𝔖 Scriptorium
✦   LIBER   ✦

📁

International Conference on Intelligent and Smart Computing in Data Analytics: ISCDA 2020 (Advances in Intelligent Systems and Computing)

✍ Scribed by Siddhartha Bhattacharyya (editor), Janmenjoy Nayak (editor), Kolla Bhanu Prakash (editor), Bighnaraj Naik (editor), Ajith Abraham (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
301
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book is a collection of best selected research papers presented at International Conference on Intelligent and Smart Computing in Data Analytics (ISCDA 2020), held at K L University, Guntur, Andhra Pradesh, India. The primary focus is to address issues and developments in advanced computing, intelligent models and applications, smart technologies and applications. It includes topics such as artificial intelligence and machine learning, pattern recognition and analysis, computational intelligence, signal and image processing, bioinformatics, ubiquitous computing, genetic fuzzy systems, hybrid evolutionary algorithms, nature-inspired smart hybrid systems, Internet of things, industrial IoT, health informatics, human–computer interaction and social network analysis. The book presents innovative work by leading academics, researchers and experts from industry.

✦ Table of Contents


Preface
Acknowledgements
Contents
About the Editors
Performance Analysis of Machine Learning Algorithms Over a Network Traffic
1 Introduction
2 Literature Survey
3 Problem Specifications
4 Implementation
4.1 The Dataset
4.2 The Supervised Learning
4.3 The Multilayer Perceptron (MLP)
4.4 The Random Forest Classifier
4.5 The Support Vector Machine (SVM)
5 The Performance Evaluation and Results
5.1 The Accuracy
6 Conclusion and Future Work
References
Binary PSO-Based Feature Selection and Neural Network for Parkinson’s Disease Prediction
1 Introduction
2 Methodology
2.1 Neural Networks
3 Results and Discussions
4 Conclusion
References
An Evolutionary-Based Additive Tree for Enhanced Disease Prediction
1 Introduction
2 Related Work
3 Methodology
4 Results and Discussions
5 Conclusion
References
Novel Defense Framework for Cross-layer Attacks in Cognitive Radio Networks
1 Introduction
1.1 AI for Cognitive Radio Networks
2 Related Works
3 Attack Models
3.1 PHY Layer Attack Model
3.2 Defense Scheme
3.3 MAC Layer Attack Model
3.4 Defense Scheme
3.5 Cross-Layer Attack
3.6 Cross-Layer Defense
4 Results
4.1 Simulation Setup
4.2 Results
5 Conclusion
References
Texture Based Image Retrieval Using GLCM and LBP
1 Introduction
2 Theoretical Background
2.1 Gray Level Co-occurrence Matrixes (GLCM)
2.2 Local Binary Patterns (LBP)
3 Experimental Results
3.1 Statistical Analysis
4 Conclusion
Reference
Design and Development of Bayesian Optimization Algorithms for Big Data Classification Based on MapReduce Framework
1 Introduction
2 Correlative Naive Bayes Classifier (CNB)
3 Cuckoo Grey Wolf Optimization with Correlative Naïve Bayes Classifier (CGCNB)
4 Fuzzy Correlative Naive Bayes Classifier (FCNB)
5 Holoentropy Using Correlative Naïve Bayes Classifier for a Big Data Classification (HCNB)
6 Results and Discussion
6.1 Performance Evaluation
7 Conclusion
References
An IoT-Based BLYNK Server Application for Infant Monitoring Alert System to Detect Crying and Wetness of a Baby
1 Introduction
2 Related Work
3 The Proposed Architecture of Baby Monitoring System
3.1 Baby Cry Detection Algorithm
3.2 Wetness Detection Algorithm
4 Experimental Results
4.1 Noise Detection by the System
4.2 Playing Songs
4.3 Wetness Detection
4.4 Turning on the Fan
5 Conclusions and Future Work
References
Analysis of DEAP Dataset for Emotion Recognition
1 Introduction
2 Related Work
2.1 Foundations
3 Procedure
4 Results
5 Conclusions and Discussions
References
A Machine Learning Approach for Air Pollution Analysis
1 Introduction
2 Related Work
3 Methodology
4 Analysis of Linearity and Correlation Between Gases Using Machine Learning
5 Conclusions
References
Facial Expression Detection Model of Seven Expression Types Using Hybrid Feature Selection and Deep CNN
1 Introduction
1.1 Edge Detection and CNN
2 Related Work
3 Proposed Model
3.1 About the Model
3.2 Data Flow of the Model
3.3 Proposed Algorithm and Model
3.4 FaceImgRecog Advanced
4 Experiment and Results
4.1 Dataset and Execution
4.2 Graphical Representation of Results
4.3 Comparison Table
5 Conclusion and Future Work
References
A Fuzzy Approach for Handling Relationship Between Security and Usability Requirements
1 Introduction
2 Relationship Between Usability and Security
2.1 Usability
2.2 Security
3 Fuzzy Approach to Develop Usable-Secure System
4 Implementation and Results
5 Conclusion
References
Naive Bayes Approach for Retrieval of Video Object Using Trajectories
1 Introduction
2 Motivations
2.1 Literature Review
2.2 Research Gaps
3 Proposed Method
3.1 Object Tracking Based on Hybrid NSA-NARX Model
3.2 Retrieval of Objects Using the Naive Bayes Classifier
4 Results and Discussion
4.1 Performance Metrics
4.2 Comparative Analysis
5 Conclusion
References
Mobility-Aware Clustering Routing (MACRON) Algorithm for Lifetime Improvement of Extensive Dynamic Wireless Sensor Network
1 Related Work
1.1 Need of Scheduling in Wireless Sensor Network
2 Proposed Work
2.1 Proposed Algorithm
3 Results
4 Conclusion
References
An Extensive Survey on IOT Protocols and Applications
1 Introduction
2 Related Work
3 Block Diagram of IOT
4 Applications of IOT
5 IOT Protocols at Different Layers
6 Conclusion
References
Review on Cardiac Arrhythmia Through Segmentation Approaches in Deep Learning
1 Introduction
2 Survey Over Various Heart Sound Detection Techniques
2.1 Heart Sound Detection Using Empirical Mode Decomposition
2.2 Heart Sound Detection Through Tunable Quality Wavelet Transform (TQWT)
2.3 Heart Sound Detection Using Feature Extraction
3 Comparative Analysis of Various Segmentation Approaches Used in HS Detection
3.1 Heart Sound Detection Based on S-Transform
3.2 Classification Techniques for Heart Sound Detection
4 Heart Sound Detection Using Deep Learning Approaches
5 Conclusion
References
Fast Medicinal Leaf Retrieval Using CapsNet
1 Introduction
2 Proposed Approach
2.1 Pre-processing
2.2 CapsNet Design and Training Process
3 Experimental Setup and Results
3.1 Evaluation Parameters
4 Conclusion
References
Risk Analysis in Movie Recommendation System Based on Collaborative Filtering
1 Recommendation System
1.1 Types of Recommendation System
2 Implementation
2.1 Single Objective Using Java
2.2 Multiobjective Using Python
3 Conclusion
References
Difficult on Addressing Security: A Security Requirement Framework
1 Introduction of the Security
2 The Need of Software Security and Existing Research Approach
3 Framework for Software Security in Requirement Phase
4 The Proposed Security Requirement Framework (SRF)
5 The FrameWork
6 Validation of the Framework
7 Conclusion
References
Smart Eye Testing
1 Introduction
2 Literature Review
3 Implementation
4 Results
5 Conclusion
References
Ameliorated Shape Matrix Representation for Efficient Classification of Targets in ISAR Imagery
1 Introduction
2 Ameliorated Shape Matrix Representation
2.1 Finding the Axis-of-Reference
2.2 Finding Rmax and Rmin
2.3 Shape Matrix Generation
2.4 Classification
3 Experimental Results
4 Conclusion
References
Region-Specific Opinion Mining from Tweets in a Mixed Political Scenario
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Data Collection
3.2 Wrangling
3.3 Preprocessing
3.4 Sentiment Analysis
4 Results and Discussion
5 Conclusion
References
Denoising of Multispectral Images: An Adaptive Approach
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Experimental Results
5 Conclusions
References
Digital Watermarking to Protect Deep Learning Model
1 Introduction
2 Literature Survey
3 Convolution Neural Network Model
3.1 Image Pre-processing and Data Generation
3.2 Training the Fully Connected Neural Network
4 Proposed Methodology
4.1 Watermarking the Neural Network
4.2 Implementation
5 Results and Discussion
6 Conclusion and Future Work
References
Sequential Nonlinear Programming Optimization for Circular Polarization in Jute Substrate-Based Monopole Antenna
1 Introduction
2 Proposed Antenna Design and Parametric Analysis
3 Optimization Using SNLP Optimizer
3.1 Optimizing the Variable S, UL, and UW
4 Conclusion
References
Genetic Algorithm-Based Optimization in the Improvement of Wideband Characteristics of MIMO Antenna
1 Introduction
2 Antenna Designing
3 Genetic Algorithm Optimizer Analysis
3.1 Optimizing the Parameter BP1, BP2, and LP1
4 Conclusion
References
Design and Analysis of Optimized Dimensional MIMO Antenna Using Quasi-Newton Algorithm
1 Introduction
2 Antenna Designing
3 Quasi-Newton Optimizer Analysis
3.1 Optimizing the Parameter of RL and Rw
4 Conclusion
References
Preserving the Forest Natural Resources by Machine Learning Intelligence
1 Introduction
2 Discussion on Existing Algorithms
2.1 Polyphonic Detection Systems
2.2 Classification Techniques
2.3 Mel-Frequency Cepstral Coefficients (MFCC)
2.4 K-Nearest Neighbour Method
2.5 Deep Neural Networks (DNN)
3 Analysis on Sound Event in Forest Environment
4 Conclusion
References
Comprehensive Study on Different Types of Software Agents
1 Introduction
2 Related Work and Discussion
2.1 Collaborative Agents
2.2 Interface Agents
2.3 Mobile Agent
2.4 Information/Internet Agents
2.5 Reactive Agents
2.6 Hybrid Agents
2.7 Smart Agents
3 Implementation of Software Agent
3.1 Overview
3.2 Algorithm
4 Result
5 Conclusion
References
Hybrid Acknowledgment Scheme for Early Malicious Node Detection in Wireless Sensor Networks
1 Introduction
2 Literature Survey
3 Proposed System
4 Algorithm
5 Increased Network Lifetime
6 Enhanced Throughput
7 Conclusion
References
Prediction of Temperature and Humidity Using IoT and Machine Learning Algorithm
1 Introduction
2 Methodology
2.1 Open SSL
2.2 MQTT
2.3 DynamoDB
2.4 API Gateway
2.5 Colab
3 Flowchart
4 Results
4.1 Linear Regression Model
5 Conclusion
References
Forensic Investigation of Tor Bundled Browser
1 Introduction
2 Background and Related Work
3 Finding the Artifacts After Browsing with TOR
3.1 Assumptions and Pre-definitions
3.2 Experimental Setup
4 Analysis of the Artifacts
5 Comparison with Other Existing Works
6 Conclusions and Future Work
References
Energy and Efficient Privacy Cryptography-based Fuzzy K-Means Clustering a WSN Using Genetic Algorithm
1 Introduction
2 Related Study
3 Proposed System
3.1 Energy and Efficient Cryptography-Based Fuzzy K-Means WSN Using Genetic Algorithm
4 Results and Discussions
5 Conclusion
6 Future Scope
References
Author Index


📜 SIMILAR VOLUMES


Proceedings of International Conference
✍ C. Kiran Mai (editor), B. V. Kiranmayee (editor), Margarita N. Favorskaya (edito 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book comprises the best deliberations with the theme “Smart Innovations in Mezzanine Technologies, Data Analytics, Networks and Communication Systems” in the “International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2020)”, organized by the Depart

Intelligent Methods Systems and Applicat
✍ Simona Dzitac (editor), Domnica Dzitac (editor), Florin Gheorghe Filip (editor), 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>The book contains 37 papers presented at the ninth edition of </span><span>the International Conference </span><span>of Computers, Communications and Control</span><span>―ICCCC-2022 held in Oradea and Băile Felix, Romania. A balanced selection of both methodological and application-oriented

Proceedings of International Conference
✍ A. Pasumpon Pandian (editor), Ram Palanisamy (editor), Klimis Ntalianis (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book is a collection of papers presented at the International Conference on Intelligent Computing, Information and Control Systems (ICICCS 2020). It encompasses various research works that help to develop and advance the next-generation intelligent computing and control systems. The book

Sixth International Conference on Intell
✍ Subhransu Sekhar Dash (editor), Bijaya Ketan Panigrahi (editor), Swagatam Das (e 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book presents the peer-reviewed proceedings of the Sixth International Conference on Intelligent Computing and Applications (ICICA 2020), held at Government College of Engineering, Keonjhar, Odisha, India, during December 22–24, 2020. The book includes the latest research on advanced comp

Intelligent Computing and Optimization:
✍ Pandian Vasant (editor), Ivan Zelinka (editor), Gerhard-Wilhelm Weber (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>Third edition of </span><span>International Conference on Intelligent Computing and Optimization</span><span> and as a premium fruit, this book, pursue to gather research leaders, experts and scientists on Intelligent Computing and Optimization to share knowledge, experience and current res

Advances in Computational Intelligence a
✍ Manolo Dulva Hina, Amar Ramdane-Cherif, Rafik Zitouni, Assia Soukane 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book presents select papers from the 2nd EAI International Conference on Computational Intelligence and Communications (CICom 2021). The papers reveal recent advances in the broader domains of Computational Intelligence including (1) automation, control, and intelligent transportation