𝔖 Scriptorium
✩   LIBER   ✩

📁

Intelligent Communication Technologies and Virtual Mobile Networks: Proceedings of ICICV 2022 (Lecture Notes on Data Engineering and Communications Technologies, 131)

✍ Scribed by G. Rajakumar (editor), Ke-Lin Du (editor), Chandrasekar Vuppalapati (editor), Grigorios N. Beligiannis (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
807
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10–11, 2022. The book shares knowledge and results in theory, methodology and applications of communication technology and mobile networks. The book covers innovative and cutting-edge work of researchers, developers and practitioners from academia and industry working in the area of computer networks, network protocols and wireless networks, data communication technologies and network security.

✩ Table of Contents


Preface
Acknowledgments
Contents
About the Editors
Implementation of Machine and Deep Learning Algorithms for Intrusion Detection System
1 Introduction
2 Previous Research Works
3 Dataset
4 Proposed Methodology
4.1 Data Preprocessing
4.2 Feature Selection
4.3 Machine Learning
4.4 Deep Learning
4.5 Models
5 Evaluation of Models
6 Results and Discussion
7 Conclusion
References
Selection of a Rational Composition of İnformation Protection Means Using a Genetic Algorithm
1 Introduction
2 Literature Overview and Analysis
3 The Objectives and Aim of the Research
4 Models and Methods
4.1 Formulation of the Problem
4.2 Solution Example
5 Software Implementation of the Model and Computational Experiment
6 Discussion of the Results of the Computational Experiment
7 Conclusions
References
Classification of Breast Cancer Using CNN and Its Variant
1 Introduction
2 Literature Review
3 Proposed Work
3.1 Image Preprocessing
3.2 Augmentation
3.3 Training and Testing the Model
3.4 DenseNet Architecture
4 Algorithms Used
4.1 Histogram Equalization Method
4.2 Adaptive Histogram Equalization
5 Performance Metrics
6 Experimental Setup
6.1 Dataset
6.2 Result and Discussion
7 Conclusion
References
Systematic Approach for Network Security Using Ethical Hacking Technique
1 Introduction
2 Penetration Testing
3 Algorithm
4 Proposed System
5 Result
6 Future Work
7 Conclusion
References
Analysis of Modulation Techniques for Short Range V2V Communication
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 BER Calculation for QPSK Modulation Technique
3.2 BER Calculation for BPSK Modulation Technique
3.3 Calculation of Spectral Efficiency of BPSK:
3.4 Determination of Spectral Efficiency of QPSK
4 Results and Discussion
5 Conclusion
References
Security Requirement Analysis of Blockchain-Based E-Voting Systems
1 Introduction
2 Fundamental Concepts
3 Related Work
4 Requirement Analysis
4.1 Functional Requirements (FR)
4.2 Nonfunctional Requirements (NFR)
4.3 Countermeasures on the Typical Attacks
4.4 Security and Privacy Requirements of Voting
5 Conclusion
References
OTP-Based Smart Door Opening System
1 Introduction
2 Literature Review
3 Existing Method
4 Proposed Method
4.1 Block Diagram
4.2 Flowchart
4.3 Arduino
4.4 LCD Display
4.5 Servomotor
4.6 Hardware Specifications
5 Result and Discussion
6 Conclusion
References
Tourist Spot Recognition Using Machine Learning Algorithms
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Data Augmentation
3.3 Proposed Method
4 Result Analysis
5 Conclusion and Future Work
References
Heart Disease Predictive Analysis Using Association Rule Mining
1 Introduction
1.1 Risk Factors Causing Heart Disease
2 Literature
3 Proposed Method
3.1 Association Rule
4 Experimental Results
5 Conclusion
References
Cluster-Enabled Optimized Data Aggregation Technique for WSN
1 Introduction
2 Related Work
3 Proposed Work
4 Performance Evaluation
5 Conclusion
References
Recreating Poompuhar Ancient History Using Virtual Reality
1 Introduction
2 Literature Survey
3 Proposed Work
4 Technology Used
4.1 Blender
4.2 Unity3D
4.3 Image-Based Rendering
5 Results and Discussion
6 Conclusion
References
Dynamic Energy Efficient Load Balancing Approach in Fog Computing Environment
1 Introduction
2 Related Work
3 Proposed Architecture
3.1 System Design and Model
4 Performance Evaluation Parameters
5 Results and Discussion
6 Conclusion and Future Work
References
Sentiment Analysis Using CatBoost Algorithm on COVID-19 Tweets
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Preprocessing
3.3 Counter Vectorizer
3.4 Classification of Tweets Using CatBoost Algorithm
4 Result Analysis
4.1 Results and Discussion for Multiclass Classification
4.2 Performing Binary Classification on the Dataset
5 Conclusion and Future Work
References
Analysis and Classification of Abusive Textual Content Detection in Online Social Media
1 Introduction
2 Defining Abusive Textual Content
2.1 Classification of Online Abusive Content
3 Approaches for Detecting Textual Abusive Content
4 Abusive Content in Social Media
5 Discussion
6 Conclusion and Future Scope
References
A Survey of Antipodal Vivaldi Antenna Structures for Current Communication Systems
1 Introduction
2 Antipodal Vivaldi Antennas—Performance Enhancement Techniques
3 Recently Proposed AVA Structures
3.1 UWB End-Fire Vivaldi Antenna with Low RCS Capability
3.2 Balanced Antipodal Vivaldi Antenna with Dielectric Director
3.3 High-Gain Antipodal Vivaldi Antenna Surrounded by Dielectric
3.4 Notched Band Vivaldi Antenna with High Selectivity
3.5 Fern Fractal Leaf Inspired Wideband Antipodal Vivaldi Antenna
3.6 Comparison of the AVA Structures in the Literature
4 Conclusion
References
Survey on Wideband MIMO Antenna Design for 5G Applications
1 Introduction
2 5G MIMO Antenna, Classifications and Its Performance Enhancement Techniques
2.1 MIMO Antenna
2.2 Suitable Antennas for 5G Applications
2.3 Antenna Performance Enhancement Techniques
3 MIMO Wideband Antennas
3.1 Wideband Decoupled MIMO Antenna
3.2 PIFA-Pair-Based MIMO Antenna
3.3 Y-Shaped MIMO Antenna
3.4 Highly Isolated MIMO Antenna
3.5 Compact Four-Element Optically Transparent MIMO Antenna
3.6 Comparison of MIMO Wideband Antennas Structures
4 Conclusion
References
Transprecision Gaussian Average Background Modelling Technique for Multi-vehicle Tracking Applications
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Proposed Transprecision Gaussian Adaptive Background Subtraction Methodology
4.1 Vehicle Tracking and Counting Stage
5 Experimental Results and Discussion
6 Conclusion
References
Spam Message Filtering Based on Machine Learning Algorithms and BERT
1 Introduction
2 Related Work
3 Experiment Design
3.1 Pre-processing the Data
3.2 NLP Techniques
3.3 Modelling
4 Results
5 Conclusions
References
Li-Fi: A Novel Stand-In for Connectivity and Data Transmission in Toll System
1 Introduction
2 Principle of Li-Fi
3 State of Art of Li-Fi
3.1 Li-Fi Products
3.2 Li-Fi-Based Smart Cities
4 Comparison of Different Existing Connection Technologies
5 Comparison of Existing Connection Technologies as an Alternative for Conventional Toll System
5.1 Wi-Fi
5.2 Bluetooth
5.3 Zigbee
6 Conventional Toll System
7 Prototype Description
8 System Requirements
8.1 Hardware Requirements
8.2 Software Requirements
9 System Design
9.1 Transmitter Section
9.2 Receiver Section
10 Results
11 Challenges in the Implementation of Li-Fi
12 Conclusion and Future Works
References
Classification of ECG Signal for Cardiac Arrhythmia Detection Using GAN Method
1 Introduction
2 Review of the Literature
3 Methodology
3.1 Baseline Wander
3.2 Support Vector Regression
3.3 Kernel Principal Component Analysis
3.4 General Sparsed Neural Network Classifier (GSNN)
3.5 Generative Adversarial Networks
3.6 ECG Transformation
3.7 MIT-BIH Dataset
4 Experimental Results
5 Conclusion
References
Classifying Pulmonary Embolism Cases in Chest CT Scans Using VGG16 and XGBoost
1 Introduction
2 Related Work
3 Experiment Design
3.1 Dataset
3.2 Creating Train and Test Subsets
3.3 Model Building
3.4 Proposed Methodology
4 Results
5 Conclusion
6 Future Scope
References
User Credibility-Based Trust Model for 5G Wireless Networks
1 Introduction
2 Related Work
3 Proposed User Credibility-Based Trust Model for 5G Networks
3.1 Direct Credibility Degree Calculation
3.2 Indirect Credibility Degree Calculation
3.3 Credibility Value Verification
4 Conclusion
References
Advanced Signature-Based Intrusion Detection System
1 Introduction
2 Literature Survey
3 Proposed Framework
4 Experiment and Results
5 Conclusion
References
A Survey on Detection of Cyberbullying in Social Media Using Machine Learning Techniques
1 Introduction
1.1 Motivation
1.2 Organization
2 Background
2.1 Impact of Cyberbullying
2.2 How to Prevent Cyberbullying
3 Related Work
4 Conclusion and Future Work
References
A Comparison of Similarity Measures in an Online Book Recommendation System
1 Introduction
2 Literature Review
3 Dataset
4 Similarity Measures
5 Conclusion
References
Novel Approach for Improving Security and Confidentiality of PHR in Cloud Using Public Key Encryption
1 Introduction
1.1 Advantages of PHR
1.2 PHR Architecture
2 Related Work
3 Architecture of Proposed Methodology
4 Experimental Setup
4.1 RSA and ECC Encryption Technique
5 Conclusion and Future Work
References
Sentimental Analysis (SA) of Employee Job Satisfaction from Twitter Message Using Flair Pytorch (FP) Method
1 Introduction
2 Literature Review
3 Methodology
3.1 Sentiment Scoring
4 Result and Discussion
5 Conclusion
References
Automatic Detection of Musical Note Using Deep Learning Algorithms
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Feature Extraction
3.3 Music Genre Classification Through Deep Learning Algorithms
4 Result and Discussion
4.1 Model Design Using Neural Network
4.2 Convolutional Neural Network Model
4.3 RNN-LSTM Model
5 Conclusion
References
A Survey of Deep Q-Networks used for Reinforcement Learning: State of the Art
1 Introduction
2 Related Work
2.1 Deep Q-Networks
2.2 Double Deep Q-Networks
2.3 Return-Based Deep Q-Networks
2.4 Other Notable DQN Variants
3 Recent Trends
4 Major Issues and Future Scope
5 Conclusion
6 Conflict of Interest
7 Acknowledgement of Funding
References
Smart Glass for Visually Impaired Using Mobile App
1 Introduction
2 Related Work
3 Proposed Work
3.1 Software Description
3.2 Circuit Diagram
3.3 Hardware Description
3.4 Ultrasonic Sensor
3.5 Node MCU
3.6 ESP8266 Arduino Core
3.7 Buzzer
3.8 Working
4 Results
5 Conclusion
References
An Effective Feature Selection and Classification Technique Based on Ensemble Learning for Dyslexia Detection
1 Introduction
2 Literature Review
3 Proposed Method
4 Dataset
5 Data Preprocessing
6 Features Selection Techniques
7 Role of Ensemble Majority Voting
8 Experimental Setup
9 Results and Discussions
10 Conclusion
References
Spice Yield Prediction for Sustainable Food Production Using Neural Networks
1 Introduction
2 Literature Review
3 Preliminary
3.1 SRN—Simple Recurrent Network
3.2 DNN—Deep Neural Network
3.3 LSTM—Long Short-term Memory
3.4 BiLSTM—Bidirectional Long Short-term Memory
3.5 GRU—Gradient Recurrent Unit
3.6 BPNN—Backpropagation Neural Network
4 Methodology
4.1 Dataset
4.2 Data Integration and Preprocessing
4.3 Data Insights and Feature Importance
5 Result and Discussion
6 Conclusion
References
IoT-Based Smart Healthcare Monitoring System: A Prototype Approach
1 Introduction
2 Literature Review
2.1 An IoT-Cloud-Based Smart Healthcare Monitoring System Using Container-Based Virtual Environment in Edge Device
2.2 IoT-Based Healthcare Monitoring System
2.3 IoT-Based Health Care Monitoring Kit
2.4 An IoT-Cloud-Based Wearable ECG Monitoring System for Smart Healthcare
2.5 Cognitive Smart Healthcare for Pathology Detection and Monitoring
2.6 A Healthcare Monitoring System Using Random Forest and Internet of Things (IoT)
2.7 Enhancing Security Mechanisms for Healthcare Informatics Using Ubiquitous Cloud
2.8 Analysis of Serverless Computing Techniques in Cloud Software Framework
2.9 An Efficient Security Framework for Data Migration in a Cloud Computing Environment
2.10 Soft Computing-Based Autonomous Low Rate DDOS Attack Detection and Security for Cloud Computing
3 Components Used in the IoT-Based Health Monitoring System
3.1 Arduino UNO
3.2 Temperature and Humidity Sensor
3.3 Pulse Oximeter
3.4 Body Position Sensor
4 Proposed Methodology of IoT-Based Healthcare Monitoring System
4.1 Proposed Architecture of IoT-based healthcare monitoring system
4.2 Flowchart of Proposed IoT-Based Healthcare Monitoring System
5 Expected Results and Analysis
6 Conclusion
7 Future Work
References
Sustainability of CEO and Employee Compensation Divide: Evidence from USA
1 Introduction
1.1 The Surge in CEO Compensation
1.2 Compensation: CEO Versus Median Employee
1.3 Profits Used to Buy Back Shares and Drive Stock Prices
2 Literature Review
3 Research Methodology
4 Employee Perception of CEO Salary and Overall Compensation
5 The Way Ahead
References
Exploring the Relationship Between Smartphone Use and Adolescent Well-Being: A Systematic Literature Review
1 Introduction
2 Problem Statement
3 Methodology
4 Findings
5 Discussion
6 Conclusions and Recommendations
References
Smart Contracts-Based Trusted Crowdfunding Platform
1 Introduction
2 Literature Survey
3 Design of the Proposed System
4 Implementation
5 Execution Results and Discussion
6 Conclusion
References
Seizure and Drowsiness Detection Using ICA and ANN
1 Introduction
2 Study and Analysis
3 Methodology
3.1 Input Signal—Preprocessing
3.2 Feature Extraction Using ICA
4 Classification Using ANN
4.1 Convolutional Neural Networks
5 Conclusion and Results
References
Comparative Study of Tomato Crop Disease Detection System Using Deep Learning Techniques
1 Introduction
1.1 Types of Deep Learning
1.2 Convolutional Natural Network
2 Different CNN Architectures Used for Tomato Crop Disease Detection
2.1 AlexNet and VGG16 Net
2.2 GoogleNet
2.3 ResNet
2.4 UNet
2.5 SqueezNet
3 Conclusion
References
A Tool for Study on Impact of Big Data Technologies on Firm Performance
1 Purpose and Objectives
2 Literature Review
3 Methodology
3.1 Development of Web Scraping Tools
4 Results and Findings
4.1 Data Collection
4.2 Data Processing
5 Conclusion and Future Scope
References
Comparative Study of SVM and KNN Machine Learning Algorithm for Spectrum Sensing in Cognitive Radio
1 Introduction
2 Components of Spectrum Sensing
2.1 Radio Spectrum Space
2.2 Challenges in Spectrum Sensing
2.3 Cooperative Spectrum Sensing
3 Related Works
4 Machine Learning Algorithm
4.1 SVM Classifier
4.2 KNN Algorithm
5 Performance Parameters
6 Results and Discussion
7 Conclusion
References
Analysis of Speech Emotion Recognition Using Deep Learning Algorithm
1 Introduction
1.1 Data Processing
1.2 The Process Flow Consists of 4 Stages
1.3 Training and Testing
1.4 Result Analysis
1.5 Implementation of CNN Model Over .wav Files
1.6 CNN Model Training Over Image (.PNG) Data
1.7 The Seven Layer Conv2D Model: Model Summary Is Given Below
1.8 Model Comparison
2 Conclusion
References
Fault-Tolerant Reconfigured FBSRC Topologies for Induction Furnace with PI Controller
1 Introduction
2 Design of Series Resonant Converter
3 Results and Analysis
3.1 S1 Closed in FBSRC
3.2 S1 Closed in HBSRC
3.3 O.C Fault in FBSRC
3.4 S4 Closed in FBSRC as an HBSRC
4 Conclusion
References
Indicators Systematization of Unauthorized Access to Corporate Information
1 Introduction
2 Literature Overview and Analysis
3 Models and Methods
4 Discussion of the Results
5 Conclusions
References
Lo-Ra Sensor-Based Rapid Location Mechanism for Avalanche and Landslide Rescue in Mountains
1 Introduction
2 Methodology
2.1 Design of the Avalanche Rescue System
2.2 Experimental Set-Up
3 Results and Discussion
4 Conclusion
References
A Survey on Blockchain Security Issues Using Two-Factor Authentication Approach
1 Introduction
2 Basic Concept of Blockchain
2.1 Pillars of Blockchain Technology
2.2 Blockchain Architecture
2.3 Transaction Process of Blockchain
2.4 Need of Blockchain
2.5 Types of Blockchain
3 Applications of Blockchain Cryptocurrencies
3.1 Digital Currency: Bitcoin
3.2 Smart Contract: Ethereum
3.3 Hyperledger
4 Safety Issues and Challenges
5 Appearance of User Verification
5.1 Need of Two-Factor Authentication
5.2 Working of Two-FA
5.3 Challenges in Two-FA
6 How Can a Blockchain Transform Two-FA?
7 Conclusion
References
IoT-Based Safe College Management System
1 Introduction
2 Related Works
3 Proposed System
4 Result and Discussion
5 Conclusion
References
A Comprehensive Review on Intrusion Detection in Edge-Based IoT Using Machine Learning
1 Introductıon
1.1 Security and Privacy in Edge Computing
1.2 Intrusion Detection System
1.3 Signature-Based Intrusion Detection (SBID)
1.4 Anomaly-Based Intrusion Detection (ABID)
2 Literature Survey
3 Discussion and Conclusion
References
An IoT-Based Smart Refractory Furnace Developed from Locally Sourced Materials
1 Introduction
2 Methodology
2.1 Furnace Dimensions
2.2 Furnace Hardware Configuration
2.3 Software Architecture
3 Results and Findings
3.1 XRD Analysis
3.2 Smart Furnace Case Modeling and Simulation
3.3 The IoT Validation Analysis
3.4 iFurnace Wireless Network
4 Conclusion
References
Extraction and Summarization of Disease Details Using Text Summarization Techniques
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 Text Summarization by TextRank Algorithm
3.2 Algorithm Description
3.3 Implementation
4 Results and Evaluation
4.1 Results
4.2 Evaluation Metrics
5 Conclusion
References
Design of Smart Door Status Monitoring System Using NodeMCU ESP8266 and Telegram
1 Introduction
2 Existing Literature Survey
3 Aims and Objectives
4 System Archıtecture Proposed
5 Hardware Design
5.1 NodeMCU ESP8266
5.2 Magnetic Reed Switch
6 System Software
6.1 Arduino IDE
6.2 Telegram Bot
7 Description of the Technology
7.1 Circuit Schematic Diagram
8 Results and Output
8.1 Prototype Implementation
8.2 Serial Monitor Results
8.3 Telegram Interface
9 Conclusıon and Future Works
References
Machine Learning and IoT-Based Automatic Health Monitoring System
1 Introduction
2 Methodology
2.1 Data Acquisition
2.2 Experimental Setup
3 Proposed System
3.1 Working of the Proposed Machine Learning and IoT-Based Healthcare System
3.2 Machine Learning-Based Anomaly Detection
4 Results and Discussion
5 Conclusions and Future Work
References
Volatility Clustering in Nifty Energy Index Using GARCH Model
1 Introduction
1.1 Literature Review
2 Need for the Study
3 Objectives of the Study
4 Methodology
5 Results and Discussion
5.1 Imputation of Nifty Energy Index
5.2 Stationarity of Data
5.3 Augmented Dickey–Fuller Test (ADF) at Level
5.4 Stationarity Test for First Log Difference Return Series
5.5 Phillips–Perron Test
5.6 Descriptive Statistics
5.7 GARCH (Generalised Autoregressive Conditional Heteroscedasticity)
5.8 ARCH LM Test
5.9 GARCH Modelling Fit
5.10 GARCH Model Equation
6 Conclusion
References
Research Analysis of IoT Healthcare Data Analytics Using Different Strategies
1 Introduction
1.1 IoT Benefits for Patients
1.2 IoT Benefits for Physicians
2 Related Study
3 Analysis of IoT Healthcare
3.1 Effective Machine Learning Strategy (EMLS)
3.2 Efficient Fog-Enabled IoT Deep Learning Strategy—Intense Health Analyzing Scheme (IHAS)
3.3 RFID-Assisted Lightweight Cryptographic Methodology (RFIDLCM)
3.4 Blockchain-Enabled IoT Health Assistance (BIoTHA)
3.5 Enhanced Proof of Work (E-PoW)
4 Analysis of IoT Healthcare Analysis
5 Conclusion
References
Arduino-Based Circuit Breaker for Power Distribution Lines to Enhance the Safety of Lineman
1 Introduction
2 Objective
3 Literature Survey
4 Proposed Architecture
4.1 Arduino UNO
4.2 SIM900A GSM/GPRS Module
4.3 4—Channel 5V Relay
4.4 Piezo-Buzzer
4.5 Flame Sensor
5 Experimental Setup and Results
6 Conclusion and Future Scope
References
Kannada Handwritten Character Recognition Techniques: A Review
1 Introduction
2 Literature Review
2.1 Convolutional Neural Network
2.2 Support Vector Machine
2.3 K-Nearest Neighbour
3 Conclusion
References
A Model for Network Virtualization with OpenFlow Protocol in Software-Defined Network
1 Introduction
2 Software-Defined Network and Network Virtualization
2.1 Software-Defined Network
2.2 Network Virtualization
3 Methodology
4 Result and Discussion
5 Conclusion
References
A Review of Decisive Healthcare Data Support Systems
1 Introduction
2 Survey on Decision Support System (DSS) for Healthcare System
3 Comparative Analysis
4 Conclusion
References
Wireless Sensor Networks (WSNs) in Air Pollution Monitoring: A Review
1 Introduction
2 Literature Review
2.1 Simulation and Network Deployment
2.2 Network Deployment
2.3 Cellular Networks
2.4 Vehicular Networks
2.5 Neural Networks
3 Conclusion
References
Plant Disease Detection Using Image Processing Methods in Agriculture Sector
1 Introduction
2 Types of Plant Disease
3 Review of Literature
4 Research Methodology
4.1 Image Acquisition
4.2 Image Segmentation
4.3 Feature Extraction
5 Experimentation and Result
6 See Figs. 3, 4 and 5.
7 Simulation Result of Final Output
8 Conclusion
References
Remote Monitoring and Controlling of Household Devices Using IoT
1 Introduction
1.1 Introduction
1.2 Literature Survey
2 Hardware and IoT Cloud Platform Details
2.1 ESP8266 Node MCU (Microcontroller Unit) Module
2.2 Channel, 5V Relay Kit
2.3 DHT11—Digital Humidity and Temperature Sensor
2.4 5 V/1Amp SMPS (Switch Mode Power Supply)
2.5 PIR Sensor (for Human Body Detection)
2.6 Digital Fan Regulator Kit
2.7 Iot Cloud Platform: Blynk Application
3 Working of Project
3.1 Block Diagram of the Project
3.2 Working of the Project
4 Conclusion
References
The Web-Based History Learning Application for 6th-Grade Students
1 Introduction
2 Current and Previous Similar Research Papers
3 Result and Discussion
4 Conclusion
References
Text Summarization Using Lexical Chaining and Concept Generalization
1 Introduction
2 Related Work
3 Proposed Work
3.1 Extraction Using Lexical Chains
3.2 Abstraction by Generalization of Concepts
4 Experimentation and Evaluation
4.1 Dataset
4.2 Evaluation Scores
5 Conclusion
References
The Smart Automotive Webshop Using High End Programming Technologies
1 Introduction
2 Literature Survey
3 System Design and Methodologies
3.1 Technologies and Languages Used
3.2 System Architecture
3.3 Module Description
3.4 Features of the App
4 Implementation and Analysis
4.1 Result Analysis
5 Conclusion and Future Enhancements
References
Author Index


📜 SIMILAR VOLUMES


Intelligent Communication Technologies a
✍ G. Rajakumar (editor), Ke-Lin Du (editor), Álvaro Rocha (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2023), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 16–17, 2023. The book shares knowledge and resul

Intelligent Communication Technologies a
✍ G. Rajakumar, Ke-Lin Du, Chandrasekar Vuppalapati, Grigorios N. Beligiannis 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10–11, 2022. The book shares knowledge and results in th

Intelligent Data Communication Technolog
✍ D. Jude Hemanth (editor), Danilo Pelusi (editor), Chandrasekar Vuppalapati (edit 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book gathers selected papers presented at the 5th International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI 2021), organized by JCT College of Engineering and Technology, Coimbatore, Tamil Nadu, India during 27 – 28 August 2021. This book sol

Intelligent Data Communication Technolog
✍ Jude Hemanth (editor), Robert Bestak (editor), Joy Iong-Zong Chen (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book solicits the innovative research ideas and solutions for almost all the intelligent data intensive theories and application domains. The proliferation of various mobile and wireless communication networks has paved way to foster a high demand for intelligent data processing and co

Intelligent Communication Technologies a
✍ S. Balaji, Álvaro Rocha, Yi-Nan Chung 📂 Library 📅 2020 🏛 Springer International Publishing 🌐 English

<p>This book presents the outcomes of the Intelligent Communication Technologies and Virtual Mobile Networks Conference (ICICV 2019) held in Tirunelveli, India, on February 14–15, 2019. It presents the state of the art in the field, identifying emerging research topics and communication technologies

Computer Networks and Inventive Communic
✍ S. Smys (editor), Pavel Lafata (editor), Ram Palanisamy (editor), Khaled A. Kame 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book is a collection of peer-reviewed best selected research papers presented at 5th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2022). The book covers new results in theory, methodology, and applications of computer networks and data com