ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198)

دانلود کتاب فناوری‌ها و کاربردهای هوشمند: دومین کنفرانس بین‌المللی، INTAP 2019، بهاوالپور، پاکستان، 6 تا 8 نوامبر 2019، منتخب اصلاح شده ... در علوم کامپیوتر و اطلاعات، 1198)

Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198)

مشخصات کتاب

Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198)

ویرایش: 1st ed. 2020 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 9811552312, 9789811552311 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 807 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 82 مگابایت 

قیمت کتاب (تومان) : 33,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Intelligent Technologies and Applications: Second International Conference, INTAP 2019, Bahawalpur, Pakistan, November 6–8, 2019, Revised Selected ... in Computer and Information Science, 1198) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب فناوری‌ها و کاربردهای هوشمند: دومین کنفرانس بین‌المللی، INTAP 2019، بهاوالپور، پاکستان، 6 تا 8 نوامبر 2019، منتخب اصلاح شده ... در علوم کامپیوتر و اطلاعات، 1198) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب فناوری‌ها و کاربردهای هوشمند: دومین کنفرانس بین‌المللی، INTAP 2019، بهاوالپور، پاکستان، 6 تا 8 نوامبر 2019، منتخب اصلاح شده ... در علوم کامپیوتر و اطلاعات، 1198)

این کتاب مجموعه مقالات داوری دومین کنفرانس بین‌المللی فناوری‌ها و کاربردهای هوشمند، INTAP 2019، در باهاوالپور، پاکستان، در نوامبر 2019 است.

60 مقاله کامل اصلاح‌شده و 6 مقاله کوتاه اصلاح‌شده ارائه شده به دقت بررسی و از بین 224 مورد ارسالی انتخاب شد. علاوه بر این، جلد 1 مقاله دعوت شده را ارائه می دهد. مقالات این جلد در بخش‌های موضوعی هوش مصنوعی و سلامت سازمان‌دهی شده‌اند. تحلیل احساسات؛ برنامه های هوشمند؛ تحلیل شبکه های اجتماعی؛ هوش تجاری؛ پردازش زبان طبیعی؛ استخراج اطلاعات؛ فراگیری ماشین؛ سیستم های هوشمند؛ وب معنایی؛ سیستم های پشتیبانی تصمیم؛ تجزیه و تحلیل تصویر؛ مهندسی نرم افزار خودکار.


توضیحاتی درمورد کتاب به خارجی

This book constitutes the refereed proceedings of the Second International Conference on Intelligent Technologies and Applications, INTAP 2019, held in Bahawalpur, Pakistan, in November 2019.

The 60 revised full papers and 6 revised short papers presented were carefully reviewed and selected from 224 submissions. Additionally, the volume presents 1 invited paper. The papers of this volume are organized in topical sections on AI and health; sentiment analysis; intelligent applications; social media analytics; business intelligence;Natural Language Processing; information extraction; machine learning; smart systems; semantic web; decision support systems; image analysis; automated software engineering.



فهرست مطالب

Preface
Organization
Contents
Internet of Things
Design of Wearable Prototype Smart Wristband for Remote Health Monitoring Using Internet of Things
	Abstract
	1 Introduction
	2 Proposed Method
		2.1 Sensing Phase
		2.2 Interaction Phase
	3 Results and Analysis
		3.1 Experimental Results of Smart Wrist Band
		3.2 Experimental Results of the Temperature Sensor
	4 Conclusions
	References
FireNot - An IoT Based Fire Alerting System: Design and Implementation
	Abstract
	1 Introduction
	2 Related Work
	3 System Components
		3.1 Raspberry Pi 3
		3.2 Smoke Sensor (MQ2)
		3.3 Google Firebase Cloud Messaging (FCM)
		3.4 Google Map API
	4 Conclusion
	References
Smart Intelligent System for Mobile Travelers Based on Fuzzy Logic in IoT Communication Technology
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 Sequence Estimation of Mobile Users
		3.2 Time Estimation of Mobile User
	4 Experimental and Evaluations
		4.1 Simulation Parameters
		4.2 Result and Discussion
	5 Conclusion
	References
Perception of Wearable Intelligent Devices: A Case of Fitbit-Alta-HR
	1 Introduction
	2 Related Work
	3 Conceptual Overview
		3.1 Step 1: Extract Customer Feedback
		3.2 Step 2: Feedback Classification
		3.3 Step 3: Perception Evaluation
	4 Evaluation
		4.1 Dataset
		4.2 Evaluation Measures
		4.3 Experimentation
	5 Results
	6 Conclusion
	References
Automatic Sun Tracking Smart Wheel Chair with Real Time Navigation
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed System Architecture
	4 Results and Discussion
		4.1 Joystick Results
		4.2 Voice Recognition Result
		4.3 Sun Tracking Result
		4.4 Navigation Device Result
	5 Conclusion and Future Work
	References
A Blockchain-Based Framework for Information Security in Intelligent Transportation Systems
	1 Introduction
	2 Related Work
	3 System Model
		3.1 Intelligent Transportation System
		3.2 Working Principle to Secure ITS Using Blockchains
	4 Discussion
	5 Conclusion and Future Research Direction
	References
Home Automation Security System Based on Face Detection and Recognition Using IoT
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed System Architecture
		3.1 Face Detection
		3.2 Creation of Datasets of the Individuals
		3.3 Recognition of Face Through Stored Database
		3.4 IoT Platform
	4 Results and Discussion
	5 Conclusion and Future Work
Smart Reader for Visually Impaired People Based on Optical Character Recognition
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Method
		3.1 Architecture of the Proposed Model
		3.2 Flow of Process
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Intelligent Applications
A Survey on Context-Aware Computing Frameworks for Resource-Bounded Devices
	Abstract
	1 Introduction
	2 Context-Aware Computing System
		2.1 Context-Awareness
		2.2 Raw Facts Vs Contextual Information
		2.3 Implicit Vs Explicit Context Models
		2.4 Limitations and Challenges
	3 Portability Issues from Desktop to Android Platform
	4 Context-Aware Resource-Bounded Frameworks
		4.1 Gcom
		4.2 Open
		4.3 Modeling and Verifying Resource-Bounded Context-Aware Agents
		4.4 Locrs
		4.5 Ldrocs
		4.6 The Maude LTL Model
	5 Context-Aware Rule-Based Frameworks for Mobile Devices
		5.1 JADE in Android
		5.2 Contextdroid
		5.3 Knowledge-Based Agents in Android
		5.4 Decentralized Context-Aware Computing Model
		5.5 Rule Engine
	6 Findings and Conclusion
	References
A Real-Time Driver Drowsiness Detection and Warning System Based on an Eye Blinking Rate
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Method
		3.1 Image Acquisition
		3.2 Detection of Face
		3.3 Detection of the EYE
		3.4 Detecting Drowsiness
		3.5 Alarm Activation
	4 Results
		4.1 Tests of the Driver Fatigue Detection Hardware
	5 Conclusion and Future Work
	References
Optimization of Bug Reporting System (BRS): Artificial Intelligence Based Method to Handle Duplicate Bug Report
	Abstract
	1 Introduction
	2 Literature Review
	3 An Overview of Bug Reporting Tools
		3.1 Mantis
		3.2 Bugzilla
		3.3 JIRA
		3.4 Duplicate Bug Reports-DBR
		3.5 Bug Tracking Systems
		3.6 Bug Reporting Process
	4 Proposed Methodology
		4.1 Generate Tags for New Report
		4.2 Comparing Tags
		4.3 Sorting Fetched Reports
	5 Problems and Solutions
		5.1 How Duplicate Bug Report Can Be Detected in Our System?
		5.2 What Are the Required Fields for Detection Duplicate Bugs?
		5.3 How Old Bug and New Bug Will Be Linked?
		5.4 Why Are We not Discarding Old Bug Report?
	6 Conclusion and Future Work
	References
A Review of Star Schema and Snowflakes Schema
	Abstract
	1 Introduction
		1.1 Database and Relational Database
		1.2 Data Warehouse
		1.3 Data Marts
		1.4 Data Mining
	2 Problem Statement
	3 Literature Review
		3.1 Design Modeling Techniques
		3.2 Evaluation of Schemas
		3.3 Star Schema
		3.4 Snowflakes Schema
		3.5 Star vs Snowflakes Schema
	4 Conclusion
	5 Future Work
	References
A Region-Based and a Unified Team’s Strength in the Game of Cricket Using Principal Component Analysis (PCA)
	Abstract
	1 Introduction
	2 Literature Review
	3 Materials and Method
		3.1 Region-Based Team’s Strength
		3.2 Principal Component Analysis (PCA) and a Region-Based Team’s Strength
		3.3 Region-Based Team’s Batting, Bowling and Fielding Strengths Using Weighted Average System (WAS)
		3.4 A Unified Team’s Strength
	4 Results and Discussion
		4.1 Datasets and Performance Evaluation
	5 Conclusions
	Disclosure Statement
	References
A Unit Softmax with Laplacian Smoothing Stochastic Gradient Descent for Deep Convolutional Neural Networks
	1 Introduction
	2 Preliminaries
		2.1 Angular Margin Softmax
		2.2 Stochastic Gradient Descent
		2.3 Laplacian Smoothing Gradient Descent
	3 Proposed Approach
		3.1 Experiments
		3.2 Results and Discussions
	4 Conclusion
	References
Scientific Map Creator: A Tool to Analyze the Author’s Affiliation and Citations by Producing Mind Maps
	Abstract
	1 Introduction
		1.1 Mindmapping
		1.2 Types of Mind Mapping
	2 Summarized Literature Review
		2.1 Mind Maps
	3 Importance of Citation Analysis
	4 Research Problems
	5 Research Methodology
	6 Implementation of Proposed Tool
	7 Conclusion
	References
Prediction and Analysis of Sun Shower Using Machine Learning
	Abstract
	1 Introduction
	2 Review of Literature/Algorithm Study
	3 Methodology
	4 Results on Applied Algorithms
	5 Conclusions
	References
Electroencephalography Based Machine Learning Framework for Anxiety Classification
	1 Introduction
	2 Methodology and Experimental Setup
		2.1 EEG Data Acquisition
		2.2 Feature Extraction
		2.3 Feature Selection
		2.4 Classification
	3 Experiments and Results
		3.1 Data Labelling
		3.2 Evaluation Parameters
		3.3 Discussion
	4 Conclusion
	References
Decision Support Systems
A Doctor Recommendation System Using Patient’s Satisfaction Analysis
	Abstract
	1 Introduction
	2 Proposed Methodology
		2.1 Recommendation Process
		2.2 Location of the Study
		2.3 Research Instrument
		2.4 Research Scoring and Statistical Analysis
	3 Experimental Results
	4 Discussions
	5 Conclusion
	References
Analysis of White Blood Cells Using Hematology Counts
	Abstract
	1 Introduction of Complete Blood Count (CBC)
		1.1 White Blood Count
		1.2 Neutrophils
		1.3 Eosinophils
		1.4 Basophils
		1.5 Monocytes
		1.6 Lymphocytes
		1.7 Natural Killer Cells (NK)
	2 Procedure of Analysis
		2.1 Automated CBC or Hematology Analyzer
		2.2 Electrical Impedance (Coulter Principle)
		2.3 Flow Cytometry by VCS (Volume Conductivity Scatter)
		2.4 Scattergrams
		2.5 Fluorescent Flow Cytometry
	3 Comparison Using Histograms and Microscopic Images
		3.1 Data of Old Age Patients
		3.2 Data for Adult Patients
		3.3 Data for Infant Patients
	4 Conclusions
	References
High Performance Simulation of Blood Flow Pattern and Transportation of Magnetic Nanoparticles in Capillaries
	Abstract
	1 Introduction
	2 Mathematical Model
	3 Numerical Simulation, Results and Discussion
	4 Implementation of CPU and CPU-GPU (Hybrid Platform)
	5 Parallel Results and Discussion
	6 Conclusion
	References
To Explore the Factors that Affect Behavior of Employee Regarding Knowledge Sharing in IT Service Companies
	Abstract
	1 Introduction
		1.1 Problem Statement
	2 Literature Review
		2.1 Difference Between Data, Information, and Knowledge
		2.2 Types of Knowledge
		2.3 Outcome
	3 Research Methodology
		3.1 Research Model and Hypotheses
	4 Evaluation
		4.1 Research Setting
		4.2 Sample Organization
		4.3 Data Collection and Analysis
		4.4 Results
		4.5 Hypotheses Testing
	5 Conclusion and Future Work
	References
Decision Support System for Dental Clinics: A Systematic Literature Review Protocol
	Abstract
	1 Introduction
	2 Background
		2.1 Clinical Decision Support System (CDSS)
		2.2 Related Works
	3 Research Method
		3.1 Systematic Literature Review Protocol
	4 Conclusion
	References
Comparison of Localization Algorithms for Unmanned Aerial Vehicles
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Angle of Arrival
		3.2 Received Signal Strength
		3.3 Correlative Interferometry
		3.4 Watson-Watt Method
	4 Results and Discussions
		4.1 Comparison of Various Parameters
		4.2 Time Complexity
	5 Conclusion
	References
Metaheuristic Algorithms in Industrial Process Optimisation: Performance, Comparison and Recommendations
	Abstract
	1 Introduction
	2 Metaheuristic Algorithms
		2.1 Genetic Algorithm
		2.2 Simulated Annealing
		2.3 Particle Swarm Optimisation
	3 Intelligent Method for Parametric Process Optimisation
	4 Comparison of Metaheuristics in Process Optimisation
		4.1 Metaheuristics Comparison Based on IS-MR-RPD Implementation
		4.2 Metaheuristics Comparison Based on Extensive Literature Review
	5 Concluding Remarks
	References
Social Media Analytics
Sentimental Content Analysis and Prediction of Text
	Abstract
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Proposed Classifier
	5 Results
	6 Discussion and Conclusion
	References
An Analysis of Depression Detection Techniques from Online Social Networks
	Abstract
	1 Introduction
		1.1 Motivation
		1.2 Research Contribution
	2 Literature Review
	3 Proposed Approach
		3.1 Data Acquisition
		3.2 Data Pre-processing
		3.3 Feature Extraction
		3.4 Classifier
	4 Conclusions and Future Work
	References
Classification of Social Media Users Based on Disagreement and Stance Analysis
	Abstract
	1 Introduction
	2 Related Work
	3 Problem Formalization and Proposed Framework
		3.1 Steps Involved in Proposed Framework
		3.2 LDA (Latent Dirichlet Allocation)
		3.3 VADER (Valence Aware Dictionary and sEntiment Reasoner)
	4 Experiment and Result Discussion
		4.1 Dataset Description
		4.2 Preprocessing
		4.3 Experimental Setup
		4.4 Results
	5 Conclusion
	References
A Framework to Strengthen up Business Interests in Students by Using Matrix Factorization on Web Log
	Abstract
	1 Introduction
	2 Related Work
	3 Research Gaps
	4 Proposed Methodology
		4.1 Web Log
		4.2 LDA Based Clustering
		4.3 Data Extraction
		4.4 Matrix Factorization
		4.5 Notification of Business Events
		4.6 Enhancement of Business Knowledge
	5 Results and Discussion
	6 Conclusions and Future Work
	Acknowledgements
	References
Improving Validity of Disaster Related Information by Identifying Correlation Among Different Social Media Streams
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Solution
		3.1 Datasets
		3.2 Selection of Main Events
		3.3 Ranking Algorithm
		3.4 Included Features
		3.5 Evaluation Setup
	4 Results
		4.1 Twitter
		4.2 YouTube
		4.3 Polarity and Subjectivity
		4.4 Location and Polarity
		4.5 Evaluation of Validity Ranking
		4.6 Comparison of Sentimental Analysis of Social Media Streams
	5 Conclusion
	References
An Approach to Map Geography Mark-up Language Data to Resource Description Framework Schema
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Acquire GML Script
		3.2 Parse GML (XML)
		3.3 Extracting GML Features
		3.4 Extraction of Feature Property
		3.5 GML Coordinates Extraction
		3.6 Mapping to RDFS
	4 Results and Discussion
		4.1 GML Input to RDF Generator
		4.2 GML Output of RDFS Generator
		4.3 GML/XML Processing
		4.4 Output of GML Script to RDFS Script
		4.5 Mapping to RDFS
		4.6 Discussion of Results
	5 Conclusion and Limitations
	6 Future Work
	References
Machine Learning
Multi-aspects Intelligent Requirements Prioritization Technique for Value Based Software Systems
	Abstract
	1 Introduction
	2 Requirement Prioritization Techniques in Literature
	3 Proposed Fuzzy C-Means (FCM) Based Intelligent Technique for Requirements Prioritization
	4 Results
		4.1 Calculating Final Requirements Value
		4.2 Calculating Technical Aspects Score and Business Aspects Score for Each Requirement
		4.3 Preparation of Requirements Dataset
		4.4 Experiment
			4.4.1 Fuzzy C-Means (FCM) Results – 2D Clustering
	5 Conclusion
	References
An Intelligent Approach for CRC Models Based Agile Software Requirement Engineering Using SBVR
	Abstract
	1 Introduction
	2 Related Work
	3 The SBVR2CRC
		3.1 Generate SBVR Model
		3.2 Transformation of SBVR Model to CRC Model
		3.3 Drawing CRC Cards
	4 Experiment and Results
	5 Conclusion and Future Work
	References
Automatic RDF, Metadata Generation from Legacy Software Models
	Abstract
	1 Introduction
	2 Related Work
	3 Used Approach
		3.1 UML Class Model
		3.2 Parse Class Model
		3.3 Extraction of Metadata
		3.4 Mapping to RDF
		3.5 RDF Triple Generation
		3.6 RDF Data System
	4 Experiments and Results
	5 Conclusion
	References
An Approach to Measure Functional Parameters for Ball-Screw Drives
	Abstract
	1 Introduction to Ball Screw Drive Functional Parameters
	2 Torque Measurement
		2.1 Twist Bar Calibration Method: Theoretical Calculation
		2.2 Torque Calculation Using Twist Bar Testing Jig
	3 Slew Rate Measurement
		3.1 Slew Rate Calculation on Twist Bar Testing Jig
		3.2 Slew Rate Calculation
	4 Results and Discussion
	5 Conclusions and Future Work
	Acknowledgement
	References
Secure NoSQL Over Cloud Using Data Decomposition and Queryable Encryption
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Database Proxy
		3.2 Decomposed NoSQL Databases (SID and SDB)
		3.3 Data Encryption Methods
	4 Experimental Setup
		4.1 Benchmark Application
		4.2 Testbed Infrastructure
		4.3 Evaluation Queries
		4.4 Baseline System
	5 Experiments Results
		5.1 Performance Evaluation for Query Processing Time
		5.2 Query Encryption Time Comparison
	6 Conclusion and Future Work
	References
Pseudo Transfer Learning by Exploiting Monolingual Corpus: An Experiment on Roman Urdu Transliteration
	Abstract
	1 Introduction
	2 Background
		2.1 Review of Roman Urdu Transliteration
		2.2 Related Work
	3 Methodology
		3.1 Source Learning Model
		3.2 Target Learning Model
		3.3 Experimental Setup
		3.4 Dataset
	4 Results and Evaluation
		4.1 Effect of Pseudo Transfer Learning
		4.2 Roman Urdu Transliteration
	5 Conclusion
	References
Classification and Prediction Analysis of Diseases and Other Datasets Using Machine Learning
	Abstract
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results and Discussion
		4.1 Indian Liver Patient Dataset
		4.2 Breast Cancer Dataset
		4.3 Wine Quality
		4.4 Bupa Liver Disorder
	5 Conclusion
	References
QoE Analysis of Real-Time Video Streaming over 4G-LTE for UAV-Based Surveillance Applications
	1 Introduction
	2 Related Work
	3 Surveillance Architecture
	4 Measuring Metrics Used for QoE of Video
	5 Simulation Settings for Streaming Video
	6 Performance Evaluation
	7 Conclusion
	References
Natural Language Processing
Urdu Natural Language Processing Issues and Challenges: A Review Study
	Abstract
	1 Introduction
	2 Approaches in Speech Recognition
		2.1 Acoustic Phonetic Approach
		2.2 Pattern Recognition Approach
		2.3 Template Based Approach
		2.4 Stochastic Approach
		2.5 Knowledge Based Approach
	3 Some Relevant Work in Different Natural Languages
		3.1 Bengali Speech Recognition
		3.2 Turkish Speech Recognition Approaches
		3.3 Arabic Speech Recognition Approaches
	4 A Brief Introduction to Urdu Language
	5 Overview of Urdu Speech/Text Related Work in Last a Few Years
	6 Proposed Work
	7 Conclusion
	References
Urdu Spell Checker: A Scarce Resource Language
	Abstract
	1 Introduction
	2 Linguistic Issues
		2.1 Phonetic Similarity
		2.2 Space Omission
		2.3 Shape Similarity
	3 Literature Review
	4 Methodology
		4.1 Detection of Incorrect Word
		4.2 Techniques for Spelling Error Correction
		4.3 Ranking Techniques
	5 Results and Discussion
		5.1 Improved Soundex/Shapex
	6 Conclusion and Future Work
	References
Maximum Entropy Based Urdu Part of Speech Tagging
	Abstract
	1 Introduction
	2 Literature Review
	3 Maximum Entropy Model
	4 Evaluation and Results
		4.1 First Corpus (C1)
		4.2 Second Corpus (C2)
	5 Discussion on Results
	6 Issues in Corpus (C1)
	7 Conclusion
	References
Towards a Generic Approach for PoS-Tagwise Lexical Similarity of Languages
	Abstract
	1 Introduction
	2 Background
	3 Methodology
		3.1 Word Lists Generation
		3.2 Orthographic Transcription
		3.3 Algorithm for Similarity
	4 Results
		4.1 Similarity Metric
		4.2 Discussion
	5 Conclusion
	References
Preprocessing Techniques in Text Categorization: A Survey
	1 Introduction
	2 Tokenization
		2.1 Challenges
	3 Stop Word Removal
	4 Stemming
		4.1 Errors in Stemming
		4.2 Principles of Stemming Algorithms
		4.3 Types of Stemming Algorithms
	5 Conclusion
	References
Educational Data Mining: A Review and Analysis of Student’s Academic Performance
	Abstract
	1 Introduction
	2 Literature Review
	3 Educational Data Mining Objectives
		3.1 Evaluating Group of Users in EDM
		3.2 Reviewing Educational Systems Effect in EDM
		3.3 Determining and Refining Mining Models
		3.4 Progressing Scientific Awareness About Learners and Learning
	4 Adopted Application of Data Mining in EDM
		4.1 Predicting Student Academic Performance
	5 Implementation of Mining Methods and Results
	6 Conclusion
	References
Multi Agents Based System Architecture for Market Research in E-Business
	Abstract
	1 Introduction
	2 Literature Review
	3 Market Research in E-Business
		3.1 MAS Analysis
		3.2 MAS Design
		3.3 MREB’s Architecture
		3.4 MREB: Decision Making Process
	4 Prototype Implementation, Validation, and Results
	5 Comparison of MREB with Existing MR Platforms
	6 Conclusion Remarks
	References
Image Processing and Analysis
An Investigation on Ability of Pre-trained Convolutional Neural Networks Trained on ImageNet to Classify Melanoma Images Without Re-training
	1 Introduction
	2 Melanoma Detection Using Image Analysis
	3 Residual Neural Network - ResNet
	4 Experiment Setup and Dataset
	5 Experiment Results and Discussion
	6 Conclusion and Future Prospects
	References
Effect of Laplacian Smoothing Stochastic Gradient Descent with Angular Margin Softmax Loss on Face Recognition
	Abstract
	1 Introduction
	2 Related Work
	3 Softmax Loss
		3.1 Multiplicative Angular Margin to Softmax Loss
	4 Laplacian Smoothing Stochastic Gradient Descent
		4.1 Convexification and Hamilton-Jacobi PDEs
		4.2 Laplacian Smoothing Stochastic Gradient Descent
	5 Experiments
		5.1 Experimental Settings
		5.2 Exploratory Experiments
		5.3 Experimental Results
	6 Conclusion
	References
Brain Tumor Localization and Segmentation Based on Pixel-Based Thresholding with Morphological Operation
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Image Acquisition
		3.2 Preprocessing Stage
		3.3 Image Segmentation
		3.4 Morphological Operation
	4 Results and Discussions
	5 Conclusions and Future Work
	References
Classification of Breast Lesions in Combination with Metamorphic Segmentation and Saliency Feature Block
	Abstract
	1 Introduction
	2 Proposed Methodology
		2.1 Image Acquisition
		2.2 Preprocessing
		2.3 Metamorphic Segmentation
		2.4 Feature Extraction
	3 Experimental Results and Discussion
	4 Conclusion
	References
Analysis of the MIDAS and OASIS Biomedical Databases for the Application of Multimodal Image Processing
	Abstract
	1 Introduction
	2 The MIDAS and OASIS Database
	3 Public Interest on MIDAS and OASIS Database
	4 Discussion
	5 Conclusion
	References
Image Quality Assessment Using a Combination of Hand-Crafted and Deep Features
	Abstract
	1 Introduction
	2 Related Work
		2.1 Full-Reference Image Quality Assessment
		2.2 No-Reference Image Quality Assessment
	3 Materials
	4 Methodology
		4.1 Dimensionality Reduction
		4.2 Quality Prediction
		4.3 Evaluation Measures
	5 Performance Evaluation
		5.1 Comparison with Existing Approaches
		5.2 Cross-dataset Testing
	6 Conclusion
	References
An Ensemble Classification-Based Methodology Applied to MRI Brain Images for Tumor Detection and Segmentation
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Model
		3.1 Feature Extraction (DWT)
		3.2 Features Reduction (PCA)
		3.3 Ensemble Classification
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Efficient PatchMatch Algorithm to Detect False Crowd in Digitally Forged Images
	1 Introduction
	2 Proposed Methodology
		2.1 Improved PatchMatch Algorithm
	3 Experimental Results
		3.1 False Crowd Database (FCD)
		3.2 Quantitative Results
		3.3 Qualitative Results
		3.4 Validation of Proposed Technique
	4 Conclusion
	References
Analysis of the Lifetime and Energy Consumption of WSN Routing Protocols: LEACH, EAMMH and SEP
	Abstract
	1 Introduction
	2 Routing Protocols in WSN
		2.1 LEACH
		2.2 EAMMH
		2.3 SEP
	3 Comparisons and Simulation Results
		3.1 Comparison of the LEACH and EAMMH
		3.2 Comparison of the LEACH and SEP
	4 Conclusion and Future Work
	References
Intelligent Environments
Crash-Resilient Synthesizer in Logic Optimization Paradigm for Sustainable Hardware Design of ASIC and Digital Systems
	Abstract
	1 Introduction
	2 Aspects of Dealing with the Faults for Self-sustainable Systems
		2.1 Fault Detection
		2.2 Fault Recovery/Mitigation
	3 Problem Statement
		3.1 Analysis on the Problem Statement
		3.2 Application Specific Integrated Circuit (ASIC)
		3.3 ASIC Modeling Language
		3.4 VHDL and HDL
	4 Logic Synthesis
		4.1 Phases of Logic Synthesis
		4.2 Proposed Design
		4.3 Algorithm
	5 Conclusion
	References
An Improved Ensemble Based Machine Learning Technique for Efficient Malware Classification
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Approach
		3.1 Data Collection
		3.2 Feature Extraction
		3.3 Behavior Analysis
		3.4 Detection Model
	4 Comparison and Discussion
	5 Conclusions and Future Work
	References
Green Computing: A Contribution Towards Better Future
	Abstract
	1 Introduction
	2 Relevant Literature
		2.1 Intel and AMD Contribution
		2.2 Green Computing Correspondence
		2.3 DVS
		2.4 Previous DVS Implementations
		2.5 DVS by Intel and AMD
	3 Benchmarking Methodology
		3.1 Power Management
		3.2 Cryptographic Performance
		3.3 Access Time of Cache and Memory
		3.4 Arithmetic and Floating Operations
		3.5 Memory Latency
	4 Discussion and Analysis
	5 Conclusion
	References
An Intelligent Approach to Detect Actuator Signal Errors Based on Remnant Filter
	Abstract
	1 Introduction
	2 Servo Actuator Fault Detection: Design Architecture
		2.1 UAV Actuator Failure Modes
		2.2 Fault Detection Structure
	3 Servo Actuator Fault Detection: Model Design
	4 Servo Actuator Fault Detection: Model Validation and Results
		4.1 Fault Diagnostic Test Setup
	5 Conclusions and Future Work
	Acknowledgement
	References
Driving Activity Recognition of Motorcyclists Using Smartphone Sensor
	1 Introduction
	2 Proposed Methodology
		2.1 Data Acquisition
		2.2 Segmentation
		2.3 Feature Extraction and Selection
		2.4 Classification
	3 Experimental Results
		3.1 Classifier Performance
		3.2 Performance Comparison
	4 Conclusion
	References
PARK MY RIDE: Your True Parking Companion
	1 Introduction
	2 Literature Review
	3 Proposed Solution
		3.1 Administrator Panel
		3.2 End-User Application
		3.3 Database
	4 Main Attributes and Working Flow
		4.1 Login and Registration
		4.2 Location Accessibility
		4.3 Parking Area Searching, Space Availability and Navigation
		4.4 Parking Spot Reservation
		4.5 Vehicles Exit and Billing
		4.6 Working Flow
	5 Comparative Analysis and Discussion
	6 Conclusion
	References
Cloud and Data Systems
Edge Caching Framework in Fog Based Radio Access Networks Through AI in Quantum Regime
	Abstract
	1 Introduction
		1.1 Fog Computing and Edge Caching
		1.2 Quantum Computing
	2 Problem Statement
	3 Related Work
	4 Proposed Work
		4.1 Proposed Model for Edge Caching in Quantum Regime
	5 Results and Discussions
	6 Conclusion
	References
Challenges and Limitation of Resource Allocation in Cloud Computing
	Abstract
	1 Introduction
	2 Framework of Resource Allocation
	3 What Is Resource Allocation Challenge?
	4 Literature Review
	5 Analysis
		5.1 Evaluation of Core Resource Allocation Approaches
	6 Taxonomy on Resources Allocation Methods
		6.1 Adaptation Policy in Resource Allocation
		6.2 Need of Scheduling in Resource Allocation
	7 Conclusion
	8 Future Work
	References
NFC Payment Security with Cloud Based Authentication System
	Abstract
	1 Introduction
	2 Related Literature
	3 EMV Risks and Weaknesses
		3.1 Principal
		3.2 Actors
	4 Details of Proposed Protocol
	5 Results
	6 Scyther Verification
		6.1 Existing System
		6.2 Scyther Claims for Existing System
	7 Proposed System
		7.1 Scyther Claims for Proposed System
	8 Conclusion
	References
Resource Utilization in Data Center by Applying ARIMA Approach
	Abstract
	1 Introduction
	2 Application Workload Prediction Model
		2.1 Stationary Testing
		2.2 Model Recognition
		2.3 Evaluate Model Parameters
	3 Simulation Results
	4 Related Works
	5 Conclusion
	References
Detecting Duplicates in Real-Time Data Warehouse Using Bloom Filter-Based Approach
	Abstract
	1 Introduction
	2 Proposed Consistency Management Approach
		2.1 Problem Definition
		2.2 Bloom Filters
		2.3 Counting Bloom Filter
		2.4 Proposed Approach
		2.5 Insertion of Record
	3 Results
	4 Conclusion
	References
Restricted Boltzmann Machines Based Fault Estimation in Multi Terminal HVDC Transmission System
	Abstract
	1 Introduction
	2 HVDC Transmission System
		2.1 VSC Based HVDC Transmission System
	3 Restricted Boltzmann Machine (RBM)
	4 Contrastive Divergence (CD) Algorithm
	5 Methodology
		5.1 Data Selection
		5.2 Characteristics of Selected Variables
		5.3 VSC Based HVDC System Status Codes
		5.4 Implementation of Fault Estimation Process
	6 Simulation Results
	7 Conclusion
	References
Multi-agent Oriented Framework for University Course Timetable Scheduling
	Abstract
	1 Introduction
	2 Problem Definition
		2.1 Basic Definitions of the Problem
		2.2 Hard Constraints
		2.3 Soft Constraints
	3 System Design Implementation and Architecture
	4 Methodology and System Components
		4.1 System Components
		4.2 Timetable Development Process
		4.3 Timetable Development Algorithm
	5 Conclusion
	References
Author Index




نظرات کاربران