𝔖 Scriptorium
✦   LIBER   ✦

📁

Expert Clouds and Applications: Proceedings of ICOECA 2022 (Lecture Notes in Networks and Systems, 444)

✍ Scribed by I. Jeena Jacob (editor), Selvanayaki Kolandapalayam Shanmugam (editor), Robert Bestak (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
785
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2022), organized by GITAM School of Technology, Bangalore, India, during 3–4 February 2022. It covers new research insights on artificial intelligence, big data, cloud computing, sustainability, knowledge-based expert systems. The book discusses innovative research from all aspects including theoretical, practical, and experimental domains that pertain to the expert systems, sustainable clouds, and artificial intelligence technologies.

✦ Table of Contents


Foreword
Preface
Acknowledgments
Contents
Editors and Contributors
An Approach for Summarizing Text Using Sentence Scoring with Key Optimizer
1 Introduction
2 Related Works
3 Methodology
3.1 Data Acquisition
3.2 Essential Pre-processing Steps
3.3 Similarity Computation with Weighted Features
3.4 Feature Weight Scoring
3.5 Sentence Scoring with KEY Optimizer
3.6 Summarization Process
4 Numerical Results and Discussion
5 Conclusion
References
Image Classification of Indian Rural Development Projects Using Transfer Learning and CNN
1 Introduction
1.1 Dataset
2 Background
3 Literature Review
3.1 Works Related to Image Classification of Rural Projects
3.2 Works Related to Data Augmentation Techniques
3.3 Gaps Identified in the Related Works
3.4 Contributions of This Paper
4 Proposed Work
4.1 Experimental Setup and Analysis
4.2 DenseNet121
4.3 Remote-Sensing (RS) Architecture
4.4 Comparative Analysis
5 Conclusion
References
Design of a Mobile Application to Deal with Bullying
1 Introduction
2 Literature Review
3 Proposed Work
4 Results and Discussion
5 Conclusion
References
Selection of Human Resources Prospective Student Using SAW and AHP Methods
1 Introduction
2 Current and Previous Similar Research Papers
3 Simple Additive Weighting Implementation
3.1 List of Weighting Criteria, Including the Range of Criteria and Normalization of Criteria Range
3.2 Scoring of Sample Data Using a Normalized Range of Criteria
3.3 Normalization of Performance Rating Score
3.4 Ranking Score
4 Analytical Hierarchy Process Implementation
4.1 Processing Criteria
4.2 Processing Alternatives
5 Calculation Result of SAW and AHP Method
6 Conclusions
References
Implementation of the Weighted Product Method to Specify scholarship’s Receiver
1 Introduction
2 Current and Previous Similar Research Papers
3 Result and Discussion
3.1 System Modeling
3.2 Weighted Product Implementation
3.3 System Implementation
4 Conclusion
References
A Survey on E-Commerce Sentiment Analysis
1 Introduction
2 Related Works
3 Conclusion
References
Secured Cloud Computing for Medical Database Monitoring Using Machine Learning Techniques
1 Introduction
2 Literature Survey
3 Materials and Methodology
4 Implementation
5 Conclusion
References
Real-Time Big Data Analytics for Improving Sales in the Retail Industry via the Use of Internet of Things Beacons
1 Introduction
2 Literature Survey
3 Materials and Methodology
3.1 Apache Spark for Real-Time Data Analytics:
3.2 Proposed Ideal Beacon Selection
3.3 Analysis and Results
4 Conclusion
References
Healthcare Application System with Cyber-Security Using Machine Learning Techniques
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Proposed Methodology
4 Implementation
4.1 Camera Specifications
4.2 Comparison with Existing Algorithm
5 Conclusion
References
Energy Efficient Data Accumulation Scheme Based on ABC Algorithm with Mobile Sink for IWSN
1 Introduction
2 Literature Survey
3 Materials and Methodology
3.1 ABC Algorithm
3.2 Proposed Ideal Path Selection by ABC Algorithm
3.3 Analysis and Results
4 Conclusion
References
IoT Based Automatic Medicine Reminder
1 Introduction
2 Background
2.1 Cloud Computing and IoT
3 Proposed System
4 System Reqirements
5 Hardware Requirements
6 Hardware Used
6.1 Arduino Board
6.2 GSM (Worldwide Framework for Portable)
6.3 LCD (Liquid Crystal Display)
6.4 RTC (Real-Time Clock)
7 Results
7.1 Unit Testing
8 Conclusion
References
IoT Based Framework for the Detection of Face Mask and Temperature, to Restrict the Spread of Covids
1 Introduction
2 Related Background
3 Proposed Work
4 Results
5 Conclusion
References
Efficient Data Partitioning and Retrieval Using Modified ReDDE Technique
1 Introduction
2 Literature Survey
3 Methodology
3.1 Data Node
3.2 Shard
4 Implementation
4.1 Pre-Processing of Data
4.2 Clustering of Data
4.3 Data Loading
4.4 Input Query
4.5 Shard Selection
4.6 Data Retrieval
5 Results and Discussion
6 Conclusion
References
Stock Price Prediction Using Data Mining with Soft Computing Technique
1 Introduction
2 Related Work
3 Proposed Work
3.1 Procedure
3.2 Proposed Model
3.3 Clustering Algorithm
3.4 Clustering Technique
3.5 Proposed Algorithm
3.6 Implementation of Novel LSTM Approach
3.7 Data Set
4 Results
5 Conclusion
References
A Complete Analysis of Communication Protocols Used in IoT
1 Introduction
2 Characteristics of IoT
3 Background and Related Work
4 IoT Architecture
5 IoT Protocols
6 Conclusion
References
Image Captioning Using Deep Learning Model
1 Introduction
2 Review of Literature
3 Literature Table
4 Proposed work
5 Observation and Result
6 Conclusion
References
Recommender System Using Knowledge Graph and Ontology: A Survey
1 Introduction
2 Background and Related Work
2.1 Concept of Knowledge Graph
2.2 Literature Work
3 Observation and Discussion
3.1 Ontology-Based
3.2 Challenges in Recommender System
3.3 Challenges in Knowledge Graph
3.4 Available Tools and Dataset
4 Proposed Idea
5 Conclusion and Future Work
References
A Review of the Multistage Algorithm
1 Introduction
2 Exploration of Multistage Algorithm Publication
3 Classification of Multistage Algorithm Publication
4 Review of Multistage Algorithm Publication
5 Discussion and Opinion
6 Conclusion
References
Technology for Disabled with Smartphone Apps for Blind People
1 Introduction
2 Existing Works
3 Proposed Smartphone Application
4 Conclusion
References
Mobile Apps for Musician Community in Indonesia
1 Introduction
2 Existing Works
3 Proposed Idea
4 Conclusion
References
A Genetic-Based Virtual Machine Placement Algorithm for Cloud Datacenter
1 Introduction
2 Related Work
3 Placement Algorithms
4 Performance Evaluation
4.1 Experimental Setup
4.2 Evaluation of FF and BF Algorithm
4.3 Evaluation of IGA Algorithm
5 Conclusion
References
Visual Attention-Based Optic Disc Detection System Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Proposed Visual Attention-Based Optic Disc Detection System
3.1 Pre-processing
3.2 Processing
3.3 Post-processing
4 Results
5 Conclusion
References
An Overview of Blue Eye Constitution and Applications
1 Introduction
2 Technologies Used in Blue Eye
2.1 Manual and Gaze Input Cascaded (MAGIC) Pointing
2.2 Artificial Intelligence Speech Recognition
2.3 Simple User Interest Tracker (SUITOR)
2.4 Emotion Mouse
3 Construction of Blue Eye
3.1 Software Required
3.2 Hardware Required
4 Applications of Blue Eye
5 Emotion Computing Using Blue Eye Technology
6 Results
7 Conclusion
References
Enhancement of Smart Contact on Blockchain Security by Integrating Advanced Hashing Mechanism
1 Introduction
1.1 Blockchain
1.2 Smart Contracts
1.3 Blockchain Hash Function
1.4 Hashing Techniques
1.5 Encryption Algorithm Based on RSA
2 Literature Review
3 Problem Statements
4 Proposed Work
5 Results and Discussion
6 Conclusions
7 Future Scopes
References
Evaluation of Covid-19 Ontologies Through OntoMetrics and OOPS! Tools
1 Introduction
2 Literature
3 Ontology at a Glance
3.1 Ontology Development Methodologies
3.2 Available Covid-19 Ontologies
4 Evaluation of Covid-19 Ontologies
4.1 OntoMetrics Tool
4.2 Ontology Pitfall Scanner! (OOPS!)
5 Conclusion and Future Work
References
Recognition of the Multioriented Text Based on Deep Learning
1 Introduction
2 Related Work
3 Methodology
4 Results and Discussions
5 Conclusion
References
Fruit and Leaf Disease Detection Based on Image Processing and Machine Learning Algorithms
1 Introduction
2 Background
3 Methodology
4 Results and Discussion
5 Conclusion
References
A Survey for Determining Patterns in the Severity of COVID Patients Using Machine Learning Algorithm
1 Introduction
2 Related Works
3 Conclusion
References
Relation Extraction Between Entities on Textual News Data
1 Introduction
2 Literature Survey
2.1 Recurrent Neural Networks
2.2 Gated Recurrent Units
2.3 Conditional Random Fields
2.4 Named Entity Recognition
3 Methodology
3.1 Dataset
3.2 Word Embedding
3.3 Bi-Directional Gated Neural Networks
3.4 Conditional Random Fields
3.5 Multi-Head Selection
4 Results and Discussion
5 Conclusion
References
A Comprehensive Survey on Compact MIMO Antenna Systems for Ultra Wideband Applications
1 Introduction
2 UWB MIMO Antenna, Classifications, and Its Performance Enhancement Techniques
2.1 UWB MIMO Antennas
2.2 Suitable Antennas for 5G Applications
2.3 Antenna Performance Enhancement Techniques
3 UWB MIMO Antenna
3.1 Printed UWB MIMO Antenna
3.2 High-Isolation Compact MIMO Antenna
3.3 Compact UWB Four Antenna Element MIMO Antenna Using CPW Fed
3.4 8-Element Based UWB MIMO Antenna with Band-Notch and Reduced Mutual Coupling
3.5 WLAN Band Rejected 8-Element Based Compact UWB MIMO Antenna
3.6 Comparison of UWB MIMO Wideband Antennas Structures
4 Conclusion
References
A Review of Blockchain Consensus Algorithm
1 Introduction
1.1 Blockchain Technology
2 Related Work
2.1 Proof of Work Consensus Algorithm
2.2 Proof of Stake Consensus Algorithm
2.3 Proof of Elapsed Time
2.4 Byzantine Fault Tolerance
3 Challenges/Findings
3.1 Proof of Work
3.2 Proof of Stake
3.3 Proof of Elapsed Time
3.4 Byzantine Fault Tolerance
4 Conclusion
References
A Short Systematic Survey on Precision Agriculture
1 Introduction
1.1 Precision Agriculture
1.2 Machine Learning Approaches
1.3 Review of Machine Learning Approaches
1.4 Analysis of Learning Models
2 Related Work
2.1 Flora Test in Data Acquisition
2.2 Production Management System
2.3 Disease Detection Techniques
2.4 Soil Classification
2.5 Production Phase
3 Precision Agriculture System
3.1 Precision Agriculture Routing Protocols Using WSN
3.2 IoT Computing Architecture in Precision Agriculture
4 Comparison Accuracy
5 of soil accessibility in agro zone districtsConclusion
References
Improving System Performance Using Distributed Time Slot Assignment and Scheduling Algorithm in Wireless Mesh Networks
1 Introduction
2 Related Work
3 Effective Distributed Time-Based Schedule for Channel Assignment
4 Performance Evaluation
5 Conclusion
References
Comparison of PRESENT and KLEIN Ciphers Using Block RAMs of FPGA
1 Introduction
2 Related Work
3 The PRESENT Cipher
4 The KLEIN Cipher
5 Implementation
6 Results and Conclusion
6.1 Results
6.2 Conclusion
References
Remote Controlled Patrolling Robot
1 Introduction
1.1 Objective
1.2 Synopsis
2 Related Work—Literature Survey
2.1 Overview
3 Methodology- Proposed Work
3.1 Design Components
3.2 Overview
3.3 Movement of Robot
3.4 Designing the Live Stream
3.5 ThingSpeak Cloud Application in Raspberry Pi
4 Implementation and Result
4.1 Implementation
4.2 Result
5 Conclusion
6 Future Scope
References
Novel Modeling of Efficient Data Deduplication for Effective Redundancy Management in Cloud Environment
1 Introduction
2 Related Work
3 Problem Description
4 Proposed Methodology
5 System Design
5.1 Strategies of System Design
5.2 Assumptions and Dependencies
5.3 Algorithm Design
6 Results Discussion
6.1 Experimental Parameters
6.2 Test Environment
6.3 Result Analysis
7 Conclusion
References
A Survey on Patients Privacy Protection with Steganography and Visual Encryption
1 Introduction
1.1 Motivation
1.2 Survey Strategy and Evaluation
1.3 Paper Organization
2 Spatial Hiding Models
2.1 Least Significant Bit (LSB)
2.2 Most Significant Bit (MSB)
2.3 Other Spatial Hiding Models
3 Frequency Hiding Models
3.1 Discrete Cosine Transforms (DCT)
3.2 Discrete Wavelet Transform (DWT)
4 Visual Encryption Models
5 Analysis and Evaluatio
6 Conclusion
References
Survey on Channel Estimation Schemes for mmWave Massive MIMO Systems – Future Directions and Challenges
1 Introduction
2 mmWave MIMO Systems and Its Characteristics
2.1 Propagation Characteristics
2.2 mmWave Technology
3 Existing Architectures for Channel Estimation for Massive MIMO Systems
3.1 Tensor Based Channel Estimation Scheme
3.2 Beam Squint Based Channel Estimation Scheme
3.3 Frequency Domain Compressive Channel Estimation Scheme
3.4 Hybrid Beamforming Based Channel Estimation Schemes via Random Spatial Sampling
3.5 Time-Domain Based Channel Estimation with Hybrid Architecture
3.6 Comparison of Existing Channel Estimation Schemes
4 Conclusion
References
Fake News Detection: Fact or Cap
1 Introduction
2 Related Work
2.1 Pre-trained Linguistic Models
2.2 Clickbait Detection
2.3 Fake News Categorization
3 Methodology
3.1 Data Collection
3.2 Data Pre-processing
3.3 Feature Extraction
4 Results and Discussion
5 Conclusion
References
The Future of Hiring Through Artificial Intelligence by Human Resource Managers in India
1 Introduction
2 Literature Review
3 Research Methodology
4 Findings and Discussions
5 Conclusion
References
A Computer Vision Model for Detection of Water Pollutants Using Deep Learning Frameworks
1 Introduction
2 Related Work
3 Architecture Details
3.1 Dataset Development
3.2 Detection Algorithms
3.3 Custom Dataset Training
4 Experimental Details and Results
4.1 Training Environment
4.2 Hardware Specifications
5 Conclusion and Future Work
References
Medical IoT Data Analytics for Post-COVID Patient Monitoring
1 Introduction
2 Literature Review
3 IoT Based Medical Data Analytics
4 Data Collection
5 ML Approaches for Medical IoT
6 Post-COVID-19 Patient Monitoring System
7 Some of the Existing Models
8 Proposed System
9 Evaluation
10 Conclusion
References
SNAP—A Secured E Exchange Platform
1 Introduction
2 Literature Survey
3 Proposed System
4 System Architecture
5 Expected Results and Discussion
5.1 Experimental Setup
5.2 Third-Party Services
5.3 Expected Results
6 Conclusion and Future Scope
References
An AES-Based Efficient and Valid QR Code for Message Sharing Framework for Steganography
1 Introduction
2 Related Work
3 Proposed System
3.1 AES Algorithm
3.2 Encryption Process
4 Results and Discussion
4.1 Parameters Evaluation
4.2 Outcomes
4.3 Robustness Against Attacks
5 Conclusion
6 Future Scope
References
Categorization of Cardiac Arrhythmia from ECG Waveform by Using Super Vector Regression Method
1 Introduction
1.1 Electrocardiogram (ECG) Electrodes
2 Review of the Existing Literature
3 Methodology
3.1 Regression with Support Vectors
4 Results
5 Conclusion
References
Performance Analysis of Classification Algorithm Using Stacking and Ensemble Techniques
1 Introduction
2 Literature Survey
3 Methodology
3.1 Data Pre-processing
3.2 Feature Selection
3.3 Support Vector Machine (SVM)
3.4 Logistic Regression (LR)
3.5 Naive Bayes (NB)
3.6 Stacking Algorithms
4 Implementation
4.1 Data Pre-processing
4.2 Feature Selection
4.3 Data Partitioning
4.4 Support Vector Machine
4.5 Naive Bayes
4.6 Logistic Regression
5 Proposed Hybrid Algorithm
6 Results and Discussions
6.1 Performance Analysis of Existing Classification Algorithms
6.2 Performance Analysis of Proposed Stacking Technique
6.3 Comparative Study Analysis of Existing and Proposed Stacking Technique
7 Conclusion
References
Conceptual Study of Prevalent Methods for Cyber-Attack Prediction
1 Introduction
2 Background Work
2.1 Identifying the Attack Scenario
2.2 Prediction of Attacks
2.3 Various Techniques for Attack Prediction
3 Attack Graph Analysis
4 Attack Prediction with Deep Learning Approach
5 Hidden Markov Model Approach
6 Proposed Model
7 Conclusion and Future Work
References
Performance Analysis of Type-2 Diabetes Mellitus Prediction Using Machine Learning Algorithms: A Survey
1 Introduction
2 Implementation Techniques
2.1 Traditional Methods
2.2 Machine Learning Classifiers
2.3 Decision Tree Algorithm
2.4 Deep Learning
2.5 Hybrid Models
3 Conclusion and Future Scope
References
Dynamic Updating of Signatures for Improving the Performance of IDS
1 Introduction
2 Background of IDS
3 Proposed Framework
4 Experiment Environment and Result
5 Conclusion
References
M-mode Carotid Artery Image Classification and Risk Analysis Based on Machine Learning and Deep Learning Techniques
1 Introduction
2 Materials and Methods
2.1 Elastic Modulus
2.2 Stiffness Index
2.3 Arterial Distensibilty
2.4 Arterial Compliance
3 Results and Discussion
4 Conclusion
References
Analyzing a Chess Engine Based on Alpha–Beta Pruning, Enhanced with Iterative Deepening
1 Introduction
1.1 Background
1.2 Research Work
2 Game Tree of the System
3 Proposed Work
3.1 Move Generator
3.2 Evaluation Functions and Pieve Values
3.3 Search Algorithm
4 Findings
5 Future and Scalability
6 Conclusion
References
Intelligent Miniature Autonomous Vehicle
1 Introduction
2 Literature Survey
3 Methodology
3.1 Data Collection
3.2 Pre-processing of the Data
4 Results and Discussion of Model Training and Testing
5 Conclusion
References
Energy and Trust Efficient Cluster Head Selection in Wireless Sensor Networks Under Meta-Heuristic Model
1 Introduction
2 Literature Review
2.1 Related Works
3 Proposed Optimal CH Selection Model with Multi-objective Decision Making
3.1 Assumptions
3.2 Overview of the Proposed Work
3.3 Proposed Scheme
3.4 Proposed HCSO
4 Results and Discussions
4.1 Simulation Procedure
4.2 Analysis on the Count of Alive Node
4.3 Analysis on Normalized Network Energy
4.4 Analysis on Trust
4.5 Statistical Analysis on Count of Alive Nodes
4.6 Statistical Analysis on Normalized Energy
4.7 Statistical Analysis on Trust
4.8 Statistical Analysis on Separation Distance Between CHs
4.9 Computational Complexity
5 Conclusion
References
Performance Analysis of OTFS Scheme for TDL and CDL 3GPP Channel Models
1 Introduction
2 Orthogonal Time Frequency Space Modulation
2.1 OTFS Modulation
2.2 OFTS Demodulation
2.3 Equalization and Channel Estimation
3 Results and Discussion
3.1 TDL Channel Models
3.2 CDL Channel Models
4 Conclusion
References
Design of Smart Super Market Assistance for the Visually Impaired People Using YOLO Algorithm
1 Introduction
1.1 Inspiration Towards Research Work
1.2 Facts About Blind People [4]
2 Related Works
2.1 Assistive Clothing Pattern Recognition for Visually Impaired People
2.2 From Smart Objects to Social Objects: The Next Evolutionary Step of the Internet of Things
2.3 Accessible Shopping Systems for Blind and Visually Impaired Individuals: Design Requirements and the State of the Art
2.4 Touch Access for People with Disabilities
2.5 Graphene-Based Web Framework for Energy Efficient IoT Applications
2.6 Design of Deep Learning Algorithm for IoT Application by Image-Based Recognition
2.7 Computer Vision on IoT Based Patient Preference Management System
2.8 Study of Retail Applications with Virtual and Augmented Reality Technologies
3 The Proposed Work
3.1 Steps of the Research Work
3.2 Smart Glass with Their Nature of Working
3.3 Working Principle of YOLO Algorithm
3.4 Classification
4 Investigative Results
4.1 Building a Product Recognition System
4.2 Output Image
4.3 Graphical Representation
5 Conclusion
6 Future Work
References
Investigating the Effectiveness of Zero-Rated Website on Students on E-Learning
1 Introduction
2 Literature Review
2.1 The Nature of Zero-Rating of Websites
2.2 Content and Access Requirements for E-Learning
2.3 Content Accessibility on Zero-Rated Website
3 Research Methodology
4 Findings and Analysis
4.1 Nature of Zero-Rating
4.2 Content and Access Requirement for E-Learning
4.3 Levels of Content Accessibility on Zero-Rated University Website
5 Conclusion
References
Role of Machine Learning Algorithms on Alzheimer Disease Prediction
1 Introduction
2 Literature Survey
3 Proposed System
4 Results
5 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Expert Clouds and Applications: Proceedi
✍ I. Jeena Jacob (editor), Francisco M. Gonzalez-Longatt (editor), Selvanayaki Kol 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2021), organized by GITAM School of Technology, Bangalore, India during February 18–19, 2021. It covers new research insights on artificial intelligence, big data, cloud computing, sus

Expert Clouds and Applications: Proceedi
✍ I. Jeena Jacob (editor), Francisco M. Gonzalez-Longatt (editor), Selvanayaki Kol 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2021), organized by GITAM School of Technology, Bangalore, India during February 18–19, 2021. It covers new research insights on artificial intelligence, big data, cloud computing, sustainab

Expert Clouds and Applications: Proceedi
✍ I. Jeena Jacob, Francisco M. Gonzalez-Longatt, Selvanayaki Kolandapalayam Shanmu 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2021), organized by GITAM School of Technology, Bangalore, India during February 18–19, 2021. It covers new research insights on artificial intelligence, big data, cloud computing, sustainab

Expert Clouds and Applications: Proceedi
✍ I. Jeena Jacob, Francisco M. Gonzalez-Longatt, Selvanayaki Kolandapalayam Shanmu 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2021), organized by GITAM School of Technology, Bangalore, India during February 18–19, 2021. It covers new research insights on artificial intelligence, big data, cloud computing, sus

Expert Clouds and Applications: Proceedi
✍ I. Jeena Jacob, Selvanayaki Kolandapalayam Shanmugam, Ivan Izonin 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>The book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2023), organized by RV Institute of Technology and Management, Bangalore, India, during February 9–10, 2023. It covers new research insights on artificial intelligence, big data, cloud

Rising Threats in Expert Applications an
✍ Vijay Singh Rathore (editor), Subhash Chander Sharma (editor), Joao Manuel R.S. 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>The book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2022 organized by IIS (Deemed to be University), Jaipur, Rajasthan, India, during January 7–8, 2022. The volume is a collection of innovative id