This book presents best selected papers presented at the International Conference on Paradigms of Computing, Communication and Data Sciences (PCCDS 2020), organized by National Institute of Technology, Kurukshetra, India, during 1–3 May 2020. It discusses high-quality and cutting-edge research in the areas of advanced computing, communications and data science techniques. The book is a collection of latest research articles in computation algorithm, communication and data sciences, intertwined with each other for efficiency.
Author(s): Mayank Dave, Ritu Garg, Mohit Dua, Jemal Hussien
Series: Algorithms for Intelligent Systems
Publisher: Springer
Year: 2021
Language: English
Pages: 1023
City: Cham
Committees
Patron
Advisory Committee
Organizing Committee
Organizing Chairs
Organizing Secretaries
Publicity Chairs
Foreword
Preface
Acknowledgements
Contents
About the Editors
Part IComputing
1 Real-Time Implementation of Enhanced Energy-Based Detection Technique
1 Introduction
2 System Architecture
3 Hardware Implementation
4 Experimental Results
4.1 Results of Simulation of Proposed Algorithm
4.2 Results of Real-Time Implementation of Proposed Algorithm
5 Conclusion
References
2 Pipeline Burst Detection and Its Localization Using Pressure Transient Analysis
1 Introduction
2 ProposedAlgorithm
2.1 Wavelet De-Noising
2.2 Wavelet Analysis for Burst Detection
2.3 CUSUM Algorithm
2.4 Burst Localization
2.5 Node Matrix Analysis
3 Results
4 Conclusion
References
3 Improving Machine Translation Using Parts-Of-Speech Tags and Dependency Parsing
1 Introduction
2 Proposed Machine Translation System
2.1 Parts-Of-Speech Tags
2.2 Dependency Parsed Tags
2.3 Mechanism of Machine Translation System Proposed
3 Experiment
3.1 Tagger System
3.2 Dataset
3.3 Training
3.4 Evaluation
4 Results
4.1 Advantages
4.2 Limitations
5 Conclusion and Future Work
References
4 Optimal Strategy for Obtaining Excellent Energy Storage Density in Polymer Nanocomposite Materials
1 Introduction
1.1 Ceramics
1.2 Polymers
2 Factors Affecting the Value of k, Eb of the Nano Composite
2.1 Size and Shape of Nano Fillers
2.2 Loading of Nano Fillers
2.3 Dispersion of Nano Fillers
2.4 Interfacial Relationship Between Nanoparticles and Polymer
3 Core Shell Structure
4 Multilayer Structure
5 Conclusion
References
5 A Study of Aging-Related Bugs Prediction in Software System
1 Introduction
2 Related Work
3 Elements of Experimental Methodology
3.1 Instance Filtering Technique (SMOTE)
3.2 Standardization
3.3 Used Classification Algorithms
3.4 Experimental Datasets
3.5 Performance Evaluation Measures
4 Results and Analysis
5 Conclusions
References
6 Mutual Authentication of IoT Devices Using Kronecker Product on Secure Vault
1 Introduction
2 Related Work
3 Security Issues and Challenges
4 Proposed Methodology
4.1 Assumption
4.2 Kronecker Product
4.3 Secure Vault
4.4 Pre-processing the Matrix
4.5 Deployment Phase
4.6 Key Calculation
4.7 Authentication Mechanism
4.8 Changing the Secure Vault
5 Performance Analysis
5.1 Storage Cost
5.2 Communication Cost
5.3 Computation Cost
6 Security Analysis
6.1 Construction of Kronecker Matrix
6.2 Man-in-The-Middle Attack
6.3 Next Password Prediction
6.4 Side-Channel Attack
7 Comparison of Authentication Mechanism
7.1 Storage of Secure Vault
7.2 Computation Cost
8 Conclusion and Future Work
References
7 Secure and Decentralized Crowdfunding Mechanism Based on Blockchain Technology
1 Introduction
2 Related Works
3 Preliminaries
3.1 Blockchain
3.2 Smart Contract
3.3 Ethereum
3.4 Asymmetric-Key Cryptography
3.5 Hash Function
3.6 Merkle Tree
3.7 Consensus Algorithms
4 The Proposed Crowdfunding Mechanism Based on Blockchain Technology
5 Discussion
6 Conclusion and Future Work
References
8 Efficient Use of Randomisation Algorithms for Probability Prediction in Baccarat Using: Monte Carlo and Las Vegas Method
1 Introduction
1.1 Methods to Generate Randomness
1.2 Classification of Randomisation Algorithms
1.3 Pthread Library
1.4 Baccarat
2 Related Works
3 Proposed Approach
3.1 Using Monte Carlo Method
3.2 Using Monte Carlo Method with Data Structures
3.3 Using Las Vegas Method
3.4 Using Las Vegas Method with Multithreading
3.5 Simulation of Baccarat
4 Result Analysis
5 Comparison of Algorithms
6 Conclusion and Future Scope
References
9 Comparative Analysis of Educational Job Performance Parameters for Organizational Success: A Review
1 Introduction
2 Educational Job Performance Data Mining Phases
3 Related Studies
4 Comparative Study of Educational Data Mining Tools, Techniques and Parameters
5 Analysis
6 Conclusion
References
10 Digital Anthropometry for Health Screening from an Image Using FETTLE App
1 Introduction
2 Related Work
3 System Overview
3.1 Adulthood Space
3.2 Baby Care Space
3.3 Immobilized Patients Anthropometry
3.4 Health Trends
4 High Level Implementation Architecture
5 Methodology
6 Experimental Results
7 Performance Analysis
8 Conclusion
References
11 Analysis and Redesign of Digital Circuits to Support Green Computing Through Approximation
1 Introduction
2 Previous Works and Rationale of Our Proposal
3 Proposed Method
4 Experimental Evaluation
5 Conclusion
References
12 Similarity-Based Data-Fusion Schemes for Missing Data Imputation in Univariate Time Series Data
1 Introduction
2 Related Work
3 Proposed Model
4 Results and Discussions
5 Validation of Imputation Technique
6 Conclusion and Future Work
References
13 Computational Study on Electronic Properties of Pd and Ni Doped Graphene
1 Introduction
2 Computational Methods
3 Results and Discussion
3.1 Geometry Optimization and Binding Energies
3.2 Electronic Properties
4 Conclusions
References
14 Design of an Automatic Reader for the Visually Impaired Using Raspberry Pi
1 Introduction
2 Related Works
3 System Design
3.1 Working Principle
3.2 Raspberry Pi 4 Model B
3.3 Used Components in Reader
3.4 Proposed Hardware Model
3.5 GPIO Interfacing
3.6 Proposed Approach
4 Result and Discussion
4.1 Getting Input Images and Output Text
4.2 Extracted Images and Generated Output
5 Conclusion and Future Work
References
15 Power Maximization Under Partial Shading Conditions Using Advanced Sudoku Configuration
1 Introduction
2 PV System Modeling
3 TCT connection
4 Advanced Sudoku
5 Performance Evaluation
6 Conclusion
References
16 Investigations on Performance Indices Based Controller Design for AVR System Using HHO Algorithm
1 Introduction
2 Automatic Voltage Regulator System Model
2.1 Linerazed Modelof AVR System [7]
3 HHO Algorithm [9]
3.1 Exploration Phase
3.2 Transition from Exploration to Exploitation
3.3 Exploitation Phase
4 HHO PID Controller
5 Results
6 Conclusion
References
17 Ethereum 2.0 Blockchain in Healthcare and Healthcare Based Internet-of-Things Devices
1 Blockchain in Healthcare
1.1 Literature Survey: Blockchain in Healthcare and Internet-of-Things
2 Proposed System Design for POS-Blockchain Based Healthcare System with IoT
3 Conclusion and Future Work
References
18 IoT-Based Solution to Frequent Tripping of Main Blower of Blast Furnace Through Vibration Analysis
1 Introduction
2 Problem Description
3 Extrapolative Study of the Problem
4 Root Cause of the Problem
5 Corrective Actions
6 Results
7 Conclusion
References
19 A Survey on Hybrid Models Used for Hydrological Time-Series Forecasting
1 Introduction
2 Hybrid Models for Forecasting Time Series Data: A Review
2.1 Review of Parallel Hybrid Structure in Time Series Forecasting
2.2 Review of Series Hybrid Structure in Time Series Forecasting
2.3 Review of Parallel-Series Hybrid Structure in Time Series Forecasting
3 Review of Latest Hybrid Models Used for Hydrological Time Series Forecasting
4 Future Work
5 Conclusion
References
20 Does Single-Session, High-Frequency Binaural Beats Effect Executive Functioning in Healthy Adults? An ERP Study
1 Introduction
2 Methodology
2.1 Procedure
2.2 EEG Data Acquisition
2.3 EEG Data Analysis
3 Results
3.1 Behavioral Measures
3.2 ERP Measures
3.3 Correlation Analysis
4 Discussion
5 Conclusion
References
21 Optimized Data Hiding for the Image Steganography Using HVS Characteristics
1 Introduction
2 Related Work
2.1 Optimized Data Hiding Technique
2.2 HVS Characteristics
3 Proposed Technique
4 Experimental Results
4.1 Visual Perceptibility Analysis
4.2 Visual Quality Analysis Parameters
4.3 Comparative Analysis with the Existing Techniques
5 Conclusion and Future Work
References
22 Impact of Imperfect CSI on the Performance of Inhomogeneous Underwater VLC System
1 Introduction
2 System Model
3 Outage Probability
4 ASEP Analysis
4.1 NI timesNM-RQAM
4.2 M-ary PAM
5 Numerical and Simulation Results
6 Conclusion
References
23 Pre-configured (p)-Cycle Protection for Non-hamiltonian Networks
1 Introduction
2 Basics of p-Cycle
3 Conventional Approach
3.1 Problems with the Conventional Approaches
4 Our Work
5 Results
6 Conclusion
References
24 A Novel Approach to Multi-authority Attribute-Based Encryption Using Quadratic Residues with Tree Access Policy
1 Introduction
2 Related Work
3 Motivation
4 Proposed Multi-authority Attribute-Based Encryption Scheme
4.1 Quadratic Residues
4.2 Tree-Based Access Policy
5 The Basic Steps of the Proposed Scheme
6 An Illustration of the Proposed Scheme to Cloud-Based Environment
7 Analysis and Limitations
8 Conclusion
References
25 An Improvement in Dense Field Copy-Move Image Forgery Detection
1 Introduction
1.1 Types of Image Forgeries
1.2 Copy-Move Image Forgery Detection
2 Related Work
3 Methodology
3.1 Preprocessing
3.2 Feature Extraction
3.3 Feature Matching
3.4 Post-processing
4 Experimental Setup, Results, and Discussions
5 Conclusion
References
26 Scheduling-Based Energy-Efficient Water Quality Monitoring System for Aquaculture
1 Introduction
2 Related Work
2.1 Power-Saving Methods
3 System Overview and Working
3.1 Hardware
4 Energy Saving Strategy
5 Performance Analysis
6 Conclusion
References
27 A Study of Code Clone Detection Techniques in Software Systems
1 Introduction
2 Clone Terminologies
2.1 Clone Relation Terminologies
2.2 Types of Clones
3 Literature Survey
4 The Rationale for Code Duplication
4.1 Advantages and Disadvantages of Clones
5 Clone Detection Process and Techniques
5.1 Clone Detection Process
5.2 Clone Detection Techniques
5.3 Discussion
6 Code Clone Evolution
7 Conclusions and Future Scope
References
28 An Improved Approach to Secure Digital Audio Using Hybrid Decomposition Technique
1 Introduction
1.1 Related Work
2 Proposed Methodology
2.1 Discrete Wavelet Transform (DWT)
2.2 Discrete Wavelet Transform (DCT)
2.3 Singular Value Decomposition (SVD)
2.4 Concept of Cyclic Codes
2.5 Arnold’s Cat Map Algorithm
3 Algorithm Design
3.1 Watermark Embedding Algorithm
3.2 Algorithm for Extraction
4 Experimental Results
5 Conclusion
References
29 Study on the Negative Transconductance in a GaN/AlGaN-Based HEMT
1 Introduction
2 Simulation Strategy
3 Results and Discussion
4 Conclusion
References
30 Hybrid Anti-phishing Approach for Detecting Phishing Webpage Hosted on Hijacked Server and Zero-Day Phishing Webpage
1 Introduction
1.1 Phishing Attack Process
1.2 Why Phishing Attack Works
2 Related Work
2.1 Blacklist Based Methods
2.2 Heuristic Based Methods
2.3 Machine Learning Methods
2.4 Hybrid Methods
2.5 Search Engine-Based Methods
3 Proposed Solution
3.1 Design Objective
3.2 System Architecture
3.3 Algorithm for Our Proposed Solution Is as Follows
4 Experiment Results
4.1 Implementation Detail
4.2 Classification of Webpages
4.3 Comparison with Existing Methods
5 Discussion
6 Conclusion
References
31 FFT-Based Zero-Bit Watermarking for Facial Recognition and Its Security
1 Introduction
2 Preliminaries
2.1 Method of Fast Fourier Transformation (FFT)
2.2 Singular Value Decomposition (SVD)
3 Proposed Scheme
3.1 Algorithm 1: Embedding Process
3.2 Algorithm 2: Extraction Process
4 Experimental Results
4.1 Correlation Coefficient
4.2 Normalized Correlation (NC)
4.3 Bit Error Rate (BER)
5 Conclusion
References
32 Comparative Analysis of Various Simulation Tools Used in a Cloud Environment for Task-Resource Mapping
1 Introduction
2 Related Work
2.1 Comparative Guidelines for Cloud Simulators
3 Cloud Environment
3.1 Cloud Simulators
4 Comparative Analysis of Various Variants of CloudSim on Different Parameters
4.1 Comparative Discussion
5 Conclusion and Future Scope
References
Part IICommunication
33 Study of Spectral-Efficient 400 Gbps FSO Transmission Link Derived from Hybrid PDM-16-QAM With CO-OFDM
1 Introduction
2 Simulation Setup
3 Numerical Results
4 Conclusion
References
34 4 × 10 Gbps Hybrid WDM-MDM FSO Transmission Link
1 Introduction
2 Simulation Setup
3 Results and Discussion
4 Conclusion
References
35 Task Scheduling in Cloud Computing Using Hybrid Meta-Heuristic: A Review
1 Introduction
2 Task Scheduling in Cloud
3 Optimization Techniques
3.1 Genetic Algorithm (GA)
3.2 Harmony Search Algorithm (HS)
3.3 Tabu Search (TS)
3.4 Particle Swarm Optimization (PSO)
3.5 Cuckoo Optimization Algorithm (COA)
3.6 Artificial Bee Colony (ABC)
3.7 Ant Colony Optimization (ACO)
3.8 Simulated Annealing (SA)
3.9 Bacteria Foraging Optimization Algorithm (BFO)
3.10 Gravitational Search Algorithm (GSA)
3.11 Lion Optimization Algorithm (LOA)
3.12 The Harmony Tabu Search (THTS)
3.13 Cuckoo Harmony Search Algorithm (CHSA)
3.14 Harmony-Inspired Genetic Algorithm (HIGA)
3.15 Genetic Algorithm-Particle Swarm Optimization (GA-PSO)
3.16 Multi-objective Hybrid Bacteria Foraging Algorithm (MHBFA)
3.17 Simulated Annealing Based Symbiotic Organisms Search (SASOS)
3.18 The Technique for Order of Preference by Similarity to Ideal Solution-Particle Swarm Optimization (TOPSIS-PSO)
3.19 Artificial Bee Colony Simulated Annealing (ABC-SA)
3.20 Genetic Algorithm Artificial Bee Colony (GA-ABC)
3.21 Cuckoo Gravitational Search Algorithm (CGSA)
3.22 Oppositional Lion Optimization Algorithm (OLOA)
3.23 Fuzzy System—Modified Particle Swarm Optimization (FMPSO)
4 Literature Review
5 Comparison of Performance Metrics
6 Conclusion
References
36 Modulation Techniques for Next-Generation Wireless Communication-5G
1 Introduction
2 5G Waveform Candidates
3 FBMC
4 UFMC
5 Conclusion
References
37 Muscle Artifact Detection in EEG Signal Using DTW Based Thresholding
1 Introduction
2 Methodology
2.1 Dynamic Time Warping (DTW)
2.2 Performance Parameters
3 Results
4 Conclusion
References
38 Human Activity Recognition in Ambient Sensing Using Sequential Networks
1 Introduction
2 Related Works
3 Methodology
3.1 Mini-Batch LSTM Approach
3.2 Deep LSTM Approach
3.3 Dataset
4 Results
5 Conclusion and Future Work
References
39 Towards the Investigation of TCP Congestion Control Protocol Effects in Smart Home Environment
1 Introduction
2 Related Work and Problem Formulation
3 Proposed Approach
4 Experimental Analysis
4.1 Simulation Tools
5 Conclusion and Future Works
References
40 Efficient Information Flow Based on Graphical Network Characteristics
1 Introduction
2 Related Work
3 Network Characteristics-Based Measures and Solutions
3.1 Graphical Modeling
3.2 Mapping Real-World Scenarios to Graph
3.3 Graphical Analysis Using Stanford Network Analysis Platform (SNAP)
4 Proposing Algorithmic Approaches for Information Flow in Network
4.1 Scenario 1: Rapid Information Propagation Through High Influential Nodes
4.2 Scenario 2: Controlling Information Propagation Through Nodes of Low Influence or Having Less Out-Degree
5 Conclusions and Future Scope
References
41 Tunable Optical Delay for OTDM
1 Introduction
2 All Pass Filter Delay Line
3 Literature Survey
4 APF Tunability
5 Three Stage All Pass Filter
6 OTDM System
7 Simulation Results
8 Conclusion
References
42 Game Theory Based Cluster Formation Protocol for Localized Sensor Nodes in Wireless Sensor Network (GCPL)
1 Introduction
2 Related Work
2.1 Localization of Sensor Node
2.2 Clustering Technique
3 Proposed Work
3.1 Definitions
3.2 Localization of Sensor Nodes Without GPS
3.3 Cluster Formation and Cluster Head Selection
4 Simulation Results
5 Conclusions
References
43 SGBIoT: Integration of Blockchain in IoT Assisted Smart Grid for P2P Energy Trading
1 Introduction
2 Related Work
3 Proposed Model
3.1 Basic Components
3.2 Overview
3.3 Architecture
3.4 Working Flow
3.5 Algorithm Explanation
4 Experimental Setup
5 Conclusion
References
44 Software Defined Network: A Clustering Approach Using Delay and Flow to the Controller Placement Problem
1 Introduction
2 Related Work
3 Problem Statement
4 Solution Approach and Algorithm
5 Results
6 Conclusion and Future Work
References
45 Netra: An RFID-Based Android Application for Visually Impaired
1 Introduction
1.1 System Architecture
2 Results
46 Efficient Routing for Low Power Lossy Networks with Multiple Concurrent RPL Instances
1 Introduction
2 Related Work
3 MEHOF
4 Results and Discussion
4.1 Simulation
4.2 Observation
5 Conclusion and Future Work
References
47 Deep Learning-Based Wireless Module Identification (WMI) Methods for Cognitive Wireless Communication Network
1 Introduction
2 System Model
2.1 Real-time Signal Acquisition
3 Deep Learning Models
3.1 CNN Architecture Model
3.2 LSTM Architecture Model
3.3 CLDNN Architecture Model
3.4 Implementation Detail
4 Results and Discussion
4.1 Performance Matrices
5 Conclusion and Future Work
References
48 Style Transfer for Videos with Audio
1 Introduction
1.1 What is Style Transfer?
1.2 Potential Applications of Style Transfer
1.3 Organization of This Paper
2 Related Work
2.1 Early Developments
2.2 Method for Image Style Transfer
3 Elements of Experimental Methodology
3.1 Dataset
3.2 Processing Technique
3.3 Method for Audio Style Transfer
4 Results and Analysis
4.1 Implementation Details
4.2 Comparison with Some Previous Methods
5 Conclusion
References
49 Development of Antennas Subsystem for Indian Airborne Cruise Missile
1 Introduction
2 Radio Altimeter
2.1 Radio Altimeter Results
3 Radio Telemetry
3.1 Radio Telemetry Results
4 IRNSS Antenna Design (L5 Band)
4.1 IRNSS L5 Band Results
5 IRNSS Antenna Design (S Band)
5.1 IRNSS S Band Results
6 Conclusion
References
50 A Literature Survey on LEACH Protocol and Its Descendants for Homogeneous and Heterogeneous Wireless Sensor Networks
1 Introduction
2 LEACH Protocol
3 Related Work
4 Descendants of Leach Routing Protocol: Overview
4.1 Performance Comparison Between LEACH Protocol and Its Descendents
5 Conclusion
References
51 Performance Study of Ultra Wide Band Radar Based Respiration Rate Measurement Methods
1 Introduction
1.1 Existing Methodologies
1.2 Key Contributions of This Paper
1.3 Organization of the Paper
2 Experimental Set-Up and Signal Database Creation
2.1 Experimental Set-Up
2.2 Validation Signal Database Creation
2.3 Characteristics of UWB Radar Signals
3 Respiration Rate Measurement Methods
3.1 Respiration-Related Bin Selection
3.2 Variational Mode Decomposition
4 Results and Discussion
4.1 Performance for Different Block Duration
4.2 Subject-Wise RR Estimation Performance
4.3 Performance Comparison
5 Conclusion
References
52 Secure Architecture for 5G Network Enabled Internet of Things (IoT)
1 Introduction
2 Overview of Fourth Generation (4G) and Fifth Generation 5(G) Enabled IoT Applications
3 Literature Review
4 Comparison of Architectures with Proposed Architecture
5 Proposed Architecture for Next Generation
5.1 Security Services of 5G—IoT
5.2 Quality of Services (QoS) of 5G—IoT
6 Conclusion and Future Work
References
Part IIIData Sciences
53 Robust Image Watermarking Using DWT and Artificial Neural Network Techniques
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Pre-processing
3.2 DWT Feature
3.3 Watermark Binary Conversion
3.4 Inverse S-Order
3.5 Embedding of Watermark
3.6 Training of EBPNN Neural Network
3.7 Embedded Image
4 Experiment and Result
4.1 Dataset
4.2 Evaluation Parameter
4.3 Results
5 Conclusions
References
54 Fraud Detection in Anti-money Laundering System Using Machine Learning Techniques
1 Introduction
2 AML System Architecture
3 Machine Learning Techniques
3.1 Support Vector Machine (SVM)
3.2 Logistic Regression
3.3 Average Perceptron
3.4 Neural Network
3.5 Decision Tree
3.6 Random Forest
4 Experimental Work
4.1 Dataset
4.2 Experimental Setup
5 Result Analysis
6 Conclusion
References
55 A Smart Approach to Detect Helmet in Surveillance by Amalgamation of IoT and Machine Learning Principles to Seize a Traffic Offender
1 Introduction
2 Literature Review
3 Methodology
3.1 System Overview
3.2 System Architecture
3.3 System Details
4 Archetype Pre and Post Validation
4.1 System Integration
4.2 Product Validation
5 Conclusion and Future Work
References
56 Botnet Detection Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Botnet Architecture
3.1 Centralized Network
3.2 Peer-to-Peer (P2P) Network
3.3 Hybrid Network
4 DataSet
4.1 Feature Selection
5 Experimental Results
5.1 Performance Evaluation and Results
5.2 ROC Curve
5.3 CAP Curve
6 Conclusion and Future Works
References
57 Estimation of Daily Average Global Solar Radiance Using Ensemble Models: A Case Study of Bhopal, Madhya Pradesh Meteorological Dataset
1 Introduction
1.1 Background
2 Literature Review
3 Proposed Model
3.1 Ensemble Models
3.2 Data Preprocessing and Attribute Correlation
3.3 Random Forest Regressor
3.4 AdaBoost Regressor
4 Results and Discussions
4.1 Graphical Analysis
5 Conclusions
References
58 Text Localization in Scene Images Using Faster R-CNN with Double Region Proposal Networks
1 Introduction
2 Literature Survey
3 Proposed Method
3.1 Double RPN
3.2 Merging of RPNs
3.3 Training Scheme
4 Experimental Result Analysis
4.1 Text Detection Results
4.2 Wrong Detection
4.3 Comparative Performance Analysis
5 Conclusion and Future Works
References
59 Event Classification from the Twitter Stream Using Hybrid Model
1 Introduction
2 Related Work
2.1 Gated Recurrent Networks
3 Proposed Framework
3.1 Data Collection
3.2 Hybrid Deep Neural Network
4 Performance Evaluation of Proposed Framework
5 Result Analysis
5.1 Computational Complexity
6 Conclusion
References
60 Using an Ensemble Learning Approach on Traditional Machine Learning Methods to Solve a Multi-Label Classification Problem
1 Introduction
2 Related Works
3 Dataset Description
4 Proposed Process Workflow
5 Combining Methods Used in Ensemble Model
5.1 Naive Bayes Classifier
5.2 Random Forest Classifier
5.3 XGBoost Classifier
6 Experimentation
6.1 Evaluation Metrics
6.2 Dummy Model and Baselining
6.3 Experimental Results
6.4 Ensemble Learning Using Voting Classifier
7 Conclusion and Future Works
References
61 Automatic Building Extraction from High-Resolution Satellite Images Using Deep Learning Techniques
1 Introduction
2 Related Literature
3 Methodology
3.1 U-Net
3.2 Residual Unet (ResUnet)
3.3 Customizations in Original U-Net and ResUnet Architectures
4 Experiments and Analysis
4.1 Dataset Used
4.2 Evaluation Metrics
4.3 Comparison
4.4 Result Analysis
5 Conclusion
References
62 Epileptic Seizures Classification Based on Deep Neural Networks
1 Introduction
1.1 Deep Learning
1.2 Deep Neural Network Architectures
2 Proposed Methodology
3 Results
4 Conclusion
References
63 Analysis for Malicious URLs Using Machine Learning and Deep Learning Approaches
1 Introduction
2 Related Work
3 Malicious URL Detection Using Machine Learning
4 K-Nearest Neighbor (KNN) Classifier
4.1 Naive Bayes
4.2 Support Vector Machines (SVM)
4.3 Linear Regression
4.4 Decision Tree
4.5 Logistic Regression
4.6 Random Forests
4.7 Adaptive Boosting (AdaBoost)
5 Malicious URL Detection Using Deep Learning
6 Open Problems
7 Conclusion
References
64 Engaging Smartphones and Social Data for Curing Depressive Disorders: An Overview and Survey
1 Introduction
2 Overview
2.1 Inputs
2.2 Social Media Data Extraction
2.3 Sentiment Analysis Technique
2.4 Prediction/Recommendation Technique
3 Related Work
3.1 Prediction Through Mobile Phone Usage Patterns
3.2 Prediction Through Social Media
3.3 Activity Recommendation
4 Discussion and Proposal
5 Conclusion
References
65 Transfer Learning Approach for the Diagnosis of Pneumonia in Chest X-Rays
1 Introduction
2 Literature Survey
3 Model Architecture
4 Material and Methodology
4.1 Image Preprocessing and Data Augmentation
4.2 Methodology
5 Results and Discussion
6 Conclusion and Future Scope
References
66 Physical Sciences: An Inspiration to the Neural Network Training
1 Introduction
2 Proposed Work
3 Experimental Results
4 Conclusion
References
67 Deep Learning Models for Crop Quality and Diseases Detection
1 Introduction
2 Background
3 Materials and Methods
3.1 Input Data
3.2 Preprocessing
3.3 AlexNet
3.4 ResNet50
3.5 Parameter
4 Result and Analysis
4.1 Results of AlexNet
4.2 Results of ResNet
4.3 Comparison of AlexNet and ResNet50 Results
5 Conclusion
References
68 Clickedroid: A Methodology Based on Heuristic Approach to Detect Mobile Ad-Click Frauds
1 Introduction
2 Proposed Methodology
2.1 Terminologies Related to the Proposed Methodology
3 Implementation
4 Results and Discussion
5 Literature Survey and Comparisons
6 Conclusion and Future Direction of Work
References
69 Machine Translation System Using Deep Learning for Punjabi to English
1 Introduction
2 Literature Survey
3 Corpus Development
3.1 WMT 2015 English Corpus
3.2 Brills Bilingual Newspaper
3.3 TDIL Corpus
3.4 Gyan Nidhi Corpus
3.5 Corpus Statistics
4 Experiments
4.1 Set-Up
4.2 Dataset Details
4.3 Data Pre-processing
4.4 Training Details
4.5 Results
5 Conclusion and Future Work
References
70 The Agile Deployment Using Machine Learning in Healthcare Service
1 Introduction
1.1 Challenges of Traditional Model and Agile Deployment
2 Principles Agile with Machine Learning
3 Literature Review
4 Problem Statements
5 How Machine Learning Affect Agile Development
6 Proposed Actuarial Model in Healthcare
7 Advantage of Actuarial Model in Healthcare
8 Conclusion and Future Scope
References
71 Pneumonia Detection Using MPEG7 for Feature Extraction Technique on Chest X-Rays
1 Introduction
2 Dataset Description
3 Related Works
4 Experimental Setup
4.1 Feature Extraction Stage: MPEG7 (Moving Picture Experts Group (Version 7))
4.2 Data Preprocessing Stage: Principal Component Analysis (PCA)
4.3 Architecture: Artificial Neural Network (ANN)
5 Model
6 Result and Discussion
7 Conclusion
References
72 Comparative Study of GANs Available for Audio Classification
1 Introduction to GANs
2 Audio GANs
2.1 WaveGAN
2.2 SpecGAN
2.3 Segan
3 Comparative Study
4 Conclusion
References
73 Extractive Summarization of EHR Notes
1 Introduction
1.1 Types of Summarization
1.2 Main Challenges in Summarization
2 Related Work
3 Proposed Extractive Summarization Technique
3.1 Dataset
3.2 Implementation
4 Results and Future Work
5 Conclusion
References
74 Feature Selection and Hyperparameter Tuning in Diabetes Mellitus Prediction
1 Introduction
2 Literature Work
3 Dataset Description
3.1 PIMA Indian Diabetes Dataset
3.2 Dataset Attributes Description
4 Dataset Visualization
5 Proposed Model
5.1 Data Cleaning and Transformation
5.2 Feature Selection
5.3 Hyperparameter Tuning
5.4 Model Evaluation
6 Conclusion
References
75 Contribution Title a Correlational Diagnosis Prediction Model for Detecting Concurrent Occurrence of Clinical Features of Chikungunya and Zika in Dengue Infected Patient
1 Introduction
1.1 Clinical Feature of Dengue
1.2 Clinical Feature of Chikungunya
1.3 Clinical Feature of Zika
1.4 Diagnosis Methodology for Concurrent Detection of Dengue, Chikungunya and Zika Virus Infection
2 Relative Work
3 Propose Model
4 Experiment Setup
4.1 Inference Engine for Diagnose Co Infection of Dengue, Zika and Chikungunya
4.2 Validation Results
5 Conclusion
References
76 Image Filtering Using Fuzzy Rules and DWT-SVM for Tumor Identification
1 Introduction
2 Proposed Method
2.1 FCM (Fuzzy C Means) Segmentation
2.2 Filtering Using Median Filter
2.3 Discrete Wavelet Transform (DWT) for Feature Extraction
2.4 Feature Reduction
2.5 SVM Classifier
3 Results and Discussion
4 Simulation Result
5 Conclusion
References
77 Multi-Class Classification of Actors in Movie Trailers
1 Introduction
2 Related Work
2.1 Face Detection
2.2 Face Tracking
2.3 Face Recognition
3 Dataset
4 Methodology
4.1 Convolutional Layer
4.2 Pooling Layer
4.3 ReLU Layer
4.4 Fully Connected Layer
5 Proposed Algorithm
6 Results and Discussion
6.1 Training
6.2 Testing
7 Conclusion and Future Work
References
78 Analysis of Machine Learning and Deep Learning Approaches for DDoS Attack Detection on Internet of Things Network
1 Introduction
1.1 Attack Motivation on IoT Devices
2 Attacks on IoT Network Using Botnet
3 Machine Learning-Based Approaches for DDoS Attack Defense on IoT
3.1 Suggestions to Mitigate a DDoS Attack [18]
4 Open Issues and Challenges
5 Conclusion
References
79 Image Retrieval Systems: From Underlying Feature Extraction to High Level Intelligent Systems
1 Introduction and Motivation
2 Feature Extraction Techniques
3 Performance Evaluation Metrics
4 Hybrid CBIR Systems and Their Performance
5 Hybrid and Intelligent CBIR Systems with Their Performance
6 Semantic Gap Reduction
7 Conclusion, Issues and Future Scope
References
80 A Combined Model of ARIMA-GRU to Forecast Stock Price
1 Introduction
2 Related Work
3 Proposed Method
3.1 Principle of Auto-Regressive Integrated Moving Average
3.2 Support Vector Machine
3.3 Gated Recurrent Unit
3.4 Fitting Input Stock Data with ARIMA Model
3.5 Forecasting Using SVM
3.6 Forecasting Using GRU
4 Results
4.1 Experimental Dataset
4.2 Experimental Environment
4.3 Experimental Results
4.4 Comparison of Results
5 Conclusion
References
Author Index