<p><span>This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented a
Innovative Data Communication Technologies and Application: Proceedings of ICIDCA 2021 (Lecture Notes on Data Engineering and Communications Technologies, 96)
â Scribed by Jennifer S. Raj (editor), Khaled Kamel (editor), Pavel Lafata (editor)
- Publisher
- Springer
- Year
- 2022
- Tongue
- English
- Leaves
- 1033
- Category
- Library
No coin nor oath required. For personal study only.
⊠Synopsis
This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing, and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2021), are included in the book. The book focuses on the theory, design, analysis, implementation, and application of distributed systems and networks.
⊠Table of Contents
Preface
Acknowledgements
Contents
About the Editors
Mobile Application for Tour Planning Using Augmented Reality
1 Introduction
2 Review of Literature
3 Our Proposed System
3.1 Working
4 Software Framework
4.1 Software
4.2 Vuforia SDK Working
4.3 Architecture
4.4 Prototype of Application
4.5 Implementation
5 Testing and Validation
6 Conclusion
References
Wrapper-Naive Bayes Approach to Perform Efficient Customer Behavior Prediction
1 Introduction
2 Related Works
3 Naive Bayes
4 Proposed Methodology
4.1 Sequential Forward Selection
4.2 Genetic Algorithm (GA)
5 Experimental Design
5.1 Dataset
5.2 Variable Description and Validity Scores
5.3 Experimental Procedure
5.4 Results of Proposed Methodology and Existing Approaches Standard NB, AODE, DTNB, CFWNB, and NBTREE
5.5 Result and Discussion
5.6 Research Findings
6 Conclusion
References
ECG Acquisition Analysis on Smartphone Through Bluetooth and Wireless Communication
1 Introduction
1.1 Electrocardiogram
2 Literature Review
3 System Description
3.1 Selected Technology
3.2 Android Application
4 Hardware Description
5 Result
6 Conclusion
References
Enhanced Security of User Authentication on Doctor E-Appointment System
1 Introduction
2 Related Works
3 Methodology
3.1 Proposed System
3.2 System Architecture
3.3 Implementation of Prototype
4 Testing and Analysis
4.1 Testing Prototype
4.2 Testing Scenario
4.3 Performance Metrics
5 Conclusion
References
Enhanced Shadow Removal for Surveillance Systems
1 Introduction
2 Related Work
3 Methodology
3.1 Dataset Description
3.2 Architecture of Generator
3.3 Architecture of Discriminator
4 Results and Discussion
5 Conclusion
References
Vehicle Speed Estimation and Tracking Using Deep Learning and Computer Vision
1 Introduction
2 Related Work
3 Methodology
3.1 Object Counting
3.2 Colour Recognition
3.3 Speed and Direction Recognition
4 Implementation
5 Output and Findings
6 Conclusion
References
Transparent Blockchain-Based Electronic Voting System: AÂ Smart Voting Using Ethereum
1 Introduction
2 Related Work
3 Proposed Concept Along with Contribution
4 Working Procedure
4.1 Transaction Table
5 Result Analysis
6 Security Issue
7 Limitations of the Proposed System
8 Conclusion and Future Work
References
Usage of Machine Learning Algorithms to Detect Intrusion
1 Introduction
1.1 Detection Approaches
2 Literative Survey
3 ML Algorithms
4 Proposed Work
5 Analysis of Result
6 Conclusion
References
Speech Emotion Analyzer
1 Introduction
2 Related Work
2.1 CNN and LSTM Architecture for Speech Emotion Recognition (SER) with Data Augmentation
2.2 Speech Emotion Recognition Using Deep Neural Network and Extreme Learning Machine
2.3 A Research of Speech Emotion Recognition Based on Deep Belief Network (DBN) and Support Vector Machine
2.4 Emotion Recognition by Speech Signals
3 Data
3.1 Overview
3.2 RAVDESS
3.3 Analyzing Different Audio Signals
4 Implementation
4.1 Feature Extraction
4.2 Models
5 Result Analysis
6 Conclusion and Future Work
References
A Review of Security Concerns in Smart Grid
1 Introduction
2 Overview of Smart Grid [1]
2.1 Advanced Metering Infrastructure
2.2 Supervisory Control and Data Acquisition (SCADA)
2.3 Wide Area Measurement System
3 Issues in Smart Grid [2]
4 Security Concerns in Smart Grid [2]
5 Review of Existing Cryptographic Techniques
6 Research Issues and Challenges Observed in Previous Models
7 Conclusion and Directions for Future Work
References
An Efficient Email Spam Detection Utilizing Machine Learning Approaches
1 Introduction
2 Feature Selection
2.1 Particle Swarm Optimization
3 Proposed Methodology
3.1 Data Preprocessing
3.2 Support Vector Machine (SVM)
3.3 Decision Tree
3.4 Naive Bayes
4 Experimental Results
4.1 Dataset
4.2 Performance Metrics
4.3 Results and Discussion
5 Conclusion
References
Malware Prediction Analysis Using AI Techniques with the Effective Preprocessing and Dimensionality Reduction
1 Introduction
2 Motivation
3 Literature Survey
4 Methodology
4.1 Dataset
4.2 Data Preprocessing
5 Machine Learning
6 Result Analysis
6.1 Excluding Categorical Value
6.2 Including Categorical Value
6.3 Pipeline and Cross-Validation
6.4 Neural Networks
6.5 Counting Encoder
7 Conclusion and Future Scope
References
Statistical Test to Analyze Gene Microarray
1 Introduction
2 Related Work
2.1 A Review on Feature Selection Techniques for Gene Expression Data (June 11, 2015)
2.2 A Comparative Study of Cancer Classification Methods Using Microarray Gene Expression Profile (Dec 15, 2013)
2.3 Feature Selection of Gene Expression Data for Cancer Classification: A Review (December 2015)
2.4 Analysis of Microarray Experiments of Gene Expression Profiling (Jun 22, 2008)
3 Proposed Work
4 Feature Selection Algorithm
4.1 Support Vector Machine
4.2 Naive Bayes
4.3 Classifier (SVM and NB)
4.4 Performance Measures
5 Results
6 Conclusions
References
An Analysis on Classification Models to Predict Possibility for Type 2 Diabetes of a Patient
1 Introduction
2 Literature Study
3 Classification Algorithms
3.1 Basic Terminology
3.2 Classification Types
4 Data Preprocessing
4.1 Description of Diabetes Dataset
4.2 Exploratory Data Analysis and Visualization
4.3 Data Standardization
4.4 Performance Evaluation Metrics
5 Implementation
5.1 Support Vector Machine
5.2 Logistic Regression
5.3 K-Nearest Neighbors
5.4 Decision Tree
5.5 Random Forest
5.6 AdaBoost
5.7 NaĂŻve Bayes
5.8 Result Analysis
6 Conclusion
References
Preserve Privacy on Streaming Data During the Process of Mining Using User Defined Delta Value
1 Introduction
2 Related Work
3 Proposed Work
3.1 Formal Analysis of Proposed Work
3.2 Proposed Work
4 Performance Evaluation
4.1 Experimental Setup
4.2 Experimental Results
5 Conclusion
References
AÂ Neural Network based Social Distance Detection
1 Introduction
2 Related Work
3 Methodology
3.1 Person Detection
3.2 Person Tracking
3.3 Distance Calculation
3.4 Alert Signaling
4 Experimental Results
5 Conclusion
References
An Automated Attendance System Through Multiple Face Detection and Recognition Methods
1 Introduction
1.1 Attendance System
1.2 Literature Survey
2 Proposed System
2.1 Dataset Preparation
2.2 Training Phase
2.3 Recognition Phase
2.4 Methodology
2.5 Implementation of Algorithms
3 Experimental Results
3.1 Database Update
3.2 Graphical User Interface
3.3 Performance Evaluation of Various Methods for Face Detection
4 Conclusion
References
Building a Robust Distributed Voting System Using Consortium Blockchain
1 Introduction
2 Current Methodologies Briefing
2.1 Paper Ballot
2.2 E-voting
2.3 I-voting
3 Defining the Problem Statement
3.1 Voter Verification
3.2 Mobility
3.3 Security
3.4 Transparency
3.5 Flexibility
3.6 Operational Cost
4 Proposed Solution
4.1 Blockchain Infrastructure Setup
4.2 Voter, Contestant and VSM Registration
4.3 Voting Process
4.4 Result Calculation
4.5 Public Vote Validation
5 Technological Requirements for Large-Scale Deployment
6 Conclusion
References
Analysis on the Effectiveness of Transfer Learned Features for X-ray Image Retrieval
1 Introduction
2 Background Study
2.1 DenseNet
2.2 InceptionNet
2.3 Inception-ResNet
3 Proposed CBIR Architecture
4 Dataset
5 Experiment
5.1 Preprocessing
5.2 Parameters Settings
6 Results and Analysis
6.1 Effect of Preprocessing on Model Training and Testing
7 Conclusion
References
Blockchain-Centered E-voting System
1 Introduction
2 Objectives
3 Proposed System
4 Algorithm
5 Details of Software and Hardware
6 Use Case Diagram
7 Result
8 Discussion and Comparison Analysis
9 Conclusion
References
Project Topic Recommendation by Analyzing Userâs Interest Using Intelligent Conversational System
1 Introduction
1.1 Natural Language Processing (NLP)
1.2 Parts of Speech (POS) Tagging
1.3 NLTK (Natural Language Toolkit)
2 Methodology
2.1 Lemmatization/Stemming
2.2 Tokenization
2.3 Tagging and Acronym Normalization
2.4 POS Tagging
3 Implementation
3.1 UserâChatbot Interaction
3.2 NLPâDomain Extraction (Entity Extraction)
3.3 User Subdomains Identification
3.4 Application Selection
3.5 Modified Search Ranking Results
4 Results
5 Limitations
6 Conclusion
References
Abnormal Behaviour Detection in Smart Home Environments
1 Introduction
2 Related Works
3 Proposed Architecture
3.1 Dataset Description
4 Clustering Algorithms
4.1 Self-organizing Map (SOM)
4.2 DBSCAN
4.3 GMM
5 Results and Discussion
6 Conclusion
References
Mapping UML Activity Diagram into Z Notation
1 Introduction
2 Systematic Literature Review
3 Background
3.1 Activity Diagram
3.2 Z Notation
4 Translation Rules
5 A Case Study on ATM Withdrawal System
5.1 Activity Diagram of ATM Withdrawal System
5.2 Z Notation of ATM Withdrawal System
5.3 Explanations
6 Conclusion
References
Exploring Sleep Deprivation Reason Prediction
1 Introduction
2 Literature Survey
3 Methods
3.1 Understanding Sleep Score
3.2 Gathering Data
3.3 Data Preprocessing
3.4 Data Analysis
3.5 Dividing the Data into Training and Test Set
3.6 MLRâMultiple Linear Regression
3.7 Random Forest Regressor
3.8 Gradient Boosting Regression
3.9 Final Model Evaluation
3.10 Tensorflow and Keras
4 Results
5 Conclusion
References
E-Irrigation Solutions for Forecasting Soil Moisture and Real-Time Automation of Plants Watering
1 Introduction
1.1 Smart System
1.2 IoT-Based Systems
2 Related Work
3 Proposed System
3.1 Wireless Sensor Network and Control Unit
3.2 Cloud Server (Data Server)
3.3 Irrigation Planning Algorithm
4 Results and Discussion
5 Conclusion
References
Implementing OpenCV and Dlib Open-Source Library for Detection of Driverâs Fatigue
1 Introduction
2 Literature Review
3 Proposed System
3.1 Existing System
3.2 Camera and Frame Acquisition
3.3 Face Detection
3.4 Eye and Mouth Detection (EAR) Eye Aspect Ratio
3.5 General Architecture
3.6 Design Phase
3.7 Module Description
4 Implementation and Testing
4.1 Input Design
5 Results and Discussions
5.1 Comparison of Existing and Proposed System
6 Conclusion and Future Enhancements
6.1 Future Scope
References
Comparative Analysis of Contemporary Network Simulators
1 Introduction
2 Study Outline
3 Related Works
4 Overview of Popular Network Simulators
5 Comparison Between Network Simulators
6 Conclusion
References
Using Deep Neural Networks for Predicting Diseased Cotton Plants and Leafs
1 Introduction
2 Related Work
3 Feature Engineering
3.1 Dataset
3.2 Data Augmentation
3.3 Transfer Learning
4 Convolutional Neural Network Models
4.1 VGG16
4.2 ResNet50
4.3 MobileNet
5 Results
6 Conclusion
References
Document Cluster Analysis Based on Parameter Tuning of Spectral Graphs
1 Introduction
2 Related Work
3 Solution Approach and Methodology
4 Experimental Results and Analysis
5 Conclusion
References
Distributed Denial of Service Attack Detection and Prevention in Local Area Network
1 Introduction
2 Related Work
3 Proposed Work
3.1 Simulation Model
3.2 Attack Model
3.3 Defense Mechanism
3.4 Implementation of Blocker
4 Result Analysis and Discussion
5 Conclusion
References
Secure Credential Derivation for Paperless Travel
1 Introduction
2 Related Work
3 Methodology
3.1 Existing Travel Process
3.2 Drawbacks of the Existing Travel Process
3.3 Proposed Solution and Architecture
3.4 Cryptographic Protocols
3.5 Derivation of Credentials
3.6 Verification of Credentials
4 Implementation
4.1 Derivation of Credentials
4.2 Verification of Credentials
5 Result and Inference
5.1 Threat Vector Analysis
5.2 Comparison of the Existing and Proposed Methodology
6 Conclusion
References
Performance Analysis of Spectrum Sensing in CRN Using an Energy Detector
1 Introduction
2 Literature Survey
3 SISO Fading Channel Spectrum Sensing
3.1 Energy Detection
4 MIMO Channel Spectrum Sensing
5 Cooperative Spectrum Sensing
5.1 Fusion Centre Cooperative Spectrm Sensing
5.2 Distributed Cooperative Spectrum Sensing
5.3 Relay-Assisted Cooperative Spectrum Sensing
6 Conclusion
References
Forecasting Crime Event Rate with a CNN-LSTM Model
1 Introduction
2 Background Literature
3 System Modeling
3.1 CNN-LSTM Model
3.2 CNN
3.3 LSTM
4 CNN-LSTM Model for Crime Prediction Algorithm
5 Results and Discussions
5.1 Experiment Setup
5.2 Results
6 Conclusion
References
LegalLedgerâBlockchain in Judicial System
1 Introduction
2 Related Work
3 Proposed System
4 Result and Discussion
4.1 Implementation
4.2 Testing
5 Conclusion
References
Arduino-Based Smart Walker Support for the Elderly
1 Introduction
2 Methodology
2.1 Arduino UNO
2.2 Node MCU
2.3 Firebase
2.4 MIT App Inventor
2.5 Sensors and Other Modules
3 Implementation
4 Conclusion
References
Enhancing the Framework for E-Healthcare Privacy and Security: the Case of Addis Ababa
1 Introduction
1.1 Statement of Problem
1.2 Objective of the Study
1.3 Scope and Limitation of the Study
1.4 Significance of the Study
2 Related Work
2.1 Privacy and Security for Analytics on Healthcare Data
2.2 Privacy and Security of Health Information
2.3 Important of Privacy and Security in Healthcare privacy of Health Data
2.4 Summary of Research Gaps
3 Our Contribution
4 Discussion of the Findings
4.1 Access Control
4.2 Organizational Factors
5 A Prototype Demonstration to Enhance the Level of Security and Privacy of Health Data
5.1 Discussion
6 Conclusion
6.1 Future Work
References
Socket Programming-Based RMI Application for Amazon Web Services in Distributed Cloud Computing
1 Introduction
2 Literature Review
3 Our Contribution
4 Conclusion
References
Design and Verification of H.264 Advanced Video Decoder
1 Introduction
2 Related Work
2.1 Literature Survey
2.2 Advantages of H.264
3 Proposed Work
3.1 H.264 Encodıng and Decodıng
3.2 H.264 Decoder Design Blocks
4 Results
5 Conclusion
References
Analyzing Student Reviews on Teacher Performance Using Long Short-Term Memory
1 Introduction
2 Literature Survey
3 System Architecture
4 Implementation
4.1 Dataset
4.2 Data Preprocessing
5 Algorithms
5.1 Naive Bayes Classifier
5.2 Decision Tree
5.3 Random Forest
5.4 The Proposed Model
6 Result Analysis
6.1 Confusion Matrix Obtained for the Considered Algorithms
6.2 Results
6.3 Demonstrating Proposed Algorithm Using Testcases
7 Conclusion
References
A Novel Ensemble Method for Underwater Mines Classification
1 Introduction
1.1 Related Works
2 Preliminaries
2.1 Support Vector Machine
2.2 Logistic Regression
2.3 K-Nearest Neighbor
2.4 Naive Bayes Classification
2.5 Random Forest
3 Materials and Methods
3.1 Dataset
3.2 Proposed Method
4 Results and Discussion
5 Conclusion
References
Design of Blockchain Technology for Banking Applications
1 Introduction
2 Literature Survey
3 Proposed Approach
4 Experimental Setup
5 Results and Discussions
6 Conclusion
References
A Brief Survey of Cloud Data Auditing Mechanism
1 Introduction
2 Application Area and Challenges
3 Survey and Existing Work
3.1 Integrity Checking Using Cryptographic Functions
3.2 By Using Provable Data Possession (PDP)
3.3 By Using Blockchain and Merkle Tree
4 Discussion
5 Result and Analysis
6 Conclusion
References
Detecting Sybil Node in Intelligent Transport System
1 Introduction
2 Literature Survey
3 System Overview
4 Proposed Methodology
4.1 Data Generation
5 Results and Analysis
6 Conclusion
References
Applying Lowe's ``Small-System'' Result to Prove the Security of UPI Protocols
1 Introduction
2 Background
3 Lowe's Small-System Result
4 Applying Lowe's Result to UPI Protocols
5 Conclusion
References
Spark-Based Scalable Algorithm for Link Prediction
1 Introduction
2 Related Work
3 Proposed Method
3.1 Preliminaries
3.2 Proposed Method
4 Experimental Results
4.1 Experimental Data
4.2 Experimental Setup
4.3 Execution Process
5 Result and Analysis
5.1 Results
5.2 Observations from the Work
6 Conclusion and Future Work
References
Obstacle Detection by Power Transmission Line Inspection Robot
1 Introduction
2 Related Work
3 Proposed Solution
3.1 Preparation of Datasets
3.2 Texture Analysis
3.3 Classification Model
4 Result and Analysis
5 Conclusion
References
Performance Analysis of Logistic Regression, KNN, SVM, Naïve Bayes Classifier for Healthcare Application During COVID-19
1 Introduction
2 Related Works
3 Methodology
4 SVM
5 Logistic Regression
6 KNN
7 Naive Bayes
8 Experimental Results
9 Conclusion
References
Recognition and Detection of Human Judgment About Influential Pairs Using Machine Learning Techniques
1 Introduction
2 Review of Literature
3 Proposed Model
4 Methodology
4.1 Data Collection
4.2 Data Exploration
4.3 Dataset Description
4.4 Data Distribution
4.5 Finding Missing Values and Abnormal Data in the Dataset
4.6 Training Model Function
4.7 Precision
4.8 Classification Report
4.9 ROC Curve
4.10 Cross-Validation Analysis
4.11 Random Forest Classifier
4.12 Logistic Classifier
4.13 NaĂŻve Bayes Classifier
4.14 Multilayer Perception Classifier
4.15 Decision Tree Classifier
4.16 Stacking
4.17 Developing GUI
5 Results and Discussion
6 Conclusion
7 Future Enhancement
References
Design and Implementation of High-Speed Energy-Efficient Carry Select Adder for Image Processing Applications
1 Introduction
2 Overview of CSLA
2.1 CSLA
2.2 Bit Single Block CSLA
3 Proposed System
3.1 Single Block CSLA with 5-Bit
4 Results and Discussion
4.1 Single Block CSLA with 5-Bit
4.2 Implementation
5 Conclusion
References
Mitigating Poisoning Attacks in Federated Learning
1 Introduction
2 Federated Learning
2.1 Types of Federated Learning
2.2 Threats to Federated Learning
2.3 Poisoning Attacks
3 Adversarial Goal
4 Relative Weight Distance Computation
5 Experimental Setup
5.1 Generating Update
5.2 Applying Control Measure
5.3 Algorithm
5.4 Analysis
6 Results
7 Conclusion and Future Scope
References
An Audit Trail Framework for Saas Service Providers and Outcomes Comparison in Cloud Environment
1 Introduction
2 Review of Literature
3 Framework Description
4 Modelling the Problem
5 Results
6 Comparison of Results
7 Conclusion
References
Predicting Entrepreneurship Skills of Tertiary-Level Students Using Machine Learning Algorithms
1 Introduction
2 Related Works
3 Machine Learning Techniques
4 Data Collection
4.1 Participants
4.2 Questionnaires
4.3 Data Credentials
4.4 Data Cleaning and Data Preprocessing
5 Experimental Method
6 Experimental Result and Analysis
7 Conclusion and Future Work
References
Smart Pet Insights System Based on IoT and ML
1 Introduction
2 Related Work and Motivation
2.1 Background
2.2 Advantages
2.3 Disadvantages
3 Proposed Solution
3.1 Hardware Requirements
3.2 Software Requirements
3.3 Functional Requirements
3.4 Nonfunctional Requirements
4 Implementation
4.1 System Design
4.2 UML Diagrams
5 Test Cases and Result
6 Conclusion and Future Work
References
Design and Implementation of a Monitoring System for COVID-19-Free Working Environment
1 Introduction
2 Existing System
3 Proposed System
4 Hardware Description
4.1 Hardware Description for Stage-1
4.2 Hardware Description for Stage-II
5 Implementation and Results
5.1 Stage-I Implementation
5.2 Stage-II Implementation
6 Conclusion
References
Statistical Measurement of Software Reliability Using Meta-Heuristic Algorithms for Parameter Estimation
1 Introduction
2 Literature Review
3 Research Gaps Based on Literature Review
4 Statistical Measurement of Software Reliability
5 Accuracy Estimation Techniques
6 Failure Rate-Based Model
7 Experimental Result
7.1 GO Model and DS1 Statistical Analysis
8 Conclusion
References
Development of Optimized Linguistic Technique Using Similarity Score on BERT Model in Summarizing Hindi Text Documents
1 Introduction
2 Related Works
3 Various Techniques
3.1 Bidirectional Encoder Representation from Transformers (BERT)
3.2 Query Translation Approach
3.3 Dictionary-Based Translation Approach
3.4 Corpora Based Translation Approach
3.5 Machine Translation Based Approach
3.6 Document Translation Approach
3.7 Dual Translation (Both Query and Document Translation Approach)
4 Objectives
5 Solution Approach and Architecture
6 Obtained Results
7 Conclusions and Future Scope
References
Faulty Node Detection and Correction of Route in Network-On-Chip (NoC)
1 Introduction
2 Related Works
3 Architecture of NoC Router
4 Router Reconfiguration Model
5 Experimental Setup and Results
6 Conclusion
References
Paddy Crop Monitoring System Using IoT and Deep Learning
1 Introduction
1.1 Internet of Things
1.2 Importance of IoT in Agriculture
1.3 Deep Learning
1.4 Importance of Deep Learning in Agriculture
2 Literature Survey
3 Proposed System
3.1 IoT System Module
3.2 Suggestion System Module
3.3 Deep Learning Module
4 Experimental Results for Disease Detection
5 Conclusion
References
Diabetic Retinopathy Disease Classification Using EfficientNet-B3
1 Introduction
2 Literature Survey
3 Proposed Method
3.1 Dataset
3.2 Image Preprocessing and Enhancement
3.3 Model Training
3.4 Save Trained Model
3.5 Web Application
4 Results and Discussions
4.1 Module Description
4.2 Understanding the Images
5 Conclusion
References
Design Flaws and Suggested Improvement of Secure Medical Data Sharing Scheme Based on Blockchain
1 Introduction
1.1 Blockchain Technology
1.2 Our Contribution
1.3 Roadmap of This Paper
2 Mathematical Preliminaries
2.1 Notations
2.2 Bilinear Map
2.3 Computational Hard Problem
3 Chen et al. Protocol
3.1 Initialization Phase
3.2 Registration Phase
3.3 Authentication
4 Weakness and Cryptanalysis of Cheng et al. Scheme
4.1 Weaknesses of Cheng et al. Scheme
4.2 DoS Attack
4.3 Impersonation Attack in Registration Phase
4.4 Clock Synchronization Attack
4.5 Fails to Protection of Session Keys
4.6 Stolen Verifier Attack
5 Suggestion Improvement for Cheng et al. Scheme
6 Conclusion and Future Work
References
Comparative Analysis of Machine Learning Algorithms for Rainfall Prediction
1 Introduction
2 Related Work
3 System Architecture
3.1 Data Collection and Preprocessing
3.2 Segmentation
3.3 Training and Testing the System
4 Methods
4.1 Decision Tree Algorithm
4.2 Naive Baise Algorithm
4.3 K-Nearest Neighbors (KNN)
5 Results and Discussion
5.1 Performance of Different Machine Learning Algorithms
5.2 Sample Outputs
5.3 Comparison of the Three Techniques
5.4 Discussion of Comparison of Results
6 Conclusion
References
Electronic Invoicing Using Image Processing and NLP
1 Introduction
1.1 Regex
1.2 Template Matching
2 State of the Art
3 Proposed Work
4 Implementation
4.1 Input Image
4.2 Conversion
4.3 Format Selector
4.4 Adding Unknown Format
4.5 Invoice Status
4.6 Extracting Information
4.7 Writing Information in Files
5 Result and Discussions
6 Conclusion
References
BEVDS: A Blockchain Model for Multiparty Authentication of COVID-19 Vaccine Beneficiary
1 Introduction
2 Background: Who Gets Access to the Vaccine?
3 Related Work
4 Proposed Blockchain Enabled Vaccine Delivery System
5 Discussion
6 Conclusion
References
Reinforcement Learning for Security of a LDPC Coded Cognitive Radio
1 Introduction
2 Low Density Parity Check (LDPC)
3 Cognitive Radio System
3.1 Spectrum Sensing Algorithm
3.2 Energy Detection for CR
4 Types of Spectrum Sensing Methods: A Comparison
5 Reinforcement Learning Model
5.1 Model Implementation
5.2 Training the Model (TensorFlow)
6 Experimental Results
7 Conclusions
References
Secure Forensic Data Using Blockchain and Encryption Technique
1 Introduction
2 Related Works
3 Proposed Block Diagram
3.1 Flowchart to Represent the Algorithmic Flow of the Proposed Model
4 Proposed Work
4.1 Adding Area, Police Station, Doctor, Forensic Staff by Application Manager
4.2 Crime Registered by the Police
4.3 Forensic Staff Generates the Forensic Report
4.4 Doctor Generates the Doctor Report
4.5 Investigation Log by the Police
4.6 Higher Officers or Police View the Reports
5 Result
6 Limitations
7 Conclusion
8 Novelty
References
Denoising of Surface Electromyography Signal Using Parametric Wavelet Shrinkage Method for Hand Prosthesis
1 Introduction
2 Materials and Methods
2.1 Dataset
2.2 Methodology
2.3 Wavelet Denoising
2.4 Thresholding Methods
2.5 Thresholding Algorithm
2.6 Performance Evaluation Parameters
2.7 Experiment
3 Results
4 Discussion
5 Future Scope
6 Conclusion
References
An Efficient Machine Learning Approach to Recognize Dynamic Context and Action Recommendations for Attacks in Enterprise Network
1 Introduction
2 Background
3 Types of DoS Attacks
4 Structure of the Workflow
5 k-Nearest Neighbor Model
6 Deep Reinforcement Learning (DRL)
7 Training Results
8 Conclusions
References
Convolutional Neural Network Based on Self-Driving Autonomous Vehicle (CNN)
1 Introduction
2 Developed Systems
2.1 Levels of Driving Automation
2.2 Possible Technological Obstacles for Automated Cars
2.3 Scope of the Project
3 The New Technique Model
4 Implementation of Hardware and Software Requirement
4.1 The Working of Raspberry Pi
4.2 Pi Camera Working
4.3 The Work of Microcontroller Arduino
4.4 Arduino IDE
4.5 Software Implementation
5 The Model Proposed Algorithm and Implementation
5.1 Algorithm Approach
5.2 Model Proposed
5.3 Comparative Study and Results
6 Conclusion
References
Performance Analysis of Machine Learning Algorithms in Detecting and Mitigating Black and Gray Hole Attacks
1 Introduction
2 Background of DoS Attacks
2.1 Flooding Attack
2.2 Black Hole Attack
2.3 Gray Hole Attack
3 Related Work
4 Methods and Materials
4.1 Methodology
4.2 Simulation of Attacks
4.3 Detection of Attacks
4.4 Mitigation of Attacks
5 Results and Analysis
5.1 Analysis of Accuracy
5.2 Execution Time
5.3 Comparison of Results
6 Conclusions and Future Work
References
Effect of Non-linear Co-efficient of a Hexagonal PCF Depending on Effective Area
1 Introduction
2 Brief on Photonic Crystal Fiber
3 PCF Design Scope and Challenges
3.1 Dispersion Managed Applications
3.2 Sensor Applications
3.3 Non-linear Optics Applications
3.4 Telecom Applications
4 Design of a Hexagonal PCF
5 Conclusion
References
Analysis of Student Attention in Classroom Using Instance Segmentation
1 Introduction
2 Literature Survey
3 Proposed Work and Design
3.1 Data Design
3.2 Model Design
4 Proposed System Implementation
4.1 Eye Status Detection Model
4.2 Head Gaze Detection Model
4.3 Pose Detection Model
4.4 Movement Detection Model
4.5 Attention Classification Model
5 Experimental Results
6 Testing
6.1 Test Plan
6.2 Test Report
7 Conclusion
References
A Simplex Method-Based Bacterial Colony Optimization for Data Clustering
1 Introduction
2 Clustering Problem
3 Bacterial Colony Optimization (BCO)
4 Simplex Method
5 Proposed SMBCO
6 Experimental Results Analysis
6.1 Datasets Collections
6.2 Performance Indicators
6.3 Results Analysis and Discussions
7 Conclusion
References
Artificial Intelligent Former: A Chatbot-Based Smart Agriculture System
1 Introduction
1.1 Theoretical Framework
1.2 Working
2 Related Study
2.1 Data Storage and Processing
3 Proposed Framework
3.1 Architecture of Smart Car
3.2 Transmission and Synchronization
3.3 Main Field Operations and Discussions
3.4 Materials and Methods
3.5 IoT Model Deployment
4 Analysis
5 Conclusion
References
Image Caption Generation Using Attention Model
1 Introduction
2 Dataset
3 Methodology
4 Experimental Analysis
5 Conclusion and Future Work
References
Pearson Correlation Based Outlier Detection in Spatial-Temporal Data of IoT Networks
1 Introduction
1.1 Categories of Outliers
2 Related Study
2.1 Measures of Dependence Between Variables
3 Pearson Correlation
4 Mutual Information
5 Results Analysis
5.1 Evaluation
5.2 Results
6 Conclusion
References
Energy Harvesting in Cooperative SHIPT NOMA for Multi-user Network
1 Introduction
1.1 Energy Harvesting Through Time Switching
1.2 Energy Harvesting Through Power Splitting
2 Related Work
3 System Model and Problem Formulation
3.1 The NOMA Signal Transmitted at I Time Slot:
3.2 The NOMA Signal Transmitted at the II Time Slot
3.3 Computation of Transmit Power
4 Simulation Results
5 Conclusion
References
An Efficient 1DCNNâLSTM Deep Learning Model for Assessment and Classification of fMRI-Based Autism Spectrum Disorder
1 Introduction
2 Related Work
3 Method and Material
3.1 Dataset
3.2 Proposed Method
4 Results and Discussion
5 Conclusion
References
Correction to: An Efficient 1DCNNâLSTM Deep Learning Model for Assessment and Classification of fMRI-Based Autism Spectrum Disorder
Correction to: Chapter âAn Efficient 1DCNNâLSTM Deep Learning Model for Assessment and Classification of fMRI-Based Autism Spectrum Disorderâ in: J. S. Raj et al. (eds.), Innovative Data Communication Technologies and Application, Lecture Notes on Data Engineering and Communications Technologies 96, https://doi.org/10.1007/978-981-16-7167-877
Author Index
đ SIMILAR VOLUMES
<p><span>This book presents emerging concepts in data mining, big data analysis, communication, and networking technologies, and discusses the state-of-the-art in data engineering practices to tackle massive data distributions in smart networked environments. It also provides insights into potential
<p><span>This book includes selected papers presented at the 4th International Conference on Data Engineering and Communication Technology (ICDECT 2020), held at Kakatiya Institute of Technology & Science, Warangal, India, during 25â26 September 2020. It features advanced, multidisciplinary rese
<span>The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the Department of Information Technology, Vasavi College of Engineering, Hyderabad, India in January 2022. ICCIDA provides an ex
<span>The book presents high-quality research papers presented at the International Conference on Computational Intelligence and Data Analytics (ICCIDA 2022), organized by the Department of Information Technology, Vasavi College of Engineering, Hyderabad, India in January 2022. ICCIDA provides an ex
<p><span>This book presents the latest findings in the areas of data management and smart computing, big data management, artificial intelligence, and data analytics, along with advances in network technologies. The book is a collection of peer-reviewed research papers presented at Sixth Internation