ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Proceedings of Third International Conference on Sustainable Expert Systems: ICSES 2022

دانلود کتاب مجموعه مقالات سومین کنفرانس بین المللی سیستم های خبره پایدار: ICSES 2022

Proceedings of Third International Conference on Sustainable Expert Systems: ICSES 2022

مشخصات کتاب

Proceedings of Third International Conference on Sustainable Expert Systems: ICSES 2022

ویرایش:  
نویسندگان: , ,   
سری: Lecture Notes in Networks and Systems, 587 
ISBN (شابک) : 9811978735, 9789811978739 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 1024
[1025] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 27 Mb 

قیمت کتاب (تومان) : 46,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Proceedings of Third International Conference on Sustainable Expert Systems: ICSES 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب مجموعه مقالات سومین کنفرانس بین المللی سیستم های خبره پایدار: ICSES 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Preface
Contents
About the Editors
Design, Development, and Implementation of Software Engineering Virtual Laboratory: A Boon to Computer Science and Engineering (CSE) Education During Covid-19 Pandemic
	1 Design of the SE VLab
		1.1 Architecture
		1.2 Database Schema
		1.3 Related Technologies
		1.4 User Activities
	2 Overview of the SE VLab
		2.1 Objectives
		2.2 Use/Reuse of SE VLab
		2.3 Target Audience
	3 Details of Few Experiments of SE VLab
		3.1 Identification of Requirements from Problem Statements
		3.2 Estimation of Project Metrics
		3.3 Statechart and Activity Modeling
		3.4 Estimation of Test Coverage Metrics and Structural Complexity
		3.5 Designing Test Suites
	4 Assessment of the SE VLab: A Pilot Study
		4.1 Data Analysis
		4.2 Content Knowledge Test and Learning Gain
		4.3 Loading Time
		4.4 Average Use of SE VLab Users
	5 Concluding Remarks
		5.1 Educational Implications
		5.2 Limitations
	6 Conclusion and Future Work
		6.1 Designing the Software Engineering Virtual Laboratory
		6.2 CP-VLLM: Development of a Virtual Learning Measurement Tool
		6.3 Evaluation of Students’ Learning Performance in a Virtual Laboratory Learning Environment
		6.4 Directions for Future Research
	References
The Effect of Facebook Social Media on Recent Jambi Regional Election—An Empirical Data Analysis
	1 Introduction
	2 Literature Review
		2.1 Use Social Media in Elections
		2.2 Political Communication in Social Media
	3 Research Method
	4 Finding and Discussion
		4.1 Political Communication Content
		4.2 Political Communication Narrative
		4.3 Political Communication on Facebook with Election Result
	5 Conclusion
	References
Estimating the Intervals Between Mount Etna Eruptions
	1 Introduction
	2 Methods
		2.1 Model 1: Student-t (M1)
		2.2 Model 2: Normal (M2)
		2.3 Model Validation and Comparison
	3 Results
	4 Conclusion
	References
Sentiment Enhanced Smart Movie Recommendation System
	1 Introduction
	2 Approach
		2.1 Recommendation Algorithms
		2.2 Analysis of Sentiments Behind Movie Reviews
		2.3 Poster Search
	3 Purpose
	4 Major Research Findings
	5 Practical Implications
	6 Research Limitations
	7 Originality
	8 Conclusion and Future Research Work
	References
A Machine Learning Model for Predictive Maintenance of a Stepper Motor Using Digital Simulation Data
	1 Introduction
	2 Methodology
		2.1 Dataset Features
		2.2 Benchmarking
	3 Purpose
		3.1 Finding the Optimal Classifier
		3.2 Observed Outcomes
	4 Obtained Results
		4.1 KNN Model
		4.2 Random Forest Model
		4.3 Support Vector Model
		4.4 Decision Tree
		4.5 Comparison of Classifiers
		4.6 Comparison of Sensor Signals
		4.7 Trained Result with New Dataset
	5 Research Limitations
	6 Originality
	7 Conclusion and Future Research Work
	References
Impact of Pollutants on Temperature Change and Forecasting Temperature of US Cities
	1 Introduction
	2 Literature Review
	3 Design/Methodology/Approach
		3.1 Data Pre-processing and Cleaning
		3.2 Visualizing Patterns and Trends
		3.3 Time-Series SARIMA Model
		3.4 Evaluating and Optimizing the SARIMA Model
	4 Major Research Findings
		4.1 Co-relation Between Pollution and Temperature
		4.2 Forecasting Temperature in the US
	5 Practical Implications
	6 Research Limitations/Implications
	7 Originality/Value
	8 Conclusion and Future Research Work
	References
Hybrid Precoding Schemes for mmWave Massive MIMO Systems—A Comprehensive Survey
	1 Introduction
	2 mmWave MIMO Systems: An Overview
	3 mmWave Massive MIMO Precoding Schemes
		3.1 Hybrid Precoding with Phase Modulation Array
		3.2 Principal Component Analysis Based Hybrid Precoding
		3.3 Hybrid Precoding by Using Deep Learning Approach
		3.4 Hybrid Precoding Using Adaptive Sub-connected Structures
		3.5 Hybrid Analog/Digital Precoding and Combining Architectures
	4 Conclusion
	References
Optimized Web Service Composition Using Hybrid Evolutionary Algorithms
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Model Building
		3.2 Proposed Algorithm
	4 Results and Analysis
	5 Conclusion and Future Work
	References
Organization Security Framework—A Defensive Mechanism
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Project
		3.2 Experimental Analysis
	4 Conclusion
	References
Trusty Medicare: An Online Virtual Care System
	1 Introduction
	2 Need for Virtual Clinic
		2.1 Key Issues Limiting the Impact of Virtual Clinic
		2.2 Solutions to Overcome These Challenges
	3 Literature Survey
	4 Existing Virtual Clinic Systems
	5 The Proposed Virtual Clinic System—Trusty Medicare
		5.1 Use Cases
	6 Novelty
	7 Implementation
		7.1 User Flow Diagram
		7.2 Security and Privacy
		7.3 Quality Assurance
		7.4 User Interface of the Website
		7.5 Representation of Patient’s Journey Across Continuum of Care
	8 Future Scope and Conclusion
	References
Blockchain-Based Remote Construction Monitoring Using UAV in SITL Simulation
	1 Introduction
	2 Related Work
		2.1 The Cloud and Unmanned Aerial Vehicles
	3 The Architecture of a Swarm UAV in a Construction Monitoring System
		3.1 Technique for Computing in Fog Using a Swarm of Drones
	4 Results and Discussion
		4.1 A Comparison of a UAV Drone with a Satellite
	5 Conclusion and Future Work
	References
Papaya Diseases Detection Using GLCM Feature Extraction and Hyperparatuning of Machine Learning Approach
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Data Acquisition and Pre-processing
		3.2 GLCM Computation for Feature Extraction
		3.3 Model Training with Different ML Classifiers
	4 Result and Discussion
	5 Conclusion and Future Scope
	References
Image Forgery and Image Tampering Detection Techniques: A Review
	1 Introduction
	2 Image Forgery Detection
		2.1 Problems in Detecting Forgery
		2.2 Types of Image Forgery
		2.3 Detection of Image Forgery
		2.4 Medical Image Forgery Detection for Smart Health Care
		2.5 A Comparison Between Image Forgery Detection Algorithms
		2.6 CNN Pre-trained Models
		2.7 CNN with a Combination of ELA and Sharpening Pre-processing Techniques
	3 Image Tampering Localization
		3.1 Encoder-Decoder Model
	4 Recoloring Forgery Detection
		4.1 Method
	5 Copy-Move Image Forgery Detection
		5.1 Using Structural Similarity Index [SSIM] Measure
		5.2 Using IC-MFD Model
		5.3 Using Machine Learning and Deep Learning Techniques
		5.4 PCA and DCT
	6 Results
		6.1 Image Forgery Detection
		6.2 Image Tampering Localization
		6.3 Recoloring Forgery Detection
		6.4 Copy-Move Image Forgery Detection
	7 Conclusion
	References
Low-Voltage Ride-Through for a Three-Phase Grid-Integrated Single-Stage Inverter-Based Photovoltaic System Using Fuzzy Logic Control
	1 Introduction
	2 Modelling of Single-Stage PV System
		2.1 Structure of Equivalent Circuit of PV Module
		2.2 LCL Filters
		2.3 Methodology
	3 Fuzzy Logic Control
	4 Results and Discussions
	5 Conclusion
	References
Automated Detection of Malaria Parasite from Giemsa-Stained Thin Blood Smear Images
	1 Introduction
	2 Related Work
	3 Compared Pre-trained Models
		3.1 VGG-19
		3.2 DenseNet-121
		3.3 Inception
		3.4 Xception
		3.5 MobileNet-V2
	4 Proposed Deep Learning Model
		4.1 Dataset and Data Augmentation
		4.2 Pre-processing
		4.3 Segmentation
		4.4 Classification
	5 Results and Discussion
	6 Conclusion and Future Work
	References
Forecasting Diabetic Foot Ulcers Using Deep Learning Models
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Objectives
		3.2 Data Set
		3.3 Algorithms Used
	4 Result Analysis
		4.1 Evaluation Metrics
		4.2 Results Obtained
	5 Conclusion
	References
Artificial Intelligence-Based Chronic Kidney Disease Prediction—A Review
	1 Introduction
	2 Literature Review
	3 Conclusion and Discussion
	References
Smart Home Security System Using Facial Recognition
	1 Introduction
	2 Smart Home Security System
		2.1 Block Diagram of Smart Home Security System
		2.2 Flow Diagram
		2.3 System Components
		2.4 HOG with SVM
	3 Results and Discussion
	4 Conclusion
	References
Automated Algorithm  for Neurodegenerative Disorder  Detection Using Gait-Based Features
	1 Introduction
	2 Material and Method
		2.1 Data Acquisition
		2.2 Feature Extraction
		2.3 Classification
	3 Numerical Results
	4 Conclusions
	References
Health Monitoring System for Comatose Patient Using Raspberry-Pi
	1 Introduction
	2 Proposed System
	3 Methodology
	4 Hardware Description
		4.1 Software Description
		4.2 Raspberry Pi PiCO
		4.3 Heart Rate Sensor
		4.4 Temperature Sensor (DS18B20)
		4.5 Blood Pressure Sensor
		4.6 ESP8266 WI-FI Module
		4.7 Buzzer
		4.8 LCD (Liquid Crystal Display)
	5 Results and Output
	6 Conclusion
	7 Future Scope
	References
Digital Skeletonization for Bio-Medical Images
	1 Introduction
	2 Literature Survey
	3 Proposed Algorithm
		3.1 Algorithm
		3.2 Identification of Skeletal Pixels—Corner Pixels
		3.3 Identification of Skeletal Pixels—Border Pixels
		3.4 Boundary Erosion
	4 Results and Discussion
	5 Future Scope
	References
IoT-Based Condition Monitoring of Busbar
	1 Introduction
	2 Block Diagram of Proposed Scheme of Condition Monitoring
		2.1 NodeMCU-32S-ESP 32
		2.2 Current Sensor (ACS712)
		2.3 Temperature Sensor (DS18B20)
		2.4 Software Tools
	3 The Experimental Setup for the Condition Monitoring of Busbar
		3.1 Data Flow in IoT Module
	4 Results and Discussions
		4.1 Determination of Calibration Factor
		4.2 Measurement of Current on the IoT Platform
	5 Conclusions
	References
Novel CNN Approach (YOLO v5) to Detect Plant Diseases and Estimation of Nutritional Facts for Raw and Cooked Foods
	1 Introduction
	2 Related Works
	3 Proposed System
		3.1 System Architecture
		3.2 Datasets
		3.3 System Design
		3.4 System Model
		3.5 Flow Diagram
		3.6 Image Segmentation
		3.7 Feature Extraction
		3.8 Data Augmentation—360° Rotation
		3.9 Sequential Analysis
		3.10 Number of Epochs Performed
		3.11 YOLO v5 Algorithm Working Process
		3.12 Calorie Estimation
		3.13 User Experience—Streamlite
		3.14 Advantages of the Proposed Model
	4 Results
		4.1 Plant Name and Disease Identification
		4.2 Measurement of Performance
		4.3 Calorie and Nutritional Value Estimation (Raw Foods/Cooked Foods/Fast Foods)
		4.4 Measurement of Performance
	5 Conclusion
	References
The Evolution of Ad Hoc Networks for Tactical Military Communications: Trends, Technologies, and Case Studies
	1 Introduction
	2 Challenges in Setting Up Army Tactical Networks
	3 Army Tactical Networks: Design Requirements
		3.1 Mobility
		3.2 Multicasting
		3.3 Reliability
		3.4 Delay Constraints
		3.5 Availability and Survivability
		3.6 Network Management and Control
	4 Security in Military Ad Hoc Networks
		4.1 Passive Threats
		4.2 Active Threats
		4.3 Risk Analysis
	5 Security Mechanisms for Army Tactical Ad Hoc Networks
		5.1 A* Algorithm
		5.2 Military Authentication Header
		5.3 Cooperative Phase-Steering Technique
		5.4 Ad Hoc On-Demand Distance Vector Routing Protocol
		5.5 Backbone Formation in Military Multi-Layer Ad Hoc Networks
		5.6 Optimized Link-State Routing
		5.7 Agile Computing Middleware
		5.8 Beacon-Based Routing
	6 Conclusions
	References
Modified Floating Point Adder and Multiplier IP Design
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Results
	References
Meta Embeddings for LinCE Dataset
	1 Introduction
	2 Literature Survey
	3 Proposed Method
		3.1 DataSet Description
		3.2 Data Pre-processing
		3.3 Meta Embedding
		3.4 Deep Learning Models
		3.5 Machine Learning Models
	4 Experiments
	5 Results
	6 Conclusion
	References
Recent Trends in Automatic Autism Spectrum Disorder Detection Using Brain MRI
	1 Introduction
	2 Literature Review of ASD
		2.1 Machine Learning Techniques
		2.2 Deep Learning Techniques
	3 Experimental Results and Discussions
	4 Conclusions
	References
A Pipeline for Business Intelligence  and Data-Driven Root Cause Analysis  on Categorical Data
	1 Introduction
	2 Literature Survey
		2.1 Community Detection
		2.2 Data to Graph
		2.3 Business Insights Via Data Mining
		2.4 Data Driven Root Cause Analysis
	3 Preliminaries
		3.1 Louvains Community Detection
		3.2 Association Rule Mining
	4 Methodoloy
		4.1 Graph Conversion
		4.2 Modularity-Based Community Detection
		4.3 Association Rule Mining and Summarization
	5 Dataset
	6 Results
	7 Conclusion
	References
Non-knowledge Based Decision Support System
	1 Introduction
	2 Review of Literature
	3 System Design
		3.1 Concerns of Non-knowledge-Based MDSS Development
		3.2 Non Knowledge-Based Medical Decision Support System Architecture
		3.3 Data Preprocessing
		3.4 Predicting Result Based on J48 Algorithm
		3.5 Predicting the Result Based on Bagging Algorithm
	4 Conclusion
	References
Interactive Image Generation Using Cycle GAN Over AWS Cloud
	1 Introduction
		1.1 Basic Concepts
		1.2 Motivation
		1.3 Problem Statement
		1.4 Scope
		1.5 Objectives
		1.6 Advantages
		1.7 Applications
	2 Literature Survey
	3 Implementation
	4 Result and Analysis
	5 Conclusion and Future Work
	References
Challenges and New Opportunities in Diverse Approaches of Big Data Stream Analytics
	1 Introduction
	2 Big Data Stream Pre-processing
		2.1 Challenges and New Opportunities in Big Data Stream Pre-processing
	3 Ensemble Learning for Big Data Stream Analysis
		3.1 Drift Detection with Ensemble Learning
	4 Big Data Stream Analytics with Meta Learning
	5 Big Data Stream Analytics with Deep Learning
	6 Conclusion
	References
Door Lock System Using Cryptographic Algorithm Based on Internet of Things
	1 Introduction
	2 Literature Survey
		2.1 Block Diagram
		2.2 Flowchart
	3 System Description and Methodology
		3.1 Secure Hash Algorithm (SHA)
		3.2 Global System for Mobile Communications (GSM)
		3.3 Fingerprint Sensor
		3.4 ATmega328p
	4 Results and Analysis
	5 Conclusion and Future Scope
	References
Knowledge Engineering-Based Analysis of Convolutional Neural Network Architectures’ Performance on Luna16 and GAN Generated Pulmonary Nodule Clipped Patches to Diagnose Lung Cancer
	1 Introduction
	2 Relevant Knowledge
		2.1 Convolutional Neural Networks
		2.2 Alexnet
		2.3 InceptionV3
		2.4 Xception
		2.5 GoogLeNet
		2.6 DenseNet
		2.7 ShuffleNet
		2.8 GAN
	3 Experimentation and Results
		3.1 Data Pre-processing
		3.2 Experiment and Results
	4 Originality
	5 Conclusion
	References
Brain Tissue Segmentation Using Transfer Learning
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Proposed Algorithm
		3.2 U-Net
		3.3 Transfer Learning
		3.4 Efficient Net
		3.5 Proposed Flowchart
	4 Experimental Analysis
		4.1 Input Data
		4.2 Data Pre-processing
		4.3 Feature Extraction
		4.4 Model Summary of Hybrid Learning Model
	5 Conclusion
	References
Aadhaar Block: An Authenticated System for Counterfeit Aadhaar Enrolment in Citizen Services Using Blockchain
	1 Introduction
		1.1 Motivation
		1.2 Issues Addressed
	2 Literature Survey
	3 Proposed System
		3.1 The Proposed Architecture
		3.2 Sequence Diagram of Proposed System
	4 Results and Experimental Setup
		4.1 Home Page
		4.2 Aadhaar Enrolment
		4.3 Authentication
		4.4 Minutiae Based Fingerprint Matching
	5 Conclusion and Future Enhancement
	References
Enhanced Human Action Recognition with Ensembled DTW Loss Function in CNN LSTM Architecture
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 Working
	4 System Architecture
		4.1 Three-Dimensional Convolutional Neural Network (3D CNN)
		4.2 Mean Squared Error (MSE)
		4.3 Convolutional Neural Network Long Short-Term Memory (CNN LSTM)
	5 Results
		5.1 Evaluation Metrics
	6 Conclusion
	References
Link Prediction Using Fuzzy Computing Model by Analyzing Social Relationship in Criminal Networks
	1 Introduction
	2 Related Works
	3 Link Prediction Using Fuzzy Computing Model (LPFCM)
		3.1 Network AnalyticsModule
		3.2 Fuzzy Computation Module
		3.3 Link Prediction Module
	4 Results
		4.1 Dataset Used
		4.2 Results Analysis
	5 Conclusion
	References
Estimation of Maximum Power Operating Point for Single-Diode Solar Photovoltaic Model Using Python Programming
	1 Introduction
	2 Solar Cell Model
		2.1 Single Diode Model of Solar Cell
		2.2 IV Characteristics of Solar Cell
	3 Implementation Using Python
	4 Proposed Model for Estimating Current and Power for Single-Diode Solar Photovoltaic Model
		4.1 Maximum Power Determination for Single-Diode Solar Photovoltaic Cell
		4.2 Bisection Method
		4.3 Simulation Results
	5 Conclusion
	References
Hardware Trojan Modelling on a FPGA Based Deep Neural Network Accelerator
	1 Introduction
	2 Deep Neural Network Implementation
		2.1 Neuron Architecture
	3 Proposed Trojan Model for DNN
	4 Results and Discussion
	5 Conclusion
	References
Sustainable Farming and Customized Livestock Management Using Internet of Things
	1 Introduction
	2 Literature Review
	3 Proposed Model
	4 Results and Discussion
	5 Conclusion and Future Scope
	References
Verification and Validation of 64-Bit Processor Memory System
	1 Introduction
	2 Methodology
		2.1 UVM Verification of EDAC
		2.2 VHDL Implementation of EDAC with AMBA Bus
	3 Results and Analysis
		3.1 Simulation Results of UVM Verification with EDAC
		3.2 Simulation Results of SRCTRL Memory Controller
	4 Conclusion
	5 Future Work
	References
Land Use and Land Cover Change Assessment Using Remote Sensing and Geographic Information System
	1 Introduction
	2 Literature Review
	3 Proposed Method
	4 Description of Algorithms
	5 Description of Datasets, Requirements, and Tools
	6 Results and Observations
		6.1 Results
		6.2 Observations
	7 Conclusion
	8 Future Study
	References
A Comparative Analysis of Single Image Dehazing Techniques for Real Scene
	1 Introduction
	2 Literature Survey
	3 Single Image Dehazing Techniques
		3.1 Priority Based Techniques
		3.2 Deep Learning
	4 Results and Discussion
	5 Conclusion
	References
A Detailed Study on a Software-Based Fog Network-Based Delay-Tolerant Data Transmission Model
	1 Introduction
	2 Literature Review
	3 Existing Model
	4 Proposed System
		4.1 Theoretical Representation
	5 Conclusion
	References
Noisy Brain MR Image Segmentation Using Modified Adaptively Regularized Kernel Fuzzy C-Means Clustering Algorithm
	1 Introduction
	2 ARKFCM Algorithm
	3 Adaptive Weighted Mean Filter
	4 Results and Discussion
	5 Conclusion
	References
Deep Learning with Metadata Augmentation for Classification of Diabetic Retinopathy Level
	1 Introduction
	2 Background and Related Works
	3 Methodology
		3.1 Dataset
		3.2 Models
		3.3 Workflow
	4 Results
		4.1 Single Modality Model
		4.2 Multi Modality with Patient Opinion
		4.3 Multi Modality with Expert Opinion
		4.4 Multi Modality with Patient and Expert Opinions
	5 Discussion and Conclusions
		5.1 Cross-Validation Study
		5.2 Out-of-Cross-Validation Study
		5.3 Conclusion
	References
Advanced Vehicle Detection Heads-Up Display with TensorFlow Lite
	1 Introduction
	2 Related Works
	3 Working
	4 Result and Discussion
		4.1 Frames Per Second (FPS)
		4.2 Mean Average Precision
		4.3 Accuracy Percentage
		4.4 Minimum Time Per Frame
	5 Conclusion and Future Work
	References
A Survey of Vehicle Trajectory Prediction Based on Deep Learning Models
	1 Introduction
		1.1 Challenges in Vehicular Motion
		1.2 Solutions for Challenges of Vehicular Motion
		1.3 Applications of Trajectory Prediction
	2 Background
		2.1 Problem Statement for VTP
		2.2 Challenges of Vehicle Trajectory Prediction
	3 Related Work
		3.1 Different Approaches for Trajectory Prediction Environment Assessment
		3.2 Limitations of the Trajectory Prediction Environment Assessment Models
	4 Vehicle Trajectory Prediction Models
		4.1 Classical or Physics-Based Models
		4.2 Deep Learning Models
	5 Public Datasets
		5.1 FCD
		5.2 Argoverse
		5.3 T-Drive
		5.4 NuScenes
		5.5 NGSIM
	6 Evaluation Metrics
		6.1 ADE
		6.2 FDE
		6.3 ADE (K)
		6.4 FDE (K)
		6.5 N-ADE/N-FDE
		6.6 Miss Rate
		6.7 DAC
	7 Limitations of Deep Learning Models
		7.1 Pre-processing of Data
		7.2 High Demand for Dataset
		7.3 Generalization of Model
		7.4 Un-Defined Nature of the Models
	8 Conclusion
	References
A Lightweight Intrusion Detection Model for In-vehicular CAN Networks
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
	4 Experiments and Result
		4.1 Dataset
		4.2 Experiment with ML Algorithms and Results Analysis
	5 Conclusion
	References
Vein Pattern-Based Species Classification from Monocotyledonous Leaf Images with Deep Transfer Learning
	1 Introduction
	2 Related Works
	3 Dataset Preparation
		3.1 Data Collection
		3.2 Filename-Format
	4 Methodology
		4.1 Dataset Preparation
	5 Experimental Results
	6 Discussion
	7 Conclusion and Future Works
	References
A Scalable Distributed Query Framework for Unstructured Big Clinical Data: A Case Study on Diabetic Records
	1 Introduction
	2 Preliminaries on Hadoop and Hive
	3 Proposed Architecture
	4 A Case Study: Large-Scale Querying of Diabetes Records
	5 Conclusion and Future Work
	6 Other Queries
	References
DDGAN: Deep Dense Generative Adversarial Networks for Improvement in Arrhythmia Classification
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Zero Phase Low-Pass Filtering
		3.2 Time Frequency (TF) Mapping
		3.3 Generative Adversarial Network (GAN) for ECG
	4 Performance Analysis
		4.1 Result Analysis
	5 Discussion
	6 Conclusion
	References
Securing Health Records Using Quantum Convolutional Neural Network
	1 Introduction
	2 Literature Survey
	3 SHR-QCNN Framework
		3.1 Datasets
		3.2 Pre-processing
		3.3 Feature Extraction Using QCNN
		3.4 Training Using QCNN
		3.5 Securing Health Data Using QCNN
		3.6 Hash Function Protection Privacy
		3.7 EHR Data Secure Using QCNN
	4 Experimental Results and Discussion
	5 Conclusion
	References
A Comprehensive Review and Current Methods for Classifying Alzheimer's Disease Using Feature Extraction and Machine Learning Techniques
	1 Introduction
	2 Literature Survey
	3 Feature Extraction
		3.1 GLCM Technique
		3.2 GRLM Technique
		3.3 Gray Level Difference Matrix (GLDM)
	4 Feature Engineering System
	5 Machine Learning Techniques for AD Classification System
		5.1 Classification Based on Performance
	6 Challenges
	7 Conclusion
	References
A Comparative Study of Machine Learning and Deep Learning Techniques for Prediction of CO2 Emission in Cars
	1 Introduction
	2 Literature Survey
	3 About the Dataset
	4 Methodology
	5 Results
	6 Conclusion
	References
Artificial Intelligence: An Effective Protocol for Optimized Baggage Tracking and Reclaim
	1 Introduction
	2 Airport Luggage Flow Logistics and AI
	3 Problem and Proposed Remedy
		3.1 Problem
		3.2 Remedy
	4 Reasons, Hypothesis, and the Proposed Baggage Reclaim Model
		4.1 Protocol Descriptionctives of the Model Network Model and Hypothesis
		4.2 Baggage Reclaim Model Using the Protocol with Advanced AI
	5 Results and Analysis
	6 Conclusion
	References
Detecting Frauds in Financial Statements Using Deep-Forest
	1 Introduction
	2 Related Works
	3 The Dataset and Methodology
		3.1 Dataset
		3.2 Method
	4 Experimental Results
	5 Conclusions
	References
Strengthening the Communicative Competence by Integrating Language Functions in the EFL Classroom with Gamification Tools
	1 Introduction
	2 State of the Art
		2.1 The Grammar Translation Method
		2.2 The Audiolingual Method
		2.3 Teacher-Centered Teaching
		2.4 New Trends in English Language Teaching
		2.5 Gamification
	3 Methodology
		3.1 Hypothesis
		3.2 Analysis Tool/s (Analysis and Validation)
		3.3 ADDIE Methodology
	4 Results
	5 Conclusion
	References
Target Tracking Area Selection and Handover Security in Cellular Networks: A Machine Learning Approach
	1 Introduction
	2 Related Work
	3 The Proposed Protocol
		3.1 Target Tracking Area Selection
		3.2 UE Registration
		3.3 BS Registration
		3.4 Mutual Authentication and Key Negotiation Phase
	4 Security Evaluation
	5 Performance Evaluation
		5.1 Ping-Pong and Failed Handoffs
		5.2 Communication Costs
		5.3 Computation Costs
	6 Conclusion
	References
Uncertainty Analysis of Fluid Flow Measurement in Pipeline
	1 Introduction
	2 Theoretical Model
		2.1 Flow Calculation
		2.2 Derivation of Combined Uncertainty
	3 Results and Discussion
		3.1 Analysis of Factors Affecting the Accuracy of Flow Rate Measurement in Circular Pipe
		3.2 Analysis of Factors Affecting the Accuracy of Flow Rate Measurement in Square Pipe
	4 Conclusion
	References
ECT-ABE Algorithm-Based Secure Preserving Framework for Medical Big Data
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
	4 Experimental Analysis
		4.1 System Configuration and Software Tools
		4.2 Performance and Security Analysis
	5 Conclusion
	References
Evaluation of the Preference of Web Browsers Among Undergraduates Using AHP-TOPSIS Model
	1 Introduction
	2 Data and Methodology
	3 Empirical Results
	4 Conclusion
	References
A Distributed Framework for Measuring Average Vehicle Speed Using Real-Time Traffic Camera Videos
	1 Introduction
	2 Related Work
	3 System Architecture
		3.1 Vehicle Detection
		3.2 License Plate Recognition
		3.3 Data Storage and Communication
	4 Tests and Results
	5 Summary and Conclusion
	References
Auditory Machine Intelligence for Incipient Fault Localization and Classification in Transmission Lines
	1 Introduction
		1.1 Research Contributions
	2 Materials and Methods
		2.1 Resonance Model of Transmission Line
		2.2 Neural Prediction Technique
	3 Simulation Results
		3.1 System Details
		3.2 System Level Simulations—Under No-Fault and Faulted Conditions
		3.3 Comparative System-Level Data-Driven Classification Using the VSB Dataset
	4 Discussion and Conclusion
	References
The RRRS Methodology Using Self-Regulated Strategies with ICT to Homogenize the English Language
	1 Introduction
	2 State of the Art
		2.1 ICT and Foreign Language
	3 Methodology
	4 Results
		4.1 Statement of the Hypothesis
	5 Conclusion
	References
Application of Artificial Intelligence in Human Resource Activities for Advanced Governance and Welfare
	1 Introduction
		1.1 Objectives
	2 Literature Review
	3 Methodology
	4 Analysis and Discussion
		4.1 Infosys Case
		4.2 HCL Case
		4.3 ORACLE Case
		4.4 Differentiation of Cases on the Classes Considered for Hiring Candidates
	5 Conclusion
	References
Model-Based Design for Mispa CountX Using FPGA
	1 Introduction
	2 Related Works
	3 Mispa CountX
	4 Proposed System
		4.1 Block Diagram
		4.2 Software Implementation
	5 Results and Discussion
		5.1 PWM Generation
		5.2 Startup Sequence
		5.3 Priming All
		5.4 Counting
	6 Conclusion
	References
Analysis of Native Multi-model Database Using ArangoDB
	1 Introduction
	2 Literature Review
	3 Native Multi-model Database
		3.1 Data Storage Entities
		3.2 ArangoDB Graph
		3.3 Arango Query Language (AQL)
		3.4 ArangoDB Storage Engine
		3.5 Indexing for Query Performance and Optimization
		3.6 ArangoDB Runtime Errors
		3.7 ArangoSearch
		3.8 Arango Foxx Services
		3.9 Arango Deployment Modes
		3.10 ArangoDB Kubernetes Operator
	4 Use Case Analysis
		4.1 Query Execution Results
	5 Future Scope
	6 Conclusion
	References
A Review of Deep Learning-Based Object Detection Current and Future Perspectives
	1 Introduction
	2 Literature Survey
		2.1 Object Detection and Challenges
		2.2 Existing Works
	3 Datasets and Metrics for Evaluation
		3.1 Pascal VOC Dataset
		3.2 MSCOCO Dataset
		3.3 ILSVRC Dataset
		3.4 Visdrone-DET Dataset
		3.5 Metrics for Evaluation
	4 Object Detection Models
		4.1 Backbone Networks
		4.2 Two-Stage Detectors
		4.3 One-Stage Object Detectors
		4.4 Transformer Based Detectors
	5 Results
	6 Conclusion
	References
Boron Nitride Nanotube for Sustainable Nanomaterial: A Bibliometric Analysis
	1 Introduction
	2 Methodology
	3 Results
		3.1 Publication Trend
		3.2 Document Types and Source Types
		3.3 Subject Areas
		3.4 Geographical Contributions
		3.5 Source Titles
		3.6 Most Cited Publications
		3.7 Keyword Analysis
		3.8 Citation Metrics
		3.9 Summary
	4 Conclusion
	References
Design of a University Thesis and Project Automation System (UTPAS)
	1 Introduction
	2 Description of the Proposed System
	3 Methodology and Implementation
	4 Discussion and Conclusion
	References
An Evaluation of Machine Learning Methods for Classifying Bot Traffic in Software Defined Networks
	1 Introduction
	2 Related Work
	3 Classification Algorithms
		3.1 Logistic Regression
		3.2 Support Vector Machines
		3.3 Random Forests
		3.4 K-Nearest Neighbours
		3.5 Multilayer Perceptrons
		3.6 Neural Network
	4 The InSDN Dataset
		4.1 InSDN Features
		4.2 Baseline Results
	5 Experiment Design
		5.1 Preprocessing
		5.2 Classification
	6 Results
	7 Conclusion
	References
A Systematic Literature Review on Information Security Leakage: Evaluating Security Threat
	1 Introduction
	2 Background of the Study
		2.1 Data Leakage
		2.2 Data Leakage Prevention
	3 Methodology
		3.1 Search Strategy
		3.2 Inclusion and Exclusion Criteria
		3.3 Selection Criteria
	4 Findings and Results
		4.1 Analysis
	5 Discussion
	6 Conclusion and Future Work
	References
Identifying Memory Dump Malware Using Supervised Learning
	1 Introduction
	2 Related Work
	3 Background
	4 Methodology
	5 Classification Algorithms and Results
	6 Experiments and Results
	7 Conclusion and Future Work
	References
Analysis of Quality Management and Sustainability in Sports Services During the Covid-19 Pandemic
	1 Introduction
	2 State of the Art
	3 Methodology
		3.1 Participants
		3.2 Instrument
		3.3 Collection of Information
	4 Results
	5 Conclusions
	References
Cost Analysis of Simultaneous AC-DC Power Transmission System
	1 Introduction
	2 Cost Analysis of HVDC Transmission Line
	3 Cost Analysis of Simultaneous AC-DC System
	4 Conclusion
	References
Author Index




نظرات کاربران