Linked e-resources
Details
Table of Contents
Intro
Preface
Contents
Editors and Contributors
Web Application for Monitoring Foundry Processes Using IoT
1 Introductıon
1.1 Web Application
1.2 JavaScript
1.3 CSS
1.4 JSX
2 Methods and Materıal
2.1 Objectives
2.2 Existing System
2.3 Requirement Specifications
2.4 Functional Requirements
2.5 Non-functional Requirements
2.6 Hardware and Software Specifications
3 Design Details
3.1 Data Flow Diagram
3.2 Use Case Diagram
3.3 Activity Diagram
4 Results
4.1 System Design
5 Drawbacks in the Current System
6 Conclusion and Future Scope
References
BlueKei as an Example of Technology-Based Efficient and Cost-Effective Production Processes
1 Introduction
2 Literature Review
3 Research Objective
3.1 Research Methodology
3.2 Findings
4 Conclusion and Recommendations
References
Plant Disease Detection with Learning-Based Models
1 Introduction
1.1 Literature Survey
2 Proposed Methodology
2.1 VGG19 Model
2.2 14DCNN Model
3 Results and Discussion
3.1 Dataset Curation
3.2 Data Augmentation
3.3 Model Accuracy
3.4 Training/Testing of Dataset
4 Conclusions
References
A Bibliometric Analysis of Artificial Intelligence and Human Resource Management
1 Introduction
2 Methodology
2.1 Search Criteria
3 Result and Analysis
3.1 Analysis of Citations (Highly Cited Papers and Authors)
3.2 Co-Authorship Network Map
3.3 Intercountry Co-authorship Map
4 Keyword Co-occurrence Map
5 Implications
6 Limitations of the Study
References
A Review on Verifiable Image Licensing Approaches
1 Introduction
1.1 Organization of the Paper
2 Literature
2.1 Cryptography-Based Image Authentication
2.2 Admissible Image Processing
2.3 Implementation and Testing
2.4 Scalability of Multi-person Authorization
3 Analysis
4 Conclusion
References
A Review on Multimodal Face Anti-Spoofing in Multi-layer Environment
1 Introduction
1.1 Organization of the Paper
2 Literature
2.1 Face Anti-Spoofing
2.2 Multi-modal Face Anti-Spoofing
2.3 Patch-Based Face Anti-spoofing
2.4 Conv-MLP
2.5 Patch Generation and Multimodal Fusion
2.6 Moat Loss
3 Analysis
4 Conclusion
References
A Review on Quantum Blockchain Based Consensus Mechanism Approaches
1 Introduction
1.1 Organization of Paper
2 Literature
2.1 Brief Info about Blockchain
2.2 Brief Info about Quantum Blockchain
3 Analysis
4 Conclusion
References
A Review on Poligraph: System for False News Detection
1 Introduction
1.1 Organization of the Paper
2 Literature
2.1 Detection of False News
2.2 Byzantine Fault Tolerance
2.3 Blockchains
3 Analysis
4 Conclusion
References
A Secure and Practical Scientific Computation Outsourcing Application in Cloud Computing
1 Introduction
2 Theoretical Background
2.1 Power-Iterative Method
Preface
Contents
Editors and Contributors
Web Application for Monitoring Foundry Processes Using IoT
1 Introductıon
1.1 Web Application
1.2 JavaScript
1.3 CSS
1.4 JSX
2 Methods and Materıal
2.1 Objectives
2.2 Existing System
2.3 Requirement Specifications
2.4 Functional Requirements
2.5 Non-functional Requirements
2.6 Hardware and Software Specifications
3 Design Details
3.1 Data Flow Diagram
3.2 Use Case Diagram
3.3 Activity Diagram
4 Results
4.1 System Design
5 Drawbacks in the Current System
6 Conclusion and Future Scope
References
BlueKei as an Example of Technology-Based Efficient and Cost-Effective Production Processes
1 Introduction
2 Literature Review
3 Research Objective
3.1 Research Methodology
3.2 Findings
4 Conclusion and Recommendations
References
Plant Disease Detection with Learning-Based Models
1 Introduction
1.1 Literature Survey
2 Proposed Methodology
2.1 VGG19 Model
2.2 14DCNN Model
3 Results and Discussion
3.1 Dataset Curation
3.2 Data Augmentation
3.3 Model Accuracy
3.4 Training/Testing of Dataset
4 Conclusions
References
A Bibliometric Analysis of Artificial Intelligence and Human Resource Management
1 Introduction
2 Methodology
2.1 Search Criteria
3 Result and Analysis
3.1 Analysis of Citations (Highly Cited Papers and Authors)
3.2 Co-Authorship Network Map
3.3 Intercountry Co-authorship Map
4 Keyword Co-occurrence Map
5 Implications
6 Limitations of the Study
References
A Review on Verifiable Image Licensing Approaches
1 Introduction
1.1 Organization of the Paper
2 Literature
2.1 Cryptography-Based Image Authentication
2.2 Admissible Image Processing
2.3 Implementation and Testing
2.4 Scalability of Multi-person Authorization
3 Analysis
4 Conclusion
References
A Review on Multimodal Face Anti-Spoofing in Multi-layer Environment
1 Introduction
1.1 Organization of the Paper
2 Literature
2.1 Face Anti-Spoofing
2.2 Multi-modal Face Anti-Spoofing
2.3 Patch-Based Face Anti-spoofing
2.4 Conv-MLP
2.5 Patch Generation and Multimodal Fusion
2.6 Moat Loss
3 Analysis
4 Conclusion
References
A Review on Quantum Blockchain Based Consensus Mechanism Approaches
1 Introduction
1.1 Organization of Paper
2 Literature
2.1 Brief Info about Blockchain
2.2 Brief Info about Quantum Blockchain
3 Analysis
4 Conclusion
References
A Review on Poligraph: System for False News Detection
1 Introduction
1.1 Organization of the Paper
2 Literature
2.1 Detection of False News
2.2 Byzantine Fault Tolerance
2.3 Blockchains
3 Analysis
4 Conclusion
References
A Secure and Practical Scientific Computation Outsourcing Application in Cloud Computing
1 Introduction
2 Theoretical Background
2.1 Power-Iterative Method