<p><span>This book is a collection of peer-reviewed best selected research papers presented at theΒ FourthΒ International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2023), organized by Department of Computer Science and Engineering, National Institute of Technology,
Advances in Distributed Computing and Machine Learning: Proceedings of ICADCML 2020
β Scribed by Asis Kumar Tripathy, Mahasweta Sarkar, Jyoti Prakash Sahoo, Kuan-Ching Li, Suchismita Chinara
- Publisher
- Springer Singapore;Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 525
- Series
- Lecture Notes in Networks and Systems 127
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book presents recent advances in the field of distributed computing and machine learning, along with cutting-edge research in the field of Internet of Things (IoT) and blockchain in distributed environments. It features selected high-quality research papers from the First International Conference on Advances in Distributed Computing and Machine Learning (ICADCML 2020), organized by the School of Information Technology and Engineering, VIT, Vellore, India, and held on 30β31 January 2020.
β¦ Table of Contents
Front Matter ....Pages i-xxii
Front Matter ....Pages 1-1
Customized Score-Based Security Threat Analysis in VANET (Alekha Kumar Mishra, Asis Kumar Tripathy, Maitreyee Sinha)....Pages 3-13
FMβMANETs: A Novel Fuzzy Mobility on Multi-path Routing in Mobile Ad hoc Networks for Route Selection (T. Sudhakar, H. Hannah Inbarani)....Pages 15-24
Black Hole Detection and Mitigation Using Active Trust in Wireless Sensor Networks (Venkata Abhishek Kanthuru, Kakelli Anil Kumar)....Pages 25-34
Power Allocation-Based QoS Guarantees in Millimeter-Wave-Enabled Vehicular Communications (Satyabrata Swain, Jyoti Prakash Sahoo, Asis Kumar Tripathy)....Pages 35-43
Renewable Energy-Based Resource Management in Cloud Computing: A Review (Sanjib Kumar Nayak, Sanjaya Kumar Panda, Satyabrata Das)....Pages 45-56
A Multi-objective Optimization Scheduling Algorithm in Cloud Computing (Madhu Bala Myneni, Siva Abhishek Sirivella)....Pages 57-65
Addressing Security and Computation Challenges in IoT Using Machine Learning (Bhabendu Kumar Mohanta, Utkalika Satapathy, Debasish Jena)....Pages 67-74
A Survey: Security Issues and Challenges in Internet of Things (Balaji Yedle, Gunjan Shrivastava, Arun Kumar, Alekha Kumar Mishra, Tapas Kumar Mishra)....Pages 75-86
Low-Cost Real-Time Implementation of Malicious Packet Dropping Detection in Agricultural IoT Platform (J. Sebastian Terence, Geethanjali Purushothaman)....Pages 87-97
IoT-Based Air Pollution Controlling System for Garments Industry: Bangladesh Perspective (Marzan Tasnim Oyshi, Moushumi Zaman Bonny, Syed Ahmed Zaki, Susmita Saha)....Pages 99-106
Automated Plant Robot (U. Nanda, A. Biswas, K. L. G. Prathyusha, S. Gaurav, V. S. L. Samhita, S. S. Mane et al.)....Pages 107-112
IoT Security Issues and Possible Solution Using Blockchain Technology (Marzan Tasnim Oyshi, Moushumi Zaman Bonny, Susmita Saha, Zerin Nasrin Tumpa)....Pages 113-121
A Review of Distributed Supercomputing Platforms Using Blockchain (Kiran Kumar Kondru, R. Saranya, Annamma Chacko)....Pages 123-133
An E-Voting Framework with Enterprise Blockchain (Mohammed Khaled Mustafa, Sajjad Waheed)....Pages 135-145
Survey of Blockchain Applications in Database Security (Vedant Singh, Vrinda Yadav)....Pages 147-154
Prevention and Detection of SQL Injection Attacks Using Generic Decryption (R. Archana Devi, D. Hari Siva Rami Reddy, T. Akshay Kumar, P. Sriraj, P. Sankar, N. Harini)....Pages 155-163
Prevention and Detection of SQL Injection Using Query Tokenization (R. Archana Devi, C. Amritha, K. Sai Gokul, N. Ramanuja, L. Yaswant)....Pages 165-172
Investigating Peers in Social Networks: Reliable or Unreilable (M. R. Neethu, N. Harini, K. Abirami)....Pages 173-180
A Novel Study of Different Privacy Frameworks Metrics and Patterns (Sukumar Rajendran, J. Prabhu)....Pages 181-196
A Comparative Analysis of Accessibility and Stability of Different Networks (Subasish Mohapatra, Harkishen Singh, Pratik Srichandan, Muskan Khedia, Subhadarshini Mohanty)....Pages 197-206
Performance Analysis of Network Anomaly Detection Systems in Consumer Networks (P. Darsh, R. Rahul)....Pages 207-218
Remote Automated Vulnerability Assessment and Mitigation in an Organization LAN (Nishant Sharma, H. Parveen Sultana, Asif Sayyad, Rahul Singh, Shriniwas Patil)....Pages 219-227
Introspective Journal: A Digital Diary for Self-realization (Krishtna J. Murali, Kumar V. Prasanna, Nirmala S. Preethi, M. Raajesh, C. Sirish, K. Abirami)....Pages 229-234
Front Matter ....Pages 235-235
FPGA Implementation of Bio-inspired Computing Based Deep Learning Model (B. U. V. Prashanth, Mohammed Riyaz Ahmed)....Pages 237-245
Road Accident Detection and Severity Determination from CCTV Surveillance (S. Veni, R. Anand, B. Santosh)....Pages 247-256
A Fuzzy Graph Recurrent Neural Network Approach for the Prediction of Radial Overcut in Electro Discharge Machining (Amrut Ranjan Jena, D. P. Acharjya, Raja Das)....Pages 257-270
AgentG: An Engaging Bot to Chat for E-Commerce Lovers (V. Srividya, B. K. Tripathy, Neha Akhtar, Aditi Katiyar)....Pages 271-282
An Improved Approach to Group Decision-Making Using Intuitionistic Fuzzy Soft Set (R. K. Mohanty, B. K. Tripathy)....Pages 283-296
Analysis and Prediction of the Survival of Titanic Passengers Using Machine Learning (Amer Tabbakh, Jitendra Kumar Rout, Minakhi Rout)....Pages 297-304
An AI Approach for Real-Time Driver Drowsiness DetectionβA Novel Attempt with High Accuracy (Shriram K. Vasudevan, J. Anudeep, G. Kowshik, Prashant R. Nair)....Pages 305-316
Rising Star Evaluation Using Statistical Analysis in Cricket (Amruta Khot, Aditi Shinde, Anmol Magdum)....Pages 317-326
A Knowledge Evocation Model in Grading Healthcare Institutions Using Rough Set and Formal Concept Analysis (Arati Mohapatro, S. K. Mahendran, T. K. Das)....Pages 327-334
Image Compression Based on a Hybrid Wavelet Packet and Directional Transform (HW&DT) Method (P. Madhavee Latha, A. Annis Fathima)....Pages 335-346
On Multi-class Currency Classification Using Convolutional Neural Networks and Cloud Computing Systems for the Blind (K. K. R. Sanjay Kumar, Goutham Subramani, K. S. Rishinathh, Ganesh Neelakanta Iyer)....Pages 347-357
Predictive Crime Mapping for Smart City (Ira Kawthalkar, Siddhesh Jadhav, Damnik Jain, Anant V. Nimkar)....Pages 359-368
Dimensionality Reduction for Flow-Based Face Embeddings (S. Poliakov, I. Belykh)....Pages 369-378
Identifying Phished Website Using Multilayer Perceptron (Agni Dev, Vineetha Jain)....Pages 379-389
A Self-trained Support Vector Machine Approach for Intrusion Detection (Santosh Kumar Sahu, Durga Prasad Mohapatra, Sanjaya Kumar Panda)....Pages 391-402
Secure and Robust Blind Watermarking of Digital Images Using Logistic Map (Grace Karuna Purti, Dilip Kumar Yadav, P. V. S. S. R. Chandra Mouli)....Pages 403-410
Identifying Forensic Interesting Files in Digital Forensic Corpora by Applying Topic Modelling (D. Paul Joseph, Jasmine Norman)....Pages 411-421
Predicting American Sign Language from Hand Gestures Using Image Processing and Deep Learning (Sowmya Saraswathi, Kakelli Anil Kumar)....Pages 423-431
Skin Cancer Classification Using Convolution Neural Networks (Subasish Mohapatra, N. V. S. Abhishek, Dibyajit Bardhan, Anisha Ankita Ghosh, Subhadarshini Mohanty)....Pages 433-442
An Analysis of Machine Learning Approach for Detecting Automated Spammer in Twitter (C. Vanmathi, R. Mangayarkarasi)....Pages 443-451
A Fast Mode of Tweets Polarity Detection (V. P. Lijo, Hari Seetha)....Pages 453-462
One-Dimensional Chaotic Function for Financial Applications Using Soft Computing Techniques (A. Alli, J. Vijay Fidelis, S. Deepa, E. Karthikeyan)....Pages 463-468
Modified Convolutional Neural Network of Tamil Character Recognition (C. Vinotheni, S. Lakshmana Pandian, G. Lakshmi)....Pages 469-480
Epileptic Seizure Detection from Multivariate Temporal Data Using Gated Recurrent Unit (Saranya Devi Jeyabalan, Nancy Jane Yesudhas)....Pages 481-490
A Comparative Study of Genetic Algorithm and Neural Network Computing Techniques over Feature Selection (R. Rathi, D. P. Acharjya)....Pages 491-500
A Comparative Study on Prediction of Dengue Fever Using Machine Learning Algorithm (Saif Mahmud Khan Dourjoy, Abu Mohammed Golam Rabbani Rafi, Zerin Nasrin Tumpa, Mohd. Saifuzzaman)....Pages 501-510
Does Machine Learning Algorithms Improve Forecasting Accuracy? Predicting Stock Market Index Using Ensemble Model (T. Viswanathan, Manu Stephen)....Pages 511-519
Back Matter ....Pages 521-523
β¦ Subjects
Engineering; Computational Intelligence; Communications Engineering, Networks
π SIMILAR VOLUMES
<span><p>This book gathers selected papers presented at International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication (MARC 2020), held in Krishna Engineering College, Ghaziabad, India, during December 17β18, 2020. This book discusses key concepts, challenge
<span>This book includes selected papers from the 2nd International Conference on Machine Learning and Information Processing (ICMLIP 2020), held at Vardhaman College of Engineering, Jawaharlal Nehru Technological University (JNTU), Hyderabad, India, from November 28 to 29, 2020. It presents the lat
<p><span>This book gathers selected papers presented at International Conference on Machine Learning, Advances in Computing, Renewable Energy and Communication (MARC 2020), held in Krishna Engineering College, Ghaziabad, India, during December 17β18, 2020. This book discusses key concepts, challenge
<p><p></p><p>This book gathers selected high-quality papers presented at the International Conference on Machine Learning and Computational Intelligence (ICMLCI-2019), jointly organized by Kunming University of Science and Technology and the Interscience Research Network, Bhubaneswar, India, from Ap
<p>This book presents important research findings and recent innovations in the field of machine learning and signal processing. A wide range of topics relating to machine learning and signal processing techniques and their applications are addressed in order to provide both researchers and practiti