ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) (Lecture Notes on Data Engineering and Communications Technologies, 49)

دانلود کتاب مجموعه مقالات کنفرانس بین المللی شبکه های کامپیوتری، داده های بزرگ و اینترنت اشیا (ICCBI - 2019) (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 49)

Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) (Lecture Notes on Data Engineering and Communications Technologies, 49)

مشخصات کتاب

Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) (Lecture Notes on Data Engineering and Communications Technologies, 49)

ویرایش:  
نویسندگان: , ,   
سری:  
ISBN (شابک) : 3030431916, 9783030431914 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 1019 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 97 مگابایت 

قیمت کتاب (تومان) : 57,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 11


در صورت تبدیل فایل کتاب Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) (Lecture Notes on Data Engineering and Communications Technologies, 49) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات کنفرانس بین المللی شبکه های کامپیوتری، داده های بزرگ و اینترنت اشیا (ICCBI - 2019) (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 49) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجموعه مقالات کنفرانس بین المللی شبکه های کامپیوتری، داده های بزرگ و اینترنت اشیا (ICCBI - 2019) (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 49)



این کتاب مجموعه مقالات کنفرانس بین‌المللی شبکه‌های محاسباتی، داده‌های بزرگ و اینترنت اشیا [ICCBI 2019] را ارائه می‌کند که در تاریخ 19 تا 20 دسامبر 2019 در دانشکده مهندسی Vaigai، مادورای، هند برگزار شد.

سال‌های اخیر شاهد توسعه درهم تنیده اینترنت اشیا و کلان داده‌ها بوده‌ایم که به طور فزاینده‌ای در معماری شبکه‌های کامپیوتری مستقر شده‌اند. با هوشمندتر شدن جامعه، جایگزینی فناوری‌های سنتی با معماری‌های مدرن فناوری اطلاعات و ارتباطات ضروری است. در این زمینه، اینترنت اشیا اشیاء هوشمند را از طریق اینترنت به هم متصل می کند و در نتیجه داده های بزرگ تولید می کند. این منجر به ایجاد امکانات محاسباتی جدید برای استخراج تصمیمات هوشمند در محیط کلان داده شده است.

این کتاب موضوعات مختلفی از جمله مدیریت اطلاعات، محاسبات تلفن همراه و برنامه‌های کاربردی، برنامه‌های کاربردی اینترنت اشیا، شبکه‌های ارتباطی توزیع‌شده، محاسبات ابری و کلان داده‌های مراقبت‌های بهداشتی را پوشش می‌دهد. همچنین مسائل امنیتی و حریم خصوصی، تشخیص نفوذ شبکه، رمزنگاری، شبکه های 5G/6G، تجزیه و تحلیل شبکه های اجتماعی، هوش مصنوعی، تعامل انسان و ماشین، خانه هوشمند و برنامه های کاربردی شهر هوشمند را مورد بحث قرار می دهد.


توضیحاتی درمورد کتاب به خارجی

This book presents the proceedings of the International Conference on Computing Networks, Big Data and IoT [ICCBI 2019], held on December 19–20, 2019 at the Vaigai College of Engineering, Madurai, India.

Recent years have witnessed the intertwining development of the Internet of Things and big data, which are increasingly deployed in computer network architecture. As society becomes smarter, it is critical to replace the traditional technologies with modern ICT architectures. In this context, the Internet of Things connects smart objects through the Internet and as a result generates big data. This has led to new computing facilities being developed to derive intelligent decisions in the big data environment.

The book covers a variety of topics, including information management, mobile computing and applications, emerging IoT applications, distributed communication networks, cloud computing, and healthcare big data. It also discusses security and privacy issues, network intrusion detection, cryptography, 5G/6G networks, social network analysis, artificial intelligence, human–machine interaction, smart home and smart city applications.



فهرست مطالب

Foreword
Preface
Acknowledgments
Contents
Wireless Sensor Networks Security Issues, Attacks and Challenges: A Survey
	Abstract
	1 Introduction
	2 Wireless Sensor Network Architecture and Its Background
	3 Wireless Sensor Network Applications
		3.1 Industry Related Applications
		3.2 Society
		3.3 Agriculture
		3.4 Environmental Protection
	4 Requirements and Security Issues in Wireless Sensor Networks
		4.1 Security on Data Level
		4.2 Security in Node Level
		4.3 Security in Network Level
	5 Attacks on Wireless Sensor Networks
		5.1 Physical Attack
		5.2 Communication Attack
		5.3 Attack on Base Station
		5.4 Routing Protocols Attack
	6 Challenges for Wireless Sensor Network
		6.1 Well-Built Routing Protocols
		6.2 Application Challenges
		6.3 Key Administration and Challenging Paradigms
	7 Conclusion
	References
A Survey on Machine Learning Based Fault Tolerant Mechanisms in Cloud Towards Uncertainty Analysis
	Abstract
	1 Introduction
	2 Related Work
		2.1 Existing Work on Fault Tolerance in Cloud Based on Machine Learning Algorithms
	3 Taxonomy of Faults, Error and Failures
		3.1 Fault Tolerant System
		3.2 Approaches for Fault Tolerance in Cloud
			3.2.1 Reactive Fault Tolerance
			3.2.2 Proactive Fault Tolerance
	4 Metrics for Occurrence of Fault in Cloud Environment
		4.1 Performance Metrics
		4.2 Economic Metrics
		4.3 General Metrics
	5 Conclusion
	References
IoT Based Attendance Management System Using Google Assistant
	Abstract
	1 Introduction
	2 Project Survey
	3 Proposed Method
	4 Implementation
		4.1 Platforms Required
		4.2 Hardware Required
		4.3 Working
	5 Results
	6 Analysis
	7 Conclusion
	8 Compliance with Ethical Standards
	References
A Survey on Privacy Preserving Approaches on Health Care Big Data in Cloud
	Abstract
	1 Introduction
	2 Security and Privacy Requirement of Medical Big Data in Cloud
	3 Overview of Security Techniques for E-Health Cloud
		3.1 Proxy Re-Encryption Using Time Limit Model in Cloud
		3.2 Attribute-Based Information Retrieval with Semantic Keyword Search
		3.3 Search Mechanism Using Attribute-Based Encryption
		3.4 Conjunctive Keyword Search to Secure Healthcare Data
		3.5 Cloud-Based Medical Record Access
		3.6 A Security Model Using a Fog Computing Facility with Pairing-Based Cryptography
	4 Conclusion
	References
Effective Record Search and Update Using Design Patterns - A Case Study of Blood Bank Mobile Application
	Abstract
	1 Introduction
	2 Literature Review
		2.1 Publisher Subscriber Pattern
	3 Implementation
		3.1 Interface Security
		3.2 Request Handling
		3.3 Data Management and Portability
	4 Methodology
	5 Conclusion and Future Scope
	References
Comprehensive and Comparative Study of Efficient Location Tracking Based on Apriori and Dijkstra Algorithms
	Abstract
	1 Introduction
	2 Literature Review
		2.1 GIS in Tracking System
		2.2 Tracking System Using GPS
	3 Adaption of Apriori Algorithm
	4 Adaption of Dijkstra Algorithm
	5 Data Model
	6 Use Case Diagram
	7 Implementation of Algorithms Using Datasets
		7.1 Apriori Algorithm
		7.2 Dijkstra’s Algorithm
	8 Comparative Analysis of Algorithm’s
	9 Conclusion
		9.1 Future Scope
	References
Weather Data Analysis for Jaipur City: Using MongoDB
	Abstract
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Conclusion
	References
A Survey on Intrusion Detection System Using Artificial Intelligence
	Abstract
	1 Introduction
		1.1 Cybersecurity and Its Domain
		1.2 Solution Related Problem
		1.3 Major Problem- Malicious Network Traffic
		1.4 Techniques to Resolve
		1.5 IDS
		1.6 IDS with Traditional Methods
		1.7 Why AI?
	2 IDS/IPS
		2.1 How IDS/IPS Works?
		2.2 Different Types of IPS
		2.3 Problem in IDS
		2.4 Different Tools of IDS
		2.5 How AI Can Improvise the IDS Detection Result
	3 Artificial Intelligence and It’s Different Area
		3.1 Machine Learning
		3.2 Deep Learning
	4 Conclusion
	References
Trusted and Secured E-Voting Election System Based on Block Chain Technology
	Abstract
	1 Introduction
	2 Literature Survey
	3 Existing System
		3.1 Proposed System
		3.2 Benefits of the Proposed System
		3.3 Steps Involved in the Blockchain-Based E-Voting System
		3.4 System Overview
		3.5 Applications
	4 Conclusion
	Competing Interest
	References
Users’ Attitude on Perceived Security of Enterprise Systems Mobility: A Conceptual Model
	Abstract
	1 Introduction
	2 Literature Review
		2.1 Research Model
		2.2 Enterprise Systems Mobility
		2.3 Perceived Security of ES Mobility
		2.4 Users’ Attitude Towards Mobile Device Security Issues
			2.4.1 Mobile Device Security Issues
		2.5 Users’ Attitude Towards Wireless Network Security Issues
		2.6 Users’ Attitude Towards Cloud Computing Security Issues
		2.7 Users’ Attitude Towards Application Level Security Issues
		2.8 Users’ Attitude Towards Data (Access) Level Security Issues
		2.9 Users’ Attitude Towards Enterprise Level Security Issues
		2.10 Research Hypotheses
	3 Research Methodology
	4 Conclusion
	Acknowledgements
	References
Smart Old Age Home Using Zigbee
	Abstract
	1 Introduction
	2 Literature Overview
		2.1 Fire/Gas Leakage
		2.2 ZigBee
		2.3 Smart Door
		2.4 Smart Gardens and Water Level Detection
		2.5 Lighting
		2.6 Society
	3 Interface Diagram and Proposed Work
	4 Overall Working of the Module
	5 Implementation and Results
	6 Snapshots
	7 System Testing
	8 Analysis
	9 Conclusion
	Acknowledgment
	References
Performance Improvement in 6G Networks Using MC-CDMA and mMIMO
	Abstract
	1 Introduction
	2 MC-CDMA and mMIMO Towards Future Wireless Communication Networks
		2.1 Underwater Acoustic Channels
		2.2 Visible Light Communication (VLC)
		2.3 Terahertz (THz) Communication
		2.4 Large Intelligent Surface (LIS)
		2.5 Artificial Intelligence (AI) and Machine Learning (ML)
		2.6 Holographic Beamforming (HBF)
		2.7 Blockchain-Based Spectrum Sharing
	3 Conclusion
	References
An Adaptive and Opportunistic Based Routing Protocol in Flying Ad Hoc Networks (FANETs): A Survey
	Abstract
	1 Introduction
		1.1 Advantages of Multi-UAV Systems
		1.2 Unique Challenges of Multi-UAV Systems
		1.3 Difference Between MANET, VANET and FANET
	2 FANET Routing Protocols
	3 Comparison of Routing Protocols
	4 Functionality of FANET
		4.1 Scalability Extension of Multi-UAV Operation
		4.2 Trustworthy Multi-UAV Communication
		4.3 UAV Swarms
		4.4 FANET to Decrease Payload and Cost
	5 FANET Design Considerations
		5.1 Adaptability
		5.2 Scalability
		5.3 Latency
		5.4 UAV Platform Constraints
		5.5 Bandwidth Requirement
	6 FANET Communication Protocols
		6.1 Physical Layer
		6.2 MAC Layer
		6.3 Network Layer
		6.4 Transport Layer
		6.5 Cross-Layer
	7 Conclusion
	References
A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection
	Abstract
	1 Introduction
	2 Attacks on Digital Images
		2.1 Chosen Plaintext Attack
		2.2 Noise Attack
		2.3 Geometrical Attack
	3 Image Encryption Methods
		3.1 Add-Image-Feature Algorithm
		3.2 Association of Plaintext Information with Secret Key
		3.3 Two-Dimensional Logistic Adjusted Sine Map Based Image Encryption Scheme
	4 Image Watermarking Methods
		4.1 Optimal DCT - Psychovisual Threshold
		4.2 Logistic Maps and RSA Encryption
	5 Comparison and Analysis
		5.1 Image Encryption Schemes
		5.2 Image Watermarking Schemes
	6 Conclusion
	References
Comparing Sentiment Analysis from Social Media Platforms – Insights and Implications
	Abstract
	1 Introduction
	2 Methodology
	3 Analysis
	4 Results
		4.1 Insights and Implications from This Study
	5 Conclusion
	References
A Smart Farm – An Introduction to IoT for Generation Z
	Abstract
	1 Introduction
	2 Technologies Used
		2.1 Hardware
		2.2 Software
		2.3 Server
	3 Materials and Methods
	4 Results and Discussion
	5 Conclusions
	Compliance with Ethical Standards
	References
Algorithms Used for Scene Perception in Driverless Cars
	Abstract
	1 Introduction
	2 Problems Encountered in Scene Segmentation
		2.1 Mixed Matched Relationship in Images
		2.2 Gridding in Samples
		2.3 Speed Efficiency of Perception
	3 Counter-Measure Algorithms
		3.1 Pyramid Based Pooling Method
		3.2 Hybrid Dilated Convolution (HDC)
		3.3 SegNet
		3.4 E-Net (Efficient Neural Network)
	4 Conclusion and Future Work
	References
Machine Learning Algorithms for Early Prediction of Heart Disease
	Abstract
	1 Introduction
	2 Challenges in Conventional Method of Diagnosis
	3 Classifiers
		3.1 Supervised Learning Algorithm
		3.2 Unsupervised Learning Algorithm
	4 Methodology
		4.1 Support Vector Machine
		4.2 Artificial Neural Network
		4.3 Decision Tree
		4.4 Naïve Bayes
	5 Comparison of Algorithms
	6 Conclusion and Future Scope
	References
Analysis and Review of Cloud Based Encryption Methods
	Abstract
	1 Introduction
	2 Privacy Issues in Cloud Computing
		2.1 Data Encryption Is Required as the Service Providers Are Semi-trusted
	3 Encryption Methods
		3.1 Key-Policy Attribute-Based Encryption [7]
		3.2 Multi-authority Proxy Re-encryption [2]
		3.3 Dynamic Encrypted Data Sharing Scheme [3]
		3.4 Cipher Text-Policy Attribute-Based Encryption [9]
	4 Comparison and Analysis
		4.1 Encryption Schemes
	5 Conclusion
	References
Data Storage Security Issues in Cloud Computing
	Abstract
	1 Introduction
	2 Issues and Challenges
		2.1 Data Loss Issues
		2.2 Data Breaches Issues
		2.3 Malicious Insiders
		2.4 Data Location Issues
		2.5 Data Integrity Issues
		2.6 Data Confidentiality Issues
	3 Solutions
		3.1 Methods to Prevent Data Loss
			3.1.1 Strong API
			3.1.2 Protection of Data
			3.1.3 Backup, Clearing of Data and Key Maintenance
		3.2 Methods for Avoiding Malicious Insiders
			3.2.1 Creating Processes and Transparency
			3.2.2 Human Resources Requirements and Use of IDs
		3.3 Solutions to Data Location Issues
			3.3.1 Informed About Location
			3.3.2 Backup
		3.4 Protecting Data Integrity
			3.4.1 Appointing Third Party
			3.4.2 Using a Hash Tree
			3.4.3 Using Provable Data Possession (PDP)
			3.4.4 Using Basic PDP Scheme Based on MAC
			3.4.5 Using Scalable PDP
			3.4.6 Using Dynamic PDP
			3.4.7 By Using Proof of Reliability (POR)
			3.4.8 Using POR Based on Keyed Hash Function hk(F)
			3.4.9 Using Hail
		3.5 Encryption Techniques to Prevent Data Confidentiality Issues
			3.5.1 Advanced Encryption Standard (AES)
			3.5.2 Blowfish Algorithm
			3.5.3 IDEA Algorithm
			3.5.4 RSA Algorithm
			3.5.5 Homomorphic Encryption
			3.5.6 Diffie Hellman Key Exchange
	4 Analysis of the Methods Used
	5 Conclusion and Future Work
	References
Challenges and Solutions in Recommender Systems
	Abstract
	1 Introduction
	2 Issues and Challenges
	3 Solutions
	4 Analysis/Review
	5 Conclusion
	References
Review of Machine Learning in Geosciences and Remote Sensing
	Abstract
	1 Introduction
	2 Related Work
	3 Problems in Geosciences and Remote Sensing
		3.1 Choosing the Right Machine Learning Model
		3.2 Classifying and Characterizing Airborne Particulate Matter Using Machine Learning
		3.3 Change Detection in Satellite Images in Delhi, India
		3.4 Classification of Satellite Images in a Hybrid Environment
	4 Solutions and Countermeasures for Geosciences and Remote Sensing
		4.1 Using Machine Learning Techniques as an Efficient and Accurate Solution to Geo-Scientific Problems of Classification and Characterization
			4.1.1 Genetic Programming
			4.1.2 Support Vector Machine
		4.2 Using Machine Learning to Analyze Aerosol and Particulate Matter
			4.2.1 Using a Gradient Boosting Machine Learning Model
			4.2.2 Linear Support Vector Machine
		4.3 Using Machine Learning Algorithms to Analyses Satellite Images
			4.3.1 K Means (Partition Based - Clustering)
			4.3.2 FCM (Fuzzy Network – Fuzzy C Means)
			4.3.3 EM (Probability Based – Expectation Maximization)
		4.4 Classification and Analysis of Images Using Machine Learning
			4.4.1 K Nearest Neighbour
			4.4.2 Support Vector Machine
			4.4.3 Random Forrest
	5 Analysis of the Methods Used
	6 Conclusion
	References
Data Storage Security Issues and Solutions in Cloud Computing
	Abstract
	1 Introduction
		1.1 Cloud Storage
			1.1.1 Personal Cloud Storage [1]
			1.1.2 Public Cloud Storage
			1.1.3 Private Cloud Storage
			1.1.4 Hybrid Cloud Storage
			1.1.5 Community Cloud Storage
	2 Issues and Attacks in Cloud Computing Data Storage
		2.1 Weak Cryptography
		2.2 Lack of Secure Client Confirmation Access to the Cloud Storage
		2.3 Attack on Storage Server
		2.4 Types of Attacks
			2.4.1 Side Channel Attack
			2.4.2 DoS (Denial of Service)
			2.4.3 Malware Injection
	3 Countermeasures for Storage Issues in Cloud
		3.1 Integrating Transposition and Substitution for Encryption [3]
			3.1.1 Encryption Algorithm for Integrated Transposition and Substitution Encryption [3]
			3.1.2 Decryption Algorithm for Integrated Transposition and Substitution Encryption [3]
		3.2 Kerberos Protocol for Storage Access Authentication [5]
		3.3 Encrypted Data Storage Coprocessor for Separate Encryption and Storage [1]
		3.4 Searchable Encryption [1]
		3.5 Data Obfuscation and Steganography for Enhanced Public Cloud Storage [13]
			3.5.1 MRADO Technique [14]
			3.5.2 Pixel Processing Using Least Significant Bit (LSB) [15]
	4 Analysis/Review
	5 Conclusion
	References
Big Data and Internet of Things for Smart Data Analytics Using Machine Learning Techniques
	Abstract
	1 Introduction
	2 Related Works
	3 System Overview
		3.1 IOT Applications Connected with Sensors
		3.2 Analyzing the Data, Generating and Storing Big Data
			3.2.1 Storing the Big Data
		3.3 Applying Machine Learning Techniques on the Big Data, the Stored Data
			3.3.1 Classification
			3.3.2 Regression
			3.3.3 Clustering
	4 IOT Applications and Algorithms for Smart Data Analysis
		4.1 Smart Traffic and Environment
		4.2 Smart Weather Prediction
		4.3 Smart Market Analysis
		4.4 Smart Citizen and Agriculture
		4.5 Analysis on Smart Home and Smart City
		4.6 Smart Health Analysis
		4.7 Smart Monitoring
	5 Use Case for Smart Parking System
		5.1 Hardware
		5.2 Software Used
		5.3 Programming Language
		5.4 Project Implementation
	6 CNN Algorithm (Convolution Neural Networks) of Machine Learning for Smart Parking Analysis
		6.1 Collecting the Data
		6.2 Data Preprocessing
		6.3 Test Case Creation
		6.4 Model Implementation
		6.5 Evaluation of the Model
	7 Conclusion
	References
Comparison of Cloud Computing Security Threats and Their Counter Measures
	Abstract
	1 Introduction
	2 Security Issues in Cloud Computing
		2.1 Data Threats
			2.1.1 Data Breaches
			2.1.2 Data Loss
		2.2 Network Threats
			2.2.1 Account or Service Hijacking
			2.2.2 Denial of Service Attack
		2.3 Cloud Environment Specific Threats
			2.3.1 Insecure Interfaces and APIs
			2.3.2 Malicious Insiders
			2.3.3 Insufficient Due Diligence
		2.4 Abuse and Nefarious Use
		2.5 Issues Due to Shared Technology
		2.6 Security Challenges in the Authentication and Access Control
	3 Solutions to Security Issues in Cloud Computing
		3.1 Data Security
			3.1.1 Protection from Data Breaches
			3.1.2 Protection from Data Losses
		3.2 Network Security
			3.2.1 Protection from Account or Service Hijacking
			3.2.2 Protection from Denial of Service
		3.3 Cloud Environment Security
			3.3.1 Protection from Insecure Interfaces and APIs
			3.3.2 Protection from Malicious Insiders
			3.3.3 Protection from Insufficient Due Diligence
		3.4 Protection from Abuse and Nefarious Use
		3.5 Protection from Issues Due to Shared Technology
		3.6 Protection from Threats in Authentication and Access Control
	4 Analysis/Review
	5 Conclusion
	References
An Effective Kapur’s Segmentation Based Detection and Classification Model for Citrus Diseases Diagnosis System
	Abstract
	1 Introduction
	2 Proposed Work
		2.1 Pre-processing
		2.2 Kapur’s Method for Segmentation
		2.3 PSO-SVM Based Classification
	3 Performance Validation
	4 Conclusion
	References
Anomaly Detection Using Anomalous Behavior at Program Environment Through Relative Difference Between Return Addresses
	Abstract
	1 Introduction
		1.1 Anomaly Detection
	2 Related Work
	3 Proposed Work: Programming Environment
	4 Datasets: Artificial Datasets
	5 Implementation: Experiments and Results
		5.1 Discussions
	6 Conclusion and Future Work
	References
Satellite Image Enhancement and Restoration
	Abstract
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Contrast Enhancement
		3.2 Intensity Equalization
	4 Result
	5 Conclusion
	References
Role of AI in Gaming and Simulation
	Abstract
	1 Introduction
	2 AI in Simulation
	3 AI in Gaming
	4 Objective and Methodology
	5 Conclusion
	References
Analysis of MRI Images Using Image Processing Technique
	Abstract
	1 Introduction
	2 Related Research Work
	3 MRI
	4 Proposed Technique
		4.1 Pre-processing
			4.1.1 Histogram Equalization
			4.1.2 Median Filtering
		4.2 Feature Segmentation
			4.2.1 Prewitt
			4.2.2 Morphological Transformation
	5 Result and Discussion
	6 Conclusion
	References
Recent Trends of IoT in Smart City Development
	Abstract
	1 Introduction
	2 Internet of Things
	3 Smart City
	4 IoT Supporting Security
	5 IoT in Healthcare
	6 IoT in Energy Saving
	7 IoT in Providing Adequate Water Supply
	8 IoT in Transportation and Logistics
	9 IoT in Traffic Control
	10 Challenges Faced in Building a Smart City
	11 Conclusion and Future Scope
	References
Analysis of Biometric Modalities
	Abstract
	1 Introduction
	2 Biometrics Framework
	3 Biometric Modalities
	4 Voice, Gait and Signatures
	5 Retina Scanner
	6 Unique Mark Scanner
	7 Conclusion
	Compliance with Ethical Standards
	References
Comparative Analysis of Contrast Enhancement Techniques for MRI Images
	Abstract
	1 Introduction
	2 Methodology
	3 Result and Discussion
	4 Future Work
	5 Conclusion
	References
Global User Social Networking Ranking Statistics
	Abstract
	1 Introduction
	2 Literature Survey
	3 Proposed System
	4 Result and Discussions
	5 Conclusion
	References
Detecting Spam Emails/SMS Using Naive Bayes, Support Vector Machine and Random Forest
	Abstract
	1 Introduction
	2 Literature Review
	3 Problem Definition
	4 Proposed Work
	5 Experimental Analysis
	6 Conclusion
	References
Detection of Flooding Attacks Using Multivariate Analysis
	Abstract
	1 Introduction
	2 Related Work
	3 Abnormality Analysis Methodology
		3.1 Multivariate Statistical Analysis
		3.2 Hotelling’s T2 Method
		3.3 Mean Vector and Covariance Matrix
		3.4 Attack Detection Approach Using Abnormality Distance Metric
	4 Implementation
		4.1 Configuration
		4.2 Generating and Sending Flooding Attack Packets
		4.3 Capturing the Attack Packet
		4.4 Testing the Attack
	5 Results and Discussion
		5.1 TCP-SYN Attack Results
		5.2 UDP Attack Results
		5.3 ICMP Attack Results
	6 Conclusion and Future Work
	References
Human Gait Recognition
	Abstract
	1 Introduction
	2 Techniques Used for Obtaining Gait Parameters
		2.1 Non-Wearable Sensors
			2.1.1 Image Processing
			2.1.2 Floor Sensors
		2.2 Wearable Sensors
			2.2.1 Pressure and Force Sensors
	3 Detection of Gait Events
		3.1 ANN Classifier
			3.1.1 Training Data Collector
			3.1.2 Training Data Analyzer
		3.2 Inductive Learning Technique (Decision Tree)
		3.3 Fuzzy Logic
	4 Analysis and Comparison
	5 Conclusion and Future Work
	References
Reduction of Traffic on Roads Using Big Data Applications
	Abstract
	1 Introduction
	2 Ease of Use
	3 Literature Survey
	4 Proposed System
		4.1 HDFS
		4.2 Sqoop
		4.3 Hive
		4.4 Pig
		4.5 MySQL
	5 Conclusion and Future Enhancements
	References
Survey on Utilization of Internet of Things in Health Monitoring Systems
	Abstract
	1 Introduction
	2 Survey Classification
	3 Literature Survey
	4 Research Gap
	5 Conclusion and Future Work
	References
AgroFarming - An IoT Based Approach for Smart Hydroponic Farming
	Abstract
	1 Introduction
	2 Related Work
	3 Shortcomings in the Previous Solutions, Which Were Not Addressed
		3.1 No Real Time Notifications to the User [7, 8]
		3.2 No Customization of Sensors Available [12]
		3.3 Addition of the Off-Shelf Camera Is Not Possible in Any of the Current Solutions [11]
		3.4 Different Modes of Operation Is Not Present [11]
		3.5 E-Recipes for Different Plants Is Not Present [13]
		3.6 Open Source Is Not Present
		3.7 No Suitable Size
		3.8 No User Friendliness
	4 Current Solutions in the Market
		4.1 iHydroMobile
		4.2 Plant Talk
		4.3 Robot Farm
		4.4 MicroCEA: Developing a Personal Urban Smart Farming Device
		4.5 Personal Food Computer (PFC):- A New Device for Controlled-Environment Agriculture [19]
	5 Comparison of the Hydroponic Solutions
	6 Conclusion
	References
Review on Dimensionality Reduction Techniques
	Abstract
	1 Introduction
	2 Problems Faced While Handling High Dimensional Data
	3 Various Methods for Dimension Reduction
		3.1 Feature Selection
			3.1.1 Variance Threshold
			3.1.2 Feature Ranking
			3.1.3 High Correlation Factor
		3.2 Linear Dimensionality Reduction Algorithms
			3.2.1 Principle Component Analysis
			3.2.2 Linear Discriminant Analysis (LDA)
		3.3 Non Linear Dimensionality Reduction
			3.3.1 Kernel PCA
			3.3.2 Isomap
	4 Analysis/Review
	5 Conclusion
	References
Security Issues in Cloud Computing
	Abstract
	1 Introduction
	2 Issues in Security of Cloud Computing
		2.1 Data Breaches
		2.2 Reduced Network Security
		2.3 Advanced Persistent Threat Parasite (APT Parasite)
		2.4 Side Channel Attack
		2.5 No Recovery
		2.6 Wrapping Attack
		2.7 Malware Injection Attack (Meta Data Spoofing Attack)
		2.8 Cross Scripting Acting
		2.9 Breakage of Information
		2.10 Permanent Data Loss
		2.11 DOS Attacks
			2.11.1 Direct Denial of Service
			2.11.2 Indirect Denial of Service
		2.12 Flooding Attack
	3 Solutions to Security Issues
		3.1 Authenticated Access to Data
		3.2 End to End Encryption
		3.3 Image Steganography
		3.4 Prevention of APTs (Advanced Persistent Threat)
		3.5 Solution to Side Channel Attack
		3.6 Secure the Data Destruction
		3.7 Wrapping Attack Solution
		3.8 Malware Injection Attack Solution
		3.9 Cross Scripting Attack Solution
		3.10 Multifactor Authentication
		3.11 Encryption of Backups
		3.12 Prevention of Dos Attacks
		3.13 Solution to Flooding Attack
	4 Analysis/Review
	5 Conclusion
	References
A Review on Predicting Cardiovascular Diseases Using Data Mining Techniques
	Abstract
	1 Introduction
	2 Cardiovascular Diseases and Its Risk Factors
		2.1 Risk Factors and Symptoms in Cardiovascular Diseases
	3 Review on Cardiovascular Diseases Prediction Using Data Mining Techniques
	4 Conclusion
Adaptive Object Tracking Using Algorithms Employing Machine Learning
	Abstract
	1 Introduction
	2 Problems in Adaptive Object Tracking
		2.1 Selecting Sub-optimal Examples for Training
		2.2 Detector Errors
		2.3 Training Data Set for Convolutional Neural Network
		2.4 Drifting in Stochastic Gradient Descent
		2.5 Target Object Occlusions
	3 Solutions/Countermeasures
		3.1 Multiple Instance Learning Track (MIL Track)
		3.2 P-N Learning in TLD Framework
		3.3 Stochastic Gradient Descent in MDNet
		3.4 Hard Mini-Batch Mining
		3.5 Handling Target Object Occlusions
			3.5.1 Depth Analysis Method
	4 Analysis/Review
		4.1 Comparison Table
	5 Conclusion and Future Work
Emotion Recognition Using Physiological Signals
	Abstract
	1 Introduction
	2 Problems in Emotion Recognition
		2.1 Presence of Outliers
		2.2 Vanishing Gradient
		2.3 Local Minima
		2.4 Manual Feature Extraction
	3 Solutions
		3.1 PNN
		3.2 LSTM (Long Short-Term Memory)
		3.3 Deep Belief Networks
		3.4 Convolutional Neural Networks
	4 Analysis of Solutions
		4.1 Comparison Table
	5 Conclusion
	References
Prediction of Sudden Cardiac Arrest Due to Diabetes Mellitus Using Fuzzy Based Classification Approach
	Abstract
	1 Introduction
	2 Related Works
	3 Proposed Work
		3.1 Dataset
		3.2 Methodology
		3.3 Classification on Risk Score
		3.4 Fuzzification
		3.5 Rule Based Classification
		3.6 Defuzzification
	4 Numerical Results
	5 Conclusion
	References
Suggesting a System to Enhance Decision Making in Location Based Social Networks
	Abstract
	1 Introduction
		1.1 Data Mining
		1.2 Market Analysis and Management
		1.3 Spatial Database
		1.4 Techniques
		1.5 R-Tree Index
	2 Need for the Study
		2.1 Issues
		2.2 Objective of the Study
	3 Proposed Flow Diagram
	4 Results and Discussion
	5 Conclusion and Future Enhancement
	References
Security Challenges in NoSQL and Their Control Methods
	Abstract
	1 Introduction
	2 Vulnerabilities in NoSQL
		2.1 Lack of Encryption
		2.2 Malware
		2.3 No Authentication
		2.4 No Authorization
		2.5 PHP Array Injection Attack
		2.6 SQL ‘OR’ Injection Attack
		2.7 NoSQL JavaScript Injection Attack
		2.8 Denial of Service Attack
	3 Solutions to the Vulnerabilities in NoSQL
		3.1 Mitigate the Injection Attacks
			3.1.1 Static Application Security Testing
			3.1.2 Dynamic Application Security Testing
		3.2 Access Control
			3.2.1 Mandatory Access Control
			3.2.2 Discretionary Access Control
			3.2.3 Role-Based Access Control
		3.3 Protection Against Malware
			3.3.1 Firewall
			3.3.2 Antivirus
		3.4 Mitigate Denial of Service Attack
		3.5 Implement Encryption in NoSQL
	4 Analysis/Review
		4.1 Comparison Table
	5 Future Scope
	6 Conclusion
	References
Linux Server Based Automatic Online Ticketing Kiosk
	Abstract
	1 Introduction
		1.1 Methodology
		1.2 Contemplated Requirements
	2 Project Methodology
		2.1 GUI Design
		2.2 Server Design
	3 Discussion
	References
A Reliable Automation of Motorized Berth Climb
	Abstract
	1 Introduction
	2 Methodology
	3 Discussion
	4 Conclusion
	References
Requirement Gathering for Multi-tasking Autonomous Bus for Smart City Applications
	Abstract
	1 Introduction
	2 About the Method
	3 Conclusion
	References
Offline Handwritten Devanagari Character Identification
	Abstract
	1 Introduction
	2 Preceding Data Study
	3 Purposes of OCR
	4 Conclusion
	Acknowledgement
	References
Behavior Anomaly Detection in IoT Networks
	1 Introduction
	2 Related Work
	3 Solution Architecture
	4 Data Collection and Features
	5 Experiment Results
		5.1 Evaluation of Novelty Detection
		5.2 Evaluation of Classification
	6 Discussion
	7 Conclusion
	References
Review of Digital Data Protection Using the Traditional Methods, Steganography and Cryptography
	Abstract
	1 Introduction
		1.1 Hardware Means for Protection of the Software [3]
		1.2 Methods of Protecting a Software with Support of Hardware
		1.3 Software Means of Protection [1]
		1.4 Exposure of the Techniques Using Hardware Means, Software Means of Protection
		1.5 Multilevel Hiding Text Security Technique
	2 Analysis/Review
		2.1 Applications of the Hardware Means for Protection of the Software [3]
		2.2 Protection of Software with Support of Hardware [2]
		2.3 Applications Used for the Software Means of Protection
		2.4 StegoDB Model
		2.5 Multilevel Hiding Text Security Technique
	3 Conclusion and Future Work
	References (IEEE format)
Waste Management Techniques for Smart Cities
	Abstract
	1 Introduction
	2 Issues Related to Waste Management
		2.1 Environment Pollution
		2.2 Municipal Solid Waste (MSW)
		2.3 e-Waste
		2.4 Hazardous Waste
	3 Solutions
		3.1 Smart Bins
		3.2 Disposal Methods for MSW [5, 7]
			3.2.1 Sanitary Landfills
			3.2.2 Composting
		3.3 Disposal Methods for e-Waste [4]
			3.3.1 Landfill Disposal
			3.3.2 Open Sky Incineration
		3.4 Methods Used for the Ultimate Disposal of Hazardous Waste [6]
			3.4.1 Secured Landfill
			3.4.2 Incineration
			3.4.3 Lagooning
	4 Analysis
	5 Conclusion and Future Work
	References
A Light Modulating Therapeutic Wearable Band for ‘Vision Health’
	Abstract
	1 Introduction
	2 Method
		2.1 Thermoelectric Effect
	3 Operative Principle
		3.1 Mirage Effect
	4 Therapeutic Wearable Device
	5 Diagnosing Medical Ailments
		5.1 Hypermetropia
		5.2 Spherical vs Cylindrical Optical Number
	6 Advantages
	7 Conclusion
	Acknowledgement
	References
“Health Studio” – An Android Application for Health Assessment
	Abstract
	1 Introduction
	2 Literature Survey
	3 Proposed System
		3.1 Health Trackers
		3.2 Convertors
		3.3 Mental Health Awareness Platform
		3.4 Local Maps
	4 Experimental Results
	5 Conclusion
	References
Potential Candidate Selection Using Information Extraction and Skyline Queries
	Abstract
	1 Introduction
	2 Related Work
	3 System Architecture and Design
		3.1 Processing Module
		3.2 Query Execution Module
		3.3 Storage Module
		3.4 Analysis and Output Module
	4 Implementations and Experiments
		4.1 Experimental Setup
		4.2 Implementation
		4.3 Performance Evaluation
	5 Conclusion
	Acknowledgement
	References
An Effective Feature Extraction Based Classification Model Using Canonical Particle Swarm Optimization with Convolutional Neural Network for Glaucoma Diagnosis System
	Abstract
	1 Introduction
	2 Proposed Work
		2.1 Preprocessing
		2.2 Segmentation
		2.3 Hough Transform Based Feature Extraction
		2.4 Classification
	3 Performance Validation
	4 Conclusion
	References
Dominant Feature Descriptors with Self Organising Map for Image Retrieval
	Abstract
	1 Introduction
	2 Proposed Feature Extraction Method
		2.1 Dominant Rotated LBP
		2.2 Histogram of Dominant Edgels
		2.3 Self Organizing Map
		2.4 Measure of Likeness
	3 Experimental Results
	4 Conclusion
	References
Medical Image Retrieval Using Efficient Texture and Color Patterns with Neural Network Classifier
	Abstract
	1 Introduction
	2 Proposed Work
		2.1 Feature Extraction
			2.1.1 Color Feature Extraction Using Auto Correlogram
			2.1.2 Texture Feature Extraction Using DLTerQEP Model
		2.2 NN Model
	3 Performance Validation
	4 Conclusion
	References
Deterministic Type 2 Fuzzy Logic Based Unequal Clustering Technique for Wireless Sensor Networks
	Abstract
	1 Introduction
	2 Proposed Work
	3 Performance Validation
	4 Conclusion
	References
Android Application Based Solid Waste Management
	Abstract
	1 Introduction
	2 Literary Survey
	3 Proposed System
	4 Dataflow Diagram
	5 Sequence Diagram
	6 Comparison Table
	7 Experimentation
	8 Conclusion
	References
An Approach for Detecting Man-In-The-Middle Attack Using DPI and DFI
	Abstract
	1 Introduction
	2 Related Work
	3 Types of Man-In-The-Middle Attack
		3.1 Spoofing Based MITM Attack
		3.2 SSL (Secure Socket Layer) MITM Attack
		3.3 BGP (Border Gateway Protocol) Based MITM Attack
		3.4 Cookie Hijacking
		3.5 Man-In-The-Browser
		3.6 Wireless MITM Attack
	4 Deep Packet Inspection and Deep Flow Inspection
	5 Approach for Detecting Man-In-The-Middle Attack Using Deep Packet Inspection and Deep Flow Inspection
	6 Experimental Evaluation
	7 Conclusion and Future Work
	Acknowledgements
	References
Smart Irrigation and Crop Disease Detection Using Machine Learning – A Survey
	Abstract
	1 Introduction
	2 Literature Review
	3 Comparison of Different Detection Method for Smart Irrigation and Detection of Crop Diseases
	4 Conclusion
	References
Wireless-Sensor-Network with Mobile Sink Using Energy Efficient Clustering
	Abstract
	1 Introduction
	2 Related Work
	3 Mobility Model
	4 Radio Energy Mode
	5 Finite State Machine
	6 Architecture
	7 Results
	8 Conclusion
	References
Internet of Things and Blockchain Based Distributed Energy Management of Smart Micro-grids
	Abstract
	1 Introduction
	2 Energy Management of Micro-grid
		2.1 Smart-Grid
		2.2 Micro-grid
		2.3 Internet of Things (IOT)
	3 Implementation of Micro-grid Energy Management
		3.1 Energy Management Implementation
		3.2 Implementation of Block Chain in Micro Grids
	4 Conclusion
	References
Bio-inspired Deoxyribonucleic Acid Based Data Obnubilating Using Enhanced Computational Algorithms
	Abstract
	1 Introduction
	2 Organism Anatomy
	3 DNA Cryptography
	4 Types of DNA Cryptography
		4.1 Symmetric Key DNA Cryptography
		4.2 Asymmetric Key DNA Cryptography
		4.3 Pseudo DNA Cryptography
		4.4 DNA Steganography
	5 DNA Binary Coding
	6 DNA Data Obnubilating Techniques
		6.1 Insertion Technique
		6.2 Complementary Pair Rule Techniques
		6.3 Substitution Technique
	7 Performance Analysis
	8 Conclusion
	References
Detection of Type 2 Diabetes Using Clustering Methods – Balanced and Imbalanced Pima Indian Extended Dataset
	Abstract
	1 Introduction
	2 Literature Survey
	3 Dataset Description
	4 Proposed Work
		4.1 Attribute Selection Using Wrapper Method
			4.1.1 Wrapper Attribute Selection
		4.2 Oversampling
			4.2.1 SMOTE Method of Oversampling
		4.3 Clustering Algorithm
			4.3.1 K-Means Clustering
			4.3.2 Farthest First Clustering
			4.3.3 Density Based Clustering
			4.3.4 Filtered Clustering
			4.3.5 X-Means Clustering
	5 Results
		5.1 Clustering of Imbalanced Dataset
		5.2 Clustering of Balanced Datasets
	6 Conclusion
	References
Detection of Depression Related Posts in Tweets Using Classification	Methods – A Comparative Analysis
	Abstract
	1 Introduction
	2 Related Works
	3 Dataset Description
	4 Methodology
		4.1 Data Pre-processing Module
			4.1.1 Converting Emoticons to Text Form
			4.1.2 Converting to Lower Case
			4.1.3 Removing URL
			4.1.4 Removing User Name
			4.1.5 Removing Punctuations and Special Characters
			4.1.6 Removing HTML Character
			4.1.7 Converting Slang Words to Normal Form
			4.1.8 Converting Contracted Words to Full Forms
			4.1.9 Converting Elongated Words to Normal Form
			4.1.10 Splitting Attached Words
			4.1.11 Removing Digits
			4.1.12 Removing Non Lexical Words
			4.1.13 Removing Stop Words
			4.1.14 Lemmatization
			4.1.15 Stemming
		4.2 Feature Extraction Module
			4.2.1 n-grams
			4.2.2 Bag of Words (BOW)
			4.2.3 TF-IDF
	5 Classification Module
	6 Results and Discussion
	7 Conclusion and Future Work
	References
Aspect Based Sentiment Classification and Contradiction Analysis of Product Reviews
	Abstract
	1 Introduction
	2 Related Work
	3 System Architecture and Design
		3.1 Dataset Preprocessing
		3.2 Segmentation
		3.3 Aspect Detection
		3.4 Parts of Speech (POS) Tagging
		3.5 Sentiment Classification Method
		3.6 Contradiction Analysis
	4 System Implementation and Experiments
		4.1 Experimental Setup
		4.2 Implementation
		4.3 Performance Evaluation
	5 Conclusion
	References
A Novel Approach to Extract and Analyse Trending Cuisines on Social Media
	Abstract
	1 Introduction
	2 Literature Survey
	3 Proposed Approach
		3.1 Data Collection
		3.2 Preprocessing the Data
		3.3 Parts of Speech Tagging of the Tweets
		3.4 Creating a Food Lexicon
		3.5 Extraction of Food Items
		3.6 TF-IDF and Logistic Regression for Cuisine Classification
	4 Software Implementation
		4.1 Tweet Processing
		4.2 Creating Our Food Lexicon
		4.3 Parts of Speech Tagging of the Tweets
		4.4 Food Matching Using Fuzzy Parsing
		4.5 Cuisine Classification Using Logistic Regression and TFIDF
	5 Results
		5.1 Pre-processing the Data
		5.2 Preparing the Food Lexicon
		5.3 Parts of Speech Tagging the Tweets
		5.4 Food Matching Using Fuzzy Parsing
		5.5 Cuisine Classification Using Logistic Regression and TFIDF
	6 Conclusion
	7 Future Work
	Acknowledgement
	References
Alphanumeric Character Recognition on Tiny Dataset
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Image Character Identification
		3.2 Image Generation by Changing of Instantiation Parameters
	4 Experiments and Results
		4.1 Alphanumeric Character Classification
		4.2 Image Creation Technique Results
	5 Conclusion
	References
Sentiment Analysis in Movie Reviews Using Document Frequency Difference, Gain Ratio and Kullback-Leibler Divergence as Feature Selection Methods and Multi-layer Perceptron Classifier
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Framework for Sentiment Extraction and Classification
		3.1 Data Source
		3.2 Data Preprocessing
		3.3 Vectorization
		3.4 Feature Selection
		3.5 Opinion Classification
	4 Results and Performance Analysis
		4.1 Evaluation Methods
		4.2 Results
	5 Conclusion
	References
A Patch - Based Analysis for Retinal Lesion Segmentation with Deep Neural Networks
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Preprocessing
		3.2 Network Details
	4 Results and Discussion
		4.1 Dataset Description
		4.2 Training
		4.3 Performance Evaluation
		4.4 Results
	5 Conclusion
	References
Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes
	Abstract
	1 Introduction
	2 Background
	3 Process Flow of Onion Routing
	4 Literature Survey
	5 Analysis
	6 Applications of Onion Routing
	7 Discussion and Future Scope
	8 Conclusion
	References
A Technical Paper Review on Vehicle Tracking System
	Abstract
	1 Introduction
	2 Literature Survey
		2.1 A Real-Time GSM/GPS Based Tracking System Using Mobilephone
		2.2 GSM Technology
		2.3 System Overall Plan Design
		2.4 Design and Development of Bus Tracking System
		2.5 Implementation of Vehicle Terminal
	3 Conclusion
	References
Role of Wireless Communications in Railway Systems: A Global Perspective
	Abstract
	1 Introduction
	2 Research Efforts in HST Communication Systems
		2.1 Train – Ground Communication Model
		2.2 On – Board Transceivers Communication System
		2.3 High Speed Linear Cell Communication System
	3 Metro/Subway Rapid Transit System
	4 Driverless Train Operation for Urban Rail Transit Systems
	5 Conclusion
	References
Protection of Microgrid with Ideal Optimization Differential Algorithm
	Abstract
	1 Introduction
	2 Problem Evolution
		2.1 Operating Time Problem Formation
		2.2 Non Linear Objective Function with Constraint
	3 DWT-Differential Analysis
		3.1 Algorithm and Flow Chart
	4 Simulation Case Study
		4.1 DWT Analysis of Fault Current
		4.2 Comparative Analysis
	5 Conclusion
	References
An Improved Energy Efficient Scheme for Data Aggregation in Internet of Things (IoT)
	Abstract
	1 Introduction
	2 Literature Review
	3 Research Gaps and Problem Formulation
	4 Proposed Work
	5 Experimental Results
	6 Conclusion
	References
A Hybrid Approach for Credit Card Fraud Detection Using Naive Bayes and Voting Classifier
	Abstract
	1 Introduction
	2 Literature Review
	3 Research Gaps and Problem Formulation
	4 Proposed Work
	5 Experimental Results
	6 Conclusion
	References
Quantum Inspired Evolutionary Algorithm for Web Document Retrieval
	Abstract
	1 Introduction
	2 Evolutionary Algorithms
		2.1 Quantum Computing
		2.2 Quantum Inspired Evolutionary Algorithms (QIEAs)
	3 Proposed Objectives
		3.1 Artificial Life Agents
		3.2 Proposed Algorithm
	4 Experimental Results
	5 Conclusion
	References
Signature Recognition and Verification Using Zonewise Statistical Features
	Abstract
	1 Introduction
	2 Related Works
	3 Proposed Methodology
		3.1 Image Acquisition
		3.2 Preprocessing
		3.3 Feature Extraction
		3.4 Construction of Knowledge Base
		3.5 Training and Signature Recognition and Verification with Neural Network Classifier
	4 Experimental Results and Analysis
		4.1 An Experimental Analysis of a Sample Signature Image
		4.2 An Experimental Analysis Dealing with Various Issues
	5 Conclusion and Future Work
	References
Home Security Using Smart Photo Frame
	Abstract
	1 Introduction
	2 Related Work
	3 Issues and Challenges
	4 Proposed System
	5 Experimentation
	6 Results and Analysis
		6.1 Face and Eye Detection Using Haar Cascade Classifier
	7 Conclusion and Scope for Future Work
	References
Automated System for Detecting Mental Stress of Users in Social Networks Using Data Mining Techniques
	Abstract
	1 Introduction
	2 Review of Literature
	3 Proposed Methodology
	4 Simulation Details
		4.1 Performance Metrics
		4.2 Accuracy by Category
		4.3 Accuracy Rate
	5 Conclusion
	References
Intelligent Request Grabber: Increases the Vehicle Traffic Prediction Rate Using Social and Taxi Requests Based on LSTM
	Abstract
	1 Introduction
	2 Related Works
	3 System Model
		3.1 Request Grabber
		3.2 Requests from Social Transportation
		3.3 Requests from Taxi Data
		3.4 Recurrent Network Model
		3.5 Request Format
		3.6 Cumulative Request
	4 Experimental Analysis
	5 Conclusion
	References
Aggregation in IoT for Prediction of Diabetics with Machine Learning Techniques
	Abstract
	1 Introduction
	2 Related Work
	3 Research Problem Definition
	4 Proposed Architecture
		4.1 Architecture
		4.2 Process Flow of Smart Dıabetıc System
		4.3 Machine Learning Algorithms
		4.4 Implementation
	5 Result and Discussion
	6 Conclusion
	References
EWS: An Efficient Workflow Scheduling Algorithm for the Minimization of Response Time in Cloud Environment
	Abstract
	1 Introduction
	2 Related Works
	3 Problem Description
	4 Proposed EWS: Efficient Workflow Scheduling Algorithm
	5 Mathematical Model
	6 Results and Discussions
	7 Conclusion
	References
An Investigation Report on Spotting and Diagnosing Diseases from the Images of Plant Leaves
	Abstract
	1 Introduction
	2 Literature Review
	3 Discussion
	4 Conclusion
	References
Test Case Minimization for Object Oriented Testing Using Random Forest Algorithm
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Implementation
	5 Results and Discussion
	6 Conclusion and Future Scope
	References
Exploring the Design Considerations for Developing an Interactive Tabletop Learning Tool for Children with Autism Spectrum Disorder
	Abstract
	1 Introduction
	2 Related Works
	3 Study Methodology
		3.1 Ethnographic Study
		3.2 Semi Structured Interview
	4 Data Analysis and Findings
	5 Proposed Design of the Tabletop Learning Tool
		5.1 Module 1 (Learning Alphabet and Constructing Words)
		5.2 Module 2 (Appearing Test on Alphabet and Constructing Words)
		5.3 Module 3 (Daily Communicator)
		5.4 Module 4 (Playing Rhyme and Music)
	6 Discussion and Conclusions
	Declarations
	References
A Cloud-Fog Based System Architecture for Enhancing Fault Detection in Electrical Secondary Distribution Network
	Abstract
	1 Introduction
	2 Electrical Secondary Distribution Network Monitoring
	3 System Requirements and Design
		3.1 Requirements
		3.2 System Design
	4 System Architecture for Implementation
	5 Microservice-Based Architecture Application Design
		5.1 Use Case
		5.2 Workflow
	6 Conclusion and Future Work
	Informed Consent
	References
An Autonomous Intelligent Ornithopter
	Abstract
	1 Introduction
	2 Literature Survey
		2.1 Existing System and Its Comparison
		2.2 The Lacuna of the Existing System
		2.3 Proposed Solution
	3 Methodology Used
		3.1 Ornithopter
	4 Implementation Details
	5 Conclusion
	Acknowledgments
	References
Detection of Distributed Denial of Service Attack Using NSL-KDD Dataset - A Survey
	Abstract
	1 Introduction
		1.1 Distributed Denial of Service Attack (DDoS)
		1.2 Teardrop Attack
		1.3 Smurf Attack
		1.4 Ping of Death Attack
		1.5 Land Attack
		1.6 SYN Flood Attack
		1.7 Machine Learning Algorithms
			1.7.1 Supervised Learning
			1.7.2 Unsupervised Learning
			1.7.3 Reinforcement Learning
		1.8 NSL-KDD Dataset
	2 Related Work
	3 Promising Technique for DDoS Detection
		3.1 Preprocessing
			3.1.1 String to Integer
			3.1.2 Min-Max Normalization
	4 Feature Selection
		4.1 Methods Forward
		4.2 Performance Evaluation with Machine Learning
			4.2.1 K-NN
			4.2.2 Naive Bayes
			4.2.3 Decision Tree
		4.3 Inferences
	5 Conclusion
	References
A Survey on Efficient Storage and Retrieval System for the Implementation of Data Deduplication in Cloud
	Abstract
	1 Introduction
	2 Literature Survey
		2.1 Randomized Tag
		2.2 Convergent Key Management
		2.3 Dynamic Updates
		2.4 Run Length Encoding
		2.5 Leveraging Data Deduplication
		2.6 Reducing Fragmentation for In-Line Deduplication
		2.7 FP-Tree
		2.8 Deduplication for Distributed Big Data Storage
	3 Analysis on Existing Work
		3.1 Based on Plain Text
		3.2 Based on Security
		3.3 Based on Time of Matching
		3.4 Based on Cipher Text
	4 Conclusion and Future Work
	References
Comparison of Decision Tree-Based Learning Algorithms Using Breast Cancer Data
	Abstract
	1 Introduction
	2 Related Studies
	3 Methodology
		3.1 Basic Concepts of Data Mining
		3.2 Decision Tree Classifier
		3.3 Tools Used
		3.4 Data Pre-processing
		3.5 Attribute Selection
	4 Experimental Result
	5 Conclusion
	References
Stock and Financial Market Prediction Using Machine Learning
	Abstract
	1 Introduction
	2 Methods
		2.1 Ant Optimization Algorithm
		2.2 Support Vector Machines
		2.3 Multi-level Perceptron
	3 Analysis
	4 Conclusion
	References
Review of Prediction of Chronic Disease Using Different Prediction Methods
	Abstract
	1 Introduction
	2 Related Work
		2.1 Collection of Big Data
		2.2 Prediction of Medical Condition
	3 Solutions
		3.1 Data Mining
		3.2 NB (Naïve Bayes)
		3.3 KNN (K-Nearest Neighbor)
		3.4 Smart Clothing
		3.5 CNN-Based Uni-modal and Multimodal Prediction
	4 Comparison Table
	5 Conclusion and Future Work
	References
Review of Software Defined Networking Based Firewall Issues and Solutions
	Abstract
	1 Introduction
	2 Related Work
		2.1 Connection Tracking
		2.2 Security Issue
	3 Solutions
		3.1 Connection Tracking Module
		3.2 Proactive Rule Caching
		3.3 Enqueue Thread
			3.3.1 Statistic Firewall Thread
			3.3.2 Stateful Firewall Thread
		3.4 Replication
	4 Analysis/Review
	5 Conclusion
	References
Database Security: Attacks and Solutions
	Abstract
	1 Introduction
	2 Attacks on Database Security
		2.1 Privilege
			2.1.1 Excessive Privilege
			2.1.2 Unauthorized Privilege Elevation
			2.1.3 Legitimate Privilege Abuse
		2.2 Platform Vulnerabilities
		2.3 SQL Injection
		2.4 Weak Audit Trail
		2.5 Denial of Service
		2.6 Protocol Vulnerabilities
		2.7 Weak Authentication
		2.8 Exposure of Backup Data
	3 Solutions to Database Security Attacks
		3.1 Privilege Solutions
			3.1.1 Access Control
			3.1.2 Mandatory Access Management
			3.1.3 Owner Approval and Tracking
		3.2 Secured Gateways and Data Masking
		3.3 Data Sanitization, Smart Driver and IPS
		3.4 Deter Attackers, Detection and Recovery
		3.5 Configuration and Database Activity Monitoring
		3.6 Protocol Validation
		3.7 Define and Implement SSL (Security Socket Layer)
		3.8 Encryption Process and Backup Management
	4 Analysis
	5 Conclusion and Future Work
	References
Cloud Based Heterogeneous Big Data Integration and Data Analysis for Business Intelligence
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Heterogeneous Data Integration Module
		3.2 Data Analysis Module
		3.3 Data Visualization
	4 Experimental Analysis
		4.1 System Configuration and Data Set
	5 Conclusion
	References
Search Engine Optimization Challenges and Solutions
	Abstract
	1 Introduction
		1.1 Types of SEO Techniques
			1.1.1 On Page Optimization
			1.1.2 Off Page Optimization
		1.2 Working of a Search Engine
	2 Search Engine Algorithms
		2.1 An Overview of the Search Engine Algorithms
	3 Shortcomings in Search Engine Algorithms
		3.1 Impartiality [6]
		3.2 Content Spamming
			3.2.1 Spam Comments [7]
			3.2.2 Article Spinning [7]
			3.2.3 Keyword Stuffing [1, 7]
			3.2.4 Link Farm and Exchange [1]
			3.2.5 URL Redirection [1]
			3.2.6 Doorway Pages [7]
			3.2.7 Cloaking [4]
	4 Overcoming SEO Challenges
		4.1 Providing Results on the Biasis of Their Own Database
		4.2 Detection of Spammed Websites [4]
			4.2.1 Creating a Root Database
			4.2.2 Refining the Result
		4.3 Combining Spam Detection with Weighted Page Rank [4]
	5 Analysis/Review of Solutions
	6 Conclusion and Future Work
	References
Performance Assessment of Different Machine Learning Algorithms for Medical Decision Support Systems
	Abstract
	1 Introduction
	2 Literature Survey
	3 Proposed Work
		3.1 RBF Classifier
		3.2 The Input Vector
		3.3 The RBF Neurons
		3.4 The Output Nodes
		3.5 RBF Neuron Activation Function
		3.6 LR Classifier
	4 Performance Validation
	5 Conclusion
	References
Implementation of IOT in Multiple Functions Robotic Arm: A Survey
	Abstract
	1 Introduction
	2 Literature Survey
	3 Conclusion
Real Time Traffic Signal and Speed Violation Control System of Vehicles Using IOT
	Abstract
	1 Introduction
	2 Related Work
	3 System Analysis
	4 Result and Discussion
	5 Conclusion and Future Work
	References
Enhanced Financial Module in Intelligent ERP Using Cryptocurrency
	Abstract
	1 Introduction
		1.1 Crypto-Currency
	2 Literature Review
		2.1 Digital Currency
		2.2 ERP
	3 Types of Crypto-Currency
		3.1 Bit Coin
	4 Maintain of Accounts Using Block Chain in ERP
		4.1 Block Chain
	5 Architecture of ERP Using Crypto Currency
	6 Relationship Between ERP and Block Chain
	7 Distributed Ledger
	8 Future the Digital Money Brings the Transparency in the Business
	9 Conclusion and Future
Explorative Study of Artificial Intelligence in Digital Marketing
	Abstract
	1 Introduction
	2 Literature Review of AI and Digital Marketing
		2.1 Uses of AI in Digital Marketing
	3 Impact of AI on Digital Marketing in Today’ Market
	4 Some Strategies of Digital Marketing Using AI
	5 Some Companies Transforming Digital Marketing Using AI
	6 Future Scope of AI with Digital Marketing
	7 Future Impacts of Digital Marketing with Artificial Intelligence
	8 Conclusion
A Security Model for Enhancement of Social Engineering Process with Implementation of Multifactor Authentication
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Model
	4 Methodology
		4.1 Authentication of User
		4.2 Iris Recognition
		4.3 Random Numbers Generation Using Gaussian Distribution Method
		4.4 Counter Measures
	5 Experimental Results
		5.1 Password and Username
		5.2 Iris Recognition
		5.3 Session Key Generation
		5.4 Counter Measure
	6 Conclusion
	References
Implementation of IoT for Trash Monitoring System
	Abstract
	1 Introduction
	2 Literature Review
		2.1 Trash Monitoring System
		2.2 Hardware Description
	3 Problem Statement
		3.1 Advantage of the Existing System
		3.2 Limitation of the Existing System
	4 Proposed System
	5 Platforms
	6 Conclusion and Future Scope
	References
Author Index




نظرات کاربران