Keywords:
Computational intelligence-Congresses.
;
Artificial intelligence-Congresses.
;
Electronic books.
Type of Medium:
Online Resource
Pages:
1 online resource (889 pages)
Edition:
1st ed.
ISBN:
9789811630712
Series Statement:
Advances in Intelligent Systems and Computing Series ; v.1394
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=6714618
Language:
English
Note:
Intro -- ICICC-2021 Steering Committee Members -- Preface -- Contents -- Editors and Contributors -- Explanation-Based Serendipitous Recommender System (EBSRS) -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Approach -- 3.1 Phase I: User Assessment Phase -- 4 Experiments, Evaluation and Comparative Analysis -- 5 Conclusion -- References -- Introduction of Feature Selection and Leading-Edge Technologies Viz. TENSORFLOW, PYTORCH, and KERAS: An Empirical Study to Improve Prediction Accuracy of Cardiovascular Disease -- 1 Introduction -- 2 Methods and Materials -- 3 Empirical Results and Discussion -- 3.1 Utilization of Leading-Edge Technologies Viz. TENSORFLOW, PYTORCH, and KERAS -- 4 Conclusion -- References -- Campus Placement Prediction System Using Deep Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Technique -- 4 Results and Discussion -- 5 Conclusion -- References -- Intensity of Traffic Due to Road Accidents in US: A Predictive Model -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Experimentation and Results -- 4.1 Data Sources -- 4.2 Feature Selection -- 4.3 Exploratory Data Analysis -- 5 Machine Learning Modelling -- 6 Conclusions and Future Directions -- References -- Credit Card Fraud Detection Using Blockchain and Simulated Annealing k-Means Algorithm -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Blockchain -- 3.2 k-Means Clustering Algorithm -- 3.3 Simulated Annealing -- 4 Experimental Work -- 4.1 Dataset -- 4.2 Proposed Work -- 4.3 Results -- 5 Conclusion -- References -- Improving Accuracy of Deep Learning-Based Compression Techniques by Introducing Perceptual Loss in Industrial IoT -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Overall Architecture -- 3.2 Autoencoder Architecture -- 3.3 Loss Functions -- 3.4 Lossless Compression Algorithm.
,
4 Experimental Results -- 5 Conclusion -- References -- Characterization and Prediction of Various Issue Types: A Case Study on the Apache Lucene System -- 1 Introduction -- 2 Related Work and Research Contribution -- 2.1 Related Work -- 2.2 Research Contribution -- 3 Experimental Details -- 4 Research Questions -- 4.1 RQ1: What is the Distribution of Different Categories (e.g., Bug, Documentation, Improvement, etc.) Among All the Issue Reports? -- 4.2 RQ2: Are There Any Distinguishing Terms that Differentiate Various Issue Categories? -- 4.3 RQ3: Is There Any Significant Difference Between Mean Time to Repair (MTTR) of Different Issue Categories? -- 4.4 RQ4: What is the Performance of Classic and Ensemble Classifiers for Issue-Type Classification -- 4.5 RQ5: How Much Time Do Classic and Ensemble Machine Learning Algorithms Take in Training and Prediction? -- 5 Conclusion and Future Work -- References -- Heart Disease Prediction Using Machine Learning Techniques: A Quantitative Review -- 1 Introduction -- 2 Machine Learning Algorithms Used in Heart Disease Prediction, Diagnosis, and Treatment -- 2.1 Decision Tree -- 2.2 Naïve Bayes -- 2.3 Support Vector Machine (SVM) -- 2.4 K-Nearest Neighbor -- 2.5 Random Forest (RF) -- 3 Literature Review -- 4 Discussion -- 4.1 Comparative Representation of Various Machine Learning Methodologies Based on Accuracy -- 5 Research Gaps/Problems Identified -- 6 Conclusion -- References -- Enhancing CNN with Pre-processing Stage in Illumination-Invariant Automatic Expression Recognition -- 1 Introduction -- 2 Image Pre-processing Techniques -- 2.1 Histogram Equalization -- 2.2 Discrete Cosine Transform Normalization -- 2.3 Rescaled DCT Coefficients -- 3 Convolutional Neural Network -- 4 Implementation and Result Discussion -- 5 Conclusion -- References -- An Expert Eye for Identifying Shoplifters in Mega Stores.
,
1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 3.1 Inception V3 -- 3.2 Long Short Term Memory (LSTM) -- 4 Experimentation and Result Analysis -- 5 Conclusion -- References -- Sanskrit Stemmer Design: A Literature Perspective -- 1 Introduction -- 2 Background Study -- 2.1 NLP: Natural Language Processing -- 2.2 Stemming -- 2.3 Stemmer -- 2.4 Stem -- 2.5 Affix -- 2.6 Over-Stemming, Under-Stemming, Miss-Stemming -- 2.7 Sanskrit Stemmer -- 3 Literature Review -- 3.1 A Comparative Study of Stemming Algorithms ch11comparativestudy -- 3.2 A Fast Corpus-Based Stemmer ch11corpusBased -- 3.3 A Hybrid Inflectional and a Rule-Based Derivational Gujarati Stemmers ch11gujaratiStemmer -- 3.4 A Stemmer-Based Lemmatizer for Gujarati Text ch11stemmatizer -- 3.5 Text Stemming: Approaches, Applications, and Challenges ch11textStemmingApproaches -- 3.6 Stemmers for Indic Languages: A Comprehensive Analysis ch11comprehensiveAnalysisOfStemmers -- 3.7 Rule-Based Derivational Stemmer for Sindhi Devanagari Using Suffix Stripping Approach ch11sindhiDevanagiriScript -- 4 Proposed Sanskrit Stemmer Design -- 5 Conclusion and Future Scope -- References -- Predicting Prior Academic Failure of Students' Using Machine Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Data and Sources of Data -- 3.2 Proposed Methodology -- 3.3 Pre-processing Techniques -- 3.4 Classification Techniques -- 4 Results and Discussion -- 4.1 Experimental Results -- 4.2 Comparison of Classification Techniques -- 5 Conclusion -- References -- Deep Classifier for News Text Classification Using Topic Modeling Approach -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Dataset -- 3.2 Proposed Methodology -- 3.3 Data Pre-processing -- 3.4 Feature Extraction -- 3.5 Classification Techniques -- 4 Results and Discussion -- 5 Conclusion.
,
References -- Forecasting Covid-19 Cases in India using Multivariate Hybrid CNN-LSTM Model -- 1 Introduction -- 2 Windowing -- 3 The Proposed Model -- 4 Dataset Description -- 5 Experimental Results and Discussion -- 5.1 COVID-19 Forecasting -- 6 Conclusion -- References -- Multi-resolution Video Steganography Technique Based on Stationary Wavelet Transform (SWT) and Singular Value Decomposition (SVD) -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Stationary Wavelet Transform -- 3.2 Singular Value Decomposition -- 3.3 The Proposed Method -- 3.4 Embedding Process Steps -- 3.5 Extraction Process Steps -- 4 Experimental Results -- 4.1 Performance Criteria -- 4.2 Results and Discussion -- 5 Conclusion -- References -- A Novel Dual-Threshold Weighted Feature Detection for Spectrum Sensing in 5G Systems -- 1 Introduction -- 2 Proposed Dual-Threshold Weighted Feature Detection (DTWFD) System Model -- 3 SNR-Based Weighted Factor Algorithm for Double Threshold Weighted Feature Detection (DTWFD) -- 4 Performance Evaluation -- 5 Conclusion -- References -- A Systematic Review on Various Attack Detection Methods for Wireless Sensor Networks -- 1 Introduction -- 2 Background Study -- 2.1 Review on Attack Detection Techniques for WSNs -- 2.2 Review on Various Attack Detection Methods Based on Clustering Techniques for WSN -- 2.3 Review on Various Attack Detection Methods Based on Authentication Protocols for WSN -- 3 Issues from Existing Methods -- 4 Solution -- 5 Results and Discussion -- 6 Conclusion -- References -- Electronic Beam Steering in Timed Antenna Array by Controlling the Harmonic Patterns with Optimally Derived Pulse-Shifted Switching Sequence -- 1 Introduction -- 2 Theory and Mathematical Background -- 2.1 Switching Sequences -- 2.2 Cost Function Formulation -- 3 Numerical Results and Discussion.
,
3.1 Case 1: Steered Patterns at ± 10° -- 3.2 Case 2: Steered Patterns at ± 20° -- 3.3 Case 3: Steered Patterns at ± 30° -- 4 Conclusion -- References -- Classification of Attacks on MQTT-Based IoT System Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Resources and Methods -- 3.1 Data Collection -- 3.2 Theoretical Considerations -- 3.3 Evaluation Criteria -- 4 Outcome of the Applied Model -- 4.1 Attack Classification Results and Analysis -- 4.2 Criteria for Detection -- 4.3 Detection Results -- 5 Conclusions and Future Scope -- References -- Encrypted Traffic Classification Using eXtreme Gradient Boosting Algorithm -- 1 Introduction -- 2 Literature Review -- 3 The Proposed System -- 4 Experiments and Results -- 5 Conclusion -- References -- Analyzing Natural Language Essay Generator Models Using Long Short-Term Memory Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Used and Data Preprocessing -- 3.2 Embeddings -- 3.3 Approach -- 4 Experiment -- 4.1 Experimental Settings -- 4.2 Evaluation Metrics -- 5 Experimental Result -- 6 Conclusion -- References -- Performance Evaluation of GINI Index and Information Gain Criteria on Geographical Data: An Empirical Study Based on JAVA and Python -- 1 Introduction -- 2 Decision Tree -- 3 Splitting Benchmarks -- 3.1 Information Gain -- 3.2 GINI Coefficient -- 4 Related Work -- 5 Dataset -- 5.1 Evaluation-Information Gain Versus GINI Index -- 5.2 Information Gain -- 5.3 GINI Coefficient -- 6 Decision Tree Implementation: An Empirical Examination of Python and Java -- 6.1 Implementation Using Information Gain -- 6.2 Implementation Using GINI Index -- 7 Minimum Descriptive Length (MDL) Pruning -- 8 Experimental Results and Performance Comparison -- 8.1 Performance: Python Versus Java -- 9 Conclusion and Future Work -- References.
,
Critical Analysis of Big Data Privacy Preservation Techniques and Challenges.
Permalink