Intro -- Preface -- Contents -- Editors and Contributors -- 1 Generation of Histopathological Images Caption Using CNN and LSTM -- 1 Introduction -- 2 Literature Survey -- 2.1 Convolutional Neural Networks (CNN) -- 2.2 Recurrent Neural Networks (RNN) -- 2.3 Problem with RNN -- 2.4 Solution of Problems with RNN Implementation -- 3 Methodology -- 3.1 Project File Architecture -- 3.2 CNN-LSTM Model -- 4 Results and Discussion -- 5 Conclusion -- References -- 2 FruVeg-Net: A Novel Method for Early Disease Diagnosis in Multi-fruits and Vegetables -- 1 Introduction -- 2 Model Training and Deployment -- 2.1 Pseudo-code -- 3 Materials and Methods -- 3.1 Image Acquisition and Pre-processing -- 3.2 Data Splitting -- 3.3 Transfer Learning -- 3.4 Performance Analysis -- 4 Experiment Results and Discussion -- 5 Conclusion -- References -- 3 Modernizing the Car Registration Process in India: Implementing Blockchain Technology for Increased Transparency, Efficiency, and Security -- 1 Introduction -- 2 Background -- 3 Proposed Framework -- 3.1 Manufacture Layer -- 3.2 Owner and Dealer Layer -- 3.3 Resale Layer -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- 4 A Robust Approach for Categorizing and Fine-Grain Classification of Indian Ethnic Wear -- 1 Introduction -- 2 Literature Review -- 2.1 Category Classification -- 2.2 Attribute Detection -- 2.3 Human Key Point Detection -- 3 Proposed Method -- 3.1 Indian Ethnic Clothing Dataset -- 3.2 Ethnic Category Classification -- 3.3 Experiments -- 3.4 Ethnic Attribute Predictions -- 4 Conclusion and Future Directions -- References -- 5 Synthetic Ancient Tamil Character Generation Using GAN -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Synthetic Character Generation Using GAN -- 4.1 Discriminator Model -- 4.2 Generator Model -- 4.3 Training Generator and Discriminator Models
5 Results and Discussion -- 5.1 Effect of Synthetic Characters on Recognition Accuracy -- 6 Conclusion -- References -- 6 Automatic Text Summarization: Methods, Metrics and Datasets -- 1 Introduction -- 2 Extractive Summarization Methods -- 2.1 TextRank Algorithm -- 2.2 SAFNet Model -- 2.3 Transformer Based Classifier for Long Documents -- 2.4 Text Summarization Based on Keywords -- 2.5 Modified PageRank -- 3 Abstractive Summarization Methods -- 3.1 Phrase Extraction Based CNN-LSTM Model -- 3.2 Hybrid Fuzzy Bi-LSTM Approach -- 3.3 Pointer Generator Network -- 3.4 Bidirectional Auto Regressive Transformer (BART) -- 3.5 Pre-training with Extracted Gap-Sentences for Abstractive Summarization (PEGASUS) -- 4 Evaluation Metrics for ATS Task -- 5 Popular ATS Datasets -- 6 Comparative Study of ATS Methods -- 7 Future Research Directions -- 8 Conclusion and Future Scope -- 9 Statements and Declarations -- References -- 7 Analysis of Stock Market Prediction for Future Trends Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Analysis of Media Helping -- 2.2 Financial Technology Applications of Graph Neural Networks -- 3 Proposed Method -- 3.1 Graph-Based Stock Trend Prediction -- 3.2 Outline of the Structure -- 3.3 Time-Relational Hierarchical Building Blocks -- 3.4 Sequence Aggregation Across Multiple Scales -- 3.5 The Regularization of Soft Clusters -- 3.6 The Layer of Prediction -- 4 Evaluations -- 4.1 Dataset and Experimental Setting -- 4.2 Benchmarks -- 4.3 Overall Efficiency -- 4.4 Sensitivity to Parameters -- 5 Conclusions -- References -- 8 Deep Learning Model for Indian Fake Currency Detection -- 1 Introduction -- 2 Literature Review -- 3 Dataset Preparation -- 4 Methodology -- 5 Results -- 6 Performance Matrices -- 7 Conclusion -- References -- 9 A Two-Level Hybrid CNN Model for IoT Network Attack Identification -- 1 Introduction
1.1 Importance of CNN in Network Traffic Analysis -- 1.2 Motivation -- 1.3 Contributions -- 2 Related Works -- 2.1 Existing Machine Learning Methods for IoT Network Traffic Analysis -- 2.2 Existing Deep Learning Methods for IoT Network Traffic Analysis -- 3 Proposed Method -- 3.1 Proposed Framework -- 3.2 Model Description -- 3.3 Dataset Description -- 4 Experimental Analysis -- 4.1 Model Tuning -- 4.2 Result Analysis -- 4.3 Binary Class Classification -- 4.4 Multi-Class Classification -- 5 Conclusion and Future Work -- References -- 10 Wildfire Smoke Detection Using Faster R-CNN -- 1 Introduction -- 2 Literature Review -- 3 Comparison Table of Previous Techniques -- 4 Methodology -- 5 Proposed System -- 6 Results -- 7 Scope of Research -- 8 Future Scope -- 9 Conclusion -- References -- 11 Sentiment Analysis for Cross-Lingual Kannada-English Language Pair -- 1 Introduction -- 2 Related Work -- 3 Dataset Creation -- 4 Architecture and Methodology -- 4.1 Experimental Setup -- 5 Results -- 6 Conclusion and Future Enhancements -- References -- 12 Clustered-Based Approach for Energy Efficient Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Literature Survey -- 2.1 TEEN Protocol -- 2.2 B. Pegasis Protocol -- 2.3 C. LEACH Protocol -- 3 Proposed Method -- 3.1 LEACH-Low Energy Adaptive Clustering Hierarchy -- 3.2 Improved I-LEACH -- 3.3 Flowchart for Setup Phase -- 4 Results and Discussion -- 4.1 Implementation of I-LEACH -- 5 Conclusion -- 6 Future Scope -- References -- 13 Emerging Trends in Deep Learning Models for Plant Disease Detection: A Review -- 1 Introduction -- 2 Deep Learning Models in Plant Disease Detection -- 2.1 Deep Convolutional Neural Networks (DCNNs) -- 2.2 Recurrent Neural Networks (RNNs) -- 2.3 Generative Adversarial Networks (GANs) -- 2.4 Radial Basis Function Networks (RBFNs) -- 2.5 Supervised Self-Organizing Maps (SOMs)
2.6 Deep Belief Networks (DBNs) -- 3 Performance Comparison of Deep Learning Models for Plant Disease Classification -- 4 Future Research Directions -- 4.1 Challenges Identified for Future Research -- 5 Conclusion -- References -- 14 Motion Feature Aggregation for Video Object Detection Using YOLO Approaches -- 1 Introduction -- 2 Background -- 2.1 Use of Convolutional Neural Network (CNN) -- 2.2 Attention Module -- 2.3 Feature Fusion Approach -- 2.4 Different R-CNN and YOLO Model -- 3 Proposed Model of YOLOv7 -- 4 Methodology -- 4.1 Using a CBAM -- 4.2 Using FPNi -- 5 Experiments -- 5.1 Datasets -- 5.2 Evaluation Metrics -- 5.3 Result Analysis -- 6 Conclusions -- References -- 15 Evaluating Different Image Segmentation Techniques for Improved Otoscope Image Diagnosis -- 1 Introduction -- 2 Materials and Methods -- 2.1 Image Segmentation Techniques -- 3 Results and Discussion -- 4 Conclusion -- References -- 16 SIFT-Based Prickly Plant Identification System for Visually Impaired People -- 1 Introduction -- 2 Literature Survey -- 3 Block Diagram -- 4 Methodology -- 5 Hyperparameter Tunning -- 6 Result -- 7 Conclusion and Future Scope -- References -- 17 A Review on Breast Cancer Detection for Digital Mammograms -- 1 Introduction -- 2 Literature Review -- 3 Future Research Directions -- 4 Conclusion -- References -- 18 Lung Cancer Detection: Classification and Segmentation of CT Images Using 3D CNN -- 1 Introduction -- 2 Related Works -- 3 Methods and Implementations -- 3.1 DataSet -- 3.2 Preprocessing Stage -- 3.3 Classification -- 3.4 Segmentation -- 4 Results -- 5 Conclusion -- References -- 19 An Ensemble Approach for Multiclass Skin Lesion Classification from Dermoscopic Images -- 1 Introduction -- 2 Related Work -- 2.1 Classical Methods -- 2.2 Machine Learning (ML) Methods -- 2.3 Deep Learning Methods -- 3 Methodology
3.1 Dataset and Preprocessing -- 3.2 Transfer Learning Approach -- 3.3 Deep Learning Models -- 3.4 Proposed Ensemble-Based Stacked Approach -- 3.5 Implementation Details -- 4 Experimental Results -- 5 Conclusion -- References -- 20 An Empirical Study on Multi-source Cross-Project Defect Prediction Using Machine Learning -- 1 Introduction -- 2 Background and Related Work -- 2.1 Cross-Project Defect Prediction -- 2.2 Related Work -- 3 Research Methodology -- 3.1 Outlier Detection -- 3.2 Feature Selection -- 3.3 Class Imbalance Handling -- 3.4 Classification -- 3.5 Hyperparameter Tuning -- 4 Experimental Setup -- 4.1 Research Questions -- 4.2 Studied Datasets -- 4.3 Experiments -- 4.4 Evaluation Measures -- 4.5 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- 21 Enhancing Network Intrusion Detection Using Deep Reinforcement Learning: An Adaptive Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 3.1 Deep Reinforcement Learning -- 3.2 Deep Neural Networks -- 4 Dataset -- 4.1 Data Preprocessing -- 5 Methodology -- 6 Experimental Setup and Parameters -- 6.1 Network Architecture -- 6.2 Hyperparameters -- 6.3 Training Procedure -- 6.4 Evaluation Metrics -- 7 Result and Discussion -- 8 Conclusion and Future Scope -- References -- 22 Review of Spoof Detection in Automatic Speaker Verification System -- 1 Introduction -- 1.1 Key Objectives -- 1.2 Organization of This Paper -- 2 Speaker Recognition -- 3 Literature Review -- 3.1 Review Based on Spoofing Attacks -- 3.2 Review Based on Handcrafted Features for Anti-spoofing -- 3.3 Review Based on Deep Models -- 3.4 Review Based on Machine Learning for Anti-spoofing -- 4 Findings -- 5 Conclusions -- References -- 23 A Secure Medical Image Processing Scheme for Detection of Pneumonia Using Transfer Learning -- 1 Introduction -- 2 Related Works