Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    edoccha_9961418410302883
    Format: 1 online resource (337 pages)
    Edition: First edition.
    ISBN: 3-031-43009-3
    Series Statement: Studies in Computational Intelligence Series ; Volume 1117
    Note: Intro -- Contents -- Implementation of Improved High Speed SHA-256 Algorithm from RTL to GDSII Using Verilog HDL -- 1 Introduction -- 2 Normative SHA-256 System Architecture -- 2.1 Padding the Input Message (M) -- 2.2 Parsing the Padded Input -- 2.3 Message Scheduling Function -- 2.4 Mechanism of Message Compression -- 2.5 Intermediate Hash Generation -- 3 Improved SHA-256 System Architecture -- 3.1 Proposed Work -- 4 Reducing 3 Adders to 2 Adders in Message Scheduling -- 5 Reducing 11 Adders to 5 Adders in Message Compression -- 6 Results of Simulation and Synthesis Reports -- 6.1 Simulation Results -- 6.2 Synthesis Results -- 7 Conclusion -- References -- Effect of Social Networking Advertisements (SNAs) on Attitudes and Purchase Intention Towards Brand Products -- 1 Introduction -- 2 Review of Literature -- 3 Objectives of the Study -- 4 Significancy of the Study -- 5 Research Methodology -- 6 Conceptual Model -- 7 Data Analysis -- 8 Findings of the Study -- 9 Conclusion -- 10 Future Direction of the Study -- References -- Design of Optimal Waste Management System Using IOT and Machine Learning Technique in Educational Institutions -- 1 Introduction -- 2 Literature Survey -- 3 Existing Methodology -- 4 Proposed Methodology -- 5 Experimental Results -- 6 Conclusion -- References -- Detection of COVID-19 Based on Deep Learning Methods: A Critical Review -- 1 Introduction -- 2 Literature Review -- 3 Conclusion -- References -- Performance Evaluation of GA, HS, PSO Algorithms for Optimizing Area, Wirelength Using MCNC Architectures -- 1 Introduction -- 2 Literature Review -- 3 Simulation Results -- 3.1 Simulation Results of MCNC Benchmark Circuits for PSO Algorithm -- 3.2 Simulation Results of MCNC Benchmark Circuits for Genetic Algorithm -- 3.3 Simulation Results of MCNC Benchmark Circuits for HS Algorithm -- 4 Statistical Comparison. , 5 Conclusion -- References -- An Enhanced Woelfel Image Noise Filter -- 1 Introduction -- 1.1 Need and Significance of the Proposed Work -- 2 Proposed Methodology -- 3 Conclusion -- References -- MHD Convective Flow of Chemically Reacting Viscoelastic Fluid Through an Infinite Inclined Plate via Machine Learning -- 1 Introduction -- 2 Formulation of the Model Problem -- 3 Method of Solution -- 4 Results and Findings -- 5 Conclusions -- References -- Improved Stockwell Transform for Image Compression and Reconstruction -- 1 Introduction -- 2 Review of Literature -- 3 Methodology & -- Implementation -- 3.1 Visual Data Base Collection -- 3.2 Implementation of Algorithms -- 3.3 Testing -- 3.4 Analysis -- 3.5 Modified Algorithm -- 3.6 Test Modified Algorithm -- 3.7 Expected Outcome -- 4 Experimental Investigation and Analysis -- 5 Conclusion -- References -- Facemask Detection Using Bounding Box Algortihm Under COVID-19 Circumstances -- 1 Introduction -- 2 Methodology -- 3 Design and Process Flow of Implementation -- 4 Experimental Investigations -- 5 Conclusion -- References -- Accelerated Addition in Resistive Ram Array Using Parallel-Friendly Majority Gates -- 1 Introduction -- 2 QCA Overview -- 3 Existing RAM Cell -- 4 Proposed RAM Cell -- 5 Simulation Results -- 6 Conclusion -- References -- Optimization of Area and Wirelength Using Hybrid BPSO Algorithm in VLSI Floorplan and Placement for IC Design -- 1 Introduction -- 1.1 Background -- 1.2 Objectives -- 1.3 Need and Importance -- 2 Literature Review -- 2.1 Drawbacks -- 3 Methodology -- 3.1 Existing Method -- 3.2 Proposed Method -- 4 Implementation Tool -- 5 Results and Discussion -- 5.1 Output 1 -- 5.2 Output 2 -- 5.3 Output 3 -- 5.4 Comparative Results -- 6 Conclusion -- References -- PAPR and SER Performance Analysis of OFDMA and SCFDMA -- 1 Introduction -- 2 Literature Review. , 3 Methodology and Process Flow -- 4 Results and Analysis -- References -- Food Detection with Image Processing Using Convolutional Neural Network (CNN) -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Existing Method -- 3.2 Proposed Method -- 4 Conclusion -- References -- Google Appstore Data Classification Using ML Based Naïve's Bayes Algorithm: A Review -- 1 Introduction -- 2 Literature Review -- 2.1 Random Forest Algorithm Based on Data Classification-Machine Learning -- 2.2 Classification of Data Using Decision Tree Classifier-Machine Learning Techniques -- 3 Classification of Data Using Support Vector Machines-Machine Learning -- 4 Classification Using Logistic Regression Algorithm-Machine Learning -- 5 Data Classification Using KNN Algorithm-Machine Learning -- 6 Limitations -- References -- Improved Spectral Efficiency Using Vehicular Visible Light Communication with 16-Bit DCO in OFDM -- 1 Introduction -- 2 Literature Review -- 3 Existing Methodology -- 4 Proposed Methodology -- 5 Results -- 6 Conclusion -- References -- Modelling of Symmetrical 13 Level and Asymmetrical 31 Level Generalized Cascaded Multilevel Inverters -- 1 Introduction -- 2 Proposed Sub Multilevel Inverter Topology -- 3 Proposed Generalized Cascaded Multilevel Inverter Topology -- 4 Seven Level Multi Level Inverters -- 4.1 Conventional Seven Level Cascaded H-Bridge MLI -- 5 Modulation Method -- 6 Symmetrical 13 Level Proposed Generalized Cascaded MLI -- 7 Proposed Asymmetrical 31 Level Generalized Cascaded MLI -- 8 Conventional Single Phase 31 Level Cascaded MLI -- 9 Modeling of Three Phase Induction Motor -- 10 Simulation Results and Analysis -- 11 Conclusion -- References -- Improved Radix-4 Fast Fourier Transform Algorithm Used for Wireless Communication -- 1 Introduction -- 2 General Radix-4 Algorithm -- 3 Improved Radix-4 Algorithm. , 4 Simulation Results -- 5 Conclusion -- References -- Methodologies in Steganography and Cryptography-Review -- 1 1. Introduction -- 2 2. Steganography versus cryptography -- 3 Methodologies -- 4 Conclusion -- References -- Study of Secure Data Transmission-Based Wavelets Using Steganography and Cryptography Techniques -- 1 Introduction -- 2 Background -- 3 Approaches Used by Existing Researchers -- 3.1 RSA Algorithm -- 4 Steganography Based Data Transmission -- 5 Data Transfer Using Video Steganography -- 6 Image Steganography for Data Transmission -- 7 Data Transmission Using Image Cryptography -- 8 Data Transmission Using Cryptography -- 9 Error Metrics -- 10 Conclusions -- References -- A Review: Object Detection and Classification Using Side Scan Sonar Images via Deep Learning Techniques -- 1 Introduction -- 2 Object Detection in Underwater -- 2.1 SSS Images -- 3 Pipeline Detection in Underwater -- 4 Other Existing Literature Studies in Underwater Object Detection -- 5 Overall State-of-Art -- 6 Conclusion -- References -- Analysis of High Performance Optical Networks Using Dense Wavelength-Division Multiplexing Application -- 1 Introduction -- 2 Related Work -- 3 Materials and Method -- 3.1 Source Information (Input) and Electrical Stage Transmitter -- 3.2 Optical Network -- 3.3 Photodetector -- 3.4 Dense Wavelength-Division Multiplexing (DWDM) -- 4 Result and Discussion -- 5 Conclusion -- References -- Wireless Sensor Network to Improve Security Performance and Packet Delivery Ratio Using FCL-Boost Based Classification Method -- 1 Introduction -- 1.1 Machine Learning Algorithm -- 1.2 Security Level of Methods -- 1.3 Wireless Sensor Network Behavior -- 2 Related Works -- 3 Materials and Methods -- 3.1 Collection of Data From the Classifier -- 3.2 Classifier-Based Ensemble Classifier: FCLBoost.L1. , 3.3 Functional Integrated Classifier: FCLBoost.L2 -- 3.4 Route Energy Path -- 4 Result and Discussion -- 4.1 Implementation and Experimental Results -- 4.2 FCL-Boost Network Performance -- 4.3 Time Complexity -- 4.4 Average Throughput -- 4.5 Packet Transfer Ratio -- 5 Conclusion -- References -- To Analyse the Impact of Integration of Wind and Solar Power Generation System for Uttarakhand, Haryana and Rajasthan: A Scope of Machine Learning -- 1 Introduction -- 1.1 Energy Crisis and Renewable Energy Use -- 1.2 Integration of Machine Learning -- 2 Renewable Energy Sources Distribution -- 3 Recent Method and Techniques Used in Hybrid Renewable Energy System -- 4 Hybrid Renewable Energy System for Different Geographical Condition -- 4.1 Status of Hybrid System Power Generation System for Uttarakhand, Haryana, and Rajasthan -- 4.2 Analyse the Wind and Solar Power Generation System for Uttarakhand, Haryana, and Rajasthan -- 5 Scope of Research and Adoptability of Machine Learning -- 6 Conclusion and Future Scope -- References -- VLSI Implementation of an 8051 Microcontroller Using VHDL and  Re-Corrective Measure Using AI -- 1 Introduction -- 2 Background -- 3 Proposed Architecture and Methodology -- 4 Implementation and Result -- 5 Corrective Measure Using AI in VLSI Implementation of an 8051-Microcontroller -- 6 Conclusion and Future Scope -- References -- K-Mean Energy Efficient Optimal Cluster Based Routing Protocol in Vehicular Ad-Hoc Networks -- 1 Introduction -- 2 Related Works -- 2.1 Energy Efficient Clustering Methods -- 2.2 Machine Learning Based Energy Efficient -- 3 Proposed Energy Consumption Model and K-means Clustering Algorithms -- 4 Process of K-Means Clustering -- 5 Evaluation Metrics -- 6 Conclusion -- References -- Dandelion Algorithm for Optimal Location and Sizing of Battery Energy Storage Systems in Electrical Distribution Networks. , 1 Introduction.
    Additional Edition: Print version: Gunjan, Vinit Kumar Modern Approaches in Machine Learning and Cognitive Science: a Walkthrough Cham : Springer International Publishing AG,c2024 ISBN 9783031430084
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages