1.

Record Nr.

UNINA9910917189803321

Autore

Kumar Sandeep

Titolo

Proceedings of International Conference on Communication and Computational Technologies : ICCCT 2024, Volume 1 / / edited by Sandeep Kumar, Saroj Hiranwal, Ritu Garg, S. D. Purohit

Pubbl/distr/stampa

Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024

ISBN

9789819774234

9819774233

Edizione

[1st ed. 2024.]

Descrizione fisica

1 online resource (528 pages)

Collana

Lecture Notes in Networks and Systems, , 2367-3389 ; ; 1121

Altri autori (Persone)

HiranwalSaroj

GargRitu

PurohitS. D

Disciplina

621.382

Soggetti

Computational intelligence

Signal processing

Telecommunication

Artificial intelligence

Computational Intelligence

Signal, Speech and Image Processing

Communications Engineering, Networks

Artificial Intelligence

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Organization -- Preface -- Contents -- Editors and Contributors -- Economically Growth and Impact of Indian Regional Navigation Satellite System at International Level -- 1 Introduction -- 2 Applications of IRNSS System -- 3 Growth and Impact at International Level -- 4 Growth and Impact at Indian Economy -- 5 Conclusion -- References -- Predictive Tomato Leaf Disease Detection and Classification: A Hybrid Deep Learning Framework -- 1 Introduction -- 2 Dataset -- 2.1 Plant Village -- 2.2 Plantdoc -- 3 Object Detection Models -- 3.1 Faster R-CNN -- 3.2 YOLO -- 3.3 SSD -- 3.4 Mask R-CNN -- 4 Image Classification Models -- 4.1 Visual Geometry Group (VGG) -- 4.2 Residual Network (ResNet) -- 4.3



Inception (GoogLeNet) -- 4.4 MobileNet -- 4.5 Xception -- 5 Review on Tomato Plant Leaf Diseases Prediction -- 6 Proposed Methodology -- 7 Result and Discussion -- 8 Conclusion -- References -- Conceptual Framework for Risk Mitigation and Monitoring in Software Organizations Based on Artificial Immune System -- 1 Introduction -- 2 Background and Motivation -- 3 Findings -- 4 A New Conceptual Framework for Risk Mitigation and Monitoring Based on Immune Clonal Approach-The Design/Proposed -- 5 Conclusions and Future Scope -- References -- A Multilevel Home Fire Detection and Alert System Using Internet of Things (IoT) -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 System Model -- 3.2 System Requirements -- 3.3 Multilevel Fire Detection -- 3.4 Multilevel Fire Alerts -- 4 Experimental Prototype, Results, and Discussion -- 5 Conclusion -- References -- Smart Baby Warmer with Integrated Weight Sensing -- 1 Introduction -- 1.1 Internet of Things (IoT) -- 1.2 Global System for Mobile Communication (GSM) -- 2 Working Principle -- 2.1 Methodology -- 2.2 Block Diagram -- 2.3 Flow Chart -- 2.4 Working of LM35 Sensor.

2.5 Working of Load Cell and HX711 -- 2.6 Sending SMS Using GSM -- 2.7 Circuit Connection -- 3 Results and Analysis -- 3.1 SMS Alert -- 3.2 Output -- 3.3 Heater on -- 3.4 Heater off -- 3.5 Analysis -- 4 Conclusion -- References -- A Robust Multi-head Self-attention-Based Framework for Melanoma Detection -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Pre-processing and Patch Embedding -- 3.2 Multi-head Self-attention Model -- 3.3 Classification -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Data Augmentation -- 4.3 Simulation Results -- 4.4 Comparative Analysis -- 4.5 Discussion -- 5 Conclusion -- References -- Domain Knowledge Based Multi-CNN Approach for Dynamic and Personalized Video Summarization -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Input -- 3.2 Domain Activity Video Segmentation -- 3.3 Umpire Detection and Pose Recognition -- 3.4 Key Segments -- 3.5 Personalized and Dynamic Video Summarization -- 4 Result Analysis -- 5 Conclusion -- References -- Efficient Information Retrieval: AWS Textract in Action -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Input Documents -- 3.2 Analyzing Documents -- 3.3 Detecting Text -- 3.4 Confidence Scores -- 3.5 Deployment -- 4 Results and Discussion -- 4.1 Image as an Input -- 4.2 PDF as an Input -- 4.3 Table as an Input -- 5 Conclusion and Future Work -- References -- Text Summarization Techniques for Kannada Language -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Extractive Summarization Using TF-IDF Method -- 3.2 Abstractive Summarization Using the LSTM Method -- 4 Results and Discussions -- 5 Conclusion -- References -- Parkinson's Detection From Gait Time Series Classification Using LSTM Tuned by Modified RSA Algorithm -- 1 Introduction -- 2 Related Works -- 2.1 Long Short-Term Memory.

2.2 Metaheuristics Optimization -- 3 Methods -- 3.1 The Original RSA -- 3.2 Genetically Inspired RSA -- 4 Experiments -- 4.1 Dataset -- 4.2 Simulation Setup -- 4.3 Metrics -- 4.4 Simulation Results -- 5 Conclusion -- References -- Human Action Recognition Using Depth Motion Images and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Algorithm for Displaying Depth Map Sequence -- 3.2 Algorithm for Depth Motion Images -- 3.3 Convolutional Neural Network Model -- 4 Results and Discussion -- 5 Conclusion -- References -- Maximizing Portfolio Returns in Stock Market Using Deep Reinforcement Techniques -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Methodology -- 4 Result Analysis -- 5 Backtest Results -- 6 Conclusion -- References -- Detecting AI Generated Content:



A Study of Methods and Applications -- 1 Introduction -- 2 Background -- 2.1 Watermarking -- 2.2 Classification -- 2.3 Statistical Analysis -- 3 Generative Models -- 4 Detecting AI-Generated Content -- 4.1 Linguistic-Based Methods -- 4.2 Statistical-Based Methods -- 4.3 Learning-Based Methods -- 5 Challenges in AI Content Detection -- 6 Applications and Scenarios -- 7 Conclusion -- References -- A Systemic Review of Machine Learning Approaches for Malicious URL Detection -- 1 Introduction -- 2 Identifying URLs with Malicious Hidden Links -- 2.1 Traditional Approaches to Malicious URL Detection -- 2.2 Heuristic Based Methods -- 2.3 Machine Learning Approaches -- 2.4 List of features extracted from the URL: -- 3 Malicious URL Classification with Artificial Intelligence -- 3.1 Random Forest Algorithm -- 3.2 PhishAri: Automatic Real-Time Phishing Detection on Twitter -- 3.3 Support Vector Machine (SVM) -- 4 Deep Learning Methods -- 4.1 Models Based on Convolutional Neural Networks -- 4.2 Models Based on Recurrent Neural Networks.

4.3 Models Based on a Combination of CNN and RNN -- 4.4 Models Based on Transformers -- 5 Conclusion -- References -- Digital Image Forgery Detection Based on Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 2.1 Block-Based Approach -- 2.2 Key Point-Based Approach -- 2.3 Machine Learning-Based Approach -- 3 The Proposed CNN Model -- 3.1 Image Preprocessing -- 3.2 Image Resizing -- 3.3 CNN Architecture -- 3.4 Classification -- 4 Experimental Results -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 The Results -- 4.4 Discussion -- 4.5 Comparison with Other Works -- 5 Concluding Remarks -- References -- Banana Freshness Classification: A Deep Learning Approach with VGG16 -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection and Dataset Composition -- 3.2 Data Preprocessing -- 3.3 Data Augmentation -- 4 Experimental Work -- 4.1 Model Architecture -- 4.2 Model Training -- 5 Results and Analysis -- 5.1 Model Performance -- 5.2 Confusion Matrix -- 5.3 Classification Report -- 6 Conclusions And Future Work -- References -- GreenHarvest: Data-Driven Crop Yield Prediction and Eco-Friendly Fertilizer Guidance for Sustainable Agriculture -- 1 Introduction -- 2 Literature Survey -- 3 Problem Definition -- 4 Objectives -- 5 Methodology -- 6 Results and Algorithms -- 7 Conclusion -- References -- Real-Time Deep Learning Based Image Compression Techniques: Review -- 1 Introduction -- 2 Image Compression -- 2.1 Lossy Compression -- 2.2 Lossless Compression -- 3 Deep Learning -- 3.1 Auto-Encoder -- 3.2 Recurrent Neural Network -- 3.3 Convolution Neural Network -- 4 Literature Review -- 5 Discussion -- 6 Conclusion -- References -- Fog-Cloud Enabled Human Falls Prediction System Using a Hybrid Feature Selection Approach -- 1 Introduction -- 2 Related Works -- 3 Proposed Human Fall Prediction System.

4 Hybrid Feature Selection Approach -- 5 Experimental Results -- 6 Conclusion and Future Enhancement -- References -- A 4-Input 8-Bit Comparator with Enhanced Binary Subtraction -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Full Adder Logic -- 3.2 8-Bit Adder Logic -- 3.3 Comparator Logic -- 4 Novelty -- 5 Analysis -- 5.1 Register Transfer Level (RTL) Components Analysis -- 5.2 Power Analysis -- 5.3 Part Resource Analysis -- 6 Results -- 6.1 Input Scenario and Output -- 6.2 Circuit Justification -- 7 Conclusion and Future Scope -- References -- Multivalued Dependency in Neutrosophic Database System -- 1 Introduction -- 2 Basic Definitions -- 2.1 Neutrosophic Set -- 2.2 α-Equal of Neutrosophic Tuples -- 2.3 Neutrosophic Functional Dependency -- 3 A New Concept: Neutrosophic Multivalued Dependency (α-nmvd) -- 3.1



Multivalued Dependency -- 3.2 Neutrosophic Multivalued Dependency -- 3.3 Inference Rules for α-nmvd -- 4 Conclusion -- References -- Traffic Sign Recognition Framework Using Zero-Shot Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Analysis -- 4.1 Dataset -- 4.2 Result -- 5 Conclusion -- References -- Machine Learning Techniques to Categorize the Sentiment Analysis of Amazon Customer Reviews -- 1 Introduction -- 2 Related Work -- 3 Data Preprocessing -- 4 Methodology -- 4.1 Data Source and Data Set -- 5 Experiment and Result -- 6 Conclusion -- References -- Alzheimer's Disease Diagnosis Using Machine Learning and Deep Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Datasets -- 4 Experimental Results -- 5 Conclusion -- References -- Sentinel Eyes Violence Detection System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Openpose -- 3.2 Yolov8 -- 3.3 Cnn-Lstm -- 4 Result -- 4.1 Object Detection Models -- 4.2 Architectures -- 5 Conclusion -- References.

Detection of Alzheimer's Disease from Brain MRI Images Using Convolutional Neural Network.

Sommario/riassunto

This book gathers selected papers presented at 6th International Conference on Communication and Computational Technologies (ICCCT 2024), jointly organized by Soft Computing Research Society (SCRS) and Rajasthan Institute of Engineering & Technology (RIET), Jaipur, during January 8–9, 2024. The book is a collection of state-of-the art research work in the cutting-edge technologies related to the communication and intelligent systems. The topics covered are algorithms and applications of intelligent systems, informatics and applications, and communication and control systems.