ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Smart Trends in Computing and Communications: Proceedings of SmartCom 2021

دانلود کتاب روندهای هوشمند در محاسبات و ارتباطات: مجموعه مقالات SmartCom 2021

Smart Trends in Computing and Communications: Proceedings of SmartCom 2021

مشخصات کتاب

Smart Trends in Computing and Communications: Proceedings of SmartCom 2021

ویرایش: 1 
نویسندگان: , , ,   
سری: Lecture Notes in Networks and Systems 
ISBN (شابک) : 9811640157, 9789811640155 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 751 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 23 مگابایت 

قیمت کتاب (تومان) : 33,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Smart Trends in Computing and Communications: Proceedings of SmartCom 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب روندهای هوشمند در محاسبات و ارتباطات: مجموعه مقالات SmartCom 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب روندهای هوشمند در محاسبات و ارتباطات: مجموعه مقالات SmartCom 2021

این کتاب مقالات با کیفیت بالا ارائه شده در پنجمین کنفرانس بین‌المللی گرایش‌های هوشمند در محاسبات و ارتباطات (SmartCom 2021)، که توسط بنیاد تحقیقات دانش جهانی (GR Foundation) از 2 تا 3 مارس 2021 برگزار شده است را گردآوری می‌کند. این کتاب وضعیت هنر را پوشش می‌دهد. و موضوعات در حال ظهور در اطلاعات، ارتباطات کامپیوتری، و استراتژی های موثر برای استفاده از آنها در مهندسی و برنامه های مدیریتی. همچنین آخرین پیشرفت‌های فن‌آوری و مسیرهای آینده برای محاسبات اطلاعات و دانش و کاربردهای آن را بررسی و بحث می‌کند.


توضیحاتی درمورد کتاب به خارجی

This book gathers high-quality papers presented at the Fifth International Conference on Smart Trends in Computing and Communications (SmartCom 2021), organized by Global Knowledge Research Foundation (GR Foundation) from March 2 – 3 , 2021. It covers the state of the art and emerging topics in information, computer communications, and effective strategies for their use in engineering and managerial applications. It also explores and discusses the latest technological advances in, and future directions for, information and knowledge computing and its applications.



فهرست مطالب

Preface
Contents
Editors and Contributors
Influencing User Intention of Plant-Based Sensing System Adoption in Public Vocational High Schools of Indonesia Using TAM
	1 Introduction
	2 Literature Review
		2.1 The Plant-Based Sensing System Proposed
		2.2 The Theory of Technology Acceptance Model
	3 Methodology
	4 Research Model and Hypothesis
		4.1 External Variable of Model
		4.2 Perceived Ease of Use, Perceived Usefulness, Attitude, and Behavioral Intention
	5 Results
		5.1 Reliability Analysis
		5.2 Regression Analysis
	6 Conclusion
	References
An Empirical Study of Critical Success Factors for the Adoption of m-Government Services in Tanzania
	1 Introduction
	2 Literature Review and Hypothesis Development
		2.1 m-Government Services in Tanzania
		2.2 Mobile Services Acceptance Model (MSAM)
		2.3 Hypotheses Development
	3 Methodology
	4 Findings
	5 Discussion
	6 Conclusion
	References
Smart City Based on LoRaWAN: Coverage Study for Cusco Urban Area
	1 Introduction
	2 LoRaWAN Technology
	3 Cusco Urban Area Coverage Simulation
	4 Data Collection
	5 Analysis of Experimental Measurements
		5.1 Efficiency Analysis for SF12
		5.2 RSSI Analysis for SF12
		5.3 Efficiency and RSSI Analysis for SF7
	6 Conclusion
	References
Digital Transformation in Education in Knowledge Society
	1 Introduction
		1.1 Basic Considerations
	2 Materials and Methods
	3 Results
	4 Conclusion
	References
Induction Motor Overload Recognition Based on Sound Analysis
	1 Introduction
	2 Related Works
	3 The Corpus
	4 The Experiments
		4.1 Frame-by-Frame Classification
		4.2 One-Second Segment Classification
		4.3 Half-a-Second Segment Classification
		4.4 The Selected Classifier
	5 Conclusions
	References
Simulation of an All-Terrain Vehicle Driving Experience Using Virtual Reality
	1 Introduction
	2 Materials and Methods
		2.1 Conception of the Virtual Experience
		2.2 Learning Programming Tools
		2.3 Virtual Environment Validation
		2.4 Conception of the Immersive Environment
	3 Results
	4 Discussion
	5 Conclusions and Recommendations
	References
Safety-Centric and Smart Outdoor Workplace: A New Research Direction and Its Technical Challenges
	1 Introduction
	2 The Need of Dedicated Focus on Smart Outdoor Workplace
		2.1 Smart Workplace
		2.2 Smart Outdoor Workplace
		2.3 Divergent Technology Streams
	3 Technical Challenges
		3.1 Diverse and Incompatible Sensors and Devices
		3.2 Growing Gap Between Battery Technologies and Power Requirements
	4 Research Prospects Driven by the Identified Challenges
		4.1 Sandwich Approach to a Knowledge Architecture for Smart Outdoor Workplace
		4.2 Model-Driven Simulation and Optimization of Energy Consumption in Smart Outdoor Workplace
	5 Conclusions and Future Work
	References
Devising Auxiliary Glyph Schemas Combined with XOR Filters for Improvised Font Delivery and Reliable Dynamic Font Augmentation
	1 Introduction
	2 Background and Related Work
	3 Methodology and Algorithm
		3.1 Basic Font Subsetting Solution and Problems
		3.2 Client Side: Proposed Data Structures
		3.3 Font Subsetting and Augmentation Workflows Using Proposed Solution
		3.4 Flow for an Application Session with the Proposed Solution
		3.5 XOR Filter Processing for Subset or Font Portion Serving on Server Side
	4 Conclusion
	References
Multiple Sequence Alignment Algorithms in Bioinformatics
	1 Introduction
	2 Multiple Sequence Alignment (MSA)
	3 Multiple Sequence Alignment Algorithms (MSA)
		3.1 ClustalW
		3.2 Clustal Omega
		3.3 T—Coffee
		3.4 MAFFT
		3.5 Kalign
		3.6 MUSCLE
		3.7 Probcons
		3.8 Genetic Algorithms
	4 Evaluation of MSA
	5 Conclusion
	References
Design and Implementation of a Machine Learning-Based Technique to Detect Unipolar and Bipolar Depression Using Motor Activity Data
	1 Introduction
	2 Related Work
	3 Methodology
	4 Results
	5 Discussion
	6 Conclusion
	References
Underwater Magnetic Release System
	1 Overview
	2 System Components
		2.1 The Software
	3 Power Considerations
	4 Design Specifics
	5 Conclusion
	References
An Optimal Route for People with Ambulant Disabilities Using Mathematical Risk Modeling and Analytic Hierarchy Process
	1 Introduction
	2 Methods
		2.1 Factors Affecting the Selection of Best Route
		2.2 Mathematical Risk Modeling
		2.3 AHP Technique
	3 Results and Discussion
	4 Conclusion
	References
The Innovation in Manufacturing Areas of Electronics Industry of Mexicali Using PLC
	1 Introduction
	2 Technological Innovation
	3 Technology Development
	4 Improving Competitiveness
	5 Software Quality in the Electronics Industry
	6 Limitations of the Investigation
	7 Methodology
	8 Results
	9 PLC Analysis
	10 Correlation Analysis of Industrial Parameters
	11 Conclusions
	References
Assistive Autonomous Electric Vehicle for Disaster Management
	1 Introduction
	2 Mechanical System Design
		2.1 Overview
		2.2 Frame Design
		2.3 Assembly for the Wheels
		2.4 Sensors Stand
		2.5 Body Housing
	3 Electronics System Design
		3.1 Brief Overview
		3.2 Electronic Suite Description
	4 Working of the Circuit
	5 Software and Control System
		5.1 Brief Overview
		5.2 Main Software Pipeline
		5.3 Lane Detection and Path Mapping
		5.4 Object Discovery Pipeline
		5.5 Arduino Communication
		5.6 Motor Driving
	6 Advantage and Applications
		6.1 Advantages
		6.2 Applications
	7 Conclusion
	References
On the Existing and New Potential Methods for Partial Discharge Source Monitoring in Electrical Power Grids
	1 Introduction
	2 Theoretical Aspects
		2.1 Spectrogram
		2.2 Wavelet Transform
		2.3 Compressive Sensing
		2.4 Phase-Diagram-Based Analysis
	3 Experimental Configuration and Results
	4 Conclusions
	References
Efficient Approach for Block-Based Copy-Move Forgery Detection
	1 Introduction
	2 Related Works
	3 Proposed Method
	4 Experimental Results
	5 Discussion and Conclusion
	References
Smart IoT Sensor Network for Monitoring of Cultural Heritage Monuments
	1 Introduction
	2 Sensor Design
	3 Visualization Platform
	4 Conclusions
	References
MorArch: A Software Architecture for Interoperability to Improve the Communication in the Edge Layer of a Smart IoT Ecosystem
	1 Introduction
	2 Present Context and Previous Works
		2.1 Interoperability Architectures
		2.2 Interoperability Protocols
	3 Proposal
	4 Experiments
		4.1 File System
		4.2 Data Flow Inside Our Fog Ecosystem
		4.3 Results
	5 Conclusions
	References
A Design of an IoT-Based Smart Home with Auto-sanitization System
	1 Introduction
	2 Literature Review
	3 Methodology and Modeling
	4 Working Procedure
		4.1 Remote Access
		4.2 Voice Command Access
	5 Implementation of the Prototype
		5.1 Software Implementation
		5.2 Hardware Implementation
		5.3 Visual Models of a Smart Home with Auto-sanitization
	6 Future Developments, Scopes, and Social Impact
	7 Results and Data Analysis
	8 Conclusion
	References
An Experiment Study on Federated Learning Testbed
	1 A Novel PPML Framework: Federated Learning
	2 Methodology and System Implementation
	3 Results on Efficiency Test
		3.1 Training Speed
		3.2 Communication Cost
	4 Privacy Analysis
	5 Conclusion
	References
Visual Quality Comparison of Ocean Wave Effects at Different Camera Distances
	1 Introduction
	2 Material and Method
		2.1 Setting in Houdini
		2.2 Setting in Unreal
		2.3 Minor Conclusion
	3 Result
	4 Conclusion
	References
Control System to International Parental Child Abduction, Case: Colombia
	1 Introduction
	2 Background
	3 Design and Method for Colombia
	4 Results
	5 Analysis of the Results
	6 Conclusions and Further Work
	References
It is not Always Ethical: Data Manipulation to Justify Public Policy Choices in COVID-19 Response
	1 Introduction
	2 Background
	3 Cases of COVID-19 Data Manipulation
	4 Florida’s COVID-19 Data Portal
	5 Georgia’s COVID-19 Data Portal
	6 Arizona’s COVID-19 Data Portal
	7 Texas, Virginia, and Vermont’s COVID-19 Data Portals
	8 Implications of Data Manipulation
	9 Conclusion
	References
BPMN2EVENTB Supporting Transformation from BPMN2.0 to Event B Using Kermeta
	1 Introduction
	2 The Proposed Approach
	3 Subset of Mapping Rules BPMN-Event B
	4 Illustration
	5 Conclusion and Future Work
	References
Teaching Neuroscience Through Flipped Classroom: Systematizing an Experience with Students of the Professional Career of Elementary Education
	1 Introduction
		1.1 Contributions of Neuroscience to Education
		1.2 Teaching Neuroscience Through Digital Resources
	2 Methodology
		2.1 Procedures
		2.2 Participants
		2.3 Measures
	3 Results
		3.1 Analysis of Means and Variation Coefficients
		3.2 Exploratory Analysis with Boxplots
		3.3 Analysis of Some Items
	4 Discussion
	5 Conclusions and Future Works
	References
Low-Cost IoT Platform for Telemedicine Applications
	1 Introduction
	2 Related Works
	3 Case of Study
	4 Implementation of the Proposal
		4.1 Wearable Device
		4.2 Android TV App
		4.3 Cloud Service
	5 Discussion of Results
	6 Conclusions and Future Works
	References
Statistical Analysis-Based Intrusion Detection for Software Defined Network
	1 Introduction
	2 Software Defined Network and Open Flow
	3 Selection of Flow Match Fields and Attributes
		3.1 Malware Traffic
	4 Experimental Setup for SABIDS Architecture
		4.1 Training Phase
		4.2 Testing Phase
	5 Performance Evaluators
		5.1 Sensitivity and Specificity
		5.2 Receiver Operating Characteristic Curve (Roc) and Area Under Curve (AUC)
	6 Results and Discussion
	7 Conclusion
	References
Psychological Profiles of Social Media Users: An Exploratory and Predictive Study in Peruvian Adolescents
	1 Introduction
		1.1 Psychological Profiles of Social Media Users
		1.2 Peruvian Adolescents Social Media Users
	2 Methodology
		2.1 Research Approach and Type
		2.2 Participants
		2.3 Instruments
		2.4 Procedures
	3 Results
		3.1 Descriptive Statisticians
		3.2 Relations Between Variables
		3.3 Linear Regressions
	4 Discussion
	5 Conclusions
	References
Semantic Segmentation of Underwater Environments Using DeepLabv3+ and Transfer Learning
	1 Introduction
		1.1 DeepLabv3+
		1.2 Network Backbone
	2 Methods
		2.1 Quality Metrics
		2.2 Transfer Learning Strategy and Loss Function
	3 Experiments and Results
	4 Conclusions
	References
Strawberry Maturity Classification Based on BP Neural Network
	1 Introduction
	2 The Proposed Method
		2.1 Image Pre-processing
		2.2 Chromatic Feature Extraction
		2.3 BP Neural Network
	3 Results and Discussion
	4 Conclusion
	References
Intervention for Improvement of Water Quality in a Rural Village in Rajasthan
	1 Introduction
		1.1 Study Area
	2 Methodology
		2.1 Participatory Rural Appraisal
		2.2 Human Centered Design Approach
		2.3 Water Sample Testing
	3 Result I
	4 Results II
		4.1 Integrating Reverse Osmosis with Jivamritam Water Purification System
		4.2 Humidification and Dehumidification System (HDH System)
	5 Conclusion
	References
Addressing Impure Water Quality and Associated Challenges Faced by a Rural Community in West Bengal Through Sustainable Technologies
	1 Introduction
	2 Study Area
	3 Methodology
		3.1 Participatory Rural Appraisal (PRA)
		3.2 Human-Centered Design (HCD)
	4 Result
		4.1 Result I
		4.2 Result II
	5 Conclusion
	References
Assessing Appropriate Technologies for Sustainable Irrigation Practices in Muljipura Village, India
	1 Introduction
		1.1 Current State of Global and Local Water Reserves
		1.2 Brief Community Profile
	2 Methodology
		2.1 Participatory Rural Appraisal (PRA)
		2.2 Human Centered Design (HCD)
	3 Results
		3.1 Results 1
		3.2 Results 2
	4 Conclusion
	References
Kidney Disease Detection Using Supervised Machine Learning Techniques
	1 Introduction
		1.1 Mining Methods
	2 Purpose
	3 Existing Architecture
	4 Proposed Architecture
	5 Advantage of Proposed System
	6 Proposed Model Working Function
	7 Proposed Algorithm
	8 Result
		8.1 Naïve Bayesian Code
		8.2 Logistic Regression Code
		8.3 Optimized XG-BOOST Code
		8.4 Comparison Chart
		8.5 Accuracy Table
	9 Implementation Tools and Technology
	10 Conclusion
	11 Future Work
	References
Comparison Between Types of Solar Panels for Meteorological Stations in Different Areas of Ecuador
	1 Introduction
	2 Methodology
		2.1 Types of Solar Panels to Use
	3 Results
	4 Conclusion and Future Works
	References
IoT-Based Smart Street Light for Improved Road Safety
	1 Introduction
	2 Literature Review
		2.1 Smart Street Light
		2.2 Accident Detection System
		2.3 Emergency Push Button
	3 Historical Background
	4 Methodology and Modeling
		4.1 Proposed Block Diagram of the Prototype
		4.2 System Block Diagram
		4.3 Simulation
		4.4 Designed Prototype
	5 Results and Analysis
	6 Future Developments
	7 Conclusion
	References
Diagnosis of Early-Stage Lung Cancer and Tumor Using the 5G Band Microstrip Patch Antenna
	1 Introduction
	2 Design and Specification
	3 Methodology and Modeling of the Lung Phantom
	4 Result Analysis
	5 Comparative Study
	6 Conclusion
	References
Analysing and Identifying Harm Propagation of Cyber Threats in Autonomous Vehicles and Mitigation Through ANN
	1 Introduction
	2 Related Work
	3 Analysis
		3.1 Harm Propagation Tree (HPT)
		3.2 Connected Dominating Sets (CDS):
	4 Proposed Methodology
	5 Comparative Analysis
	6 Conclusion and Future Work
	References
Predictive Model-based Analytics to Control Drying Process in a Sugar Industry
	1 Introduction
	2 MPC in Drying Process Technology
	3 Implementation of MPC in Dryers Using the Simulation Package
	4 Results and Discussion
	5 Conclusion
	References
IoT-Based Personalized Health Care for Elderly Diabetic Patients
	1 Introduction
	2 Proposed Work
		2.1 Hardware Requirements
		2.2 Software Requirements
	3 Methodology
	4 Result
	5 Conclusion
	References
Context-Aware Placement Applications of Industry 4.0 Using Connected Dominating Set in Fog Computing
	1 Introduction
	2 Related Work(s)
	3 Placement Application Algorithm
	4 Implementation
	5 Results and Analysis
	6 Conclusion
	References
Performance Efficient NoC Router Implementation on FPGA
	1 Introduction
	2 Proposed Design of Single-Node NoC Router
	3 Implementation of Various Blocks of NoC Router
		3.1 Design of Input Block of Router
		3.2 Implementation of iSLIP Scheduler
		3.3 Simulation Result of Single-Node Router
	4 Implementation of 4 × 4 NoC Router
		4.1 Comparison Results
	5 Conclusion
	References
RSA-Based CP-ABE Scheme with Scalable User Revocation for IoT and Smartcard Devices
	1 Introduction
	2 Preliminary Requirements
		2.1 Definition of Attribute and Access Structure
	3 Proposed RCSR Scheme
		3.1 Role of Proxy Server
		3.2 Setup
		3.3 Encryption
		3.4 Keygen
		3.5 Decryption
	4 Performance Analysis
		4.1 Computational Overhead
		4.2 Storage Overhead
	5 Conclusion and Future Work
	References
Design of Multi-band MIMO Patch Antenna Active Sensor Array for Satellite Remote Sensing Applications
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Design of Multi-Band 4 * 4 MIMO Microstrip Patch Antenna Sensor Array
	4 Flowchart
	5 Simulation Findings and Analysis
		5.1 Return Loss (S-Parameter)
		5.2 Bandwidth
		5.3 Antenna Gain
		5.4 Beamwidth with the 2D Radiation Pattern
		5.5 Current Density
		5.6 Average Power Density
	6 Conclusion and Future Work
	References
Performance Analysis of Machine Learning Algorithms for Sleep Apnea Detection Using ECG
	1 Introduction
	2 Related Work
	3 Methodology
	4 Results
	5 Conclusions
	References
Accuracy of Diabetes Patient Determination: Prediction Made from Sugar Levels Using Machine Learning
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Dataset
		3.2 Feature Selection
		3.3 Associate Rule Mining
		3.4 Prediction
	4 Results
		4.1 Feature Selection
		4.2 Associate Rule Mining
		4.3 Prediction
	5 Discussions
	6 Conclusion
	References
A Comprehensive Review on Text to Indian Sign Language Translation Systems
	1 Introduction
		1.1 ISL Grammar
	2 Literature Review
		2.1 Method of Approach
		2.2 Existing Systems
	3 Conclusion
	4 Future Scope
	References
Control Plane Efficiency by Load Adjustment in SDN
	1 Introduction
	2 Related Work and Motivation
	3 System Model
		3.1 Load Calculation
		3.2 Finding Heavy Load Controller
		3.3 Finding the Switch Set
		3.4 Finding the Target Controller
	4 Design
	5 Evaluation
		5.1 Load Distribution
		5.2 Topology Efficiency
	6 Conclusion
	References
Novel Intuitionistic Fuzzy Time Series Modeling to Forecast the Death Cases of COVID-19 in India
	1 Introduction
	2 Preliminaries
	3 Proposed Method
	4 Implementation of Proposed Model
	5 Results and Discussion
	References
Dynamic Trust Management System for Social IoT
	1 Introduction
	2 Trust Management System (TMS)
	3 Difficulties of IoT Trust Management:
	4 Literature Review
	5 Attack Model
	6 IoT Trust Management Model
	7 Proposed Work
	8 Results and Discussion
	9 Conclusion
	References
Human Motion Detection and Recognition from Video Surveillance Based on Machine Learning Approaches
	1 Introduction
	2 Literature Review
	3 Research Methodology
		3.1 Person Detection and Motion Tracking
		3.2 Feature Selection
		3.3 Person Identification and Motion Identification
	4 Experimental Results
	5 Conclusion
	References
Using Recursive Feature Elimination and Fisher Score with Convolutional Neural Network for Identifying Port Scan Attempts
	1 Introduction
	2 Review
	3 Dataset and Technique Used
		3.1 Dataset Used
		3.2 Feature Selection Methods
		3.3 Convolutional Neural Network
	4 Methodology
	5 Experimental Results
	6 Conclusion
	References
A Conceptual Enhancement of LSTM Using Knowledge Distillation for Hate Speech Detection
	1 Introduction
	2 Background
		2.1 Hate Speech
		2.2 RNN
		2.3 LSTM
		2.4 Knowledge Distillation
		2.5 Related Works
	3 Proposed Methodology
		3.1 Response-Based Knowledge
		3.2 Offline Distillation
		3.3 Dataset
		3.4 Methodology
		3.5 Step by Step Algorithm
		3.6 Calculation of Model Accuracy
	4 Results and Analysis
	5 Conclusion
	References
A Deep Dive into Blockchain Consensus Protocols
	1 Introduction
	2 Blockchain Technology
	3 Consensus Algorithms
		3.1 Proof of Work
		3.2 Proof of Stake
		3.3 Delegated Proof of Stake
		3.4 Leased Proof of Stake
		3.5 Proof of Elapsed Time
		3.6 Proof of Burn
		3.7 Proof of Capacity
		3.8 Proof of Activity
		3.9 Proof of Sincerity
	4 Conclusion
	References
Deep Learning Techniques for Automated Image Captioning
	1 Introduction
	2 Encoder-Decoder Framework
	3 Neuroevolutionary Techniques
	4 Attention-Guided Mechanisms
	5 Results
		5.1 Evaluation Metrics
		5.2 Comparison
	6 Conclusion
	References
Cost-Effectiveness of a Substance-Abuse Prevention Program in Tribal Areas of Chhattisgarh and Jharkhand
	1 Introduction
	2 Amrita Awareness Ambassador (AAA) Program
	3 Methodology
		3.1 Study Population
		3.2 Statistical Analysis
	4 Results
	5 Discussion and Conclusion
	References
Agile Methodology for IoT Application Development and Business Improvisation
	1 Introduction
	2 Related Work
	3 Agile Solution for IoT Application
	4 Summary
	References
A Study on Impact of WhatsApp on College Students
	1 Introduction
		1.1 Features of WhatsApp
	2 Literature Review
	3 Objective
	4 Proposed Method
		4.1 Data Collection
		4.2 Analysis of Data
	5 Results
	6 Limitations/Shortcoming and Future Scope
	7 Conclusion
	References
Apriori Algorithm with Dynamic Parameter Selection and Pruning of Misleading Rules
	1 Introduction
	2 Interestingness Measures/Rule Evaluation Metrics
		2.1 Support
		2.2 Confidence
		2.3 Lift
	3 Association Rules
	4 Literature Survey
	5 Methodology of Proposed Improved Apriori Algorithm
		5.1 Apriori Algorithm
		5.2 Deciding Minimum Support for a Dataset
		5.3 Deciding Minimum Confidence for a Dataset
		5.4 Pruning of Rules Based on a Contingency Table
		5.5 The Decision About Whether to Go for Lift or Confidence
	6 Comparative Analysis
		6.1 Number of Rules
		6.2 Time Complexity
		6.3 Accuracy of Rules
	7 Conclusion
	8 Future Scope
	References
Reconstruction of Missing Data in Satellite Imagery Using SN-GANs
	1 Introduction
		1.1 Satellite Imagery
		1.2 Parsing and Processing Satellite Data
		1.3 Errors in Satellite Imagery
		1.4 Correcting Line and Column Dropouts
		1.5 Section Organization
	2 Literature Survey
	3 Dataset
	4 Proposed Solution
		4.1 SN-GANs for Satellite Images
	5 Results
	6 Conclusion
	References
Solution Approaches for Breast Cancer Classification Through Medical Imaging Modalities Using Artificial Intelligence
	1 Introduction
	2 Literature Review
	3 Solution Approaches
		3.1 Image Modalities Used Medical Imaging
		3.2 Machine Learning
		3.3 Deep Learning
		3.4 Convolutional Neural Network
		3.5 Recurrent Neural Network
		3.6 Auto-encoder
		3.7 Transfer Learning
		3.8 Data Augmentation
	4 Conclusions
	References
Banana Leaf Disease Recognition Based on Local Binary Pattern
	1 Introduction
	2 Literature Review
	3 Proposed Approach
		3.1 Image Acquisition
		3.2 Preprocessing
		3.3 Image Segmentation
		3.4 Feature Extraction
		3.5 Classification
	4 Result and Discussion
	5 Conclusion
	References
RMS Delay Spread and Channel Capacity Modelling for 28 GHz MIMO Channel with Different UE Height
	1 Introduction
	2 Measurement Environment and Simulation
	3 Result and Analysis
		3.1 Effect of RMS DS on Channel Capacity
	4 Conclusion
	References
A Novel Variant-Optimized Search Algorithm for Nuclei Detection in Histopathogy Breast Cancer Images
	1 Introduction
	2 Review on Segmentation
	3 Proposed Method
		3.1 Image Collection
		3.2 Image Preprocessing
		3.3 Optimized Super Pixel Segmentation (OSPS)
		3.4 PSO Algorithm
		3.5 GWO Algorithm
	4 Results
	5 Conclusion
	References
The Mythical or Realistic Implementation of AI-powered Driverless Cars in Africa: A Review of Challenges and Risks
	1 Introduction
	2 Studies on Autonomous Vehicles
	3 Challenges of Driverless Cars
	4 Possible Risks of Adoption
	5 Conclusion
	References
Gatekeeper Security Check System Using VGG
	1 Introduction
	2 Application Structure
		2.1 Overall Architecture
		2.2 DB Design and Data Repository
		2.3 User Interface
		2.4 Facial Recognition and ID Card Detection Engine
	3 Algorithm Used
		3.1 Face Recognition Algorithm
		3.2 ID Card Detection Algorithm
	4 Experimental Discussion
		4.1 Trivial Solution
		4.2 Bottleneck Feature Model
		4.3 Results
	5 Conclusion
	References
Online Examination System
	1 Introduction
	2 Proposed System Design
	3 Flowchart of Remote Online Examination System
	4 Algorithm of Proctoring
	5 Result
		5.1 Result Analysis of Proctoring Algorithm
		5.2 Result of Data Visualization
	6 Conclusion
	7 Future Work
	References
Analyze of Different Algorithms of Machine Learning for Loan Approval
	1 Introduction
	2 Literature Review
	3 Dataset Evolution
	4 Methodology Used
	References
A Survey on Statistical Approaches for Abstractive Summarization of Low Resource Language Documents
	1 Introduction
	2 Literature Survey
	3 Conclusion and Future Scope
	References
A Critical Review of IoT-Connected Healthcare and Information Security in South Africa
	1 Introduction
	2 Security in Health Care
		2.1 Internet of Medical Things
		2.2 Intrusion Detection System (IDS)
	3 Comparison and Discussion
	4 Conclusion
	References
A Review of Interoperability of IoT Systems for Smart Cities
	1 Introduction
	2 Related Work
	3 Internet of Things for Smart Cities
	4 Interoperability as Regards Smart Cities
	5 Complex Systems and Need for Interoperability
		5.1 Devices
		5.2 Networks
		5.3 Platforms
	6 Interoperability in Smart Cities
	7 Challenges of Interoperability
		7.1 Integration Challenges
		7.2 Things Interaction
		7.3 Virtual Representation of Things
		7.4 Syntactic Interoperability Between Things
		7.5 Management Challenges
	8 Benefits of Interoperability
	9 Key Findings of the Review
	10 Recommendation and Future Direction
	11 Conclusion
	References
Author Index




نظرات کاربران