Machine Intelligence and Data Science Applications: Proceedings of MIDAS 2021 (Lecture Notes on Data Engineering and Communications Technologies, 132)

دانلود کتاب Machine Intelligence and Data Science Applications: Proceedings of MIDAS 2021 (Lecture Notes on Data Engineering and Communications Technologies, 132)

45000 تومان موجود

کتاب کاربردهای هوش ماشین و علم داده: مجموعه مقالات MIDAS 2021 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 132) نسخه زبان اصلی

دانلود کتاب کاربردهای هوش ماشین و علم داده: مجموعه مقالات MIDAS 2021 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 132) بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد

این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 6


توضیحاتی در مورد کتاب Machine Intelligence and Data Science Applications: Proceedings of MIDAS 2021 (Lecture Notes on Data Engineering and Communications Technologies, 132)

نام کتاب : Machine Intelligence and Data Science Applications: Proceedings of MIDAS 2021 (Lecture Notes on Data Engineering and Communications Technologies, 132)
ویرایش : 1st ed. 2022
عنوان ترجمه شده به فارسی : کاربردهای هوش ماشین و علم داده: مجموعه مقالات MIDAS 2021 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 132)
سری :
نویسندگان : , , , ,
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 939 [909]
ISBN (شابک) : 9811923469 , 9789811923463
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 24 Mb



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.

توضیحاتی در مورد کتاب :


این کتاب مجموعه ای از مقالات بررسی شده ارائه شده در کنفرانس بین المللی هوش ماشینی و کاربردهای علم داده (MIDAS 2021) است که در دانشگاه کومیلا، کومیلا، بنگلادش طی 26 تا 27 دسامبر 2021 برگزار شد. این کتاب برنامه های کاربردی در زمینه های مختلف را پوشش می دهد. مانند پردازش تصویر، پردازش زبان طبیعی، بینایی کامپیوتری، تجزیه و تحلیل احساسات، تجزیه و تحلیل گفتار و حرکات، و غیره. همچنین شامل برنامه های بین رشته ای مانند حقوقی، مراقبت های بهداشتی، جامعه هوشمند، سیستم فیزیکی سایبری و کشاورزی هوشمند و غیره است. این کتاب مرجع خوبی برای مهندسان علوم کامپیوتر، مدرسان/محققان رشته هوش ماشینی و فارغ التحصیلان مهندسی.

فهرست مطالب :


Preface Contents About the Editors Rise of Blockchain-Based Non-fungible Tokens (NFTs): Overview, Trends, and Future Prospects 1 Introduction 2 Related Work 3 Non-fungible Tokens 4 Analyzing Trends 5 Benefits 6 Challenges 7 Future Prospects 8 Conclusion References An Efficient Data Preparation Strategy for Sentiment Analysis with Associative Database 1 Introduction 2 Literature Review 3 Proposed Methodology 3.1 Eliminating Non-sentimental Sentences or Reviews 3.2 Eradicating Unnecessary Tokens from Sentences 3.3 Extracting Vocabularies and Arranging Uniquely 4 Result and Discussion 4.1 Datasets Collection 4.2 Measurement Matrices 4.3 Model Development 4.4 Discussion and Evaluation 5 Conclusion References A Comparison of Traditional and Ensemble Machine Learning Approaches for Parkinson’s Disease Classification 1 Introduction 2 Literature Review 3 Methodology 3.1 Dataset and Feature Information 3.2 Classifiers Adopted in This Research 4 Results and Discussion 5 Conclusion and Future Work References Reducing Error Rate for Eye-Tracking System by Applying SVM 1 Introduction 2 Literature Review 3 Materials and Methods 4 Results 4.1 Simulation Platform 4.2 Applied Classifier 4.3 EOG Analysis 4.4 Performance Evaluation 4.5 Euclidean Distance 5 Discussion 6 Conclusion 7 Future Works and Limitations References Eye-Gaze-Controlled Wheelchair System with Virtual Keyboard for Disabled Person Using Raspberry Pi 1 Introduction 2 Literature Review 3 Methodology 3.1 Face and Eye Detection 3.2 Eye Blinking Detection 3.3 Eye-Gaze Detection and Eye Tracking 3.4 Virtual Keyboard 3.5 System Model Design 3.6 System Environment 4 Experimental Results 4.1 Face and Eye Detection 4.2 Eye-Gaze and Blinking Detection 4.3 Wheelchair Navigation and Keyboard Typing 4.4 Result Accuracy 5 Conclusion References SATLabel: A Framework for Sentiment and Aspect Terms Based Automatic Topic Labelling 1 Introduction 2 Related Work 3 Methodology 3.1 Sentiment and Aspect Terms Extraction 3.2 Topic Identification Using LDA 3.3 Output Generation 4 Experiments 4.1 Dataset 4.2 Data Preprocessing 4.3 Finding the Optimal Number of Topics for LDA 4.4 Selection of Top Unigrams Features from Clusters 4.5 Qualitative Evaluation of Topic Labels 4.6 Effectiveness Analysis 5 Discussion 6 Conclusion and Future Work References Deriving Soft Biometric Feature from Facial Images 1 Introduction 2 Related Work 3 Material and Methods 3.1 Dataset 3.2 Principal Component Analysis (PCA) 3.3 Linear Discriminant Analysis (LDA) 3.4 Nearest Neighbor (NN) Classifier 4 Experiments and Results 4.1 Experiment 1: Race Identification with PCA 4.2 Experiment 2: Race Identification with LDA 4.3 Experiment 3: Race Identification Using LBP Locally on Face Parts 5 Conclusion References Retinal Disease Classification from Retinal-OCT Images Using Deep Learning Methods 1 Introduction 2 Literature Survey 3 Proposed Methodology 4 Implementation 4.1 System Requirements 4.2 Dataset 4.3 Implementation Details 4.4 Retina CNN Architecture 5 Result and Analysis 6 Conclusion 7 Future Work References Stock Recommendation BOT for Swing Trading and Long-Term Investments in Indian Stock Markets 1 Introduction 2 Literature Review 3 Materials and Method 3.1 Data Collection and Processing 3.2 Data Analysis 4 Results 4.1 Short-Term Data Set 4.2 Long-Term Data Set 5 Conclusion References Issues in Machine Translation—A Case Study of the Kashmiri Language 1 Introduction 2 Kashmiri Language 3 Associated Challenges 3.1 Scarcity of Digital Resources 3.2 Problems with Standardization 3.3 Word Order Issue 3.4 Lack of Pre-processing Tools 3.5 Multiple Dialects 4 Conclusion References Bangladeshi Land Cover Change Detection with Satelite Image Using GIS Techniques 1 Introduction 2 Literature Review 3 Materials and Resource 3.1 Working Platform 3.2 Satelite Images 3.3 Different Classes Classification Procedure from Satelite Image 3.4 Area and Land Cover Products 4 Proposed Methodology 4.1 Dataset 4.2 Preprocessing Using ArcGIS 4.3 Mapping Method 5 Result and Discussion 5.1 IGPB 5.2 UMD 5.3 Comparative Discussion 6 Conclusion References Genetic Algorithm-Based Optimal Deep Neural Network for Detecting Network Intrusions 1 Introduction 2 Related Works 3 Methodology 3.1 Random Set of Neural Architectures 3.2 Build and Train 3.3 Fitness Function 3.4 Selection 3.5 Recombination 3.6 Mutation 4 Results and Discussion 4.1 Dataset 4.2 Results of Optimal DNN Search Using Genetic Algorithm 4.3 Results of Proposed Deep Learning Model 5 Conclusion References Deep Convolutional Neural Network-Based Bangla Sign Language Detection on a Novel Dataset 1 Introduction 2 Related Works 3 Methodology 3.1 Dataset Description 3.2 Dataset Preprocessing 3.3 Proposed Methodology 4 Experimental Results 5 Conclusion and Future Works References Avyanna: A Website for Women’s Safety 1 Introduction 2 Online Women’s Safety System 3 Related Work 4 Proposed Model 4.1 Operating Model of Avyanna 4.2 Technology Used 4.3 Functioning of the Model 4.4 Results 5 Conclusion References Web Page Classification Based on Novel Black Widow Meta-Heuristic Optimization with Deep Learning Technique 1 Introduction 2 Literature Review 2.1 Problem Definition 3 Proposed Methodology 3.1 Feature Extraction 3.2 Novel Black Widow Meta-Heuristic Optimization (NBW-MHO) 3.3 Classification 4 Results and Discussion 4.1 Experimental Setup 4.2 Dataset Description 4.3 Performance Metrics 4.4 Performance Analysis in Terms of Proposed Feature Selection Method 4.5 Performance Analysis in Terms of Proposed Classifiers 5 Conclusion References A Systematic Study on Network Attacks and Intrusion Detection System 1 Introduction 2 Network Attack 2.1 Types of Network Attack 3 Intrusion Detection System (IDS) 3.1 Using Intrusion Detection Systems from the Location Network 4 Literature Survey 5 Analysis 6 Conclusion References Achieving Data Privacy Using Extended NMF 1 Introduction 2 Literature Survey 3 Perturbation-Based PPDM 3.1 Nonnegative Matrix Factorization (NMF) 3.2 Double-Reflecting Data Perturbation (DRDP) 4 Privacy Measures 4.1 Value Difference 4.2 Position Difference 5 Methodology and Results 5.1 IRIS Dataset 5.2 AbsenteeismAtWork Dataset 5.3 FinalGrades Dataset 5.4 Wholesale Customers Dataset 5.5 BreastCancerWisconsin Dataset 6 Conclusion References Challenges of Robotics: A Quest for an Integrated Action 1 Introduction 2 Emergence of Robotics 3 Prospects and Challenges 3.1 Ethical Challenges 3.2 Social Challenges 3.3 Legal Challenges 4 Regulations 4.1 Asimov’s Law 4.2 Code 4.3 Soft Law 4.4 Social Norms and Values 4.5 Formal Legislation 4.6 Recent Legal Developments 5 Suggestions 5.1 Liability 5.2 Personhood 5.3 Adapting to Change 5.4 Preparation for AI 5.5 Asimov’s Law 5.6 Preparing Laws for Robotics 5.7 Roles of the UN 6 Conclusion References Developing an Integrated Hybrid App to Reduce Overproduction and Waiting Time Using Kanban Board 1 Introduction 2 Need for the New Methodology 3 Objectives 4 Literature Review 4.1 Lean Manufacturing 4.2 Little’s Law 4.3 Kanban 4.4 Kanban Pull Production 5 Case Studies 5.1 Case Study 1—Toyota Production System 5.2 Case Study 2 —An Apparel Industry in India 6 Pre-implementation Findings 7 Methodology 7.1 Existing Methodology 7.2 Working Procedure of Kanban Pull Production 7.3 Working Mechanism of Website and Mobile Application 7.4 Rules for Implementation in the Industry 7.5 Benefits of Proposed Approach 8 Results 9 Scope for Future Study 10 Conclusion References Implementation of Gamified Navigation and Location Mapping Using Augmented Reality 1 Introduction 2 Background 2.1 Previous Technologies 2.2 Technology Limitations 2.3 Augmented Reality and ARCore 3 Literature Survey 4 Proposed System 4.1 System Requirements 5 System Overview 6 System Design 7 Experimental Setup 8 Discussion and Results 9 Conclusion and Future Evolution 10 Discussions References A Survey on Autonomous Vehicles 1 Introduction 2 Design and Development of Autonomous Vehicles 2.1 Initiation Phase 2.2 Definition Phase 2.3 Design Phase 2.4 Implementation Phase 3 Design Architecture of Autonomous Vehicles 3.1 Description of Software Architecture 3.2 Highway Analysis Process 3.3 Urban Analysis 3.4 Sensors for Perceptions 4 Testing and Validations 4.1 Testing 4.2 Safety Thresholds 4.3 Safety Processes 4.4 Levels of Testing to Ensure Safety 4.5 RANSAC Algorithm 5 Conclusion References Impact of Innovative Technology on Quality Education: The Resourceful Intelligence for Smart Society Development 1 Introduction 2 Reviews of Literature 3 Contribution 4 Research Objectives 5 Results and Discussions 6 Conclusion References A Review on Virtual Reality and Applications for Next Generation Systems and Society 5.0 1 Introduction 1.1 VR in Society 5.0 1.2 Working of VR in Gaming Devices 1.3 Advantages of Virtual Reality 1.4 Effects of Using VR Extensively 2 Introduction of VR in Gaming Industry 3 Apple in the VR Industry 4 Conclusion References Facial Recognition with Computer Vision 1 Introduction 2 Computer Vision and Machine Learning 3 Related Work 4 Methodology 4.1 Python Programming Language 4.2 Libraries Used 4.3 Haar-Cascade Classifier 4.4 Local Binary Patterns Histogram (LBPH) 5 Experimental Analysis 5.1 Phase-I: Understanding NumPy Arrays 5.2 Phase-II: Images and NumPy 5.3 Phase-III: Working with OpenCV Library 5.4 Phase-IV: Connecting to Webcam with OpenCV and Python 5.5 Phase-V: Face Detection 5.6 Phase-VI: Facial Recognition with Computer Vision Technology 5.7 Step-1: Detection and Gathering 5.8 Step-2: Training 5.9 Step-3: Real-Time Recognition 6 Conclusion and Future Scope References Community Strength Analysis in Social Network Using Cloud Computing 1 Introduction 2 Related Works 3 Design 4 Materials and Methods 4.1 Facebook Application 4.2 Web Services 4.3 Node Proximity 5 Result and Discussion 5.1 Performance 6 Conclusion References Object Detection on Dental X-ray Images Using Region-Based Convolutional Neural Networks 1 Introduction 2 Background Studies 3 Proposed Methodology 3.1 Image Acquisition 3.2 Model Pre-training 3.3 Hard Negative Mining 3.4 Number of Anchors 3.5 Multi-scale Training 3.6 Feature Concatenation 3.7 Object Detection 4 Result 5 Conclusion References Real-Time and Context-Based Approach to Provide Users with Recommendations for Scaling of Cloud Resources Using Machine Learning and Recommendation Systems 1 Introduction 2 Literature Review 3 Methodology 4 Methodology 5 Conclusion References Traffic Density Estimation Using Transfer Learning with Pre-trained InceptionResNetV2 Network 1 Introduction 2 Related Works 3 Methodology 3.1 Dataset 3.2 Image Augmentation and Preprocessing 3.3 Model Overview 3.4 Evaluation Metrics 4 Result Analysis 5 Conclusion References A Mobile Application for Sales Representatives: A Case Study of a Liquor Brand 1 Introduction 2 Background and Related Works 3 Mobile Application for a Sales Representative 3.1 Proposed System 3.2 System Architecture 4 Mobile Application Implementation Details 4.1 Software Details 4.2 Integration of Hardware and Software 5 Results and Discussion 5.1 Results of Sales Forecasting 6 Conclusion and Future Work References Wireless Sensor Networks (WSNs): Toward an Energy-Efficient Routing Protocol Design 1 Introduction 2 Methodology 3 Results and Discussion 3.1 Proposed PRRP Versus LEACH 3.2 Proposed PRRP Versus LEACH 4 Conclusions References Empirical Analysis of Machine Learning and Deep Learning Techniques for COVID-19 Detection Using Chest X-rays 1 Introduction 2 Related Work 3 Application of Techniques 4 Dataset Details 5 Result and Discussion 6 Conclusion and Future Scope References Comparative Analysis of Machine Learning and Deep Learning Algorithms for Skin Cancer Detection 1 Introduction 2 Related Works 3 Dataset Description 4 Application of Techniques 5 Experiment and Implementation Section 5.1 Libraries Used 5.2 Implementation 6 Result 7 Conclusion 8 Future Scope References Investigating Efficacy of Transfer Learning for Fruit Classification 1 Introduction 2 Related Studies 3 Materials and Methods 3.1 Dataset 3.2 Methodology 4 Results 5 Conclusion References BERT-Based Secure and Smart Management System for Processing Software Development Requirements from Security Perspective 1 Introduction 2 Review of Literature 3 Approach for Smart Requirements Management System 4 Exploring Convolution Neural Network 5 Role of BERT 6 Knowledge Graph in Action for Smart Requirements Management System 7 Knowledge Graphs Role in Modeling Industry Best Practice of Security for Software Development 8 Transfer Learning to Cross-Learn Across Applications 9 Research Limitation and Threats 10 Conclusion References Hyper Parameter Optimization Technique for Network Intrusion Detection System Using Machine Learning Algorithms 1 Introduction 2 Related Work 3 Overview of ML Approaches 3.1 Linear Regression 3.2 Support Vector Machine (SVM) 3.3 Decision Tree (DT) 3.4 Random Forest (RF) 3.5 Gradient Boosted Decision Trees (GBDT) 4 Unsw-Nb15 Dataset 5 Proposed Approach 5.1 Hyperparameter Tuning with k-fold Cross-Validation 6 Performance Metrics 7 Experiments and Results 7.1 Logistic Regression (LR) 7.2 Linear SVC 7.3 Random Forest (RF) 7.4 GBDT 8 Model Evaluation 8.1 AUC Score Evaluation 8.2 F1 Score Evaluation 9 Conclusion References Energy Efficient VM Consolidation Technique in Cloud Computing Using Cat Swarm Optimization 1 Introduction 2 Related Works 3 Problem Formulation and Proposed System Architecture 3.1 Makespan 3.2 Energy Consumption 3.3 Fitness Function 3.4 Cat Swarm Optimization 4 Proposed Energy Efficient Consolidation Mechanism by Using Cat Swarm Optimization Algorithm 5 Simulation and Results 5.1 Calculation of Makespan 5.2 Calculation of Energy Consumption 6 Conclusion and Future Works References A Forecast of Geohazard and Factors Influencing Geohazard Using Transfer Learning 1 Introduction 2 Related Works 3 Transfer Learning Approach for Predicting Geohazard 4 Result and Discussion 5 Conclusion References Application and Uses of Big Data Analytics in Different Domain 1 Introduction 2 Big Data Analytics in Banking 3 Big Data Analytics Impact on Telecom Industry 4 Healthcare Big Data Analytics 5 Big Data in Education 5.1 It Helps You Find Answers to Hard Questions 5.2 It is Accessible 5.3 It Can Save Costs 5.4 It is Quick 5.5 It Helps You Adapt 6 Manufacturing and Natural Resources in Big Data 7 Big Data in Government Sector 8 Big Data in Insurance 9 Customer Acquisition 9.1 Customer Retention 9.2 Risk Assessment 9.3 Preventing and Detecting Fraud 9.4 Cost Reductions 9.5 Personalised Services and Pricing 10 Big Data in Retail 10.1 360-Degree View of the Customer 10.2 Price Optimization 10.3 Streamlined Back-Office Operations 10.4 Enhanced Quality of Service 11 Big Data in the Industry of Transport 12 Big Data Analytics in Energy and Utilities 12.1 Prediction, Detection and Prevention of Power Outages 12.2 Smart Load Management 12.3 Preventive Asset Management 12.4 Greater Operational Efficiency 13 Big Data in Wholesale 13.1 Comprehending Macro and Micro Trends Influencing the Market 13.2 Anticipating Future Demand 13.3 Improved Marketing Campaigns 13.4 Increasing Customer Satisfaction References Pedestrian Detection with Anchor-Free and FPN Enhanced Deep Learning Approach 1 Introduction 2 Related Work 3 Proposed Work 3.1 Center and Scale Prediction 3.2 Residual Neural Networks 3.3 Bottleneck Architecture of ResNets 3.4 Feature Pyramid Network (FPN) 3.5 Proposed Pedestrian Detector Architecture 4 Experiment 4.1 Dataset 4.2 Loss Function 4.3 Configuration Details 4.4 Comparison with State-of-the-Art 5 Conclusion References Efficient Machine Learning Approaches to Detect Fake News of Covid-19 1 Introduction 2 Related Works 3 Methodology 3.1 Collection of Data 3.2 Data Preprocessing 3.3 Feature Extraction 3.4 Training the Data 3.5 Tools and Simulation Environment 3.6 Python Packages 3.7 Classification Models 4 Experimental Analysis and Discussions 5 Conclusion References Application of Digital Technology in Accounting Profession for Achieving Business Goals and Sustainable Development 1 Introduction 2 Literature Review 3 Aim and Objectives of the Study 4 Method of the Study 5 Formulation of Hypothesis 5.1 Null Hypothesis: (Ho) 5.2 Alternative Hypothesis (He) 6 What is Digital Technology in Accounts? 7 Uses of Technology in Accounting and Education 8 Accountants’ Role in Sustainable Development 9 Accountants’ Methods for Sustainable Development 10 Sustainable Reporting of Environmental Information 11 Data Table: I 11.1 Users of Digital Technology in Accounting Profession 12 Final Result Table 12.1 Semantic Differential Model in Pie Chart of Response 12.2 Semantic Differential Model in bar Graph of Response 13 Hypothesis Testing 14 Discussion and Conclusion References Application of Robotics in the Healthcare Industry 1 Introduction 2 Literature Review 3 Evolution of Robotics in the Healthcare Industry 4 Designing of Medical Robots 5 Uses of Robotics in the Healthcare Sector 6 Challenges Faced by Robotics in Health care 7 Humanoid Robot in Healthcare Service 8 Robotic Surgery 9 Future Prospects and Conclusion References Context-Driven Method for Smarter and Connected Traffic Lights Using Machine Learning with the Edge Servers 1 Introduction 2 Literature Review 3 Methodology 4 Implementation 4.1 Image Captured by the Traffic Light at a Junction 4.2 The Image Received at Edge Controller 4.3 Sending the Optimized Time to a Traffic Light 4.4 Displaying the Signal of the Traffic Light 5 Conclusion References Forecasting of COVID-19 Trends in Bangladesh Using Machine Learning Approaches 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Collection 3.2 Data Preparation 3.3 Model Descriptions 3.4 Evaluation Metrics 4 Trend Analysis 5 Result and Discussion 6 Conclusion References A Comparative Study of Machine Learning Algorithms to Detect Cardiovascular Disease with Feature Selection Method 1 Introduction 2 Related Works 2.1 Heart Disease Prediction System and Application 2.2 Comparative Analysis of Machine Learning Algorithms to Predict Heart Disease 2.3 Feature Selection to Predict Heart Disease 3 Dataset 4 Methodology 4.1 Dataset Collection 4.2 Data Pre-processing 4.3 Feature Selection 4.4 Machine Learning Models for Different Feature Sets 5 Experimental Results 5.1 Performance Measurement 5.2 Performance of ML Algorithms for Top Three Features 5.3 Performance of ML Algorithms for Top Eight Features 5.4 Performance of ML Algorithms for 12 Features 6 Discussion 7 Conclusion and Future Scope References A Pilot Study for Devanagari Script Character Recognition Using Deep Learning Models 1 Introduction 2 DHCD Dataset 3 Methodology 3.1 Dataset Preparation 3.2 Deep Learning Model Used for the DS Character Recognition 4 Model Results and Analysis 5 Conclusion and Future Work References COVID-19 in Bangladesh: An Exploratory Data Analysis and Prediction of Neurological Syndrome Using Machine Learning Algorithms Based on Comorbidity 1 Introduction 2 Related Works 3 Methodology 3.1 Data Collection 4 Experimental Results and Discussion 4.1 Exploratory Data Analysis of COVID-19 in Bangladesh 4.2 Post-COVID Neurological Effect Analysis 5 Conclusion References Ransomware Family Classification with Ensemble Model Based on Behavior Analysis 1 Introduction 2 Related Work 3 Methodology 3.1 Data Preprocessing 3.2 Feature Selection 3.3 Ensemble Model 4 Experiment and Result Analysis 5 Conclusion References UCSP: A Framework to Tackle the Challenge of Dependency Chain in Cloud Forensics 1 Introduction 2 Background 2.1 Information Security 2.2 Cloud Computing Features and Models 2.3 Cloud Forensics 2.4 Challenges in Cloud Forensics 3 Challenges Related to Dependence on Cloud Providers 3.1 Challenges Related to Coordination 3.2 Challenges Related to Correlation 3.3 Other Challenges Related to Information Security 4 Proposed Model 4.1 Why is UCSP Effective? 4.2 How Does This Model Solve the Correlation and Coordination Challenges Already Posited? 4.3 Extending the Proposed Model to Multi-variety Vendors 4.4 Addressing the Already Existing Challenges 5 Future Work 6 Conclusion References DeshiFoodBD: Development of a Bangladeshi Traditional Food Image Dataset and Recognition Model Using Inception V3 1 Introduction 2 Related Work 3 Methodology 3.1 Data Description 3.2 Model Development 3.3 Training 4 Results 5 Conclusion References Sentiment Analysis of E-commerce Consumer Based on Product Delivery Time Using Machine Learning 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Collection and Preprocessing 3.2 Logistic Regression 3.3 Decision Tree 3.4 Random Forest 3.5 Multinomial Naïve Bayes 3.6 K-Neighbors 3.7 Linear Support Vector Machine 3.8 Performance Measuring 4 Result and Discussion 5 Conclusion References Applications of Artificial Intelligence in IT Disaster Recovery 1 Introduction 2 Background 2.1 Business Continuity 2.2 Failover 2.3 Failback 2.4 Recovery Time Objective or RTO 2.5 Recovery Point Objective or RPO 2.6 Consistency and Performance Impact 3 Disaster Recovery Phases 3.1 Planning or Pre-disaster Phase 3.2 Implementation Phase 3.3 Aftermath Phase 4 Artificial Intelligence in Disaster Recovery 4.1 Pre-disaster Phase 4.2 Implementation Phase 4.3 Aftermath Phase 4.4 Benefits of Utilizing AI in DR Workflow 4.5 Challenges of Utilizing AI in DR Workflow 5 Conclusion References Mushroom Classification Using MI, PCA, and MIPCA Techniques 1 Introduction 2 Literature Review 2.1 Related Work 2.2 Research Gap 2.3 Dataset 2.4 Machine Learning Classifiers 2.5 Principal Component Analysis 2.6 Mutual Information 2.7 Performance Measures 3 Methodology 4 Results and Discussion 5 Conclusion References Factors Influencing University Students’ E-Learning Adoption in Bangladesh During COVID-19: An Empirical Study with Machine Learning 1 Introduction 2 Literature Review 3 Research Methodology 3.1 Sample and Data Collection 3.2 Data Analysis Tools and Techniques 4 Data Analysis and Findings 4.1 Descriptive Statistics 4.2 Reliability and Validity 4.3 Structural Model Results 4.4 Model Accuracy Testing Using Machine Learning Algorithms 5 Discussion 6 Conclusion References Nano Rover: A Multi-sensory Full-Functional Surveillance Robot with Modified Inception-Net 1 Introduction 2 Related Works 3 Proposed Method 4 Experimental Analysis 5 Conclusion and Future Works References Bangla Handwritten Character Recognition Using Convolutional Neural Network 1 Introduction 2 Literature Review 3 Proposed Method 3.1 Dataset Collection and Preparation 3.2 Model Architecture 4 Experimental Details 4.1 Train, Test and Validation Sets 4.2 Model Evaluation 5 Result Analysis 5.1 Error Analysis 5.2 Comparison with Previous Research 6 Conclusion References Music Genre Classification Using Light Gradient Boosting Machine: A Pilot Study 1 Introduction 2 Literature Review 3 Methodology 3.1 Data Preparation and Analysis 3.2 Data Preprocessing 3.3 Modeling 4 Results 5 Conclusion and Future Work References HRPro: A Machine Learning Approach for Recruitment Process Automation 1 Introduction 2 Related Works 3 Background Concepts 4 Proposed Method 5 Results and Analysis 5.1 Interview Points 5.2 Face Deviation 5.3 Emotion Points 6 Conclusion References A Deep Convolutional Generative Adversarial Network-Based Model to Analyze Histopathological Breast Cancer Images 1 Introduction 2 Literature Review 3 Materials and Methods 3.1 Dataset 3.2 Generative Adversarial Network 3.3 Classification Models Setup 3.4 Train, Test and Validation 4 Result 4.1 Models Performance 5 Discussion 5.1 Comparison with Previous Related Study 6 Conclusion References What Drives Adoption of Cloud-Based Online Games in an Emerging Market? An Investigation Using Flow Theory 1 Introduction 2 Literature Review and Hypotheses Development 2.1 Flow 2.2 Adoption of Cloud of Things Enabled Online Games 2.3 Hypotheses Development 3 Methods 4 Results 5 Discussion 6 Conclusion References Method to Recommend the Investment Portfolio with the Mix of Various Schemes and Options Using Reinforcement Learning 1 Introduction 2 Literature Review 3 Reinforcement Learning Model to Recommend Investment Portfolio 4 How This RL Model Works 5 Agent 6 Q-Learning Algorithm 6.1 Assign Gamma Parameter 6.2 State and Action 6.3 Reward Matrix Table 6.4 Q-Matrix Table 7 Reward Function 8 State 9 Expected Behavior and Outcome from This Model 10 Experiment Data 11 Feature Selection 12 Examples 13 Conclusion References Deep Learning Approach for Electricity Load Forecasting Using Multivariate Time Series Data 1 Introduction 2 Related Work 3 Dataset Overview 4 Method 4.1 Data Cleaning and Analysis 4.2 Feature Selection 4.3 Long Short-Term Memory Network (LSTM) 4.4 CNN-LSTM 4.5 ARIMAX 5 Result 6 Conclusion References Social Media Role in Pricing Value of Cryptocurrency 1 Introduction 1.1 Types of Currencies 2 Review of Literature 3 Objective of the Study 4 Social Media Effect the Price of Cryptocurrency by the Following Reasons 4.1 The Power of the Trend 4.2 Billionaires and Big Companies 4.3 YouTubers 4.4 Social Channels like (Facebook, Twitter, and Especially Reddit) 5 Recently the Coins Which Affect the Most 5.1 Doge Coin 5.2 Bitcoin 5.3 Ethereum 6 Conclusion and Future Scope References Twitter Spatio-temporal Topic Dynamics and Sentiment Analysis During the First COVID-19 Lockdown in India 1 Introduction 2 Related Work 3 Twitter Spatio-temporal Topic Dynamics and Sentiment Analysis 3.1 Dataset 3.2 Data Representation 3.3 NTF 3.4 Sentiment Analysis on the Topics from NTF 4 Results 5 Conclusion References Natural Language Interface in Dogri to Database 1 Introduction 2 Literature Review 3 Dogri-NLIDB 3.1 Dogri Language Query (DLQ) 3.2 Tokenizer 3.3 Stopword Removal 3.4 Clause Identifier 3.5 Query Generator 3.6 Database Management System 4 Algorithm of DLIDBMS 5 Experimentation and Results 6 Conclusion and Future Scope References The Mutation Study of Social Media in Student’s Life 1 Introduction 2 Businesses Evolved Due to Social Media 3 Research Methodology 3.1 How Frequently I Use Social Media 3.2 Time Spent on Social Media 3.3 Influence of Social Media on Studies 3.4 Influence of Social Media in Time Management 3.5 Influence of Social Media on My Psychology 3.6 Social Media Made My Life 3.7 How Useful I Find Social Media 3.8 Security and Privacy Concerns on Social Media 3.9 Overall, My Experience of Using Social Media Is 4 Conclusion and Discussion References GPS-Based Route Choice Model for Smart Transportation System: Bringing Intelligence into Vehicular Cloud 1 Introduction—Vehicular Cloud Computing 2 Vehicular Cloud Computing Architecture 2.1 On-Board Components 2.2 Communication 2.3 Cloud Services 2.4 Cloud Applications 3 VCC Applications and Services 4 Performance Evaluation in Vehicular Cloud 5 Proposed GPS-Based Route Choice Model Architecture for Smart Transportation System 6 Mathematical Model for the Proposed Intelligent Performance Evaluation in Vehicular Cloud 6.1 Packets—Inter-Arrival Rate 6.2 Free-Flow Model 6.3 Queuing-Up Model 7 Results and Analysis 8 Conclusion and Future Work References Social Listening on Budget—A Study of Sentimental Analysis and Prediction of Sentiments Using Text Analytics & Predictive Algorithms 1 Introduction 2 Problem Statement 3 Scope of Twitter Sentiment Analysis 4 Objective 5 Literature Review 6 Methodology 7 Analysis 7.1 Data Preprocessing 7.2 Sentiment Analysis 7.3 Sentiment Classification 8 Findings 9 Conclusion References An Application of Internet of Things for Cybersecurity and Control: Emerging Needs and Challenges 1 Introduction 2 Literature Survey 3 Research Objectives 4 Hypothesis 4.1 Null Hypothesis (Ho) 4.2 Alternative Hypotheses (He) 5 The IoT Concept 6 IoT Infrastructure 7 Characteristics of IoT Devices 8 Definitions of IERC 8.1 IERC Models of IoT 9 IoT Application and Service Domains 9.1 Smart Grid 9.2 Smart Metering 9.3 The Advanced Product Supply Chains Are Complex and Weakness 10 Data Table 10.1 Mean (PR)-24.0 Mean (NR) = 60/10 = 6.00 11 Final Results 12 Hypothesis Testing 13 Conclusion References Comparative Performance Evaluation of Supervised Classification Models on Large Static Malware Dataset 1 Introduction 2 Related Works 3 Methodology 3.1 Dataset 3.2 Data Preprocessing 3.3 Dimensionality Reduction 3.4 Dataset Splitting 3.5 Classification Models 4 Result Evaluation 4.1 Setting of Experiments 4.2 Result of Method-1 4.3 Results of Method-2 5 Conclusion References Author Index

توضیحاتی در مورد کتاب به زبان اصلی :


This book is a compilation of peer reviewed papers presented at International Conference on Machine Intelligence and Data Science Applications (MIDAS 2021), held in Comilla University, Cumilla, Bangladesh during 26 – 27 December 2021. The book covers applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, speech and gesture analysis, etc. It also includes interdisciplinary applications like legal, healthcare, smart society, cyber physical system and smart agriculture, etc. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.



پست ها تصادفی