Skip to main content
Top

International Conference on Innovative Computing and Communications

Proceedings of ICICC 2022, Volume 3

  • 2023
  • Book

About this book

This book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 19–20, 2022. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.

Table of Contents

Next
  • 1
  • 2
  • current Page 3
  • 4
Previous
  1. Multilingual Emotion Analysis from Speech

    Poonam Rani, Astha Tripathi, Mohd Shoaib, Sourabh Yadav, Mohit Yadav
    The chapter delves into the critical area of speech emotion recognition (SER), highlighting the need for multilingual systems to accurately detect emotions such as anger, anxiety, and happiness from speech signals. It reviews existing models and methods, including bi-directional LSTM networks and ensemble approaches. The authors introduce a novel multichannel CNN architecture that significantly enhances the accuracy and efficiency of emotion detection across multiple languages. The proposed model utilizes features such as Mel Frequency Cepstral Coefficients and embeddings from the Roberta language model, processed through a multi-layer perceptron with SoftMax activation. The chapter also discusses the managerial and social implications of effective emotion recognition, such as improving psychotherapy consultations and personalized recommendation systems. The study concludes with a detailed evaluation of the proposed model, demonstrating its superior performance and potential for real-world applications.
  2. Analysis on Detection of Brain Tumor Using CS and NB Classifier

    Damandeep Kaur, Surender Singh, Kavita
    The chapter presents a novel approach for detecting brain tumors using a combination of Contrast Limited Adaptive Histogram Equalization (CLAHE), Independent Component Analysis (ICA), and a cuckoo search-based optimization technique. The method is evaluated using the DICOM dataset, which is widely used in medical imaging. The study compares the performance of the proposed method with other classifiers such as KNN, ANFIS, and back propagation, demonstrating superior accuracy and efficiency. The chapter also discusses the preprocessing steps, feature extraction, and classification process, providing a detailed analysis of the results and future research directions.
  3. Full Connectivity Driven K-LEACH Algorithm for Efficient Data Forwarding in Wireless Sensor Networks

    Ahmed Ashraf Afify, Catherine Nayer Tadros, Korhan Cengiz, Bassem Mokhtar
    The chapter discusses the challenges of energy consumption in Wireless Sensor Networks (WSN) and introduces the Full Connectivity Driven K-LEACH (FCDK-LEACH) algorithm as a solution. The FCDK-LEACH algorithm builds upon the K-LEACH protocol, enhancing its efficiency by using a new cluster-head selection criterion and an energy consumption model. The algorithm aims to maintain network connectivity for as long as possible by preserving cluster-heads until the last active node dies out. Simulation results demonstrate that the FCDK-LEACH algorithm outperforms the classical K-LEACH in terms of network lifetime, making it a promising approach for applications requiring long operational periods, such as healthcare monitoring.
  4. Detection of Potential Vulnerable Patients Using Oximeter

    Navjyot Kaur, Rajiv Kumar
    The chapter discusses the innovative use of mobile phones equipped with sensors for detecting vulnerable patients through oximetry. It introduces Mobile Crowd Sensing (MCS) as a powerful tool for healthcare monitoring, detailing its benefits over traditional sensing networks. The text explores the various scales of MCS, from individual to community sensing, and highlights its applications in environmental, infrastructure, and health monitoring. Challenges such as energy consumption, data costs, and incentive schemes are addressed, along with a proposed method for automated data collection and analysis. The chapter concludes with a look at the future scope of this technology in healthcare, making it a compelling read for professionals interested in the intersection of healthcare and technology.
  5. A Novel Review on Healthcare Data Encryption Techniques

    Gaurav Narula, Bhanuj Gandhi, Hitakshi Sharma, Shreya Gupta, Dharmender Saini, Preeti Nagrath
    The chapter 'A Novel Review on Healthcare Data Encryption Techniques' delves into the critical role of encryption in safeguarding sensitive healthcare data. It begins by emphasizing the necessity of encryption for protecting patient information and complying with regulations like HIPAA. The authors explore various encryption algorithms, including AES, DES, 3DES, and Blowfish, assessing their security and performance. The review also highlights the challenges posed by high-profile data breaches and the need for advanced encryption methods. Additionally, the chapter discusses innovative approaches such as image cryptography and chaotic structures in public-key cryptography. A comparative analysis of these algorithms is presented, identifying gaps in current methods and suggesting areas for improvement. The chapter concludes by underscoring the urgent need for encryption algorithms that are both fast and secure, especially in the face of emerging quantum computing threats. This comprehensive review offers valuable insights for professionals seeking to enhance data security in the healthcare sector.
  6. Profile-Based Calibration for AR/VR Glass

    S. Vijayalakshmi, K. R. Kavitha, S. M. Subhash, D. Sujith Kumar, S. V. Sharveshvarr, P. Bharathi
    This chapter delves into the innovative design of AR/VR glasses that incorporate profile-based calibration for an enhanced user experience. The glasses utilize Android or Fuchsia operating systems to ensure ease of use and security. Key features include automatic map updates via Wi-Fi, customizable settings through a smartphone app, and precise navigation using augmented reality. The power adjustment of the glasses is automated by fetching user data from cloud accounts or Bluetooth, ensuring comfortable and accurate vision. The chapter also discusses the use of dedicated hardware for efficient task processing and linear actuators for dynamic power adjustments. Additionally, it explores potential future enhancements such as health and fitness tracking, emergency SOS features, and improved battery technology. The development process is meticulously outlined, from user registration and face recognition to the final power adjustment setup. The chapter concludes with user testing results and suggestions for future improvements, making it a valuable resource for professionals interested in the intersection of technology and eyewear.
  7. Performance Analysis of Data Sharing Using Blockchain Technology in IoT Security Issues

    R. Ganesh Babu, S. Yuvaraj, M. Muthu Manjula, S. Kaviyapriya, R. Harini
    The chapter begins by introducing the Internet of Things (IoT) and its potential security issues due to the vast amounts of data generated. It then delves into the application of blockchain technology in addressing these security concerns, emphasizing the benefits of decentralization, anonymity, and privacy protection. However, the chapter also acknowledges the challenges of integrating blockchain with IoT, such as the resource constraints of IoT devices and the inefficiency of blockchain scaling. The main contribution of the chapter is the proposal of a new cryptocurrency engineering solution for IoT that retains the advantages of blockchain while overcoming these challenges. The proposed solution is illustrated through a smart home example and is designed to be application-agnostic, suitable for various IoT use cases. The chapter also includes a literature survey of existing IoT security measures and a performance analysis of the proposed blockchain algorithm. Throughout the chapter, the authors highlight the need for secure and efficient data sharing in IoT and demonstrate how their proposed solution can address this need.
  8. GreenFarm: An IoT-Based Sustainable Agriculture with Automated Lighting System

    Diganta Dey, Najmus Sakib Sizan, Md. Solaiman Mia
    The chapter 'GreenFarm: An IoT-Based Sustainable Agriculture with Automated Lighting System' delves into the application of IoT in modern farming practices to address the growing demand for food due to population increase. It presents a model named GreenFarm, which consists of two main sections: Sensor-Based Farming and Automatic Lighting System. The Sensor-Based Farming section utilizes various sensors to monitor soil moisture, temperature, humidity, and detect external movements and rainfall. The Automatic Lighting System ensures optimal lighting conditions for crops, crucial for their growth. The chapter also discusses the implementation of these systems, highlighting their efficiency and cost-effectiveness compared to existing models. By integrating solar panels and automated controls, GreenFarm offers a sustainable and eco-friendly solution to the challenges faced by the agriculture industry.
  9. A Survey of Different Supervised Learning-Based Classification Models for Student’s Academic Performance Prediction

    Sandeep Kumar, Ritu Sachdeva
    This chapter delves into the critical area of educational data mining, specifically focusing on the prediction of student academic performance using supervised learning-based classification models. It begins by introducing the importance of student performance prediction (SPP) in various educational scenarios, such as learner data analysis and curriculum planning. The chapter then surveys several existing techniques of SPP, including data fusion approaches, neural networks, and machine learning models. It discusses the applications of these models in enhancing student outcomes, aiding instructors in course design, and providing valuable insights to educational administrators. The comparative analysis of different SPP models highlights their strengths and weaknesses, with a particular emphasis on the superior performance of certain methods like naïve Bayes. Additionally, the chapter explores the theoretical underpinnings and future directions of these models, suggesting potential advancements in feature extraction and prediction accuracy. By offering a comprehensive overview of the current state and future prospects of SPP models, this chapter serves as an invaluable resource for professionals seeking to leverage data-driven approaches in educational settings.
  10. An Exploration of Machine Learning and Deep Learning Techniques for Offensive Text Detection in Social Media—A Systematic Review

    Geetanjali Sharma, Gursimran Singh Brar, Pahuldeep Singh, Nitish Gupta, Nidhi Kalra, Anshu Parashar
    This chapter systematically reviews machine learning and deep learning techniques for detecting offensive text in social media, addressing the rising issue of abusive language online. It examines various machine learning models, such as Naive Bayes, SVM, and decision trees, and explores deep learning approaches like CNN and RNN. The chapter also delves into available datasets and highlights the challenges and future prospects in this domain. By offering an in-depth analysis of existing methods and a critical evaluation of their effectiveness, this chapter aims to guide researchers and practitioners in developing more accurate and efficient offensive text detection systems.
  11. Voice Synthesizer for Partially Paralyzed Patients

    Eldho Paul, K. Ritheesh Kumar, K. U. Prethi
    The chapter delves into the creation of a voice synthesizer model designed to retain the original voice of partially paralyzed patients. It addresses the complexities of vocal cord paralysis and the need for efficient voice synthesis. The model employs an orator-selective embedding network to capture speaker-specific traits, followed by training a high-quality Text-to-Speech (TTS) model on a smaller dataset. This approach decouples the networks, allowing each to be trained independently, reducing the need for extensive multi-speaker datasets. The model is evaluated on datasets like VCTK and Libri Speech, demonstrating high naturalness scores. The proposed method shows promise in generating natural and personalized voices for both seen and unseen speakers, making it a significant advancement in the field of voice synthesis for medical applications.
  12. An Ensemble BERT CHEM DDI for Prediction of Side Effects in Drug–Drug Interactions

    Alpha Vijayan, B. S. Chandrasekar
    The chapter introduces an innovative ensemble BERT model, BERT CHEM DDI, designed to predict side effects in drug–drug interactions. It utilizes pre-trained BERT models and XG Boost algorithms to classify drug sequences and their interactions. The model outperforms existing methods by an average of 3% across various metrics, showcasing its superior accuracy and reliability. The research involves extensive data extraction from PUB CHEM and meticulous pre-processing techniques, including tokenization and padding. Hyperparameter tuning through grid search cross-validation further enhances the model's performance. The chapter concludes by highlighting the importance of addressing drug–drug interactions in healthcare and suggests future directions for further improvement.
  13. Hybrid Approach for Path Discovery in VANETs

    Sharad Chauhan, Gurpreet Singh
    This chapter delves into the intricacies of Vehicular Ad Hoc Networks (VANETs), highlighting their self-organized and autonomous nature. It discusses the critical role of VANETs in ensuring road safety through wireless communication and real-time information sharing among vehicles. The chapter provides a comprehensive overview of the various routing protocols used in VANETs, categorizing them into proactive, reactive, and position-based routing. It also introduces innovative routing algorithms such as the Motion Vector Routing Algorithm (MOVE) and Vehicle-Assisted Data Delivery (VADD) protocol. The proposed methodologies focus on optimizing route lifetime and stability by considering the direction of vehicle movement and the duration of node presence in the network. The chapter concludes with a detailed simulation and results section, demonstrating the improved performance of the proposed methods in terms of packet loss and throughput. The research offers valuable insights into enhancing the efficiency and reliability of VANETs, making it a must-read for professionals in the field.
  14. Voice Emotion Detection: Acoustic Features Extraction Using Multi-layer Perceptron Classifier Algorithm

    Nikhil Sai Jaddu, S. R. S. Shashank, A. Suresh
    The chapter focuses on voice emotion detection through acoustic feature extraction using a Multi-layer Perceptron (MLP) classifier algorithm. It introduces the challenges and importance of recognizing emotions in speech signals for human-machine interaction. The proposed method improves upon existing systems by enhancing data accuracy and stability in emotion classification. The MLP algorithm is highlighted for its effectiveness in transforming input dimensions into desired outputs, making it suitable for speech emotion recognition. The chapter also discusses the implementation process, including data preprocessing, feature selection, and classification. Experimental results demonstrate the high accuracy of the MLP classifier in recognizing speaker-dependent and speaker-independent emotions. The conclusion emphasizes the potential of MLP in speech recognition and emotion representation, setting a benchmark for future research in the field.
  15. Link and Coverage Analysis of Millimetre (mm) Wave Propagation for 5G Networks Using Ray Tracing

    Animesh Tripathi, Pradeep Kumar Tiwari, Shiv Prakash, Gaurav Srivastava, Narendra K. Shukla
    The chapter delves into the critical role of millimeter-wave (mm-wave) propagation in meeting the escalating data demands of 5G networks. It highlights the advantages of using the 32 GHz band, such as increased spectral efficiency and stronger directivity. The authors employ ray tracing methods to simulate and analyze the channel characteristics, providing a comprehensive study of received power, angles of departure and arrival, and path range. The research focuses on a dense urban environment, using the University of Allahabad's science faculty as a case study. The findings reveal the limitations of mm-wave signals in penetrating buildings and the importance of beam steering to enhance received power. The chapter concludes with a discussion on the future scope of 5G and 6G networks, emphasizing the need for further research on ray tracing accuracy and the modeling of smaller objects.
  16. Student Attendance Monitoring System Using Facial Recognition

    Reshma B. Wankhade, S. W. Mohod, R. R. Keole, T. R. Mahore, Sagar Dhanraj Pande
    The chapter delves into the development of a student attendance monitoring system using facial recognition technology. It begins by discussing the evolution and applications of facial recognition, from detecting frauds to aiding law enforcement. The traditional methods of attendance marking are critiqued for their inefficiency and the prevalence of proxy attendance. The chapter then introduces a novel secured framework for attendance monitoring, utilizing facial landmark algorithms for detection and verification. The proposed system automates attendance during class hours, exams, and other activities, significantly reducing manual effort. The implementation details, system architecture, and results analysis are thoroughly discussed, showcasing the system's efficiency and potential for future enhancements with advanced algorithms like YOLO.
  17. Credit Card Fraud Detection Using Various Machine Learning and Deep Learning Approaches

    Ashvini S. Gorte, S. W. Mohod, R. R. Keole, T. R. Mahore, Sagar Pande
    This chapter delves into the critical issue of credit card fraud, which has become increasingly prevalent with the widespread use of credit cards. Traditional methods for detecting fraud have proven inadequate, leading to the development of advanced machine learning and deep learning approaches. The chapter examines various algorithms such as Naive Bayes, Support Vector Machines (SVM), Artificial Neural Networks, Decision Trees, Random Forest, Deep Neural Networks, and Logistic Regression, evaluating their accuracy and efficiency in detecting fraudulent activities. A hybrid model combining multiple algorithms is proposed to enhance detection capabilities. The chapter also discusses the importance of dataset selection and preprocessing, as well as the challenges in training models to achieve high accuracy. The results and analysis section highlights the superior performance of deep neural networks compared to other algorithms. The conclusion outlines the future scope of these systems, suggesting the use of optimization techniques and advanced deep learning algorithms for further improvement.
  18. Forest Fire Detection and Prevention System

    K. R. Kavitha, S. Vijayalakshmi, B. Murali Babu, D. Rini Roshan, K. Kalaivani
    The chapter delves into the critical issue of forest fire detection and prevention, emphasizing the need for advanced systems in modern industrialized societies. It introduces a sophisticated Forest Fire Detection and Prevention System that integrates multiple sensors, including temperature, humidity, LDR, ultrasonic, and accelerometer sensors, with Arduino UNO. The system is designed to detect abnormal conditions such as increased temperature, smoke, or unusual moisture levels, triggering immediate alerts via GSM modules. The chapter highlights the use of machine learning techniques to enhance detection accuracy and prevent false positives. Additionally, it presents a detailed block diagram and working principle of the system, showcasing its potential to reduce catastrophic fire events and protect natural resources.
Next
  • 1
  • 2
  • current Page 3
  • 4
Previous
Title
International Conference on Innovative Computing and Communications
Editors
Deepak Gupta
Ashish Khanna
Aboul Ella Hassanien
Sameer Anand
Ajay Jaiswal
Copyright Year
2023
Publisher
Springer Nature Singapore
Electronic ISBN
978-981-19-3679-1
Print ISBN
978-981-19-3678-4
DOI
https://doi.org/10.1007/978-981-19-3679-1

Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.