Data Management, Analytics and Innovation: Proceedings of ICDMAI 2021, Volume 2
- Length: 548 pages
- Edition: 1
- Language: English
- Publisher: Springer
- Publication Date: 2021-09-20
- ISBN-10: 9811629366
- ISBN-13: 9789811629365
- Sales Rank: #0 (See Top 100 Books)
This book presents the latest findings in the areas of data management and smart computing, machine learning, big data management, artificial intelligence, and data analytics, along with advances in network technologies. The book is a collection of peer-reviewed research papers presented at Fifth International Conference on Data Management, Analytics and Innovation (ICDMAI 2021), held during January 15–17, 2021, in a virtual mode. It addresses state-of-the-art topics and discusses challenges and solutions for future development. Gathering original, unpublished contributions by scientists from around the globe, the book is mainly intended for a professional audience of researchers and practitioners in academia and industry.
Preface Contents About the Editors Track I Simulation of Lotka–Volterra Equations Using Differentiable Programming in Julia 1 Introduction 2 Dataset 3 Approach Overview 4 Results 5 Conclusion References Feature Selection Strategy for Multi-residents Behavior Analysis in Smart Home Environment 1 Introduction 2 Related Work 3 Methods 3.1 ARAS Datasets 3.2 Performance Measurements 3.3 Machine Learning Algorithms 3.4 Feature Selection Methods 4 Experimental Results and Discussions 4.1 Experimental Results 4.2 Experimental Discussions 5 Conclusion References A Comparative Study on Self-learning Techniques for Securing Digital Devices 1 Introduction 2 Intrusion Detection System 2.1 Types of IDS Technologies 2.2 Intrusion Detection Techniques 3 Machine Learning in IDS 3.1 Classification 3.2 Regression and Clustering 3.3 Deep Learning 3.4 Genetic Algorithms 3.5 Neural Networks and Fuzzy Logic 4 Datasets 4.1 KDD Cup 99 Dataset 4.2 NSL-KDD Dataset 4.3 Exploit Database (Exploitdb) 4.4 CICIDS2017 Dataset 5 Results and Discussion 6 Future Work 7 Conclusion References An Intelligent, Geo-replication, Energy-Efficient BAN Routing Algorithm Under Framework of Machine Learning and Cloud Computing 1 Introduction 2 Proposed Algorithm 3 Result Analysis and Discussion 4 Conclusion References New Credibilistic Real Option Model Based on the Pessimism-Optimism Character of a Decision-Maker 1 Introduction 2 Preliminaries 3 The Expected Value and the Weight Component 3.1 The Credibilistic Expected Value with Respect to the mλ-Measure 3.2 The Center-Of-Gravity Expected Value and the Weight Component 4 Numerical Example: Valuing M&A Synergies 5 Conclusions References Analysis of Road Accidents in India and Prediction of Accident Severity 1 Introduction 2 Literature Review 3 Methodology 3.1 Decision Tree 4 Result Analysis 4.1 Road Accidents in India (2000 to 2017) 4.2 Black Spots in 2013 and 2014 4.3 Road Accidents in 2017 and 2018 4.4 Maps 5 Prediction Model 5.1 Dataset 5.2 Proposed Model 5.3 Results and Performance 6 Conclusion References Mining Opinion Features and Sentiment Analysis with Synonymy Aspects 1 Introduction 2 Related Works 3 Proposed Algorithm 3.1 Feature Generation 3.2 Sentiment Analysis 4 Methodology and Methods 4.1 Data Collection 4.2 Feature Generation 4.3 Model Architecture 5 Result and Discussion 5.1 Aspect Generation 5.2 Sentiment Analysis 6 Conclusion References Understanding Employee Attrition Using Machine Learning Techniques 1 Introduction 2 Literature Review 3 Methodology 4 Feature Engineering 5 Result and Discussion 6 Conclusion References Track II Fake News Detection: Experiments and Approaches Beyond Linguistic Features 1 Introduction 2 Related Work 2.1 What Is Fake News? 2.2 Challenges Encountered in Fake News Detection 2.3 Existing Datasets 2.4 Classification Methods 2.5 Evaluation Metrics 3 Description of Datasets Used 4 Experiments and Results 4.1 Regression Model 4.2 Siamese Network with BERT 4.3 Sequence Model 4.4 Enhanced Sequence Model 4.5 Sequence Model on FakeNewsNet 4.6 Convolutional Model for Linguistic and Visual Features 5 Conclusion References Object Recognition and Classification for Robotics Using Virtualization and AI Acceleration on Cloud and Edge 1 Introduction 2 Literature Survey 2.1 YOLO 2.2 Cyber Foraging and Cloudlets 2.3 Intel OpenVINO 2.4 Gabriel Cloud and VM 2.5 Raspberry Pi and Camera Module 3 Methodology 3.1 Preparation 3.2 Implementation Considerations 3.3 Stages of Implementation 4 Results 5 Discussion 6 Conclusion References Neural Networks Application in Predicting Stock Price of Banking Sector Companies: A Case Study Analysis of ICICI Bank 1 Introduction 1.1 Neural Networks 2 Objective of the Study 3 Review of Literature 3.1 Banking Sector 4 Hypothesis of the Study 5 Scope of the Study 6 Limitations of the Study 7 Research Methodology of the Study 8 Sources and Methods 9 Data Analysis 10 Findings and Suggestions of the Study 11 Conclusions and Suggestions of the Study References Epilepsy Seizure Classification Using One-Dimensional Convolutional Neural Networks 1 Introduction 2 Related Work 3 Methodology 3.1 Flow Design 3.2 Dataset 3.3 Evaluation Metrics 3.4 Training Model 3.5 Inception 3.6 ResNet 4 Experimental Results 4.1 Results Obtained 4.2 Results Compared to Machine Learning Techniques 4.3 Results Compared to Deep Learning Techniques 5 Conclusion and Future Scope References Syntactic and Semantic Knowledge-Aware Paraphrase Detection for Clinical Data 1 Introduction 2 Related Works 3 Proposed Knowledge-Aware Paraphrase Detection Model 3.1 Output Layer 3.2 Similarity Detection Using Knowledge Base 4 Experimental Set-Up 4.1 Results and Discussions 5 Conclusion References Enhanced Behavioral Cloning-Based Self-driving Car Using Transfer Learning 1 Introduction 2 Related Work 3 Proposed Approach 3.1 Network Pruning Using 1times1 Filter 3.2 Transfer Learning 4 Dataset Description and Preprocessing 5 Experimental Results 6 Conclusion References Early Detection of Parkinson’s Disease Using Computer Vision 1 Introduction 2 Dataset 3 Literature Review 3.1 Algorithms 3.2 Data Collection 3.3 Methodology 3.4 Analysis 4 Implementation 5 Results 6 Conclusion References Sense the Pulse: A Customized NLP-Based Analytical Platform for Large Organization—A Data Maturity Journey at TCS 1 Introduction 2 Literature Review Summary 3 Solution Delivered 3.1 Data 3.2 Technology 3.3 Process 3.4 People 4 Results and Analysis 5 Non-functional Requirements 6 Conclusion References Track III Fact-Finding Knowledge-Aware Search Engine 1 Introduction 2 Related Work 3 Problem Statement 4 System Overview 5 Methodology 5.1 Data 5.2 Data Distiller 5.3 Document Search Engine 5.4 Knowledge Graph 6 Why Search Engine and Graph Need to Be Used Together? 7 Ranking and Evaluation 8 Conclusion 9 Future Work References Automated Data Quality Mechanism and Analysis of Meteorological Data Obtained from Wind-Monitoring Stations of India 1 Introduction 2 Related Works 3 Methodology 3.1 Flagging Mechanism 3.2 Automated QC Procedure 4 Primary Checks 4.1 Chronological Sorting and Handling of Duplicate Records 4.2 Handling Missing Data 4.3 Standardization of Data Type 5 Internal Consistency Tests 5.1 Physical Limit Test 5.2 Gradient Test 5.3 Deviation Test 6 Relational Consistency Tests 6.1 Consistency Between Wind Speeds at Different Levels 6.2 Storage and Extraction of QC Data 7 Analysis and Discussion 7.1 Interdependency of Sensors at Different Levels 7.2 Interdependency of Sensors at Same Level 7.3 Effect of Outliers 8 Results 9 Conclusion References Efficient and Secure Storage for Renewable Energy Resource Data Using Parquet for Data Analytics 1 Introduction 2 Related Works 3 Methodology 3.1 Different File Storage Formats 3.2 Dataset Description 4 Results and Discussion 5 Conclusion and Future Work References Data Processing and Analytics for National Security Intelligence: An Overview 1 Introduction 2 Intelligence in the Context of National Security 3 Intelligence in the context of external threats 3.1 ELINT Receivers 3.2 Processing in ELINT Receivers 3.3 Data Processing Techniques 4 Intelligence in the Context of Internal Threats 4.1 Asymmetric Warfare 4.2 Open-Source Intelligence (OSINT) 4.3 Data Processing of OSINT 5 Intelligence Derived from Multiple Sensors 5.1 Data Processing in Multiple Sensor Environment 5.2 Geolocation Accuracy 6 Conclusions References Framework of EcomTDMA for Transactional Data Mining Using Frequent Item Set for E-Commerce Application 1 Introduction 2 Literature Survey 3 Results and Findings 3.1 Existing System Structure 3.2 Proposed System Framework 3.3 EcomTDMA for Hash Base Frequent Item Set Mining 4 Conclusion 5 Future Scope References Track IV A Survey on Energy-Efficient Task Offloading and Virtual Machine Migration for Mobile Edge Computation 1 Introduction 2 Literature Survey 2.1 Energy Efficiency 2.2 Energy Efficiency and Latency 2.3 Trade-Off Between Energy Efficiency and Latency 2.4 Virtual Machine Migration 3 Proposed Work 4 Conclusion References Quantitative Study on Barriers of Adopting Big Data Analytics for UK and Eire SMEs 1 Introduction 2 Literature Review 3 Proposed Work 3.1 Research Design 3.2 Questionnaire Design 3.3 Population and Sample of the Study 3.4 Administration and Distribution of the Questionnaire 4 Result 4.1 Data Analysis 4.2 Initial Analysis 4.3 Associations Between Demographics and Understanding of Big Data Analytics 4.4 Barriers to Big Data Analytics 4.5 Cronbach’s Alpha 4.6 Framework Refinement 4.7 Limitations 5 Conclusion Appendix 1: Flow chart of the Number of Responses Included in the Analysis Appendix 2: Demographics Appendix 3: Significance Testing Appendix 4: Cronbach's Alpha Test on the Five Pillars of the Big Data Analytics Strategic Framework for SMEs References Post-quantum Cryptography 1 Introduction 2 Literature Review 2.1 Classical Cryptosystems 2.2 Simon's Periodicity Algorithm 2.3 Shor's Algorithm 2.4 The Fallacy of the Classical Cryptosystems and the Advent of a Quantum Computer 2.5 Post-quantum Cryptosystems 2.6 Signature Schemes 2.7 Attacks on Signature Scheme 2.8 Hash Function 2.9 One-Time Signature Scheme 2.10 Merkle Static Tree 2.11 Advantage of Using Hashed-Based Signature Scheme 2.12 Comparison Between Quantum Cryptography and Post-quantum Cryptography: Quantum Key Distribution 3 Conclusion References A Comprehensive Study of Security Attack on VANET 1 Introduction 2 VANET Overview 2.1 VANET Architecture 2.2 VANET Model Overview 2.3 VANET Characteristics 2.4 VANET Communication Standards 2.5 Types of VANET Communication 3 Routing Protocols 4 Challenges and Security Attacks 4.1 Classification of Attackers 4.2 Classification of Attacks 5 Overview of Jamming Attack 5.1 Effectiveness of Jamming 6 Related Works 7 Conclusion References Developing Business-Business Private Block-Chain Smart Contracts Using Hyper-Ledger Fabric for Security, Privacy and Transparency in Supply Chain 1 Introduction 1.1 Smart-Contracts (SC) for B2B 1.2 Hyper-Ledger Fabric (HF) 1.3 Problem Formulation 1.4 Methodology 2 Implementation 3 Sample of Screen Shots 4 Conclusion References Data-Driven Frameworks for System Identification of a Steam Generator 1 Introduction 2 Methodology 2.1 Ranking of Variable 2.2 Multiple Linear Regression 2.3 Multi-layer Perceptron Model 3 Case Study 3.1 Boiler Pilot Plant Configuration 3.2 System Identification 3.3 Model Identification 4 Conclusion References Track V An Efficient Obstacle Detection Scheme for Low-Altitude UAVs Using Google Maps 1 Introduction 1.1 Unmanned Aerial Vehicles 1.2 Obstacle Detection in UAVs 1.3 Limitations of Live Analysis Techniques 1.4 Proposed Approach 1.5 Contribution of this Paper 1.6 Organisation of the Paper 2 Related Work 3 Experiment and Results 3.1 Considerations 3.2 Definitions 3.3 Simulation Environment 3.4 Proposed Methodology 3.5 Set Initial Mission 3.6 Get Map 3.7 Image Preprocessing 3.8 Segmentation 3.9 Modifying Mission 4 Observations 5 Conclusions and Future Scope References Estimating Authors’ Research Impact Using PageRank Algorithm 1 Introduction 2 Related Work 3 Methodology 3.1 Dataset 3.2 PageRank Calculation of a Research Paper 3.3 Calculating Authors’ Impact 4 Results and Analysis 4.1 Top-20 Papers Based on Their PageRank Values 4.2 Top-30 Authors Based on PageRank Values 4.3 Top-30 Authors Based on Citation Counts 4.4 Relation Between Authors’ Cumulative Citation Counts and Cumulative PageRank 4.5 Comparing PageRank-Based Author Impact with h-index 5 Conclusions and Further Scope References Research Misconduct and Citation Gaming: A Critical Review on Characterization and Recent Trends of Research Manipulation 1 Introduction 2 Characterization: Types of Possible Research Misconduct 2.1 Citation Malpractices 2.2 Detection of Plagiarism 2.3 Figure or Image Manipulation 2.4 Honorary or Ghost Authorship 2.5 Biases in Peer-Review Process 3 Future Scope of Study: How Computational Intelligence, Data Science, and Analytics Can Help? References Dynamic Price Prediction of Agricultural Produce for E-Commerce Business Model: A Linear Regression Model 1 Introduction 2 Literature Review 3 Motivation of the Work 4 Materials and Method 4.1 Linear Regression 4.2 Outliers Detection 5 Result and Discussion 6 Conclusion and Future Work References Real-Time Facial Recognition Using SURF-FAST 1 Introduction 2 Related Work 3 Methodology 3.1 Pre-Processing 3.2 Training 3.3 Face Identification on Real-Time Video 4 Experiment 5 Conclusion 6 Future Work References Microblog Analysis with Machine Learning for Indic Languages: A Quick Survey 1 Introduction 2 Machine Learning Overview 3 Microblog Analysis Stages 3.1 Collection of Tweets 3.2 Pre-processing of Tweets 3.3 Language Identification 3.4 Topic Modelling/Classification 3.5 Opinion Mining 4 Conclusion and Future Direction References Author Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.