دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Yashwant Singh, Chaman Verma, Illés Zoltán, Jitender Kumar Chhabra, Pradeep Kumar Singh سری: Lecture Notes in Electrical Engineering, 1011 ISBN (شابک) : 9819906008, 9789819906000 ناشر: Springer سال نشر: 2023 تعداد صفحات: 878 [879] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 26 Mb
در صورت تبدیل فایل کتاب Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات کنفرانس بین المللی نوآوری های اخیر در محاسبات: ICRIC 2022، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مقالات منتخب ارائه شده در پنجمین کنفرانس بینالمللی نوآوریهای اخیر در محاسبات (ICRIC 2022) است که در 13 تا 14 آگوست 2022 برگزار شد، که توسط ELTE مجارستان با همکاری دانشگاه دانش، اربیل و بسیاری از شرکای دانشگاهی و صنعتی که شامل می شود؛ موسسه اروپایی تجزیه و تحلیل داده ها (EiDA)، دوبلین، ایرلند و آزمایشگاه CSRL، هند. این کتاب قسمت دوم این دو جلد است و شامل آخرین تحقیقات در زمینه های مهندسی نرم افزار، محاسبات ابری، شبکه های کامپیوتری و فناوری های اینترنت، هوش مصنوعی، امنیت اطلاعات، پایگاه داده و محاسبات توزیع شده و هند دیجیتال می باشد.
This book features selected papers presented at the 5th International Conference on Recent Innovations in Computing (ICRIC 2022), held on August 13–14, 2022, organized by the ELTE, Hungary in association with Knowledge University, Erbil and many academic and industry partners which includes; European Institute of Data Analytics (EiDA), Dublin, Ireland and CSRL Lab, India . The book is second part of the two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.
Preface Contents About the Editors Artificial Intelligence, Machine Learning, Deep Learning Technologies A Three-Machine n-Job Flow Shop Scheduling Problem with Setup and Machine-Specific Halting Times 1 Introduction 2 Problem Description 2.1 Assumptions 2.2 Problem Statement 3 Proposed Methodology 4 Numerical Example 5 Conclusions References Clinical Named Entity Recognition Using U-Net Classification Model 1 Introduction 2 Literature Review 3 Research Methodology 3.1 Dataset Description 3.2 Proposed Methodology 4 Result and Discussion 5 Conclusion References Neural Machine Translation from English to Marathi Using Various Techniques Abstract 1 Introduction 2 Literature Survey 3 Research Gap 4 Methodology 4.1 Data Used and Data Preprocessing 4.2 Model Architecture 5 Results 6 Conclusion References Review of Cardiovascular Disease Prediction Based on Machine Learning Algorithms Abstract 1 Introduction 2 Methodology 2.1 Method 2.2 Data Sources and Searches 2.3 Study Selection 2.4 Data Extraction and Quality Assessment 2.5 Data Synthesis 2.6 Inclusion and Exclusion Criteria 3 Results 4 Discussions 5 Conclusion References Exploiting Parts of Speech in Bangla-To-English Machine Translation Evaluation Abstract 1 Introduction 2 Related Work 3 Methodology 4 Experimentation 5 Results and Discussion 6 Conclusion and Future Work References Artificial Intelligence and Blockchain Technology in Insurance Business Abstract 1 Introduction 2 Literature Review 3 Methodology 3.1 AI Technology and Blockchain Technology in Insurance Business 3.2 Impact of AI Technology and Blockchain Technology on Insurance Business 4 The Core Benefits of AI and Blockchain Technology 5 Test of Hypothesis 6 Conclusion References Classification and Detection of Acoustic Scene and Event Using Deep Neural Network 1 Introduction 2 Related Work 3 Proposed Methodology 4 Experimental Results and Discussion 5 Conclusion and Future Scope References Analysis of a Novel Integrated Machine Learning Model for Yield and Weather Prediction: Punjab Versus Maharashtra 1 Introduction 2 Literature Review 3 Proposed Model 4 Result and Discussions 4.1 Data Pre-Processing for Yield Prediction and Weather Forecasting 4.2 Dataset for Crop Yield Prediction and Weather Prediction 4.3 Performance Evaluation 4.4 Measures for Estimating the Accuracy of Weather Prediction 5 Conclusion References Machine Learning Techniques for Result Prediction of One Day International (ODI) Cricket Match 1 Introduction 2 Literature Review 3 Comparative Analysis 4 Open Research Challenges 5 Proposed Model 5.1 System Flow 5.2 Dataset 6 Conclusion References Recommendation System Using Neural Collaborative Filtering and Deep Learning 1 Introduction 2 Related Work 2.1 Explicit Feedback 2.2 Implicit Feedback 2.3 Collaborative Filtering 3 System Model Approach (NCF) 4 User Embeddings 5 Learned Embeddings 6 Architecture of Model 7 Evaluating the Model 8 Result and Discussion 9 Conclusion References The Importance of Selected LMS Logs Pre-processing Tasks on the Performance Metrics of Classification Models 1 Introduction 2 Related Works 3 Methodology 3.1 Data Description 3.2 Data Cleaning 3.3 Data Scaling 3.4 Data Transformation 3.5 Data Reduction 4 Classification Model Evaluation 5 Conclusion References Analysis of Deep Pre-trained Models for Computer Vision Applications: Dog Breed Classification 1 Introduction 2 Related Work 3 Dataset 4 Data Augmentation 5 Proposed Work 5.1 Models 5.2 Proposed Framework 6 Experimental Performance 6.1 Experimental Setup 7 Results and Analysis 7.1 Evaluation Metrics 7.2 Analysis 8 Conclusion 9 Future Work References An Efficient Recognition and Classification System for Paddy Leaf Disease Using Naïve Bayes with Optimization Algorithm 1 Introduction 2 Related Work 3 Problem Definition 4 Proposed Methodology 4.1 Image Acquisition 4.2 Image Preprocessing 4.3 Image Segmentation 4.4 Feature Extraction 4.5 Feature Selection 4.6 Classification 5 Result Analysis 6 Conclusion References Development of Decision-Making Prediction Model for Loan Eligibility Using Supervised Machine Learning 1 Introduction 2 Related Works 3 Problem Statement 4 Proposed Model 4.1 Collection of Dataset 4.2 Exploratory Data Analysis of Dataset 4.3 Preprocessing of Data 4.4 Feature Engineering with Dataset 4.5 Design of System 5 Machine Learning Model Selection 5.1 k-Nearest Neighbor Model 5.2 Random Forest Model 5.3 Support Vector Machine Model 5.4 Stratified k-Fold Cross-Validation Algorithm 6 Conclusion and Future Scope References Prediction of Osteoporosis Using Artificial Intelligence Techniques: A Review 1 Introduction 2 Literature Review 3 Comparative Analysis 4 Open Gaps and Challenges 5 Proposed Intelligent Osteoporosis Classifier 5.1 Dataset Description 5.2 Data Preprocessing 6 Conclusion References Analyzing Stock Market with Machine Learning Techniques 1 Introduction 2 Review of Literature 3 Proposed System 3.1 Overview 3.2 Data Collection 3.3 Data Preprocessing 3.4 Application of Various Models 4 Accuracy Test of Various Models 5 Conclusion References Machine Learning Techniques for Image Manipulation Detection: A Review and Analysis 1 Introduction 2 Image Processing in ML 2.1 Feature Extraction 3 Types of Manipulations 4 Manipulation Technique Detection 5 Literature Survey 6 Comparative Analysis and Discussion 7 Datasets for Image Tempering Detection 8 Research Gaps and Challenges 9 Conclusion References Improving Real-Time Intelligent Transportation Systems in Predicting Road Accident 1 Introduction 2 Literature Review 3 Methodology 3.1 Big Data Gathering and Regulation 3.2 Data Preprocessing 3.3 Data Processing 3.4 Data Prediction 4 Results and Discussion 4.1 Result for the Filtered Tweets 5 Conclusion References Consumer Buying Behavior Analysis During COVID-19 Phase Using Statistical Data Mining and Multi-verse Stochastic Algorithm 1 Introduction 2 Literature Review 3 Materials and Methods 3.1 Dataset Description 3.2 Multi-verse Algorithm 3.3 Data Preprocessing 3.4 Association Rule Mining 4 Proposed Method 4.1 Data Optimization Using Multi-verse Algorithm 4.2 Statistical Analysis 5 Result and Discussion 6 Conclusions and Future Scope References IoT and Networking Addressing Role of Ambient Intelligence and Pervasive Computing in Today’s World 1 Introduction 2 Bibliometric Analysis for Ambient Intelligence and Pervasive Computing 2.1 Bibliometric Analysis Web of Science Data 2.2 Bibliometric Analysis SCOPUS Data 3 Ambient Intelligence 3.1 Applications of Ambient Intelligence in Today’s World 4 Pervasive Computing 4.1 Applications of Pervasive Computing in Today’s World 5 Current Challenges for Ambient Intelligence and Pervasive Computing 6 Conclusion References Improving the AODV Routing Protocol Against Network Layer Attacks Using AntNet Algorithm in VANETs 1 Introduction 1.1 VANET Security Challenges 1.2 AODV Routing Protocol 1.3 AntNet Algorithm 2 Proposed Method 2.1 Simulation Design 3 Results 4 Discussion 5 Conclusions References A Comparative Study of IoT-Based Automated Hydroponic Smart Farms: An Urban Farming Perspective 1 Introduction 2 Related Work 3 Review Selection Methodology 4 IoT-Based Smart Hydroponic Farms 5 Comparative Study and Analysis 6 Conclusion 7 Future Scope References Smart Healthcare System Based on AIoT Emerging Technologies: A Brief Review 1 Introduction 2 Literature Survey 3 Sensors Used in Health Care 4 Challenges 5 Applications of AIoT in Smart Health Care 6 Conclusion and Future Scope References Intelligent Communication for Internet of Things (IoRT) 1 Introduction 1.1 Internet of Robotic Things 2 Architecture 2.1 Physical Layer 2.2 Network Layer 2.3 Service Layer and Application Layer 3 Application Domains 3.1 Manufacturing 3.2 Agriculture 3.3 Health Care 3.4 Education 3.5 Surveillance 3.6 Disaster Response 4 Literature Survey 5 Research Challenges 5.1 Data Processing 5.2 Robot Ethics 5.3 Privacy 5.4 Security Issues 6 Proposed Methodology 6.1 PRESENT Cipher Implementation 6.2 Results 7 Conclusion References Energy-Efficient Priority-Based Routing Model for Smart Health Care 1 Introduction 2 Literature Survey 3 Smart Health Care: Challenges 4 Proposed Smart Healthcare Model 5 Conclusion References An Internet of Things-Based Mining Worker Safety Helmet Using ESP32 and Blynk App 1 Introduction 2 Literature Survey 3 Proposed Method 4 Circuit Diagram of Proposed Method 5 Components 6 Result Analysis 7 Conclusion 8 Future Scope References Time Series-Based IDS for Detecting Botnet Attacks in IoT and Embedded Devices 1 Introduction 2 Different Types of Botnet Attacks 3 IoT-Based Botnet Attacks 4 Time Series-Based Models Used for Detecting Botnet Attacks 5 Conclusion References Swarm Intelligence-Based Energy-Efficient Framework in IoT 1 Introduction 2 Literature Survey 3 Particle Swarm Optimization (PSO) 3.1 Grey Wolf Optimizer 4 Proposed Framework 5 Conclusion References Performance Analysis of MADM Techniques in Cognitive Radio for Proximity Services 1 Introduction 2 MADM Methodologies 2.1 Grey Relational Analysis Method 2.2 Cost Function Based Method 3 Performance Analysis of Comparison Between Adaptive Threshold and Adaptive Double Threshold 4 Results and Discussions 4.1 Implementation of MADM Algorithms for Quad Play Services: Grey Relational Analysis 5 Performance Comparison of MADM Algorithm Using Relative Standard Deviation 6 Conclusion References Image Processing and Computer Vision Comparison of Debris Removal in Pap-Smear Images Using Enhanced Erosion and Dilation 1 Introduction 2 Literature Survey 3 Materials and Methods 4 Results and Discussion 5 Conclusion References Image Enhancement with Deep Learning and Intensity Transformation of No-Reference Grayscale Fluorescence Microscopy Images 1 Introduction 2 Materials and Methods 2.1 Reference Data 2.2 Methodology 3 Results 3.1 Evaluation Metrics 3.2 Quantitative Results 4 Conclusion References Real-Time Human Action Recognition with Multimodal Dataset: A Study Review 1 Introduction 2 Background 3 Depth Motion Maps as Features 4 Human Activity Categorization 5 Unimodal-Based Methods 6 Multimodal-Based Methods 7 Performance of Collected Dataset 8 Conclusion References KnowStress: A Mobile Application Prototype Detection of Stress and Stress Related Disorders 1 Introduction 2 Related Work 3 Proposed Work 3.1 System Architecture 3.2 Questionnaire 4 Dataset 5 Implementation 5.1 Dimensionality Reduction 5.2 Models 5.3 KnowStress Prototype 6 Results and Analysis 6.1 Evaluation Metrics 6.2 Analysis 7 Conclusion 8 Future Work References Handwritten Character Evaluation and Recommendation System 1 Introduction 2 Literature Review 3 Dataset 4 Proposed Methodology 4.1 Pre-Processing 4.2 Feature Extraction and Classification 4.3 Finding Similarity Score 4.4 Analysis of the Image 5 Results and Discussion 6 Conclusion References Prediction of Lung Disease from Respiratory Sounds Using Convolutional Neural Networks 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Dataset Description 3.2 Data Preprocessing 3.3 CNN Model for Detection of Lungs Diseases 4 Experimental Analysis 5 Performance Analysis 6 Conclusion References SemWIRet: A Semantically Inclined Strategy for Web Image Recommendation Using Hybrid Intelligence 1 Introduction 2 Related Works 3 Proposed System Architecture 4 Implementation 5 Conclusions References Optimal Drug Recommender Framework for Medical Practitioners Based on Consumer Reviews 1 Introduction 2 Related Work 3 Proposed Methodology 4 Material and Methods 5 Conclusion References Development of Intelligent Framework for Early Prediction of Diabetic Retinopathy 1 Introduction 2 Literature Review 3 Comparative Analysis 4 Open Gaps and Challenges 5 Proposed Framework 6 Conclusion References Healthcare Data Analysis Using Proposed Hybrid Harmony Genetic Diagnostic Model 1 Introduction 2 Background 2.1 Related Work 2.2 Harmony Search Algorithm 3 Proposed Hybrid Harmony Search-Based Diagnostic Model 3.1 Improved Harmony Search Algorithm 3.2 HHSGA as a Clustering Technique 3.3 Proposed HHSGA-Based Diagnostic Model 4 Experimental Analysis 4.1 Dataset Used 4.2 Cluster Quality Measures 4.3 Simulation Results 4.4 Statistical Analysis 5 Conclusion and Future Scope References E-Learning, Cloud and Big Data Cost Estimation Model Using Fifth Generation Language Technique for Software Maintenance Project 1 Introduction 2 Related Work 3 Research Methodology Used 4 Proposed Model for Software Maintenance Cost Estimation 4.1 Data Used for Validation 4.2 Fuzzy Inference System Rules Applied 5 Experimental Results 5.1 Root Mean Squared Error (RMSE) 5.2 Mean Absolute Error (MAE) 6 Comparison 7 Conclusion References Survey of Text Summarization Stratification 1 Introduction 2 Types of Summarization Techniques 2.1 Based on Types of Approaches 2.2 Depending on the Output Details 2.3 Based on Content 2.4 Based on the Language 2.5 Based on a Source Document 3 Extractive Summarization 3.1 TF–IDF Frequency Method 3.2 Text Summarization with Fuzzy Logic 3.3 Text Summarization with Neural Network 3.4 Cluster-Based Method 4 Abstractive Summarization 4.1 Tree-Based Method 4.2 Template-Based Method 4.3 Ontology-Based Method 4.4 Graph-Based Method 5 Conclusion References A Systematic Study of Various Approaches and Problem Areas of Named Entity Recognition 1 Introduction 1.1 Named Entity Recognition 1.2 Metrics 1.3 State of the Art 2 Literature Review 2.1 Methodology 2.2 Research Papers for Review from Year 2017 2.3 Research Papers for Review from Year 2018 2.4 Research Papers for Review from Year 2019 2.5 Research Papers for Review from Year 2020 2.6 Research Papers for Review from Year 2021 3 Conclusion References From Virtual World Back to Real Classrooms? 1 Introduction 1.1 Problem Detection 1.2 Possible Solution—Interaction 1.3 E-Lection, Our CRSs (Classroom Response Systems) Solution 2 Dramatic Changes—Covid-19, the Time for Distance Education 2.1 Our Faculty Solution 2.2 The Environment of the Survey 2.3 Likeness of Online Lessons 2.4 May Substitute Classical Lessons? 2.5 Lack of Interactivity 3 We’ll Be Back … to the School 3.1 The Environment of the Survey 3.2 The Teaching Mode 3.3 Interaction, Common Work? 3.4 Lectures 3.5 Practice Work 4 Summary References Aspect-Based Opinion Mining Framework for Product Rating Embedded with Fuzzy Decision 1 Introduction 2 Motivation 3 Proposed Methodology 4 Result and Discussion 5 Conclusion References The Problems and Organization of Learning Using Distance Educational Technologies: Practical Issues 1 Introduction 2 Requirements for Organizations of Education 2.1 Information System and Educational Portal 3 IoT in Primary Education 4 Contribution: Previous Work 5 Discussion 6 Conclusion References The Task of Question Answering in NLP: A Comprehensive Review 1 Introduction 2 General Architecture 2.1 Question Processing 2.2 Document Processing 2.3 Answer Processing 3 Background 4 Benchmarks in NLP 4.1 GLUE (General Language Understanding Evaluation) 4.2 SuperGLUE 4.3 SQuAD1.1 (Stanford Question Answering Dataset 1.1) 4.4 SQuAD1.1 (Stanford Question Answering Dataset 2.0) 5 Research 6 Conclusion References Monitoring False Colour in an External Monitor for Film and Television Production: An Evaluative Study 1 Introduction 2 Related Work 3 Methodology 4 Colour Balance 5 High Dynamic Range (HDR) 6 Advantages of False Colour 7 Viewfinder Versus External Monitor 8 Experiment and Results 9 Conclusion and Future Work References Adaptive Gamification in E-Learning Platforms: Enhancing Learners’ Experience 1 Introduction 2 Methodology 3 Proposed Enhanced Operational Gamification Framework 4 Implications of Work for Theory and Practice 5 Conclusion References A Study on the Integration of Different DLP Systems at Different Levels 1 Introduction 2 Literature Review 2.1 Content Versus Context 2.2 Content Analysis 3 Content Analysis Techniques 3.1 Rule-Based/Regular Expressions 3.2 Database Fingerprinting 3.3 Exact File Matching 3.4 Partial Document Matching 3.5 Statistical Analysis 3.6 Conceptual/Lexicon 3.7 Pre-built Categories 4 Technical Architecture 4.1 Securing Data in Motion, at Rest, and Use 4.2 Data in Motion 4.3 Data at Rest 4.4 Data at Rest Enforcement 4.5 Data in Use 4.6 Limitations of Existing DLP Systems 5 Conclusion and Future Scope References Effect of Anime on Personality and Popularity of Japanese Culture 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Collection 3.2 Exploratory Analysis 3.3 Google Trends 4 Analysis 4.1 Percent Analysis 4.2 Time Exposure to Anime Analysis 4.3 Correlation Coefficient Analysis 5 Result 5.1 Percent Analysis 5.2 Time Exposure to Anime Analysis 5.3 Correlation Coefficient Analysis 5.4 Google Trends Analysis 6 Conclusion and Future Work References Synthetic Time Series Data Generation Using Time GAN with Synthetic and Real-Time Data Analysis 1 Introduction 2 Related Work 3 Proposed Work 3.1 Time GAN 3.2 Datasets 4 Experiment and Evaluation 4.1 PCA and TSNE 4.2 Correlation 4.3 Privacy Protection 5 Result 6 Conclusion and Future Scope References How Big Data Analytical Framework has Redefined Academic Sciences 1 Introduction 1.1 Big Data Introduction 1.2 Big Data Definition 1.3 Big Data Source 1.4 Big Data Types 2 Literature Survey 3 Big Data at University of Kashmir 4 Technical Implementation 4.1 MapReduce 4.2 Hadoop 4.3 NoSQL 5 Technical Implementation 6 Conclusion and Future Studies References Software Complexity Prediction Model: A Combined Machine Learning Approach 1 Introduction and Problem Definition 2 Related Works 3 Research Methodology 3.1 Design of Software Complexity Prediction Model 3.2 Data Exploration 3.3 Feature Extraction 4 Experimental Results 4.1 Model Building Using Single Classifiers 4.2 Model Building Using Combined Methods 5 Performance Evaluation 6 Experimental Discussion 6.1 Effect of Dataset Size 6.2 Effect of Methods on Performance 6.3 Extracted Rules from Decision Trees 7 Software Complexity Classification System: A Prototype 8 Conclusion and Future Works References Work with Information in an Outdoor Approach in Pre-primary Education 1 Introduction 2 Participants 3 Measurement 3.1 Results 4 Conclusions and Discussion References Cyber Security and Cyber Physical Systems and Digital Technologies Human Versus Automatic Evaluation of NMT for Low-Resource Indian Language 1 Introduction 2 Previous Work 3 Methodology 3.1 Human Evaluation 3.2 BLEU is an Automatic Metric 4 Experimental Setup 5 Analysis and Discussion 6 Conclusion and Future Work References Framework for Detection of Malware Using Random Forest Classifier 1 Introduction 1.1 Malware Detection Techniques 1.2 Machine Learning (ML) Approaches for Detection of Malware 2 Literature Survey 3 Proposed Framework 3.1 Technique 3.2 Dataset 3.3 Methodology 4 Results and Discussion 5 Conclusions References Machine Learning-Based Intrusion Detection of Imbalanced Traffic on the Network: A Review 1 Introduction 2 Intrusion Identification Methods (IIMs) 3 Network Intrusion Identification Model Framework 3.1 Comparison of Accuracy on Datasets 3.2 Comparison of Various ML-Based IDS Approaches 4 Discussions 5 Conclusion References A Novel Approach to Acquire Data for Improving Machine Learning Models Through Smart Contracts 1 Introduction 2 Background 2.1 Blockchain 2.2 Smart Contracts 2.3 Dataset Sourcing 2.4 Federated Machine Learning 3 Proposed Solution 4 Functional Overview 4.1 Commitment Phase 4.2 Participation Phase 4.3 Reward Phase 5 Validation 6 Conclusion References Blockchain Framework for Automated Life Insurance 1 Introduction 2 Literature Review 3 Background Work 3.1 Blockchain 3.2 Life Insurance Process 3.3 Death Registry Process in India 4 Gap Analysis 5 Material and Methods 5.1 Hyperledger Fabric 5.2 Development Environment of Hyperledger 6 Proposed Framework 6.1 Methodology 6.2 Design of Proposed Work 7 Test Result 8 Conclusion and Future Scope References Blockchain for IoT: A Comprehensive Review for Precision Agricultural Networks 1 Introduction 2 Literature Review 3 Blockchain and Its Requirements 4 Security Challenges in IoT 5 IoT Challenges in Precision Agriculture: Case Study 6 IoT Performance Challenges and Blockchain Solutions 7 Conclusion References The Proof of Authority Consensus Algorithm for IIoT Security 1 Introduction 2 Related Works 3 Methodology 3.1 Proof of Authority 4 Challenges in IIoT 5 Benefits of Blockchain in IIoT 6 Conclusion References Machine Learning for Security of Cyber-Physical Systems and Security of Machine Learning: Attacks, Defences, and Current Approaches 1 Introduction 1.1 Architecture of CPS 1.2 Security of CPS 1.3 Contribution 1.4 Paper Roadmap 2 Security of Machine Learning 2.1 Adversarial Attack Methods 2.2 Adversarial Defence Methods 2.3 Adversarial Threat Model ATM) 2.4 ATM Case Study 3 GAN-Based Adversarial Attacks 3.1 Conditional GAN (C-GAN) 4 Proposed Security Method 5 Research Challenges and Gaps 6 Conclusion References Legal Challenges of Digital Twins in Smart Manufacturing 1 Introduction 2 Digital Twins: Philosophy or Reality? 3 Digital Twins and Smart Manufacturing: Usage and Practices 3.1 Digital Twins-Based Smart Manufacturing 3.2 Digital Twins Architecture in Smart Manufacturing 3.3 Digital Twins-Based Blockchain System 3.4 Web Services and Cloud Computing for Distributed Digital Twins 4 Legal Issues of Digital Twin 4.1 Lack of Laws and Regulations 4.2 Intellectual Property and Data Privacy 4.3 Digital Twin and the Liability 4.4 Algorithmic Integrity and Digital Twins 5 Conclusion References LSTM-Based Encoder–Decoder Attention Model for Text Translation and Simplification on the Constitution of India Abstract 1 Introduction 2 Literature Review 3 Neural Machine Translation (NMT) 3.1 Long- and Short-Term Memory (LSTM) 3.2 Encoder and Decoder 3.3 Bahdanau Attention Method 4 Proposed Methodology 4.1 Pre-processing and Tokenization 4.2 Word Embedding 4.3 Model Architecture 4.4 Attention 5 Corpus Description 5.1 COI Translation Corpus 5.2 COI Simplification Corpus 6 Experimental Set-Up 6.1 Experimental Resources 6.2 Online Training 7 Results and Analysis 7.1 Evaluation Metrics 7.2 Analysis 8 Conclusion and Future Works References Compiling C# Classes to Multiple Shader Sources for Multi-platform Real-Time Graphics 1 Introduction 2 Real-Time Graphics Library in C# 2.1 Example of CPU-Side Rendering Code 2.2 GPU Shaders 2.3 Shader Classes in C# 2.4 Complex C# Shaders 3 C# Source Generators 4 Shader Generation 4.1 Shader Generator Preparation 4.2 Shader Builders 4.3 Shader Validation and SPIR-V Compilation 5 Conclusion References An Enhanced GLCM and PCA Algorithm for Image Watermarking 1 Introduction 1.1 Introduction to Image Processing 1.2 Digital Image Watermarking 1.3 Steps in Digital Image Watermarking 1.4 Requirements for Digital Image Watermarking 1.5 Applications of Digital Image Watermarking 1.6 Watermarking Properties 1.7 Threats for Watermarking 2 Present Work 2.1 Problem Definition 2.2 Objectives of Research 2.3 Research Methodology 3 Result 4 Conclusion 5 Future Work References Author Index