ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Intelligent Data Analytics IoT and Blockchain

دانلود کتاب تجزیه و تحلیل داده های هوشمند اینترنت اشیا و بلاک چین

Intelligent Data Analytics IoT and Blockchain

مشخصات کتاب

Intelligent Data Analytics IoT and Blockchain

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 9781032442785, 9781003371380 
ناشر: CRC Press 
سال نشر: 2023 
تعداد صفحات: 367 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 74 Mb 

قیمت کتاب (تومان) : 43,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Intelligent Data Analytics IoT and Blockchain به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تجزیه و تحلیل داده های هوشمند اینترنت اشیا و بلاک چین نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب تجزیه و تحلیل داده های هوشمند اینترنت اشیا و بلاک چین




توضیحاتی درمورد کتاب به خارجی

This book focuses on data analytics with machine learning using IoT and blockchain technology. Integrating these three fields by examining their interconnections, it examines the opportunities and challenges of developing systems and applications exploiting these technologies.



فهرست مطالب

Cover
Half Title
Title Page
Copyright Page
Table of Contents
About the Editors
Contributors
Chapter 1: Skin Cancer Classification Using Image Processing with Machine Learning Techniques
	1.1 Introduction
	1.2 Related Works
	1.3 Materials and Methods
		1.3.1 Dataset
		1.3.2 Preprocessing Operations
		1.3.3 LCNet Architecture
	1.4 Results and Discussion
	1.5 Conclusion
	References
Chapter 2: Trusted Location Information Verification Using Blockchain in Internet of Vehicles
	2.1 Introduction
	2.2 Related Work
	2.3 Trusted Location Information Verification Using Blockchain
		2.3.1 Assumptions
		2.3.2 System Model
		2.3.3 Location Sharing
		2.3.4 Location Verification
	2.4 Results and Simulation
		2.4.1 Location Leakage
		2.4.2 Channel Capacity Utilization
		2.4.3 Message Delivery Success Rate
		2.4.4 Processing Time
		2.4.5 Security Attack Resilience
	2.5 Conclusion
	References
Chapter 3: Comparative Analysis of Word-Embedding Techniques Using LSTM Model
	3.1 Introduction
	3.2 Related Works
	3.3 Methodology
		3.3.1 Dataset
		3.3.2 Word-Embedding Techniques
			3.3.2.1 Word2vec
			3.3.2.2 GloVe
			3.3.2.3 FastText
			3.3.2.4 BERT
		3.3.3 LSTM Deep Learning Classifier
		3.3.4 Evaluation Metric
	3.4 Results and Discussion
	3.5 Conclusion and Future Work
	References
Chapter 4: A Deep Learning Approach for Mask-Based Face Detection
	4.1 Introduction
	4.2 Related Work
	4.3 Dataset
	4.4 Proposed System
		4.4.1 TensorFlow
		4.4.2 Keras
		4.4.3 OpenCV
		4.4.4 Numpy
		4.4.5 Convolution Neural Network (CNN)
	4.5 System Flow Chart
	4.6 Evaluating Performance Using Performance Matrix
		4.6.1 Experiments and Result
	4.7 Conclusion and Future Scope
	References
Chapter 5: A Scalable System Architecture for Smart Cities Based on Cognitive IoT
	5.1 Introduction
	5.2 Related Work
		5.2.1 IoT Architectural Design
	5.3 Cognitive Computing-based IoT Architecture
		5.3.1 Cognitive Computing-based Smart City Architecture
	5.4 Assistive Technologies in Cognitive Computing
	5.5 Conclusion
	References
Chapter 6: Bagging-Based Ensemble Learning for Imbalanced Data Classification Problem
	6.1 Introduction
	6.2 Related Work
	6.3 Proposed Methodology
		6.3.1 Pre-processing
		6.3.2 Existing Classification Methods
			6.3.2.1 Radial Basis Function Neural Network
			6.3.2.2 Support Vector Machine
		6.3.3 Homogeneous Ensemble Classifiers
			6.3.3.1 Dagging
			6.3.3.2 ECOC
			6.3.3.3 Proposed Bagged RBF and SVM Classifiers
	6.4 Performance Evaluation Measures
		6.4.1 Cross-Validation Technique
		6.4.2 Criteria for Evaluation
	6.5 Experimental Results and Discussion
		6.5.1 Vehicle Dataset Description
		6.5.2 Experiments and Analysis
	6.6 Conclusion
	Acknowledgment
	References
Chapter 7: Design and Implementation of a Network Security Model within a Local Area Network
	7.1 Introduction
		7.1.1 Problem Statement
	7.2 Literature Review
	7.3 Design Methodology
		7.3.1 Design Consideration
		7.3.2 Architecture of a Network Security Model within a LAN
		7.3.3 Software Specification
	7.4 Implementation
		7.4.1 Network Security Model Implementation Requirements
		7.4.2 The Implemented Local Area Network (LAN) Model and its Configurations
		7.4.3 Results
			7.4.3.1 Ping Test
			7.4.3.2 Port Security
	7.5 Conclusion
	References
Chapter 8: Review of Modern Symmetric and Asymmetric Cryptographic Techniques
	8.1 Introduction
		8.1.1 Security Services
		8.1.2 Cryptography in Data Security
		8.1.3 Types of Cryptography
	8.2 Review of Literature
	8.3 Discussion
	8.4 Conclusion
	References
Chapter 9: Quantum Computing-Based Image Representation with IBM QISKIT Libraries
	9.1 Introduction
	9.2 Objective
		9.2.1 Main Objective
		9.2.2 Algorithm Steps
	9.3 Review of Work Implemented
		9.3.1 Quantum Circuit of 2 n Qubits for a 2 × 2 Image
		9.3.2 Tabular Representation of Intensity Values
		9.3.3 Grayscale Image Representation on a Quantum Circuit
	9.4 Advantages
	9.5 Result Analysis
	9.6 Conclusions
	References
Chapter 10: Source Authentication of Videos Shared on Social Media
	10.1 Introduction
	10.2 Literature Review
	10.3 Proposed Methodology
		10.3.1 Watermark Insertion
		10.3.2 Watermark Extraction
	10.4 Experimental Evaluation
	10.5 Discussion
	10.6 Limitation
	10.7 Conclusion
	References
Chapter 11: Task Scheduling Using MOIPSO Algorithm in Cloud Computing
	11.1 Introduction
	11.2 Related Work
	11.3 Problem Formulation
	11.4 System Model
	11.5 Traditional Approach
	11.6 Proposed Multi-objective Improved Particle Swarm Optimization
	11.7 Experiment
		11.7.1 Experimental Set-Up
		11.7.2 Experimental Parameters
		11.7.3 Experiment, Result and Discussion
	11.8 Conclusion and Future Work
	References
Chapter 12: Feature Selection-Based Comparative Analysis for Cardiovascular Disease Prediction Using a Machine Learning Model
	12.1 Introduction
	12.2 Related Work
	12.3 Proposed Methodology
		12.3.1 Dataset
	12.4 Result Analysis
	12.5 Conclusion
	References
Chapter 13: Use of Cryptography in Networking to Preserve Secure Systems
	13.1 Introduction
		13.1.1 Characteristics of Cryptography
		13.1.2 Types of Cryptography
		13.1.3 Cryptanalysis
	13.2 Cryptographic Primitives
	13.3 Applications of Cryptography
	13.4 Issues in Network Security
	13.5 Issues in Cryptography
	13.6 Conclusion and Future Directions
	References
Chapter 14: Issues and Challenges of Blockchain in Healthcare
	14.1 Introduction
		14.1.1 Reasons for Adopting Block Chain
	14.2 Design
		14.2.1 Terms and Definitions
		14.2.2 Interplanetary File System
	14.3 Related Work
	14.4 Applications and Challenges of Block Chain in Healthcare
		14.4.1 Applications
		14.4.2 Challenges
		14.4.3 Strategies and India-centric Outcomes Targeted towards Block Chain
	14.5 Differences between Current and Proposed Systems
		14.5.1 Current System
		14.5.2 Proposed System
		14.5.3 Benefits
		14.5.4 Implementation
	14.6 System Architecture
	14.7 Conclusion
	References
Chapter 15: Accident Prediction by Vehicle Tracking
	15.1 Introduction
	15.2 Related Work
	15.3 Methodology
		15.3.1 Object Detection and Classification
		15.3.2 Object Tracking
		15.3.3 Speed Estimation
		15.3.4 Accident Prediction
	15.4 Results Analysis
	15.5 Performance Analysis
	15.6 Conclusion and Future Work
	References
Chapter 16: Blockchain-Based Cryptographic Model in the Cloud Environment
	16.1 Introduction
	16.2 Related Works
	16.3 Proposed Methodology
		16.3.1 Protection of Authentication
		16.3.2 Ownership Protection
		16.3.3 Identity Mapping Validation
	16.4 Future Work
	16.5 Conclusions
	References
Chapter 17: Big-Data Analytics in Disaster Management
	17.1 Introduction
	17.2 A Disaster-resilience Strategy Based on Big Data
	17.3 Disaster Management
	17.4 Characteristics of Big Data
	17.5 Application of Big Data in Disaster Management
	17.6 Comparative Analysis of the Methods Employed
	17.7 Conclusion
	References
Chapter 18: Fuzzy Minimum Spanning Tree Calculation-Based Approach on Acceptability Index Method
	18.1 Introduction
		18.1.1 Literature Review
		18.1.2 Motivation and Contribution
	18.2 Preliminaries
		18.2.1 Triangular Fuzzy Number
		18.2.2 Trapezoidal Fuzzy Number
		18.2.3 Yager Index
		18.2.4 The π 2 Membership Function
		18.2.5 The Minimum Operation of Two π 2 - Type Fuzzy Numbers
		18.2.6 The Acceptability Index
		18.2.7 The α - Cut Interval for Fuzzy Number
		18.2.8 On α - Cut Interval for Fuzzy Interval
		18.2.9 On the Convex Index
	18.3 Algorithm for Fuzzy Minimum Spanning Tree
		18.3.1 Fuzzy Minimum Spanning Tree Based on the Acceptability Index
		18.3.2 Fuzzy Minimum Spanning Tree Algorithm Using Convex Index
		18.3.3 Verification Using Yager’s Index
		18.3.4 Comparison
	18.4 Conclusion and Future Scope
	References
Chapter 19: Encoder/Decoder Transformer-Based Framework to Detect Hate Speech from Tweets
	19.1 Introduction
	19.2 Related Work
	19.3 Preliminaries
		19.3.1 BERT (Bidirectional Encoder Representations from Transformer)
		19.3.2 GPT-2 (Generative Pretrained Transformer)
	19.4 Framework of the System
	19.5 Conclusion
	References
Chapter 20: Understanding Dark Web Protection against Cyber Attacks
	20.1 Introduction
	20.2 Elements of the Dark Web
		20.2.1 Guard and Middle Relays
		20.2.2 The Relay is Used to Exit the TOR Circuit
		20.2.3 Bridge
	20.3 Criminal Activity
		20.3.1 Trafficking
		20.3.2 Information Leakage
		20.3.3 Proxying
		20.3.4 Fraud
		20.3.5 Onion Cloning
	20.4 Defense Mechanisms and Cyber Attacks
		20.4.1 Correlation Attacks
		20.4.2 Congestion Attacks
		20.4.3 Distributed Denial of Service (DDoS) Attacks
		20.4.4 Phishing
		20.4.5 Malware
	20.5 Conclusion
	References
Chapter 21: Various Elements of Analysis of Authentication Schemes for IoT devices: A Brief Overview
	21.1 Introduction
	21.2 Motivation
	21.3 Informal Analysis
		21.3.1 Adversary Model
		21.3.2 Taxonomy of Attacks
	21.4 Formal Analysis
	21.5 Performance Analysis
	21.6 Simulator/Computation Analysis tools
	21.7 Conclusion and Future Work
	Declarations
	Conflict of Interest
	References
Chapter 22: A Study of Carbon Emissions in the Transport Sector
	22.1 Introduction
	22.2 Literature Review
	22.3 Data Collection, Analysis and Visualization
	22.4 Technologies for Balancing Emissions
		22.4.1 Artificial Intelligence (AI)
		22.4.2 Machine Learning (ML)
		22.4.3 Internet of Things (IoT)
		22.4.4 Renewable Energy
		22.4.5 Electric Vehicles (EVs)
		22.4.6 Direct Air Capture (DAC)
		22.4.7 Bioenergy with Carbon Capture and Storage (BECCS)
	22.5 Conclusion and Future Scope
	References
Chapter 23: An Exploration of Blockchain Technology: Applicability, Limitations, and Opportunities
	23.1 Introduction
	23.2 Classification of Blockchain
		23.2.1 Permission-Less Blockchain
		23.2.2 Permissioned Blockchain
	23.3 Consensus Mechanism
		23.3.1 Proof of Work (PoW)
		23.3.2 Proof of Stake (PoS)
		23.3.3 Practical Byzantine Fault Tolerance (PBFT)
	23.4 Use Cases of Blockchain Technology
		23.4.1 Blockchain in the Supply Chain
		23.4.2 Blockchain for Financial Applications
		23.4.3 Blockchain for Non-financial Applications
	23.5 Conclusion and Future Research Areas
	References
Chapter 24: A Survey of Security Challenges and Existing Prevention Methods in FANET
	24.1 Introduction
	24.2 FANET and Communication Protocols
		24.2.1 Based on Physical Layer
		24.2.2 Based on MAC Layer
		24.2.3 Based on Network Layer/Routing Protocols
	24.3 Security Attacks and Issues
		24.3.1 Active Attacks
		24.3.2 Passive Attacks
		24.3.3 Other Types of Attack
	24.4 Literature Review and Related Works
	24.5 Security Solutions in Tabular Format
	24.6 Conclusion
	References
Chapter 25: MENA Sukuk Price Prediction Modeling using Prophet Algorithm
	25.1 Introduction
	25.2 Literature Review
	25.3 Research Methodology
		25.3.1 Prophet Model
	25.4 Data Representation
	25.5 Experimental Results and Analyses
		25.5.1 Evaluation Metrics
		25.5.2 Result and Analyses
	25.6 Conclusion and Implications
	Note
	References
Chapter 26: Cancer Biomarkers Identification from Transcriptomic Data Using Supervised Machine Learning Approaches
	26.1 Introduction
	26.2 Microarrays in Cancer
	26.3 Supervised Machine Learning in Cancer Biomarkers Detection
	26.4 Conclusion
	Acknowledgment
	References
Chapter 27: Development of a Secured and Interoperable Multi-Tenant Software-as-a-Service Electronic Health Record System
	27.1 Introduction
		27.1.1 Problem Statement
	27.2 Literature Review
	27.3 Design Methodology
		27.3.1 Architecture of a Secured and Interoperable Multi-tenant SaaS Electronic Health Record System
		27.3.2 Components of the Architectural Design
		27.3.3 Flowchart
	27.4 Implementation
		27.4.1 The Security Framework
	27.5 Conclusion
	References
Chapter 28: Investigating Classification with Quantum Computing
	28.1 Introduction
	28.2 Quantum Computation Background
		28.2.1 Circuits and Measurements
	28.3 Quantum Machine Learning
		28.3.1 Quantum Encoding
	28.4 Literature Review
	28.5 Quantum Machine Learning Algorithms
	28.6 Challenges and Future Scope
	28.7 Conclusion
	References
Chapter 29: A Comprehensive Analysis of Techniques Offering Dynamic Group Management in a Cloud Computing Environment
	29.1 Introduction
	29.2 Existing Solutions Based on Encryption Mechanisms
	29.3 Kerberos-Based Solutions
	29.4 Access Control-Based Solutions
	29.5 Conclusion
	References
Chapter 30: Improved YOLOv5 with Attention Mechanism for Real-Time Weed Detection in the Paddy Field: A Deep Learning Approach
	30.1 Introduction
	30.2 Related Works
	30.3 Proposed System
		30.3.1 Improved YOLOv5 Algorithm
		30.3.2 Attention Mechanism
		30.3.3 CBAM
		30.3.4 ECA-Net
	30.4 Experiments
		30.4.1 Implementation Details
		30.4.2 Evaluation Metrics
		30.4.3 Training
		30.4.4 Ablation Studies
	30.5 Performance Analysis
		30.5.1 Comparison with State-of-the-Art Approaches
	30.6 Conclusion
	References
Index




نظرات کاربران