𝔖 Scriptorium
✩   LIBER   ✩

📁

Inventive Communication and Computational Technologies: Proceedings of ICICCT 2021 (Lecture Notes in Networks and Systems, 311)

✍ Scribed by G. Ranganathan (editor), Xavier Fernando (editor), Fuqian Shi (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
1016
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book gathers selected papers presented at the Inventive Communication and Computational Technologies conference (ICICCT 2021), held on 25–26 June 2021 at Gnanamani College of Technology, Tamil Nadu, India. The book covers the topics such as Internet of things, social networks, mobile communications, big data analytics, bio-inspired computing, and cloud computing. The book is exclusively intended for academics and practitioners working to resolve practical issues in this area.


✩ Table of Contents


Preface
Contents
Editors and Contributors
Dimensionality Reduction Based Component Discriminant Factor Implication for Mushroom Edibility Classification Using Machine Learning
1 Introduction
2 Literature Review
3 Overall Proposed Architecture
4 Results and Discussion
4.1 Qualitative Classifier Analysis of the Dataset
4.2 Quantitative Analysis with PCA
4.3 Quantitative Analysis with LDA
4.4 Factor Analysis Before and After Feature Scaling
5 Conclusion
References
Flip-Flop-Based Approach for Logic Encryption Technique
1 Introduction
1.1 Methods of Logic Encryption
2 Proposed Work
3 Implementation and Experimental Results
4 Conclusion and Future Work
References
Analysis and Implementation of Less Delay and Low Area DT Multiplier
1 Introduction
1.1 Array Multiplier
1.2 Wallance Multiplier
2 Proposed DT Multiplier
3 Result and Implementation
4 Conclusion
References
An Exploration on Feature Extraction and Classification Techniques for Dysphonic Speech Disorder in Parkinson’s Disease
1 Introduction
1.1 Data Collection
1.2 Attributes (Voice Features)
2 Literature Survey
3 Discussion
3.1 Unified Parkinson’s Disease Rating Scale
3.2 Machine Learning Techniques
4 Conclusion
References
Intelligent Recommender System Based on Deep Learning for Recognition of COVID-19 from Lungs Radiograms
1 Introduction
1.1 Objective and Motivation
1.2 Novel Contribution
2 Model Building
2.1 Model 1: MobileNet
2.2 Model 2: ResNet50
2.3 Model 3: Xception
2.4 Model 4: Inception V3
3 Materials and Methodology
3.1 Dataset
4 Results and Discussions
4.1 Experimental Procedure and Tool
4.2 Discussions
4.3 Pseudocode
5 Conclusion and Future Work
References
Generation of Structured Query Language from Natural Language Using Recurrent Neural Networks
1 Introduction
2 Related Work
3 Proposed Approach
3.1 Dataset
3.2 Data Preprocessing
3.3 Generation of SQL from NL Using RNN
4 Experimental Results and Analysis
5 Conclusions
References
Machine Learning and Deep Learning Approaches for Intrusion Detection: A Comparative Study
1 Introduction
2 Related Works
3 Metrics Used to Evaluate Intrusion Detection System
4 Datasets Used for Intrusion Detection Research
5 Literatures in Machine Learning for Intrusion Detection
5.1 Single Classifier
5.2 Hybrid Classifier
6 Literatures in Deep Learning for Intrusion Detection
6.1 Deep Auto-encoders
6.2 Boltzmann Machine (BM)
6.3 Recurrent Neural Networks (RNN)
6.4 Convolutional Neural Networks (CNN)
6.5 Deep Neural Network (DNN)
7 Observations and Future Directions
8 Conclusion
References
Improving Text Classifiers Through Controlled Text Generation Using Transformer Wasserstein Autoencoder
1 Introduction
2 Related Work
2.1 Strategies for Balancing Datasets
2.2 Wasserstein Autoencoder
2.3 Transformers
2.4 Decoding Strategies
3 Proposed Work
4 Results
5 Conclusions
References
Topological Analysis of Cube Based and Linearly Extensible Networks Using MATLAB
1 Introduction
2 Upshots of Parameter
3 Related Work
4 Comparative Analysis
4.1 Performance of Cube Based Networks
4.2 Performance of Linearly Extensible Networks
4.3 Comparative Analysis of Better Performing Networks
5 Conclusion and Future Work
References
Implementation of Rule Based Testing for Digital Circuits Using Inductive Logic Programming
1 Introduction
2 Inductive Logic Programming
3 Implementation Platform
4 Metagol Library Working
5 Results
5.1 Simulation Result on Verilog
5.2 Simulation Result on Raspberry PI
5.3 Simulation Result of ILP Codes on Prolog
6 Comparative Result
7 Conclusion
References
Design of a High-Speed Binary Counter Using a Stacking Circuit
1 Introduction
2 Related Works
3 Proposed Architecture
4 Simulation and Results
5 Conclusion
References
Feature-Level Fusion of Multimodal Biometric for Individual Identification by Training a Deep Neural Network
1 Introduction
2 Related
3 Feature Abstractions
3.1 HoG Descriptor for Face
3.2 SURF Features
4 Processing Sequence and Feature-Level Fusion
4.1 Acquisition and Processing Sequence
4.2 Feature-Level Fusion
5 Proposed System
5.1 Normalizing Feature Sets
5.2 Concatenation
5.3 Feature Selection
5.4 Proposed Model
6 Experiment Results and Discussions
6.1 Testing Setup and Dataset
6.2 Results and Discussions
7 Conclusions
References
Design of Multistage Counters Using Linear Feedback Shift Register
1 Introduction
2 Related Work
3 Methodology
3.1 Basic LFSR
3.2 Existing Multistage Counter Design
3.3 Proposed Multistage Counter Designs
3.4 Sequence Extension Logic
3.5 Ripple Carry Logic
3.6 Decoding Logic
4 Results and Discussion
5 Conclusion
References
Machine Learning Based and Reconfigurable Architecture with a Countermeasure for Side Channel Attacks
1 Introduction
2 .
2.1 Related Works
2.2 Power Attack Method
3 .
3.1 Proposed Chaotic Maps—A Brief Overview
3.2 Extreme Machine Learning Algorithm
3.3 Proposed Architecture
4 .
4.1 Experimental Setup
4.2 Simulation and Synthesis Results
5 Conclusion
References
Autonomous Scheduling and Distributed Graph Routing Algorithm (ASDGRA) for Hybrid Wireless Sensor Networks
1 Introduction
2 Related Work
3 Proposed Methodology of WSN for Effective Scheduling and Routing
3.1 Directed Routing Graph (DRG)
3.2 Best Head and Second Best Head Selection
3.3 Allocation of Rank
3.4 Weighted ETC
3.5 Measurement of Energy in WSN
4 Results and Discussions
5 Conclusion
References
Janus Antenna Array Design for Doppler Navigation System
1 Introduction
2 Annular Ring Configuration
3 Antenna Design and Simulation
4 Results and Discussion
5 Conclusion
References
Emergency Medical Services Using Drone Operations in Natural Disaster and Pandemics
1 Introduction
2 Literature Survey
3 Proposed System
3.1 Problem Statement
3.2 System Architecture
4 System Implementation
4.1 Android App Development
4.2 Android Speech
5 Results and Discussions
6 Conclusion and Future Enhancement
References
Design and Analysis of Digital Beamforming for SATCOM on the Move Based on Specific Geographical Area
1 Introduction
2 SATCOM on the Move
3 Description of Proposed System
3.1 Determination of Look Angles
3.2 Construction of Antenna Element
3.3 Processing Data for Beamforming
4 Result and Discussion
5 Conclusion and Future Work
References
Hybrid Encryption Algorithm for Storing Unimodal Biometric Templates in Cloud
1 Introduction
1.1 Cloud Computing Definition
1.2 Encryption Algorithms
1.3 Biometrics
1.4 Benefits and Challenges of Cloud Computing
2 Literature Survey
3 Problems in Existing System
4 Hybrid Model
4.1 Architecture
4.2 Supplementary Material
4.3 Algorithm
4.4 Experiment Results and Analysis
5 Conclusion and Future Work
References
Zero-Trust Security Implementation Using SDP over VPN
1 Introduction
2 Related Works
3 Cryptojacking
4 Experimental Setup
5 Zero-Trust Security
6 Software-Defined Perimeter
7 Implementation and Results
8 Conclusion and Future Work
References
Privacy Preserving Authentication and Access Control Scheme in Data Markets
1 Introduction
2 Literature Survey
3 Authentication and Access Control Scheme
4 Results
5 Conclusion
References
Communication Framework for Real-Time Monitoring of a Smart Grid Emulator
1 Introduction
2 Related Work
3 Proposed Work
3.1 Simulation Scenario
4 Result Analysis
4.1 Simulation Results
4.2 Hardware Implementation
5 Conclusion
References
DOE to Identify the Most Important Factors to Enhance the Efficiency of Reactive Routing Protocols in MANETs
1 Introduction
2 Literature Review of Related Work
3 Routing Protocols
4 Research Methodology
5 Simulation Process
6 Results and Analysis
7 Conclusions and Future Directions
References
IOT-Based Smart Street Light Control Application for Smart Cities
1 Introduction
2 Literature Survey
3 Proposed System
4 Components Used for Proposed Method
5 Results and Discussion
6 Conclusion and Future Enhancement
References
Recognition of Facial Expression Using Haar Cascade Classifier and Deep Learning
1 Introduction
2 Background and Literature Survey
3 Proposed Methodology
3.1 Image Dataset
3.2 Image Preprocessing
3.3 Face Detection
3.4 Data Augmentation
3.5 Convolutional Neural Network
3.6 Fully Connected Layer
3.7 Softmax Function
4 Results and Discussion
5 Conclusion and Future Enhancement
References
Swastika-Shaped Uniplanar EBG Antenna for X-band Applications
1 Introduction
1.1 Literature Survey
2 Antenna Design
3 Discussion of Results
4 Conclusion and Future Scope
References
Hurdle Dodging Robot Using Lidar with a Built-On Gas Detection System
1 Introduction
2 Related Works
3 Proposed Method
3.1 Initial Setup
3.2 Approach to Algorithm
3.3 Simulation Verification
4 Hardware
4.1 Design and Implementation
5 Result
6 Conclusion and Future Scope
References
Implementation of the Modified Pre-trained DenseNet Model for the Classification of Grades of the Diabetic Retinopathy
1 Introduction
1.1 Diabetes and Diabetic Retinopathy Prevalence
2 Related Work
2.1 Literature Review
3 Proposed Work
3.1 Dataset
3.2 Methods
3.3 Building DenseNet Deep Learning Model
3.4 Pseudo Code
4 Result Analysis
4.1 Metrics for Performance Evaluation
4.2 Results and Discussion
5 Conclusion
References
Performance Analysis of Filter Bank Multicarrier System for 5G Networks
1 Introduction
2 Related Works
3 OFDM
4 FBMC
5 Simulation Parameters
6 Simulation and Results Analysis
7 System Parameters
8 Implementation and Result Analysis
9 Conclusion
References
Challenging the Network Privacy of Beaker Browser
1 Introduction
2 Related Work
3 Dat Protocol
3.1 Content Integrity
3.2 Incremental Versioning
3.3 Network Privacy
4 Beaker Browser
4.1 Dat Protocol in Beaker
4.2 Hyperdrives
4.3 Fork and Copy of Websites
5 Proposed Work
6 Implementation
7 Result Analysis
8 Mitigation Approach
9 Conclusion and Future Work
References
Self-Organizing Deep Learning Model for Network Traffic Classification
1 Introduction
2 Literature Survey
3 Proposed Model
3.1 Phase 1: Self-organizing Model
3.2 Phase 2: Dynamic Dimensionality Reduction
3.3 Phase 3: Feature Extraction Using Deep Learning Model
4 Significance
5 Conclusion
References
Artificial Intelligence-Based Rubber Tapping Robot
1 Introduction
2 AI-Based Rubber Tapping Process
3 Path Planning of the Robot
4 Prediction Algorithm for Cutting Depth and Length to Be Tapped from Ground Level
5 Movement Control of Robot Using PI and Adaptive Fuzzy-PI Controllers
6 Conclusion
Appendix
References
Unmanned Aerial Vehicles (UAV) Jammer
1 Introduction
2 Related Work
3 Radio Frequency Radiations
4 Forms of Jamming
5 Techniques for Jamming
6 Signal Jammer Design Parameters
7 Concept of Jamming
8 System Design
9 Illustration of a Drone Jammer
10 Results
11 Conclusion
References
Performance Comparison of Machine Learning Algorithms in Symbol Detection Using OFDM
1 Introduction
2 Machine Learning Algorithms
3 Methodology
3.1 Data Preprocessing
3.2 Training
3.3 Detection
4 Results & Analysis
5 Conclusion and Future Work
References
Security Schemes for Integrity Protection and Availability of Service in Cloud Environment: A Review
1 Introduction
1.1 Significant Features
1.2 Service Model
1.3 Deployment Models
2 Security Services and its Challenges
2.1 Threats Affecting Cloud Environments
3 Review of Different Data Availability and Integrity Providing Schemes
3.1 Data Integrity
3.2 Verifying the Correctness of Data and Preserving the User Identity in the Cloud
3.3 Data Availability
3.4 Different Type of DDoS Attack
4 Conclusion
References
Analysing the Impact of Security Attributes in Fog-IoT Environment Using AHP Approach
1 Introduction
2 Related Work
3 Fog–Internet of Thing Security
3.1 Authentication (C1)
3.2 Access Control (C2)
3.3 Intrusion Detection (C3)
3.4 Trust (C4)
3.5 Integrity (C5)
4 Methodology
5 Implementation of the Methodology
6 Conclusion
References
A Deep Learning Approach to Invisible Watermarking for Copyright Protection
1 Introduction
1.1 Problems with Existing Methods
2 Architecture
2.1 Metrics
3 Methodology
3.1 Proposed Steps
4 Results
5 Conclusion
References
Web-Based Patient Centric Drive Health Care Monitoring System
1 Introduction
2 Research Background
3 Proposed System
4 Design and Implementation
4.1 Biosensors
4.2 Microcontroller
4.3 Raspberry PI
4.4 LAMP Based Web Page
5 Future Enhancement
6 Conclusions
References
Early Fault Detection in Safety Critical Systems Using Complex Morlet Wavelet and Deep Learning
1 Introduction
2 Early Classification of Time Series
3 Proposed Methodology
3.1 Complex Morlet Wavelet (CMW)
3.2 Hybrid CNN-LSTM Architecture
3.3 Model Building
3.4 Stopping Rule
4 Results and Discussion
5 Conclusion
References
Storage Mechanism for Heterogeneous Streamed Sensor Data
1 Introduction
2 Related Work
3 Architecture
3.1 Architectural Characteristics of the Solution
3.2 Architectural Components:
3.3 Technical Solution Architecture
4 Process Workflow
5 Experimental Setup and Results
6 Conclusion
References
FGTD: Face Generation from Textual Description
1 Introduction
2 Related Work
2.1 Text-To-Image
2.2 Text-To-Face
3 Background
3.1 Caption Creation
3.2 Sentence Vectors
3.3 Generative Adversarial Networks
3.4 Model Overview
3.5 Evaluation and Scoring
4 Methodology
4.1 Process Flow
4.2 Caption Creation
4.3 Sentence Encoding
4.4 Network Architectures
5 Evaluation and Results
6 Conclusion and Future Work
References
Two Levels of Security for Protection of Images Copyright
1 Introduction
2 Previous Works
3 The Proposed Color Image Watermarking System
3.1 The Sender Side
3.2 The Receiver Side
4 Experimental Results
4.1 Imperceptibility of Watermarked System
4.2 Robustness Measures of the Proposed System Against Attacks
5 Conclusions
References
Speech Enhancement Using Nonlinear Kalman Filtering
1 Introduction
2 Related Works
3 Methodology
3.1 Flow Process
3.2 Unscented Kalman Filtering
4 Experimental Results
5 Conclusion
References
An Agriculture Supply Chain Model for Improving Farmer Income Using Blockchain Smart Contract
1 Introduction
2 Literature Review
3 Blockchain and Smart Contract
4 Proposed Model
4.1 Ledger
4.2 Smart Contract
4.3 Transactions
5 Implementation and Analysis
6 Conclusion
References
SDN-Enabled Secure IoT Architecture Development: A Review
1 Introduction
2 IoT Basics
2.1 Architecture
2.2 IoT Elements
3 Features and Challenges in IoT Security Architecture
3.1 IoT Security Architecture Features
3.2 IoT Challenges
4 Existing Security Techniques
5 Inference
6 Designing an IoT Security Architecture
7 SDN Basics
8 Existing Secure IoT Frameworks
8.1 Microsoft Azure Architecture
8.2 IBM SDN-VE
8.3 Cisco IoT Security Architecture
9 Conclusion
References
Distributed Identity and Verifiable Claims Using Ethereum Standards
1 Introduction
2 Related Works
2.1 Dock
2.2 Evernym's Connect.Me and Verity
2.3 Bloom
2.4 Microsoft's ION
2.5 3Box and 3ID Connect
2.6 KILT
2.7 Sovrin
2.8 Serto (uPort)
2.9 Hyperledger Indy
2.10 RubiX DID
3 Proposed Work
3.1 Architecture
3.2 Insurance Use Case
3.3 Discussion
4 Conclusion
References
Transfiguring Handwritten Text and Typewritten Text
1 Introduction
2 Related Work
3 Proposed Work
3.1 Creating GUI Interface for the Application:
3.2 Transfiguring Handwritten Text to Typed Text
3.3 Transforming Typed Text to Handwritten Text
3.4 Randomizing Handwritten Character Styles
3.5 .Txt Output File to .Mp3 File
3.6 Mailing the Output File to the User to Avoid Data Loss
3.7 Dataset
4 Results Analysis
5 Conclusion
References
Smart Home with Condition Monitoring
1 Introduction
2 Problem Formulation
3 Proposed System
3.1 Home Automation
3.2 Condition Monitoring
3.3 Android Application
4 Result
5 Future Works
6 Conclusion
References
Developing a Smart System for Reducing Traffic Congestion
1 Introduction
2 Literature Review
3 Requirement Elicitation Study
3.1 Participant's Profile
3.2 Study Procedure
3.3 Study Findings
4 The Conceptual Framework
5 Development of the Proposed System
5.1 The Mobile Application
5.2 Hardware Implementation
6 Evaluating the System
7 Discussions and Conclusion
References
Meta-Heuristics–Fireflies Correlated Algorithm for Optimized Routing in Manets
1 Introduction
2 Related Works
3 Methodology
3.1 Problem Identification and Definition
3.2 Meta-Heuristics—Fireflies Correlated Algorithm for Optimized Routing in MANETs
4 Experimental Results
4.1 Energy Consumption
4.2 Packet Delivery Ratio
5 Conclusion
References
Machine Transfer Learning Deep Softmax Regression Neural Network for Image Classification
1 Introduction
2 Related Work
3 Deep Softmax Regression Classifier Neural Network Technique
3.1 Deep Restricted Boltzmann Machine (Contrastive Divergence) with Gibbs Sampling
3.2 Deep Restricted Boltzmann Machine Training Algorithm
4 Simulation Platform and Image Processing
5 Result Analysis
5.1 Accuracy of DSRCNN
5.2 False-Positive Ratio of DSRCNN
6 Conclusion
References
A Profound Deep Learning Approach for Detection System in Network Data
1 Introduction
2 Motivation
2.1 Clarification of the Contribution Topic
3 Literature Survey
4 Approach
5 Experimentation and Results
5.1 Information Stacking and Pretreatment
5.2 Metrics for Evaluation
5.3 Correlation of the Consequences, All Considered and Their Levels
5.4 Assessment of the Vault Execution with Existing Positions
6 Conclusion
References
Hand Gesture Controlled Contactless Elevator
1 Introduction
2 Literature Survey
3 System Description
4 Methodology
5 Results
6 Conclusion and Future Work
References
Real-Time Hand Tracking and Gesture Recognizing Communication System for Physically Disabled People
1 Introduction
2 Related Work
2.1 Comparative Study of Existing Systems
3 Proposed Work
3.1 Problem Statement Analysis
3.2 Dataset Description
3.3 Design and Methodology of Proposed System
3.4 Frame Extraction and Background Removal
3.5 Feature Extraction Algorithm
3.6 Train CNN(Spatial Features) and Prediction
3.7 İmplementation
4 Result Analysis
5 Conclusion
6 Future Work and Limitations
References
Vision-Based Real Time Vehicle Detection: A Survey
1 Introduction
1.1 Challenges in Vehicle Detection
1.2 Classification of Vision-Based Vehicle Detection Algorithms
2 Literature Survey
2.1 Background Modeling/ Subtraction Based Methods
2.2 Symmetry and Color Based
2.3 Harr and Hog Features Based
2.4 Optical Flow Based
2.5 Histogram Equalization Based
2.6 Vehicle Detection Involving Occlusion
2.7 Contrast Analysis Based
2.8 Deep Learning Based
3 Discussion
3.1 Datasets for Vehicle Detection
3.2 Performance Evaluation Metrics
3.3 Comparison of Algorithms
4 Conclusion and Future Research Directions
References
Performance Comparison of Anomaly Detection Algorithms
1 Introduction
2 Related Work
3 Research Methodology
3.1 Semi-supervised Algorithm for Anomaly Detection
3.2 Unsupervised Algorithms for Anomaly Detection
3.3 Autoencoder (Neural Networks-Based Technique)
4 Evaluation
4.1 Credit Card Dataset
4.2 KDD Cup Dataset
4.3 Stock Market Dataset
5 Anomaly Detection Algorithm Comparison
6 Conclusion and Future Scope
References
Hybrid Model Using Feature Selection and Classifier in Big data Healthcare Analytics
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Dataset
3.2 Data Preprocessing
3.3 Feature Selection
3.4 Feature Selection Based on ANOVA
3.5 Feature Selection Based on Pearson’s Correlation Coefficient
3.6 Feature Selection Based on Mutual Information (Entropy) Gain
3.7 Dataset Splitting
3.8 Classifier
3.9 Performance Assessment
4 Implementation and Result Discussion
5 Conclusions and Future Work
References
Performance Evaluation of Packet Injection and DOS Attack Controller Software (PDACS) Module
1 Introduction
1.1 Motivation
2 Literature Survey
3 Proposed Systems
4 System Implementation
4.1 Setup
4.2 Attack
4.3 Detect
4.4 Prevent
5 Simulation
6 Results
6.1 Performance Evaluation
7 Conclusion
References
SLAP-IoT: A Secure Lightweight Authentication Protocol for IoT Device
1 Introduction
2 Related Work
3 Proposed Mechanism
4 Results
5 Conclusions and Future Work
References
Medical Service Chatbot for Basic Medication
1 Introduction
2 Literature Survey
3 System Description
4 Methodology
5 Results
6 Conclusion
7 Future Scope
References
FPGA Implementation and Comparative Analysis of DES and AES Encryption Algorithms Using Verilog File I/O Operations
1 Introduction
2 Literature Review
3 Overview of DES Encryption
3.1 Description of DES Encryption Operation
3.2 Key Schedule Process
3.3 Decryption Operation
4 Overview of AES Encryption
4.1 Description of AES Encryption Operation
4.2 Key Schedule Process
4.3 Decryption Operation
5 File Operations in Verilog
6 Implementation
7 Results and Discussion
8 Conclusion
References
Smart Lung Cancer Detector Using a Novel Hybrid for Early Detection of Lung Cancer
1 Introduction
2 Literature Review
3 Proposed Approach
4 Results
5 Conclusion
References
An IoT Vision for Dietary Monitoring System and for Health Recommendations
1 Introduction
2 Literature Review
3 Proposed Solution
4 Results
4.1 Selected Sensors
4.2 Chart
5 Conclusion
References
Channel Estimation in MIMO-OFDM and PAPR Reduction
1 Introduction
2 Related Works
3 Method and Approaches
3.1 Channel Estimation
4 PAPR Reduction in OFDM System
4.1 Selective Mapping
4.2 Partial Transmit Sequence
4.3 Clipping and Filtering
5 Results and Analysis
5.1 Channel Estimation
5.2 PAPR Reduction
6 Conclusion
References
A Wearable Infant HealthCare Monitoring and Alerting System Using IOT
1 Introduction
2 Problem Statement
3 Literature Review
4 Proposed Methodology
5 Results and Discussions
6 Conclusion and Future Work
References
Resource Contention and Age of Information in Wireless Sensor Nodes Using Renewal Theory
1 Introduction
2 Related Works
2.1 Problem Description
2.2 Event Processing Scenario for Update Packet Interval
3 Proposed Work
3.1 Resource Contention and Age of Information
4 Results and Discussion
5 Conclusion
References
Investigations on Power-Aware Solutions in Low Power Sensor Networks
1 Introduction
2 Energy Harvesting Techniques
3 Energy Conserving Techniques
4 Conclusions
References
Efficient Certificate-less Signcryption Scheme for Vehicular Ad Hoc Networks
1 Introduction
1.1 Motivation and Contribution
2 Related Work
3 Preliminaries
3.1 System Model
3.2 Design Goals
3.3 Bilinear Pairing
3.4 Complexity Assumptions
4 Proposed Generic Signcryption Scheme
5 Proposed Signcryption Scheme for VANETs
6 Performance Analysis
6.1 Computational Cost
6.2 Communication Cost
7 Conclusion
References
Detection of Attacks Using Multilayer Perceptron Algorithm
1 Introduction
2 Methodology
3 Novel Intelligent Based Ids
3.1 Pre-Processing
3.2 Classification
4 Experimental Work
5 Conclusion
References
IoT-Based Smart Monitoring of online Transformer
1 Introduction
2 Methodology
2.1 Transformer
2.2 Bridge Rectifier
2.3 Filter
2.4 IC Voltage Regulators
2.5 Schematic Explanation
2.6 Current Measurement
2.7 Power Factor Measurement Circuit
2.8 Vibration Sensor
2.9 Level Measurement Using Float
2.10 Oil Level Measurement Circuit
2.11 Earth Leakage Detection
2.12 Thing speak
2.13 The Internet of Things
2.14 Future Scope
3 Conclusion
References
A Hybrid Framework Using the Boosting Technique for Efficient Rain Streak Removal During Daylight
1 Introduction
2 Literature Review
3 Proposed Approach
4 Results
5 Conclusion
References
Detection of DoS and DDoS Attacks Using Hidden Markov Model
1 Introduction
2 Literature Review
2.1 Sub Classes of DNS
2.2 Clustering Algorithms
2.3 Markov Model and Markov Chains
2.4 Hidden Markov Model
3 Proposed Scheme
3.1 Dataset
3.2 Implementation
4 Results and Discussion
4.1 Parameters
4.2 Performance Analysis
5 Conclusion
References
Multimodal Biometric Systems, its Security Issues, Research Challenges and Countermeasures—Technical Review
1 Introduction
2 Components of a Biometrıc System
3 Multimodal Biometric Systems
4 Types of Fusion
5 Machine Learning and Neural Networks in Multimodal Biometrics
6 Feature Reduction Methods
7 Modalities Combined
8 Limitations of Biometric System Causing Threat to the Security
9 Attacks Agaınst Bıometrıc Systems
10 Data Securıty Breach Countermeasures
11 Inference from the Survey
12 Conclusion
References
Diabetes Prediction by Artificial Neural Network
1 Introduction
2 Literature Survey
3 Methodologies
3.1 Sets of Data and Software Tool
3.2 Data Preprocessing
3.3 Iteration of Artificial Neural Network Model
4 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


Inventive Communication and Computationa
✍ G. Ranganathan (editor), George A. Papakostas (editor), Álvaro Rocha (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book gathers selected papers presented at the 7th International Conference on Inventive Communication and Computational Technologies conference (ICICCT 2023), held on May 22–23, 2023, at Gnanamani College of Technology, Tamil Nadu, India. The book covers the topics such as Internet of thi

Inventive Communication and Computationa
✍ G. Ranganathan (editor), George A. Papakostas (editor), Álvaro Rocha (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book gathers selected papers presented at the 7th International Conference on Inventive Communication and Computational Technologies conference (ICICCT 2023), held on May 22–23, 2023, at Gnanamani College of Technology, Tamil Nadu, India. The book covers the topics such as Internet of thi

Inventive Communication and Computationa
✍ G. Ranganathan (editor), George A. Papakostas (editor), Álvaro Rocha (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book gathers selected papers presented at the 7th International Conference on Inventive Communication and Computational Technologies conference (ICICCT 2023), held on May 22–23, 2023, at Gnanamani College of Technology, Tamil Nadu, India. The book covers the topics such as Internet of thi

Inventive Communication and Computationa
✍ G. Ranganathan (editor), Joy Chen (editor), Álvaro Rocha (editor) 📂 Library 📅 2020 🏛 Springer 🌐 English

<p><span>This book gathers selected papers presented at the Inventive Communication and Computational Technologies conference (ICICCT 2019), held on 29–30 April 2019 at Gnanamani College of Technology, Tamil Nadu, India. The respective contributions highlight recent research efforts and advances in

Inventive Computation and Information Te
✍ S. Smys (editor), Valentina Emilia Balas (editor), Ram Palanisamy (editor) 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book is a collection of best selected papers presented at the International Conference on Inventive Computation and Information Technologies (ICICIT 2021), organized during 12–13 August 2021. The book includes papers in the research area of information sciences and communication engineeri

Inventive Computation and Information Te
✍ S. Smys (editor), Valentina Emilia Balas (editor), Khaled A. Kamel (editor), Pav 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book is a collection of best selected papers presented at the International Conference on Inventive Computation and Information Technologies (ICICIT 2020), organized during 24–25 September 2020. The book includes papers in the research area of information sciences and communication engine