This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering.
The collection of chapters should inspire scholars involved in theoretical and applied sciences to contribute to research using computational intelligence principles and methods in their respective research communities. Professionals working on systems engineering, communications, innovative computing systems and adaptive technologies for sustainable growth, will also be able to benefit from the information provided in the book.
The collection of chapters should inspire scholars involved in theoretical and applied sciences to contribute to research using computational intelligence principles and methods in their respective research communities. Professionals working on systems engineering, communications, innovative computing systems and adaptive technologies for sustainable growth, will also be able to benefit from the information provided in the book.
Table of Contents
Chapter 1 Introduction- Study Of The Existing System
- Design And Implementation Of The Proposed System
- Module Description
- Algorithm Used
- Design And Implementation Of The Recommendation Model
- Module Description
- Algorithm Used
- Execution Of The Recommended Model
- Performance Analysis
- Conclusion
- Consent For Publication
- Conflict Of Interest
- Acknowledgements
- References
- Introduction
- Related Work
- Ipv4 And Ipv6
- Ipv4
- Ipv6
- Shortcomings Of Ipv4
- Need To Transition From Ipv4 To Ipv6
- Ipv4 And Ipv6 Coexistence
- Security Threats
- Security Threats Common To Ipv4 And Ipv6
- Security Threats Related To Ipv6
- Security Threats Caused Due To Transition Mechanism
- Ipv6 & The World Of Iot
- Ipv6 Over Ipv4 For Iot
- Why Ipv6 For Iot?
- Routing - Ipv6 And The Iot Network
- Iot Architecture Based On Ipv6
- Conclusion And Future Scope
- Consent For Publication
- Conflict Of Interest
- Acknowledgements
- References
- Introduction
- Need For Recommendation System
- Power Of The Recommendation System
- Prerequisite Of Recommendation System
- Natural Language Processing (Nlp)
- Lsa Algorithm
- Artificial Neural Network
- Introduction
- Classification Of Human Behavior
- Normal Behavior
- Abnormal Behavior
- Problems And Challenges
- Motivation And Recent Trends
- Framework For Abnormal Human Activity And Behavior Analysis
- Preprocessing And Foreground Object Detection
- Object Tracking
- Feature Extraction And Motion Information
- Classification And Activity Recognition
- Some Activity Recognition Methods And Techniques
- Artificial Neural Network (Ann)
- Clustering
- Hidden Markov Model (Hmm)
- Deep Learning Models
- Datasets
- Datasets Of Abandoned Object Detection
- Theft Detection Datasets
- Falling Detection Dataset
- Violence Detection Datasets
- Fire Detection Datasets
- Literature Survey
- Steps Of Recommendation Process
- Data Collection
- Training Phase
- Recommendation Phase
- Filtering Techniques
- Content-Based Filtering
- Collaborative Filtering
- Proposed Work
- Problem Statement
- Algorithm Used
- Result
- Conclusion
- Consent For Publication
- Conflict Of Interest
- Acknowledgements
- References
- Miscellaneous Dataset
- Evaluation Metrics
- Accuracy
- Precision (Pr), Recall (Rp) And F-Measure (Fm)
- Sensitivity And Specificity
- Percent Events Detected (P.E.D.) And Percent Alarms True (P.A.T.)
- Confusion Metrics
- Roc Curve
- Conclusion
- Consent For Publication
- Conflict Of Interest
- Acknowledgements
- References
- Introduction
- Literature Survey
- Radio Model And Undertaking
- Undertaking
- Radio Model
- Madm Approaches
- Topsis Approach
- Promethee Approach
- Attributes Used In Simulated Work
- Coverage_Of_Chs
- Chs_Avg_Distance
- Bs_Avg_Distance
- Avg_Eresidual
- Chs_Avg_Lifetime
- Bs_Ch_Bearing
- Bs_Max_Distance
- Eres_Con_Chs
- Data Set And Evolution Method
- Chs Selection Using Topsis
- Chs Selection Using Promethee
- Simulation Results
- Conclusion
- Consent For Publication
- Conflict Of Interest
- Acknowledgements
- References
- Introduction
- Overview Of Recent Target Tracking Methods In Wsn
- Characteristics Maintaining Energy Efficiency In Target Tracking Algorithms
- Self-Organizing Network Approaches In Target Tracking
- Discussion And Comparison
- Future Scope
- Conclusion And Future Work
- Consent For Publication
- Conflict Of Interest
- Acknowledgements
- References
- Mobile Devices
- Evolution Of Mobile Learning
- Componenets Of Mobile Learning
- Benefits Of Mobile Learning
- Challenges In Mobile Learning
- Applications Of Mobile Learning
- Online Learning And Blended Learning
- Game-Based Learning (Gbl)
- Online Learning In Remote Areas
- Motivation
- Mobile Learning Tools
- Literature Survey
- Conclusion And Future Scope
- Consent For Publication
- Conflict Of Interest
- Acknowledgements
- References
- Introduction
- Probability And Fuzzy Sets
- Participation Function Terminology
- Gaussian Participation Function
- Operations On Fuzzy Sets
- Text Classification
- Vocabulory_Generation
- Algorithm_2 Fuzzy_Collections
- Concluding Remarks
- Consent For Publication
- Conflict Of Interest
- Acknowledgements
- References
- Introduction
- Background Related Technology
- Load Balancing
Author
- Vikash Yadav
- Parashu Ram Pal
- Chuan-Ming Liu