High Performance Computing and Networking: Select Proceedings of CHSN 2021 (Lecture Notes in Electrical Engineering, 853)

دانلود کتاب High Performance Computing and Networking: Select Proceedings of CHSN 2021 (Lecture Notes in Electrical Engineering, 853)

36000 تومان موجود

کتاب محاسبات و شبکه با کارایی بالا: مجموعه مقالات CHSN 2021 را انتخاب کنید (یادداشت های سخنرانی در مهندسی برق ، 853) نسخه زبان اصلی

دانلود کتاب محاسبات و شبکه با کارایی بالا: مجموعه مقالات CHSN 2021 را انتخاب کنید (یادداشت های سخنرانی در مهندسی برق ، 853) بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 3


توضیحاتی در مورد کتاب High Performance Computing and Networking: Select Proceedings of CHSN 2021 (Lecture Notes in Electrical Engineering, 853)

نام کتاب : High Performance Computing and Networking: Select Proceedings of CHSN 2021 (Lecture Notes in Electrical Engineering, 853)
ویرایش : 1st ed. 2022
عنوان ترجمه شده به فارسی : محاسبات و شبکه با کارایی بالا: مجموعه مقالات CHSN 2021 را انتخاب کنید (یادداشت های سخنرانی در مهندسی برق ، 853)
سری :
نویسندگان : , , ,
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 652
ISBN (شابک) : 9811698848 , 9789811698842
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 17 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Program Committee
Keynote Speakers
Foreword
Contents
About the Editors
An Effective DNLP Optimization Method for Economic Load Dispatch Problem
1 Introduction
2 Mathematical Model of Economic Load Dispatch
2.1 Constraints
2.2 Prohibited Operating Zones (POZ)
2.3 Ramp Rate Limits
3 Results
4 Conclusions
References
Multi-Perspective Reasoning Using Adaptive Learning
1 Introduction
2 Literature Review
3 Proposed Work
3.1 Multi-perspective Learning
3.2 Neighbor Recognition Algorithm
4 Results and Discussions
5 Conclusion
References
Ink Recognition Using TDNN and Bi-LSTM
1 Introduction
2 Related Work
3 Dataset Description
4 Methodology
4.1 Pre-processing
4.2 Features Generation
4.3 Architecture
5 Results and Discussion
6 Conclusion and Future Work
References
Sarcasm Detection for Sentiment Analysis: A RNN-Based Approach Using Machine Learning
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Conclusion and Future Scope
References
Statistical Analysis of Soil Properties Using Non-imaging Spectral Data for Quantitative Analysis of Raver Tehsil
1 Introduction
2 Study Area
3 Material and Methods
3.1 Spectral Data Acquisition
4 Results
5 Conclusion
References
Building an Efficient Heart Disease Prediction System by using Clustering Techniques
1 Introduction
2 Literature Survey
3 Parameters and Techniques for Predicting Heart Disease
3.1 Dataset Description and Pre-processing
3.2 The Algorithm for Clustering
3.3 The Algorithm for Classification
4 Experiment Setup
4.1 Testing Level I
4.2 Testing Level II
4.3 Testing Level III
5 Conclusion and Future Work
References
The GR1 Algorithm for Subgraph Isomorphism. A Study from Parallelism to Quantum Computing
1 Introduction
2 Terminology
3 Input Data
4 GR1 Algorithm
5 Tests
6 Quantum Computing Approach
7 Conclusions
References
Sliding Windowed Fuzzy Correlation Analysis-Based Marine Motion Detection
1 Introduction
2 Proposed Methodology
2.1 Background Model Generation
2.2 FCA-based Motion Detection
3 Dataset
4 Experimental Results
5 Conclusion
References
Generative Adversarial Network for Music Generation
1 Introduction
2 Background
2.1 Related Work in Music Generation
2.2 Generative Adversarial Networks
3 Proposed Model
3.1 Conditional GAN Model
4 Materials and Methods
4.1 Music Synthesizer Using Conditional GAN Models
4.2 Workflow
5 Results and Discussion
5.1 Generated Piano Rolls
5.2 Evaluation of Models
6 Conclusion
References
Automatic License Plate Recognition for Distorted Images Using SRGAN
1 Introduction
2 Related Work
3 System Architecture
3.1 Traditional ALPR System
3.2 ALPR System for Distorted Images
4 Methodology
4.1 License Plate Detection
4.2 Super Resolution
4.3 Character Segmentation
4.4 Character Recognition
5 Training Details
6 Experiments and Results
7 Conclusion
References
EEG Signals Classification for Right- and Left-Hand Movement Discrimination Using SVM and LDA Classifiers
1 Introduction
2 Materials and Methods
2.1 EEG Data Acquisition and Preprocessing
2.2 EEG Feature Extraction
2.3 Classifiers
3 Results and Discussion
4 Conclusion
References
A Comparative Study on Network Intrusion Detection System Using Deep Learning Algorithms and Enhancement of Deep Learning Models Using Generative Adversarial Network (GAN)
1 Introduction
2 Data set
3 Literature Review
4 Proposed Deep Learning Architectures
4.1 Convolutional Neural Network
4.2 Deep Neural Network
4.3 Recurrent Neural Network
4.4 RNN-LSTM
4.5 Enhancement Using GAN
5 Evaluation Metrics
6 Results and Analysis
7 Conclusion and Future Work
References
Indian Sign Language Detection Using YOLOv3
1 Introduction
2 Related Works
3 YOLOv3 Algorithm
3.1 Introduction to YOLOv3
3.2 Darknet-53 and YOLOv3 CNN
3.3 YOLOv3 Algorithm
4 Indian Sign Language
5 Sign Language Detection Using YOLOv3 Algorithm
6 Experiments and Results
6.1 Experimental Setup
6.2 Results
7 Conclusion
References
Feature Extraction-Based Phishing URL Detection Using Machine Learning Techniques
1 Introduction
2 Literature Survey
3 Methodology
3.1 Existing Methodology
3.2 Proposed Methodology
4 Implementation
4.1 Pseudocode
5 Results and Discussions
6 Conclusion and Future Scope
References
A Slant Transform and Diagonal Laplacian Based Fusion Algorithm for Visual Sensor Network Applications
1 Introduction
2 Slant Transform
3 Diagonal Laplacian (DL) Focus Measure
4 Proposed Algorithm
5 Performance Measures
5.1 Reference Measures
5.2 Non-reference Measures
6 Simulation Results and Analysis
7 Conclusions
References
Tracking Industrial Assets Using Blockchain Technology
1 Introduction
2 Related Work
3 Overview
3.1 Equip-Chain Architecture
3.2 Tracking of Industrial Assets Using Blockchain
3.3 Blockchain Implementation Through Application Server
4 Working Methodology
5 Conclusion
References
Prototype for Recognition and Classification of Textile Weaves Using Machine Learning
1 Introduction
2 Background
2.1 Fabrics
2.2 Artificial Neural Networks
2.3 Bilinear Convolutional Neural Networks
2.4 Related Works
3 Development
3.1 Sampling
3.2 Dataset Creation
3.3 Pre-processing
3.4 Model Training
3.5 Analysis of Results
3.6 Hyperparameters Optimization
4 Conclusion and Recommendations
References
Development of Deep Neural Network Algorithm for Identification of Cerebral Microstructural Changes in Brain Tumor for Post-COVID-19 Patients
1 Introduction
1.1 Background
1.2 Advantages of CNN for Post-COVID-19 Analysis
2 Related Work
3 Proposed Method
4 Results and Discussion
5 Conclusion
References
A Codebook Modification Method of Vector Quantization to Enhance Compression Ratio
1 Introduction
2 Literature Review
3 Proposed Method
3.1 Compression
3.2 Decompression
3.3 Memory Requirements for Proposed Method
4 Experimental Results
5 Conclusion
References
Intra Change Detection in Shelf Images Using Fast Discrete Curvelet Transform and Features from Accelerated Segment Test
1 Introduction
2 Background Study on Change Detection
3 Concepts Used
3.1 Wavelets
3.2 FAST Algorithm
4 Proposed Change Detection Algorithm
4.1 Misplaced Object Detection and Localization
5 Experimental Results and Discussion
5.1 Dataset
5.2 Results and Discussion
6 Conclusion
References
Mucormycosis Vaccine Design using Bioinformatic Tools
1 Introduction
1.1 Reverse Vaccinology
1.2 Immunoinformatics
1.3 Structural Vaccinology
2 Materials and Method
2.1 Sequence Retrieval and Analysis
2.2 Prediction of B-cell and T-cell Epitopes
2.3 Retrieval of the Protein and Epitope Structures
2.4 Molecular Docking Studies
3 Results
3.1 Prediction of Antigenicity and Physicochemical Analysis
3.2 B- and T-cell Epitope Prediction
3.3 Retrieval of the Protein and Epitope Structures
3.4 Molecular Docking Analysis
4 Discussion
5 Conclusion
References
Blockchain Implementation in IoT Privacy and Cyber Security Feasibility Study and Analysis
1 Introduction
2 Security Challenges and Role of Blockchain in IoT
2.1 Challenges
2.2 IoT Categories
2.3 Role of Blockchain and Integration with IoT
2.4 Blockchain IoT Market Growth Rate
3 Overview of Blockchain Technology
3.1 Properties of Blockchain
3.2 Types of Blockchain
3.3 Categories of Blockchains
3.4 Benefits of Blockchain
3.5 Blockchain Platforms for IoT
3.6 Blockchain Implementation in Different Domains
4 SWOT Analysis of Blockchain
5 Ethereum Blockchain
5.1 Smart Contract
5.2 Cryptography in Ethereum
5.3 Implementation and Testing
6 Discussion and Analysis
7 Conclusion
References
Modified ResNetModel for MSI and MSS Classification of Gastrointestinal Cancer
1 Introduction
2 Model Description
2.1 Baseline Approach
2.2 Transfer Learning Approach
2.3 Modified ResNet Model
3 Results and Discussion
3.1 Baseline Models
3.2 Transfer learning Models
3.3 Modified ResNet Model
4 Conclusion
References
An IoT-Enabled Healthcare System: Auto-predictive Colorectal Cancer with Colonoscopy Images Combined with the Convolutional Neural Network
1 Introduction
2 Proposed Computer-Assisted Detection (CAD) System
2.1 Large Intestine
2.2 Colonoscopy
2.3 Data Storage and Cloud Storage
2.4 Colonoscopy Image Datasets
2.5 Image Pre-processing
2.6 Feature Extraction
2.7 Feature Selection
2.8 Convolutional Neural Networks (CNN)
2.9 Convolutional Layer
3 Results
3.1 Datasets
3.2 Split Polyps and Non-polyps
3.3 Convolutional Neural Networks
3.4 Optimized Hyperparameters for 3 Conv—FC
4 Conclusion
References
Unfair Review Detection on Amazon Reviews Using Sentiment Analysis
1 Introduction
2 Literature Review
3 Proposed Work
3.1 Introduction
3.2 System Architecture Diagram
4 Description of Algorithms
4.1 Logistic Regression
5 Description of Tools and Dataset
6 Results and Observations
6.1 Stepwise Description of Results
6.2 Observations from the Work
7 Conclusion
References
Decentralized Coded Caching for the Internet of Things (IoT) Using User Cooperation
1 Introduction
2 Related Works
3 Overview of Proposed Methodology
3.1 System Setup
3.2 Proposed Algorithm
3.3 Reason Behind Choosing s = 2 to Incorporate User Cooperation
3.4 Development of Generalized Equation
3.5 Verification of Generalized Equation
4 Performance Analysis
5 Conclusion
References
Cryptanalysis of SIMON (32/64) Cipher Using Satisfiability Modulo Theories
1 Introduction
2 SMT Solver-Based Cryptanalysis
2.1 Z3 Standard Algorithm
3 SIMON Block Cipher
3.1 SIMON Design Description
4 SIMON (32/64) Cryptanalysis Using SMT Solvers
5 SIMON (32/64) Experiment Results
5.1 SMT Result Developed for the Following SIMON (32/64)
6 Conclusion
References
Personal Safety Monitoring Devices in Wake of COVID19: Application of IoT and Sensor Technology
1 Introduction
2 COVID19: A Case Study
2.1 Test Cases or Total Number of Sample Tested
2.2 Non-vulnerable Cases
2.3 Susceptible or Vulnerable Cases
2.4 Positive Cases or Active Cases
2.5 Transmission Rate
2.6 Recovered Cases
2.7 Infection Outbreak
2.8 Rate of Positive Cases
2.9 Rate of Negative Cases
3 Literature Survey
4 IoT for COVID19
5 IOT Enabling Personal Safety Methodology and Equipment
5.1 ICT Enabled Wrist Band
5.2 ICT Enabled Face Shield
6 Conclusion
References
A Systematic Review of Deep Learning Approaches for Computer Network and Information Security
1 Introduction
2 Methodology
3 Motivation
4 Literature Review
5 Deep Learning Approaches
5.1 AC-GAN and SVM/DT/RF
5.2 CNN and RNN
5.3 CNN and LSTM
5.4 ImCNN and ImGWO
5.5 LSTM and Autoencoder
5.6 1D-CNN, LSTM, and SAE
5.7 DNN, IGASAA, and SAA
5.8 CNN and SAE
5.9 DBN and SVM
6 Autoencoder and LSTM
6.1 GAN and Autoencoder
7 Current Issues and Future Directions
8 Conclusion
References
Online Mail Junk Penetration by Using Genetic Algorithm Probabilistic Weights and Word Compute
1 Introduction
2 Related Work
3 Bayes and Naive Bayes Classifiers Related Work
4 Proposed Algorithm
5 Experimental Output
6 Conclusion
References
A Novel Study and Analysis on Global Navigation Satellite System Threats and Attacks
1 Introduction
2 The Spoofing Attack Chronology
3 The Spoofing Attacks Background Survey
4 Conclusion and Future Scope
References
Modified Gaussian Mixture Distribution-Based Deep Learning Technique for Beamspace Channel Estimation in mmWave Massive MIMO Systems
1 Introduction
2 Related Works
3 System Model
3.1 Copyright Forms
3.2 Problem Formulation
3.3 Modified GM-Based LAMP Network for Beamspace Channel Estimation
4 Simulation Results and Discussion
4.1 Simulation Setup
4.2 Simulation Results of the Channel Model—Saleh Valenzuela
4.3 Simulation Results of the Dataset—DeepMIMO
4.4 Simulation Results of the Computational Complexity Analysis
5 Conclusions
References
Efficient Structural Matching for RNA Secondary Structure Using Bit-Parallelism
1 Introduction
2 Review of Literature
2.1 Definitions
2.2 Parameterized Matching Problem
2.3 S-Matching Problem
3 Proposed Algorithm
3.1 Bit-Parallelism Example
4 Experimental Results
5 Results
6 Conclusion
References
Facial Emotion Recognition Using Hybrid Approach for DCT and DBACNN
1 Introduction
2 Related Work
3 Proposed Method
3.1 Convolutional Neural Network
3.2 DBACNN for ETI Pooling
3.3 Classification with DBACNNs
3.4 For Expression Analysis, Learning Principle Marks is Essential
3.5 Experimental Evaluation Data Sets
4 Result with Discussion
4.1 Databases
4.2 Performance Analysis Using CK + Data Set
4.3 Performance Analysis Using JAFFE Data set
4.4 Performance Analysis Using FER-2013 Data set
4.5 Tables
4.6 Performance Analysis Using Snapshot Images
5 Conclusions
References
SquashCord: Video Conferencing Application Using WebRTC
1 Introduction
2 Related Work
3 SquashCord: Video Conferencing Application
3.1 WebRTC Architecture
3.2 WebSocket Architecture (Signal Exchanging Data Carrier)
3.3 Design of SquashCord: Video Conferencing Application
4 Our Approach for Implementation
4.1 Module-Wise Implementation
5 Security Measures
5.1 Protocol Layer Security
5.2 Signalling Server Security
6 Result Analysis
7 Conclusion
References
A Hybrid Pipeline for the Segmentation of Eye Regions from Video Frames
1 Introduction
2 Related Work
3 Dataset
4 Design of the Hybrid Pipeline for Segmentation
4.1 Dual-Model Approach and Image Augmentation
4.2 Image Preprocessing and the Switch to U-Net
4.3 Segmentation Models, Experimentation with Loss Functions and Model Ensembling
4.4 Experimentation with Nascent Techniques
5 Final Hybrid Pipeline and Results
6 Conclusion
References
EIDIMA: Edge-based Intrusion Detection of IoT Malware Attacks using Decision Tree-based Boosting Algorithms
1 Introduction
2 Related Works
3 Materials and Method
3.1 Experimental Setup
3.2 Proposed Method
3.3 Machine Learning Algorithms
4 Result Analysis
5 Conclusion
References
Market Basket Analysis Recommender System using Apriori Algorithm
1 Introduction
2 Literature Review
3 Apriori Algorithm, Methodology, and Implementation
3.1 Association Rule Mining
3.2 Apriori Algorithm
4 Experimentation and Results
4.1 Visualization of Time Taken by Algorithms on Different Steps of Execution
4.2 Analysis after Experimentation
4.3 Visualization of Rules after Analysis
5 Conclusion
References
Meta-Analysis to Prognosis Myocardial Infarction Using 12 Lead ECG
1 Introduction
1.1 Electrocardiogram
1.2 12 Lead ECG Position
2 Detection of MI Using 12 Lead ECG
2.1 ST-Segment
2.2 Lower Bundle Branch Block (LBBB)
3 Related Work
3.1 Data Acquisition
3.2 Preprocessing
3.3 Classification Algorithm
4 Discussion and Future Work
5 Conclusion
References
Biometric Recognition from Face-Voice Using Rough-Neuro-Fuzzy Classifiers
1 Introduction
2 Related Works
3 Person Identification by FR
3.1 ARK Face Template Grabber and Effective Region-Of-Face Extraction
3.2 Feature Extraction
3.3 Classifier Design–Fuzzy Logic to MLP
4 Person Identification by VR
5 Classifier Design
5.1 Feature Extraction—MFCC
6 Local Voice-Enabled Face Deformation Profile–LVFDP
7 Experimental Results
8 Conclusion
References
Early Breast Cancer Detection from Blood Plasma Using Hubness-Aware Adaptive Neural Network with Hybrid Feature Selection
1 Introduction
2 Related Works
3 Methodology
3.1 Ontology and Pathway Informed Gene Selection
3.2 Feature Selection Based on Laplacian Score
3.3 Early Cancer Prediction Using Hubness-Aware Adaptive Neural Network
3.4 Adaptive Learning Rate for Neural Network
4 Results and Discussion
5 Conclusion
References
Comparative Analysis of CNN Methodologies Used for Classification of Diabetic Retinopathy
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Data Description
3.2 Transfer Learning
3.3 Machine Learning Algorithms
3.4 Proposed Model
4 Results
5 Conclusion
References
Prediction of Diabetes and Recommendation of Insulin Dosage for Diabetic Patients
1 Introduction
2 Related Work
3 Methodology
3.1 Data Preprocessing
3.2 Feature Selection
3.3 Model Fitting
3.4 Predicting
3.5 Recommendation of Insulin
4 Results
5 Conclusion and Future Work
References
A Cloud Based Breast Cancer Risk Prediction (BCRP) System
1 Introduction
2 Related Work
3 Classification Models
3.1 Decision Tree Classifier
3.2 Gradient Boosting Classifier
3.3 KNN Classifier
3.4 Multilayer Perceptron Classifier
3.5 Gaussian Naïve Bayes Classifier
3.6 Logistic Regression Classifier
3.7 Random Forest Classifier
3.8 Linear Discriminant Analysis
4 Methodology
4.1 Training and Testing Dataset
4.2 Classification Model
4.3 Online Deployment of BCRP Model
5 Results and Discussion
5.1 Confusion Matrix
5.2 Quantitative Measures
5.3 Receiver Operating Characteristic
5.4 AUC
5.5 Comparative Evaluation
6 Results and Discussion
References
Automatic Road Network Reconstruction from GPS Trajectory Data using Curve Reconstruction Algorithms
1 Introduction
2 Related Works
2.1 Point Clustering
2.2 Incremental Track Insertion
2.3 Intersection Linking
3 Methodology
3.1 Representative Points Extraction Algorithm
3.2 Reconstruction of Road Networks
4 Experiments and Result
4.1 Experiment on GPS Trajectories Collected from Public Roads
4.2 Experiment on Public Map Database
5 Conclusion
References
Power Aware Energy Efficient Virtual Machine Migration (PAEEVMM) in Cloud Computing
1 Introduction
2 Literature Survey
3 Algorithm Used
4 Methodology
5 Experimental Setup and Results
6 Conclusion and Future Scope
References
Automotive RADAR Human Classification Algorithm Through Simulation Analysis: Basics and Practical Challenges
1 Introduction
1.1 Automotive Radar Types Overview and Specific Applications
2 Problem Statement
3 Discussion of Global Techniques and Constraints
3.1 Field of View (FOV)
3.2 Radar Signals
3.3 Antenna Types and Pattern
3.4 Mounting Position
3.5 Object of Interest (OOI)
3.6 Object Detection
3.7 Object Classification
4 Systems Engineering and Advanced Signal Processing Based Existing Solution
5 Results
6 Open Topics for the Future Researchers
7 Conclusions and Future Works
References
A Study on Defensive Issues and Challenges in Internet of Things
1 Introduction
2 IoT Structured Framework
2.1 Sensor Subsystem for Interoperability
2.2 Network Layer
2.3 Network Control Subsystem
2.4 Service Layer
3 Security Concerns
4 Solutions
4.1 Machine Learning for IoT Security
4.2 Software Defined Networking (SDN)-Based IoT Frameworks
4.3 IoT Security Using Fog Computing
4.4 IoT Security Using Blockchain
5 Conclusion
References
A Deep Convolutional Neural Network for COVID-19 Chest CT-Scan Image Classification
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset
3.2 Proposed Methodology
4 Experimental Results
5 Conclusion
References
Clinical Text Classification of Medical Transcriptions Based on Different Diseases
1 Introduction
2 Background Study
3 Methodology
3.1 Dataset
3.2 Data Pre-processing
3.3 Feature Extraction
3.4 Dimensionality Reduction
3.5 Classification Using Support Vector Classifier and Multiclass Logistic Regression
4 Results and Discussion
4.1 Support Vector Classifier
4.2 Multiclass Logistic Regression
4.3 Multiclass Logistic Regression with SMOTE
5 Conclusion
References
A Hybrid Acoustic Model for Effective Speech Emotion Classification by the Deep Fusion of Spectral and Prosodic Features Using CNN and DNN
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Pre-processing
3.2 Feature Extraction
3.3 Learning Techniques: A Fusion Mechanism
3.4 Emotion Classification
4 Experimental Analysis
4.1 Emotion Classification Using Deep Learning
4.2 Emotion Classification Using Machine Learning
4.3 Deep Fusion of CNN + DNN
5 Conclusion
References
Application of Relay Nodes in WBAN-Based Smart Healthcare for Energy Conservation Explained with Case Studies
1 Introduction
2 Literature Survey
3 Application of Relay Nodes in WBAN Design
4 Energy Consumption
5 Experimental Results
5.1 Case 1: Energy Consumption Using Without Using Relay Nodes in WBAN
5.2 Case 2: Energy Consumption Using Relay Nodes in WBAN
6 Conclusion
References
Design and Implementation of Intelligent Treadmill with Fitness Tracker Using Raspberry Pi and IOT
1 Introduction
2 Background
3 Proposed System
4 Experimental Results
4.1 Checking User Weight and Calculating BMI
4.2 Operation of Treadmill
4.3 Music Player
5 Conclusion
References
CXR-15: Deep Learning-Based Approach Towards Pneumonia Detection from Chest X-Rays
1 Introduction
2 Literature Survey
3 Methodology
3.1 Dataset Description
3.2 Network Architecture
4 Results
4.1 Evaluation Metrics
4.2 Performance Comparison
5 Conclusion
References




پست ها تصادفی