𝔖 Scriptorium
✩   LIBER   ✩

📁

Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2022 (Lecture Notes in Networks and Systems, 480)

✍ Scribed by Asit Kumar Das (editor), Janmenjoy Nayak (editor), Bighnaraj Naik (editor), S. Vimal (editor), Danilo Pelusi (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
692
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book features high-quality research papers presented at the 4th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2022), held at Indian Institute of Engineering Science and Technology, Shibpur, Howrah, West Bengal, India, during 23 – 24 April 2022. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.

✩ Table of Contents


Preface
Acknowledgment
Organization
Chief Patron
Patrons
Honorary Advisory Chairs
Honorary General Chairs
General Chairs
Program Chairs
Co-program Chairs
Organizing Chairs
International Advisory Committee
Technical Committee
Publicity Chairs
Convenors
Co-convenors
Publication Chairs
Finance Chairs
CIPR Reviewers
Contents
About the Editors
COVID-19 Detection Using Deep Learning: A Comparative Study of Segmentation Algorithms
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Data Collection and Dataset Formation
3.2 Data Augmentation
3.3 Data Segmentation
3.4 Model Creation
3.5 Model Training and Testing
4 Workflow Diagram
5 Experimental Results
6 Conclusions and Future Work
References
Time Series Analysis on Covid 19 Summarized Twitter Data Using Modified TextRank
1 Introduction
2 Literature Survey
2.1 Input
2.2 Tweets Retrieval
2.3 Pre-processing
2.4 Sentiment Detection
2.5 Evaluation
3 Proposed Methodology
3.1 Data Collection and Preprocessing
3.2 TextRank Based Summarization
3.3 Topic Wise Keyword Selection and Count
4 Experimental Result
4.1 Topic Administration
4.2 Topic Disease
4.3 Topic Healthcare
4.4 Topic Location
4.5 Topic Precaution
4.6 Topic Citizens
5 Conclusion and Future Work
References
Low-Computation IoT System Framework for Face Recognition Using Deep Learning Algorithm
1 Introduction
2 Related Work
3 The Door-Lock System Architecture
4 Haar-Cascade EuFACENET with Fully Connected Face Authentication (HFFCFA)
5 Experimental Analysis Environment
5.1 Network Parameters
5.2 Performance Evaluation: Preliminary Match (Basic Match)
5.3 Performance: With Variation in the Parameters (Camera and Face)
6 Conclusion
References
Vehicle Number Plate Recognition System
1 Introduction
2 Image Pre-processıng
2.1 RGB to Gray
2.2 Grayscale to Binary Image
2.3 Noise Removal by Median Filter
2.4 Histogram Equalization
2.5 Edge Detection
2.6 Morphological Operations
2.7 Filling Holes and Clearing Borders
3 Extraction of Number Plate Location
4 Segmentation and Recognition of Plate Character
4.1 Segmentation of Characters
4.2 Template Matching
5 MATLAB Results
6 Applications of NRP System
7 Conclusion
References
An Approach to Medical Diagnosis Using Smart Chatbot
1 Introduction
2 Literature Review
3 Experimental Setup
3.1 Software
3.2 Hardware
3.3 Security Checks
3.4 Modules Description
3.5 Algorithm
4 Dataset Description
5 Result Analysis
6 Comparative Analysis
7 Conclusion
8 Future Scope
References
Performance Analysis of Hybrid Filter Using PI and PI-Fuzzy Based UVTG Technique
1 Introduction
2 Design of the Proposed System
3 Control Approach
3.1 UVTG Control Algorithms Implementation
3.2 Proposed FLC Algorithm
3.3 Hysteresis Current Controller
4 Result and Analysis
4.1 PI with UVTG Controller Implementation
4.2 FLC Along with PI and UVTG Implementation
5 Conclusions
References
Transmission of Aggregated Data in LOADng-Based IoT Networks
1 Introduction
2 Related Works
3 LOADng Protocol
3.1 SmartRREQ
4 Proposed Methodology
4.1 Data Aggregation Phase
4.2 Routing Phase
5 Implementation and Result
5.1 Parameters for Simulation
5.2 Experimental Results
6 Conclusion and Future Work
References
Deep Learning Based Facial Mask Detection Using Mobilenetv2
1 Introduction
2 Background of the Work
3 Implementation
3.1 Dataset Analysis
3.2 Model Training
3.3 Detection
3.4 Covid Updates
3.5 Covid Updates GUI
3.6 Main GUI
4 Experimental Setup
5 Pseudocode
5.1 Training
5.2 Detection
5.3 Mask Detection GUI
5.4 Corona Global Update GUI
5.5 Covid Updates
6 Result Analysis
7 Future Scope
8 Conclusion
References
A Novel Approach to Detect Power Theft in a Distribution System Using Machine Learning and Artificial Intelligence
1 Introduction
2 The Proposed Power Theft Detection Approach
2.1 Field Data Collection
2.2 Description of the Dataset
3 Case Study and Results
3.1 Description of the Test Case
3.2 Decision Tree Classifier
3.3 Random Forest
3.4 K Nearest Neighbor
3.5 Support Vector Machine
3.6 Logistic Regression
3.7 Artificial Neural Network
3.8 Comparison Among the Six Machine Learning Classifiers
4 Conclusions
References
Adversarial Surround Localization and Robust Obstacle Detection with Point Cloud Mapping
1 Introduction
2 Related Work
3 Methodology
4 Experiment and Result Analysis
5 Conclusion and Future Scope
References
Perceptive Analysis of Chronic Kidney Disease Data Through Conceptual Visualization
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Data Collection
3.2 Feature Extraction
3.3 Data Pre-processing
3.4 Data Visualisation
3.5 Hypothesis Testing
3.6 Transformation
3.7 Feature Selection
4 Results and Discussion
5 Conclusion
References
Islanding Detection in Microgrid Using Decision Tree Pattern Classifier
1 Introduction
1.1 Existing IDMs
1.2 Contribution to the Work
2 Discrete Wavelet Transform
3 Decision Tree Classifier
4 Proposed DT Based Islanding Detection Scheme
5 Illustrative Example of Implementation of the Proposed Scheme
5.1 Modelling of Microgrid
5.2 Data Collection
5.3 Feature Extraction Using DWT
5.4 Classifier Training
5.5 Result and Analysis
5.6 Comparison with Other Methods
6 Conclusion
References
Identification of Lung Cancer Nodules from CT Images Using 2D Convolutional Neural Networks
1 Introduction
2 Proposed Method
2.1 Nodule Segmentation
2.2 Network Architecture and Training Phase
3 Experimental Results
4 Conclusion
References
A Pixel Dependent Adaptive Gamma Correction Based Image Enhancement Technique
1 Introduction
2 Proposed PAGC Approach
3 Results and Analysis
3.1 Entropy
3.2 Colorfulness
3.3 Contrast
4 Conclusion
References
Summarization of Comic Videos
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Transcript Generation
3.2 Transcript Summarization
3.3 Video Summary Generation
4 Dataset and Experimental Results
4.1 Development of Dataset
4.2 Evaluation Parameters
4.3 Result Analysis
5 Conclusion
References
TextUnet: Text Segmentation Using U-net
1 Introduction
2 Methodology
2.1 Preprocessing
2.2 Algorithm
3 Results
3.1 Comparison Among Models Used During Our Experiments
3.2 Comparison with the R.R.C. Leader Board
4 Summary and Scope for Future Improvements
References
A Survey on Prediction of Heart Disease Using Machine Intelligence Techniques
1 Introduction
2 Literature Review
2.1 Data Mining
2.2 Machine Learning
2.3 Deep Learning
3 Various Tools Used for HD Prediction System
4 Major Challenges
5 Conclusion
References
Predictive Analysis of Child's Mental Health/Psychology During the COVID-19 Pandemic
1 Introduction
1.1 Motivation and Contributions
2 Related Works
3 Materials and Methods
3.1 COVID-19 Questionnaire
3.2 Participants
3.3 Data Collection
3.4 Classifiers
3.5 Experimental Setup
4 Results and Findings
4.1 Statistical Evaluation
5 Discussion
6 Conclusion
References
Impact of Security in Blockchain Based Real Time Applications
1 Introduction
2 Blockchain Technology
3 Blockchain Categorization
3.1 Private Blockchain
3.2 Public Blockchain
3.3 Consortium Blockchain
4 Hashing Algorithms in Blockchain Technology
5 Security in Blockchain Based Applications
5.1 Product Tracking
5.2 Smart Contract
6 Conclusion
References
An Evaluative Review on Various Tele-Health Systems Proposed in COVID Phase
1 Introduction
2 Some Proposed Works in COVID Period
3 Conclusion
References
Efficient Scheduling Algorithm Based on Duty-Cycle for e-Health Monitoring System
1 Introduction
2 Literature Review
3 Proposed System
3.1 Proposed Approach
3.2 Algorithm
4 Experimental Result
4.1 Energy Conservation
4.2 Mobile Application
4.3 Simulation Outcomes
5 Future Work
6 Conclusion
References
Image Splicing Detection Using Feature Based Machine Learning Methods and Deep Learning Mechanisms
1 Introduction
2 Image Splıcıng Detectıon Based on Feature Extractıon and Machıne Learnıng
2.1 Markov Features Based Image Splicing Detection
2.2 Image Splicing Detection Based on Hybrid Feature Set
2.3 Singular Value Decomposition and DCT Based Splicing Detection
2.4 Image Splicing Detection Based on Markov Features in QDCT Domain
2.5 Image Forgery Detection in Color Images Based on LBP and DCT
3 Image Splıcıng Detectıon Based on Deep Learning
3.1 Image Splicing Detection Based on Mask-RCNN and ResNet-Conv
3.2 Image Forgery Detection Based on WPIC and CNN
3.3 Image Splicing Detection Based on Illuminant Maps and CNN
3.4 Image Splicing Detection and Localization Based on Local Feature Descriptor Using Deep CNN
4 Datasets
4.1 CASIA Version 1.0
4.2 CASIA Version 2.0
4.3 Columbia Image Splicing Detection Evaluation Dataset
4.4 DSO-1 and DSI-1
4.5 Coco
5 Performance Metrics
5.1 Accuracy
5.2 Precision
5.3 Recall or Sensitivity
5.4 ROC-AUC Score
5.5 F-1 Score
6 Comparative Study
7 Conclusıon and Future Scope
References
Audio Driven Artificial Video Face Synthesis Using GAN and Machine Learning Approaches
1 Introduction
1.1 Overview of Artificial Video Synthesis and Its Detection
1.2 State-of-the-Art Video Synthesis Tools
2 Related Literature
2.1 Detection Techniques - An Overview
3 Artıfıcıal Vıdeo Synthesıs - Approaches, Tools and Technıques
3.1 Facial Expression Analysis and Capturing Emotions
3.2 Facial (Chin, Eye Blink, Teeth) Movement Analysis
3.3 GANs in Artificial Video Synthesis
4 Results and Analysis
5 Conclusion and Future Scope
References
Design of an Elevator Traffic System Using MATLAB Simulation
1 Introduction
2 Literature Review
3 Methodology
3.1 Queue Problem
3.2 Elevator Queue System as a Queue Problem
3.3 Assumptions of the Model
4 Operational Model of the Elevator System
5 Conclusion
References
A Simple Strategy for Handling NOT' Can Improve the Performance of Sentiment Analysis 1 Introduction 2 Related Work 3 Handling ofNOT'
3.1 Presence of Conjunction
3.2 Presence of Punctuation Marks
3.3 Dynamic Window
3.4 Presence of Diminishers
3.5 POS Tag
4 Experimental Analysis
4.1 Dataset Gathering and Experiment Setup
4.2 Classification Models
4.3 Performance Metrics
4.4 Comparison of Performance
5 Conclusion and Future Span
References
Rule Based Classification Using Particle Swarm Optimization for Heart Disease Prediction
1 Introduction
2 Proposed Methodology
2.1 Initialization Steps of the Method
2.2 Fitness Function
2.3 Dominance-Relationship Based Particle Swarm Optimization Based Classification
3 Experimental Results
4 Conclusion and Future Plans
References
A Deep Learning Based Approach to Measure Confidence for Virtual Interviews
1 Introduction
2 Literature Review
3 Problem with Feedforward Neural Network
4 Understanding Convolutional Neural Network
4.1 Stride and Padding
4.2 Convolutional Layer
4.3 Pooling Layer
4.4 Fully Connected Layer
4.5 Optimizers
5 Experimental Setup
5.1 Dataset Description
5.2 Workflow Diagram
5.3 Component Modules
5.4 Algorithmic Steps
5.5 GUI with OpenCV
6 Results and Analysis
7 Conclusion
References
A Commercial Banking Industry Resilience in the Case of Pandemic: An Impact Analysis Through ANOVA
1 Introduction
1.1 Research Objectives
1.2 Conceptual Framework of the Study
2 Literature Review
2.1 COVID-19 and Fiscal–Monetary Policy Coordination
3 Research Methodology
3.1 Analysis of Data
4 Result Analysis and Discussion
5 Conclusion
6 Research Implication and Future Scope of Study
References
Fractal Analysis of RGB Color Images
1 Introduction
2 Basic Fractal Dimension and Related Work
2.1 Extended Probability Box Counting Technique
2.2 Box Merging
2.3 Maximum Color Distance
2.4 Improved Differential Box Counting
2.5 Extended DBC Approach Using MED
2.6 Modified Box Counting
3 Research Challenges
4 Conclusion
References
Deep Features for COVID-19 Detection: Performance Evaluation on Multiple Classifiers
1 Introduction
2 Related Works
3 Proposed Methods
3.1 Pre-processing
3.2 Feature Extraction
3.3 Feature Selection
3.4 Classification
4 Experiment
4.1 Experimental Setup
4.2 Evaluation Protocols
4.3 Datasets
4.4 Results
5 Comparison
6 Conclusion
References
Issues, Challenges, and Possibilities in IoT and Cloud Computing
1 Introduction
2 Background
3 Cloud-IoT Challenges
3.1 Security
3.2 Storage and Computational Performance
3.3 Reliability
3.4 Big Data Storage
3.5 Edge Computing
3.6 User Aided IoT Devices
4 Literature Review
5 Discussion
6 Critical Discussion
7 Conclusion
References
Agricultural Image Augmentation with Generative Adversarial Networks GANs
1 Introduction
2 Literature Review
3 Proposed Method
3.1 Get User Details
3.2 Data Collection
3.3 Data Pre-processing
3.4 Generator
3.5 Discriminator
3.6 Train GAN
3.7 Generate and Save Images
4 Results and Discussion
5 Conclusion
References
Thermal Image Augmentation with Generative Adversarial Network for Agricultural Disease Prediction
1 Introduction
2 Methodology
2.1 Data Collection
2.2 Data Augmentation
2.3 Data Classification
2.4 Output Validation
3 Results and Discussion
4 Conclusion
References
Learning Temporal Mobility Patterns to Improve QoS in Mobile Wireless Communications
1 Introduction
1.1 Related Works
1.2 Contributions
2 System Model
2.1 Related Works
2.2 Base Station
2.3 Mobile Sensors
3 Approach
3.1 Generation of Trip
3.2 Temporal Feature Engineering
3.3 Updating Mobility Parameters
3.4 Spatio-Temporal View of Mobile WSN
3.5 Training and Testing
4 Results
4.1 Effect of Reset Probability
4.2 Comparison with Baseline
5 Conclusion
References
Automatic Question Generation from Video
1 Introduction
2 Literature Survey
3 Objectives
4 Proposed Methodology
4.1 System Requirements and Tools
4.2 System Design
4.3 Text Extraction
4.4 Transfer Learning
4.5 T5 Transformer
4.6 Hugging Face Transformer Library
4.7 Datasets
4.8 Yes or No Question Generation
4.9 WH Question Generation
5 Results and Discussions
6 Conclusion
References
Features Selection for Vessel Extraction Inspired by Survival of the Fittest Method
1 Introduction
2 Feature Selection
2.1 Set of Gabor Filters
2.2 Various Edge Detectors
2.3 Blurring Methods
3 Ensemble Learning
4 Algorithm: Selection of Influential Features
5 Review and Comparison of Results
6 Future Prospects and Conclusion
References
A Proposed Federated Learning Model for Vaccination Tweets
1 Introduction
2 Related Work
3 Experiments
3.1 Dataset
3.2 Heatmap
3.3 Data Preprocessing
3.4 Feature Extraction
3.5 Assigning Polarity
4 Proposed Approach
4.1 Deep Learning Models
4.2 Model Execution
5 Limitations, Conclusion and Future Work
5.1 Limitations
5.2 Conclusions
5.3 Future Work
References
A New Reversible Data Hiding Scheme by Altering Interpolated Pixels Exploiting Neighbor Mean Interpolation (NMI)
1 Introduction
2 Related Works
3 Proposed Method
3.1 Data Embedding Procedure
3.2 Data Extraction Procedure
3.3 Numerical Example
4 Experimental Analysis and Comparisons
5 Conclusions
References
A Proposed Fuzzy Logic Model for Waste Water Treatment Analysis
1 Introduction
2 Waste-Water Treatment Plant
3 Literature Review
4 Models Used in Waste Water Treatment Analysis
4.1 Artificial Neural Network
4.2 Fuzzy Inference System
4.3 Adaptive Neuro - Fuzzy Inference System
5 Methodologies
5.1 Mean Square Error (MSE)
5.2 Mean Absolute Percentage Error (MAPE)
5.3 Correlation Coefficient (R and R2)
5.4 Proposed Method
6 Results and Discussion
7 Conclusion
References
Deep Learning Based Identification of Three Exotic Carps
1 Introduction
2 Literature Survey
3 Methods
3.1 VGG16 [12]
3.2 VGG-19 [12]
3.3 InceptionV3 [12]
3.4 Inception ResNetV2 [12]
3.5 MobileNet [12]
4 Dataset Preparation
5 Experiment Protocol and Results
6 Conclusion and Future Scope
References
Single Image Fog Removal Using WLS Smoothing Filter Combining CLAHE with DWT
1 Introduction
1.1 Features and Applications of Fog Removal
2 Literature Survey
2.1 Motivation
2.2 Contribution
3 Fog Removal Methodology
4 Proposed Method
4.1 Contrast Gain
5 Results and Analysis
6 Conclusion
References
Smart Surveillance Video Monitoring for Home Intruder Detection Using Deep Neural Network
1 Introduction
2 Related Works
3 Methodology
3.1 Transfer Learning
3.2 Feature Extraction
3.3 Sequence Learning
3.4 Classification
4 Experimental Results
4.1 Dataset Preparation
4.2 Prediction
4.3 Comparison of the CNN Models
4.4 Classification Result Analysis
5 Conclusion
References
is-Entropy: A Novel Uncertainty Measure for Image Segmentation
1 Introduction
2 Background and Axioms to be Satisfied for Entropy
3 Inverse Sine - Entropy
3.1 Properties of the is-Entropy
4 Simulations
5 Conclusion and Discussion
References
AGC Based Market Modeling of Deregulated Power System Employing Electric Vehicles and Battery Energy Storage System
1 Introduction
2 Investigation on the Test System
3 Results and Discussion
4 Conclusion
References
Acute Lymphocytic Leukemia Classification Using Color and Geometry Based Features
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Segmentation
3.2 Feature Extraction
3.3 Classification
4 Dataset and Experiments
4.1 Results
5 Conclusion
References
Thermal Strain Resolution Improvement in Brillouin OTDR Based DTS System Using LWT-MPSO Technique
1 Inroductıon
2 Theory
3 Results and Discussions
4 Conclusion
References
Wrapper Based Feature Selection Approach Using Black Widow Optimization Algorithm for Data Classification
1 Introduction
2 Feature Selection-Black Widow Optimization
3 Experiment and Result Analysis
4 Conclusion
References
Multi-objective Optimization for Complex Trajectory Tracking of 6-DOF Robotic Arm Manipulators
1 Introduction
2 PID-Computed Torque Control
3 Genetic Algorithm
4 Results and Analysis
5 Conclusion
References
MANDS: Malicious Node Detection System for Sinkhole Attack in WSN Using DRI and Cross Check Method
1 Introduction
2 Network and Attack Model
3 Proposed Model
4 Implementatıon and Result
5 Conclusion
References
An Intelligent Framework Towards Managing Big Data in Internet of Healthcare Things
1 Introduction
1.1 Motivations
2 Related Studies
3 Proposed Framework
3.1 Machine Learning Models
3.2 Genetic Algorithm (GA) Model
4 Results and Discussions
5 Conclusions
References
Deep Learning Approach for Anamoly Detection in CAN Bus Network: An Intelligent LSTM-Based Intrusion Detection System
1 Introduction
2 Related Works
3 Proposed Work
4 Dataset and Simulation Environment
4.1 Simulation Environment
5 Simulation Results Overview
5.1 Results Analysis on Preliminary Driving Samples
5.2 Results Analysis on Preliminary Stationary Samples
5.3 Results Analysis on Final Stationary Samples
6 Conclusion
References
Predictive Geospatial Crime Data Analysis and Their Association with Demographic Features Through Machine Learning Approaches
1 Introduction
2 Related Work and Motivation
2.1 Motivation
3 Proposed Methodology
3.1 Source of Data
3.2 Pre-processing of Data
3.3 Data Cleaning and Feature Dimension Reduction
4 Result and Discussion
4.1 Description of Dataset
4.2 Analysis of Results
4.3 Predictive Result Analysis in Vancouver Crime Dataset
5 Conclusion
References
Design of an Image Transmission System Employing a Hybridization of Bit-Plane Slicing, Run-Length Encoding and Vector Quantization Based Visual Cryptography Scheme
1 Introduction
2 Materials and Methods
2.1 (2, 2) – VCS
2.2 Bit-Plane Slicing
2.3 Run-Length Encoding (RLE)
2.4 Vector Quantization (VQ)
3 The Proposed Image Transmission System
3.1 Share Generation Using (2, 2) – QSP Based VCS
3.2 Bit-Plane Generation
3.3 Encoding of Bit-Planes Using Modified RLE
3.4 Compression of RLE Generated Code Using Vector Quantization (VQ)
3.5 Regeneration of RLE-Code
3.6 Regeneration of Bit-Planes
3.7 Regeneration of Shares
3.8 Revealing of the Secret Image
3.9 Applying the Proposed Cryptosystem on Color Image
4 Performance Analysis
5 Security Analysis
6 Conclusion
References
Gravitational Search Optimized Light Gradient Boosting Machine for Identification of Malicious Access in IoT Network
1 Introduction
2 Proposed Approach
3 Result Analysis and Discussion
4 Conclusion
References
A Hybrid Semi-supervised Learning with Nature-Inspired Optimization for Intrusion Detection System in IoT Environment
1 Introduction
2 Related Works
3 Semi-supervised Classification Method
4 Natured Inspired Optimizations
5 Experiment Setup and Datasets Descriptions
5.1 System Environment
5.2 TONIoT Dataset
5.3 Data Pre-processing
6 Results
7 Conclusion and Future Work
References
Secure Sharing of Medical Images Using Watermarking Technique
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 Embedding Technique
3.2 Extraction Technique
4 Result and Discussion
4.1 Experimental Approach to Input Image
4.2 Experimental Result
4.3 Histogram Representation of Original Medical Cover Image and Watermark Embedded Medical Image
5 Conclusion
References
An Impact Study on Covid-19 with Sustainable Sports Tourism: Intelligent Solutions, Issues and Future Challenges
1 Introduction
2 Sustainable Developments of Sports Tourism
3 Sports Tourism in Various Countries
4 Policy and Research in Sports Tourism
5 Characteristic of Sports Tourism
6 Intelligent Solution for Sports Tourism
7 Critical Analysis
8 Conclusion
References
Deep Learning Based Framework for Breast Cancer Mammography Classification Using Resnet50
1 Introduction
2 Related Works
3 Proposed Work
3.1 Proposed ResNet50
4 Setup for Experimental Work and Dataset Overview
4.1 Dataset of Mammogram Images
5 Analysis of the Results
6 Conclusion
References
A Game Theoretic Group Coordination Strategy for Multi Robot Navigation
1 Introduction
2 Problem Formulation
2.1 Coordination as a Motion Planning Problem
2.2 Mathematical Derivation of Velocity and Travelling Time
3 Coordinated Motion of Mobile Robot Groups
4 Simulation Experiments and Discussions
5 Conclusion
References
Moth Flame Optimization Algorithm Optimized Modified TID Controller for Automatic Generation Control of Multi Area Power System
1 Introduction
2 The Studied Power System Model
3 Control Technique
4 Result Analysis
5 Conclusion
References
Identification of Malicious Access in IoT Network by Using Artificial Physics Optimized Light Gradient Boosting Machine
1 Introduction
2 Proposed Method
3 Result and Discussion
4 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Computational Intelligence in Pattern Re
✍ Asit Kumar Das (editor), Janmenjoy Nayak (editor), Bighnaraj Naik (editor), S. V 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book features high-quality research papers presented at the 4th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2022), held at Indian Institute of Engineering Science and Technology, Shibpur, Howrah, West Bengal, India, during 23 – 24 April 2022. It

Computational Intelligence in Pattern Re
✍ Asit Kumar Das (editor), Janmenjoy Nayak (editor), Bighnaraj Naik (editor), S. V 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book features high-quality research papers presented at the 5th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2023), held at Department of Computer Science and Engineering, Techno Main Salt Lake, West Bengal, India, during May 27–28, 2023. It inclu

Computational Intelligence in Pattern Re
✍ Asit Kumar Das (editor), Janmenjoy Nayak (editor), Bighnaraj Naik (editor), Soum 📂 Library 📅 2020 🏛 Springer 🌐 English

<p><span>This book features high-quality research papers presented at the 2nd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2020), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 4–5 January 2020. It includes practical develo

Computational Intelligence in Pattern Re
✍ Asit Kumar Das (editor), Janmenjoy Nayak (editor), Bighnaraj Naik (editor), Soum 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book features high-quality research papers presented at the 3rd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2021), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 24 – 25 April 2021. It includes practical develop

Computational Intelligence in Pattern Re
✍ Asit Kumar Das, Janmenjoy Nayak, Bighnaraj Naik, Soumi Dutta, Danilo Pelusi 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book features high-quality research papers presented at the 3rd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2021), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 24 – 25 April 2021. It includes practical develop

Computational Intelligence in Pattern Re
✍ Asit Kumar Das (editor), Janmenjoy Nayak (editor), Bighnaraj Naik (editor), Soum 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book features high-quality research papers presented at the 3rd International Conference on Computational Intelligence in Pattern Recognition (CIPR 2021), held at the Institute of Engineering and Management, Kolkata, West Bengal, India, on 24 – 25 April 2021. It includes practical develop