Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2020 (Algorithms for Intelligent Systems) 🔍
I. Jeena Jacob (editor), Selvanayaki Kolandapalayam Shanmugam (editor), Selwyn Piramuthu (editor), Przemyslaw Falkowski-Gilski (editor) Springer Nature Singapore Pte Ltd Fka Springer Science + Business Media Singapore Pte Ltd, 1st ed. 2021, 2021-01-09
英语 [en] · PDF · 39.2MB · 2021 · 📘 非小说类图书 · 🚀/lgli/lgrs/scihub/upload · Save
描述
This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2020), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during 8–9 July 2020. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.
备用文件名
lgli/P:\springer_dnd140621\springer\10.1007%2F978-981-15-8530-2.pdf
备用文件名
lgrsnf/4434.pdf
备用文件名
scihub/10.1007/978-981-15-8530-2.pdf
备选标题
496441_1_En_Print.indd
备选作者
I. Jeena Jacob, Selvanayaki Kolandapalayam Shanmugam, Selwyn Piramuthu, Przemyslaw Falkowski-Gilski, Robert Bestak
备选作者
I. Jeena Jacob,Selvanayaki Kolandapalayam Shanmugam,Selwyn Piramuthu,Przemyslaw Falkowski-Gilski (eds.)
备选作者
Jeena Jacob, I.; Kolandapalayam Shanmugam, Selvanayaki; Piramuthu, Selwyn; Falkowski-Gilski, Przemyslaw
备选作者
International Conference on Data Intelligence and Cognitive Informatics
备选作者
0014431
备用版本
Algorithms for intelligent systems, 1. ed. 2021, Gateway East, Singapore, 2021
备用版本
Singapore, Singapore
备用版本
uuuu
元数据中的注释
producers:
Acrobat Distiller 10.1.16 (Windows)
备用描述
Foreword
Preface
Acknowledgements
Contents
About the Editors
1 Text Generation and Enhanced Evaluation of Metric for Machine Translation
1 Introduction
2 System Overview
3 Neural Networks
3.1 Recurrent Neural Networks
3.2 Gated Recurrent Unit
4 Various Models of RNN
4.1 RNN as Generative Model
4.2 Natural Language Processing for Grammar Correction
4.3 RNN as Translation Model
5 Translation Assessment
5.1 Human Assessment
5.2 Automatic Assessment
6 Measuring of Automatic Assessment
6.1 BLEU Metric
7 Issues with BLEU
8 M-BLEU Module
9 Experiments
9.1 Text Generation and Grammar Correction of Generated Text
9.2 Text Translation and Modified BLEU Score for Translation Accuracy
9.3 Training Details
10 Results
10.1 Result of Text Generation Module
10.2 Result of Grammar Correction Module
10.3 Result of the Translation Module
10.4 Result of M-BLEU Module
10.5 Result of Translations System
11 Conclusion
References
2 Destress It—Detection and Analysis of Stress Levels
1 Problem Statement
2 Literature Survey
2.1 Paper [4]: Mental Stress Detection Based on Soft Computing Techniques
2.2 Paper [5]: Detection of Stress Using Image Processing and Machine Learning Techniques
2.3 Paper [6]: Stress Detection Through Speech Analysis
2.4 Paper [7]: Machine Learning to Differentiate Between Positive and Negative Emotions Using Pupil Diameter
2.5 Paper [8]: iCare-Stress: An Integrated Mental Health Software
2.6 Paper [9]: Machine Learning to Differentiate Between Positive and Negative Emotions Using Pupil Diameter
3 Dataset Description
3.1 Dataset for Stress Recognition Through Voice
3.2 Dataset for Emotion Recognition Through Facial Recognition
4 System Architecture and Implementation
4.1 Facial Emotion Recognition
4.2 Measurement of Pupil Dilation
4.3 Emotion Recognition Through Speech
4.4 Questionnaire
4.5 Recommendation System
5 Outcome
6 Conclusion
References
3 On the Design and Applications of an Integrated Smart Home Automation
1 Introduction
1.1 Smart Homes
1.2 Sustainable Development
1.3 Target Audience
2 Literature Review
2.1 Internet of Things [IoT]
2.2 Integrated Smart Systems
2.3 Security Concerns
2.4 Smart Metering
3 Proposed System
4 Methodology
4.1 Smart Security System
4.2 Temperature, Humidity, LPG and Smoke Controls
4.3 Device Management
4.4 Wi-Fi Integration
5 Results and Observations
5.1 Layered Security Model Prototype
5.2 Temperature, Humidity, LPG and Smoke Alarms
5.3 SMART Metering Prototype
5.4 Main Source
6 Discussion
7 Conclusion
References
4 Voice and Gesture Based App for Blind People
1 Introduction
2 Literature Survey
2.1 Speaking E-mail-Mobile Application
2.2 Be My Eyes: Helping the Blind Application
2.3 Eye-D for Visually Impaired
2.4 Visually Impaired
2.5 Envision AI
2.6 Google Assistant
3 System Architecture with Modular Description
3.1 Performing Gesture and Its Detection
3.2 Text-to-Speech Engine
3.3 Speech-to-Text Engine
4 Implementation Details
4.1 Read Aloud
4.2 Setting Gestures Dynamically
4.3 Adjust Reading Speed
4.4 Composing E-mails
4.5 Music
4.6 Clock
4.7 Emergency Service
4.8 Contacts Module
4.9 Nearby Places
5 Outcome
5.1 E-mail Module
5.2 Contacts Module
5.3 Emergency Services Module
5.4 Clock Module
5.5 Music Module
5.6 Nearby Places Module
6 Conclusion
References
5 Digital Image Forgery Detection Using Ternary Pattern and ELM
1 Introduction
2 Related Work
3 Proposed Work
3.1 Pre-processing
3.2 Feature Extraction
3.3 LTP
3.4 Classification Using ELM
4 Experimental Results and Discussions
5 Conclusion
References
6 A Study on Identification and Cleaning of Struck-Out Words in Handwritten Documents
1 Introduction
2 Literature Survey
3 Methodology
4 Conclusion and Future Scope
References
7 RFID-Based Railway Crowd Prediction and Revenue Analysis
1 Introduction
2 Literature Review
3 Proposed System
3.1 Working of the Proposed Architecture
4 Results and Discussion
4.1 Hardware Connections to Scan NFC Card
4.2 Depositing Data
4.3 Analysis of a Passenger’s Journey
4.4 Crowd Prediction
4.5 Analysis for a Particular Station
4.6 Prediction for a Particular Station
5 Conclusion and Future Scope
References
8 A Review on Efficient Scheduling Techniques for Cloud Computing
1 Introduction
2 Related Work
3 Categorization of Load Balancing Algorithms
3.1 Heuristic Scheduling Algorithm
3.2 Metaheuristic
4 Conclusion
Reference
9 A Synonym-Based Bi-LSTM Model for Machine Reading Comprehension
1 Introduction
2 Related Works
3 Dataset
4 Preprocessing
5 Model
5.1 Embedding Layer
5.2 Modeling Layer
5.3 Output Layer
6 Experiments and Results
7 Conclusions
References
10 Designing of Arbiter PUF for Securing IP and IoT Devices
1 Introduction
2 Typical Arbiter PUF
3 XOR Arbiter PUF
4 Feed Forward Arbiter PUF
5 Results
6 Conclusion
References
11 Enhancements on the Efficacy of Firefighting Robots Through Team Allocation and Path-Planning
1 Introduction
2 Literature Review
3 Methodology
3.1 Algorithm to Find the Minimum Distance the Robot Should Maintain from the Fire
3.2 Probabilistic Roadmaps
3.3 Algorithm for Team Allocation
4 Results
4.1 Algorithm to Find the Minimum Distance the Robot Should Maintain from Fire
4.2 Probabilistic Roadmaps
4.3 Algorithm to Allocate Robots into Teams
4.4 Performance Analysis of Proposed Model Against Existing Approaches
5 Conclusion
6 Future Scope
References
12 Smart Meter Using Raspberry Pi for Efficient Energy Utilization
1 Introduction
2 Conventional System
3 Proposed System
4 System Architecture
5 Software Implementation
5.1 Programming Languages in Raspberry
5.2 Programming Using Python
5.3 Thonny
5.4 Operating System Used in the Project
5.5 Interfacing Raspberry Pi with Gsm Modem
6 Hardware Implementation
6.1 Processor Used in the project — Raspberry Pi
6.2 GSM Modem
6.3 RS-232 Communication (UART)
6.4 Relay Module
7 Results
8 Conclusion and Future Scope
References
13 An Unsupervised Content-Based Article Recommendation System Using Natural Language Processing
1 Introduction
2 Background Study
3 Methodology
3.1 Data Collection
3.2 Text Cleaning and Preprocessing
3.3 Keyword Generation
3.4 TF-IDF Word Vectorization
3.5 Dimensionality Reduction Using TruncatedSVD
3.6 Approaches
4 Results and Discussion
4.1 Results of Cosine Similarity-Based Model
4.2 Results of KMeans
4.3 Results of Agglomerative
4.4 Performance Evaluation of Approaches
5 Conclusion
References
14 A Survey of the Exemplary Practices in Network Operations and Management
1 Introduction
2 Literature Survey
3 Network Operations Center
3.1 Security Operations Center
3.2 Technical Support—Tier 1
3.3 Network Operations
3.4 Network Engineering
4 Network Management
4.1 Simple Network Management Protocol (SNMP)
4.2 TELecommunication NETwork (Telnet)
4.3 Secure Shell (SSH)
4.4 Terminal Access Controller Access Control System (TACACS)
5 Algorithm
6 Result and Discussion
7 Conclusion
References
15 Utilization of Fish Excrete for Plant Growth Using SVM
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Image Acquisition
3.2 Image Preprocessing
3.3 Image Segmentation
3.4 Feature Extraction
3.5 SVM Classifier
3.6 Irrigation Process
4 Flowchart
5 Results and Discussions
6 Conclusion
References
16 A Novel Approach of Resource Scheduling Algorithm to Improve QoS in Green Cloud Computing
1 Introduction
2 Related Reviews
3 Proposed Work
3.1 Green Resource Usage Distributor Scheduling (GRUD-S) Algorithm
4 Methodology
4.1 Resource Scheduling
4.2 GRUD-S ALGORITHM
5 Experimental Setup and Evaluation
6 Conclusion
References
17 Machine Learning Approach for Analysis of the Company Performance Based on Fundamental Data
1 Introduction
2 Methodology
2.1 Selection K Best Algorithm
2.2 Random Forest Classification
2.3 Linear Regression for Cumulative Grading
2.4 Multiple Linear Regression for Attractiveness Score
3 Implementation
4 Results
5 Conclusion
6 Future Work
References
18 Evaluation of Deep Learning Models in the Prediction of Lung Disease(Pneumonia)
1 Introduction
2 Review of Literature
3 Working Methodology
3.1 Introduction to Transfer Learning
3.2 Datasets
3.3 Proposed System Methodology
4 Experiments and Results
4.1 Implementation
4.2 Results
5 Discussion
6 Conclusion
References
19 An Automated Invoice Handling Method Using OCR
1 Introduction
2 Literature Survey
3 Proposed System
4 Results and Discussion
4.1 Dataset
4.2 Performance Analysis
5 Conclusion
References
20 Performance Evaluation of Clustering-Based Classification Algorithms for Detection of Online Spam Reviews
1 Introduction
2 Background Study
3 Clustering-Based Classification
4 Methodology
4.1 Dataset Preparation
4.2 Feature Engineering
4.3 Model Training
4.4 Dataset Used
4.5 Metrics and Evaluation
5 Results and Discussions
6 Conclusion and Future Work
References
21 Product Recommendation Systems Based on Customer Reviews Using Machine Learning Techniques
1 Introduction
2 Existing Work
3 Description of the Proposed Work
4 Data Pre-processing and Analysis
5 Text Pre-processing
5.1 Removing Punctuations and HTML Tags
5.2 Stopwords Removal
5.3 Stemming
5.4 Lemmatization
5.5 Sentimental Analysis
6 Vectorization Process
6.1 Count Vectorizer
6.2 TF-IDF Vectorizer
7 Implementation and Tested Environment
7.1 Naive Bayes Algorithm
7.2 Logistic Regression
7.3 Support Vector Machine (SVM)
8 Experimental Setup
9 Results and Performance Validation
9.1 Classification Report
9.2 Accuracy
9.3 Precision
9.4 Recall
9.5 F1-Score
9.6 Confusion Matrix
10 Conclusion
References
22 Mobile Application for Classification of Plant Leaf Diseases Using Image Processing and Neural Networks
1 Introduction
2 Literature Survey
3 Plant Diseases
4 Methodology
4.1 Image Preprocessing
4.2 Image Segmentation
4.3 Feature Extraction
4.4 Classification
5 Python App Development
5.1 Android Application
5.2 Client–Server Model
6 Results
7 Conclusion and Future Work
References
23 Energy-Efficient System-Based Algorithm for Maximal Resource Utilization in Cloud Computing
1 Introduction
2 Related Work
3 Services of Cloud Computing
4 Proposed Algorithm
5 Algorithm Performance Result
6 Conclusion
References
24 Energy Enhancement of WSN Using Fuzzy C-Means Clustering Algorithm
1 Introduction
2 System Model
3 Energy Computation and Utilization
4 Proposed Algorithm
5 Simulation and Result
6 Conclusion
References
25 Optimization of Queries in Database of Cloud Computing
1 Introduction
2 Literature Survey
2.1 Operating Models
2.2 Database Management System
3 Proposed Approach
3.1 Creating a Table
3.2 Insertion of an Element onto a Table
3.3 Updating the Database
3.4 Developing New Table
4 Simulation Results
5 Conclusion
References
26 Low-Cost IoT-Enabled Smart Parking System in Crowded Cities
1 Introduction
2 Related Works
3 Proposed Solution
4 Result and Discussion
5 Conclusion
References
27 A Critical Review on Educational Data Mining Segment: A New Perspective
1 Introduction
2 Literature Review
3 Data Mining: A New Perspective
4 Research Issues
5 Research Enlightenment
6 Conclusion
References
28 Exploration and Visualization of the Hidden Information from the Congestive Heart Failure Patients Data in MIMIC-III Database
1 Introduction
2 Related Works
3 Method
3.1 Study Design
3.2 Study Population
3.3 Study Variables
3.4 Exploration and Visualization of Data
4 Results and Discussions
4.1 Patient’s Demographic Data Analysis
4.2 Gender
4.3 Age
4.4 Marital Status
4.5 Religion
4.6 Ethnicity
4.7 DiagnosisICD
4.8 Prescriptions
4.9 Exploration of Time Series Data
5 Conclusion
6 Future Work
References
29 Neuromemorize—Mobile Application for Alzheimer’s Patients Using AI-Based Face Recognition
1 Introduction
2 Literature Survey
2.1 Technologies for People with Alzheimer’s
2.2 Mobile Applications for Alzheimer’s
2.3 Observations on Existing Systems
3 System Architecture and Implementation
3.1 Authentication and Linking Module
3.2 Photo Sharing Module
3.3 Location Tracking Module
3.4 Reminders Module
3.5 Picture-Based Phonebook
3.6 Face Recognition Module
4 Results
5 Conclusion and Future Scope
References
30 Brain Tumor Classification Using PCA and PNN of T1 and T2 Weighted MRI Images
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 Feature Extraction Using PCA with DWT and GLCM
3.2 Classification Using PNN
4 MATLAB Implementation
5 Results and Discussion
6 Conclusion
References
31 Workload-Driven Transactional Partitioning for Distributed Databases
1 Introduction
1.1 Horizontal Partitioning
1.2 Vertical Partitioning
1.3 Hybrid Partitioning
2 Related Work
2.1 Random Approach
2.2 Transaction Approach
2.3 Cloud-Based Approach
3 System Model
4 Implementation
5 Result
6 Conclusion and Future Work
References
32 Start-Up Leagility Assessment Using Multi-grade Fuzzy and Importance Performance Analysis
1 Introduction
2 Literature Review
3 Conceptual Model for Assessing Start-Up Agility
4 Research Methodology
5 Case Study
5.1 About Case Company
5.2 Leagility Assessment Using Fuzzy Logic
5.3 Classification of Leagile Attributes Based on IPA
6 Results and Discussions
6.1 Improvement Proposal for the Weaker Attributes
7 Managerial Implications
8 Conclusion
References
33 Assessment of Leagility in Healthcare Organization Using Multi-grade Fuzzy Approach
1 Introduction
2 Literature Reviews
3 Research Methodology
3.1 Multi-grade Fuzzy
3.2 Importance-Performance Analysis (IPA)
4 Case Dispensary
4.1 Primary Assessment Calculation
4.2 Secondary Assessment Calculation
4.3 Tertiary Assessment Calculation
4.4 IPA
5 Results and Discussions
6 Practical Implications
7 Conclusion
References
34 A Unified Model for Face Detection Using Multiple Task Cascaded Neural Network Prepended with Non-local Mean Denoising Algorithm
1 Introduction
2 Literature Survey
3 Proposed Model
4 Experimental Setup and Results
5 Conclusion
References
35 Workplace Stress Assessment of Software Employees Using Multi-grade Fuzzy and Importance Performance Analysis
1 Introduction
2 Literature Review
3 Conceptual Model for Assessing Stress Level in the Work Place
4 Case Study
4.1 Stress Assessment Using Multi-Grade Fuzzy
4.2 Classification of Stress Assessment Attributes Using IPA
5 Results and Discussions
5.1 Improvement Proposal for Weaker Attributes
6 Conclusion
References
36 Early Detection of Mild Cognitive Impairment Using 3D Wavelet Transform
1 Introduction
2 Related Work
3 System Architecture and Methodology
4 Implementation and Results
4.1 Model Fitting
4.2 Results
5 Conclusion
References
37 Spatial Data Mining of Agricultural Land Area Using Multi-spectral Remote-Sensed Images
1 Introduction
2 Literature Review
3 Study Area
4 Data Used
5 Proposed Methodology and Experimentation
5.1 LISS-IV and Landsat-8 Dataset Pre-processing
5.2 Experimentation
6 Results and Interpretation
7 Conclusions and Future Scope
References
38 Person Identification Using Histogram of Gradient and Support Vector Machine on GEI
1 Introduction
2 Background and Related Work
3 Overview of the Proposed Method
3.1 Gait Cycle Identification
3.2 Histogram of Oriented Gradient
3.3 Support Vector Machine
4 Implementation
5 Conclusion
References
39 Inventory Optimization for Cognitive Demand Scheduler Using Data Analytics
1 Introduction
1.1 What is Cognitive Demand Planner or Scheduler?
1.2 Role of Inventory Management in the CDS
1.3 Role of Data Analytics in Inventory Optimization
1.4 Different Stages Involved in the Procurement of Material in an Inventory
2 Literature Review
2.1 Summary Table for the Survey Conducted in Relation to Identifying KPIs and Use of Data Visualization Tools in Different Organizations
3 Proposed Architecture Diagram
4 Methodology for Optimizing Inventory Using Data Analytics
4.1 Descriptive Analysis of APO Data
4.2 Identify Key Performance Indicators and Visualizing It on the Dashboard
4.3 Prediction of Stock Consumption and Estimated Time of Arrival of Stock Using a Machine Learning Algorithm
5 Results
5.1 Descriptive Analysis of APO Data
5.2 Dashboard for KPI Visualization
5.3 Accuracy Table for Stock Consumption and Lead Time Prediction Using a Machine Learning Algorithm
6 Conclusion
7 Future Scope
References
40 DRIVE SAFE: Lane Deviation Detection and Alert System Using Image Processing Techniques
1 Introduction
2 Related Work
2.1 RANSAC Technique [4]
2.2 Vanishing Point [7]
2.3 River Flow Model [8]
2.4 Active Line Model [9]
3 Methodology
3.1 Data Collection
3.2 Preprocessing
3.3 Perspective Warp
3.4 Sobel Edge Detection
3.5 Sliding Window Protocol [14]
3.6 Curve Fitting
3.7 Alert
4 Hardware and Software Setup with Alert Module
5 Result and Analysis
6 Conclusion and Future Scope
References
41 Foodborne Illness Investigation Technique Using Machine Learning
1 Introduction
1.1 Machine Learning Techniques
2 Related Works
3 Problem Statement
4 Present Investigation
4.1 Stages of Supervised Learning of Data Analysis for Foodborne Illness
4.2 Supervised Algorithms Used
5 Proposed Solution
5.1 Experimental Setup
5.2 Procedure and Techniques
6 Discussions
7 Summary and Conclusions
8 Future Scopes
References
42 A Primer on Word Embedding
1 Introduction
2 Word Embedding and Its Need
3 Count Vectorization
4 TF–IDF Vectorization
5 Co-occurrence Vectorization
6 Continuous Bag-of-Words (CBOW) Model
7 Skip-Gram Model
8 Word2Vec
9 GloVe
10 fastText
11 Poincare Embeddings
12 ELMo
13 Probabilistic fastText
14 Creating Own Embeddings
15 Conclusion
References
43 Automatic Cataract Detection Using Haar Cascade Classifier
1 Introduction
2 Related Work
3 Data Augmentatıon Usıng Augmentor
4 Create Haar Cascade Fıle Usıng OpenCV and Python
4.1 Haar Cascade Model
5 Train Haar Cascade File
5.1 Negative Samples
5.2 Positive Samples
5.3 Cascade Trainer GUI
6 Detection Using Cascade Classifier
7 Results
8 Conclusion and Future Scope
References
44 VG2—DNA-Based One-Time Pad Image Cipher
1 Introduction
2 Biological Background
3 One-Time Pads (OTP)
4 Symmetric Encryption
5 Proposed DNA Encryption Algorithm
5.1 Message Encryption
5.2 Message Recovery
6 Experimental Results
7 Performance Evaluation
7.1 Security Analysis
7.2 Timing Analysis
8 Conclusion
References
45 Hand Gesture Recognition Control for Computers Using Arduino
1 Introduction
2 Related Work
3 Proposed Work
4 Background
4.1 Arduino Uno
4.2 Ultrasonic Sensor
4.3 PyAutoGUI
4.4 PySerial
5 Methodology
5.1 Input
5.2 Reception of Input
5.3 Functions of Arduino
5.4 PyAutoGUI Function and Output
6 Results
6.1 Controlling the Video
6.2 Controlling Web Browser
7 Conclusıon
References
46 Infrared Small Target Detection Based on Fractional Directional Derivative and Phase Fourier Spectrum Transform
1 Introduction
2 Methodology
2.1 Fractional Directional Derivative
2.2 Phase Fourier Transform
2.3 Approach to Infrared Target Detection Based on Fractional Directional Derivative Mask
3 Experimental Result and Analysis
3.1 Background Suppression Result of Image Sequences
3.2 Comparison with the Baseline Methods
4 Conclusion
References
47 Detection of Pre-term Delivery by the Analysis of Fetal ECG Signals
1 Introduction
2 Methodology
2.1 Data Chosen for Analysis/Screening
2.2 Methods Employed in Analysis of Pre-processed FECG Signals
2.3 Compilation of Obtained Values
3 Results and Discussion
3.1 Illustration
3.2 Classification
3.3 Quantitative Analysis
4 Conclusion
References
48 Sentiment Analysis of Twitter Data Using Techniques in Deep Learning
1 Introduction
2 Existing System
3 Proposed System
3.1 Recurrent Neural Network (RNN)
3.2 Long Short-Term Memory LSTM
3.3 Implementation of the Proposed Methodology
3.4 Algorithm
4 Results and Discussion
5 Conclusion
References
49 Part-of-Speech Tagging in Mizo Language: A Preliminary Study
1 Introduction
2 Related Works
3 General Methodology of POS Tagging
3.1 Tokenization
3.2 Designing a Tagset
3.3 Building the Corpus or Dataset
3.4 Developing the Tagger
4 Discussion on Some Unique Features of Mizo Language
5 General Part of Speech in Mizo Language
6 Proposed POS Tagsets for Mizo Language
7 Conclusion and Future Works
References
50 Phishing Website Prediction: A Comparison of Machine Learning Techniques
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset Analysis
3.2 Machine Learning Classifiers Used
4 Results and Discussion
5 Conclusion
References
51 Comparison of Computer Vision Techniques for Drowsiness Detection While Driving
1 Introduction
1.1 Objective
2 Related Work
3 Proposed Methodology
3.1 Approach-1. ( Dlib + EAR)
3.2 Approach 2: (Haar-Cascade + CNN)
3.3 Comparison Scenario
4 Implementation and Results
4.1 Results for Dlib (Approach-1) and Haar-Cascade (Approach-2).
5 Observation from the Results and Above Table:
5.1 Following Are the Results for EAR (Approach-1) and CNN (Approach-2)
5.2 Following Are the Examples of the Output of Eye Aspect Ratio (Approach 1):
5.3 Following Are the Examples of the Output of Haar-Cascade (Approach 2):
5.4 Observation from the Results and Above Table:
6 Conclusion
References
52 Machine-Learning Based Fault Diagnosis of Electrical Motors Using Acoustic Signals
1 Introduction
2 Proposed Approach
3 Machine Learning Models
4 Results and Discussion
5 Conclusion
References
53 Study of Users Attitude and Classification of Comments and Likes from Facebook Using RapidMiner
1 Introduction
2 Literature Review
3 Methodology
4 Investigations and Performance Inspection
5 Conclusion and Future Work
References
54 Novel State Disturbance Based Multi-level Inverter with Sliding Mode Control
1 Introduction
2 Concept of Proposed System
2.1 Simulation Results
3 Conclusion and Future Scope
References
55 Survey on Graphical Password Authentication System
1 Introduction
2 Overview of the Authentication Methods
3 Related Work
3.1 Recall-Based Techniques
3.2 Recognition-Based Technique
4 Comparison Between Different Authentication Systems
5 Various Types of Attack Techniques
6 Advantage and Disadvantage of Various Graphical Password Authentication Systems
7 Conclusion
References
56 Predictive Analysis for Early Detection of Alzheimer's Disease
1 Introduction
2 Related Works
3 Software and Materials Requirement
4 Proposed Work
5 Implementation
5.1 Data Acquisition
5.2 Details of Dataset
5.3 Segmentation
5.4 Feature Extraction and Reduction
5.5 Biomarker and Clinical Data
5.6 Classification
6 Results
6.1 Comparison of Accuracy
6.2 Comparison of Other Performance Metrics
6.3 Statistical Plot of Predictive Analysis
7 Conclusion and Future Scope
References
57 Feature Extraction from Ensemble of Deep CNN Model for Image Retrieval Application
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 CBIR Using Handcrafted Features
3.2 CBIR Using Features from Pre-trained Deep CNN
3.3 Proposed CBIR Using Features from Ensemble of Deep CNN
3.4 Implementation
4 Experimental Work
4.1 Image Retrieval Using Handcrafted Features
4.2 Image Retrieval Using Features Extracted from a Pre-trained Deep CNN Model
4.3 Image Retrieval Using Proposed CBIR Method
5 Results and Discussion
6 Conclusion
References
58 Performance Analysis on Machine Learning Algorithms with Deep Learning Model for Crop Yield Prediction
1 Introduction
2 Literature Survey
3 Methodology
3.1 Data Gathering
3.2 Data Visualization
3.3 Data Preprocessing
3.4 Train and Test the Model
3.5 User Interface to Predict in Real-Time
4 Experimental Results
4.1 Metrics for Evaluation
4.2 Results
5 Conclusion
6 Future Work
References
59 A Novel Hybrid Cipher Using Cipher Squares for Better Security
1 Introduction
2 Literature Survey
2.1 Hybrid Ciphers
2.2 Dynamic Key Generation
2.3 Zigzag Cipher
3 Proposed Algorithm
3.1 Encryption Algorithm
3.2 Decryption Algorithm
3.3 Example
3.4 Comparative Analysis of the Distribution of the Letters in the Example Ciphertext with Existing Cipher Techniques—Caesar and Rail-Fence Ciphertexts
4 Conclusion
References
60 A Review on Dynamic Virtual Machine Consolidation Approaches for Energy-Efficient Cloud Data Centers
1 Introduction
2 Background Study
2.1 Review of Conventional Methods for Energy-Efficient Dynamic Consolidation in Data Centers
2.2 Review of Heuristic and Metaheuristic Methods for Energy-Efficient Dynamic Consolidation in Data Centers
2.3 Review of Linear Programming Approaches for Energy-Efficient Dynamic Consolidation in Data Centers
2.4 Review of Machine Learning Methods for Energy-Efficient Dynamic Consolidation in Data Centers
3 Issues from Existing Methods
4 Conclusion and Future Work
References
61 A Secure Video Steganography Using Framelet Transform and Singular Value Decomposition
1 Introduction
2 Proposed Method
2.1 Detecting changes in a scene
2.2 Transformation from RGB to Uncorrelated Color Space (UCS) HSV
2.3 Encryption of secret data
2.4 Data Embedding
2.5 Process of extraction
3 Experimental Results
4 Conclusion
References
62 Collective State Implementation on Particle Swarm Opimization for Feature Selection
1 Introduction
2 Original Binary Particle Swarm
2.1 Existing Work
3 Collective State Impact
3.1 Literature Study
3.2 Collective State Implementation—Binary Particle Swarm Optimization
4 Results
4.1 Parameter Setting
4.2 Experiment Results
5 Conclusion and Future Work
References
63 Enhanced Dragonfly Algorithm Adapted for Wireless Sensor Network Lifetime Optimization
1 Introduction
2 Swarm Algorithms Applications for WSN Domain Review
3 Clustering Problem Model Formulation
4 Original and Enhanced Dragonfly Algorithm
4.1 Proposed Enhanced Dragonfly Algorithm
5 Simulations and Discussion
6 Conclusion
References
64 Detection of Pneumonia Clouds From Chest X-ray Images
1 Introduction
1.1 Methodology
1.2 Pre-processing
1.3 Segmentation
1.4 Feature Extraction and Feature Reduction
1.5 Classification
2 Results and Discussion
3 Conclusion
References
65 Effectiveness of Blockchain Advancement in Patient Statistical Monitoring Network
1 Introduction
2 Blockchain Framework for Health Care
3 Ledgers
4 Digital Contracts
5 Existing Security System
6 Proposed System
7 Result
8 Conclusion
References
66 Generation of Alternative Clusterings Using Multi-objective Particle Swarm Optimization
1 Introduction
2 Related Work
3 Objective Function for Alternative Clustering
3.1 Internal Evaluation Measures
3.2 External Evaluation Measures
4 Designing the Objective Function
5 Proposed Method
6 Results and Discussion
7 Conclusion
References
67 Region of Interest-Based Encryption of Biomedical Image
1 Introduction
2 Related Works
3 Methodology
3.1 Extraction of ROI
3.2 Otsu Thresholding
3.3 Contours
4 Results and Discussion
5 Conclusion
References
68 Implementation of Production Planning Using Overall Equipment Efficiency (OEE) for IIoT
1 Introduction
1.1 Availability
1.2 Performance
1.3 Quality
1.4 Overall Equipment Efficiency
2 Purpose of OEE
3 Six Major Equipment Losses Calculation
4 Enterprise Benefits
4.1 Reduced Downtime Costs
4.2 Reduced Repair Costs
4.3 Increased Labor Efficiencies
4.4 Reduced Quality Costs
4.5 Increased Personnel Productivity
4.6 Increased Production Capability
4.7 Conclusion
References
69 Counting and Tracking of Vehicles and Pedestrians in Real Time Using You Only Look Once V3
1 Introduction
2 Literature Review
2.1 Object Detection Algorithms
2.2 Correlation Filter Tracker
3 Proposed System
3.1 Object Detection
3.2 Video Analysis
4 Dependencies
5 Experimental Setup
6 Results
6.1 YOLO Object Detection
6.2 Real-Time People Counter
7 Conclusion
References
70 Comprehensive Analysis of Multimodal Recommender Systems
1 Introduction
2 Recommender Systems
3 Multimodality
4 Literature Review
4.1 Modality-Based Analysis
4.2 Application-Based Analysis
4.3 Technique-Based Analysis
4.4 Modality- and Application-Based Analysis
4.5 Application- and Technique-Based Analysis
5 Conclusions
References
71 All-Zero Pre-processing Over ISI Channels: A Methodology for TCM Schemes
1 Introduction
2 Review on the Previous Work
3 Transmission on AWGN Channel
4 Bandlimited ISI Channel
5 Description of TCM Schemes
6 Selection of Subset
7 Optimal Decoding Algorithm for TCM
8 Suboptimal Decoding
9 All-Zero Pre-processing Sequence Estimation
10 Results
11 Conclusion
References
72 New Technical Using Nano in Medical Field to Determine Medications that are Suitable Activities for COVID-19
1 Introduction
2 Definitions and Notations
References
73 Usability Evaluation of Virtual Reality-Based Fire Training Simulator Using a Combined AHP and Fuzzy Comprehensive Evaluation Approach
1 Introduction
2 Literature Survey
3 Research Methodology
3.1 Participants
3.2 Experiment Description
3.3 Framework for VE Usability Evaluation
3.4 Evaluation Index System
4 Results
5 Conclusions
References
74 Study the Basic Survey of Food Quality Parameter Analysis Technique Using Image Development Methodology
1 Introduction
2 Objectıve
3 Need of Project
4 Food Quality Management
5 Proposed Work
6 Proposed System
7 Description of Components
8 Conclusion
9 Future Scope
References
Author Index
开源日期
2021-10-10
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。