1.

Record Nr.

UNINA9910508457703321

Autore

Nanda Priyadarsi

Titolo

Data Engineering for Smart Systems : Proceedings of SSIC 2021

Pubbl/distr/stampa

Singapore : , : Springer Singapore Pte. Limited, , 2022

©2022

ISBN

9789811626418

9789811626401

Descrizione fisica

1 online resource (680 pages)

Collana

Lecture Notes in Networks and Systems Ser. ; ; v.238

Altri autori (Persone)

VermaVivek Kumar

SrivastavaSumit

GuptaRohit Kumar

MazumdarArka Prokash

Soggetti

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Preface -- Contents -- Editors and Contributors -- Using Machine Learning, Image Processing and Neural Networks to Sense Bullying in K-12 Schools: Enhanced -- 1 Introduction -- 2 Methodology of Research and Solution Development -- 2.1 Bullying Parameters/Features -- 2.2 Integration with School Infrastructure -- 2.3 Techniques Involved -- 2.4 Implementation Infrastructure -- 3 Result -- 4 Improvements -- 5 Conclusion -- References -- Feature-Based Comparative Study of Machine Learning Algorithms for Credibility Analysis of Online Social Media Content -- 1 Introduction -- 2 Related Work/Existing Technologies -- 2.1 Decision Tree Induction -- 2.2 Support Vector Machine (SVM) -- 2.3 Random Forest -- 2.4 K-Nearest Neighbour (KNN) -- 3 Ant Colony Optimization -- 4 Feature Selection Using ACO -- 5 System Architecture for Analysis -- 6 Results -- 7 Conclusion and Future Scope -- References -- Smart Support System for Navigation of Visually Challenged Person Using IOT -- 1 Introduction -- 2 Literature Review -- 3 Product Modeling -- 4 Algorithms -- 5 Output -- 6 Conclusion -- References -- Identity-Based Video Summarization -- 1 Introduction -- 2 Proposed System -- 3 Methodology -- 4 Experimental Setup -- 4.1 Process -- 4.2



Deployment -- 5 Results -- 5.1 Testing of the Model -- 5.2 Comparative Analysis -- 6 Conclusion -- References -- Security Testing for Blockchain Enabled IoT System -- 1 Introduction -- 1.1 Blockchain -- 1.2 Internet of Things -- 2 Literature Review -- 3 Methodology -- 4 An Overview of Blockchain Technology -- 4.1 The Network of Autonomous Nodes -- 4.2 A Ledger -- 4.3 The Distributed Database -- 5 Smart Contracts -- 6 Blockchain-Enabled IoT -- 7 Workflow Method -- 8 Security Testing -- 9 Proposed Approach -- 9.1 Device Identity -- 9.2 Message Authentication -- 9.3 Firmware Hashing -- 9.4 Device Reputation.

10 Blockchain Technology for IoT Security -- 11 Result and Discussion -- 12 Conclusion -- References -- Two-Dimensional Software Reliability Model with Considering the Uncertainty in Operating Environment and Predictive Analysis -- 1 Introduction -- 2 Software Reliability Modeling -- 2.1 A General NHPP SRGM -- 2.2 Proposed Model -- 3 Numerical Result and Discussion -- 3.1 Predictive Analysis -- 4 Conclusions -- References -- Object Recognition in a Cluttered Scene -- 1 Introduction -- 2 Methodology -- 3 Test Results -- 4 Quantitative Analysis -- 5 Conclusion -- References -- Breast Cancer Prediction on BreakHis Dataset Using Deep CNN and Transfer Learning Model -- 1 Introduction -- 2 Related Work -- 3 Related Theories -- 3.1 Convolution Neural Network (CNN) -- 3.2 Transfer Learning -- 4 Data Preparation and Preprocessing Techniques -- 4.1 Dataset -- 4.2 Data Augmentation -- 4.3 Normalization -- 5 Proposed Method -- 5.1 Experimental Setup -- 5.2 Evaluation Criteria -- 6 Results and Discussion -- 7 Conclusion -- References -- A Comprehensive Tool Survey for Blockchain to IoT Applications -- 1 Introduction -- 2 Background -- 2.1 Levels of Testing and Its Methods -- 2.2 Testing the Internet of Things -- 2.3 Testing the Blockchain -- 3 Research Challenges -- 3.1 IoT Testing Tools -- 3.2 Blockchain Testing Tools -- 3.3 Blockchain and IoT Testing Tools -- 4 IoT and Blockchain Integration -- 5 Opportunities -- 5.1 Privacy -- 5.2 Exchange of Data and Estimation of Cash -- 5.3 Enlistment of Records for Records and Reviews -- 5.4 Smart Understanding -- 6 Comparison of Testing Solutions -- 7 Result and Discussion -- 8 Conclusion -- References -- Hybrid Ensemble for Fake News Detection: An Attempt -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Removal of Columns -- 3.4 Addition of New Columns.

3.5 Word Embeddings -- 3.6 The ML Models -- 3.7 The ANN -- 3.8 The Hybrid Ensemble -- 3.9 The Architecture -- 4 Experiments -- 5 Discussion -- 6 Conclusion -- References -- Detectıon of Abnormal Activity at College Entrance Through Video Surveillance -- 1 Introduction -- 2 Previous Work -- 3 Proposed Methodology -- 3.1 Input Video -- 3.2 Processing -- 3.3 Logo Detection -- 3.4 Number Plate Detection -- 4 Results and Discussion -- 4.1 Color Detection and Number Plate Extraction -- 4.2 Database -- 5 Conclusion -- References -- Audio Peripheral Volume Automation Based on the Surrounding Environment and Individual Human Listening Traits -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Environment Sound Classification -- 3.2 Understanding Individual Human Listening Traits Using a Classification Algorithm -- 3.3 Integrated Working of the Components -- 4 Experimental Results and Analysis -- 4.1 Dataset and Experimental Setup -- 4.2 Result and Analysis -- 5 Conclusion and Future Work -- References -- A Survey: Accretion in Linguistic Classification of Indian Languages -- 1 Introduction -- 2 Literature Review -- 2.1 Hindi Text -- 2.2 Gujarati Text -- 2.3 English Text -- 2.4 Punjabi Text -- 2.5 Other Languages



-- 3 Conclusion -- References -- The Positive Electronic Word of Mouth: A Research Based on the Relational Mediator Meta-Analytic Framework in Electronic Marketplace -- 1 Introduction -- 2 Literature Review -- 2.1 The Antecedents of the Relationship -- 2.2 Customer-Focuses Relational Mediator -- 2.3 Research Hypotheses -- 3 Research Method -- 4 Result -- 5 Discussion -- 6 Conclusion -- References -- A Review: Web Content Mining Techniques -- 1 Introduction -- 1.1 Finding Appropriate Information -- 1.2 Creation of New Knowledge from the Web -- 1.3 Personalizing Data -- 1.4 Analyzing Individual User Preferences -- 2 Literature Review.

3 Web Mining -- 3.1 Resource Finding -- 3.2 Selection of Information and Pre-processing -- 3.3 Generalization -- 3.4 Analysis -- 3.5 Visualization -- 4 Web Mining Techniques -- 5 Web Content Mining (Wcm) -- 6 Web Content Mining Techniques -- 6.1 Unstructured Data -- 6.2 Structured Data -- 6.3 For Semi-structured Data -- 6.4 Multimedia Data -- 7 Applications of Web Content Mining -- 8 Conclusion -- References -- GPS-Free Localization in Vehicular Networks Using Directional Antennas -- 1 Introduction -- 1.1 GPS-Assisted and GPS-Free Localization -- 1.2 Motivation -- 1.3 Problem Definition -- 1.4 Paper Organization -- 2 Proposed Model -- 2.1 System Model -- 2.2 GPS-Free Localization Algorithm -- 3 Experimental Results and Discussion -- 3.1 Result Analysis for Antenna Orientation -- 3.2 Result Analysis for Antenna Beam Width -- 3.3 Comparison with State-of-Art Methods -- 4 Conclusion -- References -- An Improved Scheme in AODV Routing Protocol for Enhancement of QoS in MANET -- 1 Introduction -- 1.1 AODV Routing Protocol -- 2 Related Works -- 3 Proposed Work -- 3.1 Performance Evaluation Parameters ch17b16,ch17b17 -- 4 Simulation and Result Discussion -- 5 Conclusions and Future Work -- References -- Knowledge Management Framework  for Sustainability and Resilience in Next-Gen e-Governance -- 1 Introduction -- 2 Background -- 2.1 e-Governance in India -- 2.2 Emerging Trends and Technologies -- 3 Knowledge Management Framework -- 3.1 Sustainability and Resilience -- 3.2 Next-Gen Technologies in e-Governance -- 3.3 Challenges in Adopting Next-Gen Technologies in e-Governance -- 4 Conclusion -- References -- Enriching WordNet with Subject Specific Out of Vocabulary Terms Using Existing Ontology -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Preprocessing the Data -- 3.2 Extract Informative Words -- 3.3 Generate Graph Using Wikidata.

3.4 Identify Out of Vocabulary (OOV) Terms in WordNet -- 3.5 Assign a Place in WordNet Hierarchy -- 4 Results -- 5 Conclusion -- References -- Automatic Detection of Grape, Potato and Strawberry Leaf Diseases Using CNN and Image Processing -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Flowchart of the Methodology -- 3.2 Training the Model -- 4 Result and Discussion -- 4.1 Analytical Analysis -- 4.2 Accuracy Graph -- 4.3 Confusion Matrix -- 4.4 Result Analysis of Different Model -- 5 Conclusion -- References -- Sentiment Analysis on Global Warming Tweets Using Naïve Bayes and RNN -- 1 Introduction -- 1.1 Naive Bayes Classifier for Multinomial Models -- 1.2 Recurrent Neural Network -- 2 Literature Review -- 3 Methods Adopted -- 4 Experimental Results -- 4.1 Multinomial Naïve Bayes Approach -- 4.2 Long Short-Term Memory Approach -- 4.3 A Brief Comparison -- 5 Conclusion and Future Work -- References -- Novel and Prevalent Techniques for Resolving Control Hazard -- 1 Introduction -- 2 Established Techniques for Resolving Control Hazard -- 2.1 Handling Control Hazard by Re-forming Processor's Pipeline Organization -- 2.2 Fine-Grain Multithreading -- 2.3 Speculative Execution Using



Multithreading: A Case of Out of Order Processor -- 2.4 Accurate Branch Prediction for Short Threads on Multicore Processor -- 2.5 TAGE-SC-L Branch Predictors -- 3 Conclusion -- References -- Sound Classification Using Residual Convolutional Network -- 1 Introduction -- 2 Related Work -- 3 Data Preparation -- 3.1 Dataset -- 3.2 Feature Extraction -- 4 Convolutional Neural Network -- 4.1 Architecture -- 4.2 Fine Tuning -- 5 Conclusion -- References -- Dimensionality Reduction Using Variational Autoencoders -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Model Generation -- 4 Implementation -- 5 Results -- 6 Conclusion.

7 Future Scope.