دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1] نویسندگان: Aboul Ella Hassanien, Siddhartha Bhattacharyya, Satyajit Chakrabati, Abhishek Bhattacharya, Soumi Dutta سری: Advances in Intelligent Systems and Computing, 1286 ISBN (شابک) : 9811599262, 9789811599262 ناشر: Springer سال نشر: 2021 تعداد صفحات: 1030 [972] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 29 Mb
در صورت تبدیل فایل کتاب Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 1 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب فناوری های نوظهور در داده کاوی و امنیت اطلاعات: مجموعه مقالات IEMIS 2020، جلد 1 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب حاوی مقالات تحقیقاتی ارائهشده در کنفرانس بینالمللی فناوریهای نوظهور در دادهکاوی و امنیت اطلاعات (IEMIS 2020) است که در دانشگاه مهندسی و مدیریت، کلکته، هند، در ژوئیه 2020 برگزار شد. این کتاب در سه جلد تنظیم شده است. و شامل کارهای تحقیقاتی با کیفیت بالا توسط دانشگاهیان و کارشناسان صنعتی در زمینه محاسبات و ارتباطات، از جمله مقالات کامل، مقالات تحقیقاتی در حال انجام و مطالعات موردی مربوط به تمام زمینه های داده کاوی، یادگیری ماشین، اینترنت اشیا است. (IoT) و امنیت اطلاعات.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of things (IoT) and information security.
498518_1_En_OFC 498518_1_En_BookFrontmatter_OnlinePDF Preface Contents About the Editors 498518_1_En_1_PartFrontmatter_OnlinePDF Computational Intelligence 498518_1_En_1_Chapter_OnlinePDF Mathematical Modelling and Analysis of Walters Liquid Motion with Brownian Diffusion 1 Introduction 2 Mathematical Formulation 3 Method of Solution 4 Results and Discussion 5 Conclusion References 498518_1_En_2_Chapter_OnlinePDF Modelling of Two-Phase Fluid Flow Over a Stretching Sheet and Its Numerical Investigation 1 Introduction 2 Mathematical Formulation of the Problem 3 Method of Solution 4 Results and Discussion 5 Conclusions 6 Nomenclature References 498518_1_En_3_Chapter_OnlinePDF Boundary Layer Flow and Its Dual Solutions Over a Stretching Cylinder: Stability Analysis 1 Introduction 2 Mathematical Formulation 3 Stability Analysis 4 Results and Discussion 5 Conclusion References 498518_1_En_4_Chapter_OnlinePDF Towards a Conceptual Modelling of Ontologies 1 Introduction 2 Related Work 3 Conceptual Modelling of Ontology 4 Conclusion References 498518_1_En_5_Chapter_OnlinePDF Mathematical Modelling of Power Law Fluid Flow Through a Pipe and Its Rheology 1 Introduction 2 Mathematical Formulation of the Flow Analysis 3 Method of Solution 4 Results and Discussion 5 Conclusion References 498518_1_En_6_Chapter_OnlinePDF NeurolncRNA: A Database of LncRNAs Associated with Human Neurodegenerative Diseases 1 Introduction 2 Materials and Methods 2.1 Data Extraction from Literature 2.2 Retrieval of Sequence Information of the lncRNAs 2.3 Extraction of Sequence-Based Features of the Collected lncRNAs 2.4 Methodology of Development 3 Results and Discussion 3.1 Categorization of lncRNAs and their Literature Details 3.2 Different Sequence-Based Features of lncRNAs 4 Conclusion and Future Scope References 498518_1_En_7_Chapter_OnlinePDF Affective State Analysis Through Visual and Thermal Image Sequences 1 Introduction 2 Design of the Experiment 3 Emotion Classification 3.1 First Network: Face Detection 3.2 Second Network: Emotion Classification 4 Negative Affect Recognition 4.1 Training the HMM 4.2 Clustering of Emotion Sequences 5 Experimental Results 6 Conclusion References 498518_1_En_8_Chapter_OnlinePDF An Ensemble Deep Learning Method for Diabetes Mellitus 1 Introduction 2 Related Works 3 Dataset Description 4 Proposed Methodology 5 Results and Discussions 6 Conclusion and Future Direction References 498518_1_En_9_Chapter_OnlinePDF Memory Fluid Flow Past a Vertical Circular Cylinder and Its Energy Transfer 1 Introduction 2 Mathematical Formulation 3 Method of Solution 4 Results and Discussion 5 Conclusion References 498518_1_En_10_Chapter_OnlinePDF A Comparative Study on Financial Market Forecasting Using AI: A Case Study on NIFTY 1 Introduction 2 Preliminaries 2.1 Auto-Regressive Integrated Moving Average (ARIMA) 2.2 Facebook's PROPHET 2.3 Support Vector Regression (SVR) 2.4 Recurrent Neural Network (RNN) 3 Methodology 3.1 Data Pre-processing 4 Experimental Approach 5 Result Analysis 5.1 Root Mean Square Error (RMSE) 5.2 Mean Absolute Percentage Error (MAPE) 5.3 R2 6 Conclusion References 498518_1_En_11_Chapter_OnlinePDF Hydromagnetic Oscillatory Couette Flow of a Visco-Elastic Fluid with Dust in a Channel with Radiative Heat 1 Introduction 2 Mathematical Formulation 3 Method of Solution 4 Results and Discussion 5 Conclusion References 498518_1_En_12_Chapter_OnlinePDF Hard Exudates Detection: A Review 1 Introduction 2 Literature Review 3 Conclusion References 498518_1_En_13_Chapter_OnlinePDF Analysis of Visco-elastic Fluid Flow Over an Inclined Cylinder: A Numerical Approach 1 Introduction 2 Mathematical Formulations 3 Method of Solution 4 Results and Discussion 5 Conclusions References 498518_1_En_14_Chapter_OnlinePDF Convolution Neural Network-Driven Computer Vision System for Identification of Metanil Yellow Adulteration in Turmeric Powder 1 Introduction 2 Experimentation 2.1 Sample Preparation 2.2 Image Acquisition 2.3 CNN Model 3 Results and Discussion 4 Conclusion References 498518_1_En_15_Chapter_OnlinePDF Identification of Biologically Relevant Biclusters from Gene Expression Dataset of Duchenne Muscular Dystrophy (DMD) Disease Using Elephant Swarm Water Search Algorithm 1 Introduction 2 Problem Description 2.1 Biclustering 2.2 Initial Population 2.3 Cost Function 3 Proposed Method 3.1 Elephant Swarm Water Search Algorithm (ESWSA) 3.2 Chaotic Move Elephant Swarm Water Search Algorithm (CM-ESWSA) 4 Numerical Experiment 4.1 Analysis of the Results on Benchmark Functions 4.2 Convergence Analysis 4.3 Statistical Testing 4.4 Results on Real Life Problem 5 Conclusion References 498518_1_En_16_Chapter_OnlinePDF Shadow Detection Using DenseUNet 1 Introduction 2 A Brief Review of Shadow Detection 3 Proposed Method 3.1 Intuition 3.2 Basic UNet Architecture 3.3 DenseUNet Architecture 3.4 Preprocessing of Shadow Images 3.5 Training 4 Results and Discussions 4.1 Testing 4.2 Comparison to the State of the Art 4.3 Failure Cases 5 Conclusion References 498518_1_En_17_Chapter_OnlinePDF Map Merging for an Autonomous Multi-robotic System 1 Introduction 2 Proposed Method 2.1 Map-Merging Characteristics and Its Adaptation 2.2 The Map-Merging Method 3 Map Merging and Degrees of Freedom: A Mathematical Analysis 4 Demonstration of the Map-Merging Process 5 Conclusion References 498518_1_En_18_Chapter_OnlinePDF On Some Basic Graph Invariants of Unitary Addition Cayley Graph of Gaussian Integers Modulo n 1 Introduction 2 Preliminaries 3 Some Properties of Gaussian Integers 4 Clique Number and Chromatic Number of Gn[i] 5 Domination Number of Gn[i] 6 Conclusion References 498518_1_En_19_Chapter_OnlinePDF A Brief Survey of Token Curated Registries 1 Introduction 2 TCR and It's Working 2.1 Consumers 2.2 Candidates 2.3 Token Holders 2.4 The Incentive System of Token Curated Registries 3 Types of TCRs 3.1 TCR Classification Based on Design Pattern 3.2 TCR Classification Based on Data 3.3 TCR Classification Based on Implementation Metrics 4 Advantages of TCR 5 Applications or Use Cases of TCR 5.1 Journalism 5.2 Regulatory 5.3 Ocean Protocol 5.4 Deconet 5.5 Advertising 5.6 Medical 5.7 Userfeeds.io 5.8 Mapping 5.9 Video 5.10 Real Estate 5.11 Employment 6 TCR'S Open Challenges and Their Existing Solutions 6.1 Chicken-Egg Problem 6.2 Passive Token Holding/Speculation 6.3 Coin-Flipping 6.4 Parametric Issues 6.5 Order/Ranking in TCRs 6.6 Subjective Curation 6.7 Economic Attacks 6.8 Spam Attack 6.9 Registry Poisoning 6.10 Real Time Coordination Problem 6.11 Publicly Available Data 6.12 Nesting of TCRs 7 Conclusion and Future Work References 498518_1_En_20_Chapter_OnlinePDF Comparative Study of Effective Augmentation Method for Bangla ASR Using Convolutional Neural Network 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Collection 3.2 Data Augmentation 3.3 CNN Architecture 3.4 Linear Predictive Cepstral Coefficients (LPCC) 3.5 Mel-Frequency Cepstral Coefficients (MFCC) 4 Results and Discussion 4.1 Effect of Augmentation in LPCC Model 4.2 Effect of Augmentation in MFCC Model 4.3 Overall Evaluation 5 Conclusion References 498518_1_En_21_Chapter_OnlinePDF A Novel Human Activity Recognition Strategy Using Extreme Learning Machine Algorithm for Smart Health 1 Introduction 2 Related Work 3 Proposed Method 3.1 Feature Extraction 3.2 The Conventional ELM 3.3 Proposed Ensemble ELM 4 Experimental Setup 5 Results 6 Conclusion References 498518_1_En_22_Chapter_OnlinePDF Ranking Countries by Perception of Indigenous Companies: A Social Media Rank Metric 1 Introduction 1.1 Problem Statement 1.2 Solution Proposed 2 Existing Research 3 Data and Resources Used 3.1 GADM, the Database of Global Administrative Areas 3.2 Forbes Global 2000 3.3 Twitter Search API 4 Methodology Adopted 4.1 Technologies Used 4.2 Obtaining List of Companies Under Consideration from Forbes Global 2000 4.3 Collection of Relevant Tweets 4.4 Use of Vader Sentiment Library 4.5 Statistical Manipulation and Analysis 5 Calculations Done 6 Results 7 Conclusion 8 Shortcomings References 498518_1_En_23_Chapter_OnlinePDF AIDE—AI and IoT-Enabled Home Automation for Disabled and Elderly 1 Introduction 2 Related Works 3 Proposed Design 4 Methodology 4.1 Glove 4.2 Hub 4.3 AI Agent 4.4 Mobile Application 5 Results 6 Conclusion References 498518_1_En_25_Chapter_OnlinePDF Synthesizing Uniform Concentric Circular Array Antenna for Minimized Sidelobes Using Teaching–Learning-Based Optimization Algorithm 1 Introduction 2 Array Geometry with Problem Formulation 3 Teaching–Learning-Based Optimization (TLBO) 4 Simulation Results and Discussions 5 Conclusions References 498518_1_En_26_Chapter_OnlinePDF Comparing Performance of Ensemble-Based Machine Learning Algorithms to Identify Potential Obesity Risk Factors from Public Health Datasets 1 Introduction 2 Related Work 3 Methodology 3.1 Data Collection 3.2 Data Processing 3.3 Statistical Analysis 3.4 Model Training and Testing 3.5 Model Evaluation 3.6 Assessment of Body Composition 4 Results and Discussion 5 Conclusion References 498518_1_En_27_Chapter_OnlinePDF Krylov Subspace Method Using Quantum Computing 1 Introduction 1.1 Qubits 1.2 Deutsch-Jozsa Oracle 2 Related Works 2.1 Arnoldi’s Method 3 Classical Algorithm 4 Proposed Algorithm 5 Result 6 Conclusion References 498518_1_En_28_Chapter_OnlinePDF An IoT-Based Cryptographic Algorithm: Mapping the Credentials for Micro-application in Single Column 1 Introduction 2 Algorithmic Concept and Description 2.1 Interference and Algorithm Robustness 2.2 Configuration and Review 2.3 Usage 2.4 User Interface 3 Proposed Methodology 3.1 Single-Textfield Performance 3.2 Text Encryption Algorithm. 3.3 Information Entropy Analysis 4 Results and Discussion 4.1 Comparative Study of the Proposed Model 4.2 Information Exchange Simulation 5 Conclusion References 498518_1_En_29_Chapter_OnlinePDF Identification of Disease Critical Genes in Preeclampsia Using Squirrel Search Algorithm 1 Introduction 2 Gene Expression Data 3 Gene Selection by Sample Classification Using SSA-SVM, SSA-KNN, and SS-RF 3.1 k-Nearest Neighbor (kNN) 3.2 Support Vector Machine (SVM) 3.3 Random Forest Classifier (RF) 3.4 Squirrel Search Algorithm (SSA) 4 Experimental Results 5 Conclusion References 498518_1_En_30_Chapter_OnlinePDF An Approach for Bengali News Headline Classification Using LSTM 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Collection 3.2 Data Pre-processing 3.3 Word Embedding 3.4 Model 3.5 Long Short-Term Memory 3.6 Applied Model 4 Experimental Results and Discussion 5 Conclusion and Future Work References 498518_1_En_31_Chapter_OnlinePDF Artistic Natural Images Generation Using Neural Style Transfer 1 Introduction 2 Related Study 2.1 Overview of Neural Style Transfer 2.2 VGG19 Network Model and Transfer Learning 2.3 ImageNet Dataset 3 Proposed Methodology 4 Experimental Analysis 4.1 Implementation Process 4.2 Result Analysis 5 Future Work and Discussion 6 Conclusion References 498518_1_En_32_Chapter_OnlinePDF Routh-Hurwitz Criterion for Stability: An Overview and Its Implementation on Characteristic Equation Vectors Using MATLAB 1 Introduction 2 Routh-Hurwitz Stability Criterion 2.1 Structure of the Routh-Hurwitz Criterion 2.2 Special Cases in the Stability Criterion 2.3 Advantages and Disadvantages of the Criterion 3 Implementation Using MATLAB 4 Conclusions References 498518_1_En_33_Chapter_OnlinePDF Path Finding Algorithms 1 Introduction 2 Dijkstra’s Algorithm 3 A* Search 4 Greedy Best-First Search 5 Breadth-First Search 6 Depth-First Search 7 Result 8 Conclusion References 498518_1_En_34_Chapter_OnlinePDF Improved Transmission Map for Dehazing of Natural Images 1 Introduction 2 The Dark Channel Prior (DCP) 3 Proposed Haze Removal Algorithm (HRA) 3.1 Input Hazy Image 3.2 Down Sampling 4 Dark Channel Prior (DCP) 4.1 Estimation of Transmission Map (TM) 4.2 Guided Filtering and TM 4.3 Recovery Scene Radiance (SR) 4.4 Contrast and Color Calibration 5 Results and Discussions 6 Conclusion References 498518_1_En_35_Chapter_OnlinePDF Comprehensive Operation of Personalized Astute Wheelchair Having Portable Rooftop and Integrated Piezoelectric Engendered Tires to Assist Societal Advance 1 Introduction 2 Proposed Work 2.1 Specifications 2.2 Use Case 2.3 Design Methodology 2.4 Work Overview 3 Outcome Analysis: Assembling and Dispersion 4 Conclusion References 498518_1_En_36_Chapter_OnlinePDF Robust Watermarking Schemes for Copyright Protection of Digital Data: A Survey 1 Introduction 1.1 Digital Watermarking Process 2 Characteristics and Applications of Digital Watermarking 3 State-of-The-Art Methods 4 Conclusion References 498518_1_En_37_Chapter_OnlinePDF Non-invasive Vein Detection and Visualization Using Fuzzy 1 Introduction 2 Proposed System 3 Results and Discussion 4 Conclusion References 498518_1_En_38_Chapter_OnlinePDF Finger Vein Pattern Detection Using Neuro Fuzzy System 1 Introduction 2 Need for Detection on Vein 3 Problems Related with Previous Work for Vein Imaging 4 Near-Infrared Principle (NIR) Imaging 5 Overview of the Required Scheme 6 Implementation and Processing 7 Performance Analysis and Test Results 8 Conclusion References 498518_1_En_39_Chapter_OnlinePDF An Efficient Rash Driving Identification System Based on Neural Networks Using TensorFlow 1 Introduction 2 Literature Survey 3 Description of Datasets and Experimental Setup 4 Results and Discussion 5 Conclusion and Future Scope References 498518_1_En_2_PartFrontmatter_OnlinePDF Advance Computing 498518_1_En_40_Chapter_OnlinePDF Home Automation Using ESP8266 of IOT Module 1 Introduction 2 System Model 3 Proposed Technique 4 Results and Discussion 5 Conclusion References 498518_1_En_41_Chapter_OnlinePDF Optimization of Quadratic Curve Fitting from Data Points Using Real Coded Genetic Algorithm 1 Introduction 2 Genetic Algorithm Applied to Least Square Curve Fitting 3 Curve Fitting Using Real Coded Real Coded Genetic Algorithm 3.1 Coding and Genetic Operation 4 Proposed Method 4.1 Taking a Quadratic Equation as Curve 4.2 Applying the Given Dataset 4.3 Encoding Real Coded Genetic Algorithm 4.4 Create and Plot a Quadratic 4.5 Simulating the RCGA and Curve Code 5 Results and Analysis 5.1 Case 1 5.2 Case 2 6 Conclusion Reference 498518_1_En_42_Chapter_OnlinePDF Blockchain Leveraged Incentive Providing Waste Management System 1 Introduction 2 The Proposed Effective Smart Waste Management 3 Implementation of Sensor-Based Smart Dustbin 4 Conclusions References 498518_1_En_43_Chapter_OnlinePDF Securing Healthcare Data with Healthcare Cloud and Blockchain 1 Introduction 1.1 Related Works 1.2 Research Contribution of This Work 1.3 Organization 2 System Model and Problem Formulation 2.1 Resources 2.2 Cost of Operation 2.3 Integration 3 Proposed Scheme 3.1 Methodology 3.2 Decentralization 3.3 Interoperability 3.4 Smart Contract 3.5 Validation 3.6 Healthcare Cloud 4 Performance Evaluation 4.1 Numerical Settings 4.2 Results 5 Conclusion and Future Work References 498518_1_En_44_Chapter_OnlinePDF Automated Multimodal Biometric System with Ear and Side Profile Face for Human Identification 1 Introduction 2 Related Works 3 Proposed Method 4 Theoretical Background 4.1 Skin Segmentation Using YCbCr 4.2 Texture Feature Extraction Using SFTA 4.3 Banana Wavelets 5 Experimental Results 6 Conclusions References 498518_1_En_45_Chapter_OnlinePDF A Recommendation System for Customizable Items 1 Introduction 2 Classification of Recommodation Techniques 2.1 Collaborative Filtering Recommendation Systems 2.2 Content-Based Filtering Recommendation Systems 2.3 Knowledge-Based Recommendation Systems 2.4 Demographic-Based Recommendations Systems 2.5 Hybrid Recommendation Systems 3 Proposed Method 3.1 Using Content-Based Filtering 3.2 Using Constraint-Based Filtering 3.3 Combining Rating Predictions 4 Evaluation 5 Experimental Results and Analysis 6 Conclusion References 498518_1_En_46_Chapter_OnlinePDF Hydromagnetic Visco-elastic Boundary Layer Slip Flow and Heat Transfer Over a Flat Plate 1 Introduction 2 Mathematical Formulation 3 Results and Discussion 4 Conclusion References 498518_1_En_47_Chapter_OnlinePDF Application of Carbon Nanotube in Targeted Drug Delivery System 1 Introduction 2 Properties of Carbon Nanotube 3 Nanotechnology in Medical Science 4 Application of CNTs in Targeted Drug Delivery 5 Advantages of Carbon Nanotubes Over Conventional Cancer Therapy 6 Drug Delivery 7 Conclusion References 498518_1_En_48_Chapter_OnlinePDF Indoor Air Pollutant Prediction Using Time Series Forecasting Models 1 Introduction 2 Related Work 3 Time Series Analysis of Indoor Pollution Data 4 Implementation and Result 5 Conclusion References 498518_1_En_49_Chapter_OnlinePDF Implementation of Automatic Soil Moisture Dearth Test and Data Exertion Using Internet of Things 1 Introduction 2 Related Works 3 Methodology 3.1 Soil Moisture Sensor 3.2 Solenoid Valve 3.3 Node MCU 4 Results and Conclusion 5 Conclusion References 498518_1_En_50_Chapter_OnlinePDF IDPchain: Blockchain-Based International Driving Permit and Traffic Crime Reporting System 1 Introduction 2 Related Work 3 Our Contribution 4 IDPchain System Model 4.1 System Entities 4.2 Steps Involved in the System 5 Implementation 6 System Analysis 7 Conclusion References 498518_1_En_51_Chapter_OnlinePDF Hydromagnetic Visco-elastic Boundary Layer Flow Past an Exponentially Stretching Sheet with Suction or Blowing 1 Introduction 2 Mathematical Formulation 3 Results and Discussion 4 Conclusion References 498518_1_En_53_Chapter_OnlinePDF Reimagining the Indian Healthcare Ecosystem with AI for a Healthy Smart City 1 Introduction 2 Smart Healthcare 3 Global Healthcare Issues 4 Healthcare in India 5 AI and IoT in Healthcare 6 Conclusions References 498518_1_En_54_Chapter_OnlinePDF Analysis of Blockchain Induced Cryptocurrency: Regulations and Challenges of Cryptocurrencies 1 Introduction 2 Cryptocurrency Market Analysis 2.1 Appearing and Developed Economic Markets 2.2 Scalability Drawbacks 2.3 Indian Cryptocurrency Market 2.4 Reserve Bank of India and Crypto 3 Blockchain Application in Cryptocurrency 4 Threats in Cryptocurrency 5 Capability of Cryptocurrency 5.1 Overall Compliance 5.2 Substituting Active Network 5.3 Use as Virtual Currency 6 Conclusion References 498518_1_En_55_Chapter_OnlinePDF An Optimization Algorithm for IoT Enabling Technology 1 Introduction 1.1 Path Optimization 2 Fusion 2.1 Sensor Selection 3 Results and Discussion 4 Conclusion References 498518_1_En_56_Chapter_OnlinePDF Emerging Trends in Medical Science Using Biometric 1 Introduction 2 Advantages of Using Biometrics in Medical Science 3 Challenges for Biometrics in Medical Science 3.1 Low Certainty in Identification 3.2 Storage and Accessibility of Data 3.3 Cost Efficiency 3.4 Susceptible Data 3.5 Linking Biometrics to ID’s 3.6 Alteration in Already Stored Information 4 Case Study 5 Conclusion References 498518_1_En_57_Chapter_OnlinePDF Plant Disease Detection Using Convolutional Neural Networks and Remedy Recommendation System 1 Introduction 2 Related Works 3 Materials and Methods 3.1 Dataset 3.2 Methodology 4 Experimental Results 5 Conclusions References 498518_1_En_58_Chapter_OnlinePDF Spatio-Temporal Prediction of Noise Pollution Using Participatory Sensing 1 Introduction 2 Related Works 3 Problem Statement and Proposed Approach 3.1 Problem Statement 3.2 Architecture of the System 3.3 Method 4 Experiment 5 Performance Metrics and Results 6 Conclusion References 498518_1_En_59_Chapter_OnlinePDF Two-Way Nanoscale Automata 1 Introduction 2 Preliminaries and Definitions 3 Two-Way Non-Deterministic Watson–Crick Automata 4 Complexity of Two-Way Nanoscale Automata 5 Conclusion References 498518_1_En_60_Chapter_OnlinePDF Multi-head Watson–Crick Quantum Finite Automata 1 Introduction 2 Preliminaries and Definitions 3 Computational Complexity of Multi-head Watson–Crick Quantum Finite Automata 4 Conclusion References 498518_1_En_61_Chapter_OnlinePDF Handwritten Signature Verification System Using IoT 1 Introduction 2 Literature Survey 3 Comparative Study 4 Proposed Work 5 Dataset 5.1 CEDAR 5.2 GPDS300 5.3 BHSig260 Signature 5.4 GPDS Synthetic 6 Implementation 6.1 Flow Chart 7 Conclusion and Future Scope References 498518_1_En_62_Chapter_OnlinePDF A Framework for Blockchain Technology Including Features 1 Introduction 2 Technology Behind Blockchain 2.1 Decentralized/P2P Network 2.2 Algorithm of Hashing 2.3 Public-Key Cryptography 2.4 Algorithm of Consensus 3 Blockchain Features 4 Risks in Blockchain 4.1 51% Vulnerability 4.2 Private Key Security 4.3 Criminal Activity 4.4 Exposing Identity 5 Conclusions References 498518_1_En_63_Chapter_OnlinePDF Blockchain-Based Network Architecture for Accountable Auctions and to Overcome Resource Problems 1 Introduction 2 Theoretical Background 3 Features of Blockchain 3.1 Attributable 3.2 Accuracy 3.3 Trust and Efficiency 3.4 Security 4 System Workflows and Network Design Architecture 4.1 Secure Data Transmission and Authentication 4.2 Network Protocol and Mining 4.3 Intelligent Nodes Mapping 5 Proposed Algorithm for Auction Management and Accountability 6 Conclusion References 498518_1_En_64_Chapter_OnlinePDF Proposed Secure and Robust Voting System Using Blockchain Conceptual Framework 1 Introduction 2 Voting System 2.1 EVM (Electronic Voting Machine) 2.2 Internet Voting 2.3 Blockchain Enable Voting 3 Design of Building Conceptual Framework (Proposed Methodology) 3.1 Digital Identity Generation 3.2 Voter Pre-authentication Process 3.3 Voter Post-authentication Process 3.4 Recording of Vote on Server 3.5 Decryption and Counting of Votes 3.6 Audit Process 4 Discussion and Future Work 4.1 Related Work 5 Conclusion References 498518_1_En_65_Chapter_OnlinePDF Dynamic Functional Bandwidth Kernel-Based SVM: An Efficient Approach for Functional Data Analysis 1 Introduction 2 Methodology 3 Results and Discussions 3.1 Experimental Setup 3.2 Datasets Used 3.3 Quantitative Performance Comparison 4 Conclusions References 498518_1_En_66_Chapter_OnlinePDF Software as a Service for Upcoming Industries 1 Introduction 2 Cloud Computing Sharing Model 3 SPI Model of Cloud Computing 3.1 Software as a Service 3.2 SaaS Architecture 4 Characteristics of SaaS Business Model 5 Risks and Challenges to Adopting SaaS 6 Result and Implementation 7 Conclusion References 498518_1_En_67_Chapter_OnlinePDF A Ubiquitous Indoor–Outdoor Detection and Localization Framework for Smartphone Users 1 Introduction 2 Proposed Framework 2.1 Site Survey and Data Collection 2.2 Feature Modeling 2.3 Classification Process 3 Experimental Results 4 Conclusion References 498518_1_En_68_Chapter_OnlinePDF Coalescence of Artificial Intelligence with Blockchain: A Survey on Analytics Over Blockchain Data in Different Sectors 1 Introduction 2 Sector-Wise Review 2.1 Medical Healthcare 2.2 Internet of Things (IoT) 2.3 Cryptocurrency 3 Conclusion References 498518_1_En_69_Chapter_OnlinePDF Biometric Door Lock Using Mobile Fingerprint 1 Introduction 2 Related Works 3 Proposed System 4 Conclusion References 498518_1_En_70_Chapter_OnlinePDF Overview for Creating mHealth Application 1 Introduction 1.1 Background 1.2 Objective 2 Literature Review 2.1 Runtastic Running and Fitness [6] 2.2 Google Fit [7] 2.3 Fitbit [8] 2.4 Conclusion 3 Application Design and Application Modules 3.1 Application Modules 4 Exercise and Various Health-Related Indexes 5 Results 6 Conclusion References 498518_1_En_71_Chapter_OnlinePDF Application and Challenges of Blockchain with IoT 1 Introduction 2 Allied Work 2.1 Blockchain 2.2 Internet of Things (IoT) 2.3 Integration of Blockchain with IoT 3 Application of Blockchain with IoT 3.1 Banking 3.2 Trade Finance 3.3 Smart Devices 3.4 Healthcare 3.5 Public Sectors 3.6 Supply Chain Sensor 4 Research Challenges 4.1 Privacy 4.2 Scalability 4.3 Blockchain Security 4.4 Trusted Oracles 4.5 Quantum Computing 4.6 Governance 5 Conclusion and Future Scope References 498518_1_En_72_Chapter_OnlinePDF Conservation of Water and Power Using Solar Panel and Raspberry Pi 1 Introduction 2 Literature Survey 3 Methodology 3.1 Rain Water Harvesting System 3.2 Overhead Tank Automation 3.3 Billing Method 3.4 Water Quality Measurement 3.5 Live Streaming of Water Tank 3.6 Connectivity 4 Conclusion References 498518_1_En_73_Chapter_OnlinePDF Water Monitoring and Conservation Using IOT with User-Friendly Interfaces 1 Introduction 2 Literature Survey 3 Methodology 3.1 Rain Water Harvesting System 3.2 Overhead Tank Automation 3.3 Water Quality Measurement 3.4 Billing Method 3.5 Live Streaming of Water Tank 3.6 Connectivity 4 Results and Discussion 5 Conclusion and Future Work References 498518_1_En_74_Chapter_OnlinePDF Delivering Green Supply Chain Using Blockchain Technology for Sustainable Environment: A Survey 1 Introduction 2 Literature Review 2.1 Utilization of Blockchain in Supply Chains of Start-Ups 3 Proposed Methodology 4 Results 5 Conclusion References 498518_1_En_75_Chapter_OnlinePDF An Intelligent Embedded AC Automation Model with Temperature Prediction and Human Detection 1 Introduction 2 Proposed System 3 System Design and Architecture 3.1 System Overview 4 Implementation 5 Conclusion References 498518_1_En_76_Chapter_OnlinePDF ColdBlocks: Quality Assurance in Cold Chain Networks Using Blockchain and IoT 1 Introduction 2 Architecture 3 System Analysis and Design 3.1 Smart Contract Modeling 4 Experimental Results and Analysis 5 Conclusion References 498518_1_En_77_Chapter_OnlinePDF A Comparative Study for Analysis and Prediction of Stock Market Movement 1 Introduction 2 Related Work 3 Dataset and Methodology 3.1 Datasets Used in the Experiment 3.2 Methodology 3.3 ANN and LSTM 3.4 SVM and Ensemble Learning Classifier 3.5 LR, DT, and KNN 4 Experimental Setup 5 Result Analysis 6 Conclusion References 498518_1_En_78_Chapter_OnlinePDF Autonomic Cloud Computing: A Survey Using IBM SPSS Tool 1 Introduction 2 Literature Review 3 Results and Analysis 3.1 Reliability Test 3.2 Hypothesis Testing 4 Conclusion References 498518_1_En_79_Chapter_OnlinePDF An Exploration on the Study of Methodology of Fish Tracking System Using Heat Map 1 Introduction 1.1 Fish Tracking System 1.2 Technique of Heat Map 2 Literature Survey 3 Technical Overview 3.1 Dataset 3.2 Fish Tracking System Using Weather Detection 3.3 Attribute Extraction 4 Results and Reports 5 Conclusion 6 Implications for Future Research Reference 498518_1_En_80_Chapter_OnlinePDF Enhancing Number Sense of Dyscalculia Learners by Pedagogical Agents: A Review 1 Introduction 2 Intelligent Tutoring System Architecture 3 Pedagogical Agent Framework 3.1 Design of Pedagogical Agent 3.2 Roles and Functions of Pedagogical Agent 3.3 Characteristics of Learning Environment 3.4 Characteristics of Learner 4 Existing Pedagogical Agents 4.1 Single Pedagogical Agent 4.2 Multi-agents 4.3 Intelligent Tutoring System Evaluation 4.4 Learning Disabled Systems 5 Future Aspects and Recommendations 6 Conclusion References 498518_1_En_81_Chapter_OnlinePDF An IoT-Based Traceability Framework for Small-Scale Farms 1 Introduction 2 Theoretical Background 2.1 IoT in Supply Chain 2.2 Traceability in IoT 2.3 Security Issues in IoT 3 Proposed Framework 4 Methodology 5 Experiments and Results 6 Conclusion and Future Scope References 498518_1_En_82_Chapter_OnlinePDF Smart Water Distribution Control System for a Smart Building 1 Introduction 2 Literature Review 3 Implemented System 4 Conceptual Diagram 5 Implementation Details 6 Results Obtained (Screenshots) 7 Conclusion References 498518_1_En_83_Chapter_OnlinePDF A Review on P2P File System Based on IPFS for Concurrency Control in Hadoop 1 Introduction 2 Related Work 3 Conflict-Free Replicated Data Type (CRDT) 4 Peerpad 5 Storage of Files on IPFS 6 Methodology 7 Working 8 Implementation 8.1 Single-Phase Locking Protocol 8.2 Two-Phase Locking Protocol 9 Execution 10 Drawbacks 11 Conclusion References 498518_1_En_84_Chapter_OnlinePDF Securing Internet of Things: Attacks, Countermeasures and Open Challenges 1 Introduction 2 Reasons for Security Challenges in IoT 2.1 Integration with Physical World 2.2 Communication and Heterogenous Gadgets 2.3 Constraints of Resources 2.4 Privacy 2.5 The Large Scale 3 Security Threats in IoT 3.1 Security Threats at the Perception Layer 3.2 Security Threats at Communication Layer 3.3 Security Threats at the Support Layer 4 Countermeasures Against Various Attacks 4.1 IEEE 802.15.4 4.2 ZigBee 4.3 Z-Wave Security 4.4 LoRaWan Security 4.5 TLS Security 4.6 Firewalls 5 Open Issues and Future Research Challenges 5.1 Security 5.2 Scalabilty 5.3 Overhead and Packet Retransmission 6 Conclusion References 498518_1_En_85_Chapter_OnlinePDF Internet of Things (IoT) Toward 5G Network: Design Requirements, Integration Trends, and Future Research Directions 1 Introduction 2 Background and Current Research 3 Introduction to IoT 3.1 Characteristics of IoT 3.2 IoT Design Requirements 4 Introduction to 5G 4.1 GSM 4.2 UMTS 4.3 LTE 5 Integration of 5G and IoT 5.1 5G-Enabled IoT 5.2 Wireless Networks Used in 5G 5.3 Applications of 5G in IoT 6 Future Research Trends 6.1 Deployment and Coverage 6.2 Device Support 6.3 Frequency Bands 6.4 Privacy and Security 6.5 Deployment Cost 7 Conclusion and Future Work References 498518_1_En_86_Chapter_OnlinePDF A Study-Based Review on Blockchain Technology for IoT 1 Introduction 2 Blockchain Basics 2.1 Characteristics of Blockchain 3 Different Types of Blockchains 4 Determining the Requirement of Blockchain in IoT Application 5 Applications of Blockchain for the Internet of Things 6 Incorporation of Blockchain in Internet of Things 7 Conclusion References 498518_1_En_87_Chapter_OnlinePDF Secure Cloud Services Using Quantum Neural Network 1 Introduction 2 State of the Art 2.1 Research Gap 3 Proposed Model 4 Experimental Setup and Result 5 Conclusions References 498518_1_En_88_Chapter_OnlinePDF A Review of Secure Cloud Storage-Based on Cloud Computing 1 Introduction 2 Applications of Cloud 3 Classification of Cloud 3.1 Public Cloud 3.2 Private Cloud 3.3 Community Cloud 3.4 Hybrid Cloud 4 Cloud Computing Services 4.1 IAAS/Infrastructure as a Service 4.2 PAAS/Platform as a Service 4.3 SAAS/Software as a Service 5 Cloud Computing 6 Benefits of Cloud Computing 6.1 Cost Reduction / Efficiency and 24*7 Availability 6.2 Virtualization, Reliability, and Mobility 6.3 Security 6.4 Elasticity and Quick Software Deployment 7 Issues in Cloud Computing 7.1 Network Connectivity Dependency 7.2 Security Concern 7.3 Interoperability 8 Challenges in Cloud Computing 8.1 Making the Correct Choice 8.2 Absence of Administrative Support 8.3 Loss of Control 8.4 Privacy 9 Introduction to Cloud Storage 10 Advantages of Cloud Storage 10.1 Easy Access 10.2 Cost Savings 10.3 Disaster Healing/Recovery 10.4 Easy to Send Files 10.5 Software 11 Disadvantages of Cloud Storage 11.1 Dependent on an Internet Connection 11.2 Bandwidth 11.3 Software 11.4 Downtime 12 Popular Cloud Storage Available 13 Result and Conclusion References 498518_1_En_89_Chapter_OnlinePDF IOT-Based Advanced Smart Patient Monitoring System 1 Introduction 2 Methodology 3 Results 4 Discussions 5 Conclusion References 498518_1_En_90_Chapter_OnlinePDF Analyzing Effects of Architectural Alternatives on Performance of Blockchain 1 Introduction 2 Literature Survey 3 Description of Datasets and Experimental Setup 4 Results and Discussion 5 Conclusion and Future Scope References 498518_1_En_91_Chapter_OnlinePDF Real-Time Driver’s Eye Closure, Yawning Detection for Drowsiness Analysis and Gazing Detection for Distraction Analysis 1 Introduction 2 Literature Survey 3 Proposed Algorithm 3.1 Eye Aspect Ratio [EAR] 3.2 Gaze Detection 4 Proposed System 4.1 Flowchart 4.2 Input Image from Camera 4.3 Algorithm 4.4 Output 5 Results 6 Issues 7 Conclusion References 498518_1_En_92_Chapter_OnlinePDF Fog Computing: Issues, Challenges and Tools 1 Introduction 2 Characteristics of Fog Computing 3 Comparison Between Cloud Computing and Fog Computing 4 Architecture of Fog Computing 4.1 Layered Architecture 4.2 Modules of Layers 4.3 Data Transmission Between IoT Devices and Fog Nodes [6] 4.4 Communication Protocols 5 Tools 6 Applications 7 Issues and Challenges 8 Conclusion References 498518_1_En_93_Chapter_OnlinePDF Drone Service Management in Emergency Situations 1 Introduction 2 Methodology 3 Sensors for Emergency Situation 4 Future Scope 5 Conclusion References 498518_1_En_94_Chapter_OnlinePDF Hybrid Vehicle with Power Analysis 1 Introduction 2 Methodology 3 Future Scope 4 Conclusion References 498518_1_En_95_Chapter_OnlinePDF Density-Based Adaptive Traffic Control System with OpenCV 1 Introduction 2 Literature Survey 3 Description of Datasets and Experimental Setup 3.1 Background Detection 3.2 Object Detection using Contour 3.3 Density Measurement 3.4 Open CV Lists (Sub-Programs Created) 4 Proposed Adaptive Traffic Light Control System 5 Results and Discussion 6 Conclusion and Future Scope References 498518_1_En_BookBackmatter_OnlinePDF Author Index