Linked e-resources

Details

Intro
Preface
Contents
Editors and Contributors
Image Processing-Based Solution to Repel Crop-Damaging Wild Animals
1 Introduction
2 Literature Review
3 Methodology
3.1 Identifying Types of Animals that Come to Damage the Crop During Daytime and Nighttime Using Image Processing
3.2 Analyzing the Behavior of Animals Who are Near or Approaching Crops
3.3 Identifying Animals that Come to Damage the Crop Using Sounds they Make
4 Results and Discussion
4.1 Identifying Types of Animals that Come to Damage the Crop During Daytime Using Image Processing
4.2 Identifying Types of Animals that Come to Damage the Crop During Daytime Using Image Processing
4.3 Analyzing the Behavior of Animals Who Are Near or Approaching Crops
4.4 Identifying Animals that Come to Damage the Crop Using Sounds they Make
5 Conclusion and Future Work
References
SDN Framework for Efficient Latency-Aware Topology Discovery in ISTN
1 Introduction
1.1 Outline of SDN-Based ISTN System
1.2 Outline of IEEE 802.1Q-TSN System
2 Literature Review
2.1 Motivation
3 Proposed Method
4 Implementation
4.1 Topology Setup
5 Evaluation Results and Discussions
6 Conclusion
References
Recommendation System Based on Clustering Techniques Using Collaborative Filtering Method
1 Introduction
1.1 Implicit Reaction
1.2 Explicit Reaction
1.3 Types of Filtering
2 Related Work
3 Methods
4 Conclusion
References
Compartmented Proactive Secret Sharing Scheme
1 Introduction
2 Background
2.1 CSSS
3 Compartmented Proactive Secret Sharing Scheme
3.1 Share Distribution
3.2 Commitments
3.3 Share Verification
3.4 Compartment Number Computation
3.5 Share Renewal
3.6 Secret Reconstruction
4 Correctness and Security Analysis of the Scheme.

4.1 Correctness and Security Analysis for Compartment Number
4.2 Correctness and Security Analysis for Share Verification
4.3 Correctness and Security Analysis for Share Renewal
5 Conclusion
References
DevOps Challenges and Practices in Software Engineering
1 Introduction
1.1 Problem with Existing Method
1.2 Pre DevOps
1.3 The Rise of DevOps
2 DevOps Practices
2.1 Core Practice of DevOps
2.2 DevOps Strategy and Goals
3 Challenges in DevOps
4 Conclusion
References
The Effects of Climate Change on Crop Yield
1 Introduction
2 Literature Review
3 Proposed System
3.1 Model Architecture
3.2 Training Configuration
3.3 Dataset
4 Experiments
4.1 Metrics
4.2 Linear Regressor
4.3 Support Vector Regressor
4.4 Random Forest Regressor
4.5 Decision Tree Regressor
4.6 ANN
4.7 Autoencoder ANN
5 Results and Analysis
6 Conclusion
References
Finetuned-VGG16 CNN Model for Tissue Classification of Colorectal Cancer
1 Introduction
2 Literature Review
3 Materials and Methods
3.1 Dataset
3.2 Preprocessing of Dataset
3.3 Finetuned VGG 16
4 Results and Discussion
5 Conclusion
References
Effective Heart Disease Prediction and Classification Using Intelligent System
1 Introduction
2 Literature Survey
3 Heart Failure Prediction Using IBM Auto AI Service
3.1 Creation of IBM Services
3.2 Creation of Watson Studio Service
3.3 Creation of IBM Node-Red Service
3.4 Building Machine Learning Model to Predict Heart Failure
3.5 Run Auto AI Experiment
3.6 Building Pipelines
3.7 Save Watson ML Model
3.8 Deploy the Model
4 Experimental Setup
5 Results and Discussions
6 Conclusion and Future Work
References
A Machine Learning Approach for Aeroponic Lettuce Crop Growth Monitoring System
1 Introduction.

2 Related Work
2.1 Methods for Estimating the Outcome of a Harvest
2.2 Crop Varieties that Can be Grown
2.3 Machine Learning's Emergence in Yield Prediction
2.4 The Efficiency of Yield-Affecting Factors
3 Materials and Methods
3.1 Input Parameters
3.2 Correlogram of the Input Variables
4 Proposed Model
4.1 Data Pre-processing
4.2 Splitting of the Dataset
4.3 Training Model
5 Results and Discussions
5.1 Comparative Analysis
5.2 Execution Time of the Model
6 Conclusion
7 Future Scope
References
A Novel Approach for Privacy Preserving Technique in IoT Fog and Cloud Environment
1 Introduction
2 Literature Survey
3 Different Approaches for Achieving Data Confidentiality, Integrity, and Verifiability
3.1 Approach 1
3.2 Approach 2
3.3 Approach 3
4 Results
4.1 Approach 1
4.2 Approach 2
4.3 Approach 3
5 Conclusion
References
IOT-Based Fertilizer Recommendation System Using a Hybrid Boosting Algorithm
1 Introduction
1.1 Sensors
2 Related Work
3 Proposed Work
3.1 Dataset Description
3.2 Preprocessing
3.3 Hypertuning
3.4 Classification
3.5 Test Dataset
3.6 Recommendation
4 Result Analysis
5 Conclusion
References
Development of a System for Controlling IoT Devices Using Gaze Tracking
1 Introduction
2 Related Work
2.1 Devices
2.2 Libraries
2.3 Gaze Tracking Solutions
3 Methodology
4 Proposed Work
4.1 First Increment
4.2 Second Increment
4.3 Third Increment
4.4 Fourth Increment
5 Integrated Prototype Testing
5.1 Planning
5.2 Testing
5.3 Results
6 Result Analysis
7 Conclusions
References
Towards Human-Like Robotic Grasping for Industrial Applications Using Computer Vision
1 Introduction
2 Background
3 Methodology
4 Results
5 Conclusion
References.

An Extensive Study on Unattended Object Detection in Video Surveillance
1 Introduction
1.1 Scope
1.2 Purpose
1.3 Problem Statement
2 Comparative Study About Various Algorithms for Object Detection
3 Literature Survey
4 Proposed Model
5 Conclusion
References
Analysis of Digital Data on Social Network TikTok During COVID-19
1 Introduction
2 Methodology
3 Results
3.1 Users' Motivations for Using TikTok
3.2 TikTok as a Tool for Education
3.3 Presence of Media and Journalists in TikTok
3.4 Fact-Checking in TikTok
4 Discussion
5 Conclusions
References
An Hybrid Edge Algorithm for Vehicle License Plate Detection
1 Introduction
2 Literature Survey
3 Proposed Canny Edge Detection Algorithm for Image Classification
3.1 Canny Edge Detection Algorithm for Image Classification
4 Results and Experimental Images
5 Conclusion
References
Gesture Controlled Drone Swarm System for Violence Detection Using Machine Learning for Women Safety
1 Introduction
2 Literature Review
3 Proposed System
3.1 Algorithm
4 Implementation and Results
4.1 Autonomous Drones
4.2 Gesture Recognition
4.3 Mobile Application
4.4 Drone Control Software
4.5 Drone Swarm System
5 Conclusion and Future Work
References
Healthcare System Modeling and Security Engineering
1 Introduction
2 Healthcare Attack
3 Potential Attacks on IoT Health Care System
3.1 Commercial Attack Types
3.2 Preventive Measures
4 Cyber Physical Healthcare System
4.1 User Services
4.2 Expect Management
4.3 Trend Analysis
4.4 Entitlement Enforcement
5 Threat Modeling of an IoT System
5.1 Identifying the Assets
5.2 System Architecture Overview
5.3 Decomposition of an IoT System
5.4 Documentation of Threat Types
6 IoT Security Lifecycle and System Design.

Browse Subjects

Show more subjects...

Statistics

from
to
Export