دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Suresh Chandra Satapathy, Jerry Chun-Wei Lin, Lai Khin Wee, Vikrant Bhateja, T. M. Rajesh سری: Lecture Notes in Networks and Systems, 459 ISBN (شابک) : 9811919755, 9789811919756 ناشر: Springer سال نشر: 2022 تعداد صفحات: 438 [439] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 16 Mb
در صورت تبدیل فایل کتاب Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ارتباطات کامپیوتری، شبکه و اینترنت اشیا: مجموعه مقالات پنجمین ICICC 2021، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب دارای مجموعه ای از مقالات با کیفیت بالا و بررسی شده است که در پنجمین کنفرانس بین المللی محاسبات و ارتباطات هوشمند (ICICC 2021) که توسط دپارتمان علوم و مهندسی کامپیوتر و دپارتمان علوم و فناوری کامپیوتر، دایاناندا سازماندهی شده است، ارائه شده است. دانشگاه ساگار، بنگالورو، هند، در تاریخ 26 تا 27 نوامبر 2021. این کتاب در دو جلد سازماندهی شده است و تحقیقات پیشرفته و چند رشته ای در مورد طراحی محاسبات هوشمند و انفورماتیک را مورد بحث قرار می دهد. این بر پارادایم های نوآوری در دانش سیستم، هوشمندی و پایداری تمرکز دارد که می تواند برای ارائه راه حل های عملی برای تعدادی از مشکلات در جامعه، محیط زیست و صنعت به کار رود. علاوه بر این، این کتاب همچنین به استقرار رویکردهای محاسباتی و انتقال دانش نوظهور، بهینه سازی راه حل ها در رشته های مختلف علم، فناوری و مراقبت های بهداشتی می پردازد.
This book features a collection of high-quality, peer-reviewed papers presented at the Fifth International Conference on Intelligent Computing and Communication (ICICC 2021) organized by the Department of Computer Science and Engineering and Department of Computer Science and Technology, Dayananda Sagar University, Bengaluru, India, on November 26 – 27, 2021. The book is organized in two volumes and discusses advanced and multi-disciplinary research regarding the design of smart computing and informatics. It focuses on innovation paradigms in system knowledge, intelligence, and sustainability that can be applied to provide practical solutions to a number of problems in society, the environment and industry. Further, the book also addresses the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology, and healthcare.
Conference Organization Committee Preface Contents Editors and Contributors Cloud-Based E-learning: Scaffolding the Environment for Adaptive E-learning Ecosystem Based on Cloud Computing Infrastructure 1 Introduction 2 Overview of Cloud Computing 3 The Implications of Cloud Computing for E-learning 4 Methodological Provisions for Rendering Cloud-Based E-learning 5 Vantages of Cloud Computing Adoption for E-learning Solutions 6 Comparing Different Authoring Tools Based on Cloud Computing 6.1 Easy Generator 6.2 Lectora Online 6.3 eCoach 6.4 Ruzuku 6.5 iSpring Learn LMS 7 Concluding Remarks References Web Crawling-Based Search Engine for Programming Languages 1 Introduction 2 Web Crawling 3 Literature Review 4 Methodology 4.1 Database 4.2 Crawling, Indexing and Page Ranking 4.3 Search Engine 5 Results 6 Conclusion References Smart Helmet for Coal Mine Monitoring 1 Introduction 2 System Architecture 2.1 Block Diagram 2.2 Components 3 Proposed Methodology 4 Experimental Result and Analysis 4.1 Temperature and Air Quality Test 4.2 Fall Detection Test 5 Conclusion and Future Scope References K-Weighted Cluster Head Selection in Wireless Sensor Networks 1 Introduction 2 Related Work 2.1 Overall Inference and Motivation 3 Proposed K-weighted Cluster Head Selection (K-WCH) Algorithm 4 Simulation and Performance Analysis 4.1 Reaching 10% of Dead Nodes 4.2 Energy Efficiency 5 Conclusion References Implementation and Performance Analysis of PEGASIS and MIEEPB Protocols in Wireless Sensor Networks 1 Introduction 2 Previous Works 3 Objective 4 Chain-Based Protocols 4.1 Power Efficient Gathering in Sensor Information Systems (PEGASIS) Protocol 4.2 Mobile Sink Improved Energy-Efficient PEGASIS-Based Routing Protocol (MIEEPB) 5 Conclusion References A Queue Management System for Cloud Data Processing 1 Introduction 2 Related Work 3 Proposed Work 4 Results and Discussion 5 Conclusion 6 Future Scope References Sensor Integration and Information Sharing for Automated Electric Vehicles for Better Estimation of the Surroundings 1 Introduction 2 Background 3 Methodology 4 Implementation and Results 5 Conclusion References Cloud-Computed Solar Tracking System 1 Introduction 2 Monitoring System 2.1 Hardware System 2.2 Data Gathering System 2.3 Data Collecting Process 2.4 Cloud System 3 Experimental Analysis 3.1 Data Gathering System Interface 3.2 Cloud System 3.3 Analysis of Experimental Data for Fault Diagnosis 4 Conclusion References Patient Identifier Using Biometric Authentication 1 Introduction 2 Literature Survey 3 The Proposed Work 4 Experimental Results 5 Conclusion and Future Work References Recognition of Hand Gesture-Based Sign Language Using Transfer Learning 1 Introduction 1.1 Sensor-Based 1.2 Image-Based 2 Literature Review 3 Materials and Methods 3.1 Dataset 3.2 Methodology 4 Experimental Results 5 Conclusion References Robustness Indices of 3R and 4R Planar Serial Manipulators with Fixed Actuation Scheme 1 Introduction 2 Mathematical Modeling and Jacobian Matrix of Planar 3R Serial Manipulator 3 Performance Indices of the 3R Planar Serial Manipulator 4 Results 3R Serial Manipulator 5 Planar 4R Serial Manipulator 6 Results of 4R Manipulator 7 Conclusions References Deterioration of Daily Life in COVID-19 1 Introduction 2 Literature Survey 3 Data Collection and Preprocessing 4 Result and Discussion 5 Conclusions and Future Scope References A Design Model of Copyright Protection System Based on Distributed Ledger Technology 1 Introduction 2 Literature Survey 3 Proposed Model 3.1 System Security Requirements 3.2 Solution Model Architecture 3.3 Smart Contract Design 4 System Implementation 5 Conclusions References Secure Electronic Voting (E-voting) System Based on Blockchain on Various Platforms 1 Introduction 2 Background and Literature Review 2.1 Blockchain Architecture’s Basic Elements 2.2 Blockchain Architecture’s Crucial Characteristics 2.3 Review of Related Literature 3 Deployment of the System 4 Voting Protocol 4.1 Voting Process Entities 4.2 Registration of Voters 5 Conclusions References Dynamic Authentication Using Visual Cryptography 1 Introduction 2 Current Trends in One-Time Passwords 2.1 SMS-Based OTP 2.2 Proprietary Tokens 2.3 Grid Cards 2.4 Software Tokens 3 Proposed Methodology 3.1 Proposed System Merits 3.2 Proposed System Demerits 4 Experiment Results 5 Conclusion and Future Works 5.1 Conclusion 5.2 Future Work References Browser Extension for Digital Signature 1 Introduction 1.1 Importance of Digital Signature 1.2 Importance of Certificate-Based Digital Signature 2 Digital Signature Based on Digital Certificate 2.1 Creating a pfx Certificate 3 Proposed System 3.1 Methodology of Proposed System 4 Browser Extension 4.1 Integration of an Extension with Digital Signature Functionality 5 Conclusion and Future Work References Design and Implementation of Cyber Threat Intelligence Data Mining Model 1 Introduction 2 Literature Survey 3 Analysis for Data Mining Model 3.1 Data Collection 3.2 API Implementation 3.3 Integration with Snort 3.4 Blacklist 3.5 Algorithm 1—Data Collection and Processing 3.6 Algorithm 2—LICIT Prediction 4 Proposed Methodologies 4.1 Experimental Setup 4.2 Rule Creation in SNORT 4.3 SNORT Rule Syntax 5 Conclusion References Gameplay Cognitive Decision Support Using Statistical and Non-statistical Parametric Fusion 1 Introduction 2 Literature Survey 3 Proposed System 4 Results and Discussion 5 Conclusion References Securing Communication in IoT Environment Using Lightweight Key Generation-Assisted Homomorphic Authenticated Encryption 1 Introduction 1.1 Organization of the Paper 2 Related Work 3 Proposed Framework 3.1 Authentication 3.2 Key and Other Parameters Generation 3.3 IoT Sensor Node Side Computation 3.4 Computation on Encrypted Data 3.5 Decryption Circuit Evaluation 4 Empirical Analysis of Proposed Oracle 4.1 Computational Complexity Analysis 4.2 Security and Correctness Analysis 5 Experimental Evaluation and Results Discussion 5.1 Comparative Analysis 6 Conclusion References Gas Leakage Detection and Control System 1 Introduction 2 Literature Review 3 Methodology 4 Results 5 Conclusion References Advanced Face Mask Detection System 1 Introduction 1.1 OpenCV 1.2 TensorFlow 1.3 Keras 1.4 Imutils 1.5 MobileNetV2 1.6 Related Work 2 Methodology 2.1 Data Set Collection 2.2 Model Training 2.3 Detection 3 Results 4 Conclusion References Meta-Analysis of Nanostructured Sensors for Toxic Gas Sensing 1 Introduction 2 Gas Sensing Platforms 3 Conclusion References High-Impedance Surface Backed Circular Patch Antenna for Wireless Communications 1 Introduction 2 High-Impedance Surface Structures 3 Design of Circular Patch Antenna on HIS 4 Results 4.1 Optimization and Effect of the Gap 4.2 Return Loss 4.3 Radiation Pattern 4.4 Gain 4.5 Current Density 5 Conclusion References A Critical Analysis on Attacks and Challenges in VANETs 1 Introduction 2 Characteristics of VANET 3 Challenges and Future Perspectives 4 Applications of VANETs 5 Conclusion References Development of 5G Array Antenna Using 2 × 1 Power Divider for Enhancing Gain in Wireless Applications 1 Introduction 2 Analysis and Design 3 Design Methodology 4 Conclusion References Novel Technique for Identification of False Coconuts to Avoid Genetic Diseases Using Classifiers 1 Introduction 2 Problem Statement 3 System Model 4 Classifiers 5 Conclusion References Privacy Preserving Datamining Techniques with Data Security in Data Transformation 1 Introduction 1.1 Problem of the Statement 1.2 K-Means Clustering 2 Survey About Previous Research Contribution 2.1 Objectives PPDM Data Security Data Mining 3 Data Processing and Transformation 3.1 Data Transformation 3.2 Data Reduction 3.3 Discretization and Concept Hierarchy Generation 3.4 Transformation Flow Chart 4 Algorithm Approach 4.1 Transformation Algorithm and Methodology 4.2 Data Security 4.3 Distributed Method-Based PPDM 5 Conclusions and Future Objective References Rectangular Slotted Elliptically Placed Compact Antenna For Wide Band Applications at K and Ka Bands 1 Introduction 2 Design of Antenna and Simulation 3 Results and Discussion 4 Conclusions CAN Intrusion Detection Using Long Short-Term Memory (LSTM) 1 Introduction 2 Related Work 2.1 CAN Intrusion Detection Models 2.2 Models Based on Nature of Data 3 In-Vehicle Network Overview 3.1 Controller Area Network (CAN) 3.2 Injection of Messages 4 Model for Intrusion Detection 5 Experiments 6 Discussion References Analysis of Fuel Cell—Battery and Supercapacitor in Driving the Integrated UPQC 1 Introduction 2 SCFCBS-Integrated UPQC 3 Supercapacitor Fuel Cell—Battery (SCFCB) Integrated UPQC 3.1 Series APF 3.2 Shunt Converter 4 SCFCB—Results Analysis 5 Conclusion References A Compact Microstrip Antenna with DGS for Bluetooth Applications 1 Introduction 2 Antenna Outline and Equations 3 Simulations and Results 4 Conclusion References A Cırcularly Polarızed Sıngle-Feed Patch Antenna for C-Band Satellıte Applıcatıons 1 Introduction 2 Antenna Desıgn 3 Results and Dıscussıon 4 Conclusıon References An Integrated Methodology of TsF-KNN-Based Automated Data Classification and Security for Mobile Cloud Computing 1 Introduction 2 Types of Cloud and Its Data Securıty Aspects 2.1 Types of Cloud 2.2 Cloud Data Security Aspects 3 Integrated Methodology of TsF-KNN Based Data Classification and Security 3.1 Big Data File 3.2 TsF-KNN Classifier 3.3 HDFS Input Formatter 3.4 Big Data Classification 3.5 HDFS Mapper 3.6 HDFS Reducer 3.7 Big Data Security Technique 4 Results 5 Conclusion References Cascaded H-Bridge Multilevel Inverter for PV Applications 1 Introduction 1.1 Multilevel Inverter 1.2 Three-Level H-Bridge Multilevel Inverter 1.3 Five-Level CHB-MLI 2 Sinusoidal Pulse Width Modulation 3 Five-Level CHB-MLI Using SPWM 4 Comparison of THD 5 Photo Voltaic Cell 5.1 Simulation of MLI Using PV Panel 6 Conclusion References Dual-Band Circularly Polarized Pentagon-Shaped Fractal Antenna 1 Introduction 2 Antenna Configuration 3 Simulation Results 4 Measured Results 5 Conclusion References Device Design and Modeling of Fin Field Effect Transistor for Low Power Applications 1 Introduction 2 General Structure 3 Result Analysis 4 Conclusion References A Secure Biometric Novel Approach for Authentication Using Multi-Fingerprint Traits 1 Introduction 1.1 Biometric System Identification 1.2 Biometric System Applications 1.3 Finger Print Features 2 Literature Review 3 Methodology 3.1 Proposed Design 3.2 Procedure 4 Security Analysis 5 Conclusion References Static Hand Gesture Recognition for ASL Using MATLAB Platform 1 Introduction 2 Literature Survey 2.1 Morphological Operations 2.2 Feature Extraction 2.3 Edge Detection 3 Algorithms with MATLAB for Gestures 3.1 Principal Component Analysis (PCA) 3.2 Linear Discriminant Analysis (LDA) 3.3 K-Nearest Neighbors Algorithm (k-NN) 3.4 Support Vector Machine (SVM) 4 Implementation 4.1 Pre-processing and Segmentation 4.2 Feature Extraction and Training Phase 4.3 Test Cases 5 Conclusion References Emotion Recognition Based on Streaming Real-Time Video with Deep Learning Approach 1 Introduction 2 Data Description 3 Approach 3.1 Using Auto-Encoders for Dimensionality Reduction 3.2 Model Used—Xception 3.3 Implementation Process 4 Results 5 Conclusions References Efficient Dynamic Framework to Secure MQTT to Detect Distributed DoS Using Meta-Empirical Clustering 1 Introduction 2 Related Work 3 Methodology 3.1 Modified Random Forest Algorithm 4 Results 5 Conclusion and Future Scope References Optimal Codebook Construction Method Based on Zadoff-Chu Matrix for Code Division Multiple Access Systems 1 Introduction 2 Conceptual Working Model 3 Conceptual Working Model 4 Optimal Codebook Construction 4.1 Optimal Codebook Based on Difference Set 4.2 Optimal Codebook Based on Almost Difference Set 4.3 Optimal Codebook Based on Feature Sum 5 Comparative Analysis of Optimal Codebook Construction Methods 6 Conclusion References Binary Optimal Low-Correlation Region Sequence Set Construction Method 1 Introduction 2 Basic Model 3 Best Binary LCZ Sequence Set Construction Method 4 Comparison of Construction Methods 5 Conclusion References Author Index