My Account Log in

1 option

Data Intelligence and Cognitive Informatics : Proceedings of ICDICI 2023 / edited by I. Jeena Jacob, Selwyn Piramuthu, Przemyslaw Falkowski-Gilski.

Springer eBooks EBA - Intelligent Technologies and Robotics Collection 2024 Available online

View online
Format:
Book
Author/Creator:
Jacob, I. Jeena.
Contributor:
Piramuthu, Selwyn.
Falkowski-Gilski, Przemyslaw.
Series:
Algorithms for Intelligent Systems, 2524-7573
Language:
English
Subjects (All):
Computational intelligence.
Internet of things.
Cooperating objects (Computer systems).
Computational Intelligence.
Internet of Things.
Cyber-Physical Systems.
Local Subjects:
Computational Intelligence.
Internet of Things.
Cyber-Physical Systems.
Physical Description:
1 online resource (579 pages)
Edition:
1st ed. 2024.
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2024.
Summary:
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2023), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during June 27–28, 2023. This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.
Contents:
Intro
Preface
Contents
About the Editors
Automatic Sentence Classification: A Crucial Component of Sentiment Analysis
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Data Collection
3.2 Pre-processing
3.3 Tokenization of Data
3.4 Algorithm Feeding
3.5 Best Model Selection
4 Result and Discussion
4.1 Statistical Analysis
4.2 Accuracy Graph
4.3 Confusion Matrix
4.4 Classification Report
5 Conclusion and Future Work
References
Real-Time Health Monitoring System of Patients on Utilizing Red Tacton
2 Implementation
4 Results
5 Conclusion
An Efficient Botnet Detection Using Machine Learning and Deep Learning
3.1 Load Dataset
3.2 Data Pre-Processing
3.3 Feature Selection
3.4 Handling Class Imbalance
3.5 Partition Dataset in Training and Testing
3.6 Apply ML/DL Models
3.7 Bot Detection
3.8 Model Evaluation
4 Experiments and Results
Wavelet Selection for Novel MD5-Protected DWT-Based Double Watermarking and Image Hiding Algorithm
2 Related Works
3 Methodology Used
3.1 Architecture of Proposed System
3.2 Watermark Embedder
3.3 Watermark Extractor
4 Experimental Results
4.1 Pseudorandomness in Watermark Embedding
4.2 Performance Evaluation Metrics
4.3 Selection of Wavelet
4.4 Watermark Embedding and Extraction
4.5 Image Hiding
Chaotic Map Based Encryption Algorithm for Secured Medical Data Analytics
2 Related Work
3 Existing Techniques
3.1 Algorithm
3.2 Cryptography
3.3 Encryption
3.4 Decryption
3.5 Key
3.6 Steganography
3.7 Symmetric Encryption.
4 Proposed Methodology
4.1 Secret Key Generation
4.2 Hahn's Discrete Orthogonal Moment
4.3 QR Code
4.4 Modified Logistic Map
5 Results and Discussions
Gold Price Forecast Using Variational Mode Decomposition-Aided Long Short-Term Model Tuned by Modified Whale Optimization Algorithm
2 Background and Related Works
2.1 LSTM Overview
2.2 Variation Mode Decomposition Details
2.3 Metaheuristics Optimization
2.4 AI Applications for Gold Price Forecasting
3 Whale Optimization Algorithm
3.1 Elementary WOA
3.2 Proposed Improved WOA Algorithm Used in Time-Series Forecasting Framework
4 Experimental Setup
4.1 Results and Discussion
Requirements for a Career in Information Security: A Comprehensive Review
2 Cybersecurity Foundation
2.1 Information Security Expertise
2.2 Duties and Tasks of an IS Professional
2.3 Job Nature and Requirements
3 Research Approach
3.1 Words Used to Search
3.2 Selection Criteria
3.3 Rejection Criteria
3.4 Data Gathering
3.5 Quality Appraisal
Intrusion Detection Using Bloom and XOR Filters
2 Literature Survey
3 NIDS Implementation Using Bloom Filter
4 NIDS Implementation Using XOR Filter
5 Experimental Results and Discussions
6 Conclusions and Future Work
A Model for Privacy-Preservation of User Query in Location-Based Services
2 Related Work and Literature Survey
3 Methodology
6 Future Work
A GPS Based Bus Tracking and Unreserved Ticketing System Using QR Based Verification and Validation
3 Proposed System
4 System Architecture
5 System Functionality.
5.1 QR Code
5.2 Crowd Management
5.3 GPS Location
5.4 Automatic Ticket Expiry
5.5 Passenger Application
5.6 Conductor Application
6 Backend
6.1 Seat Availability
6.2 Passenger Information
6.3 Administrative Information
7 Conclusion and Future Scope
FileFox: A Blockchain-Based File Storage Using Ethereum and IPFS
2 Background
2.1 Blockchain Storage
2.2 INFURA
2.3 Truffle
2.4 MetaMask
3 Related Work
4 Proposed System
5 Implementation
6 Result and Discussion
Minimizing Web Diversion Using Query Classification and Text Mining
3.1 Dataset
3.2 Feature Extraction
3.3 Semantic Matching
3.4 Web Query Classification
3.5 Machine Learning Models
3.6 Deep Learning Models
3.7 Evaluation Metrics
4 Results and Discussion
5 Future Scope
6 Conclusion
Connect: A Secure Approach for Collaborative Learning by Building a Social Media Platform
1.1 Critical Characteristics of Social Media Are as Follows
1.2 Social Media Platforms
1.3 Need for Using Collaborative Learning
1.4 Challenges and Issues to Build Social Networking
1.5 Cloud Computing
1.6 Encryption
1.7 Importance of Social Media Platforms for Collaborative Learning
1.8 Advantages of Collaborative Learning for Faculty-To-Faculty Interaction
1.9 Security Concerns While Building a Social Media Platform
1.10 Conventional Threats
1.11 Modern Threats
1.12 Targeted Threats
1.13 Reasons Behind Online Social Media Security
2.1 Encryption Techniques Used
3 Summary of Literature Review
3.1 Importance of the Study.
3.2 The Opportunities that Will Be Provided Among the Users of the System Are as Follows
4.1 Proposed Algorithmic Process
5 Discussion
Smart Analytics System for Digital Farming
2 Need for the Study
3 Related Works
4 Proposed Work
Sarcasm Detection for Marathi and the role of emoticons
3 Dataset and Annotation
3.1 Distribution of Tweets
3.2 Emoji Analysis
4 Pre-processing of Tweets
4.1 Cleaning of Tweets
4.2 Tokenization
5 Feature Extraction and Sarcasm Detection
5.1 Sentence Embedding Using Language Model
5.2 Embeddings for Emojis in the Tweet
6 Experiments and Result Analysis
7 Conclusion
Fleet Management Mobile Application Using GPS Shortest Path
3.1 Modules
3.2 Algorithm Used
3.3 Database
5 Conclusions
Finger Vein Biometric System Based on Convolutional Neural Network
3.1 Image Enhancement
3.2 Features Extraction
3.3 AES Encryption and Decryption
3.4 Convolution Neural Network
4.1 Image Enhancement
4.2 Feature Extraction
4.3 AES Encryption and Decryption
Embedding and Extraction of Data in Speech for Covert Communication
3 Existing Methodology
4 Proposed Methodology
5 Results and Evaluation
5.1 Results
5.2 Evaluation Metrics
6 Conclusion and Future Work
A Machine Learning Based Model for Classification of Customer Service's Email
2 Problem Statement.
2.1 Shared Inboxes Fail in Managing the Emails as the Number Grows
3 Proposed Solution
3.1 Advantages of Email Multi-folder Categorization for Better Customer Support
3.2 Email with Multi-folder Categorization Works Well with a Database System
3.3 Work Together to Solve Problems at a Fast Pace
3.4 Provide Support in the 100% Context
3.5 Measure Individual Performance with Intuitive Reports
3.6 Architecture of Automatic Classification of Email
4 Research Methodology
4.1 Classification of Email Using the Technique of Machine Learning
4.2 Machine Learning Terminologies Used in Classification
4.3 Support Vector Machine
4.4 Advantages and Disadvantages for Using Support Vector Machine
4.5 Validation Tool/Dataset Used
5 Results
7 Limitations and Future Scope
Intelligent Identification and Multiclass Segmentation of Agricultural Crops Problem Areas by Neural Network Methods
2 Methods and Materials
3 Results and Discussion
3.1 Justification of the Segmentation DNN Architecture
3.2 Learning Outcomes Developed by DNN
3.3 Discussion of the Results
4 Conclusions
Perishable Products: Enhancing Delivery Time Efficiency with Big Data, AI, and IoT
2 Delivery Time in Our Context
2.1 Optimizing Delivery Time in Transportation: Exploring Algorithmic Approaches
2.2 Objective
2.3 Advantage
2.4 Challenger
2.5 Delivery Time Description
3 The Proposed Optimization
3.1 Model System
3.2 The Proposed Optimization for Delivery Time
3.3 Specification Parameter
4 Optımızatıon Results Analysis
4.1 Comparing CT with Integrated Recent Transportation Technologies
4.2 Evaluation and Comparison of Optimization Results
CNN Approach for Identification of Medicinal Plants.
1 Introduction.
Other Format:
Print version: Jacob, I. Jeena Data Intelligence and Cognitive Informatics
ISBN:
9789819979622
9819979625
OCLC:
1417066042

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account