Evolving Technologies for Computing, Communication and Smart World: Proceedings of ETCCS 2020
9811578036, 9789811578038
This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing
272
74
20MB
English
Pages 538
[536]
Year 2021
Report DMCA / Copyright
DOWNLOAD PDF FILE
Table of contents :
Preface
Contents
About the Editors
Toward Response-Type Identification for the Real Time
1 Introduction
2 Research Procedures
2.1 Preprocessing Dataset
2.2 Testing Dataset
2.3 Tool with Classifiers
3 Experimental Analysis
3.1 Using Hold-Out
3.2 Using k-Fold
3.3 Feature Relationship with k-Fold
3.4 User CPU Training Time with k-Fold
4 Performance Measures
5 Conclusion
References
Automatic Leaf Species Recognition Using Deep Neural Network
1 Introduction and Problem Statement
2 Material and Methods
2.1 System Configuration
2.2 AlexNet
2.3 Dataset
3 Results and Discussion
4 Conclusion
References
Injecting Power Attacks with Voltage Glitching and Generation of Clock Attacks for Testing Fault Injection Attacks
1 Introduction
2 Related Work
3 Contribution
4 Concept of Generation of Clock Glitch Attack
4.1 Generation of Underclock Glitch Attack
4.2 Generation of Overclock Glitch Attack
5 Power Glitch Attack-Producing Circuits on Cadence Virtuoso
5.1 Power Supply Attack Versus Propagation Delay
5.2 Types of Power Glitch Attack
5.3 Effects of Power Glitch Attack on Combinational Circuits
6 Conclusion
References
Traffic Jam Minimization and Accident Avoidance System Using IoT
1 Introduction
1.1 Background and Research Motivation
2 Related Work
3 Proposed Model
3.1 Proposed Algorithm and Flowchart for Maintaining a Threshold Distance Between Two Vehicles
3.2 Proposed Algorithm and Flowchart for Overtaking
3.3 Proposed Algorithm and Flowchart for Lane Shifting
4 Discussion
4.1 Maintaining a Threshold Distance Between Two Vehicles
4.2 Overtaking
4.3 Lane Changing
5 Conclusion and Future Scope
References
Software Reusability Estimation Using Machine Learning Techniques—A Systematic Literature Review
1 Introduction
2 Software Reuse Approaches
2.1 Component-Based Software Development (CBSD)
2.2 Object-Oriented Software Development (OOSD)
2.3 Aspect-Oriented Software Development (AOSD)
3 Machine Learning
3.1 Supervised Learning
3.2 Unsupervised Learning
4 Machine Learning Techniques Used for Software Reusability Estimation
5 Discussion
6 Conclusion
References
Unsupervised Learning-Based Sentiment Analysis with Reviewer's Emotion
1 Introduction
2 Motivation
3 Related Work
4 Proposed Research Work
5 Methodology
6 Execution and Implementation
6.1 Dataset Selection
6.2 Data Preprocessing
6.3 Text Processing After Tokenisation
6.4 Execution
7 Results and Discussion
8 Conclusion and Future Work
References
Event-Triggered Share Price Prediction
1 Introduction
2 Related Work
3 Proposed Research Work
4 Methodology
4.1 Long Short-Term Memory (LSTM)
5 Execution and Implementation
5.1 Dataset Selection
5.2 Pre-processing of the Data and Polarity Assignment
5.3 Methodology Used for Polarity Assignment
6 Results
7 Discussion
8 Conclusion and Future Work
References
A Review: Efficient Transportation—Future Aspects of IoV
1 Introduction
1.1 Layered Architecture and Network Model of IoV
1.2 Network Model of IoV
2 Related Work
3 Important Findings
4 Conclusion and Future Work
References
Compact High Gain 28 GHz Concentric Circular Director Low-Cost Antenna for 5G Millimeter-Wave Communication
1 Introduction
2 Antenna Geometry and Analysis
2.1 Antenna Structure
2.2 Analysis
3 Antenna Simulation Results and Discussion
3.1 Return Loss, VSWR, and Impedance Bandwidth
3.2 Radiation Performance
4 State of Art Comparison
5 Conclusion
References
Questionnaire-Based Prediction of Hypertension Using Machine Learning
1 Introduction
2 Related Works
3 Background
3.1 Neural Networks
3.2 Other Algorithms
4 Designing a Neural Network
5 Experiments
5.1 Data set
5.2 Data Cleaning
5.3 Implementation Details
5.4 Metrics
6 Results
7 Conclusion
References
Nature-Inspired Computing Behaviour of Cellular Automata
1 Introduction
2 Natural Computation and Cellular Automata
2.1 Early Stage of Research—During 1940s
2.2 Innovation—During 1970s
2.3 Recent Trends in Computation with Cellular Automata
3 Preliminaries of Cellular Automata (CA)
3.1 Characterization of CA
3.2 Scope of CA in Complex Computation
4 Computing Behaviour of Wolfram’s Elementary CA
4.1 Elementary CA Modelling
4.2 Elementary Cellular Automata (ECA) Properties
4.3 ECA and Natural System Design and Computation
5 Conclusion
References
A Survey on Transport Layer Protocols for Reliable and Secure Wireless Sensor Networks
1 Introduction
2 Literature Background
3 Comparison of Transport Layer Protocol
4 Research Challenges
5 Conclusion
References
A Lightweight Exchangeable Encryption Scheme for IoT Devices Based on Vigenere Cipher and MLS Keystream
1 Introduction
2 Exchangeable Encryption Scheme
2.1 MLS Generation
3 Proposed Lightweight Cryptosystem
4 Experimental Results
4.1 Text Encryption
4.2 Image Encryption
4.3 Speech Encryption
5 Conclusions
References
Improving Steepest Descent Method by Learning Rate Annealing and Momentum in Neural Network
1 Introduction
2 Background and Related Works
3 The Backpropagation for Improvement
3.1 Backpropagation Learning
3.2 Computation at Input Layer
3.3 Computation at Hidden Layer
3.4 Computation at Output Layer
4 Calculation of Error
5 Method of Steepest Descent
5.1 Calculation of Weight Update
5.2 Backpropagation Algorithm (BP)
6 Proposed Improvement
6.1 Momentum Update
6.2 Learning Rate Annealing
7 Conclusions
References
Fingerprint and Face-Based Secure Biometric Authentication System Using Optimized Robust Features
1 Introduction
1.1 Motivation and Contribution
2 Related Work
3 Proposed Biometric Designs
3.1 Fingerprint Recognition System (FPRS)
3.2 Face Recognition System (FRS)
4 Results
4.1 Experimental Evaluation of FPRS and FRS
4.2 Image Processing Results of FPRS and FRS
4.3 Performance Parameters of FPRS and FRS
4.4 Comparison of the Proposed Recognition Systems Against Existing Work
5 Conclusion
References
DevOps, DevSecOps, AIOPS- Paradigms to IT Operations
1 Introduction
2 DevOps Paradigm—Principles and Processes
3 DevSecOps Paradigm—Principles and Processes
4 AIOps Paradigm—Principles and Processes
5 Sample Tools: DevOps, DevSecOps, AIOps
5.1 DevOps Tools
5.2 DevSecOps Tools
5.3 AIOps Tools
6 Conclusion
References
Optimized Route Discovery and Node Registration for FANET
1 Introduction
2 Related Work
3 Proposed Architecture
3.1 The Setup Phase
3.2 The Routing Architecture
3.3 Lagrange Interpolation (LI)
4 Results and Discussions
4.1 Results Analysis
4.2 Comparative Analysis of the Proposed Methodology and Past Studies [2, 3, 7]
5 Conclusion
References
4.1 GHz Low-Phase Noise Differential XCP LC-VCO with High Q and LC Noise Filtering
1 Introduction
2 Conventional VCO Design and Noise Issue
3 Proposed VCO Design
4 Results and Discussion
5 Conclusion
References
Secured Surveillance Storage Model Using Blockchain
1 Introduction
2 Related Work
3 Preliminaries
3.1 Blockchain
3.2 Ethereum [7]
3.3 IPFS [2]
3.4 Smart Contract
4 Smart Contract for S3 Model
4.1 Process Flow
4.2 Gnu Privacy Guard (GnuPG)
4.3 IPFS
4.4 Registration Authority
4.5 Certificate Authority
5 Experimental Evaluation
6 Conclusion and Future Scope
References
Information Retrieval in Financial Documents
1 Introduction
2 Related Work
3 Research Methodology
3.1 Data Ingestion Phase
3.2 Entity Relation Formulation Phase
3.3 Query Processing Phase
4 Results and Analysis
4.1 Comparison of a Generic System with Proposed System
5 Conclusion and Future Scope
References
VNF Security in Telco Environment
1 Introduction
1.1 NFV Infrastructure and Its Attacks
1.2 Adoption Towards Virtualisation
1.3 Evolved Packet Core as Virtualization Network Function
2 Telco VNF Security
2.1 Virtualisation Threat Vectors
3 Our Approach to Handle VNF Security
4 Future of Telecommunication Service Provider
5 Conclusion
6 Future Work
References
Rank-Level Fusion of Random Indexing, Word Embedding, and TF-IDF-Based Rankings for Clinical Document Retrieval
1 Introduction
2 Previous Work
2.1 Information Retrieval
2.2 Random Indexing-Based Representation
2.3 GLOVE-Based Representation
2.4 Rank Level Fusion
3 Proposed Technique
4 Experiments and Results
5 Conclusion and Future Work
References
A Novel Feature Engineering Approach for Twitter-Based Text Sentiment Analysis
1 Introduction
2 Related Work
3 Research Methodology
3.1 Data Collection
3.2 Train-Test Split
3.3 Data Preprocessing
3.4 Feature Engineering
3.5 Classification
4 Results and Analysis
4.1 Text-Based Features
4.2 Addition of Non-textual Features
5 Conclusion and Future Scope
References
Survey on DDoS and EDoS Attack in Cloud Environment
1 Introduction
1.1 Cloud Computing
1.2 Challenges and Issues in Cloud Computing
1.3 DDoS Attack
1.4 Economic Denial of Sustainability Attack
1.5 Difference between DDoS and EDoS.
2 DDoS Mitigation Methodology
3 EDoS Mitigation Methodology
4 Conclusion
References
Preprocessing Steps for Opinion Mining on Tweets
1 Introduction
2 Related Work
3 Research Methodology
3.1 Data Collection
3.2 Data Cleaning
3.3 Data Transformation
4 Result Analysis
5 Conclusion
References
Machine Learning-Based Lightweight Android Malware Detection System with Static Features
1 Introduction
2 Background and Related Work
2.1 Background
2.2 Related Work
3 Dataset
4 Design and Implementation
4.1 An Overview
4.2 Feature Extraction
4.3 Feature Engineering and Analysis
4.4 Learning Model
5 Evaluation
6 Conclusion
References
Area and Power Efficient 2 Bit Multiplier by Using Enhanced Half Adder
1 Introduction
2 Review of Conventional Circuit
2.1 Half Adder
2.2 Conventional Multiplier
3 Proposed Circuit Design
3.1 Proposed Half Adder
3.2 Proposed Multiplier
4 Results and Discussion
5 Conclusion
References
Security Analysis of a Threshold Quantum State Sharing Scheme of an Arbitrary Single-Qutrit Based on Lagrange Interpolation Method
1 Introduction
2 Some Preliminaries
2.1 Qutrit [21]
2.2 Sequence of Qutrits [22]
2.3 Unitary Transformation for Qutrits
2.4 Dealer
2.5 Decoy Particles
2.6 Lagrange’s Interpolation Method [23]
3 Proposed Work
3.1 Conventional Information Sharing Scheme
3.2 State Sharing Scheme for QKD
4 Correctness of the Proposed Scheme
4.1 For Conventional Secret Sharing Scheme
4.2 For quantum State Sharing Scheme
5 Concrete Illustration of the Proposed Scheme
6 Security Analysis
6.1 Intercept-And-Resend Attack
6.2 PNS Attack [22]
6.3 Participants Attack
7 Conclusion
References
The Modified Algorithm of Quantum Key Distribution System Synchronization
1 Introduction
2 Synchronization in the Quantum Key Distribution System
3 The Algorithm of Optical Impulse Detection
4 The Improved Algorithm
5 Conclusion
References
Person Re-Identification by Analyzing Dynamic Variations in Gait Sequences
1 Introduction
2 Related Work
3 Proposed Methodology
3.1 Active Energy Image
3.2 Affine Moment Invariants
3.3 Estimation of Matching Weights
3.4 Principal Component Analysis
3.5 K-Nearest Neighbor Classifier
4 Experimental Results and Observations
5 Conclusion
References
Big Data Analytics and Machine Learning Technologies for HPC Applications
1 Introduction
2 Survey of Key Domains
2.1 Weather and Climate
2.2 Astrophysics
2.3 Agriculture
2.4 Bioinformatics
3 Merits of AI in HPC
4 Migration of HPC to AI
5 Conclusion
References
Breast Cancer Classification Using Transfer Learning
1 Introduction
2 Approach
2.1 Undersampling and Data Preparation
2.2 Image Augmentation
2.3 Transfer Learning
3 Deep Learning Architectures
3.1 VGG16 and VGG19
3.2 ResNet50
3.3 DenseNet
3.4 EfficientNet
3.5 MobileNet
4 Experiment and Results
4.1 Datasets
4.2 Data Preparation
4.3 Results
5 Conclusion
References
A Novel Fusion Framework for Salient Object Detection Based on Support Vector Regression
1 Introduction
2 Related Work
3 Proposed Model
3.1 Training Samples Generation
3.2 Support Vector Regression for Saliency Computation
3.3 Post Processing
4 Experimental Setup and Results
4.1 Performance Comparison with State-of-the-art Methods
4.2 Computational Time
5 Conclusion and Future Work
References
Implementing Delta Checks for Laboratory Investigations Module of Hospital Management Systems
1 Introduction
2 Literature Review and Motivation
3 Delta Function and Its Variants
3.1 Absolute Delta Value
3.2 Percentage Delta Value
3.3 Absolute Rate Difference Delta
3.4 Percentage Absolute Rate Difference Delta
3.5 Estimating Delta Check Thresholds
4 Investigation Module in HMIS
5 Implementation of Delta Function
5.1 User Interfaces & Alerts
5.2 Post-Alert Reconciliation
6 Conclusions and Future Work
References
Convolutional Neural Network-Based Automatic Brain Tumor Detection
1 Introduction
2 Background
3 Methodology
3.1 Preprocessing
3.2 Convolution Neural Network
3.3 Data Augmentation
3.4 VGG-16 CNN Architecture
4 Results and Discussion
4.1 Basic Dataset
4.2 Brain Tumor Dataset
4.3 Evaluation with Other Models
5 Conclusion
References
An Efficient Communication Protocol for Energy-Constraint IoT Devices for Environment Monitoring Applications
1 Introduction
2 Literature Survey
2.1 Clustering in WSN
2.2 Routing in WSN
3 Preliminaries
3.1 Network Model
4 Proposed Work
4.1 Start Phase
4.2 Clustering Phase
4.3 CH-to-CH Routing Path Formation
4.4 Data Forwarding Phase
5 Implementation and Performance Evaluation
5.1 Simulation Setup
5.2 Hardware Setup
6 Conclusion
References
Efficient Pest Bird-Controlling Algorithm in Unmanned Agriculture System
1 Introduction
1.1 Background
1.2 Crop-Preventing Strategies
1.3 Motivation
1.4 Contribution
2 System Design and Preliminaries
2.1 Network Model
2.2 Rudimentary Assumptions
3 Proposed Work
3.1 Phase I: Event Reporting
3.2 Phase II: Finding Optimal Serving Points
3.3 Phase III: UAV Trajectory Construction
3.4 Phase IV: Request Serving
4 Performance Evaluation
4.1 Performance Metrics
5 Conclusion
References
Face Tracker-Assisted Multi-Person Face Recognition in Surveillance Videos
1 Introduction
2 Related Works
2.1 Face Detection Algorithms
2.2 Face Recognition Algorithms
2.3 Face Tracking Algorithms
3 Proposed Framework
3.1 Extracting Features and Distance Calculation
3.2 Face Detection and Alignment
3.3 Face Recognition Methodology
3.4 Distance Calculation
3.5 Improved Face Recognition Using Intelligent Face Tracking
3.6 Local Minimum and Global Minimum
4 Experimental and Results
4.1 Experimental Setup
4.2 Dataset
4.3 Experimental Results
4.4 Recognition Performance
5 Conclusion
References
Decision Support System on the Need for Veterinary Control of Passing Livestock and Farm Produce
1 Introduction
2 Literature Review
3 Design Methodology
3.1 Factor Model
4 System Implementation and Testing
4.1 Training of the Proposed System
4.2 Testing the Proposed Model
5 Conclusion and Future Work
References
A Home Automation System Based on Bluetooth Technology Using an Android Smartphone
1 Introduction
2 Related Works
3 Methodology and Design
3.1 Working Principle
3.2 Software Requirements
4 Results
5 Conclusion and Recommendations
References
Author Index