48
2021 Organized by Jahangirnagar University, Bangladesh and South Asian University, India Technically Sponsored by Soft Computing Research Society October 23-24, 2021 5th International Joint Conference on Advances in Computational Intelligence (IJCACI 2021) Souvenir

5th International Joint Conference on Advances in

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

2021

Organized by

Jahangirnagar University,

Bangladesh and South

Asian University, India

Technically Sponsored by

Soft Computing Research

Society

October 23-24, 2021

5th International Joint Conference

on Advances in Computational

Intelligence (IJCACI 2021)

Souvenir

ii

TABLE OF CONTENTS

Patron ............................................................................................................................... 1

General Chair ................................................................................................................... 1

Program Chair .................................................................................................................. 1

Publicity Chair ................................................................................................................. 1

Publication Committee ..................................................................................................... 2

Technical Program Committee ........................................................................................ 2

Advisory Board ................................................................................................................ 3

Abstract of Accepted Papers ............................................................................................ 8

Performance Analysis of Secure Hybrid Approach for Sharing Data Securely in

Vehicular Adhoc Network ............................................................................................... 9

A Review on Curvelets and Its Applications ................................................................... 9

Machine Learning Approaches for handling SQL Injection Attack .............................. 10

Assessing Usability of Mobile Applications Developed for Autistic Users through

Heuristic and Semiotic Evaluation ................................................................................. 10

Blockchain Implementations and Use Cases for Inhibiting COVID-19 Pandemic ....... 11

Random Forest based Legal Prediction System ............................................................. 11

Particle swarm optimization and computational algorithm based weighted fuzzy time

series forecasting method ............................................................................................... 12

Ant Colony Optimization to Solve the Rescue Problem as a Vehicle Routing Problem

with Hard Time Windows .............................................................................................. 12

Applying Opinion Leaders to Investigate the Best-of-n Decision Problem in

Decentralized Systems ................................................................................................... 13

Pathfinding in the Paparazzi Problem Comparing Different Distance Measures .......... 14

Empirical Evaluation of Motion Cue for Passive-Blind Video Tamper Detection Using

Optical Flow Technique ................................................................................................. 14

iii

Quantifying Changes in Sundarbans Mangrove Forest Through GEE Cloud Computing

Approach ........................................................................................................................ 15

Metaheuristics and Hyper-heuristics based on Evolutionary Algorithms for Software

Integration Testing ......................................................................................................... 16

Towards a static and dynamic features-based framework for android vulnerabilities

detection ......................................................................................................................... 16

A Comparative Study of Existing Knowledge based Techniques for Word Sense

Disambiguation .............................................................................................................. 17

Online Subjective Examination a Student Perspective .................................................. 18

An Insider Threat Detection Model Using One-Hot Encoding and Near-Miss Under-

sampling Techniques ...................................................................................................... 18

Problem Solution Strategy Assessment of a Hybrid Knowledge-Based System in

Teaching and Learning Practice ..................................................................................... 19

Towards Developing a Mobile Application for Detecting Intoxicated People through

Interactive UIs ................................................................................................................ 19

Novel Harris Hawks Optimization and Deep Neural Network Approach for Intrusion

Detection ........................................................................................................................ 20

Random forest classification and regression models for literacy data ........................... 21

Towards Robotic Knee Arthroscopy: Spatial and Spectral Learning Model for Surgical

Scene Segmentation ....................................................................................................... 21

Opposition-based Arithmetic Optimization Algorithm with Varying Acceleration

Coefficient for Function Optimization and Control of FES System .............................. 22

The Impact of Using Facebook on the Social Life of College Students ........................ 23

Power control of a Grid Connected Hybrid Fuel cell, Solar and Wind Energy Conversion

Systems by using Fuzzy MPPT Technique .................................................................... 23

Stabilizing Constrained Control for Discrete-Time Multivariable Linear Systems via

Positive Polyhedral Invariant Sets ................................................................................. 24

iv

Texture Feature Analysis for Inter-Frame Video Tampering Detection ........................ 24

Computer Vision-Based Algorithms on Zebra Crossing Navigation ............................ 25

Spider Monkey Optimization (SMO) algorithm based Innovative strategy for

strengthening of Reliability Indicators of Radial Electrical System .............................. 25

AI Based Multi Label Data Classification of social media ............................................ 26

Performance Analysis of Random Forest (RF) and Support Vector Machine (SVM)

algorithms in classifying Breast Cancer ......................................................................... 26

Prediction of Water Quality Index of Ground Water Using the Artificial Neural Network

and Genetic Algorithm ................................................................................................... 27

Improving Throttled Load Balancing Algorithm in Cloud Computing ........................ 28

Feature Extraction Based Landmine Detection Using Fuzzy Logic .............................. 28

IOT based Smart Parking System using NodeMCU and Arduino ................................. 29

Study on Intelligent Tutoring System for Learner Assessment Modeling Based on

Bayesian Network .......................................................................................................... 29

Finite Element Analysis of Prosthetic Hip Implant ....................................................... 30

A Comprehensive Study on Multi Document Text Summarization for Bengali Language

........................................................................................................................................ 31

Deep Learning-Based Lentil Leaf Disease Classification ............................................. 31

Framework for Diabetes Prediction using Machine Learning Techniques through Swarm

Intelligence ..................................................................................................................... 32

A Graphical Approach for Image Retrieval Based on Five Layered CNNs Model ....... 32

Statistical Post-processing Approaches for OCR Texts ................................................. 33

FPGA Implementation of Masked-AE$HA-2 for Digital Signature Application ......... 34

A Framework for Improving the Accuracy With Different Sampling Techniques for

Detection of Malicious Insider Threat in Cloud ............................................................ 34

v

Eliminating racial bias at the time of detection Melanoma using Convolution Neural

Network (CNN) .............................................................................................................. 35

Customer Churn Analysis using Machine Learning ...................................................... 35

A Comparative Study of Hyperparameter Optimization Techniques for Deep Learning

........................................................................................................................................ 36

Fault Location on Transmission Lines of Power Systems with Integrated Solar

Photovoltaic Power Sources ........................................................................................... 37

Emergency Vehicle Detection Using Deep Convolutional Neural Network ................. 37

Emotion Recognition from Speech using Deep Learning ............................................. 38

Secure predictive analysis on heart diseases using partially homomorphic machine

learning model ................................................................................................................ 38

Quality Analysis of PATHAO Ride-sharing Service in Bangladesh ............................. 39

Robot Path Planning using β Hill Climbing Grey Wolf Optimizer ............................... 39

An Image Steganography Technique based on Fake DNA Sequence Construction ..... 40

Artificial Intelligent Based Control of Improved Converter for Hybrid Renewable Energy

Systems .......................................................................................................................... 40

A Review on Unbalanced Data Classification ............................................................... 41

A Comparative Study of Meta-heuristic Algorithms based on the solution of VRPTW in

E-logistics ....................................................................................................................... 42

1

Patron

R. K. Mohanty, President (Acting), South Asian University, India

Farzana Islam, Vice Chancellor, Jahangirnagar University (JU),

Bangladesh

General Chair

Mohammad Shorif Uddin, Jahangirnagar University, Bangladesh

Jagdish Chand Bansal, South Asian University Delhi, India

Prashant Jamwal, Nazarbayev University, Kazakhstan

Program Chair

Akhil Ranjan Garg, Jai Narain Vyas University, Jodhpur, India

Deepa Sinha, South Asian University, New Delhi, India

Kapil Kumar Sharma, South Asian University, New Delhi, India

Mukesh Saraswat, Jaypee Institute of Information Technology, Noida,

India

Sandeep Kumar, CHRIST (Deemed to be University), Bangalore

Publicity Chair

Ashish Kumar Tripathi, Malaviya National Institute of Technology

Jaipur, India

Kusum Kumari Bharti, Indian Institute of Information Technology,

Design and Manufacturing, Jabalpur, India

Prashant Singh Rana, Thapar University, India

Saroj Kumar Sahani, South Asian University, New Delhi, India

2

Publication Committee

Mohammad Shorif Uddin, Jahangirnagar University, Bangladesh

Jagdish Chand Bansal, South Asian University Delhi, India

Sandeep Kumar, CHRIST (Deemed to be University), Bangalore

Prashant Jamwal, Nazarbayev University, Kazakhstan

Technical Program Committee

M. Shamim Kaiser, JU, Bangladesh

Mufti Mahmud, Nottingham Trent University, UK

Md. Imdadul Islam, JU, Bangladesh

Md. Ezharul Islam, JU, Bangladesh

Mohammad Hanif Ali, JU, Bangladesh

J. K. Das, JU, Bangladesh

Mohammad Zahidur Rahman, JU, Bangladesh

Md. Golam Moazzam, JU, Bangladesh

Israt Jahan, JU, Bangladesh

Md. Humayun Kabir, JU, Bangladesh

ASM Mustafizur Rahman, JU, Bangladesh

Md. Abul Kalam Azad, JU, Bangladesh

Md. Musfique Anwar, JU, Bangladesh

Morium Akter, JU, Bangladesh

3

Advisory Board

A K Verma, Western Norway University of Applied Sciences,

Haugesund, Norway

Rajveen Chandel, NIT Hamirpur

Miodrag potkonjak, UCLA ,467 Engineering VI, Los Angeles,

Nilanjan Dey, Techno India College of Technology, India

Neetesh Purohit, IIIT Allahabad

Nishchal K. Verma, Indian Institute of Technology Kanpur, India

Preetam Kumar, IIT, Patna

Nooritawati Md Tahir, University Technology MARA (UiTM), Malaysia

Priti Srinivas Sajja, Sardar Patel University Vallabh Vidyanagar Gujarat

Prena Gaur, NSUT, Dwarka, New Delhi

R. Gangopadhyay, LNMIIT, Jaipur

R. P. Yadav, MNIT Jaipur

Pushpendra Singh, NIT Hamirpur

S. Sundaram, IISc Bangalore

Mohd Muntjir, Taif University, Kingdome of Saudia arabia

Sandeep Sancheti, SRM University, India

Sanjeev Yadav, GWEC, Ajmer

Sanjay Singh, CEERI Pilani

Seemanti Saha, NIT Patna

4

Sanyog Rawat, Manipal University Jaipur

Shashi Shekhar Jha, IIT Ropar

Suneeta Agrawal, Motilal Nehru National Institute of Technology

Allahabad

Sudhir Kumar, IIT Patna

Surajit Kundu, NIT, Sikkim

Sureswaran Ramadass, USM University Penang, Malaysia

Swagatam Das, Indian Statistical Institute, Kolkata, India

Debasish Ghose, IISc Bangalore

Alok Kanti Deb, Indian Institute of Technology Kharagpur

Anand Nayyar, Scientist, Graduate School, Duy Tan University, Da

Nang, Viet Nam

Anand Paul, Kyungpook National University, South Korea

Aniruddha Chandra, NIT Durgapur

Anupam Yadav, National Institute of Technology Jalandhar

Aruna Tiwari, Indian Institute of Technology Indore

Atulya K. Nagar, Liverpool Hope University, UK

Ashvini Chaturvedi, NIT Suratkal

Carlos E. Palau, ETSI Telecommunication, UPV, Camino de Vera, Spain

Costin Badica, University of Craiova, Dolj, Romania

Dan Simon, Cleveland State University USA

Sushmita Das, NIT, Rourkela

5

Deepak Garg, Bennett University, India

Dinesh Goyal, Poornima Institute of Engineering & Technology, Jaipur

Dumitru Baleanu, Cankaya University

K. S. Nisar, Riyadh, Saudi Arabia

Kamran Iqbal, University of Arkansas at Little Rock, Little Rock,

Arkansas, United States

Kusum Deep, Indian Institute of Technology, Roorkee, India

Kuldeep Singh, MNIT, Jaipur

Lalit Lumar Goyal, NTU Nanyang, Singapore

Manoj K. Shukla, Harcourt Butler Technical University, Kanpur

Manoj Thakur, IIT Mandi

Marcin Paprzycki, Polish Academy of Sciences, Warsaw, Poland

Md. Abdur Razzaque, DIU

Sheikh Md. Monzurul Huq, Charles Darwin University, Australia

A. K. M. Fazlul Hoque, Treasurer, JU

Abdul Goffar Khan, DIU

Asadul Huq, Dean, JU

Ajit Kumar Mazumdar, RUET

Sheikh Anowarul Fattah, DU

Mohammad Shamsul Arefin, BUET

Celia Shahnaz, BUET

Mohammed Moshiul Hoque, JU

6

Mohammad Zahidur Rahman, CUET

Md Kabirul Islam, DIU

Hamidul Haque Khan, CUET

Xavier Fernando, LNM IIIT, India

Md. Amir Hussain, Pro-VC, JU

Md. Nurul Alam, DU

Md. Atiqur R. Ahad, Pro-VC, JU

Md. Golam Mowla Choudhury, DU

Md. Mohiuddin Ahmad, DIU

Md. Milan Khan, DIU

Md. Nurunnabi Mollah, DUET

Md. Nasim Akhtar, KUET

S.M. Mahbub Ul Haque Majumder, JU

Mohammad Hanif Ali, KUET

Shamsul Alam, DIU

Curtis R. Menyuk, MUET, Pakistan

T. Rama Rao, SRM Institute of Science & Technology, Chennai

Vimal Bhatia, IIT Indore

Wan young chung, Pukyong National University Busan, South Korea

Navnit Jha, South Asian University, India

Pankaj Jain, South Asian University, India

7

Saroj Sahani, South Asian University, India

Danish Lohani, South Asian University, India

Alamgir Hossain, University of Malaya, Malaysia

Abdullah Gani, Director, AIIT, Amity University, India

Sunil Kumar Khatri, South Asian University, India

Asik Paul, Anglia Ruskin University, UK

AHM Zahirul Alam, University of Calcuta, India

Syed Mizanur Rahman, DIU

B. S. Chowdhury, IIUM, Malaysia

Haris Haralambous, University of Maryland, USA

M Mahbubur Rashid, University of West Scotland, UK

K. Dahal, Federation University, Australia

J Kamruzzaman, Frederick University, Cyprus

M Nasir Uddin, Nottingham Trend University, Uk

Mahmud, IIUM, Malaysia

Ramjee Prasad, BU-CROCCS, Thailand

Poompat Saengudomlert, Lakehead University, Canada

Emeritus Ranjan Gangopadhyay, Aalborg University, Denmark

Jamal El-Den, Ryerson Comm. Lab, Canada

8

Abstract of Accepted Papers

9

Performance Analysis of Secure Hybrid Approach for

Sharing Data Securely in Vehicular Adhoc Network

Atul B. Kathole, Dinesh N.Chaudhari

Pimpri Chinchwad College of Engineering, Pune, India

Abstract. As Adhoc networks are essentially dynamic networks, several security

issues may occur with the different attacks in the network due to their dynamic

nature. Therefore, several mechanisms have been proposed to prevent packet

routing errors in these networks. The deployment scenario shows that the packet

transmission rate and performance are very slow when the Sybil attack is present in

the network. Our goal is to propose a clustering method to improve latency, packet

transfer rate, and other performance indicators. In the proposed approach, we will

use two phases: the first phase, based on the packet delivery rate, and then the second

phase checks the exact cause of the performance degradation to verify the node's

behaviour. To improve security, a program that authenticates the cluster network

should be used. For malicious entities, the false accusation algorithm provides

methods to revoke and revoke certificates. Using the proposed system, we are trying

to improve the system's performance by comparing it with the existing system. As

the number of shared nodes in the system increases, the system can exert its best

performance and prevent various attacks.

A Review on Curvelets and Its Applications

Shristi Mishra and Deepika Sharma

Department of Mathematics, Chandigarh University, Punjab

Abstract. Wavelets have a large impact on image and signal processing, but it is

observed that they fail to represent an object with highly anisotropic elements like

linear or curvilinear structure. To alleviate this problem, curvelets have been

introduced by E. J. Candes and L. Demanent. Curvelets have shown a great interest

in the field of image and signal processing over the past few years. The beauty of

curvelets over wavelets is that it can be constructed over general manifolds. In this

paper, we represent the review on curvelets transform, including its history from

wavelets, and so forth. Moreover, this paper will also demonstrate the numerous

applications of curvelets such as seismic data recovery, X-Ray computed

tomography, interferometry images, time-frequency analysis, processing of MRI for

local image enhancement and noise suppression of receiver’s function, which would

be fruitful for discovering the real-life applications and problems that can be solved

with the help of curvelets.

10

Machine Learning Approaches for handling SQL

Injection Attack

Neha Bhateja1, Sunil Sikka1 and Anshu Malhotra2

1Amity University Haryana, India

2The North Cap University, India

Abstract. In today’s world, there is a massive amount of information related to users,

businesses etc. that is available on the internet which provides a motive for malicious

users to steal by creating the attacks. The most dominant attack in the current

scenario is SQL injection attack that is performed by attackers on web applications.

As SQL Injection attacks are becoming more diverse and complex every day, a

variety of ways for preventing and detecting SQL attacks are implemented. Machine

learning provides a way for detecting and preventing such attacks using

sophisticated algorithms. The aim of the paper is to present different available

methods used for preventing and detecting SQL Injection attacks that use a machine

learning approach.

Assessing Usability of Mobile Applications Developed for

Autistic Users through Heuristic and Semiotic Evaluation

Sayma Alam Suha, Muhammad Nazrul Islam, Shammi

Akter, Milton Chandro Bhowmick, and Rathin Halder

Department of Computer Science and Engineering, Military Institute

of Science and Technology Mirpur Cantonment, Dhaka, Bangladesh

Abstract. Mobile applications using Augmented and Alternate Communication

(AAC) technologies have found to be an effective approach for autistic people

having communication disparity to enhancing their communication skills. These

applications, on the other hand, must be designed in such a way that they are usable

and intuitive for individuals with autism. Therefore, the objectives of this research

are to evaluate the usability of mobile applications developed for enhancing the

communication skills of autistic users according to their special needs and to assess

the applicability of heuristic evaluation (HE) and semiotic evaluation (SE)

techniques for evaluating the usability of such kind of mobile apps. To attain these

objectives, four applications for improving the communication skill of autistic

people were evaluated through heuristic evaluation and semiotic evaluation

techniques. Both evaluations found that a significant amount of usability and

interactivity flaws are exist in each application that need to be considered for making

these applications usable for the autistic user. The study also showed that different

types of usability problems were revealed by heuristic evaluation and also by the

semiotic evaluation; and an evaluation by integrating of both techniques could be an

effective approach for enhancing the usability and interactivity of applications

developed for improving the communication skill of autistic user.

11

Blockchain Implementations and Use Cases for Inhibiting

COVID-19 Pandemic

Amirul Azim1 and Muhammad Nazrul Islam2

1Department of Information and Communication Technology (ICT),

Bangladesh University of Professionals (BUP), Bangladesh

2Department of Computer Science and Engineering (CSE) Military

Institute of Science and Technology (MIST), Bangladesh

Abstract. The SARS COV-2 or COVID-19 epidemic has created a global health

crisis that is having a profound effect on our daily livelihood and globalization.

Hospitals across the globe are currently facing tremendous problems in delivering

treatment to COVID-19 patients. Clinical trials and research are always lengthy

processes and the exchanges of trailed data among the untrusted parties need a

trusted source that would provide immutable transactions with a minimum time

stamp. Thus, the objectives of this review are to explore the current focus of

Blockchain-based research for inhabiting the COVID-19 pandemic and to devise all

possible use cases that can be used to create a Blockchain-based pandemic data

sharing and management system. To attain these objectives, a total of 19 articles

have been reviewed following the Systematic Literature Review (SLR) process. As

outcomes, this study highlighted four focused objectives concurrently being

exposed by existing studies and revealed eight Blockchain use-cases to develop a

future system for COVID-19 pandemic data sharing and management system with

enhanced security.

Random Forest based Legal Prediction System

Riya Sil

Adamas University, Kolkata 700126, India

Abstract. The evolution of science and technology has abetted in the integration of

human intelligence into its computerized version using artificial intelligence. The

advancement of artificial intelligence has radically changed the 21st century in terms

of technology that can analyse any event to predict its outcome based on multiparty

argument. This approach may be implemented to transit from problem domain to

solution domain for any critical issue. As a result, it may prove to be beneficial to

solve any problem which is suffering due to lack of manpower engagement,

infrastructure, etc. The concept of artificial intelligence can be applied over the legal

domain to execute complex tasks in an efficient manner. Precisely, the legal field

together with artificial intelligence and machine learning can be used for legal

document generation, pre-diction, briefs, search, case outcomes, and many more. It

can predict the conclusion of any legal case by analysing the information provided

and also the previous records that have been gathered from legal case documents. In

this paper, authors have used Random Forest based legal judgement prediction

system for classification of the offender and manage the cases related to the Dowry

12

Prohibition Act. Using supervised learning, the authors have pro-posed a prediction

system to find the offender in an accurate manner thus assisting the legal

professionals to resolve cases.

Particle swarm optimization and computational algorithm

based weighted fuzzy time series forecasting method

Shivani Pant and Sanjay Kumar

Department of Mathematics, Statistics and Computer Science, G. B.

Pant University of Agriculture and Technology, Pantnagar,

Uttarakhand, India, 263145

Abstract. Numerous fuzzy time series (FTS) predictive models had been envisaged

in past decades to cope with complicated and undetermined circumstances. The key

elements: namely determination of intervals and modeling of fuzzy logical

relationships, affect the model’s forecasting accuracy. The manner in which proper

fuzzy relationships are generated is pivotal in establishing fuzzy interactions and

predictions. Using the prevalent swarm intelligence method of particle swarm

optimization (PSO), this work proposes a computational algorithm for forecasting

time series by optimizing the weights of fuzzy logical relations (FLRs) of high-order

weighted FTS. The relevance of each individual fuzzy relationship in predicting is

shown by the weights in FTS. The model's appropriateness was tested using the

University of Alabama enrolment dataset. In the context of average forecasting and

root mean square error, the suggested model's forecasting accuracy was

demonstrated to be better than the other models.

Ant Colony Optimization to Solve the Rescue Problem as

a Vehicle Routing Problem with Hard Time Windows

Mélanie Suppan1, Thomas Hanne2 and Rolf Dornberger3

1School of Life Sciences, University of Applied Sciences and Arts

Northwestern Switzer-land, Muttenz, Switzerland

2Institute for Information Systems, University of Applied Sciences

and Arts Northwestern Switzerland, Olten, Switzerland

3Institute for Information Systems, University of Applied Sciences

and Arts Northwestern Switzerland, Basel, Switzerland

Abstract. The rescue problem is an adaptation of a standard Vehicle Routing

Problem where a set of patients suffering from various medical conditions has to be

picked up by a set of ambulances and brought back to the hospital. Optimizing this

13

problem is important to improve the use of life emergency vehicles in daily or

disaster situations. Although this problem is usually modelled as a Capacitated

Vehicle Routing Problem, different formulations are proposed in the literature

including multi-objective optimization with shortest route and maximization of the

number of patients that will survive or remain stable. Ant Colony Optimization

(ACO) and Genetic Algorithms (GA) are frequent-ly used, where ACO performs

better on objectives specific to the rescue problem. We model the problem as a

single-objective Vehicle Routing Problem with Time Windows (VRPTW) using

hard time windows. Each patient is assigned a degree of injury and a corresponding

maximum time window. An immediate return to the hospital for critically injured

patients is also introduced. The rescue problem turns to a VRPTW with hard time

windows for different problem sizes and is solved with ACO. The results suggest

that with a sufficiently large fleet, it can be ensured that critically injured patients

are reached in good time.

Applying Opinion Leaders to Investigate the Best-of-n

Decision Problem in Decentralized Systems

Jan Kruta1, Urs Känel1, Rolf Dornberger2 and Thomas

Hanne3

1Medical Informatics, University of Applied Sciences and Arts,

Northwestern Switzerland, Muttenz, Switzerland

2Institute for Information Systems, University of Applied Sciences

and Arts Northwestern Switzerland, Basel, Switzerland,

3Institute for Information Systems, University of Applied Sciences

and Arts Northwestern Switzerland, Olten, Switzerland

Abstract. Decision-making is considered a key ability for any living organism or

artificial system. Finding a consensus on the most beneficial solution among a

collective in a decentralized system is a challenging task, especially when

individuals operate with incomplete knowledge and no central authority. This paper

investigates collective decision making using a best-of-n algorithm which is a

nature-inspired approach based on the behaviour of honeybees. We focus on the role

of opinion leaders and their influence. We investigate such an agent by adapting the

behavior of a swarm and changing its basic dynamics during different experiments.

Our results illustrate that it is possible to in-corporate new valuable features (such

as opinion leader effects and captain effects) into a proposed problem model. Our

results indicate that such opinion leader effects have a beneficial impact on

consensus finding in specific situations whereas in other situations the decision-

making process may get complicated.

14

Pathfinding in the Paparazzi Problem Comparing

Different Distance Measures

Kevin Schär1, Philippe Schwank1, Rolf Dornberger2 and

Thomas Hanne3

1Institute for Medical Engineering and Medical Informatics, School

of Life Sciences, FHNW, Muttenz, Switzerland

2Institute for Information Systems, University of Applied Sciences

and Arts Northwestern Switzerland, Basel, Switzerland,

3Institute for Information Systems, University of Applied Sciences

and Arts Northwestern Switzerland, Olten, Switzerland

Abstract. This paper compares different alternative path construction mechanisms

used in the A* algorithm applied to the Paparazzi problem. It investigates the

Manhattan, Euclidean and Chebyshev approaches for distance measurement using

four and eight neighbouring nodes in different maps. The maps consist of various

sizes and include fixed obstacles and different terrain structures represented by

weighted nodes. The Manhattan approach offers the best performance in terms of

the number of iterations and run time when using four neighbouring nodes in small

maps. In contrast, the Euclidean approach per-forms best at reasonable path costs

for large maps. The Chebyshev approach shows the lowest path costs in every map

regardless of the number of neighbouring nodes. However, the Chebyshev approach

as the gold standard for eight neighbouring nodes does not show the expected

superiority in pathfinding performance.

Empirical Evaluation of Motion Cue for Passive-Blind

Video Tamper Detection Using Optical Flow Technique

Poonam Kumari and Mandeep Kaur

University Institute of Engineering & Technology Panjab

University, Chandigarh

Abstract. The advances in multimedia processing technologies have led to an ever-

augmenting challenge to sustain the integrity and authenticity of digitized videos.

The domain of digital video forensics has been crucial in devising new

methodologies to counterfeit these attacks in a passive-blind manner. The paper

presents an empirical evaluation of motion cues computed using the Optical Flow

(OF) algorithm that enables automatic detection of inter-frame forgeries in digital

videos. The optical flow deals with the estimation of the true motion field. Though

various sparse OF methods are analysed in literature for detecting forgeries in digital

videos but study of Farneback OF for forensic applications has been very limited.

15

Farneback method calculates dense optical flow and thus the motion cue is exploited

as forensic footprint to detect copy-paste region in videos. The visual inspection of

the statistical detail plotted from optical flow images displays superfluous spikes in

forged videos that highlights the tampered region. Supervised machine learning was

therefore applied to automate the process of discriminating original and forged

videos. Region of interest is selected around the forged region to reduce overall

computational overhead and maintains uniformity in the feature vector length from

each sample. The proposed approach can detect and localize the frames where the

forgery attack is carried out. A Lin-ear SVC model is used that gives a classification

accuracy of 97%. The analysis is carried out on the benchmark REWIND dataset.

The study is significant in designing advanced video forensic algorithms based on

motion cues.

Quantifying Changes in Sundarbans Mangrove Forest

Through GEE Cloud Computing Approach

Chiranjit Singha and Kishore C. Swain

Department of Agricultural Engineering, Institte of Agriculture,

Visva-Bharati, Sriniketan, West Bengal-731236

Abstract. Precise information concerning mangrove ecosystem change is crucial for

their conservation and restoration in local to global scale. Due to natural events, like

cyclone, tsunami etc. causes disaster to the biodiversity in the coastal zone. This

study quantifies the changes in Sundarbans mangrove forest during 1996-2017

including changes during pre and post Bulbul cyclone in 2019. Google Earth Engine

(GEE) cloud computing approach using Remote Sensing based L-band ALOS

PALSAR 1 and 2 mosaic tiles, and Sentinel 1 dual-polarization C-band SAR

(Synthetic Aperture Radar) data with Sentinel 2 optical was used to estimate forest

loss and gain and above-ground biomass (AGB). The results showed that the long-

term mangrove loss area found 1.12 sq. km during 1996-2017 whereas, short-term

mangrove loss and the gain area is 0.78 sq. km and 0.25 sq. km, respectively, during

2007-2017. The densest mangrove elevation and total AGB were found mostly in

the eastern region of the study area. Mangrove elevation varies from -16 to 31m and

AGB ranges from 30.2 to 700 Mg·ha−1 in the study area. After the Bulbul cyclone,

the VH backscatter varies between -42.18 and -9.26dB where the VV backscatter

ranges from -31.80dB to -1.01dB. The cyclone causes tremendous losses of biomass

in the Sundarban. The study validated the suitability of SAR data for continuous

mapping, monitoring, and change detection of the mangrove forest. Our research

establishes the abilities of radar-based RS technology for change detection and

sustainable planning of mangrove forests in India.

16

Metaheuristics and Hyper-heuristics based on

Evolutionary Algorithms for Software Integration Testing

Valdivino Alexandre de Santiago Junior and Camila

Pereira Sales

Coordenacao de Pesquisa Aplicada e Desenvolvimento Tecnologico

(COPDT), Instituto Nacional de Pesquisas Espaciais (INPE),

Avenida dos Astronautas, 1758, Jardim da Granja - 12227-010, Sao

Jose dos Campos, SP, Brazil

Abstract. Hyper-heuristics have been identified as optimisation algorithms that

would have better generalisation capabilities than metaheuristics. In this article, we

present a controlled experiment that evaluates our metaheuristics (evolutionary

algorithms), two multi-objective (SPEA2, IBEA) and too many-objective (NSGA-

III, MOMBI-II), and three selection hyper-heuristics (HRISE R, HRISE M, Choice

Function) for the software integration testing problem. We relied on and improved

our previous method which aims at generating integration test cases based on C++

source code and optimisation algorithms. Considering three different quality

indicators and two types of evaluations (cross domain and statistical analyses),

results demonstrate that, for the algorithms and case studies considered in this

research, classical metaheuristics, such as SPEA2 and IBEA, performed better

compared to not only the most recent many-objective algorithms but also to the

hyper heuristics. This conclusion, based on empirical evidences, seems to be related

to the well-known no free lunch theorems which assert that any two algorithms are

equivalent when their performances are averaged across all possible problems.

Hence, we claim that it is needed to carry out more rigorous experiments, in the

context of optimisation, to better answer the question of generalisation in practical

terms.

Towards a static and dynamic features-based framework

for android vulnerabilities detection

Jigna Rathod1 and Dharmendra Bhatti2

1Babu Madhav Institute of Information Technology, UKA

TARSADIA UNIVERSITY, Gujarat, India

2Shrimad Rajchandra Institute of Management and Computer

Application, UKA TARSADIA UNIVERSITY, Gujarat, India

Abstract. Mobile phones are coming out as one of the governing computing

platforms in the contemporary world where android phones are the top pick for users

as well as developers due to their open-source nature. Such fame of android phone

17

usage comes with an elevation in malware targeting the Android operating system.

The proposed framework discovers vulnerabilities from an-droid applications by

performing dynamic analysis and uses the combination of static and dynamic

features such as permission, system calls, and network traffic. This paper analyzes

the impact of network traffic feature with system calls and permission to detect

vulnerability in android apps. To ascertain the vulnerability from real-world

applications, we trained our proposed frame-work by selecting attributes that are

obtained by implementing various attribute selection tactics. The Experiment was

performed on 2511 android applications. Our experimental results show that the

approach is remarkably accurate and the average accuracy is 94.57% for neural

networks and 98% for deep learning algorithms.

A Comparative Study of Existing Knowledge based

Techniques for Word Sense Disambiguation

Aarti Purohit and Kuldeep Kumar Yogi

Department of Computer Science and Engineering, Banasthali

University, Rajasthan, India

Abstract. Word Sense Disambiguation refers to the process of determining the

correct sense of a given word in a given sentence. It is a difficult problem to solve

because it necessitates gathering information from various sources. The human mind

can use cognition and world knowledge to resolve word sense ambiguities.

However, machine translation systems are in high demand today, and because

machines cannot use cognition and world knowledge to resolve such ambiguities,

they make semantic errors and generate incorrect interpretations. Handling sense

ambiguity is one of the most difficult challenges in natural language processing and

understanding; such words result in erroneous machine translation. WSD techniques

were used and implemented on various corpora for almost all languages some

Lexical knowledge sources are available used as machine readable dictionaries.

WSD algorithms were classified into two broad categories: knowledge-based,

machine learning based approaches. In this paper we have tried to compare various

used algorithms and methods like overlap based, selection preference, semantic

approach and heuristic approach under knowledge-based approach for WSD. By

comparison, we have concluded that Knowledge based resource plays a vital role in

processing of any language. Some knowledge-based techniques give high accuracy

while some give low results for WSD for various languages. In this paper we try to

focus on Knowledge based Techniques or algorithms used and their benefits and

drawbacks in terms of execution speed or accuracy level with different languages.

Some results are low due to low resource languages used for WSD needs a work to

prepare knowledge resource.

18

Online Subjective Examination a Student Perspective

Madhav A. Kankhar, C. Namrata Mahender

Department of Computer Science & Information Technology Dr.

Babasaheb Ambedkar Marathwada University Aurangabad (MS),

India

Abstract. Online education has become an integral part today mostly due to the

COVID-19 scenario. Teaching, learning and evaluating are the main component of

online education system. In examination online education also place very vital role.

If considering the online option of exam mostly objective (MCQ) based has high

priority compare to subjective form of exam due to lot of limitations during

conduction of online subjective exams. As researches educationist pay more

attention on subjective examination for overall evaluation of student. Present work

tries to get students perspective on subjective examination through a survey

conducted on graduate and post graduate level student on Marathawada region.

An Insider Threat Detection Model Using One-Hot

Encoding and Near-Miss Under-sampling Techniques

Rakan A. Alsowail

Deanship of Common First Year, King Saud University, Riyadh

11362, Saudi Arabia

Abstract. Insider threats are malicious acts (e.g., data theft, fraud, and sabotage)

which are very difficult to detect that are carried out by authorized users within an

organization. The existing research in the field of insider threat detection mostly

focused on general insider threat scenarios. Moreover, the skewed is-sue that could

occur during the encoding process and due to the imbalanced classes of the dataset

are not addressed. As an enhancement to the existing work, we propose an insider

data leakage detection model that focus on detecting the most serious attack scenario

where a malicious insider executes an attack before his/her leaving from an

organization. The model embeds multi-data granularity techniques (label encoding,

scaling, one-hot encoding, and Near Miss under sampling) for the aim of addressing

the possible bias of the encoding process and the imbalance issue of dataset classes.

Several ma-chine learning classifiers are also employed for detecting insider data

leakage instances utilizing different classification perspectives. The model is

validated using The CERT Insider Threat Dataset to assess its performance in com-

parison to the ground truth, as a proof of concept. The results show that our model

outperforms the existing work that was validated on the same dataset with an AUC

score of 0.94.

19

Problem Solution Strategy Assessment of a Hybrid

Knowledge-Based System in Teaching and Learning

Practice

Kamalendu Pal

City, University of London, London EC1V 0HB, United Kingdom

Abstract. This paper presents the main features of an assessment method for a

knowledge-based software system, which uses Socratic style teaching and learning

practice in the higher education environment. Software system assessment happens

in a hybrid legal intelligent tutoring system, Guidance for Business Merger and

Acquisition (GBMA). The legal knowledge for GBMA is presented in two forms,

as rules and previously decided cases. In addition, distinguishing the two different

forms of knowledge representation, the pa-per outlines the actual use of these forms

in a computational framework de-signed to generate a plausible solution for a given

case by using rule-based reasoning (RBR) and case-based reasoning (CBR) in an

integrated frame-work. The nature of a solution's suitability assessment is

considered a multiple criteria decision-making process in GBMA evaluation. The

assessment used discussions and questionnaires with different user groups in a

scenario-based teaching and learning practice. The answers to questionnaires use

fuzzy linguistic concepts. The finding suggests that fuzzy linguistic concept-based

assessment helps in evaluating knowledge-based systems.

Towards Developing a Mobile Application for Detecting

Intoxicated People through Interactive UIs

Ifath Ara, Tasneem Mubashshira, Fariha Fardina Amin,

Nafiz Imtiaz Khan, and Muhammad Nazrul Islam

Department of Computer Science and Engineering, Military Institute

of Science and Technology, Mirpur Cantonment, Dhaka-1216,

Bangladesh

Abstract. Alcohol and Cannabis are among the most frequently used drugs

worldwide. Excessive drinking is one of the leading lifestyle-related causes of death

across the whole world. Both alcohol and cannabis can cause short-term problems

with thinking, remembering, concentrating, and performing psycho-motor tasks.

Taking drugs like alcohol and cannabis can impair a person's ability to perform tasks

such as driving a car, flying an airplane, and making critical decisions. Clinical dope

test methods are time-consuming, and instant testing devices, such as breath alysers,

are only available to law enforcement personnel which is expensive. Therefore,

detecting intoxicated people using ubiquitous devices such as smartphones without

any use of external hardware can be a cost-effective, time-saving, and efficient

approach for ensuring safe performance in critical tasks. Hence, the objective of this

20

research is to propose a conceptual framework for developing an interactive mobile

application that detects intoxicated people by measuring behavioural abnormalities

caused by alcohol and cannabis consumption. To accomplish this objective, the

effects of alcohol and cannabis are investigated, followed by a review of the

available tests in the literature. The proposed conceptual model encompasses testing

of balancing capability, grip sense, simple reaction time, choice reaction time, short-

time memory, and measuring a person's heart rate using tasks based on the short-

term effects of alcohol and cannabis. Prototypes of the user interfaces are also

developed based on the proposed conceptual framework.

Novel Harris Hawks Optimization and Deep Neural

Network Approach for Intrusion Detection

Miodrag Zivkovic1, Nebojsa Bacanin1, Jelena

Arandjelovic1, Andjela Rakic1, Ivana Strumberger1, K.

Venkatachalam2, and P Mani Joseph3

1Singidunum University, Danijelova 32, 11000 Belgrade, Serbia

2Department of Applied Cybernetics, Faculty of Science, University

of Hradec Kralove, 50003 Hradec Kralove, Czech Republic

3Department of Mathematics & Computer Science, Modern College

of Business and Science, PO Box 100, PC 133, Muscat, Sultanate of

Oman

Abstract. Intrusion detection systems attempt to identify assaults while they occur

or after they have occurred and they detect abnormal behavior in a network of

computer systems in order to identify whether the activity is hostile or unlawful,

allowing a response to the violation. Intrusion detection systems gather network

traffic data from a specific location on the network or computer system and utilize

it to safeguard hardware and software assets against malicious attacks. These

systems employ high-dimensional datasets with a high number of redundant and

irrelevant features and a large number of samples. One of the most significant

challenges from this domain is the analysis and classification of such a vast amount

of heterogeneous data. The utilization of machine learning models is necessary. The

method proposed in this paper represents a hybrid approach between recently

devised yet well-known, harris hawks optimization metaheuristics and deep neural

network machine learning model. Since the basic harris hawks optimization exhibits

some deficiencies, its improved version is used for dimensionality reduction,

followed by the classification executed by the deep neural network model. Proposed

approach is tested against well-known NSL-KDD and KDD Cup 99 Kaggle

datasets. Comparative analysis with other similar methods proved the robustness of

the presented technique when metrics like accuracy, precision, recall, F1-score are

taken into account.

21

Random forest classification and regression models for

literacy data

Mayur Pandya1 and Jayaraman Valadi2

1Savitribai Phule Pune University, Pune, India

2Vidyashilp University, Bengaluru, India

Abstract. In this study we analysed data provided by the Ministry of Human

Resources Development (MHRD), India to develop models for estimation of male,

female and Overall literacy rates. This study further examines the district wise

primary and secondary school education data. The data originally consisted of 819

input attributes. We employed exploratory data analysis for the removal of

redundant features. We also concatenated some features and we were left with 222

features. The output consisted of male and female literacy rates. We employed the

Random Forest regression algorithm for the prediction of these two output variables.

Further, we employed proper thresholding to convert these data into classification

models using two different classification models. The first one classified data into

two groups: males who are literates and illiterates. The second model classified

females into literates and illiterates. We employed random forest classifiers for the

classification tasks also. Further, we employed Gini importance ranking criteria

which are embedded in the random forest algorithm itself for selecting the most

informative attributes for both classification and regression tasks. Finally, we

carried out multi-label literacy classification for multi-label prediction of literacy

rates. We used the binary relevance method for the two-label prediction task. Our

prediction algorithms performed well in regression and classification tasks. We also

identified top-ranked features having a maximum correlation with the output

variables. This characterization provides important domain knowledge along with

model interpretability.

Towards Robotic Knee Arthroscopy: Spatial and Spectral

Learning Model for Surgical Scene Segmentation

Shahnewaz Ali and Ajay K. Pandey

School of Electrical Engineering and Robotics, Faculty of

Engineering, Queensland University of Technology, Brisbane, QLD

4001, AUSTRALIA

Abstract. Minimally invasive surgeries are complex to perform, and surgical

outcomes are varied due to limited view of the surgical scene. There is a lack of

reliable vision systems that can identify and segment different tissue types intra-

operatively. Here we introduce a novel approach towards overcoming this

limitation. Our approach extracts geometric and spectral information captured by a

22

miniaturized camera using deep learning algorithms. We have successfully

implemented a deep neural network and trained it for insitu labelling of soft and

hard tissues acquired from clinically relevant cadaveric studies. Although presented

and validated for the knee arthroscopy our approach can be implemented across

different endoscopic platforms. Intraoperative nature of tissue segmentation could

be easily implemented in medical imaging systems for achieving better outcomes in

minimally invasive procedures. In addition to segmenting different tissue types like,

ACL, femur, tibia, cartilage and meniscus, our network can also segment surgical

tools present inside the knee cavity. The achieved dice similarity score for the tissue

types femur, tibia, ACL, and meniscus were 0.91,0.71, 0.39, and 0.62.

Opposition-based Arithmetic Optimization Algorithm

with Varying Acceleration Coefficient for Function

Optimization and Control of FES System

Davut Izci1, Serdar Ekinci2, Erdal Eker3 and Laith

Abualigah4

1Batman University, Batman 72060, Turkey

2Batman University, Batman 72100, Turkey

3Mus Alparslan University, Mus 49250, Turkey

4Amman Arab University, Amman, Jordan 11953, Jordan

Abstract. In this paper, the integration of the arithmetic optimization algorithm

(AOA) with a modified opposition-based learning (mOBL) mechanism is presented.

The proposed novel mOBL based AOA (mAOA) was demonstrated to have better

capability for optimization problems by using four classical bench-mark functions.

For further evaluation, the proposed mAOA was also used to tune a proportional-

integral-derivative controller (PID) adopted in a functional electrical stimulation

(FES) system for the first time. The latter system is a challenging biomedical system

that helps revealing the potential of the mAOA for real-world engineering

optimization problems. The comparative transient response analysis was performed

for PID controlled FES system using the original arithmetic optimization algorithm

and Ziegler-Nichols based tuning schemes. The latter comparative analysis has

shown better capability of the proposed mAOA algorithm for such a biomedical

system.

23

The Impact of Using Facebook on the Social Life of

College Students

Deepali A. Mahajan, C. Namrata Mahender

Dr. Babasaheb Ambedkar Marathwada University, India

Abstract. The advancement in information technology brings new ways of

communication among the people, especially among the students. This changes the

social life of the students as they are continuously engaged on social networking

sites (SNS), they are far away from the actual relationships. This study finds the

addictive behavior of the students towards Facebook, as this application is more

popular among the students. We have conducted a survey for 484 students from

which 107 responses collected using offline survey and 381 responses were

collected by online survey. SPSS has been used for statistical analysis of the

questions. For the selected questions calculated the frequencies and percentage. This

gives us information about the variable Excess use and social life. Further, we found

a negative correlation between the variables which means excessive use of Face-

book is negatively related to social life. Students get disconnected from society

because of the excess use of Facebook.

Power control of a Grid Connected Hybrid Fuel cell,

Solar and Wind Energy Conversion Systems by using

Fuzzy MPPT Technique

Satyabrata Sahoo and K. Teja

Department of Electrical and Electronics Engineering, Nalla Malla

Reddy Engineering College, Hyderabad - 500088

Abstract. The main aim of this paper is integration and generation of quality power

through a grid-connected hybrid fuel cell, solar and wind energy conversion

(WECS) systems by using Fuzzy MPPT technique. In this paper the power sources

like fuel cell, solar energy and WECS are used for the generation of electrical power.

Furthermore, the wind, solar and fuel cell inputs have to be combined appropriately

to ensure that the load on demand is constantly continued and maintained. In fact,

all these power sources are connected to the dc bus through the buck-boost

converter. By using the fuzzy Maximum Power Point Tracking system, these

converters are managed to improve efficiency compared with Hill-Climbing Search

methods and P & O MPPT techniques. Using the MATLAB / Simulink platform,

simulation studies of the proposed system are carried out and the results are

presented.

24

Stabilizing Constrained Control for Discrete-Time

Multivariable Linear Systems via Positive Polyhedral

Invariant Sets

BOUREBIA Ouassila

Automatic and Robotics Laboratory, Faculty of Sciences and

Technology, Department of Electronics Constantine1 University,

Constantine, Algeria

Abstract. In this work we propose a numerical method to compute stabilizing state

feedback control laws and associated polyhedral invariant sets for multivariable

discrete systems. An MPC-based dual mode strategy and backward recursion from

invariant set approach guarantees the feasibility and stability of the controller are

investigated. The explicit solution subdivides the state space into regions, for each

section, the set of admissible control laws is determined, the objective is to

determine the region containing the admissible solutions starting the terminal region

and backtracking. An illustrative example, showing the effectiveness of the

proposed methods, is presented.

Texture Feature Analysis for Inter-Frame Video

Tampering Detection

Shehnaz, Mandeep Kaur

Department of Information Technology, University Institute of

Engineering and Technology, Panjab University, Chandigarh

Abstract. Inter-frame video forgeries can involve insertion, deletion, or duplication

of frames with malicious intentions. Most of the available passive methods follow a

pixel-correlation based approach that is computationally expensive as it compares

each pixel of video frames to identify forgery. In this paper, a histogram-based

approach is proposed that is computationally efficient and results in better

classification accuracy. It computes histograms of frames having texture

characteristics encoded with Local Binary Pattern (LBP). Histogram similarity of

adjacent LBP coded frames is measured through the Histogram Intersection

comparison metric. The differences of these adjacent metrics values provide

significant cues for forgery detection, that are further normalized and quantized to

obtain a fixed-length feature vector. It makes the proposed approach scalable and

hence enhances its applicability for variable-length videos. Training and testing are

done using SVM classifier with RBF kernel. The method is capable to detect

different kinds of interframe forgeries that include insertion, deletion and

duplication Due to lack of benchmark dataset of interframe video forgeries, a

25

customized dataset is prepared through MoviePy tool that comprises total 1370

videos with interframe forgeries (frame deletion, insertion and duplication).

Experimental results demonstrate an overall detection accuracy of 99% that can

efficiently detect various kinds of inter-frame video forgeries A comparative

analysis with existing interframe forgery detection approaches are also presented.

Computer Vision-Based Algorithms on Zebra Crossing

Navigation

Sumaita Binte Shorif , Sadia Afrin , Anup Majumder and

Mohammad Shorif Uddin

Department of Computer Science and Engineering, Jahangirnagar

University, Savar, Dhaka, Bangladesh

Abstract. A zebra crossing, which is specified as extensive white bands painted on

typical black roads, is a pathway for pedestrians to cross a road. Pedestrians need to

find a zebra crossing to negotiate a road. Finding zebra crossing is difficult for a

pedestrian if he/she is a blind or a visually impaired person. Hence, the detection of

zebra crossings is extremely crucial for ameliorating the agility of the visually

challenged and blind people as well as preventing precarious situations from taking

place in navigating a road. Several computer vision-based techniques are developed

to find the zebra patterns on a road surface. This paper tries to study the existing

vision-based techniques, their performances and also shows the future research

directions to develop an intelligent vision-based road crossing system for visually

impaired people.

Spider Monkey Optimization (SMO) algorithm based

Innovative strategy for strengthening of Reliability

Indicators of Radial Electrical System

Aditya Tiwary1, R. S. Mandloi2

1Fire Technology & Safety Engineering, IPS Academy, Institute of

Engineering & Science, Indore (M.P.), India

2Electrical Engineering, Shri G.S. Institute of Technology &

Science, Indore (M.P.), India

Abstract. A zebra crossing, which is specified as extensive white bands painted on

typical black roads, is a pathway for pedestrians to cross a road. Pedestrians need to

find a zebra crossing to negotiate a road. Finding zebra crossing is difficult for a

pedestrian if he/she is a blind or a visually impaired person. Hence, the detection of

zebra crossings is extremely crucial for ameliorating the agility of the visually

26

challenged and blind people as well as preventing precarious situations from taking

place in navigating a road. Several computer vision-based techniques are developed

to find the zebra patterns on a road surface. This paper tries to study the existing

vision-based techniques, their performances and also shows the future research

directions to develop an intelligent vision-based road crossing system for visually

impaired people.

AI Based Multi Label Data Classification of social media

Shashi Pal Singh1, Ajai Kumar1, Sanjeev Sharma2,

Snehil R Singh3

1AAIG, Center for development of Advanced Computing, Pune,

India

2Indian Institute of Information Technology Pune. IIIT Pune, India

3Banasthali Vidyapith, Banasthali, Rajasthan, India

Abstract. We have unlabelled data in different ways- news article, and countless

other types of documenting text. Large volumes of data are produced from many

online sources such as emails, www, organization's electronic health records, and

databases. These data must be classified to avoid information loss and to boost data

discovery and retrieval more quickly. This research is about classifying tweets, the

New York Times, or other social media. It classifies the data into predefined generic

classes, such as “business,” “sad,” “style,” “advertising,” “events,” “news,” etc.,

using author information and some features. The approach is to reduce the noise and

identify tweets or any data classes as it is evident that an article can fall in more than

one category.

Performance Analysis of Random Forest (RF) and

Support Vector Machine (SVM) algorithms in classifying

Breast Cancer

FHA. Shibly1,2, Uzzal Sharma1 and HMM. Naleer2

1Assam Don Bosco University, India

2South Eastern University of Sri Lanka

Abstract. Breast cancer is a serious disease cause of death among females. In cancer

diagnosis, accurate classification of breast cancer data is critical, and the distinction

between malignant and benign tumors can help patients avoid unnecessary

procedures. The classification of breast cancer can also be used to select the best

treatment options. The classification of patients into benign and malignant groups is

a well-known medical study topic. Machine learning is commonly employed in

27

Breast cancer prediction because it has the advantage of finding essential features

from a medical data collection. Several empirical researches have used machine

learning and soft computing techniques to treat breast cancer. Many people claim

that their algorithms are better than others' because they are faster, easier, or more

accurate. Therefore, which algorithm is more accurate in classifying breast cancer

was the research question. Furthermore, the main objective of this research study is

to calculate and compare the performance of SVM and RF algorithms in classifying

breast cancer more accurately. For the experimental analysis, the Wisconsin Breast

Cancer Data Set (WBCD) is employed. There are a total of 699 instances and 10

qualities to examine. Based on accuracy, recall, precision and F1 scores, RF has the

higher percentages in all four measurement scales as 92.98%, 93.65%, 88.05% and

90.67% accordingly. As a result, RFs have the best chance of successfully

diagnosing breast cancer.

Prediction of Water Quality Index of Ground Water

Using the Artificial Neural Network and Genetic

Algorithm

Mehtab Mehdi and Bharti Sharma

DIT University Dehradun, India

Abstract. This research work is related with artificial neural network and genetic

algorithm techniques to forecast the condition of groundwater at Amroha region

located in Uttar Pradesh location of India. For this, twelve (12) samples of

groundwater have been composed and investigated for main features during before

and after monsoon period. The physicochemical factor was considered that use for

calculating water quality index. Logical outcome established by which all the factors

are in satisfactory range however, EC, TDS, TH, Ca and Mg are greater than the

enviable boundary of the WHO values. The groundwater fitness for drinking was

determined by WQI technique. The WQI assessment limits from 24.76 to 128.07

and from 36.54 to 90.38 in pre- and post-monsoon period, respectively. Only one

test (DW5) shows 130.07 WQI assessments indicating bad quality for drinking

because of input of urban and rural waste. For generating reliable and exact

representation for forecast of groundwater excellence based on water quality index,

a multi-layer back propagation algorithm uses in the ANN. Moreover, GA model is

applied to make better results of ANN. The outcome confirmed the forecast of ANN

model are acceptable and corroborate constantly satisfactory presentation for each

term. The planned ANN technique might be helpful to predict the quality of

groundwater.

28

Improving Throttled Load Balancing Algorithm in Cloud

Computing

Worku Wondimu Mulat1, Sudhir Kumar

Mohapatra2, Rabinarayana Sathpathy2, Sunil Kumar

Dhal2

1 Addis Ababa Science & Technology University, ADDIS ABABA,

ETHIOPIA, P.O.Box: 16417

2Faculty of Emerging Technologies, Sri Sri University, Cuttack,

Odisha, India

Abstract. The service and resource delivery model through high-speed internet is

called as Cloud Computing. Users of Cloud Computing has increased exponentially

due to specific characteristics like pay per usage and use anywhere, any time without

human intervention. The emergence of Cloud Computing has reduced the initial

investment from the service providers' point of view and this, in turn, results in low-

cost service for service users. Cloud Compu-ting has many issues associated with it,

out of which performance is a major challenge. The elasticity of resources without

paying a premium increased the traffic on the internet rapidly. Such a rapid increased

workload overloads the server and leads to performance inefficiency. One of the

techniques to overcome this challenge is using load balancing. This needs to be done

cautiously because of failure in any one of the virtual machines can lead to the

unavailability. We compare performance of the three well-known algorithms:

Equally Spread Current Execution, Round Robin and Throttled load balancing and

the result shows Throttled performs better that the two but it still need improvement.

The proposed algorithm improves performance of Throttled algorithm by

introducing two queues. One of the queues is used to store available virtual machines

and the other queue, priority based, is used to store busy virtual machines. When a

request arrives the load balancer pop the front virtual machine from available queue,

assign the request to it and then push it to busy queue. Cloud Analyst simulator is

used for simulation and the result shows the proposed algorithm improves the

response time and resource utilization of the cloud computing environment.

Feature Extraction Based Landmine Detection Using

Fuzzy Logic

T.Kalaichelvi, S. Ravi

Department of Computer Science, School of Engineering and

Technology, Pondicherry University, Pondicherry-605014, India

Abstract. The detection of landmines plays a crucial role in saving soldiers' lives,

hu-man beings, and in general, animals. The researcher uses digital image pro-

29

cessing techniques to detect landmines using sensors. Many countries are striving

hard in landmine detection, and the fight is going on against the buri-al of landmines.

This paper gives a review of the landmine detection techniques using fuzzy logic

and wavelet transform. There are two feature-based techniques for landmine

detection: clustering method and subspace detection techniques. These techniques

collect the data from the various sensors from the vehicle-mounted to the ground-

penetrating radar using metrics to evaluate and improve the detection results to

minimize the false alarm rate. Each technique's performance depends on the

contaminated soil's nature, the depth of an object, and the type of material used.

IOT based Smart Parking System using NodeMCU and

Arduino

Amirineni Sai Venkata Dhanush and Kasukurthi

Rohit Sai

Department of Electronics and Communication Engineering, SRM

University, India

Abstract. Through this paper, we would like to explain the major issues that have

start-ed to take place in the world around us. With the growing need for

transportation in our daily lives, we have begun to see the increase in automotive

vehicles in the world around us. Although this drastic increase has resulted in

problems such as global warming another unseen issue in our day to day lives is

parking. Often, we are forced to search for parking hours on end when going to work

or an important event. This is because most parking lots are filled and there is no

way for us to identify vacant parking spaces. This is why we would like to work

towards creating a system that is capable of helping people identify vacant spaces

and eliminate the need to search for parking as a whole. Through this paper we

would like to explain our approach to the issue and how we have been able to

successfully create a prototype with the use of IoT to detect the presence of vehicles

and have this updated in our application for users to gain access to. We have split

our paper into various sections explaining the problem of our solution as well as the

drawbacks of the solutions which are already present in the modern world.

Study on Intelligent Tutoring System for Learner

Assessment Modeling Based on Bayesian Network

Rohit. B. Kaliwal and Santosh. L. Deshpande

Dept. of CSE, VTU, Belagavi, Karnataka, India

Abstract. The most crucial part of the educational system is the intelligent tutoring

system. A computer system that intends to give learners quick and customised

lessons or feedback, usually without the intervention of a professor, is known as an

30

intelligent tutoring system. Artificial intelligence technology is employed in an

intelligent tutoring system to provide a lot of help to learners in terms of acquiring

skills and knowledge. Human professors are not required to contribute to the

organisation in this pro-cess, and Bayesian Network has been employed to solve this

problem. An intelligent tutoring system’s heart is the beginner learner model. Using

a Bayesian network with high self-learning ability to build an intelligent tutoring

system for the novice concept can considerably improve the lev-el of comprehension

of the intelligent tutoring system. The core philosophy of an intelligent tutoring

system for the beginner concept will be the major focus. The elements of impact on

the learners’ learning method are then studied at this level, starting with the

perception of the beginner’s expertise in teaching, mutual with the state of learning,

and the features of the beginner. Based on Bayesian network, this work presented a

study model for constructing an intelligent tutoring system for learner assessment.

The tutoring system’s design model takes into account a client model and a learner

model. The Bayesian network was employed in an e-learning environment to assess

the learners’ current level of knowledge so that the model may evolve and offer new

knowledge to improve learner performance.

Finite Element Analysis of Prosthetic Hip Implant

Priyanka Jadhav, Swar Kiran, Tharinipriya T, T.

Jayasree

Department of Electronics and Communication Engineering, College

of Engineering Guindy, Anna University, Chennai- 600 025, India

Abstract. In the human body, hip joints are important shock absorbing and weight-

bearing structures. Individuals suffering from severe arthritis or hip bone fractures

are dependent on hip replacement joints. An artificial hip joint con-sists of a stem,

ball, and socket assembly. The stem is implanted in the femur, which is connected

to the femoral head that is replaced by the artificial ball, that is placed inside the

socket which resembles the acetabulum. In this study, a three-dimensional

computer-aided design (CAD) software, Solid-Works is used to design the artificial

hip joint. The functionality and longevity of the implant greatly depend on the design

of the implant. Biocompatible and robust materials are used in the designing process

for parts of the hip joint. The model was subjected to finite element analysis, and

the stress-strain distribution across the model was estimated for different loads to

determine the implant's endurance. SolidWorks is used to perform static analysis to

determine the optimum implant design. It calculates the characteristics of stress,

strain, and displacement in different directions. When von Mises stress values

exceed the yield strength of the implant material, it is said to fail. Thus, it is essential

to know the stress for implementing a proper implant design.

31

A Comprehensive Study on Multi Document Text

Summarization for Bengali Language

Nadira Anjum Nipa and Naznin Sultana

Daffodil International University, Ashulia, Dhaka

Abstract. Automatic text summarization is a useful and needed approach in which a

small subset of text is extracted concisely and pertinently from large text documents

where the extracted sentences may have significant and notable meaning com-pared

to other sentences in the document. Although there have been a lot of approaches to

English text summarization, very few works have been found in the literature on

automatic Bengali text summarization. Our work focuses on multi-text

summarization tasks based on data mining and some statistical approaches which

primarily employ the method on Bengali text documents as a basis for

summarization. We used a hybrid approach for extracting the most significant word

during tokenization and used some statistical methods to rearrange the sentences.

The TextRank algorithm is used to pick the top few sentences from the processed

text as the summary and finally we compared and evaluated our model with

benchmark standard summary text generated by a group of human contributors. Our

proposed hybrid model generates an average of 0.66 Precision, 0.59 Recall and 0.62

F-Score which indicates that our model can be used as an alternative system to

address multi-text summarization problems of Bengali text documents.

Deep Learning-Based Lentil Leaf Disease Classification

Kaniz Fatema1, Md. Awlad Hossen Rony1, Kazi

Mumtahina Puspita1, Md. Zahid Hasan1 and

Mohammad Shorif Uddin2

1Department of Computer Science and Engineering, Daffodil

International University, Dhaka, Bangladesh

2Department of Computer Science and Engineering, Jahangirnagar

University, Dhaka, Bangladesh

Abstract. Ascochyta blight, Anthracnose, Mold and Rust are the four most common

diseases of lentil leaves that extremely affect the lentil field. Nevertheless, current

research deficiencies a real-time detection tool for lentil leaf diseases, making it

impossible to ensure the health of lentil plants. In this chapter, histogram

equalization and gamma correction method are studied as image enhancement

methods with three deep transfer learning architectures VGG16, Inceptionv3, and

ResNet50 is investigated to perform the classification of lentil leaf diseases from the

images. Gradient Energy Measure (GEM) Filter is applied after image enhancement

to clearly visible the features from the im-age. The main focus of this chapter is to

find out the perfect image enhancement technique with gradient filter and accurate

deep learning architecture to classify lentil leaf diseases with the highest accuracy.

32

A dataset with four different types of leaf disease images is collected from the lentil

field used for this experiment. The experimental result shows that the histogram

equalization techniques with Inceptionv3 outperform than the other methods. It

achieves an accuracy of 98.13% for classifying lentil leaf diseases.

Framework for Diabetes Prediction using Machine

Learning Techniques through Swarm Intelligence

C. Kalpana, B. Booba

Dept. of CSE VISTAS, Vel’s University, Chennai

Abstract. Diabetes is regarded as a lingering and fatal disease that affects people all

over the world. It curtails life anticipation and makes people more susceptible to

cardiovascular disease. An effective diabetes prediction can help people take

effective preventive measures. Medical data is complicated and unstructured,

making it difficult to accurately forecast disease. However, much research has been

conducted on diabetes-prediction, it remains a big challenge. This study purpose is

to characterize the issue and develop a machine learning model to tackle it. In this

work, different attributes like BMI, Age, Blood pressure, Blood sugar, and so on has

been used for diagnosing diabetes. Several machine learning techniques Support

Vector Machine (SVM), Naïve Bayes, XGBoost were deployed to predict diabetes.

Further, the ML algorithms were optimized by applying the Binary particle Swarm

optimization (BPSO) algorithm. ML algorithm achieved high accuracy with

lifestyle attributes. The ML algorithms were evaluated by deploying various

measures like Accuracy, F1-Measures, Recall and Precision. The XGBoost method,

when paired with other algorithms, may reliably predict the onset of diabetes by 82

percent. The research work main purpose is to develop a paradigm that employs

machine learning techniques to help medical practitioners predict diabetes early.

A Graphical Approach for Image Retrieval Based on Five

Layered CNNs Model

Mohammad Khalid Imam Rahmani

College of Computing and Informatics, Saudi Electronic University,

Riyadh, Saudi Arabia

Abstract. Image processing is an important field in the computer vision domain. A

lot of work has been done for the processing of image data in various fields like

science and technology, defence, medical, space science for satellite imagery

analysis, seismology, traffic control, crime control, publishing, and other emerging

33

research areas. There are different levels of complexities for the accurate retrieval

of images as most of the images are affected by different kinds of noise and other

factors. In this proposed work, I have performed the work of image retrieval using

two methods: firstly, processing for de-noising and filtering of the dataset of images

taking density parameter 0.7 and adaptive gamma parameter constant value 0.5. The

obtained images are then processed by Convolutional neural networks (CNNs). The

5-layer convolutional neural network has been used for the best features extraction

and then the algorithm is finally optimized using GA (Genetic Algorithm). In my

work I have used 5*5 fold convolutional layers and compared the results with the

previous approach Deep Convolutional neural network (DCNN). Finally, the

Genetic Algorithm is implemented to obtain the best-optimized value. The proposed

work is validated with a graphical-based approach using the mathematical results in

terms of peak signal-to-noise ratio (PSNR), mean-squared error (MSE), and the

processing time of the algorithm. The result parameters of the proposed algorithm

clearly show better performance as com-pared to the previous approach.

Statistical Post-processing Approaches for OCR Texts

Quoc-Dung Nguyen1,5, Duc-Anh Le2, Nguyet-Minh

Phan3, Nguyet-Thuan Phan4 and Pavel Kromer5

1Van Lang University, 45 Nguyen Khac Nhu, Co Giang Ward,

District 1, Ho Chi Minh city, Vietnam

2The Institute of Statistical Mathematics, Tokyo 101-8430, Japan

3Sai Gon University, 273 An Duong Vuong, Ward 3, District 5, Ho

Chi Minh City, Vietnam

4University of Science, VNU-HCM, 227 Nguyen Van Cu, Ward 4,

District 5, Ho Chi Minh City, Vietnam

5Technical University of Ostrava, 17. listopadu 15, 708 33, Ostrava-

Poruba, Czech Republic

Abstract. Low quality of scanned documents and limitations in text recognition

methods result in different error types in OCR-generated texts. Hence, OCR error

detection and correction are essential OCR post-processing tasks for improving the

OCR text readability and usability. In this paper, we present and dis-cuss the

statistical linguistic features obtained from text corpora and OCR text datasets and

employed in OCR post-processing approaches. In addition, we show our two

statistical language models based on these linguistic features and their OCR error

correction performances on two published data-bases attracting research efforts in

text recognition and correction, one data-base in the ICDAR 2017 OCR post-

correction competition and the other database in the Vietnamese online handwriting

recognition competition.

34

FPGA Implementation of Masked-AE$HA-2 for Digital

Signature Application

M M Sravani1, S Ananiah1, M Prathyusha Reddy1, G

Sowjanya1, Nabihah. A2

1School of Electronics Engineering, VIT Chennai, India

2Universiti Tun Hussein Onn Malaysia, Malaysia

Abstract. Authentication and data integrity are essential features in cryptographic

algorithms for generating the digital signature. It will enhance trusted

communication in a wireless network. Hash functions are the best choice for

generating the digital signatures at the transmitter end and validates the original data

at the receiver side in the open public access. These hash functions are prone to

advanced attacks such as Side-Channel Analysis (SCA), birthday, and pre-image

collision. A hybrid Masked AE$HA-2 hash function has been pro-posed to increase

the security strength of digital signature for effective shielding against such attacks.

The proposed architecture includes a masked Advanced Encryption Standard (AES-

256) followed by the secured hash algorithm (SHA 256) yielding a highly secured

Masked AE$HA-2 crypto-style. The masked AES algorithm has the advantage of

combining a false key with the real key to hide the original data, thus significantly

improving the security. Further, in conventional SHA-2, the message expansion has

been re-placed with a sliding window protocol to minimize the computational time.

Hardware implementation on Virtex 7 device with the help of Xilinx Vivado tool

achieves low computational time of 680 ns for generating the masked AE$HA-2

hashed value.

A Framework for Improving the Accuracy With Different

Sampling Techniques for Detection of Malicious Insider

Threat in Cloud

S. Asha1, D. Shanmugapriya2 and G. Padmavathi1

1Department of Computer Science, Avinashilingam Institute for

Home Science and Higher Education for Women, Coimbatore,

641043 Tamilnadu, India

2Department of Information Technology, Avinashilingam Institute

for Home Science and Higher Education for Women, Coimbatore,

641043 Tamilnadu, India

Abstract. Cloud computing provides more beneficial services to its users with

limited cost. Cloud is prone to many threats, and one of the major threats is the

malicious insider threat. Detection of malicious insider threats is more challenging,

35

and many cloud datasets are available to detect a malicious insider. In real-time data

collection, the data set is prone to a class imbalance problem. Minority class related

to insider threat events has a smaller number of in-stances, whereas majority class

related to non-insider threats has a minimum number of instances. Supervised

classification techniques provide a better result for the classification of the majority

class and a less accurate result for the minority class. Classification without treating

the imbalanced class data results in adverse effects in prediction. In this paper,

different sampling techniques are implemented to accurately handle the imbalanced

class data to detect malicious insider threats in cloud computing. The performance

of different sampling techniques is compared by implementing Support Vector

Machine (SVM) algorithm using the performance metrics such as accuracy, f-score,

precision and recall.

Eliminating racial bias at the time of detection Melanoma

using Convolution Neural Network (CNN)

Md. Abdullah Al Noman Majumder1, Eimon Hossain

Taief1, Md. Nurul Amin Bhuiyan1, M. F. Mridha2,

Aloke Kumar Saha1

1University of Asia Pacific, Bangladesh

2Bangladesh University of Business and Technology, Bangladesh

Abstract. Melanoma considers deadly cancer that can cause the death of a person if

not distinguished at an initial stage. Although Melanoma is most common in white

skin people and can be detected at an early stage using AI, white skin people have a

much lower death rate from this cancer. But when black skin people have

Melanoma, AI can’t detect it at an early stage because most of the time, the machines

are trained with Dermoscopic pictures of white people, which leads to a higher

mortality rate for black skin people. As a result, people don’t want to trust the AI

system at the time of Melanoma detection. In this paper, we proposed a model with

whatever black or white skin it can easily detect using machine learning. In this case,

we will use the Convolution Neural Network (CNN) of machine learning to detect

Melanoma at an early stage so that the death rate caused by Melanoma cancer can

be reduced. The proposed method can detect Melanoma with an accuracy of 88.9%

for both skin people which may significantly decrease the mortality rate.

Customer Churn Analysis using Machine Learning

Ritika Tyagi and Sindhu K

Department of ISE, BMS College of Engineering, Bangalore, India

Abstract. Many companies lack awareness about the different kinds of customer

deviations that exist in today’s world. There can be many reasons that factor the

churn rate of a company, ranging from the success of a product, reputation of the

36

brand, extra services, accessibility, price range and many others. It’s usually very

tedious to shortlist a particular reason that is causing a higher churn rate than the

others manually. Recognizing this problem, this paper answers some of the churn

analysis questions through the development of an efficient churn analysis machine

learning based model that performs various functions. The proposed work is broken

down into two phases. First being, data analysis followed by churn prediction. For

data analysis, multiple graphs are plotted with different features to gain interesting

insights on the shape and nature of the company’s churn rate and to narrow down

on which combination of features might be more heavily correlated with the

predictor variable ‘churn’. For churn prediction, a classification model was built that

comprised of six algorithms. Further on, cross validation and hyperparameter tuning

was performed on all the models. An ensemble model was also built to increase

model accuracy and finally, performance evaluation was done to check the best built

model. Ultimately, the model giving the best results in the performance evaluation

phase is chosen to be used for the end-to-end model use. In the proposed work, XG

Boost Classifier proves to be the best performing algorithm for the prediction of

customer churn.

A Comparative Study of Hyperparameter Optimization

Techniques for Deep Learning

Anjir Ahmed Chowdhury, Argho Das, Khadija

Kubra Shahjalal Hoque, and Debajyoti Karmaker

Department of Computer Science, American International

University-Bangladesh

Abstract. Algorithms for deep learning (DL) have been widely employed in a variety

of applications and fields. The hyperparameters of a deep learning model must be

optimized to match different challenges. For deep learning models, choosing the

optimum hyperparameter configuration has a direct influence on the model's

performance. It typically involves a thorough understanding of deep learning

algorithms and their hyperparameter optimization (HPO) techniques. Although

there are various automatic optimization approaches available, each has its own set

of advantages and disadvantages when applied to different datasets and

architectures. In this paper, we analysed which algorithm takes the longest

optimization time to optimize an architecture and whether the performance of HPO

algorithms is consistent across different datasets and architectures. We selected

VGG16 and ResNet50 architectures, CI-FAR10 and Intel Image Classification

Dataset, as well as Grid search (GS), Genetic algorithm (GA), Bayesian

optimization (BO), Random search (RS), Hyperband (HB) and Particle swarm

optimization (PSO) HPO algorithms for comparison. Due to the lack of pattern, it is

challenging to determine which approach obtains the best performance on different

datasets and architecture. The results show that all of the algorithms have similar

results in terms of optimization time. This research is expected to aid DL users,

developers, data analysts, and researchers in their attempts to use and adapt DL

models utilizing appropriate HPO methodologies and frameworks. It will also help

37

to better understand the challenges that currently exist in the HPO field, allowing

future research into HPO and DL applications to move forward.

Fault Location on Transmission Lines of Power Systems

with Integrated Solar Photovoltaic Power Sources

Thanh H. Truong1, Duy C. Huynh1, and Matthew W.

Dunnigan2

1Ho Chi Minh City University of Technology (HUTECH), Ho Chi

Minh City, Vietnam

2Heriot-Watt University, Edinburgh, United Kingdom

Abstract. This paper proposes a fault location technique on transmission lines of a

power system with integrated solar photovoltaic (PV) power sources that is based

on a solution of an optimization problem. It is realized that the power systems are

increasingly complicated as renewable energy power sources are integrated, of

which wind and solar power sources are the most popular. This leads to a great

challenge in the fault location on the transmission line. An advanced cuckoo search

(ACS) algorithm is proposed to improve the searching performance and applied to

solve this problem. The obtained results of applying the ACS algorithm are

compared to those of applying the cuckoo search (CS) and particle swarm

optimization (PSO) algorithms. The comparison is to confirm the effectiveness of

the proposals.

Emergency Vehicle Detection Using Deep Convolutional

Neural Network

Samiul Haque, Shayla Sharmin and Kaushik Deb

Department of CSE, Chittagong University of Engineering &

Technology (CUET), Chattogram-4349, Bangladesh

Abstract. In densely populated cities, emergency vehicles getting caught in traffic is

a regular occurrence. As a result, emergency vehicles arrive late, resulting in asset

and human life losses. It is critical to treat emergency vehicles differently to avoid

losses. The purpose underlying this research is to preserve human lives and reduce

losses. For this, an automated method for detecting emergency vehicles is

implemented. Ambulance and fire trucks are considered an emergency, and other

vehicles are considered non-emergency vehicles in the proposed method. Initially,

it identifies several vehicles from an image. The YOLOv4 object detector

accomplished this part of the method. The identified vehicles are the region of

interest for the rest of the research. Finally, the method classifies the vehicles into

emergencies or non-emergencies. This study contributes by developing a model

38

based on rigorous testing and analysis and includes a viral algorithm in deep

learning: convolutional neural network (CNN). Furthermore, the transfer learning

technique with VGG16's fine-tuned model is employed for emergency vehicle

detection. On the Emergency Vehicle Identification v1 dataset, this model had an

average accuracy of 82.03%.

Emotion Recognition from Speech using Deep Learning

MD. Muhyminul Haque1 and Kaushik Deb

Department of CSE, Chittagong University of Engineering &

Technology (CUET), Chattogram-4349, Bangladesh

Abstract. For more than a decade, emotion recognition from speech has been a major

research topic, following in the footsteps of its "big brothers," speech and speaker

recognition. It's currently a growing field of study targeted at improving human-

machine interaction. Our main goal is to propose a method that allows computers to

identify eight emotions in speech. Initially, the audio files are passed through a

Noise Reduction algorithm based on Spectral gating. 15 different spectral & Timbre

features are then extracted from this audio data. Finally, the method classifies the

audio to a certain emotion class. This research contributes significantly by

developing two models based on rigorous testing, fine-tuning, and analysis that use

two of the most popular deep learning algorithms: Artificial Neural Network (ANN)

and Long Short-Term Memory (LSTM) Network. The ANN and LSTM models

exhibited an average accuracy of 88.3 percent and 87.4 percent using five different

datasets.

Secure predictive analysis on heart diseases using

partially homomorphic machine learning model

M.D. Boomija, S.V. Kasmir Raja

Department of CSE, SRM Institute of Science & Technology,

Kattankulathur, Tamil Nadu, India

Abstract. Cardiovascular disease is the most important reason for death worldwide

and significant public health distress. Timely prevention and treatment are possible

by early prediction of the disease. However, there is necessary to include or vary

new risk factors to improve the prediction models' performance. It is one of the best

ways to make development towards human-level AI. The machine learning (ML)

algorithms PCA (Principal Component Algorithm) and XGboost classification are

used to process the user queries and send the prediction. A major constraint is to

secure the user queries submitted to the prediction models in order that the patient

can submit their questions in an encrypted format to ensure security. It motivates us

to develop a predictive model PHML which combines Partial Homomorphic

Encryption and Ma-chine Learning algorithms PCA and XGboost classification.

39

The model is implemented in Amazon SageMaker with the dataset stored in Amazon

S3 using the above algorithms. The patient query was submitted to the cloud with

the encrypted format by the proposed partial homomorphic encryption algorithm.

The machine learning algorithms predict the user queries, which are in encrypted

form. The dataset includes multiple attributes like age, height, weight, gender,

smoking, alcohol intake, physical activity, systolic blood pressure, cholesterol,

glucose, diastolic blood pressure, and medical notes. With all features, doctors try

to predict whether our individual has a high risk of cardiovascular.

Quality Analysis of PATHAO Ride-sharing Service in

Bangladesh

Md. Biplob Hosen1, Nusrat Jahan Farin2, Mehrin

Anannya1, Khadija Islam3, and Mohammad Shorif

Uddin1

1Jahangirnagar University, Savar, Dhaka, Bangladesh

2Stamford University Bangladesh, Dhaka, Bangladesh

3Sonargaon University, Dhaka, Bangladesh

Abstract. This research intends to analyse the factors that influence the user's

behavioural intention on one of the most popular ride-sharing services in

Bangladesh: PATHAO. These factors are derived from few speculations,

particularly diffusion of innovation, theory of planned behaviour, and technology

acceptance model. This study utilizes a quantitative methodology with a total of

1,535 respondents. The collected data is being analysed for the current state of

service quality by doing an analysis about the users' satisfaction using machine

learning algorithms and entropy techniques. By analysing this study, prediction can

be made about users' satisfaction i.e., by improving which criteria of service quality

can augment the users' satisfaction in future.

Robot Path Planning using β Hill Climbing Grey Wolf

Optimizer

Saniya Bahuguna and Ashok Pal

Chandigarh University, India

Abstract. Path planning is a computational problem called the navigation problem

or the piano mover's problem that requires establishing the sequence of viable

designs that takes an object from its origin towards its destination. Computational

modelling, computer animation, robotics, and computer gaming all use the phrase.

A competent path planning technology of mobile robots can save a ton of time, yet

40

diminish the wear and capital venture of mobile robots. Several approaches for

mobile robot path planning have been explored and published in the literature. This

study deployed a hybrid of the Gray Wolf Optimization (GWO) and β Hill Climbing

method called β Hill Climbing Grey Wolf Optimizer (β-HCGWO) to tackle the

problem of robot path planning. In the test simulations of the robot path planning,

we used a map with three circular obstacles. β-HCGWO algorithm was adapted to

this problem. Its performance compared to other metaheuristic algorithms was

evaluated for solving the robot path planning problem. The results obtained showed

a better optimal path found for the used test map.

An Image Steganography Technique based on Fake DNA

Sequence Construction

Subhadip Mukherjee1, Sunita Sarkar2, and Somnath

Mukhopadhyay2

1Department of Computer Science, Kharagpur College, Kharagpur

721305, India

2Department of Computer Science and Engineering, Assam

University, Silchar 788011, India

Abstract. Steganography is the process of using a cover or medium such as

photograph, audio, text, video etc. to shield information from the outer world. A

new approach based on DNA computing for hiding information within an image

using the least significant bit (LSB) is proposed in this paper. To do this, the DNA

is decomposed by four nucleotides namely adenine, thymine, guanine and cytosine.

Here, the confidential data bits are encrypted within the DNA sequence then

concealed within the cover image. This process transmutes the original cover image

into a stego-image which is completely trustworthy to avoid human visual system,

and the confidential data is impossible to detect. The empirical findings show the

effectiveness of the suggested approach by producing 0.784 bpp of hiding power

with an average 56.24 dB of peak-signal to noise-ratio (PSNR) which makes it a

strong image steganography technique.

Artificial Intelligent Based Control of Improved

Converter for Hybrid Renewable Energy Systems

L. Chitra and Kavitha Kumari. K. S

Department of Electrical and Electronics Engineering, Aarupadai

Veedu Institute of Technology, Vinayaka Missions Research

Foundation, Chennai-603104, India

Abstract. Advancements of renewable energy technology and consequent rise in

petroleum prices result in popularity of hybrid renewable energy systems (HRES).

41

Due to utilization of RES to generate electricity, solar PV energy generation systems

have been assessed as a leading energy system by power providers all over the

world. In addition, owing to higher efficiency and independent management of

active and reactive power employing converters with partial capacity, DFIGs are

more often used in the generation of wind energy. Even though the above-mentioned

renewable energy systems are thought to be potential power generators, one

disadvantage of these energy solutions is their unpredictability and reliance on

weather and climatic circumstances. Hence an efficient approach is designed

utilizing landsman converter for DFIG and PV systems performing noise free

voltage stress reduction. A PWM based PI controller is exploited that adopts fire fly

algorithm for controlling the maxi-mal power tracking point. The DC voltage is

inverted to AC by a grid synchronized 3ϕ VSI with LC filter ensuring smooth

operation reducing harmonics. Simulation of the proposed approach is carried out

in MATLAB and obtained outputs revealed minimal THD value of 1.8%.

A Review on Unbalanced Data Classification

Arvind Kumar1, Shivani Goel1, Nishant Sinha2, and

Arpit Bhardwaj3

1Computer Science Engineering Department, Bennett University

Greater Noida, India

2Pitney Bowes Software, Noida, India

3Computer Science and Engineering Department. Mahindra

University, Hyderabad, India

Abstract. Classification is a supervised machine learning technique to categorize

data into a predefined and distinct number of classes. Again, in the real world, most

of these data set are unbalanced. If one of its classes contains significantly fewer

samples than other classes, this class is called minority class and this data-set is

called the unbalanced data-set. The imbalanced property of the data set highly

influenced the performance of traditional classification techniques, and classifiers

become biased toward the majority class. For the classification of an unbalanced

data-set, different machine-learning techniques are presented by various

researchers. In this paper, an attempt is made to summarize popular ML

classification techniques to handle an unbalanced data set. This paper classifies the

existing techniques into three groups: data level approach, algorithm level approach,

and classifier's ensemble. This paper also discusses the brief technical details,

advantages and disadvantages of these methods. Finally, some of the popular

unbalanced data sets available on the UCI repository are also summarized.

42

A Comparative Study of Meta-heuristic Algorithms based

on the solution of VRPTW in E-logistics

Nesrine Bidani1, Hela Moalla Frikha1 and Adnan

Yassine2

1OLID Laboratory, ISGI Sfax, University of Sfax, Tunisia

2LMAH, University of Havre, France

Abstract. Vehicle Routing Problem (VRP) is very important in operational research

and in logistic domain. Also, it is an NP-hard problem and has many variants

considering some different criteria’s. Indeed, our context focuses in the case of VRP

with Time Windows (VRPTW) in E-logistic and E-commerce fields based on multi-

objective optimization. This optimization is based on requests for transport between

industry and customers for the reason of cost, capacity, satisfying precedence, and

time constraints. In this paper, to solve this problem and evaluate the performance

of our optimization approach, we present a comparative analysis that compare

between existing resolution methods generally and metaheuristics algorithms

especially ac-cording to an overview of these optimization techniques based on

finding the best solution of VRP and VRPTW. According to the literature review of

these algorithms, we provide the best method to be applied when we would solve

our studied problem. So, the goal of this work is to compare meta-heuristics methods

that are presented in literature to obtain an optimal solution by applying a best

algorithm using different optimization techniques to solve our problem using some

instances. After analysing many existing studies, we can see and conclude that our

proposed approach is able to solve our studied problem. In order to achieve the

objectives of this proposed approach, we should facilitate the routine work in

numerous online sales companies by applying optimal approaches. So, we want

realize our two main objectives which are: maximizing of quality of customer

service and minimizing the cost of transport.

1

Soft Computing Research Society

www.scrs.in