دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Deepak Gupta, Ashish Khanna, Vineet Kansal, Giancarlo Fortino, Aboul Ella Hassanien (eds.) سری: Advances in intelligent systems and computing, Volume 1374 ISBN (شابک) : 9789811633461, 9811633460 ناشر: Springer سال نشر: 2022 تعداد صفحات: [902] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 22 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Proceedings of Second Doctoral Symposium on Computational Intelligence : DoSCI 2021 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات دومین سمپوزیوم دکتری هوش محاسباتی : DoSCI 2021 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
DoSCI 2021 Steering Committee Members Preface Contents About the Editors Investigation of Consumer Perception Toward Digital Means of Food Ordering Services 1 Introduction 2 Literature Review 2.1 Trust and Security 2.2 Web Site Design 2.3 Payment System 2.4 Service Quality 2.5 Delivery 2.6 Customer Service 2.7 Food Quality 2.8 Objectives of the Study 3 Scope of Study 4 Research Methodology 5 Analysis and Interpretation 5.1 Perceptual Map 5.2 Usage of Food Delivery and Ordering Apps 5.3 Factors Affecting Usage of the Food Delivery Apps 6 Conclusion References A Systematic Review of Blockchain Technology to Find Current Scalability Issues and Solutions 1 Introduction 2 Scalability Problem Understanding 3 How Design of Blockchain Affect Scalability 4 Solutions to Scale Blockchain 4.1 Layer 0 4.2 Layer 1 (On-chain) Solutions 4.3 Layer 2 (Off-chain) Solutions 4.4 Consensus Mechanisms 4.5 Other Latest Protocols/Solutions to Scale Blockchain 5 Future Scope of Blockchain Technology 5.1 When Blockchain Technology Will be Combined with Other Technology 5.2 Benefits that Blockchain Technology and Smart Contract Could Bring to All Sectors 5.3 Important Points Preventing Growth of Blockchain Technology 5.4 SWOT Analysis of Blockchain Technology 6 Conclusion References Secured Blind Image Watermarking Using Entropy Technique in DCT Domain 1 Introduction 2 Related Work 3 Proposed Digital Image Watermarking Algorithm 3.1 Proposed Watermark Embedding Algorithm 3.2 Proposed Watermark Extraction Algorithm 4 Experimental Results and Comparison 5 Conclusion References Prediction of Heart Disease Using Genetic Algorithm 1 Introduction 2 Related Work 3 Classification 4 Classification Methods 4.1 Artificial Neural Network 4.2 Genetic Algorithm 5 Feature Engineering 5.1 Performance Measures 6 Prediction Analysis 7 Conclusion References Secured Information Infrastructure for Exchanging Information for Digital Governance 1 Introduction 1.1 Definition of Blockchain 1.2 Blockchain Technology 1.3 Smart Contract 1.4 Distributed Ledger Technology 1.5 Types of Blockchain 2 Literature Survey 2.1 Digital Governance (E-governance) 2.2 Benefits of Applying Blockchain Technology in Governance 3 Problem Statement 4 Hypothesis 5 Methodology 6 Expected Impact 7 Conclusion References Spiral CAPTCHA with Adversarial Perturbation and Its Security Analysis with Convolutional Neural Network 1 Introduction 1.1 Contribution of this paper is listed as follows 2 Related Work 3 Proposed Work and Methodology 3.1 Design of Proposed Spiral CAPTCHA 3.2 Creation of Dataset 3.3 Designing CNN 3.4 Training a CNN with Training Datasets and Testing it with Testing Datasets 3.5 Adding Perturbation to Image Dataset and Testing CNN Again with Perturbed Data 4 Performance Parameters 5 Results and Discussion 5.1 Results for Spiral CAPTCHA without Perturbation 5.2 Results for Spiral CAPTCHA with Perturbation 6 Usability and Security 7 Concluding Remarks References Predicting Classifiers Efficacy in Relation with Data Complexity Metric Using Under-Sampling Techniques 1 Introduction 2 Related Works 3 Proposed Work 4 Experimental Results 4.1 Results and Discussion 5 Conclusion References Enhanced Combined Multiplexing Algorithm (ECMA) for Wireless Body Area Network (WBAN) 1 Introduction 2 Related Works 3 Proposed Model 4 Proposed Transmission Scheme Algorithm 5 Proposed Transmission Scheme Flowchart 6 Experiments and Results 7 Conclusion References A Survey: Approaches to Facial Detection and Recognition with Machine Learning Techniques 1 Introduction 1.1 Convolutional Neural Network 2 Machine Learning Methods in Face Detection and Recognition Algorithms 2.1 Alex Net 2.2 Feed Forward Neural Network 2.3 Deep Convolution Neural Network 2.4 K-nearest Neighbors 2.5 Support Vector Machine 2.6 Principal Component Analysis 2.7 Linear Discriminant Analysis 3 Feature Extraction 3.1 Geometric-Based Methods in Feature Extraction 3.2 Holistic-Based Methods in Feature Extraction 4 Related Work of Machine Learning Approaches in Face Detection and Recognition 5 Summary Sheet of Machine Learning Approaches for Face Detection and Face Recognition 6 Machine Learning Methods Perception and Suggestion in Face Detection and Recognition 7 Conclusions References An Energy- and Space-Efficient Trust-Based Secure Routing for OppIoT 1 Introduction 2 Related Work 3 Proposed ES_T_CAFE Protocol 3.1 Motivation 3.2 Proposed Protocol 4 Performance Evaluation 5 Conclusion References A Survey on Anomaly Detection Techniques in IoT 1 Introduction 1.1 Anomaly Detection 2 Literature Review 3 Analysis of Literature Work 4 Conclusion References Novel IoT End Device Architecture for Enhanced CIA: A Lightweight Security Approach 1 Introduction 2 Literature Review 3 The Need of Lightweight Cryptographic Algorithm 4 Novel Lightweight Architecture 4.1 Trusted Fog Nodes with CoT and TEE 4.2 Web Interface(WI) 4.3 IoT End Device 5 Secured Data Transmission 6 Results and Discussion 7 Conclusion References Addressing Concept Drifts Using Deep Learning for Heart Disease Prediction: A Review 1 Introduction 2 Literature Review 3 Research Methodology References Tailoring the Controller Parameters Using Hybrid Flower Pollination Algorithm for Performance Enhancement of Multisource Two Area Power System 1 Introduction 2 System Under Investigation 3 Testaments of Proposed Algorithm 4 Conclusions References Automatic Extractive Summarization for English Text: A Brief Survey 1 Introduction 2 Extractive Text Summarization 3 Features for Extractive Text Summarization 4 Methods for Extractive Text Summarization 4.1 Statistical-Based 4.2 Graph-Based 4.3 Semantic-Based 4.4 Fuzzy-Based 4.5 Machine Learning-Based 4.6 Deep Learning-Based 5 Comparison of Methods for Extractive Text Summarization 6 Evaluation Matrices 6.1 Intrinsic Evaluation 6.2 Content Evaluation 7 Conclusion References Formal Verification of Liveness Properties in Causal Order Broadcast Systems Using Event-B 1 Introduction 1.1 Event-B and Rodin 1.2 Causal Order Broadcast 2 Literature Review 3 Formal Analysis of Liveness Properties in Causal Order Broadcast Systems 4 Analysis of Enabledness Preservation Property 5 Analysis of Non-divergence Property 6 Conclusions References A Comparative Study on Face Recognition AI Robot 1 Introduction 2 Literature Review 3 Implementation 3.1 Local Binary Pattern (LBP) for Face Recognition 4 Hardware Specification 5 Software Specification 6 Results and Discussion 6.1 Face Recognition System 6.2 The Face Tracking System 7 Limitations of Existing Work 8 Conclusion References State-of-the-Art Power Management Techniques 1 Introduction 2 Static Power Management 3 Dynamic Power Management 4 Power Management in Embedded Systems 5 Power Management Techniques for HPC Clusters 6 Power Management in Data Centers 7 Conclusion References Application of Robotics in Digital Farming 1 Introduction 2 Literature Review 3 The Inverted Pendulum System 4 Control Systems and Controllers 5 Tilt Angle and Its Measurement Using the Filter 6 Conclusion References Study and Performance Analysis of Image Fusion Techniques for Multi-focus Images 1 Introduction and Background of the Work 2 Image Fusion Techniques and Effectiveness Criteria 3 Some Current Image Fusion Techniques 3.1 Discrete Wavelet Transform 3.2 Discrete Cosine Transform (DCT) 3.3 Curvelet Transform 3.4 Non-Subsampled Contourlet Transform 3.5 Sparse-Based Image Fusion Scheme 3.6 DTCWT 3.7 ICA 4 Evaluation Metrics 4.1 Normalized Mutual Information (NMI) 4.2 Nonlinear Correlation Information Entropy (NCIE) 4.3 Gradient-Based Metric GBM 4.4 Phase Congruency-Based Metric (PCB) 5 Experimental Setup and Simulation of Work 5.1 Experimental Setup 5.2 Comparative Discussion 5.3 Comparative Analysis 6 Conclusion and Future Scope References IoT-Based Agricultural Automation Using LoRaWAN 1 Introduction 2 Literature Review 3 Designing of the System 3.1 LoRa by Semtech Inc 3.2 AI-Thinker RA-02 Module 4 Implementation and Working 5 Results and Discussion 6 Conclusion 7 Future Work References Prediction of Customer Lifetime Value Using Machine Learning 1 Introduction 2 Literature Review 3 Proposed Framework 4 Results 4.1 Mean Absolute Error 5 Conclusion References An Intelligent Flood Forecasting System Using Artificial Neural Network in WSN 1 Introduction 2 Related Work 3 Flood Forecasting Framework 4 Result and Discussion 5 Conclusion References Reinforcement Learning in Deep Web Crawling: Survey 1 Introduction 2 Background 2.1 Deep Web Crawling 2.2 Reinforcement Learning 3 Review of Literature 4 Discussion 4.1 Open Questions in DWC 5 Conclusion and Future Scope References Wireless Sensor Network for Various Hardware Parameters for Orientational and Smart Sensing Using IoT 1 Introduction 2 WSN System Architecture 2.1 The Sensor Node 3 Implementation and Methodology 3.1 Overview 3.2 Sensing and Processing the Information 4 Results and Discussion 4.1 Output on Senselive 4.2 Monitoring 5 Conclusion References Comparative Analysis: Role of Meta-Heuristic Algorithms in Image Watermarking Optimization 1 Introduction 2 Related Work 3 Proposed Technique 4 Results and Discussion 4.1 Perceptual Quality Measurement 4.2 Robustness Measurement 5 Comparative Analysis 6 Conclusion 7 Conflict of Interest References A Novel Seven-Dimensional Hyperchaotic 1 Introduction 2 The 7D Hyperchaotic System 2.1 Equilibrium and Stability 2.2 Lyapunov Exponents and Lyapunov Dimension 3 Hybrid Synchronization of the New 7D Hyperchaotic Systems 4 Dissections 5 Conclusions References A Literature Review on H∞ Neural Network Adaptive Control 1 Introduction 2 Neural Networks 2.1 Feed-Forward Neural Network 2.2 Feedback Neural Network 3 Adaptive Controllers 3.1 Direct and Indirect Adaptive Techniques 3.2 Neural Networks for Identification and Control 4 H∞ Controller 5 Robust Adaptive Control 6 Stability Analysis 7 Conclusions References A Novel DWT and Deep Learning Based Feature Extraction Technique for Plant Disease Identification 1 Introduction 2 Research Methodology of Proposed Novel DWT and Deep Learning Based Feature Extraction Technique for Plant Disease Identification 2.1 Robust Feature Extraction Based on Large Scale DWT for Colored Images of Plants (Healthy/Diseased) Leaf Images 2.2 Selection of Features in Reduced Sub-Space for Efficient Feature Vector Formation Using Principal Component Analysis (PCA) 2.3 Significant Feature Vector Formulation and Classification Based on DNNs 2.4 Proposed Novel DWT and Deep Learning Based Technique for Identification of Diseases in Plants 3 Experiments and Discussions 3.1 Dataset 3.2 System Specifications 3.3 DWT Sub Band Selection and Level of Decomposition Selection with Daubechies Wavelet (db4) and Biorthogonal (Bior1.5) Wavelet with DNNs 3.4 Comparison of Accuracy Among the 2 Wavelets with Respect of Levels and Sub Bands 3.5 Comparison of Accuracy with State-of-Art Approaches with Proposed Approach 4 Conclusion References Supervised and Unsupervised Machine Learning Techniques for Multiple Sclerosis Identification: A Performance Comparative Analysis 1 Introduction 2 Proposed Approach 2.1 Image Preprocessing 2.2 Feature Extraction Through Gray Level Textural Feature Matrix (GLTFM) 2.3 Classification 3 Experimental Results 3.1 No. of neighbor’s Selection and Distance Metric Selection in K-nearest Neighbor Classification 3.2 Kernel Function Selection and Kernel Scale Selection in Support Vector Machine 3.3 Selection of Boosting Method and Learning Cycles in Decision Tree Classifier (Ensemble Learning) 3.4 Unsupervised Learning Approach Using K-mean and Gaussian Mixture Model (GMM) Clustering 3.5 Comparison of Proposed Technique with Earlier Studies 4 Conclusion References Cloud Computing Overview of Wireless Sensor Network (WSN) 1 Introduction 2 Overview of Cloud Computing 2.1 Features of Cloud Computing 2.2 Services Provided by Cloud Computing 2.3 Types of Cloud 3 Overview of Wireless Sensor Network 3.1 Protocols for Routing in WSN 4 Application Scenarios of Cloud Computing and WSN 4.1 Health Care 4.2 Transport Surveillance 4.3 Climate Anticipation 4.4 Military Usage 5 Conclusion References An Enhanced Support Vector Machine for Face Recognition in Fisher Subspace 1 Introduction 2 Proposed Methodology 2.1 Fisher Subspace Feature Extraction Method 2.2 Enhanced Support Vector Machine (ESVM) 3 Experimental Results 3.1 Yale Database 3.2 ORL Database 3.3 Selection of Number of Sub-Dimensions in Fisher Space 3.4 Multiclass Classification: One-Vs-One(OVO), One-Vs-All(OVA) 3.5 Selection of Kernel for ESVM 4 Comparative Analysis and Discussion 5 Conclusion References Large Scale Double Density Dual Tree Complex Wavelet Transform Based Robust Feature Extraction for Face Recognition 1 Introduction 2 Preliminaries and Proposed Methodology 2.1 Wavelet Transformation Techniques 2.2 Principal Component Analysis (PCA) 2.3 Classification 2.4 Proposed Methodology 3 Experimental Results 3.1 Dataset 3.2 Selection of DDDTCWT Sub-Band and Level of Decomposition 4 Comparative Analysis and Discussion 5 Conclusion References A Miscarriage Prevention System Using Machine Learning Techniques 1 Introduction 2 Related Work 3 Methodology 3.1 Data Collection 3.2 Data Pre-processing 3.3 Model Building and Validation 4 Experimental Results and Discussion 5 Conclusion References Efficacious Governance During Pandemics Like Covid-19 Using Intelligent Decision Support Framework for User Generated Content 1 Introduction 2 Related Literature Survey 3 Proposed Framework 3.1 Text Pre-processing Pipeline 3.2 Information Extraction Module 3.3 Social and Economic Trend Prediction Module 4 Implementation and Results 5 Discussion and Future Work References Skin Disease Diagnosis: Challenges and Opportunities 1 Introduction 1.1 Skin Disease 1.2 Skin Disease Diagnosis 1.3 Publicly Available Dataset for Skin Disease 2 Literature Review 3 Justification of Research 4 Research Gaps 5 Problem Statement 6 Conclusion References Computerized Assisted Segmentation of Brain Tumor Using Deep Convolutional Network 1 Introduction 2 Literature Review 3 Methodology 4 Conclusion References Leader Election Algorithm in Fault Tolerant Distributed System 1 Introduction 2 Message Ordering 2.1 Non-FIFO and FIFO Execution 2.2 Causal Ordering 2.3 Total Order Broadcast 3 Leader Election Algorithm with Ordered Delivery of Timestamped Messages 4 Modeling Approach 4.1 Event-B Model of Leader Election Algorithm: Specification Using Refinement Levels 5 Conclusion and Future Scope References Engine Prototype and Testing Measurements of Autonomous Rocket-Based 360 Degrees Cloud Seeding Mechanism 1 Introduction 2 The Novel 360°Cloud Seeding Approach 2.1 Reinforcement Learning-Based Cloud Seeding Mechanism 3 Phase 1 Research Testing Report: The Proposed Concept 4 Testing Results 5 Result Discussion 6 Conclusion 7 Future Scope References An Efficient Caching Approach for Content-Centric-Based Internet of Things Networks 1 Introduction 2 Literature Review 3 Proposed Caching Scheme 4 Performance Evaluation 5 Conclusion References A Forecasting Technique for Powdery Mildew Disease Prediction in Tomato Plants 1 Introduction 2 Literature Review 3 Research Methodology 3.1 Dataset 3.2 K-Nearest Neighbor (kNN) 3.3 Decision Tree (DT) 3.4 Random Forest (RF) 3.5 Performance Metric: Accuracy 4 Results and Discussions 4.1 Comparison with Previous Studies 5 Conclusion and Future Scope References Investigate the Effect of Rain, Foliage, Atmospheric Gases, and Diffraction on Millimeter (mm) Wave Propagation for 5G Cellular Networks 1 Introduction and Related Work 2 Investigate the Effect of Attenuation Due to Atmospheric Gas 3 Investigate the Effect of Attenuation Due to Fog and Cloud 4 Investigate the Effect of Attenuation Due to Rainfall Attenuation 5 Simulation Work and Discussion 6 Conclusion and Future Scope References Packet Scheduling Algorithm to improvise the Packet Delivery Ratio in Mobile Ad hoc Networks 1 Introduction 2 Related Work 3 Methodology 4 Results 5 Conclusion References Computer-Aided Detection and Diagnosis of Lung Nodules Using CT Scan Images: An Analytical Review 1 Introduction 2 Anatomy of CAD System 2.1 Preprocessing 2.2 Nodule Detection 2.3 Feature Extraction/Selection 2.4 Classification 3 Experimental Benchmarks 3.1 Datasets of Lung CT Scans 3.2 Evaluation Metrics 4 Discussion 5 Conclusion References Efficient Interleaver Design for SC-FDMAIDMA Systems 1 Introduction 2 Interleaver Design 3 SC-FDMA-IDMA System Model 4 Simulation Result 5 Conclusions References Enhanced Bio-inspired Trust and Reputation Model for Wireless Sensor Networks 1 Introduction 2 Trust and Reputation System 3 Bio-inspired Trust and Reputation Model (BTRM) 3.1 Gathering Information 3.2 Score and Rank 3.3 Ants Transaction 3.4 Punish and Reward 4 Enhanced Bio-inspired Trust and Reputation Model 4.1 EBTRM Algorithm 5 Simulation Results 5.1 Accuracy with Varying Number of Malicious Nodes 5.2 Path Length with Varying Number of Malicious Nodes 5.3 Energy Consumption with Varying Number of Malicious Nodes 6 Conclusions References Analytical Machine Learning for Medium-Term Load Forecasting Towards Agricultural Sector 1 Introduction 2 Literature Review 3 Material and Methods 3.1 Dataset 3.2 Methodology 4 Experimental Result and Discussion 4.1 The Experimental Result Using ARIMA Model 4.2 The Experimental Result Using Seasonal ARIMA Model 4.3 The Experimental Result Using Exponential Smoothing Model 4.4 The Experimental Result Using Random Forest Model 5 Conclusion and Future Work References Formal Modelling of Cluster-Coordinator-Based Load Balancing Protocol Using Event-B 1 Introduction 2 Event-B 3 Cluster-Coordinator Load Balancing Protocol 4 Formal Development of Load Balancing Protocol 5 Conclusion References Regression Test Case Selection: A Comparative Analysis of Metaheuristic Algorithms 1 Introduction 2 Related Work 3 Problem Statement: Regression Test Case Selection 4 Discussion: Metaheuristic Algorithms Used 4.1 Cuckoo Search Algorithm 4.2 Crow Search Algorithm 4.3 Harris Hawks Optimization Algorithm 5 Experimental Design and Results 5.1 Research Objectives 5.2 Parameter Setting 5.3 Research Hypotheses 5.4 Results and Discussion 6 Conclusion and Future Scope References A Comprehensive Study on SQL Injection Attacks, Their Mode, Detection and Prevention 1 Introduction to Structured Query Language Injection (SQLi) 1.1 Gathering Some Knowledge of Vulnerability and SQL Injection 2 Categories of SQL Injection Attack 3 Prevention System 3.1 Log in Time Verification 3.2 Parametrized Query 3.3 Stored Procedures 3.4 Escaping 3.5 Avoiding Administrative Privileges 3.6 Firewall Applications 4 Example of Union-Based SQL Injection 4.1 Step 1. Finding the Error 4.2 Step 2. Finding the Total Number of Columns 4.3 Step 3. Finding the Vulnerable Column from the Total Number of Column 4.4 Step 4. Finding the Table Names Under the Database 4.5 Step 5. Finding the Column Name from the Target Table Command Used 4.6 Step 6. Getting the Data from the Columns 5 Conclusion References Sentimental Analysis on Sarcasm Detection with GPS Tracking 1 Introduction 2 Literature Review 3 Related Researches 4 Methodologies of Sarcasm Detection 5 Proposed Architecture 6 Sarcasm Detection Algorithm 7 Evaluation 8 Testing Method 9 Results 10 Conclusion and Future Scope References Impact of Machine Learning Algorithms on WDM High-Speed Optical Networks 1 Introduction 2 Literature Survey 3 Performance Parameters 4 Performance Outcomes of Existing Techniques 5 Conclusion 6 Future Scope References Duo Features with Hybrid-Meta-Heuristic-Deep Belief Network Based Pattern Recognition for Marathi Speech Recognition 1 Introduction 2 Related Work 3 Duo Features with Hybrid-Meta-Heuristic-Based Deep Belief Network 3.1 Optimization Techniques Used for Deep Belief Network 3.2 Proposed Architecture 3.3 Duo-Feature Feature Extraction Technique 3.4 RCBO-DBN Pattern Recognition 4 Results and Discussion 4.1 Experimental Setup 4.2 Performance Analysis of Feature Extraction Techniques 4.3 Performance Analysis of Pattern Recognition Techniques 5 Conclusion References Computer-Aided Diagnostic of COVID-19 Using Chest X-Ray Analysis 1 Introduction 2 Survey of Literature 3 Proposed System 4 Results and Discussion 5 Conclusion References Low Cost Compact Multiband Printed Antenna for Wireless Communication Systems 1 Introduction 2 Configuration of Antenna and Its Design Procedure 3 Simulation and Measurement Results 4 Fabricated Multiband Printed Antenna 5 Conclusion References A Detailed Analysis of Word Sense Disambiguation Algorithms and Approaches for Indian Languages 1 Introduction 1.1 Machine Translation 1.2 Ambiguity and Its Classification 2 Word Sense Disambiguation (WSD) 2.1 Applications of Disambiguation Techniques 2.2 Organization of the Paper 3 Relative Analysis on WSD and Directions for Future Research 4 Proposed Work 5 WSD Approaches 5.1 An Approach Focused on Information 5.2 Supervised-Learning Approach 5.3 Unsupervised-Learning Approach 6 WSD Approaches in Context to WSD 7 Literature Analysis on Various WSD Methods for Languages of India 8 Conclusion References Fiber Bragg Grating (FBG) Sensor for the Monitoring of Cardiac Parameters in Healthcare Facilities 1 Introduction 2 Literature Review 3 Background 3.1 The Fabrication Method of FBG 4 Experiment and Result 5 Conclusions References Early-Stage Coronary Ailment Prediction Using Dimensionality Reduction and Data Mining Techniques 1 Introduction 2 Related Works 3 Materials and Methodology 3.1 Data Exploration 3.2 Feature Selection 4 Result 5 Conclusion and Future Work References Inferring the Occurrence of Chronic Kidney Failure: A Data Mining Solution 1 Introduction 2 Chronic Kidney Disease 3 Literature Survey 4 Proposed Model 5 Data Exploration and Filtration 6 Classification Methods 6.1 Decision Tree 6.2 Logistic Regression 6.3 Naïve Bayes 6.4 Support Vector Machine 6.5 KNN 6.6 Random Forest 7 Examination of Performance 8 Conclusion and Future Work References Comparative Analysis for Optimal Tuning of DC Motor Position Control System 1 Introduction 2 DC Motor Position Control System 3 Controller 3.1 PID 3.2 PID-N 3.3 F-PID 4 Algorithms 4.1 Global Neighborhood Algorithm (GNA) 4.2 Bat Algorithm (BA) 5 Objective Function Optimization 6 Simulation and Results 7 Conclusion References A Hybrid Approach of ANN-PSO Technique for Anomaly Detection 1 Introduction 2 Related Work 3 Proposed Method 4 Result and Analysis 4.1 Dataset 4.2 Performance Metrics 4.3 Analysis 5 Conclusion References Comparison of Density-Based and Distance-Based Outlier Identification Methods in Fuzzy Clustering 1 Introduction 2 Density-Oriented (DO) and Distance-Based (DB) Approach of Outlier Identification in Context of Fuzzy Clustering 2.1 Density-Oriented Approach [10–12] 2.2 Distance-Based Approach [10, 13] 3 DO Versus DB 3.1 Dataset Used 3.2 Performance Analysis of DO and DB on Various Dataset 4 Conclusion References Analysis of Security Issues in Blockchain Wallet 1 Introduction 1.1 Blockchain Wallets 1.2 Security Issues in Blockchain Wallets 1.3 Wallet Security Practices 2 Literature Review 2.1 Security Challenges 2.2 Wallet Vulnerabilities 2.3 Recent Progresses 3 Comparative Analysis 4 Conclusion References A Contextual Framework to Find Similarity Between Users on Twitter 1 Introduction 2 Related Work 3 Proposed Framework 3.1 Parameter Weights 3.2 Parameter Normalization 3.3 Formulation of Similarity Computation 3.4 Parameters Used 4 Results and Analysis 4.1 Data Extraction 4.2 Case Study 4.3 Result and Evaluation 5 Conclusion and Future Work References On the Design of a Smart Mirror for Cardiovascular Risk Prediction 1 Introduction 2 Literature Review 3 Research Gaps 4 Objectives 5 Hypothesis 6 Methodology 7 Interpretation of Results 8 Conclusion References Named Entity Recognition in Natural Language Processing: A Systematic Review 1 Introduction 1.1 Evolution of NER 1.2 Motivations for Conducting This Survey 2 Related Background 2.1 NER 2.2 NER Datasets 2.3 NER Tools 2.4 Techniques for NER 3 A Systematic Literature Review of Related Work 4 Challenges and Future Directions 4.1 Challenges 4.2 Future Directions 5 Conclusion References Assessing Spatiotemporal Transmission Dynamics of COVID-19 Outbreak Using AI Analytics 1 Introduction 2 Literature Survey 3 Proposed Methodology 3.1 Dataset Description 3.2 Experimental Analysis and Prediction 4 Results 5 Conclusion References Detection of Building Defects Using Convolutional Neural Networks 1 Introduction 2 Literature Survey 3 Scope of Work 4 Proposed Algorithm 4.1 Method 4.2 Importing Building Libraries, Layers, and Their Working 5 Experimental Analysis 5.1 Results 5.2 Discussion 6 Conclusion and Future Scope References Tools and Techniques for Machine Translation 1 Introduction 2 Machine Translation in Terms of Technology Used 2.1 Rule-Based Machine Translation 2.2 Statistical Machine Translation 2.3 Neural Machine Translation 3 Machine Translation in Terms of Techniques Used 4 Machine Translation in Terms of Algorithms Used 5 Addressing Ambiguity in Machine Translation 6 Conclusion References Cyberbullying-Mediated Depression Detection in Social Media Using Machine Learning 1 Introduction 2 Background and Related Work 3 Supervised Learning for Observing Signs of Mental Distress Due to Cyberbullying 3.1 Dataset Discussion 3.2 System Architecture 4 Results and Discussion 4.1 Results Obtained When TF-IDF Was Used for Feature Extraction 4.2 Results Obtained When Word2Vec Was Used for Feature Extraction 4.3 Results Obtained When DL Was Applied for CBMD Detection 5 Conclusion 6 Future Trends References Improved Patient-Independent Seizure Detection System Using Novel Feature Extraction Techniques 1 Introduction 2 Methodology 2.1 Feature Set 1: Max–Min Method 2.2 Feature Set 2: The Variation Method 2.3 Classification 3 Results and Discussion 3.1 Seizure Detection ML Model Based on Max–Min Feature Set 3.2 Seizure Detection ML Model Using Variation Feature Set 4 Conclusions References Solution to Economic Dispatch Problem Using Modified PSO Algorithm 1 Introduction 2 Unit Commitment 2.1 Generation Capacity Constraint 2.2 Power Balance Constraint 2.3 Generation Ramp Limits 3 Introduction to Economic Dispatch (ED) 4 Introduction to Particle Swarm Optimization (PSO) 5 Proposed Approach 5.1 Working of the Proposed Approach (Pseudo Code) 5.2 Experiment Design 6 Results 7 Conclusion References Recommendations for DDOS Attack-Based Intrusion Detection System Through Data Analysis 1 Introduction 2 Related Work 3 Analysis 3.1 Dataset and System Discussion 3.2 Recommendations 4 Conclusion References Drug-Drug Interaction Prediction Based on Drug Similarity Matrix Using a Fully Connected Neural Network 1 Introduction 2 Dataset 2.1 Sources of Data 3 Methodology 4 Evaluation 5 Results and Discussion 6 Conclusion and Future Scope References Author Index