Computational Intelligence in Data Science Third IFIP TC 12 International Conference, ICCIDS 2020, Chennai, India, February 20–22, 2020, Revised Selected Papers 9783030634667, 9783030634674

This book constitutes the refereed post-conference proceedings of the Third IFIP TC 12 International Conference on Compu

330 31 37MB

English Pages 329 [338] Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

Computational Intelligence in Data Science Third IFIP TC 12 International Conference, ICCIDS 2020, Chennai, India, February 20–22, 2020, Revised Selected Papers
 9783030634667, 9783030634674

Table of contents :
Preface
Organization
Contents
Computational Intelligence for Text Analysis
Emotion Recognition in Sentences - A Recurrent Neural Network Approach
1 Introduction
2 Data Sets
2.1 SemEval 2007 Affect Sensing Corpus
2.2 ISEAR
3 Literature Review
4 Model Architecture
4.1 Hybrid Data Set
4.2 Pre-processing
4.3 Sentence Splitter
4.4 Obtaining Emotion Words
4.5 Model
4.6 Post-processing
5 Evaluation and Results
6 Conclusion
7 Future Work
References
Context Aware Contrastive Opinion Summarization
1 Introduction
2 Related Work
3 Proposed Framework
3.1 Contextual Sentiment LSTM Encoder
4 Context-Sensitive Contrastive Summary Model
4.1 Word Attention
4.2 Sentence Attention
4.3 Context-Sensitive Sentiment Classification
4.4 Context-Sensitive Summary Generation
4.5 Context-Sensitive Contrastive Summary Generation
5 Experimental Results
5.1 Context-Sensitive Sentiment Classification Using Soft-Max Classifier
5.2 Context-Sensitive Summary Generation Using Pointer-Generator Network
5.3 Summary Generation by Selecting Sentences Using Contrastive Score
6 Performance Analysis of Proposed Context-Sensitive Summary Method with Existing Methods
6.1 Word Attention
6.2 Context-Sensitive Sentiment Classification
6.3 Context-Sensitive Summary Generation
7 Summary
References
Tamil Paraphrase Detection Using Encoder-Decoder Neural Networks
1 Introduction
2 Related Work
3 Dataset Description
4 Preprocessing
5 Encoder-Decoder Model
6 Experiment
7 Results
8 Error Analysis
9 Conclusions
References
Trustworthy User Recommendation Using Boosted Vector Similarity Measure
1 Introduction
2 Related Work
2.1 Trust-Enhanced Recommendation Techniques
2.2 Trust Model Representation
3 Proposed Recommender System
3.1 Provenance Based Trust Assessment
3.2 Fuzzy Decision Tree Based Classification
3.3 Trust-Boosted Recommender System
4 Experiments and Result Analysis
4.1 Evaluation of Different Weight Strategies
4.2 Comparison with Other Trust-Based Recommender System
5 Conclusion and Future Work
References
Sensitive Keyword Extraction Based on Cyber Keywords and LDA in Twitter to Avoid Regrets
1 Introduction
2 Related Work
2.1 Twitter and Privacy Concerns
2.2 Twitter Topic Identification
3 Methodology
3.1 Tweet Cleaning and Pre-processing
3.2 Topic Keyword Detector Using LDA Model
4 Results and Discussions
4.1 Dataset
4.2 Sensitive Topic Keyword Extractor Using LDA Model
5 Conclusion
References
Sentiment Analysis of Bengali Tweets Using Deep Learning
1 Introduction
2 Related Work
3 Model Development
3.1 Preprocessing
3.2 Deep Learning Models
4 Evaluation and Experimental Results
4.1 Experimental Results and Comparisons
4.2 Model Comparisons and Discussion
5 Conclusion
References
Social Media Veracity Detection System Using Calibrate Classifier
1 Introduction
2 Related Work
3 Dataset
4 Methodology
4.1 Data Store
4.2 Data Pre-processing
4.3 Feature Generation
4.4 Ensemble Classifier
5 Results and Discussions
5.1 Pre-processing
5.2 Feature Generation
5.3 Calibrate Classifier for Rumor Detection System
6 Evaluation Metrics
7 Conclusion
References
A Thesaurus Based Semantic Relation Extraction for Agricultural Corpora
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 System Architecture
3.2 Dataset Details
3.3 Feature Extraction
3.4 Semantic Relation Classifier Based on Multinomial Naïve Bayes (MNB)
4 Results and Discussion
4.1 Evaluation and Performance Analysis of the Sentence Selection Module
4.2 Output for Semantic Relation
5 Conclusion
A Appendix
References
Irony Detection in Bengali Tweets: A New Dataset, Experimentation and Results
1 Introduction
2 Corpus Development
3 Irony Types
3.1 Verbal Irony
3.2 Irony by Clash
3.3 Situational Irony
3.4 No Irony
4 Feature Extraction
5 Model Development
5.1 Naïve Bayes
5.2 Support Vector Machine
5.3 K-Nearest Neighbor
5.4 Random Forest
6 Experiments and Results
6.1 Naïve Bayes
6.2 Support Vector Machine
6.3 K-Nearest Neighbor
6.4 Random Forest
6.5 Comparisons of Models and Discussion
7 Conclusion
References
Computational Intelligence for Image and Video Analysis
Bat Algorithm with CNN Parameter Tuning for Lung Nodule False Positive Reduction
1 Introduction
2 Related Works
3 Problem Statement
4 Proposed Method
4.1 Dataset Details
4.2 Classification Using CNN
4.3 Convolutional Neural Network with Bat Architecture
4.4 Convolutional Neural Network with Particle Swarm Optimization
5 Experimental Results and Discussion
6 Conclusion
References
A Secure Blind Watermarking Scheme Using Wavelets, Arnold Transform and QR Decomposition
1 Introduction
2 Literature Survey
3 Preliminaries
3.1 QR Factorization
3.2 Arnold Transform (AT)
3.3 Normalized Cross Correlation (NC)
4 Proposed Watermarking Scheme
5 Results and Analysis
6 Conclusion
References
Role of Distance Measures in Approximate String Matching Algorithms for Face Recognition System
1 Introduction
2 Related Work
3 Methodology
3.1 Face Recognition System Model
3.2 Approximate String Matching Algorithm Based on Dynamic Edit Distance
3.3 Approximate String Matching Algorithm Based on Dynamic LCSS Distance
3.4 Approximate String Matching Algorithm Based on Hamming Distance
3.5 Approximate String Matching Algorithm Based on Jaro Distance
4 Experiments and Analysis of Results
4.1 Face Recognition with FEI Database
4.2 Face Recognition with AT&T Database
5 Conclusion and Future Work
References
Detection of Human Faces in Video Sequences Using Mean of GLBP Signatures
1 Introduction
2 Survey Work
3 Planned Work
3.1 Normalization
3.2 Signature Extraction of Gabor Filter
3.3 Signature Extraction of LBP
3.4 Classification
4 Experimental Results and Discussion
4.1 Performance of Signature Extraction
4.2 Performance of Categorizer
4.3 Performance of NGLBP
5 Conclusion and Future Work
References
Malware Family Classification Model Using User Defined Features and Representation Learning
1 Introduction
2 Literature Survey
3 Malware Family Classification Model
3.1 Corpus Development and Dataset Creation
3.2 Model Building
4 Experiments and Results
5 Conclusion
References
Fabric Defect Detection Using YOLOv2 and YOLO v3 Tiny
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Choice of YOLO
3.2 Data Set Creation
3.3 Object Detection Algorithm
3.4 System Specification
4 Data Preprocessing
5 Implementation
6 Results and Discussion
7 Conclusion and Future Work
References
Automatic Questionnaire and Interactive Session Generation from Videos
1 Introduction
2 Literature Survey
3 Current Work
3.1 Transcript Generation
3.2 Logical Point Detection
3.3 Question Generation
4 Results
5 Future Work
References
Effective Emotion Recognition from Partially Occluded Facial Images Using Deep Learning
1 Introduction
2 Related Work
2.1 Facial Occlusion Method
2.2 Detecting the Shape of Faces
2.3 Localization of ROI
3 Proposed Work: ACNN for Partial Facial Occlusion
3.1 Convolution and Max-Pooling Layer
3.2 Analysing Facial Image Patches
4 Experimental Results and Discussion
4.1 Dataset
4.2 Results
5 Conclusion
References
Driveable Area Detection Using Semantic Segmentation Deep Neural Network
1 Introduction
2 Related Work
3 Details of Dataset
4 Deep Learning Network
5 Results and Conclusion
References
Data Science
WS-SM: Web Services - Secured Messaging Framework with Pluggable APIs
1 Introduction
2 Existing Work
3 WS-SM Framework
3.1 Security Gateway
3.2 SOAPAction Spoofing API
3.3 WS-Addressing Spoofing API
3.4 Replay of Messages API
3.5 Message Alteration Attack API
3.6 Principal Spoofing Attack API
4 Testing and Discussion
4.1 Compliance Testing
4.2 Vulnerability Testing
4.3 Stress Testing
5 Conclusion
References
Online Product Recommendation System Using Multi Scenario Demographic Hybrid (MDH) Approach
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 Pre Processing
3.2 Identify End User Age Group
3.3 Calculate Product Ranking
3.4 Fuzzy Logic
4 Results and Discussion
4.1 Performance Metrics
4.2 Experimental Results
5 Conclusion and Future Work
References
Simulation of Path Planning Algorithms Using Commercially Available Road Datasets with Multi-modal Sensory Data
1 Introduction
1.1 Elements of Simulation Studies
1.2 Limitations of Simulation Studies
2 Details of Dataset
3 Deep Learning Inferences on RGB Images
4 Range Data Processing
4.1 Description of Data Container
4.2 LIDAR Data Visualization
4.3 Correspondence Between RGB and Range Data
5 Path Planning
5.1 GPS-Based Global Map
5.2 Global Map-Based Local Path Planning
6 Conclusion
References
Implementation of Blockchain-Based Blood Donation Framework
1 Introduction
1.1 Blood Transfusion Service in India
1.2 Issues in Blood Donation
2 Literature Survey
3 Blockchain Technology
4 Proposed System
4.1 Entities in the Proposed System
4.2 The Workflow of the Proposed System
4.3 Privacy and Access Controls
4.4 Blockchain Framework
5 Implementation Details
6 Results and Discussion
7 Conclusion
8 Future Work
References
IoT Based Crop-Field Monitoring and Precise Irrigation System Using Crop Water Requirement
1 Introduction
2 Literature Survey
3 Background
4 Proposed Work
4.1 Architecture Design
4.2 Setting up of Wireless Sensor Network
4.3 Sensing and Logging of Data
4.4 Computation of Crop Water Requirement
4.5 Automated Control of Pump Motor
5 Experimentation
6 Conclusion
References
A Machine Learning Study of Comorbidity of Dyslexia and Attention Deficiency Hyperactivity Disorder
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Methods Used
3.2 Dataset Description
3.3 Experiments
4 Results and Analysis
4.1 Comparison of the Results of Dyslexic and Comorbid Cases
4.2 Comparison of the Results of ADHD and Comorbid Cases
5 Conclusion
References
Program Synthesis: Synthesizing Operators for Integer Manipulation
1 Introduction
2 Literature Survey
3 Overview
3.1 Approach 1: Synthesizing an Operation and an Integer
3.2 Approach 2: Synthesizing a Binary Operation
3.3 Approach 3: Synthesis of a Single Operator to Reduce a List of Integers to an Aggregate
3.4 Approach 4: Synthesis of a Sequence of Operators to Reduce a List of Integers to an Aggregate Using Genetic Algorithm
4 Results
5 Future Work
References
Location Based Recommender Systems (LBRS) – A Review
1 Introduction
2 Location Based Recommendation System (LBRS)
2.1 Standalone Recommendation System
2.2 Sequential Location Recommendation
3 Services Provided by Location Based Recommender Systems (LBRS)
3.1 Geo Tagged Media Based Services
3.2 Point Location Based Services
4 Highlights for Improvement
5 Conclusion
References
Author Index

Polecaj historie