محل لوگو

دانلود کتاب های روان شناسی زبان اصلی 2022 و 2023

دانلود کتاب ها و مقالات انتشارات Springer

کتاب های خارجی 2022 و 2023

دانلود طرح درس آماده قابل ویرایش

فایل های لایه باز فتوشاپ

ششم ابتدایی

دانلود حل المسائل Download Solution Manual

مقالات ورزشی

دانلود کتب خارجی تخصصی پزشکی

جزوات و نمونه سوالات رشته مهندسی شهرسازی

دانلود جزوات و نمونه سوالات رشته مهندسی برق

دانلود جزوات و نمونه سوالات رشته علوم تربیتی

استخدام

بازی

دعا

سورس کد کامل برنامه اندروید

گزارش کارورزی

اقدام پژوهی

محصولات سلامتی

کسب درآمد از طریق راه اندازی کسب و کار

دانلود طرح درس روزانه

دانلود پاورپوینت

تحقیق های دانشگاه علمی کاربردی

دانلود تحقیق و مقاله

دانلود اقدام پژوهی

تحقیق در زمینه آموزش و پورش

پرسش مهر

کتاب زبان خارجی

خلاصه کتاب های رشته مدیریت

نقشه راه برای مهارت آموزان ماده 28

مصاحبه با معلمان موفق و پیش کسوت

زندگینامه بزرگان خارجی

زندگینامه بزرگان ایرانی

تحقیق و مقالات رشته حسابداری

تحقیق و مقالات رشته اقتصاد

آموزش و پرورش

کتاب های رشته کامپیوتر

مقالات با موضوع کسب و کار

تحقیق دانشجویی رشته های هنر

تحقیق دانشجویی رشته های پزشکی

تحقیق دانشجویی رشته های علوم پایه

آمار دبیرستان

آمار دبیرستان

خلاصه و نقد کتاب مهارت های معلمی قرائتی

مهارت آموزان ماده 28

http://mirzafile.4kia.ir/

اشتراک در خبرنامه

جهت عضویت در خبرنامه لطفا ایمیل خود را ثبت نمائید

Captcha

آمار بازدید

  • بازدید امروز : 152
  • بازدید دیروز : 963
  • بازدید کل : 2317168

دانلود کتاب Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021


دانلود کتاب Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021

دانلود کتاب Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021

 

Title: Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021 Volume:
Author(s): Deepak Gupta, Ashish Khanna, Vineet Kansal, Giancarlo Fortino, Aboul Ella Hassanien (eds.)
Series: Advances in intelligent systems and computing, Volume 1374 Periodical:  
Publisher: Springer City:  
Year: 2022 Edition:  
Language: English Pages (biblio ech): 902
ISBN: 9789811633461, 9811633460 ID: 3124924
Time added: 2021-10-31 04:37:43 Time modified: 2021-10-31 16:02:36
Library: RU-board Library issue:  
Size: 22 MB (22712962 bytes) Extension: pdf

Author(s): Deepak Gupta, Ashish Khanna, Vineet Kansal, Giancarlo Fortino, Aboul Ella Hassanien (eds.)

Series: Advances in intelligent systems and computing, Volume 1374

Publisher: Springer, Year: 2022

ISBN: 9789811633461,9811633460

 

Table of contents :
DoSCI 2021 Steering Committee Members
Preface
Contents
About the Editors
Investigation of Consumer Perception Toward Digital Means of Food Ordering Services
1 Introduction
2 Literature Review
2.1 Trust and Security
2.2 Web Site Design
2.3 Payment System
2.4 Service Quality
2.5 Delivery
2.6 Customer Service
2.7 Food Quality
2.8 Objectives of the Study
3 Scope of Study
4 Research Methodology
5 Analysis and Interpretation
5.1 Perceptual Map
5.2 Usage of Food Delivery and Ordering Apps
5.3 Factors Affecting Usage of the Food Delivery Apps
6 Conclusion
References
A Systematic Review of Blockchain Technology to Find Current Scalability Issues and Solutions
1 Introduction
2 Scalability Problem Understanding
3 How Design of Blockchain Affect Scalability
4 Solutions to Scale Blockchain
4.1 Layer 0
4.2 Layer 1 (On-chain) Solutions
4.3 Layer 2 (Off-chain) Solutions
4.4 Consensus Mechanisms
4.5 Other Latest Protocols/Solutions to Scale Blockchain
5 Future Scope of Blockchain Technology
5.1 When Blockchain Technology Will be Combined with Other Technology
5.2 Benefits that Blockchain Technology and Smart Contract Could Bring to All Sectors
5.3 Important Points Preventing Growth of Blockchain Technology
5.4 SWOT Analysis of Blockchain Technology
6 Conclusion
References
Secured Blind Image Watermarking Using Entropy Technique in DCT Domain
1 Introduction
2 Related Work
3 Proposed Digital Image Watermarking Algorithm
3.1 Proposed Watermark Embedding Algorithm
3.2 Proposed Watermark Extraction Algorithm
4 Experimental Results and Comparison
5 Conclusion
References
Prediction of Heart Disease Using Genetic Algorithm
1 Introduction
2 Related Work
3 Classification
4 Classification Methods
4.1 Artificial Neural Network
4.2 Genetic Algorithm
5 Feature Engineering
5.1 Performance Measures
6 Prediction Analysis
7 Conclusion
References
Secured Information Infrastructure for Exchanging Information for Digital Governance
1 Introduction
1.1 Definition of Blockchain
1.2 Blockchain Technology
1.3 Smart Contract
1.4 Distributed Ledger Technology
1.5 Types of Blockchain
2 Literature Survey
2.1 Digital Governance (E-governance)
2.2 Benefits of Applying Blockchain Technology in Governance
3 Problem Statement
4 Hypothesis
5 Methodology
6 Expected Impact
7 Conclusion
References
Spiral CAPTCHA with Adversarial Perturbation and Its Security Analysis with Convolutional Neural Network
1 Introduction
1.1 Contribution of this paper is listed as follows
2 Related Work
3 Proposed Work and Methodology
3.1 Design of Proposed Spiral CAPTCHA
3.2 Creation of Dataset
3.3 Designing CNN
3.4 Training a CNN with Training Datasets and Testing it with Testing Datasets
3.5 Adding Perturbation to Image Dataset and Testing CNN Again with Perturbed Data
4 Performance Parameters
5 Results and Discussion
5.1 Results for Spiral CAPTCHA without Perturbation
5.2 Results for Spiral CAPTCHA with Perturbation
6 Usability and Security
7 Concluding Remarks
References
Predicting Classifiers Efficacy in Relation with Data Complexity Metric Using Under-Sampling Techniques
1 Introduction
2 Related Works
3 Proposed Work
4 Experimental Results
4.1 Results and Discussion
5 Conclusion
References
Enhanced Combined Multiplexing Algorithm (ECMA) for Wireless Body Area Network (WBAN)
1 Introduction
2 Related Works
3 Proposed Model
4 Proposed Transmission Scheme Algorithm
5 Proposed Transmission Scheme Flowchart
6 Experiments and Results
7 Conclusion
References
A Survey: Approaches to Facial Detection and Recognition with Machine Learning Techniques
1 Introduction
1.1 Convolutional Neural Network
2 Machine Learning Methods in Face Detection and Recognition Algorithms
2.1 Alex Net
2.2 Feed Forward Neural Network
2.3 Deep Convolution Neural Network
2.4 K-nearest Neighbors
2.5 Support Vector Machine
2.6 Principal Component Analysis
2.7 Linear Discriminant Analysis
3 Feature Extraction
3.1 Geometric-Based Methods in Feature Extraction
3.2 Holistic-Based Methods in Feature Extraction
4 Related Work of Machine Learning Approaches in Face Detection and Recognition
5 Summary Sheet of Machine Learning Approaches for Face Detection and Face Recognition
6 Machine Learning Methods Perception and Suggestion in Face Detection and Recognition
7 Conclusions
References
An Energy- and Space-Efficient Trust-Based Secure Routing for OppIoT
1 Introduction
2 Related Work
3 Proposed ES_T_CAFE Protocol
3.1 Motivation
3.2 Proposed Protocol
4 Performance Evaluation
5 Conclusion
References
A Survey on Anomaly Detection Techniques in IoT
1 Introduction
1.1 Anomaly Detection
2 Literature Review
3 Analysis of Literature Work
4 Conclusion
References
Novel IoT End Device Architecture for Enhanced CIA: A Lightweight Security Approach
1 Introduction
2 Literature Review
3 The Need of Lightweight Cryptographic Algorithm
4 Novel Lightweight Architecture
4.1 Trusted Fog Nodes with CoT and TEE
4.2 Web Interface(WI)
4.3 IoT End Device
5 Secured Data Transmission
6 Results and Discussion
7 Conclusion
References
Addressing Concept Drifts Using Deep Learning for Heart Disease Prediction: A Review
1 Introduction
2 Literature Review
3 Research Methodology
References
Tailoring the Controller Parameters Using Hybrid Flower Pollination Algorithm for Performance Enhancement of Multisource Two Area Power System
1 Introduction
2 System Under Investigation
3 Testaments of Proposed Algorithm
4 Conclusions
References
Automatic Extractive Summarization for English Text: A Brief Survey
1 Introduction
2 Extractive Text Summarization
3 Features for Extractive Text Summarization
4 Methods for Extractive Text Summarization
4.1 Statistical-Based
4.2 Graph-Based
4.3 Semantic-Based
4.4 Fuzzy-Based
4.5 Machine Learning-Based
4.6 Deep Learning-Based
5 Comparison of Methods for Extractive Text Summarization
6 Evaluation Matrices
6.1 Intrinsic Evaluation
6.2 Content Evaluation
7 Conclusion
References
Formal Verification of Liveness Properties in Causal Order Broadcast Systems Using Event-B
1 Introduction
1.1 Event-B and Rodin
1.2 Causal Order Broadcast
2 Literature Review
3 Formal Analysis of Liveness Properties in Causal Order Broadcast Systems
4 Analysis of Enabledness Preservation Property
5 Analysis of Non-divergence Property
6 Conclusions
References
A Comparative Study on Face Recognition AI Robot
1 Introduction
2 Literature Review
3 Implementation
3.1 Local Binary Pattern (LBP) for Face Recognition
4 Hardware Specification
5 Software Specification
6 Results and Discussion
6.1 Face Recognition System
6.2 The Face Tracking System
7 Limitations of Existing Work
8 Conclusion
References
State-of-the-Art Power Management Techniques
1 Introduction
2 Static Power Management
3 Dynamic Power Management
4 Power Management in Embedded Systems
5 Power Management Techniques for HPC Clusters
6 Power Management in Data Centers
7 Conclusion
References
Application of Robotics in Digital Farming
1 Introduction
2 Literature Review
3 The Inverted Pendulum System
4 Control Systems and Controllers
5 Tilt Angle and Its Measurement Using the Filter
6 Conclusion
References
Study and Performance Analysis of Image Fusion Techniques for Multi-focus Images
1 Introduction and Background of the Work
2 Image Fusion Techniques and Effectiveness Criteria
3 Some Current Image Fusion Techniques
3.1 Discrete Wavelet Transform
3.2 Discrete Cosine Transform (DCT)
3.3 Curvelet Transform
3.4 Non-Subsampled Contourlet Transform
3.5 Sparse-Based Image Fusion Scheme
3.6 DTCWT
3.7 ICA
4 Evaluation Metrics
4.1 Normalized Mutual Information (NMI)
4.2 Nonlinear Correlation Information Entropy (NCIE)
4.3 Gradient-Based Metric GBM
4.4 Phase Congruency-Based Metric (PCB)
5 Experimental Setup and Simulation of Work
5.1 Experimental Setup
5.2 Comparative Discussion
5.3 Comparative Analysis
6 Conclusion and Future Scope
References
IoT-Based Agricultural Automation Using LoRaWAN
1 Introduction
2 Literature Review
3 Designing of the System
3.1 LoRa by Semtech Inc
3.2 AI-Thinker RA-02 Module
4 Implementation and Working
5 Results and Discussion
6 Conclusion
7 Future Work
References
Prediction of Customer Lifetime Value Using Machine Learning
1 Introduction
2 Literature Review
3 Proposed Framework
4 Results
4.1 Mean Absolute Error
5 Conclusion
References
An Intelligent Flood Forecasting System Using Artificial Neural Network in WSN
1 Introduction
2 Related Work
3 Flood Forecasting Framework
4 Result and Discussion
5 Conclusion
References
Reinforcement Learning in Deep Web Crawling: Survey
1 Introduction
2 Background
2.1 Deep Web Crawling
2.2 Reinforcement Learning
3 Review of Literature
4 Discussion
4.1 Open Questions in DWC
5 Conclusion and Future Scope
References
Wireless Sensor Network for Various Hardware Parameters for Orientational and Smart Sensing Using IoT
1 Introduction
2 WSN System Architecture
2.1 The Sensor Node
3 Implementation and Methodology
3.1 Overview
3.2 Sensing and Processing the Information
4 Results and Discussion
4.1 Output on Senselive
4.2 Monitoring
5 Conclusion
References
Comparative Analysis: Role of Meta-Heuristic Algorithms in Image Watermarking Optimization
1 Introduction
2 Related Work
3 Proposed Technique
4 Results and Discussion
4.1 Perceptual Quality Measurement
4.2 Robustness Measurement
5 Comparative Analysis
6 Conclusion
7 Conflict of Interest
References
A Novel Seven-Dimensional Hyperchaotic
1 Introduction
2 The 7D Hyperchaotic System
2.1 Equilibrium and Stability
2.2 Lyapunov Exponents and Lyapunov Dimension
3 Hybrid Synchronization of the New 7D Hyperchaotic Systems
4 Dissections
5 Conclusions
References
A Literature Review on H∞ Neural Network Adaptive Control
1 Introduction
2 Neural Networks
2.1 Feed-Forward Neural Network
2.2 Feedback Neural Network
3 Adaptive Controllers
3.1 Direct and Indirect Adaptive Techniques
3.2 Neural Networks for Identification and Control
4 H∞ Controller
5 Robust Adaptive Control
6 Stability Analysis
7 Conclusions
References
A Novel DWT and Deep Learning Based Feature Extraction Technique for Plant Disease Identification
1 Introduction
2 Research Methodology of Proposed Novel DWT and Deep Learning Based Feature Extraction Technique for Plant Disease Identification
2.1 Robust Feature Extraction Based on Large Scale DWT for Colored Images of Plants (Healthy/Diseased) Leaf Images
2.2 Selection of Features in Reduced Sub-Space for Efficient Feature Vector Formation Using Principal Component Analysis (PCA)
2.3 Significant Feature Vector Formulation and Classification Based on DNNs
2.4 Proposed Novel DWT and Deep Learning Based Technique for Identification of Diseases in Plants
3 Experiments and Discussions
3.1 Dataset
3.2 System Specifications
3.3 DWT Sub Band Selection and Level of Decomposition Selection with Daubechies Wavelet (db4) and Biorthogonal (Bior1.5) Wavelet with DNNs
3.4 Comparison of Accuracy Among the 2 Wavelets with Respect of Levels and Sub Bands
3.5 Comparison of Accuracy with State-of-Art Approaches with Proposed Approach
4 Conclusion
References
Supervised and Unsupervised Machine Learning Techniques for Multiple Sclerosis Identification: A Performance Comparative Analysis
1 Introduction
2 Proposed Approach
2.1 Image Preprocessing
2.2 Feature Extraction Through Gray Level Textural Feature Matrix (GLTFM)
2.3 Classification
3 Experimental Results
3.1 No. of neighbor’s Selection and Distance Metric Selection in K-nearest Neighbor Classification
3.2 Kernel Function Selection and Kernel Scale Selection in Support Vector Machine
3.3 Selection of Boosting Method and Learning Cycles in Decision Tree Classifier (Ensemble Learning)
3.4 Unsupervised Learning Approach Using K-mean and Gaussian Mixture Model (GMM) Clustering
3.5 Comparison of Proposed Technique with Earlier Studies
4 Conclusion
References
Cloud Computing Overview of Wireless Sensor Network (WSN)
1 Introduction
2 Overview of Cloud Computing
2.1 Features of Cloud Computing
2.2 Services Provided by Cloud Computing
2.3 Types of Cloud
3 Overview of Wireless Sensor Network
3.1 Protocols for Routing in WSN
4 Application Scenarios of Cloud Computing and WSN
4.1 Health Care
4.2 Transport Surveillance
4.3 Climate Anticipation
4.4 Military Usage
5 Conclusion
References
An Enhanced Support Vector Machine for Face Recognition in Fisher Subspace
1 Introduction
2 Proposed Methodology
2.1 Fisher Subspace Feature Extraction Method
2.2 Enhanced Support Vector Machine (ESVM)
3 Experimental Results
3.1 Yale Database
3.2 ORL Database
3.3 Selection of Number of Sub-Dimensions in Fisher Space
3.4 Multiclass Classification: One-Vs-One(OVO), One-Vs-All(OVA)
3.5 Selection of Kernel for ESVM
4 Comparative Analysis and Discussion
5 Conclusion
References
Large Scale Double Density Dual Tree Complex Wavelet Transform Based Robust Feature Extraction for Face Recognition
1 Introduction
2 Preliminaries and Proposed Methodology
2.1 Wavelet Transformation Techniques
2.2 Principal Component Analysis (PCA)
2.3 Classification
2.4 Proposed Methodology
3 Experimental Results
3.1 Dataset
3.2 Selection of DDDTCWT Sub-Band and Level of Decomposition
4 Comparative Analysis and Discussion
5 Conclusion
References
A Miscarriage Prevention System Using Machine Learning Techniques
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Data Pre-processing
3.3 Model Building and Validation
4 Experimental Results and Discussion
5 Conclusion
References
Efficacious Governance During Pandemics Like Covid-19 Using Intelligent Decision Support Framework for User Generated Content
1 Introduction
2 Related Literature Survey
3 Proposed Framework
3.1 Text Pre-processing Pipeline
3.2 Information Extraction Module
3.3 Social and Economic Trend Prediction Module
4 Implementation and Results
5 Discussion and Future Work
References
Skin Disease Diagnosis: Challenges and Opportunities
1 Introduction
1.1 Skin Disease
1.2 Skin Disease Diagnosis
1.3 Publicly Available Dataset for Skin Disease
2 Literature Review
3 Justification of Research
4 Research Gaps
5 Problem Statement
6 Conclusion
References
Computerized Assisted Segmentation of Brain Tumor Using Deep Convolutional Network
1 Introduction
2 Literature Review
3 Methodology
4 Conclusion
References
Leader Election Algorithm in Fault Tolerant Distributed System
1 Introduction
2 Message Ordering
2.1 Non-FIFO and FIFO Execution
2.2 Causal Ordering
2.3 Total Order Broadcast
3 Leader Election Algorithm with Ordered Delivery of Timestamped Messages
4 Modeling Approach
4.1 Event-B Model of Leader Election Algorithm: Specification Using Refinement Levels
5 Conclusion and Future Scope
References
Engine Prototype and Testing Measurements of Autonomous Rocket-Based 360 Degrees Cloud Seeding Mechanism
1 Introduction
2 The Novel 360°Cloud Seeding Approach
2.1 Reinforcement Learning-Based Cloud Seeding Mechanism
3 Phase 1 Research Testing Report: The Proposed Concept
4 Testing Results
5 Result Discussion
6 Conclusion
7 Future Scope
References
An Efficient Caching Approach for Content-Centric-Based Internet of Things Networks
1 Introduction
2 Literature Review
3 Proposed Caching Scheme
4 Performance Evaluation
5 Conclusion
References
A Forecasting Technique for Powdery Mildew Disease Prediction in Tomato Plants
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Dataset
3.2 K-Nearest Neighbor (kNN)
3.3 Decision Tree (DT)
3.4 Random Forest (RF)
3.5 Performance Metric: Accuracy
4 Results and Discussions
4.1 Comparison with Previous Studies
5 Conclusion and Future Scope
References
Investigate the Effect of Rain, Foliage, Atmospheric Gases, and Diffraction on Millimeter (mm) Wave Propagation for 5G Cellular Networks
1 Introduction and Related Work
2 Investigate the Effect of Attenuation Due to Atmospheric Gas
3 Investigate the Effect of Attenuation Due to Fog and Cloud
4 Investigate the Effect of Attenuation Due to Rainfall Attenuation
5 Simulation Work and Discussion
6 Conclusion and Future Scope
References
Packet Scheduling Algorithm to improvise the Packet Delivery Ratio in Mobile Ad hoc Networks
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Conclusion
References
Computer-Aided Detection and Diagnosis of Lung Nodules Using CT Scan Images: An Analytical Review
1 Introduction
2 Anatomy of CAD System
2.1 Preprocessing
2.2 Nodule Detection
2.3 Feature Extraction/Selection
2.4 Classification
3 Experimental Benchmarks
3.1 Datasets of Lung CT Scans
3.2 Evaluation Metrics
4 Discussion
5 Conclusion
References
Efficient Interleaver Design for SC-FDMAIDMA Systems
1 Introduction
2 Interleaver Design
3 SC-FDMA-IDMA System Model
4 Simulation Result
5 Conclusions
References
Enhanced Bio-inspired Trust and Reputation Model for Wireless Sensor Networks
1 Introduction
2 Trust and Reputation System
3 Bio-inspired Trust and Reputation Model (BTRM)
3.1 Gathering Information
3.2 Score and Rank
3.3 Ants Transaction
3.4 Punish and Reward
4 Enhanced Bio-inspired Trust and Reputation Model
4.1 EBTRM Algorithm
5 Simulation Results
5.1 Accuracy with Varying Number of Malicious Nodes
5.2 Path Length with Varying Number of Malicious Nodes
5.3 Energy Consumption with Varying Number of Malicious Nodes
6 Conclusions
References
Analytical Machine Learning for Medium-Term Load Forecasting Towards Agricultural Sector
1 Introduction
2 Literature Review
3 Material and Methods
3.1 Dataset
3.2 Methodology
4 Experimental Result and Discussion
4.1 The Experimental Result Using ARIMA Model
4.2 The Experimental Result Using Seasonal ARIMA Model
4.3 The Experimental Result Using Exponential Smoothing Model
4.4 The Experimental Result Using Random Forest Model
5 Conclusion and Future Work
References
Formal Modelling of Cluster-Coordinator-Based Load Balancing Protocol Using Event-B
1 Introduction
2 Event-B
3 Cluster-Coordinator Load Balancing Protocol
4 Formal Development of Load Balancing Protocol
5 Conclusion
References
Regression Test Case Selection: A Comparative Analysis of Metaheuristic Algorithms
1 Introduction
2 Related Work
3 Problem Statement: Regression Test Case Selection
4 Discussion: Metaheuristic Algorithms Used
4.1 Cuckoo Search Algorithm
4.2 Crow Search Algorithm
4.3 Harris Hawks Optimization Algorithm
5 Experimental Design and Results
5.1 Research Objectives
5.2 Parameter Setting
5.3 Research Hypotheses
5.4 Results and Discussion
6 Conclusion and Future Scope
References
A Comprehensive Study on SQL Injection Attacks, Their Mode, Detection and Prevention
1 Introduction to Structured Query Language Injection (SQLi)
1.1 Gathering Some Knowledge of Vulnerability and SQL Injection
2 Categories of SQL Injection Attack
3 Prevention System
3.1 Log in Time Verification
3.2 Parametrized Query
3.3 Stored Procedures
3.4 Escaping
3.5 Avoiding Administrative Privileges
3.6 Firewall Applications
4 Example of Union-Based SQL Injection
4.1 Step 1. Finding the Error
4.2 Step 2. Finding the Total Number of Columns
4.3 Step 3. Finding the Vulnerable Column from the Total Number of Column
4.4 Step 4. Finding the Table Names Under the Database
4.5 Step 5. Finding the Column Name from the Target Table Command Used
4.6 Step 6. Getting the Data from the Columns
5 Conclusion
References
Sentimental Analysis on Sarcasm Detection with GPS Tracking
1 Introduction
2 Literature Review
3 Related Researches
4 Methodologies of Sarcasm Detection
5 Proposed Architecture
6 Sarcasm Detection Algorithm
7 Evaluation
8 Testing Method
9 Results
10 Conclusion and Future Scope
References
Impact of Machine Learning Algorithms on WDM High-Speed Optical Networks
1 Introduction
2 Literature Survey
3 Performance Parameters
4 Performance Outcomes of Existing Techniques
5 Conclusion
6 Future Scope
References
Duo Features with Hybrid-Meta-Heuristic-Deep Belief Network Based Pattern Recognition for Marathi Speech Recognition
1 Introduction
2 Related Work
3 Duo Features with Hybrid-Meta-Heuristic-Based Deep Belief Network
3.1 Optimization Techniques Used for Deep Belief Network
3.2 Proposed Architecture
3.3 Duo-Feature Feature Extraction Technique
3.4 RCBO-DBN Pattern Recognition
4 Results and Discussion
4.1 Experimental Setup
4.2 Performance Analysis of Feature Extraction Techniques
4.3 Performance Analysis of Pattern Recognition Techniques
5 Conclusion
References
Computer-Aided Diagnostic of COVID-19 Using Chest X-Ray Analysis
1 Introduction
2 Survey of Literature
3 Proposed System
4 Results and Discussion
5 Conclusion
References
Low Cost Compact Multiband Printed Antenna for Wireless Communication Systems
1 Introduction
2 Configuration of Antenna and Its Design Procedure
3 Simulation and Measurement Results
4 Fabricated Multiband Printed Antenna
5 Conclusion
References
A Detailed Analysis of Word Sense Disambiguation Algorithms and Approaches for Indian Languages
1 Introduction
1.1 Machine Translation
1.2 Ambiguity and Its Classification
2 Word Sense Disambiguation (WSD)
2.1 Applications of Disambiguation Techniques
2.2 Organization of the Paper
3 Relative Analysis on WSD and Directions for Future Research
4 Proposed Work
5 WSD Approaches
5.1 An Approach Focused on Information
5.2 Supervised-Learning Approach
5.3 Unsupervised-Learning Approach
6 WSD Approaches in Context to WSD
7 Literature Analysis on Various WSD Methods for Languages of India
8 Conclusion
References
Fiber Bragg Grating (FBG) Sensor for the Monitoring of Cardiac Parameters in Healthcare Facilities
1 Introduction
2 Literature Review
3 Background
3.1 The Fabrication Method of FBG
4 Experiment and Result
5 Conclusions
References
Early-Stage Coronary Ailment Prediction Using Dimensionality Reduction and Data Mining Techniques
1 Introduction
2 Related Works
3 Materials and Methodology
3.1 Data Exploration
3.2 Feature Selection
4 Result
5 Conclusion and Future Work
References
Inferring the Occurrence of Chronic Kidney Failure: A Data Mining Solution
1 Introduction
2 Chronic Kidney Disease
3 Literature Survey
4 Proposed Model
5 Data Exploration and Filtration
6 Classification Methods
6.1 Decision Tree
6.2 Logistic Regression
6.3 Naïve Bayes
6.4 Support Vector Machine
6.5 KNN
6.6 Random Forest
7 Examination of Performance
8 Conclusion and Future Work
References
Comparative Analysis for Optimal Tuning of DC Motor Position Control System
1 Introduction
2 DC Motor Position Control System
3 Controller
3.1 PID
3.2 PID-N
3.3 F-PID
4 Algorithms
4.1 Global Neighborhood Algorithm (GNA)
4.2 Bat Algorithm (BA)
5 Objective Function Optimization
6 Simulation and Results
7 Conclusion
References
A Hybrid Approach of ANN-PSO Technique for Anomaly Detection
1 Introduction
2 Related Work
3 Proposed Method
4 Result and Analysis
4.1 Dataset
4.2 Performance Metrics
4.3 Analysis
5 Conclusion
References
Comparison of Density-Based and Distance-Based Outlier Identification Methods in Fuzzy Clustering
1 Introduction
2 Density-Oriented (DO) and Distance-Based (DB) Approach of Outlier Identification in Context of Fuzzy Clustering
2.1 Density-Oriented Approach [10–12]
2.2 Distance-Based Approach [10, 13]
3 DO Versus DB
3.1 Dataset Used
3.2 Performance Analysis of DO and DB on Various Dataset
4 Conclusion
References
Analysis of Security Issues in Blockchain Wallet
1 Introduction
1.1 Blockchain Wallets
1.2 Security Issues in Blockchain Wallets
1.3 Wallet Security Practices
2 Literature Review
2.1 Security Challenges
2.2 Wallet Vulnerabilities
2.3 Recent Progresses
3 Comparative Analysis
4 Conclusion
References
A Contextual Framework to Find Similarity Between Users on Twitter
1 Introduction
2 Related Work
3 Proposed Framework
3.1 Parameter Weights
3.2 Parameter Normalization
3.3 Formulation of Similarity Computation
3.4 Parameters Used
4 Results and Analysis
4.1 Data Extraction
4.2 Case Study
4.3 Result and Evaluation
5 Conclusion and Future Work
References
On the Design of a Smart Mirror for Cardiovascular Risk Prediction
1 Introduction
2 Literature Review
3 Research Gaps
4 Objectives
5 Hypothesis
6 Methodology
7 Interpretation of Results
8 Conclusion
References
Named Entity Recognition in Natural Language Processing: A Systematic Review
1 Introduction
1.1 Evolution of NER
1.2 Motivations for Conducting This Survey
2 Related Background
2.1 NER
2.2 NER Datasets
2.3 NER Tools
2.4 Techniques for NER
3 A Systematic Literature Review of Related Work
4 Challenges and Future Directions
4.1 Challenges
4.2 Future Directions
5 Conclusion
References
Assessing Spatiotemporal Transmission Dynamics of COVID-19 Outbreak Using AI Analytics
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 Dataset Description
3.2 Experimental Analysis and Prediction
4 Results
5 Conclusion
References
Detection of Building Defects Using Convolutional Neural Networks
1 Introduction
2 Literature Survey
3 Scope of Work
4 Proposed Algorithm
4.1 Method
4.2 Importing Building Libraries, Layers, and Their Working
5 Experimental Analysis
5.1 Results
5.2 Discussion
6 Conclusion and Future Scope
References
Tools and Techniques for Machine Translation
1 Introduction
2 Machine Translation in Terms of Technology Used
2.1 Rule-Based Machine Translation
2.2 Statistical Machine Translation
2.3 Neural Machine Translation
3 Machine Translation in Terms of Techniques Used
4 Machine Translation in Terms of Algorithms Used
5 Addressing Ambiguity in Machine Translation
6 Conclusion
References
Cyberbullying-Mediated Depression Detection in Social Media Using Machine Learning
1 Introduction
2 Background and Related Work
3 Supervised Learning for Observing Signs of Mental Distress Due to Cyberbullying
3.1 Dataset Discussion
3.2 System Architecture
4 Results and Discussion
4.1 Results Obtained When TF-IDF Was Used for Feature Extraction
4.2 Results Obtained When Word2Vec Was Used for Feature Extraction
4.3 Results Obtained When DL Was Applied for CBMD Detection
5 Conclusion
6 Future Trends
References
Improved Patient-Independent Seizure Detection System Using Novel Feature Extraction Techniques
1 Introduction
2 Methodology
2.1 Feature Set 1: Max–Min Method
2.2 Feature Set 2: The Variation Method
2.3 Classification
3 Results and Discussion
3.1 Seizure Detection ML Model Based on Max–Min Feature Set
3.2 Seizure Detection ML Model Using Variation Feature Set
4 Conclusions
References
Solution to Economic Dispatch Problem Using Modified PSO Algorithm
1 Introduction
2 Unit Commitment
2.1 Generation Capacity Constraint
2.2 Power Balance Constraint
2.3 Generation Ramp Limits
3 Introduction to Economic Dispatch (ED)
4 Introduction to Particle Swarm Optimization (PSO)
5 Proposed Approach
5.1 Working of the Proposed Approach (Pseudo Code)
5.2 Experiment Design
6 Results
7 Conclusion
References
Recommendations for DDOS Attack-Based Intrusion Detection System Through Data Analysis
1 Introduction
2 Related Work
3 Analysis
3.1 Dataset and System Discussion
3.2 Recommendations
4 Conclusion
References
Drug-Drug Interaction Prediction Based on Drug Similarity Matrix Using a Fully Connected Neural Network
1 Introduction
2 Dataset
2.1 Sources of Data
3 Methodology
4 Evaluation
5 Results and Discussion
6 Conclusion and Future Scope
References
Author Index

 

 


مبلغ قابل پرداخت 29,000 تومان

توجه: پس از خرید فایل، لینک دانلود بصورت خودکار در اختیار شما قرار می گیرد و همچنین لینک دانلود به ایمیل شما ارسال می شود. درصورت وجود مشکل می توانید از بخش تماس با ما ی همین فروشگاه اطلاع رسانی نمایید.

Captcha
پشتیبانی خرید

برای مشاهده ضمانت خرید روی آن کلیک نمایید

  انتشار : ۲۰ اسفند ۱۴۰۰               تعداد بازدید : 193

برچسب های مهم

دانلود فایل‌های بسته آماده‌چاپ و نصب تابلو اعلانات مسجدنما هفته  سوم اردیبهشت ماه 1403

دانلود فایل‌های بسته آماده‌چاپ و نصب تابلو اعلانات مسجدنما هفته سوم اردیبهشت ماه 1403

دانلود فایل‌های بسته آماده‌چاپ و نصب تابلو اعلانات مسجدنما   همیشه دنبال این بودی یه جایی باشه تا راحت بتونی محتوای مطمئن با طراحی خوب را پیدا کنی؟   همیشه دنبال این بودی یکی کارهای محتوایی را ناظر به مسائل روز انجام بده و دغدغه تأمین محتوا را نداشته باشی؟   همیشه ... ...

کیس اختلال دوقطبی - مصاحبه با بیمار دو قطبی  - نمونه مصاحبه با بیمار دوقطبی

کیس اختلال دوقطبی - مصاحبه با بیمار دو قطبی - نمونه مصاحبه با بیمار دوقطبی

تعداد صفحات: 11 نوع فایل: WORD   + فایل هدیه: نمونه مصاحبه تشخیصی افسردگی و اعتیاد (8صفحه)   فهرست مطالب: شرح حال (مشخصات، علت ارجاع، شکایت عمده، مشکلات موجود و ...) معاینه وضعیت روانی تشخیص مصاحبه   بخشی از متن فایل: م: خوابت چطوره؟ ب: زیاد خوب نیست، اگار ... ...

پاورپوینت کامل و جامع با عنوان تئوری رفتار مصرف کننده در اقتصاد در 112 اسلاید

پاورپوینت کامل و جامع با عنوان تئوری رفتار مصرف کننده در اقتصاد در 112 اسلاید

اقتصاد یا ترازمان به یک نظام اقتصادی در یک یا چند منطقه جغرافیایی یا سیاسی خاص اطلاق می‌شود و در برگیرنده تولید، توزیع یا تجارت و مصرف کالاها و خدمات در آن منطقه یا کشور می‌باشد. یک اقتصاد مجموع کل ارزش معاملات میان فعالان اقتصادی نظیر افراد، گروه‌ها، سازمان‌ها و حتی ... ...

قالب آماده رنگی پلاک خودرو word

قالب آماده رنگی پلاک خودرو word

قالب آماده رنگی پلاک خودرو word مناسب برای چاپ روی برگه A3 ... ...

نبرد باستانیان.pdf

نبرد باستانیان.pdf

نبرد باستانیان.pdf ... ...

دریافت فایل : نبرد باستانیان.pdf
پاورپوینت پودمان چهارم کار و فناوری پایه نهم بازی های رایانه ای

پاورپوینت پودمان چهارم کار و فناوری پایه نهم بازی های رایانه ای

                  نوع فایل: power point فرمت فایل: ppt and pptx قابل ویرایش 59 اسلاید   قسمتی از متن پاورپوینت:   بخش دوم پودمان بازی های رایانه ای برخی از شایستگی هایی که در این پودمان به دست می آورید: کار گروهی,مسئولیت پذیری مدیریت منابع,فناوری اطلاعات و ... ...

Algorithms Illuminated (Part 1): The Basics

Algorithms Illuminated (Part 1): The Basics

Algorithms Illuminated (Part 1): The Basics Algorithms are the heart and soul of computer science. Their applications range from network routing and computational genomics to public-key cryptography and machine learning. Studying algorithms can make you a better ... ...

Hands-On Unsupervised Learning Using Python

Hands-On Unsupervised Learning Using Python

Hands-On Unsupervised Learning Using Python Many industry experts consider unsupervised learning the next frontier in artificial intelligence, one that may hold the key to general artificial intelligence. Since the majority of the worlds data is unlabeled, conventional ... ...

Learn Python Programming: Write code from scratch in a clear & concise way, with a complete basic course. From beginners to intermediate, an hands-on

Learn Python Programming: Write code from scratch in a clear & concise way, with a complete basic course. From beginners to intermediate, an hands-on

Learn Python Programming: Write code from scratch in a clear & concise way, with a complete basic course. From beginners to intermediate, an hands-on project with examples, to follow step by step Code, did you always think it was difficult to learn ?Maybe they taught you ... ...

داریوش سوم آخرین شاه بزرگ.pdf

داریوش سوم آخرین شاه بزرگ.pdf

داریوش سوم آخرین شاه بزرگ.pdf ... ...

الفبای ارتباطات.pdf

الفبای ارتباطات.pdf

الفبای ارتباطات.pdf ... ...

دریافت فایل : الفبای ارتباطات.pdf
جادوی ذهن خود درمانی و شفابخشى.pdf

جادوی ذهن خود درمانی و شفابخشى.pdf

جادوی ذهن خود درمانی و شفابخشى.pdf ... ...

زبور داوود.pdf

زبور داوود.pdf

زبور داوود.pdf ... ...

دریافت فایل : زبور داوود.pdf
12ستون موفقیت.mp3

12ستون موفقیت.mp3

12ستون موفقیت.mp3 ... ...

دریافت فایل : 12ستون موفقیت.mp3
40 فکر سمی.pdf

40 فکر سمی.pdf

40 فکر سمی.pdf حتی یک لحظه هم این افکار را باور نکن! ... ...

دریافت فایل : 40 فکر سمی.pdf
دوازده قانون زندگی.pdf

دوازده قانون زندگی.pdf

دوازده قانون زندگی.pdf ... ...

تاریخ جنون.pdf

تاریخ جنون.pdf

تاریخ جنون.pdf ... ...

دریافت فایل : تاریخ جنون.pdf
فرهنگ فیلمهای سینما.pdf

فرهنگ فیلمهای سینما.pdf

فرهنگ فیلمهای سینما.pdf ... ...

ریاضی 1 و 2 دکتر نیکوکار.pdf

ریاضی 1 و 2 دکتر نیکوکار.pdf

ریاضی 1 و 2 دکتر نیکوکار.pdf ... ...

biology-3-sanatisharif.pdf

biology-3-sanatisharif.pdf

biology-3-sanatisharif.pdf بیولوژی3صنعتی شریف ... ...

دریافت فایل : biology-3-sanatisharif.pdf
تاریخ مهاب.pdf

تاریخ مهاب.pdf

تاریخ مهاباد.pdf ... ...

دریافت فایل : تاریخ مهاب.pdf
راهنمای جامع درمان سردرد

راهنمای جامع درمان سردرد

با این راهنمای جامع، به دنیای شگفت‌انگیز درمان سردرد قدم بگذارید، انواع مختلف سردرد را بشناسید، با علل و علائم آنها آشنا شوید و با روش‌های مختلف تشخیص و درمان آنها، به رهایی از درد و بازگشت به آرامش خود بپردازید!   سردرد، یکی از شایع‌ترین مشکلات سلامتی در جهان است که ... ...

راهنمای جامع زایمان: گامی بلند در مسیر تجربه ای آگاهانه و لذت بخش!

راهنمای جامع زایمان: گامی بلند در مسیر تجربه ای آگاهانه و لذت بخش!

با این راهنمای جامع، به دنیای شگفت‌انگیز زایمان قدم بگذارید، مراحل مختلف آن را به طور کامل بشناسید و با آمادگی لازم، سفری آگاهانه، لذت‌بخش و ایمن را در این تجربه منحصر به فرد زنانه تجربه کنید!   زایمان، فرآیندی طبیعی و شگفت‌انگیز است که در آن، مادر جنین خود را به دنیا ... ...

راهنمای جامع تجهیزات پزشکی در منزل: گامی بلند در مسیر مراقبت‌های بهداشتی در خانه!

راهنمای جامع تجهیزات پزشکی در منزل: گامی بلند در مسیر مراقبت‌های بهداشتی در خانه!

با این راهنمای جامع، به دنیای شگفت‌انگیز تجهیزات پزشکی در منزل قدم بگذارید، انواع مختلف این تجهیزات را بشناسید، با کاربرد و نحوه استفاده از آنها آشنا شوید و با آسودگی خاطر از سلامت خود و عزیزانتان در خانه مراقبت کنید!   تجهیزات پزشکی در منزل، وسایلی هستند که برای کمک به ... ...

نمونه سوال آیین نامه راهنما و رانندگی 1403

نمونه سوال آیین نامه راهنما و رانندگی 1403 ...

مسند الامام محمد بن ادریس الشافعی.pdf

مسند الامام محمد بن ادریس الشافعی.pdf

مسند الامام محمد بن ادریس الشافعی.pdf ... ...

کتاب سرود(آواز ) کریسمس نویسنده چارلز دیکنز

کتاب سرود(آواز ) کریسمس نویسنده چارلز دیکنز

کتاب آواز (سرود )کریسمس نویسنده چارلز دیکنز(Charles Dickens) A Christmas Carol) داستان جالب پیرمردی خسیس و بدخلق به نام اسکروچ را به نگارش درآورده که خودخواهی و نامهربانی‌هایش دوستان و آشنایان او را پراکنده کرده؛ تا این که در شب سال نو روح شریک خود را در خواب می‌بیند که به ... ...

کتاب بابا لنگ دراز نویسنده جین وبستر Daddy-Long-Legs

کتاب بابا لنگ دراز نویسنده جین وبستر Daddy-Long-Legs

کتاب بابا لنگ دراز نویسنده جین وبستر Daddy-Long-Legs «به‌شدت به آزادی اختیار و قدرت خودم برای موفقیت باور دارم و این باوری است که می‌تواند کوه‌ها را نیز به حرکت درآورد.» «مراقب باش که چشمانت را گرفتار جزئیات نکنی. به‌اندازه‌ای عقب بایست که بتوانی دیدی از کلیت داشته ... ...

نام محصول: راهنمای جامع لیزر درمانی

نام محصول: راهنمای جامع لیزر درمانی

با این راهنمای جامع، به دنیای شگفت‌انگیز لیزر درمانی قدم بگذارید، با انواع مختلف آن، کاربردها و فواید آن آشنا شوید و با استفاده از این روش درمانی غیرتهاجمی، به بهبود سلامتی خود بپردازید!   لیزر درمانی، نوعی روش درمانی غیرتهاجمی است که از نور لیزر برای تحریک سلول‌ها، ... ...

راهنمای جامع بیلیارد

راهنمای جامع بیلیارد

با این راهنمای جامع، به دنیای شگفت‌انگیز بیلیارد قدم بگذارید، با انواع مختلف این بازی، قوانین و مقررات آن آشنا شوید و با ارتقای مهارت‌های خود، به یک بازیکن حرفه‌ای بیلیارد تبدیل شوید!   بیلیارد، یک بازی مهیج و پرطرفدار است که در آن بازیکنان با استفاده از چوب بیلیارد، ... ...

اگر به یک وب سایت یا فروشگاه رایگان با فضای نامحدود و امکانات فراوان نیاز دارید بی درنگ دکمه زیر را کلیک نمایید.

ایجاد وب سایت یا
فروشگاه حرفه ای رایگان

تمام حقوق مادی و معنوی این وب سایت متعلق به "" می باشد

فید خبر خوان    نقشه سایت    تماس با ما