ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 1

دانلود کتاب فناوری های نوظهور در داده کاوی و امنیت اطلاعات: مجموعه مقالات IEMIS 2020، جلد 1

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 1

مشخصات کتاب

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 1

ویرایش: [1] 
نویسندگان: , , , ,   
سری: Advances in Intelligent Systems and Computing, 1286 
ISBN (شابک) : 9811599262, 9789811599262 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 1030
[972] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 29 Mb 

قیمت کتاب (تومان) : 59,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 15


در صورت تبدیل فایل کتاب Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2020, Volume 1 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری های نوظهور در داده کاوی و امنیت اطلاعات: مجموعه مقالات IEMIS 2020، جلد 1 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب فناوری های نوظهور در داده کاوی و امنیت اطلاعات: مجموعه مقالات IEMIS 2020، جلد 1



این کتاب حاوی مقالات تحقیقاتی ارائه‌شده در کنفرانس بین‌المللی فناوری‌های نوظهور در داده‌کاوی و امنیت اطلاعات (IEMIS 2020) است که در دانشگاه مهندسی و مدیریت، کلکته، هند، در ژوئیه 2020 برگزار شد. این کتاب در سه جلد تنظیم شده است. و شامل کارهای تحقیقاتی با کیفیت بالا توسط دانشگاهیان و کارشناسان صنعتی در زمینه محاسبات و ارتباطات، از جمله مقالات کامل، مقالات تحقیقاتی در حال انجام و مطالعات موردی مربوط به تمام زمینه های داده کاوی، یادگیری ماشین، اینترنت اشیا است. (IoT) و امنیت اطلاعات.

 


توضیحاتی درمورد کتاب به خارجی

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of things (IoT) and information security.

 



فهرست مطالب

498518_1_En_OFC
498518_1_En_BookFrontmatter_OnlinePDF
	Preface
	Contents
	About the Editors
498518_1_En_1_PartFrontmatter_OnlinePDF
	Computational Intelligence
498518_1_En_1_Chapter_OnlinePDF
	Mathematical Modelling and Analysis of Walters Liquid Motion with Brownian Diffusion
		1 Introduction
		2 Mathematical Formulation
		3 Method of Solution
		4 Results and Discussion
		5 Conclusion
		References
498518_1_En_2_Chapter_OnlinePDF
	Modelling of Two-Phase Fluid Flow Over a Stretching Sheet and Its Numerical Investigation
		1 Introduction
		2 Mathematical Formulation of the Problem
		3 Method of Solution
		4 Results and Discussion
		5 Conclusions
		6 Nomenclature
		References
498518_1_En_3_Chapter_OnlinePDF
	Boundary Layer Flow and Its Dual Solutions Over a Stretching Cylinder: Stability Analysis
		1 Introduction
		2 Mathematical Formulation
		3 Stability Analysis
		4 Results and Discussion
		5 Conclusion
		References
498518_1_En_4_Chapter_OnlinePDF
	Towards a Conceptual Modelling of Ontologies
		1 Introduction
		2 Related Work
		3 Conceptual Modelling of Ontology
		4 Conclusion
		References
498518_1_En_5_Chapter_OnlinePDF
	Mathematical Modelling of Power Law Fluid Flow Through a Pipe and Its Rheology
		1 Introduction
		2 Mathematical Formulation of the Flow Analysis
		3 Method of Solution
		4 Results and Discussion
		5 Conclusion
		References
498518_1_En_6_Chapter_OnlinePDF
	NeurolncRNA: A Database of LncRNAs Associated with Human Neurodegenerative Diseases
		1 Introduction
		2 Materials and Methods
			2.1 Data Extraction from Literature
			2.2 Retrieval of Sequence Information of the lncRNAs
			2.3 Extraction of Sequence-Based Features of the Collected lncRNAs
			2.4 Methodology of Development
		3 Results and Discussion
			3.1 Categorization of lncRNAs and their Literature Details
			3.2 Different Sequence-Based Features of lncRNAs
		4 Conclusion and Future Scope
		References
498518_1_En_7_Chapter_OnlinePDF
	Affective State Analysis Through Visual and Thermal Image Sequences
		1 Introduction
		2 Design of the Experiment
		3 Emotion Classification
			3.1 First Network: Face Detection
			3.2 Second Network: Emotion Classification
		4 Negative Affect Recognition
			4.1 Training the HMM
			4.2 Clustering of Emotion Sequences
		5 Experimental Results
		6 Conclusion
		References
498518_1_En_8_Chapter_OnlinePDF
	An Ensemble Deep Learning Method for Diabetes Mellitus
		1 Introduction
		2 Related Works
		3 Dataset Description
		4 Proposed Methodology
		5 Results and Discussions
		6 Conclusion and Future Direction
		References
498518_1_En_9_Chapter_OnlinePDF
	Memory Fluid Flow Past a Vertical Circular Cylinder and Its Energy Transfer
		1 Introduction
		2 Mathematical Formulation
		3 Method of Solution
		4 Results and Discussion
		5 Conclusion
		References
498518_1_En_10_Chapter_OnlinePDF
	A Comparative Study on Financial Market Forecasting Using AI: A Case Study on NIFTY
		1 Introduction
		2 Preliminaries
			2.1 Auto-Regressive Integrated Moving Average (ARIMA)
			2.2 Facebook's PROPHET
			2.3 Support Vector Regression (SVR)
			2.4 Recurrent Neural Network (RNN)
		3 Methodology
			3.1 Data Pre-processing
		4 Experimental Approach
		5 Result Analysis
			5.1 Root Mean Square Error (RMSE)
			5.2 Mean Absolute Percentage Error (MAPE)
			5.3 R2
		6 Conclusion
		References
498518_1_En_11_Chapter_OnlinePDF
	Hydromagnetic Oscillatory Couette Flow of a Visco-Elastic Fluid with Dust in a Channel with Radiative Heat
		1 Introduction
		2 Mathematical Formulation
		3 Method of Solution
		4 Results and Discussion
		5 Conclusion
		References
498518_1_En_12_Chapter_OnlinePDF
	Hard Exudates Detection: A Review
		1 Introduction
		2 Literature Review
		3 Conclusion
		References
498518_1_En_13_Chapter_OnlinePDF
	Analysis of Visco-elastic Fluid Flow Over an Inclined Cylinder: A Numerical Approach
		1 Introduction
		2 Mathematical Formulations
		3 Method of Solution
		4 Results and Discussion
		5 Conclusions
		References
498518_1_En_14_Chapter_OnlinePDF
	Convolution Neural Network-Driven Computer Vision System for Identification of Metanil Yellow Adulteration in Turmeric Powder
		1 Introduction
		2 Experimentation
			2.1 Sample Preparation
			2.2 Image Acquisition
			2.3 CNN Model
		3 Results and Discussion
		4 Conclusion
		References
498518_1_En_15_Chapter_OnlinePDF
	Identification of Biologically Relevant Biclusters from Gene Expression Dataset of Duchenne Muscular Dystrophy (DMD) Disease Using Elephant Swarm Water Search Algorithm
		1 Introduction
		2 Problem Description
			2.1 Biclustering
			2.2 Initial Population
			2.3 Cost Function
		3 Proposed Method
			3.1 Elephant Swarm Water Search Algorithm (ESWSA)
			3.2 Chaotic Move Elephant Swarm Water Search Algorithm (CM-ESWSA)
		4 Numerical Experiment
			4.1 Analysis of the Results on Benchmark Functions
			4.2 Convergence Analysis
			4.3 Statistical Testing
			4.4 Results on Real Life Problem
		5 Conclusion
		References
498518_1_En_16_Chapter_OnlinePDF
	Shadow Detection Using DenseUNet
		1 Introduction
		2 A Brief Review of Shadow Detection
		3 Proposed Method
			3.1 Intuition
			3.2 Basic UNet Architecture
			3.3 DenseUNet Architecture
			3.4 Preprocessing of Shadow Images
			3.5 Training
		4 Results and Discussions
			4.1 Testing
			4.2 Comparison to the State of the Art
			4.3 Failure Cases
		5 Conclusion
		References
498518_1_En_17_Chapter_OnlinePDF
	Map Merging for an Autonomous Multi-robotic System
		1 Introduction
		2 Proposed Method
			2.1 Map-Merging Characteristics and Its Adaptation
			2.2 The Map-Merging Method
		3 Map Merging and Degrees of Freedom: A Mathematical Analysis
		4 Demonstration of the Map-Merging Process
		5 Conclusion
		References
498518_1_En_18_Chapter_OnlinePDF
	On Some Basic Graph Invariants of Unitary Addition Cayley Graph of Gaussian Integers Modulo n
		1 Introduction
		2 Preliminaries
		3 Some Properties of Gaussian Integers
		4 Clique Number and Chromatic Number of Gn[i]
		5 Domination Number of Gn[i]
		6 Conclusion
		References
498518_1_En_19_Chapter_OnlinePDF
	A Brief Survey of Token Curated Registries
		1 Introduction
		2 TCR and It's Working
			2.1 Consumers
			2.2 Candidates
			2.3 Token Holders
			2.4 The Incentive System of Token Curated Registries
		3 Types of TCRs
			3.1 TCR Classification Based on Design Pattern
			3.2 TCR Classification Based on Data
			3.3 TCR Classification Based on Implementation Metrics
		4 Advantages of TCR
		5 Applications or Use Cases of TCR
			5.1 Journalism
			5.2 Regulatory
			5.3 Ocean Protocol
			5.4 Deconet
			5.5 Advertising
			5.6 Medical
			5.7 Userfeeds.io
			5.8 Mapping
			5.9 Video
			5.10 Real Estate
			5.11 Employment
		6 TCR'S Open Challenges and Their Existing Solutions
			6.1 Chicken-Egg Problem
			6.2 Passive Token Holding/Speculation
			6.3 Coin-Flipping
			6.4 Parametric Issues
			6.5 Order/Ranking in TCRs
			6.6 Subjective Curation
			6.7 Economic Attacks
			6.8 Spam Attack
			6.9 Registry Poisoning
			6.10 Real Time Coordination Problem
			6.11 Publicly Available Data
			6.12 Nesting of TCRs
		7 Conclusion and Future Work
		References
498518_1_En_20_Chapter_OnlinePDF
	Comparative Study of Effective Augmentation Method for Bangla ASR Using Convolutional Neural Network
		1 Introduction
		2 Literature Review
		3 Methodology
			3.1 Data Collection
			3.2 Data Augmentation
			3.3 CNN Architecture
			3.4 Linear Predictive Cepstral Coefficients (LPCC)
			3.5 Mel-Frequency Cepstral Coefficients (MFCC)
		4 Results and Discussion
			4.1 Effect of Augmentation in LPCC Model
			4.2 Effect of Augmentation in MFCC Model
			4.3 Overall Evaluation
		5 Conclusion
		References
498518_1_En_21_Chapter_OnlinePDF
	A Novel Human Activity Recognition Strategy Using Extreme Learning Machine Algorithm for Smart Health
		1 Introduction
		2 Related Work
		3 Proposed Method
			3.1 Feature Extraction
			3.2 The Conventional ELM
			3.3 Proposed Ensemble ELM
		4 Experimental Setup
		5 Results
		6 Conclusion
		References
498518_1_En_22_Chapter_OnlinePDF
	Ranking Countries by Perception of Indigenous Companies: A Social Media Rank Metric
		1 Introduction
			1.1 Problem Statement
			1.2 Solution Proposed
		2 Existing Research
		3 Data and Resources Used
			3.1 GADM, the Database of Global Administrative Areas
			3.2 Forbes Global 2000
			3.3 Twitter Search API
		4 Methodology Adopted
			4.1 Technologies Used
			4.2 Obtaining List of Companies Under Consideration from Forbes Global 2000
			4.3 Collection of Relevant Tweets
			4.4 Use of Vader Sentiment Library
			4.5 Statistical Manipulation and Analysis
		5 Calculations Done
		6 Results
		7 Conclusion
		8 Shortcomings
		References
498518_1_En_23_Chapter_OnlinePDF
	AIDE—AI and IoT-Enabled Home Automation for Disabled and Elderly
		1 Introduction
		2 Related Works
		3 Proposed Design
		4 Methodology
			4.1 Glove
			4.2 Hub
			4.3 AI Agent
			4.4 Mobile Application
		5 Results
		6 Conclusion
		References
498518_1_En_25_Chapter_OnlinePDF
	Synthesizing Uniform Concentric Circular Array Antenna for Minimized Sidelobes Using Teaching–Learning-Based Optimization Algorithm
		1 Introduction
		2 Array Geometry with Problem Formulation
		3 Teaching–Learning-Based Optimization (TLBO)
		4 Simulation Results and Discussions
		5 Conclusions
		References
498518_1_En_26_Chapter_OnlinePDF
	Comparing Performance of Ensemble-Based Machine Learning Algorithms to Identify Potential Obesity Risk Factors from Public Health Datasets
		1 Introduction
		2 Related Work
		3 Methodology
			3.1 Data Collection
			3.2 Data Processing
			3.3 Statistical Analysis
			3.4 Model Training and Testing
			3.5 Model Evaluation
			3.6 Assessment of Body Composition
		4 Results and Discussion
		5 Conclusion
		References
498518_1_En_27_Chapter_OnlinePDF
	Krylov Subspace Method Using Quantum Computing
		1 Introduction
			1.1 Qubits
			1.2 Deutsch-Jozsa Oracle
		2 Related Works
			2.1 Arnoldi’s Method
		3 Classical Algorithm
		4 Proposed Algorithm
		5 Result
		6 Conclusion
		References
498518_1_En_28_Chapter_OnlinePDF
	An IoT-Based Cryptographic Algorithm: Mapping the Credentials for Micro-application in Single Column
		1 Introduction
		2 Algorithmic Concept and Description
			2.1 Interference and Algorithm Robustness
			2.2 Configuration and Review
			2.3 Usage
			2.4 User Interface
		3 Proposed Methodology
			3.1 Single-Textfield Performance
			3.2 Text Encryption Algorithm.
			3.3 Information Entropy Analysis
		4 Results and Discussion
			4.1 Comparative Study of the Proposed Model
			4.2 Information Exchange Simulation
		5 Conclusion
		References
498518_1_En_29_Chapter_OnlinePDF
	Identification of Disease Critical Genes in Preeclampsia Using Squirrel Search Algorithm
		1 Introduction
		2 Gene Expression Data
		3 Gene Selection by Sample Classification Using SSA-SVM, SSA-KNN, and SS-RF
			3.1 k-Nearest Neighbor (kNN)
			3.2 Support Vector Machine (SVM)
			3.3 Random Forest Classifier (RF)
			3.4 Squirrel Search Algorithm (SSA)
		4 Experimental Results
		5 Conclusion
		References
498518_1_En_30_Chapter_OnlinePDF
	An Approach for Bengali News Headline Classification Using LSTM
		1 Introduction
		2 Literature Review
		3 Methodology
			3.1 Data Collection
			3.2 Data Pre-processing
			3.3 Word Embedding
			3.4 Model
			3.5 Long Short-Term Memory
			3.6 Applied Model
		4 Experimental Results and Discussion
		5 Conclusion and Future Work
		References
498518_1_En_31_Chapter_OnlinePDF
	Artistic Natural Images Generation Using Neural Style Transfer
		1 Introduction
		2 Related Study
			2.1 Overview of Neural Style Transfer
			2.2 VGG19 Network Model and Transfer Learning
			2.3 ImageNet Dataset
		3 Proposed Methodology
		4 Experimental Analysis
			4.1 Implementation Process
			4.2 Result Analysis
		5 Future Work and Discussion
		6 Conclusion
		References
498518_1_En_32_Chapter_OnlinePDF
	Routh-Hurwitz Criterion for Stability: An Overview and Its Implementation on Characteristic Equation Vectors Using MATLAB
		1 Introduction
		2 Routh-Hurwitz Stability Criterion
			2.1 Structure of the Routh-Hurwitz Criterion
			2.2 Special Cases in the Stability Criterion
			2.3 Advantages and Disadvantages of the Criterion
		3 Implementation Using MATLAB
		4 Conclusions
		References
498518_1_En_33_Chapter_OnlinePDF
	Path Finding Algorithms
		1 Introduction
		2 Dijkstra’s Algorithm
		3 A* Search
		4 Greedy Best-First Search
		5 Breadth-First Search
		6 Depth-First Search
		7 Result
		8 Conclusion
		References
498518_1_En_34_Chapter_OnlinePDF
	Improved Transmission Map for Dehazing of Natural Images
		1 Introduction
		2 The Dark Channel Prior (DCP)
		3 Proposed Haze Removal Algorithm (HRA)
			3.1 Input Hazy Image
			3.2 Down Sampling
		4 Dark Channel Prior (DCP)
			4.1 Estimation of Transmission Map (TM)
			4.2 Guided Filtering and TM
			4.3 Recovery Scene Radiance (SR)
			4.4 Contrast and Color Calibration
		5 Results and Discussions
		6 Conclusion
		References
498518_1_En_35_Chapter_OnlinePDF
	Comprehensive Operation of Personalized Astute Wheelchair Having Portable Rooftop and Integrated Piezoelectric Engendered Tires to Assist Societal Advance
		1 Introduction
		2 Proposed Work
			2.1 Specifications
			2.2 Use Case
			2.3 Design Methodology
			2.4 Work Overview
		3 Outcome Analysis: Assembling and Dispersion
		4 Conclusion
		References
498518_1_En_36_Chapter_OnlinePDF
	Robust Watermarking Schemes for Copyright Protection of Digital Data: A Survey
		1 Introduction
			1.1 Digital Watermarking Process
		2 Characteristics and Applications of Digital Watermarking
		3 State-of-The-Art Methods
		4 Conclusion
		References
498518_1_En_37_Chapter_OnlinePDF
	Non-invasive Vein Detection and Visualization Using Fuzzy
		1 Introduction
		2 Proposed System
		3 Results and Discussion
		4 Conclusion
		References
498518_1_En_38_Chapter_OnlinePDF
	Finger Vein Pattern Detection Using Neuro Fuzzy System
		1 Introduction
		2 Need for Detection on Vein
		3 Problems Related with Previous Work for Vein Imaging
		4 Near-Infrared Principle (NIR) Imaging
		5 Overview of the Required Scheme
		6 Implementation and Processing
		7 Performance Analysis and Test Results
		8 Conclusion
		References
498518_1_En_39_Chapter_OnlinePDF
	An Efficient Rash Driving Identification System Based on Neural Networks Using TensorFlow
		1 Introduction
		2 Literature Survey
		3 Description of Datasets and Experimental Setup
		4 Results and Discussion
		5 Conclusion and Future Scope
		References
498518_1_En_2_PartFrontmatter_OnlinePDF
	Advance Computing
498518_1_En_40_Chapter_OnlinePDF
	Home Automation Using ESP8266 of IOT Module
		1 Introduction
		2 System Model
		3 Proposed Technique
		4 Results and Discussion
		5 Conclusion
		References
498518_1_En_41_Chapter_OnlinePDF
	Optimization of Quadratic Curve Fitting from Data Points Using Real Coded Genetic Algorithm
		1 Introduction
		2 Genetic Algorithm Applied to Least Square Curve Fitting
		3 Curve Fitting Using Real Coded Real Coded Genetic Algorithm
			3.1 Coding and Genetic Operation
		4 Proposed Method
			4.1 Taking a Quadratic Equation as Curve
			4.2 Applying the Given Dataset
			4.3 Encoding Real Coded Genetic Algorithm
			4.4 Create and Plot a Quadratic
			4.5 Simulating the RCGA and Curve Code
		5 Results and Analysis
			5.1 Case 1
			5.2 Case 2
		6 Conclusion
		Reference
498518_1_En_42_Chapter_OnlinePDF
	Blockchain Leveraged Incentive Providing Waste Management System
		1 Introduction
		2 The Proposed Effective Smart Waste Management
		3 Implementation of Sensor-Based Smart Dustbin
		4 Conclusions
		References
498518_1_En_43_Chapter_OnlinePDF
	Securing Healthcare Data with Healthcare Cloud and Blockchain
		1 Introduction
			1.1 Related Works
			1.2 Research Contribution of This Work
			1.3 Organization
		2 System Model and Problem Formulation
			2.1 Resources
			2.2 Cost of Operation
			2.3 Integration
		3 Proposed Scheme
			3.1 Methodology
			3.2 Decentralization
			3.3 Interoperability
			3.4 Smart Contract
			3.5 Validation
			3.6 Healthcare Cloud
		4 Performance Evaluation
			4.1 Numerical Settings
			4.2 Results
		5 Conclusion and Future Work
		References
498518_1_En_44_Chapter_OnlinePDF
	Automated Multimodal Biometric System with Ear and Side Profile Face for Human Identification
		1 Introduction
		2 Related Works
		3 Proposed Method
		4 Theoretical Background
			4.1 Skin Segmentation Using YCbCr
			4.2 Texture Feature Extraction Using SFTA
			4.3 Banana Wavelets
		5 Experimental Results
		6 Conclusions
		References
498518_1_En_45_Chapter_OnlinePDF
	A Recommendation System for Customizable Items
		1 Introduction
		2 Classification of Recommodation Techniques
			2.1 Collaborative Filtering Recommendation Systems
			2.2 Content-Based Filtering Recommendation Systems
			2.3 Knowledge-Based Recommendation Systems
			2.4 Demographic-Based Recommendations Systems
			2.5 Hybrid Recommendation Systems
		3 Proposed Method
			3.1 Using Content-Based Filtering
			3.2 Using Constraint-Based Filtering
			3.3 Combining Rating Predictions
		4 Evaluation
		5 Experimental Results and Analysis
		6 Conclusion
		References
498518_1_En_46_Chapter_OnlinePDF
	Hydromagnetic Visco-elastic Boundary Layer Slip Flow and Heat Transfer Over a Flat Plate
		1 Introduction
		2 Mathematical Formulation
		3 Results and Discussion
		4 Conclusion
		References
498518_1_En_47_Chapter_OnlinePDF
	Application of Carbon Nanotube in Targeted Drug Delivery System
		1 Introduction
		2 Properties of Carbon Nanotube
		3 Nanotechnology in Medical Science
		4 Application of CNTs in Targeted Drug Delivery
		5 Advantages of Carbon Nanotubes Over Conventional Cancer Therapy
		6 Drug Delivery
		7 Conclusion
		References
498518_1_En_48_Chapter_OnlinePDF
	Indoor Air Pollutant Prediction Using Time Series Forecasting Models
		1 Introduction
		2 Related Work
		3 Time Series Analysis of Indoor Pollution Data
		4 Implementation and Result
		5 Conclusion
		References
498518_1_En_49_Chapter_OnlinePDF
	Implementation of Automatic Soil Moisture Dearth Test and Data Exertion Using Internet of Things
		1 Introduction
		2 Related Works
		3 Methodology
			3.1 Soil Moisture Sensor
			3.2 Solenoid Valve
			3.3 Node MCU
		4 Results and Conclusion
		5 Conclusion
		References
498518_1_En_50_Chapter_OnlinePDF
	IDPchain: Blockchain-Based International Driving Permit and Traffic Crime Reporting System
		1 Introduction
		2 Related Work
		3 Our Contribution
		4 IDPchain System Model
			4.1 System Entities
			4.2 Steps Involved in the System
		5 Implementation
		6 System Analysis
		7 Conclusion
		References
498518_1_En_51_Chapter_OnlinePDF
	Hydromagnetic Visco-elastic Boundary Layer Flow Past an Exponentially Stretching Sheet with Suction or Blowing
		1 Introduction
		2 Mathematical Formulation
		3 Results and Discussion
		4 Conclusion
		References
498518_1_En_53_Chapter_OnlinePDF
	Reimagining the Indian Healthcare Ecosystem with AI for a Healthy Smart City
		1 Introduction
		2 Smart Healthcare
		3 Global Healthcare Issues
		4 Healthcare in India
		5 AI and IoT in Healthcare
		6 Conclusions
		References
498518_1_En_54_Chapter_OnlinePDF
	Analysis of Blockchain Induced Cryptocurrency: Regulations and Challenges of Cryptocurrencies
		1 Introduction
		2 Cryptocurrency Market Analysis
			2.1 Appearing and Developed Economic Markets
			2.2 Scalability Drawbacks
			2.3 Indian Cryptocurrency Market
			2.4 Reserve Bank of India and Crypto
		3 Blockchain Application in Cryptocurrency
		4 Threats in Cryptocurrency
		5 Capability of Cryptocurrency
			5.1 Overall Compliance
			5.2 Substituting Active Network
			5.3 Use as Virtual Currency
		6 Conclusion
		References
498518_1_En_55_Chapter_OnlinePDF
	An Optimization Algorithm for IoT Enabling Technology
		1 Introduction
			1.1 Path Optimization
		2 Fusion
			2.1 Sensor Selection
		3 Results and Discussion
		4 Conclusion
		References
498518_1_En_56_Chapter_OnlinePDF
	Emerging Trends in Medical Science Using Biometric
		1 Introduction
		2 Advantages of Using Biometrics in Medical Science
		3 Challenges for Biometrics in Medical Science
			3.1 Low Certainty in Identification
			3.2 Storage and Accessibility of Data
			3.3 Cost Efficiency
			3.4 Susceptible Data
			3.5 Linking Biometrics to ID’s
			3.6 Alteration in Already Stored Information
		4 Case Study
		5 Conclusion
		References
498518_1_En_57_Chapter_OnlinePDF
	Plant Disease Detection Using Convolutional Neural Networks and Remedy Recommendation System
		1 Introduction
		2 Related Works
		3 Materials and Methods
			3.1 Dataset
			3.2 Methodology
		4 Experimental Results
		5 Conclusions
		References
498518_1_En_58_Chapter_OnlinePDF
	Spatio-Temporal Prediction of Noise Pollution Using Participatory Sensing
		1 Introduction
		2 Related Works
		3 Problem Statement and Proposed Approach
			3.1 Problem Statement
			3.2 Architecture of the System
			3.3 Method
		4 Experiment
		5 Performance Metrics and Results
		6 Conclusion
		References
498518_1_En_59_Chapter_OnlinePDF
	Two-Way Nanoscale Automata
		1 Introduction
		2 Preliminaries and Definitions
		3 Two-Way Non-Deterministic Watson–Crick Automata
		4 Complexity of Two-Way Nanoscale Automata
		5 Conclusion
		References
498518_1_En_60_Chapter_OnlinePDF
	Multi-head Watson–Crick Quantum Finite Automata
		1 Introduction
		2 Preliminaries and Definitions
		3 Computational Complexity of Multi-head Watson–Crick Quantum Finite Automata
		4 Conclusion
		References
498518_1_En_61_Chapter_OnlinePDF
	Handwritten Signature Verification System Using IoT
		1 Introduction
		2 Literature Survey
		3 Comparative Study
		4 Proposed Work
		5 Dataset
			5.1 CEDAR
			5.2 GPDS300
			5.3 BHSig260 Signature
			5.4 GPDS Synthetic
		6 Implementation
			6.1 Flow Chart
		7 Conclusion and Future Scope
		References
498518_1_En_62_Chapter_OnlinePDF
	A Framework for Blockchain Technology Including Features
		1 Introduction
		2 Technology Behind Blockchain
			2.1 Decentralized/P2P Network
			2.2 Algorithm of Hashing
			2.3 Public-Key Cryptography
			2.4 Algorithm of Consensus
		3 Blockchain Features
		4 Risks in Blockchain
			4.1 51% Vulnerability
			4.2 Private Key Security
			4.3 Criminal Activity
			4.4 Exposing Identity
		5 Conclusions
		References
498518_1_En_63_Chapter_OnlinePDF
	Blockchain-Based Network Architecture for Accountable Auctions and to Overcome Resource Problems
		1 Introduction
		2 Theoretical Background
		3 Features of Blockchain
			3.1 Attributable
			3.2 Accuracy
			3.3 Trust and Efficiency
			3.4 Security
		4 System Workflows and Network Design Architecture
			4.1 Secure Data Transmission and Authentication
			4.2 Network Protocol and Mining
			4.3 Intelligent Nodes Mapping
		5 Proposed Algorithm for Auction Management and Accountability
		6 Conclusion
		References
498518_1_En_64_Chapter_OnlinePDF
	Proposed Secure and Robust Voting System Using Blockchain Conceptual Framework
		1 Introduction
		2 Voting System
			2.1 EVM (Electronic Voting Machine)
			2.2 Internet Voting
			2.3 Blockchain Enable Voting
		3 Design of Building Conceptual Framework (Proposed Methodology)
			3.1 Digital Identity Generation
			3.2 Voter Pre-authentication Process
			3.3 Voter Post-authentication Process
			3.4 Recording of Vote on Server
			3.5 Decryption and Counting of Votes
			3.6 Audit Process
		4 Discussion and Future Work
			4.1 Related Work
		5 Conclusion
		References
498518_1_En_65_Chapter_OnlinePDF
	Dynamic Functional Bandwidth Kernel-Based SVM: An Efficient Approach for Functional Data Analysis
		1 Introduction
		2 Methodology
		3 Results and Discussions
			3.1 Experimental Setup
			3.2 Datasets Used
			3.3 Quantitative Performance Comparison
		4 Conclusions
		References
498518_1_En_66_Chapter_OnlinePDF
	Software as a Service for Upcoming Industries
		1 Introduction
		2 Cloud Computing Sharing Model
		3 SPI Model of Cloud Computing
			3.1 Software as a Service
			3.2 SaaS Architecture
		4 Characteristics of SaaS Business Model
		5 Risks and Challenges to Adopting SaaS
		6 Result and Implementation
		7 Conclusion
		References
498518_1_En_67_Chapter_OnlinePDF
	A Ubiquitous Indoor–Outdoor Detection and Localization Framework for Smartphone Users
		1 Introduction
		2 Proposed Framework
			2.1 Site Survey and Data Collection
			2.2 Feature Modeling
			2.3 Classification Process
		3 Experimental Results
		4 Conclusion
		References
498518_1_En_68_Chapter_OnlinePDF
	Coalescence of Artificial Intelligence with Blockchain: A Survey on Analytics Over Blockchain Data in Different Sectors
		1 Introduction
		2 Sector-Wise Review
			2.1 Medical Healthcare
			2.2 Internet of Things (IoT)
			2.3 Cryptocurrency
		3 Conclusion
		References
498518_1_En_69_Chapter_OnlinePDF
	Biometric Door Lock Using Mobile Fingerprint
		1 Introduction
		2 Related Works
		3 Proposed System
		4 Conclusion
		References
498518_1_En_70_Chapter_OnlinePDF
	Overview for Creating mHealth Application
		1 Introduction
			1.1 Background
			1.2 Objective
		2 Literature Review
			2.1 Runtastic Running and Fitness [6]
			2.2 Google Fit [7]
			2.3 Fitbit [8]
			2.4 Conclusion
		3 Application Design and Application Modules
			3.1 Application Modules
		4 Exercise and Various Health-Related Indexes
		5 Results
		6 Conclusion
		References
498518_1_En_71_Chapter_OnlinePDF
	Application and Challenges of Blockchain with IoT
		1 Introduction
		2 Allied Work
			2.1 Blockchain
			2.2 Internet of Things (IoT)
			2.3 Integration of Blockchain with IoT
		3 Application of Blockchain with IoT
			3.1 Banking
			3.2 Trade Finance
			3.3 Smart Devices
			3.4 Healthcare
			3.5 Public Sectors
			3.6 Supply Chain Sensor
		4 Research Challenges
			4.1 Privacy
			4.2 Scalability
			4.3 Blockchain Security
			4.4 Trusted Oracles
			4.5 Quantum Computing
			4.6 Governance
		5 Conclusion and Future Scope
		References
498518_1_En_72_Chapter_OnlinePDF
	Conservation of Water and Power Using Solar Panel and Raspberry Pi
		1 Introduction
		2 Literature Survey
		3 Methodology
			3.1 Rain Water Harvesting System
			3.2 Overhead Tank Automation
			3.3 Billing Method
			3.4 Water Quality Measurement
			3.5 Live Streaming of Water Tank
			3.6 Connectivity
		4 Conclusion
		References
498518_1_En_73_Chapter_OnlinePDF
	Water Monitoring and Conservation Using IOT with User-Friendly Interfaces
		1 Introduction
		2 Literature Survey
		3 Methodology
			3.1 Rain Water Harvesting System
			3.2 Overhead Tank Automation
			3.3 Water Quality Measurement
			3.4 Billing Method
			3.5 Live Streaming of Water Tank
			3.6 Connectivity
		4 Results and Discussion
		5 Conclusion and Future Work
		References
498518_1_En_74_Chapter_OnlinePDF
	Delivering Green Supply Chain Using Blockchain Technology for Sustainable Environment: A Survey
		1 Introduction
		2 Literature Review
			2.1 Utilization of Blockchain in Supply Chains of Start-Ups
		3 Proposed Methodology
		4 Results
		5 Conclusion
		References
498518_1_En_75_Chapter_OnlinePDF
	An Intelligent Embedded AC Automation Model with Temperature Prediction and Human Detection
		1 Introduction
		2 Proposed System
		3 System Design and Architecture
			3.1 System Overview
		4 Implementation
		5 Conclusion
		References
498518_1_En_76_Chapter_OnlinePDF
	ColdBlocks: Quality Assurance in Cold Chain Networks Using Blockchain and IoT
		1 Introduction
		2 Architecture
		3 System Analysis and Design
			3.1 Smart Contract Modeling
		4 Experimental Results and Analysis
		5 Conclusion
		References
498518_1_En_77_Chapter_OnlinePDF
	A Comparative Study for Analysis and Prediction of Stock Market Movement
		1 Introduction
		2 Related Work
		3 Dataset and Methodology
			3.1 Datasets Used in the Experiment
			3.2 Methodology
			3.3 ANN and LSTM
			3.4 SVM and Ensemble Learning Classifier
			3.5 LR, DT, and KNN
		4 Experimental Setup
		5 Result Analysis
		6 Conclusion
		References
498518_1_En_78_Chapter_OnlinePDF
	Autonomic Cloud Computing: A Survey Using IBM SPSS Tool
		1 Introduction
		2 Literature Review
		3 Results and Analysis
			3.1 Reliability Test
			3.2 Hypothesis Testing
		4 Conclusion
		References
498518_1_En_79_Chapter_OnlinePDF
	An Exploration on the Study of Methodology of Fish Tracking System Using Heat Map
		1 Introduction
			1.1 Fish Tracking System
			1.2 Technique of Heat Map
		2 Literature Survey
		3 Technical Overview
			3.1 Dataset
			3.2 Fish Tracking System Using Weather Detection
			3.3 Attribute Extraction
		4 Results and Reports
		5 Conclusion
		6 Implications for Future Research
		Reference
498518_1_En_80_Chapter_OnlinePDF
	Enhancing Number Sense of Dyscalculia Learners by Pedagogical Agents: A Review
		1 Introduction
		2 Intelligent Tutoring System Architecture
		3 Pedagogical Agent Framework
			3.1 Design of Pedagogical Agent
			3.2 Roles and Functions of Pedagogical Agent
			3.3 Characteristics of Learning Environment
			3.4 Characteristics of Learner
		4 Existing Pedagogical Agents
			4.1 Single Pedagogical Agent
			4.2 Multi-agents
			4.3 Intelligent Tutoring System Evaluation
			4.4 Learning Disabled Systems
		5 Future Aspects and Recommendations
		6 Conclusion
		References
498518_1_En_81_Chapter_OnlinePDF
	An IoT-Based Traceability Framework for Small-Scale Farms
		1 Introduction
		2 Theoretical Background
			2.1 IoT in Supply Chain
			2.2 Traceability in IoT
			2.3 Security Issues in IoT
		3 Proposed Framework
		4 Methodology
		5 Experiments and Results
		6 Conclusion and Future Scope
		References
498518_1_En_82_Chapter_OnlinePDF
	Smart Water Distribution Control System for a Smart Building
		1 Introduction
		2 Literature Review
		3 Implemented System
		4 Conceptual Diagram
		5 Implementation Details
		6 Results Obtained (Screenshots)
		7 Conclusion
		References
498518_1_En_83_Chapter_OnlinePDF
	A Review on P2P File System Based on IPFS for Concurrency Control in Hadoop
		1 Introduction
		2 Related Work
		3 Conflict-Free Replicated Data Type (CRDT)
		4 Peerpad
		5 Storage of Files on IPFS
		6 Methodology
		7 Working
		8 Implementation
			8.1 Single-Phase Locking Protocol
			8.2 Two-Phase Locking Protocol
		9 Execution
		10 Drawbacks
		11 Conclusion
		References
498518_1_En_84_Chapter_OnlinePDF
	Securing Internet of Things: Attacks, Countermeasures and Open Challenges
		1 Introduction
		2 Reasons for Security Challenges in IoT
			2.1 Integration with Physical World
			2.2 Communication and Heterogenous Gadgets
			2.3 Constraints of Resources
			2.4 Privacy
			2.5 The Large Scale
		3 Security Threats in IoT
			3.1 Security Threats at the Perception Layer
			3.2 Security Threats at Communication Layer
			3.3 Security Threats at the Support Layer
		4 Countermeasures Against Various Attacks
			4.1 IEEE 802.15.4
			4.2 ZigBee
			4.3 Z-Wave Security
			4.4 LoRaWan Security
			4.5 TLS Security
			4.6 Firewalls
		5 Open Issues and Future Research Challenges
			5.1 Security
			5.2 Scalabilty
			5.3 Overhead and Packet Retransmission
		6 Conclusion
		References
498518_1_En_85_Chapter_OnlinePDF
	Internet of Things (IoT) Toward 5G Network: Design Requirements, Integration Trends, and Future Research Directions
		1 Introduction
		2 Background and Current Research
		3 Introduction to IoT
			3.1 Characteristics of IoT
			3.2 IoT Design Requirements
		4 Introduction to 5G
			4.1 GSM
			4.2 UMTS
			4.3 LTE
		5 Integration of 5G and IoT
			5.1 5G-Enabled IoT
			5.2 Wireless Networks Used in 5G
			5.3 Applications of 5G in IoT
		6 Future Research Trends
			6.1 Deployment and Coverage
			6.2 Device Support
			6.3 Frequency Bands
			6.4 Privacy and Security
			6.5 Deployment Cost
		7 Conclusion and Future Work
		References
498518_1_En_86_Chapter_OnlinePDF
	A Study-Based Review on Blockchain Technology for IoT
		1 Introduction
		2 Blockchain Basics
			2.1 Characteristics of Blockchain
		3 Different Types of Blockchains
		4 Determining the Requirement of Blockchain in IoT Application
		5 Applications of Blockchain for the Internet of Things
		6 Incorporation of Blockchain in Internet of Things
		7 Conclusion
		References
498518_1_En_87_Chapter_OnlinePDF
	Secure Cloud Services Using Quantum Neural Network
		1 Introduction
		2 State of the Art
			2.1 Research Gap
		3 Proposed Model
		4 Experimental Setup and Result
		5 Conclusions
		References
498518_1_En_88_Chapter_OnlinePDF
	A Review of Secure Cloud Storage-Based on Cloud Computing
		1 Introduction
		2 Applications of Cloud
		3 Classification of Cloud
			3.1 Public Cloud
			3.2 Private Cloud
			3.3 Community Cloud
			3.4 Hybrid Cloud
		4 Cloud Computing Services
			4.1 IAAS/Infrastructure as a Service
			4.2 PAAS/Platform as a Service
			4.3 SAAS/Software as a Service
		5 Cloud Computing
		6 Benefits of Cloud Computing
			6.1 Cost Reduction / Efficiency and 24*7 Availability
			6.2 Virtualization, Reliability, and Mobility
			6.3 Security
			6.4 Elasticity and Quick Software Deployment
		7 Issues in Cloud Computing
			7.1 Network Connectivity Dependency
			7.2 Security Concern
			7.3 Interoperability
		8 Challenges in Cloud Computing
			8.1 Making the Correct Choice
			8.2 Absence of Administrative Support
			8.3 Loss of Control
			8.4 Privacy
		9 Introduction to Cloud Storage
		10 Advantages of Cloud Storage
			10.1 Easy Access
			10.2 Cost Savings
			10.3 Disaster Healing/Recovery
			10.4 Easy to Send Files
			10.5 Software
		11 Disadvantages of Cloud Storage
			11.1 Dependent on an Internet Connection
			11.2 Bandwidth
			11.3 Software
			11.4 Downtime
		12 Popular Cloud Storage Available
		13 Result and Conclusion
		References
498518_1_En_89_Chapter_OnlinePDF
	IOT-Based Advanced Smart Patient Monitoring System
		1 Introduction
		2 Methodology
		3 Results
		4 Discussions
		5 Conclusion
		References
498518_1_En_90_Chapter_OnlinePDF
	Analyzing Effects of Architectural Alternatives on Performance of Blockchain
		1 Introduction
		2 Literature Survey
		3 Description of Datasets and Experimental Setup
		4 Results and Discussion
		5 Conclusion and Future Scope
		References
498518_1_En_91_Chapter_OnlinePDF
	Real-Time Driver’s Eye Closure, Yawning Detection for Drowsiness Analysis and Gazing Detection for Distraction Analysis
		1 Introduction
		2 Literature Survey
		3 Proposed Algorithm
			3.1 Eye Aspect Ratio [EAR]
			3.2 Gaze Detection
		4 Proposed System
			4.1 Flowchart
			4.2 Input Image from Camera
			4.3 Algorithm
			4.4 Output
		5 Results
		6 Issues
		7 Conclusion
		References
498518_1_En_92_Chapter_OnlinePDF
	Fog Computing: Issues, Challenges and Tools
		1 Introduction
		2 Characteristics of Fog Computing
		3 Comparison Between Cloud Computing and Fog Computing
		4 Architecture of Fog Computing
			4.1 Layered Architecture
			4.2 Modules of Layers
			4.3 Data Transmission Between IoT Devices and Fog Nodes [6]
			4.4 Communication Protocols
		5 Tools
		6 Applications
		7 Issues and Challenges
		8 Conclusion
		References
498518_1_En_93_Chapter_OnlinePDF
	Drone Service Management in Emergency Situations
		1 Introduction
		2 Methodology
		3 Sensors for Emergency Situation
		4 Future Scope
		5 Conclusion
		References
498518_1_En_94_Chapter_OnlinePDF
	Hybrid Vehicle with Power Analysis
		1 Introduction
		2 Methodology
		3 Future Scope
		4 Conclusion
		References
498518_1_En_95_Chapter_OnlinePDF
	Density-Based Adaptive Traffic Control System with OpenCV
		1 Introduction
		2 Literature Survey
		3 Description of Datasets and Experimental Setup
			3.1 Background Detection
			3.2 Object Detection using Contour
			3.3 Density Measurement
			3.4 Open CV Lists (Sub-Programs Created)
		4 Proposed Adaptive Traffic Light Control System
		5 Results and Discussion
		6 Conclusion and Future Scope
		References
498518_1_En_BookBackmatter_OnlinePDF
	Author Index




نظرات کاربران