𝔖 Scriptorium
✩   LIBER   ✩

📁

ICT with Intelligent Applications: Proceedings of ICTIS 2021, Volume 1 (Smart Innovation, Systems and Technologies, 248)

✍ Scribed by Tomonobu Senjyu (editor), Parikshit N. Mahalle (editor), Thinagaran Perumal (editor), Amit Joshi (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
802
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fifth International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2021), held in Ahmedabad, India. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.

✩ Table of Contents


Preface
Contents
About the Editors
Performance Analysis of Secure Hash Algorithm-2 (SHA-) and Implementing on FPGA
1 Introduction
2 Literature Survey
3 Algorithm
4 Details of Blocks
4.1 ROM Blocks
4.2 Hash Computation Unit
4.3 Padder and Wt Unit
4.4 Constant Units
5 Results and Discussion
6 Conclusion and Future Scope
References
Chat-It-Loud!: Real-Time Transcribing App for Communication for Hearing-Impaired
1 Introduction
2 Chat-It-Loud!: Real-Time Transcribing and Verbal Chatting App
3 Related Work
4 Implementation
5 Results
6 Conclusion
7 Future Work
References
ICT in Indian Agriculture: Opportunities and Constraints
1 Introduction
2 ICT and Agriculture
3 ICT Projects in Agriculture
3.1 Village Knowledge Centre (VKC)
3.2 Kisan Call Centers (KCCs)
3.3 Bhoomi Project
3.4 Ikisan
3.5 National Agriculture Market (NAM)
4 Constraints in ICT Implementation
5 Summary
References
Estimation of Economic Impact of National Open Digital Ecosystems
1 Introduction
2 Literature Review
3 Methodology
4 Results
5 Comparative Analysis with Similar Studies
6 Implications
7 Conclusion
References
Analysis and Prediction of COVID-19 with Image Super-Resolution Using CNN and SRCNN-Based Approach
1 Introduction
2 Literature Survey
3 Methodology
3.1 Working of the Model
4 Performance Analysis and Discussions
5 Conclusion
References
Novel Approach to Improve Security Systems
1 Introduction
2 Literature Survey
3 Proposed Model
3.1 Stage I: Ticket Booking with Original Aadhaar Card QR Code Scanner in Detail
3.2 Stage II: Ticket and Aadhaar Verification in Detail
3.3 Stage III: Authenticated Entry-Exit System
4 Results Obtained
5 Conclusion
6 Future Work
References
Digital Forensic Tools for Cloud Computing Environment
1 Introduction
2 Traditional Forensic Tools
2.1 EnCase
2.2 FTK
2.3 SANS SIFT
2.4 The Sleuth Kit (TSK)
2.5 Volatility
2.6 Xplico
2.7 CAINE
2.8 X-Ways
2.9 ProDiscover
3 Cloud Specific Forensic Tools
3.1 OWADE
3.2 FROST
3.3 FAAS in IaaS
3.4 UFED Cloud Analyzer
3.5 ForenVisor
3.6 CloudTrail
4 Conclusion
References
Privacy Preserving Scheme for Smart Transportation in 5G Integrated IoT
1 Introduction
2 Related Work
3 Proposed Method
4 Scyther Tool Specification Language
4.1 Syntax
4.2 Example
5 Simulation Results
6 Conclusion
References
Classification of Medical Images Using Deep Learning to Aid in Adaptive Big Data Crowdsourcing Platforms
1 Introduction and Related Work
2 Methodology
3 DCNN Background
4 Results
4.1 Database Design
4.2 Experimental Results
5 Conclusion and Future Work
References
EZAdopt
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Result
4 Limitations
5 Conclusion
References
5G Security and Privacy Issues: A Perspective View
1 Introduction
2 A Short Review of Literature
3 How Fast 5G is (Diagrammatic Approach)
4 Key Security Challenges in 5G
4.1 5G There at Mitigation Controls: Distributed Denial of Services (DDoS) Attacks
4.2 IoT and DDoS Threat Mitigation
4.3 Insufficient Technology Readiness Level (TRL)
4.4 Security Threats in 5G-Enabled IoT
4.5 Cloud Computing and Edge Paradigms
5 Privacy Challenges in 5G
6 Conclusions
References
Design and Development of an Algorithm to Secure Big Data on Cloud Computing
1 Big Data
1.1 Introduction
1.2 Vs of Big Data
1.3 Advantages of Big Data
1.4 Challenges to Big Data
2 Cloud Computing
2.1 Introduction
2.2 Characteristics
2.3 Advantages of Cloud Computing
2.4 Challenges in Cloud Computing
3 Literature Survey
4 Proposed Method
5 Algorithm for Proposed System
6 Results and Discussion
7 Conclusion
References
Curiosity-Driven Dynamic Reconfiguration of Swarm Robots by Using Simple Behaviours
1 Introduction
1.1 Background
1.2 Computational Traits of Social Insects for Artificial Swarm Groups
1.3 Characteristics of Artificial Swarms
1.4 Cognitive Drives for Designing Artificial Swarms
2 Braitenburg Reactive Behaviours
3 Micro-Agent Level State Transition Design for Individual Robot in Swarms
3.1 Detailed Microscopic Design of Swarm Robot with FSM
4 Macroscopic Design of the Swarm
4.1 Swarm Control and Learning
4.2 Curiosity-Driven Meta-level Learning for Dynamic Reconfiguration
5 Results and Discussions
References
Pre-stampede Monitoring and Alarm System
1 Introduction
2 Objectives
3 Literature Survey
4 Stampedes
5 Functional Block Diagram
6 Flowchart
7 Optimization
7.1 Introduction to Optimization
7.2 Types of Optimization
8 Results
9 Conclusion
10 Future Scope and Applications
References
Review of NOMA with Spectrum Sharing Technique
1 Introduction
2 Noma Fundamental Principle
3 Cognitive Radio Fundamentals
3.1 System for Spectrum Detection
3.2 Sharing of Spectrum
3.3 Access Types of Spectrum
4 Related Work
5 NOMA with CR Spectrum Sharing
6 Conclusions
References
Review on Secure Ad-Hoc Networks for Wireless Sensor Network
1 Introduction
2 Literature Review
3 Review of Various Protocols in Ad-Hoc Network
4 Protocols Used In Wireless Sensor Networks
5 Attacks in Ad-Hoc Network
6 Techniques in Ad-Hoc Network
7 Conclusion
References
A Comparative Study on Securely Sharing and Searching Data Using Edge of Cloud-Supported Internet of Things
1 Introduction
2 Internet of Things
3 Security in IOT
3.1 Key Encryption Schemes
3.2 One Way Hash Algorithm and Digital Signature
3.3 Homomorphic Encryption
3.4 Secure Data Sharing in Cloud (SeDaSc)
3.5 Fog Computing Architecture
4 Literature Review
5 Review on Various Measures of Securing Data Using Edge of Cloud-Supported Internet of Things
6 Conclusion
References
Comprehensive and Empirical Evaluation of Classical Annealing and Simulated Quantum Annealing in Approximation of Global Optima for Discrete Optimization Problems
1 Introduction
2 Discrete Optimization
3 Classical Annealing
4 Simulated Quantum Annealing
4.1 Annealing Mechanics
4.2 PIMC Implementation
5 Related Work—CA & SQA
6 Experimentation and Results
6.1 Traveling Salesman
6.2 Vertex Cover
6.3 Graph Coloring
6.4 Max-Cut
6.5 Job Sequencing
6.6 Binary Integer Linear Programming
6.7 Number Partitioning
6.8 Prime Factorization
7 Conclusion
References
Enhancing Signal in Noisy Environment: A Review
1 Introduction
2 Multimodal Signals
2.1 Multimodal Signals in Image Processing
2.2 Multimodal Signals in Speech Processing
2.3 Multimodal Signals in Biomedical Processing
3 Speech Signal in High Noise Environment
3.1 Noise Estimation
3.2 Noise Reduction
3.3 Fusion Techniques
4 Mobile Audio Signal in High Noise Environment
5 Detection of the Image in the Presence of Noise
6 Detection of Biomedical Image Signal in the Presence of Noise
7 Applications
8 Summary and Conclusions
References
An Implementation of IRTBS—for Observing Cardiac Patients
1 Introduction
2 Related Work
3 System Design
4 System Implementation
5 Conclusion and Future Work
References
Early Detection of Parkinson’s Disease Through Speech Features and Machine Learning: A Review
1 Introduction
2 Databases
3 Signal Processing Methods
4 Feature Sets
5 Classifiers
6 Conclusions
References
Weight-Based Binary Channel Coding—A Machine Learning Approach
1 Introduction
2 Encoding
3 Conventional Method of Locating the Error
4 Decoding (Machine Learning Approach)
4.1 Principle of Decoding
5 Output Case Study
6 Conclusion
References
Li-Fi: An Emerging Technology
1 Introduction
2 Working Principle of Li-Fi
3 Characteristics of Li-Fi
4 Advantages of Li- Fi
5 Disadvantages of Li-Fi
6 Scope of Li-Fi
7 Applications of Li-Fi
8 Conclusion
References
Identifying Learning Standards of Artificial Neural Networks: A Study
1 Introduction
1.1 Learning in ANN
1.2 Importance of Learning
2 Learning Rules for the Artificial Neural Network
2.1 Perceptron Learning Rule
2.2 Rule for Memory-Based Learning
2.3 Delta Learning Rule (Widrow—Hoff Rule)
2.4 Error-Correction Learning Rule
2.5 Correlation Learning Rule
2.6 Outstar Learning Rule (Grossberg Learning)
2.7 Supervised Hebbian Learning Rule
2.8 Law of Competitive Learning
2.9 Competitive Hebbian Learning
3 Conclusion
References
Smart UAV Framework for Multi-Assistance
1 Introduction
2 Literature Review
3 Existing System Architecture/Working
4 Objective
5 Proposed System Architecture/Working
6 Conclusion
References
Tool for Assessing Intellectual Quotient Among Children
1 Introduction
2 Literature Survey
3 Methodology
4 Results
5 Conclusion and Scope for Future Enhancements
References
A Framework and Survey of Digital Learning Tools for Online Teaching
1 Introduction
2 Literature Survey
2.1 Frameworks for Teaching Learning
2.2 The Most Popular Digital Education Resources for Teachers
3 Proposed Framework
3.1 Graphical Tablet
3.2 OpenBoard Software
3.3 Kami Browser Extension
3.4 Kahoot Quiz
4 Results
5 Conclusion
References
Water Quality Analysis and Prediction Techniques Using Artificial Intelligence
1 Introduction
2 Problem Statement
3 Literature Review
4 Problem Formulation
4.1 Techniques Used
4.2 Analysis
4.3 The Multilayer Perceptron—Artificial Neural Networks
5 Parameters and Methods
6 Results and Discussion
7 Conclusion
References
Super Bot Controlled by IoT and Android
1 Introduction
2 Related Work
3 Proposed Work
3.1 Microcontroller Arduino
3.2 Motor Driver (L293d)
3.3 Amplifier
3.4 DC Motors
3.5 L293D Motor Drivers
3.6 IR Sensor
3.7 Speaker
4 Conclusion
References
Developing a Framework to Measure Cyber Resilience Behaviour of Indian Bank Employees
1 Introduction
2 Review of Literature
2.1 Need for Cyber Resilience in Banking Sector
3 Conceptual Framework for Measurement of Cyber Resilience Behaviour
3.1 Factor 1: Employee Expertise
3.2 Factor 2: Bank’s Security Spend on Employees
3.3 Factor 3: Employee Motivation
3.4 Factor 4: Bank’s Compliance Towards Cyber Security Frameworks
3.5 Factor 5: Availability and Knowledge of Security Policies and Standard Operating Procedures
3.6 Factor 6: Availability and Knowledge of BCP-DR Plans and CCMP
3.7 Factor 7: Participation in Risk Assessment and Risk Treatment Activities
3.8 Factor 8: Nature of Information Security Trainings
4 Scope and Limitation
5 Conclusion
References
IoT-SDWD: Internet of Things-Based Security Device for Women in Danger
1 Introduction
2 Literature Survey
3 Proposed Work
4 Application Development Specifications
5 System Architecture
6 Conclusion
References
Stock Prediction Using Machine Learning Algorithms with Special Reference to Technical Indicators
1 Introduction
2 Literature Review
3 Data, Research Methodology and Proposed Framework
3.1 Data
3.2 Research Methodology
3.3 Proposed Model Framework
4 Finding and Discussion
5 Conclusion
References
A Brief Review on Multiple-Valued Logic-based Digital Circuits
1 Introduction
2 Ternary and Quaternary Logic
2.1 Ternary Logic
2.2 Quaternary Logic
3 Ternary Logic Circuits
4 Quaternary Logic Circuits
5 Conclusion
References
An Approach of Enhanced PNCC for Resident Identification Applications
1 Introduction
2 Feature Extraction Process
3 Voice Detection System
3.1 Voice Verification
3.2 Voice Identification
4 Experimental Results
4.1 Accuracy
4.2 Computational Complexity
4.3 Running Time
5 Conclusion
References
A Study of Mathematical Backgrounds Behind the Digitally Communicative Switches Design
1 Introduction
1.1 The Fast Fourier Transform
1.2 Finite (Discrete) Fourier Transform
1.3 FFT Decomposition
1.4 Touch—Tone Dialling
1.5 Modulation, Demodulation of Dial Tone
2 Scheme
2.1 Matrix Representation of Switches
3 MATLAB Code for Finite Fourier Transformation
3.1 The MATLAB Code Concerning Finite Fourier Transformation of the Cosine Sequence is Given Below
4 Observation
5 Conclusion
References
Stay Home and Stay Safe with the Budgeting Tool a One-Stop Finance Tracker
1 Introduction
2 Related Works
3 Proposed System
4 Methodology
5 Advantages
6 Result
7 Conclusion
8 Future Scope
References
A Novel Encryption Algorithm Using Random Number Generation for Ciphertext Expansion
1 Introduction
1.1 Cryptography
1.2 Encryption and Decryption
1.3 Benefits of Symmetric Key Encryption
1.4 Ciphertext Expansion
2 Proposed Algorithm
2.1 Key Generation Algorithm with Example
2.2 Math Used in the Algorithm with Proof and Examples
3 Results and Discussion
3.1 Advantages of the Proposed Algorithm
3.2 Steps to Increase the Length of Secret Key for Ciphertext Expansion
3.3 Possible Ways to Find Out the Secret Key by an Attacker
3.4 Comparison with Existing Symmetric Encryption Algorithms
4 Conclusion
References
Segmentation of Lung Region: Hybrid Approach
1 Introduction
2 Related Work
3 Proposed Method
4 Segmentation
4.1 Random Walk Algorithm
4.2 Random Walk Algorithm with Weights
4.3 Watershed Algorithm
5 Results
6 Conclusion
References
Next Generation 5G Wireless Technologies in Healthcare
1 Introduction
2 Defining 5G
3 Present Shortcomings in Healthcare Sector
3.1 Logistical and Manpower
3.2 Diagnostic
3.3 Economic
4 Fringe Benefits
4.1 5G Cognitive Systems [6]
4.2 Wireless Tele-Surgery
4.3 Wireless Service Robots
5 Advent of 5G Wireless Technology
5.1 Tactile Internet
5.2 Big Data Analytics Over Cloud
6 Related Studies
7 Conclusion
References
Manipuri Meitei Mayek Numeral Classification by Using HOG-Assisted Deep Learned Features
1 Introduction
2 Literature Review
3 Proposed Work
3.1 Multilayer Perceptron
3.2 MMM Numerals Classification Using MLP with HOG Feature Descriptor
4 Experimental Results and Discussion
5 Conclusions
References
Effectiveness of Artificial Intelligence in Cognitive Behavioral Therapy
1 Introduction
2 Literature Review
3 Methodology
3.1 Cognitive Behavioral Therapy (CBT)
3.2 Artificial Intelligence (AI)
3.3 Cognitive Behavioral Therapy with AI
3.4 Datasets in CBT
4 CBT Integrated AI Frameworks
4.1 Existing Frameworks
4.2 Proposed Framework
5 Conclusion
6 Future Scope
References
Discrete Wavelet Transform Based Non-blind Video Authentication Using Principal Component Analysis
1 Introduction
2 Methodology
2.1 QR Code Implanting Method
2.2 QR Code Detection Method
3 Results and Discussion
4 Conclusion
References
Automation of MC/DC Coverage Test Case Suite Deploying the Optimal Strategic Choice for Tool Development
1 Introduction
2 What is MC/ DC?
3 Algorithms for MC/DC
3.1 Minimal Case Analysis Approach (MCAA)
3.2 Duo Case Analysis Approach (DCAA)
4 Comparative Study of Algorithms
5 Design of MC/DC Tool Using Python
6 Conclusions
References
Underwater Robotics
1 Introduction
2 Literature Review
3 Prototype Design
3.1 The Flow of Sensor Processing:
3.2 Machine Learning Model
4 Logical Steps and Working of Model
4.1 Basic Movement for Working Model
4.2 Working of Fully Assembled Model
5 Results
5.1 Accuracy of Making System vs Existing System
6 Discussion
7 Conclusion
References
Iris Recognition System Based on Convolutional Neural Network
1 Introduction
1.1 Iris Image Database
2 Related Work
3 Convolutional Neural Network
4 Development of Proposed CNN-Based Iris Recognition System
4.1 Procedure to Train CNN Model
4.2 Feature Extraction Using Proposed CNN Model
5 Experiment Results
6 Conclusion
References
Database Management Systems—An Efficient, Effective, and Augmented Approach for Organizations
1 Introduction
2 Literature Survey
3 Advantages of Database
4 Types of Database
4.1 Hierarchical Database
4.2 Network Database
4.3 Relational Database
4.4 Object-Oriented Database
5 Database Software
6 Future Trends
7 Augmented Data Management
8 Office Management Using Relational Database Approach for Study in India Program (SIP)
8.1 About SIP
8.2 SIP Requirements
8.3 SIP Database Design
9 Graphical User Interface
10 Conclusion
References
Parallel Computation of Hadamard Product for Dynamic Dataset on Google Colab
1 Introduction
2 Related Work
3 Scalable Hadamard Product (SHDP)
4 Parallel Computation on SHDP
5 Experimental Results
6 Conclusion
References
Cooperative Hypothesis Building for Computer Security Incident Response
1 Introduction
2 Related Work
3 Cooperative Hypothesis Building
3.1 Hypothesis Building
3.2 Types of Feedback
3.3 Example
4 Interview
5 Discussion
6 Conclusion
References
Hierarchical Multi Label Classification of News Articles Using RNN, CNN and HAN
1 Introduction
1.1 Background
2 Literature Review
3 Methodology
3.1 Without HAN
3.2 With HAN
4 Result and Discussion
5 Conclusion
References
Enhancing the Date Rate by the Management of Bandwidth and Power Using Interference Temperature Constraint in Cognitive Radio Networks
1 Introduction
2 System Model and Proposed Approach
2.1 System Model
2.2 Back Propagation Neural Network Model
3 Implementation of Proposed Approach
4 Results
5 Conclusion
References
Dialogue Extraction and Translation from Stories on Thirukural Using Verb Cue Quote Content Source Identifiers
1 Introduction
1.1 Overview
2 Related Work
2.1 Processing and Extraction of Thirukurals
2.2 Automatic Comic Image Layout Preservation and Page Segmentation Systems.
2.3 Comic Strips-Based Narrative and Story Telling Techniques
2.4 Comic Role Plot Dialogue Recommendation
2.5 Quote Extraction and Analysis
2.6 Visualization of Large Image Collections
3 System Design
3.1 Overall Design
3.2 Proposed Architecture
3.3 Algorithms
4 Implementation and Analysis of Results
4.1 Description About the Data Used
4.2 Experimental Results
4.3 Results of Sentiment Analysis on the Dialogues
5 Performance Metrics
5.1 Evaluation Metrics
6 Conclusion
References
A Survey on Using Machine Learning to Counter Hardware Trojan Challenges
1 Introduction
1.1 HT Definition and Taxonomy
1.2 Features or Properties of HT
2 HT Detection Methods
2.1 Machine Learning in HT Detection
3 HT Challenges and Suggested Solution
4 Conclusion
References
Green Cloud Computing-Oriented Algorithmic Approach-Based Virtual Machine Consolidation
1 Introduction
2 Related Work
3 Elucidation of Problem Statement
4 System Model
5 Utilization Prediction-Aware Best-Fit Decreasing Algorithm
6 Evaluation of Performance
6.1 Setup Related to Simulation
6.2 Metrics for Evaluation
6.3 Benchmarks for Comparison
6.4 Results
7 Conclusion
References
An Impact of Radon Transforms and Filtering Techniques for Text Localization in Natural Scene Text Images
1 Introduction
2 Prior Work
3 Proposed Methodology
3.1 Radon Transform
3.2 Conservative Filter
3.3 Gabor Filter
3.4 Bilateral Filter
3.5 Gaussian Filter
3.6 Region Selection
3.7 Outlier Elimination
4 Implementation and Results
5 Scope of the Proposed Method
6 Conclusion
References
Algorithmic Approach to Select MOOCs Platform: An Institutional Perspective
1 Introduction
2 Review Literature
3 Objectives
4 Identification of MOOCs Parameters
5 Algorithmic Approach of MOOCs Platform (Institute-Centric)
6 Conclusion
References
Decentralised Content Creation in Digital Learning: A Blockchain Concept
1 Introduction
2 Literature Review
3 Proposed Conceptual Framework and Method
4 The Setting
5 Conclusion
References
Data Security in Internet of Things
1 Introduction
2 Related Works
3 Proposed System
4 Encryption
5 Authentication Verification
6 Performance Evaluation
7 Conclusion
References
Forecasting of COVID-19 Using Hybrid ARIMA-FB Prophet Algorithm
1 Introduction
1.1 History of Coronavirus-19
Review of Forthcoming ICT-Enabled Applications Promoting Learning in Higher Education
1 Introduction
2 Background
3 Future Tools of ICT and E-learning
3.1 3D Printing
3.2 Augmented Reality
3.3 Virtual Reality (VR)
3.4 Hologram
3.5 Robot-Proof Education
4 Case Study
5 Conclusion
References
A Comprehensive Travel Recommendation System
1 Introduction
2 Related Works
3 Proposed Solution
4 Methodology
4.1 Data Collection Process
4.2 Data Pre-processing
4.3 Building the Recommendation System
4.4 Fetching Real-Time Data with Google APIs
4.5 The Itinerary Algorithm
5 Results
6 Conclusion
7 Future Work
References
Manufacturing Information Systems for Forestry Companies Based on Integrated Modular Approach «Many Companies—One Tool»
1 Introduction
2 Methodology for Designing MIS for Forestry Companies Based on an Integrated Modular Approach
2.1 Analysis of Software for Production Management at Forestry Companies
2.2 Choosing the Design Direction
2.3 Development of a Design Methodology for Mathematical Modeling of Business Processes
3 Results and Discussion
4 Conclusion
References
ICT-Based Enhancement of Employment Schemes: A Case Study in Rural Uttarakhand, India
1 Introduction
2 Study Area
3 Research Methodology
3.1 Participant Observation
3.2 Interviews
3.3 Personas and Scenarios
3.4 Secondary Data
4 Results
4.1 Results 1
4.2 Results 2
5 Discussion
6 Conclusion
References
Sustainable Technologies for Improved Income Generation: A Case Study of Women Villagers in Himachal Pradesh
1 Introduction
2 Study Area
3 Methodology
4 Resultsï»ż
4.1 Results I
4.2 Results II
5 Conclusion
References
Customer Behavioral Market Basket Approach for Most Frequent Pattern Identification Using Data Mining Techniques
1 Introduction
1.1 Mining Methods
2 Existing Architecture
3 Proposed Architecture
3.1 Data Pre-processing [3]
3.2 Distributed FP Growth
3.3 Voting Approach
4 Proposed Algorithm
5 Result
6 Implementation Tools and Technology
7 Conclusion
References
Breast Cancerous Tumor Detection Using Supervised Machine Learning Techniques
1 Introduction
1.1 Machine Learning Algorithms
2 Literature Review
3 Proposed Architecture
4 Proposed Algorithm
5 Dataset and Result
6 Implementation Tools and Technology
7 Conclusion
References
α-Method of Air Traffic Controllers’ Preference System Specification Over Typical Mistakes Severities
1 Introduction
2 State of the Art
3 Problem Statement
4 Development and Validation of α-Method of ATCS Consistent GPS Specification Over Typical Mistakes Severities
5 Conclusion
References
Named Entity Recognizer for Konkani Text
1 Introduction
2 Literature Survey
3 Building and Testing of NER for Konkani
3.1 Phase 1 of Konkani NER
3.2 Phase 2 of Konkani NER
4 Discussion
5 Conclusion
References
Secure Analysis of Disaster Area Using Satellite Imagery and Deep Learning
1 Introduction
2 Proposed Method
2.1 Neural Networks
3 Experimental Results
3.1 Preparation of Dataset
3.2 Training
3.3 Detecting Disaster-Affected Areas
3.4 Parameters
3.5 Results and Discussion
4 Conclusion
References
Bloom Filter in Cloud Storage for Efficient Data Membership Identification
1 Introduction
1.1 Cloud Computing
1.2 Cloud Computing Characteristics
1.3 Cloud Database Architecture
2 Literature Survey
3 Problem Formulation
4 Proposed Methodology
4.1 Data Storage Resource Organization in Cloud
4.2 A Mathematical Model
4.3 Bloom Filter to Detect Data Membership
4.4 Probability of False Positive in Bloom Filter
4.5 Preprocessing Methodology
5 Analysis and Remarks
6 Conclusion
References
On Combinatorial Handoff Strategies for Spectrum Mobility in Ad Hoc Networks: A Comparative Review
1 Introduction
2 Review of Handoff Methods and Their Categorization
2.1 Combinatorial Strategies Involving Multiple Strategies for Spectrum Mobility
3 Conclusion and Future Enhancements
References
A Deep Learning Approach to Extract Integrated Meaningful Keywords from Social Network Posts with Images, Texts and Hashtags
1 Introduction
2 Related Works
3 Meaningful Keywords Extraction Process of Social Network Post
3.1 Data Preprocessing
3.2 Model Training
3.3 Model Application to the Posted Contents
3.4 Extracted Consistent Keywords by Dijkstra’s Algorithm
4 An Illustrative Example
5 Conclusions
References
Enhanced Seagull Optimization Algorithm Adapted for Artificial Neural Network Training
1 Introduction
2 Related Work
3 Proposed Improved Seagull Optimization Algorithm
4 Experiments, Results, and Discussion
5 Conclusion
References
GAN-Based Two-Step Pipeline for Real-World Image Super-Resolution
1 Introduction
2 Related Works
3 Method
3.1 Overall Pipeline
3.2 Generator Architecture
3.3 Discriminator Architecture
3.4 Loss Functions
4 Experiments
4.1 Data
4.2 Training Details and Parameters
4.3 Results
5 Conclusion
References
76 A Rule-Based Approach for Marathi Part-of-Speech Tagging
Abstract
1 Introduction
1.1 Need of POS-Tagging in NLP
1.2 POS-Tagging
1.3 Rule-Based POS-Tagging
1.3.1 Rules for Generating Tag
1.4 Tag Set for the Marathi Language
2 Literature Survey
3 Database
4 Proposed System
4.1 Input Source Document
4.2 Preprocessing
4.3 Apply Shallow Parser
4.4 Assign Tag
4.5 Tag Generation
5 Results
6 Conclusion
Acknowledgements
References
Efficient PBFT: A Novel and Efficient Approach to the PBFT Consensus Algorithm
1 Introduction
2 Literature Survey
2.1 Outcomes of Literature Survey
3 Methodology
3.1 E-PBFT Supporting Functions
4 Mathematical Proof
5 Conclusion
References
Comparative Study of Handwritten Character Recognition System for Indian Languages
1 Introduction
2 Related Work on Handwritten Character Recognition in Popular Indian Languages
2.1 Character Recognition in Telugu
2.2 Character Recognition in Tamil
2.3 Character Recognition in Kannada
2.4 Character Recognition in Gujarati
3 Conclusion and Research Observation
References
An Innovative Approach for Cloud-Based Web Dev App Migration
1 Introduction
1.1 Migration Policy
2 Motivation
2.1 Stateless Application
3 System Implementations
4 Conclusion
References
An Innovative Approach for Remotely Monitoring and Tracking Heavy Motor Vehicles
1 Introduction
2 Literature Review
3 Proposed System
3.1 Reporter Module
3.2 Pusher Server Module
3.3 Subscriber Module
3.4 System Architecture
4 Implementation
5 Results and Discussion
6 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


ICT for Intelligent Systems: Proceedings
✍ Jyoti Choudrie (editor), Parikshit N. Mahalle (editor), Thinagaran Perumal (edit 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Seventh International Conference on Inf

Ubiquitous Intelligent Systems: Proceedi
✍ P. Karuppusamy (editor), Isidoros Perikos (editor), Fausto Pedro García Márquez 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book features a collection of high-quality, peer-reviewed papers presented at International Conference on Ubiquitous Intelligent Systems (ICUIS 2021) organized by Shree Venkateshwara Hi-Tech Engineering College, Tamil Nadu, India, during April 16–17, 2021. The book covers topics such a

IOT with Smart Systems: Proceedings of I
✍ Tomonobu Senjyu (editor), Parakshit Mahalle (editor), Thinagaran Perumal (editor 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fifth International Conference on Informat

ICT with Intelligent Applications: Proce
✍ Jyoti Choudrie, Parikshit Mahalle, Thinagaran Perumal, Amit Joshi 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Sixth International Conference on Informat

IOT with Smart Systems: Proceedings of I
✍ Jyoti Choudrie (editor), Parikshit Mahalle (editor), Thinagaran Perumal (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Sixth International Conference on Informat

Human Centred Intelligent Systems: Proce
✍ Alfred Zimmermann (editor), Robert J. Howlett (editor), Lakhmi C. Jain (editor), 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book highlights new trends and challenges in intelligent systems, which play an essential part in the digital transformation of many areas of science and practice. It includes papers offering a deeper understanding of the human-centred perspective on artificial intelligence, of intelligen