دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: کنفرانس ها و همایش های بین المللی ویرایش: نویسندگان: Vijayan Sugumaran, Divya Upadhyay, Shanu Sharma سری: Communications in Computer and Information Science, 1738 ISBN (شابک) : 3031237234, 9783031237232 ناشر: Springer سال نشر: 2023 تعداد صفحات: 562 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 60 مگابایت
در صورت تبدیل فایل کتاب Advancements in Interdisciplinary Research: First International Conference, AIR 2022, Prayagraj, India, May 6–7, 2022, Revised Selected Papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب پیشرفتها در تحقیقات بین رشتهای: اولین کنفرانس بینالمللی، AIR 2022، پرایاگراج، هند، 6 تا 7 می 2022، مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Organization Contents Novel Technologies Enabled Secured Privacy Models and Optimized Networking Infrastructures Toward Secure Industries Fast Phrased Search for Encrypted Cloud Storage 1 Introduction 1.1 Bloom Filters 1.2 Inclusion Related Attack 2 Literature Review 3 Methodology 3.1 Research Issues 3.2 Research Methodology 3.3 Data Extraction 3.4 Implementation 4 Results 5 Conclusion References Secure Data Hiding and Extraction Using RSA Algorithm 1 Introduction 2 Related Works 3 Image Data Hiding Algorithm for Donathan Hutchings 3.1 Implementation 3.2 User Interface Design 3.3 Image Tab Encryption 3.4 Image Tab Decryption 4 System Implementation Using RSA Algorithm 5 Evaluation 6 Conclusion References Token Bases Valid and Secure Payment System Using SHA-256 1 Introduction 2 Literature Work 3 Methodology 3.1 Proposed Tokenization Approach Security Framework 3.2 Comparison Between the Existing Payment and Our Proposed Work 4 Result and Discussion 5 Conclusion and Future Scope References A Novel Approach to Secure Files Using Color Code Authentication 1 Introduction 2 Related Work 3 Working Methodology 4 Results and Discussion 5 Conclusion References Analysis of Ransomware Security on Cloud Storage Systems 1 Introduction 2 Nature of Cybercrime and Ransomware 2.1 Technical Vectors of Attack 2.2 Socially Engineered Vectors 2.3 Ransomware-as-a-Service 3 Current Countermeasures 3.1 Repositories and Data Sharing 3.2 Behavior Based Detection 3.3 Reverse Engineering 3.4 Risk Disclosure and Awareness 3.5 Decentralization and All-Or-Nothing Transforms 4 Impact of Ransomware in Recent History 4.1 Healthcare Incidents 4.2 Colonial Pipeline 4.3 CD Projekt Red 4.4 Ultimate Kronos Group 4.5 REvil Group 5 Emerging Solutions 5.1 Secure Network Protocols for Dynamic Data 5.2 Analysis of Network Traffic on Multiple Classifiers 5.3 Dynamic Distributed Storage 5.4 Machine Learning and Artificial Intelligence 5.5 Decentralization 5.6 Key Backup 6 Conclusion References A Novel Approach for an Automated Advanced MITM Attack on IoT Networks 1 Introduction 1.1 A Subsection Sample 2 Related Work 3 Working Methodology 4 Results and Discussion 4.1 Preventive Measures Against MITM 5 Conclusion References Fog Computing Paradigm with Internet of Things to Solve Challenges of Cloud with IoT 1 Introduction 2 Internet of Things 2.1 IoT Applications 2.2 Technology 3 Internet of Things 4 FoG Computing 4.1 The FoG Computing Architecture 4.2 FoG Computing in IoT 4.3 Areas Where FoG Works with IoT 5 Conclusion References Dynamic Resource Allocation in Fog Computing Environment 1 Introduction 2 Motivation 2.1 The Goal of This Work 2.2 Organization of Work 3 Related Work 4 Methodology 5 Results and Discussion 6 Conclusion References Vehicle as Fog Server in Intelligent Transportation System 1 Introduction 2 System Model 3 Application Characteristics in VFC 4 Research Directions 5 Proposed Solution Strategy 6 Simulation Setup 7 Results and Discussion 8 Conclusion References Measuring the Impact of Blockchain-Based Supply Chain Traceability Systems on Consumer Trust 1 Introduction 2 Literature Survey: Impact Analysis 2.1 Impact on Brand Trust and Credibility 2.2 Impact on Environment Sustainability 2.3 Impact on Economic Circularity 3 Methodology 4 Results and Discussions 4.1 Correlation Between Q1 and Q6: Correlated Positively 4.2 Correlation Between Q2 and Q6: Correlated Positively 4.3 Correlation Between Q3 and Q6 4.4 Correlation Between Q4 and Q6: Positive Correlation 4.5 Correlation Between Q5 and Q6: Positive Correlation 5 Conclusion References Comparison of Routing Protocols with Performance Parameters in MANET Using NS3 1 Introduction 2 Literature Review 2.1 Routing Protocols in MANET 2.2 AODV (Ad Hoc on Demand Distance Vector Routing) 2.3 DSR (Dynamic Source Routing Protocol) 2.4 DSDV (Destination Sequenced Distance Vector) 2.5 OLSR (Link State Routing Protocol) 3 Routing in MANET 4 Simulation 5 Conclusion References Developments Towards Sustainable Healthcare Sector Light Weighted Model Based on Convolutional Neural Network for Detection of COVID-19 Using Chest X-Ray Images 1 Introduction 2 Background 3 Methodology 4 Results and Discussion 5 Conclusion References Forecasting COVID-19 Cases Using n-SARS-CoV-2 Variants 1 Introduction 2 Literature Review 3 Proposed Methodology 3.1 Dataset 3.2 LSTM Model 3.3 SHapley Additive exPlanations (SHAP) 4 Results and Discussion 5 Conclusion and Future Scope References COVID-19 Vaccines Analysis to Predict Its Impact Across the World 1 Introduction 2 Proposed System 3 Implementation 3.1 Analysis 3.2 Predicting the MAE, MSE and RMSE Value 4 Conclusion References Lung Cancer Detection Using Ensemble Learning 1 Introduction 2 Related Work 3 Implementation Details 4 Results 5 Conclusion and Future Scope References Detection of Pneumothorax from Chest X-Ray Data Using Machine Learning: A Comprehensive Survey 1 Introduction 2 Literature Review 2.1 Datasets Survey 2.2 Survey Based on Methods and Findings 2.3 Image Pre-processing Technique 2.4 Machine Learning Algorithms 3 Discussions 4 Conclusion References Analyzing Patient Reviews for Recommending Treatment Using NLP and Deep Learning-Based Approaches 1 Introduction 2 Background and Related Work 3 Proposed Framework 3.1 Dataset Description 3.2 Data Understanding and Pre-processing 3.3 Data Visualization 3.4 Approaches 4 Implementation and Results 5 Conclusion and Future Work References IoT Based Low-Cost Pulse Oximeter for Remote Health Monitoring 1 Introduction 2 Related Work 3 Materials and Method 3.1 Hardware 3.2 Flow Chart and Working 4 Results and Discussion 5 Conclusion References Machine Learning and Deep Learning Enabled Applications in Different Sectors Development of Homogenous Cross-Project Defect Prediction Model Using Artificial Neural Network 1 Introduction 2 Related Work 2.1 Prediction of Defects Based on Hand-Crafted Characteristics 2.2 Prediction of Defects Based on Deep Characteristics 2.3 Dependent and Independent Variable 3 Research Methodology 3.1 Select the Right Dataset 3.2 Balancing the Datasets (if Required) 3.3 Problems with Unbalanced Datasets 3.4 SMOTE for Balancing the Unbalanced Datasets 3.5 Choosing the Right Neural Network 4 Results and Analysis 4.1 Performance Measures - Accuracy, Precision, F Measure, Recall and Sigmoid Function 4.2 Results of JM1 Dataset 4.3 Results of KC3 Dataset 4.4 Results of PC3 Dataset 4.5 Results of CM1 Dataset 4.6 Observations from the Results Obtained 4.7 Performance of the Model 5 Threats Validity 6 Conclusion References Detection of Offensive Comments for Textual Data Using Machine Learning 1 Introduction 2 Related Work 3 Implementation Details 4 Discussions 5 Conclusion References Analyzing Various Handwriting Recognition Phenomenon for Predicting Gender, Age and Handedness 1 Introduction 2 Related Works 3 Phases in Handwriting Recognition 4 Datasets Used 5 Comparison of Various Works 6 Conclusion References Indoor Human Fall Detection Using Deep Learning 1 Introduction 2 Methodology 2.1 Dataset Preprocessing 2.2 Convolutional Neural Network 2.3 Long Short Term Memory 3 Results and Discussions 4 Conclusion References Colour Detection for Interior Designs Using Machine Learning 1 Introduction 2 Literature Survey 3 Methodology 4 Results and Discussions 5 Future Work 6 Conclusion References A Review on Estimation of Workload from Electroencephalogram (EEG) Using Machine Learning 1 Introduction 1.1 Classification of Workload and Relationship to Brain-Computer Interface (BCI) 1.2 Challenges in EEG Processing 1.3 Improvement Through Deep Learning 1.4 Understanding EEG In-depth 2 Methods 2.1 Data Acquisition and Pre-processing 2.2 Approach and Algorithm 2.3 Outcomes 3 Limitations 4 Conclusion References A Comprehensive Review on Image Captioning Using Deep Learning 1 Introduction 2 Image Captioning Techniques 2.1 Retrieval Based Captioning 2.2 Template Based Captioning 2.3 Neural Network-Based Image Captioning Method 3 Applications of Attention Mechanism 3.1 How Are Predictions Made? 3.2 How Are Predictions Evaluated? 4 Conclusion References Classical Models vs Deep Leaning: Time Series Analysis 1 Introduction 2 Methodology 2.1 Data-Extraction, Summary and Exploration 2.2 Model Building 3 Results 4 Conclusion References Probabilistic Evaluation of Distinct Machine Learning Algorithms 1 Introduction 1.1 Problem Statement 1.2 Objectives 2 Research Methodology 3 Literature Survey 4 Dataset Description 5 Improvised Analysis 6 Discussion 7 Conclusion and Future Scope References Empirical Analysis of Humor Detection Using Deep Learning and Machine Learning on Kaggle Corpus 1 Introduction 2 Related Work 3 Implementation Details 3.1 Dataset Description 4 Techniques Applied 5 Results Discussion 5.1 Machine Learning Techniques 5.2 Deep Learning Techniques 5.3 Comparative Analysis of ML and DL 6 Conclusions 7 Future Scope References Rumour Stance Classification on Textual Social Media Content Using Machine Learning 1 Introduction 2 Related Work 3 Implementation Details 3.1 Dataset Description 3.2 Workflow 4 Results and Discussion 5 Conclusion and Future Work References Robotics and Computer Vision for Intelligent Automation in Industries Theft Detection: An Optimized Approach Using cGAN and YOLO 1 Introduction 2 Literature Review 3 Proposed Methodology/Solution 3.1 Experimental Setup for Weapon Detection Module 4 Result and Discussion 5 Conclusion References A Parser Based Apparel Transformation to Aid in Cloth Virtual Try-On 1 Introduction 2 Related Works 3 Model Pipeline 3.1 OpenPose 3.2 Self Correction for Human Parsing 4 Experiments 4.1 Implementation 4.2 Applications 4.3 Limitations and Work to be Done 5 Conclusion References Real-Time Sign Language Detection Leveraging Real-Time Translation 1 Introduction 2 Related Work 3 Methodology 4 Implementation and Tools 5 Experimental Results and Analysis 6 Conclusion and Future Work References Intelligent Pesticide Recommendation System Based on Plant Leaf Disease and Pests 1 Introduction 2 Related Work 3 Proposed Method 3.1 Deep Learning Algorithm Used: Convolutional Neural Network (CNN) 3.2 CNN Models Used to Compare 4 Implementation 4.1 Models Used to Compare for Plant Leaf Disease Detection 4.2 Models Used to Compare for Pest Detection 5 Results 5.1 Plant Leaf Disease Detection 5.2 Pest Detection 6 Conclusion and Future Scope References Flood Damage Detection Using Satellite Images 1 Introduction 2 Background and Related Works 3 Proposed Methodology 4 Dataset 5 Implementation and Results 5.1 Fine-Tuning the Model 5.2 Custom Model 6 Performance Metrics 6.1 Loss Comparison Plot 7 Performance Metrics 7.1 (A) Hurricane Harvey Dataset 7.2 (B) Custom Dataset 8 Result Analysis 9 Conclusion References Integration of Machine Learning in the Spatio-Temporal Analysis of Mangrove Forest 1 Introduction 2 Proposed Methodology 2.1 Study Area and Data 2.2 Image Preprocessing 2.3 Image Classification 2.4 Accuracy and Validation 3 Results and Discussion 3.1 Comparison Results 3.2 LULC Results 3.3 Discussions 4 Conclusion References Detecting Diseases in Jasmine Plants Using Proposed Image Pre-processing Algorithm 1 Introduction 2 Diseases in Plants 3 Major Diseases in Jasmine Plants 4 Related Work 5 Proposed System 5.1 Gathering Images 5.2 Augmentation 5.3 Pre-processing 5.4 Segmentation 5.5 Feature Extraction 5.6 Classification 6 Experimental Results 6.1 Initial and Augmented Images 6.2 Pre-processed Images 6.3 Images in Different Color Spaces 7 Conclusion References 3D-Zeit: A Framework for Generating 3D Model as an AR Object Using Object Recognition 1 Introduction 1.1 Problem Statement 1.2 Objectives 2 Related Work 3 Methodology 3.1 Creating 3D Objects from a 2D Image 3.2 Rendering the 3D Object in Blender 3.3 Creating an AR Environment for the 3D Object in Unity 4 Conclusion References Automatic Image Captioning Using Ensemble of Deep Learning Techniques 1 Introduction 2 Literature Review 3 Proposed Model 3.1 Overview 3.2 CNN-Based Image Feature Extractor 3.3 LSTM Caption Generator 4 Experiment 4.1 Datasets and Preprocessing 4.2 Hyperparameter Tuning 4.3 Evaluation Metrics 5 Results and Analysis 5.1 Quantitative Results 5.2 Qualitative Results 6 Conclusion and Future Work References Automated License Plate Detection and Recognition Using Deep Learning 1 Introduction 2 CNN-RNN 3 YOLO - You Look Only Once 4 SSD - Single Shot Detector 5 Conclusion References Challenges in Scene Understanding for Autonomous Systems 1 Introduction 2 Local vs Global Feature Trade-off 3 Data Limitations 4 Domain Adaptation 4.1 Domain-Invariant Features 4.2 Domain-Specific Features 5 Task Dependency of Augmentations 6 Semantic Segmentation 7 Conclusion References An Effective Genetic Algorithm Based Multi-objective Optimization Approach for Coverage Path Planning of Mobile Robot 1 Introduction 2 Environmental Modelling 3 Proposed Method 3.1 Initialization 3.2 Fitness Evaluation 3.3 Selection 3.4 Crossover 3.5 Mutation 4 Results and Discussion 5 Conclusion and Future Work References Trending Technologies: Frameworks and Applications Focusing Real Life Issues Smart Monitoring System for Waste Management Using IoT 1 Introduction 2 Proposed System 3 System Requirements 3.1 Hardware 3.2 Software 4 Results and Discussion 5 Conclusion References Implementation of LiDAR Based Self Driving Car Using Raspberry Pi 3 1 Introduction 2 Related Work 3 Progression of Self-driving Cars 4 Phases of Working 5 Designing of Proposed System 6 Challenges with Autonomous Cars 7 Results 8 Conclusion and Future Scope References Fast Implementation of AES Modes Based on Turing Architecture 1 Introduction 1.1 Enhanced L1 Data Cache 1.2 Execution of Floating Point and Integer in a Concurrent Manner 1.3 Uniform Datapath and Uniform Register File 1.4 Electronic Code Block (ECB) 1.5 Cipher Block Chaining (CBC) 1.6 Counter (CTR) 2 Related Work 3 Proposed Methodology 4 Comparison and Analysis 5 Conclusion References N-Dimensional Structure: A Data Structure with Fast Access and Sorting of Integers 1 Introduction 2 Literature Review 3 Methodology 3.1 U-Dimensional Space 3.2 Array Based Implementation 3.3 Tree Based Implementation 3.4 Algorithms 3.5 Theoretical Analysis 4 Results and Discussion 5 Conclusion References Spatial Variation of Air Quality in Delhi During Diwali: A Case Study of Covid-19 Period 1 Introduction 2 Literature Review 2.1 Factor Affecting Air Pollution 2.2 Health Effects of Firecrackers 3 Methodology 3.1 Data Acquisition and Analysis 3.2 Arc GIS 4 Results and Discussion 5 Conclusion References Shop-Easy: An Online Shopping Framework Emphasizing Vocal for Local Using Location and Review Based Services 1 Introduction 2 Background and Related Work 3 Shop-Easy: Proposed Shopping Framework 3.1 Proposed System Functionalities 3.2 Proposed System Functionalities 3.3 Results and Discussion 4 Comparative Analysis of Features of Proposed System 5 Conclusion References Women Assault Detection and Providing Help Using Pitch 1 Introduction 1.1 Input 1.2 Error Handling 2 Background 3 Literature Review 4 Dataset 5 Proposed Approach 5.1 Research Used 5.2 Hardware Necessities for Our Product Development 5.3 Software Specifications 5.4 Frequencies of Different Sounds 5.5 Working 5.6 Cost Estimation 5.7 Cost Comparison with CCTV 5.8 Process Flow of the Solution 6 Results and Discussion References Cognitive Workload Estimation Using Eye Tracking: A Review 1 Introduction 2 Background 2.1 Gaze Points 2.2 Fixation 2.3 Saccade 2.4 Velocity Classification 2.5 Fixation Duration 2.6 Pupil Dilation 2.7 Gaze Entropy 2.8 Saccadic Intrusion (SI) 3 Procedure 3.1 Participants 3.2 Instruments 4 Cognitive Load Estimation Methods 4.1 Statistical Analysis 4.2 Machine Learning Based Classification Methods 5 Conclusion References Author Index