+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

Recent Developments in Artificial Intelligence and Communication Technologies

  • Book

  • October 2022
  • Bentham Science Publishers Ltd
  • ID: 5688600
This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering.

The collection of chapters should inspire scholars involved in theoretical and applied sciences to contribute to research using computational intelligence principles and methods in their respective research communities. Professionals working on systems engineering, communications, innovative computing systems and adaptive technologies for sustainable growth, will also be able to benefit from the information provided in the book.

Table of Contents

Chapter 1 Introduction
  • Study Of The Existing System
  • Design And Implementation Of The Proposed System
  • Module Description
  • Algorithm Used
  • Design And Implementation Of The Recommendation Model
  • Module Description
  • Algorithm Used
  • Execution Of The Recommended Model
  • Performance Analysis
  • Conclusion
  • Consent For Publication
  • Conflict Of Interest
  • Acknowledgements
  • References
Chapter 2 Internet Protocols: Transition, Security Issues And The World Of Iot
  • Introduction
  • Related Work
  • Ipv4 And Ipv6
  • Ipv4
  • Ipv6
  • Shortcomings Of Ipv4
  • Need To Transition From Ipv4 To Ipv6
  • Ipv4 And Ipv6 Coexistence
  • Security Threats
  • Security Threats Common To Ipv4 And Ipv6
  • Security Threats Related To Ipv6
  • Security Threats Caused Due To Transition Mechanism
  • Ipv6 & The World Of Iot
  • Ipv6 Over Ipv4 For Iot
  • Why Ipv6 For Iot?
  • Routing - Ipv6 And The Iot Network
  • Iot Architecture Based On Ipv6
  • Conclusion And Future Scope
  • Consent For Publication
  • Conflict Of Interest
  • Acknowledgements
  • References
Chapter 3 Recommender Systems And Their Application In Recommending Research Papers
  • Introduction
  • Need For Recommendation System
  • Power Of The Recommendation System
  • Prerequisite Of Recommendation System
  • Natural Language Processing (Nlp)
  • Lsa Algorithm
  • Artificial Neural Network
Chapter 4 An Intelligent Surveillance System For Human Behavior Recognition: An Exhaustive Survey
  • Introduction
  • Classification Of Human Behavior
  • Normal Behavior
  • Abnormal Behavior
  • Problems And Challenges
  • Motivation And Recent Trends
  • Framework For Abnormal Human Activity And Behavior Analysis
  • Preprocessing And Foreground Object Detection
  • Object Tracking
  • Feature Extraction And Motion Information
  • Classification And Activity Recognition
  • Some Activity Recognition Methods And Techniques
  • Artificial Neural Network (Ann)
  • Clustering
  • Hidden Markov Model (Hmm)
  • Deep Learning Models
  • Datasets
  • Datasets Of Abandoned Object Detection
  • Theft Detection Datasets
  • Falling Detection Dataset
  • Violence Detection Datasets
  • Fire Detection Datasets
  • Literature Survey
  • Steps Of Recommendation Process
  • Data Collection
  • Training Phase
  • Recommendation Phase
  • Filtering Techniques
  • Content-Based Filtering
  • Collaborative Filtering
  • Proposed Work
  • Problem Statement
  • Algorithm Used
  • Result
  • Conclusion
  • Consent For Publication
  • Conflict Of Interest
  • Acknowledgements
  • References
  • Miscellaneous Dataset
  • Evaluation Metrics
  • Accuracy
  • Precision (Pr), Recall (Rp) And F-Measure (Fm)
  • Sensitivity And Specificity
  • Percent Events Detected (P.E.D.) And Percent Alarms True (P.A.T.)
  • Confusion Metrics
  • Roc Curve
  • Conclusion
  • Consent For Publication
  • Conflict Of Interest
  • Acknowledgements
  • References
Chapter 5 Load Balanced Clustering In Wsn Using Madm Approaches .
  • Introduction
  • Literature Survey
  • Radio Model And Undertaking
  • Undertaking
  • Radio Model
  • Madm Approaches
  • Topsis Approach
  • Promethee Approach
  • Attributes Used In Simulated Work
  • Coverage_Of_Chs
  • Chs_Avg_Distance
  • Bs_Avg_Distance
  • Avg_Eresidual
  • Chs_Avg_Lifetime
  • Bs_Ch_Bearing
  • Bs_Max_Distance
  • Eres_Con_Chs
  • Data Set And Evolution Method
  • Chs Selection Using Topsis
  • Chs Selection Using Promethee
  • Simulation Results
  • Conclusion
  • Consent For Publication
  • Conflict Of Interest
  • Acknowledgements
  • References
Chapter 6 An Overview Of Energy Efficient And Data Accuracy Target Tracking Methods In Wsn
  • Introduction
  • Overview Of Recent Target Tracking Methods In Wsn
  • Characteristics Maintaining Energy Efficiency In Target Tracking Algorithms
  • Self-Organizing Network Approaches In Target Tracking
  • Discussion And Comparison
  • Future Scope
  • Conclusion And Future Work
  • Consent For Publication
  • Conflict Of Interest
  • Acknowledgements
  • References
Chapter 7 Introduction
  • Mobile Devices
  • Evolution Of Mobile Learning
  • Componenets Of Mobile Learning
  • Benefits Of Mobile Learning
  • Challenges In Mobile Learning
  • Applications Of Mobile Learning
  • Online Learning And Blended Learning
  • Game-Based Learning (Gbl)
  • Online Learning In Remote Areas
  • Motivation
  • Mobile Learning Tools
  • Literature Survey
  • Conclusion And Future Scope
  • Consent For Publication
  • Conflict Of Interest
  • Acknowledgements
  • References
Chapter 8 Fuzzy Systems And Applications From An Engineer’S Perspective (Fuzzy Textual Data Classification - Case Study)
  • Introduction
  • Probability And Fuzzy Sets
  • Participation Function Terminology
  • Gaussian Participation Function
  • Operations On Fuzzy Sets
  • Text Classification
  • Vocabulory_Generation
  • Algorithm_2 Fuzzy_Collections
  • Concluding Remarks
  • Consent For Publication
  • Conflict Of Interest
  • Acknowledgements
  • References
Chapter 9 Efficient Resources Utilization Of Containerized Applications Using Topsis
  • Introduction
  • Background Related Technology
  • Load Balancing

Author

  • Vikash Yadav
  • Parashu Ram Pal
  • Chuan-Ming Liu