ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Sustainable Communication Networks and Application: Proceedings of ICSCN 2020

دانلود کتاب شبکه های ارتباطی پایدار و کاربرد: مجموعه مقالات ICSCN 2020

Sustainable Communication Networks and Application: Proceedings of ICSCN 2020

مشخصات کتاب

Sustainable Communication Networks and Application: Proceedings of ICSCN 2020

ویرایش: 1 
نویسندگان: , , ,   
سری: Lecture Notes on Data Engineering and Communications Technologies 
ISBN (شابک) : 9789811586767, 9789811586774 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 681 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 28 مگابایت 

قیمت کتاب (تومان) : 47,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 4


در صورت تبدیل فایل کتاب Sustainable Communication Networks and Application: Proceedings of ICSCN 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب شبکه های ارتباطی پایدار و کاربرد: مجموعه مقالات ICSCN 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Foreword
Preface
Acknowledgements
Contents
About the Editors
A Long Short-Term Memory (LSTM) Model for Business Sentiment Analysis Based on Recurrent Neural Network
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Discussion About RNN and LSTM Architecture
		3.2 Data Processing
		3.3 Training the Model
		3.4 Testing the Model
	4 Implementation Tools
	5 Result and Analysis
		5.1 Experimental Dataset
		5.2 Experiment Results Analysis
	6 Comparison
	7 Conclusion
	References
An Automatic Violence Detection Technique Using 3D Convolutional Neural Network
	1 Introduction
	2 Related Works
	3 Proposed Model
		3.1 Processing
		3.2 Training the Model
		3.3 Testing New Video Data
	4 Result and Analysis
		4.1 Implementation Tools
		4.2 Experimental Data Set
		4.3 Performance Analysis
	5 Comparison
	6 Conclusion
	References
An Online E-Cash Scheme with Digital Signature Authentication Cryptosystem
	1 Introduction
	2 Related Work
	3 Basic Model
	4 System Operation
		4.1 System Design
		4.2 Hash Function
		4.3 Payment Gateway
		4.4 Limitation of Some Research Works
		4.5 Proof of Work
		4.6 System Algorithm
	5 Cryptocurrency Market Analysis
	6 Observation
	7 Advantages
	8 Conclusion
	9 Future Work
	References
Smart Electrification of Rural Bangladesh Through Smart Grids
	1 Introduction
	2 Existing Power Scenario of Bangladesh
	3 Renewable Energy Scenario in Bangladesh
		3.1 Solar Energy
		3.2 Biomass Energy
		3.3 Wind Energy
		3.4 Hydro Energy
	4 Framework of Smart Grid
	5 Smart Grid Prototype for Rural Areas of Bangladesh
		5.1 Structure of Smart Grid Prototype
		5.2 Prototype of DC Grid
		5.3 Synchronization of Voltage, Frequency and Phase
		5.4 Control of Harmonics
		5.5 Managing the Prototype with Hybrid Energy Sources
		5.6 Synchronization for AC Grid
		5.7 Incorporating Irrigation Pumps
		5.8 Protective Mechanism
		5.9 Load-Energy Economy
		5.10 Local Energy Economy
	6 Smart Grid and the Internet of Things (IoT)
	7 Conclusion
	References
Dissimilar Disease Detection Using Machine Learning Techniques for Variety of Leaves
	1 Introduction
		1.1 Motivation
		1.2 Problem Statement
	2 Literature Survey
	3 Proposed Methodology
		3.1 Image Acquisition
		3.2 Preprocessing
		3.3 Feature Extraction
		3.4 Classification
	4 Experimental Results
		4.1 Performance Parameter
		4.2 Accuracy
	5 Conclusion
	References
Face Aging Through Uniqueness Conserving by cGAN with Separable Convolution
	1 Introduction
	2 Related Work
		2.1 Face Aging
		2.2 Generative Adversarial Network
		2.3 Age Estimation
	3 Methodology
		3.1 Style Transfer
		3.2 Generator
		3.3 Discriminator
		3.4 Age Classification
	4 Implementation
		4.1 Dataset
		4.2 Conditional GAN
	5 Results
	6 Conclusion
	References
A Wearable System Design for Epileptic Seizure Detection
	1 Introduction
	2 Literature Survey
	3 Proposed Work
	4 Technology Used
	5 Results and Discussions
		5.1 Graphical Representation of Obtained Muscle Contraction Value
		5.2 Graphical Representation of Obtained Body Temperature Value
		5.3 Graphical Representation of Obtained Heart Rate and Pulse Oxidation Value
	6 Conclusion
	References
Abatement of Traffic Noise Pollution on Educational Institute and Visualization by Noise Maps Using Computational Software: A Case Study
	1 Introduction
	2 Study Area
	3 Materials and Method
	4 Noise Mapping
	5 Results and Discussion
		5.1 Assessment of Noise Barrier Height and Location
	6 Conclusion
	References
RainRoof: Automated Shared Rainwater Harvesting Prediction
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Rooftop Segmentation
		3.2 Instance Segmentation
		3.3 Roof Catchment Area Estimation
		3.4 Lowest Elevation Point Estimation
		3.5 Break-Even Analysis and Underground Mapping
		3.6 Rainfall Estimation
	4 Formulas
	5 Results and Discussion
	6 Conclusion
	References
A Smart Biometric-Based Public Distribution System with Chatbot and Cloud Platform Support
	1 Introduction
	2 Related Work
	3 Proposed System
	4 Implementation
		4.1 Hardware Implementation
		4.2 Software Implementation
	5 Experimental Setup and Results
	6 Conclusion
	References
Performance Evaluation of Clustering Techniques for Financial Crisis Prediction
	1 Introduction
	2 Related Works
	3 Clustering Algorithms
		3.1 K-means Clustering
		3.2 Farthest First Clustering
	4 Results and Discussion
	5 Conclusion
	References
Optimization of Job Scheduling with Dynamic Bees Approach
	1 Introduction
	2 Multiheuristic Approach to Job Execution
		2.1 Genetic Algorithm-Based Job Execution
		2.2 Particle Swarm Optimization (PSO)
		2.3 Bees Algorithm for Job Scheduling
	3 Problem Definition
		3.1 Difference in Static and Dynamic Bees Approach
	4 Mathematical Foundation and Proposed Work
		4.1 Mathematical Foundation
		4.2 Proposed Work
	5 Performance Analysis and Result
	6 Conclusion and Future Scope
	References
Enhancing Cloud Security Using Secured Binary-DNA Approach with Impingement Resolution and Complex Key Generation
	1 Introduction
	2 Literature Survey
		2.1 Level 1 Security Mechanisms
		2.2 Level 2 Security Mechanisms
		2.3 Level 3 Security Mechanism
		2.4 Phases of BDNA Approach
	3 Proposed System
		3.1 Handling Impingements
		3.2 Excess 3 Encoding
		3.3 Proposed Model
	4 Performance Analysis and Results
	5 Conclusion and Future Scope
	References
A Survey of Blockchain Technology Applications and Consensus Algorithm
	1 Introduction
	2 Overview of Blockchain Technology
	3 Types of Blockchain
		3.1 Permissionless Blockchain
		3.2 Permission Blockchain
		3.3 Federated Blockchain
	4 Types of Consensus Algorithm
		4.1 Proof of Work (POW)
		4.2 Proof of Stake (POS)
		4.3 Delegated Proof of Stake (DPOS)
		4.4 Leased Proof of Stake (LPOS)
		4.5 Proof of Elapsed Time (POET)
		4.6 Practical Byzantine Fault Tolerance (PBFT)
		4.7 Simplified Byzantine Fault Tolerance (SBFT)
		4.8 Delegated Byzantine Fault Tolerance (DBFT)
		4.9 Proof of Activity (POA)
		4.10 Proof of Importance (POI)
		4.11 Proof of Capacity (POC)
	5 Applications of Blockchain Technology
		5.1 Healthcare
		5.2 Finance
		5.3 Internet of Things (IoT)
		5.4 Supply Chain Management
		5.5 Government
		5.6 Cloud Computing
		5.7 Commercial
	6 Conclusion
	References
FPGA Implementatıon of Turbo Product Codes for Error Correctıon
	1 Introduction
	2 Literature Survey
	3 Turbo Product Codes Encoding
		3.1 How to Form TPC?
		3.2 Parity Calculation
		3.3 The Decoder
		3.4 Step-by-Step Decoding Procedure
		3.5 Flow Chart of the Proposed Method
	4 Simulations and Results
	5 Conclusion
	References
FetchZo: Real-Time Mobile Application for Shopping in COVID-19 Pandemic Situation
	1 Introduction
	2 Literature Review
	3 Overview of Fetchzo Application
	4 Implementations of Fetchzo Application
		4.1 FetchZo Algorithm
		4.2 Detecting the Nearest Shop with the Given Location
		4.3 Calculating the Least Number of People in the Shop
		4.4 Attaching a Token
	5 Results and Snapshots
		5.1 At Customer Side
		5.2 Shop Keeper Side
	6 Conclusion
	References
An Emerging Trust-Based Security on Wireless Body Area Network
	1 Introduction
	2 Related Work
		2.1 Trust and Security Issues
		2.2 Proposed Methodology
	3 Proposed Work
		3.1 Public Key Cryptography
		3.2 Public Key Encryption
		3.3 Elliptic Curve Diffie Hellman Key Exchange Algorithm
		3.4 Digital Signature
		3.5 Protocol Design
		3.6 Trusted Anonymous Route-Request
		3.7 Trusted Routing Procedure
	4 Experimental Result
	5 Conclusion
	References
Preventing Fake Accounts on Social Media Using Face Recognition Based on Convolutional Neural Network
	1 Introduction
	2 Problem Identification
		2.1 Online Social Network (OSN)
		2.2 Fake Profile
		2.3 Approach to Solve
	3 Literature Survey
		3.1 Sarah Khaled, Neamat El-Tazi and Hoda M. O. Mokhtar
		3.2 Mudasir Ahmad wania, Nancy Agarwala & Suraiya Jabinb Syed Zeeshan Hussainb
		3.3 Estée van der Walt and Jan Eloff
		3.4 Gayathri A, Radhika S & Mrs. Jayalakshmi S. L.
	4 Techniques Used in Literature Survey
		4.1 Support Vector Machine–Neural Networks
		4.2 Random Forest
		4.3 Artificial Neural Networks
		4.4 Feature Detection
		4.5 Feature Extraction
		4.6 Classification
	5 Proposed Methodology
		5.1 Proposed Algorithm
		5.2 Data Collection
		5.3 Optimization
		5.4 Face Detection
		5.5 Face Recognition
		5.6 Age Classification
		5.7 Profile Detection
		5.8 Profile Association
	6 Future Scope
	7 Conclusion
	References
Error Correction Technique Using Convolution Encoder with Viterbi Decoder
	1 Introduction
	2 Convolutional Encoder
	3 Viterbi Algorithm
		3.1 Branch Metric Unit
		3.2 Path Metric Unit
		3.3 Survivor Memory Unit
	4 Implementation Results and Analysis
	5 Device Utilization and Power Consumption
	6 Conclusion
	References
Rice Grain Quality Determination Using Probabilistic Neural Networks
	1 Introduction
	2 Review of the State of the Art Techniques
	3 Probabilistic Neural Networks: A Discussion
	4 Methodology
	5 Results
	6 Conclusion and Future Work
	References
Maintenance of Automobiles by Predicting System Fault Severity Using Machine Learning
	1 Introduction
	2 Literature Survey
	3 Proposed Real-Time System
	4 Data Generation
	5 Feature Selection
	6 Fault Imputations and Modeling
	7 Results
	8 Confusion Matrices
	9 Conclusion
	10 Future Scope
	References
Endoscopic Wireless Capsule Compressor: A Review of the Existing Image and Video Compression Algorithms
	1 Introduction
	2 Wireless Capsule Endoscope System
	3 Compression Principles Suitable for WCE
	4 WCE Image Compression Techniques
		4.1 Lossless Image Compression Techniques
		4.2 Lossy Image Compression Techniques
		4.3 Comprehensive View of the Existing Compression Algorithms
	5 Future Scope and Conclusion
	References
Design of Retrodirective Arrays Using Hybrid Couplers for Autonomous Car
	1 Introduction
	2 Hybrid Couplers as Retrodirective Array
	3 Design and Evaluation
		3.1 Coupler Design
	4 Results and Discussion
		4.1 Return Loss
		4.2 Radiation Pattern
	5 Conclusion
	References
Enhanced Analysis of Brain MR Images for Detection of Abnormal Tissues Using Deep Learning
	1 Introduction
	2 Segmentation Methods—A Survey
	3 Approaches Towards Deep Learning
		3.1 Convolutional Neural Networks
		3.2 Deep Belief Networks
		3.3 Deep Neural Networks
	4 Research Findings
	5 Materials and Methods
	6 Experiments and Results
	7 Conclusions
	References
A Comprehensive Study Toward Women Safety Using Machine Learning Along with Android App Development
	1 Introduction
	2 Literature Review
	3 Proposed Model
	4 Methodology Adopted for Machine Learning-Based Backend
		4.1 Collection of Seed Data
		4.2 Selection of Machine Learning Algorithm
	5 Architecture and App Development
		5.1 Implementation of App
		5.2 Features of Android Application
	6 Results and Discussion
	7 Conclusion and Scope for Future Work
	References
Automated Plant Disease Identification and Detection with Multi-features
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 SOBEL Edge Detector
		3.2 Algorithm—Multi-feature Identification
	4 Performance Evaluation
	5 Conclusion
	References
Deep Learning Techniques for Optical Character Recognition
	1 Introductıon
		1.1 Digitization
		1.2 Preproceesing
		1.3 Segmentation
		1.4 Feature Extraction
		1.5 Classification
	2 Different Algorithms
		2.1 HWCR Using Bayesian Classifier
		2.2 HWCR Using Zoning Features
		2.3 HWCR Bayesian Decision Theory
		2.4 Online HWCR Using Support Vector Machines
		2.5 Preprocessing
		2.6 Stroke Pre-classification
		2.7 Stroke Recognition Based On SVM
		2.8 Character Recognition Based on SVM
		2.9 Comparison between different algorithms
	3 Conclusion
	References
Toward Effectual Group Formation Method for Collaborative Learning Environment
	1 Introduction
	2 Related Work
	3 Genetic Algorithm
	4 Proposed Approach
	5 Experimental Results
	6 Conclusion
	References
On Total Domination Number of Hypercube and Enhanced Hypercube Networks
	1 Introduction
	2 Hypercube Network
	3 Enhanced Hypercube Network
	4 Conclusion
	References
Neural Network-Based Classification of Toxic Gases for a Sensor Array
	1 Introduction
	2 Experimental Method
		2.1 Gas Sensor and Electronic Nose
		2.2 Preprocessing
		2.3 ANN Model for Classification
	3 Simulation Results
	4 Conclusion
	References
Effect of Negative Capacitance MOSFET Devices on Circuit Applications
	1 Introduction
	2 Modeling of Negative Capacitance
		2.1 Experimental Settings: Cadence Tool
	3 Analysis of NCFET
		3.1 Effect of Ferroelectric Thickness
		3.2 Effect of α
		3.3 Effect of β
		3.4 Effect of γ
	4 Implementation of NCFET in Circuits
	5 Conclusion
	References
A Verification of Pattern-Oriented Healthcare System Using CPN Tool
	1 Introduction
	2 Related Work
	3 Research Contribution
	4 System Design
		4.1 Diagnosis Pattern
		4.2 Decision Support Pattern
		4.3 Health Insurance Pattern
	5 Verification of Pattern-Oriented Healthcare System
		5.1 Verification Design
		5.2 Verification Result
		5.3 Result of Diagnosis Pattern
		5.4 Result of Decision Support Pattern
		5.5 Result of Health Insurance Pattern
	6 Conclusion
	References
Analysis of Groundnut Based Bio Modified Liquid Insulation for High Voltage Transformer
	1 Introduction
	2 Sample Descriptions
	3 Experimental Section
		3.1 Viscosity
		3.2 Breakdown Voltage
		3.3 Flash Point
		3.4 Pour Point
		3.5 Density
	4 Result and Discussion
	5 Conclusion
	References
Identification of Key Parameters Contributing to Technical Debt in Software Using Rank-Based Optimization
	1 Introduction
	2 Related Work
	3 Data Analysis and Methodology
		3.1 Dataset
		3.2 Finding Correlation
		3.3 Checking Technical Debt
		3.4 Data Collection
		3.5 Metrics
	4 Results and Discussion
		4.1 New Versus Old Bugs
		4.2 Bug Burndown
		4.3 Level of High-Need Bugs
		4.4 Code Smells
		4.5 Code Coverage
		4.6 Classification Accuracy Using Different Classifiers
	5 Conclusion and Future Scope
	References
An e-Voting Model to Preserve Vote Integrity Employing SHA3 Algorithm
	1 Introduction
	2 Background Study
	3 Proposed Model
	4 Results
	5 Conclusion
	References
Detection of Threshold Fall Angle of Elderly Patients for Protective Suit Purposes
	1 Introduction
	2 Proposed to Enhance Fall Detection System
		2.1 Block Diagram
		2.2 Experiment
		2.3 Image Segmentation
		2.4 Threshold Angle Calculation
	3 Result and Discussion
	4 Conclusion and Future Works
	References
Toxic Comment Classification Using Hybrid Deep Learning Model
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Dataset Used
		3.2 Data Preprocessing
		3.3 Embedding Layer
		3.4 Convolution Layer
		3.5 Max-Pooling Layer
		3.6 Bidirectional-GRU Layer
		3.7 Global Max-Pooling Layer
		3.8 Dense Layer 1
		3.9 Dropout Layer
		3.10 Dense Layer 2
	4 Implementation
		4.1 Dataset Used
		4.2 Data Preprocessing
		4.3 Embedding Layer
		4.4 Convolution Layer
		4.5 Max-Pooling Layer
		4.6 Bidirectional-GRU Layer
		4.7 Global Max-Pooling Layer
		4.8 Dense Layer 1
		4.9 Dropout Layer
		4.10 Dense Layer 2
	5 Result and Analysis
	6 Conclusion and Future Work
	Reference
Research and Development in the Networks of Cognitive Radio: A Survey
	1 Basics of Cognitive Networks
	2 Ideology of Cognitive Radio and Dynamic Spectrum Access
		2.1 Spectrum Sensing
		2.2 Spectrum Analysis
		2.3 Spectrum Access
		2.4 Spectrum Mobility
	3 Cognitive Radio Network Blocks
		3.1 Physical Layer
		3.2 MAC Layer
		3.3 Network Layer
		3.4 Transport Layer
	4 Spectrum Sharing in Cognitive Radio Networks
		4.1 Spectrum Sensing
		4.2 Interference Modeling
	5 Metrics for Performance Evaluation in CR
	6 Types of Modulation for Cognitive Radio Networks
	7 Developments and Security Considerations in Cognitive Radio Networks
	8 Financially Viable CRN
		8.1 Spectrum Auction
	9 Conclusion and Future Scope
	References
Ensemble Method for Identification and Automatic Production of Related Words for Historical Linguistics
	1 Introduction
	2 Related Works—Identification of Words
	3 Production of Related Words
	4 Building Dataset of Related Words
		4.1 Steps for Cognate Pair Identification
		4.2 Calculation of Accuracies for Different Linguistic Datasets
	5 Automatic Recognition of Related Words
		5.1 String Alignment
		5.2 Feature Extraction
		5.3 Learning Algorithms
		5.4 Evaluation Measures
		5.5 Task Set-up
	6 Linguistic Factors
	7 Proto-words Reconstruction
		7.1 Fusion by Rank
		7.2 Fusion by Rank and Accuracy
		7.3 Fusion by Weight
		7.4 Fusion by Weight and Accuracy
	8 Modern Word Production
		8.1 Cognates Production
	9 Automatic Related Word Production
		9.1 Conditional Random Fields
		9.2 Pairwise Sequence Alignment
		9.3 Evaluation Measures
	10 Conclusion
	References
A Robust Lightweight Algorithm for Securing Data in Internet of Things Networks
	1 Introduction
	2 Proposed Algorithm
		2.1 Key Expansion Block
		2.2 Encryption Process
		2.3 When Decryption Process
	3 Analytical Comparison of Symmetric Key Algorithm for IoT Proposed Algorithm
		3.1 Result and Analysis
	4 Conclusion and Future Work
	References
UAV Communication Network: Power Optimization and End-To-End Delay
	1 Introduction
		1.1 Advantages and Applications of UAVS
	2 Related Work
	3 Problem Statement
		3.1 Existing System
		3.2 Proposed System
	4 Methodology
	5 Results
		5.1 Snapshots
	6 Conclusion
	References
Improving the QoS of Multipath Routing in MANET by Considering Reliable Node and Stable Link
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Result Analysis
	5 Conclusions
	References
A Novel Approach to Detect, Characterize, and Analyze the Fake News on Social Media
	1 Introduction
		1.1 Importance of Detecting Fake News
	2 Fake News Characterization
		2.1 Fake News Generators and Publishers
		2.2 News Content
	3 Fake News Detection—Practical-Based Approaches
		3.1 Online Fact-Checking Resources
	4 Fake News Detection—Research-Based Approaches
		4.1 Component Established Type
		4.2 Data Mining Established Type
		4.3 Implement Established Type
	5 Future Research and Open Challenges
		5.1 Unsupervised Learning for Fake News Analysis
		5.2 Evaluation of Fake News Detection System
	6 Conclusion
	References
A Novel Design for Real-Time Intrusion Response in Latest Software-Defined Networks by Graphical Security Models
	1 Introduction
	2 Related Work
	3 A Framework for Real-Time Intrusion Response in SDN
		3.1 SDN Configuration
		3.2 Security Modeling and Analysis
		3.3 Intrusion Detection
		3.4 Attack Response
	4 Real-Time Intrusion Response in SDN
		4.1 SDN Configuration
		4.2 Security Modeling and Analysis
		4.3 Intrusion Detection
	5 Precomputation and Attack Prediction for Security Assessment
	6 Result and Analysis
	7 Conclusion
	References
Implementation and Analysis of Dynamic Spectrum Sharing for Different Radio Access Technologies
	1 Introduction
	2 Dynamic Spectrum Sharing
		2.1 Overview
		2.2 DSS GSM-LTE Solution
	3 Implementation
		3.1 Frequency Calculation
		3.2 Site Creation
		3.3 GSM-LTE DSS Setup Configuration
		3.4 Procedure for GSM-LTE DSS Feature Activation
	4 Results and Discussion
		4.1 Wireshark Log Analysis
		4.2 BTS Log Analysis
		4.3 Spectrum Analyzer Outputs
	5 Conclusion
	References
TAMIZHİ: Historical Tamil Brahmi Handwritten Dataset
	1 Introduction
	2 Handwritten Script Recognition Methods
	3 Data Collectıon Methodology
		3.1 Layout of the Input Sheet
		3.2 Grid Segmentation
		3.3 Hough Line Transform
	4 Conclusion
	References
Performance Analysis of Channel Estimation Techniques for High-Speed Railway Networks
	1 Introduction
	2 System Model
		2.1 GSM-OFDM
		2.2 HSR Wireless Communication System
	3 Channel Estimation Technique for GSM-OFDM System
		3.1 Proposed System Model
		3.2 Block Pilot-Based Channel Estimation
		3.3 Mixed Interpolation Method
	4 GSM-OFDM Signal Detection Scheme
	5 Simulation Results
	6 Conclusion
	References
Risk Assessment System for Prevention of Decubitus Ulcer
	1 Introduction
	2 Background
	3 Existing Assessment Methodologies
	4 Proposed System
	5 Technical Requirements
	6 Software Requirement
	7 Braden Scale Risk Assessment
	8 Hardware Setup
	9 Experimental Analysis
	10 Conclusion
	References
Faulty Node Detection Using Vertex Magic Total Labelling in Distributed System
	1 Introduction
	2 Literature Survey
	3 Working Methodology
	4 Results and Discussion
	5 Conclusion
	References
Taxonomy of Diabetic Retinopathy Patients Using Biogeography-Based Optimization on Support Vector Machine Based on Digital Retinal Images
	1 Introduction
	2 Naïve Bayes Classifier
	3 Results and Discussions
	4 Performance Measures
	References
An Efficient Energy Management of Hybrid Renewable Energy Sources Based Smart-Grid System Using an IEPC Technique
	1 Introduction
	2 Recent Research Works: A Brief Review
		2.1 Background of the Research Work
	3 Mathematical Formulation of Energy Management
	4 Optimal Energy Management of Smart Grid with IEPC Technique
		4.1 Emperor Penguin Colonies Optimization
	5 Result and Discussion
	6 Conclusion
	References
Brain–Computer Interfaces and Neurolinguistics: A Short Review
	1 Introduction
	2 Brain–Computer Interfaces Systems (BCIs)
		2.1 Types of Brain–Computer Interfaces Systems
	3 Types of Brain Imaging Techniques
	4 Literature Review
	5 Discussion
	6 Conclusion
	References
An Efficacious Method for Face Recognition Using DCT and Neural Network
	1 Introduction
	2 Related Work
		2.1 DCT
		2.2 ANN Using MLP with Back Propagation Algorithm
	3 Proposed Method
	4 Experimental Setup and Results
	5 Conclusion
	References
Author Index




نظرات کاربران