Data Science and Intelligent Applications: Proceedings of ICDSIA 2020Ketan Kotecha, Vincenzo Piuri, Hetalkumar N. Shah, Rajan Patel This book includes selected papers from the International Conference on Data Science and Intelligent Applications (ICDSIA 2020), hosted by Gandhinagar Institute of Technology (GIT), Gujarat, India, on January 24–25, 2020. The proceedings present original and high-quality contributions on theory and practice concerning emerging technologies in the areas of data science and intelligent applications. The conference provides a forum for researchers from academia and industry to present and share their ideas, views and results, while also helping them approach the challenges of technological advancements from different viewpoints. The contributions cover a broad range of topics, including: collective intelligence, intelligent systems, IoT, fuzzy systems, Bayesian networks, ant colony optimization, data privacy and security, data mining, data warehousing, big data analytics, cloud computing, natural language processing, swarm intelligence, speech processing, machine learning and deep learning, and intelligent applications and systems. Helping strengthen the links between academia and industry, the book offers a valuable resource for instructors, students, industry practitioners, engineers, managers, researchers, and scientists alike.
|
Contents
1 | |
13 | |
23 | |
The Lottery DApp with Verifiable Randomness | 32 |
Review of Machine Learning and Data Mining Methods to Predict Different Cyberattacks | 43 |
A Survey | 52 |
Features and Challenges | 63 |
A Comparative Study of Classification Techniques in Context of Microblogs Posted During Natural Disaster | 75 |
Proactive Approach of Effective Placement of VM in Cloud Computing | 295 |
BlockchainBased Intelligent Transportation System with Priority Scheduling | 310 |
Survey Paper on Automatic Vehicle Accident Detection and Rescue System | 319 |
A Review | 325 |
Experimental Analysis of Measuring Neighbourhood Change in the Presence of Wormhole in Mobile Wireless Sensor Networks | 338 |
Review of Blockchain Technology to Address Various Security Issues in Cloud Computing | 345 |
Comparative Analysis of Statistical Methods for Vehicle Detection in the Application of ITS for Monitoring Traffic and Road Accidents Using IoT | 355 |
An Extensive Survey on Consensus Mechanisms for Blockchain Technology | 363 |
Trends and Challenges | 82 |
Big Data Mining on Rainfall Data | 99 |
An Application of Machine Learning in Agriculture Sector | 105 |
Sentiment Analysis of Regional Languages Written in Roman Script on Social Media | 113 |
Inductive LearningBased SPARQL Query Optimization | 120 |
Impact of Information Technology on JobRelated Factors | 137 |
A Study on Preferences and Mind Mapping of Customers Toward Various Ice Cream Brands in Ahmedabad City | 145 |
A Review on Big Data with Data Mining | 154 |
Big Data and Its Application in Healthcare and Medical Field | 161 |
WMDeepConvNets Windmill Detection Using Deep Learning from Satellite Images | 167 |
Quality Grading Classification of Dry Chilies Using Neural Network | 175 |
Email Classification TechniquesA Review | 180 |
A Novel Approach for Credit Card Fraud Detection Through Deep Learning | 191 |
The Art of Character Recognition Using Artificial Intelligence | 201 |
A Survey | 208 |
A Survey | 217 |
A BirdsEye View | 224 |
Intrusion Detection System Using Semisupervised Machine Learning | 233 |
Fuzzy Logic based Light Control Systems for Heterogeneous Traffic and Prospectus in Ahmedabad India | 239 |
A Survey on Machine Learning and Deep Learning Based Approaches for Sarcasm Identification in Social Media | 247 |
A Machine Learning Algorithm to Predict Financial Investment | 260 |
Prospect in Mechanical Engineering FieldA Review | 267 |
Genetic Algorithm Based Task Scheduling for Load Balancing in Cloud | 283 |
Measuring IoT Security Issues and Control Home Lighting System by Android Application Using Arduino Uno and HC05 Bluetooth Module | 375 |
Advanced 3Bit LSB Based on Data Hiding Using Steganography | 383 |
Improving Energy Efficiency and Minimizing ServiceLevel Agreement Violation in Mobile Cloud Computing Environment | 391 |
Access Control Mechanism for Cloud Data Using Block Chain and Proxy ReEncryption | 398 |
Privy CloudWeb Server | 407 |
Fault Tolerance in Cloud and Fog ComputingA Holistic View | 415 |
Automating Container Deployments Using CICD | 423 |
Fault Tolerance and Detection in Wireless Sensor Networks | 430 |
Design of Framework for Disaster Recovery in Cloud Computing | 439 |
Lightweight VehicletoInfrastructure Message Verification Method for VANET | 450 |
Security and Performance Evaluations of QUIC Protocol | 457 |
Biometric Fingerprint Recognition Using Minutiae Score Matching | 463 |
Automatic Traffic Fine Generation Using Deep Learning | 479 |
Comparative Survey of Digital Image Steganography Spatial Domain Techniques | 491 |
WSNBased Driver Cabinet Monitoring System for the Fleet of LongRoute Vehicles | 498 |
An Approach for PrivacyEnhancing Actions Using Cryptography for Facial Recognition on Database | 509 |
Inherent Mapping Analysis of Agile Development Methodology Through Design Thinking | 527 |
Semantic Enrichment Tool for Implementing Learning Mechanism for Trend Analysis | 535 |
Fingerprint Image Classification | 545 |
Automatic Evaluation of Analog Circuit Designs | 553 |
A Review on Basic Deep Learning Technologies and Applications | 564 |
Author Index | 574 |