10849nam 22005053 450 991085538440332120240503084511.0981-9707-00-5(CKB)31801752400041(MiAaPQ)EBC31311069(Au-PeEL)EBL31311069(MiAaPQ)EBC31319776(Au-PeEL)EBL31319776(EXLCZ)993180175240004120240503d2024 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierMobile Radio Communications and 5G Networks Proceedings of Fourth MRCN 20231st ed.Singapore :Springer Singapore Pte. Limited,2024.©2024.1 online resource (800 pages)Lecture Notes in Networks and Systems Series ;v.915981-9706-99-8 Intro -- Preface -- Contents -- Editors and Contributors -- Deep Learning Assisted Diagnosis of Parkinson's Disease -- 1 Introduction -- 2 Materials and Methodology -- 3 Results and Discussions -- 4 Conclusion and Future Directions -- References -- Deep Learning: How to Apply Machine Learning and Deep Learning Methods to Audio Analysis -- 1 Introduction -- 2 Discussion -- 3 Review Work -- 4 Methodology -- 5 Result -- 6 Conclusion and Future Scope -- References -- Naive Bayes Classifier-Based Smishing Detection Framework to Reduce Cyber Attack -- 1 Introduction -- 2 Related Work -- 3 Proposed Algorithm and Methodology of Work -- 4 Results and Discussions -- 5 Conclusion -- References -- A Novel System for Finding Shortest Path in a Network Routing Using Hybrid Evolutionary Algorithm -- 1 Introduction -- 1.1 Large-Scale Structure of the Universe -- 1.2 Limited Memory -- 1.3 Self-aware -- 1.4 Machine Learning Using Big Bang Shortest Path -- 2 Discussion Literature Review -- 2.1 Materials and Methods -- 2.2 Model Deployment -- 2.3 Feature Extraction -- 2.4 Model Evaluation -- 2.5 Model Deploymen -- 2.6 Case Study: Machine Learning -- 3 Drawing Conclusions -- 3.1 Research Methodology for Studying "The Big Bang Theory" Using Machine Learning -- 4 Methodology for Finding the Shortest Path -- 5 Result -- 6 Conclusions and Future Scope -- References -- Emotion Analysis and Gender Identification Using Partial Face Detection -- 1 Introduction -- 2 Literature Review -- 3 Methodology/ Experimental -- 3.1 Method -- 3.2 Loss Function -- 3.3 Partial Face Detection -- 4 Results and Discussions -- 4.1 Experimentation -- 4.2 Flow of the Project -- 5 Conclusion -- 6 Conclusion -- References -- Data Security Threats Arising Between a Cloud and Its Users -- 1 Introduction -- 2 Cloud Classification -- 2.1 Service Models -- 2.2 Cloud Deployment Models.3 Essentials Characteristics -- 4 Cloud Security Challenges -- 5 Data/Storage Issues -- 6 Related Work -- 7 Conclusion -- References -- Machine Learning Assisted Software Transplantation: A Baseline Technique -- 1 Introduction -- 2 Need for Software Transplantation -- 3 Motivation Backing This Work -- 3.1 Deficient Training Resources -- 3.2 Inadequate Knowledge of Other Frameworks -- 3.3 Oversized Exemplar (Re-training not Feasible) -- 3.4 Transplant Time and Training Time -- 3.5 Accomplishing the Same Accuracy -- 4 Proposed Transplantation -- 4.1 Implementation -- 5 Results and Discussions -- 5.1 Transplant Time and Training Time -- 5.2 Accuracy -- 5.3 Other Important Metrics -- 5.4 Summary of Exemplar Performance -- 6 Validation -- 7 Related Work -- 8 Conclusion and Future Work -- 9 Limitations -- References -- Gold and Silver Price Prediction in Indian Market Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Dataset -- 4.1 Data Record -- 5 Implementation and Design -- 5.1 Implementing the CNN Model -- 5.2 Implementation of the LSTM Model -- 6 Result Analysis -- 7 Conclusion -- References -- Fog-centric IoT Smart Healthcare: Architecture, Applications, and Case Study -- 1 Introduction -- 2 Fog-Driven IoHT Architecture -- 3 IoT Healthcare Services and Applications -- 3.1 Assisting Diagnosis and Treatment -- 3.2 Health Management -- 3.3 Disease Prevention/Risk Monitoring -- 3.4 Assisting Drug Research -- 3.5 Virtual Assistant -- 4 A Use Case Scenario: Smart Gloves with Fog-driven IoT Architecture -- 5 Conclusion -- References -- Responsive Mechanism for Cloud Offloading Data Intrusion Detection Using Spark-Machine Learning Model -- 1 Introduction -- 1.1 Limitations in CODIDS -- 1.2 Problem Statement -- 1.3 Key Contributions to the Paper Organization -- 2 Related Work.2.1 Features Dimensionality Reduction Approaches -- 2.2 Novel Perspective -- 3 Proposed Method -- 3.1 Workflow -- 3.2 Label Encoder Pseudo Code -- 3.3 Classification Models -- 4 Experimental Results -- 4.1 Encoding of Categorical Attributes -- 5 Results and Analysis -- 6 Conclusion -- References -- Impact of COVID-19 on People -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Research Queries -- 2.2 Strategy of Search -- 2.3 Inclusion/Exclusion Criteria -- 2.4 Dataset -- 3 Related Work -- 3.1 Impact on Health -- 3.2 Impact on Education -- 3.3 Impact on Employment -- 3.4 Impact Based on Other Factors -- 3.5 Summarized Impact of COVID-19 on the Economy -- 3.6 Summary on Related Studies -- 4 Discussion -- 4.1 Analysis on Health -- 4.2 Analysis on Education -- 4.3 Analysis on Economy -- 5 Results -- 6 Conclusion and Future Scope -- References -- Video Analysis Using Deep Learning in Smart Gadget for Women Saftey -- 1 Introduction -- 2 Theory and Formula -- 3 Experimental Setup -- 4 Implementation Using Opencv and Deploying the Model in Raspberry-Pi -- 5 Darknet Architecture -- 6 Setting up Twilio Notifications -- 7 Future Scope -- 8 Conclusion and Results -- References -- Compression of Medical Images Using Lifting Haar Wavelet Transform for Teleradiology Applications -- 1 Introduction -- 2 Lifting Wavelet Transform for Medical Image Compression -- 3 Results and Discussion -- 4 Conclusion -- References -- Leveraging Content Based Image Retrieval Using Data Mining for Efficient Image Exploration -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach for CBIR -- 4 Conclusion -- References -- Image Enhancement and Restoration: Deep Learning for Image Dehazing -- 1 Introduction -- 2 Survey Methodology -- 3 Literature Review -- 3.1 Approaches to Solve Image Dehazing Approaches -- 3.2 Datasets Used for Evaluation of Approaches -- 3.3 Evaluation Metrics.4 Issues and Challenges -- 5 Conclusion and Future Work -- References -- Hate Speech Detection in Social Media Using Ensemble Method in Classifiers -- 1 Introduction -- 2 Related Work -- 3 Methodologies -- 3.1 Random Forest Classifier -- 3.2 Support Vector Machine -- 3.3 Bagging Classifier -- 3.4 Adaboost Classifier -- 3.5 Gradient Boosting Classifier -- 3.6 TF-IDF Vectorization -- 4 Implementation -- 4.1 Accuracy Score -- 4.2 Precision Score -- 4.3 Recall Score -- 4.4 F1 Score -- 5 Discussion and Future Work -- 6 Conclusion -- References -- Detection and Classification of Neuro-Degenerative Disease via EfficientNetB7 -- 1 Introduction -- 2 Related Work -- 2.1 Arguments -- 3 Materials Used -- 3.1 Dataset Description and Pre-processing -- 4 Experimental Setup -- 5 Results and Discussion -- 5.1 Pre-processing and Time Delay Embedding -- 5.2 Pattern Classification -- 5.3 Experimental Environments -- 6 Conclusion -- References -- An Empirical Study of Rainfall Prediction Using Various Regression Models -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Methodology -- 3.2 ML Algorithms -- 3.3 Evaluation Metrics -- 4 Results and Analysis -- 5 Conclusion -- References -- A Novel Ensemble Approach for Colon Cancer Detection Over the Multiclass Colon Dataset -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Dataset Description -- 3.2 Pre-processing -- 3.3 Feature Extraction -- 3.4 Ensemble Model -- 4 Model Evaluation Parameter -- 5 Result Analysis -- 6 Comparative Analysis -- 7 Discussion -- 8 Conclusion -- References -- Area and Energy Efficient Booth Radix-4 Signed Multiplier Using Verilog -- 1 Introduction -- 2 Work Done -- 3 Results -- 3.1 Software Used -- 4 Reports -- 4.1 Critical Path Delay -- 5 Conclusion -- 6 Future Scope -- References.Enhancing Power Quality Improvement Using Model Predictive Controlled System with DPFC -- 1 Introduction -- 2 Operation of DPFC -- 3 Proposed Block Diagram of DPFC and 8-Bus System with Closed Loop FOPID/MPC System -- 3.1 Wind System Modelling -- 4 Controller Technology -- 4.1 FOPID Controller Design -- 4.2 MPC Controller Design -- 5 Simulation Results -- 5.1 Diagram of an 8-Bus System with Closed Loop DPFC and FOPID Controller -- 5.2 Diagram of an 8-Bus System with Closed Loop DPFC and MPC -- 6 Conclusion -- Appendix -- References -- Leveraging Machine Learning for Comprehensive Analysis of Maternal Health: Predicting Health Risks and Improving Antenatal Care -- 1 Introduction -- 1.1 Machine Learning in Healthcare -- 1.2 Motivation -- 1.3 Contributions of the Research -- 1.4 Outline of the Paper -- 2 Materials and Methods -- 2.1 Dataset Collection and Pre-Processing -- 2.2 Methodology -- 3 Results -- 4 Analysis -- 4.1 Performance Evaluation -- 5 Conclusion -- References -- Enhancing Information Security for Text-Based Data Hiding Using Midpoint Folding Approach: A Comparative Analysis -- 1 Introduction and Background -- 2 Proposed Work -- 3 Performance Parameters -- 3.1 PSNR (Peak Signal to Noise Ratio) -- 3.2 MSE (Mean Squared Error) -- 3.3 WPSNR (Weighted PSNR) -- 3.4 SSIM (Structured Similarity Index) -- 3.5 Embedding Capacity -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Parametric Variation Assessment of Extended Source Double Gate Tunnel Field-Effect Transistor (ESDGTFET) for Enhanced Performance -- 1 Introduction -- 2 Device Structure Description -- 3 Simulation Parameters and Setup -- 4 Results and Discussion -- 4.1 DC Characteristics -- 4.2 Transconductance -- 4.3 Capacitive Analysis -- 4.4 Cut-Off Frequency -- 5 Conclusion -- References -- A Review on Facial Anti-spoofing Techniques -- 1 Introduction.1.1 Face Spoofing Tactics.Lecture Notes in Networks and Systems SeriesMarriwala Nikhil Kumar1738085Dhingra Sunil1738086Jain Shruti1730720Kumar Dinesh737980MiAaPQMiAaPQMiAaPQBOOK9910855384403321Mobile Radio Communications and 5G Networks4160094UNINA