دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: P. Karuppusamy, Isidoros Perikos, Fuqian Shi, Tu N. Nguyen سری: Lecture Notes on Data Engineering and Communications Technologies ISBN (شابک) : 9789811586767, 9789811586774 ناشر: Springer سال نشر: 2021 تعداد صفحات: 681 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 28 مگابایت
در صورت تبدیل فایل کتاب Sustainable Communication Networks and Application: Proceedings of ICSCN 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه های ارتباطی پایدار و کاربرد: مجموعه مقالات ICSCN 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Foreword Preface Acknowledgements Contents About the Editors A Long Short-Term Memory (LSTM) Model for Business Sentiment Analysis Based on Recurrent Neural Network 1 Introduction 2 Related Work 3 Methodology 3.1 Discussion About RNN and LSTM Architecture 3.2 Data Processing 3.3 Training the Model 3.4 Testing the Model 4 Implementation Tools 5 Result and Analysis 5.1 Experimental Dataset 5.2 Experiment Results Analysis 6 Comparison 7 Conclusion References An Automatic Violence Detection Technique Using 3D Convolutional Neural Network 1 Introduction 2 Related Works 3 Proposed Model 3.1 Processing 3.2 Training the Model 3.3 Testing New Video Data 4 Result and Analysis 4.1 Implementation Tools 4.2 Experimental Data Set 4.3 Performance Analysis 5 Comparison 6 Conclusion References An Online E-Cash Scheme with Digital Signature Authentication Cryptosystem 1 Introduction 2 Related Work 3 Basic Model 4 System Operation 4.1 System Design 4.2 Hash Function 4.3 Payment Gateway 4.4 Limitation of Some Research Works 4.5 Proof of Work 4.6 System Algorithm 5 Cryptocurrency Market Analysis 6 Observation 7 Advantages 8 Conclusion 9 Future Work References Smart Electrification of Rural Bangladesh Through Smart Grids 1 Introduction 2 Existing Power Scenario of Bangladesh 3 Renewable Energy Scenario in Bangladesh 3.1 Solar Energy 3.2 Biomass Energy 3.3 Wind Energy 3.4 Hydro Energy 4 Framework of Smart Grid 5 Smart Grid Prototype for Rural Areas of Bangladesh 5.1 Structure of Smart Grid Prototype 5.2 Prototype of DC Grid 5.3 Synchronization of Voltage, Frequency and Phase 5.4 Control of Harmonics 5.5 Managing the Prototype with Hybrid Energy Sources 5.6 Synchronization for AC Grid 5.7 Incorporating Irrigation Pumps 5.8 Protective Mechanism 5.9 Load-Energy Economy 5.10 Local Energy Economy 6 Smart Grid and the Internet of Things (IoT) 7 Conclusion References Dissimilar Disease Detection Using Machine Learning Techniques for Variety of Leaves 1 Introduction 1.1 Motivation 1.2 Problem Statement 2 Literature Survey 3 Proposed Methodology 3.1 Image Acquisition 3.2 Preprocessing 3.3 Feature Extraction 3.4 Classification 4 Experimental Results 4.1 Performance Parameter 4.2 Accuracy 5 Conclusion References Face Aging Through Uniqueness Conserving by cGAN with Separable Convolution 1 Introduction 2 Related Work 2.1 Face Aging 2.2 Generative Adversarial Network 2.3 Age Estimation 3 Methodology 3.1 Style Transfer 3.2 Generator 3.3 Discriminator 3.4 Age Classification 4 Implementation 4.1 Dataset 4.2 Conditional GAN 5 Results 6 Conclusion References A Wearable System Design for Epileptic Seizure Detection 1 Introduction 2 Literature Survey 3 Proposed Work 4 Technology Used 5 Results and Discussions 5.1 Graphical Representation of Obtained Muscle Contraction Value 5.2 Graphical Representation of Obtained Body Temperature Value 5.3 Graphical Representation of Obtained Heart Rate and Pulse Oxidation Value 6 Conclusion References Abatement of Traffic Noise Pollution on Educational Institute and Visualization by Noise Maps Using Computational Software: A Case Study 1 Introduction 2 Study Area 3 Materials and Method 4 Noise Mapping 5 Results and Discussion 5.1 Assessment of Noise Barrier Height and Location 6 Conclusion References RainRoof: Automated Shared Rainwater Harvesting Prediction 1 Introduction 2 Related Work 3 Methodology 3.1 Rooftop Segmentation 3.2 Instance Segmentation 3.3 Roof Catchment Area Estimation 3.4 Lowest Elevation Point Estimation 3.5 Break-Even Analysis and Underground Mapping 3.6 Rainfall Estimation 4 Formulas 5 Results and Discussion 6 Conclusion References A Smart Biometric-Based Public Distribution System with Chatbot and Cloud Platform Support 1 Introduction 2 Related Work 3 Proposed System 4 Implementation 4.1 Hardware Implementation 4.2 Software Implementation 5 Experimental Setup and Results 6 Conclusion References Performance Evaluation of Clustering Techniques for Financial Crisis Prediction 1 Introduction 2 Related Works 3 Clustering Algorithms 3.1 K-means Clustering 3.2 Farthest First Clustering 4 Results and Discussion 5 Conclusion References Optimization of Job Scheduling with Dynamic Bees Approach 1 Introduction 2 Multiheuristic Approach to Job Execution 2.1 Genetic Algorithm-Based Job Execution 2.2 Particle Swarm Optimization (PSO) 2.3 Bees Algorithm for Job Scheduling 3 Problem Definition 3.1 Difference in Static and Dynamic Bees Approach 4 Mathematical Foundation and Proposed Work 4.1 Mathematical Foundation 4.2 Proposed Work 5 Performance Analysis and Result 6 Conclusion and Future Scope References Enhancing Cloud Security Using Secured Binary-DNA Approach with Impingement Resolution and Complex Key Generation 1 Introduction 2 Literature Survey 2.1 Level 1 Security Mechanisms 2.2 Level 2 Security Mechanisms 2.3 Level 3 Security Mechanism 2.4 Phases of BDNA Approach 3 Proposed System 3.1 Handling Impingements 3.2 Excess 3 Encoding 3.3 Proposed Model 4 Performance Analysis and Results 5 Conclusion and Future Scope References A Survey of Blockchain Technology Applications and Consensus Algorithm 1 Introduction 2 Overview of Blockchain Technology 3 Types of Blockchain 3.1 Permissionless Blockchain 3.2 Permission Blockchain 3.3 Federated Blockchain 4 Types of Consensus Algorithm 4.1 Proof of Work (POW) 4.2 Proof of Stake (POS) 4.3 Delegated Proof of Stake (DPOS) 4.4 Leased Proof of Stake (LPOS) 4.5 Proof of Elapsed Time (POET) 4.6 Practical Byzantine Fault Tolerance (PBFT) 4.7 Simplified Byzantine Fault Tolerance (SBFT) 4.8 Delegated Byzantine Fault Tolerance (DBFT) 4.9 Proof of Activity (POA) 4.10 Proof of Importance (POI) 4.11 Proof of Capacity (POC) 5 Applications of Blockchain Technology 5.1 Healthcare 5.2 Finance 5.3 Internet of Things (IoT) 5.4 Supply Chain Management 5.5 Government 5.6 Cloud Computing 5.7 Commercial 6 Conclusion References FPGA Implementatıon of Turbo Product Codes for Error Correctıon 1 Introduction 2 Literature Survey 3 Turbo Product Codes Encoding 3.1 How to Form TPC? 3.2 Parity Calculation 3.3 The Decoder 3.4 Step-by-Step Decoding Procedure 3.5 Flow Chart of the Proposed Method 4 Simulations and Results 5 Conclusion References FetchZo: Real-Time Mobile Application for Shopping in COVID-19 Pandemic Situation 1 Introduction 2 Literature Review 3 Overview of Fetchzo Application 4 Implementations of Fetchzo Application 4.1 FetchZo Algorithm 4.2 Detecting the Nearest Shop with the Given Location 4.3 Calculating the Least Number of People in the Shop 4.4 Attaching a Token 5 Results and Snapshots 5.1 At Customer Side 5.2 Shop Keeper Side 6 Conclusion References An Emerging Trust-Based Security on Wireless Body Area Network 1 Introduction 2 Related Work 2.1 Trust and Security Issues 2.2 Proposed Methodology 3 Proposed Work 3.1 Public Key Cryptography 3.2 Public Key Encryption 3.3 Elliptic Curve Diffie Hellman Key Exchange Algorithm 3.4 Digital Signature 3.5 Protocol Design 3.6 Trusted Anonymous Route-Request 3.7 Trusted Routing Procedure 4 Experimental Result 5 Conclusion References Preventing Fake Accounts on Social Media Using Face Recognition Based on Convolutional Neural Network 1 Introduction 2 Problem Identification 2.1 Online Social Network (OSN) 2.2 Fake Profile 2.3 Approach to Solve 3 Literature Survey 3.1 Sarah Khaled, Neamat El-Tazi and Hoda M. O. Mokhtar 3.2 Mudasir Ahmad wania, Nancy Agarwala & Suraiya Jabinb Syed Zeeshan Hussainb 3.3 Estée van der Walt and Jan Eloff 3.4 Gayathri A, Radhika S & Mrs. Jayalakshmi S. L. 4 Techniques Used in Literature Survey 4.1 Support Vector Machine–Neural Networks 4.2 Random Forest 4.3 Artificial Neural Networks 4.4 Feature Detection 4.5 Feature Extraction 4.6 Classification 5 Proposed Methodology 5.1 Proposed Algorithm 5.2 Data Collection 5.3 Optimization 5.4 Face Detection 5.5 Face Recognition 5.6 Age Classification 5.7 Profile Detection 5.8 Profile Association 6 Future Scope 7 Conclusion References Error Correction Technique Using Convolution Encoder with Viterbi Decoder 1 Introduction 2 Convolutional Encoder 3 Viterbi Algorithm 3.1 Branch Metric Unit 3.2 Path Metric Unit 3.3 Survivor Memory Unit 4 Implementation Results and Analysis 5 Device Utilization and Power Consumption 6 Conclusion References Rice Grain Quality Determination Using Probabilistic Neural Networks 1 Introduction 2 Review of the State of the Art Techniques 3 Probabilistic Neural Networks: A Discussion 4 Methodology 5 Results 6 Conclusion and Future Work References Maintenance of Automobiles by Predicting System Fault Severity Using Machine Learning 1 Introduction 2 Literature Survey 3 Proposed Real-Time System 4 Data Generation 5 Feature Selection 6 Fault Imputations and Modeling 7 Results 8 Confusion Matrices 9 Conclusion 10 Future Scope References Endoscopic Wireless Capsule Compressor: A Review of the Existing Image and Video Compression Algorithms 1 Introduction 2 Wireless Capsule Endoscope System 3 Compression Principles Suitable for WCE 4 WCE Image Compression Techniques 4.1 Lossless Image Compression Techniques 4.2 Lossy Image Compression Techniques 4.3 Comprehensive View of the Existing Compression Algorithms 5 Future Scope and Conclusion References Design of Retrodirective Arrays Using Hybrid Couplers for Autonomous Car 1 Introduction 2 Hybrid Couplers as Retrodirective Array 3 Design and Evaluation 3.1 Coupler Design 4 Results and Discussion 4.1 Return Loss 4.2 Radiation Pattern 5 Conclusion References Enhanced Analysis of Brain MR Images for Detection of Abnormal Tissues Using Deep Learning 1 Introduction 2 Segmentation Methods—A Survey 3 Approaches Towards Deep Learning 3.1 Convolutional Neural Networks 3.2 Deep Belief Networks 3.3 Deep Neural Networks 4 Research Findings 5 Materials and Methods 6 Experiments and Results 7 Conclusions References A Comprehensive Study Toward Women Safety Using Machine Learning Along with Android App Development 1 Introduction 2 Literature Review 3 Proposed Model 4 Methodology Adopted for Machine Learning-Based Backend 4.1 Collection of Seed Data 4.2 Selection of Machine Learning Algorithm 5 Architecture and App Development 5.1 Implementation of App 5.2 Features of Android Application 6 Results and Discussion 7 Conclusion and Scope for Future Work References Automated Plant Disease Identification and Detection with Multi-features 1 Introduction 2 Related Work 3 Proposed Work 3.1 SOBEL Edge Detector 3.2 Algorithm—Multi-feature Identification 4 Performance Evaluation 5 Conclusion References Deep Learning Techniques for Optical Character Recognition 1 Introductıon 1.1 Digitization 1.2 Preproceesing 1.3 Segmentation 1.4 Feature Extraction 1.5 Classification 2 Different Algorithms 2.1 HWCR Using Bayesian Classifier 2.2 HWCR Using Zoning Features 2.3 HWCR Bayesian Decision Theory 2.4 Online HWCR Using Support Vector Machines 2.5 Preprocessing 2.6 Stroke Pre-classification 2.7 Stroke Recognition Based On SVM 2.8 Character Recognition Based on SVM 2.9 Comparison between different algorithms 3 Conclusion References Toward Effectual Group Formation Method for Collaborative Learning Environment 1 Introduction 2 Related Work 3 Genetic Algorithm 4 Proposed Approach 5 Experimental Results 6 Conclusion References On Total Domination Number of Hypercube and Enhanced Hypercube Networks 1 Introduction 2 Hypercube Network 3 Enhanced Hypercube Network 4 Conclusion References Neural Network-Based Classification of Toxic Gases for a Sensor Array 1 Introduction 2 Experimental Method 2.1 Gas Sensor and Electronic Nose 2.2 Preprocessing 2.3 ANN Model for Classification 3 Simulation Results 4 Conclusion References Effect of Negative Capacitance MOSFET Devices on Circuit Applications 1 Introduction 2 Modeling of Negative Capacitance 2.1 Experimental Settings: Cadence Tool 3 Analysis of NCFET 3.1 Effect of Ferroelectric Thickness 3.2 Effect of α 3.3 Effect of β 3.4 Effect of γ 4 Implementation of NCFET in Circuits 5 Conclusion References A Verification of Pattern-Oriented Healthcare System Using CPN Tool 1 Introduction 2 Related Work 3 Research Contribution 4 System Design 4.1 Diagnosis Pattern 4.2 Decision Support Pattern 4.3 Health Insurance Pattern 5 Verification of Pattern-Oriented Healthcare System 5.1 Verification Design 5.2 Verification Result 5.3 Result of Diagnosis Pattern 5.4 Result of Decision Support Pattern 5.5 Result of Health Insurance Pattern 6 Conclusion References Analysis of Groundnut Based Bio Modified Liquid Insulation for High Voltage Transformer 1 Introduction 2 Sample Descriptions 3 Experimental Section 3.1 Viscosity 3.2 Breakdown Voltage 3.3 Flash Point 3.4 Pour Point 3.5 Density 4 Result and Discussion 5 Conclusion References Identification of Key Parameters Contributing to Technical Debt in Software Using Rank-Based Optimization 1 Introduction 2 Related Work 3 Data Analysis and Methodology 3.1 Dataset 3.2 Finding Correlation 3.3 Checking Technical Debt 3.4 Data Collection 3.5 Metrics 4 Results and Discussion 4.1 New Versus Old Bugs 4.2 Bug Burndown 4.3 Level of High-Need Bugs 4.4 Code Smells 4.5 Code Coverage 4.6 Classification Accuracy Using Different Classifiers 5 Conclusion and Future Scope References An e-Voting Model to Preserve Vote Integrity Employing SHA3 Algorithm 1 Introduction 2 Background Study 3 Proposed Model 4 Results 5 Conclusion References Detection of Threshold Fall Angle of Elderly Patients for Protective Suit Purposes 1 Introduction 2 Proposed to Enhance Fall Detection System 2.1 Block Diagram 2.2 Experiment 2.3 Image Segmentation 2.4 Threshold Angle Calculation 3 Result and Discussion 4 Conclusion and Future Works References Toxic Comment Classification Using Hybrid Deep Learning Model 1 Introduction 2 Related Work 3 Methodology 3.1 Dataset Used 3.2 Data Preprocessing 3.3 Embedding Layer 3.4 Convolution Layer 3.5 Max-Pooling Layer 3.6 Bidirectional-GRU Layer 3.7 Global Max-Pooling Layer 3.8 Dense Layer 1 3.9 Dropout Layer 3.10 Dense Layer 2 4 Implementation 4.1 Dataset Used 4.2 Data Preprocessing 4.3 Embedding Layer 4.4 Convolution Layer 4.5 Max-Pooling Layer 4.6 Bidirectional-GRU Layer 4.7 Global Max-Pooling Layer 4.8 Dense Layer 1 4.9 Dropout Layer 4.10 Dense Layer 2 5 Result and Analysis 6 Conclusion and Future Work Reference Research and Development in the Networks of Cognitive Radio: A Survey 1 Basics of Cognitive Networks 2 Ideology of Cognitive Radio and Dynamic Spectrum Access 2.1 Spectrum Sensing 2.2 Spectrum Analysis 2.3 Spectrum Access 2.4 Spectrum Mobility 3 Cognitive Radio Network Blocks 3.1 Physical Layer 3.2 MAC Layer 3.3 Network Layer 3.4 Transport Layer 4 Spectrum Sharing in Cognitive Radio Networks 4.1 Spectrum Sensing 4.2 Interference Modeling 5 Metrics for Performance Evaluation in CR 6 Types of Modulation for Cognitive Radio Networks 7 Developments and Security Considerations in Cognitive Radio Networks 8 Financially Viable CRN 8.1 Spectrum Auction 9 Conclusion and Future Scope References Ensemble Method for Identification and Automatic Production of Related Words for Historical Linguistics 1 Introduction 2 Related Works—Identification of Words 3 Production of Related Words 4 Building Dataset of Related Words 4.1 Steps for Cognate Pair Identification 4.2 Calculation of Accuracies for Different Linguistic Datasets 5 Automatic Recognition of Related Words 5.1 String Alignment 5.2 Feature Extraction 5.3 Learning Algorithms 5.4 Evaluation Measures 5.5 Task Set-up 6 Linguistic Factors 7 Proto-words Reconstruction 7.1 Fusion by Rank 7.2 Fusion by Rank and Accuracy 7.3 Fusion by Weight 7.4 Fusion by Weight and Accuracy 8 Modern Word Production 8.1 Cognates Production 9 Automatic Related Word Production 9.1 Conditional Random Fields 9.2 Pairwise Sequence Alignment 9.3 Evaluation Measures 10 Conclusion References A Robust Lightweight Algorithm for Securing Data in Internet of Things Networks 1 Introduction 2 Proposed Algorithm 2.1 Key Expansion Block 2.2 Encryption Process 2.3 When Decryption Process 3 Analytical Comparison of Symmetric Key Algorithm for IoT Proposed Algorithm 3.1 Result and Analysis 4 Conclusion and Future Work References UAV Communication Network: Power Optimization and End-To-End Delay 1 Introduction 1.1 Advantages and Applications of UAVS 2 Related Work 3 Problem Statement 3.1 Existing System 3.2 Proposed System 4 Methodology 5 Results 5.1 Snapshots 6 Conclusion References Improving the QoS of Multipath Routing in MANET by Considering Reliable Node and Stable Link 1 Introduction 2 Related Work 3 Proposed Work 4 Result Analysis 5 Conclusions References A Novel Approach to Detect, Characterize, and Analyze the Fake News on Social Media 1 Introduction 1.1 Importance of Detecting Fake News 2 Fake News Characterization 2.1 Fake News Generators and Publishers 2.2 News Content 3 Fake News Detection—Practical-Based Approaches 3.1 Online Fact-Checking Resources 4 Fake News Detection—Research-Based Approaches 4.1 Component Established Type 4.2 Data Mining Established Type 4.3 Implement Established Type 5 Future Research and Open Challenges 5.1 Unsupervised Learning for Fake News Analysis 5.2 Evaluation of Fake News Detection System 6 Conclusion References A Novel Design for Real-Time Intrusion Response in Latest Software-Defined Networks by Graphical Security Models 1 Introduction 2 Related Work 3 A Framework for Real-Time Intrusion Response in SDN 3.1 SDN Configuration 3.2 Security Modeling and Analysis 3.3 Intrusion Detection 3.4 Attack Response 4 Real-Time Intrusion Response in SDN 4.1 SDN Configuration 4.2 Security Modeling and Analysis 4.3 Intrusion Detection 5 Precomputation and Attack Prediction for Security Assessment 6 Result and Analysis 7 Conclusion References Implementation and Analysis of Dynamic Spectrum Sharing for Different Radio Access Technologies 1 Introduction 2 Dynamic Spectrum Sharing 2.1 Overview 2.2 DSS GSM-LTE Solution 3 Implementation 3.1 Frequency Calculation 3.2 Site Creation 3.3 GSM-LTE DSS Setup Configuration 3.4 Procedure for GSM-LTE DSS Feature Activation 4 Results and Discussion 4.1 Wireshark Log Analysis 4.2 BTS Log Analysis 4.3 Spectrum Analyzer Outputs 5 Conclusion References TAMIZHİ: Historical Tamil Brahmi Handwritten Dataset 1 Introduction 2 Handwritten Script Recognition Methods 3 Data Collectıon Methodology 3.1 Layout of the Input Sheet 3.2 Grid Segmentation 3.3 Hough Line Transform 4 Conclusion References Performance Analysis of Channel Estimation Techniques for High-Speed Railway Networks 1 Introduction 2 System Model 2.1 GSM-OFDM 2.2 HSR Wireless Communication System 3 Channel Estimation Technique for GSM-OFDM System 3.1 Proposed System Model 3.2 Block Pilot-Based Channel Estimation 3.3 Mixed Interpolation Method 4 GSM-OFDM Signal Detection Scheme 5 Simulation Results 6 Conclusion References Risk Assessment System for Prevention of Decubitus Ulcer 1 Introduction 2 Background 3 Existing Assessment Methodologies 4 Proposed System 5 Technical Requirements 6 Software Requirement 7 Braden Scale Risk Assessment 8 Hardware Setup 9 Experimental Analysis 10 Conclusion References Faulty Node Detection Using Vertex Magic Total Labelling in Distributed System 1 Introduction 2 Literature Survey 3 Working Methodology 4 Results and Discussion 5 Conclusion References Taxonomy of Diabetic Retinopathy Patients Using Biogeography-Based Optimization on Support Vector Machine Based on Digital Retinal Images 1 Introduction 2 Naïve Bayes Classifier 3 Results and Discussions 4 Performance Measures References An Efficient Energy Management of Hybrid Renewable Energy Sources Based Smart-Grid System Using an IEPC Technique 1 Introduction 2 Recent Research Works: A Brief Review 2.1 Background of the Research Work 3 Mathematical Formulation of Energy Management 4 Optimal Energy Management of Smart Grid with IEPC Technique 4.1 Emperor Penguin Colonies Optimization 5 Result and Discussion 6 Conclusion References Brain–Computer Interfaces and Neurolinguistics: A Short Review 1 Introduction 2 Brain–Computer Interfaces Systems (BCIs) 2.1 Types of Brain–Computer Interfaces Systems 3 Types of Brain Imaging Techniques 4 Literature Review 5 Discussion 6 Conclusion References An Efficacious Method for Face Recognition Using DCT and Neural Network 1 Introduction 2 Related Work 2.1 DCT 2.2 ANN Using MLP with Back Propagation Algorithm 3 Proposed Method 4 Experimental Setup and Results 5 Conclusion References Author Index