Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV049408469
    Format: 1 Online-Ressource (415 Seiten)
    Edition: 1st ed
    ISBN: 9783031105395
    Series Statement: Lecture Notes in Computer Science Series v.13293
    Note: Description based on publisher supplied metadata and other sources , Intro -- Preface -- Organization -- Keynotes -- A Study of Fuzzy and Neutrosophic Economic Order Quantity Model Allowing Delay in Payment -- Federated Learning and Knowledge Distillation with Granular Computing -- Socially Optimal Solutions in Freight and Disaster Response Logistics -- Contents -- Biometrics and Pattern Recognition Applications -- Semi-supervised Adaptive Method for Human Activities Recognition (HAR) -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 3.1 Dataset Description -- 3.2 Simple K-Means -- 3.3 Decision Trees -- 3.4 Naïve Bayes -- 3.5 Support Vector Machines -- 4 Methodology -- 4.1 Data Cleaning and Preparation -- 4.2 Cluster Adjustment and Preparation -- 4.3 Activity Classification -- 5 Results and Discussion -- 6 Conclusions and Future Works -- References -- A New Approach for Image Thinning -- 1 Introduction -- 2 Related Works -- 3 A New Thinning Algorithm - Calibrated Thinning -- 4 Experiments and Results -- 4.1 Algorithmic Description -- 4.2 Applications -- 4.3 Conclusions -- References -- Augmentation of Accelerometer and Gyroscope Signals in Biometric Gait Systems -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Segmentation and Data Preprocessing -- 3.3 Data Augmentation -- 3.4 Classification -- 4 Experiment Results -- 5 Conclusions and Future Work -- References -- Computer Information Systems and Security -- A Look into the Vulnerability of Voice Assisted IoT -- 1 Introduction -- 2 Related Work -- 3 Aim and Research Questions -- 4 Vulnerabilities of Voice Assistant Systems that Increase End Users' Data Security Risks -- 4.1 Always Listening End User Conversation -- 4.2 Weak Authentication -- 4.3 Easily Controlled by Ultrasonic Sound -- 4.4 Silently Install Skills (Apps) on a User IoT Device -- 4.5 Cloud Server Dependency -- 4.6 Dependent on Other Edge Devices , 5 Future Research Scope -- 6 Conclusion -- References -- A Systematic Review of Highly Transparent Steganographic Methods for the Digital Audio -- 1 Introduction -- 2 Transparency -- 2.1 Human Auditory System -- 2.2 Measures -- 2.3 Related Works -- 3 Motivation -- 4 Methodology -- 5 Review Results -- 6 Conclusions and Further Works -- References -- Industrial Management and Other Applications -- Software Product Maintenance: A Case Study -- 1 Introduction -- 2 Literature Work -- 3 Phases of Model -- 3.1 Modification Requirement Analysis -- 3.2 Feasibility Determination -- 3.3 Code - X-Ray -- 3.4 Localization -- 3.5 Impact Analysis -- 3.6 Implementation Plan -- 4 Types of Maintenance -- 4.1 Corrective Maintenance -- 4.2 Perfective Maintenance -- 4.3 Adaptive Maintenance -- 4.4 Preventive Maintenance -- 4.5 Performance Measures of Maintenance -- 4.6 Maintainability Index -- 4.7 Structural Measures -- 4.8 The Detect of Code -- 5 Maintenance Case Study -- 6 Explanation and Comparing -- 7 Conclusion -- References -- Digital Transformation and the Role of the CIO in Decision Making: A Comparison of Two Modelling Approaches -- 1 Introduction -- 2 Software Tools for Remote Collaboration -- 2.1 Software Tools for Videoconferencing -- 2.2 Learning Management System Software -- 2.3 Software Platform to Support Project Management -- 3 Group Decision-Making Models in Determination of Software Tools for Remote Collaboration -- 3.1 Group Decision-Making Model for Fast Evaluation and Selection -- 3.2 Group Decision-Making Model for Evaluation and Simultaneous Selection of Several Software Tools for Remote Collaboration -- 4 Numerical Application -- 4.1 Evaluation of Collaborative Software Tools by Group of Experts -- 4.2 Comparison Between Group Decision-Making Approaches -- 5 Conclusions -- References -- Low-Cost Voice Assistant Design and Testing for Older Adults , 1 Introduction -- 2 Theoretical Framework -- 3 Problem Description -- 3.1 Causes of Loneliness -- 3.2 Proposed Solution and Objectives -- 4 Project Solutions -- 4.1 Functions -- 4.2 Materials -- 4.3 App Interface -- 4.4 Conversation Function -- 5 Results and Discussion -- 5.1 Development Tests -- 5.2 Users Test -- 5.3 General Results of the Objectives -- 6 Conclusions -- References -- Design of a Wearable Assistive System for Visually Impaired People -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Problem Feature -- 5 Development Process -- 5.1 Software Selection -- 5.2 Hardware Selection -- 5.3 Tests Carried -- 6 Preliminary Results and Discussion -- 7 Conclusions -- References -- Drivers of Eco-innovation in Industrial Clusters - A Case Study in the Colombian Metalworking Sector -- 1 Introduction -- 1.1 Study Conceptualization -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusions -- References -- International Purchase Transactions: An Analysis of the Decision Cycles in Colombian Companies' Operations -- 1 Introduction -- 2 Theoretical Background -- 3 Methodology -- 4 Results and Discussions -- 4.1 First Cycle: Decisions Related to the Purchasing Process -- 4.2 Second Cycle: Decisions Related to the International Physical Distribution Process (IPD) -- 4.3 Third Cycle: Decisions Related to the Process of Customs Clearance -- 4.4 A Proposed Model for Context-Specific Decisions -- 5 Conclusions -- References -- Knowledge Management: Effects on Innovation in Micro, Small, and Medium-Sized Export Enterprises -- 1 Introduction -- 2 Literature Review -- 2.1 Innovation Capability -- 2.2 Knowledge Management -- 3 Methods and Material -- 4 Finding -- 5 Discussion -- 6 Conclusions -- 7 Implications -- References -- Evaluation of Educational Quality Under a Six Sigma Approach to Engineering Degrees in Colombia -- 1 Introduction , 2 Literature Review -- 2.1 Assessing Quality in the Service Industry -- 2.2 Application of Six Sigma in the Service Industry -- 2.3 Application of Six Sigma in Higher Education -- 3 Methodology -- 3.1 Population -- 3.2 Academic Competencies -- 3.3 Quality Dimensions -- 4 Results -- 4.1 Six Sigma Results Analysis -- 4.2 Conformity Analysis -- 5 Discussion -- 6 Conclusions -- References -- Machine Learning and Artificial Neural Networks -- A Recommender System for Digital Newspaper Readers Based on Random Forest -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data -- 2.2 Target Variables -- 2.3 Decision Trees -- 2.4 Random Forest -- 2.5 Performance Metrics -- 3 Results -- 3.1 Exploratory Data Analysis -- 3.2 Decision Tree Results -- 3.3 Random Forest Results -- 4 Discussion -- 5 Conclusion -- References -- Analysis of Pre-trained Convolutional Neural Network Models in Diabetic Retinopathy Detection Through Retinal Fundus Images -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Work Environment -- 3.2 Dataset Description and Processing -- 3.3 Proposed Approach -- 3.4 Performance Indicators -- 4 Results and Discussion -- 4.1 Comparative Between Evaluated Models -- 4.2 Comparative with Related Works -- 5 Conclusion -- References -- User Interface-Based in Machine Learning as Tool in the Analysis of Control Loops Performance and Robustness -- 1 Introduction -- 2 Control Performance Monitoring -- 2.1 Stochastic Stationary Processes -- 2.2 Performance Indices -- 3 Machine Learning -- 3.1 Supervised Learning -- 4 Results -- 4.1 A Case Study -- 4.2 The Model with Machine Learning -- 4.3 User Interface for Deterministic Indices Prediction -- 5 Conclusions -- References -- Predictive Model of Cardiovascular Diseases Implementing Artificial Neural Networks -- 1 Introduction -- 2 Related Research -- 3 Data Pre-processing , 4 Feature Selection Techniques -- 4.1 Info. Gain -- 4.2 Gain Ratio -- 5 Training Techniques and Classification -- 5.1 Neural Networks SOM (Self-organizing Map) -- 5.2 Neural Networks GSOM (Growing Hierarchical Self Organizing Maps) -- 6 Methodology -- 7 Simulation Scenarios and Results -- 8 Conclusions -- References -- Bird Identification from the Thamnophilidae Family at the Andean Region of Colombia -- 1 Introduction -- 2 Related Work -- 3 Experimental Setup -- 3.1 Data-Set -- 3.2 Feature Extraction -- 3.3 Classification Stage -- 4 Results -- 5 Conclusions -- References -- Blood Pressure Estimation from Photoplethysmography Signals by Applying Deep Learning Techniques -- 1 Introduction -- 2 Previous Work -- 3 Materials and Methods -- 3.1 Preprocessing Stage -- 3.2 Processing Stage -- 3.3 Proposed Convolutional Neural Network -- 4 Results -- 4.1 2D-CNN Model 1 -- 4.2 2D-CNN Model 2 -- 4.3 2D-CNN Model 3 -- 4.4 Evaluation Stage -- 5 Conclusions -- References -- Food Classification from Images Using a Neural Network Based Approach with NVIDIA Volta and Pascal GPUs -- 1 Introduction -- 2 Related Work and Motivations -- 3 Problem Formulation and Approach -- 4 Training and Validation Data -- 5 Experimental Results -- 5.1 Preliminary Results for Various Models -- 5.2 Inference Times Using CPU vs GPU -- 5.3 Training and Results for Various Parameters for InceptionV3 Model -- 6 Conclusions and Future Work -- References -- Application of Continuous Embedding of Viral Genome Sequences and Machine Learning in the Prediction of SARS-CoV-2 Variants -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset Preparation and Preprocessing -- 2.2 Ngrams-Based SARS-CoV-2 Genome Vectorization -- 2.3 Supervised Machine Learning -- 3 Results and Discussion -- 3.1 Evaluation on Test Set -- 3.2 2D Projection of 61,365 SARS-CoV-2 Samples , 3.3 Limitations and Future Research
    Additional Edition: Erscheint auch als Druck-Ausgabe Saeed, Khalid Computer Information Systems and Industrial Management Cham : Springer International Publishing AG,c2022 ISBN 9783031105388
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Zugriffskontrolle ; Eindringerkennung ; Trusted Computing ; Netzwerktopologie ; Künstliche Intelligenz ; Anwendungssoftware ; Computermathematik ; Datenbanksystem ; Anwendungssystem ; Datensicherung ; Biometrie ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages