𝔖 Scriptorium
✦   LIBER   ✦

📁

Emerging Research in Data Engineering Systems and Computer Communications: Proceedings of CCODE 2019 (Advances in Intelligent Systems and Computing, 1054)

✍ Scribed by P. Venkata Krishna (editor), Mohammad S. Obaidat (editor)


Publisher
Springer
Year
2020
Tongue
English
Leaves
675
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book gathers selected papers presented at the 2nd International Conference on Computing, Communications and Data Engineering, held at Sri Padmavati Mahila Visvavidyalayam, Tirupati, India from 1 to 2 Feb 2019. Chiefly discussing major issues and challenges in data engineering systems and computer communications, the topics covered include wireless systems and IoT, machine learning, optimization, control, statistics, and social computing.

✦ Table of Contents


Preface
Contents
About the Editors
1 Back Pressure Monitoring of Power Plant Condenser Using Multiple Adaptive Regression Spline
Abstract
1 Introduction
2 Methodology
2.1 Data Analysis and Selection
2.2 Modelling
2.3 Statistical Error Analysis
3 Results and Discussion
3.1 Hyper-parameter Optimization
3.2 Model Performance
4 Conclusion
Acknowledgements
References
2 An Efficient Image Retrieval System for Remote Sensing Images Using Deep Hashing Network
Abstract
1 Introduction
2 Related Work
3 Deep Learning-Based Hashing Network
4 Experiment Details
5 Results
6 Conclusion
References
3 Tea Leaf Disease Prediction Using Texture-Based Image Processing
Abstract
1 Introduction
2 Literature Survey
3 Research Methodology
3.1 Dataset Acquisition
3.2 Image Pre-processing
3.3 Feature Extraction
3.3.1 Texture Feature Extraction Using Gray-Level Co-occurrence Matrix
3.3.2 Color Feature Extraction
3.4 Feature Selection and Feature Scaling
3.5 Classification System
4 Results and Discussion
5 Conclusion and Future Scope
References
4 Analyzing Significant Reduction in Traffic by Using Restricted Smart Parking
Abstract
1 Introduction
2 Smart Parking Tools
2.1 Smart Parking Sensors
2.2 Smart Parking Technologies
2.3 Smart Parking Applications
2.4 Smart Parking System Model
3 Methodology
3.1 Python
3.2 Analyzing Open Datasets Using Pandas in a Python
4 Data Collection
4.1 Current Used Datasets
5 Observation
5.1 Dataset–1 (Smart Parking Lot)
5.2 Dataset–2 (Smart Parking Restrictions)
6 Conclusion
References
5 Implementation Study and Performances Evaluation of an 802.11ad Model Under NS-3
Abstract
1 Introduction
2 Theoretical Study of IEEE 802.11ad and Related Works
2.1 IEEE 802.11ad
2.1.1 Physical Layer (PHY)
2.1.2 MAC Layer
2.2 Related Works
3 IEEE 802.11ad Implementation
4 Simulation and Performances Study
4.1 Simulation Parameters
4.2 Simulation Results
4.2.1 Throughput
4.2.2 Jitter
4.3 Latency
5 Conclusion
References
6 Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks
Abstract
1 Introduction
2 The Problem Statement
3 Proposed Distributed Trust-Based Monitoring (DTM) Approach
3.1 DTM Architecture
3.2 The Monitoring Process
3.3 Monitoring System Specification
4 Expected Results
4.1 Achieved Security Issues
4.2 Performance Evaluation: Usage Case: e-Health Applications
5 Conclusions
References
7 Artificial Intelligence-Based Technique for Detection of Selective Forwarding Attack in RPL-Based Internet of Things Networks
Abstract
1 Introduction
2 Related Work
3 Proposed System
4 Implementation
5 Results
6 Conclusion and Future Work
References
8 Decision Tree-Based Fraud Detection Mechanism by Analyzing Uncertain Data in Banking System
Abstract
1 Introduction
2 Related Work
2.1 Application of Banking Sector Data Mining
2.2 Extortion Detection
2.3 Risk Analysis in Decision Tree
3 Proposed Model
4 Credit Card Data Structural Format
4.1 Decision Tree-Based Fraud Analysis Mechanism
4.2 Architectural Design
5 Decision Tree Algorithm
6 Experimental Results
7 Conclusion
References
9 Numerical Weather Analysis Using Statistical Modelling as Visual Analytics Technique
Abstract
1 Introduction
2 Survey
3 Proposed Work
3.1 Pre-processing
3.2 Statistical Model Construction
4 Experimental Results and Discussion
4.1 Data Set
4.2 Correlation
4.3 Linear Regression Modelling
4.4 Multiple Linear Regression Modelling
5 Conclusion
References
10 Recommendation System Based on Optimal Feature Selection Algorithm for Predictive Analysis
Abstract
1 Introduction
2 Literature Review
3 Proposed System
3.1 Feature Extraction
3.2 Illustration of Proposed Feature Extraction from a User Access Log
3.3 Normalization of Feature Vector
3.4 Feature Selection
3.4.1 Proposed Feature Selection Algorithm
4 Implementation and Experimental Results
4.1 Comparative Study
5 Conclusion
References
11 Improving the Accuracy of Prediction of Plant Diseases Using Dimensionality Reduction-Based Ensemble Models
Abstract
1 Introduction
2 Related Works
3 Proposed Methodology
3.1 Dataset Description
3.2 Visual Geometry Group (VGG19)
3.3 Student-t Distributed Stochastic Neighbor Embedding (t-SNE)
3.4 Ensemble Models
4 Results and Discussion
5 Conclusion
References
12 Generic Architecture for Ubiquitous IoT Applications
Abstract
1 Introduction
2 Application Areas of IoT
2.1 Healthcare
2.2 Transportation
2.3 Environment
2.4 Agriculture
3 Architecture
4 Verification of Architecture with Respect to Various IoT Application Areas
4.1 Case 1: Healthcare
4.2 Case 2: Transportation
4.3 Case 3: Environment
4.4 Case 4: Agriculture
5 Future Prospects and Conclusion
References
13 Performance Evaluation of Spark SQL for Batch Processing
Abstract
1 Introduction
2 Literature Review
3 Methodology
3.1 Apache Spark-Cassandra Implementation
3.2 Apache Spark SQL Implementation
4 Proposed System
4.1 Data Frame
4.2 Proposed Algorithm
5 Experiment Analysis
6 Conclusion
References
14 IoT-Based Traffic Management
Abstract
1 Introduction
2 Existing Scenario
3 Proposed System
3.1 Traffic Computation
3.2 Traffic Decision Support System
3.3 Parking Issues and Traffic Congestion
3.4 Proposed System Architecture
4 Performance of the Proposed System
5 Conclusion
References
15 Detection of Autism Spectrum Disorder Effectively Using Modified Regression Algorithm
Abstract
1 Introduction
2 Autism Spectrum Disorder
2.1 Importance of Early Detection of ASD
2.2 Existing Methods for Detecting ASD
3 Machine-Learning Methods to Detect ASD
3.1 Regression Methods
4 Proposed Methodology
4.1 Algorithm for Proposed Regression Method
5 Implementation
6 Result Analysis
7 Conclusion and Future Work
Acknowledgements
References
16 Gene Sequence Analysis of Breast Cancer Using Genetic Algorithm
Abstract
1 Introduction
2 Multiple Sequence Alignment for Gene Sequence Analysis
3 Genetic Algorithm for Gene Sequence Analysis
4 MSAGA for Gene Sequence Analysis
5 Implementation
5.1 Flow Chart for MSAGA Algorithm Implementation in Python
5.2 MSA Algorithm Steps
5.3 GA Algorithm Steps
6 Experimental Result Analysis
6.1 Representation of Tabular Values with Similarity Scores
7 Conclusion and Change in the Future
References
17 Impact of Single Server Queue Having Machine Repair with Catastrophes Using Probability Generating Function Method
Abstract
1 Introduction
1.1 Description of the Model
1.2 Formulation of Basic Equations
1.3 Probability Generating Function Method
1.4 Factorial Moments
1.5 Numerical Illustration
2 Conclusion
References
18 Utilization of Blockchain Technology to Overthrow the Challenges in Healthcare Industry
Abstract
1 Introduction
2 Blockchain
2.1 Blockchain Working
2.2 Features of Blockchain Technology
3 Healthcare Industry and Challenges
3.1 Interoperability
3.2 Security
3.3 Cost of Maintenance
4 Blockchain—An Enabler of Healthcare Challenges
4.1 Blockchain Towards Interoperability
4.2 Blockchain-Based Models for Security
4.3 Prediction of Blockchain-Based System’s Maintenance Cost
5 Conclusions
References
19 Monitor and Abolish the Wildfire Using Internet of Things and Cloud Computing
Abstract
1 Introduction
2 Literature Review
3 IoT Architecture for Wildfire
3.1 Case Study
3.2 IoT for Wildfire Architecture
4 Discussion on Obstacles of IoT for Wildfire
5 Conclusion
References
21 Critical Review on Privacy and Security Issues in Data Mining
Abstract
1 Introduction
2 Architecture of Data Mining
3 Pros and Cons of Data Mining
3.1 Pros
3.2 Cons
4 Survey on Privacy and Security Issues in Data Mining
4.1 DoS/DDoS
4.2 Malware
4.3 Botnet
4.4 Spyware
4.5 Probing
4.6 Ransomware
5 Conclusions
References
22 A Review of Semantic Annotation Models for Analysis of Healthcare Data Based on Data Mining Techniques
Abstract
1 Introduction
2 Semantic Annotation Process
2.1 Overcoming the Issue of Interoperability in Healthcare Infrastructure with the Help of Semantization Annotation Models
3 Literature Review
4 Proposed Research Work
5 Conclusion
References
23 Review of Optimization-Based Feature Selection Algorithms on Healthcare Dataset
Abstract
1 Introduction
2 Literature Survey
3 Proposed Feature Selection Method
4 Conclusion
References
24 Survey: A Comparative Study of Different Security Issues in Big Data
Abstract
1 Introduction
2 Literature Survey
2.1 Framework of Big Data
2.2 Types of Security
3 Literature Review of Data Privacy
3.1 Confidentiality
3.2 Data Integrity
3.3 Privacy
4 Literature Review of Infrastructure Security
4.1 Security for Hadoop
Acknowledgements
References
25 Mineral Identification Using Unsupervised Classification from Hyperspectral Data
Abstract
1 Introduction
2 Background
3 Study Area and Data
4 Methodology
4.1 Data Pre-processing
4.2 Dimensionality Reduction
4.3 Classification Approach
5 Experiment and Result
6 Conclusion
References
26 Accountable Communication in Ubiquitous Computing
Abstract
1 Introduction to Smart Communication
2 Privacy Policies and Risks Involved in Smart Communication
2.1 Smart Wristbands—A Simple Case Study for Privacy Issues
3 Ubiquitous Systems—Overview
4 Methodology and Techniques Used in Ubiquitous Scenario
5 Expected Services Versus Privacy Scenarios in Ubiquitous System
6 Cognitive Hacking—An Assumed Threat in UbiComp Systems
7 Techniques and Fact Findings from the Literature Study
8 Summary of Interpretations and Implications
9 Accountability in Ubiquitous Computing
10 Conclusion
References
27 Prediction of Real Estate Price Using Clustering Techniques
Abstract
1 Introduction
2 Background
3 Methodology
4 Implementation
4.1 Data Processing
4.2 Data Cleaning
4.3 Data Integration
4.4 Data Transformation
4.5 Data Reduction
4.6 Data Discretization
5 Result Analysis
6 Conclusion
References
28 Study and Analysis of Matrix Operations in RLNC Using Various Computing
Abstract
1 Introduction
2 Related Work
3 Comparative Study
3.1 Centralized Computing
3.2 Cloud Computing
3.3 Edge Computing
3.4 Fog Computing
3.5 Grid Computing
3.6 Sequential Computing
3.7 Parallel Computing
4 Basics of Networking Coding
5 Optimized Block Operations on Matrices for RLNC
5.1 Earlier Approach
5.2 Operations Based on Matrix Blocking
6 DAG Scheduling Graphs for Optimized Parallelization of RLNC
7 Conclusion
References
29 Comprehensive Survey of IoT Communication Technologies
Abstract
1 Introduction
2 Wired Technologies
2.1 Internal Communication
2.2 External Communication
3 Wireless Technologies
3.1 Short-Range Standards
3.2 Long Range Standards
4 Conclusions
References
30 Cost Effective Model for Using Different Cloud Services
Abstract
1 Introduction
2 Cloud Service Providing System
2.1 CSB System
2.2 CSP System
2.3 CSC System
3 Pricing Models
3.1 Case Study #1: GOOGLE INSTANCE CLOUD
3.2 Case Study #2: MICROSOFT AZURE
4 Conclusion
References
31 Sentiment Analysis on Movie Reviews
Abstract
1 Introduction
2 Background
3 Proposed Method
4 Results
5 Conclusion
References
32 Privacy-Preserving Data Mining in Spatiotemporal Databases Based on Mining Negative Association Rules
Abstract
1 Introduction
1.1 Mining Association Rules
1.2 Mining Association Rules in Spatiotemporal Database
2 Related Work
3 Proposed Framework
4 Proposed Algorithm
5 Analytical Results
6 Conclusion
References
33 Spatial Data-Based Prediction Models for Crop Yield Analysis: A Systematic Review
Abstract
1 Introduction
2 Background
2.1 Multispectral and Hyperspectral Images
2.2 Vegetation Indices
3 Hyperspectral Image-Based Crop Yield Prediction
3.1 Optimal Band Selection
3.2 Crop Classification
3.3 Parameter Selection
3.4 Prediction Models
4 Discussions
5 Conclusions
References
34 Review on Neural Network Algorithms for Air Pollution Analysis
Abstract
1 Introduction
2 Review of Air Pollution Index
2.1 Air Pollution Computation
2.2 Air Quality Index Research
3 Conclusion
References
35 Implementation of Signal Processing Algorithms on Epileptic EEG Signals
Abstract
1 Introduction
1.1 Wavelet Signal Processing Algorithms
2 Methodology
2.1 Frequency- and Time-Localized Reconstruction from the Continuous Wavelet Transform (CWT)
2.2 Inverse Continuous 1-D Wavelet Transform (ICWT)
2.3 Automatic 1-D De-noising Using Wavelets
3 Results
3.1 Frequency- and Time-Localized Reconstruction from the Continuous Wavelet Transform (CWT)
3.2 Inverse Continuous 1-D Wavelet Transform (ICWT)
3.3 Automatic 1-D De-noising Using Wavelets
4 Conclusion
Acknowledgements
References
36 Big Data Analytics in Health Care
Abstract
1 Introduction
2 Big Data in Healthcare Analytics
2.1 Process of Big Data Analytics in Health Care
3 Tools/Technologies of Big Data
4 Conclusion and Future Work
References
37 Analysing Human Activity Patterns by Chest-Mounted Wearable Devices
Abstract
1 Introduction
1.1 Smart Chest Wearable
2 Related Work
3 Data Collection
4 Methodology
5 Data Analyses
5.1 Data Sets 1: Smart Wearable Commercially Available
5.2 Data Set 2: Human Activity Classification
6 Conclusion
Acknowledgements
References
38 The Role of Big Data Analytics in Smart Grid Management
Abstract
1 Introduction
2 Applications of Big Data Analytics in Smart Grid
2.1 Demand-Side Management System
2.2 Electricity Theft Detection
2.3 Electric Devices State Estimation and Predictive Maintenance
2.4 Energy Production Optimization
2.5 Renewable Energy Forecasting
3 Methods of Data Analytics in Smart Grid
4 Conclusion
References
39 Fraudulence Detection and Recommendation of Trusted Websites
Abstract
1 Introduction
1.1 Motivation
1.2 Objective
1.3 Proposed System
1.4 Advantages of Proposed System
2 Literature Survey
3 Implementation of the Proposed System
3.1 System Architecture
3.2 Module Description
4 Experimental Results and Discussion
4.1 Scrapping Data from Website Result
4.2 Text Mining Result
4.3 Decision Graph Based on Text Mining Result
4.4 Rating Graph Based on Given Customer Ratings
4.5 Decision Graph for Fraudulence Detection
4.6 Fraudulence Detection Percentage
4.7 Final Result—Recommendation of Opposition of Product
5 Future Work
6 Conclusion
References
40 Detection and Localization of Multiple Objects Using VGGNet and Single Shot Detection
Abstract
1 Introduction
2 Background
3 Proposed Method
3.1 Generalization
3.2 Image Classification
3.3 Image Retrieval
3.4 Object Detection
3.5 General Object Detection Framework
3.6 Single Shot Detection
3.7 VGGNet
4 Implementation
4.1 Unsupervised Pretraining
4.2 Combining Feature Maps
5 Results
5.1 Training Graphs and Error Graphs
6 Test Results
7 Conclusion
References
41 Smart Security System Using IoT and Mobile Assistance
Abstract
1 Introduction
2 IoT and Smart Environments
3 IoT Research Challenges and Solutions
4 Issues in Smart Security System
5 Research Gaps Identified
6 Related Work
7 Solving the Security Challenges of Enterprise Architectures
8 Problem Statement
9 Design Requirements for Smart IoT-Based Security System
10 Proposed Smart Security System Using IoT with Mobile Assistance
11 System Architecture and Its Implementation
12 Conclusions and Future Work
References
42 Highway Toll Management and Traffic Prediction Using Data Mining
Abstract
1 Introduction
2 Proposed Methodology
3 Architecture
4 Working Model
4.1 Registration and Payment Module
4.2 Checking module
5 Implementation
6 Algorithms
6.1 Traffic Prediction Algorithm
6.2 Image to Text Extraction Algorithm
7 Results
7.1 Graphs
8 Conclusion
43 Machine Learning Usage in Facebook, Twitter and Google Along with the Other Tools
Abstract
1 Introduction
2 Machine Learning Usage in Social Media (FB, Twitter and Google) with Other Algorithms
3 Usage of Deep Learning in the Current Scenarios
4 Conclusion
References
44 Automatically Labeling Software Components with Concept Mining
Abstract
1 Introduction
2 Background
2.1 Latent Dirichlet Allocation Model (LDA)
2.2 Formal Concept Analysis (FCA)
2.3 Validation Measures
3 Proposed Model
3.1 Source Files
3.2 Slicing
3.3 Preprocessing
3.4 LDA Modeling
3.5 K-Means Clustering
3.6 Concept Mining
4 Experimental Study
5 Results and Discussion
6 Conclusion
References
45 The Avant-Garde Ways to Prevent the WhatsApp Fake News
Abstract
1 Introduction
2 Instant Messaging Application
3 Fake News
4 Fake News and Whatsapp
5 Related Work
6 Fighting Back Fake News
7 Whatsapp—Fighting Back Fake News
8 Solution Proposed for Curbing Fake News in Whatsapp
9 Conclusions and Future Work
References
46 Statistical Approaches to Detect Anomalies
Abstract
1 Introduction
1.1 Statistical Approaches to Find Anomalies
2 Detecting Outliers in a Univariate Normal Distribution
3 Grubb’s Test to Detect Outliers in Statistical Approaches
4 Outliers in Multivariate Normal Distribution
5 Hypothesis Testing
6 Parzen Density Estimation
7 kNN Based Approaches
8 A Mixture Model Approach for Anomaly Detection
9 Issues with Statistical Approaches of Anomaly Detection
10 Conclusion
References
47 An Extensive Survey on Some Deep-Learning Applications
Abstract
1 Introduction
2 Importance of Deep Learning Over Other Techniques
3 Deep-Learning Applications
4 Conclusion
References
48 A Cluster-Based Improved Expectation Maximization Framework for Identification of Somatic Gene Clusters
Abstract
1 Introduction
2 Related Works
3 Somatic Mutations Cancer Dataset and Its Description
4 Proposed Model
4.1 Improved expectation maximization clustering algorithm
5 Implementation of the Proposed Model
6 Application of AdaBoost Algorithm on Each Cluster
7 Conclusion
References
49 Identification of Ontologies of Prediabetes Using SVM Sentiment Analysis
Abstract
1 Introduction
1.1 Social Media and Prediabetes
1.2 SA and Ontologies
2 Description of the Proposed Methodology
3 Experimental Setup
4 Two-Level Performance Evaluation
5 Results and Discussion
5.1 Advanced Visualizations in R
5.2 Ontology Visualizations
6 Beneficial Features of the Proposed Model
7 Conclusion
References
50 A Systematic Survey on Software-Defined Networks, Routing Protocols and Security Infrastructure for Underwater Wireless Sensor Networks (UWSNs)
Abstract
1 Introduction
2 Underwater Communication Techniques
3 Underwater Wireless Sensor Network Routing Protocols
4 Security Issues in UWSNs
5 Conclusions
References
51 Novel Probabilistic Clustering with Adaptive Actor Critic Neural Network (AACN) for Intrusion Detection Techniques
Abstract
1 Introduction
2 Proposed Method
3 Results
4 Conclusions
References
Survey on Classification and Feature Selection Approaches for Disease Diagnosis
1 Introduction
2 Feature Selection
3 Classification
4 Results and Discussion
5 Conclusion
References
53 Review on Supervised Learning Techniques
Abstract
1 Introduction
2 Learning
2.1 Supervised Learning
2.1.1 Decision Trees
2.1.2 Rule-Based Classifiers
2.1.3 Instance-Based Classifiers
NNC (Nearest Neighbor Classifier)
K-NNC
3 Unsupervised Learning (Clustering)
3.1 Partitioning Methods
3.2 Hierarchical Methods
3.3 Density-Based Clustering Methods
4 Semi-supervised Learning (SSL)
4.1 Semi-supervised Classification
4.2 Semi-supervised Clustering
5 Conclusions and Future Work
References
54 Wireless Technology over Internet of Things
Abstract
1 Introduction
2 Literature Survey
2.1 Bluetooth
2.2 Zigbee
2.3 Z-Wave
2.4 6LoWPAN
2.5 LoRa
2.6 Wi-fi
2.7 NFC
2.8 Sigfox
2.9 RFID
2.10 EnOcean
3 Analysis of Wireless Technology
4 Case Study
5 Conclusion
References
55 A Critical Review on Internet of Things to Empower the Living Style of Physically Challenged People
Abstract
1 Introduction
2 Background
2.1 Physical Disability
2.2 Visual Disability
2.3 Hearing Disability
3 State-of-the-Art IoT
3.1 IoT for the Physically Challenged Will Help Build Smart Homes
3.2 IoT for the Physically Challenged Will Help Increase Mobility
3.3 IoT for the Physically Challenged Will Help Monitor Them
3.4 Lightweight Wearable Devices
3.5 Assistive Technology (AT)
4 Application Areas
4.1 At Shopping Malls, Hotels, and Theaters
4.2 At Public Transport
4.3 At Schools and Academic Institutions
4.4 At Domestic Environment—Creating Smart Homes
5 Case Study for Voice-Enabled IoT Device for Visually Impaired People
6 Conclusion
References
56 IoT-Cloud-Based Health Care System Framework to Detect Breast Abnormality
Abstract
1 Introduction
2 Associated Effort
3 Projected Effort
3.1 Proposed Model
3.2 Block Diagram of ICHC System
3.3 Cloud Services
3.4 Proposed Methodology
4 ICHC System Implementation Discussion
5 Results Discussion
6 Conclusion
7 Future Work
References
57 Smart Home Monitoring and Automation Energy Efficient System Using IoT Devices
Abstract
1 Introduction
1.1 Arduino Uno
1.1.1 Inexpensive
1.1.2 Cross-Platform
1.1.3 Programming Environment
1.1.4 Open-Source and Extensible Software
1.1.5 Open-Source and Extensible Hardware
1.2 Raspberry Pi 3
1.2.1 Sensors and Other Devices
1.2.2 IR Sensor
1.2.3 DHT22 Sensor
1.2.4 MQ2 Gas Sensor
1.2.5 Relay
1.2.6 Transceiver
2 Literature Survey
2.1 Bluetooth-Based Home Automation System Using Cell Phones
2.2 GSM-Based System Using Mobile Phones
2.3 Home Automation Using RF Module
3 Implementation
3.1 Architecture of Smart Home
3.2 Communication Model of Smart Home
3.3 Board Setup
4 Conclusion and Future Enhancements
References
58 Realistic Sensor-Cloud Architecture-Based Traffic Data Dissemination in Novel Road Traffic Information System
Abstract
1 Introduction
2 Related Work
3 Architecture of Sensor Data Storage on Cloud
3.1 Steps in Collecting Real-Time Traffic Data
4 Road Traffic Information System
4.1 Hybrid Architecture
4.2 RSU Role in Road Traffic Information System
4.3 RSU Discovery
4.4 Abstract View of Road Traffic Information System
4.5 Steps in Sensor-Cloud Implementation for Road Transportation
5 Simulation Results
6 Conclusions
References
59 Tech Care: An Efficient Healthcare System Using IoT
Abstract
1 A Brief Introduction to IoT
2 Healthcare—An Introduction
3 An Introduction to IoT in Healthcare
4 Advantages of IoT Healthcare System
4.1 Remote Monitoring
4.2 Improved Drug Quality
4.3 Electronic Health Records
4.4 Avoiding Adverse Drug Reaction
4.5 Access to Wearable Devices
5 IoT Healthcare Applications
5.1 Sugar Level Monitoring
5.2 Blood Pressure Monitoring
5.3 Body Temperature Monitoring
5.4 ECG—Electrocardiogram Monitoring
5.5 Blood Oxygen Saturation Monitoring
5.6 Rehabilitation System
5.7 Medication Management
5.8 Smartphone for Healthcare Solutions
5.9 Robotics in Healthcare
5.10 Ambulance Telemetry
5.11 Pills for Diagnosis
5.12 Smart Pill Bottles
5.13 Pharmacy Management
5.14 Tracking Hospital Equipment
6 Enabler Technologies in IoT Healthcare
6.1 Communication Standards
6.2 Big Data
6.3 Cloud Computing
6.4 Nanotechnology
6.5 AI and Automation
7 IoT Healthcare Challenges
7.1 Confidentiality
7.2 Empowered Users
7.3 Limited Resources
7.4 Cross-Platform Security
7.5 Standardization
7.6 Mobility
8 Conclusion
References
60 Introduction to Concept Modifiers in Fuzzy Soft Sets for Efficient Query Processing
Abstract
1 Introduction
1.1 Linguistic Hedges in Zadeh’s Fuzzy Logic
1.2 Fuzzy Soft Sets
2 Proposed Framework
2.1 Pre-processing
2.2 Meta Information Table
2.3 Query Processing
3 Conclusion
References
Smart and Efficient Health Home System
1 Introduction
2 Literature Review
3 Smart Health System Architecture
3.1 Remote Monitoring System
3.2 Reminding System
3.3 Fall Detection System
4 A Prototype Implementation
5 Results and Discussion
5.1 Remote Monitoring System
5.2 Reminding System
5.3 Camera
5.4 Fall Detection System
6 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Intelligent Computing and Communication:
✍ Vikrant Bhateja (editor), Suresh Chandra Satapathy (editor), Yu-Dong Zhang (edit 📂 Library 📅 2020 🏛 Springer 🌐 English

<span>This book features a collection of high-quality, peer-reviewed papers presented at the Third International Conference on Intelligent Computing and Communication (ICICC 2019) held at the School of Engineering, Dayananda Sagar University, Bengaluru, India, on 7 – 8 June 2019. Discussing advanced

Intelligent Computing and Communication:
✍ M. Seetha (editor), Sateesh K. Peddoju (editor), Vishnu Pendyala (editor), Vedul 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book features a collection of high-quality, peer-reviewed papers presented at the Sixth International Conference on Intelligent Computing and Communication (ICICC 2022) organized by Department of Computer Science and Engineering, G. Narayanamma Institute of Technology and Science (for wom

Computational Advancement in Communicati
✍ Koushik Maharatna, Maitreyi Ray Kanjilal, Sukumar Chandra Konar, Sumit Nandi, Ku 📂 Library 📅 2020 🏛 Springer Singapore 🌐 English

<p><p></p><p>This book gathers the proceedings of the International Conference on Computational Advancement in Communication Circuits and Systems (ICCACCS 2018), which was organized by Narula Institute of Technology under the patronage of the JIS group, affiliated with West Bengal University of Tech

Computational Advancement in Communicati
✍ Koushik Maharatna, Goutam Kumar Dalapati, P K Banerjee, Amiya Kumar Mallick, Mou 📂 Library 📅 2015 🏛 Springer India 🌐 English

<p><p>This book comprises the proceedings of 1st International Conference on Computational Advancement in Communication Circuits and Systems (ICCACCS 2014) organized by Narula Institute of Technology under the patronage of JIS group, affiliated to West Bengal University of Technology. The conference

Intelligent Communication, Control and D
✍ Sushabhan Choudhury (editor), R. Gowri (editor), Babu Sena Paul (editor), Dinh-T 📂 Library 📅 2021 🏛 Springer 🌐 English

<p>This book focuses on the integration of intelligent communication systems, control systems and devices related to all aspects of engineering and sciences. It includes high-quality research papers from the 4th International Conference on Intelligent Communication, Control and Devices (ICICCD 2020)