ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Advances in Cognitive Science and Communications: Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, India

دانلود کتاب پیشرفت در علوم شناختی و ارتباطات: مقالات برگزیده از پنجمین کنفرانس بین المللی ارتباطات و مهندسی فیزیک سایبری (ICCCE 2022)، حیدرآباد، هند

Advances in Cognitive Science and Communications: Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, India

مشخصات کتاب

Advances in Cognitive Science and Communications: Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, India

ویرایش:  
نویسندگان: , ,   
سری: Cognitive Science and Technology 
ISBN (شابک) : 9811980853, 9789811980855 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 1174
[1175] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 34 Mb 

قیمت کتاب (تومان) : 42,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Advances in Cognitive Science and Communications: Selected Articles from the 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), Hyderabad, India به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پیشرفت در علوم شناختی و ارتباطات: مقالات برگزیده از پنجمین کنفرانس بین المللی ارتباطات و مهندسی فیزیک سایبری (ICCCE 2022)، حیدرآباد، هند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب پیشرفت در علوم شناختی و ارتباطات: مقالات برگزیده از پنجمین کنفرانس بین المللی ارتباطات و مهندسی فیزیک سایبری (ICCCE 2022)، حیدرآباد، هند

این کتاب شامل مقالات منتخب بررسی شده از پنجمین کنفرانس بین المللی ارتباطات و مهندسی فیزیک سایبری (ICCCE 2022) است که در 29 و 30 آوریل 2022 در حیدرآباد هند برگزار شد. مقالات ارائه شده در اینجا مربوط به نسل بعدی سیستم های شناختی، علوم اعصاب، سیستم های فیزیکی سایبری و تاثیر آنها بر فناوری های ارتباطی است. این کتاب شامل مطالب مرتبط با اختلالات شناختی، هوش محاسباتی، منطق فازی، محاسبات تکاملی است که برای استخراج نقشه راه برای تحقیقات آینده در علوم/سیستم ها و ارتباطات شناختی مهم هستند. ICCCE یکی از معتبرترین کنفرانس‌هایی است که در زمینه‌های بین رشته‌ای علوم شناختی و فناوری ارتباطات مانند روش‌های زبان‌شناسی، علوم کامپیوتر، فلسفه و علوم اعصاب مفهوم‌سازی شده است. این دوره از کنفرانس با حضور چندین متخصص و دانشگاهیان صنعت و سازمان‌های دولتی برای پوشش طیف گسترده‌ای از دیدگاه‌ها، شیوه‌ها و تخصص فنی مرتبط با فناوری‌های شناختی و ارتباطات نسل بعدی برگزار شد. مقالات ارائه شده شامل نوآوری های صنعت، نتایج پیاده سازی ها و نتایج تحقیقات پیشرفته از حوزه های علم/فناوری شناختی و تاثیر آنها بر فناوری ارتباطات و مهندسی فیزیکی سایبری می شود. را


توضیحاتی درمورد کتاب به خارجی

This book includes selected peer reviewed articles from The 5th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2022), held on 29th and 30th April 2022 in Hyderabad, India. Articles presented here relate to next generation cognitive systems, neuroscience, cyber physical systems and their impact on communication technologies. The book includes content related to cognitive disorders, computational intelligence, fuzzy logics, evolutionary computing that are important for deriving a roadmap for future research on cognitive science/systems and communications. ICCCE is one of the most prestigious conferences conceptualized in the transdisciplinary field of cognitive science and communication technology areas like methods of linguistics, computer science, philosophy, and neuroscience. This edition of the conference was attended by several Industry professionals and academicians, and Government agencies to cover a broad range of perspectives, practices, and technical expertise related to cognitive technologies and next generation communications. Articles presented cover innovations from industry, outcome of implementations and cutting-edge research outcomes from cognitive science/technology areas and their impact on communication technology and cyber physical engineering. ​



فهرست مطالب

Contents
A Methodology for Selecting Smart Contract in Blockchain-Based Applications
	1 Introduction
	2 Background
	3 Smart Contract Use Cases
	4 Challenges in Implementing Smart Contract
	5 Proposed Methodology
	6 Conclusion and Future Scope
	References
Deep Learning Neural Networks for Detection of Onset Leukemia from Microscopic Images
	1 Introduction
	2 Literature Review
	3 Algorithms
		3.1 Fuzzy C-Means Algorithm
		3.2 Active Contours
		3.3 Convolutional Neural Network (CNN)
	4 Methodology
	5 Results and Discussion
	6 Conclusion
	References
Design of 4 × 4 Butler Matrix for 5G High Band of 26 GHz
	1 Introduction
	2 Design of Butler Matrix and Its Subcomponents
		2.1 Design of Branch Line Coupler
		2.2 Design of 0 dB Crossover
		2.3 Design of Phase Shifter
		2.4 Design of Rectangular Patch Antenna
		2.5 Design of Overall Butler Matrix
	3 Results and Analysis
	4 Conclusion
	References
Pedestrian and Vehicle Detection for Visually Impaired People
	1 Introduction
	2 Methodology
		2.1 Data Acquisition and Pre-processing
		2.2 Feature Extraction
		2.3 Dimensionality Reduction
		2.4 Classification of Vehicles and Pedestrian
	3 Results and Discussion
	4 Conclusion
	References
Measuring Effectiveness of CSR Activities to Reinforce Brand Equity by Using Graph-Based Analytics
	1 Introduction
	2 Literature Review
	3 Pre-processing of Data
	4 Modelling and Analysis
	5 Results and Conclusion
	References
Design and Implementation of Built-In Self-Test (BIST) Master Slave Communication Using I2C Protocol
	1 Introduction
		1.1 Background
		1.2 Objectives
		1.3 Need and Importance
	2 Literature Review
	3 Methodology
		3.1 Existing Methods
		3.2 Proposed Method
	4 Results
	5 Conclusion
	Bibliography
Implementation of Finite Element Method in Opera Software for Design and Analysis of High-Voltage Busbar Supports
	1 Introduction
	2 Technical Specifications of 33 kV Busbar Are of Use
	3 Finite Element Method
	4 Simulation Method
	5 Design of High-Voltage Busbar Supports in Opera
	6 Conclusion
	References
InterCloud: Utility-Oriented Federation of Cloud Computing Environments Through Different Application Services
	1 Introduction
	2 System Architecture
	3 Elements of InterCloud
		3.1 Cloud Coordinator (CC)
		3.2 Cloud Broker (CB)
	4 The Performance of the Federated Cloud Environment
	5 Conclusion
	References
Cross-Cultural Translation Studies in the Context of Artificial Intelligence: Challenges and Strategies
	1 Introduction
		1.1 Challenges
		1.2 Strategies
	2 Cross Cultural Translation
	3 Contextual Artificial Intelligence
	4 Artificial Intelligence Translators
		4.1 Advantages of Artificial Intelligence Translation
		4.2 Disadvantages of Artificial Intelligence Translation
	5 Conclusion
	References
Design of Low-Power OTA for Bio-medical Applications
	1 Introduction
	2 Proposed Architecture of OTA
	3 Simulation Results
	4 Conclusion
	References
Analysis of the Efficiency of Parallel Prefix Adders
	1 Introduction
	2 Conventional Multi-bit Adders
		2.1 Ripple-Carry Adder
		2.2 Carry-Skip Adder
		2.3 Carry Lookahead Adder
	3 Parallel Prefix Adders
		3.1 Kogge-Stone Adder
		3.2 Brent-Kung Adder
		3.3 Han-Carlson Adder
		3.4 Ladner-Fischer Adder
	4 Performance Comparison of Parallel Prefix Adders
		4.1 Analysis of Efficiency Utilizing Xilinx’s Vivado Design Suite
	5 Conclusion
	References
Design of Efficient 8-Bit Fixed Tree Adder
	1 Introduction
	2 Literature Survey
	3 Architecture of FL-AT and FX-AT
	4 Architecture of Truncated Fixed-Width Adder Tree (TFX-AT)
	5 Improved ITFX-AT Architecture
	6 Simulation Results
	7 Conclusion
	References
Design of T Flip-Flop Based on QCA Technology
	1 Introduction
	2 Basics of QCA
		2.1 Basic Cell in QCA
	3 QCA Implementation of Proposed T Flip-Flop
	4 Simulation Results
	5 Conclusion
	References
Efficient Image Watermarking Using Particle Swarm Optimization and Convolutional Neural Network
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Feature Extraction
		3.2 Optimization Coefficient (K)
		3.3 Embedding of Watermark
	4 Experimental Analysis
	5 Conclusion and Future Work
	References
A Review on Various Cloud-Based Electronic Health Record Maintenance System for COVID-19 Patients
	1 Introduction
	2 Corona Virus
		2.1 Possibilities of Transmission
		2.2 Diagnosis Methods
		2.3 Prevention Methods
		2.4 Severe Coronavirus Disease Patients with Coagulopathy
	3 Implementation of Electronic Health Record
		3.1 Attribute-Based Encryption
		3.2 Privacy-Preserving Attribute-Based Mechanism
		3.3 Fuzzy-Based Keyword Search in Document
		3.4 Dynamic Multi-keyword-Based Search in Cloud
	4 Conclusion
	References
Contourlet Transformed Image Fusion Based on Focused Pixels
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Existing Methods
		3.2 Block Diagram
		3.3 Implementation Tool
	4 Experimental Results
	5 Conclusion
	Bibliography
Design of Efficient High-Speed Low-Power Consumption VLSI Architecture for Three-Operand Binary Adders
	1 Introduction
	2 Existing Methods
		2.1 Carry-Save Adder
		2.2 Han-Carlson Adder
	3 Proposed Method
	4 Simulation Results
	5 Conclusion
	References
DLCNN Model with Multi-exposure Fusion for Underwater Image Enhancement
	1 Introduction
	2 Related Works
	3 DLCNN Architecture
	4 Proposed Method
	5 Results and Discussions
	6 Conclusion
	References
Machine Learning Approach-Based Plant Disease Detection and Pest Detection System
	1 Introduction
	2 Existing Method
	3 Plant Leaf Disease Detection System
		3.1 Image Acquisition
		3.2 Image Preprocessing
		3.3 Image Histogram
		3.4 Image Segmentation
		3.5 Feature Selection
		3.6 Classifier
	4 Pest Detection System
	5 Results and Discussion
	6 Conclusion
	References
Design of Low Voltage Pre-settable Adiabatic Flip-Flops Using Novel Resettable Adiabatic Buffers
	1 Introduction
	2 Adiabatic Logic
		2.1 Adiabatic Principle
		2.2 Conventional Logic Switching
		2.3 Adiabatic Switching
		2.4 Adiabatic Logic Families
		2.5 Steps of Adiabatic Circuit Design
	3 Adiabatic Flip-Flops Using Novel Resettable Adiabatic Buffers
	4 Results
	5 Conclusion
	References
Raspberry Pi-Based Smart Mirror
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Results
	5 Conclusion
	References
Deep Learning Framework for Object Detection from Drone Videos
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Training Phase
		3.2 Inference Phase
	4 Results
	5 Conclusion
	References
VoteChain: Electronic Voting with Ethereum for Multi-region Democracies
	1 Introduction
	2 Terminology
		2.1 Blockchain
		2.2 Consensus Algorithm
		2.3 Proof of Work
		2.4 Smart Contract
		2.5 Ethereum Account
		2.6 Solidity
	3 Methodology
		3.1 Create Election
		3.2 Assign Candidates
		3.3 Authenticate Voter
		3.4 Serve Eligible Elections
		3.5 Cast Vote
		3.6 Declare Results
	4 Prototype Implementation—VoteChain
		4.1 Objectives
		4.2 Application Layer
		4.3 Service Layer
		4.4 Data Persistence Layer
	5 Smart Contract
		5.1 Mappings
		5.2 Add Election
		5.3 Add Party
		5.4 Add Candidate to Election
		5.5 Mocha Tests
	6 Conclusion
	Bibliography
Design and Analysis of Multiband Self-complimentary Log Periodic Tripole Antenna (LPTA) for S and C-Band-Based Radar Applications
	1 Introduction
	2 Design of Self-complimentary Log Periodic Tripole Antenna (LPTA)
	3 Results and Discussion
	4 Conclusion
	References
Performance of Cooperative Spectrum Sensing Techniques in Cognitive Radio Based on Machine Learning
	1 Introduction
		1.1 Spectrum Sensing
		1.2 Machine Learning-Based SS
	2 System Model
	3 Conclusion and Future Work
	References
Unified Power Quality Conditioner for V-V Connected Electrified Railway Traction Power Supply System
	1 Introduction
		1.1 Traction System Configuration
	2 Design of D-STATCOM to Improve the Power Quality of Traction System
		2.1 Control Algorithm of D-STATCOM
	3 Design of UPQC Controller to Improve the Power Quality of Traction System
		3.1 Design of DVR
		3.2 Control Strategy of DVR
	4 Simulation Result and Discussion
		4.1 Without Any Compensator
		4.2 With D-STATCOM
		4.3 With DVR
		4.4 With UPQC
	5 Conclusion
	References
Intrusion Detection System Using Deep Convolutional Neural Network and Twilio
	1 Introduction
	2 Proposed System
		2.1 Objective
		2.2 Overview
		2.3 Tools and Methodologies Used
		2.4 Working of the Proposed System
		2.5 System Implementation
	3 Experiment Results and Discussions
	4 Conclusion and Future Scope
	Bibliography
A Neural Network-Based Cardiovascular Disease Detection Using ECG Signals
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 ECG Signals
		3.2 Buffering
		3.3 Multimodal Fusion
		3.4 Clustering
		3.5 Extraction
		3.6 Classification by Convolutional Neural Network
		3.7 Train Data Set
	4 Results
	5 Conclusion
	References
Detection and Classification of Lung Cancer Using Optimized Two-Channel CNN Technique
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Pre-processing
		3.2 Segmentation with RCCN
		3.3 Optimization by Cuckoo Search
		3.4 Classification RCCN with Two-Channel CNN
		3.5 Attributes
	4 Results and Analysis
	5 Conclusion
	References
Design of High Efficiency FIR Filters by Using Booth Multiplier and Data-Driven Clock Gating and Multibit Flip-Flops
	1 Introduction
		1.1 Background
		1.2 Objectives
		1.3 Need and Importance
	2 Existing Methods
	3 Proposed Methodology
		3.1 Using MATLAB
		3.2 RTL Schematic Diagram
		3.3 Data-Driven Clock Gating
		3.4 Implementation Tool
	4 Simulation Results
	5 Conclusion
	References
Detecting the Clouds and Determining the Weather Condition and Coverage Area of Cloud Simultaneously Using CNN
	1 Introduction
		1.1 Objectives
		1.2 Need and Importance
	2 Literature Review
	3 Methodology
		3.1 Existing Method
		3.2 Proposed Method
	4 Results
	5 Conclusion
	References
Traffic Prioritization in Wired and Wireless Networks
	1 Introduction
	2 Traffic Prioritization in Wired Networks
		2.1 Explicit 802.1p
		2.2 DSCP Marking
		2.3 VLAN/Switch Port-Based Grouping
	3 Traffic Prioritization in Wireless Networks
		3.1 Enhanced Distribution Channel Access (EDCA)
		3.2 HCF-Controlled Channel Access
	4 Reservation Protocols
		4.1 Bit-Map Protocol
		4.2 Resource Reservation Protocol (RSVP)
	5 Conclusion
	References
Low Area-High Speed Architecture of Efficient FIR Filter Using Look Ahead Clock Gating Technique
	1 Introduction
	2 Existing Methodology
	3 Proposed Methodology
	4 Results and Analysis
	5 Conclusion
	Bibliography
Multimodal Medical Image Fusion Using Minimization Algorithm
	1 Introduction
	2 Multimodal Fusion
	3 Results and Analysis
	4 Conclusion
	Bibliography
Pre-collision Assist with Pedestrian Detection Using AI
	1 Introduction
	2 Literature Survey
	3 Implementation
		3.1 Camera Subsystem
		3.2 Alert Subsystem
		3.3 Display Unit
		3.4 Working
	4 Methodology
		4.1 Open CV
		4.2 YOLO
	5 Results
	6 Conclusion and Future Scope
	References
An Intrusion Detection System Using Feature Selection Based on Red Kangaroo Mating Algorithm
	1 Introduction
	2 Related Works
	3 Proposed Model
		3.1 Mating Behavior of Red Kangaroo
		3.2 Red Kangaroo Mating Algorithm (RKMA)
	4 Experimental Results
	5 Conclusions
	References
Heart Stroke Prediction Using Machine Learning Models
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Data Collection
		3.2 Data Pre-processing
		3.3 Exploratory Data Analysis
		3.4 Models
		3.5 Metrics for Evaluation
	4 Results
	5 Conclusion and Future Work
	References
Machine Learning-Based Pavement Detection for Visually Impaired People
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Dataset Collection and Preprocessing
		3.2 Feature Vector Compilation
		3.3 Classification and Detection of Pavement
	4 Results and Discussion
	5 Conclusion
	References
A Review on Location-Based Routing Protocols in Wireless Sensor Networks
	1 Introduction
	2 Background
	3 Location-Based Routing Protocols
	4 Comparison of Location-Based Protocols
	5 Conclusion
	References
Design of a Highly Reliable Low Power Stacked Inverter-Based SRAM Cell with Advanced Self-recoverability from Soft Errors
	1 Introduction
	2 Schematic and Its Normal Operation with Simulation Result
	3 Single Node Upset Self-recovering Principle
	4 Double Node Upset Self-recovering Principle
	5 Conclusion
	References
Image Aesthetic Score Prediction Using Image Captioning
	1 Introduction
		1.1 Composition
		1.2 Lighting
		1.3 Color Schemes
	2 Related Work
		2.1 Visual Attention Mechanism
		2.2 Multimodal Analysis
		2.3 Computational Approach for Image Aesthetic Score Prediction
	3 Proposed Methodology
		3.1 CNN
		3.2 Caption Generator
		3.3 Caption Analysis
	4 Experimental Analysis
		4.1 Training Dataset
		4.2 Score Prediction with Caption Generation
		4.3 General Model
	5 Results
	6 Conclusion
	References
Pedestrian Crossing Signal Detection System for the Visually Impaired
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Dataset Compilation
		3.2 Feature Extraction and Feature Vector Compilation
		3.3 Dimensionality Reduction
		3.4 Classification and Detection of Pedestrian Crossing Light
	4 Results
	5 Conclusion
	References
A Comparison of Different Machine Learning Techniques for Sentiment Analysis in Education Domain
	1 Introduction
	2 Related Work
		2.1 Methods
		2.2 Recent Advances
	3 Results and Discussion
	4 Conclusion
	References
Design and Simulation of 2 × 2 Microstrip Patch Array Antenna for 5G Wireless Applications
	1 Introduction
	2 Antenna Design
	3 Literature Overview
	4 2 × 2 Microstrip Patch Array Antenna Without Insets
	5 2 × 2 Microstrip Patch Array Antenna with Insets
	6 Results
		6.1 S Parameter
		6.2 Bandwidth
		6.3 Voltage Standing Wave Ratio (VSWR)
		6.4 Radiation Plots
		6.5 Gain
		6.6 Directivity
	7 Conclusion
	References
Fake Currency Detection: A Survey on Different Methodologies Using Machine Learning Techniques
	1 Introduction
	2 Literature Review
	3 Discussion of Drawbacks
	4 Conclusion
	References
Bi-directional DC-DC Converters and Energy Storage Systems of DVR—An Analysis
	1 Introduction
	2 DVR Topologies
	3 DVR with Energy Storage Element
		3.1 Energy Storage Element
		3.2 Power Converter with Energy Storage
	4 Comparison of DVR with Energy Storage and Converter
	5 Conclusion
	References
A Higher-Order Sliding Mode Observer for SOC Estimation with Higher-Order Sliding Mode Control in Hybrid Electric Vehicle
	1 Introduction
	2 Proposed System Model
	3 HESS Modelling
	4 RC Model for SOC Estimation
		4.1 Second-Order RC Equivalent Model of Battery
		4.2 SC RC Model
	5 Energy Management System
	6 SOC Estimation
		6.1 Super-Twisting Observer
		6.2 Design of the Super-Twisting Sliding Mode Observer for Battery SOC Estimation
		6.3 Design of the Super-Twisting Sliding Mode Observer for SC SOC Estimation
	7 Controller
	8 Simulation Results
		8.1 SOC Estimation
	9 Conclusion
	References
Analysis of Reversible Data Hiding Techniques for Digital Images
	1 Introduction
	2 Literature Survey
	3 Proposed Method
		3.1 Secure Force Algorithm
		3.2 Data Hiding Algorithm
		3.3 Extraction Algorithm
	4 Result and Discussion
	5 Conclusion
	References
A Hybrid Cryptosystem of Vigenère and Hill Cipher Using Enhanced Vigenère Table
	1 Introduction
	2 Vigenère Cipher
		2.1 Numeric Nature of Vigenère Cipher
	3 Literature Survey
	4 Proposed Approach
		4.1 Assign Numerical Values to All Characters
		4.2 Encryption Algorithm
		4.3 Decryption Algorithm
	5 Results
		5.1 Encryption
		5.2 Decryption
	6 Conclusion
	References
Intrusion Detection System Using Ensemble Machine Learning for Digital Infrastructure
	1 Introduction
		1.1 Signature-Based Detection IDS
		1.2 Anomaly Detection-Based IDS
	2 Training Dataset
		2.1 Intrusion Detection and Real-Time Log Analysis
	3 Data Preprocessing
	4 Stacking Classifiers for IDS
	5 Base Learners
	6 Meta-Classifier (Meta-Learner)
	7 Modeling and Training Pipeline
	8 Analysis and Principal Component Analysis (PCA) Result
	9 Training and K-Fold Cross-Validation
	10 Conclusion
	References
Integrating InceptionResNetv2 Model and Machine Learning Classifiers for Food Texture Classification
	1 Introduction
		1.1 Significance of Texture Analysis in Food Recognition
	2 Related Work
	3 Deep Learning Approach for Food Texture Classification by Proposed Method
		3.1 Automated Feature Extraction Using Deep Networks
		3.2 Machine Learning Classifiers
	4 Experimental Analysis and Discussion
		4.1 RawFooT Food Texture Dataset
		4.2 Results
	5 Conclusion
	References
Sentiment Analysis of Customer on a Restaurant Using Review in Twitter
	1 Introduction
	2 Proposed Scheme
		2.1 Data Set
		2.2 Data Pre-processing
		2.3 Feature Extraction
		2.4 Sentiment Determination
	3 Results
	4 Conclusion
	References
Fundus Image Processing for Glaucoma Diagnosis Using Dynamic Support Vector Machine
	1 Introduction
	2 Methodology
		2.1 Preprocessing
		2.2 STFM Features
		2.3 DSVM Classification
	3 Results and Discussions
	4 Conclusion
	References
A Case Study of Western Maharashtra with Detection and Removal of Cloud Influence: Land Use and Land Cover Change Detection
	1 Introduction
	2 Study Area
		2.1 Data Product
	3 Materials and Methods
		3.1 Land Use/ Land Cover Detection
	4 Results and Discussion
	5 Conclusion
	References
A Survey on Deep Learning Enabled Intrusion Detection System for Internet of Things
	1 Introduction
	2 IoT Security Requirements and Attacks
		2.1 Classification of Attacks
		2.2 Requirements of IDSs in IoT Networks
	3 IDS for IoT Systems
	4 Deep Learning for Intrusion Detection System
	5 Conclusion, Challenges, and Future Discussion
	References
Design and Development of Multithreaded Web Crawler for Efficient Extraction of Research Data
	1 Introduction
		1.1 State of Current Web
		1.2 Introduction to Web Crawler
	2 Current State of Research in Semantic Web
	3 System Design
		3.1 Application Architecture
		3.2 Module Dependency Graph in Presentation Tier
		3.3 Implementation of Multithreaded Web Crawler in Java
	4 Results and Discussion
	5 Conclusion and Scope for Future Work
	References
Medical Image Classification Based on Optimal Feature Selection Using a Deep Learning Model
	1 Introduction
	2 Methodology
		2.1 Existing Method
		2.2 Proposed Method
	3 Results
	4 Conclusion
	References
Real-Time Indian Sign Language Recognition Using Image Fusion
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 Image Pre-psrocessing
		3.2 Feature Extraction
		3.3 Classification
		3.4 Gesture Recognition
	4 Experimental Results and Analysis
	5 Conclusion
	References
Design IoT-Based Smart Agriculture to Reduce Vegetable Waste by Computer Vision and Machine Learning
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Computer Vision
		3.2 Multispectral Camera
		3.3 Software
		3.4 OpenCV
		3.5 Classification of Images by Using Machine Learning Algorithm
	4 Results and Discussion
		4.1 Problem Statement
		4.2 Designing
		4.3 Results
	5 Conclusion
	References
Analytical Study of Hybrid Features and Classifiers for Cattle Identification
	1 Introduction
	2 Literature Survey
	3 Data Collection and Pre-processing
	4 Methodology and Design of Proposed System
		4.1 Feature Extraction Techniques
		4.2 K-Means Clustering Algorithm
		4.3 Locality Preserving Projection (LPP)
		4.4 Classification Algorithms
	5 Experimental Validation and Performance Analysis
	6 Conclusion
	References
A Secured Land Registration System Using Smart Contracts
	1 Introduction
	2 Literature Survey
		2.1 Coding Issues in Smart Contracts
		2.2 Security Issues in Smart Contracts
		2.3 Privacy Issues in Smart Contracts
		2.4 Performance Issues in Smart Contracts
	3 Traditional Land Registration System
	4 Our Approach to Land Registration System
	5 Results and Discussion
	6 Conclusion
	References
A Constructive Feature Grouping Approach for Analyzing the Feature Dominance to Predict Cardiovascular Disease
	1 Introduction
	2 Related Works
	3 Methodology
	4 Numerical Results and Discussion
	5 Summary
	References
High-Band Compact Microstrip Patch Antenna for 5G Wireless Technologies
	1 Introduction
	2 Literature Review
	3 Antenna Configuration and Design
		3.1 Calculation of Cut Size
	4 Methodology
	5 Results and Discussion
	6 Conclusion
	References
A Cryptocurrency Price Prediction Study Using Deep Learning and Machine Learning
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Data
		3.2 Model Description
	4 Model Training and Validation
	5 Results and Discussions
	6 Conclusion
	References
Regression for Predicting COVID-19 Infection Possibility Based on Underlying Cardiovascular Disease: A Medical Score-Based Approach
	1 Introduction
	2 Underlying Cardiovascular Disease Impact
		2.1 Age
		2.2 Gender
		2.3 Diabetes
		2.4 Blood Pressure
		2.5 Cholesterol
		2.6 Obesity
	3 Methodology
		3.1 Risk Score Module
		3.2 Cardiovascular Module
	4 Results
	5 Conclusion
	References
Evolution of 5G: Security, Emerging Technologies, and Impact
	1 Introduction
	2 Customized Need (Indian Perspective) and Emerging Technologies
		2.1 Massive MIMO Technology
		2.2 Spectrum Sharing
		2.3 Interference Management
		2.4 Advanced Receiver
		2.5 Joint Scheduling
		2.6 Device to Device Communication (D2D)
	3 Challenges in Implementation of 5G
	4 Advanced Technologies Used in 5G
		4.1 Internet of Things (IoT)
		4.2 Artificial Intelligence (AI)
		4.3 f-OFDM
		4.4 Virtual Reality (VR) and Augmented Reality (AR)
	5 Security Issues in 5G
	6 Conclusion and Future Scope
	References
A Secure Multi-tier Framework for Healthcare Application Using Blockchain and IPFS
	1 Introduction
	2 Related Works
	3 Methodology
	4 Results and Discussion
	5 Conclusion
	References
Machine Learning Techniques to Web-Based Intelligent Learning Diagnosis System
	1 Introduction
	2 Machine Learning Algorithms
		2.1 Artificial Neural Network (ANN)
		2.2 Decision Tree (DT)
		2.3 Naïve Bayes (NB)
		2.4 Random Forest (RF)
	3 Web-Based Intelligent Learning Diagnosis System
	4 Conclusion
	References
Phishing Website Detection Based on Hybrid Resampling KMeansSMOTENCR and Cost-Sensitive Classification
	1 Introduction
	2 Methodology
		2.1 Dataset Description
		2.2 Class Imbalance Handling
		2.3 Proposed Model
		2.4 Performance Metrics
	3 Experimental Setup
	4 Results and Discussion
	5 Conclusion
	References
A Brain-Inspired Cognitive Control Framework for Artificial Intelligence Dynamic System
	1 Introduction
	2 Literature Survey
	3 A Brain-Inspired Cognitive Control Framework for AI
	4 Results
	5 Conclusion
	References
Meandered Shape CPW Feed-Based SIW Slot Antenna for Ku-Band Applications
	1 Introduction
	2 Antenna Configuration and Theoretical Analysis
	3 Simulation Results
	4 Conclusion
	References
Social and Mental Well-Being-COVID-19 After Effects Survey and Data Analysis
	1 Introduction
	2 Methodology
		2.1 Participants and Their Characteristics
		2.2 Statistical Analysis
		2.3 Exploratory Data Analysis
	3 Results and Discussion
		3.1 Assessment of Social Interaction During Lockdown
		3.2 Assessment of Emotional Well-Being During Home Arrest Situation
		3.3 Assessment of Mental Health of People During Covid Lockdown
		3.4 Assessment of Economic Condition of People
		3.5 Future Outlook Regarding Covid and Other Pandemics
	4 Conclusion
	References
Covid Patient Monitoring System for Self-quarantine Using Cloud Server Based IoT Approach
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
	4 Results and Discussion
	5 Conclusion
	References
Wood Images Classification Based  on Various Types of K-NN Classifier
	1 Introduction
	2 Related Research
	3 Methodology
		3.1 Wood Image Database
		3.2 Preprocessing
		3.3 Feature Extraction
		3.4 Classification of Wood Images
	4 Experimental Setup and Results
	5 Conclusion
	References
Software Defect Prediction Survey Introducing Innovations with Multiple Techniques
	1 Introduction
	2 Literature Review
	3 Different Models and Approaches
		3.1 Soft Computing
		3.2 Software Metrics
		3.3 A General Defect Prediction Process
		3.4 Machine Learning-Based Models
		3.5 The Fuzzy Logic Approach
		3.6 Code Pattern-Based Vulnerability Detection
		3.7 Capture Recapture Analysis
		3.8 Expert Opinions
		3.9 Causal Model
		3.10 Analogy-Based Predictions
		3.11 Multivariate Regression
		3.12 Constructive Quality Model (COQUALMO)
	4 Automatic Software Program Repair
	5 Conclusion
	References
A Machine Learning and Fuzzy Heterogeneous Data Sources for Traffic Flow Prediction System
	1 Introduction
	2 Literature Survey
	3 Traffic Flow Prediction System
	4 Experimental Results
	5 Conclusion
	References
A Survey on Wireless Channel Access Protocols
	1 Introduction
	2 Carrier Sense Multiple Access Protocol (CSMA)
	3 Carrier Sense Multiple Access Protocol with Collision Avoidance (CSMA-CA)
	4 ALOHA
		4.1 Pure ALOHA
		4.2 Slotted ALOHA
	5 Channelization
		5.1 Frequency Division Multiple Access (FDMA)
		5.2 Time Division Multiple Access (TDMA)
		5.3 Code Division Multiple Access (CDMA)
	6 Orthogonal Frequency Domain Multiple Access (OFDMA)
	7 Spatial Division Multiple Access (SDMA)
	8 Frequency Hopping Spread Spectrum (FHSS)
	9 Direct-Sequence Spread Spectrum (DSSS)
	10 Power Division Multiple Access
	11 Orthogonal Power Division Multiple Access (OPDMA)
	12 Non-orthogonal Multiple Access (NOMA)
	13 Conclusion
	References
Sahaay—A Web Interface to Improve Societal Impact
	1 Introduction
	2 Literature Survey
	3 System Analysis and Design
		3.1 Proposed System
		3.2 Architecture Design
	4 Implementation and Results
		4.1 Modules
		4.2 Output Screenshots
	5 Conclusion and Future Enhancements
	References
Summarization of Unstructured Medical Data for Accurate Medical Prognosis—A Learning Approach
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Medical Transcript Summarization (MTS) via NLP
		3.2 Machine Learning by Predicting Treatment
	4 Results
	5 Conclusion
	References
A Screening Model for the Prediction of Early Onset Parkinson’s Disease from Speech Features
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Feature Extraction Methods
		3.2 Filter Methods
		3.3 Embedded Methods
	4 Results
	5 Conclusion and Future Work
	References
Speed Control of Hybrid Electric Vehicle by Using Moth Flame Optimization
	1 Introduction
	2 System Description
		2.1 Model Description
		2.2 Plant Model Simplification and Linearization
		2.3 PID Controller
	3 Optimal Design of Proposed Controller
		3.1 Moth Flame Optimization
		3.2 Proposed MFO-Based PID Controller
		3.3 Estimation of PID Controller
	4 Results and Discussion
	5 Conclusion
	References
A Novel Hybrid Algorithm for Effective Quality of Service Using Fog Computing
	1 Introduction
	2 Security and Privacy Issues in Fog Computing
	3 Novel Hybrid Algorithm Using Fog Computing
	4 Conclusion
	References
Hierarchical Learning of Outliers
	1 Introduction
	2 Related Work
	3 Model
		3.1 Overview
		3.2 Hierarchical Clustering
		3.3 Spotting Outliers
	4 Experiment
		4.1 Problem Definition
		4.2 Dataset
		4.3 Experiment Setup
	5 Results and Analysis
		5.1 Discussion
	6 Conclusion
	References
Smart ECG Monitoring System Based on IoT
	1 Introduction
		1.1 Internet of Things
		1.2 Electrocardiogram (ECG)
	2 System Architecture
		2.1 Module 1: ECG Sensors
		2.2 Module 2: Sensor-to-Machine Communication
		2.3 Module 3: Network Gateway
		2.4 Module 4: Machine-to-Machine (M2M) Communication
	3 Conclusion
	References
Ensemble Learning Techniques and Their Applications: An Overview
	1 Introduction
	2 Classification of Ensemble Learning Techniques
		2.1 Boosting
		2.2 Bagging
		2.3 Stacking
		2.4 Mixture of Experts (MoE)
		2.5 Error-Correcting Output Codes (ECOC)
		2.6 Cluster Ensembles
	3 Different Kinds of Applications of Ensemble Learning
		3.1 Remote Sensing
		3.2 Person Recognition
		3.3 One Versus All Recognition
		3.4 Medical Applications
	4 Conclusion
	References
Impact of COVID-19 Pandemic on Indian Stock Market Sectors
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Data
		3.2 Proposed Methodology
	4 Empirical Results
	5 Conclusion
	References
Advance Warning and Alert System for Detecting Lightning Risk to Reduce Human Disaster Using AIoT Platform—A Proposed Model to Support Rural India
	1 Introduction
	2 Literature Review
	3 Existing Systems
		3.1 Geospatial-Based Lightning Alert System
		3.2 SMS-Based Lightning Alert System
		3.3 IoT-Based Lightning Alert System
	4 Proposed System
	5 Conclusion
	References
Fetal Health Prediction Using Machine Learning Approach
	1 Introduction
	2 Literature Survey
	3 Proposed System and Methodology
	4 Results and Discussion
	5 Conclusion
	References
BLDC Motor and Its Speed Characteristics Analysis Based on Total Harmonic Distortion
	1 Introduction
	2 Literature Survey
	3 Block Diagram
	4 Brushless DC Servomotor Drive System Modeling
	5 Design of Controllers
	6 Simulation Results
	7 Conclusion
	References
Calculating the Traffic Density of Real-Time Video Using Moving Object Detection
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Experimental Results
	5 Conclusion and Future Scope
	References
Design and Analysis of Missile Control Effectiveness, Visualized through MATLAB
	1 Introduction
		1.1 Missiles
		1.2 Problem Statement
		1.3 Objectives
	2 Literature Review
	3 Equations
	4 Operation of Missiles
	5 Results and Discussion
	6 Conclusion
	References
An Unsupervised Sentiment Classification Method Based on Multi-level Sentiment Information Extraction Using CRbSA Algorithm
	1 Introduction
	2 Sentiment Analysis Methods
		2.1 Machine Learning-Based Approach
		2.2 Lexicon-Based Approach
	3 Multi-level Fuzzy Computing with CRbSA Sentiment Classification
		3.1 Sentiment Intensity Calculating Methods on the Word and Phrase Level
		3.2 Computing Methods of Sentiment Intensity on the Sentence Level
		3.3 Sentiment Classifier Based on Fuzzy Set
		3.4 Splitting Sentences
		3.5 Computing Sentiment Category Credibility of Review CM LC (Rm)
		3.6 Document-Level Sentiment Extraction Using the CRbSA Algorithm
	4 Results
	5 Conclusion
	References
Timestamp Prediction Using Enhanced Adaptive Correlation Clustering-Based Recommender System for the Long Tail Items
	1 Introduction
	2 Related Work
		2.1 Recommendation Systems
		2.2 Adaptive Clustering
		2.3 Correlation-Based Clustering
		2.4 Enhanced Adaptive Correlation-Based Clustering
		2.5 Time Aware Recommendations
	3 Proposed Methodology
		3.1 Dataset
		3.2 The Derived Variables
		3.3 Flow Chart
		3.4 Algorithm
	4 Experimental Results
		4.1 Two-Class Confusion Matrix for Time-Class Prediction
		4.2 Eight- Class Confusion Matrix for Time-Class Prediction
	5 Conclusion
	References
In Cloud Computing Detection of DDoS Attack Using AI-Based Ensembled Techniques
	1 Introduction
		1.1 High Rate DDoS Attack
		1.2 Low-Rate DDoS Attack
		1.3 Life Cycle of DDoS Attack
		1.4 Detection of DDoS Attack
	2 Methodology
		2.1 Classification Algorithm and Dataset
	3 Results
	4 Conclusion
	References
Securing Data in Internet of Things (IoT) Using Elliptic Curve Cryptography
	1 Introduction
	2 Problem Statement
	3 Proposed Method
		3.1 Flow Diagrams
		3.2 Process of Encryption and Decryption
		3.3 Algorithms
	4 Results and Performance Analysis
	5 Conclusion
	References
Sign Language Interpreter
	1 Introduction
	2 Earlier and Current Issues
	3 Proposed Work
	4 System Model
	5 Implementation
	6 Conclusion
	References
Noise Removal Filtering Methods for Mammogram Breast Images
	1 Introduction
	2 Literature Survey
	3 Preprocessing Mammogram Images Using Various Filtering Methods
		3.1 Gaussian Filter
		3.2 Tri-State Filter
		3.3 Median Filter
		3.4 Mean Filter
		3.5 Threshold Filter
		3.6 Bilateral Filter
		3.7 Wiener Filter
		3.8 Adaptive Median Filter
	4 Results and Discussion
		4.1 Mean-Square Error (MSE)
		4.2 Peak-Signal–Noise-Ratio (PSNR)
	5 Conclusion
	References
Design and Implementation of Security Enhancement for Trusted Cloud Computing
	1 Introduction
	2 Related Works
		2.1 Modern Cryptography
		2.2 Searchable Encryption
		2.3 Homomorphic Encryption
		2.4 Encryption Based on Attribute
		2.5 Hybrid Encryption
	3 Proposed Methodology
		3.1 Authentication, Authorization, and Access Control
		3.2 Access Control
	4 Experimental Analysis
	5 Results
	6 Conclusion
	References
Multi-domain Opinion Mining: Authenticity of Data Using Sentiment Mining
	1 Introduction
	2 Related Work
	3 Proposed Solution
		3.1 Architecture
		3.2 Use Case
	4 Methodology
	5 Results
	6 Conclusion
	References
A Novel Low-Power NMOS Schmitt Trigger Circuit Using Voltage Bootstrapping and Transistor Stacking
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results and Analysis
	5 Conclusion
	References
Dynamic Channel Allocation in Wireless Personal Area Networks for Industrial IoT Applications
	1 Introduction
	2 Related Works
	3 Methodology of Dynamic Channel Allocation Algorithm
	4 Experimental Results and Discussion
	5 Conclusion
	References
Preterm Birth Classification Using KNN Machine Learning Algorithm
	1 Introduction
	2 Literature Overview
	3 Existing Methodology
	4 Proposed Methodology
	5 Results
	6 Conclusion
	References
IoT-Based Air Quality Monitoring System with Server Notification
	1 Introduction
	2 Related Work
	3 Proposed System
	4 System Architecture
	5 Results
	6 Conclusion
	References
Hand Gesture Recognition Using CNN
	1 Introduction
	2 Related Work
	3 Experimental Methodology
	4 Results
	5 Conclusion and Future Work
	References
Community-Based Question Answering Site Using MVC Architecture for Rapid Web Application Development
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Existing Approaches
		4.1 Yahoo Answers
		4.2 Blurt It
		4.3 Answers.Com
	5 Dataset
	6 Experimental Results
	7 Conclusion and Future Scope
	References
Automatic Alert and Triggering System to Detect Persons’ Fall Off the Wheelchair
	1 Introduction
	2 Existing Methods
	3 Proposed Method
	4 Objectives
	5 Methodology
	6 Results and Discussion
	7 Conclusion
	References
Dietary Assessment by Food Image Logging Based on Food Calorie Estimation Implemented Using Deep Learning
	1 Introduction
	2 Literature Review
	3 Proposed System
		3.1 System Architecture
		3.2 Data Collection
		3.3 Data Pre-processing
		3.4 Feature Extraction and Classification
		3.5 Calorie Extraction
	4 Results and Discussion
	5 Conclusion and Future Scope
	References
Neck Gesticulate Based Vehicle Direction Movement Control System to Assist Geriatrics
	1 Introduction
	2 Block Diagram of Prototype
	3 Hardware and Software Requirements
		3.1 Proteus Software
		3.2 Arduino Uno
		3.3 Power Supply
		3.4 Switches and DC Motor
		3.5 RF Module
		3.6 Motor Driver IC
	4 Results and Discussion
	5 Conclusions
	References
Improved Numerical Weather Prediction Using IoT and Machine Learning
	1 Introduction
	2 Existing Methods
	3 Proposed Method
	4 Implementation of Proposed System
	5 Methodology
	6 Results and Discussion
	7 Conclusion
	References
Inductive Coupling-Based Wireless Power Transmission System in Near Field to Control Low-Power Home Appliances
	1 Introduction
	2 Existing Systems
	3 Proposed System
	4 Results and Discussion
	5 Conclusion
	References
IoT-Based Safety and Security System for House Boats
	1 Introduction
	2 Literature Review
	3 Proposed System
	4 Hardware Requirements in the Development of the Product
	5 Results and Discussion
	6 Conclusion and Future Scope
	References
Video Surveillance-Based Underwater Object Detection and Location Tracking Using IoT
	1 Introduction
	2 Literature Survey
	3 Proposed System
	4 Results and Discussion
	5 Conclusion
	References
Pothole Detection and Warning System for Intelligent Vehicles
	1 Introduction
	2 Related Work
	3 Proposed Approach
	4 Simulation
	5 Results
	6 Conclusion and Future Scope
	References




نظرات کاربران