Artificial Intelligence Application in Networks and Systems: Proceedings of 12th Computer Science On-line Conference 2023, Volume 3

دانلود کتاب Artificial Intelligence Application in Networks and Systems: Proceedings of 12th Computer Science On-line Conference 2023, Volume 3

53000 تومان موجود

کتاب کاربرد هوش مصنوعی در شبکه ها و سیستم ها: مجموعه مقالات دوازدهمین کنفرانس آنلاین علوم کامپیوتر 2023، جلد 3 نسخه زبان اصلی

دانلود کتاب کاربرد هوش مصنوعی در شبکه ها و سیستم ها: مجموعه مقالات دوازدهمین کنفرانس آنلاین علوم کامپیوتر 2023، جلد 3 بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 13


توضیحاتی در مورد کتاب Artificial Intelligence Application in Networks and Systems: Proceedings of 12th Computer Science On-line Conference 2023, Volume 3

نام کتاب : Artificial Intelligence Application in Networks and Systems: Proceedings of 12th Computer Science On-line Conference 2023, Volume 3
عنوان ترجمه شده به فارسی : کاربرد هوش مصنوعی در شبکه ها و سیستم ها: مجموعه مقالات دوازدهمین کنفرانس آنلاین علوم کامپیوتر 2023، جلد 3
سری : Lecture Notes in Networks and Systems, 724
نویسندگان : ,
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 854
ISBN (شابک) : 3031353137 , 9783031353130
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 87 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Preface
Organization
Contents
Prediction Model for Tax Assessments Using Data Mining and Machine Learning
1 Introduction
2 Literature Review and Related works
3 Methodology
3.1 Model Design and Implementation
3.2 Web Application Design and Implementation
4 Results
4.1 Random Forest Score Classifier
4.2 Confusion Matrix
4.3 ROC Curve
5 Discussion and Conclusion
References
A Review of Evaluation Metrics in Machine Learning Algorithms
1 Introduction
2 Related Work
3 Evaluation Metrics
4 Results and Discussion
5 Conclusion
References
Hardware Implementation of IoT Enabled Real-Time Air Quality Monitoring for Low- and Middle-Income Countries
1 Introduction
1.1 Lack of Air Quality Monitory Systems in Africa
1.2 Air Quality Index in Air Quality Monitoring
2 Methods and Materials
2.1 Proposed Hardware Model and Work Flow
2.2 Sensing Unit
3 Experimental Setup
4 Results and Discussion
5 Conclusion
References
Predicting the Specific Student Major Depending on the STEAM Academic Performance Using Back-Propagation Learning Algorithm
1 Introduction
2 Related Works and Research Gap
3 The Proposed Approach
3.1 The Dataset Description
3.2 The STS Model
3.3 The (SAF) Model
3.4 Factors Impacting Student Performance
3.5 Input Layer (SAF) Model
3.6 Hidden Layer (SAF) Model
3.7 Output Layer (SAF) Model
4 Final Decision
5 Optimization Procedure
6 Results
7 Conclusion
References
Data Mining, Natural Language Processing and Sentiment Analysis in Vietnamese Stock Market
1 Introduction
2 Related Work
3 Approach
3.1 General
3.2 Data Crawling
3.3 Labeling System
4 Experiments
4.1 Dataset Number One
4.2 Dataset Number Two
4.3 Comments
5 Conclusions
References
Two Approaches to E-Book Content Classification
1 Introduction
2 An Initial Data and an “Image” Model
3 Classification Based on a Mixed Text-Formula Model
3.1 Data Preparation
3.2 Feature Extraction in a Text-Formula Model
4 Practical Results of Classification
5 Conclusions
References
On the Geometry of the Orbits of Killing Vector Fields
1 Introduction
2 The Geometry of Killing Vector Fields
3 The Classification of Geometry of Orbits
4 On the Compactness of the Orbits
5 Applications in Partial Differential Equations
6 Conclusion
References
The Classification of Vegetations Based on Share Reflectance at Spectral Bands
1 Introduction
2 Materials, Data and Methods
3 Results
3.1 Preparation Data of Share Reflection for Vegetations
3.2 Classification of Vegetations Based on Share Reflectance at Bands
4 Discussion
5 Conclusions
References
The Problem of Information Singularity in the Storage of Digital Data
1 Introduction
2 Overview of Information Singularity Issues
2.1 Storing and Interpreting Streaming Videos
2.2 Expertise in the Value of Digital Data
2.3 Linked Data Search and Distributed Digital Data
2.4 Digitization of Documents
3 Possible Solution to the Information Singularity Problem
4 The Problem of Solving the Information Singularity Problem
5 Conclusion
References
Autonomous System for Locating the Maize Plant Infected by Fall Armyworm
1 Introduction
2 Proposed Solution
2.1 Evaluation Parameter
2.2 Proposed Algorithm
3 Experimental Results and Discussion
4 Conclusion
References
The Best Model for Determinants Impacting Employee Loyalty
1 Introduction
2 Literature Review
2.1 Employee Loyalty
2.2 Compensation
2.3 Work Environment
2.4 Coworker Relationships
2.5 Training and Development
2.6 Job Satisfaction
3 Methodology
3.1 Analytical Technique
3.2 Data and Sample
4 Results and Discussion
4.1 Results
4.2 Discussion
5 Conclusions and Limitations
References
Intrusion Detection with Supervised and Unsupervised Learning Using PyCaret Over CICIDS 2017 Dataset
1 Introduction
2 Related Work
3 Dataset Analysis and Preprocessing
4 Methodology
5 Experimental Results
6 Conclusion
References
A Web Application for Moving from One Spot to Another by Using Different Public Transport - a Logical Model
1 MVC
2 Model of Application
3 Conclusion
References
Traffic Prediction for VRP in Intelligent Transportation Systems
1 Introduction
2 Real-Time Prediction System Design
2.1 Dataset
2.2 Data Processing Pipelines
2.3 Missing Values
3 Models
4 Results
4.1 Conclusion
References
Enhancing Monte-Carlo SLAM Algorithm to Overcome the Issue of Illumination Variation and Kidnapping in Application to Unmanned Vehicle
1 Introduction
2 Literature Review
3 Methodology
3.1 Image Acquisition Stage
3.2 Feature Extraction Stage
3.3 Filtering Stage
3.4 Simultaneous Localization and Mapping Stage
3.5 Simultaneous Localization and Mapping Stage
4 Experiment and Result
5 Conclusion
References
A Neighborhood Overlap-Based Binary Search Algorithm for Edge Classification to Satisfy the Strong Triadic Closure Property in Complex Networks
1 Introduction
2 Binary Search Algorithm to Determine the Threshold NOVER Score
3 Execution of the Binary Search Algorithm on Real-World Networks
4 Related Work and Contributions
5 Conclusions and Future Work
References
Novel Framework for Potential Threat Identification in IoT Harnessing Machine Learning
1 Introduction
2 Related Work
3 Problem Description
4 Proposed Methodology
5 Method Implementation
5.1 Dataset Adopted for Study
5.2 Autoencoder Design
6 Results Discussion
7 Conclusion
References
Multivariate Statistical Techniques to Analyze Crime and Its Relationship with Unemployment and Poverty: A Case Study
1 Introduction
2 Materials and Methods
2.1 Data Description
2.2 HJ-Biplot
2.3 Clustering
2.4 Methodology
3 Results and Discussion
3.1 Analysis of Crime from January 2021 - May 2022
3.2 Analysis of Crime, Unemployment, and Poverty from 2019-2021
4 Conclusion
References
Bidirectional Recurrent Neural Network for Total Electron Content Forecasting
1 Introduction
2 Data and Methods
2.1 Experimental Data
2.2 Data Preprocessing
2.3 Recurrent Neural Networks
2.4 Bidirectional Recurrent Neural Networks
2.5 The Proposed Deep Neural Networks for TEC Forecasting
3 Results and Discussion
4 Conclusions
References
Convolutional Neural Network (CNN) of Resnet-50 with Inceptionv3 Architecture in Classification on X-Ray Image
1 Introduction
2 State of the Art
2.1 Dataset
2.2 Model Deep Learning
2.3 Evaluation Metrics
2.4 Data Sharing and Hyperparameter
3 Result and Discussion
3.1 Result
3.2 Discussion
4 Conclusion
References
Image Manipulation Using Korean Translation and CLIP: Ko-CLIP
1 Introduction
2 Related Work
3 Method
3.1 Structure
3.2 BERT
3.3 CLIP
3.4 StyleGAN
4 Performance Evaluation
4.1 Environment
4.2 Tokenization
5 Conclusion
6 Limitations of the Study
References
Internet Olympiad in Computer Science in the Context of Assessing the Scientific Potential of the Student
1 Introduction
2 Materials and Methods
3 Results
4 Discussion
5 Conclusion
References
Evaluation of the Prognostic Significance and Accuracy of Screening Tests for Alcohol Dependence Based on the Results of Building a Multilayer Perceptron
1 Introduction
2 Method
3 Results and Discussion
4 Conclusion
References
Geographic Data Science for Analysis in Rural Areas: A Study Case of Financial Services Accessible in the Peruvian Agricultural Sector
1 Introduction
2 Geographic Data Science
2.1 Open Geographic Information to Solve Societal Issues
2.2 Spatial Considerations and Financial Accessibility in Rural Areas
3 Material and Method
3.1 Spatial Data
3.2 Empirical Methodology
4 Results
4.1 Peruvian Regional Visualization
4.2 Spatial Considerations of Local Financial Accessibility by Regions
5 Conclusions
References
A Sensor Based Hydrogen Volume Assessment Deep Learning Framework – A Pohokura Field Case Study
1 Introduction
2 Methodology
3 Results
4 AI Storage Volume Assessment
5 Conclusion
References
Complex Network Analysis of the US Marine Intermodal Port Network
1 Introduction
2 Cluster Analysis
3 Centrality Metrics
4 Principal Component Analysis of Network-Level Metrics
5 Conclusions and Future Work
References
A Maari Field Deep Learning Optimization Study via Efficient Hydrogen Sulphide to Hydrogen Production
1 Introduction
2 Reservoir
3 Optimization Study
4 Conclusion
References
Daeng AMANG: A Novel AIML Based Chatbot for Information Security Training
1 Introduction
2 Related Studies
3 Methodology
4 Results and Discussion
5 Conclusion
References
Forecasting Oil Production for Matured Fields Using Reinforced RNN-DLSTM Model
1 Introduction
2 Methodology
3 LSRM Model Framework
4 Data Set
5 RNN-DLSTM Model
6 The Volve Field Details
7 Results and Discussion
8 Conclusions and Recommendations
References
Machine Learning Techniques for Predicting Malaria: Unpacking Emerging Challenges and Opportunities for Tackling Malaria in Sub-saharan Africa
1 Introduction
2 Materials and Method
2.1 Search Strategy
2.2 Study Selection and Eligibility Criteria
2.3 Data Extraction
3 Results Analysis and Discussion
3.1 Machine Learning-Based Malaria Prediction Models
3.2 Malaria Prediction Models Performance Evaluation Metrics
3.3 Data Sources and Risk Factors (Predictors) Associated With Malaria Outbreaks
3.4 Identified Research Gaps and Future Opportunities for Predicting Malaria
4 Recommendations
5 Conclusion
References
An Ontological Model for Ensuring the Functioning of a Distributed Monitoring System with Mobile Components Based on a Distributed Ledger
1 Introduction
2 Analysis of Methods and Algorithms for Workload Relocation Problem Solving in the Fog Computing Environment
3 Ontology-Based Method of Workload Relocation
4 An Ontological Model for Ensuring the Functioning of a Distributed Monitoring System with Mobile Components Based on a Distributed Registry
5 Production Rules Development
6 Conclusions
References
MIREAHMATY—Three-Dimensional Chess in the System of Virtual Reality VR
1 Introduction
2 Basic Axioms of the Game
3 Moves of the Figures
4 Arrangements
5 Conclusion
References
Overview of Machine Learning Processes Used in Improving Security in API-Based Web Applications
1 Introduction
1.1 How this Research is Structured
1.2 Research Questions
2 RESTful API Analysis
2.1 OpenAPI
2.2 Inter-parameter Dependencies in Web APIs
3 Cybersecurity Threats for APIs
3.1 API Security Preventing Challenges
3.2 API Software Security Focused Metrics
3.3 AI/ML Usage in Cybersecurity Solutions
4 Automated Tools and ML Techniques in Testing APIs Solutions
4.1 Related Work
4.2 API Prober 2.0
4.3 IDLReasoner
4.4 RESTest
4.5 API Traffic Classification Techniques and Prediction
4.6 RESTful API Fuzzing
4.7 Test Generation Tools Based on OpenAPI Documents
4.8 ML Testing Tools with the Scope of Security Vulnerability Exposure
5 Results and Discussions
5.1 Challenges in Using ML Techniques in Cybersecurity
5.2 Data Collection
5.3 Security Threats Towards ML
6 Future Work and Research Paths
6.1 Test Case Generation and Report Analysis Using NLP
6.2 Anomaly Detection that Uses Unsupervised Learning
6.3 Access Control Using Reinforcement Learning
6.4 Requirements and Compliance Checking Using ML
6.5 Vulnerability Detection Using ML
7 Conclusions
7.1 RQ1: ML Approaches Used
7.2 RQ2: Types of Security Vulnerabilities Addressed
7.3 RQ3: Solution Effectiveness
7.4 Final Thoughts
References
The Way of Application of Mobile Components for Monitoring Systems of Coastal Zones
1 Introduction
2 Description of Application of Mobile Components for Monitoring Systems of Coastal Zones
3 Conclusion
References
Network Traffic Analysis and Control by Application of Machine Learning
1 Introduction
2 State of the Art
3 Methodology
4 Results
5 Conclusions
References
Genetic Algorithm for a Non-standard Complex Problem of Partitioning and Vehicle Routing
1 Introduction
2 Case Study
3 Literature Review of Existing Problem Formalization
3.1 Vehicle Routing Problem
3.2 Number Partitioning Problem
4 Mathematical Modelling of Proposed Problem
5 Design and Implementation
6 Validation and Results
7 Conclusions
References
A Simple yet Smart Welding Path Generator
1 Introduction
2 Related Works
3 Methodology
3.1 A Brief of the Algorithm
3.2 Data Collection (CMOS IMAGE-POINT CLOUD)
3.3 Point Cloud Filtering
3.4 Plane RANSAC Segmentation
3.5 Finding Cloud Borders with Alpha Shape
3.6 Linear RANSAC Segmentation of the Borders
3.7 Aggregation of the Segments to Welding Path
4 Results
5 Discussion
6 Conclusion
References
Moving Object 3D Detection and Segmentation Using Optical Flow Clustering
1 Introduction
2 Related Studies
2.1 Video Segmentation
2.2 Monocular 3D Object Detection
3 Background
3.1 Camera Model
3.2 Optical Flow
3.3 Segmentation
3.4 Clustering
3.5 Inverse Perspective Mapping
3.6 Object Detection
4 Joint Method for 3D Detection and Instance Segmentation
4.1 Model Assumptions
4.2 HSV Color Quantization
4.3 Lifting 2D Object Detection to 3D
4.4 Putting It All Together
5 Conclusion and Future Work
References
Fuzzy Inference Algorithm Using Databases
1 Introduction
2 Methods
3 Results and Discussion
4 Conclusion
References
An Algorithm for Constructing a Dietary Survey Using a 24-h Recall Method
1 Introduction
2 Materials and Methods
3 Results and Discussion
4 Conclusion
References
Machine Learning Methods and Words Embeddings in the Problem of Identification of Informative Content of a Media Text
1 Nature Language Models
1.1 Embeddings of Words
1.2 Russian Language Models
1.3 Information Content of Media Text
2 Conclusion and Future Work
References
Anxiety Mining from Socioeconomic Data
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Acquisition
3.2 Data Preprocessing
3.3 Exploratory Data Analysis (EDA)
3.4 Feature Engineering
3.5 Removing Outliers
3.6 Encoding
3.7 Splitting
3.8 Scaling
3.9 Feature Selection
3.10 Model Training
3.11 Hyperparameter Tuning
4 Result
4.1 Performance Metrics
4.2 Explainable AI
5 Discussion
6 Conclusion
References
Detection of IoT Communication Attacks on LoRaWAN Gateway and Server
1 Introduction
2 Background
3 Materials and Methods
4 Experiment Implementation and Result
5 Conclusions
References
The Application of Multicriteria Decision-Making to the Small and Medium-Sized Business Digital Marketing Industry
1 Introduction
2 Theoretical Framework
2.1 The AHP (Analytic Hierarchy Process) Method
3 Methodology
4 Analysis
5 Conclusions
References
Opportunities to Improve the Effectiveness of Online Learning Based on the Study of Student Preferences as a “Human Operator”
1 Introduction
2 Methods
3 Results
4 Discussion
5 Conclusion
References
Capabilities of the Matrix Method of Teaching in the Course of Foreign Language Professional Training
1 Introduction
2 Methods
3 Results
4 Discussion
5 Conclusion
References
An Approach for Making a Conversation with an Intelligent Assistant
1 Introduction
2 Highlighting Problems
3 Analysis of Analogues
4 Proposed Approach
5 The Structure of the Algorithm Implementing the Proposed Approach
6 Conclusion
References
Fraud Detection in Mobile Banking Based on Artificial Intelligence
1 Introduction
2 Literature Review
2.1 Artificial Intelligence
2.2 Machine Learning
2.3 Data Mining
2.4 Related Works
3 Methodology
3.1 Data Collection and Preparation
3.2 Data Mining
4 Analysis and Results
4.1 Data Extraction
4.2 Data Analysis
5 Conclusion
References
A Comparative Study on the Correlation Between Similarity and Length of News from Telecommunications and Media Companies
1 Introduction
1.1 Motivation
1.2 Objective
2 Related Work
2.1 Study on the Length of News
2.2 Study on News Similarity
2.3 Cosine Similarity and TF-IDF Weight Model
3 Proposed Method
3.1 Data Crawling
3.2 Data Classification
3.3 Measure the Length of the News
3.4 Measurement of News Similarity
3.5 Comparing Data Standardization to Three Methods
3.6 Technical Statistics
4 Performance Evaluation
5 Limitations of the Study
6 Conclusion
References
A Survey of Bias in Healthcare: Pitfalls of Using Biased Datasets and Applications
1 Introduction
2 Bias and Different Types of Bias
3 Bias in Medicine
3.1 Human Aspect of Bias
3.2 Bias in Medical Technology
3.3 Bias in Medical Datasets
3.4 Bias in AI-Based Medical Applications
4 Summary of Bias and Lessons Learned
5 Conclusion
References
Professional Certification for Logistics Manager Selection: A Multicriteria Approach
1 Introduction
2 Methodology
3 Multicriteria Decision Analysis Method
4 Multicriteria Method Applied to Hiring a Logistics Manager
4.1 Construction of the Decision-Making Model
4.2 Model Experimentation
5 Final Considerations
References
Evaluation of Artificial Intelligence-Based Models for the Diagnosis of Chronic Diseases
1 Introduction
2 Methodology
2.1 Dataset and Preprocessing Data
2.2 Splitting Data
2.3 Machine Learning Algorithms
2.4 Attention Based CNN Model
2.5 Attention Module
2.6 Hyperparameter Tuning
2.7 Over Sampling Technique
2.8 Explainable AI
3 Results and Discussion
3.1 Explainable AI Interpretations
3.2 Deployment of the Prediction Models into Website and Smartphone Frameworks
4 Conclusion
References
Enhancing MapReduce for Large Data Sets with Mobile Agent Assistance
1 Introduction
2 MapReduce
2.1 MapReduce Description
2.2 Background: Map-Reduce
2.3 Programming Model and Data Flow
2.4 Scalable Distributed Processing: The Map-Reduce Framework
3 Distributed Mining Process
4 Methodology
4.1 System Overview
4.2 Improved Map-Reduced Methodology
5 Assessment of Performance
6 Final Thoughts
References
The Effect of E-Learning Quality,  Self-efficacy and E-Learning Satisfaction on the Students’ Intention to Use the E-Learning System
1 Introduction
2 Review of Existing Literature
2.1 E-Learning Content and User Satisfaction
2.2 E-Learning Content and User Intention
2.3 Self-efficacy and User Satisfaction
2.4 Self-efficacy and User Intention
2.5 User Satisfaction and User Intention
3 Conceptual Framework and Hypothesis Development
4 Research Methodology
5 Research Findings
5.1 Confirmatory Factor Analysis
5.2 Model Quality
5.3 Path Analysis
6 Discussion and Conclusion
7 Implications, Limitations and Future Studies
7.1 Study Implications
7.2 Limitations and Future Studies
References
A Constructivist Approach to Enhance Student’s Learning in Hybrid Learning Environments
1 Introduction
2 Justification of the Study
3 Theoretical Framework
4 Related Studies
5 Methodology and Description of Study
5.1 Description of Study:
6 Data Analysis
6.1 Access Logs
6.2 Interviews
7 Discussion and Contribution to the Body of Knowledge
8 Conclusion
References
Edge Detection Algorithms to Improve the Control of Robotic Hands
1 Introduction
2 Systematic Review for the Evaluation of Artificial Vision in Robotic Applications
3 Methodology to Improve the Hand Control for Robotic Applications
3.1 Kalman Modified Filter
3.2 Butterworth Filter
3.3 Artificial Vision Algorithms
3.4 Control Integrated with PID, Artificial Vision and Filters
3.5 Key Performance Index (KPI) for the Evaluation.
4 Discussion
4.1 Lesson Learned About the Control
5 Conclusion
References
Detection of Variable Astrophysical Signal Using Selected Machine Learning Methods
1 Introduction
2 Methodology
2.1 Astrophysical Signal Processing Background
2.2 Data Processing
2.3 Machine Learning Methods
2.4 Related Works
2.5 RNN Training
2.6 SVM Training
3 Results
3.1 RNN Testing
3.2 SVM Testing
4 Discussion
5 Conclusion
References
Land Cover Detection in Slovak Republic Using Machine Learning
1 Introduction
2 Literature Review
3 Methodology
3.1 Results of Analysis
4 Discussion
5 Conclusion
References
Leveraging Synonyms and Antonyms for Data Augmentation in Sarcasm Identification
1 Introduction
2 Related Work
3 Methodology
3.1 Conventional Text Transformation Functions
3.2 The Proposed Data Augmentation Scheme
3.3 Text Classification Architectures
4 Experimental Procedure and Results
4.1 Dataset
4.2 Experimental Procedure
4.3 Experimental Results and Discussion
5 Conclusion
References
Knowledge Management Methodology to Predict Student Doctoral Production
1 Introduction
1.1 Motivation
2 Systematic Review for the Knowledge Management Applied to Skill Evaluation
2.1 Data and Instrument
2.2 Methodology for Knowledge Management and Skill Evaluation
2.3 Case Study
3 Discussion
4 Conclusion
References
Neural Network Control of a Belt Conveyor Model with a Dynamic Angle of Elevation
1 Introduction
2 Basic Model of Conveyor with Dynamic Angle of Elevation
3 Switched Belt Conveyor Model Taking into Account Smooth Loading
4 Construction of a Neural Network Controller and Computer Study of the Model
5 Discussion
6 Conclusion
References
Detection of Vocal Cords in Endoscopic Images Based on YOLO Network
1 Introduction
1.1 Clinical Visualization of Vocal Cords
1.2 Vocal Cords Detection with Machine Learning
2 Materials and Methods
2.1 Recorded Data Preprocessing
2.2 Object Detection
3 Results
3.1 Model Validation
3.2 Implementation Specification
4 Conclusion
References
A Proposal of Data Mining Model for the Classification of an Act of Violence as a Case of Attempted Femicide in the Peruvian Scope
1 Introduction
2 Related Work
3 Methodology
3.1 Proposed Method
3.2 Data Collection
3.3 Data Understanding
3.4 Data Preprocessing
3.5 Data Mining
3.6 Model Evaluation
4 Results
5 Discussion
6 Conclusions
References
On the Characterization of Digital Industrial Revolution
1 Introduction
2 Defining Digital Industrial Revolution
3 Industrial Revolution (IR) Phases and Characteristics
3.1 First Industrial and Digital Revolution
3.2 Second Industrial and Digital Revolution
3.3 Third Industrial and Digital Revolution
3.4 Fourth Industrial and Digital Revolution
4 Characterization of DIR
5 Conclusion and Future Work
References
User-Centred Design of Machine Learning Based Internet of Medical Things (IoMT) Adaptive User Authentication Using Wearables and Smartphones
1 Introduction
1.1 Related Work
1.2 Contribution
2 Requirements for Adaptive Authentication
3 Research Methodology
3.1 Specifying Usage Context
3.2 Specify Requirements
3.3 Producing Design Solutions
4 Case Study: Adaptive User Authentication
5 Results and Discussion
6 Conclusion and Future Work
References
Automatic Searching the Neural Network Models for Time Series Classification of Small Spacecraft\'s Telemetry Data with Genetic Algorithms
1 Introduction
2 Statement of the Problem
3 Genetic Algorithm
3.1 Fitness Function
3.2 Selection
3.3 Chromosome Structure
3.4 Crossover
3.5 Mutation
4 Experiment Results
5 Conclusion
References
Optimizing Data Analysis Tasks Scheduling Based on Resource Utilization Prediction
1 Introduction
2 Related Work
3 Methodology
3.1 Overview
3.2 Prediction Model
3.3 Task Scheduling Algorithm
4 Experimental Evaluation
4.1 Experiment Environment
4.2 Evaluation
5 Conclusion
References
Forecasting the Sunspots Number Function in the Cycle of Solar Activity Based on the Method of Applying Artificial Neural Network
1 Introduction
2 Elman Artificial Neural Network
3 Numerical Simulation
4 Applying to Actual Data
5 Results and Discussion
6 Conclusion
References
Author Index




پست ها تصادفی