ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021

دانلود کتاب مجموعه مقالات دومین سمپوزیوم دکتری هوش محاسباتی : DoSCI 2021

Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021

مشخصات کتاب

Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021

ویرایش:  
نویسندگان: , , , ,   
سری: Advances in intelligent systems and computing, Volume 1374 
ISBN (شابک) : 9789811633461, 9811633460 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: [902] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 22 Mb 

قیمت کتاب (تومان) : 33,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات دومین سمپوزیوم دکتری هوش محاسباتی : DoSCI 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

DoSCI 2021 Steering Committee Members
Preface
Contents
About the Editors
Investigation of Consumer Perception Toward Digital Means of Food Ordering Services
	1 Introduction
	2 Literature Review
		2.1 Trust and Security
		2.2 Web Site Design
		2.3 Payment System
		2.4 Service Quality
		2.5 Delivery
		2.6 Customer Service
		2.7 Food Quality
		2.8 Objectives of the Study
	3 Scope of Study
	4 Research Methodology
	5 Analysis and Interpretation
		5.1 Perceptual Map
		5.2 Usage of Food Delivery and Ordering Apps
		5.3 Factors Affecting Usage of the Food Delivery Apps
	6 Conclusion
	References
A Systematic Review of Blockchain Technology to Find Current Scalability Issues and Solutions
	1 Introduction
	2 Scalability Problem Understanding
	3 How Design of Blockchain Affect Scalability
	4 Solutions to Scale Blockchain
		4.1 Layer 0
		4.2 Layer 1 (On-chain) Solutions
		4.3 Layer 2 (Off-chain) Solutions
		4.4 Consensus Mechanisms
		4.5 Other Latest Protocols/Solutions to Scale Blockchain
	5 Future Scope of Blockchain Technology
		5.1 When Blockchain Technology Will be Combined with Other Technology
		5.2 Benefits that Blockchain Technology and Smart Contract Could Bring to All Sectors
		5.3 Important Points Preventing Growth of Blockchain Technology
		5.4 SWOT Analysis of Blockchain Technology
	6 Conclusion
	References
Secured Blind Image Watermarking Using Entropy Technique in DCT Domain
	1 Introduction
	2 Related Work
	3 Proposed Digital Image Watermarking Algorithm
		3.1 Proposed Watermark Embedding Algorithm
		3.2 Proposed Watermark Extraction Algorithm
	4 Experimental Results and Comparison
	5 Conclusion
	References
Prediction of Heart Disease Using Genetic Algorithm
	1 Introduction
	2 Related Work
	3 Classification
	4 Classification Methods
		4.1 Artificial Neural Network
		4.2 Genetic Algorithm
	5 Feature Engineering
		5.1 Performance Measures
	6 Prediction Analysis
	7 Conclusion
	References
Secured Information Infrastructure for Exchanging Information for Digital Governance
	1 Introduction
		1.1 Definition of Blockchain
		1.2 Blockchain Technology
		1.3 Smart Contract
		1.4 Distributed Ledger Technology
		1.5 Types of Blockchain
	2 Literature Survey
		2.1 Digital Governance (E-governance)
		2.2 Benefits of Applying Blockchain Technology in Governance
	3 Problem Statement
	4 Hypothesis
	5 Methodology
	6 Expected Impact
	7 Conclusion
	References
Spiral CAPTCHA with Adversarial Perturbation and Its Security Analysis with Convolutional Neural Network
	1 Introduction
		1.1 Contribution of this paper is listed as follows
	2 Related Work
	3 Proposed Work and Methodology
		3.1 Design of Proposed Spiral CAPTCHA
		3.2 Creation of Dataset
		3.3 Designing CNN
		3.4 Training a CNN with Training Datasets and Testing it with Testing Datasets
		3.5 Adding Perturbation to Image Dataset and Testing CNN Again with Perturbed Data
	4 Performance Parameters
	5 Results and Discussion
		5.1 Results for Spiral CAPTCHA without Perturbation
		5.2 Results for Spiral CAPTCHA with Perturbation
	6 Usability and Security
	7 Concluding Remarks
	References
Predicting Classifiers Efficacy in Relation with Data Complexity Metric Using Under-Sampling Techniques
	1 Introduction
	2 Related Works
	3 Proposed Work
	4 Experimental Results
		4.1 Results and Discussion
	5 Conclusion
	References
Enhanced Combined Multiplexing Algorithm (ECMA) for Wireless Body Area Network (WBAN)
	1 Introduction
	2 Related Works
	3 Proposed Model
	4 Proposed Transmission Scheme Algorithm
	5 Proposed Transmission Scheme Flowchart
	6 Experiments and Results
	7 Conclusion
	References
A Survey: Approaches to Facial Detection and Recognition with Machine Learning Techniques
	1 Introduction
		1.1 Convolutional Neural Network
	2 Machine Learning Methods in Face Detection and Recognition Algorithms
		2.1 Alex Net
		2.2 Feed Forward Neural Network
		2.3 Deep Convolution Neural Network
		2.4 K-nearest Neighbors
		2.5 Support Vector Machine
		2.6 Principal Component Analysis
		2.7 Linear Discriminant Analysis
	3 Feature Extraction
		3.1 Geometric-Based Methods in Feature Extraction
		3.2 Holistic-Based Methods in Feature Extraction
	4 Related Work of Machine Learning Approaches in Face Detection and Recognition
	5 Summary Sheet of Machine Learning Approaches for Face Detection and Face Recognition
	6 Machine Learning Methods Perception and Suggestion in Face Detection and Recognition
	7 Conclusions
	References
An Energy- and Space-Efficient Trust-Based Secure Routing for OppIoT
	1 Introduction
	2 Related Work
	3 Proposed ES_T_CAFE Protocol
		3.1 Motivation
		3.2 Proposed Protocol
	4 Performance Evaluation
	5 Conclusion
	References
A Survey on Anomaly Detection Techniques in IoT
	1 Introduction
		1.1 Anomaly Detection
	2 Literature Review
	3 Analysis of Literature Work
	4 Conclusion
	References
Novel IoT End Device Architecture for Enhanced CIA: A Lightweight Security Approach
	1 Introduction
	2 Literature Review
	3 The Need of Lightweight Cryptographic Algorithm
	4 Novel Lightweight Architecture
		4.1 Trusted Fog Nodes with CoT and TEE
		4.2 Web Interface(WI)
		4.3 IoT End Device
	5 Secured Data Transmission
	6 Results and Discussion
	7 Conclusion
	References
Addressing Concept Drifts Using Deep Learning for Heart Disease Prediction:  A Review
	1 Introduction
	2 Literature Review
	3 Research Methodology
	References
Tailoring the Controller Parameters Using Hybrid Flower Pollination Algorithm for Performance Enhancement of Multisource Two Area Power System
	1 Introduction
	2 System Under Investigation
	3 Testaments of Proposed Algorithm
	4 Conclusions
	References
Automatic Extractive Summarization  for English Text: A Brief Survey
	1 Introduction
	2 Extractive Text Summarization
	3 Features for Extractive Text Summarization
	4 Methods for Extractive Text Summarization
		4.1 Statistical-Based
		4.2 Graph-Based
		4.3 Semantic-Based
		4.4 Fuzzy-Based
		4.5 Machine Learning-Based
		4.6 Deep Learning-Based
	5 Comparison of Methods for Extractive Text Summarization
	6 Evaluation Matrices
		6.1 Intrinsic Evaluation
		6.2 Content Evaluation
	7 Conclusion
	References
Formal Verification of Liveness Properties in Causal Order Broadcast Systems Using Event-B
	1 Introduction
		1.1 Event-B and Rodin
		1.2 Causal Order Broadcast
	2 Literature Review
	3 Formal Analysis of Liveness Properties in Causal Order Broadcast Systems
	4 Analysis of Enabledness Preservation Property
	5 Analysis of Non-divergence Property
	6 Conclusions
	References
A Comparative Study on Face Recognition AI Robot
	1 Introduction
	2 Literature Review
	3 Implementation
		3.1 Local Binary Pattern (LBP) for Face Recognition
	4 Hardware Specification
	5 Software Specification
	6 Results and Discussion
		6.1 Face Recognition System
		6.2 The Face Tracking System
	7 Limitations of Existing Work
	8 Conclusion
	References
State-of-the-Art Power Management Techniques
	1 Introduction
	2 Static Power Management
	3 Dynamic Power Management
	4 Power Management in Embedded Systems
	5 Power Management Techniques for HPC Clusters
	6 Power Management in Data Centers
	7 Conclusion
	References
Application of Robotics in Digital Farming
	1 Introduction
	2 Literature Review
	3 The Inverted Pendulum System
	4 Control Systems and Controllers
	5 Tilt Angle and Its Measurement Using the Filter
	6 Conclusion
	References
Study and Performance Analysis of Image Fusion Techniques for Multi-focus Images
	1 Introduction and Background of the Work
	2 Image Fusion Techniques and Effectiveness Criteria
	3 Some Current Image Fusion Techniques
		3.1 Discrete Wavelet Transform
		3.2 Discrete Cosine Transform (DCT)
		3.3 Curvelet Transform
		3.4 Non-Subsampled Contourlet Transform
		3.5 Sparse-Based Image Fusion Scheme
		3.6 DTCWT
		3.7 ICA
	4 Evaluation Metrics
		4.1 Normalized Mutual Information (NMI)
		4.2 Nonlinear Correlation Information Entropy (NCIE)
		4.3 Gradient-Based Metric GBM
		4.4 Phase Congruency-Based Metric (PCB)
	5 Experimental Setup and Simulation of Work
		5.1 Experimental Setup
		5.2 Comparative Discussion
		5.3 Comparative Analysis
	6 Conclusion and Future Scope
	References
IoT-Based Agricultural Automation Using LoRaWAN
	1 Introduction
	2 Literature Review
	3 Designing of the System
		3.1 LoRa by Semtech Inc
		3.2 AI-Thinker RA-02 Module
	4 Implementation and Working
	5 Results and Discussion
	6 Conclusion
	7 Future Work
	References
Prediction of Customer Lifetime Value Using Machine Learning
	1 Introduction
	2 Literature Review
	3 Proposed Framework
	4 Results
		4.1 Mean Absolute Error
	5 Conclusion
	References
An Intelligent Flood Forecasting System Using Artificial Neural Network in WSN
	1 Introduction
	2 Related Work
	3 Flood Forecasting Framework
	4 Result and Discussion
	5 Conclusion
	References
Reinforcement Learning in Deep Web Crawling: Survey
	1 Introduction
	2 Background
		2.1 Deep Web Crawling
		2.2 Reinforcement Learning
	3 Review of Literature
	4 Discussion
		4.1 Open Questions in DWC
	5 Conclusion and Future Scope
	References
Wireless Sensor Network for Various Hardware Parameters for Orientational and Smart Sensing Using IoT
	1 Introduction
	2 WSN System Architecture
		2.1 The Sensor Node
	3 Implementation and Methodology
		3.1 Overview
		3.2 Sensing and Processing the Information
	4 Results and Discussion
		4.1 Output on Senselive
		4.2 Monitoring
	5 Conclusion
	References
Comparative Analysis: Role of Meta-Heuristic Algorithms in Image Watermarking Optimization
	1 Introduction
	2 Related Work
	3 Proposed Technique
	4 Results and Discussion
		4.1 Perceptual Quality Measurement
		4.2 Robustness Measurement
	5 Comparative Analysis
	6 Conclusion
	7 Conflict of Interest
	References
A Novel Seven-Dimensional Hyperchaotic
	1 Introduction
	2 The 7D Hyperchaotic System
		2.1 Equilibrium and Stability
		2.2 Lyapunov Exponents and Lyapunov Dimension
	3 Hybrid Synchronization of the New 7D Hyperchaotic Systems
	4 Dissections
	5 Conclusions
	References
A Literature Review on H∞ Neural Network Adaptive Control
	1 Introduction
	2 Neural Networks
		2.1 Feed-Forward Neural Network
		2.2 Feedback Neural Network
	3 Adaptive Controllers
		3.1 Direct and Indirect Adaptive Techniques
		3.2 Neural Networks for Identification and Control
	4 H∞ Controller
	5 Robust Adaptive Control
	6 Stability Analysis
	7 Conclusions
	References
A Novel DWT and Deep Learning Based Feature Extraction Technique for Plant Disease Identification
	1 Introduction
	2 Research Methodology of Proposed Novel DWT and Deep Learning Based Feature Extraction Technique for Plant Disease Identification
		2.1 Robust Feature Extraction Based on Large Scale DWT for Colored Images of Plants (Healthy/Diseased) Leaf Images
		2.2 Selection of Features in Reduced Sub-Space for Efficient Feature Vector Formation Using Principal Component Analysis (PCA)
		2.3 Significant Feature Vector Formulation and Classification Based on DNNs
		2.4 Proposed Novel DWT and Deep Learning Based Technique for Identification of Diseases in Plants
	3 Experiments and Discussions
		3.1 Dataset
		3.2 System Specifications
		3.3 DWT Sub Band Selection and Level of Decomposition Selection with Daubechies Wavelet (db4) and Biorthogonal (Bior1.5) Wavelet with DNNs
		3.4 Comparison of Accuracy Among the 2 Wavelets with Respect of Levels and Sub Bands
		3.5 Comparison of Accuracy with State-of-Art Approaches with Proposed Approach
	4 Conclusion
	References
Supervised and Unsupervised Machine Learning Techniques for Multiple Sclerosis Identification: A Performance Comparative Analysis
	1 Introduction
	2 Proposed Approach
		2.1 Image Preprocessing
		2.2 Feature Extraction Through Gray Level Textural Feature Matrix (GLTFM)
		2.3 Classification
	3 Experimental Results
		3.1 No. of neighbor’s Selection and Distance Metric Selection in K-nearest Neighbor Classification
		3.2 Kernel Function Selection and Kernel Scale Selection in Support Vector Machine
		3.3 Selection of Boosting Method and Learning Cycles in Decision Tree Classifier (Ensemble Learning)
		3.4 Unsupervised Learning Approach Using K-mean and Gaussian Mixture Model (GMM) Clustering
		3.5 Comparison of Proposed Technique with Earlier Studies
	4 Conclusion
	References
Cloud Computing Overview of Wireless Sensor Network (WSN)
	1 Introduction
	2 Overview of Cloud Computing
		2.1 Features of Cloud Computing
		2.2 Services Provided by Cloud Computing
		2.3 Types of Cloud
	3 Overview of Wireless Sensor Network
		3.1 Protocols for Routing in WSN
	4 Application Scenarios of Cloud Computing and WSN
		4.1 Health Care
		4.2 Transport Surveillance
		4.3 Climate Anticipation
		4.4 Military Usage
	5 Conclusion
	References
An Enhanced Support Vector Machine for Face Recognition in Fisher Subspace
	1 Introduction
	2 Proposed Methodology
		2.1 Fisher Subspace Feature Extraction Method
		2.2 Enhanced Support Vector Machine (ESVM)
	3 Experimental Results
		3.1 Yale Database
		3.2 ORL Database
		3.3 Selection of Number of Sub-Dimensions in Fisher Space
		3.4 Multiclass Classification: One-Vs-One(OVO), One-Vs-All(OVA)
		3.5 Selection of Kernel for ESVM
	4 Comparative Analysis and Discussion
	5 Conclusion
	References
Large Scale Double Density Dual Tree Complex Wavelet Transform Based Robust Feature Extraction for Face Recognition
	1 Introduction
	2 Preliminaries and Proposed Methodology
		2.1 Wavelet Transformation Techniques
		2.2 Principal Component Analysis (PCA)
		2.3 Classification
		2.4 Proposed Methodology
	3 Experimental Results
		3.1 Dataset
		3.2 Selection of DDDTCWT Sub-Band and Level of Decomposition
	4 Comparative Analysis and Discussion
	5 Conclusion
	References
A Miscarriage Prevention System Using Machine Learning Techniques
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Data Collection
		3.2 Data Pre-processing
		3.3 Model Building and Validation
	4 Experimental Results and Discussion
	5 Conclusion
	References
Efficacious Governance During Pandemics Like Covid-19 Using Intelligent Decision Support Framework for User Generated Content
	1 Introduction
	2 Related Literature Survey
	3 Proposed Framework
		3.1 Text Pre-processing Pipeline
		3.2 Information Extraction Module
		3.3 Social and Economic Trend Prediction Module
	4 Implementation and Results
	5 Discussion and Future Work
	References
Skin Disease Diagnosis: Challenges and Opportunities
	1 Introduction
		1.1 Skin Disease
		1.2 Skin Disease Diagnosis
		1.3 Publicly Available Dataset for Skin Disease
	2 Literature Review
	3 Justification of Research
	4 Research Gaps
	5 Problem Statement
	6 Conclusion
	References
Computerized Assisted Segmentation of Brain Tumor Using Deep Convolutional Network
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Conclusion
	References
Leader Election Algorithm in Fault Tolerant Distributed System
	1 Introduction
	2 Message Ordering
		2.1 Non-FIFO and FIFO Execution
		2.2 Causal Ordering
		2.3 Total Order Broadcast
	3 Leader Election Algorithm with Ordered Delivery of Timestamped Messages
	4 Modeling Approach
		4.1 Event-B Model of Leader Election Algorithm: Specification Using Refinement Levels
	5 Conclusion and Future Scope
	References
Engine Prototype and Testing Measurements of Autonomous Rocket-Based 360 Degrees Cloud Seeding Mechanism
	1 Introduction
	2 The Novel 360°Cloud Seeding Approach
		2.1 Reinforcement Learning-Based Cloud Seeding Mechanism
	3 Phase 1 Research Testing Report: The Proposed Concept
	4 Testing Results
	5 Result Discussion
	6 Conclusion
	7 Future Scope
	References
An Efficient Caching Approach for Content-Centric-Based Internet of Things Networks
	1 Introduction
	2 Literature Review
	3 Proposed Caching Scheme
	4 Performance Evaluation
	5 Conclusion
	References
A Forecasting Technique for Powdery Mildew Disease Prediction in Tomato Plants
	1 Introduction
	2 Literature Review
	3 Research Methodology
		3.1 Dataset
		3.2 K-Nearest Neighbor (kNN)
		3.3 Decision Tree (DT)
		3.4 Random Forest (RF)
		3.5 Performance Metric: Accuracy
	4 Results and Discussions
		4.1 Comparison with Previous Studies
	5 Conclusion and Future Scope
	References
Investigate the Effect of Rain, Foliage, Atmospheric Gases, and Diffraction on Millimeter (mm) Wave Propagation for 5G Cellular Networks
	1 Introduction and Related Work
	2 Investigate the Effect of Attenuation Due to Atmospheric Gas
	3 Investigate the Effect of Attenuation Due to Fog and Cloud
	4 Investigate the Effect of Attenuation Due to Rainfall Attenuation
	5 Simulation Work and Discussion
	6 Conclusion and Future Scope
	References
Packet Scheduling Algorithm to improvise the Packet Delivery Ratio in Mobile Ad hoc Networks
	1 Introduction
	2 Related Work
	3 Methodology
	4 Results
	5 Conclusion
	References
Computer-Aided Detection and Diagnosis of Lung Nodules Using CT Scan Images: An Analytical Review
	1 Introduction
	2 Anatomy of CAD System
		2.1 Preprocessing
		2.2 Nodule Detection
		2.3 Feature Extraction/Selection
		2.4 Classification
	3 Experimental Benchmarks
		3.1 Datasets of Lung CT Scans
		3.2 Evaluation Metrics
	4 Discussion
	5 Conclusion
	References
Efficient Interleaver Design for SC-FDMAIDMA Systems
	1 Introduction
	2 Interleaver Design
	3 SC-FDMA-IDMA System Model
	4 Simulation Result
	5 Conclusions
	References
Enhanced Bio-inspired Trust and Reputation Model for Wireless Sensor Networks
	1 Introduction
	2 Trust and Reputation System
	3 Bio-inspired Trust and Reputation Model (BTRM)
		3.1 Gathering Information
		3.2 Score and Rank
		3.3 Ants Transaction
		3.4 Punish and Reward
	4 Enhanced Bio-inspired Trust and Reputation Model
		4.1 EBTRM Algorithm
	5 Simulation Results
		5.1 Accuracy with Varying Number of Malicious Nodes
		5.2 Path Length with Varying Number of Malicious Nodes
		5.3 Energy Consumption with Varying Number of Malicious Nodes
	6 Conclusions
	References
Analytical Machine Learning for Medium-Term Load Forecasting Towards Agricultural Sector
	1 Introduction
	2 Literature Review
	3 Material and Methods
		3.1 Dataset
		3.2 Methodology
	4 Experimental Result and Discussion
		4.1 The Experimental Result Using ARIMA Model
		4.2 The Experimental Result Using Seasonal ARIMA Model
		4.3 The Experimental Result Using Exponential Smoothing Model
		4.4 The Experimental Result Using Random Forest Model
	5 Conclusion and Future Work
	References
Formal Modelling of Cluster-Coordinator-Based Load Balancing Protocol Using Event-B
	1 Introduction
	2 Event-B
	3 Cluster-Coordinator Load Balancing Protocol
	4 Formal Development of Load Balancing Protocol
	5 Conclusion
	References
Regression Test Case Selection: A Comparative Analysis of Metaheuristic Algorithms
	1 Introduction
	2 Related Work
	3 Problem Statement: Regression Test Case Selection
	4 Discussion: Metaheuristic Algorithms Used
		4.1 Cuckoo Search Algorithm
		4.2 Crow Search Algorithm
		4.3 Harris Hawks Optimization Algorithm
	5 Experimental Design and Results
		5.1 Research Objectives
		5.2 Parameter Setting
		5.3 Research Hypotheses
		5.4 Results and Discussion
	6 Conclusion and Future Scope
	References
A Comprehensive Study on SQL Injection Attacks, Their Mode, Detection and Prevention
	1 Introduction to Structured Query Language Injection (SQLi)
		1.1 Gathering Some Knowledge of Vulnerability and SQL Injection
	2 Categories of SQL Injection Attack
	3 Prevention System
		3.1 Log in Time Verification
		3.2 Parametrized Query
		3.3 Stored Procedures
		3.4 Escaping
		3.5 Avoiding Administrative Privileges
		3.6 Firewall Applications
	4 Example of Union-Based SQL Injection
		4.1 Step 1. Finding the Error
		4.2 Step 2. Finding the Total Number of Columns
		4.3 Step 3. Finding the Vulnerable Column from the Total Number of Column
		4.4 Step 4. Finding the Table Names Under the Database
		4.5 Step 5. Finding the Column Name from the Target Table Command Used
		4.6 Step 6. Getting the Data from the Columns
	5 Conclusion
	References
Sentimental Analysis on Sarcasm Detection with GPS Tracking
	1 Introduction
	2 Literature Review
	3 Related Researches
	4 Methodologies of Sarcasm Detection
	5 Proposed Architecture
	6 Sarcasm Detection Algorithm
	7 Evaluation
	8 Testing Method
	9 Results
	10 Conclusion and Future Scope
	References
Impact of Machine Learning Algorithms on WDM High-Speed Optical Networks
	1 Introduction
	2 Literature Survey
	3 Performance Parameters
	4 Performance Outcomes of Existing Techniques
	5 Conclusion
	6 Future Scope
	References
Duo Features with Hybrid-Meta-Heuristic-Deep Belief Network Based Pattern Recognition for Marathi Speech Recognition
	1 Introduction
	2 Related Work
	3 Duo Features with Hybrid-Meta-Heuristic-Based Deep Belief Network
		3.1 Optimization Techniques Used for Deep Belief Network
		3.2 Proposed Architecture
		3.3 Duo-Feature Feature Extraction Technique
		3.4 RCBO-DBN Pattern Recognition
	4 Results and Discussion
		4.1 Experimental Setup
		4.2 Performance Analysis of Feature Extraction Techniques
		4.3 Performance Analysis of Pattern Recognition Techniques
	5 Conclusion
	References
Computer-Aided Diagnostic of COVID-19 Using Chest X-Ray Analysis
	1 Introduction
	2 Survey of Literature
	3 Proposed System
	4 Results and Discussion
	5 Conclusion
	References
Low Cost Compact Multiband Printed Antenna for Wireless Communication Systems
	1 Introduction
	2 Configuration of Antenna and Its Design Procedure
	3 Simulation and Measurement Results
	4 Fabricated Multiband Printed Antenna
	5 Conclusion
	References
A Detailed Analysis of Word Sense Disambiguation Algorithms and Approaches for Indian Languages
	1 Introduction
		1.1 Machine Translation
		1.2 Ambiguity and Its Classification
	2 Word Sense Disambiguation (WSD)
		2.1 Applications of Disambiguation Techniques
		2.2 Organization of the Paper
	3 Relative Analysis on WSD and Directions for Future Research
	4 Proposed Work
	5 WSD Approaches
		5.1 An Approach Focused on Information
		5.2 Supervised-Learning Approach
		5.3 Unsupervised-Learning Approach
	6 WSD Approaches in Context to WSD
	7 Literature Analysis on Various WSD Methods for Languages of India
	8 Conclusion
	References
Fiber Bragg Grating (FBG) Sensor for the Monitoring of Cardiac Parameters in Healthcare Facilities
	1 Introduction
	2 Literature Review
	3 Background
		3.1 The Fabrication Method of FBG
	4 Experiment and Result
	5 Conclusions
	References
Early-Stage Coronary Ailment Prediction Using Dimensionality Reduction and Data Mining Techniques
	1 Introduction
	2 Related Works
	3 Materials and Methodology
		3.1 Data Exploration
		3.2 Feature Selection
	4 Result
	5 Conclusion and Future Work
	References
Inferring the Occurrence of Chronic Kidney Failure: A Data Mining Solution
	1 Introduction
	2 Chronic Kidney Disease
	3 Literature Survey
	4 Proposed Model
	5 Data Exploration and Filtration
	6 Classification Methods
		6.1 Decision Tree
		6.2 Logistic Regression
		6.3 Naïve Bayes
		6.4 Support Vector Machine
		6.5 KNN
		6.6 Random Forest
	7 Examination of Performance
	8 Conclusion and Future Work
	References
Comparative Analysis for Optimal Tuning of DC Motor Position Control System
	1 Introduction
	2 DC Motor Position Control System
	3 Controller
		3.1 PID
		3.2 PID-N
		3.3 F-PID
	4 Algorithms
		4.1 Global Neighborhood Algorithm (GNA)
		4.2 Bat Algorithm (BA)
	5 Objective Function Optimization
	6 Simulation and Results
	7 Conclusion
	References
A Hybrid Approach of ANN-PSO Technique for Anomaly Detection
	1 Introduction
	2 Related Work
	3 Proposed Method
	4 Result and Analysis
		4.1 Dataset
		4.2 Performance Metrics
		4.3 Analysis
	5 Conclusion
	References
Comparison of Density-Based and Distance-Based Outlier Identification Methods in Fuzzy Clustering
	1 Introduction
	2 Density-Oriented (DO) and Distance-Based (DB) Approach of Outlier Identification in Context of Fuzzy Clustering
		2.1 Density-Oriented Approach [10–12]
		2.2 Distance-Based Approach [10, 13]
	3 DO Versus DB
		3.1 Dataset Used
		3.2 Performance Analysis of DO and DB on Various Dataset
	4 Conclusion
	References
Analysis of Security Issues in Blockchain Wallet
	1 Introduction
		1.1 Blockchain Wallets
		1.2 Security Issues in Blockchain Wallets
		1.3 Wallet Security Practices
	2 Literature Review
		2.1 Security Challenges
		2.2 Wallet Vulnerabilities
		2.3 Recent Progresses
	3 Comparative Analysis
	4 Conclusion
	References
A Contextual Framework to Find Similarity Between Users on Twitter
	1 Introduction
	2 Related Work
	3 Proposed Framework
		3.1 Parameter Weights
		3.2 Parameter Normalization
		3.3 Formulation of Similarity Computation
		3.4 Parameters Used
	4 Results and Analysis
		4.1 Data Extraction
		4.2 Case Study
		4.3 Result and Evaluation
	5 Conclusion and Future Work
	References
On the Design of a Smart Mirror for Cardiovascular Risk Prediction
	1 Introduction
	2 Literature Review
	3 Research Gaps
	4 Objectives
	5 Hypothesis
	6 Methodology
	7 Interpretation of Results
	8 Conclusion
	References
Named Entity Recognition in Natural Language Processing: A Systematic Review
	1 Introduction
		1.1 Evolution of NER
		1.2 Motivations for Conducting This Survey
	2 Related Background
		2.1 NER
		2.2 NER Datasets
		2.3 NER Tools
		2.4 Techniques for NER
	3 A Systematic Literature Review of Related Work
	4 Challenges and Future Directions
		4.1 Challenges
		4.2 Future Directions
	5 Conclusion
	References
Assessing Spatiotemporal Transmission Dynamics of COVID-19 Outbreak Using AI Analytics
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 Dataset Description
		3.2 Experimental Analysis and Prediction
	4 Results
	5 Conclusion
	References
Detection of Building Defects Using Convolutional Neural Networks
	1 Introduction
	2 Literature Survey
	3 Scope of Work
	4 Proposed Algorithm
		4.1 Method
		4.2 Importing Building Libraries, Layers, and Their Working
	5 Experimental Analysis
		5.1 Results
		5.2 Discussion
	6 Conclusion and Future Scope
	References
Tools and Techniques for Machine Translation
	1 Introduction
	2 Machine Translation in Terms of Technology Used
		2.1 Rule-Based Machine Translation
		2.2 Statistical Machine Translation
		2.3 Neural Machine Translation
	3 Machine Translation in Terms of Techniques Used
	4 Machine Translation in Terms of Algorithms Used
	5 Addressing Ambiguity in Machine Translation
	6 Conclusion
	References
Cyberbullying-Mediated Depression Detection in Social Media Using Machine Learning
	1 Introduction
	2 Background and Related Work
	3 Supervised Learning for Observing Signs of Mental Distress Due to Cyberbullying
		3.1 Dataset Discussion
		3.2 System Architecture
	4 Results and Discussion
		4.1 Results Obtained When TF-IDF Was Used for Feature Extraction
		4.2 Results Obtained When Word2Vec Was Used for Feature Extraction
		4.3 Results Obtained When DL Was Applied for CBMD Detection
	5 Conclusion
	6 Future Trends
	References
Improved Patient-Independent Seizure Detection System Using Novel Feature Extraction Techniques
	1 Introduction
	2 Methodology
		2.1 Feature Set 1: Max–Min Method
		2.2 Feature Set 2: The Variation Method
		2.3 Classification
	3 Results and Discussion
		3.1 Seizure Detection ML Model Based on Max–Min Feature Set
		3.2 Seizure Detection ML Model Using Variation Feature Set
	4 Conclusions
	References
Solution to Economic Dispatch Problem Using Modified PSO Algorithm
	1 Introduction
	2 Unit Commitment
		2.1 Generation Capacity Constraint
		2.2 Power Balance Constraint
		2.3 Generation Ramp Limits
	3 Introduction to Economic Dispatch (ED)
	4 Introduction to Particle Swarm Optimization (PSO)
	5 Proposed Approach
		5.1 Working of the Proposed Approach (Pseudo Code)
		5.2 Experiment Design
	6 Results
	7 Conclusion
	References
Recommendations for DDOS Attack-Based Intrusion Detection System Through Data Analysis
	1 Introduction
	2 Related Work
	3 Analysis
		3.1 Dataset and System Discussion
		3.2 Recommendations
	4 Conclusion
	References
Drug-Drug Interaction Prediction Based on Drug Similarity Matrix Using a Fully Connected Neural Network
	1 Introduction
	2 Dataset
		2.1 Sources of Data
	3 Methodology
	4 Evaluation
	5 Results and Discussion
	6 Conclusion and Future Scope
	References
Author Index




نظرات کاربران