دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Kingsley A. Ogudo, Sanjoy Kumar Saha, Debnath Bhattacharyya سری: Lecture Notes in Networks and Systems, 558 ISBN (شابک) : 9811968799, 9789811968792 ناشر: Springer سال نشر: 2023 تعداد صفحات: 316 [317] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 10 Mb
در صورت تبدیل فایل کتاب Smart Technologies in Data Science and Communication: Proceedings of SMART-DSC 2022 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب فناوری های هوشمند در علم داده و ارتباطات: مجموعه مقالات SMART-DSC 2022 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب دارای مقالات تحقیقاتی با کیفیت بالا و بررسی شده است که در پنجمین کنفرانس بینالمللی فناوریهای هوشمند در علم داده و ارتباطات (SMARTDSC 2022)، که بنیاد آموزشی Koneru Lakshmaiah، Guntur، آندرا پرادش، هند برگزار شد، ارائه شده است. در تاریخ 16 تا 17 ژوئن 2022. شامل مشارکت های نوآورانه و جدید در زمینه های تجزیه و تحلیل داده ها، ارتباطات و محاسبات نرم است.
This book features high-quality, peer-reviewed research papers presented at the Fifth International Conference on Smart Technologies in Data Science and Communication (SMARTDSC 2022), held Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India, on 16 – 17 June 2022. It includes innovative and novel contributions in the areas of data analytics, communication and soft computing.
Conference Committee Members Preface Acknowledgements Contents Editors and Contributors A Graph-Based Model for Discovering Host-Based Hook Attacks 1 Introduction 2 Related Works 3 Proposed Graph-Based Model 3.1 Preliminary Processing Stage 3.2 Malware Detection Stage 4 Experimental Results and Discussion 4.1 Discussion 4.2 Limitations 5 Conclusions References E-Health Care Patient Information Retrieval and Monitoring System Using SVM 1 Introduction 2 Related Works 3 Proposed Model in IoT 3.1 Microcontroller 3.2 Sensors 3.3 Blood Pressure Sensor 3.4 Temperature Sensor 3.5 Three Axis Accelerometer Sensors. 3.6 Display Device 3.7 Alarm System 3.8 SVM Algorithm 3.9 Cloud Server 4 Proposed Work 5 Results and Discussion 5.1 Diagnosing Patient in Intensive Care Unit 5.2 Sending Notification Through Cloud 5.3 Support Vector Machine 6 Conclusion References Number Plate Recognition Using Optical Character Recognition (OCA) and Connected Component Analysis (CCA) 1 Introduction 1.1 The Purpose of This Paper 2 Detection of License Plates 2.1 Binarization of Images 2.2 Detecting the Edges 2.3 Connected Component Analysis (CCA) 2.4 Mathematical Morphology 2.5 Related Work in the Number Plate Detection 3 Character Segmentation 4 Character Recognition 5 Conclusion Bibliography Cartoonify an Image with OpenCV Using Python 1 Introduction 2 Objectives 2.1 Filter by Median 2.2 Filter Laplacian 2.3 Filter by Median 3 Implementation 3.1 Step by Step Implementation 3.2 Statement of the Problem 3.3 Advanced Technical Approach 4 Proposed System 4.1 Challenges and Problem 5 Conclusion References Web Design as an Important Factor in the Success of a Website 1 Introduction 2 Affective Factors for a Successful Website of e-commerce 3 Importance of Webdesign in e-commerce 4 Usability 5 A Case Study of Totally Blind Persons Interacting on the Internet 6 Conclusion References Earlier Selection of Routes for Data Transfer In Both Wired and Wireless Networks 1 Introduction 2 Related and Proposed Work 3 Modules Description 3.1 Path Reservation 3.2 Minimum Bandwidth Allocation 3.3 Time Management 3.4 Admission Control 4 Test Cases 5 Conclusion 6 Future Enhancement References Identifying River Drainage Characteristics by Deep Neural Network 1 Introduction 2 Related Work 2.1 Identifying Various Size and Shape of River Drainage 2.2 Generate River Drainage Image by Spatial, Spectral, Angular, and Temporal Model 3 Result 4 Discussion 5 Conclusion References A Review on Optimal Deep Learning Based Prediction Model for Multi Disease Prediction 1 Introduction 2 Literature Review 3 Review on Traditional Multi-disease Prediction Models 4 Methodology 5 Conclusion References A Hybrid Multi-user Based Data Replication and Access Control Mechanism for Cloud Data Security 1 Introduction 2 Related Works 3 Proposed Model 4 Experimental Results 5 Conclusion References Leveraging the Goldfinger Attack in Blockchain Based on the Topological Properties 1 Introduction 2 Study Review 3 Contribution of the Study 4 Methodology and Design 4.1 Peer-To-Peer Network Connectivity 5 Implementation 5.1 General Network Before the Goldfinger Attack 5.2 Results of General Network Before the Goldfinger Attack 5.3 Implementation of the Goldfinger Attack 6 Results 7 Discussion and Analysis 8 Conclusion References Bitcoin Transaction Computational Efficiency and Network Node Power Consumption Prediction Using an Artificial Neural Network 1 Introduction 2 Study Review 3 Contribution of the Study 3.1 Methodology 4 Results and Discussion 5 Conclusion and Future Work References Remote Breast Cancer Patient Monitoring System: An Extensive Review 1 Introduction 2 Related Work on Breast Cancer 2.1 Existing Approaches to Detect Breast Cancer: 2.2 Popular Datasets Available for Research 2.3 Deep Learning Techniques for Early Diagnosis of Breast Cancer 3 Challenges and Issues in Remote Monitoring System 4 Case Study: A Remote Breast Cancer Patient Monitoring System 5 Result and Analysis of Existing Techniques 6 Conclusion References Simplifying the Code Editor Using MEAN Stack Technologies 1 Introduction 1.1 Why MEAN? 2 Related and Proposed Work 2.1 Existing Systems 2.2 Proposed System 3 Results and Sample OUTPUT Screens 4 Conclusion References Prediction and Identification of Diseases to the Crops Using Machine Learning 1 Introduction 2 Literature Review 3 Motivation 4 Proposed System 5 Flowchart 6 Algorithms, Dataset Used, and Accuracy Comparison 7 Conclusion References Pulse-Based Smart Electricity Meter Using Raspberry Pi and MEFN 1 Introduction 2 Literature 3 Proposed Methodology 4 System Design 5 Conclusion References Brain Tumor Segmentation Using U-Net 1 Introduction 1.1 Brain Tumor Modalities 2 Literature Review 3 Materials and Methods 3.1 U-Net Architecture 3.2 Fully Convolutional Network 4 Results and Discussions 5 Conclusion References An Empirical Study of CNN-Deep Learning Models for Detection of Covid-19 Using Chest X-Ray Images 1 Introduction 2 Materials and Methods 2.1 Dataset 2.2 Model Formulation 3 Experimental Results 3.1 Evaluation Matrices 3.2 Comparison of Various CNN-DL Models 3.3 Comparison of Various CNN-DL Models 4 Conclusion References Detection of Eye Blink Using SVM Classifier 1 Introduction 2 Related Works 3 Materials and Methods 3.1 Face Detection 3.2 Eye Pair Detection 3.3 Classification Using SVM Model 4 Results and Discussions 5 Conclusion References A Novel Approach for Health Analysis Using Machine Learning Approaches 1 Introduction 2 Related Works 3 Materials and Methods 3.1 Decision Tree 3.2 Naïve Bayesian 3.3 Random Forest 3.4 K-Nearest Neighbor (KNN) 4 Results and Discussions 5 Conclusion and Future Scope References Classification of Healthy and Diseased Lungs by Pneumonia Using X-Rays and Gene Sequencing With Deep Learning Approaches 1 Introduction 2 Literature Survey 3 Materials and Methods 3.1 Convolutional Neural Network (CNN) 3.2 Inception V3 Model 4 Proposed Model 5 Results and Discussions 6 Proof of Concept 6.1 POC Architecture 6.2 POC Design 6.3 Result 7 Conclusion and Future Work References Breast Cancer Classification Using Improved Fuzzy C-Means Algorithm 1 Introduction 2 Proposed Work 2.1 Pre-processing 2.2 Labels and Other Artifacts Removal from the Background 2.3 Removing of Pectoral Muscle 2.4 Enhancement of Image 2.5 Measurement of PSNR Value and MSE Value 3 Optimization Segmentation 3.1 Optimization Using Independent Search Krill Herd Technique 4 Results and Discussions 5 Conclusion and Future Work References Repercussions of Incorporating Filters in CNN Model to Boost the Diagnostic Ability of SARS-CoV-2 Virus Using Chest Computed Tomography Scans 1 Introduction 2 Related Work 3 Proposed Work 3.1 Algorithm 4 Results and Analysis 4.1 Dataset Execution 4.2 Graphical Representation of Accuracy and Loss Attained 4.3 Comparing the Model with Latest Methods 4.4 Graphical Representation of Comparing the Model with Related Methods 5 Conclusion References Software Development Estimation Cost Using ANN 1 Introduction 2 Estimation Model Performance 3 Artificial Neural Network Models 4 Network Performance Evaluation 4.1 Performance Measurement 4.2 Simulated Development Data 5 Conclusion Bibliography A Generic Flow of Cyber-Physical systems—A Comprehensive Survey 1 Introduction 2 CPS Evolution 3 Applications 4 CPS Models 5 Security Models 6 CPS Properties 7 Challenges in CPS 8 Model-Driven Conceptual Approaches 9 Conclusion References Mental Disorder Detection in Social Networks Using SVM Classification: An Improvised Approach 1 Introduction 2 Literature Survey 3 Existing System 4 Proposed System 5 Methodology 5.1 OSN Framework Construction 5.2 Data Collection 5.3 Pre-Processing 5.4 Feature Extraction 6 Conclusion 7 Future Work References An Enhanced K-Means Clustering Algorithm to Improve the Accuracy of Clustering Using Centroid Identification Based on Compactness Factor 1 Introduction 2 Related Works 3 Centroid Recognition Based on Compactness 3.1 The Improved k-means Clustering Algorithm Using Regional Centroid Component (RCC) 4 Results and Discussion 5 Conclusion References Prediction of Chronic Kidney Disease with Various Machine Learning Techniques: A Comparative Study 1 Introduction 2 Literature Review 3 Materials and Method 4 Results and Discussion 5 Conclusion References Blockchain and Its Idiosyncratic Effects on Energy Consumption and Conservation 1 Introduction 1.1 Applications 2 Literature Review 2.1 Study and Review of the Factors/activities Involved in the Energy Industry 3 Proposed System: Application to Enable Energy Trading [Ethereum Code] 4 Conclusion References Smart Hydroponics System for Soilless Farming Based on Internet of Things 1 Introduction 2 Background Study 2.1 Origin and History of Hydroponics 2.2 What is Hydroponics 3 Technical Specification 3.1 Methodology 3.2 Hydroponic System and Essential Components 4 Project Implementation and Results 4.1 Hardware Setup 4.2 ThingSpeak Dashboard 4.3 Mint Cultivation 5 Conclusion and Future Work References Solution Approach for Detection of Stock Price Manipulation by Market Operators 1 Introduction 1.1 Strategies to Influence Investors 1.2 How Does Manipulation Work? 2 Literature Survey 3 Proposed Methodology 3.1 Detailed Discussion 3.2 Proposed Implementation Methods 4 Summary and Conclusion 5 Future Work and Limitations Bibliography Cancer Cell Detection and Classification from Digital Whole Slide Image 1 Introduction 2 Contributions 3 Related Works 4 Dataset and Computing Machine Details 5 Implementation Details 6 Experimental Results 7 Results Overview 8 Conclusion References Author Index