ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 1

دانلود کتاب مجموعه مقالات کنفرانس بین المللی نوآوری های اخیر در محاسبات: ICRIC 2022، جلد 1

Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 1

مشخصات کتاب

Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 1

ویرایش:  
نویسندگان: , , , ,   
سری: Lecture Notes in Electrical Engineering, 1001 
ISBN (شابک) : 9811998752, 9789811998751 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 700 
زبان: English 
فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 69 Mb 

قیمت کتاب (تومان) : 45,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 1 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات کنفرانس بین المللی نوآوری های اخیر در محاسبات: ICRIC 2022، جلد 1 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب مجموعه مقالات کنفرانس بین المللی نوآوری های اخیر در محاسبات: ICRIC 2022، جلد 1

این کتاب شامل مقالات منتخب ارائه شده در پنجمین کنفرانس بین المللی نوآوری های اخیر در محاسبات (ICRIC 2022) است که در تاریخ 13 تا 14 می 2022 در دانشگاه مرکزی جامو، هند برگزار شد و توسط گروه علوم کامپیوتر و اطلاعات دانشگاه سازماندهی شد. فن آوری. کنفرانس با همکاری ELTE مجارستان برگزار شد. دانشگاه دانش، اربیل؛ آزمایشگاه تحقیقات امنیت سایبری و بسیاری دیگر از شرکای ملی و بین المللی. این کتاب در دو جلد تنظیم شده است و شامل آخرین تحقیقات در زمینه های مهندسی نرم افزار، رایانش ابری، شبکه های کامپیوتری و فناوری های اینترنت، هوش مصنوعی، امنیت اطلاعات، پایگاه داده و محاسبات توزیع شده و هند دیجیتال می باشد.


توضیحاتی درمورد کتاب به خارجی

This book features selected papers presented at the 5th International Conference on Recent Innovations in Computing (ICRIC 2022), held on May 13–14, 2022, at the Central University of Jammu, India, and organized by the university’s Department of Computer Science and Information Technology. The conference was hosted in association with ELTE, Hungary; Knowledge University, Erbil; Cyber Security Research Lab and many other national & international partners. The book is divided into two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.



فهرست مطالب

Preface
Contents
About the Editors
Artificial Intelligence
Brain Tumor Segmentation Using Fully Convolution Neural Network
	1 Introduction
	2 CNN Architectures for Brain Tumor Segmentation
		2.1 UNet Architecture
	3 Proposed Architecture—RDUNet
		3.1 RDUNet Architecture
	4 Implementation Details
		4.1 Dataset
		4.2 Pre-processing
		4.3 Results
		4.4 Evaluation Metrics
	5 Conclusion and Future Work
	References
Artificial Intelligence-Based Lung Nodule Detection: A Survey
	1 Introduction
	2 Literature Survey
	3 Datasets
		3.1 LIDC/IDR
		3.2 ANODE09
		3.3 LC 25000
	4 Approaches
		4.1 Deep Learning-Based Approach
	5 Performance Comparison
	6 Conclusion
	References
Correlative Exposition of Various Machine Learning Techniques for Urdu Handwritten Text Recognition
	1 Introduction
		1.1 Machine Learning Algorithms
		1.2 Deep Learning Algorithms
	2 Literature Review
	3 Comparative Analysis
	4 Conclusion
	References
Artificial Intelligence and Graph Theory Application for Diagnosis of Neurological Disorder Using fMRI
	1 Introduction
		1.1 Brain Connectivity
	2 Medical Applications fMRI
		2.1 About Functional Magnetic Resonance Imaging (fMRI)
	3 Artificial Intelligence (AI) and Graph Theory
		3.1 Graph Theory Application in Interpretation of Brain Network
		3.2 AI, ML, DL Methods for Classification of Disorders
	4 Constraints and Future Scope
	5 Conclusion
	References
Performance Analysis of Document Similarity-Based DBSCAN and K-Means Clustering on Text Datasets
	1 Introduction
	2 Related Work
	3 Experimental Work
		3.1 Dataset Creation and Selection
		3.2 Preprocessing
		3.3 TF-IDF Matrix Generation and Document Index Graph Generation
		3.4 Calculating Similarity Between Documents
		3.5 Optimal Parameter Calculation for Clustering
		3.6 Clustering
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Evolution of Autonomous Vehicle: An Artificial Intelligence Perspective
	1 Introduction
	2 Artificial Intelligence Analysis in Autonomous Vehicles
	3 History and Approaches of Artificial Intelligence
	4 Conclusion
	References
Systematic Review of Learning Models for Suicidal Ideation on Social Media
	1 Introduction
		1.1 Statistical Analysis
	2 State-Of-The-Art Works in Learning Models
		2.1 Machine Learning
		2.2 Deep Learning
		2.3 Transfer Learning
	3 Future Work and Conclusion
	References
A Novel Recommendation System for Mutual Management on Both OTT Video Streaming and Advertising Using Incremental Learning Approach
	1 Introduction
	2 Literature Survey
	3 Method Implementation
		3.1 Workflow of Incremental Learning (IL)
		3.2 Mutual Management Over OTT Video Streaming and Advertisements (MMOA) Based on IL
	4 Result Analysis
	5 Conclusion and Future Work
	References
Early Diagnosis of Cervical Cancer Using AI: A Review
	1 Introduction
	2 Techniques for Cervical Cancer Screening
		2.1 Convolutional Neural Network
		2.2 Support Vector Machine
		2.3 Multi-layer Perceptron
	3 Literature Review
	4 Conclusion
	References
Exploring Data-Driven Approaches for Apple Disease Prediction Systems
	1 Introduction
	2 Apple Disease: An Overview
	3 Literature Survey
	4 Open Research Challenges
	5 Conclusions
	References
Deep Learning Techniques Used for Fake News Detection: A Review and Analysis
	1 Introduction
	2 Deep Learning Models for Detecting Fake News
		2.1 Fake News Detection Taxonomy
	3 Literature Review
	4 Datasets for Detecting Fake News
	5 Comparative Analysis and Discussion
	6 General Framework
	7 Open Gaps and Challenges
	8 Conclusion
	References
Darkness Behind the Darknet: A Comparative Analysis of Darknet Traffic and the Crimes Behind the Darknet Using Machine Learning
	1 Introduction
	2 Related Work
	3 Proposed Model
		3.1 Dataset Details
		3.2 Feature Selection
		3.3 Principal Component Analysis
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Development of Chatbot Retrieving Fact-Based Information Using Knowledge Graph
	1 Introduction
		1.1 Semantic Web and Knowledge Graphs
	2 Literature Review
		2.1 Chatbot Development Platform
		2.2 General Architecture of Chatbot
		2.3 Question Answering Over Linked Data
		2.4 Chabot’s Using Knowledge Graphs
	3 Methodology
		3.1 Prerequisites and Requirements for Proposed Chatbot
		3.2 Data Collection
		3.3 Data Annotation and Preprocessing
		3.4 Rasa NLU
		3.5 Rasa Core
		3.6 Information Retrieval
		3.7 Proposed Chatbot Architecture
	4 Results
		4.1 Chatbots, Rasa NLU, and Core Testing
		4.2 Comparative Study with DBpedia Chatbot
	5 Conclusion
	References
Short-Term Load Demand Forecasting Using Artificial Neural Network
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Data Collection and Description for Load Demand
		3.2 Load Demand Forecasting Using Artificial Neural Networks
	4 Discussion
		4.1 Nigerian Load Demand Data
		4.2 Forecasting Accuracy
	5 Conclusion
	References
Comparative Analysis of Performances of Convolutional Neural Networks for Image Classification Tasks
	1 Introduction
	2 Literature Review
		2.1 The Concept of Deep Learning
		2.2 Convolutional Neural Networks
		2.3 Related Studies
	3 Methodology
		3.1 Description of the Proposed Model
		3.2 Experimental Setup
	4 Discussion of Results
		4.1 Performance Benchmarking
	5 Conclusion
	References
IoT and Networking
Detection of Android Malwares on IOT Platform Using PCA and Machine Learning
	1 Introduction
	2 Related Work
		2.1 Android Malware Analysis Technologies
	3 Methodology and Experiments
		3.1 Dataset
		3.2 Feature Extraction and Preprocessing
		3.3 Principal Component Analysis
		3.4 Investigating Deep Learning Classifier
	4 Experimental Discussions and Results
	5 Conclusion
	References
A Survey on Different Security Frameworks and IDS in Internet of Things
	1 Introduction
	2 Literature Survey
		2.1 IDS and Its Types
	3 Proposed Methodology
	4 Analysis and Discussion
	5 Conclusion
	References
Emerging IoT Platforms Facilitate Entrepreneurship Businesses
	1 Introduction
	2 Entrepreneurship Businesses
	3 The Internet of Things (IoT) and Its Platforms
		3.1 The Internet of Things (IoT)
		3.2 The Internet of Things (IoT) Platforms
	4 The Key Benefits of IoT in Entrepreneurships
		4.1 Reduced Operative Cost
		4.2 Enhanced System Performance
		4.3 Augmented Security
		4.4 Supports to New Business Models
		4.5 Better Customer Experience
	5 Proposed Security Architecture
	6 Challenges and Future Scope
		6.1 Project Designing
		6.2 Data Network Support
		6.3 Retaining and Storage of Data
		6.4 Data Security and Privacy
	7 Conclusion
	References
Navigation and Cognitive Techniques for Humanoid Robots
	1 Introduction
		1.1 Contributions
		1.2 Organization of Paper
	2 Related Work
		2.1 Humanoid Robot Architectures
		2.2 Navigation Based on Gaze Control
		2.3 Human–Robot Interactions
	3 Humanoid Robots: An Overview
		3.1 Legged and Wheeled Robots
	4 Navigation in Humanoid Robots
		4.1 Humanoid Robot Obstacle-Free Navigation Due to Hybrid Controller
	5 Open Research Challenges
	6 Conclusion
	References
An IoT-Based Approach for Visibility Enhancement and Fog Detection
	1 Introduction
		1.1 Organization of Paper
	2 Related Work
	3 Visibility Enhancement Methods
		3.1 Basic Theoretical Assumptions
	4 Visibility Enhancement Methods
		4.1 Architecture
		4.2 Key Features
		4.3 Technical Design Functions
	5 Conclusion
	References
Internet of Medical Things (IoMT) Application for Detection of Replication Attacks Using Deep Graph Neural Network
	1 Introduction
	2 Literature Survey
		2.1 IoMT Systems and Its Categorization
		2.2 Security and Privacy in the IoMT
	3 Proposed Methodology
		3.1 Proposed Security Framework for IoMT
		3.2 Different Categories of Attacks in IoMT Network
	4 Results Analysis
	5 Conclusion
	References
Image Processing and Computer Vision
A Review on GIF-Based Steganography Techniques
	1 Introduction
	2 Structure of GIF Files
		2.1 True Colour Images
		2.2 Indexed Images
	3 Performance Metrics
		3.1 Root Mean Squared Error (RMSE)
		3.2 Peak Signal-to-Noise Ratio (PSNR)
	4 Literature Review
	5 Future Direction
	6 Conclusion
	References
Optimization and Design of Efficient D Flip-Flops Using QCA Technology
	1 Introduction
	2 Existing D Flip-Flop Designs
	3 Optimized Designs and Performance Comparison
	4 Proposed Design of D Flip-Flop
	5 Conclusion
	References
Analysis of Breast Cancer Prediction Using Machine Learning Techniques: Review Paper
	1 Introduction
		1.1 Benign
		1.2 Malignant
		1.3 Breast Cancer Detection
		1.4 Breast Cancer Detection
		1.5 Levels of Breast Cancer Detection
		1.6 Medical Imaging Modalities
	2 Literature Review
	3 Machine Learning Algorithms
	4 Suggested Methodology
	5 Conclusion
	References
Soil Classification Using Machine Learning, Deep Learning, and Computer Vision: A Review
	1 Introduction
	2 Literature Review
	3 Findings
	4 Different ML, DL, and Computer Vision Techniques Are Used for Soil Classification
	5 Machine and Deep Learning Application in Soil Classification
		5.1 Prediction of Soil Properties and Weather
		5.2 Soil Management
		5.3 Weed Classification
		5.4 Seed Classification
	6 Comparison of Machine Learning-Based Soil Classification Methods
	7 Comparison of Deep Learning-Based Soil Classification Methods
	8 Comparison of Computer Vision-Based Soil Classification Methods
	9 Challenges
	10 Conclusions and Future Work
	References
Robust Color Texture Descriptors for Color Face Recognition
	1 Introduction
	2 The Proposed Methods: Local Correlation of Pixels
		2.1 The LBPC_A Operator
		2.2 The LBPC_C Operator
	3 Experimental Analysis
		3.1 Experimental Setup
		3.2 Selection of Parameters
		3.3 Performance Evaluation Under Illumination Variation
		3.4 Performance Evaluation Under Expression Variation
		3.5 Experimental Results Under Occlusion Variation
	4 Results and Conclusion
	References
Comparative Analysis of Transfer Learning Models in Classification of Histopathological Whole Slide Images
	1 Introduction
	2 Literature Review
	3 Approaches in AI for Classification of Histopathological Images
		3.1 Neural Networks
		3.2 Deep Learning
		3.3 Transfer Learning (TL)
		3.4 Fine-Tunned CNN Model
	4 Proposed Methodology
	5 Models Used
		5.1 Mobile Net V2
		5.2 Xception Model
		5.3 Efficient Net V2L
		5.4 NasNet Large
	6 Result and Analysis
	7 Conclusion
	References
Attention-Deficit Hyperactivity Disorder Spectrum Using ADHD_sfMRI
	1 Introduction
		1.1 Structural MRI
		1.2 Functional MRI
		1.3 Organization of Paper
	2 Literature Review
	3 Comparative Analysis
		3.1 Relative Comparison of Existing MRI-Based Attention-Deficit Hyperactivity Disorder Techniques
	4 Research Gaps and Challenges
	5 Proposed ADHD_sfMRI
	6 Conclusion and Future Scope
	References
Applications of Deep Learning in Healthcare: A Systematic Analysis
	1 Introduction
		1.1 Deep Learning Architectures
	2 Literature Review
	3 Drug Discovery
		3.1 Drug Properties Prediction
		3.2 Drug-Target Interaction (DTI)
		3.3 De Novo Drugs
	4 Medical Imaging
		4.1 Diabetic Retinopathy
		4.2 Breast Cancer
		4.3 COVID-19
	5 Electronic Health Records
	6 Challenges
	7 Opportunities
	8 Conclusion
	References
Real-Time Grade Prediction for Students Using Machine Learning
	1 Introduction
	2 Related Work
	3 Methodology and Experimental Design
		3.1 Dataset Description
		3.2 Dataset Preprocess
		3.3 Features Selection
		3.4 Machine and Deep Learning Techniques
		3.5 Evaluation Metrics
	4 Models Evaluation
	5 Conclusion and Future Directions
	References
A Comparative Analysis on Machine Learning Techniques for Driver Distraction Detection
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 Feature Extraction
		3.2 Data Preprocessing
		3.3 Dimensionality Reduction
		3.4 PCA
		3.5 LDA
		3.6 LDA Over PCA
	4 Model Building
		4.1 Grid Search
		4.2 Model Training
		4.3 Model Analysis
		4.4 Validation Score
	5 Performance Measure
	6 Result and Conclusion
	References
Machine Learning Recognition Mechanism Based on WI-FI Signal Optimization in the Detection of Driver’s Emotional Fluctuations
	1 Introduction
	2 Background
		2.1 Research Status Analysis
		2.2 The Research Focus of This Paper
	3 Methodology
		3.1 Global Architecture
		3.2 Data Collection Work
		3.3 Antenna Identification Signal Algorithm of WI-FI Device
		3.4 Brake and Accelerator Signal Recognition Algorithm During Driving
		3.5 Mood Fluctuations Under the LSTM Algorithm
		3.6 Machine Learning Algorithm Output
	4 Result
		4.1 Antenna Distance Radius Statistics Under Fresnel Zone Model
		4.2 The Algorithm After Machine Learning Outputs the Detection Result
	5 Conclusion
	References
Dark Channel Prior-Based Image Dehazing Algorithm for Single Outdoor Image
	1 Introduction
	2 Related Work
		2.1 Hazed Image Model
		2.2 Dark Channel Prior
		2.3 Transmission Estimation
	3 Proposed Method
	4 Experiments and Result
	5 Conclusion
	References
Real-Time Driver Sleepiness Detection and Classification Using Fusion Deep Learning Algorithm
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Conclusion
	References
E-Learning Cloud and Big Data
Tutorial on Service-Oriented Architecture: Vision, Key Enablers, and Case Study
	1 Introduction
		1.1 Motivations
		1.2 Research Contributions
		1.3 Article Layout
	2 SOA Enablers and Existing Schemes
		2.1 SOA Enablers
		2.2 Existing Schemes
	3 Interplay of SOA and the Web: Key Protocols
		3.1 Simple Object Access Protocol
		3.2 Web Services Description Language
		3.3 Universal Description, Discovery, and Integration
	4 Security in SOA Architecture: Handshake-based Scenarios
		4.1 Simple Authentication Protocol
		4.2 Mutual Authentication
		4.3 Authentication and Session Keys
		4.4 Perfect Forward Secrecy
		4.5 Anonymity Communication
	5 A SOA Testing Framework
	6 Key Challenges
	7 Case Study: BC-Assisted Web 3.0 and SOA-Oriented Healthcare Microservice Applicative Framework
		7.1 Distributed File Systems
		7.2 Blockchain
		7.3 Enterprise SOA and Web 3.0
	8 Conclusion and Future Work
	References
Container Division and Optimization (CDO) Algorithm for Secured Job Processing in Cloud
	1 Introduction
	2 Literature Survey
		2.1 Container Scheduling Techniques
	3 Methodology Implementation
		3.1 Container Division and Optimization (CDO) Algorithm
		3.2 Optimal Migration
	4 Result Analysis
	5 Conclusion
	References
An Optimized Search-Enabled Hotel Recommender System
	1 Introduction
		1.1 Recommender Systems
	2 Novelty of Work
	3 Literature Review
	4 Proposed Methodology
		4.1 Data and Its Extraction
		4.2 Preprocessing and Feature Extraction
		4.3 Machine Learning (ML)
	5 Experiment and Simulation Results
	6 Conclusion
	References
An Approach for Integrating a Prominent Conversational Chatbot with a Contact Center
	1 Introduction
	2 Preliminary Work
		2.1 Conversational Chatbot
		2.2 Contact Center
	3 Conversational Chatbot Integration with Contact Center AI
	4 Bot Bridge
		4.1 Implementation of Bot Bridge with Cloud Contact Center
	5 Conclusion
	References
IPFS: An Off-Chain Storage Solution for Blockchain
	1 Introduction
		1.1 Blockchain
		1.2 Inter-planetary File System (IPFS)
	2 Related Work
	3 IPFS Architecture
		3.1 Identities
		3.2 Network
		3.3 Routing
		3.4 Exchange
		3.5 Objects
		3.6 File
		3.7 Naming
	4 Blockchain-IPFS Convergence
		4.1 Features of Blockchain-IPFS Convergence
		4.2 Potential Applications of Blockchain-IPFS Convergence
	5 Conclusion and Future Work
	References
Hybrid Approach for Resource Allocation and Task Scheduling on Cloud Computing: A Review
	1 Introduction
		1.1 Components of Cloud Computing
		1.2 Important Processes of Cloud Computing
		1.3 Paper Contributions
		1.4 Paper Outline
	2 Related Work
		2.1 Review of Task Scheduling and Resource Allocation Methodologies
		2.2 Review of Behavioral Inspired Algorithms-Based Scheduling and Load Balancing Methodologies
	3 Hybrid Approaches for Resource Allocation
		3.1 Load Balancing in Cloud Computing
		3.2 Resource Allocation in Cloud Computing
		3.3 Cloud Resource Managers
		3.4 Load Balancing Genetic Algorithm (LAGA) Algorithm
		3.5 Load Balancing Ant Colony Optimization
	4 Hybrid Approaches for Task Scheduling
		4.1 Cuckoo Search
		4.2 Harmony Search
		4.3 Cuckoo Harmony Search Algorithm (CHSA)
		4.4 Task Scheduling Using Hybrid CHSA
	5 Analyzed Hybrid Approaches for Resource Allocation and Task Scheduling on Cloud Computing
	6 Conclusion
	References
Beginners Online Programming Course for Making Games in Construct 2
	1 Introduction and Related Work
	2 Game-Making and Teaching Programming and Algorithmisation
	3 How Making Games Teaches Pupils Key Programming Concepts
	4 Description of the Beginner’s Programming Course for Making Games
	5 Tutorials
	6 The Survey of the Experimental Teaching Method—The Programming Course
	7 Results and Discussion
	8 Conclusion
	References
Cyber Security and Cyber Physical Systems
Ride-Sharing Service Based on Ethereum
	1 Introduction
		1.1 Blockchain
		1.2 Ethereum
	2 Literature Review
	3 Proposed Methodology
	4 Result
	5 Conclusion
	References
Performance Analysis of User Authentication Schemes in Wireless Sensor Networks
	1 Introduction
	2 Contribution
	3 Literature Review
	4 Open Challenges
	5 Tools and Testing
	6 Performance Analysis of User Authentication Algorithms
		6.1 Computational Overhead
		6.2 Communication Overhead
		6.3 Running Time
	7 Conclusion
	References
A Secure Authenticated Key Agreement Protocol Using Polynomials
	1 Introduction
	2 State of the Art
	3 The Proposed Scheme
		3.1 Mathematical Preliminaries
		3.2 Problem Formulation
		3.3 The Proposed KAP Protocol
		3.4 Flow Diagram and Working Example
		3.5 Generalization of the Above Protocol
	4 Conclusion and Future Scope
	References
Randomness Analysis of Secured One-Time Password Generation Scheme for Financial Ecosystems
	1 Introduction
		1.1 Article Layout
	2 Security Analysis of Kumar et al. Scheme
	3 The Proposed Scheme
		3.1 Advantages of the Scheme
	4 Conclusions and Future Scope
	References
Social Bot Detection Techniques and Challenges—A Review Approach
	1 Introduction
	2 Background
		2.1 Social Media Bot Detection Process
		2.2 Static Rule-Based Approach
	3 Challenges
		3.1 Credential Stuffing Attacks
		3.2 Scraping Bots
		3.3 DDOS Attack
		3.4 Inventory Denial Attacks
	4 Systematic Review Methodologies
		4.1 Graph-Based Bot Detection Technique
		4.2 Crowd Sourcing-Based Bot Detection Technique
		4.3 Machine Learning-Based Bot Detection Technique
		4.4 Anomaly Based Bot Detection Technique
	5 Result Analysis
	6 Conclusion
	References
Digital India
Bidirectional Machine Translation for Punjabi-English, Punjabi-Hindi, and Hindi-English Language Pairs
	Abstract
	1 Introduction
	2 Development of Dataset
		2.1 Preprocessing of Hindi-English Parallel Corpus
		2.2 Corpus Statistics
	3 Design and Architecture
		3.1 Language Model
		3.2 Translation Model
		3.3 Decoder
	4 Setup and Analysis of Experiments
		4.1 Preprocessing of Dataset
		4.2 Training of Proposed System
		4.3 Results
		4.4 Analysis of Output
	5 Conclusion
	References
A Survey of Machine Learning for Assessing and Estimating Student Performance
	1 Introduction
	2 Methodology
	3 Methods
		3.1 Machine Learning
		3.2 Recommender System
		3.3 Artificial Neural Network
	4 Objectives
		4.1 Student withdrawal
		4.2 Student Performance
		4.3 Estimating Student’s Performance and Knowledge at Risk
	5 Discussion
	6 Conclusion
	References
Recent Innovations of Computing in Education: Emerging Collaborative Blended Learning Models in India
	1 Introduction
	2 Studies Related to Blended Learning
	3 Blended Learning
		3.1 Different Conceptualizations of Blended Learning
		3.2 Benefits of Blended Learning (Mixed Mode Instructions)
		3.3 Emerging Collaborative Blended Learning Model
		3.4 Co-teaching Model
	4 Reflections
	References
Online Learning in Teaching Initial Math Education
	1 Introduction
	2 Teaching Initial Math Education
	3 Analysis of the Results
	4 Conclusion
	References
Educational Robotics in Teaching Programming in Primary School
	1 Introduction
	2 The Role of Educational Robotics in Teaching Programming in Elementary School
	3 From Toy Programming to Robot Programming
		3.1 Bee-Bot
		3.2 Pro-Bot
		3.3 InO-Bot
	4 Equipping Elementary Schools with Programmable Toys and Robotic Kits
	5 Evaluation of Selected Questions of the Questionnaire Survey
		5.1 Robotic Kits in Schools
		5.2 What Influences the Teacher’s Choice of Robotic Building Blocks
		5.3 In Which Language Do the Teachers Program the Control of the Robot
		5.4 How Programming Was Taught During the Pandemic
	6 An Example of a Control Program for a Simple Robot
	7 Conclusions
	References
Author Index




نظرات کاربران