<p><span>This book gathers high-quality papers presented at the Sixth International Conference on Smart Trends in Computing and Communications (SmartCom 2022), organized by Global Knowledge Research Foundation (GR Foundation) in partnership with IFIP InterYIT during January 11â12, 2022. It covers th
Smart Trends in Computing and Communications: Proceedings of SmartCom 2021
â Scribed by Yu-Dong Zhang, Tomonobu Senjyu, Chakchai So-In, Amit Joshi
- Publisher
- Springer
- Year
- 2021
- Tongue
- English
- Leaves
- 751
- Series
- Lecture Notes in Networks and Systems
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
⌠Synopsis
This book gathers high-quality papers presented at the Fifth International Conference on Smart Trends in Computing and Communications (SmartCom 2021), organized by Global Knowledge Research Foundation (GR Foundation) from March 2 â 3 , 2021. It covers the state of the art and emerging topics in information, computer communications, and effective strategies for their use in engineering and managerial applications. It also explores and discusses the latest technological advances in, and future directions for, information and knowledge computing and its applications.
⌠Table of Contents
Preface
Contents
Editors and Contributors
Influencing User Intention of Plant-Based Sensing System Adoption in Public Vocational High Schools of Indonesia Using TAM
1 Introduction
2 Literature Review
2.1 The Plant-Based Sensing System Proposed
2.2 The Theory of Technology Acceptance Model
3 Methodology
4 Research Model and Hypothesis
4.1 External Variable of Model
4.2 Perceived Ease of Use, Perceived Usefulness, Attitude, and Behavioral Intention
5 Results
5.1 Reliability Analysis
5.2 Regression Analysis
6 Conclusion
References
An Empirical Study of Critical Success Factors for the Adoption of m-Government Services in Tanzania
1 Introduction
2 Literature Review and Hypothesis Development
2.1 m-Government Services in Tanzania
2.2 Mobile Services Acceptance Model (MSAM)
2.3 Hypotheses Development
3 Methodology
4 Findings
5 Discussion
6 Conclusion
References
Smart City Based on LoRaWAN: Coverage Study for Cusco Urban Area
1 Introduction
2 LoRaWAN Technology
3 Cusco Urban Area Coverage Simulation
4 Data Collection
5 Analysis of Experimental Measurements
5.1 Efficiency Analysis for SF12
5.2 RSSI Analysis for SF12
5.3 Efficiency and RSSI Analysis for SF7
6 Conclusion
References
Digital Transformation in Education in Knowledge Society
1 Introduction
1.1 Basic Considerations
2 Materials and Methods
3 Results
4 Conclusion
References
Induction Motor Overload Recognition Based on Sound Analysis
1 Introduction
2 Related Works
3 The Corpus
4 The Experiments
4.1 Frame-by-Frame Classification
4.2 One-Second Segment Classification
4.3 Half-a-Second Segment Classification
4.4 The Selected Classifier
5 Conclusions
References
Simulation of an All-Terrain Vehicle Driving Experience Using Virtual Reality
1 Introduction
2 Materials and Methods
2.1 Conception of the Virtual Experience
2.2 Learning Programming Tools
2.3 Virtual Environment Validation
2.4 Conception of the Immersive Environment
3 Results
4 Discussion
5 Conclusions and Recommendations
References
Safety-Centric and Smart Outdoor Workplace: A New Research Direction and Its Technical Challenges
1 Introduction
2 The Need of Dedicated Focus on Smart Outdoor Workplace
2.1 Smart Workplace
2.2 Smart Outdoor Workplace
2.3 Divergent Technology Streams
3 Technical Challenges
3.1 Diverse and Incompatible Sensors and Devices
3.2 Growing Gap Between Battery Technologies and Power Requirements
4 Research Prospects Driven by the Identified Challenges
4.1 Sandwich Approach to a Knowledge Architecture for Smart Outdoor Workplace
4.2 Model-Driven Simulation and Optimization of Energy Consumption in Smart Outdoor Workplace
5 Conclusions and Future Work
References
Devising Auxiliary Glyph Schemas Combined with XOR Filters for Improvised Font Delivery and Reliable Dynamic Font Augmentation
1 Introduction
2 Background and Related Work
3 Methodology and Algorithm
3.1 Basic Font Subsetting Solution and Problems
3.2 Client Side: Proposed Data Structures
3.3 Font Subsetting and Augmentation Workflows Using Proposed Solution
3.4 Flow for an Application Session with the Proposed Solution
3.5 XOR Filter Processing for Subset or Font Portion Serving on Server Side
4 Conclusion
References
Multiple Sequence Alignment Algorithms in Bioinformatics
1 Introduction
2 Multiple Sequence Alignment (MSA)
3 Multiple Sequence Alignment Algorithms (MSA)
3.1 ClustalW
3.2 Clustal Omega
3.3 TâCoffee
3.4 MAFFT
3.5 Kalign
3.6 MUSCLE
3.7 Probcons
3.8 Genetic Algorithms
4 Evaluation of MSA
5 Conclusion
References
Design and Implementation of a Machine Learning-Based Technique to Detect Unipolar and Bipolar Depression Using Motor Activity Data
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Discussion
6 Conclusion
References
Underwater Magnetic Release System
1 Overview
2 System Components
2.1 The Software
3 Power Considerations
4 Design Specifics
5 Conclusion
References
An Optimal Route for People with Ambulant Disabilities Using Mathematical Risk Modeling and Analytic Hierarchy Process
1 Introduction
2 Methods
2.1 Factors Affecting the Selection of Best Route
2.2 Mathematical Risk Modeling
2.3 AHP Technique
3 Results and Discussion
4 Conclusion
References
The Innovation in Manufacturing Areas of Electronics Industry of Mexicali Using PLC
1 Introduction
2 Technological Innovation
3 Technology Development
4 Improving Competitiveness
5 Software Quality in the Electronics Industry
6 Limitations of the Investigation
7 Methodology
8 Results
9 PLC Analysis
10 Correlation Analysis of Industrial Parameters
11 Conclusions
References
Assistive Autonomous Electric Vehicle for Disaster Management
1 Introduction
2 Mechanical System Design
2.1 Overview
2.2 Frame Design
2.3 Assembly for the Wheels
2.4 Sensors Stand
2.5 Body Housing
3 Electronics System Design
3.1 Brief Overview
3.2 Electronic Suite Description
4 Working of the Circuit
5 Software and Control System
5.1 Brief Overview
5.2 Main Software Pipeline
5.3 Lane Detection and Path Mapping
5.4 Object Discovery Pipeline
5.5 Arduino Communication
5.6 Motor Driving
6 Advantage and Applications
6.1 Advantages
6.2 Applications
7 Conclusion
References
On the Existing and New Potential Methods for Partial Discharge Source Monitoring in Electrical Power Grids
1 Introduction
2 Theoretical Aspects
2.1 Spectrogram
2.2 Wavelet Transform
2.3 Compressive Sensing
2.4 Phase-Diagram-Based Analysis
3 Experimental Configuration and Results
4 Conclusions
References
Efficient Approach for Block-Based Copy-Move Forgery Detection
1 Introduction
2 Related Works
3 Proposed Method
4 Experimental Results
5 Discussion and Conclusion
References
Smart IoT Sensor Network for Monitoring of Cultural Heritage Monuments
1 Introduction
2 Sensor Design
3 Visualization Platform
4 Conclusions
References
MorArch: A Software Architecture for Interoperability to Improve the Communication in the Edge Layer of a Smart IoT Ecosystem
1 Introduction
2 Present Context and Previous Works
2.1 Interoperability Architectures
2.2 Interoperability Protocols
3 Proposal
4 Experiments
4.1 File System
4.2 Data Flow Inside Our Fog Ecosystem
4.3 Results
5 Conclusions
References
A Design of an IoT-Based Smart Home with Auto-sanitization System
1 Introduction
2 Literature Review
3 Methodology and Modeling
4 Working Procedure
4.1 Remote Access
4.2 Voice Command Access
5 Implementation of the Prototype
5.1 Software Implementation
5.2 Hardware Implementation
5.3 Visual Models of a Smart Home with Auto-sanitization
6 Future Developments, Scopes, and Social Impact
7 Results and Data Analysis
8 Conclusion
References
An Experiment Study on Federated Learning Testbed
1 A Novel PPML Framework: Federated Learning
2 Methodology and System Implementation
3 Results on Efficiency Test
3.1 Training Speed
3.2 Communication Cost
4 Privacy Analysis
5 Conclusion
References
Visual Quality Comparison of Ocean Wave Effects at Different Camera Distances
1 Introduction
2 Material and Method
2.1 Setting in Houdini
2.2 Setting in Unreal
2.3 Minor Conclusion
3 Result
4 Conclusion
References
Control System to International Parental Child Abduction, Case: Colombia
1 Introduction
2 Background
3 Design and Method for Colombia
4 Results
5 Analysis of the Results
6 Conclusions and Further Work
References
It is not Always Ethical: Data Manipulation to Justify Public Policy Choices in COVID-19 Response
1 Introduction
2 Background
3 Cases of COVID-19 Data Manipulation
4 Floridaâs COVID-19 Data Portal
5 Georgiaâs COVID-19 Data Portal
6 Arizonaâs COVID-19 Data Portal
7 Texas, Virginia, and Vermontâs COVID-19 Data Portals
8 Implications of Data Manipulation
9 Conclusion
References
BPMN2EVENTB Supporting Transformation from BPMN2.0 to Event B Using Kermeta
1 Introduction
2 The Proposed Approach
3 Subset of Mapping Rules BPMN-Event B
4 Illustration
5 Conclusion and Future Work
References
Teaching Neuroscience Through Flipped Classroom: Systematizing an Experience with Students of the Professional Career of Elementary Education
1 Introduction
1.1 Contributions of Neuroscience to Education
1.2 Teaching Neuroscience Through Digital Resources
2 Methodology
2.1 Procedures
2.2 Participants
2.3 Measures
3 Results
3.1 Analysis of Means and Variation Coefficients
3.2 Exploratory Analysis with Boxplots
3.3 Analysis of Some Items
4 Discussion
5 Conclusions and Future Works
References
Low-Cost IoT Platform for Telemedicine Applications
1 Introduction
2 Related Works
3 Case of Study
4 Implementation of the Proposal
4.1 Wearable Device
4.2 Android TV App
4.3 Cloud Service
5 Discussion of Results
6 Conclusions and Future Works
References
Statistical Analysis-Based Intrusion Detection for Software Defined Network
1 Introduction
2 Software Defined Network and Open Flow
3 Selection of Flow Match Fields and Attributes
3.1 Malware Traffic
4 Experimental Setup for SABIDS Architecture
4.1 Training Phase
4.2 Testing Phase
5 Performance Evaluators
5.1 Sensitivity and Specificity
5.2 Receiver Operating Characteristic Curve (Roc) and Area Under Curve (AUC)
6 Results and Discussion
7 Conclusion
References
Psychological Profiles of Social Media Users: An Exploratory and Predictive Study in Peruvian Adolescents
1 Introduction
1.1 Psychological Profiles of Social Media Users
1.2 Peruvian Adolescents Social Media Users
2 Methodology
2.1 Research Approach and Type
2.2 Participants
2.3 Instruments
2.4 Procedures
3 Results
3.1 Descriptive Statisticians
3.2 Relations Between Variables
3.3 Linear Regressions
4 Discussion
5 Conclusions
References
Semantic Segmentation of Underwater Environments Using DeepLabv3+ and Transfer Learning
1 Introduction
1.1 DeepLabv3+
1.2 Network Backbone
2 Methods
2.1 Quality Metrics
2.2 Transfer Learning Strategy and Loss Function
3 Experiments and Results
4 Conclusions
References
Strawberry Maturity Classification Based on BP Neural Network
1 Introduction
2 The Proposed Method
2.1 Image Pre-processing
2.2 Chromatic Feature Extraction
2.3 BP Neural Network
3 Results and Discussion
4 Conclusion
References
Intervention for Improvement of Water Quality in a Rural Village in Rajasthan
1 Introduction
1.1 Study Area
2 Methodology
2.1 Participatory Rural Appraisal
2.2 Human Centered Design Approach
2.3 Water Sample Testing
3 Result I
4 Results II
4.1 Integrating Reverse Osmosis with Jivamritam Water Purification System
4.2 Humidification and Dehumidification System (HDH System)
5 Conclusion
References
Addressing Impure Water Quality and Associated Challenges Faced by a Rural Community in West Bengal Through Sustainable Technologies
1 Introduction
2 Study Area
3 Methodology
3.1 Participatory Rural Appraisal (PRA)
3.2 Human-Centered Design (HCD)
4 Result
4.1 Result I
4.2 Result II
5 Conclusion
References
Assessing Appropriate Technologies for Sustainable Irrigation Practices in Muljipura Village, India
1 Introduction
1.1 Current State of Global and Local Water Reserves
1.2 Brief Community Profile
2 Methodology
2.1 Participatory Rural Appraisal (PRA)
2.2 Human Centered Design (HCD)
3 Results
3.1 Results 1
3.2 Results 2
4 Conclusion
References
Kidney Disease Detection Using Supervised Machine Learning Techniques
1 Introduction
1.1 Mining Methods
2 Purpose
3 Existing Architecture
4 Proposed Architecture
5 Advantage of Proposed System
6 Proposed Model Working Function
7 Proposed Algorithm
8 Result
8.1 NaĂŻve Bayesian Code
8.2 Logistic Regression Code
8.3 Optimized XG-BOOST Code
8.4 Comparison Chart
8.5 Accuracy Table
9 Implementation Tools and Technology
10 Conclusion
11 Future Work
References
Comparison Between Types of Solar Panels for Meteorological Stations in Different Areas of Ecuador
1 Introduction
2 Methodology
2.1 Types of Solar Panels to Use
3 Results
4 Conclusion and Future Works
References
IoT-Based Smart Street Light for Improved Road Safety
1 Introduction
2 Literature Review
2.1 Smart Street Light
2.2 Accident Detection System
2.3 Emergency Push Button
3 Historical Background
4 Methodology and Modeling
4.1 Proposed Block Diagram of the Prototype
4.2 System Block Diagram
4.3 Simulation
4.4 Designed Prototype
5 Results and Analysis
6 Future Developments
7 Conclusion
References
Diagnosis of Early-Stage Lung Cancer and Tumor Using the 5G Band Microstrip Patch Antenna
1 Introduction
2 Design and Specification
3 Methodology and Modeling of the Lung Phantom
4 Result Analysis
5 Comparative Study
6 Conclusion
References
Analysing and Identifying Harm Propagation of Cyber Threats in Autonomous Vehicles and Mitigation Through ANN
1 Introduction
2 Related Work
3 Analysis
3.1 Harm Propagation Tree (HPT)
3.2 Connected Dominating Sets (CDS):
4 Proposed Methodology
5 Comparative Analysis
6 Conclusion and Future Work
References
Predictive Model-based Analytics to Control Drying Process in a Sugar Industry
1 Introduction
2 MPC in Drying Process Technology
3 Implementation of MPC in Dryers Using the Simulation Package
4 Results and Discussion
5 Conclusion
References
IoT-Based Personalized Health Care for Elderly Diabetic Patients
1 Introduction
2 Proposed Work
2.1 Hardware Requirements
2.2 Software Requirements
3 Methodology
4 Result
5 Conclusion
References
Context-Aware Placement Applications of Industry 4.0 Using Connected Dominating Set in Fog Computing
1 Introduction
2 Related Work(s)
3 Placement Application Algorithm
4 Implementation
5 Results and Analysis
6 Conclusion
References
Performance Efficient NoC Router Implementation on FPGA
1 Introduction
2 Proposed Design of Single-Node NoC Router
3 Implementation of Various Blocks of NoC Router
3.1 Design of Input Block of Router
3.2 Implementation of iSLIP Scheduler
3.3 Simulation Result of Single-Node Router
4 Implementation of 4âĂâ4 NoC Router
4.1 Comparison Results
5 Conclusion
References
RSA-Based CP-ABE Scheme with Scalable User Revocation for IoT and Smartcard Devices
1 Introduction
2 Preliminary Requirements
2.1 Definition of Attribute and Access Structure
3 Proposed RCSR Scheme
3.1 Role of Proxy Server
3.2 Setup
3.3 Encryption
3.4 Keygen
3.5 Decryption
4 Performance Analysis
4.1 Computational Overhead
4.2 Storage Overhead
5 Conclusion and Future Work
References
Design of Multi-band MIMO Patch Antenna Active Sensor Array for Satellite Remote Sensing Applications
1 Introduction
2 Related Work
3 Methodology
3.1 Design of Multi-Band 4 * 4 MIMO Microstrip Patch Antenna Sensor Array
4 Flowchart
5 Simulation Findings and Analysis
5.1 Return Loss (S-Parameter)
5.2 Bandwidth
5.3 Antenna Gain
5.4 Beamwidth with the 2D Radiation Pattern
5.5 Current Density
5.6 Average Power Density
6 Conclusion and Future Work
References
Performance Analysis of Machine Learning Algorithms for Sleep Apnea Detection Using ECG
1 Introduction
2 Related Work
3 Methodology
4 Results
5 Conclusions
References
Accuracy of Diabetes Patient Determination: Prediction Made from Sugar Levels Using Machine Learning
1 Introduction
2 Related Works
3 Methodology
3.1 Dataset
3.2 Feature Selection
3.3 Associate Rule Mining
3.4 Prediction
4 Results
4.1 Feature Selection
4.2 Associate Rule Mining
4.3 Prediction
5 Discussions
6 Conclusion
References
A Comprehensive Review on Text to Indian Sign Language Translation Systems
1 Introduction
1.1 ISL Grammar
2 Literature Review
2.1 Method of Approach
2.2 Existing Systems
3 Conclusion
4 Future Scope
References
Control Plane Efficiency by Load Adjustment in SDN
1 Introduction
2 Related Work and Motivation
3 System Model
3.1 Load Calculation
3.2 Finding Heavy Load Controller
3.3 Finding the Switch Set
3.4 Finding the Target Controller
4 Design
5 Evaluation
5.1 Load Distribution
5.2 Topology Efficiency
6 Conclusion
References
Novel Intuitionistic Fuzzy Time Series Modeling to Forecast the Death Cases of COVID-19 in India
1 Introduction
2 Preliminaries
3 Proposed Method
4 Implementation of Proposed Model
5 Results and Discussion
References
Dynamic Trust Management System for Social IoT
1 Introduction
2 Trust Management System (TMS)
3 Difficulties of IoT Trust Management:
4 Literature Review
5 Attack Model
6 IoT Trust Management Model
7 Proposed Work
8 Results and Discussion
9 Conclusion
References
Human Motion Detection and Recognition from Video Surveillance Based on Machine Learning Approaches
1 Introduction
2 Literature Review
3 Research Methodology
3.1 Person Detection and Motion Tracking
3.2 Feature Selection
3.3 Person Identification and Motion Identification
4 Experimental Results
5 Conclusion
References
Using Recursive Feature Elimination and Fisher Score with Convolutional Neural Network for Identifying Port Scan Attempts
1 Introduction
2 Review
3 Dataset and Technique Used
3.1 Dataset Used
3.2 Feature Selection Methods
3.3 Convolutional Neural Network
4 Methodology
5 Experimental Results
6 Conclusion
References
A Conceptual Enhancement of LSTM Using Knowledge Distillation for Hate Speech Detection
1 Introduction
2 Background
2.1 Hate Speech
2.2 RNN
2.3 LSTM
2.4 Knowledge Distillation
2.5 Related Works
3 Proposed Methodology
3.1 Response-Based Knowledge
3.2 Offline Distillation
3.3 Dataset
3.4 Methodology
3.5 Step by Step Algorithm
3.6 Calculation of Model Accuracy
4 Results and Analysis
5 Conclusion
References
A Deep Dive into Blockchain Consensus Protocols
1 Introduction
2 Blockchain Technology
3 Consensus Algorithms
3.1 Proof of Work
3.2 Proof of Stake
3.3 Delegated Proof of Stake
3.4 Leased Proof of Stake
3.5 Proof of Elapsed Time
3.6 Proof of Burn
3.7 Proof of Capacity
3.8 Proof of Activity
3.9 Proof of Sincerity
4 Conclusion
References
Deep Learning Techniques for Automated Image Captioning
1 Introduction
2 Encoder-Decoder Framework
3 Neuroevolutionary Techniques
4 Attention-Guided Mechanisms
5 Results
5.1 Evaluation Metrics
5.2 Comparison
6 Conclusion
References
Cost-Effectiveness of a Substance-Abuse Prevention Program in Tribal Areas of Chhattisgarh and Jharkhand
1 Introduction
2 Amrita Awareness Ambassador (AAA) Program
3 Methodology
3.1 Study Population
3.2 Statistical Analysis
4 Results
5 Discussion and Conclusion
References
Agile Methodology for IoT Application Development and Business Improvisation
1 Introduction
2 Related Work
3 Agile Solution for IoT Application
4 Summary
References
A Study on Impact of WhatsApp on College Students
1 Introduction
1.1 Features of WhatsApp
2 Literature Review
3 Objective
4 Proposed Method
4.1 Data Collection
4.2 Analysis of Data
5 Results
6 Limitations/Shortcoming and Future Scope
7 Conclusion
References
Apriori Algorithm with Dynamic Parameter Selection and Pruning of Misleading Rules
1 Introduction
2 Interestingness Measures/Rule Evaluation Metrics
2.1 Support
2.2 Confidence
2.3 Lift
3 Association Rules
4 Literature Survey
5 Methodology of Proposed Improved Apriori Algorithm
5.1 Apriori Algorithm
5.2 Deciding Minimum Support for a Dataset
5.3 Deciding Minimum Confidence for a Dataset
5.4 Pruning of Rules Based on a Contingency Table
5.5 The Decision About Whether to Go for Lift or Confidence
6 Comparative Analysis
6.1 Number of Rules
6.2 Time Complexity
6.3 Accuracy of Rules
7 Conclusion
8 Future Scope
References
Reconstruction of Missing Data in Satellite Imagery Using SN-GANs
1 Introduction
1.1 Satellite Imagery
1.2 Parsing and Processing Satellite Data
1.3 Errors in Satellite Imagery
1.4 Correcting Line and Column Dropouts
1.5 Section Organization
2 Literature Survey
3 Dataset
4 Proposed Solution
4.1 SN-GANs for Satellite Images
5 Results
6 Conclusion
References
Solution Approaches for Breast Cancer Classification Through Medical Imaging Modalities Using Artificial Intelligence
1 Introduction
2 Literature Review
3 Solution Approaches
3.1 Image Modalities Used Medical Imaging
3.2 Machine Learning
3.3 Deep Learning
3.4 Convolutional Neural Network
3.5 Recurrent Neural Network
3.6 Auto-encoder
3.7 Transfer Learning
3.8 Data Augmentation
4 Conclusions
References
Banana Leaf Disease Recognition Based on Local Binary Pattern
1 Introduction
2 Literature Review
3 Proposed Approach
3.1 Image Acquisition
3.2 Preprocessing
3.3 Image Segmentation
3.4 Feature Extraction
3.5 Classification
4 Result and Discussion
5 Conclusion
References
RMS Delay Spread and Channel Capacity Modelling for 28 GHz MIMO Channel with Different UE Height
1 Introduction
2 Measurement Environment and Simulation
3 Result and Analysis
3.1 Effect of RMS DS on Channel Capacity
4 Conclusion
References
A Novel Variant-Optimized Search Algorithm for Nuclei Detection in Histopathogy Breast Cancer Images
1 Introduction
2 Review on Segmentation
3 Proposed Method
3.1 Image Collection
3.2 Image Preprocessing
3.3 Optimized Super Pixel Segmentation (OSPS)
3.4 PSO Algorithm
3.5 GWO Algorithm
4 Results
5 Conclusion
References
The Mythical or Realistic Implementation of AI-powered Driverless Cars in Africa: A Review of Challenges and Risks
1 Introduction
2 Studies on Autonomous Vehicles
3 Challenges of Driverless Cars
4 Possible Risks of Adoption
5 Conclusion
References
Gatekeeper Security Check System Using VGG
1 Introduction
2 Application Structure
2.1 Overall Architecture
2.2 DB Design and Data Repository
2.3 User Interface
2.4 Facial Recognition and ID Card Detection Engine
3 Algorithm Used
3.1 Face Recognition Algorithm
3.2 ID Card Detection Algorithm
4 Experimental Discussion
4.1 Trivial Solution
4.2 Bottleneck Feature Model
4.3 Results
5 Conclusion
References
Online Examination System
1 Introduction
2 Proposed System Design
3 Flowchart of Remote Online Examination System
4 Algorithm of Proctoring
5 Result
5.1 Result Analysis of Proctoring Algorithm
5.2 Result of Data Visualization
6 Conclusion
7 Future Work
References
Analyze of Different Algorithms of Machine Learning for Loan Approval
1 Introduction
2 Literature Review
3 Dataset Evolution
4 Methodology Used
References
A Survey on Statistical Approaches for Abstractive Summarization of Low Resource Language Documents
1 Introduction
2 Literature Survey
3 Conclusion and Future Scope
References
A Critical Review of IoT-Connected Healthcare and Information Security in South Africa
1 Introduction
2 Security in Health Care
2.1 Internet of Medical Things
2.2 Intrusion Detection System (IDS)
3 Comparison and Discussion
4 Conclusion
References
A Review of Interoperability of IoT Systems for Smart Cities
1 Introduction
2 Related Work
3 Internet of Things for Smart Cities
4 Interoperability as Regards Smart Cities
5 Complex Systems and Need for Interoperability
5.1 Devices
5.2 Networks
5.3 Platforms
6 Interoperability in Smart Cities
7 Challenges of Interoperability
7.1 Integration Challenges
7.2 Things Interaction
7.3 Virtual Representation of Things
7.4 Syntactic Interoperability Between Things
7.5 Management Challenges
8 Benefits of Interoperability
9 Key Findings of the Review
10 Recommendation and Future Direction
11 Conclusion
References
Author Index
đ SIMILAR VOLUMES
<p><p>This book gathers high-quality papers presented at the International Conference on Smart Trends for Information Technology and Computer Communications (SmartCom 2020), organized by the Global Knowledge Research Foundation (GR Foundation) from 23 to 24 January 2020. It covers the state-of-the-a
<p><p>This book gathers high-quality papers presented at the International Conference on Smart Trends for Information Technology and Computer Communications (SmartCom 2019), organized by the Global Knowledge Research Foundation (GR Foundation) from 24 to 25 January 2019. It covers the state-of-the-a
<span>This book gathers high-quality papers presented at the Fifth International Conference on Smart Trends in Computing and Communications (SmartCom 2021), organized by Global Knowledge Research Foundation (GR Foundation) from March 2 â 3 , 2021. It covers the state of the art and emerging topics i
<p><span>This book gathers high-quality papers presented at the Sixth International Conference on Smart Trends in Computing and Communications (SmartCom 2022), organized by Global Knowledge Research Foundation (GR Foundation) in partnership with IFIP InterYIT during January 11â12, 2022. It covers th
<p><span>This book gathers high-quality papers presented at the Seventh International Conference on Smart Trends in Computing and Communications (SmartCom 2022), organized by Global Knowledge Research Foundation (GR Foundation) from January 24â25, 2023, in Jaipur, India. It covers the state-of-the-a