This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discus
Emerging Research in Computing, Information, Communication and Applications: ERCICA 2020
â Scribed by N. R. Shetty (editor), L. M. Patnaik (editor), H. C. Nagaraj (editor), Prasad N. Hamsavath (editor), N. Nalini (editor)
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 537
- Series
- Lecture Notes in Electrical Engineering; 789
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
⌠Table of Contents
Contents
About the Editors
Design of a Secure Blockchain Based Privacy Preserving Electronic Voting System
1 Introduction
1.1 Motivations
1.2 Research Contributions
1.3 Structure of the Article
2 Background
3 Security Requirements for E-Voting
4 Proposed System
5 Implementation and Experimental Evaluation
6 Conclusion
References
A Nature Inspired Algorithm for Enhancement of Fused MRI and CT Brain Images
1 Introduction
2 Enhancement Techniques
3 Proposed Enhancement Technique for Fused CT and MRI
4 Experiments and Results
5 Conclusion
References
Recent Advances and Future Directions of Assistive Technologies for Alzheimerâs Patients
1 Introduction
2 Assistive Technology (AT) as an Assisting Aid for Alzheimerâs Patients
3 Assistive Technologies for the Detection of Fall
3.1 Fall Detection Methods Based on Wearable Devices
3.2 Fall Detection Methods Based on Pressure Sensor
3.3 Fall Detection Methods Based on Vision
3.4 Performance Evaluation Parameters
3.5 Existing Datasets
4 Assistive Technology for Monitoring Daily Activities
4.1 Intelligent Medication System
4.2 Intelligent Brushing System
5 Challenges
6 Future Directions
7 Conclusion
References
Research on Security Awareness to Protect Data Through Ontology and Cloud Computing
1 Introduction
2 Review of Related Works
3 Gap Analysis
4 Problem Identification
5 Contribution and Organization of the Research
6 Concepts of Ontology
7 Performance Analysis
8 Conclusion
References
Driver Activity Monitoring Using MobileNets
1 Introduction
2 Literature Survey
3 Algorithm
4 Proposed Method
4.1 Implementation
4.2 Dataset
4.3 Training and Configuration
5 Results and Discussion
6 Conclusion and Future Scope
References
Prediction of Crop Production Using Analysis Algorithms
1 Introduction
2 Research Methods
3 Experiment Result [3]
4 Conclusion and Future Work
References
A Deep Learning Approach for Speed Bump and Pothole Detection Using Sensor Data
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Analysis Phase
3.2 Notification Phase
4 Methods
4.1 Data Collection
4.2 Pre-processing of Data
4.3 Detection Algorithm
4.4 Notification
5 Results
6 Future Work
References
Decision Tree Based Crop Yield Prediction Using Agro-climatic Parameters
1 Introduction
2 Related Work
3 Proposed Work
4 Experimental Setup and Results
5 Conclusion and Future Work
References
Regression Based Data Pre-processing Technique for Predicting Missing Values
1 Introduction
2 Related Work
3 Methodology
4 Experimental Setup and Results
5 Conclusion
References
An Improved Stacked Sparse Auto-Encoder Method for Network Intrusion Detection
1 Introduction
2 Related Work
3 Proposed Framework
3.1 Sparse Auto-Encoder for Dimensionality Reduction:
3.2 Stacked Sparse Auto-Encoder
3.3 Proposed Framework of Improved Stacked Sparse Auto-Encoder Dimensionality Reduction Method
3.4 Classification
4 Results
4.1 Confusion Matrix
5 Conclusion
References
A Node Quality Based Cluster Header Selection Algorithm for Improving Security in MANET
1 Introduction
2 Related Work
3 Proposed Architecture
4 Proposed Methodology
4.1 Energy Consumption of a Node
4.2 Mobility of a Node
4.3 Average Distance Between the Neighbor Nodes
4.4 Transmission Delay
5 Proposed Algorithm
5.1 Node Quality Based Cluster Head Selection Algorithm
5.2 Algorithm for Removing Malicious Nodes from the MANET
6 Simulation Environment
7 Simulation Results and Analysis
8 Conclusions and Future Works
References
Prediction of Liver Patients Using Machine Learning Algorithms
1 Introduction
2 Literature Survey
3 System Architecture
4 Methodology
5 Results
6 Conclusion
References
Development of Security Performance and Comparative Analyses Process for Big Data in Cloud
1 Introduction
2 Machine Learning Impact on Big Data
3 Security Challenges in Big Data Cloud Computing
3.1 There Are Several Challenges in Big Data
3.2 Data Storage
3.3 Variety of Data
3.4 Data Relocate
3.5 Privacy and Data Ownership
4 Security Assessment of Four Levels Security Scheme
5 Architecture Diagram for Enhanced Security System
6 Authentications of Big Data Cloud Users and Cloud Providers
6.1 Authorization of Big Data Cloud Users and Cloud Providers
6.2 Encryption of Uploaded Data Files and Decryption of Downloaded Data
7 Proposed Cryptographic Algorithm
8 Results and Discussion
8.1 Big Data Analysis
8.2 Encryption and Decryption Instance Investigation
9 Conclusions
References
Plant Leaf Disease Detection Using Image Processing
1 Introduction
2 Related Work
3 Proposed System
3.1 Dataset Description
3.2 Data Preprocessing
3.3 Building a Convolution Neural Networks
3.4 Architecture
4 Results
5 Conclusion
References
Water Table Analysis Using Machine Learning
1 Introduction
2 Literature Survey
3 System Architecture
4 Dataset
4.1 Pre-Processing
5 Algorithms
6 Methodology
7 Results
8 Conclusion
References
A Custom Classifier to Detect Spambots on CRESCI-2017 Dataset
1 Introduction
2 Open Research Problems
3 Data Collection
4 Data Pre-processing
5 Feature Selection
6 Proposed Method
7 Experimental Results
8 Conclusion
References
CYPUR-NN: Crop Yield Prediction Using Regression and Neural Networks
1 Introduction
2 Literature Survey
3 Methodology
3.1 Convolutional Neural Network
3.2 Neural Network-Based Mobile Application
3.3 Multiple Linear Regression
3.4 Web Application for Multiple Linear Regression
4 Results and Discussions
4.1 Results for Convolutional Neural Network
4.2 Results for Multiple Linear Regression
5 Conclusion
References
Static and Dynamic Human Activity Detection Using Multi CNN-ELM Approach
1 Introduction
2 Related Work
2.1 Understanding Human Activity
2.2 Human Activity Recognition
2.3 Deep Learning Methodologies for Sensor-Based HAR
3 Data and Methodology
3.1 Input Dataset
3.2 Pre-processing
3.3 Feature Learning Using CNN
3.4 Extreme Learning Machine (ELM)
4 Results and Analysis
4.1 Classification of Static and Dynamic Human Activities
5 Conclusion
References
Health Assistant Bot
1 Introduction
2 Literature Survey
3 Proposed System
4 Methodology
5 Functionality
6 Results
7 Conclusion
8 Future Work
References
Detection of Leukemia Using Convolutional Neural Network
1 Introduction
1.1 Convolutional Neural Network (CNN)
2 Related Work
3 Methodology of Proposed Model
3.1 Dataset
3.2 Tools Used
3.3 Image Preprocessing
3.4 Architecture of Proposed CNN Model
3.5 Training Phase
4 Testing
5 Results and Discussion
6 Conclusion
References
TORA: Text Summarization Using Optical Character Recognition and Attention Neural Networks
1 Introduction
2 Related Work
2.1 Text Summarization Based on Output
2.2 Sentence Extraction Methods
3 Optical Character Recognition Using Python-Tesseract and One Hot Encoding
3.1 OCR Using PyTesseract
3.2 One Hot Encoding
4 Experimental Setup
4.1 Recurrent Neural Network, Long Short-Term Memory and Attention Networks
4.2 Activation Functions
4.3 Long Short-Term Memory Networks
4.4 Bidirectional Long Short-Term Memory
4.5 Attention Networks
5 Results and Discussion
5.1 Dataset Preprocessing
5.2 Training the Model
6 Conclusion
References
An Effective PUF Based Lightweight Authentication and Key Sharing Scheme for IoT Devices
1 Introduction
2 Related Works
3 Proposed System
4 Discussion
5 Conclusion
References
IoT-CBSE: A Search Engine for Semantic Internet of Things
1 Introduction
2 Literature Review
3 Problem Identification
4 Contribution and Organization of the Research
5 Search Engine for Device Discovery
6 Conclusion
7 Future Enhancements
References
Flood Monitoring and Alerting System for Low Lying Urban Areas
1 Introduction
2 Related Work
3 Architectural Framework
4 Methodology
4.1 Data Flow Diagram
4.2 Algorithm
5 Results
6 Conclusion
References
Automatic Gate Control System
1 Introduction
2 Overview of the Proposed Gate Control System
2.1 Hardware
2.2 License Plate Number Extraction
3 System Implementation
4 Results
5 Conclusion
References
Smart College Camera Security System Using IOT
1 Introduction
1.1 Contributions
2 Proposed System
2.1 Design of the System
2.2 Methodology
2.3 Description of Process
3 Results
4 Conclusions
References
Aquatic Debris Detection System
1 Introduction
2 Literature Survey
3 Architectural Framework
4 Methodology
5 Data Flow Diagram
6 Experimental Results
7 Conclusion
8 Future Scope
References
FleetHaven: A Fleet Tracking and Management System
1 Introduction
2 Literature Survey
3 Problem Statement and Proposed System
4 System Architecture
4.1 External Architecture
4.2 Internal Architecture
5 Results and Discussion
6 Conclusion
References
Experimental Evaluation and Accuracy Study of Free Offline English Handwritten Character Recognition Tools and Android Applications
1 Introduction
1.1 What is Handwritten Character Recognition?
1.2 Applications of Handwritten Character Recognition
1.3 Challenges in Character Recognition
2 Types and Phases of Handwritten Character Recognition
3 Evaluation of HCR Offline Tools and Android Applications
3.1 Character and Word Recognition Accuracy Computation Formulas (In Percentage)
4 Description of Free Offline HCR Tools Which Are Considered for Evaluation
4.1 Google Docs
4.2 ABBYY FineReader
4.3 SimpleOCR
4.4 FreeOCR
4.5 PDFElement
5 Experimental Evaluation of Free Offline HCR Tools
6 Character and Word Recognition Accuracies of Free Offline HCR Tools
7 Graphical Representation of Character and Word Recognition Accuracies of Free Offline HCR Tools
8 Description of Free HCR Android Applications Which Are Considered for Evaluation
8.1 CamScannerâScanner to Scan PDF
8.2 Imagetotext
8.3 Pen to Print
8.4 Text Scanner OCR
8.5 OCR Text Scanner
9 Experimental Evaluation of Free HCR Android Applications
10 Character and Word Recognition Accuracies of Free HCR Android Applications
11 Graphical Representation of Character and Word Recognition Accuracies of Free HCR Android Applications
12 Conclusion
13 Future Enhancements
References
E-agricultural Portal for Farmers Using Decentralized Ledger and Machine Learning Tools
1 Introduction
2 Literature Review
3 Methodology
4 Conclusion
5 Future Work
References
A Survey on Role of SDN in Implementing QoS in Routing in the Network
1 Introduction
2 Related Work
3 Proposed Work
4 Conclusion
References
Proficient Detection of Flash Attacks Using a Predictive Strategy
1 Introduction
2 Related Word
3 Methodology of the Study
4 Result Analysis
4.1 Confirmation of Normalcy of Errors
4.2 Hyndman-Khandakar Algorithm for Automatic ARIMA Modelling
4.3 Akaike Information Criteria
4.4 Root Mean Squared Error (RMSE)
4.5 Mean Absolute Percentage Error (MAPE)
4.6 Mean Absolute Error (MAE)
4.7 Coefficient of Multiple Determinations (R2)
5 Conclusion
References
Real-Time Image Deblurring and Super Resolution Using Convolutional Neural Networks
1 Introduction
2 Related Work
2.1 Framework
2.2 Methodology
2.3 CNN Architecture
3 Results and Evaluation
4 Conclusion and Future Scope
References
Foggy Security
1 Introduction
2 Related Work
2.1 Mutual Authentication
2.2 Rogue Node Detection
3 Architecture
3.1 Representative Architecture
3.2 Cloud-Fog Based Architecture
3.3 Applications
4 Implementation
4.1 Methodology
4.2 Design Considerations Mutual Authentication
4.3 Description of the Process Mutual Authentication
5 Experimentation and Results
5.1 Mutual Authentication
5.2 Rogue Node Detection
6 Conclusion
7 Future Work
References
Predicting the Rate of Transmission of Viral Diseases Using GARCH
1 Introduction
2 Related Work
3 Methodology
4 Comparative Study
5 Results and Discussion
6 Conclusion
References
Navigation Assistance and Collision Avoidance for the Visually Impaired âNACVIâ
1 Introduction
2 Related Work
3 Working Principle
4 Obstacle Detection, Avoidance, Navigation, Communication, Alert and Feedback
4.1 Smart-Cane
4.2 âKannuââSmartphone App
5 Components Used for Implementation
5.1 Hardware Components
5.2 Software Components
6 Physical Packaging Design Prototype
6.1 Software Development Environment
7 Result
8 Conclusion
9 Future Work
References
Health Review and Analysis Using Data Science
1 Introduction
2 Literature Survey
3 Technology Used
4 Design
5 Implementation
6 Results and Discussions
7 Conclusion
References
Efficiently Revocable Identity-Based Broadcast Encryption Using Integer Matrices as Keys
1 Introduction
1.1 Revocation Methods
1.2 Contributions
2 Related Work
3 Symbols, Notations and Definitions
3.1 Users and Their Identities
3.2 Private Key Generator
3.3 Registration
3.4 Setup
3.5 Key Generation
3.6 Relation Between the Rows of A and Columns of B
3.7 User Secret Keys
3.8 User Signature Verification Keys
3.9 Revocation List
4 Identity-Based Broadcast Encryption
4.1 Encryption
4.2 Extraction Property of C
4.3 Signature Verification
4.4 Decryption
5 Basic Layout of IBBE-MK
5.1 Authentication, Downloading and Decryption
5.2 Ciphertext Expansion Ratio
5.3 Security Analysis of IBBE-MK
5.4 Comparison of IBBE-MK with Other Methods
6 Conclusion
References
Sentiment Analysis to Detect Depression in Social Media Users: Overview and Proposed Methodology
1 Introduction
2 Related Work
2.1 Background Literature
2.2 Data Collection Techniques
2.3 Classification and Identification Techniques
2.4 Advantages
2.5 Disadvantages
3 Methodology
3.1 Cumulative Analysis
3.2 Mathematical Model
4 Conclusion
References
Process Logo: An Approach for Control-Flow Visualization of Information System Process in Process Mining
1 Introduction
2 Related Work
3 Event Log
3.1 Structure of Event Logs
4 Framework
5 Levenshtein Distance and Affinity Propagation
6 Results and Experiments
7 Future Scope
8 Conclusion
References
On the Maximum N-degree Energy of Graphs
1 Introduction
2 Bounds for Maximum N-degree Energy and Maximum N-degree Eigenvalues
3 The Maximum N-degree Energy of Certain Families of Graphs
4 Conclusion
References
Dynamic Resource Allocation for Virtual Machines in Cloud Data Center
1 Introduction
2 Related Work
3 Proposed System
3.1 Implementation details
3.2 Resource allocation to server
3.3 Genetic Algorithm
3.4 Power consumption and path computation
4 Use Case Diagrams
5 Results and Discussions
6 Conclusions
7 Future Works
References
Image Captioning for the Visually Impaired
1 Introduction
1.1 Motivation for the Problem Statement
2 Datasets
3 Previous Work
4 Implementation
4.1 Image Captioning
4.2 Working of Image Captioning
4.3 Android
5 Evaluation Metrics
6 Results
7 Conclusion
References
IoT-Based Water Quality Analysis and Purification System
1 Introduction
2 Background Theory
2.1 Dissolved Oxygen
2.2 pH
2.3 Turbidity and Total Suspended Solids(TSS)
2.4 Primary Treatment
2.5 Secondary Treatment
2.6 Tertiary Treatment
3 System Architecture
3.1 Measurement Kit
3.2 Purification System
4 Implementation
4.1 Primary Chamber
4.2 Aeration Chamber
4.3 PAC Chamber and Multigrade Filter
5 Performance Evaluation
6 Conclusion
References
đ SIMILAR VOLUMES
This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discus
<span>This book presents the proceedings of the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2022. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologist
<p><p>This book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2016. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss
<p><p>This book presents selected papers from the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2018. The conference provided an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologi
<p>This book presents selected papers from the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2018. The conference provided an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists