<span>The book includes peer-reviewed papers of the International Conference on Sustainable Technology and Advanced Computing in Electrical Engineering (ICSTACE 2021). The main focus of the book is electrical engineering. The conference aims to provide a global platform to the researchers for sharin
Sustainable Advanced Computing: Select Proceedings of ICSAC 2021 (Lecture Notes in Electrical Engineering, 840)
â Scribed by Sagaya Aurelia (editor), Somashekhar S. Hiremath (editor), Karthikeyan Subramanian (editor), Saroj Kr. Biswas (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 669
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
This volume presents select proceedings of the International Conference on Sustainable Advanced Computing (ICSAC â 2021). It covers the latest research on a wide range of topics spanning theory, systems, applications, and case studies in advanced computing. Topics covered are machine intelligence, expert systems, robotics, natural language processing, cognitive science, quantum computing, deep learning, pattern recognition, human-computer interface, biometrics, graph theory, etc. The volume focuses on the novel research findings and innovations of various researchers. In addition, the book will be a promising solution for new generation-based sustainable, intelligent systems that are machine and human-centered with modern models and appropriate amalgamations of collaborative practices with a general objective of better research in all aspects of sustainable advanced computing.
⊠Table of Contents
Committees
Preface
Acknowledgements
Keynote Speakers
ICSAC 2021 Reviewers
Contents
About the Editors
Machine Learning
Predictive Analytics for Real-Time Agriculture Supply Chain Management: A Novel Pilot Study
1 Introduction
1.1 Background
1.2 Motivation
2 Related Works
3 Research Gap
4 Proposed Work
5 Technology Stack
6 Experimental Work
7 Future Scope
8 Conclusion
References
Analysis and Prediction of Crop Infestation Using Machine Learning
1 Introduction
2 Objective
3 Literature Review
4 Materials and Methods
4.1 Data Summary
4.2 Data ImputationâSoul Nutrients Deficiency
4.3 Dependent Variable Standardization
4.4 Outlier Treatment
4.5 Correlation of Numerical Variables
4.6 Regression Models and Outcome
5 Classification Algorithms for Pest Prediction
5.1 Classification Modelling Techniques and Outcomes
6 Conclusion
References
ECG-Based Personal Identification System
1 Introduction
2 Literature Survey
3 Proposed Model
4 Results and Discussion
5 Conclusion
References
Explorations in Graph-Based Ranking Algorithms for Automatic Text Summarization on Konkani Texts
1 Introduction
2 Related Work
3 Graph-Based Ranking Algorithms
3.1 Hits
3.2 PageRank
4 Representing Textual Data as a Graph
4.1 Directed Graph
4.2 Undirected Graph
5 Similarity Measure
6 Dataset
7 Sentence Extraction Methodology
8 Evaluation and Results
9 Conclusion
References
Demography-Based Hybrid Recommender System for Movie Recommendations
1 Introduction
2 Background Theory
3 Proposed Model
3.1 Dataset
3.2 Data Preparation
3.3 System Design
4 Proposed Hybrid Algorithms
4.1 Collaborative Filtering-Based Models
4.2 Demography-Based Filtering
4.3 Content-Based Filtering
5 Experimental Evaluation
6 Conclusion and Future Scope
References
Holistic Recommendation System Framework for Health Care Programs
1 Introduction
2 Background and Motivation
3 The Proposed Framework
3.1 The Community Support Program
3.2 IT Infrastructure
3.3 Health Care Recommendation System
3.4 Mobile App for Health Care Program
4 Challenges
5 Conclusions
References
A Synthetic Data Generation Approach Using Correlation Coefficient and Neural Networks
1 Introduction
1.1 Need for More Data
1.2 Data Generation
2 Theory and Background
2.1 Correlation Coefficient and Heatmap
2.2 Artificial Neural Network
3 Algorithm
3.1 Preparing Dataset
3.2 Heatmap Implementation
3.3 Neural Network Architecture
4 Results and Comparison with Previous Works
4.1 Generating Values of Other Attributes
4.2 Testing
4.3 Comparison of Previous Works
5 Conclusions
6 Future Work
References
Cepstral Coefficient-Based Gender Classification Using Audio Signals
1 Introduction
2 Proposed Work
2.1 Wavelet Signal Denoiser
2.2 Mel-Frequency Cepstral CoefficientsâFeatures
2.3 Statistical Parameters
2.4 SVM Classifier
2.5 Observations from Wavelet Denoiser
3 Results
3.1 Comparison with Existing Work
4 Conclusion and Future Work
References
Reinforcement Learning Applications for Performance Improvement in Cloud ComputingâA Systematic Review
1 Introduction
2 Literature Survey
3 Conclusion
References
Machine Learning Based Consumer Credit Risk Prediction
1 Introduction
2 Related Work
3 Proposed Work
4 Experimental Setup and Results
5 Conclusion and Future Work
References
Hate Speech Detection Using Machine Learning Techniques
1 Introduction
2 Methodology
3 Datasets
4 Feature Representation
5 Proposed Models
5.1 Supervised Machine Learning Techniques Used Together with One Unsupervised Machine Learning Technique
5.2 Unsupervised Machine Learning Techniques
5.3 Deep Learning Techniques
6 Results and Analysis
7 Conclusion
References
Real-Time Traffic Sign Detection Under Foggy Condition
1 Introduction
2 Related Studies
3 Research Dataset
4 Implementation
5 Training
6 Confusion Matrix
7 Results
8 Conclusion
References
Deep Learning
Waste Object Segmentation for Autonomous Waste Segregation
1 Introduction
2 Related Work
3 Proposed Technique
3.1 Global Convolutional Network
3.2 Addition of Input Layers from HSV Color Space
3.3 Channel Attention
3.4 Dataset and Experimentation
4 Results and Discussion
4.1 Metrics
4.2 Experimental Results and Discussion
4.3 Experiments with Increasing Kernel
5 Conclusions and Future Scope
References
Deep Learning Techniques to Improve Radio Resource Management in Vehicular Communication Network
1 Introduction
2 Literature Review
3 Methods of RRM
4 Working of RRM
5 Overview of Deep Learning
6 Activation Functions
7 Need of Bias
8 Convolutional Neural Network
9 Machine Learning Algorithms Used for RRM
10 Comparison Between Different Models
11 Conclusion
References
Malabar Nightshade Disease Detection Using Deep Learning Technique
1 Introduction
2 Related Work
3 System Architecture
4 Methodology
4.1 Convolutional Neural Network
4.2 Convolutional Layer
4.3 MaxPooling Layer
4.4 Flatten
4.5 Dense Layer
5 Implementation
6 Feature Extraction
7 Classification
8 Dataset Description
9 Result Analysis
10 Future Scope
11 Conclusion
References
A Constructive Deep Learning Applied Agent Mining for Supported Categorization Model to Forecast the Hypokinetic Rigid Syndrome (HRS) Illness
1 Introduction
2 Related Works
3 Strategy
3.1 Data Set
3.2 CNN Model
4 Experimental Results
4.1 Data Sources
4.2 Performance Method
5 Numerical Results
6 Comparison and Future Directions
7 Conclusion
References
High-Utility Pattern Mining Using ULB-Miner
1 Introduction
2 Literature Review
3 Methodology
4 Experiments and Analysis
4.1 The Execution time
4.2 The Memory Consumption
5 Conclusion
References
Recent Progress in Object Detection in Satellite Imagery: A Review
1 Introduction
2 Object Detection Methods
2.1 Techniques Based on HDNN and FCN
2.2 Techniques Based on Faster RCNN
2.3 Techniques Based on Edge Guided Method
2.4 Techniques Based on U-Net
2.5 Techniques Based on SSD
2.6 Techniques Based on YOLT
2.7 Techniques Based on Supervised Classification
3 Conclusion
References
Aspergillus Niger Fungus Detection Using Deep Convolutional Neural Network with Principal Component Analysis and Chebyshev Neural Network
1 Introduction
2 Proposed Method
2.1 Image Acquisition
2.2 Principal Component Analysis
2.3 Chebyshev Neural Network
2.4 Deep CNN Features
2.5 Proposed Algorithm
3 Results and Conclusion
3.1 Confusion Matrix
3.2 Receiver Operating Characteristic Curve
4 Conclusion
References
Autism Spectrum Disorder Classification Based on Reliable Particle Swarm Optimization Denoiser
1 Introduction
2 Literature Review
3 Reliable Particle Swarm Optimization Based Flexible Kalman Filtering (RPSO-FKF)
4 Results and Discussion
4.1 About Performance Metrics
4.2 About ABIDE Dataset
4.3 Performance Evaluation
5 Conclusion
References
Automated News Summarization Using Transformers
1 Introduction
1.1 Need for Text Summarization
1.2 Summarization Techniques
2 Related Work
3 Methodology
3.1 Dataset
3.2 Preprocessing
3.3 Model Explanation
4 Results
4.1 Qualitative Analysis
4.2 Quantitative Analysis
5 Conclusion
References
Generating Stylistically Similar Vernacular Language Fonts Using English Fonts
1 Introduction
2 Related Works
2.1 Tower Architecture
2.2 Transfer LearningâHiragana Fonts
2.3 Extrapolating from Kanji Character Subset
2.4 GlyphGAN
3 Formulation
4 Dataset
5 Implementation
5.1 Network Architecture
5.2 Training Details
5.3 Evaluation Metrics
6 Results
6.1 Evaluation
6.2 Two-Step ED Model
6.3 Encoder-Multidecoder Model
7 Conclusion and Future Work
References
Optimization of Artificial Neural Network Parameters in Selection of Players for Soccer Match
1 Introduction
2 Review of Literature
3 Artificial Intelligence in Sports
4 Data Set
5 Results and Discussion
References
Organ Risk Prediction Using Deep Learning and Neural Networks
1 Introduction
2 Related Research Work and Model Used
3 Materials and Methods Used
3.1 Dataset
3.2 Deep Neural Network (DNN)
4 Experimental Result Analysis and Discussion
4.1 Implementation
5 Conclusions and Future Work
References
Image Processing (Image/Video) and Computer Vision
Automated Vehicle License Plate Recognition System: An Adaptive Approach Using Digital Image Processing
1 Introduction
2 Related Works
3 Proposed System
4 Implementation Process
4.1 Preprocessing
4.2 ROI Detection
4.3 Removing Noise
4.4 Contour Selection
4.5 Character Segmentation
4.6 Pytesseract OCR Process Flow
4.7 Optical Character Recognition (OCR)
5 Performance Analysis
6 Conclusion
References
Detection of Image Forgery for Forensic Analytics
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Algorithms Used for Image Forgery Detection
4 Flowchart
5 Result
6 Conclusion
References
Video Steganography Based on Edge Detector and Using Lifting Wavelet Transform
1 Introduction
2 Proposed Work
3 Examination and Results
4 Conclusion
References
A Vision-Based System Facilitating Communication for Paralytic Patients
1 Introduction
2 Proposed Approach
2.1 Face and Eye Detection
2.2 Iris Segmentation
2.3 Gaze Detection
2.4 Blink Detection
3 Interpretation and Implementation
4 Conclusion
References
Novel Fall Prevention Technique in Staircase Using Microsoft Kinect
1 Introduction
2 Experimental Setup and Protocol
3 Mathematical Modelling and Analysis
4 Results and Discussions
5 Conclusion and Future Scope
References
Modified LSB Algorithm Using XOR for Audio Steganography
1 Introduction
2 Literature Survey
3 Block Diagram
4 Methodology
4.1 Noise Reduction of Selected Audio File
4.2 Least Significant Bit (LSB) Technique
5 Implementation and Results
6 Conclusion
References
Region-Based Stabilized Video Magnification Approach
1 Introduction
2 Literature Survey
3 Methodology
3.1 Algorithm
4 Implementation, Results, and Analysis
4.1 Implementation Details and Results
4.2 Performance Analysis
5 Conclusion
References
Natural Language Processing
Analysing Cyberbullying Using Natural Language Processing by Understanding Jargon in Social Media
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Collection
3.2 Preprocessing
4 Model Architecture
5 Experiments and Results
6 Limitations
7 Conclusion and Future Scope
References
Impeachment and Weak Supervision
1 Introduction
2 Methodology
2.1 Pre-Processing
2.2 Weak Supervision (Generation of Labels)
2.3 Creation of a Balanced Data Set
2.4 Classification
3 Conclusion
References
34 Devanagari to Urdu Transliteration System with and Without AIRAAB
Abstract
1 Introduction
2 Devanagari and Urdu Script
3 Methodology
3.1 Preprocessing
3.1.1 Standardization of the Hindi Words Required Nuqta
3.1.2 Stop Word Removal
3.2 Character Mapping
3.3 Issues and Challenges in Character Mapping and Transliteration
3.3.1 Multiple Mapping
3.3.2 No Exact Equivalent Mappings in Hindi for Some Special Urdu Characters
3.3.3 Different Writing Convention
3.4 Handling Issues
3.4.1 Non-equivalent Characters
3.4.2 Multiple Mappings
3.4.3 Different Writing Conventions
3.4.4 Mapping of âÚșâ
3.4.5 Full Stop
3.4.6 Gemination
3.4.7 System Flow Diagram
4 Result and Discussion
5 Conclusion
References
Communication System
Comparison of Radar Micro Doppler Signature Analysis Using Short Time Fourier Transform and Discrete Wavelet Packet Transform
1 Introduction
2 Short Time Fourier Transform
3 Wavelet Packet Transform
4 Simulation Results
5 Experimental Data
6 Conclusion
References
Review of Security Gaps in Optimal Path Selection in Unmanned Aerial Vehicles Communication
1 Introduction
2 Blockchain
3 Blockchain Role in UAV
4 Blockchain Security Breaches
5 Cyber Attacks in UAV
5.1 Challenges in UAV
6 Security Gaps in UAV
6.1 Cyber Security Attacks Affecting CIA
6.2 Security Attacks Affecting Availability
6.3 Security Attacks Affecting Integrity
6.4 Security Attacks Affecting Confidentiality
7 Load Sharing in UAV
7.1 Challenges in Load Sharing
8 Related Works
9 Conclusion
References
Internet of Things
A Multilayered Hybrid Access Control Model for Cloud-Enabled Medical Internet of Things
1 Introduction
2 Literature Review
2.1 The Medical Internet of Things
2.2 Cloud Computing
2.3 Access Control
2.4 Related Work
2.5 Summary
3 Proposed Model
4 Results and Discussion
4.1 Performance Testing
4.2 Data Integrity Testing
4.3 Security Implication Testing
4.4 Functional Requirement Analysis
5 Conclusion
References
Effective Data Delivery Algorithm for Mobile IoT Nodes
1 Introduction
2 Literature Review
3 The CCN Node Model
4 Routing
4.1 Link State Intra-Domain Routing
5 MobCCN
5.1 Routing
5.2 Forwarding
5.3 Retransmission
6 Performance Evaluation
6.1 Simulation Setup
6.2 Results
7 Conclusion
References
An IoT-Based Model for Pothole Detection
1 Introduction
2 Related Work
3 Proposed IoT Pothole Detection Model
3.1 Sensors Used
3.2 Wi-Fi-Enabled Controller
3.3 IoT Cloud Platform
4 Result and Discussion
5 Conclusion
References
Network Lifetime Enhancement Routing Algorithm for IoT Enabled Software Defined Wireless Sensor Network
1 Introduction
2 Related Works
3 Problem Statement and Objectıves
4 System Model
4.1 Network Model
4.2 Energy Model
5 Proposed Model
6 Performance Evaluation
7 Conclusion
References
Network and Network Security
An Optimized Algorithm for Selecting Stable Multipath Routing in MANET Using Proficient Multipath Routing and Glowworm Detection Techniques
1 Introduction
2 Related Works
3 Research Methodology
3.1 Nodes Communicate in Multiple Paths
3.2 PMR Method
3.3 Algorithm for PMR Method
3.4 Glowworm Detection Node Algorithm
4 Performance Evaluation
4.1 Experimental Setup and Its Values
4.2 Result for Proposed Routing
4.3 Evaluation of PMGWD
5 Conclusion
References
A Framework to Restrict COVID-19 like Epidemic Converting to Pandemic Using Blockchain
1 Introduction
2 Challenges to Restrict the Spread of the Virus
3 Proposed Framework
3.1 System Design
3.2 Security and Privacy Issues
4 Further Adoption of Blockchain
4.1 Blockchain to Track People Within the Country
4.2 Blockchain to Combat the Fake News
5 Discussion
5.1 Restrict the Infection to the Epicentre C1
5.2 Restricting Spread Within the Countries C2
5.3 Social Networks and Misleading News Challenge Attempts to Respond to the Epidemic C3
6 Conclusion and Future Directions
References
Application of Blockchain in Different Segments of Supply Chain Management
1 Introduction
1.1 Blockchain
1.2 Principles of Blockchain
1.3 Types of Blockchain
1.4 Characteristics of Blockchain
1.5 Supply-Chain
2 Literature Review
3 Potential Segments in SCM that Can Be Transformed by Blockchain
3.1 Accurate Cost Information
3.2 Transaction Settlement
3.3 Audit Transparency
3.4 Improved Shipping Data
3.5 Inventory Management
3.6 Improved Purchasing and Planning Practices
3.7 Optimum Use of Logistics and Transportation
4 Risks Involved
5 Conclusion
References
Detection of DoS Attacks on Wi-Fi Networks Using IoT Sensors
1 Introduction
1.1 Deauthentication Attack
1.2 Beacon Frame Attack
1.3 Probe Request Attack
2 Related Works
2.1 Findings of the Literature Review
3 Proposed Scheme
4 Implementation and Analysis
5 Conclusion
References
DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks
1 Introduction
2 Review of Literature
3 Issues in WPA3 to Handle Evil Twin Attack
4 Detection and Prevention of Evil Twin Attack
4.1 Description of the Network Design Used for Evil Twin Attack
4.2 Detecting Evil Twin Attack Methodology Used by Attackers on Wi-Fi Networks
4.3 Analyzing the Evil Twin Attacks
4.4 Preventive Mechanisms
4.5 Suggested Parameters to Identify Evil Twin Attack
5 Summary
References
An Integrated Approach of 4G LTE and DSRC (IEEE 802.11p) for Internet of Vehicles (IoV) by Using a Novel Cluster-Based Efficient Radio Interface Selection Algorithm to Improve Vehicular Network (VN) Performance
1 Introduction
2 Literature Review
3 Proposed Approach
4 Results and Discussion
5 Conclusion
References
A Review on Synchronization and Localization of Devices in WSN
1 Introduction
2 Background
3 Applications of Wireless Sensor Networks
3.1 Application of Sensor Networks in Military Operations
3.2 Application of Sensor Networks in Environmental Monitoring and Emergency Services
3.3 Application of Sensor Networks in Agriculture
3.4 Application of Sensor Networks in Robotics
4 Challenges in Wireless Sensor Networks
4.1 Security Issues
4.2 Networking Issues
4.3 Synchronization and Localization Issues
5 Recent Research on Synchronization and Localization in Wireless Sensor Networks
5.1 Summary
6 Conclusion
References
Data Analysis, Education Technology, Operating System and Applications of Information Technologies
Volume Analytics for an International Berry Supplier
1 Introduction
2 Data Preparation
2.1 Data Description
2.2 Data Cleaning and Transformation
3 Modelling Approach
3.1 Model Selection
3.2 Model Creation and Evaluation
3.3 Feature Selection
4 Business Conclusion
5 Recommendation
5.1 Locations
5.2 Subsidiary
5.3 Time of the Year
5.4 Natural Phenomena
SCAAâSensitivity Context Aware AnonymizationâAn Automated Hybrid PPUDP Technique for Big Data
1 Introduction
2 Privacy Preserving Unstructured Data Publishing (PPUDP)
2.1 PPDP Approaches
3 Sensitivity Context Aware Anonymization (SCAA) for PPUDP
4 Results and Discussions
4.1 Backpropagation-based Quasi-Attribute Utility Enhancement for SCAA
5 Conclusion
References
Adopting Distance Learning Approaches to Deliver Online Creative Arts Education During the COVID-19 Pandemic
1 Introduction
2 Teaching and Learning Methods and Theoretical
2.1 Underpinnings Considered
3 Methodology
4 Discussion and Conclusion
References
A Survey of Deadlock Detection Algorithms
1 Introduction
2 Distributed Deadlock Detection Algorithms
2.1 Distributed Graph Algorithm Which Detects Local Cycles and Knots [5]
2.2 Communication Deadlock Detection Scheme [6]
2.3 Distributed Deadlock Detection and Resolution Algorithm [7]
2.4 Deadlock Resolution Algorithm for AND Model [8]
2.5 Priority-Based Probe Algorithm for Deadlock Detection and Resolution [9]
2.6 One-Phase Algorithm for Detection of Deadlocks in Replicated Databases [10]
3 Message Blocking and Deadlock Resolution in Interconnection Networks
3.1 Comparison with the Previous Algorithm
4 Deadlock Handling in Wormhole Networks
4.1 Comparison with the Previous Algorithm
5 Conclusion
References
A Survey on Privacy-Preserving Data Publishing Methods and Models in Relational Electronic Health Records
1 Introduction
2 Need for Big Data in Health Care
3 Security and Privacy
4 Privacy Threats in Data Publishing
4.1 Membership Disclosure
4.2 Identity Disclosure
4.3 Attribute Disclosure
5 Privacy-Preserving Methods
5.1 Generalization
5.2 Suppression
5.3 Pseudonymization
5.4 Bucketization
5.5 Slicing
6 Privacy Models
6.1 K-anonymity
6.2 L-diversity
6.3 T-closeness
6.4 Differential Privacy
6.5 Cryptographic Techniques
7 Inference and Future Directions
References
An Efficient Biometric Approach of the Attendance Monitoring System for Mahatma Gandhi National Rural Employment Guarantee Act (MGNREGA)
1 Introduction
2 Problem Statement
2.1 Propose System
2.2 Literature Survey
2.3 Technical Flow Diagram
2.4 Technical Flow Diagram Portrayal
3 Conclusions
References
đ SIMILAR VOLUMES
<span>This book comprises select proceedings of the International Conference on Advances in Electrical and Computer Technologies 2021 (ICAECT 2021). The papers presented in this book are peer-reviewed and cover the latest research in electrical, electronics, communication, and computer engineering.
<p><span>This book presents select proceedings of the International Conference on Science, Technology and Engineering (ICSTE 2023) related to electrical and electronic engineering. Various topics covered include neural network classification, text detection from natural scene images, speech processi
<p><span>This book presents select peer-reviewed proceedings of the International Conference on Advances in Renewable Energy and Electric Vehicles (AREEV 2022). The topics covered include renewable energy sources, electric vehicles, energy storage systems, power system protection & security, sma
<p><span>This volume presents select proceedings of the International Conference on Sustainable Advanced Computing (ICSAC â 2021). It covers the latest research on a wide range of topics spanning theory, systems, applications, and case studies in advanced computing. Topics covered are machine intell
<p><span>This book presents the select proceedings of the 7th National Conference on Advances in Metrology (AdMet 2021) organized by Maharaja Surajmal Institute of Technology, New Delhi, India. The main theme of the conference was "Sensors and Advance Materials for Measurement and Quality Improvemen