Computational Intelligence in Data Science Third IFIP TC 12 International Conference, ICCIDS 2020, Chennai, India, February 20–22, 2020, Revised Selected Papers
9783030634667, 9783030634674
This book constitutes the refereed post-conference proceedings of the Third IFIP TC 12 International Conference on Compu
Table of contents : Preface Organization Contents Computational Intelligence for Text Analysis Emotion Recognition in Sentences - A Recurrent Neural Network Approach 1 Introduction 2 Data Sets 2.1 SemEval 2007 Affect Sensing Corpus 2.2 ISEAR 3 Literature Review 4 Model Architecture 4.1 Hybrid Data Set 4.2 Pre-processing 4.3 Sentence Splitter 4.4 Obtaining Emotion Words 4.5 Model 4.6 Post-processing 5 Evaluation and Results 6 Conclusion 7 Future Work References Context Aware Contrastive Opinion Summarization 1 Introduction 2 Related Work 3 Proposed Framework 3.1 Contextual Sentiment LSTM Encoder 4 Context-Sensitive Contrastive Summary Model 4.1 Word Attention 4.2 Sentence Attention 4.3 Context-Sensitive Sentiment Classification 4.4 Context-Sensitive Summary Generation 4.5 Context-Sensitive Contrastive Summary Generation 5 Experimental Results 5.1 Context-Sensitive Sentiment Classification Using Soft-Max Classifier 5.2 Context-Sensitive Summary Generation Using Pointer-Generator Network 5.3 Summary Generation by Selecting Sentences Using Contrastive Score 6 Performance Analysis of Proposed Context-Sensitive Summary Method with Existing Methods 6.1 Word Attention 6.2 Context-Sensitive Sentiment Classification 6.3 Context-Sensitive Summary Generation 7 Summary References Tamil Paraphrase Detection Using Encoder-Decoder Neural Networks 1 Introduction 2 Related Work 3 Dataset Description 4 Preprocessing 5 Encoder-Decoder Model 6 Experiment 7 Results 8 Error Analysis 9 Conclusions References Trustworthy User Recommendation Using Boosted Vector Similarity Measure 1 Introduction 2 Related Work 2.1 Trust-Enhanced Recommendation Techniques 2.2 Trust Model Representation 3 Proposed Recommender System 3.1 Provenance Based Trust Assessment 3.2 Fuzzy Decision Tree Based Classification 3.3 Trust-Boosted Recommender System 4 Experiments and Result Analysis 4.1 Evaluation of Different Weight Strategies 4.2 Comparison with Other Trust-Based Recommender System 5 Conclusion and Future Work References Sensitive Keyword Extraction Based on Cyber Keywords and LDA in Twitter to Avoid Regrets 1 Introduction 2 Related Work 2.1 Twitter and Privacy Concerns 2.2 Twitter Topic Identification 3 Methodology 3.1 Tweet Cleaning and Pre-processing 3.2 Topic Keyword Detector Using LDA Model 4 Results and Discussions 4.1 Dataset 4.2 Sensitive Topic Keyword Extractor Using LDA Model 5 Conclusion References Sentiment Analysis of Bengali Tweets Using Deep Learning 1 Introduction 2 Related Work 3 Model Development 3.1 Preprocessing 3.2 Deep Learning Models 4 Evaluation and Experimental Results 4.1 Experimental Results and Comparisons 4.2 Model Comparisons and Discussion 5 Conclusion References Social Media Veracity Detection System Using Calibrate Classifier 1 Introduction 2 Related Work 3 Dataset 4 Methodology 4.1 Data Store 4.2 Data Pre-processing 4.3 Feature Generation 4.4 Ensemble Classifier 5 Results and Discussions 5.1 Pre-processing 5.2 Feature Generation 5.3 Calibrate Classifier for Rumor Detection System 6 Evaluation Metrics 7 Conclusion References A Thesaurus Based Semantic Relation Extraction for Agricultural Corpora 1 Introduction 2 Literature Survey 3 Proposed Methodology 3.1 System Architecture 3.2 Dataset Details 3.3 Feature Extraction 3.4 Semantic Relation Classifier Based on Multinomial Naïve Bayes (MNB) 4 Results and Discussion 4.1 Evaluation and Performance Analysis of the Sentence Selection Module 4.2 Output for Semantic Relation 5 Conclusion A Appendix References Irony Detection in Bengali Tweets: A New Dataset, Experimentation and Results 1 Introduction 2 Corpus Development 3 Irony Types 3.1 Verbal Irony 3.2 Irony by Clash 3.3 Situational Irony 3.4 No Irony 4 Feature Extraction 5 Model Development 5.1 Naïve Bayes 5.2 Support Vector Machine 5.3 K-Nearest Neighbor 5.4 Random Forest 6 Experiments and Results 6.1 Naïve Bayes 6.2 Support Vector Machine 6.3 K-Nearest Neighbor 6.4 Random Forest 6.5 Comparisons of Models and Discussion 7 Conclusion References Computational Intelligence for Image and Video Analysis Bat Algorithm with CNN Parameter Tuning for Lung Nodule False Positive Reduction 1 Introduction 2 Related Works 3 Problem Statement 4 Proposed Method 4.1 Dataset Details 4.2 Classification Using CNN 4.3 Convolutional Neural Network with Bat Architecture 4.4 Convolutional Neural Network with Particle Swarm Optimization 5 Experimental Results and Discussion 6 Conclusion References A Secure Blind Watermarking Scheme Using Wavelets, Arnold Transform and QR Decomposition 1 Introduction 2 Literature Survey 3 Preliminaries 3.1 QR Factorization 3.2 Arnold Transform (AT) 3.3 Normalized Cross Correlation (NC) 4 Proposed Watermarking Scheme 5 Results and Analysis 6 Conclusion References Role of Distance Measures in Approximate String Matching Algorithms for Face Recognition System 1 Introduction 2 Related Work 3 Methodology 3.1 Face Recognition System Model 3.2 Approximate String Matching Algorithm Based on Dynamic Edit Distance 3.3 Approximate String Matching Algorithm Based on Dynamic LCSS Distance 3.4 Approximate String Matching Algorithm Based on Hamming Distance 3.5 Approximate String Matching Algorithm Based on Jaro Distance 4 Experiments and Analysis of Results 4.1 Face Recognition with FEI Database 4.2 Face Recognition with AT&T Database 5 Conclusion and Future Work References Detection of Human Faces in Video Sequences Using Mean of GLBP Signatures 1 Introduction 2 Survey Work 3 Planned Work 3.1 Normalization 3.2 Signature Extraction of Gabor Filter 3.3 Signature Extraction of LBP 3.4 Classification 4 Experimental Results and Discussion 4.1 Performance of Signature Extraction 4.2 Performance of Categorizer 4.3 Performance of NGLBP 5 Conclusion and Future Work References Malware Family Classification Model Using User Defined Features and Representation Learning 1 Introduction 2 Literature Survey 3 Malware Family Classification Model 3.1 Corpus Development and Dataset Creation 3.2 Model Building 4 Experiments and Results 5 Conclusion References Fabric Defect Detection Using YOLOv2 and YOLO v3 Tiny 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Choice of YOLO 3.2 Data Set Creation 3.3 Object Detection Algorithm 3.4 System Specification 4 Data Preprocessing 5 Implementation 6 Results and Discussion 7 Conclusion and Future Work References Automatic Questionnaire and Interactive Session Generation from Videos 1 Introduction 2 Literature Survey 3 Current Work 3.1 Transcript Generation 3.2 Logical Point Detection 3.3 Question Generation 4 Results 5 Future Work References Effective Emotion Recognition from Partially Occluded Facial Images Using Deep Learning 1 Introduction 2 Related Work 2.1 Facial Occlusion Method 2.2 Detecting the Shape of Faces 2.3 Localization of ROI 3 Proposed Work: ACNN for Partial Facial Occlusion 3.1 Convolution and Max-Pooling Layer 3.2 Analysing Facial Image Patches 4 Experimental Results and Discussion 4.1 Dataset 4.2 Results 5 Conclusion References Driveable Area Detection Using Semantic Segmentation Deep Neural Network 1 Introduction 2 Related Work 3 Details of Dataset 4 Deep Learning Network 5 Results and Conclusion References Data Science WS-SM: Web Services - Secured Messaging Framework with Pluggable APIs 1 Introduction 2 Existing Work 3 WS-SM Framework 3.1 Security Gateway 3.2 SOAPAction Spoofing API 3.3 WS-Addressing Spoofing API 3.4 Replay of Messages API 3.5 Message Alteration Attack API 3.6 Principal Spoofing Attack API 4 Testing and Discussion 4.1 Compliance Testing 4.2 Vulnerability Testing 4.3 Stress Testing 5 Conclusion References Online Product Recommendation System Using Multi Scenario Demographic Hybrid (MDH) Approach 1 Introduction 2 Literature Survey 3 Proposed Work 3.1 Pre Processing 3.2 Identify End User Age Group 3.3 Calculate Product Ranking 3.4 Fuzzy Logic 4 Results and Discussion 4.1 Performance Metrics 4.2 Experimental Results 5 Conclusion and Future Work References Simulation of Path Planning Algorithms Using Commercially Available Road Datasets with Multi-modal Sensory Data 1 Introduction 1.1 Elements of Simulation Studies 1.2 Limitations of Simulation Studies 2 Details of Dataset 3 Deep Learning Inferences on RGB Images 4 Range Data Processing 4.1 Description of Data Container 4.2 LIDAR Data Visualization 4.3 Correspondence Between RGB and Range Data 5 Path Planning 5.1 GPS-Based Global Map 5.2 Global Map-Based Local Path Planning 6 Conclusion References Implementation of Blockchain-Based Blood Donation Framework 1 Introduction 1.1 Blood Transfusion Service in India 1.2 Issues in Blood Donation 2 Literature Survey 3 Blockchain Technology 4 Proposed System 4.1 Entities in the Proposed System 4.2 The Workflow of the Proposed System 4.3 Privacy and Access Controls 4.4 Blockchain Framework 5 Implementation Details 6 Results and Discussion 7 Conclusion 8 Future Work References IoT Based Crop-Field Monitoring and Precise Irrigation System Using Crop Water Requirement 1 Introduction 2 Literature Survey 3 Background 4 Proposed Work 4.1 Architecture Design 4.2 Setting up of Wireless Sensor Network 4.3 Sensing and Logging of Data 4.4 Computation of Crop Water Requirement 4.5 Automated Control of Pump Motor 5 Experimentation 6 Conclusion References A Machine Learning Study of Comorbidity of Dyslexia and Attention Deficiency Hyperactivity Disorder 1 Introduction 2 Related Work 3 Materials and Methods 3.1 Methods Used 3.2 Dataset Description 3.3 Experiments 4 Results and Analysis 4.1 Comparison of the Results of Dyslexic and Comorbid Cases 4.2 Comparison of the Results of ADHD and Comorbid Cases 5 Conclusion References Program Synthesis: Synthesizing Operators for Integer Manipulation 1 Introduction 2 Literature Survey 3 Overview 3.1 Approach 1: Synthesizing an Operation and an Integer 3.2 Approach 2: Synthesizing a Binary Operation 3.3 Approach 3: Synthesis of a Single Operator to Reduce a List of Integers to an Aggregate 3.4 Approach 4: Synthesis of a Sequence of Operators to Reduce a List of Integers to an Aggregate Using Genetic Algorithm 4 Results 5 Future Work References Location Based Recommender Systems (LBRS) – A Review 1 Introduction 2 Location Based Recommendation System (LBRS) 2.1 Standalone Recommendation System 2.2 Sequential Location Recommendation 3 Services Provided by Location Based Recommender Systems (LBRS) 3.1 Geo Tagged Media Based Services 3.2 Point Location Based Services 4 Highlights for Improvement 5 Conclusion References Author Index