<p><span>These two volumes constitute the selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2022, held in Gwalior, India, in December 2022. The 53 full papers were thoroughly reviewed and selected from the 152 submissions. They
Communication, Networks and Computing: Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I (Communications in Computer and Information Science)
✍ Scribed by Ranjeet Singh Tomar (editor), Shekhar Verma (editor), Brijesh Kumar Chaurasia (editor), Vrijendra Singh (editor), Jemal H. Abawajy (editor), Shyam Akashe (editor), Pao-Ann Hsiung (editor), Ramjee Prasad (editor)
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 350
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
These two volumes constitute the selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2022, held in Gwalior, India, in December 2022.
The 53 full papers were thoroughly reviewed and selected from the 152 submissions. They focus on the exciting new areas of wired and wireless communication systems, high-dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, vehicular technology and applications and electronic circuits for communication systems that promise to make the world a better place to live in.
✦ Table of Contents
Preface
Organization
Contents – Part I
Contents – Part II
Wired and Wireless Communication Systems
An Analytic Assessment of Medical Applications of the Internet of Things (IoT) During Covid-19 and Possible Future Pandemics
1 Introduction
2 Reasons Why This Research is Necessary
2.1 Integrating IoT in the Health Care Industry
3 Medical Internet of Things Technologies for the COVID-19 Pandemic
4 Critical Analysis
5 Future Prospects
6 Conclusion
References
Analysis and Comparison of Posture Detection Using Deep Learning Algorithm
1 Introduction
2 Used Terminology
2.1 Neural Network-Based Motion Posture
2.2 Deep Learning
2.3 Convolutional Neural Network (CNN)
2.4 Recurrent Neural Networks (RNNs)
2.5 Long Short-Term Memory (LSTM)
3 Material and Method
4 Literature Review
5 Comparative Study
6 Conclusion
References
Design and Analysis of 16 Channel WDM-OFC System with Minimum BER for 5G Applications
1 Introduction
1.1 Two Channel WDM Communication System
1.2 16 CHANNEL WDM-OFC SYSTEM fOR ZERO Minimum BER
2 Minimum Bit Error Rate for Bend Optical Fiber
3 Conclusion
References
Classification Techniques in Remote Sensing: A Review
1 Introduction
2 Recent Trends in Remote Sensing for Classification of Images
3 Selection for Remotely Sensed Data
4 Classifier for Remote Sensing
5 Datasets
6 Performance Evaluation Criteria
7 Conclusion and Future Direction
References
Analysis of Probability of Detection in Relay Assisted WBAN
1 Introduction
2 Wireless Body Area Network
3 System Model and Spectrum Sensing Approach
3.1 PUs SNR Calculation
3.2 SNR Combining Diversity
3.3 SNR Threshold
4 Performance Analysis Parameters
4.1 Probability of Detection (PD)
4.2 Noise Uncertainty ()
4.3 Dynamic Threshold (’)
4.4 Sampling Time (NS)
5 Simulation Results and Discussion
5.1 Noise Uncertainty
5.2 Dynamic Threshold
5.3 Sampling Time (NS)
6 Conclusion
References
Methodologies to Classify Faults in Power Transmission Lines
1 Introduction
1.1 Background
1.2 Review Methodology
2 Fault Classification and Monitoring
3 Fault Analysis Techniques
4 Review on Fault Classification Methods
4.1 (SVM) Support Vector Machine
4.2 Genetic Algorithm
4.3 DWT-ELM Approach
4.4 FPGA Method
4.5 GSM Method
4.6 PMU Method
4.7 Decision Tree Based Method
4.8 Motley-Information Measurements
4.9 Fast Estimation Method Using Phasor Components
4.10 PCA Method
4.11 Pilot Method
4.12 FACI Method
5 Summary of the Fault Analysis Techniques
6 Conclusion
References
Recent Copy Move Forgery Detection Techniques: A Review
1 Introduction
2 Copy-Move Forgery Detection
3 Related Work
4 Comparative Assessment
5 Datasets
6 Conclusion
References
A Robust Graphical Authentication System for the Shoulder Surfing Attack
1 Introduction
2 Background
3 Proposed Scheme
4 Algorithm Used
5 Password Space
6 Comparison
7 Comparison Based on Password Space
8 Result
9 Conclusion
References
Networks and Information Security
Implications of Forensic Investigation in Dark Web
1 Introduction
2 Literature Review
3 Challenges Facing Dark Web Forensics
4 Conclusion
References
Review on Analyzing and Detecting Crimes
1 Introduction
2 Past Studies
3 Challenges and Proposed Solutions
4 Conclusion
References
Prevention and Detection of Poisoning Attacks in Medical-Based Machine Learning Web Applications
1 Introduction
1.1 Objective and Motivation of this Project
2 Review of Literature
3 System Implementation
3.1 Conceptual Flow of the Project
3.2 First Module
3.3 Second Module
3.4 Third Module
3.5 Fourth Module
4 Comparative Study of Existing Works with Our Proposed System
5 Architectural Model
5.1 System Requirements
6 Results and Discussion
7 Conclusion and Future Scope
References
Machine Learning-Based Solutions for Securing IoT Systems Against Multilayer Attacks
1 Introduction
2 Methodology
2.1 Identification of Multilayer Attacks and Their Similarities
2.2 Pre-processing and Feature Extraction
2.3 Training ML Algorithms on the Similar Features
3 Conclusion
References
Securing Internet of Things Using Machine Learning Techniques: A Systematic Review
1 Introduction
2 Literature Review
3 Attacks in IoT and Its Type
3.1 Types of Attacks
4 Use of Machine Learning Techniques for IoT Securing IoT
5 Use of Machine Learning Techniques in IIoT Security
6 Use of Machine Learning in Health Care IoT Security
7 Future Scope of Machine Learning in Security of IoT
8 Challenges in IoT Security
9 Conclusion
References
Predicting Students’ Performance Employing Educational Data Mining Techniques, Machine Learning, and Learning Analytics
1 Introduction
2 Academic Success
3 Performance Prediction
4 Contributing Factors to Academic Achievement
5 Predictive Data Mining Methods for Students’ Academic Performance
6 Predicting Students’ Performance Using Data Mining Model
6.1 Inquiring
6.2 Preliminary Information Gathering
6.3 Selection of Data
6.4 The Process of Cleaning Data
6.5 Generation of a New Variable
6.6 Examination by Means of Statistics
6.7 Preparation of Data
6.8 Lack of Consistency in the Data
6.9 Functional Optimization
7 Data Mining Models
8 Technology for Extracting Useful Information from Large Datasets
9 Analyzing the Outcomes
10 Conclusion
References
COVID-19 Detection Using State-of-the-Art Deep Learning Models on X-Ray and CT Images
1 Introduction
1.1 Aim and Impact
1.2 Objectives
2 Related Work
3 Research Gaps
4 Comparative Results and Discussion
4.1 Performance Evaluation Metrics
4.2 Comparative Analysis with X-Ray and CT Images
4.3 Comparison with State-of-the-Art Techniques
5 Conclusion and Future Work
References
Edge Discerning Using Improved PSO and Canny Algorithm
1 Introduction
2 Literature Survey
3 Methodology
3.1 Overall Structure of Algorithm
3.2 IPSO Algorithm
3.3 IPSO in Image Edge Segmentation
3.4 Canny Edge Detection
3.5 Feature Extraction
3.6 GLCM
4 Conclusion
References
Sniffit: A Packet Sniffing Tool Using Wireshark
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Intra and Internetwork Sniffing
4 Network Traffic Analysis Tool
5 Experimental Setup
6 Results
7 Conclusions and Future Work
References
Electronics Circuits for Communication Systems
Design of a Dielectric Resonator Antenna with Two Drilled Hollow Cylinders for Wide Bandwidth
1 Introduction
2 Antenna Design
3 Results and Discussions
4 Conclusions
References
Triple-Wideband Antenna for RF Energy Harvesting
1 Introduction
2 Designing of Antenna
3 Conclusion
References
Dual-Band Antenna and Low Pass Filter Design for Wireless Energy Harvesting
1 Introduction
2 Receiving Antenna Design
3 Five-Element Filter Design
4 Conclusion
References
Performance Analysis of Various Digital Adders
1 Introduction
2 Literature Review
3 1-Bit Full Adder
4 Result and Simulation
5 Conclusion
References
Implementation of Low-Power Full Adder Using GNRFET Technology
1 Introduction
2 16T Full Adder Architecture
3 SPICE Model of MOS Type GNRFET
3.1 GNRFET Fundamentals
3.2 GNRFET Model File
4 Results
5 Conclusion
References
Design of Dual-Polarized Square Microstrip Patch Antenna in KU Band for Weather Applications
1 Introduction
2 Proposed Work
3 Result and Analysis
4 Conclusion
References
Tumor Detection Using DWT and SVM in MRI Image
1 Introduction
2 Brain Tumor
3 MRI Image
3.1 Fast Facts on MRI Scanning
4 Literature Survey
5 Proposed Method
5.1 Segmentation
5.2 Feature Extraction
5.3 Classification
6 Simulation Results
7 Conclusion
References
TiGen – Title Generator Based on Deep NLP Transformer Model for Scholarly Literature
1 Introduction
2 Related Work
3 Background and Motivation
4 Experimental Set-Up
4.1 Dataset
4.2 Pre-Trained Models
4.3 Deployment
5 Experiments
5.1 Parameters Tuning
5.2 Training Loss in Fine-Tuning
6 Results
7 Conclusion and Future Work
References
Patient Monitoring System for COVID Care Using Biosensor Application
1 Introduction
2 Literature Survey
3 Materials and Methodology
3.1 Power Supply
3.2 Arduino Uno
3.3 Heart Beat Sensor
3.4 Temperature Sensor
3.5 Relay
3.6 Solenoid Valve
3.7 GSM
3.8 LCD Display
3.9 Buzzer
3.10 Arduino Compiler
3.11 Embedded C
4 Working
5 Result
6 Discussion
7 Conclusion
References
Enhance the Tourism of Unpopular Places by Fuzzy Distance Method
1 Introduction
2 Literature Review
3 Brief Description of Sites
4 Data Sampling
5 Proposed Algorithm
6 Result and Simulation
7 Conclusion
References
Author Index
📜 SIMILAR VOLUMES
<span>This book constitutes selected and revised papers presented at the Second International Conference on Communication, Networks and Computing, CNC 2020, held in Gwalior, India, in December 2020. <br>The 23 full papers and 7 short papers were thoroughly reviewed and selected from the 102 submissi
<span>The two-volume Proceedings set CCIS 1637 and 1638 constitutes the refereed proceedings of the Third International Conference on Neural Computing for Advanced Applications, NCAA 2022, held in Jinan, China, during July 8–10, 2022. <br>The 77 papers included in these proceedings were carefully re
<p>The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held in Bangalore, India, in January 2012. The 66 revised full papers presented in this volume were carefully reviewed an
<p>This book constitutes the thoroughly refereed proceedings of the Third International Conference on Advances in Communication, Network, and Computing, CNC 2012, held in Chennai, India, February 24-25, 2012. The 41 revised full papers presented together with 29 short papers and 14 poster papers wer
<span>This book constitutes refereed proceedings of the Third International Conference on Computer and Communication Engineering, CCCE 2023, held in Stockholm, Sweden, in March 2023.<br>The 18 full papers presented were carefully reviewed and selected from 36 submissions. The papers are organized in