Amazon cover image
Image from Amazon.com

Recent Developments in Artificial Intelligence and Communication Technologies

Contributor(s): Material type: TextTextPublication details: Sharjah : Bentham Science Publishers, (c)2022.Description: 1 online resource (232 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781681089676
Subject(s): Genre/Form: LOC classification:
  • TA347 .R434 2022
Online resources: Available additional physical forms:
Contents:
Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- Automatic Suggestion Model for Tourist Using Efficient BST Searching -- Etika Rastogi1,*, Kajal Gupta1 and Mukesh Rawat1 -- INTRODUCTION -- Study of the Existing System -- Design and Implementation of the Proposed System -- Module Description -- Algorithm Used -- Design and Implementation of the Recommendation Model -- Module Description -- Algorithm Used -- Execution of the Recommended Model -- Performance Analysis -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST
REFERENCES -- Internet Protocols: Transition, Security Issues and the World of IoT -- Ankita Gupta1, Ankit Srivastava1 and Rohit Anand1,* -- INTRODUCTION -- RELATED WORK -- IPV4 AND IPV6 -- IPv4 -- IPv6 -- Shortcomings of IPv4 -- NEED TO TRANSITION FROM IPV4 TO IPV6 -- IPv4 and IPv6 Coexistence -- SECURITY THREATS -- Security Threats Common to IPv4 and IPv6 -- Security Threats Related to IPv6 -- Security Threats Caused Due to Transition Mechanism -- IPV6 and THE WORLD OF IOT -- IPv6 over IPv4 for IoT -- Why IPv6 for IoT? -- Routing -- IPv6 and the IoT Network
CONCLUSION AND FUTURE SCOPE -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Recommender Systems and their Application in Recommending Research Papers -- Sonam Gupta1,*, Lipika Goel2 and Rohit Vashisht3 -- INTRODUCTION -- Need for Recommendation System -- Power of the Recommendation System -- Prerequisite of Recommendation System -- Natural Language Processing (NLP) -- LSA Algorithm -- Artificial Neural Network -- LITERATURE SURVEY -- STEPS OF RECOMMENDATION PROCESS -- A. Data Collection -- A. Training Phase
FILTERING TECHNIQUES -- 1. Content-based Filtering -- 2. Collaborative Filtering -- PROPOSED WORK -- A. Problem Statement -- B. Algorithm Used -- C. Result -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- An Intelligent Surveillance System for Human Behavior Recognition: An Exhaustive Survey -- Ruchi Jayaswal1,* and Manish Dixit1 -- INTRODUCTION -- Classification of Human Behavior -- Normal Behavior -- Abnormal Behavior -- Problems and Challenges -- Motivation and Recent Trends
Preprocessing and Foreground Object Detection -- Object Tracking -- Feature Extraction and Motion Information -- Classification and Activity Recognition -- Some Activity Recognition Methods and Techniques -- Artificial Neural Network (ANN) -- Clustering -- Hidden Markov Model (HMM) -- Deep Learning Models -- Datasets -- Datasets of Abandoned Object Detection -- Theft Detection Datasets -- Falling Detection Dataset -- Violence Detection Datasets -- Fire Detection Datasets -- Miscellaneous Dataset -- Evaluation Metrics -- Accuracy
Subject: This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering. The collection of chapters should inspire scholars involved in theoretical and applied sciences to con.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Description based upon print version of record.

Includes bibliographies and index.

Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- Automatic Suggestion Model for Tourist Using Efficient BST Searching -- Etika Rastogi1,*, Kajal Gupta1 and Mukesh Rawat1 -- INTRODUCTION -- Study of the Existing System -- Design and Implementation of the Proposed System -- Module Description -- Algorithm Used -- Design and Implementation of the Recommendation Model -- Module Description -- Algorithm Used -- Execution of the Recommended Model -- Performance Analysis -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST

ACKNOWLEDGEMENTS -- REFERENCES -- Internet Protocols: Transition, Security Issues and the World of IoT -- Ankita Gupta1, Ankit Srivastava1 and Rohit Anand1,* -- INTRODUCTION -- RELATED WORK -- IPV4 AND IPV6 -- IPv4 -- IPv6 -- Shortcomings of IPv4 -- NEED TO TRANSITION FROM IPV4 TO IPV6 -- IPv4 and IPv6 Coexistence -- SECURITY THREATS -- Security Threats Common to IPv4 and IPv6 -- Security Threats Related to IPv6 -- Security Threats Caused Due to Transition Mechanism -- IPV6 and THE WORLD OF IOT -- IPv6 over IPv4 for IoT -- Why IPv6 for IoT? -- Routing -- IPv6 and the IoT Network

IoT Architecture Based on IPv6 -- CONCLUSION AND FUTURE SCOPE -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Recommender Systems and their Application in Recommending Research Papers -- Sonam Gupta1,*, Lipika Goel2 and Rohit Vashisht3 -- INTRODUCTION -- Need for Recommendation System -- Power of the Recommendation System -- Prerequisite of Recommendation System -- Natural Language Processing (NLP) -- LSA Algorithm -- Artificial Neural Network -- LITERATURE SURVEY -- STEPS OF RECOMMENDATION PROCESS -- A. Data Collection -- A. Training Phase

B. Recommendation Phase -- FILTERING TECHNIQUES -- 1. Content-based Filtering -- 2. Collaborative Filtering -- PROPOSED WORK -- A. Problem Statement -- B. Algorithm Used -- C. Result -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- An Intelligent Surveillance System for Human Behavior Recognition: An Exhaustive Survey -- Ruchi Jayaswal1,* and Manish Dixit1 -- INTRODUCTION -- Classification of Human Behavior -- Normal Behavior -- Abnormal Behavior -- Problems and Challenges -- Motivation and Recent Trends

Framework for Abnormal Human Activity and Behavior Analysis -- Preprocessing and Foreground Object Detection -- Object Tracking -- Feature Extraction and Motion Information -- Classification and Activity Recognition -- Some Activity Recognition Methods and Techniques -- Artificial Neural Network (ANN) -- Clustering -- Hidden Markov Model (HMM) -- Deep Learning Models -- Datasets -- Datasets of Abandoned Object Detection -- Theft Detection Datasets -- Falling Detection Dataset -- Violence Detection Datasets -- Fire Detection Datasets -- Miscellaneous Dataset -- Evaluation Metrics -- Accuracy

Precision (PR), Recall (RP) and F-measure (FM)

This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering. The collection of chapters should inspire scholars involved in theoretical and applied sciences to con.

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

There are no comments on this title.

to post a comment.