ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of Emerging Trends and Technologies on Intelligent Systems : ETTIS 2021

دانلود کتاب مجموعه مقالات روندها و فناوری های نوظهور در سیستم های هوشمند: ETTIS 2021

Proceedings of Emerging Trends and Technologies on Intelligent Systems : ETTIS 2021

مشخصات کتاب

Proceedings of Emerging Trends and Technologies on Intelligent Systems : ETTIS 2021

ویرایش:  
نویسندگان: , ,   
سری: Advances in Intelligent Systems and Computing, Volume 1371 
ISBN (شابک) : 9789811630972, 9811630976 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: [361] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 9 Mb 

قیمت کتاب (تومان) : 31,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Proceedings of Emerging Trends and Technologies on Intelligent Systems : ETTIS 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات روندها و فناوری های نوظهور در سیستم های هوشمند: ETTIS 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجموعه مقالات روندها و فناوری های نوظهور در سیستم های هوشمند: ETTIS 2021

این کتاب بهترین مقالات برگزیده ارائه شده در کنفرانس بین‌المللی گرایش‌ها و فناوری‌های نوظهور در سیستم‌های هوشمند (ETTIS 2021) را ارائه می‌کند که از 4 تا 5 مارس 2021 در حالت آنلاین در C-DAC، نویدا، هند برگزار شد. این کتاب شامل کارهای تحقیقاتی جاری در زمینه‌های هوش مصنوعی، داده‌های بزرگ، سیستم‌های فیزیکی-سایبری و امنیت در تنظیمات صنعتی/دنیای واقعی است. این کتاب نتایج تحقیقاتی در حال انجام، پروژه ها، کارهای نقشه برداری و تجربیات صنعتی را نشان می دهد که پیشرفت های قابل توجهی را در تمام زمینه های مرتبط توصیف می کند.


توضیحاتی درمورد کتاب به خارجی

This book presents best selected papers presented at the International Conference on Emerging Trends and Technologies on Intelligent Systems (ETTIS 2021) held from 4 – 5 March 2021 in online mode at C-DAC, Noida, India. The book includes current research works in the areas of artificial intelligence, big data, cyber-physical systems, and security in industrial/real-world settings. The book illustrates on-going research results, projects, surveying works, and industrial experiences that describe significant advances in all of the related areas.



فهرست مطالب

Preface for ETTIS-2021
Contents
About the Editors
Application Layer DDOS Attack Detection and Defense Methods
	1 Introduction
	2 Application Layer DDOS Attacks
	3 Application-Layer DDOS Attack Detection Techniques
		3.1 Signature Detection Techniques
		3.2 Anomaly Detection Techniques:
		3.3 Hybrid Detection Techniques
	4 Application Layer DDOS Attacks Defense Techniques
		4.1 Defense Techniques
		4.2 Detection and Defense Techniques
	5 Conclusion
	References
Identification and Analysis of Threat Vector for Security Evaluation of LAN
	1 Introduction
		1.1 Methods
	2 Literature Review
	3 Implementation
		3.1 Analyzing Threat Vectors
		3.2 Weightages of Threat Vectors
		3.3 Risk Calculation Criterion
		3.4 Risk Calculations
		3.5 Applying the Algorithm
	4 Case Study
	5 Observations and Results
	6 Conclusions
	References
Review of Stack-Based Binary Exploitation Techniques
	1 Introduction
	2 Stack-Based Exploitation
	3 Buffer Overflow
	4 Format Strings
		4.1 Reading from an Arbitrary Memory Address
		4.2 Writing to an Arbitrary Memory Address
		4.3 Short Writes
		4.4 Direct Parameter Access
		4.5 .dtors
		4.6 Overwriting Global Offset Table [21]
	5 Mitigation Techniques
		5.1 NX/DEP
		5.2 Bypassing NX/DEP Using ROP
		5.3 ASLR
		5.4 Bypassing ASLR Using Brute Force [31]
		5.5 Bypassing ASLR Using Information Leak
	6 A Case Study of CVE-2019–18634
	7 Conclusion
	References
OntoBlogDis: A Knowledge-Centric Ontology Driven Socially Aware Framework for Influential Blogger Discovery
	1 Introduction
	2 Related Works
	3 Proposed System Architecture
	4 Implementation and Performance Evaluation
	5 Conclusion
	References
An Ontology-Based Semantic Approach for First Aid Prediction in Aviation Services Incorporating RBFNN Over a Cloud Server
	1 Introduction
	2 Related Works
	3 Proposed Architecture
	4 Implementation and Results
	5 Conclusions
	References
Benchmarking Analysis of CNN Architectures for Artificial Intelligence Platforms
	1 Introduction
	2 Convolutional Neural Networks
		2.1 Architecture of CNN
	3 Datasets
	4 Simulation Results and Observations
		4.1 Benchmarking Application and Flow
		4.2 Cross-Check Tool
	5 Results and Discussions
		5.1 FPS Versus Batch Size
		5.2 AlexNet
		5.3 SqueezeNet 1.1
		5.4 VGG 16
		5.5 GoogleNet/Inception
		5.6 Overall Observed Results for CNN Models
	6 Conclusion and Future Work
	References
Welding Defect Inspection Using Deep Learning
	1 Introduction
		1.1 Motive for Work
	2 Transfer Learning in Image Classification
		2.1 VGG16 Model Architecture
		2.2 Dataset
		2.3 Training Different Models
		2.4 Evaluation Metric
	3 Results
	4 Conclusion
	References
Image Generation Using GAN and Its Classification Using SVM and CNN
	1 Introduction
	2 Literature Review
	3 Material and Methods
		3.1 The Generative Adversarial Networks Model
		3.2 Creating the Generator (G) Neural Network
		3.3 Creating the Discriminator (D) Neural Network
		3.4 Creating SVM Classifier
		3.5 Creating a CNN Classifier
		3.6 Creating GAN
		3.7 Training the GAN
	4 Experimental Setup
	5 Results and Discussion
	6 Conclusion and Future Scope
	References
VDNet: Vehicle Detection Network Using Computer Vision and Deep Learning Mechanism for Intelligent Vehicle System
	1 Introduction
	2 Related Works
		2.1 Based on Image Processing
		2.2 Based on Deep Learning
	3 Materials and Method
		3.1 Dataset Preparation
		3.2 Detection Module
	4 Results and Discussion
		4.1 Qualitative Analysis
		4.2 Quantitative Analysis
		4.3 Detection Results and Comparison of Performance
	5 Conclusion
	References
FCNet: Flower Classification Using Custom-Made Convolution Neural Network and Transfer Learning
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
		3.1 Dataset Details
		3.2 Classification
	4 Experimental Results
		4.1 Accuracy Versus Number of Epochs
		4.2 Loss Versus Number of Epochs
		4.3 Comparison Table
	5 Conclusion and Future Work
	References
Application of Random Vector Functional Link Network for Software Defect Prediction
	1 Introduction
	2 Related Work
	3 PCA–RVFL: The Proposed Model for Software Defect Prediction
		3.1 Dimensionality Reduction Using Principal Component Analysis
		3.2 Classification Using Random Vector Functional Link Network
		3.3 Pseudo-code for PCA–RVFL
	4 Experimental Setup and Framework
		4.1 Dataset
		4.2 Variables
		4.3 Performance Measures
		4.4 Parameter Settings
	5 Experimental Results and Analysis
		5.1 RQ1. What is the Prediction Performance of PCA–RVFL in Comparison with Other ML Techniques for Within-Project Scenarios in SDP?
		5.2 RQ2: What is the Prediction Performance of PCA–RVFL in Comparison with Other ML Techniques for Inter-release Scenarios in SDP?
		5.3 RQ3: What is the Computational Efficiency of PCA–RVFL in Comparison with Other Traditional Neural Network Architectures?
	6 Conclusion
	References
Nikbot: Chatbot for Nikshay Aushadhi
	1 Introduction
	2 Proposed System
		2.1 System Architecture
		2.2 Nikbot User Interface
		2.3 Nikbot Back-End
		2.4 Chatterbot Conversational Logic
		2.5 Nikbot Implementation Data Collection
		2.6 IT Cell User Interface
	3 Conclusion
	4 Future Work
	References
Predicting Hospital Bed Occupancy: A Pilot Evaluation for Tertiary Hospitals in India
	1 Introduction
	2 Related Work
	3 Approach and Models Used
		3.1 Baseline Computation of Bed Occupancy
		3.2 Features for Modeling Bed Occupancy
		3.3 Modeling for Estimating Bed Occupancy
	4 Results
		4.1 Dataset Description
		4.2 Feature Selection for Bed Occupancy
		4.3 Quantitative Results on Bed Occupancy Prediction
	5 Conclusion and Future Work
	References
An Ensemble Approach for Modeling Process Behavior and Anomaly Detection
	1 Introduction
	2 Background
		2.1 Anomaly Detection
		2.2 Autoencoder
	3 Dataset
		3.1 Features
	4 Proposed Method
		4.1 Overview
		4.2 Unsupervised Tree-Based Anomaly Detector (UTAD)
		4.3 Prediction Using Ensemble Model
	5 Experimental Results
		5.1 Autoencoder Training and Prediction
		5.2 UTAD Training and Prediction
		5.3 Ensemble Model
	6 Conclusion
	7 Further Research
	References
Predicting Employability of Candidates: Comparative Study of Different Machine Learning Models
	1 Introduction
		1.1 Dataset Description
	2 Literature Survey
	3 Methodology
		3.1 Dimensionality Reduction (Logistic Regression)
		3.2 K Means Clustering
		3.3 Using PyCaret Package
		3.4 Deep Learning Model
	4 Results
	5 Conclusion
	References
Speech Recognition for Medical Conversations Health Record (MCHR)
	1 Introduction
	2 Proposed Idea
		2.1 Module 1 (Speech to Text)
		2.2 Module 2 (Speech Analysis)
	3 Analysis
		3.1 Purpose of Recording
	4 Technology Stack
	5 Proposed System
		5.1 Data Collection
		5.2 Data Preprocessing
	6 Conclusion and Future Work
	References
Albatross Optimization Algorithm: A Novel Nature Inspired Search Algorithm
	1 Introduction
	2 Bio-inspiration
	3 Algorithm
	4 Implementation
	5 Evaluation
		5.1 Dataset
		5.2 Neural Network
	6 Results
	7 Comparison
		7.1 Comparison with Back-propagation
		7.2 Comparison with Whale Optimization Algorithm
	8 Conclusion and Future Work
	References
NLP-Based Tools for Decoding the Language of Life
	1 Introduction
	2 NLP Real-World Applications
		2.1 Search Engines
		2.2 Spell Check
		2.3 Spam Filter
		2.4 Diagnosis of Diseases
		2.5 Virtual Assistants
		2.6 Machine Translation
	3 NLP in Bioinformatics
	4 Research Work
	5 Recent Advances
	6 Future Prospects
	References
Zomato Review Analysis Using NLP
	1 Introduction
		1.1 Overview
		1.2 Existing Methods and Recent Works
	2 Proposed Method and Solution
		2.1 Method
		2.2 Solution
	3 Experimental Results
		3.1 Theoretical Analysis
		3.2 Natural Language Processing (NLP)
		3.3 Artificial Neural Network (ANN)
	4 Conclusion and Future Scope
	References
LSB Technique-Based Dual-Image Steganography Using COS Function
	1 Introduction
	2 Proposed Work
		2.1 Embedding and Encryption Method
		2.2 Extraction and Decryption Method
	3 Simulation Analysis
	4 Conclusion
	References
‘NIS’ a Network Investigation System
	1 Introduction
		1.1 Resources
		1.2 People
		1.3 Environment
	2 Problem Statement
	3 NIS and Its Methodology
		3.1 Origin
		3.2 Features of NIS
		3.3 Technology Used
		3.4 Architecture of NIS
		3.5 Methodology and Workflow
		3.6 Exceptional Elements of NIS
	4 Results
	5 Future Scope and Conclusion
	References
Improvement in SHA-3 Algorithm Using Different Internal Methods and Operations
	1 Introduction
	2 Related Work
		2.1 Theta (θ)
		2.2 Rho (ρ)
		2.3 Pi (π)
		2.4 Chi (χ)
		2.5 Iota (ι)
	3 Proposed Architecture
		3.1 Theta (θ)
		3.2 Rho (ρ)
		3.3 Chi (χ)
		3.4 Iota (ι)
	4 Results
	5 Conclusions
	6 Future Scope and Limitations
	References
Stuck at Fault Testing in Combinational Circuits Using FPGA
	1 Introduction
		1.1 Stuck at Faults
	2 Followed Approach
	3 Implementation and Simulation Results
	4 Conclusion and Future Work
	References
How Efficient Is Blockchain While Dealing with Android Malware? A Review Paper
	1 Introduction
	2 Android Malware Attacks and Challenges for Detection and Analysis
		2.1 Aspects of Android Malware Attacks
		2.2 Android Malware Attack Surface Analysis
		2.3 Android Malware Detection and Analysis
		2.4 Challenges in Android Malware Detection
		2.5 Technological Transformation for Detection of Android Malwares
	3 Blockchain
		3.1 Blockchain in Cyber-Security
		3.2 Blockchain in Mobile Application Security
		3.3 Blockchain in Android Malware Detection
		3.4 Discussion
	4 Conclusion
	References
Performance Evaluation of Parameters for Wi-Fi Network for Oil Pipeline Management Using OPNET Simulator
	1 Introduction
	2 Proposed Architecture
		2.1 Hooter Section
		2.2 End User
	3 Simulation Environment
	4 Results and Discussion
		4.1 Media Access Delay
		4.2 Throughput
		4.3 Data Traffic
		4.4 Retransmission Attempts
	5 Conclusion
	References
Design and Development of Industrial IoT Gateway for Robotic Arm Control
	1 Introduction
	2 Existing System
	3 Proposed Solution
	4 System Design
	5 Implementation
	6 Future Scope
	References
On the Development of a Mobile TurtleBot3 Burger Multi-robot System for Manufacturing Environment Monitorization
	1 Introduction
	2 Modelling and Simulation of Multi-robot Systems
		2.1 Workspace Presentation: Flexible Manufacturing Line
		2.2 Simulation of Multi-robot Systems
	3 Simultaneous Localization and Mapping in Manufacturing Environment
	4 The Experimental Mobile Multi-robot System
		4.1 Description of the Experimental Multi-robot System
		4.2 SLAM Simulation Using Mobile Multi-robot System
		4.3 Simultaneous Localization and Mapping Approach for Mapping and Navigate into an Industrial Environment Using Turlebot3 Burger Robot
		4.4 Manufacturing Environment Monitorization—Data Collection
	5 Conclusion and Future Work
	References
Automated Public Transport System Using IoT
	1 Introduction
	2 Literature Study
	3 Proposed Work
		3.1 Automated Bus Stops Announcement System
		3.2 Ticket Booking Application
	4 Claims and Result
		4.1 Principal Claims
		4.2 Dependent Claim
	5 Conclusion
	References
USWSBS: User-Centric Sensor and Web Service Search for IoT Application Using Bagging and Sunflower Optimization
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Implementation and Performance Evaluation
		4.1 Dataset Preparation
		4.2 Implementation
	5 Results and Performance Evaluation
	6 Conclusions
	References
Author Index




نظرات کاربران