Desktop version

Home arrow Computer Science

  • Increase font
  • Decrease font


Artificial Intelligence Techniques in IoT Sensor Networks

Adaptive Regularized Gaussian Kernel FCM for the Segmentation of Medical Images: An Artificial Intelligence-Based IoT Implementation for Teleradiology NetworkINTRODUCTIONPROPOSED METHODOLOGYFuzzy ะก-Means ClusteringFormulation of Nonlinear Tensor Diffusion Filtered Image. Improved Adaptive Regularized Kernel FCMRESULTS AND DISCUSSIONCONCLUSIONACKNOWLEDGMENTSREFERENCESArtificial Intelligence-Based Fuzzy Logic with Modified Particle Swarm Optimization Algorithm for Internet of Things-Enabled Logistic Transportation PlanningINTRODUCTIONRELATED WORKSPROPOSED METHODPackage PartitioningPlanning of Delivery Path Using HFMPSO AlgorithmInserting Pickup PackagesEXPERIMENTAL VALIDATIONPerformance Analysis under Varying Package CountPerformance Analysis under Varying Vehicle CapacitiesComputation Time (CT) analysisCONCLUSIONACKNOWLEDGMENTREFERENCESButterfly Optimization-Based Feature Selection with Gradient Boosting Tree for Big Data Analytics in Social Internet of ThingsINTRODUCTIONRELATED WORKSTHE PROPOSED METHODHadoop EcosystemBOA-Based FS ProcessGBT-Based ClassificationEXPERIMENTAL ANALYSISFS Results AnalysisClassification Results AnalysisEnergy Consumption AnalysisThroughput AnalysisCONCLUSIONREFERENCESAn Energy-Efficient Fuzzy Logic-Based Clustering with Data Aggregation Protocol for WSN-Assisted IoT SystemINTRODUCTIONBACKGROUND INFORMATIONClustering ObjectiveClustering CharacteristicsPROPOSED FUZZY-BASED CLUSTERING AND DATA AGGREGATION (FC-DR) PROTOCOLFuzzy-Based Clustering ProcessData Aggregation ProcessPERFORMANCE VALIDATIONCONCLUSIONREFERENCESAnalysis of Smart Home Recommendation System from Natural Language Processing Services with Clustering TechniqueINTRODUCTIONREVIEW OF LITERATURESSMART HOME: CLOUD BACKEND SERVICESOUR PROPOSED APPROACHNatural Language Processing ServicesPipeline Structure for NLPSStop Word Removal by Recommendation SystemsWord Modeling ProcedureClustering ModelRESULTS AND ANALYSISComparative Analysis of NLPSCONCLUSIONREFERENCESMetaheuristic-Based Kernel Extreme Learning Machine Model for Disease Diagnosis in Industrial Internet of Things Sensor NetworksINTRODUCTIONPROPOSED METHODOLOGYDeflate-Based Compression ModelSMO-KELM-Based Diagnosis ModelKey Steps of SMO Algorithm ImplementationEXPERIMENTAL RESULTS AND VALIDATIONCONCLUSIONREFERENCESFuzzy Support Vector Machine with SMOTE for Handling Class Imbalanced Data in IoT-Based Cloud EnvironmentINTRODUCTIONTHE PROPOSED MODELSMOTE ModelFSVM-Based Classification ModelSIMULATION RESULTS AND DISCUSSIONCONCLUSIONREFERENCESEnergy-Efficient Unequal Clustering Algorithm Using Hybridization of Social Spider with Krill Herd in IoT-Assisted Wireless Sensor NetworksINTRODUCTIONRESEARCH BACKGROUNDLITERATURE SURVEYTHE PROPOSED SS-KH ALGORITHMSS-Based TCH SelectionKH-Based FCH AlgorithmEXPERIMENTAL VALIDATIONImplementation SetupPerformance AnalysisComparative Study on Energy Efficiency AnalysisComparative Study on Network Lifetime Analysis in Terms of Alive NodesCONCLUSIONREFERENCESloT Sensor Networks with 5G-Enabled Faster RCNN-Based Generative Adversarial Network Model for Face Sketch SynthesisINTRODUCTIONTHE PROPOSED FRCNN-GAN MODELData CollectionFaster R-CNN-Based Face RecognitionGAN-Based Synthesis ProcessPERFORMANCE VALIDATIONCONCLUSIONACKNOWLEDGMENTREFERENCESArtificial Intelligence-Based Textual Cyberbullying Detection for Twitter Data Analysis in Cloud-Based Internet of ThingsINTRODUCTIONLITERATURE REVIEWPROPOSED METHODOLOGYPreprocessingFeature ExtractionFeature Selection Using Ranking MethodCyberbully DetectionDataset DescriptionRESULT AND DISCUSSION_Evaluation MetricsComparative AnalysisCONCLUSIONREFERENCESAn Energy-Efficient Quasi-Oppositional Krill Herd Algorithm-Based Clustering Protocol for Internet of Things Sensor NetworksINTRODUCTIONTHE PROPOSED CLUSTERING ALGORITHM_PERFORMANCE VALIDATIONCONCLUSIONREFERENCESAn Effective Social Internet of Things (SIoT) Model for Malicious Node Detection in Wireless Sensor NetworksINTRODUCTIONREVIEW OF RECENT KINDS OF LITERATURENETWORK MODEL: SloTMalicious Attacker Model in SIoTPROPOSED MN IN SloT SYSTEMTrust-Based Grouping in SloT NetworkExponential Kernel Model for MN DetectionDetection ModelRESULTS AND ANALYSISCONCLUSIONREFERENCES

Related topics