This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications, organized by the School of Computer Science, University of Petroleum & Energy Studies, Dehradun, on September 4 and 5, 2020. The book starts by addressing the algorithmic aspect of machine intelligence which includes the framework and optimization of various states of algorithms. Variety of papers related to wide applications in various fields like image processing, natural language processing, computer vision, sentiment analysis, and speech and gesture analysis have been included with upfront details. The book concludes with interdisciplinary applications like legal, health care, smart society, cyber physical system and smart agriculture. The book is a good reference for computer science engineers, lecturers/researchers in machine intelligence discipline and engineering graduates.
Author(s): Manish Prateek, T. P. Singh, Tanupriya Choudhury, Hari Mohan Pandey, Nguyen Gia Nhu
Series: Algorithms for Intelligent Systems
Publisher: Springer
Year: 2021
Language: English
Pages: 828
City: Singapore
Preface
Contents
About the Editors
1 Probabilistic Machine Learning Using Social Network Analysis
1 Introduction
2 Related Works
3 Link Probability Model
4 Classification of Nominal Nodes
5 The Outlook of Likelihood Features
6 Maximum Likelihood Training
7 Result and Discussion
8 Conclusion and Future Work
References
2 Prioritization of Disaster Recovery Aspects Implementing DEMATEL Technique
1 Introduction
2 Methodology Adopted
2.1 Business Continuity and Disaster Recovery
2.2 DEMATEL Technique
3 Prioritization of Attributes
4 Observations
5 Conclusion
References
3 A Study on Machine Learning-Based Predictive Modelling for Pick Profiling at Distribution Centers
1 Introduction
1.1 Customer Segmentation
1.2 Distribution Center Handling Types (Pick Profile)
2 Solution
2.1 Modelling Specifics and Suggested Framework
2.2 Evidence the Solution Works
3 Current Scenario
4 Next Steps
References
4 Analysis of Computational Intelligence Techniques in Smart Cities
1 Introduction
1.1 What is Computational Intelligence?
1.2 Computational Intelligence Techniques
1.3 What Are Smart Cities?
1.4 Technology Used in Smart Cities
1.5 What Are the Advantages and Disadvantages of These Technologies?
2 Literature Review
2.1 Smart Cities
2.2 How Secure Are Smart City Technologies?
2.3 Data in Smart City [11]
2.4 Collection of Data
2.5 Importance of Analyzing the Data Collected [13]
2.6 Challenges in Analyzing Big Data [14]
2.7 Use of CI Techniques in Smart Cities
2.8 Applications of CI and Big Data in Smart Cities
3 Comparative Analysis of CI Techniques in Smart Cities
4 Summary and Conclusion
References
5 Proposed End-to-End Automated E-Voting Through Blockchain Technology to Increase Voter’s Turnout
1 Introduction
2 Literature Survey
3 Background Knowledge of Cryptography and Blockchain
3.1 Cryptography
3.2 Blockchain
4 Proposed Methodology
4.1 Voter Registration Through EC’s Portal
4.2 Exchange of Data Using Public Private Key Cryptography
4.3 Display of Voter List
4.4 Creation of Blocks
4.5 Chaining and Sealing the Blocks
4.6 Voting Result Display
5 Analysis and Metrics Evaluation of Proposed Framework
6 Limitations and Assumptions
7 Discussion and Conclusion
References
6 Future of Data Generated by Interactive Media
1 Introduction
2 Recommendation Systems
3 Interactive Media
4 How Interactive Movies Collect Data
5 Marketing Aspect of Interactive Movies
6 Psychological Aspect of Interactive Movies
7 Future of Interactive Movies
8 Privacy
9 Conclusion
10 Applications
References
7 Efficient Load Optimization Method Using VM Migration in Cloud Environment
1 Introduction
2 Literature Review
3 Proposed Model
3.1 VM Migration
3.2 Fuzzy Logic Based PM Selection
4 Implementation
5 Result and Discussion
5.1 Comparative Analysis
6 Conclusion
References
8 Analysis of Search Space in the Domain of Swarm Intelligence
1 Introduction
2 Complexity of Search Space in Swarm Intelligence
3 Literature Analysis
3.1 Information Sharing
3.2 Change in Structure
4 Current Problems and Future Opportunities
References
9 Smart Cane 1.0 IoT-Based Walking Stick
1 Introduction
2 Literature Review
3 Methodology
4 Conclusions
References
10 Web Crawler for Ranking of Websites Based on Web Traffic and Page Views
1 Introduction
2 Related Work
3 Proposed Approach
4 Simulation Results
5 Conclusion
References
11 Semantic Enrichment for Non-factoid Question Answering
1 Introduction
2 Importance of Semantic Relations
3 Role of Lexical-Semantic Relations in Different Parts of Question Answering
4 Classification of Semantic Relations
5 Addressing Challenges in Identifying Semantic Relations and Approach Method to Tackle Them
6 Brief on Research Utilizing Semantics in Different Modules of QAS
7 Conclusion and Future Work
References
12 Genre-Based Recommendation on Community Cloud Using Apriori Algorithm
1 Introduction
2 Social Networks Analysis: Properties
3 Literature Review
4 Motivation for Network Analysis of YouTube and Directing to Community Cloud
5 Research Objectives
5.1 Research Objective 1
5.2 Research Objective 2
5.3 Research Objective 3
6 Dataset
7 Proposed Technique
7.1 Strategy for Research Objective 1
7.2 Strategy for Research Objective 2
7.3 Strategy for Research Objective 3
8 Results
8.1 Results for Research Objective 1
8.2 Results for Research Objective 2
9 Conclusion and Future Work
References
13 AntVMp: An Approach for Energy-Efficient Placement of Virtual Machines Using Max–Min Ant System
1 Introduction
2 Literature Survey
3 The Proposed Method of VM Placement (AntVMp)
3.1 Heuristic Function Design
3.2 Probabilistic Function
3.3 Pheromone Initialization and Updating
3.4 Objective Function
3.5 Algorithm Description
4 Simulation Environment
5 Simulation Results and Discussion
6 Conclusion
References
14 CPU Performance Prediction Using Various Regression Algorithms
1 Introduction
2 Methodology
2.1 Data Acquisition
2.2 Data Preprocessing and Feature Selection
2.3 Training Regression Models
2.4 CPU performance Prediction
3 Result Analysis
3.1 Metrices
3.2 Results
4 Conclusion
References
15 IBM Watson: Redefining Artificial Intelligence Through Cognitive Computing
1 Introduction
1.1 IBM Watson Health
1.2 Watson’s Working
1.3 Watsons Shortcomings and Main Reasons for the Negative Publicity
1.4 IBM’s Defense
1.5 Solutions
2 Watsons Alternative—Comparisons
2.1 Amazon ML—Predictive Analysis
2.2 Amazon SageMaker
2.3 Google Cloud AutoML
2.4 IBM Watson ML Studio
3 IBM Watson Products and Services
4 Growth of AI Market
5 Conclusion
References
16 An Improved Multi-objective Water Cycle Algorithm to Modify Inconsistent Matrix in Analytic Hierarchy Process
1 Introduction
2 Related Work
3 Proposed Multi-objective Algorithm (MOA)
3.1 Objective Function
3.2 Improved Evaporation Rate
4 Experiments and Results
4.1 Performance Comparison Among the Proposed MOA and Existing Algorithms
5 Statistical Significance Test
6 Conclusion
References
17 Comparative Approach of Response Surface Methodology and Particle Swarm Optimization-Artificial Neural Network (PSO-ANN) in Rehydration Ratio Optimization for Bael (Aegle marmelos (L) Correa) Powder Production
1 Introduction
2 Materials and Methods
2.1 Preparation of Hot Air Dried Bael (HAD)
2.2 Preparation of Microwave Dried Bael (MWD)
2.3 Preparation of Freeze Dried Bael (FD)
2.4 Preparation of Sun Dried Bael (SD)
2.5 Preparation of Bael Powder
2.6 Rehydration Ratio
2.7 Response Surface Methodology (RSM) Optimization
2.8 Particle Swarm optimization-Artificial Neural Network (PSO-ANN)
3 Results and Discussion
4 Conclusion
References
18 Load Balancing with the Help of Round Robin and Shortest Job First Scheduling Algorithm in Cloud Computing
1 Introduction
2 Work Done
3 Proposed Algorithm
4 Conclusion and Future Work
References
19 Downlink Performance Improvement Using Base Station Cooperation for Multicell Cellular Networks
1 Introduction
2 System Model
2.1 Multicell Cooperation Scheme
2.2 Inter-Cell Interference (ICI)
2.3 Multicell Network for Case of Frequency Reuse: Cell Interior Performance
2.4 Cell Interior SINR and Channel Capacity
2.5 Analysis for Multicell Network Performance with ICI
2.6 Power Constraints for Every BS
3 Simulation Parameters
3.1 Simulation Results
4 Conclusion
References
20 A Survey on Moving Object Detection in Video Using a Moving Camera for Smart Surveillance System
1 Introduction
2 Application of Moving Object Detection
3 Moving Object Detection Methods
3.1 Spatio-Temporal Difference Method
3.2 Background Subtraction Method
3.3 Optical Flow (Differential Method)
4 Challenging Issues in Moving Object Detection
5 Comparison of Moving Object Detection Method
6 Publicly Available Datasets
7 Performance Analysis Parameters
8 Conclusion and Future Directions
References
21 Tomato Leaf Features Extraction for Early Disease Detection
1 Introduction
2 Related Work
3 Diseases in Tomato Leaves
3.1 Early Blight
3.2 Mosaic Virus
3.3 Target Spot
3.4 Yellow Leaf Curl Virus
4 Methodology
4.1 Image Acquisition
4.2 Image Pre-processing
4.3 Disease Segmentation
4.4 Feature Extraction
4.5 Identification of Disease in Tomato Plant
5 Results and Discussions
6 Conclusions
References
22 Cardiac MRI Segmentation and Analysis in Fuzzy Domain
1 Introduction
2 Literature Review
3 Proposed Algorithm for RV Extraction
4 Experimental Results
5 Conclusions
References
23 Color Masking Method for Variable Luminosity in Videos with Application in Lane Detection Systems
1 Introduction
2 Literature Review
3 Luminosity Filter
4 Variable Color Masking
5 Results
6 Limitations
7 Conclusion
References
24 An Automated IoT Enabled Parking System
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Design and Implementation
4 Comparison
5 Conclusion
References
25 Real-Time Person Removal from Video
1 Introduction
2 Proposed Work
3 Algorithm
4 Conclusion
References
26 Characterization and Identification of Tomato Plant Diseases
1 Introduction
2 Related Work
3 Tomato Plant Diseases and Its Causes
3.1 Nutritional Tomato
3.2 Disease Category—Fungal
3.3 Disease Category—Bacterial
3.4 Disease Category—Virus
3.5 Disease Category—Physical Disorder
4 Methodology
4.1 Image Acquisition
4.2 Image Pre-processing
4.3 Disease Segmentation
4.4 Feature Extraction
5 Analysis and Data Preparation
6 Results and Discussions
7 Conclusions
References
27 Dual-Layer Security and Access System to Prevent the Spread of COVID-19
1 Introduction
2 Literature Review
3 Approach
4 Methodology
5 Analysis
5.1 Face Detection Recognition System
5.2 Image Enhancement
5.3 FEP-RSA-MM Testing
5.4 RSA Decryption Algorithm
5.5 Correlation Based Matching
6 Result
6.1 Facial Recognition
6.2 Combined Face Recognition, EEG, and RSA
7 Conclusion and Future Scope
References
28 Parameter Estimation of Software Reliability Using Soft Computing Techniques
1 Introduction
2 Parameter Estimation Using Traditional Method
2.1 Maximum Likelihood Estimation (MLE)
2.2 Least Square Estimation (LSE)
3 Comparison Criteria for Parameter Estimation Techniques
4 Parameter Estimation Using Soft Computing Techniques
4.1 Machine Learning
4.2 Fuzzy Logic (FL)
5 Evolutionary Computation
5.1 Genetic Algorithm (GA)
5.2 Bayesian Networks (BN)
6 Recent Work and Development
7 Conclusion
References
29 An Ensemble Approach for Handling Class Imbalanced Disease Datasets
1 Introduction
2 Literature Survey
3 Proposed Work
4 Results and Analysis
5 Conclusion
References
30 A Comparative Study on Recognition of Degraded Urdu and Devanagari Printed Documents
1 Introduction
1.1 Urdu Script
1.2 Devanagari Script
2 Types of Degradation
2.1 Overlapping Characters
2.2 Touching Characters
2.3 Broken Characters
2.4 Bleed Through and Show Through
2.5 Heavy Printed and Faxed Documents
3 Features for Script Identification
4 Classification Methods for Script Identification
4.1 Classification Techniques Used for Urdu Script
4.2 Classification Technique Used for Devanagari Scripts
4.3 Types of Classifier
5 Conclusion
References
31 Machine Learning Based Feature Extraction of an Image: A Review
1 Introduction
2 Literature Review
3 Methodology
3.1 Diagonal Based Feature/Element Extraction Procedure
3.2 Fourier Descriptor
3.3 Principal Component Analysis
3.4 Independent Component Analysis
3.5 Histogram of Oriented Gradients
3.6 Fractal Geometry Analysis
3.7 Shadow Features of Character
3.8 Chain Code Histogram
3.9 Geometric Analysis for Feature Extraction
4 Result and Discussions
5 Summary and Conclusion
References
32 A Hybrid Approach to Image Fusion Using DWT and Fuzzy Logic
1 Introduction
2 Related Works
3 Preliminaries
3.1 Discrete Wavelet Transform
3.2 Fuzzy Logic
3.3 Quality Assessment Metrics
4 Proposed Algorithm
5 Results
6 Conclusion and Future Work
References
33 The BLEU Score for Automatic Evaluation of English to Bangla NMT
1 Introduction
1.1 Neural Machine Translation
2 MT Evaluation Techniques
3 Experimentation
4 Discussions and Future Scope
References
34 A Classifier to Predict Document Novelty Using Association Rule Mining
1 Introduction
1.1 Text Mining
1.2 Key Terminologies
1.3 Association Rule Mining
1.4 Unsupervised Classification
1.5 Structure of the Paper
2 Related Work
3 Proposed Work
3.1 Framework
3.2 Evaluation Methodology
4 Conclusion
References
35 Analysis of Faculty Teaching Performance Based on Student Feedback Using Fuzzy Mamdani Inference System
1 Introduction
2 Literature Study
3 Proposed Fuzzy Model for Faculty Performance Evaluation
4 Implementation and Result
5 Results
6 Conclusion and Future Research
7 Future Research
References
36 Statistical and Geometrical Alignment for Unsupervised Deep Domain Adaptation
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Domain Adaptation Problem Definition
3.2 Formulation of the Loss Function
4 Experiments
4.1 Benchmark Dataset Descriptions
4.2 Experimental Setting for Proposed and Other Approaches
4.3 Comparison with the State-of-the-Art Deep Domain Adaptation Methods
5 Result and Discussion
6 Conclusion
References
37 Deception Detection on ``Bag-of-Lies'': Integration of Multi-modal Data Using Machine Learning Algorithms
1 Introduction
2 Motivation and Contributions
3 Proposed Work
4 Experimental Results and Discussion
4.1 Environment Settings
4.2 Database Description
4.3 Results and Comparision
5 Conclusion
References
38 An LDA-Based Approach Towards Word Sense Disambiguation in Malayalam
1 Introduction
2 Background
3 Related Work
4 Methodology
4.1 Preprocessing
4.2 Topic Generation
4.3 Sense Disambiguation
5 Results and Discussions
6 Conclusion and Future Scope
References
39 Functional Electrical Stimulation for Hand Movement of Person
1 Introduction
2 Literature Review
3 Architecture
4 Methodology
5 Results
6 Conclusions
References
40 Neuro-image Classification for the Prediction of Alzheimer’s Disease Using Machine Learning Techniques
1 Introduction
2 Predictive Modelling in Machine Learning
3 Motivation
4 Methodology and Material
4.1 Materials and Methods
4.2 Logistic Regression (LR)
4.3 Random Forest (RF)
5 Conclusion
References
41 Binary Classification of Celestial Bodies Using Supervised Machine Learning Algorithms
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Collection of RAW Images
3.2 Image Pre-processing
3.3 Feature Extraction
3.4 Classification
4 Results and Discussion
5 Conclusions
References
42 Bangla Document Classification Using Deep Recurrent Neural Network with BiLSTM
1 Introduction
2 Literature Review
3 Methodology
3.1 Recurrent Neural Network
3.2 Long Short Term Memory
4 Experimental Details and Results
4.1 Implementation Procedures
4.2 Data Collection and Cleaning
4.3 Document Classification Dataset
4.4 Data Preprocessing
4.5 Classification Model
4.6 Result Analysis
4.7 Result Comparison
5 Conclusion
References
43 Comparative Evaluation of Image Segmentation Techniques with Application to MRI Segmentation
1 Introduction
2 Edge Detection
2.1 Gradient-Based Technique
2.2 Gaussian-Based Technique
3 Thresholding Technique
3.1 Otsu’s Method
4 Region-Based Image Segmentation Technique
4.1 Region Growing
5 Cluster-Based Image Segmentation Technique
5.1 K-means Clustering Algorithm
5.2 Fuzzy C-Means Clustering Algorithm
6 Comparison of Various Segmentation Techniques
6.1 Peak Signal to Noise Ratio
6.2 Energy
6.3 Image Entropy
7 State of Art
8 Conclusion
References
44 An End-to-End Approach for Automatic and Consistent Colorization of Gray-Scale Videos Using Deep-Learning Techniques
1 Introduction
1.1 Related Work
2 Proposed Method
2.1 Preprocessing the Input Video and Key-Frame(s) Identification
2.2 Keyframe Colorisation
2.3 Batching and Sequencing
2.4 Color Propagation from Key-Frames to Gray-Scale Frames
3 Experiments and Comparison
3.1 Perceptual Experiment and Results
3.2 Operating Environment
4 Conclusions
References
45 Thermal Object Detection Using Yolov3 and Spatial Pyramid Pooling
1 Introduction
2 Literature Survey
2.1 R-CNN
2.2 Fast R-CNN
2.3 Faster R-CNN
2.4 YOLO—You Look Only Once
2.5 SSD—Single Shot Detector
2.6 Spatial Pyramid Pooling
3 Implementation
3.1 Preprocessing Steps
3.2 Implementation Details
4 Results
5 Conclusion
References
46 Security Issues of Edge Computing in IoT
1 Concept of Edge Computing
2 Edge Computing Security Attacks
2.1 Security Attacks at the Edge Device Layer
2.2 Communication Layer Security Attack
2.3 Edge Computing Layer Security Attacks
3 Edge Computing Cryptographic Security Technology
3.1 Public Key Infrastructure
3.2 Identity-Based Cryptography
3.3 RSA and ECC Cryptography
3.4 Pairing-Based Cryptography
3.5 Cipher Technology
3.6 Multivariate Public Key Cryptography
4 Future Research Directions
5 Conclusion
References
47 Gradient Local Auto Correlation Co-occurrence Machine Learning Model for Endometrial Tuberculosis Identification
1 Introduction
2 Preliminaries
2.1 Gray Level Co-occurrence Matrix (GLCM) Model
2.2 Local Binary Pattern Co-occurrence Model
3 Methodology
3.1 Data Collection and Augmentation
3.2 GLAC Co-occurrence Textural Feature Extraction Model
4 Implementation, Results, and Analysis
5 Conclusion
References
48 Intelligent Abnormality Detection Method in Cyber Physical Systems Using Machine Learning
1 Introduction
2 Proposed System
2.1 Cyber Physical System (CPS)
2.2 Attack Detection in CPSs
2.3 Anomaly Detection Methods
3 Statistical Methods
3.1 Classification Methods
3.2 Clustering Methods
3.3 Signal Processing Techniques and Pattern Recognition
3.4 Proposed Scheme with Machine Learning
4 Experimental Setup and Analysis
5 Conclusions
References
49 Efficient Data Search and Update in Named Data Networking with Integrity Preservation
1 Introduction
2 Literature Review
3 Proposed Method
3.1 System Model
3.2 Proposed Algorithms
4 Performance Evaluation
4.1 Experimental Analysis
4.2 Comparative Analysis
5 Conclusion
References
50 A Comparison of Domain-Specific and Open-Domain Image Caption Generation
1 Introduction
2 Significance
3 Related Work
4 Important terms
4.1 Long Short Term Memory
4.2 Encoder-Decoder
5 Proposed Model
5.1 Model
6 Experiments and Results
6.1 Dataset Description
6.2 Preprocessing and Training Details
6.3 Evaluation
7 Error Analysis
8 Conclusions
9 Future Work
References
51 Offline Computer-Synthesized Font Character Recognition Using Machine Learning Approaches
1 Introduction
2 Related Works
3 Proposed Character Recognition Framework
4 Dataset Description
5 Preprocessing
6 Feature Extraction
6.1 Angular Motion of Shape Based Feature (AMSF)
6.2 Distance from Center to the Thinned Lines Feature (DCTF)
6.3 Distance from Center to the Outer Edge Feature (DCEF)
7 Classification and Recognition
7.1 Support Vector Machine (SVM)
7.2 Random Forest (RF)
7.3 Recurrent Neural Network (RNN)
7.4 Convolutional Neural Network (CNN)
8 Experimental Analysis
9 Conclusion and Future Work
References
52 Analysis of Object Detection Algorithms Using Neural Networks
1 Introduction
1.1 Object Detection
1.2 Past Work in the Field of Object Detection
1.3 Neural Network
1.4 Motive
1.5 Need for Study of Algorithms
1.6 Algorithms Chosen for Comparison
1.7 Criteria for Comparison
2 Related Works
2.1 R-CNN
2.2 Faster R-CNN
2.3 YOLO
2.4 SSD
3 Proposed Algorithm
4 Analysis and Results
5 Conclusion
6 Future Work
References
53 Real-Time Data Pipeline in Confluent Kafka and Mule4 ESB with ActiveMQ
1 Introduction
2 Mule ESB and ActiveMQ
3 Confluent Kafka
3.1 Kafka Topics
3.2 Kafka Streams
3.3 Confluent Schema Registry
3.4 Confluent Kafka Connect, KSQL and Confluent Cloud
4 Proposed Testing and Methodology
4.1 Polling Consumer
4.2 Event-Driven Consumers
5 ActiveMQ Versus Kafka
6 Conclusion
References
54 Imbalanced Cardiotocography Data Classification Using Re-sampling Techniques
1 Introduction
2 Related Works
2.1 Classification of CTG Data
2.2 Handling Imbalanced Data
3 Materials and Methods
3.1 Description of CTG Data
3.2 Handling Imbalanced CTG Data
4 Experimental Evaluation
5 Conclusion and Future Work
References
55 An Exploration of Acoustic and Temporal Features for the Multiclass Classification of Bird Species
1 Introduction
2 Methodology
2.1 Dataset
2.2 Feature Extraction
3 Principal Component Analysis of Extracted Features
4 Classification Methods
4.1 Support Vector Machine
4.2 Decision Tree Classification
4.3 K-Nearest Neighbors
5 Results
6 Discussion
7 Conclusion
References
56 Dataset Annotation on Chronic Disease Comorbidities Study in Type 2 Diabetes Mellitus
1 Introduction
2 Related Works
3 Data Acquisition
3.1 Complex Issues in Data Acquisition
4 Data Preprocessing
4.1 Discussion on Feature Association
5 Conclusion and Future Work
References
57 A Deep Learning Solution to Detect Text-Types Using a Convolutional Neural Network
1 Introduction
2 Literature Review
3 Datasets
3.1 Dataset Preprocessing
3.2 Train-Test-Validation Split
3.3 Data Augmentation
4 Work Methodology
4.1 Proposed Model
4.2 Epochs and EarlyStop
5 Performance
5.1 Learning Curve
5.2 Accuracy and Loss
5.3 Confusion Matrix Analysis
6 Conclusion and Future Work
References
58 A Search of Diversity in Type Ia Supernova Using Self Organizing Map (SOM)
1 Introduction
2 Dataset
3 Methodology
3.1 Validation of Clusters Using Silhouette Score
4 Results
5 Conclusions
References
59 Kickstarter Project Success Prediction and Classification Using Multi-layer Perceptron
1 Introduction
2 Existing Work
3 Proposed Methodology
3.1 Dataset
3.2 Preprocessing and Outlier Detection/Removal
3.3 Natural Language Processing on Description Set
3.4 Prediction
3.5 Classification
3.6 Statistical Graphs and Data Visualizations
4 Results and Discussions
4.1 Multi-Level Perceptron Using Back-propagation Algorithm
4.2 Multiple Regression
4.3 Comparison of Different Classifiers
5 Conclusion
6 Future Scope
References
60 Detection of Artificially Ripen Mango Using Image Processing
1 Introduction
2 Related Work
3 Problem Identification
3.1 Different Background Colors
3.2 Classifier
4 Methodology
4.1 Image Acquisition
4.2 Resize Image
4.3 Image Filtering
4.4 Background Subtraction
4.5 Extraction of Contour Lines and Areas
4.6 Adaptive Thresholding
4.7 Area of Border Pixels
4.8 Feature Extraction
4.9 Artificially Ripen Mango Detection
5 Result and Discussion
5.1 Accuracy of Result
5.2 Comparison with Existing Technologies
5.3 Limitations
6 Conclusion and Future Works
References
61 Intelligent Negotiation Agent Architecture for SLA Negotiation Process in Cloud Computing
1 Introduction
2 Background
3 Proposed Architecture
4 Conclusion
References
62 An Efficient Pneumonia Detection from the Chest X-Ray Images
1 Introduction
2 Related Works
3 Conceptual Background
3.1 VGG16
3.2 VGG19
3.3 ResNet50
3.4 MobileNetV1
3.5 EffcicientNetB3
4 Experimental Set-Up
4.1 Used Dataset
4.2 Transfer Learning
4.3 System Configuration
5 Result and Analysis
6 Conclusion
References
63 Recognition of Car License Plate Name Using Reformed Template-Based Method
1 Introduction
2 Proposed Method
2.1 Grayscale Conversion
2.2 Detection of Edge
2.3 Closing Operation
2.4 Text Regions Labeling
2.5 Character Segmentation for Localization
2.6 Comparison of Characters Using Template Matching Technique
3 Experimental Results
4 Comparison with Other Text Extraction Techniques
5 Conclusion
References
64 Impact of Deep Learning on Arts and Archaeology: An Image Classification Point of View
1 Introduction
2 Related Works
3 Conceptual Background
3.1 Transfer Learning
3.2 MobileNetV1
3.3 MobileNetV2
3.4 EffcicientNetB0
4 Datasets Preparation and Experiments
4.1 Datasets
4.2 Image Pre-processing and Augmentation
4.3 System Configuration
5 Results Discussion and Analysis
6 Conclusion
References
Author Index