Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/computer-science-engineering-and-emerging-technologies/descriptif_5056743
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=5056743

Computer Science Engineering and Emerging Technologies Proceedings of ICCS 2022

Langue : Anglais

Coordonnateurs : Sobti Rajeev, Garg Rachit, Kumar Srivastava Ajeet, Singh Shahi Gurpeet

Couverture de l’ouvrage Computer Science Engineering and Emerging Technologies

The year 2022 marks the 100th birth anniversary of Kathleen Hylda Valerie Booth, who wrote the first assembly language
and designed the assembler and auto code for the first computer systems at Birkbeck College, University of London.
She helped design three different machines including the ARC (Automatic Relay Calculator), SEC (Simple Electronic
Computer), and APE(X). School of Computer Science and Engineering, under the aegis of Lovely Professional University,
pays homage to this great programmer of all times by hosting ?BOOTH100??6th International Conference on Computing
Sciences.

1. Potentiality of IOT in Resolving Failed Copulation
2. A Comprehensive Review on Blockchain: Types, Techniques, Consensus Algorithms and Platforms
3. Biometrics and its Application in Parkinson’s Disease Detection
4. Alzeimer’s Detection Using Deep Learning: A Review
5. Survey on Heart Diseases Prediction Using Machine Learning Algorithms
6. Detection of Brain Tumor Using Machine Learning: An Overview
7. Development of Future Wireless Communication-based IoT System
8. A Comprehensive Review of Different Clustering Algorithms for IoT-Based Networks
9. Review Paper on Real-time Speech Recognition for Augmentation of Class Room Learning
10. Applied Cryptography in Banking and Financial Services for Data Protection
11. A Study to Investigate the Methods of Enhancing Database Security in Web-based
Environments through Big Data
12. Challenges in Security and Privacy in Wireless Networks and Mitigation Methods
Using Blockchain Technology
13. Prediction of Suicide Ideation for Military Personnel Based on Deep Learning: A Review
14. Machine Translation Models and Named Entity Recognition: Comprehensive Study
15. IOT-based Security and Surge Rescue—A Modish Smart Bus System
16. A Flexible Blockchain-dependent IoT Communication Framework
17. The Emerging Role and Application of Adopting Revolutionary Internet of Things (IoT) for
Future Technology Sustainability
18. Forecasting of Stock Market Data Frame Analysis Using Relative Strength Index (RSI) and
Deep Learning
19. Enablement of Blockchain in Healthcare: A Systematic Review
20. An Empirical Analysis in Understanding the Transformative Effect of Application of Internet of
Things in Business and Society
21. MORSE: Social Networking Platform that Enables Connecting with Alumni, Teachers, and Students
22. Detailed Investigation of Influence of Internet of Things (IoT) and Big Data on Digital
Transformation in Marketing
23. Internet of Things (IoT)-based Smart Cities Help Achieving Sustainable Development Goals
24. Logo Validation Using Unsupervised Machine Learning Technique—A Blockchain-based
Approach
25. Detailed Analysis of Machine Learning and Deep Learning Technologies for Web Security
26. A Detailed Investigation of Artificial Intelligence Applications in Cyber Security
27. Use of Blockchain Technologies Against Cyber Security Threats and Increase IT
Industry Security
28. Examining Cyber Security Curricular Frameworks for Business Schools Using Artificial Intelligence
29. Weighted Ensemble Classification System for Prediction of Diabetes Mellitus
30. Applications of Internet of Things (IoT) in Maintaining Privacy and Security of Smart Cities
31. EMG Muscular Disorder Classification Using Motor Neuron Signals
32. Role of IoT and Cloud in Smart Healthcare Monitoring System for Efficient Resource Utilization
33. Challenges Faced in Polygon Clipping Procedures and Visualization Technique in 3D Face
Detection: A Comprehensive Review
34. Use of IoT and Senso-based Big Data Applications to Develop Future Smart Sustainable Cities
35. Dual-Level Encrytion for Secure Communication
36. A Detailed Investigation of Artificial Intelligence in Economic Growth and Development of
Emerging Economies
37. Coal and Gangue Positioning and Classification Using Support Vector Machines
38. IoT and Its Escalating Security Needs
39. Empirical Analysis of Machine Learning (Ml) for Big Data and its Applications Using CNN
40. Applications of Optical Networking in Enhancing 5G Communications in Smart Cities
41. Role of Image Segmentation and Feature Extraction Methods in Cotton Plant Disease Detection
42. An Approach to Reconstruct Cervical Spondylosis MRI Image Using Generative Adversarial Networks
43. Collective Intelligence in Digital Marketing and Business Decision-making Through Artificial
Swarm Intelligence
44. The Advancement of Using Internet of Things in Blockchain Applications for Creating Sustainable Environment in the Real Word Scenario
45. The Recent Advancements in Security, Privacy and Trust in Mobile and Wireless Communication in the Emerging Economies
46. Intelligent Computing Techniques for The House Price Prediction Model: A Review
47. An Empirical Evaluation of Machine Learning Image Augmentation Models from a Pragmatic Perspective
48. Wireless Network Security: Requirements, Attacks, Vulnerabilities, Security Solutions
49. A Systematic Literature Review on Various Methodologies Used from Time to Time for Predicting Rainfall
50. Recent Advances in Optical Networks and Their Implications for 5G and Beyond Communications
51. Depression Detection Using Artificial Intelligence: A Review
52. A Review for Weather Forecasting and Photovoltaic Load Forecasting Systems
53. Image Enhancement Using Morphological Techniques
54. Efficient Novel Cryptographic Algorithm to Improve Security: A Review
55. A Study on Blockchain Technology for the Future E-Voting Systems
56. Implementation of Waste Management, Renewable Energy and Green Buildings in Smart Cities for Quality Life
57. A Review—Rice Plant Disease Detection Using Machine Learning Algorithms
58. Enhancement of Key Management System in Cloud Environment
59. A Comparative Study of Load Balancing Algorithms in Cloud Computing
60. Examining How Human Perceptions and Abilities are Used in Cryptography
61. Online Cab Booking System Uber Clone Using Next JS
62. Contemporary Software Cloning Detection Methods: Meta-Analyses
63. Deep Learning for Aquatic Object Recognition in Seafloor
64. Ensembling Intelligent Models to Design an Efficient System for Prediction of Pulmonary Tuberculosis
65. Evaluation of Machine Learning Classifiers for Multiple Disease Prediction
66. Machine Learning-based Approaches to Biosignal Processing
67. A Neoteric Review of Story Point Estimation in Agile-Scrum Projects Using Machine and Deep Learning Algorithms
68. Image-Based Dragonfly Classification Using Capsule Networks
69. Empirical Analysis of VLSI Implementation for Improving Signal Processing System
70. Exploratory Data Analysis of Heart Disease Using Machine Learning
71. Recommending Future Collaborations Using Feature Selection Technique for Scholarly Network
72. Applications of SPT (Squeeze Pack and Transfer) and Other Lossless Compression Algorithms in IoT: A Comparative Study
73. Call Centre Resource Optimization Using Applied Operations Research: A Linear Programming Approach
74. Role of Machine Learning in Developing the Effectiveness of Digital Marketing Aspects in Emerging Economies
75. Leveraging Cyber Hunt and Investigation on Endpoints Using Elastic XDR/EDR
76. An examination of Cloud Network Security Issues and Potential Solutions
77. Blockchain Scalability Analysis on Throughput and Long Transaction Time
78. Approach Based on Machine Learning to Predict People’s Intention to Use Mobile Learning Platforms
79. Epileptic Seizure Detection and Classification Based on EEG Signals Using Particle Swarm Optimization and Whale Optimization Algorithm
80. Coding Sketch: Turn Your Sketch Designs into Code
81. Automatic Error Detection Using Python
82. Emerging Cryptographic Techniques
83. Mixed Language Text Classification Using Machine Learning: Cyberbullying Detection System
84. A Systematic Review on Thalassemia Using Neural Network Techniques
85. Cryptographic Applications in Blockchain
86. Use of Blockchain Technology Toward Green IoT and its Impact on Smart City Development
87. Automated Smart Agriculture Using Machine Learning
88. A Review on Classification of Covid-19 and Pneumonia Disease Using Machine Learning
89. A Systematic Review on Machine Learning-based Fraud Detection System in E-Commerce
90. A systematical Reviewing of Prediction Models During Aggravation of Asthma and its Validation
91. Cyber Crimes: An Interdisciplinary Perspective
92. Blockchain Based Framework for E-Governance: A Review of the Literature
93. Segmentation of Skin Cancer Images Applying Background Subtraction with Midpoint Analysis
94. Computational Social Interactions and Trust Models in Virtual Societies
95. Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues
96. A Survey on User Stories Using NLP for Agile Development
97. Scheduling Techniques for Convergecast in Multichannel Wireless Sensor Networks: A Review and Issues
98. Architectural Sustainability in Computer Design: A mirror Review
99. Comprehensive Analysis of IEEE 802.11 WLAN Performance Optimization Strategies
100. Review Paper for Detection and Prevention of Cyber Attacks
101. A Concise Review on the Vision-Based Moving Vehicle Detection System by Deep Learning Approaches
102. Automation and Robotics in Healthcare Industry for Monitoring Patients in Critical Care Unit
103. A Review of Various System-on-Chip Technologies for Multiprocessor Systems
104. Detailed Investigation of Role of Machine Learning Techniques in Agricultural Development in Future
105. Emerging Microfluidic Devices and Fabrication Methods in Various Domains
106. Computation of Cuckoo Search Algorithm and its Implementation in Active Noise Cancellation
107. Development of Evaluation Protocol for Anti-Forensics Encryption Tool Using Software Reverse Engineering Techniques
108. Latest Trends in Non-Destructive Document Examination Using Hyperspectral Imaging
109. Adaptive Cloud Service Optimization Using Drone Swarm Methodology
110. Efficient Security Enhancement of Key Management System (KMS) in Cloud Environment
111. Machine Learning-based Cloud Optimization System
112. Multi Objective Eagle Optimization Feature Selection for Cloud Systems
113. The impact of Anti-forensic Techniques on Forensic Investigation Challenges

Postgraduate and Undergraduate Advanced

Dr. Rajeev Sobti is a distinguished academic and administrative leader who currently serves as the Head of the School of Computer Science & Engineering at Lovely Professional University, India. With over two decades of experience in both academia and industry, Dr. Sobti has made significant contributions to the field of computer science. His expertise primarily lies in Network Security and System Architecture, and he has a keen interest in areas such as Cryptography, Cryptanalysis of Hash Functions, and Performance Analysis. Dr. Sobti’s impressive research portfolio includes numerous published research papers in reputed journals and conferences. He has also authored and reviewed various chapters in refereed books, showcasing his profound knowledge and scholarly contributions. Notably, his work on the RKC mode of operation had earned recognition as one of the thirteen recommended algorithms for authenticated encryption mode by NIST (National Institute of Standards and Technology), Security Division of the US Department of Commerce.
In addition to his research achievements, Dr. Rajeev Sobti is known for his dedication to education and student engagement.
Over the past five years, he has conducted more than 100 counselling sessions, interacting with more than 10,000 students
across India. His commitment to fostering academic growth extends to his role as a resource person in various faculty
development and training programs.
Dr. Sobti’s commitment to continuous learning is evident through his participation in approximately 20 relevant training
programs and his memberships in several engineering and research societies and institutions. His expertise is also sought
after on a global scale, as he has served on review boards for various journals and conferences both in India and abroad. He
also holds several prestigious certifications in the field of computer science and network security, including:
GIAC Forensic Analyst (GFACT)

Date de parution :

17.8x25.4 cm

À paraître, réservez-le dès maintenant

56,31 €

Ajouter au panier

Thèmes de Computer Science Engineering and Emerging Technologies :