<p><span>The book includes select proceedings of the International Conference on Computational Intelligence in Machine Learning (ICCIML 2021). The book constitutes peer-reviewed papers on machine learning, computational intelligence, the internet of things, and smart city applications emphasizing mu
Computational Intelligence in Machine Learning: Proceedings of the 2nd International Conference ICCIML 2022 (Lecture Notes in Electrical Engineering, 1106)
â Scribed by Vinit Kumar Gunjan (editor), Amit Kumar (editor), Jacek M. Zurada (editor), Sri Niwas Singh (editor)
- Publisher
- Springer
- Year
- 2024
- Tongue
- English
- Leaves
- 686
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This volumes comprises select proceedings of the International Conference on Computational Intelligence in Machine Learning (ICCIML 2022). The contents cover latest research trends and developments in the areas of machine learning, smart cities, IoT, Artificial Intelligence, cyber physical systems, cybernetics, data science, neural network, cognition, among others. It also addresses the comprehensive nature of computational intelligence, AI, ML and DL to emphasize its character in modelling, identification, optimization, prediction, forecasting, and control of future intelligent systems. This volume will be a useful guide to those working as researchers in academia and industry by presenting in-depth fundamental research contributions from a methodological/application perspective in understanding Artificial intelligence and machine learning approaches and their capabilities in solving diverse range of problems in industries and its real-world applications.
⌠Table of Contents
Contents
About the Editors
A Deep Learning Method for Autism Spectrum Disorder
1 Introduction
2 Transfer Learning
3 Experiments
3.1 Data Set
3.2 VGG-16
4 Results and Discussion
5 Conclusion
References
Cyber-Attacks and Anomaly Detection in Networking Based on Deep LearningâA Survey
1 Introduction
2 Taxonomy on Anomaly Detection of Cyberattacks in Networking
2.1 Machine Learning
2.2 Supervised Learning
2.3 Unsupervised Learning
2.4 Semi-supervised Learning
3 Literature
4 Comparative Analysis
5 Problem Statement
6 Conclusion
References
AI-Enabled Analysis of Climate Change on Agriculture and Yield Prediction for Coastal Area
1 Introduction
2 Literature Survey
3 Implementation
3.1 LSTM Model
3.2 Random Forest Model
3.3 Predicted Temperature and Actual Temperature
3.4 Shows the Baseline Predicted Example
3.5 Shows the Prediction Weather
3.6 Shows the Alternate Crop
4 Result Analysis
5 Conclusion and Future Scope
References
Deep Learning Methods for Predicting Severity for Diabetic Retinopathy on Retinal Fundus Images
1 Introduction
2 DR Features
3 Literature Review
4 Proposed Methodology
5 Conclusion
References
Hate Text Finder Using Logistic Regression
1 Introduction
2 Related Work
3 Proposed System
4 Working of Proposed System
5 Results
6 Conclusion
7 Future Scope
References
Automated Revealing and Warning System for Pits and Blockades on Roads to Assist Carters
1 Introduction
2 Pothole and Obstacle Detection Working Model
3 Implementation of Pothole and Obstacle Detection
3.1 Stage 1: When an Obstacle is Detected
3.2 Stage 2: When the Working Model Detects Potholes
4 Conclusion
References
Green Data Center Power Flow Management with Renewable Energy Sources and Interlinking Converter
1 Introduction
2 Uninterruptible Power Supply
3 Proposed Framework for Green Data Center
4 Simulation Result
5 Conclusion
References
Design of Grid-Connected Battery Storage Wave Energy and PV Hybrid Renewable Power Generation
1 Introduction
2 Problem Formulation
2.1 Scenario 1: Rising Voltage Profile
2.2 Scenario 2: Backward Power Flow
2.3 Scenario 3: An Increase in the Fault Current's Size
2.4 Scenario 4: The Traditional Method is to Estimate the EG's Penetration Limitations
3 Proposed Solutions
References
Power Quality Enhancement with PSO-Based Optimisation of PI-Based Controller for Active Power Filter
1 Introduction
2 Power Quality
2.1 Power Quality Problems
2.2 The Benefits of Power Quality
3 PSO
4 Optimisation of PI Controller By Using PSO
5 Conclusion
References
Monitoring and Control of Motor Drive Parameters Using Internet of Things Protocol for Industrial Automation
1 Introduction
1.1 Automation
1.2 Material and Method
1.3 Relay and Contactor
2 Architecture of SCADA
2.1 HumanâMachine Interface (HMI)
2.2 Internet of Things SCADA System
2.3 Data Communication
2.4 Data Presentation
2.5 Data Acquisition
3 Conclusion
References
Switching Loss Comparison of a Cascaded Diode-Clamped Inverter with Conventional Multilevel Inverters
1 Introduction
2 Inverter Topologies
2.1 Cascaded H-Bridge Inverter (CHBI)â(9-Level)
2.2 Diode-Clamped Multilevel Inverter (DCMLI)â(Five-Level)
2.3 Hybrid InverterâCascaded Diode-Clamped Inverter (CDCI)â(Nine-Level)
3 Switching Loss Calculation
4 Simulation and Results
4.1 Cascaded H-Bridge Inverter (Nine-Level)âResults
4.2 Diode-Clamped Multilevel Inverter (FiveLevel)âResults
4.3 Cascaded Diode-Clamped Inverter (Nine-Level)âResults
4.4 Comparision of CHBI, DCMLI and CDCI
5 Conclusion
References
An Energy-Efficient Mechanism Using Blockchain Technology for Machine-Type Communication in LTE Network
1 Introduction
2 Related Work
3 Proposed Cluster-Based Energy-Efficient Cluster Head Using Blockchain
3.1 Distance (fdistance)
3.2 Delay (fdelay)
3.3 Energy (fenergy)
3.4 Objective Function
3.5 WTL Algorithm for Optimal Cluster Head Selection
3.6 Blockchain Technology
4 Results and Discussions
4.1 Simulation Procedure
5 Conclusion
References
Comparison of Echo State Network with ANN-Based Forecasting Model for Solar Power Generation Forecasting
1 Introduction
2 Methodology
2.1 Artificial Neural Network
2.2 Echo State Network
3 Statistical Methods
4 Result and Discussion
5 Conclusion
References
A Grey Wolf Integrated with Jaya Optimization Based Route Selection in IoT Network
1 Introduction
2 Literature Review
3 Proposed Routing Strategy in IoT
3.1 Computation of Fitness Value
3.2 Optimal Node Selection Using GWJO Model
3.3 Route Establishment
4 Results
4.1 Simulation Set-Up
5 Conclusion
References
Secure Software Development Life Cycle: An Approach to Reduce the Risks of Cyber Attacks in Cyber Physical Systems and Digital Twins
1 Introduction
2 Literature Survey
2.1 Cyber Physical Systems and Their Attacks?
2.2 Advantages of Digital Twin Over Cyber Physical System
2.3 Disadvantages of DT
2.4 Cyber Digital Twin
2.5 How Secure Are CDTs?
3 Methodology
3.1 Secure Software Development Life Cycle (Proposed Solution)
3.2 Why SSDLC and not SDLC?
3.3 Detailed Look at the SSDLC
4 Conclusion
References
Social Networks and Time Taken for Adoption of Organic Food Product in Virudhunagar DistrictâAn Empirical Study
1 Introduction
2 Related Works
3 Conceptual Framework
4 Objectives of the Study
5 Area of the Study, Sample Framework and Procedure
6 Days to Purchase
7 Members of the Social Group
8 Reason to Join in the Group
9 The Frequency of Participation in the Group
10 Information Trust by the Respondents
11 Convey Information About New Product
12 Cost Spend by the Respondents for Passing the Information
13 Like to Spread the Information
14 Quantity of Passing of Information
15 Hypothesis
16 KruskalâWallis Test
17 Living Place and Adoption of New Product in the Market
18 Chi-Square Tests
19 Age Group and Information Passing
20 Chi-Square Test
21 Exponential Smoothing for Applying Rogerâs Model in Identifying the Adoption of Organic Food Product
22 Exponential Growth
23 Findings and Discussion
References
Usage of Generative Adversarial Network to Improve Text to Image Synthesis
1 Introduction
2 Literature Survey
2.1 Generative Adversarial Networks
2.2 Text to Photo-Realistic Image Synthesis with Stacked GAN
2.3 Image Generation from Scene Graphs
2.4 Fine Grained Text to Image Generation with Attentional Generative Adversarial Networks (Attn GAN)
2.5 Realistic Image Synthesis with Stacked Generative Adversarial Networks (Stack GAN++)
3 Methodology
3.1 Defining Goal
3.2 Researching Previous Attempts
3.3 Defining Approach
3.4 Algorithm
4 Experiments and Results
4.1 Experiment Setting
4.2 Effectiveness of New Modules
4.3 Component Analysis of AATM
4.4 Component Analysis of SDM
4.5 Comparison of KT GAN with Other GAN Models
4.6 Visualization
5 Conclusion
References
Recurrent Neural Network-Based Solar Power Generation Forecasting Model in Comparison with ANN
1 Introduction
2 Methodology
2.1 Artificial Neural Network (ANN)
2.2 Recurrent Neural Network (RNN)
3 Statistical Measures
4 Result and Discussion
5 Conclusion
References
Android Malware Detection Using Genetic Algorithm Based Optimized Feature Selection and Machine Learning
1 Introduction
1.1 AÂ Subsection Sample
2 Proposed Method
2.1 Supervised Classification (Training Dataset)
2.2 Supervised Classification (Test Dataset)
2.3 System Design
2.4 Use Case Diagram
3 Testing and Implementation
4 Results and Discussion
5 Conclusion
References
Mental Health Disorder Predication Using Machine Learning for Online Social Media
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 Data Collection
3.3 Check Category
3.4 Check Wordlist
4 Machine Learning Models
5 Result and Discussion
6 Conclusion
References
An Application on Sweeping Machines Detection Using YOLOv5 Custom Object Detection
1 Introduction
2 Related Work
2.1 YOLOv5
2.2 Model Description
3 Proposed System
3.1 Dataset
3.2 Manual Labeling
3.3 Augmentation
4 Training
5 Results
6 Command
7 Conclusion and Future Work
References
Analyze and Detect Lung Disorders Using Machine Learning ApproachesâA Systematic Review
1 Introduction
2 State-of-Art: Overview
3 Dataset Availability
4 Methodology
5 Conclusions and Future Work
References
A Study on Predicting Skilled Employeesâ Using Machine Learning Techniques
1 Introduction
2 Related Work
3 Classifier Construction
3.1 Objectives and Problem Definition
3.2 Data Collection and Understanding Process
3.3 Data Preparation and Pre-processing
4 Modeling and Experiments
5 Comparative Analysis and Discussion:
6 Results
7 Conclusion and Future Scope
References
Forensic Analysis of the Uncompressed Image Data Cluster for Estimating the Image Width
1 Introduction
2 The Principle and Limitation of Greedy Path Algorithms
2.1 The Significance of Image Width
2.2 The Smoothness Property of Images
2.3 The Drawback of Greedy Path Algorithms
3 Importance of Width Attribute
3.1 The Image Width is Important in Image Recovery
3.2 The Problem Statement
4 Analysis of Disk Block Data for Finding Width
5 Experiments and Results
6 Conclusion
References
Performance Comparison of Various Supervised Learning Algorithms for Credit Card Fraud Detection
1 Introduction
2 Methodology
2.1 Dataset
2.2 Data Preprocessing
2.3 Data Cleaning (DC)
2.4 Data Exploration (DE)
2.5 Data Manipulation (DM)
2.6 Data Modeling (DMD)
3 Classifiers
3.1 Logistic Regression
3.2 Decision Tree
3.3 Artificial Neural Networks
3.4 Gradient Boosting
4 Experimental Results
5 Conclusion
References
Simple-X a General-Purpose Image Classification Model Through Investigative Approach
1 Introduction
2 Related Work
3 Proposed System
3.1 Dataset
3.2 Augmentation
4 Training
5 Testing
6 Visuals
7 Conclusions and Future Scope
References
Blockchain-Based Source Tracing System Using Deep Learning: AÂ Review
1 Introduction
2 Literature Review
3 Types of Blockchains
4 Deep Learning Models
5 Conclusion
References
Geospatial Data Visualization of an Energy Landscape and Geographical Mapping of a Power Transmission Line Distribution Network
1 Introduction
1.1 Related Works
2 Research Design
2.1 Energy Supply Chain Network
2.2 Data Description
3 Methodology
3.1 Experimental Setup and Implementation Process Metrics
4 Results and Discussion
5 Conclusion and Future Enhancement
References
Sign Language Identification Using Deep Learning Methods
1 Introduction
2 Literature Survey
2.1 Novelty
3 Methodology
3.1 Data Pre-processing
3.2 CNN Architecture
4 Implementation
4.1 Creating and Training the Model
4.2 Deployment
5 Results and Discussion
5.1 Class-Wise Classification Report
5.2 Class-Wise Heat Map
5.3 Loss and Val Loss Per Epochs
5.4 Accuracy and Val Accuracy Per Epochs
6 Deployment on Web App Using Flask
7 Conclusion
References
Development of LoRa-Based Weather Monitoring and Lightning Alert System in Rural Areas Using IoT
1 Introduction
2 Literature Review
3 Hardware Requirements
3.1 ESP 32 and Lightning Detector
3.2 DHT11 and BMP180
3.3 Rain Sensor and LM 386 Audio Amplifier
3.4 LoRa Ra 02 Module and Speaker
4 Software Requirements
4.1 Arduino IDE
4.2 ThingSpeak and IFTTT Platform
5 Proposed System Design
6 Results and Discussion
7 Conclusion and Future Scope
References
Automatic Text Recognition from Image Dataset Using Optical Character Recognition and Deep Learning Techniques
1 Introduction
2 Literature Review
3 Algorithmic Survey
3.1 SVM
3.2 Convolutional Neural Network (CNN)
4 Datasets
4.1 MNIST
4.2 EMNIST
4.3 IAM
5 Methodology
6 Accuracy Measured Used
6.1 Confusion Matrix
7 Analysis of Accuracy of Algorithms
8 Conclusion
References
Securing IoT Networks Using Machine Learning, Deep Learning Solutions: AÂ Review
1 Introduction
2 Literature Survey
3 Discussions
3.1 The Role of Machine Learning in the Security of Internet of Things Devices
4 Suggestions
5 Conclusion
References
Smart Warehouse Management System
1 Introduction
2 Literature Survey
3 Working
4 Experimental Results
5 Conclusion
References
IoT Enabled LoRa-Based Patrolling Robot
1 Introduction
2 Empirical Survey
3 System Design
4 Methodology
4.1 Transmitter Section
4.2 Receiver Section
4.3 LoRa SX1276 Transceiver
4.4 ESP32 Camera (Ai-Thinker Module)
4.5 Interfacing Blynk Application (IoT Dashboard)
5 Flow Chart
6 Results and Discussions
7 Conclusion
References
Single Image Dehazing Using CNN
1 Introduction
2 Related Work
2.1 Atmospheric Scattering Model (ASM):
2.2 Image Enhancement Based Methods
2.3 Methods Based on Learning Models
3 Proposed Model
4 Results
5 Conclusion
References
Artificial Intelligence in Healthcare and Medicine
1 Introduction
2 Literature Survey
3 Uses of AI
3.1 Diagnosis and Treatment
3.2 Management
4 Challenges and Solutions
4.1 Privacy
4.2 Accountability
4.3 Unemployment
5 Conclusion
References
Share Market Application Using Machine Learning
1 Introduction
2 Literature Survey
3 Objective
4 Methodology
5 Proposed Algorithm
5.1 Data Flow Diagram
6 Implementation
6.1 Create Account Page
6.2 Home Page
6.3 Company Search Page
6.4 Company List
6.5 Sentimental Analysis
6.6 News Update
7 Conclusion
References
PollXâPolling Assistant
1 Introduction
2 Literature Survey
2.1 Analysis of Electronic Voting Systems
2.2 The Indian Electoral Process and Negative Voting [4]
2.3 On What Basis Indian People Vote [5]
2.4 Handbook for Presiding Officers [6]
2.5 Election Material and Electronic Voting in India [7, 8]
3 Problem Statement and Objectives
3.1 Problem Statement
3.2 Specific Objectives
4 Methodology
4.1 System Architecture
4.2 Modular Diagram
4.3 Flow Charts and Working of Each Process
5 Results, Analysis, and Discussion
5.1 Results
5.2 Analysis and Discussion
6 Conclusion
References
A Security Framework Design for Generating Abnormal Activities Report of Bring Your Own Devices (BYODs)
1 Introduction
2 Literature Review
3 System Model
3.1 Access Context Information
3.2 Usage Context Information
3.3 Finish Context Information
4 Results
4.1 Analysis on Use Behaviour of Overall Transaction
4.2 Occurrence Sequence Analysis of Initial Use Behaviour
5 Conclusion
References
Fake News Detection Using Machine Learning
1 Introduction
2 Literature Review
3 Materials and Methods
3.1 Datasets
3.2 Methodology
3.3 Algorithms
3.4 Metrics of Performance
4 Results and Discussion
4.1 Confusion Matrix and Classification Report
4.2 NaĂŻve Bayes
4.3 Logistic Regression
4.4 Decision Tree
5 Conclusion
References
Advanced Intelligent Tutoring Systems: Featuring the Learning Management Systems of the Future
1 Introduction
2 What is an ITS?
3 Architecture of ITS
3.1 The Knowledge Domain
3.2 The Student Model
3.3 The Pedagogical Model/Teaching Strategies
3.4 The User Interface Model
4 Literature Review of Some Existing Intelligent Tutoring Systems
5 Advanced Artificial Intelligence Tutors in Education
6 ITS Versus LMSâFuture of Education
7 Conclusion
References
Stock Prediction Using Machine Learning and Sentiment Analysis
1 Introduction
2 Literature Survey
3 Methodology
3.1 Dataset
3.2 Fetching Data
3.3 LSTM
3.4 Linear Regression
3.5 ARIMA
3.6 Sentiment Analysis
3.7 Root Mean Square Value
4 Results
4.1 Stock Prediction Using Machine Learning
4.2 Sentiment Analysis
5 Comparative Analysis
6 Conclusion
7 Future Scope
References
Parkinson Disease Screening Using UNET Neural Network and BWO Based on Hand Drawn Pattern
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Result and Discussions
5 Conclusion and Future Scope
References
A Comprehensive Review for Optical Character Recognition of Handwritten Devanagari Script
1 Introduction
2 Literature Survey
2.1 Traditional Methods
2.2 Deep Learning Methods
3 Discussion
4 Conclusion
References
Emotion Detection Using Machine Learning Algorithms: AÂ Multiclass Sentiment Analysis Approach
1 Introduction
2 Literature Survey
3 Binary Versus Multiclass Sentiment Analysis
4 Experimental Analysis
4.1 Importing Dataset
4.2 Text Pre-processing
4.3 Text Representation
4.4 Classification
4.5 Model Evaluation
5 Conclusion
References
Deep Learning-Based Methods for Automatic License Plate Recognition: A Survey
1 Introduction
2 Localization Techniques for AVPR
2.1 Localization Using Signature Analysis
2.2 Localization Using Characteristics of Alphanumeric Characters
2.3 Localization Using Novel Approach
3 Pre-processing Methods in AVPR
4 Segmentation Process
5 Feature Extraction in AVPR
5.1 Color Feature
5.2 Deep Features
6 Classification and Recognition
7 Dataset
8 Performance Measures
9 Summary
10 Conclusion
References
Modern Predictive Modelling of Energy Consumption and Nitrogen Content in Wastewater Management
1 Introduction
2 Literature Review
3 Methodology
3.1 Case Study on Melbourne
3.2 Data Collection
3.3 Data Pre-processing and Visualization
3.4 Modelling Approach
3.5 Workflow of the Predictive Model
4 Results and Discussions
4.1 Insights from Energy Consumption Prediction
4.2 Insights from Total Nitrogen Prediction
4.3 Impact of Input Parameters on Model Performance
5 Conclusion
References
Automatic Text Document Classification by Using Semantic Analysis and Lion Optimization Algorithm
1 Background
2 Major Challenges
3 Gap Analysis
4 Methodology
5 Algorithm
6 Results and Discussions
7 Comparative Analysis
8 Conclusions
References
Text-Based Emotion Recognition: AÂ Review
1 Introduction
2 Machine Learning Types
2.1 Supervised
2.2 Semi-supervised
2.3 Unsupervised
2.4 Hybrid/Reinforcement
3 Literature Review
4 Comparative Study
5 Discussion
5.1 Generalized Linear Model
6 Limitations and Future Works
7 Conclusion
References
AURAâYour Virtual Assistant, at Your Service
1 Introduction
2 Research Work
3 Proposed Methodology
4 Result and Discussion
4.1 Commands Executed
5 Conclusion
References
Design and Develop Sign Language to English Script Convertor Using AI and Machine Learning
1 Introduction
2 Literature Survey
3 Research Methodology
4 Observations and Applications
5 Conclusion
References
Akademy: AÂ Unique Online Examination Software Using ML
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Tab Switch Detection
3.2 Random Question Generation
3.3 Examination
3.4 Analysis
4 Evaluation Methods
5 Results
5.1 Face Detection and Verification
5.2 Tab Switch
5.3 Test Analysis
6 Conclusion and Future Scope
References
Selection of Reactive Load to Correct Power Factor, Cost-Effectiveness
1 Introduction
2 Related Work
3 System Architecture
3.1 Block Diagram
3.2 System Flowchart
3.3 Results
3.4 Cost-Effectiveness
4 Conclusion
References
Machine Learning Algorithm Recommendation System
1 Introduction
1.1 Motivation
1.2 Problem Analysis
1.3 Objectives
1.4 Scope
2 Literature Review
2.1 Related Work
3 Proposed System
3.1 Proposed Approach and Details
3.2 Innovation in Idea
4 Implementation Details and Results
4.1 Technology Stack
4.2 Implementation Parameters
5 Results
6 Conclusions
References
Crop Recommender System
1 Introduction
2 Literature Review
3 Motivation
4 Methodology
4.1 Dataset Retrieval
4.2 Algorithm Building
4.3 Accuracy Prediction and Comparison
5 Result
5.1 Accuracy Prediction Table
5.2 Time Complexity for Accuracy Predicted
6 Conclusion
References
256-Bit AES Encryption Using SubBytes Blocks Optimisation
1 Introduction
2 Related Work
3 AES Algorithm
3.1 Architecture of AES Algorithm
3.2 Existing Methodology
3.3 Key Expansion
4 Proposed Methodology
4.1 Architecture for S-Box
5 Results
6 Conclusion
References
Detection of Food Freshness
1 Introduction
2 Literature Survey
2.1 Aim of the Work
2.2 Objectives
2.3 Scope
2.4 Future Enhancements
3 Proposed Methodology
4 Methodology
5 Results
6 Conclusion
References
COVID-19 Data Analysis and Forecasting for India Using Machine Learning
1 Introduction
2 Literature Survey
3 Methodology
3.1 Column Description
4 Block Diagram
4.1 Import Libraries
4.2 Read Data
4.3 Checking for Missing Values
4.4 Checking for Categorical and Variable Data
4.5 Standardize the Data
4.6 Data Splitting
4.7 Support Vector Machine
4.8 Logistic Regression
4.9 Testing the Classifier
4.10 Evaluating the Classifier
4.11 Random Forest
4.12 K-Nearest Neighbour
4.13 Decision Tree
4.14 Gradient Boosting Classifier
5 Result
6 Conclusion and Future Scope
References
Design of a Smart Safety Design for Women Using IoT
1 Introduction
2 Existing System
3 Proposed System
4 System Design
5 Module Description
5.1 OpenCV
5.2 ARM11 Raspberry Pi 3 Board
5.3 Raspbian OS
6 Methodology
7 Experiment and Results
8 Applications
9 Advantages
10 Conclusion
11 Future Work
References
Ultravoilet Sterilization Disinfectant Robot for Combating the COVID-19 Pandemic
1 Introduction
2 Literature Survey
3 Problem Statement
4 Existing Versus Proposed System
5 Methodology
5.1 Hardware Components
5.2 Circuit Connections
6 Result
7 Conclusion
References
Advancement in Sericulture Using Image Processing
1 Introduction
2 Related Work
3 Proposed Approach
4 Design and Implementation
5 Result and Discussion
6 Conclusion and Future Work
References
Model Based on Credit Card Fraud Detection Using Machine Learning
1 Introduction
1.1 Problem Statement
2 Methodology
2.1 Data Preparation
3 Result Output
4 Conclusion and Future Enhancement
References
Implementation of Smart Mobile Health Application for COVID-19 Pandemic
1 Introduction
2 Proposed System
3 Implementation and Results
4 Conclusion
References
IoT-Based Weather Monitoring System
1 Introduction
2 Literature Survey
3 Working
4 Design Methodology
5 Implementation and Result
6 Conclusion and Future Scope
References
đ SIMILAR VOLUMES
<p><span>The book includes select proceedings of the International Conference on Computational Intelligence in Machine Learning (ICCIML 2021). The book constitutes peer-reviewed papers on machine learning, computational intelligence, the internet of things, and smart city applications emphasizing mu
<p><span>The book includes select proceedings of the International Conference on Computational Intelligence in Machine Learning (ICCIML 2021). The book constitutes peer-reviewed papers on machine learning, computational intelligence, the internet of things, and smart city applications emphasizing mu
<p><span>The book includes select proceedings of the International Conference on Computational Intelligence in Machine Learning (ICCIML 2021). The book constitutes peer-reviewed papers on machine learning, computational intelligence, the internet of things, and smart city applications emphasizing mu
<p><span>This volume comprises the select proceedings of the 2nd International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC 2022). The content focuses on big data and cloud computing and the application of artificial intelligence, robotics and engineering, the Internet