توضیحاتی در مورد کتاب Proceedings of Data Analytics and Management: ICDAM 2021, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies, 91)
نام کتاب : Proceedings of Data Analytics and Management: ICDAM 2021, Volume 2 (Lecture Notes on Data Engineering and Communications Technologies, 91)
عنوان ترجمه شده به فارسی : مجموعه مقالات تجزیه و تحلیل داده ها و مدیریت: ICDAM 2021، جلد 2 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 91)
سری :
نویسندگان : Deepak Gupta (editor), Zdzislaw Polkowski (editor), Ashish Khanna (editor), Siddhartha Bhattacharyya (editor), Oscar Castillo (editor)
ناشر : Springer
سال نشر : 2021
تعداد صفحات : 850
ISBN (شابک) : 9811662843 , 9789811662843
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 21 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
ICDAM Committees
Preface
About This Book
Contents
About the Editors
CNN Based Feature Extraction for Visual Speech Recognition in Malayalam
1 Introduction
2 Proposed Model
2.1 Video Feature Extraction
2.2 Classification
3 Malayalam Audio-Visual Database
4 Result Analysis
5 Conclusion
References
Effective Rate of Minority Class Over-Sampling for Maximizing the Imbalanced Dataset Model Performance
1 Introduction
2 Related Works
3 Datasets
4 Feature Engineering
5 Over-Sampling Approaches
6 Proposed Method
7 Experimental Result and Analysis
7.1 Experimental Environment
7.2 Train and Test Dataset
7.3 Results and Analysis
8 Discussions
9 Conclusion
References
Malaria Cell Image Classification Using Convolutional Neural Networks (CNNs)
1 Introduction
2 Related Works
3 Implementation
3.1 Data Abstraction
3.2 Data Processing
3.3 Convolutional Neural Network
3.4 VGG19
3.5 ResNet50
3.6 System Implemented
4 Result and Analysis
5 Conclusion
References
Automating Live Cricket Commentary Using Supervised Learning
1 Introduction
2 Literature Survey
3 Research Methodology
3.1 Web Scrapper
3.2 Supervised Learning
4 Results and Discussion
5 Conclusion and Future Work
References
Real-Time Object Detection and Distance Approximation
1 Introduction
2 Related Work
3 Research Approach
3.1 Object Detection
3.2 Distance Approximation
4 Implementation, Results, and Analysis
4.1 Object Detection
4.2 Distance Approximation
4.3 Real-Time Object Detection Using Webcam
5 Conclusion and Future Scope
References
Spectral Efficiency Analysis of Massive MIMO
1 Introduction
1.1 Classification of MIMO
1.2 M-MIMO: A Versatile Technology
1.3 Results and Discussions
2 Conclusion
References
Recommendations for DDOS Threats Using Tableau
1 Introduction
2 Literature Review
3 Methodology
4 Results and Discussion
5 Conclusion
References
Sinkhole Attack Detection in Wireless Sensor Networks
1 Introduction
2 Sinkhole Attack Detection Approaches
2.1 Anomaly-Based Approach
2.2 Cryptographic Approach
2.3 Hybrid Approach
3 Anomaly-Based Approach for Sinkhole Attack Detection
3.1 Message Digest Method
3.2 Zone-Based Intrusion Detection System
3.3 Game Theory Approach
3.4 Emotional Ants Approach
4 Major Design Challenges in Detecting Sinkhole Attacks
5 Conclusion and Future Scope
References
HPGAB3C: A Novel Hybridized Optimization Approach
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Nomenclature
3.2 HPGAB3C Approach
3.3 Pseudocode for HPGAB3C Based Routing Approach in WMNs
4 Simulation, Results and Discussion
4.1 Performance Analysis of 1000 Node Client WMNs
4.2 Performance analysis of 5000 node Client WMNs
4.3 Performance analysis of 9000 node Client WMNs
4.4 Overall performance analysis of all Client WMNs
5 Conclusion
References
COVID-19 Identification on Chest X-rays with Deep Learning Technique
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset
3.2 Deep Learning
3.3 ResNet-50
3.4 Proposed Classification Model
4 Results
4.1 Accuracy
4.2 Sensitivity
4.3 Specificity
5 Discussion
6 Conclusion and Future Scope
References
IoT-Cloud Enabled Statistical Analysis and Visualization of Air Pollution Data in India
1 Introduction
2 Background Details
2.1 Cause of Air Pollution
2.2 Type of Pollutant in Ambient Air
2.3 Various IoT Sensors and Devices Used for Data Gathering
3 Related Works
4 Proposed Work
4.1 Air Pollution Dataset Used
4.2 Proposed Workflow Diagram
4.3 Methodology and Technique Involved
4.4 Experimental Setup and Results
4.5 Statistical Analysis
4.6 Data Visualization
5 Conclusions and Future Directions
References
Dental Cavity Detection Using YOLO
1 Introduction
2 Literature Review
3 Methodology
3.1 Dataset
3.2 Image Labeling and Annotation
3.3 YOLO V4
4 Result and Discussion
5 Conclusion
References
Development of Data Set for Automatic News Telecast System for Deaf Using ISL Videos
1 Introduction
2 Literature Survey
3 Research Objectives
4 Data Set Collections
4.1 Implementation
4.2 Research Challenges
5 Comparison Analysis
6 Conclusion
References
A Comprehensive Survey on Content-Based Image Retrieval Using Machine Learning
1 Introduction
2 CBIR Framework
2.1 Low-Level Features Extraction
2.2 Decreasing Dimensionality and Indexing
2.3 Machine Learning in the Image Processing Context
3 Literature Review
4 Performance Evaluation Criteria and Similarity Measurement
5 Similarity Measurements
6 Conclusion and Future Directions
References
Keyphrase Extraction from Twitter Data—A Supervised Deep Learning Approach
1 Introduction
2 Related Works
3 Methodology
3.1 BERT Summarizer
3.2 Bi-LSTM
3.3 Candidate Key Extraction and Labelling
3.4 Keyphrase Extraction
4 Experimental Result and Discussion
4.1 Dataset
4.2 Experimental Setup and Evaluation
4.3 Results
4.4 Discussion
5 Conclusion
References
Improving the Yield and Revenue of Indian Crop Production Using Data Engineering
1 Introduction
2 Related Work
3 Implementation
3.1 Module 1: Recommendation of Season and Location for a Crop for Maximum Yield
3.2 Module 2: Recommendation of Harvesting Months for a Crop for Maximum Revenue
3.3 Module 3: Comparison of Fruit and Vegetable Crops on Basis of Yield
4 Results
5 Conclusion
References
Designing an LSTM and Genetic Algorithm-based Sentiment Analysis Model for COVID-19
1 Introduction
2 Models Used
2.1 LSTM
2.2 Genetic Algorithm
3 Related Works
4 Social Media Pandemic Sentiment Model
5 Experimental Work
5.1 Dataset
5.2 Results
6 Conclusion
References
Machine Learning Techniques for Keystroke Dynamics
1 Introduction
2 Related Work
3 Methodology
3.1 Database Acquisition and Normalization
3.2 Feature Extraction
3.3 Exploratory Data Analysis
3.4 Classification
4 Result and Discussion
5 Conclusion
References
Detection of Denial-of-Service Attacks Using Stacked LSTM Networks
1 Introduction
2 Related Work
3 Proposed Work
3.1 Dataset Description
3.2 Data Preprocessing
3.3 Algorithm and Methodology
4 Results and Discussion
4.1 Experimental Run with Learning Rate = 0.1
4.2 Experimental Run with Learning Rate = 0.2
5 Conclusion and Future Scope
References
Concept of Hybrid Models in Background Subtraction: A Review of Recent Trends
1 Introduction
2 Recent Hybrid Models
2.1 Integration of Local Information with Fuzzy Markov Random Field (GMRF + MAP + localGLCM)
2.2 Randomized Low Rank Dynamic Mode Decomposition (rDMD)
2.3 Hierarchical Modeling and Alternating Optimization (HMAO)
2.4 Generalized Singular Value Thresholding Operator (GSVT) Based Non-convex Low Rank and Sparse Decomposition (LRSD)
2.5 Adaptive Motion Estimation + Sequential Outline Separation (AME + SOS)
2.6 Non-convex Rank Approximation Robust Principal Component Analysis and Super-Pixel Motion Detection Using Linear Spectral Clustering (LSCNC-RPCA)
3 Comparative and Descriptive Analysis
4 Conclusion
References
Artificial Neural Network Approach for Multimodal Biometric Authentication System
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 Preprocessing and Normalization
3.2 Training of CNN Model
3.3 Minibatch and Optimization
3.4 Feature Extraction, Fusion and Classification
4 Experimentation and Results
5 Conclusion
References
Malware Classification and Defence Against Adversarial Attacks
1 Introduction
2 Literature Review
3 Proposed Solution
3.1 Dataset Description
3.2 Machine Learning Classifiers
3.3 Adversarial Examples and Adversarial Training
3.4 Results
3.5 Conclusion and Future Work
References
A Novel Ensemble Machine Learning Model for Prediction of Zika Virus T-Cell Epitopes
1 Introduction
1.1 Background
2 Materials and Methods
2.1 Feature Extraction
2.2 Feature Selection
2.3 Data Partitioning
2.4 Training of Base Classifiers
2.5 Selection of Classifiers for the Proposed Ensemble Model
2.6 Proposed Ensemble Model
3 Results
3.1 Model Evaluation Results
3.2 Model Validation Results
3.3 Model Comparison with Existing Methods Using an Unknown Dataset
4 Discussion
5 Conclusion
References
A Deep Learning Approach for Detection of SQL Injection Attacks Using Convolutional Neural Networks
1 Introduction
2 Literature Survey
2.1 Supervised Techniques
2.2 Unsupervised Techniques
3 Proposed Methodology
3.1 Dataset
3.2 Pre-processing
3.3 Algorithms
3.4 Performance Measures
4 Results and Discussion
5 Conclusion and Future Scope
References
Machine Learning, Deep Learning and Image Processing for Healthcare: A Crux for Detection and Prediction of Disease
1 Introduction
2 Proposed Methodology
3 Machine Learning in Disease Detection and Prediction
3.1 Supervised Machine Learning
3.2 Unsupervised Machine Learning
3.3 Semi-Supervised Learning
3.4 Reinforcement Machine Learning
4 Challenges in Healthcare: A Deep Dive into the Problems
5 Feature Selection and Classification Techniques for the Severe Disease Prediction
5.1 Classification Techniques for Radiology and Medical Imaging
5.2 Classification Techniques for an Early Disease Detection and Prognosis
5.3 Bioinformatics- Gene Sequencing and Protein Sequencing for Chronic Disease Prediction
5.4 Classification Techniques in Diabetes Prediction
6 Cognitive Intelligence and Image Processing for Disease Detections
7 Conclusion and Future Perspectives
References
Dynamic Pricing-Based E-commerce Model for the Produce of Organic Farming in India: A Research Roadmap with Main Advertence to Vegetables
1 Introduction
2 E-commerce in Agriculture
3 Situation of Organic Farming in India
4 Motivation for the Proposed Work
5 Related Work
6 Dynamic Pricing Policy: E-commerce Model for Organic Vegetables
6.1 Ranking of the Parameters
6.2 Flow Chart for the Model
7 Results and Discussion
8 Conclusions
References
Deep Learning Techniques for Detection of Autism Spectrum Syndrome (ASS)
1 Introduction
2 Deep Learning Technique in Diagnosing Autism
3 Literature Review
4 Problem Formulation
5 Proposed Methodology
5.1 Neuro-Image Datasets
5.2 Proposed Deep Learning Architecture
6 Discussion
7 Limitation and Future Scope
References
Test Suite Minimization Based upon CMIMX and ABC
1 Introduction
1.1 Test Suite Minimization
1.2 The Basic Principle of ABC
1.3 The Basic of CMIMX
2 State-Of-The-Art
3 Proposed Approach
4 Analysis of ABC–MIN Algorithm
4.1 Case Study
4.2 Performance Metric
4.3 Implementation of Proposed Algorithm
5 Result and Discussion
6 Conclusion
References
Feature Selection for Bi-objective Stress Classification Using Emerging Swarm Intelligence Metaheuristic Techniques
1 Introduction
2 Material and Methods
2.1 Data
2.2 Mathematical Model of Feature Selection
2.3 Methods
3 Results and Discussions
3.1 Data Analysis
3.2 Performance Analysis
4 Conclusion
References
Regulated Energy Harvesting Scheme for Self-Sustaining WSN in Precision Agriculture
1 Introduction
2 Literature Survey
3 Regulated Energy Harvesting for WSN
4 Simulation Configuration and Performance Analysis of NEH/TEH/REH Using Leach Protocol
4.1 Energy Harvesting Variation Analysis of TEH
4.2 Energy Harvesting Variation Analysis of REH
4.3 Analysis of Total Energy Harvested Using TEH
4.4 Analysis of Total Energy Harvested Using REH
4.5 Comparison of Maximum Harvested Energy Using Both Scenarios (TEH and REH)
5 Conclusion
References
Empirical Analysis of Facial Expressions Based on Convolutional Neural Network Methods
1 Introduction
2 Related Work
3 Dataset Description
4 System Architecture
5 Experimental Results and Discussions
6 Conclusion
References
An Advanced Hybrid Algorithm for Real-World Optimization Problem
1 Introduction
2 Brief on DE and PSO
2.1 Differential Evolution (DE)
2.2 Particle Swarm Optimization (PSO)
3 Proposed Methodology
3.1 ADE: Advanced DE
3.2 APSO: Advanced PSO
4 Application
5 Conclusion
References
An Online Document Emoji-Based Classification Using Twitter Dataset
1 Introduction
2 Literature Review
3 Proposed Approach
3.1 Data Collection Approach
3.2 ODEC Classification Approach
4 Experiments and Results
5 Discussion
6 Conclusion and Future Scope
References
Approaches to Optimize Memory Footprint for Elephant Flows
1 Introduction
1.1 Background and Motivation
1.2 Overview of the Paper and Contributions
1.3 Arrangement of Sections in Article
2 Literature Survey and Research Gap
3 Proposed Work
3.1 Memory Bound Approach
3.2 Ingestion Bound Approach
4 Experiments and Results
5 Conclusion
References
Statistical Significance of Wilson Amplitude Towards the Identification and Classification of Murmur from Phonocardiogram
1 Introduction
2 Methodology
3 Results and Discussions
4 Conclusions
References
Comparative Analysis on Machine Learning Methodologies for the Effective Usage of Medical WSNs
1 Introduction
2 Related Work
3 Methodologies
3.1 Supervised Learning Methodologies
3.2 Unsupervised Learning Methodologies
3.3 Semi-supervised Learning Methodologies
3.4 Reinforcement Learning Methodologies
4 Methodology for the Proposed Application
5 Experimental Results
6 Conclusion and Future Scope
References
Convolutional Neural Networks for Malaria Image Classification
1 Introduction
2 Related Work
3 Methodological Discussion
4 Experimental Results
5 Conclusion and Future Scope
References
Identification of Characters (Digits) Through Customized Convolutional Neural Network
1 Introduction
2 Related Work
3 Datasets Description
3.1 UCOM
3.2 Cedar
3.3 IFN/ENIT
3.4 CHARS74K
4 Proposed Method
5 Results and Discussion
6 Conclusion
References
Breast Cancer Detection Using Image Processing and CNN Algorithm with K-Fold Cross-Validation
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 CNN (Simple Benchmark Model)
3.2 Image Augmentation
3.3 Transfer Learning
3.4 K-Fold Cross-Validation
4 Result Analysis
4.1 Dataset Description
5 Conclusion
References
Pilot Decontamination Using Sector Base Method in Massive MIMO System
1 Introduction
1.1 Pilot contamination
2 Literature Review
3 System Model
3.1 Model
4 Methodology
4.1 Amp Algorithm
4.2 Proposed Solution
5 Results and Findings
5.1 Table
5.2 Flow Graph
6 Discussion
7 Conclusion
References
Applications of Deep Learning in Diabetic Retinopathy Detection and Classification: A Critical Review
1 Introduction
2 Diabetic Retinopathy and Deep Learning
3 Related Work
4 Methodology
4.1 DR Datasets
4.2 Preprocessing Techniques
4.3 Training Techniques
4.4 Performance Measures
4.5 Classification Methods
5 Challenges Faced in DR Detection
6 Results and Discussion
7 Conclusion and Future Scope
References
A Study of Recommendation System on OTT Platform and Determining Similarity and Likeliness Among Users for Recommendation of Movies
1 Introduction
1.1 Need of Recommendation System
1.2 Working Principle
1.3 Approaches
2 Related Work
3 Proposed Solution
4 Proposed Model and Results
5 Conclusion
References
Plant Leaf Disease Identification and Prescription Suggestion Using Deep Learning
1 Introduction
2 Related Work
2.1 Artificial Neural Network
2.2 Convolutional Neural Network
3 Methodology
3.1 Image Acquisition
3.2 Data Preprocessing
3.3 Data Classification with Multiple Neural Networks
3.4 Model Generation
4 Experiment and Result Analysis
5 Conclusion
References
Machine Learning Based Data Quality Model for COVID-19 Related Big Data
1 Introduction
2 Literature Review
3 Proposed Model
3.1 Approach
3.2 Method
4 Experimental Work
4.1 Dataset Used
4.2 Data Preparation
4.3 Anomaly Detection
5 Results
6 Future Work
7 Conclusion
References
Paradigm of Handling Data Linked to Cloud Database Impacting Cloud Computing: A Case Study Based on Simulation
1 Introduction
2 Review of Literature
3 Application of Particle Swarm Optimization
3.1 Basic Scheduling Criteria
3.2 Steps Towards Focusing on Particles
4 Experiment Analysis
5 Discussion and Future Direction
6 Conclusion
References
Provision and Allocation of Large Scaled Data in Virtual Environment: A Case Study with Simulation Approach
1 Introduction
2 Review of Literature
3 Application of Ant Colony Optimization
3.1 Steps to Manage the Level of Pheromones
4 Algorithm: Application of ACO Accessing Query Terms Linked to Pheromones
5 Experimental Analysis
6 Discussion and Future Direction
7 Conclusion
References
Implementation of Secure Communication Framework for Wireless Sensor Network
1 Introduction
1.1 Literature Review
2 Scheme Design
3 Platform Security Features
4 Security Analysis
5 Conclusion
References
EMBRACE: Electronic Medical Record Safety, Blockchain to the Rescue
1 Introduction
1.1 Blockchain
1.2 Blockchain in Healthcare
2 Literature Survey
3 Objective
4 Methodology Adopted
5 Result
6 Conclusion and Future Work
References
Stress Prediction Using Machine Learning and IoT
1 Introduction
2 Related Surveys
3 Research Methodology
3.1 IoT Device Architecture
4 Results
5 Conclusion and Future Scope
References
Mitigation of DDoS Attacks Using Honeypot and Firewall
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Geographical IP Based Blocking
3.2 TCP Max Connections
3.3 Invalid TCP Flags
3.4 Synproxy
3.5 Rate Limiting
3.6 ICMP Type Based Filtering
3.7 Bogon IP Addresses
3.8 Port Blocking
4 Implementation
4.1 Network Setup
4.2 Packet Generator
4.3 Firewall
4.4 Honeypot
5 Results and Observations
6 Conclusion and Future Work
References
Predicting Student’s Performance Using Linear Kernel Principal Component Analysis and Recurrent Neural Network (LKPCA-RNN) Model
1 Introduction
2 Related Work
3 Research Methodology
3.1 Dataset
3.2 Proposed Model
4 Results and Discussion
5 Conclusion and Future Scope
References
Efficient Spectrum Allocation in Wireless Networks Using Channel Aggregation Fragmentation with Reservation Channels
1 Introduction
2 Related Work
3 System Model
4 Aging Algorithm
5 RRP Algorithm
6 RRP with Reservation Algorithm
6.1 Service Interruptions
6.2 Static Reservation Scheme
6.3 Channel Access Strategy
7 Numerical Results and Discussions
7.1 Blocking Probability
7.2 Forced Termination Probability
8 Conclusion
References
Toxic Comment Classification Using Bi-directional GRUs and CNN
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset
3.2 Data Preprocessing
3.3 Model
4 Experimental Results
5 Conclusion and Future Scope
References
VGG-16-Based Framework for Identification of Facemask Using Video Forensics
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Image Acquisition Phase
3.2 Image Processing Phase
3.3 Feature Extraction Phase
3.4 Classification Phase
4 Experimental Results and Discussions
4.1 Dataset Description
4.2 System and Environmental Specifications
4.3 Results & Discussion
5 Conclusion and Future Scope
References
BlockSIoT: A Blockchain-Based Secure Data Sharing in SIoT
1 Introduction
2 Motivation
3 Problem Analysis
3.1 Problem Definition 1: Issues in Addressing the Dynamism, Scalability, and Heterogeneity
3.2 Problem Definition 2: Service Rendering in Dynamic Network
4 The Decentralized Approach
5 System Overview with Requisites
5.1 System Components
5.2 User Classes
5.3 Usecase Scenario
6 Performance Evaluation
6.1 Experimental Setup
6.2 Result Analysis
7 Concluding Remarks
References
Hybrid Feature Selection Method for Binary and Multi-class High Dimension Data
1 Introduction
2 Related Work
3 Proposed Work
3.1 ANOVAF Value
3.2 Select Features Based on the Model—Adaptive Boosting
3.3 Select Features Based on the Model—Decision Trees
4 Results and Discussion
4.1 Implementation
4.2 Results
5 Conclusions
References
An Innovative Approach to Establish, Maintain and Review Quality Standards in Higher Education through Quality Assurance Tool
1 Introduction
2 Methodology
2.1 Sample Characteristics
2.2 Proposed Model
3 Result and Discussion
4 Conclusion
References
Assessment of 3-Dimensional Hand Pose by PosePrior Network for Images
1 Introduction
2 Literature Review
2.1 Hand Pose Estimation
2.2 2-Dimensional Hand Pose Estimation
2.3 3-Dimensional Hand Pose Estimation
3 Representation of Pose of a Hand
3.1 3-Dimensional HPE
4 Datasets for HPE
5 Delineated Dataset–Hand Pose
6 Experiments and Results
6.1 Lifting the Hand Pose Estimation to 3D
7 Recognition of Sign Language
8 Conclusion
References
Climate Dependent Crop Management Through Data Modeling
1 Introduction
2 Introduction to Machine Learning
3 Literature Survey
3.1 Crop Yield Prediction
3.2 Crop Quality Prediction
3.3 Crop Disease Detection
3.4 Weed Detection
4 Challenges to Enhance the Agricultural System
5 Solutions and Proposed Methodology
6 Conclusion and Future Scope
References
Translate2Classify: Machine Translation for E-Commerce Product Categorization in Comparison with Machine Learning & Deep Learning Classification
1 Introduction
2 Related Work
3 Neural Machine Translation
4 Dataset
5 Experiments and Baseline Models
5.1 Machine Learning Classification Models
5.2 Deep Learning Classification Models
5.3 Neural Machine Translation Models
6 Results
7 Conclusion
8 Future Work
References
Fake Feedback Detection to Enhance Trust in Cloud Using Supervised Machine Learning Techniques
1 Introduction
2 Methodology
2.1 Dataset
2.2 Implementation
3 Results
4 Conclusion
References
Face Recognition Using Artificially Intelligent Methodologies on FERET and FEI Datasets
1 Introduction
1.1 Applications of Facial Recognition
1.2 Problem Statement
2 Literature Review
2.1 Concepts Behind the Simulation
3 Methodology
3.1 Dataset
3.2 SVM for Facial Recognition
3.3 Subspace Reduction Techniques
3.4 Deep Learning for Facial Recognition
4 Results
5 Conclusion and Future Scope
References
Early Prognosis of Acute Myocardial Infarction Using Machine Learning Techniques
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Machine Learning Classifier Used
3.2 Dataset and Its Analysis
3.3 Experimental Setup
4 Result and Discussion
4.1 Important Feature from the Input Column
5 Conclusion and Future Scope
References
Multimodal Biometric Authentication by Slap Swarm-Based Score Level Fusion
1 Introduction
2 Literature Review
3 Methodology
3.1 Basic Pre-Processing for Biometrics
3.2 Image Feature Selection
3.3 Biometrics Recognition
4 Results Analysis
5 Conclusion
References
Hybrid Metaheuristic Algorithm-Based Clustering with Multi-Hop Routing Protocol for Wireless Sensor Networks
1 Introduction
2 Literature Survey
3 The HMA-CMHR Protocol
3.1 QHSA Based Clustering Protocol
3.2 ICS Based Routing Protocol
4 Performance Validation
5 Conclusion
References
Author Index