LEADER 01387nam 2200433 450 001 9910466016603321 005 20200917021826.0 010 $a1-78635-686-4 035 $a(CKB)3710000000829111 035 $a(MiAaPQ)EBC4635175 035 $a(Au-PeEL)EBL4635175 035 $a(CaPaEBR)ebr11246638 035 $a(OCoLC)956731058 035 $a(EXLCZ)993710000000829111 100 $a20160901h20162016 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aEducating in the digital world /$fguest editor, Greg Anderson 210 1$a[Bradford, England] :$cEmerald Group Publishing Limited,$d2016. 210 4$d©2016 215 $a1 online resource (72 pages) $cillustrations, tables, graphs 225 0 $aThe International Journal of Information and Learning Technology,$x2056-4880 ;$vVolume 33, Number 3 311 $a1-78635-685-6 320 $aIncludes bibliographical references at the end of each chapters and index. 606 $aComputers and literacy 608 $aElectronic books. 615 0$aComputers and literacy. 676 $a302.22440285 702 $aAnderson$b Greg 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910466016603321 996 $aEducating in the digital world$92033092 997 $aUNINA LEADER 04273nam 22006254a 450 001 996208654503316 005 20230721004909.0 010 $a1-282-01320-3 010 $a9786612013201 010 $a1-4443-0077-6 010 $a1-4443-0078-4 035 $a(CKB)1000000000715954 035 $a(EBL)416409 035 $a(OCoLC)437097478 035 $a(SSID)ssj0000151274 035 $a(PQKBManifestationID)11151040 035 $a(PQKBTitleCode)TC0000151274 035 $a(PQKBWorkID)10319631 035 $a(PQKB)11458005 035 $a(MiAaPQ)EBC416409 035 $a(EXLCZ)991000000000715954 100 $a20071018d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aEvidence-based emergency care$b[electronic resource] $ediagnostic testing and clinical decision rules /$fJesse M. Pines, Worth W. Everett 210 $aChichester, UK ;$aHoboken, NJ $cBlackwell/BMJ Books$d2008 215 $a1 online resource (296 p.) 300 $aDescription based upon print version of record. 311 $a1-4051-5400-4 320 $aIncludes bibliographical references and index. 327 $aPreface; Foreword; About the Authors; SECTION 1 The Science of Diagnostic Testing and Clinical Decision Rules; Chapter 1 Diagnostic Testing in Emergency Care; Chapter 2 Evidence-Based Medicine: the Process; Chapter 3 The Epidemiology and Statistics of Diagnostic Testing; Chapter 4 Clinical Decision Rules; SECTION 2 Traumatic Injuries; Chapter 5 Cervical Spine Fractures; Chapter 6 Cervical Spine Fractures in Older Adults; Chapter 7 Cervical Spine Fractures in Children; Chapter 8 Blunt Abdominal Trauma; Chapter 9 Acute Knee Injuries; Chapter 10 Blunt Head Injury 327 $aChapter 11 Blunt Head Trauma in ChildrenChapter 12 Acute Ankle and Foot Injuries; Chapter 13 Occult Scaphoid Fractures; Chapter 14 Blunt Chest Trauma; Chapter 15 Occult Hip Fracture; SECTION 3 Cardiology; Chapter 16 Heart Failure; Chapter 17 Syncope; Chapter 18 Acute Coronary Syndrome; SECTION 4 Infectious Disease; Chapter 19 Serious Bacterial Infections and Occult Bacteremia in Children; Chapter 20 Bacterial Meningitis in Children; Chapter 21 Necrotizing Fasciitis; Chapter 22 Pharyngitis; Chapter 23 Infective Endocarditis; Chapter 24 Urinary Tract Infection; Chapter 25 Sinusitis 327 $aChapter 26 PneumoniaChapter 27 Spontaneous Bacterial Peritonitis; SECTION 5 Surgical and Abdominal Complaints; Chapter 28 Acute Nonspecific, Nontraumatic Abdominal Pain; Chapter 29 Bowel Obstruction; Chapter 30 Acute Pancreatitis; Chapter 31 Acute Appendicitis; Chapter 32 Acute Cholecystitis; SECTION 6 Urology; Chapter 33 Kidney Stones; Chapter 34 Testicular Torsion; SECTION 7 Neurology; Chapter 35 Subarachnoid Hemorrhage; Chapter 36 Acute Stroke; SECTION 8 Miscellaneous: Ophthalmology, Hematology, Rheumatology, and Pulmonology; Chapter 37 Pulmonary Embolism and Deep Vein Thrombosis 327 $aChapter 38 Temporal ArteritisChapter 39 Intraocular Pressure; Chapter 40 Asthma; Index 330 $aThis useful handbook provides a concise compilation of the evidence supporting diagnostic testing and clinical decision rules in emergency care. Clinical decision rules are now widely recognised as best practice for the ordering of diagnostic tests in the emergency department.Aimed at all physicians working with emergency and acute patients, the book begins with an overview of how to evaluate a diagnostic test using an evidence-based approach, followed by an explanation of the clinical decision rules and the methods of assessing the strength and applicability of the clinical prediction 606 $aEmergency medicine$xDiagnosis 606 $aEmergency medicine$xDecision making 606 $aEvidence-based medicine 615 0$aEmergency medicine$xDiagnosis. 615 0$aEmergency medicine$xDecision making. 615 0$aEvidence-based medicine. 676 $a616.02/5 676 $a616.025 700 $aPines$b Jesse M$0968701 701 $aEverett$b Worth W$0980924 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996208654503316 996 $aEvidence-based emergency care$92238532 997 $aUNISA LEADER 13168nam 22008775 450 001 9910746997303321 005 20250602172813.0 010 $a9783031431456 010 $a3031431456 024 7 $a10.1007/978-3-031-43145-6 035 $a(CKB)28305299600041 035 $a(MiAaPQ)EBC30755837 035 $a(Au-PeEL)EBL30755837 035 $a(DE-He213)978-3-031-43145-6 035 $a(PPN)272735876 035 $a(OCoLC)1401910496 035 $a(EXLCZ)9928305299600041 100 $a20230926d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCommunication, Networks and Computing $eThird International Conference, CNC 2022, Gwalior, India, December 8?10, 2022, Proceedings, Part II /$fedited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (330 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1894 311 08$a9783031431449 327 $aIntro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References. 327 $aBig Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions. 327 $a3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning. 327 $a1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction. 327 $a2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work. 327 $a3 Research Gaps. 330 $aThese two volumes constitute the selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2022, held in Gwalior, India, in December 2022. The 53 full papers were thoroughly reviewed and selected from the 152 submissions. They focus on the exciting new areas of wired and wireless communication systems, high-dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, vehicular technology and applications and electronic circuits for communication systems that promise to make the world a better place to live in. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1894 606 $aComputer engineering 606 $aComputer networks 606 $aArtificial intelligence 606 $aData structures (Computer science) 606 $aInformation theory 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aComputer Engineering and Networks 606 $aArtificial Intelligence 606 $aData Structures and Information Theory 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aArtificial intelligence. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 14$aComputer Engineering and Networks. 615 24$aArtificial Intelligence. 615 24$aData Structures and Information Theory. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 676 $a621.39 676 $a004.6 700 $aTomar$b Ranjeet Singh$01429332 701 $aVerma$b Shekhar$01429333 701 $aChaurasia$b Brijesh Kumar$01429334 701 $aSingh$b Vrijendra$01429335 701 $aAbawajy$b Jemal H$01429336 701 $aAkashe$b Shyam$01429337 701 $aHsiung$b Pao-Ann$0951873 701 $aPrasad$b Ramjee$0534854 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746997303321 996 $aCommunication, Networks and Computing$93568318 997 $aUNINA