Desktop version
Home
Computer Science
>>
Artificial Intelligence Techniques in IoT Sensor Networks
Adaptive Regularized Gaussian Kernel FCM for the Segmentation of Medical Images: An Artificial Intelligence-Based IoT Implementation for Teleradiology Network
INTRODUCTION
PROPOSED METHODOLOGY
Fuzzy ะก-Means Clustering
Formulation of Nonlinear Tensor Diffusion Filtered Image. Improved Adaptive Regularized Kernel FCM
RESULTS AND DISCUSSION
CONCLUSION
ACKNOWLEDGMENTS
REFERENCES
Artificial Intelligence-Based Fuzzy Logic with Modified Particle Swarm Optimization Algorithm for Internet of Things-Enabled Logistic Transportation Planning
INTRODUCTION
RELATED WORKS
PROPOSED METHOD
Package Partitioning
Planning of Delivery Path Using HFMPSO Algorithm
Inserting Pickup Packages
EXPERIMENTAL VALIDATION
Performance Analysis under Varying Package Count
Performance Analysis under Varying Vehicle Capacities
Computation Time (CT) analysis
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Butterfly Optimization-Based Feature Selection with Gradient Boosting Tree for Big Data Analytics in Social Internet of Things
INTRODUCTION
RELATED WORKS
THE PROPOSED METHOD
Hadoop Ecosystem
BOA-Based FS Process
GBT-Based Classification
EXPERIMENTAL ANALYSIS
FS Results Analysis
Classification Results Analysis
Energy Consumption Analysis
Throughput Analysis
CONCLUSION
REFERENCES
An Energy-Efficient Fuzzy Logic-Based Clustering with Data Aggregation Protocol for WSN-Assisted IoT System
INTRODUCTION
BACKGROUND INFORMATION
Clustering Objective
Clustering Characteristics
PROPOSED FUZZY-BASED CLUSTERING AND DATA AGGREGATION (FC-DR) PROTOCOL
Fuzzy-Based Clustering Process
Data Aggregation Process
PERFORMANCE VALIDATION
CONCLUSION
REFERENCES
Analysis of Smart Home Recommendation System from Natural Language Processing Services with Clustering Technique
INTRODUCTION
REVIEW OF LITERATURES
SMART HOME: CLOUD BACKEND SERVICES
OUR PROPOSED APPROACH
Natural Language Processing Services
Pipeline Structure for NLPS
Stop Word Removal by Recommendation Systems
Word Modeling Procedure
Clustering Model
RESULTS AND ANALYSIS
Comparative Analysis of NLPS
CONCLUSION
REFERENCES
Metaheuristic-Based Kernel Extreme Learning Machine Model for Disease Diagnosis in Industrial Internet of Things Sensor Networks
INTRODUCTION
PROPOSED METHODOLOGY
Deflate-Based Compression Model
SMO-KELM-Based Diagnosis Model
Key Steps of SMO Algorithm Implementation
EXPERIMENTAL RESULTS AND VALIDATION
CONCLUSION
REFERENCES
Fuzzy Support Vector Machine with SMOTE for Handling Class Imbalanced Data in IoT-Based Cloud Environment
INTRODUCTION
THE PROPOSED MODEL
SMOTE Model
FSVM-Based Classification Model
SIMULATION RESULTS AND DISCUSSION
CONCLUSION
REFERENCES
Energy-Efficient Unequal Clustering Algorithm Using Hybridization of Social Spider with Krill Herd in IoT-Assisted Wireless Sensor Networks
INTRODUCTION
RESEARCH BACKGROUND
LITERATURE SURVEY
THE PROPOSED SS-KH ALGORITHM
SS-Based TCH Selection
KH-Based FCH Algorithm
EXPERIMENTAL VALIDATION
Implementation Setup
Performance Analysis
Comparative Study on Energy Efficiency Analysis
Comparative Study on Network Lifetime Analysis in Terms of Alive Nodes
CONCLUSION
REFERENCES
loT Sensor Networks with 5G-Enabled Faster RCNN-Based Generative Adversarial Network Model for Face Sketch Synthesis
INTRODUCTION
THE PROPOSED FRCNN-GAN MODEL
Data Collection
Faster R-CNN-Based Face Recognition
GAN-Based Synthesis Process
PERFORMANCE VALIDATION
CONCLUSION
ACKNOWLEDGMENT
REFERENCES
Artificial Intelligence-Based Textual Cyberbullying Detection for Twitter Data Analysis in Cloud-Based Internet of Things
INTRODUCTION
LITERATURE REVIEW
PROPOSED METHODOLOGY
Preprocessing
Feature Extraction
Feature Selection Using Ranking Method
Cyberbully Detection
Dataset Description
RESULT AND DISCUSSION_
Evaluation Metrics
Comparative Analysis
CONCLUSION
REFERENCES
An Energy-Efficient Quasi-Oppositional Krill Herd Algorithm-Based Clustering Protocol for Internet of Things Sensor Networks
INTRODUCTION
THE PROPOSED CLUSTERING ALGORITHM_
PERFORMANCE VALIDATION
CONCLUSION
REFERENCES
An Effective Social Internet of Things (SIoT) Model for Malicious Node Detection in Wireless Sensor Networks
INTRODUCTION
REVIEW OF RECENT KINDS OF LITERATURE
NETWORK MODEL: SloT
Malicious Attacker Model in SIoT
PROPOSED MN IN SloT SYSTEM
Trust-Based Grouping in SloT Network
Exponential Kernel Model for MN Detection
Detection Model
RESULTS AND ANALYSIS
CONCLUSION
REFERENCES
>>
Related topics
Academic library - free online college e textbooks - info{at}ebrary.net - © 2014 - 2023