𝔖 Scriptorium
✦   LIBER   ✦

📁

Applied Soft Computing and Communication Networks: Proceedings of ACN 2020

✍ Scribed by Sabu M. Thampi, Jaime Lloret Mauri, Xavier Fernando, Rajendra Boppana, S. Geetha, Axel Sikora


Publisher
Springer
Year
2021
Tongue
English
Leaves
347
Series
Lecture Notes in Networks and Systems, 187
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes thoroughly refereed post-conference proceedings of the International Applied Soft Computing and Communication Networks (ACN 2020) held in VIT, Chennai, India, during October 14–17, 2020. The research papers presented were carefully reviewed and selected from several initial submissions.  The book is directed to the researchers and scientists engaged in various fields of intelligent systems.

✦ Table of Contents


Preface
Organized By
Contents
Editors and Contributors
Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices
1 Introduction
2 Algebra of Communicating Processes
3 Topology Framework
4 Actions to be Modelled
4.1 Action Cloud IN
4.2 Action Migrate IN
4.3 Action Init VM
4.4 Action Cloud OUT
4.5 Action Migration OUT
4.6 Action Kill VM
5 Verification of the Models
6 Conclusions
References
A Novel Approach to Preserve DRM for Content Distribution over P2P Networks
1 Introduction
1.1 Literature Review
2 Challenges and Contributions
3 Proposed System
3.1 System Approach
3.2 Physical Architecture/Layout
3.3 The P2P Network
3.4 The Secured DRM
4 Discussion
5 Conclusion
References
Secure Multimodal Biometric Recognition in Principal Component Subspace
1 Introduction
2 Related Works
3 Proposed Method
3.1 Similarity Measure Based on Principal Components
3.2 Protection Scheme for Multimodal Templates
4 Experiments and Results
4.1 Face
4.2 Fingerprint
4.3 Finger Vein
4.4 Fusing Face, Fingerprint and Finger Vein Features
5 Security Analysis
6 Conclusion
References
EEG-Based Emotion Recognition and Its Interface with Augmented Reality
1 Introduction
2 Basic Principles
2.1 Electroencephalography (EEG)
2.2 EEG Data Analysis
2.3 10–20 EEG Positioning System
2.4 Augmented Reality
2.5 Socket Programming and Application Development
2.6 Valence-Arousal Model
3 Hardware Used
4 Detailed Circuit Design
5 Implementation
6 Results
7 Conclusions and Future Scope
References
Profile Verification Using Blockchain
1 Introduction
1.1 Blockchain
1.2 Ethereum
1.3 Existing Systems
1.4 Decentralization of Certification
2 Related Work
3 System Architecture
3.1 Data and Process Flow
3.2 Smart Contract
3.3 Verification Protocol
3.4 Image Hashing
4 Implementation
4.1 Teachers and Mentors
4.2 Web Interface
4.3 Events and Transactions
5 Results
6 Conclusion
References
Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach
1 Introduction
2 Background and Related Work
2.1 DDoS Attacks and Its Detection Type
2.2 Machine Learning Solutions
3 Experimental Database and Setup
4 Classification Algorithms and Performance Measurements
4.1 Classification Algorithms
4.2 Performance Measurements
5 Results and Discussion
6 Conclusion
References
Intrusion Detection Using Deep Neural Network with AntiRectifier Layer
1 Introduction
1.1 Motivation
1.2 Contribution
2 Related Work
3 Deep Neural Network
3.1 Rectified Linear Unit
3.2 AntiRectifier Layer
3.3 Dropout and Noise Layers
3.4 Gaussian Dropout and Gaussian Noise
4 Experimental Methodology
4.1 Datasets for Experimentation
5 Results Analysis and Observations
6 Conclusion
References
CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers
1 Introduction
2 Related Work
2.1 Procure Knowledge
2.2 Family of Simulators
2.3 Art: Architecture
2.4 Techniques: Tools
2.5 Techniques: Language
2.6 Setup
2.7 Integrated Development Environment (IDE)
3 Proposed Work and Methodology
3.1 Framework
3.2 Algorithms
4 Results and Discussions
4.1 Experimental Setup
5 Conclusion and Future Direction
References
A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems
1 Introduction
1.1 Survey Methodology
1.2 Paper Organization
2 Related Work
3 Big Data Technologies Used in the Existing BDTCA Systems
4 Datasets Used in the Existing BDTCA Systems
5 Feature Selection Algorithms Used in the Existing BDTCA Systems
6 Various Methods Used to Read Packet Trace Files from HDFS
7 Observations, Recommendations and Directions
7.1 Migration from Batch Processing to Stream Processing
7.2 Lack of Modern Datasets for Evaluation
7.3 Feature Selection
7.4 Overhead of Converting PCAP Files to Text Files
8 Conclusion
References
An Asynchronous Leader-Based Neighbor Discovery Protocol in Static Wireless Ad Hoc Networks
1 Introduction
2 Related Work
3 Reference Protocols
4 Asynchronous Leader-Based Neighbor Discovery Protocol
4.1 Assumptions
4.2 Model
5 Simulation Results
5.1 Simulation Scenario
5.2 Results
6 Conclusion
References
P2P Bot Detection Based on Host Behavior and Big Data Technology
1 Introduction
1.1 Botnet
1.2 Peer-to-Peer Botnet
1.3 Big Data
1.4 Role of Big Data Technologies in Detecting P2P Botnets
1.5 Role of Machine Learning in Detecting P2P Botnets
2 Related Works
3 System Architecture
3.1 Data Collection
3.2 Parsing PCAP Files
3.3 Classification
4 Implementation
4.1 Dataset Used
4.2 Parsing PCAP Files
4.3 Classification
5 Results
6 Conclusion
References
Localization in Wireless Sensor Networks Using a Mobile Anchor and Subordinate Nodes
1 Introduction
2 Related Works
3 Localization in WSNs Using a Mobile Anchor and Subordinate Nodes (LWMS): A Proposed Algorithm
4 Simulations and Results
4.1 Percentage of Error at Various Stages of the Algorithm
4.2 Localization Error Versus Communication Range
4.3 Localization Error Versus Total Number of Nodes
5 Conclusion
References
Serverless Deployment of a Voice-Bot for Visually Impaired
1 Introduction
2 Related Work
3 Background
3.1 Economics and Architectural Impact of Serverless Applications
3.2 General Bot Architecture
4 Blueprints for a Serverless Voice Bot for Visually Impaired
4.1 Overview of Technology Stack for Voice Bot
4.2 Overall Design Architecture of Feed-O-Back Voice Bot
5 Experimental Results
6 Conclusion
References
Smart Cities and Spectrum Vulnerabilities in Long-Range Unlicensed Communication Bands: A Review
1 Introduction
2 Related Works
3 Spectrum Management Techniques
4 Security Vulnerabilities of LPWANS and Proposed Solutions
5 Challenges of Proper Spectrum Utilization in Unlicensed Bands
6 Competing Incompatible Long-Range Technologies in Unlicensed Bands
7 Comparison and Discussion
8 Key Findings of the Review
9 Recommendations and Future Direction
10 Conclusion
References
Stability Certification of Dynamical Systems: Lyapunov Logic Learning Machine
1 Introduction
1.1 Context
1.2 Contribution
1.3 Related Works
2 Preliminaries
2.1 Lyapunov Stability
2.2 SOS Lyapunov Functions
2.3 Classical ROA Estimation
3 Method
3.1 Intelligible Analytics
3.2 Value Ranking
3.3 LLM with Zero Error
3.4 ROA Explanation
3.5 ROA Candidates for Certification
4 Results
5 Conclusion and Future Work
References
Two-Dimensional Angle of Arrival Estimation Using L-Shaped Array
1 Introduction
2 System Model
3 Proposed Method
3.1 Method Without Noise
3.2 Method with Noise
4 Simulation Results
5 Conclusion
References
Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter
1 Introduction
2 Related Works
3 Interference Modeling
3.1 Channel Estimation
4 LTE and Wi-Fi Simulation Modeling
4.1 Channel Model
4.2 LTE/LTE-A Transceiver
4.3 WLAN 802.11ac Transceiver
4.4 Generation of Clean LTE and Wi-Fi Signal
4.5 LTE and Wi-Fi Coexistence Deployment Scenario
5 Performance Evaluation and Results
6 Conclusion and Future Work
References
VHF OSTBC MIMO System Used to Overcome the Effects of Irregular Terrain on Radio Signals
1 Introduction
2 Methods to Mitigate Propagation Challenges in Irregular Terrain
3 Proposed Model
4 Simulation Results
4.1 The Receive Signal Strength Results of the VHF OSTBC MIMO System Using Two Different VHF Frequencies
4.2 The Bit Error Rate Results of the OSTBC MIMO System Using Two Different MIMO Antenna Arrays
5 Conclusion and Discussion
References
Modelling Video Frames for Object Extraction Using Spatial Correlation
1 Introduction
2 Global Threshold: Otsu's Method
3 2D-Continuous Wavelet Analysis
3.1 Analysing Wavelets
3.2 Reproducing Kernel
4 Detection Theory
4.1 Binary Hypothesis Testing
5 Object Extraction
5.1 Implementation of Algorithm
5.2 Results
6 Conclusion and Future Work
References
Speech-Based Selective Labeling of Objects in an Inventory Setting
1 Introduction
2 Experimental Methodology
2.1 Data Preprocessing
2.2 Voice-Based Object Detection
2.3 Faster RCNN
3 Results and Discussion
4 Conclusion
References
Classification and Evaluation of Goal-Oriented Requirements Analysis Methods
1 Introduction
2 Classification of GORA Methods
2.1 GORA Methods for the Analysis of FRs and NFRs
2.2 GORA Method(s) for the Analysis of NFRs
2.3 GORA Method(s) for Social Modeling
3 Evaluation of GORA Methods
4 Conclusion
References
iCREST: International Cross-Reference to Exchange-Based Stock Trend Prediction Using Long Short-Term Memory
1 Introduction
1.1 Motivation
2 Proposed Approach
2.1 Time-Series Data Collection
2.2 Mapping and Cleaning
2.3 Currency Conversion
2.4 Normalization
2.5 Feature Selection
2.6 Input Samples
2.7 iCREST Prediction
2.8 Performance Evaluation
3 Experimental Analysis
4 Concluding Remarks and Potential Future Scope
References
Author Index


📜 SIMILAR VOLUMES


Computer Communication, Networking and I
✍ Vikrant Bhateja (editor), Suresh Chandra Satapathy (editor), Carlos M. Travieso- 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book features a collection of high-quality, peer-reviewed papers presented at the Fourth International Conference on Intelligent Computing and Communication (ICICC 2020) organized by the Department of Computer Science and Engineering and the Department of Computer Science and Technology,

Soft Computing Techniques and Applicatio
✍ Samarjeet Borah, Ratika Pradhan, Nilanjan Dey, Phalguni Gupta 📂 Library 📅 2021 🏛 Springer Singapore;Springer 🌐 English

<p><p>Focusing on soft computing techniques and application in various engineering research domains, this book presents the state-of-the-art outcomes from ongoing research works being conducted in various research laboratories and educational institutions. The included research works deal with estim

Sustainable Communication Networks and A
✍ P. Karuppusamy, Isidoros Perikos, Fuqian Shi, Tu N. Nguyen 📂 Library 📅 2021 🏛 Springer 🌐 English

This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and commu

Soft Computing Applications: Proceedings
✍ Valentina Emilia Balas (editor), Lakhmi C. Jain (editor), Marius Mircea Balas (e 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>Soft computing techniques open significant opportunities in several areas, such as industry, medicine, energy, security, transportation, and education. This book provides theory and applications development using soft computing techniques by organizing intelligent systems for many applications

Computer Networks and Inventive Communic
✍ S. Smys (editor), Ram Palanisamy (editor), Álvaro Rocha (editor), Grigorios N. B 📂 Library 📅 2021 🏛 Springer 🌐 English

<span><p>This book is a collection of peer-reviewed best selected research papers presented at 3rd International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020). The book covers new results in theory, methodology, and applications of computer networks and data

Soft Computing Applications: Proceedings
✍ Lotfi A. Zadeh (auth.), Valentina Emilia Balas, János Fodor, Annamária R. Várkon 📂 Library 📅 2013 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><p> This volume contains the Proceedings of the 5<sup>th</sup>International Workshop on Soft Computing Applications (SOFA 2012).</p><p> The book covers a broad spectrum of soft computing techniques, theoretical and practical applications employing knowledge and intelligence to find solutions for