ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Soft Computing: Theories and Applications : Proceedings of SoCTA 2019 (Advances in Intelligent Systems and Computing)

دانلود کتاب محاسبات نرم: نظریه ها و کاربردها: مجموعه مقالات SoCTA 2019 ()

Soft Computing: Theories and Applications : Proceedings of SoCTA 2019 (Advances in Intelligent Systems and Computing)

مشخصات کتاب

Soft Computing: Theories and Applications : Proceedings of SoCTA 2019 (Advances in Intelligent Systems and Computing)

ویرایش: 1st ed. 2020 
نویسندگان: , ,   
سری: Advances in Intelligent Systems and Computing 
ISBN (شابک) : 9811540314, 9789811540318 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 1093 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 43 مگابایت 

قیمت کتاب (تومان) : 51,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 14


در صورت تبدیل فایل کتاب Soft Computing: Theories and Applications : Proceedings of SoCTA 2019 (Advances in Intelligent Systems and Computing) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب محاسبات نرم: نظریه ها و کاربردها: مجموعه مقالات SoCTA 2019 () نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب محاسبات نرم: نظریه ها و کاربردها: مجموعه مقالات SoCTA 2019 ()



این کتاب بر محاسبات نرم و چگونگی استفاده از آن برای حل مشکلات دنیای واقعی ناشی از حوزه‌های مختلف، اعم از پزشکی و مراقبت‌های بهداشتی، مدیریت زنجیره تامین، پردازش تصویر و تحلیل رمزی تمرکز دارد. این مقالات با کیفیت بالا ارائه شده در کنفرانس بین المللی محاسبات نرم: نظریه ها و کاربردها (SoCTA 2019)، که توسط موسسه ملی فناوری Patna، هند برگزار شده است، گردآوری می شود. این کتاب با ارائه بینش‌های ارزشمندی در مورد محاسبات نرم برای معلمان و محققان به طور یکسان، الهام‌بخش تحقیقات بیشتر در این زمینه پویا خواهد بود.


توضیحاتی درمورد کتاب به خارجی

This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2019), organized by the National Institute of Technology Patna, India. Offering valuable insights into soft computing for teachers and researchers alike, the book will inspire further research in this dynamic field.



فهرست مطالب

Preface
Contents
About the Editors
Performance Optimization by MANET AODV-DTN Communication
	1 Introduction
	2 Background and Related Network
		2.1 Mobile Ad Hoc Networks (MANETs)
		2.2 Ad Hoc on Demand Distance Vector (AODV) [5]
		2.3 Delay Tolerant Networks (DTN)
	3 Simulation Design
	4 Result and Analysis
		4.1 1st Scenario
		4.2 2nd Scenario
		4.3 3rd Scenario
	5 Conclusion
	References
Effectiveness of Whale Optimization Based I+PD Controller for LFC of Plug-in Electric Vehicle Included Multi-area System
	1 Introduction
	2 System Modeling
		2.1 Proposed System
		2.2 Proposed Controller
	3 Whale Optimization Algorithm
	4 Simulation Results
		4.1 Comparison with PIDN Controller
		4.2 Effectiveness of Proposed Control Scheme Under Variable Load Disturbance
	5 Conclusion
	Appendix
	References
Dual Band Printed Rectangular Ring-Shaped Monopole Antenna for Wireless Communication
	1 Introduction
	2 Antenna Design
	3 Result Discussion
	4 Conclusion
	References
Printed U-Shaped Monopole Dual Band Antenna for Wireless Application
	1 Introduction
	2 Antenna Design
	3 Result Discussion
	4 Conclusion
	References
IoT-Enabled Early Prediction System for Epileptic Seizure in Human Being
	1 Introduction
	2 Proposed System
	3 Results and Discussions
	4 Conclusions
	References
Effective Author Ranking Using Average of Different h-Index Variants
	1 Introduction
	2 Related Work
	3 Dataset
	4 Methods and Model
		4.1 Methods
		4.2 Model
	5 Results and Analysis
	6 Conclusion and Future Work
	References
A Survey Report on Recent Progresses in Nearest Neighbor Realization of Quantum Circuits
	1 Introduction
	2 Background
	3 Works on NN-Based Representation
	4 Conclusion
	References
Annual Rainfall Prediction Using Time Series Forecasting
	1 Introduction
	2 Methodology
		2.1 ARIMA Method
		2.2 Simple Exponential Smoothing Method
		2.3 ETS Method
		2.4 Neural Network
		2.5 Measures of Accuracy
	3 Results and Discussions
		3.1 Annual Rainfall Data
		3.2 Forecasts of Different Techniques
		3.3 Error Analysis
	4 Conclusion
	References
A Novel Approach for Design 7:3 and 5:3 Compressors
	1 Introduction
	2 Proposed Method and Circuit Description
	3 Simulation Result and Discussion
	4 Conclusion
	References
High-Accurate, Area-Efficient Approximate Multiplier for Error-Tolerant Applications
	1 Introduction
	2 Attributes of Contemporary ETM
	3 Experimental Results
	4 Conclusions
	References
Hoax and Faux of Information Credibility in Social Networks: Explored, Exemplified and Experimented
	1 Introduction
	2 Information Credibility—Corollaries
		2.1 The Essentiality of Credible Information [4–6]
		2.2 The Compromising Contexts of Information Credibility [7]
	3 The Nuances of Compromised Credibility—Bulletin Ballots
		3.1 Businesses Caught Posting Fake Reviews [8]
		3.2 Postage of Bogus, Bribed Reviews by Amazon Retailer [8]
		3.3 The Incident of Blemished Heritage [8]
		3.4 Amazon Sues 1,000 ‘Fake Reviewers’ [9]
		3.5 Falsified Reviews Procures Imprisonment [10]
	4 The Tools Exposition—Automated Approaches
	5 Result Analysis—Experiment’s Explications
	6 Intricacies to Interpreting Fakeness—Manual Approaches
	7 Automated Tools Analysis—Tabulated Transcript
	8 Conclusion
	9 Future Work
	References
Minimize Power Ratio (PR) in OFDM Using Tone Reservation Method
	1 Introduction
	2 PAPR Reduction Technique Used
		2.1 SLM Technique
		2.2 Tone Reservation
	3 Combined SLM and Proposed Tone Reservation
		3.1 Simulation and Result
	4 Conclusion
	References
A Single-Phase Multi-level Inverter Using a Lesser Number of Switching Devices
	1 Introduction
		1.1 Proposed MLI configuration
		1.2 Proposed Nine-Level Inverter
		1.3 Modulation and Control Procedure of the Proposed MLI
	2 Simulation and Experimental Results
	3 Conclusion
	Appendix 1
	References
Symmetric Key Generation and Distribution Using Diffie-Hellman Algorithm
	1 Introduction
		1.1 Existing Diffie–Hellman Algorithm
		1.2 Methodology
		1.3 Result and Analysis
		1.4 Conclusion
	References
Design of Controllers Using PSO Technique for Second-Order Stable Process with Time Delay
	1 Introduction
	2 Particle Swarm Optimization Technique
	3 Problem Formulation and Controller Parameter Setting
		3.1 SMC Controller
		3.2 PID Controller
	4 Simulation Studies and Results
	5 Conclusion
	References
A Green Dynamic Internet of Things (IoT)-Battery Powered Things Aspect-Survey
	1 Introduction
	2 Summary of Efficient IoT System
	3 Greener Communication System
		3.1 Data Reduction
		3.2 Sleep/Wake-up Techniques
		3.3 Radio Techniques
		3.4 Routing Approaches
		3.5 Power Management Techniques
	4 Greener Cloud Computation
	5 Greener Data Center
	6 Applications of Green IoT
	7 Conclusion
	References
An Efficient Layout of Single-Layer Full Adder Using QCA
	1 Introduction
	2 Experimental Details, Methods and Materials
		2.1 QCA Cell
		2.2 QCA Wire
		2.3 Basic Logical Devices
		2.4 Clocking in QCA
		2.5 Proposed Layout of Full Adder
	3 Observations
	4 Conclusion
	References
A Review of mm-Wave Power Amplifiers for Next-Generation 5G Communication
	1 Introduction
	2 Importance of PA Device Technologies
	3 PA Architectures and Considerations
		3.1 Doherty Power Amplifier (DPA) in 0.15 µm GaAs Technology
		3.2 Two-Stack FET nMOS PAs
		3.3 3-Stage, 4-Stack FET CMOS PA
		3.4 Multistage 0.13 μm GaN HEMT DPA
		3.5 Two-Stage 15 GHz Fully Integrated GaN-Based Power Amplifier
		3.6 28 GHz 5G PA in 28 nm Bulk CMOS
	4 Parametric Performance of 5G PA
	5 Conclusion
	References
Vision-Based Automated Traffic Signaling
	1 Introduction
	2 Proposed Methodology
		2.1 Pre-processing
		2.2 Traffic Management Strategy
	3 Training
	4 Traffic Monitoring GUI
	5 Results and Discussion
	6 Conclusion
		6.1 Future Scope
	References
Performance Comparison of SVM and ANN for Reversible ECG Data Hiding
	1 Introduction
	2 Watermark Embedding
		2.1 Prediction Error Expansion
		2.2 Embedding and Extraction
	3 Estimation Mechanisms
		3.1 SVM
		3.2 ANN
	4 Results and Discussion
		4.1 Experiments and Results
	5 Conclusion
	References
Application of Multi-criteria Decision-Making Method for the Evaluation of Tamilnadu Private Bus Companies
	1 Introduction
	2 Literature Support
		2.1 MCDM Techniques
	3 Research Methods
	4 Case Study—Southern India, Tamilnadu, Chennai Passengers
		4.1 Hierarchy Formation
		4.2 Application of AHP Method
	5 Results of the MCDM–AHP Technique
	6 Conclusion
	References
CNC Machine Shop Floor Facility Layout Design Using Genetic Algorithm
	1 Introduction
	2 Literature Support
	3 Research Methodology
	4 Case Study: CNC Machine Shop Floor
		4.1 Parameters to Be Considered
		4.2 MFFC—Existing Layout
		4.3 MFFC—Proposed Layout Design—1
		4.4 MFFC—Proposed Layout Design—2
		4.5 MFFC—Proposed Layout Design—3
	5 Results of Genetic Algorithm
	6 Conclusion
	References
Source of Treatment Selection for Different States of India and Performance Analysis Using Machine Learning Algorithms for Classification
	1 Introduction
	2 Literature Review
	3 Methodology
		3.1 Design Model
	4 Conclusion and Future Scope
	References
Ant Lion Optimization Technique for Minimization of Voltage Deviation Through Optimal Placement of Static VAR Compensator
	1 Introduction
	2 FACTS Allocation in the System
		2.1 FACTS Description
		2.2 Problem Formulation
	3 Ant Lion Optimization—An Overview
		3.1 Basic Concept of Ant Lions
		3.2 Mathematical Modeling of the ALO
	4 Application and Results
		4.1 Case 1: Load Factor Multiplied with Real and Reactive Power of Load
		4.2 Case 2: Load Factor Multiplied with Real and Reactive Power of Generator and Load
	5 Conclusion
	References
On Vector Variational Inequalities and Vector Optimization Problems
	1 Introduction
	2 Definitions and Preliminaries
	3 Relationship Between (MVVI), (SVVI), and (VOP)
	4 Existence of Solutions for (MVVI) and (SVVI)
	References
Characterizations of the Solution Sets for Constrained Pseudolinear Semi-infinite Programming Problems
	1 Introduction
	2 Definitions and Preliminaries
	3 Pseudolinear Semi-infinite Programming Problem
	4 Pseudolinear Multiobjective Semi-infinite Programming Problem
	5 Conclusions
	References
Novel Chaotic Elephant Herding Optimization for Multilevel Thresholding of Color Image
	1 Introduction
	2 Problem Formulation
	3 Optimization
		3.1 EHO Algorithm
		3.2 Choas Theory
	4 CEHO in Multilevel Image Thresholding
	5 Experimental Result and Discussion
	6 Conclusion
	References
Forecasting Groundwater Fluctuation from GRACE Data Using GRNN
	1 Introduction
		1.1 GRACE Data
		1.2 General Regression Neural Network (GRNN)
	2 Methodology
		2.1 Study Area
		2.2 Groundwater Data of Uttarakhand
		2.3 Different Input Used in Formation of GRNN Model
	3 Results And Discussion
	4 Conclusion
	References
Android Application for Recognition of Indian Origin Agricultural Products
	1 Introduction
	2 Literature Review
	3 Tools and Software’s
		3.1 Deep Learning for Image Classification
		3.2 Tensorflow
		3.3 MobileNets
		3.4 Amazon Web Services (AWS)
	4 Methodology
		4.1 Data Acquisition
		4.2 Data Augmentation
	5 Results
	6 Scope of Future Work
	References
A Fuzzy Logic Based Approach for Prediction of Squamous Cell Carcinoma
	1 Introduction
	2 Related Work
	3 The System Architecture
		3.1 Inputs
		3.2 Output
	4 Simulation Results
	5 Conclusion and Future Work
	References
Investigating Multilevel Hesitated Patterns Using Vague Set Theory
	1 Introduction
		1.1 Architectural Design
		1.2 Architectural Components
	2 Background
	3 Preliminaries
		3.1 Terminologies
		3.2 Vague Set Theory
		3.3 Multilevel Frequent Pattern Mining
	4 Proposed Algorithm
	5 Illustration
	6 Results Interpretation
	7 Conclusion
	References
Six Switch Three Phase Five-Level Inverter with Sinusoidal Pulse Width Modulation
	1 Introduction
	2 Mathematical Modeling and Operation of Proposed Technique
		2.1 Inverter Model
		2.2 Pulse Width Modulation Technique
		2.3 Generation of Switching Pulses Using SPWM Technique
		2.4 Proposed Switching Strategy with Output Voltage
		2.5 Simulation Results and Discussion
	3 Conclusion
	References
AI-Enabled Real-Time Sign Language Translator
	1 Introduction
	2 Literature Survey
	3 Objectives
	4 Proposed Methodology
		4.1 Image Pre-processing
		4.2 Convolutional Neural Network Classifier
	5 Results and Discussion
	6 Conclusion
	7 Future Enhancement
	References
A Comparative Performance of Sorting Algorithms: Statistical Investigation
	1 Introduction
	2 Relative Performance of Sorting Algorithms for Zero-Truncated Binomial Input
	3 Relative Performance of Sorting Algorithms for Zero-Truncated Poisson Input
	4 Empirical Complexity of Sorting Algorithms
	5 Conclusion
	References
Evolutionary Computing for Designing Cryptographic Primitives for Block Cipher: Challenges and Opportunities
	1 Introduction
	2 Cryptographic Primitives and Problem Formulation
	3 Background
		3.1 S-Box Representation
		3.2 Cryptographic Properties and Bounds
	4 Evolutionary Computing
		4.1 Genetic Algorithm
		4.2 Memetic Algorithm
	5 Practical Results and Discussion
	6 Challenges and Future Direction
	7 Conclusion
	References
A True Event-Based Metaheuristic Algorithm Optimized AGC Mechanism for a Multi-area Power System
	1 Introduction
	2 System Description
	3 Controller Design and Optimization Technique
		3.1 PIDN Controller
		3.2 Optimization Technique
	4 Results and Discussion
		4.1 PSO Versus VPL Algorithm
		4.2 Robustness of the Proposed Scheme
		4.3 Supremacy of the Proposed Scheme
	5 Conclusion
	Appendix
	References
Wireless Emanation of Braille to Text/Voice and Vice Versa
	1 Introduction
	2 Literature Survey
	3 Proposed System
		3.1 Working of System
		3.2 Implementation
	4 Conclusion
	References
An Exploratory Analysis Pertaining to Stress Detection in Adolescents
	1 Introduction
		1.1 Sentiment Analysis
	2 Related Work
	3 Proposed Method
		3.1 Data Collection
		3.2 Preprocessing
		3.3 Sentiment Analysis of Tweets
		3.4 Sentiment Classification Using Machine Learning
	4 Experiments and Results
	5 Conclusion and Future Work
	References
Load Frequency Control of an Interconnected Multi-source Power System Using Quasi-oppositional Harmony Search Algorithm
	1 Introduction
	2 System Investigated
	3 QOHS Optimization Technique
		3.1 QOHS Algorithm
		3.2 Simulation Results and Discussion
	4 Conclusion
	References
An Extensive Investigation of Wavelet-based Denoising Techniques for Various ECG Signals Utilizing Thresholding Function
	1 Introduction
	2 Related Works
		2.1 ECG Signal, Noise and Wavelet Transform
		2.2 Thresholding
		2.3 Metrics
	3 Thresholding Rules
		3.1 Visu Rule
	4 Proposed New Mixed Function
	5 Methodology
		5.1 Practical Design
		5.2 Simulation Parameters
	6 Practical Results
	7 Conclusion and Future Works
	References
Effect of Noise on Segmentation Evaluation Parameters
	1 Introduction
	2 Literature Survey
	3 Lung Cancer
	4 Reconstruction of Nodules
	5 Methodology
	6 Results and Evaluation
	7 Conclusion and Future Scope
	References
A Review Paper on Feature Selection Techniques and Artificial Neural Networks Architectures Used in Thermography for Early Stage Detection of Breast Cancer
	1 Introduction
	2 Feature Selection and ANN Architecture Used in Breast Cancer Detection
	3 Features Reduction Technique and ANN for Breast Cancer Detection in Early Stage
	4 Discussion
	5 Conclusion
	References
An Artificial Neural Network Model for Estimating the Flood in Tehri Region of Uttarakhand Using Rainfall Data
	1 Introduction
		1.1 Study Area
		1.2 Working of Artificial Neural Network (ANN)
		1.3 Climate Change and Its Impact on Discharge
	2 Methodology
	3 Results and Discussion
		3.1 Performance of the ANN Model
		3.2 Pseudo Codes and Program Codes
		3.3 Flood Forecast
	4 Conclusions and Limitations
	References
Advanced Virtual Apparel Try Using Augmented Reality (AVATAR)
	1 Introduction
	2 Literature Survey
	3 Proposed System
		3.1 IoT Smart Mirror
		3.2 Hand Gesture Mouse Control
		3.3 Adding Virtual Clothes on the Video
		3.4 AVATAR Web Interface
		3.5 Skin Segmentation and Dominant Tone/Color Extraction
		3.6 Recommendation Module
	4 Conclusion
	References
A Novel Fault-Detection Scheme for Nearest-Neighbor-Based Reversible Circuits
	1 Introduction
	2 Background
	3 Motivation and Problem Formulation
	4 Proposed Method
		4.1 Testable Design for Detecting SWAP Gate Missing Fault
	5 Experimental Results
	6 Conclusion
	References
Automated Railway Gate Control Using Internet of Things
	1 Introduction
	2 Literature Survey
	3 Proposed System
	4 Results and Discussion
	5 Conclusion
	References
Simulated Annealing Based Algorithm for Tuning LDA Hyper Parameters
	1 Introduction
	2 Related Work
	3 Proposed Algorithm
		3.1 SA-LDA Algorithm
	4 Experimental Setup and Results
	5 Conclusion
	References
A Better Group Consensus Ranking  via a Min-transitive Fuzzy Linear Ordering
	1 The Group Consensus Ranking Problem
	2 Existing Fuzzy Methods
		2.1 An Unsuccessful Variant of Eq. (1)
		2.2 Another Naive Approach
	3 Our New Fuzzy Approach
		3.1 A Min-transitive Fuzzy Partial Order on S from Px's
		3.2 Extending an FPO to an FLO
		3.3 Applying Lemma 1
		3.4 Simultaneous Use of Lemma 1 for Multiple Node Pairs
	4 A Greedy Heuristic for Optimal Extension
	5 Conclusion
	References
A Novel Metaheuristic Approach for Resource Constrained Project Scheduling Problem
	1 Introduction
	2 The Resource-Constrained Project Scheduling Problem
	3 Related Work
		3.1 Heuristic Methods
		3.2 Metaheuristic Methods
	4 Discrete Firefly Algorithm
		4.1 Basic Firefly Algorithm
		4.2 Discrete Firefly Algorithm (DFA)
	5 Benchmark Test Problem and Parameters
	6 Experimental Results
	7 Conclusion
	References
A Novel Approach to Handle Huge Data for Refreshment Anomalies in Near Real-Time ETL Applications
	1 Introduction
	2 Reasons for Refreshment Anomalies
	3 Reduce Query Execution Time with Updated Records
	4 Implementation and Results
	5 Conclusion and Future Work
	References
Comparison of Photodetection Capability of Spin Coated TiO2 Thin Film and In2O3 Thin Film Devices
	1 Introduction
	2 Experiments
	3 Results and Discussion
		3.1 Field Emission Scanning Electron Microscopy (FESEM)
		3.2 Optical Property
	4 Conclusion
	References
Development of IDS Using Supervised Machine Learning
	1 Introduction
	2 Related Work
	3 Materials and Methods
		3.1 Network Data Packet Collection
		3.2 Intrusion Detection Engine
		3.3 Alert Generation
	4 Experiments and Result Analysis
		4.1 Experimental Work Flow
		4.2 Result Analysis
		4.3 Comparative Analysis
	5 Conclusion
	References
Automated Traffic Light Signal Violation Detection System Using Convolutional Neural Network
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 Traffic Line Detection
		3.2 Vehicle Detection
		3.3 Traffic Light Detection
		3.4 Detection of Vehicle Crossing
	4 Conclusion and Future Work
	References
An Enhanced Butterfly Optimization Algorithm for Function Optimization
	1 Introduction
	2 Butterfly Optimization Algorithm
	3 Symbiosis Organisms Search
		3.1 Mutualism Phase
		3.2 Commensalism Phase
		3.3 Parasitism Phase
	4 Proposed Methodology
	5 Experimental Set-up and Results
		5.1 Numerical Benchmarks and Experimental Criteria
		5.2 Compared Algorithms and Parametric Setup
		5.3 Results Discussion
	6 Conclusion
	References
Dynamic Analysis of Wind Turbine Drivetrain Under Constant Torque
	1 Introduction
	2 Mathematical Model of the Drivetrain
	3 Numerical Analysis
	4 Results and Discussion
	5 Conclusions
	References
To Build Scalable and Portable Blockchain Application Using Docker
	1 Introduction
	2 Background
	3 Proposed Model
	4 Design and Implementation
	5 Conclusion and Future Work
	References
Text Summarization: An Extractive Approach
	1 Introduction
	2 Related Work
	3 Methodology Used
		3.1 Term Frequency-Inverse Document Frequency
		3.2 Graph Method for Summarization
		3.3 Text Rank Algorithm
	4 Result and Discussion
	5 Conclusion
	References
Clifford+T-based Fault-Tolerant Quantum Implementation of Code Converter Circuit
	1 Introduction and Motivation
		1.1 Previous Work and Problem Definition
	2 Preliminaries
		2.1 Reversible Circuit and Reversible Gate
		2.2 Quantum Circuit and Performance Parameters
		2.3 BCD Code, Excess-3 Code and 2`s Complement Code
	3 Proposed Technique
		3.1 4-Bit BCD-to-Excess-3 Code Converter Quantum Circuit
		3.2 4-Bit BCD-to-2's Complement Code Converter Quantum Circuit
	4 Comparison with Previous Work and Analysis
	5 Conclusion and Future Work
	References
Applying Deep Learning for Discovery and Analysis of Software Vulnerabilities: A Brief Survey
	1 Introduction
	2 Deep Learning for Software Vulnerability
		2.1 Choosing Proper Input Data Representation for Deep Neural Network
		2.2 Vulnerability Databases/Resources
		2.3 Choosing Deep Neural Network Model/Architecture
	3 Conclusion
	References
Fuzzy Decision Making System for Better Staff Performance Appraisal in Institutional Organization
	1 Introduction
	2 Fuzzy Logic—An Overview
	3 Academic Performance Factors—An Overview
	4 Structural Design of Proposed System
	5 Implementation of FIS
		5.1 Factors affecting on Responsibility and Punctuality
		5.2 Membership Functions
		5.3  Fuzzy Rule
		5.4 Results Analysis
	6 Conclusion
	References
A Graph-Theoretic Approach for Sustainable New Product Development (SNPD) in Supply Chain Environment
	1 Introduction
	2 Structural Analysis of a Sustainable New Product Development Using Graph Theory
	3 Case Study
	4 Conclusions
	References
Generalization Performance Comparison of Machine Learners for the Detection of Computer Worms Using Behavioral Features
	1 Introduction
	2 Methodology
		2.1 Datasets
		2.2 Feature Engineering Experiments
		2.3 Machine Learning Algorithms
		2.4 Machine Learning Experiments
	3 Discussion of Results
	4 Conclusion
	References
Fully Annotated Indian Traffic Signs Database for Recognition
	1 Introduction
	2 Related Work
	3 Database Design
	4 Discussion
	5 Conclusion
	References
Streamlining Choice of CNNs and Structure Framing of Convolution Layer
	1 Introduction
	2 Basic Description of CNN Structure
		2.1 Output of CNN
		2.2 Fully Connected Layer
		2.3 Dropout Layer
		2.4 Pooling Layer
		2.5 Activation Layer
		2.6 Convolutional Layer
	3 Transfer Learning
	4 Decision Making on Choices of, Pre-trained CNN or Customized CNN
		4.1 Pre-trained Versus Custom CNN
		4.2 Designing Guidelines for Convolution Layer
	5 Implementation and Results of Choices of Pre-trained VGG16 and Custom Designed CNN
		5.1 Datasets
		5.2 Results
	6 Conclusions
	7 Future Work
	References
SNAP N’ COOK—IoT-Based Recipe Suggestion and Health Care Application
	1 Introduction
	2 Literature Survey
	3 Proposed System
		3.1 Vegetable Recognition Module
		3.2 Recipe Suggestion Module
		3.3 Health Preference and Calorie Intake Module
		3.4 Stale Vegetable Detection
		3.5 Mobile Application on the User’s Device
		3.6 Online Social Media Platform
	4 Conclusion
	References
Accuracy-Based Performance Analysis of Alzheimer’s Disease Classification Using Deep Convolution Neural Network
	1 Introduction
		1.1 Alzheimer’s Disease
	2 Related Work
	3 Proposed Methodology
		3.1 Data Pre-processing
		3.2 Network Architecture
		3.3 Database
	4 Experimental Setup and Results
	5 Summary and Future Scope
	References
Multiple Information Fusion and Encryption Using DWT and Yang-Gu Mixture Amplitude-Phase Retrieval Algorithm in Fractional Fourier Domain
	1 Introduction
	2 Theory
		2.1 Two-Coupled Logistic Maps
		2.2 Fractional Fourier Transform
		2.3 Yang-Gu Mixture Amplitude-Phase Retrieval Algorithm
	3 Proposed Asymmetric Cryptosystem
	4 Numerical Results
	5 Conclusion
	References
Development of Intrusion Detection System Using Deep Learning for Classifying Attacks in Power Systems
	1 Introduction
	2 Related Work
	3 System Architecture
	4 Classification Methodology
		4.1 OneR
		4.2 K Nearest Neighbour
		4.3 Random Forests
		4.4 Naïve Bayes
		4.5 Support Vector Machines
		4.6 Deep Neural Network
	5 Experimental Results and Discussion
		5.1 Mississippi State University and Oak Ridge National Laboratory Dataset (MSU-ONL Dataset)
		5.2 Experimental Results and Discussion
	6 Conclusion
	References
An Improved Adaptive Transfer Function for Explosion Spark Generation in Fireworks Algorithm
	1 Introduction
	2 FWA-ATF
		2.1 Adaptive Transfer Function (ATF)
		2.2 Generation of ``Explosion Sparks''
		2.3 Random Mutation Operator
		2.4 Best Selection Strategy
	3 Proposed Method
		3.1 Improved ATF
		3.2 Generation of Explosion Sparks and Mutated Sparks
		3.3 Group Best Selection
	4 Experimental Results
		4.1 CEC2015 Benchmark Functions
		4.2 Parameter Settings
		4.3 PC Configuration
		4.4 Results
	5 Discussion
		5.1 Performance Analysis
		5.2 Computational Complexities
		5.3 Analysis of the Effectiveness of Different Components of FWA-IATFGS
	6 Conclusion
	References
NSE Stock Prediction: The Deep Learning Way
	1 Introduction
	2 Related Works
	3 Background
		3.1 Neuron
		3.2 Neural Network
		3.3 Recurrent Neural Network
		3.4 Grated Recurrent Unit
		3.5 Long Short-Term Memory
	4 Experiments
	5 Results and Discussions
	6 Conclusions and Future Scope
	References
Recent Development of AI and IoT in the field of Agriculture Industries: A Review
	1 Introduction
	2 Literature Review
	3 Discussion
	4 Conclusions
	References
Optimized Fuzzy Rule-Based System to Measure Uncertainty in Human Decision Making System
	1 Introduction
	2 Fuzzy-Based Performance Evaluation—A Literature Review
	3 Proposed Methodology
		3.1 Scores in Test
		3.2 Fuzzification
		3.3 Fuzzy Rule Base and Inference
		3.4 Evaluation of Performance Value by Defuzzification
		3.5 Enhanced GA-Based Fuzzy Rules
	4 Experimental Results Generation
		4.1 Discussion and Analysis
	5 Conclusion
	References
A Review on Detection of Breast Cancer Cells by Using Various Techniques
	1 Introduction
	2 Literature Work
	3 Existing Methodologies
	4 Result
	5 Conclusion
	6 Future Scope
	References
Analysis of Security Issues and Possible Solutions in the Internet of Things for Home Automation System
	1 Introduction
	2 Literature Review
	3 Existing Techniques
		3.1 Security System Using Zigbee
		3.2 Symmetric Encrypted Scheme with Secret Keys
		3.3 Smart Surveillance Monitoring System
		3.4 Authentication System Using Voiceprint
		3.5 Biometric-Based IoT System
		3.6 Three-Level Kerberos Authentication
	4 Result
	5 Applications
	6 Conclusion and Future Scope
	References
Utilization of the Internet of Things in Agriculture: Possibilities and Challenges
	1 Introduction
	2 Literature Review
		2.1 During Cultivation of the Crop
		2.2 Harvesting
		2.3 Packaging
		2.4 Transporting
		2.5 At the Retail Stores
	3 Existing Techniques
		3.1 Polyhouses
		3.2 Robotic Arms
		3.3 RFID Tags
		3.4 Sensors
		3.5 Global Positioning System (GPS)
		3.6 Cloud Computing
	4 Result
	5 Applications
	6 Conclusion
	References
Study on Real-Time Face Recognition and Tracking for Criminal Revealing
	1 Introduction
	2 Literature Evaluation
	3 Techniques of Criminal Detection Using Video Surveillance
		3.1 Automatic Detection of Crimes Using Motion Analysis Technique
		3.2 Real-Time Monitoring Scheme Utilizing the Design Identical Technique
		3.3 Tracking People Using Facial Recognition Technique
		3.4 Skin Filter Method
	4 Results and Discussion
	5 Applications
	6 Conclusion
	References
Analysis of Precision Agriculture Technique by Using Machine Learning and IoT
	1 Introduction
	2 Literature Work
	3 Existing Methodologies
	4 Design Methodology
	5 Result
	6 Applications
	7 Conclusion
	References
Dispersive Nature of the FEL Amplifiers in the Whistler Mode
	1 Introduction
	2 Evaluation of Raman Regime in FEL Amplifiers
	3 Momentum and Efficiency in FEL Amplifiers
	4 Results and Discussion
	5 Conclusion
	References
An Improved Energy-Efficient Faulty Information Extraction Scheme Using PFDIAES and PFDIF Algorithms
	1 Introduction
	2 Proposed Work
	3 PFDIAES and PFDIF Algorithms
	4 Gang Attack with Injection of False Data
	5 Results and Discussion
		5.1 End-to-End Delay
		5.2 Packet Drop
		5.3 Packet Delivery Ratio
		5.4 Throughput
		5.5 Energy Efficiency
	6 Conclusion
	References
Cyber Attacks and Security—A Critical Survey
	1 Introduction
	2 Related Work
		2.1 Cyber Crime
		2.2 Types of Cybercrime
	3 Analysis Survey
	4 Case Studies
		4.1 Call Fraud in Mphasis Citibank Pune
		4.2 The Bank NSP Case
		4.3 SONY.SAMBANDH.COM Case
	5 Is Internet Safe
		5.1 Impact of Social Media
		5.2 Cyber-Terrorism
	6 Prevention and Measure
		6.1 Initiatives by the Government of India
		6.2 Ways to Protect Ourselves
	7 Conclusion
	References
A Comparative Study on Different Techniques of Sentimental Analysis
	1 Introduction
	2 Related Work
	3 Methods Under Comparison for Sentimental Analysis
		3.1 Machine Learning
		3.2 Stanford NLP Libraries
		3.3 Sentimental Sentence Dictionary
	4 Analysis Survey
	5 Discussion
	6 Conclusion
	References
An Approach to Select the Proper Combination within Positional and Non-positional Average Values of Features in Protein Classification
	1 Introduction
	2 Literature Review
	3 Positional-Average Molecular Weight & Positional-Average Isoelectric Point: The Feature Values of Protein Classification
	4 Problem Identification Along with Research Methodology
	5 Experimental Result
	6 Conclusion
	References
Areca Nut Disease Detection Using Image Processing
	1 Introduction
	2 Related Work
	3 Problem Definition
	4 Background Process
		4.1 Segmentation
		4.2 Feature Extraction
		4.3 Spot Region Detection
	5 Conclusion
	References
Simulink Simulation for Predicting Thermodynamic Properties of Water–Lithium Bromide Solution Using ANN
	1 Introduction
	2 Artificial Neural Network
	3 MATLAB/Simulink Environment
	4 Results and Analysis
		4.1 Training and Validation of ANN
	5 Conclusions
	References
A New Bit Plane Specific Longest Repeating Pattern Test for Statistical Analysis of Bit Sequences
	1 Introduction
	2 Background
		2.1 Bit Plane
		2.2 Chi-Square (χ2) Goodness of Fit
	3 Proposed Bit Plane Specific Statistical Test
	4 Experimental Setup
	5 Experimental Results
		5.1 Performance of LRP Test Over NIST Suite
	6 Conclusion
	References
Intelligent Interference Minimization Algorithm for Optimal Placement of Sensors using BBO
	1 Introduction
	2 Related Work
	3 Classical Biogeography-Based Optimization
		3.1 Migration Phase
		3.2 Mutation Phase
	4 Network Model and Problem Formulation
		4.1 Network Model
		4.2 Problem Formulation
	5 Proposed BBO-Based Algorithm
		5.1 Encoding of Habitats
		5.2 Initialization of Habitats
		5.3 Derivation of Fitness Function
		5.4 Migration
		5.5 Mutation
	6 Results and Discussion
	7 Conclusion
	References
Classification of SOA-Based Cloud Services Using Data Mining Technique
	1 Introduction
	2 Proposed Approach
	3 Experiments and Analysis
	4 Related Work
	5 Conclusion
	References
A Novel Clustering-Based Gene Expression Pattern Analysis for Human Diabetes Patients Using Intuitionistic Fuzzy Set and Multigranulation Rough Set Model
	1 Introduction
	2 Preliminaries
		2.1 Construction of Intuitionistic Fuzzy Set
		2.2 Rough Set Model for Microarray
	3 Proposed Methodology
		3.1 Preprocessing
		3.2 Conversion to Fuzzy and IFS Plane
		3.3 Multigranulation Rough-Fuzzy c-Means Clustering
	4 Experimental Results and Discussion
		4.1 Description of Datasets
		4.2 Performance Evaluation Metrics and Baseline Methods
		4.3 Gene Clustering Analysis
		4.4 Validation
	5 Conclusion
	References
Investigation on HRV Signal Dynamics for Meditative Intervention
	1 Introduction
	2 Materials and Methods
		2.1 Time Domain Parameters
		2.2 Frequency Domain Parameters
		2.3 Nonlinear Dynamical Parameters
	3 Results and Discussion
	4 Conclusion
	References
A Review on Deep Learning-Based Channel Estimation Scheme
	1 Introduction
	2 Channel Estimation Theory
	3 The Overview of Different Deep Learning-Based Algorithms for Channel Estimation
	4 Open Research Challenges
	5 Conclusion
	References
Patient Diabetes Forecasting Based on Machine Learning Approach
	1 Introduction
	2 Literature Review
	3 Diabetes Forecasting System Model
	4 Investigational System and Method
		4.1 Software Used
		4.2 Experimental Setup
		4.3 Machine Learning Algorithms Used for Experimental Setup
	5 Discussion and Conclusion
	References
Pose Invariant Face Recognition Using Principal Component Analysis
	1 Introduction
	2 Proposed Methodology
		2.1 Face Frontalization
		2.2 Face Recognition
	3 Experimental Evaluation
	4 Results
		4.1 Comparison on Color FERET Dataset
	5 Conclusions
	References
An Autonomic Resource Allocation Framework for Service-Based Cloud Applications: A Proactive Approach
	1 Introduction
	2 Literature Survey
	3 Autonomic Resource Allocation Framework
		3.1 Mathematical Model
		3.2 Monitor Phase
		3.3 Analysis Phase
		3.4 Planner Phase
		3.5 Executor Phase
	4 Simulation Setup and Results Analysis
	5 Conclusions and Future Work
	References
Index Point Detection and Semantic Indexing of Videos—A Comparative Review
	1 Introduction
	2 Motivation
	3 Video Structure Analysis
	4 Literature Review
		4.1 Online Video Lecture
		4.2 Video Segmentation
		4.3 Text and Feature Extraction for Videos
		4.4 Text Similarity
		4.5 Video Indexing
		4.6 Learning in Video Analysis
	5 Conclusion
	References
Classification of Neuromuscular Disorders Using Machine Learning Techniques
	1 Introduction
	2 Literature Survey
	3 Research Methodology
		3.1 Data Preparation
		3.2 Tools
		3.3 Feature Selection
		3.4 Confusion Matrix
		3.5 Performance Evaluation
		3.6 Evaluation Metrics
		3.7 Results
	4 Conclusion and Future Work
	References
Comparative Study of the Ultrasonic and Infrared Person Counter
	1 Introduction
	2 Hardware Components for Counter
		2.1 Arduino UNO R3 Board
		2.2 LCD Display
		2.3 IR Sensor
		2.4 Ultrasonic Sensor
		2.5 Jumper Wires
		2.6 Breadboard
		2.7 Arduino USB Cable
	3 Circuit Diagram
	4 Methodology
	5 Types of Counter
		5.1 Infrared Sensor
		5.2 Ultrasonic Sensor
	6 Conclusion
	References
Fuzzy Logic Based Improved Control Design Strategy for MPPT of Solar PV Systems
	1 Introduction
	2 Photovoltaic System Description and Characteristics
	3 Proposed Methodology for Fuzzy Logic Controller of MPPT
	4 DC-DC Converter Analysis
	5 Boost Converter
	6 PI Controller for Buck Converter
	7 Performance Evaluation and Discussion
	8 Conclusion
	References
Evaluation of Soil Physical, Chemical Parameter and Enzyme Activities as Indicator of Soil Fertility with SFM Model in IA–AW Zone of Rajasthan
	1 Introduction
	2 Materials and Methods
		2.1 Study Area
		2.2 Climate and Vegetation
		2.3 Soil Sampling
		2.4 Method of Physico-chemical and Enzyme Activities
		2.5 Statistical Analysis
		2.6 SFM Model
	3 Result and Discussions
		3.1 Physical Parameter Evaluation of Farm Land Soil (FLS)
		3.2 Physical Parameter Evaluation of Waste Land Soil (WLS)
		3.3 Chemical Parameter Evaluation of Farm Land Soil (FLS)
		3.4 Chemical Parameter Evaluation of Waste Land Soil (WLS)
		3.5 Enzyme Activities Evaluation of Farm Land Soil (FLS)
		3.6 Enzyme Activities Evaluation of Waste Land Soil (WLS)
		3.7 DI Value Between FLS and WLS
		3.8 Data Analysis by SFM Model
	4 Conclusions
	References
Author Index




نظرات کاربران