ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2

دانلود کتاب سیستم های هوشمند پایدار: مقالات برگزیده WorldS4 2021، جلد 2

Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2

مشخصات کتاب

Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2

ویرایش: 1 
نویسندگان: , , ,   
سری: Lecture Notes in Networks and Systems 
ISBN (شابک) : 9811663688, 9789811663680 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 820 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 22 مگابایت 

قیمت کتاب (تومان) : 49,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 18


در صورت تبدیل فایل کتاب Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب سیستم های هوشمند پایدار: مقالات برگزیده WorldS4 2021، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب سیستم های هوشمند پایدار: مقالات برگزیده WorldS4 2021، جلد 2

این کتاب بینش‌هایی از کنفرانس جهانی روندهای هوشمند در سیستم‌ها، امنیت و پایداری (WS4 2021) ارائه می‌کند که به بخش‌های مختلفی مانند زیرساخت فناوری اطلاعات هوشمند برای جامعه پایدار تقسیم می‌شود. چشم انداز مدیریت هوشمند برای جامعه پایدار؛ سیستم‌های امن هوشمند برای فناوری‌های نسل بعدی؛ گرایش های هوشمند برای گرافیک محاسباتی و مدل سازی تصویر. و Smart Trends for Biomedical and Health Informatics. مجموعه مقالات در دو جلد ارائه شده است. این کتاب برای محققین و دست اندرکاران فعال در این زمینه مفید است.


توضیحاتی درمورد کتاب به خارجی

This book provides insights of World Conference on Smart Trends in Systems, Security and Sustainability (WS4 2021) which is divided into different sections such as Smart IT Infrastructure for Sustainable Society; Smart Management prospective for Sustainable Society; Smart Secure Systems for Next Generation Technologies; Smart Trends for Computational Graphics and Image Modeling; and Smart Trends for Biomedical and Health Informatics. The proceedings is presented in two volumes. The book is helpful for active researchers and practitioners in the field.



فهرست مطالب

Preface
Contents
Editors and Contributors
Wall-Distance Measurement for Indoor Mobile Robots
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Image Acquisition and Resizing
		3.2 Edge Detection
		3.3 BRISK Key-Points Extraction
		3.4 Pixel Counting and Distance Calculation
		3.5 Characterization
	4 Results and Discussion
	5 Conclusion
	References
Automating Cognitive Modelling Considering Non-Formalisable Semantics
	1 Introduction
	2 Non-formalisable Cognitive Semantics
	3 Uncaused Decisions
	4 Quantum and Wave Semantics
	5 Automation of Cognitive Modelling
	6 Discussion
	7 Results and Conclusions
	References
Using a Humanoid Robot to Assist Post-stroke Patients with Standardized Neurorehabilitation Therapy
	1 Introduction
	2 Training Tasks
		2.1 Arm Basis Training (ABT)
		2.2 Mirror Training
	3 Robot-Supported Training Tasks
		3.1 Model of a Patient
		3.2 Model of a Helper
	4 Related Work
	5 Summary and Outlook
	References
Human Resource Information System in Healthcare Organizations
	1 Introduction
	2 What Is Human Resources Information System
	3 Roles of Human Resources Information System and its Importance in Healthcare
	4 Functional Attributes
		4.1 Employee Database
		4.2 Employee Life Cycle [12]
		4.3 Hiring Process
		4.4 Payroll System
	5 Non-functional Attributes
	6 Challenges of Human Recourses Information System
	7 Literature Review
	8 Methodology
	9 Data Analysis and Discussion
		9.1 Overview of Respondents Analysis
		9.2 Factors Measurement
		9.3 Correlation Coefficient Analysis
		9.4 Descriptive Statistics Analysis
		9.5 Discussion
	10 Limitations
	11 Recommendations
	12 Future of Human Resource Information System in Healthcare
	13 Conclusion
	References
Performance Prediction of Scalable Multi-agent Systems Using Parallel Theatre
	1 Introduction
	2 Background
		2.1 An Overview of Parallel Theatre
		2.2 Basic Concepts of Minority Game
		2.3 Fundamental Behaviour of MG
		2.4 A Genetic Extension of MG
	3 A Formal Actor Model of the Minority Game
		3.1 Checking Model Correctness
		3.2 Performance Checks
	4 Transforming the MG Model to Parallel Theatre
	5 Performance Prediction of MG Models
	6 Experimental Results of Parallel Execution
	7 Conclusions
	References
Dynamics of Epidemic Computer Subnetwork Models for Scan-Based Worm Propagation: An Internet Protocol Addressing Configuration Perspective
	1 Introduction
	2 Related Works
	3 Methodology
	4 Epidemic Models and Numerical Simulation
		4.1 The SEI1I2R1R2 Model with Mass Action Incidence
		4.2 The XYAZ Model
		4.3 The SIR Model with Immunity Divisions and Standard Incidence
	5 Conclusion
	References
Security Analysis of Integrated Clinical Environment Using Attack Graph
	1 Introduction
	2 Integrated Clinical Environment (ICE)
		2.1 ICE Topology
		2.2 Formal Description of ICE
	3 Attack Graph Generation
	4 Conclusions
	References
Smart University: Key Factors for a Cloud Computing Adoption Model
	1 Introduction
	2 Method
	3 Proposed Model of Adoption of Cloud Computing
	4 Conclusions
	References
Agile Governance Supported by the Frugal Smart City
	1 Introduction
	2 Research Goal and Methodology
	3 Post-crisis Participatory Governance Model
		3.1 Prediction of Future Data—Casablanca
	4 Discussion
	5 Conclusion
	References
Effect of Normal, Calcium Chloride Integral and Polyethene Sheet Membrane Curing on the Strength Characteristics of Glass Fiber and Normal Concrete
	1 Introduction
		1.1 Curing
		1.2 Glass Fiber Concrete
	2 Materials and Methods
		2.1 Cement
		2.2 Fine Aggregate
		2.3 Coarse Aggregate
		2.4 Mix Ratio
		2.5 Calcium Chloride
		2.6 Glass Fiber
		2.7 Compression Strength Test
		2.8 Tensile Strength Test
	3 Results and Discussions
		3.1 Glass Fiber Concrete
		3.2 Calcium Chloride Integral Curing
		3.3 Polythene Membrane Curing
		3.4 Normal Concrete Under Different Curing Conditions
		3.5 Glass Fiber Concrete Under Different Curing Conditions
		3.6 Strength Characteristics of Normal Concrete and GFRC
	4 Conclusions
	References
Problems with Health Information Systems in Ecuador, and the Need to Educate University Students in Health Informatics in Times of Pandemic
	1 Introduction
	2 Method
	3 Results
		3.1 Participants
		3.2 Years of Study
		3.3 Health Informatics Research
		3.4 Use of Information Technology by University Students
		3.5 Knowledge in Health Informatics to be Received
	4 Discussion
	References
Utilizing Technological Pedagogical Content (TPC) for Designing Public Service Websites
	1 Introduction
	2 Theoretical Framework of TPCD
		2.1 Pedagogical Content (PC)
		2.2 Technological Content (TC)
		2.3 Technological Pedagogy (TP) and Pedagogical Technology (PT)
	3 From Theory to Action
		3.1 Defining Objective Goals of Website
		3.2 Selecting and Developing Materials
		3.3 Inserting Content on Webpages
	4 Conclusions
	References
A Multidimensional Rendering of Error Types in Sensor Data
	1 Introduction
	2 Classification of Errors in Sensor Data
	3 A Multidimensional Model of Errors in Sensor Data
	4 Conclusion
	References
Optimization of the Overlap Shortest-Path Routing for TSCH Networks
	1 Introduction
	2 System Model
		2.1 Network Model
		2.2 Flow Model
	3 Problem Formulation
	4 Epsilon Greedy Heuristic Optimization Method
	5 Tests Scenarios
	6 Results
	7 Conclusions and Future Work
	References
Application of Emerging Technologies in Aviation MRO Sector to Optimize Cost Utilization: The Indian Case
	1 Introduction
		1.1 Technology Penetration in the Aviation Sector
		1.2 Current Status-Quo of Footprint of Technology in India
		1.3 Sustainability
		1.4 Data and Supply Chain Maintenance
		1.5 Impact of Emerging Technology in MRO
		1.6 Challenges
	2 Research Design
		2.1 Objectives
		2.2 Hypotheses Declaration
		2.3 Research Methodology
	3 Description
	4 Research Outcome
		4.1 Cost Factor in Technology Implementation
		4.2 AI and IoT (Emerging Technologies) in Indian MRO Industry and Global Aviation MRO Industry
		4.3 Mental Bias of Age Group Towards AI and IoT in Aviation Sector
	5 Conclusion
	6 Recommendations
	References
User Evaluation of a Virtual Reality Application for Safety Training in Railway Level Crossing
	1 Introduction
	2 Literature Review
	3 Research Methodology
		3.1 Participants
		3.2 Overview of VR Training Prototype
		3.3 Data Collection Process and Questionnaires
	4 Results and Discussion
		4.1 SUS Questionnaire
		4.2 Sense of Presence (SoP)
	5 Conclusion
	References
GreenMile—Gamification-Supported Mobile and Multimodal Route Planning for a Sustainable Choice of Transport
	1 Introduction
	2 Related Work
	3 GreenMile
	4 Evaluation
	5 Conclusion and Future Work
	References
A Detailed Study for Bankruptcy Prediction by Machine Learning Technique
	1 Introduction
	2 Background
	3 Proposed Model
		3.1 Dataset Characteristics
		3.2 Feature Engineering
	4 Classification
	5 Methodology
	6 Model Evaluation and Assessment
	7 Results
	8 Conclusion
	References
Design and Development of Tracking System in Communication for Wireless Networking
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Proposed System
	5 Implementation
	6 Result Analysis
		6.1 Comparison of Tracking Error of Existing and Proposed System
		6.2 Throughput
	7 Conclusion
	References
Cyberbullying in Online/E-Learning Platforms Based on Social Networks
	1 Introduction
		1.1 Use of E-learning
	2 What Is Cyberbullying
		2.1 Cyberbullying Types
	3 Cyberbullying Avoidance
		3.1 Case Study: Cyberbullying in Social MediaText
		3.2 Case Study: Cyberbullying Using Machine Learning
		3.3 Case Study: Cyberbullying Using Social and Textual Analysis
	4 Conclusion
	References
Machine Learning and Remote Sensing Technique for Urbanization Change Detection in Tangail District
	1 Introduction
	2 Related Works
	3 Data Acquisition and Methodology
		3.1 Area of Study
		3.2 Data Acquisition and Processing
		3.3 Methodology
		3.4 Training and Classification
	4 Result and Analysis
	5 Conclusion and Future Works
	References
Enabling a Question-Answering System for COVID Using a Hybrid Approach Based on Wikipedia and Q/A Pairs
	1 Introduction
	2 Question-Answering Systems
		2.1 Main Approaches
		2.2 Question-Answering Approaches for COVID
	3 Design of the QA System for COVID
		3.1 Overview of the Architecture
		3.2 Implementation of a Proof of Concept
	4 Preliminary Evaluation
		4.1 Performance of the Query Processor
		4.2 Overall Qualitative Evaluation
	5 Conclusion and Future Work
	References
A Study of Purchase Behavior of Ornamental Gold Consumption
	1 Introduction
	2 Literature Review
	3 Objectives
	4 Research Methodology
	5 Data Analysis and Findings
	6 Results of Hypothesis Testing
	7 Conclusion
	References
Circularly Polarized Microstrip Patch Antenna for 5G Applications
	1 Introduction
	2 Antenna Design and Geometry
		2.1 Workflow of Proposed Antenna
		2.2 Antenna Geometry
	3 Results and Analysis
	4 Conclusion
	References
An Approach Towards Protecting Tribal Lands Through ICT Interventions
	1 Introduction
		1.1 Role of ICT
	2 E-Governance Initiatives Towards Land Protection
		2.1 Strengthening of Revenue Administration and Updating of Land Records Scheme
		2.2 Computerization of Land Records (CLR) Scheme
		2.3 National Land Records Modernization Programme
	3 Proposed Tribal Land Information Management System
	4 Discussion and Conclusion
	References
Urban Sprawl Assessment Using Remote Sensing and GIS Techniques: A Case Study of Ernakulam District
	1 Introduction
	2 Data Requirements
		2.1 Study Location
		2.2 Data Sources
		2.3 Image Preprocessing
		2.4 Normalized Difference Vegetation Index (NDVI)
		2.5 Normalized Difference Built-Up Index (NDBI)
		2.6 The Land Surface Temperature (LST)
		2.7 Land Use/Land Cover (LULC)—Supervised Classification
		2.8 Accuracy Assessment
	3 Results and Discussion
	4 Conclusion
	References
Exploring the Means and Benefits of Including Blockchain Smart Contracts to a Smart Manufacturing Environment: Water Bottling Plant Case Study
	1 Introduction
	2 Background
		2.1 Industry 4.0
		2.2 Blockchain
		2.3 Smart Contracts
	3 Methodology
	4 Conclusion and Future Work
	References
Extreme Gradient Boosting for Predicting Stock Price Direction in Context of Indian Equity Markets
	1 Introduction
	2 Methods for Data Collection and Pre-processing for Implementation of Xgboost
		2.1 Stock Selection
		2.2 Dataset
		2.3 Feature Extraction
		2.4 Feature Pre-processing and Co-relation Mapping
	3 Stock Price Direction Prediction Model Implementation Using Xgboost
		3.1 High Level Architectural Diagram
		3.2 Algorithm
	4 Experimental Results
		4.1 Metrics
		4.2 Results and Comparison
	5 Conclusions
	References
Performance of Grid-Connected Photovoltaic and Its Impact: A Review
	1 Introduction
	2 Centralized and Decentralized GCPV System
		2.1 Centralized Grid-Connected Photovoltaic System
		2.2 Decentralized Grid-Connected System
	3 Generations of Photovoltaic Cells
	4 Sizing of GCPV System
	5 Economical Aspects
	6 Modelling and Simulation
		6.1 Models of Grid-Connected Photovoltaic Systems
		6.2 Real-Time Simulation
	7 Performance Analysis
		7.1 Faults
		7.2 Synchronization
	8 Conclusion
	References
A Novel Approach of Deduplication on Indian Demographic Variation for Large Structured Data
	1 Introduction
	2 Literature Survey and Gap Analysis
		2.1 Literature Survey
		2.2 Gap Analysis
	3 Methodology
		3.1 Approach for Customization of Deepmatcher
		3.2 Blocking
		3.3 Entity Matching
		3.4 Deduplication
	4 Results
	5 Conclusion and Future Work
	References
Dual-Message Compression with Variable Null Symbol Incorporation on Constrained Optimization-Based Multipath and Multihop Routing in WSN
	1 Introduction
	2 Related Works
	3 Effect of Source Coding on Transmission Energy
	4 Network Model and Optimization Criterion
		4.1 Network Model Description and Packet Distribution Policy
		4.2 Energy Calculation
		4.3 Solving Optimization Problem
	5 Employ Source Coding Scheme
	6 Effects of Device Characteristics
	7 Result Analysis
		7.1 Theoretical Energy Savings
		7.2 Simulation on Real-Life Sensor Data
	8 Conclusion
	References
Spatio-temporal Variances of COVID-19 Active Cases and Genomic Sequence Data in India
	1 Introduction
		1.1 Spatio-temporal Data of COVID-19
		1.2 Spatio-temporal Analysis of SARS-CoV-2 Genome Sequencing Data
	2 Spatio-temporal Clustering for Epidemiological Analysis
		2.1 ST Variations in India During the Second Wave of COVID-19
		2.2 ST Clustering Helps to Understand COVID-19 Hotspots
		2.3 ST Clustering Algorithms
		2.4 Event Clustering for Disease Clusters
	3 Spatio-temporal Variances of COVID-19 in India
		3.1 Active Cases Have Seen Much More Clusters in the Second Wave
		3.2 ST Clusters of Genomic Sequences in the Second Wave Are More but Lack Spatial Coverage
	4 Comparing ST Clusters of Case Data with Genomic Data
		4.1 Metrics for Measuring Similarity of ST Clusters
	5 Conclusions
	References
Significance of Thermoelectric Cooler Approach of Atmospheric Water Generator for Solving Fresh Water Scarcity
	1 Introduction
	2 Working Concept of TEC
	3 Related Work on TEC Based AWG
	4 Proposal for TEC Based AWG
	5 Conclusion
	References
A Comprehensive Analysis of Testing Efforts Using the Avisar Testing Tool for Object Oriented Softwares
	1 Introduction
	2 Related Work
	3 AVISAR for Estimating the Testing Effort
	4 Interfaces and Exploratory Setup of AVISAR
	5 Results of Experiments
	6 Conclusions
	References
Fabrication of Energy Potent Data Centre Using Energy Efficiency Metrics
	1 Introduction
	2 Metrics Framework
	3 Power Usage Effectiveness (PUE)
	4 Proposed Work and Discussions
	5 Conclusion
	References
Performance Anomaly and Change Point Detection for Large-Scale System Management
	1 Introduction
	2 Statistical Exception and Trend Detection System (SETDS)
	3 Anomaly Detection by Neural Network
	4 Entropy-Based Method of Anomaly Detection
	References
Artificial Intelligence Driven Monitoring, Prediction and Recommendation System (AIM-PRISM)
	1 Introduction
	2 Historical Background
	3 Problem Definition
		3.1 Limitations of Existing Solutions
		3.2 Scope of AIM-PRISM System
	4 Proposed Solution
		4.1 Monitoring, Prediction and Recommendation Approach
		4.2 Leveraged Advanced AI/ML and Associated Techniques
	5 System Architecture
	6 Advantages of Using AIM-PRISM
	7 Results and Comparison with Benchmarks
	8 Conclusion and Future Directions
	References
Financial Forecasting of Stock Market Using Sentiment Analysis and Data Analytics
	1 Introduction
	2 Related Work
	3 Proposed Model
		3.1 Data Collection
		3.2 Data Preparation
		3.3 Classical Machine Learning Techniques
		3.4 Deep Learning Techniques
	4 Results
	5 Conclusion
	References
A Survey on Learning-Based Gait Recognition for Human Authentication in Smart Cities
	1 Introduction
	2 Background
	3 Literature Review
	4 Conclusion and Future Scope
	References
Micro-arterial Flow Simulation for Fluid Dynamics: A Review
	1 Introduction
	2 Background of Small Vessel Disease
	3 Evolution of Hemodynamics
	4 Problem Statement and Objectives
	5 Methodology
		5.1 3D Model Reconstruction
		5.2 Initial and Boundary Conditions
		5.3 Analyzing the Model in CFD
	6 Results and Discussions
	7 Conclusion
	References
Hip-Hop Culture Incites Criminal Behavior: A Deep Learning Study
	1 Introduction
	2 Methodology
	3 Song Lyrics Dataset
	4 Models
		4.1 Support Vector Machine
		4.2 Random Forest Classifier
		4.3 Multinomial Naive Bayes
		4.4 Long Short-Term Memory (LSTM)
	5 Model Evaluation
	6 LSTM Application and Outputs
	7 Visualizations
	8 Crime Data
	9 Results
	10 Future Scope
	11 Conclusion
	References
Complex Contourlet Transform Domain Based Image Compression
	1 Introduction
		1.1 Methods to Perform Lossy Compression
	2 Contourlet Family-Based Transform Method
	3 Methods Used
		3.1 Quantization
		3.2 Arithmetic Encoding Technique
	4 Conclusion
	References
HWYL: An Edutainment Based Mobile Phone Game Designed to Raise Awareness on Environmental Management
	1 Introduction
	2 Related Studies
	3 Research Methodologies
	4 Project Development
	5 Results and Discussions
	6 Conclusion and Recommendation
	References
IoT and AI Based Advance LPG System (ALS)
	1 Introduction
	2 Related Work
	3 Components
	4 System Operation
		4.1 Distributor and Customer/User Interface
		4.2 Automatic Gas Booking System
		4.3 Gas Leakage Detection System
		4.4 Smart Gas Stove
	5 Comparison
	6 Results
	7 Conclusion
	References
ICT-Enabled Automatic Vehicle Theft Detection System at Toll Plaza
	1 Introduction
		1.1 Vehicle Theft Statistics in India
		1.2 Current FIR Process for Vehicle Theft Detection
		1.3 Current Vehicle Theft Recovery Process
		1.4 Limitations of the Available Vehicle Theft Detection Systems
	2 ICT-Enabled Vehicle Theft Detection System at Toll Plaza (Proposed Concept)
		2.1 Elements of New Toll System
		2.2 Working Mechanism
		2.3 Flow Chart
	3 Pros and Cons
	4 Conclusion
	References
RBJ20 Cryptography Algorithm for Securing Big Data Communication Using Wireless Networks
	1 Introduction
	2 Past Work
	3 Methodology
		3.1 RBJ20 Algorithm
		3.2 RBJ20 Algorithm Encryption
		3.3 Working of RBJ Decryption Algorithm
	4 Comparison
	5 Conclusion
	References
Decision Tree for Uncertain Numerical Data Using Bagging and Boosting
	1 Introduction
	2 Research Objectives
	3 Boosting and Bagging
	4 Uncertain Data
	5 Related Work
	6 Problem Formulation
	7 Research Methodology
	8 Expected Outcome
	9 Conclusion
	References
A Comparative Study on Various Sharing Among Undergraduates in PreCovid-19 and Covid-19 Period Using Network Parameters
	1 Introduction
		1.1 Objective of the Study
	2 Social Network Data
	3 Results and Discussion
		3.1 Intellectual Sharing, Financial Sharing, Emotional Sharing and Information Sharing in PreCovid-19 Period
		3.2 Intellectual Sharing, Financial Sharing, Emotional Sharing and Information Sharing During the Period of Covid-19
		3.3 A Comparative Study on Various Sharing Among Undergraduates in PreCovid-19 and Covid-19 Period Using Network Parameters
	4 Conclusion
	References
Adoption of Smart Agriculture Using IOT: A Solution for Optimal Soil Decision Tree Making
	1 Introduction
	2 Methodology
	3 Related Work
		3.1 Soil Parameters
		3.2 Soil Report Analysis
	4 Implementation
	5 Results and Discussions
	6 Conclusion
	References
ThreatHawk: A Threat Intelligence Platform
	1 Introduction
	2 Related Work
	3 Proposed Approach
	4 Technologies Used
	5 Experimental Severity
	6 Conclusion
	References
Network Slicing in Software-Defined Networks for Resource Optimization
	1 Introduction
	2 Related Work
		2.1 Challenges
	3 Proposed Model
		3.1 Methodology
	4 Implementation
		4.1 Simulation Environment Setup
	5 Result Analysis
	6 Conclusion
	References
A Tensor-Based Submodule Clustering for 2D Images Using l12-Induced Tensor Nuclear Norm Minimization
	1 Introduction
	2 Related Works
	3 Proposed Method
		3.1 Proposed l12-induced TNN Deduced Using Half Thresholding
		3.2 Solution
	4 Results and Discussions
	5 Conclusions
	References
A CNN-LSTM Approach for Classification of Major TCP Congestion Control Algorithms
	1 Introduction
	2 Related Work
	3 Proposed Hybrid Classification Approach
		3.1 Step 1: Generation of Congestion Window Value Files
		3.2 Step 2: Normalization of Data
		3.3 Step 3: Classifiers in the Proposed Approach
	4 Simulation and Performance Analysis
		4.1 Estimation of cwnd from Packet Traces
		4.2 Normalization
		4.3 Neural Network Classifiers
	5 Conclusion
	References
A Novel Approach for Detection of Intracranial Tumor Using Image Segmentation Based on Cellular Automata
	1 Introduction
	2 Related Work
	3 Proposed Approach
		3.1 Image Acquisition and Image Processing
		3.2 Growing Regions with Modified Texture
		3.3 CA Based Edge Detection
		3.4 Algorithm Used for Image Segmentation
	4 Experimental Results
	5 Conclusions
	References
Latency Evaluation in an IoT-Fog Model
	1 Introduction
	2 Background
		2.1 Cloud Computing
		2.2 Fog Computing
		2.3 Internet of Things
	3 Role of Latency in IoT-Fog-Cloud Model
	4 Related Work
	5 Discussion
	6 Conclusion and Future Work
	References
Effective Online Tools for Teaching Java Programming Course on an Online Platform
	1 Introduction
	2 Related Work
	3 Online Tools
		3.1 JDoodle
		3.2 Codeshare
		3.3 Poll Everywhere
	4 Result Analysis
	5 Conclusion
	References
Interactive Learning Application for Indian Sign Language
	1 Introduction
	2 Literature Survey
	3 Proposed Method
		3.1 Architecture
		3.2 Algorithm
	4 Test Result and Performance Evaluation
	5 Challenges
	6 Future Work
	7 Conclusion
	References
Impact of IT Leadership on Transformation of the Role of IT in Improving Individual Tax Return Reporting Compliance at the Directorate General of Taxes
	1 Introduction
	2 Literature Studies
		2.1 Taxpayer Compliance
		2.2 The Role of IT in an Organization
		2.3 IT Leadership Approaches to the Role of IT
	3 Research Methodology
		3.1 Research Data Collection Procedure and Instrument
		3.2 The Research Methodology Stage
	4 Result and Discussion
		4.1 Changes in the Role of Information Technology
		4.2 Information Technology Leadership
	5 Conclusion and Suggestions
	References
Self-driving Car Using Raspberry Pi 3 B+ and Pi Camera
	1 Introduction
	2 Methodology
	3 Learning
	4 Automation
	5 Hardware Implementation
		5.1 Raspberry Pi
		5.2 Pi Camera
		5.3 L298N Motor Driver
	6 Results
	7 Conclusion
	8 Future Scope
	References
Energy-Efficient Cluster Formation for Wireless Sensor Networks Using Fuzzy Logic
	1 Introduction
	2 Related Work
	3 System Model
		3.1 Fuzzy Logic Model
	4 Result
		4.1 Sample Network 1
	5 Conclusions
	References
Hierarchical Cluster-Based Model to Evaluate Accuracy Metrics Based on Cluster Efficiency
	1 Introduction
	2 Clustering Concept
		2.1 Agglomerative Hierarchical Clustering Mechanism
	3 Quality Analysis
		3.1 Elapsed Time
		3.2 Cohesion Measurement
		3.3 Silhouette Index
	4 Experimental Analysis
	5 Methodology and Design
	6 Conclusion
	References
Digital Audio Watermarking: Techniques, Applications, and Challenges
	1 Introduction
	2 Important Properties of Digital Audio Watermarking
	3 Watermarking Procedure [2, 4, 9–11]
		3.1 Watermark Embedding
		3.2 Watermark Extraction
	4 Applications of Audio Watermarking [3, 4, 9, 11, 14]
	5 Possible Attacks on Audio Watermarking [3–5, 11, 16]
	6 Different Techniques Used for Audio Watermarking [3–5, 9, 17]
		6.1 Time Domain
		6.2 Transform Domain
		6.3 Hybrid Techniques
	7 Performance Evaluation Parameters [4, 6, 14, 17]
		7.1 Peak Signal-to-Noise Ratio (PSNR) [1, 4]
		7.2 Bit Error Rate (BER) [4, 6, 12]
		7.3 Mean Squared Error (MSE) [1, 4, 14]
	8 Conclusion
	References
Transfer Learning for Handwritten Character Recognition
	1 Introduction
	2 Related Work
	3 Preparation of Dataset
	4 Architecture on Pre-trained Networks
		4.1 AlexNet
		4.2 Vgg Net
		4.3 GoogLeNet
		4.4 Residual Network (ResNet)
		4.5 Experimental Results and Analysis
	5 Conclusion and Future Work
	References
IoT-Based Smart Solar Monitoring System
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Solar Monitoring System
		3.2 Sun Position Tracking
	4 Applications
	5 Conclusion
	References
Conglomerate Elgamal Encryption-Based Data Aggregation and Knapsack-Based Energy Efficient Cryptosystem in Wireless Sensor Network
	1 Introduction
	2 Review of Literature
	3 Proposed Methodology
		3.1 Data Aggregation-Based ConglomerateElGamal Encryption
	4 Performance Analysis
	5 Conclusion
	References
Optimization of Resource and Energy Utilization in Device-to-Device Communication Under Cellular Network
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Experimental Analysis
	5 Conclusion and Future Work
	References
Towards an Integrated Conceptual Model for Open Government Data in Saudi Arabia
	1 Introduction
	2 Literature Review
		2.1 Open Government Data Adoption
		2.2 Open Government Data Benefits
		2.3 Barriers of Open Government Data
		2.4 Theories of Technology Adoption
	3 A Review of Proposed Models for OGD Adoption
	4 The Proposed Model
		4.1 The Category of Suppliers Side
		4.2 The category of demand side
	5 Methodology
	6 Results
		6.1 Data Governance
		6.2 Data Integration
	7 Conclusion
	References
IoT-Based Horticulture Monitoring System
	1 Introduction
	2 Research Method
		2.1 Design of the System
		2.2 Electronic Components
		2.3 Networking
	3 Testing, Results and Discussion
		3.1 Testing
		3.2 Firebase and Android Application
		3.3 MATLAB ThingSpeak
	4 Conclusions and Future Work
	References
A Comprehensive Review on the Role of PMU in Managing Blackouts
	1 Introduction
	2 State of the Art PMU Methods for Stability Evaluation
		2.1 Review of Literature
	3 Scope of PMU Applications in Network Situation Awareness
	4 Blackouts: Causes and Control Actions
		4.1 Causes for Blackouts
		4.2 PMUs—Selections of Control Actions to Avoid Blackouts
	5 Conclusions
	References
Secure COVID-19 Treatment with Blockchain and IoT-Based Framework
	1 Introduction
		1.1 Background
		1.2 Motivations
		1.3 Covid Remedy Technique
		1.4 Outline
	2 Literature Review
	3 Blockchain with COVID-19
	4 Blockchain with COVID-19
		4.1 Pandemic Tracking
		4.2 User Confidentiality
		4.3 Safe Procedure
		4.4 Medical Ledger
		4.5 Donation Record
	5 IoT and Blockchain with COVID-19
		5.1 Proposed Layered Architecture
		5.2 Complete Healthcare Framework with IoT and Blockchain
		5.3 Securing Patients Buy Insurance with a Proposed Framework
	6 Conclusion
	References
Design of a CPW-Fed Microstrip Elliptical Patch UWB Range Antenna for 5G Communication Application
	1 Introduction
	2 Theories of Elliptically Patch Microstrip Antenna
	3 Selection of Substrate
	4 CPW Theory
	5 Proposed Antenna Structure
	6 Simulation Results and Discussion
	7 Conclusion
	References
A Review on Consensus Protocol of Blockchain Technology
	1 Introduction
	2 Literature Review
	3 Consensus Algorithm
		3.1 Proof of Work (PoW)
		3.2 Proof of Stake (PoS)
		3.3 Delegated Proof of Stake (DPoS)
		3.4 Proof of Elapsed Time (PoET)
		3.5 Practical Byzantine Fault Tolerance (PBFT)
		3.6 Proof of Activity (PoA)
	4 Comparative Investigation of Consensus Algorithm
		4.1 Basic Characteristics
		4.2 Transaction Metrics
		4.3 Network Aspect
		4.4 Performance Metrics
		4.5 Security Aspect
		4.6 Block Aspect
	5 Merits and Demerits
	6 Conclusion
	References
Author Index




نظرات کاربران