Congress on intelligent systems. Volume 1 : proceedings of CIS 2020 / Harish Sharma [and four others] editors.

Format
Book
Language
English
Published/​Created
  • Gateway East, Singapore : Springer, [2021]
  • ©2021
Description
1 online resource (789 pages)

Details

Subject(s)
Editor
Series
Source of description
Description based on print version record.
Contents
  • Intro
  • Preface
  • Contents
  • About the Editors
  • Modelling Subjective Happiness with a Survey Poisson Model and XGBoost Using an Economic Security Approach
  • 1 Introduction
  • 2 Data and Descriptive Statistics
  • 3 Methodology
  • 3.1 Survey Poisson Model
  • 3.2 XGBoost
  • 3.3 Missing Data
  • 4 Results
  • 4.1 Results of the Sensitivity Analysis of Missing Data
  • 4.2 Predicted Subjective Happiness
  • 4.3 Regression Analysis
  • 5 Conclusions
  • References
  • Monitoring Web-Based Evaluation of Online Reputation in Barcelona
  • 2 Methodology Description
  • 2.1 Principal Component Analysis
  • 2.2 Robust Compositional Regression Model
  • 3 Data Description
  • 4 Discussion of Results
  • 5 Conclusions and Managerial Implications
  • Appendix 1: Abbreviation and Corresponding Meaning of Fig. 1
  • Appendix 2: Abbreviation and Corresponding Meaning of Fig. 2
  • Information Technology for the Synthesis of Optimal Spatial Configurations with Visualization of the Decision-Making Process
  • 2 Basic Concepts and Definitions
  • 3 Configuration Space of Geometric Objects Based on Geometric Information
  • 4 Information Technology Model for the Synthesis of Spatial Configurations
  • 5 The Software Package Description
  • 6 An Example of Implementing the Results
  • 7 Conclusion
  • Hybrid Approach to Combinatorial and Logic Graph Problems
  • 2 The Problem Description
  • 3 The Hybrid Approach
  • 4 Hybrid Three-Level Algorithm
  • 5 Objective Function
  • 6 Experiments
  • Energy-Efficient Algorithms Used in Datacenters: A Survey
  • 2 Techniques Used in Datacenters to Maintain Energy Efficiency
  • 3 Energy Efficiency Metrics Used in Datacenters
  • 4 Different Types of Algorithms Used in Datacenters
  • 5 Related Work
  • 6 Conclusion.
  • Software Log Anomaly Detection Method Using HTM Algorithm
  • 2 Background
  • 3 Proposed Method
  • 3.1 Log Parser
  • 3.2 Method Overview
  • 4 Evaluation
  • 4.1 Experiment Setting
  • 4.2 Input Format
  • 4.3 Results
  • 5 Conclusion
  • Logical Inference in Predicate Calculus with the Definition of Previous Statements
  • 2 Definition of the Problem
  • 2.1 Meaningful Definition of the Problem
  • 2.2 Formal Definition of the Problem
  • 3 Basic Processing Procedures
  • 3.1 Partial "Disjuncts Division"
  • 3.2 Complete "Disjunct Division"
  • 4 Procedure of Inference
  • 5 Method of Inference
  • 6 Conclusion
  • Congestion Management Considering Demand Response Programs Using Multi-objective Grasshopper Optimization Algorithm
  • 2 Materials and Methods
  • 2.1 Demand Response Programs Cost
  • 3 Multi-objective Grasshopper Optimization Algorithm
  • 4 Results and Discussions
  • Appendix: Parameters of MOGOA
  • A Hardware Accelerator Implementation of Multilayer Perceptron
  • 2 Literature Review
  • 3 FFNN Computation Algorithm
  • 4 Hardware Architecture
  • 4.1 Neural Processing Element
  • 4.2 Activation Function Block (AFB)
  • 4.3 Network Control Sequences
  • 4.4 Number of Clock Cycles of Execution
  • 5 Results and Discussion
  • 5.1 Hardware Blocks
  • 5.2 Hardware Architecture of 3times3times2 MLP
  • 5.3 Resource Utilization and Performance Evaluation
  • 6 Application
  • Building a Classifier of Behavior Patterns for Semantic Search Based on Cuckoo Search Meta-heuristics
  • 2 Formulation of the Problem
  • 3 Method for Building the Classifier of Behavior Pattern
  • 4 Bio-inspired Algorithm Based on Cuckoo Search
  • 5 Experimental Research
  • References.
  • TETRA Enhancement Based on Adaptive Modulation
  • 2 The Proposed TETRA Modules Layers
  • 3 The Proposed TETRA System Structure
  • 4 Proposal Frame of Adaptive TETRA System
  • 5 Simulation and Results
  • Dynamic Stability Enhancement of Grid Connected Wind System Using Grey Wolf Optimization Technique
  • 2 Grid Connected Wind Turbine System
  • 3 Modeling of SMEs System
  • 3.1 Modeling of VSC
  • 3.2 Modeling of Chopper
  • 4 Grey Wolf Optimization (GWO) Technique
  • 5 Control Strategy of Wind System Using GWO
  • 6 Simulation Results
  • A Comparative Analysis on Wide-Area Power System Control with Mitigation the Effects of an Imperfect Medium
  • 2 Modelling of the Test Power System
  • 2.1 Kundur's Two-Area Four-Machine Test System
  • 2.2 Selection of Control Location and Wide-Area Remote Signal
  • 3 Control Techniques
  • 3.1 Conventional PSS (CPSS)
  • 3.2 Multi-band-based PSS (MB-PSS4B)
  • 3.3 Linear Quadratic Gaussian (LQG) Controller
  • 4 Noise in System
  • 5 Results and Discussions
  • 6 Conclusions
  • Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT)
  • 2 Related Work
  • 3 Theoretical Background
  • 3.1 Delineation of IoT Adware Attacks Classification and Identification Using (DL-SVM-IoT)
  • 4 Experimental Results and Comparison
  • 5 Conclusion and Future Work
  • Intrusion Detection System for Securing Computer Networks Using Machine Learning: A Literature Review
  • 1.1 Machine Learning for IDS
  • 1.2 Types of IDS
  • 2 Review Questions
  • 3 Papers in Review
  • 4 Discussions
  • An Exploration of Entropy Techniques for Envisioning Announcement Period of Open Source Software
  • 1 Introduction.
  • 1.1 Information Measures
  • 2 Predicting Bugs and Estimating Release Time of Software
  • 3 Conclusion
  • Occurrence Prediction of Pests and Diseases in Rice of Weather Factors Using Machine Learning
  • 3 Proposed Work
  • 3.1 Data Collection
  • 3.2 Data Preprocessing
  • 3.3 Modeling of Data for Testing and Training Purpose
  • 3.4 Machine Learning
  • 6 Future Scope
  • A Literature Review on Generative Adversarial Networks with Its Applications in Healthcare
  • 2 What are Generative Adversarial Networks or GANs
  • 2.1 Generative Model
  • 2.2 Discriminative Model
  • 3 Applications of GANs or Generative Adversarial Networks in Healthcare
  • 3.1 Electronic Health Record
  • 3.2 Retinal Image Synthesis
  • 3.3 Skin Lesion Analysis
  • 3.4 Medical Image Segmentation
  • 4 Discussion
  • 4.1 Advantages
  • 4.2 Disadvantages
  • 4.3 Future Scope
  • A Federated Search System for Online Property Listings Based on SIFT Algorithm
  • 2 Online Federated Search System
  • 2.1 Source Crawling
  • 2.2 Collection Creation
  • 2.3 User Interface
  • 3 Implementing the Property Federated Search System
  • 4 Evaluation and Discussions
  • Digital Brain Building a Key to Improve Cognitive Functions by an EEG-Controlled Videogames as Interactive Learning Platform
  • 1.1 User State Monitoring
  • 1.2 Neurogaming Using NeuroSky
  • 1.3 EEG Acquisition
  • 1.4 Neuroergonomics Application
  • 2 Methodology
  • 2.1 Mathematical Model
  • 2.2 Neurogame and Educational Concept
  • 2.3 Brain Runner
  • 2.4 Hybrid BCI
  • 2.5 Interactive Session
  • 3 Results
  • 4 Conclusion
  • Intelligent Car Cabin Safety System Through IoT Application
  • 2 IoT (Internet of Things).
  • 3 System Description and Principal
  • 4 Methodology
  • Utilization of Delmia Software for Saving Cycle Time in Robotics Spot Welding
  • 2 Problem Statement
  • 3 Evolutionary Approach
  • 4 Simulation Experiments
  • Data Protection Techniques Over Multi-cloud Environment-A Review
  • 2 Literature Survey
  • 3 Comparative Analysis or Research Scope
  • 4 Visibility of Comparative Study
  • 4.1 Description of Different Cloud Framework Used
  • 4.2 Issued Addressed
  • 4.3 Benefits
  • 5 Identified Gaps in Literature Survey
  • 6 Mathematical Model
  • 7 Proposed Methodology or Related Work
  • 8 Conclusion
  • Hierarchical Ontology Based on Word Sense Disambiguation of English to Hindi Language
  • 2 Proposed Methodology
  • 3 Preprocessing of English/Hindi Questions File and Dictionary
  • 3.1 Preprocessing
  • 3.2 Dictionary Preprocessing
  • 4 Ontology Development Module
  • 4.1 Collection of Senses
  • 4.2 Calculation of Weight TF
  • 4.3 Hierarchical Ontology
  • 5 Proposed Hierarchical Ontology Algorithm
  • 5.1 Proposed Algorithm
  • 6 Experiment and Results
  • Review Paper: Error Detection and Correction Onboard Nanosatellites
  • 2.1 Space Radiation
  • 2.2 Glitches and Upsets
  • 2.3 Geomagnetism
  • 2.4 EDAC Schemes
  • 2.5 Implementing EDAC Systems
  • 3 Discussion
  • Kerala Floods: Twitter Analysis Using Deep Learning Techniques
  • 3.2 Data Cleaning
  • 3.3 Data Labeling
  • 3.4 Data Division and Separation
  • 4 Implementation and Results
  • An Improved DVFS Circuit &
  • Error Correction Technique
  • 2 Charge Pump Circuit.
ISBN
981-336-981-7
OCLC
1255228861
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view

Supplementary Information