Computer Science Engineering and Emerging Technologies
eBook - ePub

Computer Science Engineering and Emerging Technologies

Proceedings of ICCS 2022

  1. 744 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Computer Science Engineering and Emerging Technologies

Proceedings of ICCS 2022

About this book

The year 2022 marks the 100th birth anniversary of Kathleen Hylda Valerie Booth, who wrote the first assembly language
and designed the assembler and auto code for the first computer systems at Birkbeck College, University of London.
She helped design three different machines including the ARC (Automatic Relay Calculator), SEC (Simple Electronic
Computer), and APE(X). School of Computer Science and Engineering, under the aegis of Lovely Professional University,
pays homage to this great programmer of all times by hosting "BOOTH100"—6th International Conference on Computing
Sciences.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Computer Science Engineering and Emerging Technologies by Rajeev Sobti,Rachit Garg,Ajeet Kumar Srivastava,Gurpeet Singh Shahi in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover Page
  2. Half Title Page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. List of Figures
  7. List of Tables
  8. Message from the Honourable Chancellor, LPU
  9. Message from the Worthy Pro-Chancellor, LPU
  10. Message from the Respected Pro-Vice Chancellor, LPU
  11. Message From the Executive Dean, Division of Research and Development
  12. Message from the Head of the School School of Computer Science and Engineering, LPU
  13. Message from the Program Chair KILBY 100 ICCS 2022
  14. Message from Conference Convenor
  15. Message from Conference Convenor
  16. About the Editors
  17. Chapter 1 Potentiality of IOT in Resolving Failed Copulation
  18. Chapter 2 A Comprehensive Review on Blockchain: Types, Techniques, Consensus Algorithms and Platforms
  19. Chapter 3 Biometrics and its Application in Parkinson's Disease Detection
  20. Chapter 4 Alzeimer's Detection Using Deep Learning: A Review
  21. Chapter 5 Survey on Heart Diseases Prediction Using Machine Learning Algorithms
  22. Chapter 6 Detection of Brain Tumor Using Machine Learning: An Overview
  23. Chapter 7 Development of Future Wireless Communication-based IoT System
  24. Chapter 8 A Comprehensive Review of Different Clustering Algorithms for IoT-Based Networks
  25. Chapter 9 Review Paper on Real-time Speech Recognition for Augmentation of Class Room Learning
  26. Chapter 10 Applied Cryptography in Banking and Financial Services for Data Protection
  27. Chapter 11 A Study to Investigate the Methods of Enhancing Database Security in Web-based Environments through Big Data
  28. Chapter 12 Challenges in Security and Privacy in Wireless Networks and Mitigation Methods Using Blockchain Technology
  29. Chapter 13 Prediction of Suicide Ideation for Military Personnel Based on Deep Learning: A Review
  30. Chapter 14 Machine Translation Models and Named Entity Recognition: Comprehensive Study
  31. Chapter 15 IOT-based Security and Surge Rescue—A Modish Smart Bus System
  32. Chapter 16 A Flexible Blockchain-dependent IoT Communication Framework
  33. Chapter 17 The Emerging Role and Application of Adopting Revolutionary Internet of Things (IoT) for Future Technology Sustainability
  34. Chapter 18 Forecasting of Stock Market Data Frame Analysis Using Relative Strength Index (RSI) and Deep Learning
  35. Chapter 19 Enablement of Blockchain in Healthcare: A Systematic Review
  36. Chapter 20 An Empirical Analysis in Understanding the Transformative Effect of Application of Internet of Things in Business and Society
  37. Chapter 21 MORSE: Social Networking Platform that Enables Connecting with Alumni, Teachers, and Students
  38. Chapter 22 Detailed Investigation of Influence of Internet of Things (IoT) and Big Data on Digital Transformation in Marketing 22
  39. Chapter 23 Internet of Things (IoT)-based Smart Cities Help Achieving Sustainable Development Goals
  40. Chapter 24 Logo Validation Using Unsupervised Machine Learning Technique—A Blockchain-based Approach
  41. Chapter 25 Detailed Analysis of Machine Learning and Deep Learning Technologies for Web Security
  42. Chapter 26 A Detailed Investigation of Artificial Intelligence Applications in Cyber Security
  43. Chapter 27 Use of Blockchain Technologies Against Cyber Security Threats and Increase IT Industry Security
  44. Chapter 28 Examining Cyber Security Curricular Frameworks for Business Schools Using Artificial Intelligence 28
  45. Chapter 29 Weighted Ensemble Classification System for Prediction of Diabetes Mellitus
  46. Chapter 30 Applications of Internet of Things (IoT) in Maintaining Privacy and Security of Smart Cities
  47. Chapter 31 EMG Muscular Disorder Classification Using Motor Neuron Signals
  48. Chapter 32 Role of IoT and Cloud in Smart Healthcare Monitoring System for Efficient Resource Utilization
  49. Chapter 33 Challenges Faced in Polygon Clipping Procedures and Visualization Technique in 3D Face Detection: A Comprehensive Review
  50. Chapter 34 Use of IoT and Senso-based Big Data Applications to Develop Future Smart Sustainable Cities
  51. Chapter 35 Dual-Level Encryption for Secure Communication
  52. Chapter 36 A Detailed Investigation of Artificial Intelligence in Economic Growth and Development of Emerging Economies
  53. Chapter 37 Coal and Gangue Positioning and Classification Using Support Vector Machines
  54. Chapter 38 IoT and Its Escalating Security Needs
  55. Chapter 39 Empirical Analysis of Machine Learning (MI) for Big Data and its Applications Using CNN
  56. Chapter 40 Applications of Optical Networking in Enhancing 5G Communications in Smart Cities
  57. Chapter 41 Role of Image Segmentation and Feature Extraction Methods in Cotton Plant Disease Detection
  58. Chapter 42 An Approach to Reconstruct Cervical Spondylosis MRI Image Using Generative Adversarial Networks
  59. Chapter 43 Collective Intelligence in Digital Marketing and Business Decision-making Through Artificial Swarm Intelligence
  60. Chapter 44 The Advancement of Using Internet of Things in Blockchain Applications for Creating Sustainable Environment in the Real Word Scenario
  61. Chapter 45 The Recent Advancements in Security, Privacy and Trust in Mobile and Wireless Communication in the Emerging Economies
  62. Chapter 46 Intelligent Computing Techniques for The House Price Prediction Model: A Review
  63. Chapter 47 An Empirical Evaluation of Machine Learning Image Augmentation Models from a Pragmatic Perspective
  64. Chapter 48 Wireless Network Security: Requirements, Attacks, Vulnerabilities, Security Solutions
  65. Chapter 49 A Systematic Literature Review on Various Methodologies Used from Time to Time for Predicting Rainfall
  66. Chapter 50 Recent Advances in Optical Networks and Their Implications for 5G and Beyond Communications
  67. Chapter 51 Depression Detection Using Artificial Intelligence: A Review
  68. Chapter 52 A Review for Weather Forecasting and Photovoltaic Load Forecasting Systems
  69. Chapter 53 Image Enhancement Using Morphological Techniques
  70. Chapter 54 Efficient Novel Cryptographic Algorithm to Improve Security: A Review
  71. Chapter 55 A Study on Blockchain Technology for the Future E-Voting Systems
  72. Chapter 56 Implementation of Waste Management, Renewable Energy and Green Buildings in Smart Cities for Quality Life
  73. Chapter 57 A Review—Rice Plant Disease Detection Using Machine Learning Algorithms
  74. Chapter 58 Enhancement of Key Management System in Cloud Environment
  75. Chapter 59 A Comparative Study of Load Balancing Algorithms in Cloud Computing
  76. Chapter 60 Examining How Human Perceptions and Abilities are Used in Cryptography
  77. Chapter 61 Online Cab Booking System Uber Clone Using Next JS
  78. Chapter 62 Contemporary Software Cloning Detection Methods: Meta-Analyses
  79. Chapter 63 Deep Learning for Aquatic Object Recognition in Seafloor
  80. Chapter 64 Ensembling Intelligent Models to Design an Efficient System for Prediction of Pulmonary Tuberculosis
  81. 65 Evaluation of Machine Learning Classifiers for Multiple Disease Prediction
  82. Chapter 66 Machine Learning-based Approaches to Biosignal Processing
  83. Chapter 67 A Neoteric Review of Story Point Estimation in Agile-Scrum Projects Using Machine and Deep Learning Algorithms
  84. Chapter 68 Image-Based Dragonfly Classification Using Capsule Networks
  85. Chapter 69 Empirical Analysis of VLSI Implementation for Improving Signal Processing System
  86. Chapter 70 Exploratory Data Analysis of Heart Disease Using Machine Learning
  87. Chapter 71 Recommending Future Collaborations Using Feature Selection Technique for Scholarly Network
  88. Chapter 72 Applications of SPT (Squeeze Pack and Transfer) and Other Lossless Compression Algorithms in IoT: A Comparative Study
  89. Chapter 73 Call Centre Resource Optimization Using Applied Operations Research: A Linear Programming Approach
  90. Chapter 74 Role of Machine Learning in Developing the Effectiveness of Digital Marketing Aspects in Emerging Economies
  91. Chapter 75 Leveraging Cyber Hunt and Investigation on Endpoints Using Elastic XDR/EDR
  92. Chapter 76 An examination of Cloud Network Security Issues and Potential Solutions
  93. Chapter 77 Blockchain Scalability Analysis on Throughput and Long Transaction Time
  94. Chapter 78 Approach Based on Machine Learning to Predict People's Intention to Use Mobile Learning Platforms
  95. Chapter 79 Epileptic Seizure Detection and Classification Based on EEG Signals Using Particle Swarm Optimization and Whale Optimization Algorithm
  96. Chapter 80 Coding Sketch: Turn Your Sketch Designs into Code
  97. Chapter 81 Automatic Error Detection Using Python
  98. Chapter 82 Emerging Cryptographic Techniques
  99. Chapter 83 Mixed Language Text Classification Using Machine Learning: Cyberbullying Detection System
  100. Chapter 84 A Systematic Review on Thalassemia Using Neural Network Techniques
  101. Chapter 85 Cryptographic Applications in Blockchain
  102. Chapter 86 Use of Blockchain Technology Toward Green IoT and its Impact on Smart City Development
  103. Chapter 87 Automated Smart Agriculture Using Machine Learning
  104. Chapter 88 A Review on Classification of Covid-19 and Pneumonia Disease Using Machine Learning
  105. Chapter 89 A Systematic Review on Machine Learning-based Fraud Detection System in E-Commerce
  106. Chapter 90 A systematical Reviewing of Prediction Models During Aggravation of Asthma and its Validation
  107. Chapter 91 Cyber Crimes: An Interdisciplinary Perspective
  108. Chapter 92 Blockchain Based Framework for E-Governance: A Review of the Literature
  109. Chapter 93 Segmentation of Skin Cancer Images Applying Background Subtraction with Midpoint Analysis
  110. Chapter 94 Computational Social Interactions and Trust Models in Virtual Societies
  111. Chapter 95 Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues
  112. Chapter 96 A Survey on User Stories Using NLP for Agile Development
  113. Chapter 97 Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues
  114. Chapter 98 Architectural Sustainability in Computer Design: A mirror Review
  115. Chapter 99 Comprehensive Analysis of IEEE 802.11 WLAN Performance Optimization Strategies
  116. Chapter 100 Review Paper for Detection and Prevention of Cyber Attacks
  117. Chapter 101 A Concise Review on the Vision-Based Moving Vehicle Detection System by Deep Learning Approaches
  118. Chapter 102 Automation and Robotics in Healthcare Industry for Monitoring Patients in Critical Care Unit
  119. Chapter 103 A Review of Various System-on-Chip Technologies for Multiprocessor Systems
  120. Chapter 104 Detailed Investigation of Role of Machine Learning Techniques in Agricultural Development in Future
  121. Chapter 105 Emerging Microfluidic Devices and Fabrication Methods in Various Domains
  122. Chapter 106 Computation of Cuckoo Search Algorithm and its Implementation in Active Noise Cancellation
  123. Chapter 107 Development of Evaluation Protocol for Anti-Forensics Encryption Tool Using Software Reverse Engineering Techniques
  124. Chapter 108 Latest Trends in Non-Destructive Document Examination Using Hyperspectral Imaging
  125. Chapter 109 Adaptive Cloud Service Optimization Using Drone Swarm Methodology
  126. Chapter 110 Efficient Security Enhancement of Key Management System (KMS) in Cloud Environment
  127. Chapter 111 Machine Learning-based Cloud Optimization System
  128. Chapter 112 Multi Objective Eagle Optimization Feature Selection for Cloud Systems
  129. Chapter 113 The impact of Anti-forensic Techniques on Forensic Investigation Challenges