ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers ... and Information Science (1235), Band 1235)

دانلود کتاب علوم محاسباتی، ارتباطات و امنیت: اولین کنفرانس بین المللی، COMS2 2020، گجرات، هند، 26 تا 27 مارس 2020، مقالات منتخب اصلاح شده ... و علوم اطلاعات (1235)، باند 1235)

Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers ... and Information Science (1235), Band 1235)

مشخصات کتاب

Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers ... and Information Science (1235), Band 1235)

ویرایش: 1st ed. 2020 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 981156647X, 9789811566479 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 364 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 59 مگابایت 

قیمت کتاب (تومان) : 54,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 11


در صورت تبدیل فایل کتاب Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers ... and Information Science (1235), Band 1235) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب علوم محاسباتی، ارتباطات و امنیت: اولین کنفرانس بین المللی، COMS2 2020، گجرات، هند، 26 تا 27 مارس 2020، مقالات منتخب اصلاح شده ... و علوم اطلاعات (1235)، باند 1235) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب علوم محاسباتی، ارتباطات و امنیت: اولین کنفرانس بین المللی، COMS2 2020، گجرات، هند، 26 تا 27 مارس 2020، مقالات منتخب اصلاح شده ... و علوم اطلاعات (1235)، باند 1235)

این کتاب شامل مقالات منتخب ویرایش‌شده اولین کنفرانس بین‌المللی علوم محاسباتی، ارتباطات و امنیت، COMS2 2020 است که در مارس 2020 برگزار شد. به دلیل همه‌گیری COVID-19، کنفرانس به صورت مجازی برگزار شد.

26 مقاله کامل و 1 مقاله کوتاه به طور کامل بازبینی و از بین 79 مقاله ارسالی انتخاب شدند. مقالات بر اساس بخش‌های موضوعی مربوط به هوش مصنوعی و یادگیری ماشینی سازمان‌دهی می‌شوند. شبکه، ارتباطات و امنیت؛ علم محاسبات.

توضیحاتی درمورد کتاب به خارجی

This book constitutes revised selected papers of the First International Conference on Computing Science, Communication and Security, COMS2 2020, held in March 2020. Due to the COVID-19 pandemic the conference was held virtually. 

The 26 full papers and 1 short paper were thoroughly reveiwed and selected from 79 submissions. Papers are organised according to the topical sections on artificial intelligence and machine learning; network, communication and security; computing science.


فهرست مطالب

Preface
Organization
Contents
I Artificial Intelligence and Machine Learning
Applications of Classical and Deep Learning Techniques for Polar Bear Detection and Recognition from Aero Photography
	1 Introduction
		1.1 Previous Work
	2 The Input Data
	3 General Approach
		3.1 Dataset
		3.2 Classification
	4 Experiments
		4.1 Performance
		4.2 Accuracy
	5 Conclusions
	References
Floor Plan Recognition and Vectorization Using Combination UNet, Faster-RCNN, Statistical Component Analysis and Ramer-Douglas-Peucker
	1 Introduction
		1.1 Previous Work
	2 The Floor Plan Datasets
	3 Architecture
	4 General Approach
	5 Experiments
		5.1 Performance
		5.2 Accuracy
	6 Conclusions
	References
Predicting Passenger Flow in BTS and MTS Using Hybrid Stacked Auto-encoder and Softmax Regression
	1 Introduction
	2 Related Work
	3 Proposed Methodology for Passenger Flow Prediction
		3.1 Clustering
		3.2 Stacked Auto-encoder with Softmax Regression for Prediction
	4 Simulation Analysis and Results
	5 Conclusion
	References
Deep Recurrent Neural Network with Tanimoto Similarity and MKSIFT Features for Medical Image Search and Retrieval
	1 Introduction
	2 Motivation
		2.1 Literature Review
		2.2 Challenges
	3 Proposed MK-SIFT-Based Deep RNN for Image Retrieval
		3.1 Extraction of Significant Feature Using MK-SIFT
		3.2 Classifying the Medical Images for Group Retrieval Using Deep RNN
		3.3 Image Retrieval Using Tanimoto Measure Based Similarity
	4 Results and Discussion
		4.1 Experimental Setup
		4.2 Dataset Description
		4.3 Evaluation Metrics
		4.4 Comparative Methods
	5 Conclusion
	References
Demystifying Computational Techniques Used to Diagnose Tuberculosis
	1 Introduction
		1.1 Tuberculosis
		1.2 Diagnosis Techniques
		1.3 Why Deep Learning
		1.4 MRCNN
		1.5 UNET Model
	2 Existing Research in Diagnosis of Tuberculosis and Medical Diagnosis
		2.1 Tuberculosis
		2.2 Microscopy
		2.3 Medical Imaging Computation
	3 Research Findings
	4 Implementation Result
	5 Conclusion
	References
Indian Currency Recognition from Live Video Using Deep Learning
	1 Introduction
	2 The Problem
	3 The Problem Solution
	4 Working Structure
	5 Literature Review
	6 Strategy of Research
	7 Machine Learning
	8 Deep Learning
		8.1 Working of Deep Learning
		8.2 Difference Between Machine Learning and Deep Learning
		8.3 Convolutional Neural Network
		8.4 Working of Convolutional Neural Network (CNN)
		8.5 Training Time Increasing with GPU
		8.6 Tools and Technology Used
	9 Experimental Approach
		9.1 Pre-trained Model
		9.2 Faster RCNN
		9.3 Currency Dataset
		9.4 Dataset Gathering
		9.5 Dataset Labelling
		9.6 Structure of Dataset
		9.7 Workflow
		9.8 Testing Procedure of Trained Model
		9.9 Results
	10 Conclusion
	References
Optimization of Driving Efficiency for Pre-determined Routes: Proactive Vehicle Traffic Control
	1 Introduction
		1.1 Underlying Concepts
		1.2 The Problem
		1.3 Objective
		1.4 Questions and Hypotheses
	2 The Method
		2.1 The Monitor
		2.2 Analysis
		2.3 Planning
		2.4 Execution
	3 Results
	4 Conclusions
	References
Emotion Classification with Reduced Feature Set SGDClassifier, Random Forest and Performance Tuning
	1 Introduction
	2 Study of Related Work and Motivation
	3 System Architecture
	4 Performance Tuning
	5 Experimentation Results
	6 Conclusion
	7 Limitation and Future Work
	References
Melanoma Detection Using HSV with SVM Classifier and De-duplication Technique to Increase Efficiency
	1 Introduction
	2 Litreature Survey
	3 Proposed Method
		3.1 Pre-processing
		3.2 Dermoscopic Images
		3.3 Gaussian Filter
		3.4 Feature Extraction
		3.5 Gradient Vector Flow
		3.6 Classification
		3.7 Image De-duplication
	4 Results and Dataset
	5 Conclusion
	References
Cyber Intrusion Detection Using Machine Learning Classification Techniques
	1 Introduction
	2 Background and Related Work
	3 Data-Driven IDS Modeling
		3.1 Dataset Exploration and Preprocessing
		3.2 Machine Learning Classification Based Modeling
	4 Experimental Evaluation
		4.1 Experimental Results and Discussion
	5 Conclusion and Future Work
	References
Prediction of Lung Cancer Using Machine Learning Classifier
	1 Introduction
	2 Related Work
	3 Dataset Description
	4 Classification Techniques
		4.1 Neural Network
		4.2 Radial Basis Function Network
		4.3 Support Vector Classifter
		4.4 Logistic Regression Classifter
		4.5 Random Forest Classifter
		4.6 J48 Classifter
		4.7 Naïve Bayes Classifter
		4.8 Knn Classifter
	5 Proposed Model
	6 Result Analysis
	7 Conclusion
	References
A Rule-Based Expert System to Assess Coronary Artery Disease Under Uncertainty
	1 Introduction
	2 Related Research
	3 Methodology
		3.1 Proposed Rule Based Expert System for CAD
		3.2 Uncertainties in the Attribute
		3.3 Explanation of Antecedent Attributes
		3.4 Rule Base
		3.5 Data Set Description
	4 Result and Discussion
		4.1 Success Rate
		4.2 Error Rate
		4.3 Failure Rate
		4.4 False Omission Rate (fOR)
	5 Conclusion
	References
Multiclass MI-Task Classification Using Logistic Regression and Filter Bank Common Spatial Patterns
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Preprocessing the Data
		3.2 Logistic Regression
		3.3 Filter Bank Common Spatial Pattern
		3.4 Random Forest
	4 Experimental Analysis and Discussion
		4.1 Dataset Description
		4.2 Results
	5 Conclusion and Future Work
	References
I Network, Communication and Security
A New Channel-Aware Downlink Scheduling Algorithm for LTE-A and 5G HetNets
	1 Introduction
	2 Channel-Aware Scheduling
	3 Problem Description
	4 Channel-Aware Downlink Scheduling Algorithm for LTE-A and 5G Networks
	5 Performance Evaluation
	6 Conclusion
	References
Ponte Message Broker Bridge Configuration Using MQTT and CoAP Protocol for Interoperability of IoT
	1 Introduction
	2 IoT Interoperability
	3 IoT Interoperability Challenges
	4 Interoperability Solution
		4.1 IoT Framework
		4.2 IoT Platform
		4.3 IoT Project
	5 Message Broker Bridge: Ponte
		5.1 Case Study: Home Automation
		5.2 Service Model Implementation
		5.3 MQTT to HTTP
		5.4 CoAP to MQTT
		5.5 CoAP to HTTP
	6 Research Findings
		6.1 Open Issue Resolution: Message Retention
	7 Conclusion
	References
ITS Based OBU: A Fallback Mechanism in Vehicular Ad-Hoc Network
	1 Introduction
		1.1 Architecture
		1.2 Intelligent Transport System
		1.3 Connection-Oriented
		1.4 Connection-Less
	2 Related Work
	3 Implementation and Proposed Work
		3.1 Proposed Algorithm
	4 Comparative Analysis
	5 Conclusion and Future Work
	References
Design of a Network with VANET Sporadic Cloud Computing Applied to Traffic Accident Prevention
	1 Introduction
		1.1 Underlying Concepts
	2 Method
		2.1 Considerations for Simulation
		2.2 Selection of Regions and Intersections for Simulation
		2.3 Simulation of the CBM State Machine
	3 Analysis and Results
		3.1 Bandwidth Assessment (BW) in Each Region of a Road and Intersection
		3.2 Bandwidth
	4 Conclusions
	References
Management System for Optimizing Public Transport Networks: GPS Record
	1 Introduction
	2 Development
		2.1 System Elements
		2.2 Information System
		2.3 Network Architecture
		2.4 System Architecture
	3 Implementation
	4 Conclusions
	References
Coordinator Controller Election Algorithm to Provide Failsafe Through Load Balancing in Distributed SDN Control Plane
	1 Introduction
	2 Related Work
		2.1 Architecture of Distributed SDN Control Plane
		2.2 Related Work Done on Coordinator Election Algorithms in Distributed Computing Environment
	3 Objective of the Proposed Work
	4 Design and Implementation
		4.1 Load Calculation and Decision Making Module
		4.2 Internal Controller Messenger Module
		4.3 Coordinator Controller Election Module
	5 Evaluation and Results
		5.1 Implementation of Coordinator Election Module
		5.2 Experimental Setup
	6 Conclusion
	References
Signature Based Malicious Behavior Detection in Android
	1 Introduction
	2 Background Information
		2.1 Android Security Mechanisms
		2.2 Android Security Threats
	3 Proposed Solution
	4 Results and Analysis
	5 Related Work
	6 Conclusion
	References
A Method for Malware Detection in Virtualization Environment
	1 Introduction
	2 Background
		2.1 Virtual Machine Introspection
		2.2 Memory Mapping
		2.3 Rootkits
	3 Related Work
	4 LibVMI - VM Introspection Tool
	5 The Volatility Framework
	6 Proposed Malware Detection Method
	7 Experimental Setup and Preliminary Results
		7.1 Experiment: DLL Injection Detection
	8 Conclusion and Future Work
	References
Crime Prediction Using Spatio-Temporal Data
	1 Introduction
	2 Related Research
	3 Dataset Analysis
		3.1 Crime Dataset and Attributes
		3.2 Features
	4 Methodology
		4.1 Preprocessing
		4.2 Training and Testing Dataset
		4.3 Feature Extraction and Selection
	5 Result Analysis
		5.1 Decision Tree
		5.2 K-Nearest Neighbor
		5.3 Adaboost
		5.4 Random Forest
		5.5 Oversampling Dataset
		5.6 Undersampling Dataset
		5.7 Random Undersampling
	6 Conclusion
	References
Color Image Watermarking in Encryption Domain
	1 Introduction
	2 CS Based Encryption and Decryption
		2.1 Encryption Process
		2.2 Decryption Process
	3 Watermarking Algorithm
		3.1 Watermark Logo Embedding
		3.2 Watermark Logo Extraction
	4 Experimental Results
	5 Conclusions
	References
Malware Detection Framework Using PCA Based ANN
	1 Introduction
	2 Literature Review
		2.1 Summary
	3 Proposed Malware Detection Framework by PCA Based ANN
		3.1 Permission-Based Detection
		3.2 System Call-Based Detection
	4 Simulated Results
		4.1 Results of ANN
	5 Conclusion
	References
I Computing Science
A New Approach to Solve Job Sequencing Problem Using Dynamic Programming with Reduced Time Complexity
	1 Introduction
	2 Related Works
	3 Proposed Methodology
		3.1 Pseudocode of Proposed Algorithm
	4 Experimental Result and Complexity Analysis
		4.1 Step by Step Simulation for Sample Input
		4.2 Time Complexity Analysis
		4.3 Space Complexity
		4.4 Experimental Result Comparison with Classical Algorithms
	5 Conclusions and Future Recommendation
	References
Optimizing Complexity of Quick Sort
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Pseudocode of the Classical Algorithm
		3.2 Step by Step Simulation of the Classical Algorithm
		3.3 Pseudocode of the Proposed Algorithm
		3.4 Step by Step Simulation of the Proposed Algorithm
	4 Complexity Analysis
		4.1 Time Complexity
	5 Experimental Result
	6 Conclusion and Future Recommendation
	References
Software Project Planning Through Comparison of Bio-inspired Algorithms
	1 Introduction
	2 Bibliographic Review
	3 The Problem of Replanning Releases in Agile Software Projects
	4 Multi-objective Genetic Algorithm to Solve RPASP
		4.1 Proposed Multi-target Genetic Algorithm
	5 Results
		5.1 Experiments with Small Test Cases
		5.2 Experiments in Large Test Cases
	6 Conclusions
	References
Author Index




نظرات کاربران