ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Evolving Technologies for Computing, Communication and Smart World: Proceedings of ETCCS 2020

دانلود کتاب تکامل فن آوری برای محاسبات ، ارتباطات و دنیای هوشمند: مجموعه مقالات ETCCS 2020

Evolving Technologies for Computing, Communication and Smart World: Proceedings of ETCCS 2020

مشخصات کتاب

Evolving Technologies for Computing, Communication and Smart World: Proceedings of ETCCS 2020

دسته بندی: الکترونیک
ویرایش:  
نویسندگان: , , , ,   
سری: Lecture Notes in Electrical Engineering, 694 
ISBN (شابک) : 9811578036, 9789811578038 
ناشر: Springer Singapore 
سال نشر: 2021 
تعداد صفحات: 536 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 22 مگابایت 

قیمت کتاب (تومان) : 41,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Evolving Technologies for Computing, Communication and Smart World: Proceedings of ETCCS 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تکامل فن آوری برای محاسبات ، ارتباطات و دنیای هوشمند: مجموعه مقالات ETCCS 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب تکامل فن آوری برای محاسبات ، ارتباطات و دنیای هوشمند: مجموعه مقالات ETCCS 2020

این کتاب بهترین مقالات منتخب ارائه شده در کنفرانس بین‌المللی فناوری‌های در حال تکامل برای محاسبات، ارتباطات و دنیای هوشمند (ETCCS 2020) را ارائه می‌کند که در تاریخ 31 ژانویه تا 1 فوریه 2020 در C-DAC، نویدا، هند برگزار شد. این دانشگاه توسط دانشگاه فدرال جنوبی روسیه برگزار می شود. دانشگاه یان ویژیکوفسکی (UJW)، پولکوویتس، لهستان؛ و CSI، هند. C-DAC، Noida در طول این رویداد از MietY بودجه دریافت کرد. خدمات فنی از طریق EasyChair، Turnitin، MailChimp و IAC Education پشتیبانی می شوند. این کتاب شامل کارهای تحقیقاتی جاری در زمینه‌های فناوری‌های شبکه و محاسبات، شبکه‌های بی‌سیم و اینترنت اشیا (IoT)، فناوری‌های محاسباتی آینده‌نگر، فناوری‌های ارتباطی، امنیت و حریم خصوصی است.


توضیحاتی درمورد کتاب به خارجی

This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January–1 February 2020 at C-DAC, Noida, India. It is co-organized by Southern Federal University, Russia; University of Jan Wyżykowski (UJW), Polkowice, Poland; and CSI, India. C-DAC, Noida received funding from MietY during the event.  The technical services are supported through EasyChair, Turnitin, MailChimp and IAC Education. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.



فهرست مطالب

Preface
Contents
About the Editors
Toward Response-Type Identification for the Real Time
	1 Introduction
	2 Research Procedures
		2.1 Preprocessing Dataset
		2.2 Testing Dataset
		2.3 Tool with Classifiers
	3 Experimental Analysis
		3.1 Using Hold-Out
		3.2 Using k-Fold
		3.3 Feature Relationship with k-Fold
		3.4 User CPU Training Time with k-Fold
	4 Performance Measures
	5 Conclusion
	References
Automatic Leaf Species Recognition Using Deep Neural Network
	1 Introduction and Problem Statement
	2 Material and Methods
		2.1 System Configuration
		2.2 AlexNet
		2.3 Dataset
	3 Results and Discussion
	4 Conclusion
	References
Injecting Power Attacks with Voltage Glitching and Generation of Clock Attacks for Testing Fault Injection Attacks
	1 Introduction
	2 Related Work
	3 Contribution
	4 Concept of Generation of Clock Glitch Attack
		4.1 Generation of Underclock Glitch Attack
		4.2 Generation of Overclock Glitch Attack
	5 Power Glitch Attack-Producing Circuits on Cadence Virtuoso
		5.1 Power Supply Attack Versus Propagation Delay
		5.2 Types of Power Glitch Attack
		5.3 Effects of Power Glitch Attack on Combinational Circuits
	6 Conclusion
	References
Traffic Jam Minimization and Accident Avoidance System Using IoT
	1 Introduction
		1.1 Background and Research Motivation
	2 Related Work
	3 Proposed Model
		3.1 Proposed Algorithm and Flowchart for Maintaining a Threshold Distance Between Two Vehicles
		3.2 Proposed Algorithm and Flowchart for Overtaking
		3.3 Proposed Algorithm and Flowchart for Lane Shifting
	4 Discussion
		4.1 Maintaining a Threshold Distance Between Two Vehicles
		4.2 Overtaking
		4.3 Lane Changing
	5 Conclusion and Future Scope
	References
Software Reusability Estimation Using Machine Learning Techniques—A Systematic Literature Review
	1 Introduction
	2 Software Reuse Approaches
		2.1 Component-Based Software Development (CBSD)
		2.2 Object-Oriented Software Development (OOSD)
		2.3 Aspect-Oriented Software Development (AOSD)
	3 Machine Learning
		3.1 Supervised Learning
		3.2 Unsupervised Learning
	4 Machine Learning Techniques Used for Software Reusability Estimation
	5 Discussion
	6 Conclusion
	References
Unsupervised Learning-Based Sentiment Analysis with Reviewer's Emotion
	1 Introduction
	2 Motivation
	3 Related Work
	4 Proposed Research Work
	5 Methodology
	6 Execution and Implementation
		6.1 Dataset Selection
		6.2 Data Preprocessing
		6.3 Text Processing After Tokenisation
		6.4 Execution
	7 Results and Discussion
	8 Conclusion and Future Work
	References
Event-Triggered Share Price Prediction
	1 Introduction
	2 Related Work
	3 Proposed Research Work
	4 Methodology
		4.1 Long Short-Term Memory (LSTM)
	5 Execution and Implementation
		5.1 Dataset Selection
		5.2 Pre-processing of the Data and Polarity Assignment
		5.3 Methodology Used for Polarity Assignment
	6 Results
	7 Discussion
	8 Conclusion and Future Work
	References
A Review: Efficient Transportation—Future Aspects of IoV
	1 Introduction
		1.1 Layered Architecture and Network Model of IoV
		1.2 Network Model of IoV
	2 Related Work
	3 Important Findings
	4 Conclusion and Future Work
	References
Compact High Gain 28 GHz Concentric Circular Director Low-Cost Antenna for 5G Millimeter-Wave Communication
	1 Introduction
	2 Antenna Geometry and Analysis
		2.1 Antenna Structure
		2.2 Analysis
	3 Antenna Simulation Results and Discussion
		3.1 Return Loss, VSWR, and Impedance Bandwidth
		3.2 Radiation Performance
	4 State of Art Comparison
	5 Conclusion
	References
Questionnaire-Based Prediction of Hypertension Using Machine Learning
	1 Introduction
	2 Related Works
	3 Background
		3.1 Neural Networks
		3.2 Other Algorithms
	4 Designing a Neural Network
	5 Experiments
		5.1 Data set
		5.2 Data Cleaning
		5.3 Implementation Details
		5.4 Metrics
	6 Results
	7 Conclusion
	References
Nature-Inspired Computing Behaviour of Cellular Automata
	1 Introduction
	2 Natural Computation and Cellular Automata
		2.1 Early Stage of Research—During 1940s
		2.2 Innovation—During 1970s
		2.3 Recent Trends in Computation with Cellular Automata
	3 Preliminaries of Cellular Automata (CA)
		3.1 Characterization of CA
		3.2 Scope of CA in Complex Computation
	4 Computing Behaviour of Wolfram’s Elementary CA
		4.1 Elementary CA Modelling
		4.2 Elementary Cellular Automata (ECA) Properties
		4.3 ECA and Natural System Design and Computation
	5 Conclusion
	References
A Survey on Transport Layer Protocols for Reliable and Secure Wireless Sensor Networks
	1 Introduction
	2 Literature Background
	3 Comparison of Transport Layer Protocol
	4 Research Challenges
	5 Conclusion
	References
A Lightweight Exchangeable Encryption Scheme for IoT Devices Based on Vigenere Cipher and MLS Keystream
	1 Introduction
	2 Exchangeable Encryption Scheme
		2.1 MLS Generation
	3 Proposed Lightweight Cryptosystem
	4 Experimental Results
		4.1 Text Encryption
		4.2 Image Encryption
		4.3 Speech Encryption
	5 Conclusions
	References
Improving Steepest Descent Method by Learning Rate Annealing and Momentum in Neural Network
	1 Introduction
	2 Background and Related Works
	3 The Backpropagation for Improvement
		3.1 Backpropagation Learning
		3.2 Computation at Input Layer
		3.3 Computation at Hidden Layer
		3.4 Computation at Output Layer
	4 Calculation of Error
	5 Method of Steepest Descent
		5.1 Calculation of Weight Update
		5.2 Backpropagation Algorithm (BP)
	6 Proposed Improvement
		6.1 Momentum Update
		6.2 Learning Rate Annealing
	7 Conclusions
	References
Fingerprint and Face-Based Secure Biometric Authentication System Using Optimized Robust Features
	1 Introduction
		1.1 Motivation and Contribution
	2 Related Work
	3 Proposed Biometric Designs
		3.1 Fingerprint Recognition System (FPRS)
		3.2 Face Recognition System (FRS)
	4 Results
		4.1 Experimental Evaluation of FPRS and FRS
		4.2 Image Processing Results of FPRS and FRS
		4.3 Performance Parameters of FPRS and FRS
		4.4 Comparison of the Proposed Recognition Systems Against Existing Work
	5 Conclusion
	References
DevOps, DevSecOps, AIOPS- Paradigms to IT Operations
	1 Introduction
	2 DevOps Paradigm—Principles and Processes
	3 DevSecOps Paradigm—Principles and Processes
	4 AIOps Paradigm—Principles and Processes
	5 Sample Tools: DevOps, DevSecOps, AIOps
		5.1 DevOps Tools
		5.2 DevSecOps Tools
		5.3 AIOps Tools
	6 Conclusion
	References
Optimized Route Discovery and Node Registration for FANET
	1 Introduction
	2 Related Work
	3 Proposed Architecture
		3.1 The Setup Phase
		3.2 The Routing Architecture
		3.3 Lagrange Interpolation (LI)
	4 Results and Discussions
		4.1 Results Analysis
		4.2 Comparative Analysis of the Proposed Methodology and Past Studies [2, 3, 7]
	5 Conclusion
	References
4.1 GHz Low-Phase Noise Differential XCP LC-VCO with High Q and LC Noise Filtering
	1 Introduction
	2 Conventional VCO Design and Noise Issue
	3 Proposed VCO Design
	4 Results and Discussion
	5 Conclusion
	References
Secured Surveillance Storage Model Using Blockchain
	1 Introduction
	2 Related Work
	3 Preliminaries
		3.1 Blockchain
		3.2 Ethereum [7]
		3.3 IPFS [2]
		3.4 Smart Contract
	4 Smart Contract for S3 Model
		4.1 Process Flow
		4.2 Gnu Privacy Guard (GnuPG)
		4.3 IPFS
		4.4 Registration Authority
		4.5 Certificate Authority
	5 Experimental Evaluation
	6 Conclusion and Future Scope
	References
Information Retrieval in Financial Documents
	1 Introduction
	2 Related Work
	3 Research Methodology
		3.1 Data Ingestion Phase
		3.2 Entity Relation Formulation Phase
		3.3 Query Processing Phase
	4 Results and Analysis
		4.1 Comparison of a Generic System with Proposed System
	5 Conclusion and Future Scope
	References
VNF Security in Telco Environment
	1 Introduction
		1.1 NFV Infrastructure and Its Attacks
		1.2 Adoption Towards Virtualisation
		1.3 Evolved Packet Core as Virtualization Network Function
	2 Telco VNF Security
		2.1 Virtualisation Threat Vectors
	3 Our Approach to Handle VNF Security
	4 Future of Telecommunication Service Provider
	5 Conclusion
	6 Future Work
	References
Rank-Level Fusion of Random Indexing, Word Embedding, and TF-IDF-Based Rankings for Clinical Document Retrieval
	1 Introduction
	2 Previous Work
		2.1 Information Retrieval
		2.2 Random Indexing-Based Representation
		2.3 GLOVE-Based Representation
		2.4 Rank Level Fusion
	3 Proposed Technique
	4 Experiments and Results
	5 Conclusion and Future Work
	References
A Novel Feature Engineering Approach for Twitter-Based Text Sentiment Analysis
	1 Introduction
	2 Related Work
	3 Research Methodology
		3.1 Data Collection
		3.2 Train-Test Split
		3.3 Data Preprocessing
		3.4 Feature Engineering
		3.5 Classification
	4 Results and Analysis
		4.1 Text-Based Features
		4.2 Addition of Non-textual Features
	5 Conclusion and Future Scope
	References
Survey on DDoS and EDoS Attack in Cloud Environment
	1 Introduction
		1.1 Cloud Computing
		1.2 Challenges and Issues in Cloud Computing
		1.3 DDoS Attack
		1.4 Economic Denial of Sustainability Attack
		1.5 Difference between DDoS and EDoS.
	2 DDoS Mitigation Methodology
	3 EDoS Mitigation Methodology
	4 Conclusion
	References
Preprocessing Steps for Opinion Mining on Tweets
	1 Introduction
	2 Related Work
	3 Research Methodology
		3.1 Data Collection
		3.2 Data Cleaning
		3.3 Data Transformation
	4 Result Analysis
	5 Conclusion
	References
Machine Learning-Based Lightweight Android Malware Detection System with Static Features
	1 Introduction
	2 Background and Related Work
		2.1 Background
		2.2 Related Work
	3 Dataset
	4 Design and Implementation
		4.1 An Overview
		4.2 Feature Extraction
		4.3 Feature Engineering and Analysis
		4.4 Learning Model
	5 Evaluation
	6 Conclusion
	References
Area and Power Efficient 2 Bit Multiplier by Using Enhanced Half Adder
	1 Introduction
	2 Review of Conventional Circuit
		2.1 Half Adder
		2.2 Conventional Multiplier
	3 Proposed Circuit Design
		3.1 Proposed Half Adder
		3.2 Proposed Multiplier
	4 Results and Discussion
	5 Conclusion
	References
Security Analysis of a Threshold Quantum State Sharing Scheme of an Arbitrary Single-Qutrit Based on Lagrange Interpolation Method
	1 Introduction
	2 Some Preliminaries
		2.1 Qutrit [21]
		2.2 Sequence of Qutrits [22]
		2.3 Unitary Transformation for Qutrits
		2.4 Dealer
		2.5 Decoy Particles
		2.6 Lagrange’s Interpolation Method [23]
	3 Proposed Work
		3.1 Conventional Information Sharing Scheme
		3.2 State Sharing Scheme for QKD
	4 Correctness of the Proposed Scheme
		4.1 For Conventional Secret Sharing Scheme
		4.2 For quantum State Sharing Scheme
	5 Concrete Illustration of the Proposed Scheme
	6 Security Analysis
		6.1 Intercept-And-Resend Attack
		6.2 PNS Attack [22]
		6.3 Participants Attack
	7 Conclusion
	References
The Modified Algorithm of Quantum Key Distribution System Synchronization
	1 Introduction
	2 Synchronization in the Quantum Key Distribution System
	3 The Algorithm of Optical Impulse Detection
	4 The Improved Algorithm
	5 Conclusion
	References
Person Re-Identification by Analyzing Dynamic Variations in Gait Sequences
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Active Energy Image
		3.2 Affine Moment Invariants
		3.3 Estimation of Matching Weights
		3.4 Principal Component Analysis
		3.5 K-Nearest Neighbor Classifier
	4 Experimental Results and Observations
	5 Conclusion
	References
Big Data Analytics and Machine Learning Technologies for HPC Applications
	1 Introduction
	2 Survey of Key Domains
		2.1 Weather and Climate
		2.2 Astrophysics
		2.3 Agriculture
		2.4 Bioinformatics
	3 Merits of AI in HPC
	4 Migration of HPC to AI
	5 Conclusion
	References
Breast Cancer Classification Using Transfer Learning
	1 Introduction
	2 Approach
		2.1 Undersampling and Data Preparation
		2.2 Image Augmentation
		2.3 Transfer Learning
	3 Deep Learning Architectures
		3.1 VGG16 and VGG19
		3.2 ResNet50
		3.3 DenseNet
		3.4 EfficientNet
		3.5 MobileNet
	4 Experiment and Results
		4.1 Datasets
		4.2 Data Preparation
		4.3 Results
	5 Conclusion
	References
A Novel Fusion Framework for Salient Object Detection Based on Support Vector Regression
	1 Introduction
	2 Related Work
	3 Proposed Model
		3.1 Training Samples Generation
		3.2 Support Vector Regression for Saliency Computation
		3.3 Post Processing
	4 Experimental Setup and Results
		4.1 Performance Comparison with State-of-the-art Methods
		4.2 Computational Time
	5 Conclusion and Future Work
	References
Implementing Delta Checks for Laboratory Investigations Module of Hospital Management Systems
	1 Introduction
	2 Literature Review and Motivation
	3 Delta Function and Its Variants
		3.1 Absolute Delta Value
		3.2 Percentage Delta Value
		3.3 Absolute Rate Difference Delta
		3.4 Percentage Absolute Rate Difference Delta
		3.5 Estimating Delta Check Thresholds
	4 Investigation Module in HMIS
	5 Implementation of Delta Function
		5.1 User Interfaces & Alerts
		5.2 Post-Alert Reconciliation
	6 Conclusions and Future Work
	References
Convolutional Neural Network-Based Automatic Brain Tumor Detection
	1 Introduction
	2 Background
	3 Methodology
		3.1 Preprocessing
		3.2 Convolution Neural Network
		3.3 Data Augmentation
		3.4 VGG-16 CNN Architecture
	4 Results and Discussion
		4.1 Basic Dataset
		4.2 Brain Tumor Dataset
		4.3 Evaluation with Other Models
	5 Conclusion
	References
An Efficient Communication Protocol for Energy-Constraint IoT Devices for Environment Monitoring Applications
	1 Introduction
	2 Literature Survey
		2.1 Clustering in WSN
		2.2 Routing in WSN
	3 Preliminaries
		3.1 Network Model
	4 Proposed Work
		4.1 Start Phase
		4.2 Clustering Phase
		4.3 CH-to-CH Routing Path Formation
		4.4 Data Forwarding Phase
	5 Implementation and Performance Evaluation
		5.1 Simulation Setup
		5.2 Hardware Setup
	6 Conclusion
	References
Efficient Pest Bird-Controlling Algorithm in Unmanned Agriculture System
	1 Introduction
		1.1 Background
		1.2 Crop-Preventing Strategies
		1.3 Motivation
		1.4 Contribution
	2 System Design and Preliminaries
		2.1 Network Model
		2.2 Rudimentary Assumptions
	3 Proposed Work
		3.1 Phase I: Event Reporting
		3.2 Phase II: Finding Optimal Serving Points
		3.3 Phase III: UAV Trajectory Construction
		3.4 Phase IV: Request Serving
	4 Performance Evaluation
		4.1 Performance Metrics
	5 Conclusion
	References
Face Tracker-Assisted Multi-Person Face Recognition in Surveillance Videos
	1 Introduction
	2 Related Works
		2.1 Face Detection Algorithms
		2.2 Face Recognition Algorithms
		2.3 Face Tracking Algorithms
	3 Proposed Framework
		3.1 Extracting Features and Distance Calculation
		3.2 Face Detection and Alignment
		3.3 Face Recognition Methodology
		3.4 Distance Calculation
		3.5 Improved Face Recognition Using Intelligent Face Tracking
		3.6 Local Minimum and Global Minimum
	4 Experimental and Results
		4.1 Experimental Setup
		4.2 Dataset
		4.3 Experimental Results
		4.4 Recognition Performance
	5 Conclusion
	References
Decision Support System on the Need for Veterinary Control of Passing Livestock and Farm Produce
	1 Introduction
	2 Literature Review
	3 Design Methodology
		3.1 Factor Model
	4 System Implementation and Testing
		4.1 Training of the Proposed System
		4.2 Testing the Proposed Model
	5 Conclusion and Future Work
	References
A Home Automation System Based on Bluetooth Technology Using an Android Smartphone
	1 Introduction
	2 Related Works
	3 Methodology and Design
		3.1 Working Principle
		3.2 Software Requirements
	4 Results
	5 Conclusion and Recommendations
	References
Author Index




نظرات کاربران