LOW FLAT RATE AUST-WIDE $9.90 DELIVERY INFO

Close Notification

Your cart does not contain any items

Computer Science Engineering and Emerging Technologies

Proceedings of ICCS 2022

Rajeev Sobti Rachit Garg Ajeet Kumar Srivastava Gurpeet Singh Shahi

$94.99

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
CRC Press
07 June 2024
The year 2022 marks the 100th birth anniversary of Kathleen Hylda Valerie Booth, who wrote the first assembly language and designed the assembler and auto code for the first computer systems at Birkbeck College, University of London. She helped design three different machines including the ARC (Automatic Relay Calculator), SEC (Simple Electronic Computer), and APE(X). School of Computer Science and Engineering, under the aegis of Lovely Professional University, pays homage to this great programmer of all times by hosting “BOOTH100”—6th International Conference on Computing Sciences.
Edited by:   , , ,
Imprint:   CRC Press
Country of Publication:   United Kingdom
Dimensions:   Height: 254mm,  Width: 178mm, 
ISBN:   9781032521992
ISBN 10:   1032521996
Pages:   702
Publication Date:  
Audience:   College/higher education ,  Primary
Format:   Paperback
Publisher's Status:   Forthcoming
1. Potentiality of IOT in Resolving Failed Copulation 2. A Comprehensive Review on Blockchain: Types, Techniques, Consensus Algorithms and Platforms 3. Biometrics and its Application in Parkinson’s Disease Detection 4. Alzeimer’s Detection Using Deep Learning: A Review 5. Survey on Heart Diseases Prediction Using Machine Learning Algorithms 6. Detection of Brain Tumor Using Machine Learning: An Overview 7. Development of Future Wireless Communication-based IoT System 8. A Comprehensive Review of Different Clustering Algorithms for IoT-Based Networks 9. Review Paper on Real-time Speech Recognition for Augmentation of Class Room Learning 10. Applied Cryptography in Banking and Financial Services for Data Protection 11. A Study to Investigate the Methods of Enhancing Database Security in Web-based Environments through Big Data 12. Challenges in Security and Privacy in Wireless Networks and Mitigation Methods Using Blockchain Technology 13. Prediction of Suicide Ideation for Military Personnel Based on Deep Learning: A Review 14. Machine Translation Models and Named Entity Recognition: Comprehensive Study 15. IOT-based Security and Surge Rescue—A Modish Smart Bus System 16. A Flexible Blockchain-dependent IoT Communication Framework 17. The Emerging Role and Application of Adopting Revolutionary Internet of Things (IoT) for Future Technology Sustainability 18. Forecasting of Stock Market Data Frame Analysis Using Relative Strength Index (RSI) and Deep Learning 19. Enablement of Blockchain in Healthcare: A Systematic Review 20. An Empirical Analysis in Understanding the Transformative Effect of Application of Internet of Things in Business and Society 21. MORSE: Social Networking Platform that Enables Connecting with Alumni, Teachers, and Students 22. Detailed Investigation of Influence of Internet of Things (IoT) and Big Data on Digital Transformation in Marketing 23. Internet of Things (IoT)-based Smart Cities Help Achieving Sustainable Development Goals 24. Logo Validation Using Unsupervised Machine Learning Technique—A Blockchain-based Approach 25. Detailed Analysis of Machine Learning and Deep Learning Technologies for Web Security 26. A Detailed Investigation of Artificial Intelligence Applications in Cyber Security 27. Use of Blockchain Technologies Against Cyber Security Threats and Increase IT Industry Security 28. Examining Cyber Security Curricular Frameworks for Business Schools Using Artificial Intelligence 29. Weighted Ensemble Classification System for Prediction of Diabetes Mellitus 30. Applications of Internet of Things (IoT) in Maintaining Privacy and Security of Smart Cities 31. EMG Muscular Disorder Classification Using Motor Neuron Signals 32. Role of IoT and Cloud in Smart Healthcare Monitoring System for Efficient Resource Utilization 33. Challenges Faced in Polygon Clipping Procedures and Visualization Technique in 3D Face Detection: A Comprehensive Review 34. Use of IoT and Senso-based Big Data Applications to Develop Future Smart Sustainable Cities 35. Dual-Level Encrytion for Secure Communication 36. A Detailed Investigation of Artificial Intelligence in Economic Growth and Development of Emerging Economies 37. Coal and Gangue Positioning and Classification Using Support Vector Machines 38. IoT and Its Escalating Security Needs 39. Empirical Analysis of Machine Learning (Ml) for Big Data and its Applications Using CNN 40. Applications of Optical Networking in Enhancing 5G Communications in Smart Cities 41. Role of Image Segmentation and Feature Extraction Methods in Cotton Plant Disease Detection 42. An Approach to Reconstruct Cervical Spondylosis MRI Image Using Generative Adversarial Networks 43. Collective Intelligence in Digital Marketing and Business Decision-making Through Artificial Swarm Intelligence 44. The Advancement of Using Internet of Things in Blockchain Applications for Creating Sustainable Environment in the Real Word Scenario 45. The Recent Advancements in Security, Privacy and Trust in Mobile and Wireless Communication in the Emerging Economies 46. Intelligent Computing Techniques for The House Price Prediction Model: A Review 47. An Empirical Evaluation of Machine Learning Image Augmentation Models from a Pragmatic Perspective 48. Wireless Network Security: Requirements, Attacks, Vulnerabilities, Security Solutions 49. A Systematic Literature Review on Various Methodologies Used from Time to Time for Predicting Rainfall 50. Recent Advances in Optical Networks and Their Implications for 5G and Beyond Communications 51. Depression Detection Using Artificial Intelligence: A Review 52. A Review for Weather Forecasting and Photovoltaic Load Forecasting Systems 53. Image Enhancement Using Morphological Techniques 54. Efficient Novel Cryptographic Algorithm to Improve Security: A Review 55. A Study on Blockchain Technology for the Future E-Voting Systems 56. Implementation of Waste Management, Renewable Energy and Green Buildings in Smart Cities for Quality Life 57. A Review—Rice Plant Disease Detection Using Machine Learning Algorithms 58. Enhancement of Key Management System in Cloud Environment 59. A Comparative Study of Load Balancing Algorithms in Cloud Computing 60. Examining How Human Perceptions and Abilities are Used in Cryptography 61. Online Cab Booking System Uber Clone Using Next JS 62. Contemporary Software Cloning Detection Methods: Meta-Analyses 63. Deep Learning for Aquatic Object Recognition in Seafloor 64. Ensembling Intelligent Models to Design an Efficient System for Prediction of Pulmonary Tuberculosis 65. Evaluation of Machine Learning Classifiers for Multiple Disease Prediction 66. Machine Learning-based Approaches to Biosignal Processing 67. A Neoteric Review of Story Point Estimation in Agile-Scrum Projects Using Machine and Deep Learning Algorithms 68. Image-Based Dragonfly Classification Using Capsule Networks 69. Empirical Analysis of VLSI Implementation for Improving Signal Processing System 70. Exploratory Data Analysis of Heart Disease Using Machine Learning 71. Recommending Future Collaborations Using Feature Selection Technique for Scholarly Network 72. Applications of SPT (Squeeze Pack and Transfer) and Other Lossless Compression Algorithms in IoT: A Comparative Study 73. Call Centre Resource Optimization Using Applied Operations Research: A Linear Programming Approach 74. Role of Machine Learning in Developing the Effectiveness of Digital Marketing Aspects in Emerging Economies 75. Leveraging Cyber Hunt and Investigation on Endpoints Using Elastic XDR/EDR 76. An examination of Cloud Network Security Issues and Potential Solutions 77. Blockchain Scalability Analysis on Throughput and Long Transaction Time 78. Approach Based on Machine Learning to Predict People’s Intention to Use Mobile Learning Platforms 79. Epileptic Seizure Detection and Classification Based on EEG Signals Using Particle Swarm Optimization and Whale Optimization Algorithm 80. Coding Sketch: Turn Your Sketch Designs into Code 81. Automatic Error Detection Using Python 82. Emerging Cryptographic Techniques 83. Mixed Language Text Classification Using Machine Learning: Cyberbullying Detection System 84. A Systematic Review on Thalassemia Using Neural Network Techniques 85. Cryptographic Applications in Blockchain 86. Use of Blockchain Technology Toward Green IoT and its Impact on Smart City Development 87. Automated Smart Agriculture Using Machine Learning 88. A Review on Classification of Covid-19 and Pneumonia Disease Using Machine Learning 89. A Systematic Review on Machine Learning-based Fraud Detection System in E-Commerce 90. A systematical Reviewing of Prediction Models During Aggravation of Asthma and its Validation 91. Cyber Crimes: An Interdisciplinary Perspective 92. Blockchain Based Framework for E-Governance: A Review of the Literature 93. Segmentation of Skin Cancer Images Applying Background Subtraction with Midpoint Analysis 94. Computational Social Interactions and Trust Models in Virtual Societies 95. Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues 96. A Survey on User Stories Using NLP for Agile Development 97. Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues 98. Architectural Sustainability in Computer Design: A mirror Review 99. Comprehensive Analysis of IEEE 802.11 WLAN Performance Optimization Strategies 100. Review Paper for Detection and Prevention of Cyber Attacks 101. A Concise Review on the Vision-Based Moving Vehicle Detection System by Deep Learning Approaches 102. Automation and Robotics in Healthcare Industry for Monitoring Patients in Critical Care Unit 103. A Review of Various System-on-Chip Technologies for Multiprocessor Systems 104. Detailed Investigation of Role of Machine Learning Techniques in Agricultural Development in Future 105. Emerging Microfluidic Devices and Fabrication Methods in Various Domains 106. Computation of Cuckoo Search Algorithm and its Implementation in Active Noise Cancellation 107. Development of Evaluation Protocol for Anti-Forensics Encryption Tool Using Software Reverse Engineering Techniques 108. Latest Trends in Non-Destructive Document Examination Using Hyperspectral Imaging 109. Adaptive Cloud Service Optimization Using Drone Swarm Methodology 110. Efficient Security Enhancement of Key Management System (KMS) in Cloud Environment 111. Machine Learning-based Cloud Optimization System 112. Multi Objective Eagle Optimization Feature Selection for Cloud Systems 113. The impact of Anti-forensic Techniques on Forensic Investigation Challenges

Dr. Rajeev Sobti is a distinguished academic and administrative leader who currently serves as the Head of the School of Computer Science & Engineering at Lovely Professional University, India. With over two decades of experience in both academia and industry, Dr. Sobti has made significant contributions to the field of computer science. His expertise primarily lies in Network Security and System Architecture, and he has a keen interest in areas such as Cryptography, Cryptanalysis of Hash Functions, and Performance Analysis. Dr. Sobti’s impressive research portfolio includes numerous published research papers in reputed journals and conferences. He has also authored and reviewed various chapters in refereed books, showcasing his profound knowledge and scholarly contributions. Notably, his work on the RKC mode of operation had earned recognition as one of the thirteen recommended algorithms for authenticated encryption mode by NIST (National Institute of Standards and Technology), Security Division of the US Department of Commerce. In addition to his research achievements, Dr. Rajeev Sobti is known for his dedication to education and student engagement. Over the past five years, he has conducted more than 100 counselling sessions, interacting with more than 10,000 students across India. His commitment to fostering academic growth extends to his role as a resource person in various faculty development and training programs. Dr. Sobti’s commitment to continuous learning is evident through his participation in approximately 20 relevant training programs and his memberships in several engineering and research societies and institutions. His expertise is also sought after on a global scale, as he has served on review boards for various journals and conferences both in India and abroad. He also holds several prestigious certifications in the field of computer science and network security, including: GIAC Forensic Analyst (GFACT) GIAC Security Essentials (GSEC) GIAC Certified Incident Handler (GCIH) Furthermore, Dr. Rajeev Sobti’s mentorship has been instrumental in guiding the academic journeys of aspiring scholars. Under his supervision, two scholars have successfully defended their final viva and completed their doctorate, a testament to his guidance and commitment to nurturing future researchers. These certifications further underscore his expertise and commitment to the field, solidifying his position as a leading figure in the realm of computer science and network security in India and beyond. Dr. Rachit Garg is working as a COS (Coordinator of The School) of School of Computer Science and Engineering, Lovely Professional, Punjab, India. LPU is a young university having 30,000+ young minds in emerging areas of Science and Technology in a single campus. The university campus exhibits a rich diversity as the academic staff and students from all 29 states of India and more than 30 countries of the world. He has 22+ years of teaching and administrative experience as Director and Principal to various institutions of repute in Lyallpur Khalsa College, Jalandhar; Universal Institute of Engg & Technology, Sri Sai College of Engg & Tehnology, Founder Director Pyramid College of Businss & Technology, where he has taught subjects like Distributed Mobile Computing, Software Engineering, System Analysis and Design, Operating System and Data Mining, Information Security, Information Systems, Health Informatics and Cyber Forensics. He has organized 07 in series International conferences and chaired special sessions and delivered various technical sessions at the national and international level. He is currently guest editor to the JDMSC Talyor and Francis Journal. He is working in various capacities as Editor, Associate Editor, Guest Editor and is a member editorial board to many international journal and conferences. He has published more than 80 research paper(s) in reputed international journals and conferences, which are indexed in various international databases. He has supervised many master and doctorate students in the various phases of dissertation. He has also edited books and authored book chapters with international and national publishers. He is a senior member to many international conferences in association with IEEE and a life member of CSI and IAENG. IEEE and SCRS student chapters have been initiated under his guidance. He is also associated with 02 International Universities of repute as Adjunct Professor.

See Also