𝔖 Scriptorium
✦   LIBER   ✦

📁

International Conference on Intelligent Emerging Methods of Artificial Intelligence & Cloud Computing: Proceedings of IEMAICLOUD 2021 (Smart Innovation, Systems and Technologies, 273)

✍ Scribed by Fausto Pedro García Márquez (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
582
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book consists of different accepted papers of the conference. Firstly, the artificial intelligence and its application-related topics are provided. Secondly, cloud computing and related topics are also provided.

The book has been designed to help research organisations and business leaders from across industries to transform their organisations into AI-driven disruptors. The utility of the technology in the face of massive globally interconnected complexity is explored. The significant characteristics of IEMAICLOUD are the promotion of inevitable dialogue between scientists, researchers, engineers, corporate’s and scholar’s students to mitigate the gap between academia, industry and governmental ethics which has been fostered through keynote speeches, workshops, panel discussion and oral presentations by eminent researchers in relevant field. The industry personnel depict cutting-edge researches in artificial intelligence and cloud computing to convey academia regarding real-time scenario and practical findings. Conference has been well equipped with talks by industry experts on the state of the art in computer science, lectures by eminent scientists designed to inspire and inform presentations by innovative researchers coming from 20+ countries from Europe and abroad. There has been discussion-oriented sessions and networking breaks to enable collaborations.

Papers consist abstract, result, discussions and conclusions by the help of different tables and diagrams.



✦ Table of Contents


Preface
Introduction
Contents
About the Editor
Mathematical Modelling to Predict Fuel Consumption in a Blast Furnace Using Artificial Neural Networks
1 Introduction
2 Materials and Methods
2.1 Artificial Neural Network Configuration
2.2 Data Normalization
2.3 Data Collect
2.4 Cross-Validation
3 Results and Discussion
4 Conclusions
References
A Hybrid Model Based on Behavioural and Situational Context to Detect Best Time to Deliver Notifications on Mobile Devices
1 Introduction
2 Related Work
2.1 Behavioral Science
2.2 Detecting Ideal Time
2.3 Challenges with Monitoring Context and Research Gaps
3 Framework
3.1 Hybrid Architecture
3.2 Mobile Usage Data Collection
3.3 Data Fusion
3.4 Data Labelling
4 Conclusion
References
Smart IoT System for Chili Production Using LoRa Technology
1 Introduction
2 Related Work
3 System Design
4 Flowchart of the System Operation
5 Experiment Setup
6 Result and Analysis
7 Preliminary Result
8 Conclusion and Future Work
References
Peculiarities of Image Recognition by the Hopfield Neural Network
1 Introduction
2 Clusterization of Handwritten Digits by the Kohonen Network
3 Hopfield Neural Network
4 Methods for Comparing Two Images
5 Conclusion
References
Automatic Sentiment Analysis on Hotel Reviews in Bulgarian—Basic Approaches and Results
1 Introduction
2 Overview of the Previous Work
2.1 Supervised Learning
2.2 Previous Work on Bulgarian Texts
3 Creating a Database and Applying Supervised Approaches
3.1 Information Retrieval
3.2 Data Preprocessing
3.3 Applying Classification Methods
4 Conclusion
References
Voice-Controlled Intelligent Personal Assistant
1 Introduction
2 Proposed System
2.1 Software Components
2.2 Hardware Dependencies
2.3 System Architecture
2.4 System Workflow
2.5 System Features
3 Results and Discussion
3.1 Server
3.2 Phone Application
3.3 Communication
3.4 Survey
4 Conclusion and Future Work
References
PDCloudEX Software Defined Network
1 Introduction
2 Features
3 Architecture
4 Key Benefits
5 Use Cases
References
Food Aayush: Identification of Food and Oils Quality
1 Introduction
2 Existing Methodology
3 Literature Survey
4 Proposed Methodology
5 Results and Discussions
6 Conclusion
References
LEAST: The Smart Grocery App
1 Introduction
2 Problem Definition
3 Feasibility
4 Complete Work Plan Layout
5 Technology Stack Used
6 Use Case Diagram
7 Datasets
8 Preliminary
9 Problem Resolution
10 Conclusion
References
A Supervisory Control and Data Acquisition System Filtering Approach for Alarm Management with Deep Learning
1 Introduction
2 Approach
2.1 Artificial Neural Network
3 Real Case Study and Results
References
Routing Vehicles on Highways by Augmenting Traffic Flow Network: A Review on Speed Up Techniques
1 Introduction
1.1 Temporal Path
1.2 Spatial Path
2 Static Shortest Path Problem (S-SPP)
3 Time Dependent Shortest Path Problem (TD-SPP)
4 Research Challenges and Future Directions
References
False Alarm Detection in Wind Turbine Management by K-Nearest Neighbors Model
1 Introduction
2 Approach
3 Case Study and Results
4 Conclusions
References
Classification Learner Applied to False Alarms for Wind Turbine Maintenance Management
1 Introduction
2 Approach
3 Case Study and Results
4 Conclusions
References
Agricultural Image Analysis on Wavelet Transform
1 Introduction
2 Methodology
2.1 Image Denoising
2.2 Image Compression
2.3 Image Enhancement
3 Conclusion
References
Deep Learning Algorithms
1 Introduction
2 Deep Learning Algorithms
3 Conclusion
References
Deep Reinforcement Learning
1 Introduction
2 Learning Models of Reinforcement Learning
3 Algorithms
4 Applications
5 Conclusion
References
Different Texture Segmentation Techniques: Review
1 Introduction
2 Image Segmentation Techniques
3 Conclusion
References
Fully Protected Image Algorithm for Transmitting HDR Images Over a WSN
1 Introduction
2 Historical Background
3 Methodology
4 Simulation Results
5 Conclusions
References
Gabor Wavelets in Face Recognition and Its Applications
1 Introduction
2 Methodology
3 Application of Gabor Transform
4 Conclusion
References
Harris Corner Detection for Eye Extraction
1 Introduction
2 Methodology
3 Conclusion
References
Human Computer Interface Using Electrooculogram as a Substitute
1 Introduction
2 Method for Eog in Eye Movement
3 Applications of EOG in HCI
4 Conclusion
References
Image Fusion Using Wavelet Transforms
1 Introduction
2 Methodology
3 Applications
4 Conclusion
References
Review on Traction Control System
1 Introduction
2 Conclusion
References
Various Algorithms Used for Image Compression
1 Introduction
2 Various Algorithms of Image Compression
3 Discussion
4 Conclusion
References
Wavelet Transformation for Digital Watermarking
1 Introduction
2 Wavelet Transform Techniques
3 Applications of Digital Watermarking
4 Conclusion
References
Singular Value Decomposition Based Image Compression
1 Introduction
2 Image Compression
3 Methodology
4 Conclusion
References
Wavelet Transform for Signature Recognition
1 Introduction
2 Discrete Wavelet Transform
3 Methodology
4 Conclusion
References
Object Detection with Compression Using Wavelets
1 Introduction
2 Methodology
3 Conclusion
References
A Review on Deep Learning Models
1 Introduction
2 Learning Models of Reinforcement Learning
3 Algorithms
4 Applications
5 Conclusion
References
Real Time Based Target Detection Method
1 Introduction
2 Experimental Setup
3 Results
4 Conclusion
References
Business Analytics: Trends and Challenges
1 Introduction
1.1 Difference Between Analytics and Analysis
2 Discussions
3 Conclusions
References
Home Automation: IoT
1 Introduction
2 Literature Review
3 Methodology
4 Discussions
5 Conclusion and Implication
References
A Review on Impact of COVID-19 on E-Commerce
1 Introduction
2 Discussions
3 Conclusion
References
Data Security Techniques in Cloud Computing
1 Introduction
2 Discussions
3 Conclusion
References
Radio Frequency Identification Technology Used to Monitor the Use of Water Point for Grazing Cattle
1 Introduction
2 Methods
3 Result
4 Conclusion
References
A Study of Continuous Variable Transmission
1 Introduction
2 Literature Review
3 Principle
4 Working
5 Mechanism of Pulleys
6 Conclusion
References
Review on Color Image Processing Techniques
1 Introduction
2 Review on Image Processing
3 Conclusion
References
Building Demolition Technique
1 Introduction
2 Methodology
3 Conclusion
References
Method of Noise Control for Building
1 Introduction
2 Conclusion
References
Fish Tank Monitoring System Using IoT
1 Introduction
2 Literature Review
3 Methodology
4 Results and Discussion
5 Conclusion and Implication
References
Blockchain Based Freelancing System
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
3.2 Instrument
4 Results and Discussion
5 Conclusion and Implication
References
Achieving Efficient Data Deduplication and Key Aggregation Encryption System in Cloud
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
3.2 Hardware and Software Tools Used
3.3 Implementation
4 Results and Discussion
5 Conclusion and Future Scope
References
Book My Space: The Utilization of Empty Space
1 Introduction
1.1 Ways to Improve Warehouse Space Utilization
1.2 Steps to Calculate Space Utilization Rates
2 Literature Review
3 Methodology
3.1 Tool Description
3.2 Design
3.3 Implementation
4 Result and Discussion
5 Conclusion
References
Computer Vision Based Attendance Management System
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
3.2 Tool Description
3.3 Implementation
4 Results and Discussion
5 Conclusion and Future Scope
References
Multidimensional Features Driven Phishing Detection Based on Deep Learning
1 Introduction
2 Literature Review
3 Methodology
4 Results and Discussion
5 Conclusion and Implications
References
DNA Based Criminal Identification Using Blockchain
1 Introduction
1.1 Block Chain Working
1.2 Properties of a Blockchain System
1.3 Blockchain Security
2 Literature Review
2.1 The Network Size
2.2 Network Speed
2.3 Human Error
3 Methodology
3.1 Design
3.2 Instrument
3.3 Software Tools Description
4 Results and Discussion
5 Conclusion and Implication
References
Driver Drowsiness Detection Alert System Using Haar Method
1 Introduction
1.1 Driver Drowsiness
2 Literature Review
3 Methodology
3.1 Design
3.2 Use Case Diagram
3.3 Data Flow
4 Results and Discussion
4.1 Test Cases
5 Conclusion and Implication
References
A Research Paper on Third Eye for Blind
1 Introduction
1.1 Complications in AI
1.2 Natural Language Processing
2 Literature Review
3 Methodology
3.1 Design
3.2 Instruments
3.3 Objectives
4 Results and Discussion
4.1 Implementation
4.2 Distance of the Object (Sonar Sensor)
5 Conclusion and Implication
References
Robot Movement Based on Color Detection
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
3.2 Instrument
3.3 Concept of Surveillance
3.4 Obstacle Detection
4 Results and Discussion
4.1 Software Implementation
5 Conclusion and Implication
References
Classification of Cervical Squamous Cells
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
3.2 Instrument
3.3 Implementation
4 Results and Discussion
5 Conclusion and Implication
References
Automation of Animal Classification Using Deep Learning
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
4 Drawbacks
4.1 Instrument
4.2 Implementation
4.3 Data Set
4.4 Data Pre-Processing
4.5 Feature Engineering
4.6 Training Set
4.7 Learning Algorithm
4.8 Trained Model and New Image
4.9 Score Model
4.10 Evaluate Output
4.11 Final Output
5 Results and Discussion
6 Conclusion and Implication
References
Real-Time Eye Blinking for Password Authentication
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
3.2 OTP Generation and Verification
3.3 Hardware and Software Tools
4 Results and Discussion
4.1 Localization of Face
4.2 Tracking of the Eyes
5 Conclusion and Implication
References
Emergency Location Sharing Using GPS Tracking
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
3.2 Dynamic Traffic Control System
3.3 Hardware and Software Tools
3.4 Proposed System Design
3.5 Java Development Kit (JDK)
3.6 XML
4 Results and Discussion
5 Conclusion and Implication
References
Providing Voice to Susceptible Children: Depression and Anxiety Detected with the Help of Machine Learning
1 Introduction
2 Literature Review
3 Methodology
3.1 Design
3.2 Hardware and Software Tools
4 Results and Discussion
5 Conclusion and Implication
References
A State of Art Review on Blockchain Technology
1 Introduction
1.1 Walmart
1.2 Maersk
1.3 Ups
1.4 British Airways
1.5 FedEx
1.6 Deloitte IoT Blockchain
2 Literature Review
3 Discussion
3.1 Existing System and Target Industries Benefits
3.2 Provenance Tracking
3.3 Cost Reduction
3.4 Establishing Trust
3.5 Benefits of Supply Chain with Blockchain
4 Conclusion and Implication
References
Review of Data Storage and Security in Cloud Computing
1 Introduction
2 Modes of Deployment in Cloud Computing
3 Essential Characteristics of Cloud Computing
4 Security Classification in Cloud Computing
5 Data Storage in Cloud Computing
6 Conclusion
References
Security Operation Modes for Enhancement of Utility Computer Network Security
1 Introduction
1.1 Cyber-Security for Utilities
1.2 Proposed Security Operation Modes
1.3 Application for Enhancement of Power System Controls
2 Security Operation Modes
2.1 Padding Mode
2.2 Frame Transmission Group Mode
2.3 Split Frame Transmission Group Mode
2.4 Security Header
2.5 Interoperability and Security Mode Transitions
3 Security Layer Analysis
3.1 Padding
3.2 Frame Transmission Group
3.3 Performance
4 Conclusion
References
Supervised Machine Learning Algorithm: A Review of Classification Techniques
1 Introduction
2 Supervised Machine Learning
2.1 Feature of Machine Learning Algorithm
3 Conclusion
References
Survey on Fog Computing and Its Function in IoT
1 Introduction
2 Working
2.1 Terminal Layer
2.2 Fog Layer
2.3 Cloud Computing Layer
3 Technologies for Fog Computing
3.1 Computing Technologies
3.2 Communication Technologies
3.3 Storage Technologies
4 Applications
4.1 Connected Car
4.2 Smart Traffic Lights
4.3 Smart Home
4.4 Wireless Sensor and Actuator Networks
4.5 Healthcare
5 Conclusion
References
Understanding Human Emotional Intelligence
1 Introduction
2 System Methodology
3 Considering Eigen Values for Facial Expression Recognition
4 Conclusion
References
Review on Continuous Variable Transmission (CVT)
1 Introduction
1.1 Optimum RPM Range
1.2 Components of a CVT
1.3 Working Principle of a CVT
1.4 Hydraulic Actuators
1.5 Torque Converter
1.6 Belt Materials
1.7 Types of CVT
2 Discussions
3 Conclusion
References
An Automated Solution for Test Optimization Using Soft Computing Techniques
1 Introduction
1.1 Software Testing
1.2 Soft Computing
1.3 Soft Computing Techniques in Software Testing
1.4 Data Mining Techniques in Software Testing
2 Background
2.1 Optimization Techniques Used in Test Case Generation
3 Proposed Methodology
4 Implementation
5 Results and Graphs
6 Conclusion
References
Emergence of Internet of Things (IoT) and Its Smart Application
1 Introduction
2 Related Work
2.1 Overview and Components of IoT
3 Conclusion
References
Analysis System of City Price Based on Big Data
1 Introduction
2 Systematic Level of City Price Analysis
3 Big Data Transmission Path of the Analysis System of City Price
4 The Technical Path of the Analysis Subsystem of City Price
4.1 The Data Acquisition Subsystem
4.2 The Data Management Subsystem
4.3 The Data Analysis Subsystem
4.4 The Data Decision Transmission Subsystem
5 Conclusion
References
Deep Learning: Potato, Sweet Potato Protection and Leafs Diseases Detections
1 Introduction
1.1 Literature Review
2 Methods
2.1 The Cassava Image Datasets Descriptions:
2.2 Approach
3 Conclusions
References
Social Distance Measurement and Face Mask Detection Using Deep Learning Models
1 Introduction
2 Related Work
3 System Methodology
3.1 Social Distancing Detection
3.2 Face Mask Detection
4 Performance Evaluation
4.1 Performance of People Detection
4.2 Performance of Overall Social Distance Measurement System
4.3 Performance of Face Mask Detection
5 Conclusion
References
Design and Analysis of Digital Compressed ECG Sensing Encoder for IoT Health Monitoring Devices
1 Introduction
2 Existing Compressed Sensing Methods
3 Compressed Sensing Based Ecg Encoder
4 Results and Discussion
5 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Proceedings of International Conference
✍ Roumen Kountchev (editor), Srikanta Patnaik (editor), Kazumi Nakamatsu (editor), 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book gathers selected papers presented at the International Conference on Artificial Intelligence and Communication Technologies (ICAICT2023), held at Shenzhen, China during June 2023. The first volume of the proceedings will focus on the newest methods and algorithms in smart wireless

Intelligent and Cloud Computing: Proceed
✍ Debahuti Mishra (editor), Rajkumar Buyya (editor), Prasant Mohapatra (editor), S 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book features a collection of high-quality research papers presented at the International Conference on Intelligent and Cloud Computing (ICICC 2021), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, during October 22–23, 2021. The book includes contributions

Smart Intelligent Computing and Applicat
✍ Suresh Chandra Satapathy (editor), Vikrant Bhateja (editor), Margarita N. Favors 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>The proceeding presents best selected papers presented at 5th International Conference on Smart Computing and Informatics (SCI 2020), held at Department of Computer Science and Engineering, Vasavi College of Engineering, Hyderabad, Telangana, India, during 17 – 18 September 2021. It presents a

Proceedings of International Conference
✍ Roumen Kountchev (editor), Srikanta Patnaik (editor), Kazumi Nakamatsu (editor), 📂 Library 📅 2024 🏛 Springer 🌐 English

<p><span>This book contains selected papers presented at the International Conference on Artificial Intelligence and Communication Technologies (ICAICT'23), held at Shenzhen, China in June 2023. This second volume of the proceedings is focused on new methods, algorithms and mathematical approaches,

Smart Intelligent Computing and Applicat
✍ Vikrant Bhateja (editor), Suresh Chandra Satapathy (editor), Carlos M. Travieso- 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>The proceeding presents best selected papers presented at 5th International Conference on Smart Computing and Informatics (SCI 2021), held at Department of Computer Science and Engineering, Vasvi College of Engineering, Hyderabad, Telangana, India, during 17 – 18 September 2021. It presents ad

Proceedings of International Conference
✍ Ramesh C. Bansal (editor), Akka Zemmari (editor), K. G. Sharma (editor), Jyoti G 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book gathers outstanding research papers presented in the International Conference on Computational Intelligence and Emerging Power System (ICCIPS 2021), held on March 9-10, 2021, at Engineering College Ajmer. ICCIPS 2021 is jointly organized by the Department of CSE and Department of EE,