<span>This book features high-quality research papers presented at the 3rd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2021), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 24 â 25 April 2021. It includes practical develop
Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2020 (Advances in Intelligent Systems and Computing, 1120)
â Scribed by Asit Kumar Das (editor), Janmenjoy Nayak (editor), Bighnaraj Naik (editor), Soumi Dutta (editor), Danilo Pelusi (editor)
- Publisher
- Springer
- Year
- 2020
- Tongue
- English
- Leaves
- 593
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book features high-quality research papers presented at the 2nd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2020), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 4â5 January 2020. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.
⌠Table of Contents
CIPR Committee
Chief Patron
Patron
Honorary Advisory Chair
Honorary General Chair
General Chair
Programme Chair
Organizing Chair
International Advisory Committee
National Advisory Committee
Technical Committee
Publicity Chair
Logistic Chair
Convenors
Co-convenors
Publication Chair
Finance Chair
CIPR Reviewers
Preface
Acknowledgements
About the Conference
Contents
About the Editors
Predicting Dynamic Product Price by Online Analysis: Modified K-Means Cluster
1 Introduction
2 Big Data Mining and Analysis of Dynamic Product Price
2.1 Big Data Challenges and Analytics
2.2 Opportunities, Open Issues and Challenges
2.3 K-Means and Modified K-Means Algorithm
3 Proposed Methodology
4 Findings and Analysis
4.1 Finding Based on K-Means Algorithm
5 Finding Based on Modified K-Means Algorithm
6 Computation of Dataset Using Modified K-Means Cluster
7 Conclusions
References
Nearest Neighbor-Based Differential Evolution for Reconstructing Gene Regulatory Network
1 Introduction
2 Literature Review
3 Problem Description
4 Methodology
4.1 Recurrent Neural Network (RNN) Model
4.2 Differential Evolution (DE)
4.3 Performance Metric
5 Experimental Study
5.1 Results and Discussion
6 Conclusion and Future Scope
References
Inference-Based Statistical Analysis for Suspicious Activity Detection Using Facial Analysis
1 Introduction
1.1 Suspicious Activity
1.2 Social Crime Status at World Level
1.3 Face Recognition
1.4 Algorithm of Face Recognition Tools and Techniques
1.5 Classification
1.6 Association (Dependency Modeling)
1.7 Clustering
2 Literature Survey and Previous Work
3 MethodologyâSVM, Dlib, CNN, RNN
4 Results and Discussion
5 Product PerspectiveâWeb site/App Snapshots
5.1 Module 1: Face Detection
5.2 Module 2: Face Expression Recognition
6 Recommendations
7 Novelty of Our Work
8 Future Scope
9 Limitations
10 Applications
11 Conclusions
References
A Conceptual Approach for Framework to Design Radar System Using Arduino with Initial Experiments
1 Introduction
2 Circuits Designing in Literature Review
3 Experiment Description
3.1 Arduino Uno R3
3.2 Servo Motors
3.3 Ultrasonic Sensors
3.4 Liquid Crystal Display (LCD)
3.5 Use of Arduino Software
4 Connections
4.1 Arduino to Servo Motors
4.2 Arduino to Ultrasonic Sensors
4.3 Arduino to LCD
5 Applications
5.1 Air Force
5.2 Application in Army
5.3 Naval Application
6 Experimental Setup in Our Study
6.1 Wood Obstacle
6.2 Clothes Obstacle
7 Novelty
8 Future Scope
9 Process Involved
10 Advantages Over Others
11 Business Plans
12 Future Works
13 Recommendations
14 Limitations
15 Conclusions
References
Implementing BrainâMachine Interface (BMI) with Smart Computing
1 Introduction
1.1 BMI and Smart Computing
2 Literature Review
3 System Design
4 Algorithms Involved
5 Security Methods
6 Applications
7 Limitations
8 Conclusion
References
Stratification of Indian Dance Forms Through Audio Signal
1 Introduction
2 Previous Works
3 Proposed Methodology
3.1 Computation of Features
3.2 Classification
4 Experimental Results
4.1 Relative Analysis
5 Conclusion
References
Forecasting House Price with an Optimum Set of Features
1 Introduction
2 Related Works
3 The Effort Process
3.1 Facet Description
3.2 Facet Assortment
3.3 Machine Erudition Techniques
3.4 Performance Measurement
4 Experimental Results
5 Conclusion
References
Speech-Based Emotion Classification for Human by Introducing Upgraded Long Short-Term Memory (ULSTM)
1 Introduction
1.1 Related Work
2 Proposed Methodology
2.1 Feature Extraction
2.2 Convolutional Neural Networks (CNN)
2.3 Recurrent Neural Networks (RNN)
2.4 Gated Recurrent Unit (GRU)
2.5 Long Short-Term Memory Network (LSTM)
2.6 Upgraded Long Short-Term Memory (ULSTM)
3 Result Analysis
3.1 Comparative Study
4 Conclusion
References
Study of Sentiment Analysis in Mental Health Using Speech Recognition and Image to Text Conversion
1 Introduction
1.1 Speech Recognition
1.2 Image to Text Conversion
2 Literature Review
2.1 Sentiment Analysis
2.2 Benefits of Sentiment Analysis
2.3 Mental Health
3 Methodology
4 Analysis and Result
5 Summary and Conclusion
References
Differential Evolution Optimized Fuzzy PID Controller for Automatic Generation Control of Interconnected Power System
1 Introduction
2 System Investigation
3 Differential Evolution (DE)
4 Result and Analysis
5 Conclusion
Appendix
References
Deep Learning-Based Automated Feature Engineering for Rice Leaf Disease Prediction
1 Introduction
2 Image Processing for Collecting Rice Plant Diseased Images
3 Proposed CNN-Based Rice Disease Prediction Model
4 Experimental Results
5 Conclusion and Future Scope
References
Literature Survey on Log-Based Anomaly Detection Framework in Cloud
1 Introduction
2 Cloud Attacks Classification
2.1 Network-Based Attack
2.2 Virtual Machine (VM)-Based Attack
2.3 Storage-Based Attack
2.4 Application-Based Attack
3 Contributions, Limitations of Existing Approach
4 Conclusion
References
Feature Extraction and Disease Prediction from Paddy Crops Using Data Mining Techniques
1 Introduction
2 Image Processing and Feature Extraction from Diseased Rice Images
2.1 Noise Removal
2.2 Shadow Removal
2.3 Image Enhancement
2.4 Image Segmentation
2.5 Feature Extraction
3 Data Mining Techniques for Rice Disease Prediction
3.1 Similarity Measure
3.2 Closure Property of a Feature
4 Result and Discussions
5 Conclusion
References
Estimating Software Effort Using Neural Network: An Experimental Investigation
1 Introduction
2 Literature Review
3 Basic PreliminaryâArtificial Neural Network
4 Work Done
5 Experimental Setup
5.1 OrangeâVisual Programming
5.2 Dataset Description
5.3 Configuring the Various Models for Predicting the Software Effort Estimate Using Orange Tool
5.4 Details of Software Effort Estimation Using BPNN
5.5 Methodology
6 Results
7 Conclusion
References
Statistical Analysis on Efficacy of Yagya Therapy for Type-2 Diabetic Mellitus Patients Through Various Parameters
1 Introduction
2 Literature Survey
3 Objective and Aims
4 Methodology and Material
5 Mode of Treatment
6 Method of Yagya Therapy
7 Required Material for Therapy
8 Treatment Schedule Duration
9 Follow-up
10 The Process of Therapy
10.1 Session IâPre-Yagya Therapy Session
10.2 Session IIâMain Yagya Therapy Session
10.3 Session IIIâPost Yagya Therapy Session with Duration: 30 Min
11 Pathya-Apathya and Dincharya (the Prescribed Diet Schedule)
12 Selection Criteria of Patient
12.1 Inclusion Criteria
12.2 Exclusion Criteria
12.3 Assessment Criteria
13 Observations
14 Results and Interpretations
15 Graph Analysis and Discussion
16 Conclusion
17 Acknowledgement
18 Limitations of the Study
19 Funding
20 Ethics Issue
Annexure-1âthe List of Special Herbs Used for Diabetes
Annexure-2âList of Asans Performed by Subjects
References
A Proposed Gene Selection Approach for Disease Detection
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Analysis and Result
5 Summary and Conclusion
References
Deep Recurrent Neural Network (Deep-RNN) for Classification of Nonlinear Data
1 Introduction
2 Proposed Work
2.1 Recurrent Neural Network
3 Implemented Method of Deep-RNN
4 Results and Discussion
5 Conclusions
References
Elephant Herding Optimization for Multiprocessor Task Scheduling in Heterogeneous Environment
1 Introduction
2 The Problem
3 Implemented Elephant Herding Optimization Algorithm
4 Task Allotment Using EHO
5 Simulation Results
6 Conclusion
7 Future Work
References
Analysis of Parallel M5P and Random Forest Regression for Visualization of Traffic Behavior
1 Introduction
2 Methodology
2.1 Flow of Experimentation
2.2 Knowledge Development
2.3 M5P Rules
2.4 Random Forest Regression Algorithm
2.5 Traffic Data Acquisition
2.6 Traffic Prediction and Visualization
3 Spark Architecture
4 Results
4.1 Evaluation
4.2 Experiments
4.3 Visualization
5 Conclusion
References
Software Effort Estimation Using Particle Swarm Optimization: Advances and Challenges
1 Introduction
2 Software Effort Estimation
3 Particle Swarm Optimization
4 Importance of Particle Swarm Optimization in SEE
5 Variants of Particle Swarm Optimization Used for Software Effort Estimation
6 Critical Analysis
7 Conclusion
References
Modern Trends in Monitoring and Analysis of Chemical Pesticides by Using Artificial Neural Networks
1 Introduction
2 Methodology
3 Result
4 Conclusion
References
Semi-supervised Change Detection Technique on Remote Sensing Images Using Posterior Probabilities
1 Introduction
2 Proposed Algorithm
3 Experimental Results
4 Conclusion
References
Feature Engineering for Cardio-Thoracic Disease Detection from NIH Chest Radiographs
1 Introduction
1.1 The Data
1.2 Medical Imaging
2 Methodology
2.1 Preparing the Data
2.2 Feature Engineering
2.3 The Model
2.4 Image Segmentation
3 Conclusion
4 Results
4.1 Future Work
References
Wireless Body Area Network: An Application of IoT and Its IssusesâA Survey
1 Introduction
2 Wireless Body Area Network (WBAN)
2.1 WBAN Three-Tier Architecture
2.2 Communication Standard
3 Security and Privacy Issues in WBAN
4 Application
5 Drawbacks
6 Conclusion
References
Enhancing Security for Communication in Wireless Sensor Network
1 Introduction
2 Related Work
3 Proposed System
4 Conclusion
References
Dimension Reduction of Microarray Data Using Gene Ontology and Correlation Filter
1 Introduction
2 Methodology
2.1 Dataset Preparation
2.2 Classification of Genes
2.3 Gene Correlation Filter
3 Significance of Independent Component(IC) Terms
4 Experimental Results
5 Conclusion
References
Modified Contrast Enhancement Algorithm Using Numerical Integration Simpson's Method
1 Introduction
2 Background
3 Proposed Method
4 Result Analysis
5 Conclusion
References
WHMS: An Efficient Wireless NoC Design for Better Communication Efficiency
1 Introduction
2 Related Work
3 Proposed Architecture
3.1 Proposed Hybrid Topology
3.2 Router Design
3.3 Deadlock Avoidance
4 Overall Communication Components
5 Performance Analysis
5.1 Performance Metrics
6 Conclusion
References
Data Hiding Based on Decagon-Shaped Shell
1 Introduction
2 Related Works
3 Proposed Scheme
3.1 Construction of Reference Matrix
3.2 Data Embedding
3.3 Data Extraction
4 Analysis of Experimental Results
5 Conclusions
References
Lightweight Secure Routing Over Vehicular Ad Hoc Networks with Traffic Status
1 Introduction
2 Related Work
3 Proposed Methodology
4 Result and Analysis
5 Conclusion
References
On Prediction Models for the Detection of Autism Spectrum Disorder
1 Introduction
2 Neuroimaging
3 ASD Diagnosis Presented a Classification Task
4 Application of ML and DL in ASD Research
4.1 Support Vector Machine
4.2 Random Forest
4.3 Linear Discriminant Analysis
4.4 Fuzzy C-Means
4.5 Restricted Boltzman Machines
4.6 Neural Network
4.7 k-Nearest Neighbours
4.8 Multi-subject Dictionary Learning
4.9 L2-Regularized Logistic Regression
5 Methods
6 Comparative Study and Discussion
7 Conclusion
References
A Dynamic Efficient Protocol Secure for Privacy-Preserving Communication-Based VANET
1 Introduction
2 Related Work
3 Problem Identification
4 Proposed SIVNFC the System Architecture Prevention Model (SAPM)
5 Implementation and Performance Analysis Through Simulation
5.1 The Packet Delivery Ratio
5.2 Routing Protocols Overhead
6 Conclusion
References
Raw Data Redundancy Elimination on Cloud Database
1 Introduction
2 Related Works
3 Proposed Work
4 Result and Discussion
5 Conclusion
References
A Survey Report on Deep Learning Techniques in Underwater Acoustic Channels
1 Introduction
2 Literature Reviews
2.1 The Preliminary UWA Communication and Channel Estimation
2.2 Introduction of OFDM in UWA Communication and Channel Estimation
2.3 Underwater Acoustic OFDM Communications Using Deep Learning
2.4 An Optimum Model for the UWA Deep Learning System
2.5 Table of Comparison
3 Comparison of Optimum Existing Methods in UWA Communication Using Deep Learning
4 Conclusion
References
Feature Selection Using Rough Set Theory from Infected Rice Plant Images
1 Introduction
2 Description of Rice Disease
2.1 Bacterial Leaf Blight Disease
2.2 Brown Spot Disease
2.3 Leaf Smut Disease
3 Image Processing Techniques
3.1 Noise Removal
3.2 Shadow Removal
3.3 Image Enhancement
3.4 Image Segmentation
4 Feature Extractions
4.1 Color Feature
4.2 Texture Feature
5 Ranking of Features and Rough Set Theory
5.1 Pearsonâs Co-relation Coefficient
5.2 Rough Set Theory
5.3 Algorithm of Rough Set Theory
5.4 Proposed Algorithm
6 Results
7 Conclusions
References
Pi-Sigma Neural Network: Survey of a Decade Progress
1 Introduction
2 Higher-Order Neural Networks
2.1 Pi-Sigma Neural Network
3 Appliances of Pi-Sigma NN
4 Hybridization of PSNN Using Optimization Techniques
5 Analytical Investigation
6 Conclusion
References
Disease Feature Extraction and Disease Detection from Paddy Crops Using Image Processing and Deep Learning Technique
1 Introduction
2 Diseased Rice Data Preprocessing and Feature Extraction Using Digital Image Processing Technique
2.1 Special Domain Noise Removal
2.2 Special Domain Shadow Management
2.3 Special Domain Image Enhancement
2.4 Special Domain Image Convex Hull
2.5 Image Segmentation
2.6 Feature Extraction
3 Image Segmentation Using Deep Learning
4 Statistical Analysis of Image Data and Result Visualization
5 Results and Discussion
6 Conclusion
References
A Word Clustering-Based Crime Report Categorization Technique
1 Introduction
2 Graph-Based Word Clustering for Crime Reports Categorization
2.1 Measuring Co-occurrence by a Search Engine
2.2 Measuring Similarity-Based on Co-occurrence Matrix
2.3 Clustering of Words
2.4 Text Categorization Based on Word Clustering
3 Experimental Results
3.1 Data Collection
3.2 Evaluation of Clustering
4 Conclusion
References
Moth Flame Optimization: Developments and Challenges up to 2020
1 Introduction
2 Basic Preliminaries
2.1 Moth Flame Optimizer
2.2 Structure of MFO
3 Variations of MFO
3.1 Binary MFO
3.2 Modified MFO
3.3 Chaotic MFO
3.4 Opposition-Based MFO
3.5 Hybrid MFO
4 Applications of MFO
4.1 MFO in Image Segmentation
4.2 MFO in Feature Extraction
4.3 MFO in Power Dispatch Problem
4.4 MFO in Food Processing
4.5 MFO in Health Care
4.6 Global Optimization with MFO
4.7 MFO in Intrusion Detection
4.8 Other Applications
5 Critical Analysis
6 Research Challenges
7 Conclusion
References
Center-Symmetric Local Binary Pattern-Based Image Authentication Using Local and Global Features Vector
1 Introduction
2 Motivation and Objective
3 Proposed Scheme
3.1 Preprocessing
3.2 Wavelet Decomposition
3.3 Local Texture Feature
3.4 Global Feature Extraction from DCT-Coefficients
3.5 Hash Generation
3.6 Authentication
3.7 Embedding Algorithm
4 Experimental Results
4.1 Performance Comparison
5 Conclusions
References
Secured Cloud System Using Deep Learning
1 Introduction
2 State-of-the-Art
2.1 Research Gap
3 Proposed Model
4 Experimental Setup
5 Experimental Result
6 Conclusions
References
Quantum Key Sharing Protocol Using GHZ Like States in Multiparty Scheme
1 Introduction
2 General Idea Behind Quantum Information Science
3 Proposed New Scheme to Determine Quantum Key Using GHZ Like States
3.1 Sharing the Three Qubit Systems in GHZ Like States
3.2 The Quantum Determined Key Sharing Protocol
4 Whether Our Protocol Is Secure Under Different Attacks?
4.1 Man, in the Middle Attack and Our Protocol
5 Discussion and Conclusion
References
Controlling Emergency Vehicles During Road CongestionâA Survey and Solution
1 Introduction
1.1 Internet of Things (IoT)
2 Literature Review
3 Motivation and Objective
4 Proposed Method
5 Conclusion and Future Works
References
A Comparative Study on Various Text Classification Methods
1 Introduction
2 Different Featurization Techniques
2.1 Bag of Words/N-Grams
2.2 Term FrequencyâInverse Document Frequency (Tf-Idf)
2.3 Average Word2Vec
2.4 Tf-Idf Weighted Word2Vec
3 Different Classification Algorithms
3.1 Hyperparameter Tuning
3.2 K-Nearest Neighbours Classifier
3.3 NaĂŻve Bayes Classifier
3.4 Logistic Regression
3.5 Support Vector Machine
3.6 Decision Tree Classifier
4 Experimental Results
4.1 Data Collection
4.2 Text Preprocessing
4.3 Results Based on Amazon Fine Food Reviews Data set
4.4 Results Based on DonorsChoose Data set
5 Conclusion
References
Missing Value Imputation Using Correlation Coefficient
1 Introduction
2 Methodology
3 Results and Discussion
4 Conclusions
References
Bandwidth-Constrained QoS Routing in MANET
1 Introduction
2 Existing MANET Protocols
2.1 Ad Hoc on-Demand Distance Vector Routing Protocol (AODV)
2.2 Zone Routing Protocol (ZRP)
2.3 Temporally Ordered Routing Algorithm (TORA)
2.4 Dynamic Source Routing (DSR)
2.5 Destination Sequenced Distance Vector Routing (DSDV)
2.6 Cluster-Based Routing Protocol (CBRP)
3 Bandwidth Specific QoS Routing
3.1 Available Bandwidth Estimation
3.2 Route Discovery
3.3 Route Maintenance
3.4 Routing Algorithm
4 Simulation Environment
4.1 Performance Metrics
5 Conclusion
References
Empirical Analysis on Uddanam CKD with Unsupervised MLs Including PCA
1 Introduction
2 Review of Literature
3 Materials and Methods
3.1 Proposal Model
3.2 K-Means Clustering Algorithm
3.3 Agglomerative (Hierarchical) Clustering Algorithm
3.4 Principal Component Analysis (PCA) Algorithm
4 Results and Discussions
4.1 Statistical Analysis Uddanam CKD Dataset
4.2 K-Means Cluster Analysis on Uddanam CKD Data Set
4.3 Hierarchal Cluster Analysis on Uddanam CKD Data Set
4.4 Projections Analysis with PCA
5 Conclusion
References
Golf-Worm Swarm Optimized 2DOF-PIDN Controller for Frequency Regulation of Hybrid Power System
1 Introduction
2 Implemented System
3 Results and Discussions
4 Conclusion
References
đ SIMILAR VOLUMES
<span>This book features high-quality research papers presented at the 3rd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2021), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 24 â 25 April 2021. It includes practical develop
<span>This book features high-quality research papers presented at the 3rd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2021), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 24 â 25 April 2021. It includes practical develop
<p><p>This book presents practical development experiences in different areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network syst
<p><span>This book features high-quality research papers presented at the 4th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2022), held at Indian Institute of Engineering Science and Technology, Shibpur, Howrah, West Bengal, India, during 23 â 24 April 2022. It
<p><span>This book features high-quality research papers presented at the 5th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2023), held at Department of Computer Science and Engineering, Techno Main Salt Lake, West Bengal, India, during May 27â28, 2023. It inclu