Information and Communication Technology for Intelligent Systems: Proceedings of ICTIS 2020, Volume 2 (Smart Innovation, Systems and Technologies Book 196) 🔍
Tomonobu Senjyu, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi, Suresh Chandra Satapathy
Springer Singapore : Imprint: Springer, Smart Innovation, Systems and Technologies, Smart Innovation, Systems and Technologies 196, 1, 2021
英语 [en] · PDF · 27.5MB · 2021 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/scihub/upload/zlib · Save
描述
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
备用文件名
nexusstc/Information and Communication Technology for Intelligent Systems: Proceedings of ICTIS 2020, Volume 2/8503f6f41e967602a42de339a4c5294a.pdf
备用文件名
lgli/10.1007%2F978-981-15-7062-9.pdf
备用文件名
lgrsnf/10.1007%2F978-981-15-7062-9.pdf
备用文件名
scihub/10.1007/978-981-15-7062-9.pdf
备用文件名
zlib/Computers/Tomonobu Senjyu, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi/Information and Communication Technology for Intelligent Systems: Proceedings of ICTIS 2020, Volume 2_11236759.pdf
备选作者
International Conference on Information and Communication Technology for Intelligent Systems
备选作者
Senjyu, Tomonobu; Mahalle, Parikshit N.; Perumal, Thinagaran; Joshi, Amit
备选作者
0014431
备用出版商
Springer Nature Singapore Pte Ltd Fka Springer Science + Business Media Singapore Pte Ltd
备用版本
Smart innovation, systems, and technologies, 196, 1st ed. 2021, Singapore, 2021
备用版本
Smart innovation, systems, and technologies, v. 196, Singapore, 2021
备用版本
Springer Nature, Singapore, 2020
备用版本
Singapore, Singapore
备用版本
1st ed. 2021, 2020
元数据中的注释
sm84363687
元数据中的注释
producers:
Acrobat Distiller 10.1.16 (Windows)
Acrobat Distiller 10.1.16 (Windows)
元数据中的注释
{"container_title":"Smart Innovation, Systems and Technologies","edition":"1","isbns":["9789811570612","9789811570629","9811570612","9811570620"],"issns":["2190-3018","2190-3026"],"last_page":780,"publisher":"Springer Singapore;Springer","series":"Smart Innovation, Systems and Technologies 196"}
备用描述
Front Matter ....Pages i-xxii
Internet of Things: Challenges, Security Issues and Solutions (Sweta Singh, Rakesh Kumar)....Pages 1-16
Modeling and Performance Evaluation of Auction Model in Cloud Computing (Gagandeep Kaur)....Pages 17-23
Framework for Resource Management in Cloud Computing (Gagandeep Kaur)....Pages 25-32
Unique Stego Key Generation from Fingerprint Image in Image Steganography (A. Anuradha, Hardik B. Pandit)....Pages 33-42
Self-powered IoT-Based Design for Multi-purpose Smart Poultry Farm (Tajim Md. Niamat Ullah Akhund, Shouvik Roy Snigdha, Md. Sumon Reza, Nishat Tasnim Newaz, Mohd. Saifuzzaman, Masud Rana Rashel)....Pages 43-51
Phrase-Based Statistical Machine Translation of Hindi Poetries into English (Rajesh Kumar Chakrawarti, Pratosh Bansal, Jayshri Bansal)....Pages 53-65
A Smart Education Model for Future Learning and Teaching Using IoT (Swati Jain, Dimple Chawla)....Pages 67-75
Internet of Things (IoT)-Based Advanced Voting Machine System Enhanced Using Low-Cost IoT Embedded Device and Cloud Platform (Miral M. Desai, Jignesh J. Patoliya, Hiren K. Mewada)....Pages 77-86
IoT: Security Issues and Challenges (Er Richa)....Pages 87-96
Coronary Artery Disease Prediction Using Neural Network and Random Forest-Based Feature Selection (Aman Shakya, Neerav Adhikari, Basanta Joshi)....Pages 97-105
A Collaborative Approach to Decision Making in Decentralized IoT Devices (Venus Kaurani, Himajit Aithal)....Pages 107-115
Analysis of MRI Images for Brain Tumor Detection Using Fuzzy C-Means and LSTM (Sobit Thapa, Sanjeeb Prasad Panday)....Pages 117-125
A Survey on Recognizing and Significance of Self-portrait Images (Jigar Bhatt, Mangesh Bedekar)....Pages 127-138
Anomaly Detection in Distributed Streams (Rupesh Karn, Suvrat Ram Joshi, Umanga Bista, Basanta Joshi, Daya Sagar Baral, Aman Shakya)....Pages 139-147
Envisaging Bugs by Means of Entropy Measures (Anjali Munde)....Pages 149-156
TRANSPR—Transforming Public Accountability Through Blockchain Technology (P. R. Sriram, N. J. Subhashruthi, M. Muthu Manikandan, Karthik Gopalan, Sriram Kaushik)....Pages 157-166
The Scope of Tidal Energy in UAE (Abaan Ahamad, A. R. Abdul Rajak)....Pages 167-175
Knowledge Engineering in Higher Education (Shankar M. Patil, Vijaykumar N. Patil, Sonali J. Mane, Shilpa M. Satre)....Pages 177-191
Building a Graph Database for Storing Heterogeneous Healthcare Data (Goutam Kundu, Nandini Mukherjee, Safikureshi Mondal)....Pages 193-201
Analysis and Optimization of Cash Withdrawal Process Through ATM in India from HCI and Customization (Abhishek Jain, Shiva Subhedar, Naveen KumarGupta)....Pages 203-211
Survey of Mininet Challenges, Opportunities, and Application in Software-Defined Network (SDN) (Dhruvkumar Dholakiya, Tanmay Kshirsagar, Amit Nayak)....Pages 213-221
Some Novelties in Map Reducing Techniques to Retrieve and Analyze Big Data for Effective Processing (Prashant Bhat, Prajna Hegde)....Pages 223-232
A Study Based on Advancements in Smart Mirror Technology (Aniket Dongare, Indrajeet Devale, Aditya Dabadge, Shubham Bachute, Sukhada Bhingarkar)....Pages 233-240
Unidirectional Ensemble Recognition and Translation of Phrasal Sign Language from ASL to ISL (Anish Sujanani, Shashidhar Pai, Aniket Udaykumar, Vivith Bharath, V. R. Badri Prasad)....Pages 241-249
Unravelling SAT: Discussion on the Suitability and Implementation of Graph Convolutional Networks for Solving SAT (Hemali Angne, Aditya Atkari, Nishant Dhargalkar, Dilip Kale)....Pages 251-258
CES: Design and Implementation of College Exam System (Punya Mathew, Rasesh Tongia, Kavish Mehta, Vaibhav Jain)....Pages 259-267
ANN-Based Multi-class Malware Detection Scheme for IoT Environment (Vaibhav Nauriyal, Kushagra Mittal, Sumit Pundir, Mohammad Wazid, D. P. Singh)....Pages 269-277
Secure Web Browsing Using Trusted Platform Module (TPM) (Harshad S. Wadkar, Arun Mishra)....Pages 279-290
CP-ABE with Hidden Access Policy and Outsourced Decryption for Cloud-Based EHR Applications (Kasturi Routray, Kamalakanta Sethi, Bharati Mishra, Padmalochan Bera, Debasish Jena)....Pages 291-301
Viral Internet Challenges: A Study on the Motivations Behind Social Media User Participation (Naman Shroff, G. Shreyass, Deepak Gupta)....Pages 303-311
Early Flood Monitoring System in Remote Areas (John Colaco, R. B. Lohani)....Pages 313-322
A Survey on Securing Payload in MQTT and a Proposed Ultra-lightweight Cryptography (Edward Nwiah, Shri Kant)....Pages 323-335
Life Cycle Assessment and Management in Hospital Units Using Applicable and Robust Dual Group-Based Parameter Model (Vitaliy Sarancha, Leo Mirsic, Stjepan Oreskovic, Vadym Sulyma, Bojana Kranjcec, Ksenija Vitale)....Pages 337-346
A Novel Approach to Stock Market Analysis and Prediction Using Data Analytics (Sangeeta Kumari, Kanchan Chaudhari, Rohan Deshmukh, Rutajagruti Naik, Amar Deshmukh)....Pages 347-356
Energy Trading Using Ethereum Blockchain (M. Mrunalini, D. Pavan Kumar)....Pages 357-365
Supply Chain Management for Selling Farm Produce Using Blockchain (Anita Chaudhari, Jateen Vedak, Raj Vartak, Mayuresh Sonar)....Pages 367-375
Design and Construction of a Multipurpose Solar-Powered Water Purifier (Ayodeji Olalekan Salau, Dhananjay S. Deshpande, Bernard Akindade Adaramola, Abdulkadir Habeebullah)....Pages 377-387
Named Entity Recognition for Rental Documents Using NLP (Chinmay Patil, Sushant Patil, Komal Nimbalkar, Dhiraj Chavan, Sharmila Sengupta, Devesh Rajadhyax)....Pages 389-397
Empirical Analysis of Various Seed Selection Methods (Kinjal Rabadiya, Ritesh Patel)....Pages 399-407
A Comparative Study on Interactive Segmentation Algorithms for Segmentation of Animal Images (N. Manohar, S. Akshay, N. Shobha Rani)....Pages 409-417
Implications of Quantum Superposition in Cryptography: A True Random Number Generation Algorithm (Dhananjay S. Deshpande, Aman Kumar Nirala, Ayodeji Olalekan Salau)....Pages 419-431
Influences of Purchase Involvement on the Relationship Between Customer Satisfaction and Loyalty in Vietnam (Pham Van Tuan)....Pages 433-444
A Study on Factors Influencing Consumer Intention to Use UPI-Based Payment Apps in Indian Perspective (Piyush Kumar Mallik, Deepak Gupta)....Pages 445-452
A Proposed SDN-Based Cloud Setup in the Virtualized Environment to Enhance Security (H. M. Anitha, P. Jayarekha)....Pages 453-461
A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0 (B. R. Yogeshwar, M. Sethumadhavan, Seshadhri Srinivasan, P. P. Amritha)....Pages 463-472
Conventional Biometrics and Hidden Biometric: A Comparative Study (Shaleen Bhatnagar, Nidhi Mishra)....Pages 473-481
Performance Analysis of Various Trained CNN Models on Gujarati Script (Parantap Vakharwala, Riya Chhabda, Vaidehi Painter, Urvashi Pawar, Sarosh Dastoor)....Pages 483-492
Real-Time Human Intrusion Detection for Home Surveillance Based on IOT (Mohith Sai Subhash Gaddipati, S. Krishnaja, Akhila Gopan, Ashiema G. A. Thayyil, Amrutha S. Devan, Aswathy Nair)....Pages 493-505
Token Money: A Study on Purchase and Spending Propensities in E-Commerce and Mobile Games (N. P. Sreekanth, Deepak Gupta)....Pages 507-514
Data Augmentation for Handwritten Character Recognition of MODI Script Using Deep Learning Method (Solley Joseph, Jossy George)....Pages 515-522
Improved Automatic Speaker Verification System Using Deep Learning (Saumya Borwankar, Shrey Bhatnagar, Yash Jha, Shraddha Pandey, Khushi Jain)....Pages 523-531
Detection and Prevention of Attacks on Active Directory Using SIEM (S. Muthuraj, M. Sethumadhavan, P. P. Amritha, R. Santhya)....Pages 533-541
Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices (Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, S. Indu, Ajay Kaushik, Alok Kumar Singh)....Pages 543-553
Implication of Web-Based Open-Source Application in Assessing Design Practice Reliability: In Case of ERA’s Road Projects (Bilal Kedir Mohammed, Sudhir Kumar Mahapatra, Avinash M. Potdar)....Pages 555-564
Influencer Versus Peer: The Effect of Product Involvement on Credibility of Endorsers (S. Rajaraman, Deepak Gupta, Jeeva Bharati)....Pages 565-571
The Influence of Fan Behavior on the Purchase Intention of Authentic Sports Team Merchandise (Anand Vardhan, N. Arjun, Shobhana Palat Madhavan, Deepak Gupta)....Pages 573-579
Purchase Decisions of Brand Followers on Instagram (R. Dhanush Shri Vardhan, Shobhana Palat Madhavan, Deepak Gupta)....Pages 581-587
Deep Learning Based Parking Prediction Using LSTM Approach (Aniket Mishra, Sachin Deshpande)....Pages 589-597
Beyond Kirana Stores: A Study on Consumer Purchase Intention for Buying Grocery Online (R. Sowmyanarayanan, Gowtam Krishnaa, Deepak Gupta)....Pages 599-606
Car Damage Recognition Using the Expectation Maximization Algorithm and Mask R-CNN (Aseem Patil)....Pages 607-616
Deep Learning Methods for Animal Recognition and Tracking to Detect Intrusions (Ashwini V. Sayagavi, T. S. B. Sudarshan, Prashanth C. Ravoor)....Pages 617-626
VR Based Underwater Museum of Andaman and Nicobar Islands (T. Manju, Allen Francis, Nikil Sankar, Tharick Azzarudin, B. Magesh)....Pages 627-632
Network Performance Evaluation in Software-Defined Networking (Shilpa M. Satre, Nitin S. Patil, Shubham V. Khot, Ashish A. Saroj)....Pages 633-645
Performance Improvement in Web Mining Using Classification to Investigate Web Log Access Patterns (Charul Nigam, Arvind Kumar Sharma)....Pages 647-658
Array Password Authentication Using Inhibitor Arc Generating Array Language and Colored Petri Net Generating Square Arrays of Side 2k (S. Vaithyasubramanian, D. Lalitha, A. Christy, M. I. Mary Metilda)....Pages 659-667
sVana—The Sound of Silence (Nilesh Rijhwani, Pallavi Saindane, Janhvi Patil, Aishwarya Goythale, Sartha Tambe)....Pages 669-680
Coreveillance—Making Our World a “SAFER” Place (C. S. Lifna, Akash Narang, Dhiren Chotwani, Priyanka Lalchandani, Chirag Raghani)....Pages 681-688
Large-Scale Video Classification with Convolutional Neural Networks (Bh. SravyaPranati, D. Suma, Ch. ManjuLatha, Sudhakar Putheti)....Pages 689-695
Saathi—A Smart IoT-Based Pill Reminder for IVF Patients (Pratiksha Wadibhasme, Anjali Amin, Pragya Choudhary, Pallavi Saindane)....Pages 697-705
Predictive Analysis of Alzheimer’s Disease Based on Wrapper Approach Using SVM and KNN (Bali Devi, Sumit Srivastava, Vivek Kumar Verma)....Pages 707-715
A Novel Method for Enabling Wireless Communication Technology in Smart Cities (Vijay A. Kanade)....Pages 717-726
Electronic Aid Design of Fruits Image Classification for Visually Impaired People (V. Srividhya, K. Sujatha, M. Aruna, D. Sangeetha)....Pages 727-734
Temperature Regulation Based on Occupancy (Rajesh Kr. Yadav, Shanya Verma, Prishita Singh)....Pages 735-744
Score Prediction Model for Sentiment Classification Using Machine Learning Algorithms (Priti Sharma, Arvind Kumar Sharma)....Pages 745-753
CFD Analysis Applied to Hydrodynamic Journal Bearing (Mihir H. Amin, Monil M. Bhamare, Ayush V. Patel, Darsh P. Pandya, Rutvik M. Bhavsar, Snehal N. Patel)....Pages 755-776
Back Matter ....Pages 777-780
Internet of Things: Challenges, Security Issues and Solutions (Sweta Singh, Rakesh Kumar)....Pages 1-16
Modeling and Performance Evaluation of Auction Model in Cloud Computing (Gagandeep Kaur)....Pages 17-23
Framework for Resource Management in Cloud Computing (Gagandeep Kaur)....Pages 25-32
Unique Stego Key Generation from Fingerprint Image in Image Steganography (A. Anuradha, Hardik B. Pandit)....Pages 33-42
Self-powered IoT-Based Design for Multi-purpose Smart Poultry Farm (Tajim Md. Niamat Ullah Akhund, Shouvik Roy Snigdha, Md. Sumon Reza, Nishat Tasnim Newaz, Mohd. Saifuzzaman, Masud Rana Rashel)....Pages 43-51
Phrase-Based Statistical Machine Translation of Hindi Poetries into English (Rajesh Kumar Chakrawarti, Pratosh Bansal, Jayshri Bansal)....Pages 53-65
A Smart Education Model for Future Learning and Teaching Using IoT (Swati Jain, Dimple Chawla)....Pages 67-75
Internet of Things (IoT)-Based Advanced Voting Machine System Enhanced Using Low-Cost IoT Embedded Device and Cloud Platform (Miral M. Desai, Jignesh J. Patoliya, Hiren K. Mewada)....Pages 77-86
IoT: Security Issues and Challenges (Er Richa)....Pages 87-96
Coronary Artery Disease Prediction Using Neural Network and Random Forest-Based Feature Selection (Aman Shakya, Neerav Adhikari, Basanta Joshi)....Pages 97-105
A Collaborative Approach to Decision Making in Decentralized IoT Devices (Venus Kaurani, Himajit Aithal)....Pages 107-115
Analysis of MRI Images for Brain Tumor Detection Using Fuzzy C-Means and LSTM (Sobit Thapa, Sanjeeb Prasad Panday)....Pages 117-125
A Survey on Recognizing and Significance of Self-portrait Images (Jigar Bhatt, Mangesh Bedekar)....Pages 127-138
Anomaly Detection in Distributed Streams (Rupesh Karn, Suvrat Ram Joshi, Umanga Bista, Basanta Joshi, Daya Sagar Baral, Aman Shakya)....Pages 139-147
Envisaging Bugs by Means of Entropy Measures (Anjali Munde)....Pages 149-156
TRANSPR—Transforming Public Accountability Through Blockchain Technology (P. R. Sriram, N. J. Subhashruthi, M. Muthu Manikandan, Karthik Gopalan, Sriram Kaushik)....Pages 157-166
The Scope of Tidal Energy in UAE (Abaan Ahamad, A. R. Abdul Rajak)....Pages 167-175
Knowledge Engineering in Higher Education (Shankar M. Patil, Vijaykumar N. Patil, Sonali J. Mane, Shilpa M. Satre)....Pages 177-191
Building a Graph Database for Storing Heterogeneous Healthcare Data (Goutam Kundu, Nandini Mukherjee, Safikureshi Mondal)....Pages 193-201
Analysis and Optimization of Cash Withdrawal Process Through ATM in India from HCI and Customization (Abhishek Jain, Shiva Subhedar, Naveen KumarGupta)....Pages 203-211
Survey of Mininet Challenges, Opportunities, and Application in Software-Defined Network (SDN) (Dhruvkumar Dholakiya, Tanmay Kshirsagar, Amit Nayak)....Pages 213-221
Some Novelties in Map Reducing Techniques to Retrieve and Analyze Big Data for Effective Processing (Prashant Bhat, Prajna Hegde)....Pages 223-232
A Study Based on Advancements in Smart Mirror Technology (Aniket Dongare, Indrajeet Devale, Aditya Dabadge, Shubham Bachute, Sukhada Bhingarkar)....Pages 233-240
Unidirectional Ensemble Recognition and Translation of Phrasal Sign Language from ASL to ISL (Anish Sujanani, Shashidhar Pai, Aniket Udaykumar, Vivith Bharath, V. R. Badri Prasad)....Pages 241-249
Unravelling SAT: Discussion on the Suitability and Implementation of Graph Convolutional Networks for Solving SAT (Hemali Angne, Aditya Atkari, Nishant Dhargalkar, Dilip Kale)....Pages 251-258
CES: Design and Implementation of College Exam System (Punya Mathew, Rasesh Tongia, Kavish Mehta, Vaibhav Jain)....Pages 259-267
ANN-Based Multi-class Malware Detection Scheme for IoT Environment (Vaibhav Nauriyal, Kushagra Mittal, Sumit Pundir, Mohammad Wazid, D. P. Singh)....Pages 269-277
Secure Web Browsing Using Trusted Platform Module (TPM) (Harshad S. Wadkar, Arun Mishra)....Pages 279-290
CP-ABE with Hidden Access Policy and Outsourced Decryption for Cloud-Based EHR Applications (Kasturi Routray, Kamalakanta Sethi, Bharati Mishra, Padmalochan Bera, Debasish Jena)....Pages 291-301
Viral Internet Challenges: A Study on the Motivations Behind Social Media User Participation (Naman Shroff, G. Shreyass, Deepak Gupta)....Pages 303-311
Early Flood Monitoring System in Remote Areas (John Colaco, R. B. Lohani)....Pages 313-322
A Survey on Securing Payload in MQTT and a Proposed Ultra-lightweight Cryptography (Edward Nwiah, Shri Kant)....Pages 323-335
Life Cycle Assessment and Management in Hospital Units Using Applicable and Robust Dual Group-Based Parameter Model (Vitaliy Sarancha, Leo Mirsic, Stjepan Oreskovic, Vadym Sulyma, Bojana Kranjcec, Ksenija Vitale)....Pages 337-346
A Novel Approach to Stock Market Analysis and Prediction Using Data Analytics (Sangeeta Kumari, Kanchan Chaudhari, Rohan Deshmukh, Rutajagruti Naik, Amar Deshmukh)....Pages 347-356
Energy Trading Using Ethereum Blockchain (M. Mrunalini, D. Pavan Kumar)....Pages 357-365
Supply Chain Management for Selling Farm Produce Using Blockchain (Anita Chaudhari, Jateen Vedak, Raj Vartak, Mayuresh Sonar)....Pages 367-375
Design and Construction of a Multipurpose Solar-Powered Water Purifier (Ayodeji Olalekan Salau, Dhananjay S. Deshpande, Bernard Akindade Adaramola, Abdulkadir Habeebullah)....Pages 377-387
Named Entity Recognition for Rental Documents Using NLP (Chinmay Patil, Sushant Patil, Komal Nimbalkar, Dhiraj Chavan, Sharmila Sengupta, Devesh Rajadhyax)....Pages 389-397
Empirical Analysis of Various Seed Selection Methods (Kinjal Rabadiya, Ritesh Patel)....Pages 399-407
A Comparative Study on Interactive Segmentation Algorithms for Segmentation of Animal Images (N. Manohar, S. Akshay, N. Shobha Rani)....Pages 409-417
Implications of Quantum Superposition in Cryptography: A True Random Number Generation Algorithm (Dhananjay S. Deshpande, Aman Kumar Nirala, Ayodeji Olalekan Salau)....Pages 419-431
Influences of Purchase Involvement on the Relationship Between Customer Satisfaction and Loyalty in Vietnam (Pham Van Tuan)....Pages 433-444
A Study on Factors Influencing Consumer Intention to Use UPI-Based Payment Apps in Indian Perspective (Piyush Kumar Mallik, Deepak Gupta)....Pages 445-452
A Proposed SDN-Based Cloud Setup in the Virtualized Environment to Enhance Security (H. M. Anitha, P. Jayarekha)....Pages 453-461
A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0 (B. R. Yogeshwar, M. Sethumadhavan, Seshadhri Srinivasan, P. P. Amritha)....Pages 463-472
Conventional Biometrics and Hidden Biometric: A Comparative Study (Shaleen Bhatnagar, Nidhi Mishra)....Pages 473-481
Performance Analysis of Various Trained CNN Models on Gujarati Script (Parantap Vakharwala, Riya Chhabda, Vaidehi Painter, Urvashi Pawar, Sarosh Dastoor)....Pages 483-492
Real-Time Human Intrusion Detection for Home Surveillance Based on IOT (Mohith Sai Subhash Gaddipati, S. Krishnaja, Akhila Gopan, Ashiema G. A. Thayyil, Amrutha S. Devan, Aswathy Nair)....Pages 493-505
Token Money: A Study on Purchase and Spending Propensities in E-Commerce and Mobile Games (N. P. Sreekanth, Deepak Gupta)....Pages 507-514
Data Augmentation for Handwritten Character Recognition of MODI Script Using Deep Learning Method (Solley Joseph, Jossy George)....Pages 515-522
Improved Automatic Speaker Verification System Using Deep Learning (Saumya Borwankar, Shrey Bhatnagar, Yash Jha, Shraddha Pandey, Khushi Jain)....Pages 523-531
Detection and Prevention of Attacks on Active Directory Using SIEM (S. Muthuraj, M. Sethumadhavan, P. P. Amritha, R. Santhya)....Pages 533-541
Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices (Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, S. Indu, Ajay Kaushik, Alok Kumar Singh)....Pages 543-553
Implication of Web-Based Open-Source Application in Assessing Design Practice Reliability: In Case of ERA’s Road Projects (Bilal Kedir Mohammed, Sudhir Kumar Mahapatra, Avinash M. Potdar)....Pages 555-564
Influencer Versus Peer: The Effect of Product Involvement on Credibility of Endorsers (S. Rajaraman, Deepak Gupta, Jeeva Bharati)....Pages 565-571
The Influence of Fan Behavior on the Purchase Intention of Authentic Sports Team Merchandise (Anand Vardhan, N. Arjun, Shobhana Palat Madhavan, Deepak Gupta)....Pages 573-579
Purchase Decisions of Brand Followers on Instagram (R. Dhanush Shri Vardhan, Shobhana Palat Madhavan, Deepak Gupta)....Pages 581-587
Deep Learning Based Parking Prediction Using LSTM Approach (Aniket Mishra, Sachin Deshpande)....Pages 589-597
Beyond Kirana Stores: A Study on Consumer Purchase Intention for Buying Grocery Online (R. Sowmyanarayanan, Gowtam Krishnaa, Deepak Gupta)....Pages 599-606
Car Damage Recognition Using the Expectation Maximization Algorithm and Mask R-CNN (Aseem Patil)....Pages 607-616
Deep Learning Methods for Animal Recognition and Tracking to Detect Intrusions (Ashwini V. Sayagavi, T. S. B. Sudarshan, Prashanth C. Ravoor)....Pages 617-626
VR Based Underwater Museum of Andaman and Nicobar Islands (T. Manju, Allen Francis, Nikil Sankar, Tharick Azzarudin, B. Magesh)....Pages 627-632
Network Performance Evaluation in Software-Defined Networking (Shilpa M. Satre, Nitin S. Patil, Shubham V. Khot, Ashish A. Saroj)....Pages 633-645
Performance Improvement in Web Mining Using Classification to Investigate Web Log Access Patterns (Charul Nigam, Arvind Kumar Sharma)....Pages 647-658
Array Password Authentication Using Inhibitor Arc Generating Array Language and Colored Petri Net Generating Square Arrays of Side 2k (S. Vaithyasubramanian, D. Lalitha, A. Christy, M. I. Mary Metilda)....Pages 659-667
sVana—The Sound of Silence (Nilesh Rijhwani, Pallavi Saindane, Janhvi Patil, Aishwarya Goythale, Sartha Tambe)....Pages 669-680
Coreveillance—Making Our World a “SAFER” Place (C. S. Lifna, Akash Narang, Dhiren Chotwani, Priyanka Lalchandani, Chirag Raghani)....Pages 681-688
Large-Scale Video Classification with Convolutional Neural Networks (Bh. SravyaPranati, D. Suma, Ch. ManjuLatha, Sudhakar Putheti)....Pages 689-695
Saathi—A Smart IoT-Based Pill Reminder for IVF Patients (Pratiksha Wadibhasme, Anjali Amin, Pragya Choudhary, Pallavi Saindane)....Pages 697-705
Predictive Analysis of Alzheimer’s Disease Based on Wrapper Approach Using SVM and KNN (Bali Devi, Sumit Srivastava, Vivek Kumar Verma)....Pages 707-715
A Novel Method for Enabling Wireless Communication Technology in Smart Cities (Vijay A. Kanade)....Pages 717-726
Electronic Aid Design of Fruits Image Classification for Visually Impaired People (V. Srividhya, K. Sujatha, M. Aruna, D. Sangeetha)....Pages 727-734
Temperature Regulation Based on Occupancy (Rajesh Kr. Yadav, Shanya Verma, Prishita Singh)....Pages 735-744
Score Prediction Model for Sentiment Classification Using Machine Learning Algorithms (Priti Sharma, Arvind Kumar Sharma)....Pages 745-753
CFD Analysis Applied to Hydrodynamic Journal Bearing (Mihir H. Amin, Monil M. Bhamare, Ayush V. Patel, Darsh P. Pandya, Rutvik M. Bhavsar, Snehal N. Patel)....Pages 755-776
Back Matter ....Pages 777-780
开源日期
2020-11-04
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
- 高速服务器(合作方提供) #1 (推荐)
- 高速服务器(合作方提供) #2 (推荐)
- 高速服务器(合作方提供) #3 (推荐)
- 高速服务器(合作方提供) #4 (推荐)
- 高速服务器(合作方提供) #5 (推荐)
- 高速服务器(合作方提供) #6 (推荐)
- 高速服务器(合作方提供) #7
- 高速服务器(合作方提供) #8
- 高速服务器(合作方提供) #9
- 高速服务器(合作方提供) #10
- 高速服务器(合作方提供) #11
- 高速服务器(合作方提供) #12
- 高速服务器(合作方提供) #13
- 高速服务器(合作方提供) #14
- 高速服务器(合作方提供) #15
- 高速服务器(合作方提供) #16
- 高速服务器(合作方提供) #17
- 高速服务器(合作方提供) #18
- 高速服务器(合作方提供) #19
- 高速服务器(合作方提供) #20
- 高速服务器(合作方提供) #21
- 高速服务器(合作方提供) #22
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #10 (稍快但需要排队)
- 低速服务器(合作方提供) #11 (稍快但需要排队)
- 低速服务器(合作方提供) #12 (稍快但需要排队)
- 低速服务器(合作方提供) #13 (稍快但需要排队)
- 低速服务器(合作方提供) #14 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #15 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #16 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #17 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #18 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.