Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    Online Resource
    Online Resource
    Cham :Palgrave Macmillan,
    UID:
    almahu_9949576279302882
    Format: 1 online resource (215 pages)
    Edition: 1st ed.
    ISBN: 9783031332272
    Series Statement: Crime Files Series
    Note: Intro -- Acknowledgments -- Contents -- Abbreviations -- List of Figures -- Chapter 1: Introduction: Reading Lists, Listing Clues -- Chapter 2: Defining Detective Fiction -- Precursors, Influences, Developments: From the Newgate Calendar to the Golden Age -- Beginnings: The Newgate Calendar -- Influences: Edgar Allan Poe, Eugène Vidoq, and Émile Gaboriau -- Precursors: Sensation Fiction -- Detectives and the Police -- Doyle and Positivism -- The Golden Age: Fair Play and the Clue Puzzle -- Excursus: Lists in the History of Detective Fiction-The Rule Catalogs of the Golden Age -- Chapter 3: Dossier Novels: The Reader as Detective -- Detection as a Scientific Process: Charles Warren Adams's The Notting Hill Mystery -- The Role of the Reader -- Detection as a Process -- Processes of Exactitude: Footnotes and Cross-referencing -- Processes of Exactitude: Structuring -- The Evidentiary Force of Authenticity -- Mesmerism, Lists, and Science -- Detection as a Game: The Murder Dossiers -- Murder Off Miami: The Case File -- Reading Strategies -- Herewith the Clues: The (Detection) Game -- Chapter 4: Manipulating Readers: The Novels of Agatha Christie -- Manipulating the Reader: Creating Patterns of Thinking -- Form and Attention -- Relevance and Visibility -- Categorization -- The Fair Play Rule -- Lists as the Detective's Tool: Creating Order -- Representing Thoughts -- Concealing Thoughts -- Breaking Down the Problem: Managing Boundaries -- Lists and Humor: A Meta-commentary on Detective Fiction -- Chapter 5: Excursus: The Thorndyke Novels and the Language of Science -- Creating Scientificity -- Framing: Language and Form -- Expert Knowledge -- Science Meets Creativity: Hypothesizing About Thorndyke's Method -- Chapter 6: Lists and Knowledge -- Sherlock Holmes and the (Victorian) Dream of Total Knowledge. , Too Much to Know: Knowledge and Paper Technologies -- Listing Knowledge and the Encyclopedic Impulse -- The Adventure of the Reference Works -- The Case of the Case Index: On Absent Referents -- Knowledge and Visibility: The BBC's Sherlock -- Making Meaning Visible: Shared Affordances of Lists and Maps -- Knowledge, Lists, and Maps in the BBC's Sherlock -- Spatialization and Accessibility -- Navigating and Interpreting Knowledge -- Memory as Objective Data -- Compartmentalization -- Chapter 7: Conclusion: Models of Knowledge in Detective Fiction -- Works Cited -- Index.
    Additional Edition: Print version: Link, Sarah J. A Narratological Approach to Lists in Detective Fiction Cham : Palgrave Macmillan,c2023 ISBN 9783031332265
    Language: English
    Subjects: English Studies
    RVK:
    Keywords: Electronic books. ; Hochschulschrift ; Hochschulschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    UID:
    almahu_9949602261302882
    Format: 1 online resource (285 pages)
    Edition: 1st ed.
    ISBN: 9789811379086
    Note: Intro -- Preface -- Contents -- Part I: Visualizing and Controlling Molecules for Life -- Chapter 1: Photoacoustic Tomography: Deep Tissue Imaging by Ultrasonically Beating Optical Diffusion -- Chapter 2: Regulatory Mechanism of Neural Progenitor Cells Revealed by Optical Manipulation of Gene Expressions -- References -- Chapter 3: Eavesdropping on Biological Processes with Multi-dimensional Molecular Imaging -- 3.1 Intravital Imaging -- 3.2 Volumetric Cardiac Imaging in Embryonic Zebrafish -- 3.2.1 Zebrafish As a Model System for Cardiovascular Research -- 3.2.2 Cardiac Development: Symbiosis of Function and Form -- 3.2.3 Cardiac Imaging Is a 4-Dimensional Challenge -- 3.2.4 Principles of Cardiac Gated Imaging in Zebrafish -- 3.2.4.1 Prospective Gating -- 3.2.4.2 Retrospective Gating -- 3.2.4.3 Macroscopic Phase Stamping -- 3.3 Large Scale In Vivo Brain Imaging with Two-Photon Light-Sheet Microscopy -- 3.3.1 Brain Activity Monitoring in Behaving Zebrafish -- 3.3.2 Principles and Successes of Light-Sheet Microscopy for Zebrafish Brain Imaging -- 3.4 Conclusion -- References -- Chapter 4: Apical Cytoskeletons Help Define the Barrier Functions of Epithelial Cell Sheets in Biological Systems -- 4.1 Introduction -- 4.2 The Apical Cytoskeletons in General Epithelial Cells -- 4.3 The Apical Cytoskeletons in Multiciliated Cells, a Possible Extreme Example of a "TJ-Apical Complex" with a Clear Function -- 4.4 Perspective -- References -- Chapter 5: Neural Circuit Dynamics of Brain States -- References -- Online Resources -- Chapter 6: Optogenetic Reconstitution: Light-Induced Assembly of Protein Complexes and Simultaneous Visualization of Their Intracellular Functions -- 6.1 Introduction -- 6.2 Light-Induced Heterodimerization Tools -- 6.3 Visualization Tools Compatible with Optogenetic Manipulation. , 6.4 Light-Induced Assembly/Reconstitution of Force-Generating Complexes During Mitosis -- 6.5 Perspectives -- References -- Chapter 7: 19F MRI Probes with Tunable Chemical Switches -- 7.1 Magnetic Resonance Imaging -- 7.2 Perfluorocarbon Encapsulated in Silica Nanoparticle (FLAME) -- 7.3 Paramagnetic Relaxation Enhancement (PRE) Effect -- 7.4 Gadolinium Based-19F MRI Nanoprobe for Monitoring Reducing Environment -- References -- Chapter 8: Circuit-Dependent Striatal PKA and ERK Signaling Underlying Action Selection -- References -- Chapter 9: Making Life Visible: Fluorescent Indicators to Probe Membrane Potential -- 9.1 Introduction -- 9.2 Rational Design of VoltageFluor Dyes -- 9.3 Voltage Imaging with Red-Shifted Dyes -- 9.4 Far-Red Voltage Imaging for High Sensitivity -- 9.5 Accessing Two-Photon Infrared Excitation for Imaging in Thick Brain Tissue -- 9.6 Targeting VoltageFluor Dyes to Specific Cells -- 9.7 Conclusion/Summary -- References -- Chapter 10: Molecular Dynamics Revealed by Single-Molecule FRET Measurement -- 10.1 Single-Molecule Fluorescence Imaging -- 10.2 Molecular Dynamics of Proteins Measured by smFRET -- 10.3 Advances in smFRET Methods -- 10.4 Conclusion -- References -- Chapter 11: Comprehensive Approaches Using Luminescence to Studies of Cellular Functions -- 11.1 < -- Fluoppi> -- -- 11.2 < -- Fucci> -- -- 11.3 < -- GEPRA> -- -- 11.4 < -- UnaG> -- -- References -- Part II: Imaging Disease Mechanisms -- Chapter 12: Making Chronic Pain Visible: Risks, Mechanisms, Consequences -- 12.1 Summary Abstract for Presentation Delivered at Uehara Meeting, June 2017 -- Chapter 13: Visualization of the Pathological Changes After Spinal Cord Injury (-From Bench to Bed Side-) -- 13.1 Diffusion Tensor Tractography -- 13.1.1 Basic Research -- 13.1.2 Clinical Significance of DTT -- 13.2 Myelin Map -- 13.2.1 Basic Research. , 13.2.2 Clinical Significance of Myelin Map -- 13.3 Resting-State Functional MRI -- References -- Chapter 14: Multimodal Label-Free Imaging to Assess Compositional and Morphological Changes in Cells During Immune Activation -- References -- Chapter 15: Investigating In Vivo Myocardial and Coronary Molecular Pathophysiology in Mice with X-Ray Radiation Imaging Approaches -- 15.1 Translating Imaging of Cardiac Function to Small Animals -- 15.2 The Importance of the Microvessels in Sustaining Cardiac Function -- 15.2.1 The Challenges Associated with Investigating Coronary Microvascular Function -- 15.2.2 Protocols for Assessment of Coronary Endothelial Function -- 15.3 Progress in Vascular Imaging of Small Animals with Lab Systems -- 15.4 Application of In Vivo SAXS to the Study of Myocardial Function in Mice -- References -- Chapter 16: Visualizing the Immune Response to Infections -- Chapter 17: Imaging Sleep and Wakefulness -- 17.1 Introduction: Behavioral Definition of Sleep -- 17.2 Oscillations in Sleep -- 17.3 Electrophysiological Insights into the Sleeping Brain -- 17.4 Imaging Techniques Show Novel Aspects of Sleep -- 17.5 Future Directions -- References -- Chapter 18: Abnormal Local Translation in Dendrites Impairs Cognitive Functions in Neuropsychiatric Disorders -- 18.1 Introduction -- 18.2 Results -- 18.2.1 TDP-43 Forms Co-Aggregates with DISC1 in Neurons -- 18.2.2 Role of DISC1 in Local Translation in Dendrites -- 18.2.3 TDP-43-DISC1 Co-Aggregation Inhibits Local Translation in Dendrites -- 18.2.4 DISC1-Dependent Behavioral Impairment and Rescue in TDP-220C Mice -- 18.3 Discussion -- References -- Chapter 19: Imaging Synapse Formation and Remodeling In Vitro and In Vivo -- 19.1 Synapse, Neuron, and Neural Network -- 19.2 In Vitro Imaging of Dynamic Synapses -- 19.3 In Vivo Imaging of Dynamic Synapses. , 19.4 In Vivo Imaging of Neocortical Circuits in Mouse Models of Developmental Disorders -- 19.5 Perspectives -- References -- Part III: Imaging-Based Diagnosis and Therapy -- Chapter 20: How MRI Makes the Brain Visible -- 20.1 Progress of Imaging to Investigate the Anatomy of the Brain -- 20.2 Imaging Brain Function with Functional MRI (fMRI) -- 20.3 Imaging Brain Tissue Microstructure with Diffusion MRI (dMRI) -- 20.4 Future of MRI -- References -- Chapter 21: Application of Imaging Technology to Humans -- 21.1 Introduction -- 21.2 MPM Technique Enables to Visualize the Histological Features of Fresh, Unstained Human Colorectal Mucosa and Can Be Used for Histopathological Diagnoses -- 21.3 Classification by Numerical Parameters Enables to Distinguish NL-MPM Images to Normal and Cancerous Tissues Quantitatively -- 21.4 Conclusion -- References -- Chapter 22: Theranostic Near-Infrared Photoimmunotherapy -- 22.1 Introduction -- 22.2 NIR-PIT Can Selectively Kill Various Cancer Cells -- 22.3 NIR-PIT Rapidly Enhances Nano-Drug Delivery -- 22.4 NIR-PIT Initiates Anti-Tumor Host Immunity and Promotes Rapid Healing -- 22.5 Targeting Systemic Metastases -- 22.6 Perspective -- References -- Chapter 23: Integrated Imaging on Fatigue and Chronic Fatigue -- 23.1 Introduction -- 23.2 Integrated Imaging Studies -- 23.3 PET Studies -- 23.4 MRI Morphometry -- 23.5 fMRI Study -- 23.6 MEG Study -- References -- Chapter 24: Development of Novel Fluorogenic Probes for Realizing Rapid Intraoperative Multi-color Imaging of Tiny Tumors -- 24.1 Rational Design of Organic Fluorogenic Probes Based on Unique Spirocyclization of Rhodamines by the Intramolecular Hydroxymethyl Group -- 24.2 Development of Novel Fluorogenic Green Probes for Biological and Medical Purposes, Especially for Intraoperative Rapid Tumor Imaging. , 24.3 Development of Novel Fluorogenic Scaffold for Detecting Protease Activity in Longer Wavelength by Optimizing the Spirocyclization Properties: Novel Strategy for Fluorescence-Assisted Surgery with Multicolor Protease Imaging (Iwatate et al. 2016 -- 24.4 Conclusion -- References -- Chapter 25: Coronary Heart Disease Diagnosis by FFRCT: Engineering Triumphs and Value Chain Analysis -- 25.1 Coronary Heart Disease Pathophysiology -- 25.2 Invasive Coronary Angiography Is Inefficient -- 25.3 Fractional Flow Reserve -- 25.4 CT Angiography -- 25.5 Comparing Costs -- 25.6 Economic Considerations for Translation to Routine Care -- 25.7 Conclusion -- References -- Chapter 26: Live Imaging of the Skin Immune Responses -- 26.1 Introduction -- 26.2 The Skin and Its Key Immune Cells -- 26.2.1 Dendritic Cells -- 26.2.2 Neutrophils -- 26.2.3 Macrophages -- 26.2.4 Mast Cells -- 26.2.5 T Cells -- 26.3 Tools for In Vivo Imaging -- 26.3.1 Microscopy -- 26.3.2 Animal Systems and Fluorescent-Cell Labelling Techniques -- 26.4 In vivo Imaging of Skin Immune Responses -- 26.4.1 Sterile Injury -- 26.4.2 Contact Hypersensitivity -- 26.4.3 Infection -- 26.4.4 Cancer -- 26.5 Concluding Remarks - Looking Ahead to the Future -- References -- Chapter 27: Development of Upright CT and Its Initial Evaluation: Effect of Gravity on Human Body and Potential Clinical Application -- 27.1 X-Ray Imaging of the Human Body -- 27.2 Cross-Sectional Imaging of Human Body -- 27.3 Development of Upright CT -- 27.4 Physical Properties and Clinical Data Analysis -- References -- Chapter 28: The Future of Precision Health & -- Integrated Diagnostics -- Reference -- Chapter 29: Imaging and Therapy Against Hypoxic Tumors with 64Cu-ATSM -- 29.1 Radiolabeled Cu-ATSM as a Hypoxia Imaging Agent for PET -- 29.2 64Cu-ATSM as a Theranostic Agent -- 29.3 64Cu-ATSM Theranostics for Cancer Stem Cells. , 29.4 Biodistribution and Dosimetry of 64Cu-ATSM.
    Additional Edition: Print version: Toyama, Yoshiaki Make Life Visible Singapore : Springer Singapore Pte. Limited,c2019 ISBN 9789811379079
    Language: English
    Subjects: Chemistry/Pharmacy , Biology
    RVK:
    RVK:
    Keywords: Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949301299402882
    Format: 1 online resource (235 pages)
    ISBN: 9789813349223
    Series Statement: Communications in Computer and Information Science Ser. ; v.1299
    Note: Intro -- Preface -- Organization -- Contents -- Access Control -- PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network -- 1 Introduction -- 2 Background -- 2.1 Password Attack -- 2.2 Password Sniffing Attack -- 2.3 Neural Network in Network Traffic Classification -- 3 Attack Model -- 4 PassEye Design -- 4.1 Overview -- 4.2 Feature Extraction and Selection -- 4.3 Neural Network Model -- 5 Evaluation -- 5.1 Environment Setup -- 5.2 Dataset -- 5.3 Effectiveness of PassEye -- 5.4 Discussion -- 6 Conclusion and Future Work -- References -- Research on the Development Route of International Communication Accesses -- 1 Background -- 2 Current Situation of International Communication Networks -- 2.1 International Communication Access -- 2.2 International Submarine Cable Construction -- 2.3 Cross-Border Terrestrial Cable Construction -- 3 Factors Affecting International Access Establishment -- 3.1 Policy Environment -- 3.2 Geographical Environment -- 3.3 Necessity of International Access Construction -- 3.4 Feasibility of International Access Construction -- 3.5 Security Assurance Measures -- 4 International Access Establishment Case -- 4.1 Environment Factor -- 4.2 Necessity Analysis -- 4.3 Construction Feasibility Analysis -- 5 International Access Development Recommendations -- 6 Conclusion -- References -- Cryptography -- A Secure Ranked Search Model Over Encrypted Data in Hybrid Cloud Computing -- 1 Introduction -- 2 Related Work -- 2.1 The Okapi BM25 Model Over Plain Text -- 2.2 Fully Homomorphic Encryption -- 2.3 The Applicability of Hybrid Cloud Computing -- 3 Secure Ranked Search Model Over Hybrid Cloud -- 3.1 The Architecture of the Secure Ranked Search Model Over Hybrid Cloud -- 3.2 The Implementation of Fully Homomorphic Encryption Based Secure Ranking Scheme -- 4 Experiment Result and Future Work. , 4.1 Preliminary Experimental Result -- 4.2 Future Work -- 5 Conclusion -- References -- Based on GAN Generating Chaotic Sequence -- 1 Introduction -- 2 Basic Adversarial Encryption Algorithm and Chaotic Map -- 2.1 Basic Adversarial Encryption Communication Model -- 2.2 Logistic Chaotic Map -- 3 Adversarial Encryption Algorithm Based on Logistic Mapping -- 3.1 Key Generator Based on GAN -- 3.2 The Overall Encryption Algorithm Design -- 4 Experimental Procedure -- 4.1 Experimental Environment -- 4.2 Key Security Analysis -- 4.3 Analysis of Encryption Model Performance -- 5 Conclusion -- References -- MinerGate: A Novel Generic and Accurate Defense Solution Against Web Based Cryptocurrency Mining Attacks -- 1 Introduction -- 2 Background -- 2.1 Cryptocurrency Mining and Cryptojacking Attacks -- 2.2 Related Web Techniques -- 3 System Overview -- 3.1 Challenges and Our Solutions -- 3.2 JavaScript Instrumentation -- 3.3 Machine Learning Based Detection -- 3.4 Data-Driven Feature Selection -- 3.5 Security Enforcement -- 4 Evaluation -- 4.1 Dataset -- 4.2 Accuracy -- 4.3 Overhead -- 5 Related Work -- 6 Conclusions and Future Work -- References -- Research on Industrial Internet Security Emergency Management Framework Based on Blockchain: Take China as an Example -- 1 Introduction -- 2 Situation and Challenge -- 2.1 Organizational Structure -- 2.2 Technical Status -- 2.3 Challenge -- 3 Overview of Blockchain -- 3.1 Principle -- 3.2 Research Status -- 4 Consortium-Blockchain-Based ISEMS -- 4.1 Base Model -- 4.2 Architecture -- 4.3 Organization Structure -- 4.4 Critical Process -- 5 Summary and Prospect -- References -- Research Status and Prospect of Blockchain Technology in Agriculture Field -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Core of Blockchain Technology in Agriculture -- 2.2 Application of Blockchain in Agriculture. , 3 Current Situation of Agricultural Supply Chain -- 3.1 Upstream Link -- 3.2 Mid-Stream Link -- 3.3 Downstream Link -- 3.4 Trading Link -- 4 Current Status of Agricultural Products Traceability -- 4.1 Solves the Problem of Accountability for Agricultural Products -- 4.2 Solves the Problem of Traceability Trust for Agricultural Products -- 5 Summary and Prospect -- References -- Denial-of-Service Attacks -- Practical DDoS Attack Group Discovery and Tracking with Complex Graph-Based Network -- 1 Introduction -- 2 Methodology and Background -- 3 DDoSAGD - DDoS Attack Group Discovery Framework -- 3.1 Basic Concepts and Fundamental Graph Initialization -- 3.2 Meta Path-Based Similarity Framework -- 3.3 Hierarchical Community Discovery -- 4 Evaluation -- 4.1 Statistics of Input Data and Graphs -- 4.2 Situation Awareness of DDoS Attack Groups -- 5 Conclusion -- References -- Hardware Security Implementation -- Research on the Remote Deployment Design of OTN Electrical Racks -- 1 Background -- 1.1 Current Situation -- 1.2 Inevitability of Remote Electrical Rack Deployment -- 2 Implementation Mode and Impact -- 2.1 Implementation Modes -- 2.2 Impact on System OSNR -- 2.3 Impact on the Receive Optical Power of the OM/OD or OTU Boards -- 2.4 Other Impacts -- 3 Applicability Analysis -- 3.1 Advantages and Disadvantages -- 3.2 Scenario Analysis -- 4 Test Models and Simulation -- 4.1 Scenario-Based Modeling -- 4.2 Solution-Based Simulation for Different Scenarios -- 4.3 Conclusion -- 5 Application on Live Networks -- 5.1 Live Network Description -- 5.2 Solution Selection -- 6 Conclusions and Suggestions -- Intrusion/Anomaly Detection and Malware Mitigation -- An Effective Intrusion Detection Model Based on Pls-Logistic Regression with Feature Augmentation -- 1 Introduction -- 2 Methodology -- 2.1 Feature Augmentation. , 2.2 Pls-Logistic Regression Classification Model -- 3 Proposed Intrusion Detection Model: Fa-Plslogistic -- 4 Experimental Setting -- 4.1 Dataset Description -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- DeepHTTP: Anomalous HTTP Traffic Detection and Malicious Pattern Mining Based on Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Malicious Traffic Detection -- 2.2 Pattern Mining Method -- 3 Preliminaries -- 3.1 DeepHTTP Architecture and Overview -- 3.2 Data Preprocessing -- 4 Our Approach -- 4.1 Anomaly HTTP Traffic Detection -- 4.2 Mining Stage -- 5 Evaluation -- 5.1 Dataset -- 5.2 Validation of Structural Feature Extraction Method -- 5.3 Model Comparison -- 5.4 Malicious Pattern Mining -- 6 Conclusion -- References -- Social Network Security and Privacy -- A Label Propagation Based User Locations Prediction Algorithm in Social Network -- 1 Introduction -- 2 Related Work -- 3 Related Concept and Problem Definition -- 4 Label Propagation Based User Location Prediction Algorithm -- 5 Experiment Result and Analysis -- 5.1 Data Set Description -- 5.2 Experimental Results Analysis -- 6 Conclusion -- References -- Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization -- 1 Introduction -- 2 Related Work -- 3 System Overview -- 4 Module Design -- 4.1 Location Division Module -- 4.2 Personalized Location Privacy -- 4.3 Location Density Collection Module -- 5 Experimental Validation -- 5.1 Experiment Setup -- 5.2 Experiment Results -- 6 Conclusion -- References -- Systems Security -- Analysis on the Security of Satellite Internet -- 1 Introduction -- 2 Related Work -- 3 Analysis of SI Security -- 3.1 Overview of Security Issues of SI -- 3.2 National Security Issues -- 3.3 Network Security Issues -- 3.4 Equipment Security Issues -- 4 Conclusion -- References. , A Survey on Cyberspace Search Engines -- 1 Introduction -- 2 Supporting Internet Protocols -- 3 Total Amounts of Detected Devices -- 4 Device Information -- 5 Scanning Frequency -- 6 System Architecture -- 7 Third Party Databases -- 8 Probes Distribution -- 9 Conclusion -- References -- Brief Introduction of Network Security Asset Management for Banks -- 1 Introduction -- 2 Detection of Network Security Assets -- 3 Management of Network Security Assets -- 4 Applications of Network Security Assets -- 5 Design of Network Security Assets Management System -- 6 Conclusions -- References -- Embedded Security-Critical Device Resource Isolation -- 1 Introduction -- 2 Related Work -- 2.1 Resource Software Isolation -- 2.2 Resource Hardware Isolation -- 2.3 Current Status of Research on Resource Isolation of Vehicle System -- 2.4 Current Status of Anti-virus Software Running on Vehicle Systems -- 3 Modeling of Vehicle Resource Isolation System -- 3.1 Isolation Model Design -- 3.2 Implementation and Verification of on-Board System -- 3.3 Test and Analysis -- 4 Conclusion -- References -- Author Index.
    Additional Edition: Print version: Lu, Wei Cyber Security Singapore : Springer Singapore Pte. Limited,c2021 ISBN 9789813349216
    Language: English
    Keywords: Electronic books. ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    almahu_9949708066202882
    Format: 1 online resource (367 pages)
    Edition: 1st ed.
    ISBN: 9783031335334
    Note: Intro -- Contents -- 1: Rise of the Theranostics Empire: A Commentary on Dr. Baum's Achievements -- 1.1 The Beginning -- 1.2 The Impedance -- 1.3 The Fertilization -- 1.4 Hard Yards -- 1.5 Expansion of the Empire -- 1.6 New Capital -- 2: Review of F-18 FDG PET/CT in Evaluating Response to Immunotherapy Treatment -- 2.1 Introduction -- 2.2 Patterns of Response -- 2.2.1 Pseudoprogression -- 2.2.2 Hyperprogression -- 2.2.3 Durable Response -- 2.3 Mechanism -- 2.4 18FPET CT and irAE -- 2.4.1 Therapy-Related Inflammation and Inverse Relation Liver SUV/Spleen SUV [18] -- 2.5 Conclusion -- References -- 3: Surgery in Combination with Peptide Receptor Radionuclide Therapy: A Novel Approach for the Treatment of Advanced Neuroendocrine Tumours -- 3.1 Introduction -- 3.2 Molecular Imaging of Neuroendocrine Neoplasms -- 3.3 Surgical Treatment -- 3.4 Surgery in Combination with Peptide Receptor Radionuclide Therapy -- 3.5 Conclusions -- References -- 4: From Concept to Clinic and Commercialization: Cowboys Wanted -- 4.1 Professor Richard Baum -- 4.2 The Great Bexxar® Disaster -- 4.3 "Us Versus Them" -- 4.4 Intellectual Property: Who Cares? -- 4.5 Imaging Is Not an Easy Business -- 4.6 Entrepreneurs Beware -- 4.7 Build It and They Will Come -- 4.8 A Fragile Supply Chain -- 4.9 Future Frontiers -- 4.10 Concluding Remarks -- References -- 5: From Radiochemistry of the Lanthanides to 225Ac and the Interference with Richard Baum -- 5.1 Personal Introduction -- 5.2 Situation of Nuclear Medicine in the 60-th -- 5.3 How to Make Sort-lived Nuclides Far from Beta Stability -- 5.4 Optimized Extraction Chromatography -- 5.5 Separations Based on Szilard-Chalmers Effect -- 5.6 High-temperature Release Studies of Radio-lanthanides from Refractory Metals -- 5.7 ISOLDE and the On-line Production Lanthanide Nuclides. , 5.8 Isotopes in Medicine: Situation in the 60-th -- 5.9 Metallic Positron Emitters -- 5.10 The Alpha Emitters 149Tb and 225Ac -- 5.11 From "Radioactive Ion Beams for Bio-Medical Research" Until CERN Medicis: A New Facility -- 5.12 The 225Ac Story -- 5.13 Where the 225Ac Comes From -- 5.14 Summarizing -- References -- 6: "How Do You Feel About Dosimetry?" The Gretchenfrage of Radionuclide Therapy -- 6.1 The Gretchenfrage -- 6.2 The Forms of Dosimetry in a Nutshell -- 6.3 Dose Quantities and Dose-Response in EBRT -- 6.4 Dose-Response I: Radiotoxicities in Radionuclide Therapy -- 6.5 Dose-Response II: Tumor Response in Radionuclide Therapy -- 6.6 The Answer to the Gretchenfrage -- References -- 7: The LuGenIum Triptych: Ode to a Theranostic Transcriptome -- 7.1 Retrospective Analysis of Toxicity -- 7.2 Circulating NET Transcripts -- 7.3 Circulating NET Transcripts and SSR Imaging -- 7.4 Circulating NET Transcripts and PRRT -- 7.5 Validation Study of PRRT Genomic Signature in Blood (PPQ) for the Prediction of 177Lu-octreotate Efficacy -- 7.6 Validation Study of Multigene NET-Specific Circulating Transcript Signature for the Monitoring of 177Lu-octreotate Efficacy -- 7.7 Future Developments -- References -- 8: A Tree Can Be Recognized by Its Fruit -- 8.1 Introduction -- 8.2 Fruits of Scientist Baum -- 8.3 Fruits of Doctor Baum -- 8.3.1 Fruits of Our Friend Baum -- References -- 9: IAEA Strategy for Enhancing the Sustainability of Nuclear Medicine in Low- and Middle-Income Countries -- 9.1 Introduction -- 9.2 Key Challenges -- 9.3 Interventions -- 9.4 Results -- 9.4.1 Technical Cooperation Programme -- 9.4.2 Quality Assurance -- 9.4.3 Procurement -- 9.4.4 Education -- 9.4.5 Coordinated Research Activities -- 9.5 Conclusion -- References -- 10: Radionuclide Therapy in Brain Tumours -- 10.1 Introduction. , 10.1.1 Radionuclides Used in the Therapy -- 10.1.1.1 Alpha-Emitter Radionuclide -- 10.1.1.2 Beta-Emitter Radionuclide -- 10.1.2 Routes of Drug Administration -- 10.1.2.1 Systemic Administration of Radioconjugates -- 10.1.2.2 Locoregional Application of Radioconjugates -- 10.2 Peptide Receptor Radionuclide Therapy -- 10.2.1 Biologic Targets for PRRT -- 10.2.1.1 Neurokinin Type 1 Receptor -- 10.2.1.2 Glioma Chloride Channels -- 10.2.1.3 Somatostatin Receptor -- 10.2.2 Clinical Studies -- 10.3 Immune-Based Radionuclide Therapy -- 10.3.1 Biologic Targets for RIT -- 10.3.1.1 Tenascin-C -- 10.3.1.2 Epidermal Growth Factor Receptor -- 10.3.1.3 Neural Cell Adhesion Molecule -- 10.3.1.4 Histone H1 -- 10.3.2 Future Novel Targets -- 10.3.2.1 Fibulin-3 -- 10.3.3 Clinical Studies -- 10.3.4 Challenges and Future Directions -- 10.3.4.1 Challenges -- 10.3.4.2 The Blood-Brain Barrier (BBB) -- 10.3.4.3 Tumoral Heterogeneity -- 10.3.5 Conclusion -- References -- 11: Modern Diagnostic and Therapeutic Approaches in Thyroid Diseases: Theranostics and the Changing Role of Radioactive Isotopes -- 11.1 Conclusion -- References -- 12: Cardiotoxicity of Targeted Therapies: Imaging of Heart Does Matter -- 12.1 Cancer Targeted Therapies -- 12.2 Cardiotoxicity of Cancer Targeted Therapy -- 12.3 Diagnostic Tools to Detect Myocardial Toxicity -- 12.3.1 Anamnesis and Risk Stratification -- 12.3.2 Electrocardiography -- 12.3.3 Cardiac Biomarkers -- 12.3.4 Imaging Modalities for Cardiotoxicity Screening -- 12.3.4.1 Echocardiography -- 12.3.4.2 Cardiac Magnetic Resonance -- 12.3.4.3 Nuclear Positron Emission Tomography -- 12.3.4.4 Conventional Nuclear Imaging -- 12.3.4.5 Cardiac Computed Tomography, Angio-Coronary Computer Tomography -- 12.4 Summary -- References. , 13: The Evolution of n.c.a. 177Lu to n.c.a. 177Lu-Edotreotide for the Treatment of Neuroendocrine Tumours. Sixteen Years of Collaboration Between Zentralklinik Bad Berka and ITM -- 13.1 Introduction -- 13.2 No-Carrier-Added Lutetium-177: The Gold Standard for Radionuclide Treatment -- 13.3 No-Carrier-Added Lutetium-177-Edotreotide for Treatment of Neuroendocrine Tumours -- 13.4 Conclusion and Acknowledgements -- References -- 14: Fighting for PET in German Oncological Guidelines and for Its Reimbursement by Statutory Health Insurances -- References -- 15: Precision Oncology with PSMA-Targeted α-Particle Therapy of mCRPC -- 15.1 Introduction -- 15.2 Prostate-Specific Membrane Antigen as Biological Target -- 15.3 PSMA PET -- 15.4 PSMA β-Particle Radioligand Therapy -- 15.5 PSMA α-Particle Radioligand Therapy -- 15.5.1 Actinium-225 -- 15.5.2 Bismuth-213 -- 15.5.3 Thorium-227 -- 15.5.4 Lead-212 -- 15.5.5 Terbium-149 -- 15.6 Summary -- References -- 16: From Radioimmunodetection to Radiomolecular Precision Oncology Via Radionanotargeting by Intelligent Multidisciplinary Radiotheragnostic Nanoparticles -- References -- 17: Nuclear Medicine and Surgery on the Way to Personalized Medicine. Ten Years of Clinical and Translational Oncology and Research -- References -- 18: PSMA Radioligand Therapy: A Revolution in the Precision Radiomolecular Oncology of Prostate Cancer -- References -- 19: The Role of Individuals for Innovation: The Nuclear Medicine Biotope -- References -- 20: Working at Isotopentherapiestation D3: A Daily Challenge or Adventure Never Stops -- 21: Theranostics in Australia: The Importance of Vision and Training, and the Power of Collaboration -- References -- 22: Theranostic Radiopeptides in Nuclear Oncology: Design, Preclinical Screening, and Clinical Translation -- 22.1 Introduction. , 22.2 Peptides and GPCR Targets on Tumors -- 22.3 Radiometals and Their Chelators in Cancer Theranostics -- 22.4 Metabolic Stability of Radiopeptides: The Pep-Protect Concept -- 22.5 Radiopeptide Agonists and Antagonists -- 22.6 Radiopeptide Candidates for Clinical Translation -- References -- 23: Terbium "Sisters": More Than just a "Swiss Army Knife" -- 23.1 Introduction -- 23.2 The PET Sister: Terbium-152 -- 23.3 The SPECT Sister: Terbium-155 -- 23.4 The Alpha Therapy Sister: Terbium-149 -- 23.5 The Beta TherapyPLUS Sister (βτ̔̈ΑΕ·/Conversion/Auger-e)̄: Terbium-161 -- 23.6 Conclusion and Outlook -- References -- 24: High-Performance Radiopharmacy: The Base for Precision Oncology -- References -- 25: Analyzing the Science Footprint of Richard P. Baum -- 25.1 Introduction -- 25.2 Material and Methods -- 25.3 Results -- 25.4 Discussion -- 25.5 Conclusion -- References -- 26: Therapy of Castration-Resistant Prostate Cancer: Where Is the Place of 225Ac-PSMA? -- 26.1 Introduction -- 26.2 177Lu-PSMA Versus 225Ac-PSMA PRT in mCRPC -- 26.3 Efficacy of 225Ac-PSMA as a Last-Line Therapy of mCRPC -- 26.4 Toxicities of 225Ac-PSMA for PRLT of mCRPC -- 26.5 Upfront Application of 225Ac-PSMA for Therapy of mCRPC in Chemotherapy-Naïve Patients -- 26.6 Conclusion and Future Perspectives -- References -- 27: Sola Dosis Facit Venenum: Dosimetry for Molecular Radiotherapy in Bad Berka -- 27.1 Introduction -- 27.2 Bad Berka Dose Protocol -- 27.3 Dosimetry in Daily Clinical Routine -- 27.4 Dosimetry for PRRT -- 27.5 PRRT Antagonists -- 27.6 Dosimetry for PSMA Radioligand Therapy -- 27.7 Conclusions -- References -- 28: On the Use of 203Pb Imaging to Inform 212Pb Dosimetry for 203/212Pb Image-Guided Alpha-Particle Therapy for Cancer -- 28.1 Introduction -- 28.2 203Pb SPECT/CT Imaging in Advance of 212Pb α-RT. , 28.3 Prediction of 212Pb Dosimetry Based on 203Pb Imaging.
    Additional Edition: Print version: Prasad, Vikas Beyond Becquerel and Biology to Precision Radiomolecular Oncology: Festschrift in Honor of Richard P. Baum Cham : Springer International Publishing AG,c2024 ISBN 9783031335327
    Language: English
    Keywords: Electronic books. ; Festschrift ; Festschrift
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949892211502882
    Format: XI, 392 p. 53 illus., 43 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9783031675119
    Series Statement: Springer Proceedings in Business and Economics,
    Content: This volume examines how innovation and digital transformation impact the financial and accounting sectors. Featuring selected contributions from the third 'Finance, Accounting and Law in the Digital Age conference 2024' held at the University of Salamanca, Spain, the contributions of this book explore the development of digital finance and the complicated equation between financial stability, the security of investors and financial consumers, sustainable finance, and support for innovation. Climate change and the exponential growth of technology have built an explosion of financial innovation. The digital revolution has recently reached the financial sector, protected by a specific regulatory environment. The volume describes how all areas of finance are now invested by new players who are transforming the banking and financial landscape to create a novel digital ecosystem.
    Note: Chapter 1. A Review of Literature on TOS Practices for Test Item Analysis: Input for Institutional Test Banking System and Educational Institution's Examination and Student Grading System of Quezon City University -- Chapter 2. Exploring the Role of Fintech in Terrorism Financing: Legal Frameworks and Solutions -- Chapter 3. CSR and Board Gender Diversity Impact on the Corporate Performance -- Chapter 4. Artificial Intelligence and the 'data Act' in the European Union: A Legal and Economic Analysis of New Digital Regulations and Their Impact on Citizens' Rights and Business Innovation -- Chapter 5. Driving Success: Examining the Influence of Innovation Culture on Artificial Intelligence Adoption and Firm Performance in Asian SMEs -- Chapter 6. Analysing the Role of Electronic Word of Mouth (eWOM) in Shaping Consumer Intent and Behaviour Towards Eco-friendly Tourism Destinations -- Chapter 7. Challenges and Opportunities in Translation Studies: the Evolving Role of Generative Ai in Translation Development -- Chapter 8. Detecting Denial-of-service (DoS) Attacks With Edge Machine Learning -- Chapter 9. Simulation of the Influence of Inventory Valuation Methods on Vat Settlements in Retail Trade -- Chapter 10. CEO Characteristics on and Dividend Payout Policies: Evidence From Emerging Market -- Chapter 11. Tech-infused Bites: Customer Adoption Factors in Quick Commerce Food Delivery Services -- Chapter 12. Beyond the Price Tag: Exploring the Broader Socioeconomic Consequences of Pink Tax on Women's Financial Well-being -- Chapter 13. Future Directions of Shariah Audit for Takaful Industry: Perceptions of Shariah Committee -- Chapter 14. Tax Fraud, Tax Evasion, and Tax Avoidance: A Comparative Bibliometric Analysis -- Chapter 15. Tax Incidence: a Bibliometric Analysis -- Chapter 16. Housing Demand, Affordability and Mortgage Financing: A Case Study of Karachi -- Chapter 17. Examining the Sustainable Effects of Integrating Insurtech Into the Indian Insurance Sector From a Perspective of Customer Satisfaction -- Chapter 18. Performance of Indebted Companies Using a Machine Learning Approach -- Chapter 19. The Role of the Judiciary in Post Covid-19 Economic Recovery in Nigeria -- Chapter 20. Enhancing Transparency and Accountability in Sadaqah Crowdfunding Platforms: Leveraging Blockchain Technology for Optimal User Experience -- Chapter 21. Investment Arbitration and Renewable Energy Disputes -- Chapter 22. Towards a Greener Future: Exploring the Nexus between Green Finance and Sustainable Development"- A Theoretical Approach.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031675102
    Additional Edition: Printed edition: ISBN 9783031675126
    Additional Edition: Printed edition: ISBN 9783031675133
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9949881074902882
    Format: 1 online resource (1122 pages)
    Edition: 1st ed.
    ISBN: 9783031484087
    Note: Intro -- Foreword -- Preface -- Learning Tracks: Fields of Study and Practice -- Acknowledgments -- Contents -- Editors and Contributors -- About the Editors -- Contributors -- Abbreviations -- I: Pandemic Preparedness and Research Response: A Necessary New Field -- 1 Introduction -- 2 Clinical Research on Infectious Diseases: An Overview -- 1 Introduction -- 2 Evolution of Clinical Trial Methodology -- 2.1 The Inclusion of a Placebo Group in Clinical Trial Design -- 2.2 Concurrent Versus Historical Control Groups -- 2.3 Randomization Versus Alternation in Enrollment -- 2.4 Formal Ethical and Regulatory Frameworks -- 3 Critical Ground Rules for Research Studies During Epidemics -- 3.1 Jurisdictional Levels and Collaborations -- 3.2 Community Engagement -- 3.3 Identifying and Clarifying the Elements of Engagement -- 3.4 Broad-Based Scientific Participation -- 3.5 Communication and Messengers -- 3.6 Special Considerations in Conflict Zones and Failed States -- 4 Lessons Learned from Emergency Clinical Research -- 4.1 The Genesis of the Ebola Epidemic in West Africa: The Consequences of Early Errors in Response -- 4.2 Launching Clinical Trials of Therapeutics and Vaccines -- 4.3 Is it Ethical to Conduct Controlled Clinical Trials During a Public Health Emergency? -- 4.4 Contentious Study Design Issues -- 4.5 The Relevance of Adaptive Clinical Trial Designs and Prepositioned Research and Patient Networks -- 4.6 Achieving Trust and Support of the Affected Community -- 4.7 Speeding the Clinical Research Process and Regulatory Approval Without Compromising Safety -- 4.8 Recommendations to Improve Clinical Research and Trials During Public Health Emergencies -- 4.9 The Emergence of SARS-CoV-2 and the COVID-19 Pandemic -- 5 Conclusions -- References -- 3 Guiding Principles for Emergency Research Response -- 1 Introduction -- 2 Principles. , 2.1 Principle 1: Research Should Be an Integral Part of Preparedness and Emergency Response -- 2.2 Principle 2: Research Response Should Align with the Goals of the Health Emergency -- 2.3 Principle 3: Research Response Should Be Implemented Quickly and Efficiently Based on Outbreak Preparedness Plans -- 2.4 Principle 4: The Scientific and Ethical Norms for Human Subject Research Do Not Change During a Health Emergency -- 2.5 Principle 5: Research Response Should Be Led by the Government of the Country Experiencing the Health Emergency -- 2.6 Principle 6: Good Participatory Practice Applies to Research in Health Emergencies -- 3 Other Applicable Principles and Considerations -- References -- II: Norms for Emergency Research Response -- 4 Ethics of Pandemic Research -- 1 Introduction -- 2 Do Pandemics Necessitate or Justify Deviations from Ethical and Scientific Standards for Research? -- 3 Do Pandemics Raise Novel Ethical Issues for Research? -- 4 Setting Research Priorities During a Pandemic -- 5 Research Versus Response or Research as Response? -- 6 Research Governance, Coordination, and Oversight During Pandemics -- 7 Conclusion -- References -- 4.1 In Practice: Vaccine Efficacy and Safety Testing-An Ethical Case for Individual Randomization -- 1 Introduction -- 2 Supporting Considerations -- 3 Conclusion -- References -- 4.2 In Practice: Research Ethics Committee Review in Public Health Emergencies -- 1 Introduction -- 2 Historical Notes -- 3 Research Intervention in a Public Health Emergency -- 4 Seeking and Retaining Stakeholder Commitment -- 5 Future Directions -- References -- 5 Health Emergency Research amid Global Inequities: Some Considerations for Researchers -- 1 Introduction -- 2 Research Participants and Communities -- 2.1 Research Participant Rights and Benefits -- 2.2 Building Mutual Respect with Communities. , 2.2.1 Respect Community Beliefs and Cultural Practices -- Include all Relevant Stakeholders -- 2.2.2 Avoid Exploitation and the Perception of Exploitation -- 2.3 Post-trial Access to Trial Products, Procedures, or Devices -- 3 Partnerships -- 3.1 Minimizing North-South Inequality in Research Partnerships -- 3.2 Fair Treatment and Support for Front-Line Workers -- 3.3 Equity in Publication -- 3.4 Work with Non-government Organizations (NGOs) Already on the Ground or with Relevant Experience -- 4 Nation-States and Global Response -- 4.1 When Governments Put Their Own Interests First -- 4.2 Protecting Nations at Risk -- 4.3 International Economic Interventions Can Undermine Preparedness -- 4.4 National Sovereignty vs. Possible Global Impact -- 5 Questions and Conclusion -- 5.1 Can We Achieve Sustainable Preparedness and Response? -- 5.2 Conclusion -- References -- 6 Meeting Regulatory Criteria and Seeking Licensure: Medicines Development Before and During Public Health Emergencies -- 1 Introduction -- 2 Development and Licensure of Medicinal Products in Brief -- 3 Medical Countermeasure Development During a Public Health Emergency -- 4 Lessons Learned and Regulatory Strategies to Prepare for Future Emergencies -- 4.1 Chemistry, Manufacturing, and Controls and Reliance on Available Data on Platform Technologies -- 4.2 Preclinical Studies -- 4.3 Clinical Studies -- 4.4 Post-approval Monitoring -- 5 Regulatory Communications and Stakeholder Exchange -- 5.1 Additional Considerations on Chemistry, Manufacturing, and Controls -- 6 Concluding Remarks -- References -- 7 Research, Sample, and Data Sharing During Outbreaks, Pandemics, and Beyond -- 1 Introduction -- 2 The Impact of Pandemic Diseases on Health Data Sharing -- 3 The Utility of Viral Sequences -- 4 Sharing Data -- 4.1 Mechanisms for Sharing Data -- 4.2 Rapidity vs. Equity? -- 4.3 Legal Frameworks. , 5 A Roadmap to Improve Data Sharing -- 6 Conclusion -- References -- III: Preparedness for Emergency Research Response -- 8 Building Biomedical Research Capacity in Low- and Middle-Income Countries: Why It Matters and Some of the Barriers to Success -- 1 Introduction -- 2 Local or National Research Agendas Enable Research Capacity to Respond to Local Needs -- 3 Investing in Local Research Infrastructure Before Crises -- 3.1 Education and Training -- 3.2 Institutional Infrastructure -- 3.3 Operational Needs -- 3.4 Community Engagement -- 4 Research, Public Health, and Healthcare Capacity as Synergistic Forces for EID Response -- 5 COVID-19 and Lessons for Research Capacity Strengthening -- 6 Systemic Challenges to LMIC Research Capacity Strengthening -- 7 Conclusion -- References -- 9 Laboratory Needs for Research Response -- 1 Introduction -- 2 Who, What, Where, When, and Why -- 3 Field Laboratories -- 3.1 Where? Site Location -- 3.2 Assay and Equipment Selection -- 3.3 Regulatory and Legal Concerns -- 3.3.1 Regulatory Management Tools for Emergencies -- 3.3.2 Expedited Evaluation and Approval Processes -- 3.3.3 Diagnostic Preparedness -- 3.4 Specimen Collection, Transport, and Storage -- 3.5 Obstacles to Proper Sample Packaging and Transport -- 4 Implementing Effective Laboratory Biosafety and Biosecurity -- 5 Documentation, Data Quality, and Data Management -- 6 Case Study -- 7 Summary and Conclusion -- References -- 10 Understanding How and Where Pathogens Emerge: Preparedness and Response for Zoonotic Diseases -- 1 Introduction -- 2 Why Is Pre-outbreak Information Important? -- 2.1 Impact of Uncontrolled Emerging Zoonoses -- 2.2 Increasing Rates of Emergence and Potential Future Threats -- 2.3 Availability of Targeted Interventions to Prevent, Detect, and Respond to Emerging Zoonoses. , 2.4 Time, Focus, and Resources Are Limited Once Outbreaks Start -- 3 Pre-outbreak Information: What We Already Know About How and Where Pathogens Emerge -- 3.1 The Risk Landscape Is Not Uniform: Specific Conditions Create Spillover Hot Spots -- 3.2 Specific Conditions and Human Behaviors at Hot Spots Affecting Spillover, Amplification, and Geographical Spread -- 3.3 Certain Animals Tend to Be Associated with Zoonotic Pathogens and Spillover Events -- 3.4 Some Zoonotic Pathogens Are More Capable of Spillover -- 3.5 Spillover of Zoonotic Pathogens Can Change Over Time -- 3.6 Interventions to Reduce Spillover Risk -- 4 What We Still Need to Know -- 4.1 Characterization of Risk at the Animal-Human-Environment Interface -- 4.2 Developing and Assessing Safety and Efficacy of Interventions to Reduce Spillover, Amplification, and Geographical Spread -- 5 Pre-outbreak Information: Best Practices and Recommendations -- 5.1 Strengthening Country Capacities Improves Detection and Response for Zoonotic Pathogens -- 5.2 Systematic Collection of Pre-outbreak Information -- 5.3 Surveillance and Research Networks Improve Information Sharing, Preparedness, and Response -- 5.4 Targeted Risk Reduction Interventions Work -- 5.5 Coordination with Other Infectious Disease Programs and Across Sectors to Improve Prevention, Detection, and Response -- 5.6 Linking Action Plans to Resource Mapping -- 6 Recommendations -- 6.1 Strengthen and Prioritize Collection of Pre-outbreak Information -- 6.1.1 Country Activities, Taking into Consideration the Best Practices and Gaps Previously Mentioned -- 6.1.2 Regional and Global Activities, Taking into Consideration the Best Practices and Gaps Previously Mentioned -- 6.2 Strengthen In-County Data Systems and Their Linkages with International Databases. , 6.2.1 Country Activities, Taking into Consideration the Best Practices and Gaps Previously Mentioned.
    Additional Edition: Print version: Higgs, Elizabeth S. Principles and Practice of Emergency Research Response Cham : Springer International Publishing AG,c2024 ISBN 9783031484070
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almafu_9961612465702883
    Format: 1 online resource (942 pages)
    Edition: 1st ed. 2024.
    ISBN: 9789819731800
    Series Statement: Lecture Notes in Networks and Systems, 994
    Content: This book provides an insight into 12th International Conference on Soft Computing for Problem Solving (SocProS 2023), organized by The Department of Applied Mathematics and Scientific Computing, Saharanpur Campus of Indian Institute of Technology, Roorkee, India, in conjunction with Continuing Education Center during 11–13 August 2023. This book presents the latest achievements and innovations in the interdisciplinary areas of soft computing, machine learning, and data science. It covers original research papers in the areas of algorithms (artificial neural network, deep learning, statistical methods, genetic algorithm, and particle swarm optimization) and applications (data mining and clustering, computer vision, medical and health care, finance, data envelopment analysis, business, and forecasting applications). This book is beneficial for young as well as experienced researchers dealing across complex and intricate real-world problems for which finding a solution by traditional methods is a difficult task.
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- MIM-ViT: Deepfake Detection Using Masked Image Modelling and Vision Transformer -- 1 Introduction -- 2 Related Work -- 2.1 Deepfake Generation -- 2.2 Deepfake Detection -- 2.3 Research Gaps in Existing Work -- 3 Proposed Architecture -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Face Quality Testing -- 3.4 Model -- 4 Experimental Setup -- 5 Results and Discussion -- 5.1 Performance Metrics -- 5.2 Experiments -- 6 Conclusion and Future Scope -- References -- A Study on Generalized Hough Transform for Detecting Fuzzy Lines -- 1 Introduction -- 2 Preliminaries -- 2.1 Classical Hough Transform -- 3 Fuzzy Hough Transform -- 3.1 Generalized Version of Fuzzy Hough Transform -- 3.2 Fuzzy Line Detection Using FHT -- 4 Similarity Measure Between Two Fuzzy Lines -- 4.1 Distance Measure Between Two Fuzzy Lines -- 5 Experimental Results -- 6 Conclusion -- References -- 'KSK' Algorithm for Optimizing DCS Performance Using 'R' -- 1 Introduction -- 2 Literature Review -- 3 Objective -- 4 Technique -- 5 Flowchart of Algorithm -- 6 Implementation -- 7 Comparison -- 8 Conclusion -- References -- A Knee-Based Multi-objective Optimization for Gait Cycle of 25-DOF NAO Humanoid Robot -- 1 Introduction -- 2 Past Studies -- 3 Knee-Based Optimization Methodology -- 3.1 Angle-Based Focus -- 3.2 Utility-Based Focus -- 4 Problem Definition -- 5 Multi-Objective Optimization Formulation -- 6 Results and Discussion -- 7 Conclusions -- References -- Estimating Severity for Knee Osteoarthritis Radiographs Using Deep Learning and Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Methods and Materials Used -- 3.1 Dataset Used -- 3.2 Dataset Pre-processing -- 3.3 Extracting Relevant Features -- 3.4 Classification -- 3.5 Investigating Parameters -- 4 Experimental Analysis -- 5 Conclusion -- References. , Knee-Osteoarthritis Detection Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Methodology -- 4.1 Image Preprocessing -- 4.2 Application of CNN Algorithm -- 4.3 Dataset -- 4.4 Training -- 5 Results -- 6 Implementation of Online Tool -- 7 Benefits -- 8 Conclusion and Future Scope -- References -- Hybrid Method for Named Entity Recognition in Kumauni Language Using Machine Learning -- 1 Introduction -- 1.1 NER and Its Approaches -- 1.2 Applications of Named Entity Recognition -- 2 Review of Literature -- 3 Background Study -- 4 Problem Formulation -- 5 Research Objectives -- 6 Research Methodology -- 6.1 CRF -- 6.2 CNN -- 6.3 Bi-LSTM -- 7 Proposed Methodology -- 8 Results and Discussion -- 8.1 Dataset Description -- 8.2 Performance Measure -- 9 Results and Discussion -- 10 Comparative Analysis -- 11 Conclusion and Future Work -- References -- Implementation of Basic Mathematical Operations on Openpower-ISA of Libresoc -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Implementation -- 4 Results and Discussions -- 4.1 Implementation for Addition Operation -- 4.2 Implementation for Subtraction Operation on the Decoder Test Cases of Openpower-ISA -- 4.3 Implementation for Multiplication Operation -- 4.4 Implementation for Division Operation -- 5 Conclusion -- 6 Future Scope -- References -- Machine Learning-Based Node Localization in IoT-Assisted WSN: An Initial Framework for Real-Time Applications -- 1 Introduction -- 1.1 Main Contributions -- 2 Related Work -- 3 Localization in IoT -- 4 Machine Learning-Based Localization in IoT Context -- 5 Proposed Framework for ML-Based Localization in IoT-Assisted WSN -- 5.1 Offline Phase -- 5.2 Model Selection and Training -- 5.3 Online Phase -- 5.4 Node Localization -- 6 Conclusion -- 7 Future Scope -- References. , Implementing Blockchain Technology in Healthcare: An Overview, Key Requirements, and Challenges -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Future Scope -- 5 Conclusion -- References -- Path Planning for Autonomous Ground Vehicles by Applying Modified Harris Hawks Optimization Technique -- 1 Introduction -- 2 Problem Description and System Modeling -- 3 Modified Harris Hawks Optimization (MHHO) Algorithm -- 4 Simulation Results and Discussions -- 4.1 Performance of the Modified HHO Optimization Algorithm -- 4.2 Performance of MHHO Optimization Algorithm in Path Planning Algorithms -- 5 Conclusion and Future Scope -- References -- Glaucoma Classification Using Improved Pretrained Model -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Phase 1: RIM-1 DL Dataset -- 3.2 Phase 2: Preprocessing -- 3.3 Phase 3: Transfer Learning -- 3.4 Phase 4: Hybrid Model Development -- 4 Results and Discussion -- 5 Conclusion -- References -- Performance Optimization of a Waste Heat-Operated Tri-generation Cycle Under Different Energy Situations -- 1 Introduction -- 2 System Description and Performance Evaluation -- 2.1 Description of the Cycle -- 2.2 Assumptions Required During Simulation -- 2.3 Performance Evaluation of the Cycle -- 3 Optimization Strategy Used in the Study -- 3.1 Dragonfly Optimization Algorithm -- 3.2 Flowchart of the Optimization Strategy -- 4 Results -- 4.1 Calculation of Suitable Range of GF, PF, and SF -- 4.2 Optimized Results for Residential or Goods Storage Facilities -- 5 Conclusion -- References -- Organizational Supply Chain Risk Assessment Using Machine Learning and Backpropagation Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Research and Analysis on the Model Construction for Supply Chain Risk Assessment -- 3.1 Research Methodology -- 3.2 Backpropagation Neural Network Model. , 4 Simulation Result -- 5 Conclusion -- References -- An Approach to Find Critical Path Using Trapezoidal Picture Fuzzy Numbers -- 1 Introduction -- 2 Preliminaries -- 2.1 Trapezoidal Picture Fuzzy Numbers -- 2.2 Operations on Trapezoidal Picture Fuzzy Numbers ch15ddd -- 2.3 Comparison of TPFNs Based on: Expected Values ch15ddd -- 3 Trapezoidal Picture Fuzzy Critical Path Method -- 4 Conclusion and Future Research -- References -- Comparative Analysis of Machine Learning and Deep Learning Algorithms for Automatic Sleep Staging Using EEG Signals -- 1 Introduction -- 2 Literature Review -- 2.1 Machine Learning -- 2.2 Deep Learning -- 2.3 Limitation -- 2.4 Contribution -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Pre-processing -- 3.3 Feature Extraction and Selection -- 3.4 Classification Algorithm -- 3.5 Performance Evaluation -- 4 Result Analysis -- 4.1 Machine Learning Evaluation -- 4.2 Deep Learning Evaluation -- 5 Conclusion and Future Work -- References -- Randomized Shuffled Hierarchical Partitioning Technique for Enhancing Efficiency of Swarm Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 Hierarchical Partitioning -- 2.2 Modified Hierarchical Partitioning -- 2.3 Random Partitioning -- 2.4 Self-adaptive Multi-population Technique with Random Partitioning (SAMPR) -- 3 Proposed Variants -- 3.1 Shuffled Hierarchical Partitioning (SHier) -- 3.2 Randomized Hierarchical Partitioning (RHier) -- 3.3 Randomized Shuffled Hierarchical Partitioning (RSHier) -- 4 Results and Discussion -- 4.1 Comparison Among the Proposed Techniques with HIER and mHIER -- 4.2 Testing the Applicability of RSHier Over Multiple Swarm Algorithms -- 4.3 Comparison Over CEC 2014 Function Set -- 4.4 Studying Diversity and Convergence Improvements -- 5 Conclusion -- References -- A Novel Approach to Solve the Interval-Valued Fermatean Fuzzy Transportation Problem. , 1 Introduction -- 2 Preliminaries -- 3 Mathematical Formulation -- 3.1 Interval-Valued Transportation Problem (IVTP) -- 3.2 Equivalent Crisp Transportation Problem Using Order Relation leqRC -- 4 Solution Methodology -- 5 Numerical Example -- 5.1 Discussion -- 6 Conclusion and Future Research Scope -- References -- An Ensemble of PSO and Artificial Electric Field Algorithm for Computationally Expensive Optimization Problems -- 1 Introduction -- 2 Literature Review -- 3 Ensemble of PSO and AEFA -- 3.1 PSO -- 3.2 AEFA -- 3.3 Proposed Algorithm -- 3.4 Time and Space Complexity of the PSAEF Algorithm -- 3.5 Advantages and Disadvantages of the Proposed PSAEF Algorithm -- 4 Results and Discussions -- 5 Component-Wise Comparison -- 6 Conclusion and Future Scope -- References -- Popularity Prediction of Online Social Media Content: A Bibliometric Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 4.1 Document and Source Type -- 4.2 Evolution of Publication Over Years -- 4.3 Keyword Analysis -- 4.4 Analysis of Authorship -- 4.5 Analysis of the Author's Main Affiliation -- 4.6 Analysis of the Author's Countries -- 4.7 Citation Analysis -- 4.8 Analysis of Journals -- 5 Conclusion -- References -- Development of an Autonomous Driving Car Prototype Using FPGA -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Architecture -- 3.2 Algorithms Used -- 4 Proposed Features -- 4.1 Lane Detection -- 4.2 Object Detection -- 4.3 Collision Avoidance -- 5 Result -- 5.1 Testing and Validation -- 6 Suggested Improvements -- 7 Future Scope -- 8 Conclusion -- References -- Custom CDGNet Architecture for Precise Human Part Semantic Segmentation -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experimental Analysis -- 4.1 Dataset Used -- 4.2 Evaluation Metrics -- 4.3 Quantitative Analysis -- 5 Conclusion and Future Work. , References.
    Additional Edition: ISBN 9789819731794
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Singapore :Springer Nature Singapore :
    UID:
    almafu_9961612468002883
    Format: 1 online resource (459 pages)
    Edition: 1st ed. 2024.
    ISBN: 9789819732456
    Series Statement: Lecture Notes in Networks and Systems, 998
    Content: This book presents the latest findings in the areas of data management and smart computing, big data management, artificial intelligence, and data analytics, along with advances in network technologies. The book is a collection of peer-reviewed research papers presented at 8th International Conference on Data Management, Analytics and Innovation (ICDMAI 2024), held during 19–21 January 2024 in Vellore Institute of Technology, Vellore, India. It addresses state-of-the-art topics and discusses challenges and solutions for future development. Gathering original, unpublished contributions by scientists from around the globe, the book is mainly intended for a professional audience of researchers and practitioners in academia and industry. The book is divided into two volumes.
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- Comprehensive Survey of Nonverbal Emotion Recognition Techniques -- 1 Introduction -- 2 Applications Based on Understanding Nonverbal Emotion -- 3 Machine/Deep Learning Methods for Recognition of Nonverbal Emotion -- 3.1 Facial Expressions Recognition Machine/deep Learning Methods -- 3.2 Hand Gestures Recognition Machine/Deep Learning Methods -- 3.3 Body Language Recognition Machine/Deep Learning Methods -- 4 Findings -- 5 Conclusion -- References -- A Two-Stage CNN Based Satellite Image Analysis Framework for Estimating Building-Count in Residential Built-Up Area -- 1 Introduction -- 2 Review of the Relevant Research Work -- 3 Background Study -- 3.1 Mask R-CNN -- 3.2 Regression Using CNN -- 4 Proposed Methodology -- 4.1 Overview of Proposed Methodology -- 4.2 Mask R-CNN Top-Down Approach for Segmentation of Built Up Area -- 4.3 CNN Based Regression Model to Estimate Building-Count Within Segmented Built-Up Area -- 5 Experimental Evaluation of the Proposed Framework -- 5.1 Dataset Used -- 5.2 Experimental Setup -- 5.3 Experimental Evaluation Metric -- 5.4 Experimental Results and Discussion -- 6 Conclusion -- References -- Forecast of Energy Demand Using Temporal Fusion Transformer -- 1 Introduction -- 2 Survey of Literature -- 3 Proposed Work -- 3.1 Data Collection and Preprocessing -- 3.2 TFT Model Architecture -- 3.3 Training and Validation -- 4 Results -- 4.1 Forecasts -- 4.2 Interpreting the Seasonality -- 4.3 Detecting Some Accidental or Extreme Events -- 4.4 Ranking the Features -- 5 Conclusion -- References -- Mental Health Prediction Using Artificial Intelligence -- 1 Introduction -- 2 Literature Survey -- 3 Design -- 4 Methodology -- 5 Results -- 6 Future Directions and Limitations -- 7 Conclusion -- References. , VGGish Deep Learning Model: Audio Feature Extraction and Analysis -- 1 Introduction -- 1.1 Feature Extraction -- 1.2 Dataset -- 2 Related Work -- 3 Proposed System -- 3.1 Preprocessing -- 3.2 Feature Extraction -- 3.3 Feature Concatenation and Selection -- 3.4 Classification -- 3.5 Output -- 4 Proposed Algorithm -- 4.1 Initialization -- 5 Results -- 6 Conclusion -- References -- Stacking Ensemble-Based Approach for Sarcasm Identification with Multiple Contextual Word Embeddings -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Preprocessing -- 3.2 Contextual Word Embeddings -- 3.3 Proposed Model -- 4 Materials and Methods -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Results and Analysis -- 5 Conclusion -- References -- Trigger-Based Pothole Detection, and Warning System with RQ and PHR Mapping -- 1 Introduction -- 2 Related Work and Comparative Study -- 3 Methodology -- 4 Flowcharts -- 5 Result and Discussions -- 6 Conclusion -- References -- Blending Motion Capture and 3D Human Reconstruction Techniques for Enhanced Character Animation -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Technologies Used for 3D Model Building -- 3.2 Technology Used for MoCap -- 3.3 Integration of the Technologies Used -- 3.4 Constraints of the Proposed System -- 4 Result -- 5 Future Scope -- References -- A Comprehensive Survey of Regression-Based Loss Functions for Time Series Forecasting -- 1 Introduction -- 2 Time Series Data -- 3 Regression Loss Functions -- 3.1 Mean Absolute Error (MAE) -- 3.2 Mean Squared Error (MSE) -- 3.3 Mean Bias Error (MBE) -- 3.4 Relative Absolute Error (RAE) -- 3.5 Relative Squared Error (RSE) -- 3.6 Mean Absolute Percentage Error (MAPE) -- 3.7 Root Mean Squared Error (RMSE) -- 3.8 Mean Squared Logarithmic Error (MSLE) -- 3.9 Root Mean Squared Logarithmic Error (RMSLE). , 3.10 Normalized Root Mean Squared Error (NRMSE) -- 3.11 Relative Root Mean Squared Error (RRMSE) -- 3.12 Huber Loss -- 3.13 Log-Cosh Loss -- 3.14 Quantile Loss -- 4 Experiments -- 4.1 Datasets -- 4.2 Performance Metrics -- 5 Conclusion -- References -- Diabetic Retinopathy Detection Using Real-World Datasets of Fundus Images -- 1 Introduction -- 1.1 Diabetic Retinopathy -- 1.2 Severity and Stages -- 2 Literature Review -- 2.1 Research Gaps -- 3 The Dataset -- 3.1 Retinal Image Collection -- 4 Related Work -- 5 Methodology -- 5.1 Data Distribution of Retinal Image Collection -- 5.2 Filtering Out Images with Noise -- 5.3 Image Cropping for Removal of Unnecessary Content -- 6 Model Architecture -- 7 Experimental Analysis -- 8 Results and Discussion -- 8.1 Deep Learning Models Overview -- 8.2 Diagnosis & -- Preventative Measures -- 9 Comparative Analysis -- 10 Future Scope -- 11 Conclusion -- References -- Deep Learning for MRI-Based Brain Tumour Identification and Classification -- 1 Introduction -- 1.1 Viewing Brains -- 1.2 PET Scans -- 1.3 CGI -- 1.4 MRI -- 1.5 Diffusion Scaling Imaging -- 2 Literature Survey -- 3 Proposed Method -- 3.1 Pre Processing -- 3.2 Classification -- 3.3 Characterisation -- 3.4 Grouping -- 3.5 Convolution Neural Network -- 4 Results and Discussion -- 5 Conclusion -- References -- Preserving Tamil Brahmi Letters on Ancient Inscriptions: A Novel Preprocessing Technique for Diverse Applications -- 1 Introduction -- 2 Literature Review -- 3 Methodology for Inscription Translation -- 3.1 Image Blurring -- 3.2 Binarization -- 3.3 Edge Detection -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Regular Machine Learning and Ensemble Learning Approaches for Term Insurance Prediction in Banking Data -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Acquisition of Data -- 3.2 Analysis. , 3.3 Data Preprocessing -- 3.4 Training and Analysis of Models -- 4 Results -- 5 Conclusion -- References -- Platform Independent Satellite Image Processing Using GPGPU -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Operating System Portability and Hardware Independence -- 3.2 GPU Detection and Parallel Computing -- 3.3 Change Detection -- 3.4 Algorithms -- 4 Results and Discussions -- 4.1 Evaluation Environment -- 4.2 Evaluation Result -- 5 Conclusion -- 6 Future Scope -- References -- Blending Psychological Models with Modern HCI Techniques to Develop Artificial Emotional Intelligent "Affective" Systems -- 1 Introduction -- 1.1 Understanding Affective Computing -- 1.2 Human Emotions -- 1.3 Paper Organization -- 2 Literature Review -- 3 HCI Techniques for Utilizing Emotion Models -- 3.1 HCI Background -- 3.2 Modern HCI Systems & -- Interaction Modalities -- 4 Blending HCI Approaches with Psychological Models and ML Techniques -- 5 Conclusion -- 5.1 Future Scope -- References -- An Enhanced Deep Learning Method to Generate Synthetic Images with Features That are Comparable to Original Images Using Neural Style Transfer -- 1 Introduction -- 2 Network Architecture -- 2.1 Loss -- 2.2 Content Loss -- 2.3 Style Loss -- 3 Results -- 3.1 Comparative Evaluation -- 4 Conclusion -- References -- Improving Sentiment Analysis by Handling Negation on Twitter Data Using Deep Learning Approaches -- 1 Introduction -- 1.1 Contributions -- 1.2 Organization -- 2 Related Work -- 3 Proposed Methodology -- 3.1 WordNet -- 3.2 Preprocessing -- 3.3 Negation Handling -- 3.4 Classification -- 4 Results -- 4.1 Dataset Description -- 4.2 Experimental Results -- 5 Conclusion -- References -- Comparative Analysis of Deep Learning Models for Car Part Image Segmentation -- 1 Introduction -- 2 Related Works -- 3 Dataset Description -- 4 Methodology. , 4.1 YOLOv8 Segmentation Model -- 4.2 Detectron2 Mask R-CNN Resnet 101 FPN -- 4.3 Detectron 2 Mask R-CNN ResNeXt 101 32×8d FPN -- 5 Experimental Results and Observations -- 6 Conclusion -- References -- Boosting Tiny Object Detection in Complex Backgrounds Through Deep Multi-Instance Learning -- 1 Introduction -- 2 Literature Survey -- 2.1 Multi Instance Metric Learning and Bags -- 3 Methodology -- 3.1 Dataset Preparation -- 3.2 Experimental Design -- 4 Results and Discussion -- 4.1 Experimental Setup -- 5 Conclusion -- References -- Driver Drowsiness Detection System Using YoloV5 -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Technology Used -- 4.1 Design and Analysis -- 5 Result and Experiment -- 5.1 Design and Analysis -- 5.2 Preprocessing -- 5.3 Performance of the Model -- 5.4 Result and Discussion -- 6 Future Scope -- 7 Conclusion -- References -- Shift of Customer from Unorganised to Organised Sector in Retail: Is Adoption of Technology a Catalyst -- 1 Introduction -- 1.1 Background of the Problem -- 1.2 Research Problem and Relevance -- 2 Theoretical Framework and Hypothesis Development -- 3 Research Methodology -- 4 Result and Analysis -- 5 Findings and Discussions -- 6 Conclusion -- 6.1 Usage and Limitations -- References -- E-CNN-FFE: An Enhanced Convolutional Neural Network for Facial Feature Extraction and Its Comparative Analysis with FaceNet, DeepID, and LBPH Methods -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 5 Conclusion -- References -- A Graphical Neural Network-Based Chatbot Model for Assisting Cancer Patients with Dietary Assessment in their Survivorship -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Material -- 3.2 Software and Hardware Requirements -- 3.3 Method -- 4 Results and Discussion -- 4.1 Time Complexity -- 5 Conclusion -- References. , Plant Identification and Disease Detection System Using Deep Convolutional Neural Networks.
    Additional Edition: Print version: Sharma, Neha Data Management, Analytics and Innovation Singapore : Springer,c2024 ISBN 9789819732449
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Book
    Book
    London :Owen,
    UID:
    almafu_BV012967475
    Format: 272 S. : Ill.
    Language: English
    Subjects: English Studies
    RVK:
    Keywords: Englisch ; Kriminalroman ; Kriminalroman ; Kriminalroman ; Entwicklung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almafu_9961612465902883
    Format: 1 online resource (0 pages)
    Edition: 1st ed. 2024.
    ISBN: 9789819728398
    Series Statement: Lecture Notes in Electrical Engineering, 1194
    Content: This book features selected papers presented at the 6th International Conference on Recent Innovations in Computing (ICRIC 2023), held on 26–27 October 2023 at the Central University of Jammu, India, and organized by the university’s Department of Computer Science and Information Technology. The book is divided into two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.
    Note: Deep Learning Based Summarized Notes Generation from Document -- Text Summarization Techniques for the Bengali Language: Survey -- Bibliometric Analysis of Internet of Things (IoT) In Green Healthcare -- AI and patient convenience: Usage of AI based medical chatbots for medical diagnosis via smartphones -- Learning Device for Dyslexia -- Artificial Intelligence (AI) -Powered Intelligent Systems for Disease Prognosis: A Bibliometric Study -- Unleashing the Potential: Study on Artificial Intelligence Effect in Education Sector -- Analysis and Performance of Text Summarization Tools Applied on Indian Languages -- A Review of Privacy Preserving Decentralized Learning -- AI-Powered Traffic Orchestration: Reinforcement Learning at Traffic Intersections -- A Novel Melanoma Diagnosing System Using Multi-Directional Pattern Extraction Based Distributed Deep Learning Model -- An Element Gathering Optimization based Probabilistic Multi-Model Neural Network Classification Algorithm for Stock Market Prediction -- Enhancing Text Classification with Modular Deep Encoder-Decoder Networks for Multimodal Data -- Design and Development of Deep Learning Based Framework to Detect Disease in Tomato Leaf -- Leveraging Data Mining Optimization for Enhancing Safety Management in Public Security Prevention and Control Application -- A Review of Artificial Intelligence and Machine Learning for Vaccine Research -- Forecasting Criminal Activity: An Empirical Approach for Crime Rate Prediction -- Autonomous Self Driving Car Model Using Deep Learning -- Forecasting the Incidence of Neglected Tropical Diseases and Vector-Borne Diseases -- Machine Learning techniques for detection and classification of crop (Solanum lycopersicum) plant diseases due to pests: A Review -- Review and Challenges: Identify Malnutrition Among Children Under 5 Age -- A review of Crypto-ransomware pre-encryption detection -- Are We Ready To Investigate Robots? Issues and Challenges Involved in Robotic Forensics -- Unmasking the Vulnerabilities: A Deep Dive into the Security Threat Landscape of Humanoid Robots -- An Ensemble-based Extra Feature Selection Approach for predicting Heart Disease -- A Comprehensive Review on Machine Learning in Breast Cancer Analysis -- Fake News Detection using Machine Learning Algorithms -- Review of Cyber Physical System Based Security Datasets for Learning Based Intrusion Detection Systems -- Deep Learning Model based approach for DDoS Detection and Classification -- Machine Learning-Based Text Categorization with Bag of Words -- Implementation of pretrained models to classify Osteosarcoma from histopathological images -- Data Analysis on Dynamic Flow Characteristics of Variable Delivery Hydraulic Axial Piston Pump -- Impacts Of Website Design Attributes and Functional Benefits on Consumer-Instrumental Value in Electronic Commerce Apparel Websites -- Survey and Analysis of Intrusion Detection Frameworks for Cyber-Physical Systems: A Comprehensive Study -- Exploring Explainable Machine Learning in Healthcare: Closing the Predictive Accuracy and Clinical Interpretability gap -- Enhancing IoT Security through Deep Learning: A Comprehensive Study -- A Novel Distributed Tree Based One Hot Encoding (DTOHE) Technique for Intrusion Detection -- An Enhanced Neural Network Collaborative Filtering (ENNCF) for Personalized Recommender System -- MIMO Based VLC Link for Smart City Applications -- A Detailed Study of Advancements in Digital Forensics -- Diagnosis of Behavioural Disorders using Swarm Intelligent Metaheuristic Techniques -- Development of Arduino based Surveillance Drone for Enhanced Campus Security -- A Naïve Performance Metric Parameter for an Intrusion Detection System Model -- Is Artificial Intelligence based Automation for Cyber Crime Investigation the Need of the Hour? An Exploratory Study -- Traffic Sign Board Recognition and Voice Alert System using Deep Convolutional Neural Network -- Analysis of Intrusion Detection System by Applying Machine Learning using KNIME tool -- Motion-Aware Deep Feature-Based Scalable Video Summarization for Wireless Capsule Endoscopy Videos -- Empowering Smart Cities with Edge Computing-Based Iot Systems: A Focus On Data Analytics And Machine Learning Techniques -- Using Meta-LSTM to Predict Personality Traits from Blog User Behaviors -- A Review and Analysis of Privacy-Preserving Federated Learning based Applications and Services in IoT Networks.
    Additional Edition: Print version: Singh, Yashwant Proceedings of International Conference on Recent Innovations in Computing Singapore : Springer,c2024 ISBN 9789819728381
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages