This book features selected research papers presented at the Third International Conference on Computing, Communications, and Cyber-Security (IC4S 2021), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India, during October 30–31, 2021. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.
Author(s): Pradeep Kumar Singh, Sławomir T. Wierzchoń, Sudeep Tanwar, Joel J. P. C. Rodrigues, Maria Ganzha
Series: Lecture Notes in Networks and Systems, 421
Publisher: Springer
Year: 2022
Language: English
Pages: 939
City: Singapore
Preface
Contents
Editors and Contributors
Communication and Network Technologies
Enhancement of Energy Efficiency in Wireless Sensor Network with Mobile Sink: A Survey
1 Introduction
2 Challenges with WSN
3 Data Collection Approaches
4 Classification of WSN
5 Designing of Wireless Sensor Network
6 Data Flow Through Optimal Path
7 Optimal Data Flow
8 Conclusion
References
Conversion of Intermittent Water Supply to Continuous Water Supply of Chandigarh: A Case Study
1 Introduction
1.1 Area, Population, and Its Present Water Source Scenario
1.2 Disadvantages of Intermittent Water Supply Over Continuous Water Supply
2 Need
3 Objectives
4 Methodology to Meet the Desired Goal of Achieving Continuous Water Supply
4.1 Hydraulic Modelling
4.2 Integration of DMA with SCADA
4.3 Calibration of Distribution Network
4.4 Revision of Tariff System
4.5 NRW Reduction Measures
4.6 Reuse of Treated Water
4.7 IoT-Based System for Continuous Supply
5 Other Proposed Algorithm
6 Literature Review
7 Pilot Study and Experimental Analysis
7.1 Pilot Study 1
7.2 Pilot Study 2
8 Conclusion
References
A Novel Compression Method for Transmitting Multimedia Data in Wireless Multimedia Sensor Networks
1 Introduction
2 Related Work
3 Materials and Methods for Data Compression
4 Simulation Results
4.1 Performance Parameters for Image Signal
5 Conclusions
References
Live Temperature Monitoring: IoT-Based Automatic Sanitizer Dispenser and Temperature Detection Machine
1 Introduction
2 System Design
2.1 Novelties of Proposed Work:
3 Detail Design for the Setup
3.1 The Layered Design
3.2 List of Components Used in the Undertaken Study
4 Materials and Method
5 Results and Discussion
6 Limitations of the Proposed Work
7 Conclusions and Future Enhancements
References
A Comparative Study of Security Issues and Attacks on Underwater Sensor Network
1 Introduction
2 Constraints and Distinctive Features
3 Security Prerequisite
3.1 First Priority
3.2 Second Priority
4 Threats on UWSN
4.1 Active Attack
4.2 Passive Attack
5 Layered-Wise Attack
5.1 Physical Layer Attacks
5.2 Link Layer Attacks
5.3 Network Layer Attacks
5.4 Transport Layer Attacks
5.5 Application Layer Attacks
6 Privacy Concern in UWSN
7 Conclusion
References
Discrete Event Driven Routing in SHIP Network using CupCarbon Simulation Tool
1 Introduction
2 Literature Survey
3 Methodology Adopted
4 Experimental Setup
5 Result
6 Conclusion
References
Multiband Dual-Layer Microstrip Patch Antenna for 5G Wireless Applications
1 Introduction
2 Related Work
3 Organization
4 Design Consideration
5 Design Parameters
6 Result and Discussion
7 Conclusion
References
Distance-based Energy-Efficient Clustering Approach for Wireless Sensor Networks
1 Introduction
2 Literature Review
3 System Model
3.1 Energy Consumption Model
3.2 Proposed Work
4 Simulation Result and Analysis
4.1 Simulation Environment
4.2 Simulation Outcome
5 Conclusion
References
Emerging Communication Technologies for Industrial Internet of Things: Industry 5.0 Perspective
1 Introduction
2 Literature Review Process
2.1 Research Questions
2.2 Information Source
3 Literature Survey
4 Open Research Challenges and Opportunities
5 Directions toward Industry 5.0
6 Conclusion
References
Explainable Artificial Intelligence (XAI): Connecting Artificial Decision-Making and Human Trust in Autonomous Vehicles
1 Introduction
2 Autonomous and Semi-Autonomous Vehicles
3 Current Processes in Vehicle Autonomy
4 Explainable Artificial Intelligence (XAI) and Its Principles
5 Motivation
6 Vision Learning for Autonomous Vehicles
7 Self-Driving Ethics/Morality and Trust in Connected and Autonomous Vehicles
7.1 Trust in Connected and Autonomous Vehicles
7.2 Privacy in Connected and Autonomous Vehicles
7.3 Trust and Privacy Issues in General Vehicle Adhoc Networks
8 Simulation Results
9 Conclusion
References
Advanced Computing Technologies
An Empirical Study of Design Techniques of Chatbot, a Review
1 Introduction
2 Background
2.1 Chatbot System
2.2 Applications of Chatbots
3 Review of Chatbot Design
3.1 Chat.io
3.2 Collect.chat
3.3 Cleverbot
4 Discussion
4.1 Working of Chatbot
4.2 Chatbots Design Techniques
5 Conclusions
References
An Approach for Cloud Security Using TPA- and Role-Based Hybrid Concept
1 Introduction
2 Literature Survey
3 Proposed Work
3.1 New User Creation
3.2 Existing User Login
3.3 File Upload
3.4 File Request
3.5 TPA Grant Access
3.6 User Accessing File
4 Implementation and Result Analysis
4.1 Device 1: Rumkin Test
4.2 Device 2: Cryptool
5 Conclusion
References
Decision Tree Algorithm for Diagnosis and Severity Analysis of COVID-19 at Outpatient Clinic
1 Introduction
1.1 Objective
2 Literature Review
3 Methodology
3.1 Data Collection
3.2 SPSS Modeler
3.3 Partitioning and Feature Selection
3.4 CART—Classification and Regression Tree Algorithm
4 Results
4.1 Data Analysis
4.2 Predicted Decision Tree
5 Discussion
6 Conclusion
7 Future Considerations
References
CSBRCA: Cloud Security Breaches and Its Root Cause Analysis
1 Introduction to Cloud Security
1.1 Contribution
1.2 Motivation
2 Proposed Methodology
3 Performance Analysis
3.1 Experimental Setup
3.2 Methodology Used
4 Case Study
5 Conclusion and Future Work
References
A Mobile-Based Patient Surgical Appointment System Using Fuzzy Logic
1 Introduction
2 Related Work
2.1 Patient Waiting Time
2.2 Appointment and Scheduling Management System
2.3 Types of Patient Appointment Scheduling
3 Methodology
3.1 Fuzzy Set
3.2 Membership Function
3.3 Defuzzification
4 Implementation and Discussion
4.1 Fuzzy Logic Membership Function Plots and Rule Editor
5 Discussion
6 Conclusion
References
Implementation of Green Technology in Cloud Computing
1 Introduction
2 An Overview of Cloud Computing
3 Survey
3.1 Task Scheduling Solution
3.2 Data Centers
3.3 Load Balancing Solutions
4 Future Scope
5 Conclusion
References
Concurrency Control in Distributed Database Systems: An In-Depth Analysis
1 Introduction
2 Concurrency in Distributed Database
3 Different Methods of Concurrency Control
3.1 Two-Phase Locking (2PL)
3.2 Strict Two-Phase Locking (S2PL)
3.3 Basic Timestamp Ordering (BTO)
3.4 Distributed Speculative Locking (DSL)
4 Analysis
5 Conclusion
References
House Pricing Prediction Based on Composite Facility Score Using Machine Learning Algorithms
1 Introduction
2 Related Work
3 Data Set Description
4 Process Flow Diagram
4.1 Linear Regression
4.2 Random Forest
4.3 Decision Tree
4.4 KNN
4.5 XGBoost Regressor
4.6 Support Vector Machine
5 Experimentation and Result
5.1 Procedure
5.2 Location, Area, and Facilitywise Price Prediction
6 Conclusion
7 Future Scope
References
Malicious Website Detection Based on URL Classification: A Comparative Analysis
1 Introduction
2 Research Methodology
3 Analysis of Features Extracted from Web URLs
4 Classification Models for Phishing Detection Based on Web URLs
4.1 Performance Comparison of Classification Models
4.2 Discussion and Results Analysis
5 Conclusion
References
Attribute Selection, Sampling, and Classifier Methods to Address Class Imbalance Issues on Data Set Having Ratio Less Than Five
1 Introduction
2 Class Issues
2.1 Imbalanced Composition of the Class
2.2 Shortage of Evidence Arising From a Limited Sample Size
2.3 Overlapping Groups or the Complexity of Classes
2.4 Minor Disjuncts Within the Imbalance of Class
3 Identification of Class Disparity Approaches
3.1 Solution to the Data Stage for Managing the Class Imbalance Problem
4 Indicators of Success
5 Research Work
6 Conclusion
References
Timely Prediction of Diabetes by Means of Machine Learning Practices
1 Introduction
2 Literature Review
3 Methodology
3.1 Pima Indian Diabetes Dataset
3.2 Data Cleaning
3.3 Data Preprocessing
3.4 Feature Selection
3.5 Voting Classifier Using Python Library Scikitlearn
4 Experiment and Results
5 Conclusion
References
Data Analytics and Intelligent Learning
Detection of Brain Tumor Using K-Means Clustering
1 Introduction
2 Review of K-means Clustering and Histogram Statistics
3 Methodology
3.1 Preprocessing
3.2 Segmentation Process
3.3 Feature Extraction
4 Result and Discussion
5 Conclusion
References
On Efficient and Secure Multi-access Edge Computing for Internet of Things
1 Introduction
2 Literature Survey
3 Edge Computing
3.1 Edge Computing Architecture
4 Multi-access Edge Computing Challenges
5 Security Preserving Mechanisms on Edge
6 Conclusion
References
Execution Survey and State of the Art of Different ML-Based Ensemble Classifiers Approach Contextual Analysis of Spam Remark Location
1 Introduction
2 Background Knowledge
2.1 Dataset Preparation
2.2 Pseudocode of the Different Ensemble Classifier
3 Methodology
4 Result Analysis
5 Conclusion
References
Real-Time Eyesight Power Prediction Using Deep Learning Methods
1 Introduction
2 Literature Survey
3 Proposed Model
4 Flow Diagram
5 Experimental Study
6 Model for Axis
7 Model for Spherical Power
8 Model for Cylindrical Power
9 Model for Addition Power (Presbyopia)
10 Conclusion
References
An Unsupervised Machine Learning Approach to Prediction of Price for Taxi Rides
1 Introduction
2 Related Works
3 Motivation
4 Methodology
5 Results
6 Conclusion
References
Facial Landmark Features-Based Face Misclassification Detection System
1 Introduction
2 Scope of Study
3 Biometric Anti-spoofing
4 Proposed Approach
4.1 ABT Concept
5 Result and Discussion
5.1 Replay-Attack Spoof Databases
6 Conclusion
7 Future Scope and Applications
7.1 Applications
References
Predictive Model for Agriculture Using Markov Model
1 Introduction
2 Related Work
3 Proposed System
3.1 Web Server
3.2 Learning-Based Model (Markov Chain)
4 Experiment and Results
5 Conclusion
References
A Comparative Analysis of Edge Detection Using Soft Computing Techniques
1 Introduction to Edge Detection
1.1 Edge
1.2 Edge Detection
2 Ant Colony Optimization
2.1 Ant Colony System (ACS)
2.2 Edge Detection Using Ant Colony Optimization
3 Particle Swarm Optimization (PSO)
3.1 Introduction to PSO
3.2 Edge Detection Using PSO
4 Genetic Algorithm (GA)
4.1 Edge Detection Techniques Using Genetic Algorithms (GA)
5 Fuzzy Logic
5.1 Fuzzy Logic System (FLS)
5.2 Fuzzy Logic-Based Edge Detection
6 Conclusion
References
A Comprehensive Study of Pose Estimation in Human Fall Detection
1 Introduction
2 Related Work
3 Pose Estimation Methods
3.1 PersonLab (PoseNet)
3.2 OpenPose
4 Pose Estimation and Fall Detection
5 Privacy Concerns Related to Camera-Based Sensors
6 Conclusion
References
Study and Develop a Convolutional Neural Network for MNIST Handwritten Digit Classification
1 Introduction
2 CNN Modeling for Classification of Handwritten Digits
2.1 Advantages of CNN
3 Dataset MNIST
4 Literature Survey
5 Experimental Result and Discussion
6 Conclusion
7 Future Work
References
Unravel the Outlier Detection for Indian Ayurvedic Plant Organ Image Dataset
1 Introduction
2 Related Work
3 Proposed Work
3.1 Dataset
3.2 Feature Extraction
3.3 Experiments
4 Results and Discussion
5 Conclusion
References
A Review on Service Delivery in Tourism and Hospitality Industry Through Artificial Intelligence
1 Introduction
2 Leveraging AI-Enabled Tools in Hospitality Industry
2.1 Chatbots
2.2 Smart Room with Voice Control System
2.3 Facial Recognition
2.4 Operational Analysis
2.5 Virtual Reality
2.6 Robots
2.7 Attitude of Customer or Acceptance
2.8 AI in Tourism and Hospitality
3 Findings and Discussion
4 Future Scope of Research
5 Conclusion
References
MegaMart Sales Prediction Using Machine Learning Techniques
1 Introduction
2 Methodology
2.1 Dataset Description
2.2 Data Pre-processing
2.3 Univariate Analysis
2.4 Bivariate Analysis
2.5 Correlation Matrix
3 Implementation and Result
3.1 Linear Regression Model
3.2 Decision Tree Model
3.3 Random Forest Model
3.4 XGBoost Model
4 Conclusion
References
Collaborative Filtering-Based Music Recommendation in View of Negative Feedback System
1 Introduction
1.1 MRS in Indian Context: A Statistical Mapping
2 State of the Art
3 The Proposed MRS Architecture
3.1 Memory-Based Collaborative Filtering
3.2 Memory-Based Content RS
3.3 The Proposed Negative Feedback System
4 Implementation and Execution
4.1 Environment Set-up
4.2 Public Datasets
4.3 Characteristics of Dataset
4.4 Results and Discussion
5 Conclusion
References
Internet of Things-Based e-Health Care: Key Challenges and Recommended Solutions for Future
1 Internet of Things—Introduction
2 Security and Privacy Requirement Toward Internet of Things-Based Applications
2.1 Security Requirements for IoT-Based Health Care/Medical Internet of Things (MIoT)
2.2 Security Requirements for IoT-Cloud-Based e-Health Systems
2.3 Privacy Requirements for IoT-Cloud-Based e-Health Systems
2.4 System Requirements of IoT-Cloud-Based e-Health Systems
3 Existing Solutions for Internet of Things-Based Health Care/Medical Internet of Things (MIoT)
4 Internet of Things Healthcare Security
5 Internet of Things-Based Healthcare Technologies
6 Future Challenges Involved Internet of Things-Based Health Care
7 Conclusion
8 Future Work
References
Deep Learning and Machine Intelligence for Operational Management of Strategic Planning
1 Introduction
2 Machine Learning Preparedness for Organizations
3 As in Present Era, with Idea of AI Technology
4 Adopting Machine Learning on the Cyber-Horizon
5 Discussion
6 Conclusions
References
Machine Learning-Enabled Estimation System Using Fuzzy Cognitive Mapping: A Review
1 Introduction
2 Related Work
3 Machine Learning-Based Web Effort Estimation
3.1 Existing Framework
3.2 Recommendation System Based on FCM
3.3 Research Gaps
4 Conclusion and Future Scope
References
Latest Electrical and Electronics Trends
Energy Efficiency in IoT-Based Smart Healthcare
1 Introduction
2 IoT Versus WSN
3 Related Work
4 Smart Healthcare: Energy Consumption Challenges
5 Smart Healthcare: Energy Preserving Mechanisms
6 Conclusion
References
T-Shaped MIMO Microstrip Patch Antenna for C-Band Applications
1 Introduction
2 Geometry of the TSMMPA
3 Results and Discussion
4 Conclusion
References
Eye Disease Detection Using Transfer Learning on VGG16
1 Introduction
2 Related Work
3 Methodology
4 Experimental Work and Statistical Analysis
5 Results
6 Conclusion and Future Scope
References
Text-Based Automatic Personality Recognition: Recent Developments
1 Introduction
2 Personality Models
3 Research Methodology
4 Literature Review
5 Open Research Challenges
6 Discussion
7 Conclusion
References
Use of a Precious Commodity—‘Time’ for Building Skills by Teachers for Online Teaching During Pandemic by Using Decision Tree and SVM Algorithm of Machine Learning
1 Introduction
2 Review of Literature
3 Objectives
4 Data Analysis
5 Classification Algorithm of Machine Learning
6 Conclusion of Hypothesis Based on This Decision Tree
7 Findings
8 Suggestions
9 Conclusion
References
Road Lane Line Detection Based on ROI Using Hough Transform Algorithm
1 Introduction
2 Related Work
3 Proposed Architecture
4 Proposed Architecture
4.1 Data Description
4.2 Process Flow Diagram
5 Experimentation and Result
5.1 Procedure
6 Conclusion
References
Dimensionality Reduction-Based Discriminatory Classification of Human Activity Recognition Using Machine Learning
1 Introduction [1, 2]
2 Related Work
3 Proposed Framework
4 Experimental Results
5 Conclusion and Future Scope
References
SPECIAL SESSION ON RECENT ADVANCES IN COMPUTATIONAL INTELLIGENCE & TECHNOLOGYS (SS10RACIT)
1 Introduction
2 Related Work
3 Proposed Framework
3.1 Experimental Setup
3.2 Representation of Dataset
3.3 Preprocessing and Architecture
3.4 Calculation of Fitness Function
4 Results and Discussion
5 Conclusion and Future Work
References
Cryptanalysis on ``ESEAP: ECC-Based Secure and Efficient Mutual Authentication Protocol Using Smart Card''
1 Introduction
1.1 Road Map
2 Related Works
3 ESEAP Protocol
3.1 Initialization and Registration Phase
3.2 Mutual Authentication Phase
4 Cryptanalysis of Kumari et al. Protocol
4.1 Stolen Verifier Attack
4.2 User's Anonymity
4.3 Key Computation
4.4 IDi Problem in LA3 of the Protocol
5 Discussions on RESEAP
5.1 Offline Password Guessing Attack
5.2 Smart Card Lost Attack
5.3 Desynchronization Attack
6 Conclusion
References
Modeling, Simulation, and Comparative Analysis of Flyback Inverter Using Different Techniques of PWM Generation
1 Introduction
2 Working Principle
2.1 Advantages of Flyback Converter
3 Modeling of Open-Loop Flyback Inverter with Pulse Generator
4 Open-Loop Flyback Inverter with Pulse-Width Modulation (PWM) Technique
5 Open-Loop Flyback Inverter with Sinusoidal Pulse-Width Modulation (SPWM) Technique
6 Results and Discussion
7 Conclusion
References
Industrial Rod Size Diameter and Size Detection
1 Introduction
2 Literature Survey
3 Proposed Method
4 Proposed Method
5 Conclusion
References
Sentiment Analysis of Twitter Data Using Clustering and Classification
1 Introduction
1.1 Twitter Sentiment Classification Algorithms
2 Literature Review
3 Research Methodology
3.1 Dataset Collection and Preprocessing
3.2 Feature Extraction and Feature Reduction
3.3 Clustering
3.4 Classification
4 Result and Discussion
5 Conclusion
References
Security and Privacy Issues
Image Distortion Analysis in Stego Images Using LSB
1 Introduction
2 Literature Review
3 Proposed Implementation
3.1 Algorithm
3.2 Flowchart
4 Evaluation Parameters
4.1 Peak Signal-to-Noise Ratio (PSNR)
4.2 Structural Similarity Index (SSIM)
5 Result Analysis
6 Conclusion
References
Towards a Secured IoT Communication: A Blockchain Implementation Through APIs
1 Introduction
2 Material and Methods
2.1 Blockchain Technology
2.2 Blockchain Implementation
2.3 Internet of Things (IoT) Issues and Concerns
2.4 Handling of IoT Issues Using Blockchain
3 Results
4 Conclusion and Future Scope
References
Application of Truffle Suite in a Blockchain Environment
1 Introduction
2 Material and Methods
2.1 Blockchain Technology
2.2 Truffle Suite
2.3 Smart Contracts in Blockchain
2.4 Meta Mask
2.5 Application of Truffle Suite in Blockchain
3 Conclusion and Future Scope
References
Assessment of Compliance of GDPR in IT Industry and Fintech
1 Introduction
1.1 GDPR
1.2 Aims and Objectives of the Research Study
2 Literature Review
3 Research Methodology
4 Result Analysis
5 Discussion and Analysis
6 Conclusion and Limitation
References
Digitally Signed Document Chain (DSDC) Blockchain
1 Introduction
1.1 Chaining Blocks
1.2 Hash Functions
1.3 Digital Signature
1.4 Asymmetric-Key Cryptography
2 Background and Literature Review
3 Purpose of Digitally Signed Document Chain (DSDC)
3.1 Document Storage and Security
3.2 Document Sharing and Authentication
4 Updation of Document Block by Utilizing Enhance Chameleon-Hash Function with Trapdoor Implementation
5 Conclusion
References
Algorithms of AI in Deciding Optimum Mix Design of Concrete: Review
1 Introduction
2 Novelty of Work/Research Significance
3 Literature Review
4 Conclusions
References
A Review of Integration of Data Warehousing and WWW in the Last Decade
1 Introduction
2 Systematic Literature Review (SLR) Process
2.1 Aim of Research
2.2 Search Process
3 State of the Art
4 Literature Review Results
4.1 Research Question-1: Most Relevant Research Categories
4.2 Research Question-2: Major Application Areas
4.3 Research Question-3: Open Research Issues Related to Current Trends
5 Conclusion
References
WeScribe: An Intelligent Meeting Transcriber and Analyzer Application
1 Introduction
2 Literature Review
2.1 Voice Recognition
2.2 Information Extraction
3 Proposed System Methodology
3.1 Presentation Layer
3.2 Application Layer
3.3 Domain Layer
3.4 Data Layer (Infrastructure)
3.5 General View of the System
4 Application Functionalities and Limitations
5 Results
6 Conclusion
References
Customer Churn Prediction in Banking Industry Using Power Bi
1 Introduction
2 Related Works
3 Methodology
4 Results and Discussion
5 Conclusion and Future Work
References
Issues in Credit Card Transactional Data Stream: A Rational Review
1 Introduction
2 History of Credit Cards
3 Credit Card Processing
4 Types of Credit Card Transactions
5 Types of Credit Card Fraud
5.1 Card Not Present
5.2 Skimming
5.3 Phishing
6 Fraud Detection System
7 Based on Supervised Learning
8 Based on Unsupervised Learning
9 Based on Nature Inspired
10 Literature Review
11 Critical Areas for Attentions
11.1 Concept Drift
11.2 Imbalanced Classes
11.3 Deficiency of Real-Time FDS
11.4 Fraud Detection Cost over Expenses
11.5 Deficiency of Adaptability
11.6 Deficiency of Availability of Know-How
11.7 Unavailability of Open Datasets for Testing
11.8 Deficiency of Aggregation Possibility to Leverage Cross User Data
11.9 Unavailability of Standard FDS Framework
11.10 Problem of Conflict
12 Result and Conclusion
References
Artificial Intelligence-Based Smart Packet Filter
1 Introduction
1.1 Packet-Filtering Firewall
1.2 Circuit-Level Gateway
1.3 Stateful Inspection Firewall
1.4 Application-Level Gateway
1.5 Next-Generation Firewall
1.6 Deployment
2 Dataset
3 Data Visualization
4 Features of Dataset
5 Validation Technique
6 Proposed Approach
7 Results
8 Comparison with Previous Research
9 Conclusion
References
Preserving Privacy in Internet of Things (IoT)-Based Devices
1 Introduction
2 Literature Survey
2.1 IoT Sleep Trackers
2.2 Privacy and Security Concerns
2.3 Man-in-the-Middle Attacks
2.4 MIT-IoT
2.5 Address Resolution Protocol (ARP)
3 Existed and Proposed Solutions for Privacy-Preserving in the Internet of Things
4 Simulation Results, Conclusion, and Future Work
5 Conclusion and Future Work
References
A Sentiment Analysis-Based Recommender Framework for Massive Open Online Courses Toward Education 4.0
1 Introduction
2 Related Work
3 Proposed Architecture
4 Algorithm Design
5 Results
6 Conclusion and Future Work
References
Lung Cancer Detection Using Textural Feature Extraction and Hybrid Classification Model
1 Introduction
1.1 Lung Cancer
1.2 Lung Cancer Detection Process
2 Literature Review
2.1 Lung Cancer Detection Using Deep Learning
2.2 Lung Cancer Detection Using Machine Learning
2.3 Lung Cancer Detection Using Image Processing
3 Research Methodology
3.1 Dataset Description
3.2 Proposed Model
4 Experiment Result Analysis
4.1 Accuracy Analysis
4.2 Precision and Recall Analysis
5 Conclusion
References
Overview of Security Approaches Using Metamorphic Cryptography
1 Introduction
2 Metamorphic Cryptography
2.1 Terminologies
2.2 Evaluation Parameters
2.3 Classification
3 Literature Survey
4 Result and Discussion
5 Conclusion
References
A Bibliometric Analysis to Unveil the Impact of Digital Object Identifiers (DOI) on Bibliometric Indicators
1 Introduction
1.1 Research Objectives
2 Data Description
2.1 Data Selection
2.2 Data Filtration
3 Results
3.1 At Author Level
3.2 At Organization Level
3.3 At Journal Level
4 Discussion and Conclusion
References
Cyber Attack Modeling Recent Approaches: A Review
1 Introduction
2 Cyber Attack Modeling Framework
2.1 Network Information Collection
2.2 Attack Model Generation
2.3 Attack Model Formalization
2.4 Application
3 Attack Graph
3.1 Rechability Test
3.2 Attack Graph Generation
3.3 Attack Graph Building Phase
4 Attack Tree
4.1 Formal Representation
4.2 Model Generation
4.3 Security Analysis
5 Conclusion
References
A Secure DBA Management System: A Comprehensive Study
1 Introduction
1.1 Objective of Secure DBA System
2 The Security Mechanism
2.1 Symmetric Encryption
2.2 Asymmetric Encryption [5–7]
3 Database Security Threats
4 Limitations
5 Future Enhancements
6 Conclusion
References
Education 4.0: Hesitant Fuzzy SWARA Assessment Approach for Intelligent Selection of Research Opportunities
1 Introduction
2 Motivation
3 Material and Methods
4 Result and Discussion
5 Conclusion
References
Author Index