This book presents high-quality research papers presented at the 3rd International Conference on Intelligent Computing and Advances in Communication (ICAC 2020) organized by Siksha âOâ Anusandhan Deemed to be University, Bhubaneswar, Odisha, India, in November 2020. This book brings out the new adva
Progress in Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2020 (Advances in Intelligent Systems and Computing, 1299)
â Scribed by Chhabi Rani Panigrahi (editor), Bibudhendu Pati (editor), Binod Kumar Pattanayak (editor), Seeven Amic (editor), Kuan-Ching Li (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 883
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
This book focuses on theory, practice and applications in the broad areas of advanced computing techniques and intelligent engineering. This book includes 74 scholarly articles which were accepted for presentation from 294 submissions in the 5th ICACIE during 25â27 June 2020 at UniversitĂ© des Mascareignes (UdM), Mauritius, in collaboration with Rama Devi Womenâs University, Bhubaneswar, India, and SâOâA Deemed to be University, Bhubaneswar, India. This book brings together academicians, industry persons, research scholars and students to share and disseminate their knowledge and scientific research work related to advanced computing and intelligent engineering. It helps to provide a platform to the young researchers to find the practical challenges encountered in these areas of research and the solutions adopted. The book helps to disseminate the knowledge about some innovative and active research directions in the field of advanced computing techniques and intelligent engineering, along with some current issues and applications of related topics.
⊠Table of Contents
Preface
Contents
About the Editors
AI and Machine Learning Applications
Forecasting Price of Indian Stock Market Using Supervised Machine Learning Technique
1 Introduction
1.1 Stock Market Prediction
2 Literature Survey
3 Methods and Material
3.1 Dataset Description
3.2 Methodology
4 Outcomes and Implementation
5 View and Analyze Results
5.1 Screenshots of the Outcome
6 Conclusion
References
Speaker Recognition Using Noise Robust Features and LSTM-RNN
1 Introduction
1.1 Related Work
2 Preliminaries
2.1 Feature Extraction Techniques
2.2 Long Short-Term Memory (LSTM)
3 Proposed Architecture
4 Implementation Details and Results
4.1 Results
5 Conclusion and Future Work
References
Brain Tumor Segmentation Using Random Walks from MRI Images
1 Introduction
2 Proposed Method
2.1 Random Walks Segmentation
3 Experimental Results
3.1 Dataset
3.2 Qualitative Evaluation
3.3 Quantitative Evaluation
3.4 Discussion
4 Conclusion
References
Factors Accountable for Diabetes Using Artificial Intelligence in Medico-Care
1 Introduction
1.1 Big Data Analytics in Healthcare
1.2 Electronic Health Records
2 Data
3 Results
4 Result Analysis and Discussion
5 Conclusion
References
An Evaluation of Deep Learning Networks to Extract Emotions from Yelp Reviews
1 Introduction
2 Deep Learning
2.1 Convolutional Neural Network (CNN)
2.2 Long Short-Term Memory (LSTM)
2.3 Word Embeddings
2.4 Evaluating Performance of Deep Learning Methods
3 Related Works
4 Implementing the Emotion Classification Model for Yelp
4.1 Dataset Used for the Study
4.2 Data Pre-processing
4.3 Deep Learning Models Tested
4.4 Model Training
5 Model Evaluation
6 Discussion
7 Conclusion
References
Classification of Brain Tumor MRIs Using Deep Learning and Data Augmentation
1 Introduction
2 Materials and Methods
2.1 Brain Tumor Datasets
2.2 CNN Models and Brain Tumor
2.3 Deep Transfer Learning
2.4 Empirical Work
3 Results and Discussions
3.1 Performance Metrics
3.2 Evaluation of Results
3.3 Discussion
4 Conclusion
References
Deep Neural Network Optimization for Handwritten Text Recognition
1 Introduction
2 Related Work
3 Problem Formulation
4 Methodology
4.1 CNN-RNN Hybrid Architecture
4.2 Multidimensional Recurrent Neural Network
4.3 Evaluation Metric
4.4 Hyperparameters
4.5 Decoding Algorithms
4.6 Calculation of CTC Loss
5 Experiments and Results
6 Conclusions
References
Consolidating Online Real Estate Data Using Image Analysis and Text Processing
1 Introduction
2 Online Federated Search System
2.1 Single Database Architecture
2.2 Distributed Information Retrieval Architecture
2.3 Popular Federated Search System
3 Detecting Similar Images
3.1 Scale-Invariant Feature Transform (SIFT)
3.2 Speeded Up Robust Features (SURF)
3.3 KAZE
3.4 AKAZE
3.5 Oriented FAST and Rotated BRIEF (ORB)
4 Finding Similar Text Contents
4.1 Levenshtein Distance Similarity Ratio
4.2 Robin Karp Algorithm
5 Proposed Real Estate Federated System
5.1 Information Extraction
5.2 Property Matching Engine
6 Implementation, Testing, and Results
7 Evaluation and Discussion
8 Conclusion
References
Time Series Visualization of Customer Emotions Using Artificial Neural Network
1 Introduction
2 Online Customer Reviews
2.1 Electronic Word of Mouth
2.2 Reviews Classification
2.3 Reviews Characteristics
2.4 Motivations for Providing Online Reviews
2.5 Impacts of Online Reviews for Companies
3 Emotion Analysis
3.1 Emotion Models
3.2 Analytical Approaches of Emotion Detection from Text
3.3 Emotion Detection Algorithms
4 Proposed Approach to Analyze Online Hotel Reviews
5 Implementation, Results and Interpretations
6 Evaluation and Discussion
7 Conclusion
References
Sentiment Analysis Using Deep Learning for Recommendation in E-Learning Domain
1 Introduction
1.1 Incorporating Emotions to Support Adaptive E-Learning
1.2 Sentiment Analysis Techniques
2 Outline of SABCNN
2.1 Training Process
2.2 Recommendation Process
3 The Proposed Model
3.1 Data Sets
3.2 Processing of the Reviewsâ Text
3.3 CNN Model Construction
4 Experiments
5 Results and Discussion
6 Conclusion
References
Selection of Best K of K-Nearest Neighbors Classifier for Enhancement of Performance for the Prediction of Diabetes
1 Introduction
2 Literature Review
3 K-Nearest Neighbors Algorithm
4 Experimental Process on Diabetes Dataset
4.1 Work Flow of Proposed Model
5 Result and Discussion
6 Conclusion and Future Scope
References
Phishing Website Prediction: AÂ Machine Learning Approach
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset Analysis
3.2 Machine Learning Classifiers Used
4 Results and Discussion
5 Conclusion
References
COVID-19 Sentimental Analysis Using Machine Learning Techniques
1 Introduction
2 Related Works
3 Proposed Approach
3.1 Pre-processing of Dataset
3.2 Feature Extraction
3.3 Classification of Models
4 Experiments and Results
4.1 Experiments
4.2 Results
5 Conclusion
References
Multimodal Music Mood Classification Framework for Kokborok Music
1 Introduction
2 Related Works
2.1 Data Set and Taxonomy
2.2 Mood Classification Using Audio Feature
2.3 Mood Classification from Lyric Features
2.4 Multi-modal Music Mood Classification
3 Proposed Work
3.1 Database Creation of Christian Kokborok Music
3.2 Mood Annotated Dataset
3.3 Taxonomy Generation
4 Feature Selection
4.1 Features Selection for Audio Classification
4.2 Future Selection for Lyrical Classification
5 Classification Result and Evaluation
5.1 Classification System Evaluation
5.2 Classification Based on Lyrics
5.3 Multimodal Classifications
5.4 Comparison of Different Algorithms and System Performance
6 Conclusions and Future Work
References
Forecasting of Daily Demandâs Order Using Gradient Boosting Regressor
1 Introduction
2 Research Background
3 Gradient Boosting Algorithm
4 Methodology
5 Experimental Results
6 Conclusion and Future Work
References
Improving Impulse Noise Classification Using Ensemble Learning Methods
1 Introduction
1.1 Problem Statement
2 Ensemble Learning
3 Statistical Pixel Parameters
3.1 ROR
3.2 Road
3.3 Rold
3.4 MAD
3.5 S-Estimate
3.6 ADM
4 Machıne Learnıng Algorıthms
4.1 Bayesian Classifier
4.2 Random Forest Classifiers
5 Implementation and Results
5.1 Algorithm: Supervised Learning
6 Conclusion
References
Image Data Preservation with Fractional Sine Transform and Dual Chaotic Sequence
1 Introduction
2 Preliminary Postulate
2.1 Logistic Chaotic Map
2.2 Arnold Cat Map
2.3 Discrete Fractional Sine Transform (DFrST)
3 Proffered Algorithm
3.1 Encryption and Decryption with DFrST and Dual Chaos
4 Results and Discussion
5 Conclusion
References
Enhancing Deep Learning Capabilities with Genetic Algorithm for Detecting Software Defects
1 Introduction
2 Literature Review
3 Proposed Model
3.1 Genetic Algorithm
3.2 Hybrid Intelligence of Genetic Algorithm with Deep Neural Network
4 Experimental Study and Results
4.1 Dataset Details
5 Performance Analysis and Discussion of Results
5.1 Experimental Scenario 1
6 Conclusion and Future Work
References
Application of Classifier for Breast Cancer Cell Detection
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Techniques Used
4 Metric Used for Validation
5 Experiment and Result Analysis
6 Conclusion and Future Scope
References
Apriori-Backed Fuzzy Unification and Statistical Inference in Feature Reduction: An Application in Prognosis of Autism in Toddlers
1 Introduction
2 Literature Review
2.1 Data Garnering and Predictive Analyses Using Basic ML
2.2 Approaches to Eliminate Redundant Features
2.3 Applications Using Fuzzy Logic
2.4 Usage of Data from Variegated Sources
3 Proposed Model
3.1 Preprocessing ASD Data and Producing Variants of the Dataset
3.2 Finding, Fitting, Tuning Predictive Model
3.3 Estimating Performance Metrics
4 Experimental Results and Discussion
5 Conclusion
References
Developing a Framework for Generating Hotel Recommendation
1 Introduction
2 Related Work
3 System Architecture and Design
3.1 Data Storing and Processing
3.2 Point of Interest (POI)
3.3 Keyword Extraction and Refinement
3.4 Score Generation
4 Experimental Results and Analysis
5 Conclusions and Future Work
References
Rumor Source Identification on Social Networks: A Combined Network Centrality Approach
1 Introduction
2 Related Work
3 Preliminaries
3.1 Susceptible â Infected (SI) Model
3.2 Betweenness Centrality
3.3 Rumor Centrality
3.4 Jordan Centrality
4 Proposed Approach
5 Results and Discussions
6 Conclusion
References
Sentiment Polarity Detection on Bengali Book Reviews Using Multinomial NaĂŻve Bayes
1 Introduction
2 Related Work
3 Dataset Preparation
4 Sentiment Polarity Detection Framework
4.1 Preprocessing
4.2 Feature Extraction Techniques
5 Results Analysis
6 Conclusion
References
Real-Time Facial Emotions Analysis in Videos
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Face Detection and Feature Extraction
3.2 Video Processing
3.3 Dataset
3.4 Training Process
3.5 Experiment and Result
4 Conclusion
References
An Extended Genetic Algorithm-Based Prevention System Against DoS/DDoS Flood Attacks in VoIP Systems
1 Introduction
2 Literature Survey
3 The Mitigation Model
4 The VoIP Defense System Architecture
4.1 Methodology and Testbed
4.2 Dataset and Attack Scenarios
5 Experimental Analysis and Discussion
5.1 Experimental Metrics Used
5.2 Performance Evaluation
6 Conclusion
References
Entropy Based Cluster Selection
1 Introduction
2 Related Work
3 Problem Statement
4 Proposed Methods
5 Experimental Result
5.1 Datasets
5.2 Ensemble Generation
5.3 Evaluation
6 Conclusion
References
Human Activity Recognition Using Machine Learning: AÂ Review
1 Introduction
2 HAR Datasets
2.1 Sensor-Based Dataset
2.2 Vision-Based Datasets
3 Literature Study
4 Conclusion and Future Work
References
Advanced Computer Networks and Algorithms
Ensuring Secure Communication from an IoT Edge Device to a Server Through IoT Communication Protocols
1 Introduction
2 Background Study
2.1 CoAP
2.2 Security in CoAP
3 Testbed
4 Experiments and Results
5 Results and Analysis
6 Conclusions
References
A QoI Assessment Framework for Participatory Crowdsourcing Systems
1 Introduction
2 Research Methodology
3 Challenges for Participatory Crowdsourcing Systems
4 Taxonomy of Quality of Information
4.1 Quality of Information in PCS
4.2 Dimensions of QoI in Participatory Crowdsourcing Systems
5 Proposed QoI Assessment Framework for PCS
6 Proposed Metric for Dimension in the QoI Assessment Framework
7 Evaluation of the Proposed QoI Assessment Framework
8 Conclusion
References
An Approach to Personalize VMware vSphere Hypervisor (ESXi) Using HPE Image Streamer
1 Introduction
1.1 Objective
2 System Architecture
3 Methodology
4 Conclusion
References
A Proposed IoT Architecture for Corals Research Using AI and Robotics
1 Introduction
1.1 Coral Reefs in Mauritius
2 Architecture of the Proposed Framework
2.1 Concept of Proposed System
2.2 Design of the Underwater Vehicle
2.3 Design of Surface Station
2.4 Design of Ground Station
3 Integration of IoT and Artificial Intelligence
3.1 Design of IoT Structure
3.2 Use of AI Algorithms
4 Expected Results
5 Conclusion
References
Voice Password-Based Secured Communication Using RSA and ElGamal Algorithm
1 Introduction
2 Literature Servey
3 Methodology
3.1 Encryption and Decryption Technique Using RSA and ElGamal Algorithm
3.2 Key Generation, Encryption, Decryption
3.3 Proposed Methodology
4 Results and Discussions
4.1 Comments on Results
5 Conclusion
References
UD-RMM: A Remote Monitoring and Management Tool Using PowerShell Universal Dashboard for Universities
1 Introduction
1.1 Desired Features of an RMM Tool in Universities
2 Literature Survey
2.1 Similarities in Existing Software
2.2 Drawbacks in Existing Software
3 Proposed Solution
3.1 UI/UX Design
3.2 Networking Concepts
3.3 Tools Used
4 Sample Demonstrations
5 Conclusion and Future Work
References
Performance and Resource-Aware Virtual Machine Selection using Fuzzy in Cloud Environment
1 Introduction
2 Literature Review
3 System Model
3.1 Fuzzy Inference System
3.2 Proposed VM Selection Policy (PRSF)
4 Experimental Setup
4.1 Data Center Configuration
4.2 Performance Parameters
5 Results and Discussion
6 Conclusion and Future Scope
References
Redefining Data Dimensionality Through Dynamic Linkages in Data-Space Continuum
1 Introduction
2 Literature Review
2.1 Case: A Regression on Einsteinâs Train Analogy
2.2 Kernel Trick
3 Methodology
4 Results and Discussion
4.1 Dataset Preparation
4.2 Experiment Results
5 Conclusion
References
Implementation of Encryption Techniques in Secure Communication Model
1 Introduction
2 Encryption Techniques
2.1 RSA
2.2 Caesar Cipher
3 Modulation Techniques
4 Proposed Communication Model
5 Result and Discussion
5.1 No Encryption and Caesar Cipher
5.2 No Encryption and RSA Algorithm
5.3 RSA Encryption and Caesar Cipher
5.4 No Encryption, Caesar Cipher and RSA
6 Conclusion and Future Works
References
AÂ Group Decision Making Problem Involving Fuzzy TOPSIS Method
1 Introduction
2 Basic Concepts
2.1 Definitions
2.2 TOPSIS Method
2.3 Fuzzy TOPSIS Method
3 Research Methodology
4 Computational Illustration
5 Conclusion
References
IoT-Based Smart Intravenous Drip Monitoring System
1 Introduction
2 Existing System
3 Proposed System
4 Implementation
5 Results and Discussion
6 Conclusion and Future Direction
References
Cryptanalysis of Lightweight Ciphers Using Metaheuristics
1 Introduction
2 Short Specifications of Selected Ciphers
2.1 AES
2.2 CLEFIA
2.3 SPARX-N/k
2.4 Speck
3 Metaheuristics Algorithms
3.1 Genetic Algorithm
3.2 Firefly Algorithm
3.3 Particle Swarm Optimization Algorithm
4 Methodology
5 Results and Discussion
6 Conclusion and Future Directions
References
Product Classification in E-Commerce Sites
1 Introduction
2 Literature Survey
3 Data
3.1 Data Preprocessing
3.2 Splitting of the Existing Dataset into Training Data and Test Data
4 Initial Methodology
4.1 Decision Trees
4.2 Support Vector Machine
5 Modified Approach
5.1 Preprocessing
5.2 Algorithms Adopted
6 Results
7 Conclusion
References
Real-Time Detection of Inter-Frame Video Forgeries in Surveillance Videos
1 Introduction
2 Optical Flow Variation Factor
3 Methodology
4 Experiment Scenarios and Results
4.1 Frame Deletion
4.2 Frame Insertion
4.3 Frame Duplication
4.4 Results
5 Conclusion
References
An IoT-Based System Architecture for Environmental Monitoring
1 Introduction
2 IoT Architecture
3 IoT Security Issues and Challenges
4 Related Work on IoT for Environment
5 Proposed IoT-Based Environmental Monitoring System
6 Conclusion and Future Work
References
Performance Evaluation of VM Allocation Strategies on Heterogeneous Environments in Cloud Data Center
1 Introduction
2 VM Allocation Policies
3 Performance Evaluation Parameters
4 Experimental Setup and Result Evaluation
4.1 Workload Traces
4.2 Physical Machine Heterogeneity
4.3 VM Selection Strategies
4.4 Adaptive Threshold Policies
5 Conclusion
References
QSens: QoS-Aware Sensor Node Selection in Sensor-Cloud Architecture
1 Introduction
2 Related Work
3 Problem Scenario
4 QSens: The Proposed Scheme
4.1 Statistical Variables for Sensor Node Specifications
4.2 QoS Formulation
5 Performance Analysis
6 Conclusion
References
Introduction to Adjacent Distance Array with Huffman Principle: A New Encoding and Decoding Technique for Transliteration Based Bengali Text Compression
1 Introduction
2 Architecture
2.1 Process of Transliteration
2.2 Compression Using Huffman Principle and Adjacent Distance Array
3 Implementation
3.1 Explanation of Encoding Process
3.2 Explanation of Decoding Process
4 Analysis and Discussion
5 Conclusion
References
BSAT: A New Tool for Analyzing Cryptographic Strength of Boolean Function and S-Box of Symmetric Cryptosystem
1 Introduction
2 Preliminaries
2.1 Boolean Function
2.2 Cryptographic Properties of Boolean Function
2.3 S-Box Definition and Representations
2.4 Cryptographic Properties of S-Box
3 Practical Implementation
3.1 Balancedness
3.2 Nonlinearity
3.3 Algebraic Degree
4 BSAT: Execution and Performance Analysis
4.1 Practical Results and Execution Time
5 Conclusion and Future Work
References
Sorted Galloping Prevention Mechanisms Against Denial of Service Attacks in SIP-Based Systems
1 Introduction
2 Related Work
3 The Mitigation Methods
4 The VoIP Defense System Architecture
4.1 Proposed Architecture and Methodology
4.2 Dataset and Attack Scenarios
5 Experimental Analysis and Discussion
5.1 Experimental Metrics Used
5.2 Performance Evaluation
6 Conclusion
References
Performance Enhancement and Reduce Energy Consumption with Load Balancing Strategy in Green Cloud Computing
1 Introduction
1.1 Virtualization
1.2 Load Balancing
2 Related Study
3 Existing System
3.1 Round Robin Algorithm
3.2 Equally Spread Current Execution (ESCE) Algorithm
3.3 Throttled Algorithm
3.4 Least Frequently Used (LFU) Algorithm
4 Proposed System Model
4.1 Proposed Load Balancing Algorithm
4.2 Flowchart of Proposed Load Balancing Algorithm
5 Experimental Setup
6 Conclusion
References
A Framework for Secure Communication on Internet of Things (IoT)
1 Introduction
2 IoT Architecture Protocol Stack
3 IoT Security Issues and Challenges
3.1 Perception Layer
3.2 Network Layer
3.3 Application Layer
4 Related Work on IoT Communication Protocols
5 Proposed Security Framework
6 Conclusion and Future Work
References
COVTrac: Covid-19 Tracker and Social Distancing App
1 Introduction
1.1 Motivation
1.2 Contributions
2 Proposed System
3 Implementation and Working
3.1 System Architecture
3.2 Working
4 Experimental Results
5 Conclusion
References
JOB-DCA: A Cost Minimizing Jaya Optimization-Based Data Center Allocation Policy for IaaS Cloud Model
1 Introduction
1.1 Motivation and Contributions
2 Related Work
3 Proposed Work
4 Simulation and Results
4.1 Performance
4.2 Results and Discussion
5 Conclusion and Future Scope
References
Sustainable Computing and Engineering
Teaching and Learning Concepts of Audio Modulation Using Tangible User Interfaces
1 Introduction
2 Related Works
3 Prototype Design and Implementation
3.1 Prototype Design
3.2 Implementation
3.3 Tangible Interaction
4 Evaluation
5 Results and Discussions
5.1 Learnability
5.2 Interaction
5.3 Tangibility
5.4 Enjoyment
5.5 Intention of Use
5.6 General Discussions
6 Recommendations
7 Conclusions
References
Performance Investigation of Dipole and Moxon Antennae for VHF Communication
1 Introduction
1.1 Dipole Antenna
1.2 Moxon Antenna
2 Methodology
2.1 Dipole Antenna
2.2 Moxon Antenna
3 Results
3.1 Return Loss Versus Frequency
3.2 Radiation Pattern
3.3 Gain and Directivity
4 Conclusion
References
Cloud Computing Load Balancing Using Amazon Web Service Technology
1 Introduction
1.1 Cloud Computing
1.2 Types of Cloud
1.3 Cloud Computing Service Model
1.4 Numerous Advantages of Cloud Computing
2 What is AWS
2.1 Basic Architecture of AWS
2.2 Components of AWS
2.3 Services Provided by AWS
3 Load Balancing
3.1 ELB
3.2 Auto Scaling
4 Implementation, Result, and Analysis
5 Conclusion
References
New Management Algorithms for Smart Electricity Network: Designing and Working Principles
1 Introduction
2 Designing Method of the New Algorithms
2.1 The Consumption-Smoothing Algorithm
2.2 The Renewable Energy Algorithm
3 Simulation Results of the Algorithms
3.1 Hypothesis of the Simulation
3.2 Behavior of the Algorithms
3.3 Reliability Tests of the Algorithms
4 Conclusion
References
Analyzing Key Barriers for Adoption of Digitalization in Indian Construction Industry: A Case Study
1 Introduction
2 Literature Review
3 Research Method- DEMATEL Technique
4 Case Study to Identify Main Barriers Alternatives for Digitalization in Construction Firm
5 Discussion and Conclusion
References
Improved Peak-to-Average Power Ratio Reduction Method for OFDM/OQAM System
1 Introduction
2 System Model
3 PAPR Calculation and Clipping Process
3.1 PAPR Calculation
3.2 Clipping Principle
4 Performance Analysis
5 Simulation Results
6 Conclusion
References
Implementation of a Smart Parking System for a University Campus
1 Introduction
2 Related Work
3 Proposed Smart Parking System
3.1 IoT Sensors and Data Capture
3.2 Data Storage
3.3 Mobile Application
3.4 Parking System Algorithm
3.5 Prioritization of Parking Users
3.6 Optimization of Slot Assignment Time
3.7 Use of Hungarian Algorithm to Solve the Problem
4 Discussion
5 Conclusion and Future Works
References
High-Resolution Wind Speed Mapping for the Island of Mauritius Using Mesoscale Modelling
1 Introduction
2 The Region of Study
3 Data and Methodology
3.1 Brief Description of the WRF Model
3.2 Model Configuration and Initialization
4 Results and Discussions
4.1 Validation of the Model for Different Climatic Conditions
4.2 Mapping of High-Resolution Wind Resource Maps
5 Conclusions
References
Analysis of Wind Energy Resources for the Island of Mauritius Using Concepts of Thermodynamics
1 Introduction
2 Methodology
2.1 Study Region
2.2 Wind Mapping
2.3 Efficiency of Wind Turbines
2.4 Validation of the Model
3 Results and Discussion
3.1 Mapping of the Physical Exergy for Wind Over Mauritius
4 Conclusions
References
Design and FPGA Implementation of an Efficient 8Ă8 Multiplier Using the Principle of Vedic Mathematics
1 Introduction
2 Literature Survey
3 Vedic Mathematics
3.1 Urdhwa-Tiryakbhyam
4 Implementation of Urdhwa-Tiryabhyam (Algorithm)
5 Software and Hardware Implementation and Results
6 Comparison with Boothâs Multiplier
6.1 Logic Elements
6.2 Propagation Delay
6.3 Structure
6.4 Power Analyzer Summary
7 Conclusion
References
Fault Detection and Isolation in a Leaky Water Distribution Network Using Fuzzy Logic Control Based on Residual Pressure Analysis
1 Introduction
2 Methodology
2.1 Transient Analysis of Pressure
2.2 System Identification
3 Residual Generation and Analysis
4 Fuzzy Logic Controller Design
5 Results of Simulation
6 Conclusion and Recommendations
References
Robo-Friend: Can a Social Robot Empathize with Your Feelings Effectively?
1 Introduction
2 Related Work
3 Design Approach
4 Context Study and Conceptualization
5 Design Explained
5.1 Experience Goals
5.2 Prototype Design
6 Prototype Evaluation
6.1 Evaluation Methods
6.2 Participants
6.3 Results
7 Discussion
8 Conclusion and Future Work
References
Management and Banking Applications
Using Stakeholder Expectations and Perceptions to Guide the Brand Refresh of a Tropical Airline
1 Introduction
2 Literature Review
2.1 Brands
2.2 Branding and Branding Elements
2.3 Brand Touchpoints
2.4 Brand Essence
2.5 Branding in the Airline Industry
2.6 Livery as an Integral Part of Branding in the Airline Industry
3 Methodology
3.1 Focus Groups
3.2 Surveys
4 Findings
4.1 Initial Diagnosis
4.2 Dissection of the Air Seychelles âOnlyâ Statement and the Brand Essence
4.3 Customersâ Feedback on the Air Seychelles Brand Touchpoints
4.4 Livery Refresh Options Based on Findings
5 Conclusion
References
An Analysis of Communication Strategies of Fast Food Outlets on Social Media in Mauritius
1 Introduction
2 Literature Review
2.1 Social Media
2.2 Facebook
2.3 Online Brand Communities
2.4 Content Strategy
3 Methodology
4 Findings and Discussion
4.1 Content Strategies of Fast Food Outlets on Facebook
4.2 Social Media Communication Strategies of Fast Food Outlets on Facebook
5 Conclusion
References
Factors Affecting Task Allocation and Coordination in Distributed Agile Software Development
1 Introduction
2 Distributed Agile Task Allocation and Coordination
3 Research Aims and Methodology
4 Survey Results and Discussion
4.1 Ranking of Factors
4.2 Existing Dependencies
4.3 Limitations of the Survey
4.4 Recommendations and Future Works
5 Conclusion
6 Ethics Compliance
References
Optimizing Recruitment Process Within Businesses: Predicting Interview Attendance Using C4.5 Algorithm
1 Introduction
2 Theoretical Background
3 Methodology
4 Results and Discussions
5 Conclusion and Future Works
References
Training Engineers as Drivers of e-Learning in a University
1 Introduction
1.1 Literature Review
1.2 The Framework for Learner Support
1.3 Research Questions
1.4 Research Methodology
1.5 Research Findings
2 Conclusion
References
Using Scratch Software as a Teaching-Learning Tool in French Language Classes: A Case Study at Université Des Mascareignes (Mauritius)
1 Introduction
2 Brief Literature Review
2.1 Teaching-Learning with âDigital Nativesâ [6]
2.2 Developing Twenty-First Century Skills in French Language Classes
3 Research Methodology
4 Findings and Analysis
4.1 Student Motivation and Engagement
4.2 Teamwork and Cooperation
5 Conclusions and Recommendations
References
Improving Fraud Detection Mechanism in Financial Banking Sectors Using Data Mining Techniques
1 Introduction
2 Literature Review
2.1 Data Mining Methodology
2.2 CRISP-DM Methodology
2.3 Suitable Data Mining Methods of Financial Fraud Detection
3 Research Methodology
4 Results and Evaluation
5 Conclusion
References
Digital Learning for Millenials: IT in Eduation and/or IT for Education
1 Introduction
2 Theoretical or Conceptual Discussion
2.1 New Education Paradigm and Twenty First Century Skills
2.2 Evolution in Higher Education
2.3 IT for Education
3 Conclusion
References
Supply Chain ManagementâMarketing Integration a Key Element in the Digital Era
1 Introduction
2 Literature Review
2.1 Digital Era
2.2 Technology Derivatives and Tools
3 Clouds, Big Data and Internet of Things (IoT)
4 Applying the Concept
5 Conclusion
References
Bank Customerâs Credit Score Prediction Using Feature Selection and Data Mining Algorithm
1 Introduction
2 Related Work
3 Proposed Model
4 Data Description
4.1 Data Source
4.2 Data Description
5 Feature Selection
6 Model Used
6.1 Random Forest Algorithm
6.2 Logistic Regression Algorithm
7 Discussion of Result
8 Conclusion
References
The Use of the WhatsApp Platform as an Educational Tool During the Confinement Period of the Outbreak of Covid-19
1 Introduction
2 Background
3 Rationale of Choosing the Right Instrument
3.1 The Smart Phone
3.2 WhatsApp Platform
3.3 Modus Operandi Interpersonal Communication in an Online Classroom Context
4 Research Methodology
4.1 Analysis Techniques
4.2 Participants
5 Findings and Discussions
5.1 Types of Communication
5.2 Usefulness of the WhatsApp Platform
5.3 Future Use of WhatsApp as an Educational Platform Post-Covid-19
6 Conclusion and Future Works
References
Author Index
đ SIMILAR VOLUMES
<span>The book presents high-quality research papers presented at 4th International Conference on Intelligent Computing and Advances in Communication (ICAC 2021) organized by Siksha âOâ Anusandhan, Deemed to be University, Bhubaneswar, Odisha, India, in November 2021. This book brings out the new ad
<p><p>The book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. This two volume book contains the Proceedings of International Conference on Advanced Computing and Intelligent Engineering. These volumes bring together
<p><p>The book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. This two volume book contains the Proceedings of International Conference on Advanced Computing and Intelligent Engineering. These volumes bring together
<p><p>The book gathers high-quality research papers presented at the International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2017). It includes technical sections describing progress in the fields of advanced computing and intelligent engineering, and is primarily intended
<p><p>This book features high-quality research papers presented at the 4th International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2019), Department of Computer Science, Rama Devi Womenâs University, Bhubaneswar, Odisha, India. It includes sections describing technical adv