LEADER 12099nam 2200517 i 4500001 99125540737506421 005 20240509154914.0 006 m o d | 007 cr#cnu|||||||| 008 211010s2021 si a ob 001 0 eng d 020 981-336-176-X 035 (CKB)4100000011797607 035 (MiAaPQ)EBC6516173 035 (Au-PeEL)EBL6516173 035 (OCoLC)1243550943 035 (PPN)254721818 035 (EXLCZ)994100000011797607 040 MiAaPQ |beng |erda |epn |cMiAaPQ |dMiAaPQ 050 4 Q342 |b.B438 2021 082 0 929.60 |223 245 00 International conference on intelligent and smart computing in data analytics : |biscda 2020 / |cedited by Siddhartha Bhattacharyya, 4 others. 264 1 Singapore : |bSpringer, |c[2021] 264 4 |c©2021 300 1 online resource (301 pages) : |billustrations 336 text |btxt |2rdacontent 337 computer |bc |2rdamedia 338 online resource |bcr |2rdacarrier 490 1 Advances in Intelligent Systems and Computing ; |vv.1312 588 Description based on print version record. 504 Includes bibliographical references and index. 505 0 Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Performance Analysis of Machine Learning Algorithms Over a Network Traffic -- 1 Introduction -- 2 Literature Survey -- 3 Problem Specifications -- 4 Implementation -- 4.1 The Dataset -- 4.2 The Supervised Learning -- 4.3 The Multilayer Perceptron (MLP) -- 4.4 The Random Forest Classifier -- 4.5 The Support Vector Machine (SVM) -- 5 The Performance Evaluation and Results -- 5.1 The Accuracy -- 6 Conclusion and Future Work -- References -- Binary PSO-Based Feature Selection and Neural Network for Parkinson's Disease Prediction -- 1 Introduction -- 2 Methodology -- 2.1 Neural Networks -- 3 Results and Discussions -- 4 Conclusion -- References -- An Evolutionary-Based Additive Tree for Enhanced Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Novel Defense Framework for Cross-layer Attacks in Cognitive Radio Networks -- 1 Introduction -- 1.1 AI for Cognitive Radio Networks -- 2 Related Works -- 3 Attack Models -- 3.1 PHY Layer Attack Model -- 3.2 Defense Scheme -- 3.3 MAC Layer Attack Model -- 3.4 Defense Scheme -- 3.5 Cross-Layer Attack -- 3.6 Cross-Layer Defense -- 4 Results -- 4.1 Simulation Setup -- 4.2 Results -- 5 Conclusion -- References -- Texture Based Image Retrieval Using GLCM and LBP -- 1 Introduction -- 2 Theoretical Background -- 2.1 Gray Level Co-occurrence Matrixes (GLCM) -- 2.2 Local Binary Patterns (LBP) -- 3 Experimental Results -- 3.1 Statistical Analysis -- 4 Conclusion -- Reference -- Design and Development of Bayesian Optimization Algorithms for Big Data Classification Based on MapReduce Framework -- 1 Introduction -- 2 Correlative Naive Bayes Classifier (CNB) -- 3 Cuckoo Grey Wolf Optimization with Correlative Naïve Bayes Classifier (CGCNB). 505 8 4 Fuzzy Correlative Naive Bayes Classifier (FCNB) -- 5 Holoentropy Using Correlative Naïve Bayes Classifier for a Big Data Classification (HCNB) -- 6 Results and Discussion -- 6.1 Performance Evaluation -- 7 Conclusion -- References -- An IoT-Based BLYNK Server Application for Infant Monitoring Alert System to Detect Crying and Wetness of a Baby -- 1 Introduction -- 2 Related Work -- 3 The Proposed Architecture of Baby Monitoring System -- 3.1 Baby Cry Detection Algorithm -- 3.2 Wetness Detection Algorithm -- 4 Experimental Results -- 4.1 Noise Detection by the System -- 4.2 Playing Songs -- 4.3 Wetness Detection -- 4.4 Turning on the Fan -- 5 Conclusions and Future Work -- References -- Analysis of DEAP Dataset for Emotion Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Foundations -- 3 Procedure -- 4 Results -- 5 Conclusions and Discussions -- References -- A Machine Learning Approach for Air Pollution Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Analysis of Linearity and Correlation Between Gases Using Machine Learning -- 5 Conclusions -- References -- Facial Expression Detection Model of Seven Expression Types Using Hybrid Feature Selection and Deep CNN -- 1 Introduction -- 1.1 Edge Detection and CNN -- 2 Related Work -- 3 Proposed Model -- 3.1 About the Model -- 3.2 Data Flow of the Model -- 3.3 Proposed Algorithm and Model -- 3.4 FaceImgRecog Advanced -- 4 Experiment and Results -- 4.1 Dataset and Execution -- 4.2 Graphical Representation of Results -- 4.3 Comparison Table -- 5 Conclusion and Future Work -- References -- A Fuzzy Approach for Handling Relationship Between Security and Usability Requirements -- 1 Introduction -- 2 Relationship Between Usability and Security -- 2.1 Usability -- 2.2 Security -- 3 Fuzzy Approach to Develop Usable-Secure System -- 4 Implementation and Results -- 5 Conclusion -- References. 505 8 Naive Bayes Approach for Retrieval of Video Object Using Trajectories -- 1 Introduction -- 2 Motivations -- 2.1 Literature Review -- 2.2 Research Gaps -- 3 Proposed Method -- 3.1 Object Tracking Based on Hybrid NSA-NARX Model -- 3.2 Retrieval of Objects Using the Naive Bayes Classifier -- 4 Results and Discussion -- 4.1 Performance Metrics -- 4.2 Comparative Analysis -- 5 Conclusion -- References -- Mobility-Aware Clustering Routing (MACRON) Algorithm for Lifetime Improvement of Extensive Dynamic Wireless Sensor Network -- 1 Related Work -- 1.1 Need of Scheduling in Wireless Sensor Network -- 2 Proposed Work -- 2.1 Proposed Algorithm -- 3 Results -- 4 Conclusion -- References -- An Extensive Survey on IOT Protocols and Applications -- 1 Introduction -- 2 Related Work -- 3 Block Diagram of IOT -- 4 Applications of IOT -- 5 IOT Protocols at Different Layers -- 6 Conclusion -- References -- Review on Cardiac Arrhythmia Through Segmentation Approaches in Deep Learning -- 1 Introduction -- 2 Survey Over Various Heart Sound Detection Techniques -- 2.1 Heart Sound Detection Using Empirical Mode Decomposition -- 2.2 Heart Sound Detection Through Tunable Quality Wavelet Transform (TQWT) -- 2.3 Heart Sound Detection Using Feature Extraction -- 3 Comparative Analysis of Various Segmentation Approaches Used in HS Detection -- 3.1 Heart Sound Detection Based on S-Transform -- 3.2 Classification Techniques for Heart Sound Detection -- 4 Heart Sound Detection Using Deep Learning Approaches -- 5 Conclusion -- References -- Fast Medicinal Leaf Retrieval Using CapsNet -- 1 Introduction -- 2 Proposed Approach -- 2.1 Pre-processing -- 2.2 CapsNet Design and Training Process -- 3 Experimental Setup and Results -- 3.1 Evaluation Parameters -- 4 Conclusion -- References -- Risk Analysis in Movie Recommendation System Based on Collaborative Filtering. 505 8 1 Recommendation System -- 1.1 Types of Recommendation System -- 2 Implementation -- 2.1 Single Objective Using Java -- 2.2 Multiobjective Using Python -- 3 Conclusion -- References -- Difficult on Addressing Security: A Security Requirement Framework -- 1 Introduction of the Security -- 2 The Need of Software Security and Existing Research Approach -- 3 Framework for Software Security in Requirement Phase -- 4 The Proposed Security Requirement Framework (SRF) -- 5 The FrameWork -- 6 Validation of the Framework -- 7 Conclusion -- References -- Smart Eye Testing -- 1 Introduction -- 2 Literature Review -- 3 Implementation -- 4 Results -- 5 Conclusion -- References -- Ameliorated Shape Matrix Representation for Efficient Classification of Targets in ISAR Imagery -- 1 Introduction -- 2 Ameliorated Shape Matrix Representation -- 2.1 Finding the Axis-of-Reference -- 2.2 Finding Rmax and Rmin -- 2.3 Shape Matrix Generation -- 2.4 Classification -- 3 Experimental Results -- 4 Conclusion -- References -- Region-Specific Opinion Mining from Tweets in a Mixed Political Scenario -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Wrangling -- 3.3 Preprocessing -- 3.4 Sentiment Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- Denoising of Multispectral Images: An Adaptive Approach -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Experimental Results -- 5 Conclusions -- References -- Digital Watermarking to Protect Deep Learning Model -- 1 Introduction -- 2 Literature Survey -- 3 Convolution Neural Network Model -- 3.1 Image Pre-processing and Data Generation -- 3.2 Training the Fully Connected Neural Network -- 4 Proposed Methodology -- 4.1 Watermarking the Neural Network -- 4.2 Implementation -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References. 505 8 Sequential Nonlinear Programming Optimization for Circular Polarization in Jute Substrate-Based Monopole Antenna -- 1 Introduction -- 2 Proposed Antenna Design and Parametric Analysis -- 3 Optimization Using SNLP Optimizer -- 3.1 Optimizing the Variable S, UL, and UW -- 4 Conclusion -- References -- Genetic Algorithm-Based Optimization in the Improvement of Wideband Characteristics of MIMO Antenna -- 1 Introduction -- 2 Antenna Designing -- 3 Genetic Algorithm Optimizer Analysis -- 3.1 Optimizing the Parameter BP1, BP2, and LP1 -- 4 Conclusion -- References -- Design and Analysis of Optimized Dimensional MIMO Antenna Using Quasi-Newton Algorithm -- 1 Introduction -- 2 Antenna Designing -- 3 Quasi-Newton Optimizer Analysis -- 3.1 Optimizing the Parameter of RL and Rw -- 4 Conclusion -- References -- Preserving the Forest Natural Resources by Machine Learning Intelligence -- 1 Introduction -- 2 Discussion on Existing Algorithms -- 2.1 Polyphonic Detection Systems -- 2.2 Classification Techniques -- 2.3 Mel-Frequency Cepstral Coefficients (MFCC) -- 2.4 K-Nearest Neighbour Method -- 2.5 Deep Neural Networks (DNN) -- 3 Analysis on Sound Event in Forest Environment -- 4 Conclusion -- References -- Comprehensive Study on Different Types of Software Agents -- 1 Introduction -- 2 Related Work and Discussion -- 2.1 Collaborative Agents -- 2.2 Interface Agents -- 2.3 Mobile Agent -- 2.4 Information/Internet Agents -- 2.5 Reactive Agents -- 2.6 Hybrid Agents -- 2.7 Smart Agents -- 3 Implementation of Software Agent -- 3.1 Overview -- 3.2 Algorithm -- 4 Result -- 5 Conclusion -- References -- Hybrid Acknowledgment Scheme for Early Malicious Node Detection in Wireless Sensor Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Algorithm -- 5 Increased Network Lifetime -- 6 Enhanced Throughput -- 7 Conclusion -- References. 505 8 Prediction of Temperature and Humidity Using IoT and Machine Learning Algorithm. 650 0 Artificial intelligence. 650 0 Computational intelligence. 650 0 Signal processing. 650 7 Intel·ligència artificial |2thub 650 7 Intel·ligència computacional |2thub 650 7 Processament de senyals |2thub 655 7 Llibres electrònics |2thub 776 |z981-336-175-1 700 1 Bhattacharyya, Siddhartha, |d1975- |eeditor. 830 0 Advances in Intelligent Systems and Computing 906 BOOK