توضیحاتی در مورد کتاب Proceedings of the Second International Conference on Information Management and Machine Intelligence: ICIMMI 2020 (Lecture Notes in Networks and Systems, 166)
نام کتاب : Proceedings of the Second International Conference on Information Management and Machine Intelligence: ICIMMI 2020 (Lecture Notes in Networks and Systems, 166)
عنوان ترجمه شده به فارسی : مجموعه مقالات دومین کنفرانس بین المللی مدیریت اطلاعات و هوش ماشینی: ICIMMI 2020 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 166)
سری :
نویسندگان : Dinesh Goyal (editor), Amit Kumar Gupta (editor), Vincenzo Piuri (editor), Maria Ganzha (editor), Marcin Paprzycki (editor)
ناشر : Springer
سال نشر : 2021
تعداد صفحات : 751
ISBN (شابک) : 9811596883 , 9789811596889
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 25 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Contents
Editors and Contributors
Smart Wireless Network Algorithm in the Era of Big Data
1 Introduction
2 Literature Review
3 Smart Wireless Network Model Base upon Big Data
4 Smart Wireless Network Algorithm
5 Time Complexity Analysis and Green Aspects of Proposed Model
6 Results and Conclusions
References
Detecting Aggressive Driving Behavior Using Spectral Kurtosis and MEMS Accelerometers
1 Introduction
2 Literature Review
3 Tool and Techniques
3.1 MEMS Accelerometer
3.2 Spectral Kurtosis
3.3 Dynamic Time Warping
4 System Model
5 Result and Discussion
6 Conclusion
References
Processing Large Text Corpus Using N-Gram Language Modeling and Smoothing
1 Introduction
2 Related Work
3 N-Grams Model and Smoothing
3.1 Data Set and Preprocessing
3.2 Exploratory Analysis Over Datasets
3.3 Generating N-Grams
3.4 Good Turing Smoothing
3.5 Reducing Memory Use
4 Statistical Modeling
4.1 Prediction Model
4.2 Prediction Algorithm Based on Good Turing Smoothing
5 Results and Discussion
6 Conclusions
References
A Dynamic Gesture Recognition System for Mute Person
1 Introduction
2 Background Study
3 Methodology
3.1 KNN for Classification
3.2 Hue Saturation Value Model Function
3.3 Rule-Based Classifier
4 Results
5 Conclusions
References
Evaluating and Exploring Industry 4.0 Framework
1 Introduction
2 The Action Plan for the Fourth European Industrial Revolution
3 Technological Trends and Practical
4 Conclusion
References
Predictability, Power and Procedures of Citation Analysis
1 Introduction
2 Objectives
3 Literature Review
4 Purpose of Citation Analysis
5 Citation Behavior and Motives
6 Fundamental Variety and Stages of Citation Investigation
7 Limitations of Citation Analysis
7.1 Citations are not so Much Equivalent Significance
7.2 Influence of False Association on the Citation Connection
8 Future Work
9 Conclusion
References
A Systematic Literature Review of Deep Learning for Detecting Dementia
1 Introduction
2 Literature Survey
3 Conclusion and Analysis
References
Software-Defined Networking Based on Load Balancing Using Mininet
1 Introduction
2 Literature Review
3 Load Balancing Algorithms Based on SDN
3.1 Round-Robin (RR) Algorithm
3.2 Weighted Round-Robin (WRR) Algorithm
4 Mininet Emulator
4.1 Creating SDN Applications Without Using a Controller
5 Conclusion
References
Performance Analysis of Caching Strategies in Information-Centric Networking
1 Introduction
2 Caching in ICN
2.1 Challenges in ICN Caching
2.2 Caching Strategies
3 Evaluation Parameters
4 Simulation Environment
5 Results and Discussion
5.1 Discussion on Cache Hit Ratio (CHR)
5.2 Discussion on Content Retrieval Delay (CRD)
6 Conclusion and Future Work
References
IoT Architectures and Its Security: A Review
1 Introduction
2 Related Works
3 Internet of Things
4 Architecture of IoT
4.1 Three-layer Architecture
4.2 Middleware Architecture
4.3 SOA-Based Architecture
4.4 Five-Layer Architecture
5 Security and Privacy Issues in IoT
6 Conclusion
References
Finger Tracking in Real-Time Human–Computer Interaction
1 Introduction
2 Proposed System
2.1 Hand recognition
2.2 Path Soundtrack and Trailer Guiding
3 Practical Implimentation
4 Result and Discussion
5 Conclusion
Reference
IOT-Based Electronic Ticket Device for Environmental Conservation Using GSM Module
1 Introduction
2 Literature Review
3 Proposed Solution
4 Methodology
4.1 System Architecture of Proposed Solution
4.2 Working of ETM
5 Conclusion
References
Trust Model for Cloud Computing System
1 Introduction
2 Related Work
3 System Model
4 Conclusion
References
IoT-Based Portable Vital Sign Monitoring System for Rural Area
1 Introduction
2 Related Work
3 Proposed Solution
4 Hardware Description
5 Software Description
6 Working of Proposed Solution:
7 Conclusion
References
Automated Grading System to Evaluate Ripeness of Tomatoes Using Deep Learning Methods
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Work Environment
3.2 Data Preparation
4 Model Training
4.1 Transfer Learning Methods
4.2 Optimization Functions and Hyper-parameters
4.3 Training Process
5 Result Analysis
5.1 Parameters for Result Analysis
5.2 Interpreting the Results
6 Conclusion
References
Comparative Analysis of Seam Carving in Images
1 Introduction
2 Related Work
3 Proposed Work
4 Experiments and Results
5 Conclusions and Future Work
Reference
Artificial Intelligence in Agriculture Sector: Case Study of Blue River Technology
1 Introduction
2 Literature Review
3 Research Methodology
4 Results and Discussion
5 Conclusion and Implications
References
Mapping of Agritech Companies in Indian Agricultural Value Chain
1 Introduction
2 Literature Review
3 Methodology
3.1 Value Chain Mapping Analysis
4 Conclusion and Future Implications
References
An Advanced Approach for Link-Based Spam Detection Using Machine Learning
1 Introduction
2 Literature Survey
3 Materials and Methods
3.1 Web Graph
3.2 PageRank
3.3 Truncated PageRank
3.4 TrustRank
3.5 Assortativity
3.6 Average In-Links in Out-Neighbors
3.7 Average Out-Links in In-Neighbors
3.8 In-Degree and Out-Degree
3.9 Reciprocity
3.10 Average Distance
4 Dataset
5 Results and Discussion
6 Conclusion
References
A Comprehensive Survey on Emotion Based Health Prediction Using Internet of Things and Machine Learning
1 Introduction
2 Existing Methods
3 Literature Survey
4 Conclusion
References
Challenges with Their Solutions for IoT Applications
1 Introduction
2 Motivation
3 Related Work
4 Challenges Faced in Different Areas of IoT
5 Conclusion and Future Scope
References
Review of Amblyopia and Artificial Intelligence Techniques Used for Its Detection
1 Introduction to Artificial Intelligence in Ophthalmology
1.1 Amblyopia
2 Related Work
3 Conclusion
4 Future Scope
References
A Comprehensive Analysis on Encryption/Decryption Techniques for IoT Attack Avoidance
1 Introduction
2 Cryptographic Techniques for Secured IoT
3 Classification of Attacks in IoT
4 Encryption and Decryption Techniques
5 Available Mobile Signature Solution
6 Conclusion
References
Identification of Gray Sheep Using Different Clustering Algorithms
1 Introduction
2 Recommender Techniques
3 Research Challenges
4 Clustering Methods
5 Conclusion and Future Scope
References
Nature-Inspired Optimization Algorithms for Localization in Static and Dynamic Wireless Sensor Networks—A Survey
1 Introduction
2 Literature Review
3 Nature-Inspired Algorithms
3.1 Particle Swarm Optimization (PSO)
3.2 Butterfly Optimization Algorithm (BOA)
3.3 Firefly Algorithm (FA)
3.4 Grey Wolf Optimization (GWO)
3.5 Salp Swarm Algorithm (SSA)
4 Experimental Analysis
5 Conclusion
References
Parallel LU Decomposition Algorithm for Exa-Scale Computing Using Spark Ignite
1 Introduction
1.1 LU Decomposition
2 Spark Ignite
3 Literature Survey
4 Proposed System
5 Analysis
6 Conclusion and Future Scope
References
Common Spatial Pattern Versus Riemannian Features for Motor Imagery EEG Classification for Brain–Computer Interface
1 Introduction
2 Literature Review
3 Methodology
3.1 CSP Feature Extraction
3.2 Riemannian Feature Extraction
4 Results
5 Conclusion
References
An Overview of the Emerging Technology: Sixth Sense Technology: A Review
1 Introduction
1.1 What is Sixth Sense?
1.2 Components Required
2 Motivation and Background
3 Working Process of Sixth Sense Devices
4 Applications of Six Sense Technology
5 Advantages of Sixth Sense Technology
6 Disadvantages of Sixth Sense Technology
7 Conclusion
8 Future Scope
References
Autonomous Drone Using ROS for Surveillance and 3D Mapping Using Satellite Map
1 Introduction
2 Literature Review/Related Work
2.1 Robot Operating System (ROS)
2.2 SLAM Navigation Technology
2.3 Mapping
2.4 Drone Mechanism
2.5 Nvidia Jetson Nano Developer Board
3 Objective
4 Methodology
4.1 Setting up Nvidia Jetson Nano
4.2 Clean Installation of ROS on Linux
4.3 Drone
4.4 Dimensional Mapping
4.5 Surveillance
4.6 Examples of Satellite Map and SLAM Map
5 Hardware and Software Requirements
5.1 Hardware Requirements for the System
5.2 Software Requirements for the System
6 Outcomes of the Proposed System
6.1 3D Mapping Using Satellite Map
6.2 Surveillance Using Satellite Map
7 Conclusion
8 Future Scope
8.1 Knowing Structure of Unknown Area
8.2 Analyzing the Area on the 3D Visual Level
8.3 Surveillance in Unknown Areas
References
Tumor Detection from Brain Magnetic Resonance Images Using MRDWTA-RBFNNC
1 Introduction
2 Literature Review
3 Materials and Methods
3.1 MRI Database
3.2 DWT-Based Image Filtering
4 Preprocessing of MRI Data
4.1 Grayscale MR Image
4.2 Image Denoising Using MRDWT-ICA
4.3 Segmentation of MR Images
4.4 Otsu’s Thresholding
4.5 Detection Stage
5 Result and Discussion
5.1 Radial-Basis Function Neural Network Classifier (RBFNNC)
5.2 Feature Extraction
5.3 Classification Result Using RBFNNC
6 Conclusion and Future Work
References
CPU Scheduling in Operating System: A Review
1 Introduction
1.1 Schedulers
1.2 Scheduling Criteria
2 Basic Scheduling Algorithm(s)
2.1 First Come First Serve
2.2 Shortest Job First
2.3 Round Robin Scheduling
2.4 Priority Based Scheduling
3 Computation of Gantt Chart, Waiting Time and Turn-Around Time
4 Conclusion
References
Applications of Hybrid Particle Swarm Optimization Algorithm: A Survey
1 Introduction
2 Conclusion
References
Review on Zero-Knowledge Proof Method
1 Introduction
1.1 Related Work
2 Motivation
3 Notation and Definition
4 Conclusion
References
A Secure Electronic Voting System Using Blockchain Technology
1 Introduction
2 Literature Review
2.1 Electronic Voting Systems
2.2 Drawbacks and Security Issues
3 Proposed System Using Blockchain
3.1 Representation of Overall Process
4 Concusses in the Blockchain
5 Implementation and Result
6 Conclusion
References
ARIMA Versus ANN—A Comparative Study of Predictive Modelling Techniques to Determine Stock Price
1 Introduction
2 Literature Review
3 Research Methodology
4 Model Building
4.1 Forecasting Stock Trend Using Artificial Neural Network
4.2 Forecasting Stock Trend Using ARIMA
5 Model Comparison
6 Discussions and Conclusion
References
Internet of Things, Cyber Physical System, and Data Analytics: Open Questions, Future Perspectives, and Research Areas
1 Introduction—Internet of Things and Cyber Physical System
1.1 Internet of Things
2 Literature Work
3 Motivation
4 Importance of Internet of Things and Cyber Physical System
5 Use Cases—Internet of Things and Cyber Physical System: From User’s Perspective
5.1 Smart City
6 Introduction—Data and Data Analytic
7 Role/Importance/Scope of Data Analytic in Smart Era
8 Essential Tools Required to Do Analysis/Analysis Big Data
9 Issues and Challenges in Internet of Things, Cyber Physical System, and Data Analytics
10 An Open Discussion: Discussing Research Gaps and Future Research Directions (Opportunities for Future)
10.1 Blockchain Benefits
11 Conclusion
References
Performance Analysis of Undersampling Approaches for Solving Customer Churn Prediction
1 Introduction
2 Literature Survey
3 Numerical Experiments and Results
3.1 Performance Measures
3.2 Results
4 Conclusion
References
Deep Learning for Medical Image Recognition: Open Issues and a Way to Forward
1 Introduction
1.1 Feedforward Neural Networks
1.2 Convolution Neural Networks
1.3 Deep Models [5]
2 Related Work
3 Motivation
4 Medical Image Detection and Recognition
5 Medical Image Segmentation
6 Medical Image Registration
7 Computer-aided Diagnosis and Disease Quantification
8 Open-Source Tools, Models/Algorithms Available for Deep Learning for Medical Applications
9 Issues, Challenges and Opportunities Towards Deep Learning in Medical Applications
10 Conclusion
References
An Enhanced Local Neighborhood-Based Niching Particle Swarm Optimization Algorithm for Multimodal Fitness Surfaces
1 Introduction
2 The ELNPSO Algorithm
2.1 The PSO Algorithm
2.2 Description of the ELNPSO Algorithm
3 Experiments and Results
3.1 Numerical Benchmarks
4 Conclusion
References
Convolutional Neural Network Based Arrhythmia Classification with Selective Features from Empirical Mode Decomposition
1 Introduction
2 Related Literature
3 Proposed Methodology
3.1 Empirical Mode Decomposition
3.2 Convolutional Neural Network (CNN)
4 Results
5 Conclusion
References
Artificial Intelligence—A Revolution for Smarter Systems
1 Introduction
2 Education and Curriculum
3 Banking
4 Conclusion
References
Online Document Verification System
1 Introduction
2 Literature Review
3 Existing System
3.1 Digital Locker (Microsoft)
3.2 Digital Locker (by Government of India)
4 Proposed System
5 Result and Analysis
5.1 Login and Registration for Online Verification System
5.2 Document Verification
6 Conclusion
References
A Survey on Various Cryptography Techniques for Image Encryption and Decryption
1 Introduction
1.1 Types of Cryptography
1.2 Image Cryptography
1.3 Requirements of Image Encryption
1.4 Need of Image Encryption
2 Methodology
3 Conclusion
References
A Subjective Quality Assessment of Objects Based on Visual Attention
1 Introduction
2 Subjective Assessment
2.1 Assessment Environment
2.2 Viewer’s Opinion Collection
2.3 Data Processing and Mean Opinion Score(MOS)
3 Assessment Performance and Analysis
4 Conclusion
References
Regression Analysis on Macroeconomic Factors and Dividend Yield on Bank Nifty Index Returns
1 Introduction
2 Proposed Methodology
2.1 Independent and Dependent Variables
2.2 Regression Analysis
3 Experimental Results and Analysis
3.1 Data Collection
3.2 Descriptive Analysis on Quarterly Data
3.3 Assumption of Linear Regression
3.4 Multiple Linear Regression Analysis
4 Conclusion
References
Unconstrained Multiple Face Tracking Using Convolutional Neural Networks
1 Introduction
2 Related Work
3 Feature Map Extraction
4 Evaluation Data and Criteria
5 Conclusion
References
Intelligent Horn: An Elegant Solution to Noise Pollution
1 Introduction
2 Motivation
3 Design Methodology
4 Flow Chart and Algorithm
5 Working
6 Conclusion
References
A Novel Agent-Based Methodology for Job Scheduling in Cyber Physical Systems
1 Introduction
1.1 Cyber Physical System
1.2 CPS Applications
1.3 CPS Architecture
2 Data and Computational Cloud
2.1 Characteristics of Data and Computational Cloud
3 Agent-Based Computing
4 Agent-Based Model for Cloud CPS
4.1 Interface Agent
4.2 Learning Agent
4.3 Intelligent Hypervisor Agent
4.4 Collaborative Scheduler
5 Conclusion
References
Wearable Healthcare Device for Elderly Person
1 Introduction
2 Literature Review
3 Methodology
3.1 Components Used
3.2 Software Used
4 Conclusion
References
Identification of Nutrition’s Deficiency in Plant and Prediction of Nutrition Requirement Using Image Processing
1 Introduction
2 Key Technical Issues to Be Addressed
3 Methodology: Detailing Stepwise Activities and Sub-activities
4 Workplan
5 Conclusion and Future Scope
References
Single Dark Channel Prior Generalization of Smoggy Image
1 Introduction
2 Background
3 Methodology
3.1 Dark Pixel
3.2 Dark Channel
3.3 Definition: Dark Channel Prior
3.4 Innovative Algorithm for Single Image Smog Removal
3.5 Transmission Estimation
3.6 Soft Matting
4 Results and Discussions
4.1 Patch Size
5 Conclusions
References
IoT Technologies Based Fire and Safety Alerting System Using Android Application
1 Introduction
2 Literature Survey
3 Proposed System
4 Methodology
4.1 Raspberry PI 3B
4.2 Smoke Sensor
4.3 Flame Sensor
4.4 Buzzer
4.5 Google Firebase Database
4.6 Android Application Communication
5 Result
6 Conclusion
References
Effects of Uber and Ola on SVM and Naïve Bayes
1 Introduction
2 Literature Review
3 Methodology
4 Experimental Results
5 Conclusion
6 Future Scope
References
Analyze Classification Act of Data Mining Schemes
1 Introduction
2 Prominent Schemes Exploits for Classification Process
2.1 Naive Bayes (NB)
2.2 Decision Tree (DT)
2.3 Support Vector Machine (SVM)
2.4 Multilayer Perceptron (MLP)
2.5 Logistic Regression (LR)
3 Research Methodology
4 Experiment and Result Analysis
5 Conclusion
References
Detecting Denial-of-Service Attack Using Dendritic Cell Approach
1 Introduction
2 Review and Comparative Study of Existing Algorithms
3 Way Forward and Analysis
4 The Algorithmic Approach
5 The Dataset
6 Results
7 Conclusion and Future Scope
References
A Novel Combinatorial Approach for the Reduction of Multi-compartmental Model into a Single-Compartment Pyramidal Neuron Model
1 Introduction and Background
1.1 Pyramidal Neuron
2 Methodology
2.1 Conductance-Based Neuron Model
3 Results
4 Conclusion and Future Work
5 Discussion and Comparison to Existing Model
References
Smart Dine-in System—Automated Food Service
1 Introduction
2 Problem Statement
3 Technologies Used
3.1 Arduino Mega
3.2 Radio Frequency Identification (RFID)
3.3 Weight Sensors
3.4 Wi-Fi Module
3.5 Linear Actuator
3.6 Stepper Motor
3.7 DC Motor
4 Comparison with Existing Systems
5 Proposed System
6 Method
7 Shortest Path Calculation
8 Results
9 Conclusion and Future Scope
References
A Comparison of Various Data Mining Algorithms to Distinguish Mammogram Calcification Using Computer-Aided Testing Tools
1 Introduction
2 Breast Cancer
2.1 Types of Breast Cancer
2.2 Arrangement Criteria
3 The Techniques
3.1 Features Extraction
3.2 Types of Identification
4 Outcomes and Discussion
5 Conclusion
References
An Effective Technique of Protocol-Aware Network Traffic Classification for Performance Enhancement of SDN
1 Introduction
2 Traffic Classification
3 Related Work
4 The Proposed Protocol-Aware Traffic Classification Framework
4.1 ReTrainer Technique
4.2 Proposed Technique
5 Experiment and Result
6 Discussion
7 Conclusion
References
An Advanced Cognitive Approach for Heart Disease Prediction Based on Machine Learning and Internet of Medical Things (IoMT)
1 Introduction
2 Related Work
3 Proposed Methodology
4 Results and Discussion
5 Conclusion
References
Effective Decision Support Scheme Using Hybrid Supervised Machine Learning Procedure
1 Introduction
2 Related Work
3 Problem Statement and Proposed Approach
4 Result Analysis
5 Conclusion
References
Hybrid Secure Data Transfer Scheme Using Cryptography and Steganography
1 Introduction
2 Proposed Work
3 Results and Analysis
4 Conclusion
References
Robotic Waiters: Detecting Table to Serve Using RFID Tags
1 Introduction
1.1 Present Issues
1.2 Solution of Detecting Correct Table
2 Hardware of RFID Tag and RFID Reader
3 Process of Table Detection Using RFID
4 Conclusion
References
Design Process and Stress Analysis of Spine in Humanoid Serving Robot to Provide Proper Balancing and Load Bearing Capabilities
1 Introduction
2 Related Work
3 Process of Designing
3.1 Design on Autodesk Inventor
3.2 3D Printing of Body Parts
4 Spine in Robot
4.1 Units Used in Stress Analysis
4.2 Loads and Fixtures
4.3 Study Results
5 Conclusion
References
Evaluation of Geotagging Twitter Data Using Sentiment Analysis During COVID-19
1 Introduction
2 Proposed Methodology
2.1 Data Resources
2.2 Data Preprocessing
2.3 Feature Extraction
2.4 Sentiment Classification Techniques
2.5 Visualization
3 Geo-tagged Analysis for Detector
4 Conclusion
References
A Comparative Analysis on Offline Signature Verification System Using Deep Convolutional Neural Network
1 Introduction
2 Literature Review
3 Problem Statement
4 Methodologies
5 Results and Discussion
6 Conclusion
References
Synthesis of Game Refinement Theory for Cricket
1 Introduction
2 Methodology
3 Result and Discussion
4 Conclusion
References
An Efficient Customized Round Robin Algorithm for CPU Scheduling
1 Introduction
2 Round Robin (RR) Scheduling Procedure
3 Related Work
4 Proposed Methodology
5 Experiment and Result Discussion
6 Conclusion
References
Handwritten Digit Recognition Using CNN
1 Introduction
2 Classification Models: CNN and ANN
3 Research Methodology
4 Experimental Setup and Result Discussion
5 Conclusion
References
Review of Parallel and Distributed Community Detection Algorithms
1 Introduction
2 Parallel Community Algorithms
3 Conclusion
References
Implementation and Application of Machine Learning in Health Care: A Review
1 Introduction
2 Application of Machine Learning in Medical Science
3 Literature Review
4 Conclusion
References
Applying Software Agents to Make City Traffic Management Smarter
1 Introduction
2 Related Work
3 Agent System Design
3.1 Agent Specification
3.2 Communication Flow
4 Simulator Implementation
5 Experimental Validation
6 Concluding Remarks
References
Optimal Placement of Internet of Things Infrastructure in a Smart Building
1 Introduction
1.1 Internet of Things in Smart Buildings
2 Explored Approach
3 Placing Networking Infrastructure Within the Building
3.1 Determining the Position of the Base Stations
4 Concluding Remarks
References
A Efficient Approach for Securing Images Using RSA and Arnold Technique Metamorphose
1 Introduction
2 Arnold’s Cat Mapping
3 Asymmetric RSA Algorithm
4 Proposed Image Encryption Technique
5 Conclusion
References
An Overview to Automated Home Based on Internet of Things
1 Introduction
2 In-Depth Analysis of the Literature
3 Bluetooth-Based Home Automation Using Arduino
4 Parts and Component
5 Bluetooth Module
6 Checking/Project Validation
7 Edge (Fog) Computing
8 Conclusion and Future Scope
References
A Review of Plant Diseases Identification Using Deep Learning
1 Introduction
2 Problem Statement
3 Literature Review
3.1 Data Sources
3.2 Data Variation
3.3 Data Pre-Processing
3.4 Data Augmentation
3.5 Technical Details
3.6 Performance Metrics
4 Results and Discussion
4.1 Conclusion
5 Future Scope
References
Evaluation of Digital Image Forensics
1 Introduction
2 Formation of Digital Images
3 Digital Image Forensics for Source Authentication or Identification
3.1 Natural or Computer-Generated Images
3.2 Device Identification
4 Digital Image Forensics for Tampering Detection
5 Conclusion
References
Malarial Parasite Detection by Leveraging Cognitive Algorithms: A Comparative Study
1 Introduction
2 Literature Review
3 Methods and Materials
3.1 Data Collection and Preprocessing
3.2 Algorithms/Techniques
4 Result Discussion
5 Conclusion
References
Proposed Methodology of Text CAPTCHA for Security with Cloud
1 Introduction
2 Literature Review
2.1 Current CAPTCHAs
2.2 Gimpy
2.3 EZ-Gimpy (CMU)
2.4 Captchaservice.org
2.5 Pessimal Print
3 Application of All Kinds of CAPTCHA
3.1 Disadvantages in CAPTCHA
4 Proposed Methodology
4.1 Result Analysis
5 Comparison of CAPTCHA in Accuracy
6 Conclusion
7 Conclusion
References
Analysis of Career Development Opportunities in IT Sectors in Jaipur
1 Introduction
2 Literature Review
3 Methodology
3.1 Analysis for Questionnaire for Employees
4 Conclusion
References
Technology Enabled Progress of Digital India—COVID-19 and Beyond!!!!
1 Introduction
2 Amidst Corona Virus Pandamic Technology Paved the Way for Digital India progress
2.1 Review Literature
2.2 Use of Digital Technology During COVID-19 Period
2.3 Objectives of Study
2.4 Research Methodology
2.5 Findings
3 India Goes Online
3.1 Suggestions for Policymakers
4 Conclusion
References
Evolution of Education System and Techniques: A Comparative Study
1 Introduction
2 Evolution of Indian Education System
3 Difference Between E-Education and Traditional Education [8]
4 Literature Review
5 COVID-19: A Case Study on Digital Education
6 Impact of COVID-19 on Education Level Globally
7 Strategies for Increasing Efficiency of E-Learning System [11]
8 Conclusion
References
Coiflet Wavelet Transform-Based Protection Scheme for Wind-Fed Series-Compensated Transmission Line
1 Introduction
2 Power System Studied
3 Steps of CWT-Based Relaying Scheme for SCTL
4 Performance Review
4.1 The Effectiveness of CWT for Evolving Faults
4.2 The Effectiveness of CWT for Near-in Relay Faults
4.3 The Effectiveness of CWT for Far-End Relay Faults
5 Conclusion
References
Author Index