Limit search to available items
Book Cover
E-book

Title Recent Developments in Artificial Intelligence and Communication Technologies
Published Sharjah : Bentham Science Publishers, 2022

Copies

Description 1 online resource (232 p.)
Contents Cover -- Title -- Copyright -- End User License Agreement -- Contents -- Preface -- List of Contributors -- Automatic Suggestion Model for Tourist Using Efficient BST Searching -- Etika Rastogi1,*, Kajal Gupta1 and Mukesh Rawat1 -- INTRODUCTION -- Study of the Existing System -- Design and Implementation of the Proposed System -- Module Description -- Algorithm Used -- Design and Implementation of the Recommendation Model -- Module Description -- Algorithm Used -- Execution of the Recommended Model -- Performance Analysis -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST
ACKNOWLEDGEMENTS -- REFERENCES -- Internet Protocols: Transition, Security Issues and the World of IoT -- Ankita Gupta1, Ankit Srivastava1 and Rohit Anand1,* -- INTRODUCTION -- RELATED WORK -- IPV4 AND IPV6 -- IPv4 -- IPv6 -- Shortcomings of IPv4 -- NEED TO TRANSITION FROM IPV4 TO IPV6 -- IPv4 and IPv6 Coexistence -- SECURITY THREATS -- Security Threats Common to IPv4 and IPv6 -- Security Threats Related to IPv6 -- Security Threats Caused Due to Transition Mechanism -- IPV6 & THE WORLD OF IOT -- IPv6 over IPv4 for IoT -- Why IPv6 for IoT? -- Routing -- IPv6 and the IoT Network
IoT Architecture Based on IPv6 -- CONCLUSION AND FUTURE SCOPE -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- Recommender Systems and their Application in Recommending Research Papers -- Sonam Gupta1,*, Lipika Goel2 and Rohit Vashisht3 -- INTRODUCTION -- Need for Recommendation System -- Power of the Recommendation System -- Prerequisite of Recommendation System -- Natural Language Processing (NLP) -- LSA Algorithm -- Artificial Neural Network -- LITERATURE SURVEY -- STEPS OF RECOMMENDATION PROCESS -- A. Data Collection -- A. Training Phase
B. Recommendation Phase -- FILTERING TECHNIQUES -- 1. Content-based Filtering -- 2. Collaborative Filtering -- PROPOSED WORK -- A. Problem Statement -- B. Algorithm Used -- C. Result -- CONCLUSION -- CONSENT FOR PUBLICATION -- CONFLICT OF INTEREST -- ACKNOWLEDGEMENTS -- REFERENCES -- An Intelligent Surveillance System for Human Behavior Recognition: An Exhaustive Survey -- Ruchi Jayaswal1,* and Manish Dixit1 -- INTRODUCTION -- Classification of Human Behavior -- Normal Behavior -- Abnormal Behavior -- Problems and Challenges -- Motivation and Recent Trends
Framework for Abnormal Human Activity and Behavior Analysis -- Preprocessing and Foreground Object Detection -- Object Tracking -- Feature Extraction and Motion Information -- Classification and Activity Recognition -- Some Activity Recognition Methods and Techniques -- Artificial Neural Network (ANN) -- Clustering -- Hidden Markov Model (HMM) -- Deep Learning Models -- Datasets -- Datasets of Abandoned Object Detection -- Theft Detection Datasets -- Falling Detection Dataset -- Violence Detection Datasets -- Fire Detection Datasets -- Miscellaneous Dataset -- Evaluation Metrics -- Accuracy
Summary This book is a review of recent artificial intelligence approaches, initiatives and applications in engineering and science fields. It features contributions that highlight the use of techniques such as machine learning, mining engineering, modeling and simulation, and fuzzy logic methods in the fields of communication, networking and information engineering. The collection of chapters should inspire scholars involved in theoretical and applied sciences to con
Notes Description based upon print version of record
Precision (PR), Recall (RP) and F-measure (FM)
Subject Artificial intelligence.
Communication -- Technology
Artificial intelligence.
Communication -- Technology.
Form Electronic book
Author Yadav, Vikash.
Pal, Parashu Ram
Liu, Chuan-Ming.
ISBN 168108967X
9781681089676