LEADER 12349nam 22007095 450 001 9910878065203321 005 20240727125234.0 010 $a9789819735914$b(electronic bk.) 010 $z9789819735907 024 7 $a10.1007/978-981-97-3591-4 035 $a(MiAaPQ)EBC31569901 035 $a(Au-PeEL)EBL31569901 035 $a(CKB)33468919700041 035 $a(DE-He213)978-981-97-3591-4 035 $a(EXLCZ)9933468919700041 100 $a20240727d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInnovative Computing and Communications $eProceedings of ICICC 2024, Volume 2 /$fedited by Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal, Prabhat Kumar 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (662 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1021 311 08$aPrint version: Hassanien, Aboul Ella Innovative Computing and Communications Singapore : Springer,c2024 9789819735907 327 $aIntro -- Preface -- Steering Committee -- Contents -- Editors and Contributors -- Bangladeshi CF Guard: Unveiling Bangladeshi Counterfeit Currency Through Transfer Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Security Features' Analysis -- 3.2 Data Collection -- 3.3 System Architecture -- 4 Result and Discussion -- 4.1 Experimental Outcomes -- 4.2 Discussion -- 5 Conclusion -- 5.1 Conclusion -- 5.2 Limitations and Future Work -- References -- Recognition of Sign Language Using Hybrid CNN-RNN Model -- 1 Introduction -- 2 Literature -- 3 Proposed Method -- 3.1 Preprocessing -- 3.2 Classification and Recognition -- 3.3 Proposed Work -- 4 Evaluation Strategies -- 4.1 Dataset -- 5 Experiment and Result -- 5.1 Dataset I -- 5.2 Dataset II -- 6 Conclusion and Future Direction -- References -- Nanotech Drones: An Investigation of Air Quality Index in Environment -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 3 Discussions and Results -- 3.1 Air Quality Index -- 3.2 Working of Nanotech Drone -- 4 Conclusion -- References -- Systematic Vulnerability Assessment: Mapping Architecture Flow and Ranking Components for Vulnerability in Connected Automated Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Architectural Flow -- 4 Scoring Criterion -- 5 Score Analysis -- 6 Results and Discussions -- 7 Conclusions -- References -- AI and Blockchain in Food and Beverage: Marketing 5.0 Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Starbucks Advanced Advertising -- 2.2 Digital Promotion -- 2.3 Marketing 5.0 -- 2.4 Applications of Blockchain Technology in F& -- B Industry -- 3 Methodological Framework -- 3.1 Exploring Knowledge Through Group Discussions -- 3.2 Quantitative and Qualitative Analysis of Content -- 3.3 The Analytical Cognizance of Content Scrutiny -- 4 Results. 327 $a5 Conclusion and Recommendations for Further Research -- References -- A Deep Learning-Based Cervical Tumor Classification System for Telehealthcare Monitoring -- 1 Introduction -- 2 Literature-Related Works -- 3 Stages of Prior Cervical Cancer -- 4 Class Activation Map (CAM) -- 5 System Methodology -- 5.1 Analyzing Prior Tumor Infiltration Evidence -- 5.2 DCNN Based on Prior Evidence -- 6 Experimental Findings -- 6.1 Improvement of Prediction Based on Prior Evidence -- 6.2 Staging Methods for Cervical Cancer Compared to Others -- 7 Conclusion -- References -- Big Data-Driven Intelligence Healthcare Framework for Smart Citizen -- 1 Introduction -- 1.1 The Importance of Big Data -- 1.2 Intelligent System for Healthcare -- 2 Background and Related Work -- 2.1 Digitization of Healthcare and Big Data -- 2.2 Technologically Advanced Urban Areas (Modern City) -- 2.3 Optimal Health -- 3 Dimensional Framework Paradigm -- 3.1 Advanced Healthcare Technologies -- 4 Proposed Intelligent Healthcare System -- 5 Pros, Cons, and Application -- 6 Conclusion -- References -- Smart Device with Arduino Controller for Home Inverter -- 1 Introduction -- 2 Design of Proposed System -- 2.1 Mathematical Analysis of Proposed System -- 2.2 Mathematical Calculations of Proposed System -- 2.3 Algorithm and Flowchart -- 3 Hardware Results and Discussions -- 4 Conclusion -- References -- Feature Selection with Particle Swarm for Improved Classification on High-Dimensional Datasets -- 1 Introduction -- 2 Literature Survey -- 2.1 PSO-Based Approaches -- 2.2 ACO-Based Approaches -- 2.3 FA-Based Approaches -- 2.4 GWO-Based Approaches -- 2.5 SSO-Based Approaches -- 3 Proposed Methodology -- 3.1 PSO-Based Feature Selection -- 3.2 PSO Pseudocode -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Comparative Analysis -- 4.3 Statistical Analysis -- 4.4 Runtime Computation (min:sec:milli_sec). 327 $a5 Conclusion -- References -- Breast Cancer Prediction Using Hybridization of Machine Learning and Optimization Technique -- 1 Introduction -- 2 Literature Survey -- 2.1 Previous Work Done Using Machine Learning Classifiers -- 2.2 Previous Work Done Using Deep Learning -- 2.3 Previous Work Done Using Optimization Techniques -- 2.4 Previous Work Done Using Genetic Algorithm -- 3 Methodology -- 3.1 Classifiers Used -- 3.2 Dataset Used -- 3.3 Optimization Technique Used -- 3.4 Parameters Setting -- 3.5 Implementation -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Securing Pictorial Data Transfer Through a Novel Digital Image Encryption Method -- 1 Introduction -- 2 Proposed Work -- 3 Structure of Encryption -- 4 Concept of Decryption -- 5 Pictorial Representation -- 6 Comparison with Visual Cryptography -- 7 Conclusion -- Appendix -- The idea of rotating matrices -- References -- IoT Routing Reimagined: Dynamic Phantom Routing with ACO for Efficient Source Location Privacy -- 1 Introduction -- 1.1 Contributions -- 1.2 Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 4.1 Network Condition-Based Dynamic Phantom Node Selection (NCDPNS) -- 4.2 Bio-inspired Algorithm-Aided Multi-path Selection-Based Routing (BAMSR) -- 5 Results -- 6 Conclusion and Future Work -- References -- Deep Learning-Based Evaluation of ICU Requirements in COVID-19 Cases -- 1 Introduction -- 2 Related Works -- 3 Overview the Proposed System -- 4 Methodology -- 5 Experimental Results -- 6 Discussion -- 7 Conclusion -- References -- Deep Learning-Based Tea Fermentation Grading -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 4 Evaluation -- 5 Results -- 6 Comparison -- 7 Conclusion -- 7.1 Statements and Declarations -- References. 327 $aAn Exploratory Study of the Relationship Between Students' Positive Attitudes Toward Artificial Intelligence and Computational Thinking Needed in the 6G Communications' Era -- 1 Introduction -- 2 Methodology -- 2.1 Survey Procedure and Survey Participants -- 2.2 Questionnaire Items -- 2.3 Analysis Procedure -- 3 Results -- 3.1 Preliminary Analysis -- 3.2 Descriptive Statistics of Positive Awareness of AI and Computational Thinking -- 3.3 Results of Logistic Regression Analysis -- 4 Discussions -- 4.1 Implications for Educational Program Development -- 5 Conclusion -- References -- Optimization of Double-Tuned Mass Dampers via Jaya Algorithm -- 1 Introduction -- 2 Methodology -- 3 The Numerical Example -- 4 Conclusion -- References -- Application of Wavelet Packet Transform for Detecting Bearing Issues -- 1 Introduction -- 2 History of Motor Vibration Data -- 3 Time-Frequency Domain Analysis -- 3.1 Analysis Based on DWT -- 3.2 Analysis Based on WPT -- 4 Results and Discussion -- 4.1 DWT-Based Frequency Range Determination of Outer Race Defect -- 4.2 WPT Based on Frequency Range Determination of Outer Race Fault -- 5 Conclusion and Future Scope -- References -- Detection of Potholes in Roads Using Siamese Neural Network for Safe Transportation -- 1 Introduction -- 2 Literature Survey -- 3 Methods and Technology Used -- 3.1 Dataset -- 3.2 Siamese Neural Network -- 3.3 Contrastive Loss Function -- 3.4 Training & -- Testing Set -- 3.5 Proposed Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- On the Security of Privacy-Preserving Bilateral Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contribution -- 2 The Scheme Presented by Sun et al. -- 2.1 System Model -- 2.2 Algorithms -- 2.3 Detailed Scheme -- 3 Cryptanalysis of the Scheme -- 3.1 Violating Receiver Privacy -- 3.2 Violating Sender Privacy -- 4 Conclusion. 327 $aReferences -- Analyzing the Financial Performance of Corporate Social Responsibility Using Machine Learning-Enabled Financial Enterprise Model -- 1 Introduction -- 2 Related Work -- 3 Proposed Method: Machine Learning Using a Financial Enterprise Model -- 4 Result and Discussion -- 5 Conclusion -- References -- A Survey on Driver Monitoring System Using Computer Vision Techniques -- 1 Introduction -- 2 Motivation -- 3 Literature Review -- 4 The Proposed System -- 4.1 Drowsiness Detection -- 4.2 Gaze Detection -- 4.3 Activity Recognition -- 4.4 Emotion Recognition -- 5 Conclusion -- References -- ICT-Based Smart Cities Planning: A Case Study of Rashid Camp -- 1 Introduction -- 2 Smart City: A Contemporary Revolution for Urban Space Management -- 3 The Geographic Information System (GIS) and Remote Sensing (RS): Smart Planning Support Tool -- 4 Description of the Case Study Al-Rashid Camp -- 5 Methodology and Approach -- 6 Results and Discussion -- 7 Conclusion -- References -- Detection of Hate Speech Using Ensemble Models -- 1 Introduction -- 2 Related Works -- 3 Experimental Setup and Proposed Methodology -- 3.1 Datasets -- 3.2 Data Collection and Preprocessing -- 3.3 Models -- 3.4 Classifier Evaluation -- 4 Result and Discussion -- 4.1 Model Training and Evaluation Metrics -- 5 Result and Discussion -- 6 Conclusion -- References -- Development of Dermatological Lesion Detection System Using EfficientNet with Fairness Evaluation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Methodology Flowchart -- 3.2 Algorithm Used -- 3.3 Proposed Model's Pseudocode -- 3.4 Steps Followed -- 4 Experimental Results and Discussion -- 4.1 Dataset Used -- 4.2 Performance Assessment -- 4.3 Performance Comparative Analysis -- 5 Conclusion -- References -- Quantum Computing's Path to Supremacy: Progress in the NISQ Epoch -- 1 Introduction. 327 $a2 The History of Quantum Computing. 330 $aThis book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16?17 February 2024. Introducing the innovative works of scientists, professors, research scholars, students, and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1021 606 $aTelecommunication 606 $aInternet of things 606 $aMachine learning 606 $aArtificial intelligence 606 $aCommunications Engineering, Networks 606 $aInternet of Things 606 $aMachine Learning 606 $aArtificial Intelligence 615 0$aTelecommunication. 615 0$aInternet of things. 615 0$aMachine learning. 615 0$aArtificial intelligence. 615 14$aCommunications Engineering, Networks. 615 24$aInternet of Things. 615 24$aMachine Learning. 615 24$aArtificial Intelligence. 676 $a621.382 700 $aHassanien$b Aboul Ella$0846730 701 $aAnand$b Sameer$01379088 701 $aJaiswal$b Ajay$01379089 701 $aKumar$b Prabhat$01758603 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910878065203321 996 $aInnovative Computing and Communications$94196819 997 $aUNINA