𝔖 Scriptorium
✩   LIBER   ✩

📁

Progress in Computing, Analytics and Networking: Proceedings of ICCAN 2019 (Advances in Intelligent Systems and Computing, 1119)

✍ Scribed by Himansu Das (editor), Prasant Kumar Pattnaik (editor), Siddharth Swarup Rautaray (editor), Kuan-Ching Li (editor)


Publisher
Springer
Year
2020
Tongue
English
Leaves
665
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book focuses on new and original research ideas and findings in three broad areas: computing, analytics, and networking and their potential applications in the various domains of engineering – an emerging, interdisciplinary area in which a wide range of theories and methodologies are being investigated and developed to tackle complex and challenging real-world problems. The book also features keynote presentations and papers from the International Conference on Computing Analytics and Networking (ICCAN 2019), which offers an open forum for scientists, researchers and technocrats in academia and industry from around the globe to present and share state-of-the-art concepts, prototypes, and innovative research ideas in diverse fields. Providing inspiration for postgraduate students and young researchers working in the field of computer science & engineering, the book also discusses hardware technologies and future communication technologies, making it useful for those in the field of electronics.



✩ Table of Contents


Committees
Advisory Committee
Program Committee
Chief Patron
Patron
Honorary General Chairs
General Chairs
Program Chairs
Organizing Chair
Session Management Chair
Publication Chairs
Publicity Chairs
Registration Chairs
Preface
Acknowledgements
About Conference
Contents
About the Editors
Implementation of Session-to-Mobility Ratio Based Mobility Management Scheme for Wireless Mesh Network to Handle Internet and Intranet Packets
1 Introduction
2 Related Work
3 Session-to-Mobility Ratio Based Mobility Management Scheme
3.1 Mobility Management
3.2 Route Setup
3.3 Routing of Data Packets
4 Simulation Result and Comparison
5 Conclusion and Future Work
References
An Ensemble Approach for Classification of Thyroid Using Machine Learning
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Algorithm for Classification of Thyroid Disease
3.2 Flowchart for Detection and Classification of Thyroid
4 Experimental Results
4.1 Performance Determining Parameters for Classification
4.2 Experimentation and Result Analysis
5 Conclusion
References
Text Classification with K-Nearest Neighbors Algorithm Using Gain Ratio
1 Introduction
2 Related Work
3 Proposed Methodology
4 Result and Analysis
5 Conclusion
References
An Effective Framework for Skyline Queries Using Principal Component Analysis
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Principle Component Analysis
3.2 Skewness Algorithm for the Avoidance of Overload
3.3 EFSQ-PCA Algorithm
3.4 Flowchart
4 Experimental Setup and Result Analysis
4.1 Result Analysis
5 Conclusion
References
Disease Classification Using Linguistic Neuro-Fuzzy Model
1 Introduction
2 Linguistic Neuro-Fuzzy Classification Model
3 Result Analysis
4 Conclusion
References
Ant Colony Optimization (ACO-Min) Algorithm for Test Suite Minimization
1 Introduction
2 Review of Related Work
3 Proposed Test Suite Minimization Technique
4 Experimental Results
4.1 Experimental Subjects
4.2 Comparison Criteria
5 Conclusion
References
Peer Analysis of “Sanguj” with Other Sanskrit Morphological Analyzers
1 Introduction
2 Related Works
3 Study of Morphological Analyzers
4 Results
5 Conclusion
References
Color Image Encryption Technique Using 4D Logistic Map
1 Introduction
2 Related Work
3 Proposed Work
3.1 4D Logistic Map
4 Result Analysis
5 Conclusion
References
Deep Learning Models for Analysis of Traffic and Crowd Management from Surveillance Videos
1 Introduction
2 Literature Survey
3 System Architecture
4 Working
4.1 Dataset
4.2 Single Shot MultiBox Detector
4.3 Optical Character Recognition
5 Use Cases
5.1 Traffic Management
5.2 Traffic Violation Management
5.3 Crowd Management
6 Performance Evaluation
7 Conclusion and Future Work
References
An Innovative Image-Based Tabular Data Extraction Parallel Algorithm
1 Introduction
2 Goals
3 Methodology
3.1 Table Location Identification
3.2 Cell Analysis and Character Recognition
3.3 Table Generation
4 Results
5 Conclusion
References
Brain Tumor Segmentation from MRI Images Using Deep Learning Framework
1 Introduction
2 Related Works
3 Proposed Framework
4 Results
5 Conclusion
References
Satellite Image Enhancement Using Hybrid Denoising Method for Fusion Application
1 Introduction
2 Related Works
3 Proposed Method
3.1 Hybrid Filtering Based Denoising
3.2 DWT-Based Fusion
4 Results and Discussion
5 Conclusion
References
Classification of Amino Acid Using Micro-electrical Model
1 Introduction
2 Micro-electrical Modeling of Amino Acid
3 Results and Discussions
3.1 Magnitude Response
3.2 Phase Response
4 Conclusion
5 Future Work
References
Personality Prediction of Social Network Users Using Ensemble and XGBoost
1 Introduction
2 Literature Survey
3 System Architecture
4 Experimentation and Results
4.1 Dataset Collection
4.2 Preprocessing
4.3 Experimental Results
5 Conclusion and Future Scope
References
Optimizing Performance of Text Searching Using CPU and GPUs
1 Introduction
2 Literature Survey
2.1 Improvements to String Matching in GPU Using CUDA
2.2 Heterogeneous Architecture
2.3 Cuda Programming Structure
3 BMH and KMP Algorithms
4 Result and Discussion
5 Conclusion
References
Automatic Parking Service Through VANET: A Convenience Application
1 Introduction
2 Motivation
3 Literature Survey
4 Proposed Model
4.1 Determination of Available Parking Slot
4.2 Automatic Parking Fee Collection
5 Simulation Setup and Simulation Result
6 Conclusion and Future Scope
References
Fault Diagnosis in Wireless Sensor Network Using Self/Non-self Discrimination Principle
1 Introduction
2 Literature Survey
3 Self/Non-self discrimination Principle
4 Proposed Work
5 Results and Discussions
6 Conclusion
References
Efficient Data Structure for the Top-k Variation of Sports Auction
1 Introduction
2 Directed Acyclic Graph Mi (i in[1 
n])
3 Directed Acyclic Graph Mg
4 Solution Methodology
4.1 Implicit Generation of Portions of Mi (i in[1 
n]) and Mg
4.2 Proof of Correctness of Algortihm 1
4.3 Computational Complexity
5 Conclusions and Future Research
References
A Deep Convolutional Neural Network Approach to Rice Grain Purity Analysis
1 Introduction
2 Materials and Methods
2.1 Data Collection
2.2 Preprocessing
2.3 Morphological Feature Extraction
2.4 Convolutional Neural Network Architecture
3 Results and Discussion
4 Conclusion
References
Design a Microstrip Patch Antenna for Multi-Service Purposes
1 Introduction
2 Antenna Performance
2.1 E-Shaped Patch Antenna
3 Simulation Result
3.1 U-Shaped Patch Antenna
3.2 Simulation and Result of Return Loss of U-Shaped Patch Antenna
3.3 Octagonal and Rectangular Patch Antenna
3.4 Simulation and Results of Return Loss of U-Shaped Microstrip Patch Antenna
4 Analysis and Comparison
5 Conclusion
References
TwoFold Frisky Algorithm (TFFA): A Fast Frequent Itemset Algorithm
1 Introduction
2 Literature Review
3 Frequent Itemsets Mining Algorithm
3.1 Basic Concepts
3.2 Apriori's Weakness
3.3 Horizontal and Vertical Databases
4 TFF Algorithm Description
4.1 TFF Algorithm
4.2 TFF Example
4.3 Example Process
5 Experimental Results and Analysis
6 Conclusion
References
An Algorithm Based on Next Shortest Path in Large EON Under Dynamic Traffic Grooming
1 Introduction
2 Related Works
3 Problem Formulation
3.1 Next Elastic Lightpath (NEL)
3.2 Problem Definition
4 Algorithm MNSEL
5 Experimental Results
5.1 Environment and Assumptions for Simulation
5.2 Simulated Numerical Results Based Algorithmic Efficiency Analysis
6 Conclusion
References
A Distance-Based Adaptive Traffic Grooming Algorithm in Large EON Under Dynamic Traffic Model
1 Introduction
2 Related Works
3 Problem Formulation
3.1 Problem Definition
4 Threshold Path Length
5 Algorithm DASEL
6 Experimental Results
6.1 Environment and Assumptions for Simulation
6.2 Simulated Numerical Results Based Algorithmic Efficiency Analysis
7 Conclusion
References
Particle Swarm Optimization of Multi-responses in Hard Turning of D2 Steel
1 Introduction
2 Literature Review
3 Experimental Scheme and Parameters
4 Results and Discussion
4.1 Analysis of Surface Roughness
4.2 Analysis of MRR
5 Analysis Using Particle Swarm Optimization (PSO) Algorithm
6 Conclusion
References
Design and Performance Analysis of Wavelength Converter Using SOA for Optical WDM Network
1 Introduction
2 Wavelength Conversion Using Four-Wave Mixing
3 Result and Discussion
4 Conclusions
References
Comparative Study Between Star and Mesh Topology for the Application in All-Optical WDM Network
1 Introduction
2 Mathematical Analysis
2.1 Star Network
2.2 Mesh Network
3 Result and Discussions
4 Conclusion
References
Predicting Impact of Odia Newspaper Articles on Public Opinion
1 Introduction
2 Related Works
3 Methodology
3.1 Performance Evaluation Measure
4 Results Analysis
5 Conclusion
References
An Approach to Extract Low-Grade Tumor from Brain MRI Slice Using Soft-Computing Scheme
1 Introduction
2 Methodology
2.1 Otsu’s Function
2.2 Brain Storm Optimization Algorithm
2.3 Watershed Segmentation
2.4 Image Quality Parameters and Validation
3 Result and Discussion
4 Conclusion
References
Development of a Semiautomated Evaluation Procedure for Dermoscopy Pictures with Hair Segment
1 Introduction
2 Methodology
2.1 Skin Cancer Database
2.2 Multi-thresholding
2.3 Segmentation
2.4 Performance Evaluation and Validation
3 Results and Discussion
4 Conclusion
References
Partial Offloading for Fog Computing Using P2P Based File-Sharing Protocol
1 Introduction
2 Related Works
3 Proposed Works
3.1 System Architecture
3.2 Simple Offloading Model
3.3 Partial Offloading Model
4 Implementation and Results
5 Conclusions
References
Assessment of Fundus Images for Retinal Abnormality Screening—A Study
1 Introduction
2 Methodology
2.1 Rim-One Database
2.2 Multi-thresholding
2.3 DRLS Segmentation
2.4 Assessment
3 Results and Discussion
4 Conclusion
References
Generating Context-Free Group-Level Emotion Landscapes Using Image Processing and Shallow Convolutional Neural Networks
1 Introduction
2 Methodology Adopted
2.1 Problem Statements
2.2 Workflow
3 Implementation
3.1 Datasets
3.2 Workstation Configuration
3.3 Face Detection from Image
3.4 Targetted ROI for Feature Extraction
3.5 Shallow CNNs for Identifying Emotions Expressed by Detected Faces
4 Results
5 Emotional Landscape for Group-Level Emotion Evolution
6 Conclusions
References
A Deep Learning Approach to Image-Based Malware Analysis
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Machine Learning Library
3.2 The Dataset
3.3 Dataset Preprocessing
3.4 CNN Concepts
3.5 CNN Architecture
3.6 Support Vector Machine
3.7 Softmax
3.8 Multiclass SVMs
3.9 Proposed CNN Model
4 Results and Discussion
5 Conclusion and Future Work
References
Chlorophyll Prediction Using Ensemble Deep Learning Technique
1 Introduction
2 Related Work
3 Methodology
3.1 Design Consideration for Model
3.2 Long Short-Term Memory (LSTM)
3.3 Proposed Model (Moving Window LSTM)
3.4 Study Area and Experimental Dataset
3.5 Experiment Setup
4 Result and Discussion
5 Conclusion
References
Enabling Affordance-Guided Grasp Synthesis for Robotic Manipulation
1 Introduction
2 Affordance Detection
3 Grasp Detection
3.1 Affordance-Guided Grasping
3.2 Pose Estimation
4 Conclusion
References
Towards Natural Language Understanding of Procedural Text Using Recipes
1 Introduction
2 Text-Based Food Computing Tasks
2.1 Information Extraction
2.2 Representation
2.3 Recommendation and Retrieval
2.4 Primarily Image-Based Tasks: Recognition, Perception, Prediction, and Monitoring
3 Conclusion
References
Performance and Memory-Efficient Parallel Computing Framework for RSMT Construction
1 Introduction
2 Literature Survey
3 High-Performance Computing Environment for VLSI Routing
4 Experimental Result and Analysis
5 Conclusion
References
An Efficient Parallel Computing Framework for Over the Obstacle VLSI Routing
1 Introduction
2 Parallel Computing Environment Model for Establishing Delay Optimized Over the Obstacle Rectilinear Steiner Minimum Tree
3 Experimetal Result and Analysis
4 Conclusion
References
Classification of Internet Traffic Data Using Ensemble Method
1 Introduction
2 Proposed Methodology
2.1 Preprocessing
2.2 Feature Selection—Extra Trees (Extremely Randomized Trees) Algorithm
2.3 SVM Ensemble Method
3 Experimental Setup and Results
3.1 Dataset
3.2 Results and Discussion
4 Conclusion
References
Toward Ameliorating K-Means Clustering Algorithm
1 Introduction
2 The Clustering Problem
3 K-Means Clustering
3.1 Pseudocode of the K-Means Algorithm
3.2 K-Means Algorithm Without Realignment
3.3 K-Means Algorithm with Realignment
4 Results and Discussions
5 Conclusions
References
Virtual Reality-Based Driving Simulator for Testing Innovative Hybrid Automotive Powertrains
1 Introduction
2 Materials and Methods
2.1 Design of the Driving Simulator
2.2 Driving Scenarios
2.3 Powertrain Test bed
3 Control Methodology
3.1 Switching Mechanism
4 Results
4.1 Mileage
4.2 System Efficiency
4.3 Video
5 Conclusion
References
Distance-Based Clustering Protocol (DBCP) in Wireless Sensor Network
1 Introduction
2 Related Work
3 The SEP Protocol
4 The Proposed Methodology
4.1 Architecture of Proposed DBCP System
5 Implementation
6 Conclusion and Future Scope
References
Feeder Transit Service Efficiencies with Vehicle-to-Passenger (V2P) Communication
1 Introduction
2 Methodology
2.1 Lower Bound Solution
3 Simulation Experiments and Results
4 Results
5 Conclusions
References
An NLP-Based Cryptosystem to Control Spread of Fake News Through Social-Media
1 Introduction
2 Review of Existing Literature
3 Proposed Method
4 Results
5 Discussion
5.1 Implications
6 Conclusion and Future Directions
References
Analysis of Proactive Simulated Topology Reconfiguration for WDM Networks
1 Introduction
2 Literature Survey
3 Proposed Work
4 Experimental Analysis
5 Conclusion
References
Arabic Text Extraction by Convolutional Neural Network Through Robust Dataset Design
1 Introduction
1.1 Importance of Text Extraction
1.2 Characteristics of Arabic Language
2 Existing Research in English and Arabic Text Extraction
3 Proposed Methodology
3.1 Architecture of Proposed Model
3.2 Image Preprocessing
3.3 Dataset Preparation
4 Classification Through Convolutional Neural Networks
5 Conclusion
References
Cryptanalysis of A New Cryptosystem of Color Image Using a Dynamic-Chaos Hill Cipher Algorithm: A Chosen Ciphertext Attack
1 Introduction
2 The Target Algorithm
3 The Cryptanalytic Attack
4 Strengthening the Target Algorithm
5 Conclusion
References
Counterfeit Product Detection Analysis and Prevention as Well as Prepackage Coverage Assessment Using Machine Learning
1 Introduction
2 Literature Review
3 Methodology
3.1 The Proposed Algorithm Consists of Three Stages
3.2 Testing of Trained Model
3.3 Prevention of Counterfeit Product
4 Result and Discussion
5 Presentation Scrutiny
6 Conclusion
References
Recommender System Using K-Nearest Neighbors and Singular Value Decomposition Algorithms: A Hybrid Approach
1 Introduction
2 Related Works
3 Background
3.1 Machine Learning
3.2 Recommendation System
3.3 Content-Based Filtering
3.4 Collaborative-Based Filtering
4 Experimental Setup and Result Analysis
5 Conclusion
References
Dynamics in Fractional Calculus: A Computational Approach
1 Introduction
2 Definitions and Preliminaries
3 Main Results
References
Privacy Preserving in Collaborative Filtering Based Recommender System: A Systematic Literature Review
1 Introduction
2 Background
2.1 Different Phases of Recommender System
2.2 Recommendation Filtering Techniques
2.3 Evaluation Metrics for Recommendation Algorithms
2.4 Privacy for Recommender System
3 Different Privacy-Preserving Collaborative Filtering Methods
3.1 Nonnegative Matrix Factorization (NMF) Based Privacy-Preserving Recommendation Method
3.2 Naive Bayesian Classifier (NBC) Based Privacy-Preserving Recommendation Method
3.3 Distributed Anonymization Based Privacy-Preserving Recommendation Method
3.4 Random Perturbation Based Privacy-Preserving Recommendation Method
3.5 Fuzzy Based Random Perturbation Method for Privacy Preservation in Recommender System
4 Comparison Study Among Different Privacy-Preserving Collaborative Filtering Methods
5 Future Work and Conclusion
References
A Topology Based Address Selection Technique for Network Virtualization Environment
1 Introduction
2 Challenges in Address Selection
3 Proposed Algorithm
3.1 Iteration of Proposed Algorithm
4 Correctness of Proposed Algorithm
5 Conclusion
References
A Model for Prediction of Paddy Crop Disease Using CNN
1 Introduction
2 Related Works
3 Proposed Model
3.1 Paddy Crop Disease Modeling
3.2 Process Flow Model
4 Implementation
4.1 Image Generation and Augmentation
4.2 Convolution Step
4.3 Pooling Step
4.4 Fully Connected Layers
4.5 Disease Prediction
5 Algorithm of the Model
6 Result
7 Conclusion and Future Work
References
Testbeds, Attacks, and Dataset Generation for Big Data Cluster: A System Application for Big Data Platform Security Analysis
1 Introduction
2 Related Work
3 Big Data Architecture
4 Testbed Architecture: With Attack Generation and Dataset Creation
5 Experimental Setup
5.1 Hardware, System, and Cluster Software—Configuration
5.2 Software, Commands, Shell Scripts
6 Attack Generation and Data Capture
7 Results and Discussion
8 Conclusion
References
Energy-Efficient Optimization-Based Routing Technique for Wireless Sensor Network Using Machine Learning
1 Introduction
2 Literature Review
3 Donkey–Smuggler Algorithm
4 Proposed Work
4.1 Cluster Head Degree
4.2 An Optimized Hybrid DAS C-means Clustering Algorithm
4.3 Proposed Routing Algorithm
5 Results
6 Conclusion
References
Energy-Efficient Resource Scheduling in Fog Computing Using SDN Framework
1 Introduction
2 Related Work
3 Energy-Saving Fog Node Scheduling Algorithm
4 Experiment and Result Analysis
5 Conclusion
References
Industrial Automation: Case Study—Vision Based Live Object Monitoring System
1 Introduction
2 Related Work
3 Proposed Framework
3.1 Image Acquisition and Pre-processing
3.2 Segmentation
3.3 Feature Extraction and Analysis
4 Experiments and Results
4.1 Image Acquisition and Pre-processing
4.2 Segmentation
4.3 Feature Extraction and Analysis
5 Conclusion
References
Performance Enhancement of Distribution Network by Optimal Placement of Multiple Capacitors Using FKBC
1 Introduction
2 Methodology
3 Results and Discussions
4 Conclusion
References
Control of Home Appliances and Projector by Smart Application Using SEAP Protocol
1 Introduction
2 Related Work
3 System Design
3.1 Liquid Crystal Display
3.2 SEAP Protocol
3.3 MIT App Inventor2
4 Results and Discussion
5 Conclusion
References
A Study on Securing Non-financial Data Using Blockchain Mechanism
1 Introduction
2 Blockchain Technology
2.1 Evolution of Blockchain
2.2 Blockchain Consensus Mechanism
3 Work Objective
4 Tools and Technologies Used
4.1 Platforms
4.2 Software Components
5 Establishing of Connection
6 Securing of Nonfinancial Data
7 Conclusion
References
Appraisal of Breast Ultrasound Image Using Shannon’s Thresholding and Level-Set Segmentation
1 Introduction
2 Former Study
3 Methodology
3.1 Database
3.2 Thresholding
3.3 Segmentation
3.4 Computation of Performance Measures
4 Result and Discussion
5 Conclusion
References
Optimal Scheduling of Household Appliances Using GOA for Electricity Cost Saving with Solar PV
1 Introduction
2 System Model
2.1 Energy Consumption Modes of Home Appliances
2.2 Modeling of PV
3 Problem Formulation
3.1 Objective Function
3.2 System Operational Constraints
4 Grasshopper Optimization Algorithm (GOA)
5 Result and Analysis
6 Conclusion
References
A Systematic Approach to Enhance the Forecasting of Bankruptcy Data
1 Introduction
2 Proposed Model and Workflow
3 Dataset Selection
4 Simulation Result and Analysis
5 Conclusion and Future Directions
References
Leveraging Blockchain as a Solution for Security Issues and Challenges of Paperless E-Governance Application
1 Introduction
1.1 Problem with Traditional System
2 Review of Related Literature
3 Proposed Framework for Enhanced Blockchain-Based Security for DigiLocker App
4 Benefits of Proposed Architecture
5 Conclusion
References
Maize Leaf Disease Detection and Classification Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Machine Learning Algorithms for Classification
3.1 Naive Bayes (NB)
3.2 The K-Nearest Neighbors (KNN)
3.3 Decision Tree (DT)
3.4 Support Vector Machine (SVM)
3.5 Random Forest (RF)
4 Proposed Technique for Disease Classification
4.1 Image Acquisition
4.2 Image Preprocessing
4.3 Image Segmentation
4.4 Feature Extraction
5 Experimental Result Analysis
6 Conclusion
References


📜 SIMILAR VOLUMES


Soft Computing and Signal Processing: Pr
✍ V. Sivakumar Reddy (editor), V. Kamakshi Prasad (editor), Jiacun Wang (editor), 📂 Library 📅 2020 🏛 Springer 🌐 English

<p></p><p><span>This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Second International Conference on Soft Computing and Signal Processing (ICSCSP 2019). The respective contributions address topics such as soft sets, rou

Intelligent Computing and Communication:
✍ Vikrant Bhateja (editor), Suresh Chandra Satapathy (editor), Yu-Dong Zhang (edit 📂 Library 📅 2020 🏛 Springer 🌐 English

<span>This book features a collection of high-quality, peer-reviewed papers presented at the Third International Conference on Intelligent Computing and Communication (ICICC 2019) held at the School of Engineering, Dayananda Sagar University, Bengaluru, India, on 7 – 8 June 2019. Discussing advanced

Progress in Advanced Computing and Intel
✍ Chhabi Rani Panigrahi (editor), Bibudhendu Pati (editor), Binod Kumar Pattanayak 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book focuses on theory, practice and applications in the broad areas of advanced computing techniques and intelligent engineering. This book includes 74 scholarly articles which were accepted for presentation from 294 submissions in the 5th ICACIE during 25–27 June 2020 at UniversitĂ© des

Emerging Research in Data Engineering Sy
✍ P. Venkata Krishna (editor), Mohammad S. Obaidat (editor) 📂 Library 📅 2020 🏛 Springer 🌐 English

<p><span>This book gathers selected papers presented at the 2nd International Conference on Computing, Communications and Data Engineering, held at Sri Padmavati Mahila Visvavidyalayam, Tirupati, India from 1 to 2 Feb 2019. Chiefly discussing major issues and challenges in data engineering systems a

Proceedings of the Global AI Congress 20
✍ Jyotsna Kumar Mandal (editor), Somnath Mukhopadhyay (editor) 📂 Library 📅 2020 🏛 Springer 🌐 English

<p><span>This book gathers high-quality research papers presented at the Global AI Congress 2019, which was organized by the Institute of Engineering and Management, Kolkata, India, on 12–14 September 2019. Sharing contributions prepared by researchers, practitioners, developers and experts in the a

Advances in Computational Intelligence a
✍ Xiao-Zhi Gao, Shailesh Tiwari, Munesh C. Trivedi, Krishn K. Mishra 📂 Library 📅 2021 🏛 Springer Singapore;Springer 🌐 English

<p><p>This book features high-quality papers presented at the International Conference on Computational Intelligence and Communication Technology (CICT 2019) organized by ABES Engineering College, Ghaziabad, India, and held from February 22 to 23, 2019. It includes the latest advances and research f