دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Subarna Shakya, Valentina Emilia Balas, Wang Haoxiang سری: Lecture Notes in Networks and Systems, 587 ISBN (شابک) : 9811978735, 9789811978739 ناشر: Springer سال نشر: 2023 تعداد صفحات: 1024 [1025] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 27 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Proceedings of Third International Conference on Sustainable Expert Systems: ICSES 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات سومین کنفرانس بین المللی سیستم های خبره پایدار: ICSES 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface Contents About the Editors Design, Development, and Implementation of Software Engineering Virtual Laboratory: A Boon to Computer Science and Engineering (CSE) Education During Covid-19 Pandemic 1 Design of the SE VLab 1.1 Architecture 1.2 Database Schema 1.3 Related Technologies 1.4 User Activities 2 Overview of the SE VLab 2.1 Objectives 2.2 Use/Reuse of SE VLab 2.3 Target Audience 3 Details of Few Experiments of SE VLab 3.1 Identification of Requirements from Problem Statements 3.2 Estimation of Project Metrics 3.3 Statechart and Activity Modeling 3.4 Estimation of Test Coverage Metrics and Structural Complexity 3.5 Designing Test Suites 4 Assessment of the SE VLab: A Pilot Study 4.1 Data Analysis 4.2 Content Knowledge Test and Learning Gain 4.3 Loading Time 4.4 Average Use of SE VLab Users 5 Concluding Remarks 5.1 Educational Implications 5.2 Limitations 6 Conclusion and Future Work 6.1 Designing the Software Engineering Virtual Laboratory 6.2 CP-VLLM: Development of a Virtual Learning Measurement Tool 6.3 Evaluation of Students’ Learning Performance in a Virtual Laboratory Learning Environment 6.4 Directions for Future Research References The Effect of Facebook Social Media on Recent Jambi Regional Election—An Empirical Data Analysis 1 Introduction 2 Literature Review 2.1 Use Social Media in Elections 2.2 Political Communication in Social Media 3 Research Method 4 Finding and Discussion 4.1 Political Communication Content 4.2 Political Communication Narrative 4.3 Political Communication on Facebook with Election Result 5 Conclusion References Estimating the Intervals Between Mount Etna Eruptions 1 Introduction 2 Methods 2.1 Model 1: Student-t (M1) 2.2 Model 2: Normal (M2) 2.3 Model Validation and Comparison 3 Results 4 Conclusion References Sentiment Enhanced Smart Movie Recommendation System 1 Introduction 2 Approach 2.1 Recommendation Algorithms 2.2 Analysis of Sentiments Behind Movie Reviews 2.3 Poster Search 3 Purpose 4 Major Research Findings 5 Practical Implications 6 Research Limitations 7 Originality 8 Conclusion and Future Research Work References A Machine Learning Model for Predictive Maintenance of a Stepper Motor Using Digital Simulation Data 1 Introduction 2 Methodology 2.1 Dataset Features 2.2 Benchmarking 3 Purpose 3.1 Finding the Optimal Classifier 3.2 Observed Outcomes 4 Obtained Results 4.1 KNN Model 4.2 Random Forest Model 4.3 Support Vector Model 4.4 Decision Tree 4.5 Comparison of Classifiers 4.6 Comparison of Sensor Signals 4.7 Trained Result with New Dataset 5 Research Limitations 6 Originality 7 Conclusion and Future Research Work References Impact of Pollutants on Temperature Change and Forecasting Temperature of US Cities 1 Introduction 2 Literature Review 3 Design/Methodology/Approach 3.1 Data Pre-processing and Cleaning 3.2 Visualizing Patterns and Trends 3.3 Time-Series SARIMA Model 3.4 Evaluating and Optimizing the SARIMA Model 4 Major Research Findings 4.1 Co-relation Between Pollution and Temperature 4.2 Forecasting Temperature in the US 5 Practical Implications 6 Research Limitations/Implications 7 Originality/Value 8 Conclusion and Future Research Work References Hybrid Precoding Schemes for mmWave Massive MIMO Systems—A Comprehensive Survey 1 Introduction 2 mmWave MIMO Systems: An Overview 3 mmWave Massive MIMO Precoding Schemes 3.1 Hybrid Precoding with Phase Modulation Array 3.2 Principal Component Analysis Based Hybrid Precoding 3.3 Hybrid Precoding by Using Deep Learning Approach 3.4 Hybrid Precoding Using Adaptive Sub-connected Structures 3.5 Hybrid Analog/Digital Precoding and Combining Architectures 4 Conclusion References Optimized Web Service Composition Using Hybrid Evolutionary Algorithms 1 Introduction 2 Literature Review 3 Methodology 3.1 Model Building 3.2 Proposed Algorithm 4 Results and Analysis 5 Conclusion and Future Work References Organization Security Framework—A Defensive Mechanism 1 Introduction 2 Related Works 3 Methodology 3.1 Project 3.2 Experimental Analysis 4 Conclusion References Trusty Medicare: An Online Virtual Care System 1 Introduction 2 Need for Virtual Clinic 2.1 Key Issues Limiting the Impact of Virtual Clinic 2.2 Solutions to Overcome These Challenges 3 Literature Survey 4 Existing Virtual Clinic Systems 5 The Proposed Virtual Clinic System—Trusty Medicare 5.1 Use Cases 6 Novelty 7 Implementation 7.1 User Flow Diagram 7.2 Security and Privacy 7.3 Quality Assurance 7.4 User Interface of the Website 7.5 Representation of Patient’s Journey Across Continuum of Care 8 Future Scope and Conclusion References Blockchain-Based Remote Construction Monitoring Using UAV in SITL Simulation 1 Introduction 2 Related Work 2.1 The Cloud and Unmanned Aerial Vehicles 3 The Architecture of a Swarm UAV in a Construction Monitoring System 3.1 Technique for Computing in Fog Using a Swarm of Drones 4 Results and Discussion 4.1 A Comparison of a UAV Drone with a Satellite 5 Conclusion and Future Work References Papaya Diseases Detection Using GLCM Feature Extraction and Hyperparatuning of Machine Learning Approach 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Data Acquisition and Pre-processing 3.2 GLCM Computation for Feature Extraction 3.3 Model Training with Different ML Classifiers 4 Result and Discussion 5 Conclusion and Future Scope References Image Forgery and Image Tampering Detection Techniques: A Review 1 Introduction 2 Image Forgery Detection 2.1 Problems in Detecting Forgery 2.2 Types of Image Forgery 2.3 Detection of Image Forgery 2.4 Medical Image Forgery Detection for Smart Health Care 2.5 A Comparison Between Image Forgery Detection Algorithms 2.6 CNN Pre-trained Models 2.7 CNN with a Combination of ELA and Sharpening Pre-processing Techniques 3 Image Tampering Localization 3.1 Encoder-Decoder Model 4 Recoloring Forgery Detection 4.1 Method 5 Copy-Move Image Forgery Detection 5.1 Using Structural Similarity Index [SSIM] Measure 5.2 Using IC-MFD Model 5.3 Using Machine Learning and Deep Learning Techniques 5.4 PCA and DCT 6 Results 6.1 Image Forgery Detection 6.2 Image Tampering Localization 6.3 Recoloring Forgery Detection 6.4 Copy-Move Image Forgery Detection 7 Conclusion References Low-Voltage Ride-Through for a Three-Phase Grid-Integrated Single-Stage Inverter-Based Photovoltaic System Using Fuzzy Logic Control 1 Introduction 2 Modelling of Single-Stage PV System 2.1 Structure of Equivalent Circuit of PV Module 2.2 LCL Filters 2.3 Methodology 3 Fuzzy Logic Control 4 Results and Discussions 5 Conclusion References Automated Detection of Malaria Parasite from Giemsa-Stained Thin Blood Smear Images 1 Introduction 2 Related Work 3 Compared Pre-trained Models 3.1 VGG-19 3.2 DenseNet-121 3.3 Inception 3.4 Xception 3.5 MobileNet-V2 4 Proposed Deep Learning Model 4.1 Dataset and Data Augmentation 4.2 Pre-processing 4.3 Segmentation 4.4 Classification 5 Results and Discussion 6 Conclusion and Future Work References Forecasting Diabetic Foot Ulcers Using Deep Learning Models 1 Introduction 2 Related Work 3 Methodology 3.1 Objectives 3.2 Data Set 3.3 Algorithms Used 4 Result Analysis 4.1 Evaluation Metrics 4.2 Results Obtained 5 Conclusion References Artificial Intelligence-Based Chronic Kidney Disease Prediction—A Review 1 Introduction 2 Literature Review 3 Conclusion and Discussion References Smart Home Security System Using Facial Recognition 1 Introduction 2 Smart Home Security System 2.1 Block Diagram of Smart Home Security System 2.2 Flow Diagram 2.3 System Components 2.4 HOG with SVM 3 Results and Discussion 4 Conclusion References Automated Algorithm for Neurodegenerative Disorder Detection Using Gait-Based Features 1 Introduction 2 Material and Method 2.1 Data Acquisition 2.2 Feature Extraction 2.3 Classification 3 Numerical Results 4 Conclusions References Health Monitoring System for Comatose Patient Using Raspberry-Pi 1 Introduction 2 Proposed System 3 Methodology 4 Hardware Description 4.1 Software Description 4.2 Raspberry Pi PiCO 4.3 Heart Rate Sensor 4.4 Temperature Sensor (DS18B20) 4.5 Blood Pressure Sensor 4.6 ESP8266 WI-FI Module 4.7 Buzzer 4.8 LCD (Liquid Crystal Display) 5 Results and Output 6 Conclusion 7 Future Scope References Digital Skeletonization for Bio-Medical Images 1 Introduction 2 Literature Survey 3 Proposed Algorithm 3.1 Algorithm 3.2 Identification of Skeletal Pixels—Corner Pixels 3.3 Identification of Skeletal Pixels—Border Pixels 3.4 Boundary Erosion 4 Results and Discussion 5 Future Scope References IoT-Based Condition Monitoring of Busbar 1 Introduction 2 Block Diagram of Proposed Scheme of Condition Monitoring 2.1 NodeMCU-32S-ESP 32 2.2 Current Sensor (ACS712) 2.3 Temperature Sensor (DS18B20) 2.4 Software Tools 3 The Experimental Setup for the Condition Monitoring of Busbar 3.1 Data Flow in IoT Module 4 Results and Discussions 4.1 Determination of Calibration Factor 4.2 Measurement of Current on the IoT Platform 5 Conclusions References Novel CNN Approach (YOLO v5) to Detect Plant Diseases and Estimation of Nutritional Facts for Raw and Cooked Foods 1 Introduction 2 Related Works 3 Proposed System 3.1 System Architecture 3.2 Datasets 3.3 System Design 3.4 System Model 3.5 Flow Diagram 3.6 Image Segmentation 3.7 Feature Extraction 3.8 Data Augmentation—360° Rotation 3.9 Sequential Analysis 3.10 Number of Epochs Performed 3.11 YOLO v5 Algorithm Working Process 3.12 Calorie Estimation 3.13 User Experience—Streamlite 3.14 Advantages of the Proposed Model 4 Results 4.1 Plant Name and Disease Identification 4.2 Measurement of Performance 4.3 Calorie and Nutritional Value Estimation (Raw Foods/Cooked Foods/Fast Foods) 4.4 Measurement of Performance 5 Conclusion References The Evolution of Ad Hoc Networks for Tactical Military Communications: Trends, Technologies, and Case Studies 1 Introduction 2 Challenges in Setting Up Army Tactical Networks 3 Army Tactical Networks: Design Requirements 3.1 Mobility 3.2 Multicasting 3.3 Reliability 3.4 Delay Constraints 3.5 Availability and Survivability 3.6 Network Management and Control 4 Security in Military Ad Hoc Networks 4.1 Passive Threats 4.2 Active Threats 4.3 Risk Analysis 5 Security Mechanisms for Army Tactical Ad Hoc Networks 5.1 A* Algorithm 5.2 Military Authentication Header 5.3 Cooperative Phase-Steering Technique 5.4 Ad Hoc On-Demand Distance Vector Routing Protocol 5.5 Backbone Formation in Military Multi-Layer Ad Hoc Networks 5.6 Optimized Link-State Routing 5.7 Agile Computing Middleware 5.8 Beacon-Based Routing 6 Conclusions References Modified Floating Point Adder and Multiplier IP Design 1 Introduction 2 Literature Survey 3 Methodology 4 Results References Meta Embeddings for LinCE Dataset 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 DataSet Description 3.2 Data Pre-processing 3.3 Meta Embedding 3.4 Deep Learning Models 3.5 Machine Learning Models 4 Experiments 5 Results 6 Conclusion References Recent Trends in Automatic Autism Spectrum Disorder Detection Using Brain MRI 1 Introduction 2 Literature Review of ASD 2.1 Machine Learning Techniques 2.2 Deep Learning Techniques 3 Experimental Results and Discussions 4 Conclusions References A Pipeline for Business Intelligence and Data-Driven Root Cause Analysis on Categorical Data 1 Introduction 2 Literature Survey 2.1 Community Detection 2.2 Data to Graph 2.3 Business Insights Via Data Mining 2.4 Data Driven Root Cause Analysis 3 Preliminaries 3.1 Louvains Community Detection 3.2 Association Rule Mining 4 Methodoloy 4.1 Graph Conversion 4.2 Modularity-Based Community Detection 4.3 Association Rule Mining and Summarization 5 Dataset 6 Results 7 Conclusion References Non-knowledge Based Decision Support System 1 Introduction 2 Review of Literature 3 System Design 3.1 Concerns of Non-knowledge-Based MDSS Development 3.2 Non Knowledge-Based Medical Decision Support System Architecture 3.3 Data Preprocessing 3.4 Predicting Result Based on J48 Algorithm 3.5 Predicting the Result Based on Bagging Algorithm 4 Conclusion References Interactive Image Generation Using Cycle GAN Over AWS Cloud 1 Introduction 1.1 Basic Concepts 1.2 Motivation 1.3 Problem Statement 1.4 Scope 1.5 Objectives 1.6 Advantages 1.7 Applications 2 Literature Survey 3 Implementation 4 Result and Analysis 5 Conclusion and Future Work References Challenges and New Opportunities in Diverse Approaches of Big Data Stream Analytics 1 Introduction 2 Big Data Stream Pre-processing 2.1 Challenges and New Opportunities in Big Data Stream Pre-processing 3 Ensemble Learning for Big Data Stream Analysis 3.1 Drift Detection with Ensemble Learning 4 Big Data Stream Analytics with Meta Learning 5 Big Data Stream Analytics with Deep Learning 6 Conclusion References Door Lock System Using Cryptographic Algorithm Based on Internet of Things 1 Introduction 2 Literature Survey 2.1 Block Diagram 2.2 Flowchart 3 System Description and Methodology 3.1 Secure Hash Algorithm (SHA) 3.2 Global System for Mobile Communications (GSM) 3.3 Fingerprint Sensor 3.4 ATmega328p 4 Results and Analysis 5 Conclusion and Future Scope References Knowledge Engineering-Based Analysis of Convolutional Neural Network Architectures’ Performance on Luna16 and GAN Generated Pulmonary Nodule Clipped Patches to Diagnose Lung Cancer 1 Introduction 2 Relevant Knowledge 2.1 Convolutional Neural Networks 2.2 Alexnet 2.3 InceptionV3 2.4 Xception 2.5 GoogLeNet 2.6 DenseNet 2.7 ShuffleNet 2.8 GAN 3 Experimentation and Results 3.1 Data Pre-processing 3.2 Experiment and Results 4 Originality 5 Conclusion References Brain Tissue Segmentation Using Transfer Learning 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Proposed Algorithm 3.2 U-Net 3.3 Transfer Learning 3.4 Efficient Net 3.5 Proposed Flowchart 4 Experimental Analysis 4.1 Input Data 4.2 Data Pre-processing 4.3 Feature Extraction 4.4 Model Summary of Hybrid Learning Model 5 Conclusion References Aadhaar Block: An Authenticated System for Counterfeit Aadhaar Enrolment in Citizen Services Using Blockchain 1 Introduction 1.1 Motivation 1.2 Issues Addressed 2 Literature Survey 3 Proposed System 3.1 The Proposed Architecture 3.2 Sequence Diagram of Proposed System 4 Results and Experimental Setup 4.1 Home Page 4.2 Aadhaar Enrolment 4.3 Authentication 4.4 Minutiae Based Fingerprint Matching 5 Conclusion and Future Enhancement References Enhanced Human Action Recognition with Ensembled DTW Loss Function in CNN LSTM Architecture 1 Introduction 2 Literature Survey 3 Proposed Methodology 3.1 Working 4 System Architecture 4.1 Three-Dimensional Convolutional Neural Network (3D CNN) 4.2 Mean Squared Error (MSE) 4.3 Convolutional Neural Network Long Short-Term Memory (CNN LSTM) 5 Results 5.1 Evaluation Metrics 6 Conclusion References Link Prediction Using Fuzzy Computing Model by Analyzing Social Relationship in Criminal Networks 1 Introduction 2 Related Works 3 Link Prediction Using Fuzzy Computing Model (LPFCM) 3.1 Network AnalyticsModule 3.2 Fuzzy Computation Module 3.3 Link Prediction Module 4 Results 4.1 Dataset Used 4.2 Results Analysis 5 Conclusion References Estimation of Maximum Power Operating Point for Single-Diode Solar Photovoltaic Model Using Python Programming 1 Introduction 2 Solar Cell Model 2.1 Single Diode Model of Solar Cell 2.2 IV Characteristics of Solar Cell 3 Implementation Using Python 4 Proposed Model for Estimating Current and Power for Single-Diode Solar Photovoltaic Model 4.1 Maximum Power Determination for Single-Diode Solar Photovoltaic Cell 4.2 Bisection Method 4.3 Simulation Results 5 Conclusion References Hardware Trojan Modelling on a FPGA Based Deep Neural Network Accelerator 1 Introduction 2 Deep Neural Network Implementation 2.1 Neuron Architecture 3 Proposed Trojan Model for DNN 4 Results and Discussion 5 Conclusion References Sustainable Farming and Customized Livestock Management Using Internet of Things 1 Introduction 2 Literature Review 3 Proposed Model 4 Results and Discussion 5 Conclusion and Future Scope References Verification and Validation of 64-Bit Processor Memory System 1 Introduction 2 Methodology 2.1 UVM Verification of EDAC 2.2 VHDL Implementation of EDAC with AMBA Bus 3 Results and Analysis 3.1 Simulation Results of UVM Verification with EDAC 3.2 Simulation Results of SRCTRL Memory Controller 4 Conclusion 5 Future Work References Land Use and Land Cover Change Assessment Using Remote Sensing and Geographic Information System 1 Introduction 2 Literature Review 3 Proposed Method 4 Description of Algorithms 5 Description of Datasets, Requirements, and Tools 6 Results and Observations 6.1 Results 6.2 Observations 7 Conclusion 8 Future Study References A Comparative Analysis of Single Image Dehazing Techniques for Real Scene 1 Introduction 2 Literature Survey 3 Single Image Dehazing Techniques 3.1 Priority Based Techniques 3.2 Deep Learning 4 Results and Discussion 5 Conclusion References A Detailed Study on a Software-Based Fog Network-Based Delay-Tolerant Data Transmission Model 1 Introduction 2 Literature Review 3 Existing Model 4 Proposed System 4.1 Theoretical Representation 5 Conclusion References Noisy Brain MR Image Segmentation Using Modified Adaptively Regularized Kernel Fuzzy C-Means Clustering Algorithm 1 Introduction 2 ARKFCM Algorithm 3 Adaptive Weighted Mean Filter 4 Results and Discussion 5 Conclusion References Deep Learning with Metadata Augmentation for Classification of Diabetic Retinopathy Level 1 Introduction 2 Background and Related Works 3 Methodology 3.1 Dataset 3.2 Models 3.3 Workflow 4 Results 4.1 Single Modality Model 4.2 Multi Modality with Patient Opinion 4.3 Multi Modality with Expert Opinion 4.4 Multi Modality with Patient and Expert Opinions 5 Discussion and Conclusions 5.1 Cross-Validation Study 5.2 Out-of-Cross-Validation Study 5.3 Conclusion References Advanced Vehicle Detection Heads-Up Display with TensorFlow Lite 1 Introduction 2 Related Works 3 Working 4 Result and Discussion 4.1 Frames Per Second (FPS) 4.2 Mean Average Precision 4.3 Accuracy Percentage 4.4 Minimum Time Per Frame 5 Conclusion and Future Work References A Survey of Vehicle Trajectory Prediction Based on Deep Learning Models 1 Introduction 1.1 Challenges in Vehicular Motion 1.2 Solutions for Challenges of Vehicular Motion 1.3 Applications of Trajectory Prediction 2 Background 2.1 Problem Statement for VTP 2.2 Challenges of Vehicle Trajectory Prediction 3 Related Work 3.1 Different Approaches for Trajectory Prediction Environment Assessment 3.2 Limitations of the Trajectory Prediction Environment Assessment Models 4 Vehicle Trajectory Prediction Models 4.1 Classical or Physics-Based Models 4.2 Deep Learning Models 5 Public Datasets 5.1 FCD 5.2 Argoverse 5.3 T-Drive 5.4 NuScenes 5.5 NGSIM 6 Evaluation Metrics 6.1 ADE 6.2 FDE 6.3 ADE (K) 6.4 FDE (K) 6.5 N-ADE/N-FDE 6.6 Miss Rate 6.7 DAC 7 Limitations of Deep Learning Models 7.1 Pre-processing of Data 7.2 High Demand for Dataset 7.3 Generalization of Model 7.4 Un-Defined Nature of the Models 8 Conclusion References A Lightweight Intrusion Detection Model for In-vehicular CAN Networks 1 Introduction 2 Literature Review 3 Proposed Methodology 4 Experiments and Result 4.1 Dataset 4.2 Experiment with ML Algorithms and Results Analysis 5 Conclusion References Vein Pattern-Based Species Classification from Monocotyledonous Leaf Images with Deep Transfer Learning 1 Introduction 2 Related Works 3 Dataset Preparation 3.1 Data Collection 3.2 Filename-Format 4 Methodology 4.1 Dataset Preparation 5 Experimental Results 6 Discussion 7 Conclusion and Future Works References A Scalable Distributed Query Framework for Unstructured Big Clinical Data: A Case Study on Diabetic Records 1 Introduction 2 Preliminaries on Hadoop and Hive 3 Proposed Architecture 4 A Case Study: Large-Scale Querying of Diabetes Records 5 Conclusion and Future Work 6 Other Queries References DDGAN: Deep Dense Generative Adversarial Networks for Improvement in Arrhythmia Classification 1 Introduction 2 Related Work 3 Methodology 3.1 Zero Phase Low-Pass Filtering 3.2 Time Frequency (TF) Mapping 3.3 Generative Adversarial Network (GAN) for ECG 4 Performance Analysis 4.1 Result Analysis 5 Discussion 6 Conclusion References Securing Health Records Using Quantum Convolutional Neural Network 1 Introduction 2 Literature Survey 3 SHR-QCNN Framework 3.1 Datasets 3.2 Pre-processing 3.3 Feature Extraction Using QCNN 3.4 Training Using QCNN 3.5 Securing Health Data Using QCNN 3.6 Hash Function Protection Privacy 3.7 EHR Data Secure Using QCNN 4 Experimental Results and Discussion 5 Conclusion References A Comprehensive Review and Current Methods for Classifying Alzheimer's Disease Using Feature Extraction and Machine Learning Techniques 1 Introduction 2 Literature Survey 3 Feature Extraction 3.1 GLCM Technique 3.2 GRLM Technique 3.3 Gray Level Difference Matrix (GLDM) 4 Feature Engineering System 5 Machine Learning Techniques for AD Classification System 5.1 Classification Based on Performance 6 Challenges 7 Conclusion References A Comparative Study of Machine Learning and Deep Learning Techniques for Prediction of CO2 Emission in Cars 1 Introduction 2 Literature Survey 3 About the Dataset 4 Methodology 5 Results 6 Conclusion References Artificial Intelligence: An Effective Protocol for Optimized Baggage Tracking and Reclaim 1 Introduction 2 Airport Luggage Flow Logistics and AI 3 Problem and Proposed Remedy 3.1 Problem 3.2 Remedy 4 Reasons, Hypothesis, and the Proposed Baggage Reclaim Model 4.1 Protocol Descriptionctives of the Model Network Model and Hypothesis 4.2 Baggage Reclaim Model Using the Protocol with Advanced AI 5 Results and Analysis 6 Conclusion References Detecting Frauds in Financial Statements Using Deep-Forest 1 Introduction 2 Related Works 3 The Dataset and Methodology 3.1 Dataset 3.2 Method 4 Experimental Results 5 Conclusions References Strengthening the Communicative Competence by Integrating Language Functions in the EFL Classroom with Gamification Tools 1 Introduction 2 State of the Art 2.1 The Grammar Translation Method 2.2 The Audiolingual Method 2.3 Teacher-Centered Teaching 2.4 New Trends in English Language Teaching 2.5 Gamification 3 Methodology 3.1 Hypothesis 3.2 Analysis Tool/s (Analysis and Validation) 3.3 ADDIE Methodology 4 Results 5 Conclusion References Target Tracking Area Selection and Handover Security in Cellular Networks: A Machine Learning Approach 1 Introduction 2 Related Work 3 The Proposed Protocol 3.1 Target Tracking Area Selection 3.2 UE Registration 3.3 BS Registration 3.4 Mutual Authentication and Key Negotiation Phase 4 Security Evaluation 5 Performance Evaluation 5.1 Ping-Pong and Failed Handoffs 5.2 Communication Costs 5.3 Computation Costs 6 Conclusion References Uncertainty Analysis of Fluid Flow Measurement in Pipeline 1 Introduction 2 Theoretical Model 2.1 Flow Calculation 2.2 Derivation of Combined Uncertainty 3 Results and Discussion 3.1 Analysis of Factors Affecting the Accuracy of Flow Rate Measurement in Circular Pipe 3.2 Analysis of Factors Affecting the Accuracy of Flow Rate Measurement in Square Pipe 4 Conclusion References ECT-ABE Algorithm-Based Secure Preserving Framework for Medical Big Data 1 Introduction 2 Literature Review 3 Proposed Methodology 4 Experimental Analysis 4.1 System Configuration and Software Tools 4.2 Performance and Security Analysis 5 Conclusion References Evaluation of the Preference of Web Browsers Among Undergraduates Using AHP-TOPSIS Model 1 Introduction 2 Data and Methodology 3 Empirical Results 4 Conclusion References A Distributed Framework for Measuring Average Vehicle Speed Using Real-Time Traffic Camera Videos 1 Introduction 2 Related Work 3 System Architecture 3.1 Vehicle Detection 3.2 License Plate Recognition 3.3 Data Storage and Communication 4 Tests and Results 5 Summary and Conclusion References Auditory Machine Intelligence for Incipient Fault Localization and Classification in Transmission Lines 1 Introduction 1.1 Research Contributions 2 Materials and Methods 2.1 Resonance Model of Transmission Line 2.2 Neural Prediction Technique 3 Simulation Results 3.1 System Details 3.2 System Level Simulations—Under No-Fault and Faulted Conditions 3.3 Comparative System-Level Data-Driven Classification Using the VSB Dataset 4 Discussion and Conclusion References The RRRS Methodology Using Self-Regulated Strategies with ICT to Homogenize the English Language 1 Introduction 2 State of the Art 2.1 ICT and Foreign Language 3 Methodology 4 Results 4.1 Statement of the Hypothesis 5 Conclusion References Application of Artificial Intelligence in Human Resource Activities for Advanced Governance and Welfare 1 Introduction 1.1 Objectives 2 Literature Review 3 Methodology 4 Analysis and Discussion 4.1 Infosys Case 4.2 HCL Case 4.3 ORACLE Case 4.4 Differentiation of Cases on the Classes Considered for Hiring Candidates 5 Conclusion References Model-Based Design for Mispa CountX Using FPGA 1 Introduction 2 Related Works 3 Mispa CountX 4 Proposed System 4.1 Block Diagram 4.2 Software Implementation 5 Results and Discussion 5.1 PWM Generation 5.2 Startup Sequence 5.3 Priming All 5.4 Counting 6 Conclusion References Analysis of Native Multi-model Database Using ArangoDB 1 Introduction 2 Literature Review 3 Native Multi-model Database 3.1 Data Storage Entities 3.2 ArangoDB Graph 3.3 Arango Query Language (AQL) 3.4 ArangoDB Storage Engine 3.5 Indexing for Query Performance and Optimization 3.6 ArangoDB Runtime Errors 3.7 ArangoSearch 3.8 Arango Foxx Services 3.9 Arango Deployment Modes 3.10 ArangoDB Kubernetes Operator 4 Use Case Analysis 4.1 Query Execution Results 5 Future Scope 6 Conclusion References A Review of Deep Learning-Based Object Detection Current and Future Perspectives 1 Introduction 2 Literature Survey 2.1 Object Detection and Challenges 2.2 Existing Works 3 Datasets and Metrics for Evaluation 3.1 Pascal VOC Dataset 3.2 MSCOCO Dataset 3.3 ILSVRC Dataset 3.4 Visdrone-DET Dataset 3.5 Metrics for Evaluation 4 Object Detection Models 4.1 Backbone Networks 4.2 Two-Stage Detectors 4.3 One-Stage Object Detectors 4.4 Transformer Based Detectors 5 Results 6 Conclusion References Boron Nitride Nanotube for Sustainable Nanomaterial: A Bibliometric Analysis 1 Introduction 2 Methodology 3 Results 3.1 Publication Trend 3.2 Document Types and Source Types 3.3 Subject Areas 3.4 Geographical Contributions 3.5 Source Titles 3.6 Most Cited Publications 3.7 Keyword Analysis 3.8 Citation Metrics 3.9 Summary 4 Conclusion References Design of a University Thesis and Project Automation System (UTPAS) 1 Introduction 2 Description of the Proposed System 3 Methodology and Implementation 4 Discussion and Conclusion References An Evaluation of Machine Learning Methods for Classifying Bot Traffic in Software Defined Networks 1 Introduction 2 Related Work 3 Classification Algorithms 3.1 Logistic Regression 3.2 Support Vector Machines 3.3 Random Forests 3.4 K-Nearest Neighbours 3.5 Multilayer Perceptrons 3.6 Neural Network 4 The InSDN Dataset 4.1 InSDN Features 4.2 Baseline Results 5 Experiment Design 5.1 Preprocessing 5.2 Classification 6 Results 7 Conclusion References A Systematic Literature Review on Information Security Leakage: Evaluating Security Threat 1 Introduction 2 Background of the Study 2.1 Data Leakage 2.2 Data Leakage Prevention 3 Methodology 3.1 Search Strategy 3.2 Inclusion and Exclusion Criteria 3.3 Selection Criteria 4 Findings and Results 4.1 Analysis 5 Discussion 6 Conclusion and Future Work References Identifying Memory Dump Malware Using Supervised Learning 1 Introduction 2 Related Work 3 Background 4 Methodology 5 Classification Algorithms and Results 6 Experiments and Results 7 Conclusion and Future Work References Analysis of Quality Management and Sustainability in Sports Services During the Covid-19 Pandemic 1 Introduction 2 State of the Art 3 Methodology 3.1 Participants 3.2 Instrument 3.3 Collection of Information 4 Results 5 Conclusions References Cost Analysis of Simultaneous AC-DC Power Transmission System 1 Introduction 2 Cost Analysis of HVDC Transmission Line 3 Cost Analysis of Simultaneous AC-DC System 4 Conclusion References Author Index