<p><span>This book includes selected papers presented at the 4th International Conference on Data Engineering and Communication Technology (ICDECT 2020), held at Kakatiya Institute of Technology & Science, Warangal, India, during 25â26 September 2020. It features advanced, multidisciplinary rese
Advances in Data Computing, Communication and Security: Proceedings of I3CS2021 (Lecture Notes on Data Engineering and Communications Technologies, 106)
â Scribed by Pankaj Verma (editor), Chhagan Charan (editor), Xavier Fernando (editor), Subramaniam Ganesan (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 703
- Edition
- 1st ed. 2022
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book is a collection of high-quality peer reviewed contributions from the academicians, researchers, practitioners, and industry professionals, accepted in the International Conference on Advances in Data Computing, Communication and Security (I3CS2021) organized by the Department of Electronics and Communication Engineering in collaboration with the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India during 08-10 Sep 2021. The fast pace of advancing technologies and growing expectations of the next-generation requires that the researchers must continuously reinvent themselves through new investigations and development of the new products. The theme of this conference is devised as "Embracing Innovations" for the next-generation data computing and secure communication system.
⌠Table of Contents
List of Advisory and Board Members
Preface
Acknowledgements
Contents
About the Editors
Data Computing
OntoIntAIC: An Approach for Ontology Integration Using Artificially Intelligent Cloud
1 Introduction
2 Related Works
3 Proposed System Architecture
4 Implementation and Performance Evaluation
5 Conclusions
References
Identifying the Most Frequently Used Words in Spam Mail Using Random Forest Classifier and Mutual Information Content
1 Introduction
2 Background and Existing Work
2.1 Spam Email Detection
2.2 Feature Extraction and Selection
2.3 Mutual Information Gain
3 Proposed Algorithm
4 Results and Discussion
5 Conclusions
References
Comparative Analysis of Intelligent Learning Techniques for Diagnosis of Liver Tumor from CT Images
1 Introduction
2 Literature Review
2.1 Analysis of Machine Learning Techniques for Liver Tumor Detection from CT Images
2.2 Analysis of Deep Learning Techniques for Liver Tumor Detection from CT Images
2.3 Analysis of Transfer Learning Techniques for Liver Tumor Detection from CT Images
3 Comparative Analysis of Intelligent Learning Techniques for Diagnosis of Liver Tumor from CT Images
4 Intelligent Algorithms for Liver Tumor Detection
4.1 Otsuâs Thresholding Method
4.2 Weighted SVM
4.3 Hybridized Fully Convolutional Neural Network
5 Evaluation of Related Research
5.1 Implementation of Existing Methods
6 Conclusion
References
A New Model for COVID-19 Detection Using Chest X-ray Images with Transfer Learning
1 Introduction
1.1 Screening Through X-ray
2 Literature Review
3 Data Preprocessing
4 Methods and Model Development
4.1 Transfer Learning by Freezing Starting Layers of Pre-trained Model
4.2 Selection of Model
4.3 Training and Testing of Proposed Model
4.4 Proposed Classifier (Head) Architecture
5 Result
5.1 Comparison of Base Model with Fine-Tuned Proposed Model
5.2 Comparison with Existing Work
6 Conclusion
References
Violence Detection in Videos Using Transfer Learning and LSTM
1 Introduction
2 Literature Review
3 Proposed Work
3.1 Datasets
3.2 Preprocessing
3.3 Training and Classification
3.4 System Specifications
4 Results and Analysis
4.1 Model Performance
4.2 Graphs
4.3 Comparison with Previous Work
5 Future Work
6 Conclusion
References
Kernel Functions for Clustering of Incomplete Data: A Comparative Study
1 Introduction
2 Kernel Version of FCM Algorithm
2.1 Review of Fuzzy c-Means (FCM) Clustering
2.2 Review of Kernel Fuzzy c-Means (KFCM)
3 Proposed Methodology
4 Numerical Analysis
5 Conclusion
References
Neuroimaging (Anatomical MRI)-Based Classification of Alzheimerâs Diseases and Mild Cognitive Impairment Using Convolution Neural Network
1 Introduction
2 Types of Neurodegenerative Diseases (ND)
3 Motivation
4 Deep Learning Applications
5 Material and Method
6 Result and Discussion
7 Conclusion
References
Design and Implementation of Stop Words Removal Method for Punjabi Language Using Finite Automata
1 Introduction
2 Related Work
3 Classical Corpus-based Stop Words Removal Approach
4 Proposed Finite Automata-based Approach for Stop Words Removal
5 Implementation and Result Analysis
6 Conclusion and Future Scope
References
Meticulous Presaging Arrhythmia Fibrillation for Heart Disease Classification Using Oversampling Method for Multiple Classifiers Based on Machine Learning
1 Introduction
2 Related Work
3 Proposed Methods and Material
3.1 Dataset
3.2 Proposed Methodology
3.3 Arrhythmia ECG Methodologies for Proposed Work
4 Experimental Results and Discussions
5 Conclusion
References
Unsupervised Modeling of Workloads as an Enabler for Supervised Ensemble-based Prediction of Resource Demands on a Cloud
1 Introduction
2 Related Work
3 Proposed Method
3.1 Pre-processing
3.2 Gaussian-based Unsupervised Learning
3.3 Window-based Feature Engineering
3.4 Building a Classifier for Prediction of Utilization Profiles
3.5 Workload Forecasting
4 Experimental Procedure
4.1 Experimental Setup
4.2 Analyzing the Gaussian-based Framework
4.3 Building a Classifier Model
4.4 Workload Forecasting
5 Conclusion and Future Work
References
A Technique to Find Out Low Frequency Rare Words in Medical Cancer Text Document Classification
1 Introduction
1.1 Challenges of Medical Text Data in Classification Task
2 Background
3 Research Gap
4 Proposed Algorithm for Rare Word Finding
4.1 Dynamic Threshold Determination for Finding Rare Words
4.2 Dictionary-Based Rare Words Matching
5 Experimental Results
5.1 Datasets
5.2 Rare Words
5.3 Threshold Values Versus Sample Size
5.4 Proposed Method Evaluation
6 Conclusion
References
Image-Based Spammer Analysis Using Suitable Features Selection by Genetic Algorithm in OSNs
1 Introduction
2 Related Work
3 Proposed System Architecture
3.1 Genetic Algorithm for Suitable Feature Selection
3.2 Steps for Genetic Algorithm
4 Experimental Analysis and Result
4.1 Graphical Analysis of Results
4.2 Comparative Analysis with Other Existing Approaches
5 Conclusion and Future work
References
An Improved Firefly Algorithm Based Cluster Analysis Technique
1 Introduction
2 Background
3 Firefly Algorithm and Its Proposed Variant
3.1 Traditional Firefly Algorithm
3.2 Proposed Improvements in Firefly Algorithm (IFA)
4 Improved Firefly Algorithm (IFA) as Clustering Technique
5 Results and Discussions
5.1 Comparison Between FA and IFA Using Standard Benchmark Functions
5.2 Performance Evaluation as Clustering Technique
5.3 Statistical Analysis of Proposed Clustering Algorithm
6 Conclusions and Future Scope
References
Stock Market Analysis of Beauty Industry During COVID-19
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 Preprocessing and Feature Engineering
3.3 Deep Learning Model
3.4 Performance Evaluation
4 Results
5 Conclusion
References
An OWA-Based Feature Extraction and Ranking for Performance Evaluation of the Players in Cricket
1 Introduction
2 OWA
3 Proposed Approach
4 Data Collection and Feature Selection
5 Results and Discussions
6 Performance Evaluation
7 Conclusion
References
Cardiac Problem Risk Detection Using Fuzzy Logic
1 Introduction
2 Diagnostic Tools for Cardiac Issues
3 Proposed Fuzzy Expert System
3.1 Fuzzy Expert System Design
3.2 Rule Base
3.3 Defuzzification
4 Results
5 Conclusion
References
Deep Learning Approach for Motor-Imagery Brain States Discrimination Problem
1 Introduction
1.1 Contribution
1.2 Organization
2 Related Study
2.1 Feature Selection and Extraction
2.2 Classifier Selection
3 Background
3.1 Signal Portioning
3.2 Elliptic Filtration
3.3 Discrete Wavelet Transform
3.4 Alpha Beta Filtration
3.5 Selection and Processing of Electrode Signals
4 Proposed Approach
4.1 Convolutional Neural Network
4.2 Proposed Architecture
5 Result and Analysis
6 Conclusion
References
Automated Diagnosis of Breast Cancer: An Ensemble Approach
1 Introduction
2 Related Work
3 Dataset Analysis
4 Proposed Framework
4.1 Classification Models
5 Simulation Results
5.1 Comparison of SVMs
5.2 Results Achieved by the Proposed Approach
6 Conclusion
References
Survey on Formation Verification for Ensembling Collective Adaptive System
1 Introduction
2 Collective Adaptive Systems (CAS)
3 Formation for CAS
4 Ensemble Frameworks for CAS Formation
5 Verification Tool for CAS Formation
6 Related Works
7 Conclusion
References
An Inquisitive Prospect on the Shift Toward Online Media, Before, During, and After the COVID-19 Pandemic: A Technological Analysis
1 Introduction
2 Literary Work
3 Role of Online (Digital) Mediums in COVID-19 Pandemic
4 Comparative Analysis and Visualization of Data
4.1 Based on Worldwide Ranking of E-Learning Platforms
4.2 Monthly Visitors at E-Learning Platforms
4.3 Expected Number of Online Media Users by 2031
4.4 Shortcomings of Using the Online Form of Media
5 Conclusion
References
A Comparative Study of Learning Methods for Diabetic Retinopathy Classification
1 Introduction
2 Related Works
3 Proposed Model
3.1 Data Set Description
3.2 Pre-processing
3.3 Training with Convolutional Layers
3.4 Developed Models
4 Results and Discussion
5 Conclusion and Future Scope
References
CNN for Detection of COVID-19 Using Chest X-Ray Images
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Dataset
3.2 Model Formulation
3.3 Proposed Algorithm
4 Experimental Results and Discussions
5 Conclusion and Future Scope
References
Crop Yield Prediction Using Weather Data and NDVI Time Series Data
1 Introduction
2 Literature Survey
2.1 Crop Yield Prediction Using Weather Data
2.2 Crop Yield Prediction Using Remote Sensing Data
3 Data Set
4 Yield Prediction Model
4.1 Data Set Preprocessing
4.2 Training and Testing
5 Experimental Results and Analysis
6 Conclusion
References
Automated Multiple-Choice Question Creation Using Synonymization and Factual Confirmation
1 Introduction
2 Related Work
3 Proposed Architecture
4 Implementation and Performance Evaluation
5 Conclusion
References
EASDisco: Toward a Novel Framework for Web Service Discovery Using Ontology Matching and Genetic Algorithm
1 Introduction
2 Related Works
3 Proposed Architecture
4 Implementation
5 Performance Evaluation and Result
6 Conclusion
References
An Approach Towards Human Centric Automatic Ontology Design
1 Introduction
2 Related Work
3 Proposed Architecture
4 Implementation
5 Conclusion
References
A Review on Dataset Acquisition Techniques in Gesture Recognition from Indian Sign Language
1 Introduction
2 Overview of Techniques and Discussion
3 Observation and Conclusion
4 Future Directions on Research
References
OntoReqC: An Ontology Focused Integrative Approach for Classification of Software Requirements
1 Introduction
2 Related Work
3 Proposed System Architecture
4 Implementation
5 Results and Performance Evaluation
6 Conclusions
References
SemUserProfiling: A Hybrid Knowledge Centric Approach for Semantically Driven User Profiling
1 Introduction
2 Related Works
3 Proposed System Architecture
4 Implementation
5 Results and Performance Evaluation
6 Conclusions
References
Prediction of Stroke Disease Using Different Types of Gradient Boosting Classifiers
1 Introduction
1.1 Motivation and Objective
2 Literature Review
3 Methodology
3.1 Dataset Interpretation
3.2 Data Preprocessing
3.3 Boosting Classifiers
4 Results and Discussion
4.1 Results of Correlation
4.2 Evaluation of Performance
5 Conclusion and Future Scope
References
Bi-objective Task Scheduling in Cloud Data Center Using Whale Optimization Algorithm
1 Introduction
2 Literature Survey
3 Models and Descriptions
3.1 Cloud Model
3.2 Task Model
3.3 Throughput
3.4 Energy Model
4 Problem Statement
4.1 Encoding of the Solution
5 Proposed Scheduling Technique
6 Simulation and Results
7 Conclusion and Future Work
References
NDVI-Based Raster Band Composition for Classification of Vegetation Health
1 Introduction
1.1 Normalized Difference Vegetation Index (NDVI)
2 Literature Review
3 Study Area
4 Dataset and Technology Used
4.1 Satellite Data
4.2 Procurement of Satellite Images
4.3 Processing of Landsat Data Using SAGA
5 Results and Discussion
5.1 Visual NDVI Jupyter Notebook
5.2 Extracting NDVI Bands from TIFF Images
5.3 Change in Categorical NDVI Values
6 Conclusion and Future Scope
References
FAMDM: An Approach to Handle Semantic Master Data Using Fog-based Architecture
1 Introduction
2 Brief History
3 Proposed FAMDM Technique
4 Results and Discussion
5 Conclusion and Future Scope
References
A Smart Mobile Application for Stock Market Analysis, Prediction, and Alerting Users
1 Introduction
2 Background and Related Works
3 Mobile Application for Stock Market Analysis and Alert
3.1 Proposed System
3.2 Working Methodology
4 Mobile Application Implementation Details
4.1 Software Details
5 Results and Discussion
6 Conclusion and Future Work
References
Impact of Blockchain Technology on the Development of E-Businesses
1 Introduction
1.1 E-Business
1.2 Blockchain Technology
2 Focus Areas of Blockchain Technology in Canada
3 Blockchain in E-Businesses
4 Traditional Supply Chain Versus Blockchain Supply Chain
5 Future of Blockchain Technology
6 Conclusion
References
Automatic Audio and Video Summarization Using TextRank Algorithm and Convolutional Neural Networks
1 Introduction
2 Related Works
3 Proposed Approach
3.1 Audio and Video to Text
3.2 NLP-Based Text Summarization
3.3 CNN-Based Text Summarization
4 Implementation Details
4.1 Audio and Video to Text Conversion
4.2 NLP-based Text Summarization
4.3 CNN-based Text Summarization
4.4 Extract and Merge Audio and Video
5 Results
6 Conclusion
References
Dealing with Class Imbalance in Sentiment Analysis Using Deep Learning and SMOTE
1 Introduction
2 Methods and Materials
2.1 Dataset
2.2 SMOTE Algorithm
2.3 Deep Learning Models
3 Results and Discussion
4 Conclusion and Future Work
References
Classification of Machine Learning Algorithms
1 Introduction
2 Machine Learning
3 Machine Learning Algorithms
3.1 Supervised Algorithms
3.2 Unsupervised Learning
3.3 Semi-Supervised Learning
4 Discussion and Conclusion
References
Performance Analysis of Object Classification System for Traffic Objects Using Various SVM Kernels
1 Introduction
2 Literature Review
3 Methodology
4 Results
5 Conclusion
6 Future Scope
References
Analysis and Prediction of Liver Disease for the Patients in India Using Various Machine Learning Algorithms
1 Introduction
1.1 The Role Machine Learning in Liver Disease Perception
1.2 COVID-19 and Acute Liver Disease
2 Literature Survey
3 Materials and Methods
3.1 Data Collection
3.2 Data Preprocessing
3.3 Classification Using Machine Learning Algorithms
3.4 Data Visualization
3.5 Results and Discussion
4 Conclusion
References
Vision-Based Human-Following Robot
1 Introduction
2 Applications
3 Related Works
4 Proposed Approach
5 Initialization and Configuration
6 Tracking Approach
7 Obstacle Avoidance
8 Target Moves Out of Line of Sight
9 Conclusion
References
MRI Cardiac Images Segmentation and Anomaly Detection Using U-Net Convolutional Neural Networks
1 Introduction
2 Functional Scope of Work
3 Image Segmentation
3.1 Image Preprocessing
3.2 Data Augmentation
3.3 Deep Learning Algorithm for Segmentation
3.4 Sematic Segmentation
3.5 U-Net Implementation
4 Results
4.1 Experimental Setup
4.2 Volume Prediction Using Pixel Classification
4.3 Analysis
4.4 Calculation of Ejection Fraction
5 Conclusion
References
Communication
GSM-Based Smart Marine Tracking System for Location Monitoring and Emergency Protection
1 Introduction
2 Marine Tracking System
3 Hardware and Software Description
3.1 Advantages of Proposed Method
3.2 Application of Proposed Method
4 Conclusion
References
Defected Ground UWB Antenna for Microwave Imaging-Based Breast Cancer Detection
1 Introduction
2 Antenna Design and Simulation Setup
3 Result and Analysis
4 Antenna Performance Analysis for Microwave Imaging
5 Conclusions
References
Impact of Beam Formation on 5G Mobile Communication Network in mmWave Frequency Band
1 Introduction
2 Related Work
3 Methodology
3.1 Uniform Linear Array
3.2 Uniform Rectangular Array
4 Results
4.1 2D-Simulation of ULA
4.2 3D-Simulation of ULA
4.3 3D-Simulation of URA
5 Conclusions
References
Multi-transform 2D DCT Architecture Supporting AVC and HEVC Video Codec
1 Introduction
2 Methodology
2.1 Advance Video Coding (AVC)
2.2 High Efficiency Video Coding (HEVC)
2.3 Multi-transform Architecture
2.4 2D Integer DCT
2.5 Transpose Buffer
2.6 Computational Complexity
3 Results and Discussion
4 Conclusion
References
Performance Analysis of SDN-Inspired Swarm Intelligence-Based Routing Optimization Algorithm in Vehicular Network
1 Introduction
2 Related Works
3 Swarm Intelligence in VANET Routing
3.1 Architecture of Path Routing Source
3.2 Proposed Routing Methodology
4 Experimental Setup
5 Result Analysis
6 Conclusion
References
Blending of Window Functions in Sonar Array Beamforming
1 Introduction
2 Geometry and Methodology for Simulation
2.1 Window Functions and Beam Patterns
3 Product Beamforming Methodology
3.1 Null Steered Product Beamforming
4 Tolerance of the Method to Array Deformation
5 Conclusion
References
Photonic Crystal Fiber Based Refractive Index Sensor for Cholesterol Sensing in Far Infrared Region
1 Introduction
2 Insight Geometry of the PCF
3 Numerical Results and Analysis
4 Conclusion
References
An Efficient, Low-Cost, and Reliable Monostatic Microwave Imaging (MWI) Approach for the Detection of Breast Tumor Using an Ultra-Wideband Dielectric Resonator Antenna
1 Introduction
2 Configuration of the Proposed DRA Structure
2.1 Design Procedure Followed to Attain the Desired UWB Characteristics
2.2 S-parameter Responses
2.3 Broadband Gain and Voltage Standing Wave Ratio (VSWR) Plots
2.4 D Radiation Pattern Plots
2.5 Power Components for the Proposed DRA
2.6 Radiation Efficiency
3 Monostatic MWI Setup and Reconstruction of the 2D Image of Breast
3.1 Delay and Sum (DAS)
3.2 Delay Multiply and Sum (DMAS)
4 Conclusion
References
Effect of Link Reliability and Interference on Two-Terminal Reliability of Mobile Ad Hoc Network
1 Introduction
2 Literature Review
3 Assumptions
4 Methodology
5 Illustrative Example
6 Algorithm
7 Simulation Results
8 Conclusion
References
Security
User Information Privacy Awareness Using Machine Learning-Based Tool
1 Introduction
2 Literature Survey
3 Methodology
3.1 Preparation of Dataset
3.2 Applying Preprocessing and Splitting Data
3.3 Classification
4 Proposed Solution
4.1 Analysing Privacy Policy
4.2 Readability Score
5 Results and Discussion
5.1 Screenshots
6 Conclusions and Future Scope
References
Target Node Protection from Rumours in Online Social Networks
1 Introduction
1.1 Rumour in Social Networks
1.2 Rumour Diffusion Model
1.3 Rumour Containment in Social Networks
2 Related Work
3 Problem Statement
4 Proposed Methodology
4.1 Algorithms for Spread of Positive Information
5 Experiments and Results
6 Conclusion and Future Work
References
Risk Detection of Android Applications Using Static Permissions
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Experimental Results
5 Conclusion
References
Cryptography-Based Efficient Secured Routing Algorithm for Vehicular Ad Hoc Networks
1 Introduction
2 Related Work
3 Proposed Model and VANET Scenario
3.1 System Model
3.2 Working and Assumptions of System Model with Proposed Algorithm
3.3 Proposed Algorithm (ESRA)
4 Implementation of Proposed Efficient Secure Routing Algorithm (ESRA)
4.1 Simulation Scenarios and Parameters
4.2 Result for Network Performance Metrics
4.3 Result for Security Performance Metrics
5 Conclusion
References
An Efficient Feature Fusion Technique for Text-Independent Speaker Identification and Verification
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Feature Extraction
3.2 Feature Classification Using Supervised ML Classifiers
3.3 Proposed Feature Fusion Technique
4 Performance Analysis
5 Conclusion
References
Identifying Forged Digital Image Using Adaptive Over Segmentation and Feature Point
1 Introduction
2 Traditional DWT-Based Method and Its Drawbacks
2.1 Drawbacks of the DWT-Based Method
2.2 Motivation
3 Proposed Method
3.1 Over Segmentation
3.2 Algorithms Used in the Proposed System
4 Experimental Results
5 Conclusion
References
A Granular Access-Based Blockchain System to Prevent Fraudulent Activities in Medical Health Records
1 Introduction
2 Blockchain Technology with Health Care
3 Related Study
3.1 Healthcare Approach
3.2 Healthcare Information System
4 Proposed Work
5 Implementation Details and Results
6 Comparing Proposed Framework with Existing Framework
7 Conclusion
References
Suspicious Activity Detection in Surveillance Applications Using Slow-Fast Convolutional Neural Network
1 Introduction
2 Related Work
3 Proposed Model
3.1 Dataset Description
3.2 Data Exploration and Preprocessing
3.3 Training Using Slow-Fast CNN
4 Experimental Results and Discussion
5 Conclusion and Future Scope
References
Licence Plate Recognition System for Intelligence Transportation Using BR-CNN
1 Introduction
2 Related Work
3 The Proposed BR-CNN Model
3.1 Licence Plate Localisation and Detection Process
3.2 Image Pre-processing and Segmentation
3.3 CNN-Based Recognition Process
4 Performance Evaluation
4.1 Implementation Detail
4.2 Classical Measurements
5 Conclusion
References
VLSI Design and Materials
First Principle Study of Mechanical and Thermoelectric Properties of In-Doped Mg2Si
1 Introduction
2 Computational Method
3 Results and Discussion
4 Conclusion
References
Design and Analysis of Area and Energy-Efficient Quantum-Dot Half Adder Using Intercellular Interaction Technique
1 Introduction
2 Background
2.1 Quantum-Dot Cellular Automata
2.2 Half Adder
2.3 Design Modeling Software
3 Proposed Work
4 Discussions
5 Conclusion
References
Observation of Proposed Triple Barrier δ-Doped Resonant Tunneling Diode
1 Introduction
2 Proposed Device Structure and Simulation Model
3 Characterization and Discussion
3.1 Simulate LDOS Ď(z,E) for Nanostructured Triple Barrier RTD
3.2 Transmission Coefficient as a Function of AlxGa1-xAs/GaAs Nanostructure
3.3 Current Voltage Characteristics at Altered Barrier Length and Nanostructure δ Doping
4 Conclusion
References
A Node-RED-Based MIPS-32 Processor Simulator
1 Introduction
2 Pipeline Architecture
3 Branch Prediction
4 ISA Implementation
4.1 Memory Model
4.2 Support for Jump Instructions
4.3 Register File Implementation
5 Cache Simulation
6 User Interface
6.1 Pipeline Tab
6.2 Branch Prediction Tab
6.3 Cache Tab
7 Conclusion
References
Simulating Modern CPU Vulnerabilities on a 5-stage MIPS Pipeline Using Node-RED
1 Introduction
2 Prior Work
3 Simulator Implementation
3.1 Implementation Details
4 Simulation of Vulnerabilities
4.1 Spectre
4.2 Load Value Injection (LVI)
5 Conclusions
References
Correction to: Performance Analysis of Object Classification System for Traffic Objects Using Various SVM Kernels
Correction to: Chapter âPerformance Analysis of Object Classification System for Traffic Objects Using Various SVM Kernelsâ in: P. Verma et al. (eds.), Advances in Data Computing, Communication and Security, Lecture Notes on Data Engineering and Communications Technologies 106, https://doi.org/10.1007/978-981-16-8403-639
Author Index
đ SIMILAR VOLUMES
<p><span>This book gathers selected papers presented at the 5th International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI 2021), organized by JCT College of Engineering and Technology, Coimbatore, Tamil Nadu, India during 27 â 28 August 2021. This book sol
<p><span>The book features original papers from International Conference on Computational Methods and Data Engineering (ICCMDE 2021), organized by School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India, during November 25â26, 2021. The book covers inn
<p><span>This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing, and big data analytics. The best selected papers, presented
<p><span>This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented a
<span>This book covers various topics, including collective intelligence, intelligent transportation systems, fuzzy systems, Bayesian network, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm in