ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021

دانلود کتاب هوش سایبری و بازیابی اطلاعات. مجموعه مقالات CIIR 2021

Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021

مشخصات کتاب

Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021

ویرایش:  
نویسندگان: , , ,   
سری: Lecture notes in networks and systems, Volume 291 
ISBN (شابک) : 9789811642845, 9811642842 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: [630] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 15 Mb 

قیمت کتاب (تومان) : 42,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Cyber Intelligence and Information Retrieval. Proceedings of CIIR 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب هوش سایبری و بازیابی اطلاعات. مجموعه مقالات CIIR 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب هوش سایبری و بازیابی اطلاعات. مجموعه مقالات CIIR 2021

این کتاب مجموعه‌ای از مقالات تحقیقاتی با کیفیت بالا را گردآوری می‌کند که در کنفرانس بین‌المللی هوش سایبری و بازیابی اطلاعات (CIIR 2021)، که در مؤسسه مهندسی و مدیریت، کلکته، هند طی 20 تا 21 می 2021 برگزار شد، ارائه شده است. مقالات تحقیقاتی در زمینه حریم خصوصی و امنیت در فضای ابری، پیشگیری و بازیابی از دست دادن داده ها، شبکه های با کارایی بالا، امنیت شبکه و رمزنگاری، پردازش تصویر و سیگنال، سیستم های ایمنی مصنوعی، امنیت اطلاعات و شبکه، تکنیک ها و کاربردهای علم داده، داده ها انبارداری و داده کاوی، داده کاوی در محیط پویا، محاسبات عصبی مرتبه بالاتر، نظریه مجموعه های ناهموار و فازی، و تکنیک های محاسباتی الهام گرفته از طبیعت.


توضیحاتی درمورد کتاب به خارجی

This book gathers a collection of high-quality peer-reviewed research papers presented at International Conference on Cyber Intelligence and Information Retrieval (CIIR 2021), held at Institute of Engineering & Management, Kolkata, India during 20–21 May 2021. The book covers research papers in the field of privacy and security in the cloud, data loss prevention and recovery, high-performance networks, network security and cryptography, image and signal processing, artificial immune systems, information and network security, data science techniques and applications, data warehousing and data mining, data mining in dynamic environment, higher-order neural computing, rough set and fuzzy set theory, and nature-inspired computing techniques.



فهرست مطالب

Preface
Contents
Editors and Contributors
Cyber Intelligence
DTNMA: Identifying Routing Attacks  in Delay-Tolerant Network
	1 Introduction
	2 Key Challenges of Routing Attacks
	3 Identification of Routing Attacks
		3.1 Packet Dropping Attack
		3.2 Black Hole Attack
		3.3 Worm Hole Attack
		3.4 Gray Hole Attack
		3.5 Jelly Fish Attack
		3.6 Tailgating Attack
		3.7 Packet Misrouting Attack
		3.8 Routing Information Falsification Attack
		3.9 Acknowledgment Falsification Attack
		3.10 Sleep Deprivation Attack
		3.11 Identity Impersonation Attack
		3.12 Lack of Cooperation Attack
		3.13 Byzantine Attack
		3.14 Flooding Attack
	4 Conclusion and Future Work
	References
Security Aspects for Mutation Testing in Mobile Applications
	1 Introduction
	2 Mobile Applications and Testing
	3 Mutation Testing
		3.1 Mutation Analysis of Android Applications
		3.2 Crashes/Bugs in Android
	4 Mutation Operators in Android
		4.1 Based on Bug Taxonomy
		4.2 Fail-On-Null
		4.3 Orientation Lock
		4.4 Based on APP-ELEMENTS
	5 Mutation Test Results for Sample Program
	6 Conclusion
	References
Classification Framework for Fraud Detection Using Hidden Markov Model
	1 Introduction
	2 Literature Survey
	3 Proposed System
	4 Algorithms
	5 Conclusion
	References
A Review on Security Issues in Healthcare Cyber-Physical Systems
	1 Introduction
	2 Why Does Privacy Stand as a Major Factor in Healthcare?
	3 MCPS and Vulnerabilities Explained
	4 CPS in Health Care
		4.1 Security Requirements in Case of Sensor Networks
	5 State of Art
	6 Possible Cyber Measures and Breaches in Healthcare
	7 Comparative Study
	8 Security Advancements Proposed
		8.1 Strong Security Policies
		8.2 Sensor Only Network
		8.3 Future Scope
	9 Conclusion
	References
Analysis of the Beaufort Cipher Expansion Technique and Its Usage in Providing Data Security in Cloud
	1 Introduction
		1.1 Cloud Computing
	2 Beaufort Cipher
		2.1 Beaufort Cipher Algorithm
		2.2 Demerits of Beaufort Cipher
		2.3 Frequency Analysis of the Extended Beaufort Cipher Algorithm
	3 Literature Survey
	4 Implementation and Simulation
		4.1 Importance of Simulation in the Cloud Environment
		4.2 CloudSim
		4.3 Implementation
	5 Comparison with Other Methods
	6 Conclusion
	References
Distribution of Internet Banking Credentials Using Visual Cryptography and Watermarking Techniques
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Implementation
		4.1 Encryption
		4.2 Decryption
	5 Result
	6 Conclusion
	References
Pattern Recognition
Virtual Keyboard Using Image Processing and Computer Vision
	1 Introduction
	2 Review Work
	3 Result Analysis and Discussion
		3.1 Masking
		3.2 Image Feed Preprocessing
		3.3 Threshold Binarization
		3.4 Contour Generation
		3.5 Finger-Pointer Detection
		3.6 Keyboard Output and Workflow Model
	4 Future Scope
	5 Conclusion
	References
Facial Expression Recognition Using Convoluted Neural Network (CNN)
	1 Introduction
		1.1 Background
	2 Problem Statement
	3 Tools and Libraries
	4 Result Analysis and Discussion
	5 Conclusion
	References
Next Step to the Future of Restaurants Through Artificial Intelligence and Facial Recognition
	1 Introduction
	2 Literature Review
	3 Artificial Intelligence
		3.1 Theory of Mind
		3.2 Reactive Machines
		3.3 Self Awareness
		3.4 Limited Memory
	4 Growth of Artificial Intelligence
	5 Applications of Artificial Intelligence
		5.1 Application of Artificial Intelligence in Finance
		5.2 Application of Artificial Intelligence in Banking
		5.3 Application of Artificial Intelligence in Healthcare Services
		5.4 Application of Artificial Intelligence in Travel
		5.5 Artificial Intelligence in Social Media
		5.6 Security in Artificial Intelligence
	6 Framework for Restaurant Using Artificial Intelligence and Facial Recognition
		6.1 Tablet Device
		6.2 Face Recognition
	7 Conclusion
	References
Extensive Feature Analysis and Baseline Model for Stance Detection Task
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Data Preparation
		3.2 Vector Representation
		3.3 Language Model Based Representations
		3.4 Propose and Implement Alternative Features
		3.5 Analysing Key Features
		3.6 Train-Validate Split
		3.7 Linear and Logistic Regression Implementation
		3.8 Model Evaluation
		3.9 Model Tuning and Enhancement
	4 Results
		4.1 Importance of Features
		4.2 Final Baseline
	5 Conclusion
	References
A Comparative Study into Stock Market Prediction Through Various Sentiment Analysis Algorithms
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Naïve Bayes Classifier
		3.2 Logistic Regression
		3.3 Support Vector Machine
		3.4 k-Nearest Neighbor Algorithm (k-NN)
	4 The Proposed Model
		4.1 Data Description
		4.2 Sentiment Analysis Component
		4.3 Text Pre-processing
		4.4 Abbreviation Processing
	5 Programming Language and Simulator
	6 Conclusion and Future Scope
	References
The Survey on Handwritten Mathematical Expressions Recognition
	1 Introduction
	2 Motivation
	3 Overview of Mathematical Symbols and Expression
	4 Survey on Online and Offline Handwritten Mathematical Expressions
	5 Conclusion
	References
13 Bangla Document Categorization Using Deep RNN Model with Attention Mechanism
	Abstract
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Data Collection
		3.2 Document Classification Dataset
		3.3 Data Preprocessing
		3.4 Classification Model
	4 Experimental Setup and Result Analysis
		4.1 Result Analysis
		4.2 Result Comparison
	5 Conclusion
	References
Bangla Handwritten Digit Recognition
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Experimental Details
		4.1 Data Collection
		4.2 Dataset Preparation for Overall NumtaDB and Own Dataset
		4.3 Dataset Preparation for Every Single Training Dataset
		4.4 Feature Extraction and Classification Steps
		4.5 Architecture of Model for Every Training Single Dataset
	5 Result Analysis
	6 Conclusion
	References
Audio Watermarking in Linear Canonical Transform Domain Using Frequency-Dependent Clustering
	1 Introduction
	2 Related Work on Transform Domain Audio Watermarking
	3 The Linear Canonical Transform: A Primer
		3.1 Continuous Domain Transformation
		3.2 Discrete Domain Transformation
	4 Proposed Methodology
		4.1 Watermark Embedding Stage
		4.2 Watermark Detection Stage
	5 Experimental Configuration and Simulation Parameters
	6 Results
	7 Conclusion
	References
Secure Cloud Services Using Quantum-Blockchain Technology
	1 Introduction
	2 State-Of-The-Art
		2.1 Research Gap
	3 Proposed Framework
		3.1 Significance of the Proposed Approach
		3.2 Proposed Algorithm
	4 Experimental Setup and Result
	5 Conclusion
	References
Information Retrieval
Multi-label Classification: Detailed Analysis
	1 Introduction
	2 Multi-label Classification Techniques
	3 Evaluation Metrics and Statistics
		3.1 Bipartition Based Metrics
		3.2 Ranking-Based Metrics
		3.3 Label Based Metrics
	4 Comparative Analysis of MLC Algorithms
	5 Progress of Multi-Label Classification Techniques
	6 Challenges
	7 Conclusion
	References
A Comparative Study on Sentiment Analysis Influencing Word Embedding Using SVM and KNN
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Dataset
		3.2 Feature Extraction
		3.3 Classifier
	4 Result and Analysis
	5 Comparative Study
	6 Conclusion
	References
ML and GIS-Based Approaches to Flood Prediction: A Comparative Study
	1 Introduction
	2 Hydrological Modeling
	3 Related Work
		3.1 Predicting Flood Susceptibility Using Long Short-Term Memory (LSTM) Neural Network Model
		3.2 Flood Prediction Using Support Vector Machines (SVM)
		3.3 Artificial Neural Networks for Flood Susceptibility Mapping in Data-Scarce Urban Areas
		3.4 Height Above the Nearest Drainage, a Hydrologically Relevant New Terrain Model
		3.5 Flood Modeling of Mangalam River Using GIS and HEC-RAS
		3.6 Application of ASTER DEM in Watershed Management as Flood Zonation Mapping in Koyna River of the Western Ghats
		3.7 Terrain Analysis Enhancements to the Height Above Nearest Drainage Flood Inundation Mapping Method
		3.8 Flood Risk Mapping Using GIS and Multi-criteria Analysis: A Greater Toronto Area Case
	4 Analysis
	5 The Proposed System
	6 Conclusions
	References
Implementation of Machine Learning in Lung Cancer Prediction and Prognosis: A Review
	1 Introduction
	2 Growth of Lung Cancer in Past Decade
	3 Related Works
	4 Comparative Analysis
	5 Conclusion and Future Work
	References
Fetching Information Through Crowdsourcing Within a Social Networking Site
	1 Introduction
	2 Related Work
	3 Dataset
	4 Problem Statement
	5 Results and Discussion
	6 Conclusion
	References
Soil Nutrient Assessment and Crop Estimation with Machine Learning Method: A Survey
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Soil Fertility
		3.2 Machine Learning Algorithm
	4 Results
	5 Discussion
	6 Conclusion
	References
COVID-19 Pandemic Diagnosis and Analysis Using Clinical Decision Support Systems
	1 Introduction
	2 Decision Support System in Healthcare
	3 Literature Review
	4 Challenges Faced During Pandemics
	5 Decision Support System for COVID-19 Diagnosis
	6 Results
	7 Challenges and Opportunities of CDSS
	8 Conclusion
	References
Bengali Abstractive News Summarization Using Seq2Seq Learning with Attention
	1 Introduction
	2 Literature Review
	3 System Architecture
	4 Experimental Details
		4.1 Dataset Creation
		4.2 Data Preprocessing
		4.3 Count Vocabulary
		4.4 Word Embedding
		4.5 Models
	5 Result Analysis
	6 Discussion
	7 Conclusion
	References
An Approach to Improve Searching Textual Data in Email Dataset
	1 Introduction
	2 Methods and Algorithms
		2.1 K-Means Clustering Algorithm
		2.2 Text Vectorization
		2.3 TF-IDF Scores
	3 Related Works
	4 Experiment Methodology
	5 Conclusions
	6 Applications and Areas of Further Research
	References
Analyze Cardiotocograph to Classify the Fetal Status Using Various Machine Learning Algorithms
	1 Introduction
	2 Literature Review
	3 Experimental Setup
		3.1 Dataset
		3.2 Classification Techniques
		3.3 Performance Measures
		3.4 Implementation
	4 Results
	5 Conclusion
	References
Predictive Analysis of the Recovery Rate from Coronavirus (COVID-19)
	1 Introduction
	2 Related Work
	3 Experimental Data set
	4 Proposed Methodologies
		4.1 Predictive Analysis
	5 Result and Analysis
		5.1 Situational Analysis
		5.2 Future Predictive Analysis
		5.3 Evaluation of the Prediction Performance
	6 Conclusion and Future Scope
	References
Data Science and Data Analytics
Deep Learning: An Application Perspective
	1 Introduction
	2 Deep Learning Architecture
		2.1 Recurrent Neural Networks (RNN)
		2.2 Convolutional Neural Networks
		2.3 Characteristics of Deep Learning
	3 Deep Learning Applications Review
	4 Challenges Involved in Using Deep Learning
	5 Conclusion and Future Scope
	References
Detection of Weapons in Surveillance Scenes Using Masked R-CNN
	1 Introduction
	2 Related Works
	3 Weapon Detection Framework
		3.1 Backbone Network
		3.2 Regional Proposal Network
		3.3 Masked R-CNN
	4 Results and Discussion
	5 Conclusion
	References
Deep Learning Approaches for Spatio-Temporal Clues Modelling
	1 Introduction
		1.1 Literature Review
	2 Spatio-Temporal Feature
		2.1 Spatial Domain
		2.2 Temporal Domain
	3 Feature Extracting Proposal Models and Methods
		3.1 Two-Stream Approach
		3.2 Hybrid Multimodel Approach
	4 Results and Analysis
	5 Conclusion
	References
Covid-19—Analysis and Prediction—A Case Study Using Machine Learning
	1 Introduction
	2 Review Work
	3 Methods and Algorithms Used
	4 Result Analysis and Discussions
		4.1 Origin of the Virus
		4.2 Spread Out of the Virus
		4.3 Lockdown: The Savior or, not!
		4.4 Analysis of India
		4.5 Prediction Model for India
	5 Conclusion
	References
A Feature Based Classification and Analysis of Hidden Markov Model in Speech Recognition
	1 Introduction
	2 Literature Review
	3 Types and Applications
		3.1 First Order HMM
		3.2 Higher Order HMM
		3.3 Hidden Semi Markov Model
		3.4 Factorial HMM
		3.5 Second Order HMM
		3.6 Layered HMM
		3.7 Autoregressive HMM
		3.8 Hierarchal HMM
	4 Distinguishedness of the Related Work
		4.1 Comparative Study of the HMM Models
		4.2 Featured Based Significancy of the Developed HMM Models
	5 Conclusion
	References
Intelligent Hand Cricket
	1 Introduction
	2 Literature Survey
	3 Proposed System
		3.1 Data Set Creation
	4 Experimental Results
		4.1 Data Set
		4.2 Evaluation Metrics
		4.3 Performance Analysis
	5 Conclusion
	References
CNN Based Facial Expression Recognition System Using Deep Learning Approach
	1 Introduction
	2 Literature Review
	3 Proposed CNN Model for Facial Expression Recognition
		3.1 Convolutional Neural Network (CNN)
		3.2 Facial Expression Recognition Dataset Specifications
		3.3 Proposed CNN Model Architecture
	4 Implementation of Proposed CNN Model
	5 Experimental Results
	6 Application Areas
	7 Conclusion
	References
CNN-Based Handwritten Mathematical Symbol Recognition Model
	1 Introduction
	2 Stages in the Recognition
	3 Challenges
	4 Literature Review and Related Work
	5 Proposed Methodology
		5.1 Dataset Depiction
		5.2 Preprocessing
		5.3 Segmentation
		5.4 Classification
		5.5 Training and Testing CNN Model
	6 Conclusion
	References
A Concise Review of Acute Myeloid Leukemia Recognition Using Machine Learning Techniques
	1 Introduction
	2 Review Methodology
		2.1 Methodology
		2.2 Results
	3 Conclusion
	References
A Novel Approach for Web Mining Taxonomy for High-Performance Computing
	1 Introduction
	2 Web Usage Mining
	3 Background and Related Work
	4 Methods of Parallelism
	5 Proposed Work
	6 Advantages of GA Over SOM
	7 Conclusion
	References
Advance Computing
Performance Evaluation and Comparison of Various Personal Cloud Storage Services for Healthcare Images
	1 Introduction
	2 Literature Review
	3 Experimental Setup
	4 Results
	5 Summary
	6 Conclusion
	References
An Approach of Trustworthy Supply Chain Management of Ventilator and PPE in COVID-19 Pandemic Through Blockchain Technology
	1 Introduction
	2 Background
		2.1 COVID-19 Crisis and Supply Chain
		2.2 Supply Chain Change Due to COVID-19
		2.3 Blockchain Technology versus Medical Supply Chain
	3 Proposed Blockchain-Based Tracking Solutions
		3.1 Benefits of Blockchain-Based Solutions
	4 Conclusion
	References
The Practical Enactment of Robotics and Artificial Intelligence Technologies in E-Commerce
	1 Introduction
	2 Literature View
	3 Marketing-Mix
	4 Marketing Application Related and AI-Oriented
	5 How Does Artificial Intelligence Act on e-commerce?
	6 Growth of Artificial Intelligence (AI) in E-commerce Globally
	7 Conclusion
	References
Feasibility Study of Software Engineering Aspects of Bigdata Analytics Applications for Academicians
	1 Introduction
	2 Related Work
	3 Research Method
		3.1 Search Strategy
		3.2 Selection Process
	4 Result and Discussion
	5 Research Outcome
		5.1 Research Questions
		5.2 Proposed Research Objectives
	6 Conclusion and Future Work
	References
Security Concerns in IoT Systems and Its Blockchain Solutions
	1 Introduction
	2 Internet of Things
		2.1 Characteristics
		2.2 Security and Privacy Issues in the Internet of Things (Research Gaps)
	3 Blockchain Technology
		3.1 Role of Cryptographic Hash
		3.2 Characteristics of Blockchain
		3.3 Concepts Involved in Blockchain
		3.4 Probable Blockchain Solutions for the Internet of Things [Material and Methods]
	4 Results and Discussion
	5 Conclusion and Further Research Scopes
	References
Real-Time Tracking System for Object Tracking Using Internet of Things (IoT)
	1 Introduction
	2 Literature Review
	3 Objectives
	4 Methodology
		4.1 Collecting the Components for Real-Time Tracking System
		4.2 Building the Device
		4.3 Writing Business Logic Using Arduino Software (IDE)
		4.4 Using API
		4.5 Development of Web Portal and an Android Based Mobile App
		4.6 Testing the Device
		4.7 Web Application Deployment on Microsoft Azure/Amazon Web Service
	5 Implementation Levels
	6 Hardware Used and Circuit Diagram
	7 Conclusion
	8 Future Work
	References
Empirical Analysis on Consensus Algorithms of Blockchain
	1 Introduction
		1.1 Working of Blockchain
	2 Overview of Consensus Algorithms
	3 Discussion on Performance Analysis of Considered Consensus Algorithms
	4 Conclusion
	References
City Traffic Speed Characterization Based on City Road Surface Quality
	1 Introduction
	2 Data Acquisition
	3 Data Visualization
	4 Methodology
	5 Experimental Results
	6 Related Works
	7 Conclusion and Future Works
	References
An Overview of Recent Trends in OCR Systems for Manuscripts
	1 Introduction
		1.1 Various Issues Encountered in OCR
	2 Literature Studied
	3 Detailed Working of OCR
	4 Feature Extraction Techniques
	5 Classification Techniques
	6 Discussion and Analysis
	7 Conclusion
	References
Towards Integration of Blockchain and Machine Learning Technologies for Security in Smart Cities
	1 Introduction
	2 Literature Review
	3 Background
		3.1 Machine Learning
		3.2 Blockchain
		3.3 Integration of IoT, Machine Learning and Blockchain
	4 A Use Case Scenario
	5 Research Challenges
		5.1 Storage
		5.2 Privacy and Security
		5.3 Implementation
		5.4 Architecture
	6 Conclusion
	References
Computational Intelligence
Intention to Purchase Online Luxury Watches Among Indian Consumers in the New Normal Mode
	1 Introduction
	2 Theoretical Framework AND Hypothesis
	3 Methodology
		3.1 Designing of Questionnaire
		3.2 Methodology of Sampling
	4 Results and Analysis
		4.1 Encounters with the Purchasing of Luxury Goods
		4.2 Test of Reliability
		4.3 Factor Analysis Results
		4.4 Value Function Dimension
		4.5 Dimension of Experiential Value
		4.6 Dimension of Symbolic Value
		4.7 Dimension of Social Influence
		4.8 Vanity Physical
		4.9 Vanity Attainment
		4.10 Value of Hedonism
		4.11 Regression Analysis
	5 Conclusions
	References
Implementing Virtual Reality in Entertainment Industry
	1 Introduction
		1.1 Types of Virtual Reality
		1.2 Virtual Reality in the Mainstream Industry
	2 COVID-19 and Entertainment Industry
		2.1 A Solution to Support Both the Sides
		2.2 The Components of the System
	3 Model for Implementing Virtual Reality
		3.1 Prerequisite
		3.2 Define the Bridge Device IP Configuration
		3.3 Go to the End of the File and Add the Following: interface br0
		3.4 Ensure Wireless Operation
		3.5 Configure the Access Point Software
		3.6 Cost of the Mechanism
	4 Conclusion
	References
Women in Information Technology: How Organizationally Committed They Are
	1 Introduction
	2 Literature Review
	3 Research Methodology
	4 Data Analysis and Discussion
		4.1 Work Motivation
		4.2 Role of Emotional Intelligence
		4.3 Importance of Incentives
		4.4 Impact of Psychological Well-being and Loneliness of the Female Employees during COVID-19.
		4.5 Organizational Culture
		4.6 Family Duties and Responsibilities
	5 Implications
	6 Limitations and Future Research
	References
Comparative Analysis of Brain Tumor Segmentation with Fuzzy C-Means Using Multicore CPU and CUDA on GPU
	1 Introduction
	2 Background Works
	3 Methodology
		3.1 Single-Core CPU
		3.2 Multicore CPU
		3.3 GPU Processing
	4 Conclusion
	References
Survey on Podcasting to Improve Teaching Learning Process
	1 Introduction
		1.1 Podcast Definition
	2 Literature Survey
		2.1 Assessing Students
		2.2 Impact on Teaching Practice
		2.3 Lecturer Perceptions
	3 Conclusion
	References
Physiological Signals Based Anxiety Detection Using Ensemble Machine Learning
	1 Introduction
	2 Materials and Methods
		2.1 Dataset Description and Processing
		2.2 Predictive Model Selection
	3 Results
	4 Conclusion
	References
A Survey on Master Data Management Techniques for Business Perspective
	1 Introduction
	2 Current State of Art
	3 Observations
	4 Conclusion
	References
Reshaping Education Through Augmented Reality and Virtual Reality
	1 Introduction
	2 Augmented Reality (AR)
	3 Virtual Reality
	4 Augmented Reality and Virtual Reality: The Present Era
	5 Role of Augmented Reality and Virtual Reality in Education
	6 Virtual Reality and Augmented Reality: Future Ahead
	7 Conclusion
	References
Multiregional Segmentation of High-Grade Glioma Using Modified Deep UNET Model with Edge-Detected Multimodal MRI Images
	1 Introduction
	2 Related Work
	3 Data Preparation
		3.1 Data Preprocessing
	4 Method
		4.1 Feature Extraction with Edge Detection Method Using Sobel Operator
		4.2 Auto-feature Extraction of Edge-Detected Images Using Modified Deep U-Shaped Net (md-UNET)based CNN Model
	5 Experimentation and Results
	6 Conclusion
	References
Author Index




نظرات کاربران