ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب New Trends in Computational Vision and Bio-inspired Computing: Selected works presented at the ICCVBIC 2018, Coimbatore, India

دانلود کتاب روندهای جدید در چشم انداز محاسباتی و محاسبات مبتنی بر زیست: آثار منتخب ارائه شده در ICCVBIC 2018 ، کویمباتور ، هند

New Trends in Computational Vision and Bio-inspired Computing: Selected works presented at the ICCVBIC 2018, Coimbatore, India

مشخصات کتاب

New Trends in Computational Vision and Bio-inspired Computing: Selected works presented at the ICCVBIC 2018, Coimbatore, India

دسته بندی: کامپیوتر
ویرایش:  
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 3030418618, 9783030418618 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 1663 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 52 مگابایت 

قیمت کتاب (تومان) : 48,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 15


در صورت تبدیل فایل کتاب New Trends in Computational Vision and Bio-inspired Computing: Selected works presented at the ICCVBIC 2018, Coimbatore, India به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب روندهای جدید در چشم انداز محاسباتی و محاسبات مبتنی بر زیست: آثار منتخب ارائه شده در ICCVBIC 2018 ، کویمباتور ، هند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب روندهای جدید در چشم انداز محاسباتی و محاسبات مبتنی بر زیست: آثار منتخب ارائه شده در ICCVBIC 2018 ، کویمباتور ، هند

این جلد، مشارکت‌های اصلی منتخب و بررسی‌شده ارائه‌شده در کنفرانس بین‌المللی چشم‌انداز محاسباتی و رایانش الهام‌گرفته از زیستی (ICCVBIC) را گردآوری می‌کند که در کویمباتور، هند، در 29 تا 30 نوامبر 2018 برگزار شد. و نمونه‌های متنوع از پیشرفت‌های اخیر در زمینه‌های دید محاسباتی، فازی، پردازش تصویر و محاسبات الهام‌گرفته از زیستی. موضوعات تحت پوشش عبارتند از بینایی کامپیوتر. رمزنگاری و حریم خصوصی دیجیتال؛ یادگیری ماشین و شبکه های عصبی مصنوعی؛ الگوریتم های ژنتیک و هوش محاسباتی؛ اینترنت اشیا؛ و سیستم های بیومتریک، به نام چند. کاربردهای مورد بحث از امنیت، مراقبت های بهداشتی و کنترل بیماری همه گیر گرفته تا محاسبات شهری، کشاورزی و روباتیک را شامل می شود. در این کتاب، محققان، دانشجویان فارغ التحصیل و متخصصان راه حل های نوآورانه ای برای مشکلات دنیای واقعی در صنعت و جامعه به عنوان یک کل، همراه با الهامات برای تحقیقات بیشتر پیدا خواهند کرد.


توضیحاتی درمورد کتاب به خارجی

This volume gathers selected, peer-reviewed original contributions presented at the International Conference on Computational Vision and Bio-inspired Computing (ICCVBIC) conference which was held in Coimbatore, India, on November 29-30, 2018. The works included here offer a rich and diverse sampling of recent developments in the fields of Computational Vision, Fuzzy, Image Processing and Bio-inspired Computing. The topics covered include computer vision; cryptography and digital privacy; machine learning and artificial neural networks; genetic algorithms and computational intelligence; the Internet of Things; and biometric systems, to name but a few. The applications discussed range from security, healthcare and epidemic control to urban computing, agriculture and robotics. In this book, researchers, graduate students and professionals will find innovative solutions to real-world problems in industry and society as a whole, together with inspirations for further research.



فهرست مطالب

Foreword
Preface
Acknowledgments
Contents
3-Dimensional Multi-Linear Transformation Based Multimedia Cryptosystem
	1 Introduction
	2 Three Dimensional Multi Linear Transformation (3D-MLT)
		2.1 Inverse 3D-MLT
	3 Proposed Scheme
		3.1 Transformation (Mapping) Phase
		3.2 Substitution (Saturation) Phase
		3.3 Decryption Phase
	4 Experimental Results
	5 Conclusion
	References
A Computer Vision Based Approach for Object Recognition in Smart Buildings
	1 Introduction
		1.1 Overview
		1.2 Feature Detectors
	2 Related Work
		2.1 Gradient Feature Descriptors
		2.2 Binary String Descriptor
		2.3 Color Feature Descriptors
	3 Proposed Framework
	4 Dataset Details
	5 Experimental Results
	6 Conclusion
	References
A Cascade Color Image Retrieval Framework
	1 Introduction
	2 Dataset
	3 A Cascade Color Image Retrieval Framework
	4 Performance Evaluation
	5 Conclusion
	References
Enhanced Geographical Information System Architecture for Geospatial Data
	1 Introduction
	2 State of Art
	3 Problem Statement
	4 Proposed Architecture Model
	5 Conclusion
	6 Future Work
	References
IoT Based Power Management and Condition Monitoringin Microgrid
	1 Introduction
	2 Proposed Methodology
	3 Block Diagram of Proposed System
	4 Procedure for IoT Based Condition Monitoring System in Micro Grid
	5 Simulation of Proposed System
	6 Development of Fuzzy Controller
	7 Simulation Results
	8 Hardware Implementation
	9 Conclusion and Future Work
	Bibiliography
A Comparative Performance Study of Cloud Resource Scheduling Techniques
	1 Introduction
	2 Proposed Work
		2.1 System Overview
		2.2 Methodology
		2.3 Simulation Scenario
		2.4 Simulation Setup
	3 Result Analysis
		3.1 CPU Utilization
		3.2 Average Processing Time
		3.3 Average Waiting Time
		3.4 Average Processing Cost
	4 Conclusion
		4.1 Conclusion
		4.2 Future Work
	Bibliography
Image Context Based Similarity Retrieval System
	1 Introduction
	2 Related Works
		2.1 WordNet Distance (WD)
		2.2 Flickr Distance (FD)
		2.3 Context-Based Image Semantic Similarity (CISS)
		2.4 Fuzzy String Matching
		2.5 Proposed Distance Method
	3 Proposed Context Retrieval Method
	4 Results and Discussion
	5 Conclusion
	References
Emotions Recognition from Spoken Marathi Speech Using LPC and PCA Technique
	1 Introduction
	2 Design and Development of Artificial Emotional Speech Database for Marathi Language
	3 Feature Extraction
	4 Linear Predictive Coding (LPC)
	5 Speech Recognition Based on PCA
	6 Experimental Analysis and Results
	7 Conclusion
	References
Implementation of Point of Care System Using Bio-medical Signal Steganography
	1 Introduction
	2 Related Work
	3 Materials and Methods
		3.1 Fast Walsh Hadamard Transform (FWHT)
		3.2 AES Encryption and Decryption
		3.3 Haar DWT
		3.4 Hardware Involved
	4 Proposed Methodology
		4.1 Embedding Process
			4.1.1 AES Encryption
			4.1.2 Applying FWHT on the Bio-medical Signal
			4.1.3 Embedding Using Haar DWT
		4.2 Extraction Process
			4.2.1 Extraction Using Haar DWT
			4.2.2 Applying IFWHT
			4.2.3 AES Decryption
	5 Performance Analysis
		5.1 ECG Signal
		5.2 EEG Signal
		5.3 PPG Signal
	6 Conclusion
	References
Privacy Assurance with Content Based Access Protocol to Secure Cloud Storage
	1 Introduction
	2 Literature Survey
	3 Existing System
	4 System Architecture
		4.1 Owner Side Functionality
		4.2 User Side Functionality
		4.3 Download Module
			4.3.1 Decryption
		4.4 Storage Allocation Module
	5 Experimental Results
	6 Conclusion
	References
Leaf Recognition Using Artificial Neural Network
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Data Collection
		3.2 Pre-processing of Captured Image
		3.3 Feature Extraction of Processed Image
		3.4 Training Neural Pattern Recognition
		3.5 Testing Neural Pattern Recognition
		3.6 Displaying and Comparing Results
	4 Results and Discussion
	5 Conclusions
	References
Data Security in Cloud Using RSA and GNFs Algorithms an Integrated Approach
	1 Introduction
	2 Proposed Design
		2.1 RSA Algorithm
		2.2 NFS Algorithm
		2.3 GNFS Algorithm
	3 Results and Discussion
	4 Conclusions
	References
Machine Learning Supported Statistical Analysis of IoT Enabled Physical Location Monitoring Data
	1 Introduction
	2 Related Work
	3 Methodology
	4 Lessons Learned in Data Collections
	5 IoT and Cloud Interfacing
	6 Conclusion
	References
A Genetic Algorithm Based System with Different Crossover Operators for Solving the Course Allocation Problem of Universities
	1 Introduction
	2 Genetic Algorithm
	3 The Course Allocation Problem
	4 Related Works
		4.1 Part I: GA Based Systems for Classical and Real World Problems
		4.2 Part II: Course Allocation Systems with Non-GA and GA Techniques
	5 Design of Experiments
		5.1 Deriving Information from Course Allocation Problem
		5.2 Formulation of Optimization Problem
		5.3 Designing GA Based System
	6 Algorithm, Results and Discussion
		6.1 The Proposed Algorithm
		6.2 Results and Discussion
	7 Conclusions
	References
Detecting Anomalies in Credit Card Transaction Using Efficient Techniques
	1 Introduction
	2 Related Work
	3 Proposed System
		3.1 Data Description
		3.2 K-means Clustering
		3.3 SMOTE (Synthetic Minority Over-Sampling Technique)
		3.4 Support Vector Machine
	4 Results and Discussion
		4.1 K-means Clustering
		4.2 SMOTE (Synthetic Minority Over-Sampling Technique)
		4.3 Support Vector Machine
	5 Conclusion
	References
Mohammed Ehsan Ur Rahman and Md. Sharfuddin Waseem
	1 Introduction
	2 State of Art
	3 Problem Statement
	4 Proposed Model
	5 Conclusion
	References
A Novel Framework for Detection of Morphed Images Using Deep Learning Techniques
	1 Introduction
	2 Related Work and Study
		2.1 The Magic Passport: A Detailed Description of Facial Morphing Attack
	3 Proposed System Framework and Methodology
		3.1 Use of Algorithms Which Work on Low-Level Features of a Face Image
		3.2 Algorithms Involving Deep Learning-Based Methods
		3.3 Features Analysis
		3.4 Mathematical Models and Intuitions
		3.5 Deep Learning as a Modern Day Efficient Tool in the Context of Visual Recognition
	4 Datasets and Facial Morphing Generation
		4.1 Facial Morphing Techniques and Pipeline
		4.2 Datasets Analysed and Evaluations Metrics Best Suited the Datasets Being Used in Your Research Work Include
	5 Future Scope
	References
A Novel Non-invasive Framework for Predicting Bilirubin Levels
	1 Introduction
	2 Related Work
	3 Materials and Method
		3.1 Camera Module
		3.2 Image Processing
		3.3 Algorithm
	4 Results and Discussion
	5 Conclusion
	References
A Comprehensive Study on the Load Assessment Techniques in Cloud Data Center
	1 Introduction
	2 Scheduling
		2.1 Features of a Good Scheduling Algorithm
	3 Load Balancing
		3.1 Process Origination
		3.2 Current System State
		3.3 Spatial Distribution of Nodes [4]
	4 Literature Survey
	5 Comparison of Various Algorithms
	6 Simulation Tools
	7 Conclusion
	References
Multimodal Biometric System Using Ear and Palm Vein Recognition Based on GwPeSOA: Multi-SVNN for Security Applications
	1 Introduction
	2 Motivation
		2.1 Related Works
	3 Proposed Method
		3.1 Pre-processing
		3.2 Feature Extraction Using the Proposed BiComp Mask on the Input Ear Image
		3.3 Feature Extraction Using Local Binary Pattern (LBP) on the Input Palm Vein Image
		3.4 Multi-SVNN Classifier for Score Level Computation
			3.4.1 Architecture of SVNN Classifier
			3.4.2 Training the SVNN Using Genetic Algorithm (GA)
		3.5 Optimal Score Level Fusion Using the Scores Obtained Using the Multi-SVNN Classifier
			3.5.1 Testing Phase to Identify the Person
		3.6 Optimal Fusion Scores Using the Proposed GwPeSOA
			3.6.1 Solution Encoding
			3.6.2 Objective Function
			3.6.3 Algorithmic Steps of the Proposed GwPeSOA
	4 Results and Discussion
		4.1 Experimental Setup
		4.2 Dataset Description
		4.3 Competing Methods
		4.4 Performance Metrics
		4.5 Comparative Analysis and Discussion
	5 Conclusion
	References
Madhu Bhan, P. N. Anil, and D. T. Chaitra
	1 Introduction
	2 Functionality
		2.1 Cultivation Methods
		2.2 Crop Selection
		2.3 Soil Analysis
		2.4 Fertilizers
		2.5 Selling Crops
		2.6 Pre-production Management
		2.7 Buying Agricultural Products
		2.8 Bidding Activity/Market Price/Weather Forecast
	3 Methodology
		3.1 Tools and Technologies
		3.2 Databases
		3.3 Architecture
	4 Conclusion
	References
Ultra Wide Band Monopole Antenna Design by Using Split Ring Resonator
	1 Introduction
	2 Proposed Antenna Configuration
	3 Result and Discussion
		3.1 Return Loss Characteristics
		3.2 Gain of Antenna
		3.3 Radiation Efficiency
		3.4 E-Plane and H-Plane Radiation Patterns
	4 Conclusion
	References
Green Supply Chain Management of Chemical Industrial Development for Warehouse and its Impact on the Environment Using Artificial Bee Colony Algorithm: A Review Articles
	1 Introduction
	2 Literature Review and Survey of Green Supply Chain Management
	3 Related Works
		3.1 Green Chemical Supply Chain
		3.2 Green Inventory Policy
	4 Model Design
		4.1 Green Chemical Supply Chain
		4.2 Green Chemical Model
		4.3 Green Inventory Policy
	5 Industrial Development and Its Impact on Environment
	6 Simulation
		6.1 Simulation Result
	7 Conclusion
	References
A Novel Dyno-Quick Reduct Algorithm for Heart Disease Prediction Using Supervised Learning Algorithm
	1 Introduction
	2 Literature Review
	3 Proposed Work
	4 Feature Selection Method
		4.1 Filter Method
		4.2 Embedded Method
		4.3 Wrapper Method
	5 Rough Set Theory
	6 Review on Dynamic Quick Reduct
	7 Novel Dyno-Quick Reduct Algorithm
	8 Results and Discussion
	9 Conclusion
	References
Impact of Meltdown and Spectre Threats in Parallel Processing
	1 Introduction
	2 State of Art
	3 Problem Statement
	4 Security Analysis Model
	5 Conclusion
	References
Minimum Dominating Set Using Sticker-Based Model
	1 Introduction
	2 Sticker-Based Model
	3 Minimum Dominating Set Computation
		3.1 Basic Definitions
		3.2 Design of Solution Space
		3.3 Algorithm
	4 Conclusion
	References
Assistive Technology Evolving as Intelligent System
	1 Introduction
	2 Artificial Intelligence
	3 Fuzzy Logic
	4 Genetic Algorithm
	5 Expert Systems
	6 Artificial Neural Network (ANN)
	7 Machine Learning
	8 Important Developments in Intelligent Assistive Systems
	9 Discussion and Conclusion
	References
A Bio Potential Sensor Circuit of AFE Design with CT -Modulator
	1 Introduction
	2 A Novel Structural Design 4-Channel AFE for Bio Signal ΔM
	3 Clamor Involvement in AFE Circuit
	4 A Tuneable Bandwidth Low Noise Amplifier in AFE
	5 Modulator Circuit
	6 Results
	7 Conclusion
	References
Image Encryption Based on Transformation and ChaoticSubstitution
	1 Introduction
	2 Proposed Scheme
		2.1 Encryption Algorithm
		2.2 Decryption Algorithm
	3 Experimental Results
	4 Conclusion
	References
An Efficient Geographical Opportunistic Routing Algorithm Using Diffusion and Sparse Approximation Models for Cognitive Radio Ad Hoc Networks
	1 Introduction
	2 SMOR Routing and Modified SMOR Routing Models
		2.1 SMOR Routing Model
		2.2 Modified SMOR Routing
	3 Opportunistic Routing Using Modified SMOR Models
		3.1 Modified SMOR-1 for Regular CRAHNs
			3.1.1 Diffusion Approximation Based Markov Chain Modeling
		3.2 Modified SMOR-2 for Large-scale CRAHNs
			3.2.1 Sparse Approximation Based Stochastic Geometry Analysis
	4 Performance Evaluation
	5 Conclusion
	References
Traffic Violation Tracker and Controller
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 Detecting and Monitoring the Road Activities
		3.2 Sending and Processing of the Information Gathered
		3.3 Controller Interface
	4 Conclusion
	5 Future Work
	References
PTCWA: Performance Testing of Cloud Based Web Applications
	1 Introduction
		1.1 Pitfalls in Performance Testing of Web Applications
		1.2 Cloud Testing and Its Benefits
		1.3 Challenges in Cloud Testing
	2 Related Work
	3 A Performance Testing Tool for Cloud Infrastructure
		3.1 Private Cloud Setup
		3.2 Fetching Performance Parameters
		3.3 Analysis of the Fetched Values
		3.4 Report Generation
	4 System Implementation
		4.1 Recording User Scenarios
		4.2 Parameterization of Test Scripts
		4.3 Grouping User Scenarios
		4.4 Load Generation
		4.5 Performance Analysis Process
		4.6 Report Generation
			4.6.1 Local Private Cloud Server
			4.6.2 Public Cloud Server
		4.7 Performance Analysis from a Mobile Platform
	5 Results and Discussion
		5.1 Performance Testing in Public Cloud
		5.2 Performance Testing in Private Cloud
	6 Conclusion and Future Enhancements
	References
Analysis of Regularized Echo State Networks on the Impact of Air Pollutants on Human Health
	1 Introduction
	2 Echo State Networks (ESN)
	3 Case Study
	4 Conclusion
	References
Detection of Cancer by Biosensor Through Optical Lithography
	1 Introduction
		1.1 Figure 1
		1.2 Formulae[i]:
		1.3 Table 1
		1.4 Governing Equations [References—h, g]
	2 Simulation Results
	3 Conclusion
	References
Paradigms in Computer Vision: Biology Based Carbon Domain Postulates Nano Electronic Devices for Generation Next
	1 Introduction
	2 Methodology
		2.1 Three Dimensional CARd Analysis
		2.2 Bond of All Analysis
	3 Results
		3.1 CARd Analysis
	4 Discussion
		4.1 Semiconductor and Carbon Value
		4.2 Nanotechnology for World of Signaling
	5 Conclusion
	References
A Secure Authenticated Bio-cryptosystem Using Face Attribute Based on Fuzzy Extractor
	1 Introduction
		1.1 Biometrics
		1.2 Cryptography
		1.3 Biometric Cryptosystem
	2 Related Works
	3 Existing System
	4 Proposed System
	5 Conclusion
	References
Implementation of Scan Logic and Pattern Generation for RTL Design
	1 Introduction
	2 Existing Work
	3 Proposed Method
	4 DFT Flow for Scan Insertion and Compression
	5 Results and Discussion
		5.1 Design 1 Has 32 S1 Violations and 32 D5 Violations
		5.2 Design2 Has 4 S1 Violations and 4 D5 Violations
		5.3 Scan Compression for Design 2
		5.4 Result for Obtaining Coverage Report for Design 1 and 2
		5.5 Results for Scan Insertion for Design 3
	6 Conclusion
	References
Optimization Load Balancing over Imbalance Datacenter Topology
	1 Introduction
	2 Related Work
	3 System and Algorithm Design
		3.1 The Cost of the Link Module
		3.2 Shortest Path Module
		3.3 The Sub Topology Discovery Module
	4 Open Flow Network Implementation
		4.1 System Design
		4.2 OpenFlow Flow Dispatch
		4.3 Emulation Framework in Load Balancing
		4.4 Design of Datacenter
		4.5 Comparison of Algorithms
	5 Result of Analysis
	6 Conclusion and Future work
	References
Text Attentional Character Detection Using Morphological Operations: A Survey
	1 Introduction
	2 Literature Survey
		2.1 Proposed System
	3 Modules
		3.1 Image Pre-processing
		3.2 Text Area Detection
		3.3 Non-text Area Removal
		3.4 Text Recognition
	4 Conclusions
	References
IoT Based Environment Monitoring System
	1 Introduction
	2 Proposed System
		2.1 System Overview
		2.2 Flow Chart
		2.3 System Architecture
		2.4 System Requirements
	3 Implementation
	4 Result and Conclusion
		4.1 Advantages
	References
Design and Development of Algorithms for Detection of Glaucoma Using Water Shed Algorithm
	1 Introduction
		1.1 Fundus Image Database
		1.2 Convert Image to Grayscale and Resize
		1.3 Sending the Image as a Pixel Stream
		1.4 Preprocessing the Image
		1.5 Grayscale Erosion
		1.6 Grayscale Dilation
	2 Watershed Algorithm
		2.1 Details of the Algorithm
			2.1.1 Step 1
			2.1.2 Step 2
			2.1.3 Step 3
	3 Simulations Results for Watershed Algorithm
		3.1 Normal Eyes
			3.1.1 Case 1: For Normal eye
			3.1.2 Case 2: For Moderate Glaucoma
			3.1.3 Case 3: Glaucoma Eye
			3.1.4 Input and Output Images
	4 Schematic Design
		4.1 ModelSim Signals
	5 Conclusions
	References
A Novel Development of Glaucoma Detection Technique Using the Water Shed Algorithm
	1 Introductory Part
		1.1 Fundus Image Database
		1.2 Convert Image to Grayscale and Resize
		1.3 Sending the Image as a Pixel Stream
		1.4 Preprocessing the Image
		1.5 Grayscale Erosion
		1.6 Grayscale Dilation
	2 Watershed Algorithm
		2.1 The Algo Detail/s
			2.1.1 Step 1
			2.1.2 Step 2
			2.1.3 Step 3
	3 Simulations Results for Watershed Algorithm
		3.1 Normal Eyes
			3.1.1 Case 1: For Normal Eye
			3.1.2 Case 2: For Moderate Glaucoma
			3.1.3 Case 3: Glaucoma Eye
			3.1.4 Input and Output Images
	4 Schematic Design
		4.1 ModelSim Signals
	5 Conclusions
	References
Solutions of Viral Dynamics in Hepatitis B Virus InfectionUsing HPM
	1 Introduction
	2 Mathematical Modelling
		2.1 Basic Concepts of the Homotopy Perturbation Method
		2.2 Analytical Solution of HBV
	3 Results and Discussion
	4 Conclusions
	References
A Mathematical Modeling of Dengue Fever for the Dynamics System Using HAM
	1 Introduction
	2 Mathematical Modeling
		2.1 Basic Concept of HAM
		2.2 Analytic Solution of the Dengue Fever Model
	3 Result and Discussion
	4 Conclusion
	References
Vision-Based Robot for Boiler Tube Inspection
	1 Introduction
	2 Past Work
	3 Design and Development
	4 Preliminary Inspection Results and Discussion
	5 Conclusions
	References
Qualitative Study on Data Mining Algorithms for Classification of Mammogram Images
	1 Introduction
	2 Method
		2.1 Data Mining Algorithms
		2.2 Classification Algorithm
			2.2.1 K-Nearest Neighbor (KNN)
			2.2.2 The Naive Bayesian (NB)
			2.2.3 Linear Discriminant Analysis (LDA)
			2.2.4 Boosting
			2.2.5 Support Vector Machine (SVM)
			2.2.6 Bagging
	3 Efficiency of SVM with Bagging
	4 Findings
	5 Conclusion
	References
Designing a Framework for Data Migration of Odoo ERP PostgreSQL Database into NoSQL Database
	1 Introduction
	2 Related Work
	3 NoSQL Databases
	4 Proposed Framework
	5 Results
		5.1 Experimental Setup
		5.2 Result and Description
	6 Conclusion
	References
Juxtaposition on Classifiers in Modeling Hepatitis Diagnosis Data
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Dataset Description
		3.2 Process Flow
		3.3 Classification Algorithms
		3.4 Performance Measures
	4 Results and Discussion
	5 Conclusion
	References
Voltage Stabilization by Using Buck Converters in the Integration of Renewable Energy into the Grid
	1 Introduction
	2 System Configuration
		2.1 Solar Panel
		2.2 Buck Inverter (Fig. 3)
		2.3 Single Phase Inverter
		2.4 PI Controller
	3 System Design and Results
	4 Advantage
	5 Application
	6 Conclusion
	References
OCR System For Recognition of Used Printed Components For Recycling
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Proposed Algorithm
	4 Result and Conclusion
	5 Limitations of the System
	References
Modern WordNet: An Affective Extension of WordNet
	1 Introduction
	2 Related Work
	3 Gaps and Scope
	4 Ontology Development
	5 Proposed Modern Wordnet
		5.1 Working as Thesaurus
		5.2 Working as Dictionary
		5.3 Working as Sentence Classifier
	6 Conclusions and Future Scope
	References
Analysis of Computational Intelligence Techniques for PathPlanning
	1 Introduction
	2 Related Work
	3 Research Analysis and Discussion
	4 Conclusion and Future Scope
	References
Techniques for Analysis of the Effectiveness of Yoga Through EEG Signals: A Review
	1 Introduction
	2 Related Work
	3 Comparison
	4 Conclusion
	References
Multiobjective Integrated Stochastic and Deterministic Search Method for Economic Emission Dispatch Problem
	1 Introduction
	2 Multiobjective Constrained Economic Emission Dispatch Problem
		2.1 Economic Dispatch Objective
		2.2 Emission Objective
		2.3 Constraints Handling
		2.4 Multiobjective Constrained Optimization Problem
	3 Integrated PSO with Simplex Method
		3.1 Conventional Stochastic Particle Swarm Optimization (PSO)
		3.2 Conventional Deterministic Simplex Method (DSM)
		3.3 Proposed Integrated PSO with DSM
	4 Test Systems: Results and Discussion
		4.1 Validation of Proposed Algorithm Using Benchmark Functions
		4.2 Validation on Practical MCEED Problem
	5 Conclusion
	References
Enhanced Webpage Prediction Using Rank Based Feedback Process
	1 Introduction
		1.1 Effective Use of Caching Techniques
	2 Objectives
	3 Related Work
	4 Enhanced Monte Carlo Prediction
	5 Implementation
		5.1 Modified Graph Construction
		5.2 Ranking the Pages Through a Feedback Process
	6 Results and Discussion
		6.1 Accuracy
	7 Conclusion
	References
A Study on Distance Based Representation of Molecules for Statistical Learning
	1 Introduction
	2 Methodology
		2.1 Regressors
		2.2 Data Set
	3 Results
		3.1 Regression Results for Sin Clusters
		3.2 Regression Results for Water Molecules
		3.3 Regression Results for Methane and Ethane Molecules
	4 Conclusion
	References
Comparative Analysis of Evolutionary Approaches and Computational Methods for Optimization in Data Clustering
	1 Introduction
	2 Related Research
		2.1 Research in Data Clustering Using Genetic Algorithm
	3 Evaluation of Related Research
	4 Conclusion
	References
Bringing Digital Transformation from a Traditional RDBMS Centric Solution to a Big Data Platform with Azure Data Lake Store
	1 Introduction
	2 Need of Data Lake
	3 An Overview of Azure Data Lake
		3.1 Data Lake Structure
			3.1.1 Raw Zone
			3.1.2 Stage Zone
			3.1.3 Curated Zone
		3.2 Data Lake Operations
		3.3 Data Lake Discovery
	4 Conclusion
	References
Smart Assist for Alzheimer's Patients and Elderly People
	1 Introduction
	2 Prototype Design
	3 Result and Analysis
		3.1 Triggered Event
		3.2 Received Message
		3.3 The Obtained Location
	4 Conclusions
	References
An Unconstrained Rotation Invariant Approach for Document Skew Estimation and Correction
	1 Introduction
	2 Methodology
		2.1 Image Acquisition
		2.2 Initial Deskew
		2.3 Detection of Vertical Text
		2.4 Deskew Based on Tesseract Feedback
	3 Experimental Results and Discussion
	4 Conclusion and Scope for Future Work
	References
Smart Assistive Shoes for Blind
	1 Introduction
	2 Prototype Design
		2.1 Hardware Description
		2.2 System Design
	3 Result and Discussion
	4 Conclusion
	References
Comparative Study on Various Techniques Involved in Designing a Computer Aided Diagnosis (CAD) System for Mammogram Classification
	1 Introduction
	2 Materials and Methods
		2.1 Pre-Processing Techniques
			2.1.1 Mean Filter
			2.1.2 Median Filter
			2.1.3 Adaptive Median Filter
			2.1.4 Wiener Filter
			2.1.5 Gaussian Filter
			2.1.6 Partial Differential Equations
			2.1.7 Adaptive Fuzzy Logic Based bi-Histogram Equalization (AFBHE)
			2.1.8 Unsharp Masking (UM) Based Enhancement Techniques
			2.1.9 Contrast Stretching
	3 Segmentation
		3.1 FCM Segmentation
		3.2 Segmentation with Prior Knowledge Learning
		3.3 Chan-Vese Level Set Segmentation
		3.4 Active Contour-Based Method
		3.5 Segmentation Based on Pixel-Wise Clustering
		3.6 Segmentation Based on Morphological Operators
	4 Feature Learning
		4.1 Feature Extraction Using Phylogenetic Tree
		4.2 Sequential Forward Feature Selection Approach (SFFS)
		4.3 Dual Tree M-Band Wavelet Transform (DTMBWT)
	5 Classification
		5.1 Support Vector Machine (SVM)
		5.2 Random Forests
		5.3 K-Nearest Neighbour
	6 Results
	References
Traffic Flow Prediction Using Regression and Deep LearningApproach
	1 Introduction
	2 Related Work
	3 Methodology
	4 Simulation Results
		4.1 Data Description
			4.1.1 Experiment Result
		4.2 Performance Using Different Algorithms
	5 Conclusion
	References
A Comparative Study on Assessment of Carotid Artery Using Various Techniques
	1 Introduction
	2 Image Acquisition
		2.1 Carotid Endarterectomy
		2.2 Doppler Ultrasound
		2.3 B Mode Ultrasound
		2.4 Computed Tomography
		2.5 Reflection-Mode all-Optical Laser-Ultrasound (LUS)
		2.6 3D Ultrasound Imaging
		2.7 MRI
	3 Pre-Processing
		3.1 Pre-Processing Techniques
			3.1.1 Mean Filter
			3.1.2 Median Filter
			3.1.3 Adaptive Median Filter
			3.1.4 Wiener Filter
			3.1.5 Gaussian Filter
			3.1.6 Salt and Pepper Noise
			3.1.7 Speckle Noise
	4 Segmentation
		4.1 Active Contour
		4.2 Deep Learning
		4.3 Snake Algorithm
		4.4 Level Set Segmentation Algorithm
	5 Performance Analysis
		5.1 Pulse Wave Velocity Assessment (PWV)
		5.2 Subject-Specific Mathematical Modeling
		5.3 Nonlinear State-Space Approach: (State of the Art Approach)
		5.4 Intima-Media Thickness
		5.5 Logistic and Linear Regression Models
	6 Results
	References
Evaluation of Fingerprint Minutiae on Ridge Structure Using Gabor and Closed Hull Filters
	1 Introduction
	2 Pre-Processing
	3 Fingerprint Image Enhancement
	4 Minutiae Extraction
	5 Post-Processing
		5.1 Construction of Polygon Using Border Line Minutiae Points
		5.2 Algorithm to Form the Closed Hull
		5.3 Closed Hull-Based Filtering
		5.4 Graham Scan Algorithm
		5.5 Evaluation of Goodness of Index
	6 Results and Discussion
	7 Conclusions
	References
A Perspective View on Sybil Attack Defense Mechanisms in Online Social Networks
	1 Introduction
	2 Graph Based Methods
	3 Machine-Learning Based Methods
	4 Conclusion
	References
Minor Finger Knuckle Print Image Enhancement Using CLAHE Technique
	1 Introduction
	2 Overview of Histogram Equalization Methods
		2.1 Histogram Equalization
		2.2 Dynamic Histogram Equalization
		2.3 Contrast Limited Adaptive Histogram Equalization
		2.4 Adaptive Histogram Equalization
		2.5 Brightness Preserving Dynamic Fuzzy Histogram Equalization
	3 Performance Metrics
		3.1 Mean Square Error
		3.2 Peak Signal to Noise Ratio (PSNR)
		3.3 The Root Mean Square Error (RMSE)
	4 Result and Discussion
	5 Conclusion
	References
Learning Path Construction Based on Ant Colony Optimization and Genetic Algorithm
	1 Introduction
	2 Literature Survey
	3 Methodology for Proposed Work
		3.1 Ant Colony Optimization (ACO) Algorithms
		3.2 Genetic Algorithm
	4 Proposed Architecture
	5 Experimental Result
	6 Conclusions and Future Work
	References
Pneumonia Detection and Classification Using Chest X-Ray Images with Convolutional Neural Network
	1 Introduction
	2 Related Works
	3 Software Tools Used
	4 System Architecture
		4.1 Residual Neural Network
	5 Methodology
		5.1 Dataset Description
		5.2 Image Preprocessing
		5.3 Classification Using CNN
			5.3.1 K-Fold Cross Validation
			5.3.2 Training
			5.3.3 Testing
	6 Results
	7 Future Scope
	8 Conclusion
	Compliance with Ethical Standards
	References
An Optimized Approach of Outlier Detection Algorithm for Outlier Attributes on Data Streams
	1 Introduction
	2 Data Streams Challenges and Characteristics
	3 Existing Distance-Based Outlier Detection Method
		3.1 Comparision of Outlier Detection Algorithms [1]
			3.1.1 Explanation
			3.1.2 Working of the Proposed Algorithm
	4 Results and Discussions
		4.1 Comparison of Existing Outlier Detection Methods
		4.2 Segregation of Outlier and Inliers for User Defined Bound Value: (n == 4)
		4.3 Segregation of Outlier and Inliers for User Defined Bound Values: (Bound Values 6 & 7)
			4.3.1 Comparison of Outliers Found in MCOD and Proposed Work (Figs. 10 and 11)
			4.3.2 Time Analysis for MCOD and Proposed Work (Fig. 12)
	5 Conclusion
	References
Indo-Pak Sign Language Translator Using Kinect
	1 Introduction
		1.1 A Brief: Indo-Pakistani Sign Language
	2 Existing Systems [1]
		2.1 Disadvantage
		2.2 Disadvantage
	3 Proposed System
		3.1 Advantages
	4 Modules
		4.1 Tracing and detection module
		4.2 Normalization of user's height
		4.3 Training phase
		4.4 Text to Speech Conversion Module
	5 System Architecture
	6 Mathematical Modelling
		6.1 Normalisation of User's Height
	7 Technologies
		7.1 Kinect Xbox 360
	8 Conclusion and Future Work
	References
Semantic Interoperability for a Defining Query
	1 Introduction
	2 Query Ontology Matching Schema (QOMS)
	3 Assesment Measures
	4 Conclusion
	References
Gestational Diabetics Prediction Using Logisitic Regression in R
	1 Introduction
		1.1 Machine Learning in GDM research
	2 Literature Survey
	3 GDM Prediction Using Logistic Regression
	4 Prediction Algorithm Using Logistic Regression in R
	5 Results and Discussions
	6 Conclusion
	References
IOT Based Gas Pressure Detection for LPG with Real Time No SQL Database
	1 Introduction
		1.1 Mongo DB [11]
		1.2 MQTT [1]
		1.3 Arduino Uno-Wi-Fi [2]
	2 Related Works
	3 System Methodology
	4 User Interface
	5 Conclusion and Results
	References
Hybrid Steerable Pyramid with DWT for Multiple Medical Image Watermarking and Extraction Using ICA
	1 Introduction
	2 Steerable Pyramid Transform
	3 Modified Arnold Transform
	4 Watermark Embedding
	5 Independent Component Analysis
		5.1 Pearson ICA
	6 Results and Discussion
	7 Conclusion
	References
Dimensional & Spatial Analysis of Ultrasound Imaging Through Image Processing: A Review
	1 Introduction
	2 Related Work
	3 Comparison
	4 Conclusion
	References
A Review on Methods to Handle Uncertainty
	1 Introduction
		1.1 Uncertainty Categorization
		1.2 Sources of Uncertainty
		1.3 Uncertainty Analysis
	2 Probability Analysis Technique
	3 Bayesian Analysis
		3.1 Bayesian Network
		3.2 Multi Entity Bayesian Network (MEBN)
	4 Fuzzy Analysis
	5 Soft Computing Techniques
	6 Conclusion
	References
Identity-Based Hashing and Light Weight Signature Scheme for IoT
	1 Introduction
		1.1 IoT System Architecture
	2 Preliminaries and Related Works
	3 Proposed Intrusion Detection and Authentication Scheme
		3.1 Hash Algorithm
	4 Security of the Proposed Hashing Scheme
	5 Conclusion
	References
Adaptive Particle Swarm Optimization Based Wire-length Minimization for Placement in FPGA
	1 Introduction
	2 FPGA Placement Problem
	3 PSO Algorithm-Overview
	4 Related Works
	5 Proposed PSO Algorithm for FPGA Placement Problem
	6 Results and Discussion
		6.1 Experimental Setup
		6.2 Convergence Behavior
		6.3 Performance Evaluation for Placement in FPGA
	7 Conclusion
	References
Clustering of Various Diseases by Collagen Gene Using the Positional Factor
	1 Introduction
	2 Medical Importance
	3 Proposed Methodology
	4 Algorithm
	5 Results and Discussions
	6 Conclusion
	References
Prediction of Water Demand for Domestic Purpose Using Multiple Linear Regression
	1 Introduction
	2 Methodology
		2.1 Data Acquisition
		2.2 Prediction of the Water Demand
	3 Results and Discussion
	4 Conclusion and Future Scope
	References
Implementation of Regression Analysis Using Regression Algorithms for Decision Making in Business Domains
	1 Introduction
	2 Main Application of Regression Analysis in Business Are
		2.1 Predictive Analytics
		2.2 Operation Efficiency
		2.3 Supporting Decisions
		2.4 New Insights
		2.5 Correcting Errors
	3 The Application of Top 6 Regression Algorithms Used in Mining Industrial Data
		3.1 Simple Linear Regression
		3.2 Lasso Regression (Least Absolute Selection Shrinkage Operator)
		3.3 Logistic Regression
		3.4 Support Vector Machines
		3.5 Multivariate Regression Algorithm
		3.6 Multiple Regression Algorithms
	4 Conclusion
	References
Blockchain Based System for Human Organ Transplantation Management
	1 Introduction
	2 Participants in a e-Transplantation Blockchain Network
	3 Benefits of Blockchain Based Organ Transplantation System
		3.1 Secure and Reliable Data Sharing Across Various Entities in a Blockchain
		3.2 Distributed Ledger and Database [8]
		3.3 Peer-to-Peer Transmission Between Various Stakeholders in the Network [8]
		3.4 Transparent Communication for All Entities [8]
		3.5 Irreversibility and Immutability of Records [8]
		3.6 Traceability of All Transactions
		3.7 Transactions and Exchange of Digital Patient Data Direct from EHR
	4 Envisaged Results of the Proposed System
	5 Conclusion and Future Work
	6 Compliance with Ethical Standards
	References
Identification of Melanoma Using Convolutional Neural Networks for Non Dermoscopic Images
	1 Introduction
		1.1 Related Works
		1.2 Dataset
	2 Proposed Methodology
	3 Results and Discussion
	4 Conclusion and Future works
	References
Exploitation of Data Mining to Analyse Realistic Facts from Road Traffic Accident Data
	1 Introduction
	2 Data Mining
	3 Literature Review
	4 Data Mining Methods for Road Traffic Analysis
		4.1 Hierarchical Clustering (HC)
		4.2 Random Forest (RF)
		4.3 Classification and Regression Tree (CART)
	5 Methodology for Accident Analysis
	6 Conclusion
	References
A Deep Learning Approach for Segmenting Time-Lapse Phase Contrast Images of NIH 3T3 Fibroblast Cells
	1 Introduction
	2 Materials and Methods
		2.1 Reference Data
		2.2 Methodology
	3 Results
	4 Conclusion
	References
Flow Distribution-Aware Load Balancing for the Data Centre over Cloud Services with Virtualization
	1 Introduction
	2 Virtualization
	3 VMMB: Virtual Machine Memory Balancing for Unmodified Operating Systems
	4 Energy-Efficient Thermal-Aware Autonomic Management of Virtualized HPC Cloud Infrastructure
	5 Virtualization Migrant over the Cloud with Load Balancing with Threshold (VMOVLBWT) System
		5.1 Requirements
	6 Organizational Flow
	7 Discussion
	8 Experimental Phase
	9 Conclusion
	References
Disease Severity Diagnosis for Rice Using Fuzzy Verdict Method
	1 Introduction
	2 Development of Fuzzy Expert System
		2.1 Rice Dataset
		2.2 Elements of Fuzzy Expert System
			2.2.1 Fuzzification Phase
			2.2.2 Rice Fuzzy Verdict Method
	3 MATLAB Results
	4 Assessment of System Performance
	5 Conclusions and Future Research
	References
HELPI VIZ: A Semantic image Annotation and Visualization Platform for Visually Impaired
	1 Introduction
	2 Existing Tools for Image Annotation
	3 HELPI VIZ: A Semantic Image Annotation and Visualization Platform
		3.1 Helpi Viz: Annotation
		3.2 Helpi Viz: Search and Visualization
	4 Conclusion
	References
A Survey of Multi-Abnormalities Disease Detection and Classification in WCE
	1 Introduction
	2 Review of Literature
		2.1 Abnormality Detection of Bleeding
		2.2 Abnormality Detection of Polyp
		2.3 Abnormality Detection of Ulcer
		2.4 Abnormality Detection of Hookworm
		2.5 Abnormality Detection of Tumor
	3 Conclusion
	References
Detection of Alzheimer's Disease in Brain MR Images Using Hybrid Local Graph Structure
	1 Introduction
	2 Proposed Method
		2.1 Local Graph Structure
		2.2 Extended Local Graph Structure
		2.3 Hybrid Local Graph Structure
	3 Result and Analysis
	4 Conclusion
	References
A Review on Object Tracking Wireless Sensor Network an Approach for Smart Surveillance
	1 Introduction
	2 Object Tracking Wireless Sensor Network [OTWSN] Structure and Terminologies
		2.1 Object Tracking Wireless Sensor Network [OTWSN]
		2.2 Discrete Object
		2.3 Continuous Object
	3 Research Challenges and its Solution in OTWSN
		3.1 Computation and Communication Cost
		3.2 Energy Constraint
		3.3 Data Aggregation
		3.4 Sensor Technology and Localization Techniques
			3.4.1 Object Detection
			3.4.2 Object Speed and Sampling Frequency
			3.4.3 Object Position Prediction, Tracking Accuracy and Reporting Frequency
		3.5 Localization
		3.6 Sensor Node Deployment
		3.7 Sensor Node Collaboration
	4 Analysis and Comparison
	5 Future Directions
		5.1 Fault Scenarios
		5.2 Cross Layer Integration
		5.3 Object Prediction Delay and Accuracy
		5.4 Hybrid Network Type
	6 Summary
	7 Conclusion
	References
A Mini Review on Electrooculogram Based Rehabilitation Methods Using Bioengineering Technique for Neural Disorder Persons
	1 Introduction
	2 Human Computer Interactıon
	3 Rehabılıtatıon Devıce
	4 EOG Recording
	5 Literature Survey
	6 Conclusion
	References
Applications Using Machine Learning Algorithms for Developing Smart Systems
	1 Introduction
	2 Literature Survey
	3 Various Types of Machine Learning
		3.1 Supervised Learning (SL)
		3.2 Unsupervised Learning (USL)
		3.3 Reinforcement Learning (RL)
	4 Role of Machine Learning in Smart Systems
		4.1 What Is a Smart System?
		4.2 What Are the Smart System Available Today?
		4.3 How Machine Learning Techniques Used in Smart Systems
		4.4 Major Algorithms Used in Machine Learning
	5 Challenges and Issues
	6 Conclusion
	References
Benchmarking of Digital Forensic Tools
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results
	5 Conclusion
	References
An Item Based Collaborative Filtering for Similar Movie Search
	1 Introduction
	2 Proposed Work
		2.1 Preprocessing
		2.2 Pivot Table Creation
		2.3 Cosine Similarity Generation
		2.4 Recommendation Engine
	3 Conclusion
	References
Identification of Musical Instruments Using MFCC Features
	1 Introduction
	2 System Overview
	3 System Design Methodology
		3.1 Mel-Frequency Cepstral Coefficients (MFCC)
			3.1.1 Database
			3.1.2 Support Vector Machine (SVM)
			3.1.3 K-Nearest Neighbor Algorithm
	4 Results
	5 Conclusion
	References
An Instance Identification Using Randomized Ring Matching Via Score Generation
	1 Introduction
		1.1 Video Examination, Surveillance and Object Instance
		1.2 Video Motion Detection
	2 Proposed Object Instance Searching Technique
		2.1 Feature Extraction
		2.2 Frame Conversion
		2.3 Template Matching
		2.4 Feature Matching Algorithm
		2.5 Background Subtraction
			2.5.1 Ring Matching Algorithm
	3 Performance Evaluatıon
		3.1 Dataset
		3.2 Confusion Matrix
	4 Conclusion
	References
Performance Improvement of Multi-Channel Speech Enhancement Using Modified Intelligent Kalman Filtering Algorithm
	1 Introduction
	2 Proposed Algorithm
	3 Simulation Results
	4 Conclusion
	References
A Collaborative Method for Minimizing Tampering of Image with Commuted Concept of Frazile Watermarking
	1 Introduction
		1.1 Equations
	2 Classification of Watermarking Authentication Schemes
		2.1 Fragile Watermarking Methodology
			2.1.1 Principle
			2.1.2 Embed Registration in LSB
			2.1.3 Embedding Process
			2.1.4 Self-Embedding
		2.2 Semi-fragile Watermarking Methodology
			2.2.1 Compression
			2.2.2 Pseudo Code (Creation of Validation Bits)
			2.2.3 Pseudo Code (Embedding Process)
	3 Comparison and Problem Formulation with Experimental Result
	4 Conclusion
	References
Interval Type-2 Fuzzy Logic Based Decision Support System for Cardiac Risk Assessment
	1 Introduction
	2 Conceptual Understanding
		2.1 Type-1 Fuzzy Set
		2.2 Type-2 Fuzzy Set
		2.3 Type-2 Fuzzy Logic system
	3 Methodology
		3.1 Steps to Design Type-2 Fuzzy Inference System
			3.1.1 Selection of Antecedent and Consequent Part
			3.1.2 Selection of Linguistic Variables
			3.1.3 Domain Expert's Knowledge
			3.1.4 Fuzzification: Formulation of Type-2 Fuzzy Sets
			3.1.5 Properties of Fuzzy Relation
			3.1.6 Tolerance to Equivalence Relation
			3.1.7 Defuzzification
			3.1.8 Formalism of Type-2 Fuzzy Set
			3.1.9 Fuzzy Inference Mechanism
	4 Results and Discussions
	5 Conclusion
	References
Classification of Multi-retinal Disease Based on Retinal Fundus Image Using Convolutional Neural Network
	1 Introduction
	2 Related Work
	3 Dataset
	4 Proposed Methodology
	5 Algorithm
		5.1 Alexnet Architecture
	6 Result
	7 Conclusion
	8 Future Directions
	References
Accurate Techniques of Thickness and Volume Measurement of Cartilage from Knee Joint MRI Using Semiautomatic Segmentation Methods
	1 Introduction
	2 Methodology
	3 Results and Discussion
	4 Conclusion
	References
A Hybrid Approach Using Machine Learning Algorithm for Prediction of Stock Arcade Price Index
	1 Introduction
	2 Literature Survey
	3 Experiments and Results
	4 Conclusion
	References
Disease Severity Diagnosis for Rice Using Fuzzy Verdict Method
	1 Introduction
	2 Development of Fuzzy Expert System
		2.1 Rice Dataset
		2.2 Elements of Fuzzy Expert System
			2.2.1 Fuzzification Phase
			2.2.2 Rice Fuzzy Verdict Method
	3 MATLAB Results
	4 Assessment of System Performance
	5 Conclusions and Future Research
	References
Bio-inspired Fuzzy Model for Energy Efficient Cloud Computing Through Firefly Search Behaviour Methods
	1 Introduction
	2 Literature Survey
		2.1 Load Balancing in Cloud Computing
	3 Proposed Work
		3.1 Biological Model: Firefly Behaviour
		3.2 Design of Algorithms
	4 Results
	5 Conclusion and Future Work
	References
Neural Association with Multi Access Forensic Dashboard as Service (NAMAFDS)
	1 Introduction
	2 Forensics Over the Cloud
	3 Evidence Segregation
	4 Neural Association with Multi Access Forensic Dashboard and Feature Extraction
	5 Gabor Filter
	6 Training the Neural Network
	7 Lapla Image Encryption Description and Pseudo Code
	8 Discussion
	9 Conclusion and Future Work
	References
Exploration of the Possible Benifits for the Complementary Perfect Matching Models with Applications
	1 Introduction
	2 Real Life Application
	3 Restrained Step Domination Number for Cartesian Product of Graphs
	4 Conclusion
	Annexure 1
	References
Cloud Robotics in Agriculture Automation
	1 Introduction
	2 A Brief History
		2.1 Cloud Computing
		2.2 Cloud Robotics
	3 Research and Development in Agricultural Robots
		3.1 Cotton Picking
		3.2 Nursery Planting
		3.3 Crop Seeding
		3.4 Crop Monitoring and Analysis
		3.5 Fertilizing and Irrigation
		3.6 Crop Weeding and Spraying
		3.7 Thinning and Pruning
		3.8 Picking and Harvesting
	4 Cloud Enabled Agri Robots in Smart Farming
	5 Conclusion and Future Scope
	References
Comparative Analysis of EMG Bio Signal Based on Empirical Wavelet Transform for Medical Diagnosis
	1 Introduction
	2 Materials and Methods
		2.1 Empirical Wavelet Transform
	3 Results and Discussion
		3.1 EMG Signal Analysis with Synthetic and Real Data Set
	4 Conclusion
	References
Efficient Prevention Mechanism Against Spam Attacks for Social Networking Sites
	1 Introduction
	2 Literature Survey
	3 Problem Identification
	4 Research Methodology
		4.1 Adaboost Logit Boost Algorithm
		4.2 Chaos Genetic Algorithm
		4.3 Proposed Hybrid Optimization
	5 Experimental Results
	6 Conclusion
	References
PPG Signal Analysis for Cardiovascular Patient Using Correlation Dimension and Hilbert Transform Based Classification
	1 Introduction
	2 Materials and Methods
		2.1 Correlation Dimension
		2.2 Detrend Fluctuation Analysis
		2.3 Hilbert Transform
	3 Post Classifiers for Classification
		3.1 KNN Classifier
		3.2 Firefly Algorithm
		3.3 TR-LDA
	4 Results and Discussion
	5 Conclusion
	References
A Robust and Fast Fundus Image Enhancement by Dehazing
	1 Introduction
	2 Related Works
	3 Proposed Approach
		3.1 Luminosity Correction
		3.2 Reducing Contrast Variations
		3.3 Filtering
		3.4 Phase A
		3.5 Phase B
	4 Experimental Results
	5 Conclusion
	References
A Generalized Study on Data Mining and Clustering Algorithms
	1 Introduction
		1.1 Need for Clustering?
	2 Clustering and Its Types
		2.1 Partitioned Clustering
			2.1.1 k-Means Algorithm
			2.1.2 k-Medoids Algorithm
		2.2 Hierarchical Based Clustering
			2.2.1 Agglomerative Clustering Algorithm
			2.2.2 Divisive Based Clustering
		2.3 Density Based Clustering
			2.3.1 DBSCAN (Density Based Spatial Clustering of Applications with Noise)
	3 Conclusion
	References
Multimodal Medical Image Fusion Using Discrete Fractional Wavelet Transform (DFRWT) with Non-subsampled Contourlet Transform (NSCT) Hybrid Fusion Algorithm
	1 Introduction
	2 Background Works
	3 Proposed Method
		3.1 Discrete Fractional Wavelet Transform [18–20]
		3.2 Non-subsampled Contourlet Transform (NSCT) [9, 18, 19, 21]
		3.3 Hybrid Algorithm
			3.3.1 Steps for Hybrid Algorithm (NSCT-DFRWT)
	4 Implementations Results
		4.1 Evaluation Metrics
	5 Conclusion
	References
Emotion Recognition on Multi View Static Action Videos Using Multi Blocks Maximum Intensity Code (MBMIC)
	1 Introduction
	2 Related Works
	3 Proposed Work
		3.1 Frame Subtraction
		3.2 Feature Extraction
		3.3 Random Forest (RF)
	4 Results and Discussions
		4.1 Quantitative Evaluation
		4.2 GEMEP Dataset
		4.3 Random Forest Classifiers Based Experimental Results
	5 Conclusion and Future Work
	References
Survey on Security Systems in Underwater CommunicationsSystems
	1 Introduction
	2 Security Attacks in Underwater Communication Network
		2.1 Jamming
		2.2 Wormhole Attack
		2.3 Sink Hole Attack
		2.4 Hello Flood Attack
		2.5 Sybil Attack
		2.6 Selective Forwarding
	3 Security Requirements for Underwater Acoustic Communication
		3.1 Authentication
		3.2 Confidentiality
		3.3 Integrity
		3.4 Availability
		3.5 Source Localization
		3.6 Self-Organization
		3.7 Data Freshness
	4 The Security Issues in UWSN Layer, Its Vulnerabilities and Defenses Against Threats
		4.1 Data Link Layer
		4.2 Network Layer
		4.3 Transport Layer
		4.4 Application Layer
	5 Layer Attacks and Suggested Counter Measures
		5.1 Physical Layer
		5.2 MAC Layer
		5.3 Network Layer
		5.4 Transport Layer
	6 Analysis and Evaluation of Educational Benefits
	7 Future Scope
	8 Conclusion
	References
A Review on Meta-heuristic Independent Task Scheduling Algorithms in Cloud Computing
	1 Introduction
	2 Escalation (Optimization) Parameters
		2.1 User's View
		2.2 Service Provider's View
	3 Genetic Algorithm (GA) for Task Scheduling
	4 Ant Colony Optimization (ACO) for Task Scheduling
	5 Particle Swarm Optimization (PSO) for Task Scheduling
	6 League Championship and Pareto Optimization for Task Scheduling
	7 Observations
	8 Conclusion
	References
Facial Expression Recognition for Human Computer Interaction
	1 Introduction
	2 Proposed Facial Emotion Detection Methodology
		2.1 Face Detection and Pre-Processing
		2.2 Facial Features Extraction
		2.3 Facial Expressions Classification
	3 Experiment and Results
		3.1 The JAFFE and the CK+ Database
		3.2 Results
	4 Conclusion
	References
Evolutionary Motion Model Transitions for Tracking Unmanned Air Vehicles
	1 Introduction
	2 Positioning the Drone
	3 Tracking Filter
	4 Fuzzy Motion Models
	5 Rule Base
	6 Evolutionary Approach
	7 Analysis and Findings
	8 Conclusion
	References
A Survey on Major Classification Algorithms and Comparative Analysis of Few Classification Algorithms on Contact Lenses Data Set Using Data Mining Tool
	1 Introduction
		1.1 Classification and Prediction
		1.2 Clustering
		1.3 Association Rule Mining
		1.4 Outlier Analysis
	2 Classification Algorithms
		2.1 Decision Tree Induction
		2.2 Random Forest
		2.3 CART
		2.4 REP Tree
		2.5 Random Trees
	3 Metrics for Classification
		3.1 Confusion Matrix
		3.2 Mean Absolute Error
		3.3 Root Mean Square Error
	4 Results and Comparisons
		4.1 Results
	5 Overall Comparison of J48, REP, Random Forest and Tree with Training Dataset
	6 Conclusion
	References
Segmentation of Blood Vessels in Retinal Fundus Images for Early Detection of Retinal Disorders: Issues and Challenges
	1 Introduction
	2 Related Works
		2.1 Survey on Preprocessing Techniques
		2.2 Survey on Image Enhancement
		2.3 Survey on Segmentation Techniques
		2.4 Survey on Optimization Techniques
		2.5 Evaluation Metrics
	3 Findings of the Survey
	References
Interrogation for Modernistic Conceptualization of Complementary Perfect Hop Domination Number with Various Grid Models
	1 Introduction
	2 CPHD Number for Some Standard Graphs
	3 CPHD Number for Some Mirror Graphs
	4 CPHD Number for Some Special Type of Graphs
	5 Conclusion
	References
Temporal Change Detection in Water Body of Puzhal Lake Using Satellite Images
	1 Introduction
	2 Study Area and Data Collection
		2.1 Computation of Spectral Indices
		2.2 Reference Maps
	3 Methodology
		3.1 Flow Chart
	4 Results and Discussion
		4.1 Change Detection using Iso Clustering
		4.2 Change Detection using NDWI and MNDWI Indices
	5 Conclusion
	References
Content Based Image Retrieval: Using Edge Detection Method
	1 Introduction
	2 Edge Detection Techniques
	3 Proposed Method for Combined Edge Detection Method
		3.1 Roberts Edge Model
		3.2 Sobel Edge Model
		3.3 Prewitt Operator Edge Model
		3.4 Laplacian of Gaussian (LoG) Model
		3.5 Canny Edge Model
		3.6 Combined Edge Detection Algorithm
	4 Performance Evaluation
		4.1 Performance Analysis
	5 Conclusion
	References
Sentiment Analysis to Quantify Healthcare Data
	1 Introduction
	2 Related Work
	3 Proposed Model
		3.1 Datasets or Data Files
	4 Working of System Components
		4.1 Text Score Calculator
		4.2 Clustering and Labelling Algorithm
		4.3 Classification Algorithm
	5 Performance Analysis and Comparison
	6 Conclusion and Future Scope
	References
Convolutional Neural Network with Fourier Transform for Road Classification from Satellite Images
	1 Introduction
	2 Literature Survey
	3 Proposed Method
		3.1 Tools Employed
		3.2 Overview of the Solution
		3.3 Convolution Neural Network Configuration
		3.4 Training
	4 Results
	5 Conclusion
	References
Prediction of Gender Using Machine Learning
	1 Introduction
	2 Proposed Solution
		2.1 Online Dataset
		2.2 Attributes of the Dataset
	3 Block Diagram
	4 Algorithms on the Dataset
	5 Class Mapping
	6 Data Split
	7 Transformation
		7.1 Logistic Regression
		7.2 Decision Tree Algorithm
		7.3 Random Forest Classifier
	8 Conclusion
		8.1 Acoustics Values
	9 Future Work
	References
Camera Feature Ranking for Person Re-Identification Using Deep Learning
	1 Introduction
	2 Related Works
	3 Proposed System
		3.1 Data Set
		3.2 Algorithm Used
			3.2.1 Convolution Neural Network
			3.2.2 Siamese Network
			3.2.3 Feature Ranking
			3.2.4 Steps for Feature Ranking
			3.2.5 Pseudocode
	4 Results
	5 Conclusion and Future Works
	References
Definite Design Creation for Cellular Components Present in Blood and Detection of Cancerous Cells by Using Optical Based Biosensor
	1 Introduction
	2 Different Types of Existing Sensors
		2.1 Multilocus Sequence Typing Sensors
		2.2 Biosensors in the Field of Agriculture
		2.3 Biosensors in the Field of Medicine
		2.4 Pollution Control Biosensors
		2.5 Optical Based Biosensors
		2.6 Microbial Biosensors
	3 Proposed Technology
		3.1 Design
		3.2 MEEP Tool
		3.3 Results Using R-Soft Tool (Fig. 8, Table 4)
	4 Conclusion
	5 Results
	6 Future Scope
	References
Virtual Screening of Anticancer Drugs Using Deep Learning
	1 Introduction
	2 Literature Review
	3 Background
		3.1 Decision Tree Algorithm
		3.2 Support Vector Machine Algorithm
		3.3 Random Forest Algorithm
		3.4 Convolutional Neural Network
		3.5 Long Short Term Memory
	4 Proposed Method
	5 Implementation and Results
		5.1 Datasets
		5.2 Results
	6 Conclusion
	References
Identification and Detection of Glaucoma Using Image Segmentation Techniques
	1 Introduction
	2 Flowchart for Glaucoma Detection (Fig. 1)
	3 Segmentation Techniques
	4 Experimental Results
	5 Measuring Parameter
	6 Results and Discussions
	7 Conclusions
	References
Tile Pasting P System Constructing Homeogonal Tiling
	1 Introduction
	2 Tile Pasting P System (TPPS)
	3 Homeogonal Tiling
	4 Conclusion
	References
Analysis of Breast Cancer Images/Data Set Based on Procedure Codes and Exam Reasons
	1 Introduction
	2 Characteristics of a Malignant Tumor
	3 Breast Cancer Symptoms
	4 Related Works
	5 Diagnoses
	6 Data Collection and Representation
	7 Data Analysis (Table 1)
		7.1 Rule Coverage and Accuracy
	8 Conclusion
	References
Empirical Analysis of Machine Learning Algorithms in Fault Diagnosis of Coolant Tower in Nuclear Power Plants
	1 Introduction
	2 Literature Review
	3 Empirical Analysis
		3.1 Metrics and Its Significance
		3.2 Critical Parameters to Be Monitored in Coolant Tower
	4 Results and Discussions
	5 Conclusion
	References
Marker Controlled Watershed Segmented Features Based Facial Expression Recognition Using Neuro-Fuzzy Architecture
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Data Collection
		3.2 Preprocessing
		3.3 Feature Extraction
		3.4 Classification
		3.5 Adaptive Neuro-Fuzzy Inference System (ANFIS)
	4 Experimental Results and Discussion
	5 Conclusion
	References
A Review on Sequential and Non-Overlapping Patterns for Classification
	1 Introduction
	2 Literature Survey
	3 Conclusion
	References
An Analytical Review on Machine Learning Techniques to Predict Diseases
	1 Introduction
		1.1 Supervised
		1.2 Unsupervised
		1.3 Deep Learning
		1.4 Semi-Supervised
		1.5 Reinforcement
	2 Literature Survey
	3 Conclusion
	References
Driver's Behaviour Analytics in the Traffic Accident RiskEvaluation
	1 Introduction
		1.1 Traffic Safety
		1.2 Driver's Perception Error
	2 Literature Survey
		2.1 Earlier System
		2.2 Existing System
		2.3 Disadvantage
	3 Proposed Methodology
		3.1 Advantages
		3.2 Software Requirements
	4 Implementation
		4.1 Field Experiment and Analysis
		4.2 Data Collection
		4.3 Attributes of the Dataset
		4.4 Data Analytics
		4.5 Model
	5 Discussion on Results
	6 Conclusion
	References
Emotion Speech Recognition Through Deep Learning
	1 Introduction
	2 Problem
		2.1 Problem Statement
	3 Proposed Solution
	4 Experimental Result
	5 Experiment on Original Data
	6 Main Parameters of the Experiment
	7 Confusion Matrix on the Augmented Testing Dataset
	8 Conclusion
		8.1 Future Enhancement
	References
Segmentation Techniques Using Soft Computing Approach
	1 Introduction
	2 Review of Literature
	3 Rationale Study
	4 Objectives
		4.1 K-means Clustering
		4.2 The Fuzzy C-Means (FCM) Clustering Algorithm
		4.3 Thresholding
	5 Methodology
		5.1 Histogram Thresholding
		5.2 For K-means Clustering
		5.3 For FCM Clustering
		5.4 There Are Some Steps in the Proposed Approach. Input Image, Noise Filter, Feature Selection, Feature Extraction and Classification
		5.5 Result Analysis
	6 Expected Outcomes
	7 Conclusion
	References
Detection of Tumor in Brain MR İmages Using Hybrid IKProCM and SVM
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Acquisition of Data
		3.2 Data Enhancement
		3.3 Skull Removal Phase
		3.4 Clustering
		3.5 Extraction of Attributes Using SZM
		3.6 Support Vector Machine (SVM)
		3.7 Evaluation metrics
	4 Result and Discussion
	5 Conclusion
	References
A Novel Methodology for Converting English Text into Objects
	1 Introduction
	2 Materials and Methodology
		2.1 System Process Flow
		2.2 KBIR Algorithm
		2.3 Inverse KBIR Algorithm
	3 Implementation and Results
		3.1 System Implementation
	4 Justification and Conclusion
		4.1 Conclusion
	References
Framework for Adaptıve Testıng Strategy to Improve Software Relıabılıty
	1 Introduction
	2 Discussion
	3 Problem Statement
	4 Proposed Work
		4.1 Adaptive Testing with Regression Testing
		4.2 Hill Climbing Algorithm
		4.3 Genetic Algorithm
	5 Conclusion
	References
Detection of Primary Glaucoma Using Fuzzy C Mean Clustering and Morphological Operators Algorithm
	1 Introduction
	2 Proposed Block Diagram
	3 Database Collection
	4 Image Pre-processing
	5 Edge Detection and Background Removal
	6 Segmentation of OD and OC Using Fuzzy Clustering Algorithm
	7 Feature Extraction of Optic Disc and Optic Cup
	8 Computation of CDR
	9 Simulation Results
		9.1 Case 1: Normal (CDR < 0.4)-Image_1.jpg
		9.2 Case 2: Moderate (0.4 < CDR < 0.6): Image_4.jpg
		9.3 Case 3: Severe (CDR > 0.6): Image_5.jpg
	10 Conclusions
	References
An Analytical Framework for Indian Medicinal Plants and Their Disease Curing Properties
	1 Introduction
	2 Related Work
	3 Analytical Framework for Mining Medicinal Plant Properties from Biomedical Literature
		3.1 General Architecture
		3.2 Candidate MeSH Term Identification from Biomedical Literature
		3.3 Probable MeSH term Selection (PMS)
		3.4 Informative Sentence Selection (ISS) from Biomedical literature
			3.4.1 Description of Data Set for Feature Selection
			3.4.2 Feature Extraction
			3.4.3 Classification of Candidate Sentences
	4 Results and Discussion
	5 Conclusion
	References
Plant Leaf Recognition Using Machine Learning Techniques
	1 Introduction
		1.1 Edge Detection
			1.1.1 Canny Edge Detection
			1.1.2 Prewitt Operator
			1.1.3 Sobel Edge Detection
	2 Literature Review
		2.1 Classification Using Multi Class SVM
		2.2 Convolutional Neural Network (CNN)
	3 Architecture Diagram
	4 Empirical Results
		4.1 Edge Detection (Table 1)
		4.2 Classification Using SVM (Fig. 4)
		4.3 Deep Learning Approach for Leaf Recognition
	5 Conclusion
	References
Conceptualization of Indian Biodiversity by Using Semantic Web Technologies
	1 Introduction
	2 Background and Related Work
	3 Ontology Engineering Process
	4 Results
		4.1 The Indian Biodiversity Ontology (InBiOn)
	5 Ontology Evaluation
	6 Conclusion
	References
A New Ensemble Clustering Approach for Effective Information Retrieval
	1 Introduction
	2 Literature Survey
	3 Proposed Work
		3.1 Sequential Clustering
		3.2 Cluster Based Ensembles Approach (A New Experiment On Distributed Systems)
	4 Results and Discussion
	5 Conclusion
	References
Detection of Cancer Cell Growth in Lung Image Using Artificial Neural Network
	1 Introduction
	2 Wavelet Transform
	3 Encoding
	4 Feature Extraction
	5 Result and Discussion
	6 Conclusion
	References
Single Image Dehazing Using Deep Belief Neural Networks to Reduce Computational Complexity
	1 Introduction
		1.1 Haze: Physical Phenomena
		1.2 Haze: Conceptual Model
		1.3 Problem Formulation
	2 Related Works
	3 Proposed Work
	4 Results and Discussion
	5 Conclusion
	References
Measuring Social Sarcasm on GST
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Dataset and Preprocessing
		3.2 Sentiment Analyzer and Topic Extractor
		3.3 Sarcasm Detection Meter
		3.4 Prediction
		3.5 Visualization
	4 Result and Discussion
	5 Conclusion and Futurework
	References
A Review on False Data Injection in Smart Grids and the Techniques to Resolve Them
	1 Introduction
	2 False Data Injection Attacks
		2.1 Kalman Filter
			2.1.1 Techniques used in Kalman Filter
		2.2 Bad Data Detection
			2.2.1 Cyber Side
			2.2.2 Physical Side
		2.3 Phasor Measurement Unit (PMU)
	3 Results and Discussion
		3.1 Defending Methods
			3.1.1 Strict Analysis
			3.1.2 Wireless Network in Smart Grids
			3.1.3 Introducing Modules
	4 Conclusion
	References
A Novel Methodology for Identifying the Tamil Character Recognition from Palm Leaf
	1 Introduction
	2 Materials and Methodology
		2.1 Proposed System Work Flow
		2.2 Proposed Algorithm for the Palm Leaf Character Recognition
	3 Implementation and Results
		3.1 Segmentation and Feature Extraction
	4 Conclusion and Future Enhancement
		4.1 Conclusion
		4.2 Future Enhancement
	References
Leaf Recognition Using Prewitt Edge Detection and K-NNClassification
	1 Introduction
	2 Related Work
	3 Automatic Identification of Leaf Species
		3.1 Prewitt Edge Detection
		3.2 K-Nearest Neighbor Classification
	4 Conclusion
	References
Learning Deep Topics of Interest
	1 Introduction
	2 Review on Topic Models
	3 Deep Topic Models
	4 Evaluation with Topic Coherence
	5 Proposed Metric: Structured Topic Coherence
	6 Discussion
	7 Conclusion
	References
A Study on Varıous Bıo-Inspıred Algorıthms for Intellıgent Computatıonal System
	1 Introduction
	2 Types of Bıo Inspıred Algorıthms
		2.1 Ant Colony Algorithm
		2.2 Firefly Algorithm
		2.3 Bee Colony Algorithm
		2.4 Bat algorithm
		2.5 Cuckoo search algorithm
		2.6 Firefly Algorithm
	3 Conclusıon
	References
Credit Card Fraud Detectıon in Retaıl Shopping Using Reinforcement Learning
	1 Introduction
	2 Related Work
	3 System Design
		3.1 Reinforcement Learning
		3.2 Random Forest
		3.3 Evaluation
	4 Implementation
		4.1
		4.2
		4.3 Validation Results
		4.4 Performance Measures
	5 Conclusion
	References
Deseasonalization Methods in Seasonal Streamflow SeriesForecasting
	1 Introduction
	2 Monthly Seasonal Streamflow Series
	3 Deseasonalization Models
		3.1 Padronization
		3.2 Moving Average
		3.3 Seasonal Difference
	4 Predictors
		4.1 Periodic Autoregressive
		4.2 Extreme Learning Machines
	5 Case Study
	6 Conclusion
	References
Local Painted Texture Pattern for Quality of Content Based Image Retrieval
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Algorithm: Local Painted Texture Pattern
		3.2 Formation of Pattern Extraction
	4 Performance Evaluation
	5 Conclusion
	References
Deep Learning Architectures for Medical Diagnosis
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 K-Means Clustering
		3.2 Softmax Regression
		3.3 Energy Normalization
		3.4 Generalized Linear Neural Network (GLNN) (Fig. 4)
	4 *-15pt
	5 Conclusion
	References
Improved Blog Classification Using Multi Stage Dimensionality Reduction Technique
	1 Introduction
	2 Methodology
		2.1 Blog Representation and Preprocessing
		2.2 Feature Reduction
		2.3 Pattern Reduction
		2.4 Compact Pattern Reduction and Classification
	3 Blog Classification
	4 Experiments and Results
	5 Conclusion
	References
Knowledge—Guru System Using Content Management for an Education Domain
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
	4 Conclusion and Future Work
	References
Deep Learning for Voice Control Home Automation with Auto Mode
	1 Introduction
	2 System Overview
	3 Hardware Development
	4 Software Development
	5 Working Process
	6 Results & Analysis
	7 Deep Learning for Home Automation
	8 Conclusion
	References
Review on Spectrum Sharing Approaches Based on Fuzzy and Machine Learning Techniques in Cognitive Radio Networks
	1 Introduction
	2 Approaches for Sharing the Spectrum
		2.1 Based on Network Architecture
		2.2 Based on Spectrum Allocation
		2.3 Based on Spectrum Access
	3 Comparison of Spectrum Sharing
		3.1 Spectrum Management
		3.2 Complexity in Spectrum Sharing
		3.3 Spectrum Scalability
		3.4 Spectrum Allocation Duration
	4 Conclusion
	References
Artificial Intelligence Based Technique for Base Station Sleeping
	1 Introduction
	2 System Model
		2.1 Model Representation for Power Consumption
		2.2 Signal to Interference and Noise Ratio (SINR)
		2.3 Traffic Model
			2.3.1 Little's Law
	3 Broadcast Model
	4 Blocking Probability
	5 Small Base Station Deployment and Sleeping
	6 Results
	7 Conclusion
	References
A Novel Region Based Thresholding for Dental Cyst Extraction in Digital Dental X-Ray Images
	1 Introduction
	2 Dental Cyst Segmentation
	3 Maxımally Stable Extremal Regıons (MSER)
	4 The Proposed MSER Based Dental Cyst Segmentation
		4.1 Steps in MSER Based Segmentation
	5 Results and Dıscussıon
		5.1 Parameter Evaluation
		5.2 Cyst Extraction Using MSER
		5.3 Comparison of Dental Cyst Extraction Methods (Binary form)
	6 Conclusion
	References
Salient Object Detection Using DenseNet Features
	1 Introduction
	2 Related Work
		2.1 CNN Architectures
		2.2 Salient Object Detection
	3 Proposed System
		3.1 DenseNet-121
		3.2 Deconvolution Model
	4 Implementation
	5 Experimental Results
	6 Conclusion
	7 Future Work
	References
Attentive Natural Language Generation from Abstract Meaning Representation
	1 Introduction
	2 Related Work
		2.1 Modular and Planning Based Approaches
		2.2 Sequential Stochastic Model
		2.3 Encoder-Decoder Architecture
	3 Learning Model
		3.1 Sequential Model
		3.2 Long-Short Term Memory
		3.3 Attention Mechanism
	4 Realization Model
		4.1 Preprocessing
		4.2 Encoding & Decoding
		4.3 Attention Mechanism
	5 Results
	6 Conclusion
	References
Euclidean Distance Based Region Selection for Fundus Images
	1 Introduction
	2 Proposed Methodology
		2.1 Euclidean Distance Based Region Selection
	3 Conclusion
	References
Big Data Oriented Fuzzy Based Continuous Reputation Systems for VANET
	1 Introduction
	2 Problem Statement
	3 Related Work
	4 Multinomial Bayesian Model
		4.1 The Dirichlet Distribution
		4.2 Dirichlet Distribution with Prior
		4.3 Dirichlet Reputation System
		4.4 Collecting Ratings
		4.5 Aggregating Rating on Time
		4.6 Convergence Values for Reputation Scores
			4.6.1 Representing Reputation
		4.7 Point Estimate Representation
	5 Continuous Ratings
		5.1 Multinomial Reputation System
	6 Network Model for Continuous Rating in VANET
	7 Big Data Oriented Vehicle Reputation System
	8 Conclusion
	References
Multi-faceted and Multi-algorithmic Framework (MFMA) for Finger Knuckle Biometrics
	1 Introduction
	2 Background
	3 MFMA Framework
		3.1 Implementation Module A
		3.2 Implementation Module B
		3.3 Implementation Module C
		3.4 Decision Level Fusion Using Bayesian Approach
	4 Experimental Analysis and Results Discussion
		4.1 Experiment-1: Performance Evaluation of Integration Module-A
		4.2 Experiment-2: Performance Evaluation of Integration Module-B
		4.3 Experiment-3: Performance Evaluation of Integration Module-C
		4.4 Experiment-4: Performance Evaluation of MFMA Framework
		4.5 Experiment-5: Robustness of MFMA Framework Towards Distortions and Deformations in Finger Knuckle Images
	5 Conclusions
	References
Implementation of SSFCM in Cross Sectional Views of Paediatric Male and Female Brain MR Images for the Diagnosis of ADHD
	1 Introduction
	2 ADHD and Gender
	3 Literature Review
	4 Proposed Method
	5 Results and Discussion
		5.1 Accuracy (%)
		5.2 Specificity (%)
		5.3 Sensitivity (%)
	6 Conclusion
	References
Hand Gesture Recognition Using OpenCv and Python
	1 Introduction
	2 Methods
		2.1 Input Capturing
		2.2 Background Subtractor
		2.3 Running Average
		2.4 Histogram of our Hand
		2.5 Thresholding & Motion Detection
		2.6 Contour Extraction
		2.7 Counting Fingers
	3 Experimental Results
	4 Future Enhancements
	5 Conclusion
	References
Real Time Facial Recognition System
	1 Introduction
	2 Basic Recommendations of Facial Recognition
		2.1 Existing System
	3 Problem Statement
	4 Proposed System
	5 Conclusion
	References




نظرات کاربران