<p><span>This book gathers selected papers presented at the International Conference on Machine Intelligence and Soft Computing (ICMISC 2021), organized by Koneru Lakshmaiah Education Foundation, Guntur, Andhra Pradesh, India during 22 â 24 September 2021. The topics covered in the book include the
Machine Intelligence and Soft Computing: Proceedings of ICMISC 2020 (Advances in Intelligent Systems and Computing, 1280)
â Scribed by Debnath Bhattacharyya; N. Thirupathi Rao
- Tongue
- English
- Leaves
- 504
- Category
- Library
No coin nor oath required. For personal study only.
⌠Table of Contents
Conference Committee Members
General Chair
Advisory Board
Editorial Board
Program Chair
Finance Committee
Technical Programme Committee
Keynote Speakers
Preface
Contents
About the Editors
A Comparative Study on Automated Detection of Malaria by Using Blood Smear Images
1 Introduction
2 Literature Review and Analysis of the Three Papers Considered
2.1 System Architecture Proposed
2.2 About the paper Computer Aided System for Red Blood Cell Classification in Blood Smear Image
2.3 About the Paper Automatic System for Classification of Erythrocytes Infected with Malaria and Identification of Parasites Life Stage
3 Comparison Between the Three Model Papers
4 Conclusions
References
A Survey on Techniques for Android Malware Detection
1 Introduction
2 Comparison Analysis
2.1 Different Detection Mechanisms
3 Conclusion
References
Comparative Analysis of Prevalent Disease by Preprocessing Techniques Using Big Data and Machine Learning: An Extensive Review
1 Introduction
1.1 Big Data
1.2 Machine Learning
1.3 Health Science Computing
2 Introduction
3 System Architecture
3.1 AUC-ROC Curve
3.2 Data Preprocessing
4 Results and Discussion
5 Conclusion
References
Prediction of Diabetes Using Ensemble Learning Model
1 Introduction
2 Literature Work
3 Learning Approaches Used for Prediction
4 Materials and Methods
5 Results and Discussion
6 Conclusion
References
Improve K-Mean Clustering Algorithm in Large-Scale Data for Accuracy Improvement
1 Introduction
2 Preprocessing of Data
2.1 Step of Preprocessing
3 Categorization of Major Clustering Methods
4 Applied Concept
5 Proposed Algorithm
5.1 Proposed Algorithm for k-means
5.2 Proposed Algorithm for k-medoids
6 Conclusion
Reference
A Novel Approach to Predict Cardiovascular Diseases Using Machine Learning
1 Introduction
2 Literature Review
3 Proposed System
3.1 Dataset Description
3.2 Information Pre-processing
3.3 Feature Selection
3.4 Cross-Validation
3.5 Classification
3.6 Receiver Operating Characteristic (ROC) Curve Evaluation
4 Results
5 Conclusion and Future Work
References
Comparative Analysis of Machine Learning Models on Loan Risk Analysis
1 Introduction
1.1 Detailed ML Algorithms
1.2 Problem Statement
1.3 Existing System
1.4 Proposed System
1.5 Benefits of Proposed System
2 Literature Review
3 Dataset
4 Case Study
5 Results
6 Conclusion
References
Compact MIMO Antenna for Evolving 5G Applications With Two/Four Elements
1 Introduction
2 Single Element Antenna Design
3 Two-Element MIMO Antenna Analysis
4 Four-Element MIMO Antenna Analysis
4.1 Side by Side Configuration
4.2 Up-Down Configuration
5 Conclusion
References
Accurate Prediction of Fake Job Offers Using Machine Learning
1 Introduction
2 Literature Review
3 Usage of Python With Machine Learning
4 Methodology
4.1 Description About Dataset
4.2 Procedure for Exploratory Data Analysis
4.3 Splitting of Data
4.4 Feature Engineering Techniques
4.5 Prediction Algorithms
5 Prediction Outcome
6 Results and Discussions
7 Conclusion and Future Enhancement
References
Emotion Recognition Through Human Conversation Using Machine Learning Techniques
1 Introduction
2 Literature Review
3 Research Problem Analysis
4 Methodology
5 Conclusion
References
Intelligent Assistive Algorithm for Detection of Osteoarthritis in Wrist X-Ray Images Based on JSW Measurement
1 Introduction
2 Related Works
3 Methodology
3.1 Input X-Ray Images
3.2 Image Pre-processing
3.3 ROI Detection
3.4 Edge Detection
3.5 Vector Height Measurement
3.6 JSW Measurement
3.7 Decision Making
3.8 Display Output
4 Proposed Algorithm
5 Experimental Result & Discussion
6 Conclusion and Future Scope
References
Blockchain Embedded Congestion Control Model for Improving Packet Delivery Rate in Ad Hoc Networks
1 Introduction
1.1 Reusing Box
1.2 Dim Box
1.3 Sandbox
2 Literature Survey
3 Proposed Method
4 Results
5 Conclusion
References
Predicting Student Admissions Rate into University Using Machine Learning Models
1 Introduction
2 Regression Algorithms
3 Methodology
3.1 Data Source and Contents
3.2 Data Preprocessing
3.3 Data Visualization
4 Data Analysis Using ML Algorithms
4.1 Multi-Linear Regression
4.2 Polynomial Regression
4.3 Decision Tree Regressor
4.4 Random Forest Regressor
5 Conclusion
References
ACP: A Deep Learning Approach for Aspect-category Sentiment Polarity Detection
1 Introduction
2 Related Work
3 Background and Motivation
3.1 Deep Learning Models for Sequence Learning
3.2 Word-Embeddings
4 Model Description
4.1 Problem Formulation
4.2 Dataset
4.3 Model Architecture
5 Experiments and Results
5.1 Experiment Phases
5.2 Effect of Word-Embeddings
5.3 Comparison with Different Models
6 Discussion and Conclusion
References
Performance Analysis of Different Classification Techniques to Design the Predictive Model for Risk Prediction and Diagnose Diabetes Mellitus at an Early Stage
1 Introduction
2 Materials and Methods
3 Dataset Description
4 Conclusion
References
Development of an Automated CGPBI Model Suitable for HEIs in India
1 Introduction
1.1 Importance of PBI Policy in New Arena of HFIs
2 Literature Review
3 Performance-Based Incentives Through Multi-Sources Assessment Approach
4 The Methodology of CGPBI Model Through the MSA Approach
4.1 Proposed Algorithm to Develop CGPBI Model
5 Conclusion
References
Range-Doppler ISAR Imaging Using SFCW and Chirp Pulse
1 Introduction
2 Problem Statement
3 Proposed Method
4 Simulation Results
5 Conclusion
Reference
Secure Communication in Internet of Things Based on Packet Analysis
1 Introduction
1.1 Man in the Middle Attack
2 Related Work
3 Proposed Work
4 Results and Discussions
5 Conclusion
References
Performance Investigation of Cloud Computing Applications Using Steady-State Queuing Models
1 Introduction
1.1 Cloud Data Centres
1.2 Queuing Systems
2 Problem Description and Solution
3 System Design
4 System Implementation
4.1 Queuing Models
5 Results and Discussion
6 Conclusions
References
AÂ Random Forest-Based Leaf Classification Using Multiple Features
1 Introduction
2 Related Works
3 The Proposed Method
3.1 Training Stage
3.2 Testing Stage
4 Experimental Result
5 Conclusion
6 Future Work
References
AÂ Two-Level Hybrid Intrusion Detection Learning Method
1 Introduction
2 Related Works
3 Dataset Properties
4 Proposed Method and Experimental Results
4.1 Data Preprocessing
4.2 Smote
4.3 Single-Level Method
4.4 Two-Level Method
5 Conclusion and Future Work
References
Supervised Learning Breast Cancer Data Set Analysis in MATLAB Using Novel SVM Classifier
1 Introduction
2 Literature Review
3 Materials and Methods
3.1 Linear SVM
4 Representation of Support Vectors
5 Results and Discussions
6 Conclusions and Recommendations
References
Retrieving TOR Browser Digital Artifacts for Forensic Evidence
1 Introduction
2 Background and Related Work
3 Finding the Artifacts After Browsing with TOR
3.1 Experimental Setup
3.2 Collection of Data
3.3 Analyzing the Memory Dumps
4 Results
5 Conclusions
References
Post-COVID-19 Emerging Challenges and Predictions on People, Process, and Product by Metaheuristic Deep Learning Algorithm
1 Introduction
2 Problem Formulation
3 Problem Solution
3.1 Process and Product Support for COVID-19
3.2 Metaheuristic Deep Learning Methodology (MHDL)
3.3 Experimental Result
4 Conclusion
References
An Analytics Overview & LSTM-Based Predictive Modeling of Covid-19: A Hardheaded Look Across India
1 Introduction
2 Trend Analysis for Different Parameters of COVID-19
2.1 Gender Trend Analysis
2.2 Age Class Trend Analysis
2.3 Survival Rate Analysis Based on Delay Time Between Symptom Onset and Treatment
3 Approximation of Number of Unreported Covid-19 Case
4 A Time Series Approach for COVID-19
5 ANN Based Predictive Modeling of Covid-19 in India
6 Conclusion
References
Studies on Optimal Traffic Flow in Two-Node Tandem Communication Networks
1 Introduction
2 Queuing Model
3 Optimal Policies of the Model
4 Arithmetical Analysis
5 Sensitivity Investigation
6 Conclusion
References
Design and Implementation of a Modified H-Bridge Multilevel Inverter with Reduced Component Count
1 Introduction
2 Proposed Topology
2.1 Working of Modified H-Bridge Inverter for Five Level
2.2 Operation
2.3 Working of Modified H-Bridge Inverter for Seven Level
2.4 Operation
3 Simulation Results
4 Mathematical Modeling
4.1 Conduction Loss
4.2 Switching Loss
5 Conclusion
References
Private Cloud for Data Storing and Maintain Integrity Using Raspberry Pi
1 Introduction
1.1 Theoretical Analysis
1.2 Cloud Computing Risks and Rewards
1.3 Components Overview
1.4 OwnCloud
2 Methodology
3 Implementation of OwnCloud on Raspberry Pi
4 Integrity in OwnCloud
4.1 Overview of Array Index Validation
5 Port Forwarding Concept for Global Access
5.1 Port Forwarding for OwnCloud
6 Conclusion
7 Future Scope
References
Prediction of Swine Flu (H1N1) Patientâs Condition Based on the Symptoms and Chest Radiographic Outcomes
1 Introduction
2 Materials and Methods
3 Study Design
4 Results
5 Conclusion
References
Low Energy Utilization with Dynamic Cluster Head (LEU-DCH)âFor Reducing the Energy Consumption in Wireless Sensor Networks
1 Introduction
1.1 Clustering
2 Proposed Protocol
2.1 Algorithm Explanation
3 Distribution of a Sensor Nodes in X and Y Coordinates
4 To Select the Total Number of Clusters in Given WSN
4.1 Average Silhouette Method
4.2 Elbow Method
5 Formation of Clusters (K = 2)
6 Selection of Cluster Head
7 Conclusion
References
Efficient Cryptographic Technique to Secure Data in Cloud Environment
1 Introduction
2 Issues in Cloud Security
2.1 Confidentiality
2.2 Integrity
2.3 Availability
3 Encryption Schemes
3.1 Homomorphic Encryption
3.2 Multiparty Computation
3.3 Paillier Key Encryption
4 Proposed Scheme
4.1 Paillier Key with Multiparty Computation (PMPC)
4.2 Applications
5 Result Analysis
6 Conclusion
7 Future Scope
References
Secure Information Transmission in Bunch-Based WSN
1 Introduction
2 Directing Protocols
3 Security Goals in MANET
4 Enter Management in MANET
5 Assaults on MANET
6 Proposed Model
7 Conclusion
References
Student Performance Monitoring System Using Decision Tree Classifier
1 Introduction
2 Literature Survey
3 Data Mining
4 Methods and Procedure
4.1 Warehouse Construction
4.2 Preprocessing
4.3 Classification
4.4 Rule Extraction Mining
5 Experimental Results
6 Conclusion
References
Smart Farming Using IoT
1 Introduction
2 Related Work
3 Internet of Things
4 Smart Farming
5 Conclusion
References
Novel Topology for Nine-Level H-Bridge Multilevel Inverter with Optimum Switches
1 Introduction
2 Novel Nine-Level Topology Operation
3 Pulse Width Modulation Scheme
4 Mathematical Modeling
5 Simulation Result and Discussion
6 Conclusion
References
Assessment of the Security Threats of an Institutionâs Virtual Online Resources
1 Introduction
2 Materials and Methods
3 Results and Discussions
4 Conclusions
References
Risk Prediction-Based Breast Cancer Diagnosis Using Personal Health Records and Machine Learning Models
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Experimental Setup
3.2 Outlier Identification
3.3 Preprocessing
4 Classification Techniques
4.1 k-Fold Cross-validation
4.2 Performance Evaluation
5 Result Analysis
5.1 Risk Prediction
5.2 Disease Prediction
6 Conclusion
References
Orthogonal MIMO 5G Antenna for WLAN Applications
1 Introduction
2 Antenna Geometry and Design
2.1 Single Antenna Design and Analysis
3 Two-Element MIMO Antenna Design and Analysis
3.1 Two-Element MIMO Antenna Discussion
3.2 Two-Element Orthogonal MIMO Antenna Result Discussion
4 Space Diversity of MIMO Antenna Result Discussion
4.1 Orthogonal MIMO Antenna Result Discussion
5 Conclusion
References
Usage of KNN, Decision Tree and Random Forest Algorithms in Machine Learning and Performance Analysis with a Comparative Measure
1 Introduction
2 Machine Learning Perspective
2.1 KNN Intuitions
2.2 Decision Tree Intuitions
2.3 Random Forest Intuitions
3 Algorithms Performance Estimation
4 Conclusion and Future Scope
References
Bank Marketing Using Intelligent Targeting
1 Introduction
2 Background Work
3 Objectives of the Bank Sector
3.1 Marketing ideas regarding Banking Applications
3.2 In Banking Sector: Marketing Strategy
4 Bank Dataset Preparation
5 Results and Analysis
6 Summary on Distribution of Data Based upon Various Attributes Available
7 Conclusion
References
Machine Learning Application in the Hybrid Optical Wireless Networks
1 Introduction
1.1 Motivation and Contribution
2 Previous Work
2.1 Traffic Classification
2.2 Placement of Network Devices
2.3 Failure Handling
2.4 Intrusion Detection
3 Challenges
4 Future Directions
5 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<span>This book features a collection of high-quality, peer-reviewed papers presented at the Sixth International Conference on Intelligent Computing and Communication (ICICC 2022) organized by Department of Computer Science and Engineering, G. Narayanamma Institute of Technology and Science (for wom
<span>This book features a collection of high-quality, peer-reviewed papers presented at the Third International Conference on Intelligent Computing and Communication (ICICC 2019) held at the School of Engineering, Dayananda Sagar University, Bengaluru, India, on 7 â 8 June 2019. Discussing advanced
<p>This book focuses on the integration of intelligent communication systems, control systems and devices related to all aspects of engineering and sciences. It includes high-quality research papers from the 4th International Conference on Intelligent Communication, Control and Devices (ICICCD 2020)
<p><span>This book focuses on the integration of intelligent communication systems, control systems and devices related to all aspects of engineering and sciences. It includes high-quality research papers from the 4th International Conference on Intelligent Communication, Control and Devices (ICICCD
<span>Soft computing techniques open significant opportunities in several areas, such as industry, medicine, energy, security, transportation, and education. This book provides theory and applications development using soft computing techniques by organizing intelligent systems for many applications