𝔖 Scriptorium
✩   LIBER   ✩

📁

IOT with Smart Systems: Proceedings of ICTIS 2022, Volume 2 (Smart Innovation, Systems and Technologies, 312)

✍ Scribed by Jyoti Choudrie (editor), Parikshit Mahalle (editor), Thinagaran Perumal (editor), Amit Joshi (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
791
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✩ Synopsis


This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Sixth International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2022), held in Ahmedabad, India. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.

✩ Table of Contents


Preface
Contents
About the Editors
1 Hand Gesture-Controlled Simulated Mouse Using Computer Vision
1.1 Introduction
1.2 Existing Systems
1.3 Proposed Solution
1.4 Requirements for Proposed System
1.5 Methodology
1.5.1 Video Acquisition
1.5.2 Color Conversions
1.5.3 Noise
1.5.4 Cursor Mapping Using Centroid of Red Part
1.5.5 Perform Different Operations
1.6 Further Development
1.7 Conclusion
References
2 E-Commerce Web Portal Using Full-Stack Open-Source Technologies
2.1 Introduction
2.2 Literature Review
2.3 Technologies Used
2.3.1 Node.js
2.3.2 React.js
2.3.3 Express.js
2.3.4 MongoDB
2.4 Proposed System
2.5 Conclusion
References
3 Design of a QoS-Aware Machine Learning Model for High Trust Communications in Wireless Networks
3.1 Introduction
3.2 Literature Review
3.3 Proposed QoS-Aware Machine Learning Model for High Trust Communications in Wireless Networks (QAMLHT)
3.4 Statistical Analysis
3.5 Conclusion and Future Scope
References
4 Application of Machine Learning in Mineral Mapping Using Remote Sensing
4.1 Background
4.2 Related Work
4.3 Geospatial Analysis Using Machine Learning
4.4 Conclusion
References
5 An Improved Energy Conservation Routing Mechanism in Heterogeneous Wireless Sensor Networks
5.1 Introduction
5.2 Related Work
5.3 Proposed Work
5.4 Simulation Results
5.4.1 Stability Period
5.4.2 Dead Nodes Verse the Round Numbers
5.4.3 Throughput
5.4.4 Alive Nodes Versus Round
5.4.5 Instability Period
5.5 Conclusion
References
6 Prediction of COVID-19 Severity Using Patient’s PHR
6.1 Introduction
6.2 Methodology
6.3 Implementation
6.3.1 Data Sets
6.3.2 Code Conventions
6.4 Results and Discussion
6.5 Conclusion
6.5.1 Future Enhancement
References
7 A Survey on Crop Rotation Using Machine Learning and IoT
7.1 Introduction
7.2 Background
7.2.1 Internet of Things
7.2.2 Machine Learning
7.2.3 Crop Rotation
7.3 Literature Survey
7.4 Proposed System
7.5 Conclusion and Future Scope
References
8 Survey of Consumer Purchase Intentions of Live Stream in the Digital Economy
8.1 Introduction
8.2 Literature Review
8.2.1 Contract
8.2.2 Brand Loyalty
8.2.3 Cognitive Value
8.2.4 Emotion
8.2.5 Consumer Behavior Theory
8.3 Research Design
8.3.1 Research Design
8.4 Data Analysis and Findings
8.5 Conclusions and Future Research
References
10 Leveraging Block Chain Concept: Service Delivery Acceleration in Post-pandemic Times
10.1 Background
10.2 IT Service Delivery—Current Scenario
10.3 Services—A Perspective
10.4 Identity and Access Management in Service Delivery
10.5 Opportunities to Leverage—Barriers and Bridges
10.6 Creating Information Block
10.7 Implementation Plan
10.8 Conclusion
References
11 An Effective Computing Approach for Damaged Crop Analysis in Chhattisgarh
11.1 Introduction
11.2 Factors Affecting crop
11.2.1 Rainfall
11.2.2 Soil
11.2.3 Groundwater
11.2.4 E-Waste
11.3 Methodology
11.4 Conclusion
References
12 An Improve Approach in Core Point Detection for Secure Fingerprint Authentication System
12.1 Introduction
12.2 Related Work
12.3 Proposed Research Work
12.4 Implementation and Result Discussion
12.5 Conclusion and Future Work
References
13 Investigating i-Vector Framework for Speaker Verification in Wild Conditions
13.1 Introduction
13.2 Background
13.2.1 i-Vectors
13.2.2 Cosine Similarity Score
13.3 Proposed Methodology
13.4 Experimental Setup
13.4.1 Database Formation
13.4.2 Implementation
13.5 Results and Discussion
13.6 Conclusions
References
14 Application of Deep Learning for COVID Twitter Sentimental Analysis Towards Mental Depression
14.1 Introduction
14.2 Literature Review
14.2.1 Sentimental Analysis Using Machine Learning
14.2.2 Deep Learning for Sentimental Analysis
14.3 COVID Tweet Sentimental Analysis Using Deep Learning
14.4 Implementation Results and Analysis
14.4.1 Comparative Analysis of Deep Learning Models
14.4.2 Post Lockdown Tweet Analysis
14.5 Conclusion and Future Work
References
15 A Blockchain Solution for Secure Health Record Access with Enhanced Encryption Levels and Improvised Consensus Verification
15.1 Introduction
15.1.1 Contributions
15.2 Literature Review
15.3 Security and Privacy Challenges in Healthcare Systems
15.4 Overview of Encryption and Consensus in Blockchain
15.4.1 Consensus
15.4.2 Encryption and Hashing
15.5 Proposed Solution: Blockchain-Based Patient Health Record (BB-PHR) System
15.5.1 System Design
15.5.2 Mapping Among Entities
15.6 Improvised Encryption and Consensus Mechanism
15.6.1 Enhanced Encryption Level
15.6.2 Improvised Consensus Verification
15.6.3 Algorithm
15.7 Conclusion
References
16 Addressing Item Cold Start Problem in Collaborative Filtering-Based Recommender Systems Using Auxiliary Information
16.1 Introduction
16.2 Literature Review
16.3 Proposed Approach
16.4 Experimental Analysis
16.4.1 Dataset and Evaluation Metrics
16.4.2 Experimental Setup and Result Analysis
16.5 Conclusion and Future Work
References
17 Research on the College English Blended Teaching Model Design and Implementation Based on the “Internet + Education”
17.1 Introduction
17.2 Literature Review
17.2.1 “Internet + Education”
17.2.2 Blended Teaching
17.3 Blended Teaching Model Design
17.3.1 Needs Analysis
17.3.2 Learning Objectives
17.3.3 Online Resources
17.3.4 Learning Guide
17.4 Blended Teaching Model Implementation
17.4.1 The Unit Case
17.4.2 Integration of Teaching Methods
17.4.3 Multidimensional Interaction
17.5 Conclusion
References
18 Qualitative Analysis of SQL and NoSQL Database with an Emphasis on Performance
18.1 Introduction
18.2 Literature Review
18.3 NoSQL Database
18.3.1 Key-Value Store
18.3.2 Graph Store Database
18.3.3 Wide Column Store Databases
18.3.4 Document Store Database
18.4 Feature Comparison of Relational Database and NoSQL Database
18.4.1 Flexibility
18.4.2 Scalability
18.4.3 Availability
18.4.4 Performance
18.5 Qualitative Comparison of SQL and Different NoSQL Databases
18.6 Conclusion and Future Scope
References
19 A Rule-Based Sentiment Analysis of WhatsApp Reviews in Telugu Language
19.1 Introduction
19.1.1 Background
19.1.2 Problem Statement
19.1.3 Aims and Objectives
19.2 Related Work
19.3 Data and Methods
19.3.1 Data Extraction
19.3.2 Data Pre-processing
19.4 Sentiment Analysis
19.4.1 Rule-Based Methodologies
19.4.2 Using the Polarities to Train the Data
19.5 Results and Discussion
19.5.1 Evaluation Metrics
19.5.2 Results
19.6 Conclusion and Future Work
19.6.1 Conclusion
19.6.2 Future Work
References
20 Face Model Generation Using Deep Learning
20.1 Introduction
20.2 Related Work
20.3 Proposed System Design
20.3.1 Generator
20.3.2 Discriminator
20.4 Implementation
20.4.1 Data Loader
20.4.2 Discriminator Network
20.4.3 Generator Network
20.4.4 Training
20.5 Results and Discussion
20.5.1 Training Losses
20.5.2 Generated Images
20.6 Conclusion and Future Scope
References
21 Pipeline for Pre-processing of Audio Data
21.1 Introduction
21.2 Literature Survey
21.3 Proposed Work
21.3.1 Load Audio Files
21.3.2 Padding the Audio Files
21.3.3 Extract Spectrogram
21.3.4 Normalization
21.3.5 Saving the Results
21.3.6 Pre-processing Pipeline
21.4 Results
21.5 Conclusions
References
22 Classification on Alzheimer’s Disease MRI Images with VGG-16 and VGG-19
22.1 Introduction
22.1.1 Alzheimer’s Disease Neuroimaging Initiative (ADNI)
22.2 Materials and Methods
22.2.1 Data Acquisition
22.2.2 Data set Preparation
22.2.3 Data Augmentation
22.2.4 VGG Concept
22.2.5 VGG-16
22.2.6 VGG-19
22.3 Results
22.4 Conclusion
References
23 Combining Variable Neighborhood Search and Constraint Programming for Solving the Dial-A-Ride Problem
23.1 Introduction
23.2 Methodology
23.2.1 Variable Neighborhood Search
23.2.2 Constraint Satisfaction Problems and Constraint Programming
23.3 Results
23.4 Discussion and Conclusion
References
24 Decentralization of Traditional Systems Using Blockchain
24.1 Introduction
24.2 Blockchain Security
24.2.1 Security Attacks
24.3 Applications of Blockchain
24.4 Conclusion and Future Trends
References
25 Design of a Secure and Smart Healthcare IoT with Blockchain: A Review
25.1 Introduction
25.1.1 Motivation
25.1.2 Organization
25.2 Background
25.3 Literary Survey
25.4 Conclusion and Future Work
References
26 Detecting Deceptive News in Social Media Using Supervised Machine Learning Techniques
26.1 Introduction
26.2 Literature Survey
26.3 Proposed Methodology
26.4 Selection of Machine Learning Techniques
26.5 Experimental Work
26.6 Conclusions and Future Directions
References
27 4G Communication Radiation Effects on Propagation of an Economically Important Crop of Eggplant (Solanum melongena L.)
27.1 Introduction
27.2 Experimental Setup
27.2.1 Determination of Seed Germination and Preparation of Planting Material
27.2.2 Physiological Analysis
27.2.3 Biochemical Analysis
27.3 Result and Discussion
27.3.1 Physiological Alterations
27.3.2 Biochemical Analysis
27.4 Conclusion
References
28 Annadata: An Interactive and Predictive Web-Based Farmer's Portal
28.1 Introduction
28.2 Literature Survey
28.3 Methodology and Functionality
28.4 System Architecture
28.5 Conclusion
References
29 A Survey on Privacy Preserving Voting Scheme Based on Blockchain Technology
29.1 Introduction
29.1.1 Features of Blockchain Technology
29.1.2 Applications of Blockchain Technology
29.2 Related Work
29.3 Blockchain Technology
29.3.1 Voting Process
29.3.2 Algorithm—Blockchain Technology
29.4 Conclusion
References
30 A Survey on Detecting and Preventing Hateful Comments on Social Media Using Deep Learning
30.1 Introduction
30.2 Related Works
30.3 Existing Methodologies
30.3.1 Keyword-Based Approaches
30.3.2 Machine Learning Categorization
30.4 Proposed Methodologies
30.5 Conclusion
References
31 Anomaly Detection for Bank Security Against Theft—A Survey
31.1 Introduction
31.2 Related Work
31.3 Video Surveillance System
31.3.1 Face Recognition Approaches
31.3.2 Challenges
31.4 Conclusion
References
32 A Framework of a User Interface Covid-19 Diagnosis Model
32.1 Introduction
32.2 Related Work
32.3 Design and Methodology
32.4 Conclusion and Future Work
References
33 Priority Queue-Based Framework for Allocation of High Performance Computing Resources
33.1 Introduction
33.2 Virtualization and Containers
33.3 Priority Queue-Based Framework
33.3.1 Proposed Approach
33.3.2 Implementation
33.4 Evaluation Methodology
33.4.1 Experimental Test Bed
33.4.2 Benchmarks and Applications
33.5 Results and Discussion
33.6 Conclusion
References
34 A Novel Hysynset-Based Topic Modeling Approach for Marathi Language
Abstract
34.1 Introduction
34.2 Literature Review
34.3 Research Methodology
34.3.1 Data collection and corpus construction
34.3.2 Preprocessing Corpus
34.3.3 Constructing VSMM and HSVSMM
34.3.4 Intrinsic Evaluation of Model
34.3.5 Constructing the Unsupervised Model
34.3.6 Visualization and Validation of Results
34.4 Results and Discussions
34.5 Conclusions
References
35 Identification of Malayalam Stop-Words, Stop-Stems and Stop-Lemmas Using NLP
35.1 Introduction
35.2 Literature Review
35.3 Research Methodology
35.3.1 Data Collection
35.3.2 Stop-Words List Generation
35.3.3 Stemming
35.3.4 Lemmatization
35.4 Results and Discussions
35.5 Conclusions and Future Work
References
36 Face Recognition-Based Automatic Attendance System
36.1 Introduction
36.2 Motivation
36.3 Existing Systems
36.4 Libraries Used
36.5 Proposed System
36.6 Four Stages of Project
36.6.1 Dataset Creation
36.6.2 System Requirements
36.6.3 Software Design
36.6.4 Algorithm
36.6.5 Face Detection
36.6.6 Face Recognition
36.6.7 Attendance Updation
36.7 Literature Review
36.8 Conclusion and Future Work
References
37 Soft Computing-Based Approach for Face Recognition on Plastic Surgery and Skin Colour-Based Scenarios Using CNN
37.1 Introduction
37.2 Related Work
37.3 Methodology
37.3.1 Recognition of Face Based on Skin Colour Using CNN
37.3.2 Face Recognition
37.3.3 Recognition of Face from Plastic Surgery
37.4 Results
37.4.1 Based on Skin Colour
37.4.2 Based on Plastic Surgery
37.5 Conclusion
References
38 Text-to-Speech Synthesis of Indian Languages with Prosody Generation for Blind Persons
38.1 Introduction
38.2 Related Background
38.3 System Methodology
38.3.1 Converting Text Input to Speech
38.3.2 Speech Engine
38.4 Results and Discussion
38.5 Conclusion
References
39 Microservices in IoT Middleware Architectures: Architecture, Trends, and Challenges
39.1 Introduction
39.2 IoT Middlewares Requirements and Microservices
39.3 Microservice-Based IoT Middleware Architectures
39.4 Conclusion
References
40 Sustainability of Green Buildings and Comparing Different Rating Agencies
40.1 Introduction
40.2 Literature Review
40.3 Sustainability in Green Buildings
40.4 Energy-Reduction and Renewable Energy Use
40.5 Various Green Building Assessment Techniques
40.6 Conclusion
References
41 On Product of Doubt ψ - Ǭ - Fuzzy Subgroup
41.1 Introduction
41.2 Preliminaries
41.3 Product of Doubt ψ - Ǭ - Fuzzy Subgroups and a Normal Subgroups
41.4 Conclusion
References
42 A Nobel Approach to Identify the Rainfall Prediction Using Deep Convolutional Neural Networks Algorithm
42.1 Introduction
42.1.1 Machine Learning Techniques
42.2 Related Work
42.2.1 Loophole of Existing Solutions
42.3 Proposed Methodology
42.3.1 Collection of Data
42.3.2 Preprocessing of Data
42.3.3 Data Visualization
42.3.4 Model Training
42.3.5 Testing Dataset and Evaluation of Model
42.4 Experimental Results and Equations
42.5 Conclusion and Future Scope
References
43 Disaster Preparedness Using Augmented Reality/Virtual Reality
43.1 Introduction
43.2 AR/VR Trends in India (Examples)
43.3 Objective
43.4 Literature Survey
43.5 Prototype Details
43.5.1 Case Study
43.6 Advantages and Disadvantages
43.7 Limitations
43.8 Impact of Study
43.9 Conclusion
References
44 A Proposed Blockchain-Based Model for Online Social Network to Detect Suspicious Accounts
44.1 Introduction
44.2 Background and Related Work
44.3 Research Issues
44.4 Problem Statement
44.5 Research Objective
44.6 Proposed Research Model
44.7 Conclusion
References
45 Journal on Delivery Management Platform
45.1 Introduction
45.1.1 Domain Introduction
45.1.2 Delivery Management and Its Importance
45.1.3 Advantages of Efficient Delivery Management
45.2 Modules
45.2.1 Customer
45.2.2 Driver/Delivery Partner
45.2.3 Administrator/Admin
45.3 Related Works
45.4 Proposed System
45.4.1 Difference Between Existing System and Proposed System
45.4.2 Proposed Methodology
45.4.3 Architectural Diagram
45.5 Conclusion
References
46 A Comparative Study of Gene Expression Data-Based Intelligent Methods for Cancer Subtype Detection
46.1 Introduction
46.2 Gene Expression-Based Intelligent Cancer Detection Methods
46.2.1 Dimensionality Reduction and Clustering
46.2.2 ML-Based Cancer Detection
46.2.3 DL-Based Cancer Detection
46.3 Comparative Investigations and Discussions
46.3.1 Database Details
46.3.2 Performance Assessment Metrics
46.3.3 Comparison of Gene Expression-Based Intelligent Cancer Detection Methods
46.3.4 Future Research Work
46.4 Conclusions
References
47 Analysis of Visual Descriptors for Detecting Image Forgery
47.1 Introduction
47.2 Related Work
47.3 Workflow for Image Forgery Detection Using CNN
47.4 Pre-processing
47.4.1 Image Feature Extraction
47.5 Experimental Results
47.5.1 Comparison with Other Methods
47.5.2 Ensemble of Networks
47.6 Conclusion
References
48 Analysis of EEG Signals Using Machine Learning for Prediction and Detection of Stress
48.1 Introduction
48.2 Summary of Literature Survey
48.3 The Proposed System
48.4 Methodology
48.4.1 Dataset
48.4.2 Pre-processing
48.4.3 Feature Extraction
48.4.4 Classification
48.5 Experimental Results
48.6 Conclusion
References
49 Crop Decision Using Various Machine Learning Classification Algorithms
49.1 Introduction
49.2 Methodology
49.2.1 Software Used: WEKA
49.2.2 General Process of Building Model
49.2.3 Machine Learning Algorithms
49.3 Results and Analysis
49.3.1 Accuracy Parameter
49.4 Conclusion
References
50 Time-Delay Compensator Design and Its Applications in Process Control—A Review
50.1 Introduction
50.2 Literature Survey
50.3 Conclusion
References
51 Smart and Safety Traffic System for the Vehicles on the Road
51.1 Introduction
51.2 Related Work
51.3 Proposed Model
51.3.1 Blind Spot Detection and Warning in Cars
51.3.2 Automatic Traffic Signal Control for Ambulance
51.3.3 Traffic Signal Violation Detection
51.4 Results and Discussions
51.5 Conclusion
References
52 Automated System for Management of Hardware Equipment in Colleges
52.1 Introduction
52.2 Overview
52.2.1 Problem Statement
52.2.2 Motivation
52.2.3 Objectives
52.3 Literature Survey
52.4 Proposed Design
52.4.1 Introduction
52.4.2 Architecture and Framework
52.4.3 Process Design
52.4.4 App Flow
52.5 Result
52.6 Scope of the Project
52.7 Conclusion
References
53 Smart Student Attendance System Based on Facial Recognition and Machine Learning
53.1 Introduction
53.1.1 Motivation
53.2 Related Work
53.2.1 Challenges of Existing System
53.3 Proposed System
53.3.1 Advantages of Proposed System
53.4 System Working
53.5 Module Description
53.5.1 Administrator Module
53.5.2 Staffs Module
53.6 Results
53.6.1 Training an Algorithm
53.6.2 Recognition and Attendance
53.6.3 Performance Analysis of Proposed System
53.6.4 Performance Evaluation with Different Algorithms
53.6.5 Complexity Evaluation
53.7 Conclusion
53.8 Scope for Future Development
References
54 Detecting Zeus Malware Network Traffic Using the Random Forest Algorithm with Both a Manual and Automated Feature Selection Process
54.1 Introduction
54.1.1 Introduction to Zeus
54.2 Related Work
54.2.1 Botnet Detection Using C4.5 and CFS
54.2.2 Host-Based Detection of Bot C&C Traffic
54.3 Methodology, Training, and Evaluation
54.3.1 Introduction and Research Proposal
54.3.2 Research Approach
54.3.3 Data Collection and Preparation
54.3.4 Feature Selection Process
54.3.5 Training and Testing RF Using the Wrapper Approach
54.3.6 Training/Testing RF Using ANOVA
54.3.7 Evaluation and Conclusions
54.3.8 Future Work
References
55 Intelligent Classification of Documents Based on Critique Points from Relevant Web Scrapped Content
55.1 Introduction
55.2 Literature Review
55.2.1 Pure Work Done
55.2.2 Applied Work Done
55.3 Proposed Model
55.4 Experiments
55.4.1 Web Scrapping and Data Collection
55.4.2 Development of Classification Model
55.5 Results and Discussion
55.6 Conclusion and Future Scope
References
56 Survey on Convolutional Neural Networks-Based Object Detection Methods
56.1 Introduction
56.2 Literature Review
56.2.1 Based on Data Labelling
56.2.2 Based on Data Augmentation
56.2.3 Based on Feature Extraction
56.2.4 Based on Bounding Box
56.2.5 Based on Loss Functions
56.2.6 Based on Completely Novel Approach
56.2.7 Based on Salient Object Detection
56.3 Data Sets
56.3.1 MS-COCO
56.3.2 Pascal VOC
56.3.3 ImageNet
56.3.4 Comik2k
56.3.5 Watercolor2k
56.3.6 Clipart2k
56.3.7 Caltech101
56.3.8 CrowdHuman
56.3.9 WHU-RSONE
56.3.10 MSRA-B
56.3.11 ECSSD
56.3.12 HKU-IS
56.3.13 DUTS
56.3.14 DUT-OMRON
56.4 Tabular Comparison
56.5 Benefits
56.6 Conclusion
56.7 Future Work
References
57 Implementation of Threats Detection Modeling with Deep Learning in IoT Botnet Attack Environment
57.1 Introduction
57.2 Materials, Method and Experimental Approach
57.2.1 Digital Forensics Analysis: Finding the Vulnerabilities of Overall System
57.2.2 Feature Extraction
57.2.3 Training and Testing Phase
57.3 Results
57.4 Conclusion
57.5 Future Scope
References
58 Performance Prediction Using Support Vector Machine Kernel Functions and Course Feedback Survey Data
58.1 Introduction
58.2 Support Vector Machines (SVM)
58.3 Dataset and Attributes
58.4 Methodology
58.5 Experimental Result and Analysis
58.6 Conclusion
References
59 Car Type and License Plate Detection Based on YOLOv4 with Darknet Framework (CTLPD)
59.1 Introduction
59.2 Motivation
59.3 Contributions
59.4 Related Work
59.4.1 Object Detection Methods
59.4.2 Character Recognition Methods
59.5 Proposed System
59.5.1 Car Detection and Car Categorization
59.5.2 License Plate Detection
59.5.3 Character Recognition
59.5.4 Dataset
59.6 Results
59.6.1 Car Detection and Categorization Results
59.6.2 License Plate Detection and Recognition Results
59.7 Conclusion
59.8 Future Work
References
60 Dynamic Search and Integration of Web Services
60.1 Introduction
60.2 Literature Review
60.3 Dynamic Search and Integration of the Web Services
60.4 Selection of Suitable Integration Plan
60.5 Results
60.5.1 Links of Online Available Web Services for Different User Requests
60.5.2 Results of Currency? WSDL After WSDL Processing
60.5.3 Support and Confidence of Search Results
60.5.4 Multiple Composition Plans
60.6 Conclusions
References
61 SAMPANN: Automated System for Pension Disbursal in India (Case Study: BSNL VRS Pension Disbursal)
61.1 Introduction
61.2 Research Methodology
61.3 SAMPANN—System for Accounting and Management of Pension
61.4 Technology Platform and Business Architecture
61.5 Benefits to Pensioners
61.5.1 e-PPO
61.6 Online Grievance Redressal
61.6.1 Grievances Settled Through SAMPANN
61.7 Pensioner’s Dashboard
61.7.1 Informative Pension Settlement and Disbursal
61.7.2 Timely SMS Alerts to Pensioners
61.7.3 Income Tax-Related Facilities to Pensioners
61.8 Benefits to CCA Offices
61.9 Cost Saving
61.10 Disbursement of Pension
61.10.1 Digitization of Pension Settlement
61.10.2 Data Generation and Upkeep
61.10.3 Reconciliation, Monitoring, and Assessment
61.10.4 Inter-Circle Transfer of Pension Cases
61.10.5 Accountable Grievance Redressal
61.10.6 Empowering Pensioners
61.11 Manpower Optimization
61.12 BSNL VRS 2019—Case Study
61.13 Conclusion
Bibliography
62 FOG Computing: Recent Trends and Future Challenges
62.1 Introduction
62.2 The Role of FOG Computing
62.2.1 Fog Computing's Role in the Internet of Things (IoT)
62.2.2 Fog Computing’s Role in Data Center
62.3 The FOG Implementation
62.4 Securing Clouds with FOG
62.5 FOG Computing Application Domains
62.5.1 Smart Grids
62.5.2 Connected Vehicle
62.5.3 Smart Traffic Lights
62.6 FOG Computing Characteristics the FOG Implementation
62.7 Literature Survey
62.8 Conclusion
62.9 Future Work
References
63 Study of Fake News Detection Techniques Using Machine Learning
63.1 Introduction
63.2 Related Works
63.3 Fake News Detection
63.3.1 Liar Dataset
63.3.2 Feature Extraction
63.3.3 Classifiers
63.4 Methodology
63.5 Performance Metrics
63.6 Results
63.6.1 Key Observations
63.6.2 Discussion
63.7 Conclusion
References
64 Identification of Skin Diseases Using Deep Learning Architecture
64.1 Introduction
64.2 Literature Survey
64.3 Pre-requirements
64.3.1 Dataset
64.3.2 Interface
64.4 Implementation
64.4.1 Architecture
64.4.2 Optimizers
64.4.3 Loss Function
64.5 Results
64.6 Conclusion
References
65 IoT-Based Saline Controlling System
65.1 Introduction
65.2 Proposed System
65.3 Conclusion
References
66 In-situ Measurement in Water Quality Status—Udalka Uttarakhand, India
66.1 Introduction
66.2 Study Area
66.3 Methodology and Results
66.4 Pathway for Development
66.4.1 Treatment System
66.4.2 Pathway for Development: Quality Monitoring System
66.5 Discussion and Conclusion
References
67 Implementing AI-Based Comprehensive Web Framework for Tourism
67.1 Introduction
67.2 Literature Review
67.3 Proposed System
67.3.1 Technology Stack
67.3.2 Architecture
67.3.3 Principle Working of the System
67.3.4 Obstacles
67.4 Technical Methodology
67.4.1 Bias Removal Method by Joshua C. [15].
67.5 Conclusion
67.6 Future Scope
References
68 Smart Water Resource Management by Analyzing the Soil Structure and Moisture Using Deep Learning
68.1 Introduction
68.2 Literature Survey
68.3 Proposed Work
68.3.1 Overview
68.3.2 Dataset Details
68.4 Result Analysis
68.5 Conclusion
68.6 Future Scope
References
69 The Assessment of Challenges and Sustainable Method of Improving the Quality of Water and Sanitation at Deurbal, Chhattisgarh
69.1 Introduction
69.2 Study Area
69.3 Methodology
69.3.1 Participatory Rural Appraisal
69.3.2 Human Centered Design
69.4 Results and Discussion
69.4.1 Study Outcomes
69.4.2 Proposed Solution
69.5 Conclusion
References
70 Design of Social Distance Monitoring Approach Using Wearable Smart Tags in 5G IoT Environment During Pandemic Conditions
70.1 Introduction
70.2 Social Distance Approach in Preventing COVID-19
70.3 Materials and Methods
70.3.1 Sensors and Modules
70.3.2 IoT Domain Model for Social Distance Monitoring
70.4 Proposed IoT-Based Smart Wearable Tags
70.5 Proposed IoT-Based Smart Wearable Tags
70.6 Conclusion
References
71 Smart Congestion Control and Path Scheduling in MPTCP
71.1 Introduction
71.2 Background
71.2.1 MPTCP and TCP
71.2.2 Congestion Control in MPTCP
71.2.3 Heterogeneity Constraint in Transport Layer Protocol
71.2.4 Path Scheduling in MPTCP
71.2.5 Automated Learning Schedulers
71.3 Related Work and Motivation
71.4 Conclusion and Future Work
References
72 Internet of Things-Enabled Diabetic Retinopathy Classification from Fundus Images
72.1 Introduction
72.2 Literature Review
72.3 Research Gap Analysis
72.4 Methodology
72.5 Conclusion and Future Work
References
73 Open Research Issues of Battery Usage for Electric Vehicles
73.1 Introduction
73.2 Related Work
73.3 Methodology
73.4 Solutions
73.5 Conclusion and Future Work
References
74 Comparative Cost Analysis of On-Chain and Off-Chain Immutable Data Storage Using Blockchain for Healthcare Data
74.1 Introduction
74.2 Related Work
74.3 Methodology
74.3.1 Understanding Blockchain Distinction by Accessibility
74.3.2 Understanding Blockchain Distinction by Storage
74.4 Results
74.5 Conclusions and Future Work
References
75 Analysis of Various Toxic Gas Levels Using 5G ML-IoT for Air Quality Monitoring and Forecasting
75.1 Introduction
75.2 Materials and Analysis Methods
75.2.1 Sensors
75.2.2 Need for Assessing NO2 CO, SO2, and O3 Gas Status in India
75.2.3 Model Layers for the Proposed ML Empowered IoT-Based Air Quality Monitoring and Forecasting Techniques
75.3 Proposed Methodology and Its Function
75.4 Results and Discussion
75.5 Conclusion
References
Author Index


📜 SIMILAR VOLUMES


IOT with Smart Systems: Proceedings of I
✍ Tomonobu Senjyu (editor), Parakshit Mahalle (editor), Thinagaran Perumal (editor 📂 Library 📅 2022 🏛 Springer 🌐 English

<span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fifth International Conference on Informat

IOT with Smart Systems: Proceedings of I
✍ Tomonobu Senjyu (editor), Parakshit Mahalle (editor), Thinagaran Perumal (editor 📂 Library 📅 2022 🏛 Springer 🌐 English

This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fifth International Conference on Information an

ICT with Intelligent Applications: Proce
✍ Tomonobu Senjyu (editor), Parikshit N. Mahalle (editor), Thinagaran Perumal (edi 📂 Library 📅 2021 🏛 Springer 🌐 English

<span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fifth International Conference on Informat

ICT for Intelligent Systems: Proceedings
✍ Jyoti Choudrie (editor), Parikshit N. Mahalle (editor), Thinagaran Perumal (edit 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Seventh International Conference on Inf

Marketing and Smart Technologies: Procee
✍ JosĂ© LuĂ­s Reis (editor), Marisa Del Rio Araujo (editor), LuĂ­s Paulo Reis (editor 📂 Library 📅 2023 🏛 Springer 🌐 English

<span>This book includes selected papers presented at the International Conference on Marketing and Technologies (ICMarkTech 2022), held at Universidade de Santiago de Compostela, Spain, during 1 – 3 December 2022. It covers up-to-date cutting-edge research on artificial intelligence applied in mark