<p><span>This book looks at cyber security challenges with topical advancements in computational intelligence and communication technologies. This book includes invited peer-reviewed chapters on the emerging intelligent computing and communication technology research advancements, experimental outco
Computational Intelligence, Cyber Security and Computational Models. Recent Trends in Computational Models, Intelligent and Secure Systems: 5th ... in Computer and Information Science, 1631)
✍ Scribed by Indhumathi Raman (editor), Poonthalir Ganesan (editor), Venkatasamy Sureshkumar (editor), Latha Ranganathan (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 208
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16–18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: computational intelligence; cyber security; and computational models.
✦ Table of Contents
Preface
Organization
Contents
Computational Intelligence
Iris Recognition Using Symmetric Graph Structure Based Pattern Matching
1 Introduction
2 Literature Survey
3 Proposed Iris Recognition Methodology Using Multi Variant Symmetric Ternary Local Pattern (MVSTLP)
3.1 Problem Formulation
3.2 Proposed Methodology – Multi Variant Symmetric Ternary Local Pattern (MVSTLP)
3.3 Steps of MVSTLP Based Iris Recognition Process
4 Experimental Evaluation
4.1 Results on Iris Images (Normal Type)
4.2 Results on Iris Images (Noisy Type)
5 Conclusion
References
Program Architecture for Structural Health Monitoring of Pamban Bridge
1 Introduction
2 History of Structural Health Monitoring (SHM)
3 Literature Survey
4 The Proposed Structural Health Monitoring System
5 Data Retrieval from Sensors
5.1 Data Storage in the Proposed SHM Using Cloud
5.2 Microsoft Identity Platform and Graph API
5.3 Scopes and Permissions
5.4 Security Tokens Used in OAuth 2.0 and OIDC
5.5 OAuth 2.0 Authorization Protocol
6 Automation
7 Conclusions and Future Work
References
Masking Based De Trop Noise Exclusion and Image Inpainting Instance Restoration
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Dataset Description
3.2 Vintage Boosting
3.3 Gray Contrast Stretching
3.4 Filtering
3.5 Mask Creation
3.6 DeTrop Noise Exclusion Using Inpanting
4 Results and Discussion
4.1 Performances Metrics
4.2 Performance Analysis of DeTrop Noise Exclusion Using Inpainting
4.3 Quantitative Analysis
5 Conclusion
References
Extending Machine Learning Techniques Using Multi-level Approach to Detect and Classify Anomalies in a Network on UNSW-NB15 dataset
1 Introduction
2 Dataset
3 Proposed Architecture/Methodology
3.1 Two Level System
3.2 Level 1 - Sub-Leveling/Merging ML Models
3.3 Constructing Model 1
3.4 Optimization on Model 1 (Model 2)
4 Evaluation Results for Proposed Models
5 Comparative Study
6 Conclusion
References
Evaluation and Recommendation of Fertility Hospitals Through Multi Criteria Decision Making and Rank Correlation
1 Introduction
2 Related Work
3 Proposed Work
3.1 System Overview
3.2 MCDM Methods
3.3 Design and Deployment
4 Results and Analysis
5 Conclusion
References
Up-Link/Down-Link Availability Calculation in Cloud Using Ford Fulkerson Algorithm
1 Introduction
1.1 Cloud Computing
1.2 Cloud Providers
1.3 Cloud Customers
1.4 Cloud Services
1.5 Availability
1.6 Routing Information Protocol
1.7 Open Shortest Path First (OSPF)
2 Availability Calculation
2.1 Availability Calculation in Internet
2.2 Need for Availability Calculation
2.3 Existing Methods
3 Availability Calculation
3.1 Availability Calculation in Internet
3.2 Path Identification Using RIP
3.3 Path Identification Using OSPF
3.4 Ford Fulkerson Algorithm
4 Results
4.1 General DPM Calculation
5 Conclusion
References
Machine Learning in Cancer Genomics
1 Introduction
2 Proposed Approach
2.1 Overview
2.2 Machine Learning Algorithms
3 Mean Based Classification
4 Mean Based Classification (Standard Deviation Variant)
5 Shapely Value-Based Interpretation
6 Results and Discussions
6.1 Dataset Used
6.2 Machine Learning Algorithms Results
6.3 Shapely Value-Based Explanations on Pancreas Dataset
7 Conclusion and Future Scope
References
Cyber Security
Privacy-Preserving Blockchain-Based EHR Using ZK-Snarks
1 Introduction
2 Related Work
3 Blockchain Concepts
3.1 Ethereum
3.2 Hyperledger Sawtooth
3.3 Consensus
3.4 Consensus Algorithms in Hyperledger Sawtooth
3.5 Merkle Tree
4 Zero-Knowledge Proof (ZKP)
5 Proposed Methodology
6 Implementation
6.1 Zero-Knowledge Proof Algorithm
7 Results and Discussions
7.1 Hyperledger Sawtooth
8 Conclusion
References
Offensiveness Detection in Hinglish Code-Switched Language
1 History and Introduction
2 Related Work
3 Dataset
4 Proposed Approach
4.1 Pre-processing
4.2 Dealing with Code-Switching
4.3 BERT - Based Model Architecture
5 Model Evaluation and Results
6 Result Analysis
7 Conclusions and Future Work
References
Computational Models
Modelling RNA Motifs Using Matrix Insertion-Deletion System
1 Introduction
2 Preliminaries
3 RNA Motifs Structural Illustration and Generation by MIDS
4 Conclusion
References
Pupil Segmentation Using Stirling’s Interpolation Based Fractional Differential Mask
1 Introduction
2 Related Works
3 Theoretical Background of Fractional Differentials
3.1 Definition
3.2 Fractional Differential Filter
4 Formulation of New Segmentation Mask
5 Proposed Method
6 Results and Discussion
6.1 Experimental Setup1
6.2 Experimental Setup2
7 Conclusion
References
EPAS: An Ergonomic Posture Analysis System
1 Introduction
2 Related Work
2.1 Mobile Apps and Wearable Devices for Posture Correction
2.2 Posture Estimation Using Machine Learning and Deep Learning Methods
2.3 Observations
3 Materials and Methods
3.1 Image Pre-processing
3.2 Human Figure Analysis
3.3 Object Analysis
4 Performance Analysis
4.1 Dataset
4.2 Sample Outputs
4.3 Evaluation Metrics
4.4 Performance Measures
5 Conclusion
References
Studies on Winding Number in Abstract Cellular Complex
1 Introduction
2 Preliminaries in Abstract Cellular Complex
3 Free Homotopy and Winding Number of Abstract Cellular Complex
4 Conclusion
References
COVID-19 Semantic Search Engine Using Sentence-Transformer Models
1 Introduction
1.1 Main Contributions
2 Related Works
3 Proposed Method
3.1 RoBERTa
3.2 Explanation of the Block Diagram
4 Experiments and Results
4.1 Latent Semantic Indexing Model Using SVD
4.2 Sentence Transformer Models
5 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16–18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows:
<span>This book constitutes the refereed post-conference proceedings of the Second BenchCouncil International Federated Intelligent Computing and Block Chain Conferences, FICC 2020, held in Qingdao, China, in October/ November 2020.</span><p><span>The 32 full papers and 6 short papers presented were
<p><p>This book highlights the emerging field of intelligent computing and developing smart systems. It includes chapters discussing the outcome of challenging research related to distributed computing, smart machines and their security related research, and also covers next-generation communication
<span>This book includes extended and revised versions of selected papers from the 7th and 8th edition of the International Conference on Information Systems Security and Privacy (ICISSP 2021 and ICISSP 2022). ICISSP 2021 and 2022 was held as an online event due to the Covid-19 pandemic, from Februa
<p><span>The book contains 37 papers presented at the ninth edition of </span><span>the International Conference </span><span>of Computers, Communications and Control</span><span>―ICCCC-2022 held in Oradea and Băile Felix, Romania. A balanced selection of both methodological and application-oriented