Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham :Springer International Publishing AG,
    UID:
    edoccha_9961535693102883
    Format: 1 online resource (204 pages)
    Edition: 1st ed.
    ISBN: 3-031-57037-5
    Series Statement: Studies in Computational Intelligence Series ; v.1156
    Note: Intro -- Contents -- Impact of Healthy Eating Among Residents in Aberdeen Using Exploratory Data Analysis -- 1 Introduction -- 2 Procedure -- 2.1 Gathering Data -- 2.2 Importing Data -- 3 Visualization and Analysis -- 3.1 Visualizing the Age Distribution by Gender -- 3.2 Visualize Count by Gender Using a Bar Plot -- 3.3 Investigating if the Age Distribution Follows a Normal Distribution -- 3.4 Visualizing the Age Distribution -- 3.5 Visualize the Popular Processes Meals by Gender and by Age Group -- 3.6 Visualization of Popular Food Among Females in Aberdeen -- 3.7 Visualization of Popular Food Among Males in Aberdeen -- 3.8 Visualization of Popular Food Among LGBTQ+ Community in Aberdeen -- 3.9 Visualization of Eating Pattern to Determine Most Frequently Missed Meal -- 3.10 Visualizing Using Pie Charts -- 3.11 Preparing the Dataset to Predict if Hike in Food Prices Have Affected Survey Respondents -- 3.12 Results Using Machine Learning Ensembles -- 4 Conclusion -- References -- Non-aligned RGBT Tracking via Joint Temporal-Iterated Homography Estimation and Multimodal Transformer Fusion -- 1 Introduction -- 2 Related Work -- 2.1 RGBT Tracking -- 2.2 Transformer Tracking -- 2.3 Deep Homography Estimation -- 3 Non-aligned RGBT Tracker -- 3.1 Overview -- 3.2 Temporal-Iterated Homography Estimation Module -- 3.3 Multimodal Transformer Fusion Module -- 3.4 Training Algorithm -- 4 Experiments -- 4.1 Evaluation Data and Metrics -- 4.2 Quantitative Comparison -- 4.3 Ablation Study -- 5 Conclusion -- References -- Software Approaches for Designing Electric Transformers -- 1 Introduction -- 2 Related Works -- 3 Process of Designing Transformers in Small-Sized Enterprises -- 4 Problem Definition -- 5 The Four Types of Software We Developed -- 5.1 Development Environment -- 5.2 Spreadsheet-Based SW -- 5.3 All Possible Designs Using Repetition. , 5.4 Multiprocessing -- 5.5 Deep Learning Model -- 6 Conclusion -- References -- On the Generation of Distinct Gray Codes for Load-Balancing in Hypercubes -- 1 Introduction -- 2 Preliminaries -- 3 Gray Codes Generation Algorithm -- 4 Proof of Correctness and Evaluation -- 5 Empirical Evaluation -- 6 Conclusion -- References -- Using Key Point Detection to Extract Three Dimensional Phenotypes of Corn -- 1 Introduction -- 2 Data Collection and Processing -- 2.1 Data Annotation and Enhancement -- 3 V7POSE-GSConv for Key Point Detection -- 3.1 YOLOv7-POSE -- 3.2 GS-ConV -- 3.3 V7POSE-GSConV -- 4 Experiments and Results Analysis -- 4.1 Key Point Detection Result -- 4.2 3D Phenotype Result -- 5 Conclusion -- References -- ZPF-DLSTM: An Efficient Deep Network with Low Time Latency -- 1 Introduction -- 2 The ZPF-DLSTM Model -- 2.1 Long Short-Term Memory (LSTM) -- 2.2 Fully Connected Network (FCN) -- 2.3 Zero-Phase Filter (ZPF) -- 2.4 ZPF-DLSTM Architecture -- 3 Experiment -- 3.1 Datasets and Metrics -- 3.2 Parameter Setting -- 3.3 Comparison with Other Methods -- 3.4 Ablation Experiments -- 4 Conclusion and Future Work -- References -- The Fusion Model of ResNet and GRU Based on Simplified Self-Attention for ECG Classification on PTB-XL Dataset -- 1 Introduction -- 2 Related Work -- 2.1 Classical Machine Learning -- 2.2 Recurrent Neural Network -- 2.3 1D Convolutional Neural Wetwork -- 2.4 2D Convolutional Neural Network -- 2.5 Multimodal Fusion Framework -- 3 Method -- 3.1 Dataset -- 3.2 Bidirectional GRU -- 3.3 Simplified Self-Attention -- 3.4 Residual Architecture -- 3.5 ResGRU-Attention -- 4 Evaluation Metrics -- 5 Experiments and Results -- 5.1 Experiments Platform -- 5.2 Hyperparameter Values -- 5.3 Result -- 6 Conclusion -- References -- Ball Trajectory and Landing Point Prediction Model Based on EKF Algorithm -- 1 Introduction -- 2 Related Work. , 3 Proposed Intelligent System -- 3.1 The Principle of Camera Calibration -- 3.2 The Principle of Triangulation -- 3.3 The Principle of Extended Kalman Filter -- 3.4 Predicting Ball Trajectory and Speed by Extended Kalman Filter -- 4 Conclusion and Future Work -- References -- Generating Timed Scenarios from Behaviours -- 1 Introduction -- 2 Timed Scenarios -- 3 A Bird's Eye View -- 4 Generating a Timed Scenario from a Set of Behaviours -- 5 Experiments -- 6 Related Work and Conclusions -- References -- Agile User-Centered Design Framework to Support the Development of E-Health for Patient Education -- 1 Introduction -- 2 The Development of Agile-UCD Framework -- 3 Agile-UCD Framework to Develop E-Health Systems for Patient Education -- 4 Discussion and Lesson Learned -- 5 Conclusion -- References -- Enhancing Epilepsy Diagnosis with Deep Learning and Multi-channel Processing of EEG Signals -- 1 Introduction -- 2 Related Work -- 2.1 EEG -- 2.2 Dataset -- 2.3 CyTex -- 2.4 RNN -- 3 Experimental Methodology -- 3.1 Preprocessing -- 3.2 Experiment -- 4 Results and Discussion -- 5 Conclusion -- References -- Accelerating Tsunami Computation on a GPU Using OpenMP Offloading -- 1 Introduction -- 1.1 Model Background -- 1.2 GPU Acceleration -- 1.3 The Main Contributions of This Article -- 1.4 Related Study -- 2 Mathematical Modelling -- 2.1 Finite Element Method Modelling -- 3 High Performance Computing -- 3.1 MPI+OpenMP -- 3.2 Accelerators -- 3.3 Programmability -- 4 Testing Platform -- 5 OpenMP Offloading -- 6 Implementaion -- 7 Results -- 8 Discussion -- 9 Conclustions and Futurework -- References -- Design and Evaluation on Cipher Algorithm for Secure Layer -- 1 Introduction -- 2 Related Works -- 2.1 What is an SSL Cipher Suite -- 2.2 ECC and Agent Concept Model -- 2.3 Reference Architecture for Cipher Secure Systems -- 2.4 Cipher Algorithm Frameworks. , 2.5 SET (Secure Electronic Transaction) Protocol -- 3 Design and Evaluation Framework Cipher Algorithm for Secure Layer -- 3.1 The Interactions of Component for Framework Cipher Algorithm -- 3.2 The Agent Type of DEF Cipher -- 3.3 ECSSL Protocol -- 3.4 ThreeB(Block Byte Bit Cipher) -- 3.5 Design Process for Cipher Security Algorithm -- 3.6 Cipher Algorithm Specifications -- 4 Evaluation for Frameworks Cipher Algorithm -- 4.1 Evaluated Components -- 4.2 Exchanging Results of Design and Evaluation Framework Cipher Algorithm for Secure Layer -- 5 Conclusions and Future Works -- References -- Author Index.
    Additional Edition: ISBN 3-031-57036-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages