<span>The proceeding presents best selected papers presented at 5th International Conference on Smart Computing and Informatics (SCI 2021), held at Department of Computer Science and Engineering, Vasvi College of Engineering, Hyderabad, Telangana, India, during 17 â 18 September 2021. It presents ad
Smart Intelligent Computing and Applications, Volume 2: Proceedings of Fifth International Conference on Smart Computing and Informatics (SCI 2021) (Smart Innovation, Systems and Technologies, 283)
â Scribed by Suresh Chandra Satapathy (editor), Vikrant Bhateja (editor), Margarita N. Favorskaya (editor), T. Adilakshmi (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 607
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
The proceeding presents best selected papers presented at 5th International Conference on Smart Computing and Informatics (SCI 2020), held at Department of Computer Science and Engineering, Vasavi College of Engineering, Hyderabad, Telangana, India, during 17 â 18 September 2021. It presents advanced and multi-disciplinary research towards the design of smart computing and informatics. The theme is on a broader front focuses on various innovation paradigms in system knowledge, intelligence and sustainability that may be applied to provide realistic solutions to varied problems in society, environment and industries. The scope is also extended towards the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in various disciplines of science, technology and healthcare. The work is published in two volumes.
⌠Table of Contents
Organizing Team: SCI-2021
Preface
Contents
About the Editors
1 Music Recommendation Engine Using Emotion Synthesis Through Facial Recognition
1.1 Introduction
1.1.1 Literature Survey
1.2 Methodology
1.2.1 Overview of the Proposed System
1.3 Result and Analysis
1.4 Conclusion
References
2 Indian Alphabets and Digits Sign Recognition Using Pretrained Model
2.1 Introduction
2.2 Literature Survey
2.3 Dataset
2.3.1 Image Characteristics
2.4 Method
2.5 Implementation and Results
2.6 Conclusion
References
3 HarSaRK_multi_rs: A Hard Real-time Kernel for Multi-core Microcontrollers in Rust Language
3.1 Introduction
3.2 Real-Time Kernels and Multi-core Microcontrollers
3.3 Kernel Architecture
3.4 Implementation
3.5 Experimentation
3.5.1 Illustration of Task Migration Between Cores
3.6 Conclusion
References
4 Melody-Based Hindi Song Retrieval Using SVM
4.1 Introduction
4.2 Design and Methodology
4.3 Implementation
4.3.1 Data Preparation
4.3.2 Split the Songs
4.3.3 Extract the Features
4.4 Results
4.5 Conclusion and Future Work
References
5 Analysis of Eye Gaze Response to Predict Cognitive and Behaviour Abilities of an Individual to Determine Developmental Disorders
5.1 Introduction
5.2 Literature Survey
5.3 Methodology
5.4 Results
5.5 Conclusion and Scope for Future Enhancements
References
6 An Efficient Information Retrieval Technique for Document Classification
6.1 Introduction
6.1.1 Document Clustering and Classification
6.1.2 Motivation and Contribution
6.2 Related Work
6.3 Proposed Method
6.3.1 Proposed System Architecture
6.3.2 Document Reference Class Discovery
6.4 Experiment Results
6.5 Conclusion
References
7 A Featurized Learning Approach for Health Monitoring in Hydraulic Systems Using Multivariate Time Series Data
7.1 Introduction
7.2 Related Work
7.3 Featurized Learning Approach for Health Monitoring in Hydraulic Systems
7.4 Experimental Results
7.5 Conclusion
References
8 Lockdown Phases and Changing Clusters of Indian States with Respect to Number of Cases of COVID-19
8.1 Introduction
8.2 Methodology
8.2.1 Clustering
8.2.2 Compound Growth Rate
8.2.3 Doubling Time
8.3 Result and Discussion
8.3.1 Scenario Before Lockdown
8.3.2 Scenario in Lockdown Phase-I
8.3.3 Scenario in Lockdown Phase-II
8.3.4 Scenario in Lockdown Phase-III
8.3.5 Scenario in Lockdown Phase-IV
8.3.6 Scenario in Lockdown Phase-V
8.3.7 Scenario in Lockdown Phase-VI
8.3.8 Scenario in Lockdown Phase-VII
8.3.9 Scenario During Lockdown Phase-VIII to Phase-X
8.4 Conclusion
References
9 Non-invasive Measurement of Blood Sugar Using Near-Infrared Spectroscopy
9.1 Introduction
9.2 Working Principle
9.3 System Design and Calibration
9.3.1 Overview
9.3.2 Embedded System Design
9.3.3 Calibration
9.4 Results and Discussion
9.5 Conclusion and Future Scope
References
10 Design and Development of Silicon Nanowire-Based Pressure Sensor for Medical Applications
10.1 Introduction
10.2 Design of Nanowire Piezoresistive Pressure Sensor
10.3 Simulation of the Model
10.4 Results and Discussions
10.5 Conclusion
References
11 Identifying Stars/Galaxies: A Hybrid Classification for Celestial Sources
11.1 Introduction
11.2 Data Set
11.3 Classification Methods
11.3.1 Algorithms for Classification
11.4 Discussion and Results
11.4.1 Comparison of Performance
11.4.2 Future Work
References
12 Contemporary Technique for Detection of Brain Tumor in Fluid-Attenuated Inversion Recovery Magnetic Resonance Imaging (MRI) Images
12.1 Introduction
12.2 Related Work
12.3 Framework for an Automatic Probabilistic EMGMM
12.4 Results and Discussion
12.5 Conclusion
References
13 Word Sense Disambiguation for Indian Regional Language Using BERT Model
13.1 Introduction
13.2 Related Works
13.3 Method
13.3.1 Dataset Collection
13.3.2 Dataset Preprocessing
13.3.3 Training
13.3.4 Testing
13.4 Results
13.5 Conclusion and Future Works
References
14 Automating the Body Temperature Scanning System and Predictive Analysis Using Machine Learning Models
14.1 Introduction
14.2 Literature Survey
14.3 Methodology
14.3.1 Hardware Requirements
14.3.2 Data Acquisition
14.3.3 AWS Services
14.3.4 Graphical User Interface
14.4 Results
14.4.1 Temperature Prediction
14.4.2 Forecast Evaluation
14.5 Conclusion
References
15 Detection of Face Mask in Thermal Images Using Deep CNN
15.1 Introduction
15.2 Literature Survey
15.3 Proposed Methodology
15.3.1 Image Acquisition and Dataset Preparation
15.3.2 CNN Model Building
15.4 Results
15.5 Conclusion
References
16 Deep Learning Network for Face Identification Across Illumination and Blur
16.1 Introduction
16.2 Literature Survey
16.3 Methodology
16.3.1 Image Restoration with ConvLSTM
16.3.2 Face Recognition Using CNN
16.4 Experiment and Results
16.4.1 Training Database
16.4.2 Blur Removal
16.4.3 Face Recognition with Restored Images
16.5 Conclusion and Future Scope
References
17 An Enhanced Book Recommendation System Using Hybrid Machine Learning Techniques
17.1 Introduction
17.2 Literature Survey
17.3 Proposed Approach
17.3.1 Dataset
17.3.2 Pre-processing
17.3.3 Algorithms
17.4 Design Methodology
17.5 Results
17.6 Conclusion
References
18 Cardiovascular Disease Prediction using Machine Learning with Flask API
18.1 Introduction
18.2 Literature Survey
18.3 Proposed System
18.4 Algorithms and Techniques
18.5 Data Acquisition
18.5.1 Data Exploration
18.5.2 Pre-process Data
18.5.3 Data Analysis Module
18.5.4 Data Visualization
18.6 Experiment Results and Discussion
18.7 Conclusion
References
19 An Ensemble CNN Model for Identification of Diabetic Retinopathy Eye Disease
19.1 Introduction
19.2 CNN Model
19.3 Ensemble CNN Model
19.3.1 Architecture of the Proposed Model
19.4 Results and Discussions
19.5 Conclusions
References
20 She-Safe: An IoT Prototype for Providing Security Using Arduino Uno, Node-RED and MQTT
20.1 Introduction
20.2 Literature Survey
20.3 Design
20.4 Implementation
20.4.1 Software Requirements
20.4.2 Hardware Requirements
20.5 Results
20.6 Result Analysis
20.7 Conclusions and Future Work
References
21 Performance Optimization of LANMAR Routing Protocol in Mobile Ad Hoc Network Using DoE
21.1 Introduction
21.2 Literature Review
21.3 Research Methodology
21.4 Taguchi Design of Experiments Technique
21.5 Data Analysis and Result Discussion
21.5.1 ANOVA
21.6 Conclusion
References
22 Efficient Email Classification Algorithm for Better Customer Support
22.1 Introduction
22.2 Background Work
22.3 Proposed Model
22.4 Hardware and Software Requirements
22.5 Conclusion
References
23 Smart Water Management System in Agriculture using Internet of Things
23.1 Introduction
23.2 Proposed System
23.3 Experimental Work
23.4 Conclusion
References
24 Machine Learning for Detection of Obstructive Sleep Apnoea
24.1 Introduction
24.2 Related Work
24.3 Material and Methods
24.3.1 Pre-processing
24.4 The Predictive Models
24.5 Metrics of Classification
24.5.1 Classification Report
24.6 Cross-Validation
24.6.1 Configuration of k
24.7 Results
24.7.1 Feature Importance
24.7.2 Classification Results
24.8 Discussion
24.9 Conclusion
References
25 Automatic Text Summarization Using Intelligent Systems
25.1 Introduction
25.2 Literature Survey
25.3 Proposed System
25.3.1 Abstractive Technique of Summarization
25.3.2 Extractive Summarization
25.3.3 Steps Involved in Text Summarization
25.4 Design Methodology
25.5 Results and Discussion
25.6 Conclusion
References
26 Suicide and Depression Detection in Social Media Forums
26.1 Introduction
26.2 Literature Review
26.3 Dataset
26.3.1 Data Preprocessing
26.3.2 Proposed Method
26.3.3 Baseline
26.4 Results
26.5 Conclusion and Future Scope
References
27 A Reliable Patient Indoor Monitoring System Based on IoT in Ambient-Assisted Living
27.1 Introduction
27.2 Related Work
27.2.1 Sensor-Based Health Monitoring System
27.2.2 Smartphone-Based Health Monitoring Systems
27.2.3 Microcontroller-Based Health Monitoring Systems
27.3 Motivation
27.4 Methods
27.5 Experimental Setup and Result
27.6 Discussion
27.7 Conclusion
References
28 A Hybrid Model for DDoS Attack Detection Using LSTM-RNN
28.1 Introduction
28.2 Related Work
28.3 Proposed System
28.3.1 Grey Wolf Optimization
28.3.2 LSTM-RNN
28.4 Experiments and Results
28.5 Conclusion
References
29 Intelligent Industrial Monitoring Environment for IoT Application Using LoRa-Based Wireless Sensors
29.1 Introduction
29.2 Literature Survey
29.3 Proposed Method
29.3.1 LoRa
29.4 Implementation
29.5 Results and Discussion
29.6 Conclusion
29.7 Future Scope
References
30 Morphological Operation-Based Unsharp Masking Filter
30.1 Introduction
30.2 Proposed Enhancement Methodology
30.2.1 Overview of Unsharp Masking
30.2.2 Morphological Filter
30.2.3 Improved UM Filter
30.3 Results and Discussion
30.3.1 Image Quality Assessment
30.3.2 Experimental Results
30.3.3 Discussion
30.4 Conclusion
References
31 Multi-scale Retinex with Chromacity Preservation (MSRCP)-Based Contrast Enhancement of Microscopy Images
31.1 Introduction
31.2 Proposed MSRCP-based Contrast Enhancement of Microcopy Images
31.2.1 Multi-scale Retinex (MSR)
31.2.2 Multi-scale Retinex with Chromacity Preservation (MSRCP)
31.3 Results and Discussions
31.3.1 Image Quality Assessment
31.3.2 Experimental Results
31.3.3 Discussions
31.4 Conclusion
References
32 Mammogram Image Fusion using Sigmoidal Function and Max. Fusion Rule
32.1 Introduction
32.2 Proposed Enhancement and Fusion Methodology
32.2.1 Overview of Sigmoid Function
32.2.2 Mammographic Image Fusion
32.2.3 Proposed Fusion Algorithm
32.3 Results and Discussion
32.3.1 Image Quality Assessment
32.3.2 Experimental Results
32.4 Conclusion
References
33 Impact of Climate Change and Land Cover on the Runoff Estimation Using SWAT Modeling
33.1 Introduction
33.2 Methodology
33.3 Results
33.4 Conclusion
References
34 Deep Neural Network for Generation and Detection of an Image
34.1 Introduction
34.2 Literature Survey
34.3 Proposed Approach
34.4 Dataset Description
34.5 Experiments and Results
34.6 Conclusion
References
35 1-Factor Forcing in Certain Nanotori
35.1 Introduction
35.2 Preliminaries
35.2.1 C4C6C8[p,q] Nanotori
35.2.2 H-Naphtalenic [p, q] Nanotori
35.3 Conclusion
References
36 Breast Cancer Prediction Using Machine Learning Techniques
36.1 Introduction
36.2 Machine Learning Techniques
36.3 Literature Survey
36.4 Proposed Work
36.4.1 Import Libraries and Dataset
36.4.2 Data Preprocessing
36.4.3 Train-Test Split for Evaluation
36.4.4 Machine Learning Techniques Used for Breast Cancer Prediction
36.4.5 Performance Analysis
36.5 Results
36.5.1 Confusion Matrix
36.5.2 Performance Analysis Results
36.6 Conclusion
References
37 Hindi Speech-Based Healthcare Chatbot
37.1 Introduction
37.1.1 Speech Recognition and Speech to Text
37.1.2 NLTK
37.1.3 Lemmatization
37.1.4 AIML
37.1.5 Classification Algorithms
37.1.6 Naive Bayes Classifier Algorithm
37.2 Literature Review
37.3 Research Methodology
37.3.1 Keyword Matching
37.3.2 String Similarity
37.3.3 Combination of Algorithms
37.4 Results
37.5 Conclusion
References
38 FFV: Facial Feature Vector Image Dataset with Facial Feature Analysis and Feature Ranking
38.1 Introduction
38.2 Methodology
38.3 Analysis
38.4 Conclusion
References
39 Smart Healthcare with Fitness Application
39.1 Introduction
39.2 Related Works
39.3 Proposed Methodology
39.4 Results and Discussion
39.5 Conclusions and Future Scope
References
40 Smart Irrigation System for Agriculture 4.0
40.1 Introduction
40.2 Related Works
40.3 Proposed Methodology
40.4 Results and Discussions
40.5 Conclusions
References
41 Crime Rate Analysis and Prediction in Delhi Using Facebook Prophet
41.1 Introduction
41.2 Related Works
41.3 Methodology
41.3.1 Time Series Forecasting
41.3.2 Inflection Point Algorithm
41.3.3 Data Flow Diagram
41.3.4 Data Collection and Creation of Database
41.3.5 Analysis of Data
41.3.6 Error Measurement
41.4 Discussion
41.5 Conclusion
41.6 Future Scope
References
42 A Generic Blockchain-Based Remote Clinical Monitoring Framework Through Wearable Devices to Mitigate the COVID-19 Pandemic
42.1 Introduction
42.2 Background
42.2.1 Wearable Devices
42.2.2 Blockchain
42.2.3 Integration of Blockchain and Edge Computing
42.3 Literature Survey
42.4 Blockchain and IoT in Health Care
42.5 Proposed Blockchain-Based IoT Framework for COVID-19
42.6 Benefits of Blockchain in Health Care
42.7 Challenges and Future Work
42.8 Conclusion
References
43 A Novel Hybrid JFA-SVM Algorithm for Feature Selection
43.1 Introduction
43.2 Background Details
43.2.1 Importance of Multi-filter Approach
43.2.2 Basic Firefly Algorithm
43.2.3 Jumper Firefly Algorithm and SVM
43.3 Dataset Description with Experimental Study
43.4 Conclusion
References
44 Analysis of Sentiments of Twitter Data on Remote Working
44.1 Introduction
44.2 Literature Review
44.3 Research and Methodology
44.3.1 Data Acquisition
44.3.2 Text Preprocessing
44.3.3 Text Analytics
44.3.4 Sentimental Analysis
44.4 Discussions and Conclusions
References
45 Detecting Face Mask for Prevent COVID-19 Using Deep Learning: A Novel Approach
45.1 Introduction
45.1.1 Data Accumulation and Annotation
45.2 Proposed Method
45.2.1 Methodology
45.3 Results and Analysis
45.3.1 YOLOv4 Results
45.3.2 YOLOv4 Tiny Results
45.3.3 Analysis
45.4 Conclusion
References
46 Heart Disease Detection Through Deep Learning Model RNN
46.1 Introduction
46.2 Literature Survey
46.3 Proposed Methodology
46.4 Results and Discussions
46.4.1 Performance Evaluation Based on Precision and Recall
46.5 Conclusion and Future Scope
References
47 Vehicular Cloud Computing: Architecture and Its Challenges
47.1 Introduction
47.2 Vehicular Networks
47.3 Vehicular Clouds
47.3.1 Vehicular Cloud Computing Architecture
47.3.2 Vehicular Cloud Computation
47.3.3 Vehicular Cloud Communication
47.3.4 Storage
47.3.5 Security of Vehicular Network
47.4 Conclusion
References
48 A Study on Sentiment Analysis on It Sector Employees Using K-means Clustering
48.1 Introduction
48.1.1 Importance of K-means Clustering in IT Sector
48.2 Analysis of IT Sector Employees Using K-Means Clustering
48.3 Evaluation of employeeâs Prediction
48.4 K-Means Clustering Techniques in IT Sector
48.5 Factors Affecting Efficiency of IT Sector Employees
48.5.1 Initial Centroids Are Chosen in Clustering
48.5.2 Distance Calculation in K-Means Clustering Algorithm
48.6 Conclusions
References
49 An Escrow-Free and Authenticated Group Key Management in Internet of Things
49.1 Introduction
49.2 Literature Review
49.3 Hybrid Escrow-Free Scheme for IoT
49.4 Results and Discussion
49.5 Conclusion
References
50 Framework for Statistical Machine Recognition and Translation of Ancient Tamil Script
50.1 Introduction
50.2 Preprocessing
50.2.1 RGB-to-Gray Conversion
50.2.2 Binarization
50.2.3 Noise Reduction
50.2.4 Skew Detection and Correction
50.2.5 Thinning
50.2.6 Slant Normalization
50.2.7 Size Normalization
50.2.8 The Process of Gaining
50.3 Line Segmentation
50.4 Feature Extraction
50.5 Classification
50.5.1 Feed-Forward Backpropagation Neural Network
50.5.2 Genetic Algorithm
50.5.3 Support Vector Machine
50.6 Purpose
50.7 Dataset
50.8 Results and Discussions
50.9 Conclusion
References
51 Different Feature Selection Methods Performance Analysis for Intrusion Detection
51.1 Introduction
51.2 Related Work
51.3 Proposed Selection of Features
51.3.1 Study of Features Selection Methods
51.3.2 Datasets
51.4 Experimental Results
51.5 Conclusion
References
52 Opportunistic MAC Strategies for Dynamic Cognitive Radio Spectrum
52.1 Introduction
52.2 Functions of CR
52.3 Basic Mechanisms of CR
52.4 Dynamic Spectrum Access (DSA)
52.5 Methods for Opportunistic Dynamic Spectrum Access (ODSA)
52.6 Applications of Cognitive Radio Mesh Network
52.7 Conclusion
References
53 Weighted Averaging PSO-Based SWT Method of Image Fusion for X-Ray Mammograms
53.1 Introduction
53.2 Image Fusion Using SWT
53.3 Implementation
53.4 Assessment of Quality Parameters
53.5 Results
53.6 Conclusion
References
54 A Proactive Threat Hunting Model to Detect Concealed Anomaly in the Network
54.1 Introduction
54.1.1 Investigation Based on Hypothesis
54.1.2 Examination Using Known IoC or IoA
54.1.3 Examination Using Known IoC or IoA
54.1.4 Examination Using Known IoC or IoA
54.2 Literature Survey
54.2.1 Research Gap
54.2.2 Graph-Based Forensic Analysis
54.2.3 Types of Detection
54.2.4 Behavior Detection
54.3 Analysis: Marriott/Starwood Data Breach
54.4 Analysis: Marriott/Starwood Data Breach
54.5 Result and Discussion
54.6 Conclusion
References
55 Botnet Attack Classification with Deep Learning Models
55.1 Introduction
55.2 Literature Survey
55.3 Methodology
55.3.1 Deep Learning Algorithms
55.4 Results and Discussion
55.5 Conclusion and Future Work
References
56 Phishing URL Identification Using Machine Learning, Ensemble Learning and Deep Learning Techniques
56.1 Introduction
56.2 Related Works
56.3 Proposed Methodology
56.4 Experiments and Results
56.5 Conclusion and Future Work
References
57 Fault Analysis Against Final Round of L-Block
57.1 Introduction
57.2 Previous Work
57.3 L-Block Detailed Specification
57.3.1 Notations
57.3.2 Encryption
57.4 Fault Attack
57.4.1 Ineffective Stuck-at-Fault Model
57.4.2 Differential Fault Attack Model
57.5 Experimental Evaluation and Obtained Results
57.6 Conclusion
References
58 Framework for Diabetic Retinopathy Classification
58.1 Introduction
58.2 Literature Survey
58.3 Methodology
58.3.1 Pre-processing
58.3.2 Microaneurysms Identification
58.3.3 Optic Disc Identification
58.3.4 Exudates Identification
58.3.5 Framework
58.4 Results
58.5 Conclusion
References
59 Support Vector Machine Classification of Remote Sensing Images with the Wavelet-based Statistical Features
59.1 Introduction
59.2 Methodology
59.3 Results and Discussion
59.4 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<p><span>This book presents best selected papers presented at the 4th International Conference on Smart Computing and Informatics (SCI 2020), held at the Department of Computer Science and Engineering, Vasavi College of Engineering (Autonomous), Hyderabad, Telangana, India. It presents advanced and
<span>This book presents best selected papers presented at the 4th International Conference on Smart Computing and Informatics (SCI 2020), held at the Department of Computer Science and Engineering, Vasavi College of Engineering (Autonomous), Hyderabad, Telangana, India. It presents advanced and mul
<p><p></p><p>This book presents high-quality papers from the Third International Conference on Smart Computing and Informatics (SCI 2018â19), organized by the School of Computer Engineering and School of Computer Application, Kalinga Institute of Industrial Technology Deemed to be University, Bhuban
This book presents best selected papers presented at the 4th International Conference on Smart Computing and Informatics (SCI 2020), held at the Department of Computer Science and Engineering, Vasavi College of Engineering (Autonomous), Hyderabad, Telangana, India. It presents advanced and multi-dis
<p><p></p><p>This book gathers high-quality papers presented at the Third International Conference on Smart Computing and Informatics (SCI 2018â19), which was organized by the School of Computer Engineering and School of Computer Application, Kalinga Institute of Industrial Technology, Bhubaneswar,