Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    almahu_9949385697602882
    Umfang: 1 online resource (338 pages)
    ISBN: 9781003340867 , 1003340865 , 9781000781236 , 1000781232 , 9781000781281 , 1000781283
    Inhalt: The special issue is dedicated to National conference on Communication, computational intelligence and learning-NCCCIL sponsored by AICTE and organized by Department of Information Technology at Army Institute of Technology from 12-13 January 2022. This conference gave the collaborative forum to academic experts, researchers and corporate professionals to enrich their knowledge in the automation and analysis of industry and business processes in a smart way. The two day conference included invited talks and paper presentations focusing on the applications of Computational intelligence, Communication, Machine Learning and Artificial Intelligence.
    Anmerkung: Chapter 1- Implementation of Predictive OEE (POEE): System engineering approach Pranita Bhosale and Sangeeta JadhavChapter 2- Road detection from high resolution images using fully convolutional network Dhanashri Patil and Sangeeta JadhavChapter 3- An insight on methodologies used for predictive machine health monitoring: A review Pranita Bhosale and Sangeeta JadhavChapter 4- Support vector clustering for face-based emotion predictions Dipti Pandit and Sangeeta JadhavChapter 5- Malware classification using neural network Deeptanshu Singh Rathore, Ashwini Sapkal, Geeta Patil, Rahul Desai, and Aparna JoshiChapter 6- Transfer learning approach for multi-disease classification using chest X-ray images Sangeeta Jadhav, Vishal Savade, Wagh Shubham Sharad, Sunit Kumar Jena, and Vivek Kumar RayChapter 7- Smart attendance system Gaurav Kumar Singh, Grandhi Abhisar, Vaishali Ingale, Prashant Kumar Singh, and Jatin KumarChapter 8- Real-time driver⁰́₉s drowsiness detection using transfer learning Mohd Danish Khursheed, Mohd. Maaz Khan, and Sara ParveenChapter 9- Artificial intelligence based virtual voice assistance Pranjal Gajendragadkar, Seema Rajput, and Harjeet KaurChapter 10- Survey of fabric defect detection using UNet architecture 91Saiqa Khan, Ansari Almas Eram, Ansari Saadan, Ansari Raheen Bano and Narjis Fatema SuterwalaChapter 11- Employee turnover predictor using machine learning algorithms with user-friendly graphical user interface Harshit GuptaChapter 12- Pre-trained deep learning models for content-based image classification and retrieval Dnyanda N. Hire and A. V. PatilChapter 13- AI-based assistant with security Premanand Ghadekar, Aquib Aziz, Aditi Baldawa, Yukta Dingreja, Ishita Sonchhatra, and Jay PawarChapter 14- Augmented reality-based application for interactive shopping experience Aparna Joshi, Rupali Bagate, Kunal Khanra, Ajay Bohra, Roshan Rai, and Deepak TiwariChapter 15- Study of tourism recommendation system Yuvraj Gholap, Rahul Desai, Zaid Alam, and Gajanan WalunjkarChapter 16- Detecting driver distraction using semi-supervised machine learning Aman Mishra, Rahul Desai, G. M. Walunjkar, and Yuvraj GholapChapter 17 Eye forms ⁰́₃ Online form invigilator Shardul Nimbalkar, Mehul Khandhadiya, Shashank Tapas, Saurabh Khandagale, Yash Jain, and Vrushali K. BongirwarChapter 18- KACO: k-mean clustering and ACO-based data transmission in wireless sensor networks Savita Jadhav and Sangeeta JadhavChapter 19- Deep learning-based wildfire detection from satellite imagery Anant Kaulage and Sagar RaneChapter 20- Pattern recognition application in power system monitoring: A demonstration Amrendra Kumar Karn, Salman Hameed, and Mohammad SarfrazChapter 21- Analysis of vertical handover parameters using Analysis of Variance (ANOVA) Siddharth Goutam, Srija Unnikrishnan, Archana Karandikar, and Aradhana GoutamChapter 22- A novel Encoding/Decoding scheme with Belief Propagation and LDPC code Prashnatita Pal, Bikash Chandra Sahana, and Jayanta PorayChapter 23- Performance analysis of routing protocols for Ad Hoc networks Aman Mishra, Rahul Desai and G. M. WalunjkarChapter 24- Design and performance analysis of array multiplier (using Xilinx) Rahul Johny, Nilay Vejare, Sumit Tripathi, Sunny Sharma and Lakshmi IyerChapter 25- IOTE: A system for integrated online teaching environment Sheetal Thakare, and M. A. PundChapter 26- Real-time conversion of speech to sign language and hand gesture recognition Sangeeta Jadhav, Sumit Kumar, Harsh Chauhan, Supriya Negi and Vishvajeet SinghChapter 27- Review on investigation of obsolescence mitigation problems in electronic components Ajay K. Dass and S. D. LokhandeChapter 28- Summariser - Transforming your online meets 291Ashwini Sapkal, Akash Bhati, Arun, Saurabh Rai, and Shubham AnandChapter 29- Efficient web application vulnerabilities detection Model 299Premanand Ghadekar, Devashish Ubale, and Vijay GaikwadChapter 30- Overall equipment effectiveness (OEE): Methodologies used for implementation, detection and prognostics a literature review on case studies F. Pranita Bhosale and Sangeeta Jadhav
    Sprache: Englisch
    Schlagwort(e): Electronic books. ; Conference papers and proceedings.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    gbv_1000781232
    Umfang: Illustrationen
    ISSN: 0007-6201
    In: Burgen und Schlösser, Braubach : Europ. Burgeninst., 1960, 58(2017), 3, Seite 138-148, 0007-6201
    In: volume:58
    In: year:2017
    In: number:3
    In: pages:138-148
    Sprache: Deutsch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 1000081432?
Meinten Sie 1000081230?
Meinten Sie 100028123x?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz