𝔖 Scriptorium
✦   LIBER   ✦

📁

Intelligent Computing and Communication: Proceedings of 6th ICICC 2022 (Advances in Intelligent Systems and Computing, 1447)

✍ Scribed by M. Seetha (editor), Sateesh K. Peddoju (editor), Vishnu Pendyala (editor), Vedula V. S. S. S. Chakravarthy (editor)


Publisher
Springer
Year
2023
Tongue
English
Leaves
735
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book features a collection of high-quality, peer-reviewed papers presented at the Sixth International Conference on Intelligent Computing and Communication (ICICC 2022) organized by Department of Computer Science and Engineering, G. Narayanamma Institute of Technology and Science (for women) Autonomous, Hyderabad, India, on November 18–19, 2022. It focuses on innovation paradigms in system knowledge, intelligence, and sustainability that can be applied to provide practical solutions to a number of problems in society, the environment, and industry. Further, the book also addresses the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology, and healthcare.

✦ Table of Contents


Conference Committee
Preface
Contents
About the Editors
Cross-Site Scripting Recognition Using LSTM Model
1 Introduction
2 Related Work
3 Propose Solution
3.1 Data Gathering
3.2 Data Pre-processing
3.3 Training a Model
3.4 Experimentation Result
4 Limitations
5 Conclusion and Future Work
References
Development and Implementation of Efficient Recruitment Portal Using Blockchain
1 Introduction
2 Literature Survey
3 Methodology
3.1 Tools and Technologies
3.2 Proposed Method
3.3 Implementation and Working
4 Results and Discussion
5 Conclusions
References
Machine Learning Classifiers Performance Comparison for Breast Cancer Detection
1 Introduction
2 Related work
3 Material and Methods
3.1 Breast Cancer Wisconsin Dataset
3.2 Machine Learning Algorithms
3.3 Evaluation Parameters
4 Experiment Design and Implementation
4.1 Dataset Preprocessing
4.2 Design and Implementation
5 Results and Discussion
6 Conclusion
References
Comparison of Pollard’s rho Algorithm Based on Cycle Finding Methods
1 Introduction
2 Literature Review
3 Pollard’s rho for ECDLP
4 Modified Pollard’s rho
5 The Modified Pollard’s rho Implementation
6 Result Analysis
7 Random Walks
7.1 Random Walks Using Stack
7.2 Performance Analysis of Mixing Stack and Random Walks with Runtime
8 Pollard Kangaroo Method
8.1 Pollard’s Kangaroo Method Performance Analysis
9 Implementation
9.1 GNU Multi-precision (GNU MP)
9.2 Evaluation of Results
9.3 Performance Analysis of the Algorithms Implemented
10 Conclusion
References
Smart Street Parking System for Smart Cities Based on the IoT Prototype
1 Introduction
2 Related Work
3 Vision-Based Systems for Parking
4 Smart Street Parking System with IoT-Based Real Time
5 A Real-Time Smart Street Parking System with an IoT-Based Architecture
6 IoT-Based WSN Centric Smart Street Parking Module
7 Smart Street Parking Module IoT-Based Data Centre
8 Smart Street Parking Module IoT-Based Cloud Centre
9 Smart Street Parking System Algorithms IoT-Based Real Time
10 Street Parking Algorithm Implementation
11 Conclusion
References
A Hybrid PSO-Fuzzy Trust Energy Aware DRP in Wireless Sensor Network
1 Introduction
2 Literature Survey
3 Methodology
4 Results and Discussion
5 Conclusion
References
Online Advertising Dataset Using ANN (Artificial Neural Networks) and LR (Linear Regression Techniques)
1 Introduction
2 Literature Review
3 System Methodology
3.1 Existing System
3.2 Input Dataset
3.3 Proposed System
4 Experiment Results
4.1 ANN Algorithm
4.2 Results
4.3 Validation/Evaluation Metrics
5 Conclusion
References
Artificial Intelligence and Deep Learning-Based Agri and Food Quality and Safety Detection System
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Results and Discussion
5 Conclusion
References
Personalized E-learning System Using Linear Regression for Intelligent Tutoring Systems
1 Introduction
1.1 Adaptive E-learning
1.2 Intelligent Tutoring Systems
2 Related Work
3 Methodology
3.1 Architecture and Design
4 Implementation
5 Conclusion
6 Future Work
7 Funding Details
References
Nucleus Segmentation Using K-Means Clustering for Analysis of Microscopy Images
1 Introduction
2 Proposed Approach of Contrast Stretching and Color-based Segmentation
2.1 Contrast Stretching Using Dark Contrast Algorithm (DCA)
2.2 Color-Based Segmentation Using K-Means Clustering
3 Experimental Results and Analysis
3.1 Dataset
3.2 Simulation Results and Analysis
4 Conclusion
References
A Novel Dynamic Latch Comparator Design and Analysis for ADCs
1 Introduction
2 Design Methodology
2.1 Basic Operation
2.2 Proposed Comparator Topology
2.3 Principle of Operation
2.4 Transistor Sizing
2.5 Design Parameters
3 Results and Discussion
3.1 Parameter Measurement
4 Conclusion
References
A Dual Stopband Frequency Selective Surface at 2.57 and 5.40 GHz
1 Introduction
2 FSS Basic Design Considerations
3 Proposed Design Parameters
4 Simulation Results
4.1 Parametric Study
5 Conclusion
References
Post-COVID-Efficient and Reliable Cardiovascular Disease Prediction Using Random Forest and GA with KNN
1 Introduction
2 Literature Review
3 Implementation of the Existing and Proposed Models
3.1 Performance Evaluation of Existing and Proposed Models
4 Conclusion
References
Estimation of Doubly Selective Channel in FBMC-OQAM and OFDM Systems
1 Introduction
2 Literature Survey
3 OFDM System
4 FBMC System
4.1 Doubly Selective Channel Estimation
4.2 FBMC-OQAM System with Doubly Selective Channel Estimation
4.3 Interference Cancelation Methodology in Doubly Selective Channel Estimation
5 Simulation Results and Discussion
6 Conclusion
7 Future Work
References
Stress Detection in Classroom Environment Using Physiological Data
1 Introduction
2 Literature Survey
2.1 Cardiac Activity
2.2 Electro Dermal Activity (EDA)
2.3 Skin Temperature (TEMP)
2.4 Inertial Sensors
3 Stress Detection System
4 Algorithms
4.1 Decision Tree
4.2 Logistic Regression
4.3 K-Nearest Neighbor
5 Results
6 Conclusion
References
Prediction of Next Words Using Sequence Generators and Deep Learning Techniques
1 Introduction
2 Related Work
3 Existing Systems
4 Methodology
4.1 Dataset
4.2 Preprocessing
4.3 Building the Model
4.4 Predicting the Words
5 Implementation
5.1 Dataset
5.2 Preprocessing
5.3 Building the Model
6 Predicting the Words
7 Result
7.1 Interface
8 Conclusion
9 Enhancements
References
Natural Scene Text Detection in Video with Hybrid Text Augmentation and Fusion-Transferred Learning
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Cited Techniques for Text Detection
3.2 Text Augmentation
3.3 Fusion-Transferred Learning Architecture
4 Datasets and Evaluation Metrics
5 Conclusion
References
Quality-Produced Agricultural Crop Price Prediction Using Machine Learning
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Data Augmentation
3.3 Training
3.4 Visualisation
3.5 Testing and Accuracy
4 Dataset Description
5 Conclusion and Future Work
References
An Optimized Control on Delay and Transmission Rate Over Wireless Video Streaming Channels
1 Introduction
2 Background
3 Proposed Method
4 Results and Discussions
5 Conclusions
References
Classifier-Free Guidance for Generative Adversarial Networks (GANs)
1 Introduction
2 Related Work
3 Proposed Method
3.1 Preliminaries
3.2 Classifier-Free Guidance for Diffusion Models
3.3 Unconditional GANs
3.4 Conditional GANs
3.5 Classifier-Free Guidance for GANs
4 Result Analysis
4.1 Dataset
4.2 Implementation Details
4.3 Comparison with Previous Results
4.4 Model Evaluation
5 Conclusion and Future Work
References
Segmentation of Lung Regions for the Detection of Juxta-Pleura Nodules in CT Scan
1 Introduction
2 Related Work
3 Proposed Methodology
4 Results and Discussion
5 Conclusion
References
Analysis of Serial-In Parallel-Out Finite Field Multiplier Using Various Domino Logic Styles
1 Introduction
2 RNB Multiplication Process
3 Operation of Serial-In Parallel-Out Multiplication Operation
4 Different Domino Logic Styles
5 Results and Discussions
6 Conclusions
References
A Deep Learning Paradigm for Classifying Personality
1 Introduction
1.1 Problem Statement
1.2 Problem Definition
1.3 Contribution
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Data Pre-processing
3.3 Deep Learning Model
4 Results and Discussion
5 Conclusion and Future Scope
6 Future Directions
References
Art Generation Using Speech Emotions
1 Introduction
2 Literature Review
3 Methodology
4 Results
5 Conclusion
References
Image Forgery Detection System Using Convolution Neural Networks
1 Introduction
2 Literature Survey
2.1 Camera Method Identification (CMI)
3 Proposed System
3.1 Image Processing
3.2 CNN Analysis
3.3 Forgery Image Detection
3.4 Forgery Image Detection Algorithm
4 Experiments
4.1 Experiment Setup
4.2 Evaluation Criteria
4.3 Influence of Compression on Camera Model Identification
5 Results
6 Conclusion
References
Application of Machine Learning Algorithms for Power Theft Detection in Electrical Distribution System
1 Introduction
2 Methodology
2.1 Random Forest Machine Learning Algorithm
2.2 Support Vector Machine Learning Classification Algorithm
3 Results and Discussion
4 Conclusion
References
Comparative Analysis of ML Algorithms’ Application in SAPV Generation Systems
1 Introduction
2 ML Forecasting Techniques
2.1 CBR Algorithm
2.2 MICE
2.3 Results and Discussion
3 Applications
4 Summary
References
IoT-Based Protection of PV-Wind Integrated Microgrid System Fault Analysis Using Wavelet Approach
1 Introduction
2 Calculation of Fault Using Symmetrical Components
3 Mathematical Modelling and Analysis System Components
3.1 Solar PV System Modelling
3.2 Formation of Wind Energy Transformation
4 Transmission System Protection Methods
5 Modelling and Implementation of Designed System
6 Simulation Results
7 Conclusion
References
Early Prediction of Healthcare Diseases Using Machine Learning and Deep Learning Techniques
1 Introduction
1.1 Problem Statement
1.2 Advantages and Drawbacks
1.3 Proposed System
2 Literature Survey
2.1 Heart Attack
2.2 Diabetes Disease
2.3 Breast Cancer
2.4 Chronic Kidney Disease
2.5 COVID-19
3 Methodology
3.1 Proposed System
4 Implementation
4.1 Datasets Used
4.2 Data Preprocessing
4.3 Analyzing the Dataset
4.4 Splitting the Data
4.5 Model Building
5 Results and Discussions
5.1 Comparative Analysis of Results
6 Conclusion and Future Enhancements
References
PTS with Phase Factor-Based Reptile Search Algorithm and Hybrid Coding Approach for PAPR and BER Reduction in MIMO-OFDM
1 Introduction
2 Related Work
3 HCA-PFRSA-PTS Method
3.1 PAPR of MIMO-OFDM
3.2 Encoding Using Hybrid Coding Approach (HCA)
3.3 Phase Factor-Based RSA (PFRSA)-Based PTS
4 Results and Discussion
4.1 CCDF of PAPR Evaluation for HCA-PFRSA-PTS
4.2 BER Evaluation for HCA-PFRSA-PTS
5 Conclusion
References
G-EYE: Smartphone Compatible Portable Indirect Ophthalmoscope for Generating Quality Fundus Images
1 Introduction
2 Proposed System G-EYE
2.1 Principle of Ophthalmoscope
2.2 Application of the Concept
3 Methodology
3.1 Design of Fundus Camera
3.2 Capturing Fundus Video
3.3 Extraction of Image from Video
4 Implementation
4.1 Architecture of Fundus Camera
4.2 Algorithm for Scale-Invariant Feature Transforms
4.3 Camera Operation and Retinal Viewing Techniques
5 Results and Discussion
6 Conclusion and Future Scope
References
River Network Identification from Satellite Imagery Using Machine Learning Algorithms
1 Introduction
2 Literature Survey
3 Methodology
4 Implementation
4.1 Datasets Used
4.2 Data Preparation
4.3 Image Labelling
5 Results and Discussion
5.1 Support Vector Machine
5.2 The Random Forest
6 Conclusions
References
Implementing Digitalization in Square Blockchain Technology Using HDS Methodologies
1 Introduction
2 Literature Survey
3 Methodology
3.1 Hashing and Digital Signature (HDS)
3.2 SHA-256 Crypto Algorithm
4 Implementation
5 Results
6 Conclusion
References
Comic Character Recognition (CCR): Extraction of Speech Balloon Context and Character of Interest in Comics
1 Introduction
2 Literature Review
2.1 Detection of Comic Components
2.2 Text Area Recognition
2.3 Comic Characters Recognition
3 Proposed System
3.1 Overall Design
4 Experiment and Result Discussion
4.1 Dataset Description
4.2 Experimental Results
4.3 Evaluation Metrics
5 Conclusion
References
COVID-19, Normal, and Pneumonia Classification Based on Deep Features Using Transfer Learning
1 Introduction
2 Related Work
3 Methodology
3.1 Deep Learning Image Classifiers
3.2 Transfer Learning and ImageNet Weights
4 Results
5 Conclusion
References
Attention-Based Approach for English to Hindi Translation
1 Introduction
2 Related Work
3 Proposed Method
3.1 Data Collection
3.2 Data Preprocessing
3.3 Algorithm Selection
3.4 Encoder-Decoder Model for RNNs
3.5 NMT Attention Net Model
4 Results and Discussion
5 Conclusion
References
A Dependable and Secure Communication Infrastructure for Sensor Networks
1 Introduction
2 Literature Review
2.1 Types of Attacks
3 Energy Model for IoT
4 Trimming Model for Security Attacks
5 Experimental Analysis
5.1 Network Lifetime
5.2 Throughput
6 Conclusion
References
Image Captioning for Assisting the Visually Impaired
1 Introduction
1.1 Methods Available for Visually Impaired People
1.2 Literature Survey
1.3 Objectives
1.4 Hardware and Software Requirements
2 Proposed System
2.1 Dataflow and Architecture
2.2 Implementation—Training and Testing
2.3 Evaluating the Model Performance
3 Results
4 Conclusion and Future Work
References
Implementation of 64-Bit Inexact Speculative Half Unit Biased Floating-Point Adder
1 Introduction
2 HUB Format
3 Inexact Speculative HUB Floating-Point Adder
4 Implementation Results
5 Conclusions
References
Interview Supporting System Using Facial Features
1 Introduction
2 Literature Survey
3 Dataset
4 Methodology
5 Confidence Level Prediction Through Speech Recognition
5.1 Extracting the Audio
5.2 Speech-to-Text Conversion
5.3 Fillers
5.4 Calculation of Ratio
5.5 Confidence Level
6 Confidence Level Prediction Through Emotion Recognition
6.1 Key Frame Extraction
6.2 Face Detection
6.3 HOG
6.4 Emotion Recognition
6.5 Overall Confidence Calculation
7 Results
8 Conclusions
References
Dragon Fruit Stem Disease Detection Using Image Processing
1 Introduction
2 Proposed Multi-threshold Segmentation and Statistical Parameter-Based Classification Algorithm
2.1 Image Acquisition
2.2 Image Preprocessing
2.3 Multi-threshold-Based Dragon Stem Disease Segmentation
2.4 Morphological Processing
2.5 Feature Extraction
2.6 Multi-threshold Dragon Stem Classifier
3 Results and Discussions
4 Conclusion
References
IoMT Assisted Monitoring and Voice-Based Food Recommendation System Using Deep Learning Model
1 Introduction
1.1 Internet of Medical Things (IoMT)
1.2 Deep Learning
2 Related Work
3 Proposed System Design and Methodology
3.1 Working of LSTM Network
3.2 Working of Multilayer Perceptron (MLP)
4 Experimental Results
4.1 Dataset
4.2 Evaluation Metrics
5 Conclusions
References
Framing of Quality Questions for Quality Code Snippets
1 Introduction
2 Related Work
2.1 Deep Learning in Code Analysis
2.2 Question Generation for the Code Snippet
3 Approach
3.1 Datasets
3.2 Methodology
3.3 Evaluation of Model
4 Conclusion
References
Domestic IoT Smart Home Its Future Roles and Human Behavior Through Interaction
1 Introduction
2 Literature Review
3 Energy Model for IoT
4 Trimming Model for Security Attacks
5 Experimemtal Analysis
6 Conclusion
References
Comparative Analysis of Crude Oil Price Prediction Using Various Machine Learning Models
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 GARCH
3.2 SVM
3.3 ANN
3.4 RMSE
4 Result and Analysis
5 Conclusion
References
Glaucoma Retinal Image Synthesis Using the GAN
1 Introduction
1.1 Online Data Augmentation
1.2 Data Augmentation Using GAN
2 Related Work
3 Glaucoma Image Synthesis Using DCGAN
4 Results and Discussion
4.1 Dataset Description
4.2 Data Augmentation Using GAN
4.3 Performance of Model
5 Conclusion
References
Identifying Power Line Faults Using Fuzzy-Based Intelligent Control
1 Introduction
2 Wavelet Analysis and MRA
3 MRA-Based Fault Detection Algorithm
4 Conclusion
References
Robotic ARM for Effective Environmental Cleaning
1 Introduction
2 Literature Review
3 Proposed Solution
3.1 Transmitter
3.2 Receiver
3.3 Raspberry Pi
3.4 UART Protocol
3.5 Servometer
3.6 Robotic Arm Assembly
4 Conclusion
5 Future Scope
References
Computing Workspot Infection Vulnerability for Sandboxing a Business Process
1 Introduction
2 Business Process Engineering
3 BCP: Business Continuity Plan
4 Contact Vulnerability
5 Conclusion
References
Electronic Supply Chain: A Bibliographic and Descriptive Literature Review
1 Introduction
2 Bibliographic Review
3 Conclusion
References
Synthesizing Realistic ARMD Fundus Images Using Generative Adversarial Networks (GANs)
1 Introduction
1.1 Generative Adversarial Networks (GANs)
2 Image Synthesis Using Generative Adversarial Networks
2.1 Training of the Generative Adversarial Networks Model
2.2 Steps Required for the Training of GAN
3 Analysis of Results with Respect to Various Parameters
3.1 Comparing Images Generated by Varying Batch Size
3.2 Comparing Images Generated by Increasing Epochs
3.3 Comparing Images Generated by Varying Size of the Training Set
3.4 Comparing Images Generated by Various Combinations
4 Conclusions
References
Interpretation and Assessment of Improved Deep Networks for the Classification of Glaucoma Using Explainable Grad-CAM Approach
1 Introduction
2 Methodology
2.1 EfficientNet
2.2 ResNet-152
2.3 Model Training and Validation
2.4 Grad-CAM Visualization
3 Results and Discussions
3.1 Dataset and Training
3.2 EfficientNet
3.3 ResNet-152
3.4 Grad-CAM Visualization
4 Conclusions
References
Deep Learning Model with Progressive GAN for Diabetic Retinopathy
1 Introduction
2 Generative Adversarial Networks for Diabetic Retinopathy Detection
2.1 Generative Adversarial Networks Algorithm
3 Dataset Description
4 Results and Discussions
5 Conclusions and Future Enhancements
References
Channel Estimation in Massive MIMO Using BS Identification Code
1 Introduction
2 System Model
3 Pilot Based Hadamard Code for Channel Estimation
4 Numerical Results and Discussion
5 Conclusion
References
Improvement of Modified Social Group Optimization (MSGO) Algorithm for Solving Optimization Problems
1 Introduction
2 Modified Social Group Optimization (MSGO)
3 Improvement on MSGO
4 Simulation Results and Conclusion
References
Facial Recognition System with Secured Dynamic Implementation and Time Restriction
1 Introduction
1.1 Disadvantages/Drawbacks
2 Proposed Facial Recognition Model
3 Secured Dynamic On-Site Implementation
4 Time-Restricted System Implementation
5 Results
6 Conclusion
References
Modelling and Simulation of a Hybrid Electric Vehicle with the Electric Power Train
1 Introduction
2 Proposed System and Design
3 Hybrid Battery/Ultra Capacitor E.S.S.
4 Simulation Diagrams and Results
5 Conclusion
References
A Simple Policy Update Method for the Sharing of Privatized Personal Health Information
1 Introduction
2 Related Works
3 Methodology
4 Results
5 Conclusion
References
Performance Evaluation of ML-Based AWS Security Evaluation Model for Cloud Computing
1 Introduction
2 Literature Review
3 Security Evaluation System
3.1 Security Metrics and Its Collection
3.2 Security Evaluation Process for Quantifiable Metrics
3.3 Repairing of Security Vulnerability
4 Result and Discussion
5 Conclusion
References
Analysis of Radiation Induced in Multiphase Flow of a Viscous Conducting Heat and Mass Transfer Fluid in a Vertical Porous Medium
1 Introduction
2 Formulation of the Problem
3 Analysis of the Flow
4 Discussion of the Results
5 Conclusion
References
Otsu-Based Differential Evolution Method for Image Segmentation
1 Introduction
2 Brief Explanation of the Algorithms Used in This Study
2.1 Otsu's Thresholding
3 Differential Evolution (DE)
3.1 How de Is Used in the Proposed Algorithm?
4 Proposed Algorithm
4.1 Algorithm Pre-processing
4.2 Differential Evolution
5 Results
5.1 Performance Metrics
5.2 Input Images and References
5.3 Comparison of Results
6 Conclusions
References
Emotion Detection Using Machine Learning and Deep Learning
1 Introduction
1.1 Preprocessing
1.2 Facial Image Preprocessing
1.3 Feature Extraction
2 Literature Survey
2.1 Analysis of Facial Expression
2.2 Facial Emotion Recognition (FER)
2.3 Bi-linear Convolution Neural Network
3 Methodology
4 Architecture
4.1 LeNet5
4.2 Approaches Used
5 Conclusions and Future Work
References
Object Detection Using Deep Learning Approaches
1 Introduction
2 Literature Survey
2.1 Object Tracking
2.2 Object Detection
2.3 Existing Datasets
2.4 ImageNet and COCO Dataset
2.5 Existing Methods
3 Proposed System
4 Faster Region-Based Convolutional Neural Networks (FR-CNN)
4.1 Terms in FR-CNN
4.2 Model
4.3 Post-Processing
4.4 Training
5 Conclusions and Future Work
References
Telugu Tweets Sentiment Analysis Based on Ordinal Regression
1 Introduction
2 Literature Survey
3 Proposed System
4 Implementation
5 Results and Discussion
6 Conclusion
References
Image Style Transferred to Graphical User Interfaces
1 Introduction and Motivation
2 Proposed Approach
3 Experimental Results and Evaluation
4 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Intelligent Communication, Control and D
✍ Sushabhan Choudhury (editor), R. Gowri (editor), Babu Sena Paul (editor), Dinh-T 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book focuses on the integration of intelligent communication systems, control systems and devices related to all aspects of engineering and sciences. It includes high-quality research papers from the 4th International Conference on Intelligent Communication, Control and Devices (ICICCD 2020)

Intelligent Communication, Control and D
✍ Sushabhan Choudhury (editor), R. Gowri (editor), Babu Sena Paul (editor), Dinh-T 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book focuses on the integration of intelligent communication systems, control systems and devices related to all aspects of engineering and sciences. It includes high-quality research papers from the 4th International Conference on Intelligent Communication, Control and Devices (ICICCD

Intelligent Computing and Communication:
✍ Vikrant Bhateja (editor), Suresh Chandra Satapathy (editor), Yu-Dong Zhang (edit 📂 Library 📅 2020 🏛 Springer 🌐 English

<span>This book features a collection of high-quality, peer-reviewed papers presented at the Third International Conference on Intelligent Computing and Communication (ICICC 2019) held at the School of Engineering, Dayananda Sagar University, Bengaluru, India, on 7 – 8 June 2019. Discussing advanced

International Conference on Innovative C
✍ Ashish Khanna (editor), Deepak Gupta (editor), Siddhartha Bhattacharyya (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<div><p>This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20–21, 2021. Introducing t

International Conference on Innovative C
✍ Ashish Khanna (editor), Deepak Gupta (editor), Siddhartha Bhattacharyya (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20–21, 2021. Introducing the in

International Conference on Innovative C
✍ Ashish Khanna (editor), Deepak Gupta (editor), Siddhartha Bhattacharyya (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20–21, 2021. Introducing