feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Years
Subjects(RVK)
Access
  • 1
    UID:
    almahu_9949427166902882
    Format: 1 online resource (392 pages)
    ISBN: 9781839091018 , 9781839090998
    Content: Big Data Analytics and Intelligence is essential reading for researchers and experts working in the fields of health care, data science, analytics, the internet of things, and information retrieval.
    Note: Includes index. , Chapter 1: Big Data Analytics in Healthcare; Kalaiselvi K and Thirumurthi Raja -- Chapter 2: A Big Data Analytics in Health Sector: Need, Opportunities, Challenges and Future Prospects; Anam and M. Israrul Haque -- Chapter 3: Use of Classification Algorithms in Healthcare; Hera Khan, Ayush Srivastav and Amit Kumar Mishra -- Chapter 4: Big Data Analytics in Excelling Health Care: Achievement and Challenges in India; Arindam Chakrabarty and Uday Sankar Das -- Chapter 5: Predictive Big Data Analytics in Healthcare; Shivinder Nijjer, Sahil Raj and Saurabh Kumar -- Chapter 6: Smart Nursery with Health Monitoring System through Integration of IoT and Machine Learning; Rashbir Singh, Prateek Singh and Latika Kharb -- Chapter 7: Computer-aided big healthcare data (BHD) analytics; Tawseef Shaikh and Rashid Ali -- Chapter 8: Intrusion Detection and Security System; Prerna Sharma and Deepali Kamthania -- Chapter 9: Decision making with BI in Healthcare domain; Bhawna Suri, Shweta Taneja and Hemanpreet Singh Kalsi -- Chapter 10: Assistance for Facial Palsy using Quantitative Technology; Gulpreet Kaur Chadha and Seema Rawat -- Chapter 11: Constructive Effect of Ranking Optimal features using Random Forest for Breast Cancer Diagnosis using Support Vector Machine and Naïve Bayes Classifiers; Deepa G and Senthil S -- Chapter 12: Intelligent Establishment of Correlation of TTH and Diabetes Mellitus on Subject's Physical Characteristics: MMBD and ML Perspective in Healthcare; Parul Singhal and Rohit Rastogi -- Chapter 13: Machine Learning Model for Meal Classification and Assessing Nutrients value according to Weather Conditions; Madhulika Bhatia, Shubham Sharma, Madhurima Hooda, Narayan C. Debnath Chapter 14: Telehealth: Former, Today and Later; Madhulika Bhatia, Shubham Chaudhary, Madhurima Hooda, Bhuvanesh Unhelkar -- Chapter 15: Predictive Modelling in Health Care Data Analytics - A Sustainable Supervised Learning Technique; Suryakanthi Tangirala.
    Additional Edition: ISBN 9781839091001
    Language: English
    Subjects: Computer Science , Economics
    RVK:
    RVK:
    Keywords: Electronic books ; Electronic books ; Electronic books.
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV046652458
    Format: 1 Online-Ressource (X, 415 Seiten) , Illustrationen
    ISBN: 9783030408503
    Series Statement: Learning and Analytics in Intelligent Systems volume 13
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-40849-7
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-40851-0
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-030-40852-7
    Language: English
    Keywords: Gesundheitswesen ; Maschinelles Lernen
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949697609402882
    Format: 1 online resource (264 pages)
    ISBN: 0-323-90639-7
    Series Statement: Intelligent data centric systems
    Content: Artificial Intelligence and Industry 4.0 explores recent advancements in blockchain technology and artificial intelligence (AI) as well as their crucial impacts on realizing Industry 4.0 goals. The book explores AI applications in industry including Internet of Things (IoT) and Industrial Internet of Things (IIoT) technology. Chapters explore how AI (machine learning, smart cities, healthcare, Society 5.0, etc.) have numerous potential applications in the Industry 4.0 era. This book is a useful resource for researchers and graduate students in computer science researching and developing AI and the IIoT.
    Note: Intro -- Artificial Intelligence and Industry 4.0 -- Copyright -- Contents -- Contributors -- Part 1: Artificial intelligence and Industry 4.0 with healthcare -- Chapter 1: Influence and implementation of Industry 4.0 in health care -- 1.1. Introduction -- 1.2. Industry 1.0 to 4.0 -- 1.3. Healthcare 1.0 to 4.0 -- 1.4. Literature review -- 1.5. Big data in health care -- 1.6. Internet of Things in the healthcare sector -- 1.7. Blockchain technology in the healthcare sector -- 1.8. Applications in healthcare 4.0 -- 1.8.1. Observing physiological and pathological signals -- 1.8.2. Self-management, wellness monitoring, and prevention -- 1.8.3. Smart pharmaceuticals and monitoring of medication intake -- 1.8.4. Personalized healthcare system -- 1.8.5. Cloud-based health information systems -- 1.8.6. Telepathology, telemedicine, and disease monitoring -- 1.8.7. Assisted living -- 1.8.8. Rehabilitation -- 1.9. Case studies -- 1.10. Conclusion -- 1.11. The recent innovations and research solutions of Industry 4.0 in healthcare sector -- References -- Chapter 2: Impact of artificial intelligence in the healthcare sector -- 2.1. Introduction -- 2.2. Literature review -- 2.2.1. AI in health care -- 2.2.2. Utilization of AI in health care in India -- 2.2.2.1. Hospitals -- 2.2.2.2. Pharmaceuticals -- 2.2.2.3. Diagnostics -- 2.2.2.4. Medical equipment and supplies -- 2.2.2.5. Health insurance -- 2.2.2.6. Telemedicine -- 2.3. Research framework and development of hypotheses -- 2.3.1. Technological perspective (TP) -- 2.3.1.1. Cost-effectiveness (CE) -- 2.3.1.2. Relative advantage (RA) -- 2.3.1.3. Security and privacy concerns (SPC) -- 2.3.1.4. Complexity (COMP) -- 2.3.2. Organizational perspective (OP) -- 2.3.2.1. HR readiness (HRR) -- 2.3.2.2. Top management support (TMS) -- 2.3.2.3. Organizational readiness (ORR) -- 2.3.3. Environmental perspective (EP). , 2.3.3.1. Competitive pressure (CP) -- 2.3.3.2. Support from technology vendors (STV) -- 2.3.3.3. Environmental uncertainty (EU) -- 2.4. Research methodology -- 2.4.1. Demographics of the respondents -- 2.5. Data analysis -- 2.5.1. Reliability and validity -- 2.5.1.1. Cronbachs alpha -- 2.5.1.2. Composite reliability -- 2.5.2. Harman test -- 2.5.3. Exploratory factor analysis (EFA) -- 2.5.4. Construct validity (CV) -- 2.5.5. Structural equation modeling -- 2.6. Discussion -- 2.6.1. Technological perspective (TP) -- 2.6.2. Organizational perspectives (OP) -- 2.6.3. Environmental perspectives (EP) -- 2.7. Conclusion -- 2.8. Limitations and future scope of the study -- Appendix A. Measurement items -- Appendix B. Questionnaire -- References -- Part 2: Role of artificial intelligence in industry 4.0 -- Chapter 3: Embedded system for model characterization developing intelligent controllers in industry 4.0 -- 3.1. Introduction -- 3.2. Theoretical framework -- 3.2.1. Processing unit Raspberry PI -- 3.2.2. Analogic digital converter ADS1115 -- 3.2.3. Genetic algorithms -- 3.2.3.1. Population -- 3.2.3.2. Selection -- 3.2.3.3. Crossover operation -- 3.2.3.4. Mutation -- 3.2.4. Transfer function -- 3.2.4.1. First-order systems -- 3.2.4.2. Second-order systems -- 3.3. Methods -- 3.3.1. General description of the identification process -- 3.3.2. Time analysis for the transfer functions -- 3.3.3. Fitness function for characterizing TFs -- 3.3.3.1. First-order systems fitness function -- 3.3.3.2. Second-order systems fitness function -- 3.4. Results and discussion -- 3.4.1. Design of experiment -- 3.4.2. Results -- 3.4.2.1. Configuration of parameters in the optimization algorithm -- 3.4.2.2. First-order transfer function -- 3.4.2.3. Second-order transfer function -- 3.4.3. Discussion -- 3.4.3.1. Integration of the proposed algorithm into industry 4.0. , 3.5. Conclusions -- 3.5.1. Future work -- References -- Chapter 4: Industry 4.0 multiagent system-based knowledge representation through blockchain -- 4.1. Introduction -- 4.2. Literature survey -- 4.3. What is industry 4.0 -- 4.3.1. Virtual Sensors in Intelligent industry -- 4.3.2. Intelligent model virtual sensor description -- 4.3.2.1. Clustering -- 4.3.2.2. Opinion analysis -- 4.3.2.3. Trends -- 4.3.3. Industry 4.0 vertical integration -- 4.4. What is blockchain -- 4.5. Blockchain as the industry engine 4.0 -- 4.6. Blockchain-based conventional networks -- 4.7. Decision making concept -- 4.8. What is ambient intelligence -- 4.8.1. Industry as a smart environment -- 4.8.2. Sensors -- 4.8.3. Decision-making in ambient intelligence -- 4.8.4. Better decision-making in industry -- 4.9. Multiagent systems -- 4.10. Blockchain for the representation of knowledge from multiagent systems -- 4.10.1. Multiagent systems in industry -- 4.10.2. Model presentation -- 4.11. Comparison between the existing model and our proposed model -- 4.12. Country-wise comparison of multiagent-based industry 4.0 -- 4.13. Conclusion and future work -- References -- Chapter 5: Artificial Intelligence: A tool to resolve thermal behavior issues in disc braking systems -- 5.1. Introduction -- 5.2. Artificial Intelligence in the automobile sector -- 5.3. AI in automobile disc braking systems -- 5.4. Notable brake complaints observed at servicing centers -- 5.5. Literature survey -- 5.6. Application of AI to resolve thermal problems during long braking -- 5.7. Results and conclusion -- 5.8. Future scope -- References -- Chapter 6: Proposal of a smart framework for a transportation system in a smart city -- 6.1. Introduction -- 6.2. Literary review -- 6.3. Spider monkey optimization -- 6.3.1. Structure of fission-fusion culture -- 6.3.2. Spider monkey conduct -- 6.3.3. Social conduct. , 6.3.4. Spider monkey optimization process -- 6.3.5. Application methodology SMO -- 6.3.5.1. SMO parameters -- 6.4. Practical application -- 6.4.1. Initial conditions -- 6.4.2. SMO control parameters -- 6.5. Discussion of results -- 6.6. Conclusions -- References -- Chapter 7: Society 5.0: Effective technology for a smart society -- 7.1. Introduction -- 7.2. Literature review -- 7.3. Industrial revolutions -- 7.3.1. Industry 1.0 -- 7.3.2. Industry 2.0 -- 7.3.3. Industry 3.0 -- 7.3.4. Industry 4.0 -- 7.4. The concept of Society 5.0 and artificial intelligence -- 7.4.1. The transition process from Industry 4.0 to Society 5.0 -- 7.4.2. The concept of Society 5.0 -- 7.4.3. The factors that reveal Society 5.0 -- 7.4.4. The goals of Society 5.0 -- 7.4.5. The innovations provided by Society 5.0 -- 7.4.6. The relationship between Society 5.0 and artificial intelligence -- 7.4.7. The obstacles to Society 5.0 -- 7.5. Conclusions -- 7.6. Recommendations and future scope -- References -- Chapter 8: Big data analytics for strategic and operational decisions -- 8.1. Introduction -- 8.2. Overview -- 8.2.1. Business analytics -- 8.2.2. Type of analytics -- 8.2.3. Big data analytics -- 8.2.4. Enterprise Big data sources -- 8.3. Opportunities -- 8.4. Challenges -- 8.5. Proposed solution -- 8.6. Case study -- 8.7. Results and discussion -- 8.8. Conclusion -- References -- Chapter 9: Person-based automation with artificial intelligence Chatbots: A driving force of Industry 4.0 -- 9.1. Introduction -- 9.1.1. Chatbots -- 9.1.2. Role of Chatbots in Industry 4.0 -- 9.1.3. Importance of Chatbots -- 9.1.4. Key concepts -- 9.1.4.1. Pattern matching -- 9.1.4.2. Artificial Intelligence Markup Language (AIML) -- 9.1.4.3. Latent semantic analysis (LSA) -- 9.1.4.4. Chat script -- 9.1.4.5. Natural language unit (NLU) -- 9.1.5. Popular Chatbots -- 9.2. NBC Chatbot -- 9.3. A.L.I.C.E. , 9.3.1. Chapter organization -- 9.4. Related work -- 9.4.1. History of Chatbots -- 9.4.2. Machine learning and artificial intelligence algorithms in Chatbots -- 9.4.3. Models of Chatbots -- 9.4.3.1. The selective model -- 9.4.3.2. The generative model -- 9.4.4. Selective vs. generative models -- 9.4.5. Challenges in Chatbot implementation -- 9.4.6. Machine learning in Chatbots for sentiment analysis -- 9.5. Proposed work -- 9.5.1. The general architecture of Chatbots -- 9.5.1.1. Analyzing user request -- 9.5.2. Proposed model -- 9.6. Applications of Chatbots -- 9.7. Weaknesses of Chatbots and scope for improvement -- 9.8. Results and discussion -- 9.9. Conclusion and future work -- References -- Index.
    Additional Edition: Print version: Hassanien, Aboul Ella Artificial Intelligence and Industry 4. 0 San Diego : Elsevier Science & Technology,c2022 ISBN 9780323884686
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV047058135
    Format: 1 Online-Ressource (xviii, 289 Seiten)
    Edition: First edition
    ISBN: 9781839090998
    Content: Big Data Analytics and Intelligenceis essential reading for researchers and experts working in the fields of health care, data science, analytics, the internet of things, and information retrieval
    Note: Intro -- Half Title Page -- Title Page -- Copyright Page -- Contents -- About the Editors -- About the Authors -- Preface -- Chapter 1-Big Data Analytics and Intelligence: A Perspective for Health Care -- 1. Introduction -- 2. Big Data Overview -- 3. Big Data Applications in Health Care -- 3.1.1. Levels of Staffing. Staffing levels are set by administrators of the particular organization and these factors are influenced by various forces such as budgetary considerations and features of local nurse labor markets. The administrative departmen , 3.1.2. Outcomes. Capturing and analyzing the patient information helps in generating a summarized report so that it can be used in later stages for better understanding. Even though it has resulted in great success still this method is very challenging be -- 3.1.3. Conclusion. A difference can be seen in healthcare sections where staffing is less when compared to institutions where staffing is more. Most of the researches that were conducted suggest that if nurses appointed are less than required it creates u -- 3.2. Electronic Health Records. Needs and Advantages , 3.2.1. Introduction. The most important task of EHR is to help in understanding the medical background of patients with the help of electronic mechanism rather than using traditional techniques of maintaining papers or folders. This helps in reducing time -- 3.2.2. Importance for Improving Efficiency and Productivity. One of the main aims of maintaining EHR is that it helps to retrieve information's regarding the patients whenever required. Lab results can be gathered from decades ago with less amount of time , 3.2.3. Application. The application of EHRs ranges from government sectors to financial sections of various industries. Few of the applications and the expected outcomes from the particular industries are as follows. -- 3.2.4. Aggregated Data. Since decisions are to be taken based on the past experiences, most of the organizations collect high quality data in raw format. These data are mainly procured from the data collected from inpatient and outpatient data and details , 3.2.5. Integrated Data. The main disadvantage of maintaining paper-based health records in that it can be used to combine other paper health records and store as the same. Since this mechanism lacks the ability to integrate with other paper forms of infor -- 3.2.6. Conclusion. In order to modernize the infrastructure in healthcare sector it is required to adopt and implement EHRs-based systems. A survey conducted to understand the importance of EHR shows that it helps to identify patients with serious health -- 3.3. Enhancing Patient Engagement
    Additional Edition: Erscheint auch als Online-Ausgabe, Epub ISBN 978-1-83909-101-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-83909-100-1
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_BV047870402
    Format: 1 Online-Ressource (XII, 202 Seiten) : , Illustrationen, Diagramme.
    ISBN: 978-3-11-070924-7 , 978-3-11-070934-6
    Series Statement: De Gruyter frontiers in computational intelligence volume 13
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-11-070543-0
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Künstliche Intelligenz ; Softwareentwicklung
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almafu_9960135408602883
    Format: 1 online resource
    Edition: 1st.
    ISBN: 9781119761655 , 1119761654 , 9781119761662 , 1119761662 , 9781119761679 , 1119761670
    Note: Preface -- Part 1: Internet of Things -- 1 Voyage of Internet of Things in the Ocean of Technology 3 Tejaskumar R. Ghadiyali, Bharat C. Patel and Manish M. Kayasth -- 1.1 Introduction -- 1.1.1 Characteristics of IoT -- 1.1.2 IoT Architecture -- 1.1.3 Merits and Demerits of IoT -- 1.2 Technological Evolution Toward IoT -- 1.3 IoT-Associated Technology -- 1.4 Interoperability in IoT -- 1.5 Programming Technologies in IoT -- 1.5.1 Arduino -- 1.5.2 Raspberry Pi -- 1.5.3 Python -- 1.6 IoT Applications -- Conclusion -- References -- 2 AI for Wireless Network Optimization: Challenges and Opportunities 25 Murad Abusubaih -- 2.1 Introduction to AI -- 2.2 Self-Organizing Networks -- 2.2.1 Operation Principle of Self-Organizing Networks -- 2.2.2 Self-Configuration -- 2.2.3 Self-Optimization -- 2.2.4 Self-Healing -- 2.2.5 Key Performance Indicators -- 2.2.6 SON Functions -- 2.3 Cognitive Networks -- 2.4 Introduction to Machine Learning -- 2.4.1 ML Types -- 2.4.2 Components of ML Algorithms -- 2.4.3 How do Machines Learn? -- 2.4.3.1 Supervised Learning -- 2.4.3.2 Unsupervised Learning -- 2.4.3.3 Semi-Supervised Learning -- 2.4.3.4 Reinforcement Learning -- 2.4.4 ML and Wireless Networks -- 2.5 Software-Defined Networks -- 2.5.1 SDN Architecture -- 2.5.2 The OpenFlow Protocol -- 2.5.3 SDN and ML -- 2.6 Cognitive Radio Networks -- 2.6.1 Sensing Methods -- 2.7 ML for Wireless Networks: Challenges and Solution Approaches -- 2.7.1 Cellular Networks -- 2.7.1.1 Energy Saving -- 2.7.1.2 Channel Access and Assignment -- 2.7.1.3 User Association and Load Balancing -- 2.7.1.4 Traffic Engineering -- 2.7.1.5 QoS/QoE Prediction -- 2.7.1.6 Security -- 2.7.2 Wireless Local Area Networks -- 2.7.2.1 Access Point Selection -- 2.7.2.2 Interference Mitigation -- 2.7.2.3 Channel Allocation and Channel Bonding -- 2.7.2.4 Latency Estimation and Frame Length Selection -- 2.7.2.5 Handover -- 2.7.3 Cognitive Radio Networks -- References -- 3 An Overview on Internet of Things (IoT) Segments and Technologies 57 Amarjit Singh -- 3.1 Introduction -- 3.2 Features of IoT -- 3.3 IoT Sensor Devices -- 3.4 IoT Architecture -- 3.5 Challenges and Issues in IoT -- 3.6 Future Opportunities in IoT -- 3.7 Discussion -- 3.8 Conclusion -- References -- 4 The Technological Shift: AI in Big Data and IoT 69 Deepti Sharma, Amandeep Singh and Sanyam Singhal -- 4.1 Introduction -- 4.2 Artificial Intelligence -- 4.2.1 Machine Learning -- 4.2.2 Further Development in the Domain of Artificial Intelligence -- 4.2.3 Programming Languages for Artificial Intelligence -- 4.2.4 Outcomes of Artificial Intelligence -- 4.3 Big Data -- 4.3.1 Artificial Intelligence Methods for Big Data -- 4.3.2 Industry Perspective of Big Data -- 4.3.2.1 In Medical Field -- 4.3.2.2 In Meteorological Department -- 4.3.2.3 In Industrial/Corporate Applications and Analytics -- 4.3.2.4 In Education -- 4.3.2.5 In Astronomy -- 4.4 Internet of Things -- 4.4.1 Interconnection of IoT With AoT -- 4.4.2 Difference Between IIoT and IoT -- 4.4.3 Industrial Approach for IoT -- 4.5 Technical Shift in AI, Big Data, and IoT -- 4.5.1 Industries Shifting to AI-Enabled Big Data Analytics -- 4.5.2 Industries Shifting to AI-Powered IoT Devices -- 4.5.3 Statistical Data of These Shifts -- 4.6 Conclusion -- References -- 5 IoT's Data Processing Using Spark 91 Ankita Bansal and Aditya Atri -- 5.1 Introduction -- 5.2 Introduction to Apache Spark -- 5.2.1 Advantages of Apache Spark -- 5.2.2 Apache Spark's Components -- 5.3 Apache Hadoop MapReduce -- 5.3.1 Limitations of MapReduce -- 5.4 Resilient Distributed Dataset (RDD) -- 5.4.1 Features and Limitations of RDDs -- 5.5 DataFrames -- 5.6 Datasets -- 5.7 Introduction to Spark SQL -- 5.7.1 Spark SQL Architecture -- 5.7.2 Spark SQL Libraries -- 5.8 SQL Context Class in Spark -- 5.9 Creating Dataframes -- 5.9.1 Operations on DataFrames -- 5.10 Aggregations -- 5.11 Running SQL Queries on Dataframes -- 5.12 Integration With RDDs -- 5.12.1 Inferring the Schema Using Reflection -- 5.12.2 Specifying the Schema Programmatically -- 5.13 Data Sources -- 5.13.1 JSON Datasets -- 5.13.2 Hive Tables -- 5.13.3 Parquet Files -- 5.14 Operations on Data Sources -- 5.15 Industrial Applications -- 5.16 Conclusion -- References -- 6 SE-TEM: Simple and Efficient Trust Evaluation Model for WSNs 111 Tayyab Khan and Karan Singh -- 6.1 Introduction -- 6.1.1 Components of WSNs -- 6.1.2 Trust -- 6.1.3 Major Contribution -- 6.2 Related Work -- 6.3 Network Topology and Assumptions -- 6.4 Proposed Trust Model -- 6.4.1 CM to CM (Direct) Trust Evaluation Scheme -- 6.4.2 CM to CM Peer Recommendation (Indirect) Trust Estimation (PRx,y(∆t)) -- 6.4.3 CH-to-CH Direct Trust Estimation -- 6.4.4 BS-to-CH Feedback Trust Calculation -- 6.5 Result and Analysis -- 6.5.1 Severity Analysis -- 6.5.2 Malicious Node Detection -- 6.6 Conclusion and Future Work -- References -- 7 Smart Applications of IoT 131 Pradeep Kamboj, T. Ratha Jeyalakshmi, P. Thillai Arasu, S. Balamurali and A. Murugan -- 7.1 Introduction -- 7.2 Background -- 7.2.1 Enabling Technologies for Building Intelligent Infrastructure -- 7.3 Smart City -- 7.3.1 Benefits of a Smart City -- 7.3.2 Smart City Ecosystem -- 7.3.3 Challenges in Smart Cities -- 7.4 Smart Healthcare -- 7.4.1 Smart Healthcare Applications -- 7.4.2 Challenges in Healthcare -- 7.5 Smart Agriculture -- 7.5.1 Environment Agriculture Controlling -- 7.5.2 Advantages -- 7.5.3 Challenges -- 7.6 Smart Industries -- 7.6.1 Advantages -- 7.6.2 Challenges -- 7.7 Future Research Directions -- 7.8 Conclusions -- References -- 8 Sensor-Based Irrigation System: Introducing Technology in Agriculture 153 Rohit Rastogi, Krishna Vir Singh, Mihir Rai, Kartik Sachdeva, Tarun Yadav and Harshit Gupta -- 8.1 Introduction -- 8.1.1 Technology in Agriculture -- 8.1.2 Use and Need for Low-Cost Technology in Agriculture -- 8.2 Proposed System -- 8.3 Flow Chart -- 8.4 Use Case -- 8.5 System Modules -- 8.5.1 Raspberry Pi -- 8.5.2 Arduino Uno -- 8.5.3 DHT 11 Humidity and Temperature Sensor -- 8.5.4 Soil Moisture Sensor -- 8.5.5 Solenoid Valve -- 8.5.6 Drip Irrigation Kit -- 8.5.7 433 MHz RF Module -- 8.5.8 Mobile Application -- 8.5.9 Testing Phase -- 8.6 Limitations -- 8.7 Suggestions -- 8.8 Future Scope -- 8.9 Conclusion -- Acknowledgement -- References -- Suggested Additional Readings -- Key Terms and Definitions -- Appendix -- Example Code -- 9 Artificial Intelligence: An Imaginary World of Machine 167 Bharat C. Patel, Manish M. Kaysth and Tejaskumar R. Ghadiyali -- 9.1 The Dawn of Artificial Intelligence -- 9.2 Introduction -- 9.3 Components of AI -- 9.3.1 Machine Reasoning -- 9.3.2 Natural Language Processing -- 9.3.3 Automated Planning -- 9.3.4 Machine Learning -- 9.4 Types of Artificial Intelligence -- 9.4.1 Artificial Narrow Intelligence -- 9.4.2 Artificial General Intelligence -- 9.4.3 Artificial Super Intelligence -- 9.5 Application Area of AI -- 9.6 Challenges in Artificial Intelligence -- 9.7 Future Trends in Artificial Intelligence -- 9.8 Practical Implementation of AI Application -- References -- 10 Impact of Deep Learning Techniques in IoT 185 M. Chandra Vadhana, P. Shanthi Bala and Immanuel Zion Ramdinthara -- 10.1 Introduction -- 10.2 Internet of Things -- 10.2.1 Characteristics of IoT -- 10.2.2 Architecture of IoT -- 10.2.2.1 Smart Device/Sensor Layer -- 10.2.2.2 Gateways and Networks -- 10.2.2.3 Management Service Layer -- 10.2.2.4 Application Layer -- 10.2.2.5 Interoperability of IoT -- 10.2.2.6 Security Requirements at a Different Layer of IoT -- 10.2.2.7 Future Challenges for IoT -- 10.2.2.8 Privacy and Security -- 10.2.2.9 Cost and Usability -- 10.2.2.10 Data Management -- 10.2.2.11 Energy Preservation -- 10.2.2.12 Applications of IoT -- 10.2.2.13 Essential IoT Technologies -- 10.2.2.14 Enriching the Customer Value -- 10.2.2.15 Evolution of the Foundational IoT Technologies -- 10.2.2.16 Technical Challenges in the IoT Environment -- 10.2.2.17 Security Challenge -- 10.2.2.18 Chaos Challenge -- 10.2.2.19 Advantages of IoT -- 10.2.2.20 Disadvant , ing -- 10.3.1.1 Convolutional Neural Network -- 10.3.1.2 Recurrent Neural Networks -- 10.3.1.3 Long Short-Term Memory -- 10.3.1.4 Autoencoders -- 10.3.1.5 Variational Autoencoders -- 10.3.1.6 Generative Adversarial Networks -- 10.3.1.7 Restricted Boltzmann Machine -- 10.3.1.8 Deep Belief Network -- 10.3.1.9 Ladder Networks -- 10.3.2 Applications of Deep Learning -- 10.3.2.1 Industrial Robotics -- 10.3.2.2 E-Commerce Industries -- 10.3.2.3 Self-Driving Cars -- 10.3.2.4 Voice-Activated Assistants -- 10.3.2.5 Automatic Machine Translation -- 10.3.2.6 Automatic Handwriting Translation -- 10.3.2.7 Predicting Earthquakes -- 10.3.2.8 Object Classification in Photographs -- 10.3.2.9 Automatic Game Playing -- 10.3.2.10 Adding Sound to Silent Movies -- 10.3.3 Advantages of Deep Learning -- 10.3.4 Disadvantages of Deep Learning -- 10.3.5 Deployment of Deep Learning in IoT -- 10.3.6 Deep Learning Applications in IoT -- 10.3.6.1 Image Recognition -- 10.3.6.2 Speech/Voice Recognition -- 10.3.6.3 Indoor Localization -- 10.3.6.4 Physiological and Psychological Detection -- 10.3.6.5 Security and Privacy -- 10.3.7 Deep Learning Techniques on IoT Devices -- 10.3.7.1 Network Compression -- 10.3.7.2 Approximate Computing -- 10.3.7.3 Accelerators -- 10.3.7.4 Tiny Motes -- 10.4 IoT Challenges on Deep Learning and Future Directions -- 10.4.1 Lack of IoT Dataset -- 10.4.2 Pre-Processing -- 10.4.3 Challenges of 6V's -- 10.4.4 Deep Learning Limitations -- 10.5 Future Directions of Deep Learning -- 10.5.1 IoT Mobile Data -- 10.5.2 Integrating Contextual Information -- 10.5.3 Online Resource Provisioning for IoT Analytics -- 10.5.4 Semi-Supervised Analytic Framework -- 10.5.5 Dependable and Reliable IoT Analytics -- 10.5.6 Self-Organizing Communication Networks -- 10.5.7 Emerging IoT Applications -- 10.5.7.1 Unmanned Aerial Vehicles -- 10.5.7.2 Virtual/Augmented Reality -- 10.5.7.3 Mobile Robotics -- 10.6 Common Datasets for Deep Learning in IoT -- 10.7 Discussion -- 10.8 Conclusion -- References -- Part 2: Artificial Intelligence in Healthcare -- 11 Non-Invasive Process for Analyzing Retinal Blood Vessels Using Deep Learning Techniques 217 Toufique A. Soomro, Ahmed J. Afifi, Pardeep Kumar, Muhammad Usman Keerio, Saleem Ahmed and Ahmed Ali -- 11.1 Introduction -- 11.2 Existing Methods Review -- 11.3 Methodology -- 11.3.1 Architecture of Stride U-Net -- 11.3.2 Loss Function -- 11.4 Databases and Evaluation Metrics -- 11.4.1 CNN Implementation Details -- 11.5 Results and Analysis -- 11.5.1 Evaluation on DRIVE and STARE Databases -- 11.5.2 Comparative Analysis -- 11.6 Concluding Remarks -- References -- 12 Existing Trends in Mental Health Based on IoT Applications: A Systematic Review 235 Muhammad Ali Nizamani, Muhammad Ali Memon and Pirah Brohi -- 12.1 Introduction -- 12.2 Methodology -- 12.3 IoT in Mental Health -- 12.4 Mental Healthcare Applications and Services Based on IoT -- 12.5 Benefits of IoT in Mental Health -- 12.5.1 Reduction in Treatment Cost -- 12.5.2 Reduce Human Error -- 12.5.3 Remove Geographical Barriers -- 12.5.4 Less Paperwork and Documentation -- 12.5.5 Early Stage Detection of Chronic Disorders -- 12.5.6 Improved Drug Management -- 12.5.7 Speedy Medical Attention -- 12.5.8 Reliable Results of Treatment -- 12.6 Challenges in IoT-Based Mental Healthcare Applications -- 12.6.1 Scalability -- 12.6.2 Trust -- 12.6.3 Security and Privacy Issues -- 12.6.4 Interoperability Issues -- 12.6.5 Computational Limits -- 12.6.6 Memory Limitations -- 12.6.7 Communications Media -- 12.6.8 Devices Multiplicity -- 12.6.9 Standardization -- 12.6.10 IoT-Based Healthcare Platforms -- 12.6.11 Network Type -- 12.6.12 Quality of Service -- 12.7 Blockchain in IoT for Healthcare -- 12.8 Results and Discussion -- 12.9 Limitations of the Survey -- 12.10 Conclusion -- References -- 13 Monitoring Technologies for Precision Health 251 Rehab A. Rayan and Imran Zafar -- 13.1 Introduction -- 13.2 Applications of Monitoring Technologies -- 13.2.1 Everyday Life Activities -- 13.2.2 Sleeping and Stress -- 13.2.3 Breathing Patterns and Respiration -- 13.2.4 Energy and Caloric Consumption -- 13.2.5 Diabetes, Cardiac, and Cognitive Care -- 13.2.6 Disability and Rehabilitation -- 13.2.7 Pregnancy and Post-Procedural Care -- 13.3 Limitations -- 13.3.1 Quality of Data and Reliability -- 13.3.2 Safety, Privacy, and Legal Concerns -- 13.4 Future Insights -- 13.4.1 Consolidating Frameworks -- 13.4.2 Monitoring and Intervention -- 13.4.3 Research and Development -- 13.5 Conclusions -- References -- 14 Impact of Artificial Intelligence in Cardiovascular Disease 261 Mir Khan, Saleem Ahmed, Pardeep Kumar and Dost Muhammad Saqib Bhatti -- 14.1 Artificial Intelligence -- 14.2 Machine Learning -- 14.3 The Application of AI in CVD -- 14.3.1 Precision Medicine -- 14.3.2 Clinical Prediction -- 14.3.3 Cardiac Imaging Analysis -- 14.4 Future Prospect -- 14.5 PUAI and Novel Medical Mode -- 14.5.1 Phenomenon of PUAI -- 14.5.2 Novel Medical Model -- 14.6 Traditional Mode -- 14.6.1 Novel Medical Mode Plus PUAI -- 14.7 Representative Calculations of AI -- 14.8 Overview of Pipeline for Image-Based Machine Learning Diagnosis -- References -- 15 Healthcare Transformation With Clinical Big Data Predictive Analytics 273 Muhammad Suleman Memon, Pardeep Kumar, Azeem Ayaz Mirani, Mumtaz Qabulio, Sumera Naz Pathan and Asia Khatoon Soomro -- 15.1 Introduction -- 15.1.1 Big Data in Health Sector -- 15.1.2 Data Structure Produced in Health Sectors -- 15.2 Big Data Challenges in Healthcare -- 15.2.1 Big Data in Computational Healthcare -- 15.2.2 Big Data Predictive Analytics in Healthcare -- 15.2.3 Big Data for Adapted Healthcare -- 15.3 Cloud Computing and Big Data in Healthcare -- 15.4 Big Data Healthcare and IoT -- 15.5 Wearable Devices for Patient Health Monitoring -- 15.6 Big Data and Industry 4.0 -- 15.7 Conclusion -- References -- 16 Computing Analysis of Yajna and Mantra Chanting as a Therapy: A Holistic Approach for All by Indian Continent Amidst Pandemic Threats 287 Rohit Rastogi, Mamta Saxena, D.K. Chaturvedi, Mayank Gupta, Mukund Rastogi, Prajwal Srivatava, Mohit Jain, Pradeep Kumar, Ujjawal Sharma, Rohan Choudhary and Neha Gupta -- 16.1 Introduction -- 16.1.1 The Stats of Different Diseases, Comparative Observation on Symptoms, and Mortality Rate -- 16.1.2 Precautionary Guidelines Followed in Indian Continent -- 16.1.3 Spiritual Guidelines in Indian Society -- 16.1.3.1 Spiritual Defense Against Global Corona by Swami Bhoomananda Tirtha of Trichura, Kerala, India -- 16.1.4 Veda Vigyaan: Ancient Vedic Knowledge -- 16.1.5 Yagyopathy Researches, Say, Smoke of Yagya is Boon -- 16.1.6 The Yagya Samagri -- 16.2 Literature Survey -- 16.2.1 Technical Aspects of Yajna and Mantra Therapy -- 16.2.2 Mantra Chanting and Its Science -- 16.2.3 Yagya Medicine (Yagyopathy) -- 16.2.4 The Medicinal HavanSamagri Components -- 16.2.4.1 Special Havan Ingredients to Fight Against Infectious Diseases -- 16.2.5 Scientific Benefits of Havan -- 16.3 Experimental Setup Protocols With Results -- 16.3.1 Subject Sample Distribution -- 16.3.1.1 Area Wise Distribution -- 16.3.2 Conclusion and Discussion Through Experimental Work -- 16.4 Future Scope and Limitations -- 16.5 Novelty -- 16.6 Recommendations -- 16.7 Applications of Yajna Therapy -- 16.8 Conclusions -- Acknowledgement -- References -- Key Terms and Definitions -- 17 Extraction of Depression Symptoms From Social Networks 307 Bhavna Chilwal and Amit Kumar Mishra -- 17.1 Introduction -- 17.1.1 Diagnosis and Treatments -- 17.2 Data Mining in Healthcare -- 17.2.1 Text Mining -- 17.3 Social Network Sites -- 17.4 Symptom Extraction Tool -- 17.4.1 Data Collection -- 17.4.2 Data Processing -- 17.4.3 Data Analysis -- 17.5 Sentiment Analysis -- 17.5.1 Emotion Analysis -- 17.5.2 Behavioral Analysis -- 17.6 Conclusion -- References -- Part 3: Cybersecurity -- 18 Fog Computing Perspective: Technical Trends, Security Practices, and Recommendations 325 C. Kaviyazhiny, P. Shanthi Bala and A.S. Gowri -- 18.1 Int , ensing) -- 18.5.3 Network Layer -- 18.5.4 Service Layer (Support) -- 18.5.5 Application Layer (Interface) -- 18.6 Security Issues in Fog Computing -- 18.6.1 Virtualization Issues -- 18.6.2 Web Security Issues -- 18.6.3 Internal/External Communication Issues -- 18.6.4 Data Security Related Issues -- 18.6.5 Wireless Security Issues -- 18.6.6 Malware Protection -- 18.7 Machine Learning for Secure Fog Computing -- 18.7.1 Layer 1 Cloud -- 18.7.2 Layer 2 Fog Nodes For The Community -- 18.7.3 Layer 3 Fog Node for Their Neighborhood -- 18.7.4 Layer 4 Sensors -- 18.8 Existing Security Solution in Fog Computing -- 18.8.1 Privacy-Preserving in Fog Computing -- 18.8.2 Pseudocode for Privacy Preserving in Fog Computing -- 18.8.3 Pseudocode for Feature Extraction -- 18.8.4 Pseudocode for Adding Gaussian Noise to the Extracted Feature -- 18.8.5 Pseudocode for Encrypting Data -- 18.8.6 Pseudocode for Data Partitioning -- 18.8.7 Encryption Algorithms in Fog Computing -- 18.9 Recommendation and Future Enhancement -- 18.9.1 Data Encryption -- 18.9.2 Preventing from Cache Attacks -- 18.9.3 Network Monitoring -- 18.9.4 Malware Protection -- 18.9.5 Wireless Security -- 18.9.6 Secured Vehicular Network -- 18.9.7 Secure Multi-Tenancy -- 18.9.8 Backup and Recovery -- 18.9.9 Security with Performance -- 18.10 Conclusion -- References -- 19 Cybersecurity and Privacy Fundamentals 353 Ravi Verma -- 19.1 Introduction -- 19.2 Historical Background and Evolution of Cyber Crime -- 19.3 Introduction to Cybersecurity -- 19.3.1 Application Security -- 19.3.2 Information Security -- 19.3.3 Recovery From Failure or Disaster -- 19.3.4 Network Security -- 19.4 Classification of Cyber Crimes -- 19.4.1 Internal Attacks -- 19.4.2 External Attacks -- 19.4.3 Unstructured Attack -- 19.4.4 Structured Attack -- 19.5 Reasons Behind Cyber Crime -- 19.5.1 Making Money -- 19.5.2 Gaining Financial Growth and Reputation -- 19.5.3 Revenge -- 19.5.4 For Making Fun -- 19.5.5 To Recognize -- 19.5.6 Business Analysis and Decision Making -- 19.6 Various Types of Cyber Crime -- 19.6.1 Cyber Stalking -- 19.6.2 Sexual Harassment or Child Pornography -- 19.6.3 Forgery -- 19.6.4 Crime Related to Privacy of Software and Network Resources -- 19.6.5 Cyber Terrorism -- 19.6.6 Phishing, Vishing, and Smishing -- 19.6.7 Malfunction -- 19.6.8 Server Hacking -- 19.6.9 Spreading Virus -- 19.6.10 Spamming, Cross Site Scripting, and Web Jacking -- 19.7 Various Types of Cyber Attacks in Information Security -- 19.7.1 Web-Based Attacks in Information Security -- 19.7.2 System-Based Attacks in Information Security -- 19.8 Cybersecurity and Privacy Techniques -- 19.8.1 Authentication and Authorization -- 19.8.2 Cryptography -- 19.8.2.1 Symmetric Key Encryption -- 19.8.2.2 Asymmetric Key Encryption -- 19.8.3 Installation of Antivirus -- 19.8.4 Digital Signature -- 19.8.5 Firewall -- 19.8.6 Steganography -- 19.9 Essential Elements of Cybersecurity -- 19.10 Basic Security Concerns for Cybersecurity -- 19.10.1 Precaution -- 19.10.2 Maintenance -- 19.10.3 Reactions -- 19.11 Cybersecurity Layered Stack -- 19.12 Basic Security and Privacy Check List -- 19.13 Future Challenges of Cybersecurity -- References -- 20 Changing the Conventional Banking System through Blockchain 379 Khushboo Tripathi, Neha Bhateja and Ashish Dhillon -- 20.1 Introduction -- 20.1.1 Introduction to Blockchain -- 20.1.2 Classification of Blockchains -- 20.1.2.1 Public Blockchain -- 20.1.2.2 Private Blockchain -- 20.1.2.3 Hybrid Blockchain -- 20.1.2.4 Consortium Blockchain -- 20.1.3 Need for Blockchain Technology -- 20.1.3.1 Bitcoin vs. Mastercard Transactions: A Summary -- 20.1.4 Comparison of Blockchain and Cryptocurrency -- 20.1.4.1 Distributed Ledger Technology (DLT) -- 20.1.5 Types of Consensus Mechanism -- 20.1.5.1 Consensus Algorithm: A Quick Background -- 20.1.6 Proof of Work -- 20.1.7 Proof of Stake -- 20.1.7.1 Delegated Proof of Stake -- 20.1.7.2 Byzantine Fault Tolerance -- 20.2 Literature Survey -- 20.2.1 The History of Blockchain Technology -- 20.2.2 Early Years of Blockchain Technology: 1991-2008 -- 20.2.2.1 Evolution of Blockchain: Phase 1--Transactions -- 20.2.2.2 Evolution of Blockchain: Phase 2--Contracts -- 20.2.2.3 Evolution of Blockchain: Phase 3--Applications -- 20.2.3 Literature Review -- 20.2.4 Analysis -- 20.3 Methodology and Tools -- 20.3.1 Methodology -- 20.3.2 Flow Chart -- 20.3.3 Tools and Configuration -- 20.4 Experiment -- 20.4.1 Steps of Implementation -- 20.4.2 Screenshots of Experiment -- 20.5 Results -- 20.6 Conclusion -- 20.7 Future Scope -- 20.7.1 Blockchain as a Service (BaaS) is Gaining Adoption From Enterprises -- References -- 21 A Secured Online Voting System by Using Blockchain as the Medium 405 Leslie Mark, Vasaki Ponnusamy, Arya Wicaksana, Basilius Bias Christyono and Moeljono Widjaja -- 21.1 Blockchain-Based Online Voting System -- 21.1.1 Introduction -- 21.1.2 Structure of a Block in a Blockchain System -- 21.1.3 Function of Segments in a Block of the Blockchain -- 21.1.4 SHA-256 Hashing on the Blockchain -- 21.1.5 Interaction Involved in Blockchain-Based Online Voting System -- 21.1.6 Online Voting System Using Blockchain - Framework -- 21.2 Literature Review -- 21.2.1 Literature Review Outline -- 21.2.1.1 Online Voting System Based on Cryptographic and Stego-Cryptographic Model -- 21.2.1.2 Online Voting System Based on Visual Cryptography -- 21.2.1.3 Online Voting System Using Biometric Security and Steganography -- 21.2.1.4 Cloud-Based Secured Online Voting System Using Homomorphic Encryption -- 21.2.1.5 An Online Voting System Based on a Secured Blockchain -- 21.2.1.6 Online Voting System Using Fingerprint Biometric and Crypto-Watermarking Approach -- 21.2.1.7 Online Voting System Using Iris Recognition -- 21.2.1.8 Online Voting System Based on NID and SIM -- 21.2.1.9 Online Voting System Using Image Steganography and Visual Cryptography -- 21.2.1.10 Online Voting System Using Secret Sharing-Based Authentication -- 21.2.2 Comparing the Existing Online Voting System -- References -- 22 Artificial Intelligence and Cybersecurity: Current Trends and Future Prospects 431 Abhinav Juneja, Sapna Juneja, Vikram Bali, Vishal Jain and Hemant Upadhyay -- 22.1 Introduction -- 22.2 Literature Review -- 22.3 Different Variants of Cybersecurity in Action -- 22.4 Importance of Cybersecurity in Action -- 22.5 Methods for Establishing a Strategy for Cybersecurity -- 22.6 The Influence of Artificial Intelligence in the Domain of Cybersecurity -- 22.7 Where AI Is Actually Required to Deal With Cybersecurity -- 22.8 Challenges for Cybersecurity in Current State of Practice -- 22.9 Conclusion -- References -- Index.
    Additional Edition: Print version : ISBN 9781119761648
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1851093729
    Format: XIV, 273 Seiten , Illustrationen, Diagramme
    ISBN: 9783110994926
    Series Statement: Augmented and virtual reality volume 3
    Note: Literaturangaben
    Additional Edition: ISBN 9783110981445
    Additional Edition: ISBN 9783110981490
    Additional Edition: Erscheint auch als Online-Ausgabe Augmented and virtual reality in social learning Berlin : De Gruyter, 2024 ISBN 9783110981445
    Language: English
    Keywords: Erweiterte Realität ; Virtuelle Realität ; Soziales Lernen ; Blockchain
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almafu_9959836068202883
    Format: 1 online resource.
    ISBN: 9781119761846 , 1119761840
    Content: "Optimizing the traffic management operations is a big challenge due to massive global increase in vehicles numbers, traffic congestion and road accidents. This book describes the state-of-the-art of the recent developments of Internet of Things (IoT) and cloud computing-based concepts have been introduced to improve Vehicular Ad-Hoc Networks (VANET) with advanced cellular networks such as 5G networks and vehicular cloud concepts. 5G cellular networks provide consistent, faster and more reliable connections within the vehicular mobile nodes. By 2030, 5G networks will deliver the virtual reality content in VANET which will support vehicle navigation with real time communications capabilities, improving road safety and enhance passenger comfort"--
    Additional Edition: Print version: Cloud and IoT-based vehicular ad hoc networks. Hoboken, NJ, USA : Wiley-Scrivener, 2021 ISBN 9781119761839
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almafu_9959632686002883
    Format: 1 online resource
    ISBN: 9781119641391 , 111964139X , 9781119641384 , 1119641381 , 9781119641360 , 1119641365
    Content: "With the advancements of semantic web, ontology has become the crucial mechanism for representing concepts in varied domains. For research and dispersal of customized healthcare services, a major challenge is to efficiently retrieve and analyze individual patient data from a large volume of heterogeneous data over a long-time span. This demands effective ontology-based information retrieval approaches for clinical information systems. Further, Information Retrieval (IR) since its inception has matured into an established mechanism for facilitating fast and relevant information retrieval. However, mining relevant information from large amount of distributed data demands understanding the semantics of the desired information using ontology"--
    Note: Role of ontology in health care / Sonia Singla -- A study on basal ganglia circuit and its relation with movement disorders / Dinesh Bhatia -- Extraction of significant association rules using pre- and post-mining techniques : an analysis / M. Nandhini and S.N. Sivanandam -- Ontology in medicine as a database management system / Shobowale K.O. -- Using IoT and semantic web technologies for healthcare and medical sector / Nikita Malik and Sanjay Kumar Malik -- An ontological model, design, and implementation of CSPF for healthcare / Pooja Mohan -- Ontology-based query retrieval support for e-health implementation / Aatif Ahmad Khan and Sanjay Kumar Malik -- Ontology-based case retrieval in an e-mental health intelligent information system / Georgia Kaoura, Konstantinos Kovas and Basilis Boutsinas -- Ontology engineering applications in medical domain / Mariam Gawich and Marco Alfonse -- Ontologies on biomedical informatics / Marco Alfonse and Mariam Gawich -- Machine learning techniques best for large data prediction : a case study of breast cancer categorical data : k-nearest neighbors / Yagyanath Rimal -- Need of ontology-based systems in healthcare system / Tshepiso Larona Mokgetse -- Exploration of information retrieval approaches with focus on medical information retrieval / Mamata Rath and Jyotir Moy Chatterjee -- Ontology as a tool to enable health internet of things viable 5G communication networks / Nidhi Sharma and R. K. Aggarwal -- Tools and techniques for streaming data : an overview / K. Saranya, S. Chellammal and Pethuru Raj Chelliah -- An ontology-based IR for health care / J.P. Patra, Gurudatta Verma and Sumitra Samal.
    Additional Edition: Print version: Ontology-based information retrieval for healthcare systems Hoboken, NJ : Wiley-Scrivener, 2020. ISBN 9781119640486
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_BV047197979
    Format: 1 Online-resource (XVI, 408 Seiten).
    ISBN: 978-3-11-069127-6
    Series Statement: De Gruyter frontiers in computational intelligence Band 8
    Content: Agriculture is one of the most fundamental human activities. As the farming capacity has expanded, the usage of resources such as land, fertilizer, and water has grown exponentially, and environmental pressures from modern farming techniques have stressed natural landscapes. Still, by some estimates, worldwide food production needs to increase to keep up with global food demand. Machine Learning and the Internet of Things can play a promising role in the Agricultural industry, and help to increase food production while respecting the environment. This book explains how these technologies can be applied, offering many case studies developed in the research world
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-11-069122-1
    Language: English
    Keywords: Internet der Dinge ; Maschinelles Lernen ; Ackerbau ; Agrobusiness ; Pflanzenbau ; Präzisionslandwirtschaft
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages