دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: الکترونیک ویرایش: نویسندگان: Pradeep Kumar Singh, Arti Noor, Maheshkumar H. Kolekar Sudeep Tanwar, Raj K. Bhatnagar, Shaweta Khanna سری: Lecture Notes in Electrical Engineering, 694 ISBN (شابک) : 9811578036, 9789811578038 ناشر: Springer Singapore سال نشر: 2021 تعداد صفحات: 536 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 22 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Evolving Technologies for Computing, Communication and Smart World: Proceedings of ETCCS 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تکامل فن آوری برای محاسبات ، ارتباطات و دنیای هوشمند: مجموعه مقالات ETCCS 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب بهترین مقالات منتخب ارائه شده در کنفرانس بینالمللی فناوریهای در حال تکامل برای محاسبات، ارتباطات و دنیای هوشمند (ETCCS 2020) را ارائه میکند که در تاریخ 31 ژانویه تا 1 فوریه 2020 در C-DAC، نویدا، هند برگزار شد. این دانشگاه توسط دانشگاه فدرال جنوبی روسیه برگزار می شود. دانشگاه یان ویژیکوفسکی (UJW)، پولکوویتس، لهستان؛ و CSI، هند. C-DAC، Noida در طول این رویداد از MietY بودجه دریافت کرد. خدمات فنی از طریق EasyChair، Turnitin، MailChimp و IAC Education پشتیبانی می شوند. این کتاب شامل کارهای تحقیقاتی جاری در زمینههای فناوریهای شبکه و محاسبات، شبکههای بیسیم و اینترنت اشیا (IoT)، فناوریهای محاسباتی آیندهنگر، فناوریهای ارتباطی، امنیت و حریم خصوصی است.
This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January–1 February 2020 at C-DAC, Noida, India. It is co-organized by Southern Federal University, Russia; University of Jan Wyżykowski (UJW), Polkowice, Poland; and CSI, India. C-DAC, Noida received funding from MietY during the event. The technical services are supported through EasyChair, Turnitin, MailChimp and IAC Education. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.
Preface Contents About the Editors Toward Response-Type Identification for the Real Time 1 Introduction 2 Research Procedures 2.1 Preprocessing Dataset 2.2 Testing Dataset 2.3 Tool with Classifiers 3 Experimental Analysis 3.1 Using Hold-Out 3.2 Using k-Fold 3.3 Feature Relationship with k-Fold 3.4 User CPU Training Time with k-Fold 4 Performance Measures 5 Conclusion References Automatic Leaf Species Recognition Using Deep Neural Network 1 Introduction and Problem Statement 2 Material and Methods 2.1 System Configuration 2.2 AlexNet 2.3 Dataset 3 Results and Discussion 4 Conclusion References Injecting Power Attacks with Voltage Glitching and Generation of Clock Attacks for Testing Fault Injection Attacks 1 Introduction 2 Related Work 3 Contribution 4 Concept of Generation of Clock Glitch Attack 4.1 Generation of Underclock Glitch Attack 4.2 Generation of Overclock Glitch Attack 5 Power Glitch Attack-Producing Circuits on Cadence Virtuoso 5.1 Power Supply Attack Versus Propagation Delay 5.2 Types of Power Glitch Attack 5.3 Effects of Power Glitch Attack on Combinational Circuits 6 Conclusion References Traffic Jam Minimization and Accident Avoidance System Using IoT 1 Introduction 1.1 Background and Research Motivation 2 Related Work 3 Proposed Model 3.1 Proposed Algorithm and Flowchart for Maintaining a Threshold Distance Between Two Vehicles 3.2 Proposed Algorithm and Flowchart for Overtaking 3.3 Proposed Algorithm and Flowchart for Lane Shifting 4 Discussion 4.1 Maintaining a Threshold Distance Between Two Vehicles 4.2 Overtaking 4.3 Lane Changing 5 Conclusion and Future Scope References Software Reusability Estimation Using Machine Learning Techniques—A Systematic Literature Review 1 Introduction 2 Software Reuse Approaches 2.1 Component-Based Software Development (CBSD) 2.2 Object-Oriented Software Development (OOSD) 2.3 Aspect-Oriented Software Development (AOSD) 3 Machine Learning 3.1 Supervised Learning 3.2 Unsupervised Learning 4 Machine Learning Techniques Used for Software Reusability Estimation 5 Discussion 6 Conclusion References Unsupervised Learning-Based Sentiment Analysis with Reviewer's Emotion 1 Introduction 2 Motivation 3 Related Work 4 Proposed Research Work 5 Methodology 6 Execution and Implementation 6.1 Dataset Selection 6.2 Data Preprocessing 6.3 Text Processing After Tokenisation 6.4 Execution 7 Results and Discussion 8 Conclusion and Future Work References Event-Triggered Share Price Prediction 1 Introduction 2 Related Work 3 Proposed Research Work 4 Methodology 4.1 Long Short-Term Memory (LSTM) 5 Execution and Implementation 5.1 Dataset Selection 5.2 Pre-processing of the Data and Polarity Assignment 5.3 Methodology Used for Polarity Assignment 6 Results 7 Discussion 8 Conclusion and Future Work References A Review: Efficient Transportation—Future Aspects of IoV 1 Introduction 1.1 Layered Architecture and Network Model of IoV 1.2 Network Model of IoV 2 Related Work 3 Important Findings 4 Conclusion and Future Work References Compact High Gain 28 GHz Concentric Circular Director Low-Cost Antenna for 5G Millimeter-Wave Communication 1 Introduction 2 Antenna Geometry and Analysis 2.1 Antenna Structure 2.2 Analysis 3 Antenna Simulation Results and Discussion 3.1 Return Loss, VSWR, and Impedance Bandwidth 3.2 Radiation Performance 4 State of Art Comparison 5 Conclusion References Questionnaire-Based Prediction of Hypertension Using Machine Learning 1 Introduction 2 Related Works 3 Background 3.1 Neural Networks 3.2 Other Algorithms 4 Designing a Neural Network 5 Experiments 5.1 Data set 5.2 Data Cleaning 5.3 Implementation Details 5.4 Metrics 6 Results 7 Conclusion References Nature-Inspired Computing Behaviour of Cellular Automata 1 Introduction 2 Natural Computation and Cellular Automata 2.1 Early Stage of Research—During 1940s 2.2 Innovation—During 1970s 2.3 Recent Trends in Computation with Cellular Automata 3 Preliminaries of Cellular Automata (CA) 3.1 Characterization of CA 3.2 Scope of CA in Complex Computation 4 Computing Behaviour of Wolfram’s Elementary CA 4.1 Elementary CA Modelling 4.2 Elementary Cellular Automata (ECA) Properties 4.3 ECA and Natural System Design and Computation 5 Conclusion References A Survey on Transport Layer Protocols for Reliable and Secure Wireless Sensor Networks 1 Introduction 2 Literature Background 3 Comparison of Transport Layer Protocol 4 Research Challenges 5 Conclusion References A Lightweight Exchangeable Encryption Scheme for IoT Devices Based on Vigenere Cipher and MLS Keystream 1 Introduction 2 Exchangeable Encryption Scheme 2.1 MLS Generation 3 Proposed Lightweight Cryptosystem 4 Experimental Results 4.1 Text Encryption 4.2 Image Encryption 4.3 Speech Encryption 5 Conclusions References Improving Steepest Descent Method by Learning Rate Annealing and Momentum in Neural Network 1 Introduction 2 Background and Related Works 3 The Backpropagation for Improvement 3.1 Backpropagation Learning 3.2 Computation at Input Layer 3.3 Computation at Hidden Layer 3.4 Computation at Output Layer 4 Calculation of Error 5 Method of Steepest Descent 5.1 Calculation of Weight Update 5.2 Backpropagation Algorithm (BP) 6 Proposed Improvement 6.1 Momentum Update 6.2 Learning Rate Annealing 7 Conclusions References Fingerprint and Face-Based Secure Biometric Authentication System Using Optimized Robust Features 1 Introduction 1.1 Motivation and Contribution 2 Related Work 3 Proposed Biometric Designs 3.1 Fingerprint Recognition System (FPRS) 3.2 Face Recognition System (FRS) 4 Results 4.1 Experimental Evaluation of FPRS and FRS 4.2 Image Processing Results of FPRS and FRS 4.3 Performance Parameters of FPRS and FRS 4.4 Comparison of the Proposed Recognition Systems Against Existing Work 5 Conclusion References DevOps, DevSecOps, AIOPS- Paradigms to IT Operations 1 Introduction 2 DevOps Paradigm—Principles and Processes 3 DevSecOps Paradigm—Principles and Processes 4 AIOps Paradigm—Principles and Processes 5 Sample Tools: DevOps, DevSecOps, AIOps 5.1 DevOps Tools 5.2 DevSecOps Tools 5.3 AIOps Tools 6 Conclusion References Optimized Route Discovery and Node Registration for FANET 1 Introduction 2 Related Work 3 Proposed Architecture 3.1 The Setup Phase 3.2 The Routing Architecture 3.3 Lagrange Interpolation (LI) 4 Results and Discussions 4.1 Results Analysis 4.2 Comparative Analysis of the Proposed Methodology and Past Studies [2, 3, 7] 5 Conclusion References 4.1 GHz Low-Phase Noise Differential XCP LC-VCO with High Q and LC Noise Filtering 1 Introduction 2 Conventional VCO Design and Noise Issue 3 Proposed VCO Design 4 Results and Discussion 5 Conclusion References Secured Surveillance Storage Model Using Blockchain 1 Introduction 2 Related Work 3 Preliminaries 3.1 Blockchain 3.2 Ethereum [7] 3.3 IPFS [2] 3.4 Smart Contract 4 Smart Contract for S3 Model 4.1 Process Flow 4.2 Gnu Privacy Guard (GnuPG) 4.3 IPFS 4.4 Registration Authority 4.5 Certificate Authority 5 Experimental Evaluation 6 Conclusion and Future Scope References Information Retrieval in Financial Documents 1 Introduction 2 Related Work 3 Research Methodology 3.1 Data Ingestion Phase 3.2 Entity Relation Formulation Phase 3.3 Query Processing Phase 4 Results and Analysis 4.1 Comparison of a Generic System with Proposed System 5 Conclusion and Future Scope References VNF Security in Telco Environment 1 Introduction 1.1 NFV Infrastructure and Its Attacks 1.2 Adoption Towards Virtualisation 1.3 Evolved Packet Core as Virtualization Network Function 2 Telco VNF Security 2.1 Virtualisation Threat Vectors 3 Our Approach to Handle VNF Security 4 Future of Telecommunication Service Provider 5 Conclusion 6 Future Work References Rank-Level Fusion of Random Indexing, Word Embedding, and TF-IDF-Based Rankings for Clinical Document Retrieval 1 Introduction 2 Previous Work 2.1 Information Retrieval 2.2 Random Indexing-Based Representation 2.3 GLOVE-Based Representation 2.4 Rank Level Fusion 3 Proposed Technique 4 Experiments and Results 5 Conclusion and Future Work References A Novel Feature Engineering Approach for Twitter-Based Text Sentiment Analysis 1 Introduction 2 Related Work 3 Research Methodology 3.1 Data Collection 3.2 Train-Test Split 3.3 Data Preprocessing 3.4 Feature Engineering 3.5 Classification 4 Results and Analysis 4.1 Text-Based Features 4.2 Addition of Non-textual Features 5 Conclusion and Future Scope References Survey on DDoS and EDoS Attack in Cloud Environment 1 Introduction 1.1 Cloud Computing 1.2 Challenges and Issues in Cloud Computing 1.3 DDoS Attack 1.4 Economic Denial of Sustainability Attack 1.5 Difference between DDoS and EDoS. 2 DDoS Mitigation Methodology 3 EDoS Mitigation Methodology 4 Conclusion References Preprocessing Steps for Opinion Mining on Tweets 1 Introduction 2 Related Work 3 Research Methodology 3.1 Data Collection 3.2 Data Cleaning 3.3 Data Transformation 4 Result Analysis 5 Conclusion References Machine Learning-Based Lightweight Android Malware Detection System with Static Features 1 Introduction 2 Background and Related Work 2.1 Background 2.2 Related Work 3 Dataset 4 Design and Implementation 4.1 An Overview 4.2 Feature Extraction 4.3 Feature Engineering and Analysis 4.4 Learning Model 5 Evaluation 6 Conclusion References Area and Power Efficient 2 Bit Multiplier by Using Enhanced Half Adder 1 Introduction 2 Review of Conventional Circuit 2.1 Half Adder 2.2 Conventional Multiplier 3 Proposed Circuit Design 3.1 Proposed Half Adder 3.2 Proposed Multiplier 4 Results and Discussion 5 Conclusion References Security Analysis of a Threshold Quantum State Sharing Scheme of an Arbitrary Single-Qutrit Based on Lagrange Interpolation Method 1 Introduction 2 Some Preliminaries 2.1 Qutrit [21] 2.2 Sequence of Qutrits [22] 2.3 Unitary Transformation for Qutrits 2.4 Dealer 2.5 Decoy Particles 2.6 Lagrange’s Interpolation Method [23] 3 Proposed Work 3.1 Conventional Information Sharing Scheme 3.2 State Sharing Scheme for QKD 4 Correctness of the Proposed Scheme 4.1 For Conventional Secret Sharing Scheme 4.2 For quantum State Sharing Scheme 5 Concrete Illustration of the Proposed Scheme 6 Security Analysis 6.1 Intercept-And-Resend Attack 6.2 PNS Attack [22] 6.3 Participants Attack 7 Conclusion References The Modified Algorithm of Quantum Key Distribution System Synchronization 1 Introduction 2 Synchronization in the Quantum Key Distribution System 3 The Algorithm of Optical Impulse Detection 4 The Improved Algorithm 5 Conclusion References Person Re-Identification by Analyzing Dynamic Variations in Gait Sequences 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Active Energy Image 3.2 Affine Moment Invariants 3.3 Estimation of Matching Weights 3.4 Principal Component Analysis 3.5 K-Nearest Neighbor Classifier 4 Experimental Results and Observations 5 Conclusion References Big Data Analytics and Machine Learning Technologies for HPC Applications 1 Introduction 2 Survey of Key Domains 2.1 Weather and Climate 2.2 Astrophysics 2.3 Agriculture 2.4 Bioinformatics 3 Merits of AI in HPC 4 Migration of HPC to AI 5 Conclusion References Breast Cancer Classification Using Transfer Learning 1 Introduction 2 Approach 2.1 Undersampling and Data Preparation 2.2 Image Augmentation 2.3 Transfer Learning 3 Deep Learning Architectures 3.1 VGG16 and VGG19 3.2 ResNet50 3.3 DenseNet 3.4 EfficientNet 3.5 MobileNet 4 Experiment and Results 4.1 Datasets 4.2 Data Preparation 4.3 Results 5 Conclusion References A Novel Fusion Framework for Salient Object Detection Based on Support Vector Regression 1 Introduction 2 Related Work 3 Proposed Model 3.1 Training Samples Generation 3.2 Support Vector Regression for Saliency Computation 3.3 Post Processing 4 Experimental Setup and Results 4.1 Performance Comparison with State-of-the-art Methods 4.2 Computational Time 5 Conclusion and Future Work References Implementing Delta Checks for Laboratory Investigations Module of Hospital Management Systems 1 Introduction 2 Literature Review and Motivation 3 Delta Function and Its Variants 3.1 Absolute Delta Value 3.2 Percentage Delta Value 3.3 Absolute Rate Difference Delta 3.4 Percentage Absolute Rate Difference Delta 3.5 Estimating Delta Check Thresholds 4 Investigation Module in HMIS 5 Implementation of Delta Function 5.1 User Interfaces & Alerts 5.2 Post-Alert Reconciliation 6 Conclusions and Future Work References Convolutional Neural Network-Based Automatic Brain Tumor Detection 1 Introduction 2 Background 3 Methodology 3.1 Preprocessing 3.2 Convolution Neural Network 3.3 Data Augmentation 3.4 VGG-16 CNN Architecture 4 Results and Discussion 4.1 Basic Dataset 4.2 Brain Tumor Dataset 4.3 Evaluation with Other Models 5 Conclusion References An Efficient Communication Protocol for Energy-Constraint IoT Devices for Environment Monitoring Applications 1 Introduction 2 Literature Survey 2.1 Clustering in WSN 2.2 Routing in WSN 3 Preliminaries 3.1 Network Model 4 Proposed Work 4.1 Start Phase 4.2 Clustering Phase 4.3 CH-to-CH Routing Path Formation 4.4 Data Forwarding Phase 5 Implementation and Performance Evaluation 5.1 Simulation Setup 5.2 Hardware Setup 6 Conclusion References Efficient Pest Bird-Controlling Algorithm in Unmanned Agriculture System 1 Introduction 1.1 Background 1.2 Crop-Preventing Strategies 1.3 Motivation 1.4 Contribution 2 System Design and Preliminaries 2.1 Network Model 2.2 Rudimentary Assumptions 3 Proposed Work 3.1 Phase I: Event Reporting 3.2 Phase II: Finding Optimal Serving Points 3.3 Phase III: UAV Trajectory Construction 3.4 Phase IV: Request Serving 4 Performance Evaluation 4.1 Performance Metrics 5 Conclusion References Face Tracker-Assisted Multi-Person Face Recognition in Surveillance Videos 1 Introduction 2 Related Works 2.1 Face Detection Algorithms 2.2 Face Recognition Algorithms 2.3 Face Tracking Algorithms 3 Proposed Framework 3.1 Extracting Features and Distance Calculation 3.2 Face Detection and Alignment 3.3 Face Recognition Methodology 3.4 Distance Calculation 3.5 Improved Face Recognition Using Intelligent Face Tracking 3.6 Local Minimum and Global Minimum 4 Experimental and Results 4.1 Experimental Setup 4.2 Dataset 4.3 Experimental Results 4.4 Recognition Performance 5 Conclusion References Decision Support System on the Need for Veterinary Control of Passing Livestock and Farm Produce 1 Introduction 2 Literature Review 3 Design Methodology 3.1 Factor Model 4 System Implementation and Testing 4.1 Training of the Proposed System 4.2 Testing the Proposed Model 5 Conclusion and Future Work References A Home Automation System Based on Bluetooth Technology Using an Android Smartphone 1 Introduction 2 Related Works 3 Methodology and Design 3.1 Working Principle 3.2 Software Requirements 4 Results 5 Conclusion and Recommendations References Author Index