ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Data Analytics and Management: Proceedings of ICDAM

دانلود کتاب تجزیه و تحلیل داده ها و مدیریت: مجموعه مقالات ICDAM

Data Analytics and Management: Proceedings of ICDAM

مشخصات کتاب

Data Analytics and Management: Proceedings of ICDAM

ویرایش: 1st ed. 2021 
نویسندگان: , , , ,   
سری: Lecture Notes on Data Engineering and Communications Technologies, 54 
ISBN (شابک) : 981158334X, 9789811583346 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 920 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 36 مگابایت 

قیمت کتاب (تومان) : 32,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 16


در صورت تبدیل فایل کتاب Data Analytics and Management: Proceedings of ICDAM به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تجزیه و تحلیل داده ها و مدیریت: مجموعه مقالات ICDAM نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب تجزیه و تحلیل داده ها و مدیریت: مجموعه مقالات ICDAM

این کتاب شامل مشارکت های منتشر نشده اصلی ارائه شده در کنفرانس بین المللی تجزیه و تحلیل داده ها و مدیریت (ICDAM 2020)، که در دانشگاه یان ویزیکوفسکی، لهستان، در ژوئن 2020 برگزار شد، ارائه شده است. و شبکه های ارتباطی این کتاب کار نوآورانه ای توسط دانشگاهیان، محققان و کارشناسان برجسته صنعت ارائه می دهد که برای محققان و دانشجویان جوان مفید است.


توضیحاتی درمورد کتاب به خارجی

This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2020), held at Jan Wyzykowski University, Poland, during June 2020. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.



فهرست مطالب

ICDAM-2020 Committees
	Steering Committee Members
	Advisory Committee
Preface
About This Book
Contents
About the Editors
A Forecasting-Based DLP Approach for Data Security
	1 Introduction
	2 Overview of DLP Approach
	3 Data Training Model
		3.1 Model Equations
		3.2 Model Accuracy
		3.3 Calculating Limit
	4 Experimental Result
	5 Conclusion
	References
Detection of Anterior Cruciate Ligament Tear Using Deep Learning and Machine Learning Techniques
	1 Introduction
	2 Related Work
		2.1 CNN Analysis
		2.2 Classification Algorithms Analysis
		2.3 Visualization Analysis
	3 Methodology
		3.1 Magnetic Resonance Imaging (MRI)
		3.2 Deep Learning Techniques
		3.3 Machine Learning Techniques
		3.4 Region of Interest (ROI)
	4 Proposed Solution
	5 Experimental Results and Analysis
	6 Future Scope
	References
A Study on Image Analysis and Recognition Using Learning Methods: CNN as the Best Image Learner
	1 Introduction
	2 Background
	3 Learning Algorithms
		3.1 Random Forest
		3.2 K-Nearest Neighbor
		3.3 Logistic Regression
		3.4 Support Vector Machine
		3.5 Artificial Neural Network and Convolutional Neural Network
	4 Experiment and Result Discussion
	5 Conclusion and Future Work
	References
ANN Model for Forest Cover Classification
	1 Introduction
	2 Proposed Methodology
		2.1 Getting Data
		2.2 Preprocessing
	3 Exploratory Study on Feature Selection
	4 Data Visualization
	5 Evaluation, Prediction, and Analysis
	6 Conclusions
	References
An Approach to Detect Sarcasm in Tweets
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Data Collection
		3.2 Data Pre-processing
		3.3 Feature Extraction
		3.4 Classification
		3.5 Evaluation
	4 Conclusion
	References
A Trust-Based Approach to Extract Social Relationships for Recommendation
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Trust-Based Approach
	4 Conclusion
	References
A Green 6G Network Era: Architecture and Propitious Technologies
	1 Introduction
	2 Development of Mobile Connection Networks
		2.1 Evolution of Mobile Connection Networks from 1G to 3G
		2.2 4G
		2.3 5G
		2.4 Motive of Green 6G
	3 Green 6G Network: Architecture
		3.1 From Terrestrial to Universal 3D Distribution
		3.2 Toward Intelligent Network
		3.3 Modern Structure of Network Protocol Stack
	4 Propitious Technologies of Green 6G
		4.1 New Communication Paradigm
		4.2 Fundamental Techniques
		4.3 Spectrum Communication Techniques
	5 Conclusion
	References
Onion Price Prediction for the Market of Kayamkulam
	1 Introduction
	2 Related Work
	3 Materials and Methods
		3.1 Dataset
		3.2 Methodology
	4 Results
	5 Conclusion
	6 Discussion
	References
A Technical Review Report on Deep Learning Approach for Skin Cancer Detection and Segmentation
	1 Introduction
	2 Discussion
	3 Datasets and Performance Measures
		3.1 PH2 Dataset
		3.2 ISIC 2017 and ISIC 2018
		3.3 ISBI 2016 and ISBI 2017
	4 Conclusion
	References
A Secure Epidemic Routing Using Blockchain in Opportunistic Internet of Things
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 System Model
		3.2 Consensus Algorithms
	4 Simulation and Results
	5 Conclusion
	References
Improved MAC Design-based Dynamic Duty Cycle for Vehicular Communications over M2M System
	1 Introduction
	2 System Model
	3 Medium Access Control Design
	4 Proposed CSMA Multi-layers Protocol for Intra-Cluster Vehicular Communication
	5 Simulation Results
	6 Conclusion
	References
Ruggedizing LTE Security Using Hybridization of AES and RSA to Provide Double Layer Security
	1 Introduction
		1.1 Symmetric-Key Algorithm
		1.2 Asymmetric-Key Algorithm
	2 Current Related Research Survey
	3 Proposed Hybrid Algorithm
	4 Encryption Process
	5 Decryption Process
	6 Results and Discussions
		6.1 Number of Keys Used
		6.2 Encryption and Decryption Time for Keys (K1 and K2)
		6.3 Time Taken for Encryption and Decryption Phases
		6.4 PSNR Analysis
		6.5 Validation Using Confusion and Diffusion Tests
	7 Conclusion
	References
Performance Evaluation of Merging Techniques for Handling Small Size Files in HDFS
	1 Introduction
	2 Problem of Small File in HDFS
	3 Related Work: A Brief Survey
	4 Merging Techniques for Handling Small Size Files
		4.1 HAR
		4.2 Sequence File
		4.3 CombineFileInputFormat
		4.4 Hadoop Streaming
	5 Empirical Evaluation
		5.1 Execution Time
		5.2 HDFSBytesRead
		5.3 HDFSBytesWritten
		5.4 HDFSReadOperation
		5.5 HDFSWriteOperation
	6 Conclusion
	References
Analysis, Visualization and Forecasting of COVID-19 Outbreak Using LSTM Model
	1 Introduction
	2 Related Work
	3 Materials and Methods
		3.1 Data
		3.2 LSTM
		3.3 Model and Architecture
		3.4 Steps for Training the LSTM
	4 Result and Discussion
		4.1 Plot Model Loss for Confirmed and Death Cases
		4.2 Diseases Trend Analysis
		4.3 Comparison of Prediction to Actual Values
		4.4 Tracking and Prediction of Epidemic
	5 Conclusion
	References
Virtual Machine Replication in the Cloud Computing System Using Fuzzy Inference System
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 Description and Membership Function (MF) of Input and Output Variables
		3.2 Proposed Fuzzy Rules for PMFIS1 and PMFIS2
	4 Performance Evaluation
	5 Conclusion
	References
A Dimensional Representation of Depressive Text
	1 Introduction
		1.1 Need for the Study
		1.2 Contributions
	2 Method
		2.1 Dataset
		2.2 Experimental Approach
	3 Results
	4 Discussion
	5 Conclusion and Future Work
	References
Machine Learning Algorithms to Predict Potential Dropout in High School
	1 Introduction
	2 Background and Related Work
	3 Machine Learning Techniques
		3.1 Logistic Regression
		3.2 KNN Algorithm
		3.3 Random Forest
		3.4 ROC Curve
	4 Data Set
		4.1 Data Processing
		4.2 Numerical Data
		4.3 Categorical Data
	5 Experiment and Result
		5.1 Training Phase
		5.2 Method of Analysis
	6 Discussion
	7 Conclusion
	References
Explaining Deep Learning-Based Classification of Textual Tweets
	1 Introduction
	2 Local Interpretable Model-Agnostic Explanations (LIME)
	3 System Architecture
		3.1 Dataset
		3.2 Data Preprocessing
		3.3 Model Training and Explanation
	4 Experiments and Evaluation
		4.1 Implementation Details
		4.2 Results
	5 Conclusion
	References
Effect of Quality of Existing Concrete Structures in Ajdabia Region, Libya
	1 Introduction
	2 Materials and methods
	3 Modeling Approach
		3.1 General
		3.2 Standards of Control
		3.3 Approved Criteria.
		3.4 Proposed Libyan-Based Approach
	4 Results and Discussions
		4.1 Standards of Control
		4.2 Evaluation and Approved of Concrete
	5 Conclusion
	6 Recommendations
	References
Machine Learning and Evolutionary Algorithms for the Diagnosis and Detection of Alzheimer’s Disease
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Initial Setup
		3.2 Selection of Evolutionary Algorithm
		3.3 Binary Ant Colony Optimization (ACO)
		3.4 Particle Swarm Optimization (PSO)
		3.5 Artificial Bee Colony Optimization (ABC)
		3.6 Bacterial Foraging Algorithm (BFOA)
	4 Implementation
		4.1 Input Parameters
		4.2 Dataset
	5 Results and Discussion
	6 Conclusion and Future Scope
	References
Comparison of Various Word Embeddings for Hate-Speech Detection
	1 Introduction
	2 Related Work
	3 Word Embedding Models
		3.1 Word2Vec
		3.2 GloVe
		3.3 Fast-Text
		3.4 ELMo (Embeddings from Language Models)
	4 Illustration of Vector Representation of Models on Sample Data
	5 Comparison and Graphs
		5.1 Word2Vec
		5.2 GloVe
		5.3 Fast-Text
		5.4 ELMo
	6 Hate Speech Detection Using Word Embedding Models
	7 Results and Discussion
	8 Conclusion
	References
Multimodal Biometric Algorithm Using IRIS, Finger Vein, Finger Print with Hybrid GA, PSO for Authentication
	1 Motivation and Literature Review
	2 Objectives and Scope
	3 Proposed System
		3.1 Iris Recognition
		3.2 Finger Vein Recognition
		3.3 Finger Print Recognition
		3.4 Normalization
		3.5 Score-Level Fusion and Optimization
	4 Results and Discussions
	5 Conclusion
	6 Future Enhancement
	References
Employing Real-Time Object Detection for Visually Impaired People
	1 Introduction
	2 Literature Survey
	3 System Design
		3.1 Hardware Specifications
		3.2 Software Requirement
	4 Image Classification
	5 Results and Discussions
	6 Conclusions
	7 Acknowledgement
	References
DDoS Attacks Impact on Data Transfer in IOT-MANET-Based E-Healthcare for Tackling COVID-19
	1 Introduction
		1.1 MANET and DDOS Attacks
	2 E-Healthcare
	3 AODV, SAODV and HWMP Routing Protocols
	4 Simulation Results
	5 Discussions and Conclusion
		5.1 Current and Future Developments
	References
BER Performance Analysis of MMSE with ZF and ML Symbol Detection for Hard Decision MU-MIMO LTE on Rayleigh Fading Channel
	1 Introduction
	2 Literature Review
	3 System Model
	4 Simulation Analysis
	5 Results
	6 Conclusion
	References
Traffic Congestion Analysis and Occupancy Parameter in India
	1 Introduction
	2 Traffic Measurement and Theory
		2.1 Traffic Flow Measurement
		2.2 Traffic Congestion from Theory and Measurement
		2.3 Definition of the Traffic Flow Characteristics from Measurement
	3 Traffic Congestion Analysis
		3.1 Traffic Congestion Analysis
		3.2 Comparison Between Congestion Loss and Measurement
	4 Conclusion
	Appendix
	References
Performance Evaluation and Comparison Study of OFDM in AWGN and Colored Noise Environment
	1 Introduction
	2 System Model
		2.1 OFDM Transmitter
		2.2 OFDM Receiver
		2.3 AWGN and Colored Noise
	3 Simulation Results—Comparison and Discussion
	4 Conclusion
	References
Performance Improvement Using Spline LS and MMSE DFT Channel Estimation Technique in MIMO OFDM Using Block-Type Pilot Structure
	1 Introduction
	2 System Model
	3 Channel Estimation
	4 Methodology
	5 Results and Analysis
	6 Conclusion
	References
Deep Learning Approach for Speech Emotion Recognition
	1 Introduction
	2 Speech Emotion Recognition Structure
		2.1 Database
		2.2 MFCC Features
	3 Convolution Neural Networks
		3.1 Overview of Convolution Neural Networks
		3.2 Proposed Convolution Neural Network
	4 Experimental Results
	5 Conclusions
	References
Detection of Cache Pollution Attacks in a Secure Information-Centric Network
	1 Introduction
	2 NDN Overview
	3 Literature Review
	4 Novel Based K-Means Clustering Technique
	5 Conclusion
	References
Effects of Social Distancing on Spread of a Pandemic: Simulating Trends of COVID-19 in India
	1 Introduction
	2 Literature Review
	3 Experimental Design
		3.1 Dataset
		3.2 SEIR-DH Model
		3.3 Regression Model
	4 Results and Discussions
	5 Conclusion
	References
Implementation of EAODV-Based SON for Balanced Energy-Efficient Routing Using Tree for WSN
	1 Introduction
		1.1 Self-configuring
		1.2 Self-optimization
		1.3 Self-healing
	2 Literature Survey
	3 Proposed Technique
		3.1 Sequential Process Explanation
		3.2 Source Code of E-ASER
		3.3 Tree-Based Cluster Formation
		3.4 Efficient Data Transfer
	4 Results and Discussion
		4.1 Energy Utilization
		4.2 Average No. of Dead Nodes
		4.3 Path Load
		4.4 Lifetime
	5 Conclusion
	References
An Efficient Technique for Traffic Estimation Using Virtual Trip Lines in Probe Vehicles
	1 Introduction
	2 Materials and Methods
		2.1 Gadget Observing Difficulties
		2.2 Proposed Work
		2.3 Single Vehicle Location
		2.4 Traffic Information Gatherer
	3 Results and Discussion
		3.1 Guide Coordinating Area Frequency
		3.2 Traditional Technique VS VTLD
	4 Conclusion
	References
Automated Attendance Management Using Hybrid Approach in Image Processing
	1 Introduction
	2 Existing System
		2.1 Face Recognition-Based Attendance System [1]
		2.2 Face Detection System for Attendance of Class’ Students [2]
		2.3 Ear-Based Attendance Monitoring System [3]
		2.4 Face Recognition Using Histogram of Oriented Gradients
		2.5 Face Recognition Using a Fuzzy Fisherfaces Classifier
		2.6 An Automatic Attendance System Using Image Processing
	3 Challenges Faced by Existing Systems/Limitations of Existing Work
	4 Working Model/Architecture of the System
		4.1 Face Detection
		4.2 Face Recognition
	5 Tools and Software Used
		5.1 Tools
		5.2 Software
	6 Conclusion
	References
Real-Time, YOLO-Based Intelligent Surveillance and Monitoring System Using Jetson TX2
	1 Introduction
		1.1 Contribution of the Paper
	2 Related Work
	3 Proposed Work
	4 System Implementation
		4.1 Environmental Setup
		4.2 Object Detection with YOLO V3
		4.3 Information Extraction and Transmission
		4.4 Information Uploading on Real-Time Database for Android App
		4.5 Information Collection and Analysis at Server
	5 Results
	6 Future Scope
	7 Conclusion
	References
Optimized Resource Allocation Technique Using Self-balancing Fast MinMin Algorithm
	1 Introduction
		1.1 Characteristics of Cloud Computing
		1.2 Advantages of Cloud Computing
		1.3 Limitations
	2 Literature Survey
	3 Existing Algorithm (MinMin Algorithm)
		3.1 Advantages of MinMin Algorithm
		3.2 Disadvantages of MinMin Algorithm
	4 Proposed Algorithm: Self-balancing Fast MinMin Algorithm (SBFMM)
		4.1 Algorithm for SBFMM
	5 Results
	6 Conclusion and Future Scope
	References
Routing Protocol Based on NSGA-II for Social Opportunistic Networks
	1 Introduction
	2 Related Work
	3 System Model
		3.1 Collaboration Probability
		3.2 Average Forwarding Delay Degree
		3.3 Multi-objective Evolutionary Algorithms
	4 Proposed Approach
		4.1 NSRP Algorithm and Its Details
	5 Conclusion and Future Work
	References
Connected Public Transportation System for Smart City
	1 Introduction
		1.1 Contributions
	2 Current Situation
		2.1 Implementation of ITS
	3 Connected Intelligent Transportation System
		3.1 Why India Is not Able to Implement ITS
		3.2 How to Implement ITS in India
		3.3 Advantages of Connected Transport System
	4 Proposed Approach
		4.1 Architecture
		4.2 Flow Diagram
	5 Results
	6 Conclusion
	References
Fibroid Segmentation in Ultrasound Uterus Images Using Wavelet Filter and Active Contour Model
	1 Introduction
	2 Related Works
	3 Materials and Methods
		3.1 Image Acquisition
		3.2 Preprocessing
		3.3 Segmentation Using Active Contour
	4 Results and Discussion
	5 Conclusion
	References
YOLOv3 Remote Sensing SAR Ship Image Detection
	1 Introduction
	2 Related Work
	3 Methodology
	4 Implementation Details
	5 Results and Discussion
	6 Conclusion
	References
Parametric Optimization of Improved Sensing Scheme in Multi-antenna Cognitive Radio Network over Erroneous Channel
	1 Introduction
	2 Analytical Framework
	3 False Alarm and Missed Detection Probability in the CUs
	4 Parametric Optimization for Improved Sensing Performance
		4.1 Cooperative User Density Optimization
		4.2 Optimization of Normalized Threshold and IED
	5 Conclusion
	References
Identification of Diabetic Retinopathy for Retinal Images Using Feed Forward Neural Network
	1 Introduction
	2 Proposed System
		2.1 Retinal Images
		2.2 Image Enhancement
		2.3 Feature Extraction
		2.4 Feed Forward Neural Network
	3 Results and Discussion
		3.1 Tabulation
	4 Conclusion
	References
Ameliorating Accuracy Using Dual Dimensionality Reduction on a Classification Data set
	1 Introduction
	2 Background Study
	3 Profuse Methodologies Used to Accomplish the Research
		3.1 Random Forests
		3.2 Factor Analyses
		3.3 Independent Component Analysis
		3.4 Singular Value Decomposition
		3.5 Principal Component Analysis
		3.6 t-Distributed Stochastic Neighbor Embedding (t-SNE)
		3.7 UMAP
		3.8 ISOMAP
	4 Experimental Study
		4.1 Factor Analysis
		4.2 Independent Component Analyses
		4.3 Singular Value Decomposition (SVD)
		4.4 Principal Component Analyses (PCA)
		4.5 t-Distributed Stochastic Neighbor Embedding (t-SNE)
		4.6 UMAP
		4.7 ISOMAP
	5 Results
	6 Comparison
	7 Conclusion and Future Work
	References
Data Imputation in Wireless Sensor Network Using Deep Learning Techniques
	1 Introduction
	2 Time Series Forecasting and Imputation
	3 Organization of Research Paper
	4 Literature Review
	5 Model Architecture
		5.1 Input Module
		5.2 Variable Length Sliding Window
		5.3 Model Module
		5.4 Output Module
	6 Flowchart
	7 Implementation of Proposed Work
	8 Result Analysis
	9 Conclusion
	References
Analysis of COVID-19 Data Using Machine Learning Techniques
	1 Introduction
	2 Pattern Identification for COVID-19
	3 Use of Machine Learning and AI in Medical Field to Predict the Patterns
	4 Suggested Machine Learning and AI Approaches to Predict the Patterns of COVID-19
	5 Analysis of COVID-19 Data Using Real Datasets
	6 Conclusion
	References
CapGen: A Neural Image Caption Generator with Speech Synthesis
	1 Introduction
	2 Related Work
	3 Dataset
	4 The Proposed CapGen Model
		4.1 Automatic Feature Extraction
		4.2 Caption Preprocessor
		4.3 Data Preparation
		4.4 Decoder
		4.5 Deployment
	5 Implementation
	6 Results
	7 Conclusion
	References
An Improved Method for Denoising of Electrocardiogram Signals
	1 Introduction
		1.1 Noises in ECG Signal
	2 Materials and Methods
		2.1 ECG Database
		2.2 Method
		2.3 Discrete Wavelet Transform
		2.4 Savitzky–Golay (SG) Filter
	3 Simulated Results and Discussion
		3.1 Removal of Baseline Wander
		3.2 Removal of High Frequency Noise
	4 Comparison with Existing Method
	5 Conclusion
	References
Product Recommendation Platform Based on Natural Language Processing
	1 Introduction
		1.1 Literature Review
	2 Proposed Methodology
		2.1 Collecting Data for Analysis
		2.2 Recommending Relevant Products
		2.3 Semantic Comparison of Descriptions
	3 PRODUCTS50 Database
	4 Results
		4.1 Qualitative Analysis
		4.2 User Study
	5 Conclusion and Future Work
	References
A Secured Supply Chain Network for Route Optimization and Product Traceability Using Blockchain in Internet of Things
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Blockchain
		3.2 Consensus Algorithms
		3.3 Route Optimization
	4 Simulation and Results
	5 Conclusions and Future Scope
	References
Enhancing Image Resolution and Denoising Using Autoencoder
	1 Introduction
	2 Literature Review
	3 Autoencoder
	4 Data Set
	5 Implementation and Results
	6 Image Denoising Stage
	7 Enhancement of Image Resolution
	8 Conclusion
	References
Detecting Organic Audience Involvement on Social Media Platforms for Better Influencer Marketing and Trust-Based E-Commerce Experience
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Characteristics of Dataset
		3.2 Analysis
	4 Results
	5 Conclusions
	6 Future Work
	References
A Framework for Sandboxing of Pandemic Spread
	1 Introduction
	2 Proposed System Framework
	3 Current Research Status
		3.1 Social Structures
		3.2 Spread Modelling
	4 Model Functionalities
		4.1 Graph Model
		4.2 Correlation Dimensions
		4.3 Correlation Rules
		4.4 Population Immunity Prediction
	5 Conclusion
	References
Hybrid Recommender System Using Artificial Bee Colony Based on Graph Database
	1 Introduction
	2 Related Work
		2.1 Introduction of Recommender Systems
		2.2 Introduction of Artificial Bee Colony Algorithm
		2.3 Graph Database
	3 Research Approach of the Hybrid Recommender System
		3.1 Preprocessing of Data
		3.2 Content-Based Filtering
		3.3 Collaborative Filtering
		3.4 K-Means and Artificial Bee Colony Algorithm
		3.5 Cosine Similarity
		3.6 Combining Results
	4 Implementation of Recommender System
	5 Conclusion and Directions for Future Work
	References
NPMREC: NPM Packages and Similar Projects Recommendation System
	1 Introduction
	2 Related Work
	3 Prerequisites
		3.1 Libraries.Io Web site
		3.2 Information Retrieval & Natural Language Processing Techniques Used in NPMREC
	4 Research Approach for Npmrec
		4.1 Recommendation Model
		4.2 Training and Testing
		4.3 Updating Data Set from User Feedback (Insertion of New Projects)
	5 Implementation, Results and Analysis
		5.1 Dataset Used
		5.2 Evaluation Metric
		5.3 Experimental Setting
		5.4 Results and Analysis
	6 Conclusion and Future Work
	References
Electronic Wallet Payment System in Malaysia
	1 Introduction
		1.1 Scope of the Study
	2 Literature Review
	3 Materials and Methods
		3.1 Methodology
	4 Results and Discussion
		4.1 Overview of E-Wallet in Malaysia
		4.2 The Technology Used in E-Wallet
		4.3 E-Wallet Companies in Malaysia
		4.4 E-Wallet Usage Among Students
	5 Discussion
	6 Conclusion
	Appendix A
	References
Implementation of Violence Detection System using Soft Computing Approach
	1 Introduction
	2 Video Surveillance
	3 Proposed Technique
	4 Experimental Results
	5 Conclusion
	References
An Algorithm to Design a Scalable Control Layer for a Software-Defined Network
	1 Introduction
	2 Related Work
		2.1 Static CPP Solutions
		2.2 Dynamic CPP Solutions
	3 Principles Involved
		3.1 Tree Robustness
		3.2 Request Handling Capacity of the Controller
		3.3 Latency Requirements and Possible Controller Location
		3.4 Notion of Pivot Node
	4 Algorithm
	5 Simulation Results
		5.1 Controller's Packet Processing Equality
		5.2 Average Depth of the Control Tree
		5.3 Anticipated Data Loss
	6 Conclusion
	7 Future Work
	References
Hybrid Model with Word2vector in Information Retrieval Ranking
	1 Introduction
		1.1 Ranking
		1.2 Ranking-Related Problems
		1.3 Evaluation Measures
		1.4 PSO
		1.5 SVM
		1.6 Word Embedding Using Word2Vector
		1.7 Objectives of Current Research
	2 Related Works
	3 Proposed Methodology
	4 Results and Discussion
	5 Experimental Evaluation
	6 Conclusion and Future Scope
	References
Heuristic Approach Towards COVID-19: Big Data Analytics and Classification with Natural Language Processing
	1 Introduction
	2 Methodology
		2.1 About the Dataset
		2.2 Primary Sequences on Which the Work is Based
		2.3 Data Storage
		2.4 Environment Setup
		2.5 Starting
		2.6 The Dataset Looks like
	3 Results
		3.1 K-mer Formation of Sequence or Natural Language Processing of the Data
		3.2 Individual Class Comparison of Dataset in Form of Graphs or Histograms Which is Very Important for Data Analysis
		3.3 Individual Nucleotide Comparison of Dataset in Form of Graphs or Histograms Which is Very Important for Data Analysis
		3.4 For Better Analysis We Did a 1 to 1 Nucleotide Comparison of Data
		3.5 Interpretation from the Above Plot
		3.6 Logistic Regression Applied in Order to Classify the Three Sequences
	4 Discussion
	5 Conclusion and Future Scope
	References
SSDA: Sleep-Scheduled Data Aggregation in Wireless Sensor Network-Based Internet of Things
	1 Introduction
	2 Background Overview
	3 Operational Functioning of SSDA
		3.1 Setup Phase
		3.2 Steady State Phase
		3.3 Sleep Scheduling
		3.4 Network Assumptions
	4 Simulations Results and Discussion
		4.1 Performance Metrics
	5 Conclusion
	References
Prediction Using Machine Learning in Sports: A Case Study
	1 Introduction
	2 Literature Survey
	3 Application of Machine Learning: Cricket as Case Study
	4 Problem Statement
	5 Materials and Methods
		5.1 Decision Tree and Random Forest
		5.2 Algorithm
		5.3 Logistic Regression
		5.4 Experimental Setup
	6 Results
	7 Conclusion
	References
Analysis of Vehicle Collision Prediction Algorithms Using CNN
	1 Introduction
	2 Preliminaries
	3 Database Used
	4 The Proposed Model
	5 The Process
	6 Results and Discussion
		6.1 The Base Models
		6.2 Best Performing CNNs
		6.3 Worst performing CNNs
		6.4 Trends
	7 Conclusion
	References
Multimodal Deep Learning Architecture for Identifying Victims of Online Death Games
	1 Introduction
	2 Related Literature Survey
	3 Research Challenges
	4 Proposed Architecture
		4.1 Algorithm and Framework
		4.2 Processing Images
		4.3 Processing Text
		4.4 Data Set and System Integration
		4.5 Limitations and Future Scope
	5 Discussion
	References
TS-GAN with Policy Gradient for Text Summarization
	1 Introduction
	2 Dataset
	3 Literature Review
	4 Proposed Work
		4.1 Ts-Gan
		4.2 Policy Gradient
	5 Results
	6 Conclusion
	References
Energy-Efficient Routing Protocols for Cluster-Based Heterogeneous Wireless Sensor Network (HetWSN)—Strategies and Challenges: A Review
	1 Introduction
		1.1 Preliminaries
		1.2 Outline
	2 Literature Review
	3 Classification of HetWSN
		3.1 Static Heterogeneous WSN (HetWSN)
		3.2 Mobile Heterogeneous WSN (HetWSN)
	4 Statistical Analysis
	5 Current Issues and Discussion in HetWSN
	6 Conclusion
	References
Voice-Based Gender Identification Using qPSO Neural Network
	1 Introduction
	2 Background
		2.1 Conventional Particle Swarm Optimisation Algorithm
		2.2 Quantum Optimisation
		2.3 Optimised Evolutionary Algorithm
	3 Methodology
		3.1 Dataset
		3.2 Preprocessing
		3.3 Classification
	4 Results and Discussions
	5 Conclusion
	References
A Machine Learning Approach for the Classification of the Buddha Statues of Borobudur (Indonesia)
	1 Introduction
	2 Literature Review
	3 Analysis of Buddha Statues Through the Application of Machine Learning
	4 Automatic Art Analysis
	5 Proposed Model for Identification of the Buddha Statues of Borobudur
	6 Experimental Setup and Results
	7 Conclusion
	References
Retrieval Mechanisms of Data Linked to Virtual Servers Using Metaheuristic Technique
	1 Introduction
	2 Review of the Literature
	3 Performance Analysis and Representation
		3.1 Implementation of Metaheuristic Approach
		3.2 Application of Ant Colony Optimization Towards Query Optimization
		3.3 Algorithm
		3.4 Experimental Analysis
	4 Optimization Criteria
	5 Discussion and Future Direction
	6 Conclusion
	References
Machine Learning Approaches for Psychological Research Review
	1 Introduction
	2 Machine Learning Approaches for Psychology
		2.1 State of the Art
	3 ML Tools and Frameworks
	4 Pros and Cons of Implementing Machine Learning Solutions
	5 Discussion and Conclusions
	References
Transformation of Higher Educational Institutions from Distance Learning to the E-Learning 5.0: An Analysis
	1 Introduction
		1.1 Legal Aspects of Implementing Remote Learning
		1.2 Organizational Aspects of Implementing Remote Teaching
		1.3 Technical Aspects of Implementing Remote Teaching
	2 Literature Review
	3 Methodology
	4 Results
		4.1 Students Attendance During Remote Classes
		4.2 Summary of the Analysis
	5 Future Work
	6 Conclusion and Future Scope
	References
Author Index




نظرات کاربران