Preface |
|
xv | |
List of Figures |
|
xvii | |
List of Tables |
|
xxi | |
List of Contributors |
|
xxiii | |
List of Abbreviations |
|
xxvii | |
1 Classification of Histopathological Variants of Oral Squamous Cell Carcinoma Using Convolutional Neural Networks |
|
1 | (14) |
|
|
|
|
|
|
2 | (2) |
|
1.2 Convolutional Neural Networks |
|
|
4 | (3) |
|
1.2.1 Convolutional Layer |
|
|
5 | (1) |
|
|
5 | (1) |
|
1.2.3 Fully Connected Layers |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
1.2.9 Steps Involved in Convolutional Neural Network |
|
|
7 | (1) |
|
1.3 Proposed Convolutional Neural Network |
|
|
7 | (5) |
|
1.3.1 Performance Evaluation for CNN Models |
|
|
8 | (2) |
|
1.3.2 Comparative Result Analysis |
|
|
10 | (2) |
|
|
12 | (1) |
|
|
12 | (3) |
2 Voice Recognition Using Natural Language Processing |
|
15 | (10) |
|
|
|
|
|
15 | (2) |
|
|
17 | (2) |
|
2.2.1 Automatic Speech Recognition |
|
|
17 | (1) |
|
2.2.2 Auto-detect Language |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (3) |
|
|
22 | (1) |
|
|
22 | (3) |
3 Detection of Tuberculosis Using Computer-Aided Diagnosis System |
|
25 | (22) |
|
Murali Krishna Puttagunta |
|
|
|
|
|
26 | (2) |
|
|
28 | (1) |
|
|
28 | (2) |
|
3.3.1 Rule-Based Algorithm |
|
|
28 | (1) |
|
3.3.2 Pixel Classification |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
30 | (3) |
|
|
30 | (1) |
|
3.4.2 Shape Descriptor Histogram |
|
|
31 | (1) |
|
3.4.3 Curvature Descriptor |
|
|
31 | (1) |
|
3.4.4 Local Binary Pattern (LBP) |
|
|
31 | (1) |
|
3.4.5 Histogram of Gradients |
|
|
32 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
34 | (3) |
|
|
37 | (1) |
|
|
38 | (9) |
4 Forecasting Time Series Data Using ARIMA and Facebook Prophet Models |
|
47 | (14) |
|
|
Terrance Frederick Fernandez |
|
|
|
|
|
48 | (2) |
|
|
50 | (5) |
|
4.2.1 Data Analysis Using ARIMA Model |
|
|
51 | (4) |
|
4.3 Data Analysis Using Facebook Prophet Model |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (4) |
5 A Novel Technique for User Decision Prediction and Assistance Using Machine Learning and NLP: A Model to Transform the E-commerce System |
|
61 | (16) |
|
|
|
|
|
|
62 | (2) |
|
|
64 | (4) |
|
|
68 | (4) |
|
|
72 | (2) |
|
5.5 Conclusion and Future Scope |
|
|
74 | (1) |
|
|
75 | (2) |
6 Machine Learning-Based Intelligent Video Analytics Design Using Depth Intra Coding |
|
77 | (10) |
|
|
|
|
|
|
78 | (4) |
|
|
80 | (1) |
|
|
80 | (1) |
|
6.1.3 Geometric Depth Modeling |
|
|
80 | (1) |
|
|
80 | (1) |
|
6.1.4 Depth Coding Based on Geometric Primitives |
|
|
81 | (1) |
|
6.2 Video Analytics Design Using Depth Intra Coding |
|
|
82 | (1) |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
85 | (2) |
7 A Novel Approach for Automatic Brain Tumor Detection Using Machine Learning Algorithms |
|
87 | (16) |
|
|
|
|
|
88 | (2) |
|
|
89 | (1) |
|
7.2 Image Processing Approach-Detection of Brain Tumor From MRI Images |
|
|
90 | (4) |
|
7.3 Machine Learning Approach-Detection of Brain Tumor From MRI Images |
|
|
94 | (4) |
|
7.4 Nano-Robotic Approach-Detection of Brain Tumor From Mn Images |
|
|
98 | (1) |
|
|
99 | (4) |
8 A Swarm-Based Feature Extraction and Weight Optimization in Neural Network for Classification on Speaker Recognition |
|
103 | (12) |
|
|
|
|
Terrance Frederick Fernandez |
|
|
|
104 | (1) |
|
8.1.1 Swarm-based Feature Extraction Merits |
|
|
104 | (1) |
|
8.1.2 Objectives of Our Chapter |
|
|
105 | (1) |
|
|
105 | (2) |
|
8.2.1 Mel Frequency Cepstral Coefficients (MFCC) |
|
|
106 | (1) |
|
8.2.2 Swarm Intelligence (SI) |
|
|
106 | (1) |
|
8.2.3 Text-independent Speaker Identification |
|
|
106 | (1) |
|
8.2.4 Voice Activity Detection (VAD) |
|
|
107 | (1) |
|
8.3 Differential Evolution Technique (DE) |
|
|
107 | (1) |
|
8.4 Survey on Swarm Intelligence |
|
|
107 | (1) |
|
8.5 Our Framework and Metrics |
|
|
108 | (2) |
|
8.6 Results and Discussion |
|
|
110 | (2) |
|
|
112 | (3) |
9 Fault Tolerance-Based Attack Detection Using Ensemble Classifier Machine Learning with IOT Security |
|
115 | (34) |
|
|
|
|
|
116 | (2) |
|
|
118 | (2) |
|
9.2.1 IoT Security Attacks |
|
|
118 | (6) |
|
9.2.1.1 Perception Layer Attacks |
|
|
118 | (1) |
|
9.2.1.2 Network Layer Attacks |
|
|
119 | (1) |
|
|
119 | (1) |
|
9.3 Deep Learning and IoT Security |
|
|
120 | (3) |
|
9.4 Deep Learning and Big Data Technologies for IoT Security |
|
|
123 | (1) |
|
9.5 Cloud Framework for Profound Learning, Enormous Information Advances, and IoT Security |
|
|
124 | (2) |
|
|
124 | (2) |
|
9.6 Motivation of the Proposed Methodology |
|
|
126 | (1) |
|
|
126 | (14) |
|
9.7.1 Dimensionality Reduction |
|
|
128 | (1) |
|
9.7.2 Independent Component Analysis |
|
|
129 | (1) |
|
9.7.3 Principal Component Analysis |
|
|
130 | (1) |
|
|
131 | (1) |
|
9.7.5 Encryption Decryption Using OTP |
|
|
131 | (4) |
|
|
135 | (1) |
|
9.7.7 Ensemble Classifier SVM, Random Forest Classification |
|
|
136 | (3) |
|
|
139 | (1) |
|
|
140 | (1) |
|
|
141 | (4) |
|
|
145 | (1) |
|
|
146 | (3) |
10 Design a Novel IoT-Based Agriculture Automation Using Machine Learning |
|
149 | (10) |
|
|
|
|
|
|
|
150 | (1) |
|
|
151 | (2) |
|
10.3 Novel IoT-Based Agriculture Automation Using Machine Learning |
|
|
153 | (3) |
|
|
156 | (1) |
|
|
156 | (3) |
11 Building a Smart Healthcare System Using Internet of Things and Machine Learning |
|
159 | (20) |
|
|
|
|
|
11.1 Smart Healthcare-An Introduction |
|
|
160 | (1) |
|
|
161 | (1) |
|
11.3 Motivation of This Work |
|
|
162 | (1) |
|
11.4 Internet of Things-Enabled Safe Smart Hospital Cabin Door Knocker |
|
|
162 | (2) |
|
11.5 Smart Healthcare System Communication Protocol |
|
|
164 | (1) |
|
11.6 IoT-Cloud Based Smart Healthcare Data Collection System |
|
|
165 | (1) |
|
11.7 Use of Machine Learning in Different Fields of Medical Science |
|
|
166 | (1) |
|
11.8 Illness Identification/Diagnosis |
|
|
167 | (2) |
|
11.8.1 Discovery of Drug & Manufacturing |
|
|
167 | (1) |
|
11.8.2 Diagnosis of Medical Imaging |
|
|
168 | (1) |
|
|
168 | (1) |
|
11.8.4 Epidemic Outbreak Prediction |
|
|
168 | (1) |
|
|
168 | (1) |
|
11.8.6 Smart Health Record |
|
|
169 | (1) |
|
11.9 Challenge's Faced Towards 5G With lot and Machine Learning Technique |
|
|
169 | (2) |
|
11.9.1 5G and IoT Empower More Assault Vectors |
|
|
169 | (1) |
|
11.9.2 Smarter Bots Can Likewise Misuse These Assault Vectors |
|
|
170 | (1) |
|
11.10 Future Possibility of Smart Healthcare With Internet of Things |
|
|
171 | (2) |
|
11.11 Conclusion and Future Scope |
|
|
173 | (1) |
|
|
174 | (5) |
12 Research Issues and Future Research Directions Toward Smart Healthcare Using Internet of Things and Machine Learning |
|
179 | (22) |
|
|
|
|
|
180 | (1) |
|
|
180 | (5) |
|
12.3 Healthcare and Internet of Things |
|
|
185 | (1) |
|
12.4 Internet of Things-Based Healthcare Solutions |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
12.5 Machine Learning-Based Healthcare |
|
|
186 | (3) |
|
12.5.1 Future Model of Healthcare-based IoT and Machine Learning |
|
|
187 | (2) |
|
12.6 Wearable System for Smart Healthcare |
|
|
189 | (1) |
|
12.7 Communication Standards |
|
|
190 | (1) |
|
12.8 Challenges in Healthcare Adoption with IoT and Machine Learning |
|
|
191 | (1) |
|
12.9 Improving Adoption of Healthcare System with IoT and Machine Learning |
|
|
192 | (3) |
|
12.9.1 Proof-based Consideration |
|
|
192 | (1) |
|
12.9.2 Self-learning and Personal Growth |
|
|
193 | (1) |
|
|
194 | (1) |
|
12.9.4 Protection and Security |
|
|
194 | (1) |
|
12.9.5 Intelligent Announcing and Representation |
|
|
195 | (1) |
|
12.10 Proposed Solution Based on IOT and Machine Learning for Smart Healthcare Systems |
|
|
195 | (3) |
|
|
198 | (1) |
|
|
199 | (2) |
13 A Novel Adaptive Authentication Scheme for Securing Medical Information Stored in Clouds |
|
201 | (14) |
|
|
|
|
|
202 | (2) |
|
13.2 Adaptive Authentication Scheme |
|
|
204 | (1) |
|
13.3 Information Storage/Update |
|
|
205 | (3) |
|
|
208 | (1) |
|
13.5 Performance Analysis |
|
|
209 | (3) |
|
|
209 | (1) |
|
13.5.2 Integrity Check Bytes |
|
|
210 | (1) |
|
|
210 | (2) |
|
|
212 | (1) |
|
|
212 | (3) |
14 E-Tree MSI Query Learning Analytics on Secured Big Data Streams |
|
215 | (12) |
|
|
|
|
216 | (1) |
|
|
217 | (1) |
|
14.3 Proposed Framework-Secured Framework for Balancing Load Factor Using Ensemble Tree Classification |
|
|
218 | (4) |
|
14.3.1 Fast Predictive Look-ahead Scheduling Approach |
|
|
220 | (1) |
|
14.3.2 Parallel Ensemble Tree Classification (PETC) |
|
|
221 | (1) |
|
14.3.3 Bilinear Quadrilateral Mapping |
|
|
222 | (1) |
|
|
222 | (1) |
|
|
223 | (4) |
15 Lethal Vulnerability of Robotics in Industrial Sectors |
|
227 | (12) |
|
|
Terrance Frederick Fernandez |
|
|
|
|
|
228 | (1) |
|
15.1.1 Robotics' Impact on Manufacturing Industries |
|
|
228 | (1) |
|
15.2 Robotics and Innovation |
|
|
228 | (3) |
|
|
229 | (1) |
|
|
229 | (1) |
|
15.2.3 Various Robot Names and Dimensions |
|
|
230 | (1) |
|
15.3 Robot Service in Hotels |
|
|
231 | (3) |
|
|
233 | (1) |
|
|
233 | (1) |
|
15.4 Cyber Security Attacks on Robotic Platforms |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (3) |
16 Smart IoT Assistant for Government Schemes and Policies Using Natural Language Processing |
|
239 | (16) |
|
|
|
|
|
|
240 | (1) |
|
|
240 | (3) |
|
16.3 Proposed Smart System |
|
|
243 | (4) |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
16.3.4 Language Translation |
|
|
245 | (1) |
|
|
245 | (2) |
|
|
246 | (1) |
|
|
246 | (1) |
|
16.3.5.3 Phonetic analysis |
|
|
246 | (1) |
|
|
246 | (1) |
|
16.3.5.5 Concatenation & Waveform generation |
|
|
247 | (1) |
|
16.3.5.6 Synthesized speech |
|
|
247 | (1) |
|
|
247 | (3) |
|
|
247 | (1) |
|
16.4.2 URL Data Extraction |
|
|
248 | (1) |
|
16.4.3 Image to Text Conversion |
|
|
248 | (1) |
|
16.4.4 Extract Text from PDF |
|
|
248 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
16.4.7 Language Selection |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
16.5 Experimental Results |
|
|
250 | (2) |
|
|
252 | (1) |
|
|
252 | (3) |
Index |
|
255 | (2) |
About the Editors |
|
257 | |