<p>The book provides insights from the 2nd International Conference on Communication, Computing and Networking organized by the Department of Computer Science and Engineering, National Institute of Technical Teachers Training and Research, Chandigarh, India on March 29â30, 2018. The book includes co
Proceedings of International Conference on Computing and Communication Networks: ICCCN 2021
â Scribed by Ali Kashif Bashir, Giancarlo Fortino, Ashish Khanna, Deepak Gupta
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 590
- Series
- Lecture Notes in Networks and Systems, 394
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book includes selected peer-reviewed papers presented at the International Conference on Computing and Communication Networks (ICCCN 2021), held at Manchester Metropolitan University, United Kingdom, during 19â20 November 2021. The book covers topics of network and computing technologies, artificial intelligence and machine learning, security and privacy, communication systems, cyber physical systems, data analytics, cyber security for Industry 4.0, and smart and sustainable environmental systems.
⌠Table of Contents
ICCCN-2021 Steering Committee
ICCCN-2021 Advisory Committee and Technical Program Committee
Preface
Contents
Editors and Contributors
1 Intelligent System for Acquiring Knowledge by Converting Arabic Speech to Text
Abstract
1 Introduction
2 Methods and Material
2.1 Speech Duration
2.2 Speech Rate
2.3 Energy
2.4 Formant
2.5 Pitch
2.6 MFCC
3 The Proposed Framework
4 Building Spoken Word Dictionary
4.1 Perform Word Template
4.1.1 Word Class Number
4.1.2 Spoken File Name
4.1.3 Equivalent Text Word(s)
4.1.4 Domain Code
4.1.5 Feature Extract of Spoken Words
4.2 Record Sound Word
4.3 Retrieve Sound Word
4.4 Extract Features of Spoken Word
5 Converting Sound to Text
5.1 Sound Acquisition
5.2 Sound Preprocessing
5.2.1 Filtering
5.2.2 Framing
5.2.3 Windowing
5.2.4 Framing and Windowing
5.3 Splitting Sound
5.4 The Queue of Words
5.4.1 Perform Queue for Spoken Words
5.4.2 Methodology of Queue
5.4.3 The Operations of Queue
5.5 Extract Query Feature Vector of Queue
5.6 Pattern Matching
5.7 The Result of Transforming Sound to Text
6 Extracting Knowledge
7 Experiment
8 Conclusions and Future Works
References
Towards a Deep Learning Approach for Automatic GUI Layout Generation
1 Introduction
2 Related Work
3 Approach
3.1 Datasets
3.2 Model Architecture
3.3 Training and Sampling
4 Experimental Results
5 Discussion
6 Conclusion
References
Insurance Sales Forecast Using Machine Learning Algorithms
1 Introduction
2 MotivationâML Algorithms
2.1 Insurance Prediction Model
2.2 Random Forest Parameters
3 Evaluation Measurements
3.1 Area Under Curve (AUC)
3.2 Classification Accuracy (CA)
3.3 Precision
3.4 Recall
3.5 F1-Score
4 Experimental Results and Datasets
5 Conclusion
References
Ensemble Learning with CNNâLSTM Combination for Speech Emotion Recognition
1 Introduction
2 Proposed Ensemble Architecture
3 Experiments
3.1 RAVDESS Dataset
3.2 Experimental Evaluations and Discussion
4 Conclusion
References
Novel WSN Localization Optimization Algorithm Using MVCRSA
1 Introduction to Mobile WSN
1.1 Brief Review
2 Simulation and Result
3 Conclusion
References
An Enhanced QR Code-Based Smart Parking System for Mobile Environment
1 Introduction
2 Literature Review
3 Proposed Architecture
4 Evaluation
5 Conclusion
References
Traffic Congestion Analysis in India and Fluid Flow Reduction Loss Theory
1 Introduction
2 Test Field and Measurement
2.1 Test Field
2.2 Measurement Data
3 Traffic Congestion Theory
3.1 Fluid Flow Reduction Model
3.2 Traffic Flow Shock Wave
4 Discussion
4.1 Traffic Congestion from Data
4.2 Traffic Shock Wave from Data
5 Conclusion
References
Building an AI/ML Based Classification Framework for Dark Web Text Data
1 Introduction
2 Literary Work
3 System Architecture
4 Data Description and Evaluation
4.1 Data Collection
4.2 Data Extraction
4.3 Data Pre-processing
5 Methodology Used
5.1 System Setup to Access Dark Web
5.2 URL Mining
5.3 Data Scraping
5.4 Keyword Set
5.5 Feature Extraction
5.6 Classifier Selection
6 Result Analysis
6.1 Accuracy Comparison of Models
6.2 The Framework
6.3 Deep Learning Model
7 Conclusion
References
Speech Gender Recognition Using a Multilayer Feature Extraction Method
1 Introduction
2 Related Work
3 Materials and Methodology
4 Framework
5 Results and Discussion
6 Conclusion
References
Speech Age Estimation Using a Ranking Convolutional Neural Network
1 Introduction
2 Related Work
3 Framework
4 Results and Discussion
5 Conclusion
References
Efficient Data Aggregation Strategy in Wireless Sensor Networks: Challenges and Significant Applications
1 Introduction
2 Data Aggregation Strategy in WSNs
3 Challenges of WSNs with Data Aggregation Strategy
4 Classification of WSNs Applications
5 Conclusion
References
An Internet of Things-Empowered Disaster Management Framework
1 Introduction
2 Related Work
3 Disaster Management Scenario
4 Flood Disaster Management Based on IoT, ML Classification, and MAS: SADM-SmartObject
4.1 Data Perception Phase
4.2 Classification Phase
4.3 Decision-Making Phase
4.4 Execution Phase
5 Challenges for IoT-Empowered Disaster Management System
5.1 Security
5.2 Standardization
5.3 Real-Time Analytic
5.4 Cost Effectiveness
6 Conclusion
References
Priority-Based Buffer Management Technique Against Dropping Attack in Opportunistic Networks
1 Introduction
2 Related Work
3 Proposed Work
3.1 Motivation and Proposed Model
3.2 System Model
4 Simulation
4.1 Result and Discussion
5 Conclusion
References
Automatic Health Speech Prediction System Using Support Vector Machine
1 Introduction
2 Related Work
3 Proposed Automatic Health Prediction Speech System
4 Results and Discussion
5 Conclusion
References
Sentiment Analysis of Political Post Classification Based on XGBoost
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset Description
3.2 Pre-processing
3.3 Feature Extraction
3.4 Split Dataset
4 Model Description
5 Evaluation Metric
6 Results
6.1 Discussion
7 Conclusions
References
Applications of Deep Learning Approaches in Speech Recognition: A Survey
1 Introduction
2 Speech Recognition Techniques
3 Challenges
4 Conclusions and Future Works
References
Support-Based High Utility Mining with Negative Utility Values
1 Introduction
2 Problem Statement
3 Related Work
4 Proposed SMNU Algorithm
5 Experimental Evaluation
6 Conclusion
References
Comparative Analysis of Regressor Models on Non-invasive Blood Glucose Dataset
1 Introduction
2 Device Setup and Synthetic Data
3 Hardware Setup
4 Methodology
5 Analysis, Results, and Discussion
5.1 Basic Methods
5.2 Classical Methods
5.3 Hybrid Methods
5.4 Optimized Methods
5.5 Advance Methods
5.6 Stacked Methods
6 Conclusion
7 Future Scope
References
Intelligent Parking System Using Automated License Plate Recognition and Face Verification
1 Introduction
2 Literature Review
3 Artificial Intelligence Model Construction
3.1 License Plate Recognition
3.2 Face Detection
3.3 Face Verification
4 The Proposed Solution
4.1 System Processing Flow
4.2 System Development
5 Result and Discussion
6 Conclusions
References
A Review Study of Smart Vehicle Seat Sensor for Real-Time Postural Analysis
1 Introduction
2 Sensor Types in Car
2.1 Importance of Seat Sensors and Their Types
3 Physics of Real-Time Postural Changes in Car
4 Methods and Techniques to Implement Seat Sensors Machine Learning Models
4.1 Support Vector Machine (SVM)
4.2 Multinominal Regression
4.3 Boosting
4.4 Neural Networks
4.5 Random Forest
5 Application of Seat Sensors
5.1 Find the Seat Occupancy
5.2 Finding the Human Body Posture
5.3 Finding the Drivers Active State Using Seat Sensors
6 Research Gap and Future Scope
7 Conclusion
References
A Proxy Re-signcryption Scheme with Delegation Property
1 Introduction
1.1 Related Work
1.2 Contributions
1.3 Paper Organization
2 Preliminaries
2.1 Bilinear Pairings
2.2 Complexity Assumptions
2.3 Model of Single-Hop U-PRE
2.4 Security Models for U-PRE
3 The Proposal
3.1 Model of Single-Hop Unidirectional PRSCD
3.2 The Detailed PRSCD
3.3 Security Models for PRSCD
4 Performance Evaluation
4.1 Computational Overhead
4.2 Communication Overhead
5 Conclusions
References
Deep Learning-Based COVID-19 Detection Using Lung Parenchyma CT Scans
1 Introduction
2 Methods and Tools
2.1 Proposed Methodology
2.2 Deep Learning Models
3 Experimental Study
3.1 Dataset and Pre-processing
4 Conclusion
References
Spatiotemporal Location Privacy Preservation in 5G-Enabled Sparse Mobile Crowdsensing
1 Introduction
2 Related Work
3 Sparse Mobile Crowdsensing Concepts
3.1 Sparse Mobile Crowdsensing
3.2 Location Privacy-Preserving Framework for SparseMCS
4 Differential and Distortion and Spatiotemporal Location Privacy
4.1 Differential Location Privacy
4.2 Distortion Location Privacy
4.3 Spatiotemporal Location Privacy
4.4 Combined Location Privacy-Preserving Mechanism
5 Location Privacy Protection Mechanism with Minimal Data Loss
5.1 Data Quality Requirements for Location Mapping
5.2 Optimal Location Mapping Matrix Generation
5.3 Noise-Aware Inference Algorithm
6 Evaluation
6.1 Configuration Environment
6.2 Experimental Performance
7 Conclusions
References
Artificial Intelligence Techniques Applied on Renewable Energy Systems: A Review
1 Introduction
2 Renewable Energy Types
2.1 Solar Energy
2.2 Wind Energy
2.3 Hydroelectric Energy
2.4 Ocean Energy
3 Artificial Intelligence (AI)
4 AI Techniques Applied in Renewable Energy
5 Comparative Analysis
6 Challenges
7 Conclusion and Future Directions
References
A Personalized Healthcare Platform for Monitoring Mental Health of a Person During COVID
1 Introduction
2 Related Works
3 System Architecture of Personalized Stress Indicator (PSI)
3.1 Experimental Setup and Visual Stimulus
4 Implementation and Result Analysis
4.1 MATLAB Analysis
5 Conclusion and Future Enhancement
References
Offloading Strategy of D2D Communication and Computing Resources Based on Shared Tasks
1 Introduction
2 Our Contribution
3 Related Work
4 System Model and Problem Modeling
4.1 Analysis of NOMA Transmission and Traditional Transmission
4.2 Cellular Network Users with Social Attributes
4.3 Cellular Communication Network Users and D2D Communication Network Users
4.4 Problem Modeling
5 Solving Algorithm
6 Experimental Results
7 Conclusion
References
Computation Offloading in Edge Computing Based on Deep Reinforcement Learning
1 Introduction
2 System Model
3 Problem Formulation
4 DRL Based Task Mapping Algorithm
4.1 Graph Sequence Algorithm
4.2 Markov Decision Process
4.3 Algorithm Design
5 Performance Evaluation
5.1 Simulation Environment
5.2 Simulation Results
6 Conclusion
References
Analysis of Machine Learning and Deep Learning in Cyber-Physical System Security
1 Introduction
2 CPS Layers
2.1 CPS Layers with Possible Attacks
3 CPS Framework for Detection of Attacks
3.1 Data Gathering
3.2 Data Preprocessing
3.3 Feature Extraction
3.4 Model Testing and Training
3.5 Attack Evaluation
4 ML and DL for CPS
5 Results and Analysis
6 Challenges and Limitations of CPS
7 Conclusion
References
Visual Exploration in Glaucoma Patients Using Eye-Tracking Device
1 Introduction
2 Related Works
3 Materials and Methods
4 Analysis
4.1 Performance of Glaucoma Group Versus Normal Group
4.2 Eye Movement Measures of Glaucoma Group Versus Normal Group
5 Visualization
6 Discussion
7 Conclusion
References
Impact of Deep Learning in the Analysis of Particulate Matter in the Air Pollution
1 Introduction
2 Related Works
3 Proposed Work
4 Experimental Analysis and Results
4.1 Comparison of Accuracy
4.2 Comparison of F-Score
4.3 Comparison of RMSE
5 Conclusion
References
Toward Machine Learning and IoT Environment-Enabled Smart Personal Health Monitoring Framework
1 Introduction
2 Related Work
3 Proposed Machine Learning IoT Framework
4 Experiments and Results
5 Conclusion and Future Work
References
Exploration Study of Ensembled Object Detection Models and Hyperparameter Optimization
1 Introduction
2 Existing Methods
2.1 You Only Look Once (YOLO)
2.2 Single Shot Detector (SSD)
2.3 Faster Region-Based Convolutional Neural Networks
2.4 CenterNet
2.5 Ensembling
3 Proposed Method
3.1 Weighted Boxes Fusion
4 Research Approach
4.1 Dataset
4.2 Training
4.3 Testing
4.4 Prediction Ensembling
5 Results and Discussion
5.1 Evaluation Metrics
5.2 Intersection Over Union (IOU)
5.3 Precision X Recall Curve
5.4 Average Precision
5.5 Recorded Metrics
6 Conclusion
7 Future Scope
References
Evaluation of DSRC and LTE-V2x: Need for Next-Generation V2X Communication Systems
1 Introduction
2 Current V2X Communications Systems
2.1 IEEE 802.11p for Standalone Deployment
2.2 Cellular LTE-V2x for Infrastructure-Assisted Deployment
3 Performance Evaluation of IEEE 802.11p and LTE-V2x Uu
4 Conclusion
References
A Novel Secure Data Processing Mechanism in IoT Using Deep Learning with Ontology
1 Introduction
2 Related Work
3 Proposed Work
4 Experimental Analysis and Results
5 Conclusion
References
An End-to-End System for Text Extraction in Indian Identity Cards
1 Introduction
2 Related Works
3 Test Dataset
4 System Design
4.1 Image Processing
4.2 Text Detection
4.3 Text Recognition
4.4 Android/Web App Deployment
5 Results of Various Models
6 Conclusion
References
Static Malware Analysis Using Machine and Deep Learning
1 Inroduction
1.1 Research Background
2 Related Work
3 Methods for Malware Analysis
3.1 Static Analysis
3.2 Dynamic Analysis
4 PE File Format
5 Dataset Description
6 Model Implementation
6.1 Performance Evaluation
7 Conclusion
8 Future Work
References
An Elaborative Approach for the Histopathological Classification of the Breast Cancer using Residual Neural Networks
1 Introduction
2 Related Work
3 Methodology
4 The Proposed System
5 Results
6 Conclusion
7 Future Work
References
Optimization of Textual Index Construction Using Compressed Parallel Wavelet Tree
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Wavelet Tree with LZW (WTL)
3.2 Parallel Wavelet Tree with LZW (PWTL)
4 Result and Analysis
5 Conclusion and Future Work
References
Robust Approach for Detecting Face Mask Using Deep Learning and Its Comparative Analysis
1 Introduction
1.1 Convolutional Neural Network
1.2 Computer Vision
2 Literature Survey
3 Dataset
4 Proposed Revised Model
4.1 Data Importing and Pre-processing
4.2 Splitting of the Dataset
4.3 Model Building and Training
4.4 Face Detection Using Webcam
4.5 Loading the Trained Classifier
5 Evaluation Metrics
5.1 Precision
5.2 Recall
5.3 F1-Score
6 Discussions
7 Results
8 Managerial and Social Implications
9 Conclusion
References
Utilizing Deep Belief Network for Ensuring Privacy-Preserved Access Control of Data
1 Introduction
2 Motivation
2.1 Related Works
2.2 Challenges
3 System Model for Cloud
4 Proposed Privacy-Preserved Access Control (PPAC) Method
4.1 Registration Phase of PPAC Method
4.2 Control Setup and Validation Phase of PPAC Method
4.3 DBN-Based Anomaly Detection Phase of PPAC Method
5 Results and Discussion
5.1 Evaluation Metrics
5.2 Comparative Methods and Analysis
6 Conclusion
References
Wild OCR: Deep Learning Architecture for Text Recognition in Images
1 Introduction
2 Related Work
3 Implementation
4 Result Analysis
5 Limitations and Future Work
References
ScamBlk: A Voice Recognition-Based Natural Language Processing Approach for the Detection of Telecommunication Fraud
1 Introduction
2 Related Works
3 Proposed System Architecture
4 Implementation and Result Analysis
5 Conclusion
References
Personality BERT: A Transformer-Based Model for Personality Detection from Textual Data
1 Introduction
2 Related Work
3 The Proposed Personality BERT Model
4 Results
5 Conclusion
References
A Bi-Level Stochastic Model with Averse Risk and Hidden Information for Cyber-Network Interdiction
1 Introduction
2 Related Work
3 Problem Definition and Formulation
3.1 Minimize the Disutility of Defender
3.2 Maximize the Utility of Attacker
4 Solution Approach
5 Experiments
5.1 Parameter Setup
5.2 Effects of Involving FCs
5.3 Effects of the Probability of Exposure
5.4 Effects of the Probability of Successful Attack
5.5 Effects of the Budget of TCs and FCs
5.6 Effects of Confidence Level and Risk Coefficient
6 Conclusions
References
Univariate Nonlinear VMs Instances Demand Forecasting for Optimized Cloud Resources Orchestration
1 Introduction
2 Literature Review
3 Methodology
4 Results Performance Analysis
4.1 Experimentation Setup and Dataset Analysis
4.2 Prediction Results
5 Conclusion
References
A Study on Audio Quality of Experience for WebRTC-Based Communication Applications
1 Introduction
2 Related Work
3 Opus Audio Codec Features
4 Experiment
4.1 Testing Environment
4.2 Testing Scenarios
5 Conclusion
References
AVR Technologies in Sustainable Tourism: A Bibliometric Review
1 Introduction
2 Research Methodology
2.1 Data Collection
2.2 Analysis
3 Discussion
4 Conclusion and Future Research Agenda
Appendix
References
A Memory-Based Particle Swarm Optimization for Parameter Identification of Lorenz Chaotic System
1 Introduction
2 Problem Formulation
3 Particle Swarm Optimization (PSO)
4 Memory-Based Particle Swarm Optimization (MbPSO)
5 Parameter Configuration for the Proposed Algorithm (MbPSO)
6 Results and Discussion
7 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<div>This book offers a collection of high-quality peer-reviewed research papers presented at the Second International Conference on Communication and Computational Technologies (ICCCT 2019), held at Rajasthan Institute of Engineering and Technology, Jaipur, Rajasthan, India, on 30â31 August 2019. I
<div>This book offers a collection of high-quality peer-reviewed research papers presented at the Second International Conference on Communication and Computational Technologies (ICCCT 2019), held at Rajasthan Institute of Engineering and Technology, Jaipur, Rajasthan, India, on 30â31 August 2019. I
<p><span>This book covers selected and presented papers of CCCN 2023, the International Conference on Cloud Computing and Computer Network which was held in Singapore April 21-23, 2023. CCCN 2023 provides a premier forum for researchers and scholars from multiple disciplines to come together to shar
<p><span>This book includes high-quality research papers presented at the Fourth International Conference on Communication, Computing and Electronics Systems (ICCCES 2022), held at the PPG Institute of Technology, Coimbatore, India, on September 15â16, 2022. The book focuses mainly on the research t
This book gathers selected papers presented at 3rd International Conference on Communication and Computational Technologies (ICCCT 2021), jointly organized in virtual format by Rajasthan Institute of Engineering and Technology, Jaipur and Rajasthan Technical University Kota in association with Soft