<p>This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2019, which was held in Coimbatore, India, in December 2019. <br>The 9 papers presented in this volume were carefully reviewed and selected from
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th International Conference, ICC3 2021, Coimbatore, India, December 16–18, 2021, Revised Selected Papers
✍ Scribed by Indhumathi Raman, Poonthalir Ganesan, Venkatasamy Sureshkumar, Latha Ranganathan
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 208
- Series
- Communications in Computer and Information Science, 1631
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16–18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: computational intelligence; cyber security; and computational models.
✦ Table of Contents
Preface
Organization
Contents
Computational Intelligence
Iris Recognition Using Symmetric Graph Structure Based Pattern Matching
1 Introduction
2 Literature Survey
3 Proposed Iris Recognition Methodology Using Multi Variant Symmetric Ternary Local Pattern (MVSTLP)
3.1 Problem Formulation
3.2 Proposed Methodology – Multi Variant Symmetric Ternary Local Pattern (MVSTLP)
3.3 Steps of MVSTLP Based Iris Recognition Process
4 Experimental Evaluation
4.1 Results on Iris Images (Normal Type)
4.2 Results on Iris Images (Noisy Type)
5 Conclusion
References
Program Architecture for Structural Health Monitoring of Pamban Bridge
1 Introduction
2 History of Structural Health Monitoring (SHM)
3 Literature Survey
4 The Proposed Structural Health Monitoring System
5 Data Retrieval from Sensors
5.1 Data Storage in the Proposed SHM Using Cloud
5.2 Microsoft Identity Platform and Graph API
5.3 Scopes and Permissions
5.4 Security Tokens Used in OAuth 2.0 and OIDC
5.5 OAuth 2.0 Authorization Protocol
6 Automation
7 Conclusions and Future Work
References
Masking Based De Trop Noise Exclusion and Image Inpainting Instance Restoration
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Dataset Description
3.2 Vintage Boosting
3.3 Gray Contrast Stretching
3.4 Filtering
3.5 Mask Creation
3.6 DeTrop Noise Exclusion Using Inpanting
4 Results and Discussion
4.1 Performances Metrics
4.2 Performance Analysis of DeTrop Noise Exclusion Using Inpainting
4.3 Quantitative Analysis
5 Conclusion
References
Extending Machine Learning Techniques Using Multi-level Approach to Detect and Classify Anomalies in a Network on UNSW-NB15 dataset
1 Introduction
2 Dataset
3 Proposed Architecture/Methodology
3.1 Two Level System
3.2 Level 1 - Sub-Leveling/Merging ML Models
3.3 Constructing Model 1
3.4 Optimization on Model 1 (Model 2)
4 Evaluation Results for Proposed Models
5 Comparative Study
6 Conclusion
References
Evaluation and Recommendation of Fertility Hospitals Through Multi Criteria Decision Making and Rank Correlation
1 Introduction
2 Related Work
3 Proposed Work
3.1 System Overview
3.2 MCDM Methods
3.3 Design and Deployment
4 Results and Analysis
5 Conclusion
References
Up-Link/Down-Link Availability Calculation in Cloud Using Ford Fulkerson Algorithm
1 Introduction
1.1 Cloud Computing
1.2 Cloud Providers
1.3 Cloud Customers
1.4 Cloud Services
1.5 Availability
1.6 Routing Information Protocol
1.7 Open Shortest Path First (OSPF)
2 Availability Calculation
2.1 Availability Calculation in Internet
2.2 Need for Availability Calculation
2.3 Existing Methods
3 Availability Calculation
3.1 Availability Calculation in Internet
3.2 Path Identification Using RIP
3.3 Path Identification Using OSPF
3.4 Ford Fulkerson Algorithm
4 Results
4.1 General DPM Calculation
5 Conclusion
References
Machine Learning in Cancer Genomics
1 Introduction
2 Proposed Approach
2.1 Overview
2.2 Machine Learning Algorithms
3 Mean Based Classification
4 Mean Based Classification (Standard Deviation Variant)
5 Shapely Value-Based Interpretation
6 Results and Discussions
6.1 Dataset Used
6.2 Machine Learning Algorithms Results
6.3 Shapely Value-Based Explanations on Pancreas Dataset
7 Conclusion and Future Scope
References
Cyber Security
Privacy-Preserving Blockchain-Based EHR Using ZK-Snarks
1 Introduction
2 Related Work
3 Blockchain Concepts
3.1 Ethereum
3.2 Hyperledger Sawtooth
3.3 Consensus
3.4 Consensus Algorithms in Hyperledger Sawtooth
3.5 Merkle Tree
4 Zero-Knowledge Proof (ZKP)
5 Proposed Methodology
6 Implementation
6.1 Zero-Knowledge Proof Algorithm
7 Results and Discussions
7.1 Hyperledger Sawtooth
8 Conclusion
References
Offensiveness Detection in Hinglish Code-Switched Language
1 History and Introduction
2 Related Work
3 Dataset
4 Proposed Approach
4.1 Pre-processing
4.2 Dealing with Code-Switching
4.3 BERT - Based Model Architecture
5 Model Evaluation and Results
6 Result Analysis
7 Conclusions and Future Work
References
Computational Models
Modelling RNA Motifs Using Matrix Insertion-Deletion System
1 Introduction
2 Preliminaries
3 RNA Motifs Structural Illustration and Generation by MIDS
4 Conclusion
References
Pupil Segmentation Using Stirling’s Interpolation Based Fractional Differential Mask
1 Introduction
2 Related Works
3 Theoretical Background of Fractional Differentials
3.1 Definition
3.2 Fractional Differential Filter
4 Formulation of New Segmentation Mask
5 Proposed Method
6 Results and Discussion
6.1 Experimental Setup1
6.2 Experimental Setup2
7 Conclusion
References
EPAS: An Ergonomic Posture Analysis System
1 Introduction
2 Related Work
2.1 Mobile Apps and Wearable Devices for Posture Correction
2.2 Posture Estimation Using Machine Learning and Deep Learning Methods
2.3 Observations
3 Materials and Methods
3.1 Image Pre-processing
3.2 Human Figure Analysis
3.3 Object Analysis
4 Performance Analysis
4.1 Dataset
4.2 Sample Outputs
4.3 Evaluation Metrics
4.4 Performance Measures
5 Conclusion
References
Studies on Winding Number in Abstract Cellular Complex
1 Introduction
2 Preliminaries in Abstract Cellular Complex
3 Free Homotopy and Winding Number of Abstract Cellular Complex
4 Conclusion
References
COVID-19 Semantic Search Engine Using Sentence-Transformer Models
1 Introduction
1.1 Main Contributions
2 Related Works
3 Proposed Method
3.1 RoBERTa
3.2 Explanation of the Block Diagram
4 Experiments and Results
4.1 Latent Semantic Indexing Model Using SVD
4.2 Sentence Transformer Models
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16–18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: c
<p><p>This book constitutes the proceedings of the Third International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2017, which was held in Coimbatore, India, in December 2017. The 15 papers presented in this volume were carefully reviewed and selected fro
<p>This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coi
<p><p>This book aims at promoting high-quality research by researchers and practitioners from academia and industry at the <i>International Conference on Computational Intelligence, Cyber Security, and Computational Models ICC3 2015</i> organized by PSG College of Technology, Coimbatore, India durin
<p>This book constitutes revised selected papers from the International Conference on Advanced Computing, Networking and Security, ADCONS 2011, held in Surathkal, India, in December 2011. The 73 papers included in this book were carefully reviewed and selected from 289 submissions. The papers are or