000 | 05012cam a2200457Mi 4500 | ||
---|---|---|---|
001 | on1350686042 | ||
003 | OCoLC | ||
005 | 20240726104858.0 | ||
008 | 221119s2022 xx o ||| 0 eng d | ||
040 |
_aEBLCP _beng _erda _cEBLCP _dNT |
||
020 |
_a9781681089676 _q((electronic)l(electronic)ctronic) |
||
050 | 0 | 4 |
_aTA347 _b.R434 2022 |
049 | _aMAIN | ||
245 | 1 | 0 | _aRecent Developments in Artificial Intelligence and Communication Technologies |
260 |
_aSharjah : _bBentham Science Publishers, _c(c)2022. |
||
300 | _a1 online resource (232 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
500 | _aDescription based upon print version of record. | ||
504 | _a2 | ||
505 | 0 | 0 |
_aCover -- _tTitle -- _tCopyright -- _tEnd User License Agreement -- _tContents -- _tPreface -- _tList of Contributors -- _tAutomatic Suggestion Model for Tourist Using Efficient BST Searching -- _tEtika Rastogi1,*, Kajal Gupta1 and Mukesh Rawat1 -- _tINTRODUCTION -- _tStudy of the Existing System -- _tDesign and Implementation of the Proposed System -- _tModule Description -- _tAlgorithm Used -- _tDesign and Implementation of the Recommendation Model -- _tModule Description -- _tAlgorithm Used -- _tExecution of the Recommended Model -- _tPerformance Analysis -- _tCONCLUSION -- _tCONSENT FOR PUBLICATION -- _tCONFLICT OF INTEREST |
505 | 0 | 0 |
_aACKNOWLEDGEMENTS -- _tREFERENCES -- _tInternet Protocols: Transition, Security Issues and the World of IoT -- _tAnkita Gupta1, Ankit Srivastava1 and Rohit Anand1,* -- _tINTRODUCTION -- _tRELATED WORK -- _tIPV4 AND IPV6 -- _tIPv4 -- _tIPv6 -- _tShortcomings of IPv4 -- _tNEED TO TRANSITION FROM IPV4 TO IPV6 -- _tIPv4 and IPv6 Coexistence -- _tSECURITY THREATS -- _tSecurity Threats Common to IPv4 and IPv6 -- _tSecurity Threats Related to IPv6 -- _tSecurity Threats Caused Due to Transition Mechanism -- _tIPV6 and THE WORLD OF IOT -- _tIPv6 over IPv4 for IoT -- _tWhy IPv6 for IoT? -- _tRouting -- _tIPv6 and the IoT Network |
505 | 0 | 0 |
_aIoT Architecture Based on IPv6 -- _tCONCLUSION AND FUTURE SCOPE -- _tCONSENT FOR PUBLICATION -- _tCONFLICT OF INTEREST -- _tACKNOWLEDGEMENTS -- _tREFERENCES -- _tRecommender Systems and their Application in Recommending Research Papers -- _tSonam Gupta1,*, Lipika Goel2 and Rohit Vashisht3 -- _tINTRODUCTION -- _tNeed for Recommendation System -- _tPower of the Recommendation System -- _tPrerequisite of Recommendation System -- _tNatural Language Processing (NLP) -- _tLSA Algorithm -- _tArtificial Neural Network -- _tLITERATURE SURVEY -- _tSTEPS OF RECOMMENDATION PROCESS -- _tA. Data Collection -- _tA. Training Phase |
505 | 0 | 0 |
_aB. Recommendation Phase -- _tFILTERING TECHNIQUES -- _t1. Content-based Filtering -- _t2. Collaborative Filtering -- _tPROPOSED WORK -- _tA. Problem Statement -- _tB. Algorithm Used -- _tC. Result -- _tCONCLUSION -- _tCONSENT FOR PUBLICATION -- _tCONFLICT OF INTEREST -- _tACKNOWLEDGEMENTS -- _tREFERENCES -- _tAn Intelligent Surveillance System for Human Behavior Recognition: An Exhaustive Survey -- _tRuchi Jayaswal1,* and Manish Dixit1 -- _tINTRODUCTION -- _tClassification of Human Behavior -- _tNormal Behavior -- _tAbnormal Behavior -- _tProblems and Challenges -- _tMotivation and Recent Trends |
505 | 0 | 0 |
_aFramework for Abnormal Human Activity and Behavior Analysis -- _tPreprocessing and Foreground Object Detection -- _tObject Tracking -- _tFeature Extraction and Motion Information -- _tClassification and Activity Recognition -- _tSome Activity Recognition Methods and Techniques -- _tArtificial Neural Network (ANN) -- _tClustering -- _tHidden Markov Model (HMM) -- _tDeep Learning Models -- _tDatasets -- _tDatasets of Abandoned Object Detection -- _tTheft Detection Datasets -- _tFalling Detection Dataset -- _tViolence Detection Datasets -- _tFire Detection Datasets -- _tMiscellaneous Dataset -- _tEvaluation Metrics -- _tAccuracy |
500 | _aPrecision (PR), Recall (RP) and F-measure (FM) | ||
520 | 0 | _aThis book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering. The collection of chapters should inspire scholars involved in theoretical and applied sciences to con. | |
530 |
_a2 _ub |
||
650 | 0 | _aArtificial intelligence. | |
650 | 0 |
_aCommunication _xTechnology. |
|
655 | 1 | _aElectronic Books. | |
700 | 1 | _aYadav, Vikash. | |
700 | 1 | _aPal, Parashu Ram. | |
700 | 1 | _aLiu, Chuan-Ming. | |
856 | 4 | 0 |
_zClick to access digital title | log in using your CIU ID number and my.ciu.edu password. _uhttpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3406197&site=eds-live&custid=s3260518 |
942 |
_cOB _D _eEB _hTA. _m2022 _QOL _R _x _8NFIC _2LOC |
||
994 |
_a92 _bNT |
||
999 |
_c81467 _d81467 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |