Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198)

دانلود کتاب Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198)

39000 تومان موجود

کتاب فناوری‌ها و کاربردهای هوشمند: دومین کنفرانس بین‌المللی، INTAP 2019، بهاوالپور، پاکستان، 6 تا 8 نوامبر 2019، منتخب اصلاح شده ... در علوم کامپیوتر و اطلاعات، 1198) نسخه زبان اصلی

دانلود کتاب فناوری‌ها و کاربردهای هوشمند: دومین کنفرانس بین‌المللی، INTAP 2019، بهاوالپور، پاکستان، 6 تا 8 نوامبر 2019، منتخب اصلاح شده ... در علوم کامپیوتر و اطلاعات، 1198) بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد

این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 10


توضیحاتی در مورد کتاب Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198)

نام کتاب : Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198)
ویرایش : 1st ed. 2020
عنوان ترجمه شده به فارسی : فناوری‌ها و کاربردهای هوشمند: دومین کنفرانس بین‌المللی، INTAP 2019، بهاوالپور، پاکستان، 6 تا 8 نوامبر 2019، منتخب اصلاح شده ... در علوم کامپیوتر و اطلاعات، 1198)
سری :
نویسندگان : , ,
ناشر : Springer
سال نشر : 2020
تعداد صفحات : 807
ISBN (شابک) : 9811552312 , 9789811552311
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 82 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.

توضیحاتی در مورد کتاب :


این کتاب مراحل داوری دومین کنفرانس بین المللی فن آوری ها و برنامه های هوشمند ، Intap 2019 را که در بهااوالپور ، پاکستان برگزار شد ، در نوامبر 2019 تشکیل می دهد. علاوه بر این ، حجم 1 مقاله دعوت شده را ارائه می دهد. مقالات این جلد در بخش های موضعی در مورد هوش مصنوعی و سلامت سازماندهی شده است. تجزیه و تحلیل احساسات ؛ برنامه های هوشمند ؛ تجزیه و تحلیل رسانه های اجتماعی ؛ هوش تجاری ؛ پردازش زبان طبیعی ؛ استخراج اطلاعات ؛ یادگیری ماشین ؛ سیستم های هوشمند ؛ وب معنایی ؛ سیستم های پشتیبانی تصمیم گیری ؛ تجزیه و تحلیل تصویر ؛ مهندسی نرم افزار خودکار.


فهرست مطالب :


Preface
Organization
Contents
Internet of Things
Design of Wearable Prototype Smart Wristband for Remote Health Monitoring Using Internet of Things
Abstract
1 Introduction
2 Proposed Method
2.1 Sensing Phase
2.2 Interaction Phase
3 Results and Analysis
3.1 Experimental Results of Smart Wrist Band
3.2 Experimental Results of the Temperature Sensor
4 Conclusions
References
FireNot - An IoT Based Fire Alerting System: Design and Implementation
Abstract
1 Introduction
2 Related Work
3 System Components
3.1 Raspberry Pi 3
3.2 Smoke Sensor (MQ2)
3.3 Google Firebase Cloud Messaging (FCM)
3.4 Google Map API
4 Conclusion
References
Smart Intelligent System for Mobile Travelers Based on Fuzzy Logic in IoT Communication Technology
Abstract
1 Introduction
2 Related Work
3 Proposed Method
3.1 Sequence Estimation of Mobile Users
3.2 Time Estimation of Mobile User
4 Experimental and Evaluations
4.1 Simulation Parameters
4.2 Result and Discussion
5 Conclusion
References
Perception of Wearable Intelligent Devices: A Case of Fitbit-Alta-HR
1 Introduction
2 Related Work
3 Conceptual Overview
3.1 Step 1: Extract Customer Feedback
3.2 Step 2: Feedback Classification
3.3 Step 3: Perception Evaluation
4 Evaluation
4.1 Dataset
4.2 Evaluation Measures
4.3 Experimentation
5 Results
6 Conclusion
References
Automatic Sun Tracking Smart Wheel Chair with Real Time Navigation
Abstract
1 Introduction
2 Literature Review
3 Proposed System Architecture
4 Results and Discussion
4.1 Joystick Results
4.2 Voice Recognition Result
4.3 Sun Tracking Result
4.4 Navigation Device Result
5 Conclusion and Future Work
References
A Blockchain-Based Framework for Information Security in Intelligent Transportation Systems
1 Introduction
2 Related Work
3 System Model
3.1 Intelligent Transportation System
3.2 Working Principle to Secure ITS Using Blockchains
4 Discussion
5 Conclusion and Future Research Direction
References
Home Automation Security System Based on Face Detection and Recognition Using IoT
Abstract
1 Introduction
2 Literature Review
3 Proposed System Architecture
3.1 Face Detection
3.2 Creation of Datasets of the Individuals
3.3 Recognition of Face Through Stored Database
3.4 IoT Platform
4 Results and Discussion
5 Conclusion and Future Work
Smart Reader for Visually Impaired People Based on Optical Character Recognition
Abstract
1 Introduction
2 Literature Review
3 Proposed Method
3.1 Architecture of the Proposed Model
3.2 Flow of Process
4 Results and Discussion
5 Conclusion and Future Work
References
Intelligent Applications
A Survey on Context-Aware Computing Frameworks for Resource-Bounded Devices
Abstract
1 Introduction
2 Context-Aware Computing System
2.1 Context-Awareness
2.2 Raw Facts Vs Contextual Information
2.3 Implicit Vs Explicit Context Models
2.4 Limitations and Challenges
3 Portability Issues from Desktop to Android Platform
4 Context-Aware Resource-Bounded Frameworks
4.1 Gcom
4.2 Open
4.3 Modeling and Verifying Resource-Bounded Context-Aware Agents
4.4 Locrs
4.5 Ldrocs
4.6 The Maude LTL Model
5 Context-Aware Rule-Based Frameworks for Mobile Devices
5.1 JADE in Android
5.2 Contextdroid
5.3 Knowledge-Based Agents in Android
5.4 Decentralized Context-Aware Computing Model
5.5 Rule Engine
6 Findings and Conclusion
References
A Real-Time Driver Drowsiness Detection and Warning System Based on an Eye Blinking Rate
Abstract
1 Introduction
2 Literature Review
3 Proposed Method
3.1 Image Acquisition
3.2 Detection of Face
3.3 Detection of the EYE
3.4 Detecting Drowsiness
3.5 Alarm Activation
4 Results
4.1 Tests of the Driver Fatigue Detection Hardware
5 Conclusion and Future Work
References
Optimization of Bug Reporting System (BRS): Artificial Intelligence Based Method to Handle Duplicate Bug Report
Abstract
1 Introduction
2 Literature Review
3 An Overview of Bug Reporting Tools
3.1 Mantis
3.2 Bugzilla
3.3 JIRA
3.4 Duplicate Bug Reports-DBR
3.5 Bug Tracking Systems
3.6 Bug Reporting Process
4 Proposed Methodology
4.1 Generate Tags for New Report
4.2 Comparing Tags
4.3 Sorting Fetched Reports
5 Problems and Solutions
5.1 How Duplicate Bug Report Can Be Detected in Our System?
5.2 What Are the Required Fields for Detection Duplicate Bugs?
5.3 How Old Bug and New Bug Will Be Linked?
5.4 Why Are We not Discarding Old Bug Report?
6 Conclusion and Future Work
References
A Review of Star Schema and Snowflakes Schema
Abstract
1 Introduction
1.1 Database and Relational Database
1.2 Data Warehouse
1.3 Data Marts
1.4 Data Mining
2 Problem Statement
3 Literature Review
3.1 Design Modeling Techniques
3.2 Evaluation of Schemas
3.3 Star Schema
3.4 Snowflakes Schema
3.5 Star vs Snowflakes Schema
4 Conclusion
5 Future Work
References
A Region-Based and a Unified Team’s Strength in the Game of Cricket Using Principal Component Analysis (PCA)
Abstract
1 Introduction
2 Literature Review
3 Materials and Method
3.1 Region-Based Team’s Strength
3.2 Principal Component Analysis (PCA) and a Region-Based Team’s Strength
3.3 Region-Based Team’s Batting, Bowling and Fielding Strengths Using Weighted Average System (WAS)
3.4 A Unified Team’s Strength
4 Results and Discussion
4.1 Datasets and Performance Evaluation
5 Conclusions
Disclosure Statement
References
A Unit Softmax with Laplacian Smoothing Stochastic Gradient Descent for Deep Convolutional Neural Networks
1 Introduction
2 Preliminaries
2.1 Angular Margin Softmax
2.2 Stochastic Gradient Descent
2.3 Laplacian Smoothing Gradient Descent
3 Proposed Approach
3.1 Experiments
3.2 Results and Discussions
4 Conclusion
References
Scientific Map Creator: A Tool to Analyze the Author’s Affiliation and Citations by Producing Mind Maps
Abstract
1 Introduction
1.1 Mindmapping
1.2 Types of Mind Mapping
2 Summarized Literature Review
2.1 Mind Maps
3 Importance of Citation Analysis
4 Research Problems
5 Research Methodology
6 Implementation of Proposed Tool
7 Conclusion
References
Prediction and Analysis of Sun Shower Using Machine Learning
Abstract
1 Introduction
2 Review of Literature/Algorithm Study
3 Methodology
4 Results on Applied Algorithms
5 Conclusions
References
Electroencephalography Based Machine Learning Framework for Anxiety Classification
1 Introduction
2 Methodology and Experimental Setup
2.1 EEG Data Acquisition
2.2 Feature Extraction
2.3 Feature Selection
2.4 Classification
3 Experiments and Results
3.1 Data Labelling
3.2 Evaluation Parameters
3.3 Discussion
4 Conclusion
References
Decision Support Systems
A Doctor Recommendation System Using Patient’s Satisfaction Analysis
Abstract
1 Introduction
2 Proposed Methodology
2.1 Recommendation Process
2.2 Location of the Study
2.3 Research Instrument
2.4 Research Scoring and Statistical Analysis
3 Experimental Results
4 Discussions
5 Conclusion
References
Analysis of White Blood Cells Using Hematology Counts
Abstract
1 Introduction of Complete Blood Count (CBC)
1.1 White Blood Count
1.2 Neutrophils
1.3 Eosinophils
1.4 Basophils
1.5 Monocytes
1.6 Lymphocytes
1.7 Natural Killer Cells (NK)
2 Procedure of Analysis
2.1 Automated CBC or Hematology Analyzer
2.2 Electrical Impedance (Coulter Principle)
2.3 Flow Cytometry by VCS (Volume Conductivity Scatter)
2.4 Scattergrams
2.5 Fluorescent Flow Cytometry
3 Comparison Using Histograms and Microscopic Images
3.1 Data of Old Age Patients
3.2 Data for Adult Patients
3.3 Data for Infant Patients
4 Conclusions
References
High Performance Simulation of Blood Flow Pattern and Transportation of Magnetic Nanoparticles in Capillaries
Abstract
1 Introduction
2 Mathematical Model
3 Numerical Simulation, Results and Discussion
4 Implementation of CPU and CPU-GPU (Hybrid Platform)
5 Parallel Results and Discussion
6 Conclusion
References
To Explore the Factors that Affect Behavior of Employee Regarding Knowledge Sharing in IT Service Companies
Abstract
1 Introduction
1.1 Problem Statement
2 Literature Review
2.1 Difference Between Data, Information, and Knowledge
2.2 Types of Knowledge
2.3 Outcome
3 Research Methodology
3.1 Research Model and Hypotheses
4 Evaluation
4.1 Research Setting
4.2 Sample Organization
4.3 Data Collection and Analysis
4.4 Results
4.5 Hypotheses Testing
5 Conclusion and Future Work
References
Decision Support System for Dental Clinics: A Systematic Literature Review Protocol
Abstract
1 Introduction
2 Background
2.1 Clinical Decision Support System (CDSS)
2.2 Related Works
3 Research Method
3.1 Systematic Literature Review Protocol
4 Conclusion
References
Comparison of Localization Algorithms for Unmanned Aerial Vehicles
1 Introduction
2 Literature Review
3 Methodology
3.1 Angle of Arrival
3.2 Received Signal Strength
3.3 Correlative Interferometry
3.4 Watson-Watt Method
4 Results and Discussions
4.1 Comparison of Various Parameters
4.2 Time Complexity
5 Conclusion
References
Metaheuristic Algorithms in Industrial Process Optimisation: Performance, Comparison and Recommendations
Abstract
1 Introduction
2 Metaheuristic Algorithms
2.1 Genetic Algorithm
2.2 Simulated Annealing
2.3 Particle Swarm Optimisation
3 Intelligent Method for Parametric Process Optimisation
4 Comparison of Metaheuristics in Process Optimisation
4.1 Metaheuristics Comparison Based on IS-MR-RPD Implementation
4.2 Metaheuristics Comparison Based on Extensive Literature Review
5 Concluding Remarks
References
Social Media Analytics
Sentimental Content Analysis and Prediction of Text
Abstract
1 Introduction
2 Literature Review
3 Methodology
4 Proposed Classifier
5 Results
6 Discussion and Conclusion
References
An Analysis of Depression Detection Techniques from Online Social Networks
Abstract
1 Introduction
1.1 Motivation
1.2 Research Contribution
2 Literature Review
3 Proposed Approach
3.1 Data Acquisition
3.2 Data Pre-processing
3.3 Feature Extraction
3.4 Classifier
4 Conclusions and Future Work
References
Classification of Social Media Users Based on Disagreement and Stance Analysis
Abstract
1 Introduction
2 Related Work
3 Problem Formalization and Proposed Framework
3.1 Steps Involved in Proposed Framework
3.2 LDA (Latent Dirichlet Allocation)
3.3 VADER (Valence Aware Dictionary and sEntiment Reasoner)
4 Experiment and Result Discussion
4.1 Dataset Description
4.2 Preprocessing
4.3 Experimental Setup
4.4 Results
5 Conclusion
References
A Framework to Strengthen up Business Interests in Students by Using Matrix Factorization on Web Log
Abstract
1 Introduction
2 Related Work
3 Research Gaps
4 Proposed Methodology
4.1 Web Log
4.2 LDA Based Clustering
4.3 Data Extraction
4.4 Matrix Factorization
4.5 Notification of Business Events
4.6 Enhancement of Business Knowledge
5 Results and Discussion
6 Conclusions and Future Work
Acknowledgements
References
Improving Validity of Disaster Related Information by Identifying Correlation Among Different Social Media Streams
Abstract
1 Introduction
2 Literature Review
3 Proposed Solution
3.1 Datasets
3.2 Selection of Main Events
3.3 Ranking Algorithm
3.4 Included Features
3.5 Evaluation Setup
4 Results
4.1 Twitter
4.2 YouTube
4.3 Polarity and Subjectivity
4.4 Location and Polarity
4.5 Evaluation of Validity Ranking
4.6 Comparison of Sentimental Analysis of Social Media Streams
5 Conclusion
References
An Approach to Map Geography Mark-up Language Data to Resource Description Framework Schema
Abstract
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Acquire GML Script
3.2 Parse GML (XML)
3.3 Extracting GML Features
3.4 Extraction of Feature Property
3.5 GML Coordinates Extraction
3.6 Mapping to RDFS
4 Results and Discussion
4.1 GML Input to RDF Generator
4.2 GML Output of RDFS Generator
4.3 GML/XML Processing
4.4 Output of GML Script to RDFS Script
4.5 Mapping to RDFS
4.6 Discussion of Results
5 Conclusion and Limitations
6 Future Work
References
Machine Learning
Multi-aspects Intelligent Requirements Prioritization Technique for Value Based Software Systems
Abstract
1 Introduction
2 Requirement Prioritization Techniques in Literature
3 Proposed Fuzzy C-Means (FCM) Based Intelligent Technique for Requirements Prioritization
4 Results
4.1 Calculating Final Requirements Value
4.2 Calculating Technical Aspects Score and Business Aspects Score for Each Requirement
4.3 Preparation of Requirements Dataset
4.4 Experiment
4.4.1 Fuzzy C-Means (FCM) Results – 2D Clustering
5 Conclusion
References
An Intelligent Approach for CRC Models Based Agile Software Requirement Engineering Using SBVR
Abstract
1 Introduction
2 Related Work
3 The SBVR2CRC
3.1 Generate SBVR Model
3.2 Transformation of SBVR Model to CRC Model
3.3 Drawing CRC Cards
4 Experiment and Results
5 Conclusion and Future Work
References
Automatic RDF, Metadata Generation from Legacy Software Models
Abstract
1 Introduction
2 Related Work
3 Used Approach
3.1 UML Class Model
3.2 Parse Class Model
3.3 Extraction of Metadata
3.4 Mapping to RDF
3.5 RDF Triple Generation
3.6 RDF Data System
4 Experiments and Results
5 Conclusion
References
An Approach to Measure Functional Parameters for Ball-Screw Drives
Abstract
1 Introduction to Ball Screw Drive Functional Parameters
2 Torque Measurement
2.1 Twist Bar Calibration Method: Theoretical Calculation
2.2 Torque Calculation Using Twist Bar Testing Jig
3 Slew Rate Measurement
3.1 Slew Rate Calculation on Twist Bar Testing Jig
3.2 Slew Rate Calculation
4 Results and Discussion
5 Conclusions and Future Work
Acknowledgement
References
Secure NoSQL Over Cloud Using Data Decomposition and Queryable Encryption
1 Introduction
2 Related Work
3 Methodology
3.1 Database Proxy
3.2 Decomposed NoSQL Databases (SID and SDB)
3.3 Data Encryption Methods
4 Experimental Setup
4.1 Benchmark Application
4.2 Testbed Infrastructure
4.3 Evaluation Queries
4.4 Baseline System
5 Experiments Results
5.1 Performance Evaluation for Query Processing Time
5.2 Query Encryption Time Comparison
6 Conclusion and Future Work
References
Pseudo Transfer Learning by Exploiting Monolingual Corpus: An Experiment on Roman Urdu Transliteration
Abstract
1 Introduction
2 Background
2.1 Review of Roman Urdu Transliteration
2.2 Related Work
3 Methodology
3.1 Source Learning Model
3.2 Target Learning Model
3.3 Experimental Setup
3.4 Dataset
4 Results and Evaluation
4.1 Effect of Pseudo Transfer Learning
4.2 Roman Urdu Transliteration
5 Conclusion
References
Classification and Prediction Analysis of Diseases and Other Datasets Using Machine Learning
Abstract
1 Introduction
2 Literature Review
3 Methodology
4 Results and Discussion
4.1 Indian Liver Patient Dataset
4.2 Breast Cancer Dataset
4.3 Wine Quality
4.4 Bupa Liver Disorder
5 Conclusion
References
QoE Analysis of Real-Time Video Streaming over 4G-LTE for UAV-Based Surveillance Applications
1 Introduction
2 Related Work
3 Surveillance Architecture
4 Measuring Metrics Used for QoE of Video
5 Simulation Settings for Streaming Video
6 Performance Evaluation
7 Conclusion
References
Natural Language Processing
Urdu Natural Language Processing Issues and Challenges: A Review Study
Abstract
1 Introduction
2 Approaches in Speech Recognition
2.1 Acoustic Phonetic Approach
2.2 Pattern Recognition Approach
2.3 Template Based Approach
2.4 Stochastic Approach
2.5 Knowledge Based Approach
3 Some Relevant Work in Different Natural Languages
3.1 Bengali Speech Recognition
3.2 Turkish Speech Recognition Approaches
3.3 Arabic Speech Recognition Approaches
4 A Brief Introduction to Urdu Language
5 Overview of Urdu Speech/Text Related Work in Last a Few Years
6 Proposed Work
7 Conclusion
References
Urdu Spell Checker: A Scarce Resource Language
Abstract
1 Introduction
2 Linguistic Issues
2.1 Phonetic Similarity
2.2 Space Omission
2.3 Shape Similarity
3 Literature Review
4 Methodology
4.1 Detection of Incorrect Word
4.2 Techniques for Spelling Error Correction
4.3 Ranking Techniques
5 Results and Discussion
5.1 Improved Soundex/Shapex
6 Conclusion and Future Work
References
Maximum Entropy Based Urdu Part of Speech Tagging
Abstract
1 Introduction
2 Literature Review
3 Maximum Entropy Model
4 Evaluation and Results
4.1 First Corpus (C1)
4.2 Second Corpus (C2)
5 Discussion on Results
6 Issues in Corpus (C1)
7 Conclusion
References
Towards a Generic Approach for PoS-Tagwise Lexical Similarity of Languages
Abstract
1 Introduction
2 Background
3 Methodology
3.1 Word Lists Generation
3.2 Orthographic Transcription
3.3 Algorithm for Similarity
4 Results
4.1 Similarity Metric
4.2 Discussion
5 Conclusion
References
Preprocessing Techniques in Text Categorization: A Survey
1 Introduction
2 Tokenization
2.1 Challenges
3 Stop Word Removal
4 Stemming
4.1 Errors in Stemming
4.2 Principles of Stemming Algorithms
4.3 Types of Stemming Algorithms
5 Conclusion
References
Educational Data Mining: A Review and Analysis of Student’s Academic Performance
Abstract
1 Introduction
2 Literature Review
3 Educational Data Mining Objectives
3.1 Evaluating Group of Users in EDM
3.2 Reviewing Educational Systems Effect in EDM
3.3 Determining and Refining Mining Models
3.4 Progressing Scientific Awareness About Learners and Learning
4 Adopted Application of Data Mining in EDM
4.1 Predicting Student Academic Performance
5 Implementation of Mining Methods and Results
6 Conclusion
References
Multi Agents Based System Architecture for Market Research in E-Business
Abstract
1 Introduction
2 Literature Review
3 Market Research in E-Business
3.1 MAS Analysis
3.2 MAS Design
3.3 MREB’s Architecture
3.4 MREB: Decision Making Process
4 Prototype Implementation, Validation, and Results
5 Comparison of MREB with Existing MR Platforms
6 Conclusion Remarks
References
Image Processing and Analysis
An Investigation on Ability of Pre-trained Convolutional Neural Networks Trained on ImageNet to Classify Melanoma Images Without Re-training
1 Introduction
2 Melanoma Detection Using Image Analysis
3 Residual Neural Network - ResNet
4 Experiment Setup and Dataset
5 Experiment Results and Discussion
6 Conclusion and Future Prospects
References
Effect of Laplacian Smoothing Stochastic Gradient Descent with Angular Margin Softmax Loss on Face Recognition
Abstract
1 Introduction
2 Related Work
3 Softmax Loss
3.1 Multiplicative Angular Margin to Softmax Loss
4 Laplacian Smoothing Stochastic Gradient Descent
4.1 Convexification and Hamilton-Jacobi PDEs
4.2 Laplacian Smoothing Stochastic Gradient Descent
5 Experiments
5.1 Experimental Settings
5.2 Exploratory Experiments
5.3 Experimental Results
6 Conclusion
References
Brain Tumor Localization and Segmentation Based on Pixel-Based Thresholding with Morphological Operation
Abstract
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Image Acquisition
3.2 Preprocessing Stage
3.3 Image Segmentation
3.4 Morphological Operation
4 Results and Discussions
5 Conclusions and Future Work
References
Classification of Breast Lesions in Combination with Metamorphic Segmentation and Saliency Feature Block
Abstract
1 Introduction
2 Proposed Methodology
2.1 Image Acquisition
2.2 Preprocessing
2.3 Metamorphic Segmentation
2.4 Feature Extraction
3 Experimental Results and Discussion
4 Conclusion
References
Analysis of the MIDAS and OASIS Biomedical Databases for the Application of Multimodal Image Processing
Abstract
1 Introduction
2 The MIDAS and OASIS Database
3 Public Interest on MIDAS and OASIS Database
4 Discussion
5 Conclusion
References
Image Quality Assessment Using a Combination of Hand-Crafted and Deep Features
Abstract
1 Introduction
2 Related Work
2.1 Full-Reference Image Quality Assessment
2.2 No-Reference Image Quality Assessment
3 Materials
4 Methodology
4.1 Dimensionality Reduction
4.2 Quality Prediction
4.3 Evaluation Measures
5 Performance Evaluation
5.1 Comparison with Existing Approaches
5.2 Cross-dataset Testing
6 Conclusion
References
An Ensemble Classification-Based Methodology Applied to MRI Brain Images for Tumor Detection and Segmentation
Abstract
1 Introduction
2 Literature Review
3 Proposed Model
3.1 Feature Extraction (DWT)
3.2 Features Reduction (PCA)
3.3 Ensemble Classification
4 Results and Discussion
5 Conclusion and Future Work
References
Efficient PatchMatch Algorithm to Detect False Crowd in Digitally Forged Images
1 Introduction
2 Proposed Methodology
2.1 Improved PatchMatch Algorithm
3 Experimental Results
3.1 False Crowd Database (FCD)
3.2 Quantitative Results
3.3 Qualitative Results
3.4 Validation of Proposed Technique
4 Conclusion
References
Analysis of the Lifetime and Energy Consumption of WSN Routing Protocols: LEACH, EAMMH and SEP
Abstract
1 Introduction
2 Routing Protocols in WSN
2.1 LEACH
2.2 EAMMH
2.3 SEP
3 Comparisons and Simulation Results
3.1 Comparison of the LEACH and EAMMH
3.2 Comparison of the LEACH and SEP
4 Conclusion and Future Work
References
Intelligent Environments
Crash-Resilient Synthesizer in Logic Optimization Paradigm for Sustainable Hardware Design of ASIC and Digital Systems
Abstract
1 Introduction
2 Aspects of Dealing with the Faults for Self-sustainable Systems
2.1 Fault Detection
2.2 Fault Recovery/Mitigation
3 Problem Statement
3.1 Analysis on the Problem Statement
3.2 Application Specific Integrated Circuit (ASIC)
3.3 ASIC Modeling Language
3.4 VHDL and HDL
4 Logic Synthesis
4.1 Phases of Logic Synthesis
4.2 Proposed Design
4.3 Algorithm
5 Conclusion
References
An Improved Ensemble Based Machine Learning Technique for Efficient Malware Classification
Abstract
1 Introduction
2 Literature Review
3 Proposed Approach
3.1 Data Collection
3.2 Feature Extraction
3.3 Behavior Analysis
3.4 Detection Model
4 Comparison and Discussion
5 Conclusions and Future Work
References
Green Computing: A Contribution Towards Better Future
Abstract
1 Introduction
2 Relevant Literature
2.1 Intel and AMD Contribution
2.2 Green Computing Correspondence
2.3 DVS
2.4 Previous DVS Implementations
2.5 DVS by Intel and AMD
3 Benchmarking Methodology
3.1 Power Management
3.2 Cryptographic Performance
3.3 Access Time of Cache and Memory
3.4 Arithmetic and Floating Operations
3.5 Memory Latency
4 Discussion and Analysis
5 Conclusion
References
An Intelligent Approach to Detect Actuator Signal Errors Based on Remnant Filter
Abstract
1 Introduction
2 Servo Actuator Fault Detection: Design Architecture
2.1 UAV Actuator Failure Modes
2.2 Fault Detection Structure
3 Servo Actuator Fault Detection: Model Design
4 Servo Actuator Fault Detection: Model Validation and Results
4.1 Fault Diagnostic Test Setup
5 Conclusions and Future Work
Acknowledgement
References
Driving Activity Recognition of Motorcyclists Using Smartphone Sensor
1 Introduction
2 Proposed Methodology
2.1 Data Acquisition
2.2 Segmentation
2.3 Feature Extraction and Selection
2.4 Classification
3 Experimental Results
3.1 Classifier Performance
3.2 Performance Comparison
4 Conclusion
References
PARK MY RIDE: Your True Parking Companion
1 Introduction
2 Literature Review
3 Proposed Solution
3.1 Administrator Panel
3.2 End-User Application
3.3 Database
4 Main Attributes and Working Flow
4.1 Login and Registration
4.2 Location Accessibility
4.3 Parking Area Searching, Space Availability and Navigation
4.4 Parking Spot Reservation
4.5 Vehicles Exit and Billing
4.6 Working Flow
5 Comparative Analysis and Discussion
6 Conclusion
References
Cloud and Data Systems
Edge Caching Framework in Fog Based Radio Access Networks Through AI in Quantum Regime
Abstract
1 Introduction
1.1 Fog Computing and Edge Caching
1.2 Quantum Computing
2 Problem Statement
3 Related Work
4 Proposed Work
4.1 Proposed Model for Edge Caching in Quantum Regime
5 Results and Discussions
6 Conclusion
References
Challenges and Limitation of Resource Allocation in Cloud Computing
Abstract
1 Introduction
2 Framework of Resource Allocation
3 What Is Resource Allocation Challenge?
4 Literature Review
5 Analysis
5.1 Evaluation of Core Resource Allocation Approaches
6 Taxonomy on Resources Allocation Methods
6.1 Adaptation Policy in Resource Allocation
6.2 Need of Scheduling in Resource Allocation
7 Conclusion
8 Future Work
References
NFC Payment Security with Cloud Based Authentication System
Abstract
1 Introduction
2 Related Literature
3 EMV Risks and Weaknesses
3.1 Principal
3.2 Actors
4 Details of Proposed Protocol
5 Results
6 Scyther Verification
6.1 Existing System
6.2 Scyther Claims for Existing System
7 Proposed System
7.1 Scyther Claims for Proposed System
8 Conclusion
References
Resource Utilization in Data Center by Applying ARIMA Approach
Abstract
1 Introduction
2 Application Workload Prediction Model
2.1 Stationary Testing
2.2 Model Recognition
2.3 Evaluate Model Parameters
3 Simulation Results
4 Related Works
5 Conclusion
References
Detecting Duplicates in Real-Time Data Warehouse Using Bloom Filter-Based Approach
Abstract
1 Introduction
2 Proposed Consistency Management Approach
2.1 Problem Definition
2.2 Bloom Filters
2.3 Counting Bloom Filter
2.4 Proposed Approach
2.5 Insertion of Record
3 Results
4 Conclusion
References
Restricted Boltzmann Machines Based Fault Estimation in Multi Terminal HVDC Transmission System
Abstract
1 Introduction
2 HVDC Transmission System
2.1 VSC Based HVDC Transmission System
3 Restricted Boltzmann Machine (RBM)
4 Contrastive Divergence (CD) Algorithm
5 Methodology
5.1 Data Selection
5.2 Characteristics of Selected Variables
5.3 VSC Based HVDC System Status Codes
5.4 Implementation of Fault Estimation Process
6 Simulation Results
7 Conclusion
References
Multi-agent Oriented Framework for University Course Timetable Scheduling
Abstract
1 Introduction
2 Problem Definition
2.1 Basic Definitions of the Problem
2.2 Hard Constraints
2.3 Soft Constraints
3 System Design Implementation and Architecture
4 Methodology and System Components
4.1 System Components
4.2 Timetable Development Process
4.3 Timetable Development Algorithm
5 Conclusion
References
Author Index

توضیحاتی در مورد کتاب به زبان اصلی :


This book constitutes the refereed proceedings of the Second International Conference on Intelligent Technologies and Applications, INTAP 2019, held in Bahawalpur, Pakistan, in November 2019.

The 60 revised full papers and 6 revised short papers presented were carefully reviewed and selected from 224 submissions. Additionally, the volume presents 1 invited paper. The papers of this volume are organized in topical sections on AI and health; sentiment analysis; intelligent applications; social media analytics; business intelligence;Natural Language Processing; information extraction; machine learning; smart systems; semantic web; decision support systems; image analysis; automated software engineering.




پست ها تصادفی