<span>This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, India, during 4â5 September 2020. The book ad
Emerging Trends in Data Driven Computing and Communications: Proceedings of DDCIoT 2021 (Studies in Autonomic, Data-driven and Industrial Computing)
â Scribed by Rajeev Mathur (editor), C. P. Gupta (editor), Vaibhav Katewa (editor), Dharm Singh Jat (editor), Neha Yadav (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 350
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book includes best selected, high-quality research papers presented at International Conference on Data Driven Computing and IoT (DDCIoT 2021) organized jointly by Geetanjali Institute of Technical Studies (GITS), Udaipur, and Rajasthan Technical University, Kota, India, during March 20â21, 2021. This book presents influential ideas and systems in the field of data driven computing, information technology, and intelligent systems.
⌠Table of Contents
Preface
Contents
About the Editors
1 Hybrid Deep Learning Model for Real-Time Detection of Distributed Denial of Service Attacks in Software Defined Networks
1 Introduction
1.1 Background and Related Work
1.2 Deep Learning
2 Methodology
2.1 Data Distribution
2.2 Algorithm
2.3 Proposed Deep Learning Model
2.4 Evaluation
3 Results
3.1 Loss
3.2 Accuracy
4 Conclusion
References
2 CP-ABE Scheme with Decryption Keys of Constant Size Using ECC with Expressive Threshold Access Structure
1 Introduction
1.1 Related Work
1.2 Our Contributions
2 Definitions and Preliminaries
2.1 Access Structure and Attribute
2.2 Assumption
3 The Proposed CP-ABE Technique with Threshold Access Structure
3.1 Setup Phase
3.2 Encrypt Phase
3.3 KeyGen Phase
3.4 Decrypt Phase
4 Analysing the Parameters Based on Security
4.1 Surety Across Attack of Collusion
4.2 Security Against Key Recovery Attack
4.3 Adversary Without Secret User Keys Deriving Original Message Against Security
5 Comparing Performance
6 Implementation Details
6.1 Description of Dynamic Programming Algorithm
6.2 Divide and Conquer Approach
7 Conclusion
References
3 Facial Expressions Recognization Based on DRLBP and CNN Classification
1 Introduction
1.1 Facial Expression Recognition System
2 Related Work
3 Facial Expression Database
4 Proposed Work
5 Experiments and Results
6 Performance Analysis
7 Conclusion
References
4 Post-Stroke Readmission Prediction Model Using Machine Learning Algorithms
1 Introduction
2 Related Works
3 Introduction
3.1 Data Sources
3.2 Classifiers
3.3 Data Preprocessing
4 Experimental Results
5 Conclusion
References
5 Handwriting Recognition Using Deep Learning
1 Introduction
2 Dataset
3 Methodology
3.1 Convolutional Neural Network (CNN)
3.2 Callback APIs
3.3 Confusion Matrix
3.4 RMSprop and Adam
4 Workflow
4.1 Image Acquisition
4.2 Pre-processing
4.3 Segmentation
4.4 Feature Extraction
4.5 Classification
4.6 Post-processing
5 Result
6 Conclusion
References
6 A Theoretical Approach to Reinforcement Learning Algorithm and Nash Equilibrium to Maximize the Score in Imperfect Information Game
1 Introduction
2 Scrabble Overview
2.1 Basic Strategy
2.2 Reinforcement Learning
3 Literature Review
4 Conclusion and Future Scope
References
7 A Review Paper on Sign Language Recognition Using Machine Learning Techniques
1 Introduction
2 Literature Review
3 Steps of Sign Language Recognition
3.1 Data Acquisition
3.2 Pre-processing
3.3 Segmentation
3.4 Feature Extraction
3.5 Classification
4 Conclusion and Future Scope
References
8 Deep Learning Methods for the Prediction of Chronic Diseases: A Systematic Review
1 Introduction
2 Deep Learning
2.1 Sparse Autoencoders
2.2 Softmax Regression
2.3 Convolution Auto-encoders
2.4 Sparse Filtering (SF)
2.5 Stochastic Gradient Descent (SGD)
2.6 Gradient Boosting (GB)
2.7 Decision Trees Classifier
2.8 Spatial Pooling
3 Deep Learning for Prediction of Diseases
3.1 Alzheimer Disease (AD)
3.2 Coronary Heart Disease (CHD)
3.3 Diabetic Retinopathy (DR)
3.4 Breast Cancer (BC)
3.5 Autoimmune Disease
3.6 Skin Disease
4 Result and Discussion
5 Conclusion and Future Scope
References
9 Cyberinfrastructure for Advanced Research with High Performance Edge Computing
1 Introduction
2 Related Works
3 HPC Edge and AI
4 PARAM !ARUB Architecture
4.1 Machine Learning/Deep Learning Application Development
5 Conclusion
References
10 A Literature Review on Machine Learning Techniques and Strategies Applied to Stock Market Price Prediction
1 Introduction
2 Need of Stock Market Prediction
3 Stock Market Analysis Approaches
4 Efficient Market Hypothesis (EMH)
4.1 Random Walk Theory
4.2 Review of Machine Learning Techniques
5 Literature Survey
6 Discussion
7 Challenges and Open Problems
8 Conclusion
References
11 A Comparative Analysis of ML Stratagems to Estimate Chronic Kidney Disease Predictions and Progression by Employing Electronic Health Records
1 Introduction
2 Systematic Outline for Literature Review
3 Addressing RQ1 to Analyze Biomarkers Used for CKD Predictions
3.1 Addressing RQ1.1
3.2 Addressing RQ1.2
3.3 Addressing RQ1.3
4 Addressing RQ2 to Identify Machine Learning Algorithms Implemented for CKD Predictions
5 Conclusion
References
12 Application of Machine Learning Algorithms in Agriculture: An Analysis
1 Introduction
1.1 Supervised Learning
1.2 Unsupervised Learning
1.3 Problem Statement
2 Techniques and Algorithms
3 Literature Review
3.1 Artificial Neural Network
3.2 Information on Fuzzy Network
3.3 Support Vector Machine
3.4 Convocational Neural Network
3.5 Deep Learning
4 Discussion and Results
5 Conclusion
References
13 Combined DCT-DWT Color Image Digital Watermarking Technique
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 Color Image Component
3.2 Discrete Wavelet Transform
3.3 Discrete Cosine Transform
3.4 Block Diagram of Proposed Algorithm for Watermarking
4 Experimental Results
4.1 Selected Original Input Images
4.2 Selected Original Watermark Image
4.3 Output of Invisible Watermarking
4.4 Recovered Watermarks
4.5 Image Quality and Similarity Analysis
5 Conclusion
References
14 A Performance Analysis of Face and Speech Recognition in the Video and Audio Stream Using Machine Learning Classification Techniques
1 Introduction
2 Existing Method
3 Related Work
4 Basic Concept
5 Proposed Methodology
6 Performance Measure
7 Conclusion
References
15 Comparative Analysis of AFE Cardiac Amplifiers Used in IOT Application
1 Introduction
2 Core Schematic Explanation of Current Reuse Technique-Based Inverter Stacked-4 Amplifier
3 Simulation Waveform
4 Conclusion
References
16 Design and Analysis of Multi-band Fractal Antennas for Wireless Communications
1 Introduction
2 Proposed Antenna Design
3 Design and Analysis of Square Fractal Antenna
3.1 Base Shape of Antenna
4 Measured Results
5 Results and Conclusion
References
17 A Summary on Neurodegenerative Disease Detection
1 Introduction
2 Medical Examinations
2.1 Film Labeling
2.2 Computerized Tomography Imaging (CT)
2.3 CT for Single-Photon Emission (SPECT)
2.4 PET for Positron Emission (PET)
3 Medical Scales
3.1 Mental State Score Card Test (MMSESC)
3.2 Unified Classification Scale for PD (UPDRSI)
3.3 Unified Dyskinesia Scale (UDysRSS)
3.4 Questionnaire on Freezing of Gait (FOGQ)
4 Biomarkers
5 Unsupervised Techniques
5.1 SOM
5.2 Wavelet-SOM
5.3 FCM-SOM
5.4 ASGHSOM
5.5 GHSOM
5.6 EGS-SOM
5.7 SOM-FKM
5.8 AMSOM-FKM
5.9 CNN
6 Conclusion
References
18 An Ensemble Approach for Classification and Prediction of Diabetes Mellitus Disease
1 Introduction
1.1 Type-1 Diabetes Mellitus
1.2 Type-2 Diabetes Mellitus
1.3 Complications Associated with Diabetes Mellitus
2 Related Work
3 Methodology
3.1 Data Description
3.2 Box and Whisker Plot
3.3 Algorithm Description
3.4 Proposed Method
4 Results and Discussion
4.1 Correlation Heatmap
5 Conclusion
References
19 A Novel Approach for Identification of Brain Tumor by Combination of Intelligent Water Drop Algorithm and Convolutional Neural Network
1 Introduction
2 Literature Survey
3 Proposed Model
3.1 Image Pre-processing
3.2 Intelligent Water Drop (IWD) Algorithm
3.3 Convolutional Neural Network (CNN)
4 Experiment and Results
5 Conclusion
References
20 Time Restricted Frame Aggregation for Better QoS in IEEE 802.11ac
1 Introduction
1.1 Frame Aggregation
1.2 MSDU Aggregation
2 Proposed Methodology
3 Algorithm
4 Experimental Results
5 Conclusion
References
21 Self-Powered Intelligent Wastewater Treatment System with IOT-Based Monitoring for Smart Cities
1 Introduction
1.1 Background
1.2 Water Demand
1.3 Water Pollution
1.4 Wastewater Treatment
2 Proposed Wastewater Treatment System
2.1 Self-Powered Intelligent Wastewater Quality Monitoring System (Real Time)
2.2 Methodology
3 Results of Prototype Model
4 Conclusions
References
22 IoT-based Smart Ultraviolet Disinfecting and Sterilizing Robot for Public Places
1 Introduction
1.1 Objective of the Work
1.2 Solution to the Problem
1.3 Motivation
2 Methodology
2.1 Modeling of the UVDS Robot
2.2 Controller Circuit Board of the UVDS Robot
3 Results and Discussions
4 Conclusion
References
23 IoT-based Intelligent Intravenous (IV) Stand for Healthcare Sector
1 Introduction
1.1 Existing Intravenous Stand
1.2 Problem Faced by Human
2 Methodology
2.1 Technology Used in Robotic Smart IV Stand
2.2 Components of the Robotic Smart IV Stand
3 Results on Server and Mobile
4 Conclusion
References
24 Integrating Lean Green Technique Through Single Combined Strategy in Marble Industry
1 Introduction
2 Previous Research Study
3 Lean and Green Technique
4 Incorporating Green and Lean Activities Through a Single Combined Strategy
5 Conclusion
References
25 Industrial Internet of Things: A Survey
1 Introduction
2 IoT and IIoT
3 IIoT Architecture
4 Enabling Technologies in IIoT
5 Applications
6 Future Prospective and Challenges
7 Conclusion
References
26 Analysis and Measurement of BER and SNR for Different Block Length in AWGN and Rayleigh Channel
1 Introduction
2 Interleavers and Channel Modeling
3 Turbo Encoder and Decoder
3.1 Encoder
3.2 Decoder
4 Proposed Methodology
5 Result and Discussion
6 Conclusion
References
27 Software Development Life Cycle Performance Analysis
1 Introduction
1.1 Phases of SDLC
2 Types of Models
2.1 Waterfall Model
2.2 The Iterative Model
2.3 The Prototype Model
2.4 The Spiral Model
2.5 VâModel
3 Difference Between Models
4 Conclusion
References
28 Scrum Framework Based on Agile Methodology in Software Development and Management
1 Introduction
2 Literature Review
2.1 Software
2.2 SDLC (Software Development Life Cycle)
2.3 Agile
2.4 Traditional Versus Agile
2.5 Scrum
3 Methodology
3.1 Scrum Roles
3.2 Sprint
3.3 Scrum Process
4 Scrum Values
4.1 Courage
4.2 Focus
4.3 Commitment
4.4 Respect
4.5 Openness
5 Limitations
6 Conclusion and Future Scope
References
29 A Comparative Study and Tool to Early Predict Diabetes Using Various Machine and Deep Learning Based Techniques
1 Introduction
1.1 Categories of Diabetes
2 Related Work
3 Methodology
3.1 Model Diagram
3.2 Tool Description
3.3 Quick Description of About the Algorithms Used
4 Proposed Work
5 Result and Conclusion
5.1 A Detailed Description of Results is in the Following Tables
5.2 Graphical Representation of Accuracy on Both the Parameters
References
30 Single-End Current-Based Scheme for Detection and Classification of Distant-End and Adjacent-End Faults in Transmission Lines
1 Introduction
2 Application of the Scheme
3 Presented Fault Detection (FD) Scheme
4 Simulation Effects
4.1 Performance Under Fault Application Time Variation
4.2 Performance Under Fault Impedance Variation
4.3 Performance Under Ground Impedance Variation
5 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<p><span>This book presents high-quality, peer-reviewed papers from International Conference on Advanced Communications and Machine Intelligence (MICA 2022), organised by M.Kumarasamy College of Engineering, Chennai, Tamil Nadu, India, during 9â11 December 2022. The book includes all areas of advanc
<p><span>This book gathers a collection of high-quality peer-reviewed research papers presented at First International Conference on Innovations in Software Architecture and Computational Systems (ISACS 2021), held at Guru Nanak Institute of Technology, Kolkata, India, during 2 â 3 April 2021. The b
<p><span>The book presents recent advances in the generation and detection of fake multimedia. It also presents some frontiers in defensive techniques in front of skillfully cloned media. The ultimate purpose of the research direction presented by this book is to build up a trustworthy media network
<p><span>The book covers computational statistics, its methodologies and applications for IoT device. It includes the details in the areas of computational arithmetic and its influence on computational statistics, numerical algorithms in statistical application software, basics of computer systems,
This book gathers high-quality papers presented at the Fifth International Conference on Smart Trends in Computing and Communications (SmartCom 2021), organized by Global Knowledge Research Foundation (GR Foundation) from March 2 â 3 , 2021. It covers the state of the art and emerging topics in info