<p><span>This book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 19â20, 2022. Introducing t
International Conference on Innovative Computing and Communications: Proceedings of ICICC 2022, Volume 2 (Lecture Notes in Networks and Systems, 471)
â Scribed by Deepak Gupta (editor), Ashish Khanna (editor), Siddhartha Bhattacharyya (editor), Aboul Ella Hassanien (editor), Sameer Anand (editor), Ajay Jaiswal (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 835
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 19â20, 2022. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
⌠Table of Contents
ICICC 2022 Steering Committee Members
Preface
Contents
Editors and Contributors
Comparative Analysis of Image Segmentation Techniques for Real Field Crop Images
1 Introduction
2 Literature Survey
2.1 Edge-Based Segmentation Using Thresholding and Histogram Analysis
2.2 Region-Based Segmentation
2.3 Edge and Region-Based Segmentation
3 Segmentation Techniques Details
3.1 Thresholding
3.2 Edge Based Segmentation
3.3 Region-Based Segmentation
3.4 Both Boundary and Region-Based Techniques
4 Evaluation and Discussion of Segmentation Techniques
4.1 Boundary Based Techniques
4.2 Region-Based Techniques
4.3 Both Boundary and Region-Based Techniques
5 Future Scope
6 Conclusion
References
Sentiment Analysis of COVID-19 Vaccines
1 Introduction
2 Related Literature
3 Methodology
3.1 Twitter Authentication
3.2 Data Collection
3.3 Preprocessing Dataset
3.4 Sentiment Analysis
4 Results
4.1 Overall Sentiments
4.2 WordCloud
4.3 Ranking of Vaccines
5 Discussion
Appendix 1
Appendix 2
References
Plant Disease Classification Using Siamese Convolutional Neural Network
1 Introduction
2 Related Work
3 Material and Methods
3.1 Dataset Details
3.2 Siamese Neural Network (SNN) Model
4 Results and Discussion
5 Conclusion
References
Brand Logo Detection Using Slim YOLO-V4
1 Introduction
1.1 Need of Logo Detection
2 Literature Review
2.1 YOLO
3 Proposed Approach
3.1 Slim YOLO-V4 Architectural Overview
3.2 Implementation and Results
3.3 Dataset
3.4 Model Configuration of YOLO-V4 Slim
3.5 Experimental Results
4 Performance Comparison Based on Results
5 Conclusion
References
Bomb Box: A Fortified Vault to Prevent Brute Force Attack
1 Introduction
2 Literature Review
3 Methodology
4 Implementation and Results
5 Conclusion
References
A Review on Virtual Machine Placement with ACO in Cloud Computing
1 Introduction
1.1 Architectural Framework of Cloud Technology
2 Taxonomy of Virtual Machine Placement Techniques
2.1 Virtual Machine Placement Policy
2.2 Bio-inspired ComputingâAnt Colony Optimization Algorithm
3 ACO Approach for VM Placement
4 A Taxonomy on VM Consolidation for Energy Efficiency
5 Resource Management in VM Placement
6 Research and Challenges for Energy Efficient VM Consolidation
7 Conclusion
References
Locating Potholes with Internet of Things Technology Using Cloud Computing Analysis
1 Introduction
2 Literature Survey
3 Drawbacks of the Existing Systems
3.1 Speed
3.2 Accuracy
3.3 Optimizations
4 Components Used
5 Proposed Architecture
6 Implementation
6.1 What Form of Data Analytics Can be Applied to Collected Data?
7 Results and Discussions
7.1 Graphical Analysis
7.2 Comparative Analysis
8 Conclusion
References
Pose Driven Deep Appearance Feature Learning for Action Classification
1 Introduction
2 Methodology
2.1 RGB Appearance Stream left parenthesis upper S Subscript upper A Baseline right parenthesis( SA )
2.2 Skeletal Pose Stream left parenthesis upper S Subscript upper P Baseline right parenthesis( SP )
2.3 Temporal Convolution Block
2.4 Gated Feature Fusion (GFF)
2.5 Implementation Details of GaNet
3 Experiments and Results
3.1 Results on BVCAction3D and Other Benchmarks
3.2 Validating GaNet Against Baseline Deep Models
3.3 Comparing Fusion Models with GFF
3.4 Comparison with Standard CNN Models
4 Conclusions
References
Machine Learning Approaches in Smart Cities
1 Introduction
2 Literature Review
2.1 COVID-19 Pandemic and Machine Learning Market
2.2 Concepts
3 Application of ML in Smart Cities
3.1 Use of Machine Learning in Healthcare
3.2 Machine Learning Applications in Smart Traffic and Transportation Management
3.3 Making Use of Machine Learning to Combat Pollution
3.4 Application of Machine Learning to Public Safety
3.5 Intelligent Flood Monitoring
3.6 The Smart Home
3.7 The Smart Garden
4 Theoretical Implications
5 Conclusion
References
Blockchain in IoT Networks for Precision Agriculture
1 Introduction
1.1 Features of Blockchain
2 Review of Literature
2.1 Integration of Blockchain and IoT
2.2 Blockchain Mediated IoT Networks in Precision Agriculture
2.3 Proposed Application of the Blockchain-Based IoT System by Researchers
2.4 Blockchain and Farm Overseeing
2.5 Blockchain and Land Registration
2.6 Block chain and Supply Chain
3 Research Gaps and Future Scope
3.1 Research Gaps
3.2 Future Scope
4 Conclusion
References
Role of IoT in Healthcare: A Comprehensive Review
1 Introduction
2 IoT in Healthcare
3 Literature Review
4 Challenges and Future Directions in IoT-Based Healthcare
5 Conclusions
References
Privacy Preserving on Delay-Tolerant Networks
1 Introduction
2 Related Works
3 Innovation From Natural Context: Privacy Preserving Delay-Tolerant Network (PPDTN)
4 Protocol Description
5 Experimental Results
6 Conclusions
References
Distributed Consensus Mechanism with Novelty Classification Using Proof of Immune Algorithm
1 Introduction
2 Related Works
2.1 Online Peer-to-Peer Lending
3 Proposed System
3.1 Trust Model in Existing Systems
3.2 Blockchain Platform
3.3 Building Trust with Bio-Inspired Computing
3.4 Proof of Immune Algorithm
4 Experimental Results
5 Conclusions
References
Ensemble Deep Learning Models for Vehicle Classification in Motorized Traffic Analysis
1 Introduction
2 Related Works
3 Proposed Method
4 Results and Discussion
4.1 Dataset Description
4.2 Results and discussion
5 Conclusion
References
Smart Attendance Monitoring System for Online Classes Using Facial Recognition
1 Introduction
2 Related Work
3 Proposed Model
4 Experimental Results and Discussions
4.1 Performance Parameters
5 Conclusion and Future Scope
References
E-RupiâRecent Advancement in Digital Payment System
1 Introduction
2 Related Work
3 Objectives and Research Methodology
4 Methodology
5 Discussion
5.1 Digital Payments Trend in India
5.2 Working Model of e-Rupi
5.3 Uses of e-Rupi
5.4 Benefits of e-Rupi
5.5 Comparative Analysis of Various Payment Mechanisms
5.6 Limitations of e-Rupi
6 Conclusion
References
Security Issues in the Routing Protocols of Flying Ad Hoc Networks
1 Introduction
2 Security Flaws in Communication Using FANETs
2.1 Resource Constraints
2.2 High Mobility and Network Scalability
2.3 Limited Network Energy
2.4 Missing Inherent Security
2.5 Missing Centralized Control
3 Possible Network Attacks on FANETâs Routing Protocols
3.1 Route Discovery Phase Attacks
3.2 Route Maintenance Phase Attacks
3.3 Data Forwarding Phase Attacks
4 Potential Countermeasures
4.1 Increasing Node Density
4.2 Use of Flying Base Station
4.3 Use of Directional Antenna
4.4 Free-Space Optical Communication
4.5 Using Cryptographic Solutions
4.6 Intrusion Detection System (IDS)
4.7 Secure Routing Protocols
5 Conclusion and Future Work
References
A Novel Access Control Mechanism Using Trustworthiness of Nodes in a Cross-Domain Cloud Environment
1 Introduction
2 Literature Review
3 Cross-Domain Access Mechanism
3.1 Working Principle
4 Two-Way Trust Model
4.1 Trust Calculation
4.2 Flow Diagram
5 Performance Analysis
6 Managerial and Social Implications
7 Conclusion
References
OCR Based Number Plate Recognition Using LabVIEW
1 Introduction
1.1 Introduction to NI LabVIEW
1.2 Introduction to Vision Module
1.3 Introduction to OCR
1.4 Introduction to Vision Assistant
2 Related Techniques
3 Methodology
3.1 Training the System
3.2 Testing the System
4 Experimental Results
5 Future Scope
6 Conclusion
References
Siamese Bi-Directional Gated Recurrent Units Network for Generating Reciprocal Recommendations in Online Job Recommendation
1 Introduction
2 Related Work
3 The Proposed SBiGRU Model
4 Experimental Study
4.1 Dataset Used
4.2 Evaluation Metrics
4.3 Experimental Results
4.4 Discussion and Analysis
5 Conclusion
References
Comparative Analysis of Image Denoising Using Different Filters
1 Introduction
2 Different Types of Noises
2.1 Gaussian Noise
2.2 Poissonâs Noise
2.3 Salt and Pepper Noise
2.4 Speckle Noise
3 Different Types of Filters
3.1 Mean Filter
3.2 Multiple Mean Filter
3.3 Median Filter
3.4 Median-Mean Filter
3.5 Wiener Filter
3.6 Bilateral Filter
4 Experiments, Results, and Analysis
5 Discussions
6 Conclusions
References
The Proposed Context Matching Algorithm and Its Application for User Preferences of Tourism in COVID-19 Pandemic
1 Introduction
2 Literature Review
3 The Proposed Context Matching Algorithm for User Preferences of Tourism in COVID-19 Pandemic
3.1 The Proposed System Architecture
3.2 The Algorithm Context Matching and Steps
4 Experimental Results
5 Conclusions
References
Analysis of Different Interference Mitigation Techniques Based on Bit Error Rate (BER) in 5G
1 Introduction
1.1 Massive Multiple Input Multiple output (mMIMO)
1.2 Massive MIMO System Model
2 Literature Review
3 Methodologies
3.1 ZF-SIC Equalizer
3.2 MMSE-SIC Equalizer
3.3 Maximum Likelihood (ML) Equalizer
4 Results
5 Discussion
6 Conclusion and Future Work
References
Study and Development of Efficient Air Quality Prediction System Embedded with Machine Learning and IoT
1 Introduction
1.1 The Demand for Monitoring
1.2 Air Quality Indexing
2 Literature Review
3 Proposed Methodology/Architecture
3.1 Proposed Algorithm
4 Conclusion
References
Stock Market Prediction Using Deep Learning Algorithm: An Overview
1 Introduction
2 Literature Review
3 Machine Learning
4 Deep Learning
5 Artificial Neural Network
5.1 Training the Network
5.2 Recurrent Neural Networks (RNN)
6 Conclusion
References
An Introductory Note on the Pros and Cons of Using Artificial Intelligence for Cybersecurity
1 Introduction
2 Cybersecurity Approaches Based on Artificial Intelligence
3 Cybersecurity Frameworks
4 Cybersecurity Standards
5 Cybersecurity Using AI, ML, and DL
6 Pros and Cons of Using AI in Cybersecurity
6.1 Pros
6.2 Cons
7 Conclusion
8 Future Scope
References
An Enhanced Secure Framework Using CSA for Cloud Computing Environments
1 Introduction
2 Related Work
3 Proposed Method
4 Results and Discussions
5 Conclusion and Future Scope
References
Wearable Devices with Recurrent Neural Networks for Real-Time Fall Detection
1 Introduction
2 Related Works
3 Proposed Work
4 Results and Discussion
5 Managerial and Social Implications of Proposed System for Society
6 Conclusion and Future Work
References
Automatic Number Plate Detection and Recognition
1 Introduction
2 Related Work
3 Python Libraries Used for Detection of Number Plate
4 Proposed Methodology
4.1 Image Acquisition
4.2 Grayscale Conversion
4.3 Bilateral Filter and Canny
4.4 Find Counter and Apply Mask
4.5 Segmentation and Use EASYOCR
5 Result and Implementation
6 Conclusion
References
The Review of Recent Recommendation and Classification Methods for Healthcare Domain
1 Introduction
1.1 Categories of Recommendation Systems
2 Literature Review
3 A Framework of the Healthcare Recommendation System
3.1 Information Sources
3.2 Patient Profile Generation
3.3 Sentiment Analysis
3.4 Privacy Preservation
3.5 Recommender Engine
4 Several Categories of Filtering-Based Recommender Systems
4.1 Collaboration Filteration
4.2 Content-Based Filteration
4.3 Knowledge-Based Filteration
4.4 Hybrid Recommendation
4.5 Collaboration Filtering Technique
5 Comparative Analysis of Healthcare Recommendation and Classification Methods
6 Conclusion and Future Scope
References
An Adaptive Distance-Based Interest Propagation Protocol for Vehicular Named Data Networks
1 Introduction
2 Related Works
3 Problem Statement
4 Adaptive Distance-Based Protocol in Vehicular Named Data Networks
5 Performance Evaluation
5.1 Simulation Setup
5.2 Simulation Results
6 Conclusions
References
Comparative Study of Enhanced Round Robin Algorithms with Drrha and Other Metaheuristic Algorithms
1 Introduction
2 Literature Review
3 The Proposed Technique
3.1 NDRRHA (Normal Distribution Dynamic Round Robin Heuristic Algorithm)
3.2 MDRRHA (Median Dynamic Round Robin Heuristic Algorithm)
4 Simulation Settings
5 Evaluation and Discussion
5.1 Evaluating Performance of MDRRHA and NDRRHA Over Random Trial Cases and Doing Results Comparison
5.2 Evaluating the Performance of NDRRHA by Integrating it with SJF and HRRN (Thus Called HRRNHA) and Doing Metrics Comparison of Both Algorithms
5.3 Evaluating Performance of MDRRHA and NDRRHA Over Two Datasets and Comparing Obtained Results
6 Limitations
7 Conclusions
8 Future Work and Scope
References
Assessing Permeability Prediction of BBB in the Central Nervous System Using ML
1 Introduction
2 Dataset Description
2.1 Loading BBBP Dataset
2.2 Loading Molecular Descriptors
3 Exemplary Assessment
4 SVC Model
5 Neural Network Model
5.1 Gradient Boosting with SVC
5.2 Gradient Boosting with XGBoost
6 Comparison of Results with Molecule Net
7 Conclusion
References
Effectiveness of Machine Learning in Detecting Early-Stage Leukemia
1 Introduction
2 About Dataset
3 Libraries Used
4 Result and Discussion
4.1 Sklearn Cluster
4.2 Mpl ToolKit
5 Conclusion
References
Convolutional Neural Networks (CNN) and DBSCAN Clustering for SARs-CoV Challenges: Complete Deep Learning Solution
1 Introduction
1.1 SARS-CoV Symptoms
1.2 Statistical Analysis of SARS-CoV
1.3 Post Covid-19 Symptoms
1.4 Covid-19 Challenges
1.5 Background of the Proposed Method CNN
2 Related Work
3 Proposed Methodology
3.1 Clustering Algorithm for Massive Contact tracing
3.2 DBSCAN Algorithm and Why it is Best to Use?
3.3 Medical Testing-Based Solution (CBC Testing for Early Recognition of Covid-19 Disease
3.4 CNN for SARS-CoV Detection Using X-RAY Chest Images
3.5 Implementation Details/Experimental Evaluation
3.6 Reduction in Virus Transmission Using Nanocoatings and Nano Sprays
4 Conclusion
References
Computational Psychometrics Analysis of Learnersâ Motivational Level Using Different Parameters
1 Introduction
2 Model Used
3 Methodology
4 Outcomes Based on Different Parameters
5 Ml Modelling
6 Ludwig Classifier
7 Conclusion and Future Scope
References
Brain Tumor Segmentation
1 Introduction
2 Related Works
3 MR Image Segmentation Techniques
3.1 Region Growing
3.2 K-Means
3.3 Fuzzy C-Means (FCM)
3.4 Support Vector Machine (SVM)
3.5 Artificial Neural Network (ANN)
3.6 Hybrid Techniques
4 Proposed Model
5 Proposed Method
6 Conclusion
References
Analysis and Evaluation of Security and Privacy Threats in High Speed Communication Network
1 Introduction
2 5G Security-A Review
2.1 Need for Security Mechanism
2.2 Types of Security Threats and Vulnerabilities
2.3 Security Services in 5G Network
3 Cryptography: A Technique in Security Solutions
4 Security Challenges in SDN
5 Security Solution in SDN
6 Focus Needed While Designing and Deploying 5G Network
7 Conclusion
References
Prediction of Age-Related Macular Degeneration (ARMD) Using Deep Learning
1 Introduction
1.1 Contribution of the work
2 Related Work
3 Proposed Approach
3.1 Proposed System
4 Implementation Details and Results
4.1 Dataset
4.2 Machine Learning Methods for Comparison
4.3 Results
5 Managerial and Social Implications
6 Conclusion and Future Scope
References
Comparative Analysis of Machine Learning-Based Approaches for Astrological Prediction of Profession
1 Introduction
2 Literature Review
3 Classification Techniques
3.1 Logistic Regression
3.2 NaĂŻve Bayes Classification Algorithm
3.3 Catboost Classification Algorithm
4 Methodology
5 Result
6 Conclusion and Future Scope
References
Human Emotion Detection Using Deep Learning Neural Network
1 Introduction
2 Related Work
3 Methodology
3.1 Deep Learning
3.2 Layer Transformation Functions
3.3 Emotions Recognition Kaggle FER-2013 Data Set
3.4 Algorithm
4 Results and Discussion
5 Conclusion
References
Psychological Impact of Using Smartphone on Four- to Ten-Year-Old Children
1 Introduction
2 Methodology
2.1 Instruments
2.2 Study Protocol
2.3 Data Analysis
3 Results
3.1 Demographic Data
3.2 Proportion of Regular Users
3.3 Response to SDQ
3.4 Types of Apps Used by Children
4 Discussion
5 Conclusion
References
Simulation and Analysis of Test Case Prioritization Using Fuzzy Logic
1 Introduction
2 Literature Review
3 Basics of FL (Fuzzy Logic)
4 Basics of MF
5 Formation of Fuzzy Logic
6 Process of De Fuzzification
7 Proposed Methodology
8 Result
9 FCR (Fuzzy Control Rules)
10 FCR Tuning
11 Conclusion and Future Scope
References
An Empirical Analysis of Fixed and Fuzzy-Based Traffic Congestion Control System
1 Introduction
2 State of the Art
3 Implementation
4 Results and Discussion
5 Conclusion and Future Scope
References
Research Trends in Routing Protocol for Wireless Sensor Network
1 Introduction
2 Routing Protocols in Wireless Sensor Network
3 Scientometric Study of Research Trends in Routing Protocols in Wireless Sensor Network
3.1 Keyword Based Analysis of Routing Protocol in Wireless Sensor Network
3.2 Global Analysis of Research in Routing Protocol of Wireless Sensor Network
3.3 Research in Routing Protocol of Wireless Sensor Network Based on Year Wise Analysis
3.4 Research Trends in Web of Science Database for Routing Protocol in Wireless Sensor Network
4 Conclusion
References
Design and Implementation of Microstrip Patch Antenna for Biomedical Application
1 Introduction
2 Flow Chart of Proposed Antenna
3 Design of the Antenna
4 Substrate Specification
5 Simulation Results
6 Conclusion
References
Analysis of Phonocardiogram Signal Using Deep Learning
1 Introduction
2 Literature Survey
3 Methodology
3.1 Input Description
3.2 Preprocessing Technique
3.3 Dataset Description
3.4 Deep Learning Architecture
3.5 Result and Observation
3.6 Conclusion
References
Online Exam Monitoring Application as Microservices
1 Introduction
2 Problem Statement
2.1 Integrity of the Examination
2.2 Bottlenecks at Server
3 Literature Review
4 Proposed Methodology
5 Implementation
5.1 Migrating Monolithic to MicroservicesâContainerization
5.2 Migrating Monolithic to MicroservicesâServices
5.3 Inter-Container Communication
5.4 Orchestration
6 Results and Discussion
7 Conclusion and Future Work
References
Stress Diagnosis Using Deep Learning Techniques
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Data Sets
3.2 Deep Learning Techniques
4 Proposed Novel Method
5 Result and Analysis
6 Conclusion and Future Direction
References
News Application with Voice Assistant
1 Introduction
2 Literature Survey
3 Flow Process of the Proposed System
4 Methodology Used
5 ALAN AI
6 NEWS API
7 The User Interface
8 Conclusion
References
Impact of Soil Degradation on the Durability of Roads and Bridges in Middle Guinea: Synthetic Geoscientific Approach and Geotechnical Perspectives
1 Introduction
2 Presentation of Regions of Work
2.1 Geographical Localization of the Regions
2.2 Geochronological Presentation of the Regions
2.3 Presentation of the Hydrological Basins of the Regions
3 Materials and Method
3.1 Materials
3.2 Method
4 Discussions and Results
4.1 Geology
4.2 Pedology
4.3 Hydrological System
4.4 Impact Vegetation Cover
4.5 Climate Factors and Derivatives
4.6 Geotechnical Approach and Prevention
5 Conclusion
References
Analysis of COVID-19 Vaccination Sentiments Using a Voting Hybrid Machine Learning Approach
1 Introduction
2 Related Literature
3 Research Method
3.1 Problem Definition
3.2 Objectives
3.3 Data Collection
3.4 Proposed Sentiments Classification Block Diagram
3.5 Exploratory Data Analysis
4 Implementation
5 Result and Discussion
6 Conclusion
7 Future Work
References
Abstractive-Extractive Combined Text Summarization of Youtube Videos
1 Introduction
1.1 Types of Summarization
2 Literature Survey
3 Proposed Method
3.1 Problem Statement
3.2 Method
4 Results and Discussion
5 Conclusion
References
Distributed Kubernetes Metrics Aggregation
1 Introduction
2 Literature Review
3 The Architecture
4 Evaluation
5 Conclusion and Future Scope
References
Designing Microstrip Patch Antenna for 5G Communication
1 Introduction
2 Proposed Method
3 Antenna Design
4 Substrate Specification
5 Simulation Results and Discusssion
6 Conclusion
References
Advanced Speed Breaker System
1 Introduction
2 Existing Methodology
3 Proposed Method
3.1 Process of the System
4 Methodology
4.1 Speed Limit
4.2 Pedestrian Crossing
4.3 School Zone
4.4 Total Stop
4.5 Respect the Pedestrian Line
5 Results
6 Conclusion
References
Survey on Intrusion Detection System in IoT Network
1 Introduction
2 Methodology
2.1 Search and Selection Strategy
2.2 Data Analysis
2.3 Quality Appraisal
2.4 Result
3 Discussion
3.1 Types of Security Threats in IoT Based Environment
3.2 Classification of the Intrusion Detection System (IDS) for IoT
3.3 Challenges in IDS in IoT
4 Recommendations
5 Conclusion
References
Assessing Student Engagement in Classroom Environment Using Computer Vision and Machine Learning Techniques: Case Study
1 Introduction
2 Related Work
3 Data Collection
4 Methodology
5 Implementation
5.1 Classifier-1
5.2 Classifier-2
6 Results and Analysis
6.1 Decision Tree
6.2 Logistic Regression
6.3 Random Forest Classifier
6.4 Results
6.5 Failure Cases
7 Conclusion
References
Performance Enhancement of Motor Imagery EEG Signals Using Feature Extraction and Classification with Time Domain Statistical Parameters of BrainâComputer Interface
1 Introduction
1.1 Utilization of Signals
1.2 Feature Extraction
1.3 Interpretation of Features
1.4 Device Output
2 Brain Signals and Features
3 Result and Discussion
4 Conclusion
References
Performance Stagnation of Meteorological Data of Kashmir
1 Introduction
1.1 Decision Trees (DT)
1.2 Random Forest (RF)
2 State of Knowledge
3 Methodology and Data Preparation
4 Results: Experimental Evaluation and Performance Comparison
5 Discussion
6 Conclusion
References
Intrusion Detection System Using Deep Learning Approaches: AÂ Survey
1 Introduction
2 Overview of Attack Detection
3 Attack Detection Using Deep Learning Methods
4 Comparisons and Analysis
5 Performance Comparison and Analysis of Various Deep Learning Techniques
6 Summary
References
A Novel Similarity Measure for Context-Based Search Engine
1 Introduction
2 Related Work
3 A Framework for Clustering of Web Documents
3.1 Clustering Module
4 Experimental Results
4.1 Similarity Score Computation of Web Documents
4.2 Performance Metrics
4.3 Existing Similarity Measures
5 Comparison of Proposed Relevancy Technique and Existing Relevancy Technique
6 Conclusion
References
A Survey on the Security Issues of Industrial Control System Infrastructure Using Different Protocols
1 Introduction
2 Background
2.1 Literature Survey
2.2 ICS Layers and Components
3 Results
3.1 What Are Different Protocols Using in Various Applications?
3.2 What Are the Different ICS Protocols Having Issues in Security Pillar?
3.3 How Many Different Paper Studies on ICS Protocol Attacks?
4 Conclusion
References
Comprehensive Prediction Model for Player Selection in FIFA Manager Mode
1 Introduction
2 Literature Review
3 Comprehensive Prediction Model
3.1 Architecture of the Proposed Model
3.2 Primary Data Analysis Approach
3.3 Machine Learning Approach
4 Implementation
5 Result Discussion
References
Index
đ SIMILAR VOLUMES
<span> This book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 17â18, 2023. Introducing the
<p><span>This book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 19â20, 2022. Introducing t
<p><span>This book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 17â18, 2023. Introducing t
<span>This book includes high-quality research papers presented at the Sixth International Conference on Innovative Computing and Communication (ICICC 2023), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 17â18, 2023. Introducing the
<p><p></p><p>This book includes high-quality research papers presented at the Third International Conference on Innovative Computing and Communication (ICICC 2020), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 21â23 February, 2020. Introduci