<p><span>The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 16â17, 2021. This book dis
Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2021 (Algorithms for Intelligent Systems)
â Scribed by I. Jeena Jacob (editor), Selvanayaki Kolandapalayam Shanmugam (editor), Robert Bestak (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 843
- Edition
- 1st ed. 2022
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 16â17, 2021. This book discusses new cognitive informatics tools, algorithms, and methods that mimic the mechanisms of the human brain which leads to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning, and cognitive science to study and develop a deeper understanding of the information processing systems.
⊠Table of Contents
Foreword
Preface
Acknowledgments
Contents
About the Editors
1 NLP-Based Resume Screening and Job Recruitment Portal
1 Introduction
2 Literature Review
3 Proposed System
3.1 Admin
3.2 Recruiter
3.3 Applicant
3.4 Feature Extraction Process
3.5 Score Calculation
4 Implementation Details
5 Conclusion
References
2 Access Control and Authorization Techniques w.r.t. Client Applications
1 Introduction
2 Provisioning of Public Clients
3 Never Trust, Always VerifyâSecure Client Access (Org. IAM Validates Each Client Request)
3.1 Data Flow
3.2 Best Practices w.r.t Authentication and Authorization Techniques
3.3 Secure Data Storage and Secure Data Flow over Public Clients and Business Applications
3.4 Threat Modeling of Reference Architecture Diagram 1 (Fig. 1)
4 Never Trust, Always VerifyâSecure Client Access Using Self-Contained JWT Tokens
4.1 JWT
4.2 JWT Creation and Verification
4.3 Sequence Flow
5 Proof Key for Code Exchange (PKCE)
5.1 Sequence Flow
6 Device Code Flow
6.1 Sequence Flow
6.2 Request/Response Flow [9, 15]
7 Mutual TLS Authenticated Certificate-Bound Access Tokens
7.1 Sequence Flow
7.2 JWT Payload Containing an âx5t#S256â
8 Table of Comparison
9 Conclusion
References
3 Anomaly Detection in Biomedical Data and Image Using Various Shallow and Deep Learning Algorithms
1 Introduction
2 Related Works
3 Data Description
3.1 Data for Shallow Learning
3.2 Data for Deep Learning
4 Experiment Setup
4.1 Shallow Learning
4.2 Deep Learning
5 Result and Performance Analysis
5.1 Shallow Learning
5.2 Deep Learning
6 Conclusion
References
4 Quantum Generative Adversarial Networks
1 Introduction
2 Literature Review
3 Proposed Method
4 MiniMax Game
5 Framework for Quantum Implementation
6 Experimental Data and Results
6.1 Data Description
6.2 Results
7 Conclusion
References
5 Sentimental Analysis for E-commerce Site
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 Dataset
4 Technology Confıguratıon
4.1 Python
4.2 Matpoltlib
5 Results
6 Conclusion
References
6 A Novel Approach to Apply Different Algorithms to Predict COVID-19 Disease
1 Introduction
2 Literature Survey
3 Block Diagram
4 Implementation
5 Experimental Set up and Results
6 Conclusion
7 Future Scope
References
7 Gene Regulation via Bloom Filter
1 Introduction
2 Biological Gene Expression
3 Probabilistic Data Structures
4 Proposed Algorithm
4.1 Chromosome Representation
4.2 Fitness Evaluation
4.3 Mutation
4.4 Crossover
5 Evaluation
6 Results
7 Conclusion
References
8 A Novel Survey on Ubiquitous Computing
1 Introduction
2 Challenges
2.1 Interface and Interaction
2.2 Security
2.3 Hardware Limitations
2.4 Privacy of Location
2.5 Speed and Connectivity
3 Future Scope
4 Conclusion
References
9 Emotion Recognition in Speech Using Convolutional Neural Networks
1 Introduction
1.1 Challenges with SER
2 Related Work
3 Methodology
3.1 Feature Selection
3.2 CNN Model
3.3 Emotions Considered in This Paper
4 Experimentation and Results
5 Conclusion
6 Note on Future Work
References
10 A Novel Hybrid Clustering Analysis Based on Combination of K-Means and PSO Algorithm
1 Introduction
2 Literature Survey
2.1 K-means Algorithm
2.2 Particle Swarm Optimization
3 Proposed Architecture
4 Results and Discussion
4.1 Dataset Description
4.2 Clustering Validity Measures
4.3 Experimental Results and Discussion
5 Conclusion
References
11 Hybridizing Sentence Transformer Model with Multi-KNN for Biomedical Documents
1 Introduction
2 Problem Description
2.1 Dataset Description
2.2 Mapping to Multi-label Classification Problem
3 Proposed Approach
4 Experiments and Results
5 Conclusions
References
12 Analysis and Detection of COVID-19 Using Various CNN Models
1 Introduction
2 Literature Survey
3 Materials and Methods
3.1 Dataset Description
3.2 Xception Model
3.3 InceptionV3 Model
3.4 ResNet50 Model
3.5 VGG19 Model
3.6 Methodology
4 Experimental Analysis and Results
5 Conclusion and Future Scope
References
13 Classification of Hateful Memes Using Multimodal Models
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Dataset
3.2 Experimental Setup
4 Results and Discussion
5 Conclusions and Future Work
References
14 Fake News Detection
1 Introduction
2 Proposed System
3 Description
3.1 Term Frequency-Inverse Document Frequency (TF-IDF)
3.2 Inverse Document Frequency (IDF)
3.3 Design Approach
3.4 Cleaning Dataset
3.5 Algorithm
3.6 Result
3.7 Conclusion
References
15 Implementation of Nobel Vedic Multiplier Using Arithmetic Adder
1 Introduction
2 Methodology
2.1 Vedic Multiplier
3 Simulation Result and Discussion
4 Conclusion
16 Community Detection Using GirvanâNewman and KernighanâLin Bipartition Algorithms
1 Introduction
2 Related Work
3 Methodology
3.1 GirvanâNewman Algorithm
3.2 KernighanâLin Bipartition Algorithm
3.3 Datasets
3.4 Network Measures
4 Experiment and Results
5 Conclusion
References
17 Significant Association Rule Mining Without Support and Confidence Thresholds
1 Introduction
2 Related Works
3 Preliminaries and Problem Definition
3.1 Association Rule Mining
3.2 Multiple Minimum Supports (MMS)
3.3 Dissociation and Its Flexible Variation
3.4 Measurement of Associability
3.5 Problem Definition
4 Proposed Approach
5 Experimental Results
6 Conclusion and Future Plan
References
18 Truth Detection Algorithm in Social Media Tweets Using Similarity Measures
1 Introduction
2 Literature Review
3 Truth Discovery
4 Results
4.1 Evaluation of Result
5 Conclusion
References
19 Data Security in Cloud Computing Using an Improved Attribute-Based Encryption
1 Introduction
2 Cloud Computing Security Issues
3 Improved Attribute-Based Encryption
4 An Improved Attribute-Based Access Control Method Applied in Cloud-Based Smart Grid
5 Conclusion
References
20 Prediction of Movie Success on IMDB Database Using Machine Learning Techniques
1 Introduction
2 Literature Survey
3 Experimental Setup
3.1 Data Collection
3.2 Dataset Description
3.3 Data Cleaning
3.4 Data Analysis and Prediction
4 Methodology
4.1 Decision Trees
4.2 K-nearest Neighbor
4.3 Logistic Regression
4.4 Support Vector Machine
4.5 Random Forest
5 Experimental Results and Discussion
5.1 K-nearest Neighbor
5.2 Decision Trees
5.3 Logistic Regression
5.4 Support Vector Machine
5.5 Random Forest
5.6 Accuracy Comparison
6 Conclusion and Future Work
References
21 An Efficient Hashing Method for Exact String Matching Problems
1 Introduction
2 Related Work
3 Proposed Algorithm
3.1 Preprocessing Stage
3.2 Searching Stage
4 Working Example
5 Result Analysis
6 Conclusion
References
22 An Efficient Predictive Model for High Dimensional Data
1 Introduction
2 Literature Review
3 Preliminaries and Background
3.1 Feature Selection
3.2 Dimensionality Reduction
3.3 Ensemble Techniques
4 Proposed Model
4.1 Data Collection
4.2 Preprocessing of Data
4.3 Designing of Model
4.4 Performance Evaluation
5 Conclusion
References
23 Fall Detection System Using IoT
1 Introduction
2 Literature Survey
3 Methodology
4 Proposed System
5 Results
6 Future Enhancement
7 Conclusion
References
24 Individual Movement Monitor Using Data Mining
1 Introduction
2 Related Work
3 Methodology
4 Experimental Results
5 Conclusion and Future Work
References
25 Review of City Pricing System Analysis Based on Big Data
1 Introduction
2 Analysis of City Price
3 Big Data Framework
4 Investigations
4.1 Proposed Framework to Acquire Data
4.2 The Data Management Framework
4.3 The Data Investigation Framework
4.4 Proposed Framework for Data Transmission
5 Conclusion
References
26 Machine Learning Approaches in Cybersecurity
1 Introduction
2 Taxonomy of the Research
2.1 ML Algorithms for Cybersecurity
3 Discussion
3.1 Information About the Dataset
3.2 Receiver Operating Characteristics (ROC)
4 Conclusion
References
27 An Innovative Framework by Using Metaheuristic Algorithms for Detecting Fake News on Social Media
1 Introduction
2 Literature Review
3 Proposed Metaheuristic Algorithms
3.1 Grey Wolf Optimization Algorithm
3.2 Salp Swarm Optimization Algorithm
4 Proposed Framework
4.1 Data Preprocessing of Data
4.2 DFN Framework Development with the Suggested Algorithms
4.3 Data Testing by DFN Framework
5 Experimental Results
5.1 Results for BUZZFEED
5.2 Random Political News Results
5.3 Liar Benchmark Results
6 Conclusion
References
28 Multi-Person Face Recognition Across Variations in Pose Using Deep Learning Techniques
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Dataset
3.2 Architecture
3.3 Data Preprocessing
3.4 Feature Extraction
3.5 Detection and Recognition
4 Results of Proposed System
5 Conclusion
References
29 Android Malware Detection Using Genetic Algorithm-Based Feature Selection
1 Introduction
2 Literature Survey
2.1 Drebin: Effective and Explainable Detection of Android Malware in Your PC, Network, and Distributed System Security Symposium 2014 (M. Spreitzenbarth)
2.2 AI Supported Android Malware Characterization, Comp. Elec. Engg. 2017 (N. Milesevic)
2.3 Critical Permission Identification for ML-Based Android Malware Detection, IEEE 2018 (L. Sun, Q. Yan)
3 Proposed System
4 Results and Discussions
5 Conclusion
30 NaĂŻve BayesâAdaBoost Ensemble Model for Classifying Sexual Crimes
1 Introduction
2 Literature Survey
3 Materials
3.1 Data Set
3.2 Exploratory Analysis
4 Experiments and Results
5 Conclusion and Future Work
References
31 Big Data Analytics in Agriculture Using MapReduce
1 Introduction
2 Big Data Analytics Tools
3 Opportunities of BDA in Agriculture
4 Related Work
5 MapReduce Framework for Determining Best Composition of Seed Factors
6 Challenges
7 Future Scope
8 Conclusion
References
32 A Review of Linearization Technique for Radio Over Fiber Technology Against Various Non-Linear Distortions
1 Introduction
2 Linearization Technique
2.1 Electrical Linearization
3 Digital Pre-Distortion
4 Memory Less Model
5 Model with Memory
6 Digital Post-Compensation
7 Optical Linearization
7.1 Mixed Dual Polarization
7.2 Dual-Wavelength Linearization
7.3 Linearization Using Different Configuration of Mach Zehnder ModulatorâSeries Mach Zehnder Modulator
8 Dual Parallel Mach Zehnder Modulator
9 Conclusion
References
33 COVID-19 Detection from Chest X-ray Using Deep Learning Ensemble Classifier
1 Introduction
2 Methodology
2.1 Dataset Description
2.2 Customized CNN
2.3 Ensemble Classifier
3 Experiments and Results
3.1 Experimental Work on Dataset-1
3.2 Experimental Work on Dataset-2
4 Discussion
5 Conclusion
References
34 MoelleuxâMusic Recommendation System
1 Introduction
2 Related Work
3 Proposed System
3.1 Dataset
3.2 Architecture
3.3 Collaborative Filtering Algorithm
3.4 Collaborative Filtering (Popularity Model) of Our System
4 Content-Based Filtering Algorithm
5 Comparison: Collaborative Filtering Algorithm and Content-Based Filtering Algorithm
6 Results
6.1 Web App
6.2 Performance Evaluation
6.3 Comparison of Results of Similarity Model (Content-Based Filtering) with Existing System
7 Conclusion and Future Work
References
35 AÂ Smart Women Protection System Using IOT
1 Introduction
2 Present Technology
3 Proposed Technology
3.1 Block Diagram
4 Methodology
4.1 Flow Chart
5 Result
6 Conclusion
References
36 Embedded Kit with Object Identification for Visually Impaired People
1 Introduction
2 Review of Literature
3 System Architecture
3.1 Framework Arrangement and Information Obtaining
3.2 Instructions to Get Frameworks
3.3 Criticism to Clients
4 System Evaluation
4.1 Problems to Find Probems
5 Results and Discussion
5.1 Prevention Test Results:
5.2 Effects of Avoiding Wrong Discovery of Tests
6 Future Work
7 Conclusion
References
37 Deppy: Your Virtual Companion
1 Introduction
2 Related Work
3 Methodology
4 Proposed System
4.1 Overview
4.2 Flow and Architecture
4.3 Dataset Description
4.4 Convolution Neural Network (CNN) and Natural Language Processing (NLP)
5 Results
5.1 Web App
5.2 Comparison of Results with Existing System:
5.3 Result Evaluation
6 Future Scope and Conclusion
References
38 Organ Donation Application Using Blockchain Security
1 Introduction
2 Literature Review
3 Proposed System
4 Experimental Results
5 Conclusion
References
39 Effective Dimensionality Reduction Techniques for Network Intrusion Detection System Based on Deep Learning
1 Introduction
1.1 Problem Statement
1.2 Experimental Setup
2 Related Work
3 NSL-KDD Dataset
4 Dimensionality Reduction
4.1 Dimensionality Reduction Using AE
4.2 Dimensionality Reduction Using PCA
5 Performance Evaluation Metrics
6 Results and Discussion
7 Conclusion and Future Enhancement
References
40 Ranking YouTube Videos Based on Comments Sentiment
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 Data Extraction
3.2 Data Cleaning
3.3 Pre-Processing
3.4 Feature Extraction
3.5 Classification/Sentiment Analysis
4 Implementation
4.1 Size of Data
4.2 Training and Testing
4.3 Classification
4.4 Results
5 Result Discussion
5.1 Ranking Based on Commentsâ Sentiment
5.2 Problems Faced with Regional Language Videos
6 Conclusion
References
41 Inventory Optimization Using Machine Learning Algorithms
1 Introduction
2 Related Works
3 Proposed System
3.1 Architecture
3.2 Support Vector Regression
3.3 Decision Tree Regressor
3.4 Deep Neural Networks
3.5 Comparison Between Algorithms
4 Experimental Setup and Results
4.1 Experimental Setup
4.2 Dataset
4.3 Web Application
4.4 Performance Evaluation
5 Conclusion and Future Work
References
42 Age Gender and Sentiment Analysis to Select Relevant Advertisements for a User Using CNN
1 Introduction
2 Literature Survey
3 Database Details
4 Model Architecture
5 Procedure
6 Experimental Analysis
7 Conclusion
References
43 Monitoring Speaker Sentiment in Various Conditions Using Natural Language Processing
1 Introduction
1.1 Get Customer Data
1.2 Fetch Customer Data by Experience
1.3 Fetch Accurate Experience
1.4 Obtain Identifier from Customer Data
1.5 Obtain Identifier from Customer Data
1.6 Recognize Customer Emotion
2 Methodology
3 Result
4 Conclusion
5 Future Scope
References
44 Survey on Computation Offloading Strategies in Cellular Networks with Mobile Edge Computing
1 Introduction
2 Related Works
3 Comparative Study
4 Discussion
5 Conclusion
References
45 Blockchain Technology: Revolution from a Centralized to Distributed Systems
1 Introduction
2 Blockchain History
2.1 Blockchain 1.0: Digital Currency
2.2 Blockchain 2.0: Smart Contracts
2.3 Blockchain 3.0: Decentralized Application
3 Blockchain Architecture
3.1 Pointers
3.2 Linked Lists
4 Consensus Algorithms
4.1 Proof of Work (PoW)
4.2 Practical Byzantine Fault Tolerance (PBFT)
4.3 Proof of Stake (PoS)
4.4 Proof of Burn (PoB)
4.5 Proof of Capacity
4.6 Proof of Elapsed Time (PoET)
5 Blockchain Use Cases
5.1 Supply Chain
5.2 Healthcare
5.3 Power Storage
6 Challenges and Risks of Global Blockchain Growth
7 Conclusion
References
46 A Deep-Learning Approach to Single Sentence Compression
1 Introduction
2 Background Study
3 Methodology
3.1 Models Using Hand-Crafted Features and LSTM
3.2 Models Using Glove and LSTM
4 Evaluation of Compression Models
4.1 Manual Evaluation
4.2 Automatic Evaluation
5 Conclusion
References
47 Task Allocation in Edge Computing Using Palmerâs Sequencing Algorithm
1 Introduction
2 Load Balancing
2.1 Multi-Access Edge Computing
2.2 Load Balancing in MEC
3 Flow and Job Shop Scheduling
3.1 A Need for Palmerâs Algorithm
3.2 Palmerâs Algorithm for MEC-LB
3.3 Three Machines Flow Shop
3.4 Application of Palmerâs Algorithm
3.5 Advantages of Palmerâs Algorithm
3.6 Palmerâs Algorithm
4 Conclusion
References
48 Automatic Detection and Classification of Lung Nodules in CT Images
1 Introduction
2 Related Work
3 Methodology
3.1 Detailed Design for Segmentation of Lung Region
3.2 Detailed Design for Lung Nodule Segmentation
3.3 Detailed Design for Classifier Model
4 Result Analysis
5 Performance Measures
5.1 Datasets
5.2 Performance Metrics
6 Conclusion and Future Work
References
49 Leaf Image Classification of Plant Diseases Using Deep Learning
1 Introduction
2 Plant Disease Classification/Identification
2.1 Literature Survey
3 Proposed Methodology
3.1 Training and Testing
4 Experimental Evaluation
4.1 Experimental Results
5 Discussion
6 Conclusion
References
50 Image-Based Plant Disease Detection
1 Introduction
2 Dataset
3 Related Work
3.1 Image Based Plant Disease Detection in Pomegranate Plant for Bacterial Blight
3.2 Identification of Plant Leaf Diseases using Image Processing Techniques
3.3 Plant Disease Detection using CNN Model and Image Processing
3.4 Plant Diseases Recognition Based on Image Processing Technology
3.5 Image Processing Based Classification of Grapes After Pesticide Exposure
3.6 Early Detection of Plant Disease using Machine Learning
3.7 Leaf Disease Detection using Image Processing
3.8 Deep Neural Networks Based Recognition of Plant Diseases by Leaf Image Classification
3.9 How Convolutional Neural Networks Diagnose Plant Disease
4 Proposed Automated Method
4.1 Module 1: Identify the Type of Plant
4.2 Module 2: Plant Healthy or Diseased
4.3 Module 3: Type of Plant Disease
5 Experimental Result
6 Conclusion
References
51 Critical Analysis of Feature Selection Methods for Data Preprocessing with Heart Disease Dataset
1 Introduction
2 Literature Review
3 Feature Selection Methods
3.1 Types of Feature Selection Methods
4 Wrapper Method of Feature Selection
4.1 Forward Feature Selection
4.2 Backward Elimination
4.3 Stepwise Selection or Bi-Directional Elimination
5 Filter Method of Feature Selection
5.1 Basic Methods
5.2 Correlation Matrix
5.3 Chi-Square Test
5.4 ANOVA (Analysis of Variance)
6 Embedded Method of Feature Selection
6.1 LASSO Regression
6.2 Ridge Regression
6.3 Tree-Based Feature Selection
7 Result and Discussions
8 Conclusion and Future Work
References
52 Deep Learning Approach for Diagnosing COVID-19 in CT Images
1 Introduction
2 Related Work
3 Proposed Work
3.1 Dataset
3.2 Proposed Architecture
3.3 Validation and Experimental Setup
4 Experimental Results
5 Discussion
6 Conclusion
References
53 Review on Different Training Procedures for Distinguishing Eye Malady by Utilizing Oct Pictures
1 Introduction
1.1 Supervised Training
1.2 Unsupervised Training
1.3 Reinforcement Training
2 Artificial Neural Network (ANN) and Deep Learning:
3 Deep Learning Algorithms
4 Associated Machine Learning and In-Depth Learning to Diagnose Eye Malady:
5 Restrictions of Subsisting Methods and Future Examination for Discovery of Eye Malady
6 Conclusion
References
54 In-Node Adaptive Compressive Sensing Technique for EEG Signal in WBAN
1 Introduction
2 Literature Survey
3 Problem Statement
4 Proposed Solution
4.1 Mathematical Model of the Proposed ABSCS Algorithm
5 Database and Metrics
5.1 Experimental Database
5.2 Performance Measures
6 Results and Discussion
7 Conclusion
References
55 Predict Studentâs Feedback on Online Education by Applying Machine Learning Algorithms
1 Introduction
2 Review Works
3 Proposed System
4 Requirements
5 Implementations
6 InputâOutput Analysis
7 Computational Complexity
8 Comparative Study with the Existing Systems
9 Conclusion
References
56 CRM Using RPA UiPath
1 Introduction
2 Purpose of CRM
3 Additional Information Required from the Authors
3.1 Market Survey
3.2 Findings
4 Key Elements
5 Implementing CRM in a Company
6 CRM Method and Implementation
7 Apptivo CRM
8 Future of CRM
9 Conclusion
References
57 Obstacle Detection in Autonomous Vehicles Using 3D LiDAR Point Cloud Data
1 Introduction
2 Design Methodology for Obstacle Detection
2.1 Visualization of Raw Data
2.2 Filtering
2.3 Segmentation
2.4 Clustering
3 Implementation of Obstacle Detection
3.1 Filtering Using VoxelGrid
3.2 Cropping Using CropBox
3.3 Egmentation Using RANSAC Algorithm
3.4 Clustering Using K-D Tree
3.5 Rendering
4 Results Obtained
5 Conclusion and Future Scope
References
58 Multi-Label Classification of Cotton Plant with Agriculture Mobile Robot
1 Introduction
2 Related Work
3 Detailed Implementation
4 Results and Discussion
5 Conclusion
References
59 Design and Developement of Harness Testing Equipment for Automotive Applications
1 Introduction
2 Wiring Harness Problems
2.1 Steps Involved in Constructing the Test Kit
3 Major Components and Their Applications in the Proposed Work
3.1 Arduino Mega 2560
3.2 5V 4-Channel Relay Board
3.3 LCD Display
3.4 Keypad
3.5 Deutsch Connectors
4 Design of the Harness Testing Module
5 Results and Discussions
6 Conclusions and Future Directions
References
60 An Intelligent Survey on Deep Learning-Based Strategies for Multi-Grade Brain Tumor Classification
1 Introduction
2 Existing Literature Surveys
3 Reviewed Tumor Classification Methods
4 Conclusion
References
61 Sentiment Analysis: AÂ Comparative Analysis
1 Introduction
2 Related Work
3 Background and AI Techniques
3.1 Machine Learning Approach
3.2 Unsupervised Learning and Semi-Supervised
3.3 Lexicon-Based Approach
3.4 Hybrid Approach
3.5 Word Embeddings Using Word2Vec Model
3.6 Embedding Layer and Embedding Matrix
3.7 Bidirectional LSTM (LongShort-Term Memory)
4 Comparison of AI Technique
4.1 Experimental Environment
4.2 Data Set
4.3 Pre-Processing the Text
5 Experimental Result and Analysis
6 Conclusion
References
62 Contactless Attendance System
1 Introduction
2 Limitation of Prevailing Methodologies
2.1 Pinched Image Quality Reduces Facial Recognition's Efficiency
2.2 Tiny Image Sizes Make Face Recognition More Complex
2.3 Various Face Positions Can Cast off Face Recognition Dependability
2.4 Information Rendering and Storage Can Hinder Facial Recognition Tech
2.5 Lack of Regulation
3 Literature Review
4 Proposed Work
4.1 Algorithms Used
4.2 Flow Diagram of the System
5 Results
6 Future Scope
7 Conclusion
References
63 Automated Content Generation System Using Neural Text Generation
1 Introduction
2 Literature Survey
3 Methodology
3.1 Formation of Dataset
3.2 Generation of Content
4 Implementation and Results
5 Conclusion and Future Work
References
64 Semantic Segmentation of Satellite Images for Water Body Detection
1 Introduction
2 Literature Review
3 Proposed System Architecture
3.1 Methodology
3.2 Design
3.3 Experimental Design
4 Experimental Setup
4.1 Dataset
4.2 Experiments
5 Results
6 Conclusion
References
65 Predicting Threshold for Primary User Detection in Cooperative Sensing
1 Introduction
2 Literature Survey
3 Proposed Work
4 Results and Analysis
5 Conclusion
References
66 Investigating Wireless Optical Communication Systems for İnter Satellite Communication Using QPSK Modulation Technique
1 Introduction
2 Proposed Method
3 Specifications of Proposed System
4 Inter-satellite Link Equations
5 Simulation and Results
6 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<p><span>The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2023), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during June 27â28, 2023. This book dis
<span>The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 6â7, 2022. This book discusse
<span>This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book is a collection of peer-reviewed best selected
<span>The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 6â7, 2022. This book discusse
<span>This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book is a collection of peer-reviewed best selected