ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Pervasive Computing and Social Networking: Proceedings of ICPCSN 2022 (Lecture Notes in Networks and Systems, 475)

دانلود کتاب محاسبات فراگیر و شبکه های اجتماعی: مجموعه مقالات ICPCSN 2022 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 475)

Pervasive Computing and Social Networking: Proceedings of ICPCSN 2022 (Lecture Notes in Networks and Systems, 475)

مشخصات کتاب

Pervasive Computing and Social Networking: Proceedings of ICPCSN 2022 (Lecture Notes in Networks and Systems, 475)

ویرایش: [1st ed. 2023] 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 9811928398, 9789811928390 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 835
[799] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 25 Mb 

قیمت کتاب (تومان) : 48,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Pervasive Computing and Social Networking: Proceedings of ICPCSN 2022 (Lecture Notes in Networks and Systems, 475) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب محاسبات فراگیر و شبکه های اجتماعی: مجموعه مقالات ICPCSN 2022 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 475) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب محاسبات فراگیر و شبکه های اجتماعی: مجموعه مقالات ICPCSN 2022 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 475)

این کتاب دارای مقالات اصلی از کنفرانس بین‌المللی محاسبات فراگیر و شبکه‌های اجتماعی (ICPCSN 2022)، سازمان‌دهی شده توسط NSIT، سالم، هند در 3 تا 4 مارس 2022 است. این کتاب شامل کارهای تحقیقاتی در زمینه مفهومی، سازنده، تجربی، نظری و عملی می‌شود. پیاده سازی روش های محاسباتی و شبکه های اجتماعی فراگیر برای توسعه ایده ها و نوآوری های جدیدتر در زمینه رو به رشد فناوری اطلاعات و ارتباطات.


توضیحاتی درمورد کتاب به خارجی

The book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2022), organized by NSIT, Salem, India during 3 – 4 March 2022. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.



فهرست مطالب

Preface
Contents
About the Editors
A Feature Extraction Based Ensemble Data Clustering for Healthcare Applications
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Fuzzy Firefly Algorithm (FFA) for Ensemble Member Chosen (EMC)
		3.2 Consensus Matrix Function
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Analysis of Axial Triradius to Detect Congenital Heart Diseases
	1 Introduction
	2 Material and Methods
		2.1 Template Matching Approach
		2.2 Template Matching Methods
		2.3 Finding the Position of Triradii on Palm
		2.4 Finding the “atd” Angle(ɵ)
	3 Results
		3.1 Identification of Left Triradius, Right Triradius and Axial Triradius on Palm Image
		3.2 Angle at Axial Triradius
		3.3 Association Between the “atd” Angle and CHDs
	4 Conclusion
	References
Forecasting Flash Floods with Optimized Adaptive Neuro-Fuzzy Inference System and Internet of Things
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Study area and dataset details
		3.2 IoT Unit and Monitoring Platform
		3.3 Weather Analysis Platform for Early Flood Prediction
		3.4 ANFIS Optimization
	4 Results and Discussion
	5 Conclusion
	References
A Survey on HTTP Flooding—A Distributed Denial of Service Attack
	1 Introduction
	2 Background of HTTP Flooding Attacks
		2.1 HTTP GET Flood Attack
		2.2 HTTP POST Flood Attack
	3 Detection Techniques for HTTP Flood Attacks
		3.1 Detection of HTTP Flooding Attack in Cloud Environment
		3.2 Detection of HTTP Flood in IoT Environment
	4 Mitigation Techniques for HTTP Flooding Attacks
	5 Conclusion
	References
Tracking and Monitoring of Soldiers Using IoT and GPS
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results and Discusions
	5 Conclusion
	References
Study of Vulnerabilities in the Cryptography Algorithms
	1 Introduction
		1.1 Related Works
		1.2 Organization
	2 Motivation
	3 Proposed Model
	4 Our Model
		4.1 Exponentiation Model
		4.2 ECC Model
		4.3 RSA Model
		4.4 Diffie-Hellman Model
		4.5 Experimental Settings
	5 Results
	6 Prevention
	7 Conclusion and Future Scope
	References
Awaaz: A Sign Language and Voice Conversion Tool for Deaf-Dumb People
	1 Introduction
	2 Background and Related Work
	3 Proposed System
		3.1 Database Creation
		3.2 Database Preprocessing
		3.3 Database Splitting
		3.4 Training of Dataset
		3.5 Hand Gesture Recognition
		3.6 Text to Voice Conversion
		3.7 Tkinter Desktop GUI
	4 Result and Analysis
		4.1 Comparison Between 2D CNN, KNN, SVM and Naive Bayes Classifier Algorithms
		4.2 Loss and Accuracy of 2D CNN Model
		4.3 Sign Gesture Recognition
		4.4 Tkinter GUI Desktop Application
	5 Conclusion
	6 Future Scope
	References
Decentralized Application (DApp) for Microfinance Using a Blockchain Network
	1 Introduction
	2 Lıterature Survey
	3 System Desıgn and Implementatıon
		3.1 System Architecture
		3.2 Flow Chart
		3.3 Smart Contract Functionalities
	4 Results and Dıscussıon
	5 Conclusıon and Future Scope
	References
Experimental Study on LoRaWAN Technology Applied to Vehicular-to-Infrastructure (V2I) Communication
	1 Introduction
	2 System Design and Methods
		2.1 System Design
		2.2 Methods
	3 Experiment Results and Discussion
		3.1 Experiment on the Accuracy of Vehicle's Location Result
		3.2 Experiment on Gateway's Coverage Range Result
		3.3 Experiment on Communication and Possible Interferences Result
	4 Conclusion
	References
Optimal Densely Connected Networks with Pyramid Spatial Matching Scheme for Visual Place Recognition
	1 Introduction
	2 Literature Review
	3 The Proposed Model
		3.1 Feature Extraction Using Optimal DenseNet Model
		3.2 Image Filtering Using Manhattan Distance
	4 Performance Validation
	5 Conclusion
	References
Virtual Reality as a Teaching Resource in Higher Education: Professors’ Assessment
	1 Introduction
	2 Methodology
		2.1 Participants
		2.2 Objectives
		2.3 Variables and Hypotheses
		2.4 Instrument
		2.5 Methods
	3 Results
	4 Discussion and Conclusions
	References
Automated Intelligent Hematology Classification System Using Image Processing and Neural Networks
	1 Introduction
	2 Literature Work
	3 Methodology
	4 Results
		4.1 Image Preprocessing
		4.2 Classification
		4.3 Performance Parameters for the Classification Model:
	5 Conclusion
	References
Nonlinear Integrity Algorithm for Blockchain Based Supply Chain Databases
	1 Introduction
	2 Literature Survey
	3 Proposed Technique
	4 Results
	5 Conclusion
	References
14 Topic Identification and Prediction Using Sanskrit Hysynset
	Abstract
	1 Introduction
	2 Literature Review
	3 Research Methodology
		3.1 Constructing a Corpus and Preprocessing
		3.2 Construct a Vector Space Model for Sanskrit (VSMS) and HSVSMS
		3.3 Topic model’s Intrinsic Evaluation
		3.4 Visualization Using Dendrogram
		3.5 Apply Classifier Using HSVSMS Prediction and Performance Evaluation
	4 Results and Discussions
	5 Conclusions
	References
Filling the Knowledge Base of the Filtering System Algorithm Development
	1 Introduction
	2 Main Part
	3 Conclusion
	References
Development of a Linear Scale Consensus Method of the Blockchain System
	1 Introduction
	2 Statement of the Main Research Material
		2.1 The Idea and Essence of the Blockchain System New Consensus Method
		2.2 Stability and Reliability Research of the Developed Blockchain System Consensus Method
	3 Conclusions
	References
Acquisition of a CNC Router for a Joinery in Brazil: An Approach from VFT, SAPEVO-M and WASPAS Methods
	1 Introduction
	2 Problem
	3 Background
		3.1 Multicriteria Decision Analysis
		3.2 Value-Focused Thinking (VFT) Approach
		3.3 SAPEVO-M
		3.4 WASPAS
	4 Practical Application of SAPEVO-M WASPAS Methods when Choosing a Router
	5 Final Considerations
	References
General Collective Intelligence as a Platform for Social Technology
	1 Introduction
	2 Shortcomings of Current Centralized and Decentralized Platform Approaches
	3 Using Functional State Spaces to Define What Complete Decentralization Means
	4 Cognitive Applications and Collective Cognitive Platforms
	5 General Collective Intelligence and Social Technology
	6 Related Work
	7 Proposed Future Work
	8 Discussion/Analysis
	9 Conclusions
	References
Risk Analysis Related to the Corrosıon of Atmospheric Storage Tanks: A Multimethodological Approach Using the FRAM and the ELECTRE-MOr Methods
	1 Introduction
	2 Literature Review
		2.1 Aboveground Storage Tanks
		2.2 Atmospheric Corrosion
		2.3 FRAM
		2.4 ELECTRE-MOr
	3 Methodology
	4 Case Study
	5 Conclusions
	References
Implementing Braking and Acceleration Features for a Car-Following Intelligent Vehicle
	1 Introduction
	2 Braking and Acceleration Features for Intelligent Vehicles
	3 Experimental Results and Discussion
	4 Conclusion
	References
Homogeneous Map Partitioning Employing the Effective Regions of Movement Method
	1 Introduction
	2 Formation of Effective Regions of Movement from Stable Vehicular Grid Characteristics
		2.1 Computation of Spatiotemporal Stable Grid Characteristics
		2.2 Illustrative Example
	3 Simulation Results and Discussion
		3.1 Examples of Spatiotemporal Stable Network Characteristics
		3.2 Processing Time of Spatiotemporal Stable Network Characteristics
		3.3 Comparison with other Clustering Methods
	4 Conclusion
	References
Demand-Based Deployment of Electric Vehicle Charging Stations Employing Empirical Mobility Dataset
	1 Introduction
	2 Review of Related Literature
	3 Methodology
	4 Simulation Results and Discussion
		4.1 The Deployment of 30 Electric Vehicle Charging Stations
		4.2 Total Number of Taxis Within the 1 km Distance of Each Electric Vehicle Charging Station
		4.3 Average Distance of Each Taxi from All of the Charging Stations
	5 Conclusion
	References
Design and Development of a Digital Preservation Voice Enabled Application for Cultural Heritage Towards Fishing in Vernacular Language
	1 Introduction
	2 Literature Survey
		2.1 Fishing
		2.2 Traditional Fishing and Farming
		2.3 Major Findings
		2.4 Relevance for Heritage Science
	3 Scope and Objectives of the Project
		3.1 Use Case Scenario
	4 Methodology
		4.1 Methodology Detailing Stepwise Activities and Sub-Activities
	5 Conclusion
	References
Krishi Mitra: Crop and Fertilizer Recommendations System Using Machine Learning Algorithm
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Gathering Data
		3.2 Data Preprocessing
		3.3 How Machine Learning is Used to Predict Crop?
		3.4 Classification by Random Forest
		3.5 Choosing the Right Model
		3.6 Generating a Model File
		3.7 Fertilizers Suggestion
		3.8 Integration of Model with Website
	4 Results
	5 Conclusion
	References
Development of DDoS Attack Detection Approach in Software Defined Network Using Support Vector Machine Classifier
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Testbed Design Specification
	4 System Implementation and Results
	5 Conclusion and Future Consideration
	References
Sensor Data Fusion Methods for Driverless Vehicle System: A Review
	1 Introduction
	2 Sensor Fusion
		2.1 Sensor Fusion: Conventional Algorithms
	3 Deep Learning Algorithms: Sensor Fusion
		3.1 Convolutional Neural Network (CNN)
		3.2 You Only Look Once (YOLO)
		3.3 Single-Shot Multibox Detector (SSD)
		3.4 Region-Based Convolutional Neural Network (R-CNN)
		3.5 Fast Region-Based Convolutional Neural Network (Fast R-CNN)
		3.6 Faster Region-Based Convolutional Neural Network (Faster R-CNN)
	4 Conclusion
	References
A Novel Neural Network Based Model for Diabetes Prediction Using Multilayer Perceptron and Jrip Classifier
	1 Introduction
		1.1 Existing Work
	2 Proposed Work
		2.1 Data Collection
		2.2 Data Preprocessing
	3 Model Formulation and Experimental Work
		3.1 NDPM Algorithm
	4 Results and Discussion
	5 Conclusion
	References
Development of a Neighborhood Based Adaptive Heterogeneous Oversampling Ensemble Classifier for Imbalanced Binary Class Datasets
	1 Introduction
	2 Related Works
	3 Proposed Work
		3.1 Partition Training Dataset
		3.2 Group Minority Instances Based on Neighborhood
		3.3 Create Representative Training Datasets
		3.4 Create an Adaptive Heterogeneous Ensemble Classifier
	4 Experimental Framework and Results
	5 Conclusion
	References
Real Time Facial Emotions Detection of Multiple Faces Using Deep Learning
	1 Introduction
	2 Literature Review
	3 Problem Statement
	4 Methodology
		4.1 Dataset
		4.2 Convolutional Neural Network
		4.3 Transfer Learning
	5 Implementation
		5.1 Pre-processing of Data
		5.2 Training Model
		5.3 Face Detection
		5.4 Face Extraction
		5.5 Resize Detected Faces
		5.6 Emotion Prediction
	6 Experiment Result
	7 Conclusion
	8 Future Work
	References
Mobile Application for Online Pharmacy: A-Pharma App
	1 Introduction
	2 Research Questions
	3 Research Objective
	4 Problem Statement and Hypothesis
	5 Methodology
	6 Results and Findings
	7 Conclusion
	References
A Convolutional Neural Network Incorporated Long Short-Term Memory with Autoencoder for Covid-19 Intensity Levels Detection
	1 Introduction
	2 Related Work
	3 Deep Learning Model
		3.1 Dataset
		3.2 Pre-Processing
		3.3 Proposed Novel Convolutional Neural Network
		3.4 Proposed Algorithm
		3.5 Long Short-Term Memory Unit Integration
	4 Result Analysis
		4.1 Training—Testing Technique
		4.2 Performance Evaluation of Proposed Algorithm Based on Classification
	5 Conclusion
	References
Survey on Attendance System Using Face Recognition
	1 Introduction
	2 Related Work
	3 Face Detection Algorithms
		3.1 Appearance-Based Methods
		3.2 Distance Metric Learning-Based Techniques
		3.3 RGB-Based Approaches
		3.4 HAAR Cascade Classifiers
	4 Face Recognition Algorithms
		4.1 Naive Bayes Algorithm
		4.2 Support Vector Machine
		4.3 Artificial Neural Network
	5 Conclusion
	References
A Spectral-Spatial Classification of Hyperspectral Image Using Domain Transform Interpolated Convolution Filter
	1 Introduction
	2 Proposed Methodology
		2.1 Domain Transform Interpolated Convolution Filter (DTICF)
		2.2 CNN Operation
		2.3 Bi-Long Short Term Memory (BI-LSTM)
	3 The Proposed Method of DTICF-3D-CNN-Bi-LSTM-MRF
		3.1 The Spatial Feature Extraction by DTICF
		3.2 Classifying HSI by 3D-CNN-BiLSTM
	4 Experiments
		4.1 The Proposed DTICF-3D-CNN-BI-LSTM-MRF HSI Classification on Indian Pines Data and Pavia University Data
	5 Conclusion
	References
Performance Analysis of Various Asymmetric Public-Key Cryptosystem
	1 Introduction
	2 Existing Systems
	3 Proposed Setup
		3.1 Existing Algorithm Overview
		3.2 Experimental Setup
	4 Experimental Results and Analysis
		4.1 CPU Utilization
		4.2 Memory Utilization
		4.3 Execution Time
		4.4 Plaintext and Ciphertext Similarity
	5 Conclusion
	References
Design of a Web-Based Platform: Event-Venues Booking and Management System
	1 Introduction
	2 Problem Statement and Hypothesis
	3 Methodology
	4 Results and Findings
	5 Limitation and Future Work
	6 Conclusion and Limitation
	References
Evaluating an Automated Analysis Using Machine Learning and Natural Language Processing Approaches to Classify Computer Science Students’ Reflective Writing
	1 Introduction
	2 Literature Review
		2.1 The Importance of Reflection in CS Education
		2.2 Methods to Analyze Reflection
		2.3 Automatic Method to Analyze the Reflection
	3 Methodology
		3.1 Dataset
		3.2 Manually Analysis of Reflection’ Indicators (Content Analysis)
		3.3 Proposed Framework
	4 Results
		4.1 Description of an Experience
		4.2 Understanding
		4.3 Feelings
		4.4 Reasoning
		4.5 Perspective
		4.6 Future Action
		4.7 New Learning
	5 Evaluation Results
	6 Discussion
	7 Conclusion
	References
Secured and Lightweight Key Distribution Mechanism for Wireless Sensor Networks
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Network Architecture
		3.2 Cluster Formation
		3.3 Key Distribution
	4 Experimental Analysis
		4.1 System Configuration and Software Tools
		4.2 Energy Consumption
		4.3 Communication Overhead
		4.4 Memory Storage
		4.5 Security Analysis
	5 Conclusion
	References
Detection of Exercise and Cooking Scene for Assitance of Visually Impaired People
	1 Introduction
	2 Methodology
		2.1 Dataset and Preprocessing
		2.2 Feature Vector Compilation
		2.3 Classification and Detection of Scene
	3 Result
	4 Conclusion
	References
Electronic System for Navigation of Visually Impaired People
	1 Introduction
	2 Methodology
	3 Result
	4 Conclusion
	References
Proposal of Criteria for Selection of Oil Tank Maintenance Companies at Transpetro Through Multimethodological Approaches
	1 Introduction
	2 Basic Theoretical Framework
		2.1 Maintenance and Contracting of Tasks in Transpetro
		2.2 The VFT Approach
		2.3 The Gaussian AHP Method
	3 Methodology
	4 Application and Discussion
		4.1 Application of VFT Method
		4.2 Application of the Gaussian AHP Method
	5 Conclusion
	References
A Deep Learning-Based Approach with Semi-supervised Level Set Loss for Infant Brain MRI Segmentation
	1 Introduction
	2 Materials and Method
		2.1 Materials
		2.2 Proposed Coefficient of Variation Active Contour Loss Function
		2.3 Network Architecture
	3 Experimental Results
		3.1 Dataset
		3.2 Evaluation Metrics
		3.3 Training
		3.4 Results
	4 Conclusion
	References
A Reinforcement Learning Based Adaptive Traffic Signal Control for Vehicular Networks
	1 Introduction
	2 Literature Survey
	3 Problem Definition
	4 Design
		4.1 Distance Level Assignment and Distance Estimation:
		4.2 Problem Statement with Notation and Design:
		4.3 Proposed Methodology
	5 Junction Coordination
		5.1 Setup
		5.2 State, Reward and Action
		5.3 Density Calculation
		5.4 Pre Training
	6 Work Plan
	7 Simulation Results
		7.1 System Requirements
		7.2 Evaluation Matrix
		7.3 Static Traffic Density
		7.4 Dynamic Traffic Density
	8 Conclusion
	References
The Structure of the Vulnerability Detection System on Web Servers
	1 Introduction
	2 Main Part
	3 Conclusion
	References
Comparison of Image Blending Using Cycle GAN and Traditional Approach
	1 Introduction
	2 Background
	3 Literature Review
	4 Problem Statement
	5 Dataset
	6 Methodology
		6.1 Generative Adversarial Network (GANS)
		6.2 Traditional Image Approach
	7 Result
	8 Analysis
		8.1 Structural Similarity (SSIM)
		8.2 PSNR
		8.3 Fourier Transform
		8.4 Discrete Cosine Transform
	9 Discussion
	10 Conclusion
	11 Future Scope
	References
Botnet Attacks Detection Using Embedded Feature Selection Methods for Secure IOMT Environment
	1 Introduction
	2 Research Goals
	3 Literature Review
	4 Research Strategy
		4.1 The Proposed Model
		4.2 Performance Metrics
		4.3 Justification of Proposed Model
	5 Implementation
	6 Feature Selection Techniques
		6.1 Ridge Feature Selection Method
		6.2 Lasso Feature Selection Method
	7 Ensemble Methods of Machine Learning
	8 Results and Discussions
		8.1 Hamming Loss Values Comparison on Different Methods
		8.2 ROCAUC Values Comparison on Different Methods
	9 Comparison with Existing Techniques
	10 Conclusion and Feature Works
	References
An Accuracy Based Comparative Study on Different Techniques and Challenges for Sentiment Analysis
	1 Introduction
	2 Related Work
	3 Sentiment Analysis Tasks
		3.1 Subjective Classification
		3.2 Sentiment Classification
		3.3 Aspect Extraction
		3.4 Opinion Spam Detection
		3.5 Implicit Language Detection
	4 Level of Analysis
		4.1 Document Level
		4.2 Sentence Level
		4.3 Aspect Level
	5 Traditional Approaches
		5.1 Machine Learning Approach
		5.2 Lexicon Based Approach
		5.3 Hybrid Approaches
	6 Challenges
	7 Comparative Study
	8 Conclusion
	References
Pseudo-CT Generation from MRI Images for Bone Lesion Detection Using Deep Learning Approach
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Pre-Processing of MRI and CT Images
		3.2 Feature Extraction
		3.3 Pseudo-CT Generation
		3.4 Evaluation Methods
	4 Results and Discussion
	5 Comparison Analysis
	6 Conclusion
	References
Simulation of Topology Based VANET Routing Protocols Using NS3
	1 Introduction
		1.1 Key Research Areas and Challenges in VANETs
	2 Classification of VANET Routing Protocols
	3 Description of Routing Protocols
		3.1 Destination Sequenced Distance Vector (DSDV) Routing
		3.2 Optimized Link State Routing (OLSR)
		3.3 Dynamic Source Routing (DSR)
		3.4 Ad-Hoc On-Demand Distance Vector (AODV) Routing
	4 Performance Metrics
		4.1 MAC/PHY Layer Overhead
		4.2 Number of Packets Received
	5 Simulation Parameters
	6 Methodology
	7 Simulation Results and Analysis
		7.1 MAC/PHY Layer Overhead
		7.2 Number of Packets Received
	8 Conclusion
	References
A Fast Algorithm for Hunting State-Backed Twitter Trolls
	1 Introduction
	2 Related Works
	3 Proposed Approach for Troll Detection
		3.1 General Methodology
		3.2 Classification Features
	4 Data Gathering
	5 Results and Discussion
	6 Conclusion
	References
A Review on Artificial Intelligence Based E-Learning System
	1 Introduction
	2 Literature Review
	3 Recommended Approach of E-Learning
	4 Conclusion and Research Gap
	References
Text to Image Generation Using Gan
	1 Introduction
	2 Related Work
	3 Experimental Design
		3.1 Dataset
		3.2 Data Preprocessing
		3.3 Architecture
	4 Results and Analysis
	5 Conclusion and Future Work
	References
SARS-CoV-2: Transmission Predictive Tool Based on Policy Measures Adopted by Countries Using Basic Statistics
	1 Introduction
	2 Materials and Methods
		2.1 Related Work
		2.2 Proposed Work
	3 Result Analysis
	4 Conclusion
	References
Performance Evaluation of an IoT Based Fetal Heart Monitoring Device
	1 Introduction
	2 Methodology
		2.1 Material Selection
		2.2 Signal Acquisition
		2.3 Digital Analysis
	3 Results and Findings
		3.1 Detection of an Adult Heart Rate
		3.2 Detection of Fetal Heart Rate
	4 Conclusion
	References
A Novel Approach for Handling Imbalanced Data in Breast Cancer Dataset
	1 Introduction
	2 Problem Definition
	3 Literature Survey
	4 Proposed Methodology
		4.1 Classification Using Autoencoder
		4.2 Dataset
		4.3 Design
	5 Results and Discussion
	6 Conclusion
	References
Investigating Data Mining Trend in Cybercrime Among Youths
	1 Introduction
	2 Review of Related Work
	3 Research Methodology
		3.1 Research Design and Setting
		3.2 Source of Data and Data Collection Procedure
		3.3 Study Population
		3.4 Model Specification
		3.5 Description of Research Instrument
		3.6 Validation of Research Instrument
		3.7 Reliability of the Instrument
		3.8 Data Analysis Technique
	4 Results and Analysis of the Outcome
		4.1 The Socio-Demographic Characteristics of Participants in the Study Area
		4.2 Cybercrime Activities
		4.3 Hypotheses Testing
		4.4 Discussion of Findings
	5 Conclusion and Future Direction
	References
Concatenation of SEPIC and Matrix Converter with LCL Filter for Vehicle to Grid Application
	1 Introduction
	2 Circuit Description
	3 Single Ended Primary Inductor Converter (SEPIC)
		3.1 SEPIC Converter Design
	4 Matrix Converter
	5 LCL Filter
	6 Simulation Results
	7 Conclusion
	References
Creation of SDIoT Testbed for DDoS Attack Using Mininet: Experimental Study
	1 Introduction
	2 Existing Testbeds
		2.1 Mathematical Model
		2.2 Simulation
		2.3 Emulation
		2.4 Hardware
	3 Requirements in the Architecture and Design of a Testbed
		3.1 Requirements for the Setup
		3.2 Hardware and Software Requirements
		3.3 Experimental Environment and Setup
		3.4 Testbed Setup
		3.5 Algorithm for Creating Testbed Setup
	4 Results
	5 Advantages and Disadvantages of SDIoT Environment in Mininet
	6 Proposed Solutions
	7 Conclusion
	References
Automatic Eye Disease Detection Using Machine Learning and Deep Learning Models
	1 Introduction and Related Work
	2 Proposed Approach
		2.1 Data Collection
		2.2 Data Preprocessing
		2.3 Data Modelling
	3 Experiment Result and Comparison
		3.1 Dataset Description
		3.2 Metrics Description
		3.3 Deep Learning Model Results
		3.4 Machine Learning Model Results
		3.5 Deep Learning Versus Machine Learning
		3.6 Comparison with Existing Study
	4 Conclusion
	References
An Automated System to Preprocess and Classify Medical Digital X-Rays
	1 Introduction
	2 Existing Trends
	3 Proposed Trend
		3.1 A Module to Improve Quality of Images-Pre-processing
		3.2 A Module to Extract the Region of Interest-Segmentation
		3.3 A Module to Calculate Statistics-Feature Extraction
		3.4 A Module that does the Purpose-Classification
	4 Performance-Evaluation
	5 Investigational Outcomes
	6 Conclusion
	References
PSTN Enterprise Collaboration Systems
	1 Introduction
		1.1 Problem Statement, Question and Objective
	2 Literature Review
	3 Results and Findings
		3.1 Enterprise Collaboration System Helps in the Enterprise
		3.2 Current Enterprise Collaboration System Challenge
		3.3 ECS Understands the Connections of Others and Visualize Abilities
		3.4 ECS Find Contacts and the Shortest Path
	4 Conceptual Solution
		4.1 Recommendations for New Connections
	5 Conclusion and Limitation
	6 Future Work
	References
Author Index




نظرات کاربران