International Conference on Innovative Computing and Communications: Proceedings of ICICC 2021, Volume 2 (Advances in Intelligent Systems and Computing, 1388) 9811625964, 9789811625961

This book includes high-quality research papers presented at the Fourth International Conference on Innovative Computing

132 104 23MB

English Pages 851 [812] Year 2021

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
ICICC-2021 Steering Committee Members
Preface
Contents
About the Editors
Automatic Removal of Eye Blink Artefacts from EEG Data Using Spatio-Temporal Features
1 Introduction
2 Experimental Design and Data Acquisition
3 Proposed Enhanced Artefact Elimination Algorithm
3.1 EEG Data Pre-Processing
3.2 EEG Dataset Epoching
3.3 Independent Components Extraction and Artefact Removal Success Indicator Calculation
3.4 Artefact Removal and Success Indicator Calculation
4 Results
5 Conclusion
References
Autoencoder-Based Model for Detecting Accounting Statement Fraud
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Data and Variables
4 Data Analysis and Interpretation
4.1 Artificial Neural Network
4.2 Autoencoder
4.3 Network Training
5 Fraud Detection
6 Discussion
7 Conclusion
References
Increase in Mental Health Cases Post COVID Outbreak
1 Introduction
2 Background Study
3 Methodology
3.1 About the Dataset
3.2 Environmental Setup
3.3 Libraries Used
4 Results and Discussion
4.1 Dataset Evaluation
4.2 Heat Map Comparison
4.3 KNN Result
5 Future Scope
6 Conclusion
References
An Efficient Approach to Predict Fear of Human’s Mind During COVID-19 Outbreaks Utilizing Data Mining Technique
1 Introduction
2 Related Works
3 Methodology
3.1 Data Collection
3.2 Data Preprocessing
3.3 Data Handling
3.4 Classifier Selection
4 Outcomes
5 Conclusion
References
Evolutionary Algorithms for Face Recognition with Mask
1 Introduction
2 Methodology
2.1 Dataset
3 Data Augmentation
4 Feature Extraction and Normalization
5 Feature Selection
5.1 Crow Search Algorithm (CSA)
5.2 Cuttle Fish Algorithm (CFA)
5.3 Classification
6 Results
7 Conclusion and Future Scope
References
Stock Price Prediction Using Reinforcement Learning
1 Introduction
2 Related Works
3 Reinforcement Learning
4 Stock Price Prediction
5 Methodology
6 Experimental Work
7 Conclusion
References
Sentiment Analysis of Bangla Text Using Gated Recurrent Neural Network
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Collection
3.2 Features Extraction
3.3 Dataset Training
3.4 Gated Recurrent Unit Network (GRU)
4 Result and Analysis
5 Conclusion
References
Leveraging User Comments in Tweets for Rumor Detection
1 Introduction
2 Related Work
3 Proposed Approach of Leveraging User Comments for Rumor Detection
4 Results and Discussion
5 Conclusion
References
A Cost-Efficient QCA XOR Function Based Arithmetic Logic Unit for Nanotechnology Applications
1 Introduction
2 A Brief Oversight of Quantum-Dot Cellular Automata
2.1 Majority Gate
2.2 QCA Clocking
2.3 QCA Designer
3 QCA-based Proposed Logic Design
3.1 Reviews on XOR Gate
3.2 Proposed QCA Architecture of XOR Gate Topology
3.3 Proposed Full Adder Usıng Proposed XOR (N7) Gate
3.4 Proposed Full Subtractor Using Proposed XOR Gate (N7)
3.5 1-bit ALU Architecture
4 Simulation Result and Discussion
5 Conclusıon
References
Forecasting of PM10 Using Intelligent Crow Search Algorithm Tuned Feed-Forward Neural Network
1 Introduction
2 Intelligent Crow Search Algorithm
3 Construction of the Forecasting Architecture Model
4 Results
5 Conclusion
References
A Hybrid Fusion-Based Algorithm for Underwater Image Enhancement Using Fog Aware Density Evaluator and Mean Saturation
1 Introduction
2 Proposed Method
2.1 Multiscale Fusion
2.2 Gray World White Balancing Algorithm
2.3 Red-Compensated White Balancing Algorithm+Gray World Algorithm
2.4 Edge Preserving Decomposition-Based Single Image Haze Removal Algorithm
2.5 Fog Aware Density Evaluator
3 Results and Discussion
4 Conclusion
References
Application of Hybridized Whale Optimization for Protein Structure Prediction
1 Introduction
2 Protein Structure Prediction Problem (PSP)
2.1 Problem Formulation
3 Hybrid Whale Optimization Algorithm
4 Results
4.1 Wilcoxon Rank-Sum Test
4.2 Convergence Property Analysis
4.3 Box Plot Analysis
5 Conclusion
References
Clinical Named Entity Recognition Methods: An Overview
1 Introduction
2 Literature Review
2.1 Machine-Learning-Based Methods
2.2 Deep-Learning-Based Methods
2.3 Active-Learning-Based Methods
2.4 Other Clinical Named Entity Recognition Methods
3 Research Gap and Issues
4 Analysis and Discussion
4.1 Analysis Using Published year
4.2 Analysis Using Methods
4.3 Analysis Using Evaluation Metrics
4.4 Analysis Using Values of Performance Metrics
5 Conclusion
References
Mobile Phone SMS Notification Behavior Analysis Using Machine Learning Technique
1 Introduction and Background
2 Literature Review
3 Methodology
3.1 Overview of Dataset
3.2 Block Diagram
3.3 Dataset Preprocessing
3.4 Noise Reduction from Dataset
3.5 Classification Methods
4 Performance Analysis
4.1 Assessment Metric
4.2 Assessment Results
5 Conclusion
References
Computer Vision with Deep Learning Techniques for Neurodegenerative Diseases Analysis Using Neuroimaging: A Survey
1 Introduction
2 Neurodegenerative Diseases and Types
3 Neuroimaging in Disease Diagnosis
4 Computer Vision-Based Framework for Medical Image Analysis
5 Related Work
6 Challenges or Research Questions
7 Conclusion and Future Work
References
Breast Cancer Risk Prediction Using Different Clustering Techniques
1 Introduction
2 Related Works
3 Methodology
3.1 Instances and Dataset
3.2 Missing Data Handling
3.3 Find the Optimal Number of Clusters
3.4 Elbow Method (WCSS Method)
3.5 Dendrogram
3.6 Applying Principal Component Analysis (PCA) with Kernel
3.7 Radial Basis Function Kernel (RBF)
3.8 Applying Clustering
3.9 K-Means Cluster
3.10 Hierarchical Clustering (HC)
4 Experimented Analysis and Discussions
4.1 Accuracy (ACCR)
4.2 Precision (PRC)
4.3 Recall (Sensitivity) (RECL)
4.4 F1-Score
4.5 Specificity (SPE)
4.6 Explanation of the Analysis
5 Conclusion
References
Learner Model of Intelligent Tutoring System Based on Bayesian Network
1 Introduction
2 Overview of Intelligent Tutoring System
2.1 ITS Mechanisms
3 Learner Model of ITS Based on Bayesian Network
3.1 Bayesian Network
4 Bayesian Learner Model Assessment
5 Conclusion
References
CADBAIG: Context-Aware Dictionary-Based Automated Insight Generator
1 Introduction
2 Related Work
3 Proposed Approach: CADBAIG (Context-Aware Dictionary-Based Automated Insight Generator)
4 Working of CADBAIG on a Sample Research Paper
5 Results and Comparative Analysis
6 Conclusion and Future Work
References
Human Depression Prediction Using Association Rule Mining Technique
1 Introduction
2 Existing Works
3 Methodology
3.1 Collection of Data
3.2 Data Preprocessing
3.3 Chi-Square Correlation
3.4 Association Rule Mining
3.5 Simulation Environment
3.6 R Packages
4 Outcomes
5 Conclusion
References
Implementation of A Smart Helmet with Alcohol and Fall Detection and Navigation System
1 Introduction
2 Literature Survey
3 Methodology
3.1 Fall Detection System
3.2 Alcohol Detection System
3.3 Navigation System
3.4 Microcontroller and Implementation
4 Algorithm
5 Analysis and Results
6 Conclusion
References
BlockFITS: A Federated Data Augmentation Modelling for Blockchain-Based IoVT Systems
1 Introduction
2 Literature Review
2.1 Internet of Vehicular Things (IoVT)
2.2 Blockchain
2.3 Federated Learning
2.4 Data Augmentation
3 System Model
3.1 Requisite Definitions
3.2 Workflow of the System
4 Conclusion
References
Comparative Analysis for Improving Accuracy of Image Classification Using Deep Learning Architectures
1 Introduction
1.1 Motivation
1.2 Problem Identification
1.3 Solution
2 Dataset
3 Related Architecture Work
4 Result Analysis
5 Model Compilation, Training, and Model Evaluation
6 Discussion and Comparison
7 Future Scope
8 Experiment Approach
9 Limitation and Precaution
10 Conclusion
References
Infrared Thermography-Based Facial Classification Using Machine Learning
1 Introduction
2 Infrared Thermography-Based Face Recognition
2.1 Discrete Wavelet Transform (DWT)
3 Feature Extraction
4 Feature Reduction and Selection
5 Results and Discussion
6 Conclusion
References
An Efficient Cluster Assignment Algorithm for Scaling Support Vector Clustering
1 Introduction
2 Background Literature
2.1 Background: Core Vector Machines
2.2 Background: Ball Vector Machine
3 Efficient Cluster Computation : Proposed Approach
3.1 Proposed Efficient Clustering Approach
3.2 Experimental Setup
4 Results and Discussions
5 Conclusions
References
In Silico Analysis of Plant-Derived Medicinal Compounds Against Spike Protein of SARS-CoV-2 and Ace2
1 Introduction
2 Methodology
2.1 Data Collection and Preparation
2.2 Binding Site Selection and Preparation
2.3 Molecular Docking
3 Results
3.1 Molecular Docking of Spike’s Receptor Binding Domain with the Compound Dataset
3.2 Molecular Docking of ACE2 in Humans with the Compound Dataset
3.3 Molecular Docking of the Complex of the Spike Protein of SARS-CoV-2 and ACE2 with the Compound Dataset
4 Discussion
5 Conclusion
References
Serverless Computation with NuLambda
1 Introduction
1.1 Lambda
2 Literature Survey
3 Proposed Method
3.1 Compute Engine
3.2 Language Support
3.3 Load Balancing
3.4 Cost Estimation
4 Conclusion and Future Scope
References
Performance Comparison of Different Machine Learning Algorithms on Hindi News Classification
1 Introduction
2 Literature Review
3 Methodology
4 Implementation and Results
5 Conclusion
6 Future Scope
References
ConvLSTM for Human Activity Recognition
1 Introduction
2 Background and Previous Work
2.1 Data Collection for Human Activity Recognition
2.2 HAR with Deep Learning
2.3 Convolution Neural Networks and Long Short-Term Memory Networks for HAR
3 Dataset
4 Implementation and Architectural Setup
5 Results and Discussion
6 Conclusion and Future Scope
References
Mathematical Scanner (M-Scan) Mobile Application for Solving Simple Math Equations
1 Introduction
2 Methods and Materials
2.1 Image capturing
2.2 Grey Scaling
2.3 Binarization
2.4 Blob detection
2.5 Character Recognition
2.6 CAS
2.7 Explanation of the adopted approach
3 Results
4 Discussion
References
Usability Evaluation of Novel Text CAPTCHA Schemes Based on Colors and Shapes
1 Introduction
2 Literature Survey
2.1 Gimpy CAPTCHA
2.2 NoCAPTCHA ReCAPTCHA
2.3 Other CAPTCHAs
3 Proposed Scheme
3.1 Algorithm
3.2 MACS-TCHA Scheme 1
3.3 MACS-TCHA Scheme 2
4 Usability Evaluation Studies and Discussions
4.1 Hit Ratio Versus CAPTCHA
4.2 Ease of Use Versus Profession for Both CAPTCHA Schemes
4.3 Clarity in Understanding Instruction Statement Versus Profession for Both CAPTCHA Schemes
5 Conclusions and Future Work
References
Feature Selection for Email Phishing Detection Using Machine Learning
1 Introduction
2 Literature Review
3 Proposed System and Architecture
3.1 Phases in System Design
3.2 Feature Reduction
3.3 Data Collection Phase
4 Data Preprocessing Phase
5 Feature Extraction Phase
5.1 Email’s HTML Content Extraction Phase
5.2 Phishing Terms Extraction from the Email Body and Subject
6 Dimensionality Reduction
7 Classification Models
8 Experiments, Results, and Analyses
9 Conclusions
10 Future Scope
References
Workflow Scheduling Using Optimization Algorithm in Fog Computing
1 Introduction
1.1 Challenges
1.2 Motivation
1.3 Organization of the Paper
2 Related Works
3 Particle Swarm Optimization and Ant Colony Optimization Algorithms
4 Experimental Results
5 Conclusion and Future Scope
References
Early Detection of Covid-19 Based on Preliminary Features Using Machine Learning Algorithms
1 Introduction
2 Literature Survey
3 Methodology Used for Early Detection of Preliminary Features
3.1 Techniques
3.2 Dataset
3.3 Flow of the Work
3.4 Performance Metrics
4 Experiment Results and Discussions
4.1 Results Based on SVM and RF
4.2 Results Based on ANN Model
5 Conclusion and Future Scope
References
Detection of Green Belt Area Using Machine Learning Algorithms
1 Introduction
2 Literature Survey
3 Methodology Used for Detection of Green Belt Area
3.1 Techniques
3.2 Dataset
3.3 Flow of the Work
4 Experiment Results and Discussions
5 Conclusion and Future Scope
References
Survey on Social Distancing Detection Using Deep Learning
1 Introduction
2 Literature Survey
3 Result and Analysis
3.1 Comparative Study of Social Distancing Detection Measures
4 Conclusion
References
Skin Burn Detection Using Machine Learning
1 Introduction
2 Related Work
3 The Proposed Method
4 Model
5 Results
6 Discussion
7 Conclusion
References
Video Event Classification and Recognition Using AI and DNN
1 Introduction
2 Related Work
3 Proposed Methodology
4 Dataset Used
5 Result and Analysis
6 Conclusion and Future Scope
References
Systematic Survey on Cryptographic Methods Used for Key Management in Cloud Computing
1 Introduction
2 Literature Survey
2.1 A Survey of Key Management Service in Cloud [2]
2.2 Research on Key Management Infrastructure in Cloud Computing Environment [8]
2.3 Key Management for Cloud Data Storage: Methods and Comparisons [3]
2.4 A Framework for Key Management for Data Confidentiality in Cloud Environment [4]
2.5 A Framework for Secure Cryptographic Key Management Systems [6]
2.6 Cloud Computing Key Management Mechanism for Cloud Storage [1]
2.7 Management of Symmetric Cryptographic Keys in Cloud-Based Environment [9]
2.8 Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud [11]
2.9 Secure Management of Key Distribution in Cloud Scenarios [10]
2.10 A Secure Cloud Computing Authentication Using Cryptography [12]
2.11 CloudJS Proposed Algorithm for Cloud Encryption Platform [13]
3 Parameters to Evaluate Cloud Encryption Algorithms and Key Management
3.1 General Parameters [20–22]
3.2 Cloud-Specific Parameters [23, 24]
4 Classification of Papers
5 Conclusion
References
Domain-Controlled Title Generation with Human Evaluation
1 Introduction
1.1 Related Work
1.2 Contributions
2 Background
2.1 Attention
2.2 Pre-trained Language Models
2.3 Transformer Architecture
3 Proposed Method
3.1 Pre-processing: Subword Tokenization
3.2 T5 Model
3.3 Additional Token Technique for Domain Control
3.4 Training Procedure
4 Simulation Model
4.1 Simulation Setup
4.2 Parameters
4.3 Dataset
5 Results and Discussion
5.1 Automated Evaluation
5.2 Human Evaluation
6 Conclusion and Future Work
References
A Big Data Query Optimization Framework for Telecom Customer Churn Analysis
1 Introduction
2 Related Work
3 Methodology
4 Sentiment Classification
5 Results and Analyses
6 Conclusion
References
Lung Cancer Detection in Radiographs Using Image Processing Techniques
1 Introduction
2 Methodology
2.1 Preprocessing
2.2 Feature Extraction
3 Results
3.1 Image Enhancement Results
3.2 Segmentation Results
3.3 Feature Extraction Results
4 Lung Cancer Staging
4.1 Picture Segmentation Results for Normal Stages 1 and 2
4.2 Results for Feature Extraction for Stages 1 and 2
5 Conclusion
6 Comparison with Previous Work
References
COVID-19 Spread: A Demographic Analysis
1 Introduction
2 Motivation
3 Methodology
4 Clustering: Nations and COVID-19 Effect
5 Results and Discussion
6 Conclusion
References
A One-Dimensional CNN Model for Subject Independent Emotion Recognition Using EEG Signals
1 Introduction
2 Materials and Methods
2.1 Database
2.2 Proposed Methodology
2.3 Proposed CNN Model
3 Implementation and Results
4 Conclusion
References
Classification and Diagnosis of Alzheimer’s Disease from ADNI Dataset Using RBM Classifier
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Alzheimer’s Dataset
3.2 Pre-processing and Standard Scalar
3.3 Dimensionality Reduction
3.4 Restricted Boltzmann Machine
4 Experimental Results and Discussions
4.1 Results
4.2 Discussions
5 Conclusion
References
A Comparative Study of Early Detection of Diabetes Risk by Machine Learning
1 Introduction
2 Related Work
3 Methods for the Prediction of Diabetic Patients
4 Review on Different Machine Learning Methods for Early Prediction of Diabetes Patients
5 Conclusion
References
Monitoring of the COVID-19 Cases by EWMA Control Chart
1 Introduction
2 Related Work
3 Calculating the EWMA
4 Methodology: Assessment of EWMA Control Charts for Observing Spread of Covid-19 Cases in India by Using EWMA
5 Conclusion
References
Detecting the Trend of a Product by Online Reviews Using the Supervised Machine Learning
1 Introduction
2 Related Work
3 Methodology
4 Experimental Results
5 Conclusion
References
DiabeDetect: A Novel Decision Tree-Based Approach for Early Prognosis of Diabetes
1 Introduction
2 Literature Review
3 Materials and Methods
3.1 Dataset
3.2 Dataset Preparation
3.3 Theory of Decision Tree Approach
3.4 Metrics of Decision Tree
4 Evaluation and Result Analysis
4.1 Experimental Evaluation
4.2 Comparative Analysis and Discussion
5 Conclusion
References
Waste Segregator: An Optimized Neural Learning Approach Towards Real-Time Object Classification
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Convolutional Neural Network
3.2 Support Vector Machine
4 Image Dataset
5 Results
6 Future Work
References
Analyzing the Impact of Forensic Accounting in the Detection of Financial Fraud: The Mediating Role of Artificial Intelligence
1 Introduction
2 Literature Review
3 Research Design and Methodology
4 Data Analysis and Results
4.1 Construct Validity and Reliability
4.2 Evaluation of Structural Model
5 Conclusions
References
Knowledge Discovery in Geographical Sciences—A Systematic Survey of Various Machine Learning Algorithms for Rainfall Prediction
1 Introduction
1.1 Data Mining
1.2 Need of Data Mining
1.3 Machine Learning
1.4 Geographical Sciences
2 Geographical Data Mining
3 Machine Learning Approaches for Rainfall Prediction
4 Parameters Used in Rainfall Prediction
5 State of Knowledge—An Ephemeral Analysis of Rainfall Prediction
6 Conclusion and Future Work
References
Hateful Memes, Offensive or Non-offensive!
1 Introduction
2 Related Work
2.1 Offensive Content in Text
2.2 Offensive Content in Image
2.3 Offensive Content in Memes
3 Problem Statement
4 Dataset
5 Methodology
5.1 Models
5.2 Overview
6 Results
6.1 BERT
6.2 GloVe
7 Conclusion and Future Work
References
Drowsiness Detection System Using PPG Sensor’s Measured Physiological Parameter
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Results and Discussions
5 Conclusion and Future Work
References
Deep Ensemble Technique for Short-Term Load Forecasting Using Smart Meter Data
1 Introduction
2 Related Works
3 Electrical Load Forecasting Using Deep Ensemble Technique
3.1 Spike Neural Network
4 Experimental Results
5 Conclusion
References
Performance Analysis of ISOWC Link Considering Different System Parameters
1 Introduction
2 Literature Review
3 Proposed Configuration
4 Results and Discussion
5 Conclusion
References
Video Summarization Using SIFT Features and Niblack's Thresholding
1 Introduction
2 Literature Survey
3 Proposed System
4 Results and Discussion
5 Conclusions
References
A Comprehensive Study on Attention-Based NER
1 Introduction
2 Attention-Based Models
2.1 LSTM-CRF
2.2 BiLSTM-CRF
2.3 BLSTM-CCAtt
2.4 BiGRU
2.5 AERNs
3 Role of Attention Mechanism in NER
4 Most Used Datasets in NER
5 Discussion
6 Conclusion
References
Sentiment Analysis of Multilingual Mixed-Code, Twitter Data Using Machine Learning Approach
1 Introduction
2 Literature Review
3 Problem Statement
4 Proposed System
4.1 Fetch the Twitter Training Dataset
4.2 Text Pre-processing
5 Results and Analysis
6 Conclusion and Future Scope
References
Residual Decoder based U-Net for Semantic Segmentation
1 Introduction
2 Proposed Methodology
2.1 Encoder–Decoder Module Architecture
2.2 Model Training
2.3 Evaluation Metrics
3 Results and Discussion
4 Conclusion
References
Ensembled Approach for Text Summarization
1 Introduction
2 Literature Survey
3 Proposed Model
3.1 Combining Attentions
3.2 Extractor
3.3 Abstractor
3.4 Coverage Mechanism
4 Experiment and Results
4.1 Dataset
4.2 Implementation:
4.3 Training Procedure
4.4 Result
5 Conclusion and Future Scope
References
Statistical Analysis of Impact of COVID-19 Pandemic on States of India
1 Introduction
2 Related Work
3 Proposed Method
4 Experimental Results
4.1 Discussion
5 Conclusion
References
A Review on Evolution of Architectures, Services, and Applications in Computing Towards Edge Computing
1 Introduction
2 Generations of Computing Architectures
2.1 Mainframe Computing
2.2 Client–Server Computing Model
2.3 Cloud Computing
2.4 Intermediate Computings Before Evolution to Edge Computing
3 Edge Computing
3.1 Architecture
3.2 Challenges
3.3 Application
3.4 Future Trends and Opportunities in Edge Computing
4 Conclusion
References
Image Retrieval Using Multilayer Bi-LSTM
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset
3.2 Data Pre-Processing
3.3 Feature Extraction
3.4 Generating Descriptions
3.5 Training the Model
3.6 Retrieving Images
3.7 Evaluation and Scoring
4 Result and Discussion
5 Conclusion and Future Scope
References
Analysis of FSO-OFDM System Performance for Different Bit Rates and Link Ranges
1 Introduction
2 FSO-OFDM
2.1 Challenges Faced by FSO
2.2 Difference Between OFDM and FDM
2.3 Advantages of OFDM
3 System Setup
4 Result and Discussion
5 Conclusion
References
Customer Churn Prediction in Telecommunication Using Gradient Boosting Machine
1 Introduction
2 Related Work
3 Proposed Model
4 Performance Metrics
5 Experimentation and Performance Evaluation
6 Conclusion and Future Scope
References
Blood-Based DNA Methylation Marker Identification for Parkinson's Disease Prediction
1 Introduction
2 Related Work
3 Materials and Methods
4 Results and Discussion
5 Conclusion
References
Disease Detection and Prediction Using the Liver Function Test Data: A Review of Machine Learning Algorithms
1 Introduction
2 Overview of Liver Diseases
2.1 Diagnosis of Liver Diseases
2.2 Liver Function Tests
2.3 Derangement of Liver Enzymes in Diabetes Mellitus
3 Related Work
3.1 Literature Survey of Liver Disease Detection and Prediction with Machine Learning Techniques
3.2 Literature Survey for Prevalence of Abnormal Liver Function Tests in Diabetes Mellitus
4 Comparative Analysis of Various Machine Learning Algorithms Using LFT for Diagnosing and Predicting Liver Diseases
5 Discussion
6 Conclusion
References
Performance Assessment of Health Decision-Making Using Various Artificial Intelligence Techniques and Evolutionary Algorithms
1 Introduction
2 Related Work
3 Methodology
3.1 Datasets
3.2 Feature Selection
3.3 Classification
4 Results
5 Conclusion and Future Scope
References
Bee Intelligence-Guided Partitional Clustering for Outlier Detection
1 Introduction
2 Detection of Outlier by Clustering
2.1 Outlier Detection
2.2 ABC (Artificial Bee Colony) Algorithm
3 Methodology
4 Data Sets
5 Results and Discussion
6 Conclusion and Future Scope
References
Author Index

International Conference on Innovative Computing and Communications: Proceedings of ICICC 2021, Volume 2 (Advances in Intelligent Systems and Computing, 1388)
 9811625964, 9789811625961

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Recommend Papers