Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    UID:
    almahu_9949767382902882
    Format: 1 online resource (249 pages)
    Edition: 1st ed.
    ISBN: 9783031548277
    Note: Intro -- Foreword by Florian Schütz -- Foreword by Jan Kleijssen -- Preface -- Acknowledgments -- Contents -- List of Contributors -- Reviewers -- Acronyms -- Part I Introduction -- 1 From Deep Neural Language Models to LLMs -- 1.1 What LLMs Are and What LLMs Are Not -- 1.2 Principles of LLMs -- 1.2.1 Deep Neural Language Models -- 1.2.2 Generative Deep Neural Language Models -- 1.2.3 Generating Text -- 1.2.4 Memorization vs Generalization -- 1.2.5 Effect of the Model and Training Dataset Size -- References -- 2 Adapting LLMs to Downstream Applications -- 2.1 Prompt Optimization -- 2.2 Pre-Prompting and Implicit Prompting -- 2.3 Model Coordination: Actor-Agents -- 2.4 Integration with Tools -- 2.5 Parameter-Efficient Fine-Tuning -- 2.6 Fine-Tuning -- 2.7 Further Pretraining -- 2.8 From-Scratch Re-Training -- 2.9 Domain-Specific Distillation -- References -- 3 Overview of Existing LLM Families -- 3.1 Introduction -- 3.2 Pre-Transformer LLMs -- 3.3 BERT and Friends -- 3.4 GPT Family Proper -- 3.5 Generative Autoregressors (GPT Alternatives) -- 3.6 Compute-Optimal Models -- 3.6.1 LLaMA Family -- 3.7 Full-Transformer/Sequence-to-Sequence Models -- 3.8 Multimodal and Mixture-of-Experts Models -- 3.8.1 Multimodal Visual LLMs -- 3.8.2 Pathways Language Model, PaLM -- 3.8.3 GPT-4 and BingChat -- References -- 4 Conversational Agents -- 4.1 Introduction -- 4.2 GPT Related Conversational Agents -- 4.3 Alternative Conversational Agent LLMs -- 4.3.1 Conversational Agents Without Auxiliary Capabilities -- 4.3.2 Conversational Agents With Auxiliary Capabilities -- 4.3.2.1 Models With Non-Knowledge Auxiliary Capabilities -- 4.4 Conclusion -- References -- 5 Fundamental Limitations of Generative LLMs -- 5.1 Introduction -- 5.2 Generative LLMs Cannot Be Factual -- 5.3 Generative LLMs With Auxiliary Tools Still Struggle To Be Factual. , 5.4 Generative LLMs Will Leak Private Information -- 5.5 Generative LLMs Have Trouble With Reasoning -- 5.6 Generative LLMs Forget Fast and Have a Short Attention Span -- 5.7 Generative LLMs Are Only Aware of What They Saw at Training -- 5.8 Generative LLMs Can Generate Highly Inappropriate Texts -- 5.9 Generative LLMs Learn and Perpetrate Societal Bias -- References -- 6 Tasks for LLMs and Their Evaluation -- 6.1 Introduction -- 6.2 Natural Language Tasks -- 6.2.1 Reading Comprehension -- 6.2.2 Question Answering -- 6.2.3 Common Sense Reasoning -- 6.2.4 Natural Language Generation -- 6.3 Conclusion -- References -- Part II LLMs in Cybersecurity -- 7 Private Information Leakage in LLMs -- 7.1 Introduction -- 7.2 Information Leakage -- 7.3 Extraction -- 7.4 Jailbreaking -- 7.5 Conclusions -- References -- 8 Phishing and Social Engineering in the Age of LLMs -- 8.1 LLMs in Phishing and Social Engineering -- 8.2 Case Study: Orchestrating Large-Scale Scam Campaigns -- 8.3 Case Study: Shā Zhū Pán Attacks -- References -- 9 Vulnerabilities Introduced by LLMs Through Code Suggestions -- 9.1 Introduction -- 9.2 Relationship Between LLMs and Code Security -- 9.2.1 Vulnerabilities and Risks Introduced by LLM-Generated Code -- 9.3 Mitigating Security Concerns With LLM-Generated Code -- 9.4 Conclusion and The Path Forward -- References -- 10 LLM Controls Execution Flow Hijacking -- 10.1 Faulting Controls: The Genesis of Execution Flow Hijacking -- 10.2 Unpacking Execution Flow: LLMs' Sensitivity to User-Provided Text -- 10.3 Examples of LLMs Execution Flow Attacks -- 10.4 Securing Uncertainty: Security Challenges in LLMs -- 10.5 Security by Design: Shielding Probabilistic Execution Flows -- References -- 11 LLM-Aided Social Media Influence Operations -- 11.1 Introduction -- 11.2 Salience of LLMs -- 11.3 Potential Impact -- 11.4 Mitigation -- References. , 12 Deep(er) Web Indexing with LLMs -- 12.1 Introduction -- 12.2 Innovation Through Integration of LLMs -- 12.3 Navigating Complexities: Challenges and Mitigation Strategies -- 12.3.1 Desired Behavior of LLM-Based Search Query Creation Tools -- 12.3.2 Engineering Challenges and Mitigations -- 12.3.2.1 Ethical and Security Concerns -- 12.3.2.2 Fidelity of Query Responses and Model Accuracy -- 12.3.2.3 Linguistic and Regulatory Variations -- 12.3.2.4 Handling Ambiguous Queries -- 12.4 Key Takeaways -- 12.5 Conclusion and Reflections -- References -- Part III Tracking and Forecasting Exposure -- 13 LLM Adoption Trends and Associated Risks -- 13.1 Introduction -- 13.2 In-Context Learning vs Fine-Tuning -- 13.3 Adoption Trends -- 13.3.1 LLM Agents -- 13.4 Potential Risks -- References -- 14 The Flow of Investments in the LLM Space -- 14.1 General Context: Investments in the Sectors of AI, ML, and Text Analytics -- 14.2 Discretionary Evidence -- 14.3 Future Work with Methods Already Applied to AI and ML -- References -- 15 Insurance Outlook for LLM-Induced Risk -- 15.1 General Context of Cyber Insurance -- 15.1.1 Cyber-Risk Insurance -- 15.1.2 Cybersecurity and Breaches Costs -- 15.2 Outlook for Estimating the Insurance Premia of LLMs Cyber Insurance -- References -- 16 Copyright-Related Risks in the Creation and Useof ML/AI Systems -- 16.1 Introduction -- 16.2 Concerns of Owners of Copyrighted Works -- 16.3 Concerns of Users Who Incorporate Content Generated by ML/AI Systems Into Their Creations -- 16.4 Mitigating the Risks -- References -- 17 Monitoring Emerging Trends in LLM Research -- 17.1 Introduction -- 17.2 Background -- 17.3 Data and Methods: Noun Extraction -- 17.4 Results -- 17.4.1 Domain Experts Validation and Interpretations -- 17.5 Discussion, Limitations and Further Research -- 17.6 Conclusion -- References -- Part IV Mitigation. , 18 Enhancing Security Awareness and Education for LLMs -- 18.1 Introduction -- 18.2 Security Landscape of LLMs -- 18.3 Foundations of LLM Security Education -- 18.4 The Role of Education in Sub-Areas of LLM Deployment and Development -- 18.5 Empowering Users Against Security Breaches and Risks -- 18.6 Advanced Security Training for LLM Users -- 18.7 Conclusion and the Path Forward -- References -- 19 Towards Privacy Preserving LLMs Training -- 19.1 Introduction -- 19.2 Dataset Pre-processing with Anonymization and De-duplication -- 19.3 Differential Privacy for Fine-Tuning Models -- 19.4 Differential Privacy for Deployed Models -- 19.5 Conclusions -- References -- 20 Adversarial Evasion on LLMs -- 20.1 Introduction -- 20.2 Evasion Attacks in Image Classification -- 20.3 Impact of Evasion Attacks on the Theory of Deep Learning -- 20.4 Evasion Attacks for Language Processing and Applicability to Large Language Models -- References -- 21 Robust and Private Federated Learning on LLMs -- 21.1 Introduction -- 21.1.1 Peculiar Challenges of LLMs -- 21.2 Robustness to Malicious Clients -- 21.3 Privacy Protection of Clients' Data -- 21.4 Synthesis of Robustness and Privacy -- 21.5 Concluding Remarks -- References -- 22 LLM Detectors -- 22.1 Introduction -- 22.2 LLMs' Salience -- 22.2.1 General Detectors -- 22.2.2 Specific Detectors -- 22.3 Potential Mitigation -- 22.3.1 Watermarking -- 22.3.2 DetectGPT -- 22.3.3 Retrieval Based -- 22.4 Mitigation -- References -- 23 On-Site Deployment of LLMs -- 23.1 Introduction -- 23.2 Open-Source Development -- 23.3 Technical Solution -- 23.3.1 Serving -- 23.3.2 Quantization -- 23.3.3 Energy Costs -- 23.4 Risk Assessment -- References -- 24 LLMs Red Teaming -- 24.1 History and Evolution of Red-Teaming Large Language Models -- 24.2 Making LLMs Misbehave -- 24.3 Attacks -- 24.3.1 Classes of Attacks on Large Language Models. , 24.3.1.1 Prompt-Level Attacks -- 24.3.1.2 Contextual Limitations: A Fundamental Weakness -- 24.3.1.3 Mechanisms of Distractor and Formatting Attacks -- 24.3.1.4 The Role of Social Engineering -- 24.3.1.5 Integration of Fuzzing and Automated Machine Learning Techniques for Scalability -- 24.4 Datasets -- 24.5 Defensive Mechanisms Against Manual and Automated Attacks on LLMs -- 24.6 The Future -- Appendix -- References -- 25 Standards for LLM Security -- 25.1 Introduction -- 25.2 The Cybersecurity Landscape -- 25.2.1 MITRE CVEs -- 25.2.2 CWE -- 25.2.3 MITRE ATT& -- CK and Cyber Kill Chain -- 25.3 Existing Standards -- 25.3.1 AI RMF Playbook -- 25.3.2 OWASP Top 10 for LLMs -- 25.3.3 AI Vulnerability Database -- 25.3.4 MITRE ATLAS -- 25.4 Looking Ahead -- References -- Part V Conclusion -- 26 Exploring the Dual Role of LLMs in Cybersecurity: Threats and Defenses -- 26.1 Introduction -- 26.2 LLM Vulnerabilities -- 26.2.1 Security Concerns -- 26.2.1.1 Data Leakage -- 26.2.1.2 Toxic Content -- 26.2.1.3 Disinformation -- 26.2.2 Attack Vectors -- 26.2.2.1 Backdoor Attacks -- 26.2.2.2 Prompt Injection Attacks -- 26.2.3 Testing LLMs -- 26.3 Code Creation Using LLMs -- 26.3.1 How Secure is LLM-Generated Code? -- 26.3.2 Generating Malware -- 26.4 Shielding with LLMs -- 26.5 Conclusion -- References -- 27 Towards Safe LLMs Integration -- 27.1 Introduction -- 27.2 The Attack Surface -- 27.3 Impact -- 27.4 Mitigation -- References.
    Additional Edition: Print version: Kucharavy, Andrei Large Language Models in Cybersecurity Cham : Springer International Publishing AG,c2024 ISBN 9783031548260
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949301349602882
    Format: 1 online resource (340 pages)
    ISBN: 9783319967523
    Series Statement: Yearbook of Corpus Linguistics and Pragmatics Ser.
    Note: Intro -- Acknowledgements -- Introduction -- Contents -- List of Figures -- List of Tables -- Chapter 1: The Linguistic Expression of Temporal Reference -- 1.1 Verbal Tenses in English and Romance Languages -- 1.1.1 The Simple Past -- 1.1.2 The Imperfect -- 1.1.3 The Compound Past -- 1.1.4 The Present -- 1.2 Temporal Cohesive Ties -- 1.2.1 Tense -- 1.2.2 Aktionsart -- 1.2.3 Aspect -- 1.3 Summary -- Chapter 2: Formal Semantic-Discursive and Pragmatic Assessments of Temporal Reference -- 2.1 The Formal Semantic-Discursive Account -- 2.2 The Gricean Account -- 2.3 The Relevance-Theoretic Account -- 2.3.1 Basic Relevance-Theoretic Tenets -- 2.3.2 The Conceptual/Procedural Distinction -- 2.3.3 Verbal Tenses as Procedural Expressions: Reichenbachian Coordinates -- 2.3.4 Verbal Tenses as Procedural Expressions: Temporal Relations -- 2.4 Summary -- Chapter 3: Corpus-Based Contrastive Study of Verbal Tenses -- 3.1 Dealing with Corpus Data -- 3.2 Bilingual Corpus: English-French -- 3.2.1 Monolingual Analysis -- 3.2.2 Cross-Linguistic Analysis -- 3.3 Bilingual Corpus: French-English -- 3.3.1 Monolingual Analysis -- 3.3.2 Cross-Linguistic Analysis -- 3.4 Multilingual Corpus -- 3.4.1 Data Collection -- 3.4.2 Analysis and Results -- 3.5 Summary -- Chapter 4: Experimental Study Using Annotation Experiments -- 4.1 Dealing with Annotation Data: Inter-annotator Agreement and the Қ Coefficient -- 4.2 Annotation Experiments with Tense and Its Description Using Reichenbachian Coordinates -- 4.2.1 Hypotheses and Predictions -- 4.2.2 French Verbal Tenses and Reichenbachian Coordinates -- 4.2.3 Passé Composé, Passé Simple, Imparfait and the [±Narrativity] Feature -- 4.2.4 The Imparfait and the [±Narrativity] Feature -- 4.2.5 Passato Prossimo, Passato Remoto, Imperfetto and the [±Narrativity] Feature. , 4.2.6 Perfectul Compus, Perfectul Simplu, Imperfectul and the [±Narrativity] Feature -- 4.2.7 The Simple Past and the [±Narrativity] Feature -- 4.3 Annotation Experiments with Aspect and Aktionsart -- 4.3.1 Hypotheses and Predictions -- 4.3.2 The Simple Past and the [±Boundedness] Feature -- 4.3.3 The Simple Past and the [±Perfectivity] Feature -- 4.4 A Generalized Mixed Model with Tense, Aspect and Aktionsart -- 4.5 Summary -- Chapter 5: A Pragmatic Model of Temporal Cohesive Ties -- 5.1 The Highly Discriminatory Model of Temporal Reference -- 5.2 Tense: A Mixed Conceptual-Procedural Temporal Category -- 5.2.1 The Notion of Context -- 5.2.2 Reichenbachian Coordinates: E and S -- 5.2.3 [±Narrativity] and Reichenbachian R -- 5.3 Aktionsart and Aspect -- 5.4 Revisiting Verbal Tenses According to the HD Model -- 5.4.1 Conceptual Information -- 5.4.2 Procedural Information -- 5.4.3 Aspect and Aktionsart -- 5.5 Summary -- Chapter 6: Temporal Coherence -- 6.1 Coherence Relations -- 6.2 The Cognitive Status of Temporal Relations -- 6.3 Experimental Study on Processing Implicit and Explicit Sequential Relations -- 6.3.1 "Ensuite" and "Puis" as Temporal Connectives -- 6.3.2 Hypotheses and Predictions -- 6.3.3 "Ensuite", the Passé Composé and Undetermined Temporal Relations: A Self-Paced Reading Experiment -- 6.3.4 "Ensuite", the Passé Composé, the Passé Simple and Sequential Temporal Relations -- 6.3.5 "Puis", the Passé Composé, the Passé Simple and Sequential Temporal Relations -- 6.3.6 "Ensuite" and "Puis"-Mixed Statistical Analysis -- 6.4 What Is "Cognitive Temporal Coherence"? -- 6.4.1 Temporal Cohesion Ties Are Cognitively Motivated -- 6.4.2 Coherent Mental Representations -- 6.5 Summary -- Chapter 7: Application to Natural Language Processing and Machine Translation -- 7.1 Temporal Cohesion Ties and Automatic Processing of Language. , 7.1.1 Natural Language Processing -- 7.1.2 Machine Translation -- 7.2 The Automatic Classification of [±narrativity] and [±boundedness] -- 7.2.1 Automatic Annotation Experiments -- 7.2.1.1 Annotation of the [±narrativity] Feature -- 7.2.1.2 Annotation of the [±boundedness] Feature -- 7.2.2 Machine Translation Experiments -- 7.2.2.1 MT Experiments with the [±narrativity] Feature -- 7.2.2.2 MT Experiments with the [±boundedness] Feature -- 7.3 Summary -- Conclusion -- Appendix: Description of the Corpora and Their Sources -- References -- Index.
    Additional Edition: Print version: Grisot, Cristina Cohesion, Coherence and Temporal Reference from an Experimental Corpus Pragmatics Perspective Cham : Springer International Publishing AG,c2018 ISBN 9783319967516
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Cham :Springer Nature Switzerland :
    UID:
    almafu_9961612416102883
    Format: 1 online resource (289 pages)
    Edition: 1st ed. 2024.
    ISBN: 9783031603136
    Series Statement: Progress in IS,
    Content: This book presents up-to-date descriptions of Smart Services Innovations in industry, supported by new scientific approaches. It summarizes the outcomes of the fifth Smart Services Summit, held in Zurich in October 2023, which primarily focused on the ability of Smart Service Systems to support resilience and build sustainability. As the evolution of Smart Services accelerates, new technologies can be leveraged to create new value propositions and business models that deliver tangible sustainability outcomes. This book addresses social, economic, and environmental aspects of sustainability in connection with new technologies and includes papers on how these technologies can help achieve resilience and sustainability. In this context, topics such as sustainability and resilience in supply chains, X-as-a-Service, large language models for service automation, and location-based systems are discussed. Given its scope, the book represents an indispensable guide for practitioners and advanced students alike.
    Note: Intro -- Foreword -- Preface -- About the Summit -- Contents -- Editors and Contributors -- Smart Services and Resilience -- Using Synthetic Data for Improving Robustness and Resilience in ML-Based Smart Services -- 1 Introduction -- 2 Synthetic Data -- 3 An Architecture for Robustness in Smart Services -- 4 Experiments -- 5 Conclusion -- References -- Sustainable Smart Services for Financial Institutions: Evaluation of ESG Service Creation Framework Applicability for Practitioners -- 1 Introduction -- 2 ESG Service Creation Framework -- 3 Methodology -- 4 Results of the Interviews -- 5 Insights and Reflections -- 6 Demonstration: ESG Readiness Assessment for SMEs -- 7 Conclusion and Outlook -- References -- Quantitative Models for Sustainable Smart Services in the Building Industry -- 1 Introduction -- 2 Methodology -- 3 Literature -- 3.1 Potential of Smart Services -- 3.2 Smart Building -- 3.3 B2B Platforms -- 3.4 Quantification of Economic and Environmental Value -- 4 Results -- 4.1 User Analysis -- 4.2 Quantitative Assessment of the Economic and Environmental Service Value Creation -- 4.3 Calculation Example -- 4.4 Environmental Dimension -- 5 Discussion -- 6 Conclusion, Limitations and Future Research -- References -- Interrelation Between Resilience and Sustainability in Smart Service Systems -- 1 Introduction -- 2 Literature Review -- 2.1 Measuring Sustainability in Manufacturing Systems -- 2.2 Measuring Resilience in Manufacturing Systems -- 2.3 Relationship Between Resilience and Sustainability -- 2.4 Case Studies of Smart Services -- 3 Research Design -- 3.1 Research Methods -- 4 Discussions -- 4.1 Assessment of Case Study Companies Based on Sustainability Aspects and Resilience Factors -- 4.2 Analysis and Recommendations of the Case Study Companies -- 4.3 Relationship Between Sustainability and Resilience. , 5 Conclusion, Limitations and Scope for Future Research -- 5.1 Conclusion -- 5.2 Limitations -- 5.3 Scope for Future Research -- References -- Building Supply Chain Resilience Using Artificial Intelligence in Risk Management Systems -- 1 Introduction -- 2 Literature Review -- 2.1 Risk Definition -- 2.2 Supply Chain Risk Management (SCRM) -- 2.3 Bow Tie Risk Framework -- 2.4 Introduction to Artificial Intelligence in SCRM -- 3 Research Methodology -- 4 Results -- 4.1 Gaps in Bow-Tie Risk Framework -- 4.2 Need for Artificial Intelligence Based on Risk Type -- 4.3 Relevance of AI in the Risk Management Systems -- 5 Discussions -- 5.1 Building Risk Management System Using Enhanced Bow-Tie Risk Framework -- 5.2 Guidance to Businesses -- 6 Conclusions, Limitations, and Future Research -- 6.1 Conclusions -- 6.2 Limitations -- 6.3 Future Research -- References -- Discovering Dynamic Resiliency in Organizations -- 1 Introduction and Motivation -- 2 State of Art and Next Steps -- 2.1 Resiliency in Organizations as a Multi-disciplinary Concept -- 2.2 Nudges from Contingency Theories for a 'System View' -- 3 Re-interpreting Resilience: A Personal and Contextual View of 'Resiliency' -- 3.1 The Contribute of Systems Thinking -- 4 Resiliency in Organizations -- 4.1 Is It De Facto Dynamic?! -- 4.2 The Role of Structural Pre-conditions and Systems Determinants -- 5 Findings, Implications and First Conclusions -- References -- Resilient and Value Creating Wine Ecosystem: An NFT-Driven Agricultural Digital Twin Case Study with #NFGrapevine -- 1 Introduction -- 1.1 Research Questions -- 2 Background -- 2.1 Web3 -- 2.2 Internet of Things -- 2.3 Digital Twin -- 3 Methodology -- 3.1 Analysis of Current State -- 4 Results -- 4.1 The #NFG Ecosystem -- 4.2 Data to Value Stream -- 4.3 Recommended Actions -- 5 Discussion -- 6 Conclusion, Limitations, and Future Research. , 6.1 Academic Implications -- 6.2 Managerial Considerations -- References -- Contribution Model Ecosystem for Resiliency and Sustainability -- 1 Introduction -- 2 Literature Review -- 2.1 Contribution Model Framework and Ecosystem -- 2.2 Contribution Model Ecosystem -- 3 Methodology -- 4 Results -- 4.1 Case Study 1: Sustainable Building Practices -- 4.2 Case Study 2: Sustainable Food Supply Chain -- 4.3 Case Study 3: Long-Life Electrical Assets -- 4.4 Case Study 4: Sustainable Urban Mobility -- 5 Discussion -- 5.1 Contribution Model to Support Sustainability -- 5.2 Managerial Implications -- 5.3 Theoretical Implications -- 6 Conclusions, Limitations, and Future Research -- References -- Innovative Business Models and Systems -- Towards a Taxonomy of Large Language Model Based Business Model Transformations -- 1 Introduction -- 2 Theoretical Background -- 2.1 Business Model Transformation -- 2.2 The Economic Value of Large Language Models -- 3 Research Methodology -- 4 Results -- 4.1 New Customer Benefits -- 4.2 New Sales and Communication Channels -- 4.3 Increased Business Process Automation -- 4.4 Improved Use of Information Resource -- 4.5 Business Model Viability -- 5 Discussion -- 5.1 Contribution to Theory -- 5.2 Contribution to Practice -- 6 Conclusion -- References -- Four Scenarios for Future of Outcome-Based Contracts -- 1 Introduction -- 2 Uncertainty in OBC Futures -- 3 Methodology -- 4 Four Scenarios for Future of OBCs -- 5 Discussion -- 6 Conclusions, Limitations, and Future Research -- Appendix 1: Participants of the Disaggregate Delphi -- Appendix 2: Futures Table for Industrial Equipment OBCs in 2033 -- References -- The Role of Strategic and Learning Orientation in Creating Competitive Advantage Through Digital Service Innovation -- 1 Introduction -- 2 Theoretical Background. , 2.1 Strategic and Learning Orientation to Drive Innovation Capabilities -- 2.2 Digital Service Innovation to Drive Manufacturer Performance -- 3 Conceptual Framework Development and Results -- 3.1 Cultural Antecedents of Digital Service Innovation -- 3.2 Consequences of Digital Service Innovation -- 4 Contributions and Research Opportunities -- 4.1 Theoretical Contributions -- 4.2 Managerial Contributions -- 4.3 Research Opportunities -- References -- Reflections for Innovation Management from the Design of a Service Platform Offer in Rail Freight -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 4.1 Initial Innovation Process -- 4.2 Actual Innovation Process -- 5 Discussion -- 5.1 Key Lessons from the Case -- 5.2 Development Process -- 5.3 Managerial Relevance -- 5.4 Academic Implications -- 6 Conclusions and Future Research -- References -- Monetization Roadmap for Digital Services in Product-Service Systems: Insights and Challenges from a Case Study -- 1 Introduction -- 2 Literature Review -- 2.1 Advanced Services in PSS -- 2.2 Revenue Models in PSS -- 3 Methodology -- 4 Results and Discussion -- 4.1 Service Scoping -- 4.2 Testing -- 4.3 Service and Product Distinction -- 4.4 Individuality in the Service Offers -- 4.5 Monetization Roadmap -- 4.6 Academic Implications -- 5 Conclusion -- References -- Digital Twins and System Integration -- How Teams Use Tangible Prototypes to Move from Future Speculation to Decisions When Developing Resilient Product-Service Systems -- 1 Introduction -- 2 Theoretical Background -- 3 Research Methodology -- 4 Results -- 4.1 Rapid Embodiment of Complex Scenarios -- 4.2 Bounding Complexity into Simple Objects -- 4.3 Rapid Iteration and Concept Exchange -- 4.4 Defining Boundaries of Opportunity and Invention Space -- 5 Discussion and Implications -- 6 Conclusions -- References. , Moving Towards Smart Visualization for Smart City Services: A Systematic Literature Review in Earthquake Engineering -- 1 Introduction -- 1.1 Motivation -- 1.2 Approach -- 2 Research Methodology -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- The Smart Factory as an Operational Asset-Use of Visual Twins to Improve Factory Operational Performance -- 1 Introduction -- 2 Literature Review -- 2.1 Operational Improvement -- 2.2 The Digital Twin -- 2.3 Augmented Reality and Gamification for Better Decision-Making -- 3 Methodology -- 4 Results -- 4.1 Inventory Reduction in Engineered-To-Order Production -- 4.2 Factory Footprint Optimization for Manufacture-To-Order Production -- 5 Discussion -- 5.1 Academic Implications -- 5.2 Managerial Implications -- 6 Conclusion -- References -- Enhancing Energy Flexibility via Product-Service Systems: An Analysis of Dishwasher Usage with Renewable Integration at HSB Living Lab+ -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Overall Methodology -- 3.2 HSB Living Lab+ Case Study -- 3.3 Three Scenarios of PSS -- 3.4 PSS Sustainability Multi Criteria Assessment -- 4 Results -- 4.1 Scenario 1: Product as Usual (PAU) -- 4.2 Scenario 2: PSS 1-Product with Screen-Based Interface -- 4.3 Scenario 3: PSS 2-Product with QR Code-Based Web Interface -- 4.4 PSS Sustainability Assessment -- 5 Discussion -- 6 Conclusion -- References -- Leveraging User-Centricity for OEMs Through Product, Software, and Service Development -- 1 Introduction -- 2 Services in the Realm of OEMs of Complex Hardware -- 3 Relevant Questions for Product and Software Development from a Digital Servitization Perspective -- 4 Interdependencies Between Product, Service, and Software -- 5 Service Design in Digital Servitization -- 6 Conclusion -- References -- Extended Abstracts and Posters. , Automatic Transcription of the Basic MTM-2 Motions in Virtual Reality.
    Additional Edition: Print version: West, Shaun Smart Services Summit Cham : Springer,c2024 ISBN 9783031603129
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949850812002882
    Format: XXXII, 701 p. 127 illus., 102 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9783031538773
    Series Statement: CSR, Sustainability, Ethics & Governance,
    Content: This book brings together research that advances our ‎understanding of the fundamental relationship between board diversity and different ‎aspects of corporate governance, including corporate governance disclosures, board ‎performance, governance characteristics, and ownership structure. ‎The expertly selected chapters deal with related (but not limited) to the following topics: ‎Corporate governance models and diversity; forms of diversity and decisions in the boardroom; Board diversity, corporate disclosure, and intellectual capital disclosures; shareholder activism; differences between private and family firms; Board diversity laws; gender and ethnicity on boards, and going beyond gender aspects of diversity. This book is particularly useful for researchers and practitioner think tanks to understand the state of the art in board diversity research.
    Note: Effect of Reporting and Governance on Performance, with Online Digital Media as Moderating among Malaysian Waqf Institutions: A Pilot Study -- Young Talent Development Challenges: The Characteristics Of Indonesian Generation Z In Determining Their Job -- Workcation in Smart Tourism: Measuring Impact on Employees Well-being, Performance, and Engagement for Business Competitiveness -- The Level of Digital Competence and its Relationship to the Quality of E-learning among Faculty Members in Jordanian Universities -- Client's Intention and Their Willingness To Participate At The Rehabilitation Centre: Focusing On Malaysian Women's Perspective -- Rebuilding Malaysia's tourism industry Global effects of the Covid 19 pandemic and its resurgence strategies -- Impact of COVID-19 on Agile Software Development -- Professional Character Development in Islamic Military Leadership: Developing a Theoretical Framework -- A Self-Efficacy Sign Language Web Prototype: MUTAPP -- The Relationship Between MarketPenetration and Performance of Selected Small and Medium Enterprise -- Innovative Solution For Kids With Diabetes: Augmented Reality Mobile Application For Insulin Intake -- Should Torture be Justified in an Extreme Circumstances to Prevent Terrorism? -- Correlational Analyses of Mathematics Anxiety and Mathematics Performance -- Unraveling Social Medias Issues on Public Opinion and Activism: A Thematic Review -- Recycling Awareness Through Mobile Application: Selecting The Categories Of Recyclable Materials For Environmental Well Being -- From Grades to the Workplace: Unveiling the Link between Academic Performance and Internship Success -- The Impact of Colour Vision Defects on Travel Destination Selection -- The Effect of Green Marketing Mix on Customer Psychological Attitudes and Purchase Intention Within the Beauty Industry in Mauritius -- Factors Affecting Graduates Employability Skills: Quantitative Study on Employees in Brunei -- Exploring Gender and Race Discrimination in Recruitment for Extractive Industries in Mozambique -- Factors Influencing the Adoption E-Services in Oman Higher Education Sector -- Advancements in Technology for Pharmaceutical Packaging: A Review of Technology, Contributions and Applied Areas -- The Effect of Supply Chain Innovation on Corporate Sustainability and Performance -- The Impact of Guerilla Marketing Strategies on Business Performance and Sustainable Competitive Advantage of SMEs in Pakistan -- Strategic Improvement Model on Document Management Process for a Non-Digital Hospital -- Automated Irrigation System for Paddy Field -- Graduate Employability in Malaysia: The Influencing Factors for Malaysian Tertiary Students -- Enhancing Pandemic Safety with MobileNetV2: Real-time Facemask Detection -- Factors Influencing Online Banking Satisfaction In Malaysia -- Developing a Structural Model for Lifelong Music Learning Intention among Chinese University Students -- A Structured Literature Review on the Modelling Educational Video for Student Learning in Higher Education Institution -- The Had Kifayah Model for Asnaf Students at UiTM Kelantan Branch -- Mapping the Landscape: A Bibliometric Review Of Food Security Research In Malaysia -- Capital Structure Determinants of Bursa Malaysia PN17 Firms -- Preparing Practical Learning Through the Development of Education for Sustainable Development, ESD EDU Simulator -- The Alarming Shift from Earnings Management to Fraudulent Reporting -- Beyond Aesthetics: Reviews on Industrial Design Students' Creative Process Upon Developing Cultural-Oriented Products -- The effect of population growth and production on shallot prices in East Java Province in 2014-2022 -- The Concept of Islamic Spiritualism in Dealing With Plague and Infectious Disease Outbreaks -- Key Determinants of Slow Fashion (Batik) Apparel Purchase Intention among Malaysian Consumers: A Conceptual Paper -- Moolang Virtual Classroom: A Comparative of Students' Learning Preferences and Gender on Learning Outcomes -- Implementation of the Financial Technology Industry on MSMEs in Malang, Indonesia; A Phenomenological Analysis using Critical Thinking Model -- Transformation of Accounting Information Systems in the Management of BUMDesa Financial Performance in the Digitalization Era -- A Serious Game for Jawi Alphabets Literacy Based on Gamification Elements -- Deep Learning Model using Long Short- Term Memory (LSTM) for Time-series Forecasting of Traffic Volume in Malaysia -- Integrating Technology into Interior Design Education: A Paradigm Shift in Teaching and Learning -- Dissemination of Teaching Excellence in the Quality Process of Accreditation in Higher Education -- Will Metaverse Bridge the Gap between Authentic Education and Virtual Education? -- The role of administrative control in upgrading the localities -- The Reality of the Quality of Education in Postgraduate Programs at Palestine Technical University - Kadoorie from Students' Point of View -- Dewey's and Freire's ideas about dialogue and communication and their implications for student engagement in applied learning -- The effect of Strategic Management Accounting Techniques (SMAT) as an accounting technology on improving Business performance : A Review from Contigency and Resource Based View Approach -- Global Smuggling Research Trends: A Bibliometric Analysis of an Untold Story -- The Indicators of Happiness Among Academicians: A Systematic Literature Review (SLR) Analysis -- The Analysis Of Sustainability Development Among Msmes: Normative Pillar And Cultural-Cognitive Pillar -- The Impact of Presenteeism on Employee Productivity: A literature review.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031538766
    Additional Edition: Printed edition: ISBN 9783031538780
    Additional Edition: Printed edition: ISBN 9783031538797
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949602162902882
    Format: 1 online resource (167 pages)
    Edition: 1st ed.
    ISBN: 9783030342586
    Series Statement: Springer Texts in Education Series
    Note: Intro -- Acknowledgements -- Introduction -- Reference -- Contents -- 1 Background and Earlier Research -- Abstract -- References -- 2 Contemporary Perspectives on Teaching -- Abstract -- 2.1 The Need to Adapt Teaching to Student Characteristics -- 2.2 Didactic Design -- References -- Bibliographic Recommendations -- 3 Basic Concepts in Information Literacy -- Abstract -- 3.1 Information Literacy Concept -- 3.2 Equivalence of the Concept in Various Languages -- 3.3 Objectives of Information Literacy -- 3.4 International Concerns on Information Literacy -- 3.5 Competencies in Information Literacy -- 3.6 Standards of Information Literacy -- 3.6.1 Structure of Standards -- 3.6.2 International Standards of Information Literacy -- 3.7 Models of Information Literacy -- 3.7.1 SCONUL Model -- 3.7.2 CILIP Information Literacy Model -- 3.7.3 Seven Faces of Information Literacy in Higher Education -- References -- Webography -- Bibliographic Recommendations: Definitions and Models-Information Literacy Website -- 4 Accessing Information -- Abstract -- 4.1 Defining the Need of Information -- 4.1.1 Expressing and Defining the Need of Information -- 4.2 Research Question -- 4.3 Research Strategies -- 4.4 Keywords -- 4.5 Using a Thesaurus -- 4.6 Boolean Logic Operators -- 4.7 Search of Phrases -- 4.8 Truncation -- Webography -- Bibliographic Recommendations -- How Do I Search for Information? -- Finding Information for Your Research Paper -- 5 Locating and Retrieving Information -- Abstract -- 5.1 Traditional Information Sources-Libraries -- 5.2 Cataloguing -- 5.2.1 Bibliographic Description -- 5.2.2 Descriptive Features -- 5.2.3 Classification -- 5.2.4 Indexing -- 5.2.5 Thesaurus -- References -- Webography -- Bibliographic Recommendations -- 6 Information Search Strategies -- Abstract -- 6.1 Traditional Library Catalogues. , 6.1.1 Search Information on Internet -- 6.1.2 MetaSearch Tools -- Webography -- Bibliographic Recommendations -- 7 Information Evaluation -- Abstract -- 7.1 Evaluation of Scientific Series Publications (Journals) -- 7.2 Peer Review Process -- 7.3 Bibliometric Databases -- 7.4 Clarivate Analitycs-WoS -- 7.4.1 Impact Factor -- 7.4.2 LibGuides: Journal Impact Factors: Home -- 7.4.3 H-index, HIRSH Index -- 7.5 Conclusion -- 7.6 Web Resources Evaluation -- Webography -- 8 Information Management -- Abstract -- 8.1 Using Information in the Research Process -- 8.1.1 Role of Citation Process -- 8.1.2 Principles of Describing Information Sources -- 8.1.3 Citation Methods -- 8.1.3.1 Numerical Citation Method (Vancouver Style) -- 8.1.3.2 Citation of the First Element and Publishing Date Method (Havard Style) -- 8.2 Citation Styles -- 8.2.1 "Author-Date" System (Harvard System) -- 8.2.2 "Author-Title"/"Author-Page" Style -- 8.2.3 Sequential Number System or "Author-Number" (Vancouver System) -- 8.2.4 References in a Notes System -- 8.2.5 Citation "Anatomy" -- 8.2.5.1 Printed Information Sources -- 8.2.5.2 Electronic Information Sources -- 8.2.5.3 Other Information Sources -- 8.2.5.4 Unpublished Information Sources -- 8.3 Using Microsoft Office Word-References -- 8.3.1 Steps for Automatic Bibliography Generation -- 8.4 Other Publications Identification Elements: International Codes for Publications -- 8.4.1 International Standard Book Number -- 8.4.2 International Standard Serial Number -- 8.4.3 International Standard Music Number -- 8.4.4 Digital Object Identifier -- References -- Bibliographic Recommendations -- 9 Information Communication -- Abstract -- 9.1 Ethical Use of Information -- 9.1.1 Plagiarism -- 9.1.2 Citation -- 9.1.3 Plagiarism Detection -- 9.1.3.1 Plagiarism Detection for Text Documents -- 9.1.3.2 Operation of Plagiarism Detection Systems. , 9.2 Intellectual Property. Copyright. Legislation -- 9.3 Information Communication -- 9.3.1 Creating and Presenting Academic Works -- 9.3.2 Presentation of Scientific Results -- 9.3.2.1 Form of Scientific Communication -- 9.3.2.2 Information Presentation -- References -- Webography -- Bibliographical Recommendations -- 10 Teaching Learning Methods -- Abstract -- 10.1 Teaching Strategies -- 10.2 Methods and Training Procedures -- 10.2.1 The Relationship Between the Method and Procedure -- 10.3 Classifications of Teaching-Learning Methods -- 10.4 Descriptions of the Methods Used in the Examples in Previous Chapters -- Bibliographic Recommendations -- Webography for the Whole Book.
    Additional Edition: Print version: Landøy, Ane Collaboration in Designing a Pedagogical Approach in Information Literacy Cham : Springer International Publishing AG,c2019 ISBN 9783030342579
    Language: English
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949685719502882
    Format: XXI, 485 p. 141 illus., 107 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9789819998364
    Series Statement: Frontiers of Artificial Intelligence, Ethics and Multidisciplinary Applications,
    Content: This groundbreaking proceedings volume explores the integration of Artificial Intelligence (AI) across key domains-healthcare, finance, education, robotics, industrial and other engineering applications -unveiling its transformative potential and practical implications. With a multidisciplinary lens, it transcends technical aspects, fostering a comprehensive understanding while bridging theory and practice. Approaching the subject matter with depth, the book combines theoretical foundations with real-world case studies, empowering researchers, professionals, and enthusiasts with the knowledge and tools to effectively harness AI. Encompassing diverse AI topics-machine learning, natural language processing, computer vision, data analytics and supervisory control - the volume showcases state-of-the-art techniques propelling AI advancements. Structured into four parts: Part 1: Artificial Intelligence (AI), explores evolving deep neural networks, reinforcement learning, and explainable AI, providing a deep dive into the technical foundations of AI advancements. Part 2: Robotics and Control Systems, delves into the integration of AI in robotics and automatic control, addressing supervisory control, automated robotic movement coordination, anomaly detection, dynamic programming, and fault tolerance, offering insights into the evolving landscape of intelligent automation. Part 3: AI and Society, examines the societal impact of AI through chapters on ethical considerations, economic growth, environmental engagements, and hazard management, providing a holistic perspective on AI's role in shaping society. Part 4: PhD Symposium, presents the future of AI through cutting-edge research, covering legal and ethical dimensions, privacy considerations, and computationally efficient solutions, offering a glimpse into the next generation of AI advancements. Catering to a diverse audience-from industry leaders to students-the volume consolidates the expertise of renowned professionals, serving as a comprehensive resource for navigating the ever-evolving AI landscape. An essential reference for those staying at the forefront of AI developments. .
    Note: Advances in AI - NLP, Vision, Voice, and Self-taught AI Systems -- Soft Computing and Evolutionary Computing -- Neuro Evolutionary Techniques -- Innovations in AI methods, techniques, and algorithms -- Explainable AI -- AI and Robotics -- AI and Automatic Control -- AI and Cloud -- AI and IoT -- Intelligent Engineering Systems, Expert Systems -- Knowledge-Based Systems.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789819998357
    Additional Edition: Printed edition: ISBN 9789819998371
    Additional Edition: Printed edition: ISBN 9789819998388
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almafu_BV005072558
    Format: 848 S.
    Note: Literaurverz. S. 847 - 848
    Later: 2. Aufl. u.d.T. Clason, Willem Elbertus Elsevier's dictionary of computers, automatic control, and data processing
    Language: German
    Subjects: Economics
    RVK:
    Keywords: Automation ; Englisch ; Französisch ; Spanisch ; Italienisch ; Niederländisch ; Mehrsprachiges Wörterbuch ; Wörterbuch ; Mehrsprachiges Wörterbuch ; Wörterbuch ; Mehrsprachiges Wörterbuch ; Wörterbuch
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almafu_9961637412102883
    Format: 1 online resource (509 pages)
    Edition: 1st ed. 2024.
    ISBN: 9789819738106
    Series Statement: Lecture Notes in Networks and Systems, 1006
    Content: This book presents high-quality, peer-reviewed papers from 3rd International Conference on “Universal Threats in Expert Applications and Solutions" (UNI-TEAS 2024), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during January 6–9, 2024. The book is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences.
    Note: Intro -- Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- An Advanced Algorithm and Utility for Identifying Critical Web Vulnerabilities with Exceptional Performance -- 1 Introduction -- 1.1 Automated Testing Mechanisms -- 1.2 Use of Machine Learning Techniques -- 1.3 Techniques for Reducing Input Data Space -- 1.4 Scanning Tool Development -- 2 Considered Website Vulnerability -- 2.1 SQL Injection -- 2.2 Cross-Site Scripting -- 3 Related Study -- 4 Proposed and Improved Algorithms -- 5 Algorithm for Detecting XSS -- 6 Enhancing Vulnerability Detection through the Application of Machine Learning -- 7 Scanning Tool -- 8 Systematic Flow of GKD Website Scanner -- 9 Conclusion -- References -- Potential Impacts of Online-Based Learning 2.0 and Certification on Employability -- 1 Introduction -- 1.1 Background -- 1.2 Statement of the Problem -- 1.3 Study Rationale -- 1.4 Purpose of This Work -- 1.5 Limitations and Scope of the Work -- 1.6 Research Hypothesis -- 2 Research Methodology -- 2.1 The Sample Size of the Work -- 2.2 Data Collection -- 3 Data Analysis, Results, and Discussions -- 3.1 Average Age -- 3.2 Education Background -- 3.3 Employment -- 3.4 Online Certification -- 3.5 Online-Based Certification Availability -- 3.6 Online-Based Certification Acceptance -- 3.7 Online Certification Improves Skill Development -- 3.8 Online-Based Certification Increases Employability -- 3.9 Online Learning Fosters the Development of Reflective and Critical Thinking -- 3.10 Online Education is Useful for a Wide Range of Professions in Many Industries -- 3.11 Online-Based Learning Provides Knowledge as Required -- 3.12 Online Learning is Advantageous for Career Development and Ongoing Education -- 4 Conclusion -- References. , An Intelligent Self-Driving Car's Design and Development, Including Lane Detection Using ROS and Machine Vision Algorithms -- 1 Existing Work -- 2 Proposed System -- 2.1 Mechanical -- 2.2 Electrical -- 2.3 Algorithm and Machine Vision -- 3 Implementation -- 3.1 Canny Edge Detection -- 3.2 Region of Interest -- 3.3 Hough Transform -- 3.4 Average Slope Intercept -- 3.5 Curvature Calculation -- 3.6 Sliding Window Approach -- 4 Results and Discussion -- 5 Conclusion -- References -- Text Summarization for Kannada Text Documents: A Review -- 1 Introduction -- 2 Review of Literature -- 3 Datasets -- 3.1 Kannada Treebank -- 3.2 Kannada-MNIST: A New Handwritten Digit Dataset for the Kannada Language -- 3.3 Samanantar: Parallel Corpora Collection for 11 Indic Languages -- 3.4 MLe2e -- 3.5 IndicCorp -- 4 Evaluation Measures -- 5 Conclusion and Future Works -- References -- Solar Panel Tracking with Battery-Assisted and Battery Charging Modes -- 1 Introduction -- 2 Literature Review -- 3 Methods and Materials -- 3.1 Implementation Using MATLAB -- 3.2 Charging Mode -- 3.3 Discharging Mode -- 4 Results and Discussion -- 4.1 Hardware Implementation -- 5 Conclusion -- References -- Elevator-Based Earth Tremor Sentinel Technique with MQTT Protocol -- 1 Introduction -- 2 Related Work -- 2.1 Perseverance of Artificial Neural Networks (ANN) in Elevators -- 2.2 Purpose of Accelerometer in Elevators -- 2.3 Precedence of MQTT -- 3 Methodology -- 3.1 The Layout of the Proposed Model -- 3.2 Machine Learning Models for Earthquake Detection -- 3.3 Programming an AI Neural Network -- 4 Discussion -- 5 Conclusion -- References -- An Efficient System Model for Identification of Drug Addiction -- 1 Introduction -- 2 Related Work -- 3 Prpopsed Methodology -- 3.1 Attribute Selection -- 3.2 ID3 Algorithm -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References. , Design and Analysis of a Multipath Routing Protocol to Enhance QoS in MANET -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Proposed Algorithm -- 4 Results Analysis -- 4.1 Simulation Parameters -- 4.2 Packet Sents -- 4.3 Packet Receives -- 4.4 Percentage of Data Receives (PDR) -- 4.5 Normal Routing Load (NRL) -- 5 Conclusion -- References -- Tagging of Uterine Cervix Cases at Cell and Slide Level Through Transfer Learning -- 1 Introduction -- 1.1 Deep Neural Network -- 1.2 Transfer Learning -- 1.3 ResNet50 -- 1.4 Cervical Cancer -- 2 Literature Review -- 3 Material and Method -- 3.1 Data -- 3.2 Methodology -- 4 Result and Analysis -- References -- Estimation of Medical Expenses Using Machine Learning -- 1 Introduction -- 2 Methodology Applied -- 2.1 Dataset -- 2.2 Feature Engineering -- 2.3 Feature Importance Analysis -- 3 Used Models and Algorithms -- 4 Experiment Results -- 5 Conclusion -- Challenges in Making OCR of Gujarati Newspaper -- 1 Introduction -- 2 Review of Literature -- 2.1 Review on Segmentation -- 2.2 Review on Recognition Text -- 3 Problem in Gujrati Language Newspaper -- 3.1 Scanner Image Quality -- 3.2 Background Noise -- 3.3 Font and Style Variation -- 3.4 Text Size Variation -- 3.5 Complex Ligatures in the Script -- 3.6 Limited Trained Data -- 4 Observation -- 5 Conclusion -- References -- A Hybrid Methodology for Software Development and IT Team Analysis in Manufacturing -- 1 Introduction -- 2 Methods -- 2.1 A Comparison of Project Durations Before and After Model Release -- 2.2 Before and After the Model's Release on DRE -- 2.3 A Comparison of the Costs of Development and Maintenance -- 2.4 Criticality-Based Development to Maintenance Ratio of a Project -- 2.5 A Maintenance Ratio Determined by the Number of Lines of Code -- 3 Conclusion -- References. , AI Enabled Convolutional Neural Networks to Detect Brain Tumors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Methodology -- 4.1 Image Database -- 4.2 Data Augmentation with Pre-Processing -- 4.3 Data Split -- 5 Results -- 6 Analysis -- 7 Conclusion -- References -- Increasing Productivity in Software Development Through the Use of Docker Technology -- 1 Introduction of Dockers -- 1.1 Docker -- 1.2 Docker File -- 1.3 Docker Image -- 2 Experiment -- 2.1 Docker Java Image File -- 2.2 Python-Enabled Docker Image File -- 2.3 Comparative Results -- 3 Conclusion -- 4 Future Scope -- References -- Multimodal Fusion-Based Hybrid CRNN Model for Emotion Prediction in Music -- 1 Introduction -- 1.1 Key Contribution -- 2 Article Organization -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Pre-Processing -- 4.3 Feature Extraction -- 5 Proposed Model -- 5.1 Multimodel Fusion -- 6 Result and Discussion -- 6.1 Experimental Setup for the Proposed System -- 6.2 Implementation Details -- 7 Conclusion -- References -- Multimodal Analysis of Induction Motor Signals for Power Quality Abnormality Detection Using Wavelet-RBF Approach -- 1 Introduction -- 2 Research Contribution -- 3 Proposed Methodology -- 3.1 Wavelet Transform -- 3.2 RBF Neural Networks -- 4 Result Analysis and Discussion -- 4.1 Vibration Analysis Using Sensor and Current Transformer -- 5 Conclusion -- References -- Smart Electronic Speaking Glove for Physically Challenged Person -- 1 Introduction -- 1.1 Research Contribution -- 2 Proposed Methodology -- 3 Implementation and Execution -- 3.1 Hardware Description -- 3.2 Implemented in Proteus Simulation -- 4 Result and Discussion -- 5 Conclusion -- References -- COVID-19 Detection Using Fourier-Bessel Series Expansion-Based Dyadic Decomposition and Custom CNN -- 1 Introduction -- 1.1 Author Contribution. , 2 Article Organisation -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Image Preprocessing -- 4.3 FBD Methodology -- 5 Proposed Model -- 5.1 SMOTETomek -- 5.2 Keras Tunner -- 6 Result and Discussion -- 6.1 Experimental Configuration for the Suggested System -- 7 Conclusion -- References -- Instantaneous Interpretation into Sign Language for the Hearing Impaired -- 1 Introduction -- 1.1 Feature Extraction -- 1.2 NLP -- 1.3 CNN -- 2 Literature Survey -- 2.1 Improvement of Speech -- 2.2 Translation from Speech to Sign Language -- 2.3 Converter from Speech to Sign Language -- 3 Proposed Methodology -- 3.1 Deaf People's Model -- 3.2 Mute People Model -- 4 Analysis by Comparison to the Current Model -- 5 Conclusion -- 6 Future Scope -- References -- A Review of Anomaly Based Multiple Intrusion Detection Methods Using a Feature Based Deep Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Correlation of Traditional Technique and ML-Based Technique for Efficient Effort Estimation: In Agile Frameworks -- 1 Introduction -- 2 Related Work -- 2.1 Non-Algorithmic Technique-Based Effort Estimation in Agile -- 2.2 Algorithmic Technique-Based Effort Estimation in Agile -- 2.3 Machine Learning-Based Effort Estimation in Agile -- 3 Research Objective -- 3.1 Research Question -- 3.2 Question Objective -- 4 Research Methodology -- 4.1 (RQ1) What Are the Various Traditional Techniques for Effort Estimation in an Agile Context? -- 4.2 (RQ2) What Are the Different ML Techniques for Effort Estimation in an Agile Context? -- 4.3 (RQ3) Which ML Algorithm Outperformed Among Themselves and What Are the Different Metrics Used to Determine the Accuracy of ML Techniques? -- 5 Results -- 6 Conclusion and Discussion -- References. , NLP-Based Processing of Gujarati Compound Word Sandhi's Generation and Segmentation.
    Additional Edition: Print version: Rathore, Vijay Singh Universal Threats in Expert Applications and Solutions Singapore : Springer,c2024 ISBN 9789819738090
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949602164202882
    Format: 1 online resource (192 pages)
    Edition: 1st ed.
    ISBN: 9783319785035
    Note: Intro -- Preface -- Objectives -- Organisation of Book Chapters -- Intended Readers -- Limitations -- Book Project During Sabbatical Stay in Sydney -- Aims -- Acknowledgements -- Contents -- 1 Introduction -- 1.1 Early Work and Review Articles -- 2 The History of the Patient Record and the Paper Record -- 2.1 The Egyptians and the Greeks -- 2.2 The Arabs -- 2.3 The Swedes -- 2.4 The Paper Based Patient Record -- 2.5 Greek and Latin Used in the Patient Record -- 2.6 Summary of the History of the Patient Record and the Paper Record -- 3 User Needs: Clinicians, Clinical Researchers and Hospital Management -- 3.1 Reading and Retrieving Efficiency of Patient Records -- 3.2 Natural Language Processing on Clinical Text -- 3.3 Electronic Patient Record System -- 3.4 Different User Groups -- 3.5 Summary -- 4 Characteristics of Patient Records and Clinical Corpora -- 4.1 Patient Records -- 4.2 Pathology Reports -- 4.3 Spelling Errors in Clinical Text -- 4.4 Abbreviations -- 4.5 Acronyms -- 4.6 Assertions -- 4.6.1 Negations -- 4.6.2 Speculation and Factuality -- Levels of Certainty -- Negation and Speculations in Other Languages, Such as Chinese -- 4.7 Clinical Corpora Available -- 4.7.1 English Clinical Corpora Available -- 4.7.2 Swedish Clinical Corpora -- 4.7.3 Clinical Corpora in Other Languages than Swedish -- 4.8 Summary -- 5 Medical Classifications and Terminologies -- 5.1 International Statistical Classification of Diseases and Related Health Problems (ICD) -- 5.1.1 International Classification of Diseases for Oncology (ICD-O-3) -- 5.2 Systematized Nomenclature of Medicine: Clinical Terms (SNOMED CT) -- 5.3 Medical Subject Headings (MeSH) -- 5.4 Unified Medical Language Systems (UMLS) -- 5.5 Anatomical Therapeutic Chemical Classification (ATC) -- 5.6 Different Standards for Interoperability -- 5.6.1 Health Level 7 (HL7). , Fast Healthcare Interoperability Resources (FHIR) -- 5.6.2 OpenEHR -- 5.6.3 Mapping and Expanding Terminologies -- 5.7 Summary of Medical Classifications and Terminologies -- 6 Evaluation Metrics and Evaluation -- 6.1 Qualitative and Quantitative Evaluation -- 6.2 The Cranfield Paradigm -- 6.3 Metrics -- 6.4 Annotation -- 6.5 Inter-Annotator Agreement (IAA) -- 6.6 Confidence and Statistical Significance Testing -- 6.7 Annotation Tools -- 6.8 Gold Standard -- 6.9 Summary of Evaluation Metrics and Annotation -- 7 Basic Building Blocks for Clinical Text Processing -- 7.1 Definitions -- 7.2 Segmentation and Tokenisation -- 7.3 Morphological Processing -- 7.3.1 Lemmatisation -- 7.3.2 Stemming -- 7.3.3 Compound Splitting (Decompounding) -- 7.3.4 Abbreviation Detection and Expansion -- A Machine Learning Approach for Abbreviation Detection -- 7.3.5 Spell Checking and Spelling Error Correction -- Spell Checking of Clinical Text -- Open Source Spell Checkers -- Search Engines and Spell Checking -- 7.3.6 Part-of-Speech Tagging (POS Tagging) -- 7.4 Syntactical Analysis -- 7.4.1 Shallow Parsing (Chunking) -- 7.4.2 Grammar Tools -- 7.5 Semantic Analysis and Concept Extraction -- 7.5.1 Named Entity Recognition -- Machine Learning for Named Entity Recognition -- 7.5.2 Negation Detection -- Negation Detection Systems -- Negation Trigger Lists -- NegEx for Swedish -- NegEx for French, Spanish and German -- Machine Learning Approaches for Negation Detection -- 7.5.3 Factuality Detection -- 7.5.4 Relative Processing (Family History) -- 7.5.5 Temporal Processing -- TimeML and TIMEX3 -- HeidelTime -- i2b2 Temporal Relations Challenge -- Temporal Processing for Swedish Clinical Text -- Temporal Processing for French Clinical Text -- Temporal Processing for Portuguese Clinical Text -- 7.5.6 Relation Extraction -- 2010 i2b2/VA Challenge Relation Classification Task. , Other Approaches for Relation Extraction -- 7.5.7 Anaphora Resolution -- i2b2 Challenge in Coreference Resolution for Electronic Medical Records -- 7.6 Summary of Basic Building Blocks for Clinical Text Processing -- 8 Computational Methods for Text Analysis and Text Classification -- 8.1 Rule-Based Methods -- 8.1.1 Regular Expressions -- 8.2 Machine Learning-Based Methods -- 8.2.1 Features and Feature Selection -- Term Frequency-Inverse Document Frequency, tf-idf -- Vector Space Model -- 8.2.2 Active Learning -- 8.2.3 Pre-Annotation with Revision or Machine Assisted Annotation -- 8.2.4 Clustering -- 8.2.5 Topic Modelling -- 8.2.6 Distributional Semantics -- 8.2.7 Association Rules -- 8.3 Explaining and Understanding the Results Produced -- 8.4 Computational Linguistic Modules for Clinical Text Processing -- 8.5 NLP Tools: UIMA, GATE, NLTK etc -- 8.6 Summary of Computational Methods for Text Analysis and Text Classification -- 9 Ethics and Privacy of Patient Records for Clinical Text Mining Research -- 9.1 Ethical Permission -- 9.2 Social Security Number -- 9.3 Safe Storage -- 9.4 Automatic De-Identification of Patient Records -- 9.4.1 Density of PHI in Electronic Patient Record Text -- 9.4.2 Pseudonymisation of Electronic Patient Records -- 9.4.3 Re-Identification and Privacy -- Black Box Approach -- 9.5 Summary of Ethics and Privacy of Patient Records for Clinical Text Mining Research -- 10 Applications of Clinical Text Mining -- 10.1 Detection and Prediction of Healthcare Associated Infections (HAIs) -- 10.1.1 Healthcare Associated Infections (HAIs) -- 10.1.2 Detecting and Predicting HAI -- 10.1.3 Commercial HAI Surveillance Systems and Systems in Practical Use -- 10.2 Detection of Adverse Drug Events (ADEs) -- 10.2.1 Adverse Drug Events (ADEs) -- 10.2.2 Resources for Adverse Drug Event Detection -- 10.2.3 Passive Surveillance of ADEs. , 10.2.4 Active Surveillance of ADEs -- 10.2.5 Approaches for ADE Detection -- An Approach for Swedish Clinical Text -- An Approach for Spanish Clinical Text -- A Joint Approach for Spanish and Swedish Clinical Text -- 10.3 Suicide Prevention by Mining Electronic Patient Records -- 10.4 Mining Pathology Reports for Diagnostic Tests -- 10.4.1 The Case of the Cancer Registry of Norway -- 10.4.2 The Medical Text Extraction (Medtex) System -- 10.5 Mining for Cancer Symptoms -- 10.6 Text Summarisation and Translation of Patient Record -- 10.6.1 Summarising the Patient Record -- 10.6.2 Other Approaches in Summarising the Patient Record -- 10.6.3 Summarising Medical Scientific Text -- 10.6.4 Simplification of the Patient Record for Laypeople -- 10.7 ICD-10 Diagnosis Code Assignment and Validation -- 10.7.1 Natural Language Generation from SNOMED CT -- 10.8 Search Cohort Selection and Similar Patient Cases -- 10.8.1 Comorbidities -- 10.8.2 Information Retrieval from Electronic Patient Records -- 10.8.3 Search Engine Solr -- 10.8.4 Supporting the Clinician in an Emergency Department with the Radiology Report -- 10.8.5 Incident Reporting -- 10.8.6 Hypothesis Generation -- 10.8.7 Practical Use of SNOMED CT -- 10.8.8 ICD-10 and SNOMED CT Code Mapping -- 10.8.9 Analysing the Patient's Speech -- 10.8.10 MYCIN and Clinical Decision Support -- 10.8.11 IBM Watson Health -- 10.9 Summary of Applications of Clinical Text Mining -- 11 Networks and Shared Tasks in Clinical Text Mining -- 11.1 Conferences, Workshops and Journals -- 11.2 Summary of Networks and Shared Tasks in Clinical Text Mining -- 12 Conclusions and Outlook -- 12.1 Outcomes -- References -- Index.
    Additional Edition: Print version: Dalianis, Hercules Clinical Text Mining Cham : Springer International Publishing AG,c2018 ISBN 9783319785028
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Image  (Thumbnail cover image)
    URL: Image  (Thumbnail cover image)
    URL: OAPEN  (Creative Commons License)
    URL: OAPEN
    URL: OAPEN
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almafu_9961612465702883
    Format: 1 online resource (942 pages)
    Edition: 1st ed. 2024.
    ISBN: 9789819731800
    Series Statement: Lecture Notes in Networks and Systems, 994
    Content: This book provides an insight into 12th International Conference on Soft Computing for Problem Solving (SocProS 2023), organized by The Department of Applied Mathematics and Scientific Computing, Saharanpur Campus of Indian Institute of Technology, Roorkee, India, in conjunction with Continuing Education Center during 11–13 August 2023. This book presents the latest achievements and innovations in the interdisciplinary areas of soft computing, machine learning, and data science. It covers original research papers in the areas of algorithms (artificial neural network, deep learning, statistical methods, genetic algorithm, and particle swarm optimization) and applications (data mining and clustering, computer vision, medical and health care, finance, data envelopment analysis, business, and forecasting applications). This book is beneficial for young as well as experienced researchers dealing across complex and intricate real-world problems for which finding a solution by traditional methods is a difficult task.
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- MIM-ViT: Deepfake Detection Using Masked Image Modelling and Vision Transformer -- 1 Introduction -- 2 Related Work -- 2.1 Deepfake Generation -- 2.2 Deepfake Detection -- 2.3 Research Gaps in Existing Work -- 3 Proposed Architecture -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Face Quality Testing -- 3.4 Model -- 4 Experimental Setup -- 5 Results and Discussion -- 5.1 Performance Metrics -- 5.2 Experiments -- 6 Conclusion and Future Scope -- References -- A Study on Generalized Hough Transform for Detecting Fuzzy Lines -- 1 Introduction -- 2 Preliminaries -- 2.1 Classical Hough Transform -- 3 Fuzzy Hough Transform -- 3.1 Generalized Version of Fuzzy Hough Transform -- 3.2 Fuzzy Line Detection Using FHT -- 4 Similarity Measure Between Two Fuzzy Lines -- 4.1 Distance Measure Between Two Fuzzy Lines -- 5 Experimental Results -- 6 Conclusion -- References -- 'KSK' Algorithm for Optimizing DCS Performance Using 'R' -- 1 Introduction -- 2 Literature Review -- 3 Objective -- 4 Technique -- 5 Flowchart of Algorithm -- 6 Implementation -- 7 Comparison -- 8 Conclusion -- References -- A Knee-Based Multi-objective Optimization for Gait Cycle of 25-DOF NAO Humanoid Robot -- 1 Introduction -- 2 Past Studies -- 3 Knee-Based Optimization Methodology -- 3.1 Angle-Based Focus -- 3.2 Utility-Based Focus -- 4 Problem Definition -- 5 Multi-Objective Optimization Formulation -- 6 Results and Discussion -- 7 Conclusions -- References -- Estimating Severity for Knee Osteoarthritis Radiographs Using Deep Learning and Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Methods and Materials Used -- 3.1 Dataset Used -- 3.2 Dataset Pre-processing -- 3.3 Extracting Relevant Features -- 3.4 Classification -- 3.5 Investigating Parameters -- 4 Experimental Analysis -- 5 Conclusion -- References. , Knee-Osteoarthritis Detection Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Methodology -- 4.1 Image Preprocessing -- 4.2 Application of CNN Algorithm -- 4.3 Dataset -- 4.4 Training -- 5 Results -- 6 Implementation of Online Tool -- 7 Benefits -- 8 Conclusion and Future Scope -- References -- Hybrid Method for Named Entity Recognition in Kumauni Language Using Machine Learning -- 1 Introduction -- 1.1 NER and Its Approaches -- 1.2 Applications of Named Entity Recognition -- 2 Review of Literature -- 3 Background Study -- 4 Problem Formulation -- 5 Research Objectives -- 6 Research Methodology -- 6.1 CRF -- 6.2 CNN -- 6.3 Bi-LSTM -- 7 Proposed Methodology -- 8 Results and Discussion -- 8.1 Dataset Description -- 8.2 Performance Measure -- 9 Results and Discussion -- 10 Comparative Analysis -- 11 Conclusion and Future Work -- References -- Implementation of Basic Mathematical Operations on Openpower-ISA of Libresoc -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Implementation -- 4 Results and Discussions -- 4.1 Implementation for Addition Operation -- 4.2 Implementation for Subtraction Operation on the Decoder Test Cases of Openpower-ISA -- 4.3 Implementation for Multiplication Operation -- 4.4 Implementation for Division Operation -- 5 Conclusion -- 6 Future Scope -- References -- Machine Learning-Based Node Localization in IoT-Assisted WSN: An Initial Framework for Real-Time Applications -- 1 Introduction -- 1.1 Main Contributions -- 2 Related Work -- 3 Localization in IoT -- 4 Machine Learning-Based Localization in IoT Context -- 5 Proposed Framework for ML-Based Localization in IoT-Assisted WSN -- 5.1 Offline Phase -- 5.2 Model Selection and Training -- 5.3 Online Phase -- 5.4 Node Localization -- 6 Conclusion -- 7 Future Scope -- References. , Implementing Blockchain Technology in Healthcare: An Overview, Key Requirements, and Challenges -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Future Scope -- 5 Conclusion -- References -- Path Planning for Autonomous Ground Vehicles by Applying Modified Harris Hawks Optimization Technique -- 1 Introduction -- 2 Problem Description and System Modeling -- 3 Modified Harris Hawks Optimization (MHHO) Algorithm -- 4 Simulation Results and Discussions -- 4.1 Performance of the Modified HHO Optimization Algorithm -- 4.2 Performance of MHHO Optimization Algorithm in Path Planning Algorithms -- 5 Conclusion and Future Scope -- References -- Glaucoma Classification Using Improved Pretrained Model -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Phase 1: RIM-1 DL Dataset -- 3.2 Phase 2: Preprocessing -- 3.3 Phase 3: Transfer Learning -- 3.4 Phase 4: Hybrid Model Development -- 4 Results and Discussion -- 5 Conclusion -- References -- Performance Optimization of a Waste Heat-Operated Tri-generation Cycle Under Different Energy Situations -- 1 Introduction -- 2 System Description and Performance Evaluation -- 2.1 Description of the Cycle -- 2.2 Assumptions Required During Simulation -- 2.3 Performance Evaluation of the Cycle -- 3 Optimization Strategy Used in the Study -- 3.1 Dragonfly Optimization Algorithm -- 3.2 Flowchart of the Optimization Strategy -- 4 Results -- 4.1 Calculation of Suitable Range of GF, PF, and SF -- 4.2 Optimized Results for Residential or Goods Storage Facilities -- 5 Conclusion -- References -- Organizational Supply Chain Risk Assessment Using Machine Learning and Backpropagation Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Research and Analysis on the Model Construction for Supply Chain Risk Assessment -- 3.1 Research Methodology -- 3.2 Backpropagation Neural Network Model. , 4 Simulation Result -- 5 Conclusion -- References -- An Approach to Find Critical Path Using Trapezoidal Picture Fuzzy Numbers -- 1 Introduction -- 2 Preliminaries -- 2.1 Trapezoidal Picture Fuzzy Numbers -- 2.2 Operations on Trapezoidal Picture Fuzzy Numbers ch15ddd -- 2.3 Comparison of TPFNs Based on: Expected Values ch15ddd -- 3 Trapezoidal Picture Fuzzy Critical Path Method -- 4 Conclusion and Future Research -- References -- Comparative Analysis of Machine Learning and Deep Learning Algorithms for Automatic Sleep Staging Using EEG Signals -- 1 Introduction -- 2 Literature Review -- 2.1 Machine Learning -- 2.2 Deep Learning -- 2.3 Limitation -- 2.4 Contribution -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Pre-processing -- 3.3 Feature Extraction and Selection -- 3.4 Classification Algorithm -- 3.5 Performance Evaluation -- 4 Result Analysis -- 4.1 Machine Learning Evaluation -- 4.2 Deep Learning Evaluation -- 5 Conclusion and Future Work -- References -- Randomized Shuffled Hierarchical Partitioning Technique for Enhancing Efficiency of Swarm Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 Hierarchical Partitioning -- 2.2 Modified Hierarchical Partitioning -- 2.3 Random Partitioning -- 2.4 Self-adaptive Multi-population Technique with Random Partitioning (SAMPR) -- 3 Proposed Variants -- 3.1 Shuffled Hierarchical Partitioning (SHier) -- 3.2 Randomized Hierarchical Partitioning (RHier) -- 3.3 Randomized Shuffled Hierarchical Partitioning (RSHier) -- 4 Results and Discussion -- 4.1 Comparison Among the Proposed Techniques with HIER and mHIER -- 4.2 Testing the Applicability of RSHier Over Multiple Swarm Algorithms -- 4.3 Comparison Over CEC 2014 Function Set -- 4.4 Studying Diversity and Convergence Improvements -- 5 Conclusion -- References -- A Novel Approach to Solve the Interval-Valued Fermatean Fuzzy Transportation Problem. , 1 Introduction -- 2 Preliminaries -- 3 Mathematical Formulation -- 3.1 Interval-Valued Transportation Problem (IVTP) -- 3.2 Equivalent Crisp Transportation Problem Using Order Relation leqRC -- 4 Solution Methodology -- 5 Numerical Example -- 5.1 Discussion -- 6 Conclusion and Future Research Scope -- References -- An Ensemble of PSO and Artificial Electric Field Algorithm for Computationally Expensive Optimization Problems -- 1 Introduction -- 2 Literature Review -- 3 Ensemble of PSO and AEFA -- 3.1 PSO -- 3.2 AEFA -- 3.3 Proposed Algorithm -- 3.4 Time and Space Complexity of the PSAEF Algorithm -- 3.5 Advantages and Disadvantages of the Proposed PSAEF Algorithm -- 4 Results and Discussions -- 5 Component-Wise Comparison -- 6 Conclusion and Future Scope -- References -- Popularity Prediction of Online Social Media Content: A Bibliometric Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 4.1 Document and Source Type -- 4.2 Evolution of Publication Over Years -- 4.3 Keyword Analysis -- 4.4 Analysis of Authorship -- 4.5 Analysis of the Author's Main Affiliation -- 4.6 Analysis of the Author's Countries -- 4.7 Citation Analysis -- 4.8 Analysis of Journals -- 5 Conclusion -- References -- Development of an Autonomous Driving Car Prototype Using FPGA -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Architecture -- 3.2 Algorithms Used -- 4 Proposed Features -- 4.1 Lane Detection -- 4.2 Object Detection -- 4.3 Collision Avoidance -- 5 Result -- 5.1 Testing and Validation -- 6 Suggested Improvements -- 7 Future Scope -- 8 Conclusion -- References -- Custom CDGNet Architecture for Precise Human Part Semantic Segmentation -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experimental Analysis -- 4.1 Dataset Used -- 4.2 Evaluation Metrics -- 4.3 Quantitative Analysis -- 5 Conclusion and Future Work. , References.
    Additional Edition: ISBN 9789819731794
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages