Proceedings of the International Conference on Intelligent Computing, Communication and Information Security: ICICCIS 2022

دانلود کتاب Proceedings of the International Conference on Intelligent Computing, Communication and Information Security: ICICCIS 2022

52000 تومان موجود

کتاب مجموعه مقالات کنفرانس بین المللی محاسبات هوشمند، ارتباطات و امنیت اطلاعات: ICICCIS 2022 نسخه زبان اصلی

دانلود کتاب مجموعه مقالات کنفرانس بین المللی محاسبات هوشمند، ارتباطات و امنیت اطلاعات: ICICCIS 2022 بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد

این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 13


توضیحاتی در مورد کتاب Proceedings of the International Conference on Intelligent Computing, Communication and Information Security: ICICCIS 2022

نام کتاب : Proceedings of the International Conference on Intelligent Computing, Communication and Information Security: ICICCIS 2022
عنوان ترجمه شده به فارسی : مجموعه مقالات کنفرانس بین المللی محاسبات هوشمند، ارتباطات و امنیت اطلاعات: ICICCIS 2022
سری : Algorithms for Intelligent Systems
نویسندگان : , ,
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 467
ISBN (شابک) : 9819913721 , 9789819913725
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 18 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Executive Committee
Preface
Contents
About the Editors
1 Deep Vision: A Robust Dominant Colour Extraction Framework for T-Shirts Based on Semantic Segmentation
1 Introduction
2 Literature Review
3 Proposed Method
3.1 Database for Semantic Segmentation
3.2 Semantic Segmentation Approach
3.3 Training
3.4 Testing and Performance Evaluation
3.5 Data Collection for Colour Extraction and Analysis
3.6 Colour Extraction Method
3.7 Analysing the Broader Colours Zone-Wise
4 Conclusion and Future Directions
References
2 Wheel Shaped Defected Ground Structure Microstrip Patch Antenna with High Gain and Bandwidth for Breast Tumor Detection
1 Introduction
2 Antenna Design
2.1 Design Evaluation
3 Modeling of the Breast Phantom
4 Result
5 Conclusion
References
3 IoT-Based Automated Drip Irrigation and Plant Health Management System
1 Introduction
2 Literature Review
3 Materials and Method
3.1 Detection Module
3.2 Activator Module
3.3 Data Processing Module
4 Results and Discussion
5 Conclusion
References
4 An Integrated Approach for Pregnancy Detection Using Canny Edge Detection and Convolutional Neural Network
1 Introduction
2 Related Work
3 Materials Used
4 Methods Used
4.1 Detailed Description of Proposed Approach
4.2 Integration of Edge Detection in Proposed Work
5 Results and Discussion
5.1 Time Consumption Analysis
5.2 Space Analysis
5.3 Accuracy Analysis
6 Conclusion
7 Future Scope
References
5 Ontology-Based Profiling by Hierarchical Cluster Analysis for Forecasting on Patterns of Significant Events
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 Event Ontology: Categorization of Event Features
3.2 Event Profile: Pattern Discovery Among Events
4 Experimental Results
5 Discussions
6 Conclusion and Future Work
References
6 Meta-algorithm Development to Identify Specific Domain Datasets in Social Science Education and Business Development
1 Introduction
2 Data Collection Process with Methodology
3 Intelligent-Frame Work
4 Result
5 Conclusion
References
7 Methods for Medical Image Registration: A Review
1 Introduction
1.1 Applications of Medical Image Registration
1.2 Uses of Medical Image Registration
2 Literature Review
2.1 Normalized Cross-Correlation Based on Sobel Operator
2.2 Scale Invariant Feature Transform (SIFT)
2.3 Speeded Up Robust Features (SURF)
2.4 Non-rigid Registration Using Markov Random Fields (MRF)
3 Framework of Registration
3.1 Feature Detection
3.2 Feature Matching
3.3 Transform Model Estimation
3.4 Image Resampling and Transformation
4 Analysis
5 Discussion
6 Conclusion
References
8 Early Diabetes Prediction Using Deep Ensemble Model and Diet Planning
1 Introduction
2 Literature Survey
3 Healthcare Recommendation for Early Diabetic Patient
4 Proposed Framework and Implementation Results
5 Conclusion
References
9 Enhancing Image Caption with LSTMs and CNN
1 Introduction
2 Related Work
2.1 Challenges
3 Methodology
3.1 Image Classification
3.2 Image Annotation
3.3 Image Captioning
4 The Framework
4.1 Convolutional Neural Network
4.2 Convolutional Recurrent Neural Network
5 Hybrid Model
6 Experimental Work
6.1 Extracting Image Features
6.2 Preparation of Text Data
6.3 Model Design
6.4 Execution
7 Results
8 Conclusion
References
10 Design and Implementation of S-Box Using Galois Field Approach Based on LUT and Logic Gates for AES-256
1 Introduction
2 The AES-256 Algorithm
2.1 AES-256 Encryption
2.2 AES-256 Decryption
2.3 AES-256 Key Expansion
3 Galois Field (GF) Approach for AES-256
3.1 GF(24) Addition Using Logic Gate
3.2 GF(24) Squaring Using Logic Gate
3.3 Multiplying by a Constant (λ and φ) Using Logic Gate
4 Galois Field (GF) Approach Based on LUT for AES
5 Simulation Results of Galois Field (GF) Approach Based on LUT for AES-256
6 AES-256 RTL Schematic Diagram
7 Simulation Results of Galois Field (GF) Approach Based on Logic Gate for AES-256
8 Conclusion
References
11 Load Balancing for MEC in 5G-Enabled IoT Networks and Malicious Data Validation Using Blockchain
1 Introduction
2 Related Work:
3 Proposed Model
4 Implimentation
4.1 Load Balancing Between MEC Servers
4.2 Secure Computation Offloading for OMECC System with Access Control
5 Simulation Experiments and Result Analysis
5.1 Analysis of ACMLO
5.2 Analysis of upper L upper B normal bar upper M upper E upper C sLB_MECs
5.3 Analysis of OMECC
6 Conclusion
References
12 Path Exploration Using Hect-Mediated Evolutionary Algorithm (HectEA) for PTP Mobile Agent
1 Introduction
2 Related Works
3 Methodology
3.1 2D Sensor Calibration
3.2 Execution of Proposed HectEA (2D Hect-Mediated Evolutionary Algorithm)
4 Experimental Analysis and Results
4.1 Collection of 2D Data
4.2 Filtered Out and Smooth Results of 2D Hect
4.3 Comparative Performance Analysis of HectEA with Other Conventionally Executed Technique
5 Conclusion
References
13 Experimental Analysis on Fault Detection in Induction Machines via IoT and Machine Learning
1 Introduction
2 Data Collection Process
3 Diagnostic Strategy for Machine Learning Process
4 Data Collection Process
4.1 Data Processing—Initial Stage
5 Conclusions
References
14 AENTO: A Note-Taking Application for Comprehensive Learning
1 Introduction
2 Prior Work
3 Working of AENTO
3.1 User Interface
3.2 Digitization
3.3 Note-Processing
3.4 Recommendation System
3.5 Scratchpad
4 Experimental Results
5 Conclusion
References
15 Predicting Power Consumption Using Tree-Based Model
1 Introduction
2 Literature Review
3 Exploratory Analysis
3.1 Dataset
3.2 Case Study
3.3 Feature Selection
4 Evaluation Metrics and ML Models
4.1 Evaluation Metrics
4.2 Machine Learning Models
5 Experimental Result and Observation
6 Conclusion
References
16 A Novel Hybrid Approach for Dimensionality Reduction in Microarray Data
1 Introduction
2 Literature Survey
3 Methods
3.1 Particle Swarm Optimization Algorithm (PSO)
3.2 Grey Wolf Optimization Algorithm (GWO)
3.3 Hybrid PSO-GWO
4 Experiment and Results
5 Conclusion
References
17 An Analytical Approach for Twitter Sarcasm Detection Using LSTM and RNN
1 Introduction
2 Related Work
3 Methodology
3.1 Description of Used Models
3.2 Hyperparameter Optimization
3.3 Training and Testing Models
3.4 Network Functionality Analysis
4 Result and Conclusion
4.1 Training and Testing the Models
4.2 Analysis of Network Functionality
References
18 Fuzzy Logic-Based Outlier Detection Technique for Supporting Stock Market Trading Decision
1 Introduction
2 Related Work
3 Methodology of the Proposed SSOD Technique
4 Results and Discussions
5 Conclusion and Future Enhancement
References
19 Lung Cancer Detection (LCD) from Histopathological Images Using Fine-Tuned Deep Neural Network
1 Introduction
2 Preliminaries
3 Description of Dataset
3.1 Lung Benign Tissue
3.2 Lung Adenocarcinoma
3.3 Lung Squamous Cell Carcinoma
4 Methodology
4.1 Data Pre-processing
4.2 Fine Tune
4.3 Model Training and Testing Strategy
4.4 Evaluation Criteria
5 Result and Discussion
6 Conclusion
References
20 Smart Office: Happy Employees in Enhanced and Energy-Efficient (EEE) Workplace
1 Introduction
2 Related Work
3 Proposed Work
3.1 Imperative Aspects
4 Flow Chart
4.1 Algorithm
4.2 Description
5 Results
6 Conclusion
7 Future Scope
References
21 Aquila Optimization-Based Cluster Head Selection and Honey Badger-Based Energy Efficient Routing Protocol in WSN
1 Introduction
2 Related Works
3 Proposed System
3.1 Model for Energy Consumption
3.2 System Model
3.3 Proposed Methods for Cluster-Based Routing Protocol
4 Results and Discussion
4.1 Performance Evaluation
4.2 Performance Analysis of Proposed Model
5 Conclusion
References
22 Transfer Learning of Pre-trained CNN Models for Meitei Mayek Handwritten Character Recognition
1 Introduction
2 Meitei Mayek
3 Convolutional Neural Network
3.1 State-of-the-Art CNN Models
4 Experimental Setup and Results
4.1 Dataset Details
4.2 Transfer Learning of Pre-trained CNN Models
4.3 Experimental Results and Discussion
5 Conclusion
References
23 GestureWorks—One Stop Solution
1 Introduction
2 Objectives
3 Proposed Methodology
4 Results
5 Conclusion
References
24 Statistical and Quantitative Analysis on IoT-Based Smart Farming
1 Introduction
2 Research Methodologies
2.1 Clustered Classification System
2.2 IoT Frame Work
2.3 Robotic-Agriculture
3 Result Discussion
4 Conclusion
References
25 Survey on Secure Encrypted Data with Authorized De-duplication
1 Introduction
1.1 De-duplication
1.2 Three Ways of De-duplication
1.3 De-duplication Techniques
1.4 De-duplication Storage System
2 Related Work
3 Challenges
3.1 System Architecture
3.2 Encryption of File
3.3 Proof of Ownership
3.4 Encryption of Data
4 Conclusion
References
26 Performance Evolution of OFDM Modulation for G-Distribution Noise Channel Using Pade’s Approximation
1 Introduction
2 Literature Review
3 Mathematical Modeling of Pade’s Approximation
4 Mathematical Modeling of G-Distribution
5 Results and Discussion
References
27 Smart Living: Safe and Secure Smart Home with Enhanced Authentication Scheme
1 Introduction
2 Literature Review
3 Proposed Work
3.1 Flowchart
3.2 Device Used for Design
3.3 Architecture Diagram
4 Results and Discussion
5 Conclusion
6 Future Work
References
28 Role of Internet of Things (IoT) in Preventing and Controlling Disease Outbreak: A Snapshot of Existing Scenario
1 Introduction
2 Significance of Internet of Things
3 Frameworks/Architectures for Handling Disease Outbreak Using IoT
3.1 Empirical Studies
3.2 Non-empirical Studies
4 Evaluation Techniques
5 Datasets
6 Key Findings and Challenges
7 Proposed Hybrid Framework
8 Conclusion
References
29 Analysis of Recent Query Expansion Techniques for Information Retrieval Systems
1 Introduction
2 Motivation
3 Challenges in Performing Information Retrieval Through Query Expansion
4 Query Expansion: The Formal Definition
4.1 Categories of QE Models
4.2 Performance Metrics
5 Literature Review: Recent Developments of QE Techniques
6 Conclusion and Future Scope
References
30 Image Captioning on Apparel Using Neural Network
1 Introduction
2 Literature Review
3 Methodology
4 Results
5 Conclusion and Future Work
References
31 Fake News Detection: A Study
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 Data Preprocessing
3.3 Feature Extraction
3.4 Data Splitting
3.5 Fake Detection Using Machine Learning Techniques
3.6 Fake Detection Using Deep Learning Techniques
3.7 Fake Detection Using Ensembled Learning Techniques
4 Conclusion
5 Current Challenges and Future Direction
References
32 Multiclass Sentiment Analysis of Twitter Data Using Machine Learning Approach
1 Introduction
2 Literature Review
2.1 Review on Multiclass Sentiment Analysis
2.2 Review on Sentiment Analysis with N-gram Features
3 Methodology
3.1 Data Pre-processing
3.2 Feature Extraction and Polarity Assignment
3.3 Applying Machine Learning Classifiers
4 Results and Discussion
5 Conclusion
References
33 Space–Time Continuum Metric
1 Introduction
2 Time Complexity
3 Space Complexity
4 Space–Time Tradeoff
5 Space–Time Continuum
6 Space–Time Continuum in Action
6.1 Bubble and Selection Sort Tug
6.2 Merge and Heap Sort Tug
7 Conclusion
References
34 Fuzzy Assessment of Infrastructure Construction Project Performance
1 Introduction
2 Literature Survey
3 Methodology
3.1 Data Collection
3.2 Model Development
4 Implementation of Proposed Methodology in Real Case Study
5 Conclusion
References
35 Smart Phone-Centric Deep Nutrient Deficiency Detection Network for Plants
1 Introduction
1.1 Background
1.2 Potassium and Boron in Plantain Tree Cultivation
2 Related Work
3 Materials and Methods
3.1 Dataset
3.2 Feature Extraction and Classification Using CNN
3.3 Smart Phone-Centric Application
4 Conclusion and Future Work
References
36 Modified Method of Diagnosis of Arrhythmia Using ECG Signal Classification with Neural Network
1 Introduction
2 Cardiovascular Disease
3 Arrhythmia
3.1 Signs and Symptoms of Arrhythmia
3.2 Causes of Arrhythmia
4 Basic Key Techniques
4.1 Electrocardiogram (ECG)
4.2 Neural Network
4.3 Models of a Neuron
4.4 Backpropagation Networks
5 Methodology
5.1 Teaching ECG Arrhythmias
6 Results
7 Conclusion
References
Author Index




پست ها تصادفی