<p>This book focuses on emerging issues following the integration of artificial intelligence systems in our daily lives. It focuses on the cognitive, visual, social and analytical aspects of computing and intelligent technologies, highlighting ways to improve technology acceptance, effectiveness, an
Meta Heuristic Techniques in Software Engineering and Its Applications: METASOFT 2022 (Artificial Intelligence-Enhanced Software and Systems Engineering, 1)
â Scribed by Swagatam Das; Mihir Narayan Mohanty; Mitrabinda Ray; Bichitrananda Patra
- Tongue
- English
- Leaves
- 368
- Category
- Library
No coin nor oath required. For personal study only.
⌠Table of Contents
Preface
Contents
Performance Analysis of Heuristic Optimization Algorithms for Transportation Problem
1 Introduction
2 Mathematical Model of TP
3 Optimization Algorithms
3.1 PSO
3.2 APSO
3.3 NQPSO
4 Steps of Optimization
5 Performance Evaluation of the Algorithms
5.1 Convergence
5.2 Optimization Value
5.3 Accuracy
6 Conclusion
References
Source Code Features Based Branch Coverage Prediction Using Ensemble Technique
1 Introduction
2 Related Works
3 Proposed Approach
4 Implementation and Result Analysis
4.1 Result Analysis
4.2 Feature Analysis
5 Comparison with Related Work
6 Conclusions and Future Work
References
Implicit Methods of Multi-factor Authentication
1 Introduction
2 Related Work
3 Problem Statement
4 Implicit Methods of Multifactor Authentication
4.1 Mouse Events as Passcode
4.2 Image as Passcode
4.3 Patterned OTP
5 Implementation
5.1 Mouse Events as Passcode
5.2 Image as Passcode
5.3 Patterned Based OTP
6 Experimental Results
6.1 Mouse Events as Passcode
6.2 Image as Passcode
6.3 Pattern Based OTP
7 Analysis
7.1 Usability
7.2 Security and Privacy
8 Conclusion
References
Comparative Analysis of Different Classifiers Using Machine Learning Algorithm for Diabetes Mellitus
1 Introduction
2 Related Work
2.1 Control Mechanism Process for Diabetes Mellitus
2.2 Focus on Digital System
2.3 Medication
2.4 Diabetes Services
2.5 Psychological Issues and Tensity
3 Methodology
3.1 Data Gathering
3.2 Data Prediction
3.3 Implementation of Classifier for Evaluation of Accuracy
4 Proposed Architecture
5 Logistic Regression
6 K-Nearest Neighbors Algorithms (K-NN)
7 CART (Classification and Regression Tree)
8 Conclusion
References
Survey on Machine Learning Techniques for Software Reliability Accuracy Prediction
1 Introduction
2 Research Methodology and Contribution
3 Reliability Measurement Methods and Process
4 Related Work
5 Motivations and Objectives
5.1 Motivation
5.2 Objective
6 Methodology
6.1 Axes of Quality Evaluation
6.2 Technical Catalogue
7 Evaluation Criteria
8 Experiments and Results
8.1 Defect Prediction
9 Conclusion
References
Classification of Pest in Tomato Plants Using CNN
1 Introduction
2 Materials and Methods
2.1 Sample Collection
2.2 Hardware Setup
2.3 Software Setup
2.4 Image Processing
2.5 Design and Setup of Data and CNN Architecture
3 Results and Discussion
3.1 Comparison with Existing Works
3.2 Limitations
4 Conclusions
References
Deep Neural Network Approach for Identifying Good Answers in Community Platforms
1 Introduction
2 Ranking and Tagging of Quality Answers in CQA
2.1 Tagging Answers in CQA Using Ensemble Deep Learning Model
3 Results and Discussion
4 Conclusion and Future Direction
References
Time Series Analysis of SAR-Cov-2 Virus in India Using Facebookâs Prophet
1 Introduction
2 Methodology
2.1 Data Collection
2.2 Testing
2.3 Data Visualization
2.4 Comparison
2.5 Facebookâs Prophet
3 Conclusion and Future Work
References
Model-Based Smoke Testing Approach of Service Oriented Architecture (SOA)
1 Introduction
2 Related Works on ERP
3 Overview of SOA Testing and Smoke Testing
3.1 The Importance of SOA
3.2 Challenges in SOA Testing
3.3 Smoke Testing
4 Case Study: Enterprise Resource Planning (ERP)
5 Conclusion
References
Role of Hybrid Evolutionary Approaches for Feature Selection in Classification: A Review
1 Introduction
2 Background
2.1 Searching Techniques
2.2 Criteria for Evaluation
2.3 Number of Objectives
3 Systematic Literature Review
3.1 Thawkar et al. (2021) [30]
3.2 Hussain et al. (2021) [32]
3.3 Wajih et al. (2021) [33]
3.4 Bindu et al. (2020) [3]
3.5 Bhattacharyya et al. (2020) [6]
3.6 Alweshah et al. (2020) [7]
3.7 Meera et al. (2020) [8]
3.8 Neggaz et al. (2020) [9]
3.9 Hans et al. (2020) [29]
3.10 Khamees et al. (2020) [37]
4 Analysis
5 Conclusion
References
Evaluation of Deep Learning Models for Detecting Breast Cancer Using Mammograms
1 Introduction
2 Literature Review
3 Proposed Methods
4 Simulation Environment
5 Experimental Results
6 Conclusion
References
Evaluation of Crop Yield Prediction Using Arsenal and Ensemble Machine Learning Algorithms
1 Introduction
2 Literature Review
3 Methodology
3.1 Basic Terminologies
4 Module Description
4.1 Module 1 - Data Acquisition
4.2 Module 2 - Exploratory Data Analysis
4.3 Module 3 - Preprocessing
4.4 Module 4 - Model Evaluation
5 GUI Application
5.1 Application Functionality
6 Results and Discussion
7 Conclusion and Future Scope
References
Notification Based Multichannel MAC (NM-MAC) Protocol for Wireless Body Area Network
1 Introduction
2 Related Work
3 Proposed Work
3.1 Data Type Organisation
3.2 Notification Based Multichannel MAC Protocol
4 Simulation Results
5 Conclusion and Future Scope
References
A Multi Brain Tumor Classification Using a Deep Reinforcement Learning Model
1 Introduction
1.1 Brain Tumor
1.2 Glioma Tumor
1.3 Meningioma Tumor
1.4 Pituitary Tumors
1.5 Dataset
2 Related Work
3 Proposed Model
3.1 Convolution Neural Networks
3.2 Reinforcement Learning
3.3 Deep Q-Learning
3.4 Confusion Matrix
4 Experimental Results
5 Conclusion
References
A Brief Analysis on Security in Healthcare Data Using Blockchain
1 Introduction
2 Overview of Blockchain
2.1 Properties of Blockchain
2.2 Types of Blockchain
2.3 Blockchain in Healthcare
3 Related Work
4 Discussion
5 Conclusion and Future Scope
References
A Review on Test Case Selection, Prioritization and Minimization in Regression Testing
1 Introduction
2 Basic Concepts
2.1 Regression Testing
2.2 Effectiveness of Prioritized Test
3 Related Work
4 Conclusion and Future Scope
References
Artificial Intelligence Advancement in Pandemic Era
1 Introduction
2 Artificial Intelligence
2.1 Artificial Intelligence Role in the Treatment of COVID-19
2.2 Artificial Intelligence as a Catalyst for the Exchange of Information
2.3 Role of Artificial Intelligence as an Observer and Predictor in the Pandemic Evolution
2.4 Healthcare Personnel Assistance with Artificial Intelligence
3 AI and ML to Combat Covid-19
3.1 Developing Novel COVID-19 Antibody Sequences for the use in Experimental Testing Using the Machine Learning
3.2 CT Scan Checks with AI for COVID-19
3.3 AI as an Aid in the Transmission of COVID-19
4 Conclusion
References
Predictive Technique for Identification of Diabetes Using Machine Learning
1 Introduction
2 Literature Review
3 Prediction of Healthcare Data Using AI and ML
4 Results
5 Conclusion
References
Prognosis of Prostate Cancer Using Machine Learning
1 Introduction
1.1 Correlation Between Machine Learning and Healthcare Databases
2 Literature Review
3 Outline of Research
4 Result
4.1 The Yearly Incidence Rate and the Mortality Rate of Prostate Cancer.
4.2 The Age-Based Incidence Rate and Mortality Rate of Prostate Cancer
5 Conclusion
References
Sign Language Detection Using Tensorflow Object Detection
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 Labelling Images
3.3 TF Record Generation
3.4 Creating Model Configuration File
3.5 Training Model
4 Result and Discussion
5 Conclusion
References
Automated Test Case Prioritization Using Machine Learning
1 Introduction
2 System Overview
3 Literature Survey and Problem Definition
4 Proposed Solution
5 Result and Future Scope
6 Conclusion
References
A New Approach to Solve Linear Fuzzy Stochastic Differential Equation
1 Introduction
2 Basic Preliminaries
2.1 Stochastic Differential Equation [7]
2.2 Linear Stochastic Differential Equation [7]
2.3 Brownian Motion (BM) [7]
2.4 Fuzzy Brownian Motion (FBM) [9]
2.5 Fuzzy Ito Formula (FIF) [9]
2.6 Stochastic Process (SP) [7]
2.7 Fuzzy Stochastic Process (FSP) [9]
2.8 Adapted Process [7]
2.9 Fuzzy Ito Product [9]
3 Linear Fuzzy Stochastic Differential Equation (LFSDE)
4 Conclusion
References
An Improved Software Reliability Prediction Model by Using Feature Selection and Extreme Learning Machine
1 Introduction
2 Related Work
3 Methodology
3.1 Collection of Data
3.2 Preparation of Data
3.3 Feature Selection
3.4 Training the ELM Classifier
3.5 Testing and Calculation of Accuracy
4 Results and Analysis
5 Conclusion
References
Signal Processing Approaches for Encoded Protein Sequences in Gynecological Cancer Hotspot Prediction: A Review
1 Introduction
2 Materials and Methods
2.1 Hotspot Prediction in Proteins
2.2 Hotspot Prediction in Cancer Cells
3 Conclusions
References
DepNet: Deep Neural Network Based Model for Estimating the Crowd Count
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Density-Estimation Based Approach
3.2 Neural Net Architecture
3.3 Data Augmentation
3.4 Training Details
3.5 Result and Evaluation
4 Conclusion
References
Dynamic Stability Enhancement of Power System by Sailfish Algorithm Tuned Fractional SSSC Control Action
1 Introduction
2 Power System with SSSC
3 Proposed Controller
4 Objective Function
5 Sailfish Algorithm (SFA)
6 Result and Discussion
7 Conclusion
References
Application of Machine Learning Model Based Techniques for Prediction of Heart Diseases
1 Introduction
2 Related Work
3 Proposed Work and Methodology
4 Problem-Solving Method
5 Results Analysis and Discussion
6 Conclusion and Future Work
References
Software Effort and Duration Estimation Using SVM and Logistic Regression
1 Introduction
2 Objective
3 Challenges
4 Proposed System
5 Literature Survey
6 System Design
6.1 Data Set
6.2 Architecture
6.3 Machine Learning Algorithms
6.4 Performance Metrics
7 Implementation
7.1 Data Preprocessing
7.2 COCOMO Model for Effort and Duration
7.3 Classifier SVC
7.4 Logistic Regression
8 Results and Discussion
9 Conclusion
References
A Framework for Ranking Cloud Services Based on an Integrated BWM-Entropy-TOPSIS Method
1 Introduction
2 Related Works
3 Proposed Cloud Service Selection Framework
4 Cloud Service Selection Methodology
5 A Case Study with Experiment
5.1 Experiments
6 Concluding Remarks
References
An Efficient and Delay-Aware Path Construction Approach Using Mobile Sink in Wireless Sensor Network
1 Introduction
2 Related Work
3 Preliminaries
3.1 Network Model
3.2 Energy Model
3.3 Problem Description
4 Proposed Algorithm
4.1 Generation of Virtual Path
4.2 Network Division and RP Generation
5 Simulation Results
5.1 Simulation Setup
5.2 Results and Discussion
6 Conclusion
References
Application of Different Control Techniques of Multi-area Power Systems
1 Introduction
2 Materials and Methods
2.1 System Examined
2.2 Controller Structure and Objective Function
2.3 Firefly Technique
3 Results and Discussions
4 Conclusion
References
Analysis of an Ensemble Model for Network Intrusion Detection
1 Introduction
2 Literature Survey
3 Implementation
3.1 KDD Dataset
3.2 Data Load and Pre-processing
3.3 Exploratory Data Analysis
3.4 Standardization of Numerical Attributes
3.5 Encoding Categorical Attributes
3.6 Data Sampling
3.7 Feature Selection
3.8 Data Partition
3.9 Train Models
3.10 Evaluate Models
4 Results and Discussions
5 Conclusion
6 Future Scope
References
D2D Resource Allocation for Joint Power Control in Heterogeneous Cellular Networks
1 Introduction
2 System Model and Problem Statement
2.1 System Model
2.2 Problem Statement
3 Resource Allocation Algorithm for Joint Power Control
3.1 Power Control
3.2 Power Control
3.3 Search and Exchange Algorithm
4 Simulation and Results
4.1 Search and Exchange Algorithm
4.2 Results
5 Conclusion
References
Prediction of Covid-19 Cases in Kerala Based on Meteorological Parameters Using BiLSTM Technique
1 Introduction
2 Literature Review
3 Methodology
3.1 Data for Model Development
3.2 Modeling Framework
3.3 LSTMÂ â Long Short Term Memory
3.4 Bi LSTM - Bidirectional Long Short Term Memory
3.5 Evaluation of Bi-lSTM
4 Results
5 Conclusion
References
Monitoring COVID-Related Face Mask Protocol Using ResNet DNN
1 Introduction
2 ResNet-50 Based Method
3 Methodology
4 Experimental Results
5 Conclusion
References
Author Index
đ SIMILAR VOLUMES
Readings in Artificial Intelligence and Software Engineering covers the main techniques and application of artificial intelligence and software engineering. The ultimate goal of artificial intelligence applied to software engineering is automatic programming. Automatic programming would allow a user
<p><span>Evolving technological advancements in big data, smartphone and mobile software applications, the Internet of Things and a vast range of application areas in all sorts of human activities and professions, lead current research toward the efficient incorporation of </span><span>artificial in
<p><span>Evolving technological advancements in big data, smartphone and mobile software applications, the Internet of Things and a vast range of application areas in all sorts of human activities and professions, lead current research toward the efficient incorporation of </span><span>artificial in
<p><p></p><p>This book addresses emerging issues concerning the integration of artificial intelligence systems in our daily lives. It focuses on the cognitive, visual, social and analytical aspects of computing and intelligent technologies, and highlights ways to improve the acceptance, effectivenes
<p><span>This book provides a structured overview of artificial intelligence-empowered applied software engineering. Evolving technological advancements in big data, smartphone and mobile software applications, the Internet of Things and a vast range of application areas in all sorts of human activi