Automation and Computation

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The proceedings of the International Conference on Automation and Computation 2022 (AUTOCOM-22) consist of complete research articles that were presented at the conference. Each of the research articles was double-blind reviewed by the experts of the corresponding domain. The book contains a blend of problems and respective solutions related to computer-based automation & computation to highlight the recent technological developments in computer-based automation. It serves as an environment for researchers to showcase the latest research results on Data Science & Engineering, Computing Technologies, Computational Intelligence, Communication & Networking, Signal & Image Processing, Intelligent Control Systems & Optimization, Robotics and Automation, Power, Energy & Power Electronics, Healthcare & Computation, AI for human interaction, etc. It aims to give deep insight into the current trends of research in science and technology and shall introduce the reader to the new problems and respective approaches toward the solution and shall enlighten the researchers, students and academicians about the research being carried out in the field.

Author(s): Satvik Vats, Vikrant Sharma, Karan Singh, Amit Gupta, Dibyahash Bordoloi, Navin Garg
Publisher: CRC Press/Balkema
Year: 2023

Language: English
Pages: 508
City: London

Cover
Title Page
Copyright Page
Preface
Committee Members
Heart disease detection using feature optimization and classification
1 Introduction
2 Literature Reviewed
3 Materials and Methodology
4 Results and Discussion
5 Conclusion and Future Scope
References
Mathematical modelling of tuberculosis and COVID-19 with saturated incidence rate
1 Introduction
2 Mathematical Model
3 Positivity and Boundedness of the Model
4 Existence of Equilibrium Points
5 Disease-Free Equilibrium (DFE) and Basic Reproduction Number
6 Stability Analysis
6.1 Local stability of disease-free equilibrium point
6.2 Local stability of endemic equilibrium point
7 Numerical Simulation of the Model
8 Conclusion
References
Feature generation techniques for suicidal ideation detection from social media texts
1 Introduction
2 Related Work
3 Fetaure Generation For SI
3.1 Content features
3.2 Context features
4 Results
5 Novelty
6 Conclusion
References
A mathematical computation of LEACH and PEGASIS on the basis of energy consumed and overall time period in WSN
1 Introduction
2 Literature Review/Related Work
3 Routing Algorithms
3.1 LEACH (Low Energy Adaptive Clustering Hierarchy)
3.2 PEGASIS (Power Efficient Gathering in Sensor Information System)
4 Implementation of Algorithms
4.1 Energy model
4.2 Simulation
4.3 Observations
4.4 Results
5 Conclusion
References
Anomaly detection in wireless sensor network using Generative Adversarial Network (GAN)
1 Introduction
2 Generative Adversarial Network (GAN)
3 GANs for Anomaly Detection
4 Conclusion
References
Novel node deployment strategies for wireless sensor networks
1 Introduction
2 Literature Review
3 Theoretical Modelling for Specific sensor Node Deployments
3.1 Triangular sensor node deployment
3.2 Square sensor node deployment
3.3 Sensor nodes estimation
4 Results and Discussion
5 Conclusion and Future Scope
References
Fog-based IoT-enabled system security: A survey
1 Introduction
2 Related Work
3 Issues of Internet of Things in 21st Century
4 Classification of Internet of Things Architecture
5 Security Challenges and Solutions
6 DDoS Attacks Classification on Fog-based IoT
7 Conclusion
References
Experimental assessment of flicker in commercially available white-LED indoor luminaires
1 Introduction
2 Experimental Testing and Measurement
3 Obtained Results and Analysis
3.1 Rated condition
3.2 Dimmed condition
4 Conclusions
5 Future scope
References
Cognitive intelligence-based model for health insurance premium estimation
1 Introduction
2 Related Work
3 Framework
3.1 Dataset
3.2 Using a correlation matrix and feature engineering
3.2.1 Feature selection and extraction
4 Results and Discussion
4.1 Age vs. charges
4.2 Region vs. charges
4.3 Costs vs. body mass index
4.4 Smoker count
4.5 Sex vs. charges
4.6 Performance of ML algorithm
5 Conclusion
References
An empirical study on the implications of Artificial Intelligence (AI) in hotels of Uttarakhand
1 Introduction
2 Literature Review
2.1 In-person customer service
2.2 Chatbots and messaging
2.3 Business Intelligence tools powered by Machine Learning
2.4 Virtual reality and augmented reality
3 Findings
4 Methodology
5 Results and Discussion
5.1 Knowledge regarding the implication of AI
5.1.1 Technological understanding of AI among respondents
5.2 Implementation of AI in the hotel sector
5.3 Supporting hotels through AI solutions
6 Conclusions
References
The study of grid-connected induction generators applicable to wind power
1 Introduction
1.1 Statistics
2 An Indian Perspective on Wind Energy
3 Induction Generator
3.1 Principle of operation
3.2 Induction generator with grid connection
3.3 Wind turbine generator with a fixed speed
3.4 Doubly Fed Induction Generator (DFIG)
3.5 Induction generator mathematical modeling
3.6 DFIG in a synchronously rotating frame model
4 Simulations and Results
5 Conclusion
References
An image encryption and decryption process using singular value decomposition
1 Introduction
1.1 Singular value decomposition
2 The Proposed Method
2.1 The encryption procedure
2.2 The decryption procedure
3 Conclusion
References
A survey: Smart healthcare monitoring system using IOT and ML techniques
1 Introduction
2 IOT Architecture For Disease Detection
3 Machine Learning
4 Health State Prediction Using Machine Learning Algorithm
4.1 Support vector machine
4.2 Logistic regression
4.3 K Nearest Neighbor (K-NN) classifier
5 Methodology
6 Review System Workflow
7 Conclusion
References
Correlation feature selection based BFTree framework for diagnosing Chronic Obstructive Pulmonary Disease severity grade
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Dataset description
3.2 Pre-processing
3.3 Feature selection
3.4 Supervised classifiers
4 Results and Discussion
5 Conclusion
References
Analysis of traditional businesses in the Himalayan state using unsupervised learning
1 Introduction
2 Methodology
3 Descriptive Statistics
4 Clustering Patterns and Analysis
5 Discussion and Conclusion
References
Intrusion detection and plant health monitoring smart system
1 Introduction
2 Related Work
2.1 AID: A Prototype for Agricultural Intrusion Detection Using Wireless Sensor Network
2.2 Smart intrusion detection system for crop protection
2.3 Plant health monitoring system using image processing
3 Methodology
4 Working Algorithm
5 Conclusion
References
Mathematical model for chilled food with temperature dependent deterioration rate
1 Introduction
2 Assumptions
3 Notations
4 Mathematical Formulation
5 Numerical Example
6 Sensitivity Analysis
7 Conclusion
References
A review on lung disease diagnosis using machine learning
1 Introduction
2 Related Works
3 Conclusion
References
Smart helmet: An innovative solution for timely aid and women safety
1 Introduction
2 Hardware Specifications
2.1 Raspberry-pi
2.2 Voice recognition module
2.3 Force sensor
2.4 Battery
3 Physical Structure and Hardware Assembly
4 Methodology
4.1 Force sensor
4.2 Voice recognition module
4.3 Raspberry-pi
4.4 LED indicators
4.5 SMTP
5 Working Algorithm
6 Experimental Result
7 Conclusions
References
Computational techniques to recognize Indian stone inscriptions and manuscripts: A review
1 Introduction
2 Ancient Indian Scripts
2.1 Challenges in identifying Ancient Indian script
3 Optical Character Recognition
4 Survey in Ancient Script Recognition
5 Conclusion
References
A review of Keras' deep learning models in predicting COVID-19 through chest X-rays
1 Introduction
2 Literature Review
3 Methods Used
3.1 Models used
3.2 Dataset
3.3 Workflow and equations
4 Results and Discussion
5 Conclusion
References
Encryption and decryption technique in optically transformed color images
1 Introduction
1.1 Digital image security
1.2 Digital image
1.3 Types of an image
1.4 Encryption of digital images
2 Related Work
3 Proposed Methodology
3.1 Data pre-processing
3.2 Image encryption procedure
3.3 Image decryption procedure
4 Result and Analysis
4.1 Image encoding and decoding
4.2 Mean Squared Error
4.3 Peak to Signal Ratio (PSNR)
5 Conclusion
References
Recent innovations in building smart irrigation systems
1 Introduction
2 Literature Review
3 Types of Irrigation Systems
3.1 Flood irrigation system
3.2 Drip irrigation system
3.3 Micro irrigation system
3.4 Sprinkler irrigation system
4 Architecture for Smart Irrigation System
4.1 Data collection
4.2 Weather data collection
4.3 Soil moisture prediction algorithm
4.4 Water motor control
4.5 Real-time monitoring interface
4.6 IoT sanctioned water pump
5 Recent Innovations in Smart Irrigation
5.1 IoT-based solar energy-based irrigation system
5.2 IoT-based sensor water system
5.3 Weather monitoring system
5.4 Integrated mobile and IoT monitoring system
5.5 IoT and LoRaWAN technologies for irrigation system
5.6 Prototype design model of the irrigation controller
6 Conclusion
References
Performance evaluation of pre-trained models on Tuberculosis dataset
1 Introduction
2 Literature Review
3 Methodology
4 Dataset
5 Model Evaluation
6 Observation
7 Conclusion and Future Scope
References
URL-based technique to detect phishing websites
1 Introduction
2 Types of Phishing
2.1 Social engineering
2.1.1 Deceptive phishing
2.1.2 Fake website phishing
2.1.3 Email spoofing
2.2 Technical subterfuge
2.2.1 Cross-Site Scripting (XSS)
2.2.2 Session hijacking
2.2.3 Malware phishing
2.2.4 DNS poisoning
2.2.5 Key/screen loggers
3 Proposed Work
3.1 Phishing detection algorithm
4 Performance Evaluation
4.1 Dataset training and testing
4.2 Environment set-up
4.3 Performance metric
5 Conclusion
References
Current and future roadmap for artificial intelligence applications in software engineering
1 Introduction
2 Artificial Intelligence Based Project Planning
2.1 Genetic algorithms
2.2 Reasoning based on cases
2.3 Knowledge based systems
2.4 Neural networks
3 Requirements Engineering and Software Design
4 Software Coding, Testing and Artificial Intelligence
4.1 Coding
4.2 Testing
5 Artificial Intelligence Techniques Used in Software Engineering
6 Conclusion and Future Scope
References
An efficient Artificial Intelligence approach for identification of rice diseases
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 CNN-Squeeze Net
4 Results and Discussion
5 Conclusion
References
An IoT based smart shopping cart
1 Introduction
2 Related Work
3 Architecture of Smart Shopping Cart
3.1 Design goals
3.2 Components
3.3 System design
4 Implementation
4.1 Basic implementation
4.2 Cart features
5 Conclusion and Future Works
References
Pixel-wise binary visual cryptography for black and white images
1 Introduction
2 Related Work
3 Proposed Work
3.1 Novel and Simple Non-Expansion-based Algorithm (NSNEA)
4 Results and Discussion
4.1 User interface
4.2 Simple text image encryption-decryption
4.3 Black &x00026; white image encryption-decryption
4.4 Pixel-wise binary image encryption-decryption
5 Conclusion and Future Scope
References
A survey of open source and free software engineering tools for academia and developer community
1 Introduction
2 Survey
3 Conclusion
References
Detection of pulmonary tuberculosis with thoracic radiograph on ensemble deep learning model
1 Introduction
2 Related Work
2.1 Deep learning
2.2 Convolutional networks
2.3 CNN classifier
2.4 Transfer learning
3 Methods and Materials
3.1 Data set
3.2 Data preprocessing
3.3 Experimental dataset &x00026; environment
3.4 Dataset partition
3.5 Modeling
3.6 System architecture
3.7 Experimental results and analyses
4 Conclusion
References
A study of the challenges faced by the hotel sector with regards to cyber security
1 Introduction
2 Purpose And questions of the Research
3 Background and Comprehensive Review
3.1 Hardware and software applied within the hospitality sector
3.2 Instruments and methods for the information security
3.3 The hospitality industry faces a wide range of cyber security challenges
3.4 Strategies for preventing hospitality sector cyber attacks
4 Methodology
5 Findings and Results
6 Final Thoughts, Suggestions, and Implications
References
A review on machine learning approach for predicting cryptocurrency prices
1 Introduction
2 Litearature Review
3 Proposed Model
4 Conclusion
References
Communication structure for Vehicular Internet of Things (VIoTs) and review for vehicular networks
1 Introduction
1.1 Background
1.2 Applications of Vehicular Internet of Things (VIoT)
2 A review of Vehicular IoT (VIoT) Networks and Communication
2.1 Comparative study for group key management
2.2 Problem analysis
3 Network Structure for Vehicular Internet of Things (VIoT) Communication
3.1 Networks structure requirements for VIoTs scheme
3.2 Network structure
4 Conclusions
References
Optimization-based watermarking scheme for security
1 Introduction
2 Watermarking Methods
2.1 Information model
2.2 Possible solutions
2.3 Experimental results
3 Further Possibilities and Conclusions
References
Video watermarking techniques for security: An overview
1 Introduction
2 Video Watermarking Overview
3 Robustness
4 Watermarking for Videos: Applications
5 Fredrich&x00027;s Algorithm
6 Processes for Watermarking
7 Domain Spatial
8 DWT-DCT Algorithm Hybrid
9 Watermarking Using Wavelets
10 Video Watermarking Attacks
11 Algorithms for Video Watermarking in the Encoding Process
12 Algorithms for Video Watermarking Following Compression
13 Conclusions
References
Emerging IoT applications related to industry 4.0
1 Introduction
2 An Outline of Iot
2.1 Architecture
2.2 Industry 4.0 and IoT
2.3 IoT&x00027;s Large scale connectivity
3 The Emerging Industry Wise IoT Applications
3.1 IoT security
3.2 IoT fuelled with 5G technology
3.3 Blockchain
3.4 AI software with IoT capabilities
3.5 Digital twins
3.6 Voice activated IoT devices
3.7 Smart cities
3.8 Edge computing
3.9 Traffic management
3.10 Healthcare
4 The Future of IoT
4.1 Why Iot?
5 Conclusion
References
Introduction of proprietary software to students for an effective online learning
1 Introduction
2 Traditional or Offline Mode of Learning &x00026; Teaching
3 Shift to Online Mode of Learning
4 Tools and Technologies Required for Effective Online Learning
4.1 Microsoft-teams for virtual classrooms
4.2 Moodle (LMS)
4.3 Ticketing system
4.4 Technology training platform
4.5 Virtual labs
5 Benefits of Online Learning
6 Conclusion
References
Audio emotion recognition using machine learning
1 Introduction
2 Emotion Recognition
3 Literature Review
4 Audio Feature Extraction
5 Classification
6 Proposed CNN Architecture
7 Results
8 Conclusion
References
Banana leaf disease classification using deep learning and various boosting techniques
1 Introduction
1.1 XGBoost
1.2 LightGBM
1.3 CatBoost
2 Dataset and Preprocessing
3 Literature Review
4 The Proposed model
5 The Proposed Convolutional Network
6 Experimental Setup
7 Result and Discussion
8 Conclusions
Conflict of Interest Statement
References
Internet traffic load during Covid-19 pandemic
1 Introduction
2 Datasets
3 Network Traffic Shifts
4 Application Traffic Variations
4.1 Web conferencing
4.2 Video on demand
4.3 Gaming
4.4 University networks
5 Conclusion
References
Understanding immersive technologies for autism detection: A study
1 Introduction
2 Literature Review
3 Immersive Technologies for Autism Detection
4 Apps for Assistive Technologies for Autism
5 Conclusion
References
A cryptographic and consensus-based analysis of the blockchain
1 Introduction
2 Blockchain Consensus Algorithms
2.1 Proof of Work (PoW)
2.2 Proof-of-Stake (PoS)
2.3 Byzantine Fault Tolerance (BFT)
2.4 Proof of Elapsed Time (PoET)
2.5 Proof-of-Capacity (PoC)
2.6 Proof of Game (PoG)
3 Evaluation Parameters for Blockchain and its Consensus Algorithms
3.1 Throughput
3.2 TPS
3.3 Block latency
3.4 Block verification time
3.5 Block size
3.6 Mining reward
4 Future Research Findings and Conclusion
References
An analytic study of various machine learning algorithms to predict heart related diseases
1 Introduction
2 Approach and Methodology
3 Results
References
Crop recommendation system: A review
1 Introduction
2 Fuzzy logic
2.1 Fuzzy Decision Support System (FDSS)
2.2 Mamdani Fuzzy Inference Model (CRS-MFI)
3 Iot + Machine Learning
3.1 Crop recommendation system using Neural Networks (CNN)
3.2 Intelligent Crop Recommendation System (ICRS)
3.3 Sensors driven Agricultural Recommendation Model (AI-ARM)
4 Crop Recommendation
4.1 Demand based Crop Recommender system for farmers(DCR)
4.2 Crop recommendation technique using Ensemble Technique (CRS-ET)
4.3 Crop recommendaer system using Weather Forecasts (CRS-WF)
5 Nutrition Recommendation
5.1 Crop suggestion based on soil series (CSML)
5.2 Diagnosis and Recommendation Integrated System (DRIS)
6 Fertilizer Recommendation
6.1 US Corn System (USCS)
6.2 Voting based ensemble classifier
7 Analysis of Sytem Based on Technology + Prediction
8 Conclusion
References
Big data-based clustering algorithm technique: A review analysis
1 Introduction
2 Overview of Big Data
3 Study of Big Data Set Clustering Algorithm
3.1 Clustering algorithm based on the MapReduce computing framework
3.2 Clustering algorithm based on Spark computing framework
3.3 Clustering algorithm based on Storm computing framework
4 Major Suggestions for Improvement of the Clustering Algorithm
5 Conclusion
References
Design and implementation of sound signal reconstruction algorithm for blue hearing system using wavelet
1 Introduction
2 Wavelet Transform for Input Signal Reconstruction
3 Sound and Speech Reconstruction
4 Flow Chart and Algorithm for Signal Reconstruction
5 Results and Discussion
6 Conclusions
References
A deep learning model for classification of mental illnesses like depression and anxiety via social network
1 Introduction
2 Research Review
3 Proposed Methodology
3.1 Dataset
3.2 DL models
3.2.1 Continuous bag of words model for word embedding
3.2.2 Convolutional Neural Network
3.2.3 Recurrent Neural Network
4 Analysis and Discussion
5 Conclusion
References
A novel design of a drain cleaning robotic vehicle
1 Introduction
2 Literature Review
3 Proposed Model and its Novelty
3.1 Robotic vehicle
3.2 Robotic arm
4 Conclusion
References
Intelligent surveillance system: Review
1 Introduction
2 Need for Intelligent Surveillance System
3 Intelligent Surveillance System (ISS) Overview
4 Architecture of General Video Servillance System
5 Techniques for Computer Vision
6 Problems with Current System
7 The Proposed Architecture
8 Benefits of Proposed System
9 Conclusions
References
Adam optimizer based deep learning approach for improving efficiency in license plate recognition
1 Introduction
2 learning and optimization
2.1 Overview
2.2 YOLO net
2.3 Adam optimizer
3 literature review
4 Methodology
4.1 Dataset formation
4.2 Pre-processing
4.3 Number plate detection
4.3.1 System architecture
4.3.2 Overlapping pooling
4.3.3 Leaky ReLu activation
4.3.4 Bounding box
5 results and discussion
5.1 At night
5.2 At evening
5.3 At morning
6 Conclusion
References
Interdependence of SGPA of preceding and upcoming semester for computer science undergraduates
1 Introduction and Literature review
2 Proposed Algorithm
3 Results and discussions
4 Conclusion
References
Survey on learning based super resolution techniques for enhancement of digital images
1 Introduction
2 Review of Literature
3 OBJECTIVES
4 PROPOSED FRAMEWORK
5 Conclusion
References
Integrated pathway analysis for metabolic engineering and development of better pharmaceutical products
1 Introduction
2 Material and Methods
2.1 Construction of biological network
2.2 Kinetics analysis
3 Results
4 Conclusion
References
Performance analysis of a Rotated Hexagonal Sierpinski Gasket (RHSG) fractal antenna for wireless communications
1 Introduction
2 Mathematical Design of Rhsg Fractal Antenna
3 Design Description of Rhsg Fractal Microstrip Antenna
4 Results And Discussion
5 Conclusion
References
Data security for digital environment
1 Introduction
1.1 Anonymization
2 Data Privacy
2.1 Privacy
2.2 Privacy
2.3 Anonymity classification
2.4 Relational data
2.5 Graph data
2.6 Relational data and graph data anonymization
2.7 Graph anonymity techniques
2.8 Graph modification techniques
2.9 Graph generalization
2.10 DP based technique
2.11 Attack models
2.12 Relational data attack
2.13 Graph data attack
3 Comparative Field
3.1 k-Anonymization
3.2 Differential privacy
3.3 K2-NMF
3.4 K-NDDP algorithm
3.5 UK-NDDP algorithm
4 Anonymity Tools
5 Conclusion and Future Work
5.1 Conclusion
5.2 Future work
References
Author index