11705nam 2200601 450 991062431110332120230325095523.0981-19-3679-X(MiAaPQ)EBC7133753(Au-PeEL)EBL7133753(CKB)25299467000041(OCoLC)1356578214(BIP)084151441(PPN)266352006(EXLCZ)992529946700004120230325d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInternational Conference on Innovative Computing and CommunicationsVolume 3 proceedings of ICICC 2022 /Deepak Gupta [and four others]Singapore :Springer,[2022]©20221 online resource (772 pages)Lecture Notes in Networks and SystemsPrint version: Gupta, Deepak International Conference on Innovative Computing and Communications Singapore : Springer,c2022 9789811936784 Intro -- ICICC-2022 Steering Committee Members -- Preface -- Contents -- Editors and Contributors -- Assistive System for the Blind with Voice Output Based on Optical Character Recognition -- 1 Introduction -- 2 Lıterature Survey -- 3 System Model -- 3.1 System Design Specification -- 4 Experimental Results -- 5 Conclusion -- References -- Enterprising for a Sustainable Supply Chain of Livestock and Products of Sheep Husbandry in Jammu and Kashmir -- 1 Introduction -- 2 The Aim of the Paper and Objectives -- 3 Literature Review -- 4 Research Methodology -- 5 Data Analysis and Interpretation -- 6 Concluding Discussion-Social and Managerial Implications -- 7 Main Contribution of the Paper -- 8 Limitations of the Study -- 9 Future Implications of the Study -- References -- Comparative Analysis of Object Detection Models for the Detection of Multiple Face Masks -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Face Mask Detection -- 4.1 YOLOv3 -- 4.2 YOLOv4 -- 4.3 YOLOv5 -- 4.4 Proposed Methodology -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- ASL Real-Time Translator -- 1 Introduction -- 2 Literature Survey -- 3 Motivation -- 4 Architecture -- 5 Implementation -- 6 Challenges -- 7 Results and Discussion -- 8 Future Scope -- References -- House Price Forecasting by Implementing Machine Learning Algorithms: A Comparative Study -- Comparative Study of Graph Theory for Network System -- 1 Introduction -- 2 Incidence Operator -- 3 Adjacency Operator -- 4 Laplacian Operator -- 5 Importance of Graph Theory in Industry -- 6 Applications of Graph Theory in Network Theory -- 7 Data Structure and Representations -- 8 General Network Properties -- 9 Motifs -- 10 Network Design Models -- 10.1 The Star Topology -- 10.2 The Ring Topology -- 10.3 The Mesh Topology -- 11 Conclusion -- References -- 1 Introduction.2 Review of Literature -- 3 Methodology Proposed -- 4 Experimentation and Results -- 4.1 Data Genesis -- 4.2 Choosing Appropriate Attributes -- 4.3 Exploratory Analytics -- 5 Conclusions and Future Directions -- References -- Comparative Study of Graph Theory for Network System -- 1 Introduction -- 2 Incidence Operator -- 3 Adjacency Operator -- 4 Laplacian Operator -- 5 Importance of Graph Theory in Industry -- 6 Applications of Graph Theory in Network Theory -- 7 Data Structure and Representations -- 8 General Network Properties -- 9 Motifs -- 10 Network Design Models -- 10.1 The Star Topology -- 10.2 The Ring Topology -- 10.3 The Mesh Topology -- 11 Conclusion -- References -- Numerical Simulation and Design of Improved Filter Bank Multiple Carrier System as Potential Waveform for 5G Communication System -- 1 Introduction -- 2 FBMC (Filter Bank Multi-carrier) -- 3 Scope and Objectives -- 4 Background -- 5 Proposed Methodology -- 5.1 Structure and Algorithm of Proposed DFT-Spread FBMC Transmitter and Receiver -- 5.2 The Proposed FBMC Complex Effective Transmitter -- 6 Result Analysis -- 6.1 Performance Analysis Between Contending Waveforms -- 6.2 Simulation of Proposed PAPR Reduction Scheme for FBMC System -- 6.3 Analysis of Bit Error Rate -- 7 Conclusion and Future Scope -- 7.1 Conclusion -- 7.2 Future Scope -- References -- Automatic Classification and Enumeration of Bacteria Cells Using Image Analysis -- 1 Introduction -- 2 Literature Survey -- 3 Research Method -- 3.1 Noise Removal -- 3.2 Counting and Classification -- 4 Result and Discussion -- 5 Conclusion -- References -- Liver Cirrhosis Stage Prediction Using Machine Learning: Multiclass Classification -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 Dataset Chosen -- 3.2 Data Cleaning -- 3.3 Scaling -- 3.4 Feature Selection -- 4 Methodology Used -- 4.1 Algorithms.4.2 Performance Evaluation Metrics -- 5 Results and Discussion -- 6 Conclusions and Future Work -- References -- Dynamic State Estimation of a Multi-source Isolated Power System Using Unscented Kalman Filter -- 1 Introduction -- 2 System Model -- 3 Proposed Unscented Kalman Filter -- 4 Simulation Study -- 5 Conclusion -- References -- Investigating Part-of-Speech Tagging in Khasi Using Naïve Bayes and Support Vector Machine -- 1 Introduction -- 2 Literature Review -- 3 Khasi PoS Tagging System Using SVM or NB Approach -- 4 Experimental Results -- 5 Conclusion -- References -- Machine Learning and Deep Learning-Based Detection and Analysis of COVID-19 in Chest X-Ray Images -- 1 Introduction -- 2 Methodology -- 2.1 Data Preprocessing -- 2.2 Models -- 2.3 Metrics of Performance -- 3 Results and Discussions -- 4 Comparative Performance Analysis -- 5 Conclusion and Future Work -- References -- A Comprehensive Study of Machine Learning Techniques for Diabetic Retinopathy Detection -- 1 Introduction -- 2 Diabetic Retinopathy Detection Using Machine Learning Algorithms -- 3 Dataset Used in DR Detection -- 4 Discussion -- 5 Conclusion -- References -- Evolution of WSN into WSN-IoT: A Study on its Architecture and Integration Challenges -- 1 Introduction -- 2 Evolution of WSN and IoT -- 3 Wireless Sensor Network and Sensor Node Architecture -- 3.1 Physical Layer -- 3.2 Data Link Layer -- 3.3 Network Layer -- 3.4 Transport Layer -- 3.5 Application Layer -- 4 IoT Architecture -- 4.1 Perception Layer -- 4.2 Transmission Layer -- 4.3 Application Layer -- 5 Integration of WSN and IoT -- 5.1 Front-End Proxy Approach -- 5.2 Gateway Approach -- 5.3 TCP/IP Overlay Approach -- 6 Challenges -- 6.1 Security -- 6.2 Interoperability -- 6.3 Topology Management and Data Unavailability -- 6.4 Miscellaneous -- 7 Conclusion -- References -- Big Data Security Trends.1 Introduction -- 2 Big Data Security Issues and Their Solutions -- 3 Big Data Security Solutions -- 4 Big Data Security Trends -- 5 Conclusion -- References -- Application of NLP and Machine Learning for Mental Health Improvement -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Plans -- 3.1 Dataset Description -- 3.2 Methodology -- 3.3 Flow Chart/Block Diagram -- 4 Output -- 5 Result and Discussion -- 6 Conclusion and Future Scope -- References -- Energy Efficient RPL Objective Function Using FIT IoT-Lab -- 1 Introduction -- 1.1 Motivation -- 2 Literature Survey -- 3 Experimental Details -- 3.1 FIT IoT-Lab Setup -- 4 Methodology -- 5 Result -- 5.1 Ring Deployment -- 5.2 Random Deployment -- 6 Conclusion -- References -- Effective Data-Sharing Method for Multiple ICR Management in Autonomous Distributed Control Systems -- 1 Introduction -- 2 Proposed Method -- 2.1 Assumptions -- 2.2 Sink Node-Based Data-Sharing Method -- 3 Simulation Evaluation -- 3.1 Simulation Evaluation Scenario -- 3.2 Simulation Results -- 4 Conclusion -- References -- Applicability of Communication Technologies in Internet of Things: A Review -- 1 Introduction -- 2 Communication Technologies in IoT -- 2.1 RFID -- 2.2 NFC -- 2.3 Bluetooth -- 2.4 Zigbee -- 2.5 LPWAN -- 2.6 Wi-Fi -- 2.7 Cellular Communication Technologies -- 3 Conclusion -- References -- A KNN-Based Intrusion Detection Model for Smart Cities Security -- 1 Introduction -- 2 Background and Related Works -- 3 Improved Approach for Smart Cities Security -- 3.1 Description of Proposed Model -- 3.2 Experimental Study and Results -- 4 Conclusion and Future Works -- References -- Design of Asymmetric Microstrip Quad-Band Reconfigurable Antenna -- 1 Introduction -- 2 Design of Hook-Shaped Asymmetric Microstrip Quad-Band Reconfigurable Antenna -- 3 Results and Discussions -- 4 Conclusion -- References.COVID-19 and Associated Lung Disease Classification Using Deep Learning -- 1 Introduction -- 1.1 Social Benefits -- 2 Literature Review -- 3 Proposed Model -- 3.1 Methodology -- 3.2 Convolutional Layer -- 3.3 Pooling Layer -- 3.4 Flatten Layer -- 3.5 Dense Layer -- 4 Experimentation, Data Collection, and Performance Assessment -- 4.1 Dataset Description -- 4.2 Experiment Setup -- 4.3 Performance Assessment -- 4.4 Results on X-Ray Dataset -- 5 Conclusion -- References -- Type 2 Diabetes Prediction Using Machine Learning and Validation Using Weka Tool -- 1 Introduction -- 2 Implications of T2D -- 3 Related Work -- 4 Dataset Description -- 5 Methodology and Implementation -- 6 Result -- 7 Conclusion and Future Scope -- References -- DroidApp: An Efficient Android Malware Detection Technique for Smartphones -- 1 Introduction -- 2 Related Work -- 3 Proposed Malware Detection Model DroidApp -- 3.1 DroidApp -- 3.2 Proposed Algorithms for the Model -- 4 Result Analysis and Discussion -- 5 Social and Managerial Implications -- 6 Conclusion -- References -- A Hybrid Approach to Optimize Handover Margin in UWSN by Integration of ACO with PSO and MVO: A Comparative Analysis -- 1 Introduction -- 1.1 Underwater Wireless Sensor Networks (UWSNs) -- 1.2 Handover -- 1.3 Optimization Techniques -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Model -- 5 Result and Discussion -- 5.1 Phase 1: Simulation of HOM -- 5.2 Phase 2: Optimization of HOM -- 5.3 Phase 3: Energy-Efficient ACO-Based Simulation for Optimized Path Selection -- 5.4 Comparison of Time Consumption in Case of ACOMVO and ACOPSO -- 6 Conclusion -- 7 Future Scope -- References -- Cyber Risks and Security-A Case Study on Analysis of Malware -- 1 Introduction -- 2 Literature Survey -- 3 Social Implications -- 4 Risks on Financial Services: A Flashback -- 4.1 Keylogger -- 4.2 Adware.5 The Proposed Study.The Integration of Six Sigma And Fmea Methods In Determining Crude Palm Oil (Cpo) Quality Improvement Factors At The Cot Girek Palm Oil Mill Unit Of Pt. Perkebunan Nusantara-1.- Simulation of Early Virtual Manufacturing for Polytechnic State of Bandung.- Comparative Study of Dry and MQL Condition on Hole Quality and Tool Vibration in Drilling Titanium Ti-6Al-7Nb Alloy.Lecture notes in networks and systems.Computer networksCongressesComputer scienceCongressesMathematicsComputer networksComputer science004.6Gupta DeepakedtKhanna AshishedtHassanien Aboul EllaedtAnand SameeredtJaiswal AjayedtMiAaPQMiAaPQMiAaPQBOOK9910624311103321International Conference on Innovative Computing and Communications1922137UNINA