𝔖 Scriptorium
✦   LIBER   ✦

📁

Proceedings of International Conference on Computational Intelligence, Data Science and Cloud Computing: IEM-ICDC 2021 (Algorithms for Intelligent Systems)

✍ Scribed by Lopa Mandal (editor), Joao Manuel R. S. Tavares (editor), Valentina E. Balas (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
466
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book includes selected papers presented at International Conference on Computational Intelligence, Data Science,, and Cloud Computing (IEM-ICDC 2021), organized by the Department of Information Technology Institute of Engineering and Management, Kolkata, India, during December 22 – 24, 2021. It covers substantial new findings about AI and robotics, image processing and NLP, cloud computing and big data analytics as well as in cyber-security, blockchain and IoT, and various allied fields. The book serves as a reference resource for researchers and practitioners in academia and industry.

✦ Table of Contents


Committees
Preface
Contents
About the Editors
Part I Computational Intelligence
1 AutoDrone: Shortest Optimized Obstacle-Free Path Planning for Autonomous Drones
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Perception and Real-Time Formation of Maps
3.2 Problem Design
3.3 Destination to Base Station Shortest Path
3.4 Long Journeys and Transformation to 3D Space
4 Experimental Results
5 Conclusion and Future Scope
References
2 Transfer Learning and Transformer Architecture for Financial Sentiment Analysis
1 Introduction
2 Objective
3 Related Work and Challenges
4 BERT
5 Implementation Methodology
6 Research Question and Experimental Setup
7 Detailed Flow
8 Results
9 Challenges
10 Future Scope
References
3 Classification of Fashion Items Based on Shape Features Using Machine Learning
1 Introduction
2 Literature Survey
3 Methodology
3.1 Image Segmentation
3.2 Pre-processing
3.3 Feature Extraction
3.4 Classification Using Support Vector Machines
4 Experimental Results and Analysis
4.1 Dataset
4.2 Experimental Setup and Performance Analysis
5 Conclusion
References
4 Cardamom Quality Evaluation Employing Electronic Nose
1 Introduction
2 Materials and Method
2.1 Cardamom Extraction Process
2.2 Chemical Analysis of Samples
2.3 Architecture of Handheld Electronic Nose (HEN)
2.4 Data Collection
2.5 Analysis of Sensor Data
2.6 Clustering Algorithms
2.7 Regression Algorithm
3 Result and Analysis
4 Conclusion
References
5 COVID-DeepNet: Deep Convolutional Neural Network Architecture Designed for Early Prognosis of COVID-19 Using Post-anterior View of Chest X-Rays
1 Introduction
2 Previous Works
3 Detailed Methodology
3.1 Dataset Creation and Preparation
3.2 Solving Data Quality Issues: Augmentation, Transfer Learning, and Data Cleaning
3.3 Lightweight-Customized U-Net Architecture
3.4 Detailed COVID-DeepNet Architecture
4 Results and Analysis
5 Conclusion
References
6 Analytical Study on Feature Selection for Big Data Using Optimization Algorithms
1 Introduction
2 Related Work
3 Feature Selection Using Machine Learning Algorithms
3.1 Principle Component Analysis (PCA)
3.2 LDA (Linear Discriminant Analysis)
3.3 Neighborhood Component Analysis (NCA)
3.4 CA (Correlational-Analysis)
3.5 Autoencoders (AE)
3.6 Optimization Algorithms
4 Feature Selection Using Bio-inspired Algorithms
5 Conclusion
References
7 A Machine Learning Approach for Predicting the Death Time and Mortality
1 Introduction
2 Literature Review
3 Problem Statement
4 Methods and Solutions
4.1 Exploratory Data Analysis (EDA)
4.2 Feature Engineering from the Revised Dataset
4.3 Model Architecture
4.4 Evaluation
4.5 Implementation
5 Result Analysis
6 Conclusion and Discussion
References
8 Prediction of Crops Production Using Random Forest Regression
1 Introduction
2 Literature Survey
3 Materials and Methods
3.1 Data Set
3.2 Machine Learning Techniques
3.3 Evaluation Parameters
4 Methodology
5 Experimental Results
6 Conclusion
References
9 Drowsy Driving Detection Based on Deep Neural Network for Accident Avoidance
1 Introduction
2 Related Works
2.1 Drowsiness Detection Using Machine Learning
2.2 Drowsiness Detection Using Deep Learning
3 Methodology
3.1 Dataset
3.2 Data Pre-processing
3.3 Training The Models
3.4 Classified Outputs
3.5 Detection
4 Experimental Results
5 Conclusion
References
10 An Intelligent Fire-Fighting Robotic System to Combat Fire in Coal Mines
1 Introduction
2 System Design
2.1 General System Architecture
2.2 Sensory Module
2.3 Data Transmission Employing Wireless Communication
2.4 Fire Extinguisher System
3 Robot Architecture
3.1 Overview of Robot Architecture
3.2 Microcontroller
3.3 Internal Sensor Module
3.4 Manipulator
4 Workflow of The System
5 Conclusion and Future Scope
References
11 Predictive Analysis of COVID-19 Using LSTM and ARIMA Models with Various Orders in India
1 Introduction
2 Methodology Used
3 Result and Analysis
4 Conclusion
References
12 DeceptionTime: Predicting the Movement of Shares Using Momentum Indicators
1 Introduction
2 Past Works
2.1 Research Conducted on Convolutional Filters
2.2 Research Conducted on The Link Between Finance and Stock Market
2.3 Inception
2.4 Gaps in Existing Models
3 Proposed Model
3.1 An Overview
3.2 How Does the Model Work?
4 Data
4.1 Why is This Data Volatile?
4.2 The Data
4.3 Momentum Indicators
4.4 Creation of Classes
4.5 Data Augmentation
4.6 Data Split
5 Results and Conclusions
References
13 Strategy for Margin Trading Based on Algorithm
1 Introduction
2 Literature Review
3 Basics of Margin Trade and Use of Algorithm
3.1 Artificial Intelligence (AI) and Machine Learning (ML) is Used in Trading in the Following Ways
3.2 Building a Reasonable Algorithmic Trading System
4 Methods
5 Results
6 Conclusion
7 Future Scope of Work
References
14 Variational Autoencoder-Based Imbalanced Alzheimer Detection Using Brain MRI Images
1 Introduction
2 Proposed Method
2.1 Autoencoder
2.2 Variational Autoencoder
2.3 Latent Vector Resampling Techniques
3 Results and Discussion
3.1 Experimental Setup
3.2 Comparison of Classifiers
4 Conclusion
References
15 Breast Cancer Classification Using Deep Convolutional Neural Networks
1 Introduction
1.1 Motivation
2 Related Works
3 Proposed Framework
3.1 Overview
4 Experimental Results
5 Conclusion
References
16 Uncertainty Principle in the Light of Quantum Information Science
1 Introduction
2 Double-Slit Experiment
3 Mathematical Preliminaries
3.1 Hilbert Space and Observable
3.2 Born's Rule
3.3 Expectation Value (Eψ[A])
3.4 Variance (Vψ[A]) and Standard Deviation (Δψ [A]) of an Operator
3.5 Cauchy-Schwarz Inequality
3.6 Commutator and Anticommutator
4 Derivation of Generic Form of Heisenberg-Robertson's Uncertainty Principle
4.1 Expectations of widetildeA and widetildeB
4.2 Variance of widetildeA and widetildeB
4.3 Relation Between [A,B] and [widetildeA, widetildeB]
4.4 Assembling the Previous Sections
5 Typical Examples of Two-State Quantum Mechanical Systems
5.1 Spin-12 Particles
5.2 Photon Polarizations
6 Qubit: Unit of Quantum Information
6.1 Uncertainty in the Light of Quantum Information Science
6.2 Position and Momentum of a Particle
6.3 Making an Analogy with Position and Momentum
7 Conclusion
References
Part II Image and Natural Language Processing
17 Extraction of Appearance-Based DUS Characteristics of Okra Stem, Flower, and Seed Using Image Processing
1 Introduction
2 Literature Survey
3 Materials and Methods
3.1 Sample Collection
3.2 Acquire Image
3.3 Image Processing, Analysis and Feature Extraction
3.4 Manual Measurement by Expert Panel
3.5 Calibration and Implementation
4 Result and Validation
5 Conclusion
References
18 A Typical Hybrid Optimization-Based Image Quality Enhancement Technique
1 Introduction
2 Related Work
3 Proposed Fusion Technique
4 Experimental Work and Simulation Details
5 Conclusion and Future Scope
References
19 A Comparative Study on Reassembly of Image Fragments
1 Introduction
2 Geometry-Based Reassembly
3 Content-Based Reassembly
4 Reassembly Using Machine Learning
5 Experimentations and Results
6 Conclusions
References
20 A Survey on Medical Image Diagnosis Systems: Problems and Prospects
1 Introduction
2 Medical Image Diagnosis
2.1 Medical Image Segmentation
2.2 Medical Image Classification
3 Limitations
4 Conclusion
References
21 An Analysis of Abstractive Text Summarization Using Pre-trained Models
1 Introduction
2 Literature Review
3 Datasets
4 Pre-trained Models
4.1 Pre-trained Model Comparison
5 Evaluation
5.1 Sample Output
6 Conclusion
References
22 Real-Time Left- and Right-Hand Detection for Sign Language Recognition
1 Introduction
2 Related Work
2.1 Two-Stage Detectors
2.2 Single Stage Detectors
3 Methodology
3.1 Dataset
3.2 Training
4 Results
4.1 YOLOv4 Tiny Models
4.2 YOLOv4 Models
4.3 YOLOv5 Small Models
4.4 YOLOv5 Medium Models
5 Conclusion
References
23 Analytical Study on Application of Deep Learning for Sentiment Analysis
1 Introduction
2 Related Work
3 Application of Sentiment Analysis
4 Deep Learning and Sentiment Analysis
4.1 Convolutional Neural Networks (CNNs)
4.2 Word Embedding (WE)
4.3 Recurrent Neural Networks (RNNs)
4.4 Deep Belief Networks (DBNs)
5 Results and Discussion
6 Conclusion
References
24 Class Biased Sarcasm Detection Using Variational LSTM Autoencoder
1 Introduction
2 Literature Survey
3 Methodology
3.1 Corpus Creation
3.2 Deep Neural Network-Based Approach
4 Results and Discussion
4.1 Experimental Setup
4.2 Performance Analysis
5 Conclusion
References
25 A Systematic Survey of the Chatbot Evolution
1 Introduction
2 Related Works
3 Methodologies Used
3.1 Natural Language Processing (NLP)
3.2 Recurrent Neural Network (RNN)
3.3 Deep Learning
4 Conclusions
References
Part III Cyber Security and Blockchain
26 Secured Network Using Penetration Methodologies
1 Introduction
2 VAPT Technique and Phases
3 Proposed System
4 Future Work
5 Conclusion
References
27 An Artificial Intelligence Assisted Defensive Framework for Securing Cyberspace
1 Rise of Cyber Threats in Industry 4.0
1.1 JP Morgan Chase
1.2 TalkTalk
1.3 Sony Pictures
2 Solving Cybersecurity Problems with AI
3 Buffer Overflow and Placing AI in Solution
4 Intelligent Defensive Framework Using AI
4.1 Cyber Analytics Based on Available Data Sources
4.2 Cyber Analytics Based on Learning Methods
4.3 Cyber Analytics Based on Models and Algorithms
4.4 Cyber Analytics Based on End Objectives
5 Characteristics of Proposed Intelligent Defensive Framework
6 Conclusion
References
28 Controlled Chaos Position Transformation and Noise Generation-Based Keyless Speech Encryption Technique
1 Introduction
2 Encryption Technique
2.1 Encryption Algorithm
3 Decryption Technique
3.1 Decryption Algorithm
4 Experimental Analysis
5 Conclusion
References
29 The Study of Major Web Application Vulnerabilities and Their Implementation for Learning Purpose
1 Introduction
2 Literature Review
3 Web Application Vulnerabilities
4 Methodology
5 Results
6 Conclusion
References
30 The Study of the Issues Related to Orphan Blocks
1 Introduction
2 Blockchain Forks
3 Methods to Reduce the Orphan Risk
3.1 Sub Chains to Reduce Orphan Risks
3.2 Eyal and Sirer’s Parameter
4 Methods to Manage Orphan Blocks
4.1 GHOST Protocol
4.2 Multiple Winners Proof of Work Protocol (MWPoW)
5 Conclusion
References
31 A Comprehensive Study on Blockchain-Based Data Security in IoT to Build Reputation for Intelligent Transport Systems
1 Introduction
2 Related Work
2.1 Related Works in Vehicular System:
3 Comparative Study
4 Conclusion
References
32 A Survey on IoT Protocol and Threat Matrix
1 Introduction
2 IoT Layers
3 IoT Applications Eco-system and Threats
4 Comparison of Various IoT Protocol:
5 Conclusion
References
Part IV Cloud and ICT
33 A Study of Different Encryption Techniques to Generate Keys in Cloud Computing Security
1 Introduction
2 Literature Review
3 Summary
References
34 Diverse Contemporary Algorithms to Resolve Load Balancing Issues in Cloud Computing—A Comparative Study
1 Introduction
2 Related Works
3 Problem Description
4 Experimental Setup
5 Experiment and Results
6 Conclusion
References
35 Gradient-Based Intra-prediction in H.265/HEVC to Improve the PSNR
1 Introduction
2 Literature Survey
3 Methodology
3.1 Gradient-Based Prediction
3.2 DC Mode for Prediction
3.3 The Mode Prediction for 16 × 16 Luma and 8 × 8 Chroma MB
3.4 Interpolation
4 Experimental Result
5 Conclusion
References
36 Semantic Web Architecture-Based Examination System for Smart Learning Environment
1 Introduction
2 Proposed System Characteristic
3 Comparative Study of the Present Web-Based Learning and the Proposed System
4 Components of the Proposed System
4.1 Semantic Web Architecture
4.2 Information Retrieval
4.3 Performance Analysis
5 Conclusion
6 Future Scope
References
37 Facial Recognition-Based Automated Classroom Attendance System
1 Introduction
2 Related Works
3 Methodology
3.1 Data Collection
3.2 Facial Recognition
3.3 Methodology Using Facial Recognition
4 Results and Discussions
5 Conclusion
References
38 Generation of Non-isomorphic Connected Graphs by Successive Edge Removals from a Complete Graph
1 Introduction
2 Literature Survey
3 The Proposed Algorithm
3.1 The Algorithm, NICGG()
4 Data Structures and Complexity Issues
4.1 Time Complexity
4.2 Space Complexity
5 Illustration of NICGG with an Example
6 Experimental Results
7 Conclusion
References
39 monitorYou: COVID-19 Screening IoT-Based Android Application
1 Introduction
2 Related Works
3 Proposed System
3.1 System Workflow and Architecture
3.2 Workflow of the IoT Device
3.3 Implementation
3.4 Decision Matrix
3.5 Result and Analysis
3.6 Comparative Analysis
4 Conclusion and Future Work
References
Author Index


📜 SIMILAR VOLUMES


Proceedings of International Conference
✍ Valentina E. Balas (editor), Aboul Ella Hassanien (editor), Satyajit Chakrabarti 📂 Library 📅 2021 🏛 Springer 🌐 English

<p><span>This book includes selected papers presented at International Conference on Computational Intelligence, Data Science and Cloud Computing (IEM-ICDC) 2020, organized by the Department of Information Technology, Institute of Engineering &amp; Management, Kolkata, India, during 25–27 September

Proceedings of International Conference
✍ Nibaran Das (editor), Juwesh Binong (editor), Ondrej Krejcar (editor), Debotosh 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book features high-quality, peer-reviewed research papers presented at the International Conference on Data Electronics and Computing (ICDEC 2022) organized by departments of Electronics and Communication Engineering, Computer Applications, and Biomedical Engineering, North-Eastern Hill U

International Conference on Intelligent
✍ Geetam Singh Tomar (editor), Narendra S. Chaudhari (editor), Jorge Luis V. Barbo 📂 Library 📅 2020 🏛 Springer 🌐 English

<p><span>This book gathers high-quality research papers presented at the First International Conference, ICSC 2019, organised by THDC Institute of Hydropower Engineering and Technology, Tehri, India, from 20 to 21 April 2019. The book is divided into two major sections – Intelligent Computing and Sm

Proceedings of the International Confere
✍ Rajendra Prasad Yadav (editor), Satyasai Jagannath Nanda (editor), Prashant Sing 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book gathers selected high-quality research papers presented at International Conference on Paradigms of Communication, Computing and Data Sciences (PCCDS 2022), held at Malaviya National Institute of Technology Jaipur, India, during 05 – 07 July 2022. It discusses high-quality and cuttin

Proceedings of International Conference
✍ Jyotsna Kumar Mandal (editor), Joyanta Kumar Roy (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book includes the original, peer-reviewed research articles from the International Conference on Computational Intelligence and Computing (ICCIC 2020), held in September 2020 on a virtual platform jointly organized by SR Group of Institutions, Jhansi, India, IETE, Kolkata Centre, India, a

Proceedings of International Conference
✍ Sandeep Kumar (editor), Sunil Dutt Purohit (editor), Saroj Hiranwal (editor), Mu 📂 Library 📅 2021 🏛 Springer 🌐 English

This book gathers selected papers presented at 3rd International Conference on Communication and Computational Technologies (ICCCT 2021), jointly organized in virtual format by Rajasthan Institute of Engineering and Technology, Jaipur and Rajasthan Technical University Kota in association with Soft