ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Applications of Computational Intelligence in Management & Mathematics: 8th ICCM, Nirjuli, AP, India, July 29–30, 2022

دانلود کتاب کاربردهای هوش محاسباتی در مدیریت و ریاضیات: هشتمین ICCM، Nirjuli، AP، هند، 29 تا 30 ژوئیه، 2022

Applications of Computational Intelligence in Management & Mathematics: 8th ICCM, Nirjuli, AP, India, July 29–30, 2022

مشخصات کتاب

Applications of Computational Intelligence in Management & Mathematics: 8th ICCM, Nirjuli, AP, India, July 29–30, 2022

ویرایش:  
نویسندگان: , ,   
سری: Springer Proceedings in Mathematics & Statistics, 417 
ISBN (شابک) : 3031251938, 9783031251931 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 353
[354] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 Mb 

قیمت کتاب (تومان) : 31,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 1


در صورت تبدیل فایل کتاب Applications of Computational Intelligence in Management & Mathematics: 8th ICCM, Nirjuli, AP, India, July 29–30, 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب کاربردهای هوش محاسباتی در مدیریت و ریاضیات: هشتمین ICCM، Nirjuli، AP، هند، 29 تا 30 ژوئیه، 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب کاربردهای هوش محاسباتی در مدیریت و ریاضیات: هشتمین ICCM، Nirjuli، AP، هند، 29 تا 30 ژوئیه، 2022

هوش محاسباتی شامل آن دسته از تکنیک هایی است که از مغز و طبیعت انسان برای اتخاذ رویکرد تصمیم گیری تقلید می کنند. این کتاب حاوی مقالات منتخب از هشتمین کنفرانس بین‌المللی کامپیوتر، مدیریت و علوم ریاضی (ICCM) 2022 در مورد سیستم‌های فازی، شبکه‌های عصبی و محاسبات تکاملی است که می‌تواند به محیط‌های تصادفی بپردازد که در آن استدلال ویژگی مهمی برای استخراج راه‌حل‌های بالقوه و تمرکز بر تجارت است. جنبه های محاسباتی دامنه این مجموعه مقالات کنفرانسی برای دانش پژوهان / دانشجویانی است که از الگوریتم ها، مفاهیم و اصول قدرتمند هوش محاسباتی در طیف گسترده ای از موارد تحقیقاتی استفاده می کنند.


توضیحاتی درمورد کتاب به خارجی

Computational intelligence consists of those techniques that imitate the human brain and nature to adopt the decision-making approach. This book contains selected papers from the 8th International Conference on Computers, Management and Mathematical Sciences (ICCM) 2022 about fuzzy systems, neural networks and evolutionary computation that can address stochastic environments where reasoning is a significant attribute to derive potential solutions and focus on the business domain\'s computational aspects. This is a conference proceedings for scholars/students who are using the powerful algorithms, concepts and principles of computational intelligence in a wide spectrum of research cases.



فهرست مطالب

Preface
Organization
	Program Committee Chairs
	Program Committee Members
	Reviewers
Contents
Development of Energy Efficient Routing Protocol for Lifespan Optimization in Wireless Sensor Networks (EERP)
	1 Introduction
	2 Literature Review
	3 Methodology and Proposed System
		3.1 Cluster Head Selection and Data Transmission
	4 Results and Discussions
	5 Conclusion
	References
Sentiment Analysis Using Social Media and Product Reviews
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Naïve Bayes Classifier
		3.2 Support Vector Machine Classifier
		3.3 Logistic Regression
	4 Result and Discussion
	5 Conclusion
	References
A Stable Model for Learning and Memorization in Over-Parameterized Networks
	1 Introduction
	2 Related Work
	3 Experimental Setup
	4 Results
	5 Conclusion
	References
Analysis of Depth Sensing and Lane Detection Algorithms for Advanced Driver Assistance Systems
	1 Introduction
		1.1 Background
	2 Proposed Strategy
		2.1 Depth Estimation
			2.1.1 Image Segmentation and Object Detection-Based Hybridized Approach
			2.1.2 Pix2Pix Approach
			2.1.3 U-Net
			2.1.4 U-Net Backbones
			2.1.5 U-Net ++
			2.1.6 U-Net
	3 Results
	4 Conclusion
	References
Implementation of E-Commerce Application with Analytics
	1 Introduction
	2 Related Work/Literature Survey
		2.1 Purpose
		2.2 Interactive Web Interface for Association Rule Mining and Medical Applications
		2.3 Wet Experiment Preparation
		2.4 Methodology
	3 Count++
	4 Result
		4.1 Unsupervised Learning
		4.2 Pattern Forecast Process
			4.2.1 Accuracy
			4.2.2 Customer Segmentation Using Data Mining Techniques
	5 Conclusion
	References
A Survey on the Latest Intrusions and Their Detection Systems in IoT-Based Network
	1 Introduction
	2 Motivation and Contributions
	3 Architecture of IoT
		3.1 IoT Protocols and Standards
			3.1.1 IoT Data Protocols
			3.1.2 Network Protocols for the IoT
	4 IoT Vulnerabilities, Security Threats, and Attacks
		4.1 Vulnerabilities
		4.2 Security Threats and Attacks in IoT Paradigm
		4.3 Security Concern Due to Threats and Attacks in IoT Networks
	5 Solutions
	6 Conclusion
	References
Design and Analysis of Z-Source Inverter with Maximum Constant Boost Control Method
	1 Introduction
	2 Z-Source Inverter
		2.1 Schematic Diagram
		2.2 Operating Principle
		2.3 Circuit Diagram for Different Operations and Analysis
	3 Maximum Constant Boost Control
	4 Simulation Results
		4.1 Figures and Tables
	5 Conclusion
	References
SPV/Wind Energy-Based Hybrid Grid-Connected System with Optimum Power Flow Operation
	1 Introduction
	2 Various Standards
	3 Grid-Connected Hybrid System Topology
		3.1 Solar Model
		3.2 Wind Model
		3.3 MPPT of Solar and Wind
		3.4 Inverter Bridge Model
		3.5 Grid Synchronization
			3.5.1 AANF
			3.5.2 SOGI-PLL
		3.6 Current Control Topology
		3.7 Passive Islanding
	4 Results and Discussion
	5 Conclusion and Future Scope
	References
A Study on Benchmarks for Ectopic Pregnancy Classification Using Deep Learning Based on Risk Criteria
	1 Introduction
	2 Literature Review
	3 Benchmarks for Ectopic Pregnancy Classification Using Deep Learning
		3.1 Risk Factor in Ectopic Pregnancy
		3.2 Types of Ectopic Pregnancy and Their Locations
		3.3 Symptoms Associated with Ectopic Pregnancy
		3.4 Diagnosis
		3.5 Treatment
		3.6 Deep Learning in EP
	4 Result and Discussion
	5 Conclusion
	References
An Ontology-Based Approach for Making Smart Suggestions Based on Sequence-Based Context Modeling and Deep Learning Classifications
	1 Introduction
	2 Literature Review
	3 The Recommendation Model
		3.1 User Profile and Context Information
		3.2 Situation or Context Awareness
		3.3 Use of Ontology
		3.4 Experimental Setup
	4 Conclusion
	References
Simulation of GA-Based Harmonics Elimination in CHMLI Using DTC for Dynamic Load
	1 Introduction
	2 Cascaded H-Bridge Multilevel Inverter (CHMLI)
	3 Dynamic Modelling of Induction Motor
		3.1 Direct Torque Control (DTC)
	4 Research Methodology
	5 Simulation and Result
	6 Conclusion
	A.1 Annexure I – Motor parameter
	References
Discussing the Future Perspective of Machine Learning and Artificial Intelligence in COVID-19 Vaccination: A Review
	1 Introduction
	2 Basic Concept and Terminology
		2.1 Machine Learning/Artificial Intelligence
		2.2 Machine Learning and Artificial Intelligence in COVID-19
	3 Materials and Methodology
		3.1 Research Questions
		3.2 Search Strategy
	4 Results
		4.1 Year-Wise Publication Process
		4.2 Highly Cited Paper (Global Citations)
		4.3 Authors Keyword Occurrence
		4.4 Index Keyword Occurrence
	5 Discussion and Future Trends
		5.1 AI-/ML-Powered Vaccine and Antibody Development for COVID-19 Therapies
		5.2 COVID-19 Vaccine Discovery
		5.3 ML Being Used to Counter COVID-19 Vaccine Hesitancy
		5.4 AI/ML in Delivery
	6 Conclusion
	References
Embedded Platform-Based Heart-Lung Sound Separation Using Variational Mode Decomposition
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Variational Mode Decomposition
		3.2 Data Acquisition
		3.3 Experimental Setup
	4 Results and Discussion
	5 Conclusion
	References
MIMO: Modulation Schemes for Visible Light Communication in Indoor Scenarios
	1 Introduction
	2 Literature Survey
		2.1 Channel Models for VLC
		2.2 MIMO Techniques for VLC
	3 Work Done
		3.1 Impulse Response for Indoor Channel
		3.2 Results and Discussions
		3.3 Generalized Spatial Modulation (GSM)
		3.4 System Model
		3.5 GSM Signal Detection
		3.6 Results and Discussions
	References
Image Resampling Forensics: A Review on Techniques for Image Authentication
	1 Introduction
	2 Resampling of Images
	3 Resampling Detection Using Conventional Detection Methods
	4 Resampling Detection Using Deep-Learning-Based Approaches
	5 Datasets
	6 Conclusions and Future Directions
	References
The Impact of Perceived Justice and Customer Trust on Customer Loyalty
	1 Introduction
	2 Literature Review and Hypothesis
	3 Method
		3.1 Participants
		3.2 Measures
	4 Results
		4.1 Scale Reliability and Validity
		4.2 Path Relations
	5 Discussion
	6 Managerial Implications for Practice
	7 Limitations
	8 Conclusion
	References
Performance Analysis of Wind Diesel Generation with Three-Phase Fault
	1 Introduction
	2 Wind Turbine Generation
		2.1 Technology of the Wind Turbine
		2.2 Fixed Energy Conversion System
		2.3 Fixed Energy Conversion System
	3 Diesel Engine Generation
	4 Electrical Energy Controlling System
	5 Simulink Model of Proposed System
	6 Result Analysis
		6.1 Fixed Energy Conversion System
		6.2 Fixed Energy Conversion System
		6.3 Fixed Energy Conversion System
	7 Conclusions
	References
C-RPI: Cluster-Based Rendezvous Point Identification and Mobile Sink-Based Data Collection in LR-WPAN
	1 Introduction
	2 Related Works
	3 Proposed Work
		3.1 Network Scenario
		3.2 Overview of Proposed Algorithms
			3.2.1 Neighbor Discovery Phase
			3.2.2 Initial Sink Path Planning Phase
			3.2.3 RP Selection Phase
			3.2.4 Optimal Path Selection Phase
			3.2.5 Data Collection Phase
	4 Performance Evaluation
	5 Conclusion
	References
Effect of Weather on the COVID-19 Pandemic in North East India
	1 Introduction
	2 NE Indian History of COVID-19
	3 Methodology
	4 Result and Discussion
	5 Conclusion
	References
A Comparative Study on the Performance of Soft Computing Models in the Prediction of Orthopaedic Disease in the Environment of Internet of Things
	1 Introduction
	2 Literature Review
	3 Content and Problem Statement
	4 Methodology
		4.1 Multivariate Statistical Tool
			4.1.1 Factor Analysis
			4.1.2 Principal Component Analysis (PCA)
		4.2 Fuzzy Logic
		4.3 Neural Network
		4.4 Evolutionary Algorithm
		4.5 Particle Swarm Optimization
		4.6 Harmony Search (HS) Algorithm
		4.7 Average Error, Residual Analysis, AIC, and BIC
		4.8 Dunn Index, Davies-Bouldin (DB) Index, and Silhoutte Index
			4.8.1 Dunn Index
			4.8.2 Davies-Bouldin (DB) Index
			4.8.3 Silhouette Index
	5 Implementation
		5.1 Comparison on the Performance of Factor Analysis and Principal Component Analysis
		5.2 Contribution of Neural Network, Evolutionary Algorithm, Particle Swarm Optimization, and Harmony Search (HS) Algorithm
		5.3 Contribution of Clustering Algorithm
		5.4 Testing of Orthopaedic Disorder Using New Data Comprising Vertebral Parameter Values
	6 Result
	7 Conclusion
	8 Theoretical/Managerial Implications
	References
Maximization of Active Power Delivery in WECS Using BDFRG
	Nomenclature
	1 Introduction
	2 Constructional Features of BDFRG
	3 Dynamic Modeling of BDFRG
	4 Simulation of Active and Reactive Power Control
	5 Results
	6 Discussions
	7 Conclusion
	References
Identification and Detection of Credit Card Frauds Using CNN
	1 Introduction
		1.1 Credit Card Frauds
		1.2 Supervised Learning Algorithms
	2 Literature Review
	3 Proposed Work
		3.1 Smart Matrix Algorithm Applied for Feature Sequencing
	4 Experimental Results
		4.1 Convolutional Feature Sequencing
		4.2 Three-Layered Convolutional Neural Network
		4.3 Performance Metrics Graphs
			4.3.1 Confusion Matrix
		4.4 Sensitivity/True Positive Rate
		4.5 False Positive Rate/False Alarm Rate (FAR)
		4.6 Balanced Categorization Rate (BCR)
		4.7 Matthew's Correlation Coefficient (MCC)
		4.8 F1 Score
	5 Conclusion and Future Work
	References
Different Degradation Modes of Field-Deployed Photovoltaic Modules: A Literature Review
	1 Introduction
	2 PV Module Degradation
		2.1 Potential Induced Degradation (PID)
		2.2 Bypass Diode Failures (BDF)
		2.3 Light-Induced Degradation (LID)
		2.4 Cracked/Damaged Cells
	3 Conclusion
	References
Impact of Security Attacks on Spectrum Allocation in Cognitive Radio Networks
	1 Introduction
	2 Related Works
	3 System Model
	4 A Distributed Resource Allocation Method
		4.1 Channel Ecto-Parasite Attack (CEPA)
		4.2 Network Endo-Parasite Attack (NEPA)
		4.3 LOw-Cost Ripple Effect Attack (LORA)
	5 Simulation and Performance Evaluation
	6 Conclusions
	References
Human Activity Detection Using Attention-Based Deep Network
	1 Introduction
	2 Related Works
	3 Proposed Methodology
		3.1 DenseNet
		3.2 LSTM
		3.3 Attention Mechanism
	4 Implementation
	5 Conclusion
	References
Software Vulnerability Classification Using Learning Techniques
	1 Introduction
	2 Previous Related Work
	3 Methodology
		3.1 Dataset Description
		3.2 Tokenization
		3.3 Case Changing
		3.4 Removal of Punctuation Symbols, Stop Words, Numbers, and Special Symbols
		3.5 Word Lemmatizer
		3.6 Feature Selection and Extraction Computation and Target Label Fixation
		3.7 Train and Test Methods
	4 Results and Discussion
	5 Conclusion
	References
Service Recovery: Past, Present, and Future
	1 Introduction
	2 Research Domain
	3 Method
		3.1 Journals
	4 Results
		4.1 Review of Methods
	5 Directions and Future Research
	6 Conclusion
	References
An In-depth Accessibility Analysis of Top Online Shopping Websites
	1 Introduction
	2 Preliminaries
	3 Related Work
		3.1 Online Shopping
		3.2 Website Accessibility
	4 Research Methods
		4.1 Data Collection and Research Tools
		4.2 Data Analysis and Procedure
	5 Results
		5.1 Accessibility Analysis
		5.2 Website Classification
		5.3 Correlation Analysis
	6 Recommendations for Improvement
	7 Discussion
	8 Conclusion
	References
Index




نظرات کاربران