𝔖 Scriptorium
✩   LIBER   ✩

📁

Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2022 (Algorithms for Intelligent Systems)

✍ Scribed by I. Jeena Jacob (editor), Selvanayaki Kolandapalayam Shanmugam (editor), Ivan Izonin (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
901
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 6–7, 2022. This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.

✩ Table of Contents


Preface
Contents
About the Editors
1 Modeling MĂŒller-Lyer Illusion Using Information Geometry
1 Introduction
2 Method
3 Information Geometric Measure of Distance
4 Computational Method and Results
5 Discussion
References
2 Building up a Categorical Sentiment Dictionary for Tourism Destination Policy Evaluation
1 Introduction
2 MCST Questionnaires for Selecting Evaluation Categories
2.1 Categories and Questions of MCST and Keywords Associated to the Categories
2.2 Incorporating the Questionnaire-Based Evaluation into Sentiment Analysis Based on Text Mining
3 Additional Information Required from Authors
3.1 Model Architecture
3.2 Data
3.3 Text Cleaning and Preprocessing
3.4 Extracting Category-Specific Tokens Using CTF-IDF
3.5 Logistic Regression for Extracting Sentiment Words
3.6 Human Evaluation on Sentiment Words in a Category
3.7 Matching
4 Results
5 Conclusion
References
3 Statistical Analysis of Stress Prediction from Speech Signatures
1 Introduction
2 Methodology
3 Database Collection
4 Results and Analysis
5 Discussion
6 Conclusion
References
4 DermoCare.AI: A Skin Lesion Detection System Using Deep Learning Concepts
1 Introduction
2 Theory
2.1 Survey of Existing Systems
2.2 Limitations Found in Existing Systems
3 Proposed Work
3.1 Data Set
3.2 Pre-processing
3.3 CNN Architecture
4 Results and Discussion
4.1 Evaluation Measures
4.2 Multi-class Classification
4.3 Benign/Malignant Classification
4.4 Integrating Models into a Web Application
5 Conclusion and Future Scope
References
5 Analysis of Phishing Base Problems Using Random Forest Features Selection Techniques and Machine Learning Classifiers
1 Introduction
2 Research Background
3 Methodology
3.1 Data Description
3.2 Features Selection Method
3.3 Algorithms Description
4 Results
5 Discussion
6 Conclusion
References
6 Cost Prediction for Online Home-Based Application Services by Using Linear Regression Techniques
1 Introduction
1.1 Motivation
2 Problem Statement
3 Literature Survey
3.1 Domestic Android Application for Home Services [9]
3.2 An Online System for Household Services [10]
3.3 E-commerce and Its Impact on Global Trade and Market [11]
3.4 Examining the Impact of Security, Privacy, and Trust, on the TAM and TTF Models for E-commerce Consumers [12]
3.5 A Research Study on Customer Expectation and Satisfaction Level of Urban Clap in Beauty Services with Special Reference to Pune [13]
3.6 Timesaverz—First of Its Kind On-Demand Home Service Provider, India [14]
4 Proposed System and Architecture Diagram
4.1 Registration Module
4.2 Login Module
4.3 Feedback Module
4.4 Admin Module
5 Project Scope
6 Prototype Model
6.1 Feature Value (Target Value) and Linear Regression
6.2 Cost Prediction
6.3 Three-Step Verification
6.4 Feedback
7 Users’ Classes and Features
8 Applications
8.1 Home and Cleaning Service Industry
8.2 Health Care
8.3 Repair and Maintenance Service Industry
8.4 Home Renovation/Shifting
8.5 Home Construction and Design
8.6 Businesses
9 Future Scope
10 Conclusion
References
7 Convolutional Neural Network Based Intrusion Detection System and Predicting the DDoS Attack
1 Introduction
2 Related Works
3 System Model
3.1 Image Conversion Algorithm from KDD Dataset to Gray Scale
3.2 Feature Selection Algorithm
3.3 CNN Algorithm
4 Performance Evaluation
4.1 Number of Convolution Layers
4.2 Kernel Size
5 Conclusion
References
8 BERT Transformer-Based Fake News Detection in Twitter Social Media
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Dataset
4 Results and Discussion
5 Conclusion
References
9 The Facial Expression Recognition Using Deep Neural Network
1 Introduction
2 Related Work
2.1 Literature Review
2.2 Dataset
3 Proposed Model
3.1 Model Architecture
4 Experiment
4.1 Experimental Design
4.2 Experimental Results and Evaluation
5 Conclusion
References
10 New IoT-Based Portable Microscopic Somatic Cell Count Analysis
1 Introduction
2 Related Work
3 Proposed Work
4 Performance Analysıs
5 Conclusion
References
11 A Survey on Hybrid PSO and SVM Algorithm for Information Retrieval
1 Introduction
2 Literature Survey
3 Methodology
3.1 Data Analysis
4 Results and Discussion
4.1 Ranking Models and Experiments with These Models
4.2 The Vector Space Mode
4.3 Positioning Based on Document Structure
4.4 Adjustments and Enhancements to the Basic Indexing and Search Processes
5 Conclusion
References
12 Metric Effects Based on Fluctuations in Values of k in Nearest Neighbor Regressor
1 Introduction
2 Methodology
2.1 Euclidean Distance
2.2 Manhattan Distance
2.3 Hamming Distance
2.4 Regressor
2.5 Dataset
3 Results
3.1 Root Mean Squared Error
3.2 Goodness of Fit
4 Conclusion
References
13 An Ensemble Approach to Recognize Activities in Smart Environment Using Motion Sensors and Air Quality Sensors
1 Introduction
2 Literature Review
3 Proposed Work
4 Experimental Analysis
4.1 Phase 1—Activity Recognition Using Motion Sensors Data
4.2 Phase 2—Activity Recognition Using Air Quality Sensors
5 Results
6 Conclusion
References
14 Generalization of Fingerprint Spoof Detector
1 Introduction
2 Literature Survey
3 Working Principle
3.1 Dataset
3.2 Training and Validation of Our Proposed CNN Model
4 Conclusion
References
15 Applied Deep Learning for Safety in Construction Industry
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Description
3.2 Convolutional Neural Network Model
3.3 VGG16 Model
3.4 System Architecture
4 Discussion
4.1 Technologies Required
4.2 Convolutional Neural Network
4.3 VGG16 Model
5 Results
5.1 Classification Performance
5.2 Pre-processed Image Dataset
5.3 Equipment Classification
5.4 Result Comparison
6 Conclusion
References
16 Deep Learning-Based Quality Inspection System for Steel Sheet
1 Introduction
2 Literature Survey
3 Existing System
4 Proposed Work
5 Architecture Diagram
6 System Design
6.1 Analysis of Experimental Data
6.2 Building Model
6.3 System Training and Testing Procedures
6.4 User Interface
7 Results
8 Conclusion
9 Future Scope
References
17 Forecasting Prediction of Covid-19 Outbreak Using Linear Regression
1 Introduction
2 Literature Review
3 Proposed System
3.1 Dataset Description
3.2 Data Pre-processing
3.3 Training and Testing
3.4 Classification
4 Result
5 Conclusion
References
18 Proctoring Solution Using AI and Automation (Semi)
1 Introduction
2 Project Plan and Schedule
3 Literature Survey
4 System Requirements
4.1 Hardware Requirement
4.2 Software Requirements
5 Proposed System
6 System Design and Working
6.1 Proctor Module
6.2 Student Module
6.3 Examiner Module
7 Implementation
8 Results
9 Advantages
10 Disadvantages
11 Conclusion
12 Future Enhancements
References
19 Apple Leaf Disease Prediction Using Deep Learning Technique
1 Introduction
2 Related Works
3 Proposed Methodology
4 Proposed System
5 Results
6 Conclusion
References
20 Sentimental Analysis and Classification of Restaurant Reviews
1 Introduction
2 Literature Survey
3 Existing Methodology
4 Sentiment Analysis of Restaurant Reviews
5 Sentimental Analysis
6 Proposed Methodology
6.1 Data Collection
6.2 Data Preprocessing
6.3 Stop-Word Elimination
6.4 Stemming
6.5 Bag-of-Words Model
6.6 Data Classification
6.7 Splitting Dataset
7 Splitting
8 Naive Bayes
9 Logistic Regression
10 Result
11 Conclusion
12 Future Work
References
21 A Controllable Differential Mode Band Pass Filter with Wide Stopband Characteristics
1 Introduction
2 Filter Design
3 Current Distributions
4 Conclusion
References
22 Design and Analysis of Conformal Antenna for Automotive Applications
1 Introduction
2 Antenna Design Process
2.1 Bending Analysis
3 Results and Analysis
4 Conclusions
References
23 An Improved Patch-Group-Based Sparse Representation Method for Image Compressive Sensing
1 Introduction
1.1 Research Motivation and Contribution
2 Related Work and Challenges
3 Proposed Work
3.1 Phase-1: Patch-Based Adaptive Sparsifying Learning (PASL)
3.2 Phase-2: Constrained Group Sparse Representation
4 Result and Discussion
5 Conclusion
References
24 Comparative Analysis of Stock Prices by Regression Analysis and FB Prophet Models
1 Introduction
2 Dataset Used for Research Evaluation
3 Comparative Analysis of Linear Regression and FB Prophet Models
3.1 Linear Regression Model
3.2 FB Prophet Model
4 Metric Used for Evaluation of Comparative Analysis of Models
5 Result and Discussion
5.1 Comparative Study
6 Conclusion and Future Scope
References
25 g POD—Dual Purpose Device (Dustbin and Cleaning)
1 Introduction
2 Brief Overview of Dual Purpose Device
2.1 Robot Vacuum Cleaner Base
2.2 Pair of ARMs
2.3 Mounted Dustbin
3 Conclusion
References
26 An Attractive Proposal Based on Big Data for Sentiment Analysis Using Artificial Intelligence
1 Introduction
2 Related Work
3 Techniques for Analyzing Emotional States
4 Implementation
5 Conclusion
References
27 SqueezeNet Deep Neural Network Embedder-Based Brain Tumor Classification Using Supervised Machine Intelligent Approach
1 Introduction
2 Related Works
3 Methodology
4 Results and Discussion
5 Conclusion
References
28 Detection of Malicious Unmanned Aerial Vehicle Carrying Unnecessary Load Using Supervised Machine Intelligence Model with SqueezeNet Deep Neural Network Image Embedder
1 Introduction
2 Related Works
3 Dataset and Methodology
3.1 Dataset
3.2 Methodology
4 Simulation and Results
5 Conclusion
References
29 Face Mask Detection Using Artificial Intelligence to Operate Automatic Door
1 Introduction
2 Literature Review
3 Hardware Components
3.1 Arduino UNO
3.2 IR Sensor
3.3 LED
3.4 LCD
3.5 Servo MG90S
4 Mobile Application
4.1 Creating Application Using Androıd Studio
4.2 Front End
4.3 Back End
5 Proposed System
5.1 Flow Diagram
5.2 Schematic Circuit View
6 Result Analysis and Discussion
6.1 Output Without Mask
6.2 Output with Mask
7 Limitations
8 Future Scope
9 Conclusion
References
30 Marine Weather Prediction Using Preprocessing Techniques in Big Data
1 Introduction
2 Related Work
3 Mean Missing Data Imputation-Based Preprocessing Model
4 Result Analysis
4.1 Mean Absolute Error (MAE)
4.2 Result
5 Conclusion
References
31 Yolov4 in White Blood Cell Classification
1 Introduction
2 Materials and Methods
2.1 Database
2.2 Architecture of YOLOv4 Model
2.3 Data Augmentation
2.4 Backbone
2.5 Neck
2.6 Prediction
2.7 Evaluation Parameters
3 Results and Discussions
3.1 Classification Results
3.2 Performance Comparison with Other Published Models
4 Conclusion
References
32 Efficient Data Hiding Model by Using RDH Algorithm
1 Introduction
2 Related Work
3 Methodologies
3.1 Image Compression
3.2 Lossless Compression
3.3 Reversible Data Hiding (RDH)
3.4 Least Significant Bit (LSB)
4 Data Hiding Using RDH
5 Measuring Compression Performances
5.1 Compression Ratio (CR)
5.2 Compression Time (CT)
5.3 Saving Percentage (SP%)
5.4 Mean Squared Error (MSE)
5.5 Peak Signal-to-Noise Ratio (PSNR)
6 Results and Discussions
7 Conclusion
References
33 Enhanced Preprocessing Technique for Air Pollution Forecasting System Using Big Data and Internet of Things
1 Introduction
2 Related Works
3 Bilateral Discretized Z- Wavelet Transform
4 Conclusion
References
34 Pre-processing of Leukemic Blood Cell Images Using Image Processing Techniques
1 Introduction
2 Literature Review
3 Methodology
3.1 RGB to Grayscale Conversion
3.2 Filtering
3.3 Contrast Enhancement
3.4 Edge Detection
4 Results and Discussions
5 Conclusion
References
35 Automated Grocery List Item Add-to-Cart Leveraging Optical Character Recognition with Transformer
1 Introduction
1.1 Core Focus of the Research
2 Literature Survey
2.1 Add-to-Cart Functionality
2.2 Optical Character Recognition Using Machine Learning
3 Proposed System Architecture
4 List Item Recognition Using Transformer
4.1 Encoder Block
4.2 Decoder Block
5 Results and Evaluation
6 Conclusion and Future Work
References
36 Anomaly Detection in Image Sequences Using Weakly Supervised Learning
1 Introduction
2 Related Work
3 Proposed Work
3.1 Feature Extraction
3.2 Weakly Supervised Learning
4 Experiments and Result
4.1 Dataset for Training and Testing
4.2 Implementation Details
4.3 Evaluation and Analysis
5 Conclusion
References
37 Sentiment Analysis of Twitter Data for COVID-19 Posts
1 Introduction
2 Related Work
2.1 Steps Involved in Sentiment Analysis
2.2 Various Approaches for Sentıment Analysis
3 Our Methodology
3.1 Collecting the Dataset
4 Implementation and Results
5 Conclusion
References
38 Brain Tumor Detection Using Image Processing Approach
1 Introduction
2 Imaging Techniques
3 Methodology
4 Result and Discussion
5 Conclusion
References
39 Routing Method for Interplanetary Satellite Communication in IoT Networks Based on IPv6
1 Introduction
2 Protocols and Transmission
3 Implementation, Validation, and Testing
4 Conclusions
References
40 Parameterization of Sequential Neural Networks for Predicting Air Pollution
1 Introduction
2 Preliminaries and Related Work
2.1 Background
2.2 Prediction of Air Pollution with Deep Learning Models
3 The Proposed Methodology
4 Experimental Results
4.1 Data
4.2 Prediction Results with Different Sequential Networks
4.3 Discussion
5 Conclusion
References
41 Customer Analytics Research: Utilizing Unsupervised Machine Learning Techniques
1 Introduction
2 Literature Survey
3 Proposed System
4 Experimental Results
4.1 Dataset
4.2 Evaluation Metrics
4.3 Performance Analysis
5 Conclusion
References
42 Multi-class IoT Botnet Attack Classification and Evaluation Using Various Classifiers and Validation Techniques
1 Introduction
2 Related Work
3 Data Set Description
4 Experimental Evaluation
4.1 Preprocessing: Min–Max Normalization
4.2 KCV and SKCV
4.3 Machine Learning Classifiers
4.4 Algorithm
5 Results and Discussion
5.1 Accuracy
5.2 Execution Time
5.3 F1 Score and Cohen’s Kappa Coefficient (Ҟ)
6 Conclusion
References
43 IoT-Based Dashboards for Monitoring Connected Farms Using Free Software and Open Protocols
1 Introduction
2 Literature Study
2.1 Use of IoT in Agricultural Sectors
2.2 Managing and Controlling in Connected Farms Using IoT Technology
2.3 Real-Time Monitoring Connected Farms
2.4 Challenges of IoT in Agriculture
2.5 Opportunities and Applications of IoT in Agriculture
3 Design and Implementation of Connected Farms
3.1 Involvement of Sensing Technologies
3.2 Framework for Design and Implementation
3.3 Real-Time Sensing Images Communicated by ESP32-CAM
3.4 Incorporation of Positioning Systems
4 Integration of Data Sources and Management
4.1 Real-Time Sensing Images Communicated by ESP32-CAM
4.2 Incorporation of Positioning Systems
5 Integration of Data Sources and Management
6 Configuration of Devices and Performance of Result Analysis
7 Conclusions
References
44 Predicting the Gestational Period Using Machine Learning Algorithms
1 Introduction
2 Literature Review
3 Dataset
4 Methodology
5 Results
6 Discussions
7 Conclusion and Future Work
References
45 Digital Methodologies and ICT Intervention to Combat Counterfeit and Falsified Drugs in Medicine: A Mini Survey
1 Introduction
2 Selection of Papers for Literature Review
3 Existing Works
4 Literature Survey
5 Discussion
6 Result
7 Conclusion
References
46 Utilizing Hyperledger-Based Private Blockchain to Secure E-Passport Management
1 Introduction
2 Related Work
3 Methodology
3.1 Characterization of the Assets
3.2 Transaction Execution via Chaincode
3.3 Setting Up the Categories of Participants
3.4 Placement of Assets in the Registry
3.5 Registering Transactions in Historian Records
3.6 Implementation of Permission Regulations Inside Access Control Module
3.7 InterPlanetary File System (IPFS) to Store Non-textual Data
4 Result
5 Conclusion
References
47 An Exploratory Data Analysis on SDMR Dataset to Identify Flood-Prone Months in the Regional Meteorological Subdivisions
1 Introduction
2 Exploratory Data Analysis
2.1 Data Collection
2.2 Understanding Features
2.3 Data Cleaning
2.4 Data Visualization and Analysis
2.5 Examining Relationship Between Features and Finding Patterns
3 Inferences from the Dataset and Discussion
3.1 Visualization of Annual Rainfall (1916–2017)
3.2 Visualization of Seasonal Rainfall
3.3 Visualization of Average Monthly Rainfall
3.4 Visualization of Subdivision-Based Rainfall
4 Conclusion
References
48 Segmentation of Shopping Mall Customers Using Clustering
1 Introduction
2 Related Work
2.1 Clustering
3 Proposed Work
3.1 General View of Data
3.2 Data Collection and Preparation
3.3 Data Analysis and Exploration
4 Methodology
4.1 Clustering
4.2 K-means Clustering
4.3 Hierarchical Clustering
4.4 Mini-Batch K-means Clustering
4.5 Elbow Method
5 Clustering Using Different Algorithms
5.1 Elbow Method
5.2 K-means Clustering Algorithm
5.3 Mini-Batch K-means Clustering
5.4 Hierarchical Clustering
6 Performance Analysis
7 Conclusion
References
49 Advanced Approach for Heart Disease Diagnosis with Grey Wolf Optimization and Deep Learning Techniques
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Without Optimization
3.2 With Optimization (Grey Wolf Optimization)
4 Results and Discussions
5 Conclusion and Future Work
References
50 Hyper-personalization and Its Impact on Customer Buying Behaviour
1 Introduction
2 Literature Review
3 Methods
3.1 PLS-SEM Model
3.2 KNN Model
3.3 Matrix Factorization
3.4 Support Vector Machines
3.5 Association Rule of Mining
3.6 Decision Tree Analysis
3.7 Frequent Sequential Pattern
3.8 Recency Frequency Monetary Analysis
3.9 Genetic Algorithms
4 Proposed Model
5 Experimental Results
6 Conclusion and Future Work
References
51 Proof of Concept of Indoor Location System Using Long RFID Readers and Passive Tags
1 Introduction
1.1 UHF Frequency Band
1.2 Passive Elements
1.3 Basic UHF Passive RFID Components
1.4 Basic Long RFID Location System Concept
2 Research Equipment and Configuration
2.1 Equipment Configuration
2.2 Software Monitor
3 Measurements and Recommendations
3.1 Key Components
4 Further Work
5 Conclusions
References
52 Autism Detection in Young Children Using Optimized Long Short-Term Memory
1 Introduction
2 Literature Review
2.1 Related Works
3 Overall Framework of Autism Detection in Young Children
4 Preprocessing and Feature Extraction Phase
4.1 Preprocessing
4.2 Feature Extraction
5 Detection Using Optimized Long Short-Term Memory
5.1 Optimized LSTM
6 Weight Optimization of LSTM Using Arithmetic Crossover Insisted Shark Smell Optimization Scheme
6.1 Objective Function and Solution Encoding
6.2 Proposed ACSSO Model
7 Results and Discussions
7.1 Simulation Procedure
7.2 Performance Analysis
7.3 Statistical Analysis
7.4 Analysis on Optimization
7.5 Analysis on Classifiers
7.6 Convergence Analysis
8 Conclusion
References
53 A Comparative Review Analysis of OpenFlow and P4 Protocols Based on Software Defined Networks
1 Introduction
2 Background of the Work
2.1 Open Signaling
2.2 Active Networking
2.3 4D Project
2.4 NETCONF
2.5 Ethane
3 Protocols Enabled Software Defıned Network
3.1 The Forwarding Control Element Separation (ForCES)
3.2 OpenFlow
3.3 Comparison Between OpenFlow and ForCES
4 Overvıew of Openflow
5 Overvıew of Programmıng Protocol-Independent Packet Processor (P4)
5.1 Comparison Between OpenFlow and P4 Protocols
6 Swıtch Archıtecture
6.1 The Switch Architecture of the Openflow
6.2 The Switch Architecture of P4
7 Conclusion and Future Recommendatıon
References
54 NLP-Driven Political Analysis of Subreddits
1 Introduction
2 Inspiration and Related Work
3 Data Collection
4 EDA
5 Biased Embedding Sentiment Models
5.1 Method
5.2 Sentiment Observations
6 Political Leaning Classification
6.1 Method
6.2 Model Performance
6.3 Model Interpretation
7 Conclusion
References
55 Feature Extraction and Selection with Hyperparameter Optimization for Mitosis Detection in Breast Histopathology Images
1 Introduction
2 Related Work
3 Data Set
4 Image Pre Processing
5 Proposed Method
5.1 Overview of Proposed Methods
6 Feature Extraction
6.1 Oriented FAST and Rotated BRIEF (ORB)
6.2 Center Surround Extremas (Censure)
6.3 Edge Detection
6.4 Histogram of Oriented Gradients (HOG)
6.5 Corner Peak
6.6 Grayscale Pixel Values
6.7 Principal Component Analysis (PCA)
7 Classification
7.1 Support Vector Machines (SVM)
7.2 K-Nearest Neighbor (KNN)
7.3 Random Forest
8 Hyperparameter Optimization
8.1 Grid Search
8.2 Random Search
8.3 Bayesian Optimization with Gaussian Process
8.4 Genetic Algorithm
8.5 TPOT
9 Feature Selection
9.1 Red Deer Algorithm
9.2 Cuckoo Search Algorithm
9.3 Harmony Search
9.4 Whale Optimization Algorithm
9.5 Genetic Algorithm
9.6 Binary Bat Algorithm
9.7 Gray Wolf Optimizer
10 Results and Discussion
11 Conclusion
References
56 Review and Comparative Analysis of Unsupervised Machine Learning Application in Health Care
1 Introduction
2 Machine Learning Applications in Health Care
3 Methods and Datasets Used in Research
4 Results
5 Conclusions
References
57 A Systematic Literature Review on Cybersecurity Threats of Virtual Reality (VR) and Augmented Reality (AR)
1 Introduction
2 Problem Statement
3 Objective
4 Research Questions
5 Scope of the Study
6 Expected Results
7 Selection of Research Papers for Review
8 Literature Survey
9 Results and Discussion
10 Conclusions
References
58 A Review on Risk Analysis of Cryptocurrency
1 Introduction
2 Cryptocurrency Risk Assessment
3 Selection of Papers for Literature Review
3.1 Search String
3.2 Selection of Papers by PRISMA
4 Cryptocurrencies and Blockchains
5 Literature Survey
6 Future Challenges
7 Conclusion
References
59 Sine Cosine Algorithm with Tangent Search for Neural Networks Dropout Regularization
1 Introduction
2 Related Works and Preliminaries
3 Sine Cosine Metaheuristics and Proposed Enhancements
3.1 Cons of Basic SCA and Proposed Improved Version
4 Simulations and Discussion
5 Conclusion
References
60 Development of a Web Application for the Management of Patients in the Medical Area of Nutrition
1 Introduction
2 Objectives
3 Architecture
4 Functionality
4.1 Nutritionist Functionality
4.2 Patient Functionality
5 Evaluation
6 Conclusions and Future Work
References
61 Exploring the Potential Adoption of Metaverse in Government
1 Introduction to Metaverse
2 Metaverse Integration in Government
3 Metaverse Opportunities
3.1 To Find Innovative Ways to Communicate with the Citizens
3.2 To Establish Team Working Operation Inside the Workplace
3.3 To Find New Employees
3.4 To Develop a New Economy
4 Metaverse Challenges
5 Epilogue
References
62 Hyperparameter Tuning in Random Forest and Neural Network Classification: An Application to Predict Health Expenditure Per Capita
1 Introduction
2 Materials and Methods
2.1 The Data Classification Task with RF and NN
2.2 K-Fold Cross Validation to Improve Classification Performance
2.3 Measuring the Discriminatory Power of a Model
3 Findings
3.1 Descriptive Statistics
3.2 Binary Coding of Health Expenditure Per Capita Variable
3.3 Multicollinearity Check
3.4 Random Forest and Neural Network Classification Performances by Changing Hyperparameters and Incorporating K-Fold Cross Validation into the Model
4 Conclusions
References
63 Dual-RvCore32IMA: Implementation of a Peripheral Device to Manage Operations of Two RvCores
1 Introduction
2 Related Work
3 Core Management Unit
3.1 Data Control
3.2 Flow Control
4 C Code Multi-core Task for Testing
5 Conclusion
6 Future Work
References
64 A Comparative Study of SVM, CNN, and DCNN Algorithms for Emotion Recognition and Detection
1 Introduction
2 Related Work
3 Description of Support Vector Machine, Convolutional Neural Network, and Deep Convolutional Neural Network Models
3.1 Support Vector Machine
3.2 Convolutional Neural Network (CNN)
3.3 Proposed Deep Convolutional Neural Network (DCNN) MODEL
4 System Design
5 Implementation Results and Discussions
6 Conclusion
References
65 Monitoring and Prediction of Smart Farming Using Hybrid PSO-ELM Model
1 Introduction
2 Related Works
3 Proposed Work
4 Result and Discussion
5 Conclusion
References
66 Recommendation System Using Different Approaches
1 Introduction
2 Related Work
3 Dataset
4 Proposed Methodology
4.1 Recommendations Based on Face Detection Technique
4.2 Recommendations Based on ML Approach
4.3 Recommendations Based on User’s Conversation with Chatbot
5 Experimental Results
6 Conclusion
7 Future Work
References
67 An Exploratory Data Analysis to Examine the Influence of Confinement on Student Learning, Sociability, and Well-Being Under COVID-19
1 Introduction
2 Data Acquisition and Preprocessing
2.1 Data Collection
2.2 Data Cleaning
3 Methodology
3.1 Pandas
3.2 Numpy
3.3 Matplotlib
3.4 Seaborn
3.5 Open Datasets
4 Analysis and Results
4.1 Age Division of Participants
4.2 Demographic Details
4.3 Dedicated Class Time
4.4 Time Spent on Other Pursuits
4.5 Platforms of Social Media Preference
4.6 Stress Relievers
4.7 Things that They Miss Out
4.8 Issues with Health
4.9 Weight Distribution
4.10 Impact of Fitness on Weight
4.11 Satisfaction Over Different Mediums
4.12 Rating of Online Class
5 Conclusion
References
Correction to: A Systematic Literature Review on Cybersecurity Threats of Virtual Reality (VR) and Augmented Reality (AR)
Correction to: Chapter 57 in: J. Jacobetal, (eds.), Data Intelligence and Cognitive Informatics, Algorithms for Intelligent Systems, https://doi.org/10.1007/978-981-19-6004-8_57
Correction to: A Review on Risk Analysis of Cryptocurrency
Correction to: Chapter 58 in: I. J. Jacob et al, (eds.), Data Intelligence and Cognitive Informatics, Algorithms for Intelligent Systems, https://doi.org/10.1007/978-981-19-6004-8_58
Author Index


📜 SIMILAR VOLUMES


Data Intelligence and Cognitive Informat
✍ I. Jeena Jacob (editor), Selvanayaki Kolandapalayam Shanmugam (editor), Robert B 📂 Library 📅 2022 🏛 Springer 🌐 English

<span><p>The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during  July 16–17, 2021. This book di

Data Intelligence and Cognitive Informat
✍ I. Jeena Jacob (editor), Selwyn Piramuthu (editor), Przemyslaw Falkowski-Gilski 📂 Library 📅 2024 🏛 Springer 🌐 English

<p><span>The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2023), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during June 27–28, 2023. This book dis

Data Intelligence and Cognitive Informat
✍ I. Jeena Jacob (editor), Selvanayaki Kolandapalayam Shanmugam (editor), Robert B 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 16–17, 2021. This book dis

Data Intelligence and Cognitive Informat
✍ I. Jeena Jacob (editor), Selvanayaki Kolandapalayam Shanmugam (editor), Selwyn P 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book is a collection of peer-reviewed best selected

Data Intelligence and Cognitive Informat
✍ I. Jeena Jacob, Selvanayaki Kolandapalayam Shanmugam, Ivan Izonin 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 6–7, 2022. This book discusse

Data Intelligence and Cognitive Informat
✍ I. Jeena Jacob, Selvanayaki Kolandapalayam Shanmugam, Selwyn Piramuthu, Przemysl 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book is a collection of peer-reviewed best selected