MARC details
000 -LEADER |
fixed length control field |
05012cam a2200457Mi 4500 |
001 - CONTROL NUMBER |
control field |
on1350686042 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240726104858.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
221119s2022 xx o ||| 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
EBLCP |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
EBLCP |
Modifying agency |
NT |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781681089676 |
Qualifying information |
|
050 04 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TA347 |
Item number |
.R434 2022 |
049 ## - LOCAL HOLDINGS (OCLC) |
Holding library |
MAIN |
245 10 - TITLE STATEMENT |
Title |
Recent Developments in Artificial Intelligence and Communication Technologies |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Sharjah : |
Name of publisher, distributor, etc. |
Bentham Science Publishers, |
Date of publication, distribution, etc. |
(c)2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource (232 pages) |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
data file |
Source |
rda |
500 ## - GENERAL NOTE |
General note |
Description based upon print version of record. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographies and index. |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
Cover -- |
Title |
Title -- |
-- |
Copyright -- |
-- |
End User License Agreement -- |
-- |
Contents -- |
-- |
Preface -- |
-- |
List of Contributors -- |
-- |
Automatic Suggestion Model for Tourist Using Efficient BST Searching -- |
-- |
Etika Rastogi1,*, Kajal Gupta1 and Mukesh Rawat1 -- |
-- |
INTRODUCTION -- |
-- |
Study of the Existing System -- |
-- |
Design and Implementation of the Proposed System -- |
-- |
Module Description -- |
-- |
Algorithm Used -- |
-- |
Design and Implementation of the Recommendation Model -- |
-- |
Module Description -- |
-- |
Algorithm Used -- |
-- |
Execution of the Recommended Model -- |
-- |
Performance Analysis -- |
-- |
CONCLUSION -- |
-- |
CONSENT FOR PUBLICATION -- |
-- |
CONFLICT OF INTEREST |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
ACKNOWLEDGEMENTS -- |
Title |
REFERENCES -- |
-- |
Internet Protocols: Transition, Security Issues and the World of IoT -- |
-- |
Ankita Gupta1, Ankit Srivastava1 and Rohit Anand1,* -- |
-- |
INTRODUCTION -- |
-- |
RELATED WORK -- |
-- |
IPV4 AND IPV6 -- |
-- |
IPv4 -- |
-- |
IPv6 -- |
-- |
Shortcomings of IPv4 -- |
-- |
NEED TO TRANSITION FROM IPV4 TO IPV6 -- |
-- |
IPv4 and IPv6 Coexistence -- |
-- |
SECURITY THREATS -- |
-- |
Security Threats Common to IPv4 and IPv6 -- |
-- |
Security Threats Related to IPv6 -- |
-- |
Security Threats Caused Due to Transition Mechanism -- |
-- |
IPV6 and THE WORLD OF IOT -- |
-- |
IPv6 over IPv4 for IoT -- |
-- |
Why IPv6 for IoT? -- |
-- |
Routing -- |
-- |
IPv6 and the IoT Network |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
IoT Architecture Based on IPv6 -- |
Title |
CONCLUSION AND FUTURE SCOPE -- |
-- |
CONSENT FOR PUBLICATION -- |
-- |
CONFLICT OF INTEREST -- |
-- |
ACKNOWLEDGEMENTS -- |
-- |
REFERENCES -- |
-- |
Recommender Systems and their Application in Recommending Research Papers -- |
-- |
Sonam Gupta1,*, Lipika Goel2 and Rohit Vashisht3 -- |
-- |
INTRODUCTION -- |
-- |
Need for Recommendation System -- |
-- |
Power of the Recommendation System -- |
-- |
Prerequisite of Recommendation System -- |
-- |
Natural Language Processing (NLP) -- |
-- |
LSA Algorithm -- |
-- |
Artificial Neural Network -- |
-- |
LITERATURE SURVEY -- |
-- |
STEPS OF RECOMMENDATION PROCESS -- |
-- |
A. Data Collection -- |
-- |
A. Training Phase |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
B. Recommendation Phase -- |
Title |
FILTERING TECHNIQUES -- |
-- |
1. Content-based Filtering -- |
-- |
2. Collaborative Filtering -- |
-- |
PROPOSED WORK -- |
-- |
A. Problem Statement -- |
-- |
B. Algorithm Used -- |
-- |
C. Result -- |
-- |
CONCLUSION -- |
-- |
CONSENT FOR PUBLICATION -- |
-- |
CONFLICT OF INTEREST -- |
-- |
ACKNOWLEDGEMENTS -- |
-- |
REFERENCES -- |
-- |
An Intelligent Surveillance System for Human Behavior Recognition: An Exhaustive Survey -- |
-- |
Ruchi Jayaswal1,* and Manish Dixit1 -- |
-- |
INTRODUCTION -- |
-- |
Classification of Human Behavior -- |
-- |
Normal Behavior -- |
-- |
Abnormal Behavior -- |
-- |
Problems and Challenges -- |
-- |
Motivation and Recent Trends |
505 00 - FORMATTED CONTENTS NOTE |
Formatted contents note |
Framework for Abnormal Human Activity and Behavior Analysis -- |
Title |
Preprocessing and Foreground Object Detection -- |
-- |
Object Tracking -- |
-- |
Feature Extraction and Motion Information -- |
-- |
Classification and Activity Recognition -- |
-- |
Some Activity Recognition Methods and Techniques -- |
-- |
Artificial Neural Network (ANN) -- |
-- |
Clustering -- |
-- |
Hidden Markov Model (HMM) -- |
-- |
Deep Learning Models -- |
-- |
Datasets -- |
-- |
Datasets of Abandoned Object Detection -- |
-- |
Theft Detection Datasets -- |
-- |
Falling Detection Dataset -- |
-- |
Violence Detection Datasets -- |
-- |
Fire Detection Datasets -- |
-- |
Miscellaneous Dataset -- |
-- |
Evaluation Metrics -- |
-- |
Accuracy |
500 ## - GENERAL NOTE |
General note |
Precision (PR), Recall (RP) and F-measure (FM) |
520 0# - SUMMARY, ETC. |
Summary, etc. |
This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering. The collection of chapters should inspire scholars involved in theoretical and applied sciences to con. |
530 ## - COPYRIGHT INFORMATION: |
COPYRIGHT INFORMATION |
COPYRIGHT NOT covered - Click this link to request copyright permission: |
Uniform Resource Identifier |
<a href="b">b</a> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Communication |
General subdivision |
Technology. |
655 #1 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic Books. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Yadav, Vikash. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Pal, Parashu Ram. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Liu, Chuan-Ming. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
-- |
Click to access digital title | log in using your CIU ID number and my.ciu.edu password. |
Uniform Resource Identifier |
<a href="httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3406197&site=eds-live&custid=s3260518">httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3406197&site=eds-live&custid=s3260518</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) |
DONATED BY: |
|
VENDOR |
EBSCO |
Classification part |
TA. |
PUBLICATION YEAR |
2022 |
LOCATION |
ONLINE |
REQUESTED BY: |
|
-- |
|
-- |
NFIC |
Source of classification or shelving scheme |
|
994 ## - |
-- |
92 |
-- |
NT |
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN) |
a |
1 |
b |
Cynthia Snell |
c |
1 |
d |
Cynthia Snell |