This book includes selected papers from the International Conference on Machine Learning and Information Processing (ICMLIP 2019), held at ISB&M School of Technology, Pune, Maharashtra, India, from December 27 to 28, 2019. It presents the latest developments and technical solutions in the areas of a
Machine Learning and Information Processing: Proceedings of ICMLIP 2020 (Advances in Intelligent Systems and Computing, 1311)
â Scribed by Debabala Swain (editor), Prasant Kumar Pattnaik (editor), Tushar Athawale (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 592
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book includes selected papers from the 2nd International Conference on Machine Learning and Information Processing (ICMLIP 2020), held at Vardhaman College of Engineering, Jawaharlal Nehru Technological University (JNTU), Hyderabad, India, from November 28 to 29, 2020. It presents the latest developments and technical solutions in the areas of advanced computing and data sciences, covering machine learning, artificial intelligence, humanâcomputer interaction, IoT, deep learning, image processing and pattern recognition, and signal and speech processing.
⌠Table of Contents
Preface
Contents
About the Editors
Conference Committee
Chief Patrons
Patron
Program Committee
General Chair
General Co-chair
Technical Program Committee Chair
Special Session Chairs
Organizing Chairs
Organizing Committee
Finance Chair
Technical Program Committee
Smart Queue Shopping Using RFID System
1 Introduction
2 Literature Review
3 Methodology/Experimental
3.1 Components
3.2 Algorithm
3.3 Protocol
4 Results and Discussion
4.1 Bill Display Procedure
4.2 Inventory Product Entry to the Database
5 Limitations
6 Conclusion
References
Prediction and Classification of Biased and Fake News Using NLP and Machine Learning Models
1 Introduction
2 Literature Survey
3 Dataset Description
4 Proposed Model
4.1 Detection of Bias in a News Article
4.2 Classification of Fake News Articles
5 Model Details
5.1 Confusion Matrix
5.2 Naïve Bayes for Fake News Classification
5.3 Passive-Aggressive Classifier for Fake News
6 Experimentation
7 Conclusion
References
Smart Leaf Disease Detection Using Image Processing
1 Introduction
2 Materials and Methods
2.1 Dataset
2.2 Methodology
2.3 Drone
2.4 Image Preprocessing
2.5 Classification
3 Model of Internal Working
4 Results
5 Related Work
References
Unsupervised Image Generation and Manipulation Using Deep Convolutional Adversarial Networks
1 Introduction
1.1 Literature Survey
1.2 Problem Statement and Applicability
2 Approach and Methodology
2.1 Proposed Model Based on DCGAN
3 Experiments
3.1 Datasets and Evaluation Measurements
4 DCGAN Model
5 Experimental Results
5.1 Super Resolution
5.2 Denoising
5.3 Deconvolution
6 Conclusion
References
A Suicide Prediction System Based on Twitter Tweets Using Sentiment Analysis and Machine Learning
1 Introduction
1.1 Goal
2 Related Works
3 Research Methodology
3.1 Defining a Data and Dataset Creation
3.2 Data Preprocessing
3.3 Model Training
3.4 Model Testing
3.5 Feature Extraction
4 Data Analysis and Results
4.1 Common Terminologies
4.2 Accuracy of All Algorithms
5 Conclusion and Future Work
References
Video Categorization Based on Sentiment Analysis of YouTube Comments
1 Introduction
2 Related Work
3 Proposed Method
4 Experiments
5 Conclusion
References
Credit Score Prediction Using Machine Learning
1 Introduction
2 Literature Review
3 Dataset
3.1 Dataset Pre-Processing
4 K-Nearest Neighbor (KNN) Algorithm
5 Methodology
5.1 Dataset Splitting
5.2 Finding Best K Value
5.3 Training and Testing Dataset
5.4 ROCâAUC Curve
6 Analysis
7 Result
7.1 Confusion Matrix
7.2 Precision
7.3 Recall
7.4 F1 Score
7.5 Accuracy
8 Future Work
9 Conclusion
References
Stock Market Prediction Using Long Short-Term Memory Model
1 Introduction
2 Literature Review
3 Neural Network Architecture
3.1 LSTM Model
4 Methodology
4.1 Dataset
4.2 Parameter Setup
4.3 Root Mean Square Error
4.4 Training Detail
5 Result
6 Conclusion
References
Efficient Management of Web Personalization Through Entropy and Similarity Analysis
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Results and Discussions
4.1 Performance Evaluation Based on Precision and Recall
5 Conclusion and Future Scope
References
Artistic Media Stylization and Identification Using Convolution Neural Networks
1 Introduction
1.1 Artistic Media Stylization
2 Literature Survey
2.1 Artist Identification
3 Problem Statement and Applicability
4 Approach and Methodology
4.1 Deep Representation of Image
4.2 Fast Style Transfer
4.3 Conditional Instance Normalized
4.4 Conditional Input Vector
4.5 Using Dilated CNNs
5 Style Transfer Model and Artist Identification
5.1 Proposed Models
5.2 Style Transfer Model
6 Results
6.1 Single Style
6.2 Mixed Style
6.3 Dilated CNNâs
7 Experimental Metrics
7.1 Result Metrics
7.2 Artistic Identification of Stylized Images
8 Conclusion
References
Performance Analysis of Different Models for Twitter Sentiment
1 Introduction
2 Dataset
3 Data Preparation
4 Data Splitting
5 Feature Extraction
5.1 N-grams
5.2 Count Vectorizer
5.3 TFIDF Vectorizer
6 Model Comparison
6.1 Logistic Regression
7 Performance Analysis
8 Conclusion
References
Electricity Forecasting Using Machine Learning: AÂ Review
1 Introduction
2 Electricity Load Forecasting
3 Literature Survey
4 Result
5 Conclusion
References
End to End Learning Human Pose Detection Using Convolutional Neural Networks
1 Introduction
2 Literature Review
3 Methodology
3.1 Pose Estimation
3.2 3D Reconstruction
4 Result
5 Conclusion
References
Conference Paper Acceptance Prediction: Using Machine Learning
1 Introduction
2 Literature Review
3 Dataset and Features
3.1 Dataset
3.2 Features
4 System Diagram
5 Working
5.1 Information Extraction
5.2 Data Preprocessing
6 Implementation
6.1 Model Training and Testing
6.2 Result Analyses
7 Conclusions and Future Scope
References
Object Identification and Tracking Using YOLO Model: A CNN-Based Approach
1 Introduction
2 Problem Statement
3 Architecture of the Proposed Model
4 Implementation
4.1 Algorithm for Object Detection System
5 Results and Analysis
5.1 Test Cases
5.2 Results
6 Conclusions and Future Work
References
Real-Time Hands-Free Mouse Control for Disabled
1 Introduction
2 Literature Review
3 Proposed System
4 Dataset Used
5 Code and Requirements
5.1 Hardware
5.2 Software
6 Algorithm
7 Methodology
8 Design and Implementation
9 Working and Experimentation
10 Conclusion and Future Scope
References
Accounting Fraud Detection Using K-Means Clustering Technique
1 Introduction
2 K-Means Clustering Technique
2.1 Algorithm for K-Means Clustering
3 Proposed Model
3.1 Workflow
4 Implementation and Results
5 Conclusion and Future Scope
References
Transforming the Lives of Socially Dependent to Self-dependent Using IoT
1 Introduction
2 IoT as Ultimate Healthcare Solution
3 IoT in Promoting Independent Living
3.1 Elderly Care
3.2 Persons With Disability (PWD) Care
3.3 Personal Movement Monitoring
3.4 Improving Autonomy
4 IoT-Based Architecture for Data Analysis
5 Feature Comparison Between Prior Art and Proposed Approach
6 Conclusion and Future Aspects
References
Enforcement an Evidence and Quality of Query Services in the Cost-Effective Cloud
1 Introduction
1.1 Related Data
2 Related Works
3 Proposed System
4 Implementation
5 Conclusion
References
A Machine Learning Approach Towards Increased Crop Yield in Agriculture
1 Introduction
2 Literature Survey
3 Machine Learning in Agriculture
4 Proposed Methodology
4.1 Processing Dataset
4.2 Proposed Workflow
4.3 Multiple Linear Regression
4.4 Decision Tree Regression
4.5 Random Forest Algorithm
5 Experimental Analysis and Results
6 Conclusion
References
Resume Screening Using Natural Language Processing and Machine Learning: A Systematic Review
1 Introduction
2 Information Extraction Methods
3 Resume Parsers
3.1 Open-Source Resume Parser
3.2 Commercial Resume Parsers
4 Semantic Searches for Context-Based Searching
5 Research Challenges and Future Scope
6 Conclusions
References
Assessment of Osteogenic Sarcoma with Histology Images Using Deep Learning
1 Introduction
2 Literature Survey
3 Proposed System Workflow
3.1 Data Collection, Preparation, and Pre-processing
3.2 Support Vector Machine (SVM)
3.3 Random Forest (RF)
4 Implementation
4.1 Deep Learning
4.2 Proposed CNN
4.3 Algorithm
5 Results
5.1 Evaluation
6 Conclusion
References
SMDSB: Efficient Off-Chain Storage Model for Data Sharing in Blockchain Environment
1 Introduction
2 Related Work
3 Storage Model for Data Sharing in Blockchain (SMDSB)
4 Methodology
4.1 Transaction and Peer Security
5 Implementation
6 Transaction Size Analysis in Terms of Storage Cost
7 Conclusion and Future Enhancement
References
Ray Tracing Algorithm for Scene Generation in Simulation of Photonic Mixer Device Sensors
1 Introduction
2 Simulation Process
3 Algorithm for Ray Tracing
4 Experimental Results
5 Proposed Algorithm
6 Conclusions
References
A Study of Quality Metrics in Agile Software Development
1 Introduction
2 Agile Methodology
3 Software Quality Metrics
4 Research Methodologly
4.1 Determining Research Questions
4.2 Search Process
5 Literature Review
5.1 Discussion on Findings
5.2 GQM Method
5.3 Socially Construction Approach
6 Conclusion
References
Optimization of Ray-Tracing Algorithm for Simulation of PMD Sensors
1 Introduction
1.1 Related Works
1.2 PMD Technology
2 Parallel Ray-Tracing Algorithm
3 Optimization
3.1 Memory Optimization
3.2 Instruction and Control Flow Optimization
3.3 Kernel Construction Algorithms
4 Comparison of Results
5 Conclusion
References
Real-Time Object Detection for Visually Challenged
1 Introduction
2 Literature Review
3 Proposed System
3.1 Proposed Architecture
3.2 System
4 Methodology/Experimental
4.1 Tensorflow APIs
4.2 Data Processing
4.3 Object Detection Algorithm
4.4 Depth Estimation
4.5 Voice Generation Module
4.6 Testing
5 Results
5.1 Cup
5.2 Remote
5.3 Bed
5.4 Chair
5.5 Tv
5.6 Accuracy of the Objects Detected Above
5.7 Console View
6 Conclusion
References
Reinforcement Learning: AÂ Survey
1 Introduction
2 Key Features
2.1 How is Reinforcement Learning Different from Supervised Learning [6] and Unsupervised Learning [7]
2.2 Algorithms Used in Reinforcement Learning
3 Types of Reinforcement Learning
3.1 Passive Learning
3.2 Active Learning
4 Learning Models of Reinforcement
4.1 Q-Learning
4.2 Markov Chain and Markov Process
5 Disadvantages of Reinforcement Learning
6 Conclusion
References
Data Encryption on Cloud Database Using Quantum Computing for Key Distribution
1 Introduction
2 Literature Survey
2.1 Quantum Key Distribution (QKD)
2.2 Elliptic Curve Cryptography (ECC)
3 Problems Identified
4 Proposed Model
4.1 Security Model
5 Results
6 Conclusion
References
Prediction and Prevention of Addiction to Social Media Using Machine Learning
1 Introduction
2 Literature Survey
3 Dataset
4 Method
4.1 Proposed Approach
5 Experiment and Results
6 Evaluation
7 Conclusion
8 Future Work
References
Analysis of Block Matching Algorithms for Motion Estimation in Video Data
1 Introduction
2 Block Matching Algorithms
2.1 Full-Search Motion Estimation Algorithm
2.2 Three-Step Search Motion Estimation Algorithm
2.3 New Three-Step Search Motion Estimation Algorithm
2.4 Four-Step Search Motion Estimation Algorithm
2.5 Diamond Search Motion Estimation Algorithm
2.6 Genetic Rhombus Pattern Search Motion Estimation
2.7 Efficient Motion Estimation Optimization
2.8 Fast Motion Estimation Based on Content Property
2.9 Adaptive Pattern for Diamond Search Algorithm
3 Experiment and Results
4 Conclusion
References
Information Retrieval Based on Telugu Cross-Language Transliteration
1 Introduction
2 Related Works
3 Resources Used
4 Prototype for CLIR and Monolingual IR
5 Evaluation of Retrieval Performance
6 Conclusion
References
Predicting the Risk of Patients from Corona Virus in India Using Machine Learning
1 Introduction
2 Related Works
3 Data Analysis
3.1 Reading the Data Set
3.2 Analyzing COVID-19 Cases in India
3.3 Visualizing COVID-19 Cases
4 Applying Best-Fit Algorithm
4.1 Choosing Appropriate Model
4.2 Predicting the Patient Risk
5 Conclusion
References
Parallel Implementation of Marathi Text News Categorization Using GPU
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Implementation
3.2 Parallelization of K-NN Algorithm
4 Observations
5 Conclusion
References
Real-Time Emotion Detection and Song Recommendation Using CNN Architecture
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset Used for Facial Emotion Recognition
3.2 Image Processing
3.3 Convolutional Neural Network Architecture
3.4 Training the Model
3.5 Real-Time Emotion Detection
3.6 Music Recommendation
4 Results and Discussion
5 Conclusion
References
Drowsiness Detection System Using KNN and OpenCV
1 Introduction
2 Related Works
3 Methodology
3.1 Eye Detection
3.2 EAR Estimation and Blink Classification
3.3 Preprocessing
3.4 Real-Time Drowsiness Detection
4 Conclusion and Future Work
References
Optimized Dynamic Load Balancing in Cloud Environment Using B+ Tree
1 Introduction
2 Related Work
3 System Model
4 Mapping Task to Virtual Machine
5 B + Tree Algorithm
6 B + Tree Application in Cloud Environment
7 Conclusion
References
Computer Vision-Based Wheat Grading and Breed Classification System: A Design Approach
1 Introduction
2 Literature Review
3 Methodology
3.1 Sample Creation
3.2 Image Acquisition
3.3 Image Preprocessing
3.4 Labeling
4 Results
5 Conclusion
References
An Approach to Securely Store Electronic Health Record(EHR) Using Blockchain with Proxy Re-Encryption and Behavioral Analysis
1 Introduction
1.1 Motivation and Contribution of the Paper
2 Literature Survey
3 Behavioral Analysis to Ensure Data Security in Healthcare System
4 Blockchain in Health Care
5 Proposed Model
5.1 Proxy Re-Encryption
5.2 Security Analysis
6 Conclusion and Future Work
References
Automated Glaucoma Detection Using Cup to Disk Ratio and Grey Level Co-occurrence Matrix
1 Introduction
2 Related Work
3 Proposed Method
3.1 CDR and RDR
3.2 Gray-Level Co-occurrence Matrix
4 Proposed Work
5 Experimental Results
6 Conclusion
References
Efficient Machine Learning Model for Intrusion DetectionâA Comparative Study
1 Introduction
2 Literature Review
3 Dataset
4 Approach
5 Execution
6 Results
7 Conclusion
References
Anomaly Detection in HTTP Requests Using Machine Learning
1 Introduction
1.1 Injection
1.2 Cross-Site Scripting
1.3 Invalid Requests
2 Literature Review
3 Proposed Features and Machine Learning Algorithms
3.1 HTTP CSIC 2010 Dataset
3.2 Data Pre-processing
3.3 Machine Learning Algorithms
4 Implementation
4.1 Accuracy
4.2 Precision
4.3 Recall
4.4 F1-Score
5 Result
6 Conclusion
References
Best Fit Radial Kernel Support Vector Machine for Intelligent Crop Yield Prediction Method
1 Introduction
1.1 Related Work
2 Data Acquisition and Algorithms
2.1 Climate Data
2.2 Soil and Yield Data
2.3 Prediction and Estimation Algorithms
3 Intelligent Crop Yield Prediction Method (ICYPM)
3.1 Climate Prediction
3.2 Yield Estimation
3.3 Evaluation
4 Result and Discussions
4.1 Climate Prediction
4.2 Yield Estimation
5 Conclusion
References
Design of Cryptographic Algorithm Based on a Pair of Reversible Cellular Automata Rules
1 Introduction
2 Theoretical Foundations of Cellular Automata
2.1 One-Dimensional Cellular Automation
2.2 Reversible Cellular Automata
3 Proposed Method
3.1 Encryption Algorithm
3.2 Decryption Algorithm
4 Result Discussion
5 Conclusion and Future Work
References
Computational Model Simulation of a Self-Driving Car by the MADRaS Simulator Using Keras
1 Introduction
2 Approach in Solving the Problem
2.1 Feature-Based Detection
2.2 Noise Reduction
2.3 Intensity Gradient Using the Angle and Edge Gradient
2.4 Vehicle Detection
2.5 Lane Detection
3 Challenges While Implementing the System
4 Results
5 Conclusions
References
Success of H1-B VISA Using ANN
1 Introduction
2 Related Work
3 Data Set
4 Proposed Work
5 Result Analysis
6 Conclusion and Future Work
References
ETL and Business Analytics Correlation Mapping with Software Engineering
1 Introduction
2 Related Work
3 ETL Process
3.1 ETL Process Stage-1
3.2 ETL Process Stage-2
3.3 ETL Process Stage-3
4 Software Engineering Dimensions
5 Conclusion
References
A Novel Multilevel RDH Approach for Medical Image Authentication
1 Introduction
2 Types of RDH
2.1 RDH in Uncompressed Image
2.2 RDH in Compressed Image
2.3 RDH in Encrypted Image
3 Methodologies of RDH
3.1 Difference Expansion
3.2 Histogram Shift
3.3 LSB Modification
4 Literature Review
4.1 Zhang (2011) [6]
4.2 Hong et al. [7]
4.3 Qin and Zhang [8]
4.4 J Mondal et al. [9]
5 Proposed Method
6 Experimental Result Analysis
7 Conclusion
References
Copy-Move Forgery Detection Using Scale Invariant Feature Transform
1 Introduction
2 Copy-Move Image Forgery
3 Methodology
3.1 Key-point Based Feature Extraction
3.2 Feature Matching
3.3 Localization
4 Experimental Results and Analysis
5 Conclusion
References
SP-EnCu: A Novel Security and Privacy-Preserving Scheme with Enhanced Cuckoo Filter for Vehicular Networks
1 Introduction
2 Related Work
2.1 Privacy-Preserving Schemes
2.2 Encryption Schemes
2.3 Cuckoo Filter
3 System Model
3.1 Registration Process
3.2 Verification Process
4 Detailed Security and Privacy-Preserving Process with Enhanced Cuckoo Filter
4.1 Registration and Pseudonym Assignment
4.2 Reduced Round-AES
4.3 Enhanced Cuckoo Filter
5 Performance Evaluation and Comparison
6 Conclusion
References
Reversible Region-Based Embedding in Images for Secured Telemedicine Approach
1 Introduction
2 Related Works
2.1 Secure Telemedicine Using RONI Halftoned Visual Cryptography Without Pixel Expansion [6]
2.2 Reversible Data Hiding in Encrypted Images Based on Multi-MSB Prediction and Huffman Coding [9]
2.3 ROI-Based Reversible Watermarking Scheme for Ensuring the Integrity and Authenticity of DICOM MR Images [10]
2.4 A Novel Robust Reversible Watermarking Scheme for Protecting Authenticity and Integrity of Medical Images [11]
3 Proposed Technique
3.1 Image Segmentation and Embedding
3.2 Image Authentication and Extraction
4 Experimental Results and Discussion
5 Conclusion and Future Scope
References
A Spatial Domain Technique for Digital Image Authentication and Tamper Recovery
1 Introduction
2 Related Work
3 Proposed Method
3.1 Embedding Watermark Data
3.2 Image Authentication Checking
3.3 Tampered Image Recovery
4 Experimental Results
5 Conclusion
References
Empowering the Visually Impaired Learners with Text-to-Speech-Based Solution
1 Introduction
2 Related Solutions
2.1 Job Access With Speech (JAWS) [10]
2.2 E-Learning App [11]
2.3 Lekatha [12]
3 TTS Theory
4 Proposed Approach
5 Test Outputs
6 Conclusion and Future Aspects
References
Seismic Data Analytics for Estimating Seismic Landslide Hazard Using Artificial Accelerograms
1 Introduction
2 Methodology
2.1 Artificial Accelerogram Generation
2.2 Newmarkâs Rigid Block Model
2.3 Statistical Models Used Validate GMPs
3 Results and Discussion
4 Conclusion
References
Impact of Presence of Obstacles in Terrain on Performance of Some Reactive Protocols in MANET
1 Introduction
2 Literature Review
3 Simulation Environment and Performance Metrics
3.1 Simulation Environment
3.2 Performance Metrics
4 Performance Analysis
4.1 Low Traffic Density
4.2 Medium Traffic Density
4.3 High Traffic Density
5 Conclusion and Future Scope of Work
References
Author Index
đ SIMILAR VOLUMES
<p><p></p><p>This book gathers selected high-quality papers presented at the International Conference on Machine Learning and Computational Intelligence (ICMLCI-2019), jointly organized by Kunming University of Science and Technology and the Interscience Research Network, Bhubaneswar, India, from Ap
<p><span>This book constitutes the Proceeding of the Computational Intelligence in Information Systems conference (CIIS 2020), held in Brunei, January 25â27, 2021. The CIIS conference provides a platform for researchers to exchange the latest ideas and to present new research advances in general are
<p>This book gathers selected papers presented at the Fourth International Conference on Mechatronics and Intelligent Robotics (ICMIR 2020), held in Kunming, China, on May 22â24, 2020. The proceedings cover new findings in the following areas of research: mechatronics, intelligent mechatronics, robo
<p><span>This book presents best selected research papers presented at the 3rd International Conference on Cognitive Informatics and Soft Computing (CISC 2020), held at Balasore College of Engineering & Technology, Balasore, Odisha, India, from 12 to 13 December 2020. It highlights, in particula