Third Congress on Intelligent Systems: Proceedings of CIS 2022, Volume 2

دانلود کتاب Third Congress on Intelligent Systems: Proceedings of CIS 2022, Volume 2

41000 تومان موجود

کتاب سومین کنگره سیستم های هوشمند: مجموعه مقالات CIS 2022، جلد 2 نسخه زبان اصلی

دانلود کتاب سومین کنگره سیستم های هوشمند: مجموعه مقالات CIS 2022، جلد 2 بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 11


توضیحاتی در مورد کتاب Third Congress on Intelligent Systems: Proceedings of CIS 2022, Volume 2

نام کتاب : Third Congress on Intelligent Systems: Proceedings of CIS 2022, Volume 2
عنوان ترجمه شده به فارسی : سومین کنگره سیستم های هوشمند: مجموعه مقالات CIS 2022، جلد 2
سری : Lecture Notes in Networks and Systems, 613
نویسندگان : , , , ,
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 850
ISBN (شابک) : 9811993785 , 9789811993787
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 20 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Preface
Contents
Editors and Contributors
Patch Extraction and Classifier for Abnormality Classification in Mammography Imaging
1 Background
2 Related Work in the Domain
3 Methodology
3.1 Dataset
3.2 Patch Extraction
3.3 Transfer Learning (TL)
4 Result Analysis and Discussion
5 Conclusion
References
Improving the Performance of Fuzzy Rule-Based Classification Systems Using Particle Swarm Optimization
1 Introduction
2 Background
2.1 Fuzzy Rule-Based Systems
2.2 Particle Swarm Optimization
3 Proposed Method
4 Experimental Results
5 Result Analysis
6 Conclusion
References
Tuning Extreme Learning Machine by Hybrid Planet Optimization Algorithm for Diabetes Classification
1 Introduction
2 Background and Related Work
2.1 Extreme Learning Machine
2.2 Swarm Intelligence
3 Planet Optimization Algorithm
3.1 Improved Planet Optimization Algorithm
4 Experiments and Discussion
4.1 Dataset Description
4.2 Experimental Setup and Comparative Analysis
5 Conclusion
References
Towards Computation Offloading Approaches in IoT-Fog-Cloud Environment: Survey on Concepts, Architectures, Tools and Methodologies
1 Introduction
2 IoT Storage Structures
2.1 IoT-Cloud Architecture
2.2 IoT-Fog-Cloud Architecture
3 Literature Review
4 Open Research Areas and Research Directions
5 Conclusion
References
Prediction of COVID-19 Pandemic Spread Using Graph Neural Networks
1 Introduction
2 Related Work
3 Graph Model for COVID-19 Transmission
3.1 Computation Graph for Graph Induction
4 Feed-Forward Neural Network for Computation Graph
5 Experimental Setup and Results
6 Conclusion
References
Event-Based Time-To-Contact Estimation with Depth Image Fusion
1 Introduction
2 Methodology
2.1 Dynamic Obstacle Detection
2.2 Event Image for Dynamic Obstacles
2.3 Time-To-Contact
2.4 Dynamic Object Tracking
2.5 Event-Based Time-To-Contact
3 Experimental Setup and Results
4 Conclusion and Future Work
References
mCD and Clipped RBM-Based DBN for Optimal Classification of Breast Cancer
1 Introduction
2 Related Work
3 Methodology
3.1 Theoretical Background
3.2 Proposed DBN Using Modified Contrastive Divergence (mCD)
4 Experimental Result and Analysis
5 Conclusion
References
Digital Disruption in Major Ports with Special Reference to Chennai Port, Kamarajar Port, and Tuticorin Port
1 Introduction and Background
2 Literature Review
3 Model Construction
4 Data Analysis and Interpretation
4.1 Efficiency Index of VOC Port
4.2 Efficiency Index of Chennai Port
4.3 Efficiency Index of Kamarajar Port
4.4 CAGR—Operating Surplus Comparison Between Three Ports
5 Findings
6 Limitations
7 Conclusion
References
SmartTour: A Blockchain-Based Smart Tourism Platform Using Improvised SHA
1 Introduction
2 Related Work
3 Problem Statement
4 Experimental Setup
5 Blockchain
6 Architecture
7 Algorithms
7.1 Improvised Secure Hash Algorithm (SHA)
7.2 Improvised Secure Hash Algorithm
7.3 Block Creation Algorithm
7.4 Block Verification Process Algorithm
8 Result and Analysis
8.1 Reliability Analysis
8.2 Performance Analysis
8.3 Security Analysis
9 Conclusion
References
Detection of Starch in Turmeric Using Machine Learning Methods
1 Introduction
2 Literature Review
3 Hypothesis
4 Methodology
4.1 Sample Preparation, Data Acquisition, and Pre-processing
4.2 Machine Learning Algorithms
5 Results and Discussion
5.1 ML Cross-Validation Using Confusion Matrix
6 Conclusion
References
A Study of Crypto-ransomware Using Detection Techniques for Defense Research
1 Introduction
2 Source of Ransomware
3 Family of Ransomware and Its Types
3.1 Locky Ransomware
3.2 Crypto-ransomware
4 Ransomware Detection Techniques and Types Analysis
4.1 Ransomware Defense Research
4.2 Ransomware Analysis Research
4.3 Ransomware Detection Research
5 Open Issues
6 Conclusion
References
Internet of Things (IOT)-Based Smart Agriculture System Implementation and Current Challenges
1 Introduction
2 Smart Agriculture Applications
2.1 Weather Monitoring
2.2 Soil Monitoring
2.3 Diseases Monitoring
2.4 Irrigation Monitoring
3 Methodology
4 Hardware and Software Requirements
4.1 Hardware
4.2 Software
5 Result and Discussion
6 Current Challenges and Future Recommendations
6.1 Challenges
6.2 Future Direction
7 Conclusion
References
Physical Unclonable Function and Smart Contract-Based Authentication Protocol for Medical Sensor Network
1 Introduction
1.1 Research Motivation
1.2 Contribution
2 Related Work
3 Preliminary Details
3.1 Smart Contract and PUF
3.2 System Model
3.3 Adversary Model
4 Proposed Work
4.1 Initial Stage
4.2 Registration Stage
4.3 Authentication Stage
5 Security Analysis
5.1 Formal Analysis
5.2 Informal Analysis
6 Performance Analysis
7 Conclusion and Future Work
References
Developing Prediction Model for Hospital Appointment No-Shows Using Logistic Regression
1 Introduction
2 Related Studies
3 Model Development
3.1 Demographic Variables
3.2 Appointment Characteristics
3.3 Clinical Characteristics
3.4 Cross-Validation
4 Performance Measures
4.1 Receiver Operating Characteristics Curve and Precision-Recall Curve
5 Discussion and Conclusion
References
Mixed-Language Sentiment Analysis on Malaysian Social Media Using Translated VADER and Normalisation Heuristics
1 Introduction
2 Literature Review
2.1 Valence Aware Dictionary and Sentiment Reasoner (VADER)
2.2 Text Normalisation
3 Method
4 Results
4.1 VADER Translation to Malay
4.2 Social Media Data Collection
4.3 Normalisation Heuristic Identification
4.4 Mixed-Language Sentiment Analysis Results
5 Conclusion
References
Impact of Feature Selection Techniques for EEG-Based Seizure Classification
1 Introduction
2 Literature Review
3 Experimental Datasets
3.1 UCI Epilepsy Dataset
3.2 Children\'s Hospital Boston, Massachusetts Institute of Technology (CHB-MIT) Epilepsy Dataset
3.3 Real-Time Epilepsy Dataset
4 Methodology
4.1 Feature Selection
4.2 Classification: Random Forest Classifier
4.3 Performance Evaluation
5 Results and Discussion
6 Conclusions
References
Adaptive Manta Ray Foraging Optimizer for Determining Optimal Thread Count   on Many-core Architecture
1 Introduction
2 Motivations and Problem Statement
3 Related Work
4 Proposed Methodology
4.1 Mathematical Models Representing Cognitive Activities of Manta Rays
5 Results and Discussion
6 Conclusion
References
Iterated Local Search Heuristic for Integrated Single Machine Scheduling and Vehicle Routing
1 Introduction
2 Problem Definition and MILP Formulation
2.1 MILP Model
3 Multi-start Hybrid Iterated Local Search Heuristic
3.1 RVND Local Search
3.2 ILS_RVND_2
4 Computer Experiments
4.1 Results for Small Instances
4.2 Results for Medium–Large Instances
5 Conclusions
References
Modeling Volatility of Cryptocurrencies: GARCH Approach
1 Introduction
2 Literature Review
3 Methodology
3.1 Input Data
3.2 Generalized Autoregressive Conditional Heteroskedasticity (GARCH) Model
4 Results and Analysis
4.1 Descriptive Statistics
4.2 ARCH Effect
4.3 GARCH Models
5 Discussion
6 Conclusion
References
Digital Boolean Logic Equivalent Reversible Quantum Gates Design
1 Introduction
2 Literature Review
3 Formulation of Proposed Quantum Gates
3.1 Quantum AND Gate Formulation
3.2 Quantum OR Gate Formulation
3.3 Quantum NAND Gate Formulation
3.4 Quantum NOR Gate Formulation
3.5 Quantum XOR Gate
4 Experimental Results, Validation, and Discussions
4.1 Physical Implementation on IBM QE
4.2 Validation of Proposed Quantum Gates
4.3 Quantum Full-Adder
4.4 Quantum Circuit Design from Min/Max-Term Equations
5 Conclusion
References
Adaptive Modulation Classification with Deep Learning for Various Number of Users and Performance Validation
1 Introduction
1.1 Automatic Modulation Classification (AMC)
1.2 Machine Learning
2 System Model
3 Results and Discussion
4 Conclusions
References
Video Analysis to Recognize Unusual Crowd Behavior for Surveillance Systems: A Review
1 Introduction
2 Interpreting and Understanding Crowd
3 Crowd Analysis
3.1 Motion Segmentation and Object Detection
3.2 People Counting and Density Estimation
3.3 Crowd Tracking
3.4 Feature Extraction and Motion Information
3.5 Crowd Behavior Recognition
3.6 Crowd Anomaly Detection
4 Technological Advancement in Video Surveillance
5 Research Gap Analysis
6 Crowd Video Datasets
7 Conclusion
References
Prediction of Drug-Drug Interactions Using Support Vector Machine
1 Introduction
2 Literature Review
3 Dataset Details
4 Methodology
4.1 Methodology Implemented for Combining the Two Drug Fingerprints
4.2 Support Vector Machine
5 Results
6 Conclusion
References
Dynamic Load Scheduling Using Clustering for Increasing Efficiency of Warehouse Order Fulfillment Done Through Pick and Place Bots
1 Introduction
2 Proposed Methodology
2.1 Master–Slave Bot Mechanism
2.2 Dynamic Order Allocation
2.3 Fuzzy C-means Clustering
3 Computational Experimental Results
3.1 Case 1. A Warehouse with 108 Products Shelved in 12 Two-Sided Shelves (See Fig. 5)
3.2 Case 2. A Warehouse with 30 Products Shelved in 6 One-Sided Shelves (See Fig. 8)
4 Conclusions
5 Limitations and Future Works
References
Deploying Fact-Checking Tools to Alleviate Misinformation Promulgation in Twitter Using Machine Learning Techniques
1 Introduction
2 Literature Survey
3 Existing Methodology
3.1 Corpus Construction
4 Proposed Methodology
4.1 Experimental Setup
4.2 Review Article Title and Content Input
4.3 Regarding Applying the Algorithm
5 Results Analysis
6 Conclusion
7 Future Work
References
Lane Sensing and Tracing Algorithms for Advanced Driver Assistance Systems with Object Detection and Traffic Sign Recognition
1 Introduction
2 Previous Works
3 Methodology
3.1 Lane Sensing and Lane Tracing
3.2 Object Detection
3.3 Traffic Sign Recognition
4 Evaluation Results
5 Conclusion
References
Exploring Open Innovation in the Workplace Through a Serious Game: The Case of Datak
1 Introduction
2 Related Work
3 Method
3.1 Study Design
3.2 Description of the Game
3.3 Data Analysis and Results
4 Discussion
5 Conclusion
References
Blockchain-Based Secure and Energy-Efficient Healthcare IoT Using Novel QIRWS-BWO and SAES Techniques
1 Introduction
2 Literature Survey
3 Proposed Secure and Energy-Efficient System
3.1 Registration
3.2 Hash Code Generation
3.3 Initialization of Node and Clustering
3.4 Cluster Head Selection
3.5 Encryption
3.6 Blockchain
4 Results and Discussion
4.1 Dataset Description
4.2 Performance Analysis of Clustering
4.3 Performance Analysis of Cluster Head Selection
4.4 Performance Analysis of Encryption
5 Conclusion
References
Plant Pathology Using Deep Convolutional Neural Networks
1 Introduction
2 Previous Works and Their Limitations
3 Proposed System
4 Methodology
4.1 Data Collection
4.2 Data Pre-processing
4.3 Data Analyzation
4.4 Data Augmentation
4.5 Model Training
4.6 Model Testing
5 Experimental Results
6 Conclusion
References
Performance Evaluation of Sustainable Development Goals Employing Unsupervised Machine Learning Approach
1 Introduction
2 Motivation
3 Methodology
3.1 Data
3.2 Algorithms
3.3 Results from Clustering Analysis
3.4 Comparison of Clustering Solutions
4 Conclusion
References
Performance Analysis of Logical Structures Using Ternary Quantum Dot Cellular Automata (TQCA)-Based Nanotechnology
1 Background
1.1 QCA Basics
1.2 QCA Wires
1.3 QCA Clock Zones
1.4 Majority Gate and Inverters
1.5 QCA with Ternary Quantum Phenomenon
1.6 Ternary Logic Utilizing Ternary QCA Compositions
2 Proposed Plans with Mechanism
3 Result and Discussion
4 Conclusions and Future Directions
References
An MLP Neural Network for Approximation of a Functional Dependence with Noise
1 Introduction
2 Description of the Solved Problem
2.1 A Simple Polynomial Function
2.2 The MATLAB “Peaks” Function
2.3 A Logarithmic Function
2.4 A Function with Three Variables
3 Conclusion
References
Evaluation of Sound Propagation, Absorption, and Transmission Loss of an Acoustic Channel Model in Shallow Water
1 Introduction
2 Literature Review
3 Methodology
3.1 Sound Speed
3.2 Absorption Loss
3.3 Transmission Loss
4 Implementation Parameters
5 Experimental Results
6 Conclusion
References
A Competent LFR in Renewable Energy Micro-grid Cluster Utilizing BESO Technique
1 Introduction
2 Literature Survey
3 Contribution and Organization
4 Description of Proposed Two Area System
5 Bald Eagle Search Optimization Algorithm
6 Controller Design Scheme for the Proposed System
7 Performance Indices Selection
8 Result Analysis
9 Conclusion
References
Deep Learning-Based Three Type Classifier Model for Non-small Cell Lung Cancer from Histopathological Images
1 Introduction
2 Related Work
3 Model and Framework
3.1 InceptionV3
3.2 DenseNet
3.3 XceptionNet
4 Methodology
5 Experiment
5.1 Lung Cancer Histopathological Images
5.2 Experiment Details
5.3 Evaluation Metric and Results
6 Conclusion
References
Cancer Classification from High-Dimensional Multi-omics Data Using Convolutional Neural Networks, Recurrence Plots, and Wavelet-Based Image Fusion
1 Introduction
2 Related Work
3 Proposed Approach
4 Experiments and Results
5 Conclusion
References
Predicting Users\' Eat-Out Preference from Big5 Personality Traits
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Feature Extraction
4 Development and Comparison of the Models
5 Discussion
6 Conclusion
References
Smart Accident Fatality Reduction (SAFR) System
1 Introduction
2 Related Work
3 Methodology
3.1 Introduction
3.2 Accident Detection
3.3 Sensor Module—Design and Position
3.4 HMCD (Human–Machine Cooperative Decision)
3.5 Intimation System
4 Results
4.1 Post-accident Processing Results
5 Conclusion
References
Android Malware Detection Against String Encryption Based Obfuscation
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset
3.2 Raw Data Extraction Process
3.3 Feature Extraction Process
3.4 Feature Vector Generation Process
3.5 Detection Process
4 The Definition of Features
4.1 Permissions/Components/Environmental Information
4.2 Dangerous API Invocation
4.3 Dalvik Bytecode
4.4 Crypto Features
5 Performance Evaluation
5.1 Effectiveness of Our Approach
5.2 Effectiveness of Crypto Features
5.3 Comparison to Other Similar Works
6 Conclusion and Future Works
References
Machine Learning Techniques for Resource-Constrained Devices in IoT Applications with CP-ABE Scheme
1 Introduction
1.1 Related Work
1.2 Our Contribution
1.3 Organization
2 Preliminaries
2.1 Bilinear Mapping
2.2 Access Structures
2.3 CP-ABE
3 CP-ABE and Machine Learning
3.1 Smart Offloading Technique for CP-ABE Schemes
3.2 Full Versus Partial Encryption
3.3 Decision Variable
4 CP-ABE and Internet of Technology
4.1 IoT-Fog-Cloud Architecture
4.2 Chameleon Hash Functions
4.3 System Model
5 Discussion and Conclusion
References
Safely Sending School Grades Using Quick Response Code
1 Introduction
2 Literature Review
3 Methodology—Proposal Method
3.1 Generation of QR Code to Each Student
4 Experiments and Results
5 Conclusions
References
Abstractive Text Summarization of Biomedical Documents
1 Introduction
2 Related Work
3 Methodology
3.1 Text Pre-processing
3.2 Encoder-Decoder Architecture
4 Evaluation and Results
4.1 Evaluation
5 Conclusion and Future Scope
References
NLP-Based Sentiment Analysis with Machine Learning Model for Election Campaign—A Survey
1 Introduction
2 Overview of Election Campaign
2.1 Issues in Election Campaign
2.2 Process in Campaign
2.3 New Media and Politics
3 Survey of Machine Learning Technique with Election Campaign
4 Review of Sentiment Analysis
4.1 Pre-processing in Sentiment Analysis
4.2 Sentence Extraction in Sentiment Analysis
4.3 Machine Learning-Based Sentiment Analysis
5 Review of NLP in Election Campaign
5.1 Elements in NLP
5.2 Synonym Extraction in NLP
5.3 Relation Between Sentiment Analysis and Machine Learning
5.4 Role of Machine Learning with NLP for Election Campaign
5.5 Levels of Sentiment Analysis
6 Practical Analysis of Election Campaign
7 Concluding Remarks
8 Conclusion
References
Heart Problem Detection from Electrocardiogram by One-Dimensional Convolutional Neural Network
1 Introduction
2 Literature Review
2.1 Works Based on Single Lead
2.2 Works Based on Multiple Leads
3 Datasets
4 Methodology
4.1 Pre-processing
4.2 Architecture
5 Result and Comparison
6 Conclusion
References
Deep Monarch Butterfly Optimization-Based Attack Detection for Securing Virtualized Infrastructures of Cloud
1 Introduction
2 Literature Review
3 Proposed Attack Detection Framework
4 Exponential Moving Average Features
5 Optimized Attack Detection Using Deep Belief Network
6 Monarch Butterfly Optimization [31] Algorithm for Optimal Weight Selection
7 Results and Discussion
8 Conclusion
References
Artificial Intelligence Technologies Applied to Asset Management: Methods, Opportunities and Risks
1 Introduction
2 Literature Review
2.1 Asset Management and Asset Managers
2.2 Financial Theory and Asset Managers
2.3 Artificial Intelligence Applied to Finance
3 Methods
4 Result Analysis
4.1 Opportunities of Artificial Intelligence for the Asset Manager
4.2 Risks of Artificial Intelligence on the Asset manager’s Job
5 Conclusion
References
Optimizing Reactive Power of IEEE-14 Bus System Using Artificial Electric Field Algorithm
1 Introduction
2 Artificial Electric Field Algorithm
3 Problem Formation of Reactive Power Dispatch Problem
3.1 Objective Function
3.2 Problem Constraints
3.3 Penalty Function
4 AEFA Implementation in the Reactive Power Dispatch Problem
5 Experimental Setup
5.1 IEEE-14 Bus System
5.2 Results and Discussion
6 Conclusion
References
IoT-Based Automotive Collision Avoidance and Safety System for Vehicles
1 Introduction
2 Literature Review
3 System Details
3.1 Sensing and Detection
3.2 Alerting System
3.3 V2V Communication Using Li-Fi
3.4 Sensor and System Positioning
3.5 System Implementation
4 Results and Analysis
5 Conclusion
References
Computer Vision-Based Electrical Equipment Condition Monitoring and Component Identification
1 Introduction
2 Methodology
2.1 Methods of Denoising
2.2 Physical Fault Detection
2.3 Internal Fault Detection
2.4 Pixel Analysis
2.5 Multiple Linear Regression (MLR)
3 Equipment Condition Monitoring
3.1 Transformer
3.2 Motor
3.3 Experimental Setup
4 Results and Discussion
4.1 Transformer
4.2 Motor
4.3 Feasibility Analysis
4.4 Accuracy of the Output
5 Conclusion
References
Deep CNN Model with Enhanced Inception Layers for Lung Cancer Identification
1 Introduction
2 Literature Survey
3 Materials and Methods
3.1 Data Preprocessing
3.2 Slice Fabrication and Image Enhancement
3.3 Proposed Deep CNN Model
4 Results and Discussion
5 Discussion and Conclusion
References
Impact of Dimensionality Reduction on Membership Privacy of CNN Models
1 Introduction
2 Background Study
2.1 Membership Inference Attack
2.2 Privacy Metrics
2.3 Dimensionality Reduction
3 Literature Review
4 Methodology
4.1 Database
4.2 Image Classification
4.3 Dimensionality Reduction
4.4 Evaluation of Privacy Metrics
5 Result and Discussion
5.1 Vulnerability During Training
5.2 Privacy and Utility
6 Conclusion and Future Work
References
Computational Modelling of Complex Systems for Democratizing Higher Education: A Tutorial on SAR Simulation
1 Introduction
2 Reproducible Research and Learning Platforms
3 SAR
3.1 SAR Simulation
3.2 SAR Geometry
3.3 Radar Range Equation
3.4 Antenna and Its Radiation
3.5 Focusing
4 Result Analysis
5 Conclusion
References
Efficient Segmentation of Tumor with Convolutional Neural Network in Brain MRI Images
1 Introduction
2 Literature Review
2.1 Traditional Segmentation Methods
2.2 Convolutional Neural Network-Based Methods
3 Convolutional Neural Network Training Process
4 Methodology
4.1 Dataset
4.2 Implementation
5 Results and Discussion
6 Conclusion and Future Scope
References
Gradient-Based Physics-Informed Neural Network
1 Introduction
2 Methods
2.1 PINN Algorithm for Solving Forward and Inverse PDEs
2.2 Gradient-Based Physics-Informed Neural Networks (gPINNs)
2.3 Residual-Based Adaptive Refinement (RAR)
3 Results
3.1 Function Approximation Using NN and gNN
3.2 Forward Problem Using gPINN
3.3 Inverse Problem Using gPINN
4 Conclusion
References
Automated Lesion Image Segmentation Based on Novel Histogram-Based K-Means Clustering Using COVID-19 Chest CT Images
1 Introduction
2 Related Work
3 Dataset and Its Description
4 K-Means Clustering Algorithm
5 Multi-Otsu Thresholding
6 Proposed Novel Histogram-Based K-Means Clustering Algorithm
7 Assessment Criteria for Segmentation Models
8 Experimental Results and Discussion
9 Evaluation Results of Metrics
10 Conclusion
References
Real-Time Operated Medical Assistive Robot
1 Introduction
2 Related Works
3 Design and Build Specifications
3.1 Components Required
3.2 Block Diagram
3.3 Circuit Diagram
3.4 Methodology
4 Proposed System
5 Experimental Results and Analysis
5.1 Line Following Method
5.2 Medicine Food Delivery to the Patients
5.3 Inform Emergency Alert from the Patient to the Nurse
5.4 Disinfecting the Ward
6 Conclusion
References
Enhancing Graph Convolutional Networks with Variational Quantum Circuits for Drug Activity Prediction
1 Introduction
2 Methodology
2.1 Architecture
2.2 Quantum Layer
2.3 Graph Convolutional Encoders
2.4 Dataset
3 Results and Discussion
3.1 Accuracy Analysis
3.2 Temporal Analysis
4 Conclusion
References
Improving Pneumonia Detection Using Segmentation and Image Enhancement
1 Introduction
2 Related Studies
3 Methodology
3.1 Dataset Description
3.2 Preprocessing
3.3 Segmentation
3.4 Augmentation
3.5 Enhancement
3.6 Classification
3.7 Performance Metrics
4 Results and Discussion
4.1 Segmentation
4.2 Classification
5 Conclusion
References
Object Detection Application for a Forward Collision Early Warning System Using TensorFlow Lite on Android
1 Introduction
2 Literature Review
2.1 Previous Study
2.2 Forward Collision Mitigation System and TensorFlow Lite
2.3 SSD MobileNet and OpenCV Library
3 Research Methodology
3.1 Business and Understanding
3.2 Data Preparation
3.3 Modeling and Evaluation
4 Research Result
5 Conclusion and Future Work
References
A LSTM Deep Learning Approach for Forecasting Global Air Quality Index
1 Introduction
2 Background
2.1 LSTM
2.2 AQI
3 Related Work
4 Methodology
4.1 Data Preparation
4.2 Global AQI
4.3 AQI Forecasting
5 Results
5.1 Dataset
5.2 Design of the Prediction Model
5.3 Hourly AQI Prediction Approach
5.4 8-H AQI Prediction Approach
6 Conclusions
References
Author Index




پست ها تصادفی