Advancements in Interdisciplinary Research. First International Conference, AIR 2022 Prayagraj, India, May 6–7, 2022 Revised Selected Papers 9783031237232, 9783031237249


297 87 60MB

English Pages [562] Year 2022

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Preface
Organization
Contents
Novel Technologies Enabled Secured Privacy Models and Optimized Networking Infrastructures Toward Secure Industries
Fast Phrased Search for Encrypted Cloud Storage
1 Introduction
1.1 Bloom Filters
1.2 Inclusion Related Attack
2 Literature Review
3 Methodology
3.1 Research Issues
3.2 Research Methodology
3.3 Data Extraction
3.4 Implementation
4 Results
5 Conclusion
References
Secure Data Hiding and Extraction Using RSA Algorithm
1 Introduction
2 Related Works
3 Image Data Hiding Algorithm for Donathan Hutchings
3.1 Implementation
3.2 User Interface Design
3.3 Image Tab Encryption
3.4 Image Tab Decryption
4 System Implementation Using RSA Algorithm
5 Evaluation
6 Conclusion
References
Token Bases Valid and Secure Payment System Using SHA-256
1 Introduction
2 Literature Work
3 Methodology
3.1 Proposed Tokenization Approach Security Framework
3.2 Comparison Between the Existing Payment and Our Proposed Work
4 Result and Discussion
5 Conclusion and Future Scope
References
A Novel Approach to Secure Files Using Color Code Authentication
1 Introduction
2 Related Work
3 Working Methodology
4 Results and Discussion
5 Conclusion
References
Analysis of Ransomware Security on Cloud Storage Systems
1 Introduction
2 Nature of Cybercrime and Ransomware
2.1 Technical Vectors of Attack
2.2 Socially Engineered Vectors
2.3 Ransomware-as-a-Service
3 Current Countermeasures
3.1 Repositories and Data Sharing
3.2 Behavior Based Detection
3.3 Reverse Engineering
3.4 Risk Disclosure and Awareness
3.5 Decentralization and All-Or-Nothing Transforms
4 Impact of Ransomware in Recent History
4.1 Healthcare Incidents
4.2 Colonial Pipeline
4.3 CD Projekt Red
4.4 Ultimate Kronos Group
4.5 REvil Group
5 Emerging Solutions
5.1 Secure Network Protocols for Dynamic Data
5.2 Analysis of Network Traffic on Multiple Classifiers
5.3 Dynamic Distributed Storage
5.4 Machine Learning and Artificial Intelligence
5.5 Decentralization
5.6 Key Backup
6 Conclusion
References
A Novel Approach for an Automated Advanced MITM Attack on IoT Networks
1 Introduction
1.1 A Subsection Sample
2 Related Work
3 Working Methodology
4 Results and Discussion
4.1 Preventive Measures Against MITM
5 Conclusion
References
Fog Computing Paradigm with Internet of Things to Solve Challenges of Cloud with IoT
1 Introduction
2 Internet of Things
2.1 IoT Applications
2.2 Technology
3 Internet of Things
4 FoG Computing
4.1 The FoG Computing Architecture
4.2 FoG Computing in IoT
4.3 Areas Where FoG Works with IoT
5 Conclusion
References
Dynamic Resource Allocation in Fog Computing Environment
1 Introduction
2 Motivation
2.1 The Goal of This Work
2.2 Organization of Work
3 Related Work
4 Methodology
5 Results and Discussion
6 Conclusion
References
Vehicle as Fog Server in Intelligent Transportation System
1 Introduction
2 System Model
3 Application Characteristics in VFC
4 Research Directions
5 Proposed Solution Strategy
6 Simulation Setup
7 Results and Discussion
8 Conclusion
References
Measuring the Impact of Blockchain-Based Supply Chain Traceability Systems on Consumer Trust
1 Introduction
2 Literature Survey: Impact Analysis
2.1 Impact on Brand Trust and Credibility
2.2 Impact on Environment Sustainability
2.3 Impact on Economic Circularity
3 Methodology
4 Results and Discussions
4.1 Correlation Between Q1 and Q6: Correlated Positively
4.2 Correlation Between Q2 and Q6: Correlated Positively
4.3 Correlation Between Q3 and Q6
4.4 Correlation Between Q4 and Q6: Positive Correlation
4.5 Correlation Between Q5 and Q6: Positive Correlation
5 Conclusion
References
Comparison of Routing Protocols with Performance Parameters in MANET Using NS3
1 Introduction
2 Literature Review
2.1 Routing Protocols in MANET
2.2 AODV (Ad Hoc on Demand Distance Vector Routing)
2.3 DSR (Dynamic Source Routing Protocol)
2.4 DSDV (Destination Sequenced Distance Vector)
2.5 OLSR (Link State Routing Protocol)
3 Routing in MANET
4 Simulation
5 Conclusion
References
Developments Towards Sustainable Healthcare Sector
Light Weighted Model Based on Convolutional Neural Network for Detection of COVID-19 Using Chest X-Ray Images
1 Introduction
2 Background
3 Methodology
4 Results and Discussion
5 Conclusion
References
Forecasting COVID-19 Cases Using n-SARS-CoV-2 Variants
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Dataset
3.2 LSTM Model
3.3 SHapley Additive exPlanations (SHAP)
4 Results and Discussion
5 Conclusion and Future Scope
References
COVID-19 Vaccines Analysis to Predict Its Impact Across the World
1 Introduction
2 Proposed System
3 Implementation
3.1 Analysis
3.2 Predicting the MAE, MSE and RMSE Value
4 Conclusion
References
Lung Cancer Detection Using Ensemble Learning
1 Introduction
2 Related Work
3 Implementation Details
4 Results
5 Conclusion and Future Scope
References
Detection of Pneumothorax from Chest X-Ray Data Using Machine Learning: A Comprehensive Survey
1 Introduction
2 Literature Review
2.1 Datasets Survey
2.2 Survey Based on Methods and Findings
2.3 Image Pre-processing Technique
2.4 Machine Learning Algorithms
3 Discussions
4 Conclusion
References
Analyzing Patient Reviews for Recommending Treatment Using NLP and Deep Learning-Based Approaches
1 Introduction
2 Background and Related Work
3 Proposed Framework
3.1 Dataset Description
3.2 Data Understanding and Pre-processing
3.3 Data Visualization
3.4 Approaches
4 Implementation and Results
5 Conclusion and Future Work
References
IoT Based Low-Cost Pulse Oximeter for Remote Health Monitoring
1 Introduction
2 Related Work
3 Materials and Method
3.1 Hardware
3.2 Flow Chart and Working
4 Results and Discussion
5 Conclusion
References
Machine Learning and Deep Learning Enabled Applications in Different Sectors
Development of Homogenous Cross-Project Defect Prediction Model Using Artificial Neural Network
1 Introduction
2 Related Work
2.1 Prediction of Defects Based on Hand-Crafted Characteristics
2.2 Prediction of Defects Based on Deep Characteristics
2.3 Dependent and Independent Variable
3 Research Methodology
3.1 Select the Right Dataset
3.2 Balancing the Datasets (if Required)
3.3 Problems with Unbalanced Datasets
3.4 SMOTE for Balancing the Unbalanced Datasets
3.5 Choosing the Right Neural Network
4 Results and Analysis
4.1 Performance Measures - Accuracy, Precision, F Measure, Recall and Sigmoid Function
4.2 Results of JM1 Dataset
4.3 Results of KC3 Dataset
4.4 Results of PC3 Dataset
4.5 Results of CM1 Dataset
4.6 Observations from the Results Obtained
4.7 Performance of the Model
5 Threats Validity
6 Conclusion
References
Detection of Offensive Comments for Textual Data Using Machine Learning
1 Introduction
2 Related Work
3 Implementation Details
4 Discussions
5 Conclusion
References
Analyzing Various Handwriting Recognition Phenomenon for Predicting Gender, Age and Handedness
1 Introduction
2 Related Works
3 Phases in Handwriting Recognition
4 Datasets Used
5 Comparison of Various Works
6 Conclusion
References
Indoor Human Fall Detection Using Deep Learning
1 Introduction
2 Methodology
2.1 Dataset Preprocessing
2.2 Convolutional Neural Network
2.3 Long Short Term Memory
3 Results and Discussions
4 Conclusion
References
Colour Detection for Interior Designs Using Machine Learning
1 Introduction
2 Literature Survey
3 Methodology
4 Results and Discussions
5 Future Work
6 Conclusion
References
A Review on Estimation of Workload from Electroencephalogram (EEG) Using Machine Learning
1 Introduction
1.1 Classification of Workload and Relationship to Brain-Computer Interface (BCI)
1.2 Challenges in EEG Processing
1.3 Improvement Through Deep Learning
1.4 Understanding EEG In-depth
2 Methods
2.1 Data Acquisition and Pre-processing
2.2 Approach and Algorithm
2.3 Outcomes
3 Limitations
4 Conclusion
References
A Comprehensive Review on Image Captioning Using Deep Learning
1 Introduction
2 Image Captioning Techniques
2.1 Retrieval Based Captioning
2.2 Template Based Captioning
2.3 Neural Network-Based Image Captioning Method
3 Applications of Attention Mechanism
3.1 How Are Predictions Made?
3.2 How Are Predictions Evaluated?
4 Conclusion
References
Classical Models vs Deep Leaning: Time Series Analysis
1 Introduction
2 Methodology
2.1 Data-Extraction, Summary and Exploration
2.2 Model Building
3 Results
4 Conclusion
References
Probabilistic Evaluation of Distinct Machine Learning Algorithms
1 Introduction
1.1 Problem Statement
1.2 Objectives
2 Research Methodology
3 Literature Survey
4 Dataset Description
5 Improvised Analysis
6 Discussion
7 Conclusion and Future Scope
References
Empirical Analysis of Humor Detection Using Deep Learning and Machine Learning on Kaggle Corpus
1 Introduction
2 Related Work
3 Implementation Details
3.1 Dataset Description
4 Techniques Applied
5 Results Discussion
5.1 Machine Learning Techniques
5.2 Deep Learning Techniques
5.3 Comparative Analysis of ML and DL
6 Conclusions
7 Future Scope
References
Rumour Stance Classification on Textual Social Media Content Using Machine Learning
1 Introduction
2 Related Work
3 Implementation Details
3.1 Dataset Description
3.2 Workflow
4 Results and Discussion
5 Conclusion and Future Work
References
Robotics and Computer Vision for Intelligent Automation in Industries
Theft Detection: An Optimized Approach Using cGAN and YOLO
1 Introduction
2 Literature Review
3 Proposed Methodology/Solution
3.1 Experimental Setup for Weapon Detection Module
4 Result and Discussion
5 Conclusion
References
A Parser Based Apparel Transformation to Aid in Cloth Virtual Try-On
1 Introduction
2 Related Works
3 Model Pipeline
3.1 OpenPose
3.2 Self Correction for Human Parsing
4 Experiments
4.1 Implementation
4.2 Applications
4.3 Limitations and Work to be Done
5 Conclusion
References
Real-Time Sign Language Detection Leveraging Real-Time Translation
1 Introduction
2 Related Work
3 Methodology
4 Implementation and Tools
5 Experimental Results and Analysis
6 Conclusion and Future Work
References
Intelligent Pesticide Recommendation System Based on Plant Leaf Disease and Pests
1 Introduction
2 Related Work
3 Proposed Method
3.1 Deep Learning Algorithm Used: Convolutional Neural Network (CNN)
3.2 CNN Models Used to Compare
4 Implementation
4.1 Models Used to Compare for Plant Leaf Disease Detection
4.2 Models Used to Compare for Pest Detection
5 Results
5.1 Plant Leaf Disease Detection
5.2 Pest Detection
6 Conclusion and Future Scope
References
Flood Damage Detection Using Satellite Images
1 Introduction
2 Background and Related Works
3 Proposed Methodology
4 Dataset
5 Implementation and Results
5.1 Fine-Tuning the Model
5.2 Custom Model
6 Performance Metrics
6.1 Loss Comparison Plot
7 Performance Metrics
7.1 (A) Hurricane Harvey Dataset
7.2 (B) Custom Dataset
8 Result Analysis
9 Conclusion
References
Integration of Machine Learning in the Spatio-Temporal Analysis of Mangrove Forest
1 Introduction
2 Proposed Methodology
2.1 Study Area and Data
2.2 Image Preprocessing
2.3 Image Classification
2.4 Accuracy and Validation
3 Results and Discussion
3.1 Comparison Results
3.2 LULC Results
3.3 Discussions
4 Conclusion
References
Detecting Diseases in Jasmine Plants Using Proposed Image Pre-processing Algorithm
1 Introduction
2 Diseases in Plants
3 Major Diseases in Jasmine Plants
4 Related Work
5 Proposed System
5.1 Gathering Images
5.2 Augmentation
5.3 Pre-processing
5.4 Segmentation
5.5 Feature Extraction
5.6 Classification
6 Experimental Results
6.1 Initial and Augmented Images
6.2 Pre-processed Images
6.3 Images in Different Color Spaces
7 Conclusion
References
3D-Zeit: A Framework for Generating 3D Model as an AR Object Using Object Recognition
1 Introduction
1.1 Problem Statement
1.2 Objectives
2 Related Work
3 Methodology
3.1 Creating 3D Objects from a 2D Image
3.2 Rendering the 3D Object in Blender
3.3 Creating an AR Environment for the 3D Object in Unity
4 Conclusion
References
Automatic Image Captioning Using Ensemble of Deep Learning Techniques
1 Introduction
2 Literature Review
3 Proposed Model
3.1 Overview
3.2 CNN-Based Image Feature Extractor
3.3 LSTM Caption Generator
4 Experiment
4.1 Datasets and Preprocessing
4.2 Hyperparameter Tuning
4.3 Evaluation Metrics
5 Results and Analysis
5.1 Quantitative Results
5.2 Qualitative Results
6 Conclusion and Future Work
References
Automated License Plate Detection and Recognition Using Deep Learning
1 Introduction
2 CNN-RNN
3 YOLO - You Look Only Once
4 SSD - Single Shot Detector
5 Conclusion
References
Challenges in Scene Understanding for Autonomous Systems
1 Introduction
2 Local vs Global Feature Trade-off
3 Data Limitations
4 Domain Adaptation
4.1 Domain-Invariant Features
4.2 Domain-Specific Features
5 Task Dependency of Augmentations
6 Semantic Segmentation
7 Conclusion
References
An Effective Genetic Algorithm Based Multi-objective Optimization Approach for Coverage Path Planning of Mobile Robot
1 Introduction
2 Environmental Modelling
3 Proposed Method
3.1 Initialization
3.2 Fitness Evaluation
3.3 Selection
3.4 Crossover
3.5 Mutation
4 Results and Discussion
5 Conclusion and Future Work
References
Trending Technologies: Frameworks and Applications Focusing Real Life Issues
Smart Monitoring System for Waste Management Using IoT
1 Introduction
2 Proposed System
3 System Requirements
3.1 Hardware
3.2 Software
4 Results and Discussion
5 Conclusion
References
Implementation of LiDAR Based Self Driving Car Using Raspberry Pi 3
1 Introduction
2 Related Work
3 Progression of Self-driving Cars
4 Phases of Working
5 Designing of Proposed System
6 Challenges with Autonomous Cars
7 Results
8 Conclusion and Future Scope
References
Fast Implementation of AES Modes Based on Turing Architecture
1 Introduction
1.1 Enhanced L1 Data Cache
1.2 Execution of Floating Point and Integer in a Concurrent Manner
1.3 Uniform Datapath and Uniform Register File
1.4 Electronic Code Block (ECB)
1.5 Cipher Block Chaining (CBC)
1.6 Counter (CTR)
2 Related Work
3 Proposed Methodology
4 Comparison and Analysis
5 Conclusion
References
N-Dimensional Structure: A Data Structure with Fast Access and Sorting of Integers
1 Introduction
2 Literature Review
3 Methodology
3.1 U-Dimensional Space
3.2 Array Based Implementation
3.3 Tree Based Implementation
3.4 Algorithms
3.5 Theoretical Analysis
4 Results and Discussion
5 Conclusion
References
Spatial Variation of Air Quality in Delhi During Diwali: A Case Study of Covid-19 Period
1 Introduction
2 Literature Review
2.1 Factor Affecting Air Pollution
2.2 Health Effects of Firecrackers
3 Methodology
3.1 Data Acquisition and Analysis
3.2 Arc GIS
4 Results and Discussion
5 Conclusion
References
Shop-Easy: An Online Shopping Framework Emphasizing Vocal for Local Using Location and Review Based Services
1 Introduction
2 Background and Related Work
3 Shop-Easy: Proposed Shopping Framework
3.1 Proposed System Functionalities
3.2 Proposed System Functionalities
3.3 Results and Discussion
4 Comparative Analysis of Features of Proposed System
5 Conclusion
References
Women Assault Detection and Providing Help Using Pitch
1 Introduction
1.1 Input
1.2 Error Handling
2 Background
3 Literature Review
4 Dataset
5 Proposed Approach
5.1 Research Used
5.2 Hardware Necessities for Our Product Development
5.3 Software Specifications
5.4 Frequencies of Different Sounds
5.5 Working
5.6 Cost Estimation
5.7 Cost Comparison with CCTV
5.8 Process Flow of the Solution
6 Results and Discussion
References
Cognitive Workload Estimation Using Eye Tracking: A Review
1 Introduction
2 Background
2.1 Gaze Points
2.2 Fixation
2.3 Saccade
2.4 Velocity Classification
2.5 Fixation Duration
2.6 Pupil Dilation
2.7 Gaze Entropy
2.8 Saccadic Intrusion (SI)
3 Procedure
3.1 Participants
3.2 Instruments
4 Cognitive Load Estimation Methods
4.1 Statistical Analysis
4.2 Machine Learning Based Classification Methods
5 Conclusion
References
Author Index

Advancements in Interdisciplinary Research. First International Conference, AIR 2022 Prayagraj, India, May 6–7, 2022 Revised Selected Papers
 9783031237232, 9783031237249

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers