
eBook - ePub
Computer Science Engineering and Emerging Technologies
Proceedings of ICCS 2022
- 744 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
Computer Science Engineering and Emerging Technologies
Proceedings of ICCS 2022
About this book
The year 2022 marks the 100th birth anniversary of Kathleen Hylda Valerie Booth, who wrote the first assembly language
and designed the assembler and auto code for the first computer systems at Birkbeck College, University of London.
She helped design three different machines including the ARC (Automatic Relay Calculator), SEC (Simple Electronic
Computer), and APE(X). School of Computer Science and Engineering, under the aegis of Lovely Professional University,
pays homage to this great programmer of all times by hosting "BOOTH100"—6th International Conference on Computing
Sciences.
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Computer Science Engineering and Emerging Technologies by Rajeev Sobti,Rachit Garg,Ajeet Kumar Srivastava,Gurpeet Singh Shahi in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.
Information
Table of contents
- Cover Page
- Half Title Page
- Title Page
- Copyright Page
- Contents
- List of Figures
- List of Tables
- Message from the Honourable Chancellor, LPU
- Message from the Worthy Pro-Chancellor, LPU
- Message from the Respected Pro-Vice Chancellor, LPU
- Message From the Executive Dean, Division of Research and Development
- Message from the Head of the School School of Computer Science and Engineering, LPU
- Message from the Program Chair KILBY 100 ICCS 2022
- Message from Conference Convenor
- Message from Conference Convenor
- About the Editors
- Chapter 1 Potentiality of IOT in Resolving Failed Copulation
- Chapter 2 A Comprehensive Review on Blockchain: Types, Techniques, Consensus Algorithms and Platforms
- Chapter 3 Biometrics and its Application in Parkinson's Disease Detection
- Chapter 4 Alzeimer's Detection Using Deep Learning: A Review
- Chapter 5 Survey on Heart Diseases Prediction Using Machine Learning Algorithms
- Chapter 6 Detection of Brain Tumor Using Machine Learning: An Overview
- Chapter 7 Development of Future Wireless Communication-based IoT System
- Chapter 8 A Comprehensive Review of Different Clustering Algorithms for IoT-Based Networks
- Chapter 9 Review Paper on Real-time Speech Recognition for Augmentation of Class Room Learning
- Chapter 10 Applied Cryptography in Banking and Financial Services for Data Protection
- Chapter 11 A Study to Investigate the Methods of Enhancing Database Security in Web-based Environments through Big Data
- Chapter 12 Challenges in Security and Privacy in Wireless Networks and Mitigation Methods Using Blockchain Technology
- Chapter 13 Prediction of Suicide Ideation for Military Personnel Based on Deep Learning: A Review
- Chapter 14 Machine Translation Models and Named Entity Recognition: Comprehensive Study
- Chapter 15 IOT-based Security and Surge Rescue—A Modish Smart Bus System
- Chapter 16 A Flexible Blockchain-dependent IoT Communication Framework
- Chapter 17 The Emerging Role and Application of Adopting Revolutionary Internet of Things (IoT) for Future Technology Sustainability
- Chapter 18 Forecasting of Stock Market Data Frame Analysis Using Relative Strength Index (RSI) and Deep Learning
- Chapter 19 Enablement of Blockchain in Healthcare: A Systematic Review
- Chapter 20 An Empirical Analysis in Understanding the Transformative Effect of Application of Internet of Things in Business and Society
- Chapter 21 MORSE: Social Networking Platform that Enables Connecting with Alumni, Teachers, and Students
- Chapter 22 Detailed Investigation of Influence of Internet of Things (IoT) and Big Data on Digital Transformation in Marketing 22
- Chapter 23 Internet of Things (IoT)-based Smart Cities Help Achieving Sustainable Development Goals
- Chapter 24 Logo Validation Using Unsupervised Machine Learning Technique—A Blockchain-based Approach
- Chapter 25 Detailed Analysis of Machine Learning and Deep Learning Technologies for Web Security
- Chapter 26 A Detailed Investigation of Artificial Intelligence Applications in Cyber Security
- Chapter 27 Use of Blockchain Technologies Against Cyber Security Threats and Increase IT Industry Security
- Chapter 28 Examining Cyber Security Curricular Frameworks for Business Schools Using Artificial Intelligence 28
- Chapter 29 Weighted Ensemble Classification System for Prediction of Diabetes Mellitus
- Chapter 30 Applications of Internet of Things (IoT) in Maintaining Privacy and Security of Smart Cities
- Chapter 31 EMG Muscular Disorder Classification Using Motor Neuron Signals
- Chapter 32 Role of IoT and Cloud in Smart Healthcare Monitoring System for Efficient Resource Utilization
- Chapter 33 Challenges Faced in Polygon Clipping Procedures and Visualization Technique in 3D Face Detection: A Comprehensive Review
- Chapter 34 Use of IoT and Senso-based Big Data Applications to Develop Future Smart Sustainable Cities
- Chapter 35 Dual-Level Encryption for Secure Communication
- Chapter 36 A Detailed Investigation of Artificial Intelligence in Economic Growth and Development of Emerging Economies
- Chapter 37 Coal and Gangue Positioning and Classification Using Support Vector Machines
- Chapter 38 IoT and Its Escalating Security Needs
- Chapter 39 Empirical Analysis of Machine Learning (MI) for Big Data and its Applications Using CNN
- Chapter 40 Applications of Optical Networking in Enhancing 5G Communications in Smart Cities
- Chapter 41 Role of Image Segmentation and Feature Extraction Methods in Cotton Plant Disease Detection
- Chapter 42 An Approach to Reconstruct Cervical Spondylosis MRI Image Using Generative Adversarial Networks
- Chapter 43 Collective Intelligence in Digital Marketing and Business Decision-making Through Artificial Swarm Intelligence
- Chapter 44 The Advancement of Using Internet of Things in Blockchain Applications for Creating Sustainable Environment in the Real Word Scenario
- Chapter 45 The Recent Advancements in Security, Privacy and Trust in Mobile and Wireless Communication in the Emerging Economies
- Chapter 46 Intelligent Computing Techniques for The House Price Prediction Model: A Review
- Chapter 47 An Empirical Evaluation of Machine Learning Image Augmentation Models from a Pragmatic Perspective
- Chapter 48 Wireless Network Security: Requirements, Attacks, Vulnerabilities, Security Solutions
- Chapter 49 A Systematic Literature Review on Various Methodologies Used from Time to Time for Predicting Rainfall
- Chapter 50 Recent Advances in Optical Networks and Their Implications for 5G and Beyond Communications
- Chapter 51 Depression Detection Using Artificial Intelligence: A Review
- Chapter 52 A Review for Weather Forecasting and Photovoltaic Load Forecasting Systems
- Chapter 53 Image Enhancement Using Morphological Techniques
- Chapter 54 Efficient Novel Cryptographic Algorithm to Improve Security: A Review
- Chapter 55 A Study on Blockchain Technology for the Future E-Voting Systems
- Chapter 56 Implementation of Waste Management, Renewable Energy and Green Buildings in Smart Cities for Quality Life
- Chapter 57 A Review—Rice Plant Disease Detection Using Machine Learning Algorithms
- Chapter 58 Enhancement of Key Management System in Cloud Environment
- Chapter 59 A Comparative Study of Load Balancing Algorithms in Cloud Computing
- Chapter 60 Examining How Human Perceptions and Abilities are Used in Cryptography
- Chapter 61 Online Cab Booking System Uber Clone Using Next JS
- Chapter 62 Contemporary Software Cloning Detection Methods: Meta-Analyses
- Chapter 63 Deep Learning for Aquatic Object Recognition in Seafloor
- Chapter 64 Ensembling Intelligent Models to Design an Efficient System for Prediction of Pulmonary Tuberculosis
- 65 Evaluation of Machine Learning Classifiers for Multiple Disease Prediction
- Chapter 66 Machine Learning-based Approaches to Biosignal Processing
- Chapter 67 A Neoteric Review of Story Point Estimation in Agile-Scrum Projects Using Machine and Deep Learning Algorithms
- Chapter 68 Image-Based Dragonfly Classification Using Capsule Networks
- Chapter 69 Empirical Analysis of VLSI Implementation for Improving Signal Processing System
- Chapter 70 Exploratory Data Analysis of Heart Disease Using Machine Learning
- Chapter 71 Recommending Future Collaborations Using Feature Selection Technique for Scholarly Network
- Chapter 72 Applications of SPT (Squeeze Pack and Transfer) and Other Lossless Compression Algorithms in IoT: A Comparative Study
- Chapter 73 Call Centre Resource Optimization Using Applied Operations Research: A Linear Programming Approach
- Chapter 74 Role of Machine Learning in Developing the Effectiveness of Digital Marketing Aspects in Emerging Economies
- Chapter 75 Leveraging Cyber Hunt and Investigation on Endpoints Using Elastic XDR/EDR
- Chapter 76 An examination of Cloud Network Security Issues and Potential Solutions
- Chapter 77 Blockchain Scalability Analysis on Throughput and Long Transaction Time
- Chapter 78 Approach Based on Machine Learning to Predict People's Intention to Use Mobile Learning Platforms
- Chapter 79 Epileptic Seizure Detection and Classification Based on EEG Signals Using Particle Swarm Optimization and Whale Optimization Algorithm
- Chapter 80 Coding Sketch: Turn Your Sketch Designs into Code
- Chapter 81 Automatic Error Detection Using Python
- Chapter 82 Emerging Cryptographic Techniques
- Chapter 83 Mixed Language Text Classification Using Machine Learning: Cyberbullying Detection System
- Chapter 84 A Systematic Review on Thalassemia Using Neural Network Techniques
- Chapter 85 Cryptographic Applications in Blockchain
- Chapter 86 Use of Blockchain Technology Toward Green IoT and its Impact on Smart City Development
- Chapter 87 Automated Smart Agriculture Using Machine Learning
- Chapter 88 A Review on Classification of Covid-19 and Pneumonia Disease Using Machine Learning
- Chapter 89 A Systematic Review on Machine Learning-based Fraud Detection System in E-Commerce
- Chapter 90 A systematical Reviewing of Prediction Models During Aggravation of Asthma and its Validation
- Chapter 91 Cyber Crimes: An Interdisciplinary Perspective
- Chapter 92 Blockchain Based Framework for E-Governance: A Review of the Literature
- Chapter 93 Segmentation of Skin Cancer Images Applying Background Subtraction with Midpoint Analysis
- Chapter 94 Computational Social Interactions and Trust Models in Virtual Societies
- Chapter 95 Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues
- Chapter 96 A Survey on User Stories Using NLP for Agile Development
- Chapter 97 Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues
- Chapter 98 Architectural Sustainability in Computer Design: A mirror Review
- Chapter 99 Comprehensive Analysis of IEEE 802.11 WLAN Performance Optimization Strategies
- Chapter 100 Review Paper for Detection and Prevention of Cyber Attacks
- Chapter 101 A Concise Review on the Vision-Based Moving Vehicle Detection System by Deep Learning Approaches
- Chapter 102 Automation and Robotics in Healthcare Industry for Monitoring Patients in Critical Care Unit
- Chapter 103 A Review of Various System-on-Chip Technologies for Multiprocessor Systems
- Chapter 104 Detailed Investigation of Role of Machine Learning Techniques in Agricultural Development in Future
- Chapter 105 Emerging Microfluidic Devices and Fabrication Methods in Various Domains
- Chapter 106 Computation of Cuckoo Search Algorithm and its Implementation in Active Noise Cancellation
- Chapter 107 Development of Evaluation Protocol for Anti-Forensics Encryption Tool Using Software Reverse Engineering Techniques
- Chapter 108 Latest Trends in Non-Destructive Document Examination Using Hyperspectral Imaging
- Chapter 109 Adaptive Cloud Service Optimization Using Drone Swarm Methodology
- Chapter 110 Efficient Security Enhancement of Key Management System (KMS) in Cloud Environment
- Chapter 111 Machine Learning-based Cloud Optimization System
- Chapter 112 Multi Objective Eagle Optimization Feature Selection for Cloud Systems
- Chapter 113 The impact of Anti-forensic Techniques on Forensic Investigation Challenges