Shortcuts
Please wait while page loads.
SISSA Library . Default .
PageMenu- Main Menu-
Page content

Catalogue Display

Applications of Computational Intelligence in Management & Mathematics: 8th ICCM, Nirjuli, AP, India, July 29–30, 2022 /

Applications of Computational Intelligence in Management & Mathematics: 8th ICCM, Nirjuli, AP, India, July 29–30, 2022 /
Catalogue Information
Field name Details
Dewey Class 519.5
Title Applications of Computational Intelligence in Management & Mathematics (EBook :) : 8th ICCM, Nirjuli, AP, India, July 29–30, 2022 / / edited by Madhusudhan Mishra, Nishtha Kesswani, Imene Brigui.
Added Personal Name Mishra, Madhusudhan
Kesswani, Nishtha
Brigui, Imene
Other name(s) SpringerLink (Online service)
Edition statement 1st ed. 2023.
Publication Cham : : Springer International Publishing : : Imprint: Springer, , 2023.
Physical Details XIII, 354 p. 1 illus. : online resource.
Series Springer Proceedings in Mathematics & Statistics 2194-1017 ; ; 417
ISBN 9783031251948
Summary Note Computational intelligence consists of those techniques that imitate the human brain and nature to adopt the decision-making approach. This book contains selected papers from the 8th International Conference on Computers, Management and Mathematical Sciences (ICCM) 2022 about fuzzy systems, neural networks and evolutionary computation that can address stochastic environments where reasoning is a significant attribute to derive potential solutions and focus on the business domain's computational aspects. This is a conference proceedings for scholars/students who are using the powerful algorithms, concepts and principles of computational intelligence in a wide spectrum of research cases.:
Contents note Development of Energy Efficient Routing Protocol for Lifespan Optimization in Wireless Sensor Networks (EERP) (A. Yadav) -- Sentiment Analysis using Social Media and Product Reviews (S. Kumar) -- A Stable Model for Learning and Memorization in Over-Parameterized Networks (S. Kumar) -- Analysis of Depth Sensing & Lane Detection Algorithms for Advanced Driver Assistance Systems (S. Mondal) -- Implementation Of E-Commerce Application with Analytics (Pooja M R) -- A Survey on the latest intrusions & their detection systems in IoT-based networks (S. Majumder) -- Design and analysis of Z-Source Inverter with Maximum Constant Boost Control Method (S. Sonar) -- SPV/Wind Energy-based Hybrid Grid-Connected System with Optimum Power Flow Operation (S. Rauth) -- A Study on Benchmarks for Ectopic Pregnancy Classification using Deep Learning Based on Risk Criteria (L. Suresh) -- An ontology-based approach for making smart suggestions based on sequence-based context modeling and deep learning classifications (S. Cheriyan) -- Simulation of GA Based Harmonics Elimination in CHMLI using DTC for Dynamic load (A. Sharma) -- Discussing the future perspective of Machine learning and Artificial Intelligence in COVID-19 Vaccination: A review (R. Roy) -- Embedded Platform based Heart Lung Sounds Separation using Variational Mode Decomposition (M. Mishra) -- MIMO- Modulation Schemes for Visible Light Communication in Indoor Scenarios (V. Vakamullu) -- Image Resampling Forensics: A Review on Techniques for Image Authentication (V. Kadha) -- The Impact of Perceived Justice and Customer Trust on Customer Loyalty (A. S. Rao) -- Performance analysis of wind diesel generation with three phase fault (A. Sharma) -- C-RPI : Cluster based Rendezvous Point Identification and Mobile Sink based data collection in LR-WPAN (Jayalekshmi S) -- Effect of Weather on COVID-19 pandemic in North East India (P. Das) -- A comparative study on the performance of Soft Computing models in the prediction of Orthopedic disease in the environment of Internet of Things (J. P. Choudhury) -- Maximization of Active Power Delivery in WECS Using BDFRG (M Paul) -- Identification and Detection of Credit Card Frauds Using CNN (Nalayini C M) -- Different degradation modes of field deployed Photovoltaic modules: A literature review (P. Das) -- Impact of Security Attacks on Spectrum Allocation in Cognitive Radio Networks (W. Singh) -- Human Activity Detection Using Attention Based Deep Network (M. Kumar) -- Software Vulnerability classification Using Learning Techniques (B. Verma) -- Service Recovery: Past, Present, and Future (A. S. Rao) -- An in-depth accessibility analysis of top online shopping websites (N Kesswani).
Mode of acces to digital resource Digital reproduction.-
Cham :
Springer International Publishing,
2023. -
Mode of access: World Wide Web. System requirements: Internet Explorer 6.0 (or higher) or Firefox 2.0 (or higher). Available as searchable text in PDF format.
System details note Online access to this digital book is restricted to subscription institutions through IP address (only for SISSA internal users).
Internet Site https://doi.org/10.1007/978-3-031-25194-8
Links to Related Works
Subject References:
Authors:
Corporate Authors:
Series:
Classification:
Catalogue Information 53695 Beginning of record . Catalogue Information 53695 Top of page .

Reviews


This item has not been rated.    Add a Review and/or Rating53695
Quick Search