𝔖 Scriptorium
✦   LIBER   ✦

📁

Sentiment Analysis and Deep Learning: Proceedings of ICSADL 2022

✍ Scribed by Subarna Shakya, Ke-Lin Du, Klimis Ntalianis


Publisher
Springer
Year
2023
Tongue
English
Leaves
987
Series
Advances in Intelligent Systems and Computing, 1432
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book gathers selected papers presented at International Conference on Sentimental Analysis and Deep Learning (ICSADL 2022), jointly organized by Tribhuvan University, Nepal and Prince of Songkla University, Thailand during 16 – 17 June, 2022. The volume discusses state-of-the-art research works on incorporating artificial intelligence models like deep learning techniques for intelligent sentiment analysis applications. Emotions and sentiments are emerging as the most important human factors to understand the prominent user-generated semantics and perceptions from the humongous volume of user-generated data. In this scenario, sentiment analysis emerges as a significant breakthrough technology, which can automatically analyze the human emotions in the data-driven applications. Sentiment analysis gains the ability to sense the existing voluminous unstructured data and delivers a real-time analysis to efficiently automate the business processes. 

✦ Table of Contents


Preface
Contents
About the Editors
Ranking Roughly Tourist Destinations Using BERT-Based Semantic Search
1 Introduction
2 Semantic Search with SBERT
2.1 Semantic Search with SBERT
2.2 Extracting a Boundary by Applying Different Thresholds
3 System Architecture
3.1 Data
3.2 Text Cleaning and Pre-processing
3.3 Embeddings
3.4 Similarity Measure
3.5 Ranking Algorithm
4 Result of Ranking System
4.1 Result of Ranking System
4.2 Evaluation of Result
5 Discussion and Conclusion
References
A New Image Encryption Technique Built on a TPM-Based Secret Key Generation
1 Introduction
1.1 Neural Network and Tree Parity Machine (TPM)
2 Methodology
2.1 Traditional Method of Generating Secret Key Using Tree Parity Machine
2.2 Proposed Rule with Algorithm
3 Results and Discussion
3.1 Performance Parameters
3.2 Security Parameters
4 Conclusion
References
Application Prototypes for Human to Computer Interactions
1 Introduction
2 Related Work
2.1 Methodology
2.2 Literature Review
3 Conclusion
References
Feature Selection-Based Spam Detection System in SMS and Email Domain
1 Introduction
2 Literature Review
2.1 Phase 1
2.2 Phase 2
2.3 Phase 3
3 Classification Methods Used for Spam Detection in SMS and Email Domains
3.1 Phase 1
3.2 Phase 2
3.3 Phase 3
4 Experiment and Result
4.1 Data-sets Used
5 Conclusions and Future Work
References
Discerning the Application of Virtual Laboratory in Curriculum Transaction of Software Engineering Lab Course from the Lens of Critical Pedagogy
1 Introduction
2 Motivation for This Work
3 Objectives and Scope of This Research
3.1 Specific Objectives of the Research
3.2 Scope of the Research
4 Organization of This Research Paper
5 Virtual or Online Learning
6 Traditional Versus Virtual Laboratory
7 Critical Pedagogy Theory
8 Instructional Design Delivery (IDD)
9 Students’ Learning Outcomes (LO)
10 Assessments (ASS)
11 Students’ Empowerment (EM)
12 Critical Thinking (CT)
13 Social Presence (SP)
14 Alignment (AL)
15 Approaches to Virtual Laboratories and Software Engineering Virtual Laboratory
16 Synthesis of Related Work and Concluding Remarks
17 Educational Implications
18 Limitations
19 Conclusion and Way Forward
19.1 Design Software Engineering Virtual Lab
19.2 CP-VLLM: Development of a Virtual Learning Measurement Tool
19.3 Evaluation of Students’ Learning Performance in a Virtual Laboratory Learning Environment
19.4 Directions for Future Research
References
Chrome Extension for Text Sentiment Analysis
1 Introduction
2 Related Works
3 Proposed Model
3.1 Sentiment Analysis
3.2 Chrome Extension
4 Experimental Analysis and Results
4.1 Dataset Description
4.2 Performance Evaluation
5 Conclusion
References
Performance of RSA Algorithm Using Game Theory for Aadhaar Card
1 Introduction
2 Related Work
3 RSA Algorithm
4 Proposed GT-RSA Algorithm and Analysis
4.1 Game Theory
4.2 Games Are Classified in Several Ways
4.3 Pure Strategy Characteristics of a Two-Person, Zero-Sum Game
4.4 Pure Strategy Problems
4.5 GT-RSA
5 Experimental Results
5.1 Encryption Time
5.2 Decryption Time
5.3 Execution Time
5.4 Encryption Throughput
5.5 Decryption Throughput
5.6 Execution Throughput
5.7 Power Consumption
5.8 Avalanche Effect
6 Conclusion
References
Drought Prediction Using Recurrent Neural Networks and Long Short-Term Memory Model
1 Introduction
1.1 Literature Review
2 Methodology
2.1 Read the Data
2.2 Data Cleaning
2.3 Data Preparation and Visualization
2.4 Applying RNN and LSTM
3 Results
3.1 Experimental Methodology
3.2 Results
4 Conclusion
References
Recogn-Eye: A Smart Medical Assistant for Elderly
1 Introduction
2 Literature Survey
3 Problem Statement
4 Proposed Method
5 Project Demonstration
6 Results and Discussions
7 Conclusion
References
Lossless Image Compression Using Machine Learning
1 Introduction
2 Related Work
3 Image Representation
4 Problem Statement
5 Clustering Techniques
6 Image Compression Techniques
6.1 Generative Adversarial Networks
6.2 Gaussian Mixture Models
7 Methodology
8 Lossless and Lossy
9 Implementation
10 Experimental Results
11 Conclusion
References
An Energy-Efficient Approach to Transfer Data from WSN to Mobile Devices
1 Introduction
2 Related Work
3 Proposed Architecture
4 Wireless XML Stream
4.1 G-Node (G-N)
4.2 Lineage Code
5 Query Processing
5.1 Simple Query Processing
5.2 Twig Pattern Query Processing
6 Simulation Result
6.1 Query Processing Time with Lineage Encoding
6.2 Maximum Residual Energy
6.3 Maximum Number of Sensor Nodes with Optimum Energy
7 Conclusion and Future Work
References
Worker Safety Helmet
1 Introduction
2 Literature Review
3 Methodologies
4 Architecture Diagram
5 Prototype Implementation
6 Testing and Evaluation
7 Conclusion
References
Using IT in Descriptive Statistics and Way ANOVA Analysis to Assessment Development in Some Anthropometric Indicators of Thai Ethnic Students Born Between 2003 and 2006 in Thuan Chau District, Son La Province, Vietnam
1 Introduction
2 Methodology
3 Results and Discussion
3.1 Standing Height of Thai Ethnic Students
3.2 The Weight of Thai Students by Age and Sex
3.3 BMI of Thai Students by Age and Sex
4 Conclusion
References
LSTM-Based Deep Learning Architecture for Recognition of Human Activities
1 Introduction
2 Literature Review
3 Proposed System
4 LSTM Architecture
5 Methodology
6 Results
7 Conclusion and Future Work
References
A Deep Learning Framework for Classification of Hyperspectral Images
1 Introduction
2 Related Work
3 Proposed Methodology
4 Experimental Results
5 Conclusion
References
Improved Security on Mobile Payments Using IMEI Verification
1 Introduction
2 Literature Survey
3 Methodologies
4 Implementation and Result Analysis
5 Conclusions
References
Evaluating the Effectiveness of Classification Algorithms for EEG Sentiment Analysis
1 Introduction
1.1 Background
1.2 Motivation
1.3 Objective
2 Methods
2.1 Dataset
2.2 Preprocessing
2.3 Feature Extraction
2.4 Machine Learning Algorithms
2.5 Deep Learning Algorithms
2.6 Data Preparation
2.7 Evaluation Metrics
3 Results and Discussions
4 Conclusion and Future Research Direction
5 Data and Code Availability
References
Analytics and Data Computing for the Development of the Concept Digitalization in Business and Economic Structures
1 Introduction, Background, Motivation and Objective
2 Methods the Implementing Digital HR Capabilities
2.1 Implementation of Statistical Assessment of Functional Interactions of Users of Social and Economic Phenomena and Processes
2.2 Influence of Enterprise Corporate Culture Components on Individual Components of Enterprise Personnel Motivation
3 The Results of the Analysis the Components of Corporate Culture Motivation for Personnel
4 Discussions
5 Conclusions
References
The Social Hashtag Recommendation for Image and Video Using Deep Learning Approach
1 Introduction
2 Literature Survey
2.1 Tag Recommendation for Micro-video
2.2 Social Tag Recommendation for Images
2.3 Social Tag Recommendation for Micro-video
2.4 Social Tag Recommendation for Image
3 Filtering Methods for Hashtag Recommendation
3.1 Collaborative Filtering
3.2 Content-Based Filtering
3.3 Filtering Based on Hybrids Approach
3.4 Social Popularity Prediction
3.5 Technique for Tag Recommendation for Images/Videos
4 Evaluation Parameter
5 Conclusion and Future Scope
References
Smart Door Locking System Using IoT—A Security for Railway Engine Pilots
1 Introduction
2 Literature Review
3 Methodology
4 Results and Implementation
5 Conclusion
References
AdaSmooth: An Adaptive Learning Rate Method Based on Effective Ratio
1 Introduction
1.1 Gradient Descent
2 Related Work
2.1 Momentum
2.2 AdaGrad
2.3 AdaDelta
3 AdaSmooth Method
3.1 Effective Ratio (ER)
3.2 AdaSmooth
3.3 AdaSmoothDelta
4 Experiments
4.1 Experiment: Multi-layer Perceptron
4.2 Experiment: Convolutional Neural Networks
4.3 Experiment: Logistic Regression
5 Conclusion
References
Designing and Implementing a Distributed Database for Microservices Cloud-Based Online Travel Portal
1 Introduction
2 Literature Review
3 Problem Definition
3.1 Why Distributed Database?
3.2 DDB Systems Types
3.3 Advantages of Distributed Database System
3.4 Limitations of Relational Database
3.5 Major Characteristics of RDBMS
3.6 Why Microservice Architecture?
4 Methodology
4.1 System Design
4.2 Data Collection Methods
4.3 Database Design
4.4 Data Analysis Tools
5 Results and Discussions
6 Conclusion
References
A Comparative Study of a New Customized Bert for Sentiment Analysis
1 Introduction
2 Proposed Sentiment Analysis Framework
2.1 Proposed Model
2.2 Pre-processing and Tokenization Steps
3 Proposed Customized Bert with Lion Algorithm
4 Material and Methods
4.1 Analysis in TWCS Dataset: Performance and Errors
5 Conclusion
References
Crops Recommendation System Model Using Weather Attributes, Soil Properties, and Crops Prices
1 Introduction
2 Literature Survey
3 Methodology
3.1 Collection and Creation of Datasets
3.2 Data Cleaning and Preprocessing
3.3 Weather Attributes Generation Model Creation
3.4 Classification Model Creation
3.5 Rearranging Crops Based on Profits
3.6 Comments on User’s Preferences
4 Results and Discussion
5 Conclusion
6 Future Work
References
Development of Machine Learning Approaches for Autism Detection Using EEG Data: A Comparative Study
1 Introduction
2 Literature Survey
3 Experimental Data
4 Research Methodology
4.1 Preprocessing
4.2 Feature Extraction
4.3 SMOTE
4.4 Classifiers
5 Results and Analysis
6 Conclusion and Future Scope
References
Fully Automatic Wheat Disease Detection System by Using Different CNN Models
1 Introduction
1.1 Leaf Rust
1.2 Fusarium Head Blight
1.3 Tan Spot
2 Proposed Work
2.1 Dataset
2.2 Pre-processing of Images
2.3 Data Augmentation
2.4 Proposed Models
2.5 Experimental Setup
2.6 Results and Discussion
2.7 Prediction Results
3 Conclusion
References
Twitter Sentiment Analysis Using Naive Bayes-Based Machine Learning Technique
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Result Analysis
5 Conclusion
References
A Survey on Cognitive Internet of Things Based Prediction of Covid-19 Patient
1 Introduction
2 Literature Survey
3 Proposed Work
4 Conclusion
References
An Expert System for the Detection and Mitigation of Social Engineering Attacks (Sea) Using Machine Learning Algorithm
1 Introduction
1.1 Related Work
2 Types of Social Engineering Attacks
3 Methods for Social Engineering Attack Detection
4 Artificial Neural Network for Classification of Attacks
5 Experimental Evaluation
6 Conclusion
References
Combining the Knowledge Graph and T5 in Question Answering in NLP
1 Introduction
2 Drawbacks in Traditional Model
3 Methodology
4 Results
4.1 GPU Power Utilization
4.2 CPU Power Utilization
5 Conclusion
References
Classification of the Severity of Attacks on Internet of Things Networks
1 Introduction
1.1 How is Severity Different from Intrusion
2 Network Fault Severity Prediction Using Network Disruption
2.1 Overview
2.2 Block Schematic
2.3 Objective
2.4 Proposed Work Flow
2.5 Dataset Description:
2.6 Experimental Results
2.7 Visual Analysis
2.8 Features of Dataset Based on Their Importance
3 Discussion
4 Conclusion
References
Rainfall Forecasting System Using Machine Learning Technique and IoT Technology for a Localized Region
1 Introduction
2 System Study
3 Related Study
4 Methodology
5 Results and Discussion
6 Conclusion and Future Work
References
Infrastructure as Code (IaC): Insights on Various Platforms
1 Introduction
2 Literature Review
3 Available Methodologies
3.1 Using Terraform
3.2 Using Ansible
3.3 Chef
3.4 Puppet
3.5 CloudFormation
4 Analysis
5 Conclusion
References
K-Means Clustering Decision Approach in Data Hiding Sample Selection
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Carrier Selection
3.2 Extracting Carrier Samples
3.3 Secret Data Selection
3.4 K-means Clustering
3.5 Data Hiding
3.6 Data Extraction
4 Result Analysis and Discussion
5 Conclusion
6 Future Scope
References
Noisy QR Code Smart Identification System
1 Introduction
2 Proposed Methods
2.1 Data Analyzation
2.2 CNN Model Architecture
2.3 LG Model Architecture
2.4 SVM Model Architecture
3 Result and Discussion
4 Conclusion
References
Voice and Text-Based Virtual Assistant for Academic Advising Using Knowledge-Based Intelligent Decision Support Expert System
1 Introduction
2 Literature Review
2.1 Research Objectives
3 Research Methodology
3.1 System Design Process
3.2 Data Accumulation
4 Research Significance
5 Importance in Academics
6 Conclusion
References
Breast Cancer Prediction Using Different Machine Learning Algorithm
1 Introduction
2 Literature Review
3 Machine Learning Classifiers
4 Methodology
5 Dataset Description
5.1 Attribute Explanation
5.2 Experimental Environment
6 Results and Discussions
6.1 Implementation and Result Analysis
6.2 Accuracy Model
7 Conclusion
References
Design of a Real-Time Obstacle Avoiding and Trajectory Generation Algorithm for an Unmanned Aerial Vehicle
1 Introduction
2 UAV Hardware
2.1 Flight Control
2.2 Depth Sensor, Camera, and GPS
2.3 Communication System
3 Trajectory Planning
3.1 Nodes of Algorithms in ROS
4 Obstacle Evasion
4.1 Red Box Recognition
4.2 Robot Operating System (ROS)
5 Results
6 Conclusions
References
Taguchi Based Design of Sequential Convolution Neural Network for Classification of Defective Fasteners
1 Introduction
2 Related Work
3 Proposed Framework for Taguchi Based Design of Sequential Convolution Neural Network (CNN)
3.1 Dataset Preparation
3.2 Sequential CNN Design Parameters
3.3 Taguchi Based Grid Search for CNN Design Parameters
4 Analysis of Results
4.1 Optimized Sequential CNN Model
5 Conclusion
References
The Impact of Online Game Addiction on Students Taking Online Classes
1 Introduction
1.1 Health Issues
1.2 Inducing Laziness to Study
1.3 Lack of Concentration
1.4 Lack of Discipline
1.5 Difficult to Think Clearly
2 Research Technique
3 Research Method
4 Research Result
5 Discussion
6 Conclusion
References
Application’s Impact on the SepuisLife Company’s Insurance Sales Process During the Pandemic
1 Introduction
1.1 Insurance
1.2 Role of Application Inside the Company Sales Process
1.3 The New Insurance Marketing and Sales Process in this Pandemic Situation
2 Research Technique
2.1 Literature Review
3 Standard Work from a Lean Theory Perspective
4 Research Method
5 Research Result
6 Discussion
7 Conclusion
References
A Proposed System for Understanding the Consumer Opinion of a Product Using Sentiment Analysis
1 Introduction
2 Background, Motivation and Objective
3 Methods
3.1 Architecture
3.2 Algorithms
3.3 Implementation
4 Results and Discussions
4.1 Performance Comparison of Algorithms
4.2 UI
5 Conclusion and Future Research Direction
References
Security and Privacy in Social Network
1 Introduction
2 Social Network and Public Information
3 Previous Workings and Findings
4 Threats from Social Engineering in Social Networks
4.1 Identity Theft
4.2 Fake Accounts
4.3 Spear Phishing
5 General Security Measures
6 Security Practices for Social Media
7 Conclusion
References
Understanding Images of Tourist Destinations Based on the Extract of Central Sentences from Reviews Using BERT and LexRank
1 Introduction
2 Extract Central Sentences
2.1 System Architecture
2.2 Data Crawling
2.3 Data Preprocessing
2.4 Embedding Sentence Using Ko-Sentence-BERT-SKTBERT
2.5 Calculating the Centrality of Each Sentence
3 Results
3.1 Extracting Representative Sentences by Tourist Destination
3.2 Extracting Representative Sentences from Tourist Destinations by year
3.3 Extracting Representative Sentences from Tourist Destinations by Seasons
4 Conclusion and Discussion
References
Comparative Study of Machine Learning and Deep Learning for Fungi Classification
1 Introduction
1.1 Background, Motivation and Objective
2 Related Works
2.1 Limitation of Related Works
3 Materials and Methods
3.1 Data Set
3.2 Proposed Work
3.3 Quantitative Metrics
4 Results and Discussion
5 Conclusion and Future Work
References
Improved Tweet Sentiment Analysis by Features Weight Optimize by GWO and Classify by XG-Boost
1 Introduction
2 Related Work
3 Proposed Work
3.1 Dataset
3.2 Proposed Methodology Flowchart
3.3 Proposed Methodology
3.4 Proposed Methodology Algorithm
4 Results
5 Conclusion
References
Toward Smartphone Energy Optimization Through Users Operating Pattern Discovery
1 Introduction
2 Literature Study
3 Experimental Setup
4 Performance Evaluation
5 Conclusion
References
Efficient Novel Approach Prediction of Survival Time on Pancreatic Cancer Using Machine Learning Paradigms Toward Big Data Analytics
1 Introduction
2 Literature Survey
3 Background
3.1 Machine Learning
3.2 Meta-Learning Approach
4 Proposed Methodology
4.1 Clinical Dataset Modeling
4.2 Studying to Forecast the Perfect Model
5 Evaluation
5.1 Preprocessing and Predictive Methods
6 Outcome
6.1 Parameter Selection
7 Conclusion
References
An Artificial Intelligence-Based Approach to Recognize Faces: A Perspective from Pandemic
1 Introduction
2 Related Study
3 Proposed Architecture
3.1 Stepwise Methodology for Local System
3.2 Algorithm Steps
3.3 Proposed Dataset
4 Results Analysis and Discussion
5 Conclusion and Future Scope
References
Personality as a Predictor of Computer Science Students’ Learning Motivation
1 Introduction
2 Literature Review
3 Methodology
3.1 Research Model and Hypothesis
3.2 Study Group and Its Characteristics
3.3 Data Collection Instruments
3.4 Data Collection
3.5 Data Analysis
4 Results
5 Discussion and Future Work
References
Hybrid Sign Language Learning Approach Using Multi-scale Hierarchical Deep Convolutional Neural Network (MDCnn)
1 Introduction
1.1 Sign Language
1.2 Convolutional Neural Network (CNN)
1.3 Transfer Learning Models
2 Literature Survey
3 Methodology
4 Result and Conclusion
References
Prediction and Analysis of Liver Disease Using Extreme Learning Machine
1 Introduction
2 Extreme Learning Machine (ELM)
3 ILPD Dataset
4 Proposed Methodology
5 Result and Discussion
5.1 ELM Performance Analysis with a Training-to-Testing Ratio of 80:20
5.2 Evaluation of Other Published Works in the Same Field
6 Conclusion
References
Identifying the Predictors from Lung Cancer Data Using Machine Learning
1 Introduction
2 Materials and Methods
2.1 Data Description
2.2 Data Cleaning and Feature Engineering
2.3 Machine Learning Models
2.4 Model Evaluation
3 Results
4 Conclusion
References
Dim Recognition in Images, Videos and Real-Time Video Streams
1 Introduction
2 Literature Survey
3 Methodologies
4 Implementation and Result Analysis
5 Conclusions
References
The Voice and Gesture to Speech Conversion in Indian Regional Sign Language
1 Introduction
2 Literature Survey
3 Methodology
3.1 Image Acquisition
3.2 Image Preprocessing
3.3 Feature Extraction
3.4 Building the Training Model
3.5 Gesture to Speech Conversion
4 Result and Discussion
4.1 Comparison Among Different Algorithms
4.2 Hindi Language
4.3 Tamil Language
5 Conclusion
References
Deep Learning-Based Quality Assurance of Silicon Detectors in Compact Muon Solenoid Experiment
1 Introduction
2 Literature Review
3 Object Detection
3.1 Yolo
3.2 YOLOv4
3.3 Scaled Yolov4
3.4 Yolov4-Tiny
4 Methodology
4.1 Data Collection
4.2 Data Generation
4.3 Data Modeling
5 Results
6 Conclusion
References
IoT-Enabled RFID-Based Library Management and Automatic Book Recommendation System Using Collaborative Learning
1 Introduction
2 Proposed Methodology
2.1 User Authentication Process
2.2 Book Issue Process
2.3 Book Return Process
2.4 Book Recommendation System
3 Experimental Results and Discussion
3.1 Hardware Setup
3.2 Software Setup
3.3 RFID Card Detection by RFID Reader
3.4 Database Generation
4 Conclusion
References
An Effectual Analytics and Approach for Avoidance of Malware in Android Using Deep Neural Networks
1 Introduction
2 Malware Patterns and Machine Learning
3 Research Statement and Goal
4 Experimental Results and Outcome
5 Conclusion
References
Comparative Analysis of RNN Variants Performance in Stock Price Prediction
1 Introduction
2 Related Work
3 Variants of RNN
3.1 Simple RNN
3.2 Long Short-Term Memory (LSTM)
3.3 Peephole LSTM
3.4 Gated Recurrent Unit (GRU)
3.5 Bidirectional LSTM and Bidirectional GRU
4 Approach
5 Results
6 Conclusions
References
Deep Learning-Based Haze Removal System
1 Introduction
2 Proposed Method
2.1 Working
2.2 Generator Architecture
2.3 Training the Generator
2.4 Discriminator Architecture
2.5 Training the Discriminator
2.6 The Overall Training Overview
3 Results
4 Future Scope
5 Conclusion
References
A One-Stop Service Provider for Farmers Using Machine Learning
1 Introduction
2 Related Work
3 Proposed Method
3.1 Crop Recommendation
3.2 Fertilizer Recommendation
3.3 Disease Prediction
3.4 Chatbot
4 Experimental Analysis and Results
4.1 Dataset Collection
4.2 Performance Analysis
4.3 Results
5 Conclusion
References
Developing a Mood Meter to Predict Well-Being Through Machine Learning
1 Introduction
2 Related Work
2.1 Prediction of Mood
2.2 Limitations
2.3 Related Apps
2.4 Limitations
3 Data Sources
4 Data Exploration and Processing
4.1 Pre-processing
4.2 Data Exploration
4.3 Proposed App
4.4 Train-Test-Split
4.5 Experiments
5 Results
5.1 Multiple Linear Regression
5.2 Neural Network
5.3 Explainability, Visualization, and A/B Test
6 Discussion
6.1 Limitations
6.2 Future Work
6.3 Conclusion
References
3D Realistic Animation of Greek Sign Language’s Fingerspelled Signs
1 Introduction
2 Greek Sign Language—Linguistic Research Background
3 Related Work
4 System Description
5 Modeling the 3D Human—A Realistic Hand for Natural Animation
6 Animation (Blender)
7 Unity WebGL2
8 Implementation
9 Conclusions and Future Work
References
Architecture, Applications and Data Analytics Tools for Smart Cities: A Technical Perspective
1 Introduction
2 Information System Architecture for Smart City
3 IoT Communication Stack in Smart City
4 IoT Data Analytics Tools/Frameworks for Smart City
4.1 Streaming Frameworks for IoT-Stream Data Analysis
5 Smart City Applications for Sustainable Development
5.1 Auto Rotating Solar Panel [28]
5.2 Smart Street Lights [1]
5.3 RFID-Based Toll Booth Manager [29]
5.4 Smart Parking System [30]
5.5 Smart Garbage Monitoring System [31]
5.6 Real-Time Traffic Monitoring [32]
6 All Applications Under Single Umbrella
7 Conclusion and Future Work
References
Evaluation of Software Engineering Virtual Laboratory in Determining Undergraduate Students’ Conceptual Understanding: A Blended Learning Model Using Collaborative-Creative Virtual Learning Environment Employing Critical Pedagogy
1 Introduction
2 Motivation Toward Evaluation of Students’ Performance Using VLab
3 Evaluation Process in TLab
4 Development of CP-VLLM Tool
4.1 Reliability and Validity
5 Research Hypotheses and Questions
5.1 Research Design
6 Method
6.1 Setting and Participants
6.2 Data Collection Tools
6.3 Procedure
7 Evaluation of Students’ Performance Using SE VLab
7.1 Comparison Between Each Group on Prior SE Knowledge Test Scores
7.2 Comparison Between Each Group on Post SE Knowledge Test Scores
7.3 Comparison of Learning Gains for Each Group
8 Students’ Perceptions from CP-VLLM Tool
9 Concluding Remarks
9.1 Discussion
9.2 Major Findings
9.3 Students’ Responses Through Open-Ended Questions
9.4 Educational Implications
9.5 Limitations
9.6 Conclusion and Directions for Future Work
Appendix
References
A Customer-Focused System Structure for Cyber Security Operations Center
1 Introduction
2 Data in Raw Format and Error Checking
3 Label Generation and User Feature Engineering
3.1 Page Numbering and Running Heads
3.2 Page Numbering and Running Heads
4 Algorithms and Implementations in ML
4.1 Algorithms for ML
4.2 Contact Author Information
4.3 Model Evaluation Techniques
4.4 What Will Be Done with Your Paper
5 Conclusion
References
Credit Card Defaulters Prediction Using Unsupervised Features
1 Introduction
1.1 Contribution
1.2 Organization
2 Literature Review
3 Proposed Methodology
3.1 Dataset
3.2 Data Analysis
3.3 Model Training
3.4 Algorithms
4 Experimental Results and Analysis
5 Conclusion
References
Social Media Mining to Detect Mental Health Disorders Using Machine Learning
1 Introduction
2 Ethical and Social Issues
3 Impact of the Solution
4 Related Work
5 System Architecture
6 Results and Future Enhancements
7 Conclusion
References
Using Deep Learning Models for Crop and Weed Classification at Early Stage
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 Data Acquisition
3.2 Data Augmentation
3.3 CNN-based Deep Learning Model
4 Results and Discussions
5 Conclusions
References
A Novel Recommendation System Using the Musical Traits of a User
1 Introduction
2 Background and Related Work
2.1 Agglomerative Clustering [10]
2.2 K-Means Clustering [11]
2.3 BIRCH Clustering [12, 13]
3 Proposed Model
3.1 Data
3.2 Data Visualization and Pre-processing
3.3 Proposed Algorithm
4 Results
5 Conclusion and Future Works
References
Diabetes Retinopathy Prediction Using Multi-model Hyper Tuned Machine Learning
1 Introduction
2 Related Works
3 Existing System
4 Proposed System
5 Implementation
5.1 Dataset
5.2 Exploratory Data Analysis (EDA)
6 Methodology
6.1 Hyperparameter Tuning
6.2 GridSearchCV
7 Algorithms
7.1 Logistic Regression Algorithm
7.2 KNN Algorithm
7.3 Decision Tree
7.4 Random Forest
7.5 SVM
8 Algorithm with Hyperparameter Tuning
8.1 Logistic Regression
8.2 KNN Algorithm
8.3 Decision Tree
8.4 Random Forest
8.5 SVM
8.6 Pseudocode
9 Simulation and Analysis
10 Evaluation Parameters
10.1 Precision
10.2 Confusion Matrix
10.3 Recall
10.4 F1-Score
11 Results
12 Conclusion
References
Face Mask Detection and Social Distancing Using Machine Learning with Haar Cascade Algorithm
1 Introduction
2 Literature Review
3 Existing Method
4 Proposed Model
4.1 Face Mask Detector
4.2 Face Recognition
5 Social Distancing
6 Results
7 Conclusion
References
Efficacy of Autoencoders on Image Dataset
1 Introduction
2 Key Components
3 Variations of Autoencoders
4 Experimental Setup and Results
5 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Sentiment Analysis and Deep Learning: Pr
✍ Subarna Shakya; Ke-Lin Du; Klimis Ntalianis 📂 Library 📅 2023 🏛 Springer Nature 🌐 English

This book gathers selected papers presented at International Conference on Sentimental Analysis and Deep Learning (ICSADL 2022), jointly organized by Tribhuvan University, Nepal and Prince of Songkla University, Thailand during 16 – 17 June, 2022. The volume discusses state-of-the-art research works

Sentimental Analysis and Deep Learning:
✍ Subarna Shakya (editor), Valentina Emilia Balas (editor), Sinchai Kamolphiwong ( 📂 Library 📅 2021 🏛 Springer 🌐 English

This book gathers selected papers presented at the International Conference on Sentimental Analysis and Deep Learning (ICSADL 2021), jointly organized by Tribhuvan University, Nepal; Prince of Songkla University, Thailand; and Ejesra during June, 18–19, 2021. The volume discusses state-of-the-art re

Visual and Text Sentiment Analysis throu
✍ Arindam Chaudhuri 📂 Library 📅 2019 🏛 Springer Singapore 🌐 English

<p><p>This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Further, it analyses sentiments in Twitter blogs from both textual and visual content using hierarchical deep learning networks: hierarchical gated feedback recurrent neural networks (HGFRN

Deep Learning-Based Approaches for Senti
✍ Agarwal 📂 Library 📅 2020 🏛 Springer 🌐 English

<p></p><p><span>This book covers deep-learning-based approaches for sentiment analysis, a relatively new, but fast-growing research area, which has significantly changed in the past few years. The book presents a collection of state-of-the-art approaches, focusing on the best-performing, cutting-edg

Deep Learning in Medical Image Processin
✍ Khaled Rabie, Chandran Karthik, Subrata Chowdhury and Pushan Kumar Dutta 📂 Library 📅 2023 🏛 The Institution of Engineering and Technology 🌐 English

This book introduces the fundamentals of deep learning for biomedical image analysis for applications including ophthalmology, cancer detection and heart disease. The book discusses multimedia data analysis algorithms and the principles of feature selection, optimisation and analysis.

Development and Analysis of Deep Learnin
✍ Witold Pedrycz, Shyi-Ming Chen 📂 Library 📅 2020 🏛 Springer International Publishing 🌐 English

<p>This book offers a timely reflection on the remarkable range of algorithms and applications that have made the area of deep learning so attractive and heavily researched today. Introducing the diversity of learning mechanisms in the environment of big data, and presenting authoritative studies in