دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Yashwant Singh, Pradeep Kumar Singh, Maheshkumar H. Kolekar, Arpan Kumar Kar, Paulo J. Sequeira Gonçalves سری: Lecture Notes in Electrical Engineering, 1001 ISBN (شابک) : 9811998752, 9789811998751 ناشر: Springer سال نشر: 2023 تعداد صفحات: 700 زبان: English فرمت فایل : EPUB (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 69 Mb
در صورت تبدیل فایل کتاب Proceedings of International Conference on Recent Innovations in Computing: ICRIC 2022, Volume 1 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات کنفرانس بین المللی نوآوری های اخیر در محاسبات: ICRIC 2022، جلد 1 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مقالات منتخب ارائه شده در پنجمین کنفرانس بین المللی نوآوری های اخیر در محاسبات (ICRIC 2022) است که در تاریخ 13 تا 14 می 2022 در دانشگاه مرکزی جامو، هند برگزار شد و توسط گروه علوم کامپیوتر و اطلاعات دانشگاه سازماندهی شد. فن آوری. کنفرانس با همکاری ELTE مجارستان برگزار شد. دانشگاه دانش، اربیل؛ آزمایشگاه تحقیقات امنیت سایبری و بسیاری دیگر از شرکای ملی و بین المللی. این کتاب در دو جلد تنظیم شده است و شامل آخرین تحقیقات در زمینه های مهندسی نرم افزار، رایانش ابری، شبکه های کامپیوتری و فناوری های اینترنت، هوش مصنوعی، امنیت اطلاعات، پایگاه داده و محاسبات توزیع شده و هند دیجیتال می باشد.
This book features selected papers presented at the 5th International Conference on Recent Innovations in Computing (ICRIC 2022), held on May 13–14, 2022, at the Central University of Jammu, India, and organized by the university’s Department of Computer Science and Information Technology. The conference was hosted in association with ELTE, Hungary; Knowledge University, Erbil; Cyber Security Research Lab and many other national & international partners. The book is divided into two volumes, and it includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.
Preface Contents About the Editors Artificial Intelligence Brain Tumor Segmentation Using Fully Convolution Neural Network 1 Introduction 2 CNN Architectures for Brain Tumor Segmentation 2.1 UNet Architecture 3 Proposed Architecture—RDUNet 3.1 RDUNet Architecture 4 Implementation Details 4.1 Dataset 4.2 Pre-processing 4.3 Results 4.4 Evaluation Metrics 5 Conclusion and Future Work References Artificial Intelligence-Based Lung Nodule Detection: A Survey 1 Introduction 2 Literature Survey 3 Datasets 3.1 LIDC/IDR 3.2 ANODE09 3.3 LC 25000 4 Approaches 4.1 Deep Learning-Based Approach 5 Performance Comparison 6 Conclusion References Correlative Exposition of Various Machine Learning Techniques for Urdu Handwritten Text Recognition 1 Introduction 1.1 Machine Learning Algorithms 1.2 Deep Learning Algorithms 2 Literature Review 3 Comparative Analysis 4 Conclusion References Artificial Intelligence and Graph Theory Application for Diagnosis of Neurological Disorder Using fMRI 1 Introduction 1.1 Brain Connectivity 2 Medical Applications fMRI 2.1 About Functional Magnetic Resonance Imaging (fMRI) 3 Artificial Intelligence (AI) and Graph Theory 3.1 Graph Theory Application in Interpretation of Brain Network 3.2 AI, ML, DL Methods for Classification of Disorders 4 Constraints and Future Scope 5 Conclusion References Performance Analysis of Document Similarity-Based DBSCAN and K-Means Clustering on Text Datasets 1 Introduction 2 Related Work 3 Experimental Work 3.1 Dataset Creation and Selection 3.2 Preprocessing 3.3 TF-IDF Matrix Generation and Document Index Graph Generation 3.4 Calculating Similarity Between Documents 3.5 Optimal Parameter Calculation for Clustering 3.6 Clustering 4 Results and Discussion 5 Conclusion and Future Work References Evolution of Autonomous Vehicle: An Artificial Intelligence Perspective 1 Introduction 2 Artificial Intelligence Analysis in Autonomous Vehicles 3 History and Approaches of Artificial Intelligence 4 Conclusion References Systematic Review of Learning Models for Suicidal Ideation on Social Media 1 Introduction 1.1 Statistical Analysis 2 State-Of-The-Art Works in Learning Models 2.1 Machine Learning 2.2 Deep Learning 2.3 Transfer Learning 3 Future Work and Conclusion References A Novel Recommendation System for Mutual Management on Both OTT Video Streaming and Advertising Using Incremental Learning Approach 1 Introduction 2 Literature Survey 3 Method Implementation 3.1 Workflow of Incremental Learning (IL) 3.2 Mutual Management Over OTT Video Streaming and Advertisements (MMOA) Based on IL 4 Result Analysis 5 Conclusion and Future Work References Early Diagnosis of Cervical Cancer Using AI: A Review 1 Introduction 2 Techniques for Cervical Cancer Screening 2.1 Convolutional Neural Network 2.2 Support Vector Machine 2.3 Multi-layer Perceptron 3 Literature Review 4 Conclusion References Exploring Data-Driven Approaches for Apple Disease Prediction Systems 1 Introduction 2 Apple Disease: An Overview 3 Literature Survey 4 Open Research Challenges 5 Conclusions References Deep Learning Techniques Used for Fake News Detection: A Review and Analysis 1 Introduction 2 Deep Learning Models for Detecting Fake News 2.1 Fake News Detection Taxonomy 3 Literature Review 4 Datasets for Detecting Fake News 5 Comparative Analysis and Discussion 6 General Framework 7 Open Gaps and Challenges 8 Conclusion References Darkness Behind the Darknet: A Comparative Analysis of Darknet Traffic and the Crimes Behind the Darknet Using Machine Learning 1 Introduction 2 Related Work 3 Proposed Model 3.1 Dataset Details 3.2 Feature Selection 3.3 Principal Component Analysis 4 Results and Discussion 5 Conclusion and Future Work References Development of Chatbot Retrieving Fact-Based Information Using Knowledge Graph 1 Introduction 1.1 Semantic Web and Knowledge Graphs 2 Literature Review 2.1 Chatbot Development Platform 2.2 General Architecture of Chatbot 2.3 Question Answering Over Linked Data 2.4 Chabot’s Using Knowledge Graphs 3 Methodology 3.1 Prerequisites and Requirements for Proposed Chatbot 3.2 Data Collection 3.3 Data Annotation and Preprocessing 3.4 Rasa NLU 3.5 Rasa Core 3.6 Information Retrieval 3.7 Proposed Chatbot Architecture 4 Results 4.1 Chatbots, Rasa NLU, and Core Testing 4.2 Comparative Study with DBpedia Chatbot 5 Conclusion References Short-Term Load Demand Forecasting Using Artificial Neural Network 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Collection and Description for Load Demand 3.2 Load Demand Forecasting Using Artificial Neural Networks 4 Discussion 4.1 Nigerian Load Demand Data 4.2 Forecasting Accuracy 5 Conclusion References Comparative Analysis of Performances of Convolutional Neural Networks for Image Classification Tasks 1 Introduction 2 Literature Review 2.1 The Concept of Deep Learning 2.2 Convolutional Neural Networks 2.3 Related Studies 3 Methodology 3.1 Description of the Proposed Model 3.2 Experimental Setup 4 Discussion of Results 4.1 Performance Benchmarking 5 Conclusion References IoT and Networking Detection of Android Malwares on IOT Platform Using PCA and Machine Learning 1 Introduction 2 Related Work 2.1 Android Malware Analysis Technologies 3 Methodology and Experiments 3.1 Dataset 3.2 Feature Extraction and Preprocessing 3.3 Principal Component Analysis 3.4 Investigating Deep Learning Classifier 4 Experimental Discussions and Results 5 Conclusion References A Survey on Different Security Frameworks and IDS in Internet of Things 1 Introduction 2 Literature Survey 2.1 IDS and Its Types 3 Proposed Methodology 4 Analysis and Discussion 5 Conclusion References Emerging IoT Platforms Facilitate Entrepreneurship Businesses 1 Introduction 2 Entrepreneurship Businesses 3 The Internet of Things (IoT) and Its Platforms 3.1 The Internet of Things (IoT) 3.2 The Internet of Things (IoT) Platforms 4 The Key Benefits of IoT in Entrepreneurships 4.1 Reduced Operative Cost 4.2 Enhanced System Performance 4.3 Augmented Security 4.4 Supports to New Business Models 4.5 Better Customer Experience 5 Proposed Security Architecture 6 Challenges and Future Scope 6.1 Project Designing 6.2 Data Network Support 6.3 Retaining and Storage of Data 6.4 Data Security and Privacy 7 Conclusion References Navigation and Cognitive Techniques for Humanoid Robots 1 Introduction 1.1 Contributions 1.2 Organization of Paper 2 Related Work 2.1 Humanoid Robot Architectures 2.2 Navigation Based on Gaze Control 2.3 Human–Robot Interactions 3 Humanoid Robots: An Overview 3.1 Legged and Wheeled Robots 4 Navigation in Humanoid Robots 4.1 Humanoid Robot Obstacle-Free Navigation Due to Hybrid Controller 5 Open Research Challenges 6 Conclusion References An IoT-Based Approach for Visibility Enhancement and Fog Detection 1 Introduction 1.1 Organization of Paper 2 Related Work 3 Visibility Enhancement Methods 3.1 Basic Theoretical Assumptions 4 Visibility Enhancement Methods 4.1 Architecture 4.2 Key Features 4.3 Technical Design Functions 5 Conclusion References Internet of Medical Things (IoMT) Application for Detection of Replication Attacks Using Deep Graph Neural Network 1 Introduction 2 Literature Survey 2.1 IoMT Systems and Its Categorization 2.2 Security and Privacy in the IoMT 3 Proposed Methodology 3.1 Proposed Security Framework for IoMT 3.2 Different Categories of Attacks in IoMT Network 4 Results Analysis 5 Conclusion References Image Processing and Computer Vision A Review on GIF-Based Steganography Techniques 1 Introduction 2 Structure of GIF Files 2.1 True Colour Images 2.2 Indexed Images 3 Performance Metrics 3.1 Root Mean Squared Error (RMSE) 3.2 Peak Signal-to-Noise Ratio (PSNR) 4 Literature Review 5 Future Direction 6 Conclusion References Optimization and Design of Efficient D Flip-Flops Using QCA Technology 1 Introduction 2 Existing D Flip-Flop Designs 3 Optimized Designs and Performance Comparison 4 Proposed Design of D Flip-Flop 5 Conclusion References Analysis of Breast Cancer Prediction Using Machine Learning Techniques: Review Paper 1 Introduction 1.1 Benign 1.2 Malignant 1.3 Breast Cancer Detection 1.4 Breast Cancer Detection 1.5 Levels of Breast Cancer Detection 1.6 Medical Imaging Modalities 2 Literature Review 3 Machine Learning Algorithms 4 Suggested Methodology 5 Conclusion References Soil Classification Using Machine Learning, Deep Learning, and Computer Vision: A Review 1 Introduction 2 Literature Review 3 Findings 4 Different ML, DL, and Computer Vision Techniques Are Used for Soil Classification 5 Machine and Deep Learning Application in Soil Classification 5.1 Prediction of Soil Properties and Weather 5.2 Soil Management 5.3 Weed Classification 5.4 Seed Classification 6 Comparison of Machine Learning-Based Soil Classification Methods 7 Comparison of Deep Learning-Based Soil Classification Methods 8 Comparison of Computer Vision-Based Soil Classification Methods 9 Challenges 10 Conclusions and Future Work References Robust Color Texture Descriptors for Color Face Recognition 1 Introduction 2 The Proposed Methods: Local Correlation of Pixels 2.1 The LBPC_A Operator 2.2 The LBPC_C Operator 3 Experimental Analysis 3.1 Experimental Setup 3.2 Selection of Parameters 3.3 Performance Evaluation Under Illumination Variation 3.4 Performance Evaluation Under Expression Variation 3.5 Experimental Results Under Occlusion Variation 4 Results and Conclusion References Comparative Analysis of Transfer Learning Models in Classification of Histopathological Whole Slide Images 1 Introduction 2 Literature Review 3 Approaches in AI for Classification of Histopathological Images 3.1 Neural Networks 3.2 Deep Learning 3.3 Transfer Learning (TL) 3.4 Fine-Tunned CNN Model 4 Proposed Methodology 5 Models Used 5.1 Mobile Net V2 5.2 Xception Model 5.3 Efficient Net V2L 5.4 NasNet Large 6 Result and Analysis 7 Conclusion References Attention-Deficit Hyperactivity Disorder Spectrum Using ADHD_sfMRI 1 Introduction 1.1 Structural MRI 1.2 Functional MRI 1.3 Organization of Paper 2 Literature Review 3 Comparative Analysis 3.1 Relative Comparison of Existing MRI-Based Attention-Deficit Hyperactivity Disorder Techniques 4 Research Gaps and Challenges 5 Proposed ADHD_sfMRI 6 Conclusion and Future Scope References Applications of Deep Learning in Healthcare: A Systematic Analysis 1 Introduction 1.1 Deep Learning Architectures 2 Literature Review 3 Drug Discovery 3.1 Drug Properties Prediction 3.2 Drug-Target Interaction (DTI) 3.3 De Novo Drugs 4 Medical Imaging 4.1 Diabetic Retinopathy 4.2 Breast Cancer 4.3 COVID-19 5 Electronic Health Records 6 Challenges 7 Opportunities 8 Conclusion References Real-Time Grade Prediction for Students Using Machine Learning 1 Introduction 2 Related Work 3 Methodology and Experimental Design 3.1 Dataset Description 3.2 Dataset Preprocess 3.3 Features Selection 3.4 Machine and Deep Learning Techniques 3.5 Evaluation Metrics 4 Models Evaluation 5 Conclusion and Future Directions References A Comparative Analysis on Machine Learning Techniques for Driver Distraction Detection 1 Introduction 2 Literature Survey 3 Proposed Methodology 3.1 Feature Extraction 3.2 Data Preprocessing 3.3 Dimensionality Reduction 3.4 PCA 3.5 LDA 3.6 LDA Over PCA 4 Model Building 4.1 Grid Search 4.2 Model Training 4.3 Model Analysis 4.4 Validation Score 5 Performance Measure 6 Result and Conclusion References Machine Learning Recognition Mechanism Based on WI-FI Signal Optimization in the Detection of Driver’s Emotional Fluctuations 1 Introduction 2 Background 2.1 Research Status Analysis 2.2 The Research Focus of This Paper 3 Methodology 3.1 Global Architecture 3.2 Data Collection Work 3.3 Antenna Identification Signal Algorithm of WI-FI Device 3.4 Brake and Accelerator Signal Recognition Algorithm During Driving 3.5 Mood Fluctuations Under the LSTM Algorithm 3.6 Machine Learning Algorithm Output 4 Result 4.1 Antenna Distance Radius Statistics Under Fresnel Zone Model 4.2 The Algorithm After Machine Learning Outputs the Detection Result 5 Conclusion References Dark Channel Prior-Based Image Dehazing Algorithm for Single Outdoor Image 1 Introduction 2 Related Work 2.1 Hazed Image Model 2.2 Dark Channel Prior 2.3 Transmission Estimation 3 Proposed Method 4 Experiments and Result 5 Conclusion References Real-Time Driver Sleepiness Detection and Classification Using Fusion Deep Learning Algorithm 1 Introduction 2 Related Work 3 Proposed Methodology 4 Conclusion References E-Learning Cloud and Big Data Tutorial on Service-Oriented Architecture: Vision, Key Enablers, and Case Study 1 Introduction 1.1 Motivations 1.2 Research Contributions 1.3 Article Layout 2 SOA Enablers and Existing Schemes 2.1 SOA Enablers 2.2 Existing Schemes 3 Interplay of SOA and the Web: Key Protocols 3.1 Simple Object Access Protocol 3.2 Web Services Description Language 3.3 Universal Description, Discovery, and Integration 4 Security in SOA Architecture: Handshake-based Scenarios 4.1 Simple Authentication Protocol 4.2 Mutual Authentication 4.3 Authentication and Session Keys 4.4 Perfect Forward Secrecy 4.5 Anonymity Communication 5 A SOA Testing Framework 6 Key Challenges 7 Case Study: BC-Assisted Web 3.0 and SOA-Oriented Healthcare Microservice Applicative Framework 7.1 Distributed File Systems 7.2 Blockchain 7.3 Enterprise SOA and Web 3.0 8 Conclusion and Future Work References Container Division and Optimization (CDO) Algorithm for Secured Job Processing in Cloud 1 Introduction 2 Literature Survey 2.1 Container Scheduling Techniques 3 Methodology Implementation 3.1 Container Division and Optimization (CDO) Algorithm 3.2 Optimal Migration 4 Result Analysis 5 Conclusion References An Optimized Search-Enabled Hotel Recommender System 1 Introduction 1.1 Recommender Systems 2 Novelty of Work 3 Literature Review 4 Proposed Methodology 4.1 Data and Its Extraction 4.2 Preprocessing and Feature Extraction 4.3 Machine Learning (ML) 5 Experiment and Simulation Results 6 Conclusion References An Approach for Integrating a Prominent Conversational Chatbot with a Contact Center 1 Introduction 2 Preliminary Work 2.1 Conversational Chatbot 2.2 Contact Center 3 Conversational Chatbot Integration with Contact Center AI 4 Bot Bridge 4.1 Implementation of Bot Bridge with Cloud Contact Center 5 Conclusion References IPFS: An Off-Chain Storage Solution for Blockchain 1 Introduction 1.1 Blockchain 1.2 Inter-planetary File System (IPFS) 2 Related Work 3 IPFS Architecture 3.1 Identities 3.2 Network 3.3 Routing 3.4 Exchange 3.5 Objects 3.6 File 3.7 Naming 4 Blockchain-IPFS Convergence 4.1 Features of Blockchain-IPFS Convergence 4.2 Potential Applications of Blockchain-IPFS Convergence 5 Conclusion and Future Work References Hybrid Approach for Resource Allocation and Task Scheduling on Cloud Computing: A Review 1 Introduction 1.1 Components of Cloud Computing 1.2 Important Processes of Cloud Computing 1.3 Paper Contributions 1.4 Paper Outline 2 Related Work 2.1 Review of Task Scheduling and Resource Allocation Methodologies 2.2 Review of Behavioral Inspired Algorithms-Based Scheduling and Load Balancing Methodologies 3 Hybrid Approaches for Resource Allocation 3.1 Load Balancing in Cloud Computing 3.2 Resource Allocation in Cloud Computing 3.3 Cloud Resource Managers 3.4 Load Balancing Genetic Algorithm (LAGA) Algorithm 3.5 Load Balancing Ant Colony Optimization 4 Hybrid Approaches for Task Scheduling 4.1 Cuckoo Search 4.2 Harmony Search 4.3 Cuckoo Harmony Search Algorithm (CHSA) 4.4 Task Scheduling Using Hybrid CHSA 5 Analyzed Hybrid Approaches for Resource Allocation and Task Scheduling on Cloud Computing 6 Conclusion References Beginners Online Programming Course for Making Games in Construct 2 1 Introduction and Related Work 2 Game-Making and Teaching Programming and Algorithmisation 3 How Making Games Teaches Pupils Key Programming Concepts 4 Description of the Beginner’s Programming Course for Making Games 5 Tutorials 6 The Survey of the Experimental Teaching Method—The Programming Course 7 Results and Discussion 8 Conclusion References Cyber Security and Cyber Physical Systems Ride-Sharing Service Based on Ethereum 1 Introduction 1.1 Blockchain 1.2 Ethereum 2 Literature Review 3 Proposed Methodology 4 Result 5 Conclusion References Performance Analysis of User Authentication Schemes in Wireless Sensor Networks 1 Introduction 2 Contribution 3 Literature Review 4 Open Challenges 5 Tools and Testing 6 Performance Analysis of User Authentication Algorithms 6.1 Computational Overhead 6.2 Communication Overhead 6.3 Running Time 7 Conclusion References A Secure Authenticated Key Agreement Protocol Using Polynomials 1 Introduction 2 State of the Art 3 The Proposed Scheme 3.1 Mathematical Preliminaries 3.2 Problem Formulation 3.3 The Proposed KAP Protocol 3.4 Flow Diagram and Working Example 3.5 Generalization of the Above Protocol 4 Conclusion and Future Scope References Randomness Analysis of Secured One-Time Password Generation Scheme for Financial Ecosystems 1 Introduction 1.1 Article Layout 2 Security Analysis of Kumar et al. Scheme 3 The Proposed Scheme 3.1 Advantages of the Scheme 4 Conclusions and Future Scope References Social Bot Detection Techniques and Challenges—A Review Approach 1 Introduction 2 Background 2.1 Social Media Bot Detection Process 2.2 Static Rule-Based Approach 3 Challenges 3.1 Credential Stuffing Attacks 3.2 Scraping Bots 3.3 DDOS Attack 3.4 Inventory Denial Attacks 4 Systematic Review Methodologies 4.1 Graph-Based Bot Detection Technique 4.2 Crowd Sourcing-Based Bot Detection Technique 4.3 Machine Learning-Based Bot Detection Technique 4.4 Anomaly Based Bot Detection Technique 5 Result Analysis 6 Conclusion References Digital India Bidirectional Machine Translation for Punjabi-English, Punjabi-Hindi, and Hindi-English Language Pairs Abstract 1 Introduction 2 Development of Dataset 2.1 Preprocessing of Hindi-English Parallel Corpus 2.2 Corpus Statistics 3 Design and Architecture 3.1 Language Model 3.2 Translation Model 3.3 Decoder 4 Setup and Analysis of Experiments 4.1 Preprocessing of Dataset 4.2 Training of Proposed System 4.3 Results 4.4 Analysis of Output 5 Conclusion References A Survey of Machine Learning for Assessing and Estimating Student Performance 1 Introduction 2 Methodology 3 Methods 3.1 Machine Learning 3.2 Recommender System 3.3 Artificial Neural Network 4 Objectives 4.1 Student withdrawal 4.2 Student Performance 4.3 Estimating Student’s Performance and Knowledge at Risk 5 Discussion 6 Conclusion References Recent Innovations of Computing in Education: Emerging Collaborative Blended Learning Models in India 1 Introduction 2 Studies Related to Blended Learning 3 Blended Learning 3.1 Different Conceptualizations of Blended Learning 3.2 Benefits of Blended Learning (Mixed Mode Instructions) 3.3 Emerging Collaborative Blended Learning Model 3.4 Co-teaching Model 4 Reflections References Online Learning in Teaching Initial Math Education 1 Introduction 2 Teaching Initial Math Education 3 Analysis of the Results 4 Conclusion References Educational Robotics in Teaching Programming in Primary School 1 Introduction 2 The Role of Educational Robotics in Teaching Programming in Elementary School 3 From Toy Programming to Robot Programming 3.1 Bee-Bot 3.2 Pro-Bot 3.3 InO-Bot 4 Equipping Elementary Schools with Programmable Toys and Robotic Kits 5 Evaluation of Selected Questions of the Questionnaire Survey 5.1 Robotic Kits in Schools 5.2 What Influences the Teacher’s Choice of Robotic Building Blocks 5.3 In Which Language Do the Teachers Program the Control of the Robot 5.4 How Programming Was Taught During the Pandemic 6 An Example of a Control Program for a Simple Robot 7 Conclusions References Author Index