ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Advancements in Interdisciplinary Research: First International Conference, AIR 2022, Prayagraj, India, May 6–7, 2022, Revised Selected Papers

دانلود کتاب پیشرفت‌ها در تحقیقات بین رشته‌ای: اولین کنفرانس بین‌المللی، AIR 2022، پرایاگراج، هند، 6 تا 7 می 2022، مقالات منتخب اصلاح شده

Advancements in Interdisciplinary Research: First International Conference, AIR 2022, Prayagraj, India, May 6–7, 2022, Revised Selected Papers

مشخصات کتاب

Advancements in Interdisciplinary Research: First International Conference, AIR 2022, Prayagraj, India, May 6–7, 2022, Revised Selected Papers

دسته بندی: کنفرانس ها و همایش های بین المللی
ویرایش:  
نویسندگان: , ,   
سری: Communications in Computer and Information Science, 1738 
ISBN (شابک) : 3031237234, 9783031237232 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 562 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 60 مگابایت 

قیمت کتاب (تومان) : 39,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Advancements in Interdisciplinary Research: First International Conference, AIR 2022, Prayagraj, India, May 6–7, 2022, Revised Selected Papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پیشرفت‌ها در تحقیقات بین رشته‌ای: اولین کنفرانس بین‌المللی، AIR 2022، پرایاگراج، هند، 6 تا 7 می 2022، مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Organization
Contents
Novel Technologies Enabled Secured Privacy Models and Optimized Networking Infrastructures Toward Secure Industries
Fast Phrased Search for Encrypted Cloud Storage
	1 Introduction
		1.1 Bloom Filters
		1.2 Inclusion Related Attack
	2 Literature Review
	3 Methodology
		3.1 Research Issues
		3.2 Research Methodology
		3.3 Data Extraction
		3.4 Implementation
	4 Results
	5 Conclusion
	References
Secure Data Hiding and Extraction Using RSA Algorithm
	1 Introduction
	2 Related Works
	3 Image Data Hiding Algorithm for Donathan Hutchings
		3.1 Implementation
		3.2 User Interface Design
		3.3 Image Tab Encryption
		3.4 Image Tab Decryption
	4 System Implementation Using RSA Algorithm
	5 Evaluation
	6 Conclusion
	References
Token Bases Valid and Secure Payment System Using SHA-256
	1 Introduction
	2 Literature Work
	3 Methodology
		3.1 Proposed Tokenization Approach Security Framework
		3.2 Comparison Between the Existing Payment and Our Proposed Work
	4 Result and Discussion
	5 Conclusion and Future Scope
	References
A Novel Approach to Secure Files Using Color Code Authentication
	1 Introduction
	2 Related Work
	3 Working Methodology
	4 Results and Discussion
	5 Conclusion
	References
Analysis of Ransomware Security on Cloud Storage Systems
	1 Introduction
	2 Nature of Cybercrime and Ransomware
		2.1 Technical Vectors of Attack
		2.2 Socially Engineered Vectors
		2.3 Ransomware-as-a-Service
	3 Current Countermeasures
		3.1 Repositories and Data Sharing
		3.2 Behavior Based Detection
		3.3 Reverse Engineering
		3.4 Risk Disclosure and Awareness
		3.5 Decentralization and All-Or-Nothing Transforms
	4 Impact of Ransomware in Recent History
		4.1 Healthcare Incidents
		4.2 Colonial Pipeline
		4.3 CD Projekt Red
		4.4 Ultimate Kronos Group
		4.5 REvil Group
	5 Emerging Solutions
		5.1 Secure Network Protocols for Dynamic Data
		5.2 Analysis of Network Traffic on Multiple Classifiers
		5.3 Dynamic Distributed Storage
		5.4 Machine Learning and Artificial Intelligence
		5.5 Decentralization
		5.6 Key Backup
	6 Conclusion
	References
A Novel Approach for an Automated Advanced MITM Attack on IoT Networks
	1 Introduction
		1.1 A Subsection Sample
	2 Related Work
	3 Working Methodology
	4 Results and Discussion
		4.1 Preventive Measures Against MITM
	5 Conclusion
	References
Fog Computing Paradigm with Internet of Things to Solve Challenges of Cloud with IoT
	1 Introduction
	2 Internet of Things
		2.1 IoT Applications
		2.2 Technology
	3 Internet of Things
	4 FoG Computing
		4.1 The FoG Computing Architecture
		4.2 FoG Computing in IoT
		4.3 Areas Where FoG Works with IoT
	5 Conclusion
	References
Dynamic Resource Allocation in Fog Computing Environment
	1 Introduction
	2 Motivation
		2.1 The Goal of This Work
		2.2 Organization of Work
	3 Related Work
	4 Methodology
	5 Results and Discussion
	6 Conclusion
	References
Vehicle as Fog Server in Intelligent Transportation System
	1 Introduction
	2 System Model
	3 Application Characteristics in VFC
	4 Research Directions
	5 Proposed Solution Strategy
	6 Simulation Setup
	7 Results and Discussion
	8 Conclusion
	References
Measuring the Impact of Blockchain-Based Supply Chain Traceability Systems on Consumer Trust
	1 Introduction
	2 Literature Survey: Impact Analysis
		2.1 Impact on Brand Trust and Credibility
		2.2 Impact on Environment Sustainability
		2.3 Impact on Economic Circularity
	3 Methodology
	4 Results and Discussions
		4.1 Correlation Between Q1 and Q6: Correlated Positively
		4.2 Correlation Between Q2 and Q6: Correlated Positively
		4.3 Correlation Between Q3 and Q6
		4.4 Correlation Between Q4 and Q6: Positive Correlation
		4.5 Correlation Between Q5 and Q6: Positive Correlation
	5 Conclusion
	References
Comparison of Routing Protocols with Performance Parameters in MANET Using NS3
	1 Introduction
	2 Literature Review
		2.1 Routing Protocols in MANET
		2.2 AODV (Ad Hoc on Demand Distance Vector Routing)
		2.3 DSR (Dynamic Source Routing Protocol)
		2.4 DSDV (Destination Sequenced Distance Vector)
		2.5 OLSR (Link State Routing Protocol)
	3 Routing in MANET
	4 Simulation
	5 Conclusion
	References
Developments Towards Sustainable Healthcare Sector
Light Weighted Model Based on Convolutional Neural Network for Detection of COVID-19 Using Chest X-Ray Images
	1 Introduction
	2 Background
	3 Methodology
	4 Results and Discussion
	5 Conclusion
	References
Forecasting COVID-19 Cases Using n-SARS-CoV-2 Variants
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Dataset
		3.2 LSTM Model
		3.3 SHapley Additive exPlanations (SHAP)
	4 Results and Discussion
	5 Conclusion and Future Scope
	References
COVID-19 Vaccines Analysis to Predict Its Impact Across the World
	1 Introduction
	2 Proposed System
	3 Implementation
		3.1 Analysis
		3.2 Predicting the MAE, MSE and RMSE Value
	4 Conclusion
	References
Lung Cancer Detection Using Ensemble Learning
	1 Introduction
	2 Related Work
	3 Implementation Details
	4 Results
	5 Conclusion and Future Scope
	References
Detection of Pneumothorax from Chest X-Ray Data Using Machine Learning: A Comprehensive Survey
	1 Introduction
	2 Literature Review
		2.1 Datasets Survey
		2.2 Survey Based on Methods and Findings
		2.3 Image Pre-processing Technique
		2.4 Machine Learning Algorithms
	3 Discussions
	4 Conclusion
	References
Analyzing Patient Reviews for Recommending Treatment Using NLP and Deep Learning-Based Approaches
	1 Introduction
	2 Background and Related Work
	3 Proposed Framework
		3.1 Dataset Description
		3.2 Data Understanding and Pre-processing
		3.3 Data Visualization
		3.4 Approaches
	4 Implementation and Results
	5 Conclusion and Future Work
	References
IoT Based Low-Cost Pulse Oximeter for Remote Health Monitoring
	1 Introduction
	2 Related Work
	3 Materials and Method
		3.1 Hardware
		3.2 Flow Chart and Working
	4 Results and Discussion
	5 Conclusion
	References
Machine Learning and Deep Learning Enabled Applications in Different Sectors
Development of Homogenous Cross-Project Defect Prediction Model Using Artificial Neural Network
	1 Introduction
	2 Related Work
		2.1 Prediction of Defects Based on Hand-Crafted Characteristics
		2.2 Prediction of Defects Based on Deep Characteristics
		2.3 Dependent and Independent Variable
	3 Research Methodology
		3.1 Select the Right Dataset
		3.2 Balancing the Datasets (if Required)
		3.3 Problems with Unbalanced Datasets
		3.4 SMOTE for Balancing the Unbalanced Datasets
		3.5 Choosing the Right Neural Network
	4 Results and Analysis
		4.1 Performance Measures - Accuracy, Precision, F Measure, Recall and Sigmoid Function
		4.2 Results of JM1 Dataset
		4.3 Results of KC3 Dataset
		4.4 Results of PC3 Dataset
		4.5 Results of CM1 Dataset
		4.6 Observations from the Results Obtained
		4.7 Performance of the Model
	5 Threats Validity
	6 Conclusion
	References
Detection of Offensive Comments for Textual Data Using Machine Learning
	1 Introduction
	2 Related Work
	3 Implementation Details
	4 Discussions
	5 Conclusion
	References
Analyzing Various Handwriting Recognition Phenomenon for Predicting Gender, Age and Handedness
	1 Introduction
	2 Related Works
	3 Phases in Handwriting Recognition
	4 Datasets Used
	5 Comparison of Various Works
	6 Conclusion
	References
Indoor Human Fall Detection Using Deep Learning
	1 Introduction
	2 Methodology
		2.1 Dataset Preprocessing
		2.2 Convolutional Neural Network
		2.3 Long Short Term Memory
	3 Results and Discussions
	4 Conclusion
	References
Colour Detection for Interior Designs Using Machine Learning
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Results and Discussions
	5 Future Work
	6 Conclusion
	References
A Review on Estimation of Workload from Electroencephalogram (EEG) Using Machine Learning
	1 Introduction
		1.1 Classification of Workload and Relationship to Brain-Computer Interface (BCI)
		1.2 Challenges in EEG Processing
		1.3 Improvement Through Deep Learning
		1.4 Understanding EEG In-depth
	2 Methods
		2.1 Data Acquisition and Pre-processing
		2.2 Approach and Algorithm
		2.3 Outcomes
	3 Limitations
	4 Conclusion
	References
A Comprehensive Review on Image Captioning Using Deep Learning
	1 Introduction
	2 Image Captioning Techniques
		2.1 Retrieval Based Captioning
		2.2 Template Based Captioning
		2.3 Neural Network-Based Image Captioning Method
	3 Applications of Attention Mechanism
		3.1 How Are Predictions Made?
		3.2 How Are Predictions Evaluated?
	4 Conclusion
	References
Classical Models vs Deep Leaning: Time Series Analysis
	1 Introduction
	2 Methodology
		2.1 Data-Extraction, Summary and Exploration
		2.2 Model Building
	3 Results
	4 Conclusion
	References
Probabilistic Evaluation of Distinct Machine Learning Algorithms
	1 Introduction
		1.1 Problem Statement
		1.2 Objectives
	2 Research Methodology
	3 Literature Survey
	4 Dataset Description
	5 Improvised Analysis
	6 Discussion
	7 Conclusion and Future Scope
	References
Empirical Analysis of Humor Detection Using Deep Learning and Machine Learning on Kaggle Corpus
	1 Introduction
	2 Related Work
	3 Implementation Details
		3.1 Dataset Description
	4 Techniques Applied
	5 Results Discussion
		5.1 Machine Learning Techniques
		5.2 Deep Learning Techniques
		5.3 Comparative Analysis of ML and DL
	6 Conclusions
	7 Future Scope
	References
Rumour Stance Classification on Textual Social Media Content Using Machine Learning
	1 Introduction
	2 Related Work
	3 Implementation Details
		3.1 Dataset Description
		3.2 Workflow
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Robotics and Computer Vision for Intelligent Automation in Industries
Theft Detection: An Optimized Approach Using cGAN and YOLO
	1 Introduction
	2 Literature Review
	3 Proposed Methodology/Solution
		3.1 Experimental Setup for Weapon Detection Module
	4 Result and Discussion
	5 Conclusion
	References
A Parser Based Apparel Transformation to Aid in Cloth Virtual Try-On
	1 Introduction
	2 Related Works
	3 Model Pipeline
		3.1 OpenPose
		3.2 Self Correction for Human Parsing
	4 Experiments
		4.1 Implementation
		4.2 Applications
		4.3 Limitations and Work to be Done
	5 Conclusion
	References
Real-Time Sign Language Detection Leveraging Real-Time Translation
	1 Introduction
	2 Related Work
	3 Methodology
	4 Implementation and Tools
	5 Experimental Results and Analysis
	6 Conclusion and Future Work
	References
Intelligent Pesticide Recommendation System Based on Plant Leaf Disease and Pests
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 Deep Learning Algorithm Used: Convolutional Neural Network (CNN)
		3.2 CNN Models Used to Compare
	4 Implementation
		4.1 Models Used to Compare for Plant Leaf Disease Detection
		4.2 Models Used to Compare for Pest Detection
	5 Results
		5.1 Plant Leaf Disease Detection
		5.2 Pest Detection
	6 Conclusion and Future Scope
	References
Flood Damage Detection Using Satellite Images
	1 Introduction
	2 Background and Related Works
	3 Proposed Methodology
	4 Dataset
	5 Implementation and Results
		5.1 Fine-Tuning the Model
		5.2 Custom Model
	6 Performance Metrics
		6.1 Loss Comparison Plot
	7 Performance Metrics
		7.1 (A) Hurricane Harvey Dataset
		7.2 (B) Custom Dataset
	8 Result Analysis
	9 Conclusion
	References
Integration of Machine Learning in the Spatio-Temporal Analysis of Mangrove Forest
	1 Introduction
	2 Proposed Methodology
		2.1 Study Area and Data
		2.2 Image Preprocessing
		2.3 Image Classification
		2.4 Accuracy and Validation
	3 Results and Discussion
		3.1 Comparison Results
		3.2 LULC Results
		3.3 Discussions
	4 Conclusion
	References
Detecting Diseases in Jasmine Plants Using Proposed Image Pre-processing Algorithm
	1 Introduction
	2 Diseases in Plants
	3 Major Diseases in Jasmine Plants
	4 Related Work
	5 Proposed System
		5.1 Gathering Images
		5.2 Augmentation
		5.3 Pre-processing
		5.4 Segmentation
		5.5 Feature Extraction
		5.6 Classification
	6 Experimental Results
		6.1 Initial and Augmented Images
		6.2 Pre-processed Images
		6.3 Images in Different Color Spaces
	7 Conclusion
	References
3D-Zeit: A Framework for Generating 3D Model as an AR Object Using Object Recognition
	1 Introduction
		1.1 Problem Statement
		1.2 Objectives
	2 Related Work
	3 Methodology
		3.1 Creating 3D Objects from a 2D Image
		3.2 Rendering the 3D Object in Blender
		3.3 Creating an AR Environment for the 3D Object in Unity
	4 Conclusion
	References
Automatic Image Captioning Using Ensemble of Deep Learning Techniques
	1 Introduction
	2 Literature Review
	3 Proposed Model
		3.1 Overview
		3.2 CNN-Based Image Feature Extractor
		3.3 LSTM Caption Generator
	4 Experiment
		4.1 Datasets and Preprocessing
		4.2 Hyperparameter Tuning
		4.3 Evaluation Metrics
	5 Results and Analysis
		5.1 Quantitative Results
		5.2 Qualitative Results
	6 Conclusion and Future Work
	References
Automated License Plate Detection and Recognition Using Deep Learning
	1 Introduction
	2 CNN-RNN
	3 YOLO - You Look Only Once
	4 SSD - Single Shot Detector
	5 Conclusion
	References
Challenges in Scene Understanding for Autonomous Systems
	1 Introduction
	2 Local vs Global Feature Trade-off
	3 Data Limitations
	4 Domain Adaptation
		4.1 Domain-Invariant Features
		4.2 Domain-Specific Features
	5 Task Dependency of Augmentations
	6 Semantic Segmentation
	7 Conclusion
	References
An Effective Genetic Algorithm Based Multi-objective Optimization Approach for Coverage Path Planning of Mobile Robot
	1 Introduction
	2 Environmental Modelling
	3 Proposed Method
		3.1 Initialization
		3.2 Fitness Evaluation
		3.3 Selection
		3.4 Crossover
		3.5 Mutation
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Trending Technologies: Frameworks and Applications Focusing Real Life Issues
Smart Monitoring System for Waste Management Using IoT
	1 Introduction
	2 Proposed System
	3 System Requirements
		3.1 Hardware
		3.2 Software
	4 Results and Discussion
	5 Conclusion
	References
Implementation of LiDAR Based Self Driving Car Using Raspberry Pi 3
	1 Introduction
	2 Related Work
	3 Progression of Self-driving Cars
	4 Phases of Working
	5 Designing of Proposed System
	6 Challenges with Autonomous Cars
	7 Results
	8 Conclusion and Future Scope
	References
Fast Implementation of AES Modes Based on Turing Architecture
	1 Introduction
		1.1 Enhanced L1 Data Cache
		1.2 Execution of Floating Point and Integer in a Concurrent Manner
		1.3 Uniform Datapath and Uniform Register File
		1.4 Electronic Code Block (ECB)
		1.5 Cipher Block Chaining (CBC)
		1.6 Counter (CTR)
	2 Related Work
	3 Proposed Methodology
	4 Comparison and Analysis
	5 Conclusion
	References
N-Dimensional Structure: A Data Structure with Fast Access and Sorting of Integers
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 U-Dimensional Space
		3.2 Array Based Implementation
		3.3 Tree Based Implementation
		3.4 Algorithms
		3.5 Theoretical Analysis
	4 Results and Discussion
	5 Conclusion
	References
Spatial Variation of Air Quality in Delhi During Diwali: A Case Study of Covid-19 Period
	1 Introduction
	2 Literature Review
		2.1 Factor Affecting Air Pollution
		2.2 Health Effects of Firecrackers
	3 Methodology
		3.1 Data Acquisition and Analysis
		3.2 Arc GIS
	4 Results and Discussion
	5 Conclusion
	References
Shop-Easy: An Online Shopping Framework Emphasizing Vocal for Local Using Location and Review Based Services
	1 Introduction
	2 Background and Related Work
	3 Shop-Easy: Proposed Shopping Framework
		3.1 Proposed System Functionalities
		3.2 Proposed System Functionalities
		3.3 Results and Discussion
	4 Comparative Analysis of Features of Proposed System
	5 Conclusion
	References
Women Assault Detection and Providing Help Using Pitch
	1 Introduction
		1.1 Input
		1.2 Error Handling
	2 Background
	3 Literature Review
	4 Dataset
	5 Proposed Approach
		5.1 Research Used
		5.2 Hardware Necessities for Our Product Development
		5.3 Software Specifications
		5.4 Frequencies of Different Sounds
		5.5 Working
		5.6 Cost Estimation
		5.7 Cost Comparison with CCTV
		5.8 Process Flow of the Solution
	6 Results and Discussion
	References
Cognitive Workload Estimation Using Eye Tracking: A Review
	1 Introduction
	2 Background
		2.1 Gaze Points
		2.2 Fixation
		2.3 Saccade
		2.4 Velocity Classification
		2.5 Fixation Duration
		2.6 Pupil Dilation
		2.7 Gaze Entropy
		2.8 Saccadic Intrusion (SI)
	3 Procedure
		3.1 Participants
		3.2 Instruments
	4 Cognitive Load Estimation Methods
		4.1 Statistical Analysis
		4.2 Machine Learning Based Classification Methods
	5 Conclusion
	References
Author Index




نظرات کاربران