دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1st ed. 2022] نویسندگان: Ch. Satyanarayana (editor), Debasis Samanta (editor), Xiao-Zhi Gao (editor), Rajiv Kumar Kapoor (editor) سری: ISBN (شابک) : 9811698848, 9789811698842 ناشر: Springer سال نشر: 2022 تعداد صفحات: 686 زبان: English فرمت فایل : RAR (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 105 Mb
در صورت تبدیل فایل کتاب High Performance Computing and Networking: Select Proceedings of CHSN 2021 (Lecture Notes in Electrical Engineering, 853) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب محاسبات و شبکه با کارایی بالا: مجموعه مقالات CHSN 2021 را انتخاب کنید (یادداشت های سخنرانی در مهندسی برق، 853) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مجموعه مقالات دومین کنفرانس بین المللی بینایی کامپیوتر، محاسبات با کارایی بالا، دستگاه های هوشمند و شبکه ها (CHSN 2021) است. این کتاب مقالات تحقیقاتی با کیفیت بالا در زمینه یادگیری ماشین، بینایی کامپیوتر و شبکه ها را برجسته می کند. محتوای این جلد تصویری به روز از ارتباط پیشرفته بین هوش محاسباتی، یادگیری ماشین و اینترنت اشیا به خواننده ارائه می دهد. مقالات موجود در این مجلد توسط متخصصین حوزه های مرتبط بررسی شده است. این کتاب به عنوان یک منبع مرجع ارزشمند برای دانشگاهیان و محققان در سراسر جهان خواهد بود.
This book comprises the proceedings of the 2nd International Conference on Computer Vision, High-Performance Computing, Smart Devices, and Networks (CHSN 2021). This book highlights the high-quality research articles in machine learning, computer vision, and networks. The content of this volume gives the reader an up-to-date picture of the state-of-the-art connection between computational intelligence, machine learning, and IoT. The papers included in this volume are peer-reviewed by experts in the related areas. The book will serve as a valuable reference resource for academics and researchers across the globe.
Program Committee Keynote Speakers Foreword Contents About the Editors An Effective DNLP Optimization Method for Economic Load Dispatch Problem 1 Introduction 2 Mathematical Model of Economic Load Dispatch 2.1 Constraints 2.2 Prohibited Operating Zones (POZ) 2.3 Ramp Rate Limits 3 Results 4 Conclusions References Multi-Perspective Reasoning Using Adaptive Learning 1 Introduction 2 Literature Review 3 Proposed Work 3.1 Multi-perspective Learning 3.2 Neighbor Recognition Algorithm 4 Results and Discussions 5 Conclusion References Ink Recognition Using TDNN and Bi-LSTM 1 Introduction 2 Related Work 3 Dataset Description 4 Methodology 4.1 Pre-processing 4.2 Features Generation 4.3 Architecture 5 Results and Discussion 6 Conclusion and Future Work References Sarcasm Detection for Sentiment Analysis: A RNN-Based Approach Using Machine Learning 1 Introduction 2 Related Work 3 Methodology 4 Results 5 Conclusion and Future Scope References Statistical Analysis of Soil Properties Using Non-imaging Spectral Data for Quantitative Analysis of Raver Tehsil 1 Introduction 2 Study Area 3 Material and Methods 3.1 Spectral Data Acquisition 4 Results 5 Conclusion References Building an Efficient Heart Disease Prediction System by using Clustering Techniques 1 Introduction 2 Literature Survey 3 Parameters and Techniques for Predicting Heart Disease 3.1 Dataset Description and Pre-processing 3.2 The Algorithm for Clustering 3.3 The Algorithm for Classification 4 Experiment Setup 4.1 Testing Level I 4.2 Testing Level II 4.3 Testing Level III 5 Conclusion and Future Work References The GR1 Algorithm for Subgraph Isomorphism. A Study from Parallelism to Quantum Computing 1 Introduction 2 Terminology 3 Input Data 4 GR1 Algorithm 5 Tests 6 Quantum Computing Approach 7 Conclusions References Sliding Windowed Fuzzy Correlation Analysis-Based Marine Motion Detection 1 Introduction 2 Proposed Methodology 2.1 Background Model Generation 2.2 FCA-based Motion Detection 3 Dataset 4 Experimental Results 5 Conclusion References Generative Adversarial Network for Music Generation 1 Introduction 2 Background 2.1 Related Work in Music Generation 2.2 Generative Adversarial Networks 3 Proposed Model 3.1 Conditional GAN Model 4 Materials and Methods 4.1 Music Synthesizer Using Conditional GAN Models 4.2 Workflow 5 Results and Discussion 5.1 Generated Piano Rolls 5.2 Evaluation of Models 6 Conclusion References Automatic License Plate Recognition for Distorted Images Using SRGAN 1 Introduction 2 Related Work 3 System Architecture 3.1 Traditional ALPR System 3.2 ALPR System for Distorted Images 4 Methodology 4.1 License Plate Detection 4.2 Super Resolution 4.3 Character Segmentation 4.4 Character Recognition 5 Training Details 6 Experiments and Results 7 Conclusion References EEG Signals Classification for Right- and Left-Hand Movement Discrimination Using SVM and LDA Classifiers 1 Introduction 2 Materials and Methods 2.1 EEG Data Acquisition and Preprocessing 2.2 EEG Feature Extraction 2.3 Classifiers 3 Results and Discussion 4 Conclusion References A Comparative Study on Network Intrusion Detection System Using Deep Learning Algorithms and Enhancement of Deep Learning Models Using Generative Adversarial Network (GAN) 1 Introduction 2 Data set 3 Literature Review 4 Proposed Deep Learning Architectures 4.1 Convolutional Neural Network 4.2 Deep Neural Network 4.3 Recurrent Neural Network 4.4 RNN-LSTM 4.5 Enhancement Using GAN 5 Evaluation Metrics 6 Results and Analysis 7 Conclusion and Future Work References Indian Sign Language Detection Using YOLOv3 1 Introduction 2 Related Works 3 YOLOv3 Algorithm 3.1 Introduction to YOLOv3 3.2 Darknet-53 and YOLOv3 CNN 3.3 YOLOv3 Algorithm 4 Indian Sign Language 5 Sign Language Detection Using YOLOv3 Algorithm 6 Experiments and Results 6.1 Experimental Setup 6.2 Results 7 Conclusion References Feature Extraction-Based Phishing URL Detection Using Machine Learning Techniques 1 Introduction 2 Literature Survey 3 Methodology 3.1 Existing Methodology 3.2 Proposed Methodology 4 Implementation 4.1 Pseudocode 5 Results and Discussions 6 Conclusion and Future Scope References A Slant Transform and Diagonal Laplacian Based Fusion Algorithm for Visual Sensor Network Applications 1 Introduction 2 Slant Transform 3 Diagonal Laplacian (DL) Focus Measure 4 Proposed Algorithm 5 Performance Measures 5.1 Reference Measures 5.2 Non-reference Measures 6 Simulation Results and Analysis 7 Conclusions References Tracking Industrial Assets Using Blockchain Technology 1 Introduction 2 Related Work 3 Overview 3.1 Equip-Chain Architecture 3.2 Tracking of Industrial Assets Using Blockchain 3.3 Blockchain Implementation Through Application Server 4 Working Methodology 5 Conclusion References Prototype for Recognition and Classification of Textile Weaves Using Machine Learning 1 Introduction 2 Background 2.1 Fabrics 2.2 Artificial Neural Networks 2.3 Bilinear Convolutional Neural Networks 2.4 Related Works 3 Development 3.1 Sampling 3.2 Dataset Creation 3.3 Pre-processing 3.4 Model Training 3.5 Analysis of Results 3.6 Hyperparameters Optimization 4 Conclusion and Recommendations References Development of Deep Neural Network Algorithm for Identification of Cerebral Microstructural Changes in Brain Tumor for Post-COVID-19 Patients 1 Introduction 1.1 Background 1.2 Advantages of CNN for Post-COVID-19 Analysis 2 Related Work 3 Proposed Method 4 Results and Discussion 5 Conclusion References A Codebook Modification Method of Vector Quantization to Enhance Compression Ratio 1 Introduction 2 Literature Review 3 Proposed Method 3.1 Compression 3.2 Decompression 3.3 Memory Requirements for Proposed Method 4 Experimental Results 5 Conclusion References Intra Change Detection in Shelf Images Using Fast Discrete Curvelet Transform and Features from Accelerated Segment Test 1 Introduction 2 Background Study on Change Detection 3 Concepts Used 3.1 Wavelets 3.2 FAST Algorithm 4 Proposed Change Detection Algorithm 4.1 Misplaced Object Detection and Localization 5 Experimental Results and Discussion 5.1 Dataset 5.2 Results and Discussion 6 Conclusion References Mucormycosis Vaccine Design using Bioinformatic Tools 1 Introduction 1.1 Reverse Vaccinology 1.2 Immunoinformatics 1.3 Structural Vaccinology 2 Materials and Method 2.1 Sequence Retrieval and Analysis 2.2 Prediction of B-cell and T-cell Epitopes 2.3 Retrieval of the Protein and Epitope Structures 2.4 Molecular Docking Studies 3 Results 3.1 Prediction of Antigenicity and Physicochemical Analysis 3.2 B- and T-cell Epitope Prediction 3.3 Retrieval of the Protein and Epitope Structures 3.4 Molecular Docking Analysis 4 Discussion 5 Conclusion References Blockchain Implementation in IoT Privacy and Cyber Security Feasibility Study and Analysis 1 Introduction 2 Security Challenges and Role of Blockchain in IoT 2.1 Challenges 2.2 IoT Categories 2.3 Role of Blockchain and Integration with IoT 2.4 Blockchain IoT Market Growth Rate 3 Overview of Blockchain Technology 3.1 Properties of Blockchain 3.2 Types of Blockchain 3.3 Categories of Blockchains 3.4 Benefits of Blockchain 3.5 Blockchain Platforms for IoT 3.6 Blockchain Implementation in Different Domains 4 SWOT Analysis of Blockchain 5 Ethereum Blockchain 5.1 Smart Contract 5.2 Cryptography in Ethereum 5.3 Implementation and Testing 6 Discussion and Analysis 7 Conclusion References Modified ResNetModel for MSI and MSS Classification of Gastrointestinal Cancer 1 Introduction 2 Model Description 2.1 Baseline Approach 2.2 Transfer Learning Approach 2.3 Modified ResNet Model 3 Results and Discussion 3.1 Baseline Models 3.2 Transfer learning Models 3.3 Modified ResNet Model 4 Conclusion References An IoT-Enabled Healthcare System: Auto-predictive Colorectal Cancer with Colonoscopy Images Combined with the Convolutional Neural Network 1 Introduction 2 Proposed Computer-Assisted Detection (CAD) System 2.1 Large Intestine 2.2 Colonoscopy 2.3 Data Storage and Cloud Storage 2.4 Colonoscopy Image Datasets 2.5 Image Pre-processing 2.6 Feature Extraction 2.7 Feature Selection 2.8 Convolutional Neural Networks (CNN) 2.9 Convolutional Layer 3 Results 3.1 Datasets 3.2 Split Polyps and Non-polyps 3.3 Convolutional Neural Networks 3.4 Optimized Hyperparameters for 3 Conv—FC 4 Conclusion References Unfair Review Detection on Amazon Reviews Using Sentiment Analysis 1 Introduction 2 Literature Review 3 Proposed Work 3.1 Introduction 3.2 System Architecture Diagram 4 Description of Algorithms 4.1 Logistic Regression 5 Description of Tools and Dataset 6 Results and Observations 6.1 Stepwise Description of Results 6.2 Observations from the Work 7 Conclusion References Decentralized Coded Caching for the Internet of Things (IoT) Using User Cooperation 1 Introduction 2 Related Works 3 Overview of Proposed Methodology 3.1 System Setup 3.2 Proposed Algorithm 3.3 Reason Behind Choosing s = 2 to Incorporate User Cooperation 3.4 Development of Generalized Equation 3.5 Verification of Generalized Equation 4 Performance Analysis 5 Conclusion References Cryptanalysis of SIMON (32/64) Cipher Using Satisfiability Modulo Theories 1 Introduction 2 SMT Solver-Based Cryptanalysis 2.1 Z3 Standard Algorithm 3 SIMON Block Cipher 3.1 SIMON Design Description 4 SIMON (32/64) Cryptanalysis Using SMT Solvers 5 SIMON (32/64) Experiment Results 5.1 SMT Result Developed for the Following SIMON (32/64) 6 Conclusion References Personal Safety Monitoring Devices in Wake of COVID19: Application of IoT and Sensor Technology 1 Introduction 2 COVID19: A Case Study 2.1 Test Cases or Total Number of Sample Tested 2.2 Non-vulnerable Cases 2.3 Susceptible or Vulnerable Cases 2.4 Positive Cases or Active Cases 2.5 Transmission Rate 2.6 Recovered Cases 2.7 Infection Outbreak 2.8 Rate of Positive Cases 2.9 Rate of Negative Cases 3 Literature Survey 4 IoT for COVID19 5 IOT Enabling Personal Safety Methodology and Equipment 5.1 ICT Enabled Wrist Band 5.2 ICT Enabled Face Shield 6 Conclusion References A Systematic Review of Deep Learning Approaches for Computer Network and Information Security 1 Introduction 2 Methodology 3 Motivation 4 Literature Review 5 Deep Learning Approaches 5.1 AC-GAN and SVM/DT/RF 5.2 CNN and RNN 5.3 CNN and LSTM 5.4 ImCNN and ImGWO 5.5 LSTM and Autoencoder 5.6 1D-CNN, LSTM, and SAE 5.7 DNN, IGASAA, and SAA 5.8 CNN and SAE 5.9 DBN and SVM 6 Autoencoder and LSTM 6.1 GAN and Autoencoder 7 Current Issues and Future Directions 8 Conclusion References Online Mail Junk Penetration by Using Genetic Algorithm Probabilistic Weights and Word Compute 1 Introduction 2 Related Work 3 Bayes and Naive Bayes Classifiers Related Work 4 Proposed Algorithm 5 Experimental Output 6 Conclusion References A Novel Study and Analysis on Global Navigation Satellite System Threats and Attacks 1 Introduction 2 The Spoofing Attack Chronology 3 The Spoofing Attacks Background Survey 4 Conclusion and Future Scope References Modified Gaussian Mixture Distribution-Based Deep Learning Technique for Beamspace Channel Estimation in mmWave Massive MIMO Systems 1 Introduction 2 Related Works 3 System Model 3.1 Copyright Forms 3.2 Problem Formulation 3.3 Modified GM-Based LAMP Network for Beamspace Channel Estimation 4 Simulation Results and Discussion 4.1 Simulation Setup 4.2 Simulation Results of the Channel Model—Saleh Valenzuela 4.3 Simulation Results of the Dataset—DeepMIMO 4.4 Simulation Results of the Computational Complexity Analysis 5 Conclusions References Efficient Structural Matching for RNA Secondary Structure Using Bit-Parallelism 1 Introduction 2 Review of Literature 2.1 Definitions 2.2 Parameterized Matching Problem 2.3 S-Matching Problem 3 Proposed Algorithm 3.1 Bit-Parallelism Example 4 Experimental Results 5 Results 6 Conclusion References Facial Emotion Recognition Using Hybrid Approach for DCT and DBACNN 1 Introduction 2 Related Work 3 Proposed Method 3.1 Convolutional Neural Network 3.2 DBACNN for ETI Pooling 3.3 Classification with DBACNNs 3.4 For Expression Analysis, Learning Principle Marks is Essential 3.5 Experimental Evaluation Data Sets 4 Result with Discussion 4.1 Databases 4.2 Performance Analysis Using CK + Data Set 4.3 Performance Analysis Using JAFFE Data set 4.4 Performance Analysis Using FER-2013 Data set 4.5 Tables 4.6 Performance Analysis Using Snapshot Images 5 Conclusions References SquashCord: Video Conferencing Application Using WebRTC 1 Introduction 2 Related Work 3 SquashCord: Video Conferencing Application 3.1 WebRTC Architecture 3.2 WebSocket Architecture (Signal Exchanging Data Carrier) 3.3 Design of SquashCord: Video Conferencing Application 4 Our Approach for Implementation 4.1 Module-Wise Implementation 5 Security Measures 5.1 Protocol Layer Security 5.2 Signalling Server Security 6 Result Analysis 7 Conclusion References A Hybrid Pipeline for the Segmentation of Eye Regions from Video Frames 1 Introduction 2 Related Work 3 Dataset 4 Design of the Hybrid Pipeline for Segmentation 4.1 Dual-Model Approach and Image Augmentation 4.2 Image Preprocessing and the Switch to U-Net 4.3 Segmentation Models, Experimentation with Loss Functions and Model Ensembling 4.4 Experimentation with Nascent Techniques 5 Final Hybrid Pipeline and Results 6 Conclusion References EIDIMA: Edge-based Intrusion Detection of IoT Malware Attacks using Decision Tree-based Boosting Algorithms 1 Introduction 2 Related Works 3 Materials and Method 3.1 Experimental Setup 3.2 Proposed Method 3.3 Machine Learning Algorithms 4 Result Analysis 5 Conclusion References Market Basket Analysis Recommender System using Apriori Algorithm 1 Introduction 2 Literature Review 3 Apriori Algorithm, Methodology, and Implementation 3.1 Association Rule Mining 3.2 Apriori Algorithm 4 Experimentation and Results 4.1 Visualization of Time Taken by Algorithms on Different Steps of Execution 4.2 Analysis after Experimentation 4.3 Visualization of Rules after Analysis 5 Conclusion References Meta-Analysis to Prognosis Myocardial Infarction Using 12 Lead ECG 1 Introduction 1.1 Electrocardiogram 1.2 12 Lead ECG Position 2 Detection of MI Using 12 Lead ECG 2.1 ST-Segment 2.2 Lower Bundle Branch Block (LBBB) 3 Related Work 3.1 Data Acquisition 3.2 Preprocessing 3.3 Classification Algorithm 4 Discussion and Future Work 5 Conclusion References Biometric Recognition from Face-Voice Using Rough-Neuro-Fuzzy Classifiers 1 Introduction 2 Related Works 3 Person Identification by FR 3.1 ARK Face Template Grabber and Effective Region-Of-Face Extraction 3.2 Feature Extraction 3.3 Classifier Design–Fuzzy Logic to MLP 4 Person Identification by VR 5 Classifier Design 5.1 Feature Extraction—MFCC 6 Local Voice-Enabled Face Deformation Profile–LVFDP 7 Experimental Results 8 Conclusion References Early Breast Cancer Detection from Blood Plasma Using Hubness-Aware Adaptive Neural Network with Hybrid Feature Selection 1 Introduction 2 Related Works 3 Methodology 3.1 Ontology and Pathway Informed Gene Selection 3.2 Feature Selection Based on Laplacian Score 3.3 Early Cancer Prediction Using Hubness-Aware Adaptive Neural Network 3.4 Adaptive Learning Rate for Neural Network 4 Results and Discussion 5 Conclusion References Comparative Analysis of CNN Methodologies Used for Classification of Diabetic Retinopathy 1 Introduction 2 Literature Review 3 Proposed Methodology 3.1 Data Description 3.2 Transfer Learning 3.3 Machine Learning Algorithms 3.4 Proposed Model 4 Results 5 Conclusion References Prediction of Diabetes and Recommendation of Insulin Dosage for Diabetic Patients 1 Introduction 2 Related Work 3 Methodology 3.1 Data Preprocessing 3.2 Feature Selection 3.3 Model Fitting 3.4 Predicting 3.5 Recommendation of Insulin 4 Results 5 Conclusion and Future Work References A Cloud Based Breast Cancer Risk Prediction (BCRP) System 1 Introduction 2 Related Work 3 Classification Models 3.1 Decision Tree Classifier 3.2 Gradient Boosting Classifier 3.3 KNN Classifier 3.4 Multilayer Perceptron Classifier 3.5 Gaussian Naïve Bayes Classifier 3.6 Logistic Regression Classifier 3.7 Random Forest Classifier 3.8 Linear Discriminant Analysis 4 Methodology 4.1 Training and Testing Dataset 4.2 Classification Model 4.3 Online Deployment of BCRP Model 5 Results and Discussion 5.1 Confusion Matrix 5.2 Quantitative Measures 5.3 Receiver Operating Characteristic 5.4 AUC 5.5 Comparative Evaluation 6 Results and Discussion References Automatic Road Network Reconstruction from GPS Trajectory Data using Curve Reconstruction Algorithms 1 Introduction 2 Related Works 2.1 Point Clustering 2.2 Incremental Track Insertion 2.3 Intersection Linking 3 Methodology 3.1 Representative Points Extraction Algorithm 3.2 Reconstruction of Road Networks 4 Experiments and Result 4.1 Experiment on GPS Trajectories Collected from Public Roads 4.2 Experiment on Public Map Database 5 Conclusion References Power Aware Energy Efficient Virtual Machine Migration (PAEEVMM) in Cloud Computing 1 Introduction 2 Literature Survey 3 Algorithm Used 4 Methodology 5 Experimental Setup and Results 6 Conclusion and Future Scope References Automotive RADAR Human Classification Algorithm Through Simulation Analysis: Basics and Practical Challenges 1 Introduction 1.1 Automotive Radar Types Overview and Specific Applications 2 Problem Statement 3 Discussion of Global Techniques and Constraints 3.1 Field of View (FOV) 3.2 Radar Signals 3.3 Antenna Types and Pattern 3.4 Mounting Position 3.5 Object of Interest (OOI) 3.6 Object Detection 3.7 Object Classification 4 Systems Engineering and Advanced Signal Processing Based Existing Solution 5 Results 6 Open Topics for the Future Researchers 7 Conclusions and Future Works References A Study on Defensive Issues and Challenges in Internet of Things 1 Introduction 2 IoT Structured Framework 2.1 Sensor Subsystem for Interoperability 2.2 Network Layer 2.3 Network Control Subsystem 2.4 Service Layer 3 Security Concerns 4 Solutions 4.1 Machine Learning for IoT Security 4.2 Software Defined Networking (SDN)-Based IoT Frameworks 4.3 IoT Security Using Fog Computing 4.4 IoT Security Using Blockchain 5 Conclusion References A Deep Convolutional Neural Network for COVID-19 Chest CT-Scan Image Classification 1 Introduction 2 Related Work 3 Methodology 3.1 Dataset 3.2 Proposed Methodology 4 Experimental Results 5 Conclusion References Clinical Text Classification of Medical Transcriptions Based on Different Diseases 1 Introduction 2 Background Study 3 Methodology 3.1 Dataset 3.2 Data Pre-processing 3.3 Feature Extraction 3.4 Dimensionality Reduction 3.5 Classification Using Support Vector Classifier and Multiclass Logistic Regression 4 Results and Discussion 4.1 Support Vector Classifier 4.2 Multiclass Logistic Regression 4.3 Multiclass Logistic Regression with SMOTE 5 Conclusion References A Hybrid Acoustic Model for Effective Speech Emotion Classification by the Deep Fusion of Spectral and Prosodic Features Using CNN and DNN 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Pre-processing 3.2 Feature Extraction 3.3 Learning Techniques: A Fusion Mechanism 3.4 Emotion Classification 4 Experimental Analysis 4.1 Emotion Classification Using Deep Learning 4.2 Emotion Classification Using Machine Learning 4.3 Deep Fusion of CNN + DNN 5 Conclusion References Application of Relay Nodes in WBAN-Based Smart Healthcare for Energy Conservation Explained with Case Studies 1 Introduction 2 Literature Survey 3 Application of Relay Nodes in WBAN Design 4 Energy Consumption 5 Experimental Results 5.1 Case 1: Energy Consumption Using Without Using Relay Nodes in WBAN 5.2 Case 2: Energy Consumption Using Relay Nodes in WBAN 6 Conclusion References Design and Implementation of Intelligent Treadmill with Fitness Tracker Using Raspberry Pi and IOT 1 Introduction 2 Background 3 Proposed System 4 Experimental Results 4.1 Checking User Weight and Calculating BMI 4.2 Operation of Treadmill 4.3 Music Player 5 Conclusion References CXR-15: Deep Learning-Based Approach Towards Pneumonia Detection from Chest X-Rays 1 Introduction 2 Literature Survey 3 Methodology 3.1 Dataset Description 3.2 Network Architecture 4 Results 4.1 Evaluation Metrics 4.2 Performance Comparison 5 Conclusion References