ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2020 (Advances in Intelligent Systems and Computing, 1120)

دانلود کتاب هوش محاسباتی در تشخیص الگو: مجموعه مقالات CIPR 2020 (پیشرفت ها در سیستم های هوشمند و محاسبات، 1120)

Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2020 (Advances in Intelligent Systems and Computing, 1120)

مشخصات کتاب

Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2020 (Advances in Intelligent Systems and Computing, 1120)

ویرایش:  
نویسندگان: , , , ,   
سری:  
ISBN (شابک) : 9811524483, 9789811524486 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 593 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 21 مگابایت 

قیمت کتاب (تومان) : 51,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 13


در صورت تبدیل فایل کتاب Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2020 (Advances in Intelligent Systems and Computing, 1120) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب هوش محاسباتی در تشخیص الگو: مجموعه مقالات CIPR 2020 (پیشرفت ها در سیستم های هوشمند و محاسبات، 1120) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب هوش محاسباتی در تشخیص الگو: مجموعه مقالات CIPR 2020 (پیشرفت ها در سیستم های هوشمند و محاسبات، 1120)



این کتاب دارای مقالات تحقیقاتی با کیفیت بالا است که در دومین کنفرانس بین‌المللی هوش محاسباتی در تشخیص الگو (CIPR 2020)، که در مؤسسه مهندسی و مدیریت، کلکته، بنگال غربی، هند برگزار شد، در 4- 5 ژانویه 2020. شامل تجربیات توسعه عملی در زمینه های مختلف تجزیه و تحلیل داده ها و تشخیص الگو، تمرکز بر فناوری های محاسباتی نرم، الگوریتم های خوشه بندی و طبقه بندی، نظریه مجموعه های ناهموار و فازی، محاسبات تکاملی، علوم عصبی و سیستم های شبکه عصبی، پردازش تصویر، تطبیق الگوی ترکیبی، تجزیه و تحلیل شبکه های اجتماعی، تجزیه و تحلیل داده های صوتی و تصویری، داده کاوی در محیط های پویا، بیوانفورماتیک، محاسبات ترکیبی، تجزیه و تحلیل داده های بزرگ و یادگیری عمیق. همچنین راه‌حل‌های نوآورانه‌ای برای چالش‌های موجود در این زمینه‌ها ارائه می‌کند و تحولات اخیر را مورد بحث قرار می‌دهد.


توضیحاتی درمورد کتاب به خارجی

This book features high-quality research papers presented at the 2nd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2020), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 4–5 January 2020. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.



فهرست مطالب

CIPR Committee
	Chief Patron
	Patron
	Honorary Advisory Chair
	Honorary General Chair
	General Chair
	Programme Chair
	Organizing Chair
	International Advisory Committee
	National Advisory Committee
	Technical Committee
	Publicity Chair
	Logistic Chair
	Convenors
	Co-convenors
	Publication Chair
	Finance Chair
	CIPR Reviewers
Preface
Acknowledgements
About the Conference
Contents
About the Editors
Predicting Dynamic Product Price by Online Analysis: Modified K-Means Cluster
	1 Introduction
	2 Big Data Mining and Analysis of Dynamic Product Price
		2.1 Big Data Challenges and Analytics
		2.2 Opportunities, Open Issues and Challenges
		2.3 K-Means and Modified K-Means Algorithm
	3 Proposed Methodology
	4 Findings and Analysis
		4.1 Finding Based on K-Means Algorithm
	5 Finding Based on Modified K-Means Algorithm
	6 Computation of Dataset Using Modified K-Means Cluster
	7 Conclusions
	References
Nearest Neighbor-Based Differential Evolution for Reconstructing Gene Regulatory Network
	1 Introduction
	2 Literature Review
	3 Problem Description
	4 Methodology
		4.1 Recurrent Neural Network (RNN) Model
		4.2 Differential Evolution (DE)
		4.3 Performance Metric
	5 Experimental Study
		5.1 Results and Discussion
	6 Conclusion and Future Scope
	References
Inference-Based Statistical Analysis for Suspicious Activity Detection Using Facial Analysis
	1 Introduction
		1.1 Suspicious Activity
		1.2 Social Crime Status at World Level
		1.3 Face Recognition
		1.4 Algorithm of Face Recognition Tools and Techniques
		1.5 Classification
		1.6 Association (Dependency Modeling)
		1.7 Clustering
	2 Literature Survey and Previous Work
	3 Methodology—SVM, Dlib, CNN, RNN
	4 Results and Discussion
	5 Product Perspective—Web site/App Snapshots
		5.1 Module 1: Face Detection
		5.2 Module 2: Face Expression Recognition
	6 Recommendations
	7 Novelty of Our Work
	8 Future Scope
	9 Limitations
	10 Applications
	11 Conclusions
	References
A Conceptual Approach for Framework to Design Radar System Using Arduino with Initial Experiments
	1 Introduction
	2 Circuits Designing in Literature Review
	3 Experiment Description
		3.1 Arduino Uno R3
		3.2 Servo Motors
		3.3 Ultrasonic Sensors
		3.4 Liquid Crystal Display (LCD)
		3.5 Use of Arduino Software
	4 Connections
		4.1 Arduino to Servo Motors
		4.2 Arduino to Ultrasonic Sensors
		4.3 Arduino to LCD
	5 Applications
		5.1 Air Force
		5.2 Application in Army
		5.3 Naval Application
	6 Experimental Setup in Our Study
		6.1 Wood Obstacle
		6.2 Clothes Obstacle
	7 Novelty
	8 Future Scope
	9 Process Involved
	10 Advantages Over Others
	11 Business Plans
	12 Future Works
	13 Recommendations
	14 Limitations
	15 Conclusions
	References
Implementing Brain–Machine Interface (BMI) with Smart Computing
	1 Introduction
		1.1 BMI and Smart Computing
	2 Literature Review
	3 System Design
	4 Algorithms Involved
	5 Security Methods
	6 Applications
	7 Limitations
	8 Conclusion
	References
Stratification of Indian Dance Forms Through Audio Signal
	1 Introduction
	2 Previous Works
	3 Proposed Methodology
		3.1 Computation of Features
		3.2 Classification
	4 Experimental Results
		4.1 Relative Analysis
	5 Conclusion
	References
Forecasting House Price with an Optimum Set of Features
	1 Introduction
	2 Related Works
	3 The Effort Process
		3.1 Facet Description
		3.2 Facet Assortment
		3.3 Machine Erudition Techniques
		3.4 Performance Measurement
	4 Experimental Results
	5 Conclusion
	References
Speech-Based Emotion Classification for Human by Introducing Upgraded Long Short-Term Memory (ULSTM)
	1 Introduction
		1.1 Related Work
	2 Proposed Methodology
		2.1 Feature Extraction
		2.2 Convolutional Neural Networks (CNN)
		2.3 Recurrent Neural Networks (RNN)
		2.4 Gated Recurrent Unit (GRU)
		2.5 Long Short-Term Memory Network (LSTM)
		2.6 Upgraded Long Short-Term Memory (ULSTM)
	3 Result Analysis
		3.1 Comparative Study
	4 Conclusion
	References
Study of Sentiment Analysis in Mental Health Using Speech Recognition and Image to Text Conversion
	1 Introduction
		1.1 Speech Recognition
		1.2 Image to Text Conversion
	2 Literature Review
		2.1 Sentiment Analysis
		2.2 Benefits of Sentiment Analysis
		2.3 Mental Health
	3 Methodology
	4 Analysis and Result
	5 Summary and Conclusion
	References
Differential Evolution Optimized Fuzzy PID Controller for Automatic Generation Control of Interconnected Power System
	1 Introduction
	2 System Investigation
	3 Differential Evolution (DE)
	4 Result and Analysis
	5 Conclusion
	Appendix
	References
Deep Learning-Based Automated Feature Engineering for Rice Leaf Disease Prediction
	1 Introduction
	2 Image Processing for Collecting Rice Plant Diseased Images
	3 Proposed CNN-Based Rice Disease Prediction Model
	4 Experimental Results
	5 Conclusion and Future Scope
	References
Literature Survey on Log-Based Anomaly Detection Framework in Cloud
	1 Introduction
	2 Cloud Attacks Classification
		2.1 Network-Based Attack
		2.2 Virtual Machine (VM)-Based Attack
		2.3 Storage-Based Attack
		2.4 Application-Based Attack
	3 Contributions, Limitations of Existing Approach
	4 Conclusion
	References
Feature Extraction and Disease Prediction from Paddy Crops Using Data Mining Techniques
	1 Introduction
	2 Image Processing and Feature Extraction from Diseased Rice Images
		2.1 Noise Removal
		2.2 Shadow Removal
		2.3 Image Enhancement
		2.4 Image Segmentation
		2.5 Feature Extraction
	3 Data Mining Techniques for Rice Disease Prediction
		3.1 Similarity Measure
		3.2 Closure Property of a Feature
	4 Result and Discussions
	5 Conclusion
	References
Estimating Software Effort Using Neural Network: An Experimental Investigation
	1 Introduction
	2 Literature Review
	3 Basic Preliminary—Artificial Neural Network
	4 Work Done
	5 Experimental Setup
		5.1 Orange—Visual Programming
		5.2 Dataset Description
		5.3 Configuring the Various Models for Predicting the Software Effort Estimate Using Orange Tool
		5.4 Details of Software Effort Estimation Using BPNN
		5.5 Methodology
	6 Results
	7 Conclusion
	References
Statistical Analysis on Efficacy of Yagya Therapy for Type-2 Diabetic Mellitus Patients Through Various Parameters
	1 Introduction
	2 Literature Survey
	3 Objective and Aims
	4 Methodology and Material
	5 Mode of Treatment
	6 Method of Yagya Therapy
	7 Required Material for Therapy
	8 Treatment Schedule Duration
	9 Follow-up
	10 The Process of Therapy
		10.1 Session I—Pre-Yagya Therapy Session
		10.2 Session II—Main Yagya Therapy Session
		10.3 Session III—Post Yagya Therapy Session with Duration: 30 Min
	11 Pathya-Apathya and Dincharya (the Prescribed Diet Schedule)
	12 Selection Criteria of Patient
		12.1 Inclusion Criteria
		12.2 Exclusion Criteria
		12.3 Assessment Criteria
	13 Observations
	14 Results and Interpretations
	15 Graph Analysis and Discussion
	16 Conclusion
	17 Acknowledgement
	18 Limitations of the Study
	19 Funding
	20 Ethics Issue
	Annexure-1–the List of Special Herbs Used for Diabetes
	Annexure-2–List of Asans Performed by Subjects
	References
A Proposed Gene Selection Approach for Disease Detection
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
	4 Analysis and Result
	5 Summary and Conclusion
	References
Deep Recurrent Neural Network (Deep-RNN) for Classification of Nonlinear Data
	1 Introduction
	2 Proposed Work
		2.1 Recurrent Neural Network
	3 Implemented Method of Deep-RNN
	4 Results and Discussion
	5 Conclusions
	References
Elephant Herding Optimization for Multiprocessor Task Scheduling in Heterogeneous Environment
	1 Introduction
	2 The Problem
	3 Implemented Elephant Herding Optimization Algorithm
	4 Task Allotment Using EHO
	5 Simulation Results
	6 Conclusion
	7 Future Work
	References
Analysis of Parallel M5P and Random Forest Regression for Visualization of Traffic Behavior
	1 Introduction
	2 Methodology
		2.1 Flow of Experimentation
		2.2 Knowledge Development
		2.3 M5P Rules
		2.4 Random Forest Regression Algorithm
		2.5 Traffic Data Acquisition
		2.6 Traffic Prediction and Visualization
	3 Spark Architecture
	4 Results
		4.1 Evaluation
		4.2 Experiments
		4.3 Visualization
	5 Conclusion
	References
Software Effort Estimation Using Particle Swarm Optimization: Advances and Challenges
	1 Introduction
	2 Software Effort Estimation
	3 Particle Swarm Optimization
	4 Importance of Particle Swarm Optimization in SEE
	5 Variants of Particle Swarm Optimization Used for Software Effort Estimation
	6 Critical Analysis
	7 Conclusion
	References
Modern Trends in Monitoring and Analysis of Chemical Pesticides by Using Artificial Neural Networks
	1 Introduction
	2 Methodology
	3 Result
	4 Conclusion
	References
Semi-supervised Change Detection Technique on Remote Sensing Images Using Posterior Probabilities
	1 Introduction
	2 Proposed Algorithm
	3 Experimental Results
	4 Conclusion
	References
Feature Engineering for Cardio-Thoracic Disease Detection from NIH Chest Radiographs
	1 Introduction
		1.1 The Data
		1.2 Medical Imaging
	2 Methodology
		2.1 Preparing the Data
		2.2 Feature Engineering
		2.3 The Model
		2.4 Image Segmentation
	3 Conclusion
	4 Results
		4.1 Future Work
	References
Wireless Body Area Network: An Application of IoT and Its Issuses—A Survey
	1 Introduction
	2 Wireless Body Area Network (WBAN)
		2.1 WBAN Three-Tier Architecture
		2.2 Communication Standard
	3 Security and Privacy Issues in WBAN
	4 Application
	5 Drawbacks
	6 Conclusion
	References
Enhancing Security for Communication in Wireless Sensor Network
	1 Introduction
	2 Related Work
	3 Proposed System
	4 Conclusion
	References
Dimension Reduction of Microarray Data Using Gene Ontology and Correlation Filter
	1 Introduction
	2 Methodology
		2.1 Dataset Preparation
		2.2 Classification of Genes
		2.3 Gene Correlation Filter
	3 Significance of Independent Component(IC) Terms
	4 Experimental Results
	5 Conclusion
	References
Modified Contrast Enhancement Algorithm Using Numerical Integration Simpson\'s Method
	1 Introduction
	2 Background
	3 Proposed Method
	4 Result Analysis
	5 Conclusion
	References
WHMS: An Efficient Wireless NoC Design for Better Communication Efficiency
	1 Introduction
	2 Related Work
	3 Proposed Architecture
		3.1 Proposed Hybrid Topology
		3.2 Router Design
		3.3 Deadlock Avoidance
	4 Overall Communication Components
	5 Performance Analysis
		5.1 Performance Metrics
	6 Conclusion
	References
Data Hiding Based on Decagon-Shaped Shell
	1 Introduction
	2 Related Works
	3 Proposed Scheme
		3.1 Construction of Reference Matrix
		3.2 Data Embedding
		3.3 Data Extraction
	4 Analysis of Experimental Results
	5 Conclusions
	References
Lightweight Secure Routing Over Vehicular Ad Hoc Networks with Traffic Status
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Result and Analysis
	5 Conclusion
	References
On Prediction Models for the Detection of Autism Spectrum Disorder
	1 Introduction
	2 Neuroimaging
	3 ASD Diagnosis Presented a Classification Task
	4 Application of ML and DL in ASD Research
		4.1 Support Vector Machine
		4.2 Random Forest
		4.3 Linear Discriminant Analysis
		4.4 Fuzzy C-Means
		4.5 Restricted Boltzman Machines
		4.6 Neural Network
		4.7 k-Nearest Neighbours
		4.8 Multi-subject Dictionary Learning
		4.9 L2-Regularized Logistic Regression
	5 Methods
	6 Comparative Study and Discussion
	7 Conclusion
	References
A Dynamic Efficient Protocol Secure for Privacy-Preserving Communication-Based VANET
	1 Introduction
	2 Related Work
	3 Problem Identification
	4 Proposed SIVNFC the System Architecture Prevention Model (SAPM)
	5 Implementation and Performance Analysis Through Simulation
		5.1 The Packet Delivery Ratio
		5.2 Routing Protocols Overhead
	6 Conclusion
	References
Raw Data Redundancy Elimination on Cloud Database
	1 Introduction
	2 Related Works
	3 Proposed Work
	4 Result and Discussion
	5 Conclusion
	References
A Survey Report on Deep Learning Techniques in Underwater Acoustic Channels
	1 Introduction
	2 Literature Reviews
		2.1 The Preliminary UWA Communication and Channel Estimation
		2.2 Introduction of OFDM in UWA Communication and Channel Estimation
		2.3 Underwater Acoustic OFDM Communications Using Deep Learning
		2.4 An Optimum Model for the UWA Deep Learning System
		2.5 Table of Comparison
	3 Comparison of Optimum Existing Methods in UWA Communication Using Deep Learning
	4 Conclusion
	References
Feature Selection Using Rough Set Theory from Infected Rice Plant Images
	1 Introduction
	2 Description of Rice Disease
		2.1 Bacterial Leaf Blight Disease
		2.2 Brown Spot Disease
		2.3 Leaf Smut Disease
	3 Image Processing Techniques
		3.1 Noise Removal
		3.2 Shadow Removal
		3.3 Image Enhancement
		3.4 Image Segmentation
	4 Feature Extractions
		4.1 Color Feature
		4.2 Texture Feature
	5 Ranking of Features and Rough Set Theory
		5.1 Pearson’s Co-relation Coefficient
		5.2 Rough Set Theory
		5.3 Algorithm of Rough Set Theory
		5.4 Proposed Algorithm
	6 Results
	7 Conclusions
	References
Pi-Sigma Neural Network: Survey of a Decade Progress
	1 Introduction
	2 Higher-Order Neural Networks
		2.1 Pi-Sigma Neural Network
	3 Appliances of Pi-Sigma NN
	4 Hybridization of PSNN Using Optimization Techniques
	5 Analytical Investigation
	6 Conclusion
	References
Disease Feature Extraction and Disease Detection from Paddy Crops Using Image Processing and Deep Learning Technique
	1 Introduction
	2 Diseased Rice Data Preprocessing and Feature Extraction Using Digital Image Processing Technique
		2.1 Special Domain Noise Removal
		2.2 Special Domain Shadow Management
		2.3 Special Domain Image Enhancement
		2.4 Special Domain Image Convex Hull
		2.5 Image Segmentation
		2.6 Feature Extraction
	3 Image Segmentation Using Deep Learning
	4 Statistical Analysis of Image Data and Result Visualization
	5 Results and Discussion
	6 Conclusion
	References
A Word Clustering-Based Crime Report Categorization Technique
	1 Introduction
	2 Graph-Based Word Clustering for Crime Reports Categorization
		2.1 Measuring Co-occurrence by a Search Engine
		2.2 Measuring Similarity-Based on Co-occurrence Matrix
		2.3 Clustering of Words
		2.4 Text Categorization Based on Word Clustering
	3 Experimental Results
		3.1 Data Collection
		3.2 Evaluation of Clustering
	4 Conclusion
	References
Moth Flame Optimization: Developments and Challenges up to 2020
	1 Introduction
	2 Basic Preliminaries
		2.1 Moth Flame Optimizer
		2.2 Structure of MFO
	3 Variations of MFO
		3.1 Binary MFO
		3.2 Modified MFO
		3.3 Chaotic MFO
		3.4 Opposition-Based MFO
		3.5 Hybrid MFO
	4 Applications of MFO
		4.1 MFO in Image Segmentation
		4.2 MFO in Feature Extraction
		4.3 MFO in Power Dispatch Problem
		4.4 MFO in Food Processing
		4.5 MFO in Health Care
		4.6 Global Optimization with MFO
		4.7 MFO in Intrusion Detection
		4.8 Other Applications
	5 Critical Analysis
	6 Research Challenges
	7 Conclusion
	References
Center-Symmetric Local Binary Pattern-Based Image Authentication Using Local and Global Features Vector
	1 Introduction
	2 Motivation and Objective
	3 Proposed Scheme
		3.1 Preprocessing
		3.2 Wavelet Decomposition
		3.3 Local Texture Feature
		3.4 Global Feature Extraction from DCT-Coefficients
		3.5 Hash Generation
		3.6 Authentication
		3.7 Embedding Algorithm
	4 Experimental Results
		4.1 Performance Comparison
	5 Conclusions
	References
Secured Cloud System Using Deep Learning
	1 Introduction
	2 State-of-the-Art
		2.1 Research Gap
	3 Proposed Model
	4 Experimental Setup
	5 Experimental Result
	6 Conclusions
	References
Quantum Key Sharing Protocol Using GHZ Like States in Multiparty Scheme
	1 Introduction
	2 General Idea Behind Quantum Information Science
	3 Proposed New Scheme to Determine Quantum Key Using GHZ Like States
		3.1 Sharing the Three Qubit Systems in GHZ Like States
		3.2 The Quantum Determined Key Sharing Protocol
	4 Whether Our Protocol Is Secure Under Different Attacks?
		4.1 Man, in the Middle Attack and Our Protocol
	5 Discussion and Conclusion
	References
Controlling Emergency Vehicles During Road Congestion—A Survey and Solution
	1 Introduction
		1.1 Internet of Things (IoT)
	2 Literature Review
	3 Motivation and Objective
	4 Proposed Method
	5 Conclusion and Future Works
	References
A Comparative Study on Various Text Classification Methods
	1 Introduction
	2 Different Featurization Techniques
		2.1 Bag of Words/N-Grams
		2.2 Term Frequency—Inverse Document Frequency (Tf-Idf)
		2.3 Average Word2Vec
		2.4 Tf-Idf Weighted Word2Vec
	3 Different Classification Algorithms
		3.1 Hyperparameter Tuning
		3.2 K-Nearest Neighbours Classifier
		3.3 Naïve Bayes Classifier
		3.4 Logistic Regression
		3.5 Support Vector Machine
		3.6 Decision Tree Classifier
	4 Experimental Results
		4.1 Data Collection
		4.2 Text Preprocessing
		4.3 Results Based on Amazon Fine Food Reviews Data set
		4.4 Results Based on DonorsChoose Data set
	5 Conclusion
	References
Missing Value Imputation Using Correlation Coefficient
	1 Introduction
	2 Methodology
	3 Results and Discussion
	4 Conclusions
	References
Bandwidth-Constrained QoS Routing in MANET
	1 Introduction
	2 Existing MANET Protocols
		2.1 Ad Hoc on-Demand Distance Vector Routing Protocol (AODV)
		2.2 Zone Routing Protocol (ZRP)
		2.3 Temporally Ordered Routing Algorithm (TORA)
		2.4 Dynamic Source Routing (DSR)
		2.5 Destination Sequenced Distance Vector Routing (DSDV)
		2.6 Cluster-Based Routing Protocol (CBRP)
	3 Bandwidth Specific QoS Routing
		3.1 Available Bandwidth Estimation
		3.2 Route Discovery
		3.3 Route Maintenance
		3.4 Routing Algorithm
	4 Simulation Environment
		4.1 Performance Metrics
	5 Conclusion
	References
Empirical Analysis on Uddanam CKD with Unsupervised MLs Including PCA
	1 Introduction
	2 Review of Literature
	3 Materials and Methods
		3.1 Proposal Model
		3.2 K-Means Clustering Algorithm
		3.3 Agglomerative (Hierarchical) Clustering Algorithm
		3.4 Principal Component Analysis (PCA) Algorithm
	4 Results and Discussions
		4.1 Statistical Analysis Uddanam CKD Dataset
		4.2 K-Means Cluster Analysis on Uddanam CKD Data Set
		4.3 Hierarchal Cluster Analysis on Uddanam CKD Data Set
		4.4 Projections Analysis with PCA
	5 Conclusion
	References
Golf-Worm Swarm Optimized 2DOF-PIDN Controller for Frequency Regulation of Hybrid Power System
	1 Introduction
	2 Implemented System
	3 Results and Discussions
	4 Conclusion
	References




نظرات کاربران