<span>This book includes best selected, high-quality research papers presented at International Conference on Data Driven Computing and IoT (DDCIoT 2021) organized jointly by Geetanjali Institute of Technical Studies (GITS), Udaipur, and Rajasthan Technical University, Kota, India, during March 20â2
Proceedings of International Conference on Advanced Communications and Machine Intelligence: MICA 2022 (Studies in Autonomic, Data-driven and Industrial Computing)
â Scribed by Rajkumar Buyya (editor), Sudip Misra (editor), Yiu-Wing Leung (editor), Ayan Mondal (editor)
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 449
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book presents high-quality, peer-reviewed papers from International Conference on Advanced Communications and Machine Intelligence (MICA 2022), organised by M.Kumarasamy College of Engineering, Chennai, Tamil Nadu, India, during 9â11 December 2022. The book includes all areas of advanced communications and machine intelligence. The topics covered are network performance analysis, data mining and warehousing, parallel and distributed networks, computational intelligence, smart city applications, big data analytics, Internet of Things networks, information management and wireless sensor networks. The book is useful for academicians, scientists, researchers from industry, research scholars and students working in these areas.
⌠Table of Contents
Preface
Contents
About the Editors
1 A Study on Interval-Valued Intuitionistic Fuzzy Oscillatory Region
1 Introduction
2 Preliminaries
3 On IVIF-Set Oscillatory Region
4 Conclusion
References
2 Face Mask Detection Using Keras/Tensorflow
1 Introduction
1.1 Objectives
2 Proposed Approach
2.1 Visualization of Data
2.2 Reshaping of Images
2.3 Model Training
2.4 Proposed Approach
3 Result
4 Conclusion
References
3 Simulation-Based Comparative Study for Effective Cell Selection in Cellular Networks
1 Introduction
2 Literature Review
3 Simulations and Result
4 Conclusion
References
4 Comparative Analysis of Detection of Network Attacks Using Deep Learning Algorithms
1 Introduction
2 Literature Review
3 Detection of Network Attacks Using Deep Learning
3.1 Attack Detectionâs Deep Learning Applications
3.2 Deep Belief Network
4 Methodologies Being Used
5 Comparisons and Analysis
6 Conclusion
7 Future Scope
References
5 Multi-Criteria Decision-Making Problems in an Interval Number Based on TOPSIS Method
1 Introduction
2 Preliminaries
2.1 Definitions
2.2 Multi-Criteria Decision-Making
3 Methodology
4 Numerical Example
5 Comparison Analysis of other Method
6 Conclusions and Future Work
References
6 Sentiment Analysis of Twitter Data by Natural Language Processing and Machine Learning
1 Introduction
2 Literature Survey
2.1 Natural Language Processing
2.2 Overview of Machine Learning
3 Proposed System and Methodology
3.1 Extracting Twitter Data Set
3.2 Cleaning the Data Set
3.3 Separation of Tweets
3.4 Remove Stop Words Using Natural Language Processing
3.5 Machine Learning Classifiers
3.6 Calculate Parameters
3.7 Compare Results
4 Experimental Results and Analysis
4.1 Positive Tweets
4.2 WordCloud of Positive Tweets
4.3 Negative Tweets
4.4 WordCloud of Negative Tweets
4.5 Confusion Matrix
4.6 Performance Measure
5 Conclusion
References
7 A Generalized Fuzzy TOPSIS Technique in Multi-Criteria Decision-Making for Evaluation of Temperature
1 Introduction
2 Preliminaries
2.1 Definitions
2.2 Multi-Criteria Decision-Making
2.3 Fuzzy Multi-Criteria Decision-Making
3 Methodology
3.1 AHP Method
3.2 Fuzzy AHP Method
3.3 TOPSIS Method
3.4 Fuzzy TOPSIS Method
4 Numerical Example
5 Conclusion
References
8 UWB FR4-Based CPW-Fed Equilateral Triangular Slot Antenna for CubeSat Communication
1 Introduction
2 Antenna Design and Structure
3 Antenna Performances and Results Synthesis
4 Conclusions
References
9 Comparative Study of Support Vector Machine Based Intrusion Detection System and Convolution Neural Network Based Intrusion Detection System
1 Introduction
2 Literature Survey
3 Background
4 Datasets and Evaluation Metrics
5 Proposed Technique
5.1 Data Pre-processing
5.2 Intrusion Detection Models Based on SVM and CNN
6 Experiment Result
6.1 SVM Based IDS
6.2 CNN Based IDS
7 Conclusion and Future Work
References
10 Association Rules Generation for Injuries in National Football League (NFL)
1 Introduction
2 Methodology
2.1 Implementation of NFL Injury Dataset
3 Results and Discussion
4 Conclusion and Future Scope
References
11 AÂ Supplier Selection Using Multi-Criteria Decision Analysis Method Under Probabilistic Approach
1 Introduction
2 Preliminaries
2.1 TOPSIS Method
2.2 Fuzzy TOPSIS Method
2.3 Definitions
3 Probabilistic for Selection of Supplier with Fuzzy TOPSIS
4 Numerical Illustrations
5 Conclusion
References
12 Proactive Public Healthcare Solution Based on Blockchain for COVID-19
1 Introduction
2 Background
2.1 Reactive Versus Proactive Health Care
2.2 COVID-19 and Its Impact
2.3 Blockchain in Health Care
3 Discussion
3.1 Methods Used for Containment of Pandemic
3.2 Drawbacks of the Containment Methods
3.3 Proposed Scheme
4 Conclusion
References
13 A TOPSIS Technique for Multi-Attribute Group Decision-Making in Fuzzy Environment
1 Introduction
2 Basic Notions and Definitions
3 TOPSIS Method
4 Proposed Methodology
5 Numerical Examples
6 Conclusion
References
14 Design and Implementation of Fuzzy Controller Based DC to DC Converter for PV System
1 Introduction
2 Methodology
2.1 Related Work
2.2 Proposed Work
3 Simulation Results
4 Conclusion
References
15 A Multi-Objective Task Scheduling Approach Using Improved MaxâMin Algorithm in Cloud Computing
1 Introduction
2 Related Work
3 Model
3.1 System Model
3.2 Mathematical Model
3.3 Performance Metrics
4 Improved MaxâMin Algorithm
5 Experimental Setup
6 Experiment, Result and Discussion
6.1 Makespan
6.2 Cost
7 Conclusion and Future Work
References
16 An Enhanced DES Algorithm with Secret Key Generation-Based Image Encryption
1 Introduction
2 Literature Review
3 Propose Work
4 Results
4.1 RGB Histogram Generation of Lena Image
4.2 RGB Histogram Generation of Cameraman Image
5 Conclusions
References
17 User Interest Based POI Recommendation Considering the Impact of Weather Details
1 Introduction
2 Literature Review
3 Proposed Approach
3.1 Preliminaries and Problem Definition
4 Performance Analysis and Comparison
4.1 Experimental Methodology
4.2 Evaluation Matrices and Results
5 Conclusion and Future Scope
References
18 MF-Based Load Sharing System for Paper Rolling Mill Using Variable Frequency Drive
1 Introduction
2 Existing System
3 Proposed System
4 Hardware Results
5 Conclusion
References
19 Comparative Analysis of Botnet Detection Techniques Using Machine Learning Classifier
1 Introduction
1.1 Categorization Based on Data Source
1.2 Categorization Based on Data Types
1.3 Categorization Based on Classification Method
1.4 Categorization Based on Interaction Type
2 Existing Methodology
3 Comparative Analysis of Botnet Detection Technique Using Machine Learning
4 Analysis and Discussion
5 Conclusion
References
20 Comparative Study of Classifiers for Environmental Sound Classification
1 Introduction
1.1 Motivation
1.2 Significance and Contributions of Work
2 Related Work
3 Techniques Used and Methodology
3.1 Dataset
3.2 Feature Extraction
3.3 Classification
4 Results and Analysis
4.1 Metrics
4.2 Analysis and Discussion
5 Conclusion
References
21 Vision-Based Interpretation of Flashing the Upper and the Dipper Headlights of the Vehicle Behind
1 Introduction
2 Literature Survey
3 Methodology
3.1 Dataset Collection and Preprocessing
3.2 Feature Extraction and Description
3.3 Dimensionality Reduction
3.4 Model Training
3.5 Classification of Upper and Dipper Headlights
4 Results and Discussion
5 Conclusion
References
22 Cardiovascular Disease Detection Using Machine Learning
1 Introduction
2 Literature Review
3 Dataset Description and Exploratory Data Analysis
3.1 Exploratory Data Analysis
4 Proposed Methodology
5 Experimental Results
5.1 5-Fold Cross Validation
5.2 Grid Search
5.3 Creating an Optimized Neural Net
5.4 Logistic Regression
5.5 Decision Tree
5.6 Linear SVM
5.7 Categorical Naive Bayes
5.8 Numerical Naive Bayes
5.9 Baseline Neural Network
5.10 Final Optimized Neural Network
5.11 Results and Discussion
6 Conclusion and Discussion
References
23 Furniture for House Decor Using Augmented Reality
1 Introduction
2 Background
2.1 Problem Statement
3 Existing System
4 Proposed System
4.1 Module Description
5 Result
6 Conclusion
References
24 A Novel Geofence-Oriented Approach to Activity Alerts and Notifications for Dementia Patients
1 Introduction
1.1 Organization of the Paper
2 Related Work
2.1 Location Services-Based Alert System
2.2 Google Maps SDK
3 System Design
3.1 Overall System Design
3.2 One Time Password Mechanism
4 Implementation of the Proposed System
4.1 Application Interface
4.2 Google Maps SDK and Geofencing
4.3 Foreground Services
5 Performance and Results
6 Use Cases for the Application and Potential Users
6.1 HealthcareâDementia and Alzheimer's Patients
6.2 Maritime DomainâMarine Workers
6.3 General PublicâThe Common Person
7 Future Scope and Improvements
7.1 Recommendation Systems and Utilizing Machine Learning
7.2 Personalizing Notification Frequency and Type
7.3 Creating a Lighter Application
References
25 Women Safety Using IoT Device with Location and Video
1 Introduction
2 Existing System
3 Methodology
3.1 Honey Algorithm
4 Result and Discussion
5 Conclusion
References
26 An Enhanced Intrusion Detection System (IDS) Framework Using Grey Wolf Optimization (GWO) and Ensemble Machine Learning (EML) Mechanisms
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Preprocessing
3.2 Feature Selection
3.3 Intrusion Detection and Classification
4 Results and Discussion
5 Conclusion and Future Work
References
27 Home Automation System Using Nodemcu (ESP8266)
1 Introduction
2 Literature Survey
2.1 Home Automation on ESP8266
2.2 Home Automation Using Nodemcu and Android Application
2.3 Home Automation and Security System with Nodemcu Using Internet of Things
2.4 Internet of Things-Based Integrated Smart Home Automation System
3 Research Methodology
3.1 Nodemcu (ESP8266)
3.2 PIR Sensor
3.3 LDR Sensor
3.4 Relay Module
3.5 Arduino IDE
4 Implementation
5 Conclusion
6 Future Scope
References
28 Designing a SDN-Based Intrusion Detection and Mitigation System Using Machine Learning Techniques
1 Introduction
2 Related Work
3 Proposed System
3.1 Traffic Data Collection
3.2 Machine Learning Classifier
3.3 Detection of DDoS Using Outlying Application Above Ryu Controller
3.4 Mitigation of Malicious Packets
4 Results and Discussion
5 Conclusion and Future Work
References
29 Effective Scheduling of Real-Time Task in Virtual Cloud Environment Using Adaptive Job Scoring Algorithm
1 Introduction
2 Related Works
3 Methodology
3.1 Adaptive Scoring Job Scheduling Calculation (ASJS) Algorithm
4 Results and Findings
5 Conclusion and Scope of Future Enhancements
References
30 Need of Hour: Hybrid Encryption and Decryption Standards (HEaDS) Algorithm for Data Security
1 Introduction
2 Research Idea: Hybrid Encryption and Decryption Standards
3 Architecture and Working of Hybrid Encryption and Decryption Standards (HEaDS)
4 Implementation and Testing: Hybrid Encryption and Decryption Standards (HEaDS)
5 Comparative Evaluations: Hybrid Encryption and Decryption Standards (HEaDS)
6 Positive Factors in Hybrid Encryption and Decryption Standards (HEaDS)
7 Results Analysis: Hybrid Encryption and Decryption Standards
8 Conclusion and Future Scope
References
31 SEROMI: Secured Encrypted Routing of Message in IoT
1 Introduction
2 Problem Statement and Motivation
3 Literature Survey
4 Secured Routing in IoT
5 Simulation Performed
6 Results
7 Conclusion and Future Work
References
32 Predictive Analysis of Mortality due to COVID-19 Using Multivariate Linear Regression
1 Introduction
2 Related Work
3 Proposed System
3.1 Data Collection
3.2 Mathematical Models
3.3 Data Preprocessing
3.4 Data Cleaning
3.5 Training and Testing the Model
4 Algorithms for Cleaning and Training
5 Results and Discussion
6 Future Scope
References
33 IoT and Machine Learning-Based Cryo-Shield Model for Gas Leakage Detection
1 Introduction
2 Problem Statements and Implementation of Proposed Model
2.1 Problem Statement-1
2.2 Problem Statement-2
3 Working and Architecture of Proposed Model
4 Interpretation of Proposed Model
5 Findings of the Proposed Model
6 Conclusion
References
34 Face Recognition with Mask Using CNN, LBP, and Fuzzy Techniques
1 Introduction
2 Proposed Methodology
2.1 Face Detection
2.2 Local Binary Pattern (LBP)
2.3 Fuzzy mX2* Oscillation Based Face Recognition
3 Data Sets
3.1 Essex Face Recognition Data
3.2 COMASK20 Data Set
4 Results Analysis
5 Conclusion
References
35 CII-HF: Cloud IoTâIntegration Hybrid Framework
1 Introduction
2 Literature Survey
3 Background
3.1 Internet of Things (IoT)
3.2 Cloud Computing
3.3 Integrating the Cloud and the Internet of Things
4 Methodology Adopted
5 System Design
6 Conclusion and Future Scope
References
36 An Improved Intrusion Detection System Using Data Clustering and Support Vector Machine
1 Introduction
2 Literature Review
3 Propose Work
4 Results Evaluation
5 Conclusions
References
37 Enhanced Color-Based Marketing With Psychometric And Demographic Data Analysis Using Machine Learning
1 Introduction
2 Literature Survey
3 Data Preparation and Visualization
4 Block Diagram and Methodology
4.1 Exploratory Data Analysis (EDA)
4.2 Feature Extraction
4.3 ML Models Implementation
5 Result Analysis
6 Conclusion
References
38 Vision-Based Car Turn Signal Detection Using AKAZE Features
1 Introduction
2 Literature Survey
3 Methodology
3.1 Details of Dataset and Pre-processing
3.2 Feature Extraction and Description
3.3 Dimensionality Reduction
3.4 Model Training
3.5 Classification of Turn Signals
4 Results and Discussion
5 Conclusion
References
39 Fake News Detection on Social Media Through Machine Learning Techniques
1 Introduction
1.1 Research Contribution
1.2 Paper Organization
2 Related Works
3 Proposed Methodology
4 Experiment and Results
4.1 Datasets
4.2 Experiment
4.3 Results
5 Conclusion
References
40 Enhanced Artificial Neural Network for Spoof News Detection with MLP Approach
1 Introduction
2 Related Works
3 Materials and Methods
3.1 Proposed Work
3.2 Proposed Work
4 Results and Experiments
5 Conclusion and Future Work
References
Author Index
đ SIMILAR VOLUMES
<p><span>This book gathers a collection of high-quality peer-reviewed research papers presented at First International Conference on Innovations in Software Architecture and Computational Systems (ISACS 2021), held at Guru Nanak Institute of Technology, Kolkata, India, during 2 â 3 April 2021. The b
<span>This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, India, during 4â5 September 2020. The book ad
This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, on September 4 and 5, 2020. The book starts by addressi
<span>This book consists of peer-reviewed papers presented at the First International Conference on Intelligent Computing in Control and Communication (ICCC 2020). It comprises interesting topics in the field of applications of control engineering, communication and computing technology. As the curr
<div><p>This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing and Communication (ICICC 2021), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 20â21, 2021. Introducing t