My Account Log in

1 option

Innovative Computing and Communications : Proceedings of ICICC 2024, Volume 2 / edited by Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal, Prabhat Kumar.

Springer eBooks EBA - Engineering Collection 2024 Available online

View online
Format:
Book
Author/Creator:
Hassanien, Aboul Ella.
Contributor:
Anand, Sameer.
Jaiswal, Ajay.
Kumar, Prabhat.
Series:
Lecture Notes in Networks and Systems, 2367-3389 ; 1021
Language:
English
Subjects (All):
Telecommunication.
Internet of things.
Machine learning.
Artificial intelligence.
Communications Engineering, Networks.
Internet of Things.
Machine Learning.
Artificial Intelligence.
Local Subjects:
Communications Engineering, Networks.
Internet of Things.
Machine Learning.
Artificial Intelligence.
Physical Description:
1 online resource (662 pages)
Edition:
1st ed. 2024.
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2024.
Summary:
This book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16–17 February 2024. Introducing the innovative works of scientists, professors, research scholars, students, and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Contents:
Intro
Preface
Steering Committee
Contents
Editors and Contributors
Bangladeshi CF Guard: Unveiling Bangladeshi Counterfeit Currency Through Transfer Learning
1 Introduction
2 Literature Review
3 Methodology
3.1 Security Features' Analysis
3.2 Data Collection
3.3 System Architecture
4 Result and Discussion
4.1 Experimental Outcomes
4.2 Discussion
5 Conclusion
5.1 Conclusion
5.2 Limitations and Future Work
References
Recognition of Sign Language Using Hybrid CNN-RNN Model
2 Literature
3 Proposed Method
3.1 Preprocessing
3.2 Classification and Recognition
3.3 Proposed Work
4 Evaluation Strategies
4.1 Dataset
5 Experiment and Result
5.1 Dataset I
5.2 Dataset II
6 Conclusion and Future Direction
Nanotech Drones: An Investigation of Air Quality Index in Environment
2 Materials and Methods
2.1 Materials
3 Discussions and Results
3.1 Air Quality Index
3.2 Working of Nanotech Drone
4 Conclusion
Systematic Vulnerability Assessment: Mapping Architecture Flow and Ranking Components for Vulnerability in Connected Automated Vehicles
3 Architectural Flow
4 Scoring Criterion
5 Score Analysis
6 Results and Discussions
7 Conclusions
AI and Blockchain in Food and Beverage: Marketing 5.0 Approach
2.1 Starbucks Advanced Advertising
2.2 Digital Promotion
2.3 Marketing 5.0
2.4 Applications of Blockchain Technology in F&amp
B Industry
3 Methodological Framework
3.1 Exploring Knowledge Through Group Discussions
3.2 Quantitative and Qualitative Analysis of Content
3.3 The Analytical Cognizance of Content Scrutiny
4 Results.
5 Conclusion and Recommendations for Further Research
A Deep Learning-Based Cervical Tumor Classification System for Telehealthcare Monitoring
2 Literature-Related Works
3 Stages of Prior Cervical Cancer
4 Class Activation Map (CAM)
5 System Methodology
5.1 Analyzing Prior Tumor Infiltration Evidence
5.2 DCNN Based on Prior Evidence
6 Experimental Findings
6.1 Improvement of Prediction Based on Prior Evidence
6.2 Staging Methods for Cervical Cancer Compared to Others
7 Conclusion
Big Data-Driven Intelligence Healthcare Framework for Smart Citizen
1.1 The Importance of Big Data
1.2 Intelligent System for Healthcare
2 Background and Related Work
2.1 Digitization of Healthcare and Big Data
2.2 Technologically Advanced Urban Areas (Modern City)
2.3 Optimal Health
3 Dimensional Framework Paradigm
3.1 Advanced Healthcare Technologies
4 Proposed Intelligent Healthcare System
5 Pros, Cons, and Application
6 Conclusion
Smart Device with Arduino Controller for Home Inverter
2 Design of Proposed System
2.1 Mathematical Analysis of Proposed System
2.2 Mathematical Calculations of Proposed System
2.3 Algorithm and Flowchart
3 Hardware Results and Discussions
Feature Selection with Particle Swarm for Improved Classification on High-Dimensional Datasets
2 Literature Survey
2.1 PSO-Based Approaches
2.2 ACO-Based Approaches
2.3 FA-Based Approaches
2.4 GWO-Based Approaches
2.5 SSO-Based Approaches
3 Proposed Methodology
3.1 PSO-Based Feature Selection
3.2 PSO Pseudocode
4 Experimental Results
4.2 Comparative Analysis
4.3 Statistical Analysis
4.4 Runtime Computation (min:sec:milli_sec).
5 Conclusion
Breast Cancer Prediction Using Hybridization of Machine Learning and Optimization Technique
2.1 Previous Work Done Using Machine Learning Classifiers
2.2 Previous Work Done Using Deep Learning
2.3 Previous Work Done Using Optimization Techniques
2.4 Previous Work Done Using Genetic Algorithm
3.1 Classifiers Used
3.2 Dataset Used
3.3 Optimization Technique Used
3.4 Parameters Setting
3.5 Implementation
4 Results and Discussion
5 Conclusion and Future Work
Securing Pictorial Data Transfer Through a Novel Digital Image Encryption Method
2 Proposed Work
3 Structure of Encryption
4 Concept of Decryption
5 Pictorial Representation
6 Comparison with Visual Cryptography
Appendix
The idea of rotating matrices
IoT Routing Reimagined: Dynamic Phantom Routing with ACO for Efficient Source Location Privacy
1.1 Contributions
1.2 Organization
2 Related Works
3 Problem Statement
4 Proposed System
4.1 Network Condition-Based Dynamic Phantom Node Selection (NCDPNS)
4.2 Bio-inspired Algorithm-Aided Multi-path Selection-Based Routing (BAMSR)
5 Results
6 Conclusion and Future Work
Deep Learning-Based Evaluation of ICU Requirements in COVID-19 Cases
3 Overview the Proposed System
4 Methodology
5 Experimental Results
6 Discussion
Deep Learning-Based Tea Fermentation Grading
2 Related Work
3 Methods and Materials
4 Evaluation
6 Comparison
7.1 Statements and Declarations
References.
An Exploratory Study of the Relationship Between Students' Positive Attitudes Toward Artificial Intelligence and Computational Thinking Needed in the 6G Communications' Era
2 Methodology
2.1 Survey Procedure and Survey Participants
2.2 Questionnaire Items
2.3 Analysis Procedure
3 Results
3.1 Preliminary Analysis
3.2 Descriptive Statistics of Positive Awareness of AI and Computational Thinking
3.3 Results of Logistic Regression Analysis
4 Discussions
4.1 Implications for Educational Program Development
Optimization of Double-Tuned Mass Dampers via Jaya Algorithm
3 The Numerical Example
Application of Wavelet Packet Transform for Detecting Bearing Issues
2 History of Motor Vibration Data
3 Time-Frequency Domain Analysis
3.1 Analysis Based on DWT
3.2 Analysis Based on WPT
4.1 DWT-Based Frequency Range Determination of Outer Race Defect
4.2 WPT Based on Frequency Range Determination of Outer Race Fault
5 Conclusion and Future Scope
Detection of Potholes in Roads Using Siamese Neural Network for Safe Transportation
3 Methods and Technology Used
3.1 Dataset
3.2 Siamese Neural Network
3.3 Contrastive Loss Function
3.4 Training &amp
Testing Set
3.5 Proposed Methodology
4 Results and Analysis
On the Security of Privacy-Preserving Bilateral Attribute-Based Encryption
1.1 Our Contribution
2 The Scheme Presented by Sun et al.
2.1 System Model
2.2 Algorithms
2.3 Detailed Scheme
3 Cryptanalysis of the Scheme
3.1 Violating Receiver Privacy
3.2 Violating Sender Privacy
4 Conclusion.
References
Analyzing the Financial Performance of Corporate Social Responsibility Using Machine Learning-Enabled Financial Enterprise Model
3 Proposed Method: Machine Learning Using a Financial Enterprise Model
A Survey on Driver Monitoring System Using Computer Vision Techniques
2 Motivation
3 Literature Review
4 The Proposed System
4.1 Drowsiness Detection
4.2 Gaze Detection
4.3 Activity Recognition
4.4 Emotion Recognition
ICT-Based Smart Cities Planning: A Case Study of Rashid Camp
2 Smart City: A Contemporary Revolution for Urban Space Management
3 The Geographic Information System (GIS) and Remote Sensing (RS): Smart Planning Support Tool
4 Description of the Case Study Al-Rashid Camp
5 Methodology and Approach
6 Results and Discussion
Detection of Hate Speech Using Ensemble Models
3 Experimental Setup and Proposed Methodology
3.1 Datasets
3.2 Data Collection and Preprocessing
3.3 Models
3.4 Classifier Evaluation
4.1 Model Training and Evaluation Metrics
5 Result and Discussion
Development of Dermatological Lesion Detection System Using EfficientNet with Fairness Evaluation
3 Proposed Work
3.1 Methodology Flowchart
3.2 Algorithm Used
3.3 Proposed Model's Pseudocode
3.4 Steps Followed
4 Experimental Results and Discussion
4.1 Dataset Used
4.2 Performance Assessment
4.3 Performance Comparative Analysis
Quantum Computing's Path to Supremacy: Progress in the NISQ Epoch
1 Introduction.
2 The History of Quantum Computing.
Other Format:
Print version: Hassanien, Aboul Ella Innovative Computing and Communications
ISBN:
9789819735914

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account