ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 2

دانلود کتاب مجموعه مقالات کنفرانس بین المللی نوآوری های اخیر در محاسبات: ICRIC 2022، جلد 2

Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 2

مشخصات کتاب

Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 2

ویرایش:  
نویسندگان: , , , ,   
سری: Lecture Notes in Electrical Engineering, 1011 
ISBN (شابک) : 9819906008, 9789819906000 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 878
[879] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 26 Mb 

قیمت کتاب (تومان) : 53,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 2 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات کنفرانس بین المللی نوآوری های اخیر در محاسبات: ICRIC 2022، جلد 2 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجموعه مقالات کنفرانس بین المللی نوآوری های اخیر در محاسبات: ICRIC 2022، جلد 2

این کتاب شامل مقالات منتخب ارائه شده در پنجمین کنفرانس بین‌المللی نوآوری‌های اخیر در محاسبات (ICRIC 2022) است که در 13 تا 14 آگوست 2022 برگزار شد، که توسط ELTE مجارستان با همکاری دانشگاه دانش، اربیل و بسیاری از شرکای دانشگاهی و صنعتی که شامل می شود؛ موسسه اروپایی تجزیه و تحلیل داده ها (EiDA)، دوبلین، ایرلند و آزمایشگاه CSRL، ​​هند. این کتاب قسمت دوم این دو جلد است و شامل آخرین تحقیقات در زمینه های مهندسی نرم افزار، محاسبات ابری، شبکه های کامپیوتری و فناوری های اینترنت، هوش مصنوعی، امنیت اطلاعات، پایگاه داده و محاسبات توزیع شده و هند دیجیتال می باشد.


توضیحاتی درمورد کتاب به خارجی

This book features selected papers presented at the 5th International Conference on Recent Innovations in Computing (ICRIC 2022), held on August 13–14, 2022, organized by the ELTE, Hungary in association with Knowledge University, Erbil and many academic and industry partners which includes; European Institute of Data Analytics (EiDA), Dublin, Ireland and CSRL Lab, India . The book is second part of the two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.



فهرست مطالب

Preface
Contents
About the Editors
Artificial Intelligence, Machine Learning, Deep Learning Technologies
A Three-Machine n-Job Flow Shop Scheduling Problem with Setup and Machine-Specific Halting Times
	1 Introduction
	2 Problem Description
		2.1 Assumptions
		2.2 Problem Statement
	3 Proposed Methodology
	4 Numerical Example
	5 Conclusions
	References
Clinical Named Entity Recognition Using U-Net Classification Model
	1 Introduction
	2 Literature Review
	3 Research Methodology
		3.1 Dataset Description
		3.2 Proposed Methodology
	4 Result and Discussion
	5 Conclusion
	References
Neural Machine Translation from English to Marathi Using Various Techniques
	Abstract
	1 Introduction
	2 Literature Survey
	3 Research Gap
	4 Methodology
		4.1 Data Used and Data Preprocessing
		4.2 Model Architecture
	5 Results
	6 Conclusion
	References
Review of Cardiovascular Disease Prediction Based on Machine Learning Algorithms
	Abstract
	1 Introduction
	2 Methodology
		2.1 Method
		2.2 Data Sources and Searches
		2.3 Study Selection
		2.4 Data Extraction and Quality Assessment
		2.5 Data Synthesis
		2.6 Inclusion and Exclusion Criteria
	3 Results
	4 Discussions
	5 Conclusion
	References
Exploiting Parts of Speech in Bangla-To-English Machine Translation Evaluation
	Abstract
	1 Introduction
	2 Related Work
	3 Methodology
	4 Experimentation
	5 Results and Discussion
	6 Conclusion and Future Work
	References
Artificial Intelligence and Blockchain Technology in Insurance Business
	Abstract
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 AI Technology and Blockchain Technology in Insurance Business
		3.2 Impact of AI Technology and Blockchain Technology on Insurance Business
	4 The Core Benefits of AI and Blockchain Technology
	5 Test of Hypothesis
	6 Conclusion
	References
Classification and Detection of Acoustic Scene and Event Using Deep Neural Network
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Experimental Results and Discussion
	5 Conclusion and Future Scope
	References
Analysis of a Novel Integrated Machine Learning Model for Yield and Weather Prediction: Punjab Versus Maharashtra
	1 Introduction
	2 Literature Review
	3 Proposed Model
	4 Result and Discussions
		4.1 Data Pre-Processing for Yield Prediction and Weather Forecasting
		4.2 Dataset for Crop Yield Prediction and Weather Prediction
		4.3 Performance Evaluation
		4.4 Measures for Estimating the Accuracy of Weather Prediction
	5 Conclusion
	References
Machine Learning Techniques for Result Prediction of One Day International (ODI) Cricket Match
	1 Introduction
	2 Literature Review
	3 Comparative Analysis
	4 Open Research Challenges
	5 Proposed Model
		5.1 System Flow
		5.2 Dataset
	6 Conclusion
	References
Recommendation System Using Neural Collaborative Filtering and Deep Learning
	1 Introduction
	2 Related Work
		2.1 Explicit Feedback
		2.2 Implicit Feedback
		2.3 Collaborative Filtering
	3 System Model Approach (NCF)
	4 User Embeddings
	5 Learned Embeddings
	6 Architecture of Model
	7 Evaluating the Model
	8 Result and Discussion
	9 Conclusion
	References
The Importance of Selected LMS Logs Pre-processing Tasks on the Performance Metrics of Classification Models
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Data Description
		3.2 Data Cleaning
		3.3 Data Scaling
		3.4 Data Transformation
		3.5 Data Reduction
	4 Classification Model Evaluation
	5 Conclusion
	References
Analysis of Deep Pre-trained Models for Computer Vision Applications: Dog Breed Classification
	1 Introduction
	2 Related Work
	3 Dataset
	4 Data Augmentation
	5 Proposed Work
		5.1 Models
		5.2 Proposed Framework
	6 Experimental Performance
		6.1 Experimental Setup
	7 Results and Analysis
		7.1 Evaluation Metrics
		7.2 Analysis
	8 Conclusion
	9 Future Work
	References
An Efficient Recognition and Classification System for Paddy Leaf Disease Using Naïve Bayes with Optimization Algorithm
	1 Introduction
	2 Related Work
	3 Problem Definition
	4 Proposed Methodology
		4.1 Image Acquisition
		4.2 Image Preprocessing
		4.3 Image Segmentation
		4.4 Feature Extraction
		4.5 Feature Selection
		4.6 Classification
	5 Result Analysis
	6 Conclusion
	References
Development of Decision-Making Prediction Model for Loan Eligibility Using Supervised Machine Learning
	1 Introduction
	2 Related Works
	3 Problem Statement
	4 Proposed Model
		4.1 Collection of Dataset
		4.2 Exploratory Data Analysis of Dataset
		4.3 Preprocessing of Data
		4.4 Feature Engineering with Dataset
		4.5 Design of System
	5 Machine Learning Model Selection
		5.1 k-Nearest Neighbor Model
		5.2 Random Forest Model
		5.3 Support Vector Machine Model
		5.4 Stratified k-Fold Cross-Validation Algorithm
	6 Conclusion and Future Scope
	References
Prediction of Osteoporosis Using Artificial Intelligence Techniques: A Review
	1 Introduction
	2 Literature Review
	3 Comparative Analysis
	4 Open Gaps and Challenges
	5 Proposed Intelligent Osteoporosis Classifier
		5.1 Dataset Description
		5.2 Data Preprocessing
	6 Conclusion
	References
Analyzing Stock Market with Machine Learning Techniques
	1 Introduction
	2 Review of Literature
	3 Proposed System
		3.1 Overview
		3.2 Data Collection
		3.3 Data Preprocessing
		3.4 Application of Various Models
	4 Accuracy Test of Various Models
	5 Conclusion
	References
Machine Learning Techniques for Image Manipulation Detection: A Review and Analysis
	1 Introduction
	2 Image Processing in ML
		2.1 Feature Extraction
	3 Types of Manipulations
	4 Manipulation Technique Detection
	5 Literature Survey
	6 Comparative Analysis and Discussion
	7 Datasets for Image Tempering Detection
	8 Research Gaps and Challenges
	9 Conclusion
	References
Improving Real-Time Intelligent Transportation Systems in Predicting Road Accident
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Big Data Gathering and Regulation
		3.2 Data Preprocessing
		3.3 Data Processing
		3.4 Data Prediction
	4 Results and Discussion
		4.1 Result for the Filtered Tweets
	5 Conclusion
	References
Consumer Buying Behavior Analysis During COVID-19 Phase Using Statistical Data Mining and Multi-verse Stochastic Algorithm
	1 Introduction
	2 Literature Review
	3 Materials and Methods
		3.1 Dataset Description
		3.2 Multi-verse Algorithm
		3.3 Data Preprocessing
		3.4 Association Rule Mining
	4 Proposed Method
		4.1 Data Optimization Using Multi-verse Algorithm
		4.2 Statistical Analysis
	5 Result and Discussion
	6 Conclusions and Future Scope
	References
IoT and  Networking
Addressing Role of Ambient Intelligence and Pervasive Computing in Today’s World
	1 Introduction
	2 Bibliometric Analysis for Ambient Intelligence and Pervasive Computing
		2.1 Bibliometric Analysis Web of Science Data
		2.2 Bibliometric Analysis SCOPUS Data
	3 Ambient Intelligence
		3.1 Applications of Ambient Intelligence in Today’s World
	4 Pervasive Computing
		4.1 Applications of Pervasive Computing in Today’s World
	5 Current Challenges for Ambient Intelligence and Pervasive Computing
	6 Conclusion
	References
Improving the AODV Routing Protocol Against Network Layer Attacks Using AntNet Algorithm in VANETs
	1 Introduction
		1.1 VANET Security Challenges
		1.2 AODV Routing Protocol
		1.3 AntNet Algorithm
	2 Proposed Method
		2.1 Simulation Design
	3 Results
	4 Discussion
	5 Conclusions
	References
A Comparative Study of IoT-Based Automated Hydroponic Smart Farms: An Urban Farming Perspective
	1 Introduction
	2 Related Work
	3 Review Selection Methodology
	4 IoT-Based Smart Hydroponic Farms
	5 Comparative Study and Analysis
	6 Conclusion
	7 Future Scope
	References
Smart Healthcare System Based on AIoT Emerging Technologies: A Brief Review
	1 Introduction
	2 Literature Survey
	3 Sensors Used in Health Care
	4 Challenges
	5 Applications of AIoT in Smart Health Care
	6 Conclusion and Future Scope
	References
Intelligent Communication for Internet of Things (IoRT)
	1 Introduction
		1.1 Internet of Robotic Things
	2 Architecture
		2.1 Physical Layer
		2.2 Network Layer
		2.3 Service Layer and Application Layer
	3 Application Domains
		3.1 Manufacturing
		3.2 Agriculture
		3.3 Health Care
		3.4 Education
		3.5 Surveillance
		3.6 Disaster Response
	4 Literature Survey
	5 Research Challenges
		5.1 Data Processing
		5.2 Robot Ethics
		5.3 Privacy
		5.4 Security Issues
	6 Proposed Methodology
		6.1 PRESENT Cipher Implementation
		6.2 Results
	7 Conclusion
	References
Energy-Efficient Priority-Based Routing Model for Smart Health Care
	1 Introduction
	2 Literature Survey
	3 Smart Health Care: Challenges
	4 Proposed Smart Healthcare Model
	5 Conclusion
	References
An Internet of Things-Based Mining Worker Safety Helmet Using ESP32 and Blynk App
	1 Introduction
	2 Literature Survey
	3 Proposed Method
	4 Circuit Diagram of Proposed Method
	5 Components
	6 Result Analysis
	7 Conclusion
	8 Future Scope
	References
Time Series-Based IDS for Detecting Botnet Attacks in IoT and Embedded Devices
	1 Introduction
	2 Different Types of Botnet Attacks
	3 IoT-Based Botnet Attacks
	4 Time Series-Based Models Used for Detecting Botnet Attacks
	5 Conclusion
	References
Swarm Intelligence-Based Energy-Efficient Framework in IoT
	1 Introduction
	2 Literature Survey
	3 Particle Swarm Optimization (PSO)
		3.1 Grey Wolf Optimizer
	4 Proposed Framework
	5 Conclusion
	References
Performance Analysis of MADM Techniques in Cognitive Radio for Proximity Services
	1 Introduction
	2 MADM Methodologies
		2.1 Grey Relational Analysis Method
		2.2 Cost Function Based Method
	3 Performance Analysis of Comparison Between Adaptive Threshold and Adaptive Double Threshold
	4 Results and Discussions
		4.1 Implementation of MADM Algorithms for Quad Play Services: Grey Relational Analysis
	5 Performance Comparison of MADM Algorithm Using Relative Standard Deviation
	6 Conclusion
	References
Image Processing and Computer Vision
Comparison of Debris Removal in Pap-Smear Images Using Enhanced Erosion and Dilation
	1 Introduction
	2 Literature Survey
	3 Materials and Methods
	4 Results and Discussion
	5 Conclusion
	References
Image Enhancement with Deep Learning and Intensity Transformation of No-Reference Grayscale Fluorescence Microscopy Images
	1 Introduction
	2 Materials and Methods
		2.1 Reference Data
		2.2 Methodology
	3 Results
		3.1 Evaluation Metrics
		3.2 Quantitative Results
	4 Conclusion
	References
Real-Time Human Action Recognition with Multimodal Dataset: A Study Review
	1 Introduction
	2 Background
	3 Depth Motion Maps as Features
	4 Human Activity Categorization
	5 Unimodal-Based Methods
	6 Multimodal-Based Methods
	7 Performance of Collected Dataset
	8 Conclusion
	References
KnowStress: A Mobile Application Prototype Detection of Stress and Stress Related Disorders
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 System Architecture
		3.2 Questionnaire
	4 Dataset
	5 Implementation
		5.1 Dimensionality Reduction
		5.2 Models
		5.3 KnowStress Prototype
	6 Results and Analysis
		6.1 Evaluation Metrics
		6.2 Analysis
	7 Conclusion
	8 Future Work
	References
Handwritten Character Evaluation and Recommendation System
	1 Introduction
	2 Literature Review
	3 Dataset
	4 Proposed Methodology
		4.1 Pre-Processing
		4.2 Feature Extraction and Classification
		4.3 Finding Similarity Score
		4.4 Analysis of the Image
	5 Results and Discussion
	6 Conclusion
	References
Prediction of Lung Disease from Respiratory Sounds Using Convolutional Neural Networks
	1 Introduction
	2 Literature Survey
	3 Proposed System
		3.1 Dataset Description
		3.2 Data Preprocessing
		3.3 CNN Model for Detection of Lungs Diseases
	4 Experimental Analysis
	5 Performance Analysis
	6 Conclusion
	References
SemWIRet: A Semantically Inclined Strategy for Web Image Recommendation Using Hybrid Intelligence
	1 Introduction
	2 Related Works
	3 Proposed System Architecture
	4 Implementation
	5 Conclusions
	References
Optimal Drug Recommender Framework for Medical Practitioners Based on Consumer Reviews
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Material and Methods
	5 Conclusion
	References
Development of Intelligent Framework for Early Prediction of Diabetic Retinopathy
	1 Introduction
	2 Literature Review
	3 Comparative Analysis
	4 Open Gaps and Challenges
	5 Proposed Framework
	6 Conclusion
	References
Healthcare Data Analysis Using Proposed Hybrid Harmony Genetic Diagnostic Model
	1 Introduction
	2 Background
		2.1 Related Work
		2.2 Harmony Search Algorithm
	3 Proposed Hybrid Harmony Search-Based Diagnostic Model
		3.1 Improved Harmony Search Algorithm
		3.2 HHSGA as a Clustering Technique
		3.3 Proposed HHSGA-Based Diagnostic Model
	4 Experimental Analysis
		4.1 Dataset Used
		4.2 Cluster Quality Measures
		4.3 Simulation Results
		4.4 Statistical Analysis
	5 Conclusion and Future Scope
	References
E-Learning, Cloud and Big Data
Cost Estimation Model Using Fifth Generation Language Technique for Software Maintenance Project
	1 Introduction
	2 Related Work
	3 Research Methodology Used
	4 Proposed Model for Software Maintenance Cost Estimation
		4.1 Data Used for Validation
		4.2 Fuzzy Inference System Rules Applied
	5 Experimental Results
		5.1 Root Mean Squared Error (RMSE)
		5.2 Mean Absolute Error (MAE)
	6 Comparison
	7 Conclusion
	References
Survey of Text Summarization Stratification
	1 Introduction
	2 Types of Summarization Techniques
		2.1 Based on Types of Approaches
		2.2 Depending on the Output Details
		2.3 Based on Content
		2.4 Based on the Language
		2.5 Based on a Source Document
	3 Extractive Summarization
		3.1 TF–IDF Frequency Method
		3.2 Text Summarization with Fuzzy Logic
		3.3 Text Summarization with Neural Network
		3.4 Cluster-Based Method
	4 Abstractive Summarization
		4.1 Tree-Based Method
		4.2 Template-Based Method
		4.3 Ontology-Based Method
		4.4 Graph-Based Method
	5 Conclusion
	References
A Systematic Study of Various Approaches and Problem Areas of Named Entity Recognition
	1 Introduction
		1.1 Named Entity Recognition
		1.2 Metrics
		1.3 State of the Art
	2 Literature Review
		2.1 Methodology
		2.2 Research Papers for Review from Year 2017
		2.3 Research Papers for Review from Year 2018
		2.4 Research Papers for Review from Year 2019
		2.5 Research Papers for Review from Year 2020
		2.6 Research Papers for Review from Year 2021
	3 Conclusion
	References
From Virtual World Back to Real Classrooms?
	1 Introduction
		1.1 Problem Detection
		1.2 Possible Solution—Interaction
		1.3 E-Lection, Our CRSs (Classroom Response Systems) Solution
	2 Dramatic Changes—Covid-19, the Time for Distance Education
		2.1 Our Faculty Solution
		2.2 The Environment of the Survey
		2.3 Likeness of Online Lessons
		2.4 May Substitute Classical Lessons?
		2.5 Lack of Interactivity
	3 We’ll Be Back … to the School
		3.1 The Environment of the Survey
		3.2 The Teaching Mode
		3.3 Interaction, Common Work?
		3.4 Lectures
		3.5 Practice Work
	4 Summary
	References
Aspect-Based Opinion Mining Framework for Product Rating Embedded with Fuzzy Decision
	1 Introduction
	2 Motivation
	3 Proposed Methodology
	4 Result and Discussion
	5 Conclusion
	References
The Problems and Organization of Learning Using Distance Educational Technologies: Practical Issues
	1 Introduction
	2 Requirements for Organizations of Education
		2.1 Information System and Educational Portal
	3 IoT in Primary Education
	4 Contribution: Previous Work
	5 Discussion
	6 Conclusion
	References
The Task of Question Answering in NLP: A Comprehensive Review
	1 Introduction
	2 General Architecture
		2.1 Question Processing
		2.2 Document Processing
		2.3 Answer Processing
	3 Background
	4 Benchmarks in NLP
		4.1 GLUE (General Language Understanding Evaluation)
		4.2 SuperGLUE
		4.3 SQuAD1.1 (Stanford Question Answering Dataset 1.1)
		4.4 SQuAD1.1 (Stanford Question Answering Dataset 2.0)
	5 Research
	6 Conclusion
	References
Monitoring False Colour in an External Monitor for Film and Television Production: An Evaluative Study
	1 Introduction
	2 Related Work
	3 Methodology
	4 Colour Balance
	5 High Dynamic Range (HDR)
	6 Advantages of False Colour
	7 Viewfinder Versus External Monitor
	8 Experiment and Results
	9 Conclusion and Future Work
	References
Adaptive Gamification in E-Learning Platforms: Enhancing Learners’ Experience
	1 Introduction
	2 Methodology
	3 Proposed Enhanced Operational Gamification Framework
	4 Implications of Work for Theory and Practice
	5 Conclusion
	References
A Study on the Integration of Different DLP Systems at Different Levels
	1 Introduction
	2 Literature Review
		2.1 Content Versus Context
		2.2 Content Analysis
	3 Content Analysis Techniques
		3.1 Rule-Based/Regular Expressions
		3.2 Database Fingerprinting
		3.3 Exact File Matching
		3.4 Partial Document Matching
		3.5 Statistical Analysis
		3.6 Conceptual/Lexicon
		3.7 Pre-built Categories
	4 Technical Architecture
		4.1 Securing Data in Motion, at Rest, and Use
		4.2 Data in Motion
		4.3 Data at Rest
		4.4 Data at Rest Enforcement
		4.5 Data in Use
		4.6 Limitations of Existing DLP Systems
	5 Conclusion and Future Scope
	References
Effect of Anime on Personality and Popularity of Japanese Culture
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Data Collection
		3.2 Exploratory Analysis
		3.3 Google Trends
	4 Analysis
		4.1 Percent Analysis
		4.2 Time Exposure to Anime Analysis
		4.3 Correlation Coefficient Analysis
	5 Result
		5.1 Percent Analysis
		5.2 Time Exposure to Anime Analysis
		5.3 Correlation Coefficient Analysis
		5.4 Google Trends Analysis
	6 Conclusion and Future Work
	References
Synthetic Time Series Data Generation Using Time GAN with Synthetic and Real-Time Data Analysis
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Time GAN
		3.2 Datasets
	4 Experiment and Evaluation
		4.1 PCA and TSNE
		4.2 Correlation
		4.3 Privacy Protection
	5 Result
	6 Conclusion and Future Scope
	References
How Big Data Analytical Framework has Redefined Academic Sciences
	1 Introduction
		1.1 Big Data Introduction
		1.2 Big Data Definition
		1.3 Big Data Source
		1.4 Big Data Types
	2 Literature Survey
	3 Big Data at University of Kashmir
	4 Technical Implementation
		4.1 MapReduce
		4.2 Hadoop
		4.3 NoSQL
	5 Technical Implementation
	6 Conclusion and Future Studies
	References
Software Complexity Prediction Model: A Combined Machine Learning Approach
	1 Introduction and Problem Definition
	2 Related Works
	3 Research Methodology
		3.1 Design of Software Complexity Prediction Model
		3.2 Data Exploration
		3.3 Feature Extraction
	4 Experimental Results
		4.1 Model Building Using Single Classifiers
		4.2 Model Building Using Combined Methods
	5 Performance Evaluation
	6 Experimental Discussion
		6.1 Effect of Dataset Size
		6.2 Effect of Methods on Performance
		6.3 Extracted Rules from Decision Trees
	7 Software Complexity Classification System: A Prototype
	8 Conclusion and Future Works
	References
Work with Information in an Outdoor Approach in Pre-primary Education
	1 Introduction
	2 Participants
	3 Measurement
		3.1 Results
	4 Conclusions and Discussion
	References
Cyber Security and Cyber Physical Systems and Digital Technologies
Human Versus Automatic Evaluation of NMT for Low-Resource Indian Language
	1 Introduction
	2 Previous Work
	3 Methodology
		3.1 Human Evaluation
		3.2 BLEU is an Automatic Metric
	4 Experimental Setup
	5 Analysis and Discussion
	6 Conclusion and Future Work
	References
Framework for Detection of Malware Using Random Forest Classifier
	1 Introduction
		1.1 Malware Detection Techniques
		1.2 Machine Learning (ML) Approaches for Detection of Malware
	2 Literature Survey
	3 Proposed Framework
		3.1 Technique
		3.2 Dataset
		3.3 Methodology
	4 Results and Discussion
	5 Conclusions
	References
Machine Learning-Based Intrusion Detection of Imbalanced Traffic on the Network: A Review
	1 Introduction
	2 Intrusion Identification Methods (IIMs)
	3 Network Intrusion Identification Model Framework
		3.1 Comparison of Accuracy on Datasets
		3.2 Comparison of Various ML-Based IDS Approaches
	4 Discussions
	5 Conclusion
	References
A Novel Approach to Acquire Data for Improving Machine Learning Models Through Smart Contracts
	1 Introduction
	2 Background
		2.1 Blockchain
		2.2 Smart Contracts
		2.3 Dataset Sourcing
		2.4 Federated Machine Learning
	3 Proposed Solution
	4 Functional Overview
		4.1 Commitment Phase
		4.2 Participation Phase
		4.3 Reward Phase
	5 Validation
	6 Conclusion
	References
Blockchain Framework for Automated Life Insurance
	1 Introduction
	2 Literature Review
	3 Background Work
		3.1 Blockchain
		3.2 Life Insurance Process
		3.3 Death Registry Process in India
	4 Gap Analysis
	5 Material and Methods
		5.1 Hyperledger Fabric
		5.2 Development Environment of Hyperledger
	6 Proposed Framework
		6.1 Methodology
		6.2 Design of Proposed Work
	7 Test Result
	8 Conclusion and Future Scope
	References
Blockchain for IoT: A Comprehensive Review for Precision Agricultural Networks
	1 Introduction
	2 Literature Review
	3 Blockchain and Its Requirements
	4 Security Challenges in IoT
	5 IoT Challenges in Precision Agriculture: Case Study
	6 IoT Performance Challenges and Blockchain Solutions
	7 Conclusion
	References
The Proof of Authority Consensus Algorithm for IIoT Security
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Proof of Authority
	4 Challenges in IIoT
	5 Benefits of Blockchain in IIoT
	6 Conclusion
	References
Machine Learning for Security of Cyber-Physical Systems and Security of Machine Learning: Attacks, Defences, and Current Approaches
	1 Introduction
		1.1 Architecture of CPS
		1.2 Security of CPS
		1.3 Contribution
		1.4 Paper Roadmap
	2 Security of Machine Learning
		2.1 Adversarial Attack Methods
		2.2 Adversarial Defence Methods
		2.3 Adversarial Threat Model ATM)
		2.4 ATM Case Study
	3 GAN-Based Adversarial Attacks
		3.1 Conditional GAN (C-GAN)
	4 Proposed Security Method
	5 Research Challenges and Gaps
	6 Conclusion
	References
Legal Challenges of Digital Twins in Smart Manufacturing
	1 Introduction
	2 Digital Twins: Philosophy or Reality?
	3 Digital Twins and Smart Manufacturing: Usage and Practices
		3.1 Digital Twins-Based Smart Manufacturing
		3.2 Digital Twins Architecture in Smart Manufacturing
		3.3 Digital Twins-Based Blockchain System
		3.4 Web Services and Cloud Computing for Distributed Digital Twins
	4 Legal Issues of Digital Twin
		4.1 Lack of Laws and Regulations
		4.2 Intellectual Property and Data Privacy
		4.3 Digital Twin and the Liability
		4.4 Algorithmic Integrity and Digital Twins
	5 Conclusion
	References
LSTM-Based Encoder–Decoder Attention Model for Text Translation and Simplification on the Constitution of India
	Abstract
	1 Introduction
	2 Literature Review
	3 Neural Machine Translation (NMT)
		3.1 Long- and Short-Term Memory (LSTM)
		3.2 Encoder and Decoder
		3.3 Bahdanau Attention Method
	4 Proposed Methodology
		4.1 Pre-processing and Tokenization
		4.2 Word Embedding
		4.3 Model Architecture
		4.4 Attention
	5 Corpus Description
		5.1 COI Translation Corpus
		5.2 COI Simplification Corpus
	6 Experimental Set-Up
		6.1 Experimental Resources
		6.2 Online Training
	7 Results and Analysis
		7.1 Evaluation Metrics
		7.2 Analysis
	8 Conclusion and Future Works
	References
Compiling C# Classes to Multiple Shader Sources for Multi-platform Real-Time Graphics
	1 Introduction
	2 Real-Time Graphics Library in C#
		2.1 Example of CPU-Side Rendering Code
		2.2 GPU Shaders
		2.3 Shader Classes in C#
		2.4 Complex C# Shaders
	3 C# Source Generators
	4 Shader Generation
		4.1 Shader Generator Preparation
		4.2 Shader Builders
		4.3 Shader Validation and SPIR-V Compilation
	5 Conclusion
	References
An Enhanced GLCM and PCA Algorithm for Image Watermarking
	1 Introduction
		1.1 Introduction to Image Processing
		1.2 Digital Image Watermarking
		1.3 Steps in Digital Image Watermarking
		1.4 Requirements for Digital Image Watermarking
		1.5 Applications of Digital Image Watermarking
		1.6 Watermarking Properties
		1.7 Threats for Watermarking
	2 Present Work
		2.1 Problem Definition
		2.2 Objectives of Research
		2.3 Research Methodology
	3 Result
	4 Conclusion
	5 Future Work
	References
Author Index




نظرات کاربران