Vai al contenuto principale della pagina

4th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing : BDCC 2021 / / edited by Anandakumar Haldorai [and three others]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: 4th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing : BDCC 2021 / / edited by Anandakumar Haldorai [and three others] Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2023]
©2023
Descrizione fisica: 1 online resource (266 pages)
Disciplina: 006.3
Soggetto topico: Computational intelligence
Computer networks
Persona (resp. second.): HaldoraiAnandakumar
Note generali: Includes index.
Nota di contenuto: Intro -- Preface -- Contents -- Conference Organization -- Steering Committee -- Organizing Committee -- Technical Program Committee -- Part I Bigdata Services -- Performance Evaluation of Adaptive Neuro Fuzzy Inference System (ANFIS) for the Prediction of Cloud Service Provider -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Adaptive Neuro Fuzzy Inference System (ANFIS) -- 3.2 Tuning ANFIS Model -- 4 Results and Discussions -- 5 Conclusion -- References -- Experimental Comparative Analysis on Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN) on Aspect-Level Sentiment Analysis -- 1 Introduction -- 1.1 Sentiment Analysis -- 2 CNN and RNN in Sentiment Analysis -- 2.1 Convolutional Neural Network-Based Analysis -- 2.2 Recurrent Neural Network (RNN)-Based Analysis -- 3 Performance Metrics -- 3.1 Accuracy -- 4 Dataset -- 5 Performance Analysis on CNN and RNN Architectures -- 6 Future Research Directions -- 7 Conclusion -- References -- AI-Enabled Pregnancy Risk Monitoring and Prediction: A Review -- 1 Introduction -- 2 Pregnancy Risks -- 2.1 Preterm Labour -- 2.2 Preeclampsia -- 2.3 Gestational Diabetes Mellitus -- 2.4 Ectopic Pregnancy -- 2.5 Infections -- 2.6 Depression Anxieties -- 2.7 Other Complications -- 3 AI Techniques Applied in Maternal Healthcare -- 3.1 Supervised Learning -- 3.1.1 Foetal Health Risk Prediction -- 3.1.2 Preterm Delivery -- 3.1.3 Miscarriage Prediction -- 3.1.4 Preeclampsia Prediction -- 3.1.5 Ectopic Pregnancy -- 3.1.6 Impact of Dietary Intake -- 3.1.7 Relation Between Particulate Matter10(PM10) and Risk of Congenital Heart Disease (CHD) -- 3.2 Unsupervised Learning -- 3.2.1 Clustering -- 3.2.2 Dimensionality Reduction -- 3.3 Artificial Neural Network -- 3.4 Genetic Algorithm -- 3.5 Deep Learning -- 4 Conclusion and Future Research -- References.
Detection of Non-Technical Losses in Power Utilities Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Feature Selection -- 2.2 Imbalance Dataset -- 2.3 Machine Learning Algorithms to Detect NTL -- 3 Methodology -- 3.1 Data Flow -- 3.2 Data Collection -- 3.3 Data Cleaning and Preprocessing -- 3.4 Feature Extraction -- 3.5 Monitoring and Prediction -- 4 Implementation -- 4.1 Convert Categorical Features to Binary -- 4.2 Select Features -- 4.3 Hyperparameters -- 4.3.1 Extreme Gradient Boosted Trees (XGBoost) -- 4.3.2 Artificial Neural Network (ANN) -- 4.3.3 K-Nearest Neighbors (KNN) -- 4.4 Modeling -- 4.4.1 SMOTE Using Train/Test Split -- 4.4.2 SMOTE with Stratified K-Fold Cross-Validator -- 4.4.3 SMOTE with Stratified K-Fold Cross-Validator and Random under Sampler Class -- 5 Analysis and Findings -- 5.1 Feature Selection -- 5.2 SMOTE with Train/Test Split -- 5.3 SMOTE with Stratified K-Fold Cross-Validator -- 5.4 SMOTE with Stratified K-Fold Cross-Validator and Random Under-Sampler -- 5.5 Using all Features in the Dataset -- 6 Conclusion -- References -- Part II Bigdata and Security -- Data Hiding in Binary Images for Secret and Secure Communication Using Decision Tree -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Model -- 3.1 Image Partitioning and Message Division and Grouping -- 3.2 Block Processing -- 3.3 Decision Tree for Selection of Block for Data Hiding -- 3.4 Embedding Process -- 3.5 Extraction Process -- 4 Algorithms -- 5 Result Analysis and Performance Evaluation -- 6 Discussion -- 7 Conclusion and Future Scope -- References -- Private and Secure Blockchain-Based Mechanism for an Online Voting System -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Objectives -- 2 Related Work -- 3 Private and Secure Blockchain-Based Mechanism -- 3.1 Block Diagram of Private and Secure Blockchain-Based Mechanism.
3.2 Voting Process Diagram -- 3.3 Major Entities -- 3.3.1 The Blockchain Network -- 3.3.2 Smart Contract -- 3.3.3 Ethereum Wallets -- 4 System Implementation -- 4.1 Security Analysis -- 5 Conclusion -- References -- A Novel Real-Time 3D Object Detection Network in Autonomous Driving Using Reformed RS-ResNet network -- 1 Introduction -- 1.1 Adopting Image Data to Lidar Data-Related Problems -- 1.1.1 Major Parts in an Object Detection Pipeline -- 1.2 Projection of Lidar Range Data -- 1.2.1 Reasons for BEV Popularity -- 2 Related Work -- 3 Proposed Methodology -- 4 Results and Performance Analysis -- 5 Conclusion -- References -- Part III Bigdata Emerging Applications -- Various Physiological Methods to Identify Sleep Onset -- 1 Introduction -- 2 Methods of Measuring Sleep Onset -- 2.1 ECG -- 2.2 EEG -- 2.3 EOG -- 3 Discussions -- 4 Conclusion -- References -- Internet of Things (IoT) Adoption: Challenges Among Small and Medium Scale Enterprises (SMEs) -- 1 Introduction -- 2 Literature Review -- 2.1 Application of IoT -- 2.1.1 IoT Architecture Used for the Research -- 2.2 Objectives of Implementation of IoT -- 2.3 Industrial Managerial Capacity -- 3 Research Methods -- 4 Results -- 5 Discussions -- 6 Conclusions -- References -- What Your Tweets Say About You: A Case Study of Extraversion and Word Usage -- 1 Introduction -- 1.1 The Rise of Social Networking Sites -- 1.2 Personality and Social Media -- 2 Personality and the Internet: A Review -- 3 Extraversion and Social Media Usage -- 4 Methodology -- 4.1 Background -- 4.2 Current Work -- 5 Results and Discussions -- 6 Conclusion -- References -- Solar Radiation Prediction Using the Random Forest Regression Algorithm -- 1 Introduction -- 2 Random Forest Regression -- 2.1 Classification Problems -- 2.2 Entropy -- 2.3 Advantages -- 3 Solar Radiation Prediction Using the Random Forest Regression Algorithm.
3.1 Datasets -- 3.2 Implementation -- 3.2.1 Performance Evaluation Metrics -- 3.2.2 Testing and Training Data -- 3.2.3 Calculating Accuracy -- 4 Results and Analysis -- 4.1 Predicted Verses Actual Graph -- 4.2 Accuracy -- 5 Conclusion -- References -- Part IV Bigdata and Technology -- Online Covid-19 Risk Analysis System for Early Detection of Possible Infection -- 1 Introduction -- 2 Scope of the Project -- 3 Proposed Methodology -- 4 System Architecture -- 5 Module Description -- 5.1 ADMIN -- 5.2 USER -- 6 Implementation Details -- 6.1 ADMIN -- 6.2 USER -- 7 COVID-19 Risk Analysis Questions -- 8 Results -- 9 Results and Discussion -- 9.1 Workshop -- 10 Conclusion -- References -- Finger Knuckle Print Recognition Using Complex Conjugate Feature Vector -- 1 Introduction -- 2 Literature Study -- 3 Proposed PCA_LDA Complex Conjugate Vector FKP System -- 3.1 Feature Extraction -- 3.2 Complex Feature Vector Based on PCA and LDA Parallel Fusion -- 3.3 Euclidean Distance Measure -- 4 Results and Discussion -- 4.1 Data Description -- 5 Results -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 5.3 Performance Comparison with Other Methods -- 6 Conclusion -- References -- A Systematic Literature Review on Data Freshness for Reinforcing Mutual Authentication in Wireless Body Area Networks -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Paper Organization -- 2 Preliminaries -- 2.1 WBAN Communication Architecture -- 2.2 Session Key Establishment -- 3 Research Methodology -- 3.1 Research Goals -- 3.2 Selection of Research Articles -- 3.3 Inclusion and Exclusion Criteria -- 3.4 Quality Assessment -- 4 Results of the Systematic Literature Review -- 4.1 RQ1: What Are the Challenges in Exhibiting the Data Freshness Used to Ensure Authenticity in WBAN? -- 4.2 RQ2: What Are the Security Vulnerabilities in WBAN?.
4.3 RQ3: What Kinds of Mechanisms Are Used for Data Freshness in WBAN? -- 4.4 RQ4: What Kinds of Methods Are Available to Insist on Data Freshness to Obtain Authenticity Through the Lightweight Cryptographic Protocols? -- 5 Conclusion and Future Directions -- References -- Vehicular Support System for User and Vehicle Accident Prevention -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 3.1 Workflow for Framing Conversion -- 4 Results and Discussion -- 5 Summary -- References -- Part V Bigdata in Medical Applications -- Application of Multi-Focused and Multimodal Image Fusion Using Guided Filter on Biomedical Images -- 1 Introduction -- 2 Overview of Guided Filter -- 3 Methodology -- 4 Experimental Analysis -- 4.1 Image Quality Assessment -- 4.2 Subjective and Objective Analysis -- 5 Conclusion -- References -- Modelling Cognitive Scores for Alzheimer's Disease Progression Prediction Using Longitudinal MRI Data -- 1 Introduction -- 2 Methodology -- 2.1 Data Preprocessing -- 2.2 Modelling -- 2.3 Optimization -- 2.4 Predicting Cognitive Scores -- 3 Result and Discussions -- 4 Conclusion -- References -- An Automated Cervical Cancer Detection Mechanism Using Pap Smear Images -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Paper Organization -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Implementation -- 3.3 Algorithm -- 4 Results and Discussions -- 5 Conclusion and Future Directions -- References -- Index.
Titolo autorizzato: 4th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing  Visualizza cluster
ISBN: 3-031-07654-0
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910627264903321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: EAI/Springer Innovations in Communication and Computing