ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021, Volume 2

دانلود کتاب ارتباطات کامپیوتری، شبکه و اینترنت اشیا: مجموعه مقالات پنجمین ICICC 2021، جلد 2

Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021, Volume 2

مشخصات کتاب

Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021, Volume 2

ویرایش:  
نویسندگان: , , , ,   
سری: Lecture Notes in Networks and Systems, 459 
ISBN (شابک) : 9811919755, 9789811919756 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 438
[439] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 16 Mb 

قیمت کتاب (تومان) : 31,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Computer Communication, Networking and IoT: Proceedings of 5th ICICC 2021, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ارتباطات کامپیوتری، شبکه و اینترنت اشیا: مجموعه مقالات پنجمین ICICC 2021، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب ارتباطات کامپیوتری، شبکه و اینترنت اشیا: مجموعه مقالات پنجمین ICICC 2021، جلد 2

این کتاب دارای مجموعه ای از مقالات با کیفیت بالا و بررسی شده است که در پنجمین کنفرانس بین المللی محاسبات و ارتباطات هوشمند (ICICC 2021) که توسط دپارتمان علوم و مهندسی کامپیوتر و دپارتمان علوم و فناوری کامپیوتر، دایاناندا سازماندهی شده است، ارائه شده است. دانشگاه ساگار، بنگالورو، هند، در تاریخ 26 تا 27 نوامبر 2021. این کتاب در دو جلد سازماندهی شده است و تحقیقات پیشرفته و چند رشته ای در مورد طراحی محاسبات هوشمند و انفورماتیک را مورد بحث قرار می دهد. این بر پارادایم های نوآوری در دانش سیستم، هوشمندی و پایداری تمرکز دارد که می تواند برای ارائه راه حل های عملی برای تعدادی از مشکلات در جامعه، محیط زیست و صنعت به کار رود. علاوه بر این، این کتاب همچنین به استقرار رویکردهای محاسباتی و انتقال دانش نوظهور، بهینه سازی راه حل ها در رشته های مختلف علم، فناوری و مراقبت های بهداشتی می پردازد.


توضیحاتی درمورد کتاب به خارجی

This book features a collection of high-quality, peer-reviewed papers presented at the Fifth International Conference on Intelligent Computing and Communication (ICICC 2021) organized by the Department of Computer Science and Engineering and Department of Computer Science and Technology, Dayananda Sagar University, Bengaluru, India, on November 26 – 27, 2021. The book is organized in two volumes and discusses advanced and multi-disciplinary research regarding the design of smart computing and informatics. It focuses on innovation paradigms in system knowledge, intelligence, and sustainability that can be applied to provide practical solutions to a number of problems in society, the environment and industry. Further, the book also addresses the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology, and healthcare.



فهرست مطالب

Conference Organization Committee
Preface
Contents
Editors and Contributors
Cloud-Based E-learning: Scaffolding the Environment for Adaptive E-learning Ecosystem Based on Cloud Computing Infrastructure
	1 Introduction
	2 Overview of Cloud Computing
	3 The Implications of Cloud Computing for E-learning
	4 Methodological Provisions for Rendering Cloud-Based E-learning
	5 Vantages of Cloud Computing Adoption for E-learning Solutions
	6 Comparing Different Authoring Tools Based on Cloud Computing
		6.1 Easy Generator
		6.2 Lectora Online
		6.3 eCoach
		6.4 Ruzuku
		6.5 iSpring Learn LMS
	7 Concluding Remarks
	References
Web Crawling-Based Search Engine for Programming Languages
	1 Introduction
	2 Web Crawling
	3 Literature Review
	4 Methodology
		4.1 Database
		4.2 Crawling, Indexing and Page Ranking
		4.3 Search Engine
	5 Results
	6 Conclusion
	References
Smart Helmet for Coal Mine Monitoring
	1 Introduction
	2 System Architecture
		2.1 Block Diagram
		2.2 Components
	3 Proposed Methodology
	4 Experimental Result and Analysis
		4.1 Temperature and Air Quality Test
		4.2 Fall Detection Test
	5 Conclusion and Future Scope
	References
K-Weighted Cluster Head Selection in Wireless Sensor Networks
	1 Introduction
	2 Related Work
		2.1 Overall Inference and Motivation
	3 Proposed K-weighted Cluster Head Selection (K-WCH) Algorithm
	4 Simulation and Performance Analysis
		4.1 Reaching 10% of Dead Nodes
		4.2 Energy Efficiency
	5 Conclusion
	References
Implementation and Performance Analysis of PEGASIS and MIEEPB Protocols in Wireless Sensor Networks
	1 Introduction
	2 Previous Works
	3 Objective
	4 Chain-Based Protocols
		4.1 Power Efficient Gathering in Sensor Information Systems (PEGASIS) Protocol
		4.2 Mobile Sink Improved Energy-Efficient PEGASIS-Based Routing Protocol (MIEEPB)
	5 Conclusion
	References
A Queue Management System for Cloud Data Processing
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Results and Discussion
	5 Conclusion
	6 Future Scope
	References
Sensor Integration and Information Sharing for Automated Electric Vehicles for Better Estimation of the Surroundings
	1 Introduction
	2 Background
	3 Methodology
	4 Implementation and Results
	5 Conclusion
	References
Cloud-Computed Solar Tracking System
	1 Introduction
	2 Monitoring System
		2.1 Hardware System
		2.2 Data Gathering System
		2.3 Data Collecting Process
		2.4 Cloud System
	3 Experimental Analysis
		3.1 Data Gathering System Interface
		3.2 Cloud System
		3.3 Analysis of Experimental Data for Fault Diagnosis
	4 Conclusion
	References
Patient Identifier Using Biometric Authentication
	1 Introduction
	2 Literature Survey
	3 The Proposed Work
	4 Experimental Results
	5 Conclusion and Future Work
	References
Recognition of Hand Gesture-Based Sign Language Using Transfer Learning
	1 Introduction
		1.1 Sensor-Based
		1.2 Image-Based
	2 Literature Review
	3 Materials and Methods
		3.1 Dataset
		3.2 Methodology
	4 Experimental Results
	5 Conclusion
	References
Robustness Indices of 3R and 4R Planar Serial Manipulators with Fixed Actuation Scheme
	1 Introduction
	2 Mathematical Modeling and Jacobian Matrix of Planar 3R Serial Manipulator
	3 Performance Indices of the 3R Planar Serial Manipulator
	4 Results 3R Serial Manipulator
	5 Planar 4R Serial Manipulator
	6 Results of 4R Manipulator
	7 Conclusions
	References
Deterioration of Daily Life in COVID-19
	1 Introduction
	2 Literature Survey
	3 Data Collection and Preprocessing
	4 Result and Discussion
	5 Conclusions and Future Scope
	References
A Design Model of Copyright Protection System Based on Distributed Ledger Technology
	1 Introduction
	2 Literature Survey
	3 Proposed Model
		3.1 System Security Requirements
		3.2 Solution Model Architecture
		3.3 Smart Contract Design
	4 System Implementation
	5 Conclusions
	References
Secure Electronic Voting (E-voting) System Based on Blockchain on Various Platforms
	1 Introduction
	2 Background and Literature Review
		2.1 Blockchain Architecture’s Basic Elements
		2.2 Blockchain Architecture’s Crucial Characteristics
		2.3 Review of Related Literature
	3 Deployment of the System
	4 Voting Protocol
		4.1 Voting Process Entities
		4.2 Registration of Voters
	5 Conclusions
	References
Dynamic Authentication Using Visual Cryptography
	1 Introduction
	2 Current Trends in One-Time Passwords
		2.1 SMS-Based OTP
		2.2 Proprietary Tokens
		2.3 Grid Cards
		2.4 Software Tokens
	3 Proposed Methodology
		3.1 Proposed System Merits
		3.2 Proposed System Demerits
	4 Experiment Results
	5 Conclusion and Future Works
		5.1 Conclusion
		5.2 Future Work
	References
Browser Extension for Digital Signature
	1 Introduction
		1.1 Importance of Digital Signature
		1.2 Importance of Certificate-Based Digital Signature
	2 Digital Signature Based on Digital Certificate
		2.1 Creating a pfx Certificate
	3 Proposed System
		3.1 Methodology of Proposed System
	4 Browser Extension
		4.1 Integration of an Extension with Digital Signature Functionality
	5 Conclusion and Future Work
	References
Design and Implementation of Cyber Threat Intelligence Data Mining Model
	1 Introduction
	2 Literature Survey
	3 Analysis for Data Mining Model
		3.1 Data Collection
		3.2 API Implementation
		3.3 Integration with Snort
		3.4 Blacklist
		3.5 Algorithm 1—Data Collection and Processing
		3.6 Algorithm 2—LICIT Prediction
	4 Proposed Methodologies
		4.1 Experimental Setup
		4.2 Rule Creation in SNORT
		4.3 SNORT Rule Syntax
	5 Conclusion
	References
Gameplay Cognitive Decision Support Using Statistical and Non-statistical Parametric Fusion
	1 Introduction
	2 Literature Survey
	3 Proposed System
	4 Results and Discussion
	5 Conclusion
	References
Securing Communication in IoT Environment Using Lightweight Key Generation-Assisted Homomorphic Authenticated Encryption
	1 Introduction
		1.1 Organization of the Paper
	2 Related Work
	3 Proposed Framework
		3.1 Authentication
		3.2 Key and Other Parameters Generation
		3.3 IoT Sensor Node Side Computation
		3.4 Computation on Encrypted Data
		3.5 Decryption Circuit Evaluation
	4 Empirical Analysis of Proposed Oracle
		4.1 Computational Complexity Analysis
		4.2 Security and Correctness Analysis
	5 Experimental Evaluation and Results Discussion
		5.1 Comparative Analysis
	6 Conclusion
	References
Gas Leakage Detection and Control System
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results
	5 Conclusion
	References
Advanced Face Mask Detection System
	1 Introduction
		1.1 OpenCV
		1.2 TensorFlow
		1.3 Keras
		1.4 Imutils
		1.5 MobileNetV2
		1.6 Related Work
	2 Methodology
		2.1 Data Set Collection
		2.2 Model Training
		2.3 Detection
	3 Results
	4 Conclusion
	References
Meta-Analysis of Nanostructured Sensors for Toxic Gas Sensing
	1 Introduction
	2 Gas Sensing Platforms
	3 Conclusion
	References
High-Impedance Surface Backed Circular Patch Antenna for Wireless Communications
	1 Introduction
	2 High-Impedance Surface Structures
	3 Design of Circular Patch Antenna on HIS
	4 Results
		4.1 Optimization and Effect of the Gap
		4.2 Return Loss
		4.3 Radiation Pattern
		4.4 Gain
		4.5 Current Density
	5 Conclusion
	References
A Critical Analysis on Attacks and Challenges in VANETs
	1 Introduction
	2 Characteristics of VANET
	3 Challenges and Future Perspectives
	4 Applications of VANETs
	5 Conclusion
	References
Development of 5G Array Antenna Using 2 × 1 Power Divider for Enhancing Gain in Wireless Applications
	1 Introduction
	2 Analysis and Design
	3 Design Methodology
	4 Conclusion
	References
Novel Technique for Identification of False Coconuts to Avoid Genetic Diseases Using Classifiers
	1 Introduction
	2 Problem Statement
	3 System Model
	4 Classifiers
	5 Conclusion
	References
Privacy Preserving Datamining Techniques with Data Security in Data Transformation
	1 Introduction
		1.1 Problem of the Statement
		1.2 K-Means Clustering
	2 Survey About Previous Research Contribution
		2.1 Objectives PPDM Data Security Data Mining
	3 Data Processing and Transformation
		3.1 Data Transformation
		3.2 Data Reduction
		3.3 Discretization and Concept Hierarchy Generation
		3.4 Transformation Flow Chart
	4 Algorithm Approach
		4.1 Transformation Algorithm and Methodology
		4.2 Data Security
		4.3 Distributed Method-Based PPDM
	5 Conclusions and Future Objective
	References
Rectangular Slotted Elliptically Placed Compact Antenna For Wide Band Applications at K and Ka Bands
	1 Introduction
	2 Design of Antenna and Simulation
	3 Results and Discussion
	4 Conclusions
CAN Intrusion Detection Using Long Short-Term Memory (LSTM)
	1 Introduction
	2 Related Work
		2.1 CAN Intrusion Detection Models
		2.2 Models Based on Nature of Data
	3 In-Vehicle Network Overview
		3.1 Controller Area Network (CAN)
		3.2 Injection of Messages
	4 Model for Intrusion Detection
	5 Experiments
	6 Discussion
	References
Analysis of Fuel Cell—Battery and Supercapacitor in Driving the Integrated UPQC
	1 Introduction
	2 SCFCBS-Integrated UPQC
	3 Supercapacitor Fuel Cell—Battery (SCFCB) Integrated UPQC
		3.1 Series APF
		3.2 Shunt Converter
	4 SCFCB—Results Analysis
	5 Conclusion
	References
A Compact Microstrip Antenna with DGS for Bluetooth Applications
	1 Introduction
	2 Antenna Outline and Equations
	3 Simulations and Results
	4 Conclusion
	References
A Cırcularly Polarızed Sıngle-Feed Patch Antenna for C-Band Satellıte Applıcatıons
	1 Introduction
	2 Antenna Desıgn
	3 Results and Dıscussıon
	4 Conclusıon
	References
An Integrated Methodology of TsF-KNN-Based Automated Data Classification and Security for Mobile Cloud Computing
	1 Introduction
	2 Types of Cloud and Its Data Securıty Aspects
		2.1 Types of Cloud
		2.2 Cloud Data Security Aspects
	3 Integrated Methodology of TsF-KNN Based Data Classification and Security
		3.1 Big Data File
		3.2 TsF-KNN Classifier
		3.3 HDFS Input Formatter
		3.4 Big Data Classification
		3.5 HDFS Mapper
		3.6 HDFS Reducer
		3.7 Big Data Security Technique
	4 Results
	5 Conclusion
	References
Cascaded H-Bridge Multilevel Inverter for PV Applications
	1 Introduction
		1.1 Multilevel Inverter
		1.2 Three-Level H-Bridge Multilevel Inverter
		1.3 Five-Level CHB-MLI
	2 Sinusoidal Pulse Width Modulation
	3 Five-Level CHB-MLI Using SPWM
	4 Comparison of THD
	5 Photo Voltaic Cell
		5.1 Simulation of MLI Using PV Panel
	6 Conclusion
	References
Dual-Band Circularly Polarized Pentagon-Shaped Fractal Antenna
	1 Introduction
	2 Antenna Configuration
	3 Simulation Results
	4 Measured Results
	5 Conclusion
	References
Device Design and Modeling of Fin Field Effect Transistor for Low Power Applications
	1 Introduction
	2 General Structure
	3 Result Analysis
	4 Conclusion
	References
A Secure Biometric Novel Approach for Authentication Using Multi-Fingerprint Traits
	1 Introduction
		1.1 Biometric System Identification
		1.2 Biometric System Applications
		1.3 Finger Print Features
	2 Literature Review
	3 Methodology
		3.1 Proposed Design
		3.2 Procedure
	4 Security Analysis
	5 Conclusion
	References
Static Hand Gesture Recognition for ASL Using MATLAB Platform
	1 Introduction
	2 Literature Survey
		2.1 Morphological Operations
		2.2 Feature Extraction
		2.3 Edge Detection
	3 Algorithms with MATLAB for Gestures
		3.1 Principal Component Analysis (PCA)
		3.2 Linear Discriminant Analysis (LDA)
		3.3 K-Nearest Neighbors Algorithm (k-NN)
		3.4 Support Vector Machine (SVM)
	4 Implementation
		4.1 Pre-processing and Segmentation
		4.2 Feature Extraction and Training Phase
		4.3 Test Cases
	5 Conclusion
	References
Emotion Recognition Based on Streaming Real-Time Video with Deep Learning Approach
	1 Introduction
	2 Data Description
	3 Approach
		3.1 Using Auto-Encoders for Dimensionality Reduction
		3.2 Model Used—Xception
		3.3 Implementation Process
	4 Results
	5 Conclusions
	References
Efficient Dynamic Framework to Secure MQTT to Detect Distributed DoS Using Meta-Empirical Clustering
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Modified Random Forest Algorithm
	4 Results
	5 Conclusion and Future Scope
	References
Optimal Codebook Construction Method Based on Zadoff-Chu Matrix for Code Division Multiple Access Systems
	1 Introduction
	2 Conceptual Working Model
	3 Conceptual Working Model
	4 Optimal Codebook Construction
		4.1 Optimal Codebook Based on Difference Set
		4.2 Optimal Codebook Based on Almost Difference Set
		4.3 Optimal Codebook Based on Feature Sum
	5 Comparative Analysis of Optimal Codebook Construction Methods
	6 Conclusion
	References
Binary Optimal Low-Correlation Region Sequence Set Construction Method
	1 Introduction
	2 Basic Model
	3 Best Binary LCZ Sequence Set Construction Method
	4 Comparison of Construction Methods
	5 Conclusion
	References
Author Index




نظرات کاربران