sign in

Username Password

Forget Password ? ? Click Here

Don't Have An Account ? Create One

sign up

name Username Email Mobile Password

To contact us, you can contact us via the following mobile numbers by calling and WhatsApp

+989115682731 Connect To WhatsApp
+989917784643 Connect To WhatsApp
EnglishEnglish SpanishSpanish PortuguesePortuguese FrenchFrench GermanGerman ChineseChinese

Unlimited Access

For Registered Users

Secure Payment

100% Secure Payment

Easy Returns

10 Days Returns

24/7 Support

Call Us Anytime

Data Analytics, Computational Statistics, and Operations Research for Engineers: Methodologies and Applications 2022 book

Data Analytics, Computational Statistics, and Operations Research for Engineers: Methodologies and Applications

Details Of The Book

Data Analytics, Computational Statistics, and Operations Research for Engineers: Methodologies and Applications

Authors: , , ,   
ISBN : 0367715112, 9780367715113 
publisher: CRC Pr I Llc 
publish year: 2022 
pages: 275 
language: English 
ebook format : PDF (It will be converted to PDF, EPUB OR AZW3 if requested by the user) 
file size: 9 MB 

price : $9.68 11 With 12% OFF

Your Rating For This Book (Minimum 1 And Maximum 5):

User Ratings For This Book:       

You can Download Data Analytics, Computational Statistics, and Operations Research for Engineers: Methodologies and Applications Book After Make Payment, According to the customer's request, this book can be converted into PDF, EPUB, AZW3 and DJVU formats.

Abstract Of The Book

Table Of Contents

Half Title
Editor Biographies
Chapter 1 Hyperspectral Imagery Applications for Precision Agriculture: A Systemic Survey
	1.1 Introduction
		1.1.1 The Main Contribution of the Chapter
	1.2 Hyperspectral Imaging Technology
	1.3 Agricultural Applications
		1.3.1 Soil Analysis
		1.3.2 Contaminants and Nutrient Estimation
		1.3.3 Inland Water and Moisture Estimation
		1.3.4 Crop Yield Estimation
		1.3.5 Plant Disease Monitoring, Insect Pesticide Monitoring, and Invasive Plant Species
		1.3.6 Agricultural Crop Classification
	1.4 Conclusion and Future Scope
Chapter 2 Early Prediction of COVID-19 Using Modified Convolutional Neural Networks
	2.1 Introduction
		2.1.1 Graph for Deaths
	2.2 What We Cover In
	2.3 Literature Survey
	2.4 Related Work
		2.4.1 Existing System
	2.5 Proposed System
	2.6 System Design and Implementation
	2.7 Paper Implementation Details
		2.7.1 System Modules Collecting Data Sources Data in Structured Preprocessing Datasets Feature Learning
		2.7.2 Implementing Using Structured Data
		2.7.3 K-Nearest Neighbor Data Input Output Method Neural Networks Procedure Step 1: Representation of Text Data Step 2: Convolution Layer of Text MCNN Step 3: POOL Layer of Text-Modified CNN Step 4: Full Connection Layer of Text-Modified CNN Step 5: Modified CNN Classifier
		2.7.4 Logical Flow of Neural Network
	2.8 Results
	2.9 Conclusion
Chapter 3 Blockchain for Electronic Voting System
	3.1 Introduction
	3.2 Methods Used for Voting
		3.2.1 Paper Ballots
		3.2.2 E-Voting
		3.2.3 I-Voting
	3.3 Current E-Voting System Gaps
		3.3.1 Deploying Proprietary Software
		3.3.2 Nontransparency in Enlisting Software Version
		3.3.3 Minimal Security against Day-to-Day Attacks
		3.3.4 Incompatibility of Voting Machine and Voting Software
	3.4 Introduction to Blockchain
		3.4.1 Blockchain Network
		3.4.2 Countries that Used Blockchain for Voting Sierra Leone Russia
	3.5 Working of E-Voting Using Blockchain
		3.5.1 Requesting for Vote
		3.5.2 Casting the Vote
		3.5.3 Encrypting Votes
		3.5.4 Appending the Vote
	3.6 Blockchain as a Service
		3.6.1 Smart Contracts
		3.6.2 Noninteractive Zero Knowledge Proof
	3.7 Blockchain as a Service for E-Voting
		3.7.1 Election as a Smart Contract
		3.7.2 Election Roles Election administrators Voters District nodes Bootnodes
		3.7.3 Election Process Election Creation Voter Registration Vote Transaction Tallying the Results Verifying the Vote
		3.7.4 Evaluating Blockchain as a Service for E-Voting Exonum Quorum Geth
	3.8 Current Proposed Solutions in E-Voting System
		3.8.1 General
		3.8.2 Coin Based
		3.8.3 Integrity of the Data
		3.8.4 Consensus
		3.8.5 Competitive Consensus
		3.8.6 Proof of Work
		3.8.7 Proof of Stake
		3.8.8 Delegated Proof of Stake
		3.8.9 Noncompetitive Consensus
	3.9 Benefits of Blockchain-Based E-Voting System
		3.9.1 Challenges for Blockchain-Based E-Voting System
	3.10 Security Analysis and Legal Issues
		3.10.1 Possible Attacks on Blockchain Network Distributed Denial of Service Routing Attacks Sybil Attacks
		3.10.2 Anonymity
		3.10.3 Confidentiality
		3.10.4 Ballot Manipulation
		3.10.5 Transparency
		3.10.6 Auditability
		3.10.7 Nonrepudiation
	3.11 Conclusion
Chapter 4 The Efficacy of AI and Big Data in Combating COVID-19
	4.1 Introduction
	4.2 COVID-19 Pandemic
	4.3 COVID-19 and AI
	4.4 How to Fight Coronavirus with the Help of AI?
	4.5 AI Making the COVID-19 Drug Development Cheaper, Quicker, and More effective
	4.5.1 Why Are Faster Trials Essential for Pharmaceutical Companies? The State of the Clinical Trials
	4.5.2 How AI Can Alter All Phases of Clinical Trials Clinical Trial Finding The EHR Interoperability Challenge Acquisitions as a Method for Obtaining Patient Information Enrolment Challenges Adherence to Drugs Visual, Auditory, and Digital Phenotyping AI and IoT for Remote Patient Monitoring
	4.5.3 How Big Tech Interrupts Clinical Trials Google’s Healthcare Data Platform Disrupting EHR Data Sharing What Does This Data Mean for Clinical Trials? The Moves of Apple and Facebook
	4.5.4 How COVID-19 Influenced Tech Adoption in Clinical Trials Study Design Virtual Trials
	4.6 AI for COVID-19 Pandemic: A Survey on the State of the Arts
		4.6.1 Understanding the Virus
		4.6.2 Monitoring the Pandemic
		4.6.3 Controlling the Pandemic
		4.6.4 Managing the Effects of the Pandemic
		4.6.5 For Pharmaceutical Studies
	4.7 Big Data for COVID-19
		4.7.1 Big Data Applications for COVID-19
		4.7.2 Big Data for COVID-19 Pandemic: A Survey on the State of the Arts
	4.8 Case Study: How India Fights COVID-19 with AI and Big Data
	4.9 Conclusion
Chapter 5 Blockchain in Artificial Intelligence
	5.1 Introduction
		5.1.1 Difference between Blockchain and AI
		5.1.2 Blockchain for AI (Classification and Protection) and AI for Blockchain (Security and Straightforwardness)
		5.1.3 Blockchain and AI: A Great Match
		5.1.4 Applications of Blockchain and AI Smart Computing Power Creating Diverse Datasets Data Safeguarding Data Monetization Trusting AI Decision-Making
	5.2 Blockchain, Improving Machine Learning Models
		5.2.1 Some Examples of Blockchain and AI-Integrated Softwares
		5.2.2 SingularityNET
	5.3 DeepBrain Chain
	5.4 Disruptive Integration of Blockchain and AI
	5.5 Blockchain for AI
		5.5.1 Secure Data Sharing
		5.5.2 Your Records/Data, Your Cost
	5.6 Explainable AI
	5.7 AI for Blockchain
		5.7.1 Security and Scalability
	5.8 Privacy and Personalization
	5.9 Convergence of Blockchain and AI with IoT
	5.10 Convergence of Blockchain, Internet of Things, and Artificial Intelligence
	5.11 Improving Data Standardization
	5.12 Authentication in Accordance to a Blockchain-Established Identity
	5.13 Automatization by Means of Smart Contracts
	5.14 Integration of Blockchain and AI for Medical Sciences
		5.14.1 AI for Heart Medicine
		5.14.2 Blockchain in Cardiovascular Medicine
	5.15 Current Applications of Integrated Blockchain and AI
	5.16 The Prospective of Blockchain, IoT, and AI in Combination
	5.17 Conclusion
Chapter 6 Big Data Analytics and Machine Learning
	6.1 Introduction: Background and Driving Forces
	6.2 Scope of Big Data Analytics
		6.2.1 Airline Industry
		6.2.2 Banking
		6.2.3 Science and Government
		6.2.4 Healthcare
	6.3 Big Data Analytics Tools
		6.3.1 Apache Kafka
		6.3.2 HBase
		6.3.3 Hive
		6.3.4 Map Reduce
		6.3.5 Pig
		6.3.6 Spark
		6.3.7 YARN
		6.3.8 Presto
	6.4 Introduction to Machine Learning
	6.5 Tools Used in Machine Learning
		6.5.1 Tensor Flow
		6.5.2 Google Cloud
		6.5.3 AWS ML
		6.5.4 Accord and Apache Mahout
		6.5.5 Shogun
		6.5.6 Oryx 2
		6.5.7 Apache Singa
		6.5.8 Google ML Kit for Mobile
		6.5.9 Apple’s Core ML
	6.6 Big Data Types and Its Classifications
		6.6.1 Structured
		6.6.2 Unstructured
		6.6.3 Semistructured
		6.6.4 Volume
		6.6.5 Variety
		6.6.6 Veracity
		6.6.7 Value
		6.6.8 Velocity
	6.7 Latest Trend in Big Data
		6.7.1 Information from Data
		6.7.2 Predictive Analysis
		6.7.3 Edge Computing
		6.7.4 Natural Language Processing
		6.7.5 Hybrid Clouds
		6.7.6 Dark Data
	6.8 Types of Machine Learning Algorithms
		6.8.1 Supervised Learning Categories of Supervised Learning Classification Regression
		6.8.2 Unsupervised Learning
		6.8.3 Reinforcement Learning Reinforcement Learning Steps
		6.8.4 Types of Reinforcement Learning
	6.9 Guidelines on Optimal Steps in Making Machine Learning Predictions
		6.9.1 Data Selection
		6.9.2 Data Exploration
		6.9.3 Data Preprocessing
		6.9.4 Feature Selection
		6.9.5 Training and Testing
		6.9.6 Prediction Using Various ML Algorithms
	6.10 Big Data Analytics and Machine Learning Fusion
	6.11 Advantage of Big Data and Machine Learning
		6.11.1 Analyzing Data in a Limited Time Frame
		6.11.2 Prediction of Real-Time Data
	6.12 Trade-Off of Bid Data and ML Combination
		6.12.1 Data Acquisition
		6.12.2 Time and Resources
		6.12.3 High Error Susceptibility
	6.13 Applications of Big Data and Machine Learning
		6.13.1 Cloud Networks
		6.13.2 Web Scraping
		6.13.3 Mixed-Initiative Systems
	6.14 Guidelines on How Machine Learning Can Be Effectively Applied to Big Data
		6.14.1 Data Warehousing
		6.14.2 Data Segmentation
		6.14.3 Outlier Detection and Imputation of Missing Values
		6.14.4 Dimensionality Reduction
		6.14.5 Descriptive Analysis
		6.14.6 Predictive Analysis
		6.14.7 Prescriptive Analysis
	6.15 Conclusion and Future Work
Chapter 7 Securing IoT through Blockchain in Big Data Environment
	7.1 Introduction
	7.2 Overview of Blockchain Technology
		7.2.1 Why Is Blockchain Popular?
		7.2.2 How Does Blockchain Work?
		7.2.3 Benefits of Blockchain Technology
	7.3 Internet of Things
		7.3.1 How IoT Works
		7.3.2 IoT—Key Features
		7.3.3 IoT—Advantages
		7.3.4 IoT—Disadvantages
	7.4 The IoT Security Challenge
		7.4.1 A Spectrum of Security Considerations
		7.4.2 Unique Security Challenges of IoT Devices
		7.4.3 IoT Security Questions
	7.5 Is Blockchain the Solution to IoT Security?
	7.6 When the IoT Meets Blockchain
	7.7 IoT Architectural Pattern Based on the Blockchain Service
		7.7.1 Model of Communication
		7.7.2 A Rich Ecosystem for Leveraging Interoperability Capabilities
		7.7.3 Cohabitation between Multiple Blockchain Services The IoT Architecture Pattern Based on Blockchain Technology
	7.8 Features to Consider When Securing the IoT Using Blockchain Technology
		7.8.1 Scalable IoT Discovery
		7.8.2 Trusted Communication
		7.8.3 Semiautonomous Machine-to-Machine Operations
		7.8.4 IoT Configuration and Updates Controls
		7.8.5 Stable Firmware Image Distribution and Upgrade Firmware Reputation-Based Upgrade (Chain of Things)
	7.9 Various Ways to Strengthen IoT Security with Blockchain Technology
	7.10 Challenges in Integrating Blockchain into the IoT
	7.11 Security Recommendations
	7.12 Use Cases of Blockchain Mechanisms for IoT Security
	7.13 Conclusion
Chapter 8 Spear Phishing Detection
	8.1 Introduction
	8.2 History of Phishing
	8.3 Statistics of Phishing
	8.4 Anatomy of an Attack
	8.5 Kinds of Phishing
	8.6 Dataset
	8.7 Machine Learning
		8.7.1 Basic Machine Learning Algorithms Support Vector Machine Decision Tree Logistic Regression Multinomial Naive Bayes K-Nearest Neighbor Random Forest
		8.7.2 Ensemble Learning Max Voting Averaging Stacking Bagging AdaBoost Gradient Boosting
	8.8 Conclusion
Chapter 9 RFID and Operational Performances
	9.1 Introduction
	9.2 Review of Literature
		9.2.1 Theoretical Foundation
		9.2.2 First Energy Model
		9.2.3 Second Rogers’ Theory of Diffusion of Innovation
	9.3 Energy-Efficient RFID Practices in Medical Store Inside Hospitals
		9.3.1 Operational performance of stores improved through RFID (as an energy-efficient technique)
	9.4 Research Gap, Objectives, and Hypothesis
		9.4.1 Research Gap
		9.4.2 Research Objective and Hypothesis
	9.5 Methodological Foundation
	9.6 Results and Analysis
		9.6.1 Principal Component Analysis Correlation Analysis Regression Analysis
	9.7 Conclusion and Scope for Further Research
	Ethical Approval

First 10 Pages Of the book

Comments Of The Book