Proceedings of International Conference on Advanced Computing Applications: ICACA 2021

دانلود کتاب Proceedings of International Conference on Advanced Computing Applications: ICACA 2021

57000 تومان موجود

کتاب مجموعه مقالات کنفرانس بین المللی کاربردهای محاسباتی پیشرفته: ICACA 2021 نسخه زبان اصلی

دانلود کتاب مجموعه مقالات کنفرانس بین المللی کاربردهای محاسباتی پیشرفته: ICACA 2021 بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 3


توضیحاتی در مورد کتاب Proceedings of International Conference on Advanced Computing Applications: ICACA 2021

نام کتاب : Proceedings of International Conference on Advanced Computing Applications: ICACA 2021
ویرایش : 1
عنوان ترجمه شده به فارسی : مجموعه مقالات کنفرانس بین المللی کاربردهای محاسباتی پیشرفته: ICACA 2021
سری : Advances in Intelligent Systems and Computing
نویسندگان : , ,
ناشر : Springer
سال نشر : 2021
تعداد صفحات : 837
ISBN (شابک) : 9811652066 , 9789811652066
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 24 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Foreword
Preface
Contents
About the Editors
Advancement in Internet of Things Applications
Internet of Things-Based Animal Health Monitoring and Management
1 Introduction
2 Related Work
3 Proposed Solution
3.1 Component Selection
3.2 Simulink Model
3.3 Implementation
4 Results
5 Conclusion and Future Work
References
Cryptanalysis of an Authentication and Key Management Scheme in Context of Generic Hierarchical IoT Network
1 Introduction
2 Related Work
3 Review of Wazid Et Al. Scheme
3.1 Network Model
3.2 Threat Model
3.3 Scheme Review
4 Cryptanalysis of Wazid Et Al. UAKMP Scheme
4.1 Stolen Verifier Table Attack
4.2 Sensor Node Capture Attack
4.3 No Perfect Forward Secrecy
4.4 Clock Synchronization Attack
4.5 Flooding Attack
4.6 Sensor Node Impersonation Attack
5 Conclusion
References
Personalized Smart Recommendation System for Industrial Internet of Things
1 Introduction
2 Related Works
2.1 Classical Collaborative Filtering Model
2.2 Collaborative Filtering Model on Clustering
2.3 Collaborative Filtering Model on Time-Aware
3 Motivation and Contribution
4 Proposed Methodology
4.1 Aimed CF Based on CSK-Means and TCC
4.2 Time Entropy Preference Pattern
5 Mathematical Modeling of Proposed Work
5.1 Pearson Correlation Coefficient Definition (PCC)
5.2 Prediction Score Definition
5.3 Cuckoo Search Definition
5.4 K-Means-Based Cuckoo Search Definition
5.5 Proposed Time Correlation Coefficient (TCC) Definition
5.6 TCCF Model Definition
5.7 Time Entropy Definition
6 Proposed Algorithm
7 Performance Evaluations
8 Future Work
9 Conclusion
References
IoT-Based Anti-poaching Technology to Save Wildlife
1 Introduction
2 Characteristics and Classification of Anti-poaching Systems
3 Existing Models and Systems
4 Systems Analysis
5 Proposed System
6 Discussion
7 Conclusion
8 Future Scope
References
GeoLens: Geospatial Location Exploration Using Mobile Crowdsensing in Tourism 4.0: A Case Study of Kunjanagar Eco-Park, Falakata, West Bengal
1 Introduction
2 Related Work
3 Results and Discussion
3.1 Adding Area and Places on Google Earth Explorer
3.2 Geospatial Analysis
3.3 Geotagging Using GPS Map Camera App
3.4 Adding New Places in Google Map
4 Conclusion and Future Scope
References
IoT Cloud System for Street Lights Monitoring Based on Solar Energy Using ESP32
1 Introduction
2 Related Work
3 Proposed System
4 Working Methodology and Results
5 Conclusion
References
Smart Vehicle Management System Using Internet of Vehicles (IoV)
1 Introduction
2 System Overview
3 Smart Vehicle Management Unit
3.1 Architecture of the Proposed System
3.2 Flow Process of the Proposed IoV Communication System
4 System Design and Implementation
4.1 Schematic and Hardware Design
4.2 Dedicated Smart Android Application
5 Results
6 Conclusion
References
IoT-Based Real-Time HRV Performance Analysis
1 Introduction
2 Methodology
2.1 ECG Signal Acquisition
2.2 PPG Signal Acquisition
2.3 ECG and PPG Data Points Transferred to the Cloud Server
3 Data Point Analysis
4 Result
5 Discussion
References
Implementation of Acoustic Source Localization on Edge-IoT Platform
1 Introduction
2 DOA Inference Design
3 Proposed Algorithm
4 Challenges and Excellence of the Platform
5 Depiction Issues
6 Testing and Results
7 Performance Evaluation
8 Conclusion
References
Internet of Things Platform for Advantageous Renewable Energy Generation
1 Introduction
1.1 Notions
1.2 Motivation
1.3 Methodology
2 Internet of Things (IoT)
3 Different Technologies for Enabling IoT Eco-System
3.1 Sensors and Actuators
3.2 IoT and Microcontroller
3.3 Communication Technologies
4 IoT for Renewable Energy Generation
5 Challenges
6 Conclusion
References
Anomaly Detection at the IoT Edge in IoT-Based Smart Home Environment Using Deep Learning
1 Introduction
2 Proposed Architecture
2.1 Testbed Creation
2.2 Deep Learning Methodology
3 Experiment
3.1 Dataset Preparation
3.2 The Proposed ANN Model
4 Results
5 Conclusion
References
SafeBand: IoT-Based Smart Security Band with Instant SOS Messaging
1 Introduction
1.1 The Importance of Our Study
1.2 The Previous Research
1.3 Limitations of the Current Study
1.4 The Major Contribution of the Paper Is as Follows
2 The Aim of the Study
3 Methodologies
3.1 IoT System Architecture
3.2 Proposed Technique
3.3 Fuzzy Logic
4 Testing
5 Comparison with Other Works
6 Conclusion
References
A Smart Emergency Exit System Based on IoT for Fire Perils
1 Introduction
2 Internet of Things (IoT)
3 Proposed Model
4 Routing Algorithm
5 Evaluation of Proposed Model
6 Conclusion
References
IoT Enabled Automatic Access Controlled System with COVID Detection
1 Introduction
2 Background Research
3 Logistic Model
3.1 ATmega328p
3.2 I2C Communication
3.3 MAX30100 (Pulse-Oximeter Sensor)
3.4 MLX90614 (IR Temperature Sensor)
3.5 1-Channel Relay Module
4 The Dynamic Approach to the Project
4.1 Input Phase
4.2 Processing Phase
4.3 Output Phase
5 Experiments
6 Discussion
6.1 Testing and Analysis
6.2 Cons of the Sensor(s) Used
6.3 Future Scope of the Project
7 Conclusion
References
Computer Communication and Networking
Dynamic Sectorized Routing in Mobile Ad Hoc Networks Using Reconfigurable Directional Antenna
1 Introduction
2 Related Work
3 Methodology
4 Performance Study
5 Conclusions
References
Improving Network Stability Period for Precision Agriculture: An Energy-Aware Routing Approach
1 Introduction
2 Related Works
3 System Model
3.1 Network Model
3.2 Energy Model
3.3 Stability Period
4 Proposed Approach
5 Simulation Studies
5.1 Simulation Setup
5.2 Simulation Result
6 Conclusion and Future Work
References
Enhancing DSR Routing Protocol to Predict Optimal Path Using Dragonfly and Artificial Bee Colony Algorithm in MANET
1 Introduction
2 Literature Review
2.1 DSR
2.2 Swarm Intelligence
3 Motivation
3.1 Problem Formulation
3.2 Objectives of the Study
4 Contribution
4.1 Honeybee Algorithm
4.2 Dragonfly Algorithm
5 Proposed Dragonfly-Bee Routing Algorithm
6 Simulation
7 Comparative Analysis of Proposed and Existing Work
8 Conclusion
References
Comparative Study of Different Machine Learning Models for Measurement of QoE Based on MOS in Wireless Networks
1 Introduction
2 Related Works
3 Our Proposed Work
4 Comparative Study of 5 Different Machine Learning Models
5 Conclusion with Future Works
References
Common Ticketing Service in Multimodal Transportation System
1 Introduction
2 Related Work
3 Proposed Common Ticketing Service
4 Illustration and Evaluation
5 Conclusion
References
A MAP-Based Hybrid Cryptography Algorithm for Low-Cost Secret Communication
1 Introduction
1.1 Lossy Compression
1.2 Lossless Compression
2 Literature Review
3 Proposed Technique
3.1 Map Bundling and Compression
4 Experimental Results
5 Conclusion
References
High Density Salt and Pepper Noise Removal Algorithm Using Statistical Approach
1 Introduction
2 Proposed Algorithm
3 Experimental Result Analysis
4 Conclusion
References
Cloud–Fog–Edge Computing Framework for Combating COVID-19 Pandemic
1 Introduction
2 Proposed Framework
2.1 Health Data Analysis
2.2 Faster Reporting of Health Status
3 Experimental Evaluations
4 Conclusion
References
An Innovative Active Queue Management Model Through Threshold Adjustment Using Queue Size
1 Introduction
2 Motivation and Objectives
3 Proposed Scheme
4 Simulation Results and Comparison
5 Conclusion
References
Sentiment Analysis of Twitter Images Through Novel Sequential Attention-Based Deep Metric Network
1 Introduction
2 Review of Existing Work
3 Proposed Work
3.1 Sequential Attention-based Deep Metric Network (SA-DMNet)
4 Results and Discussion
4.1 Experimental Design
4.2 Dataset Description
4.3 Evaluation Metrics
4.4 Comparative Performance Analysis
5 Conclusion
References
A Study on Data Protection and Privacy Issues in Healthcare Data
1 Introduction
1.1 Problem Statement
1.2 Significance of the Study
1.3 Structure of the Paper
2 Review of Literature
2.1 Public Views of Health Information Privacy
2.2 Patients Attitude Toward Healthcare Privacy
3 Research Methodology
3.1 Research Methods
3.2 Instrument
3.3 Data Collection Process
4 Research Findings
5 Conclusion and Future Scope
References
MAHI: Multiple Attribute Heterogeneity Index for Wireless Sensor Networks
1 Introduction
2 Related Works
3 Preliminaries
3.1 Gini index or Gini Coefficient
3.2 Multiplicative Attribute Graph (MAG)
4 Proposed Algorithm: Multiple Attribute Heterogeneity Index  (MAHI)
4.1 MAG modeling of WSN
4.2 Calculation of Heterogeneity of MAG modeled WSN
5 Experimental Analysis
6 Conclusion and Future Scope
References
Backscatter Interrogation Performance in UHF RFID with Energy Harvesting
1 Introduction
2 System Block Diagram
2.1 Single User RFID Block
2.2 Multiuser RFID Block
2.3 Energy Harvesting RFID Block
3 Mathematical Description of the Model
3.1 Single User RFID Mathematical Model
3.2 Multiuser RFID Mathematical Model
3.3 Energy Harvesting Mathematical Model
3.4 READ Probability Maximization
3.5 Optimization Power Allocation
4 Result Analysis
4.1 Square Wave Result Analysis
4.2 Sinusoidal Wave Result Analysis
4.3 Cosine Wave Result Analysis
4.4 Sawtooth Wave Result Analysis
5 Energy Harvesting
6 Conclusion
References
Comparative Analysis of Load Balancing Algorithms in Cloud Computing
1 Introduction
2 Load Balancing Taxonomy
2.1 System Resource Specific Load Balancing
2.2 System Concern Specific Load Balancing
3 Load Balancing Algorithms
4 Performance analysis
5 Conclusion and Future Work
References
A Clustering-Based Optimization of Resource Utilization in Fog Computing
1 Introduction
2 Related Work
3 Multi-fold Task Framework
4 Resource-Oriented Task Scheduling in Multi-fold Framework
5 Simulation Environment and Results
6 Conclusion
References
Design and Implementation of Centrality Approach-Based Energy Efficient Routing in Wireless Sensor Network
1 Introduction
2 Related Work
3 Proposed Methodology
4 Energy Model and Parameter
4.1 Energy Model
4.2 Parameters
5 Performance Evaluation
5.1 Residual Energy
5.2 Throughput
5.3 Packet Delivery Ratio
6 Conclusion
References
Fuzzy-Based Clustering Toward Improving the Lifespan of Wireless Sensor Networks
1 Introduction
2 State of the Art
3 Description of Network Model
3.1 Network Model
3.2 Energy Model
4 Proposed Approach
4.1 Fuzzified Updates with Energy-Based Clustering (FUEC)
5 Conclusion
References
An Enhanced Steganographic Algorithm for Secure Communication
1 Introduction
2 Background
2.1 Chaotic Map
2.2 Logistic (LM) and Sine Map (SM)
2.3 Coupled Chaotic Map (CM)
2.4 Least Significant Bit (LSB)
3 Proposed Method
4 Statistical Parameters
4.1 Correlation
4.2 Energy
4.3 Homogeneity
4.4 Peak Signal-to-Noise Ratio (PSNR)
5 Result and Discussion
6 Comparison with Existing Techniques
7 Conclusion
References
Intelligent Information Systems
OAIPM: Optimal Algorithm to Identify Point Mutation Between DNA Sequences
1 Introduction
1.1 Binary Representation
2 Novel Technique for Similarity Analysis
2.1 Comparison Between Chimpanzee and Human
2.2 Comparison Between Chimpanzee and Mouse
2.3 Comparison Between Human and Mouse
3 Running Time Comparison with Other Methods
4 Experimental Results and Applications
4.1 Performance Analysis
5 Conclusion
References
A Novel Medical Prognosis System for Breast Cancer
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Source
3.2 Data Preprocessing and Final Data Description
3.3 Data Splitting
3.4 Clustering Techniques
3.5 Classification Methods
4 Results
References
Retinal Vessels Identification Using Two-Level Synthesis and Noise Correction Method
1 Introduction
2 Transformation of Gray Scale and Enhancement
3 Binarization for Vessel Identification
4 Multilayer Image Synthesis
5 Results Discussion and Comparison
6 Conclusions and Future Scope
References
A Watermarking Method Resilient Against Many Hybrid Attacks for Color Medical Images
1 Introduction
2 Image Preprocessing
2.1 Region of Interest and Region of Non-interest Segmentation
2.2 Discrete Cosine Transform (DCT)
2.3 Scale Invariant Feature Transform (SIFT)
2.4 Zernike Moments (ZM)
2.5 Cat Map
2.6 Rank-conditioned and Threshold Vector Median Filter (RCTVMF) [15, 16]
2.7 Perceptual Hash Value
2.8 Watermarks Used
3 Proposed Work
3.1 Embedding Process
3.2 Extraction Process
4 Experimental Results
4.1 Analysis of Imperceptibily and Similarity Using Ten Different Medical Images
4.2 Robustness of Hospital Logo, EPR, and PHV Against Different Hybrid Attacks
4.3 Comparison of the Proposed Method with Other Existing Methods
4.4 Time Performance
5 Conclusion
References
On Mono-Line Boolean Symmetry Detection
1 Introduction
2 Related Work
3 Preliminaries
4 Symmetry Computation
4.1 Proposed Theorem
4.2 Procedure: Discovery of Symmetric Groups
5 Experimental Results
6 Conclusion
References
Online Recommendation System Using Human Facial Expression Based Emotion Detection: A Proposed Method
1 Introduction
2 Related Research Work
3 Proposed Work
4 Observation and Results
5 Conclusion and Future Work
References
Skin Cancer Detection Using Convolutional Neural Networks
1 Introduction
1.1 Background
2 Material and Method
2.1 Dataset Description
2.2 Pre-processing the Dataset
2.3 Description of the Architecture
3 Results and Discussion
4 Conclusion
References
A CNN-Based Approach Towards Gender Identification from Online Handwritten Bangla Vowel Modifiers
1 Introduction
2 Data Set
3 Proposed Method
3.1 Convolutional Neural Network-Based Classification
4 Results and Discussion
5 Conclusion
References
Solving Hierarchical Hub Facility Location Problem Using Refined Genetic Algorithm
1 Introduction
2 Problem Definition
3 Proposed GA with Local Refinement
3.1 Chromosome Encoding and Population Size
3.2 Fitness Computation
3.3 Genetic Operators
3.4 Elitism
3.5 Termination Criterion
4 Computational Results and Discussion
5 Conclusion and Future Works
References
Block Based Copy–Move Forgery Detection for Digital Image Forensic
1 Introduction
2 Review of Related Literature
2.1 SIFT Key-Point-Based Multi-CMFD
2.2 Region-Growing Strategies
2.3 Free Form Copy–Move Detection by ICV
2.4 Improved SIFT-PCA-Based CMFD
3 Proposed Technique
3.1 Feature Extraction
3.2 Detecting and Plotting Forged Region
4 Experimental Result and Evaluation
4.1 Datasets
4.2 Measuring Performance
4.3 Results
5 Conclusion and Future Work
References
A Shallow Neural Net for Retinal OCT Image Classification
1 Introduction
2 Related Works
3 Neural Network
3.1 Architecture
3.2 Training
4 Process Flow
5 Dataset Description
6 Evaluation Metrics
7 Experimental Results and Discussion
8 Implementation Requirements
9 Comparative Study and Discussion
10 Conclusion and Future Scope
References
Robust Optimized Structural Feature-Based Transformation Parameter Estimation for Image Registration
1 Introduction
2 Relevant Techniques for the Proposed Method
3 Proposed Work
3.1 Feature Extraction Using SIFT
3.2 Optimize the Features Using EO
3.3 Train the Predicted Model Using Both ANN and Random Forests
4 Experiment and Analysis
4.1 Description of Data Set
4.2 Analysis of Results
5 Conclusion
References
Multispectral Satellite Image Classification Using Hybrid Convolution Neural Network
1 Introduction
2 Material and Methods
2.1 Data Source
2.2 Image Preprocessing
2.3 Methodology
3 Results and Discussion
4 Conclusions
References
Word Segmentation of Offline Handwritten Bangla Text Lines
1 Introduction
2 Overview of the Study
3 The Proposed Method
3.1 Preprocessing
3.2 Word Segmentation
4 Result and Discussion
4.1 Comparative Analysis
4.2 Error Analysis
5 Conclusion
References
Text/Non-text Scene Image Classification Using Deep Ensemble Network
1 Introduction
2 Proposed Method
2.1 Preprocessing
2.2 TNT Network
2.3 Ensemble Learning Based on Horizontal Voting
3 Experiments
3.1 Dataset and Evaluation Protocol
3.2 Training Regime
4 Results and Analysis
5 Conclusion
References
Exploratory Study of Machine Learning Algorithms in Recommender Systems
1 Introduction
2 Review of Literature
2.1 An Overview of Recommender Systems
2.2 Categories of Recommendation Algorithms
3 Applications of Recommender Systems
4 Issues with Recommender Systems
5 Conclusion
References
Identification of the Dawn or Dusk Ragas
1 Introduction
2 Related Works
3 Proposed Method
4 Results and Analysis
5 Conclusion
References
Automated Improved Blood Vessels Detection Using Morphological Processing, DWT, and Gamma Correction Method
1 Introduction
2 Literature Review
3 Proposed Method
4 Results and Discussion
5 Conclusion and Future Work
References
Comparing Different Preprocessing Techniques for the Classification Tasks in Diabetic Retinopathy from Fundus Images
1 Introduction
2 Review of Preprocessing Strategies
3 Experimental Setup
3.1 Datasets
3.2 Deep Convolutional Neural Network (DCNN)
3.3 Preprocessing Pipelines and Staging
3.4 Implementation Details
3.5 Evaluation Metrics
4 Results
5 Conclusion
References
Emerging Trends in Technology
Reinforcement Learning Algorithm for Partially Observable Environment Considering State Estimation Error Prediction
1 Introduction
2 Preliminaries
2.1 Control and State Estimation in Partially Observed Markov Decision Process
3 Proposed Method
3.1 Objective Function Considering Prediction of State Estimation Error
3.2 Algorithm
4 Experiments
4.1 Experimental Environments
4.2 Experimental Conditions
4.3 Results and Discussions
5 Conclusion
References
Expander Graph-Based Structured Random Sensing Matrix in Compressed Sensing
1 Introduction
2 Literature Review
3 Proposed Method
3.1 Complexity Analysis
4 Simulations and Results
5 Conclusion
References
Uniform Distribution of Fat Robots on a Circle Under Limited Visibility
1 Introduction
2 Literature Review
2.1 Contribution of This Paper
3 Framework Used
4 Condition for Uniform Circle Formation by a Distributed System of Robots
5 Description of the Algorithm
5.1 Look Phase
5.2 Compute Phase
5.3 Move Phase
6 Analysis of the Algorithm
6.1 Correctness
6.2 Discussion on the Number of Robots
7 Simulations
8 Conclusion and Future Scope
References
A Systematic Review of Test Case Prioritization Approaches
1 Introduction
2 Test Case Prioritization (TCP)—Background Studies
3 Selected Review Related to Test Case Prioritization Approaches (TCP)
3.1 Research Papers Selected for the Period 1999–2006
3.2 Research Papers Selected for the Period 2007–2014
3.3 Research Papers Selected for the Period 2015–2020
4 Summarization of TCP Approaches
4.1 Research Questions, Motivations, and Their Significance
5 Research Analysis
6 Conclusion
References
An Improved Positioning Accuracy Method of a Robot Based on Particle Filter
1 Introduction
2 System Configuration
2.1 Sensors Fusion and Analysis
2.2 Kinematics Model Impact on the Robot
3 Position Measurement Based on Particle Filter
3.1 Analysis on Bayesian Filter
3.2 Proposed Positioning Method
4 Experimentation and Results
5 Conclusion
References
FCA-Based Constant and Coherent-Signed Bicluster Identification and Its Application in Biodiversity Study
1 Introduction
2 Background
2.1 Related Concepts
2.2 Constant and Coherent-Signed Biclusters: Illustration with Examples with Respect to Our Addressed Biodiversity Domain
3 Pattern Structure for the Signed Partition and Bicluster Generation
4 Conclusions
References
Application of Social Networks and Data Mining on Crime Victims
1 Introduction
2 Common Terms and Concepts
2.1 Data Mining
2.2 Classification
2.3 Decision Tree Induction
2.4 WEKA
3 Related Work
4 Objectives and Data Model
5 Proposed Model
6 Result Analysis
7 Conclusion and Future Scope
References
Intelligent Security Control Based on the New Criterion of Edwards and Montgomery Curves, Isogenous of These Curves Supersingularity
1 Introduction
2 Preliminaries
3 Review of Previous Results
4 Systematic Algebraic Analysis of the Curve and Curve Order Calculation Method
5 Results
6 Discussions
7 Conclusions
References
Computational Biodiversity
1 Introduction
2 Computational Approaches in Biodiversity
3 Research Groups and Their Efforts
4 Analysis of Present Scenario
4.1 A Comprehensive Analysis on Computational Biodiversity Approaches and Applications
4.2 Computational Biodiversity Approaches in Different Domain
4.3 Analysis Based on Different Applications
5 Development Toward Biodiversity Information System and Future Scopes
6 Conclusion and Future Work
References
Modeling Competency Questions-Based Ontology for the Domain of Maize Crop: SIMcOnto
1 Introduction
2 Related Works
3 The Iterative Ontology Engineering Process
4 Modeling the SIMcOnto Ontology
5 Results and Discussion
6 Conclusion and Future Work
References
A State-of-the-Art Survey on Deep Learning Methods and Applications in Bioinformatics
1 Introduction
2 Background
2.1 Deep Learning
2.2 Feature Learning
3 Deep Learning Methods
3.1 Feed-Forward Neural Network (FNN)
3.2 Recurrent Neural Networks (RNNs)
3.3 Convolutional Neural Networks (CNNs)
4 Conclusion
References
Multi-attribute Decision-Making Problem Based on TODIM with Gini Simpson Index of Diversity for Intuitionistic Fuzzy Sets
1 Introduction
2 Preliminaries
3 Gini Simpson Measure for IFSs
3.1 Particular Case:
4 Comparative Study with Some Existing IFSs Measures
5 Intuitionistic Fuzzy MADM Problem Based on TODIM Method
6 Example
6.1 The Application of Intuitionistic Fuzzy TODIM Approach
7 Comparative Analysis
8 Conclusions
References
Upasthiti: A Feature Learning-Inspired Remote Attendance Management System
1 Introduction
1.1 Motivation and Contribution
1.2 Article Organization
2 Methodology
2.1 Dataset Construction
2.2 System Training
3 Performance Evaluation and Deployment
4 Conclusion and Scope for Future Research
References
Analysis of CT Images Using Quantum Edge Extraction Algorithm for the Assessment of Different Stages of COVID-19 Patient
1 Introduction
2 Related Works
3 Quantum Image Edge Extraction Algorithm
3.1 Computational Complexity
4 Analysis
5 Conclusion
References
Cache Memory Architecture for Core Processor
1 Introduction
1.1 Power Reduction Techniques
2 Single Bit Memory Architecture
2.1 Write Driver Circuit
2.2 Conventional SRAM
2.3 Current Mode Sense Amplifier
3 Analysis of Result
4 Conclusion
References
A Cost-Effective Design for a Hydroponics Farm
1 Introduction
2 Literature Review
3 Design of the System
3.1 Sensory Network
3.2 Implementation Process
4 Results and Discussions
5 Conclusion
References
A Decentralized Renewable Microgrid: An Energy on Demand Approach
1 Introduction
2 Background and Related Work
3 Proposed Model
3.1 Operational Structure
3.2 Software Structure
3.3 Energy Box
3.4 Experimentation
4 Result and Discussion
5 Conclusion
References
Construction of a Generator of a Random Cryptographically Strong Sequence Based on a Group of Curve Points
1 Introduction
2 Systematic Algebraic and Complexity Analysis of Point Dividing on 2 at Twisted Edwards Curve
3 Results and Propositions
4 Conclusion
References
Author Index




پست ها تصادفی