دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: I. Jeena Jacob, Francisco M. Gonzalez-Longatt, Selvanayaki Kolandapalayam Shanmugam, Ivan Izonin سری: Lecture Notes in Networks and Systems ISBN (شابک) : 981162125X, 9789811621253 ناشر: Springer سال نشر: 2021 تعداد صفحات: 718 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 21 مگابایت
در صورت تبدیل فایل کتاب Expert Clouds and Applications: Proceedings of ICOECA 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ابرهای خبره و برنامه های کاربردی: مجموعه مقالات ICOECA 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب حاوی مقالات اصلی از کنفرانس بینالمللی ابرهای خبره و برنامههای کاربردی (ICOECA 2021)، سازماندهی شده توسط دانشکده فناوری GITAM، بنگلور، هند در 18 تا 19 فوریه 2021 است. بینشهای تحقیقاتی جدید در مورد هوش مصنوعی، دادههای بزرگ را پوشش میدهد. رایانش ابری، پایداری و سیستم های خبره مبتنی بر دانش. این کتاب تحقیقات نوآورانه را از همه جنبهها از جمله حوزههای نظری، عملی و تجربی که مربوط به سیستمهای خبره، ابرهای پایدار و فناوریهای هوش مصنوعی است، مورد بحث قرار میدهد.
This book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2021), organized by GITAM School of Technology, Bangalore, India during February 18–19, 2021. It covers new research insights on artificial intelligence, big data, cloud computing, sustainability, and knowledge-based expert systems. The book discusses innovative research from all aspects including theoretical, practical, and experimental domains that pertain to the expert systems, sustainable clouds, and artificial intelligence technologies.
Preface Acknowledgements Contents Editors and Contributors Minimizing Energy Through Task Allocation Using Rao-2 Algorithm in Fog Assisted Cloud Environment 1 Introduction 2 Related Work 3 Optimization Algorithms 3.1 Rao-2 Algorithm 3.2 MaxmaxUtil 3.3 ECTC 4 Problem Formulation 4.1 Task Scheduling in Fog Environment 4.2 Energy Consumption Model 5 An Illustration 6 Simulation Results 7 Conclusion References Sensitivity Context Aware Privacy Preserving Disease Prediction 1 Introduction 2 Related Work 3 The Proposed System 4 Sensitivity Context-Aware Privacy-Preserving Disease Prediction 5 Results and Discussions 6 Conclusion References Designing a Smart Speaking System for Voiceless Community 1 Introduction 2 Related Works 3 Methodology 3.1 System Design 3.2 Dataset Process 3.3 Hardware Design 4 Experimental Results and Discussion 4.1 Communication from Common Person to Dumb Person 4.2 Output Analysis Graph 5 Conclusion References ANNs for Automatic Speech Recognition—A Survey 1 Introduction 2 Overview of Artificial Neural Network 3 Survey of ANN for Speech Recognition 4 Applications of ANN for ASR 5 Conclusions References Cybersecurity in the Age of the Internet of Things: An Assessment of the Users’ Privacy and Data Security 1 Introduction 2 Review of Related Work 3 Findings and Discussion 4 Conclusion References Application of Artificial Intelligence in New Product Development: Innovative Cases of Crowdsourcing 1 Introduction 2 Review of Related Work 3 Findings and Discussion 4 Conclusion References The Effect of the Topology Adaptation on Search Performance in Overlay Network 1 Introduction 2 Overlay Network 3 Related Work 4 System Model of Work 5 Simulation Result and Analysis 5.1 Simulation Setting 6 Conclusion and Future Work References Flanker Task-Based VHDR Dataset Analysis for Error Rate Prediction 1 Introduction 2 Related Works 3 System Design and Implementation 3.1 Data Acquisition 3.2 Loading Data 3.3 Creating an Approach 4 Result Analysis 4.1 Offline Analysis 4.2 Online analysis 5 Conclusion 6 Future Work References Integrating University Computing Laboratories with AWS for Better Resource Utilization 1 Introduction 2 Literature Survey 3 Integration Model 4 Implementations 5 Conclusion References IoT-Based Control of Dosa-Making Robot 1 Introduction 2 Problem Statement 3 Related Works 4 Wireless Protocols Used for Controlling IoT Devices 5 System Architecture 6 Design and Implementation 7 Iot-Based Control 8 Conclusion References Classification of Idiomatic Sentences Using AWD-LSTM 1 Introduction 2 Background 2.1 ULMFiT 2.2 AWD-LSTM 2.3 Fast AI 2.4 Algorithm for Proposed Work 3 Literature Survey 3.1 Works on Idiom Recognition: 3.2 Works on Text Classification 4 The Proposed Transfer Learning Model Experimental Setup 4.1 Experimental Setup and Analysis: 4.2 Building Language Model 4.3 Language Model Fine-Tuning 4.4 Building Classifier Model 5 Experimental Results 6 Conclusion and Future Work References Developing an IoT-Based Data Analytics System for Predicting Soil Nutrient Degradation Level 1 Introduction 2 Literature Review 3 Proposed Method 3.1 IoT Devices 3.2 Feature Reduction Using Principal Component Analysis (PCA) 3.3 ML Algorithm for Prediction 4 Linear Regression (LR) 5 Decision Tree (DT) 6 Random Forest (RF) 7 Conclusion References A Survey on Cloud Resources Allocation Using Multi-agent System 1 Introduction 2 Motivation 3 Cloud Definition 3.1 Types of Services in Cloud 3.2 Deployment Models in Cloud 4 Multi-agent System (MAS) 5 Literature Survey 6 Summary 7 Conclusions References IoT-Based Smart Helmet for Riders 1 Introduction 2 Literature Survey 3 Purpose 4 Scope and Objective 5 Module Description 5.1 Helmet Side 5.2 Bike Side 6 Components 6.1 Hardware Requirements 6.2 Software Requirements 7 Implementation of Proposed Methodology 8 Result References Collision Avoidance in Vehicles Using Ultrasonic Sensor 1 Introduction 2 Existing Modules 2.1 Central Acceleration Sensor 2.2 Recognition of Vehicles by Using Wireless Network Sensor. 2.3 Automobile Collision Avoidance System 2.4 An Obstacle Detection and Tracking System Using a 2D Laser Sensor 2.5 Intelligent Mechatronic Braking System 3 Purpose 4 Specific Objective 5 Project Justification 6 Project Scope 7 Hardware Components 7.1 Arduino Uno 7.2 Ultrasonic Sensors 7.3 Servo Motor 7.4 LCD Display 7.5 Buzzer 8 Methodology 8.1 Central Control Module 8.2 Obstacle Sensing Unit 8.3 Driver Circuit 8.4 Warning System 9 Working Principle 10 Result 11 Conclusion References Privacy Challenges and Enhanced Protection in Blockchain Using Erasable Ledger Mechanism 1 Introduction 2 Privacy Challenges in Blockchain 2.1 Transaction Privacy Challenge 2.2 Identity Privacy Challenge 3 Existing Privacy-Preserving Mechanisms for Blockchain 3.1 Coin Mixing Services 3.2 Zero-Knowledge Proof Mechanism 3.3 Ring Signature 3.4 Homomorphic Encryption 3.5 Hidden Address 3.6 Trusted Execution Environment 3.7 Secure Multi-party Computation 4 Applications of Existing Privacy Mechanisms 4.1 Mixcoin 4.2 Blindcoin 4.3 Dash 4.4 CoinShuffle 4.5 TumbleBit 4.6 Zerocoin 4.7 Zerocash 4.8 CryptoNote 5 Summary of Existing Blockchain Privacy Mechanisms 6 Discussion on Limitations of Existing Privacy Mechanisms 7 Proposed Method for Efficient Privacy Enhancement 8 Future Research Directions 9 Conclusion References Data Privacy and Security Issues in HR Analytics: Challenges and the Road Ahead 1 Introduction 2 Related Work 3 Findings and Discussion 4 Conclusion References Narrow Band Internet of Things as Future Short Range Communication Tool 1 Introduction 2 NB-IoT 3 Applications 4 Existing Technology 5 Challenges 5.1 Low Devices Cost 5.2 Long Battery Life 5.3 Achieving Lightweight Protocols 6 Application 7 Simulator 8 Algorithms 9 Conclusion References Lightweight Logic Obfuscation in Combinational Circuits for Improved Security—An Analysis 1 Introduction 2 Literature Survey 2.1 Design for Security Methods 3 Lightweight Obfuscation Approach 3.1 Fault Impact-Based Critical Node Identification 4 Results and Analysis 4.1 Area and Power Analysis 4.2 Output Corruption 5 Conclusion References Analysis of Machine Learning Data Security in the Internet of Things (IoT) Circumstance 1 Introduction 2 Literature Review 3 Implementation of Machine Learning IoT Security 3.1 A Challenge of Data Security 3.2 Analysis of ML with Data Security 3.3 Analysis of ML with Data Security 4 Conclusion References Convergence of Artificial Intelligence in IoT Network for the Smart City—Waste Management System 1 Introduction 2 Solid Waste Management with IoT Technology 3 Logistics and Collection of Waste 4 Introduction of Smart Bins 5 Vehicles 6 Research Gap 7 Conclusion and Future Scope References Energy Aware Load Balancing Algorithm for Upgraded Effectiveness in Green Cloud Computing 1 Introduction 2 Related Work 3 Green Cloud Computing 4 Load Balancing 5 Existing Algorithm 5.1 One-sided Random Sampling 5.2 Bumble Bee Foraging 6 Proposed Algorithm 7 Conclusion References Review on Health and Productivity Analysis in Soil Moisture Parameters 1 Introduction 1.1 Soil Based on Texture 1.2 Soil Based on Color 2 Materials and Methods 3 Results and Discussion 4 Conclusion References Soft Computing-Based Optimization of pH Control System of Sugar Mill 1 Introduction 2 Genetic Algorithm 3 Simulated Annealing Technique 4 PI Controller Design and Optimization Using GA and SA 5 Novelty 6 Conclusion References A Comparative Analysis of Various Data Mining Techniques to Predict Heart Disease 1 Introduction 2 Literature Review 3 Data Mining Techniques 4 Proposed Methodology 5 Results and Discussions 6 Conclusion References Performance Comparison of Various Controllers in Different SDN Topologies 1 Introduction 2 Related Work 3 Background 3.1 Mininet 3.2 Topologies 3.3 Round-Trip Time 3.4 SDN Controllers 4 Implementation 4.1 Test Bed Description 4.2 System Requirement 5 Result and Analysis 6 Conclusion and Future Scope References Preprocessing of Datasets Using Sequential and Parallel Approach: A Comparison 1 Introduction 2 Background Theory 2.1 Data Preprocessing (DPP) 2.2 Message Passing Interface 3 Research Methodology 3.1 Data Preprocessing using Sequential Approach 3.2 Data Preprocessing Using Parallel Approach 4 Results and Analysis 4.1 Dataset Used 4.2 Running Environment 4.3 Results 5 Conclusion and Future Enhancement References Blockchain Technology and Academic Certificate Authenticity—A Review 1 Introduction 2 Literature Review 2.1 What is Blockchain? 2.2 How Does Blockchain Works 2.3 What are the Main Advantages of Blockchain? 2.4 Key Weakness Related with Blockchain Technology 2.5 Blockchain Application in Academic Certificate Authenticity 3 Related Works 3.1 RQ1: What are the Challenges Today to Trait the Fake Degree Certificates Problem? 3.2 RQ2: What are the Solutions and Applications Suggested with Blockchain Technology for Educational System? 3.3 RQ3: How to Inspect and Find Innovation Ways to Propose a Replacement Technology? 4 Technical Challenges 5 Conclusion References Word Significance Analysis in Documents for Information Retrieval by LSA and TF-IDF using Kubeflow 1 Introduction 2 Literature Review 3 Implementation of the System 3.1 Term Frequency (TF) 3.2 Inverse Document Frequency (IDF) 3.3 Term Frequency–Inverse Document Frequency 3.4 Probabilistic Frequency 3.5 LSA with Dimensionality Reduction 4 Results 5 Conclusions References A Detailed Survey on Deep Learning Techniques for Real-Time Image Classification, Recognition and Analysis 1 Introduction 2 Literature Survey 2.1 Recognition of Face with the Help of CNN 2.2 Single-Shot Detector for Object Detection 3 Related Work 3.1 Deep Learning Techniques: 4 Crime Detection with Deep Learning Techniques 4.1 Various Malwares 5 Conclusion and Future Scope References Pole Line Fault Detector with Sophisticated Mobile Application 1 Introduction 2 Literature Survey 3 Methodology 3.1 Current and Potential Transformers 3.2 Bridge Circuit 3.3 Controller 3.4 Liquid Crystal Display and Buzzer 3.5 Lora Module 3.6 ESP 3.7 GPS 4 Working 5 Results and Discussion 6 Graphical Representation 7 Merits and Demerits 8 Conclusion and Future Scope References Learning of Advanced Telecommunication Computing Architecture (ATCA)-Based Femto Gateway Framework 1 Introductıon 2 Literature Survey 3 Methodology 3.1 3G Femtocell Network Architecture 3.2 Small Cell Gateway on ATCA Platform 3.3 ATCAv2 3.4 ATCAv2 Shelf (Front) 3.5 ATCAv2 Shelf (Rear) 3.6 Fabric and Base Dual Star Topology 3.7 Dual Star Topology 3.8 Bono Blades (Application Blades) 3.9 Malban Blades (Switching Blades) 4 4G Gateway 4.1 Directory Services 5 Conclusion References Infected Inflation and Symptoms Without the Impact of Covid 19 with Ahp Calculation Method 1 Introduction 2 Materials and Methods 3 Discussion 4 Database and User Interface Print Screen 5 Conclusion References Smartphone Application Using Fintech in Jakarta Transportation for Shopping in the Marketplace 1 Introduction 2 Literature Review 3 Proposed Systems 4 Conclusion References Secured Student Portal Using Cloud 1 Introduction 1.1 DES Algorithm 2 Literature Survey 2.1 Automatic Attendance Recording System Using Mobile Telephone 2.2 Data Encryption Performance Based on Blowfish 2.3 Security Analysis of Blowfish Algorithm 2.4 Transactions on Cloud Computing 3 Theoretical Analysis 3.1 Possible Attacks on DES 3.2 Enhanced Blowfish Algorithm 3.3 Working 3.4 Pseudocode of Blowfish Algorithm 4 Experimental Analysis 5 Conclusion References Expert System for Determining Welding Wire Specification Using Naïve Bayes Classifier 1 Introduction 2 Research Method 3 Result and Discussion 4 Design and Implementation 5 Conclusion References Analysis of Market Behavior Using Popular Digital Design Technical Indicators and Neural Network 1 Introduction 2 Literature Review 3 Methodology 4 Results and Discussions 4.1 Data Analysis 5 Experimental Analysis 6 Conclusion References Distributed Multimodal Aspective on Topic Model Using Sentiment Analysis for Recognition of Public Health Surveillance 1 Introduction 2 Related Works 3 Proposed Methodology 3.1 Data Collection 3.2 Preprocessing 3.3 Similarity Metrics 3.4 Hadoop Distributed Latent Dirichlet Allocation (HdiLDA) 3.5 HdinNMF 3.6 HdiPLSA 4 Experimental Analyses and Discussion 4.1 Evaluation Performance 5 Conclusion and Future Scope References Cluster-Based Multi-context Trust-Aware Routing for Internet of Things 1 Introduction 2 Literature Survey 3 Network Model 4 Trust Evaluation Scheme 4.1 Communication Trust 4.2 Nobility Trust 4.3 Data-Related Trust 4.4 Overall Trust (OT) 4.5 Routing Process 5 Experimental Evaluations 5.1 Simulation Environment 5.2 Simulation Results 6 Conclusion References Energy-Efficient Cluster-Based Trust-Aware Routing for Internet of Things 1 Introduction 2 Literature Survey 3 Network Model 4 Trust Evaluation Scheme 4.1 Communication Trust 4.2 Nobility Trust 4.3 Data-Related Trust 4.4 Overall Trust(OT) 4.5 Routing Process 5 Experimental Evaluations 5.1 Simulation Environment 5.2 Simulation Results 6 Conclusion References Toward Intelligent and Rush-Free Errands Using an Intelligent Chariot 1 Introduction 2 Literature Survey 3 Methodology 4 Results 5 Conclusion References NOMA-Based LPWA Networks 1 Introduction 2 System Model 2.1 Algorithm 3 Numerical Results 4 Conclusions References Copy Move Forgery Detection by Using Integration of SLIC and SIFT 1 Introduction 2 Literature Review 3 Proposed System 3.1 Pre-processing 3.2 SLIC Segmentation 3.3 Feature Extraction and Description 3.4 Thresholding 4 Stimulation Result and Analysis 4.1 Dataset 4.2 Evaluation Metrics 4.3 Results 5 Conclusion References Nonlinear Autoregressive Exogenous ANN Algorithm-Based Predicting of COVID-19 Pandemic in Tamil Nadu 1 Introduction 2 Modeling of ANN 2.1 Feed-Forward Neural Network (FFNN) 2.2 Cascaded Feed-Forward Neural Network 2.3 Nonlinear Autoregressive Exogenous (NARX)-ANN Model 3 Design of ANN for COVID-19 Prediction 4 Result and Discussions 5 Conclusion References Detecting Image Similarity Using SIFT 1 Introduction 2 Related Work 3 Procedure 3.1 Pixel Difference 4 SIFT Algorithm 4.1 Extrema Detection 4.2 Keypoint Selection 4.3 Keypoint Descriptors 4.4 Keypoint Matching 5 Pseudocode 6 Results 7 Conclusion References A Secure Key Agreement Framework for Cloud Computing Using ECC 1 Introduction 1.1 Motivation and Contribution 1.2 Organization of the Paper 2 Preliminaries 2.1 Background of Elliptic Curve Group 3 The Proposed Framework 3.1 Initialization Phase 3.2 User Registration Phase 3.3 Authentication and Key Agreement Phase 4 Security Analysis 4.1 Session Key Security 4.2 Message Authentication 4.3 Replay Attack 4.4 Man in the Middle Attack 4.5 Known Session-Specific Attack 4.6 Key Freshness 4.7 Known Key Secrecy 5 Performance Analysis 6 Conclusion and Future Direction References Web-Based Application for Freelance Tailor 1 Introduction 2 Previous Research 3 The Proposed Model 4 Conclusion References Image Retrieval Using Local Majority Intensity Patterns 1 Introduction 2 Related Study 2.1 Local Binary Pattern 2.2 Local Ternary Pattern 3 Proposed Approach 3.1 Construct the Histogram 4 Results and Discussions 4.1 Precision and Recall 4.2 F-Measure 5 Future Work and Conclusion References A Comprehensive Survey of NOMA-Based Cooperative Communication Studies for 5G Implementation 1 Introduction 2 Overview of Cooperative Communication 2.1 Analysis of NOMA in the Context of 5G 2.2 Cooperative Communication Structure 2.3 Types of Cooperative Communication CC 3 Survey of Existing Study on NOMA Based Cooperative Communication Technique 3.1 NOMA-Based Cooperative Communication Technique Based on V2X Multicasting 3.2 NOMA-Based Multicast for High Reliability in 5G Networks 3.3 Cooperative Relaying in 5G Networks 4 Design Observation and Identified Research Gaps 4.1 Key Design Observation from the Survey 4.2 Identifying Key Research Areas from NOMA Based Cooperative Communication 5 Conclusion References Analytical Study on Load Balancing Algorithms in Cloud Computing 1 Introduction 2 Cloud Service Models 2.1 Software as a Service (SAAS) 2.2 Platform as a Service (PAAS) 2.3 Infrastructure as a Service (IAAS) 3 Load Balancing 3.1 Load Balancing Types 3.2 Challenges 3.3 Load Balancing Metrics 3.4 Degree of Imbalance 4 Existing Load Balancing Algorithms 4.1 An Adaptive Firefly Load Balancing Algorithm 4.2 Bio-inspired Load Balancing Algorithm 4.3 Dynamic Load Balancing Algorithm 4.4 Throttled Load Balancing Algorithm 4.5 Hybridization of the Meta-heuristic Load Balancing Algorithm 4.6 Improved Dynamic Load Balancing Algorithm Based on Least-Connection Scheduling 4.7 Load Balancing Algorithm for Allocation of Resources 4.8 Water Flow-Like Load Balancing Algorithm 4.9 First Fit Decreasing Method 5 Conclusion References Smart Driving Assistance Using Arduino and Proteus Design Tool 1 Introduction 1.1 CAN Protocol 2 Proposed System 3 Hardware Components 3.1 Arduino UNO 3.2 LM 35 3.3 LDR Photoresistor 3.4 Gas Sensor 3.5 MCP2551 Transceiver 3.6 Beeper 3.7 LCD 3.8 Ultrasonic Sensor 3.9 Infrared Sensor 4 Flow Diagram of the System 5 Experimental Results 6 Conclusion 7 Future Scope References Fog Computing—Characteristics, Challenges and Job Scheduling Survey 1 Introduction 2 Related Works 3 Fog Computing Characteristics 3.1 Heterogeneity Support 3.2 Geographical Distribution 3.3 Decentralization 3.4 Mobility Support 3.5 Proximity to Users 3.6 Real-Time Interaction 3.7 Edge location 3.8 Low Latency 4 Challenges of Fog Computing 4.1 Models for Programming 4.2 Reliability and Security 4.3 Management of Resources 4.4 Scheduling the Jobs 4.5 Heterogeneity 4.6 Incentives 4.7 Standardization 4.8 Fog Servers 4.9 Consumption of Energy 5 Applications 5.1 Smart Traffic Control System 5.2 Video Streaming Systems 5.3 The Pressure of Water in Dams 5.4 Health care 5.5 Mobile Big Data Analytics 5.6 Connected Car 6 State of Art 6.1 Allocation of Resources and Scheduling In Fog Computing 6.2 Faults Tolerance in Fog Computing 6.3 Mobile Computing Based on Fog 6.4 Tools for Simulating in Fog Computing 7 Job Scheduling Approaches 8 Conclusion References A Review on Techniques of Radiation Dose Reduction in Radiography 1 Introduction 2 Literature Survey 2.1 Model-Based Deep Medical Imaging 2.2 Model-Based Iterative CT Image Reconstruction on GPUs 2.3 Feasibility of Low-Dose Computed Tomography with Testicular Cancer Victims 2.4 High Completion Model-Based Image Restoration 2.5 Model-Based Iterative Image Restoration 2.6 Nonlinear Diffusion Method 2.7 Dose Index and Dose Length Product Level 3 Discussion 4 Conclusion and Future Scope References Application of NLP for Information Extraction from Unstructured Documents 1 Introduction 2 Literature Review 3 Methods 3.1 Custom SpaCy Pipeline 3.2 Document Categorization 3.3 Job Vacancy Information Parsing 4 Conclusion and Future Work References Scoring of Resume and Job Description Using Word2vec and Matching Them Using Gale–Shapley Algorithm 1 Introduction 2 Literature Review 3 Methods 3.1 Scoring 3.2 Matching Using Gale–Shapley Algorithm 4 Conclusion and Future Works References Author Index