Search Results - Clustering of Time Series Data and Algorithms

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Classification, (Big) Data Analysis and Statistical Learning

    ISBN: 9783319557083
    ISSN: 1431-8814
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Caviezel (Univ. of Bergamo) et al -- Comparing multi-step ahead forecasting functions for time series clustering - M. Corduas (Univ. of Naples Federico II) et al -- Electre Tri-Machine Learning Approach to the Record Linkage - V. …”

    Get full text
    Electronic eBook
  2. 2

    Advanced Data Analytics Using Python With Machine Learning, Deep Learning and NLP Examples / by Mukhopadhyay, Sayan

    ISBN: 9781484234501
    Published: Berkeley, CA : Apress, 2018.

    Get full text
    Electronic eBook
  3. 3

    Computational intelligence and predictive analysis for medical science : a pragmatic approach /

    ISBN: 9783110715279
    ISSN: 2629-7140 ;
    Published: Berlin ; Boston : De Gruyter, [2021]
    Table of Contents: “…Classification and clustering algorithms in identifying patterns in medical science --…”

    Get full text
    eBook
  4. 4

    Recent Developments in Data Science and Business Analytics Proceedings of the International Conference on Data Science and Business Analytics (ICDSBA- 2017) /

    ISBN: 9783319727455
    ISSN: 2198-7246
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Part I Marketing and Supply Chain Analytics: Chapter1: Research on Differential Pricing and Coordination Mechanism of Second-Class Supply Chain of New Products and Remanufactured Products -- Chapter2: A study on Cooperation Strategies of Dual Channel Supply Chain Based on Service Level -- Chapter3: The Quality Management of Food Supply Chain in Perspective of Food Safety -- Chapter4: Strategic Customer Behavior with Risk Preference for a Supply Chain Management Based on Double Channel -- Chapter5: Competition and Coordination in Single-supplier Multiple-retailer Supply Chain -- Chapter6: Research on the Construction of Enterprise Brand Competitiveness Evaluation System Based on the Integration of SWOT and AHP Model -- Chapter7: Reflections on the Training Mode of E-commerce Professionals with improved Practical Exercises and Innovative Ability -- Chapter8: Research on Evaluating Marketing Ability of Traditional Chinese Medicine Enterprises in Gansu Province -- Part II: Logistics and Operations Analytics: Chapter9: The Impact of the Relationship between Operational Cost and Oil Prices on Economic Assessment in Oil and Gas Industry -- Chapter10: The Construction of University Students' Entrepreneurship Competency Model in Application-Oriented Universities -- Chapter11: Improving Airport Security Screening System in Terms of Efficiency and Fairness Via Network Model -- Chapter12: Study on the Choice of Strategic Emerging Industries in Gansu Province Based on Multi-level Grey Model -- Chapter13: The Study of "Big Quality" Satisfaction Evaluation -- Chapter14: Research on Evaluation Index System of Enterprise Brand Competitiveness - Taking Liquor Industry as an Example -- Chapter15: Simulation of Stochastic Volatility Variance Swap -- Chapter16: Empirical Research of the Contribution Rate of University Science and Technology to the Regional Economic Development -- Chapter17: Research on Incentive Strategy of Logistics Outsourcing about Manufacturing Enterprises -- Chapter18: Research on External Quality Inspection Technology of Tropical Fruits Based on Computer Vision -- Chapter19: Wholesale Price Contract and Quantity Discount Contract under Competition with Various Games -- Chapter20: Evaluation of Science and Technology Service Industry in Shandong Province -- Part III: Financial Analytics: Chapter21: CEO's Background Characteristics, Financing Preference and Firm Performance-----Empirical Evidence from China's A-share Listed Companies -- Chapter22: Security Risk Management Approach for Improving Information Security Return of Investment -- Chapter23: Comparative Analysis on Investment and Financing Models of Urban Rail Transportation -- Chapter24: Measuring Systemic Risk in the Chinese Financial System Based on Asymmetric Exponential Power Distribution -- Chapter25: Research on Liquidity Preferences of Mutual Fund -- Chapter26: Relationship of the Financial Agglomeration and Fiscal Expenditure Scale of Yangtze River Delta -- Chapter27: Applying Data Processing Method for Relationship Discovery in the Stock Market -- Chapter28: A Study on Assets Categorizations and Optimal Allocation via an Improved Algorithm -- Chapter29: Forecasting Stock Price Index Volatility with LSTM Deep Neural Network -- Chapter30: Improvement of Hedging Effect Based on the Average Hedging Ratio -- Chapter31: Finding the Lenders of Bad Credit Score Based on the Classification Method -- Part IV: Chapter32: Research Status and Prospect of Data Extraction and Cleaning Technology in Large Environment -- Chapter33: Research on Intelligent Sales Platform of Automobile Industry Based on Large Data Mining -- Chapter34: A Local Neighborhood Constraint Method for SIFT Features Matching -- Chapter35: A Wine Consumption Prediction Model Based on L-DAGLSSVM -- Chapter36: Fuzzy Control and Network System Design for Time Series Prediction Model -- Chapter37: Research on Data Storage Based on Cloud Platform -- Chapter38: An Automatic Multi-Objective Clustering based on Hierarchical Method -- Chapter39: Big Data Analytics for High Frequency Trading Volatility Estimation -- Chapter40: A Simulation of Sample Variance Calculation in the Teaching of Business Statistics to English Majors -- Chapter41: Application of Clinical Diagnosis and Treatment Data of Coronary Heart Disease Based on Association Rules -- Chapter42: Bibliometric Analysis of Spatial Econometrics -- Chapter43: Using Diagnostic Analysis to Discover Offensive Patterns in a Football Game -- Chapter44: Fuzzy Game Based on Fuzzy Comparison Operator -- Chapter45: An Analysis of Business English Translation Research in China -- Part V: Chapter46: Optimum Design And Function Improvement Of Mobile Nursing System -- Chapter47: Technology Development and Networking Application of a Mobile Passive Optical Access Network System -- Chapter48: Improvement of E-MIMLSVM+ Algorithm Based on Semi-Supervised Learning -- Chapter49: The Method of Improving Learning Ability of "C Language Programming Design" Course -- Chapter50: Implementation of Koch Curves Based on Html5 -- Chapter51: The Proposal of Centralization Deployment of Cadre Management Information System of SGCC -- Chapter52: Research and Designing of Grounding Fault Diagnosis for Small Current System Based on DsPIC33 and MCP3903 -- Chapter53: Mobile Phone Addiction in Youngsters: Concept and Measurement -- Chapter54: Measurement and Empirical Research of High Technology Industry Development for Mainland China Region -- Chapter55: Sina Weibo User Influence Research.…”

    Get full text
    Electronic eBook
  5. 5

    Information Technology - New Generations 15th International Conference on Information Technology /

    ISBN: 9783319770284
    ISSN: 2194-5357 ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Part I Cybersecurity -- Safeguarding Personal Health Information: Case Study -- Cybersecurity as People Powered Perpetual Innovation -- Performance Study of the Impact of Security on 802.11ac Networks -- Training Neural Tensor Networks with the Never Ending Language Learner -- PERIA-Framework: A Prediction Extension Revision Image Annotation Framework -- The Modern State and the Further Development Prospects of Information Security in the Republic of Kazakhstan -- Evaluating Cyber Threats to the United Kingdom's National Health Service (NHS) Spine Network -- A Virtual Animated Commentator Architecture for Cybersecurity Competitions -- Malicious Software Classification using VGG16 Deep Neural Network's Bottleneck Features -- Cybersecurity Vulnerabilities Assessment (A Systematic Review Approach) -- A Self Proxy Signature Scheme over NTRU Lattices -- Towards an Ontology of Security Assessment: a core model proposal -- Integration of Mobile Forensic Tool Capabilities -- Deep Packet Inspection: A Key Issue for Network Security -- What Petya/NotPetya Ransomware is and What its Remidiations are -- Analysis of Security Vulnerability and Analytics of Internet of Things (IOT) Platform -- New Techniques for Public Key Encryption with Sender Recovery -- Cloud Intrusion Detection and Prevention system for M-voting application in South Africa -- Protecting Personal Data with Blockchain Technology -- The Role of CAE-CDE in Cybersecurity Education for Workforce Development -- Software Optimizations for DES -- Part II Networking and Wireless Communications -- Design and Development of VXLAN based Cloud Overlay Network Monitoring System and Environment -- End to End Delay Analysis in a Two Tier Cluster Hierarchical Wireless Sensor Networks -- Tools to Support SMEs to Migrate to the Cloud: Opportunities and Challenges -- A Dual canister medicine IoT Dispenser -- Local Clock Synchronization without Transmission Delay Estimation of Control Messages in Wireless Sensor Networks -- Denial of service attacks in wireless sensor networks with proposed countermeasures -- Part III Education and Technology -- Internet-Based Education: A New Milestone for Formal Language and Automata Courses -- Teaching Communication Management in Software Projects through Serious Educational Games -- Gamification applied in the teaching of agile Scrum methodology -- An Experience of Using a Board Serious Virtual Game for Teaching the SCRUM Framework -- Part IV Agile Software Testing and Development -- Teaching Scrum by Doing Scrum in Internships in South Africa to Prepare Interns for Agile Projects -- Alignment of Requirements and Testing in Agile: an Industrial Experience -- Health Care Information Systems: A Crisis Approach -- Using Correct-by-Construction Software Agile Development -- Service-Centered Operation Methodology (MOCA) application supported by computer science to improve continuously care quality in public services -- Improving Agile Software Development with Domain Ontologies -- A Stratified Sampling Algorithm for Artificial Neural Networks -- Part V Data Mining/Machine Learning -- Mining ENADE Data from the Ulbra Network Institution -- Fault diagnostic of variance shifts in clinical monitoring using an Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA) -- Investigating Attribute Assessment for Credit Granting on a Brazilian Retail Enterprise -- Cross-language approach for sentiment classification in Brazilian Portuguese with ConvNets -- Thematic Spatiotemporal Association Rules to Track the Evolving of Visual Features and their Meaning in Satellite Image Time Series -- DeRis: Information system supporting the prediction of default risk in companies -- Taking a Steppe towards optimizing Note-Taking Software by creation of a Note Classification Algorithm -- Pattern Recognition for Time Series Forecasting: A Case Study of a Helicopter's Flight Dynamics -- A model for hour-wise prediction of mobile device energy availability -- Enhancing Lipstick Try-On with Augmented Reality and Color Prediction Model -- A Traffic Light Recognition Device -- An Approach to Prepare Data to Feed Visual Metaphors in a Multiple View Interactive Environment -- Reproducible Research in Document Analysis and Recognition -- Music Genre Classification using Data Mining and Machine Learning -- Improving word representations using Paraphrase dataset -- A Initial Experimental Evaluation of the NeuroMessenger: A Collaborative Tool to Improve the Empathy of Text Interactions -- Dual Long Short-Term Memory Networks for Sub-Character Representation Learning -- Business Intelligence Dashboard Application for Insurance Cross Selling -- Speech Features Analysis for Tone Language Speaker Discrimination Systems -- Selection of Transformations of Continuous Predictors in Logistic Regression -- Part VI Software Engineering -- A Generic Approach to Efficiently Parallelize Legacy Sequential Software -- Clustering and Combinatorial Methods for Test Suite Prioritization of GUI and Web Applications -- A Timed Petri Net Model to Specify Scenarios of Video Games -- Survey of Biometric Techniques for Automotive Applications -- A Survey on adoption Good Practices for ICT Governance at Enhanced Organizations -- Budget and User Feedback Control Strategy-based PRMS Scenario Web Application -- A Controlled Natural Language Editor for Semantic of Business Vocabulary and Rules -- An Approach Based on Possibilistic WorkFlow Nets to Model Multiplayer Video Games -- A Requirements Engineering-based Approach for evaluating Security Requirements Engineering Methodologies -- Increasing the prediction quality of software defective modules with automatic feature engineering -- Part VII High Performance Computing Architectures -- NSF Noyce Recruitment and Mentorship -- Mining Associations between Two Categories using Unstructured Text Data in Cloud -- A Note on Computational Science Curriculum -- Development of a Local Cloud-Based Bioinformatics Architecture -- Part VIII Computer Vision, Image Processing/Analysis -- A Computer Vision Based Algorithm for Obstacle Avoidance -- The ST-Vis tool for SpatioTemporal Visualization -- Detection of early gastric cancer from endoscopic images using Wavelet Transform Modulus Maxima -- Detection method of early esophageal cancer from endoscopic image using dyadic wavelet transform and four-layer neural network -- Study of Specific Location of Exhaustive Matching in Order to Improve the Optical Flow Estimation -- Solarpowered UAV Platform System: a Case Study for Ground Change Detection in BRIC Countries -- Part IX Health, Bioinformatics, Pattern Detection and Optimization -- Benefits of Establishing Makerspaces in Distributed Development Environment -- Semantic Description of Healthcare Devices to Enable Data Integration -- Applying transfer learning to QSAR regression models -- Investigating the Recognition of Non-Articulatory Sounds by using Statistical Tests and Support Vector Machine -- A Complete Diabetes Management and Care System -- On the use of van der Pauw Technique to Monitor Skin Burning in Patients Undergoing Interferential Current Therapy (IFC) with Extension to Other E-Stim Monitoring -- Part X Potpourri -- Smart Lighting Controlling System: Case Study of Yarmouk University Museum -- Incremental Topology Generated for ANN A Case Study on a Helicopter's Flight Simulation -- Degree Aware Triangulation of Annular Regions -- Heuristic Approaches for the Open-Shop Scheduling Problem -- Continuous State Power-down Systems for Renewable Energy Management -- Extracting Timing Models from Component-based Multi-criticality Vehicular Embedded Systems -- Part XI Short Papers -- Customer services management and satisfaction of Internet-related banking of First National Bank -- BIG IoT - Interconnecting IoT Platforms from different domains - First success story -- Cross-Cultural Perspective of E-Commerce -- Website Usability Requirements: Through the Lens of…”

    Get full text
    Electronic eBook
  6. 6

    Information and Decision Sciences Proceedings of the 6th International Conference on FICTA /

    ISBN: 9789811075636
    ISSN: 2194-5357 ;
    Published: Singapore : Springer Singapore , 2018.
    Table of Contents: “…Analysis on Passenger Flow Prediction of Transit Buses along a Route Based on Time Series -- 5. Smart Fire Safety: Serious Game for Fire Safety Awareness -- 6. …”

    Get full text
    Electronic eBook
  7. 7

    Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video by Isupova, Olga

    ISBN: 9783319755083
    ISSN: 2190-5053
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook
  8. 8

    Operations Research Applications in Health Care Management

    ISBN: 9783319654553
    ISSN: 0884-8289 ;
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook
  9. 9

    Intelligent Decision Technologies 2017 Proceedings of the 9th KES International Conference on Intelligent Decision Technologies (KES-IDT 2017) - Part II /

    ISBN: 9783319594248
    ISSN: 2190-3018 ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…A Development of Classification Model for Smartphone Addiction Recognition System Based on Smartphone Usage Data -- Complex Object Recognition Based on Multi-shape Invariant Radon Transform -- Genetic Algorithms Based Resampling for the Classification of Unbalanced Datasets -- Analysis of Multiple Classifiers Performance for Discretized Data in Authorship Attribution -- Speaker Identification in Noisy Conditions Using Short Sequences of Speech Frames -- Decision-Controlled Digitization Architecture for Internet of Things and Microservices -- Digital Enterprise Architecture Management in Tourism - State of the Art and Future Directions -- Building Fuzzy Variance Gamma Option Pricing Models With Jump Levy Process -- Evolutionary Regressor Selection in ARIMA Model for Stock Price Time Series Forecasting -- Applying Domain Knowledge for Data Quality Assessment in Dermatology -- A Data Analytics Framework for Business in Small and Medium-Sized Organizations -- Visual Analysis of Eye Movement Data with Fixation Distance Plots -- Which Symbols, Features, and Regions Are Visually Attended in Metro Maps? …”

    Get full text
    Electronic eBook
  10. 10

    New Trends in Emerging Complex Real Life Problems ODS, Taormina, Italy, September 10-13, 2018 /

    ISBN: 9783030004736
    ISSN: 2523-7047 ;
    Published: Cham : Springer International Publishing, 2018.

    Get full text
    Electronic eBook
  11. 11

    Advances in Intelligent Information Hiding and Multimedia Signal Processing Proceedings of the Thirteenth International Conference on Intelligent Information Hiding and Multimedia...

    ISBN: 9783319638560
    ISSN: 2190-3018 ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…A Survey of Reversible Data Hiding Schemes Based on Two-dimensional Histogram Modification -- Steganographic Image Hiding Schemes Based on Edge Detection -- A New Data Hiding Strategy Based on Pixel-Value-Differencing Method -- Data Hiding Scheme Based on Regular Octagon-shaped Shells -- A Web Page Watermarking Method using Hybrid Watermark Hiding Strategy -- Integrated Health Check Report Analysis and Tracking Platform -- A Study of the Multi-Organization Integrated Electronic Attendance System -- A Content Analysis of Mobile Learning on Constructivism Theory -- An Independence Mechanism Design for the Software Defined Device -- An Ontology-based Herb Therapy Recommendation for Respiration System -- Robust Optimal Control Technology for Multimedia Signal Processing Applications -- Implementation of an eBook Reader System with the Features of Emotion Sensing and Robot Control -- On the Automatic Construction of Knowledge-Map from Handouts for MOOC Courses -- Automated Music Composition Using Heart Rate Emotion Data -- Inter-Vehicle Media Distribution for Driving Safety -- High-capacity ECG Steganography with Smart Offset Coefficients -- An Automatic People Counter in Stores Using a Low-cost IoT Sensing Platform -- Determination of Coefficient of Thermal Expansion in High Power GaN-based Light-emitting Diodes via Optical Coherent Tomography -- Compression-efficient Reversible Data Hiding in Zero Quantized Coefficients of JPEG Images -- On the Security of a Certificateless Public Key Encryption with Keyword Search -- DCT-based Compressed Image with Reversibility using Modified Quantization -- Studying the Influence of Tourism Flow on Foreign Exchange Rate by IABC and Time-Series Models -- Short-term Forecasting on Technology Industry Stocks Return Indices by Swarm Intelligence and Time-Series Models -- Image Segmentation for Lung Lesions using Ant Colony Optimization Classifier in Chest CT -- SURF Algorithm-based Panoramic Image Mosaic Application -- Simulation of Long-distance Aerial Transmissions for Robust Audio Data Hiding -- Variable-Length Key Implementation Based on Complex Network WSN Clustering -- An Infrared Small Target Detection Method based on Block Compressed Sensing -- An Encryption Algorithm for ROI Images.…”

    Get full text
    Electronic eBook
  12. 12

    Studies in Theoretical and Applied Statistics SIS 2016, Salerno, Italy, June 8-10 /

    ISBN: 9783319739069
    ISSN: 2194-1009 ;
    Published: Cham : Springer International Publishing, 2018.
    Table of Contents: “…Adelfio et al., Space-time FPCA clustering of multidimensional curves -- 19 D. …”

    Get full text
    Electronic eBook
  13. 13

    Intelligent Engineering Informatics Proceedings of the 6th International Conference on FICTA /

    ISBN: 9789811075667
    ISSN: 2194-5357 ;
    Published: Singapore : Springer Singapore , 2018.
    Table of Contents: “…AKM - Augmentation Of K-Means Clustering Algorithm for Big Data -- 12. Face Recognition Using Local Binary Pattern-Blockwise Method -- 13. …”

    Get full text
    Electronic eBook