ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Expert Clouds and Applications: Proceedings of ICOECA 2021

دانلود کتاب ابرهای خبره و برنامه های کاربردی: مجموعه مقالات ICOECA 2021

Expert Clouds and Applications: Proceedings of ICOECA 2021

مشخصات کتاب

Expert Clouds and Applications: Proceedings of ICOECA 2021

ویرایش: 1 
نویسندگان: , , ,   
سری: Lecture Notes in Networks and Systems 
ISBN (شابک) : 981162125X, 9789811621253 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 718 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 21 مگابایت 

قیمت کتاب (تومان) : 33,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Expert Clouds and Applications: Proceedings of ICOECA 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب ابرهای خبره و برنامه های کاربردی: مجموعه مقالات ICOECA 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب ابرهای خبره و برنامه های کاربردی: مجموعه مقالات ICOECA 2021



این کتاب حاوی مقالات اصلی از کنفرانس بین‌المللی ابرهای خبره و برنامه‌های کاربردی (ICOECA 2021)، سازمان‌دهی شده توسط دانشکده فناوری GITAM، بنگلور، هند در 18 تا 19 فوریه 2021 است. بینش‌های تحقیقاتی جدید در مورد هوش مصنوعی، داده‌های بزرگ را پوشش می‌دهد. رایانش ابری، پایداری و سیستم های خبره مبتنی بر دانش. این کتاب تحقیقات نوآورانه را از همه جنبه‌ها از جمله حوزه‌های نظری، عملی و تجربی که مربوط به سیستم‌های خبره، ابرهای پایدار و فناوری‌های هوش مصنوعی است، مورد بحث قرار می‌دهد.


توضیحاتی درمورد کتاب به خارجی

This book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2021), organized by GITAM School of Technology, Bangalore, India during February 18–19, 2021. It covers new research insights on artificial intelligence, big data, cloud computing, sustainability, and knowledge-based expert systems. The book discusses innovative research from all aspects including theoretical, practical, and experimental domains that pertain to the expert systems, sustainable clouds, and artificial intelligence technologies.



فهرست مطالب

Preface
Acknowledgements
Contents
Editors and Contributors
Minimizing Energy Through Task Allocation Using Rao-2 Algorithm in Fog Assisted Cloud Environment
	1 Introduction
	2 Related Work
	3 Optimization Algorithms
		3.1 Rao-2 Algorithm
		3.2 MaxmaxUtil
		3.3 ECTC
	4 Problem Formulation
		4.1 Task Scheduling in Fog Environment
		4.2 Energy Consumption Model
	5 An Illustration
	6 Simulation Results
	7 Conclusion
	References
Sensitivity Context Aware Privacy Preserving Disease Prediction
	1 Introduction
	2 Related Work
	3 The Proposed System
	4 Sensitivity Context-Aware Privacy-Preserving Disease Prediction
	5 Results and Discussions
	6 Conclusion
	References
Designing a Smart Speaking System for Voiceless Community
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 System Design
		3.2 Dataset Process
		3.3 Hardware Design
	4 Experimental Results and Discussion
		4.1 Communication from Common Person to Dumb Person
		4.2 Output Analysis Graph
	5 Conclusion
	References
ANNs for Automatic Speech Recognition—A Survey
	1 Introduction
	2 Overview of Artificial Neural Network
	3 Survey of ANN for Speech Recognition
	4 Applications of ANN for ASR
	5 Conclusions
	References
Cybersecurity in the Age of the Internet of Things: An Assessment of the Users’ Privacy and Data Security
	1 Introduction
	2 Review of Related Work
	3 Findings and Discussion
	4 Conclusion
	References
Application of Artificial Intelligence in New Product Development: Innovative Cases of Crowdsourcing
	1 Introduction
	2 Review of Related Work
	3 Findings and Discussion
	4 Conclusion
	References
The Effect of the Topology Adaptation on Search Performance in Overlay Network
	1 Introduction
	2 Overlay Network
	3 Related Work
	4 System Model of Work
	5 Simulation Result and Analysis
		5.1 Simulation Setting
	6 Conclusion and Future Work
	References
Flanker Task-Based VHDR Dataset Analysis for Error Rate Prediction
	1 Introduction
	2 Related Works
	3 System Design and Implementation
		3.1 Data Acquisition
		3.2 Loading Data
		3.3 Creating an Approach
	4 Result Analysis
		4.1 Offline Analysis
		4.2 Online analysis
	5 Conclusion
	6 Future Work
	References
Integrating University Computing Laboratories with AWS for Better Resource Utilization
	1 Introduction
	2 Literature Survey
	3 Integration Model
	4 Implementations
	5 Conclusion
	References
IoT-Based Control of Dosa-Making Robot
	1 Introduction
	2 Problem Statement
	3 Related Works
	4 Wireless Protocols Used for Controlling IoT Devices
	5 System Architecture
	6 Design and Implementation
	7 Iot-Based Control
	8 Conclusion
	References
Classification of Idiomatic Sentences Using AWD-LSTM
	1 Introduction
	2 Background
		2.1 ULMFiT
		2.2 AWD-LSTM
		2.3 Fast AI
		2.4 Algorithm for Proposed Work
	3 Literature Survey
		3.1 Works on Idiom Recognition:
		3.2 Works on Text Classification
	4 The Proposed Transfer Learning Model Experimental Setup
		4.1 Experimental Setup and Analysis:
		4.2 Building Language Model
		4.3 Language Model Fine-Tuning
		4.4 Building Classifier Model
	5 Experimental Results
	6 Conclusion and Future Work
	References
Developing an IoT-Based Data Analytics System for Predicting Soil Nutrient Degradation Level
	1 Introduction
	2 Literature Review
	3 Proposed Method
		3.1 IoT Devices
		3.2 Feature Reduction Using Principal Component Analysis (PCA)
		3.3 ML Algorithm for Prediction
	4 Linear Regression (LR)
	5 Decision Tree (DT)
	6 Random Forest (RF)
	7 Conclusion
	References
A Survey on Cloud Resources Allocation Using Multi-agent System
	1 Introduction
	2 Motivation
	3 Cloud Definition
		3.1 Types of Services in Cloud
		3.2 Deployment Models in Cloud
	4 Multi-agent System (MAS)
	5 Literature Survey
	6 Summary
	7 Conclusions
	References
IoT-Based Smart Helmet for Riders
	1 Introduction
	2 Literature Survey
	3 Purpose
	4 Scope and Objective
	5 Module Description
		5.1 Helmet Side
		5.2 Bike Side
	6 Components
		6.1 Hardware Requirements
		6.2 Software Requirements
	7 Implementation of Proposed Methodology
	8 Result
	References
Collision Avoidance in Vehicles Using Ultrasonic Sensor
	1 Introduction
	2 Existing Modules
		2.1 Central Acceleration Sensor
		2.2 Recognition of Vehicles by Using Wireless Network Sensor.
		2.3 Automobile Collision Avoidance System
		2.4 An Obstacle Detection and Tracking System Using a 2D Laser Sensor
		2.5 Intelligent Mechatronic Braking System
	3 Purpose
	4 Specific Objective
	5 Project Justification
	6 Project Scope
	7 Hardware Components
		7.1 Arduino Uno
		7.2 Ultrasonic Sensors
		7.3 Servo Motor
		7.4 LCD Display
		7.5 Buzzer
	8 Methodology
		8.1 Central Control Module
		8.2 Obstacle Sensing Unit
		8.3 Driver Circuit
		8.4 Warning System
	9 Working Principle
	10 Result
	11 Conclusion
	References
Privacy Challenges and Enhanced Protection in Blockchain Using Erasable Ledger Mechanism
	1 Introduction
	2 Privacy Challenges in Blockchain
		2.1 Transaction Privacy Challenge
		2.2 Identity Privacy Challenge
	3 Existing Privacy-Preserving Mechanisms for Blockchain
		3.1 Coin Mixing Services
		3.2 Zero-Knowledge Proof Mechanism
		3.3 Ring Signature
		3.4 Homomorphic Encryption
		3.5 Hidden Address
		3.6 Trusted Execution Environment
		3.7 Secure Multi-party Computation
	4 Applications of Existing Privacy Mechanisms
		4.1 Mixcoin
		4.2 Blindcoin
		4.3 Dash
		4.4 CoinShuffle
		4.5 TumbleBit
		4.6 Zerocoin
		4.7 Zerocash
		4.8 CryptoNote
	5 Summary of Existing Blockchain Privacy Mechanisms
	6 Discussion on Limitations of Existing Privacy Mechanisms
	7 Proposed Method for Efficient Privacy Enhancement
	8 Future Research Directions
	9 Conclusion
	References
Data Privacy and Security Issues in HR Analytics: Challenges and the Road Ahead
	1 Introduction
	2 Related Work
	3 Findings and Discussion
	4 Conclusion
	References
Narrow Band Internet of Things as Future Short Range Communication Tool
	1 Introduction
	2 NB-IoT
	3 Applications
	4 Existing Technology
	5 Challenges
		5.1 Low Devices Cost
		5.2 Long Battery Life
		5.3 Achieving Lightweight Protocols
	6 Application
	7 Simulator
	8 Algorithms
	9 Conclusion
	References
Lightweight Logic Obfuscation in Combinational Circuits for Improved Security—An Analysis
	1 Introduction
	2 Literature Survey
		2.1 Design for Security Methods
	3 Lightweight Obfuscation Approach
		3.1 Fault Impact-Based Critical Node Identification
	4 Results and Analysis
		4.1 Area and Power Analysis
		4.2 Output Corruption
	5 Conclusion
	References
Analysis of Machine Learning Data Security in the Internet of Things (IoT) Circumstance
	1 Introduction
	2 Literature Review
	3 Implementation of Machine Learning IoT Security
		3.1 A Challenge of Data Security
		3.2 Analysis of ML with Data Security
		3.3 Analysis of ML with Data Security
	4 Conclusion
	References
Convergence of Artificial Intelligence in IoT Network for the Smart City—Waste Management System
	1 Introduction
	2 Solid Waste Management with IoT Technology
	3 Logistics and Collection of Waste
	4 Introduction of Smart Bins
	5 Vehicles
	6 Research Gap
	7 Conclusion and Future Scope
	References
Energy Aware Load Balancing Algorithm for Upgraded Effectiveness in Green Cloud Computing
	1 Introduction
	2 Related Work
	3 Green Cloud Computing
	4 Load Balancing
	5 Existing Algorithm
		5.1 One-sided Random Sampling
		5.2 Bumble Bee Foraging
	6 Proposed Algorithm
	7 Conclusion
	References
Review on Health and Productivity Analysis in Soil Moisture Parameters
	1 Introduction
		1.1 Soil Based on Texture
		1.2 Soil Based on Color
	2 Materials and Methods
	3 Results and Discussion
	4 Conclusion
	References
Soft Computing-Based Optimization of pH Control System of Sugar Mill
	1 Introduction
	2 Genetic Algorithm
	3 Simulated Annealing Technique
	4 PI Controller Design and Optimization Using GA and SA
	5 Novelty
	6 Conclusion
	References
A Comparative Analysis of Various Data Mining Techniques to Predict Heart Disease
	1 Introduction
	2 Literature Review
	3 Data Mining Techniques
	4 Proposed Methodology
	5 Results and Discussions
	6 Conclusion
	References
Performance Comparison of Various Controllers in Different SDN Topologies
	1 Introduction
	2 Related Work
	3 Background
		3.1 Mininet
		3.2 Topologies
		3.3 Round-Trip Time
		3.4 SDN Controllers
	4 Implementation
		4.1 Test Bed Description
		4.2 System Requirement
	5 Result and Analysis
	6 Conclusion and Future Scope
	References
Preprocessing of Datasets Using Sequential and Parallel Approach: A Comparison
	1 Introduction
	2 Background Theory
		2.1 Data Preprocessing (DPP)
		2.2 Message Passing Interface
	3 Research Methodology
		3.1 Data Preprocessing using Sequential Approach
		3.2 Data Preprocessing Using Parallel Approach
	4 Results and Analysis
		4.1 Dataset Used
		4.2 Running Environment
		4.3 Results
	5 Conclusion and Future Enhancement
	References
Blockchain Technology and Academic Certificate Authenticity—A Review
	1 Introduction
	2 Literature Review
		2.1 What is Blockchain?
		2.2 How Does Blockchain Works
		2.3 What are the Main Advantages of Blockchain?
		2.4 Key Weakness Related with Blockchain Technology
		2.5 Blockchain Application in Academic Certificate Authenticity
	3 Related Works
		3.1 RQ1: What are the Challenges Today to Trait the Fake Degree Certificates Problem?
		3.2 RQ2: What are the Solutions and Applications Suggested with Blockchain Technology for Educational System?
		3.3 RQ3: How to Inspect and Find Innovation Ways to Propose a Replacement Technology?
	4 Technical Challenges
	5 Conclusion
	References
Word Significance Analysis in Documents for Information Retrieval by LSA and TF-IDF using Kubeflow
	1 Introduction
	2 Literature Review
	3 Implementation of the System
		3.1 Term Frequency (TF)
		3.2 Inverse Document Frequency (IDF)
		3.3 Term Frequency–Inverse Document Frequency
		3.4 Probabilistic Frequency
		3.5 LSA with Dimensionality Reduction
	4 Results
	5 Conclusions
	References
A Detailed Survey on Deep Learning Techniques for Real-Time Image Classification, Recognition and Analysis
	1 Introduction
	2 Literature Survey
		2.1 Recognition of Face with the Help of CNN
		2.2 Single-Shot Detector for Object Detection
	3 Related Work
		3.1 Deep Learning Techniques:
	4 Crime Detection with Deep Learning Techniques
		4.1 Various Malwares
	5 Conclusion and Future Scope
	References
Pole Line Fault Detector with Sophisticated Mobile Application
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Current and Potential Transformers
		3.2 Bridge Circuit
		3.3 Controller
		3.4 Liquid Crystal Display and Buzzer
		3.5 Lora Module
		3.6 ESP
		3.7 GPS
	4 Working
	5 Results and Discussion
	6 Graphical Representation
	7 Merits and Demerits
	8 Conclusion and Future Scope
	References
Learning of Advanced Telecommunication Computing Architecture (ATCA)-Based Femto Gateway Framework
	1 Introductıon
	2 Literature Survey
	3 Methodology
		3.1 3G Femtocell Network Architecture
		3.2 Small Cell Gateway on ATCA Platform
		3.3 ATCAv2
		3.4 ATCAv2 Shelf (Front)
		3.5 ATCAv2 Shelf (Rear)
		3.6 Fabric and Base Dual Star Topology
		3.7 Dual Star Topology
		3.8 Bono Blades (Application Blades)
		3.9 Malban Blades (Switching Blades)
	4 4G Gateway
		4.1 Directory Services
	5 Conclusion
	References
Infected Inflation and Symptoms Without the Impact of Covid 19 with Ahp Calculation Method
	1 Introduction
	2 Materials and Methods
	3 Discussion
	4 Database and User Interface Print Screen
	5 Conclusion
	References
Smartphone Application Using Fintech in Jakarta Transportation for Shopping in the Marketplace
	1 Introduction
	2 Literature Review
	3 Proposed Systems
	4 Conclusion
	References
Secured Student Portal Using Cloud
	1 Introduction
		1.1 DES Algorithm
	2 Literature Survey
		2.1 Automatic Attendance Recording System Using Mobile Telephone
		2.2 Data Encryption Performance Based on Blowfish
		2.3 Security Analysis of Blowfish Algorithm
		2.4 Transactions on Cloud Computing
	3 Theoretical Analysis
		3.1 Possible Attacks on DES
		3.2 Enhanced Blowfish Algorithm
		3.3 Working
		3.4 Pseudocode of Blowfish Algorithm
	4 Experimental Analysis
	5 Conclusion
	References
Expert System for Determining Welding Wire Specification Using Naïve Bayes Classifier
	1 Introduction
	2 Research Method
	3 Result and Discussion
	4 Design and Implementation
	5 Conclusion
	References
Analysis of Market Behavior Using Popular Digital Design Technical Indicators and Neural Network
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results and Discussions
		4.1 Data Analysis
	5 Experimental Analysis
	6 Conclusion
	References
Distributed Multimodal Aspective on Topic Model Using Sentiment Analysis for Recognition of Public Health Surveillance
	1 Introduction
	2 Related Works
	3 Proposed Methodology
		3.1 Data Collection
		3.2 Preprocessing
		3.3 Similarity Metrics
		3.4 Hadoop Distributed Latent Dirichlet Allocation (HdiLDA)
		3.5 HdinNMF
		3.6 HdiPLSA
	4 Experimental Analyses and Discussion
		4.1 Evaluation Performance
	5 Conclusion and Future Scope
	References
Cluster-Based Multi-context Trust-Aware Routing for Internet of Things
	1 Introduction
	2 Literature Survey
	3 Network Model
	4 Trust Evaluation Scheme
		4.1 Communication Trust
		4.2 Nobility Trust
		4.3 Data-Related Trust
		4.4 Overall Trust (OT)
		4.5 Routing Process
	5 Experimental Evaluations
		5.1 Simulation Environment
		5.2 Simulation Results
	6 Conclusion
	References
Energy-Efficient Cluster-Based Trust-Aware Routing for Internet of Things
	1 Introduction
	2 Literature Survey
	3 Network Model
	4 Trust Evaluation Scheme
		4.1 Communication Trust
		4.2 Nobility Trust
		4.3 Data-Related Trust
		4.4 Overall Trust(OT)
		4.5 Routing Process
	5 Experimental Evaluations
		5.1 Simulation Environment
		5.2 Simulation Results
	6 Conclusion
	References
Toward Intelligent and Rush-Free Errands Using an Intelligent Chariot
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Results
	5 Conclusion
	References
NOMA-Based LPWA Networks
	1 Introduction
	2 System Model
		2.1 Algorithm
	3 Numerical Results
	4 Conclusions
	References
Copy Move Forgery Detection by Using Integration of SLIC and SIFT
	1 Introduction
	2 Literature Review
	3 Proposed System
		3.1 Pre-processing
		3.2 SLIC Segmentation
		3.3 Feature Extraction and Description
		3.4 Thresholding
	4 Stimulation Result and Analysis
		4.1 Dataset
		4.2 Evaluation Metrics
		4.3 Results
	5 Conclusion
	References
Nonlinear Autoregressive Exogenous ANN Algorithm-Based Predicting of COVID-19 Pandemic in Tamil Nadu
	1 Introduction
	2 Modeling of ANN
		2.1 Feed-Forward Neural Network (FFNN)
		2.2 Cascaded Feed-Forward Neural Network
		2.3 Nonlinear Autoregressive Exogenous (NARX)-ANN Model
	3 Design of ANN for COVID-19 Prediction
	4 Result and Discussions
	5 Conclusion
	References
Detecting Image Similarity Using SIFT
	1 Introduction
	2 Related Work
	3 Procedure
		3.1 Pixel Difference
	4 SIFT Algorithm
		4.1 Extrema Detection
		4.2 Keypoint Selection
		4.3 Keypoint Descriptors
		4.4 Keypoint Matching
	5 Pseudocode
	6 Results
	7 Conclusion
	References
A Secure Key Agreement Framework for Cloud Computing Using ECC
	1 Introduction
		1.1 Motivation and Contribution
		1.2 Organization of the Paper
	2 Preliminaries
		2.1 Background of Elliptic Curve Group
	3 The Proposed Framework
		3.1 Initialization Phase
		3.2 User Registration Phase
		3.3 Authentication and Key Agreement Phase
	4 Security Analysis
		4.1 Session Key Security
		4.2 Message Authentication
		4.3 Replay Attack
		4.4 Man in the Middle Attack
		4.5 Known Session-Specific Attack
		4.6 Key Freshness
		4.7 Known Key Secrecy
	5 Performance Analysis
	6 Conclusion and Future Direction
	References
Web-Based Application for Freelance Tailor
	1 Introduction
	2 Previous Research
	3 The Proposed Model
	4 Conclusion
	References
Image Retrieval Using Local Majority Intensity Patterns
	1 Introduction
	2 Related Study
		2.1 Local Binary Pattern
		2.2 Local Ternary Pattern
	3 Proposed Approach
		3.1 Construct the Histogram
	4 Results and Discussions
		4.1 Precision and Recall
		4.2 F-Measure
	5 Future Work and Conclusion
	References
A Comprehensive Survey of NOMA-Based Cooperative Communication Studies for 5G Implementation
	1 Introduction
	2 Overview of Cooperative Communication
		2.1 Analysis of NOMA in the Context of 5G
		2.2 Cooperative Communication Structure
		2.3 Types of Cooperative Communication CC
	3 Survey of Existing Study on NOMA Based Cooperative Communication Technique
		3.1 NOMA-Based Cooperative Communication Technique Based on V2X Multicasting
		3.2 NOMA-Based Multicast for High Reliability in 5G Networks
		3.3 Cooperative Relaying in 5G Networks
	4 Design Observation and Identified Research Gaps
		4.1 Key Design Observation from the Survey
		4.2 Identifying Key Research Areas from NOMA Based Cooperative Communication
	5 Conclusion
	References
Analytical Study on Load Balancing Algorithms in Cloud Computing
	1 Introduction
	2 Cloud Service Models
		2.1 Software as a Service (SAAS)
		2.2 Platform as a Service (PAAS)
		2.3 Infrastructure as a Service (IAAS)
	3 Load Balancing
		3.1 Load Balancing Types
		3.2 Challenges
		3.3 Load Balancing Metrics
		3.4 Degree of Imbalance
	4 Existing Load Balancing Algorithms
		4.1 An Adaptive Firefly Load Balancing Algorithm
		4.2 Bio-inspired Load Balancing Algorithm
		4.3 Dynamic Load Balancing Algorithm
		4.4 Throttled Load Balancing Algorithm
		4.5 Hybridization of the Meta-heuristic Load Balancing Algorithm
		4.6 Improved Dynamic Load Balancing Algorithm Based on Least-Connection Scheduling
		4.7 Load Balancing Algorithm for Allocation of Resources
		4.8 Water Flow-Like Load Balancing Algorithm
		4.9 First Fit Decreasing Method
	5 Conclusion
	References
Smart Driving Assistance Using Arduino and Proteus Design Tool
	1 Introduction
		1.1 CAN Protocol
	2 Proposed System
	3 Hardware Components
		3.1 Arduino UNO
		3.2 LM 35
		3.3 LDR Photoresistor
		3.4 Gas Sensor
		3.5 MCP2551 Transceiver
		3.6 Beeper
		3.7 LCD
		3.8 Ultrasonic Sensor
		3.9 Infrared Sensor
	4 Flow Diagram of the System
	5 Experimental Results
	6 Conclusion
	7 Future Scope
	References
Fog Computing—Characteristics, Challenges and Job Scheduling Survey
	1 Introduction
	2 Related Works
	3 Fog Computing Characteristics
		3.1 Heterogeneity Support
		3.2 Geographical Distribution
		3.3 Decentralization
		3.4 Mobility Support
		3.5 Proximity to Users
		3.6 Real-Time Interaction
		3.7 Edge location
		3.8 Low Latency
	4 Challenges of Fog Computing
		4.1 Models for Programming
		4.2 Reliability and Security
		4.3 Management of Resources
		4.4 Scheduling the Jobs
		4.5 Heterogeneity
		4.6 Incentives
		4.7 Standardization
		4.8 Fog Servers
		4.9 Consumption of Energy
	5 Applications
		5.1 Smart Traffic Control System
		5.2 Video Streaming Systems
		5.3 The Pressure of Water in Dams
		5.4 Health care
		5.5 Mobile Big Data Analytics
		5.6 Connected Car
	6 State of Art
		6.1 Allocation of Resources and Scheduling In Fog Computing
		6.2 Faults Tolerance in Fog Computing
		6.3 Mobile Computing Based on Fog
		6.4 Tools for Simulating in Fog Computing
	7 Job Scheduling Approaches
	8 Conclusion
	References
A Review on Techniques of Radiation Dose Reduction in Radiography
	1 Introduction
	2 Literature Survey
		2.1 Model-Based Deep Medical Imaging
		2.2 Model-Based Iterative CT Image Reconstruction on GPUs
		2.3 Feasibility of Low-Dose Computed Tomography with Testicular Cancer Victims
		2.4 High Completion Model-Based Image Restoration
		2.5 Model-Based Iterative Image Restoration
		2.6 Nonlinear Diffusion Method
		2.7 Dose Index and Dose Length Product Level
	3 Discussion
	4 Conclusion and Future Scope
	References
Application of NLP for Information Extraction from Unstructured Documents
	1 Introduction
	2 Literature Review
	3 Methods
		3.1 Custom SpaCy Pipeline
		3.2 Document Categorization
		3.3 Job Vacancy Information Parsing
	4 Conclusion and Future Work
	References
Scoring of Resume and Job Description Using Word2vec and Matching Them Using Gale–Shapley Algorithm
	1 Introduction
	2 Literature Review
	3 Methods
		3.1 Scoring
		3.2 Matching Using Gale–Shapley Algorithm
	4 Conclusion and Future Works
	References
Author Index




نظرات کاربران