<span>This book comprises the select proceedings of the International Conference on Emerging Global Trends in Engineering and Technology (EGTET 2020), held in Guwahati, India. The chapters in this book focus on the latest cleaner, greener, and efficient technologies being developed for the implement
Emerging Technologies for Computing, Communication and Smart Cities: Proceedings of ETCCS 2021 (Lecture Notes in Electrical Engineering, 875)
✍ Scribed by Pradeep Kumar Singh (editor), Maheshkumar H. Kolekar (editor), Sudeep Tanwar (editor), Sławomir T. Wierzchoń (editor), Raj K. Bhatnagar (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 778
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book presents best selected papers presented at the Second International Conference on Emerging Technologies for Computing, Communication and Smart Cities (ETCCS 2021) held on 21-22 August 2021 at BFCET, Punjab, India. IEI India members supported externally. It is co-organized by Southern Federal University, Russia; University of Jan Wyżykowski (UJW), Polkowice, Poland, SD College of Engineering & Technology, Muzaffarnagar Nagar, India as an academic partner and CSI, India for technical support. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.
✦ Table of Contents
Preface
Contents
About the Editors
Emerging Computing Technologies
Healthcare Transformation Traditional to Telemedicine: A Portrayal
1 Introduction
1.1 Telemedicine
1.2 Current State: Telemedicine Today
1.3 Major Contributions
2 Background Study
2.1 Gaps Identified
3 Current Trends in Telemedicine
4 Reason of Adoption
4.1 Patient Per Doctor Unavailability (Patient:Doctor)
4.2 Increase in Smart Phone Users
4.3 Stringent Cyber-Security Measures
4.4 Modeling Telemedicine Using Regression
5 Conclusion
References
Comparative Analysis of Semantic Similarity Word Embedding Techniques for Paraphrase Detection
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Problem Definition
3.2 Corpora
3.3 Text Preprocessing
3.4 Models Referred
3.5 Distance Computation Between Word Embeddings to Detect Plagiarism
3.6 Evaluation and Results
4 Conclusion and Future Scope
References
Machine Learning Approach for Identifying Survival of Bone Marrow Transplant Patients
1 Introduction
2 Dataset Description
3 Proposed Framework
4 Results
5 Conclusion and Discussion
References
Human Disease Prognosis and Diagnosis Using Machine Learning
1 Introduction
2 Machine Learning
2.1 Machine Learning Viewpoint
2.2 Machine Learning Approaches
3 Machine Learning in the Healthcare System
3.1 Sources of Healthcare Data
4 Disease Prognosis Using Machine Learning
5 Disease Diagnosis Using Machine Learning
6 Methodology
6.1 Datasets Collection
6.2 Data Pre-processing of Datasets
6.3 Feature Extraction
6.4 Feature Selection
6.5 Division of the Datasets
6.6 Selection of Machine Learning Algorithms
6.7 Performance Evaluation of a Machine Learning Model
6.8 Predicted Output
7 Conclusion
References
Incorporating Financial News Sentiments and MLP-Regressor with Feed-Forward for Stock Market Prediction
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Problem Definition
3.2 Data Collection
3.3 Evaluation Metrics
3.4 Model Used
3.5 Evaluation and Results
4 Conclusion and Future Scope
References
Framework for Context-Based Intelligent Search Engine for Structured and Unstructured Data
1 Introduction
2 Related Work
3 Word Embedding: GloVe Embedding
4 ElasticSearch
4.1 Why Indexing in ElasticSearch?
4.2 How Indexing Is Done in ElasticSearch?
5 Implementation Details
6 Results and Discussions
7 Conclusion
References
Design and Development of Enhanced Secured Video Communication System for Medical Video Sensor Network
1 Introduction
2 Related Work
3 Proposed Work
3.1 Sensor Node Design
3.2 The Development and Transmission of Video Bundle
3.3 Queue Scheduler
3.4 Congestion Identification
4 Performance Analysis
5 Conclusion
References
Detecting Twitter Hate Speech Using Sentiment Analysis
1 Introduction
1.1 Twitter
1.2 Data Cleaning
1.3 Text Mining
1.4 Exploratory Data Analysis
1.5 Modeling
1.6 Twitter API and MySQL Storage
1.7 Model Evaluation and Dashboard
2 Existing Work and Problems Identified
3 Proposed Work and Research Method
4 Results and Observation
5 Conclusion
References
Comparative Evaluation of Semantic Similarity Upon Sentential Text of Varied (Generic) Lengths
1 Introduction
2 Semantic Similarity Computations: A Survey
2.1 Structured Approaches: State-of-the-Art
2.2 Structure-Based Approach Revisited
3 Methodology
3.1 Semantic Similarity Computation (Phase I)
3.2 Semantic Similarity Computation: Phase II
4 Experiments and Results
5 Conclusion
References
The Role of Artificial Intelligence and Data Science Against COVID-19
1 Introduction
2 Application of Data Science
2.1 Real-Time Visualization
2.2 Forecasting and Prediction
2.3 Discovering Treatments
2.4 Calculating Risk Factors
2.5 Identifying Who is Dying and Why
2.6 Drug Discovery
2.7 Monitor Patients Health
2.8 Track and Prevent Disease
2.9 Robotics
2.10 Predictive Analytics
2.11 Contact Tracing
3 Role of Artificial Intelligence in Predicting COVID-19 Patients
3.1 Early Detection
3.2 Decision Making
3.3 Treating Disease
3.4 Associated Care
3.5 Checking Health Through Wearable
3.6 End of Life Care
4 Precautions to be Taken to Avoid Getting Infected
5 Role of Data Science in Managing Critical Patients
6 Available Datasets
7 Controlling COVID-19
7.1 Social Distancing
7.2 Testing
7.3 Travel Measures
7.4 Containment
7.5 Personal Hygiene
8 Summary of Works Done by Researchers
9 Conclusion and Future Work
References
Spectral Analysis of DNA on 1-D Hydration Enthalpy-Based Numerical Mapping Using Optimal Filtering
1 Introduction
2 Materials and Method
2.1 DNA Sequence Database
2.2 Numerical Mapping of DNA Sequence
2.3 Linear Phase Least Square FIR Filtering
2.4 Calculation of Power Spectral Density
2.5 Evaluation Criterion
3 Results
4 Discussions
5 Conclusions
References
A Novel Ensemble Model for Breast Cancer Diagnosis
1 Introduction
2 Related Work
3 Materials and Methods
3.1 Implementation of Work
4 Results and Discussion
4.1 Results Using Individual Classifiers
5 Conclusion
References
A Novel Smart Aging Approach for Monitor the Lifestyle of Elderlies and Identifying Anomalies
1 Introduction
2 Structure Planning
2.1 Action Health Nursing
2.2 Irregularity Detection
2.3 Daily Living Activities
3 Proposal and Experimental Setup
4 Outcomes and Debate
4.1 DataSet for Activities of Different House Sensors
4.2 ADL Measurement
4.3 Comparison of Older and Younger People’s Data
5 Impending Augmentations
References
Spatial Analysis of Violent Crime Dataset Using Machine Learning
1 Introduction
2 Related Work
2.1 K-Nearest Neighbor Classifier
2.2 Decision Tree Classifier
3 Materials and Methods
4 Results
5 Conclusion
References
Analysis of Violent Crime Dataset Using Support Vector Machine Model
1 Introduction
2 Literature Review
2.1 The Support Vector Machine (SVM)
3 Results and Discussion
4 Discussion
5 Conclusion
References
Nigeria Human Population Management Using Genetic Algorithm Double Optimized Fuzzy Analytics Engine Approach
1 Introduction
2 Literature Review
2.1 Theories of Human Population Changes
2.2 Population Forecasting Techniques
2.3 Related Studies
3 Methodology
3.1 The Proposed Model
3.2 Fuzzy Rule List Construction
3.3 Experimental Setting
3.4 Performance Evaluation Metrics
4 Discussion of Results
5 Conclusion
References
Flower Species Detection System Using Deep Convolutional Neural Networks
1 Introduction
2 Literature Survey
3 The Architecture of the Proposed System
4 Process Flow Chart of the Proposed System
4.1 Oxford 102 flower’s Dataset
4.2 Flower Images Segmentation Using BiCoS
4.3 Cropped and Segmented Flower Images
4.4 Pre-trained Models on ImageNet Dataset
4.5 Transfer Learning
5 Pseudo-Code of the Proposed System
6 Implementation of the Algorithm
7 Discussion of Result of the Proposed System and Comparison of the Results with the Existing Work
7.1 Number of Epochs Versus Classification Accuracy
7.2 Number of Epoch Versus Training Loss
7.3 Validation Curve
7.4 Comparison of the Results of the Proposed System with the Exiting System
8 Conclusion and Future Work
References
Data Localization and Privacy-Preserving Healthcare for Big Data Applications: Architecture and Future Directions
1 Introduction
1.1 Research Contributions
1.2 Article Layout
2 Architecture of Healthcare System
3 Privacy Preservation in Big-Data-Oriented Healthcare: A Solution Taxonomy
3.1 Privacy Preservation Techniques
4 Conclusion
References
Network and Computing Technologies
Design of Facial Recognition Based Touchless Biometric System
1 Introduction
2 Related Work
2.1 Literature Review
3 Methodology
3.1 Techniques and Tools
4 Results and Discussion
5 Conclusion
References
Seeker Optimization for Linear Phase Fir Filter Design
1 Introduction
2 Optimization Algorithms for FIR Filter
2.1 PSO Algorithm
2.2 Bat Optimization Algorithm
2.3 Seeker Optimization Algorithm
3 Results
4 Conclusion
References
Cloud Supported Secure e-Card College Management System
1 Introduction
2 Literature Survey
3 Modules
4 Analysis the Gathered Data
5 Conclusion
6 Future Scope
References
An Optimization of VM Allocation and Migration in Cloud Computing Systems for High Throughput and Low Tolerance
1 Introduction
2 Cloud Computing Diversities
2.1 Infrastructure-as-a-Service
2.2 Platform-as-a-Service
2.3 Software-as-a-Service
3 Related Work
4 Proposed Work
5 Methodology Flow Diagram
5.1 Step by Step Execution of the Research Methodology
6 Result and Discussions
7 Conclusion
References
GraDex—Graph-Based Data Analytics for Extractive Text Summarization
1 Introduction
2 Related Work
3 Methodology and Concepts
3.1 Dataset Considerations
3.2 Text Pre-processing
3.3 Processing
4 Results and Evaluation
4.1 Principle and Evaluation Metric
4.2 Evaluation Results
5 Conclusion
References
Smart Traffic Monitoring with Fog and Cloud Computing
1 Introduction
2 Computing Technologies-Based Solutions for Smart Traffic Monitoring
3 Computing Technologies for Smart Traffic Monitoring
3.1 Cloud Computing for IoT
3.2 Fog Computing for IoT
4 Emerging Challenges
5 Conclusion
References
A Review of Precision Agriculture Methodologies, Challenges, and Applications
1 Introduction
1.1 Precision Agriculture Policies and Performs
2 Legacy Systems
2.1 Crop Monitoring System Using IoAT
2.2 Camera-Chessboard Array Preparation
2.3 Rural Architectural Network
2.4 Irrigation System Through Aerial Sight and Central Pivot
2.5 Anticipated Methodology
3 Conclusions and Future Enhancement
References
Power Quality Enhancement and Low Voltage Ride Through Capability in Hybrid Grid Interconnected System by Using D-Fact Devices
1 Introduction
2 Future Simulated Methods and Explanation
2.1 Photovoltaic Installations
2.2 Modeling of Wind Plant
2.3 Double Fed Induction Generator (DFIG) Modeling
3 UPQC Topology
4 Formation of Hybrid UPQC
4.1 Series Converter Control
4.2 Shunt Converter Control
5 Results and Discussion
6 Conclusion
References
Optimal LFC Regulator for Frequency Regulation in Multi Area Power System
1 Introduction
2 Grey Wolf Optimization (GWO)
3 Fractional Order Controllers
3.1 Tilt-Integral-Derivative (TID) Controller
3.2 Fractional Order PID (FOPID) Controller
4 Sliding Mode Controller (SMC)
4.1 Disturbance Observer to Estimate Extended Disturbance
4.2 Design of Sliding Surface
4.3 The Control Law Based on Super-Twisting Algorithm
5 Results
6 Conclusion and Future Scope
References
Optimal Power Flow Using Firefly Algorithm with Solar Power
1 Introduction
2 Mathematical Problem Formulation of OPF
2.1 Dependent State Variables
2.2 Independent system Control Variables
2.3 Constraints
3 Modelling of Solar Energy System
4 Firefly Algorithm
5 Firefly Algorithm for Solving OPF Problem
6 Results and Discussions
7 Conclusion
References
Designing of Learning Environment of an Intelligent Tutoring System for Academic Learning Needs of Learning-Disabled Learners Based on Survey Report of Region-Specific Target Group
1 Introduction
1.1 Learning Disabilities: Dyslexia, Dysgraphia and Dyscalculia
1.2 Domain Model of an Intelligent Tutoring System
2 Objectives of Paper
3 Review of Literature
4 Research Methodology
5 Results
5.1 Research Objective 1: Identification of Specific Target Group Through Various Assessments
5.2 Research Objective 2: Developing Learner-Centric Learning Environments for Domain Model of an Intelligent Tutoring System
6 Discussion
7 Conclusion
References
Trusted 6G-Envisioned Dynamic Spectrum Allocation: A Reference Model, Layered Architecture, and Use-Case
1 Introduction
1.1 Research Contributions
1.2 Article Structure
2 State of the Art
3 A Reference Model of Blockchain-Based 6G-Spectrum Allocation
3.1 The Emergence of 6G and Blockchain in Communications
3.2 A Proposed Reference Model
4 The Layered Reference Stack of Blockchain-Based 6G-Spectrum Allocation Scheme
4.1 Layer 0: The Spectrum Layer
4.2 Layer 1: The Authority Layer
4.3 Layer 2: The Contract Layer
4.4 Layer 3: The Decentralization Layer
5 Case Study: A Scorecard and Reputation-Based Spectrum Allocation
6 Conclusion
References
Experimental Evaluation of QFT Adders on IBM QX Hardware
1 Introduction
2 Background
2.1 QFT and IQFT ch31qubitspsstaging
2.2 Arbitrary Single-Qubit Quantum Gates
2.3 Quantum Gates
3 Proposed Work on QFT Adder Circuits
3.1 One-Qubit QFT Adder
3.2 Two-Qubit QFT Adder
4 Experiments on Quantum Additions Using One-Qubit and Two-Qubit QFT Adders
4.1 Experimental Analysis of One-Qubit QFT Adder
4.2 Experimental Analysis of Two-Qubit QFT Adder
5 Conclusions
References
Wireless Networks and Internet of Everything (IoE)
A Microcontroller Based Hardware Implementation to Detect and Protect a Transformer Against Various Faults
1 Introduction
2 Problem Formulation
3 Proposed Model
4 Hardware Implementation and Working
5 Results and Discussion
6 Conclusion
References
Fuzzy—KNN-Assisted Vehicular Localization for Bluetooth and Wi-Fi Scenario
1 Introduction
2 Related Work
3 Methodology
3.1 Architecture
3.2 RSSI Values
3.3 Distance Calculation
3.4 K-NN Points
3.5 Fuzzy Controller and Weights Calculation
3.6 Algorithm
4 Result and Discussion
5 Conclusion
References
A Proposal of Iot Based Evapotranspiration Irrigation System for Water Conservation
1 Introduction
1.1 Motivation
1.2 Literature Review
1.3 Objective
2 Background
2.1 Data Acquisition
2.2 Data Storage and Analysis
2.3 Sensors Used
2.4 Microcontroller
2.5 Communication Protocols
2.6 Power Sources
3 Proposed System
3.1 Evapotranspiration Prediction
3.2 Precipitation Information from Online Weather Forecast
3.3 Data Collection from Sensors
3.4 Data Analysis
4 Results
5 Conclusion
6 Future Scope
References
A Comprehensive Study of “etcd”—An Open-Source Distributed Key-Value Store with Relevant Distributed Databases
1 Introduction
2 Overview of etcd
2.1 Working of etcd
2.2 Security Model of etchd
3 Comparison of etcd with Other Similar Databases
3.1 ZooKeeper
3.2 Consul
4 Application Domains and Research Opportunities
5 Conclusion
References
AgriBot: Smart Autonomous Agriculture Robot for Multipurpose Farming Application Using IOT
1 Introduction
2 Literature Survey
3 Modeling and Analysis
3.1 Hardware Components
3.2 Software Components
4 Proposed Methodology
4.1 Ploughing Operation
4.2 Seed Sowing Operation
4.3 Irrigation Operation
4.4 Harvesting Operation
5 Results and Discussions
6 Conclusion and Future Scope
References
Mobile Application Voting System: A Means to Achieve a Seamless Election Process in Developing Countries
1 Introduction
2 Literature Review
3 Material and Method
3.1 Security Techniques Used
3.2 Hardware Setup for the Proposed System
4 Experimentation Results and Discussion
5 Technical Limitation of Mobile Voting Applications
6 Conclusion
References
Adoption of Blockchain for Data Privacy in 6G-Envisioned Augmented Reality: Opportunities and Challenges
1 Introduction
1.1 Benefits of Adopting BC in AR
1.2 Motivation
1.3 Key Takeaways
2 Related Work
3 Data Privacy Issues in AR
3.1 Issues in Multiple Applications
3.2 Issues in Single Application
4 Integration of BC with AR
5 Real-Life Project Deployments of BC-Assisted AR/VR Space
6 Open Issues of Integration of 6G and BC in AR and Challenges During Deployments
7 Case Study: VoRtex Enterprise: BC-Assisted Decentralized VR Platform
8 Concluding Remarks and Future Scope
References
Integration Blockchain for Data Sharing and Collaboration in Mobile Healthcare Applications
1 Introduction
2 Blockchain
2.1 Consensus
2.2 Smart Contracts
2.3 Blockchain Types
2.4 Challenges and Future
3 Device Layout
3.1 System Evaluation
3.2 Machine Entities
3.3 Device Implementation
3.4 System Assessment
4 Conclusions
References
Communication Technologies, Security and Privacy
Reusability Estimation of Object-Oriented (O–O) Systems Using SOM Technique
1 Introduction
2 Reusability Concepts
2.1 Code Reusability [8]
2.2 Design Reusability [8]
2.3 Specification Reusability [8]
2.4 Application System Reusability [8]
3 SOM Technique
4 Methodology Used
4.1 Collection and Preprocessing of Data
4.2 Classification by SOM Technique
5 Experimental Analysis
6 Conclusion and Future Work
References
The First Corpus for Detecting Fake News in Hausa Language
1 Introduction
2 Related Work
3 The First Corpus for Detecting Fake News in Hausa Language
3.1 Authentic and Fake News Collection
3.2 Pipeline: Text Data
3.3 Algorithms
4 Comparison and Discussion of Result
4.1 Machine Learning Approach
5 Conclusion
References
A Tour Towards the Security Issues of Mobile Cloud Computing: A Survey
1 Introduction
2 Literature View
3 Security Issue
3.1 Security for Mobile Applications
4 Security
4.1 Getting Information on the Cloud
5 Integrity
6 Authentication
7 Digital Rights Management
8 Characteristic
8.1 Travel
8.2 Different Types of Network Conditions
8.3 Frequent Termination
8.4 Disk-Symmetric Network Connection
8.5 Low Dependability
9 Characteristics
9.1 Performance
9.2 Reliability and Extension
9.3 Independence
10 Architecture of Mobile Cloud Computing
11 Idea and System
12 Challenges with Solutions
12.1 Ratings for Mobile Devices
12.2 Communication Quality
13 Open Analysis Issues
13.1 Delivery of Information
13.2 Classification of Tasks
13.3 Higher Service
References
Subpixel Image Registration Using FFT-Based Technique
1 Introduction
2 Literature Review
3 Methodology
3.1 FFT-Based Image Registration Approach
3.2 Subpixel Image Registration
3.3 Dirichlet Function
4 Implementation and Results
4.1 Algorithm
4.2 Generation of Subpixel Translated Lena Image
4.3 Result of Satellite Image
5 Future Work
6 Conclusion
References
Impact of Green Communication and Technology System
1 Introduction
2 What is Green Communication?
3 Techniques
3.1 [D2D] Device-To-Device Communication
3.2 Multiuser Multiple Input Multiple Output
3.3 Hiterogeneous Networks
3.4 Green Internet of Things
4 Types of Environment Impacts
5 Express and Secondary Influences
5.1 Mobile Devices
5.2 Carbon Footmark Models and Conventions
5.3 Radio Approach Systems
6 Energy Competence Matrices
7 Conclusion
References
Recent Advancement in Fine-Grained Access Control and Secure Data Sharing Scheme for Distributed Environment
1 Introduction
2 Encipherment and Digital Signature Schemes
2.1 Data Encryption Standard (DES)
2.2 Advanced Encryption Standard (AES)
2.3 Blowfish
2.4 RSA (Rivest–Shamir–Adleman)
2.5 Elliptic Curve Cryptography (ECC)
3 Fine-Grained Access Control Mechanisms for Distributed Environment
3.1 Homomorphic Encryption
3.2 Identity-Based Encryption (IBE)
3.3 Attribute-Based Encryption
4 Use Cases: Health Care
5 Conclusion
References
Context-Based Multi-System Integration for Authorization Using Dynamic Privilege Escalation
1 Introduction
2 Review of Literature
2.1 Review of Literature Done Based on Authentication survey Summary
2.2 Authorization Survey Summary
2.3 Context-Based Security Survey Summary
2.4 Problem Introduction
3 Solution
3.1 Overview
3.2 Details
4 Implementation and Evaluation
4.1 Implementation
4.2 Evaluation
4.3 Benefits of This Proposal
5 Conclusion and Future Work
References
Next Generation Computing Technologies
Machine Learning-Based Security Solutions for Healthcare: An Overview
1 Introduction
1.1 Contribution
1.2 Organization
2 IoT in Healthcare
2.1 IoMT Types
2.2 IoMT System Architecture
3 IoMT Security Model
3.1 Different Stages of IoMT Threats
4 Literature Review
4.1 Machine Learning in Healthcare
4.2 Security in Healthcare
5 Conclusion and Future Scope
References
Fake News Detection Techniques: A Survey
1 Introduction
2 Literature Survey
2.1 Domain
2.2 Dataset
2.3 Issues
3 Previous Method
3.1 Fake News Detection from Style Based
3.2 Fake News Detection from Content-Based
3.3 Naïve Bayes Classifier
4 Challenges
5 Conclusion
References
Impact of Image Classification in Dermatology: Automated Diagnosis
1 Introduction
2 Literature Review
3 Overview of Skin Diseases
3.1 Acne
3.2 Lichen Planus
3.3 Stevens-Johnson Syndrome and Toxic Epidermal Necrolysis (SJS and TEN)
4 Proposed Work and Algorithms Used
4.1 Logistic-Regression
4.2 Kernel SVM
4.3 Naive Bayes
4.4 Random Forest
4.5 Convolutional Neural Networks
5 Result Analysis
6 Conclusion
References
IPFS-Based Image Sharing Using Perceptual Hash Code with Digital Right Management
1 Introduction
1.1 Hashing
1.2 IPFS (InterPlanetary File System)
1.3 Blockchain
2 Related Work
3 Proposed System
3.1 Watermark Process
3.2 Perceptual Hash Code Generation
3.3 Data Store and Retrieval from Interplanetary File System (IPFS)
4 Implementation Results and Discussion
4.1 Perceptual Hash Code Generation
4.2 Storing and Retrieval of an Image from IPFS
4.3 Performance Evaluation
4.4 Watermark Attacks
5 Conclusion and Future Enhancement
References
Mid-Price Prediction Using Online Kernel Adaptive Filtering
1 Introduction
2 Related Work
3 Methodology
4 Result
4.1 Dataset Description
4.2 Evaluation Criterion
4.3 Prediction, Convergence Analysis
4.4 Comprehensive Evaluation of Algorithms
4.5 Experimentation with Dictionary Size
4.6 Comparison with Other Methods
5 Conclusion
References
Blockchain-Based Model for Secure IoT Communication in Smart Healthcare
1 Introduction
2 Literature Survey
3 Smart Healthcare: Security Requirements and Challenges
4 Blockchain
4.1 Working of Blockchain
4.2 Smart Healthcare: Blockchain Benefits
5 Proposed Autonomous Smart Healthcare Model Using Blockchain
6 Conclusion
References
Internet eXchange Points: A Systematic Case Study in Indian Context
1 Introduction
1.1 Motivation
1.2 Research Contributions
1.3 Article Structure
2 Related Work
3 Key Terminologies in Internet Infrastructure
3.1 Internet eXchange Points
3.2 Border Gateway Protocol
4 Comparative Analysis of IXPs Performance
4.1 Analysis of IXPs and as at Global-Level
5 Case Study: Analysis of IXP Eco-System in India
6 Conclusion and Future Scope
References
Review on Security of Internet of Things: Security Requirements, Threats, and Proposed Solutions
1 Introduction
2 Related Work
3 IoT Architecture
4 IoT Security Threats
4.1 Security Requirements
5 IoT Security Solutions
6 Conclusion
References
Emerging Security Issues in IoT
1 Introduction
2 Background and Preliminaries
2.1 Architecture of IoT
2.2 Applications of IoT
3 Security Issues in IoT
4 Emerging Challenges in IoT
5 Conclusion
References
Robust and Imperceptible Multiple Watermarking Using Transform Domain Algorithm for Digital Media
1 Introduction
2 Related Work
3 Theoretical Background
4 Discrete Wavelet Transform (DWT)
5 Discrete Cosine Transform (DCT)
6 Singular Value Decomposition (SVD)
7 Performance Procedures
8 Proposed Algorithm
9 Experimental Results and Analysis
10 Conclusion
References
Blockchain-Driven and IoT-Assisted Chemical Supply-Chain Management
1 Introduction
1.1 Motivation
1.2 Research Contributions
1.3 Article Structure
2 BC-Driven and IoT-Assisted Chemical Supply-Chain Management: The Reference Architecture
2.1 The Entity Model
2.2 The Layered Reference Architecture
3 Open Issues and Challenges
4 ChemBlocks: A Case Study on RFID-Assisted Smart-Tagging in BC-Leveraged Chemical Supply Chains
4.1 Ordering of Raw Material
4.2 Logistics: Outbound and Inbound
4.3 Final Chemical Packaging and Outbound to Open Markets
4.4 Inbound at Open Markets and Delivery to End-Customers
5 Conclusion
References
Correction to: Impact of Green Communication and Technology System
Correction to: Chapter “Impact of Green Communication and Technology System” in: P. K. Singh et al. (eds.), Emerging Technologies for Computing, Communication and Smart Cities, Lecture Notes in Electrical Engineering 875, https://doi.org/10.1007/978-981-19-0284-044
Author Index
📜 SIMILAR VOLUMES
<span>This book features selected high-quality papers from the Second International Conference on Innovation in Electrical Power Engineering, Communication, and Computing Technology (IEPCCT 2021), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on 24–26 September 2021. P
<span>This book features selected high-quality papers from the International Conference on Innovation in Electrical Power Engineering, Communication, and Computing Technology (IEPCCT 2019), held at Siksha 'O' Anusandhan (Deemed to be University), Bhubaneswar, India, on 13–14 December 2019. Presentin
<span>The book includes peer-reviewed papers of the International Conference on Sustainable Technology and Advanced Computing in Electrical Engineering (ICSTACE 2021). The main focus of the book is electrical engineering. The conference aims to provide a global platform to the researchers for sharin
<span>This book comprises select proceedings of the International Conference on Advances in Electrical and Computer Technologies 2021 (ICAECT 2021). The papers presented in this book are peer-reviewed and cover the latest research in electrical, electronics, communication, and computer engineering.
This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January–1 February 2020 at C-DAC, Noida, India. It is co-organized by Southern Federal University, Russia; University of Jan