𝔖 Scriptorium
✩   LIBER   ✩

📁

Machine Learning and Information Processing: Proceedings of ICMLIP 2019

✍ Scribed by Debabala Swain; Prasant Kumar Pattnaik; Pradeep K. Gupta


Publisher
Springer Nature
Year
2020
Tongue
English
Leaves
533
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book includes selected papers from the International Conference on Machine Learning and Information Processing (ICMLIP 2019), held at ISB&M School of Technology, Pune, Maharashtra, India, from December 27 to 28, 2019. It presents the latest developments and technical solutions in the areas of advanced computing and data sciences, covering machine learning, artificial intelligence, human–computer interaction, IoT, deep learning, image processing and pattern recognition, and signal and speech processing.

✩ Table of Contents


Organization
Chief Patron
Patron
Steering Committee
General Chairs
Technical Program Committee Chair
Convener
Organizing Chairs
Organizing Secretaries
Organizing Committee
Finance Chair
Technical Program Committee
Preface
Contents
About the Editors
Mobile Device Transmission Security Policy Decision Making Using PROMETHEE
1 Introduction
2 Need for MCDM
3 Literature Review
3.1 MCDM Procedure
4 An Analogy
4.1 Criteria
4.2 Result Analysis
5 Conclusion
References
Stress Detection in Speech Signal Using Machine Learning and AI
1 Introduction
2 Databases for Stress Detection in Speech
2.1 Berlin Database
2.2 Toronto Emotional Speech Set Database (TESS)
2.3 Database Developed
3 Machine Learning and AI-Based Stress Classifier Algorithm
3.1 Machine Learning and AI-Based Stress Classifier
3.2 The MLUTs Are Filled Using the Following Algorithm
3.3 Elimination of Noise from Speech
4 Results
4.1 ANN Classifiers
4.2 Stress Detection
4.3 Detection of Stress Types
4.4 Stress Detection Based on Gender
4.5 Network Results of GDM with FitNet and Adaptive Filtering
4.6 APIA Percentage Sensitivity of Classifiers for Stress Classification
5 Conclusions
References
e-Classroom Using IOT to Revolutionize the Classical Way of Knowledge Sharing
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Attendance Record
3.2 Speech Controlled Slide Navigation
3.3 Resource Management
3.4 Record Keeping of Lecture Notes (e-Notes)
4 Experimental Setup and Results
5 Conclusion
References
An Efficient Heart Disease Prediction System Using Machine Learning
1 Introduction
2 Literature
3 Logistic Regression
4 Dataset Description
5 Proposed System
5.1 Data Cleaning
5.2 Data Dimensionality Reduction
5.3 Correlation Identification
5.4 Flowchart
5.5 Algorithm
6 Performance Analysis
7 Conclusion and Future Scope
References
Automatic Helmet Detection in Real-Time and Surveillance Video
1 Introduction
2 Related Work
3 Proposed Methodology
4 Activation Function
5 Performance Analysis and Result
6 Conclusion
References
Camera Model Identification Using Transfer Learning
1 Introduction
2 Literature Review
2.1 SmallNet Based Neural Network
2.2 Feed-Forward Neural Network
3 CNN Architecture
3.1 Transfer Learning
3.2 Experimental Details
4 Conclusion
References
Sentiment Classification of Online Mobile Reviews Using Combination of Word2vec and Bag-of-Centroids
1 Introduction
2 Related Work
3 Proposed Method
3.1 Data Description
3.2 Steps of the Proposed Method
4 Experimental Results and Discussion
References
Emotion Analysis to Provide Counseling to Students Fighting from Depression and Anxiety by Using CCTV Surveillance
1 Introduction
2 Related Works
3 Basic Concepts
3.1 Haar Cascade Algorithm
3.2 Local Binary Patterns (LBP)
4 Proposed System Architecture
4.1 Face Recognition
4.2 Face Identification
4.3 Emotion Analysis
4.4 Feedback Generation
5 Conclusion and Future Work
References
Reconstructing Obfuscated Human Faces with Conditional Adversarial Network
1 Introduction
2 Related Work
3 Method
3.1 Objective
3.2 Network Architecture
4 Dataset
5 Experiment
5.1 Analysis of Generator Architecture
5.2 Analysis of Discriminator Architecture
6 Evaluation
6.1 For 7 × 7 Kernel Size
6.2 For 9 × 9 Kernel Size
6.3 For 11 × 11 Kernel Size
6.4 For 7 × 7 Kernel Size
6.5 For 9 × 9 Kernel Size
7 Conclusion
References
A Proposed Wireless Technique in Vehicle-to-Vehicle Communication to Reduce a Chain of Accidents Over Road
1 Introduction
2 Background Study
3 Related Work
4 Proposed Architecture
5 Conclusion
References
Virtual Conversation with Real-Time Prediction of Body Moments/Gestures on Video Streaming Data
1 Introduction
2 Related Work
3 Solution Approach
3.1 Hand Gesture/Movement Detection
3.2 Other Body Movements’ Detection
3.3 The Role of Gesture/Body Movements on Virtual Conversation
4 Real-Time Generation of Body Movements for Virtual Machine Understanding
5 Application of Human Body Movements on Virtual Machines
6 Conclusions and Future Work
References
Automatic Diagnosis of Attention Deficit/Hyperactivity Disorder
1 Introduction
2 Related Work
3 Proposed Model
3.1 Test 1: Completing Task
3.2 Test 2: Audio Questionnaire
3.3 Test 3: Responding to Audio and Visuals
3.4 Test 4: Questionnaire for Informants
4 Experimentation
5 Conclusion and Future Scope
References
Classification of Types of Automobile Fractures Using Convolutional Neural Networks
1 Introduction
2 Convolutional Neural Network
2.1 Architecture
2.2 Model Description and CNN Training
3 Experimental Analysis and Results
3.1 Dataset
3.2 Architecture
4 Conclusion
References
A Subjectivity Detection-Based Approach to Sentiment Analysis
1 Introduction
2 Related Work
3 Proposed Approach
4 Experiments
5 Conclusion and Future Scope
References
Image Processing and Machine Learning Techniques to Detect and Classify Paddy Leaf Diseases: A Review
1 Introduction
2 Disease Detection and Classification
2.1 Preprocessing-Based Approaches
2.2 Segmentation-Based Approaches
2.3 Feature Extraction-Based Approaches
2.4 Classifier-Based Approaches
2.5 Application of Techniques in Research Work
3 Comparative Analysis
4 Conclusion
References
A Comparative Study of Classifiers for Extractive Text Summarization
1 Introduction
2 Related Works
3 Proposed Method
4 Experimental Setup and Result Analysis
5 Conclusion and Future Work
References
Capabilities of Chatbots and Its Performance Enhancements in Machine Learning
1 Introduction
2 Components of Chatbot Architecture
3 Machine Learning and Chatbots
4 Benefits of Chatbots
5 Drawbacks of Chatbots
6 Conclusion
References
A Deep Learning-Based Approach for Predicting the Outcome of H-1B Visa Application
1 Introduction
2 Literature Review
3 Problem
3.1 Problem Statement
3.2 Approach
4 Dataset and Data Pre-processing
4.1 Chosen Attributes
4.2 Removing Outliers
4.3 Balancing Dataset
4.4 One-Hot Encoding
4.5 Normalization
5 Experiments
5.1 Training and Testing
5.2 Results
6 Future Scope
References
Data Leakage Detection and Prevention: Review and Research Directions
1 Introduction
2 Data Leakage Detection and Prevention
2.1 Phases of DLDP System
2.2 Characterizing DLDP Systems
3 Literature Review
4 Challenges and Research Directions
5 Conclusions
References
A Blockchain Based Model to Eliminate Drug Counterfeiting
1 Introduction
2 Background
3 Fake Drugs and Their Entry into the Supply Chain
3.1 Challenges Posed by Fake Drugs
3.2 Challenges in the Drug Supply Chain
4 Blockchain: The Solution
5 Proposed Model
6 Conclusion
References
A Comparative Analysis of Predictive Modeling Techniques: A Case Study of Device Failure
1 Introduction
2 Literature
3 Dataset
4 Proposed System
4.1 Proposed Algorithm
4.2 Model Details
5 Results
6 Conclusion
References
Python and OpenCV in Automation of Live Surveillance
1 Introduction
2 Object Detection
3 Image Processing
4 Haar Cascade [2]
4.1 Haar-Like Feature and Viola–Jones
4.2 Mathematical Model
5 Literature Review
6 Methodology
6.1 Collection of Images
6.2 Cropping and Marking Positives
6.3 For Creation of Vector File
6.4 Training
7 Experimental Setup
8 Results and Conclusion
9 Future Scope
References
Privacy Preservation in ROI of Medical Images Using LSB Manipulation
1 Introduction
2 Image Security Techniques
2.1 Watermarking
2.2 Steganography
2.3 Reversible Data Hidings
2.4 Region-Based Analysis
3 Data Hiding Techniques Using ROI Analysis
3.1 ROI Lossless Colored Medical Image Watermarking Scheme with Secure Embedding of Patient Data
3.2 Watermarking and Encryption in Medical Image Through ROI Lossless Compression
3.3 A Novel Medical Image Watermarking Technique for Detecting Tampers Inside ROI and Recovering Original ROI
4 Proposed ROI Hiding Algorithm
4.1 ROI Selection and Data Hiding
4.2 ROI Selection and Data Recovery
5 Experimental Results
6 Conclusion and Future Works
References
Novel Approach for Measuring Nutrition Values Using Smartphone
1 Introduction
1.1 Novel Approach
2 Approach (TensorFlow)
3 Graphs for MobileNets and Inception
4 Implementation
5 Conclusion
References
Detection of Hate Speech in Hinglish Language
1 Introduction
2 Related Work
3 Dataset Collection
4 Proposed Methodology
4.1 System Workflow Overview
4.2 LSTM Architecture
4.3 System Workflow (In Detail)
5 Performance Analysis
6 Conclusion and Future Scope
References
Enhancing Multi-level Cache Performance Using Dynamic R-F Characteristics
1 Introduction
2 Background
3 Proposed Work
3.1 Working
4 Performance Analysis
4.1 Input Traces
4.2 Simulation Results
5 Summary
References
Denoising Documents Using Image Processing for Digital Restoration
1 Introduction
2 Literature Review
2.1 Image Inpainting
2.2 Optical Character Recognition (OCR)
3 Proposed Methodology
3.1 Median Filter
3.2 Noise Subtraction
3.3 Histogram Approach
3.4 Image Segmentation
3.5 Salt-and-Pepper Noise Reduction
4 Conclusion
5 Future Scope
References
Humming-Based Song Recognition
1 Introduction
2 Background
3 System Overview
4 Implementation Phases
4.1 Data Collection Phase
4.2 Data Conversion Phase
4.3 Model Training Phase
5 Performance Analysis
6 Experimental Results
7 Future Scope
8 Conclusion
References
A New Data Structure for Representation of Relational Databases for Application in the Normalization Process
1 Introduction
2 Related Work
3 Node Structure for Relational Tree
4 Advantages of Trees Over Linked List
5 Working Principle Along with and Example
5.1 Temporary Storage of Attributes and Functional Dependencies of a Relational Schema
5.2 Automatic Key Detection
5.3 Linked List Formation for Key
5.4 Relational Tree Formation
6 Comparison of Relational Tree with Previous Tools
7 Conclusion
8 Future Scope
References
Real Drowsiness Detection Using Viola–Jones Algorithm in Tensorflow
1 Introduction
2 Drowsiness Detection Techniques
2.1 Electrocardiogram and Electroencephalogram
2.2 Local Binary Patterns
2.3 Steering Wheel Motion
2.4 Visual Detection
2.5 Eye Blinking-Based Approach
3 Implementation for the System
3.1 Pseudo Code
3.2 Image Capturing
3.3 Alert Stage
3.4 Viola–Jones’ Algorithm Significance
4 Calculating the EAR (Eye Aspect Ratio)
5 Results
6 Conclusions
References
Smart Sound System Controller for Restricted Zones
1 Introduction
2 Motivation
3 Literature Survey
4 Proposed System
4.1 Working of Proposed Model
4.2 Flow of the System
4.3 Working of the Protocols
4.4 Devices Used
4.5 Experimentation
5 Result
6 Conclusion
References
Predictive Analysis of Co-seismic Rock Fall Hazard in Hualien County Taiwan
1 Introduction
1.1 Study Area and Seismicity
2 Methodology
2.1 Rockfall Software-Based Analysis
2.2 Generating the Artificial Accelerogram Using SeismoArtif Platform
2.3 Predictive Model Based on Newmark’s Methodology
3 Results and Discussion
4 Conclusion
References
Abstractive Text Summarization and Unsupervised Text Classifier
1 Introduction
2 Related Works
3 Summarization Algorithm
4 Classifier Algorithm
5 Experimental Studies
6 Results and Discussion
7 Conclusion and Future Work
References
Image Classification Using Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN): A Review
1 Introduction
2 Image Analysis and Classification
3 Overview of CNN
4 Overvıew of RNN
5 Literature Survey
5.1 Literature Survey on CNN
5.2 Literature Survey on RNN
6 Conclusion
References
Analysis of Steganography Using Patch-Based Texture Synthesis
1 Introduction
2 Related Work
3 Methodology
4 Result and Discussion
5 Conclusion and Future Work
References
Non-invasive Approach for Disease Diagnosis
1 Introduction
1.1 E-nose—Sensor Technologies
2 Breath Analysis
2.1 Breath Background Correction Importance
3 State of the Art
3.1 Diabetes
3.2 Lung Cancer
3.3 Childhood Asthma
4 Literature Survey
5 Future Directions in E-Nose Technology Research
5.1 Respiratory Disease
5.2 Heart Failure
5.3 Chronic Liver Diseases
6 Conclusions
References
Alleviation of Safety Measures in Underground Coal Mines Using Wireless Sensor Network: A Survey
1 Introduction
2 UG Mines: An Insight
2.1 Potential Impact of Underground Mining
3 Sensor Nodes and Types
3.1 Low Power Embedded Processor
3.2 Memory
3.3 Radio Transceiver
3.4 Sensors
3.5 Geo-positioning System
4 Systematic Review Process
4.1 Review Result
5 Research Challenges Faced in WSN
5.1 Energy
5.2 Communication and Routing
5.3 Security
5.4 Efficient OS
5.5 Hardware and Software Issues
6 Scope of WSN in UG Mining
6.1 Cognitive Sensing
6.2 Spectrum Management
6.3 Underwater Acoustic Sensor System
6.4 Coordination in Heterogeneous Network
6.5 Hole Problem
7 Conclusion
References
Automation of Reliability Warranty Report Using SAS Software for Data Analysis
1 Introduction
1.1 Related Work
1.2 Contributions of This Work
2 Proposed Work
3 Conclusion
References
A Critical Analysis of Brokering Services (Scheduling as Service)
1 Introduction
2 Basic Concepts and Background
2.1 Brokering
2.2 Components of Brokering
2.3 The Need for Cloud Brokering
2.4 Cloud Brokering Techniques
2.5 Challenges
2.6 Cloud Broker Services
3 Scheduling as Brokering Service
3.1 Scheduling Operation
3.2 Survey of Scheduling as Service in Cloud of Things
4 Case Study (Min-Min Algorithm)
4.1 Process Scheduling
4.2 Performance Evaluations
5 Conclusion
References
Application of Neural Networks in Model Updation Using Frequency Response and Radial Basis Function Network
1 Introduction
2 Problem Statement
3 Method of Solution
3.1 Radial Basis Function
4 Normalization and choice of the spread constants
5 Sensitivity of FRFs with Respect to Parameter Changes
6 Conclusion
References
A Review on SLA-Based Resource Provisioning in Cloud
1 Introduction
2 Provisioning of Resources in Cloud Computing
3 System Architecture Supporting SLA-Oriented Resource Provisioning in Cloud
4 Comparison of Various Resource Provisioning Techniques
5 Architectures Used
6 Conclusion and Future Work
References
An Extensive Study on Medical Image Security with ROI Preservation: Techniques, Evaluations, and Future Directions
1 Introduction
2 Security Issues in Medical Images
3 Related Works
3.1 A Novel Robust Reversible Watermarking Scheme for Protecting the Authenticity and Integrity of Medical Images [3]
3.2 A ROI-Based Reversible Data Hiding Scheme in Encrypted Medical Images [4]
3.3 Secure Telemedicine Using RONI Halftoned Visual Cryptography Without Pixel Expansion [5]
4 Performance Evaluation Parameters
4.1 Peak Signal-to-Noise Ratio (PSNR)
4.2 Structural Similarity Index Measure (SSIM)
4.3 Payload Capacity
5 Comparative Review on ROI Preservation Technique
6 Conclusion
References
A Competitive Analysis on Digital Image Tamper Detection and Its Secure Recovery Techniques Using Watermarking
1 Introduction
2 Digital Watermarking Essentials
3 Performance Measuring Parameters of Watermarking Algorithms
3.1 Peak Signal to Noise Ratio (PSNR)
3.2 The Mean Square Error (MSE)
3.3 Structural Similarity Index Measure (SSIM)
3.4 Payload Capacity
4 Literature Review
5 Conclusion
References
Elliptic Curve Cryptography-Based Signcryption Scheme with a Strong Designated Verifier for the Internet of Things
1 Introduction
2 Preliminaries
3 Formal Model of Signcryption
4 Proposed Scheme
5 Security Analysis of the Proposed Scheme
5.1 Correctness
5.2 Security Proof
6 Conclusion
References
Performance of C++ Language Code in Quantum Computing Environment
1 Introduction
2 Quantum Computing Environment
3 Need of a Quantum Computing Environment
4 Advantages and Disadvantages of a Quantum Computing
4.1 Advantages
4.2 Disadvantages
5 Performance of Quantum Computing Over Sequential Computing
6 Result Analysis
7 Conclusion
References
Retrieval of Ontological Knowledge from Unstructured Text
1 Introduction
2 Ontology Formation Process
3 Mathematical Modeling of Ontology Formation Process
4 Literature Review
4.1 Classification of Unstructured Data
4.2 Attribute Association Modeling Using Taxonomic Relations
4.3 Attribute Association Modeling Using Non-taxonomic Relations
4.4 Generation of Information Tables
4.5 Graphical Visualization of Ontology
4.6 File System-Based Search
4.7 Graph-Based Search
5 Conclusion
References
Critical Non-functional Requirements Modeling Profiler with Meta-Model Semantics
1 Introduction
2 The Unified Modeling Language Context
3 Knowledge Engineering Dimensions
3.1 Types and Values
3.2 Basic Types
3.3 Variables, Attributes, Parameters
3.4 Classes and Instances
3.5 Attribute Access
4 Non-functional Requirements Notation Catalog
4.1 Availability
4.2 Efficiency
4.3 Flexibility
4.4 Performance
5 Conclusion
References
Some Routing Schemes and Mobility Models for Real Terrain MANET
1 Introduction
2 MANET Mobility Models
2.1 Random-Based Node Movement
2.2 Time-Related Dependencies in Movement
2.3 Group Dependencies
2.4 Geographic and Obstacles Restrictions
3 Routing Protocol Generation Used in MANET
3.1 MANET Protocols
3.2 First-Generation MANET Protocols
3.3 Second-Generation MANET Routing Protocol
3.4 Obstacle Aware Routing
4 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Machine Learning and Information Process
✍ Debabala Swain (editor), Prasant Kumar Pattnaik (editor), Tushar Athawale (edito 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book includes selected papers from the 2nd International Conference on Machine Learning and Information Processing (ICMLIP 2020), held at Vardhaman College of Engineering, Jawaharlal Nehru Technological University (JNTU), Hyderabad, India, from November 28 to 29, 2020. It presents the lat

Advances in Machine Learning and Signal
✍ Ping Jack Soh, Wai Lok Woo, Hamzah Asyrani Sulaiman, Mohd Azlishah Othman, Mohd 📂 Library 📅 2016 🏛 Springer International Publishing 🌐 English

<p>This book presents important research findings and recent innovations in the field of machine learning and signal processing. A wide range of topics relating to machine learning and signal processing techniques and their applications are addressed in order to provide both researchers and practiti

Advances in Machine Learning and Computa
✍ Srikanta Patnaik, Xin-She Yang, Ishwar K. Sethi 📂 Library 📅 2021 🏛 Springer Singapore;Springer 🌐 English

<p><p></p><p>This book gathers selected high-quality papers presented at the International Conference on Machine Learning and Computational Intelligence (ICMLCI-2019), jointly organized by Kunming University of Science and Technology and the Interscience Research Network, Bhubaneswar, India, from Ap

Machine Intelligence and Signal Processi
✍ Sonali Agarwal (editor), Shekhar Verma (editor), Dharma P. Agrawal (editor) 📂 Library 📅 2020 🏛 Springer-Nature New York Inc 🌐 English

<div><p>This book features selected high-quality research papers presented at the International Conference on Machine Intelligence and Signal Processing (MISP 2019), held at the Indian Institute of Technology, Allahabad, India, on September 7–10, 2019. The book covers the latest advances in the fiel

Information Management and Machine Intel
✍ Dinesh Goyal, Valentina Emilia BălaƟ, Abhishek Mukherjee, Victor Hugo C. de Alb 📂 Library 📅 2021 🏛 Springer Singapore;Springer 🌐 English

<p><p>This book features selected papers presented at the International Conference on Information Management and Machine Intelligence (ICIMMI 2019), held at the Poornima Institute of Engineering & Technology, Jaipur, Rajasthan, India, on December 14–15, 2019. It covers a range of topics, including d

Speech and Language Processing for Human
✍ S. S. Agrawal,Amita Devi,Ritika Wason,Poonam Bansal (eds.) 📂 Library 📅 2018 🏛 Springer Singapore 🌐 English

<p><p>This volume comprises the select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volumes cover diverse topics ranging from communications netw