دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Asit Kumar Das (editor), Janmenjoy Nayak (editor), Bighnaraj Naik (editor), Soumi Dutta (editor), Danilo Pelusi (editor) سری: ISBN (شابک) : 9811524483, 9789811524486 ناشر: Springer سال نشر: 2020 تعداد صفحات: 593 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 21 مگابایت
در صورت تبدیل فایل کتاب Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2020 (Advances in Intelligent Systems and Computing, 1120) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب هوش محاسباتی در تشخیص الگو: مجموعه مقالات CIPR 2020 (پیشرفت ها در سیستم های هوشمند و محاسبات، 1120) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب دارای مقالات تحقیقاتی با کیفیت بالا است که در دومین کنفرانس بینالمللی هوش محاسباتی در تشخیص الگو (CIPR 2020)، که در مؤسسه مهندسی و مدیریت، کلکته، بنگال غربی، هند برگزار شد، در 4- 5 ژانویه 2020. شامل تجربیات توسعه عملی در زمینه های مختلف تجزیه و تحلیل داده ها و تشخیص الگو، تمرکز بر فناوری های محاسباتی نرم، الگوریتم های خوشه بندی و طبقه بندی، نظریه مجموعه های ناهموار و فازی، محاسبات تکاملی، علوم عصبی و سیستم های شبکه عصبی، پردازش تصویر، تطبیق الگوی ترکیبی، تجزیه و تحلیل شبکه های اجتماعی، تجزیه و تحلیل داده های صوتی و تصویری، داده کاوی در محیط های پویا، بیوانفورماتیک، محاسبات ترکیبی، تجزیه و تحلیل داده های بزرگ و یادگیری عمیق. همچنین راهحلهای نوآورانهای برای چالشهای موجود در این زمینهها ارائه میکند و تحولات اخیر را مورد بحث قرار میدهد.
This book features high-quality research papers presented at the 2nd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2020), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 4–5 January 2020. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.
CIPR Committee Chief Patron Patron Honorary Advisory Chair Honorary General Chair General Chair Programme Chair Organizing Chair International Advisory Committee National Advisory Committee Technical Committee Publicity Chair Logistic Chair Convenors Co-convenors Publication Chair Finance Chair CIPR Reviewers Preface Acknowledgements About the Conference Contents About the Editors Predicting Dynamic Product Price by Online Analysis: Modified K-Means Cluster 1 Introduction 2 Big Data Mining and Analysis of Dynamic Product Price 2.1 Big Data Challenges and Analytics 2.2 Opportunities, Open Issues and Challenges 2.3 K-Means and Modified K-Means Algorithm 3 Proposed Methodology 4 Findings and Analysis 4.1 Finding Based on K-Means Algorithm 5 Finding Based on Modified K-Means Algorithm 6 Computation of Dataset Using Modified K-Means Cluster 7 Conclusions References Nearest Neighbor-Based Differential Evolution for Reconstructing Gene Regulatory Network 1 Introduction 2 Literature Review 3 Problem Description 4 Methodology 4.1 Recurrent Neural Network (RNN) Model 4.2 Differential Evolution (DE) 4.3 Performance Metric 5 Experimental Study 5.1 Results and Discussion 6 Conclusion and Future Scope References Inference-Based Statistical Analysis for Suspicious Activity Detection Using Facial Analysis 1 Introduction 1.1 Suspicious Activity 1.2 Social Crime Status at World Level 1.3 Face Recognition 1.4 Algorithm of Face Recognition Tools and Techniques 1.5 Classification 1.6 Association (Dependency Modeling) 1.7 Clustering 2 Literature Survey and Previous Work 3 Methodology—SVM, Dlib, CNN, RNN 4 Results and Discussion 5 Product Perspective—Web site/App Snapshots 5.1 Module 1: Face Detection 5.2 Module 2: Face Expression Recognition 6 Recommendations 7 Novelty of Our Work 8 Future Scope 9 Limitations 10 Applications 11 Conclusions References A Conceptual Approach for Framework to Design Radar System Using Arduino with Initial Experiments 1 Introduction 2 Circuits Designing in Literature Review 3 Experiment Description 3.1 Arduino Uno R3 3.2 Servo Motors 3.3 Ultrasonic Sensors 3.4 Liquid Crystal Display (LCD) 3.5 Use of Arduino Software 4 Connections 4.1 Arduino to Servo Motors 4.2 Arduino to Ultrasonic Sensors 4.3 Arduino to LCD 5 Applications 5.1 Air Force 5.2 Application in Army 5.3 Naval Application 6 Experimental Setup in Our Study 6.1 Wood Obstacle 6.2 Clothes Obstacle 7 Novelty 8 Future Scope 9 Process Involved 10 Advantages Over Others 11 Business Plans 12 Future Works 13 Recommendations 14 Limitations 15 Conclusions References Implementing Brain–Machine Interface (BMI) with Smart Computing 1 Introduction 1.1 BMI and Smart Computing 2 Literature Review 3 System Design 4 Algorithms Involved 5 Security Methods 6 Applications 7 Limitations 8 Conclusion References Stratification of Indian Dance Forms Through Audio Signal 1 Introduction 2 Previous Works 3 Proposed Methodology 3.1 Computation of Features 3.2 Classification 4 Experimental Results 4.1 Relative Analysis 5 Conclusion References Forecasting House Price with an Optimum Set of Features 1 Introduction 2 Related Works 3 The Effort Process 3.1 Facet Description 3.2 Facet Assortment 3.3 Machine Erudition Techniques 3.4 Performance Measurement 4 Experimental Results 5 Conclusion References Speech-Based Emotion Classification for Human by Introducing Upgraded Long Short-Term Memory (ULSTM) 1 Introduction 1.1 Related Work 2 Proposed Methodology 2.1 Feature Extraction 2.2 Convolutional Neural Networks (CNN) 2.3 Recurrent Neural Networks (RNN) 2.4 Gated Recurrent Unit (GRU) 2.5 Long Short-Term Memory Network (LSTM) 2.6 Upgraded Long Short-Term Memory (ULSTM) 3 Result Analysis 3.1 Comparative Study 4 Conclusion References Study of Sentiment Analysis in Mental Health Using Speech Recognition and Image to Text Conversion 1 Introduction 1.1 Speech Recognition 1.2 Image to Text Conversion 2 Literature Review 2.1 Sentiment Analysis 2.2 Benefits of Sentiment Analysis 2.3 Mental Health 3 Methodology 4 Analysis and Result 5 Summary and Conclusion References Differential Evolution Optimized Fuzzy PID Controller for Automatic Generation Control of Interconnected Power System 1 Introduction 2 System Investigation 3 Differential Evolution (DE) 4 Result and Analysis 5 Conclusion Appendix References Deep Learning-Based Automated Feature Engineering for Rice Leaf Disease Prediction 1 Introduction 2 Image Processing for Collecting Rice Plant Diseased Images 3 Proposed CNN-Based Rice Disease Prediction Model 4 Experimental Results 5 Conclusion and Future Scope References Literature Survey on Log-Based Anomaly Detection Framework in Cloud 1 Introduction 2 Cloud Attacks Classification 2.1 Network-Based Attack 2.2 Virtual Machine (VM)-Based Attack 2.3 Storage-Based Attack 2.4 Application-Based Attack 3 Contributions, Limitations of Existing Approach 4 Conclusion References Feature Extraction and Disease Prediction from Paddy Crops Using Data Mining Techniques 1 Introduction 2 Image Processing and Feature Extraction from Diseased Rice Images 2.1 Noise Removal 2.2 Shadow Removal 2.3 Image Enhancement 2.4 Image Segmentation 2.5 Feature Extraction 3 Data Mining Techniques for Rice Disease Prediction 3.1 Similarity Measure 3.2 Closure Property of a Feature 4 Result and Discussions 5 Conclusion References Estimating Software Effort Using Neural Network: An Experimental Investigation 1 Introduction 2 Literature Review 3 Basic Preliminary—Artificial Neural Network 4 Work Done 5 Experimental Setup 5.1 Orange—Visual Programming 5.2 Dataset Description 5.3 Configuring the Various Models for Predicting the Software Effort Estimate Using Orange Tool 5.4 Details of Software Effort Estimation Using BPNN 5.5 Methodology 6 Results 7 Conclusion References Statistical Analysis on Efficacy of Yagya Therapy for Type-2 Diabetic Mellitus Patients Through Various Parameters 1 Introduction 2 Literature Survey 3 Objective and Aims 4 Methodology and Material 5 Mode of Treatment 6 Method of Yagya Therapy 7 Required Material for Therapy 8 Treatment Schedule Duration 9 Follow-up 10 The Process of Therapy 10.1 Session I—Pre-Yagya Therapy Session 10.2 Session II—Main Yagya Therapy Session 10.3 Session III—Post Yagya Therapy Session with Duration: 30 Min 11 Pathya-Apathya and Dincharya (the Prescribed Diet Schedule) 12 Selection Criteria of Patient 12.1 Inclusion Criteria 12.2 Exclusion Criteria 12.3 Assessment Criteria 13 Observations 14 Results and Interpretations 15 Graph Analysis and Discussion 16 Conclusion 17 Acknowledgement 18 Limitations of the Study 19 Funding 20 Ethics Issue Annexure-1–the List of Special Herbs Used for Diabetes Annexure-2–List of Asans Performed by Subjects References A Proposed Gene Selection Approach for Disease Detection 1 Introduction 2 Literature Review 3 Proposed Methodology 4 Analysis and Result 5 Summary and Conclusion References Deep Recurrent Neural Network (Deep-RNN) for Classification of Nonlinear Data 1 Introduction 2 Proposed Work 2.1 Recurrent Neural Network 3 Implemented Method of Deep-RNN 4 Results and Discussion 5 Conclusions References Elephant Herding Optimization for Multiprocessor Task Scheduling in Heterogeneous Environment 1 Introduction 2 The Problem 3 Implemented Elephant Herding Optimization Algorithm 4 Task Allotment Using EHO 5 Simulation Results 6 Conclusion 7 Future Work References Analysis of Parallel M5P and Random Forest Regression for Visualization of Traffic Behavior 1 Introduction 2 Methodology 2.1 Flow of Experimentation 2.2 Knowledge Development 2.3 M5P Rules 2.4 Random Forest Regression Algorithm 2.5 Traffic Data Acquisition 2.6 Traffic Prediction and Visualization 3 Spark Architecture 4 Results 4.1 Evaluation 4.2 Experiments 4.3 Visualization 5 Conclusion References Software Effort Estimation Using Particle Swarm Optimization: Advances and Challenges 1 Introduction 2 Software Effort Estimation 3 Particle Swarm Optimization 4 Importance of Particle Swarm Optimization in SEE 5 Variants of Particle Swarm Optimization Used for Software Effort Estimation 6 Critical Analysis 7 Conclusion References Modern Trends in Monitoring and Analysis of Chemical Pesticides by Using Artificial Neural Networks 1 Introduction 2 Methodology 3 Result 4 Conclusion References Semi-supervised Change Detection Technique on Remote Sensing Images Using Posterior Probabilities 1 Introduction 2 Proposed Algorithm 3 Experimental Results 4 Conclusion References Feature Engineering for Cardio-Thoracic Disease Detection from NIH Chest Radiographs 1 Introduction 1.1 The Data 1.2 Medical Imaging 2 Methodology 2.1 Preparing the Data 2.2 Feature Engineering 2.3 The Model 2.4 Image Segmentation 3 Conclusion 4 Results 4.1 Future Work References Wireless Body Area Network: An Application of IoT and Its Issuses—A Survey 1 Introduction 2 Wireless Body Area Network (WBAN) 2.1 WBAN Three-Tier Architecture 2.2 Communication Standard 3 Security and Privacy Issues in WBAN 4 Application 5 Drawbacks 6 Conclusion References Enhancing Security for Communication in Wireless Sensor Network 1 Introduction 2 Related Work 3 Proposed System 4 Conclusion References Dimension Reduction of Microarray Data Using Gene Ontology and Correlation Filter 1 Introduction 2 Methodology 2.1 Dataset Preparation 2.2 Classification of Genes 2.3 Gene Correlation Filter 3 Significance of Independent Component(IC) Terms 4 Experimental Results 5 Conclusion References Modified Contrast Enhancement Algorithm Using Numerical Integration Simpson\'s Method 1 Introduction 2 Background 3 Proposed Method 4 Result Analysis 5 Conclusion References WHMS: An Efficient Wireless NoC Design for Better Communication Efficiency 1 Introduction 2 Related Work 3 Proposed Architecture 3.1 Proposed Hybrid Topology 3.2 Router Design 3.3 Deadlock Avoidance 4 Overall Communication Components 5 Performance Analysis 5.1 Performance Metrics 6 Conclusion References Data Hiding Based on Decagon-Shaped Shell 1 Introduction 2 Related Works 3 Proposed Scheme 3.1 Construction of Reference Matrix 3.2 Data Embedding 3.3 Data Extraction 4 Analysis of Experimental Results 5 Conclusions References Lightweight Secure Routing Over Vehicular Ad Hoc Networks with Traffic Status 1 Introduction 2 Related Work 3 Proposed Methodology 4 Result and Analysis 5 Conclusion References On Prediction Models for the Detection of Autism Spectrum Disorder 1 Introduction 2 Neuroimaging 3 ASD Diagnosis Presented a Classification Task 4 Application of ML and DL in ASD Research 4.1 Support Vector Machine 4.2 Random Forest 4.3 Linear Discriminant Analysis 4.4 Fuzzy C-Means 4.5 Restricted Boltzman Machines 4.6 Neural Network 4.7 k-Nearest Neighbours 4.8 Multi-subject Dictionary Learning 4.9 L2-Regularized Logistic Regression 5 Methods 6 Comparative Study and Discussion 7 Conclusion References A Dynamic Efficient Protocol Secure for Privacy-Preserving Communication-Based VANET 1 Introduction 2 Related Work 3 Problem Identification 4 Proposed SIVNFC the System Architecture Prevention Model (SAPM) 5 Implementation and Performance Analysis Through Simulation 5.1 The Packet Delivery Ratio 5.2 Routing Protocols Overhead 6 Conclusion References Raw Data Redundancy Elimination on Cloud Database 1 Introduction 2 Related Works 3 Proposed Work 4 Result and Discussion 5 Conclusion References A Survey Report on Deep Learning Techniques in Underwater Acoustic Channels 1 Introduction 2 Literature Reviews 2.1 The Preliminary UWA Communication and Channel Estimation 2.2 Introduction of OFDM in UWA Communication and Channel Estimation 2.3 Underwater Acoustic OFDM Communications Using Deep Learning 2.4 An Optimum Model for the UWA Deep Learning System 2.5 Table of Comparison 3 Comparison of Optimum Existing Methods in UWA Communication Using Deep Learning 4 Conclusion References Feature Selection Using Rough Set Theory from Infected Rice Plant Images 1 Introduction 2 Description of Rice Disease 2.1 Bacterial Leaf Blight Disease 2.2 Brown Spot Disease 2.3 Leaf Smut Disease 3 Image Processing Techniques 3.1 Noise Removal 3.2 Shadow Removal 3.3 Image Enhancement 3.4 Image Segmentation 4 Feature Extractions 4.1 Color Feature 4.2 Texture Feature 5 Ranking of Features and Rough Set Theory 5.1 Pearson’s Co-relation Coefficient 5.2 Rough Set Theory 5.3 Algorithm of Rough Set Theory 5.4 Proposed Algorithm 6 Results 7 Conclusions References Pi-Sigma Neural Network: Survey of a Decade Progress 1 Introduction 2 Higher-Order Neural Networks 2.1 Pi-Sigma Neural Network 3 Appliances of Pi-Sigma NN 4 Hybridization of PSNN Using Optimization Techniques 5 Analytical Investigation 6 Conclusion References Disease Feature Extraction and Disease Detection from Paddy Crops Using Image Processing and Deep Learning Technique 1 Introduction 2 Diseased Rice Data Preprocessing and Feature Extraction Using Digital Image Processing Technique 2.1 Special Domain Noise Removal 2.2 Special Domain Shadow Management 2.3 Special Domain Image Enhancement 2.4 Special Domain Image Convex Hull 2.5 Image Segmentation 2.6 Feature Extraction 3 Image Segmentation Using Deep Learning 4 Statistical Analysis of Image Data and Result Visualization 5 Results and Discussion 6 Conclusion References A Word Clustering-Based Crime Report Categorization Technique 1 Introduction 2 Graph-Based Word Clustering for Crime Reports Categorization 2.1 Measuring Co-occurrence by a Search Engine 2.2 Measuring Similarity-Based on Co-occurrence Matrix 2.3 Clustering of Words 2.4 Text Categorization Based on Word Clustering 3 Experimental Results 3.1 Data Collection 3.2 Evaluation of Clustering 4 Conclusion References Moth Flame Optimization: Developments and Challenges up to 2020 1 Introduction 2 Basic Preliminaries 2.1 Moth Flame Optimizer 2.2 Structure of MFO 3 Variations of MFO 3.1 Binary MFO 3.2 Modified MFO 3.3 Chaotic MFO 3.4 Opposition-Based MFO 3.5 Hybrid MFO 4 Applications of MFO 4.1 MFO in Image Segmentation 4.2 MFO in Feature Extraction 4.3 MFO in Power Dispatch Problem 4.4 MFO in Food Processing 4.5 MFO in Health Care 4.6 Global Optimization with MFO 4.7 MFO in Intrusion Detection 4.8 Other Applications 5 Critical Analysis 6 Research Challenges 7 Conclusion References Center-Symmetric Local Binary Pattern-Based Image Authentication Using Local and Global Features Vector 1 Introduction 2 Motivation and Objective 3 Proposed Scheme 3.1 Preprocessing 3.2 Wavelet Decomposition 3.3 Local Texture Feature 3.4 Global Feature Extraction from DCT-Coefficients 3.5 Hash Generation 3.6 Authentication 3.7 Embedding Algorithm 4 Experimental Results 4.1 Performance Comparison 5 Conclusions References Secured Cloud System Using Deep Learning 1 Introduction 2 State-of-the-Art 2.1 Research Gap 3 Proposed Model 4 Experimental Setup 5 Experimental Result 6 Conclusions References Quantum Key Sharing Protocol Using GHZ Like States in Multiparty Scheme 1 Introduction 2 General Idea Behind Quantum Information Science 3 Proposed New Scheme to Determine Quantum Key Using GHZ Like States 3.1 Sharing the Three Qubit Systems in GHZ Like States 3.2 The Quantum Determined Key Sharing Protocol 4 Whether Our Protocol Is Secure Under Different Attacks? 4.1 Man, in the Middle Attack and Our Protocol 5 Discussion and Conclusion References Controlling Emergency Vehicles During Road Congestion—A Survey and Solution 1 Introduction 1.1 Internet of Things (IoT) 2 Literature Review 3 Motivation and Objective 4 Proposed Method 5 Conclusion and Future Works References A Comparative Study on Various Text Classification Methods 1 Introduction 2 Different Featurization Techniques 2.1 Bag of Words/N-Grams 2.2 Term Frequency—Inverse Document Frequency (Tf-Idf) 2.3 Average Word2Vec 2.4 Tf-Idf Weighted Word2Vec 3 Different Classification Algorithms 3.1 Hyperparameter Tuning 3.2 K-Nearest Neighbours Classifier 3.3 Naïve Bayes Classifier 3.4 Logistic Regression 3.5 Support Vector Machine 3.6 Decision Tree Classifier 4 Experimental Results 4.1 Data Collection 4.2 Text Preprocessing 4.3 Results Based on Amazon Fine Food Reviews Data set 4.4 Results Based on DonorsChoose Data set 5 Conclusion References Missing Value Imputation Using Correlation Coefficient 1 Introduction 2 Methodology 3 Results and Discussion 4 Conclusions References Bandwidth-Constrained QoS Routing in MANET 1 Introduction 2 Existing MANET Protocols 2.1 Ad Hoc on-Demand Distance Vector Routing Protocol (AODV) 2.2 Zone Routing Protocol (ZRP) 2.3 Temporally Ordered Routing Algorithm (TORA) 2.4 Dynamic Source Routing (DSR) 2.5 Destination Sequenced Distance Vector Routing (DSDV) 2.6 Cluster-Based Routing Protocol (CBRP) 3 Bandwidth Specific QoS Routing 3.1 Available Bandwidth Estimation 3.2 Route Discovery 3.3 Route Maintenance 3.4 Routing Algorithm 4 Simulation Environment 4.1 Performance Metrics 5 Conclusion References Empirical Analysis on Uddanam CKD with Unsupervised MLs Including PCA 1 Introduction 2 Review of Literature 3 Materials and Methods 3.1 Proposal Model 3.2 K-Means Clustering Algorithm 3.3 Agglomerative (Hierarchical) Clustering Algorithm 3.4 Principal Component Analysis (PCA) Algorithm 4 Results and Discussions 4.1 Statistical Analysis Uddanam CKD Dataset 4.2 K-Means Cluster Analysis on Uddanam CKD Data Set 4.3 Hierarchal Cluster Analysis on Uddanam CKD Data Set 4.4 Projections Analysis with PCA 5 Conclusion References Golf-Worm Swarm Optimized 2DOF-PIDN Controller for Frequency Regulation of Hybrid Power System 1 Introduction 2 Implemented System 3 Results and Discussions 4 Conclusion References