This book contains the best selected research papers presented at ICTCS 2020: Fifth International Conference on Information and Communication Technology for Competitive Strategies. The conference was held at Jaipur, Rajasthan, India during 11–12 December 2020. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security.
Author(s): M. Shamim Kaiser, Juanying Xie, Vijay Singh Rathore
Series: Lecture Notes in Networks and Systems, 190
Publisher: Springer
Year: 2021
Language: English
Pages: 1220
City: Singapore
Preface
Contents
Editors and Contributors
An Assessment of Internet Services Usage Among Postgraduate Students in the Nigerian Defence Academy
1 Introduction
1.1 Aim
1.2 Objectives
2 Literature Review
3 Research Methodology
4 Findings and Analysis
4.1 Demographic Information Result
4.2 Usability and Awareness of Internet Services by PG Students
4.3 Experience in the Use of Internet Services
4.4 Campus Where Internet Services Are Accessed
4.5 Laboratory Used for Internet Services
4.6 Access Point Used to Connect Internet Services
4.7 Location of Access of Internet Services
4.8 Device Used to Access Internet Services
4.9 Strength of Internet Service Usage
4.10 Availability of Internet Services
4.11 Problems of Internet Services
5 Summary
6 Conclusions
7 Recommendations
References
Smart Attendance Monitoring System Using Local Binary Pattern Histogram
1 Introduction
2 Related Works
3 Implementation
3.1 Image Capturing
3.2 Face Locating
3.3 Face Detection
3.4 Face Encoding
3.5 Local Binary Pattern Histogram
3.6 Face Recognition
3.7 Attendance Marking
3.8 Sending Email
4 Results
4.1 GUI of the System
4.2 Face Recognition
4.3 Attendance List
4.4 Absentees Email
5 Conclusion
References
An Energy-Efficient Wireless Sensor Deployment for Lifetime Maximization by Optimizing Through Improved Particle Swarm Optimization
1 Introduction
2 Related Works
3 Model Assertion
3.1 Network Model
3.2 Energy Model
4 Clustering Protocol
4.1 Cluster Head Selection
4.2 Relay Node Selection
4.3 Clustering Formation
5 IPSO Algorithm for Cluster Head Updation
6 Analysis of Energy Consumption
7 Simulation and Results
8 Conclusion
References
Improved Nutrition Management in Maize by Analyzing Leaf Images
1 Introduction
1.1 Motivation
1.2 Application Work
2 Literature Review
3 Methodology
3.1 Color Segmentation with Filtering
4 Implementation
4.1 Approach of the Algorithm Using k-Means Clustering and Finding k
5 Results and Discussion
6 Conclusion
References
Modified LEACH-B Protocol for Energy-Aware Wireless Sensor Network for Efficient Network Lifetime
1 Introduction
2 Clustering Algorithm
2.1 Original LEACH Algorithm
2.2 LEACH-B
3 Other Multi-hop LEACH Algorithms
3.1 Cognitive LEACH (CogLEACH) Algorithm
3.2 Weighted Spanning Tree LEACH (WST-LEACH) Algorithm
4 Proposed Modified LEACH Algorithm
5 Conclusion
References
Web Content Authentication: A Machine Learning Approach to Identify Fake and Authentic Web Pages on Internet
1 Introduction
2 Background
2.1 World Wide Web
2.2 Search Engines
2.3 Fake News
2.4 Machine Learning
2.5 Deep Learning
3 Related Work
4 Problem Formulation
5 Proposed Methodology
6 Experimental Observations
6.1 Malicious Link
6.2 Clickbaity
6.3 Sentiment Analysis of Content
6.4 Security Level Used by Web sites
6.5 Domain Name
7 Results
8 Conclusion
9 Future work
References
Classification of Brain Tumor by Convolution Neural Networks
1 Introduction
2 Previous Work
3 Proposed Methodology
4 Results
5 Conclusion
References
Automated Multiple Face Recognition Using Deep Learning for Security and Surveillance Applications
1 Introduction
1.1 Face Recognition Using Deep Learning
2 Literature Survey
3 System Architecture
3.1 Haar cascade
4 Results
5 Conclusion
6 Future Work
References
An App-Based IoT-NFC Controlled Remote Access Security Through Cryptographic Algorithm
1 Introduction
2 Previous Studies
3 System Architecture and Hardware
3.1 Required Component
4 Detail Working Procedure
4.1 RAC Configuration and Working Procedure
4.2 RAC Application
4.3 Data Cryptography Technique
4.4 RAC Condition Information
5 Performance Measurement and Time Count
5.1 Data Access and Storage
5.2 Time Count
6 RAC App Architecture
7 Results and Discussion
7.1 Security, Notification and Permissibility
7.2 Accessibility and Usability
8 Conclusion
References
Pneumonia Detection Using X-ray Images and Deep Learning
1 Introduction
2 Related Work
3 Convolutional Neural Network
3.1 Convolution Layer
3.2 Polling Layer
3.3 Fully Connected Layer
3.4 Dropout Layer
4 Proposed Model
4.1 Preprocessing
4.2 Model
4.3 Output
5 Experimentation
5.1 Dataset
5.2 Hyperparameter Tuning
5.3 Novel CNN Approach
6 Results
7 Conclusion
References
Autonomous Sailing Boat
1 Introduction
2 Literature Survey
3 Proposed System
4 Methodology
5 Algorithm Development
6 System Architecture
7 Overview of the Boat
8 Applications
9 Design, Risks, Assumptions, and Dependencies
10 Experimental Results
11 Conclusion
References
A Proposed Method to Improve Efficiency in IPv6 Network Using Machine Learning Algorithms: An Overview
1 Introduction
2 Types of Machine Learning Algorithms
2.1 Supervised Learning
2.2 Unsupervised Learning
2.3 Reinforcement Learning
3 Background and Related Work
4 Proposed Methodology
5 Expected Outcome
6 Conclusion
References
Byte Shrinking Approach for Lossy Image Compression
1 Introduction
2 Review of Literature
3 Byte Shrinking Approach
4 Methodology
4.1 Algorithm Used for Compression
4.2 Algorithm Used for Decompression
5 Quality Assessment of Reconstructed Images
6 Results
7 Comparison of Results
8 Conclusion
References
Image Encryption Using Matrix Attribute Value Techniques
1 Introduction
2 Existing System and Literature Survey
3 Proposed System
4 Experimental Setup
5 Encryption Process
5.1 Source Code to Convert Binary Image
5.2 Procedure for Encryption
6 Reconstructing Process
6.1 Code of Reconstruction Process
7 Generation of Matrix Attribute Value
8 Conclusion and Future Scope
References
Weather Prediction Based on Seasonal Parameters Using Machine Learning
1 Introduction
2 Literature Review
3 Proposed System
3.1 Naïve Bayes Algorithm
3.2 K-Nearest Neighbors
3.3 Decision Tree
3.4 Random Forest
3.5 Deep Neural Network
4 Results and Discussion
4.1 Performance of Machine Learning Algorithms
5 Conclusion and Future Work
References
Analysis of XML Data Integrity Using Multiple Digest Schemes
1 Introduction
2 Related Work
3 Multiple Digest Approach
4 Experimentation
5 Result and Discussion
6 Conclusion
References
Enhanced Safety and Security Features for CAN Communication in Automotives
1 Introduction Controller Area Network
2 CAN Bus Safety and Data Security
2.1 CAN Bus Safety
2.2 CAN Data Security
3 Proposed Methodology
3.1 Enhanced Safety Feature for CAN Bus
3.2 Enhanced Security for CA Data
4 Results
4.1 Scenario I Demonstration of Enhanced Safety
4.2 Scenario II CAN Bus Recovery from Failure
4.3 Scenario III Demonstration of Enhanced Security Feature of CAN Data
4.4 CAN Bus Failure Captured by BUSMASTER
5 Conclusion
References
Fashion Classification and Object Detection Using CNN
1 Introduction
2 Previous Work
3 Proposed Methodology
3.1 Data Preprocessing
3.2 Structure and Compile
3.3 Training and Validation
4 Experimental Results
5 Conclusion
References
An Efficient Data Mining Algorithm for Crop Yield Prediction
1 Introduction
2 Related Work
3 Motivation
4 Dataset
5 Methodology
5.1 Algorithm
6 Workflow
6.1 Data Flow Diagram
6.2 Description
7 Results Snapshots
8 Conclusion
9 Future Work
References
Cognitive Study of Data Mining Techniques in Educational Data Mining for Higher Education
1 Introduction
2 Data Mining—A Background
2.1 Data Mining Process
2.2 Architecture of Data Mining System
2.3 Data Mining System Classification
3 Literature Review
4 Research Methodology
4.1 Data Mining Models
4.2 Challenges in Data Mining Implementation
4.3 Limitations of Data Mining Techniques
5 Data Mining Classification Techniques
5.1 Decision Tree
5.2 K-Nearest Neighbour (KNN)
5.3 Naïve Bayes
5.4 Support Vector Machine (SVM)
5.5 Neural Network (NN)
6 Data Mining Applications
7 Conclusion
References
21 Python GUI for Language Identification in Real-Time Using FFNN and MFCC Features
Abstract
1 Introduction
2 System Description
2.1 Creation of a Training Data Set
2.2 Pre-processing of Sound Files
2.3 MFCC Feature Extraction of Frames
2.4 Creation of Target Data Set
2.5 Feed Forward Neural Network (FFNN)
3 Result and Discussion
3.1 Creation and Training of FFNN
3.2 Speech Sample Recording GUI
3.3 Real-Time Python GUI for Language Identification
4 Conclusion and Future Work
References
Traffic Management System Based on Density Prediction Using Maching Learning
1 Introduction
2 Literature Review
2.1 Traditional Traffic Density Prediction
2.2 Machine Learning Enabled Traffic Density Prediction
3 Proposed Work
3.1 Least Square Linear Regression (LSLR)
3.2 Autoregressive Integrative Moving Average (ARIMA)
4 Results and Discussion
5 Conclusion
6 Future Work
References
Implementation of Optimized VLSI Architecture for Montgomery Multiplication Algorithm
1 Introduction
2 Classification
3 SCS-Based Modular Multiplier
4 Carry–Save Adder
5 Carry–Select Adder
6 Carry–Skip Adder
7 Results and Discussion
8 Graphical Representation
9 Conclusion
References
Artificial Intelligence in Healthcare
1 Introduction
2 Applications of AI in Healthcare
2.1 Predictive AI Software
2.2 Reducing Workload for Healthcare Professionals
2.3 Assessing Glucose Levels
2.4 Disease Diagnosis
2.5 Chatbots and Other AI-Driven Healthcare Apps
2.6 Social Media
3 The Future of AI in Healthcare
3.1 Use AI for doctor’s Clinical Paperwork
3.2 Use Machines to Reduce Errors
3.3 Treat Patients at Home not Hospital
4 Healthcare AI in Industry
4.1 Microsoft AI is Helping Eradicate Preventable Blindness
4.2 Google AI
5 Challenges of AI in Healthcare
6 Conclusion and Future Scope
References
Performance Improvement of Lossy Image Compression Based on Polynomial Curve Fitting and Vector Quantization
1 Introduction
2 Related Works
3 Vector Quantization Algorithm LBG
4 The Proposed Method
5 Results and Discussion
5.1 Results
5.2 Discussion
6 Conclusion
References
Adversarial Deep Learning Attacks—A Review
1 Introduction
2 Key Terminology
3 Adversarial Attack
3.1 Classification-Based Attack
4 3D Objects Perturbations
4.1 Classification-Based Attack
5 Conclusion
References
Enhancing Security of Cloud Platform with Cloud Access Security Broker
1 Introduction
2 Mind Map
3 CASB
3.1 Magic Quadrant Descriptions
4 Proposed Methodology
5 Case Study
6 Conclusion and Future Work
References
Machine Learning Based Quality Prediction of Greywater: A Review
1 Introduction
2 Literature Review
3 Greywater Characteristics
4 Conclusion
References
Blueprint of Blockchain for Land Registry Management in India
1 Introduction
2 Issues in Existing Land Registry System and Case Studies
3 Blockhain in Detail
4 Public Versus Private and Permissioned Blockchain
5 Existing System and Transactions in Blockchain
6 Transactions Related to Mutation of a Plot
7 Smart Contracts
8 Proposed Blockchain Layout with Nodes
9 Use of Channels for Layered Access and Isolations
10 Conclusion
References
Dynamic Time Slice Task Scheduling in Cloud Computing
1 Introduction
2 Related Work
3 Proposed Method
4 Experimental Results
5 Conclusion
References
A Comprehensive Survey of Existing Researches on NOMA-Based Integrated Satellite-Terrestrial Networks for 5G
1 Introduction
2 Overview of NOMA and ISTNs
2.1 Noma
2.2 ISTNs
3 Survey of NOMA-Based ISTNs Studies
3.1 Cooperative ISTNs
3.2 Cognitive Radio ISTNs
4 Observations and Opened Research Topics
4.1 Observations
4.2 Opened Topics for Future Research
5 Conclusion
References
Global Random Walk for the Prediction of MiRNA Disease Association Using Heterogeneous Networks
1 Introduction
2 Background
3 Materials and Method
3.1 MiRNA Similarity Based on Environmental Factors
3.2 MiRNA Similarity Based on Diseases
3.3 Disease Semantic Similarity
3.4 Probability Transfer Matrix
4 Global Random Walk
5 Results
5.1 Breast Neoplasm
5.2 Pancreatic Neoplasm
5.3 Ovarian Neoplasm
6 Performance Evaluation
7 Conclusion
References
IoT Past, Present, and Future a Literary Survey
1 Introduction
2 Background
3 Methodology
4 Research Findings
4.1 Past of IoT
4.2 Present of IoT
4.3 Future of IoT
4.4 Sectors of IoT
4.5 Investments and IoT-Connected Devices
4.6 Challenges of IoT
5 Conclusion
References
Use of Classification Approaches for Takri Text Challenges
1 Introduction
2 Takri-Brief Overview
3 Challenges
4 Proposed Model
4.1 Data Preparation
4.2 Data Classification
4.3 Result Analysis
5 Conclusion
References
Dynamically Adaptive Cell Clustering in 5G Networks
1 Introduction
2 Background
2.1 Fifth Generation Networks (5G)
2.2 Convergence of 5G with AI
3 Deployment Model/Architecture
4 Conclusion
References
Recommendation System Based on Machine Learning and Deep Learning in Varied Perspectives: A Systematic Review
1 Introduction
2 Recommendation System Applications and Techniques
2.1 E-Business Recommendation System
2.2 E-Commerce Recommendation System
2.3 E-Governance Recommendation System
2.4 E-Tourism Recommendation System
2.5 E-Resource Service Recommendation System
2.6 E-Group Services Recommendation System
2.7 E-Library Recommendation System
2.8 E-Learning Recommendation System
2.9 Applications
2.10 Techniques
3 Emerging Work and Scope Analysis
4 Conclusion
References
SON Coordination with Priorities for Separation of Parameter Regulation
1 Introduction
2 Background
2.1 Self-Organizing Network (SON)
2.2 SON Coordination
3 SON Coordination with Priorities for Separation of Parameter Regulation
3.1 Illustration
4 Conclusions and Future Scope
References
Digit Image Recognition Using an Ensemble of One-Versus-All Deep Network Classifiers
1 Introduction
2 Related Works
3 Proposed Approach
4 Experimentation and Results
5 Conclusion
References
Recent Developments, Challenges, and Future Scope of Voice Activity Detection Schemes—A Review
1 Introduction
2 Background
3 Development in VAD
4 Challenges and Opportunities
5 Conclusion
References
A Deep Learning Approach Toward Determining the Effects of News Trust Factor Based on Source Polarity
1 Introduction
2 Related Research
3 Proposed Method
3.1 Phase 1—Sentiment Analysis
3.2 Phase 2—News Trust Factor
4 Experimental Results
4.1 Dataset Used
4.2 Scale of Measurement for Sentiment Analysis
4.3 Results
5 Analysis of Results
6 Conclusion
References
A Pilot Study in Software-Defined Networking Using Wireshark for Analyzing Network Parameters to Detect DDoS Attacks
1 Introduction
2 Related Work
3 System Architecture and Experimental Setup
3.1 System Architecture
3.2 Experimental Setup
4 Result and Discussion
4.1 Network Statistics
4.2 Network Analysis
5 High-Level Conceptual Model
6 Conclusion and Future Work
References
An Interactive Tool for Designing End-To-End Secure Workflows
1 Introduction
2 Enhancing Protocol Specifications with Security Labels
3 Interactive Tool to Design End-to-End Secure Protocols
3.1 Data Structures
3.2 Using the Tool
4 Experimental Demonstration
5 Conclusions
References
Investigation of Methodologies of Food Volume Estimation and Dataset for Image-Based Dietary Assessment
1 Introduction
2 Literature Review on Food Volume Estimation
3 Dataset Comparison
4 Results and Observations
5 Conclusion
References
A Compact Wideband Patch Antenna with Defected Ground for Satellite Communication
1 Introduction
2 Design Parameters of Antenna
3 Results and Discussions
4 Conclusion
References
Deep Learning for Natural Language Processing
1 Introduction
2 Components of NLP
3 Deep Learning Models for Natural Language Processing
3.1 CNN for Natural Language Processing
3.2 RNN for Natural Language Processing
3.3 Attention Mechanism for Natural Language Processing
4 Applications of Deep Learning Models for Natural Language Processing
5 Conclusion
References
College Project Preservation and Emulation Using Containerization Over Private Cloud
1 Introduction
2 Technology Stack
2.1 Frontend Technologies
2.2 Backend Technologies
2.3 Docker
3 Literature Review
4 Methodology and Implementation
4.1 Modules
5 Conclusion
References
Intellectual Property Rights Management Using Blockchain
1 Introduction
2 Background and Literature Survey
3 Drawbacks of Existing Approaches
4 Proposed Solution
5 Challenges Addressed
6 Conclusions
References
A Salient Binary Coding Scheme for Face and Expression Recognition from Facial Images
1 Introduction
2 Literature Survey
3 Proposed Approach
3.1 Overview
3.2 Compass Mask
3.3 Robinson Compass Mask
3.4 Gaussian Compass Mask
3.5 Encoding
3.6 Robinson Encoding ( EALDBPR )
3.7 Gaussian Encoding ( EALDBPσG )
3.8 Face Descriptor
3.9 Recognition
4 Experiments
4.1 Face Recognition
4.2 Expression Recognition
4.3 Comparison
5 Conclusion and Future Scope
References
Low-Cost Smartphone-Controlled Remote Sensing IoT Robot
1 Introduction
2 Literature Review
3 Methodology and System Design
4 Results Discussion
5 Conclusion
References
Thermal Image Processing and Analysis for Surveillance UAVs
1 Introduction
2 Dataset
3 Methodology
3.1 Fire Detection
3.2 Histogram of Oriented Gradients (HOG)
3.3 You Only Look Once (YOLO)
4 Result and Comparison
5 Conclusion and Future Work
References
Ensemble Methods for Scientific Data—A Comparative Study
1 Introduction
1.1 Pre-processing
2 Methodology
2.1 Supervised Learning
2.2 Unsupervised Learning
2.3 Classification
2.4 Deep Learning
3 Experimental Results on Different Datasets
3.1 Accuracies of Different Data Sets
3.2 Training Time for Different Datasets
4 Conclusion
References
An Efficacious E-voting Mechanism using Blockchain to Preserve Data Integrity in Fog Nodes
1 Introduction
1.1 Blockchain Overview
1.2 How Blockchain Works?
2 Related Work
3 E-voting
4 Proposed Architecture
4.1 Blockchain Construction in the Proposed Architecture
5 Experimental Results
6 Conclusion
References
Learning Analytics: A Literature Review and its Challenges
1 Introduction
2 Related Work
3 Discussion and Analysis of Privacy Preservation Techniques
3.1 k-Anonymization
3.2 l-Diversity
3.3 Statistical Disclosure Control
3.4 t-closeness
3.5 Comparison of Privacy-Preserving Techniques
4 Privacy Versus Utility
5 Analysis and Discussion
6 Conclusion
References
Usage of ICT in Engineering Applications
1 Introduction
2 Unforeseen Circumstances
3 Effects of ICT in Engineering Applications
4 Survey for Dataset
5 Results and Conclusion
6 Proposed Future Research
Bibliography
ICT for Good Governance: Evidence from Development Perspective
1 Introduction
2 Good Governance and ICT
3 POSHAN Abhiyan
4 Mission Antyodaya
5 Analysis
6 Conclusion
References
Low-Power DSME-Based Communication and On-Board Processing in UAV for Smart Agriculture
1 Introduction
1.1 Overview of DSME MAC and Multi-superframe
1.2 Motivation
1.3 Related Research
1.4 Contribution and Organization
2 Proposed CAP Reduction Scheme
3 Proposed Computing Architecture
4 Preliminary Results and Discussion
5 Conclusion and Future Work
References
Lane Change Assistance Using LiDAR for Autonomous Vehicles
1 Introduction
2 Methodology
2.1 Hardware Design and Sensor Placement
2.2 Data Frame Extraction
2.3 Algorithm
3 Experimental Evaluation
4 Results and Analysis
5 Conclusion
References
A Systematic Review of Video Analytics Using Machine Learning and Deep Learning—A Survey
1 Introduction
2 Motivation
3 Research Questions
4 Methodology
4.1 Object Detection
4.2 Object Tracking
4.3 Object Classification
5 Conclusion
6 Future Scope
References
Spark-Based Sentiment Analysis of Tweets Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Problem Definition
4 System Model of Sentiment Analysis
4.1 Spark Implementation
4.2 Sentimental Analysis
5 Experimental Setup
5.1 Performance Measure of Different Algorithms
5.2 Execution Time of Different Algorithms on Map Reduce Framework
6 Conclusion
References
Product Category Recommendation System Using Markov Model
1 Introduction
2 Related Work
3 Category Recommendation with Markov Model
3.1 Data Preparation
3.2 User Grouping
4 Experimental Results
5 Conclusion
References
Low Code Development Platform for Digital Transformation
1 Introduction
2 Background
3 Related Work
4 Limitations and Scope
5 Conclusion
References
The Analogy of Haar Cascade and HOG Approaches for Facial Emotion Recognition
1 Introduction
2 Literature Survey
3 Proposed Methodology
3.1 Feature Extraction
4 Results
5 Conclusion
References
Testing of FPGA Input/Output Pins Using BIST
1 Introduction
2 Literature Survey
3 Proposed Architecture for Testing I/O Pins of FPGA
4 Simulation and Results
5 Conclusion
References
Image Enhancement Using GAN (A Re-Modeling of SR-GAN for Noise Reduction)
1 Introduction
2 Related Work
3 Problem Statement
3.1 Dataset
3.2 Current Benchmarks
4 Proposed Work
4.1 Pre-processing
5 Training
6 Results and Discussion
7 Conclusion
References
Load Balancing and Its Challenges in Cloud Computing: A Review
1 Introduction
2 Literature Survey
2.1 Load Balancing in Cloud Computing
2.2 Comparative Analysis of Various Load Balancing Algorithm
2.3 Performance Metrics that Effect Load Balancing
2.4 Tools Used for Load Balancing
3 Challenges in Load Balancing Based on Cloud Computing
3.1 Spatial Distribution of the Cloud Nodes
3.2 Storage/Replication
3.3 Algorithm Complexity
3.4 Point of Failure
4 Conclusion
References
Predicting the Stock Markets Using Neural Network with Auxiliary Input
1 Introduction
2 Related Work
3 Dataset
4 Exploratory Data Analysis
4.1 Market Data
4.2 News Data
5 Preprocessing the News Data
5.1 Cleaning the Data from All Possible Errors
5.2 Tokenization
5.3 Auxiliary Input Data
6 Approach
7 Experimentation and Final Results
8 Conclusion
References
Data Accountability and Security Enhancement in Remote Healthcare System Using BaaS
1 Introduction
2 Literature Review
3 Research Gaps
4 Objectives
5 System Model
6 Results and Discussion
7 Conclusion
References
Cloud Computing: An Analysis of Authentication Methods Over Internet
1 Introduction
2 Review of Literature
3 Objective of the Study
4 Methodology
5 Data Analysis
5.1 Respondents Occupation
5.2 Respondents Designation/Role
5.3 Respondents Industry/Organization Type
5.4 Which Method of Authentication Do You Use Normally?
5.5 How Long Has Your Organization Been Using Previously Mentioned Authentication Method?
5.6 How Do You Rate the Performance of the Authentication Method Which Has Been Using in Your Organization on the Parameters to Give Accuracy, Ease of Use, and User’s Acceptance?
5.7 Do You Think Current Authentication Method is Effective?
5.8 Which Authentication Method Do You Think is More Secure?
6 Conclusion
References
Transforming India’s Social Sector Using Ontology-Based Tantra Framework
1 Introduction
2 Literature Survey
3 Ontology-Based Tantra Framework
3.1 Tantra Good Governance Framework
3.2 Tantra Digital Governance Framework
4 Transforming Social Sector Using Tantra Framework
5 Discussions
6 Conclusions
References
Design of Low Power and High-Speed 6-Transistors Adiabatic Full Adder
1 Introduction
2 Previous Work
3 Adiabatic Logic
4 Design and Implementation of Proposed Adiabatic Full Adder
5 Comparative Analysis of Full Adder Design Using Different Adiabatic Techniques
6 Conclusion
References
Snappy Wheelchair: An IoT-Based Flex Controlled Robotic Wheel Chair for Disabled People
1 Introduction
2 Background Study
3 Methodology
4 Results
5 Conclusion
References
Speed Limit Control and Wildlife Protection
1 Introduction
2 Literature Review
3 Proposed Methods
3.1 GPS Module
3.2 Raspberry Pi
4 Methodology
5 Conclusion
References
Digital Payments: An Indian Perspective
1 Introduction
2 Research Statement
2.1 Research Objectives
2.2 Methodology
3 Global Scenario of Digital Payments
4 Digital India Initiative
5 Smart City Mission
6 Case City 1—Ahmedabad Smart City
7 Case City 2—Rajkot Smart City
8 Conclusion
References
Race Recognition Using CNN Architecture
1 Introduction
2 Literature Review
2.1 Related Work
2.2 Datasets Used in Previous Studies
3 Race Dataset and Research Methodology
3.1 Dataset of Ethnic Facial Images of Ecuadorian People
4 Network Architecture
4.1 Experiment
5 Conclusion
References
Private Cloud Configuration Using Amazon Web Services
1 Introduction
2 Private Cloud and Configuration Tools
2.1 Eucalyptus
2.2 OpenNebula
2.3 CloudStack
3 Building a Virtual Private Cloud with Amazon Web Services
3.1 Steps to Create VPC
3.2 Steps to Create Public and Private EC2 Instance on VPC
4 Conclusion
References
Application of Python Programming and Its Future
1 Introduction
2 Characteristics and Features of Python Programming
3 Advantages and Disadvantages
4 Conclusion
5 Future Scope
References
A Survey on Metaheuristics-Based Task Scheduling
1 Introduction
2 Related Work
2.1 Task Scheduling Framework
3 Research Challenges in Task Scheduling in CC
4 Conclusion
References
Smart-Bin: IoT-Based Real-Time Garbage Monitoring System for Smart Cities
1 Introduction
2 Related Work
3 System Architecture
3.1 Hardware Components
3.2 Software Components
3.3 Priority-Based Servicing of Dustbins
4 Working of Smart Dustbin Explained
5 Conclusion and Future Work
References
Optimization in Artificial Intelligence-Based Devices and Algorithms for Efficient Training: A Survey
1 Introduction
1.1 The Intelligence Shift from the Cloud to the Edge
2 Optimization Process in AI-Based Devices
2.1 Typical AI Systems Constraints Cases
2.2 Challenges in AI-Based Systems
3 Optimization Techniques
4 Conclusion
References
Improving the Cyber Security by Applying the Maturity Model Case: Electricity Industry of Iran
1 Introduction
2 Cyber Security
3 Cyber Security in Iran’s Electricity
4 Research Methodology
4.1 Recognition Phase
4.2 Adaptation Phase
4.3 Data Collection Phase
4.4 Data Description Phase
5 Conclusion
References
Encryption and Decryption Scheme for IoT Communications Using Multilevel Encryption
1 Introduction
2 Proposed Methods
2.1 Key Generation
2.2 Encryption Algorithm
2.3 Decryption Algorithm
3 Results and Discussion
4 Conclusion
References
Susceptibility of Changes in Public Sector Banks with Special Emphasis on Some Newly Merged Banks: Focus on Cash Flow Risk
1 Introduction
2 Literature Review
3 Research Methodology
4 Results and Discussion
5 Conclusion
References
Fusion of Face Recognition and Number Plate Detection for Automatic Gate Opening System
1 Introduction
2 System Design
3 Methodology
3.1 Automatic Number Plate Detection
3.2 Learning-Based Face Recognition
3.3 ResNet
3.4 Datasets
3.5 Animation of Gate Opening
4 Results
5 Conclusion
References
Study of Text-to-Speech (TTS) Conversion for Indic Languages
1 Introduction
2 Text-to-Speech Conversion
2.1 Concatenation
2.2 Pure Synthesis
2.3 Neural Networks-Based TTS Conversion
3 Literature Review
4 Conclusion
References
Wireless Sensor Network Based Architecture for Agriculture Farm Protection in India
1 Introduction
1.1 Current State of Indian Agriculture Sector
1.2 Importance of Indian Agriculture On Indian Economy
1.3 Issues and Challenges Facing By Indian Farm and Indian Agriculture Sector
2 Literature Review Survey
3 Wireless Sensor-Based Agriculture Farm Protection Architecture
4 Conclusion
References
Comparative Analysis of Volume Rendering Techniques on Craniofacial CT Images
1 Introduction
2 Literature Review
2.1 3D Volume Rendering
3 Data Acquisition
4 The 3D Visualization System Design Methodology
5 Results
6 Conclusion
References
Implementation of Different MAC Protocols for IoT
1 Introduction
2 Network Layer
3 MAC Layer Protocols
3.1 CSMA/CA
3.2 NullMAC
4 The Evaluated RDC Layer Protocols
4.1 ContikiMAC
4.2 XMAC
4.3 CXMAC
4.4 NullRDC
5 The Evaluated RDC Layer Protocols
5.1 Average Power Consumption
6 Hardware Implementation
7 Conclusion
8 Future Scope
References
Analysis of Diseases in Plant’s Leaves Using Deep Learning Techniques
1 Introduction
2 Related Work
3 Deep Learning Basic Process
4 Deep Learning Platforms
5 Convolution Neural Network Model
References
On Statistical Tools in Finding Equitable Antimagic Labeling of Complete Graphs
1 Introduction
2 Equitable Antimagic Labeling of Complete Graphs
3 Conclusion
References
Identifying the Alterations in the Microbiome Using Classification and Clustering Analysis: A Path Towards Microbiome Bio-Tech Innovations
1 Introduction
2 Materials and Methods
2.1 Materials
2.2 Methods
3 Result Analysis
3.1 Random Forest Classifier (RFC)
3.2 β-Diversity Assessment
3.3 Spectral Clustering Algorithm (SC)
4 Conclusion
5 Future Scopes
References
Segmentation of Brain Tumor from MR Images Using SegX-Net an Hybrid Approach
1 Introduction
2 Review of Literature
3 Proposed Method
3.1 Prepossessing
3.2 Data Augmentation
3.3 Segmentation
4 Experimentation
4.1 Results
4.2 Discussion
5 Conclusion
References
Digital India eGovernance Initiative for Tribal Empowerment: Performance Dashboard of the Ministry of Tribal Affairs
1 Introduction
2 Performance Dashboard—Digital Transformation
3 Development Guidelines
3.1 Theoretical Framework
3.2 Ensuring the Quality of Data
3.3 Challenges
4 Discussion and Conclusion
4.1 Digital Inclusion
4.2 Financial Inclusion
4.3 Productivity Enhancement
References
A Review on the Contribution of IoT in Various Domains of Supply Chain Industry
1 Introduction
2 Literature Review
3 Conclusion, Current Challenges, and Future Directions
References
Optimization-Based Boosting Feature Selection Method for Water Quality Classification
1 Introduction
2 Proposed Optimization-Based Boosting Feature Selection Technique
2.1 Gradient Boosting Tree (GBT) Technique
2.2 Ant Colony Optimization Technique
2.3 Proposed Optimization-Based Boosting Feature Selection Method
3 Result and Discussion
3.1 Data set Description
3.2 Number of Features Obtained
3.3 Performance Analysis
4 Conclusion
References
Data Analytics Implementations in Indian e-Governance
1 Introduction
2 Data Analytics Ecosystem
2.1 Data Characteristics (Traditional Data Versus Big Data)
2.2 The Analytics Value Escalator
3 Possible Analytics Use Cases
3.1 Data Characteristics (Traditional Data Versus Big Data)
3.2 Public Distribution System (PDS)
3.3 Centralized Public Grievance and Redress Monitoring System (CPGRAMS)
3.4 Public Financial Management System (PFMS)
3.5 Social Media Analytics
3.6 Log Data Analytics
4 Analytics Solution Models in e-Governance
5 Technological Stack for Data Analytics in e-Governance
6 Data Analytics Success Factors in e-Governance
7 Conclusion
References
Image Fusion in Multi-view Videos Using SURF Algorithm
1 Introduction
2 Proposed Work
3 Results and Discussion
4 Conclusion
References
Multi-device Login Monitoring for Google Meet Using Path Compressed Double-Trie and User Location
1 Introduction
2 Literature Review
3 Methodology and Implementation
3.1 Database Schema
3.2 User Login Through Only One Geographical Vicinity
3.3 Time-Complexity Analysis
4 Experimental Setup and Results
5 Conclusions and Future Work
References
Analysis of Various Boosting Algorithms Used for Detection of Fraudulent Credit Card Transactions
1 Introduction
2 Related Studies
3 Analysis of Boosting Algorithms
4 Performance Measure
5 Conclusion and Future Work
References
ICT Tools for Fishermen Assistance in India
1 Introduction
2 Information and Communication Technology (ICT) Tools
2.1 Radio and Television
2.2 Wireless Set
2.3 Computers
2.4 Internet
2.5 Mobile Phone
3 Technologies Used
3.1 SONAR
3.2 GPS
3.3 VMS and AIS
3.4 Remote Sensing and Geographic Information Systems
3.5 In Situ Sensing
3.6 Blockchain Technology
3.7 IoT
3.8 Big Data, Artificial Intelligence (AI) and Machine Learning (ML)
4 Conclusion
References
Mood Analysis of Bengali Songs Using Deep Neural Networks
1 Introduction
2 Related Works
3 Sentiment Analysis of Bengali Songs
3.1 Bengali Text Processing
4 Dataset
4.1 Data Annotation
5 Methodology
5.1 Performance of Supervised Classification Algorithms
5.2 Performance Evaluation of Deep Learning Algorithms
6 Results
7 Conclusion
References
Human Voice Sentiment Identification Using Support Vector Machine
1 Introduction
2 Methodology
2.1 Voice Sentiment Database
2.2 Feature Extraction Methods
2.3 Principal Component Analysis (PCA)
2.4 SVM Classifier
3 Experimental Results
4 Conclusion
References
Statistical Analysis of Thermal Image Features to Discriminate Breast Abnormalities
1 Introduction
2 Methods and Materials
2.1 Breast ROI Extraction
2.2 Statistical Feature Extraction
2.3 Test of Gaussian Nature with Quantile–Quantile Plot and Statistical Test of Significance of Features
3 Classification Using Machine Learning Models
4 Results and Discussion
5 Conclusion
References
MIMO Systems in Wireless Communications: State of the Art
1 Introduction
1.1 Development Stages of MIMO Systems
1.2 Types of MIMO
2 Effect of Number of Antennae on Performance of the System
2.1 Capacity of SISO System
2.2 Capacity of SIMO System
2.3 Capacity of MISO System Model
2.4 Capacity of a MIMO System
3 Challenges and Limitations of MIMO Systems
4 Conclusions
References
Hydrogen by Process of Water Electrolysis for Power Generation and a Review of Fuel Cell Technologies
1 Introduction
2 Hydrogen Internal Combustion Engines
2.1 Port Injection System
2.2 Direct Injection System
2.3 Central Injection System
3 Fuel Cell Technologies
3.1 Fuel Cell Applications and Usage
4 Comparison of Hydrogen ICE and Fuel Cell
5 Conclusion
References
Iris Presentation Attack Detection for Mobile Devices
1 Introduction
2 The Proposed Iris PAD Approach
3 Datasets and Experimental Setup
4 Experimental Outcomes
4.1 Results on Notre-Dame Dataset
4.2 Results on IIITD WVU Dataset
4.3 Results on Clarkson Dataset
5 Conclusion
References
Enhanced Performance of Novel Patch Antenna Sub-array Design for Use in L-Band Ground Station Receiver Terminals Linked to Aerospace Platforms
1 Introduction
1.1 Methodology
2 Design of Antennae
2.1 Rectangular Patch Antenna
2.2 Circular Patch Antenna
2.3 Bow and Tie Patch Antenna
3 Optimization Procedure for Patch Width of the Antenna
4 Results and Discussion
4.1 Return Loss Comparison
4.2 Bandwidth
4.3 Far-Field Pattern
5 Conclusion
References
Author Index