ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2019 (Advances in Intelligent Systems and Computing, 1119)

دانلود کتاب پیشرفت در محاسبات، تجزیه و تحلیل و شبکه: مجموعه مقالات ICCAN 2019 (پیشرفت در سیستم های هوشمند و محاسبات، 1119)

Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2019 (Advances in Intelligent Systems and Computing, 1119)

مشخصات کتاب

Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2019 (Advances in Intelligent Systems and Computing, 1119)

ویرایش:  
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 9811524130, 9789811524134 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 665 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 28 مگابایت 

قیمت کتاب (تومان) : 38,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2019 (Advances in Intelligent Systems and Computing, 1119) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب پیشرفت در محاسبات، تجزیه و تحلیل و شبکه: مجموعه مقالات ICCAN 2019 (پیشرفت در سیستم های هوشمند و محاسبات، 1119) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب پیشرفت در محاسبات، تجزیه و تحلیل و شبکه: مجموعه مقالات ICCAN 2019 (پیشرفت در سیستم های هوشمند و محاسبات، 1119)



این کتاب بر روی ایده‌ها و یافته‌های پژوهشی جدید و بدیع در سه حوزه کلی تمرکز دارد: محاسبات، تحلیل، و شبکه و کاربردهای بالقوه آنها در حوزه‌های مختلف مهندسی - در حال ظهور، بین رشته‌ای. حوزه ای که در آن طیف وسیعی از نظریه ها و روش شناسی ها برای مقابله با مشکلات پیچیده و چالش برانگیز دنیای واقعی بررسی و توسعه می یابند. این کتاب همچنین شامل ارائه‌های کلیدی و مقالاتی از کنفرانس بین‌المللی تحلیل محاسباتی و شبکه (ICCAN 2019) است که یک انجمن آزاد برای دانشمندان، محققان و تکنوکرات‌ها در دانشگاه و صنعت از سراسر جهان برای ارائه و اشتراک‌گذاری وضعیت ارائه می‌دهد. -مفاهیم هنری، نمونه های اولیه و ایده های پژوهشی نوآورانه در زمینه های مختلف. ارائه الهام برای دانشجویان کارشناسی ارشد و محققان جوان شاغل در زمینه علوم کامپیوتر


توضیحاتی درمورد کتاب به خارجی

This book focuses on new and original research ideas and findings in three broad areas: computing, analytics, and networking and their potential applications in the various domains of engineering – an emerging, interdisciplinary area in which a wide range of theories and methodologies are being investigated and developed to tackle complex and challenging real-world problems. The book also features keynote presentations and papers from the International Conference on Computing Analytics and Networking (ICCAN 2019), which offers an open forum for scientists, researchers and technocrats in academia and industry from around the globe to present and share state-of-the-art concepts, prototypes, and innovative research ideas in diverse fields. Providing inspiration for postgraduate students and young researchers working in the field of computer science & engineering, the book also discusses hardware technologies and future communication technologies, making it useful for those in the field of electronics.




فهرست مطالب

Committees
	Advisory Committee
	Program Committee
	Chief Patron
	Patron
	Honorary General Chairs
	General Chairs
	Program Chairs
	Organizing Chair
	Session Management Chair
	Publication Chairs
	Publicity Chairs
	Registration Chairs
Preface
Acknowledgements
About Conference
Contents
About the Editors
Implementation of Session-to-Mobility Ratio Based Mobility Management Scheme for Wireless Mesh Network to Handle Internet and Intranet Packets
	1 Introduction
	2 Related Work
	3 Session-to-Mobility Ratio Based Mobility Management Scheme
		3.1 Mobility Management
		3.2 Route Setup
		3.3 Routing of Data Packets
	4 Simulation Result and Comparison
	5 Conclusion and Future Work
	References
An Ensemble Approach for Classification of Thyroid Using Machine Learning
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Algorithm for Classification of Thyroid Disease
		3.2 Flowchart for Detection and Classification of Thyroid
	4 Experimental Results
		4.1 Performance Determining Parameters for Classification
		4.2 Experimentation and Result Analysis
	5 Conclusion
	References
Text Classification with K-Nearest Neighbors Algorithm Using Gain Ratio
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Result and Analysis
	5 Conclusion
	References
An Effective Framework for Skyline Queries Using Principal Component Analysis
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Principle Component Analysis
		3.2 Skewness Algorithm for the Avoidance of Overload
		3.3 EFSQ-PCA Algorithm
		3.4 Flowchart
	4 Experimental Setup and Result Analysis
		4.1 Result Analysis
	5 Conclusion
	References
Disease Classification Using Linguistic Neuro-Fuzzy Model
	1 Introduction
	2 Linguistic Neuro-Fuzzy Classification Model
	3 Result Analysis
	4 Conclusion
	References
Ant Colony Optimization (ACO-Min) Algorithm for Test Suite Minimization
	1 Introduction
	2 Review of Related Work
	3 Proposed Test Suite Minimization Technique
	4 Experimental Results
		4.1 Experimental Subjects
		4.2 Comparison Criteria
	5 Conclusion
	References
Peer Analysis of “Sanguj” with Other Sanskrit Morphological Analyzers
	1 Introduction
	2 Related Works
	3 Study of Morphological Analyzers
	4 Results
	5 Conclusion
	References
Color Image Encryption Technique Using 4D Logistic Map
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 4D Logistic Map
	4 Result Analysis
	5 Conclusion
	References
Deep Learning Models for Analysis  of Traffic and Crowd Management  from Surveillance Videos
	1 Introduction
	2 Literature Survey
	3 System Architecture
	4 Working
		4.1 Dataset
		4.2 Single Shot MultiBox Detector
		4.3 Optical Character Recognition
	5 Use Cases
		5.1 Traffic Management
		5.2 Traffic Violation Management
		5.3 Crowd Management
	6 Performance Evaluation
	7 Conclusion and Future Work
	References
An Innovative Image-Based Tabular Data Extraction Parallel Algorithm
	1 Introduction
	2 Goals
	3 Methodology
		3.1 Table Location Identification
		3.2 Cell Analysis and Character Recognition
		3.3 Table Generation
	4 Results
	5 Conclusion
	References
Brain Tumor Segmentation from MRI Images Using Deep Learning Framework
	1 Introduction
	2 Related Works
	3 Proposed Framework
	4 Results
	5 Conclusion
	References
Satellite Image Enhancement Using Hybrid Denoising Method for Fusion Application
	1 Introduction
	2 Related Works
	3 Proposed Method
		3.1 Hybrid Filtering Based Denoising
		3.2 DWT-Based Fusion
	4 Results and Discussion
	5 Conclusion
	References
Classification of Amino Acid Using Micro-electrical Model
	1 Introduction
	2 Micro-electrical Modeling of Amino Acid
	3 Results and Discussions
		3.1 Magnitude Response
		3.2 Phase Response
	4 Conclusion
	5 Future Work
	References
Personality Prediction of Social Network Users Using Ensemble and XGBoost
	1 Introduction
	2 Literature Survey
	3 System Architecture
	4 Experimentation and Results
		4.1 Dataset Collection
		4.2 Preprocessing
		4.3 Experimental Results
	5 Conclusion and Future Scope
	References
Optimizing Performance of Text Searching Using CPU and GPUs
	1 Introduction
	2 Literature Survey
		2.1 Improvements to String Matching in GPU Using CUDA
		2.2 Heterogeneous Architecture
		2.3 Cuda Programming Structure
	3 BMH and KMP Algorithms
	4 Result and Discussion
	5 Conclusion
	References
Automatic Parking Service Through VANET: A Convenience Application
	1 Introduction
	2 Motivation
	3 Literature Survey
	4 Proposed Model
		4.1 Determination of Available Parking Slot
		4.2 Automatic Parking Fee Collection
	5 Simulation Setup and Simulation Result
	6 Conclusion and Future Scope
	References
Fault Diagnosis in Wireless Sensor Network Using Self/Non-self Discrimination Principle
	1 Introduction
	2 Literature Survey
	3 Self/Non-self discrimination Principle
	4 Proposed Work
	5 Results and Discussions
	6 Conclusion
	References
Efficient Data Structure for the Top-k Variation of Sports Auction
	1 Introduction
	2 Directed Acyclic Graph Mi (i in[1 …n])
	3 Directed Acyclic Graph Mg
	4 Solution Methodology
		4.1 Implicit Generation of Portions of Mi (i in[1 …n])   and Mg
		4.2 Proof of Correctness of Algortihm 1
		4.3 Computational Complexity
	5 Conclusions and Future Research
	References
A Deep Convolutional Neural Network Approach to Rice Grain Purity Analysis
	1 Introduction
	2 Materials and Methods
		2.1 Data Collection
		2.2 Preprocessing
		2.3 Morphological Feature Extraction
		2.4 Convolutional Neural Network Architecture
	3 Results and Discussion
	4 Conclusion
	References
Design a Microstrip Patch Antenna for Multi-Service Purposes
	1 Introduction
	2 Antenna Performance
		2.1 E-Shaped Patch Antenna
	3 Simulation Result
		3.1 U-Shaped Patch Antenna
		3.2 Simulation and Result of Return Loss of U-Shaped Patch Antenna
		3.3 Octagonal and Rectangular Patch Antenna
		3.4 Simulation and Results of Return Loss of U-Shaped Microstrip Patch Antenna
	4 Analysis and Comparison
	5 Conclusion
	References
TwoFold Frisky Algorithm (TFFA):  A Fast Frequent Itemset Algorithm
	1 Introduction
	2 Literature Review
	3 Frequent Itemsets Mining Algorithm
		3.1 Basic Concepts
		3.2 Apriori\'s Weakness
		3.3 Horizontal and Vertical Databases
	4 TFF Algorithm Description
		4.1 TFF Algorithm
		4.2 TFF Example
		4.3 Example Process
	5 Experimental Results and Analysis
	6 Conclusion
	References
An Algorithm Based on Next Shortest Path in Large EON Under Dynamic Traffic Grooming
	1 Introduction
	2 Related Works
	3 Problem Formulation
		3.1 Next Elastic Lightpath (NEL)
		3.2 Problem Definition
	4 Algorithm MNSEL
	5 Experimental Results
		5.1 Environment and Assumptions for Simulation
		5.2 Simulated Numerical Results Based Algorithmic Efficiency Analysis
	6 Conclusion
	References
A Distance-Based Adaptive Traffic Grooming Algorithm in Large EON Under Dynamic Traffic Model
	1 Introduction
	2 Related Works
	3 Problem Formulation
		3.1 Problem Definition
	4 Threshold Path Length
	5 Algorithm DASEL
	6 Experimental Results
		6.1 Environment and Assumptions for Simulation
		6.2 Simulated Numerical Results Based Algorithmic Efficiency Analysis
	7 Conclusion
	References
Particle Swarm Optimization of Multi-responses in Hard Turning of D2 Steel
	1 Introduction
	2 Literature Review
	3 Experimental Scheme and Parameters
	4 Results and Discussion
		4.1 Analysis of Surface Roughness
		4.2 Analysis of MRR
	5 Analysis Using Particle Swarm Optimization (PSO) Algorithm
	6 Conclusion
	References
Design and Performance Analysis of Wavelength Converter Using SOA for Optical WDM Network
	1 Introduction
	2 Wavelength Conversion Using Four-Wave Mixing
	3 Result and Discussion
	4 Conclusions
	References
Comparative Study Between Star and Mesh Topology for the Application in All-Optical WDM Network
	1 Introduction
	2 Mathematical Analysis
		2.1 Star Network
		2.2 Mesh Network
	3 Result and Discussions
	4 Conclusion
	References
Predicting Impact of Odia Newspaper Articles on Public Opinion
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Performance Evaluation Measure
	4 Results Analysis
	5 Conclusion
	References
An Approach to Extract Low-Grade Tumor from Brain MRI Slice Using Soft-Computing Scheme
	1 Introduction
	2 Methodology
		2.1 Otsu’s Function
		2.2 Brain Storm Optimization Algorithm
		2.3 Watershed Segmentation
		2.4 Image Quality Parameters and Validation
	3 Result and Discussion
	4 Conclusion
	References
Development of a Semiautomated Evaluation Procedure for Dermoscopy Pictures with Hair Segment
	1 Introduction
	2 Methodology
		2.1 Skin Cancer Database
		2.2 Multi-thresholding
		2.3 Segmentation
		2.4 Performance Evaluation and Validation
	3 Results and Discussion
	4 Conclusion
	References
Partial Offloading for Fog Computing Using P2P Based File-Sharing Protocol
	1 Introduction
	2 Related Works
	3 Proposed Works
		3.1 System Architecture
		3.2 Simple Offloading Model
		3.3 Partial Offloading Model
	4 Implementation and Results
	5 Conclusions
	References
Assessment of Fundus Images for Retinal Abnormality Screening—A Study
	1 Introduction
	2 Methodology
		2.1 Rim-One Database
		2.2 Multi-thresholding
		2.3 DRLS Segmentation
		2.4 Assessment
	3 Results and Discussion
	4 Conclusion
	References
Generating Context-Free Group-Level Emotion Landscapes Using Image Processing and Shallow Convolutional Neural Networks
	1 Introduction
	2 Methodology Adopted
		2.1 Problem Statements
		2.2 Workflow
	3 Implementation
		3.1 Datasets
		3.2 Workstation Configuration
		3.3 Face Detection from Image
		3.4 Targetted ROI for Feature Extraction
		3.5 Shallow CNNs for Identifying Emotions Expressed by Detected Faces
	4 Results
	5 Emotional Landscape for Group-Level Emotion Evolution
	6 Conclusions
	References
A Deep Learning Approach to Image-Based Malware Analysis
	1 Introduction
	2 Related Works
	3 Proposed Methodology
		3.1 Machine Learning Library
		3.2 The Dataset
		3.3 Dataset Preprocessing
		3.4 CNN Concepts
		3.5 CNN Architecture
		3.6 Support Vector Machine
		3.7 Softmax
		3.8 Multiclass SVMs
		3.9 Proposed CNN Model
	4 Results and Discussion
	5 Conclusion and Future Work
	References
Chlorophyll Prediction Using Ensemble Deep Learning Technique
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Design Consideration for Model
		3.2 Long Short-Term Memory (LSTM)
		3.3 Proposed Model (Moving Window LSTM)
		3.4 Study Area and Experimental Dataset
		3.5 Experiment Setup
	4 Result and Discussion
	5 Conclusion
	References
Enabling Affordance-Guided Grasp Synthesis for Robotic Manipulation
	1 Introduction
	2 Affordance Detection
	3 Grasp Detection
		3.1 Affordance-Guided Grasping
		3.2 Pose Estimation
	4 Conclusion
	References
Towards Natural Language Understanding of Procedural Text Using Recipes
	1 Introduction
	2 Text-Based Food Computing Tasks
		2.1 Information Extraction
		2.2 Representation
		2.3 Recommendation and Retrieval
		2.4 Primarily Image-Based Tasks: Recognition, Perception, Prediction, and Monitoring
	3 Conclusion
	References
Performance and Memory-Efficient Parallel Computing Framework for RSMT Construction
	1 Introduction
	2 Literature Survey
	3 High-Performance Computing Environment for VLSI Routing
	4 Experimental Result and Analysis
	5 Conclusion
	References
An Efficient Parallel Computing Framework for Over the Obstacle VLSI Routing
	1 Introduction
	2 Parallel Computing Environment Model for Establishing Delay Optimized Over the Obstacle Rectilinear Steiner Minimum Tree
	3 Experimetal Result and Analysis
	4 Conclusion
	References
Classification of Internet Traffic Data Using Ensemble Method
	1 Introduction
	2 Proposed Methodology
		2.1 Preprocessing
		2.2 Feature Selection—Extra Trees (Extremely Randomized Trees) Algorithm
		2.3 SVM Ensemble Method
	3 Experimental Setup and Results
		3.1 Dataset
		3.2 Results and Discussion
	4 Conclusion
	References
Toward Ameliorating K-Means Clustering Algorithm
	1 Introduction
	2 The Clustering Problem
	3 K-Means Clustering
		3.1 Pseudocode of the K-Means Algorithm
		3.2 K-Means Algorithm Without Realignment
		3.3 K-Means Algorithm with Realignment
	4 Results and Discussions
	5 Conclusions
	References
Virtual Reality-Based Driving Simulator for Testing Innovative Hybrid Automotive Powertrains
	1 Introduction
	2 Materials and Methods
		2.1 Design of the Driving Simulator
		2.2 Driving Scenarios
		2.3 Powertrain Test bed
	3 Control Methodology
		3.1 Switching Mechanism
	4 Results
		4.1 Mileage
		4.2 System Efficiency
		4.3 Video
	5 Conclusion
	References
Distance-Based Clustering Protocol (DBCP) in Wireless Sensor Network
	1 Introduction
	2 Related Work
	3 The SEP Protocol
	4 The Proposed Methodology
		4.1 Architecture of Proposed DBCP System
	5 Implementation
	6 Conclusion and Future Scope
	References
Feeder Transit Service Efficiencies with Vehicle-to-Passenger (V2P) Communication
	1 Introduction
	2 Methodology
		2.1 Lower Bound Solution
	3 Simulation Experiments and Results
	4 Results
	5 Conclusions
	References
An NLP-Based Cryptosystem to Control Spread of Fake News Through Social-Media
	1 Introduction
	2 Review of Existing Literature
	3 Proposed Method
	4 Results
	5 Discussion
		5.1 Implications
	6 Conclusion and Future Directions
	References
Analysis of Proactive Simulated Topology Reconfiguration for WDM Networks
	1 Introduction
	2 Literature Survey
	3 Proposed Work
	4 Experimental Analysis
	5 Conclusion
	References
Arabic Text Extraction by Convolutional Neural Network Through Robust Dataset Design
	1 Introduction
		1.1 Importance of Text Extraction
		1.2 Characteristics of Arabic Language
	2 Existing Research in English and Arabic Text Extraction
	3 Proposed Methodology
		3.1 Architecture of Proposed Model
		3.2 Image Preprocessing
		3.3 Dataset Preparation
	4 Classification Through Convolutional Neural Networks
	5 Conclusion
	References
Cryptanalysis of A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm: A Chosen Ciphertext Attack
	1 Introduction
	2 The Target Algorithm
	3 The Cryptanalytic Attack
	4 Strengthening the Target Algorithm
	5 Conclusion
	References
Counterfeit Product Detection Analysis and Prevention as Well as Prepackage Coverage Assessment Using Machine Learning
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 The Proposed Algorithm Consists of Three Stages
		3.2 Testing of Trained Model
		3.3 Prevention of Counterfeit Product
	4 Result and Discussion
	5 Presentation Scrutiny
	6 Conclusion
	References
Recommender System Using K-Nearest Neighbors and Singular Value Decomposition Algorithms: A Hybrid Approach
	1 Introduction
	2 Related Works
	3 Background
		3.1 Machine Learning
		3.2 Recommendation System
		3.3 Content-Based Filtering
		3.4 Collaborative-Based Filtering
	4 Experimental Setup and Result Analysis
	5 Conclusion
	References
Dynamics in Fractional Calculus: A Computational Approach
	1 Introduction
	2 Definitions and Preliminaries
	3 Main Results
	References
Privacy Preserving in Collaborative Filtering Based Recommender System: A Systematic Literature Review
	1 Introduction
	2 Background
		2.1 Different Phases of Recommender System
		2.2 Recommendation Filtering Techniques
		2.3 Evaluation Metrics for Recommendation Algorithms
		2.4 Privacy for Recommender System
	3 Different Privacy-Preserving Collaborative Filtering Methods
		3.1 Nonnegative Matrix Factorization (NMF) Based Privacy-Preserving Recommendation Method
		3.2 Naive Bayesian Classifier (NBC) Based Privacy-Preserving Recommendation Method
		3.3 Distributed Anonymization Based Privacy-Preserving Recommendation Method
		3.4 Random Perturbation Based Privacy-Preserving Recommendation Method
		3.5 Fuzzy Based Random Perturbation Method for Privacy Preservation in Recommender System
	4 Comparison Study Among Different Privacy-Preserving Collaborative Filtering Methods
	5 Future Work and Conclusion
	References
A Topology Based Address Selection Technique for Network Virtualization Environment
	1 Introduction
	2 Challenges in Address Selection
	3 Proposed Algorithm
		3.1 Iteration of Proposed Algorithm
	4 Correctness of Proposed Algorithm
	5 Conclusion
	References
A Model for Prediction of Paddy Crop Disease Using CNN
	1 Introduction
	2 Related Works
	3 Proposed Model
		3.1 Paddy Crop Disease Modeling
		3.2 Process Flow Model
	4 Implementation
		4.1 Image Generation and Augmentation
		4.2 Convolution Step
		4.3 Pooling Step
		4.4 Fully Connected Layers
		4.5 Disease Prediction
	5 Algorithm of the Model
	6 Result
	7 Conclusion and Future Work
	References
Testbeds, Attacks, and Dataset Generation for Big Data Cluster:  A System Application for Big Data Platform Security Analysis
	1 Introduction
	2 Related Work
	3 Big Data Architecture
	4 Testbed Architecture: With Attack Generation and Dataset Creation
	5 Experimental Setup
		5.1 Hardware, System, and Cluster Software—Configuration
		5.2 Software, Commands, Shell Scripts
	6 Attack Generation and Data Capture
	7 Results and Discussion
	8 Conclusion
	References
Energy-Efficient Optimization-Based Routing Technique for Wireless Sensor Network Using Machine Learning
	1 Introduction
	2 Literature Review
	3 Donkey–Smuggler Algorithm
	4 Proposed Work
		4.1 Cluster Head Degree
		4.2 An Optimized Hybrid DAS C-means Clustering Algorithm
		4.3 Proposed Routing Algorithm
	5 Results
	6 Conclusion
	References
Energy-Efficient Resource Scheduling in Fog Computing Using SDN Framework
	1 Introduction
	2 Related Work
	3 Energy-Saving Fog Node Scheduling Algorithm
	4 Experiment and Result Analysis
	5 Conclusion
	References
Industrial Automation: Case Study—Vision Based Live Object Monitoring System
	1 Introduction
	2 Related Work
	3 Proposed Framework
		3.1 Image Acquisition and Pre-processing
		3.2 Segmentation
		3.3 Feature Extraction and Analysis
	4 Experiments and Results
		4.1 Image Acquisition and Pre-processing
		4.2 Segmentation
		4.3 Feature Extraction and Analysis
	5 Conclusion
	References
Performance Enhancement of Distribution Network by Optimal Placement of Multiple Capacitors Using FKBC
	1 Introduction
	2 Methodology
	3 Results and Discussions
	4 Conclusion
	References
Control of Home Appliances and Projector by Smart Application Using SEAP Protocol
	1 Introduction
	2 Related Work
	3 System Design
		3.1 Liquid Crystal Display
		3.2 SEAP Protocol
		3.3 MIT App Inventor2
	4 Results and Discussion
	5 Conclusion
	References
A Study on Securing Non-financial Data Using Blockchain Mechanism
	1 Introduction
	2 Blockchain Technology
		2.1 Evolution of Blockchain
		2.2 Blockchain Consensus Mechanism
	3 Work Objective
	4 Tools and Technologies Used
		4.1 Platforms
		4.2 Software Components
	5 Establishing of Connection
	6 Securing of Nonfinancial Data
	7 Conclusion
	References
Appraisal of Breast Ultrasound Image Using Shannon’s Thresholding and Level-Set Segmentation
	1 Introduction
	2 Former Study
	3 Methodology
		3.1 Database
		3.2 Thresholding
		3.3 Segmentation
		3.4 Computation of Performance Measures
	4 Result and Discussion
	5 Conclusion
	References
Optimal Scheduling of Household Appliances Using GOA for Electricity Cost Saving with Solar PV
	1 Introduction
	2 System Model
		2.1 Energy Consumption Modes of Home Appliances
		2.2 Modeling of PV
	3 Problem Formulation
		3.1 Objective Function
		3.2 System Operational Constraints
	4 Grasshopper Optimization Algorithm (GOA)
	5 Result and Analysis
	6 Conclusion
	References
A Systematic Approach to Enhance the Forecasting of Bankruptcy Data
	1 Introduction
	2 Proposed Model and Workflow
	3 Dataset Selection
	4 Simulation Result and Analysis
	5 Conclusion and Future Directions
	References
Leveraging Blockchain as a Solution  for Security Issues and Challenges  of Paperless E-Governance Application
	1 Introduction
		1.1 Problem with Traditional System
	2 Review of Related Literature
	3 Proposed Framework for Enhanced Blockchain-Based Security for DigiLocker App
	4 Benefits of Proposed Architecture
	5 Conclusion
	References
Maize Leaf Disease Detection and Classification Using Machine Learning Algorithms
	1 Introduction
	2 Related Work
	3 Machine Learning Algorithms for Classification
		3.1 Naive Bayes (NB)
		3.2 The K-Nearest Neighbors (KNN)
		3.3 Decision Tree (DT)
		3.4 Support Vector Machine (SVM)
		3.5 Random Forest (RF)
	4 Proposed Technique for Disease Classification
		4.1 Image Acquisition
		4.2 Image Preprocessing
		4.3 Image Segmentation
		4.4 Feature Extraction
	5 Experimental Result Analysis
	6 Conclusion
	References




نظرات کاربران