دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2020 نویسندگان: Imran Sarwar Bajwa (editor), Tatjana Sibalija (editor), Dayang Norhayati Abang Jawawi (editor) سری: ISBN (شابک) : 9811552312, 9789811552311 ناشر: Springer سال نشر: 2020 تعداد صفحات: 807 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 82 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب فناوریها و کاربردهای هوشمند: دومین کنفرانس بینالمللی، INTAP 2019، بهاوالپور، پاکستان، 6 تا 8 نوامبر 2019، منتخب اصلاح شده ... در علوم کامپیوتر و اطلاعات، 1198) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
60 مقاله کامل اصلاحشده و 6 مقاله کوتاه اصلاحشده ارائه شده به دقت بررسی و از بین 224 مورد ارسالی انتخاب شد. علاوه بر این، جلد 1 مقاله دعوت شده را ارائه می دهد. مقالات این جلد در بخشهای موضوعی هوش مصنوعی و سلامت سازماندهی شدهاند. تحلیل احساسات؛ برنامه های هوشمند؛ تحلیل شبکه های اجتماعی؛ هوش تجاری؛ پردازش زبان طبیعی؛ استخراج اطلاعات؛ فراگیری ماشین؛ سیستم های هوشمند؛ وب معنایی؛ سیستم های پشتیبانی تصمیم؛ تجزیه و تحلیل تصویر؛ مهندسی نرم افزار خودکار.
The 60 revised full papers and 6 revised short papers presented were carefully reviewed and selected from 224 submissions. Additionally, the volume presents 1 invited paper. The papers of this volume are organized in topical sections on AI and health; sentiment analysis; intelligent applications; social media analytics; business intelligence;Natural Language Processing; information extraction; machine learning; smart systems; semantic web; decision support systems; image analysis; automated software engineering.
Preface Organization Contents Internet of Things Design of Wearable Prototype Smart Wristband for Remote Health Monitoring Using Internet of Things Abstract 1 Introduction 2 Proposed Method 2.1 Sensing Phase 2.2 Interaction Phase 3 Results and Analysis 3.1 Experimental Results of Smart Wrist Band 3.2 Experimental Results of the Temperature Sensor 4 Conclusions References FireNot - An IoT Based Fire Alerting System: Design and Implementation Abstract 1 Introduction 2 Related Work 3 System Components 3.1 Raspberry Pi 3 3.2 Smoke Sensor (MQ2) 3.3 Google Firebase Cloud Messaging (FCM) 3.4 Google Map API 4 Conclusion References Smart Intelligent System for Mobile Travelers Based on Fuzzy Logic in IoT Communication Technology Abstract 1 Introduction 2 Related Work 3 Proposed Method 3.1 Sequence Estimation of Mobile Users 3.2 Time Estimation of Mobile User 4 Experimental and Evaluations 4.1 Simulation Parameters 4.2 Result and Discussion 5 Conclusion References Perception of Wearable Intelligent Devices: A Case of Fitbit-Alta-HR 1 Introduction 2 Related Work 3 Conceptual Overview 3.1 Step 1: Extract Customer Feedback 3.2 Step 2: Feedback Classification 3.3 Step 3: Perception Evaluation 4 Evaluation 4.1 Dataset 4.2 Evaluation Measures 4.3 Experimentation 5 Results 6 Conclusion References Automatic Sun Tracking Smart Wheel Chair with Real Time Navigation Abstract 1 Introduction 2 Literature Review 3 Proposed System Architecture 4 Results and Discussion 4.1 Joystick Results 4.2 Voice Recognition Result 4.3 Sun Tracking Result 4.4 Navigation Device Result 5 Conclusion and Future Work References A Blockchain-Based Framework for Information Security in Intelligent Transportation Systems 1 Introduction 2 Related Work 3 System Model 3.1 Intelligent Transportation System 3.2 Working Principle to Secure ITS Using Blockchains 4 Discussion 5 Conclusion and Future Research Direction References Home Automation Security System Based on Face Detection and Recognition Using IoT Abstract 1 Introduction 2 Literature Review 3 Proposed System Architecture 3.1 Face Detection 3.2 Creation of Datasets of the Individuals 3.3 Recognition of Face Through Stored Database 3.4 IoT Platform 4 Results and Discussion 5 Conclusion and Future Work Smart Reader for Visually Impaired People Based on Optical Character Recognition Abstract 1 Introduction 2 Literature Review 3 Proposed Method 3.1 Architecture of the Proposed Model 3.2 Flow of Process 4 Results and Discussion 5 Conclusion and Future Work References Intelligent Applications A Survey on Context-Aware Computing Frameworks for Resource-Bounded Devices Abstract 1 Introduction 2 Context-Aware Computing System 2.1 Context-Awareness 2.2 Raw Facts Vs Contextual Information 2.3 Implicit Vs Explicit Context Models 2.4 Limitations and Challenges 3 Portability Issues from Desktop to Android Platform 4 Context-Aware Resource-Bounded Frameworks 4.1 Gcom 4.2 Open 4.3 Modeling and Verifying Resource-Bounded Context-Aware Agents 4.4 Locrs 4.5 Ldrocs 4.6 The Maude LTL Model 5 Context-Aware Rule-Based Frameworks for Mobile Devices 5.1 JADE in Android 5.2 Contextdroid 5.3 Knowledge-Based Agents in Android 5.4 Decentralized Context-Aware Computing Model 5.5 Rule Engine 6 Findings and Conclusion References A Real-Time Driver Drowsiness Detection and Warning System Based on an Eye Blinking Rate Abstract 1 Introduction 2 Literature Review 3 Proposed Method 3.1 Image Acquisition 3.2 Detection of Face 3.3 Detection of the EYE 3.4 Detecting Drowsiness 3.5 Alarm Activation 4 Results 4.1 Tests of the Driver Fatigue Detection Hardware 5 Conclusion and Future Work References Optimization of Bug Reporting System (BRS): Artificial Intelligence Based Method to Handle Duplicate Bug Report Abstract 1 Introduction 2 Literature Review 3 An Overview of Bug Reporting Tools 3.1 Mantis 3.2 Bugzilla 3.3 JIRA 3.4 Duplicate Bug Reports-DBR 3.5 Bug Tracking Systems 3.6 Bug Reporting Process 4 Proposed Methodology 4.1 Generate Tags for New Report 4.2 Comparing Tags 4.3 Sorting Fetched Reports 5 Problems and Solutions 5.1 How Duplicate Bug Report Can Be Detected in Our System? 5.2 What Are the Required Fields for Detection Duplicate Bugs? 5.3 How Old Bug and New Bug Will Be Linked? 5.4 Why Are We not Discarding Old Bug Report? 6 Conclusion and Future Work References A Review of Star Schema and Snowflakes Schema Abstract 1 Introduction 1.1 Database and Relational Database 1.2 Data Warehouse 1.3 Data Marts 1.4 Data Mining 2 Problem Statement 3 Literature Review 3.1 Design Modeling Techniques 3.2 Evaluation of Schemas 3.3 Star Schema 3.4 Snowflakes Schema 3.5 Star vs Snowflakes Schema 4 Conclusion 5 Future Work References A Region-Based and a Unified Team’s Strength in the Game of Cricket Using Principal Component Analysis (PCA) Abstract 1 Introduction 2 Literature Review 3 Materials and Method 3.1 Region-Based Team’s Strength 3.2 Principal Component Analysis (PCA) and a Region-Based Team’s Strength 3.3 Region-Based Team’s Batting, Bowling and Fielding Strengths Using Weighted Average System (WAS) 3.4 A Unified Team’s Strength 4 Results and Discussion 4.1 Datasets and Performance Evaluation 5 Conclusions Disclosure Statement References A Unit Softmax with Laplacian Smoothing Stochastic Gradient Descent for Deep Convolutional Neural Networks 1 Introduction 2 Preliminaries 2.1 Angular Margin Softmax 2.2 Stochastic Gradient Descent 2.3 Laplacian Smoothing Gradient Descent 3 Proposed Approach 3.1 Experiments 3.2 Results and Discussions 4 Conclusion References Scientific Map Creator: A Tool to Analyze the Author’s Affiliation and Citations by Producing Mind Maps Abstract 1 Introduction 1.1 Mindmapping 1.2 Types of Mind Mapping 2 Summarized Literature Review 2.1 Mind Maps 3 Importance of Citation Analysis 4 Research Problems 5 Research Methodology 6 Implementation of Proposed Tool 7 Conclusion References Prediction and Analysis of Sun Shower Using Machine Learning Abstract 1 Introduction 2 Review of Literature/Algorithm Study 3 Methodology 4 Results on Applied Algorithms 5 Conclusions References Electroencephalography Based Machine Learning Framework for Anxiety Classification 1 Introduction 2 Methodology and Experimental Setup 2.1 EEG Data Acquisition 2.2 Feature Extraction 2.3 Feature Selection 2.4 Classification 3 Experiments and Results 3.1 Data Labelling 3.2 Evaluation Parameters 3.3 Discussion 4 Conclusion References Decision Support Systems A Doctor Recommendation System Using Patient’s Satisfaction Analysis Abstract 1 Introduction 2 Proposed Methodology 2.1 Recommendation Process 2.2 Location of the Study 2.3 Research Instrument 2.4 Research Scoring and Statistical Analysis 3 Experimental Results 4 Discussions 5 Conclusion References Analysis of White Blood Cells Using Hematology Counts Abstract 1 Introduction of Complete Blood Count (CBC) 1.1 White Blood Count 1.2 Neutrophils 1.3 Eosinophils 1.4 Basophils 1.5 Monocytes 1.6 Lymphocytes 1.7 Natural Killer Cells (NK) 2 Procedure of Analysis 2.1 Automated CBC or Hematology Analyzer 2.2 Electrical Impedance (Coulter Principle) 2.3 Flow Cytometry by VCS (Volume Conductivity Scatter) 2.4 Scattergrams 2.5 Fluorescent Flow Cytometry 3 Comparison Using Histograms and Microscopic Images 3.1 Data of Old Age Patients 3.2 Data for Adult Patients 3.3 Data for Infant Patients 4 Conclusions References High Performance Simulation of Blood Flow Pattern and Transportation of Magnetic Nanoparticles in Capillaries Abstract 1 Introduction 2 Mathematical Model 3 Numerical Simulation, Results and Discussion 4 Implementation of CPU and CPU-GPU (Hybrid Platform) 5 Parallel Results and Discussion 6 Conclusion References To Explore the Factors that Affect Behavior of Employee Regarding Knowledge Sharing in IT Service Companies Abstract 1 Introduction 1.1 Problem Statement 2 Literature Review 2.1 Difference Between Data, Information, and Knowledge 2.2 Types of Knowledge 2.3 Outcome 3 Research Methodology 3.1 Research Model and Hypotheses 4 Evaluation 4.1 Research Setting 4.2 Sample Organization 4.3 Data Collection and Analysis 4.4 Results 4.5 Hypotheses Testing 5 Conclusion and Future Work References Decision Support System for Dental Clinics: A Systematic Literature Review Protocol Abstract 1 Introduction 2 Background 2.1 Clinical Decision Support System (CDSS) 2.2 Related Works 3 Research Method 3.1 Systematic Literature Review Protocol 4 Conclusion References Comparison of Localization Algorithms for Unmanned Aerial Vehicles 1 Introduction 2 Literature Review 3 Methodology 3.1 Angle of Arrival 3.2 Received Signal Strength 3.3 Correlative Interferometry 3.4 Watson-Watt Method 4 Results and Discussions 4.1 Comparison of Various Parameters 4.2 Time Complexity 5 Conclusion References Metaheuristic Algorithms in Industrial Process Optimisation: Performance, Comparison and Recommendations Abstract 1 Introduction 2 Metaheuristic Algorithms 2.1 Genetic Algorithm 2.2 Simulated Annealing 2.3 Particle Swarm Optimisation 3 Intelligent Method for Parametric Process Optimisation 4 Comparison of Metaheuristics in Process Optimisation 4.1 Metaheuristics Comparison Based on IS-MR-RPD Implementation 4.2 Metaheuristics Comparison Based on Extensive Literature Review 5 Concluding Remarks References Social Media Analytics Sentimental Content Analysis and Prediction of Text Abstract 1 Introduction 2 Literature Review 3 Methodology 4 Proposed Classifier 5 Results 6 Discussion and Conclusion References An Analysis of Depression Detection Techniques from Online Social Networks Abstract 1 Introduction 1.1 Motivation 1.2 Research Contribution 2 Literature Review 3 Proposed Approach 3.1 Data Acquisition 3.2 Data Pre-processing 3.3 Feature Extraction 3.4 Classifier 4 Conclusions and Future Work References Classification of Social Media Users Based on Disagreement and Stance Analysis Abstract 1 Introduction 2 Related Work 3 Problem Formalization and Proposed Framework 3.1 Steps Involved in Proposed Framework 3.2 LDA (Latent Dirichlet Allocation) 3.3 VADER (Valence Aware Dictionary and sEntiment Reasoner) 4 Experiment and Result Discussion 4.1 Dataset Description 4.2 Preprocessing 4.3 Experimental Setup 4.4 Results 5 Conclusion References A Framework to Strengthen up Business Interests in Students by Using Matrix Factorization on Web Log Abstract 1 Introduction 2 Related Work 3 Research Gaps 4 Proposed Methodology 4.1 Web Log 4.2 LDA Based Clustering 4.3 Data Extraction 4.4 Matrix Factorization 4.5 Notification of Business Events 4.6 Enhancement of Business Knowledge 5 Results and Discussion 6 Conclusions and Future Work Acknowledgements References Improving Validity of Disaster Related Information by Identifying Correlation Among Different Social Media Streams Abstract 1 Introduction 2 Literature Review 3 Proposed Solution 3.1 Datasets 3.2 Selection of Main Events 3.3 Ranking Algorithm 3.4 Included Features 3.5 Evaluation Setup 4 Results 4.1 Twitter 4.2 YouTube 4.3 Polarity and Subjectivity 4.4 Location and Polarity 4.5 Evaluation of Validity Ranking 4.6 Comparison of Sentimental Analysis of Social Media Streams 5 Conclusion References An Approach to Map Geography Mark-up Language Data to Resource Description Framework Schema Abstract 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Acquire GML Script 3.2 Parse GML (XML) 3.3 Extracting GML Features 3.4 Extraction of Feature Property 3.5 GML Coordinates Extraction 3.6 Mapping to RDFS 4 Results and Discussion 4.1 GML Input to RDF Generator 4.2 GML Output of RDFS Generator 4.3 GML/XML Processing 4.4 Output of GML Script to RDFS Script 4.5 Mapping to RDFS 4.6 Discussion of Results 5 Conclusion and Limitations 6 Future Work References Machine Learning Multi-aspects Intelligent Requirements Prioritization Technique for Value Based Software Systems Abstract 1 Introduction 2 Requirement Prioritization Techniques in Literature 3 Proposed Fuzzy C-Means (FCM) Based Intelligent Technique for Requirements Prioritization 4 Results 4.1 Calculating Final Requirements Value 4.2 Calculating Technical Aspects Score and Business Aspects Score for Each Requirement 4.3 Preparation of Requirements Dataset 4.4 Experiment 4.4.1 Fuzzy C-Means (FCM) Results – 2D Clustering 5 Conclusion References An Intelligent Approach for CRC Models Based Agile Software Requirement Engineering Using SBVR Abstract 1 Introduction 2 Related Work 3 The SBVR2CRC 3.1 Generate SBVR Model 3.2 Transformation of SBVR Model to CRC Model 3.3 Drawing CRC Cards 4 Experiment and Results 5 Conclusion and Future Work References Automatic RDF, Metadata Generation from Legacy Software Models Abstract 1 Introduction 2 Related Work 3 Used Approach 3.1 UML Class Model 3.2 Parse Class Model 3.3 Extraction of Metadata 3.4 Mapping to RDF 3.5 RDF Triple Generation 3.6 RDF Data System 4 Experiments and Results 5 Conclusion References An Approach to Measure Functional Parameters for Ball-Screw Drives Abstract 1 Introduction to Ball Screw Drive Functional Parameters 2 Torque Measurement 2.1 Twist Bar Calibration Method: Theoretical Calculation 2.2 Torque Calculation Using Twist Bar Testing Jig 3 Slew Rate Measurement 3.1 Slew Rate Calculation on Twist Bar Testing Jig 3.2 Slew Rate Calculation 4 Results and Discussion 5 Conclusions and Future Work Acknowledgement References Secure NoSQL Over Cloud Using Data Decomposition and Queryable Encryption 1 Introduction 2 Related Work 3 Methodology 3.1 Database Proxy 3.2 Decomposed NoSQL Databases (SID and SDB) 3.3 Data Encryption Methods 4 Experimental Setup 4.1 Benchmark Application 4.2 Testbed Infrastructure 4.3 Evaluation Queries 4.4 Baseline System 5 Experiments Results 5.1 Performance Evaluation for Query Processing Time 5.2 Query Encryption Time Comparison 6 Conclusion and Future Work References Pseudo Transfer Learning by Exploiting Monolingual Corpus: An Experiment on Roman Urdu Transliteration Abstract 1 Introduction 2 Background 2.1 Review of Roman Urdu Transliteration 2.2 Related Work 3 Methodology 3.1 Source Learning Model 3.2 Target Learning Model 3.3 Experimental Setup 3.4 Dataset 4 Results and Evaluation 4.1 Effect of Pseudo Transfer Learning 4.2 Roman Urdu Transliteration 5 Conclusion References Classification and Prediction Analysis of Diseases and Other Datasets Using Machine Learning Abstract 1 Introduction 2 Literature Review 3 Methodology 4 Results and Discussion 4.1 Indian Liver Patient Dataset 4.2 Breast Cancer Dataset 4.3 Wine Quality 4.4 Bupa Liver Disorder 5 Conclusion References QoE Analysis of Real-Time Video Streaming over 4G-LTE for UAV-Based Surveillance Applications 1 Introduction 2 Related Work 3 Surveillance Architecture 4 Measuring Metrics Used for QoE of Video 5 Simulation Settings for Streaming Video 6 Performance Evaluation 7 Conclusion References Natural Language Processing Urdu Natural Language Processing Issues and Challenges: A Review Study Abstract 1 Introduction 2 Approaches in Speech Recognition 2.1 Acoustic Phonetic Approach 2.2 Pattern Recognition Approach 2.3 Template Based Approach 2.4 Stochastic Approach 2.5 Knowledge Based Approach 3 Some Relevant Work in Different Natural Languages 3.1 Bengali Speech Recognition 3.2 Turkish Speech Recognition Approaches 3.3 Arabic Speech Recognition Approaches 4 A Brief Introduction to Urdu Language 5 Overview of Urdu Speech/Text Related Work in Last a Few Years 6 Proposed Work 7 Conclusion References Urdu Spell Checker: A Scarce Resource Language Abstract 1 Introduction 2 Linguistic Issues 2.1 Phonetic Similarity 2.2 Space Omission 2.3 Shape Similarity 3 Literature Review 4 Methodology 4.1 Detection of Incorrect Word 4.2 Techniques for Spelling Error Correction 4.3 Ranking Techniques 5 Results and Discussion 5.1 Improved Soundex/Shapex 6 Conclusion and Future Work References Maximum Entropy Based Urdu Part of Speech Tagging Abstract 1 Introduction 2 Literature Review 3 Maximum Entropy Model 4 Evaluation and Results 4.1 First Corpus (C1) 4.2 Second Corpus (C2) 5 Discussion on Results 6 Issues in Corpus (C1) 7 Conclusion References Towards a Generic Approach for PoS-Tagwise Lexical Similarity of Languages Abstract 1 Introduction 2 Background 3 Methodology 3.1 Word Lists Generation 3.2 Orthographic Transcription 3.3 Algorithm for Similarity 4 Results 4.1 Similarity Metric 4.2 Discussion 5 Conclusion References Preprocessing Techniques in Text Categorization: A Survey 1 Introduction 2 Tokenization 2.1 Challenges 3 Stop Word Removal 4 Stemming 4.1 Errors in Stemming 4.2 Principles of Stemming Algorithms 4.3 Types of Stemming Algorithms 5 Conclusion References Educational Data Mining: A Review and Analysis of Student’s Academic Performance Abstract 1 Introduction 2 Literature Review 3 Educational Data Mining Objectives 3.1 Evaluating Group of Users in EDM 3.2 Reviewing Educational Systems Effect in EDM 3.3 Determining and Refining Mining Models 3.4 Progressing Scientific Awareness About Learners and Learning 4 Adopted Application of Data Mining in EDM 4.1 Predicting Student Academic Performance 5 Implementation of Mining Methods and Results 6 Conclusion References Multi Agents Based System Architecture for Market Research in E-Business Abstract 1 Introduction 2 Literature Review 3 Market Research in E-Business 3.1 MAS Analysis 3.2 MAS Design 3.3 MREB’s Architecture 3.4 MREB: Decision Making Process 4 Prototype Implementation, Validation, and Results 5 Comparison of MREB with Existing MR Platforms 6 Conclusion Remarks References Image Processing and Analysis An Investigation on Ability of Pre-trained Convolutional Neural Networks Trained on ImageNet to Classify Melanoma Images Without Re-training 1 Introduction 2 Melanoma Detection Using Image Analysis 3 Residual Neural Network - ResNet 4 Experiment Setup and Dataset 5 Experiment Results and Discussion 6 Conclusion and Future Prospects References Effect of Laplacian Smoothing Stochastic Gradient Descent with Angular Margin Softmax Loss on Face Recognition Abstract 1 Introduction 2 Related Work 3 Softmax Loss 3.1 Multiplicative Angular Margin to Softmax Loss 4 Laplacian Smoothing Stochastic Gradient Descent 4.1 Convexification and Hamilton-Jacobi PDEs 4.2 Laplacian Smoothing Stochastic Gradient Descent 5 Experiments 5.1 Experimental Settings 5.2 Exploratory Experiments 5.3 Experimental Results 6 Conclusion References Brain Tumor Localization and Segmentation Based on Pixel-Based Thresholding with Morphological Operation Abstract 1 Introduction 2 Literature Review 3 Proposed Methodology 3.1 Image Acquisition 3.2 Preprocessing Stage 3.3 Image Segmentation 3.4 Morphological Operation 4 Results and Discussions 5 Conclusions and Future Work References Classification of Breast Lesions in Combination with Metamorphic Segmentation and Saliency Feature Block Abstract 1 Introduction 2 Proposed Methodology 2.1 Image Acquisition 2.2 Preprocessing 2.3 Metamorphic Segmentation 2.4 Feature Extraction 3 Experimental Results and Discussion 4 Conclusion References Analysis of the MIDAS and OASIS Biomedical Databases for the Application of Multimodal Image Processing Abstract 1 Introduction 2 The MIDAS and OASIS Database 3 Public Interest on MIDAS and OASIS Database 4 Discussion 5 Conclusion References Image Quality Assessment Using a Combination of Hand-Crafted and Deep Features Abstract 1 Introduction 2 Related Work 2.1 Full-Reference Image Quality Assessment 2.2 No-Reference Image Quality Assessment 3 Materials 4 Methodology 4.1 Dimensionality Reduction 4.2 Quality Prediction 4.3 Evaluation Measures 5 Performance Evaluation 5.1 Comparison with Existing Approaches 5.2 Cross-dataset Testing 6 Conclusion References An Ensemble Classification-Based Methodology Applied to MRI Brain Images for Tumor Detection and Segmentation Abstract 1 Introduction 2 Literature Review 3 Proposed Model 3.1 Feature Extraction (DWT) 3.2 Features Reduction (PCA) 3.3 Ensemble Classification 4 Results and Discussion 5 Conclusion and Future Work References Efficient PatchMatch Algorithm to Detect False Crowd in Digitally Forged Images 1 Introduction 2 Proposed Methodology 2.1 Improved PatchMatch Algorithm 3 Experimental Results 3.1 False Crowd Database (FCD) 3.2 Quantitative Results 3.3 Qualitative Results 3.4 Validation of Proposed Technique 4 Conclusion References Analysis of the Lifetime and Energy Consumption of WSN Routing Protocols: LEACH, EAMMH and SEP Abstract 1 Introduction 2 Routing Protocols in WSN 2.1 LEACH 2.2 EAMMH 2.3 SEP 3 Comparisons and Simulation Results 3.1 Comparison of the LEACH and EAMMH 3.2 Comparison of the LEACH and SEP 4 Conclusion and Future Work References Intelligent Environments Crash-Resilient Synthesizer in Logic Optimization Paradigm for Sustainable Hardware Design of ASIC and Digital Systems Abstract 1 Introduction 2 Aspects of Dealing with the Faults for Self-sustainable Systems 2.1 Fault Detection 2.2 Fault Recovery/Mitigation 3 Problem Statement 3.1 Analysis on the Problem Statement 3.2 Application Specific Integrated Circuit (ASIC) 3.3 ASIC Modeling Language 3.4 VHDL and HDL 4 Logic Synthesis 4.1 Phases of Logic Synthesis 4.2 Proposed Design 4.3 Algorithm 5 Conclusion References An Improved Ensemble Based Machine Learning Technique for Efficient Malware Classification Abstract 1 Introduction 2 Literature Review 3 Proposed Approach 3.1 Data Collection 3.2 Feature Extraction 3.3 Behavior Analysis 3.4 Detection Model 4 Comparison and Discussion 5 Conclusions and Future Work References Green Computing: A Contribution Towards Better Future Abstract 1 Introduction 2 Relevant Literature 2.1 Intel and AMD Contribution 2.2 Green Computing Correspondence 2.3 DVS 2.4 Previous DVS Implementations 2.5 DVS by Intel and AMD 3 Benchmarking Methodology 3.1 Power Management 3.2 Cryptographic Performance 3.3 Access Time of Cache and Memory 3.4 Arithmetic and Floating Operations 3.5 Memory Latency 4 Discussion and Analysis 5 Conclusion References An Intelligent Approach to Detect Actuator Signal Errors Based on Remnant Filter Abstract 1 Introduction 2 Servo Actuator Fault Detection: Design Architecture 2.1 UAV Actuator Failure Modes 2.2 Fault Detection Structure 3 Servo Actuator Fault Detection: Model Design 4 Servo Actuator Fault Detection: Model Validation and Results 4.1 Fault Diagnostic Test Setup 5 Conclusions and Future Work Acknowledgement References Driving Activity Recognition of Motorcyclists Using Smartphone Sensor 1 Introduction 2 Proposed Methodology 2.1 Data Acquisition 2.2 Segmentation 2.3 Feature Extraction and Selection 2.4 Classification 3 Experimental Results 3.1 Classifier Performance 3.2 Performance Comparison 4 Conclusion References PARK MY RIDE: Your True Parking Companion 1 Introduction 2 Literature Review 3 Proposed Solution 3.1 Administrator Panel 3.2 End-User Application 3.3 Database 4 Main Attributes and Working Flow 4.1 Login and Registration 4.2 Location Accessibility 4.3 Parking Area Searching, Space Availability and Navigation 4.4 Parking Spot Reservation 4.5 Vehicles Exit and Billing 4.6 Working Flow 5 Comparative Analysis and Discussion 6 Conclusion References Cloud and Data Systems Edge Caching Framework in Fog Based Radio Access Networks Through AI in Quantum Regime Abstract 1 Introduction 1.1 Fog Computing and Edge Caching 1.2 Quantum Computing 2 Problem Statement 3 Related Work 4 Proposed Work 4.1 Proposed Model for Edge Caching in Quantum Regime 5 Results and Discussions 6 Conclusion References Challenges and Limitation of Resource Allocation in Cloud Computing Abstract 1 Introduction 2 Framework of Resource Allocation 3 What Is Resource Allocation Challenge? 4 Literature Review 5 Analysis 5.1 Evaluation of Core Resource Allocation Approaches 6 Taxonomy on Resources Allocation Methods 6.1 Adaptation Policy in Resource Allocation 6.2 Need of Scheduling in Resource Allocation 7 Conclusion 8 Future Work References NFC Payment Security with Cloud Based Authentication System Abstract 1 Introduction 2 Related Literature 3 EMV Risks and Weaknesses 3.1 Principal 3.2 Actors 4 Details of Proposed Protocol 5 Results 6 Scyther Verification 6.1 Existing System 6.2 Scyther Claims for Existing System 7 Proposed System 7.1 Scyther Claims for Proposed System 8 Conclusion References Resource Utilization in Data Center by Applying ARIMA Approach Abstract 1 Introduction 2 Application Workload Prediction Model 2.1 Stationary Testing 2.2 Model Recognition 2.3 Evaluate Model Parameters 3 Simulation Results 4 Related Works 5 Conclusion References Detecting Duplicates in Real-Time Data Warehouse Using Bloom Filter-Based Approach Abstract 1 Introduction 2 Proposed Consistency Management Approach 2.1 Problem Definition 2.2 Bloom Filters 2.3 Counting Bloom Filter 2.4 Proposed Approach 2.5 Insertion of Record 3 Results 4 Conclusion References Restricted Boltzmann Machines Based Fault Estimation in Multi Terminal HVDC Transmission System Abstract 1 Introduction 2 HVDC Transmission System 2.1 VSC Based HVDC Transmission System 3 Restricted Boltzmann Machine (RBM) 4 Contrastive Divergence (CD) Algorithm 5 Methodology 5.1 Data Selection 5.2 Characteristics of Selected Variables 5.3 VSC Based HVDC System Status Codes 5.4 Implementation of Fault Estimation Process 6 Simulation Results 7 Conclusion References Multi-agent Oriented Framework for University Course Timetable Scheduling Abstract 1 Introduction 2 Problem Definition 2.1 Basic Definitions of the Problem 2.2 Hard Constraints 2.3 Soft Constraints 3 System Design Implementation and Architecture 4 Methodology and System Components 4.1 System Components 4.2 Timetable Development Process 4.3 Timetable Development Algorithm 5 Conclusion References Author Index