ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Applications of Artificial Intelligence and Machine Learning: Select Proceedings of ICAAAIML 2020 (Lecture Notes in Electrical Engineering, 778)

دانلود کتاب کاربردهای هوش مصنوعی و یادگیری ماشین: مجموعه مقالات ICAAAIML 2020 (یادداشت های سخنرانی در مهندسی برق ، 778)

Applications of Artificial Intelligence and Machine Learning: Select Proceedings of ICAAAIML 2020 (Lecture Notes in Electrical Engineering, 778)

مشخصات کتاب

Applications of Artificial Intelligence and Machine Learning: Select Proceedings of ICAAAIML 2020 (Lecture Notes in Electrical Engineering, 778)

ویرایش: [1st ed. 2021] 
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 9811630666, 9789811630668 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 754
[725] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 18 Mb 

قیمت کتاب (تومان) : 58,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Applications of Artificial Intelligence and Machine Learning: Select Proceedings of ICAAAIML 2020 (Lecture Notes in Electrical Engineering, 778) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب کاربردهای هوش مصنوعی و یادگیری ماشین: مجموعه مقالات ICAAAIML 2020 (یادداشت های سخنرانی در مهندسی برق ، 778) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب کاربردهای هوش مصنوعی و یادگیری ماشین: مجموعه مقالات ICAAAIML 2020 (یادداشت های سخنرانی در مهندسی برق ، 778)



این کتاب مجموعه‌ای از مقالات بررسی‌شده از کنفرانس بین‌المللی پیشرفت‌ها و کاربردهای هوش مصنوعی و یادگیری ماشینی - ICAAAIML 2020 را ارائه می‌کند. این کتاب تحقیقات در زمینه هوش مصنوعی، یادگیری ماشین، و کاربردهای یادگیری عمیق در مراقبت‌های بهداشتی، کشاورزی را پوشش می‌دهد. ، تجارت و امنیت این جلد شامل مقالات پژوهشی از دانشگاهیان، محققان و همچنین دانشجویان است. همچنین مقالاتی در مورد مفاهیم اصلی شبکه های کامپیوتری، طراحی و استقرار سیستم هوشمند، سیستم های بلادرنگ، شبکه های حسگر بی سیم، حسگرها و گره های حسگر، مهندسی نرم افزار و پردازش تصویر وجود دارد. این کتاب منبع ارزشمندی برای دانش‌آموزان، دانشگاهیان و شاغلین در صنعت خواهد بود که روی برنامه‌های هوش مصنوعی کار می‌کنند.


توضیحاتی درمورد کتاب به خارجی

The book presents a collection of peer-reviewed articles from the International Conference on Advances and Applications of Artificial Intelligence and Machine Learning - ICAAAIML 2020. The book covers research in artificial intelligence, machine learning, and deep learning applications in healthcare, agriculture, business, and security. This volume contains research papers from academicians, researchers as well as students. There are also papers on core concepts of computer networks, intelligent system design and deployment, real-time systems, wireless sensor networks, sensors and sensor nodes, software engineering, and image processing. This book will be a valuable resource for students, academics, and practitioners in the industry working on AI applications.



فهرست مطالب

ICAAAIML-2020
Preface
Contents
About the Editors
Artificial Intelligence and Its Applications in Smart Education
Building a Language Data Set in Telugu Using Machine Learning Techniques to Address Suicidal Ideation and Behaviors in Adolescents
	1 Introduction
	2 Suicidal Data Set Creation in Telugu
	3 Technique Used for Data Gathering to Create Required Data Set
	4 Data Collection
		4.1 Scrapping
		4.2 Cleaning
		4.3 Annotation
		4.4 Data Set Statistics
	5 Methodology
	6 Experiments and Results
		6.1 Accuracy by ML Classifiers
		6.2 Binary Classification Measures
	7 Conclusion
	8 Future Work
	References
Feature Selection and Performance Comparison of Various Machine Learning Classifiers for Analyzing Students’ Performance Using Rapid Miner
	1 Introduction
	2 Literature Review
	3 Research Methodology
	4 Experiment and Results
	5 Conclusion
	References
Internet of Things (IoT) Based Automated Light Intensity Model Using NodeMcu ESP 8266 Microcontroller
	1 Introduction
		1.1 Problem Statement
		1.2 Objectives
	2 Research Methodology
	3 Literature Survey
	4 Performance Analysis
		4.1 Analysis Outcomes
	5 Conclusion and Future Scope
	References
Handwritten Mathematical Symbols Classification Using WEKA
	1 Introduction
	2 Literature Review and Related Work
	3 Proposed Work
	4 Implementation
	5 Conclusion and Future Scope
	References
Enhancing Sociocultural Learning Using Hyperlocal Experience
	1 Introduction
	2 Literature Survey
	3 Working of the System
		3.1 Overview
		3.2 Hyperlocal Forecasting
		3.3 Architecture
		3.4 Methodology
		3.5 Proposed Solution
		3.6 Algorithm
	4 Conclusion
	5 Future Enhancements
	References
Subsequent Technologies Behind IoT and Its Development Roadmap Toward Integrated Healthcare Prototype Models
	1 Introduction
	2 Technologies Behind IoT
		2.1 IoT Development Boards and IoT Hardware
		2.2 IDE (Integrated Development Environment)
		2.3 Protocols
		2.4 Network Spine
		2.5 Internetwork Cloud Stages/server
		2.6 Software
	3 IoT Gateway Device
	4 IoT Development Roadmap and Healthcare Prototype
	5 Conclusion
	References
Big Data and Data Mining
Bug Assignment-Utilization of Metadata Features Along with Feature Selection and Classifiers
	1 Introduction
	2 Literature Survey
	3 Proposed En-TRAM Triager
	4 Experimental Setup and Results
		4.1 Experiment Setup
		4.2 Results
	5 Conclusion
	References
Role of Artificial Intelligence in Detection of Hateful Speech for Hinglish Data on Social Media
	1 Introduction
		1.1 Previous Work
	2 Corpus Creation and Annotation
		2.1 Annotations
	3 Methodology
		3.1 Bidirectional Encoder Representations from Transformers (BERT)
		3.2 Embeddings from Language Models (ELMo)
		3.3 Flair
	4 System Design
		4.1 Data Pre-Processing
		4.2 Fine-Tuning Approaches
	5 Results and Discussion
	6 Conclusion
		6.1 Future Scope
	References
From Web Scraping to Web Crawling
	1 Introduction
	2 Methodologies Involved in Web Scraping
		2.1 DOM Tree Parsing
		2.2 String Matching
		2.3 Semantic Framework
		2.4 Machine Learning-Based Web Scraping
	3 Web Crawling
		3.1 Scrapy and Spider
	4 Scraping Conference Data
		4.1 Settings.py
		4.2 Spider
		4.3 Items.py
		4.4 Pipelines.py
		4.5 Middlewares.py
	5 Restrictions Imposed on Web Scraping
		5.1 Bypass Restrictions Using User-Agents
		5.2 Bypass Restrictions Using Proxies
		5.3 Bypass Restrictions by Logging in the Web site
	6 Conclusion
	References
Selection of Candidate Views for Big Data View Materialization
	1 Introduction
	2 Big Data View Materialization
	3 Big Data View Structure Graph
	4 Algorithm BDCV&QP
	5 An Example
	6 Conclusion
	References
A Machine Learning Approach to Sentiment Analysis on Web Based Feedback
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Data Collection
		3.2 Pre-Processing Data
		3.3 Feature Extraction
		3.4 Training and Classification
	4 Implementation
	5 Result and Discussion
	6 Conclusions and Future Scope
	References
Forecasting of Stock Price Using LSTM and Prophet Algorithm
	1 Introduction
	2 Related Work
	3 Stock Market Prediction
	4 Methodology
		4.1 Artificial Neural Network (ANN)
		4.2 Recurrent Neural Network
		4.3 LSTM (Long Short Term Memory)
		4.4 Prophet Algorithm
	5 Results
		5.1 Implementation of LSTM
		5.2 Implementation of Prophet Algorithm
	6 Discussion and Conclusion
	References
Towards a Federated Learning Approach for NLP Applications
	1 Introduction
	2 Related Works
	3 Federated Learning Infrastructure
		3.1 Design and Implementation
		3.2 Dataset and Model
	4 Results
	5 Conclusion and Future Work
	References
Challenges of Smart Cities Future Research Directions
Analysis of Groundwater Quality Using GIS-Based Water Quality Index in Noida, Gautam Buddh Nagar, Uttar Pradesh (UP), India
	1 Introduction
	2 Study Area
	3 Materials and Methods
		3.1 Methodology
		3.2 Physico-Chemical Parameters
		3.3 Spatial Analysis
		3.4 Machine Learning Techniques
	4 GIS Statistical Model
	5 Results and Discussions
	6 Spatial Distribution of GIS-Based WQI
	7 Conclusions
	References
An Artificial Neural Network Based Approach of Solar Radiation Estimation Using Location and Meteorological Details
	1 Introduction
	2 Artificial Neural Network Based Solar Radiation Estimation
	3 Solar Radiation Estimation Modeling
	4 Results
	5 Results
	References
Applications of Machine Learning and Artificial Intelligence in Intelligent Transportation System: A Review
	1 Introduction
	2 Applications of ML in ITS
		2.1 Road Anomaly Detection
		2.2 Traffic Flow Detection and Travel Time Prediction
		2.3 Accident Detection and Prevention
		2.4 Smart City Lights
		2.5 City Infrastructure
	3 Applications of AI in Smart Transportation
		3.1 Safety and Emergency Management System
		3.2 Autonomous Vehicles
		3.3 Smart Parking Management
		3.4 Incident Detection
		3.5 Predictive Models
	4 Challenges of AI and ML in ITS
	5 Future Trends in Intelligent Transportation System
	6 Conclusion
	References
Analyzing App-Based Methods for Internet De-Addiction in Young Population
	1 Introduction
	2 Prior Work
	3 Methodology
		3.1 Mobile Applications
		3.2 The Basic Methodology
	4 Results and Analysis
		4.1 Step 1: Polynomial Regression
		4.2 Step 2: ANOVA
		4.3 Step 3: Multivariate Analysis of Variance (MANOVA)
	5 Conclusion
	References
Revolution of AI-Enabled Health Care Chat-Bot System for Patient Assistance
	1 Introduction
		1.1 History of Chat-Bots
		1.2 Ease of Use
	2 Literature Review
	3 Proposed System
		3.1 Processing of Chat-Bot
		3.2 Some Common Mistakes
		3.3 Building Bot Using Dialog Flow API
		3.4 Tabular Design of Disease Record
		3.5 Decision Tree of Chat-Bot
		3.6 Developing Chat-Bot
		3.7 Normalizing the Tech Inside Present Digital Channels
		3.8 Ensuring the Chat-Bot Suits in with Emblem Identity
		3.9 Handling Chat-Bot
		3.10 Coping When Matters Go Wrong
		3.11 Knowing When a Human Need to Take Over
	4 Results
	5 Future Work
	6 Conclusion
	References
Air Quality Prediction Using Regression Models
	1 Introduction
	2 Related Work
	3 Overview of the Proposed Work
		3.1 Multiple Linear Regression
		3.2 Support Vector Regression
		3.3 Decision Tree Regression
	4 Experimental Setup and Result
		4.1 Dataset
		4.2 Preprocessing of Data
		4.3 Results
	5 Conclusion
	References
Anomaly Detection in Videos Using Deep Learning Techniques
	1 Introduction
	2 Anomaly Detection Recent Surveys
	3 Proposed Work
		3.1 CNN Model
		3.2 VGG 16 Model
	4 Implementation
		4.1 UCF-Crime Dataset
		4.2 VGG16 & CNN Model Implementation
	5 Results and Analysis
	6 Conclusion and Future Scope
	References
Unsupervised Activity Modelling in a Video
	1 Introduction
	2 Related Works
	3 Proposed Methodology
		3.1 Pre-processing
		3.2 Feature Extraction
		3.3 Recognition
	4 Experimental Results
		4.1 Dataset
		4.2 Result Analysis
	5 Conclusion and Future Work
	References
Performance Comparison of Various Feature Extraction Methods for Object Recognition on Caltech-101 Image Dataset
	1 Introduction
	2 Related Work
	3 Feature Extraction Methods
		3.1 Local Features
		3.2 Deep Features
	4 Classification Methods
		4.1 Gaussian Naïve Bayes
		4.2 K-Nearest Neighbor (k-NN)
		4.3 Decision Tree
		4.4 Random Forest
		4.5 XGBoosting Classifier
	5 Experimental Results and Discussion
		5.1 Dataset and Data-Partitioning Methodologies
		5.2 Performance Evaluation
	6 Conclusion
	References
Leukemia Prediction Using SVNN with a Nature-Inspired Optimization Technique
	1 Introduction
		1.1 The Novelty of This Paper
	2 Motivation
		2.1 Literature Survey
	3 Proposed Method of Leukemia Detection
		3.1 Preprocessing of the Input Image
		3.2 Blast Cell Segmentation
		3.3 Identification of WBCs
		3.4 Detection of Leukemia
	4 Results and Discussion
		4.1 Performance Analysis
		4.2 Comparative Analysis
	5 Conclusion
	References
Selection of Mobile Node Using Game and Graph Theory for Video Streaming Application
	1 Introduction
	2 Literature Survey
		2.1 Overlapping Coalition Game
	3 Basic Terminologies
	4 Cooperative Game-Theoretic Modeling
	5 Edge Node Replacement Strategy
	6 Discussion and Time Complexity Analysis
	7 Conclusion
	References
Attentive Convolution Network-Based Video Summarization
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Convolution Network Module
		3.2 Self-attention Module
		3.3 Deconvolution Module
	4 Experiment
		4.1 Dataset
		4.2 Ground Truth Preparation
		4.3 Implementation Detail
		4.4 Evaluation Metric
		4.5 Baseline Models
	5 Experimental Results
		5.1 Ablation Study
	6 Future Scopes and Conclusion
	References
Static Video Summarization: A Comparative Study of Clustering-Based Techniques
	1 Introduction
	2 Related Work
	3 Methodology and Taxonomy
		3.1 Video Preprocessing
		3.2 Feature Extraction
		3.3 Clustering
		3.4 Evaluation Method
	4 Experiment and Results
		4.1 Experiment Environment
		4.2 Video Summarization Models (VSM)
		4.3 Evaluation Results
	5 Comparative Analysis
		5.1 Best Model and Worst Model
		5.2 Local Versus Global Features
		5.3 Consistency Study of Clustering Method
		5.4 Consistency Study of Local and Global Features
	6 Conclusion and Future Work
	References
A Review: Hemorrhage Detection Methodologies on the Retinal Fundus Image
	1 Introduction
	2 Review: Hemorrhage Identification Methods
		2.1 Mathematical Morphology
		2.2 Recursive Region Growing
		2.3 Artificial Neural Network
		2.4 Classification
		2.5 Inverse Segmentation
	3 Performance Analysis
	4 Conclusion
	References
A Study on Retinal Image Preprocessing Methods for the Automated Diabetic Retinopathy Screening Operation
	1 Introduction
	2 Current State of the Art
	3 Preprocessing Schemes
		3.1 Histogram Equalization
		3.2 CLAHE
		3.3 Bottom Hat Transformation
		3.4 Wiener Filter
		3.5 Median Filter
		3.6 Brightness Preserving Preprocessing Scheme
	4 Experimental Results
	5 Conclusion
	References
FFHIApp: An Application for Flash Flood Hotspots Identification Using Real-Time Images
	1 Introduction
	2 Proposed Work
		2.1 Android Application for Smartphone
		2.2 Server-Side Application
		2.3 Flood-Image-Detector: CNN Model
		2.4 System Implementation Strategy
	3 Simulation and Experiments
	4 Conclusion
	References
Infrastructure and Resource Development and Management Using Artificial Intelligence and Machine learning
An Optimized Controller for Zeta Converter-Based Solar Hydraulic Pump
	1 Introduction
	2 System and Specifications
		2.1 Block Diagram of Proposed System
		2.2 PV Array
		2.3 ZETA Converter
		2.4 Motor
	3 Control Technique
		3.1 Open Loop
		3.2 Genetic Algorithm-Tuned PI Controller
		3.3 Fuzzy Logic Controller
	4 Simulation and Results
		4.1 Simulation Figure
		4.2 Simulation Results
	5 Analysis
		5.1 Set Values for Different Conditions
		5.2 SEPIC Versus Zeta
	6 Conclusions
	References
Automated Detection and Classification of COVID-19 Based on CT Images Using Deep Learning Model
	1 Introduction
	2 Materials and Methods
		2.1 Covid CT Image Dataset
		2.2 Transfer Learning
		2.3 The Proposed Fine-Tuning Method
	3 Experimental Results
		3.1 Results
		3.2 Discussion
	4 Conclusion
	References
Comparative Study of Computational Techniques for Smartphone Based Human Activity Recognition
	1 Introduction
	2 Methodology
		2.1 Dataset
		2.2 Feature Analysis and Selection
		2.3 Computational Techniques for Human Activity Recognition
	3 Result and Discussion
		3.1 Confusion Matrix
		3.2 Evaluation Parameters
	4 Discussion and Future Scope
	References
Machine Learning Techniques for Improved Breast Cancer Detection and Prognosis—A Comparative Analysis
	1 Introduction
	2 Literature Review
	3 Comparative Analysis of Existing Literature
	4 Experimental Setup
		4.1 Machine Learning Classifiers Adopted
		4.2 Performance Metrics Adopted
		4.3 Implementation
	5 Results
	6 Conclusion, Challenges and Future Scope
	References
Multiclass Classification of Histology Images of Breast Cancer Using Improved Deep Learning Approach
	1 Introduction
	2 Review of Existing System
	3 Limitations of Existing Systems
	4 Dual Stage Multiclass Breast Cancer Classification Using Deep Learning Framework
	5 Experimental Analysis
	6 Conclusion
	7 Future Scope
	References
Enhancing the Network Performance of Wireless Sensor Networks on Meta-heuristic Approach: Grey Wolf Optimization
	1 Introduction
	2 Related Work
	3 The Proposed Grey Wolf Optimization Algorithm
		3.1 Objective Function
		3.2 Radio Model
	4 Simulation and Result Analysis
		4.1 Comparative Evaluation
	5 Conclusion
	References
Deep Learning-Based Computer Aided Customization of Speech Therapy
	1 Introduction
	2 Related Work
	3 Proposed Approach
		3.1 Dataset
		3.2 Word Construction in Hindi Language
		3.3 Proposed Model for Intermediate Frame Synthesis: SpinCNN
		3.4 Training
	4 Testing and Results
		4.1 Evaluation Metrics
		4.2 Evaluation of Synthesized Intermediate Frames
		4.3 Evaluation of Constructed Words
	5 Proposed Application Areas
	6 Conclusion and Future Work
	References
Face Mask Detection Using Deep Learning
	1 Introduction
		1.1 The Major Contribution of This Paper
	2 Motivation
		2.1 Literature Survey
	3 Proposed Method of Face Mask Detection
		3.1 Preprocessing
		3.2 Face Detection and Cropping
		3.3 Feature Extraction and Prediction
		3.4 Architecture
	4 Results and Discussion
		4.1 Performance Analysis
		4.2 Comparative Analysis
	5 Conclusion
	References
Deep Learning-Based Non-invasive Fetal Cardiac Arrhythmia Detection
	1 Introduction
	2 Literature Review
		2.1 Literature Overview of the Non-invasive FECG Analysis
		2.2 Literature Overview Cardiac Arrhythmia Detection (Adult and Fetus)
	3 Experimental Design
		3.1 Data Source and Description
		3.2 Signal Preprocessing
		3.3 Feature Extraction
		3.4 CNN Architecture
	4 Result and Discussion
		4.1 Performance Metrics
		4.2 Result
		4.3 Discussion
	5 Conclusion
	References
Security and Privacy Challenges and Data Analytics
Minimizing Energy Consumption for Intrusion Detection Model in Wireless Sensor Network
	1 Introduction
	2 Related Work
	3 Model-Based IDS
		3.1 Bayes Belief Network Model
		3.2 Hidden Markov Model Architecture
	4 Results and Analysis
	5 Conclusion
	References
A Blockchain Framework for Counterfeit Medicines Detection
	1 Introduction
		1.1 Background
		1.2 Outline
	2 Related Knowledge—Blockchain Technology
		2.1 Decentralization
		2.2 Components and Working Principle
	3 Literature Review
	4 Proposed Framework
	5 Security in Blockchain
	6 Validation
	7 Future Scope
	8 Conclusion
	References
Static and Dynamic Learning-Based PDF Malware Detection classifiers—A Comparative Study
	1 Introduction
	2 Structure of PDF File
		2.1 Header
		2.2 Body
		2.3 Cross-Reference Table
		2.4 Trailer
	3 Parsing Procedure
	4 Learning Based Malicious PDF Detection Process
		4.1 Preprocessing
		4.2 Feature Extraction
		4.3 Classifier
	5 Types of Classifiers
		5.1 Static Classifiers
		5.2 Dynamic Classifiers
	6 Static Classifiers
		6.1 N-Gram
		6.2 N-Gram II
		6.3 PJscan
		6.4 Slayer
		6.5 PDFrate V1
		6.6 Hidost
		6.7 Slayer NEO
		6.8 PDFrate V2
	7 Dynamic Classifiers
		7.1 Wepawet
		7.2 MDScan
		7.3 PDF Scrutinizer
		7.4 Lux0R
		7.5 PlatPal
	8 Comparative Study Among Different Learning-Based PDF Malware Classifiers
	9 Conclusion and Future Scope
	References
MOLE: Multiparty Open Ledger Experiment, Concept and Simulation Using BlockChain Technology
	1 Introduction
	2 Blockchain Architecture
	3 Various Initiatives of Government for Blockchain Technology
		3.1 Initiatives
		3.2 Industry Interaction
	4 Properties of BlockChain Technology
		4.1 Decentralization
		4.2 Transparency
		4.3 Immutability
		4.4 Functioning of Blockchain Technology: Role of Hashing
	5 Experimental Set Up: Simulation Performed
		5.1 Aim and Objective of Virtual Lab
		5.2 MOLE Algorithm
		5.3 Simulation Using Virtual Lab
	6 Conclusion
	References
Intrusion Detection Based on Decision Tree Using Key Attributes of Network Traffic
	1 Introduction
	2 Data Mining in IDS
	3 WEKA Tool
	4 KDDCup 1999
	5 Related Work
	6 Algorithms Applied
		6.1 J48
		6.2 Random Forest
	7 Experimental Result
		7.1 Parameter
		7.2 Results
	8 Conclusion
	References
An Extensive Review of Wireless Local Area Network Security Standards
	1 Introduction
	2 How Wi-Fi Works
	3 Wireless LAN Security
		3.1 Wired Equivalent Privacy
		3.2 Wi-Fi Protect Access
		3.3 WPA2/IEEE802.11i
	4 Attacks on Wireless LAN
	5 Basic Solutions for Mitigating Security Flaw in AP
	6 Methodology of the Simulation
	7 How to Reduce Chance of Attack
	8 Conclusion
	References
Security Concerns at Various Network Phases Through Blockchain Technology
	1 Introduction
		1.1 Application of Blockchain
	2 Related Work
	3 Parametric Measures in Blockchain
		3.1 At Device Phase
		3.2 At User Phase
		3.3 At Data Phase
	4 Conclusion
	References
Smart Infrastructure and Resource Development and Management Using Artificial Intelligence and Machine learning
Developing an Evaluation Model for Forecasting of Real Estate Prices
	1 Introduction
	2 Related Work
	3 Research Methodology
		3.1 Data Description
		3.2 Data Analysis Process
	4 Data Analysis
		4.1 Descriptive Statistics
		4.2 Correlation Matrix
		4.3 Real Estate Valuation Model
	5 Conclusion
	6 Limitations and Future Research Directions
	References
Memetic Optimal Approach for Economic Load Dispatch Problem with Renewable Energy Source in Realistic Power System
	1 Introduction
	2 ELD of Renewable Energy Integrated System
	3 Problem Formulation
		3.1 Economic Load Dispatch (ELD) Problem
	4 Proposed Methodology
		4.1 Mathematical Modelling of SMA
		4.2 Pattern Search Algorithm (PS)
	5 Results and Discussions
	6 Conclusion
	References
High-Throughput and Low-Latency Reconfigurable Routing Topology for Fast AI MPSoC Architecture
	1 Introduction
	2 Literature Survey
	3 Problem Statement
	4 Proposed Architecture
		4.1 Architecture of a System on Chip
	5 Experiment Results and Discussion
		5.1 Performance Analysis
	6 Conclusion
	References
Comparison of Various Data Center Frameworks
	1 Introduction
	2 Literature Survey
	3 Comparison of Frameworks
		3.1 Four Pillar Frameworks
		3.2 Energy Star Energy-Efficient Framework
		3.3 Facebook Data Center
		3.4 Google Data Center
		3.5 EU Code of Conduct on Data Centers
		3.6 Data Center Energy-Efficient Framework (DCEEF)
		3.7 Green Grid Energy-Efficient Data Centers Framework
	4 Proposed Green Data Center Framework
	5 Conclusion
	References
Soft Computing
A New Solution for Multi-objective Optimization Problem Using Extended Swarm-Based MVMO
	1 Introduction
		1.1 Multi-objective Optimization
		1.2 Search and Decision Making in MOP
		1.3 Evolutionary Algorithms for MOP
		1.4 Swarm Based Optimization
	2 Literature Survey
		2.1 Mean Variance Mapping Optimization
		2.2 Local Search Algorithm
	3 Proposed Methodology
	4 Result and Analysis
	5 Conclusion and Future Work
	References
Improving Software Maintainability Prediction Using Hyperparameter Tuning of Baseline Machine Learning Algorithms
	1 Introduction
	2 Literature Review
	3 Research Methodology
		3.1 Metrics
		3.2 Modeling Techniques
		3.3 Hyperparameter Tuning
		3.4 Cross-Validation Technique
		3.5 Accuracy Measures
	4 Results and Analysis
	5 Threats to Validity
	6 Conclusion and Future Scope
	References
Karaoke Machine Execution Using Artificial Neural Network
	1 Introduction
	2 Literature Survey
	3 Artificial Neural Network
	4 Proposed Method
	5 Observations and Results
	6 Conclusion and Future Scope
	References
A Review on Deep Learning Models for Short-Term Load Forecasting
	1 Introduction
	2 Methods or Approaches
	3 Deep Learning Forecasting Models
		3.1 Stacked Auto-encoder
		3.2 Recurrent Neural Network
		3.3 Convolution Neural Network
		3.4 Deep Belief Network
	4 Conclusion
	References
An Evolutionary Approach to Combinatorial Gameplaying Using Extended Classifier Systems
	1 Introduction
	2 Motivation
	3 Background
		3.1 Checkers
		3.2 Description of XCS
	4 Technical Framework
		4.1 Program Structure
		4.2 The Board
	5 Proposed XCS Agent
		5.1 The Classifiers
		5.2 Parameter Settings
		5.3 Reinforcement Component
		5.4 Evolutionary Component
		5.5 Modifications to XCS
	6 Result Analysis
	7 Conclusion and Future Work
	References




نظرات کاربران