توضیحاتی در مورد کتاب Proceedings of International Conference on Recent Trends in Computing: ICRTC 2022
نام کتاب : Proceedings of International Conference on Recent Trends in Computing: ICRTC 2022
عنوان ترجمه شده به فارسی :
سری : Lecture Notes in Networks and Systems, 600
نویسندگان : Rajendra Prasad Mahapatra, Sateesh K. Peddoju, Sudip Roy, Pritee Parwekar
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 837
ISBN (شابک) : 9811988242 , 9789811988240
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 23 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface and About the Organization
Contents
Editors and Contributors
A Novel High Gain Single Switch Flyback DC–DC Converter for Small-Scale Lightning
1 Introduction
2 Proposed Topology
3 Mathematical Modelling
3.1 Duty Cycle and Turns Ratio
3.2 Design of Inductors
3.3 Efficiency of the Proposed Converter
3.4 Primary and Peak Currents:
3.5 Power and Voltage Ratings of the Designed Converter
4 Modelling Closed Loop Mechanism
4.1 PI Controller
5 Simulation and Results
6 Hardware Analysis
7 Conclusion
References
Learning-Based Model for Auto-Form Filling
1 Introduction
1.1 Existing System
1.2 Proposed System
1.3 Advantages of Automatic Form Filler
2 Working of Local Model
3 Algorithms
3.1 Updating Module
3.2 Search Module
4 Analysis
5 Conclusion and Future Scope
References
Fatality Prediction in Road Accidents Using Neural Networks
1 Introduction
2 Literature Review
3 Methodology
4 Results and Analyses
5 Conclusions
References
Managing Peer Review Process of Research Paper
1 Introduction
2 Literature Survey
2.1 The Effect of Enterprise Resource Planning (ERP) System and Their Practical Use Cases on Business Performances [3]
2.2 A Research Study on the Enterprise Resource Planning (ERP) System Implementation and Current Trends in ERP [5]
2.3 Enterprise Resource Planning (ERP) System Implementation: A Case for User Participation [6]
2.4 Research on Data Security Technology Based on Cloud Storage [9]
2.5 Future Improvisation Is the Work
2.6 Why ERP?
3 Proposed Methodology
3.1 Work Flow of the System
3.2 Different Components of the System
4 Result
5 Conclusion
References
Internet of Things-Based Centralised Water Distribution Monitoring System
1 Introduction
2 Proposed Cloud Architecture for Water Metre
2.1 Sensors and Actuators Layer
2.2 IoT Device/Edge Computing Layer
2.3 Cloud Provider Layer
2.4 Enterprise Network Layer
3 Backbone of Water Metre Network
4 Communication Between Water Metres and Server
5 Develop Water Metre and Its Components
6 Results
7 Conclusion
References
StakePage: Analysis of Stakeholders of an Information System Using Page Rank Algorithm
1 Introduction
2 Related Work
3 Proposed Method
4 Case Study
5 Comparative Study
6 Conclusion and Future Work
References
Violence Recognition from Videos Using Deep Learning
1 Introduction
2 Related Work
3 Research Gap
4 Proposed Methodology
5 Experimental Results
5.1 Confusion Matrix
5.2 Output
6 Classification Report
6.1 Training and Validation Loss
6.2 Training and Validation Accuracy
7 Conclusion
References
Stock Price Prediction Using Machine Learning
1 Introduction
2 Related Work
3 Proposed Methodology
4 Results and Discussion
5 Conclusion
References
Brain Tumor Detection Using Deep Learning
1 Introduction
2 Related Work
3 Proposed Method
3.1 Dataset Description
3.2 FlowChart
3.3 Image Preprocessing
3.4 Image Enhancement
3.5 Thresholding
3.6 Morphological Operations
3.7 Brain Tumor Image Classification Using CNN
3.8 Convolution
3.9 Pooling
4 Performance Evaluation
4.1 Performance of VGG 16
4.2 Performance of VGG 19
4.3 Performance of Resnet50
4.4 Comparison of CNN Models
5 Conclusion
References
Predicting Chances of Cardiovascular Diseases Through Integration of Feature Selection and Ensemble Learning
1 Introduction
2 Literature Review
3 Proposed Framework
4 Performance Evaluation
4.1 Data Analysis
4.2 Classifiers Evaluated
4.3 Feature Selection
5 Result
6 Conclusion
References
Feedback Analysis of Online Teaching Using SVM
1 Introduction
2 Literature Review
3 Methodology
3.1 Sentiment Analysis
3.2 Experimental Result Analysis
4 Result
5 Conclusion
References
DCGAN for Data Augmentation in Pneumonia Chest X-Ray Image Classification
1 Introduction
2 Related Work
3 Dataset Description
4 Proposed Approach
4.1 Conventional Data Augmentation
4.2 Generative Adversarial Network (GAN)
4.3 Convolutional Neural Network (CNN)
4.4 DCGAN
4.5 Performance Metrics
5 Result and Discussions
6 Conclusion
References
Fair Quality of Voice Over WiMAX Coexisting of WiFi Networks for Video Streaming Applications
1 Introduction
1.1 Voice Over Internet Protocol
1.2 VoIP Over IEEE 802.11
1.3 VoIP Over IEEE 802.16
1.4 Mean Opinion Score (MOS) Value
2 A Brief Introduction About Network Model
3 Simulation Results
4 Conclusion
References
An Empirical Overview on DDoS: Taxonomy, Attacks, Tools and Attack Detection Mechanism
1 Introduction
2 Literature Survey
3 Taxonomy of Distributed Denial of Service Attacks
4 DDoS Tools
5 DDoS Attack Detection Framework
6 Proposed Attack Detection Mechanism
7 Result Analysis
8 Conclusion
References
Histopathology Osteosarcoma Image Classification
1 Introduction
2 Material and Method
2.1 Dataset and Methodology
2.2 CNN
2.3 CNN Model
2.4 Machine Learning Models Using Predefined Features
2.5 Experiment
3 Result and Discussion
4 Conclusion and Future Scope
References
Information-Based Image Extraction with Data Mining Techniques for Quality Retrieval
1 Introduction
2 Background
3 Proposed Scheme
3.1 Grid and Segmentation
3.2 Feature Retrieval
3.3 Neighborhood Cluster Module
3.4 Prediction Estimation Block
3.5 Feature Retrieval Question Block
3.6 Conversion of Low-Level Features into High Level Features
3.7 Image Recovery Based on High Level Feature
4 Implementation
5 Conclusions
References
Fake News Detection System Using Multinomial Naïve Bayes Classifier
1 Introduction
2 Literature Survey
3 Various Machine Learning Algorithm
4 Fake News Detection Using Naive Bayes Classification
5 Architecture of Multinomial Naïve Bayes Classifier for Fake News Detection
6 Performance Evaluation Metrics and Experimental Analysis
7 Conclusion
References
Superconductivity-Based Energy Storage System for Microgrid Stabilization by Connecting and Disconnecting Loads
1 Introduction
2 Selection of Architectures
3 Selection of Electronics Components
4 Simulations and Analysis
5 Conclusion
References
Deep Learning-Based Model for Face Mask Detection in the Era of COVID-19 Pandemic
1 Introduction
1.1 Main Objective of the Paper
2 Literature Review
3 Methodology Used
3.1 Datasets
3.2 Data Pre-processing
3.3 ConvNet
3.4 MobileNet
3.5 VGG19
3.6 Inception
3.7 DenseNet
3.8 ResNet50
4 Result
5 Conclusion
References
Efficient System to Predict Harvest Based on the Quality of the Crop Using Supervised Techniques and Boosting Classifiers
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Experimental Framework
4.1 Dataset Description
4.2 System Requirements
4.3 Performance Metrics
5 Results and Discussion
5.1 Comparative Analysis
6 Conclusion and Future Work
References
ResNet: Solving Vanishing Gradient in Deep Networks
1 Introduction
2 Related Work
3 Residual Network
3.1 Mathematical Representation of ResNet
3.2 Types of ResNet and Their Comparison
3.3 Solution to Vanishing Gradients
4 Dataset and Implementation
4.1 Dataset
4.2 TensorFlow
5 Network Design
5.1 Network Architecture
5.2 Data Augmentation
6 Experiment Results
7 Conclusion
References
BRCA1 Genomic Sequence-Based Early Stage Breast Cancer Detection
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 BRCA1 Dataset Description
3.2 Data Pre-processing
3.3 Genomic Sequence Encoding
4 Experimental Results
5 Conclusion
References
Develop Model for Recognition of Handwritten Equation Using Machine Learning
1 Introduction
2 Literature Review
3 Proposed Model
4 Result
5 Conclusion
References
Feature Over Exemplification-Based Classification for Revelation of Hypothyroid
1 Introduction
2 Literature Review
3 Our Contributions
4 Results and Predictive Analysis
5 Conclusion
References
A Framework with IOAHT for Heat Stress Detection and Haemoprotozoan Disease Classification Using Multimodal Approach Combining LSTM and CNN
1 Introduction
2 Literature Review
3 Proposed Method
3.1 LSTM Layer
3.2 Batch Normalization
3.3 Convolutional Layer
3.4 Pooling Layer
3.5 Output Layer
3.6 Simulation Setup
4 Results
5 Conclusion
References
Using Classifier Ensembles to Predict Election Results Using Twitter Data Sentiment Analysis
1 Introduction
2 Related Work
3 Methodology
3.1 Acquiring Data
3.2 Data Pre-processing
3.3 Classification of Sentiments Using SentiWordNet
3.4 Naive Bayes for Sentiment Classification
3.5 Sentiment Classification Using HMM
3.6 Ensemble Approach for Sentiment Classification
4 Algorithms to Calculate Sentiment Score
5 Experimental Details
5.1 Results on the Twitter Sentiment Analysis Datasets
5.2 Results on Healthcare Reform Dataset
6 Conclusion
References
Optimization Algorithms to Reduce Route Travel Time
1 Introduction
2 System Architecture and Design
3 Methods and Methodologies
3.1 Optimization Using Genetic Algorithm
3.2 Optimization Using Ant Colony Optimization
3.3 Optimization Using Grey Wolf Optimization
3.4 Optimization Using Artificial Bee Colony Algorithm
4 Results
5 Conclusion
References
Survival Analysis and Its Application of Discharge Time Likelihood Prediction Using Clinical Data on COVID-19 Patients-Machine-Learning Approaches
1 Introduction
2 Methodology
2.1 Analysis of Longevity
2.2 Artificial Neural Networks—ANN
2.3 Methods and Details
3 Data Analysis
4 Conclusion
References
Credit Card Fraud Detection Using Machine Learning and Incremental Learning
1 Introduction
2 Literature Reviewed
3 Implementation
3.1 Data Preprocessing and Feature Extraction
3.2 Model Training and Class Imbalance Correction
3.3 Feature Selection
3.4 Parametric Tuning and K-Fold Cross Validation
3.5 Incremental Learning
4 Results
5 Conclusion
References
Game Data Visualization Using Artificial Intelligence Techniques
1 Introduction
2 Related Work
3 Proposed Work
3.1 Application AI in Games
3.2 Random Forest Regression
4 Dataset Preparation and Analysis
5 Conclusion and Future Work
References
Energy-Efficient and Fast Data Collection in WSN Using Genetic Algorithm
1 Introduction
2 Literature Review
3 Proposed Method
3.1 Genetic Algorithm Concept
3.2 Modified LEACH Protocol
4 Result and Simulation
5 Conclusion
References
Feature Reduced Anova Element Oversampling Elucidation Based Categorisation for Hepatitis C Virus Prognostication
1 Introduction
2 Literature Review
3 Our Contributions
4 Implementation Setup
5 Conclusion
References
Personality Trait Detection Using Handwriting Analysis by Machine Learning
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Data Acquisition
3.2 Data Preprocessing
3.3 Segmentation (Horizontal and Vertical Projections)
3.4 Feature Extraction
3.5 Classification
4 Implementation
4.1 Extraction of Letter ‘S’
4.2 Extraction of Letter ‘M’
4.3 Extraction of Letter ‘D’
4.4 Extraction of Letter ‘P’
5 Result
6 Conclusion
References
Road Traffic Density Classification to Improvise Traffic System Using Convolutional Neural Network (CNN)
1 Introduction
2 Literature Review
3 Accident Data Analysis and the Need for Traffic Density Classification
4 Proposed Methodology
4.1 “Preprocessing”
4.2 CNN Module
4.3 Fully Connected Layer
5 Implementation and Results
5.1 Data Collection
5.2 Data Preprocessing
5.3 Building the Neural Network
5.4 Training the Network
5.5 Performance Evaluation
6 Conclusion
References
Fake Reviews Detection Using Multi-input Neural Network Model
1 Introduction
2 Related Work
3 Proposed Model
3.1 Dataset
3.2 Preprocessing
3.3 Feature Selection
3.4 Model Training
3.5 Model Evaluation
4 Result and Discussion
5 Confusion Matrix
6 Conclusion
References
Classification of Yoga Poses Using Integration of Deep Learning and Machine Learning Techniques
1 Introduction
2 Related Work
2.1 Human Pose Detection
2.2 Yoga Pose Detection
2.3 Classification Approaches
3 Methodology
3.1 Dataset
3.2 Approach
4 Results and Discussion
5 Conclusion and Future Scope
References
Tabular Data Extraction From Documents
1 Introduction
2 Market Survey
3 Literature Review
4 Methodology
5 Result
6 Conclusion
References
Vision-Based System for Road Lane Detection and Lane Type Classification
1 Introduction
1.1 Different Type of Road Lanes and Their Purpose:
2 Literature Review
2.1 Traditional Approaches
2.2 Deep Learning-Based Approaches
2.3 Approaches for Lane Type Classification
3 Methodology
3.1 Data Acquisition and Image Preprocessing
3.2 Lane Boundary Detection
3.3 Classification of Lane Boundary
4 Result
5 Conclusion
References
An Energy-Efficient Cluster Head Selection in MANETs Using Emperor Penguin Optimization Fuzzy Genetic Algorithm
1 Introduction
2 Review of Literature
3 Proposed Methodology: Energy-Efficient CH Selection in MANET Using Emperor Penguin Optimization Fuzzy Genetic Algorithm
3.1 System Model
3.2 Proposed EPO (Emperor Penguin Optimization)-Based Clustering
4 Experimental Results and Discussion
5 Conclusion
References
Ground Water Quality Index Prediction Using Random Forest Model
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Variable Importance
3.3 WQI Calculation
4 Drinking Water WQI and Irrigation Water WQI Prediction
5 Conclusion
References
Near Threshold Operation Based a Bug Immune DET-FF for IoT Applications
1 Introduction
2 Existing Work
3 New Bug Immune DET-FF
4 Result Analysis
5 Conclusion
References
Analyzing the Trade-Off Between Complexity Measures, Ambiguity in Insertion System and Its Application in Natural Languages
1 Introduction
2 Preliminaries
3 New Descriptional Complexity Measures
4 Trade-Off Results Between (Descriptional) Complexity Measures and Ambiguity Levels
5 Application of the Trade-Off Results in Natural Languages
6 Conclusion
References
Human-to-Computer Interaction Using Hand Gesture Tracking System
1 Introduction
1.1 An Overview to Hand Gesture Tracking System
2 Literature Review
3 Proposed Methodology
3.1 Real-Time Video Acquisition -
3.2 Flipping of Individual Video Frames -
3.3 BGR to HSV
3.4 Colour Identification
3.5 Removing Noise and Binary Image Formation
3.6 Find Contours and Draw Centroids
3.7 Set Cursor Position
3.8 Choose an Action
3.9 Perform an Action
4 Conclusion
References
Human Emotion Recognition Based on EEG Signal Using Deep Learning Approach
1 Introduction
2 Proposed Work
2.1 Dataset Description
2.2 Data Preprocessing
2.3 Feature Selection and Extraction
2.4 Classification
3 Results and Discussion
4 Conclusion and Future Work
References
Sentiment Analysis of COVID-19 Tweets Using BiLSTM and CNN-BiLSTM
1 Introduction
2 Literature Study
3 Methods
4 Implementation
4.1 Data Collection and Preparation
4.2 Lemmatization
4.3 Tokenization and Padding
4.4 Classification
5 Result and Discussion
5.1 BiLSTM
5.2 CNN-BiLSTM
6 Conclusion
References
COPRAS-Based Decision-Making Strategy for Optimal Cluster Head Selection in WSNs
1 Introduction
2 Related Work
3 Proposed COPRAS-Based Optimal Cluster Head Selection (COPRAS-CHS) Technique
4 Results and Discussion
5 Conclusion
References
Unusual Activity Detection Using Machine Learning
1 Introduction
2 Related Work
3 Methodology Followed
3.1 Dataset
3.2 Implementation
4 Result
5 Conclusion
References
Disease Detection for Cotton Crop Through Convolutional Neural Network
1 Introduction
2 Literature Survey
3 Methodology
3.1 Dataset Description
3.2 Pre-processing Images
4 Results
5 Conclusion and Future Work
References
Deriving Pipeline for Emergency Services Using Natural Language Processing Techniques
1 Introduction
2 Literature Review
3 Data Pipeline
4 Proposed Model Pipeline
5 Automation
6 Results
7 Conclusion
8 Future Work
References
Fetal Head Ultrasound Image Segmentation Using Region-Based, Edge-Based and Clustering Strategies
1 Introduction
2 Methodology
2.1 Proposed Technique
2.2 U HC18 Dataset
2.3 Region-Based Segmentation
2.4 Edge-Based Segmentation
2.5 Clustering Strategies
3 Results and Discussion
3.1 Comparative Analysis
3.2 Performance Metrics
4 Conclusion
References
A Shallow Convolutional Neural Network Model for Breast Cancer Histopathology Image Classification
1 Introduction
2 Data Set
3 Methodology
3.1 Pre-processing
3.2 CNN Architecture
3.3 Training and Testing Strategy
4 Results and Discussions
4.1 Analysis of Accuracy
5 Conclusion
References
Efficient Packet Flow Path Allocation Using Node Proclivity Tracing Algorithm
1 Introduction
2 Literature Review
3 Proposed Efficient Packet Flow Path Allocation
3.1 Analysis of Packet Flow and Size
3.2 Efficient Packet Flow Path Allocation Algorithm
4 Implementation Simulation Setup
5 Results and Performance Analysis
6 Conclusion
References
Energy-Efficient Multilevel Routing Protocol for IoT-Assisted WSN
1 Introduction
2 Related Work
3 Proposed Energy-Efficient Multilevel Routing Protocol
3.1 Setup Phase
3.2 Formation of Cluster
3.3 Selection of Cluster Head
4 Simulation Results and Validation
5 Conclusion
References
Ship Detection from Satellite Imagery Using RetinaNet with Instance Segmentation
1 Introduction
2 Related Work
3 Methodology
3.1 Architecture of RetinaNet Model with Instance Segmentation Part
3.2 Instance Segmentation Part
3.3 Focal Loss
4 Results and Discussion
4.1 Dataset Used
4.2 Train the Proposed Model
4.3 Evaluation of Proposed Model
4.4 Model Output
5 Conclusion
References
A Novel Technique of Mixed Gas Identification Based on the Group Method of Data Handling (GMDH) on Time-Dependent MOX Gas Sensor Data
1 Introduction
2 Literature Review
3 Data Collection
3.1 Experimental Setup
3.2 Dataset
4 Methodology
5 Experimental Results
5.1 Performance Indicators
5.2 Statistical Error Analysis
6 Conclusion
References
Software Fault Diagnosis via Intelligent Data Mining Algorithms
1 Introduction
2 Related Work
2.1 Software Fault Seeding
2.2 Mutation Testing
2.3 Software Fault Injection
3 Proposed Method
4 Experiment and Results
4.1 Evaluation Metrics
4.2 Dataset Summary
4.3 Findings and Discussion
5 Conclusion
References
Face Mask Detection Using MobileNetV2 and VGG16
1 Introduction
2 Related Work
2.1 Dataset
2.2 Pre-processing
3 Building the Models
4 Experimental Setup
5 Result Analysis
5.1 VGG16 Result
5.2 MobileNetV2 Results
6 Detailed Comparison of VGG16 and MobileNetV2
7 Conclusion
References
Face Recognition Using EfficientNet
1 Introduction
2 Related Works
3 Materials and Methods
3.1 EfficientNet
3.2 Dataset Used
4 Methodology Used
5 Result and Discussions
6 Conclusion
References
Implementation and Analysis of Decentralized Network Based on Blockchain
1 Introduction
2 Literature Study
3 Methodology
4 Implementation
5 Conclusion
References
Social Distance Monitoring Framework Using YOLO V5 Deep Architecture
1 Introduction
2 Literature Review and Related Works
3 Proposed Algorithm
3.1 Object Detection
3.2 Object Tracking
3.3 Distance Measurement
4 Experiment and Result Discussion
4.1 Dataset Description
5 Conclusion and Future Work
References
Real-Time Smart Traffic Analysis Employing a Dual Approach Based on AI
1 Introduction
2 Proposed and Implemented System
2.1 Data Acquisition and Collection
3 Experiments and Results
4 Conclusion
References
Sustainable Development in Urban Cities with LCLU Mapping
1 Introduction
2 Literature Survey
3 Methodology
3.1 Preprocessing Remote Sensing Imagery
3.2 Urban LCLU Mapping
3.3 Analysis of ULCLU Maps
4 Results and Discussion
4.1 Study Area and Data
4.2 Creating ULCLU Maps from Remote Sensing Data
4.3 Analysis of ULCLU Maps for Urban Green Spaces
4.4 Potential Expansion Areas
5 Conclusion and Future Work
References
Multi-order Replay Attack Detection Using Enhanced Feature Extraction and Deep Learning Classification
1 Introduction
2 Voice Spoofing Detection Corpus (VSDC)
3 Proposed Automatic Speaker Verification (ASV) System
3.1 Feature Extraction Using Combined FLDP-MFCC Technique
3.2 Classification Using GRU
4 Experimental Setup
5 Results
5.1 Analysis of 0PR Versus 1PR
5.2 Analysis of 0PR Versus 2PR
5.3 Comparison of Proposed Approach with Existing Techniques
6 Conclusion
References
Ferry Mobility-Aware Routing for Sparse Flying Ad-Hoc Network
1 Introduction
2 Literature Work
3 Proposed Scheme
3.1 Mobility Model of Ferry UAVs
3.2 Routing Strategy
4 Performance Evaluation
4.1 Simulation Settings
4.2 Performance Comparison with Other DTN Protocols
5 Conclusion
References
Prediction of Cardio Vascular Disease from Retinal Fundus Images Using Machine Learning
1 Introduction
2 Literature Survey
3 Proposed Work
4 Methodology
4.1 Image Acquisition
4.2 Preprocessing
4.3 Segmentation
4.4 Extraction of Texture Features
5 Conclusion
References
Tampering Detection Driving License in RTO Using Blockchain Technology
1 Introduction
1.1 Objectives
2 Literature Survey
3 Methodology
3.1 Driving License Registration
3.2 SHA256 Algorithm
3.3 Padding Bits
3.4 Compression Techniques
3.5 Output
3.6 Manage Driving License
3.7 Blockchain Validation
3.8 Blockchain Mine Performance
3.9 Blockchain Recovery
4 Proposed System
5 Conclusion and Future Work
References
Content-based Image Retrieval in Cyber-Physical System Modeling of Robots
1 Introduction
2 Related Work
3 Proposed System
3.1 Image Pre-processing and Feature Extraction
3.2 ID-SIFT Feature Extraction for Reference and Test Images
3.3 Image Analysis
3.4 Image Retrieval (IR)
3.5 Color and Shape Retrieval
3.6 Similarity Measure
4 Experimentation and Results
5 Conclusion
References
A Hybrid Spotted Hyena and Whale Optimization Algorithm-Based Load-Balanced Clustering Technique in WSNs
1 Introduction
2 Related Work
3 Hybrid Spotted Hyena and Whale Optimization Algorithm (HSHWOA)-Based Load-Balanced Clustering Technique
3.1 Primitives of Whale Optimization Algorithm (WOA)
3.2 Fundamentals of Spotted Hyena Optimization (SHO)
3.3 Hybrid HSHWOA Used for Load Balanced Clustering
4 Simulation Results and Discussion
5 Conclusion
References
Evaluating the Effect of Variable Buffer Size and Message Lifetimes in A Disconnected Mobile Opportunistic Network Environment
1 Introduction
2 Literature Survey
3 Routing Protocols
3.1 Blind-Based Routing Protocols (Flooding)
3.2 Knowledge-Based Routing (Forwarding)
4 Simulation Tool and Setup
4.1 Delivery Probability
4.2 Average Delay
4.3 Overhead Ratio
5 Result and Analysis
5.1 Impact of Varying Buffer Sizes on the Performances of the Network
5.2 Impact of Message Lifetimes on the Performances of the Network
5.3 Finding Impact of Varying Movement Models on the Performances of the Network
6 Conclusion
7 Future Work
8 Result Summary
References
Unsupervised Machine Learning for Unusual Crowd Activity Detection
1 Introduction
2 Literature Survey
3 Problem Identification
4 Proposed Method and Implementation
4.1 Finding Optical Flow of Blocks
4.2 Generation of Motion Influence Information
4.3 Mega Block Generator
4.4 Training
4.5 Testing
5 Results and Discussion
6 Conclusion
References
Author Index