ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Advances in Data and Information Sciences: Proceedings of ICDIS 2022

دانلود کتاب پیشرفت در علوم داده و اطلاعات: مجموعه مقالات ICDIS 2022

Advances in Data and Information Sciences: Proceedings of ICDIS 2022

مشخصات کتاب

Advances in Data and Information Sciences: Proceedings of ICDIS 2022

ویرایش:  
نویسندگان: , , ,   
سری: Lecture Notes in Networks and Systems, 522 
ISBN (شابک) : 9811952914, 9789811952913 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 557
[558] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 18 Mb 

قیمت کتاب (تومان) : 35,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Advances in Data and Information Sciences: Proceedings of ICDIS 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پیشرفت در علوم داده و اطلاعات: مجموعه مقالات ICDIS 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب پیشرفت در علوم داده و اطلاعات: مجموعه مقالات ICDIS 2022

این کتاب مجموعه‌ای از مقالات تحقیقاتی با کیفیت بالا را گردآوری می‌کند که در چهارمین کنفرانس بین‌المللی علوم داده و اطلاعات (ICDIS 2022)، که در پردیس فنی مهندسی Raja Balwant Singh، آگرا، هند، در 6 می برگزار شد، ارائه شده است - 7، 2022. این کتاب تمام جنبه های علوم محاسباتی و امنیت اطلاعات، از جمله موضوعات مرکزی مانند هوش مصنوعی، محاسبات ابری، و داده های بزرگ را پوشش می دهد. با برجسته کردن آخرین پیشرفت‌ها و راه‌حل‌های فنی، به خوانندگان صنعت رایانه نشان می‌دهد که چگونه از پیشرفت‌های کلیدی در نسل بعدی رایانه و فناوری ارتباطات سرمایه‌گذاری کنند.


توضیحاتی درمورد کتاب به خارجی

This book gathers a collection of high-quality peer-reviewed research papers presented at the 4th International Conference on Data and Information Sciences (ICDIS 2022), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 6 – 7, 2022. The book covers all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.



فهرست مطالب

ICDIS-2022 Organizing Committee
Preface
Contents
Editors and Contributors
A Review on Automatic Image Forgery Classification Using Advanced Deep Learning Techniques
	1 Introduction
	2 Related Work
	3 Research Gaps
	4 Features and Challenges of Image Forgery Techniques
		4.1 Dataset-Based Comparison
	5 Conclusion
	References
Scientific Exploration of Music Recommendation System Using Facial Expressions
	1 Introduction
	2 Literature Survey
	3 Analysis on Different Issues and Used Methodology
	4 Result Comparison
	5 Conclusion
	References
Live Hotspots Visualization and Degradation Analysis of Solar Photovoltaic Panels Using QR Code and Thermal Image Processing
	1 Introduction
	2 Formation of Hotspots in Solar Photovoltaic Panel
	3 Significance of QR Code in Live Visualization of Hotspots
	4 Applications of Thermal Imaging in Hotspots Analysis Using Digital Image Processing
	5 Experimental Work for Live Visualization of Hotspots Using QR Code and Degradation Analysis Using Thermal Image Processing
	6 Conclusion
	References
Fake News, Rumours and Misinformation: Characterization, Causes and Detection Techniques—A Survey
	1 Introduction
	2 Characterization of Fake News
		2.1 Defining Fake News
		2.2 Defining Rumours
		2.3 Defining Misinformation
	3 Why Do People Create Rumours?
	4 Reasons for Spreading the Fake News and Rumours
	5 Detection Techniques
	6 Literature Review
	7 Conclusion
	References
Comparative Analysis of Ensemble Models for Software Effort Estimation
	1 Introduction
	2 Related Work
	3 Research Methodology
		3.1 Dataset Used
		3.2 Base Learners
		3.3 Evaluation Criteria
	4 Result Analysis
	5 Threat to Validity
	6 Conclusion
	References
Improving Security in Cloud Data Using Paillier Homomorphic Encryption System
	1 Introduction
	2 Related Work
		2.1 Homomorphic Encryption (HE)
		2.2 Paillier Algorithm
	3 Proposed System
		3.1 Steps Followed in Our Work
		3.2 Randomistics Algorithm
		3.3 Block Division for the Randomized Algorithm
	4 Result and Discussion
	5 Conclusion
	References
Intelligent System for Detecting Email Spam Messages Using GRU
	1 Introduction
	2 Literature Survey
	3 Proposed System
		3.1 Data Preprocessing
	4 Gated Recurrent Unit
	5 Performance and Result Analysis
	6 Conclusion
	References
A Critical Analysis of Requirement Management in Agile Development
	1 Introduction
	2 Requirement Management (RM) in Agile Methodologies
		2.1 Requirement Prioritization (RP) in Agile
		2.2 Uses of Agile Requirement Engineering (RE)
	3 Comparative Analysis
		3.1 Requirement Management (RM) Steps Pursued in Various Agile Software Methodology
		3.2 Quality Requirement (QR) Management Practices Relying on Agile Environment
	4 Requirement Management (RM) Challenges/Issues in Agile Technique
	5 Conclusion
	6 Discussion
	References
Authenticate Medical Data Using SWT and PCA-Based Watermarking Technique
	1 Introduction
		1.1 Telemedicine Watermarking
	2 Literature Survey
	3 Methods
		3.1 Stationary Wavelet Transform (SWT)
		3.2 Singular Value Decomposition (SVD)
		3.3 Lempel–Ziv-Welch (LZW) Compression
		3.4 Principal Component Analysis (PCA)
	4 Proposed Methodology
		4.1 Watermark Embedding
		4.2 Watermark Extraction
	5 Experimental Results and Discussions
	6 Conclusion
	7 Sources of Images
	References
Bounds on Learnability of Neural Networks
	1 Introduction
		1.1 Why Is It Important to Understand the Bounds on Neural Networks?
	2 Expressive Power of Neural Networks
	3 Probably Approximately Correct (PAC) Learning
	4 Vapnik–Chervonenkis Dimension
	5 Limitations of Various Theoretical Bounds
	6 Conclusion
	References
A Comprehensive Review of IoT-Based IDS Using Intelligence Technique
	1 Introduction
	2 Review of Intelligence Methods for IoT Intrusions
	3 Security Issues and Challenges
	4 Result and Discussion
	5 Research Findings
	6 Conclusion
	References
Machine Learning Model to Forecast Concrete Compressive Strength
	1 Introduction
	2 Literature Review
	3 Method of Study
		3.1 Artificial Neural Network (ANN)
	4 Proposed Work
		4.1 Dataset
		4.2 Modeling of ANN
	5 Results and Discussions
	6 Novelty of the Research
	7 Conclusion
	References
Fake News Detection on Twitter
	1 Introduction
	2 Motivation
	3 Related Work
	4 Proposed Approach
	5 Modules Split-up
		5.1 Data Collection Module
		5.2 Text Transformation Module
		5.3 Training and Testing Module
		5.4 Prediction Module
	6 About Dataset
	7 Result
	8 Conclusion and Future Work
	References
BiCropRec: A Bi-Classifier Approach for Crop Recommendation Based on Inclusion of Semantic Intelligence and Topic Modelling
	1 Introduction
	2 Related Work
	3 Proposed System Architecture
	4 Implementation and Performance Evaluation
	5 Conclusion
	References
A Review on Detection of Diabetic Retinopathy
	1 Introduction
	2 Literature Survey
	3 Comparative Study
	4 Machine Learning Versus Deep Learning
	5 Applications of Diabetic Retinopathy
	6 Conclusion and Future Enhancements
	References
Detection of COVID Using Deep Learning: A Review
	1 Introduction
	2 Related Works
	3 Methodology/Suggested Theoretical Model
		3.1 Convolutional Neural Networks (CNN)
		3.2 What Are LSTM Networks and How Do They Work?
		3.3 The Overall Model Suggested for COVID-19 Detection
	4 Conclusion
	References
Phase Segmenting Process in Ultra-High Carbon Steels Using Deep Vision Approach
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 UHCS Microstructure Image Segmentation
		3.2 Otsu Thresholding
		3.3 Removing Edge Touching Grains and Dilation
		3.4 Identifying Foreground and Background
		3.5 Labeling Using Markers and Applying Watershed Technique
	4 Results and Discussions
	5 Conclusion
	References
Deep Learning Architectures Applied on Arabic-Adapted Scripts: A Review
	1 Introduction
	2 Deep Learning Applied on Arabic Scripts
		2.1 Convolutional Neural Networks (CNNs)
		2.2 Connectionist Temporal Classification (CTC) with LSTM
		2.3 Attention Mechanism and Reinforcement Learning with LSTM
		2.4 Unsupervised Methods
	3 Deep Learning Applied on Urdu
		3.1 Convolutional Neural Networks with MDLSTM
		3.2 BLSTM with MDLSTM
	4 Deep Learning Applied on Pashto
		4.1 MDLSTM with CTC
	5 Conclusion
	References
A Novel Encryption Technique for Security of IoT-Based Educational Portals
	1 Introduction
		1.1 IoT
		1.2 Applications of IoT
		1.3 Online Education System
		1.4 Online Education Resources
		1.5 Online Education Future
	2 Literature Review
	3 Problem Statement
		3.1 Research Objectives
	4 Proposed Work
		4.1 Internal Working of Proposed Work
	5 Result and Discussion
		5.1 Simulation for Time/Error/Packet Size
		5.2 MATLAB Simulation for Comparative Analysis of Security
	6 Conclusion
	7 Future Scope
	References
Graph Database System for COVID-19 Vaccine Supply
	1 Introduction
	2 Literature Survey
	3 System Methodology
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Machine Learning-Based Algorithms for Prediction of Chronic Kidney Disease: A Review
	1 Introduction
	2 Literature Review
	3 Source
		3.1 Proposed Model
		3.2 Data Input
		3.3 Data Pre-processing
		3.4 Feature Selection
		3.5 Classification
		3.6 Cross-Validation
		3.7 Performance Metric
		3.8 Optimal Model
	4 Conclusion
	References
Implementing and Analysis of RNN LSTM Model for Stock Market Prediction
	1 Introduction
	2 Background
		2.1 Stock Market Prediction (SMP)
		2.2 SMP Techniques
		2.3 Literature Review
	3 Proposed and Implemented Model for SMP
	4 Results
	5 Conclusion
	References
Real-Time Surveillance Video Analytics: A Survey on the Computing Infrastructures
	1 Introduction
	2 Automated Video Surveillance Systems Frameworks
		2.1 Cloud Computing-Based Surveillance System
		2.2 Fog Computing-Based Surveillance System
		2.3 Edge Computing-Based Surveillance System
		2.4 The Edge-Fog-Cloud-IoT Architecture
	3 Security Requirements and Metrics in Surveillance
		3.1 Video Path Uptime (VPU)
		3.2 Video Retention Compliance (VRC)
	4 Conclusion
	References
Punjabi Indian Sign Language Dictionary Using Synthetic Animation
	1 Introduction
	2 Hamburg Notation System (HamNoSys)
	3 Related Work
	4 Results and Discussion
	5 Conclusion
	References
Cloud Service Anomaly Traffic Detection Using Random Forest
	1 Introduction
	2 Literature Review
	3 Proposed System
		3.1 Data Pre-processing
		3.2 Clustering
		3.3 Classification
	4 Experimental Results
	5 Conclusion
	References
IoTGMRFM: Internet of Things-Based Variable-Wise Anomaly Detection
	1 Introduction
	2 System Design
		2.1 Problem Definition
		2.2 Gaussian Markov Random Field Mixtures
		2.3 IoTGMRFM Algorithm
		2.4 Data Generation
	3 Results
	4 Conclusion
	References
MPTR: A Metadata-Driven Prospective Tag Recommendation Model Based on Integrative Classification
	1 Introduction
	2 Related Works
	3 Proposed Architecture
	4 Implementation and Performance Evaluation
	5 Conclusion
	References
A Review of Content-Based Image Retrieval Based on Hybrid Feature Extraction Techniques
	1 Introduction
	2 Related Works
	3 Research Gaps
		3.1 The Difficulty of Retrieving the Best Possible Results for Complicated Queries
		3.2 Problems in Finding Information Quickly at a Very Broad Scale
		3.3 The Challenges of Interpretable Results
	4 Features and Challenges of State-of-the-Art Content-Based Image Retrieval Methods
	5 Dataset-Based Comparison
	6 Conclusion
	References
A Survey on Kubernetes Policy Report Custom Resource Definition Kube-Bench Adapter
	1 Introduction
	2 Background
		2.1 Kubernetes Policy WG
		2.2 Policy Report CRD
		2.3 Kube-Bench
	3 Literature Survey
		3.1 Cloud Native
		3.2 Containerization
		3.3 Microservices, Containers, and Their Management via Kubernetes
		3.4 Policy Custom Resource Definition and Its Adaptor
	4 Discussion
	5 Conclusion
	References
Fake News Detection Using Machine Learning
	1 Introduction
	2 Independent and Dependent Variables
	3 Related Work
	4 Research Methodology
	5 Result and Discussion
	6 Result and Discussion
	References
Reliable Incorporation of Robust Fractional-Order Nonlinear PID Controller into Integrated Power System Using Gray Wolf Optimization Method
	1 Introduction and Literature Surveys
	2 Plant Mathematical Modeling
	3 Proposed Controller Design and Tuning Using GWO
	4 Simulation Results and Analysis for Trajectory Tracking Performance
	5 Conclusion
	References
Novel Exotic Projected Quantum Kernel Features-Enabled Neural Network for Handwritten Digit Image Classification
	1 Introduction
	2 Literature Review
	3 Our Contributions
	4 Implementation Setup and Results
	5 Conclusion
	References
Deep Learning Applications to Detect Alzheimer’s—A Review
	1 Introduction
	2 Data and Preprocessing Techniques
		2.1 Open Source Datasets
		2.2 Preprocessing
	3 Related Work
	4 Discussions
	References
Oversampled Deep Fully Connected Neural Network Towards Improving Classifier Performance for Fraud Detection
	1 Introduction
	2 Literature Review
	3 Our Contributions
	4 Implementation Setup
	5 Conclusion
	References
Applying the Stimulus Organism Response Framework to Explain Student’s Academic Self-concept in Online Learning During the COVID-19 Pandemic
	1 Introduction
	2 Related Work, Hypotheses, and Research Model
		2.1 Stimulus Organism Response (SOR) Framework
		2.2 Academic Self-concept (ASC)
		2.3 The Dimensions of Student Engagement and ASC
		2.4 Online Learning Quality (System Quality) and Student Engagement
	3 Methodology and Data Collection
	4 Data Analysis and Results
	5 Discussion and Implications of the Result
	6 Conclusion and Future Work
	References
A Deep Learning Model for Detecting Suicide Threat Posts in Social Platforms
	1 Introduction
	2 Literature Review
	3 Methods
		3.1 Dataset
		3.2 Data Annotation
		3.3 Proposed Model
		3.4 Model Usage
		3.5 Reddit API
	4 Results
	5 Discussion
	6 Conclusion
	7 Source of Data
	References
Conducting Analysis on Diabetes Patient Data Using Various Machine Learning Models and Determine Their Accuracy
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Hospital Management System
		3.2 Machine Learning Model Selection
	4 Results and Discussion
	5 Conclusion
	References
Multi-class Classification of COVID-19 in Chest X-Ray Using Deep Convolutional Neural Networks
	1 Introduction
	2 Related Work
	3 Data Set Description
	4 Methodology
		4.1 Preprocessing
		4.2 Deep Learning Models
		4.3 Metrics for Comparison
	5 Results Discussion
	6 Conclusion and Future Scope
	7 Sources of the Figures
	References
Empirical Evaluation of Deep Learning Models with Local Binary Pattern for COVID-19 Detection
	1 Introduction
	2 Related Work
	3 Data Set Description
	4 Methodology
		4.1 Steps in Proposed System
	5 Results Discussions
		5.1 Comparative Analysis
	6 Conclusion and Future Scope
	References
5G-Enabled Smart Devices and Multi-access Edge Computing for Improving the Healthcare System
	1 Introduction
	2 Related Work
	3 IoT and Its Uses in Healthcare
	4 Healthcare Monitoring System
		4.1 Edge Computing
		4.2 IoMT-Edge
		4.3 Smart Wearable Devices
		4.4 Edge Central Controller
	5 5G-Enabled Edge Computing for IoMT
	6 Discussion and Future Work
	7 Conclusion
	References
Support System for Chronic Kidney Disease Prediction Using Fuzzy Logic and Feature Selection
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Data Preprocessing
		4.1 CKD Dataset
	5 Feature Selection
		5.1 Filter FS
		5.2 Wrapper FS
		5.3 Embedded FS
		5.4 Algorithm
		5.5 Fuzzy Rules
	6 Classification Performance
		6.1 Precision and Recall
		6.2 F-Measure
	7 Experimental Setup and Procedure
	8 Results and Discussion
	9 Conclusion
	References
Katkada: E-Application for Business
	1 Introduction
	2 Literature Works
	3 Proposed System
	4 Methodologies
	5 Input and Output Model
	6 Selenium Testing Tool
	7 Types of Testing
	8 Extent Reports
	9 Conclusion
	References
An Effective and Secured Routing Protocol Based on Cluster Head in WSN
	1 Introduction
	2 Proposed Methodology
		2.1 Cluster Formation
		2.2 Cluster Head Selection Using Enhanced Grey Wolf Optimizer
		2.3 Attack Detection Using Secret Key Comparison
		2.4 Optimized Route Discovery
	3 Result and Discussion
	4 Conclusion and Future Work
	References
Forming Industrial Clusters in Hanoi in the Context of Industry 4.0 and Technological Issues
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Main Findings
		4.1 Overview of Hanoi Industrial Clusters
		4.2 Technological Issues During Industrial Clusters Development
	5 Discussion and Conclusion
	References
Message Queuing Telemetry Transport (MQTT) Protocol-Based Monitoring and Segregation of Wastes in Smart Cities Using IOT
	1 Introduction
	2 Segregation Part
		2.1 Arduino UNO
		2.2 Arduino IDE
		2.3 Moisture Sensor
		2.4 DC Motor
		2.5 Servo Motor
	3 Tracking Segment
		3.1 NodeMCU
		3.2 Ultrasonic Sensor
		3.3 MQTT
	4 Conclusion
	References
Computerized Mechanism to Automate the Detection of Brain Tumor by Analyzing CT Scan
	1 Introduction
	2 Literature Survey
	3 Materials and Method
	4 Results and Observations
	5 Conclusion
	References
Design of Neural Network Algorithm Controller Using Simulink for Actuator of Dynamic Robot Systems
	1 Introduction
	2 Literature Review
		2.1 Neural Network Working Strategy
	3 Proposed System
		3.1 Neural Network Predictive Controller in Simulink Design
		3.2 Neural Network Plant Model
		3.3 Predictive Control
		3.4 Methodology
		3.5 Actuator
		3.6 Designing a Neural Network Model Controller
	4 Result Analysis
	5 Conclusion and Future Scope
	References
Digital and Technological Solutions for Vietnam Tourism Services Development
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Main Findings
		4.1 IT Application in Tourism Management and Discussion
		4.2 Other Technology Applications in Tourism the Country
	5 Discussion and Conclusion
	6 Limitation of Research
	References
Effects of IT Software and Internet Data on Net Accounting Profit—A Case of Coteccons in Vietnam
	1 Introduction
	2 Literature Review
	3 Methodology and Data
	4 Main Results
		4.1 Process of Using IT Software Eview for Regression
	5 Discussion and Conclusion
	References
An Efficient Recommendation Generation Using Extended Jaccard Similarity
	1 Introduction
	2 Related Work
		2.1 Expectation–Maximization Algorithm
		2.2 Performance of the Proposed Model
	3 Experimentation and Results
		3.1 Data set
	4 Conclusion
	References
Effective Security Algorithms for Big Data Clouds
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Merits of Proposed Cryptographic Algorithms
		4.1 An Analysis of Encryption and Decryption Times
	5 Conclusion and Future Work
	References
Recent Trends for Practicing Steganography Using Audio as Carrier: A Study
	1 Introduction
	2 Related Work
	3 Evaluation Parameters
	4 Comparative Analysis
	5 Conclusion
	References
DNA Sequence in Cryptography: A Study
	1 Introduction
	2 Related Work
	3 Comparative Analysis
	4 Conclusion
	References
Author Index




نظرات کاربران