Skip to search
Skip to main content
Search in
Keyword
Title (keyword)
Author (keyword)
Subject (keyword)
Title starts with
Subject (browse)
Author (browse)
Author (sorted by title)
Call number (browse)
search for
Search
Advanced Search
Bookmarks
(
0
)
Princeton University Library Catalog
Start over
Cite
Send
to
SMS
Email
EndNote
RefWorks
RIS
Printer
Bookmark
Congress on intelligent systems. Volume 1 : proceedings of CIS 2020 / Harish Sharma [and four others] editors.
Format
Book
Language
English
Published/Created
Gateway East, Singapore : Springer, [2021]
©2021
Description
1 online resource (789 pages)
Availability
Available Online
Springer Nature - Springer Intelligent Technologies and Robotics eBooks 2021 English International
Details
Subject(s)
Artificial intelligence
—
Congresses
[Browse]
Editor
Sharma, Harish
[Browse]
Related name
Congress on Intelligent Systems (1st : 2020 : New Delhi, India)
[Browse]
Series
Advances in Intelligent Systems and Computing
[More in this series]
Advances in Intelligent Systems and Computing ; v.1334
[More in this series]
Source of description
Description based on print version record.
Contents
Intro
Preface
Contents
About the Editors
Modelling Subjective Happiness with a Survey Poisson Model and XGBoost Using an Economic Security Approach
1 Introduction
2 Data and Descriptive Statistics
3 Methodology
3.1 Survey Poisson Model
3.2 XGBoost
3.3 Missing Data
4 Results
4.1 Results of the Sensitivity Analysis of Missing Data
4.2 Predicted Subjective Happiness
4.3 Regression Analysis
5 Conclusions
References
Monitoring Web-Based Evaluation of Online Reputation in Barcelona
2 Methodology Description
2.1 Principal Component Analysis
2.2 Robust Compositional Regression Model
3 Data Description
4 Discussion of Results
5 Conclusions and Managerial Implications
Appendix 1: Abbreviation and Corresponding Meaning of Fig. 1
Appendix 2: Abbreviation and Corresponding Meaning of Fig. 2
Information Technology for the Synthesis of Optimal Spatial Configurations with Visualization of the Decision-Making Process
2 Basic Concepts and Definitions
3 Configuration Space of Geometric Objects Based on Geometric Information
4 Information Technology Model for the Synthesis of Spatial Configurations
5 The Software Package Description
6 An Example of Implementing the Results
7 Conclusion
Hybrid Approach to Combinatorial and Logic Graph Problems
2 The Problem Description
3 The Hybrid Approach
4 Hybrid Three-Level Algorithm
5 Objective Function
6 Experiments
Energy-Efficient Algorithms Used in Datacenters: A Survey
2 Techniques Used in Datacenters to Maintain Energy Efficiency
3 Energy Efficiency Metrics Used in Datacenters
4 Different Types of Algorithms Used in Datacenters
5 Related Work
6 Conclusion.
Software Log Anomaly Detection Method Using HTM Algorithm
2 Background
3 Proposed Method
3.1 Log Parser
3.2 Method Overview
4 Evaluation
4.1 Experiment Setting
4.2 Input Format
4.3 Results
5 Conclusion
Logical Inference in Predicate Calculus with the Definition of Previous Statements
2 Definition of the Problem
2.1 Meaningful Definition of the Problem
2.2 Formal Definition of the Problem
3 Basic Processing Procedures
3.1 Partial "Disjuncts Division"
3.2 Complete "Disjunct Division"
4 Procedure of Inference
5 Method of Inference
6 Conclusion
Congestion Management Considering Demand Response Programs Using Multi-objective Grasshopper Optimization Algorithm
2 Materials and Methods
2.1 Demand Response Programs Cost
3 Multi-objective Grasshopper Optimization Algorithm
4 Results and Discussions
Appendix: Parameters of MOGOA
A Hardware Accelerator Implementation of Multilayer Perceptron
2 Literature Review
3 FFNN Computation Algorithm
4 Hardware Architecture
4.1 Neural Processing Element
4.2 Activation Function Block (AFB)
4.3 Network Control Sequences
4.4 Number of Clock Cycles of Execution
5 Results and Discussion
5.1 Hardware Blocks
5.2 Hardware Architecture of 3times3times2 MLP
5.3 Resource Utilization and Performance Evaluation
6 Application
Building a Classifier of Behavior Patterns for Semantic Search Based on Cuckoo Search Meta-heuristics
2 Formulation of the Problem
3 Method for Building the Classifier of Behavior Pattern
4 Bio-inspired Algorithm Based on Cuckoo Search
5 Experimental Research
References.
TETRA Enhancement Based on Adaptive Modulation
2 The Proposed TETRA Modules Layers
3 The Proposed TETRA System Structure
4 Proposal Frame of Adaptive TETRA System
5 Simulation and Results
Dynamic Stability Enhancement of Grid Connected Wind System Using Grey Wolf Optimization Technique
2 Grid Connected Wind Turbine System
3 Modeling of SMEs System
3.1 Modeling of VSC
3.2 Modeling of Chopper
4 Grey Wolf Optimization (GWO) Technique
5 Control Strategy of Wind System Using GWO
6 Simulation Results
A Comparative Analysis on Wide-Area Power System Control with Mitigation the Effects of an Imperfect Medium
2 Modelling of the Test Power System
2.1 Kundur's Two-Area Four-Machine Test System
2.2 Selection of Control Location and Wide-Area Remote Signal
3 Control Techniques
3.1 Conventional PSS (CPSS)
3.2 Multi-band-based PSS (MB-PSS4B)
3.3 Linear Quadratic Gaussian (LQG) Controller
4 Noise in System
5 Results and Discussions
6 Conclusions
Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT)
2 Related Work
3 Theoretical Background
3.1 Delineation of IoT Adware Attacks Classification and Identification Using (DL-SVM-IoT)
4 Experimental Results and Comparison
5 Conclusion and Future Work
Intrusion Detection System for Securing Computer Networks Using Machine Learning: A Literature Review
1.1 Machine Learning for IDS
1.2 Types of IDS
2 Review Questions
3 Papers in Review
4 Discussions
An Exploration of Entropy Techniques for Envisioning Announcement Period of Open Source Software
1 Introduction.
1.1 Information Measures
2 Predicting Bugs and Estimating Release Time of Software
3 Conclusion
Occurrence Prediction of Pests and Diseases in Rice of Weather Factors Using Machine Learning
3 Proposed Work
3.1 Data Collection
3.2 Data Preprocessing
3.3 Modeling of Data for Testing and Training Purpose
3.4 Machine Learning
6 Future Scope
A Literature Review on Generative Adversarial Networks with Its Applications in Healthcare
2 What are Generative Adversarial Networks or GANs
2.1 Generative Model
2.2 Discriminative Model
3 Applications of GANs or Generative Adversarial Networks in Healthcare
3.1 Electronic Health Record
3.2 Retinal Image Synthesis
3.3 Skin Lesion Analysis
3.4 Medical Image Segmentation
4 Discussion
4.1 Advantages
4.2 Disadvantages
4.3 Future Scope
A Federated Search System for Online Property Listings Based on SIFT Algorithm
2 Online Federated Search System
2.1 Source Crawling
2.2 Collection Creation
2.3 User Interface
3 Implementing the Property Federated Search System
4 Evaluation and Discussions
Digital Brain Building a Key to Improve Cognitive Functions by an EEG-Controlled Videogames as Interactive Learning Platform
1.1 User State Monitoring
1.2 Neurogaming Using NeuroSky
1.3 EEG Acquisition
1.4 Neuroergonomics Application
2 Methodology
2.1 Mathematical Model
2.2 Neurogame and Educational Concept
2.3 Brain Runner
2.4 Hybrid BCI
2.5 Interactive Session
3 Results
4 Conclusion
Intelligent Car Cabin Safety System Through IoT Application
2 IoT (Internet of Things).
3 System Description and Principal
4 Methodology
Utilization of Delmia Software for Saving Cycle Time in Robotics Spot Welding
2 Problem Statement
3 Evolutionary Approach
4 Simulation Experiments
Data Protection Techniques Over Multi-cloud Environment-A Review
2 Literature Survey
3 Comparative Analysis or Research Scope
4 Visibility of Comparative Study
4.1 Description of Different Cloud Framework Used
4.2 Issued Addressed
4.3 Benefits
5 Identified Gaps in Literature Survey
6 Mathematical Model
7 Proposed Methodology or Related Work
8 Conclusion
Hierarchical Ontology Based on Word Sense Disambiguation of English to Hindi Language
2 Proposed Methodology
3 Preprocessing of English/Hindi Questions File and Dictionary
3.1 Preprocessing
3.2 Dictionary Preprocessing
4 Ontology Development Module
4.1 Collection of Senses
4.2 Calculation of Weight TF
4.3 Hierarchical Ontology
5 Proposed Hierarchical Ontology Algorithm
5.1 Proposed Algorithm
6 Experiment and Results
Review Paper: Error Detection and Correction Onboard Nanosatellites
2.1 Space Radiation
2.2 Glitches and Upsets
2.3 Geomagnetism
2.4 EDAC Schemes
2.5 Implementing EDAC Systems
3 Discussion
Kerala Floods: Twitter Analysis Using Deep Learning Techniques
3.2 Data Cleaning
3.3 Data Labeling
3.4 Data Division and Separation
4 Implementation and Results
An Improved DVFS Circuit &
Error Correction Technique
2 Charge Pump Circuit.
Show 214 more Contents items
ISBN
981-336-981-7
OCLC
1255228861
Statement on language in description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage.
Read more...
Other views
Staff view
Ask a Question
Suggest a Correction
Report Harmful Language
Supplementary Information