TY - BOOK AU - Yadav,Vikash AU - Pal,Parashu Ram AU - Liu,Chuan-Ming TI - Recent Developments in Artificial Intelligence and Communication Technologies SN - 9781681089676 AV - TA347 .R434 2022 PY - 2022/// CY - Sharjah PB - Bentham Science Publishers KW - Artificial intelligence KW - Communication KW - Technology KW - Electronic Books N1 - Description based upon print version of record; Precision (PR), Recall (RP) and F-measure (FM); 2; Cover --; Title --; Copyright --; End User License Agreement --; Contents --; Preface --; List of Contributors --; Automatic Suggestion Model for Tourist Using Efficient BST Searching --; Etika Rastogi1,*, Kajal Gupta1 and Mukesh Rawat1 --; INTRODUCTION --; Study of the Existing System --; Design and Implementation of the Proposed System --; Module Description --; Algorithm Used --; Design and Implementation of the Recommendation Model --; Module Description --; Algorithm Used --; Execution of the Recommended Model --; Performance Analysis --; CONCLUSION --; CONSENT FOR PUBLICATION --; CONFLICT OF INTEREST; ACKNOWLEDGEMENTS --; REFERENCES --; Internet Protocols: Transition, Security Issues and the World of IoT --; Ankita Gupta1, Ankit Srivastava1 and Rohit Anand1,* --; INTRODUCTION --; RELATED WORK --; IPV4 AND IPV6 --; IPv4 --; IPv6 --; Shortcomings of IPv4 --; NEED TO TRANSITION FROM IPV4 TO IPV6 --; IPv4 and IPv6 Coexistence --; SECURITY THREATS --; Security Threats Common to IPv4 and IPv6 --; Security Threats Related to IPv6 --; Security Threats Caused Due to Transition Mechanism --; IPV6 and THE WORLD OF IOT --; IPv6 over IPv4 for IoT --; Why IPv6 for IoT? --; Routing --; IPv6 and the IoT Network; IoT Architecture Based on IPv6 --; CONCLUSION AND FUTURE SCOPE --; CONSENT FOR PUBLICATION --; CONFLICT OF INTEREST --; ACKNOWLEDGEMENTS --; REFERENCES --; Recommender Systems and their Application in Recommending Research Papers --; Sonam Gupta1,*, Lipika Goel2 and Rohit Vashisht3 --; INTRODUCTION --; Need for Recommendation System --; Power of the Recommendation System --; Prerequisite of Recommendation System --; Natural Language Processing (NLP) --; LSA Algorithm --; Artificial Neural Network --; LITERATURE SURVEY --; STEPS OF RECOMMENDATION PROCESS --; A. Data Collection --; A. Training Phase; B. Recommendation Phase --; FILTERING TECHNIQUES --; 1. Content-based Filtering --; 2. Collaborative Filtering --; PROPOSED WORK --; A. Problem Statement --; B. Algorithm Used --; C. Result --; CONCLUSION --; CONSENT FOR PUBLICATION --; CONFLICT OF INTEREST --; ACKNOWLEDGEMENTS --; REFERENCES --; An Intelligent Surveillance System for Human Behavior Recognition: An Exhaustive Survey --; Ruchi Jayaswal1,* and Manish Dixit1 --; INTRODUCTION --; Classification of Human Behavior --; Normal Behavior --; Abnormal Behavior --; Problems and Challenges --; Motivation and Recent Trends; Framework for Abnormal Human Activity and Behavior Analysis --; Preprocessing and Foreground Object Detection --; Object Tracking --; Feature Extraction and Motion Information --; Classification and Activity Recognition --; Some Activity Recognition Methods and Techniques --; Artificial Neural Network (ANN) --; Clustering --; Hidden Markov Model (HMM) --; Deep Learning Models --; Datasets --; Datasets of Abandoned Object Detection --; Theft Detection Datasets --; Falling Detection Dataset --; Violence Detection Datasets --; Fire Detection Datasets --; Miscellaneous Dataset --; Evaluation Metrics --; Accuracy; 2; b N2 - This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering. The collection of chapters should inspire scholars involved in theoretical and applied sciences to con UR - httpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3406197&site=eds-live&custid=s3260518 ER -