<p><span>This book gathers selected papers presented at the 5th International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI 2021), organized by JCT College of Engineering and Technology, Coimbatore, Tamil Nadu, India during 27 â 28 August 2021. This book sol
Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2020 (Lecture Notes on Data Engineering and Communications Technologies, 57)
â Scribed by Jude Hemanth (editor), Robert Bestak (editor), Joy Iong-Zong Chen (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 879
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
This book solicits the innovative research ideas and solutions for almost all the intelligent data intensive theories and application domains. The proliferation of various mobile and wireless communication networks has paved way to foster a high demand for intelligent data processing and communication technologies. The potential of data in wireless mobile networks is enormous, and it constitutes to improve the communication capabilities profoundly. As the networking and communication applications are becoming more intensive, the management of data resources and its flow between various storage and computing resources are posing significant research challenges to both ICT and data science community.
The general scope of this book covers the design, architecture, modeling, software, infrastructure and applications of intelligent communication architectures and systems for big data or data-intensive applications. In particular, this book reports the novel and recent research works on big data, mobile and wireless networks, artificial intelligence, machine learning, social network mining, intelligent computing technologies, image analysis, robotics and autonomous systems, data security and privacy.
⊠Table of Contents
Foreword
Preface
Acknowledgements
Contents
About the Editors
A Semi-supervised Learning Approach for Complex Information Networks
1 Introduction
2 Information Networks and Mining Tasks
2.1 Supervised Learning Methods
2.2 Unsupervised Learning Methods
3 Problem Definition
4 Proposed Methodology
5 Preliminary Experimentation
5.1 Dataset
5.2 Algorithm
5.3 Experimentation
5.4 Elaboration on Results
6 Discussion and Future Work
References
Tackling Counterfeit Medicine Through an Automated System Integrated with QR Code
1 Introduction
2 Literature
2.1 Existing System
3 Proposed Work
3.1 Tools and Technologies Used
3.2 System Design
4 Experimentation
4.1 Testing and Results
5 Conclusion
References
Efficient Gs-IBE for Collusion Resistance on Multi-handler Cloud Environment Using Attribute-Modulator (AM)
1 Introduction
2 Preliminary
2.1 Complexity Assumption
2.2 Generalized Id-Based Signcryption
2.3 Security Model
3 Implementation of Our Approach
4 Security Analysis
5 Performance Analysis
6 Conclusion
References
Preventing Fake Accounts on Social Media Using Face Recognition Based on Convolutional Neural Network
1 Introduction
2 Problem Identification
3 Literature Survey
3.1 Sarah Khaled, Neamat El-Tazi and Hoda M. O. Mokhtar
3.2 Mudasir Ahmad wania, Nancy Agarwala and SuraiyaJabinb Syed ZeeshanHussainb
4 Techniques Used in Literature Survey
5 Proposed Methodology
6 Proposed Algorithm
7 Future Scope
8 Conclusion
References
A DNN Based Diagnostic System for Heart Disease with Minimal Feature Set
1 Introduction
2 Related Work
3 Proposed System
3.1 Dataset Description and Data Pre-processing Module
3.2 Feature Selection Module
3.3 Prediction Module with Deep Neural Networks
4 Evaluation Metrics and Results
5 Conclusion
References
Robust Automated Machine Learning (AutoML) System for Early Stage Hepatic Disease Detection
1 Introduction
1.1 AutoML Versus Traditional Machine Learning
1.2 Advantages of AutoML
1.3 Risks Associated with AutoML
2 AutoML Pipeline
2.1 Benefits of AutoML
3 AutoML Tools
3.1 Auto-WEKA
3.2 Auto-Keras
3.3 Auto-Sklearn
3.4 Auto-Pytorch
3.5 Amazon-Lex
3.6 Tpot
3.7 H20 Auto-ML
3.8 RapidMiner
3.9 Cloud Auto-ML
4 Experimental Setup and Results
4.1 Experimental Setup-1:
4.2 Experimental Setup-2
4.3 Experimental Setup-3:
5 Conclusion
References
BS6 Violation Monitoring Based on Exhaust Characteristics Using IoT
1 Introduction
2 Related Work
3 Methodology
4 Implementation
5 Results and Discussion
6 Conclusions
References
Analytical Classification of Sybil Attack Detection Techniques
1 Introduction
1.1 Classification of Sybil Attack
2 Related Work
3 Analysis and Discussion
4 Conclusion
References
Smart and Autonomous Door Unlocking System Using Face Detection and Recognition
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Face Detection by Haar Cascade Classifier
3.2 Face Recognition by Local Binary Pattern Histogram or LBPH
3.3 Access Provision to the Door
3.4 Working Process
4 Results
5 Conclusion
References
Frequency Reconfigurable Circular Patch Antenna
1 Introduction
2 Related Work in Frequency Reconfıgurable Antennas
3 Proposed Antenna Desıgn
3.1 Design of Patch Antenna
4 Placement of PIN Dıodes and Reconfıgurabılıty
5 Effect of Dıodes in the Resonatıng Frequency
6 Results and Discussion
6.1 Circular Patch Antenna Without Diodes
6.2 Circular Patch with Diodes
7 Conclusion and Future Scope
References
A New Avenue to the Reciprocity Axioms of Multidimensional DHT Through Those of the Multidimensional DFT
1 Introduction
2 Multidimensional DFT
2.1 1D-DFT
2.2 2D-DFT
2.3 3D-DFT
2.4 mathbbWD-DFT
3 Multidimensional DHT
3.1 1D-DHT
3.2 2D-DHT
3.3 3D-DHT
3.4 mathbbWD-DHT
4 Interrelation Betwixt DFT and DHT
5 Spin-Offs of the Reciprocity Axioms for Multidimensional DHT from Those of the Multidimensional DFT
5.1 Spin-off of the Reciprocity Axiom for 1D-DHT from that of 1D-DFT
5.2 Spin-off of the Reciprocity Axiom for 2D-DHT from that of 2D-DFT
5.3 Spin-off of the Reciprocity Axiom for 3D-DHT from that of 3D-DFT
5.4 Spin-off of the reciprocity axiom for mathbbWD-DHT from that of mathbbWD-DFT
6 Discussion
7 Conclusions
References
A Deep Learning Approach for Detecting and Classifying Cancer Types
1 Introduction
2 Literature Survey
3 Materials and Methods
3.1 Dataset
3.2 Pre-processing
3.3 Data Augmentation
3.4 Deep Learning Model
3.5 Training and Fine-Tuning
3.6 Flow Diagram
4 Results and Discussion
4.1 Performance Metrics
4.2 Training Results
5 Conclusion and Future Scope
References
Automated Surveillance Security System Using Facial Recognition for Homes and Offices
1 Introduction
2 Proposed Method
2.1 Face Detection
2.2 Feature Extraction
2.3 Face Database and Template Matching
2.4 Result
3 Implementation and Result Analysis
3.1 Input Acquisition
3.2 Training
3.3 Face Recognition
3.4 Results
4 Conclusion
References
Strategies for Boosted Learning Using VGG 3 and Deep Neural Network as Baseline Models
1 Introduction
2 Baseline Model Investigation
3 Model 2âVGG 3 (Baseline and Dropout)
4 Model 2âVGG 3 (Baseline, Dropout, and Data Augmentation)
5 Model 2âVGG 3 (Baseline, Dropout, Data Augmentation, and Batch Normalization)
6 Deep Neural Network
7 Conclusion
References
Integrating ICT in Communicative Language Teaching in Bangladesh: Implementation and Challenges
1 Introduction
2 Methodology
2.1 Data Collection
3 Findings
3.1 Emergence of ICT in Bangladesh
3.2 ICT in Education: Bangladesh
4 CLT at a Glance
4.1 Emergence and Implementation of CLT in Bangladesh
4.2 Implementing CLT in Education
4.3 Challenges in Implementing CLT in Bangladesh
5 Challenges in Implementing ICT in CLT: Bangladesh Context
6 Discussion
7 Conclusion
References
Emerging Role of Intelligent Techniques for Effective Detection and Prediction of Mental Disorders
1 Introduction
2 Objective
3 Current State of Work
3.1 Case Studies Based on Clinical NLP
3.2 Case Studies Based on EHRs
3.3 Case Studies Based on ImagesâFacial Appearance and Expressions
3.4 Case Studies Based on Information Retrieval from Social Media Posts
4 Challenges
5 Opportunities
6 Conclusion
References
Comparison Analysis of Extracting Frequent Itemsets Algorithms Using MapReduce
1 Introduction
2 Background
2.1 Frequent Itemset Mining
2.2 MapReduce Framework
3 Frequent Itemset Mining Algorithms
3.1 Parallel FP-growth Algorithm [1]
3.2 Balanced Parallel FP-growth Algorithm [2]
3.3 Apriori-Based Algorithms
3.4 ECLAT-Based Algorithms
3.5 Sequence-Growth Algorithm [5]
3.6 Comparative Analysis of Frequent Itemset Mining Algorithms
4 Conclusion
References
Customer Lookalike Modeling: A Study of Machine Learning Techniques for Customer Lookalike Modeling
1 Introduction
2 Literature Survey
3 Architecture and Implementation
3.1 Tools and Technology
4 Results
5 Future Scope
References
Cold Start in Recommender SystemsâA Survey from Domain Perspective
1 Introduction
2 Cold Start
2.1 System Cold Start
2.2 User Cold Start
2.3 Item/Product Cold Start
3 Domain-Specific Cold-Start Scenarios
3.1 e-Commerce/e-Business
3.2 Crowdsourcing
3.3 Food Journaling
3.4 Location-Based Social Networks
3.5 News Recommendation
4 Techniques for Solving Cold Start
5 Conclusion
References
Image Classification Using Machine Learning Techniques for Traffic Signal
1 Introduction
2 Methodology
3 Data Augmentation
4 Transfer Learning and Fine Tuning
5 Result
6 Conclusion
References
Deep Domain Adaptation Approach for Classification of Disaster Images
1 Introduction
2 Background and Motivation
3 Transfer Learning, Domain Adaptation and DANN
3.1 Transfer Learning
3.2 Domain Adaptation
3.3 DANN
4 Experimental Setup
5 Results and Discussion
6 Conclusion
References
Automated Intelligent IoT-Based Traffic Lights in Transport Management System
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Conclusion
References
A Document Clustering Approach Using Shared Nearest Neighbour Affinity, TF-IDF and Angular Similarity
1 Introduction
2 Related Work
3 Comparative Analysis of Nonlinear Data Clustering Algorithm
4 Algorithm Sparse and Proposed Methodology of Density-Based Clustering for Documents
5 Empirical Results
6 Conclusion
References
A Privacy Preserving Hybrid Neural-Crypto Computing-Based Image Steganography for Medical Images
1 Introduction
1.1 Protection Methods
1.2 Why Medical Data Needs to Be Secured
1.3 Problems with Existing Methods
2 Parameters
3 Deep Steganography Approaches
4 Proposed Algorithm
4.1 Proposed Steps for the System
4.2 Pseudo Code for Encrypting Secret Image Using RSA
4.3 Pseudo Code Decrypted Image Using RSAâ
4.4 Pseudo Code for Steganography Using U-Net
5 Implementation
6 Conclusion
References
Low-Power Reconfigurable FFT/IFFT Processor
1 Introduction
2 FFT Algorithm
3 Proposed Processor Design
3.1 FFT and IFFT
4 Simulation Results and Analysis
5 Conclusion and Future Scope
References
Color Image Watermarking in DCT Domain Using SVR
1 Introduction
2 Preliminaries
2.1 YCbCr
2.2 Arnoldâs Transform
2.3 Discrete Cosine Transform
2.4 Lagrangian Support Vector Regression
3 Proposed Scheme
3.1 Embedding Procedure
3.2 Extraction Procedure
4 Experimental Results
4.1 Imperceptibility
4.2 Robustness
4.3 Comparative Analysis
5 Conclusion
References
Leaf Detection Using Histogram of Oriented Gradients (HOG), Local Binary Patterns (LBP), and Classifying with SVM Utilizing Claim Dataset
1 Introduction
2 Literature Review
3 Methodology
3.1 Feature Extraction
3.2 Features
3.3 Texture Analysis
3.4 Feature Descriptor
3.5 Histogram of Oriented Gradient (HOG)
3.6 HOG Vector
3.7 Local Binary Pattern
3.8 Support Vector Machine
4 Applications of SVM
5 Result
6 Conclusion
References
Prediction of Congestive Heart Failure (CHF) ECG Data Using Machine Learning
1 Introduction
2 Related Works
3 Methodology
3.1 Data Preprocessing
3.2 Training and Testing
3.3 Training of VGG16 Model
3.4 Testing
4 Results Analysis
5 Conclusion
References
Aspect-Based Unsupervised Negative Sentiment Analysis
1 Introduction
2 Proposed Work
2.1 Process Flow for the Negative Sentiment Analysis Task
2.2 Sentiment-Scoring of Tweets
3 Experimentation and Results
4 Conclusions
References
A System for Anxiety Prediction and Treatment Using Indian Classical Music Therapy with the Application of Machine Learning
1 Introduction
2 Related Work
3 Proposed Work
4 Methodology
5 Scheme of Work and Implementation
5.1 Dataset Description
5.2 Feature Selection Flowchart
5.3 Exploratory Data Analysis
6 Results and Discussion
7 Conclusion
References
Design of a Water and Oxygen Generator from Atmospheric Pollutant Air Using Internet of Things
1 Introduction
2 Background Work
3 Proposed System
4 Hardware Description
5 Results
6 Conclusion and Future Scope
6.1 Conclusion
6.2 Future Scope
References
Use of LSTM and ARIMAX Algorithms to Analyze Impact of Sentiment Analysis in Stock Market Prediction
1 Introduction
2 Literature Survey
3 Methodology
3.1 Dataset
3.2 LSTM (Long Short-Term Memory)
3.3 ARIMAX (Autoregressive Integrated Moving Average Exogenous Variable)
3.4 Sentiment Analysis
3.5 Evaluation Parameters
4 Result and Discussion
5 Conclusion
References
Design of Medical Image Cryptosystem Triggered by Fusional Chaotic Map
1 Introduction
2 Preliminary Concept
2.1 Tent Map
2.2 Henon Map
2.3 Proposed THS Map
3 Image Cryptosystem Promoted by 2D THS Map
3.1 Procedure 1: Image CryptosystemâConfusion Part
3.2 Procedure 2: Image CryptosystemâDiffusion Process
4 Experiment Result and Analysis
5 Performance and Security Analysis
5.1 Histogram Analysis
5.2 Correlation Coefficient Analysis
5.3 Information Entropy
5.4 Key Space Analysis
5.5 Cipher Image Attack Analysis
6 Conclusion
References
User Engagement Recognition Using Transfer Learning and Multi-task Classification
1 Introduction
2 Background and Related Work
3 Data Set and Transfer Learning
3.1 DAiSEE Dataset
3.2 Importance of Transfer Learning [10]
4 Deep Convolutional Neural Network (DCNN) Learning
4.1 Pre-processing
4.2 Model Architecture
5 Experimental Results
6 Compliance of Ethical Standards
6.1 What Will Be Done with Your Paper
6.2 Conflict of Interest
7 Conclusion
References
QoS Aware Multi Mapping Technology in SD-WAN
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Create Network Topology
3.2 Multi Mapping
3.3 Controller Switching Module
4 Simulation and Results
4.1 Performance Metrics
5 Result Analysis
5.1 End-to-End Delay
5.2 Throughput
5.3 Packet Loss
6 Conclusion
References
Auto-Completion of Queries
1 Introduction
2 Literature Review
3 Approach
3.1 Proposed Architecture
3.2 Dataset
3.3 Evaluation Metrics
4 Results and Discussions
5 Conclusion
References
Design of CMOS Active Inductors for RFIC Applications: A Review
1 Introduction
2 Background
3 Design of Active Inductors
3.1 Active Inductor with Distortion Reduction Circuit
3.2 AÂ Low Voltage High-Q CMOS Active Inductor
3.3 Differential Active Inductor Design
3.4 Adjustable Active Inductor
3.5 AÂ Low Power, High Q-Factor Grounded Active Inductor
4 Simulation Results and Discussion
5 Conclusion
References
Optimized Web Service Composition Using Evolutionary Computation Techniques
1 Introduction
2 Background
3 System Implementation
3.1 QoS Prediction
3.2 Genetic Algorithm for Optimized QoS
3.3 Service Composition
4 Experiment Result and Analysis
5 Conclusion
References
Emotion Recognition from Speech Signal Using Deep Learning
1 Introduction
2 Literature Survey
3 Dataset
3.1 Dataset Selection
3.2 Speech Data Augmentation
4 Feature Engineering and Modeling
4.1 Features
4.2 Deep Learning Model
5 Results
6 Conclusion
References
COVID-19 Database Management: A Non-relational Approach (NoSQL and XML)
1 Introduction
2 Literature Review
2.1 COVID-19 Pandemic
2.2 Non-relational Databases
3 Advantages of Non-RDBMS Over RDBMS
3.1 Disadvantages of RDMS
4 Clinical Document Architecture
5 NoSQL
5.1 Advantages of Using NoSQL for Storing COVID-19 Data
6 XML
6.1 XML Document Architecture
7 Implementation
8 Conclusion
References
Study of Effective Mining Algorithms for Frequent Itemsets
1 Introduction
2 Frequent Itemset Mining
2.1 Tree-Based Frequent Itemset Mining
2.2 List-Based Frequent Itemset Mining
2.3 Hybrid Frequent Itemset Mining
3 Concise Mining of Frequent Itemsets
3.1 Non-Derivable Frequent Itemset Mining
3.2 Closed Frequent Itemset Mining
3.3 Closed and Non-Derivable Frequent Itemset Mining
3.4 Maximal Frequent Itemset Mining
4 Conclusion
References
A Novel Method for Pathogen Detection by Using Evanescent-Wave-Based Microscopy
1 Introduction
2 Principle
2.1 Total Internal Reflection Fluorescence Microscopy (TIRF)
2.2 Total Internal Reflection Parameters
2.3 Evanescent-Wave Mathematics
3 Inventive Microscopic Technology
3.1 Operative Mechanism
4 Preliminary Results
5 Advantages
6 Conclusion
References
Analyzing Social Media Data for Better Understanding Studentsâ Learning Experiences
1 Introduction
2 Related Background Work
3 Data Collection and Classifier Summary
4 Content Analysis Based on Classifier Algorithms
4.1 Text Preprocessing
4.2 Naive Bayes Classification
4.3 Support Vector Machine Classification
4.4 Label-Based Evaluation
5 Comparison of Classifier Algorithms
6 Conclusion
References
Load Balancing in Cloud Computing Environment: A Broad Perspective
1 Introduction
2 A Scheduling Model for Tasks in Cloud Computing
2.1 Essential Factors Considered for Scheduling Decision
2.2 Effect of Performance Metrics on Software Load Balancer
2.3 Multi-objective Optimization Load-Balancing Approaches
2.4 Classification of Load-Balancing Algorithms
3 Conclusion
References
An Energy-Efficient Routing Protocol Using Threshold Hierarchy for Heterogeneous Wireless Sensor Network
1 Introduction
2 Related Work
3 Proposed Protocol
4 Simulation Result
5 Conclusion
References
Performance Analysis of Fuzzy-Based Relay Selection for Cooperative Wireless Sensor Network
1 Introduction
2 Related Work
3 System Model
3.1 Fuzzy-Based Relay Node Selection
3.2 Bit Error Rate Analysis
4 Results and Discussion
5 Conclusion
References
Rational Against Irrational Causes of Symptom Recognition Using Data Taxonomy
1 Introduction
2 Problem Statement Towards Research Objective
3 Implementation Methodology
4 Conclusion
References
Multimodal Emotion Analytics for E-Learning
1 Introduction
2 Origin of the Proposal
3 Proposed Methodology
3.1 Methodology
4 Experimentation and Results
5 Conclusion
References
Intrusion Detection: Spider Content Analysis to Identify Image-Based Bogus URL Navigation
1 Introduction
2 Intrusion Detection System
2.1 Network Intrusion Detection System Architecture
3 Web RobotsâCrawler Architecture
4 Web CrawlerâOperational Methods
4.1 Parser
4.2 Classifier
4.3 JSON Classifier
4.4 Open-Source Crawlerâs Functionalities
5 Implementation of Intrusion Analysis of Parsed Web Contents
6 Conclusion
References
Plant Species Identification Using Convolutional Neural Network
1 Introduction
2 Related Work
3 Proposed Method
3.1 Convolutional Neural Network
3.2 Pre-trained Network
4 Experimental Results
5 Conclusion
References
Twitter Sentiment Analysis Using Supervised Machine Learning
1 Introduction
2 Related Work
3 Proposed System
3.1 Data Cleaning
3.2 Data Pre-processing
3.3 Classifiers to Be Used
3.4 Plotting Results
4 Results
4.1 Logistic Regression
4.2 Multinomial Naive Bayes
4.3 Linear Support Vector Machine
5 Conclusion and Future Work
References
Classification of Skin Disease Using Traditional Machine Learning and Deep Learning Approach: A Review
1 Introduction
2 Lıterature Survey
2.1 Available Datasets
3 Methods Used for Classıfıcatıon
3.1 Traditional Machine Learning Approaches
3.2 Deep Learning-Based Approaches
4 Conclusion
References
Spam SMS Filtering Using Support Vector Machines
1 Introduction
2 Related Work
3 Proposed Method
4 Result Analysis
5 Conclusion and Future Work
References
Design of Open and Short-Circuit Stubs for Filter Applications
1 Introduction
2 Proposed Designs and Results
2.1 Lumped Element Design for BSF
2.2 Lumped Element Design for BPF
2.3 BSF Design Using Open and Short-Circuit Stubs
2.4 BPF Design Using Open and Short-Circuit Stubs
3 Conclusion
References
Wireless Sensor Networks and Its Application for Agriculture
1 Introduction
1.1 Wireless Sensor Network Background
1.2 Wireless Sensor Network Scenario
1.3 Hardware Design of Mote
2 Literature Revıew
3 Wireless Sensor Network Application
3.1 Research Issues in Wireless Sensor Networks
3.2 Design Constraints for Wireless Sensor Networks
3.3 Research Problem for Wireless Sensor Network
4 Proposed Work
5 Simulation
6 Conclusion
References
Human Disease Diagnosis Using Machine Learning
1 Introduction
2 Literature Survey
3 Simulation of Existing Model
3.1 Simulation Parameters
3.2 Processing
4 Operational Analysis
5 Conclusion and Future Scope
References
Soccer Result Prediction Using Deep Learning and Neural Networks
1 Introduction
2 Background and Related Work
2.1 Machine Learning
2.2 Neural Networks
2.3 Deep Learning
2.4 Recurrent Neural Networks (RNNs)
2.5 Long Short Term Memory (LSTMs)
2.6 Comparative Study
2.7 Discussion
3 Operational Analysis
3.1 Dataset
3.2 Methodology
3.3 Implementation
3.4 Results and Discussion
4 Conclusion
References
Ranking Diabetic Mellitus Using Improved PROMETHEE Hesitant Fuzzy for Healthcare Systems
1 Introduction
2 Relative Work
3 Methods
3.1 Process Flow
4 Results and Discussions
4.1 Illustration Work
5 Conclusion
References
Hybrid Recommendation System for Scientific Literature
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection and Cleaning
3.2 Data Pre-processing
3.3 Creation of Graph
3.4 Calculation of Scores
3.5 Normalizing Scores and Final Recommendation
4 Results
5 Conclusion
6 Future Work
References
Classification of VEP-Based EEG Signals Using Time and Time-Frequency Domain Features
1 Introduction
2 Previous Work
3 Methodology
3.1 Dataset
3.2 Stimuli Design
3.3 Evoked Potential
4 Experimental Design
4.1 Feature Extraction
4.2 Classification
5 Results and Discussion
6 Conclusion
References
Performance Analysis of Matching Criteria in Block-Based Motion Estimation for Video Encoding
1 Introduction
2 Block Matching Criteria
2.1 Mean Absolute Difference (MAD)
2.2 Vector Matching Criterion (VMC)
2.3 Smooth Constrained MAD (SC-MAD) Criterion
2.4 Scaled Value Criterion
2.5 Modified Scaled Value Criterion
3 Results
4 Conclusion
References
Convolutional Recurrent Neural Network Framework for Autonomous Driving Behavioral Model
1 Introduction
2 Related Works
3 Proposed Method
4 Results and Discussions
5 Conclusions
References
Video Enhancement and Low-Resolution Facial Image Reconstruction for Crime Investigation
1 Introduction
2 Related Works
3 Proposed System
3.1 Video Enhancement Module
3.2 Face Reconstruction Module
3.3 Face Recognition
4 Results and Discussions
5 Conclusions
References
Facial Emotion Recognition System for Unusual Behaviour Identification and Alert Generation
1 Introduction
2 Literature Survey
3 System Architecture
3.1 Video Pre-processing
3.2 Facial Expression Analysis
3.3 Alert Generation
4 Implementation Details
4.1 Data set Used
4.2 Video Pre-processing
4.3 Training
4.4 Testing
4.5 Working
4.6 Alert Generation
5 Results and Discussion
6 Future Works and Conclusion
References
Secure Digital Image Watermarking by Using SVD and AES
1 Introduction
2 Implementation Methods
2.1 Singular Value Decomposition (SVD)
2.2 Advanced Encryption Standard (AES )
3 Proposed Method
3.1 Watermark Embedding Process
3.2 AES Encryption and Decryption Process
3.3 Watermark Extraction Algorithm
4 Experimental Results
4.1 Robustness Analysis
4.2 Analysis with PSNR and MSE Values
5 Conclusion
References
BER Analysis of Power Rotational Interleaver on OFDM-IDMA System Over Powerline
1 Introduction
2 System Model
2.1 OFDM-IDMA System
2.2 Power Line Channel
3 Power Rotational Interleaver
3.1 Algorithm
4 Simulation Results
4.1 Comparison Based on Bit Error Rate
4.2 Comparison Based on Other Parameters
5 Conclusion
References
Offline 3D Indoor Navigation Using RSSI
1 Introduction
1.1 Background
1.2 Challenges
2 Literature Survey
3 Methodology
3.1 Proposed Solution
3.2 Specific Objectives
3.3 System Architecture and Specifications
4 Implementation, Results and Discussion
4.1 Application Overview
4.2 Data Collection
4.3 Data Processing and Machine Learning
4.4 3D Building ModelâBlender Design
4.5 3D Building ModelâUnity
5 Conclusion and Future Work
References
Meanderline Pattern Wearable Textile Antenna for Position Identification in Military Applications
1 Introduction
2 Design of Meander Line Antenna
3 Software Overview
4 Antenna Simulation
5 Results and Discussion
6 Conclusion
References
Authentication of Robots Using ECC to Access Cloud-Based Services
1 Introduction
2 Preliminaries of ECC
3 Related Work
4 System Model
5 Proposed Scheme
5.1 Registration Phase
5.2 Login Phase
5.3 Authentication Phase
6 Security Analysis
7 Conclusion
References
Intelligent Web of Things Based on Fuzzy Neural Networks
1 Introduction
2 Methodology
2.1 Fuzzy ART Neural Network to Clustering Model
2.2 Long Short Term Memory (LSTM) Neural Network for Prediction
3 Materials
3.1 Network Architecture System
3.2 Data Set Description
3.3 Designing Fuzzy ART Model for Clustering
3.4 Designing LSTM Model for Prediction
4 Results and Discussion
4.1 Prediction Model
4.2 Clustering Model
5 Conclusion
Reference
Author Index
đ SIMILAR VOLUMES
<span>The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10â11, 2022. The book shares knowledge and results in th
<p><span>The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2023), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 16â17, 2023. The book shares knowledge and resul
<p><p>This book focuses on the emerging advances in distributed communication systems, big data, intelligent computing and Internet of Things, presenting state-of-the-art research in frameworks, algorithms, methodologies, techniques and applications associated with data engineering and wireless dist
<p><span>This book includes selected papers presented at the 4th International Conference on Data Engineering and Communication Technology (ICDECT 2020), held at Kakatiya Institute of Technology & Science, Warangal, India, during 25â26 September 2020. It features advanced, multidisciplinary rese
<p><p>This book discusses data communication and computer networking, communication technologies and the applications of IoT (Internet of Things), big data, cloud computing and healthcare informatics. It explores, examines and critiques intelligent data communications and presents inventive methodol