author: ajith abraham

Proceedings of the Second International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’17): Volume 2

... Ohm's law in differential (point) form, where: 1 1 1 — "..., |*0. (45) Reff.Z. - r.Z. r Alo Here, a is the conductivity of the free space. Ohm's ... Experiments 5 Conclusions.

Soft Computing as Transdisciplinary Science and Technology: Proceedings of the fourth IEEE International Workshop WSTST ́05

... Financial. Ratios. and. Stock. Prices. in. China. and. Hong. Kong. Stock. Exchange. Man-Chung Chan, H.C.Leung, and W.D. Luo ... 16 financial ratios into 4 categories has been used to derive the association between the financial ratio and ...

Hybrid Information Systems

... combat rules No T1 T2 T3 W1 W2 F1 F2 F3 O1 O2 03 1 0 0 1 0 1 0 0 1 0 0 1 2 3 4 5 0 0 1 0 1 0 0 0 0 1 0 1 1 0 0 0 0 1 ... rule base could be optimised when the system becomes too complex . As the considered problem has only 18 rules ...

Hybrid Artificial Intelligence Systems: Third International Workshop, HAIS 2008, Burgos, Spain, September 24-26, 2008, Proceedings

... Analysis Level – Use case collaborative learning pattern (UCCL) Pattern Name Context Use Case Name: Author: Date: Description: Use Cases Computer Science, Hardware Engineering Memory Flash L. Margain 10/02/2008 This use case describes ...

Foundations of Computational Intelligence Volume 3: Global Optimization

... (EAs) are a family of iterative, stochastic search and soft optimization methods based on mimicking successful optimization strategies observed in nature [6, 10, 12, 5]. The essence of EAs lies in the emulation of Darwinian evolution ...

Proceedings of the 13th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2021)

... complementary filters for MCU6050 and RC low pass filter for FC-28. They used data acquisition to remove value noise. Cismas et al. [13] made a crash detector which is developed with an IMU sensor to prevent motorcycle accidents. They ...

Intelligent Systems Design and Applications: 21st International Conference on Intelligent Systems Design and Applications (ISDA 2021) Held During December 13–15, 2021

... a face masks in public area, we introduced a new face mask detection method based on deep convolutional neural networks (CNNs) in an uncontrolled environment. In fact, the proposed method detect faces and check whether they are wearing a ...

Intelligent Data analysis and its Applications, Volume II: Proceeding of the First Euro-China Conference on Intelligent Data Analysis and Applications, June 13-15, 2014, Shenzhen, China

... study adopts the single-chip system Arduino develop board [5]. The develop board has ... Module XBee is designed by Digi International Company for network standard ... meters, respectively, due to the low energy consumption. 2.4 Cloud End ...

Next Generation Information Processing System: Proceedings of ICCET 2020, Volume 2

... process. The planned technique helps to discourse different data characteristics as like data disjuncts, cluster cohesiveness, and borderline impacts. Likewise, it also handles the density dearth and borderline cases along with ...

Advances in Computing and Communications, Part IV: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part IV

... (RTMP) Specification. Adobe Systems Inc. (March 2011), Download available http://adobe.com/devnet/rtmp.html 6. Nokia N95, Nokia Inc. (March 2011), Download available http://nokia.es/link?cid=PLAIN_TEXT_815211 7. Market Research (March ...

Intelligent Systems Design and Applications: 20th International Conference on Intelligent Systems Design and Applications (ISDA 2020) held December 12-15, 2020

... . 3 Proposed Hybrid Approach for Automatic Definition of Semantics Relationships Hybrid Approach to Define Semantic Relationships 1407 2.2 Semantic Relationships by Statistical Approaches 2.3 Semantic Relationships by Hybrid Approaches.

Hybrid Intelligent Systems: 22nd International Conference on Hybrid Intelligent Systems (HIS 2022), December 13–15, 2022

... (PASSAT) (2014) 2. Pandey, P., Collen, A., Nijdam, N., Anagnostopoulos, M., Katsikas, S., Konstantas, D.: Towards automated threat-based risk assessment for cyber security in smart homes. In: 18th European Conference on Cyber Warfare and ...

Big Data Analytics in Healthcare

... have life-threatening effects on patients [42]. Healthcare ... best practices [41] for big data security in healthcare would guide the ... Data Analytics Program Having known Elements of Healthcare Big Data Analytics 33 3.4 Security Elements.

Intelligent Systems Design and Applications: 18th International Conference on Intelligent Systems Design and Applications (ISDA 2018) held in Vellore, India, December 6-8, 2018, Volume 1

... activity recognition from smartphones dataset [2]; the second one is ... 2.1 K-Means Clustering Algorithm K-means clustering is one of most popular ... 1 k∑ ∑ n x j −ci , (1) i=1 x j ∈Ci where, xj represents a dataitem in the given ...

Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022)

... Sentence similar- ity measurement for bengali abstractive text summarization ... Fast abstractive summarization with reinforce-selected sentence rewriting. arXiv:1805.11080v1 [cs.CL], 28 May ... Abstractive Text Summarization 165 References.

Security and Privacy-Preserving Techniques in Wireless Robotics

... Robotics Driven GST 39 [5] Kirchmer, M. (2017) Robotic process automation- pragmatic solution or dangerous illusion. Business Transformation & Operational Excellence. World Summit (BTOES). Available at: https://insights.btoes.com/risks- ...

Computational Intelligence in Digital Forensics: Forensic Investigation and Applications

... involves the following five modules: C1 Structured Metadata Derivation ... Processing Module performs feature extraction on the different data formats ... Analysis and Fusion Subsystems involve merging or fusing of the five multi-modal ...

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3

... dark webs. In-degree represents total number of direct links coming from other dark web, and out-degree represents total number of direct link going out from this website to other website. There exist many other algorithms which can ...

Proceedings of 3rd International Conference on Computing Informatics and Networks: ICCIN 2020

... approach: • No criteria defined to model the complex operations. In Fig. 19 ... Repetition of operations in classes. In Fig. 19, normal_customer and ... avoidance of repetition of associations. Bank management system is being modeled ...

Advances in Computing and Communications, Part III: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part III

... POGIL classrooms give each team or student a set of paper handouts for each ... solutions), some issues in schemata counting, and the first steps in ... solutions, and uses convergent questions to develop formulas. The instructor could ...

Innovations in Bio-Inspired Computing and Applications: Proceedings of the 11th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2020) held during December 16-18, 2020

... TeamViewer supports companies with their HIPAA and PCI compliance ... ID, that adjusts while providing extra protection against unwanted access to ... Reset on Suspicious Action; The program End-To-End Security in Communication Networks ...

Innovations in Bio-Inspired Computing and Applications: Proceedings of the 10th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2019) held in Gunupur, Odisha, India during December 16-18, 2019

... CST design studio is used for simulation and study of performance ... design of two slots structure both 'J' shaped and 'U' shaped slots provides better isolation and band rejection characteristics at ... Design 2.1 UWB MIMO Antenna Design.

Innovations in Bio-Inspired Computing and Applications: Proceedings of the 12th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2021) Held During December 16–18, 2021

... 3. Model. Assumptions. We consider an uplink LoRa system consisting of M end-devices that are connecting to a single gateway via a shared wireless channel. These end-devices are arranged in a star topology. In the LoRa network, a collision ...

Metaheuristics for Scheduling in Industrial and Manufacturing Applications

... Stoner pipeline Simulator or pipeline Studio , from Energy Solutions ) that emulate with great fidelity the behavior of the different elements in the system in ... Simulation and Tabu Search for pipeline scheduling 307 The Pipeline Simulator.

Rough Set Theory: A True Landmark in Data Analysis

... a2 and l/R(t, y) </32 = (a, y) e Ro,8, which proves (i). Again (v, u) € R(a1, 31) = a Rai,619 or a Rol,6, u1, u1Ra) ... (RUS)(a, 6) C R(a, 8) US(q, 6) and (ii) (RO S)(a, 6) D R(a, 3) O S(a, 3). Proof. Let (a, y) e (RUS)(a, 6). Then we have ...

Optimization Models in Steganography Using Metaheuristics

... (High-pass) filter [23], Median filter [125], Maximum filter [42], Minimum filter [42], Range filter [113], etc. To ... boost filtering using Gaussian and butter-worth high pass filters as presented in Fig. 1.15 for more clarity. The cut ...

Quantum and Blockchain for Modern Computing Systems: Vision and Advancements: Quantum and Blockchain Technologies: Current Trends and Challenges

... snippets of the code written to demonstrate the BB84 protocol in Sect.4.4. It is written in python language using ... circuit for Alice based on the protocol. Fig. 14 In the above circuit, the circuit towards the. Fig. 13 The snippet of ...

Emergent Web Intelligence: Advanced Information Retrieval

... Probability Theory Fall 2006 STAT 205 Probability Theory Fall 2006 Topic: Integration and Limit Topic: Intergration and Limit Lecturer: Jim Pitman, Scribe: Daniel Metzger, Editor: Chris Haulk Lecturer: Jim Pitman, Scribe: Daniel Metzger ...

Design and Application of Hybrid Intelligent Systems

... emotion or emotion structure 3.2.4 Computing of the Dominant Emotion The ultimate goal of the process is to ... tok : the activation time of the kth emotion The result vector can be drawn and it will point to some location within the ...

Ubiquitous Computing and Computing Security of IoT

... (UDP) In contrast to TCP, yet another protocol namely UDP has been designed ... compared with TCP, UDP is preferred for IoT devices due to minimal overhead ... protocols, but has to deal with packet reordering, loss of datagram and data ...

International Joint Conference CISIS’12-ICEUTE ́12-SOCO ́12 Special Sessions

... RojaDirecta saga should make clear why the software industry -and the content industry- is looking for new enforcement tools [1]. When the Internet was not so popular, sharing licenses was hard and the methods employed to protect ...

Cohort Intelligence: A Socio-inspired Optimization Method

... Test Cases .......................................... 71 References............................................... 74 6 ... Problems .... 75 6.1 Traveling Salesman Problem (TSP) ... Sample Illustration of the CIAlgorithm for Solving the CBAP ...

Intelligent Networking, Collaborative Systems and Applications

... golden retriever is an instance of type dog. They also classify entities first on their temporal nature: occurant in ... Wikipedia as a Source of Ontological Knowledge: State of the Art and Application 3.

Intelligent Interactive Multimedia Systems for e-Healthcare Applications

... Ramana Maharishi, and of the temple of Sri Ramana Ashrama, which is on the side of the hill. It is a wooden structure that is sometimes described as a hut with a tin roof, which has been built on the same spot where the sage came to the ...

Advances in Computing and Communications, Part II: First International Conference, ACC 2011, Kochi, India, July 22-24, 2011. Proceedings, Part II

... virtual lab tools to make studies on tiger population. Typical tiger population studies need to cover spatial and temporal scales since the effects of anthropogenic pressures that come into conflict with ... Virtual Population Ecology Lab.

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.