دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1st ed. 2021] نویسندگان: Ankur Choudhary (editor), Arun Prakash Agrawal (editor), Rajasvaran Logeswaran (editor), Bhuvan Unhelkar (editor) سری: ISBN (شابک) : 9811630666, 9789811630668 ناشر: Springer سال نشر: 2021 تعداد صفحات: 754 [725] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 18 Mb
در صورت تبدیل فایل کتاب Applications of Artificial Intelligence and Machine Learning: Select Proceedings of ICAAAIML 2020 (Lecture Notes in Electrical Engineering, 778) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب کاربردهای هوش مصنوعی و یادگیری ماشین: مجموعه مقالات ICAAAIML 2020 (یادداشت های سخنرانی در مهندسی برق ، 778) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعهای از مقالات بررسیشده از کنفرانس بینالمللی
پیشرفتها و کاربردهای هوش مصنوعی و یادگیری ماشینی - ICAAAIML
2020 را ارائه میکند. این کتاب تحقیقات در زمینه هوش مصنوعی،
یادگیری ماشین، و کاربردهای یادگیری عمیق در مراقبتهای
بهداشتی، کشاورزی را پوشش میدهد. ، تجارت و امنیت این جلد شامل
مقالات پژوهشی از دانشگاهیان، محققان و همچنین دانشجویان است.
همچنین مقالاتی در مورد مفاهیم اصلی شبکه های کامپیوتری، طراحی
و استقرار سیستم هوشمند، سیستم های بلادرنگ، شبکه های حسگر بی
سیم، حسگرها و گره های حسگر، مهندسی نرم افزار و پردازش تصویر
وجود دارد. این کتاب منبع ارزشمندی برای دانشآموزان،
دانشگاهیان و شاغلین در صنعت خواهد بود که روی برنامههای هوش
مصنوعی کار میکنند.
The book presents a collection of peer-reviewed articles from
the International Conference on Advances and Applications of
Artificial Intelligence and Machine Learning - ICAAAIML 2020.
The book covers research in artificial intelligence, machine
learning, and deep learning applications in healthcare,
agriculture, business, and security. This volume contains
research papers from academicians, researchers as well as
students. There are also papers on core concepts of computer
networks, intelligent system design and deployment, real-time
systems, wireless sensor networks, sensors and sensor nodes,
software engineering, and image processing. This book will be
a valuable resource for students, academics, and
practitioners in the industry working on AI
applications.
ICAAAIML-2020 Preface Contents About the Editors Artificial Intelligence and Its Applications in Smart Education Building a Language Data Set in Telugu Using Machine Learning Techniques to Address Suicidal Ideation and Behaviors in Adolescents 1 Introduction 2 Suicidal Data Set Creation in Telugu 3 Technique Used for Data Gathering to Create Required Data Set 4 Data Collection 4.1 Scrapping 4.2 Cleaning 4.3 Annotation 4.4 Data Set Statistics 5 Methodology 6 Experiments and Results 6.1 Accuracy by ML Classifiers 6.2 Binary Classification Measures 7 Conclusion 8 Future Work References Feature Selection and Performance Comparison of Various Machine Learning Classifiers for Analyzing Students’ Performance Using Rapid Miner 1 Introduction 2 Literature Review 3 Research Methodology 4 Experiment and Results 5 Conclusion References Internet of Things (IoT) Based Automated Light Intensity Model Using NodeMcu ESP 8266 Microcontroller 1 Introduction 1.1 Problem Statement 1.2 Objectives 2 Research Methodology 3 Literature Survey 4 Performance Analysis 4.1 Analysis Outcomes 5 Conclusion and Future Scope References Handwritten Mathematical Symbols Classification Using WEKA 1 Introduction 2 Literature Review and Related Work 3 Proposed Work 4 Implementation 5 Conclusion and Future Scope References Enhancing Sociocultural Learning Using Hyperlocal Experience 1 Introduction 2 Literature Survey 3 Working of the System 3.1 Overview 3.2 Hyperlocal Forecasting 3.3 Architecture 3.4 Methodology 3.5 Proposed Solution 3.6 Algorithm 4 Conclusion 5 Future Enhancements References Subsequent Technologies Behind IoT and Its Development Roadmap Toward Integrated Healthcare Prototype Models 1 Introduction 2 Technologies Behind IoT 2.1 IoT Development Boards and IoT Hardware 2.2 IDE (Integrated Development Environment) 2.3 Protocols 2.4 Network Spine 2.5 Internetwork Cloud Stages/server 2.6 Software 3 IoT Gateway Device 4 IoT Development Roadmap and Healthcare Prototype 5 Conclusion References Big Data and Data Mining Bug Assignment-Utilization of Metadata Features Along with Feature Selection and Classifiers 1 Introduction 2 Literature Survey 3 Proposed En-TRAM Triager 4 Experimental Setup and Results 4.1 Experiment Setup 4.2 Results 5 Conclusion References Role of Artificial Intelligence in Detection of Hateful Speech for Hinglish Data on Social Media 1 Introduction 1.1 Previous Work 2 Corpus Creation and Annotation 2.1 Annotations 3 Methodology 3.1 Bidirectional Encoder Representations from Transformers (BERT) 3.2 Embeddings from Language Models (ELMo) 3.3 Flair 4 System Design 4.1 Data Pre-Processing 4.2 Fine-Tuning Approaches 5 Results and Discussion 6 Conclusion 6.1 Future Scope References From Web Scraping to Web Crawling 1 Introduction 2 Methodologies Involved in Web Scraping 2.1 DOM Tree Parsing 2.2 String Matching 2.3 Semantic Framework 2.4 Machine Learning-Based Web Scraping 3 Web Crawling 3.1 Scrapy and Spider 4 Scraping Conference Data 4.1 Settings.py 4.2 Spider 4.3 Items.py 4.4 Pipelines.py 4.5 Middlewares.py 5 Restrictions Imposed on Web Scraping 5.1 Bypass Restrictions Using User-Agents 5.2 Bypass Restrictions Using Proxies 5.3 Bypass Restrictions by Logging in the Web site 6 Conclusion References Selection of Candidate Views for Big Data View Materialization 1 Introduction 2 Big Data View Materialization 3 Big Data View Structure Graph 4 Algorithm BDCV&QP 5 An Example 6 Conclusion References A Machine Learning Approach to Sentiment Analysis on Web Based Feedback 1 Introduction 2 Literature Review 3 Proposed Methodology 3.1 Data Collection 3.2 Pre-Processing Data 3.3 Feature Extraction 3.4 Training and Classification 4 Implementation 5 Result and Discussion 6 Conclusions and Future Scope References Forecasting of Stock Price Using LSTM and Prophet Algorithm 1 Introduction 2 Related Work 3 Stock Market Prediction 4 Methodology 4.1 Artificial Neural Network (ANN) 4.2 Recurrent Neural Network 4.3 LSTM (Long Short Term Memory) 4.4 Prophet Algorithm 5 Results 5.1 Implementation of LSTM 5.2 Implementation of Prophet Algorithm 6 Discussion and Conclusion References Towards a Federated Learning Approach for NLP Applications 1 Introduction 2 Related Works 3 Federated Learning Infrastructure 3.1 Design and Implementation 3.2 Dataset and Model 4 Results 5 Conclusion and Future Work References Challenges of Smart Cities Future Research Directions Analysis of Groundwater Quality Using GIS-Based Water Quality Index in Noida, Gautam Buddh Nagar, Uttar Pradesh (UP), India 1 Introduction 2 Study Area 3 Materials and Methods 3.1 Methodology 3.2 Physico-Chemical Parameters 3.3 Spatial Analysis 3.4 Machine Learning Techniques 4 GIS Statistical Model 5 Results and Discussions 6 Spatial Distribution of GIS-Based WQI 7 Conclusions References An Artificial Neural Network Based Approach of Solar Radiation Estimation Using Location and Meteorological Details 1 Introduction 2 Artificial Neural Network Based Solar Radiation Estimation 3 Solar Radiation Estimation Modeling 4 Results 5 Results References Applications of Machine Learning and Artificial Intelligence in Intelligent Transportation System: A Review 1 Introduction 2 Applications of ML in ITS 2.1 Road Anomaly Detection 2.2 Traffic Flow Detection and Travel Time Prediction 2.3 Accident Detection and Prevention 2.4 Smart City Lights 2.5 City Infrastructure 3 Applications of AI in Smart Transportation 3.1 Safety and Emergency Management System 3.2 Autonomous Vehicles 3.3 Smart Parking Management 3.4 Incident Detection 3.5 Predictive Models 4 Challenges of AI and ML in ITS 5 Future Trends in Intelligent Transportation System 6 Conclusion References Analyzing App-Based Methods for Internet De-Addiction in Young Population 1 Introduction 2 Prior Work 3 Methodology 3.1 Mobile Applications 3.2 The Basic Methodology 4 Results and Analysis 4.1 Step 1: Polynomial Regression 4.2 Step 2: ANOVA 4.3 Step 3: Multivariate Analysis of Variance (MANOVA) 5 Conclusion References Revolution of AI-Enabled Health Care Chat-Bot System for Patient Assistance 1 Introduction 1.1 History of Chat-Bots 1.2 Ease of Use 2 Literature Review 3 Proposed System 3.1 Processing of Chat-Bot 3.2 Some Common Mistakes 3.3 Building Bot Using Dialog Flow API 3.4 Tabular Design of Disease Record 3.5 Decision Tree of Chat-Bot 3.6 Developing Chat-Bot 3.7 Normalizing the Tech Inside Present Digital Channels 3.8 Ensuring the Chat-Bot Suits in with Emblem Identity 3.9 Handling Chat-Bot 3.10 Coping When Matters Go Wrong 3.11 Knowing When a Human Need to Take Over 4 Results 5 Future Work 6 Conclusion References Air Quality Prediction Using Regression Models 1 Introduction 2 Related Work 3 Overview of the Proposed Work 3.1 Multiple Linear Regression 3.2 Support Vector Regression 3.3 Decision Tree Regression 4 Experimental Setup and Result 4.1 Dataset 4.2 Preprocessing of Data 4.3 Results 5 Conclusion References Anomaly Detection in Videos Using Deep Learning Techniques 1 Introduction 2 Anomaly Detection Recent Surveys 3 Proposed Work 3.1 CNN Model 3.2 VGG 16 Model 4 Implementation 4.1 UCF-Crime Dataset 4.2 VGG16 & CNN Model Implementation 5 Results and Analysis 6 Conclusion and Future Scope References Unsupervised Activity Modelling in a Video 1 Introduction 2 Related Works 3 Proposed Methodology 3.1 Pre-processing 3.2 Feature Extraction 3.3 Recognition 4 Experimental Results 4.1 Dataset 4.2 Result Analysis 5 Conclusion and Future Work References Performance Comparison of Various Feature Extraction Methods for Object Recognition on Caltech-101 Image Dataset 1 Introduction 2 Related Work 3 Feature Extraction Methods 3.1 Local Features 3.2 Deep Features 4 Classification Methods 4.1 Gaussian Naïve Bayes 4.2 K-Nearest Neighbor (k-NN) 4.3 Decision Tree 4.4 Random Forest 4.5 XGBoosting Classifier 5 Experimental Results and Discussion 5.1 Dataset and Data-Partitioning Methodologies 5.2 Performance Evaluation 6 Conclusion References Leukemia Prediction Using SVNN with a Nature-Inspired Optimization Technique 1 Introduction 1.1 The Novelty of This Paper 2 Motivation 2.1 Literature Survey 3 Proposed Method of Leukemia Detection 3.1 Preprocessing of the Input Image 3.2 Blast Cell Segmentation 3.3 Identification of WBCs 3.4 Detection of Leukemia 4 Results and Discussion 4.1 Performance Analysis 4.2 Comparative Analysis 5 Conclusion References Selection of Mobile Node Using Game and Graph Theory for Video Streaming Application 1 Introduction 2 Literature Survey 2.1 Overlapping Coalition Game 3 Basic Terminologies 4 Cooperative Game-Theoretic Modeling 5 Edge Node Replacement Strategy 6 Discussion and Time Complexity Analysis 7 Conclusion References Attentive Convolution Network-Based Video Summarization 1 Introduction 2 Related Work 3 Methodology 3.1 Convolution Network Module 3.2 Self-attention Module 3.3 Deconvolution Module 4 Experiment 4.1 Dataset 4.2 Ground Truth Preparation 4.3 Implementation Detail 4.4 Evaluation Metric 4.5 Baseline Models 5 Experimental Results 5.1 Ablation Study 6 Future Scopes and Conclusion References Static Video Summarization: A Comparative Study of Clustering-Based Techniques 1 Introduction 2 Related Work 3 Methodology and Taxonomy 3.1 Video Preprocessing 3.2 Feature Extraction 3.3 Clustering 3.4 Evaluation Method 4 Experiment and Results 4.1 Experiment Environment 4.2 Video Summarization Models (VSM) 4.3 Evaluation Results 5 Comparative Analysis 5.1 Best Model and Worst Model 5.2 Local Versus Global Features 5.3 Consistency Study of Clustering Method 5.4 Consistency Study of Local and Global Features 6 Conclusion and Future Work References A Review: Hemorrhage Detection Methodologies on the Retinal Fundus Image 1 Introduction 2 Review: Hemorrhage Identification Methods 2.1 Mathematical Morphology 2.2 Recursive Region Growing 2.3 Artificial Neural Network 2.4 Classification 2.5 Inverse Segmentation 3 Performance Analysis 4 Conclusion References A Study on Retinal Image Preprocessing Methods for the Automated Diabetic Retinopathy Screening Operation 1 Introduction 2 Current State of the Art 3 Preprocessing Schemes 3.1 Histogram Equalization 3.2 CLAHE 3.3 Bottom Hat Transformation 3.4 Wiener Filter 3.5 Median Filter 3.6 Brightness Preserving Preprocessing Scheme 4 Experimental Results 5 Conclusion References FFHIApp: An Application for Flash Flood Hotspots Identification Using Real-Time Images 1 Introduction 2 Proposed Work 2.1 Android Application for Smartphone 2.2 Server-Side Application 2.3 Flood-Image-Detector: CNN Model 2.4 System Implementation Strategy 3 Simulation and Experiments 4 Conclusion References Infrastructure and Resource Development and Management Using Artificial Intelligence and Machine learning An Optimized Controller for Zeta Converter-Based Solar Hydraulic Pump 1 Introduction 2 System and Specifications 2.1 Block Diagram of Proposed System 2.2 PV Array 2.3 ZETA Converter 2.4 Motor 3 Control Technique 3.1 Open Loop 3.2 Genetic Algorithm-Tuned PI Controller 3.3 Fuzzy Logic Controller 4 Simulation and Results 4.1 Simulation Figure 4.2 Simulation Results 5 Analysis 5.1 Set Values for Different Conditions 5.2 SEPIC Versus Zeta 6 Conclusions References Automated Detection and Classification of COVID-19 Based on CT Images Using Deep Learning Model 1 Introduction 2 Materials and Methods 2.1 Covid CT Image Dataset 2.2 Transfer Learning 2.3 The Proposed Fine-Tuning Method 3 Experimental Results 3.1 Results 3.2 Discussion 4 Conclusion References Comparative Study of Computational Techniques for Smartphone Based Human Activity Recognition 1 Introduction 2 Methodology 2.1 Dataset 2.2 Feature Analysis and Selection 2.3 Computational Techniques for Human Activity Recognition 3 Result and Discussion 3.1 Confusion Matrix 3.2 Evaluation Parameters 4 Discussion and Future Scope References Machine Learning Techniques for Improved Breast Cancer Detection and Prognosis—A Comparative Analysis 1 Introduction 2 Literature Review 3 Comparative Analysis of Existing Literature 4 Experimental Setup 4.1 Machine Learning Classifiers Adopted 4.2 Performance Metrics Adopted 4.3 Implementation 5 Results 6 Conclusion, Challenges and Future Scope References Multiclass Classification of Histology Images of Breast Cancer Using Improved Deep Learning Approach 1 Introduction 2 Review of Existing System 3 Limitations of Existing Systems 4 Dual Stage Multiclass Breast Cancer Classification Using Deep Learning Framework 5 Experimental Analysis 6 Conclusion 7 Future Scope References Enhancing the Network Performance of Wireless Sensor Networks on Meta-heuristic Approach: Grey Wolf Optimization 1 Introduction 2 Related Work 3 The Proposed Grey Wolf Optimization Algorithm 3.1 Objective Function 3.2 Radio Model 4 Simulation and Result Analysis 4.1 Comparative Evaluation 5 Conclusion References Deep Learning-Based Computer Aided Customization of Speech Therapy 1 Introduction 2 Related Work 3 Proposed Approach 3.1 Dataset 3.2 Word Construction in Hindi Language 3.3 Proposed Model for Intermediate Frame Synthesis: SpinCNN 3.4 Training 4 Testing and Results 4.1 Evaluation Metrics 4.2 Evaluation of Synthesized Intermediate Frames 4.3 Evaluation of Constructed Words 5 Proposed Application Areas 6 Conclusion and Future Work References Face Mask Detection Using Deep Learning 1 Introduction 1.1 The Major Contribution of This Paper 2 Motivation 2.1 Literature Survey 3 Proposed Method of Face Mask Detection 3.1 Preprocessing 3.2 Face Detection and Cropping 3.3 Feature Extraction and Prediction 3.4 Architecture 4 Results and Discussion 4.1 Performance Analysis 4.2 Comparative Analysis 5 Conclusion References Deep Learning-Based Non-invasive Fetal Cardiac Arrhythmia Detection 1 Introduction 2 Literature Review 2.1 Literature Overview of the Non-invasive FECG Analysis 2.2 Literature Overview Cardiac Arrhythmia Detection (Adult and Fetus) 3 Experimental Design 3.1 Data Source and Description 3.2 Signal Preprocessing 3.3 Feature Extraction 3.4 CNN Architecture 4 Result and Discussion 4.1 Performance Metrics 4.2 Result 4.3 Discussion 5 Conclusion References Security and Privacy Challenges and Data Analytics Minimizing Energy Consumption for Intrusion Detection Model in Wireless Sensor Network 1 Introduction 2 Related Work 3 Model-Based IDS 3.1 Bayes Belief Network Model 3.2 Hidden Markov Model Architecture 4 Results and Analysis 5 Conclusion References A Blockchain Framework for Counterfeit Medicines Detection 1 Introduction 1.1 Background 1.2 Outline 2 Related Knowledge—Blockchain Technology 2.1 Decentralization 2.2 Components and Working Principle 3 Literature Review 4 Proposed Framework 5 Security in Blockchain 6 Validation 7 Future Scope 8 Conclusion References Static and Dynamic Learning-Based PDF Malware Detection classifiers—A Comparative Study 1 Introduction 2 Structure of PDF File 2.1 Header 2.2 Body 2.3 Cross-Reference Table 2.4 Trailer 3 Parsing Procedure 4 Learning Based Malicious PDF Detection Process 4.1 Preprocessing 4.2 Feature Extraction 4.3 Classifier 5 Types of Classifiers 5.1 Static Classifiers 5.2 Dynamic Classifiers 6 Static Classifiers 6.1 N-Gram 6.2 N-Gram II 6.3 PJscan 6.4 Slayer 6.5 PDFrate V1 6.6 Hidost 6.7 Slayer NEO 6.8 PDFrate V2 7 Dynamic Classifiers 7.1 Wepawet 7.2 MDScan 7.3 PDF Scrutinizer 7.4 Lux0R 7.5 PlatPal 8 Comparative Study Among Different Learning-Based PDF Malware Classifiers 9 Conclusion and Future Scope References MOLE: Multiparty Open Ledger Experiment, Concept and Simulation Using BlockChain Technology 1 Introduction 2 Blockchain Architecture 3 Various Initiatives of Government for Blockchain Technology 3.1 Initiatives 3.2 Industry Interaction 4 Properties of BlockChain Technology 4.1 Decentralization 4.2 Transparency 4.3 Immutability 4.4 Functioning of Blockchain Technology: Role of Hashing 5 Experimental Set Up: Simulation Performed 5.1 Aim and Objective of Virtual Lab 5.2 MOLE Algorithm 5.3 Simulation Using Virtual Lab 6 Conclusion References Intrusion Detection Based on Decision Tree Using Key Attributes of Network Traffic 1 Introduction 2 Data Mining in IDS 3 WEKA Tool 4 KDDCup 1999 5 Related Work 6 Algorithms Applied 6.1 J48 6.2 Random Forest 7 Experimental Result 7.1 Parameter 7.2 Results 8 Conclusion References An Extensive Review of Wireless Local Area Network Security Standards 1 Introduction 2 How Wi-Fi Works 3 Wireless LAN Security 3.1 Wired Equivalent Privacy 3.2 Wi-Fi Protect Access 3.3 WPA2/IEEE802.11i 4 Attacks on Wireless LAN 5 Basic Solutions for Mitigating Security Flaw in AP 6 Methodology of the Simulation 7 How to Reduce Chance of Attack 8 Conclusion References Security Concerns at Various Network Phases Through Blockchain Technology 1 Introduction 1.1 Application of Blockchain 2 Related Work 3 Parametric Measures in Blockchain 3.1 At Device Phase 3.2 At User Phase 3.3 At Data Phase 4 Conclusion References Smart Infrastructure and Resource Development and Management Using Artificial Intelligence and Machine learning Developing an Evaluation Model for Forecasting of Real Estate Prices 1 Introduction 2 Related Work 3 Research Methodology 3.1 Data Description 3.2 Data Analysis Process 4 Data Analysis 4.1 Descriptive Statistics 4.2 Correlation Matrix 4.3 Real Estate Valuation Model 5 Conclusion 6 Limitations and Future Research Directions References Memetic Optimal Approach for Economic Load Dispatch Problem with Renewable Energy Source in Realistic Power System 1 Introduction 2 ELD of Renewable Energy Integrated System 3 Problem Formulation 3.1 Economic Load Dispatch (ELD) Problem 4 Proposed Methodology 4.1 Mathematical Modelling of SMA 4.2 Pattern Search Algorithm (PS) 5 Results and Discussions 6 Conclusion References High-Throughput and Low-Latency Reconfigurable Routing Topology for Fast AI MPSoC Architecture 1 Introduction 2 Literature Survey 3 Problem Statement 4 Proposed Architecture 4.1 Architecture of a System on Chip 5 Experiment Results and Discussion 5.1 Performance Analysis 6 Conclusion References Comparison of Various Data Center Frameworks 1 Introduction 2 Literature Survey 3 Comparison of Frameworks 3.1 Four Pillar Frameworks 3.2 Energy Star Energy-Efficient Framework 3.3 Facebook Data Center 3.4 Google Data Center 3.5 EU Code of Conduct on Data Centers 3.6 Data Center Energy-Efficient Framework (DCEEF) 3.7 Green Grid Energy-Efficient Data Centers Framework 4 Proposed Green Data Center Framework 5 Conclusion References Soft Computing A New Solution for Multi-objective Optimization Problem Using Extended Swarm-Based MVMO 1 Introduction 1.1 Multi-objective Optimization 1.2 Search and Decision Making in MOP 1.3 Evolutionary Algorithms for MOP 1.4 Swarm Based Optimization 2 Literature Survey 2.1 Mean Variance Mapping Optimization 2.2 Local Search Algorithm 3 Proposed Methodology 4 Result and Analysis 5 Conclusion and Future Work References Improving Software Maintainability Prediction Using Hyperparameter Tuning of Baseline Machine Learning Algorithms 1 Introduction 2 Literature Review 3 Research Methodology 3.1 Metrics 3.2 Modeling Techniques 3.3 Hyperparameter Tuning 3.4 Cross-Validation Technique 3.5 Accuracy Measures 4 Results and Analysis 5 Threats to Validity 6 Conclusion and Future Scope References Karaoke Machine Execution Using Artificial Neural Network 1 Introduction 2 Literature Survey 3 Artificial Neural Network 4 Proposed Method 5 Observations and Results 6 Conclusion and Future Scope References A Review on Deep Learning Models for Short-Term Load Forecasting 1 Introduction 2 Methods or Approaches 3 Deep Learning Forecasting Models 3.1 Stacked Auto-encoder 3.2 Recurrent Neural Network 3.3 Convolution Neural Network 3.4 Deep Belief Network 4 Conclusion References An Evolutionary Approach to Combinatorial Gameplaying Using Extended Classifier Systems 1 Introduction 2 Motivation 3 Background 3.1 Checkers 3.2 Description of XCS 4 Technical Framework 4.1 Program Structure 4.2 The Board 5 Proposed XCS Agent 5.1 The Classifiers 5.2 Parameter Settings 5.3 Reinforcement Component 5.4 Evolutionary Component 5.5 Modifications to XCS 6 Result Analysis 7 Conclusion and Future Work References