Linked e-resources

Details

Intro
Preface
Acknowledgments
Contents
About the Editors
Implementation of Machine and Deep Learning Algorithms for Intrusion Detection System
1 Introduction
2 Previous Research Works
3 Dataset
4 Proposed Methodology
4.1 Data Preprocessing
4.2 Feature Selection
4.3 Machine Learning
4.4 Deep Learning
4.5 Models
5 Evaluation of Models
6 Results and Discussion
7 Conclusion
References
Selection of a Rational Composition of İnformation Protection Means Using a Genetic Algorithm
1 Introduction
2 Literature Overview and Analysis
3 The Objectives and Aim of the Research
4 Models and Methods
4.1 Formulation of the Problem
4.2 Solution Example
5 Software Implementation of the Model and Computational Experiment
6 Discussion of the Results of the Computational Experiment
7 Conclusions
References
Classification of Breast Cancer Using CNN and Its Variant
1 Introduction
2 Literature Review
3 Proposed Work
3.1 Image Preprocessing
3.2 Augmentation
3.3 Training and Testing the Model
3.4 DenseNet Architecture
4 Algorithms Used
4.1 Histogram Equalization Method
4.2 Adaptive Histogram Equalization
5 Performance Metrics
6 Experimental Setup
6.1 Dataset
6.2 Result and Discussion
7 Conclusion
References
Systematic Approach for Network Security Using Ethical Hacking Technique
1 Introduction
2 Penetration Testing
3 Algorithm
4 Proposed System
5 Result
6 Future Work
7 Conclusion
References
Analysis of Modulation Techniques for Short Range V2V Communication
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 BER Calculation for QPSK Modulation Technique
3.2 BER Calculation for BPSK Modulation Technique
3.3 Calculation of Spectral Efficiency of BPSK:.

3.4 Determination of Spectral Efficiency of QPSK
4 Results and Discussion
5 Conclusion
References
Security Requirement Analysis of Blockchain-Based E-Voting Systems
1 Introduction
2 Fundamental Concepts
3 Related Work
4 Requirement Analysis
4.1 Functional Requirements (FR)
4.2 Nonfunctional Requirements (NFR)
4.3 Countermeasures on the Typical Attacks
4.4 Security and Privacy Requirements of Voting
5 Conclusion
References
OTP-Based Smart Door Opening System
1 Introduction
2 Literature Review
3 Existing Method
4 Proposed Method
4.1 Block Diagram
4.2 Flowchart
4.3 Arduino
4.4 LCD Display
4.5 Servomotor
4.6 Hardware Specifications
5 Result and Discussion
6 Conclusion
References
Tourist Spot Recognition Using Machine Learning Algorithms
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Data Augmentation
3.3 Proposed Method
4 Result Analysis
5 Conclusion and Future Work
References
Heart Disease Predictive Analysis Using Association Rule Mining
1 Introduction
1.1 Risk Factors Causing Heart Disease
2 Literature
3 Proposed Method
3.1 Association Rule
4 Experimental Results
5 Conclusion
References
Cluster-Enabled Optimized Data Aggregation Technique for WSN
1 Introduction
2 Related Work
3 Proposed Work
4 Performance Evaluation
5 Conclusion
References
Recreating Poompuhar Ancient History Using Virtual Reality
1 Introduction
2 Literature Survey
3 Proposed Work
4 Technology Used
4.1 Blender
4.2 Unity3D
4.3 Image-Based Rendering
5 Results and Discussion
6 Conclusion
References
Dynamic Energy Efficient Load Balancing Approach in Fog Computing Environment
1 Introduction
2 Related Work
3 Proposed Architecture
3.1 System Design and Model.

4 Performance Evaluation Parameters
5 Results and Discussion
6 Conclusion and Future Work
References
Sentiment Analysis Using CatBoost Algorithm on COVID-19 Tweets
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Preprocessing
3.3 Counter Vectorizer
3.4 Classification of Tweets Using CatBoost Algorithm
4 Result Analysis
4.1 Results and Discussion for Multiclass Classification
4.2 Performing Binary Classification on the Dataset
5 Conclusion and Future Work
References
Analysis and Classification of Abusive Textual Content Detection in Online Social Media
1 Introduction
2 Defining Abusive Textual Content
2.1 Classification of Online Abusive Content
3 Approaches for Detecting Textual Abusive Content
4 Abusive Content in Social Media
5 Discussion
6 Conclusion and Future Scope
References
A Survey of Antipodal Vivaldi Antenna Structures for Current Communication Systems
1 Introduction
2 Antipodal Vivaldi Antennas-Performance Enhancement Techniques
3 Recently Proposed AVA Structures
3.1 UWB End-Fire Vivaldi Antenna with Low RCS Capability
3.2 Balanced Antipodal Vivaldi Antenna with Dielectric Director
3.3 High-Gain Antipodal Vivaldi Antenna Surrounded by Dielectric
3.4 Notched Band Vivaldi Antenna with High Selectivity
3.5 Fern Fractal Leaf Inspired Wideband Antipodal Vivaldi Antenna
3.6 Comparison of the AVA Structures in the Literature
4 Conclusion
References
Survey on Wideband MIMO Antenna Design for 5G Applications
1 Introduction
2 5G MIMO Antenna, Classifications and Its Performance Enhancement Techniques
2.1 MIMO Antenna
2.2 Suitable Antennas for 5G Applications
2.3 Antenna Performance Enhancement Techniques
3 MIMO Wideband Antennas
3.1 Wideband Decoupled MIMO Antenna
3.2 PIFA-Pair-Based MIMO Antenna.

3.3 Y-Shaped MIMO Antenna
3.4 Highly Isolated MIMO Antenna
3.5 Compact Four-Element Optically Transparent MIMO Antenna
3.6 Comparison of MIMO Wideband Antennas Structures
4 Conclusion
References
Transprecision Gaussian Average Background Modelling Technique for Multi-vehicle Tracking Applications
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Proposed Transprecision Gaussian Adaptive Background Subtraction Methodology
4.1 Vehicle Tracking and Counting Stage
5 Experimental Results and Discussion
6 Conclusion
References
Spam Message Filtering Based on Machine Learning Algorithms and BERT
1 Introduction
2 Related Work
3 Experiment Design
3.1 Pre-processing the Data
3.2 NLP Techniques
3.3 Modelling
4 Results
5 Conclusions
References
Li-Fi: A Novel Stand-In for Connectivity and Data Transmission in Toll System
1 Introduction
2 Principle of Li-Fi
3 State of Art of Li-Fi
3.1 Li-Fi Products
3.2 Li-Fi-Based Smart Cities
4 Comparison of Different Existing Connection Technologies
5 Comparison of Existing Connection Technologies as an Alternative for Conventional Toll System
5.1 Wi-Fi
5.2 Bluetooth
5.3 Zigbee
6 Conventional Toll System
7 Prototype Description
8 System Requirements
8.1 Hardware Requirements
8.2 Software Requirements
9 System Design
9.1 Transmitter Section
9.2 Receiver Section
10 Results
11 Challenges in the Implementation of Li-Fi
12 Conclusion and Future Works
References
Classification of ECG Signal for Cardiac Arrhythmia Detection Using GAN Method
1 Introduction
2 Review of the Literature
3 Methodology
3.1 Baseline Wander
3.2 Support Vector Regression
3.3 Kernel Principal Component Analysis
3.4 General Sparsed Neural Network Classifier (GSNN).

3.5 Generative Adversarial Networks
3.6 ECG Transformation
3.7 MIT-BIH Dataset
4 Experimental Results
5 Conclusion
References
Classifying Pulmonary Embolism Cases in Chest CT Scans Using VGG16 and XGBoost
1 Introduction
2 Related Work
3 Experiment Design
3.1 Dataset
3.2 Creating Train and Test Subsets
3.3 Model Building
3.4 Proposed Methodology
4 Results
5 Conclusion
6 Future Scope
References
User Credibility-Based Trust Model for 5G Wireless Networks
1 Introduction
2 Related Work
3 Proposed User Credibility-Based Trust Model for 5G Networks
3.1 Direct Credibility Degree Calculation
3.2 Indirect Credibility Degree Calculation
3.3 Credibility Value Verification
4 Conclusion
References
Advanced Signature-Based Intrusion Detection System
1 Introduction
2 Literature Survey
3 Proposed Framework
4 Experiment and Results
5 Conclusion
References
A Survey on Detection of Cyberbullying in Social Media Using Machine Learning Techniques
1 Introduction
1.1 Motivation
1.2 Organization
2 Background
2.1 Impact of Cyberbullying
2.2 How to Prevent Cyberbullying
3 Related Work
4 Conclusion and Future Work
References
A Comparison of Similarity Measures in an Online Book Recommendation System
1 Introduction
2 Literature Review
3 Dataset
4 Similarity Measures
5 Conclusion
References
Novel Approach for Improving Security and Confidentiality of PHR in Cloud Using Public Key Encryption
1 Introduction
1.1 Advantages of PHR
1.2 PHR Architecture
2 Related Work
3 Architecture of Proposed Methodology
4 Experimental Setup
4.1 RSA and ECC Encryption Technique
5 Conclusion and Future Work
References.

Browse Subjects

Show more subjects...

Statistics

from
to
Export