𝔖 Scriptorium
✩   LIBER   ✩

📁

International Conference on Computing, Communication, Electrical and Biomedical Systems (EAI/Springer Innovations in Communication and Computing)

✍ Scribed by Arulmurugan Ramu (editor), Chow Chee Onn (editor), M.G. Sumithra (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
673
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book presents selected papers from the International Conference on Computing, Communication, Electrical and Biomedical Systems (ICCCEBS 2021), held in March 2021 at KPR College of Engineering and Technology, Coimbatore, Tamil Nadu, India. The conference explores the interface between industry and real-time environments with newly developed techniques in computing and communications engineering. The papers describe results of conceptual, constructive, empirical, experimental, and theoretical work in areas of computing, communication, electrical, and biomedical systems. Contributors include academic scientists, researchers, industry representatives, postdoctoral fellows, and research scholars from around the world.

✩ Table of Contents


Preface
Conference Organization
Steering Committee
Organizing Committee
Technical Program Committee
Contents
Part I: Electrical, Computing and Communication Networks
Designing an ML-Based Congestion Detection Algorithm for Routing Data in MANETs
1 Introduction
1.1 Congestion in MANET
1.2 Clustering Using K-Means
1.3 Mobile Ad Hoc Networks Criteria
2 Literature Survey
3 Proposed Optimization Scheme
4 Experimental Result
5 Result and Analysis
6 Conclusion
References
Empirical Analysis of the Effect of Resampling on Supervised Learning Algorithms in Predicting the Types of Lung Cancer on Multiclass Imbalanced Microarray Gene Expression Data
1 Introduction
2 Materials and Methods
2.1 Data Set Description
2.2 Supervised Learning Algorithms
2.3 Resampling Techniques
2.4 Framework for the Experiment
3 Results
4 Conclusion
References
Artificial Intelligence to Protect Cyber Security Attack on Cloud E-Learning Tools (AIPCE)
1 Introduction
2 Related Work
3 Theoretical Background
3.1 Artificial Intelligence to Protect Cyber Security Attack on Cloud E-Learning Tools (AiPCE)
4 Results and Comparison
5 Conclusion
References
Online OPD Management with Rating and Review System to Hospitals and Doctors
1 Introduction
2 Literature Survey
3 Proposed System
4 Conclusion
References
Design and Analysis of Various Non-radiating Transmission Line Structures on a High-Speed PCBs
1 Introduction
1.1 Transmission Line
1.1.1 Structure Modelling
2 Conclusion
References
Mediating Effect of Quality Enhancement Between ICT-Related Factors and Student Satisfaction in Open and Distance Education
1 Introduction
2 Literature Review
3 Operational Definition
3.1 ICT in Administration
3.2 Online Admission
3.3 Attitude of Teacher/Educator Towards ICT Application
3.4 Value and Ethics
3.5 Quality of Support Services
3.6 ICT-Empowered Teaching-Learning Process
3.7 Quality Enhancement
3.8 Student Satisfaction
4 Research Objective
5 Methodology
5.1 Hypotheses
6 Analysis and Result
6.1 Proposed Hypothesis 1
6.2 Proposed Hypothesis 2
6.3 Proposed Hypothesis 3
6.4 Proposed Hypothesis 4
6.5 Proposed Hypothesis 5
6.6 Proposed Hypothesis 6
7 Discussion
8 Conclusion
References
Synthesis and Characterization of Nanoparticles
1 Elementary Units of Nanotechnology: Nanoparticles
1.1  Intoduction
1.2 Categorization of Nanoparticles
1.3 Features of Nanoparticles
2 Silver Nanoparticles
2.1 Nanosilver
2.2 Requirement for Silver
3 Synthesization of AG Nanoparticles
3.1 Silver Nanoparticles’ Synthesis Techniques
4 Tulsi Silver Nanoparticles
4.1 Several Species of Tulsi
5 Materials and Methods
6 Characterization Method
7 Application of Tulsi AgNPs
8 Conclusion
References
Unisum Labeling of Hydra Hexagons
1 Introduction
2 Formation of Hydra Hexagons
3 Unisum Labeling
4 Application of Hydra Hexagon in Cellular Networks
5 Future Scope
6 Conclusion
References
An Implementation of Mobile Shareable Content Object Reference Model for Online Assessment Using Virtual Learning Environment
1 Introduction
2 Literature Survey
3 Proposed Architecture
4 Methodology
5 Implementation
6 Experimental Result
7 Conclusion
References
The Finest Secured Routing Techniques with Transmission of Data in Mobile Ad Hoc Networks
1 Introduction
2 Literature Survey
3 Proposed Architecture
4 Algorithm and Experimental Result
5 Conclusion
References
Evaluation of Various Cryptographic Techniques Based on File Size on Cloud Storage Security
1 Introduction
2 Cloud Storage Security Issues
3 Encryption Algorithms
4 Performance Metrics
5 Comparative Study of Performance Evaluation
6 Conclusion
References
Cloud-Based Biometric-Enhanced ATM Powered by Deep Learning
1 Introduction
2 Technological Survey
2.1 Artefacts
3 Shortcomings with the Existing Implementation
4 System Development
4.1 Overview of the Proposed Implementation
4.2 Web Camera
4.3 Convolutional Neural Network-Based Image Classification
4.4 Facial Detection
4.5 Face Recognition
4.6 Fingerprint Identification
4.7 Minutiae-Based Fingerprint Sensor
5 Conclusion
References
Data Mining in Health Care: Application Perspective
1 Introduction
2 Literature Survey
3 Data Mining
4 Methodology
5 IVF Success Rate Prediction Comparison
6 Application of Rough Set Theory for Medical Informatics Data Analysis
7 Artificial Neural Network in Classification and Prediction
8 Modelling Neural Networks and Rough Sets for Analysing Medical Data
9 Conclusion
References
A Hybrid Filter Wrapper Embedded-Based Feature Selection for Selecting Important Attributes and Prediction of Chronic Kidney Disease
1 Introduction
2 Literature Review
3 Proposed Methodology
3.1 Dataset Information
3.2 Wrapper Algorithm
3.2.1 Relief-F
3.2.2 One-R
3.2.3 Gini Index (GI)
3.3 Filter Algorithm
3.3.1 Bat Algorithm (IBA)
3.3.2 Initialization of Bat Population
3.3.3 Update Procedural Frequencies, Velocity and Remedy
3.3.4 Changing Rate of Pulse Emission and Loudness
3.3.5 Improved Bat Algorithm (IBA)
3.3.6 Inertia Weigh Factor Modification
3.3.7 Adaptive Frequency Modification
3.4 Embedded Algorithm
4 Experimental Results
4.1 Dataset Information
5 Conclusion and Future Work
References
A Survey on Algorithms in Game Theory in Big Data
1 Introduction
2 Related Work
3 Performance Evaluation
4 Conclusion
References
RG Technique to Reduce the Fuel Consumption and Co2 Emission in VANET
1 Introduction
2 Related Work
3 Fuel Consumption in VANET Using ReGrouping Technique
3.1 Finite Automata
3.2 RG Technique
4 Results and Discussion
5 Conclusion
References
Emphasizing a Productive and Protective Access Control to Improve Authentication Using 802.1X with Software-Defined Networks
1 Introduction
2 Related Work
3 Research Methodology
4 SDN Work Flow in 802.1X
4.1 SDN Message Transmission with 802.1X
4.2 INASU Algorithm
4.3 Testing INASU Execution
5 Implementation
5.1 Throughputs Work Processing SDN
5.2 802.1X Processing in SDN
5.3 RAR Data Packet Converts 802.1X Using SDN
5.4 EAP Processing SDN
5.5 Demand Authenticator (MD5)
6 Resolution
7 RADIUS Works in SDN
8 Simulation Results
8.1 Prevalent SAA of Administration
8.2 802.1 X Stream Control
8.3 Reaction Authenticator
8.4 802.1X and RADIUS
9 Conclusion
References
Feature Extraction by Rework Image Recognition (RIR) Learning Model
1 Introduction
1.1 Image Recognition
1.2 Deep Learning (DL)
2 Convolutional Neural Networks (CNN)
3 RIR (Rework Image Recognition) Learning Model
3.1 RIR Input Layer
3.2 RIR Convolution Operation Layer
3.2.1 Convolution
3.2.2 ReLU Activation Function
3.2.3 Max Pooling
3.2.4 Flattening
3.2.5 Fully Connected Layer
3.3 RIR Feature Output Layer
4 RIR Learning Model Implementation
4.1 RIR Input Layer Preparation
4.1.1 Input Dataset Formation
4.1.2 Filter Formation
4.2 RIR Convolution Operation Layer
4.2.1 Convolution
4.2.2 ReLU Activation Function
4.2.3 Pooling
4.2.4 Flattening
4.2.5 Fully Connected Layer
4.3 RIR Feature Output Layer
5 Conclusion
References
Part II: Emerging Areas in Technology and Engineering Applications
Comprehensive Deep Recurrent Artificial Neural Network (CDRANN): Evolutionary Model for Future Prediction
1 Introduction
1.1 RNN (Recurrent Neural Network)
1.2 The Need for Comprehensive Model
1.3 Stock Market
2 CDRANN: Comprehensive Neural Evolutionary Model
2.1 LSTM in CDRANN
2.2 Proposed Model Structure
2.3 Parameters in Proposed Model
2.4 Equation Set
2.5 Algorithmic Steps of CDRANN
3 Implementation
3.1 Data Collection
3.2 Data Preparation
3.3 Feature Set Formation
3.4 Model Construction
3.5 Model Evaluation and Tuning Parameters
4 Conclusion
References
An Efficient Navigation Approach for Toll Plaza Using Map-Matching Algorithm with Hidden Markov Model
1 Introduction
2 Research Work
3 Methodology
4 Implementation
5 Result and Discussion
6 Conclusions
References
Mining of Customer Review Feedback Using Sentiment Analysis for Smart Phone Product
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Input Dataset/Feedback
3.2 Data Preprocessing: Word Tokenization and NLP
3.3 Sentiment Analysis
4 Conclusion
References
Privacy Preservation Framework for Big Data Analysis
1 Introduction
2 Background
3 Related Work
4 Considerations for Interactive Privacy
5 Privacy Accountant
6 Privacy Preservation During Machine Learning
7 Proof of Concept: k-Means Clustering
8 Experiments
9 Conclusion and Future Work
References
Interactive Artificial Neural Network Model for UX Design
1 Introduction
2 Background
3 Proposed Method
4 Results and Discussions
5 Conclusions
References
Multimodal Biometric Person Identification System Based on Speech and Keystroke Dynamics
1 Introduction
2 Literature Review
3 Materials and Methods
3.1 Mel Frequency Cepstral Coefficient (MFCC)
3.2 Keystroke Data Dynamics
3.3 Linear Data Fusion
3.4 Convolutional Neural Network (ConvNet or CNN)
4 Proposed Methodology
4.1 Datasets
4.2 Preprocessing
4.3 Framing, Windowing, and Noise Removal
4.4 Feature Extraction
4.5 Linear Feature Fusion
4.6 Dimension Reduction
4.7 CNN Training/Testing
5 Results and Discussion
6 Conclusion
References
Predictive Water Quality Modeling Using ARIMA and VAR for Locations of Krishna River, Andhra Pradesh, India
1 Introduction
2 Proposed Methods and Materials
3 Study Area and Data Collection
4 Predictive Modeling
4.1 ARIMA Model
4.2 Model Determination
4.3 Parameter Estimation and Analysis Using Model
4.3.1 Full/Partial Autocorrelation
4.3.2 Akaike Information Criterion (AIC)
4.3.3 Prediction Using ARIMA Model
5 VAR Model
6 Model Development
7 Results and Discussion
7.1 Results Obtained from Models
8 Conclusion
References
Selection of Routing Protocol-Based QoS Improvement for Mobile Ad Hoc Network
1 Introduction
2 Related Works
3 The Proposed Methodology
3.1 SLTMR Routing Protocol Step
3.2 Discovery Phase
3.2.1 Interest Flooding
3.2.2 Route Construction
3.3 Maintenance Phase
3.4 Comparison of Various Routing Protocols
4 Result and Performances
5 Conclusion
References
Multi-Clustering Management (MC-M)-Based Segmentation of Multiple Organs from Abdominal CT Images
1 Introduction
2 Literature Survey
3 Proposed Method
4 Conclusion
References
Efficient Performance of Data Science Application in Medical Field
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Result Analysis
5 Conclusion
References
Enhancing Social Divergence Using Genetic Algorithms and Linked Open Data for Improving Immunity System Against COVID-19
1 Introduction
2 Genetic Algorithms
3 Graph Database
4 Linked Open Data
5 Framework Architecture and Implementation
6 Conclusion
References
Ethereum-Based P2P Lending System (Dao App): Qualitative Review of a Possible Replacement for Lending Practices
1 Introduction
2 Literature Survey: Preliminaries of P2P Lending, Blockchain, and DAO
2.1 P2p Lending
2.2 Blockchain
2.3 Dao
3 Proposed Work
3.1 ICO: Initial Coin Offering
3.2 Lending
3.3 Trustee Management
4 Analysis
5 Conclusion
References
Malware Detection Based on Portable Executable File Features
1 Introduction
2 Related Work
3 Proposed Work
3.1 Dataset
3.2 Feature Selection
3.3 Splitting and Training
4 Result
5 Conclusion
References
Design IoT-Based Blind Stick for Visually Disabled Persons
1 Introduction
2 Literature Review
3 Methodology
3.1 Components: HC-SR04 Ultrasonic
3.2 Raspberry Pi Zero
3.3 Raspberry Pi Camera
4 Implementation
4.1 Collecting the Video Data
4.2 CNN (Convolutional Neural Network) for Feature Extraction
4.3 CNN Training
4.4 Object Category Classifiers
4.5 Result Unusual Object Recognition and Detection
4.6 Preparing Protest Discovery Model
4.7 Discovery CNN Algorithm
5 Results
6 Conclusion
References
Collaborative Interactive Workspace Environment Using Augmented Reality
1 Introduction
2 Literature Review
2.1 Augmented Reality
2.2 Collaboration Using Augmented Reality
2.3 Augmented Reality on Mobile Phones
2.4 Augmented Reality in Education
3 Methodology
3.1 Domain Description
3.2 Module Description
3.2.1 Module 1: CRUD
3.2.2 Module 2: COLLABORATION MODULE
3.2.3 Module 3: EXTENDED DISPLAY MODULE
4 Implementation
4.1 Flow Process
5 Data Analysis
6 Technical Analysis
7 Conclusion
References
Analysis and Prediction of COVID-19 Cases Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Methodology
3.1 Data Preprocessing
3.2 Testing and Training
3.3 Graph, Different Accuracy, and Error Generation
4 Results and Discussion
5 Conclusion
References
Food Detection and Nutritional Recognition System Using Neural Networks
1 Introduction
2 Literature Survey
3 Neural Network Model
4 Experimental Results
5 Conclusion
References
Online Shipping Management Firm with Route and Cost Optimization for Warehouses
1 Introduction
2 Similar Works
3 Proposed Methodology
3.1 Heuristic Approach
4 Implementation
5 Result Analysis
6 Conclusion
References
Digital Certificate-Based User Authentication to Access Networks and Hosts
1 Introduction
1.1 Role of Firewall in Network Security
1.2 Cryptography
2 Related Works
3 Proposed Methodology
4 Implementation
5 Performance Analysis
6 Conclusion
References
Wield NodeMCU IOT to Shelter Coal Mining
1 Introduction
2 Related Works
3 Proposed System
4 NODEMCU esp8266
5 Sensors
6 Arduino Uno
7 Conclusion
References
Pancreases Segmentation and Classification Based on RCNN and AlexNet
1 Introduction
2 Literature Survey
3 Related Work
4 Proposed System
4.1 Processing of an Image
4.2 Feature Extraction
4.3 CNN Algorithm
4.4 AlexNet Algorithm
5 Experimental Setup
6 Conclusion
References
A Compact Wideband Dielectric Resonator Antenna for 5G Applications
1 Introduction
2 Proposed Antenna Design
2.1 Details of the Dielectric Resonator Antenna’s Design
2.2 Calculation of Antenna Design Parameters
3 Simulated Result
4 Conclusion
References
Development of FLC Based AC to AC Converter for Wind Energy
1 Introduction
2 Proposed Topology
3 Modes of Operation
4 Control Structure
5 Results and Discussion
6 Conclusion
References
Energy Management System for Small-Scale Hybrid Wind Solar Battery-Based Microgrid
1 Introduction
2 Proposed System
3 System Description
3.1 Modeling of Wind Generator
3.2 Modeling of PV System
3.3 Modeling of Battery
4 Result and Discussion
5 Conclusion
References
EYE-TM: An Automatic Teller Machine for the Visually Impaired
1 Introduction
2 Related Work
3 Proposed Solution
3.1 Single User Detection
3.2 Biometric Identification Using Fingerprint Sensor
3.3 Face Recognition
3.4 Transaction
3.4.1 Text to Speech
3.4.2 Speech to Text
4 Implementation Results
5 Conclusions and Future Enhancement
References
High-Capacity Reversible Data Hiding Using Lossless LZW Compression
1 Introduction
2 Data Compression
3 Proposed Model
3.1 Image Pre-processing
3.2 LZW Compression
3.3 LSB Data Hiding
4 Experimental Results
5 Conclusion
References
Tropical Cyclone Detection Using Optical Flow Estimation Deep Learning
1 Introduction
2 Literature
3 Proposed Method
3.1 Optical Flow Method
3.2 Multiscale CNN
3.3 Cost Function
3.4 Convolutional Neural Network
4 Experimental Results
5 Conclusion
References
Importance of Information and Communication Technology (ICT) in Higher Education Paper
1 Introduction
2 Literature Review
2.1 Importance of Information and Communication Technology
2.2 Theoretical Approach
2.3 The Model Used in Information and Communication Technology
3 Materials and Methods
3.1 Research Philosophy
3.2 Research Design
3.3 Research Approach
3.4 Data Collection and Data Analysis
3.5 Ethical Consideration
4 Result and Discussion
5 Conclusion
References
A Brief Analysis of Border Gateway Protocol for Internet Controlling and Malicious Attacks
1 Introduction
2 Literature Review
3 Research Gaps and Challenges
4 Conclusion and Future Work
References
Hybrid Blind Watermarking Using RDWT-DCT in Singular Value Decomposition Domain
1 Introduction
2 Literature Survey
3 Proposed Method
3.1 Watermark Embedding Algorithm
3.2 Watermark Extraction Algorithm
4 Results and Discussion
4.1 Watermarking Performance
5 Conclusion
References
A Real and Accurate Data Traffic Control in Wireless Sensor Networks Using CSMA Model
1 Introduction
1.1 Network on Wireless Sensors
1.2 CSMA/CA Approaches to Node Design
1.3 Approach to Design
1.4 Model of Communication
1.5 WSN Computer Traffic Simulation
2 Constraint of Traffic Blockage in WSN
2.1 WSN Probabilistic Rate Governance
2.2 Design Approach
3 Experimental Outcomes
4 Conclusion
References
A Novel Approach for File Security in Cloud
1 Introduction
2 Related Work
2.1 Dual Server Encryption and Decryption Techniques
2.2 Cryptography
2.3 Multi-cloud Computing Environment
2.4 AES Data Encryption and Decryption
2.5 Encryption in a Cloud Environment
2.6 Proxy Re-encryption
2.7 Encryption in the Cloud Using the USB Device
3 Proposed System
3.1 Key Generation
3.2 Data Division
3.3 Encryption
3.4 Proxy Re-encryption
4 Result and Discussion
4.1 Experimental Setup
4.2 Experimental Results
5 Conclusion and Future Scope
References
Malicious Firmware Injection Detection on Wireless Networks Using Deep Learning TF-IDF Normalization (MFI-IDF)
1 Introduction
2 Related Work
3 Theoretical Background
4 Experimental Results and Comparison
5 Conclusion and Future Work
References
An Efficient Authentication Using Monitoring Scheme for Node Misbehaviour Detection in MANET
1 Introduction
2 Proposed Model
3 Simulation Output
4 Conclusion and Future Work
References
A Framework for Analysis of Network Traffic Using Predictive Algorithm
1 Introduction
2 Description
2.1 Decision Tree (Machine Learning)
2.2 Deep Autoencoder (Deep Learning)
2.3 UNSW-NB15
3 Working Principle
3.1 Decision Tree Model
3.2 Data Preprocessing
3.3 Unsupervised Techniques
3.4 Recursive Feature Elimination
3.5 Prediction and Evaluation
4 Autoencoder
4.1 Data Preprocessing
4.2 Data Preprocessing
4.3 Build the Model
4.4 Prediction of Accuracy
5 Result and Future Scope
5.1 Intrusion Detection Will Evolve in Different Paths
6 Conclusion
References
A Review on Deep Learning Technique on Basis of Different Types of Crop Diseases
1 Introduction
2 Introduction: Deep Learning
3 Convolution Neural Network (CNN)
4 Challenges
4.1 Classification of Plants
4.2 Detection of Diseases
4.3 Pests Recognition
4.4 Detection of Weed
5 Future of Deep Learning
6 Conclusion
References
Food Plant Diversity of Homestead Gardens in Cherangode Panchayath of Nilgiris District, Tamil Nadu, India
1 Introduction
2 Methodology
3 Result and Discussion
4 Conclusion
References
Index


📜 SIMILAR VOLUMES


8th EAI International Conference on Mana
✍ Lucia Knapčíková (editor), Dragan Peraković (editor) 📂 Library 📅 2024 🏛 Springer 🌐 English

<p><span>The book presents the proceedings of the 8th EAI International Conference on Management of Manufacturing Systems (MMS 2023), which took place October 24-26, 2023 in Bratislava, Slovakia. The conference covers the management of manufacturing systems with support for Industry 4.0, logistics a

Computational Intelligence in Recent Com
✍ Mariya Ouaissa (editor), Zakaria Boulouard (editor), Mariyam Ouaissa (editor), B 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book focuses on the use of Artificial Intelligence and Machine Learning (AI/ML) based techniques to solve issues related to communication networks, their layers, as well as their applications. The book first offers an introduction to recent trends regarding communication networks. The

Computational Intelligence in Recent Com
✍ Mariya Ouaissa (editor), Zakaria Boulouard (editor), Mariyam Ouaissa (editor), B 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book focuses on the use of Artificial Intelligence and Machine Learning (AI/ML) based techniques to solve issues related to communication networks, their layers, as well as their applications. The book first offers an introduction to recent trends regarding communication networks. The

Computational Intelligence in Recent Com
✍ Mariya Ouaissa (editor), Zakaria Boulouard (editor), Mariyam Ouaissa (editor), B 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book focuses on the use of Artificial Intelligence and Machine Learning (AI/ML) based techniques to solve issues related to communication networks, their layers, as well as their applications. The book first offers an introduction to recent trends regarding communication networks. The