دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Shailesh Tiwari, Munesh C. Trivedi, Mohan L. Kolhe, Brajesh Kumar Singh سری: Lecture Notes in Networks and Systems, 522 ISBN (شابک) : 9811952914, 9789811952913 ناشر: Springer سال نشر: 2022 تعداد صفحات: 557 [558] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 18 Mb
در صورت تبدیل فایل کتاب Advances in Data and Information Sciences: Proceedings of ICDIS 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب پیشرفت در علوم داده و اطلاعات: مجموعه مقالات ICDIS 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعهای از مقالات تحقیقاتی با کیفیت بالا را گردآوری میکند که در چهارمین کنفرانس بینالمللی علوم داده و اطلاعات (ICDIS 2022)، که در پردیس فنی مهندسی Raja Balwant Singh، آگرا، هند، در 6 می برگزار شد، ارائه شده است - 7، 2022. این کتاب تمام جنبه های علوم محاسباتی و امنیت اطلاعات، از جمله موضوعات مرکزی مانند هوش مصنوعی، محاسبات ابری، و داده های بزرگ را پوشش می دهد. با برجسته کردن آخرین پیشرفتها و راهحلهای فنی، به خوانندگان صنعت رایانه نشان میدهد که چگونه از پیشرفتهای کلیدی در نسل بعدی رایانه و فناوری ارتباطات سرمایهگذاری کنند.
This book gathers a collection of high-quality peer-reviewed research papers presented at the 4th International Conference on Data and Information Sciences (ICDIS 2022), held at Raja Balwant Singh Engineering Technical Campus, Agra, India, on May 6 – 7, 2022. The book covers all aspects of computational sciences and information security, including central topics like artificial intelligence, cloud computing, and big data. Highlighting the latest developments and technical solutions, it will show readers from the computer industry how to capitalize on key advances in next-generation computer and communication technology.
ICDIS-2022 Organizing Committee Preface Contents Editors and Contributors A Review on Automatic Image Forgery Classification Using Advanced Deep Learning Techniques 1 Introduction 2 Related Work 3 Research Gaps 4 Features and Challenges of Image Forgery Techniques 4.1 Dataset-Based Comparison 5 Conclusion References Scientific Exploration of Music Recommendation System Using Facial Expressions 1 Introduction 2 Literature Survey 3 Analysis on Different Issues and Used Methodology 4 Result Comparison 5 Conclusion References Live Hotspots Visualization and Degradation Analysis of Solar Photovoltaic Panels Using QR Code and Thermal Image Processing 1 Introduction 2 Formation of Hotspots in Solar Photovoltaic Panel 3 Significance of QR Code in Live Visualization of Hotspots 4 Applications of Thermal Imaging in Hotspots Analysis Using Digital Image Processing 5 Experimental Work for Live Visualization of Hotspots Using QR Code and Degradation Analysis Using Thermal Image Processing 6 Conclusion References Fake News, Rumours and Misinformation: Characterization, Causes and Detection Techniques—A Survey 1 Introduction 2 Characterization of Fake News 2.1 Defining Fake News 2.2 Defining Rumours 2.3 Defining Misinformation 3 Why Do People Create Rumours? 4 Reasons for Spreading the Fake News and Rumours 5 Detection Techniques 6 Literature Review 7 Conclusion References Comparative Analysis of Ensemble Models for Software Effort Estimation 1 Introduction 2 Related Work 3 Research Methodology 3.1 Dataset Used 3.2 Base Learners 3.3 Evaluation Criteria 4 Result Analysis 5 Threat to Validity 6 Conclusion References Improving Security in Cloud Data Using Paillier Homomorphic Encryption System 1 Introduction 2 Related Work 2.1 Homomorphic Encryption (HE) 2.2 Paillier Algorithm 3 Proposed System 3.1 Steps Followed in Our Work 3.2 Randomistics Algorithm 3.3 Block Division for the Randomized Algorithm 4 Result and Discussion 5 Conclusion References Intelligent System for Detecting Email Spam Messages Using GRU 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Data Preprocessing 4 Gated Recurrent Unit 5 Performance and Result Analysis 6 Conclusion References A Critical Analysis of Requirement Management in Agile Development 1 Introduction 2 Requirement Management (RM) in Agile Methodologies 2.1 Requirement Prioritization (RP) in Agile 2.2 Uses of Agile Requirement Engineering (RE) 3 Comparative Analysis 3.1 Requirement Management (RM) Steps Pursued in Various Agile Software Methodology 3.2 Quality Requirement (QR) Management Practices Relying on Agile Environment 4 Requirement Management (RM) Challenges/Issues in Agile Technique 5 Conclusion 6 Discussion References Authenticate Medical Data Using SWT and PCA-Based Watermarking Technique 1 Introduction 1.1 Telemedicine Watermarking 2 Literature Survey 3 Methods 3.1 Stationary Wavelet Transform (SWT) 3.2 Singular Value Decomposition (SVD) 3.3 Lempel–Ziv-Welch (LZW) Compression 3.4 Principal Component Analysis (PCA) 4 Proposed Methodology 4.1 Watermark Embedding 4.2 Watermark Extraction 5 Experimental Results and Discussions 6 Conclusion 7 Sources of Images References Bounds on Learnability of Neural Networks 1 Introduction 1.1 Why Is It Important to Understand the Bounds on Neural Networks? 2 Expressive Power of Neural Networks 3 Probably Approximately Correct (PAC) Learning 4 Vapnik–Chervonenkis Dimension 5 Limitations of Various Theoretical Bounds 6 Conclusion References A Comprehensive Review of IoT-Based IDS Using Intelligence Technique 1 Introduction 2 Review of Intelligence Methods for IoT Intrusions 3 Security Issues and Challenges 4 Result and Discussion 5 Research Findings 6 Conclusion References Machine Learning Model to Forecast Concrete Compressive Strength 1 Introduction 2 Literature Review 3 Method of Study 3.1 Artificial Neural Network (ANN) 4 Proposed Work 4.1 Dataset 4.2 Modeling of ANN 5 Results and Discussions 6 Novelty of the Research 7 Conclusion References Fake News Detection on Twitter 1 Introduction 2 Motivation 3 Related Work 4 Proposed Approach 5 Modules Split-up 5.1 Data Collection Module 5.2 Text Transformation Module 5.3 Training and Testing Module 5.4 Prediction Module 6 About Dataset 7 Result 8 Conclusion and Future Work References BiCropRec: A Bi-Classifier Approach for Crop Recommendation Based on Inclusion of Semantic Intelligence and Topic Modelling 1 Introduction 2 Related Work 3 Proposed System Architecture 4 Implementation and Performance Evaluation 5 Conclusion References A Review on Detection of Diabetic Retinopathy 1 Introduction 2 Literature Survey 3 Comparative Study 4 Machine Learning Versus Deep Learning 5 Applications of Diabetic Retinopathy 6 Conclusion and Future Enhancements References Detection of COVID Using Deep Learning: A Review 1 Introduction 2 Related Works 3 Methodology/Suggested Theoretical Model 3.1 Convolutional Neural Networks (CNN) 3.2 What Are LSTM Networks and How Do They Work? 3.3 The Overall Model Suggested for COVID-19 Detection 4 Conclusion References Phase Segmenting Process in Ultra-High Carbon Steels Using Deep Vision Approach 1 Introduction 2 Literature Survey 3 Methodology 3.1 UHCS Microstructure Image Segmentation 3.2 Otsu Thresholding 3.3 Removing Edge Touching Grains and Dilation 3.4 Identifying Foreground and Background 3.5 Labeling Using Markers and Applying Watershed Technique 4 Results and Discussions 5 Conclusion References Deep Learning Architectures Applied on Arabic-Adapted Scripts: A Review 1 Introduction 2 Deep Learning Applied on Arabic Scripts 2.1 Convolutional Neural Networks (CNNs) 2.2 Connectionist Temporal Classification (CTC) with LSTM 2.3 Attention Mechanism and Reinforcement Learning with LSTM 2.4 Unsupervised Methods 3 Deep Learning Applied on Urdu 3.1 Convolutional Neural Networks with MDLSTM 3.2 BLSTM with MDLSTM 4 Deep Learning Applied on Pashto 4.1 MDLSTM with CTC 5 Conclusion References A Novel Encryption Technique for Security of IoT-Based Educational Portals 1 Introduction 1.1 IoT 1.2 Applications of IoT 1.3 Online Education System 1.4 Online Education Resources 1.5 Online Education Future 2 Literature Review 3 Problem Statement 3.1 Research Objectives 4 Proposed Work 4.1 Internal Working of Proposed Work 5 Result and Discussion 5.1 Simulation for Time/Error/Packet Size 5.2 MATLAB Simulation for Comparative Analysis of Security 6 Conclusion 7 Future Scope References Graph Database System for COVID-19 Vaccine Supply 1 Introduction 2 Literature Survey 3 System Methodology 4 Results and Discussion 5 Conclusion and Future Work References Machine Learning-Based Algorithms for Prediction of Chronic Kidney Disease: A Review 1 Introduction 2 Literature Review 3 Source 3.1 Proposed Model 3.2 Data Input 3.3 Data Pre-processing 3.4 Feature Selection 3.5 Classification 3.6 Cross-Validation 3.7 Performance Metric 3.8 Optimal Model 4 Conclusion References Implementing and Analysis of RNN LSTM Model for Stock Market Prediction 1 Introduction 2 Background 2.1 Stock Market Prediction (SMP) 2.2 SMP Techniques 2.3 Literature Review 3 Proposed and Implemented Model for SMP 4 Results 5 Conclusion References Real-Time Surveillance Video Analytics: A Survey on the Computing Infrastructures 1 Introduction 2 Automated Video Surveillance Systems Frameworks 2.1 Cloud Computing-Based Surveillance System 2.2 Fog Computing-Based Surveillance System 2.3 Edge Computing-Based Surveillance System 2.4 The Edge-Fog-Cloud-IoT Architecture 3 Security Requirements and Metrics in Surveillance 3.1 Video Path Uptime (VPU) 3.2 Video Retention Compliance (VRC) 4 Conclusion References Punjabi Indian Sign Language Dictionary Using Synthetic Animation 1 Introduction 2 Hamburg Notation System (HamNoSys) 3 Related Work 4 Results and Discussion 5 Conclusion References Cloud Service Anomaly Traffic Detection Using Random Forest 1 Introduction 2 Literature Review 3 Proposed System 3.1 Data Pre-processing 3.2 Clustering 3.3 Classification 4 Experimental Results 5 Conclusion References IoTGMRFM: Internet of Things-Based Variable-Wise Anomaly Detection 1 Introduction 2 System Design 2.1 Problem Definition 2.2 Gaussian Markov Random Field Mixtures 2.3 IoTGMRFM Algorithm 2.4 Data Generation 3 Results 4 Conclusion References MPTR: A Metadata-Driven Prospective Tag Recommendation Model Based on Integrative Classification 1 Introduction 2 Related Works 3 Proposed Architecture 4 Implementation and Performance Evaluation 5 Conclusion References A Review of Content-Based Image Retrieval Based on Hybrid Feature Extraction Techniques 1 Introduction 2 Related Works 3 Research Gaps 3.1 The Difficulty of Retrieving the Best Possible Results for Complicated Queries 3.2 Problems in Finding Information Quickly at a Very Broad Scale 3.3 The Challenges of Interpretable Results 4 Features and Challenges of State-of-the-Art Content-Based Image Retrieval Methods 5 Dataset-Based Comparison 6 Conclusion References A Survey on Kubernetes Policy Report Custom Resource Definition Kube-Bench Adapter 1 Introduction 2 Background 2.1 Kubernetes Policy WG 2.2 Policy Report CRD 2.3 Kube-Bench 3 Literature Survey 3.1 Cloud Native 3.2 Containerization 3.3 Microservices, Containers, and Their Management via Kubernetes 3.4 Policy Custom Resource Definition and Its Adaptor 4 Discussion 5 Conclusion References Fake News Detection Using Machine Learning 1 Introduction 2 Independent and Dependent Variables 3 Related Work 4 Research Methodology 5 Result and Discussion 6 Result and Discussion References Reliable Incorporation of Robust Fractional-Order Nonlinear PID Controller into Integrated Power System Using Gray Wolf Optimization Method 1 Introduction and Literature Surveys 2 Plant Mathematical Modeling 3 Proposed Controller Design and Tuning Using GWO 4 Simulation Results and Analysis for Trajectory Tracking Performance 5 Conclusion References Novel Exotic Projected Quantum Kernel Features-Enabled Neural Network for Handwritten Digit Image Classification 1 Introduction 2 Literature Review 3 Our Contributions 4 Implementation Setup and Results 5 Conclusion References Deep Learning Applications to Detect Alzheimer’s—A Review 1 Introduction 2 Data and Preprocessing Techniques 2.1 Open Source Datasets 2.2 Preprocessing 3 Related Work 4 Discussions References Oversampled Deep Fully Connected Neural Network Towards Improving Classifier Performance for Fraud Detection 1 Introduction 2 Literature Review 3 Our Contributions 4 Implementation Setup 5 Conclusion References Applying the Stimulus Organism Response Framework to Explain Student’s Academic Self-concept in Online Learning During the COVID-19 Pandemic 1 Introduction 2 Related Work, Hypotheses, and Research Model 2.1 Stimulus Organism Response (SOR) Framework 2.2 Academic Self-concept (ASC) 2.3 The Dimensions of Student Engagement and ASC 2.4 Online Learning Quality (System Quality) and Student Engagement 3 Methodology and Data Collection 4 Data Analysis and Results 5 Discussion and Implications of the Result 6 Conclusion and Future Work References A Deep Learning Model for Detecting Suicide Threat Posts in Social Platforms 1 Introduction 2 Literature Review 3 Methods 3.1 Dataset 3.2 Data Annotation 3.3 Proposed Model 3.4 Model Usage 3.5 Reddit API 4 Results 5 Discussion 6 Conclusion 7 Source of Data References Conducting Analysis on Diabetes Patient Data Using Various Machine Learning Models and Determine Their Accuracy 1 Introduction 2 Literature Review 3 Methodology 3.1 Hospital Management System 3.2 Machine Learning Model Selection 4 Results and Discussion 5 Conclusion References Multi-class Classification of COVID-19 in Chest X-Ray Using Deep Convolutional Neural Networks 1 Introduction 2 Related Work 3 Data Set Description 4 Methodology 4.1 Preprocessing 4.2 Deep Learning Models 4.3 Metrics for Comparison 5 Results Discussion 6 Conclusion and Future Scope 7 Sources of the Figures References Empirical Evaluation of Deep Learning Models with Local Binary Pattern for COVID-19 Detection 1 Introduction 2 Related Work 3 Data Set Description 4 Methodology 4.1 Steps in Proposed System 5 Results Discussions 5.1 Comparative Analysis 6 Conclusion and Future Scope References 5G-Enabled Smart Devices and Multi-access Edge Computing for Improving the Healthcare System 1 Introduction 2 Related Work 3 IoT and Its Uses in Healthcare 4 Healthcare Monitoring System 4.1 Edge Computing 4.2 IoMT-Edge 4.3 Smart Wearable Devices 4.4 Edge Central Controller 5 5G-Enabled Edge Computing for IoMT 6 Discussion and Future Work 7 Conclusion References Support System for Chronic Kidney Disease Prediction Using Fuzzy Logic and Feature Selection 1 Introduction 2 Related Work 3 Proposed Methodology 4 Data Preprocessing 4.1 CKD Dataset 5 Feature Selection 5.1 Filter FS 5.2 Wrapper FS 5.3 Embedded FS 5.4 Algorithm 5.5 Fuzzy Rules 6 Classification Performance 6.1 Precision and Recall 6.2 F-Measure 7 Experimental Setup and Procedure 8 Results and Discussion 9 Conclusion References Katkada: E-Application for Business 1 Introduction 2 Literature Works 3 Proposed System 4 Methodologies 5 Input and Output Model 6 Selenium Testing Tool 7 Types of Testing 8 Extent Reports 9 Conclusion References An Effective and Secured Routing Protocol Based on Cluster Head in WSN 1 Introduction 2 Proposed Methodology 2.1 Cluster Formation 2.2 Cluster Head Selection Using Enhanced Grey Wolf Optimizer 2.3 Attack Detection Using Secret Key Comparison 2.4 Optimized Route Discovery 3 Result and Discussion 4 Conclusion and Future Work References Forming Industrial Clusters in Hanoi in the Context of Industry 4.0 and Technological Issues 1 Introduction 2 Literature Review 3 Methodology 4 Main Findings 4.1 Overview of Hanoi Industrial Clusters 4.2 Technological Issues During Industrial Clusters Development 5 Discussion and Conclusion References Message Queuing Telemetry Transport (MQTT) Protocol-Based Monitoring and Segregation of Wastes in Smart Cities Using IOT 1 Introduction 2 Segregation Part 2.1 Arduino UNO 2.2 Arduino IDE 2.3 Moisture Sensor 2.4 DC Motor 2.5 Servo Motor 3 Tracking Segment 3.1 NodeMCU 3.2 Ultrasonic Sensor 3.3 MQTT 4 Conclusion References Computerized Mechanism to Automate the Detection of Brain Tumor by Analyzing CT Scan 1 Introduction 2 Literature Survey 3 Materials and Method 4 Results and Observations 5 Conclusion References Design of Neural Network Algorithm Controller Using Simulink for Actuator of Dynamic Robot Systems 1 Introduction 2 Literature Review 2.1 Neural Network Working Strategy 3 Proposed System 3.1 Neural Network Predictive Controller in Simulink Design 3.2 Neural Network Plant Model 3.3 Predictive Control 3.4 Methodology 3.5 Actuator 3.6 Designing a Neural Network Model Controller 4 Result Analysis 5 Conclusion and Future Scope References Digital and Technological Solutions for Vietnam Tourism Services Development 1 Introduction 2 Literature Review 3 Methodology 4 Main Findings 4.1 IT Application in Tourism Management and Discussion 4.2 Other Technology Applications in Tourism the Country 5 Discussion and Conclusion 6 Limitation of Research References Effects of IT Software and Internet Data on Net Accounting Profit—A Case of Coteccons in Vietnam 1 Introduction 2 Literature Review 3 Methodology and Data 4 Main Results 4.1 Process of Using IT Software Eview for Regression 5 Discussion and Conclusion References An Efficient Recommendation Generation Using Extended Jaccard Similarity 1 Introduction 2 Related Work 2.1 Expectation–Maximization Algorithm 2.2 Performance of the Proposed Model 3 Experimentation and Results 3.1 Data set 4 Conclusion References Effective Security Algorithms for Big Data Clouds 1 Introduction 2 Related Work 3 Proposed Work 4 Merits of Proposed Cryptographic Algorithms 4.1 An Analysis of Encryption and Decryption Times 5 Conclusion and Future Work References Recent Trends for Practicing Steganography Using Audio as Carrier: A Study 1 Introduction 2 Related Work 3 Evaluation Parameters 4 Comparative Analysis 5 Conclusion References DNA Sequence in Cryptography: A Study 1 Introduction 2 Related Work 3 Comparative Analysis 4 Conclusion References Author Index