11116nam 2200529 450 991062430450332120231110224126.0981-19-4960-3(MiAaPQ)EBC7136996(Au-PeEL)EBL7136996(CKB)25314891500041(PPN)266352065(EXLCZ)992531489150004120230405d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInventive communication and computational technologies proceedings of ICICCT 2022 /G. Ranganathan, Xavier Fernando, and Álvaro RochaSingapore :Springer,[2022]©20221 online resource (940 pages)Lecture Notes in Networks and Systems ;v.383Print version: Ranganathan, G. Inventive Communication and Computational Technologies Singapore : Springer,c2022 9789811949593 Intro -- Preface -- Contents -- Editors and Contributors -- A Comparative Study of Employee Attrition Analysis Using Machine Learning and Deep Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 Proposed System and Methods -- 4 Experiments and Results -- 5 Conclusion -- References -- Efficient RNS Realization of High-Speed Arithmetic Multiplier with Respect to Cryptographic Computation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Architecture-Multiplier Using RNS -- 3.1 Forward Conversion -- 3.2 Booth's Multiplication -- 3.3 Reverse Residue Conversion -- 4 Simulation Results -- 5 Conclusion -- References -- An Integrated Terrestrial-Satellite Cellular 5G Network Routing Protocol Using Reinforcement Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 System Network Model -- 3.1 Network Topology -- 4 Reinforcement Learning-Based Satellite Routing Algorithm -- 4.1 Feasible Route Verifying Protocol (FRVP) -- 4.2 Q-Learning Routing Algorithm (QLRA) -- 4.3 Speed-Up Q-Learning Routing Algorithm (SQLRA) -- 5 Result Analysis -- 5.1 Performance Evaluation of QLRA and SQLRA -- 5.2 Comparison of SQLRA and Other Routing Algorithms -- 6 Conclusion -- References -- Direct Trust-Based GPSR Protocol (DT-GPSR) in VANET -- 1 Introduction -- 2 Related Work -- 3 Network Model and System Assumptions -- 4 The Direct Trust-Based GPSR (DT-GPSR) Protocol -- 4.1 Direct Trust Evaluation Based on the Event Messages -- 4.2 Direct Trust Evaluation Based on the Beacon -- 4.3 Direct Trust Evaluation Based on Infotainment Messages -- 4.4 All-Inclusive Vehicle Trust -- 5 Simulation and Discussions -- 5.1 Metrics -- 5.2 Comparative Analysis -- 6 Conclusion -- References -- Combating Challenges in Health Care Using Blockchain -- 1 Introduction -- 2 Blockchain Technology -- 3 Basic Framework of Blockchain -- 4 Applications and Challenges.5 Platforms and Programming Languages -- 6 Related Work -- 7 Smart Contracts -- 8 Proposed Model -- 8.1 System Design -- 8.2 System Architecture -- 9 Conclusion and Future Work -- References -- HIDSC2: Host-Based Intrusion Detection System in Cloud Computing -- 1 Introduction -- 1.1 Literature Review -- 1.2 Motivation -- 1.3 Contributions -- 1.4 Organization -- 1.5 Problem Statement -- 1.6 Proposed Solution and Methodology -- 1.7 Architecture -- 1.8 Flowchart -- 1.9 Algorithm -- 1.10 Performance Evaluations -- 2 Conclusion -- References -- The Impact of Online Reviews on Download Numbers of Mobile Apps -- 1 Introduction -- 1.1 Background and Context -- 1.2 Problem Statement -- 1.3 Research Questions -- 1.4 Relevance and Importance of the Research -- 2 Literature Review -- 2.1 Purchasing Choice -- 2.2 Customer Feedback on the Web -- 2.3 Mobile Apps -- 2.4 App Store -- 2.5 Online Reviews as Word-of-Mouth Information -- 2.6 The Role of Reviews' Features -- 3 Research Design and Method -- 3.1 Research Design -- 3.2 Method and Source -- 3.3 Data Collection -- 4 Implication and Contributions to Knowledge -- 4.1 Practical Adoptions -- 4.2 Theoretical Implications -- 4.3 Conclusion -- References -- Learning System During the Covid-19 in a University -- 1 Introduction -- 2 Research Purpose -- 3 Research Technique -- 4 Research Method -- 4.1 Types of Research -- 4.2 Research Sites -- 4.3 Population and Sample -- 4.4 Variable -- 4.5 Data Collection Technique -- 4.6 Data Analysis Technique -- 5 Research Result -- 6 Conclusion -- References -- The Adoption of Using the Zoom Application as a Learning Tool to Increase Neuro-cognitive for Public High School in Jakarta -- 1 Introduction -- 2 Literature Review Study -- 3 Research Techniques -- 4 Research Methods -- 5 Research Results -- 6 Discussion -- 7 Conclusion -- References.Context-Aware Voice Recognition System for Car Climate and Infotainment Control -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Connection of the Proposed System in the Car -- 4 Results and Discussion -- 5 Conclusion -- References -- Study of Identification of Breast Tumor Through DL Technique -- 1 Introduction -- 2 Related Work -- 3 Implementation -- 4 Evaluation Metrics -- 5 Comparative Study -- 6 Conclusion -- References -- Methods for Assessing Information Security Incidents in the Enterprise and Making Decisions -- 1 Introduction -- 2 Main Part -- 3 Conclusion -- References -- Data Analytics for Healthcare Institutions: A Data Warehouse Model Proposal -- 1 Conceptualization -- 1.1 Data Analytics -- 1.2 Big Data Techniques -- 1.3 Analysis of Advanced Big Data Analytical Techniques -- 2 Methodology -- 3 Results -- 3.1 Requirements Analysis -- 3.2 Conceptual Model Proposal -- 3.3 Analysis of OLTP -- 3.4 Extended Conceptual Model -- 3.5 Data Warehouse Logic Model-DW -- 3.6 Data Integration -- 4 Conclusions -- References -- The Role of Existing Technology Text to Speech in the Deaf Disabled Communities Due to Brain Inflammation -- 1 Introduction -- 1.1 Marketing Purposes -- 1.2 Entertainment Purposes -- 2 Research Technique -- 3 Research Method -- 4 Research Result -- 5 Discussion -- 6 Conclusion -- References -- Performance Analysis of Hybrid Deep Learning Approach for Human Actions Recognition -- 1 Introduction -- 2 Literature Review -- 2.1 Human Actions Recognition Using Traditional Machine Learning-Based Approaches -- 2.2 Human Actions Recognition Using Deep Learning-Based Approaches -- 2.3 Human Actions Recognition Using Hybrid Approaches -- 3 Experimental Setup -- 3.1 Preprocessing -- 3.2 Feature Extraction -- 3.3 Random Forest -- 3.4 CNN Model -- 4 Result Analysis and Discussion -- 4.1 Datasets.4.2 Result Analysis Using 2D CNN Approach -- 5 Conclusions and Future Scope -- References -- Email Security Framework and Virus Detection Techniques -- 1 Introduction -- 1.1 Securing Email -- 1.2 Threads to Email -- 1.3 Types of Viruses -- 1.4 Virus Detection Techniques -- 2 Literature Review -- 3 Proposed Framework -- 4 Results and Gestures of Proposed Framework -- 5 Conclusion -- References -- A Survey on LPG Level and Leakage Detection System Using IOT -- 1 Introduction -- 2 Related Works -- 2.1 Limitation of the Existing System -- 3 Proposed System -- 3.1 Working Flow of Proposed System -- 3.2 Hardware Specification -- 3.3 Software Specification -- 3.4 Advantages -- 4 Result and Discussion -- References -- Explication and Extension of Saga and Microservice Patterns to Enable Resilient Distributed Transaction -- 1 Introduction -- 2 Distributed Transaction Workflow -- 3 Distributed Transactions and Associated Issues -- 4 Methodology -- 4.1 Extending Saga -- 4.2 Outbox Table -- 4.3 Retry Pattern -- 4.4 Fail-Over Plan -- 4.5 Health Checks and Monitoring -- 4.6 Saga Orchestrator Without Any Message Broker -- 5 Conclusion -- References -- A Prototype Design for Emergency Notifications Between Vehicles in Vehicular Ad Hoc Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Design -- 4 Experimental Setup and Prototype Implementation -- 5 Result Analysis and Discussion -- 6 Conclusion -- References -- A Comparative Analysis of Various Loss Functions for Image Data Hiding Using Deep Neural Network -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 4 Loss Functions -- 4.1 Loss 1 -- 4.2 Loss 2 -- 4.3 Loss 3 -- 4.4 Loss 4 -- 4.5 Loss 5 -- 5 Dataset Description -- 6 Training Details -- 7 Metrics Used for Comparison -- 8 Results and Discussion -- 9 Conclusion and Future Works -- References.21 Bengali Review Analysis for Predicting Popular Cosmetic Brand Using Machine Learning Classifiers -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection Procedure -- 3.2 Data Pre-processing -- 3.3 Experimental Results and Analysis -- 3.4 Comparative Analysis -- 4 Conclusion -- References -- In Silico Analysis for Identifying Influential Descriptors of PTP1b Enzyme in Diabetes -- 1 Introduction -- 2 Materials and Methods -- 2.1 Proposed Architecture -- 2.2 Dataset -- 2.3 Boruta Algorithm -- 2.4 Caret Algorithm -- 3 Results and Discussion -- 3.1 Variable Importance -- 3.2 Feature Selection in CARET -- 3.3 Feature Selection via Boruta Package -- 3.4 Outlier Test -- 4 Conclusion -- References -- K-Means and BIRCH: A Comparative Analysis Study -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Workflow of Our Study -- 3.3 Validation Metric, K-Means and BIRCH -- 4 Results -- 4.1 Dimensionality Reduction Using P.C.A. -- 4.2 Clustering Validation -- 4.3 Comparative Analysis -- 5 Conclusions -- 6 Future Work -- References -- Named-Entity Recognition in Medical Records Using Transfer Learning -- 1 Introduction -- 1.1 Problem Definition -- 1.2 Motivation/Challenges -- 2 Literature Survey -- 2.1 Survey -- 2.2 Findings -- 2.3 Objectives of Work -- 3 Proposed Work -- 3.1 Architecture of the System -- 3.2 Proposed Design -- 3.3 Dataset -- 4 Results and Inferences -- 4.1 Metrics for Evaluation -- 4.2 Results and Discussions -- 5 Conclusion and Future Enhancements -- 5.1 Future Enhancements -- References -- Reinforcement Learning-Based Traffic Engineering in SDN: Problem Formulation, Parameters, and Topology -- 1 Introduction -- 1.1 Software-Defined Networking -- 1.2 Traffic Engineering -- 1.3 Routing -- 2 Reinforcement Learning (RL) -- 2.1 Input/State Space -- 2.2 Action Space -- 2.3 Reward.2.4 Policy.Lecture Notes in Networks and Systems CommunicationTechnological innovationsComputer networksTechnological innovationsCommunicationTechnological innovations.Computer networksTechnological innovations.302.23Ranganathan G.1265537Fernando Xavier N.Rocha ÁlvaroMiAaPQMiAaPQMiAaPQBOOK9910624304503321Inventive communication and computational technologies3086204UNINA