000 05012cam a2200457Mi 4500
001 on1350686042
003 OCoLC
005 20240726104858.0
008 221119s2022 xx o ||| 0 eng d
040 _aEBLCP
_beng
_erda
_cEBLCP
_dNT
020 _a9781681089676
_q((electronic)l(electronic)ctronic)
050 0 4 _aTA347
_b.R434 2022
049 _aMAIN
245 1 0 _aRecent Developments in Artificial Intelligence and Communication Technologies
260 _aSharjah :
_bBentham Science Publishers,
_c(c)2022.
300 _a1 online resource (232 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
500 _aDescription based upon print version of record.
504 _a2
505 0 0 _aCover --
_tTitle --
_tCopyright --
_tEnd User License Agreement --
_tContents --
_tPreface --
_tList of Contributors --
_tAutomatic Suggestion Model for Tourist Using Efficient BST Searching --
_tEtika Rastogi1,*, Kajal Gupta1 and Mukesh Rawat1 --
_tINTRODUCTION --
_tStudy of the Existing System --
_tDesign and Implementation of the Proposed System --
_tModule Description --
_tAlgorithm Used --
_tDesign and Implementation of the Recommendation Model --
_tModule Description --
_tAlgorithm Used --
_tExecution of the Recommended Model --
_tPerformance Analysis --
_tCONCLUSION --
_tCONSENT FOR PUBLICATION --
_tCONFLICT OF INTEREST
505 0 0 _aACKNOWLEDGEMENTS --
_tREFERENCES --
_tInternet Protocols: Transition, Security Issues and the World of IoT --
_tAnkita Gupta1, Ankit Srivastava1 and Rohit Anand1,* --
_tINTRODUCTION --
_tRELATED WORK --
_tIPV4 AND IPV6 --
_tIPv4 --
_tIPv6 --
_tShortcomings of IPv4 --
_tNEED TO TRANSITION FROM IPV4 TO IPV6 --
_tIPv4 and IPv6 Coexistence --
_tSECURITY THREATS --
_tSecurity Threats Common to IPv4 and IPv6 --
_tSecurity Threats Related to IPv6 --
_tSecurity Threats Caused Due to Transition Mechanism --
_tIPV6 and THE WORLD OF IOT --
_tIPv6 over IPv4 for IoT --
_tWhy IPv6 for IoT? --
_tRouting --
_tIPv6 and the IoT Network
505 0 0 _aIoT Architecture Based on IPv6 --
_tCONCLUSION AND FUTURE SCOPE --
_tCONSENT FOR PUBLICATION --
_tCONFLICT OF INTEREST --
_tACKNOWLEDGEMENTS --
_tREFERENCES --
_tRecommender Systems and their Application in Recommending Research Papers --
_tSonam Gupta1,*, Lipika Goel2 and Rohit Vashisht3 --
_tINTRODUCTION --
_tNeed for Recommendation System --
_tPower of the Recommendation System --
_tPrerequisite of Recommendation System --
_tNatural Language Processing (NLP) --
_tLSA Algorithm --
_tArtificial Neural Network --
_tLITERATURE SURVEY --
_tSTEPS OF RECOMMENDATION PROCESS --
_tA. Data Collection --
_tA. Training Phase
505 0 0 _aB. Recommendation Phase --
_tFILTERING TECHNIQUES --
_t1. Content-based Filtering --
_t2. Collaborative Filtering --
_tPROPOSED WORK --
_tA. Problem Statement --
_tB. Algorithm Used --
_tC. Result --
_tCONCLUSION --
_tCONSENT FOR PUBLICATION --
_tCONFLICT OF INTEREST --
_tACKNOWLEDGEMENTS --
_tREFERENCES --
_tAn Intelligent Surveillance System for Human Behavior Recognition: An Exhaustive Survey --
_tRuchi Jayaswal1,* and Manish Dixit1 --
_tINTRODUCTION --
_tClassification of Human Behavior --
_tNormal Behavior --
_tAbnormal Behavior --
_tProblems and Challenges --
_tMotivation and Recent Trends
505 0 0 _aFramework for Abnormal Human Activity and Behavior Analysis --
_tPreprocessing and Foreground Object Detection --
_tObject Tracking --
_tFeature Extraction and Motion Information --
_tClassification and Activity Recognition --
_tSome Activity Recognition Methods and Techniques --
_tArtificial Neural Network (ANN) --
_tClustering --
_tHidden Markov Model (HMM) --
_tDeep Learning Models --
_tDatasets --
_tDatasets of Abandoned Object Detection --
_tTheft Detection Datasets --
_tFalling Detection Dataset --
_tViolence Detection Datasets --
_tFire Detection Datasets --
_tMiscellaneous Dataset --
_tEvaluation Metrics --
_tAccuracy
500 _aPrecision (PR), Recall (RP) and F-measure (FM)
520 0 _aThis book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering. The collection of chapters should inspire scholars involved in theoretical and applied sciences to con.
530 _a2
_ub
650 0 _aArtificial intelligence.
650 0 _aCommunication
_xTechnology.
655 1 _aElectronic Books.
700 1 _aYadav, Vikash.
700 1 _aPal, Parashu Ram.
700 1 _aLiu, Chuan-Ming.
856 4 0 _zClick to access digital title | log in using your CIU ID number and my.ciu.edu password.
_uhttpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3406197&site=eds-live&custid=s3260518
942 _cOB
_D
_eEB
_hTA.
_m2022
_QOL
_R
_x
_8NFIC
_2LOC
994 _a92
_bNT
999 _c81467
_d81467
902 _a1
_bCynthia Snell
_c1
_dCynthia Snell