1.

Record Nr.

UNINA9910637730903321

Titolo

Smart Technologies in Data Science and Communication : Proceedings of SMART-DSC 2022 / / Kingsley A. Ogudo, Sanjoy Kumar Saha, and Debnath Bhattacharyya, editors

Pubbl/distr/stampa

Singapore : , : Springer, , [2023]

©2023

ISBN

981-19-6880-2

Descrizione fisica

1 online resource (317 pages)

Collana

Lecture Notes in Networks and Systems Series ; ; Volume 558

Disciplina

302.2

Soggetti

Communication Technological innovations

Quantitative research

Soft computing

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Intro -- Conference Committee Members -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- A Graph-Based Model for Discovering Host-Based Hook Attacks -- 1 Introduction -- 2 Related Works -- 3 Proposed Graph-Based Model -- 3.1 Preliminary Processing Stage -- 3.2 Malware Detection Stage -- 4 Experimental Results and Discussion -- 4.1 Discussion -- 4.2 Limitations -- 5 Conclusions -- References -- E-Health Care Patient Information Retrieval and Monitoring System Using SVM -- 1 Introduction -- 2 Related Works -- 3 Proposed Model in IoT -- 3.1 Microcontroller -- 3.2 Sensors -- 3.3 Blood Pressure Sensor -- 3.4 Temperature Sensor -- 3.5 Three Axis Accelerometer Sensors. -- 3.6 Display Device -- 3.7 Alarm System -- 3.8 SVM Algorithm -- 3.9 Cloud Server -- 4 Proposed Work -- 5 Results and Discussion -- 5.1 Diagnosing Patient in Intensive Care Unit -- 5.2 Sending Notification Through Cloud -- 5.3 Support Vector Machine -- 6 Conclusion -- References -- Number Plate Recognition Using Optical Character Recognition (OCA) and Connected Component Analysis (CCA) -- 1 Introduction -- 1.1 The Purpose of This Paper -- 2 Detection of License Plates -- 2.1 Binarization of Images -- 2.2 Detecting the Edges -- 2.3 Connected Component Analysis (CCA) -- 2.4 Mathematical Morphology



-- 2.5 Related Work in the Number Plate Detection -- 3 Character Segmentation -- 4 Character Recognition -- 5 Conclusion -- Bibliography -- Cartoonify an Image with OpenCV Using Python -- 1 Introduction -- 2 Objectives -- 2.1 Filter by Median -- 2.2 Filter Laplacian -- 2.3 Filter by Median -- 3 Implementation -- 3.1 Step by Step Implementation -- 3.2 Statement of the Problem -- 3.3 Advanced Technical Approach -- 4 Proposed System -- 4.1 Challenges and Problem -- 5 Conclusion -- References -- Web Design as an Important Factor in the Success of a Website -- 1 Introduction.

2 Affective Factors for a Successful Website of e-commerce -- 3 Importance of Webdesign in e-commerce -- 4 Usability -- 5 A Case Study of Totally Blind Persons Interacting on the Internet -- 6 Conclusion -- References -- Earlier Selection of Routes for Data Transfer In Both Wired and Wireless Networks -- 1 Introduction -- 2 Related and Proposed Work -- 3 Modules Description -- 3.1 Path Reservation -- 3.2 Minimum Bandwidth Allocation -- 3.3 Time Management -- 3.4 Admission Control -- 4 Test Cases -- 5 Conclusion -- 6 Future Enhancement -- References -- Identifying River Drainage Characteristics by Deep Neural Network -- 1 Introduction -- 2 Related Work -- 2.1 Identifying Various Size and Shape of River Drainage -- 2.2 Generate River Drainage Image by Spatial, Spectral, Angular, and Temporal Model -- 3 Result -- 4 Discussion -- 5 Conclusion -- References -- A Review on Optimal Deep Learning Based Prediction Model for Multi Disease Prediction -- 1 Introduction -- 2 Literature Review -- 3 Review on Traditional Multi-disease Prediction Models -- 4 Methodology -- 5 Conclusion -- References -- A Hybrid Multi-user Based Data Replication and Access Control Mechanism for Cloud Data Security -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 4 Experimental Results -- 5 Conclusion -- References -- Leveraging the Goldfinger Attack in Blockchain Based on the Topological Properties -- 1 Introduction -- 2 Study Review -- 3 Contribution of the Study -- 4 Methodology and Design -- 4.1 Peer-To-Peer Network Connectivity -- 5 Implementation -- 5.1 General Network Before the Goldfinger Attack -- 5.2 Results of General Network Before the Goldfinger Attack -- 5.3 Implementation of the Goldfinger Attack -- 6 Results -- 7 Discussion and Analysis -- 8 Conclusion -- References.

Bitcoin Transaction Computational Efficiency and Network Node Power Consumption Prediction Using an Artificial Neural Network -- 1 Introduction -- 2 Study Review -- 3 Contribution of the Study -- 3.1 Methodology -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Remote Breast Cancer Patient Monitoring System: An Extensive Review -- 1 Introduction -- 2 Related Work on Breast Cancer -- 2.1 Existing Approaches to Detect Breast Cancer: -- 2.2 Popular Datasets Available for Research -- 2.3 Deep Learning Techniques for Early Diagnosis of Breast Cancer -- 3 Challenges and Issues in Remote Monitoring System -- 4 Case Study: A Remote Breast Cancer Patient Monitoring System -- 5 Result and Analysis of Existing Techniques -- 6 Conclusion -- References -- Simplifying the Code Editor Using MEAN Stack Technologies -- 1 Introduction -- 1.1 Why MEAN? -- 2 Related and Proposed Work -- 2.1 Existing Systems -- 2.2 Proposed System -- 3 Results and Sample OUTPUT Screens -- 4 Conclusion -- References -- Prediction and Identification of Diseases to the Crops Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Motivation -- 4 Proposed System -- 5 Flowchart -- 6 Algorithms, Dataset Used, and Accuracy Comparison -- 7 Conclusion -- References -- Pulse-Based Smart Electricity Meter Using Raspberry Pi and MEFN -- 1 Introduction -- 2 Literature -- 3 Proposed



Methodology -- 4 System Design -- 5 Conclusion -- References -- Brain Tumor Segmentation Using U-Net -- 1 Introduction -- 1.1 Brain Tumor Modalities -- 2 Literature Review -- 3 Materials and Methods -- 3.1 U-Net Architecture -- 3.2 Fully Convolutional Network -- 4 Results and Discussions -- 5 Conclusion -- References -- An Empirical Study of CNN-Deep Learning Models for Detection of Covid-19 Using Chest X-Ray Images -- 1 Introduction -- 2 Materials and Methods -- 2.1 Dataset.

2.2 Model Formulation -- 3 Experimental Results -- 3.1 Evaluation Matrices -- 3.2 Comparison of Various CNN-DL Models -- 3.3 Comparison of Various CNN-DL Models -- 4 Conclusion -- References -- Detection of Eye Blink Using SVM Classifier -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 3.1 Face Detection -- 3.2 Eye Pair Detection -- 3.3 Classification Using SVM Model -- 4 Results and Discussions -- 5 Conclusion -- References -- A Novel Approach for Health Analysis Using Machine Learning Approaches -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 3.1 Decision Tree -- 3.2 Naïve Bayesian -- 3.3 Random Forest -- 3.4 K-Nearest Neighbor (KNN) -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Classification of Healthy and Diseased Lungs by Pneumonia Using X-Rays and Gene Sequencing With Deep Learning Approaches -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Convolutional Neural Network (CNN) -- 3.2 Inception V3 Model -- 4 Proposed Model -- 5 Results and Discussions -- 6 Proof of Concept -- 6.1 POC Architecture -- 6.2 POC Design -- 6.3 Result -- 7 Conclusion and Future Work -- References -- Breast Cancer Classification Using Improved Fuzzy C-Means Algorithm -- 1 Introduction -- 2 Proposed Work -- 2.1 Pre-processing -- 2.2 Labels and Other Artifacts Removal from the Background -- 2.3 Removing of Pectoral Muscle -- 2.4 Enhancement of Image -- 2.5 Measurement of PSNR Value and MSE Value -- 3 Optimization Segmentation -- 3.1 Optimization Using Independent Search Krill Herd Technique -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Repercussions of Incorporating Filters in CNN Model to Boost the Diagnostic Ability of SARS-CoV-2 Virus Using Chest Computed Tomography Scans -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Algorithm.

4 Results and Analysis -- 4.1 Dataset Execution -- 4.2 Graphical Representation of Accuracy and Loss Attained -- 4.3 Comparing the Model with Latest Methods -- 4.4 Graphical Representation of Comparing the Model with Related Methods -- 5 Conclusion -- References -- Software Development Estimation Cost Using ANN -- 1 Introduction -- 2 Estimation Model Performance -- 3 Artificial Neural Network Models -- 4 Network Performance Evaluation -- 4.1 Performance Measurement -- 4.2 Simulated Development Data -- 5 Conclusion -- Bibliography -- A Generic Flow of Cyber-Physical systems-A Comprehensive Survey -- 1 Introduction -- 2 CPS Evolution -- 3 Applications -- 4 CPS Models -- 5 Security Models -- 6 CPS Properties -- 7 Challenges in CPS -- 8 Model-Driven Conceptual Approaches -- 9 Conclusion -- References -- Mental Disorder Detection in Social Networks Using SVM Classification: An Improvised Approach -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 4 Proposed System -- 5 Methodology -- 5.1 OSN Framework Construction -- 5.2 Data Collection -- 5.3 Pre-Processing -- 5.4 Feature Extraction -- 6 Conclusion -- 7 Future Work -- References -- An Enhanced K-Means Clustering Algorithm to Improve the Accuracy of Clustering Using Centroid Identification Based on Compactness Factor -- 1 Introduction -- 2 Related Works -- 3 Centroid Recognition



Based on Compactness -- 3.1 The Improved k-means Clustering Algorithm Using Regional Centroid Component (RCC) -- 4 Results and Discussion -- 5 Conclusion -- References -- Prediction of Chronic Kidney Disease with Various Machine Learning Techniques: A Comparative Study -- 1 Introduction -- 2 Literature Review -- 3 Materials and Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Blockchain and Its Idiosyncratic Effects on Energy Consumption and Conservation -- 1 Introduction -- 1.1 Applications.

2 Literature Review.