دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2021 نویسندگان: Ashish Khanna (editor), Deepak Gupta (editor), Zdzisław Pólkowski (editor), Siddhartha Bhattacharyya (editor), Oscar Castillo (editor) سری: Lecture Notes on Data Engineering and Communications Technologies, 54 ISBN (شابک) : 981158334X, 9789811583346 ناشر: Springer سال نشر: 2021 تعداد صفحات: 920 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 36 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Data Analytics and Management: Proceedings of ICDAM به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تجزیه و تحلیل داده ها و مدیریت: مجموعه مقالات ICDAM نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مشارکت های منتشر نشده اصلی ارائه شده در کنفرانس بین المللی تجزیه و تحلیل داده ها و مدیریت (ICDAM 2020)، که در دانشگاه یان ویزیکوفسکی، لهستان، در ژوئن 2020 برگزار شد، ارائه شده است. و شبکه های ارتباطی این کتاب کار نوآورانه ای توسط دانشگاهیان، محققان و کارشناسان برجسته صنعت ارائه می دهد که برای محققان و دانشجویان جوان مفید است.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2020), held at Jan Wyzykowski University, Poland, during June 2020. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.
ICDAM-2020 Committees Steering Committee Members Advisory Committee Preface About This Book Contents About the Editors A Forecasting-Based DLP Approach for Data Security 1 Introduction 2 Overview of DLP Approach 3 Data Training Model 3.1 Model Equations 3.2 Model Accuracy 3.3 Calculating Limit 4 Experimental Result 5 Conclusion References Detection of Anterior Cruciate Ligament Tear Using Deep Learning and Machine Learning Techniques 1 Introduction 2 Related Work 2.1 CNN Analysis 2.2 Classification Algorithms Analysis 2.3 Visualization Analysis 3 Methodology 3.1 Magnetic Resonance Imaging (MRI) 3.2 Deep Learning Techniques 3.3 Machine Learning Techniques 3.4 Region of Interest (ROI) 4 Proposed Solution 5 Experimental Results and Analysis 6 Future Scope References A Study on Image Analysis and Recognition Using Learning Methods: CNN as the Best Image Learner 1 Introduction 2 Background 3 Learning Algorithms 3.1 Random Forest 3.2 K-Nearest Neighbor 3.3 Logistic Regression 3.4 Support Vector Machine 3.5 Artificial Neural Network and Convolutional Neural Network 4 Experiment and Result Discussion 5 Conclusion and Future Work References ANN Model for Forest Cover Classification 1 Introduction 2 Proposed Methodology 2.1 Getting Data 2.2 Preprocessing 3 Exploratory Study on Feature Selection 4 Data Visualization 5 Evaluation, Prediction, and Analysis 6 Conclusions References An Approach to Detect Sarcasm in Tweets 1 Introduction 2 Literature Review 3 Proposed Methodology 3.1 Data Collection 3.2 Data Pre-processing 3.3 Feature Extraction 3.4 Classification 3.5 Evaluation 4 Conclusion References A Trust-Based Approach to Extract Social Relationships for Recommendation 1 Introduction 2 Related Work 3 Proposed Work 3.1 Trust-Based Approach 4 Conclusion References A Green 6G Network Era: Architecture and Propitious Technologies 1 Introduction 2 Development of Mobile Connection Networks 2.1 Evolution of Mobile Connection Networks from 1G to 3G 2.2 4G 2.3 5G 2.4 Motive of Green 6G 3 Green 6G Network: Architecture 3.1 From Terrestrial to Universal 3D Distribution 3.2 Toward Intelligent Network 3.3 Modern Structure of Network Protocol Stack 4 Propitious Technologies of Green 6G 4.1 New Communication Paradigm 4.2 Fundamental Techniques 4.3 Spectrum Communication Techniques 5 Conclusion References Onion Price Prediction for the Market of Kayamkulam 1 Introduction 2 Related Work 3 Materials and Methods 3.1 Dataset 3.2 Methodology 4 Results 5 Conclusion 6 Discussion References A Technical Review Report on Deep Learning Approach for Skin Cancer Detection and Segmentation 1 Introduction 2 Discussion 3 Datasets and Performance Measures 3.1 PH2 Dataset 3.2 ISIC 2017 and ISIC 2018 3.3 ISBI 2016 and ISBI 2017 4 Conclusion References A Secure Epidemic Routing Using Blockchain in Opportunistic Internet of Things 1 Introduction 2 Related Work 3 Proposed Work 3.1 System Model 3.2 Consensus Algorithms 4 Simulation and Results 5 Conclusion References Improved MAC Design-based Dynamic Duty Cycle for Vehicular Communications over M2M System 1 Introduction 2 System Model 3 Medium Access Control Design 4 Proposed CSMA Multi-layers Protocol for Intra-Cluster Vehicular Communication 5 Simulation Results 6 Conclusion References Ruggedizing LTE Security Using Hybridization of AES and RSA to Provide Double Layer Security 1 Introduction 1.1 Symmetric-Key Algorithm 1.2 Asymmetric-Key Algorithm 2 Current Related Research Survey 3 Proposed Hybrid Algorithm 4 Encryption Process 5 Decryption Process 6 Results and Discussions 6.1 Number of Keys Used 6.2 Encryption and Decryption Time for Keys (K1 and K2) 6.3 Time Taken for Encryption and Decryption Phases 6.4 PSNR Analysis 6.5 Validation Using Confusion and Diffusion Tests 7 Conclusion References Performance Evaluation of Merging Techniques for Handling Small Size Files in HDFS 1 Introduction 2 Problem of Small File in HDFS 3 Related Work: A Brief Survey 4 Merging Techniques for Handling Small Size Files 4.1 HAR 4.2 Sequence File 4.3 CombineFileInputFormat 4.4 Hadoop Streaming 5 Empirical Evaluation 5.1 Execution Time 5.2 HDFSBytesRead 5.3 HDFSBytesWritten 5.4 HDFSReadOperation 5.5 HDFSWriteOperation 6 Conclusion References Analysis, Visualization and Forecasting of COVID-19 Outbreak Using LSTM Model 1 Introduction 2 Related Work 3 Materials and Methods 3.1 Data 3.2 LSTM 3.3 Model and Architecture 3.4 Steps for Training the LSTM 4 Result and Discussion 4.1 Plot Model Loss for Confirmed and Death Cases 4.2 Diseases Trend Analysis 4.3 Comparison of Prediction to Actual Values 4.4 Tracking and Prediction of Epidemic 5 Conclusion References Virtual Machine Replication in the Cloud Computing System Using Fuzzy Inference System 1 Introduction 2 Related Work 3 Proposed Method 3.1 Description and Membership Function (MF) of Input and Output Variables 3.2 Proposed Fuzzy Rules for PMFIS1 and PMFIS2 4 Performance Evaluation 5 Conclusion References A Dimensional Representation of Depressive Text 1 Introduction 1.1 Need for the Study 1.2 Contributions 2 Method 2.1 Dataset 2.2 Experimental Approach 3 Results 4 Discussion 5 Conclusion and Future Work References Machine Learning Algorithms to Predict Potential Dropout in High School 1 Introduction 2 Background and Related Work 3 Machine Learning Techniques 3.1 Logistic Regression 3.2 KNN Algorithm 3.3 Random Forest 3.4 ROC Curve 4 Data Set 4.1 Data Processing 4.2 Numerical Data 4.3 Categorical Data 5 Experiment and Result 5.1 Training Phase 5.2 Method of Analysis 6 Discussion 7 Conclusion References Explaining Deep Learning-Based Classification of Textual Tweets 1 Introduction 2 Local Interpretable Model-Agnostic Explanations (LIME) 3 System Architecture 3.1 Dataset 3.2 Data Preprocessing 3.3 Model Training and Explanation 4 Experiments and Evaluation 4.1 Implementation Details 4.2 Results 5 Conclusion References Effect of Quality of Existing Concrete Structures in Ajdabia Region, Libya 1 Introduction 2 Materials and methods 3 Modeling Approach 3.1 General 3.2 Standards of Control 3.3 Approved Criteria. 3.4 Proposed Libyan-Based Approach 4 Results and Discussions 4.1 Standards of Control 4.2 Evaluation and Approved of Concrete 5 Conclusion 6 Recommendations References Machine Learning and Evolutionary Algorithms for the Diagnosis and Detection of Alzheimer’s Disease 1 Introduction 2 Literature Review 3 Methodology 3.1 Initial Setup 3.2 Selection of Evolutionary Algorithm 3.3 Binary Ant Colony Optimization (ACO) 3.4 Particle Swarm Optimization (PSO) 3.5 Artificial Bee Colony Optimization (ABC) 3.6 Bacterial Foraging Algorithm (BFOA) 4 Implementation 4.1 Input Parameters 4.2 Dataset 5 Results and Discussion 6 Conclusion and Future Scope References Comparison of Various Word Embeddings for Hate-Speech Detection 1 Introduction 2 Related Work 3 Word Embedding Models 3.1 Word2Vec 3.2 GloVe 3.3 Fast-Text 3.4 ELMo (Embeddings from Language Models) 4 Illustration of Vector Representation of Models on Sample Data 5 Comparison and Graphs 5.1 Word2Vec 5.2 GloVe 5.3 Fast-Text 5.4 ELMo 6 Hate Speech Detection Using Word Embedding Models 7 Results and Discussion 8 Conclusion References Multimodal Biometric Algorithm Using IRIS, Finger Vein, Finger Print with Hybrid GA, PSO for Authentication 1 Motivation and Literature Review 2 Objectives and Scope 3 Proposed System 3.1 Iris Recognition 3.2 Finger Vein Recognition 3.3 Finger Print Recognition 3.4 Normalization 3.5 Score-Level Fusion and Optimization 4 Results and Discussions 5 Conclusion 6 Future Enhancement References Employing Real-Time Object Detection for Visually Impaired People 1 Introduction 2 Literature Survey 3 System Design 3.1 Hardware Specifications 3.2 Software Requirement 4 Image Classification 5 Results and Discussions 6 Conclusions 7 Acknowledgement References DDoS Attacks Impact on Data Transfer in IOT-MANET-Based E-Healthcare for Tackling COVID-19 1 Introduction 1.1 MANET and DDOS Attacks 2 E-Healthcare 3 AODV, SAODV and HWMP Routing Protocols 4 Simulation Results 5 Discussions and Conclusion 5.1 Current and Future Developments References BER Performance Analysis of MMSE with ZF and ML Symbol Detection for Hard Decision MU-MIMO LTE on Rayleigh Fading Channel 1 Introduction 2 Literature Review 3 System Model 4 Simulation Analysis 5 Results 6 Conclusion References Traffic Congestion Analysis and Occupancy Parameter in India 1 Introduction 2 Traffic Measurement and Theory 2.1 Traffic Flow Measurement 2.2 Traffic Congestion from Theory and Measurement 2.3 Definition of the Traffic Flow Characteristics from Measurement 3 Traffic Congestion Analysis 3.1 Traffic Congestion Analysis 3.2 Comparison Between Congestion Loss and Measurement 4 Conclusion Appendix References Performance Evaluation and Comparison Study of OFDM in AWGN and Colored Noise Environment 1 Introduction 2 System Model 2.1 OFDM Transmitter 2.2 OFDM Receiver 2.3 AWGN and Colored Noise 3 Simulation Results—Comparison and Discussion 4 Conclusion References Performance Improvement Using Spline LS and MMSE DFT Channel Estimation Technique in MIMO OFDM Using Block-Type Pilot Structure 1 Introduction 2 System Model 3 Channel Estimation 4 Methodology 5 Results and Analysis 6 Conclusion References Deep Learning Approach for Speech Emotion Recognition 1 Introduction 2 Speech Emotion Recognition Structure 2.1 Database 2.2 MFCC Features 3 Convolution Neural Networks 3.1 Overview of Convolution Neural Networks 3.2 Proposed Convolution Neural Network 4 Experimental Results 5 Conclusions References Detection of Cache Pollution Attacks in a Secure Information-Centric Network 1 Introduction 2 NDN Overview 3 Literature Review 4 Novel Based K-Means Clustering Technique 5 Conclusion References Effects of Social Distancing on Spread of a Pandemic: Simulating Trends of COVID-19 in India 1 Introduction 2 Literature Review 3 Experimental Design 3.1 Dataset 3.2 SEIR-DH Model 3.3 Regression Model 4 Results and Discussions 5 Conclusion References Implementation of EAODV-Based SON for Balanced Energy-Efficient Routing Using Tree for WSN 1 Introduction 1.1 Self-configuring 1.2 Self-optimization 1.3 Self-healing 2 Literature Survey 3 Proposed Technique 3.1 Sequential Process Explanation 3.2 Source Code of E-ASER 3.3 Tree-Based Cluster Formation 3.4 Efficient Data Transfer 4 Results and Discussion 4.1 Energy Utilization 4.2 Average No. of Dead Nodes 4.3 Path Load 4.4 Lifetime 5 Conclusion References An Efficient Technique for Traffic Estimation Using Virtual Trip Lines in Probe Vehicles 1 Introduction 2 Materials and Methods 2.1 Gadget Observing Difficulties 2.2 Proposed Work 2.3 Single Vehicle Location 2.4 Traffic Information Gatherer 3 Results and Discussion 3.1 Guide Coordinating Area Frequency 3.2 Traditional Technique VS VTLD 4 Conclusion References Automated Attendance Management Using Hybrid Approach in Image Processing 1 Introduction 2 Existing System 2.1 Face Recognition-Based Attendance System [1] 2.2 Face Detection System for Attendance of Class’ Students [2] 2.3 Ear-Based Attendance Monitoring System [3] 2.4 Face Recognition Using Histogram of Oriented Gradients 2.5 Face Recognition Using a Fuzzy Fisherfaces Classifier 2.6 An Automatic Attendance System Using Image Processing 3 Challenges Faced by Existing Systems/Limitations of Existing Work 4 Working Model/Architecture of the System 4.1 Face Detection 4.2 Face Recognition 5 Tools and Software Used 5.1 Tools 5.2 Software 6 Conclusion References Real-Time, YOLO-Based Intelligent Surveillance and Monitoring System Using Jetson TX2 1 Introduction 1.1 Contribution of the Paper 2 Related Work 3 Proposed Work 4 System Implementation 4.1 Environmental Setup 4.2 Object Detection with YOLO V3 4.3 Information Extraction and Transmission 4.4 Information Uploading on Real-Time Database for Android App 4.5 Information Collection and Analysis at Server 5 Results 6 Future Scope 7 Conclusion References Optimized Resource Allocation Technique Using Self-balancing Fast MinMin Algorithm 1 Introduction 1.1 Characteristics of Cloud Computing 1.2 Advantages of Cloud Computing 1.3 Limitations 2 Literature Survey 3 Existing Algorithm (MinMin Algorithm) 3.1 Advantages of MinMin Algorithm 3.2 Disadvantages of MinMin Algorithm 4 Proposed Algorithm: Self-balancing Fast MinMin Algorithm (SBFMM) 4.1 Algorithm for SBFMM 5 Results 6 Conclusion and Future Scope References Routing Protocol Based on NSGA-II for Social Opportunistic Networks 1 Introduction 2 Related Work 3 System Model 3.1 Collaboration Probability 3.2 Average Forwarding Delay Degree 3.3 Multi-objective Evolutionary Algorithms 4 Proposed Approach 4.1 NSRP Algorithm and Its Details 5 Conclusion and Future Work References Connected Public Transportation System for Smart City 1 Introduction 1.1 Contributions 2 Current Situation 2.1 Implementation of ITS 3 Connected Intelligent Transportation System 3.1 Why India Is not Able to Implement ITS 3.2 How to Implement ITS in India 3.3 Advantages of Connected Transport System 4 Proposed Approach 4.1 Architecture 4.2 Flow Diagram 5 Results 6 Conclusion References Fibroid Segmentation in Ultrasound Uterus Images Using Wavelet Filter and Active Contour Model 1 Introduction 2 Related Works 3 Materials and Methods 3.1 Image Acquisition 3.2 Preprocessing 3.3 Segmentation Using Active Contour 4 Results and Discussion 5 Conclusion References YOLOv3 Remote Sensing SAR Ship Image Detection 1 Introduction 2 Related Work 3 Methodology 4 Implementation Details 5 Results and Discussion 6 Conclusion References Parametric Optimization of Improved Sensing Scheme in Multi-antenna Cognitive Radio Network over Erroneous Channel 1 Introduction 2 Analytical Framework 3 False Alarm and Missed Detection Probability in the CUs 4 Parametric Optimization for Improved Sensing Performance 4.1 Cooperative User Density Optimization 4.2 Optimization of Normalized Threshold and IED 5 Conclusion References Identification of Diabetic Retinopathy for Retinal Images Using Feed Forward Neural Network 1 Introduction 2 Proposed System 2.1 Retinal Images 2.2 Image Enhancement 2.3 Feature Extraction 2.4 Feed Forward Neural Network 3 Results and Discussion 3.1 Tabulation 4 Conclusion References Ameliorating Accuracy Using Dual Dimensionality Reduction on a Classification Data set 1 Introduction 2 Background Study 3 Profuse Methodologies Used to Accomplish the Research 3.1 Random Forests 3.2 Factor Analyses 3.3 Independent Component Analysis 3.4 Singular Value Decomposition 3.5 Principal Component Analysis 3.6 t-Distributed Stochastic Neighbor Embedding (t-SNE) 3.7 UMAP 3.8 ISOMAP 4 Experimental Study 4.1 Factor Analysis 4.2 Independent Component Analyses 4.3 Singular Value Decomposition (SVD) 4.4 Principal Component Analyses (PCA) 4.5 t-Distributed Stochastic Neighbor Embedding (t-SNE) 4.6 UMAP 4.7 ISOMAP 5 Results 6 Comparison 7 Conclusion and Future Work References Data Imputation in Wireless Sensor Network Using Deep Learning Techniques 1 Introduction 2 Time Series Forecasting and Imputation 3 Organization of Research Paper 4 Literature Review 5 Model Architecture 5.1 Input Module 5.2 Variable Length Sliding Window 5.3 Model Module 5.4 Output Module 6 Flowchart 7 Implementation of Proposed Work 8 Result Analysis 9 Conclusion References Analysis of COVID-19 Data Using Machine Learning Techniques 1 Introduction 2 Pattern Identification for COVID-19 3 Use of Machine Learning and AI in Medical Field to Predict the Patterns 4 Suggested Machine Learning and AI Approaches to Predict the Patterns of COVID-19 5 Analysis of COVID-19 Data Using Real Datasets 6 Conclusion References CapGen: A Neural Image Caption Generator with Speech Synthesis 1 Introduction 2 Related Work 3 Dataset 4 The Proposed CapGen Model 4.1 Automatic Feature Extraction 4.2 Caption Preprocessor 4.3 Data Preparation 4.4 Decoder 4.5 Deployment 5 Implementation 6 Results 7 Conclusion References An Improved Method for Denoising of Electrocardiogram Signals 1 Introduction 1.1 Noises in ECG Signal 2 Materials and Methods 2.1 ECG Database 2.2 Method 2.3 Discrete Wavelet Transform 2.4 Savitzky–Golay (SG) Filter 3 Simulated Results and Discussion 3.1 Removal of Baseline Wander 3.2 Removal of High Frequency Noise 4 Comparison with Existing Method 5 Conclusion References Product Recommendation Platform Based on Natural Language Processing 1 Introduction 1.1 Literature Review 2 Proposed Methodology 2.1 Collecting Data for Analysis 2.2 Recommending Relevant Products 2.3 Semantic Comparison of Descriptions 3 PRODUCTS50 Database 4 Results 4.1 Qualitative Analysis 4.2 User Study 5 Conclusion and Future Work References A Secured Supply Chain Network for Route Optimization and Product Traceability Using Blockchain in Internet of Things 1 Introduction 2 Related Work 3 Proposed Work 3.1 Blockchain 3.2 Consensus Algorithms 3.3 Route Optimization 4 Simulation and Results 5 Conclusions and Future Scope References Enhancing Image Resolution and Denoising Using Autoencoder 1 Introduction 2 Literature Review 3 Autoencoder 4 Data Set 5 Implementation and Results 6 Image Denoising Stage 7 Enhancement of Image Resolution 8 Conclusion References Detecting Organic Audience Involvement on Social Media Platforms for Better Influencer Marketing and Trust-Based E-Commerce Experience 1 Introduction 2 Literature Review 3 Methodology 3.1 Characteristics of Dataset 3.2 Analysis 4 Results 5 Conclusions 6 Future Work References A Framework for Sandboxing of Pandemic Spread 1 Introduction 2 Proposed System Framework 3 Current Research Status 3.1 Social Structures 3.2 Spread Modelling 4 Model Functionalities 4.1 Graph Model 4.2 Correlation Dimensions 4.3 Correlation Rules 4.4 Population Immunity Prediction 5 Conclusion References Hybrid Recommender System Using Artificial Bee Colony Based on Graph Database 1 Introduction 2 Related Work 2.1 Introduction of Recommender Systems 2.2 Introduction of Artificial Bee Colony Algorithm 2.3 Graph Database 3 Research Approach of the Hybrid Recommender System 3.1 Preprocessing of Data 3.2 Content-Based Filtering 3.3 Collaborative Filtering 3.4 K-Means and Artificial Bee Colony Algorithm 3.5 Cosine Similarity 3.6 Combining Results 4 Implementation of Recommender System 5 Conclusion and Directions for Future Work References NPMREC: NPM Packages and Similar Projects Recommendation System 1 Introduction 2 Related Work 3 Prerequisites 3.1 Libraries.Io Web site 3.2 Information Retrieval & Natural Language Processing Techniques Used in NPMREC 4 Research Approach for Npmrec 4.1 Recommendation Model 4.2 Training and Testing 4.3 Updating Data Set from User Feedback (Insertion of New Projects) 5 Implementation, Results and Analysis 5.1 Dataset Used 5.2 Evaluation Metric 5.3 Experimental Setting 5.4 Results and Analysis 6 Conclusion and Future Work References Electronic Wallet Payment System in Malaysia 1 Introduction 1.1 Scope of the Study 2 Literature Review 3 Materials and Methods 3.1 Methodology 4 Results and Discussion 4.1 Overview of E-Wallet in Malaysia 4.2 The Technology Used in E-Wallet 4.3 E-Wallet Companies in Malaysia 4.4 E-Wallet Usage Among Students 5 Discussion 6 Conclusion Appendix A References Implementation of Violence Detection System using Soft Computing Approach 1 Introduction 2 Video Surveillance 3 Proposed Technique 4 Experimental Results 5 Conclusion References An Algorithm to Design a Scalable Control Layer for a Software-Defined Network 1 Introduction 2 Related Work 2.1 Static CPP Solutions 2.2 Dynamic CPP Solutions 3 Principles Involved 3.1 Tree Robustness 3.2 Request Handling Capacity of the Controller 3.3 Latency Requirements and Possible Controller Location 3.4 Notion of Pivot Node 4 Algorithm 5 Simulation Results 5.1 Controller's Packet Processing Equality 5.2 Average Depth of the Control Tree 5.3 Anticipated Data Loss 6 Conclusion 7 Future Work References Hybrid Model with Word2vector in Information Retrieval Ranking 1 Introduction 1.1 Ranking 1.2 Ranking-Related Problems 1.3 Evaluation Measures 1.4 PSO 1.5 SVM 1.6 Word Embedding Using Word2Vector 1.7 Objectives of Current Research 2 Related Works 3 Proposed Methodology 4 Results and Discussion 5 Experimental Evaluation 6 Conclusion and Future Scope References Heuristic Approach Towards COVID-19: Big Data Analytics and Classification with Natural Language Processing 1 Introduction 2 Methodology 2.1 About the Dataset 2.2 Primary Sequences on Which the Work is Based 2.3 Data Storage 2.4 Environment Setup 2.5 Starting 2.6 The Dataset Looks like 3 Results 3.1 K-mer Formation of Sequence or Natural Language Processing of the Data 3.2 Individual Class Comparison of Dataset in Form of Graphs or Histograms Which is Very Important for Data Analysis 3.3 Individual Nucleotide Comparison of Dataset in Form of Graphs or Histograms Which is Very Important for Data Analysis 3.4 For Better Analysis We Did a 1 to 1 Nucleotide Comparison of Data 3.5 Interpretation from the Above Plot 3.6 Logistic Regression Applied in Order to Classify the Three Sequences 4 Discussion 5 Conclusion and Future Scope References SSDA: Sleep-Scheduled Data Aggregation in Wireless Sensor Network-Based Internet of Things 1 Introduction 2 Background Overview 3 Operational Functioning of SSDA 3.1 Setup Phase 3.2 Steady State Phase 3.3 Sleep Scheduling 3.4 Network Assumptions 4 Simulations Results and Discussion 4.1 Performance Metrics 5 Conclusion References Prediction Using Machine Learning in Sports: A Case Study 1 Introduction 2 Literature Survey 3 Application of Machine Learning: Cricket as Case Study 4 Problem Statement 5 Materials and Methods 5.1 Decision Tree and Random Forest 5.2 Algorithm 5.3 Logistic Regression 5.4 Experimental Setup 6 Results 7 Conclusion References Analysis of Vehicle Collision Prediction Algorithms Using CNN 1 Introduction 2 Preliminaries 3 Database Used 4 The Proposed Model 5 The Process 6 Results and Discussion 6.1 The Base Models 6.2 Best Performing CNNs 6.3 Worst performing CNNs 6.4 Trends 7 Conclusion References Multimodal Deep Learning Architecture for Identifying Victims of Online Death Games 1 Introduction 2 Related Literature Survey 3 Research Challenges 4 Proposed Architecture 4.1 Algorithm and Framework 4.2 Processing Images 4.3 Processing Text 4.4 Data Set and System Integration 4.5 Limitations and Future Scope 5 Discussion References TS-GAN with Policy Gradient for Text Summarization 1 Introduction 2 Dataset 3 Literature Review 4 Proposed Work 4.1 Ts-Gan 4.2 Policy Gradient 5 Results 6 Conclusion References Energy-Efficient Routing Protocols for Cluster-Based Heterogeneous Wireless Sensor Network (HetWSN)—Strategies and Challenges: A Review 1 Introduction 1.1 Preliminaries 1.2 Outline 2 Literature Review 3 Classification of HetWSN 3.1 Static Heterogeneous WSN (HetWSN) 3.2 Mobile Heterogeneous WSN (HetWSN) 4 Statistical Analysis 5 Current Issues and Discussion in HetWSN 6 Conclusion References Voice-Based Gender Identification Using qPSO Neural Network 1 Introduction 2 Background 2.1 Conventional Particle Swarm Optimisation Algorithm 2.2 Quantum Optimisation 2.3 Optimised Evolutionary Algorithm 3 Methodology 3.1 Dataset 3.2 Preprocessing 3.3 Classification 4 Results and Discussions 5 Conclusion References A Machine Learning Approach for the Classification of the Buddha Statues of Borobudur (Indonesia) 1 Introduction 2 Literature Review 3 Analysis of Buddha Statues Through the Application of Machine Learning 4 Automatic Art Analysis 5 Proposed Model for Identification of the Buddha Statues of Borobudur 6 Experimental Setup and Results 7 Conclusion References Retrieval Mechanisms of Data Linked to Virtual Servers Using Metaheuristic Technique 1 Introduction 2 Review of the Literature 3 Performance Analysis and Representation 3.1 Implementation of Metaheuristic Approach 3.2 Application of Ant Colony Optimization Towards Query Optimization 3.3 Algorithm 3.4 Experimental Analysis 4 Optimization Criteria 5 Discussion and Future Direction 6 Conclusion References Machine Learning Approaches for Psychological Research Review 1 Introduction 2 Machine Learning Approaches for Psychology 2.1 State of the Art 3 ML Tools and Frameworks 4 Pros and Cons of Implementing Machine Learning Solutions 5 Discussion and Conclusions References Transformation of Higher Educational Institutions from Distance Learning to the E-Learning 5.0: An Analysis 1 Introduction 1.1 Legal Aspects of Implementing Remote Learning 1.2 Organizational Aspects of Implementing Remote Teaching 1.3 Technical Aspects of Implementing Remote Teaching 2 Literature Review 3 Methodology 4 Results 4.1 Students Attendance During Remote Classes 4.2 Summary of the Analysis 5 Future Work 6 Conclusion and Future Scope References Author Index