<div>This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference o
Soft Computing: Theories and Applications: Proceedings of SoCTA 2021 (Lecture Notes in Networks and Systems, 425)
â Scribed by Rajesh Kumar (editor), Chang Wook Ahn (editor), Tarun K. Sharma (editor), Om Prakash Verma (editor), Anand Agarwal (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 976
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing, and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2021), organized online. The book offers valuable insights into soft computing for teachers and researchers alike; the book will inspire further research in this dynamic field.
⌠Table of Contents
Preface
Contents
Editors and Contributors
Comparison of Neural Network-Based Soft Computing Techniques for Electromagnetic Modeling of a Microstrip Patch Antenna
1 Introduction
2 Literature Review and Motivation
3 Network Model and Data Generation
4 Networks and Algorithms Selection
5 Simulation Results and Discussion
5.1 Discussion on Network Recommendations
5.2 Discussion on Algorithm Recommendations
6 Conclusion and Future Work
References
A Ranking Method for q-Rung Orthopair Fuzzy Set Based on Possibility Degree Measure
1 Introduction
2 Preliminaries
3 Possibility Degree Measure for q-Rung Orthopair Fuzzy Values
4 A Ranking Principle for n q-ROFVs Based on the Proposed PDM
5 Conclusion
References
Detection of Bitcoin Miners by Clustering Crypto Address with Google BigQuery Open Dataset
1 Introduction
2 Literature Review
3 Proposed Work
4 Results and Discussion
5 Conclusion and Future Work
References
Comparative Analysis: Sentiment Analysis for Legal Judgment Text in Indiaâs Supreme Court Based on GloVe Pretrained Word Embedding and Deep Learning Models
1 Introduction
2 Related Works
2.1 Sentiment Analysis Based on Deep Learning
3 Proposed Method
3.1 Dataset
3.2 Data Preprocessing
3.3 Construct Vocabulary List
3.4 Word Embedding
4 Experimental Process
4.1 Simple Deep Neural Network
4.2 Convolution Neural Network
4.3 Recurrent Neural Network
5 Experiment Results
5.1 Results
6 Conclusion
References
Measuring the Bytecode Quality of Object-Oriented Software
1 Introduction
2 Literature Review
3 Proposed Framework
3.1 Identified Quality Metrics
4 Experimentation
5 Benefits of OOMetrics Framework
6 Conclusion
References
Evaluating the Climate Change Model with a Mathematical Approach Involving the Cesaro Summation
1 Introduction
1.1 Climate
1.2 Cesaro Summation
2 Outcome of the Research
3 Conclusion
References
Hybrid Framework Combining Deep Learning and Grey Wolf Optimizer for Anomaly Detection in IoT-Enabled Systems
1 Introduction
2 Related Works
3 Materials and Methods
3.1 Dataset Description
3.2 Hybrid Framework for Anomaly Detection in IoT-Enabled Systems
4 Results and Discussions
5 Conclusion
References
Optimal Location of Pumping Station to Minimize the Maximum Cover Depth of Sewerage System
1 Introduction
2 Design of Sewerage System
2.1 Hydraulics for Pumped Flow
3 Objective Function
4 Objective Function with One Intermediate Pumping Station
5 Methodology
6 Particle Swarm Optimization (PSO)
7 Results and Discussion
8 Conclusions
References
TDS Level Control of Water Purifier Using Fuzzy-PID Controller
1 Introduction
2 RO Model
3 Controller Design
3.1 Fuzzy Methodology
3.2 Membership Function
3.3 Fuzzy-PID Logic Controller
4 Controller Parameter Approximation
5 Comparing Response of Fuzzy-PID Controller with Triangular and Gaussian Membership Function
6 Conclusion
References
Hybrid Crossover Operator in Genetic Algorithm for Solving N-Queens Problem
1 Introduction
2 Related Work
3 Genetic Algorithm
4 Hybrid Genetic Algorithm
4.1 Evaluation of Fitness Value
4.2 Selection Operator
4.3 Position-Based Crossover
4.4 Mutation Operator
5 Computational Steps of HGA
6 Results
7 Conclusion
References
A Study and Review of RoF Upconversion Techniques for Next Generation Communication Systems
1 Introduction
2 RoF System
3 RoF Upconversion
3.1 Upconversion Using External Modulation
3.2 Upconversion Using Wavelength Conversion
3.3 Upconversion Using Optical Heterodyne Scheme
4 Performance Comparison of Optical Devices
5 Design Issues and Research Trends in RoF Communication
6 Conclusion
References
Sentimental Analysis to Predict Women Violence in India Using Machine Learning
1 Introduction
2 Literature Review
3 Related Work
3.1 Algorithm
3.2 System Architecture
4 Results and Discussions
5 Conclusion
References
Very Short-Term Load Forecasting with Deep Learning Neural Network in Delhi, India
1 Introduction
2 Background Details
3 hLSTM: Deep Learning Neural Network
4 Experiments and Results
4.1 Data Set
4.2 Results
5 Discussions
6 Conclusions
References
Flood Inundation Mapping Using GIS and Hydraulic Model (HEC-RAS): A Case Study of the Burhi Gandak River, Bihar, India
1 Introduction
2 Study Area
3 Material and Methods
3.1 GIS Techniques
4 Results and Discussion
5 Conclusion and Recommendations
References
A Meta-heuristic Learning Approach for Short-term Price Forecasting
1 Introduction
2 Artificial Neural Network
3 Hybrid Model: ANN-FTL
4 Experiments and Results
4.1 Results
5 Conclusions
References
Comparative Analysis of Machine Learning Methods for Classification of IoT Malware Attacks
1 Introduction
2 Related Work
3 Methodology Used
3.1 Dataset Acquisition
3.2 Splitting
3.3 K-Fold Cross-Validation
3.4 Base Classifiers
4 Experimental Setup
4.1 Evaluation Parameters
4.2 Experimental Results
5 Conclusion
References
Approximation of Signals by the Triple Product Summability Means of the Fourier Series
1 Introduction
2 Known Result
2.1 Theorem
3 Useful Lemmas
3.1 Lemma
3.2 Lemma
4 Main Results
4.1 Theorem
5 Corollaries
5.1 Corollary
5.2 Corollary
6 Conclusion
References
Multi-feature-Based Type-2 Fuzzy Set Induced Parallel Rank-Level Fusion in Face Recognition
1 Introduction
2 Proposed Multi-feature-Based Type-2 Fuzzy Set Induced Parallel Rank-Level Fusion (MFT2FPRLF) in Face Recognition
3 Experimental Results
4 Conclusion
References
A Production Inventory System Under Impact of Carbon Emission and Reliability
1 Introduction
2 Assumptions and Notations
2.1 Assumptions
2.2 Notations
3 Mathematical Model and Formulation
4 Numerical Example
5 Conclusion
References
Crop Classification in the Cauvery Delta Zone Using Machine Learning on Multi-Sensor Data
1 Introduction
2 Materials and Methods
2.1 Study Area
2.2 Data Collection
2.3 Preprocessing
2.4 Classification
3 Results and Discussion
4 Conclusion
References
An Improved User Interface for Enabling Smart Access Using Low-Cost QR-Based Systems at Various Points
1 Introduction
1.1 What Is QR Code?
2 Related Literature
3 Methodology
4 Proposed Solution
4.1 User Stories and Pain Points
4.2 About SecQR
5 Discussion
5.1 Pros
5.2 Cons
6 Conclusion
References
Video Summarization Using Hybrid Statistical Approach
1 Introduction
1.1 Related Works
2 Methodology
3 Functional Description of the Modules
4 Experiment Results
4.1 Evaluation Metrics
4.2 Limitations
4.3 Conclusion and Future Enhancements
References
Development of a Robust Framework for Surveillance Vehicle
1 Introduction
2 Literature Survey
3 Proposed Solution
3.1 Detection of the ROI
3.2 Feature Extraction
3.3 3-Dimensional Reconstruction
4 Implementation
4.1 Dataset
4.2 Training and Observation
5 3-Dimensional Output
5.1 Result Analysis
6 Conclusion
References
Machine Learning for Health Care: Challenges, Controversies, and Its Applications
1 Introduction
2 Top Utilizations of AI in Medical Care
2.1 Drug Discovery/Manufacturing
2.2 Identifying Diseases and Diagnosis
2.3 Maintaining Healthcare Records
2.4 Radiology/Radiotherapy
2.5 Robotic Surgery
2.6 Diagnosis in Medical Imaging
2.7 Clinical Trial and Research
3 Emerging Start-ups of Machine Learning in Health Care
4 Challenges and Controversies
5 Future of Machine Learning in Health Care
5.1 Predictions for AI-Powered Digital Health Care in 2021
6 Conclusion
References
Firefly Optimization Technique for Software Quality Prediction
1 Introduction
2 ISO/IEC 9126
3 Related Work
4 Firefly Algorithms (FA)
5 Firefly Proposed Work and Example Validation
5.1 Firefly Algorithm Pseudo-Code
5.2 Example Validation
5.3 Project Description
5.4 Parameter Selection
6 Conclusion
References
IoT Driven Precision Cultivation for Diverse Indian Climate Conditions
1 Introduction
2 Methodology Descriptions
3 Experimental Results
4 Conclusion
References
Mental Stress Detection Using EEG Extracted Frequency Bands
1 Introduction
1.1 Stress and Its Concepts
1.2 Stress Detection
1.3 Article Organization
2 Literature Review
3 Dataset Description
3.1 Electroencephalography (EEG)
3.2 Mental Arithmetic EEG Dataset
4 Proposed Methodology
4.1 Data Extraction and Preprocessing
4.2 Classifier
5 Results and Experimentations
6 Conclusion and Future Work
References
Estimating and Predicting Models Using Stochastic Time Series ARIMA Modeling in Emergent Economy
1 Introduction
1.1 Augmented DickeyâFuller Unit Root Test
2 Objectives and Research Design
3 Data Analysis and Findings
4 Limitations and Study Forward
5 Conclusion
References
Swarm Intelligence Using Collision Avoidance System
1 Introduction
1.1 Literature Survey
2 System Model
2.1 Methodology
3 Results and Discussion
4 Conclusion
References
A Multi-objective Approach for Inter-cluster and Intra-cluster Distance Analysis for Numeric Data
1 Introduction
2 Contribution
3 Background Knowledge
3.1 Euclidean Distance
3.2 Clustering
4 Implementation
4.1 Formulation of Objective Functions for Intra-cluster and Inter-cluster Distance Analysis
4.2 Multi-objective Clustering (MOC) Algorithm
5 Implementational Results
5.1 Dataset Used
5.2 Performance Analysis of the Proposed Algorithm MOC
6 Conclusion and Future Scope
References
A Whale Optimization-Based Energy-Efficient Clustered Routing for Wireless Sensor Networks
1 Introduction
2 Related Works
3 Proposed Work
3.1 Whale Optimization-based Energy-Efficient Clustered Routing Protocol (WECR)
3.2 Proposed Energy Model for the Deployed Network
3.3 Proposed CH Selection Process
4 Simulations and Result
4.1 Performance Parameters
4.2 Results and Discussion
5 Conclusion
References
Impact of 5G on the Internet of Connected Vehicles and Challenges: A Survey
1 Introduction
2 Past Work and Existing Threats in IoV
2.1 Attack Types in IoV
3 Introduction to 5G and Its Future Potential
3.1 Characteristics of 5G
3.2 Future Potential of 5G in IoV
4 Risk and Vulnerabilities in 5G for IoV
5 Conclusion
6 Future Work
References
Random Forest and AdaBoost-DT: Ensemble Machine Learning Estimators to Model Malayalam Poem Syllable Duration
1 Introduction
2 Related Work
3 Vrutas and Their Lakshana
4 The Dataset and the Speech Corpus
5 Machine Learning Implementation
5.1 Random Forest
5.2 AdaBoost with DT as the Base Estimator
5.3 Model Training
6 Performance Evaluation
7 Conclusion
References
Analytical Modeling of Parabolic Trough Solar Collector
1 Introduction
2 Architectural Overview of Parabolic Trough Solar Collector
3 Analytical Modeling Approaches
3.1 Uniform Thermal Modeling
3.2 Non-uniform Thermal Modeling
3.3 1-D Thermal Modeling
3.4 2-D Thermal Modeling
3.5 3-D Thermal Modeling
3.6 Energy Modeling
3.7 Exergy Modeling
3.8 Statistical/Black Box Modeling
3.9 Dynamic Modeling
4 Conclusions
References
A Hybrid MCIWO-NN Forward Kinematics Estimator for the Stewart Platform
1 Introduction
2 Forward Kinematics of the Stewart Platform
2.1 Nature-Based MCIWO
2.2 MCIWO-NN Algorithm
3 Results and Discussion
4 Conclusions
References
Energy Efficiency and Fault Tolerance in Wireless Sensor Networks: Analysis and Review
1 Introduction
1.1 WSNs and Ad Hoc Networks: A Comparison
1.2 Classification of Protocol Design for WSNs
1.3 Organization of the Paper
2 Energy-Efficient Mechanisms in WSNs
2.1 Energy-Aware Mechanisms in WSNs
2.2 Battery Issues of Sensors and Energy Depletion Causes in WSNs
2.3 Design Factors and Energy-Efficient Performance Issues in WSNs
3 Fault Detection and Diagnostic in WSNs
3.1 Faults and Fault Detection Approaches in WSNs
3.2 Fault Diagnosis Approach
4 Conclusion and Future Remarks
4.1 Conclusion
4.2 Future Remarks
References
A Novel Heart Disease Prediction Approach Using the Hybrid Combination of GA, PSO, and CNN
1 Introduction
2 Background and Related Work
3 Proposed Work
4 Experimental Setup and Result Analysis
4.1 Experimental Setup
4.2 Results and Analysis
5 Conclusion and Future Works
References
Iris Biometric Presentation Attack: Types and Detection TechniquesâA Review
1 Introduction to Iris Presentation Attacks
1.1 Types of Iris Presentation Attacks
2 Presentation Attack Detection (PAD) Techniques
2.1 Contact Lens Attack Detection
2.2 Print Attack Detection
2.3 Photo/Video Attack Detection
2.4 Prosthetic Eye Attack Detection
2.5 Cadaver Eye Detection
3 Current Status of Iris PAD
3.1 Datasets
3.2 Performance Metrics of PAD Technologies and Solutions
4 Future Scope
5 Conclusion
References
Healthcare CHATBOT for Diabetic Patients Using Classification
1 Introduction
1.1 Motivation
2 Related Work
3 Methodology
3.1 Steps Before the Prediction of Disease
3.2 Dataset Used to Train the Prediction Model
3.3 Machine Learning Algorithm Used for Prediction
3.4 Steps After the Prediction of Disease
4 Experiments and Results
5 Conclusion
References
Effective Classification of Tweets Using Machine Learning
1 Introduction
2 Related Work
3 Architecture for Effective Classification of Tweets
4 Results and Discussion
5 Conclusions
References
Wyverns Scuffle: An MMO Game Using Unreal Engine 4 and Blender 3-D
1 Introduction
2 Literature Survey
2.1 Comparison with Existing Literature
3 Proposed System
4 Implementation Details
5 Experimental Results
6 Conclusion
References
Implementation of ROS-Based Mobile Robots with Few Shot Object Detection Using TensorFlow API
1 Introduction
2 Previous Works
2.1 Mobile Robots in ROS Framework
2.2 Object Detection
2.3 Few Shot Learning
2.4 Problem Statement
3 System Description
3.1 Overall Architecture
3.2 Component Selection
3.3 ROSâHardware Interface
4 Custom Object Detector by Fine-Tuning Approach
4.1 TensorFlow Object Detection API
4.2 Fine-Tuning of Pre-trained SSD-MobileNet Architecture
4.3 Object Detector in ROS Using OpenCV DNN Module
5 Mobile Robot Simulation
6 Hardware Implementation
7 Results
7.1 Detecting Objects in Simulated Environments
7.2 Detecting Objects in Real Environments
8 Conclusion
References
Rule-Based Credit Card Fraud Detection Using User's Keystroke Behavior
1 Introduction
2 Related Work
3 Background Work
3.1 Keystroke Dynamics
3.2 Categorization of Customer Behavior
3.3 Rule-Based Expert System
4 Proposed Work
5 Result and Discussion
6 Conclusion
References
Multimodal Disease Detection Using Chest X-Ray Images and Electrocardiogram Signals
1 Introduction
2 Related Works
3 The Proposed Methodology
3.1 Preprocessing
3.2 Automatic Feature Extraction
3.3 LSTM Classification
4 Simulation Results
5 Conclusions
References
A Study on Wire Electric Discharge Machining Process Parameters Prediction Model Using Deep Learning Neural Network
1 Introduction
2 Artificial Neural Network Overview
3 Experimental Data
4 Results and Discussion
4.1 Prediction of Machining Parameters by FFBP ANN Model
4.2 Comparison of FFBP Neural Network Results with Experimental and Regression Prediction Model Results
4.3 FFBP Modelâs Statistical Validation
4.4 Conclusion
References
WEDM Process Parameters Optimization Using MOPSO
1 Introduction
2 Multiple Objective Particle Swarm Optimization (MOPSO)
3 Experimental Data
4 Results and Discussion
4.1 MOPSO Results
5 Conclusion
References
Study of ET0 by Using Soft Computing Techniques in the Eastern Gandak Project in Bihar, IndiaâA Case Study
1 Introduction
2 The Study Area
3 Methodology
3.1 Estimation of ET0 Using Conventional Methods
3.2 Estimation of ET0 Using Soft Computing Techniques
4 Result and Discussion
5 Conclusions
References
Soft Optimal Computing Methods to Identify Surface Roughness in Manufacturing Using a Monotonic Regressor
1 Introduction and Motivation
2 Particle Swarm Optimization Algorithm Background
3 Some PSO Algorithm Analysis
3.1 Combination of PSO and Linear Regression
3.2 Intertwining Two Swarms
4 Results and Discussion
5 Conclusions
References
A BERT Model-Based Sentiment Analysis on COVID-19 Tweets
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Description
3.2 Techniques for Sentiment Analysis
3.3 BERT Model
4 Experimental Setup
5 Results and Discussion
6 Conclusion
References
COVID-19 Cases in India: Prediction and Analysis using Machine Learning
1 Introduction
2 Literature Review
3 Dataset
3.1 Methodology
4 Analysis and Forecasting
5 Conclusion and Future Scope
References
Study of Load Balancing and Security in Cloud Computing
1 Introduction
1.1 Cloud Computing
1.2 Literature Review
2 Challenges of Cloud Computing
2.1 Load Balancing
2.2 Load Balancing Algorithm
3 Load Security
3.1 Load Security Algorithm
4 Quality of Service
5 Conclusion
References
Deep Learning Models for Identification of COVID-19 Using CT Images
1 Introduction
2 Related Work
3 COVID-19 CT Image Dataset
4 Methodology
4.1 Preprocessing
4.2 Experimental Setup
4.3 Performance Measures
5 Result Analysis
6 Conclusion
References
Non Orthogonal Multiple Access with Interference Cancellation Scheme
1 Introduction
2 NOMA Basics
3 NOMA-MIMO with SIC
4 Results and Discussion
5 Conclusion
References
Performance Analysis of MIMO-OFDM-IM System Using Rayleigh Fading Channel
1 Introduction
1.1 Problem Statement
2 Related Work
3 System Model
4 Simulation Results and Discussion
5 Conclusion and Future Work
References
The Enhanced Robotic Trajectory Tracking by Optimized Fractional-Order Fuzzy Controller Using GWO-ABC Algorithm
1 Introduction
2 Introduction to a Two-Link Planar Robotic Manipulator with Payload
2.1 Mathematical Modelling
2.2 Defining Reference Trajectories
3 Optimal FO-FPID Controller
3.1 FO-FPID Controller and Its Approximation
4 FO-FPID Controller Optimization Using GWO-ABC
4.1 Problem Definition
4.2 Experimental Settings and Result Analysis
5 Conclusion
References
Detection of Multi-column Text in Related Sequence Using Object Detection Technique
1 Introduction
2 Problem Statement
3 Methodology
3.1 YOLO [9]
3.2 Proposed Reading Sequence Algorithm
4 Dataset
5 Experimental Result
6 Conclusion
References
Design and Development of Autonomous Payload Delivery Drone
1 Introduction
2 Methodology
2.1 3D Modelling in Tinkercad
2.2 Mission Planner
2.3 Path Optimisation Algorithm
2.4 H-Frame Quadcopter
3 Experimental Results
3.1 Path Optimisation
3.2 Flight Data and Logs
4 Discussion
5 Conclusion and Future Work
References
Theories, Detection Methods, and Opportunities of Fake News Detection
1 Introduction
2 Literature Survey
2.1 Feature Extraction
2.2 Recurrent Neural Network
2.3 Support Vector Algorithm
2.4 Long Short-Term Memory
2.5 Bidirectional Long Short-Term Memory
3 Results
4 Discussion
5 Conclusion
References
A Novel Pixelated Approach for Synthesis of Wideband Metamaterial Cross Polarizer Using Wind-Driven Optimization Algorithm
1 Introduction
2 Introduction to BWDO Algorithm
3 Synthesis of Wideband Metamaterial Cross Polarizer
3.1 Proposed Metamaterial Cross Polarizer Structure
4 Results Obtained After Simulation
5 Polarization Conversion Phenomena Due to Effective Electromagnetic Parameters
6 Conclusion and Future Scope
References
A Novel Polynomial Time Heuristic Algorithm for Minimal PMU Allocation in the Grid
1 Introduction
2 Research Approach
2.1 Heuristic Algorithm
3 Results and Discussion
3.1 Application of the Algorithm on Different IEEE Bus Systems
3.2 Evaluation of the Results
4 Conclusion
References
Comparative Analysis on Fraud Detection in Credit Card Transaction Using Different Machine Learning Algorithms
1 Introduction
2 Experimentation
2.1 Methodology
2.2 Algorithms
3 Result
4 Conclusion
References
Interconnect Paradigm Shift Towards Networks-on-Chip in Manycore Processors: A Review on Challenges
1 Introduction
2 Network-on-Chip (NoC) Basics
2.1 Topology
2.2 Routing
2.3 Flow Control
2.4 Router Architecture
3 Performance Assessment Metrics for NoC Design
4 Conclusions
References
Design of Fast Battery Charging Circuit for Li-Ion Batteries
1 Introduction
2 Problem Statement
3 Proposed Fast Charging Circuit Methodology
3.1 AC-DC Rectifier
3.2 DC-DC Buck Converter
3.3 Design of Controller for DC-DC Buck Converter
4 Simulation Results
5 Conclusion
References
A Survey on Efficient Interconnects for Neuromorphic Systems
1 Introduction
2 Communication Interconnects for Neuromorphic Computing
2.1 Scalable Approach for SNN Based Hardwares
2.2 Customizing Clos NoC
2.3 K-Means Based Routing Algorithm
2.4 Scalable NoC for Astrocyte-NN
3 Further Research Possibilities
4 Conclusion
References
Variable Structure Fuzzy Controller for Unstable Processes
1 Introduction
2 Literature Survey
3 Variable Structure Fuzzy Controller
3.1 TS Fuzzy Controller
3.2 Fuzzy Mapping Function
3.3 Tuning
4 Simulations
5 Conclusion
References
Near Data Processing and Its Applications
1 Introduction
2 What Is NDP?
2.1 PIM-Enabled Instructions
2.2 3D-Stacked DRAMâHybrid Memory Cube
2.3 3D-Stacked Memory Accelerator
3 Applications of NDP
3.1 Automata Processing
3.2 Linked List Traversal and Pointer Chasing
3.3 NDP for Databases
3.4 Machine Learning and Data Analysis
4 Conclusion
References
Hybrid Artificial Neural Network Model for Prediction of Scour Depth Upstream of Bridge Piers
1 Introduction
2 Local Scour Around Bridge Pier
3 Methodology
4 Hybrid GA-ANN Model
5 Conclusion
References
A Novel Digital Forensic Inspection Model for XSS Attack
1 Introduction
2 Types of XSS Attacks and Digital Forensic
3 Literature Review
4 Model of XSS Digital Forensic Probe (mxdfp)
5 Comparative Analysis
6 Conclusion
References
A Study on Requests Serialization in Directory-Based Protocol for MESI Cache Coherence Protocol
1 Introduction
2 Tiled Architecture of Chip Multiprocessor
3 Requests Serialization in Directory-Based Protocol
4 MESI Cache Coherence Protocol
5 Conclusions
References
Understanding the Role of Feature Engineering in Fake News Detection
1 Introduction
2 Background
2.1 Defining Fake News
2.2 Definition of Fake News to Definition of Fake News Identification
2.3 The Choice of Early Identification
3 Fake News Detection
3.1 Historical Benchmarks for Deceptive Linguistic Features
4 Feature Engineering in Recent Times
4.1 Twitter-Specific Fake News Features
4.2 Modern NLP-based Features for Fake News Classification
5 Machine Learning Classifiers
5.1 LSTM and Recurrent Neural Network
5.2 Support Vector Machines
5.3 Convolutional Neural Network
5.4 Crowd Stance Classifiers
5.5 Hidden Markov Models
5.6 Decision Tree Classifiers
5.7 CNN Ensemble
5.8 Multi-layered Perceptron
5.9 Matrix Factorization
5.10 Bayes Classification
6 Future Work
7 Conclusion
References
Metaheuristic Optimization for Three Dimensional Path Planning of UAV
1 Introduction
2 Methodology
2.1 Cost Function
2.2 The GWO Algorithm
2.3 The AOA
2.4 The PSO Algorithm
3 Experiment
4 Results
5 Conclusions
References
An Automated System for Early Identification of Diseases in Plant Through Machine Learning
1 Introduction
2 Image Processing Techniques
3 Image Processing Applications
4 Types of Plant Diseases
5 Literature Review
6 Field of Artificial Intelligence in Agricultural Sector
7 The Foundation of Convolution
8 Matrix of Performance
9 Compression of the Result
10 Conclusion
References
Exhaustive Search Approach to Place PV in Radial Distribution Network for Power Loss Minimization
1 Introduction
2 ForwardâBackward Sweep Load Flow Algorithm with PV Model
3 Exhaustive Search Approach
4 Network Description
5 Simulation Results
6 Conclusion
References
Global Horizontal Solar Irradiance Forecasting Based on Data-Driven and Feature Selection Techniques
1 Introduction
2 Meta-heuristic Methods for Feature Selection
2.1 Simulated Annealing
2.2 Ant Colony Optimization
3 Results and Discussion
4 Conclusion
5 Data Availability
References
Image Encryption Using Chaotic Maps: A Survey
1 Introduction
2 Chaotic Maps for Encryption/Decryption
3 Literature Survey
4 Security Analysis of Image Encryption Algorithms Using Chaotic Maps
4.1 Chaotic Maps
4.2 Image Encryption Algorithm
5 Comparison of Image Encryption Algorithm Using Chaotic Maps
6 Conclusion
References
Efficient Computation of Hepatitis Blood Smear Image Encryption Using Enhanced Chaotic Technique for Cloud Storage
1 Introduction
2 Related Works
3 Proposed Method
4 Conclusion
References
A Hybrid Metaheuristic for Transmission Tower Design Optimization
1 Introduction
2 Literature Review
3 Jellyfish Search Optimizer
4 Proposed Hybrid Algorithm (SineâCosine Jellyfish Search Optimizer) SCJSO
5 Experimental Results and Discussion
6 Transmission Tower Design Optimization
7 Conclusion
References
Internet of Things-Based Human Healthcare Monitoring System
1 Introduction
2 Literature Survey
3 Applications of Internet of Things
4 Proposed System
5 Implementation
6 Sample Output
7 Conclusion
References
Intelligent Heart Disease Prediction System Using Data Mining Modeling Techniques
1 Introduction
2 Related Studies
3 Materials and Methods
3.1 Dataset
3.2 Methodology
3.3 Proposed Algorithm
4 Results
4.1 Analysis of Prediction Model
4.2 Heart Disease Prediction Model Using JESS
5 Conclusion
References
Maximum Power Point Tracking of Partially Shaded PV System with Improved PSO Strategy
1 Introduction
2 Proposed Algorithm
2.1 Particle Initialization
2.2 Parameter Adjustment
2.3 Jump Out Algorithm
2.4 Convergence Criterion
2.5 Local Mode
2.6 Limitation of Velocity
2.7 Detection of Shading Condition
3 Model Design Specification
4 Simulation Results
4.1 Selection of Swarm Size
5 Conclusion
References
An Enhanced SineâCosine Algorithm with Balanced Exploration and Exploitation
1 Introduction
2 Working of the SCA
3 Review of Related Work
4 The Proposed Enhanced SineâCosine Algorithm (ESCA)
5 Results and Analysis
6 The 72-Bar Truss Design Problem
7 Conclusion
References
Some Properties of q-Hermite-Fubini Numbers and Polynomials
1 Introduction
2 A q-Analogue Type of Hermite-Fubini Numbers and Polynomials
3 Main Results
4 Conclusion
References
A Study on Degenerate 12-Changhee Numbers and Polynomials
1 Introduction
2 Degenerate 12-Changhee numbers and polynomials
3 Conclusion
References
Human Heart Rate Stabilization Using Fractional Order Fuzzy Logic Controller
1 Introduction
2 Preliminary
2.1 Mathematical Modelling of Heart
2.2 Mathematical Model of Pacemaker
3 Fractional Order Fuzzy Logic PD+I Controller
3.1 PID
3.2 FOPID
3.3 Fuzzy FO PD+I
4 Result and Discussion
5 Conclusion and Future Work
References
A Framework for the Evaluation of Factors Affecting Smart Contract Adoption and Enforceability in Port Supply Chain Industry in Ghana
1 Introduction
2 Literature Review
2.1 Blockchain Smart Contract
3 Methodology
3.1 Introduction
3.2 Design Science Research Process
4 Summary of Findings
4.1 Introduction
4.2 Inductive Categorization
5 Discussion
5.1 Discussion on RQ1 Findings
5.2 Discussion on RQ2 Findings
5.3 Discussion on RQ3 Findings
5.4 Conclusions and Implications
5.5 Recommendations and Future Study Direction
References
Distributed Ledger Technology (DLT) and Byzantine Fault Tolerance in Blockchain
1 Blockchain Technology
2 Related Works
3 Distributed Ledgers in Blockchain Technology
4 Byzantine Fault in Blockchain Technology
5 Solutions to Byzantine Fault in Blockchain
6 Byzantine Fault Tolerance in Blockchain Technology
7 Conclusion and Future Works
References
Author Index
đ SIMILAR VOLUMES
<p><span>This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and health care, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Confere
<p>This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on
<p></p><p><span>The book focuses on soft computing and its applications to solve real-world problems in different domains, ranging from medicine and health care, to supply chain management, image processing and cryptanalysis. It includes high-quality papers presented at the International Conference
This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on Sof