Linked e-resources
Details
Table of Contents
Intro
Preface
Contents
Editors and Contributors
Implementation of a PID Controller for Autonomous Vehicles with Traffic Light Detection in CARLA
1 Introduction
2 Related Work
3 Methodology
4 Implementation of PID Controller
5 Traffic Light Detection
6 Combined Framework
7 Result and Discussion
7.1 PID Controller
8 Traffic Light Detection
9 Combined Framework
10 Conclusion
References
Binary Classification for High Dimensional Data Using Supervised Non-parametric Ensemble Method
1 Introduction
2 Implementation
3 Results
3.1 Analysis of Data
3.2 Precision and Recall
3.3 F-Score
3.4 Receiver Operating Characteristic
4 Conclusion
References
Deep Linear Discriminant Analysis with Variation for Polycystic Ovary Syndrome Classification
1 Introduction
2 Methodology
2.1 First Phase
2.2 Second Phase
3 Results
3.1 Accuracy and Loss for First Phase
3.2 Accuracy and Loss for Second Phase
3.3 Precision
3.4 Recall
3.5 F-Score
4 Conclusion
References
Improved Helmet Detection Model Using YOLOv5
1 Introduction
2 Literature Survey
3 Architecture of YOLOv5
4 Proposed System
5 Results and Discussion
5.1 Experimental Environment
5.2 Dataset
5.3 Results
6 Conclusion
References
Stock Market Trend Prediction Along with Twitter Sentiment Analysis
1 Introduction
2 Literature Survey
3 Dataset
3.1 Yahoo Finance
3.2 Twitter Sentiment Analysis
3.3 Standardization
4 Work Flow Diagram
5 Methodology
5.1 Stock Trend Predication
5.2 Twitter Sentiment Analysis
6 Experimental Results
7 Conclusion
References
A Study on MQTT Protocol Architecture and Security Aspects Within IoT Paradigm
1 Introduction to MQTT Protocol
1.1 MQTT Protocol Architecture
1.2 Why MQTT?
2 Security Aspects Within MQTT
2.1 Identity
2.2 Authentication
2.3 Authorization
3 X.509 Client Certificate Authentication Within MQTT
3.1 Certificate Provisioning
3.2 Certification Revocation List
3.3 X.509 Certificate for Authentication and Authorization
3.4 OAuth2.0 Within MQTT
4 Payload Encryption
4.1 E2E (End-To-End)Encryption
4.2 Client to Broker Encryption
5 Conclusion
References
Compartive Analysis of Different Block Chain Technology to Improve the Security in Social Network
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Security Process Using SNS Model Dapps, & BCOSN's Architecture
5 Comparison of Different Security Features in Blockchain for Social Network
6 Conclusion
References
Euphonia: Music Recommendation System Based on Facial Recognition and Emotion Detection
1 Introduction
2 Literature Survey
3 Problem Statement
4 Architecture
5 Algorithm
6 Results and Discussion
7 Conclusion
References
Preface
Contents
Editors and Contributors
Implementation of a PID Controller for Autonomous Vehicles with Traffic Light Detection in CARLA
1 Introduction
2 Related Work
3 Methodology
4 Implementation of PID Controller
5 Traffic Light Detection
6 Combined Framework
7 Result and Discussion
7.1 PID Controller
8 Traffic Light Detection
9 Combined Framework
10 Conclusion
References
Binary Classification for High Dimensional Data Using Supervised Non-parametric Ensemble Method
1 Introduction
2 Implementation
3 Results
3.1 Analysis of Data
3.2 Precision and Recall
3.3 F-Score
3.4 Receiver Operating Characteristic
4 Conclusion
References
Deep Linear Discriminant Analysis with Variation for Polycystic Ovary Syndrome Classification
1 Introduction
2 Methodology
2.1 First Phase
2.2 Second Phase
3 Results
3.1 Accuracy and Loss for First Phase
3.2 Accuracy and Loss for Second Phase
3.3 Precision
3.4 Recall
3.5 F-Score
4 Conclusion
References
Improved Helmet Detection Model Using YOLOv5
1 Introduction
2 Literature Survey
3 Architecture of YOLOv5
4 Proposed System
5 Results and Discussion
5.1 Experimental Environment
5.2 Dataset
5.3 Results
6 Conclusion
References
Stock Market Trend Prediction Along with Twitter Sentiment Analysis
1 Introduction
2 Literature Survey
3 Dataset
3.1 Yahoo Finance
3.2 Twitter Sentiment Analysis
3.3 Standardization
4 Work Flow Diagram
5 Methodology
5.1 Stock Trend Predication
5.2 Twitter Sentiment Analysis
6 Experimental Results
7 Conclusion
References
A Study on MQTT Protocol Architecture and Security Aspects Within IoT Paradigm
1 Introduction to MQTT Protocol
1.1 MQTT Protocol Architecture
1.2 Why MQTT?
2 Security Aspects Within MQTT
2.1 Identity
2.2 Authentication
2.3 Authorization
3 X.509 Client Certificate Authentication Within MQTT
3.1 Certificate Provisioning
3.2 Certification Revocation List
3.3 X.509 Certificate for Authentication and Authorization
3.4 OAuth2.0 Within MQTT
4 Payload Encryption
4.1 E2E (End-To-End)Encryption
4.2 Client to Broker Encryption
5 Conclusion
References
Compartive Analysis of Different Block Chain Technology to Improve the Security in Social Network
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Security Process Using SNS Model Dapps, & BCOSN's Architecture
5 Comparison of Different Security Features in Blockchain for Social Network
6 Conclusion
References
Euphonia: Music Recommendation System Based on Facial Recognition and Emotion Detection
1 Introduction
2 Literature Survey
3 Problem Statement
4 Architecture
5 Algorithm
6 Results and Discussion
7 Conclusion
References