Emerging Trends in Computer Science and Its Application
eBook - ePub

Emerging Trends in Computer Science and Its Application

  1. 660 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Emerging Trends in Computer Science and Its Application

About this book

The conference brought together a diverse group of scholars, researchers, and industry professionals to engage in meaningful discussions and share insights on cutting-edge trends in artificial intelligence, machine learning, data science, and their multifaceted applications. This collaboration and knowledge exchange fostered an environment of innovation, making the conference a successful and impactful event for all participants. It aimed to highlight these significant advancements and serve as a valuable resource for researchers, academicians, and practitioners who wish to stay informed about the recent innovations and methodologies shaping the landscape of computational intelligence. By showcasing a wide range of research topics and practical implementations, it not only addressed the current challenges but also inspired new ideas and approaches for future research.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Emerging Trends in Computer Science and Its Application by Anurag Tiwari,Manuj Darbari in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover Page
  2. Half Title page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. List of figures
  7. List of tables
  8. Foreword
  9. Preface
  10. Chapter 1 A systematic review on recent controllers for an industrial wastewater treatment plant
  11. Chapter 2 Green SaaS adoption in cloud computing: An investigation into environment sustainability
  12. Chapter 3 Physical layer security in ambient backscatter communication: A review
  13. Chapter 4 Revolutionizing object recognition beyond CNN and YOLO with deep learning breakthrough
  14. Chapter 5 Investigating efficacy of emerging ICTs for the Indian construction sector
  15. Chapter 6 AgriTech: Empowering agriculture through integrated technology
  16. Chapter 7 Online and offline learning in universities: A student's dilemma
  17. Chapter 8 Strengthening UAV network security: Advanced authentication-based intrusion detection systems
  18. Chapter 9 Comparative analysis of wireless routing protocols for security threat—A review
  19. Chapter 10 Cascadability analysis of free space optical wireless data centers
  20. Chapter 11 Wireless network with machine learning and deep learning techniques
  21. Chapter 12 Assessing technology innovation of cellular health
  22. Chapter 13 Optimizing content-based image retrieval: A comparative analysis of classifier ensemble approaches
  23. Chapter 14 Approach to recognize fake news
  24. Chapter 15 Cybersecurity measures for safeguarding medical image data
  25. Chapter 16 Detection of phishing attacks using machine learning
  26. Chapter 17 A comprehensive exploration of aircraft detection in synthetic and satellite images
  27. Chapter 18 Mitigating man-in-the-middle attack in UAV network using authentication mechanism based on chaotic maps
  28. Chapter 19 A comprehensive multi-modal sentiment analysis approach for social media content integration
  29. Chapter 20 A proposed deep learning framework for internet-of-medical things
  30. Chapter 21 Analysis of novel routing protocol to minimize delay in VANET: A comprehensive simulation for VANET
  31. Chapter 22 Securing the secrets of 5G: Mitigating eavesdropping threats and enhancing network integrity
  32. Chapter 23 A comprehensive crop prediction model leveraging optimization algorithms and machine learning classifiers
  33. Chapter 24 Malaria detection using convolutional neural networks: A deep learning approach
  34. Chapter 25 An optimal emergency vehicle path finding mechanism using routing algorithms
  35. Chapter 26 Smart city solutions: Enhancing infrastructure with LoRa multi-hop networks
  36. Chapter 27 Enhancing online customer engagement through strategic optimization: Customized page ranking and analytical insights via web mining techniques
  37. Chapter 28 Towards unbreakable cloud security: Symmetric key cryptography and blockchain synergy
  38. Chapter 29 Neuralink's approach to spinal cord injuries and vision impairment through pioneering brain–machine interfaces
  39. Chapter 30 Honeypots and honeynets: investigating attack vectors
  40. Chapter 31 A review on deep learning frameworks for pose estimation during exercise for rehabilitation
  41. Chapter 32 SwiftScan SpeedPro: OpenCV-powered vehicle speed monitoring
  42. Chapter 33 Hawkeye-intelligent surveillance system
  43. Chapter 34 Sentimental analysis for amazon product review
  44. Chapter 35 Crop recommender system using machine learning approach
  45. Chapter 36 Cloud malware detection using heuristic techniques
  46. Chapter 37 Guarding your home: A seamless Iot-driven security system with high security
  47. Chapter 38 The challenges of enforcing cybercrime laws in the age of E-governance: A literature review
  48. Chapter 39 A exhaustive review on advancements and challenges in low power wireless sensor networks
  49. Chapter 40 Automated personality evaluation of children based on emotional speech
  50. Chapter 41 Redefining human activity recognition with LSTM and GRU networks
  51. Chapter 42 Cybersaferoutes: Protecting IoT networks from hybrid attack with security measures
  52. Chapter 43 Harmful content classification in social media using gated recurrent units and bidirectional encoder representations from transformer
  53. Chapter 44 Detection of missprounciation using deep learning
  54. Chapter 45 IOT-enabled cloud solutions for reliable health monitoring
  55. Chapter 46 Detection of melanoma using DenseNet-based adaptive weighted loss function
  56. Chapter 47 Advanced reconfigured solar arrays to attenuate shading loss under partial shading conditions: experimental validation
  57. Chapter 48 Understanding the relationship of quantum mechanics and machine learning
  58. Chapter 49 Employability prediction: A machine learning model for computer science students
  59. Chapter 50 A comprehensive review of innovations in stray cattle detection
  60. Chapter 51 Enhancing emotional insight: NLP powered sentiment analysis
  61. Chapter 52 Decision-making using argumentation mining framework on English text
  62. Chapter 53 Potato leaf disease classification and prediction using CNN
  63. Chapter 54 Exploring the impact of integrated technological solutions on student engagement administrative efficiency
  64. Chapter 55 Early stage lung cancer detection using RESNET
  65. Chapter 56 Cryptographic image concealment with neural networks
  66. Chapter 57 An efficient CNN-based approach for automated animal intrusion detection
  67. Chapter 58 Next-generation smart cities: Integrating blockchain, IoT, deep learning, and Dingo optimization
  68. Chapter 59 Intelligent diagnosis of diabetic retinopathy: Leveraging machine and deep learning
  69. Chapter 60 Digital dwelling hub: Revolutionizing real estate with AR and smart home integration
  70. Chapter 61 Mobilenet-v3: A comprehensive survey of object detection algorithms using CNN
  71. Chapter 62 Rainstorm prediction system
  72. Chapter 63 Advancements in assistive technologies for web accessibility: A systematic review
  73. Chapter 64 Predicting bitcoin prices: A machine learning approach for accurate forecasting
  74. Chapter 65 A comprehensive review on multi disease prediction web app: QuadraDiag
  75. Chapter 66 A comprehensive review on tomato plant disease detection using convolutional neural network
  76. Chapter 67 Building a decentralized non-fungible token marketplace: Leveraging blockchain technology for secure digital asset exchange
  77. Chapter 68 CollegeGo: leveraging alumni data for improved college placements
  78. Chapter 69 An in-depth review of AI/ML techniques in emotion-preserving multilingual video translation for practical crosscultural communication
  79. Chapter 70 Data analysis for revenue optimization in the hospitality sector
  80. Chapter 71 Technological solutions for E-waste management and disposal
  81. Chapter 72 Comparative study of various transformation techniques in image fusion
  82. Chapter 73 Blockchain transaction processing: challenges and resolutions
  83. Chapter 74 Fake social media profile detection using machine learning
  84. Chapter 75 Prompted LLMs as chatbot modules for long open-domain conversation
  85. Chapter 76 Smart locking system using machine learning technique
  86. Chapter 77 Mind Matters: Psychological analysis using CBT Chatbot
  87. Chapter 78 Optimizing patient outcomes through integrated health analysis and management strategies
  88. Chapter 79 Data leakage detection
  89. Chapter 80 Vision-based lip-reading system using deep learning
  90. Chapter 81 Reform dentistry: A web-based platform for revolutionizing dentistry
  91. Chapter 82 AI genius: Integrated intelligence platform
  92. Chapter 83 Agriculture: Soil analysis for suitable crop and fertilizer prediction
  93. Chapter 84 Comprehensive examination of system surveillance method employing keystrokes logging technology
  94. Chapter 85 Health prediction application: A comprehensive literature review
  95. Chapter 86 E-portal for case management and hearing
  96. Chapter 87 Enhancing electoral processes: The role of “Smart Voting Systems”
  97. Chapter 88 Advancements in rainfall prediction systems: A comprehensive review of techniques and models
  98. Chapter 89 FindServ
  99. Chapter 90 IoT devices security against common threats
  100. Chapter 91 Predict-a-disease: Survey
  101. Chapter 92 Securing MANETs against black hole attacks: A novel approach using secure knowledge algorithm
  102. Chapter 93 AI-powered navigation of the digital frontier: Analyzing modern trends in digital marketing and their influence on consumer purchasing patterns with special reference to pharma industry
  103. Chapter 94 Fake video detection
  104. Chapter 95 Olympic odyssey: Tracing 120 years of athletes sports, and global influence
  105. Chapter 96 Crop prediction system using machine learning
  106. Chapter 97 A mobile application to assist the women in gestation period
  107. Chapter 98 I-tourism planner
  108. Chapter 99 Blockchain based E-vault system for legal records
  109. Chapter 100 Anomaly detection in wireless sensor network
  110. Chapter 101 Enhancing fault tolerance in distributed systems through machine learning techniques
  111. Chapter 102 Predicting breast cancer risk: A machine learning approach
  112. Chapter 103 A multi-objective optimization algorithm for fog computing with trust and energy awareness
  113. Chapter 104 Pediatric brain tumor detection in MRI: A machine learning perspective
  114. Chapter 105 Enhancing trust in the social internet of things (SIoT): A comprehensive review
  115. Chapter 106 Fostering plant health: Utilizing YOLOv7 framework to identify leaf diseases
  116. Chapter 107 A review on-malignancy detection in lung nodules using CNN
  117. Chapter 108 Next-generation parking system using IoT
  118. Chapter 109 A review on smart health diagnosis
  119. Chapter 110 Android app threat analysis techniques: A review
  120. Chapter 111 AI Powered Legal Documentation Assistant
  121. Chapter 112 Ideas to boost fitness activities and assist in keeping fit
  122. Chapter 113 Using existing CCTV network for crowd management, crime prevention and work monitoring: A novel approach for object detection