دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2020 نویسندگان: Nirbhay Chaubey (editor), Satyen Parikh (editor), Kiran Amin (editor) سری: ISBN (شابک) : 981156647X, 9789811566479 ناشر: Springer سال نشر: 2020 تعداد صفحات: 364 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 59 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Computing Science, Communication and Security: First International Conference, COMS2 2020, Gujarat, India, March 26–27, 2020, Revised Selected Papers ... and Information Science (1235), Band 1235) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب علوم محاسباتی، ارتباطات و امنیت: اولین کنفرانس بین المللی، COMS2 2020، گجرات، هند، 26 تا 27 مارس 2020، مقالات منتخب اصلاح شده ... و علوم اطلاعات (1235)، باند 1235) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Organization Contents I Artificial Intelligence and Machine Learning Applications of Classical and Deep Learning Techniques for Polar Bear Detection and Recognition from Aero Photography 1 Introduction 1.1 Previous Work 2 The Input Data 3 General Approach 3.1 Dataset 3.2 Classification 4 Experiments 4.1 Performance 4.2 Accuracy 5 Conclusions References Floor Plan Recognition and Vectorization Using Combination UNet, Faster-RCNN, Statistical Component Analysis and Ramer-Douglas-Peucker 1 Introduction 1.1 Previous Work 2 The Floor Plan Datasets 3 Architecture 4 General Approach 5 Experiments 5.1 Performance 5.2 Accuracy 6 Conclusions References Predicting Passenger Flow in BTS and MTS Using Hybrid Stacked Auto-encoder and Softmax Regression 1 Introduction 2 Related Work 3 Proposed Methodology for Passenger Flow Prediction 3.1 Clustering 3.2 Stacked Auto-encoder with Softmax Regression for Prediction 4 Simulation Analysis and Results 5 Conclusion References Deep Recurrent Neural Network with Tanimoto Similarity and MKSIFT Features for Medical Image Search and Retrieval 1 Introduction 2 Motivation 2.1 Literature Review 2.2 Challenges 3 Proposed MK-SIFT-Based Deep RNN for Image Retrieval 3.1 Extraction of Significant Feature Using MK-SIFT 3.2 Classifying the Medical Images for Group Retrieval Using Deep RNN 3.3 Image Retrieval Using Tanimoto Measure Based Similarity 4 Results and Discussion 4.1 Experimental Setup 4.2 Dataset Description 4.3 Evaluation Metrics 4.4 Comparative Methods 5 Conclusion References Demystifying Computational Techniques Used to Diagnose Tuberculosis 1 Introduction 1.1 Tuberculosis 1.2 Diagnosis Techniques 1.3 Why Deep Learning 1.4 MRCNN 1.5 UNET Model 2 Existing Research in Diagnosis of Tuberculosis and Medical Diagnosis 2.1 Tuberculosis 2.2 Microscopy 2.3 Medical Imaging Computation 3 Research Findings 4 Implementation Result 5 Conclusion References Indian Currency Recognition from Live Video Using Deep Learning 1 Introduction 2 The Problem 3 The Problem Solution 4 Working Structure 5 Literature Review 6 Strategy of Research 7 Machine Learning 8 Deep Learning 8.1 Working of Deep Learning 8.2 Difference Between Machine Learning and Deep Learning 8.3 Convolutional Neural Network 8.4 Working of Convolutional Neural Network (CNN) 8.5 Training Time Increasing with GPU 8.6 Tools and Technology Used 9 Experimental Approach 9.1 Pre-trained Model 9.2 Faster RCNN 9.3 Currency Dataset 9.4 Dataset Gathering 9.5 Dataset Labelling 9.6 Structure of Dataset 9.7 Workflow 9.8 Testing Procedure of Trained Model 9.9 Results 10 Conclusion References Optimization of Driving Efficiency for Pre-determined Routes: Proactive Vehicle Traffic Control 1 Introduction 1.1 Underlying Concepts 1.2 The Problem 1.3 Objective 1.4 Questions and Hypotheses 2 The Method 2.1 The Monitor 2.2 Analysis 2.3 Planning 2.4 Execution 3 Results 4 Conclusions References Emotion Classification with Reduced Feature Set SGDClassifier, Random Forest and Performance Tuning 1 Introduction 2 Study of Related Work and Motivation 3 System Architecture 4 Performance Tuning 5 Experimentation Results 6 Conclusion 7 Limitation and Future Work References Melanoma Detection Using HSV with SVM Classifier and De-duplication Technique to Increase Efficiency 1 Introduction 2 Litreature Survey 3 Proposed Method 3.1 Pre-processing 3.2 Dermoscopic Images 3.3 Gaussian Filter 3.4 Feature Extraction 3.5 Gradient Vector Flow 3.6 Classification 3.7 Image De-duplication 4 Results and Dataset 5 Conclusion References Cyber Intrusion Detection Using Machine Learning Classification Techniques 1 Introduction 2 Background and Related Work 3 Data-Driven IDS Modeling 3.1 Dataset Exploration and Preprocessing 3.2 Machine Learning Classification Based Modeling 4 Experimental Evaluation 4.1 Experimental Results and Discussion 5 Conclusion and Future Work References Prediction of Lung Cancer Using Machine Learning Classifier 1 Introduction 2 Related Work 3 Dataset Description 4 Classification Techniques 4.1 Neural Network 4.2 Radial Basis Function Network 4.3 Support Vector Classifter 4.4 Logistic Regression Classifter 4.5 Random Forest Classifter 4.6 J48 Classifter 4.7 Naïve Bayes Classifter 4.8 Knn Classifter 5 Proposed Model 6 Result Analysis 7 Conclusion References A Rule-Based Expert System to Assess Coronary Artery Disease Under Uncertainty 1 Introduction 2 Related Research 3 Methodology 3.1 Proposed Rule Based Expert System for CAD 3.2 Uncertainties in the Attribute 3.3 Explanation of Antecedent Attributes 3.4 Rule Base 3.5 Data Set Description 4 Result and Discussion 4.1 Success Rate 4.2 Error Rate 4.3 Failure Rate 4.4 False Omission Rate (fOR) 5 Conclusion References Multiclass MI-Task Classification Using Logistic Regression and Filter Bank Common Spatial Patterns 1 Introduction 2 Related Works 3 Methodology 3.1 Preprocessing the Data 3.2 Logistic Regression 3.3 Filter Bank Common Spatial Pattern 3.4 Random Forest 4 Experimental Analysis and Discussion 4.1 Dataset Description 4.2 Results 5 Conclusion and Future Work References I Network, Communication and Security A New Channel-Aware Downlink Scheduling Algorithm for LTE-A and 5G HetNets 1 Introduction 2 Channel-Aware Scheduling 3 Problem Description 4 Channel-Aware Downlink Scheduling Algorithm for LTE-A and 5G Networks 5 Performance Evaluation 6 Conclusion References Ponte Message Broker Bridge Configuration Using MQTT and CoAP Protocol for Interoperability of IoT 1 Introduction 2 IoT Interoperability 3 IoT Interoperability Challenges 4 Interoperability Solution 4.1 IoT Framework 4.2 IoT Platform 4.3 IoT Project 5 Message Broker Bridge: Ponte 5.1 Case Study: Home Automation 5.2 Service Model Implementation 5.3 MQTT to HTTP 5.4 CoAP to MQTT 5.5 CoAP to HTTP 6 Research Findings 6.1 Open Issue Resolution: Message Retention 7 Conclusion References ITS Based OBU: A Fallback Mechanism in Vehicular Ad-Hoc Network 1 Introduction 1.1 Architecture 1.2 Intelligent Transport System 1.3 Connection-Oriented 1.4 Connection-Less 2 Related Work 3 Implementation and Proposed Work 3.1 Proposed Algorithm 4 Comparative Analysis 5 Conclusion and Future Work References Design of a Network with VANET Sporadic Cloud Computing Applied to Traffic Accident Prevention 1 Introduction 1.1 Underlying Concepts 2 Method 2.1 Considerations for Simulation 2.2 Selection of Regions and Intersections for Simulation 2.3 Simulation of the CBM State Machine 3 Analysis and Results 3.1 Bandwidth Assessment (BW) in Each Region of a Road and Intersection 3.2 Bandwidth 4 Conclusions References Management System for Optimizing Public Transport Networks: GPS Record 1 Introduction 2 Development 2.1 System Elements 2.2 Information System 2.3 Network Architecture 2.4 System Architecture 3 Implementation 4 Conclusions References Coordinator Controller Election Algorithm to Provide Failsafe Through Load Balancing in Distributed SDN Control Plane 1 Introduction 2 Related Work 2.1 Architecture of Distributed SDN Control Plane 2.2 Related Work Done on Coordinator Election Algorithms in Distributed Computing Environment 3 Objective of the Proposed Work 4 Design and Implementation 4.1 Load Calculation and Decision Making Module 4.2 Internal Controller Messenger Module 4.3 Coordinator Controller Election Module 5 Evaluation and Results 5.1 Implementation of Coordinator Election Module 5.2 Experimental Setup 6 Conclusion References Signature Based Malicious Behavior Detection in Android 1 Introduction 2 Background Information 2.1 Android Security Mechanisms 2.2 Android Security Threats 3 Proposed Solution 4 Results and Analysis 5 Related Work 6 Conclusion References A Method for Malware Detection in Virtualization Environment 1 Introduction 2 Background 2.1 Virtual Machine Introspection 2.2 Memory Mapping 2.3 Rootkits 3 Related Work 4 LibVMI - VM Introspection Tool 5 The Volatility Framework 6 Proposed Malware Detection Method 7 Experimental Setup and Preliminary Results 7.1 Experiment: DLL Injection Detection 8 Conclusion and Future Work References Crime Prediction Using Spatio-Temporal Data 1 Introduction 2 Related Research 3 Dataset Analysis 3.1 Crime Dataset and Attributes 3.2 Features 4 Methodology 4.1 Preprocessing 4.2 Training and Testing Dataset 4.3 Feature Extraction and Selection 5 Result Analysis 5.1 Decision Tree 5.2 K-Nearest Neighbor 5.3 Adaboost 5.4 Random Forest 5.5 Oversampling Dataset 5.6 Undersampling Dataset 5.7 Random Undersampling 6 Conclusion References Color Image Watermarking in Encryption Domain 1 Introduction 2 CS Based Encryption and Decryption 2.1 Encryption Process 2.2 Decryption Process 3 Watermarking Algorithm 3.1 Watermark Logo Embedding 3.2 Watermark Logo Extraction 4 Experimental Results 5 Conclusions References Malware Detection Framework Using PCA Based ANN 1 Introduction 2 Literature Review 2.1 Summary 3 Proposed Malware Detection Framework by PCA Based ANN 3.1 Permission-Based Detection 3.2 System Call-Based Detection 4 Simulated Results 4.1 Results of ANN 5 Conclusion References I Computing Science A New Approach to Solve Job Sequencing Problem Using Dynamic Programming with Reduced Time Complexity 1 Introduction 2 Related Works 3 Proposed Methodology 3.1 Pseudocode of Proposed Algorithm 4 Experimental Result and Complexity Analysis 4.1 Step by Step Simulation for Sample Input 4.2 Time Complexity Analysis 4.3 Space Complexity 4.4 Experimental Result Comparison with Classical Algorithms 5 Conclusions and Future Recommendation References Optimizing Complexity of Quick Sort 1 Introduction 2 Related Works 3 Methodology 3.1 Pseudocode of the Classical Algorithm 3.2 Step by Step Simulation of the Classical Algorithm 3.3 Pseudocode of the Proposed Algorithm 3.4 Step by Step Simulation of the Proposed Algorithm 4 Complexity Analysis 4.1 Time Complexity 5 Experimental Result 6 Conclusion and Future Recommendation References Software Project Planning Through Comparison of Bio-inspired Algorithms 1 Introduction 2 Bibliographic Review 3 The Problem of Replanning Releases in Agile Software Projects 4 Multi-objective Genetic Algorithm to Solve RPASP 4.1 Proposed Multi-target Genetic Algorithm 5 Results 5.1 Experiments with Small Test Cases 5.2 Experiments in Large Test Cases 6 Conclusions References Author Index