دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Madhusudhan Mishra, Nishtha Kesswani, Imene Brigui سری: Springer Proceedings in Mathematics & Statistics, 417 ISBN (شابک) : 3031251938, 9783031251931 ناشر: Springer سال نشر: 2023 تعداد صفحات: 353 [354] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 14 Mb
در صورت تبدیل فایل کتاب Applications of Computational Intelligence in Management & Mathematics: 8th ICCM, Nirjuli, AP, India, July 29–30, 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب کاربردهای هوش محاسباتی در مدیریت و ریاضیات: هشتمین ICCM، Nirjuli، AP، هند، 29 تا 30 ژوئیه، 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
هوش محاسباتی شامل آن دسته از تکنیک هایی است که از مغز و طبیعت انسان برای اتخاذ رویکرد تصمیم گیری تقلید می کنند. این کتاب حاوی مقالات منتخب از هشتمین کنفرانس بینالمللی کامپیوتر، مدیریت و علوم ریاضی (ICCM) 2022 در مورد سیستمهای فازی، شبکههای عصبی و محاسبات تکاملی است که میتواند به محیطهای تصادفی بپردازد که در آن استدلال ویژگی مهمی برای استخراج راهحلهای بالقوه و تمرکز بر تجارت است. جنبه های محاسباتی دامنه این مجموعه مقالات کنفرانسی برای دانش پژوهان / دانشجویانی است که از الگوریتم ها، مفاهیم و اصول قدرتمند هوش محاسباتی در طیف گسترده ای از موارد تحقیقاتی استفاده می کنند.
Computational intelligence consists of those techniques that imitate the human brain and nature to adopt the decision-making approach. This book contains selected papers from the 8th International Conference on Computers, Management and Mathematical Sciences (ICCM) 2022 about fuzzy systems, neural networks and evolutionary computation that can address stochastic environments where reasoning is a significant attribute to derive potential solutions and focus on the business domain\'s computational aspects. This is a conference proceedings for scholars/students who are using the powerful algorithms, concepts and principles of computational intelligence in a wide spectrum of research cases.
Preface Organization Program Committee Chairs Program Committee Members Reviewers Contents Development of Energy Efficient Routing Protocol for Lifespan Optimization in Wireless Sensor Networks (EERP) 1 Introduction 2 Literature Review 3 Methodology and Proposed System 3.1 Cluster Head Selection and Data Transmission 4 Results and Discussions 5 Conclusion References Sentiment Analysis Using Social Media and Product Reviews 1 Introduction 2 Related Work 3 Methodology 3.1 Naïve Bayes Classifier 3.2 Support Vector Machine Classifier 3.3 Logistic Regression 4 Result and Discussion 5 Conclusion References A Stable Model for Learning and Memorization in Over-Parameterized Networks 1 Introduction 2 Related Work 3 Experimental Setup 4 Results 5 Conclusion References Analysis of Depth Sensing and Lane Detection Algorithms for Advanced Driver Assistance Systems 1 Introduction 1.1 Background 2 Proposed Strategy 2.1 Depth Estimation 2.1.1 Image Segmentation and Object Detection-Based Hybridized Approach 2.1.2 Pix2Pix Approach 2.1.3 U-Net 2.1.4 U-Net Backbones 2.1.5 U-Net ++ 2.1.6 U-Net 3 Results 4 Conclusion References Implementation of E-Commerce Application with Analytics 1 Introduction 2 Related Work/Literature Survey 2.1 Purpose 2.2 Interactive Web Interface for Association Rule Mining and Medical Applications 2.3 Wet Experiment Preparation 2.4 Methodology 3 Count++ 4 Result 4.1 Unsupervised Learning 4.2 Pattern Forecast Process 4.2.1 Accuracy 4.2.2 Customer Segmentation Using Data Mining Techniques 5 Conclusion References A Survey on the Latest Intrusions and Their Detection Systems in IoT-Based Network 1 Introduction 2 Motivation and Contributions 3 Architecture of IoT 3.1 IoT Protocols and Standards 3.1.1 IoT Data Protocols 3.1.2 Network Protocols for the IoT 4 IoT Vulnerabilities, Security Threats, and Attacks 4.1 Vulnerabilities 4.2 Security Threats and Attacks in IoT Paradigm 4.3 Security Concern Due to Threats and Attacks in IoT Networks 5 Solutions 6 Conclusion References Design and Analysis of Z-Source Inverter with Maximum Constant Boost Control Method 1 Introduction 2 Z-Source Inverter 2.1 Schematic Diagram 2.2 Operating Principle 2.3 Circuit Diagram for Different Operations and Analysis 3 Maximum Constant Boost Control 4 Simulation Results 4.1 Figures and Tables 5 Conclusion References SPV/Wind Energy-Based Hybrid Grid-Connected System with Optimum Power Flow Operation 1 Introduction 2 Various Standards 3 Grid-Connected Hybrid System Topology 3.1 Solar Model 3.2 Wind Model 3.3 MPPT of Solar and Wind 3.4 Inverter Bridge Model 3.5 Grid Synchronization 3.5.1 AANF 3.5.2 SOGI-PLL 3.6 Current Control Topology 3.7 Passive Islanding 4 Results and Discussion 5 Conclusion and Future Scope References A Study on Benchmarks for Ectopic Pregnancy Classification Using Deep Learning Based on Risk Criteria 1 Introduction 2 Literature Review 3 Benchmarks for Ectopic Pregnancy Classification Using Deep Learning 3.1 Risk Factor in Ectopic Pregnancy 3.2 Types of Ectopic Pregnancy and Their Locations 3.3 Symptoms Associated with Ectopic Pregnancy 3.4 Diagnosis 3.5 Treatment 3.6 Deep Learning in EP 4 Result and Discussion 5 Conclusion References An Ontology-Based Approach for Making Smart Suggestions Based on Sequence-Based Context Modeling and Deep Learning Classifications 1 Introduction 2 Literature Review 3 The Recommendation Model 3.1 User Profile and Context Information 3.2 Situation or Context Awareness 3.3 Use of Ontology 3.4 Experimental Setup 4 Conclusion References Simulation of GA-Based Harmonics Elimination in CHMLI Using DTC for Dynamic Load 1 Introduction 2 Cascaded H-Bridge Multilevel Inverter (CHMLI) 3 Dynamic Modelling of Induction Motor 3.1 Direct Torque Control (DTC) 4 Research Methodology 5 Simulation and Result 6 Conclusion A.1 Annexure I – Motor parameter References Discussing the Future Perspective of Machine Learning and Artificial Intelligence in COVID-19 Vaccination: A Review 1 Introduction 2 Basic Concept and Terminology 2.1 Machine Learning/Artificial Intelligence 2.2 Machine Learning and Artificial Intelligence in COVID-19 3 Materials and Methodology 3.1 Research Questions 3.2 Search Strategy 4 Results 4.1 Year-Wise Publication Process 4.2 Highly Cited Paper (Global Citations) 4.3 Authors Keyword Occurrence 4.4 Index Keyword Occurrence 5 Discussion and Future Trends 5.1 AI-/ML-Powered Vaccine and Antibody Development for COVID-19 Therapies 5.2 COVID-19 Vaccine Discovery 5.3 ML Being Used to Counter COVID-19 Vaccine Hesitancy 5.4 AI/ML in Delivery 6 Conclusion References Embedded Platform-Based Heart-Lung Sound Separation Using Variational Mode Decomposition 1 Introduction 2 Related Work 3 Methodology 3.1 Variational Mode Decomposition 3.2 Data Acquisition 3.3 Experimental Setup 4 Results and Discussion 5 Conclusion References MIMO: Modulation Schemes for Visible Light Communication in Indoor Scenarios 1 Introduction 2 Literature Survey 2.1 Channel Models for VLC 2.2 MIMO Techniques for VLC 3 Work Done 3.1 Impulse Response for Indoor Channel 3.2 Results and Discussions 3.3 Generalized Spatial Modulation (GSM) 3.4 System Model 3.5 GSM Signal Detection 3.6 Results and Discussions References Image Resampling Forensics: A Review on Techniques for Image Authentication 1 Introduction 2 Resampling of Images 3 Resampling Detection Using Conventional Detection Methods 4 Resampling Detection Using Deep-Learning-Based Approaches 5 Datasets 6 Conclusions and Future Directions References The Impact of Perceived Justice and Customer Trust on Customer Loyalty 1 Introduction 2 Literature Review and Hypothesis 3 Method 3.1 Participants 3.2 Measures 4 Results 4.1 Scale Reliability and Validity 4.2 Path Relations 5 Discussion 6 Managerial Implications for Practice 7 Limitations 8 Conclusion References Performance Analysis of Wind Diesel Generation with Three-Phase Fault 1 Introduction 2 Wind Turbine Generation 2.1 Technology of the Wind Turbine 2.2 Fixed Energy Conversion System 2.3 Fixed Energy Conversion System 3 Diesel Engine Generation 4 Electrical Energy Controlling System 5 Simulink Model of Proposed System 6 Result Analysis 6.1 Fixed Energy Conversion System 6.2 Fixed Energy Conversion System 6.3 Fixed Energy Conversion System 7 Conclusions References C-RPI: Cluster-Based Rendezvous Point Identification and Mobile Sink-Based Data Collection in LR-WPAN 1 Introduction 2 Related Works 3 Proposed Work 3.1 Network Scenario 3.2 Overview of Proposed Algorithms 3.2.1 Neighbor Discovery Phase 3.2.2 Initial Sink Path Planning Phase 3.2.3 RP Selection Phase 3.2.4 Optimal Path Selection Phase 3.2.5 Data Collection Phase 4 Performance Evaluation 5 Conclusion References Effect of Weather on the COVID-19 Pandemic in North East India 1 Introduction 2 NE Indian History of COVID-19 3 Methodology 4 Result and Discussion 5 Conclusion References A Comparative Study on the Performance of Soft Computing Models in the Prediction of Orthopaedic Disease in the Environment of Internet of Things 1 Introduction 2 Literature Review 3 Content and Problem Statement 4 Methodology 4.1 Multivariate Statistical Tool 4.1.1 Factor Analysis 4.1.2 Principal Component Analysis (PCA) 4.2 Fuzzy Logic 4.3 Neural Network 4.4 Evolutionary Algorithm 4.5 Particle Swarm Optimization 4.6 Harmony Search (HS) Algorithm 4.7 Average Error, Residual Analysis, AIC, and BIC 4.8 Dunn Index, Davies-Bouldin (DB) Index, and Silhoutte Index 4.8.1 Dunn Index 4.8.2 Davies-Bouldin (DB) Index 4.8.3 Silhouette Index 5 Implementation 5.1 Comparison on the Performance of Factor Analysis and Principal Component Analysis 5.2 Contribution of Neural Network, Evolutionary Algorithm, Particle Swarm Optimization, and Harmony Search (HS) Algorithm 5.3 Contribution of Clustering Algorithm 5.4 Testing of Orthopaedic Disorder Using New Data Comprising Vertebral Parameter Values 6 Result 7 Conclusion 8 Theoretical/Managerial Implications References Maximization of Active Power Delivery in WECS Using BDFRG Nomenclature 1 Introduction 2 Constructional Features of BDFRG 3 Dynamic Modeling of BDFRG 4 Simulation of Active and Reactive Power Control 5 Results 6 Discussions 7 Conclusion References Identification and Detection of Credit Card Frauds Using CNN 1 Introduction 1.1 Credit Card Frauds 1.2 Supervised Learning Algorithms 2 Literature Review 3 Proposed Work 3.1 Smart Matrix Algorithm Applied for Feature Sequencing 4 Experimental Results 4.1 Convolutional Feature Sequencing 4.2 Three-Layered Convolutional Neural Network 4.3 Performance Metrics Graphs 4.3.1 Confusion Matrix 4.4 Sensitivity/True Positive Rate 4.5 False Positive Rate/False Alarm Rate (FAR) 4.6 Balanced Categorization Rate (BCR) 4.7 Matthew's Correlation Coefficient (MCC) 4.8 F1 Score 5 Conclusion and Future Work References Different Degradation Modes of Field-Deployed Photovoltaic Modules: A Literature Review 1 Introduction 2 PV Module Degradation 2.1 Potential Induced Degradation (PID) 2.2 Bypass Diode Failures (BDF) 2.3 Light-Induced Degradation (LID) 2.4 Cracked/Damaged Cells 3 Conclusion References Impact of Security Attacks on Spectrum Allocation in Cognitive Radio Networks 1 Introduction 2 Related Works 3 System Model 4 A Distributed Resource Allocation Method 4.1 Channel Ecto-Parasite Attack (CEPA) 4.2 Network Endo-Parasite Attack (NEPA) 4.3 LOw-Cost Ripple Effect Attack (LORA) 5 Simulation and Performance Evaluation 6 Conclusions References Human Activity Detection Using Attention-Based Deep Network 1 Introduction 2 Related Works 3 Proposed Methodology 3.1 DenseNet 3.2 LSTM 3.3 Attention Mechanism 4 Implementation 5 Conclusion References Software Vulnerability Classification Using Learning Techniques 1 Introduction 2 Previous Related Work 3 Methodology 3.1 Dataset Description 3.2 Tokenization 3.3 Case Changing 3.4 Removal of Punctuation Symbols, Stop Words, Numbers, and Special Symbols 3.5 Word Lemmatizer 3.6 Feature Selection and Extraction Computation and Target Label Fixation 3.7 Train and Test Methods 4 Results and Discussion 5 Conclusion References Service Recovery: Past, Present, and Future 1 Introduction 2 Research Domain 3 Method 3.1 Journals 4 Results 4.1 Review of Methods 5 Directions and Future Research 6 Conclusion References An In-depth Accessibility Analysis of Top Online Shopping Websites 1 Introduction 2 Preliminaries 3 Related Work 3.1 Online Shopping 3.2 Website Accessibility 4 Research Methods 4.1 Data Collection and Research Tools 4.2 Data Analysis and Procedure 5 Results 5.1 Accessibility Analysis 5.2 Website Classification 5.3 Correlation Analysis 6 Recommendations for Improvement 7 Discussion 8 Conclusion References Index