𝔖 Scriptorium
✩   LIBER   ✩

📁

Soft Computing: Theories and Applications: Proceedings of SoCTA 2022

✍ Scribed by Rajesh Kumar, Ajit Kumar Verma, Tarun K. Sharma, Om Prakash Verma, Sanjay Sharma


Publisher
Springer
Year
2023
Tongue
English
Leaves
929
Series
Lecture Notes in Networks and Systems, 627
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and health care, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2022), held at University Institute of Technology, Himachal Pradesh University Shimla, Himachal Pradesh, India. The book offers valuable insights into soft computing for teachers and researchers alike; the book inspires further research in this dynamic field.

✩ Table of Contents


Preface
Contents
Editors and Contributors
A CNN-Based Approach for Facial Emotion Detection
1 Introduction
2 Literature Survey
3 Description of Dataset Used
4 Our Proposed Framework
5 Experimental Set-Up and Result
6 Conclusion
References
Implementation of Artificial Neural Network for Demanufacturing Operation in the Rail Industry
1 Introduction
2 Methodology
2.1 Formulation of the Problem
2.2 Data Gathering Process
2.3 Development of Demanufacturing Operation Activities Schedules
3 Results and Discussion
4 Conclusion
References
Diversified Recommendation Generation Using Graph Convolution Neural Network
1 Introduction
2 Related Work
2.1 Diversity in Recommendation System
2.2 GCN-Based Recommendation System
3 Preliminaries
4 Proposed Methodology
4.1 Clustering Algorithm
4.2 Graph Convolution
5 Experiments
5.1 Experimental Settings
5.2 Results and Discussion
5.3 Accuracy-Diversity Tradeoff
6 Conclusion
References
Brain Tumor Detection with GLCM Feature Extraction and Hybrid Classification Approach
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 MRI Input
3.2 Pre-processing
3.3 Image Segmentation
3.4 Feature Extraction
3.5 Classification
4 Result
5 Conclusion and Future Scope
References
Optimization of an Inventory Model with Selling Price and Stock Sensitive Demand Along with Trade Credit Policy
1 Introduction
2 Assumptions and Notations
2.1 Assumptions
2.2 Notations
3 Mathematical Formulation
4 Numerical Example
5 Sensitivity Analysis
6 Conclusion
References
A New Family of Generalized Euler-Genocchi Polynomials Associated with Hermite Polynomials
1 Introduction
2 Hermite-Based Generalized Euler-Genocchi Polynomials
3 Implicit Formulae Involving Hermite-Based Generalized Euler-Genocchi Polynomials
4 Symmetry Identities
5 Concluding Remarks
References
6G-Enabled Internet of Medical Things
1 Introduction
2 Related Work
3 IoMT and Enabling Technologies
4 Services and Applications
5 Challenges and Open Issues
6 Conclusion
References
An Inductively Degenerated LNA for ISM Applications: Design and Performance Comparison
1 Introduction
2 Types of Topologies
3 Input/Output Matching
4 Circuit Design
5 Simulation Results
5.1 S Parameters
5.2 Noise Figure
5.3 Power Consumption
5.4 Linearity
6 Conclusion
References
Prostate Cancer Risk Analysis Using Artificial Neural Network
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Datasets
3.2 Artificial Neural Network
4 Results and Discussion
5 Conclusion and Future Work
References
On Two Bivariate Kinds of (p,q)-Euler Polynomials
1 Introduction
2 A Bivariate Kind of (p,q)-Euler Polynomials
3 Conclusion
References
Different Stages of Watermelon Diseases Detection Using Optimized CNN
1 Introduction
2 Related Work
3 Proposed Work—Optimized CNN
3.1 Dataset and Pre-process
3.2 Initialization of Weights
3.3 Epoch
3.4 Batch Size
3.5 Intersection Over Union (IoU)
3.6 Optimizers
4 Result and Discussion
5 Conclusion
References
Machine Learning: An Analytical Approach for Pattern Detection in Diabetes
1 Introduction
2 Literature Review
3 Methodology Applied
3.1 Dataset Description
3.2 Data Pre-processing
3.3 Algorithm Used
3.4 Accuracy Measures
4 Results
4.1 Model Building
4.2 Model Validation
5 Conclusion
References
A Dynamic Weighted Federated Learning for Android Malware Classification
1 Introduction
2 Preliminaries
2.1 Android Malware
2.2 Federated Learning
3 Materials and Methods
3.1 Proposed Approach
3.2 Dataset Description
3.3 Experimental Setup
3.4 Performance Metric
4 Results, Analysis, and Discussion
5 Conclusion
References
Entropy Measure for the Linguistic q-Rung Orthopair Fuzzy Set
1 Introduction
2 Preliminaries
3 Proposed Entropy Measure of Linguistic q-rung Orthopair Fuzzy Set
4 Advantages of the Proposed Entropy Measure of Lq-ROFSs
5 Conclusion
References
Empirical Analysis of Unsupervised Link Prediction Algorithms in Weighted Networks
1 Related Work
2 Proposed Work
3 Empirical Analysis
3.1 Evaluation Metrics
3.2 Dataset Description
3.3 Methods to Compare
3.4 Result Analysis
4 Conclusions
References
Detection of Fraudulent Credit Card Transactions Using Deep Neural Network
1 Introduction
2 Related Works
3 Proposed Approach
3.1 Data Preprocessing
3.2 DNN Model Building
3.3 Performance Evaluation
4 Experimental Results
5 Conclusion
References
Recommendation System and Its Techniques in Machine Learning: A Survey
1 Introduction
2 Phases of Recommendation Process
2.1 Information Collection Phase
2.2 Learning Phase
2.3 Recommendation Phase
3 Recommendation Filtering Techniques
3.1 Content-Based Filtering Technique
3.2 Collaborative Filtering Technique
4 Best Recommendation
5 Conclusion
References
Approximation of Signal Belongs to W' ( Lp, Ο(t)) Class by Generalized Nörlund-CesĂĄro Product Means
1 Introduction
2 Main Theorem
3 Lemmas
4 Proof of the Theorem
5 Corollaries
6 Applications
7 Conclusion
References
Dignet: A Deep Learning-Based Efficient Digit Recognition System
1 Introduction
2 Literature Review
3 Convolutional Neural Network Structure
3.1 Convolutional Network Layer
3.2 Pooling Layer
3.3 Dense Layer
4 Methodology
4.1 MNIST Dataset
4.2 Design for CNN Structure
4.3 Mathematical Computation
5 Results
6 Conclusion
References
Voice Command Automation System (VCAS) for Controlling Electrical Devices Using Arduino
1 Introduction
2 Literature Review
3 Proposed Model
3.1 Android-Based Phone
3.2 Arduino Uno (R3)
3.3 Breadboard
3.4 Bluetooth Module HC-05 and 4 Channel 5V Relay Module 10A
3.5 Sonar Sensor
4 Hardware Implementation with Result Analysis
5 Conclusion and Future Works
References
Turing Machines Behind the Horizon: Modeling Black Hole Interiors as Transfinite Limited Turing Machines
1 Black Hole Information Paradox
2 Definition of wITTM
3 Black Hole as Weak Infinite Time Turing Machine Using Entanglement Entropy and Page Time
4 Black Hole as Weak Infinite Time Turing Machine Using EBH States
5 Conclusion
6 Future Work
References
A Review on Deep Learning-Enabled Healthcare Prediction Technique: An Emerging Digital Governance Approach
1 Introduction
2 Literature Survey
3 Summarization Table
4 Problems Identified
5 Conclusion
References
Evaluation of Deep Learning Technique on Working Model of Self-driving Car—A Review
1 Introduction
2 Related Work
3 Existing Methodology/Models for Performance Evaluation in Self-driving: Survey
4 Working of Self-driving Cars
4.1 Perception
4.2 Localisation
4.3 Prediction
4.4 Decision-Making
5 Conclusion
References
Analysis of the Distractions in Youth Due to Social Media and the Effects on Their Concentration Abilities
1 Introduction
2 Literature Survey
3 Effect of Social Media in Academic Aspects
4 Methodology
5 Experimental Section
5.1 Logistic Regression Method
5.2 K-Nearest Neighbors’ Method
5.3 NaĂŻve Bayes Classifier Method
6 Results
6.1 “How Long Do Use Gadgets in a Day?”
6.2 “Do You Go Out Regularly?”
6.3 “How Frequently Do You Go Out?”
6.4 “How Long Do You View Social Media or Other Sites in a Day?”
7 Conclusion
References
The Intervention of Technology in Education Under Isolation: Intuitions from Covid
1 Introduction
2 Literature Review
2.1 Educational Investment
2.2 Technological Innovation
3 Methodology
4 Findings and Discussions
5 Conclusion
References
Analysis of Bao-Zhou-Chen-Liu’s Hybrid Chaotic System
1 Introduction
2 Brief Description of BZCLS
3 Chaoticity of BZCLS
3.1 Weak Profile
3.2 Non-coverage Trajectory
3.3 Low Sensitivity
3.4 Low Lyapunov Exponent
3.5 Low Bifurcation
3.6 Low Entropy
3.7 Zero–One Testing
3.8 Low Key Space
4 Randomness Analysis
5 Conclusion
References
Identification of Skin Lesion with Adaptive Tasmanian Devil Optimization-Based Transfer Learning
1 Introduction
2 Motivation
2.1 Literature Survey
2.2 Challenges
3 Proposed ATDO-Based CNN-TL Algorithm for Skin Lesion Identification
3.1 Data Acquisition
3.2 Skin Lesion Segmentation Using SegNet
3.3 Feature Extraction
3.4 Skin Lesion Identification Using CNN-TL Model
4 Results and Discussion
4.1 Experimental Arrangement
4.2 Explanation of Utilized Dataset
4.3 Evaluation Metrics
4.4 Experimental Images
4.5 Algorithmic Assessment Methods
4.6 Comparative Methods
4.7 Comparative Investigation
4.8 Comparative Discussion
5 Conclusion
References
Synchronization of MLS Chaotic System Using Sliding Mode Control Technique
1 Introduction
2 Introduction of MLS Chaotic System
3 Synchronization of Two MLS Chaotic Systems
4 Numerical Simulation and Discussion
5 Conclusion
References
Performance Analysis of User Behavior Pattern Mining Using Web Log Database for User Identification
1 Introduction
2 Methodology
3 Experimental Setup
3.1 Performance Analysis of Pattern Mining Accuracy
3.2 Performance Analysis of Time Requirements
3.3 False-Positive Analysis
4 Conclusion
References
An Imperfect Production System for Non-instantaneous Deteriorating Goods with Preservation Technology Under Cap-and-Trade Policy
1 Introduction
2 Notations and Assumptions
2.1 Notations
2.2 Assumptions
3 Model Formulation
4 Numerical Illustration
5 Sensitivity Analysis
5.1 Observations
6 Conclusion
References
Human Activity Recognition Using a Hybrid Dilated CNN and GRU
1 Introduction
2 Related Work
3 Methodology
4 Experiments
5 Conclusion
References
A New Framework for Disease Prediction: Using Dimensionality Reduction and Feature Selection
1 Introduction
2 Proposed Framework
2.1 Data Collection
2.2 Data Pre-processing
2.3 Dimensionality Reduction and Feature Selection
2.4 Classification Models
2.5 Performance Metric
3 Result and Discussion
4 Conclusion and Future Work
References
Review of Metaheuristic Techniques for Feature Selection
1 Introduction
2 Background
2.1 Feature Selection
2.2 Metaheuristic Algorithms
3 Issue and Challenges
4 Research Gap
5 Conclusion
References
New Type of Degenerate Changhee–Genocchi Polynomials of the Second Kind
1 Introduction
2 A New Type of Degenerate Changhee–Genocchi Polynomials of the Second Kind
3 Conclusion
References
Temperature Aware Bi-partitioning Multi-level Logic Synthesis
1 Introduction
2 Shannon Expansion and AIGS Basic Terminologies
2.1 Shannon's Expansion
2.2 AND-Inverter Graphs Preliminaries
3 Objective Parameter Estimation and Fitness Calculation
3.1 Area Estimation
3.2 Temperature Estimation
3.3 Fitness Function Calculation
4 Results and Discussion
5 Conclusion and Future Work
References
Determination Human Behavior Prediction Supported by Cognitive Computing-Based Neural Network
1 Introduction
2 Background
3 Material and Methods
3.1 Deep Learning
3.2 TensorFlow Framework
4 Results and Discussion
4.1 Epoch=10
4.2 Epoch=20
4.3 Epoch=50
4.4 Epoch=100
5 Conclusion
References
Single IC-Based Third-Order Sinusoidal Oscillator
1 Introduction
2 Proposed Circuit Description
3 Consideration of CFOA Non-idealities
4 Sensitivity Analysis
5 Simulation Results
6 Experimental Verification
7 Concluding Remarks
References
Internet of Things (IoT)-Based Waste Dumping System
1 Introduction
2 Literature Review
3 Applications
4 Hardwares
4.1 Arduino Mega
4.2 Ultrasonic Sensor (HC-SR04)
4.3 HC-05 (Bluetooth Module)
4.4 ESP8266 (Wi-Fi Module)
4.5 IR Array
4.6 Servomotor
4.7 L289N Motor Driver
5 Software
6 Methodology
6.1 Smart Trash System (STS)
6.2 Vehicle System (VS)
6.3 Local Base Station (LBS)
6.4 Smart Monitoring and Controlling Hut (SMCH)
7 Conclusion
References
Constructing a Smart School Based on the Internet of Things Using RFID Technology
1 Introduction
2 Related Work
3 The Proposed System
3.1 The System's Block Diagram
3.2 Implementation
3.3 System Testing and Discussion
4 Conclusion and Future Work
References
Effect of Confining Walls on Settling Permeable Rigid Isolated Semi-torus Particle Applying Immersed Boundary Method (IBM)
1 Introduction
2 Immersed Boundary Method (IBM)
2.1 Mathematical Equations
2.2 Setup of the Problem
2.3 Analytical Results
3 Numerical Results
3.1 Sensitivity Study of Half Wall Gap for Fixed Density Difference Between Fluid and Immersed Structure (Δρ) and Varying Permeability (k)
3.2 Sensitivity Study for Fixed Permeabilities and Viscosities and Variable Wall Gap (ΔW)
4 Conclusion
References
Hybridized Shuffled Frog Leaping Algorithm for Solving Facility Location Problem for Maternal Healthcare
1 Introduction
2 The Maternal Healthcare Facility Location-Allocation Problem
3 Shuffled Frog Leaping Algorithm
4 Computational Experiments
5 Conclusions
References
Key Observation to Prevent IP Spoofing in DDoS Attack on Cloud Environment
1 Introduction
2 Related Literature and Significance of This Study
3 Proposed Method
3.1 End-of-Sender-Phase
3.2 End-of-Receiver-Phase
4 Performance Analysis
5 Conclusion
References
Performance Enhancement of Magnetic Levitation System Using GWO-ABC Tuned High-Dimensional Robust Controller
1 Introduction
2 Structure and Mathematical Modeling of MAGLEV
3 Optimizing Algorithm and Other Methodologies
3.1 GWO-ABC Algorithm
3.2 FO Approximation
3.3 Fuzzy Logic Controller
4 Proposed Controller and Optimization Strategy
4.1 FO-Fuzzy-PID Controller
4.2 Problem Definition
4.3 Optimization Strategy
5 Results and Discussion
5.1 Step Response
5.2 Robustness Analysis
6 Conclusion
References
Approximation of Function Belonging to Lip(Ο(t), p) Class by Using Borel's Mean
1 Introduction
2 Known Results
3 Main Result
4 Applications and Conclusion
References
Combining Genetic Algorithm and Support Vector Machine for Classification of Cancer on Microarray Data
1 Introduction
2 Description of the Optimization Problem
2.1 Problem Model
2.2 Optimization Methods
2.3 Implementation and Comparison of Different Optimization Methods
3 Results
4 Conclusions
References
Design and Simulation of a Novel Digital Technology for Assembly Operations: A Case Study of Railcar Bogie Application
1 Introduction
2 Literature Review
3 Methodology
3.1 Assembly Process of the Railcar Bogie and Its Enabling Technology
3.2 Simulation of the Virtual Assembly
4 Conclusions
References
Solving Fixed Charge Transportation Problem with Interval Parameters Using Generalized Reduced Gradient Method
1 Introduction
2 Fixed Charge Transportation Problem (FCTP) with Interval Parameter
3 Proposed Algorithm
4 Numerical Example
5 Validation of Result
6 Conclusions
References
Automated Solar PV Array Cleaning Based on Aerial Computer Vision Framework
1 Introduction
2 Solar PV Cleaning Methodologies
3 Proposed Methodology
4 Conclusion
References
An Ensemble Framework for Glaucoma Classification Using Fundus Images
1 Introduction
2 Related Work
3 Preliminaries
3.1 Feature Extraction
3.2 Classifier
4 Proposed Approach
5 Experimental Results
5.1 Dataset Description
5.2 Experimental Setup
5.3 Performance Metric
6 Results and Discussion
6.1 REFUGE Dataset
6.2 ORIGA Dataset
6.3 State-of-the-Art Comparison
7 Conclusion
8 Future Works
References
A Note on Laguerre-Based Appell-Type Daehee Polynomials and Numbers
1 Introduction
2 Laguerre-Based Appell-Type Daehee Polynomials
3 General Identities
4 Concluding Remarks
References
Type-II Fuzzy Kernel-Based Multi-layer Extreme Learning Machine
1 Introduction
2 Related Work
2.1 Multi-layer Extreme Learning Machine
2.2 Kernel-Based Multi-layer Extreme Learning Machine
3 Proposed Type-II Fuzzy Kernel Multi-layer Extreme Learning Machine (Type-II FKMLELM)
4 Experimental Results
4.1 Experiment Setup
4.2 Training and Testing Accuracy of the Type-II FKMLELM
5 Conclusion
References
Energy Trading in Smart Grids Using Game Theoretic Approach
1 Introduction
2 Methodology
2.1 Grid Design and Energy Trading Mechanism
2.2 Auction Mechanism
3 Result and Discussion
3.1 Average Cost % Advantage
3.2 Total $ Savings
4 Conclusion
References
Design of Disturbance Observer-Based Dynamic Sliding Mode Control
1 Introduction
2 Control Design
2.1 Sliding Surface
2.2 Disturbance Observer
2.3 Disturbance Observer-Based Control Design
2.4 Numerical Simulation
2.5 Stability Analysis
3 Application of Observer-Based DSMC Control for Position Control of DC Motor
3.1 Results and Discussion
4 Conclusion
References
Analysis on the Financial Performance of Technology Companies in Malaysia with VIKOR Model
1 Introduction
2 Data and Methodology
3 VIKOR Model
4 Empirical Results
5 Conclusion
References
IoT-Based Online Condition Monitoring and Fault Analysis of Bearings of a Rotating Machinery
1 Introduction
2 Theoretical Framework and Technologies Used
2.1 Internet of Things
2.2 ESP8266Wi-Fi Module
2.3 ThingSpeak
2.4 Sensors
2.5 Types of Faults in Bearing
2.6 Fault Analysis Techniques
2.7 Twitter API
3 Experimental Set-Up and Procedure
4 Results and Discussion
4.1 Visualization of Condition Parameters
4.2 Fault Analysis
5 Conclusion
References
Influence of Time Delay on Predator-Prey Model Having Herd Behaviour and Hunting Cooperation
1 Introduction
2 The Mathematical Model
3 Stability Analysis
4 Hopf-Bifurcation
5 Numerical Simulations
6 Conclusion
References
An Improved Jaya Algorithm (IJAYA) for Optimization
1 Introduction
2 Jaya Algorithm
3 IJAYA Algorithm
4 Conclusions and Discussion
4.1 Benchmark Functions
4.2 Parameter Setting
4.3 Results and Comparison
5 Conclusion
References
An Optimized Approach for Emotion Detection-Based Music Recommendation System
1 Introduction
2 System Design
2.1 Input Module
2.2 Preprocessing Module
2.3 Processing Module
2.4 Output Module
2.5 Evaluation Module
3 Conclusion
4 Future Scope
References
A Method to Solve Fractional Transportation Problems with Rough Interval Parameters
1 Introduction
2 Preliminaries
3 Mathematical Model of Fully Rough Fractional Transportation Problem (FRFTP)
4 Solution Methodology
5 Numerical Example
6 Conclusions
References
Applications of IoT and Various Attacks on IoT
1 Introduction
2 Literature Review
3 IoT Applications
3.1 Attacks on IoT Applications
4 Conclusion
5 Future Scope
References
Real-Time Implementation of Laguerre Neural Network-Based Adaptive Control of DC-DC Converter
1 Introduction
2 Converter Modelling and Problem Formulation
3 Proposed Control Scheme
3.1 Laguerre Neural Network
3.2 Controller Design
4 Experimental Results and Discussion
5 Conclusion
References
5G New Radio Physical Downlink Shared Channel Throughput Analysis with Different Numerology and Modulation Schemes
1 Introduction
2 System Model of PDSCH
3 A PDSCH Illustration Using Experimental Setup
4 Results and Discussions
4.1 Discussion
5 Conclusion
References
Automated Text Summarization Using Transformers
1 Introduction
1.1 Transformers
1.2 RNN
2 Related Work
3 Problem Statement
4 Methodology
4.1 Transformers
4.2 Self-attention in Detail
4.3 Calculation of Self-attention
4.4 RNN
5 Experiments and Results
5.1 Dataset
5.2 Evaluation Metrics
5.3 Results
6 Conclusion
References
Minimizing Building Energy Waste by Detecting and Addressing HVAC Issues
1 Introduction
2 Methodology
2.1 Initialization
2.2 Algorithm for Fault Detection
3 Results and Discussion
3.1 Fault Detection
3.2 Energy Savings
4 Conclusion
References
Knowledge Representation and Information Retrieval from Ontologies
1 Introduction
2 Related Work
3 Methods for Representation and Retrieval of Knowledge
3.1 Knowledge Representation
3.2 Measures for Information Retrieval
3.3 Ontology-Based Information Retrieval
4 Standard Ontologies in Healthcare Domain
5 Conclusion and Future Work
References
Design and Analysis of GIGA Fiber like Connectivity of 5G Technology Using 60 GHz Band
1 Introduction
1.1 Evolution of Optical-Fiber Transmission System
2 Methodology
2.1 Particle Swarm Optimization (PSO)
2.2 Neural Network
2.3 Parallel Implementation of the PSO-BP Neural Network Algorithm
3 Results and Discussion
4 Conclusions
References
Coronavirus Herd Immunity Optimization-Based Control of DC-DC Boost Converter
1 Introduction
2 Problem Statement
3 DC-DC Boost Converter
4 Coronavirus Herd Immunity Optimization Algorithm
4.1 Background
4.2 Optimization Process
4.3 CHIO Application on Boost Converter
5 Simulation Results and Discussion
6 Conclusion
References
Improvisation in Opinion Mining Using Negation Detection and Negation Handling Techniques: A Survey
1 Introduction
2 Related Work
3 General Framework and Approaches for Detection and Handling of Various Types of Negations
3.1 General Framework for Negation Detection and Handling
3.2 Types of Negations
3.3 Approaches for Negation Detection and Handling
4 Research Gaps
5 Conclusion and Future Work
References
Localization of the Closed-Loop Differential Drive Mobile Robot Using Wheel Odometry
1 Introduction
2 Experimental Setup
3 Kinematics of Differential Drive Robot
3.1 Odometry and Kinematics
3.2 Kinematic Equations
4 Results
5 Conclusion and Future Scopes
References
Analysis of Effectiveness of Online Classes During COVID
1 Introduction
2 Literature Survey
3 Methodology
4 Results
5 Conclusion
References
Suspicious Crime Identification and Detection Based on Social Media Crime Analysis Using Machine Learning Algorithms
1 Introduction
1.1 Objective and Motivation
1.2 Outline of the Work
2 Review of Literature
3 Proposed Scheme
3.1 Data Preparation Phase
3.2 Selection Phase
3.3 Detection Phase
4 Performance Evaluation
5 Conclusion
References
Deep Learning-Based Similar Languages' POS Tagging: Experiments on Bhojpuri, Maithili, and Magahi
1 Introduction
2 Sequential Labeling Model
2.1 BiLSTM-CRF Model
2.2 Word Embedding
2.3 Byte-Pair Embedding
2.4 Multilingual Word Embedding
3 Experimental Details
3.1 Dataset
3.2 Parameter Settings
4 Result and Analysis
5 Related Work
6 Conclusion
References
CS-Jaya: Hybridization of Cuckoo and Jaya Algorithm
1 Introduction
2 Working of Basic Algorithms
2.1 Cuckoo Search Algorithm
2.2 Jaya Algorithm
3 Proposed CS-Jaya Algorithm
4 Simulation Results and Discussion
4.1 Evaluation Criterion and Parameter Settings
4.2 Test Functions
4.3 Results and Comparisons of the CS-Jaya Search Algorithm with Jaya and Cuckoo
4.4 Results and Comparisons of the CS-Jaya Search Algorithm with GWO, PSO-GWO, and jDE
5 Conclusion
References
Plant Leaf Disease Detection Using ResNet
1 Introduction
2 Literature Survey
3 The Proposed Methodology
3.1 How the Proposed Method is Different from the Existing Methods
3.2 Implementation
4 Experimental Setup and Result
5 Results
6 Conclusion
References
Automatic Infographic Builder Using Natural Language Statements
1 Introduction
2 Related Work
2.1 Information Graphics
2.2 Literature Survey
3 Proportion-Related Information
3.1 Text Space
3.2 Visual Space
4 Proposed System
4.1 Text Analyzer
4.2 Visual Generator
5 Experimentation and Results
6 Conclusion
References
A Novel Type-2 Fuzzy Programming Approach for Solving Multiobjective Programming Problems
1 Introduction
2 Preliminaries
2.1 Definition [8]
2.2 Definition [15]
2.3 Definition [2]
3 T2TSFIS
4 Multiobjective Programming Problem Under Type-2 Fuzzy Environment
4.1 MOO Model Using Type-2 Fuzzy Rule Base
4.2 Construction of Equivalent Deterministic Type-2 MOO Model
5 Numerical Example
5.1 Construction of Equivalent Deterministic MOO Model
6 Comparative Analysis
7 Conclusions
References
Person Detection Using YOLOv3
1 Introduction
2 Related Works
3 Methodology
3.1 Overview
3.2 The Proposed System
3.3 Person Detection
4 Experiments and Discussions
5 Conclusions and Future Scope
References
Incident Reporting of Forest Fire with Azure Cognitive Services and Twitter API
1 Introduction
2 Related Work
3 Material and Methodology
4 Experimental Result Analysis
5 Conclusion and Future Scope
References
Role of Telemedicine in Healthcare Sector for Betterment of Smart City
1 Introduction
1.1 Telemedicine
1.2 Classification of Telemedicine
2 Related Work
2.1 Existing Telemedicine Framework
2.2 Impact of Telemedicine in Smart City
3 Telemedicine Framework Useful for Smart City
3.1 Asynchronous Telemedicine
3.2 Synchronous Telemedicine
3.3 Remote Patient Monitoring
3.4 Mobile Health
4 Discussion
5 Conclusion and Future Work
References
A Comparitive Study on Abstractive Text Summarization Techniques Using Deep Learning (ATS-DL)
1 Introduction
2 Literature Survey
3 System Architecture of ATS-DL
3.1 Data Preprocessing
3.2 Deep Learning Models
4 Implementation
4.1 Dataset Description
4.2 Text Preprocessing
4.3 Abstractive Text Summarization
5 Results and Performance Analysis
5.1 Evaluation Metric
5.2 T5—Results
5.3 ROUGE Scores and Overall Observations
6 Conclusion and Future Work
References
Author Index


📜 SIMILAR VOLUMES


Soft Computing: Theories and Application
✍ Tarun K. Sharma, Chang Wook Ahn, Om Prakash Verma, Bijaya Ketan Panigrahi 📂 Library 📅 2021 🏛 Springer 🌐 English

<div>This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference o

Soft Computing: Theories and Application
✍ Tarun K. Sharma; Chang Wook Ahn; Om Prakash Verma; Bijaya Ketan Panigrahi 📂 Library 📅 2021 🏛 Springer Nature 🌐 English

This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on Sof

Soft Computing: Theories and Application
✍ Kanad Ray, Tarun K. Sharma, Sanyog Rawat, R. K. Saini, Anirban Bandyopadhyay 📂 Library 📅 2019 🏛 Springer Singapore 🌐 English

<p><p><p>The book focuses on soft computing and its applications to solve real-world problems occurring in different domains ranging from medicine and healthcare, and supply chain management to image processing and cryptanalysis. It includes high-quality papers presented in the International Confere

Soft Computing: Theories and Application
✍ Millie Pant,Kanad Ray,Tarun K. Sharma,Sanyog Rawat,Anirban Bandyopadhyay (eds.) 📂 Library 📅 2018 🏛 Springer Singapore 🌐 English

<p><p>This book focuses on soft computing and its applications to solve real-life problems occurring in different domains ranging from medical and health care, supply chain management and image processing to cryptanalysis. It presents the proceedings of International Conference on Soft Computing: Th

Soft Computing: Theories and Application
✍ Millie Pant,Kanad Ray,Tarun K. Sharma,Sanyog Rawat,Anirban Bandyopadhyay (eds.) 📂 Library 📅 2018 🏛 Springer Singapore 🌐 English

<p><p>This book focuses on soft computing and its applications to solve real-life problems occurring in different domains ranging from medical and health care, supply chain management and image processing to cryptanalysis. It presents the proceedings of International Conference on Soft Computing: Th

Soft Computing: Theories and Application
✍ Rajesh Kumar (editor), Chang Wook Ahn (editor), Tarun K. Sharma (editor), Om Pra 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing, and cryptanalysis. It gathers high-quality papers presented at the International Conference