<p><span>This book gathers selected papers presented at the Inventive Communication and Computational Technologies conference (ICICCT 2021), held on 25â26 June 2021 at Gnanamani College of Technology, Tamil Nadu, India. The book covers the topics such as Internet of things, social networks, mobile c
Advances in Computational Intelligence and Communication Technology: Proceedings of CICT 2021 (Lecture Notes in Networks and Systems, 399)
â Scribed by Xiao-Zhi Gao (editor), Shailesh Tiwari (editor), Munesh C. Trivedi (editor), Pradeep Kumar Singh (editor), Krishn K. Mishra (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 436
- Edition
- 1st ed. 2022
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book features high-quality papers presented at the International Conference on Computational Intelligence and Communication Technology (CICT 2021) organized by Janardan Rai Nagar Rajasthan Vidyapeeth, Udaipur, Rajasthan, India, and held from 29-30 October 2021. It includes the latest advances and research findings in fields of computational science and communication such as communication and networking, web and informatics, hardware and software designs, distributed and parallel processing, advanced software engineering, advanced database management systems and bioinformatics. It is of interest to research scholars, students, and engineers around the globe.
⌠Table of Contents
Preface
Contents
Editors and Contributors
Amazon Alexa and Its Challenges to Reach More Households
1 Introduction
2 Evolution of Alexa
3 Challenges to Retain Household and New Market Expansion
3.1 Investigation of Security Vulnerabilities in Voice Assistants like Alexa
3.2 Design of Voice Support Systems
3.3 Security Vulnerabilities in AlexaâFalse Authentication
3.4 Dolphin Attack Through Inaudible Voice Commands
4 Implementation Issues
5 Evaluation and Conclusion
5.1 Defense Mechanisms
5.2 Discussion and Analysis
6 Summary and Recommendations
References
Fake News Detection Through ML and Deep Learning Approaches for Better Accuracy
1 Introduction
2 Related Work
3 Proposed Approach
4 Experiments
5 Conclusion
References
Blockchain Technology Concepts, Applications and IssuesâA Survey
1 Introduction
2 Blockchain
2.1 Blockchain is Immutable
2.2 Blockchain is Decentralized
2.3 Smart Contracts
2.4 Consensus Protocols
2.5 Hashing
2.6 Wallet
2.7 Private Key
3 Digital Ledger
3.1 Working of Blockchain
4 Applications of Blockchain
4.1 Blockchain Used in WSN
4.2 Blockchain in Agriculture
5 Conclusion
References
EEG and ECG-based Drowsiness Detection: A Review on State of the Art
1 Introduction
2 Literature Review
3 Methodology
4 Conclusion
5 Future Scope
References
Attendance Management System Using Face Recognition
1 Introduction
2 Literature Survey
2.1 RFID-Based System
2.2 IRIS Scan-Based System
2.3 Fingerprints-Based System
3 Proposed Methodology
3.1 Image Acquisition
3.2 Face Detection
3.3 Image Preprocessing
3.4 Feature Extraction
4 Results
5 Conclusion and Future Scope
References
Recommendation System: Posts Filtering in a Women Empowerment Platform
1 Introduction
2 Literature Survey
2.1 Content-Based Model
2.2 Collaborative Filtering (Cf)
2.3 Knowledge-Based Filtering
2.4 Hybrid Filtering
3 Proposed Solution
4 Result
5 Conclusion
References
Evoting Using Blockchain Technology
1 Introduction
1.1 Paper Ballots
1.2 Less Eco-Friendly
1.3 Time Taken to Announce Results
2 EVM Machines
2.1 VVPAT
2.2 Increased Cost
2.3 Danger of Tampering
2.4 Time for Result
3 What is Blockchain
4 How is Blockchain Used in Evoting
5 Phases of Evoting Using Blockchain (Explained with the Help of Flowcharts)
5.1 Registration Phase
6 Voting Phase
7 Tools and Technologies Used
7.1 Hardware Requirements
7.2 Software Requirements
8 Advantages of Evoting Using Blockchain Over Other Systems
8.1 Auditability
8.2 Transparency
8.3 Immutability
8.4 No Risk of Hackin
8.5 Secure and Hassle-Free
8.6 No Cost of Resources
8.7 No Need to Go to Polling Booths
8.8 Reliability
8.9 No Fraudulent Practices
8.10 Immediate Result Declaration
8.11 Environment-Friendly
8.12 No Labor Cost for Voting
9 Conclusion
References
Conversion of Sign Language into Devanagari Text Using CNN
1 Introduction
2 Literature Review
3 Problem Statement
4 Objectives of Research
5 Methodology
5.1 Dataset Generation
5.2 Gesture Classification
5.3 Training and Testing
6 Results and Discussions
7 Conclusion and Future Scope
References
Extract It! Product Category Extraction by Transfer Learning
1 Introduction
1.1 Our Contribution
2 Related Works
3 Dataset
4 Methodology
4.1 Preprocessing
4.2 Feature Selection
4.3 Predicting the Taxonomy Tree
5 Results
6 Conclusion
References
Readability of Websites for the Novel Coronavirus Disease (COVID-19): A Case Study of India
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Threat to Validity
6 Conclusion
References
ReMeDi: Secure Electronic Health Records Sharing Using Blockchain
1 Introduction
2 Literature Review
3 Methodology Used for Framework
4 Performance
5 Conclusion and Future Works
References
Identification of 5G Network Complexity Using SDN
1 Introduction
2 SDN-enabled Wireless World
2.1 SDN Architecture and Protocol
2.2 Architectural Characteristics of 5G
3 Cellular Network Integration in SDN
3.1 SDN-Based Cellular Network Architecture
3.2 SDN-Based Cellular Network Management
4 Proposed Methodology
5 Discussion and Open Issues
6 Conclusion
References
Estimation of Dynamic Fault Currents of Microgrids Using Generalized Regression Neural Network
1 Introduction
2 Estimation of Dynamic Fault Currents
2.1 Block diagram
2.2 Model Explanation
3 Methodology
4 Result
5 Conclusion
References
Enhanced Video Articulation (EVA)âAÂ Lip-Reading Tool
1 Introduction
2 Related works on lip-reading
2.1 Video Resolution Enhancement
3 Lip-Reading
4 AudioâVideo Speech Recognition
5 Dataset Description
6 Proposed model
7 Video Enhancement
8 Labial Segmentation
9 Articulation
10 Result
11 Application
12 Conclusion
References
Technology Applications in Education, Applications of Accelerometer Wearable Sensor and Internet User Gender Predictionâand FDI Attraction for Digital Sector
1 Overview
2 Research Approach and Methods
3 Research Results
3.1 Technology Application
3.2 Technology Application
3.3 Assessing the Impact of FDI on Industry Growth
4 Conclusions
References
The ICT Impact on Bank Performance: The Case of Vietnam
1 Introduction
2 Literature Review
3 Research Methodology and Result Discussion
3.1 Research Models
3.2 Data
4 Results and Discussions
5 Conclusions and Recommendations
References
Technology Devices in Sport Education, Technology Applications with Wearable Sensor and Accelerometer in Physical ExercisesâAnd Ho Chi Minh and Lenin Ideologies on Physical Exercise for the Youth
1 Overview
2 Research Approach and Methods
3 Main Findings
3.1 Technology Devices and Applications in Sports
3.2 Technology Applications in Sports and Physical Exercises
3.3 Ho Chi Minh and V. I Lenin Ideologies on Physical Exercises
4 Conclusions
References
Applications of Statistic Softwares, IT and Artificial IntelligenceâA Research Case on ByPass Behavior of Patients at Vietnam Hospitals
1 Introduction
2 Theoretical Framework
2.1 Relationship Between Reference Group and Perceived Behavioral Controls
2.2 Relationship Between Peripheral Factors (Ngoấi Biến) and Self-transfer to Higher-Hospitals
3 Research Methods
4 Research Results
4.1 Artificial Intelligence and Information Technology Applying in Hospitals
4.2 Positive Factor Analysis (CFA) Testing Models
5 Discussion
5.1 Research Results Discussion
5.2 Limitations and Future Research Recommendations
References
Applications of IOTS, Internet Data, and Artificial Intelligence in Building Better Management Information System (MIS) in Banking Activities in Vietnam
1 Introduction
2 Literature Review
2.1 Previous Studies
3 Methodology
4 Main Findings
4.1 Overview of Results
5 Discussion and Conclusion
6 Recommendations for Better MIS
References
COVID-19 Regulation Analysis Using Deep Learning
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Preprocessing
3.2 Tracking and Monitoring
3.3 Distance Calculation
4 Results
5 Conclusion and Future Enhancement
References
Critical Data Capturing of Dual Mobile Data Collectors in WSN
1 Introduction
2 Literature Survey
2.1 LEACH Protocol
2.2 Mobile Data Collectors in WSN
2.3 Tour Planning for Mobile Data Collector
2.4 Dynamic Deadline in WSN Was also Investigated Upon
3 Proposed Methodology
3.1 Network Model and Assumptions
3.2 Proposed Data Collection
4 Results and Discussion
5 Conclusion
References
Improved Congestion Control in Wireless Sensor Networks Using Meta-Heuristic Approach
1 Introduction
2 Related Work
3 Proposed Methodology and Description
4 Results and Discussion
4.1 Performance Metrics
5 Conclusion
References
Financial Technology Development Around the World and Lessons for Emerging Markets
1 Introduction
2 Methodology
3 Main Findings
4 Discussion and Conclusion
References
Performance Comparison of Brain Tumor Segmentation Algorithms
1 Introduction
2 Analysis of Various Segmentation Techniques
3 Result and Discussion
4 Conclusion
References
AROSTEV: A Unified Framework to Enhance Secure Routing in IoT Environment
1 Introduction
2 Structure of AROSTEV Framework
3 Components of the AROSTEV Framework
3.1 RDAID
3.2 RIAIDRPL
3.3 E2V
3.4 RPL-REPAIR
4 Components of the AROSTEV Framework
5 Simulation Results
6 AROSTEV: Deploying in Smart City Application
7 Conclusion
References
Early Prediction of Hydrocephalus Using Data Mining Techniques
1 Introduction
2 Methodology
2.1 Image Preprocessing
2.2 Segmentation
2.3 Feature Extraction
2.4 Classification
3 Discussions and Experimental Results
3.1 Preprocessing
3.2 Segmentation
3.3 Feature Extraction
3.4 Classification
4 Conclusion
References
An Insight View on Denial of Service Attacks in Vehicular Ad Hoc Networks
1 Introduction
1.1 Vehicle-to-Vehicle (V2V) Communication
1.2 Vehicle-to-Infrastructure (V2I) Communication
1.3 Hybrid Architecture (V2VâV2I)
2 Literature Survey
3 Denial of Service Attack (DoS)
4 Various Solutions for DoS Attack in VANET
4.1 Quick Response Tables (QRT)
4.2 ReCAPTCHA Controller Mechanism
4.3 Spoofed IP Addresses (SIPA)
4.4 Prediction-Based Authentication (PBA)
4.5 Ant Colony Optimization
4.6 IP Check
4.7 FastAuth and SelAuth
5 Comparison Between Various Solutions for DoS in VANET
6 Conclusion
References
Cloud-Based ETL and AD Impression Prediction and Insight Visualization Using Tableau
1 Introduction
2 Literature Survey
3 Proposed System
4 Result and Discussion
5 Conclusion and Future Enhancement
References
Object Recognition and Multiple Image Stitching
1 Introduction
1.1 Multiple Image Stitching
2 Literature Review
3 Existing Work
3.1 Image Registration
4 Proposed Methodology
4.1 Ground Station for Distributed Processing
4.2 Image Acquisition
4.3 Linux Samba Share
4.4 YOLO Dataset
4.5 ImageAI
4.6 Improved Stitching Method
4.7 Algorithm
4.8 Object Recognition Using ImageAI
4.9 Comparison with Other Models
5 Conclusion and Future Enhancement
References
An Efficient Approach for Analysis and Segmentation of Plants Diseases Using Machine Learning
1 Introduction
2 Related Works
3 Some Effects of Bacterial/Fungal/Viral Diseases in Plants
4 Proposed System
5 Methodologies
5.1 Image Acquisition
5.2 Image Preprocessing and Enhancement
5.3 Image Segmentation
5.4 RGB Color Wheel
5.5 Hue Saturation Value (HSV)
5.6 BPNN and PatternNet
5.7 Input and Output Model
6 Conclusion and Future Enhancement
References
Impact of Scheduling Algorithms of Wireless Network Control System
1 Introduction
2 WNCS and Its Applications
2.1 Applications of WNCS
3 Design Techniques and Scheduling Algorithm for Wireless Control System
3.1 Interactive Design Techniques
3.2 Joint Design Techniques
3.3 Scheduling Algorithm
3.4 Observations
4 Conclusion
References
Scientific Exploration of Conceptual and Algorithmic Terminologies of Machine Learning
1 Introduction
2 Present Research Demands of ML
3 Category Divergence of ML Algorithms
4 Future Scope
5 Conclusion
References
Deep Learning in Human Activity Recognition from Videos: A Survey
1 Introduction
2 Literature Review
3 Comparative Study
4 Conclusion
References
Image Compression Using Vector Quantization
1 Introduction
2 Vector Quantization
2.1 Preliminaries
2.2 Design Problem
2.3 Optimality Criteria
3 Vector Quantizer in Compression
3.1 Search Engine Working in Encoder
4 Conclusion
References
Adaptive Bat Optimization Algorithm for Efficient Load Balancing in Cloud Computing Environment
1 Introduction
2 Proposed Methodology
2.1 System Model
2.2 Request Migration Model
2.3 Independent and Dependent Task Using Server Availability
2.4 Load Balancing Using ABOA Algorithm (LB-ABOA)
3 Experimental Result
4 Conclusion
References
Modified Gabor Filter with Enhanced Naïve Bayes Algorithm for Facial Expression Recognition in Image Processing
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Image Dataset
3.2 Image Acquisition
3.3 Image Preprocessing
3.4 Feature Extraction Using Modified Gabor Filters (MGFs)
3.5 FER Classification Using Enhanced NaĂŻve Bayes Algorithm (ENBA)
4 Experimental Result
5 Conclusion
References
A Deep Neural Network (DNN) Approach for Recommendation Systems
1 Introduction
2 Proposed Methodology
2.1 Recommendation Service Process
2.2 Feature Representation
2.3 Deep Neural Network (DNN)
2.4 Training Model
3 Results and Discussion
4 Conclusion and Future Work
References
Improved Ant Colony Optimization for Optimal Resource Utilization in Cloud Computing
1 Introduction
2 Proposed Methodology
2.1 Resource Monitoring
2.2 Capacity Distribution
2.3 Task Allocation
2.4 Optimizer
2.5 Optimizer Analyses Load on Physical Machine Using Improved Ant Colony Optimization
3 Result and Discussions
4 Conclusion and Future Work
References
An Improved K-Means Clustering with Convolutional Neural Network for Financial Crisis Prediction
1 Introduction
2 Related Work
2.1 Improved K-Means Clustering
2.2 Convolutional Neural Network (CNN) for Financial Crisis Prediction
3 Experimental Results
4 Conclusion
References
An Empirical Analysis of Multilayer Perceptron Based on Neural Network using Image Segment Dataset
1 Introduction
2 Literature Survey
3 Methodology
3.1 Back Propagation Algorithm
4 Results
4.1 Image Segment Dataset
5 Discussion and Conclusion
References
Brain Tumor Classification into High-Grade and Low-Grade Gliomas Using Adaboost
1 Introduction
2 Related Work
3 Proposed Work
4 Results
5 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<span>This book gathers selected research papers presented at the Third International Conference on Communication and Intelligent Systems (ICCIS 2021), organized by National institute of Technology, Delhi, India, during December 18â19, 2021. This book presents a collection of state-of-the-art resear
<p><p>This book features high-quality papers presented at the International Conference on Computational Intelligence and Communication Technology (CICT 2019) organized by ABES Engineering College, Ghaziabad, India, and held from February 22 to 23, 2019. It includes the latest advances and research f
<p><span>This book gathers high-quality papers presented at the Sixth International Conference on Smart Trends in Computing and Communications (SmartCom 2022), organized by Global Knowledge Research Foundation (GR Foundation) in partnership with IFIP InterYIT during January 11â12, 2022. It covers th
<span>This book gathers selected papers presented at the 7th International Conference on Inventive Communication and Computational Technologies conference (ICICCT 2023), held on May 22â23, 2023, at Gnanamani College of Technology, Tamil Nadu, India. The book covers the topics such as Internet of thi
<span>This book gathers selected papers presented at the 7th International Conference on Inventive Communication and Computational Technologies conference (ICICCT 2023), held on May 22â23, 2023, at Gnanamani College of Technology, Tamil Nadu, India. The book covers the topics such as Internet of thi