𝔖 Scriptorium
✦   LIBER   ✦

📁

Futuristic Trends in Network and Communication Technologies: Third International Conference, FTNCT 2020, Taganrog, Russia, October 14–16, 2020, ... in Computer and Information Science)

✍ Scribed by Pradeep Kumar Singh (editor), Gennady Veselov (editor), Valeriy Vyatkin (editor), Anton Pljonkin (editor), Juan Manuel Dodero (editor), Yugal Kumar (editor)


Publisher
Springer
Year
2021
Tongue
English
Leaves
589
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This two-wolume set (CCIS 1395-1396) constitutes the refereed proceedings of the Third International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2020, held in Taganrog, Russia, in October 2020.

The 80 revised full papers presented were carefully reviewed and selected from 291 submissions. The prime aim of the conference is to invite researchers from different domains of network and communication technologies to a single platform to showcase their research ideas. The selected papers are organized in topical sections on communication technologies; security and privacy; futuristic computing technologies; ​network and computing technologies; wireless networks and Internet of Things (IoT).

✦ Table of Contents


Preface
Organization
Contents – Part I
Contents – Part II
Communication Technologies, Security and Privacy
Medchain: Securing Electronic Medical Records with a Peer to Peer Networks and Distributed File System
1 Introduction
2 Traditional Electronic Health Record Systems
2.1 Major Problems Caused by This Model [4]
3 Statistics
4 Strategy
4.1 IPFS – Inter Planatary File System
4.2 BigchainDB
4.3 MongoDB
4.4 RFID
4.5 Tendermint
5 Architecture and Implementation
6 Results
7 Conclusion
References
Secure IoT Framework Through FSIE Approach
1 Introduction
1.1 Motivation
2 Background of This Work
3 Proposed Framework
3.1 Authentication
3.2 Authorization
3.3 Confidentiality
3.4 Non Repudiation
3.5 Privacy
3.6 Availability
4 Comparative Analysis and Results
5 Results and Discussion
6 Conclusion
References
Software Fault Prediction Using Machine Learning Models and Comparative Analysis
1 Introduction
2 Literature Review
3 Methodology
3.1 Classification Methods
4 Results and Discussion
4.1 Accuracy, Precision, Recall and F1-Score Analysis
4.2 Running Time Analysis
5 Conclusion
References
Detecting Fraudulent Transactions Using a Machine Learning Algorithm
1 Introduction
2 Well-Known Approaches to Solve the Problem
3 Proposed Approach
4 Conditions for Conducting an Experimental Study
5 Balanced Random Forest
6 Adaptive Boosting with a Random Undersampling
7 Balanced Bagging
8 Discussion of Results
9 Conclusion
References
Updated Analysis of Detection Methods for Phishing Attacks
1 Introduction
2 Phishing Detection Approaches
2.1 Web Phishing Detection
2.2 URL Phishing Detection
2.3 Email Phishing Detection
2.4 Phishing Detection on Social Networks
2.5 Discussion
3 Conclusions
References
Criterion of Blockchain Vulnerability to Majority Attack Based on Hashing Power Distribution Assessment
1 Introduction
2 Background
3 Related Work
4 Distributed Ledger Vulnerability Criterion
5 Experimental Results
6 Conclusion
References
A Panacea to Soft Computing Approach for Sinkhole Attack Classification in a Wireless Sensor Networks Environment
1 Introduction
2 Related Works
2.1 Findings from Literature
3 Research Methodology
4 Results and Discussion
4.1 Simulation
4.2 Performance Evaluation
5 Conclusion and Future Work
References
Predicting Destructive Malicious Impacts on the Subject of Critical Information Infrastructure
1 Introduction
2 Problem Statement
3 Analysis of Methods of Analysis and Assessment of Destructive Impact on Cii Objects
4 Methodology and Discussion
5 Experiment
6 Conclusions
References
The Formation of Legal Measures to Counter Information Security Incidents in the Use and Application of Cyber-Physical Systems
1 Introduction
2 Elements of Legal Regulation Model
3 Essential Characteristics of Cyber-Physical Systems
4 Responsibility as an Element of the Legal Regulation Model
5 Classification of Cyberattacks Relevant to the Cyber-Physical System
6 Conclusion
References
Human-Robot Collaboration in the Society of the Future: A Survey on the Challenges and the Barriers
1 Introduction
2 Cobots, and Their Differences from Industrial and Service Robotics
3 The Current State of the Introduction and Use of Cobots in the World and in Russia
3.1 Cobots in the World
3.2 Cobots in Russia
4 Robots and Cobots in the Society of the Future: A Positive Vision
5 Pessimism and Skepticism About the Robots and Cobots: Challenges and Possible Solutions
5.1 The Perception of Robots
5.2 Non-obvious Hindrances to the Deployment of Robots and Cobots
6 Conclusion
References
Analysis of Socio-political Content of Internet Resources Based on Hybrid Neural Network Technologies
1 Introduction
2 Methods and Materials
2.1 Language Model
2.2 Architectural Solutions for Artificial Neural Networks
3 Results and Discussion
3.1 Working Hypothesis
3.2 Architectural and Software Solutions for Artificial Neural Networks
3.3 Analysis of the Quality of Built ANN
4 Conclusions
References
Protection of Signals in the Video Stream of a Mobile Robotic Group Agent
1 Introduction
2 Research Object Description
3 Transmitted Control Signals Masking Based on DWT Use
4 Control Signal Masking Algorithm
4.1 Conversion of Signal to DWT
4.2 DWT Integration Algorithm
4.3 DWT Detecting Algorithm
5 Results of Experimental Studies
6 Conclusion
References
Development of a Cyber-Resistant Platform for the Internet of Things Based on Dynamic Control Technology
1 The Relevance of Research
2 Operating Systems for IIoT/IoT Platforms
3 “Certification” of Data Reception and Transmission Schemes
4 Conclusions
References
An Efficient Authentication Scheme for Mobile Cloud Computing Using a Key Server
1 Introduction
1.1 Objectives
2 Related Work
3 Proposed Research Methodology
4 Proposed Authentication
4.1 Proposed Architecture for Cloud and Key Server
4.2 AES-256 Encryption
4.3 Proposed Algorithms
4.4 Experimental Setup for Proposed Authentication Method
5 Results and Discussions
5.1 Parameters Selected for Evaluation
5.2 Results with Comparison
6 Conclusion and Future Scope
References
Modelling Smart City Cyber-Physical Water Supply Systems: Vulnerabilities, Threats and Risks
1 Introduction
2 Materials and Methods
3 Results
3.1 Assessment of Control Models of Active Water Supply Systems Taking into Account Negative Factors
3.2 Classification of Potential Vulnerabilities, Threats and Risks of Functioning of Cyber-Physical Water Supply Systems in a Smart City
3.3 Modeling of Scenarios of Water Supply System Control Failure
4 Discussion
5 Conclusion
References
Software for Analyzing Security for Healthcare Organizations
1 Introduction
2 Interfaces and Standards for Working with Medical Equipment
3 Vulnerability Analysis of Software Implementing DICOM Protocol
3.1 Development of a Vulnerability Exploit for Open Source PACS Server dcm4chee
4 Scan Strategy on a Regular Basis
5 Conclusion
References
Behavior-Based Assessment of Trust in a Cyber-Physical System
1 Introduction
2 Related Works
3 Development of a Model of a Cyber-Physical System
3.1 Structural and Functional Characteristics of the Developed Model of a Cyber-Physical System
3.2 Simulation of Attacks on CPS
4 Methodology for Analyzing the Resistance of Nodes to Attacks by an Intruder
5 Analysis of Experimental Data
6 Conclusion
References
Futuristic Computing Technologies
Optimization of K-Nearest Neighbors for Classification
1 Introduction
2 Related Work
2.1 K-Nearest Neighbor
2.2 Weighted KNN
2.3 Class Confidence Weighted KNN
3 Proposed Work
4 Experiments and Results
4.1 Datasets
4.2 Experimental Setup
4.3 Performance Measures
5 Conclusion
References
Representing Autonomous Probabilistic Automata by Minimum Characteristic Polynomials over a Finite Field
1 Introduction
2 Problem Statement
3 Representing APA1 as a Minimum Polynomial over a Field GF(q)
4 Representing a Non-autonomous Probabilistic Automaton
5 Conclusion
References
Analysis of Histopathological Images Using Machine Learning Techniques
1 Introduction
1.1 Role of Machine Learning in Healthcare
1.2 Digital Pathology
2 Literature Survey
2.1 Comparative Analysis of Techniques
3 Conclusion
References
Exploiting an Ontology-Based Solution to Study Code Smells
1 Introduction
2 Code Smell
3 Related Works
3.1 Ontology
4 Ontology to Represent Knowledge About Code Smells
4.1 Methodology
5 Evaluation of the Ontology
6 Conclusions and Future Works
References
Accelerating Stochastic Gradient Descent by Minibatching, Learning Rate Annealing and Momentum
1 Introduction
2 Background and Related Works
3 Mini Batch Gradient Descent
4 Stochastic Gradient Descent Convergence
5 Stochastic Gradient Descent with Momentum Contour
6 Conclusion
References
An Ensemble Approach of Multi-objective Differential Evolution Based Benzene Detection
1 Introduction
2 Proposed Methodology
2.1 Adaptive Neuro-Fuzzy Inference System (ANFIS)
2.2 Differential Evolution (DE) Algorithm Based Network Optimization
2.3 Multi-objective Fitness Function
2.4 ANFIS Parameter Tuning with DE
2.5 ANFIS-DE Assisted Ensemble Approach for Benzene Prediction
3 Prediction Performance Evaluation
3.1 Experimental Material and Resources
3.2 Reliability Analysis
3.3 Stability Analysis
4 Conclusion
References
The Heartfelt and Thoughtful Rulers of the World: AI Implementation in HR
1 Introduction
2 Artificial Intelligence
2.1 Mechanical Task
2.2 Thinking Task
2.3 Emotional Task
3 Research Methodology
3.1 Objective of the Study
3.2 Data Analysis and Interpretation:
3.3 Cronbach’s Alpha Reliability Test
3.4 Demographics
3.5 T-Test
3.6 Anova Test
4 Challenges When Deploying AI
5 Conclusion
References
Feature Selection Using Ensemble Techniques
1 Introduction
2 Need of Feature Selection
3 Feature Selection Techniques
3.1 Filter Methods
3.2 Wrapper Methods
3.3 Hybrid Methods
3.4 Embedded Methods
4 Literature Survey
5 Methodology
5.1 Dataset Collection
5.2 Algorithm Application
5.3 Results Comparison
5.4 Proposed Algorithm
6 Experiments and Results
7 Conclusion and Future Scope
References
Query Reverse Engineering in the Context of the Semantic Web: A State-of-the-Art
1 Introduction
2 Background and Related Studies
3 Method
3.1 Research Questions
3.2 Search
3.3 Study Selection
3.4 Data Extraction Process
4 Results of the Mapping
4.1 Papers with Regard to QRESW (RQ1.1)
4.2 Temporal Evolution of the QRESW (RQ1.2)
4.3 Publication Venues (RQ1.3)
4.4 Algorithmic Approaches (RQ2.1)
4.5 Algorithmic Evolution (RQ2.2)
4.6 Technologies (RQ2.3)
4.7 Datasets (RQ2.4)
4.8 Research Opportunities
5 Conclusions and Future Work
References
Time Series Forecasting for Coronavirus (COVID-19)
1 Introduction
2 Literature Review
3 Methodology
4 Experimental Analysis
4.1 Dataset
4.2 Plot Analysis
4.3 Results and Discussion
5 Conclusion and Future Scope
References
Leveraging Artificial Intelligence Tools to Combat the COVID-19 Crisis
1 Introduction
2 How Is AI Contributing to Combating COVID-19?
2.1 Challenges Faced During the Implementation of AI
3 Conclusion
References
COVID-19 Real Time Impact Analysis India vs USA
1 Introduction
2 Literature Review
3 Research Objective
4 Methodology
5 Results and Findings
5.1 Prediction of Confirmed Cases in India
5.2 Prediction of Confirmed Cases in United States
6 Coronavirus Outbreak: Comparison Between India and United States
7 Conclusion
8 Research Gape and Future Scope
References
Cold Start in Function as a Service: A Systematic Study, Analysis and Evaluation
1 Introduction
2 Related Work
3 Problem Statement
4 Proposed Work
4.1 Goal
4.2 Set Up
5 Results
5.1 Programming Language
5.2 Frequency of Function Execution
5.3 Memory
5.4 Deployment Package Size
6 Conclusion
References
Optimization and Performance Measurement Model for Massive Data Streams
1 Introduction
1.1 Background and Motivation
1.2 Overview of the Paper and Contributions
1.3 More Details and Summary of the Approach
1.4 Summary of the Results and Conclusions
1.5 Arrangement of Sections in Article
2 Literature Survey and Research Gap
3 Proposed Work
3.1 Data Stream
3.2 Stream Ingestion
3.3 Stream Analytics
3.4 Actionable Visuals
3.5 Proposed Algorithm
3.6 Deployment
4 Experiments and Results
4.1 Results and Findings
5 Conclusion
References
A Proposal for Early Detection of Heart Disease Using a Classification Model
1 Introduction
2 Literature Review
3 Dataset and Algorithms Used
4 Results
5 Conclusion
6 Future Work
References
Analysis of Using the Fuzzy Intervals Apparatus for Applied Tasks
1 Introduction
2 Setting Demand Parameters Under Uncertainty
3 Mathematical Apparatus for Working with Fuzzy Intervals
4 Practical Problem Solving
5 Conclusion
References
Mobile Healthcare Service for Self-organization in Older Populations During a Pandemic
1 Introduction
2 Background and Related Works
3 Revealing Requirements for Symptoms Diary Mobile Application
4 Proposed Solution
4.1 Application Description
4.2 Technology Selection
4.3 Structure
4.4 Data Storage
4.5 Functionality of Contacting a Specialist
5 Results and Discussion
5.1 Evaluation of the Effectiveness and Usability of the Developed System
5.2 Application Prototype
6 Conclusion
References
Bioinspired Multi-memetic Algorithm
1 Introduction
2 Statement of the Problem
3 Multi-memetic Hybridization
4 Experimental Studies
5 Conclusion
References
Multimodal Interaction: Taxonomy, Exchange Formats
1 Introduction
2 Related Works
3 Taxonomy of Multimodal Interaction
4 Multimodal Interaction Architecture
5 Exchange Information Formats
6 Conclusion
References
Development of a Automated Environmental Monitoring System with Forecasting
1 Introduction
2 Methodology
2.1 System Architecture
2.2 Sensors Overview
3 Results
4 Conclusion
References
Application of Machine Learning Methods in Modeling Hydrolithospheric Processes
1 Introduction
2 Application of Neural Networks in Hydrolithospheric Research
3 Conclusions
References
Brain Tumor Segmentation Using Unet
1 Introduction
2 Literature Review
3 Implementation
3.1 Dataset
3.2 Model Used
3.3 Training Details
4 Results
5 Conclusion
6 Future Scope
References
Influence of Membership Function Type on the Accuracy of Video Tracking Algorithm
1 Introduction
2 Survey of Intuitionistic Fuzzy Set
3 Our Approach
4 Experiments and Results
References
An Approach to the Medical-Type Data Multiobjective Analysis
1 Introduction
2 Search Aspects of Association Rules for Medical Data
3 Multi-criteria Association Rules Optimization
4 Experimental Results
5 Discussion/Further Researchs
6 Conclusion
References
The Fuzzy Approach for Classification Borrowers of Microfinance Organizations
1 Introduction
2 Materials and Methods
3 Results
3.1 Criteria
3.2 Classification
4 Discussion
5 Conclusion
References
Hybrid Movie Recommender System - A Proposed Model
1 Introduction
2 Literature Survey
3 Data Collection
4 Hybrid Movie RecommendationModule
5 Implementation
6 Empirical Analysis
7 Conclusion and Future Work
References
Development of a Text and Speech Enabled Conversational Agent for Students’ Activities Planning Using Dialog Flow
1 Introduction
2 Related Works
3 System Analysis and Design
3.1 Functional Requirements
3.2 Non-functional Requirements.
3.3 Architecture Design
3.4 System Design
4 Experimental Analysis
5 Conclusion and Future Work
References
Constructing of Semantically Dependent Patterns Based on SpaCy and StanfordNLP Libraries
1 Introduction
2 The Methodology of the Research
3 Pattern Construction
3.1 Syntactic Relations Tree and Ancestors Property
4 Summary
References
Electronic Medical Records Data Analysis Technologies and Services for the Cardiovascular Diseases Risk Prediction
1 Introduction
1.1 Background
1.2 Related work
2 Materials and Methods
3 Result and Discussion
4 Conclusion
References
Application of Genetic Algorithms to the Test Suite Cases Minimization
1 Introduction
2 Background
2.1 Genetic Algorithms
2.2 Selection Operator
2.3 Crossover Operator
2.4 Mutation Operator
2.5 Mutation Testing
3 Problem Representation
3.1 Introduction to the Test Suites Minimization
3.2 Problem Representation
3.3 Fitness Function
4 Proposed Algorithm: Canonical Genetic Algorithm
5 Genetic Algorithm Parameters
6 Experiments
6.1 Results Achieved
7 Conclusions
8 Future Work
References
Ensemble Based Plant Species Recognition System Using Fusion of Hog and Kaze Approach
1 Introduction
2 Related Work
3 Proposed Methodology
4 Result and Discussion
5 Conclusion and Future Scope
References
Mutative ABC Based Load Balancing in Cloud Environment
1 Introduction
1.1 Key Motivation
1.2 Metrics of Load Balancing
2 Related Work
3 Proposed Work
4 Results
4.1 Implementation Environment
4.2 Parameters Setting
4.3 Experimental Result**
5 Conclusion
References
Story Point Based Effort Estimation Model with Machine Learning Techniques in Healthcare
1 Introduction
2 Literature Work
3 Problem Statement
4 Proposed Solution
4.1 Dataset
4.2 Materials and Methods
4.3 Machine Learning Algorithm in Healthcare
5 Evaluation Metrics
5.1 Precision
5.2 Recall
5.3 F1-Score
5.4 Accuracy
6 Results and Analysis
7 Conclusion and Future Work
References
Author Index


📜 SIMILAR VOLUMES


Futuristic Trends in Network and Communi
✍ Pradeep Kumar Singh (editor), Gennady Veselov (editor), Anton Pljonkin (editor), 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This two-wolume set (CCIS 1395-1396) constitutes the refereed proceedings of the Third International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2020, held in Taganrog, Russia, in October 2020.</span><p><span>The 80 revised papers presented were carefully r

Futuristic Trends in Networks and Comput
✍ Pradeep Kumar Singh, Sławomir T. Wierzchoń, Jitender Kumar Chhabra, Sudeep Tanwa 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book constitutes the refereed proceedings of the Fourth International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2021. The prime aim of the conference is to invite researchers from different domains of network and communication technologies to a si

Futuristic Trends in Networks and Comput
✍ Pradeep Kumar Singh (editor), Sanjay Sood (editor), Yugal Kumar (editor), Marcin 📂 Library 📅 2020 🏛 Springer 🌐 English

<p><span>This book constitutes the refereed proceedings of the Second International Conference on Futuristic Trends in Network and Communication Technologies, FTNCT 2019, held in Chandigarh, India, in November 2019.</span></p><p><span>The 49 revised full papers and 6 short papers presented were care

Information and Software Technologies: 2
✍ Audrius Lopata (editor), Daina Gudonienė (editor), Rita Butkienė (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 27th International Conference on Information and Software Technologies, ICIST 2021, held in Kaunas, Lithuania, in October 2021.<p>The 24 full papers and 6 short papers presented were carefully reviewed and selected from 79 submissions. The

Information and Software Technologies: 2
✍ Audrius Lopata (editor), Daina Gudonienė (editor), Rita Butkienė (editor) 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book constitutes the refereed proceedings of the 27th International Conference on Information and Software Technologies, ICIST 2021, held in Kaunas, Lithuania, in October 2021.</span><p><span>The 24 full papers and 6 short papers presented were carefully reviewed and selected from 79 subm