دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Jyotsna Kumar Mandal (editor). Somnath Mukhopadhyay (editor)
سری:
ISBN (شابک) : 9811521875, 9789811521874
ناشر: Springer
سال نشر: 2020
تعداد صفحات: 712
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 28 مگابایت
در صورت تبدیل فایل کتاب Proceedings of the Global AI Congress 2019 (Advances in Intelligent Systems and Computing, 1112) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات کنگره جهانی هوش مصنوعی 2019 (پیشرفت در سیستم های هوشمند و محاسبات، 1112) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مقالات تحقیقاتی با کیفیت بالا ارائه شده در کنگره جهانی هوش مصنوعی 2019 را که توسط مؤسسه مهندسی و مدیریت، کلکته، هند، در 12 تا 14 سپتامبر 2019 سازماندهی شده بود، گردآوری می کند. به اشتراک گذاری مشارکت های تهیه شده توسط محققان، پزشکان، توسعه دهندگان و کارشناسان در زمینه های هوش مصنوعی، این کتاب حوزه های هوش مصنوعی برای تجارت الکترونیک و برنامه های کاربردی وب، هوش مصنوعی و حسگرها، واقعیت افزوده، داده های بزرگ، رابط های محاسباتی مغز، بینایی کامپیوتر، شبکه های رادیویی شناختی، داده کاوی را پوشش می دهد. ، یادگیری عمیق، سیستم های خبره، مجموعه ها و سیستم های فازی، پردازش تصویر، نمایش دانش، محاسبات الهام گرفته از طبیعت، یادگیری ماشین کوانتومی، استدلال، روباتیک و سیستم های مستقل، روباتیک و اینترنت اشیا، تجزیه و تحلیل شبکه های اجتماعی، پردازش گفتار، پردازش ویدئو، و واقعیت مجازی.
This book gathers high-quality research papers presented at the Global AI Congress 2019, which was organized by the Institute of Engineering and Management, Kolkata, India, on 12–14 September 2019. Sharing contributions prepared by researchers, practitioners, developers and experts in the areas of artificial intelligence, the book covers the areas of AI for E-commerce and web applications, AI and sensors, augmented reality, big data, brain computing interfaces, computer vision, cognitive radio networks, data mining, deep learning, expert systems, fuzzy sets and systems, image processing, knowledge representation, nature-inspired computing, quantum machine learning, reasoning, robotics and autonomous systems, robotics and the IoT, social network analysis, speech processing, video processing, and virtual reality.
Preface Contents About the Editors Detection of Leukemia in Blood Samples Applying Image Processing Using a Novel Edge Detection Method 1 Introduction 1.1 Related Work 2 Main Contribution 2.1 Novel Edge Detection Method 2.2 Algorithm for Our Novel Edge Detection Method 3 Proposed Framework 4 Experiment and Result Analysis 4.1 Datasets 4.2 Results Related to Own Edge Detection Method 4.3 Results Related to Cancer Cell Detection for an Infected Cell 4.4 Results Related to Cancer Detection in Healthy Cells 4.5 Accuracy Calculation in Tabular Form 5 Conclusion References Biometric-Based Unimodal and Multimodal Person Identification with CNN Using Optimal Filter Set 1 Introduction 2 Related Works 3 Theory of Operation 3.1 Convolution Neural Network (CNN) 3.2 Overview of the System and Algorithms 3.3 Algorithm for Training Super Classifier Model 4 Experimental Results 4.1 Platform 4.2 Input Dataset 4.3 Performance Evaluation Results 5 Conclusion References Bed Expansion in Two-Phase Liquid–Solid Fluidized Beds with Non-Newtonian Fluids and ANN Modelling 1 Introduction 2 Experimental 3 Neural Network Modelling 4 Results and Its Related Discussions 4.1 The Effect of Different Operating Parameters 4.2 Modelling Performance 5 Conclusions References M-UNet: Modified U-Net Segmentation Framework with Satellite Imagery 1 Introduction 2 CNN for Segmentation 2.1 U-Net Framework 2.2 Modified U-Net 2.3 Evolution Metric 2.4 Implementation Details 3 END-to-END Framework 3.1 Fine-Tuning 3.2 Dataset Used 3.3 Preprocessing and Experiment on the Framework 4 Conclusion References Study and Analysis of Various Heuristic Algorithms for Solving Travelling Salesman Problem—A Survey 1 Introduction 2 Literature Survey on Methods to Solve TSP 3 Comparison of Optimum Values of Various TSP Instances 4 Conclusion References Question Answering System-Based Chatbot for Health care 1 Introduction 2 Related Work 3 Methodology 3.1 Dataset Preparation 3.2 Module Building 4 Result Analysis 5 Conclusion and Future Scope References Improvement of Packet Delivery Fraction Due to Wormhole Attack by Modified DSR and AODV Algorithm 1 Introduction 2 Methodology 3 Simulation and Result 4 Conclusion References Air Pollution Forecasting Using Multiple Time Series Approach 1 Introduction 2 Literature Survey 3 System Design 4 Implementation Details 4.1 Problem Statement 4.2 Proposed Method 4.3 Data Set 4.4 Implementation 5 Result 6 Conclusion References Deep Learning-Based Smart Attendance Monitoring System 1 Introduction 2 Background on Deep Learning-Based Image Recognition 2.1 Convolutional Layer 2.2 Max Pooling-2D Layer 2.3 Dense Layers 2.4 Number of Nodes 2.5 Activation Function 3 Experimental Setup 3.1 System Configuration 3.2 Our Dataset 3.3 Preprocessing of the Dataset 3.4 Our Model 3.5 Motion Triggered System 4 Result and Analysis 5 Conclusion References Mutation-Based Chaotic Gravitational Search Algorithm 1 Introduction 2 Basic Gravitational Search Algorithm (GSA) 2.1 Chaotic Gravitational Search Algorithm 2.2 Mutation-Based Chaotic GSA (MCGSA) 3 Experimental Study 3.1 Initialization of Parameters 3.2 Experimental Results 3.3 Convergence Analysis 4 Conclusion References SCap Net: A Capsule Network Based Approach for Person Re-identification 1 Introduction 2 Related Work 2.1 Initial Re-identification Methods 2.2 Deep Learning-Based Methods 3 Proposed Approach 3.1 Capsule Networks 3.2 Siamese Capsule Network (SCap Net) for Person Re-identification 4 Experiments and Results 4.1 Datasets 4.2 Implementational Details 5 Conclusions and Future Scope References An Embedded System for Gray Matter Segmentation of PET-Image 1 Introduction 2 Related Study 2.1 Lifting Scheme 2.2 Wavelet 2.3 K-Mean Clustering Algorithm 2.4 Embedded System 3 Design and Methodology 3.1 Embedded System Design 4 Experimental Result 4.1 Design Benefit 4.2 Statistical Result Analysis 4.3 Visual Output and Analysis 5 Discussion 6 Conclusions References Estimation of Resemblance and Risk Level of a Breast Cancer Patient by Prognostic Variables Using Microarray Gene Expression Data 1 Introduction 2 Personified Prognosis by Gene Expression Analysis 3 Methods 3.1 Cox Proportional Hazard Regression Model 3.2 Similarity Measurement Using the Predictive Genes 4 Experimental Results and Discussion 4.1 Experimental Setup 4.2 Results and Discussion 5 Conclusion References A Model for Classification of Skin Disease Using Pretrained Convolutional Neural Network 1 Introduction 2 Literature Survey 3 Problem Definition 4 Proposed Work 5 Methodology 6 Experimental Results and Discussion 7 Comparison 8 Conclusion References Improvement of Packet Delivery Fraction Due to Discrete Attacks in MANET Using MAD Statistical Approach 1 Introduction 2 Proposed Methodology 3 Simulation and Result 4 Conclusion References IoT Based Smart Posture Detector 1 Introduction 2 Literature Survey 3 Implementation 3.1 Components and Connections 3.2 Working 3.3 Setup and Use 4 Experiments and Results 5 Conclusion References Sensor-Based Traffic Control System 1 Introduction 2 Literature Review 3 Component Specifications 3.1 Ultrasonic Sensor 3.2 NRF24L01 4 Implementation 4.1 System for Computation 4.2 System for Traffic Lights 4.3 Traffic Lights 5 Experimental Set-up 5.1 Set-up Components 5.2 Arduino Set-up 5.3 Proposed Solution Execution 6 Results and Discussion 7 Conclusion and Future Work References Addressing Grain-Matrix Differentiation in Sedimentary Rock Photomicrographs in the Light of Brightness Perception Modelling 1 Introduction 2 Materials and Methods 3 Results and Discussion 4 Conclusion References Identification of Interfaces of Mixtures with Nonlinear Models 1 Introduction 2 Methodology 2.1 Least Squares-Based Linear and Nonlinear Spectral Unmixing 2.2 Gradient Descent Maximum Entropy Approach for Spectral Unmixing 2.3 Fuzzy C-Means-Based Spectral Unmixing 3 Results and Discussions 3.1 Analysis with Standard Dataset of Samson [45] 3.2 Analysis with Real Hyperion Datasets of Henry Island 4 Conclusion References Random Forest Boosted CNN: An Empirical Technique for Plant Classification 1 Introduction 1.1 Plant Classification 1.2 Our Contribution 1.3 Outline 2 Related Work 2.1 State-of-the-Art ML-Based Approach 2.2 Model-Free Apporach 2.3 Deep Learning Approach 3 Dataset 4 Method 4.1 CNN Based Approach 4.2 SVM-Based Approach 4.3 Random Forest BOOSTed CNN 5 Experimental Analysis 5.1 Lab for Experiment 5.2 Result Analysis 6 Conclusion and Future Scope References Edge–Texture-Based Characteristic Attribute on Local Radius of Gyration Face for Human Face Recognition 1 Introduction 2 Concept of Radius of Gyration 3 Proposed Method 3.1 Local Radius of Gyration Face (LRGF) Representation 3.2 LRGF Edge–Texture Characteristic Face Representation 4 Similarity Measure 5 Experimental Set-Up and Result 6 Conclusion References Centroid-Based Hierarchy Preserving Clustering Algorithm Using Lighthouse Scanning 1 Introduction 2 Methodology 3 Results 4 Conclusion References Design and Implementation of an Automatic Summarizer Using Extractive and Abstractive Methods 1 Introduction 2 Background 2.1 Machine Learning 2.2 Computational Linguistics 3 Automatic Summarization 3.1 Extractive Summarization 3.2 Abstractive Summarization 4 Our Work 4.1 Data Set 4.2 Extractive Summarization 5 Abstractive Summarization 5.1 Limitations of Encoder–Decoder Architecture 6 Conclusion 7 Future Scope References Context-Aware Conversational Agent for a Closed Domain Task 1 Introduction 2 Related Work 3 Approach and Methodology 3.1 Introduction to Rasa Components 3.2 Overview of Approach 3.3 Data Set Structure and Description 3.4 Data Set Generation 3.5 Domain File Description 3.6 Action File Description 3.7 Policy File Description 3.8 Dialogue Prediction System Architecture 3.9 Processing Pipeline 3.10 Visualization of Dialogue States 4 Results 4.1 Experimental Set-Up 4.2 Cross-Validation Evaluation (Number of Folds = 10) 4.3 Evaluation of Intent Classification Pipeline 4.4 Evaluation of Entity Extraction: Conditional Random Fields 4.5 Evaluation of the Dialogue Prediction Model 5 Discussions References An End-to-End Approach for Benchmarking Time-Series Models Using Autoencoders 1 Introduction 2 Related Works 3 Fundamental Concepts 3.1 Time-Series Data 3.2 LSTM-VAE Model 3.3 Soft-DTW Loss 3.4 Kullback–Liebler Divergence 4 Our Proposed Method 5 Conclusion References Load Balancing for Solving of Supplementary Machines Over Jobs with Max–Min Algorithm 1 Introduction 2 Related Works 3 Problem Definition 4 Proposed Work 4.1 Algorithm 5 Experiment 6 Result Analysis 7 Conclusion References Load Balancing with Minimum Makespan in Cloud Computing 1 Introduction 2 Related Works 3 Background 3.1 Task Scheduling 3.2 Makespan of Tasks 4 Proposed Work 4.1 Example 5 Comparison 6 Conclusion References Circulation Desk-less Library Management System Using Radio-Frequency Identification(RFID) Technology and Computer Vision 1 Introduction 2 Preliminary 2.1 Circulation Process 2.2 Inventory Management 2.3 RFID 2.4 Computer Vision Techniques 3 Problem 3.1 Circulation 3.2 Inventory Management 4 Requirement of Infrastructure 4.1 RFID Floor Mat Antenna 4.2 RFID Reader 4.3 RFID Antenna 4.4 PTZ Camera Module 4.5 Network Switch 4.6 Server 4.7 Device Specifications 5 Proposed Method 5.1 Detect Patron with Smart Card 5.2 Analyze Patron Using Camera 5.3 Detect Incoming Books 5.4 Track Books Picked by Patron 5.5 Track Patron Book Drops 5.6 Validate Exit of a Patron 5.7 Inventory Management 5.8 Physical Stock Verification 5.9 Finding Any Misplaced Book 6 Implementation and Result 6.1 Implementation Technique 6.2 Infrastructure Requirement Analysis of a Library 6.3 Prototype System 7 Conclusion References Intelligent Water Drops-Based Image Steganography 1 Introduction 2 Steganography 3 Least Significant Bit (LSB) Technique 4 Proposed Method 4.1 Initialization 4.2 Construction 4.3 Updating Stage 4.4 Decision Stage 4.5 Data Hiding Process 5 Experimental Result and Analysis 6 Conclusion References Hierarchical Multi-objective Route Optimization for Solving Carpooling Problem 1 Introduction 2 Literature Survey 3 Proposed Carpooling Model 4 Experiment and Results 5 Conclusion References Bio-molecular Event Trigger Extraction by Word Sense Disambiguation Based on Supervised Machine Learning Using Wordnet-Based Data Decomposition and Feature Selection 1 Introduction 2 WordNet 3 Proposed Approach 4 Architecture 5 Experimental Result 5.1 Analysis of Experimental Results 5.2 Comparison with Existing Systems 6 Conclusion References Multimodal System for Emotion Recognition Using EEG and Customer Review 1 Introduction 2 Literature Review 2.1 Emotion Recognition Using EEG 2.2 Sentiment Analysis Using NLP 2.3 Multimodal Framework for Emotion Recognition 3 Proposed Methodology 3.1 Prepossessing and Feature Extraction of EEG 3.2 Prepocessing of Customers\' Review 3.3 Multimodal Framework of Emotion Recognition 4 Results and Analysis 4.1 Performance Analysis 5 Conclusion References A Modified Dragonfly Algorithm for Real Parameter Function Optimization 1 Introduction 2 Design Logic 2.1 Dragonfly Algorithm 2.2 Opposition-Based Learning 3 The Modified Opposition Inspired Dragonfly Algorithm (MODA) 4 Results and Discussion 5 Conclusion References Design Considerations of a Medical Expert System for Differential Diagnosis of Low Back Pain (ESLBP) 1 Introduction 2 Related Works 3 Design 3.1 Design of Knowledge Base 3.2 Design of Inference Engine 4 Results and Discussion 5 Conclusions References Survey: Classification and Reconstruction of Archaeological Artefacts 1 Introduction 2 Issues in Classifying and Reconstructing the Artefacts 3 Technologies and Tools for Collecting the Similar Fragments and Reconstructing It 4 Conclusion and Future Enhancement References Assessment of Black Tea Using Low-Level Image Feature Extraction Technique 1 Introduction 2 Materials and Methods 2.1 Electronic Vision (E-vision) Set-Up 2.2 Sample Collection and Preparation 3 Data Analysis 3.1 Data Pre-processing 3.2 Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) 3.3 Choice of Colour Model for Image Feature Extraction 3.4 Mathematical Modelling Technique 4 Results and Discussion 4.1 Data Clustering Using PCA and LDA 4.2 Performance of Regression Models for Classifications 5 Conclusion References A Comparison Among Three Neural Network Models for Silk Content Estimation from X-Ray Image of Cocoons 1 Introduction 2 Present Methodology 3 Materials and Methods 3.1 Sample Collection 3.2 Image Acquisition 3.3 Image Processing 3.4 Feature Extraction 3.5 Manual Silk Extraction from Cocoon 3.6 Data Preprocessing 3.7 Data Analysis Techniques 4 Results and Discussion 5 Conclusion References A Comparative Study on Disaster Detection from Social Media Images Using Deep Learning 1 Introduction 2 Methodology 2.1 Dataset Description 2.2 Convolutional Neural Networks (CNNs) 3 Experimental Setup 4 Conclusion References Rank Based Pixel-Value-Differencing: A Secure Steganographic Approach 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 Review of PVD Method 3.2 Rank Matrix Formation 3.3 Secret Data Bin Construction 3.4 Embedding Process 3.5 Extraction Process 4 Experimental Results 5 Comparative Analysis 5.1 Message Security 6 Conclusion and Future Scope References Forest Covers Classification of Sundarban on the Basis of Fuzzy C-Means Algorithm Using Satellite Images 1 Introduction 2 Martial and Methodology 2.1 Study Site 2.2 Satellite Image Collection 2.3 Methodology 2.4 Fuzzy C-Means Algorithm 3 Results and Discussions 4 Precision Assessment 5 Conclusion References Artificial Neural Network: An Answer to Right Order Quantity 1 Introduction 2 Need for the Study 3 Literature Review 4 Objectives 5 Scope 6 Limitations 7 Research Methodology and Data 8 Key Findings 8.1 Findings for Objective 1 8.2 Findings for Objective 2 9 Conclusion References Multi-Arc Processor—Harnessing Pseudo-concurrent Multiple Instruction Set Architecture (ISA) Over a Single Hardware Platform 1 Introduction 2 Related Works 3 Persistent Problems 4 Proposed Idea 5 Methodology of Design 5.1 ISA Switching Process and ISA Control 5.2 Opcode Size Management 5.3 Generic Abilities 5.4 Pseudo-concurrency 5.5 Other Customizations 6 Comparison 6.1 Based on Opcode Space and Size 6.2 Based on ISA Optimization 6.3 Register File Customizability 6.4 Generic Ability 7 Conclusion References Uncertainty Estimation Using Probabilistic Dependency: An Extended Rough Set-Based Approach 1 Introduction 2 Proposed Extension 2.1 Dynamic Decision System 2.2 Probabilistic Dependency 3 Methodology 3.1 Architecture 3.2 Mathematical Foundation 4 Validation with Experimental Data 5 Conclusion References Extension of TOPSIS and VIKOR Method for Decision-Making Problems with Picture Fuzzy Number 1 Introduction 2 Preliminaries 3 VIKOR and TOPSIS Method 4 Extended VIKOR and TOPSIS Method Using PFS 4.1 Extended VIKOR Method 4.2 Extended TOPSIS Method 5 Practical Example 6 Result and Discussion 7 Conclusion References A Study of Gathering of Location-Aware Mobile Robots 1 Introduction 2 Framework 3 Objective of the Paper 4 Reported Research Works 5 Conclusion References An Energy Efficient Autonomous Street Lighting System 1 Introduction 2 System Model 3 Problem Formulation 4 Proposed Approach 4.1 Example 5 Simulation Studies 5.1 Simulation Setup 5.2 Simulation Result 6 Conclusion References A Survey on Gathering of Distributed Mobile Agent in Discrete Domain 1 Introduction 2 Computational Model 3 Reported Research Works 4 Future Scope 5 Conclusion References Restaurant Recommendation System Based on Novel Approach Using K-Means and Naïve Bayes Classifiers 1 Introduction 2 Literature Review 2.1 Naïve Bayes 2.2 K-Means Algorithm 3 Data Source Comparison 4 Process Flow for Food Recommendation System 4.1 Applying Zomato API for Retrieving Data 4.2 Isolate Valuable Data Basis for Reviews 4.3 Apply Naïve Bayes Algorithm 4.4 Apply K-Means for Find High-Rated Restaurant Cluster 4.5 Displaying the Results According to Ratings 5 Implementation and Result Analysis 6 Conclusions and Future Work References Low-Cost Optical Illusion Fluid Display Device 1 Introduction 2 Related Works 3 Device Methodology 3.1 Block Diagram 3.2 A Low-Cost Optical Illusion Device Comprises of the Following Three Stages 3.3 Top View of the Developed Setup 4 Control Algorithm 5 Results and Analysis 5.1 Visual Illustration of the Three Modes 5.2 Graphical Representation as per the Visual Illustration of Fig. 3a–c 5.3 Graphical Representation Between Resistance and Light Intensity 6 Observation 7 Conclusion References Smart Grid Demand-Side Management by Machine Learning 1 Introduction 2 Proposed Algorithm Model 3 Load Data 4 Data Preprocessing 5 Load Profile Generation 5.1 Heating and Cooling Load 5.2 Cooling Degree Days (CDD) and Heating Degree Days (HDD) 5.3 Load Profile Data Training 6 Predictive Modeling 7 Predictive Outcomes and Performance Evaluation 8 Conclusion References An Integrated Domestic Sensing and Control System with Supervisory Check and Real-Time Data Acquisition 1 Introduction and Literary Review 2 Integrated System Overview 3 Subsystem Overview 3.1 Door Locking/Unlocking System 3.2 Automatic Temperature Adjusting System 3.3 Smart Lighting System 3.4 Water Tap Control System 3.5 Gas Leak/Fire Alarm System 4 Algorithms and Software Description 4.1 RNN Speech Recognition 4.2 CNN Image Classifier 4.3 Naïve Bayes Speech Classifier 5 User-End Analysis 6 Future Prospects References Development of a BCI-Based Application Using EEG to Assess Attentional Control 1 Introduction 2 Methodology 3 Results 4 Conclusion References Framework for Appraisal of Twenty-Twenty League Players 1 Introduction 2 Proposed Framework 2.1 Detailed Procedure 3 Data Analytics 3.1 Player Segregation 3.2 Classification of Batsmen 3.3 Classification of Bowlers 4 Pitch Analysis 5 Conclusion References Analysing Pearl’s Do-Calculus 1 Introduction 2 Some Basic Notations [2] 3 Subgraphs and Augmented Graphs 4 d-Separation Theorem 5 Uprooting and Mowing a Node 5.1 Uprooting 5.2 Mowing 6 Pearl’s Do-Calculus 7 Difference Between Bayes’ Conditional Probability and Do() Calculus 8 Proofs of the Three Rules 9 A Short Note on “Path” 10 Applications of Do-Operator 11 Shafer’s Probability Trees 12 Conclusion Bibliography A Dynamic Threshold-Based Trust-Oriented Intrusion Detection System in MANET 1 Introduction 2 Related Work 3 Dynamic Threshold and Trust Computation 3.1 Trust Evaluation Process 3.2 Discarding Malicious Node 4 Results and Analysis 4.1 Packet Delivery Ratio (PDR) Analysis 4.2 Analysis of Control Overhead 4.3 Analysis of Normalized Routing Overhead (NRO) 4.4 Throughput Analysis 5 Conclusion References Secured Session Key-Based E-Health: Biometric Blended with Salp Swarm Protocol in Telecare Portals 1 Introduction 2 Problem Statement 3 Proposed Technique 4 Analytical Quality Metrics 5 Histogram and Autocorrelation Analysis 6 Comparison with Existing IDEA 7 Statistical Tests Analysis 8 Analysis on Session Key Space 9 Comparison Study 10 Conclusion References Author Index