Linked e-resources

Details

Intro
Preface
Contents
About the Editors
Designing Recommendation System for Hotels Using Cosine Similarity Function
1 Introduction
2 Problem Modelling
3 Literature Review
4 Flow Diagram
5 Cosine Similarity Function
5.1 Compute the Similarity Score
5.2 Determine the Magnitude
6 Working Diagram
7 Contrasting
7.1 Cosine Similarity Function Versus Euclidean Distance
7.2 Drawbacks of Cosine Similarity Function
7.3 Jaccard Similarity Versus Cosine Similarity Function
8 Applications
9 Architecture Diagram
10 Results and Discussion

11 Identifying Similar Users
12 Conclusion
References
Vehicle Detection in Autonomous Vehicles Using Computer Vision
1 Introduction
2 Background
3 Architecture of Self-driving Cars
4 Existing Methods
4.1 CNN
4.2 RCNN
4.3 Fast RCNN
4.4 Faster RCNN
5 Proposed Methodology-YOLO
6 YOLO Framework
7 Intersection Over Union and Non-max Suppression
8 Experimental Setup
9 Algorithm
10 Results and Discussions
10.1 Precision-Recall Curve
10.2 Prediction Rate
11 Conclusion
References

Analysis of the Volume of Costs and Profits Under Conditions of Uncertainty Using the Method of Fuzzy Logic
1 Introduction
2 Fuzzy Logic Theory
2.1 Fuzzy Rules
2.2 Fuzzification
2.3 Inference
2.4 Defuzzification
3 Operating Volume Profit Analysis
3.1 Breakeven Point Analysis
4 Fuzzy Logic Approach for AVP Analysis
4.1 Analyzing Data Using Fuzzy Logic Method
4.2 Data, Purpose, and Method
4.3 Resolving Fuzzification
5 Conclusion
References
Deep Learning-Based Sign Language Recognition and Translation
1 Introduction
2 Literature Review

3 Convolutional Neural Network
4 Proposed System
5 Implementation
6 Result and Discussion
7 Conclusion and Future Scope
References
Automated Suspicious Activity Detection from Surveillance Videos
1 Introduction
2 Literature Survey
3 Proposed System
3.1 LRCN Model
3.2 Dataset
3.3 Pre-processing
3.4 Training and Testing
3.5 Deployment
4 Results and Analysis
4.1 Model Layer Diagram
5 Conclusion and Future Scope
References
Emergence of Blockchain Technology in Various Smart IoMT-Enabled Healthcare Security Scenarios
1 Introduction

2 Literature Review
3 Smart Healthcare Security Requirements
4 Blockchain
4.1 Blockchain Header
4.2 Transaction Header
5 Blockchain and Smart Health Care
5.1 Need of Blockchain for Smart Health Care
5.2 Security Issues of Blockchain
5.3 Integration of IoT and Machine Learning Models
6 Comparative Study
7 Research Challenges
8 Future Scope
9 Conclusion
References
Elderly People Assistance Based on Advanced Hardware Module and a Mobile App
1 Introduction
1.1 Objective and Scope
2 Literature Survey
3 Methodology
3.1 Technical Feasibility

Browse Subjects

Show more subjects...

Statistics

from
to
Export