Inventive Communication and Computational Technologies -

Inventive Communication and Computational Technologies (eBook)

Proceedings of ICICCT 2019
eBook Download: PDF
2020 | 1st ed. 2020
XLVI, 1415 Seiten
Springer Singapore (Verlag)
978-981-15-0146-3 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book gathers selected papers presented at the Inventive Communication and Computational Technologies conference (ICICCT 2019), held on 29-30 April 2019 at Gnanamani College of Technology, Tamil Nadu, India. The respective contributions highlight recent research efforts and advances in a new paradigm called ISMAC (IoT in Social, Mobile, Analytics and Cloud contexts). Topics covered include the Internet of Things, Social Networks, Mobile Communications, Big Data Analytics, Bio-inspired Computing and Cloud Computing. The book is chiefly intended for academics and practitioners working to resolve practical issues in this area.  



Dr. G. Ranganathan has been a Professor at Gnanamani College of Technology since 2017. Previously, he has worked at Ranganathan Engineering College and Jayalakshmi Institute of Technology. He has also worked as a Professor at RVS Technical Campus, Karpagam College of Engineering and P.R. Engineering College. He completed his Ph.D. and M.E. at the Information and Communication Engineering Department, Anna University. His areas of interest include biomedical signal processing, neural networks, fuzzy logic, networking and VLSI signal processing. He has published five books and numerous research papers in international journals.

Dr. Joy Iong-Zong Chen received his B.Sc. in Electronics Engineering from the National Taiwan Technical University, Taipei, Taiwan, and his M.Sc. in Electrical Engineering from Dayeh University, Changhua, Taiwan, in 1985 and 1995, respectively. He completed his Ph.D. in Electrical Engineering at the National Defense University, Tao-Yuan, Taiwan, in 2001 and is currently a Full Professor at the Department of Communication Engineering, Dayeh University. Prior to joining Dayeh, he worked at the Control Data Company (Taiwan branch) as a Technical Manager from 1985 to 1996. His research interests include wireless communications, MIMO systems, OFDM systems, and wireless sensor networks. Dr. Joy I.-Z. Chen has published numerous SCI/EI journal papers and holds several patents in Taiwan.  

Dr. Álvaro Rocha holds a Habilitation (postdoc) in Information Science, Ph.D. in Information Systems and Technologies, and M.Sc. in Information Management. He is currently a Professor of Information Systems and Software Engineering at the University of Coimbra, President of AISTI (the Iberian Association for Information Systems and Technologies), and Chair of IEEE SMC Portugal Section Society Chapter. He served as Vice-Chair of Experts for the European Commission's Horizon 2020 Programme, and as an expert at the Italian Ministry of Education, University and Research. His main research interests are information systems planning and management, maturity models, information system quality, online service quality, intelligent information systems, software engineering, e-government, e-health, and IT in education.  



This book gathers selected papers presented at the Inventive Communication and Computational Technologies conference (ICICCT 2019), held on 29-30 April 2019 at Gnanamani College of Technology, Tamil Nadu, India. The respective contributions highlight recent research efforts and advances in a new paradigm called ISMAC (IoT in Social, Mobile, Analytics and Cloud contexts). Topics covered include the Internet of Things, Social Networks, Mobile Communications, Big Data Analytics, Bio-inspired Computing and Cloud Computing. The book is chiefly intended for academics and practitioners working to resolve practical issues in this area.  

Foreword 7
Preface 8
Acknowledgements 9
Contents 10
Editors and Contributors 22
Enhanced Security Mechanism in Cloud Based on DNA Excess 3 Codes 44
1 Introduction 44
1.1 Attributes 45
2 Related Work 46
3 Methodology 49
3.1 Registration at DSP 49
3.2 Registration at KSP 49
3.3 Generating Keys 51
3.4 Encryption and Decryption 51
4 Result and Performance Analysis 51
5 Conclusion 53
References 54
TensorFlow-Based Semantic Techniques for Multi-cloud Application Portability and Interoperability 56
1 Introduction 56
2 Technique Used 57
2.1 The Semantic-Based Approach 57
2.2 TensorFlow 58
3 Related Work 58
4 Gaps in Literature 59
5 Proposed Methodology 59
6 Proposed Methodology 62
7 Conclusion 63
References 64
Enhancing High Availability for NoSQL Database Systems Using Failover Techniques 65
1 Introduction 65
2 Related Work 66
3 Limitations of Earlier Work 67
3.1 High Availability 67
3.2 Lack of Reporting Tools 67
3.3 Lack of Standardization 67
4 Proposed Methodology 68
5 Results 73
6 Conclusion 73
References 74
Implementation of Automated Bottle Filling System Using PLC 75
1 Introduction 76
2 Literature Survey 76
3 Component Description 76
3.1 Inputs 76
3.2 Outputs 77
3.3 Regulator 78
4 Methodology 78
5 Description 78
5.1 Bottle Detection Using IR Sensor 79
5.2 Bottle Filling Operation 80
5.3 Specified Volume of Liquid Introduced 80
6 Simulation Results 80
7 Advantages 81
8 Limitations 82
9 Future Scope 82
10 Conclusion 83
References 83
An Integrated Approach to Network Intrusion Detection and Prevention 84
1 Introduction 84
2 Methods Adopted 86
2.1 KNN (K-Nearest Neighbors) 86
2.2 Cisco Packet Tracer-Blocking Malicious IP Address 86
3 Implementation 87
3.1 KNN-Classification 87
3.2 IP Filtering 89
4 Results and Analysis 90
5 Conclusion 91
References 92
A New Design of Equiangular Circular Cum Elliptical Honeycomb Photonic Crystal Fiber 93
1 Introduction 93
2 Design Considerations for Fiber Optics 94
3 Proposed Structure 94
4 Results and Discussions 98
5 Conclusion 98
Survey of Different Countermeasure on Network Layer Attack in Wireless Network 101
1 Introduction 101
1.1 The Need for Security 102
2 Analysis of Different Attack on Network Layer 102
2.1 Attacks 102
2.2 Comparative Study of Attacks in Network Layer 104
3 Countermeasure Against Attack of Network Layer 104
3.1 Protection Aga?nst Blackhole Attacks 104
3.2 Protection Against Wormhole Attacks 105
3.3 Protection Against Denial of Service Attacks 106
4 Comparison of Different Countermeasure Techniques 107
5 Conclusion 107
References 109
Internet of Things: Service-Oriented Architecture Opportunities and Challenges 111
1 Introduction 111
2 State of Art 112
3 Service-Oriented Architecture in IoT 114
4 Challenges and Opportunities 116
5 Conclusion 117
References 118
Performance Comparison of Multicast Routing Protocols Based on Route Discovery Process for MANET 119
1 Introduction 119
2 Energy-Efficient ERS Expanding Ring Search (E2ERS) 120
3 Performance Comparison 122
4 Conclusion 124
References 125
New Complex Hybrid Security Algorithm (CHSA) for Network Applications 126
1 Introduction 126
2 Related Work 127
2.1 Proposed Work (CHSA Design) 128
2.2 CHSA Generation Center (GC) 131
2.3 CHSA Syntax 134
3 Implementation and Results Analysis 136
4 Conclusion 138
References 141
Performance Assessment of Various Encoding Schemes with Bit Stuffing 143
1 Introduction 143
2 Related Works 144
3 Proposed Work 145
3.1 Arithmetic Encoding and Decoding 145
3.2 Bit Stuffing 146
3.3 Bit De-Stuffing 146
4 Result Analysis 147
5 Conclusion 149
References 150
3D(Dimensional)—Wired and Wireless Network-on-Chip (NoC) 151
1 Introduction 3D-ICS 151
2 3D-Wired and Wireless NoC 153
2.1 Wired NoC 153
2.2 Wireless NoC 153
3 Emerging Technologies 154
4 Survey Results 155
References 156
Performance Analysis of Unified Threat Management (UTM) 158
1 Introduction 158
2 Literature Survey 159
2.1 Survey Analysis 160
3 Techniques to Improve UTM Performance 161
3.1 Splay Trees with Network Statistics 161
3.2 Parallel Processing Using OpenMP 162
3.3 Parallel Processing Using GPU 162
4 Comparative Analysis 162
4.1 Analysis 163
4.2 Numerical Analysis Results 166
5 Conclusion 169
References 169
Development of an Efficient Nondestructive Grading Method for Pomegranate Using Magnetic Resonance Imaging and Neural Network 171
1 Introduction 171
1.1 Magnetic Image Processing Techniques Used for Fruits 172
2 Materials and Methods 174
2.1 Methodological Steps in Detail 175
3 Results 177
4 Conclusions 177
References 178
Implementation of Differential Privacy Using Diffie–Hellman and AES Algorithm 179
1 Introduction 179
2 Differential Privacy 180
2.1 Need for Differential Privacy 180
2.2 Epsilon-Differential Privacy 181
2.3 Application Scenario—VANETs 181
3 System Model and Implementation 182
3.1 D–H Key Exchange Algorithm 183
3.2 Advanced Encryption Standard Algorithm 185
4 Results 185
5 Conclusion 187
References 188
Implementation of Neural Signals in MATLAB (Thought Signals) 189
1 Introduction 190
1.1 What Is a Thought Signal? 190
2 Methodology 191
2.1 Brain and Computer Interface (BCI) 191
2.2 Methods to Implement 191
3 Results and Future Scope 195
3.1 Results 195
3.2 Future Scope 195
4 Conclusion 196
References 196
A Framework for Formal Verification of Security Protocols in C++ 198
1 Introduction 199
2 Proposed Framework to Formally Verify Security Primitives of CSP Coded in C++ 200
2.1 Scyther Model Checker as Verification Engine 201
2.2 Dolev-Yao Channel 202
2.3 The C++ to SPDL Interpreter 203
3 IKE-Internet Key Exchange Protocol 206
4 Verification 207
5 IKE Verification Results 208
6 Conclusion and Future Work 208
References 210
Locality—Aware Scheduling for Containers in Cloud Computing 211
1 Introduction 212
2 Literature Review 212
2.1 Structuring Your Paper 212
3 Methodology 214
4 Results 215
5 Conclusion 217
References 218
TorBot: Open Source Intelligence Tool for Dark Web 220
1 Introduction 220
2 Literature Review 222
2.1 Challenges 222
2.2 Accessing Dark Pages 222
2.3 Analysis of Tor Hidden Services 222
2.4 Open Source Intelligence 223
3 Design and Methodology 223
3.1 Crawler 223
3.2 Intelligence Extractor 224
3.3 Visualizer 225
4 Results and Discussion 225
5 Conclusion and Future Work 226
References 227
A Novel Approach to View and Modify Data in Cloud Environment Using Attribute-Based Encryption 229
1 Introduction 229
2 Issues and Limitations 230
3 Modified Approach 231
4 Data Flow Explanation 231
5 Architecture Diagram 232
6 Modules 234
7 ABE Implementation 235
8 Conclusion and Future Work 235
References 236
Root Cause Detection of Oscillation in Shell and Tube Heat Exchanger Process 237
1 Introduction 237
2 Mathematical Modeling 238
2.1 Energy Balance Equations 238
2.2 Process Parameters and PID Controller Parameters 238
3 Valve Stiction Model 239
3.1 Structure of Pneumatic Control Valve 239
3.2 Closed Loop System with Valve Stiction Model 240
3.3 One Parameter Model 240
4 Oscillation Detection 240
4.1 Bispectrum Analysis 240
4.2 Modified Bispectrum Analysis 241
5 Results and Discussions 241
5.1 Modified Bispectrum of External Disturbance Induced Oscillations for Various Operating Regions in STHX (PV) 245
5.2 Modified Bispectrum of Stiction (Weak Stiction and Strong Stiction) Induced Oscillations for Various Operating Regions in STHX (PV) 245
6 Conclusion 245
References 246
Performance Assessment of Spread Spectrum Communication Receivers 247
1 Introduction 247
2 Related Work 248
3 Proposed Work 249
4 Result Analysis 250
5 Conclusion 257
References 257
Computationally-Light Metrics to Quantify Link Stability in Mobile Sensor Networks 259
1 Introduction 259
2 Metrics to Quantify Link Stability 260
2.1 Normalized Neighbor Degree (NND) 261
2.2 One Hop Two Hop (OTH) Neighborhood 261
2.3 Fraction of Shared and Unshared (FSU) Neighbors 262
3 Simulations 263
3.1 Computation Time 263
3.2 Rank-Based Correlation 264
3.3 Data Gathering Tree Lifetime 265
4 Conclusions and Future Work 266
References 266
MockRest—A Generic Approach for Automated Mock Framework for REST APIs Generation 268
1 Introduction 269
2 Related Work 271
3 Background Study 273
3.1 Unit Testing 273
3.2 Mock Objects 273
3.3 REST API 274
4 Existing Tools 277
4.1 WireMock 277
4.2 SOAP UI 278
5 Motivation 278
6 Proposed Approach 279
6.1 Challenges 279
6.2 MockRest Framework 280
6.3 Create REST API with Java (JAX-RS) Using Jersey 280
6.4 Read XMl File Through JAXB 282
7 Results Observed 283
8 Conclusion 284
References 285
Syntactic Interoperability in Real-Time Systems, ROS 2, and Adaptive AUTOSAR Using Data Distribution Services: An Approach 287
1 Introduction 288
1.1 ROS 2.0 and Adaptive AUTOSAR 288
2 Related Work 288
2.1 ROS Literature Review 288
2.2 Data Distribution Services 290
2.3 Adaptive AUTOSAR 292
3 Background Study 292
3.1 Robot Operating System (ROS) 292
3.2 Data Distribution Services 294
3.3 Adaptive AUTOSAR 296
4 Motivation 297
5 Approach 298
5.1 Communication Management in Adaptive AUTOSAR: Network Socket 298
5.2 ROS 2 Publish–Subscriber 299
5.3 The Connection 300
6 Results 300
7 Conclusion and Future Work 301
References 302
IoT-Enabled Water Quality Monitoring System 305
1 Introduction 305
2 Automated Water Quality Monitoring System 306
2.1 Using Raspberry PI 306
2.2 Digital LCD Display 306
3 IoT-Enabled Water Quality Monitoring System 307
3.1 Architectural Design 307
3.2 Implementation 307
4 Components Involved 309
4.1 Data Retrieval 309
4.2 Ethernet Shield Connectivity 311
4.3 ThinkSpeak–Cloud Connectivity 311
4.4 Website Creation 313
5 Hardware Requirements 314
5.1 Water Level Sensor 314
5.2 Temperature Sensor 314
5.3 Turbidity Sensor 315
5.4 Arduino Uno 316
5.5 Ethernet Shield 317
6 Software Requirements 318
6.1 Arduino IDE 318
6.2 HTML 318
6.3 CSS 318
6.4 Bootstrap 318
7 Summary 319
8 Snapshots 319
References 321
Energy-Efficient Routing-Based Clustering Approaches and Sleep Scheduling Algorithm for Network Lifetime Maximization in Sensor Network: A Survey 322
1 Introduction 322
1.1 Clustering and Routing in WSN 323
1.2 Sleep/Wake-up Algorithm 325
2 Literature Survey 326
2.1 Worked Based on Clustering Protocols 326
2.2 Worked Based on Sleep/Wake-up Protocols 329
3 Conclusion 332
References 334
Journey of Wireless Communication 336
1 Introduction 336
2 Evolution of Mobile Cellular Networks 337
2.1 First Generation 338
2.2 Second Generation 339
2.3 Third Generation 340
2.4 Fourth Generation 341
2.5 Fifth Generation 343
3 Conclusion 343
References 344
A Survey on K-Means Clustering for Analyzing Variation in Data 345
1 Introduction 345
2 K-Means Clustering 346
3 Procedure for Finding Clusters 347
4 Analysis of Data Variation Using K-Means 349
5 Advantages and Disadvantages 349
5.1 Advantages 349
5.2 Disadvantages 350
6 Conclusion 350
Bibliography 351
A Review on Mobile Cloud Computing Interoperability Issues and Challenges 352
1 Introduction 352
2 Background and Motivation 353
2.1 Motivation 354
3 Related Works 355
4 Challenges of MCC 356
5 Research Scopes 357
5.1 Summary 358
6 Conclusions 358
References 359
Filter Bank Modulation in Massive MIMO Scenario 361
1 Introduction 361
2 Related Work 362
3 System Model 362
4 Results and Discussions 364
5 Conclusions 368
6 Future Scope 369
References 369
Autonomous Farming—Visualization of Image Processing in Agriculture 370
1 Introduction 370
2 Related Work 372
3 Proposed Method 372
3.1 Flowchart 373
4 Conclusion and Future Scope 375
References 376
Design and Development of End Effector for Domestic Robots 377
1 Introduction 378
2 Working of the Gripper 378
3 Algorithm 379
4 Threshold Measurement and Tabulation 379
5 Experimental Results 380
6 Conclusion 382
References 383
Total Variation and Alternate Direction Method for Deblurring of Digital Images 385
1 Introduction and Related Work 386
2 Proposed Scheme 387
2.1 Algorithm 388
3 Experimental Results 389
4 Conclusion 391
References 391
Design of MIMO Triangular Microstrip Patch Antenna for IEEE 802.11a Application 393
1 Introduction 393
2 Antenna Design 395
2.1 Antenna Configuration 395
2.2 WLAN MIMO Antennas 396
3 Results and Discussion 396
3.1 Simulated Results 396
3.2 WLAN MIMO Antenna with Stub 397
3.3 Measured Results 398
3.4 Summary 400
References 402
A Hollow Core Bragg Fiber with Multilayered Random Defect for Refractive Index Sensing 404
1 Introduction 404
2 Theoretical Model 405
3 Results and Discussions 408
4 Conclusion 412
References 412
Generation of Multiple Key Based on Monitoring the User Behavior 413
1 Introduction 413
2 Methodology 414
3 Implementation 415
4 Diffie-Hellman Algorithm for Dynamic Key Generation 416
5 Secure and Efficient User Termination 416
6 Module Description 416
7 Advantages 418
8 Conclusion 418
References 418
Towards Convolution Neural Networks (CNNs): A Brief Overview of AI and Deep Learning 420
1 Introduction 420
2 Artificial Intelligence 422
2.1 Story of Birth of Artificial Intelligence with Chronological Order 423
3 Deep Learning 423
3.1 Deep Learning History 423
3.2 Convolution Neural Networks (CNN) 425
3.3 Capsule Neural Networks (CapsNet) 426
4 Problems Faced by Previous Researchers in Artificial Intelligence 426
5 Conclusion 427
References 427
Populating Indian GST Details into Java Apache Derby Database Powered by Glassfish Server 429
1 Categories of DBMS 430
1.1 Hierarchical DBMS 430
1.2 Network DBMS 430
1.3 Object-Oriented DBMS 430
1.4 Relational DBMS 430
2 Uses of Database 431
3 Oracle Database 431
4 Different Ways of Populating Oracle Database 432
4.1 Conventional Path 432
4.2 Direct Path 433
4.3 External Tables 433
5 Indian GST System 433
5.1 Elements of GST 434
5.2 Benefits of GST 434
5.3 Experimental Setup 434
5.4 Results and Discussions 435
6 Conclusion 441
Bibliography 441
Intrusion Detection System Using WoSAD Method 442
1 Introduction 442
2 Proposed Method 443
3 Methodology 445
3.1 Security Requirements 445
4 Conclusion 449
References 449
Blackhole Attack Implementation and Its Performance Evaluation Using AODV Routing in MANET 450
1 Introduction 450
2 Related Work 452
3 Proposed Work 452
4 Simulation Result 454
5 Conclusions 456
References 457
Enhancement of Security Using B-RSA Algorithm 458
1 Introduction 458
1.1 RSA 459
1.2 Blowfish 461
2 Literature Survey 464
3 Proposed Work 465
3.1 B-RSA Encryption 465
3.2 B-RSA Decryption 466
3.3 Example 466
4 Simulation Work 467
5 Conclusion 468
References 468
Analyzing Different Multiparty Computation Techniques 470
1 Introduction 471
2 Related Work 472
3 Multiparty Computation Techniques 473
3.1 Multiplicative Homomorphic Encryption Along with Secure MPC 473
3.2 Additive Homomorphic Encryption with Paillier’s Algorithm 474
3.3 Garbled Circuits Using Quantum Gates 476
4 Comparative Analysis of Techniques 477
5 Conclusion 477
References 478
Power and Delay Comparison of 7:3 Compressor Designs Based on Different Architectures of XOR Gate 480
1 Introduction 480
2 The 7:3 Compressor 481
2.1 Mirror Circuits-Based XOR Gate (Design 1) 483
2.2 4-Transistor XOR Gate (Design 2) 483
2.3 Transmission Gate-Based XOR Gate (Design 3) 485
3 Results and Discussion 485
4 Conclusion 487
Appendix 487
References 488
Survey of Big Data Warehousing Techniques 489
1 Introduction 489
2 Related Work 490
3 Big Data Warehousing Techniques 491
3.1 Apache Spark 491
3.2 Octopus 492
3.3 Preference Aware Hadoop Distributed File System 493
3.4 Optical Data Storage (ODS) 494
3.5 DNA Data Storage (DDS) 495
3.6 Holographic Data Storage (HDS) 495
3.7 Semantic Web Technologies 495
3.8 Columnar NoSQL Cube 496
4 Comparative Analysis of Techniques 496
5 Conclusion 498
References 498
Detecting Denial-of-Service Attacks Using sFlow 500
1 Introduction 500
1.1 OpenFlow 502
2 DoS Attack 503
3 sFlow 504
3.1 Integration of Mininet and sFlow 504
4 Implementation 505
5 Results and Discussion 506
6 Conclusion 507
References 507
Area and Power Efficient Multiplier-Less Architecture for FIR Differentiator 509
1 Introduction 509
2 Constant-Coefficient Multiplication 511
3 Canonic Signed Digit Multiplication 513
4 Optimization of CSD Multiplier 514
5 Results and Discussion 515
6 Conclusion 516
References 516
Optimized Prediction Model to Diagnose Breast Cancer Risk and Its Management 518
1 Introduction 518
2 Objective 519
3 Proposed System 520
3.1 Identifying data sources 520
3.2 Data Preprocessing 521
3.3 Data Visualization 522
3.4 Machine Learning Prediction 522
4 Results 527
5 Conclusion 529
References 529
Smart Cane Design for Indoor and Outdoor Navigation: A Cost-Effective Guide 531
1 Introduction 531
2 Prototype and Product: An Overview 533
3 Product Design Steps 534
4 Design Schedule 536
5 Smart Cane Design and Testing 537
6 Conclusion 540
References 541
Triclustering of Gene Expression Microarray Data Using Coarse-Grained Parallel Genetic Algorithm 543
1 Introduction 543
2 Related Work 545
3 Proposed Methodology 545
3.1 Encoding of Individuals 545
3.2 Fitness Function 546
3.3 Weights 546
3.4 Distinction 546
3.5 Tri-CgPGA 547
4 Experimental Results and Discussions 548
4.1 List of the Parameters 549
4.2 Results on Yeast Dataset 549
4.3 Comparitive Study 550
4.4 GO Term Analysis 550
5 Conclusion 551
References 552
Ensemble Feature Selection to Improve Classification Accuracy in Human Activity Recognition 554
1 Introduction 554
2 Literature Survey 555
3 Proposed Work 555
4 Experimental Setup 558
5 Results and Discussion 558
5.1 Number of Features Selected 559
5.2 Classification Accuracy 559
6 Conclusion 560
References 560
An Exploration on Cloud Computing Security Strategies and Issues 562
1 Introduction 562
1.1 Measured Service 563
1.2 On-Demand Self-service 563
1.3 Broad Network Access 563
1.4 Resource Pooling 564
1.5 Economics of Scale an Expertise 564
1.6 Rapid Elasticity 564
2 Cloud Model Provides Three Types of Services 565
2.1 Software as a Service 565
2.2 Platform as a Service 565
2.3 Infrastructure as a Service 565
3 Attacks on Cloud Computing 565
3.1 Zombie Attacker 565
3.2 Man-In-The-Middle Cryptographic Attack 566
3.3 Side-Channel Attack 566
3.4 Service Level Agreement 566
3.5 Application-Level Security 568
3.6 Data Security 569
3.7 Security Concerns with the Hypervisor 570
3.8 Virtualization Level Security Issues 570
3.9 Sharing of VM images in Cloud Introduces Security Risk 571
4 Cloud Security Problems 572
4.1 Trust Chain in Clouds 572
5 Conclusion Direction 573
References 574
A Hybrid Approach-Based Energy Aware Cluster Head Selection for IOT Application 576
1 Introduction 576
2 Related Work 577
3 Protocol Description 578
3.1 Low Energy Adaptive Clustering Hierarchy 578
3.2 Firefly Algorithm 579
3.3 Firefly Procedure 579
4 Proposed Hybrid Algorithm 580
5 Conclusion 581
References 581
Modified Dive and Rise Technique Incorporating Enhanced Weighted Centroid Localization Algorithm with Ocean Current Mobility Model in Underwater Acoustic Sensor Networks 582
1 Introduction 582
2 Related Works 583
3 Proposed Modified Dive and Rise Technique Incorporating Enhanced Weighted Centroid Localization (EWCL) Algorithm 585
3.1 Drift Model 585
3.2 Dive and Rise Technique 586
3.3 Modified Dive and Rise Technique (MDRT) 587
4 Performance Evaluation 591
4.1 Performance Metrics 591
5 Conclusion 594
References 595
Tree-Based Approaches for Improving Energy Efficiency and Life Time of Wireless Sensor Networks (WSN): A Survey and Future Scope for Research 596
1 Introduction 596
2 Literature Survey 597
3 Analysis of Implications of Application of Tree Data Structures on Overall Performance of WSN 598
3.1 Disadvantages of Minimum Spanning Trees (MST) and Binary Search Trees (MST) 599
3.2 Disadvantages of Self-balancing Variants of Trees 599
3.3 Reasons for Worst-Case Performance of MST, BST, and Self-balancing Variants of Trees When Applied in WSN 599
3.4 Red Black Trees (RBL): Feasibility and Potentials for Application in WSN 600
4 Conclusions 601
References 601
Automated Cyber Threat Intelligence Generation from Honeypot Data 604
1 Introduction 605
2 Proactive Tools for Cyber Threat Intelligence 606
2.1 Cyber Threat Intelligence 606
2.2 State of Art Proactive Technology 606
3 Proposed Solution 608
3.1 Honeypot as Detection Indicators for SIEM 608
4 Experimental Results 609
5 Conclusion and Future Work 610
References 611
Analysis of MPTCP Packet Scheduling, The Need of Data Hungry Applications 612
1 Introduction 612
1.1 Exploration of MPTCP 613
1.2 MPTCP 613
1.3 MPTCP’s Requirements 617
2 Limitations of Existing MPTCP 618
3 Conclusion 618
References 628
Voice Controlled Home Automation Using Blynk, IFTTT with Live Feedback 631
1 Introduction 631
2 Related Work 632
2.1 NodeMcu 632
2.2 Relay Module 632
2.3 Sensing Circuit 633
2.4 Analog Pin Extender (ADS1115) 634
2.5 Blynk 634
2.6 IFTTT 634
3 Existing Techniques 635
3.1 Past Techniques 635
3.2 Present Techniques 635
4 Proposed Technique 635
4.1 Software Code 637
4.2 Blynk Configuration 639
4.3 IFTTT Setup 639
4.4 Hardware 640
4.5 Simulation of Sensing Circuit 640
5 Results 641
6 Conclusion 641
References 646
AD-LIB: Automated Library System 647
1 Introduction 647
2 Related Work 648
2.1 Motivation and Scope 649
2.2 Salient Contribution 649
3 Methodology 650
4 Softwares 651
4.1 MATLAB Guide 652
4.2 National Instruments LabVIEW 653
5 Testing 656
6 Conclusion 657
References 657
Design and Integrate IoT Sensors to RO Water Purifiers for Remote Monitoring and Allowing Users to Pay Per Usage on the Rented RO System 659
1 Introduction 659
2 Objectives 660
3 Literature Survey 661
4 Methodology 661
5 Conclusion 662
References 662
MPTCP a Solution Over Crunch in Bandwidth Requirement for Multimedia Application 664
1 Introduction 664
2 MPTCP and Related Work 665
2.1 MPTCP Working 665
3 MPTCP Progress 665
4 Issues and Analysis 667
5 Conclusion 672
References 672
Design of AYUSH: A Blockchain-Based Health Record Management System 675
1 Introduction 676
2 Blockchain in Health Care 676
2.1 Problems in Healthcare Sector 677
2.2 Advantages of Using Blockchain 677
2.3 Challenges in Implementation 677
3 Familiarization of Tools 678
3.1 Hyperledger Fabric 678
3.2 InterPlanetary File System (IPFS) 678
4 Proposed Work 679
4.1 Architecture 679
5 Methodology 681
6 Conclusion 681
References 682
Support Vector Machine-Based Focused Crawler 683
1 Introduction 683
2 Support Vector Machine 685
2.1 Overview 685
2.2 SVM Working 685
3 Related Work 687
4 Proposed SVM Web Page Classification Model 688
4.1 URLs Screening 688
4.2 Web Page Classification 691
5 SVM Classification System 691
5.1 Preprocessing Phase 691
5.2 Learning Phase 692
5.3 Prediction Phase 693
6 Result Analysis 693
6.1 Experiment Environment 693
6.2 Dataset 693
6.3 Performance Evaluation 693
6.4 Result 694
6.5 Comparative Analysis 695
7 Conclusion 695
References 695
Indoor Object Tracking Using Wi-Fi Access Points 697
1 Introduction 697
2 Related Work 698
3 Proposed System 700
3.1 System Block Diagram 700
3.2 Off-line Fingerprinting and Database Description 700
3.3 Regression Using Deep Neural Network 701
4 Results 704
5 Conclusion 707
References 708
Crime Analysis and Prediction Using Graph Mining 709
1 Introduction 709
2 Crime Analysis and Graph Mining 710
2.1 Advantages of Using Graph Mining 710
2.2 Disadvantages of Using Graph Mining 710
3 Familiarization of Tools 711
3.1 Neo4j 711
3.2 R Programming Language 711
4 Related Work 711
4.1 Overview of Popular Graph Database 712
5 Proposed Work 712
5.1 Architecture Diagram 712
5.2 Methodology 713
6 Conclusion 714
7 Future Scope 715
References 715
A Semi-supervised Approach to Detect Malicious Nodes in OBS Network Dataset Using Gaussian Mixture Model 716
1 Introduction 716
2 Related Work 718
3 Proposed Work 719
3.1 Dataset Cleaning and Feature Selection 720
3.2 Normalization 721
3.3 Principal Component Analysis 722
3.4 Selection of 1% Data from OBS Dataset 723
3.5 Gaussian Mixture Model 724
4 Result Analysis 726
5 Conclusion 727
References 727
Apache Spark Methods and Techniques in Big Data—A Review 729
1 Introduction 729
2 Comparison of Different Methods in Apache Spark 730
3 Conclusion 733
References 733
Artificial Intelligence Applications in Defense 735
1 Introduction 735
2 Ease of Use 736
2.1 Ontology 736
2.2 Knowledge-Based System and AI Supportability 736
2.3 Autonomous Weapon 737
2.4 Terrain Analysis for the Development of the Mission Plan 738
2.5 Multiple Artificial Intelligence Techniques Used in an Aircraft Carrier Landing Decision Support Tool 739
3 Conclusion 741
References 741
Hybrid Approach to Enhance Data Security on Cloud 743
1 Introduction 743
2 Related Work 744
3 Cloud Architecture 745
3.1 Delivery Model 745
3.2 Deployment Model of Cloud Computing 746
4 Methodology 747
5 Result 749
6 Future Work and Conclusions 750
References 751
Security Threats of Embedded Systems in IoT Environment 752
1 Introduction 752
2 IoT Security 753
3 Processor 755
4 Secure Embedded Processor Design Challenges 758
5 Memory Attacks 758
6 Conclusion 761
References 761
Decentralized Bagged Stacking Ensemble Mechanism (DBSEM) for Anomaly Detection 762
1 Introduction 762
2 Literature Review 763
3 Decentralized Stacked Ensemble Model for Anomaly Detection 765
3.1 Decentralization of Architecture 765
3.2 Decentralized Bagged Stacking Ensemble (DBSEM) for Anomaly Detection 766
3.3 Prediction Analysis 768
3.4 Secondary Prediction of Anomaly Data 769
4 Result Analysis 769
5 Conclusion 772
References 772
The Process and Application of Dual Extruder Three-Dimension Printer 774
1 Introduction 774
2 How It Works? 775
3 Components 776
4 Application of Three-Dimension Printers 778
5 Advantages 778
6 Conclusion 778
References 779
Face Detection and Natural Language Processing System Using Artificial Intelligence 780
1 Introduction 780
2 Literature Review 781
3 Proposed Methodology 782
4 Result Analysis 784
5 Conclusion 786
References 786
A Review on Detection of Online Abusive Text 788
1 Introduction 788
2 Literature Review 789
3 Comparison of Different Detection Method for Abusive Text 790
4 Fututre Work 793
5 Conclusion 793
References 793
Security of an IoT Network: A VLSI Point of View 795
1 Introduction 795
2 Security Threats 796
3 Hardware Security Threats 797
3.1 Hardware Trojan Taxonomy 797
4 Identification of Trojans 798
5 Basic Architecture of a Secure Processor 800
6 Implementation Issues 801
7 Counter Measures 802
8 Conclusion 803
References 803
Anomaly Detection Techniques in Data Mining—A Review 805
1 Introduction 805
2 Literature Review 806
3 Comparison of Different Anomaly Detection Techniques 807
4 Conclusion 809
References 809
MAIC: A Proficient Agricultural Monitoring and Alerting System Using IoT in Cloud Platform 811
1 Introduction 811
2 Related Work 812
3 Proposed Architecture 813
4 Intelligent Monitoring 813
4.1 Connecting Sensors 813
4.2 ThingSpeak Monitoring Service 814
4.3 Sending Alerts Using IFTTT Maker Service 818
5 Monitoring Using Firebase Cloud 819
6 The Thinger.io Cloud 821
7 Twitter Analysis 821
8 Conclusion and Future Work 823
References 823
Open Set Domain Adaptation for Hyperspectral Image Classification Using Generative Adversarial Network 825
1 Introduction 825
2 Methodology 826
3 Data Set and Model Description 827
4 Experimental Results 828
4.1 Salinas Data Set 829
4.2 PaviaU Data set 831
5 Conclusion 831
References 833
AHP-FVIKOR Based Access Network Selection in Vehicular Communications 834
1 Introduction 834
2 Related Works 835
3 Proposed Method 835
3.1 FFHE 836
3.2 Weight Assignment Using AHP 837
3.3 FVIKOR-Based Target Network Selection 838
4 Results and Discussions 840
References 842
Measuring Web Content Credibility Using Predictive Models 843
1 Introduction 844
2 Literature Survey 844
3 Methodology 846
3.1 Data Collection 846
3.2 Feature Extraction and Training Data 847
4 Experiments and Results 848
5 Conclusion 851
References 851
Survey on Privacy-Preserving and Other Security Issues in Data Mining 852
1 Introduction 852
2 Literature Survey 854
2.1 Survey of Security Issues in Data Mining 854
2.2 Survey on K-Anonymization Techniques 855
2.3 Data Sanitization Issue 856
2.4 Other Issues Based on Cryptography 857
3 Analysis and Discussion 859
4 Conclusion and Future Work 859
References 860
A Study on Different Types of Robotics Applications 862
1 Introduction 862
1.1 Robotics and Artificial Intelligence 863
1.2 Aspects of Robotics and AI 863
2 Literature Review 863
3 Comparison of Different Kinds of Robotics with Parameters 865
4 Discussion 866
5 Conclusion 866
References 866
UVRento—Online Product Rental Application Using Cross-Platform Service 868
1 Introduction 869
2 Proposed Business and Implementation Module 869
2.1 Modules in UVRento Application 869
2.2 Use Case Diagrams 870
2.3 Business Model with Use Case Diagrams 870
2.4 Implementation Module 871
2.5 Payments and Delivery 873
2.6 Literature Survey 873
3 Screenshots of User Interface (UI) Design 874
4 Results and Discussion 875
References 875
Autonomous Unmanned Ground Vehicle for Enhancement of Defence Strategies 876
1 Introduction 877
2 Implementation Setup 877
3 Calculation of Remote Access 878
4 Discussion of Results 879
References 883
A Parametric Study of Load Balancing Techniques in Cloud Environment 884
1 Introduction 885
1.1 Software as a Service (SaaS) 885
1.2 Platform as a Service (PaaS) 885
1.3 Infrastructure as a Service (IaaS) 886
2 Cloud Deployment Models 886
2.1 Public Cloud 886
2.2 Private Cloud 886
2.3 Hybrid Cloud 886
3 Load Balancing 886
3.1 Load Balancing Algorithms 887
4 Load Balancing in Cloud 887
4.1 Ant Colony Optimization Technique 888
4.2 Honeybee Foraging Behaviour 889
4.3 HBB-LB 889
4.4 INS 889
4.5 A2LB 889
4.6 Join-Idle-Queue 890
4.7 PLBS 890
4.8 Response Time-Based LB 890
4.9 SBLB for Internet Distributed Services 890
4.10 Cloud Server Optimization 891
5 Conclusion 891
References 892
Logical Clustering of Similar Vertices in Complex Real-World Networks 894
1 Introduction 894
2 Logical Clusters of Similar Vertices 896
3 Silhouette Index 898
4 Evaluation on Real-World Networks 899
5 Conclusions 901
References 901
Capacity Enhancement Using Delay-Sensitive Protocol in MANETs 903
1 Introduction 903
2 Related Work 905
3 Protocol 905
3.1 Neighbor Host 906
3.2 Construction of Multicast Tree 907
3.3 Methodology of Implementing Trees 907
4 Performance Evaluation 908
5 Discussion and Conclusion 910
References 911
SCO-RNN: A Behavioral-Based Intrusion Detection Approach for Cyber Physical Attacks in SCADA Systems 913
1 Introduction 913
2 SCO-RNN Proposed Methodology 915
2.1 Generation of Initial Population 917
2.2 Training and Testing the RNN 917
2.3 Definition of the Fitness Function 917
2.4 Termination Condition 917
3 Results and Discussion 918
3.1 Experimental Setup 918
3.2 Dataset Description 918
3.3 Data Pre-processing 919
3.4 Results and Discussions 919
4 Conclusions 920
References 921
SSO-IF: An Outlier Detection Approach for Intrusion Detection in SCADA Systems 922
1 Introduction 922
2 SSO-IF Proposed Methodology 925
2.1 Generation of Initial Population 925
2.2 Training and Testing the Isolation Forest 926
2.3 Definition of the Fitness Function 926
2.4 Termination Condition 926
3 Results and Discussions 926
3.1 Experimental Setup 926
3.2 Dataset Description 927
3.3 Data Preprocessing 927
3.4 Results and Discussions 928
4 Conclusions 929
References 929
EDF-VD Scheduling-Based Mixed Criticality Cyber-Physical Systems in Smart City Paradigm 931
1 Introduction 931
1.1 Characteristics of Embedded Systems 932
1.2 Architecture of Embedded System 932
2 Background 933
2.1 Cyber-Physical System 933
2.2 Real-Time Operating System 933
2.3 Kernel 934
2.4 RTOS Scheduling Models 935
3 Existing System 937
3.1 Estimation of WCET 937
3.2 Task Response Time 937
4 Proposed System 939
4.1 The Dynamic Cloud Manufacturing Scheduling 939
5 Results and Discussion 941
6 Conclusion 941
References 945
Automatic Solid Waste Dumping Alert System 947
1 Introduction 947
2 Existing Methodology 948
3 System Architecture 948
4 Proposed Methodology 949
4.1 Node MCU 949
4.2 Ultrasonic Sensors 950
4.3 GPS 950
4.4 Wi-Fi Module 951
4.5 Radio-Frequency Identification 951
5 Conclusion 952
References 953
User Authentication for Mobile Phones by Pseudo Signature Using CNN 954
1 Introduction 954
2 Related Work 955
3 Proposed Method 956
3.1 Data Set Creation 957
4 Results and Discussion 958
5 Conclusion 960
References 961
Autonomous Mobile Robot Using RGB-D SLAM and Robot Operating System 962
1 Introduction 962
2 Slam 963
3 Localisation 963
4 Mapping 965
5 System Setup 965
6 Experimental Environment 966
7 Conclusion 967
References 967
Survey on Data Mining and Predictive Analytics Techniques 969
1 Introduction 970
2 Survey on Data Mining and Predictive Analytics Techniques 971
2.1 KNN-Based Data Mining and Predictive Analytics 971
2.2 Random Forest-Based Predictive Analytics 971
2.3 ANN-Based Data Mining and Predictive Analytics 972
2.4 Decision Tree-Based Predictive Analytics 973
2.5 Naïve Bayesian Classifier-Based Predictive Analytics 974
2.6 K-Means-Based Predictive Analytics 974
2.7 Summary of Survey 975
3 Categorization and Its Discussion 975
3.1 Categorization Based on the Novel Techniques 975
3.2 Categorization Based on Application 976
3.3 Categorization Based on Parameters Measures 976
4 Conclusion 978
References 978
Implementation of In-flight Entertainment System Using Light Fidelity Technology 980
1 Introduction 981
2 Methodology 982
3 Implementation 984
4 Results 987
5 Conclusion and Future Scope 988
References 988
A Survey of Pre-processing Techniques Using Wavelets and Empirical-Mode Decomposition on Biomedical Signals 990
1 Introduction 990
2 Pre-processing Techniques 991
3 Data Bases 996
4 Improvement Measures 996
5 Discussion 997
6 Conclusions 998
References 998
Analysis of Process Scheduling Using Neural Network in Operating System 1000
1 Introduction 1000
2 Related Work 1001
3 Process Scheduling Algorithms 1001
3.1 Job Shop Scheduling 1001
3.2 Preemptive Scheduling 1002
3.3 Multithreading 1002
4 AI Technique Based Algorithms 1003
4.1 Genetic Algorithm 1003
4.2 Decision Tree Learning 1004
4.3 Bayesian System 1005
4.4 Rule-Based System 1006
4.5 Neural Network 1006
5 Comparison of Algorithms 1007
6 Conclusion and Future Work 1010
References 1010
An Enhanced Trust Based Fuzzy Implicit Cross-Layer Protocol for Wireless Sensor Networks 1012
1 Introduction 1013
2 Literature Survey 1014
3 Proposed Method 1014
3.1 The XLM Framework 1015
3.2 Trust Estimation Processes 1016
3.3 The T-XLM Framework 1017
3.4 The Proposed TRUFIX Protocol 1019
3.5 The Extended E-TRUFIX Protocol 1021
4 Performance Evaluation 1022
5 Conclusion 1024
References 1024
Implementation of Public-Key Infrastructure for Smart Parking System Using MQTT Protocol 1026
1 Introduction 1026
2 Related Works 1027
3 Preliminaries of the Work 1028
3.1 ECC 1028
3.2 ZKP 1028
4 Proposed System 1028
4.1 Algorithm 1029
4.2 Schnorr’s Protocol Steps 1029
5 Experimentation and Validation 1030
5.1 Prover System 1031
5.2 Verifier System 1031
5.3 Cheater System 1031
6 Conclusions and Future Work 1033
References 1033
Non-bipolar Evaluation and Visualization of Online Text Reviews 1035
1 Introduction 1036
2 State of the Art 1037
3 System Design 1038
4 System Implementation 1039
5 Conclusion and Future Enhancements 1040
References 1042
Status Monitoring System-Based Defense Mechanism (SMS-BDM) for Preventing Co-resident DoS Attacks in Cloud Environment 1043
1 Introduction 1044
2 Related Works 1045
3 Status Monitoring System-Based Defense Mechanism (SMS-BDM) or State Observation-Based Co-resident DoS attack detection Model 1045
3.1 Problem Definition 1046
3.2 Risk Value Measurement 1047
3.3 State Value Observation and Updation Using Markov Chain Model 1047
3.4 Two-Player Security Game 1050
4 Results and Discussion 1050
5 Conclusion 1053
References 1053
Resource Scheduling Algorithms for Cloud Computing Environment: A Literature Survey 1055
1 Introduction 1055
2 Literature Review 1056
3 Conclusion 1063
References 1063
Cloud-Based Healthcare Portal in Virtual Private Cloud 1066
1 Introduction 1066
2 Requirements 1067
2.1 Confidentiality 1067
2.2 Integrity 1067
2.3 Collision Resistance 1068
2.4 Anonymity 1068
2.5 Authenticity 1068
2.6 Unlink-Ability 1069
2.7 Patient-Centric Access control 1069
2.8 Access Revocation 1069
2.9 Auditing 1069
2.10 Architecture Design 1069
2.11 Proposed Architecture 1070
3 Establish Flexibility of Access in VPC 1071
3.1 Create the Public and Private Subnet for VPC IP Address 10.0.0.0/16 1072
3.2 Network Address Translation (NAT) 1072
4 Evaluations Framework 1074
5 Conclusion and Proposed Work 1074
References 1074
A Hybrid Approach for Video Steganography by Stretching the Secret Data 1076
1 Introduction 1076
2 Related Works 1077
3 Design Methodology 1078
4 Results and Discussion 1080
5 Conclusion 1081
References 1081
An Acknowledgment-Based Approach for Implementing Trusted Routing Protocol in MANET 1083
1 Introduction 1084
2 Existing System 1084
2.1 Drawbacks 1085
3 Proposed System 1085
3.1 Trust Models 1085
4 Proposed Algorithm for Information Routing 1086
4.1 Distributed Trust Evaluations 1086
5 Results and Discussion 1087
5.1 Performance Parameter 1087
6 Conclusion 1088
References 1090
On-line Frequency Reallocation for Call Requests in Linear Wireless Cellular Networks 1091
1 Introduction 1091
1.1 Overview of Graph Colouring 1093
2 Related Work 1094
3 Proposed Work 1095
3.1 HYBRIDRING Algorithm and Its Principles 1096
4 Result Analysis 1097
5 Conclusion 1101
References 1101
A Novel Secure IoT Based Optimizing Sensor Network for Automatic Medicine Composition Prescribe System 1102
1 Introduction 1102
2 Existing System 1103
2.1 Sensors 1104
2.2 Microcontroller 1104
2.3 Wi-Fi Module 1104
2.4 Cloud Server 1104
2.5 Data Mining and Learning 1105
3 Proposed Work 1105
3.1 Client Device 1106
3.2 Server and Database Management 1108
4 Results and Discussion 1108
5 Conclusion and Future Work 1109
References 1111
High-Speed Polar Decoder Architecture for Next Generation 5G Applications Using Radix-k Processing Engine 1112
1 Introduction 1112
2 Literature Survey 1113
3 Proposed System 1113
4 Results and Discussion 1116
5 Conclusion 1117
References 1117
PAPR Reduction in F-OFDM Modulation Scheme for 5G Cellular Networks Using Precoding Technique 1119
1 Introduction 1120
2 Related Work 1122
3 Proposed Work 1123
3.1 Filter Design 1124
3.2 Precoding Technique 1125
4 Result Analysis 1125
References 1129
Privacy Preservation Using Top K Multi-Keyword Synonym Fuzzy Search Scheme 1131
1 Introduction 1131
2 Related Work 1133
3 Methodology 1136
3.1 Model Description 1136
3.2 Assumptions 1136
3.3 Algorithm Description 1137
4 Implementation Details 1138
5 Results 1138
6 Conclusion and Future Work 1139
References 1140
High-Speed Variable-Length Decoder Using Segmented Code book 1142
1 Introduction 1142
1.1 VLC Code book 1143
2 Observations 1144
3 Parallel Decoding Approach 1145
4 Simulation Results 1148
5 Conclusion 1149
References 1149
Efficient Cruise Control of Electric Motorcycle Using PID 1151
1 Introduction 1151
2 Mathematical Modelling 1152
2.1 Transfer Function Derivation of a DC Motor (Bottom-Up Approach) 1152
2.2 System Identification—Reaction Curve Method 1153
3 Control System Design 1155
4 Implementation 1156
4.1 PI Control Observed Under Disturbances 1156
4.2 PI Control Observed Under Varying Pre-defined Speeds 1156
5 Results and Discussions 1157
5.1 Disturbance Rejection Capability 1157
5.2 Set Point Tracking Capability 1157
6 Conclusions and Future Enhancements 1158
References 1159
Transmission of Watermarked Image in WSN Using ELSM Algorithm 1160
1 Introduction 1160
2 Methods and Materials 1161
2.1 Watermark Insertion 1161
2.2 Clock Synchronization in WSN 1161
2.3 Transmitting and Receiving Process of WSN 1163
2.4 Watermark Extraction 1163
3 Result and Discussion 1164
4 Conclusion 1166
References 1167
International Students’ Gender Impact to Use Mobile Learning in Tertiary Education 1168
1 Introduction 1168
2 Problem Statement 1169
3 Literature Review 1170
3.1 Theoretical Framework 1170
4 Aim 1171
4.1 Research Questions 1171
4.2 Research Hypotheses 1171
5 Methodology 1172
6 Results 1172
6.1 Cronbach’s Alpha Values 1172
6.2 A Model for Female International Student’s to Use M-Learning 1173
6.3 Model Fit and Quality Indices 1175
6.4 Mean and Standard Deviation for PE, EE, SF, FC, and BI 1175
6.5 Correlation 1176
7 Discussion and Conclusion 1177
References 1178
Industrial Automation of Process for Transformer Monitoring System Using IoT Analytics 1180
1 Introduction 1181
2 Literature Survey 1181
3 Methodology 1182
3.1 Artificial Neural Networks (ANNs) 1184
4 Results 1185
5 Conclusion 1186
References 1189
A Comparative Study on Various Search Techniques for Gaming Applications 1190
1 Introduction 1190
2 Review of Literature 1190
3 Search Techniques Methodology 1192
3.1 Breadth-First Search 1192
3.2 Depth-First Search 1192
3.3 A* Algorithm 1193
4 Comparison of Various Search Techniques 1193
5 Conclusion 1193
References 1194
Crowdsourcing Data Analysis for Crowd Systems 1195
1 Introduction 1195
2 Overview 1196
2.1 Automated 1196
2.2 Well-Disposed to Non-master Clients 1196
2.3 Human Intelligence 1196
2.4 Applications 1196
3 Related Work 1197
3.1 Data Analysis Framework [1] 1197
3.2 Data-Less Big Data Analytics [6] 1198
3.3 Crowdsourcing Predictors [2] 1200
4 Proposed System 1201
5 Conclusion 1202
References 1202
Optimized Database Using Crowdsourcing 1204
1 Introduction 1204
2 Overview 1205
2.1 SQL Server Integration Services 1205
2.2 Service-Level Agreement 1205
3 Related Work 1205
4 Proposed System 1206
5 Conclusion 1206
References 1207
Anti-Counterfeit on Medicine Detection Using Blockchain Technology 1209
1 Introduction 1209
2 Proposed System 1212
3 Problem Formulation 1212
4 Existing System 1213
5 Architectural Design 1213
6 Algorithm 1214
7 Implementation 1215
7.1 Tablets 1215
7.2 Blockchain Client 1216
7.3 Blockchain Admin 1216
8 Implementation 1217
9 Conclusion 1217
Bibliography 1217
Fault Detection in an Indoor Wireless Sensor Network Using RSSI-Based Machine Learning Technique 1219
1 Introduction 1219
2 Related Works 1220
3 Problem Statement and Methodology 1221
4 Results and Conclusion 1224
References 1224
Image Description Generation Using Deep Learning 1225
1 Introduction 1226
2 Related Work 1226
3 Proposed Methodology 1227
3.1 Object Detection 1227
3.2 Scene Detection 1228
3.3 Sentence Generation 1229
4 Results 1229
5 Conclusion 1230
References 1230
Multi-agent-Based Interference Mitigation Technique in Wireless Communication System 1231
1 Introduction 1232
2 Motivations 1233
3 Related Work 1233
4 Proposed Approach 1233
4.1 Architecture 1233
4.2 Proposed Interference Mitigation Algorithm 1235
5 Performance Measure 1235
6 Conclusion 1239
References 1239
Implementing Machine Learning on Edge Devices with Limited Working Memory 1240
1 Introduction 1240
2 Related Work 1241
3 Architecture and Implementation 1241
3.1 Training the Model in the Server/Cloud 1242
3.2 Computation/Decision-making on the Edge Device 1242
4 Experimentation and Results 1243
4.1 Ease of Obtaining Data 1244
4.2 Ease of Implementation and Testing 1244
5 Conclusion 1245
References 1245
Smart Transportation: An Edge-Cloud Hybrid Computing Perspective 1247
1 Introduction 1247
2 Existing Technology 1248
2.1 Conventional Identification Technique 1248
2.2 IoT Connectivity 1249
3 Computation Approaches 1250
3.1 Cloud Computing 1250
3.2 Edge Computing 1250
4 Hybrid Computing 1251
4.1 Non-interleaving Edge-Cloud Architecture 1251
4.2 Interleaving Edge-Cloud Architecture 1253
5 Key Challenges 1254
6 Conclusion 1254
References 1255
A Low-Cost Ideal Fish Farm Using IoT: In the Context of Bangladesh Aquaculture System 1256
1 Introduction 1257
2 Related Work 1257
3 Methodology 1258
3.1 Circuit Design and Softwares 1260
3.2 Algorithm 1261
3.3 Predicting the Following Day Fish Feed Consumption 1262
4 Experimental Results and Discussion 1262
5 Conclusion 1265
References 1265
IoT-Based Smart Monitoring System to Ensure Worksite Safety—A Context of Garment Industry in Bangladesh 1267
1 Introduction 1268
2 Literature Review 1269
3 System Description 1269
3.1 System Architecture 1269
3.2 Blog Diagram and Flow Chart 1270
3.3 System Implementation 1270
4 Experiments and Results 1272
5 Conclusion 1275
References 1275
Evading Gratuitous Energy Consumption Due to Activation of Superfluous Nodes in WSN 1276
1 Introduction 1276
1.1 Genetic Algorithm 1277
1.2 Sensing Coverage Representation 1277
2 Literature Review 1278
3 Proposed Approach 1278
3.1 Problem Formulation 1278
3.2 Absolute Sensing-Area Coverage Using Extended Genetic Algorithm 1279
4 Experimental Evaluation 1283
5 Conclusion 1285
References 1285
Detection of Phishing Websites Using Machine Learning 1287
1 Introduction 1287
2 Literature Review 1288
3 Detection of Phishing Websites 1289
3.1 Pre-processing 1290
3.2 Selection of Features 1290
3.3 The Used Algorithms 1291
3.4 Resample Filter 1292
4 Experimental Results on Features Selection 1292
5 Conclusion 1292
References 1294
Smart Drip Irrigation Using IOT 1295
1 Introduction 1296
2 Existing System 1296
3 Proposed System 1297
4 Working: 1297
5 Conclusion 1301
Reference 1301
An Efficient Scheduling Algorithm for Sensor-Based IoT Networks 1302
1 Introduction 1303
1.1 Selfish Node Attack 1303
2 Related Work 1303
3 Existing System 1304
3.1 Last in First Out (LIFO) Backpressure Scheduling (BS) Scheme 1305
3.2 Event-Aware Backpressure Scheduling (EABS) 1305
4 Proposed System 1305
5 Performance Evaluation 1307
6 Conclusion 1308
References 1309
Cost-Based Meta-Task Scheduling Algorithm for MultiCloud Computing (CBMTSA) 1311
1 Introduction 1311
2 Related Works 1312
3 Cost-Based Meta-Task Scheduling Algorithm (CBMTSA) 1313
3.1 Proposed CBMTSA Algorithm for MultiCloud Computing 1315
4 Results and Discussion 1316
5 Conclusion 1316
References 1320
Implementation of Low-Cost Mobile Robot for Rescue Challenges 1322
1 Introduction 1323
2 Related Works 1323
3 Architecture 1324
3.1 User Interface 1324
3.2 ROS Platform 1325
3.3 Hardware 1325
4 Design and Implementation 1326
5 Experiments and Results 1328
5.1 25° Ramps 1329
5.2 Uneven Terrains 1329
5.3 45° Steep Terrain 1329
5.4 Parallel Rail Bars 1329
6 Future Works 1330
7 Conclusion 1330
References 1331
Smog Detection and Pollution Alert System Using Wireless Sensor Network 1333
1 Introduction 1334
2 Motivation 1335
3 Literature Review 1335
3.1 Present Smog Detection Devices in India 1335
3.2 Census Data 1336
4 Software Implementation Using Cooja 1337
4.1 Simulated Results of InBuilt Sensors 1337
4.2 Simulated Results of External Sensor Interfacing 1337
4.3 Creation of a PAN Network in Cooja 1339
4.4 Hardware Implementation with Motes and Sensors 1340
5 Conclusion 1342
References 1343
IoT-Based Women Security System 1345
1 Introduction 1346
2 Motivation 1346
3 Related Works 1346
4 Design and Implementation 1347
4.1 Design Units 1347
4.2 Functional Flow of the Proposed System 1349
4.3 MPU Algorithm 1350
5 Experiment and Results 1351
5.1 Experimental Setup 1351
5.2 Test Results 1352
6 Conclusion 1353
References 1354
IoT-based Wearable Micro-Strip Patch Antenna with Electromagnetic Band Gap Structure for Gain Enhancement 1355
1 Introduction 1355
2 Literature Survey 1357
3 Antenna Design 1357
4 Results and Discussion 1359
5 Conclusion 1369
References 1372
Design and Implementation of a 3 DOF Arm for Disaster Management 1373
1 Introduction 1374
2 Motivation and Problem Statement 1374
3 Related Works 1374
4 Architectural Diagram 1375
4.1 Control Station 1375
4.2 Base Station 1376
5 Design and Implementation 1377
5.1 Software 1377
5.2 Hardware 1380
6 Experiments and Results 1381
7 Conclusion 1384
References 1384
Author Index 1386

Erscheint lt. Verlag 29.1.2020
Reihe/Serie Lecture Notes in Networks and Systems
Zusatzinfo XLVI, 1415 p. 721 illus., 525 illus. in color.
Sprache englisch
Themenwelt Informatik Software Entwicklung Mobile- / App-Entwicklung
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Mathematik / Informatik Mathematik Finanz- / Wirtschaftsmathematik
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Wirtschaft
Schlagworte Big Data Analytics • bio-inspired computing • Cloud Computing • ICICCT 2019 • internet of things • mobile computing • Social Networks
ISBN-10 981-15-0146-7 / 9811501467
ISBN-13 978-981-15-0146-3 / 9789811501463
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 35,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Robust and fast cross-platform application development

von Marco Cantu; Pawel Glowacki

eBook Download (2024)
Packt Publishing Limited (Verlag)
33,59