3 Sobel Operator -- 2.4 Prewitt Operator -- 2.5 Laplacian Operator -- 3 Proposed Approach -- 3.1 Proposed Architecture -- 3.2 Convolution Kernel Initialization -- 4 Experiments -- 4.1 Case Study MNIST Handwritten Digits -- 4.2 Case Study MNIST American Sign Language -- 4.3 Case Study Mexican Sign Language Database -- 5 Conclusions.
References -- Parameter Optimization of a Convolutional Neural Network Using Particle Swarm Optimization -- 1 Introduction -- 2 Convolutional Neural Network -- 2.1 Input Layer -- 2.2 Convolution Layer -- 2.3 Non-linearity Layer -- 2.4 Pooling Layer -- 2.5 Classifier Layer -- 3 Particle Swarm Optimization -- 3.1 Global Best PSO -- 3.2 Local Best PSO -- 4 Proposed Method -- 4.1 Parameter Optimization of the CNN -- 4.2 CNN-PSO Optimization Process -- 5 Experiments and Results -- 5.1 Exploratory Experiment -- 5.2 American Sign Language Alphabet (ASL Alphabet) Experiment -- 5.3 American Sign Language MNIST Experiment -- 5.4 Analysis and Comparison of Results -- 6 Conclusion and Future Work -- References -- One-Dimensional Bin Packing Problem: An Experimental Study of Instances Difficulty and Algorithms Performance -- 1 Introduction -- 2 The Bin Packing Problem -- 2.1 Instances -- 2.2 Index Description -- 2.3 Performance Measures -- 3 Algorithms -- 3.1 First Fit Decreasing (FFD) -- 3.2 Best Fit Decreasing (BFD) -- 3.3 Minimum Bin Slack (MBS) -- 3.4 GGA-CGT -- 4 Results -- 5 Experimental Analysis -- 5.1 Class BPP.25 -- 5.2 Class BPP.5 -- 5.3 Class BPP.75 -- 5.4 Class BPP1 -- 6 Conclusions and Future Work -- References -- Looking for Emotions in Evolutionary Art -- 1 Introduction -- 2 In Search of Lost Emotions -- 2.1 Humans in the EA Loop -- 3 Methodology: Analysis of Emotions in the Era of Evolutionary Art -- 3.1 The Line -- 3.2 Simplifying the Problem -- 3.3 Evospace-Interactive Module -- 4 Results -- 4.1 Analyzing Formal Elements -- 4.2 Are Emotions Properly Understood? -- 4.3 Audience Analysis -- 4.4 International Art Competitions -- 5 Conclusion -- References -- Review of Hybrid Combinations of Metaheuristics for Problem Solving Optimization -- 1 Introduction -- 2 Review of Hybrid or Combined Metaheuristics -- 3 Discussion -- 4 Conclusions.
References -- GPU Accelerated Membrane Evolutionary Artificial Potential Field for Mobile Robot Path Planning -- 1 Introduction -- 2 Fundamentals -- 2.1 Membrane Computing -- 2.2 Evolutionary Computation -- 2.3 Artificial Potential Field Method -- 3 GPU Accelerated MemEAPF -- 4 Results -- 4.1 Path Planning Results -- 4.2 Performance Results -- 5 Conclusions -- References -- Optimization of the Internet Shopping Problem with Shipping Costs -- 1 Introduction -- 1.1 Definition of the Problem -- 2 The General Structure of the Memetic Algorithm -- 2.1 Selection by Tournament -- 2.2 Crossover Operator -- 2.3 Mutation Operator -- 2.4 Local Search -- 2.5 Memetic Algorithm (MAIShOP) -- 3 Computational Experiments -- 4 Conclusions -- References -- Multiobjective Algorithms Performance When Solving CEC09 Test Instances -- 1 Introduction -- 2 Multiobjective Optimization -- 3 CEC09 Test Functions -- 4 Multiobjective Optimization Algorithms -- 5 Performance Metrics of Multiobjective Optimization -- 6 Computational Experiments -- 7 Conclusion and Future Work -- References -- Analysis of the Efficient Frontier of the Portfolio Selection Problem Instance of the Mexican Capital Market -- 1 Introduction -- 2 Multiobjective Algorithms in Comparison -- 3 CellDE -- 4 GDE3 -- 5 IBEA -- 6 MOCell -- 7 NSGA-II -- 8 NSGA-III -- 9 OMOPSO -- 10 PAES -- 11 SPEA2 -- 12 Computational Experiments -- 13 Conclusions -- References -- Multi-objective Portfolio Optimization Problem with Trapezoidal Fuzzy Parameters -- 1 Introduction -- 2 Elements of Fuzzy Theory -- 2.1 Fuzzy Sets -- 2.2 Generalized Fuzzy Numbers -- 2.3 Addition Operator -- 2.4 Graded Mean Integration (GMI) -- 2.5 Order Relation in the Set of the Trapezoidal Fuzzy Numbers -- 2.6 Pareto Dominance -- 3 Multi-objective Portfolio Optimization Problem with Trapezoidal Fuzzy Parameters -- 4 Proposal Algorithm T-NSGA-II.
4.1 Representation of the Solutions -- 4.2 Evaluating the Solutions -- 4.3 One-Point Crossover Operator -- 4.4 Uniform Mutation Operator -- 4.5 Initial Population -- 4.6 Population Sorting -- 4.7 No-Dominated Sorting -- 4.8 Calculating the Crowding Distance (Deb et al. 2000) -- 4.9 Calculating the Spatial Spread Deviation (SSD) (Santiago et al. 2019) -- 4.10 Pseudocode of the T-NSGA-II Algorithm -- 5 Proposed Strategy to Assess the Performance of Multi-objective Algorithms in the Fuzzy Trapezoidal Numbers Domain -- 6 Computational Experiments -- 7 Conclusions -- References -- A Study on the Use of Hyper-heuristics Based on Meta-Heuristics for Dynamic Optimization -- 1 Introduction -- 2 Background and Definitions -- 2.1 Dynamic Multi-objective Optimization Problem -- 2.2 Dynamic Multi-objective Evolutionary Algorithm -- 2.3 Hyper-heuristic -- 2.4 Indicators to Evaluate DMOEAs Performance Over DMOPs -- 3 Relevant Properties to Consider from DMOPs -- 3.1 Objective Function -- 3.2 Decision Variables -- 3.3 Constraints -- 4 Known Hyper-heuristic Approaches Towards Solving DOPs -- 5 Proposed Checklist and Design Guide for Dynamic Hyper-heuristics -- 6 Case Studies Using the Proposed Guide and Checklist -- 6.1 Case Study 1 -- 6.2 Case Study 2 -- 7 Conclusions and Future Work -- References -- On the Adequacy of a Takagi-Sugeno-Kang Protocol as an Empirical Identification Tool for Sigmoidal Allometries in Geometrical Space -- 1 Introduction -- 2 Methods -- 2.1 Model of Complex Allometry -- 2.2 TSK Fuzzy Model -- 2.3 Data -- 2.4 Reproducibility Assessment -- 2.5 TSK Identification Procedures -- 2.6 Piecewise-Linear Schemes -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- A New Hybrid Method Based on ACO and PSO with Fuzzy Dynamic Parameter Adaptation for Modular Neural Networks Optimization -- 1 Introduction -- 2 Proposed Method.
2.1 Ant System and ACO Algorithm.
Record Nr. UNINA-9910483557103321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Soft computing and optimization : SCOTA 2021, Ranchi, India, March 26-27 / / edited by Syeda Darakhshan Jabeen, Javid Ali, and Oscar Castillo
Soft computing and optimization : SCOTA 2021, Ranchi, India, March 26-27 / / edited by Syeda Darakhshan Jabeen, Javid Ali, and Oscar Castillo
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd, , [2022]
Descrizione fisica 1 online resource (362 pages)
Disciplina 519.3
Collana Springer Proceedings in Mathematics & Statistics
Soggetto topico Mathematical optimization
Soft computing
Informàtica tova
Optimització matemàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-19-6406-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto R. Kumari, A. Nigam and S. Pushkar, Classification of MRI images for detecting Alzheimer Disease using Convolutional Neural Network -- S. D. Godwal and S. S. Kanojia, Optimum over Current Relays Coordination for Radial Distribution Networks Using Soft-Computing Techniques -- Priyavada and B. Kumar, A Review of Modified Particle Swarm Optimization Method -- D. Patel and S. Sharma Automated Detection of Elephant Using AI Techniques -- P. Rajak and P. Roy, Determination of Probability of Failure of Structures Using DBSCAN and Support Vector Machine -- Md. Nayer and S. C. Pandey, The Ensemble of Ant Colony Optimization and Gradient Descent Technique for Efficient Feature Selection and Data Classification -- A. K. Prasad and S. S. Thakur, s-Regularity Via Soft Ideal -- K. A. Pattani and S. Gautam, A Comprehensive Study on Mobile Malwares: Mobile Covert Channels - Threats and Security -- F. Nikbakhtsarvestani, Overview of Incorporating Nonlinear Functions into Recurrent Neural Network Models -- Sangita A. Jaju, Sudhir B. Jagtap, and R. Shinde, A Soft Computing Approach for Predicting and Categorising Learner’s Performance using Fuzzy Model -- T. Kaur Bhatia, A. Kumar, M.K. Sharma, and S.S. Appadoo, A Fuzzy Logic based Approach to Solve Interval Multiobjective Nonlinear Transportation Problem: Suggested Modifications -- O. Castillo and P. Melin, Interval Type-3 Fuzzy Decision Making in Material Surface Quality Control -- F. A. Khan, J. Ali, Fatimah N. Albishi, and F. Gursoy, A Generalized Nonlinear Quasi-Variational-Like Inclusion Problem Involving Fuzzy Mappings -- B. Kohli, Approximate Optimality Conditions via Convexifactors for Multiobjective Programming Problems -- F. Mirdamadi, H. Monfared, Mehdi Asadi, and H. Soleimani, A Remark on Discontinuity of Fixed Point on Partial Metric Spaces -- A. Priya, A. Kumari and M. Singh, Implementation of Fuzzy Logic in Home Appliances -- S. Banerjee, B. Guha, A. Ghosh, and G. Bandyopadhyay, Portfolio Structure of Debt Mutual Funds in Indian Market -- R. Om Gayathri and R. Hemavathy, Fixed Point Theorems for Digital Images using Path Length Metric -- R. P. Verma, N. Kumar, S. Kumar, and Sruthi S., Emergency Help for Road Accidents -- E. Arul, S. Akash Kumar, R. Ragul, and Yuvaanesh V.B., Music Classification Based on Lyrics and Audio by using Machine Learning -- S. Khalil and U. M. Modibbo, Multiobjective Optimization for Hospital Nurse Scheduling Problem -- Z. Ghouli, On the Performance of a Flow Energy Harvester using Time Delay -- A. Badran, Identification of Some Spatial Coefficients in Some Engineering Topics -- U. Bhagirathi and R. Ajoodha, Automatic Venue Allocation for Varying Class Sizes using Scoring and Heuristic Hill-climbing -- N. K. Sharma, S. Kumar, A. Rajpal, and N. Kumar, DWT and Quantization based Digital Watermarking Scheme using Kernel OS-ELM -- P. Muralikrishna, P. Hemavathi, and K. Palanivel, Stress Level Analysis Using Bipolar Picture Fuzzy Set -- Y. Kimura and K. Shindo, Asymptotic Behavior of Resolvents on Complete Geodesic Spaces with General Perturbation Functions.
Record Nr. UNINA-9910682551603321
Singapore : , : Springer Nature Singapore Pte Ltd, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Soft computing and optimization : SCOTA 2021, Ranchi, India, March 26-27 / / edited by Syeda Darakhshan Jabeen, Javid Ali, and Oscar Castillo
Soft computing and optimization : SCOTA 2021, Ranchi, India, March 26-27 / / edited by Syeda Darakhshan Jabeen, Javid Ali, and Oscar Castillo
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd, , [2022]
Descrizione fisica 1 online resource (362 pages)
Disciplina 519.3
Collana Springer Proceedings in Mathematics & Statistics
Soggetto topico Mathematical optimization
Soft computing
Informàtica tova
Optimització matemàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-19-6406-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto R. Kumari, A. Nigam and S. Pushkar, Classification of MRI images for detecting Alzheimer Disease using Convolutional Neural Network -- S. D. Godwal and S. S. Kanojia, Optimum over Current Relays Coordination for Radial Distribution Networks Using Soft-Computing Techniques -- Priyavada and B. Kumar, A Review of Modified Particle Swarm Optimization Method -- D. Patel and S. Sharma Automated Detection of Elephant Using AI Techniques -- P. Rajak and P. Roy, Determination of Probability of Failure of Structures Using DBSCAN and Support Vector Machine -- Md. Nayer and S. C. Pandey, The Ensemble of Ant Colony Optimization and Gradient Descent Technique for Efficient Feature Selection and Data Classification -- A. K. Prasad and S. S. Thakur, s-Regularity Via Soft Ideal -- K. A. Pattani and S. Gautam, A Comprehensive Study on Mobile Malwares: Mobile Covert Channels - Threats and Security -- F. Nikbakhtsarvestani, Overview of Incorporating Nonlinear Functions into Recurrent Neural Network Models -- Sangita A. Jaju, Sudhir B. Jagtap, and R. Shinde, A Soft Computing Approach for Predicting and Categorising Learner’s Performance using Fuzzy Model -- T. Kaur Bhatia, A. Kumar, M.K. Sharma, and S.S. Appadoo, A Fuzzy Logic based Approach to Solve Interval Multiobjective Nonlinear Transportation Problem: Suggested Modifications -- O. Castillo and P. Melin, Interval Type-3 Fuzzy Decision Making in Material Surface Quality Control -- F. A. Khan, J. Ali, Fatimah N. Albishi, and F. Gursoy, A Generalized Nonlinear Quasi-Variational-Like Inclusion Problem Involving Fuzzy Mappings -- B. Kohli, Approximate Optimality Conditions via Convexifactors for Multiobjective Programming Problems -- F. Mirdamadi, H. Monfared, Mehdi Asadi, and H. Soleimani, A Remark on Discontinuity of Fixed Point on Partial Metric Spaces -- A. Priya, A. Kumari and M. Singh, Implementation of Fuzzy Logic in Home Appliances -- S. Banerjee, B. Guha, A. Ghosh, and G. Bandyopadhyay, Portfolio Structure of Debt Mutual Funds in Indian Market -- R. Om Gayathri and R. Hemavathy, Fixed Point Theorems for Digital Images using Path Length Metric -- R. P. Verma, N. Kumar, S. Kumar, and Sruthi S., Emergency Help for Road Accidents -- E. Arul, S. Akash Kumar, R. Ragul, and Yuvaanesh V.B., Music Classification Based on Lyrics and Audio by using Machine Learning -- S. Khalil and U. M. Modibbo, Multiobjective Optimization for Hospital Nurse Scheduling Problem -- Z. Ghouli, On the Performance of a Flow Energy Harvester using Time Delay -- A. Badran, Identification of Some Spatial Coefficients in Some Engineering Topics -- U. Bhagirathi and R. Ajoodha, Automatic Venue Allocation for Varying Class Sizes using Scoring and Heuristic Hill-climbing -- N. K. Sharma, S. Kumar, A. Rajpal, and N. Kumar, DWT and Quantization based Digital Watermarking Scheme using Kernel OS-ELM -- P. Muralikrishna, P. Hemavathi, and K. Palanivel, Stress Level Analysis Using Bipolar Picture Fuzzy Set -- Y. Kimura and K. Shindo, Asymptotic Behavior of Resolvents on Complete Geodesic Spaces with General Perturbation Functions.
Record Nr. UNISA-996518463903316
Singapore : , : Springer Nature Singapore Pte Ltd, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui