<p><span>This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented a
Innovative Data Communication Technologies and Application: ICIDCA 2019 (Lecture Notes on Data Engineering and Communications Technologies, 46)
โ Scribed by Jennifer S. Raj (editor), Abul Bashar (editor), S. R. Jino Ramson (editor)
- Publisher
- Springer
- Year
- 2020
- Tongue
- English
- Leaves
- 852
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book presents emerging concepts in data mining, big data analysis, communication, and networking technologies, and discusses the state-of-the-art in data engineering practices to tackle massive data distributions in smart networked environments. It also provides insights into potential data distribution challenges in ubiquitous data-driven networks, highlighting research on the theoretical and systematic framework for analyzing, testing and designing intelligent data analysis models for evolving communication frameworks.
Further, the book showcases the latest developments in wireless sensor networks, cloud computing, mobile network, autonomous systems, cryptography, automation, and other communication and networking technologies. In addition, it addresses data security, privacy and trust, wireless networks, data classification, data prediction, performance analysis, data validation and verification models, machine learning, sentiment analysis, and various data analysis techniques.
โฆ Table of Contents
Foreword
Preface
Acknowledgments
Contents
A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
1 Introduction
1.1 Related Works
2 Technical Details
2.1 Elliptic Curve Cryptography (ECC)
2.2 Bilinear Pairing
2.3 Identity-Based Encryption (IBE)
2.4 Computational Problems
3 Proposed ID-3PAKA Protocol
3.1 Setup Phase
3.2 Key Extraction Phase
3.3 Key Agreement Phase
4 Security Analysis
5 Conclusion
References
Machine Learning Based Stock Market Analysis: A Short Survey
1 Introduction
1.1 Traditional Approach for Stock Market Prediction
1.2 Role of Machine Learning in Stock Market Prediction
1.3 Organization
2 Related Work
2.1 Predictive Approach
2.2 Sentiment Analysis
2.3 Hybrid Approach
3 Discussion
4 Conclusion
5 Future Direction
References
Macroscopic Characterization of Grating Coupled Waveguide Structures for Optical Notch Filtering
1 Introduction
2 Analysis and Structure Model
2.1 Transmission Mode Grating Coupled Waveguide
2.2 Chirped Grating Design Analysis
3 Design Methodology
4 Results and Discussion
4.1 Improved Filter Design Using Chirped Grating Waveguide Structure
5 Conclusion
References
Design and Development for Image Transmission Through Low Powered Wireless Networks Using Color Space Conversion Module
Abstract
1 Introduction
2 Methodology
2.1 Design and Implementation of a Color Space Conversion Module Algorithm
2.2 Design and Development of Hardware Module to Transfer Color Image Using Low Powered Wireless Networks
2.3 Parameters for Measurement
2.4 Hardware Requirements
2.5 Hardware Implementation
3 Results
3.1 Received Colour Image
3.2 Graphs
4 Conclusion and Future Enhancement
Compliance with Ethical Standards
References
Classification and Comparison of Cloud Renderfarm Services for Recommender Systems
Abstract
1 Introduction
2 Classification of Cloud Renderfarm Services
2.1 Functional Characteristics of Cloud Renderfarm Services (Fn)
2.2 Non Functional Components of Classification (NF1โNF4)
3 Cost Characteristics of Cloud Renderfarm Services (Cn)
4 Taxonomical Analysis and Comparison of 11 Cloud Renderfarm Services
5 Related Works
6 Conclusion and Future Work
References
Smart Medicine Distributing Tray
Abstract
1 Introduction
2 Objectives
3 Hardware Requirements
4 Software Requirements
5 System Design
6 Figures and Tables
6.1 Servo Motor Connections to ATMega 2560
6.2 IR Sensors Connections to ATMega 2560
6.3 ATMega 2560 to NodeMCU
6.4 Smart Medicine Tray
7 Observations and Results
7.1 Individual Card: (In this Case Box 1)
7.2 Master Card
7.3 Results on Internet of Things Platform-ThingSpeak
8 Conclusion
9 Future Scope
References
Potential Customer Classification in Customer Relationship Management Using Fuzzy Logic
Abstract
1 Introduction
2 Methodology
2.1 Time Taken by the Lead to Respond to the Email
2.2 Companyโs Response to Leadโs Response
2.3 For How Much Time the Lead Communicates with the Company
2.4 Buyerโs Alignment
2.5 Fuzzy System
3 Implementation
3.1 Antecedents (Inputs to the Problem)
3.1.1 Response to Email
3.1.2 Company Response
3.1.3 Contact Time Spent
3.1.4 Buyer Alignment
3.2 Consequent (Output)
3.2.1 Lead
3.3 Rules
4 Output and Result
5 Conclusion
References
Classification of Sentiment Analysis Using Machine Learning
Abstract
1 Introduction
1.1 Sentiment Analysis
1.2 Various Faces of Sentiment Analysis
1.2.1 Data Extraction
1.2.2 Data Pre-processing
1.2.3 Feature Extraction
1.2.4 Sentiment Classification
2 Methodology
2.1 SVM Classifier for Sentiment Analysis
2.2 KNN Classifier for Sentiment Analysis
3 Literature Review
4 Result and Discussion
5 Conclusion
References
Gauging Trowel Shaped Patch Including an Optimized Slot for 60ย GHz WLAN
Abstract
1 Introduction
2 Antenna Design with Specific Design Parameters
3 Outcomes from the Simulation
3.1 Resonant Frequency, Return Loss and Standing Wave Ratio
3.2 Antenna Gain and Directivity
3.3 Surface Charge Distribution on the Patch with Metal Boundary and 3D Gain Pattern
4 Conclusion
References
Reliable Machine to Machine Communication Using MQTT Protocol and Mean Stack
Abstract
1 Introduction
2 Methodology
3 System Layout
4 Simulation and Results
5 Hardware Requirements
5.1 Flowchart
5.2 Requirements and Their Usage
5.2.1 DHT-11
5.2.2 Node MCU
5.2.3 Raspberry Pi 3b+
6 Software Requirements
6.1 Raspbian OS
6.2 Eclipse Mosquitto
6.3 MongoDB
7 Conclusion
Acknowledgement
References
Lane Keep Assist System for an Autonomous Vehicle Using Support Vector Machine Learning Algorithm
Abstract
1 Introduction
2 Principle of Lane Keep Assist (LKA) System
3 Proposed Support Vector Machine (SVM) for Images Classification
4 Implementation of SVM in Matlab/Simulink Platform
5 Results and Discussion
6 Conclusion
References
An Automated System for Crime Investigation Using Conventional and Machine Learning Approach
Abstract
1 Introduction
2 Proposed System
2.1 System Components
3 System Implementation
3.1 Aho Cosick Algorithm
3.2 Midpoint Circle Algorithm
3.3 Source AFIS Algorithm
3.4 DBSCAN Algorithm
4 Performance Evaluation
5 Conclusion and Future Work
References
Adaptive Neuro Fuzzy Inference System Based Obstacle Avoidance System for Autonomous Vehicle
Abstract
1 Introduction
2 Principle of Obstacle Avoidance System with ANFIS Controller
3 Proposed ANFIS Algorithm with Obstacle Avoidance System and Results
4 Conclusion
References
Evaluating the Performance of Machine Learning Techniques for Cancer Detection and Diagnosis
Abstract
1 Introduction
2 Literature Review
3 Comparing the ML Algorithms for Oncology Applications
4 Discussion
5 Conclusion
References
Design of Slotted Microstrip Patch Antenna for 5G Communications
Abstract
1 Introduction
2 Literature Survey
3 Design
4 Working Principle
5 Schematics
6 Results
7 Conclusions
References
Fourier Descriptors Based Hand Gesture Recognition Using Neural Networks
Abstract
1 Introduction
2 Literature Review
3 Process and Approach
3.1 Structure of Work
3.2 Preprocessing and Feature Extraction
3.3 Building and Training the Neural Network
3.4 Testing the Neural Network
4 Results
5 Conclusion and Future Scope
References
Improved Feature Based Sentiment Analysis for Online Customer Reviews
Abstract
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Experimental Results and Discussions
5 Conclusion
References
Performance Analysis of Automated Detection of Diabetic Retinopathy Using Machine Learning and Deep Learning Techniques
1 Introduction
2 Methodology
3 Machine Learning
3.1 Preprocessing
3.2 Feature Extraction
3.3 Classification Algorithms: SVM and RF
4 Deep Learning: AlexNet, VGG16 and LSTM
4.1 AlexNet
4.2 VGG16
4.3 LSTM
5 Performance Evaluation of Deep and Machine Learning Algorithms
6 Result and Discussion
7 Conclusion and Future Work
References
Mobility in Wireless Sensor Networks
Abstract
1 Introduction
2 Literature Survey
3 Conclusion
References
Distributed Auction Mechanism for Dynamic Spectrum Allocation in Cognitive Radio Networks
Abstract
1 Introduction
2 System Model
3 VCG Mechanism
3.1 The Second Price Auction Mechanism
4 Proposed Auction Based Game Theory
4.1 Algorithmic Evaluation of the Proposed Mechanism
5 Simulation Results
6 Conclusion and Future Work
References
Efficient Abandoned Luggage Detection in Complex Surveillance Videos
Abstract
1 Introduction
2 Related Research
3 Proposed Method
3.1 Static Object Detection
3.2 Luggage Recognition
4 Results and Discussions
5 Conclusion
Compliance with Ethical Standards
References
Energy Reduction Stratagem in Smart Homes Using Association Rule Mining
Abstract
1 Introduction
2 Background Investigation
2.1 Proposed Work
2.2 Methodology
2.2.1 Pattern Mining Methodology
2.2.2 Data Analysis
2.2.3 Definition and Identification of Patterns
2.2.4 Identification in Relevant Types of Behavior Patterns
2.3 Algorithm Description of Proposed Work
2.3.1 Association Rule Mining
2.4 Result and Discussion
2.5 Conclusion and Future Trends
Acknowledgment
References
Analysis of Growth and Planning of Urbanization and Correlated Changes in Natural Resources
Abstract
1 Introduction
2 Literature Review
3 Proposed System
3.1 Dataset
3.2 Exploring Landsat Bands
3.3 Models and Algorithms Used
4 Results and Conclusions
5 Conclusions
6 Future Enhancements
References
Design of Near Optimal Convolutional Neural Network Based Crowd Density Classifier
Abstract
1 Introduction
2 Related Work
2.1 Detection Based Approach
2.2 Regression Based Approach
2.3 Density Estimation Based Approach
2.4 CNN Based Approach
3 Implementation of Crowd Density Classifier
3.1 The Designed CNN Architecture
3.2 System Block Diagram
3.3 Preprocessing
3.4 Data Augmentation
4 Experiments and Results
4.1 Dataset
4.2 Experimental Analysis for Single Layer and Two Layer Architecture
4.2.1 Single Layer Architecture
4.2.2 Two-Layer Architecture
5 Conclusion and Future Scope
References
Face Swapping Using Modified Dlib Image Morphology
Abstract
1 Introduction
2 Related Work
3 Implementation of Proposed Technique
3.1 Block Diagram
3.2 Methodology
3.3 Delaunay Triangulation on Images
3.4 Morphing Sequence
4 Experiments and Results
4.1 Dataset
4.2 Face Swapping Using Image Morphing
4.3 Structural Similarity Index (SSI)
5 Conclusion and Futurescope
References
Regular Language Search over Encrypted Cloud Data Using Token Generation: A Review Paper
Abstract
1 Introduction
2 Literature Survey
2.1 Data Security on Cloud
2.2 Searchable Encryption Techniques
2.3 Keyword Searching Techniques
3 Proposed Method: Regular Language Search over Encrypted Cloud Data Using Token Generation
4 Conclusion
References
Modeling and Evaluation of Performance Characteristics of Redundant Parallel Planar Manipulator
Abstract
1 Introduction
2 Conclusion
References
Public Auditing Scheme for Cloud Data Integrity Verification
Abstract
1 Introduction
2 Literature Survey on Data Integrity Techniques
2.1 Survey on PDP Schemes
2.2 Survey on POR Schemes
3 Proposed System
3.1 Providing Data Confidentiality
3.2 Achieving Data Integrity
4 Results and Discussions
5 Conclusion
References
Implementation of Words and Characters Segmentation of Gujarati Script Using MATLAB
Abstract
1 Introduction
2 Literature Survey
3 Proposed Algorithm
4 Experimental Result
5 Conclusion
Compliance with Ethical Standards
References
Total Interpretive Structural Modelling: Evolution and Applications
Abstract
1 Introduction
2 TISM and Its Evolution
3 Steps Involved in TISM
4 Conclusion
Compliance with Ethical Standards
References
Machine Learning Techniques: A Survey
Abstract
1 Introduction
2 Supervised Learning Technique
2.1 Logic Based Supervised Learning
2.2 Perceptron Based Supervised Learning
3 Unsupervised Learning
3.1 Dimension Reduction Is the Process of Reducing the Number of Random Variables Under Consideration
3.2 Dimension Estimation
4 Semi-supervised Learning
5 Reinforcement Learning
6 Conclusion
References
Lexicon-Based Text Analysis for Twitter and Quora
Abstract
1 Introduction
2 Related Work
3 Proposed Model
3.1 Data Extraction
3.2 Pre-processing
3.3 Proposed Algorithm
4 Experimental Results
5 Conclusion
6 Future Scope
References
Subspace Based Face Recognition: A Literature Survey
Abstract
1 Introduction
2 Principal Component Analysis
2.1 Mathematical Formulation of PCA
3 Algorithms
3.1 Table Summary
4 Result
5 Summary and Conclusions
References
Medical Image Fusion Using Otsuโs Cluster Based Thresholding Relation
Abstract
1 Introduction
2 Otsuโ Cluster Based Thresholding Relation with Fuzzy Rules (OCBT)
3 Results
3.1 Performance Metrics
3.2 Validation of Modified IF Method Using Otsuโs Cluster Based Thresholding with Fuzzy Rules
3.2.1 Visual Results
3.2.2 Performance Evaluation
4 Discussion
5 Conclusion
References
Weather Prediction Model Using Random Forest Algorithm and GIS Data Model
Abstract
1 Introduction
2 Related Literature
3 Proposed Technique
4 Analysis of Experimental Outputs
5 Conclusion
References
Quantum One Time Password with Biometrics
Abstract
1 Introduction
2 Background and Related Work
2.1 Background
2.2 Related Work
2.3 Motivation
3 Preliminaries and Notations
3.1 Quantum Computing
3.2 Quantum Entanglement
3.3 Notations
4 Proposed RIQ Model
4.1 RIQ Model
4.2 Steps for Proposed RIQ Model
5 Conclusion and Future Work
Acknowledgements
References
Hopfield Network Based Approximation Engine for NP Complete Problems
Abstract
1 Introduction
2 Related Work
3 Proposed System
4 Experimental Results
5 Conclusion
References
The Evolution of Cloud Computing and Its Contribution with Big Data Analytics
Abstract
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Conclusion
References
Robust Methods Using Graph and PCA for Detection of Anomalies in Medical Records
Abstract
1 Introduction
2 Related Work
3 Methods and Techniques
4 Experimental Setup
4.1 Data Modelling and Pre-processing
5 Results and Discussion
6 Conclusion
References
Prediction of Cardiac Ailments in Diabetic Patient Using Ensemble Learning Model
Abstract
1 Introduction
2 Literature Survey
3 Problem Statement
4 Solution Methodology
5 Conclusion
References
Emotion Recognition of Facial Expression Using Convolutional Neural Network
Abstract
1 Introduction
2 Proposed Approach
3 Face Detection
3.1 Convolutional Neural Network
4 Experiment and Result
4.1 Result
5 Conclusion
References
Information Security Through Encrypted Domain Data Hiding
Abstract
1 Introduction
2 Proposed Methodology
2.1 Phase I
2.1.1 Table Construction
2.1.2 Diffusion
2.1.3 Decryption
2.2 Phase II: Data Hiding Algorithm
3 Performance Analysis
3.1 Histogram Analysis
3.2 NPCR Analysis and UACI Analysis
4 Conclusion
References
Person Re-identification from Videos Using Facial Features
Abstract
1 Introduction
2 Related Work
2.1 Limitations
3 Methodology
3.1 Histogram of Oriented Gradients (HOG)
3.2 Convolutional Neural Network (CNN)
3.2.1 FaceNet Model Structure
3.3 Flowchart
4 Results
5 Conclusion
References
Analysing Timer Based Opportunistic Routing Using Transition Cost Matrix
Abstract
1 Introduction
2 Related Work
3 Implementation of Proposed Technique
3.1 System Model
3.2 Cost Calculation Method
3.3 Defining Transition Cost Matrix
4 Results
5 Conclusion and Future Scope
References
Survey of Load Balancing Algorithms in Cloud Environment Using Advanced Proficiency
Abstract
1 Introduction
2 Corresponding Works
3 Realization Estimate
4 Conclusion
References
Comparative Study on SVD, DCT and Fuzzy Logic of NOAA Satellite Data to Detect Convective Clouds
Abstract
1 Introduction
2 Methods Used
2.1 Methodology of SVD Applied to AVHRR NOAA Data
2.2 Methodology of DCT Applied to AVHRR NOAA Data
2.3 Methodology of Fuzzy Logic Applied to AVHRR NOAA Data
2.4 Accuracy Measurements
2.4.1 Confusion Matrix
3 Comparative Results
4 Conclusion
Acknowledgements
References
Question Classification for Health Care Domain Using Rule Based Approach
Abstract
1 Introduction
2 Literature Survey
3 Architecture of Question Classification for Health Care System
4 The Taxonomy of Question Type
5 Methodology
6 Flowchart for the Proposed Question Classification for Health Care System
7 Evaluation and Result
8 Conclusion
References
A Conjoint Edifice for QOS and QOE Through Video Transmission at Wireless Multimedia Sensor Networks
Abstract
1 Introduction
2 Related Work
2.1 Quality of Service
2.2 Experiencing Quality
3 System for Streaming
3.1 Model for Video Encoding
3.2 Model for Streaming Video
3.3 Network Impairment Model
3.4 Problem Description
4 Streaming of Video and Framework Based on Error Concealment
5 Experฤฑmental Setup and Evaluatฤฑng the Performance
6 Conclusion
References
Analysis of Temperature Prediction Using Random Forest and Facebook Prophet Algorithms
Abstract
1 Introduction
2 Related Works
3 Prediction Algorithm
4 Methods and Data
4.1 Dataset
4.2 Methodology
4.2.1 Prediction Using Random Forests
4.2.2 Prediction Using Facebook Prophet
5 Results and Discussions
References
Wireless Monitoring and Control of Deep Mining Environment Using Thingspeak and XBee
Abstract
1 Introduction
1.1 Safety Procedures
2 Experimental Analysis
2.1 Moisture Sensors
2.2 Thingspeak
2.3 XBee for Data Transfer
2.4 X-CTU Software
3 Result
References
Assistive Device for Neurodegenerative Disease Patients Using IoT
Abstract
1 Introduction
2 Related Works
3 Hardware
3.1 MPU-6050
3.2 Arduino UNO
3.3 Servo Motors
4 Proposed Prototype
5 Results and Discussion
6 Conclusion and Future Work
References
Ablation of Artificial Neural Networks
Abstract
1 Introduction
2 Related Work
3 Methods for Ablation
4 Results
5 Conclusion
6 Future Work
References
Precedency with Round Robin Technique for Loadbalancing in Cloud Computing
Abstract
1 Introduction
2 Problem and Objective
2.1 Research Problem
2.2 Objectives of Study
3 Research Methodology
3.1 Benefits of Proposed Algorithm
3.2 Proposed Framework
3.3 Proposed Algorithm of Load Balancing Mechanism
4 Simulation and Result
4.1 Implementations on CloudAnalyst
4.1.1 Round Robin and Precedency Based Scheduling Algorithm Configuration
5 Results After Simulation
5.1 Resource CPU Usage
5.2 Resource Memory Usage
5.3 Standard Performance Time
5.4 Throughput
5.5 Link Communication and Response Rate
5.6 Source Consumption Rate
5.7 Scheduling Achievement Rate (SSR)
6 Conclusion and Future Scope
6.1 Conclusion
6.2 Future Scope
References
Stock Market Prediction Using Hybrid Approach
Abstract
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Model A
3.2 Model B
4 Hybrid Model
5 Dataset
6 Result
7 Conclusions
References
Energy-Efficient Routing Based Distributed Cluster for Wireless Sensor Network
Abstract
1 Introduction
2 Literature Review
3 Proposed System
3.1 Proposed Plan: Efficient Distributed Cluster Head Booking Calculation
3.2 The Productive Circulated Group Head Planning Calculation
3.3 ExternalCluster Communications Phase
3.4 Data Cluster Communication Phase
3.5 InternalCluster Communication Phase
4 Result
5 Conclusion
References
Autonomous Home-Security System Using Internet of Things and Machine Learning
Abstract
1 Introduction
2 Literature Review
3 Proposed System
4 Proposed Architecture
5 Implementation
6 Conclusion
7 Future Scope
Compliance with Ethical Standards
References
Automatic Skin Disease Detection Using Modified Level Set and Dragonfly Based Neural Network
Abstract
1 Introduction
2 Literature Review
3 Proposed Optimal ANN for Skin Disease Detection
3.1 Level Set Segmentation that is Modified
3.2 Feature Extraction Using Color, Shape, and Texture
3.2.1 Color Histogram Based Extraction
3.2.2 Shape-Based Edge Extraction
3.2.3 LBP Based Texture Extraction
3.3 Classification Using Artificial Neural Network (ANN)
3.3.1 Network Weight Optimization by Levy Flight-Based Dragon Fly Optimization Algorithm
4 Results and Discussion
4.1 Segmentation Performance
4.2 Classification Performance
5 Conclusion
Compliance with Ethical Standards
References
Service-Oriented Middleware for Service Handling in Cloud-Based IoT Services
Abstract
1 Introduction
2 Related Work
3 IoT Cloud System Architecture
3.1 Cloud-Based IoT Services
3.2 Service-Oriented Middleware
3.3 Service Aggregation Process
4 Load Balancing
4.1 Performance Evaluation
5 Conclusions and Future Work
References
Intelligent Educational System for Autistic Children Using Augmented Reality and Machine Learning
Abstract
1 Introduction
2 Design
2.1 Flowchart
2.2 3D Design
3 Methodology
3.1 Phase 1
3.2 Phase 2
3.3 Phase 3
3.4 Phase 4
4 Implementation
5 Testing
6 Result Analysis
7 Conclusion
Acknowledgment
References
Selective Segmentation of Piecewise Homogeneous Regions
Abstract
1 Introduction
2 Segmentation Models
2.1 CV Model [6]
2.2 Badshah-Chen Model
3 Proposed Model
4 Experimental Results
5 Conclusion
Acknowledgment
References
Blockchain Technology in Healthcare Domain: Applications and Challenges
Abstract
1 Introduction
2 Blockchain Overview and Blockchain Types
2.1 Blockchain Overview
2.2 Blockchain Types
3 Blockchain in Healthcare Industry
3.1 Blockchain in Healthcare Applications
3.2 Advantages of Blockchain in Healthcare Applications [9]
4 Challenges in Blockchain for Healthcare
5 Conclusion
References
Comparison on Carrier Frequency Offset Estimation in Multi Band Orthogonal Frequency Division Multiplexing (OFDM) System
Abstract
1 Introduction
2 Carrier Frequency Offsets
2.1 Effects of Carrier Frequency Offset on OFDM
3 CFO Estimation Techniques
3.1 CFO Estimation Method Using Cyclic Prefix (CP)
3.2 CFO Estimation Method Using Training Sequence
3.3 Frequency-Domain Estimation Methods for CFO
3.3.1 CFO Estimation Technique Using Training Symbol Method
3.3.2 CFO Estimation Method Using Pilot Method
4 Simulation Results
5 Conclusions
References
A Reliable Method for Detection of Compromised Controller in Software Defined Networks
Abstract
1 Introduction
1.1 SDN Controller
2 Detection Strategy and Architecture
3 Simulation SetUp
4 Evaluation
5 Conclusion
References
Alphabet Classification of Indian Sign Language with Deep Learning
Abstract
1 Introduction
2 Alphabet Signs Sample Database
3 Deep Learning Approach
4 Outcome of CNN Model Approach
5 Conclusion
Compliance with Ethical Standards
References
Impact on Security Using Fusion of Algorithms
Abstract
1 Introduction
1.1 RSA
1.1.1 Key Generation in T-RSA
1.1.2 Playfair
2 Literature Survey
3 Proposed Work
3.1 Example
4 Simulation Work
5 Conclusion
References
Smart Stick for Blind
Abstract
1 Introduction
2 Related Work
3 System Description
3.1 Ultrasonic Sensor
3.2 LDR Sensor
3.3 GPS+GSM Module
3.4 Xbee S2c
4 Functional Description
4.1 Ultrasonic System
4.2 LDR System
4.3 Gps+Gsm
4.4 Remote System
4.5 Microcontrollers
5 Result
6 Conclusion and Discussion
Acknowledgement
References
A Neural Network Based Approach for Operating System
Abstract
1 Introduction
2 Related Work
3 Method
4 Conclusion
References
Randomness Analysis of YUGAM-128 Using Diehard Test Suite
Abstract
1 Introduction
2 General Theory of the CA
3 Stream Cipher
4 Algorithmic Strategy in Designing
4.1 CA Rule-Based Function
4.2 Mathematical Portrayal
5 YUGAM-128 Architecture
6 Die Hard Test
7 Conclusion
References
Detecting Spam Emails/SMS Using Naive Bayes, Support Vector Machine and Random Forest
Abstract
1 Introduction
2 Literature Review
3 Problem Definition
4 Proposed Work
5 Experimental Analysis
6 Conclusion
References
Feature Based Opinion Mining on Hotel Reviews Using Deep Learning
Abstract
1 Introduction
2 Basic Concepts
2.1 Opinion Mining
2.2 Natural Language Processing (NLP)
2.3 CNN
2.4 Deep Learning
3 Literature Review
4 Proposed Approach
4.1 Dataset Introduction
4.2 Data Pre-processing
4.3 Feature Extraction
4.4 Different Cases Handled in Feature Level Opinion Mining
4.5 Used Hardware and Software
4.6 Implementation of Proposed Model
4.7 Evaluation of Proposed Model
5 Results
6 Conclusion
References
Using Deep Autoencoders to Improve the Accuracy of Automatic Playlist Generation
Abstract
1 Introduction
2 Literature Review
2.1 Existing Approaches
2.1.1 Most Popular N Songs
2.1.2 Collaborative Approach
2.1.3 Content-Based Approach
2.2 Observations Based on Existing Approaches
2.3 Existing Systems
2.3.1 Last.fm
2.3.2 Youtube
2.4 Observations on Existing Systems
3 Proposed System
3.1 Database Creation
3.2 Data Exploration and Preprocessing
3.3 Learning Models
3.3.1 Clustering Model
3.3.2 Deep Learning Model
3.3.3 Results Obtained from Learning Models
3.4 Hybrid Implementation
3.5 Experimental Results
4 Conclusion and Future Scope
Compliance with Ethical Standards
References
Evolutionary Correlation Triclustering for 3D Gene Expression Data
Abstract
1 Introduction
2 Literature Review
2.1 Issues in the Existing Clustering and Biclustering Algorithms for GA
3 Method and Materials
3.1 Mean Correlation Value for Tricluster
3.2 Generation of Initial Population
3.3 Notations Used for Genetic Algorithm (GA)
4 Proposed Work
4.1 Objective Function
5 Dataset Description
6 Results and Discussion
7 Conclusion and Future Enhancement
References
A Study on Legal Knowledge Base Creation Using Artificial Intelligence and Ontology
Abstract
1 Introduction
2 Artificial Intelligence (AI) and Its Application Areas
3 Legal Knowledge Base
4 Ontology in the Legal Domain
5 Literature Survey
6 Conclusion
References
Survey of Progressive Era of Text Summarization for Indian and Foreign Languages Using Natural Language Processing
Abstract
1 Introduction
2 Literature Review
2.1 Multidocument and Bilingual Text Summarization
2.2 Text Summarizers for Foreign Language
2.3 Text Summarizers for Indian Language
3 Conclusฤฑon
References
Zone Safe Traffic Assist System and Automated Vehicle with Real-Time Tracking and Collision Notification
Abstract
1 Introduction
2 System Design
2.1 Hardware Details
2.2 Software Details
3 Implementation
4 Results
5 Conclusion
References
A Survey on Intrusion Detection System Using Machine Learning Algorithms
Abstract
1 Introduction
2 Related Work
3 Existing System
4 System Overview
5 Conclusion
References
Automatic Greenhouse Parameters Monitoring and Controlling Using Arduino and Internet of Things
Abstract
1 Introduction
2 Literature Survey
3 System Architecture
3.1 Block Diagram of Present System
3.2 System Design
4 Result and Discussion
5 Conclusion
References
withall: A Shorthand for Nested for Loop + If Statement
Abstract
1 Introduction
2 Background
3 The โwithallโ Loop
3.1 Syntax
3.2 Semantics
3.3 Illustration
4 Implementation
4.1 Restricted Grammar
4.2 Language for Implementation
4.3 Implementation Procedure
5 Results
6 Analysis of Results
7 Conclusion and Future Scope
Acknowledgements
References
Smart Cane-An Aid for the Visually Challenged
Abstract
1 Introduction
2 Overview
2.1 Problem Statement
2.2 Related Work
3 Proposed System
3.1 System Architecture
3.2 System Software
3.3 Working
3.4 Flowchart and Pictures
4 Results and Discussion
4.1 Results
4.2 Conclusion
4.3 Future Scope
Compliance with Ethical Standards
References
Readmission Prediction Using Hybrid Logistic Regression
Abstract
1 Introduction
2 Related Work
3 Model and Algorithm
4 Results and Discussion
5 Conclusion
References
Modified Region Growing for MRI Brain Image Classification System Using Deep Learning Convolutional Neural Networks
Abstract
1 Introduction
2 Methodology
2.1 Image Enhancement and Noise Removal
2.2 Segmentation of Brain Tumor Region
2.3 Feature Extraction and Classification
2.4 Experimental Results
3 Conclusion
References
Effect of Air Substrate on the Performance of Rectangular Microstrip Patch Antenna for the UHF Spaced Antenna Wind Profiler Radar
Abstract
1 Introduction
2 Design Considerations of Microstrip Patch Antenna
3 Results and Discussions
4 Conclusions
Acknowledgements
References
A System-Level Performance of CS/CB Downlink CoMP in Small Cell LTE-A Heterogeneous Networks
Abstract
1 Introduction
2 Classification of Coordination Multipoint (CoMP)
2.1 Coordinated Beamforming/Coordinate Scheduling
2.2 Joint Transmission
2.3 Dynamic Point Selection/Joint Point Selection
3 Coordination Multipoint Architectures
4 Challenges in Coordination Multipoint (CoMP) Networks
5 System Model and Simulation Procedure for Coordination Multipoint (CoMP)
6 Result and Discussion
7 Conclusion
References
Machine Learning: An Aid in Detection of Neurodegenerative Disease Parkinson
Abstract
1 Introduction
1.1 Approach to Parkinsonโs Disease Examination
1.2 Machine Learning for Parkinson
2 General Framework to Detect Parkinson
3 Data Description
4 Performance Metrics to Classify PD Patients
5 Implications and Potential Challenges
6 Conclusion
References
Elliptical Curve Cryptography Based Access Control Solution for IoT Based WSN
Abstract
1 Introduction
1.1 Gartner Prediction
1.2 Bain and Company Prediction
2 Literature Review
3 Proposed Architecture
4 Conclusion
References
Novel Exon Predictors Using Variable Step Size Adaptive Algorithms
Abstract
1 Introduction
2 Adaptive Algorithms for Exon Prediction
3 Computational Complexities and Convergence Issues
4 Results and Discussion
5 Conclusion
References
Tweets Analysis for Disaster Management: Preparedness, Emergency Response, Impact, and Recovery
Abstract
1 Introduction
2 Literature Survey
3 Problem Statements
4 Proposed System
4.1 Modules
5 Conclusion
References
CFRF: Cloud Forensic Readiness Framework โ A Dependable Framework for Forensic Readiness in Cloud Computing Environment
Abstract
1 Introduction
2 Objectives of the Article
3 Related Work
4 Cloud Forensic Readiness Framework
5 Conclusion
References
Face Recognition Based on Interleaved Neighbour Binary Pattern
Abstract
1 Introduction
2 Related Works
3 Proposed Method: Interleaved Neighbour Binary Pattern (INBP)
3.1 Histogram Intersection
3.2 Performance Metrics
4 Experimental Results
5 Conclusion
Acknowledgment
References
Secure Transmission of Human Vital Signs Using Fog Computing
Abstract
1 Introduction
2 Methodology
3 Results and Discussion
4 Conclusion
Acknowledgement
References
Internet of Things Based Smart Baby Cradle
Abstract
1 Introduction
2 Problem Statement
3 Smart Baby Cradle
3.1 Intruder Detection Unit
3.2 Remote Home Surveillance System
3.3 Weather Monitoring System
3.4 Cradle Swing
4 Conclusion
References
My Friend โ A Personal Assistant for Chauffeur
Abstract
1 Introduction
2 Proposed System
2.1 Advantages
3 Methodology
4 Technology Used
4.1 IR Sensor
4.2 Ultrasonic Sensor
4.3 Bluetooth Component
4.4 Arduino UNO
5 Results
6 Conclusion
7 Future Scope
References
Prediction of Type 2 Diabetes Using Hybrid Algorithm
Abstract
1 Introduction
2 Literature Survey
3 Dataset Description
4 Proposed Work
4.1 Balancing the Dataset
4.1.1 Random Under Sampling
4.1.2 Random Over Sampling
4.2 Attribute Selection
4.2.1 Univariate Selection
4.3 Classification Algorithms
4.3.1 AdaBoost Classifier
4.3.2 Bayesian Network
4.3.3 Random Forest
4.3.4 Artificial Neural Network
4.3.5 Decision Table + Naive Bayes Hybrid Model (DTNB)
5 Results
5.1 Direct Training of Algorithms
5.2 Training After Balancing the Data Sets
5.3 Training After Attribute Selection
5.4 Training After Attribute Selection and Balanced Dataset
5.5 Comparison Between Balanced and Imbalanced Data
5.6 Final Comparison of the Models Using Trend Chart
6 Conclusion
References
Discovering Patterns Using Feature Selection Techniques and Correlation
Abstract
1 Introduction
2 Applications of Feature Selection in Text Mining
3 Few Models of Feature Selection and Correlation Similarity Measures in Document Clustering
4 Proposed Methodology
5 Experiments and Results
6 Conclusion
References
Author Index
๐ SIMILAR VOLUMES
<p><span>This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing, and big data analytics. The best selected papers, presented
<p><span>This book includes selected papers presented at the 4th International Conference on Data Engineering and Communication Technology (ICDECT 2020), held at Kakatiya Institute of Technology & Science, Warangal, India, during 25โ26 September 2020. It features advanced, multidisciplinary rese
<span>The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the Department of Information Technology, Vasavi College of Engineering, Hyderabad, India in January 2022. ICCIDA provides an ex
<span>The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the Department of Information Technology, Vasavi College of Engineering, Hyderabad, India in January 2022. ICCIDA provides an ex
<p><span>This book presents new communication and networking technologies, an area that has gained significant research attention from both academia and industry in recent years. It also discusses the development of more intelligent and efficient communication technologies, which are an essential pa