Innovations in Data Analytics. Selected Papers of ICIDA 2022

دانلود کتاب Innovations in Data Analytics. Selected Papers of ICIDA 2022

30000 تومان موجود

کتاب نوآوری در تجزیه و تحلیل داده ها مقالات منتخب ICIDA 2022 نسخه زبان اصلی

دانلود کتاب نوآوری در تجزیه و تحلیل داده ها مقالات منتخب ICIDA 2022 بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد

این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 6


توضیحاتی در مورد کتاب Innovations in Data Analytics. Selected Papers of ICIDA 2022

نام کتاب : Innovations in Data Analytics. Selected Papers of ICIDA 2022
عنوان ترجمه شده به فارسی : نوآوری در تجزیه و تحلیل داده ها مقالات منتخب ICIDA 2022
سری : Advances in Intelligent Systems and Computing, Volume 1442
نویسندگان : , , ,
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 633
ISBN (شابک) : 9789819905492 , 9789819905508
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 20 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Foreword
Preface
Contents
About the Editors
Computational Intelligence
Transience in COVID Patients with Comorbidity Issues—A Systematic Review and Meta-Analysis Based on Indian and Southeast Asian Context
1 Introduction
1.1 Risk of COVID Patients with Comorbidity Issues
2 COVID Patient Statistics with Comorbidity Issues
3 Research Methodology
3.1 Search Strategy
4 Related Literature Survey in This Area
5 Discussion
6 Conclusion and Future Scope
References
NFT HUB—The Decentralized Non-Fungible Token Market Place
1 Introduction
1.1 Non-Fungible Token
1.2 Blockchain
2 Literature Survey
3 Proposed System
3.1 Blockchain
3.2 Ethereum Blockchain
3.3 Properties of Blockchain
3.4 Generic Elements of the Blockchain
3.5 Secure Hash Algorithm
4 Results and Discussion
4.1 Deployment Confirmation
4.2 Metamask Wallet
4.3 Minting Page
4.4 Transaction Address
4.5 Dashboard
5 Conclusion
5.1 Future Scope of the Project
References
Hashgraph: A Decentralized Security Approach Based on Blockchain with NFT Transactions
1 Introduction
1.1 Optimized Blockchain Server
2 Literature Survey
2.1 Survey Report: On Token Service
2.2 Survey Report: On Main-Net Access
2.3 Survey Report: Remove Centralized Control: Hala Systems
3 Proposed System
3.1 Non-Fungible Transaction
3.2 Blockchain Methodology
3.3 Gossip Protocol
3.4 Hashgraph
3.5 Consensus Algorithm [In Gossip Protocol]
3.6 HCS Implementation
4 Performance Evaluation
4.1 Transaction Cost Denomination of Our Network
4.2 Transaction Cost of Network on Blockchain NFT
5 Result and Discussion
6 Conclusion
References
Med Card: An Innovative Way to Keep Your Medical Records Handy and Safe
1 Introduction
1.1 What is Blockchain?
1.2 What is Machine Learning?
2 Literature Review
3 Technologies Used
3.1 Blockchain in Health Care
3.2 Machine Learning in Health Care
4 Proposed Idea
4.1 What is a Med Card?
4.2 Workflow
5 Conclusion and Future Scope
References
Delta Operator-Based Modelling and Control of High Power Induction Motor Using Novel Chaotic Gorilla Troop Optimizer
1 Introduction
2 Formulation of the Problem
3 New Chaotic Gorilla Troop Optimizer
4 Simulation Ouput and Their Analysis
5 Conclusions
References
An Enhanced Optimize Outlier Detection Using Different Machine Learning Classifier
1 Introduction
2 Outlier Detection
3 Literature Review
4 Proposed Methodology
5 Simulation Result
6 Conclusion
References
Prediction of Disease Diagnosis for Smart Healthcare Systems Using Machine Learning Algorithm
1 Introduction
2 Heart Disease
3 Diabetes Mellitus
4 Proposed Methodology
5 Simulation Results
6 Conclusion
References
Optimization Accuracy on an Intelligent Approach to Detect Fake News on Twitter Using LSTM Neural Network
1 Introduction
2 Road Map of Methodology
2.1 Data Collection and Filtration
2.2 Pre-processing
2.3 Feature Extraction
2.4 Feature Selection
2.5 Classification
3 Proposed Methodology
4 Simulation Results
5 Conclusion
References
Advance Computing
Mining User Interest Using Bayesian-PMF and Markov Chain Monte Carlo for Personalised Recommendation Systems
1 Introduction
2 Related Work and Background
3 Experimental Methodology
3.1 Probabilistic Matrix Factorization (PMF)
3.2 Bayesian-PMF with MCMC
3.3 Sparsity Reduction
3.4 Performance Measure
4 Proposed Architecture
5 Experimental Outcomes and Investigation
5.1 Dataset Description
6 Conclusion and Future Work
References
Big Data and Its Role in Cybersecurity
1 Introduction
2 Security Using Big Data
2.1 Use of Big Data Analytic (BDA) as Defense Tool
2.2 Cybersecurity and Machine Learning
3 Cybersecurity Approaches in Big Data
4 Research Trends and Challenges
4.1 Use of Big Data in Defense
4.2 Laws Regulating to Big Data
4.3 Distribution of Data for Storage
4.4 Security Technique Scalability in the Big Data
5 Conclusions
References
QR Code-Based Digital Payment System Using Visual Cryptography
1 Introduction
2 Literature Review
3 Methodology
4 Implementation
4.1 Encryption
4.2 AES Algorithm
4.3 Decryption
5 Result
6 Conclusion
References
A Study of Different Approaches of Offloading for Mobile Cloud Computing
1 Introduction
2 Research Method
3 Offloading for Mobile Cloud Computing
4 Applications Suitable for Offloading in MCC
5 Different Offloading Approaches
6 Conclusion
References
Use of Machine Learning Models for Analyzing the Accuracy of Predicting the Cancerous Diseases
1 Introduction
2 Related Work
3 Machine Learning Models
3.1 Logistic Regression
3.2 Decision Tree
3.3 Random Forest Classifier
4 Experiment
4.1 Experiment Environment
4.2 Breast Cancer Dataset
5 Experimental Results
6 Conclusion
References
Predict Employee Promotion Using Supervised Classification Approaches
1 Introduction
2 Related Works
3 Implementation
3.1 Proposed Model
3.2 Data Collection
3.3 Data Analysis
3.4 Engineered Functions
3.5 Train-Test-Split
3.6 Model Building
4 Performance Evaluation
5 Conclusion
References
Smart Grid Analytics—Analyzing and Identifying Power Distribution Losses with the Help of Efficient Data Regression Algorithms
1 Introduction
2 Related Work
3 Proposed Work
4 Results
5 Conclusion
References
Load Balancing on Cloud Using Genetic Algorithms
1 Introduction
2 Literature Survey
3 Proposed Work
4 Results
5 Conclusions and Future Work
References
Network Security and Telecommunication
Hybrid Feature Selection Approach to Classify IoT Network Traffic for Intrusion Detection System
1 Introduction
2 Literature Survey
3 Research Gaps
4 Proposed Work
4.1 Proposed Methodology
5 Experimental Results
5.1 Dataset Description
5.2 System Configuration
5.3 Model Parameters
5.4 Performance Parameters
6 Conclusion
References
A Deep Learning-Based Framework for Analyzing Stress Factors Among Working Women
1 Introduction
2 Literature Survey
3 Stress Factors (Stressors)
3.1 Deep Learning: Background
3.2 Deep Learning-Based Framework for Early Stress Detection
4 Results and Discussion
5 Conclusion
References
Automatic Question Generation
1 Introduction
2 Literature Survey
3 Proposed System
4 Methodology
5 Conclusion and Future Scope
References
Automatic Construction of Named Entity Corpus for Adverse Drug Reaction Prediction
1 Introduction
2 Related Work
2.1 Biomedical Named Entity Recognition
2.2 Datasets for Biomedical Entity Recognition
3 Proposed Work
3.1 ADR Corpus Overview
3.2 Corpus Construction Steps
4 Results
4.1 Contributions
4.2 Statistics
5 Discussion
References
A Space Efficient Metadata Structure for Ranking Subset Sums
1 Introduction
1.1 Problem Formulation
1.2 Past Work
1.3 Our Contribution
2 Outline of Our Technique
3 Generation of Top-kk Subsets
3.1 The Metadata Structure upper GG
3.2 Construction of Metadata Structure upper GG
3.3 Query Answering with Heap
3.4 Modified Metadata Structure upper GG
3.5 The Final Structure of upper GG
3.6 Generation of Top-kk Subsets by upper GG on Demand
3.7 Getting Rid of the Bit String
4 Experimental Results
4.1 Analysis of the Results
5 Conclusion
References
Brain Tumour Detection Using Machine Learning
1 Introduction
2 Literature Survey
3 Methodology and Materials
4 Results and Discussion
5 Conclusion and Future Scope
References
Implementation of a Smart Patient Health Tracking and Monitoring System Based on IoT and Wireless Technology
1 Overview
2 Block Diagram
3 Methodology and Results
3.1 Database Tracking and Maintenance
4 Conclusion and Future Scope
References
Diabetes Disease Prediction Using KNN
1 Introduction
2 Literature Survey
2.1 How is Data Science Revolutionizing the Healthcare Industry?
2.2 Role of Data Science in Health Care
2.3 Diabetes Detection Using Data Science
2.4 Flow of the Methodology Used for Diabetes Detection
3 Proposed System
4 Results
4.1 Experimental Results
4.2 Visualization of Obtained Results
5 Conclusion
6 Future Scope
References
Review: Application of Internet of Things (IoT) for Vehicle Simulation System
1 Introduction
2 Application
3 Basic Concepts of IoT
4 Simulation Concept
5 Simulation-Based Internet of Things
6 Application of Simulated IoT for System Used in Vehicle
7 Car Simulation Structure and Principle
8 Embedding Security Features in a Vehicle Using IoT
9 Conclusion and Future Scope
References
Data Science and Data Analytics
Time Series Analysis and Forecast Accuracy Comparison of Models Using RMSE–Artificial Neural Networks
1 Introduction
2 Related Research
3 Neural Networks Models in Time Series
3.1 Feed-Forward Neural Network Model
3.2 Time-Lagged Neural Networks
3.3 Seasonal Artificial Neural Networks
3.4 Long Short-Term Memory (LSTM)
4 Time Series Analysis
4.1 Program for Best Method
4.2 Method-Wise Analysis
5 Forecast Accuracy Comparison and Result
6 Conclusion
References
A Non-Recursive Space-Efficient Blind Approach to Find All Possible Solutions to the N-Queens Problem
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Implementation of the Proposed Solution
5 Complexity Analysis of the Implemented Solution
6 Result and Analysis
7 Conclusion
References
Handling Missing Values Using Fuzzy Clustering: A Review
1 Introduction
2 Techniques for Handling Missing Data
2.1 Deletion Method
2.2 Single Imputation
2.3 Multiple Imputation
3 Related Work
4 Categorization of Studies Related to Handling Incomplete Data Using Fuzzy Clustering
4.1 Dataset Collected and Domain Involved
4.2 MVI Technique Used & Applied Distance Measure
4.3 Missingness Mechanism/Rate
4.4 Performance Evaluation Criteria/Tools
5 Conclusion
References
Application of Ensemble Methods in Medical Diagnosis
1 Introduction
2 Related Work
3 Concepts Used in the Implementation
3.1 Ensembles
3.2 Synthetic Minority Oversampling Technique (SMOTE)
3.3 Base Classifiers Used in the Proposed Implementation
3.4 Min-Max Scaling (Normalization)
3.5 Stacking, Boosting and Bagging
4 Design and Implementation
4.1 Data Preprocessing
4.2 Design of the Proposed Model
5 Results
6 Conclusions and Future Work
References
Some Modified Activation Functions of Hyperbolic Tangent (TanH) Activation Function for Artificial Neural Networks
1 Introduction
1.1 Working of MLFFNN
2 Some Commonly Used Activation Functions (AF)
2.1 Linear AF
2.2 Nonlinear AF
3 Proposed Generalized TanH AF and Its Properties
4 Experiments
5 Results
6 Discussion
7 Conclusion and Future Scope
References
Advancements and Challenges in Smart Shopping System
1 Introduction
1.1 IoT Architecture
2 Basics of Smart Shopping System
2.1 Components of Smart Shopping System
3 Literature Review
4 Conclusion and Future Scope
References
Ensemble Model for Music Genre Classification
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Feature Extraction and Description
3.3 Machine Learning Methods
4 Proposed Ensemble Model
5 Model Evaluation
6 Result Analysis, Comparison and Discussion
7 Conclusion and Future Work
References
Decoding Low-Code/No-Code Development Hype—Study of Rapid Application Development Worthiness and Overview of Various Platforms
1 Introduction
2 Related Works
3 Working Principle of Low-Code Development
3.1 Low-Code Platform: A Comparative Analysis
4 Results and Discussion
5 Conclusion
References
Pattern Recognition
IoT Framework for Quality-of-Service Enhancement in Building Management System
1 Introduction
2 Review of Literature
3 Optimized Framework for Betterment of QoS
4 Simulation and Results
5 Conclusion
References
Blockchain IoT: Challenges and Solutions for Building Management System
1 Introduction
2 Related Work
3 Methodology
3.1 Technology Based on BC
4 Blockchain and IoT-Combined Intelligent Technologies
4.1 The Data Layer
4.2 Electronic Signature
4.3 Agreement Layer
4.4 Networking Layer
4.5 Infrastructure Layer
4.6 Application Layer
5 Purpose of BC Technology in IoT
5.1 Enhanced Security
5.2 Improved Traceability
5.3 Reduced Costs
5.4 Immutability
6 Proposed Framework of Integrated BIM and BIoT
7 Results
8 Conclusion
References
Evolving Connections in Metaverse
1 Introduction
2 Meta
3 Decentraland
4 Sandbox
5 Horizon
6 Technology
7 Results and Discussions
8 Impacts
9 Future and Scope of Metaverse
10 Conclusion
References
A Systematic Approach on Blockchain Security Methodologies in Iot
1 Introduction
2 Enabling Technology for IOT
3 IOT Architecture
4 Future Technological Developments for IoT
5 Blockchain Basics
6 Current Challenges for Biot Applications
7 Proposed Framework for Blockchain Based Privacy and Security in IoT
8 Research Gaps in Blockchain Technology with IoT
9 Further Challenges and Recommendations
10 Future Work and Issues
11 Conclusion
References
A Systematic Analysis on Airborne Infectious Virus Diseases: A Review
1 Introduction
1.1 Procedure of Systematic Analysis
1.2 Motivation
1.3 Focus and Objectives
1.4 Contributions
2 Methodology and Framework
2.1 Literature Explority
3 Bibliometric Analysis and Visualization
3.1 Analysis of Publication
3.2 Analysis of Co-occurring of Keywords
4 Approach Overview
5 Experiment and Results Evaluation
6 Conclusion and Discussion
References
Comparison of Different Similarity Methods for Text Categorization
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Data Pre-processing
3.2 Feature Extraction
3.3 Similarity Measures
4 Feature Extraction
4.1 Latent Semantic Analysis Using Word2Vec Vectors
4.2 Explicit Semantic Analysis Using Bag-of-Words
4.3 Soft Cosine Similarity Using TF-IDF
5 Result and Analysis
5.1 Dataset
5.2 AG’s News Topic Classification Dataset
6 Conclusion
References
The Upsurge of Deep Learning for Disease Prediction in Healthcare
1 Introduction
2 Related Literature Work
3 Deep Learning Algorithms
3.1 Artificial Neural Networks
3.2 Deep Belief Networks
3.3 Deep Convolutional Neural Networks
3.4 Recurrent Neural Networks
3.5 Importance and Applications of DL in Healthcare
4 Conclusions
References
SDN-Based Cryptographic Client Authentication: A New Approach to DHCP Starvation Mitigation
1 Introduction
2 Related Studies
3 Methodology
3.1 A Look into DHCP
3.2 SDN Architecture
3.3 Proposed Method
4 Implementation Proof of the Proposed Method via a Python Programming Code
5 Conclusion and Challenges
References
Information Retrieval
Power of Deep Learning Models in Bioinformatics
1 Introduction
2 Related Work of Deep Learning in Bioinformatics
3 Deep Learning Techniques
3.1 Convolutional Neural Networks (CNNs)
3.2 Deep Belief Networks (DBNs)
3.3 Recurrent Neural Networks (RNNs)
4 Deep Learning in Bioinformatics: Challenges and Limitations
5 Conclusions
References
Deep Neural Network with Optimal Tuned Weights for Automated Crowd Anomaly Detection
1 Introduction
2 Literature Review
2.1 Related Works
3 Architecture of Adopted Crowd Anomaly Detection Framework
3.1 Adopted Framework
4 Segmentation and Feature Extraction Stages
4.1 Segmentation
4.2 Feature Extraction
5 Optimized Deep Neural Network via OBL Added Shark Smell Optimization
5.1 Optimized DNN
5.2 Objective Function and Solution Encoding
5.3 Proposed OBLSSO Model
6 Results and Discussions
6.1 Simulation Procedure
6.2 Performance Analysis
6.3 Analysis Based on Classifier
6.4 Statistical Analysis
6.5 Ablation Study
6.6 Convergence Analysis
7 Conclusion
References
Tuning Geofencing in Child Kidnapping Prevention Methods
1 Introduction
2 Existing Work
3 Boundary Violation Detection Algorithms
3.1 Location Detection by Ray Casting
3.2 Location Detection by Triangle Weight Method
4 Discussion
5 Conclusions and Future Work
References
Segmentation of the Eye Fundus Images Using Edge Detection, Improved Image, and Clustering of Density in Diabetic Retinopathy
1 Introduction
2 Methodology
2.1 Algorithm K-Means
2.2 Fuzzy C-Means Clustering
3 Propose Segmentation Technique
4 Experiment Result
5 Conclusions
References
Securing Medical Images Using Quantum Key Distribution Scheme BB84
1 Introduction
2 Related Work
3 Basic Design and Methodology Using BB84 Protocol
4 Simulation Work and Result
5 Conclusion
References
Design and Development of AUV for Coral Reef Inspection and Geotagging Using CV/ML
1 Introduction
2 Literature Survey
2.1 Coral Reefs and Their Importance
2.2 Threats Faced by Coral Reefs
2.3 Importance of Coral Reef Inspection
2.4 Existing AUVs Which Can Be Converted for Coral Inspection
3 System Design
3.1 System Architecture
3.2 Ground Control Station
3.3 Autonomous Underwater Vehicle
3.4 Surface Beacon (SB)
3.5 Subsystem Communication
3.6 Mechanical Design
3.7 CV/ML for Coral Reef Inspection
4 Results and Observations
4.1 Subsystem Communication and Localization
4.2 Coral Image Detection and Inferencing
5 Conclusion and Future Work
References
Theoretical Approach of Proposed Algorithm for Channel Estimation in OFDM MIMO System
1 Introduction
2 OFDM System Model
3 Channel Estimation in MIMO–OFDM
3.1 Pilot-Based Channel Estimation Model
3.2 Blind Channel Estimation Techniques
4 Literature Review
5 Purposed Channel Estimation Algorithm
6 Conclusion
References
An Approach for Digital-Social Network Analysis Using Twitter API
1 Introduction
1.1 SNA Connection Terms
1.2 Beginnings of Social Network Analysis
2 Types of Social Network Analysis
2.1 Ego Network Analysis
2.2 Complete Network Analysis
3 Quantitative Observations in Social Network Analysis
4 Research Methodology
4.1 Using SNA in Contact Tracing for COVID-19
4.2 The Impact of Network Analysis
5 Data Collection Process for Social Network Analysis
5.1 Understand What Type of Data Should Be Collected
5.2 Data Collecting Method
6 Twitter API Example Using Python
6.1 Output
6.2 Applications for Social Network Analysis
6.3 Influence Maximization
7 Conclusion
References
Author Index




پست ها تصادفی