Skip to main content
Top

Advances in Machine Learning and Big Data Analytics II

ICMLBDA 2023, NIT Arunachal Pradesh, India, May 29-30

  • 2025
  • Book

About this book

In the dynamic landscape of technology, machine learning and big data analytics have emerged as transformative forces, reshaping industries and empowering innovation. Machine learning, a subset of artificial intelligence, equips systems to learn and adapt from data, revolutionizing decision-making, automation, and predictive capabilities. Meanwhile, Big Data Analytics processes and extracts insights from vast and complex datasets, unveiling hidden patterns and trends. Together, these fields enable us to harness the immense power of data for smarter business strategies, improved healthcare, enhanced user experiences, and countless other applications. This edited volume on machine learning and big data analytics (Proceedings of ICMLBDA 2023, which was held on May 29-30, 2023 by NERIST and NIT Arunachal Pradesh India) introduces an exciting journey into the intersection of machine learning and Big Data Analytics, where data becomes a catalyst for progress and transformation.

Table of Contents

Next
  • current Page 1
  • 2
  1. Frontmatter

  2. Optimized Neural Networks Archetype for Prediction of Socio-economic Class of Women in India

    N. M. Jyothi, B. K. Rajya Lakshmi, Pavani Gonnuri, A. Pavani
    This chapter explores the optimization of neural networks for predicting the socio-economic class (SEC) of women in India, focusing on a novel architecture that enhances prediction accuracy and speed. The study employs a dataset of 2000 subjects with 30 features, utilizing a Segment, Screen, Integrate, Enhance, and Categorize technique to identify the most impactful features. The research highlights significant improvements in accuracy, achieving up to 99.34%, compared to traditional methods. Key topics include data preparation, feature selection, model architecture, and performance evaluation. The study also compares the proposed model with other machine learning techniques, demonstrating its superior performance in classifying SEC into low, medium, and high categories. The results underscore the model's efficiency in handling large feature sets and its potential for real-time predictions, making it a valuable tool for socio-economic research and policy development.
  3. Improvement of UPFC Performance in Power Systems Using Artificial Intelligence

    Mamatha Deenakonda, Padma Jyothi Uppalapati, Sridevi Bonthu, Phanikumar Chittala
    This chapter delves into the enhancement of UPFC performance in power systems through the application of Artificial Intelligence, specifically Artificial Neural Networks (ANNs). The study identifies key challenges in power transmission, such as higher Total Harmonic Distortion (THD), voltage fluctuations, and stability issues, and proposes an innovative solution using ANN-based controllers. The integration of UPFC with ANN controllers aims to achieve near-unity power factor, reduce THD, and improve power quality. Simulation results demonstrate significant reductions in THD levels, with values as low as 0.25% for linear loads and 0.3% for nonlinear loads, highlighting the effectiveness of the proposed system. The chapter also explores the role of UPFC as an active power filter, enhancing power quality and stability in transmission lines. The detailed analysis and simulation results provide a comprehensive overview of the benefits and practical applications of ANN-based UPFC systems in modern power networks.
  4. Classification of Parkinson’s Disease Using Machine Learning Techniques

    Satish Dekka, K. Narasimha Raju, D. Manendra Sai, M. Pallavi, Bosubabu Sambana
    This chapter delves into the application of machine learning techniques for the early detection and classification of Parkinson's disease, focusing on both motor and non-motor symptoms. The study evaluates the effectiveness of three machine learning algorithms—decision trees, support vector machines (SVM), and K-nearest neighbors (KNN)—in predicting the progression of Parkinson's disease. The research utilizes a dataset from the UCI repository, with variables selected based on symptoms and diagnosis. The performance of the algorithms is assessed using various metrics, including accuracy, area under the curve (AUC), and receiver operating characteristic (ROC) curves. The results indicate that the KNN algorithm achieves the highest accuracy of 91.9%, outperforming decision trees and SVM. The chapter also discusses the potential of these machine learning techniques in improving the early detection and management of Parkinson's disease, highlighting the importance of proactive treatment to enhance disease outcomes. Additionally, the study explores the impact of Parkinson's disease on various body parts and the role of machine learning in analyzing different reports and identifying diseases. The comparative analysis of the algorithms provides insights into their suitability for predicting Parkinson's disease, making this chapter a valuable resource for professionals seeking to leverage machine learning in neurological research.
  5. A Survey on Skin Cancer Detection Using Artificial Intelligence

    N. P. Patnaik M, Johan Jaidhan Beera
    This survey delves into the application of artificial intelligence in skin cancer detection, focusing on the use of neural networks for image classification. It examines the stages of skin disease recognition, including preprocessing, image segmentation, feature extraction, and classification, with a particular emphasis on the performance of artificial neural networks (ANNs), convolutional neural networks (CNNs), k-nearest neighbors (KNNs), and radial basis function networks (RBFNs). The survey highlights the superior results achieved by CNNs in image classification tasks due to their close connection with computer vision. It also explores the emerging concept of auto-association in deep learning, which aims to identify features and patterns in image datasets to enhance the accuracy of diagnostic systems. The text discusses the current limitations of AI-based diagnostic tools, such as their focus on individual lesion images rather than full-body assessments, and the challenges posed by the low contrast and heterogeneous backgrounds in dermoscopic images. It also reviews various studies and methodologies, including the use of statistical models for wrist bone segmentation in CT images and the development of mobile device-based systems for dermoscopic image classification. The survey concludes by emphasizing the importance of early detection in improving survival rates for skin cancer and the need for further research to address the complexities of automated skin lesion analysis.
  6. A Review of Ranking Approach to Rank Interval-Valued Trapezoidal Intuitionistic Fuzzy Sets

    S. N. Murty Kodukulla, V. Sireesha
    This chapter delves into the application of the Centre of Gravity (COG) method in ranking Interval-Valued Trapezoidal Intuitionistic Fuzzy Sets (IVTrIFS), a crucial aspect of fuzzy logic and decision-making processes. The author introduces a new ranking approach that leverages the COG of the hesitancy region, a mathematical expression quantifying uncertainty in decision-making. The hesitancy region is divided into three parts, and the COG is calculated through these regions to define a ranking function based on the Euclidean distance. The chapter provides a detailed geometric representation and mathematical formulation of the hesitancy region, including the areas and COGs of the constituent triangles and rectangles. A numerical example compares the proposed method with existing ranking methods, demonstrating its consistency and improved performance in specific cases. The conclusion underscores the significance of the proposed ranking method as an alternative approach for ranking IVTrIFSs, highlighting its alignment with certain existing methods and its advantages over others.
  7. An Empirical Evaluation of ResNet-SE-16 for Accurate Classification of Lung Cancer Using Histopathological Images

    P. Vishal, D. Kishore Kalyan Kumar, K. Venu Kiran Raju, K. Jayalaxmi Manojna, Mohan Mahanty
    This chapter explores the development and evaluation of an enhanced ResNet-SE-16 model for classifying lung cancer subtypes using histopathological images. The study focuses on improving computational efficiency while maintaining high accuracy. Key topics include the model's architecture, data acquisition and augmentation, training and testing procedures, and performance metrics. The model achieves 97% accuracy, outperforming other models in terms of F1 score, precision, recall, and accuracy. The integration of Squeeze-and-Excitation Networks (SENets) with a 16-layer ResNet allows for efficient feature extraction and classification. The model's performance is validated using a confusion matrix, demonstrating its effectiveness in distinguishing between adenocarcinoma, squamous cell carcinoma, and benign tissue. This research highlights the potential of enhanced ResNet models in medical imaging, offering a balance between accuracy and computational efficiency.
  8. Design of EV Battery System Using Grid-Interface Solar PV Power with Novel Adaptive Digital Control Algorithm

    C. Sudhakar, K. Keerthi Reddy, D. Gopal Krishna, P. Pavan, N. Sreelatha, K. Rohini
    This chapter delves into the integration of solar photovoltaic (PV) power with electric vehicle battery (EVB) systems, focusing on grid stability and efficiency. The text explores the use of a novel adaptive digital control algorithm to optimize power quality and system performance. Key topics include the implementation of a single-stage converter design, which reduces costs and increases efficiency, and the application of a perturb and observe (P&O) method for maximum power point tracking (MPPT). The chapter also discusses the challenges of integrating renewable energy sources with the grid, such as harmonics injection and voltage fluctuations, and presents solutions to mitigate these issues. Furthermore, the text examines the role of battery storage in managing the intermittent nature of solar PV power and enhancing grid stability. The conclusion highlights the successful implementation of the adaptive recursive digital filter control technique, demonstrating improved power quality and dynamic performance under varying conditions.
  9. A Decentralized and Intelligent Approach for Suspicious Event Detection in Surveillance Range

    K. U. V. Padma, E. Neelima
    This chapter delves into the integration of blockchain technology and the Inter-Planetary File System (IPFS) to create a decentralized and intelligent approach for suspicious event detection in surveillance systems. The paper explores the use of smart contracts for access control and the implementation of a certificate authority to monitor user behavior, enhancing data security and mitigating risks of unauthorized access or data manipulation. The system framework involves two primary entities: the Data Owner Group (DOG) and the Data User Group (DUG), with the smart contract deployed on the blockchain to facilitate secure data sharing. The paper also discusses the advantages of using IPFS for decentralized storage, including reduced bandwidth requirements and the ability to host websites. Furthermore, the chapter provides a comprehensive literature survey, highlighting the applications of blockchain technology in various industries and the advantages of decentralized storage systems. The conclusion emphasizes the practicality of storing encrypted files on IPFS due to blockchain's limitations in handling large data sets, and the use of smart contracts for verifiability and ensuring service fees are only deducted upon achieving the desired result.
  10. Image Selection for Graphical Password Authentication

    P. Anjaneyulu, D. Priyanka, T. Chalapathi, B. Samanvi, B. Mounika
    This chapter delves into the world of graphical password authentication, presenting it as a compelling alternative to traditional alphanumeric passwords. The text explores the limitations of conventional password systems, including their vulnerability to brute force attacks and the challenges users face in remembering complex passwords. It introduces graphical passwords as a solution that leverages the human ability to recognize and remember images, offering enhanced security and usability. The chapter discusses various graphical password techniques, such as recognition-based and recall-based approaches, and provides a comprehensive survey of existing methods. It also outlines the implementation of a graphical password system using Django, including user registration, image selection, and login processes. The text highlights the advantages of graphical passwords, such as increased security, ease of use, and reduced risk of password reuse. Additionally, it addresses challenges like user memorability, image set selection, and system performance. The chapter concludes with a practical example of a graphical password authentication system for web-based applications, demonstrating the potential of this innovative approach in enhancing user authentication security.
  11. Soft Computing for Visual Recognition Through Audio for the Visually Impaired

    S. R. K. L. Amulya, Vishakha Singh, Tummalapalli Sandeep, Surya Sasidhar, Rita Roy
    This chapter delves into the application of soft computing techniques for visual recognition through audio to assist the visually impaired. The study evaluates various machine learning models, including Convolutional Neural Networks (CNNs) and Recurrent Neural Networks (RNNs), to enhance mobility and independence for individuals with visual impairments. The research focuses on the use of CNNs for feature extraction and RNNs for generating descriptive captions, which are then converted to audio output. The study compares different CNN models, such as VGG16, ResNet, InceptionNet, XceptionNet, and MobileNet, in combination with GRU, a variant of RNN, to determine the most effective approach. The results indicate that the XceptionNet-GRU model achieved the highest BLEU score of 0.86, demonstrating its superior performance in generating accurate and descriptive captions. The chapter also discusses the practical applications of these models in real-world scenarios, highlighting their potential to improve the quality of life for visually impaired individuals. The study concludes by suggesting future investigations to enhance the system's capabilities, such as using larger datasets and real-time image descriptions.
  12. Diet Meal Plan Chatbot

    Saubhagya Jung Karki, Sarthak Pokhrel, Saugat Chand Thakuri, Anupam Pandey Chhetry, Yashpal Singh
    This chapter delves into the transformative potential of AI-powered chatbots in personalized diet planning and weight management. It covers the integration of Natural Language Processing (NLP) and machine learning algorithms to create tailored meal plans based on user-specific data such as BMI, BMR, and dietary preferences. The chapter also explores the technical architecture of the chatbot, including the use of feedforward neural networks, encoder-decoder models, and stochastic gradient descent for intent classification and response generation. Additionally, it discusses the importance of user feedback and the chatbot's ability to adapt and improve over time. The chapter concludes with a comparison of the proposed chatbot with existing solutions, highlighting its unique features and advantages. By reading this chapter, professionals will gain insights into the latest advancements in AI technology and its practical applications in health and fitness.
  13. Convolution Neural Networks

    K. Bhagyalaxmi, B. Dwarakanath
    This chapter explores the application of convolutional neural networks (CNNs) for the automated detection and classification of brain tumors from MRI images. The study focuses on the challenges of manual tumor detection, the role of deep learning in medical imaging, and the implementation of a VGG-19-based transfer learning approach. Key topics include the variability in tumor regions, a literature review of existing methods, and the methodology behind image recognition and CNN architecture. The implementation details cover dataset sources, data preprocessing, and the training procedure using the VGG-19 model. Results demonstrate an impressive accuracy of 84.31% on the validation set and 98.75% on the training set, with classification metrics and confusion matrices provided for different tumor types. The conclusion highlights the superior performance of the VGG-19 architecture and suggests future directions for improving accuracy and expanding the model's applications.
  14. Segmenting MRI Images Using Federated Learning for Brain Tumor Detection

    T. L. Akshaya, K. Swetha, S. Pravalika, U. Chandrasekhar
    This chapter delves into the application of federated learning for segmenting MRI images to detect brain tumors, a critical task given the rising prevalence of brain tumors worldwide. The study focuses on two advanced deep learning models, U-Net and DeepLabV3, and evaluates their performance in a federated learning setup. The BraTS2020 dataset, known for its high-quality MRI scans and detailed annotations, serves as the foundation for this research. The paper explores various federated learning strategies, including different initial weight loading methods and weight averaging techniques, to optimize model performance while preserving data privacy. The results indicate that federated learning can achieve high accuracy in MRI image segmentation, with U-Net showing promising results in predicting segmented mask images. The study also discusses the legal and ethical implications of handling medical imaging data, highlighting the importance of adhering to data usage policies and regulations. Additionally, the chapter suggests future research directions, such as leveraging metadata for tumor type prediction and implementing advanced security techniques during data sharing. This comprehensive analysis provides valuable insights into the potential of federated learning in medical imaging, offering a balanced approach to improving diagnostic accuracy while safeguarding patient privacy.
  15. Comparative Analysis of Fuzzy Regular Graph Properties

    Nagadurga Sathavalli, Tejaswini Pradhan
    This chapter delves into the fascinating world of fuzzy regular graphs, presenting a comparative analysis of their properties. It begins by defining fuzzy graphs and exploring the concepts of regularity and total-degree in these graphs. The text provides a necessary and sufficient condition for the equality of regular and completely regular fuzzy graphs, supported by various examples. It also investigates the properties of regular fuzzy graphs with a cycle as the underlying crisp graph. Additionally, the chapter discusses the vertex degree in different fuzzy graph products and operations, such as union, join, Cartesian product, composition, and conjunction. The analysis is further enriched by exploring fuzzy rule extraction and fuzzy composition. The chapter concludes with a discussion on the union of fuzzy sets and the properties of complete regular fuzzy graphs, providing a comprehensive overview of the topic.
  16. Effective Cloud Data Management by Using AES Encryption and Decryption

    Dogga Aswani, D. Jaya Kumari, Alluri Neethika, G. Sujatha, Praveen Kumar Karri, Sowmya Sree Karri
    This chapter delves into the critical aspects of cloud data security, focusing on the implementation of the Advanced Encryption Standard (AES) algorithm. It highlights the vulnerabilities of the older Data Encryption Standard (DES) and demonstrates why AES is a superior choice for protecting sensitive data in cloud environments. The text provides a comprehensive overview of the AES encryption and decryption processes, including key expansion, substitution, permutation, and round key addition. It also discusses the experimental setup using Java and a hybrid cloud server, showcasing the performance benefits of AES over DES. The chapter concludes with a user-friendly interface for file encryption and decryption, emphasizing the practical applications of AES in real-world scenarios. Readers will gain insights into the step-by-step procedures of AES implementation, the advantages of using larger key sizes, and the importance of continuous security monitoring in cloud environments.
  17. Prediction of Angina Pectoris

    D. Dakshayani Himabindu, Raswitha Bandi, Keesara Sravanthi, V. Sai Vandana, G. Uday Bhaskar
    This chapter delves into the prediction of angina pectoris, a critical symptom of coronary heart disease, using machine learning techniques. The study explores the potential of replacing traditional diagnostic methods, such as ECG and MRI tests, with a more efficient, digital solution. The research investigates various machine learning algorithms, including logistic regression, support vector machines, random forest, and XGBoost, to identify the most effective method for predicting angina. The study achieves an impressive accuracy rate of 94% using the random forest algorithm. The chapter also discusses the implementation of a chatbot-like platform to provide a user-friendly interface for patients. The research highlights the importance of early detection and the potential of machine learning in improving healthcare outcomes. The study concludes with a discussion on the future scope of the project, including the integration of additional diseases and personalized nutrition recommendations.
  18. A Novel Web Attack Recognition System for IOT via Ensemble Classification

    Preethi Bitra, Kandukuri Rekha Sai Kumar
    This chapter delves into the critical need for advanced security measures in IoT devices, focusing on the development of a novel web attack recognition system. The study explores the limitations of existing systems and proposes an ensemble classification model to enhance accuracy and efficiency in detecting fraudulent activities. Key topics include a literature survey of relevant research, an overview of the proposed system, and a detailed analysis of the dataset used for testing. The chapter also compares the performance of various machine learning models, such as SVM, Decision Trees, and Random Forest, with the Random Forest model emerging as the most effective. The experimental results demonstrate the system's high accuracy and efficiency, making it a promising solution for securing IoT devices against web attacks. By integrating multiple machine learning techniques, the proposed system offers a robust framework for continuous user identification and fraud detection, paving the way for more secure IoT environments.
Next
  • current Page 1
  • 2
Title
Advances in Machine Learning and Big Data Analytics II
Editors
Ashokkumar Patel
Nishtha Kesswani
Bosubabu Sambana
Copyright Year
2025
Electronic ISBN
978-3-031-51342-8
Print ISBN
978-3-031-51341-1
DOI
https://doi.org/10.1007/978-3-031-51342-8

PDF files of this book have been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com.

Premium Partner

    Image Credits
    Neuer Inhalt/© ITandMEDIA, Nagarro GmbH/© Nagarro GmbH, AvePoint Deutschland GmbH/© AvePoint Deutschland GmbH, AFB Gemeinnützige GmbH/© AFB Gemeinnützige GmbH, USU GmbH/© USU GmbH, Ferrari electronic AG/© Ferrari electronic AG