This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, environment, engineering, commerce, and industry. It is a collection of selected conference papers presented at the International Conference on Trends in Computational and Cognitive Engineering (TCCE 2020). It shares cutting-edge insights and ideas from mathematicians, engineers, scientists, and researchers and discusses fresh perspectives on problem solving in a range of research areas.
Author(s): M. Shamim Kaiser, Anirban Bandyopadhyay, Mufti Mahmud, Kanad Ray
Series: Advances in Intelligent Systems and Computing, 1309
Publisher: Springer Singapore
Year: 2021
Language: English
Pages: 723
City: Singapore
Organization
Chief Patron
Conference Co-chairs
Steering Committee
Advisory Committee
Organizing Committee
Technical Program Committee Chairs
Technical Program Committee
Preface
Contents
About the Editors
Artificial Intelligence and Soft Computing
Bangla Real-Word Error Detection and Correction Using Bidirectional LSTM and Bigram Hybrid Model
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Details
3.2 Bigram Generation and Probability Estimation
3.3 Bidirectional LSTM Approach
4 Tools and Technology
5 Experimental Result
6 Conclusion
References
Quantitative Analysis of Deep CNNs for Multilingual Handwritten Digit Recognition
1 Introduction
2 Recognition Methods
2.1 Convolutional Neural Network (CNN)
2.2 Deep CNN
3 Experimental Results and Discussion
3.1 Dataset Description
3.2 Discussion
4 Conclusion
References
Performance Analysis of Machine Learning Approaches in Software Complexity Prediction
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Research Questions
3.2 Proposed Research Framework
3.3 Dataset Collection
3.4 Dataset Cleaning and Analysis
3.5 Machine Learning Classifiers and Evaluation Metrics
4 Result and Discussion
4.1 Correlation Results
4.2 Performance Results
5 Conclusion
References
Bengali Abstractive News Summarization (BANS): A Neural Attention Approach
1 Introduction
2 Related Work
3 Dataset
4 Model Architecture
5 Result and Discussion
5.1 Quantitative Evaluation
5.2 Qualitative Evaluation
6 Conclusion
References
Application of Feature Engineering with Classification Techniques to Enhance Corporate Tax Default Detection Performance
1 Introduction
2 Proposed Methodology
2.1 Dataset Description and Transformation
2.2 Feature Selection
2.3 Classification
2.4 Evaluation Metrics
3 Experimental Result
3.1 Experimental Analysis of Primary Tax Default Dataset
3.2 Experimental Analysis on Transformed Tax Default Dataset
3.3 Wilcoxon Signed–Ranks Significant Test
4 Discussion
5 Conclusion and Future Work
References
PRCMLA: Product Review Classification Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Proposed Approach and Model
3.1 Proposed Web Crawler
3.2 Data Preprocessing
3.3 Feature Extraction
3.4 Classification Model
3.5 Evaluation Criteria
4 Experiment and Results
4.1 Grabbing Data Using Web Crawler
4.2 Dataset
4.3 Result Analysis
5 Conclusion
References
Handwritten Bangla Character Recognition Using Deep Convolutional Neural Network: Comprehensive Analysis on Three Complete Datasets
1 Introduction
2 Related Work
3 Methodology and System Architecture
4 Data Processing and Experiment
4.1 Data Processing
4.2 Experiment
5 Result Analysis
5.1 Accuracy Analysis
5.2 Loss Analysis
6 Conclusion
References
Handwritten Bangla Character Recognition Using Convolutional Neural Network and Bidirectional Long Short-Term Memory
1 Introduction
2 Related Work
3 System Architecture and Methodology
3.1 Key Concepts
3.2 Proposed Architecture
3.3 Methodology
4 Experiment and Result Analysis
4.1 Proposed Model Evaluation
4.2 Performance Comparison
5 Conclusion
References
Bangla Text Generation Using Bidirectional Optimized Gated Recurrent Unit Network
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset Collection
3.2 Pre-processing and Tokenization
3.3 N-Gram Tokens Sequencing
3.4 Sentence Embedding
3.5 System Model
4 Result Analysis
5 Conclusion and Future Work
References
An ANN-Based Approach to Identify Smart Appliances for Ambient Assisted Living (AAL) in the Smart Space
1 Introduction
2 Related Work
3 Method
3.1 Data Collection
3.2 Preprocessing
3.3 Template
4 Proposed Mechanism
5 Training
6 Result
7 Limitations and Conclusion
References
Anonymous Author Identifier Using Machine Learning
1 Introduction
2 Anonymous Author Identifying Solution
3 Data Collection
4 Implementation Details
4.1 Problem Setup and Model
4.2 Experimentation and Fine-Tuning
4.3 Inferencing for DBMS
5 Conclusion
References
A Machine Learning Approach to Predict Events by Analyzing Bengali Facebook Posts
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Data Pre-processing
3.3 Feature Extraction
3.4 Model Training and Prediction
4 Result and Discussion
5 Conclusion and Future Work
References
Cognitive Science and Computational Biology
Gaze Movement’s Entropy Analysis to Detect Workload Levels
1 Introduction
2 Materials and Methods
2.1 Data Analysis
2.2 Entropy Methodology
3 Results
4 Discussion
5 Conclusions
References
A Comparative Study Among Segmentation Techniques for Skin Disease Detection Systems
1 Introduction
2 Literature Review
3 Methodology
4 Result Analysis
5 Conclusion and Future Directions
References
Thermomechanism: Snake Pit Membrane
1 Introduction
2 Materials and Methods
2.1 Theoretical Approach for the Construction of Snake Pit Membrane
2.2 Technical Details
2.3 Model Geometry
3 Results and Discussion
3.1 TRPA 1 Channel—Dynamic Nature
3.2 TRPA1 Channel-Carnot Mechanism
3.3 How Does Our Theoretical Finding Coincide with the Experimental Result Reported by Gracheva et al. [16]
4 Conclusion
References
Sentiment Analysis on Bangla Text Using Long Short-Term Memory (LSTM) Recurrent Neural Network
1 Introduction
2 Literature Review
2.1 Traditional Machine Learning Models
2.2 LSTM-Based Sentiment Analysis Research
3 Dataset
3.1 Data Collection
3.2 Data Labeling
3.3 Data Preprocessing
4 Methodology
4.1 Modeling and Analysis
4.2 Experiment and Evaluation
4.3 Fitting and Tuning
5 Result and Performance Analysis
6 Conclusion
References
Comparative Analysis of Different Classifiers on EEG Signals for Predicting Epileptic Seizure
1 Introduction
2 Materials and Methods
3 EEG Signals Analysis and Filtering Through Brainstorm Software
4 Methods of Features Extraction
4.1 Power Spectral Analysis
4.2 Statistical Parameters
5 Feeding the Extracted Features for Classification
6 Comparison of Classification Algorithm
7 Results
8 Conclusion
References
Anomaly Detection in Electroencephalography Signal Using Deep Learning Model
1 Introduction
2 Machine Learning Methods
3 ML Methods for Detecting Anomaly
3.1 Abnormal EEG
3.2 Schizophrenia
3.3 Abnormal Sleep Quality
3.4 Epileptic Seizure Detection
3.5 Parkinson's Disease
3.6 Healthy Anomaly Detection
3.7 Pathology Detection
3.8 Depression Detection
3.9 Emotion Recognition
3.10 Drowsiness Detection
4 Numerical Performance
4.1 Abnormal EEG
4.2 Schizophrenia
4.3 Abnormal Sleep Quality
4.4 Epileptic Seizure Detection
4.5 Parkinson's Disease
4.6 Healthy Anomaly Detection
4.7 Pathology Detection
4.8 Depression Detection
4.9 Emotion Recognition
4.10 Drowsiness Detection
5 Open Challenges
6 Conclusions
References
An Effective Leukemia Prediction Technique Using Supervised Machine Learning Classification Algorithm
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Experimental Data Set
3.2 Data Preprocessing
3.3 Classifiers
3.4 Performance Evaluation
4 Experimental Analysis
4.1 Training Set Performance
4.2 Test Set Performance
5 Conclusion
References
Deep CNN-Supported Ensemble CADx Architecture to Diagnose Malaria by Medical Image
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Data Collection
3.2 Model Configuration
3.3 Model Ensemble
3.4 Statistical Analysis
4 Experimental Results
5 Conclusion
References
Building a Non-ionic, Non-electronic, Non-algorithmic Artificial Brain: Cortex and Connectome Interaction in a Humanoid Bot Subject (HBS)
1 Introduction
2 Results and Discussion
2.1 Brain Cavity Made of Cortex Folds that We See from the Outside Is not the Real Cavity: A Triplet of Triplet Cavity Holds the Connectome from Within
2.2 The Critical Challenges for the Simulation of Connectome: How Do We Interface Helical Carbon Nanotube-Based Cortical Columns and the Connectome?
2.3 Cortical Column Assemblies
2.4 Construction of Forty-Seven Brodmann’s Cortex Regions
2.5 Reading the Cognitive Response of the Artificial Brain
2.6 Direct Comparison of Two Kinds of Artificial Brains: One Brain Has a Geometric Replica of Connectome Structure. The Other Brain’s Connectome Is a Replica of Clock Architecture of the Human Brain
2.7 Advantages of Exploring the Brain as Clock Architecture
3 Materials and Methods
3.1 Theoretical Brain Module Construction
3.2 Experimental Brain Module Construction
4 Conclusions
4.1 Ionic Junction, Electric Nerve Impulse Could Be Avoided: Geometry Is the Key in Decision Making
4.2 Temporal Map of a Human Brain, Geometric or Time Crystal Map of Information and Map of Used Primes in Device Engineering Are Three Columns of Our Artificial Brain
4.3 Geometric Replica if Emulates the Symmetry of Vibrational Patterns, It Could Reproduce the Human Brain like Intelligence
References
Detection of Ovarian Malignancy from Combination of CA125 in Blood and TVUS Using Machine Learning
1 Introduction
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 Data Preprocessing
3.3 Exploratory Data Analysis
3.4 Machine Learning Algorithm for Classification
3.5 SMOTE Analysis
4 Result and Discussion
5 Conclusion
References
Auditory Attention State Decoding for the Quiet and Hypothetical Environment: A Comparison Between bLSTM and SVM
1 Introduction
2 Literature Review
3 Materials and Methods
4 Results and Discussion
5 Conclusion
References
EM Signal Processing in Bio-living System
1 Introduction
2 Materials and Methods
2.1 Technical Details
3 Results and Discussion
4 Conclusion
References
Internet of Things and Data Analytics
6G Access Network for Intelligent Internet of Healthcare Things: Opportunity, Challenges, and Research Directions
1 Introduction
2 Motivation of Using 6G in IIoHT
2.1 Features and Requirement of IIoHT
2.2 Challenges in IIoHT Deployment
3 6G as Access Network for IIoHT
3.1 Terahertz Link
3.2 Intelligent Communication
3.3 Quality of Experiences
3.4 Intelligent Internet of Things
3.5 Tactile and Haptic Internet
3.6 Massive MIMO
3.7 Quantum Communication
4 Possible Services for IIoHT Using 6G
4.1 Holographic Communication
4.2 Augmented/Virtual Reality
4.3 Medical Robot
4.4 Telesurgery
4.5 Epidemic and Pandemic
4.6 Wireless Body–Machine Interactions
5 IIoHT Layer Architecture
6 Future Research Challenges
7 Conclusion
References
Towards a Blockchain-Based Supply Chain Management for E-Agro Business System
1 Introduction
2 Related Work
3 Blockchain-Based Supply Chain Management for E-Agro Business System
3.1 Smart Food Traceability System
4 Why Blockchain Is Secure
4.1 When and Why Should `Difficulty' Be Used or Not?
5 Why Blockchain Is in the Supply Chain Management System
6 Smart Contract for E-Agro Business System
7 Conclusion
References
Normalized Approach to Find Optimal Number of Topics in Latent Dirichlet Allocation (LDA)
1 Introduction
2 Background
2.1 LDA Overview
2.2 Existing Methods for Predicting the Optimal Number of Topics in LDA
2.3 Related Works
3 Developing Proposed NAP and NAC
4 Experiments
4.1 Data
4.2 Evaluation Criteria
4.3 Experimental Procedures
5 Results Analysis
5.1 Reliability of Perplexity
5.2 Reliability of Coherence
5.3 Reliability of RPC
5.4 Performance of NAC
5.5 Performance of NAP
6 Discussion
7 Conclusion
References
Towards Developing a Real-Time Hand Gesture Controlled Wheelchair
1 Introduction
2 Related Work
3 Gesture Recognition
3.1 Hand Detection Method
3.2 Hand Tracking Method
3.3 Recognition of the Hand Region Using CNN
3.4 Wheelchair Control
4 System Implementation
5 Experimental Analysis
6 Conclusions
References
A Novel Deep Learning Approach to Predict Air Quality Index
1 Introduction
2 State of the Art
3 Overview of LSTM and GRU
3.1 LSTM
3.2 GRU
4 Experimental Setup
4.1 Data Collection and Preprocessing
4.2 Model Designing
4.3 Model Evaluation Criteria
5 Result and Discussion
5.1 Dhaka
5.2 Chattogram
5.3 Performance Comparison
6 Conclusion and Future Work
References
HKMS-AMI: A Hybrid Key Management Scheme for AMI Secure Communication
1 Introduction
1.1 Contribution
1.2 Outline
2 Literature Survey
3 System Model
4 Proposed Hybrid Key Management Scheme
5 Security and Performance Analysis
6 Conclusion
References
Implementation of Robotics to Design a Sniffer Dog for the Application of Metal Detection
1 Introduction
2 Design Principles and Working Mechanism
2.1 Metal Detection and Signaling
2.2 Robotic Vehicle Control and Bluetooth Communication
3 Circuit Diagram and Construction of Robotic Dog
3.1 Algorithm and Flowchart
3.2 Constructional Design of the RD Body
4 Results and Discussions
5 Conclusion
References
Voice Assistant and Touch Screen Operated Intelligent Wheelchair for Physically Challenged People
1 Introduction
2 Review of Related Works
3 Proposed System Model
3.1 System Workflow
4 Results and Discussion
5 Conclusion
References
Virtual Heritage of the Saith Gumbad Mosque, Bangladesh
1 Introduction
2 About Shait Gumbad Mosque
3 The Conceptualisation of Virtual Heritage
4 Technological Journey to Build the Virtual Heritage of Shait Gumbad Mosque
5 Final Outcome of Virtual Heritage of Shait Gumbad Mosque
6 Conclusion
References
A Healthcare System for In-Home ICU During COVID-19 Pandemic
1 Introduction
2 Related Work
3 Data Acquisition Scheme
4 System Architecture
5 Experimental Result
6 Conclusion
References
Career Prediction with Analysis of Influential Factors Using Data Mining in the Context of Bangladesh
1 Introduction
2 Related Work
3 Methodology
3.1 Data Description and Analysis
3.2 Classifier Description
3.3 Implementation Procedure
4 Result and Discussion
5 Conclusion and Future Work
References
Network and Security
Secured Smart Healthcare System: Blockchain and Bayesian Inference Based Approach
1 Introduction
2 Related Work
3 Proposed Framework
3.1 Healthcare Module
3.2 Threat Module
3.3 Security Module
4 Simulation and Evaluation
5 Conclusion
References
A Blockchain-Based Scheme for Sybil Attack Detection in Underwater Wireless Sensor Networks
1 Introduction
2 Literature Review
3 System Model
3.1 Attack Model
3.2 Trust Model
3.3 Blockchain-Based Sybil Attack Detection
4 Implementation
4.1 Experimental Setup
5 Conclusion
References
An Efficient Bengali Text Steganography Method Using Bengali Letters and Whitespace Characters
1 Introduction
1.1 The Duality Form of Bengali Letter
2 Related Work
3 Drawback of Previous Method
3.1 Md. Khairullah's ``Steganography in Bengali Unicode Text" ch38ratulspssteganographysps2017 :
4 Proposed Method
4.1 Embedding Algorithm and Extracting Algorithm
5 Experimental Results and Comparisons
5.1 Evaluation Criteria Analysis
6 Discussion
7 Conclusion and Future Work
References
Enhancing Flexible Unequal Error Control Method to Improve Soft Error Tolerance
1 Introduction
2 Related Work
3 The Proposed Approaches
3.1 Fault Injection
3.2 A Simplified Example
4 Experimental Analysis
4.1 Experimental Setup
4.2 Experimental Results
5 Conclusions
References
A Combined Framework of InterPlanetary File System and Blockchain to Securely Manage Electronic Medical Records
1 Introduction
2 Related Works
3 Background Technologies
3.1 IPFS
3.2 The Blockchain
4 System Model and Implementation
4.1 Proposed Workflow
4.2 Implementation
4.3 Performance Analysis
5 Conclusion and Future Work
References
Evaluating Energy Efficiency and Performance of Social-Based Routing Protocols in Delay-Tolerant Networks
1 Introduction and Related Works
2 Review of Social-Based Routing Protocols Under Investigation
3 Simulation Scenario and Parameter Setup
4 Evaluation of Simulation Outcomes
4.1 Average Remaining Energy
4.2 Delivery Ratio
4.3 Average Delay
4.4 Transmission Cost
5 Conclusions
References
Design a U-slot Microstrip Patch Antenna at 37 GHz mm Wave for 5G Cellular Communication
1 Introduction
2 Proposed Antenna Configuration
3 Numerical Analysis
4 Result and Discussion
5 Conclusion
References
iHOREApp: A Mobile App for Hybrid Renewable Energy Model using Particle Swarm Optimization
1 Introduction
2 Literature Review
3 Proposed System Model
3.1 PV System Model
3.2 Wind Turbine Model
3.3 Proposed System Overview
3.4 PSO Based Hybrid Model
4 A Case Study
5 Conclusion and Future Work
References
Cyber Threat Mitigation of Impending ADS-B Based Air Traffic Management System Using Blockchain Technology
1 Introduction
2 An Overview of Related Technology
2.1 ADS-B in ATM
2.2 ADS-B Technology
2.3 Blockchain Technology Relevant to ATM System
3 Proposed System Model
4 Proposed Model Architecture and Working Procedure
5 Performance of the Proposed Model
6 Conclusion
References
Building Machine Learning Based Firewall on Spanning Tree Protocol over Software Defined Networking
1 Introduction
2 Literature Review
3 Proposed System Model
4 Implementation
4.1 Spanning Tree Protocol Without Firewall Configuration
4.2 Spanning Tree Protocol with Firewall Configuration
5 Results and Analysis
5.1 Analyze Using Datasets
5.2 Performance Evaluation
6 Conclusion
References
A Routing Protocol for Cancer Cell Detection Using Wireless Nano-sensors Network (WNSN)
1 Introduction
2 Related Work and Motivation
3 Considered Issues in Designing Routing Protocol
4 Routing Framework
4.1 System Model and Assumptions
4.2 Cluster Formation
4.3 Communication Scheme
4.4 Cluster Formation Algorithm
5 Conclusion and Future Work
References
Signal Processing, Computer Vision and Rhythm Engineering
Cascade Classification of Face Liveliness Detection Using Heart Beat Measurement
1 Introduction
2 Face Liveliness Detection Review
3 Model Architecture
3.1 Face Detection Model
3.2 CNN Model
3.3 Heart Beat Measurement
3.4 Liveliness Detection
4 Result and Discussion
4.1 Dataset Description
4.2 Performance Analysis
5 Conclusion
References
Two-Stage Facial Mask Detection Model for Indoor Environments
1 Introduction
2 Proposed Model
2.1 System Overview
2.2 Evaluation Dataset
3 Method
3.1 Execution
4 Experimental Results and Discussion
4.1 Stage-1 Results
4.2 Stage-2 Results
5 Conclusion
References
MobileNet Mask: A Multi-phase Face Mask Detection Model to Prevent Person-To-Person Transmission of SARS-CoV-2
1 Introduction
2 Relevant Work
3 Datasets Characteristics
4 Methodology
4.1 Face Mask Detector Training Phase
4.2 MobileNetV2
4.3 Face Mask Detector for Images
4.4 Face Mask Detector for Webcam/Video Stream
5 Experimental Results
5.1 Evaluation Metrics
5.2 Results Analysis
6 Conclusion
References
Facial Spoof Detection Using Support Vector Machine
1 Introduction
2 Literature Review
3 Methodology
3.1 Feature Extraction
3.2 Classification Using SVM
4 Data Set
5 Results and Analysis
6 Discussion
7 Conclusion
References
Machine Learning Approach Towards Satellite Image Classification
1 Introduction
2 Literature Review
3 Methodology
3.1 Classification Methods
4 Data Set
5 Results and Analysis
5.1 Result Using KNN
5.2 Result Using ANN
5.3 Result Using Decision Tree
5.4 Comparison Among KNN, ANN and Decision Tree with Respect to Accuracy and Elapsed Time
5.5 Performance of Different Algorithms on Different Datasets
6 Conclusion
References
Anonymous Person Tracking Across Multiple Camera Using Color Histogram and Body Pose Estimation
1 Introduction
2 Person Re-identification Review
2.1 Single Camera Orientation
2.2 Multi-camera Orientation
2.3 Person Re-identification
3 Proposed Model Architecture
3.1 Color Features
3.2 Pose Estimation Features
4 Result and Discussion
4.1 Data Collection and Prepossessing
4.2 Extracting Persons Using YOLOv3
4.3 Matching Color Feature with Pose Feature
4.4 Experiment
5 Conclusion
References
Quantification of Groundnut Leaf Defects Using Image Processing Algorithms
1 Introduction
2 Literature Review
3 Collection of Groundnut Field Data Using UAV
4 Proposed Method and Analysis of Groundnut Leaf
4.1 Color Space Transformation
5 Conclusion
References
Performance Analysis of Different Loss Function in Face Detection Architectures
1 Introduction
2 Deep Learning in Face Detection
3 Loss Functions
3.1 Cross Entropy Loss
3.2 KL Divergence Loss
3.3 Mean Squared Error Loss
3.4 Huber Loss
4 Experimental Setup
4.1 Datasets
5 Result and Discussion
6 Conclusion
References
Convid-Net: An Enhanced Convolutional Neural Network Framework for COVID-19 Detection from X-Ray Images
1 Introduction
2 Related Studies
3 Methodology
3.1 Dataset
3.2 Data Preprocessing and Augmentation
3.3 Convid-Net
4 Experimental Analysis
5 Conclusion
References
Predicting Level of Visual Focus of Human's Attention Using Machine Learning Approaches
1 Introduction
2 Literature Review
3 Analysis of Attention Level Detection
4 System Architecture
5 Experimental Details
5.1 Data Collection
5.2 Classification Model
5.3 Result Analysis
6 Discussion
7 Conclusion
References
An Integrated CNN-LSTM Model for Bangla Lexical Sign Language Recognition
1 Introduction
2 Related Work
3 Methodology
3.1 Data Collection
3.2 Data Pre-processing
3.3 CNN-LSTM Integrated Model
3.4 System Implementation
4 Result and Discussion
4.1 CNN-LSTM Model on Bangla Sign Language (BSL) Dataset
4.2 CNN and Other CNN State of the Art Models on BSL Dataset
4.3 Comparison of Proposed CNN-LSTM with Other Models
4.4 Real Time Validation
5 Conclusion and Future Work
References
Deep Learning-Based Algorithm for Skin Cancer Classification
1 Introduction
2 Literature Review
3 Dataset
4 Methodology
4.1 Data Augmentation
4.2 Implementation and Training
4.3 Proposed Framework
5 Results
6 Conclusion and Future Work
References
Author Index