ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications: ICMISC 2022

دانلود کتاب مجموعه مقالات سومین کنفرانس بین المللی روندهای اخیر در یادگیری ماشینی، اینترنت اشیا، شهرهای هوشمند و برنامه های کاربردی: ICMISC 2022

Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications: ICMISC 2022

مشخصات کتاب

Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications: ICMISC 2022

ویرایش:  
نویسندگان:   
سری: Lecture Notes in Networks and Systems, 540 
ISBN (شابک) : 9811960879, 9789811960871 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 681
[682] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 18 Mb 

قیمت کتاب (تومان) : 55,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Proceedings of 3rd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications: ICMISC 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات سومین کنفرانس بین المللی روندهای اخیر در یادگیری ماشینی، اینترنت اشیا، شهرهای هوشمند و برنامه های کاربردی: ICMISC 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجموعه مقالات سومین کنفرانس بین المللی روندهای اخیر در یادگیری ماشینی، اینترنت اشیا، شهرهای هوشمند و برنامه های کاربردی: ICMISC 2022

این کتاب مجموعه ای از بهترین مقالات پژوهشی منتخب ارائه شده در کنفرانس بین المللی روندهای اخیر در یادگیری ماشین، اینترنت اشیا، شهرهای هوشمند و برنامه های کاربردی (ICMISC 2022) است که در 28 تا 29 مارس 2022 در موسسه فناوری CMR، حیدرآباد، تلانگانا، هند برگزار شد. . این کتاب حاوی مقالاتی در مورد روندهای فعلی یادگیری ماشین، اینترنت اشیا و برنامه های کاربردی شهرهای هوشمند با تاکید بر تحقیقات چند رشته ای در زمینه هوش مصنوعی و سیستم های فیزیکی سایبری خواهد بود. این کتاب یک منبع عالی برای دانشمندان، محققین پژوهشی و دانشجویان PG است تا ایده های تحقیقاتی خود را فرموله کنند و مسیرهای آینده در این زمینه ها را بیابند. علاوه بر این، این کتاب به عنوان یک کار مرجع برای درک آخرین فناوری ها توسط مهندسان عملی در سراسر جهان عمل می کند.


توضیحاتی درمورد کتاب به خارجی

The book is a collection of best selected research papers presented at the International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications (ICMISC 2022) held during 28 – 29 March 2022 at CMR Institute of Technology, Hyderabad, Telangana, India. This book will contain the articles on current trends of machine learning, internet of things, and smart cities applications emphasizing on multi-disciplinary research in the area of artificial intelligence and cyber physical systems. The book is a great resource for scientists, research scholars and PG students to formulate their research ideas and find the future directions in these areas. Further, this book serves as a reference work to understand the latest technologies by practice engineers across the globe.



فهرست مطالب

Preface
Contents
Editors and Contributors
Prognostic Investigation into Melancholic Maladies in Hinterlands
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Data Set Description and Cleaning
		3.2 Feature Engineering
		3.3 Training, Testing, and Hyperparameter Tuning
		3.4 XGBoost Based Depression Prediction
	4 Results and Discussion
		4.1 Effect of Hyperparameter Tuning on Extreme Gradient Boosting Results
	5 Conclusion
	References
Security Threats in Healthcare Systems—A Bibliometric Study
	1 Introduction
	2 Literature Review
		2.1 Cluster 1
		2.2 Cluster 2
		2.3 Cluster 3
		2.4 Cluster 4
	3 Research Methodology
	4 Conceptual Framework of Security Threats in Healthcare Systems
	5 Conclusion
	References
Impact of COVID-19 on Import and Export of Petroleum Products and Crude Oil in India
	1 Introduction
		1.1 Petroleum Products and Crude Oil
		1.2 Production and Consumption of Petroleum Products
		1.3 Prices of Crude Oil and Natural Gas
	2 Objectives
	3 Literature Review
	4 Methodology
	5 Results and Data Analysis
	6 Discussion
	7 Conclusion
	References
Stress Detection Using EEG Signal in Early Stage and Control Technique
	1 Introduction
	2 Proposed System
	3 Stress Detection
	4 Stress Reduction
	5 Result
	6 Conclusion
	References
Analysis and Rendering of Deauthentication Attack Using IoT Technology
	1 Introduction
	2 Vulnerability in Security
	3 Deauthentication Attack
	4 Research Method
		4.1 Test Tools
		4.2 External Penetration Test
	5 Result and Discussion
		5.1 Attack and Results
		5.2 Mitigation
	6 Conclusion
	References
Development of Contextual Crop Ontology for Effective Information Retrieval
	1 Introduction
		1.1 Need of an Ontology for the Agriculture Domain
		1.2 Related Work
	2 Analysis of Ontology Building Methodologies
	3 Ontology Construction—Methodology
		3.1 Knowledge Acquisition
		3.2 Ontology Design
		3.3 Ontology Development Process
		3.4 Ontology Evaluation
	4 Conclusion
	References
Detection of Hello Flooding Attacks on RPL in Internet of Things Networks Using Different Machine Learning Algorithms
	1 Introduction
	2 Related Work
		2.1 An Introduction to RPL
		2.2 Routing Attacks
		2.3 Approaches Used to Detect RPL Attacks
	3 Methodology
	4 Evaluations and Results
	5 Conclusion and Future Work
	References
Location Aided Secure Routing System in Ad-Hoc Networks
	1 Introduction
	2 Related Work
	3 Problem Formation and Design
	4 Learning Methodology
	5 Results
	6 Conclusion
	References
A Review on Behavioural Biometric GAIT Recognition
	1 Introduction
	2 Methodology of Review Process
	3 GAIT Database Preparation
		3.1 Sensor-Based Data Collection
		3.2 Vision-Based
	4 General Flow for GAIT Recognition
		4.1 Pre-processing Methods Employed in GAIT
		4.2 Feature Selection for GAIT
		4.3 Classification Models for GAIT
	5 Conclusion
	References
Vital Role of 2D CNN in Brain Malignancy
	1 Introduction
	2 Literature Survey
	3 Proposed Model
		3.1 Convolution Neural Networks
		3.2 Model Description
	4 Results and Discussion
		4.1 Confusion Matrix
	5 Conclusion and Future Scope
	References
Early-Onset Identification of Stomach Cancer Using CNN
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Flow
		3.2 Detailed Architecture
	4 Results
	5 Conclusion
	6 Future Scope
	References
Multifold Secured Bank Application Authentication Service Using Random Visual Cryptography and Multimodal Steganography with Blockchain Technology
	1 Introduction
	2 Related Work
	3 Multimodal Mask Steganography and Random Visual Cryptography
	4 Multifold Security Using Blockchain Technology
	5 Conclusion
	References
Role of Blockchain in Health Care:  A Comprehensive Study
	1 Introduction
		1.1 Key Blockchain Concepts
	2 Blockchain Use Cases in Health care
	3 Blockchain in Pharmaceutical Supply Chain
	4 Blockchain in Remote Patient Monitoring
	5 Blockchain in Health Insurance Claims
		5.1 Transforming Comprehensive Health Records into Interoperable Systems
		5.2 Smart Contracts for Management and Strategy
		5.3 Increasing the Accuracy of Fraud Detection
		5.4 Improving the Accuracy of the Directory of Service Providers
		5.5 Making the Application Process Easier for Clients
		5.6 Improving the Insurer/client Relationship
	6 IoT-Based Healthcare Monitoring Using Blockchain
	7 Healthcare Data Security Using Blockchain
	8 Blockchain Technology in Indian Healthcare System
	9 Research Challenges and Opportunities
		9.1 Blockchain Is Well-Suited for Its Intended Use
		9.2 Alignment with Governance and Regulatory Frameworks
		9.3 Integration in a Piecemeal Basis
		9.4 Education, Awareness and User-Centred Design
	10 Future Research Directions
	References
A Novel Three Dense Layered Deep Fully Connected Neural Network for Hyperspectral Image Classification
	1 Introduction
	2 Literature Review
	3 Three Dense Layered Deep Fully CNN
	4 Implementation Setup
	5 Conclusion
	References
Research Trends in Artificial Intelligence and Nature Inspired Techniques
	1 Introduction
		1.1 Artificial Intelligence-Based Nature Inspired Techniques
	2 Scientometric Analysis of Research Trends in Artificial Intelligence and Nature Inspired Techniques
		2.1 Artificial Intelligence and Allied Techniques
		2.2 Nature Inspired Techniques and Related Research in Artificial Intelligence
		2.3 Global Analysis of Artificial Intelligence and Nature Inspired Algorithms
		2.4 Year-Wise Analysis of Publication in Nature Inspired Algorithms and Artificial Intelligence Domain
		2.5 Source-Wise Analysis of Published Work in Artificial Intelligence and Nature Inspired Techniques
	3 Conclusion
	References
Comparative Analysis of Software Defect Prediction Using Dimensionality Reduction
	1 Introduction
	2 Related Works
	3 Dataset Preparation
	4 Research Methodology
		4.1 Principal Component Analysis
		4.2 Kernel Principal Component Analysis
		4.3 Sparse Principal Component Analysis
		4.4 Incremental Principal Component Analysis
		4.5 Random Forests
		4.6 Artificial Neural Networks
	5 Performance Measures
		5.1 Confusion Matrix
		5.2 Accuracy
		5.3 F1 Score
		5.4 Area Under the Curve
	6 Validation Measures
	7 Results
	8 Discussion on Results
	9 Threats to Validity
		9.1 External Validity
		9.2 Construct Validity
	10 Conclusion and Future Work
	References
An Approach to Learn Structural Similarity Between Decision Trees Using Hungarian Algorithm
	1 Introduction
	2 Background and Related Work
	3 Methodology
		3.1 Problem Definition
		3.2 Approach
	4 Structural Similarity
		4.1 Mapping Comparable Regions Between Two Trees
	5 Conclusion
	References
Design and Development of IoT-Based Intelligent Cattle Shed Management
	1 Introduction
		1.1 A Smart Village Design Cycle
	2 Literature Review
	3 Proposed Model
		3.1 Cattle Shed Atmosphere Monitoring and Controlling
		3.2 Cattle Health Monitoring
		3.3 Cattle Food and Drinking Water Monitoring and Management
		3.4 Cattle Waste Management, Biofuel, Bio-Insecticides, Biofertilizers
		3.5 Milk Process Equipment
		3.6 Processing Milk and Robotic Milking
	4 Conclusion
	References
Review Paper on Technologies to Curb Noise Pollution in No Honking Zones
	1 Introduction
	2 Present Measures to Curb Noise Pollution in No Honking Zones
		2.1 Oren Horn Usage Meter
		2.2 Project Bleep
		2.3 Horn Not Ok Campaign
		2.4 Use of Acoustic Cameras
		2.5 No Honking Signs
		2.6 IOT-Cloud-Based
	3 Need for Technology to Curb Noise Pollution
	4 Technologies to Curb Noise Pollution
		4.1 In No Honking Zones
		4.2 On Residential Roads
		4.3 Industrial and Commercial Areas
		4.4 Highways
	5 Performance Analysis
	6 Conclusion
	References
News Channel Debate Analysis: A Detailed Insight
	1 Introduction
	2 Techniques and Tools Used
		2.1 Non-negative Matrix Factorization
		2.2 TF-IDF Vectorization
		2.3 Classification Algorithms—KNN and SVC
		2.4 VTT to Transcript
		2.5 Bokeh Library
	3 Literature Review
	4 Proposed Methodology
		4.1 Topic Modeling and Classification
		4.2 Data Acquisition
		4.3 Stopwords List
		4.4 Topic Modeling
		4.5 Classification
		4.6 Profiling
		4.7 Comparison
	5 Results
	6 Analysis
	7 Conclusion
	8 Further Scope
	References
Disease Recognization of Plant Using Different Image Processing Algorithm
	1 Introduction
	2 Literature Survey
	3 Existing Methodology
		3.1 Image Acquisition
		3.2 Segmentation of Image
		3.3 Feature Extraction
		3.4 Classification
		3.5 Performance Measures
	4 Conclusion
	References
A Detailed Survey on Sentimental Analysis on Social Media
	1 Introduction
	2 Literature Survey
	3 Approaches
		3.1 Naïve Bayes
		3.2 Maximum Entropy
		3.3 Lexicon-Based
	4 Procedure
	5 Conclusion
	References
Perceiving Correlation Among Spatiotemporal Gait Parameters and Verifying Its Relation Using Machine Learning Classification Technique Pilot Study for Indian Population
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Findings and Discussion
		4.1 Age and Walking Velocity
		4.2 Age and Cadence
		4.3 Leg Length—Step Length Correlation Coefficient
	5 Test Cases for Correlation Verification
	6 Conclusion
	References
Radial Basis Neural Network Trained Minimum Snap Trajectory for Quadrotor
	1 Introduction
	2 Problem Formulation
	3 Minimum Snap Trajectory Generation
		3.1 Proposed RBNN Trained Trajectory
	4 Simulation Results and Discussion
	5 Conclusion
	References
REMICARE—Medicine Intake Tracker and Healthcare Assistant
	1 Introduction
	2 Related Work
		2.1 Literature Survey on Different Techniques of OCR
		2.2 Literature Survey on Different Techniques of Storage and Security Data
	3 Proposed System
		3.1 Image Processing
		3.2 Secure Storage
	4 Conclusion
	References
Detection of Fraudulent Credit Card Transactions in Real Time Using SparkML and Kafka
	1 Introduction
	2 Literature Review
	3 System Architecture
	4 Methodology
		4.1 Dataset
		4.2 Data Prepossessing
		4.3 Machine Learning Models
		4.4 Kafka
		4.5 Streamlit Visualizations
	5 Results
	6 Conclusion
	References
Real-Time Face Detection and Face Recognition: Study of Approaches
	1 Introduction
	2 Related Work
		2.1 Procedure for Face Detection
		2.2 Various Face Detection Techniques
		2.3 Various Face Recognition Techniques
	3 Experiment Design
		3.1 Learning About OpenCV
		3.2 Learning About Haar Cascades
		3.3 Dataset for Model
		3.4 Building Model
	4 Results and Discussion
		4.1 Limitations
	5 Conclusion
	6 Future Work
	References
ASIC Implementation of AI Edge Network on Chip (NoC) at 28 nm Technology Node and Its Various Timing Optimization Techniques at Each Stage
	1 Introduction
	2 Network on Chip (NOC) Architecture
	3 Physical Design Flow
	4 Implementation of AI Edge Networking Chip at 28 NM Technology Node
	5 Simulation and Results
	6 Conclusion
	References
3D IC Integration Using Blockchain
	1 Introduction
		1.1 Research Aim and Objectives
		1.2 Research Contribution
		1.3 Paper Organization
	2 Literature Survey
	3 Problem Statement
		3.1 Research Solutions
	4 Proposed Work
		4.1 Netlist Protection
		4.2 Trojan Detection
		4.3 Placement and Routing
		4.4 Dynamic IC Validation
	5 Experimental Study
		5.1 Simulation Study
		5.2 Comparative Analysis
		5.3 Security Analysis
	6 Conclusion and Future Work
	References
Fire Detection Through Surveillance Videos Using Deep Learning in Real-World Applications
	1 Introduction
	2 Literature Survey
	3 Dataset Collection
	4 Proposed Methodology
	5 Frame by Frame Video Detection
	6 Results and Discussion
	7 Conclusion
	References
A Survey on Battery State of Charge and State of Health Estimation Using Machine Learning and Deep Learning Techniques
	1 Introduction
	2 Related Work
	3 Types of Battery Along with Its Characteristics
		3.1 Non-rechargeable Battery
		3.2 Rechargeable Battery
		3.3 Characteristics of Rechargeable and Non-rechargeable Batteries
	4 SOC and SOH Estimation
	5 How ML Algorithms Appropriate in SOH Estimation
	6 Deep Learning Techniques Suitable in Battery Health and Charge Estimation
	7 Survey Table on Techniques Used, Battery Estimation, Advantages
	8 Conclusion
	References
Robust and Scalable Network Monitoring System Using Apache Spark
	1 Introduction
	2 Literature Review
		2.1 RAL—Reinforcement Active Learning for Network Traffic Monitoring and Analysis
		2.2 Design and Development of Centralized Squid Proxy Management System
		2.3 An Efficient Network Monitoring and Management System
		2.4 An Educational HTTP Proxy Server
		2.5 Network Monitoring System for High Speed Network Traffic
	3 Proposed Methodology
		3.1 Proxy Server System Design
		3.2 Central Monitoring System
		3.3 Clustering
	4 Results
	5 Conclusion
	References
Managing Data Protection and Privacy on Cloud
	1 Introduction
		1.1 Impact of Data Leakage on Individuals
		1.2 Impact of Data Leakage on Organizations
		1.3 Data Discovery
	2 Data Protection
		2.1 Encryption Methods for Cloud
	3 Conclusions
	References
Vehicular Communication Strategy Using Machine Learning and Image Processing to Enhance Observations and Control on the Road Side Area
	1 Introduction
	2 Background
		2.1 Close Loop Strategies (CLS)
		2.2 Open Loop Strategies (OLS)
	3 Proposed Strategy
	4 Performance Evaluation
	5 Conclusion
	References
Emotional Labour and Perceived Stress at Workplace—HR Analytics
	1 Introduction
	2 The Literature Survey—Emotional Labour at the Workplace
	3 Factors Affecting Emotional Labour
	4 Dataset
	5 Results
	6 Conclusions
	Bibliography
Autonomous Traffic Sign Detection and Recognition in Real Time
	1 Introduction
	2 Literature Survey
	3 Proposed TSDR Architecture
	4 Results and Discussion
	5 Conclusion and Future Enhancements
	References
Human Posture Monitoring
	1 Introduction
	2 Literature Survey
	3 Proposed Work
	4 Result Analysis
		4.1 Case Study
	5 Future Scope
	6 Conclusion
	References
Classification of Devanagari Characters Dataset Using Deep Learning Methods
	1 Introduction
	2 Related Work
	3 Architecture of the System
	4 Technologies for Implementation
		4.1 Convolutional Neural Network
		4.2 AlexNet
		4.3 GoogLeNet
	5 Results and Analysis
	6 Conclusion and Future Work
	References
LightHARs: A Light Human Activity Recognition System
	1 Introduction
	2 Background Work
	3 Dataset
	4 Preprocessing
		4.1 Labeling
		4.2 Training and Testing Data
	5 Proposed Section
		5.1 LightHARs Overview
		5.2 Architecture of LightHARs
	6 Results and Discussion
		6.1 LightHARs Comparison with Existing Model
	7 Conclusion
	References
Twitter Data Analysis to Enhance Malware Detection Using ML
	1 Introduction
	2 Literature Survey
	3 Datasets Description
	4 Proposed Methodology
		4.1 Data Collection
		4.2 Data Visualization
		4.3 Scrapping Play Store
		4.4 System Flow Chart
		4.5 Detecting Bots on Twitter Using Machine Learning
	5 Result
	6 Model Performance Testing
	7 Results and Discussion
	8 Conclusion
	References
Prediction of Osteosarcoma Using Machine Learning Techniques
	1 Introduction
	2 Literature Review
	3 Research Methodology
		3.1 Pre-processing
	4 Proposed Work
		4.1 Extra Trees Classifier
		4.2 Convolutional Neural Network (CNN)
		4.3 Concatenation of Groups
	5 Results
	6 Conclusion
	References
Detection of Age and Gender from Facial Images Using CNN
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 Dataset
		3.2 Data Preprocessing
		3.3 Split the Train and Test Dataset
		3.4 Building Up the Model
		3.5 Algorithm
		3.6 Classification
		3.7 Performance Metrics
	4 Results and Analysis
	5 Conclusion
	References
A Survey on Detecting Location-Based Faults in Wireless Sensor Networks Using Machine Learning and Deep Learning Techniques
	1 Introduction
	2 Types of Faults in WSN
	3 ML and DL in Improving Fault Tolerance in WSN
		3.1 Role of ML and DL in Anomaly Detection
		3.2 Role of ML and DL in Detecting Location-Based Faults
	4 Conclusion
	References
Gesture Recognition and Conversion to Speech for Specially Abled
	1 Introduction
	2 Literature Survey
	3 Comparative Analysis
	4 Conclusion
	References
Modified Mobility Aware MAC Algorithm to Improve the Lifetime of Dynamic Wireless Sensor Network
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Performance Analysis
	5 Conclusion
	References
An Analysis of Levenshtein Distance Using Dynamic Programming Method
	1 Introduction
	2 Related Works
	3 Dynamic Programming
		3.1 The Sub-problems
	4 Methodology
		4.1 The Algorithm
	5 Experiment and Result
		5.1 The Distance Matrix
	6 Conclusion
	References
Formula One Race Analysis Using Machine Learning
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Dataset Description
		3.2 Workflow of the Project
		3.3 Logistic Regression Algorithm
		3.4 Decision Tree Algorithm
		3.5 Random Forest Algorithm
		3.6 Support Vector Machine Algorithm
	4 Experiment and Results
	5 Conclusion
	References
IoT Enabled Water Conservation System Using LoRa LPWAN Networks
	1 Introduction
	2 Empirical Survey
	3 System Design
	4 Methodology
		4.1 LoRa SX1276 Transceiver
		4.2 LPS8 LoRaWAN Gateway
		4.3 Flow Rate Sensor
		4.4 Solinoid Valve Actuator
		4.5 Liquid Crystal Display (20 × 4)
	5 Flowchart
	6 Results and Discussions
	7 Conclusion
	References
Review on Impact of Attacks as a Malicious Node in MANET
	1 Introduction
	2 Types of Attack
		2.1 Control Traffic Attack
		2.2 Data Traffic Attack
	3 Existing Defense Mechanism in MANET
	4 Impact of Control and Data Traffic Attack
	5 Proposed Scheme
	6 Result
	7 Conclusion
	References
Automation in Project Management 4.0 with Artificial Intelligence
	1 Introduction
	2 AI in Project Management 4.0
	3 Results and Discussion
	4 Conclusion
	References
Prediction in Industry 4.0 with Lean Six Sigma
	1 Introduction
	2 AI and Six Sigma in Industry 4.0
	3 Results and Discussion
	4 Conclusion and Future Scope
	References
Optimized Buffer Management System in Delay Tolerant Network
	1 Introduction
		1.1 Static and Protocol-Specific Strategies
		1.2 Static and Non-protocol-Specific Strategies
		1.3 Dynamic and Protocol-Specific Strategies
		1.4 Dynamic and Non-Protocol-Specific Strategies
	2 Related Work
	3 Discussion
	4 Conclusion
	References
A State of the Art Approaches to Question Generation Techniques
	1 Introduction
	2 Literature Review
	3 Conclusion
	References
Solid Waste Management Using Machine Learning Algorithm for Smart Cities
	1 Introduction
	2 Types of Solid Waste
		2.1 Biomedical Waste
		2.2 Biodegradable Waste
		2.3 E-waste
		2.4 Plastic Waste
	3 Case Study
	4 Results
	5 Conclusion
	References
Estimation of the Variance of Parameters in a Model Proposed to Study Prognosis of Lung Cancer
	1 Introduction
	2 Model A and Notations
	3 Expressions for the Variance of Parameters
		3.1 Derivation of Variance of Parameters for a Parabolic Fit
	4 Results and Conclusion
	References
Mono Versus Multilingual BERT: A Case Study in Hindi and Marathi Named Entity Recognition
	1 Introduction
	2 Related Work
	3 Experimental Setup
		3.1 Dataset
		3.2 Model Architecture
	4 Result
	5 Conclusion
	References
Role of Remote Sensing in Precision Agriculture
	1 Introduction
	2 Remote Sensing in Precision Agriculture
	3 Previous Research
	4 Dataset Acquisition
	5 Experimentation Analysis
		5.1 Determining Elevation Above Sea Level
		5.2 Distinguishing Between Water and Terrain Bodies
		5.3 Determining Spectral Indices
		5.4 LST Analysis
	6 Conclusions and Future Work
	References
A Novel 18-Convolutional Layered Deep U-Net Architecture for COVID-19 Infection Diagnosis Through Object Detection on Lung CT Scan Segmentation
	1 Introduction
	2 Literature Review
	3 Proposed 18-Convolution Layered Deep U-Net Architecture
	4 Implementation Setup
	5 Conclusion
	References
An Innovative Cloud Security and Data Sharing Across Multi-clouds Through PACM Techniques
	1 Introduction
	2 Literature Survey
	3 Key Exchange Mechanism
	4 Methodology of Key Exchange
		4.1 Algorithm for Encryption
		4.2 Extract My_Aggregate_Key1 (D1, S1)
		4.3 Algorithm for Decryption
		4.4 Extract_My_Decryption (C1, Aggr1, Key1, S1)
	5 Results and Discussion
	6 Conclusion
	References
Performance Analysis of Classification Algorithms
	1 Introduction
	2 Literature Review
	3 Analysis and Design
	4 Experimental Studies
	5 Conclusions and Future Work
	References
Intelligent Information System for Detection of COVID-19 Based on AI
	1 Introduction
		1.1 History and Growth of Information System
		1.2 DIKW (Data, Information, Knowledge, and Wisdom) Chain
	2 Use of IIS for Detecting COVID-19
		2.1 Decision Support System
	3 Proposed Model
		3.1 Performance Parameter
	4 Results and Discussions
	5 Conclusion
	References
Plant Quality Assessment and Disease Identification System Using AI
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 CNN Architecture
		3.2 Flowchart
		3.3 Data Collection and Inspection
		3.4 Image Processing
		3.5 Image Augmentation and Feature Extraction
		3.6 Model Training
		3.7 Cloud Computing
	4 Results and Discussion
	5 Conclusion and Future Scope
	References
Image-Based Plant Disease Detection and Classification Using Deep Convolution Neural Network
	1 Introduction
	2 Literature Survey
		2.1 Leaf Disease Detection Using Deep Learning (CNN)
		2.2 Leaf Disease Detection Using Supervised Learning
		2.3 Work Related to Leaf Disease Detection Using Unsupervised Learning
	3 Proposed Methodology
		3.1 System Architecture
		3.2 Dataset Description
	4 Results
	5 Conclusion
	References
Author Index




نظرات کاربران