ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of Fourth International Conference on Computer and Communication Technologies: IC3T 2022

دانلود کتاب مجموعه مقالات چهارمین کنفرانس بین المللی کامپیوتر و فناوری های ارتباطی: IC3T 2022

Proceedings of Fourth International Conference on Computer and Communication Technologies: IC3T 2022

مشخصات کتاب

Proceedings of Fourth International Conference on Computer and Communication Technologies: IC3T 2022

ویرایش:  
نویسندگان: , , , ,   
سری: Lecture Notes in Networks and Systems, 606 
ISBN (شابک) : 9811985626, 9789811985621 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 656
[657] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 19 Mb 

قیمت کتاب (تومان) : 41,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Proceedings of Fourth International Conference on Computer and Communication Technologies: IC3T 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات چهارمین کنفرانس بین المللی کامپیوتر و فناوری های ارتباطی: IC3T 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجموعه مقالات چهارمین کنفرانس بین المللی کامپیوتر و فناوری های ارتباطی: IC3T 2022

این کتاب مجموعه‌ای از مقالات علمی با کیفیت بالا است که در چهارمین کنفرانس بین‌المللی فناوری‌های رایانه و ارتباطات (IC3T 2022) ارائه شده است. این کتاب فناوری‌های پیشرفته و کاربردهای محاسبات نرم، هوش مصنوعی و ارتباطات را پوشش می‌دهد. علاوه بر این، موضوعات مختلفی مورد بحث قرار می گیرد که شامل داده کاوی، هوش ماشینی، محاسبات فازی، شبکه های حسگر، پردازش سیگنال و تصویر، تعامل انسان و کامپیوتر و هوش وب می شود.


توضیحاتی درمورد کتاب به خارجی

The book is a compilation of high-quality scientific papers presented at the 4th International Conference on Computer & Communication Technologies (IC3T 2022). The book covers cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, and web intelligence.



فهرست مطالب

Preface
Contents
Editors and Contributors
Plant Diseases Detection Using Transfer Learning
	1 Introduction
	2 Literature Review
	3 Proposed Model
		3.1 Data Preprocessing
		3.2 Data Augmentation
		3.3 Proposed Approach—Transfer Learning
	4 Experimental Framework
		4.1 Implementation Details
	5 Result and Discussion
	6 Conclusion and Future Work
	References
Shuffled Frog Leap and Ant Lion Optimization for Intrusion Detection in IoT-Based WSN
	1 Introduction
	2 Literature Survey
	3 Problem Statement
	4 Proposed Method
		4.1 Computation of the Fit Factor
		4.2 Shuffled Frog Leap Algorithm
		4.3 Ant Lion Optimization (ALO)
	5 Results and Discussion
		5.1 Black Hole Attack at 50 Nodes
		5.2 DDOS Attack at 50 Nodes
	6 Conclusion
	References
A Comprehensive Alert System Based on Social Distancing for Cautioning People Amidst the COVID-19 Pandemic Using Deep Neural Network Models
	1 Introduction
	2 Objectives
	3 Literature Review
	4 Proposed Methods in Continuous Development
	5 Performance Metrics
	6 Data Collection
	7 Outcome
	8 Comparison Values of Various Methodologies as Determined by Various Studies
	9 Conclusion and Future Scope
	References
An Improved Image Enhancing Technique for Underwater Images by Using White Balance Approach
	1 Introduction
	2 Literature Survey
	3 Existing Method
		3.1 Red Channel Compensation
		3.2 Colour Correction
		3.3 Histogram Stretching
	4 Proposed Method
		4.1 Histogram Equalizaton
	5 Experimental Results
	6 Conclusion
	References
32-Bit Non-pipelined Processor Realization Using Cadence
	1 Introduction
		1.1 Literature Review
	2 Implementation
		2.1 Simulations
		2.2 Program Code
	3 Conclusion
	References
Metaverse: The Potential Threats in the Virtual World
	1 Introduction
	2 Various Technologies in the Metaverse
		2.1 Role of Virtual Reality
		2.2 Role of Augmented Reality
		2.3 Role of Blockchain
		2.4 Role of Artificial Intelligence
		2.5 Role of NFT
	3 Are We Ready for Metaverse?
		3.1 Issues in Metaverse
	4 Discussions
	5 Conclusion
	References
A Mobile-Based Dynamic Approach to Comparative Study of Some Classification and Regression Techniques
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Application Development Approach
		3.2 Building Machine Learning Pipeline
		3.3 Enabling Machine Learning Pipeline in a Flask Environment
		3.4 Through Flask Create an API that Takes a CSV File and Send Results
		3.5 Create a Flutter Application that Can Interact with the API and Show Results from the Server
	4 Results
	5 Conclusion and Future Scope
	References
Land Cover Mapping Using Convolutional Neural Networks
	1 Introduction
	2 Related Work
	3 Proposed Methodologies
		3.1 VGG16
		3.2 Convolutional Neural Network (CNN)
		3.3 Fast.AI
	4 Experimental Analysis
	5 Architecture
	6 Observations
	7 Conclusion
	References
Establishing Communication Between Neural Network Models
	1 Introduction
		1.1 Among Us
		1.2 Adversarial Networks
		1.3 Multi-agent Communication
	2 Approach
		2.1 Deductive Situation
		2.2 Modeling Interpretation and Communication
		2.3 Zero-Sum Target
		2.4 Training Scheme
		2.5 Challenges
		2.6 Situation Hyperparameters
	3 Results
		3.1 Oscillating Scores
		3.2 Interpreting Communication Vectors
	4 Conclusion
	References
Hardware Implementation of Cascaded Integrator-Comb Filter Using Canonical Signed-Digit Number System
	1 Introduction
	2 Method
	3 CIC Decimation Filter
		3.1 Design Example
	4 Approach of CSD Number System
	5 Hardware Implementation Results
	6 Conclusion
	References
Study of Security for Edge Detection Based Image Steganography 
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
	4 Results and Performance Analysis
	5 Conclusion and Future Work
	References
Fake Face Image Classification by Blending the Scalable Convolution Network and Hierarchical Vision Transformer
	1 Introduction
	2 Literature Review
		2.1 Fake Image Generation
		2.2 Fake Image Detection Techniques
	3 Proposed Method
		3.1 Preprocessing
		3.2 EfficientNet
		3.3 SWIN Transformer
	4 Results and Discussions
		4.1 140 K Real and Fake Faces
		4.2 Experimental Set-Up
		4.3 Discussions
	5 Conclusion
	References
Performance Analysis of Osteoarthritis from Knee Radiographs Using Convolutional Neural Networks
	1 Introduction
	2 Literature Survey
		2.1 Classification of the Knee Joints Using Pre-trained CNNs
		2.2 Classifications of Knee Joint from Fine-Tuned CNN Numbering
	3 Material and Methods
	4 Results and Discussion
		4.1 Evaluation Metrics
	5 Conclusion
	References
Efficient Motion Detection and Compensation Using FPGA
	1 Introduction
		1.1 Related Work
	2 Architecture Framework
		2.1 Controller Unit
		2.2 Motion Recognition
		2.3 Motion Correction
	3 Results and Discussion
		3.1 FPGA Implementation
		3.2 Performance Evaluation
	4 Conclusion
	References
Discover Crypto-Jacker from Blockchain Using AFS Method
	1 Introduction
	2 Crypto-Jacking Attack
		2.1 How Crypto-Jacking Characters Are Extend
		2.2 Attack Methods
	3 Crypto-jacking Attack Model
		3.1 Running
		3.2 Reborn
		3.3 Submerge
		3.4 Poisoned
	4 Proposed Approaches
		4.1 Proposed Model Training Process System
	5 Our Experiment
	6 Conclusion
	7 Future Works
	References
Automated Detection for Muscle Disease Using EMG Signal
	1 Introduction
	2 Proposed Methodology
		2.1 Data Set
		2.2 Pre-processing
		2.3 Feature Extraction
		2.4 Feature Selection and Classification
	3 Results and Discussions
	4 Conclusions
	References
Drowsiness Detection for Automotive Drivers in Real-Time
	1 Introduction
	2 The Methodology
		2.1 Alcohol Detection
		2.2 Face Detection
		2.3 Face Detection of Authorised Driver and Unauthorised Face
		2.4 Eye Detection
		2.5 Eye-State Classification
		2.6 Levels of Drowsiness Detection
	3 Experimental Setup
	4 Results and Discussion
		4.1 Alcohol Detection
		4.2 Face Detection
		4.3 Eye Detection
		4.4 Various Levels of Drowsiness
	5 Conclusion
	6 Future Scope
	References
Prediction of Dementia Using Deep Learning
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Experiment
	5 Results
	6 Conclusion
	References
Performance Analysis of Universal Filtered Multicarrier Waveform with Various Design Parameters for 5G and Beyond Wireless Networks
	1 Introduction
	2 Concepts of Multicarrier Waveform
	3 Mathematical Model for UFMC Waveform
	4 Mathematical Model at Receiver Side
	5 UFMC System Specifications and Simulation Results
	6 Conclusion
	References
Diabetic Retinopathy (DR) Detection Using Deep Learning
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results and Discussion
	5 Future Scope
	6 Conclusion
	References
Comparative Analysis Using Data Mining Techniques to Predict the Air Quality and Their Impact on Environment
	1 Introduction
	2 Related Work
	3 Dataset Observation
		3.1 Dataset Collection
		3.2 Preprocessing and Feature Selection
	4 Technical Approach
		4.1 Bayesian Naive
		4.2 Decision Trees
		4.3 Gradient Boosting Tree
		4.4 Logistic Regression
		4.5 Support Vector Machine
		4.6 Deep Learning with Algorithms
	5 Result Analysis with Different Data Mining Techniques
		5.1 Models Comparison
		5.2 Classification Errors Rate in Different Models
		5.3 Hierarchical Learning and Deep Learning Algorithmic
	6 Conclusion and Future Scope
	References
Complexity Reduction by Signal Passing Technique in MIMO Decoders
	1 Introduction
	2 System Model
	3 Existing Method
	4 Proposed Algorithm
	5 Evaluation
	6 Simulation Results
	7 Conclusion
	References
A New Approach to Improve Reliability in UART Using Checksum Algorithm
	1 Introduction
	2 Modified UART Data Frame
	3 Proposed UART Transmitter Architecture
		3.1 Checksum Generator
		3.2 Baud Rate Generator
		3.3 Transmitter Finite State Machine
		3.4 Parallel Input Serial Output Register
	4 Proposed UART Receiver Architecture
		4.1 Negative Edge Detector
		4.2 Baud Rate Generator
		4.3 Receiver Finite State Machine
		4.4 Serial Input Parallel Output Shift Register
		4.5 Checksum Checker
	5 Results and Discussions
	6 Conclusion
	References
Modified VHDL Implementation of 128-Bit Rijndael AES Algorithm by Asymmetric Keys
	1 Introduction
		1.1 Literature Review
		1.2 Methodology
	2 Results and Discussion
		2.1 Conclusion
		2.2 Future Scope
	References
A Computationally Inexpensive Method Based on Transfer Learning for Mobile Malware Detection
	1 Introduction
	2 Related Work
	3 Proposed Method
		3.1 Image Generation
		3.2 Malicious Android Application Detection Based on Transfer Learning
	4 Experimental Setup, Datasets, and Evaluation
		4.1 Dataset Description
		4.2 Evaluation
	5 Conclusion
	References
A Statistical Approach for Extractive Hindi Text Summarization Using Machine Translation
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Datasets and Translated Hindi Corpus Generation
		3.2 Preprocessing
		3.3 Maximum Likelihood Estimation
		3.4 Automatic Text Summarization
		3.5 Summary Generation
	4 Results and Discussions
	5 Conclusion
	References
Semantic Parser Using a Sequence-to-Sequence RNN Model to Generate Logical Forms
	1 Introduction
	2 Literature Review
	3 Task
		3.1 Datasets
	4 RNN Model
		4.1 Encoder Module
		4.2 Decoder Initialization Module
		4.3 Decoder Attention Module
		4.4 Decoder Update Module
		4.5 Decoder Output Module
		4.6 All Models
		4.7 Learning
	5 Compositional Data Augmentation
		5.1 Augmentation on Regular Expressions
	6 Experiments
		6.1 Specifics of Execution
		6.2 Effect of Data Augmentation
		6.3 Out-of-Domain Augmentation
	7 Conclusion
	References
NFF: A Novel Nested Feature Fusion Method for Efficient and Early Detection of Colorectal Carcinoma
	1 Introduction
	2 Related Works
	3 Materials and Methods
		3.1 Data Collection
		3.2 Data Preprocessing
		3.3 Dataset Division
		3.4 Transfer Learning
		3.5 EfficientNet
		3.6 Proposed Nested Feature Fusion Method
	4 Deep Feature Extraction and Model Training
		4.1 Loss Function: Categorical Cross-Entropy
		4.2 Classifier: Softmax
		4.3 Learning Rate Decay
	5 Experimental Results and Discussion
		5.1 Experimental Setup
		5.2 Classifier Performance
		5.3 Nested Fusion Model
	6 Conclusion and Future Directions
	References
Arrhythmia Classification Using BiLSTM with DTCWT and MFCC Features
	1 Introduction
	2 Database Used
	3 Preprocessing
		3.1 ECG Signal Denoising
		3.2 ECG Segmentation
	4 Feature Extraction
		4.1 DTCWT-Based Features
		4.2 MFCC-Based Features
	5 Proposed Methodology
	6 Conclusion
	References
Anomaly-Based Hierarchical Intrusion Detection for Black Hole Attack Detection and Prevention in WSN
	1 Introduction
	2 Literature Survey
	3 Black Hole Attack Detection and Prevention in WSN
	4 Result Analysis
	5 Conclusion
	References
A Reliable Novel Approach of Bio-Image Processing—Age and Gender Prediction
	1 Introduction
	2 Literature Survey
		2.1 Proposed Method
		2.2 Face Detection
		2.3 Features Classification
	3 Results
		3.1 Training Parameters
	4 Conclusion
	References
Restoration and Deblurring the Images by Using Blind Convolution Method
	1 Introduction
	2 Literature Survey
		2.1 Iterative Phase Retrieval
		2.2 Measure of Blur Kernel Quality
		2.3 Image Quality Estimation
	3 Restoration of Blur Images
		3.1 Methodology
		3.2 Wiener Filter
		3.3 Point Spread Function (PSF)
		3.4 The Richardson-Lucy (R-L) Algorithm
	4 Results
		4.1 Deblurring Results
	5 Conclusion
	References
Interpretation of Brain Tumour Using Deep Learning Model
	1 Introduction
	2 Related Work
	3 Proposed Method
	4 Experiments
		4.1 Data set
	5 Conclusion
	References
An Improved Blind Deconvolution for Restoration of Blurred Images Using Ringing Removal Processing
	1 Introduction
	2 Literature Survey
	3 Improved Blind Deconvolution Using Ringing Removal Processing
		3.1 Image Blind Deblurring
		3.2 Dark Channel Prior
		3.3 Blind Deconvolution Using Joint Bilateral Filter
		3.4 PSF Estimation
		3.5 Ringing Removal Processing
	4 Results
	5 Conclusion
	References
A Review on Deep Learning Approaches for Histopathology Breast Cancer Classification
	1 Introduction
	2 Breast Cancer Approaches
		2.1 Self and Clinical Examinations and Mammography
	3 Breast Cancer and Types
	4 Datasets and Processing Methods
		4.1 Databases
		4.2 Data Augmentation
		4.3 Preprocessing
	5 Comparative Analysis
	6 Conclusion
	References
IoT-Based Smart Agricultural Monitoring System
	1 Introduction
	2 Types of Sensors
		2.1 DHT11 Sensor
		2.2 pH Sensor
	3 Raspberry Pi 4, Model B
	4 Node MCU ESP8266
	5 Decision Tree Regression Algorithm
	6 ThingSpeak Server
	7 Flowchart
	8 Connection of Node MCU with pH Sensor and DHT11
	9 Connection of ESP8266 with Raspberry Pi
	10 Methodology
	11 Results
	12 Conclusion
	References
Singular Value Decomposition and Rivest–Shamir–Adleman Algorithm-Based Image Authentication Using Watermarking Technique
	1 Introduction
	2 Related Work
	3 Proposed Watermarking Technique
		3.1 Embedding of Watermark Image
		3.2 Extraction of Watermark
	4 Experimentation and Results
		4.1 Security Analysis
	5 Conclusion
	References
Crop Yield Prediction Using Machine Learning Algorithms
	1 Introduction
	2 Crop Yield
	3 Machine Learning Techniques
		3.1 Random Forest
		3.2 Gradıent Boosting
		3.3 XGBoost
		3.4 Ensemble XGBoost-RF
		3.5 Evaluation Metrics
	4 Results and Discussion
	5 Conclusion
	References
Analysis of Students’ Fitness and Health Using Data Mining
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 Model Building
		3.2 Model Comparison
		3.3 Evaluation Measures
	4 Results
	5 Conclusion
	References
Local Agnostic Interpretable Model for Diabetes Prediction with Explanations Using XAI
	1 Introduction
	2 Related Work
	3 Materials and Methods
		3.1 Dataset Description
		3.2 Problem Description
		3.3 Interpretable Machine Learning Models
	4 Results and Discussions
		4.1 Experimental Setup
		4.2 Results
		4.3 LIME Explanations
	5 Conclusion and Future Scope
	References
Exploring the Potential of eXplainable AI in Identifying Errors and Biases
	1 Introduction
	2 Background
		2.1 The XAI Approach
	3 Methods
	4 Defining Interpretability
		4.1 Dimensions of AI Explanation
		4.2 Possible Metrics
	5 The Troubles of Explanations
		5.1 Measuring Fidelity
		5.2 Decision Making Biases
	6 Conclusions
	References
Novel Design of Quantum Circuits for Representation of Grayscale Images
	1 Introduction
	2 Background Information
	3 Proposed Work
		3.1 Single-Qubit Circuit Generating 2-Dimensional Arbitrary Real Statevector
		3.2 Two-Qubit Circuit Generating 4-Dimensional Arbitrary Real Statevector
		3.3 Multi-Qubit Circuit Generation for Arbitrary 2n-Dimensional Real Statevector
	4 Conclusion
	References
Trajectory Tracking Analysis of Fractional-Order Nonlinear PID Controller for Single Link Robotic Manipulator System
	1 Introduction and Literature Surveys
	2 Modeling of the SLRM System
	3 Suggested Control Technique and Tuning Using GA
	4 Simulation and Analysis of Trajectory Tracking
	5 Conclusion and Future Trends
	References
PCA-Based Machine Learning Approach for Exoplanet Detection
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Implementation
		4.1 Normalization
		4.2 Principal Component Analysis (PCA)
		4.3 Training of Data
	5 Experimental Results
		5.1 Normalization
		5.2 Principle Components (Two)
		5.3 Support Vector Machine
		5.4 Random Forest Classifier
		5.5 Feature Importance
	6 Conclusion
	References
Self-build Deep Convolutional Neural Network Architecture Using Evolutionary Algorithms
	1 Introduction
	2 Related Work
	3 Proposed Encoding Scheme
		3.1 Hyperparameter Selection
		3.2 Novelty and Contribution
	4 Results and Discussion
	5 Conclusion
	References
Bird Species Recognition Using Deep Transfer Learning
	1 Introduction
	2 Relevant Study
	3 Proposed Method
	4 Experimental Results
	5 Conclusion
	References
CNN-Based Model for Deepfake Video and Image Identification Using GAN
	1 Introduction
	2 Literature Review
	3 Proposed CNN Model for COVID X-Ray Detection
	4 Implementation of Proposed CNN Model
	5 Experimental Results
	6 Conclusion
	References
Comparative Analysis of Signal Strength in 5 LTE Networks Cell in Riobamba-Ecuador with 5 Propagation Models
	1 Introduction
	2 Theorical Framework
		2.1 Log-Normal Path Loss Model
		2.2 Okumura-Hata Model
		2.3 COST 231 Model
		2.4 Walfisch-Bertoni Model
		2.5 SUI Model
		2.6 Theory of Errors
	3 Methodology
		3.1 Data Collection
		3.2 Parameters to Consider
		3.3 Application of Propagation Models
	4 Results
		4.1 El Cisne Base Station
		4.2 Zeus Base Station
		4.3 Guayaquil Park Base Station
		4.4 Santa Cecilia Base Station
		4.5 Pichincha Bank Base Station
	5 Conclusions
	References
Automated System Configuration Using DevOps Approach
	1 Introduction
	2 Literature Review
	3 Dataset Characteristics
	4 Methodology
	5 Implementation and Results
		5.1 sshKeygen
		5.2 sshCopyId
		5.3 5x-Automation
		5.4 RPM Packaging
	6 Conclusion
	References
Face Mask Detection Using Multi-Task Cascaded Convolutional Neural Networks
	1 Introduction
	2 Related Work
	3 Proposed Method
	4 Experiments
	5 Conclusion
	References
Empirical Study on Categorized Deep Learning Frameworks for Segmentation of Brain Tumor
	1 Introduction
	2 Related Works
		2.1 Single and Multi-Path CNN
		2.2 Fully Convolutional Neural Networks
	3 Conclusion
	References
An Extensive Survey on Sentiment Analysis and Opinion Mining: A Software Engineering Perspective
	1 Introduction
		1.1 Critical Contributions
	2 Literature Review
	3 Sentiment Analysis
	4 Steps Involved in Sentimental Analysis
	5 Applications of Sentimental Analysis
	6 Research Challenges and Issues
	7 Sentiment Classification Techniques
	8 Sentiment Analysis and Software Engineering
	9 Sentiment Analysis and Refactoring
	10 Conclusion
	References
Feature Enhancement-Based Stock Prediction Strategy to Forecast the Fiscal Market
	1 Introduction
	2 Research Framework
		2.1 Collection of Raw Dataset
		2.2 Data Preprocessing
		2.3 Detection and Avoidance of Multicollinearity
	3 Model Implementation
		3.1 Performance Evaluation
	4 Results and Discussion
	5 Conclusion and Future Scope
	References
Early Prediction of Diabetes Mellitus Using Intensive Care Data to Improve Clinical Decisions
	1 Introduction
		1.1 Features Overview
	2 Literature Survey
	3 Exploratory Data Analysis
		3.1 Identifying Column Types
		3.2 Diabetes Status by Age and Gender
		3.3 Ethnicity Distribution
		3.4 Correlation Between Variables
	4 Preprocessing
		4.1 Handling Missing Values
		4.2 Data Cleaning
		4.3 Encoding Categorical Variables
	5 Methodology
		5.1 Hyper Parameter Tuning
		5.2 Evaluation Metrics
	6 Results and Discussion
	7 Conclusion
	References
Authorship Identification Through Stylometry Analysis Using Text Processing and Machine Learning Algorithms
	1 Introduction
		1.1 Gradient Descent Algorithm
	2 Literature Survey
	3 Proposed System
	4 Preprocessing
		4.1 Dataset Preparation
		4.2 Advantages of Using This Dataset
		4.3 Loading the Dataset
		4.4 Preprocessing Step
	5 Methodology
		5.1 Classification Using Stochastic Gradient Descent Algorithm
	6 Result Analysis
	7 Conclusion and Future Work
	References
Music Genre Classification Using Librosa Implementation in Convolutional Neural Network
	1 Introduction
	2 Literature Survey
	3 Proposed System
	4 Implementation
		4.1 Data Set
		4.2 Data Preprocessing
		4.3 Spectrogram Creation
	5 Algorithm
		5.1 Convolutional Neural Networks (CNN)
		5.2 Librosa
	6 Result
	7 Conclusion
	References
Web Application for Solar Data Monitoring Using IoT Technology
	1 Introduction
	2 Role of an Energy Management System in a Microgrid
	3 Methodology and Implementation for the Proposed Set-up
	4 Real-Time Set-up for the Proposed Project
	5 Results and Discussion
	6 Conclusion and Future Work
	References
Power Quality Enhancement in Distribution System Using Ultracapacitor Integrated Power Conditioner
	1 Introduction
	2 3-Ø Converter
		2.1 At Supply Point
		2.2 Controller Design
	3 Description of BDC
	4 UCAP
	5 Fuzzy Controller
	6 Simulation Results
	7 Conclusion
	References
CNN-Based Breast Cancer Detection
	1 Introduction
	2 Background Study
	3 Architecture
	4 Results
	5 Conclusion
	References
Voltage Stability Analysis for Distribution Network Using D-STATCOM
	1 Introduction
	2 Methodology
		2.1 Newton–Raphson Method
		2.2 G–S Method
		2.3 Principle of D-STATCOM Controller
	3 Simulation and Results
	4 Conclusions
	References
E-Dictionosauraus
	1 Introduction
	2 Literature Survey
	3 Proposed System
		3.1 Tesseract OCR
		3.2 Color Spaces
		3.3 Working
	4 Results and Discussion
		4.1 CASE (i): Example 1
		4.2 Example 2
		4.3 CASE (ii)
	5 Conclusion
	References
Effective Prediction Analysis for Cardiovascular Using Various Machine Learning Algorithms
	1 Introduction
	2 Literature Survey
	3 Working Procedure for Proposed System
	4 Implementation
		4.1 Dataset
		4.2 Data Preprocessing
		4.3 Correlation Matrix Between Attributes
		4.4 Box Plot to Check the Outliers
	5 Algorithm
		5.1 Support Vector Machine (SVM)
		5.2 Stochastic Gradient Descent
		5.3 Logistic regression
	6 Comparative Analysis
	7 Conclusion and Future Scope
	References
Multi-layered PCM Method for Detecting Occluded Object in Secluded Remote Sensing Image
	1 Introduction
	2 Partial Configuration Object Model
		2.1 First Layer
		2.2 Second Layer
	3 Partial Configuration Object Model for Object Detection Framework Learning
		3.1 Detection of Objects
		3.2 Occlusion Inference
		3.3 Datasets
	4 Datasets of Aeroplane Detection
		4.1 Experimental Setup
		4.2 Criteria for Evaluation
		4.3 Evaluation and Comparing Performance
		4.4 Scheme Influence Analysis
	5 Weights in Partial Configuration
	6 The Quantity of Partial Configurations Has an Impact
		6.1 Occlusion Inference Results
	7 Conclusion
	References
Author Index




نظرات کاربران