𝔖 Scriptorium
✩   LIBER   ✩

📁

ICT with Intelligent Applications: Proceedings of ICTIS 2022, Volume 1

✍ Scribed by Jyoti Choudrie, Parikshit Mahalle, Thinagaran Perumal, Amit Joshi


Publisher
Springer
Year
2022
Tongue
English
Leaves
827
Series
Smart Innovation, Systems and Technologies, 311
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Sixth International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2022), held in Ahmedabad, India. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.

✩ Table of Contents


Preface
Contents
About the Editors
1 Review of Different ML Techniques Used for Heart Disease Prediction
1.1 Introduction
1.2 Machine Learning Algorithms
1.2.1 Artificial Neural Network (ANN)
1.2.2 Decision Tree (DT)
1.2.3 Random Forest (RF)
1.2.4 Support Vector Machine (SVM)
1.2.5 K Nearest Neighbors (KNN)
1.2.6 Logistic Regression (LR)
1.3 Literature Review
1.4 Comparative Study of Literature Review
1.5 Conclusion
References
2 Image Enhancement by Various Segmentation Techniques Using Machine Learning
2.1 Introduction
2.2 Literature Studies
2.3 Various Segmentation Techniques
2.3.1 Image Thresholding
2.3.2 Morphological Operation
2.3.3 Region-Based and Edge-Based Detection
2.4 Analysis and Results of Various Segmentation Techniques
2.5 Conclusion
References
3 Sequence-to-Sequence Video Captioning System
3.1 Introduction
3.1.1 Literature Review
3.2 Our Approach
3.2.1 Modules
3.2.2 Working
3.3 Results
3.3.1 Input Videos
3.3.2 Output of Generated Captions
3.4 Conclusion
References
4 Stock Price Prediction Using Sentiment Analysis on News Headlines
4.1 Introduction
4.2 Literature Survey
4.3 Sentiment Analysis
4.3.1 Why Sentiment Analysis?
4.4 The Proposed Work
4.4.1 Valence Aware Dictionary and Sentiment Reasoner (VADER)
4.4.2 Data Gathering and Preprocessing
4.4.3 Long Short-Term Memory (LSTM)
4.4.4 Convolutional Neural Network (CNN)
4.5 Results and Discussion
4.6 Conclusion and Future Works
References
5 A Robust Framework for Governing Blockchain-Based Distributed Ledgers During COVID-19 for Academic Establishments
5.1 Introduction
5.2 Prevailing Distributed Ledgers Software and Devices
5.3 Proposed Monitoring Scheme for Distributed Ledgers Suggested Technique
5.4 Experimental Setup and Results Discussion
5.5 Conclusions
References
6 Cyber Security and Its Prediction with Cloud Data Computing and IoT
6.1 Introduction
6.2 Role of Data Science in Cyber Security to Pretend Cybercrime
6.2.1 Risks Factors with Cloud Computing
6.3 Short Range Natural Number (SRNN) Algorithm
6.3.1 Algorithm
6.4 Cloud Computing and IoT in Cyber Security to Pretend Cybercrime
6.4.1 The Incorporation of Cloud Computing into Security Systems
6.5 Conclusion and Future Work
References
7 A Review on Societal Application of Data Analytics
7.1 Introduction
7.2 Data and Data Analysis
7.3 Applications
7.3.1 Societal Application
7.3.2 Governance Application
7.3.3 Agriculture and Environmental Application
7.4 Conclusion
References
8 Study of Security in Cryptocurrency
8.1 Introduction
8.1.1 Our Contribution
8.1.2 Paper Organization
8.2 History of Cryptocurrency
8.3 Attack on Cryptocurrency
8.4 Challenges of Cryptocurrency
8.5 Analysis on Cryptocurrency
8.5.1 Charts of Comparative Analysis
8.6 Research Gaps
8.7 Conclusion
References
9 Study and Analysis of Network Steganography Methods
9.1 Introduction
9.1.1 Our Contribution
9.1.2 Paper Organization
9.2 Steganography Types
9.3 Network Steganography
9.3.1 Advantages
9.4 Classification of Network Steganographic Methods
9.5 Research Gaps
9.6 Future Work and Conclusion
References
10 Survey on Driver Fatigue Detection Using Sensors, Big Data Analytics and Machine Learning Techniques
10.1 Introduction
10.2 Sensors Used for Driver Fatigue Detection
10.2.1 Heartbeat Sensor
10.2.2 Eye Blink Sensor
10.2.3 Temperature Sensor LM-35
10.2.4 Pulse Oximeter Sensor
10.2.5 WFS Sweat Sensor
10.2.6 Alcohol Sensor MQ303A
10.3 Sensors Fixed on Car for Driver Safety
10.3.1 Steering Angle Sensor
10.3.2 Vehicle Speed Sensor
10.3.3 Radar Sensor
10.3.4 Curve Speed Sensor
10.3.5 Vision Sensor
10.4 Big Data Analytics
10.5 Lifecycle of Big Data Analytics
10.5.1 Acquisition and Preprocessing of Data
10.5.2 Processing of Data Using Big Data Analytics
10.6 Machine Learning Algorithms
10.6.1 SVM and Random Forest
10.7 Conclusion
References
11 On Characteristics of Îș–Q–Fuzzy Translation and Îș–Q–Multiplication in T-Ideal in T-Algebras
11.1 Introduction
11.2 Preliminaries
11.3 On Characteristics of Îș-Q-FTand Îș-Q-FM in T-Ideals
References
12 Blockchain-driven Smart Healthcare System: Challenges, Technologies and Future Research
12.1 Introduction
12.1.1 Importance of the Technology
12.1.2 Contributions of the Paper
12.2 Literature Review
12.3 Issues and Challenges of Smart Health Care
12.4 Generic Architecture of Blockchain-driven Smart Healthcare System
12.5 Related Technologies
12.5.1 3D Printing
12.5.2 Artificial Organs
12.5.3 Robotic Operations
12.5.4 Smart Healthcare Devices
12.5.5 Virtual Reality
12.5.6 Telehealth
12.6 Pragmatic Study
12.6.1 Estimation of Computational Time
12.6.2 Estimation of Transaction Per Second (TPS)
12.7 Conclusion and Future Research Directions
References
13 A Future to the Blockchain Technology and Its Concepts
13.1 Introduction
13.2 Survey
13.3 Bitcoin and Blockchain Technology
13.3.1 Corruption
13.3.2 Bitcoin—Weakness Funding
13.3.3 Analysis of Bitcoin
13.4 Blockchain Concepts and Work
13.5 The Smart Contract
13.5.1 Contract Fairness
13.6 Metaverse Blockchain Technology
13.7 Theoretical Analysis
13.8 Conclusion
References
14 Impacts of DDoS Attacks in Software-Defined Networks
14.1 Introduction
14.2 Architecture of SDN
14.2.1 Application Layer
14.2.2 Control Layer
14.2.3 Data Layer
14.3 Vulnerabilities in SDN
14.4 DDoS Attack Scenarios in SDN
14.5 Impacts of DDoS Attacks
14.6 Conclusion
References
15 IoT-Based Agriculture Trend Prediction Based on Weather Data
15.1 Introduction
15.2 Literature Review
15.3 Methodology
15.4 Result and Discussion
15.5 Conclusion
References
16 EEG in Optic Nerves Disorder Based on FSVM Using Kernel Membership Function
16.1 Introduction
16.2 Related Work
16.3 Proposed Work
16.4 Methodology
16.4.1 Fuzzy Set
16.4.2 Fuzzy Inference Algorithm
16.4.3 Fuzzy Classification
16.4.4 Original Membership Function in Feature Extraction
16.5 Classification and Regression
16.5.1 Support Vector Machine
16.5.2 Kernel Membership Function
16.6 Result Overview
16.7 Conclusion
References
17 DDoS Detection in ONOS SDN Controller Using Snort
17.1 Introduction
17.1.1 Open Network Operating System (ONOS)
17.1.2 Distributed Denial of Service (DDoS)
17.1.3 Snort
17.2 SDN Problems
17.2.1 Resolving On-demand Upgradation
17.2.2 Automation of Devices
17.2.3 Security
17.3 Results and Discussions
17.4 Conclusion and Future Scope
17.4.1 Future Scope
References
18 Classification of Keratoconus Using Corneal Topography Pattern with Transfer Learning Approach
18.1 Introduction
18.2 Related Work
18.3 Study Data and Methods
18.4 Discussion and Results
18.5 Analysis of Results
18.6 Conclusion and Future Work
References
19 Intelligent Heuristic Keyword-Based Search Methodologies Applied to Cryptographic Cloud Environment
19.1 Introduction
19.2 Literature Survey
19.2.1 Comparison of Searchable Encryption Techniques
19.2.2 Fuzzy and Aggregation-Based Keyword Search
19.2.3 Ranked and Verifiable Keyword Search
19.2.4 Algorithms Description
19.2.5 Comparison of Techniques
19.3 Conclusion
References
20 Surakhsha Kavach: ML-Based Cross-platform Application for COVID-19 Vulnerability Detection
20.1 Introduction
20.2 Literature Survey
20.3 Analysis
20.4 Existing System Architecture
20.5 Proposed System Architecture
20.6 Future Scope
20.7 Conclusion
References
21 Malware Family Categorization Using Genetic Algorithm-CNN-Based Image Classification Technique
21.1 Introduction
21.2 Literature Review
21.2.1 Traditional Malware Analysis
21.2.2 Malware Image Classification Using Machine Learning
21.3 Methodology and Experimentation
21.3.1 Dataset Description
21.3.2 Visual Representation of Malware File
21.3.3 Architecture of CNN
21.3.4 Implementation of Genetic Algorithm
21.4 Results and Comparison
21.5 Conclusion and Future Work
References
22 Master Data Management Maturity Evaluation: A Case Study in Educational Institute
22.1 Introduction
22.1.1 Data Model
22.1.2 Data Quality
22.1.3 Usage and Ownership
22.1.4 Data Protection
22.1.5 Maintenance
22.2 Literature Review
22.3 Research Methodology
22.3.1 Questionnaire
22.3.2 Data Collection
22.4 Case Study
22.4.1 Organization’s Profile
22.4.2 Results
22.5 Conclusion
References
23 Malware Family Classification Using Music Information Retrieval Techniques
23.1 Introduction
23.2 Literature Review
23.3 Methodology and Experimentation
23.3.1 Conversion of the Executable Bytes File into MIDI Files
23.3.2 Conversion of MIDI Signals to .Wav Files
23.3.3 Audio Feature Extraction
23.3.4 Building the Model
23.4 Results and Comparison
23.4.1 Description of Dataset
23.4.2 Results
23.5 Conclusion and Future Work
References
24 Text-Based Prediction of Heart Disease Doctor Chatbot Using Machine Learning
24.1 Introduction
24.2 Literature Survey
24.3 Proposed Methodology
24.4 Implementation
24.5 Results
24.6 Conclusion
References
25 Intelligent Proctoring System
25.1 Introduction
25.2 Related Work
25.3 Design
25.4 Implementation
25.4.1 Online Proctoring
25.4.2 Web App Features
25.4.3 Object Detection
25.4.4 Face Recognition
25.4.5 Head Pose Detection
25.5 Results
25.6 Conclusion and Future Enhancements
25.6.1 Conclusion
25.6.2 Future Enhancement
References
26 Project-Based Learning: A Contemporary Approach to Blend Theory and Practical Knowledge of Database Management Course
26.1 Introduction
26.2 Literature Review
26.3 Implementation Details
26.3.1 Junctures of Activity
26.4 Assessment
26.5 Conclusion
References
27 Comparative Study of CNN-Based Multi-Disease Detection Models Through X-Ray Images
27.1 Introduction
27.2 Dataset and Methods
27.2.1 Training, Validation and Testing
27.2.2 Convolutional Neural Network
27.2.3 Transfer Learning
27.2.4 Evaluation Standard
27.2.5 Experimental Setup
27.2.6 VGG16
27.2.7 VGG19
27.2.8 ResNet50
27.2.9 Xception
27.3 Experimental Result and Discussion
27.3.1 Training and Validation Accuracy
27.3.2 Training and Validation Loss
27.3.3 Confusion Matrix
27.3.4 F1-Score, Precision and Recall
27.4 Conclusion
References
28 Student’s Employability Concern for Colleges and Universities
28.1 Introduction
28.2 Historical Background
28.2.1 Big Data Analytics Tools, Methods, and Frameworks
28.2.2 Review of Educational Data Mining
28.2.3 Review of Clustering-Based EDM Techniques
28.2.4 Review of EDM Using Other Methods
28.3 Proposed Work
28.4 Conclusions
References
29 Clipped RBM and DBN Based Mechanism for Optimal Classification of Brain Cancer
29.1 Introduction
29.2 Related Work
29.3 Methodology
29.3.1 Introduction of Basic DBN
29.3.2 Clipped Restricted Boltzmann Machine (C-RBM)
29.4 Result
29.4.1 Dataset Information
29.4.2 Experimental Analysis
29.5 Conclusion
References
30 Air Quality Prediction Using Supervised Machine Learning Techniques
30.1 Introduction
30.2 Literature Review
30.3 Data and Methods
30.4 Results and Discussion
30.5 Conclusion and Future Directions
References
31 A Survey on Fire Detection-Based Features Extraction Using Deep Learning
31.1 Introduction
31.2 Related Work
31.3 Existing Methodologies
31.3.1 Sensors
31.3.2 Computer Vision-Based Systems
31.3.3 CCD Cameras
31.4 Motivation and Impact of Former Works
31.5 Conclusion
References
32 A Survey on Exploratory Mineral Data Analysis on Geological Location Using Deep Learning
32.1 Introduction
32.1.1 Geological Mapping
32.1.2 Soil Sampling
32.1.3 Stream Sediments
32.1.4 Drilling
32.1.5 Geophysical Methods
32.2 Related Works
32.3 Proposed Work
32.3.1 Support Vector Machine
32.3.2 Decision Tree
32.3.3 K-Nearest Neighbor
32.3.4 Recurrent Neural Network
32.4 Conclusion and Future Work
References
33 User’s Nostrum Spot for Consulting and Prescribing Through Online
33.1 Introduction
33.1.1 Existing System
33.1.2 Problems in Existing System
33.2 Related Works
33.3 Proposed Method
33.3.1 Client Interface Features
33.3.2 Admin Features
33.3.3 Booking Features
33.4 Conclusion
References
34 Decentralized Waste Management System: Smart Dustbin
34.1 Introduction
34.2 Related Work
34.3 Proposed System
34.3.1 Version 1
34.3.2 Version 2
34.4 Design Specifications
34.4.1 Client-Side
34.4.2 Server-Side—Version 1 Only
34.4.3 AWS-Side—Version 2 Only
34.4.4 Front-End Side
34.5 Methodology and Working
34.6 Implementation and Execution
34.6.1 Client-Side [15]
34.6.2 AWS Cloud Configuration
34.6.3 Front-End (Portal)
34.7 Conclusion
References
35 Ease of Doing Business: Approaching the Context
35.1 Introduction
35.2 Defining the Term “Ease of Doing Business”
35.3 Review of Literature
35.4 Conclusions
35.5 Researcher’s Observations in Indian Context
References
36 A Survey on Diagnosis of Hypoglycemia and Hyperglycemia Using Backpropagation Algorithm in Deep Learning
36.1 Introduction
36.2 Related Works
36.3 Proposed Work
36.3.1 Naive Bayes Algorithm
36.3.2 Decision Tree Algorithm
36.3.3 Support Vector Machine Algorithm
36.3.4 Deep Learning
36.4 Conclusion
References
37 A Novel Marathi Speech-Based Question and Answer Chatbot for the Educational Domain
Abstract
37.1 Introduction
37.2 Literature Review
37.3 Research Methodology
37.3.1 Recognition of Human Voice and Text Processing
37.3.2 Naive Bayes (NB) Classifier
37.4 Results and Discussions
37.5 Conclusion and Future Work
References
38 Color Feature Extraction-Based Near-Duplicate Video Retrieval
38.1 Introduction
38.2 Literature Review
38.3 Proposed Methodology
38.3.1 Feature Vector Extraction
38.3.2 Video Fingerprint Generation
38.4 Testing Phase
38.4.1 Testing Phase
38.4.2 Similarity Evaluation
38.4.3 Testing Results
38.4.4 Performance Evaluation
38.5 Conclusion and Future Work
References
39 LabVIEW Software for Design and Implementation of Particle Swarm Optimization Tuned Controller for the Climate Control of Greenhouse System
39.1 Introduction
39.2 Mathematical Modeling of GHS
39.2.1 Decoupler for the Nonlinear GHS
39.2.2 Particle Swarm Optimization (PSO) Tuned Controller
39.3 System Implementation
39.4 Simulation Results
39.4.1 Open-Loop Response
39.4.2 Closed-Loop Control Response
39.5 Conclusion
References
40 Cluster-Based Energy-Efficient Routing in Internet of Things
40.1 Introduction
40.2 Literature Survey
40.2.1 Grey Wolf Optimization Algorithm
40.2.2 The Artificial Bee Colony Algorithm
40.2.3 Ant Colony Optimization Algorithm
40.3 Network System Model
40.4 Proposed Method
40.5 Selection of Cluster Heads
40.6 Results and Discussion
40.7 Conclusion
References
41 Explainable AI for Sentiment Analysis
41.1 Introduction
41.1.1 What is XAI?
41.2 Literature Survey
41.3 Methodology
41.3.1 Model Used for Classification
41.3.2 Dataset
41.3.3 How is Sentiment Determined
41.3.4 Applying Visualization Tool to Our Model
41.3.5 Passing Multiple Keywords
41.4 Results and Discussion
41.4.1 Limitations
References
42 Deep CNN Model Embedded with Inception Layers for COVID-19 Classification
42.1 Introduction
42.2 Related Work
42.3 Methodology
42.3.1 Basic CNN Model
42.3.2 The Proposed CNN
42.4 Result
42.4.1 Dataset Information
42.4.2 Performance Analysis
42.5 Conclusion
References
43 Design and Execution of Cyberattacks Simulation for Practice-Oriented Experiential Learning
43.1 Introduction
43.2 Literature Review: Practice-Oriented Attack Simulation Testbed
43.2.1 Scope of the Exercise: Simulated Attack-Based Exercise
43.2.2 Theme of Attack Simulation
43.3 Problem Statement
43.4 Cyberattacks Simulation for Practice-Oriented Experiential Learning: Concept and Design
43.4.1 High-level Scenario Story
43.4.2 Testbed Details
43.4.3 Remote Access Trojan—Quasar RAT
43.4.4 Attack Methodology
43.4.5 Incident Analysis
43.4.6 Indicative Questions for Practice and Assessment Based on the Technical Incident Investigation
43.5 Conclusions and Future Work
References
44 Agricultural App Development Using Machine Learning and Deep Learning: A Review
44.1 Introduction
44.2 Literature Survey
44.3 Research Gap
44.4 Technology Used for Agricultural Mobile App Development
44.4.1 Machine Learning
44.4.2 Deep Learning
44.5 Proposed System
44.5.1 CNN Model for Plant Leaf Disease Detection
44.6 Conclusion
References
45 Performance Evaluation of Biharmonic Function-Based Image Inpainting Approach
45.1 Introduction
45.2 Image Inpainting Using Biharmonic Functions
45.3 Results and Discussion
45.3.1 Experimental Arrangement
45.3.2 Datasets
45.3.3 Experimental Outcomes
45.3.4 Performance Analysis
45.4 Conclusion
References
46 Automated Perpetrator Identification by Face Recognition
46.1 Introduction
46.2 Proposed Method
46.2.1 Face Detection
46.3 Experimental Results and Discussion
46.4 Conclusion
References
47 Age Estimation in Social Network Using Machine Learning Algorithm
47.1 Introduction
47.2 Related Work
47.3 Age Estimation Technique
47.3.1 Features Extraction
47.3.2 Age Classification
47.4 Conclusion
References
48 Low-Profile Elliptical Slot Antenna for Sub-6 GHz 5G and WLAN Applications
48.1 Introduction
48.2 Antenna Geometry
48.3 Parametric Study
48.4 Results and Discussions
48.5 Conclusion
References
49 A Survey of Computational Intelligence Techniques Used for Cyber-Attack Detection
49.1 Introduction
49.2 Cyber-Attack Detection Methods
49.2.1 ML-Based Cyber-Attack Detection
49.2.2 DL-Based Cyber-Attack Detection
49.2.3 RL-Based Cyber-Attack Detection
49.3 Comparative Analysis and Discussions
49.3.1 Benchmark Datasets
49.3.2 Performance Measures
49.3.3 Performance Comparison
49.3.4 Future Research Scope
49.4 Conclusions
References
50 A Technical Review on Machine Learning-Based Prediction on COVID-19 Diagnosis
50.1 Introduction
50.2 Machine Learning
50.3 Machine Learning Application for COVID-19 Classification, Screening, Prediction and Diagnosis
50.3.1 Support Vector Machine (SVM)
50.3.2 Random Forests
50.3.3 Decision Tree
50.3.4 Logistic Regression
50.4 Conclusion
References
51 A CNN-Based Neural Network for Tumor Detection Using Cellular Pathological Imaging for Lobular Carcinoma
51.1 Introduction
51.2 Related Work
51.3 Proposed Work
51.4 Feature Acquisitions
51.5 Machine Learning-Based Pattern Analysis
51.6 Experimental Results
51.7 Conclusion
References
52 A Survey on Identification of Grocery Store Items Using Deep Learning in Retail Store
52.1 Introduction
52.2 Benefits and Challenges
52.3 A Methods for Detecting Products
52.4 Comparison of Retail Product Detection Methods
52.5 Summary and Concluding Remarks
52.5.1 Characteristics of a Desirable Key System
52.5.2 Future Directions
References
53 Termino-ontology Resources of Endogenous Agro-Sylvo-Pastoral Practices for the Adaptation to Climate Change
53.1 Introduction
53.2 Notion of TOR and Its Role in the Ontology Construction Process
53.3 Termino-Ontology Resources of the Domain of Endogenous Agro-sylvo-pastoral Practices
53.3.1 Non-ontological Resources (NOR)
53.3.2 Ontological Resources (OR)
53.4 Synthesis and Analysis on the Art of ROT
53.5 Conclusion and Perspectives
References
54 Survey of Protocol-Based Approaches Using NS3 for Congestion Control
54.1 Introduction
54.1.1 TCP Congestion Control
54.2 TCP Tahoe
54.3 TCP Reno
54.4 TCP New Reno
54.5 TCP Vegas
54.5.1 Modified New Re-transmission Technique
54.5.2 Enhanced Congestion Avoidance
54.5.3 Modified Slow Start
54.6 TCP Sack
54.7 TCP Westwood
54.8 TCP Westwood+
54.9 Simulation
54.9.1 Network Topologies
54.9.2 Simulation Result—1
54.9.3 Simulation Result—2
54.9.4 Simulation Result—3
54.10 Conclusion
References
55 IOT-Based Smart Baby Cradle: A Review
55.1 Introduction
55.1.1 Embedded System
55.2 Related Works
55.3 Proposed System
55.3.1 Difference Between Existing System and Proposed System
55.4 Software Details
55.4.1 Arduino IDE
55.4.2 Proteus
55.5 Hardware Details
55.5.1 Arduino Uno
55.5.2 Power Supply Circuit
55.5.3 Temperature Sensor
55.5.4 Pressure Sensors
55.5.5 Gyro Sensor—ADXL335
55.5.6 Node MCU
55.5.7 Digital Display
55.5.8 Buzzer
55.5.9 DC Motor
55.6 Conclusion
References
56 Pressure Prediction System in Lung Circuit Using Deep Learning
56.1 Introduction
56.2 Related Works
56.3 Recommended Algorithm
56.3.1 Recurrent Neural Networks
56.3.2 Long Short-Term Memory Network
56.3.3 MLP Multilayer Perceptron
56.3.4 K-Fold Technique
56.4 Libraries
56.4.1 Pandas
56.4.2 NumPy
56.4.3 Data Visualization
56.4.4 Matplotlib
56.4.5 PyTorch
56.4.6 Scikit Learn
56.5 Conclusion
References
57 Twitter Sentiment Analysis Using Machine Learning and Deep Learning
57.1 Introduction
57.2 Literature Review
57.2.1 Contribution
57.3 Methodology
57.3.1 Dataset
57.3.2 Preprocessing
57.3.3 Sentiment Analysis
57.4 Result Analysis and Comparison
57.5 Conclusion
References
58 A Survey of Methods and Techniques in Offline Telugu Character Segmentation and Recognition
58.1 Introduction
58.2 Methodologies of Telugu CR Systems
58.2.1 Image Acquisition
58.2.2 Preprocessing
58.2.3 Segmentation
58.2.4 Feature Extraction Methods
58.2.5 Telugu Offline Character Recognition System
58.3 Challenges in Telugu Handwritten Character Segmentation and Recognition
58.4 Conclusion and Future Scope
References
59 A Machine Learning Approach in 5G User Prediction
59.1 Introduction
59.2 Methodology
59.2.1 Data Collection
59.2.2 Data Preprocessing
59.2.3 Building the Model
59.3 Data Representation
59.4 Performance Metric of the Model
59.5 Result
59.6 Conclusion
References
60 An Incremental Approach to Classify Healthcare URLs Using a Novel ‘Web Document Classification Model’
60.1 Introduction
60.2 Literature Survey
60.2.1 Document Classification Using Distance Measures
60.2.2 Incremental Learning for Document Classification
60.2.3 Sentimental Features for Document Classification
60.3 Methodology
60.3.1 Fetching of URLs
60.3.2 Sentimental Filter
60.3.3 Document Similarity Filter
60.3.4 Incremental Learning: Change Detection
60.4 Results and Discussion
60.4.1 Performance Matrix
60.4.2 Harvest Ratios
60.4.3 Analysis of Results for Incremental Learning
60.5 Conclusion and Future Enhancements
References
61 An Empirical Research on the Impact of Digital Marketing and Data Science on Indian Education System
61.1 Introduction
61.1.1 The Raise of Digital Marketing
61.2 Theoretical Background
61.2.1 Digital Marketing
61.2.2 Data Science
61.2.3 Data Science in Digital Marketing
61.3 Digital Marketing in Educational Sector
61.4 Research Methodology
61.5 Result and Discussion
61.6 Conclusion and Implications
References
62 A Text Classification Optimization Framework for Prodigious Datasets
62.1 Introduction
62.2 Related Works
62.3 Research Methodology
62.4 Text Classification
62.5 Research and Analysis
62.5.1 Experimental Setup [21]
62.5.2 Dataset Description
62.5.3 Evaluation Metrics [21]
62.5.4 Comparative Analysis
62.6 Conclusion
References
63 An Overview of Indian Language Datasets Used for Text Summarization
63.1 Introduction
63.2 TS Datasets and Resources in English
63.2.1 Datasets
63.3 TS Resources and Datasets in Indian Languages
63.3.1 IL Datasets
63.4 Observations
63.5 Conclusion
References
64 Scattering Wavelet Network-Based Iris Classification: An Approach to De-duplication
64.1 Introduction
64.2 Related Work
64.3 Databases Used for Classification
64.3.1 UPOL Database
64.3.2 Warsaw-BioBase-Smartphone-Iris Database
64.4 Scattering Wavelet Network
64.5 Iris Classification Using ScatNet
64.5.1 Iris Segmentation and Enhancement
64.5.2 Feature Vector Construction
64.6 Experimental Results
64.7 Conclusion
References
65 Portfolio Optimization Using Reinforcement Learning: A Study of Implementation of Learning to Optimize
65.1 Introduction
65.1.1 Related Works
65.2 Methodology of Using Reinforcement Learning
65.2.1 The Standard Agent-Environment Interface
65.2.2 Reinforcement Learning Formulation for Portfolio Optimization
65.3 Evaluation
65.3.1 Experimental Setup
65.4 Experimental Results
65.5 Discussion
65.5.1 Future Work
References
66 License Plate Detection Techniques: Conventional Methods to Deep Learning
66.1 Introduction
66.2 License Plate Detection Techniques
66.3 License Plate Detection Using YOLOv3
66.3.1 Datasets
66.3.2 YOLOv3
66.4 Results
66.5 Conclusion
References
67 Inverse Imaging: Reconstructing High-Resolution Images from Degraded Images
67.1 Introduction
67.2 Background
67.3 Model Architecture and Methods
67.4 Training
67.4.1 Working on Data Sets and Creating Labels
67.4.2 Optimizer
67.5 Results and Discussions
67.6 Conclusion
References
68 Cognitive Baby Care Solution for Smart Parenting
68.1 Introduction
68.2 Literature Survey
68.3 Design
68.4 Implementation
68.5 Results
68.6 Conclusion
68.7 Future Work
References
69 Present NLP Status for Dogri Language
69.1 Introduction
69.2 Dogri Language
69.2.1 Facts of Dogri Language
69.3 NLP Status of Dogri
69.3.1 Corpus Resources
69.3.2 Digital Resources
69.4 Literature Survey of NLP Tasks in Dogri
69.4.1 Machine Translation
69.4.2 Morphological Analysis
69.4.3 NER
69.4.4 PoS Tagging
69.4.5 Stemming
69.4.6 Summarization
69.4.7 Stop Word Generation/Removal
69.4.8 Other Works
69.5 Challenges of Dogri
69.6 Conclusion and Future Work
References
70 Multi-objective and Seagull Optimization Enabled Traffic Signal Controlling for Traffic Management in Cities
70.1 Introduction
70.2 Motivation
70.2.1 Literature Survey
70.2.2 Challenges
70.3 Proposed Method for Traffic Signal Control in the Urban Areas
70.3.1 Smart City Map
70.3.2 Map Segmentation and Significant Route Discovery
70.3.3 Network Simulation for Information Extraction
70.3.4 Traffic Signal Controlling
70.4 Result and Discussion
70.4.1 Analysis of the Proposed Method
70.5 Conclusion
References
71 Design of Smart Spectacle in 5G-IoT Environment to Detect and Prevent Corona Virus Variants
71.1 Introduction
71.2 Methodology
71.3 Result and Analysis
71.4 Conclusion
References
72 Telecommunication's Customer Experience Prediction Using Hybrid Machine Learning Model
72.1 Introduction
72.2 Literature Review
72.3 Methodology
72.3.1 Data Collection
72.3.2 Feature Selection
72.4 Model Selection
72.5 Result Analysis
72.6 Conclusion
References
73 An Analysis on Predicting Social Media Ads Using Kernel SVM Function
73.1 Introduction
73.2 Literature Survey
73.3 Datasets Used
73.4 Methodology
73.4.1 Polynomial Type Kernel SVM
73.4.2 Radial Type Kernel SVM
73.4.3 Linear Type Kernel SVM
73.4.4 Sigmoid Type Kernel SVM
73.5 Observation
73.6 Result
73.7 Conclusion
References
74 COVID-19 Triggers a Paradigm Shift in Technology for Insurance Industry
74.1 Current ‘Global Insurance Stance’
74.2 Emerging Trends Reshaping the Insurance Industry
74.3 Discussion
74.4 Conclusion
References
75 Internet of Things in Saudi Arabia Universities: State of the Art, Future Opportunities, and Open Challenges
75.1 Introduction
75.2 Literature Review
75.2.1 IoT in Education and Universities
75.2.2 Applications of IoT in Universities and Other Education Institutions
75.2.3 IoT Impact, Challenges, and Opportunities in Universities and Other Education Institutions
75.3 Research Method
75.4 Research Results
75.5 Result Discussion
75.6 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


ICT with Intelligent Applications: Proce
✍ Tomonobu Senjyu (editor), Parikshit N. Mahalle (editor), Thinagaran Perumal (edi 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fifth International Conference on Informat

ICT with Intelligent Applications: ICTIS
✍ Jyoti Choudrie (editor), Parikshit N. Mahalle (editor), Thinagaran Perumal (edit 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis. It presents the outcomes of the Seventh International Conference on In

Intelligent Systems and Applications: Pr
✍ Kohei Arai, Supriya Kapoor, Rahul Bhatia 📂 Library 📅 2021 🏛 Springer International Publishing;Springer 🌐 English

<p><p></p><p>The book Intelligent Systems and Applications - Proceedings of the 2020 Intelligent Systems Conference is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The Confer

Intelligent Systems and Applications: Pr
✍ Kohei Arai, Supriya Kapoor, Rahul Bhatia 📂 Library 📅 2021 🏛 Springer International Publishing;Springer 🌐 English

<p><p></p><p>The book Intelligent Systems and Applications - Proceedings of the 2020 Intelligent Systems Conference is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The Confer

Intelligent Systems and Applications: Pr
✍ Kohei Arai, Supriya Kapoor, Rahul Bhatia 📂 Library 📅 2021 🏛 Springer International Publishing;Springer 🌐 English

<p><p>The book Intelligent Systems and Applications - Proceedings of the 2020 Intelligent Systems Conference is a remarkable collection of chapters covering a wider range of topics in areas of intelligent systems and artificial intelligence and their applications to the real world. The Conference at

Intelligent Systems and Applications: Pr
✍ Kohei Arai, Supriya Kapoor, Rahul Bhatia 📂 Library 📅 2019 🏛 Springer International Publishing 🌐 English

<p>Gathering the Proceedings of the 2018 Intelligent Systems Conference (IntelliSys 2018), this book offers a remarkable collection of chapters covering a wide range of topics in intelligent systems and computing, and their real-world applications. The Conference attracted a total of 568 submissions