Recent Developments in Artificial Intelligence and Communication Technologies -  - E-Book

Recent Developments in Artificial Intelligence and Communication Technologies E-Book

0,0
57,45 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering.

The collection of chapters should inspire scholars involved in theoretical and applied sciences to contribute to research using computational intelligence principles and methods in their respective research communities. Professionals working on systems engineering, communications, innovative computing systems and adaptive technologies for sustainable growth, will also be able to benefit from the information provided in the book.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 331

Veröffentlichungsjahr: 2003

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
PREFACE
List of Contributors
Automatic Suggestion Model for Tourist Using Efficient BST Searching
Abstract
INTRODUCTION
Study of the Existing System
Design and Implementation of the Proposed System
Module Description
Algorithm Used
Design and Implementation of the Recommendation Model
Module Description
Algorithm Used
Execution of the Recommended Model
Performance Analysis
Conclusion
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
References
Internet Protocols: Transition, Security Issues and the World of IoT
Abstract
INTRODUCTION
RELATED WORK
IPv4 and IPv6
IPv4
IPv6
Shortcomings of IPv4
NEED TO TRANSITION FROM IPv4 TO IPv6
IPv4 and IPv6 Coexistence
SECURITY THREATS
Security Threats Common to IPv4 and IPv6
Security Threats Related to IPv6
Security Threats Caused Due to Transition Mechanism
IPv6 & THE WORLD OF IoT
IPv6 over IPv4 for IoT
Why IPv6 for IoT?
Routing - IPv6 and the IoT Network
IoT Architecture Based on IPv6
CONCLUSION AND FUTURE SCOPE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Recommender Systems and their Application in Recommending Research Papers
Abstract
INTRODUCTION
Need for Recommendation System
Power of the Recommendation System
Prerequisite of Recommendation System
Natural Language Processing (NLP)
LSA Algorithm
Artificial Neural Network
LITERATURE SURVEY
STEPS OF RECOMMENDATION PROCESS
Data Collection
Training Phase
Recommendation Phase
FILTERING TECHNIQUES
Content-based Filtering
Collaborative Filtering
PROPOSED WORK
Problem Statement
Algorithm Used
Result
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
An Intelligent Surveillance System for Human Behavior Recognition: An Exhaustive Survey
Abstract
INTRODUCTION
Classification of Human Behavior
Normal Behavior
Abnormal Behavior
Suspicious Activity
Non-suspicious Activity
Problems and Challenges
Motivation and Recent Trends
Framework for Abnormal Human Activity and Behavior Analysis
Preprocessing and Foreground Object Detection
Object Tracking
Feature Extraction and Motion Information
Optical Flow Features
Trajectory-based Features
Region-based Features
Classification and Activity Recognition
Some Activity Recognition Methods and Techniques
Artificial Neural Network (ANN)
Clustering
Hidden Markov Model (HMM)
Deep Learning Models
Convolutional Neural Network
Recurrent Neural Network
Vanilla Recurrent Neural Network (VRNN)
Long Short-Term Memory (LSTM)
Gated Recurrent Unit (GRU)
Datasets
Datasets of Abandoned Object Detection
Theft Detection Datasets
Falling Detection Dataset
Violence Detection Datasets
Fire Detection Datasets
Miscellaneous Dataset
Evaluation Metrics
Accuracy
Precision (PR), Recall (RP) and F-measure (FM)
Sensitivity and Specificity
Percent Events Detected (P.E.D.) and Percent Alarms True (P.A.T.)
Confusion Metrics
ROC Curve
Conclusion
Future Scope
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
References
Load Balanced Clustering in WSN using MADM Approaches
Abstract
INTRODUCTION
LITERATURE SURVEY
RADIO MODEL AND UNDERTAKING
Undertaking
Radio Model
MADM APPROACHES
Topsis Approach
Promethee Approach
ATTRIBUTES USED IN SIMULATED WORK
Coverage_of_CHs
CHs_Avg_Distance
BS_Avg_Distance
Avg_Eresidual
CHs_Avg_lifetime
BS_CH_Bearing
BS_Max_Distance
Eres_Con_CHS
DATA SET AND EVOLUTION METHOD
CHs Selection using TOPSIS
CHs Selection using PROMETHEE
SIMULATION RESULTS
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
An Overview of Energy Efficient and Data Accuracy Target Tracking Methods in WSN
Abstract
INTRODUCTION
Overview of Recent Target Tracking Methods in WSN
Characteristics Maintaining Energy Efficiency in Target Tracking Algorithms
Self-Organizing Network Approaches in Target Tracking
Discussion and Comparison
Conclusion and Future Work
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
A Survey of Current Mobile Learning Technology in India
Abstract
INTRODUCTION
M-Learning
MOBILE DEVICES
EVOLUTION OF MOBILE LEARNING
COMPONENETS OF MOBILE LEARNING
BENEFITS OF MOBILE LEARNING
CHALLENGES IN MOBILE LEARNING
APPLICATIONS OF MOBILE LEARNING
Online Learning and Blended Learning
Game-Based Learning (GBL)
Online Learning in Remote Areas
MOTIVATION
MOBILE LEARNING TOOLS
Literature Survey
CONCLUSION AND FUTURE SCOPE
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Fuzzy Systems and Applications from an Engineer’s Perspective (Fuzzy Textual Data Classification - Case Study)
Abstract
INTRODUCTION
Probability and Fuzzy Sets
Participation Function Terminology
Gaussian Participation Function
Operations on Fuzzy Sets
Text Classification
Vocabulory_Generation
Algorithm_2 Fuzzy_Collections
CONCLUDING REMARKS
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Efficient Resources Utilization of Containerized Applications Using TOPSIS
Abstract
INTRODUCTION
MOTIVATION
BACKGROUND RELATED TECHNOLOGY
Load Balancing
Containers
Docker Swarm
Docker
HA Proxy
Apache HTTP Server Benchmarking Tool
RELATED WORK
PROPOSED APPROACH
EXPERIMENTAL SETUP
Build Image
Docker Compose
Create Docker Swarm
Workload Generation
Plotting Results
RESULT ANALYSIS
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Increasing Performance of Boolean Retrieval Model by Data Parallelism Technique
Abstract
INTRODUCTION
Information Retrieval
MAJOR I.R. MODELS
Boolean Retrieval Model
Narrowing and Broadening Techniques
Smart Boolean
Extended Boolean Models
INVERTED INDEXING
Increasing Performance of Boolean Retrieval Model Using Data Parallelism Technique
Issues and Challenges of BRM
WORKING OF THE PROPOSED BOOLEAN MODEL FOR IR
Sequential Execution of this Model
Module – 1. Storing Files
Algorithm
Module – 2. Data Pre-processing
Algorithm
Module – 3. Creation of Indexes and Posting lists (String w)
Algorithm
Module - 4 Boolean Intersection
Algorithm
Parallel Execution of BRM
Algorithm
RESULT ANALYSIS
Output Screen Shots of Program
Analysis
Precision
Recall
F-measure
CONCLUSION
CONSENT FOR PUBLICATION
CONFLICT OF INTEREST
ACKNOWLEDGEMENTS
REFERENCES
Recent Developments in Artificial Intelligence and Communication Technologies
Edited by
Vikash Yadav
Government Polytechnic Bighapur Unnao
Board of Technical Education
Uttar Pradesh
India
Parashu Ram Pal
SAGE University, Bhopal
Madhya Pradesh
India
&
Chuan-Ming Liu
National Taipei University of Technology
Taiwan

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the ebook/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

PREFACE

Imparting intelligence has become the focus of various computational paradigms. Thanks to evolving soft computing and artificial intelligence methodologies, scientists have been able to explain and understand real-life processes and practices that formerly remained unexplored by dint of their underlying imprecision, uncertainties and redundancies, as well as the unavailability of appropriate methods for describing the inexactness, incompleteness and vagueness of information representation. Computational intelligence tries to explore and unearth intelligence embedded in the system under consideration.

This book aims to discuss computational intelligence approaches, initiatives, and applications in engineering and science fields (including Machine Intelligence, Mining Engineering, Modeling and Simulation, Computer, Communication, Networking and Information Engineering, Systems Engineering, Innovative Computing Systems, Adaptive Technologies for Sustainable Growth, and Theoretical and Applied Sciences). This collection should inspire various scholars to contribute research on intelligence principles and approaches in their respective research communities while enriching the body of research on computational intelligence.

Vikash Yadav Department of Technical Education Uttar Pradesh IndiaParashu Ram Pal SAGE University, Bhopal Madhya Pradesh India &Chuan-Ming Liu

List of Contributors

Ankita GuptaG.B. Pant Engineering College, New Delhi, IndiaAnkit SrivastavaG.B. Pant Engineering College, New Delhi, IndiaAlok KumarMotilal Nehru National Institute of Technology Allahabad, Prayagraj Uttar Pradesh, IndiaAvjeet SinghMotilal Nehru National Institute of Technology Allahabad, Prayagraj Uttar Pradesh, IndiaAnoj KumarMotilal Nehru National Institute of Technology Allahabad, Prayagraj Uttar Pradesh, IndiaAnita YadavDepartment of Computer Science and Engineering, Harcourt Butler Technical University, Kanpur, Uttar Pradesh, IndiaDharmendra Kumar YadavMotilal Nehru National Institute of Technology, Prayagraj, Uttar Pradesh, IndiaEtika RastogiDepartment of Computer Science and Engineering, Meerut Institute of Engineering and Technology, Meerut, Uttar Pradesh, IndiaHarishchandra A. AkarteMotilal Nehru National Institute of Technology, Prayagraj, Uttar Pradesh, IndiaHardik SharmaDepartment of Computer Science and Engineering, Meerut Institute of Engineering & Technology, Meerut, U.P., IndiaKajal GuptaDepartment of Computer Science and Engineering, Meerut Institute of Engineering and Technology, Meerut, Uttar Pradesh, IndiaLipika GoelGokaraju Rangaraju Institute of Technology, Hyderabad, IndiaLekhrajMotilal Nehru National Institute of Technology Allahabad, Prayagraj Uttar Pradesh, IndiaMukesh RawatDepartment of Computer Science and Engineering, Meerut Institute of Engineering and Technology, Meerut, Uttar Pradesh, IndiaManish DixitDepartment of CSE & IT, Madhav Institute of Technology and Science, Gwalior, M.P., IndiaMohammed Abdul WajeedVasavi College of Engineering, Ibrahimbagh, Telangana, IndiaMahendra Pratap YadavSRMIST NCR Campus, Modinagar, Ghaziabad, UP-201204, IndiaMukesh RawatDepartment of Computer Science and Engineering, Meerut Institute of Engineering & Technology, Meerut, U.P., IndiaManan GuptaDepartment of Computer Science and Engineering, Meerut Institute of Engineering & Technology, Meerut, U.P., IndiaPooja GuptaMeerut Institute of Engineering and Technology, Meerut, Uttar Pradesh, IndiaPreksha PratapDepartment of Computer Science and Engineering, Meerut Institute of Engineering & Technology, Meerut, U.P., IndiaRohit AnandG.B. Pant Engineering College, New Delhi, IndiaRohit VashishtABES Engineering College, Ghaziabad, IndiaRuchi JayaswalDepartment of CSE & IT, Madhav Institute of Technology and Science, Gwalior, M.P., IndiaSonam GuptaAjay Kumar Garg Engineering College, Ghaziabad, IndiaUrvashi SaraswatDepartment of Computer Science and Engineering, Harcourt Butler Technical University, Kanpur, Uttar Pradesh, IndiaVimal KumarMeerut Institute of Engineering and Technology, Meerut, Uttar Pradesh, India

Automatic Suggestion Model for Tourist Using Efficient BST Searching

Etika Rastogi1,*,Kajal Gupta1,Mukesh Rawat1
1 Department of Computer Science and Engineering, Meerut Institute of Engineering and Technology, Meerut, Uttar Pradesh, India

Abstract

The traditional artificial guide service can be substituted by the advanced intelligent tourism guide system, which can help many developing tourism industries as the demand for tourism is going higher in today's world. An intelligent tourism guide system can create automatic recommendations according to the preferences [1]. With the instantaneous evolution of computer technology and electronic information technology as the basis, this chapter combines the tree-based algorithm and associated knowledge of tree theory to implement an algorithm and processing plan. The objective of our approach is to build a relationship between the user and the system. The application provides many services to the user meeting their needs and the purpose of gaining information about the places. The application mainly represents a mobile tour guide system with augmented reality. The main objective of the application is to make a system that runs on most of the mobile devices and becomes helpful to the user while visiting new places. The system should find a place using user preferences, like beaches, historical monuments, hill stations, temples, adventurous places, etc. The system should show recommendations about those places along with the description and images. This application will help the people who love to travel and want to travel to new places without having previous information about the place. This model [2-5] makes the use of efficient BST Searching as compared to the database. The information about various places is stored in the tree data structure, and it becomes easy to store a lot of data in the tree as compared to the database because it requires more memory and time to store lots of information into the database. The main advantage of using the system is to make the searching process easier and to ease the process of storing the data in the tree rather than the database. The tree-based algorithm is efficient in terms of storage and retrieval of data so that the performance of the system is enhanced. The application takes less time to fetch the data using a tree-based algorithm according to added preferences by the user as compared to the database, which takes more time to fetch the data and to display it as required.

Keywords: Algorithm, Binary search tree, Deserialization, Efficient searching, Intelligent tourism guide, Retrieval, Serialization, Traversal.
*Corresponding author Etika Rastogi: Department of Computer Science and Engineering, Meerut Institute of Engineering and Technology, Meerut, Uttar Pradesh, India; E-mail: [email protected]

CONSENT FOR PUBLICATION

Not applicable.

CONFLICT OF INTEREST

The author declares no conflict of interest, financial or otherwise.

ACKNOWLEDGEMENTS

Declared none.

References

[1]Owaied H.H., Farhan H.A., Al-Hawamde N., Al-Okialy N.. A Model for Intelligent Tourism Guide System.J. Appl. Sci. (Faisalabad)201111234234710.3923/jas.2011.342.347[2]Yu Y.. Design and Evaluation of Intelligent Tourist Guide System Based on Mobile Devices2014 Sixth International Conference on Intelligent Human-Machine Systems and Cybernetics201429629910.1109/IHMSC.2014.79[3]Rong F.. Design of Tourism Resources Management Based on Artificial Intelligence2016 International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS)201643643910.1109/ICITBS.2016.97[4]Yadav V.. A New Approach for Movie Recommender System using K-means Clustering and PCA.Journal of Scientific and Industrial Research (JSIR)Scientific Publishers2021802159165[5]Srinivasan K., Kumar R., Singla S.. Robust and efficient algorithms for storage and retrieval of disk based data structures2017 International Conference on Applied System Innovation (ICASI)201793493710.1109/ICASI.2017.7988595[6]Ho C., Pak K., Pak S., Pak M., Hwang C.. A Study on Improving the Performance of Encrypted Database Retrieval Using External Indexing System of B+ Tree Structure.Procedia Comput. Sci.201915470671410.1016/j.procs.2019.06.110[7]Dewan H., Hansdah R., Singh P.. Sigma-Tree:Design of a Data Structure for Storing File Data Allocation Map in a Distributed File System2018 IEEE International Conference on Smart Cloud (SmartCloud)2018909810.1109/SmartCloud.2018.00023[8]Badashian A.S., Najafpour M., Mandavi M., Deichen M.A., Khalkhali I.. FTS: An efficient tree structure based tool for searching in large data sets2nd IEEE International Conference on Information Management and Engineering201029429810.1109/ICIME.2010.5477555[9]Schildt Herbert. Java.McGraw Hill Education “The Complete Reference” (11th Edition)2009[10]Lafore R.. Data Structure and Algorithm in Java.2nd ed2003