ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب INTELLIGENT DATA ENGINEERING AND ANALYTICS

دانلود کتاب مهندسی و تحلیل داده های هوشمند

INTELLIGENT DATA ENGINEERING AND ANALYTICS

مشخصات کتاب

INTELLIGENT DATA ENGINEERING AND ANALYTICS

ویرایش:  
 
سری:  
ISBN (شابک) : 9789811556791, 9811556792 
ناشر: SPRINGER VERLAG, SINGAPOR 
سال نشر: 2020 
تعداد صفحات: 740 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 30 مگابایت 

قیمت کتاب (تومان) : 44,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 25


در صورت تبدیل فایل کتاب INTELLIGENT DATA ENGINEERING AND ANALYTICS به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مهندسی و تحلیل داده های هوشمند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Organization
	Chief Patrons
	Patrons
	Organizing Chairs
	Publicity Chairs
	Advisory Committee
	Technical Program Committee
Preface
About This Book
Contents
About the Editors
Classification of Dry/Wet Snow Using Sentinel-2 High Spatial Resolution Optical Data
	1 Introduction
	2 Data Used and Study Area
	3 Methodology
	4 Results
	5 Conclusion
	References
Potential of Robust Face Recognition from Real-Time CCTV Video Stream for Biometric Attendance Using Convolutional Neural Network
	1 Introduction
	2 Literature Survey
	3 Contributions
	4 Proposed System
	5 Algorithm
	6 Results
	7 Conclusion
	References
ATM Theft Investigation Using Convolutional Neural Network
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Data Processing and Data Set
	5 Results and Analysis
	6 Conclusion and Future Work
	References
Classification and Prediction of Rice Crop Diseases Using CNN and PNN
	1 Introduction
	2 Literature Survey
	3 Proposed System
	4 Algorithms
	5 Result and Discussion
	6 Conclusion
	References
SAGRU: A Stacked Autoencoder-Based Gated Recurrent Unit Approach  to Intrusion Detection
	1 Introduction
	2 Related Works
	3 Proposed SAGRU Approach
		3.1 Stacked Autoencoder Feature Extraction (SAFE)
		3.2 Gated Recurrent Unit Learning (GRUL)
		3.3 SAGRU-Based Intrusion Detection
	4 Performance Analysis
	5 Conclusion
	References
Comparison of KNN and SVM Algorithms to Detect Clinical Mastitis in Cows Using Internet of Animal Health Things
	1 Introduction
	2 Literature Study
	3 Methodology
	4 A Sack for Data Acquisition and Testing
	5 Result
	6 Conclusion
	References
Two-Way Face Scrutinizing System for Elimination of Proxy Attendances Using Deep Learning
	1 Introduction
		1.1 Comparison with Previous Works
	2 Methodology
		2.1 Encoding Faces Present in an Image
		2.2 Face Recognition
	3 Algorithm for Eliminating Proxies
	4 Blynk
	5 Validation
	6 Conclusion
	References
Ontology-Driven Sentiment Analysis in Indian Healthcare Sector
	1 Introduction
	2 Literature Overview
	3 Ayushman Bharat Yojana (PM Jan Arogya Yojana)
		3.1 Key Benefits of the Scheme
		3.2 Beneficiaries of the Scheme
		3.3 Impact of the Scheme on the Beneficiaries
	4 An Overview of the Ontology
		4.1 Tools and Resources Used
		4.2 Ontology: An Overview
	5 Proposed Work
		5.1 Data Acquisition
		5.2 Data Cleaning and Preprocessing
		5.3 Extracting Features
		5.4 Training the Model
	6 Observations and Results
	7 Conclusion
	8 Future Work
	References
Segmentation of Nuclei in Microscopy Images Across Varied Experimental Systems
	1 Introduction
	2 Related Works
	3 Proposed Method
		3.1 Dataset Used
		3.2 Data Augmentation Used
		3.3 Model Architecture
		3.4 Loss Function Used
		3.5 Evaluation Metric Used
	4 Experiments and Results
	5 Conclusion
	References
Transitional and Parallel Approach of PSO and SGO for Solving Optimization Problems
	1 Introduction
		1.1 Traditional Optimization Tools
		1.2 Non-traditional Optimization Tools
	2 Preliminaries
		2.1 Function Optimization
		2.2 Benchmark Functions
		2.3 Evolutionary Technique
	3 Proposed Approach: Hybridization PSO with SGO
	4 Simulation Results and Discussion
	5 Conclusion
	References
Remote Sensing-Based Crop Identification Using Deep Learning
	1 Introduction
	2 Literature Study
	3 Methodology
		3.1 Overview of Proposed Method
		3.2 Convolution
		3.3 Max pooling
		3.4 Dense Node
		3.5 Softmax
	4 Results and Discussion
	5 Conclusion
	References
Three-Level Hierarchical Classification Scheme: Its Application to Fractal Image Compression Technique
	1 Introduction
	2 Basic FIC Technique
	3 Proposed Three-Level Hierarchical Classification (3-LHC) Scheme
		3.1 Elementary Analysis
		3.2 Proposed Modification
	4 Results and Analysis
	5 Conclusion
	References
Prediction of POS Tagging for Unknown Words for Specific Hindi and Marathi Language
	1 Introduction
		1.1 POS Tagging
		1.2 Limitations of Current POS Tagging System
	2 Related Work
	3 Contributions
	4 Proposed Methodology
		4.1 Hidden Markov Model
		4.2 Viterbi Algorithm
		4.3 Naïve Bayes Algorithm
	5 Result and Analysis
	6 Conclusion
	7 Future Work
	References
Modified Multi-cohort Intelligence Algorithm with Panoptic Learning for Unconstrained Problems
	1 Introduction and Literature Review
	2 Methodology
	3 Results and Discussion
	4 Conclusion
	References
Sentiment Analysis on Movie Review Using Deep Learning RNN Method
	1 Introduction
	2 Related Works
	3 Proposed Approach
	4 Implementation Tools
	5 Performance Analysis
	6 Conclusions and Future Work
	References
Super Sort Algorithm Using MPI and CUDA
	1 Introduction
	2 Sorting Algorithm
	3 Result
	4 Conclusion and Future Work
	References
Significance of Network Properties of Function Words in Author Attribution
	1 Introduction
	2 Author Identification Problem
	3 Related Works
	4 Complex Network Approach to Author Identification Problem
		4.1 Methodology
	5 Results and Discussions
	6 Conclusion
	References
Performance Analysis of Periodic Defected Ground Structure for CPW-Fed Microstrip Antenna
	1 Introduction
	2 Design of CPW-Fed Microstrip Antenna
	3 Circular-Shaped PDGS Structure
	4 Fabrication and Validation of Antenna
	5 Conclusion
	References
Energy Aware Task Consolidation in Fog Computing Environment
	1 Introduction
	2 Related Works
	3 Fog Computing Architecture
	4 Proposed Energy-Saving Task Consolidation Algorithm
	5 Simulation Results
	6 Conclusion
	References
Modelling CPU Execution Time of AES Encryption Algorithm as Employed Over a Mobile Environment
	1 Introduction
	2 Related Literature
	3 Description of Our Model
		3.1 Scheme 1
		3.2 Scheme 2
	4 Experimental Analysis of Data
		4.1 Scheme 1
		4.2 Scheme 2
	5 Comparison of Models
		5.1 Scheme 1
		5.2 Scheme 2
		5.3 Comparison Between Scheme 1 and Scheme 2
	6 Conclusions
	References
Gradient-Based Feature Extraction for Early Termination and Fast Intra Prediction Mode Decision in HEVC
	1 Introduction
	2 Proposed Algorithm
	3 Experimental Results
	4 Conclusion
	References
A Variance Model for Risk Assessment During Software Maintenance
	1 Introduction
	2 Risks in Software Development and Maintenance
	3 Factors in Software Risk Assessment During Maintenance
		3.1 Testing-Related Risk Factors
	4 Variance Model for Software Risk Assessment
	5 Discussion of the Variance Model
		5.1 Development of a Risk Measurement Toolkit
		5.2 Maturing of the Risk Model: An Aquatic Profile for Risk Maturity Management (APRMM)
	6 Conclusions
	References
Cyber Attack Detection Framework for Cloud Computing
	1 Introduction
	2 Cloud Security Attacks
	3 Proposed Framework
		3.1 Data Capturing
		3.2 Filtering and Feature Extraction
		3.3 Intrusion Detection Model Design
		3.4 Knowledge Extraction Block
	4 Performance Evaluation of Proposed Framework
		4.1 Result Analysis
	5 Conclusion
	References
Benchmarking Semantic, Centroid,  and Graph-Based Approaches for Multi-document Summarization
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Sort by Importance Score Algorithm
		3.2 K-Means Clustering
		3.3 Gaussian Mixture Method
		3.4 Graph-Based Approach
	4 Experimental Results and Analysis
	5 Conclusion and Future Work
	References
Water Availability Prediction in Chennai City Using Machine Learning
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Dataset Description
		3.2 Support Vector Regression
	4 Experimental Results and Analysis
		4.1 Analysis of Water Levels of Reservoirs
		4.2 Analysis of Rainfall Levels of Reservoir Regions
		4.3 Analysis of Chennai Population
		4.4 Prediction of Water Availability per Person
	5 Conclusion and Future Work
	References
Field Extraction and Logo Recognition on Indian Bank Cheques Using Convolution Neural Networks
	1 Introduction
	2 Background
		2.1 Object Detection
	3 Proposed Methodology
		3.1 Preprocessing
		3.2 Localization
		3.3 Bank Name and Logo Recognition
		3.4 Experimental Setting
	4 Dataset Description
		4.1 Evaluation Metrics
	5 Results and Discussions
	6 Conclusions
	References
A Genetic Algorithm Based Medical Image Watermarking for Improving Robustness and Fidelity in Wavelet Domain
	1 Introduction
	2 Related Work
	3 Proposed Scheme
		3.1 Proposed Multiple Watermarks Embedding in Wavelet Domain
		3.2 Proposed Chromosome-Based Encoding for Finding Optimal Embedding Location
		3.3 Chromosome Selection
		3.4 Crossover and Mutation
	4 Watermark Extraction and Genetic Algorithm Process
	5 Experimental Results and Discussions
	6 Conclusion
	References
Developing Dialog Manager in Chatbots via Hybrid Deep Learning Architectures
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Data Preparation
		3.2 Word2Vec Embedding + 1DCNN + LSTM (W1CNNL)
		3.3 Word2Vec + CNN Embedding + LSTM (WCNNL)
		3.4 Word2Vec + BiLSTM with Attention Embedding + LSTM (WBWAL)
	4 Dataset Description
	5 Results and Discussion
	6 Conclusions
	References
Experimental Analysis of Fuzzy Clustering Algorithms
	1 Introduction
	2 Literature Survey
		2.1 Fcm [8]
		2.2 Possibilistic Fuzzy C-Means (PFCM) [1]
		2.3 Credibilistic Fuzzy C-Means (CFCM) [2]
		2.4 Intuitionistic Fuzzy C-Means(IFCM) [3]
		2.5 Noise Clustering [9]
	3 Experiment and Result Analysis
	4 Conclusion
	References
A Regularization-Based Feature Scoring Criterion on Candidate Genetic Marker Selection of Sporadic Motor Neuron Disease
	1 Introduction
	2 Background Study
	3 Materials and Methods
		3.1 Dataset Information
		3.2 Data Pre-processing
		3.3 Proposed CBFS-L2 Feature Selection Technique
		3.4 Classification
		3.5 Heat Map Analysis
	4 Results
	5 Conclusion
	References
A Study for ANN Model for Spam Classification
	1 Introduction
	2 Preliminaries
		2.1 Spam
		2.2 ANN
		2.3 Back Propagation
		2.4 Backpropagation + Momentum
	3 Methods
		3.1 Data set Information
		3.2 Data Preprocessing
		3.3 Proposed Multi-layered ANN Model
	4 1st Model
	5 2nd Model
	6 Result and Discussion
		6.1 Training Methods
		6.2 Experiments and Results
		6.3 Discussion
		6.4 Shortcomings of BP Over BP−M
	7 Conclusion and Future Work
	References
Automated Synthesis of Memristor Crossbars Using Deep Neural Networks
	1 Introduction
	2 Related Work
	3 Our Approach
	4 Experimental Results
		4.1 Performance Comparisons
		4.2 Evaluation of Deep Learning
		4.3 Designs and Circuit Simulations
	5 Conclusion and Future Work
	References
Training Time Reduction in Transfer Learning for a Similar Dataset Using Deep Learning
	1 Introduction
	2 Deep Learning
	3 Major Categories of Deep Learning
	4 Model Architectures
	5 Conclusion
	References
A Novel Model Object Oriented Approach to the Software Design
	1 Introduction
	2 Related Work
		2.1 Booch Methodology (OOA/OOD)
		2.2 Rumbaugh’s Object Modelling Technique Methodology (OMT)
		2.3 Jacobson Methodology (OOBE and OOSE)
		2.4 RDD Methodology
		2.5 Coad–Yourdon Methodology
		2.6 Shlaer–Mellor Methodology
	3 Design Approach
		3.1 Problems Faced by Designers in Object-Oriented Design
	4 Existing Proposed Models
	5 Proposed Model
		5.1 Proposed Model Elements Description
		5.2 Proposed Model Workflow
	6 Conclusion
	References
Optimal Energy Distribution in Smart Grid
	1 Introduction
	2 Related Works
	3 Proposed Methods
		3.1 Dynamic Programming
		3.2 Greedy Approach
		3.3 Brute Force
	4 Result Analysis
	5 Conclusions
	References
Robust Automation Testing Tool for GUI Applications in Agile World—Faster to Market
	1 Introduction
	2 Background
	3 Design and Development of Rat Architecture
		3.1 Rat Data Flow Diagrams
		3.2 Rat Flowchart and Its Steps
	4 Rat Input File Structure
		4.1 Rat Test Data Sheet
		4.2 Manual Test Cases Creation
		4.3 Execution Results and Discussion
	5 Rat Benefits
	6 Limitations
	7 Conclusion
	References
Storage Optimization Using File Compression Techniques for Big Data
	1 Introduction
	2 Related Works
		2.1 Algorithm
		2.2 Steps
	3 Experiments and Results
	4 Conclusions
	References
Statistical Granular Framework Towards Dealing Inconsistent Scenarios  for Parkinson's Disease Classification  Big Data
	1 Introduction
		1.1 Contribution Highlights
		1.2 Related Work
		1.3 Organization of the Paper
	2 Significant Preliminaries
		2.1 Dimensionality and Heterogeneity of Data
		2.2 Inconsistency Measure
	3 Adopted Procedure
		3.1 Detailed Algorithmic Steps
		3.2 Novelty Analysis of Adopted Framework
	4 Experimental Results Discussion
		4.1 Setup, Simulation Environment, and Dataset Details
		4.2 Obtained Results
		4.3 Comparisons
	5 Conclusion
	References
Estimation of Sediment Load Using Adaptive Neuro-Fuzzy Inference System at Indus River Basin, India
	1 Introduction
	2 Study Area and Data
	3 Methodology
		3.1 ANFIS
		3.2 Data Set
	4 Results and Discussion
	5 Conclusion
	References
Efficiency of River Flow Prediction in River Using Wavelet-CANFIS: A Case Study
	1 Introduction
	2 Study Area
	3 Methodology
		3.1 CANFIS
		3.2 WCANFIS
		3.3 Model Formulation
		3.4 Model Performance
	4 Results and Discussions
	5 Conclusions
	References
Customer Support Chatbot Using Machine Learning
	1 Introduction
		1.1 Chatbot
		1.2 Natural Language Processing
		1.3 Machine Learning (ML)
	2 Related Work
	3 Proposed Methodology
	4 Prototype
		4.1 Implementation of Chatbot Using ML in Python
	5 Conclusion
	References
Prediction of Diabetes Using Internet of Things (IoT) and Decision Trees: SLDPS
	1 Introduction
	2 Proposed SLDPS
	3 Results and Discussion
	4 Conclusions
	References
Review Paper on Fourth Industrial Revolution and Its Impact on Humans
	1 Introduction
		1.1 History Behind
		1.2 The Differentiator
	2 Analysis and Analytics: Same or Different?
		2.1 Data Versus Data Science [14]
	3 Conclusion
	4 Declaration
	References
Edge Detection Canny Algorithm Using Adaptive Threshold Technique
	1 Introduction
	2 System Architecture
	3 System Design
	4 Simulation Results
	5 Conclusion
	References
Fashion Express—All-Time Memory App
	1 Introduction
	2 Literature Survey
	3 Fashion Express Model
	4 Situations
	5 Conclusion
	References
Local Production of Sustainable Electricity from Domestic Wet Waste in India
	1 Introduction
	2 Literature Survey
	3 Framework of the Intended Plan
	4 Results
	5 Enhancements
	6 Conclusion
	References
GPS Tracking and Level Analysis of River Water Flow
	1 Introduction
	2 Water Flow-GPS Tracking and Level Analysis
	3 Conclusion
	References
Ensuring Data Privacy Using Machine Learning for Responsible Data Science
	1 Introduction
	2 Motivation
	3 Current Scenario
	4 Vision for Future
	5 Privacy Preserving Machine Learning (PPM)
	6 Cryptographic Approaches
	7 Perturbation Approaches
	8 Conclusion
	References
492412_1_En_50_Chapter_OnlinePDF
An IoT Based Wearable Device for Healthcare Monitoring
	1 Introduction
	2 Related Work
	3 Proposed IoT Wearable Device
		3.1 Sensors Used
		3.2 Wi-Fi Enabled Controller
		3.3 IoT Cloud Platform
	4 Result and Discussion
	5 Conclusion
	References
Human Activity Recognition Using Wearable Sensors
	1 Introduction
	2 Literature Review
	3 Architecture
		3.1 Wearable Sensor Datasets
		3.2 Segmentation
		3.3 Feature Extraction
		3.4 Model Training
		3.5 Activity Recognition
	4 Results and Discussion
	5 Conclusion
	References
Fingerspelling Identification for Chinese Sign Language via Wavelet Entropy and Kernel Support Vector Machine
	1 Introduction
	2 Dataset
	3 Methodology
		3.1 Wavelet Entropy
		3.2 SVM
		3.3 Kernel–SVM
		3.4 10-Fold Cross-Validation
	4 Experiment Results and Discussions
		4.1 Statistical Results
		4.2 Training Algorithm Comparison
		4.3 Comparison to State-of-the-Art Approaches
	5 Conclusions
	References
Clustering Diagnostic Codes: Exploratory Machine Learning Approach for Preventive Care of Chronic Diseases
	1 Introduction
	2 Related Work
	3 Methods and Techniques
	4 Experimental Setup
		4.1 Data Modelling and Preprocessing
		4.2 Clustering
	5 Results and Discussion
	6 Conclusion
	References
NormCG: A Novel Deep Learning Model for Medical Entity Linking
	1 Introduction
	2 Methodology
		2.1 Model Architecture
		2.2 Training
	3 Experimental Results and Analysis
		3.1 Dataset
		3.2 Training Details
		3.3 Evaluation
		3.4 Result and Analysis
	4 Conclusion and Future Work
	References
A Hybrid Model for Clinical Concept Normalization
	1 Introduction
	2 Methodology
		2.1 Candidate Generation
		2.2 Candidate Linking
		2.3 Training
	3 Experimental Results
		3.1 Corpus
		3.2 Evaluation
	4 Analysis
		4.1 Merit Analysis
		4.2 Demerit Analysis
	5 Conclusion and Future Work
	References
Classification of Text Documents of an Electronic Archive Based on an Ontological Model
	1 Introduction
	2 Basic Requirements for the Ontology of the Electronic Archive
		2.1 Structural and Analytical Model of Applied Ontology of the Electronic Archive
		2.2 Formation of the Terminological Environment of the Concepts of Ontology of the Electronic Archive
	3 Ontological Model of a Text Document as an Electronic Archive Resource
		3.1 Ontological Model of the Document
	4 Classification of Ontological Representations of Electronic Archive Documents
	5 Experiments
	6 Conclusions
	References
Influence of Followers on Twitter Sentiments About Rare Disease Medications
	1 Introduction
	2 Related Work
	3 Method
		3.1 Data
		3.2 Preprocessing of the Tweets
		3.3 Sentiment Analysis
	4 Results
		4.1 Sentiment Analysis
		4.2 Sentiment Analysis Using Positive and Negative Words
	5 Discussion and Conclusion
	References
Pulmonary Nodule Detection and False Acceptance Reduction: Review
	1 Introduction
	2 Preprocessing Techniques
	3 Nodule Detection, Classification and FAR
		3.1 Feature-Based Learning
		3.2 NN-Based Learning
	4 Evaluation Metrics
	5 Conclusion
	References
Leveraging Deep Learning Approaches for Patient Case Similarity Evaluation
	1 Introduction
	2 Proposed Methodology
		2.1 Dataset and Pateint Cohort Selection
		2.2 Patient Report Representation
		2.3 Patient Disease Representation
		2.4 Patient Report Similarity Prediction
	3 Experimental Results and Discussion
	4 Conclusion and Future Work
	References
RUSDataBoost-IM: Improving Classification Performance in Imbalanced Data
	1 Introduction
	2 The Problem of Unbalanced Data Classification
		2.1 Evaluation Metrics
		2.2 Taxonomy of Rare Class Problem
	3 RUSDataBoost-IM: Random Undersampling with Boosting
		3.1 Random Undersampling Method (RUS)
		3.2 DataBoost-IM Method
		3.3 Combining RUS and DataBoost-IM Method
	4 Experimental Framework
		4.1 Algorithms and Parameters
		4.2 Datasets
		4.3 Analytical Tests for Comparing Algorithms
	5 Empirical Comparison: RUSDataBoost-IM Versus Other Methods
		5.1 Amending DataBoost-IM with RUS: RUSDataBoost-IM
		5.2 RUSDataBoost-IM Versus state-of-the-art
		5.3 Discussion: Summary of the Results
	6 Conclusion
	References
Performance Enhancement of Gene Mention Tagging by Using Deep Learning and Biomedical Named Entity Recognition
	1 Introduction
	2 State of the Art
	3 Methodology
		3.1 LSTM-CRF Networks
		3.2 Bi-LSTM-CRF Networks
		3.3 BI-LSTM-CRF with Embedding Networks
		3.4 Word Level (WL) Embedding
		3.5 Character Level (CL) Embedding
	4 Evaluation
		4.1 Competitor System
		4.2 Corpora Used
		4.3 Text Preprocessing
		4.4 Evaluation Measures
		4.5 Hyperparameter Setting
		4.6 Hardware/Software Requirement
	5 Result and Analysis
	6 Conclusion and Future Work
	References
Mining of Cancerous Region from Brain MRI Slices with Otsu’s Function and DRLS Segmentation
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Otsu’s + Cuckoo-Search (Otsu + CS) Thresholding
		3.2 DRLS Segmentation
		3.3 Evaluation Based on the Study Among BC Segment and GT
	4 Results and Discussions
	5 Conclusion
	References
An Automated Person Authentication System with Photo to Sketch Matching Technique
	1 Introduction
	2 Methodology
		2.1 Photo/Sketch Database
		2.2 Image Enhancement
		2.3 Feature Extraction
		2.4 Similarity Measure and Validation
	3 Result and Discussion
	4 Conclusion
	References
Extraction of Leukocyte Section from Digital Microscopy Picture with Image Processing Method
	1 Introduction
	2 Methodology
		2.1 Kapur’s Thresholding
		2.2 Morphology Based Segmentation
		2.3 Image Performance Computation
	3 Result and Discussion
	4 Conclusion
	References
Brain MRI Examination with Varied Modality Fusion and Chan-Vese Segmentation
	1 Introduction
	2 Methodology
		2.1 PCA Fusion
		2.2 Chan-Vese Segmentation
		2.3 Picture-Likeliness-Constraints
	3 Result and Discussion
	4 Conclusion
	References
Examination of the Brain MRI Slices Corrupted with Induced Noise—A Study with SGO Algorithm
	1 Introduction
	2 Methodology
		2.1 Brain MRI Database
		2.2 Thresholding
		2.3 Segmentation
		2.4 Assessment
	3 Result and Discussion
	4 Conclusion
	References
Segmentation and Assessment of Leukocytes Using Entropy-Based Procedure
	1 Introduction
	2 Methodology
		2.1 Thresholding
		2.2 Segmentation
		2.3 Assessment and Validation
	3 Result and Discussion
	4 Conclusion
	References
Image Assisted Assessment of Cancer Segment from Dermoscopy Images
	1 Introduction
	2 Methodology
		2.1 Test Picture
		2.2 Preprocessing
		2.3 Post-processing and Validation
	3 Results and Discussions
	4 Conclusion
	References
Examination of Optic Disc Sections of Fundus Retinal Images—A Study with Rim-One Database
	1 Introduction
	2 Methodology
		2.1 Rim-One Database
		2.2 Preprocessing
		2.3 DRLS Segmentation
		2.4 Assessment
	3 Results and Discussion
	4 Conclusion
	References
Inspection of 2D Brain MRI Slice Using Watershed Algorithm
	1 Introduction
	2 Context
	3 Methodology
		3.1 FMRI Database
		3.2 Watershed Mining
		3.3 Assessment of Extracted Section and Computing PSM
		3.4 Validation
	4 Results and Discussion
	5 Conclusion
	References
Extraction of Cancer Section from 2D Breast MRI Slice Using Brain Strom Optimization
	1 Introduction
	2 Methodology
		2.1 Image Collection
		2.2 Threshold Process
		2.3 Segmentation
		2.4 Image Performance Metrics
	3 Result and Discussion
	4 Conclusion
	References
Air Quality Prediction Using Time Series Analysis
	1 Introduction
	2 Data Preprocessing
		2.1 Dataset Preparation
		2.2 Handling Trend and Seasonality of Data
		2.3 Checking the Stationary of Time Series
	3 Model Parameters
		3.1 Building the Model
		3.2 Residual Analysis
	4 Result and Conclusion
	References
A Comprehensive Survey on Down Syndrome Detection in Foetus Using Modern Technologies
	1 Introduction
	2 Methodology
		2.1 Development in the Medical Field
		2.2 Development in the Technological Front
	3 Conclusion
	References




نظرات کاربران