Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Erscheinungszeitraum
Zugriff
  • 1
    UID:
    almafu_9961426864302883
    Umfang: 1 online resource (475 pages)
    Ausgabe: 1st ed. 2024.
    ISBN: 9783031535499 , 3031535499
    Serie: Lecture Notes in Networks and Systems, 909
    Inhalt: This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, scholars, and professionals, offering insights and tools crucial for advancing the software engineering landscape. Its diverse content makes it an invaluable resource for seasoned professionals and those new to the field, inspiring and enriching readers' understanding of software engineering's future directions.
    Anmerkung: An Artificial Intelligence-based Concept and Survey for Personalized Learning in schools in the Republic of Bulgaria -- 0/1 1-D bin packing problem solved by a recent nature-inspired optimizer -- Orca predator algorithm for feature selection -- Skeleton Detection Using MediaPipe as a Tool for Musculoskeletal Disorders Analysis -- Pipeline leakage detection via Extreme Seeking Entropy -- Secure Data Transmission Scheme in Wireless Sensor Network Resisting Unknown Lethal Threats -- Deep Reinforcement Learning-Based Task Offloading in Multi-access Edge Computing for Marine IoT -- Information and Communication Skills for Higher Learners Competence Model -- Smart solution for public lighting in the municipality -- A Review Paper On Biometric Authentication And Geospatial Data – Case of Zambia.
    Weitere Ausg.: ISBN 9783031535482
    Weitere Ausg.: ISBN 3031535480
    Sprache: Englisch
    URL: Volltext  (URL des Erstveröffentlichers)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    edoccha_9961426864302883
    Umfang: 1 online resource (475 pages)
    Ausgabe: 1st ed.
    ISBN: 3-031-53549-9
    Serie: Lecture Notes in Networks and Systems Series ; v.909
    Anmerkung: Intro -- Preface -- Organization -- Contents -- An Artificial Intelligence-Based Concept and Survey for Personalized Learning in Schools in the Republic of Bulgaria -- 1 Introduction -- 2 Artificial Intelligence and Personalized Education -- 3 Online-Based Teaching Platforms in Bulgaria as Sources of Educational Content -- 4 Results from a Survey on Using Artificial Intelligence for Personalized Education -- 5 Conclusion -- References -- Correlation Analysis and Predictive Factors for Building a Mathematical Model -- 1 Introduction -- 2 Data Research -- 3 Conclusion -- References -- Orca Predator Algorithm for Feature Selection -- 1 Introduction -- 2 Feature Selections -- 3 Orca Predation Algorithm -- 3.1 Adapatación de OPA -- 4 Computational Experiments -- 5 Conclusion -- References -- Skeleton Detection Using MediaPipe as a Tool for Musculoskeletal Disorders Analysis -- 1 Introduction -- 1.1 Medical Background -- 2 Materials and Methods: Principles and Technologies of Human Skeleton Detection -- 2.1 Traditional Approaches for Human Pose Estimation -- 2.2 Deep Learning Approaches for Human Pose Estimation -- 2.3 MediaPipe: A Comprehensive Machine Learning Framework -- 2.4 Skeleton Detection Principles in MediaPipe -- 2.5 MediaPipe Analysis: Strengths and Weaknesses -- 2.6 MediaPipe Compatibility: Platforms and Languages -- 3 Results -- 4 Conclusion -- 4.1 Future Work -- References -- Model Design Research Plan for Warehouse Barcode Image Recognition in Smart Systems -- 1 Introduction -- 2 Methodology -- 3 Results -- 3.1 Research Plan for Barcode Image Recognition -- 3.2 Process Architecture Plan for Image Recognition -- 3.3 Methodological Design for Neural Network Model Research -- 3.4 Framework Schedule -- 3.5 Dataset Creation Plan Using the Selected Annotation Tool -- 4 Conclusion -- References. , Robust H Controller Design for Satellite Systems with Uncertain Inertia Matrix: A Linear Matrix Inequality Approach -- 1 Introduction -- 2 Formulation for Satellite Systems and Design -- 2.1 Satellite Modelling -- 2.2 H Control Law Based on LMI -- 3 Simulation Result -- 4 Conclusion -- References -- Pipeline Leakage Detection via Extreme Seeking Entropy -- 1 Introduction -- 2 Methods -- 2.1 Adaptive Filter -- 2.2 Extreme Seeking Entropy Algorithm -- 2.3 Experiment Description -- 3 Results -- 4 Conclusion -- References -- Holographic Discs-Volumetric Media and Quality Data Storage Media -- 1 Introduction -- 2 Recording/Reading Discs -- 3 Mathematical Model for Holographic Disk Recording -- 4 Conclusion -- References -- Ensuring Operational Continuity and Safety in Refineries Through a Robust Emergency Shutdown System Design and Implementation -- 1 Introduction -- 2 Design Requirements -- 3 Logic Architecture -- 4 ESD Hardware Requirements -- 4.1 ESD Structure -- 4.2 System Cabinet -- 4.3 Marshalling Cabinets -- 4.4 Network Cabinets -- 4.5 CPU -- 5 ESD Logic Requirements - Software -- 5.1 Design Requirements -- 5.2 Program Structure -- 5.3 Voting and Deviation Alarms -- 6 Conclusion -- References -- Cyber-Physical Fire Detection and Recognition System with Smart Glasses -- 1 Introduction -- 2 Methods -- 2.1 Causes for Fire Occurrence -- 2.2 Smart Glasses Moverio BT-300 -- 3 Implementation -- 3.1 Creating/Modifying a Dataset of Fire Images Samples for Training and Testing the Fire Localization and Detection Model Based on Artificial Intelligence -- 3.2 Develop a Model for Localization and Detection of Fire -- 3.3 Training and Evaluating the Model with the Dataset -- 3.4 Implementing the Trained Model in Android-Based Software -- 3.5 Fire Localization and Detection -- 3.6 Signalling for Fire Detection -- 4 Conclusions -- References. , Trends and Challenges in Surveillance - A Systematic Review of Camera Systems Implementing Artificial Intelligence -- 1 The Coexistence Between Surveillance and Artificial Intelligence -- 2 Camera Surveillance Using Machine Learning -- 3 Camera Surveillance Using Neural Networks -- 4 Trends and Challenges in AI Surveillance -- 5 Advantages of AI Surveillance -- 6 Conclusion -- References -- Usage of the Summary Model DELIS-CH for Starting the Design Process of an Educational Video Game for Cultural Heritage -- 1 Introduction -- 2 Application of the Summary Model DELIS-CH -- 3 Conceptual Design Model of the Content of the Educational Video Game for Boyana Church -- 4 Conclusion -- References -- User-Oriented Dashboard Design Process for the DIZU-EVG Instrument for Visualizing Results from Educational Video Games -- 1 Introduction -- 2 User-Oriented Requirements for the Design of the DIZU-EVG Instrument Dashboards -- 3 Core Functionalities and Models -- 4 Conclusion and Future Work -- References -- Heuristic Approaches to Delivering Cloud Resources at Minimal Cost in IT Infrastructure Management -- 1 Introduction -- 2 Heuristic Algorithms for Providing Cloud Resources with Minimum Cost -- 3 Experimental Results -- 4 Conclusion -- References -- Vocal Folds Image Segmentation Based on YOLO Network -- 1 Introduction -- 1.1 YOLOv8-Based Segmentation -- 2 Materials and Methods -- 3 Results -- 3.1 Model Validation -- 3.2 Implementation Specification -- 4 Conclusion -- References -- Knowledge Discovery Systems: An Overview -- 1 Introduction -- 2 Knowledge Discovery Systems -- 3 Decision Trees -- 4 Decision Tree Algorithms -- 5 Knowledge Discovery Systems' Significant Role in a Data-Driven World -- 6 Discussion -- 7 Conclusion -- References -- Novel Radio Scheduling Framework for Optimal Energy Efficiency in Wireless Sensor Network -- 1 Introduction. , 2 Related Work -- 3 Problem Description -- 4 Proposed Methodology -- 5 System Design -- 5.1 Primary Radio Scheduling Approach -- 5.2 Secondary Radio Scheduling Approach -- 6 Results Discussion -- 7 Conclusion -- References -- A Novel Approach of Intrusion Detection System for IoT Against Modern Attacks Using Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Problem Description -- 3 Proposed System -- 4 Dataset and Experiment -- 4.1 Dataset -- 4.2 Data preprocessing -- 5 Conclusion -- References -- Predictive Classification Framework for Software Demand Using Ensembled Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 Proposed Methodology -- 5 System Design Implementation -- 5.1 Formulating Research Challenge -- 5.2 Strategy Towards Implementation -- 5.3 Algorithm Design Implementation -- 6 Results Discussion -- 6.1 Accomplished Results -- 6.2 Discussion of Results -- 7 Conclusion -- References -- Secure Data Transmission Scheme in Wireless Sensor Network Resisting Unknown Lethal Threats -- 1 Introduction -- 2 Related Work -- 3 Problem Description -- 4 Proposed Methodology -- 5 System Implementation -- 5.1 Secured Data Forwarding Module (SDFM) -- 5.2 Unknown Threat Mitigation Module (UTMM) -- 6 Results Discussion -- 6.1 Communication-Based Analysis -- 6.2 Security-Based Analysis -- 7 Conclusion -- References -- An IoT-Based Cloud Data Platform with Real-Time Connecting Maritime Autonomous Surface Ships -- 1 Introduction -- 2 Related Work -- 2.1 Ship Automation System -- 2.2 Ship Data Platform -- 3 Design of Data Platform -- 3.1 IoT-Based Cloud Data Platform -- 3.2 Ship Collision Avoidance -- 3.3 Architecture of Onboard Edge -- 3.4 MQTT-Based Retransmission Method -- 4 Implementation and Simulation -- 4.1 Implementation with AWS Cloud Architecture -- 4.2 Simulation of Retransmission Method -- 5 Conclusion. , References -- Deep Learning-Based Tag Mapping Automation of Ship Data Models with Natural Language Processing -- 1 Introduction -- 2 Related Work -- 2.1 Tag Mapping Automation -- 2.2 Natural Language Processing -- 3 Dataset -- 4 Method -- 4.1 Tag Mapping Automation for Ship Data -- 4.2 Tag Mapping Automation Module -- 5 Experiments -- 5.1 Implementation Details -- 5.2 Experimental Results -- 5.3 Loss and Accuracy Trend Analysis -- 5.4 Trend Analysis of Training Time -- 6 Conclusion -- References -- Deep Reinforcement Learning-Based Task Offloading in Multi-access Edge Computing for Marine IoT -- 1 Introduction -- 2 Related Works -- 3 System Model -- 3.1 Communication Model -- 3.2 Computing Model -- 4 Problem Formulation -- 5 Performance Evaluation -- 6 Conclusion -- References -- Neural Network Development for Quality Analysis of ERP Systems -- 1 Introduction -- 2 Methods and Materials -- 3 Dataset Creation -- 4 Neural Network Training -- 4.1 Neural Network Reduction -- 4.2 Algorithm of Average L1 and L2 Regularization -- 5 Modelling -- 6 Conclusion -- References -- Designing an Algorithm for Recognizing the Kazakh-Latin Alphabet in an Image -- 1 Introduction -- 2 Implementation of the Convolutional Neural Network -- 3 Conclusion -- References -- Influence of TMDC Layers on the Optical Properties of Silicon Nanoparticles -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Flexible GaNP Nanowire-Based Platform: Optical Studies -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Discussions -- 5 Conclusion -- References -- Transverse Kerker Effects in All-Dielectric Conical Nanoparticles -- 1 Introduction -- 2 Transverse Kerker Effects in Cone Silicon Particles -- 3 Conclusion -- References -- Generalized Kerker Effects in All-Dielectric Conical Nanoparticles -- 1 Introduction. , 2 Generalized Kerker Effects in Cone Silicon Particles.
    Weitere Ausg.: ISBN 3-031-53548-0
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9949709212402882
    Umfang: XV, 463 p. 220 illus., 157 illus. in color. , online resource.
    Ausgabe: 1st ed. 2024.
    ISBN: 9783031535499
    Serie: Lecture Notes in Networks and Systems, 909
    Inhalt: This book presents cutting-edge research and methodologies in software engineering, specifically focusing on systems and network systems. It showcases novel development approaches and network system optimizations, highlighting the field's dynamic evolution. The book is designed for experts, scholars, and professionals, offering insights and tools crucial for advancing the software engineering landscape. Its diverse content makes it an invaluable resource for seasoned professionals and those new to the field, inspiring and enriching readers' understanding of software engineering's future directions.
    Anmerkung: An Artificial Intelligence-based Concept and Survey for Personalized Learning in schools in the Republic of Bulgaria -- 0/1 1-D bin packing problem solved by a recent nature-inspired optimizer -- Orca predator algorithm for feature selection -- Skeleton Detection Using MediaPipe as a Tool for Musculoskeletal Disorders Analysis -- Pipeline leakage detection via Extreme Seeking Entropy -- Secure Data Transmission Scheme in Wireless Sensor Network Resisting Unknown Lethal Threats -- Deep Reinforcement Learning-Based Task Offloading in Multi-access Edge Computing for Marine IoT -- Information and Communication Skills for Higher Learners Competence Model -- Smart solution for public lighting in the municipality -- A Review Paper On Biometric Authentication And Geospatial Data - Case of Zambia.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783031535482
    Weitere Ausg.: Printed edition: ISBN 9783031535505
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 3031535170?
Meinten Sie 3031135482?
Meinten Sie 3031531450?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz