Скачать книгу

17.2 System Analysis 17.3 Implementation 17.4 Inputs and Outputs 17.5 Conclusion References

      22 18 Visitor/Intruder Monitoring System Using Machine Learning18.1 Introduction18.2 Machine Learning18.3 System Design18.4 Haar-Cascade Classifier Algorithm18.5 Components18.6 Experimental Results18.7 ConclusionAcknowledgmentReferences

      23  19 Comparison of Machine Learning Algorithms for Air Pollution Monitoring System 19.1 Introduction 19.2 System Design 19.3 Model Description and Architecture 19.4 Dataset 19.5 Models 19.6 Line of Best Fit for the Dataset 19.7 Feature Importance 19.8 Comparisons 19.9 Results 19.10 Conclusion References

      24  20 A Novel Approach Towards Audio Watermarking Using FFT and CORDIC-Based QR Decomposition 20.1 Introduction and Related Work 20.2 Proposed Methodology 20.3 Algorithm Design 20.4 Experiment Results 20.5 Conclusion References

      25  21 Performance of DC-Biased Optical Orthogonal Frequency Division Multiplexing in Visible Light Communication 21.1 Introduction 21.2 System Model 21.3 Proposed Method 21.4 Results and Discussion 21.5 Conclusion References

      26  22 Microcontroller-Based Variable Rate Syringe Pump for Microfluidic Application 22.1 Introduction 22.2 Related Work 22.3 Methodology 22.4 Result 22.5 Inference 22.6 Conclusion and Future Works References

      27  23 Analysis of Emotion in Speech Signal Processing and Rejection of Noise Using HMM 23.1 Introduction 23.2 Existing Method 23.3 Proposed Method 23.4 Conclusion References

      28  24 Securing Cloud Data by Using Blend Cryptography with AWS Services 24.1 Introduction 24.2 Background 24.3 Proposed Technique 24.4 Results 24.5 Conclusion References

      29  Index

      30  End User License Agreement

      List of Tables

      1 Chapter 1Table 1.1 History of the earliest robots.

      2 Chapter 6Table 6.1 Existing robots and their physical appearance and functionalities in v...Table 6.2 Robot functions that solve issues faced by the elderly.

      3 Chapter 7Table 7.1 Taxonomy of historical AI definitions.

      4 Chapter 9Table 9.1 Instruction and categorization of instruction accuracy for user input.Table 9.2 Instruction and categorization of instruction accuracy for gates.Table 9.3 Single instruction insertion precision.Table 9.4 One expression translation.

      5 Chapter 15Table 15.1 Comparison of various technologies involved in V2V communication.

      6 Chapter 16Table 16.1 Motor directions for wheelchair movements.

      7 Chapter 19Table 9.1 Error obtained in each model.Table 9.2 Trained model performance.

      8 Chapter 20Table 20.1 Evaluation of audio signals and the respective extricated watermark i...Table 20.2 Quality analysis of extracted watermark images under various attacks.

      9 Chapter 21Table 21.1 Simulation parameters of DCO-OFDM.

      10 Chapter 22Table 22.1 Dimensions of

Скачать книгу