Inventive Communication and Computational Technologies: Proceedings of ICICCT 2020 [1st ed.]
9789811573446, 9789811573453
This book gathers selected papers presented at the 4th International Conference on Inventive Communication and Computati
279
96
24MB
English
Pages XXXIV, 1000
[994]
Year 2021
Report DMCA / Copyright
DOWNLOAD PDF FILE
Table of contents :
Front Matter ....Pages i-xxxiv
Mathematical Modeling of the Data Processing Problems of Heat Experiments Based on Multiprocessor Computing Complexes (Gennady Shvachych, Boris Moroz, Maksym Khylko, Hanna Sashchyk, Olena Khylko, Volodymyr Busygin)....Pages 1-14
Analysis of Image Processing Techniques to Segment the Target Animal in Non-uniformly Illuminated and Occluded Images (Shruti Ajithkumar Panicker, Rahul Vinod Kumar, Aishwarya Ramachandran, S. Padmavathi)....Pages 15-26
Enhanced Speeded Up Robust Feature with Bag of Grapheme (ESURF-BoG) for Tamil Palm Leaf Character Recognition (A. Robert Singh, Suganya Athisayamani, A. Sherly Alphonse)....Pages 27-39
PlagoBot: A Confluence of Plagiarism and RPA (Venkatesh Kamath, Omkar Lubal, Saurabh Daware, Vaishali Khairnar)....Pages 41-57
MAGE: An Efficient Deployment of Python Flask Web Application to App Engine Flexible Using Google Cloud Platform (B. Aakash, A. Srilakshmi)....Pages 59-68
Traffic Sign Recognition System (TSRS): SVM and Convolutional Neural Network (Nazmul Hasan, Tanvir Anzum, Nusrat Jahan)....Pages 69-79
A Comparative Study of Machine Learning Algorithms for Gas Leak Detection (J. E. Raghavendra Prasad, M. Senthil, Akhil Yadav, Paras Gupta, K. S. Anusha)....Pages 81-90
Agro Advisory System Using Big Data Analytics (Nazneen Ansari, Siddhi Martal, Namratha Bhat, Sohan Pawar)....Pages 91-101
Big Data Technologies: A Comprehensive Survey (Varsha Mittal, Durgaprasad Gangodkar, Bhaskar Pant)....Pages 103-114
Automatic Face Recognition and Finding Occurrence of Actors in Movies (Prashant Giridhar Shambharkar, Umesh Kumar Nimesh, Nihal Kumar, Vj Duy Du, M. N. Doja)....Pages 115-129
Signature Forgery Recognition Using CNN (Amit Chaurasia, Harsh Agarwal, Ankur Vishwakarma, Ashish Dwivedi, Arpit Sharma)....Pages 131-141
Image Sentiment Analysis Using Deep Learning (Vipul Salunke, Suja Sreejith Panicker)....Pages 143-153
Fake News Detection Using Passive-Aggressive Classifier (Saloni Gupta, Priyanka Meel)....Pages 155-164
Recurrent Neural Network-Based Character Recognition System for Tamil Palm Leaf Manuscript Using Stroke Zoning (Suganya Athisayamani, A. Robert Singh, A. Sivanesh Kumar)....Pages 165-176
Microcontroller Based Smart Grinder for Automatic Batter Collection and Grinder Cleaning (B. N. Neethu, D. Vijai Srinivas, S. Jayanthy, J. Judeson Antony Kovilpillai)....Pages 177-188
Cardiovascular Disease Classification Using Different Algorithms ( Rahul, Monika, Pranav Ray, Roshan Bapurao Kharke, Saurav Singh Chauhan)....Pages 189-201
Empirical Test Design Strategies Using Natural Language Processing (T. S. Abishek, Adithya Viswanathan, Akash Kumar Pujari, V. S. Felix Enigo)....Pages 203-217
Sign Language to Text Conversion Using Deep Learning (P. V. S. M. S. Kartik, Konjeti B. V. N. S. Sumanth, V. N. V. Sri Ram, P. Prakash)....Pages 219-227
Classification of Banana Leaf Diseases Using Enhanced Gabor Feature Descriptor (N. Ani Brown Mary, A. Robert Singh, Suganya Athisayamani)....Pages 229-242
A Tool to Detect Plagiarism in Java Source Code (Swati Srivastava, Akshit Rai, Mahima Varshney)....Pages 243-253
Improved Skip Algorithm for Single Pattern Searching (K. Padmaveni, D. John Aravindhar)....Pages 255-267
Classification of Plant Leaf Using Shape and Texture Features (A. Sujith, R. Neethu)....Pages 269-282
Value-Based Behavioral Analysis of Users Using Twitter (Surbhi Kakar, Deepali Dhaka, Monica Mehrotra)....Pages 283-294
Patient Health Monitoring and Diagnosis Using IoT and Machine Learning (Vishal Gupta, Akshay Ingle, Dhanashree Gaikwad, Mahesh Vibhute)....Pages 295-307
Handwritten Devanagari Character Classification Using CNN (Addepalli Kavya, Nunna Vivek, Maddukuri Harika, Venkatram Nidumolu)....Pages 309-317
Performance Analysis of Machine Learning Algorithms in Credit Card Fraud Detection (Anupam Yadav, Vinod Jain, Anuj Kumar)....Pages 319-325
An Empirical Evaluation of Bitcoin Price Prediction Using Time Series Analysis and Roll Over (N. M. Dhanya)....Pages 327-339
Ensure the Validity of Forensic Evidence by Using a Hash Function (K. Aishwarya Lakshmi, Prasad B. Honnavali, S. Rajashree)....Pages 341-346
Enhanced Opinion Classification Using Nature-Inspired Meta-Heuristics for Policy Evaluation (Abhilasha Sharma, Nikhil Arora, Paridhi Sachdeva)....Pages 347-358
Automatic Distributed Gardening System Using Object Recognition and Visual Servoing (D. Ruth Anita Shirley, K. Ranjani, Gokulalakshmi Arunachalam, D. A. Janeera)....Pages 359-369
Time and Energy-Efficient Load Balancing Algorithm Toward Green Cloud Computing (P. Geetha, C. R. Rene Robin)....Pages 371-386
Machine Learning Techniques and Cloud Computing to Estimate River Water Quality—Survey (M. Ranjithkumar, L. Robert)....Pages 387-396
Low Transition Dual LFSR for Low Power Testing (Navya Mohan, M. Aravinda Kumar, D. Dhanush, J. Gokul Prasath, C. S. Jagan Sai Kumar)....Pages 397-406
High Speed and Low Power Buffer Based Parallel Multiplier for Computer Arithmetic (N. S. Kalyan Chakravarthy, O. Vignesh, J. N. Swaminathan)....Pages 407-416
Classification of Power Transmission Line Faults Using an Ensemble Feature Extraction and Classifier Method ( Ani Harish, M. V. Jayan)....Pages 417-427
A Retrospection on Selective Forwarding Attacks in WSN (A. Anitha, S. Mythili)....Pages 429-440
Automatic Railway Gate Control System Using GPS (B. Subramanian, A. S. Selvakumar, M. Sachithanantham, T. Saikumar, Anisha Radhakrishnan)....Pages 441-449
Secure Decentralized Public Key Infrastructure with Multi-signature in Blockchains (M. J. Jeyasheela Rakkini, K. Geetha)....Pages 451-461
Decentralized Privacy-Preserving Framework for Health Care Record-Keeping Over Hyperledger Fabric (Baddepaka Prasad, S. Ramachandram)....Pages 463-475
Decentralized Application for Two-Factor Authentication with Smart Contracts (S. Venkata Sai Santosh, M. Kameswara Rao, P. S. G. Aruna Sri, C. H. Sai Hemantha)....Pages 477-486
A Crypto Model for Confuse-Cum-Diffuse RGB Images: A Near Zero Correlation Approach (R. Ashwin Kumar, T. Avinash, Nithya Chidambaram, Amirtharajan Rengarajan)....Pages 487-496
An Efficient DFS Algorithm to Compute Least Longest Schedule Path of Software Projects (B. N. Arunakumari)....Pages 497-504
Priority-Centered Virtual Groups and Mobile Sink for Wireless Sensor Networks (Deivanai Gurusamy, Tucha Kedir, Endalkachew Emare)....Pages 505-517
A Novel Mechanism for Fraud Rank Detection in Social Networks (Deepika Dasari, M. Kameswara Rao, Nikhitha Namburu)....Pages 519-526
Trusted Cooperative E-Learning Service Deployment Model in Multi-Cloud Environment (S. Udhayakumar, D. Uma Nandhini, S. Chandrasekaran)....Pages 527-535
Efficient Data Security Using Hybrid Cryptography on Cloud Computing (P. Chinnasamy, S. Padmavathi, R. Swathy, S. Rakesh)....Pages 537-547
Performance Comparison of MQTT and CoAP Protocols in Different Simulation Environments (Malti Bansal, Priya)....Pages 549-560
A Compact Vertex Fed Heptagon Monopole Antenna in a Wide Diamond Slot for UWB Applications (A. Priya, M. Saravanan, D. Balasubramaniam, A. Subahar, V. Purushothaman)....Pages 561-572
Performance Investigation of Various SRAM Cells for IoT Based Wearable Biomedical Devices (J. R. Dinesh Kumar, C. Ganesh Babu, V. R. Balaji, K. Priyadharsini, S. P. Karthi)....Pages 573-588
Comparative Study of Different Beamforming Techniques for 5G: A Review (Laxmikant Shevada, Hema D. Raut, Rajeshwari Malekar, Sumit Kumar)....Pages 589-595
Vulnerability Analysis of FPGA Through Side-Channel Attacks in Cloud (S. Harini, Aswathy Ravikumar)....Pages 597-606
UBAPS: Inexact Unsigned Binary 5:2 Compressor Towards Power Efficient and High Speed for Three-Stage FIR Filter (M. Vaishnavi Reddy, N. Sai Pooja Reddy, J. V. R. Ravindra)....Pages 607-617
Utilizing a Raspberry Pi for Transmitting Image using Li-Fi Transceiver (S. C. Sandeep, P. Sreenivasa Reddy, M. Shrenik, Shaista Farheen, D. Praveen Kumar)....Pages 619-634
Penalty Based Backend Path Management (Deepanshi Sengar, Anoop Kr. Patel)....Pages 635-647
Multi-band Microstrip Antenna for Wireless Local Area Network (Aditya Sarin, Deveshi Thanawala, Jessica Sadavarte, Tazeen Shaikh)....Pages 649-658
Power Optimization by Detection and Monitoring of Sensor Event in Smart Home (A. Ganesan, K. Sujatha, N. P. G. Bhavani, V. Srividhya, Su-Qun Cao)....Pages 659-667
Multi-keyword Search for Multiple Data Owners Over Encrypted CloudData (Jonnakuti Lakshmi Thirusha, Yalamanchili Kavya Nandini, P. S. G. Aruna Sri)....Pages 669-675
Analytical Modeling of Real-World Social Network Parameters ( Monika, Veenu Mangat)....Pages 677-684
Performance Analysis of Speck Cipher Using Different Adder Architectures (Kalyani Palutla, Nagaraju Yesho, K. Manjunathachari)....Pages 685-697
Evaluating Heterogeneous Ensembles with Boosting Meta-Learner (Seba Susan, Aishwary Kumar, Anmol Jain)....Pages 699-710
Radial Basis Function Neural Network Based Speech Enhancement System Using SLANTLET Transform Through Hybrid Vector Wiener Filter (V. R. Balaji, J. Sathiya Priya, J. R. Dinesh Kumar, S. P. Karthi)....Pages 711-723
Detection and Deactivation of Application Layer-Based DDoS Attack from Private Tor Network (Yogita Deepak Mane, Uday Pandit Khot)....Pages 725-735
A Critical Survey on Fractal Wearable Antennas with Enhanced Gain and Bandwidth for WBAN (Sandhya Mallavarapu, Anjaneyulu Lokam)....Pages 737-745
PERAM: Ultra Power Efficient Array Multiplier Using Reversible Logic for High-Performance MAC (E. Rishi Kiran, Swathi Vangala, J. V. R. Ravindra)....Pages 747-756
Development of Social Media User Interface Portal for Maintaining Students Portfolio (Aswathi Krishnan, A. Ganesh, S. Gayathri, S. Koushik, M. Varsha Nair, Gayathri Narayanan)....Pages 757-764
Spectrum Aware Dynamic Slots Computation in Wireless Cognitive Radio Sensor Networks (Veeranna Gatate, Jayashree Agarkhed)....Pages 765-776
High Gain Wideband Antennas for 5G Applications: A Review (Hema D. Raut, Laxmikant Shevada, Rajeshwari Malekar, Sumit Kumar)....Pages 777-787
Things-to-Cloud (T2C): A Protocol-Based Nine-Layered Architecture (N. D. Patel, B. M. Mehtre, Rajeev Wankar)....Pages 789-805
Role of Internet of Things (IoT) in Protection of Soil and Plant Life from Acid Rain Disasters (S. Ayyasamy, Daniel Felips Jhosiah, K. Prince Wesly, C. Aravind, V. Swetha)....Pages 807-820
IoT-Based Wardrobe and Steel Closet Theft Detector (S. Shrinidhi, S. Vinuja, E. Prabhu)....Pages 821-834
Intrusion Detection and Prevention Systems: A Review (Vaishnavi Ganesh, Manmohan Sharma)....Pages 835-844
A Novel Task Scheduling Model for Fog Computing (Navjeet Kaur, Ashok Kumar, Rajesh Kumar)....Pages 845-857
A Bidirectional Power Converter with Shunt Active Filter for Electric Vehicle Grid Integration (Ganesh Anam, M. R. Sindhu)....Pages 859-872
Formal Verification of IoT Protocol: In Design-Time and Run-Time Perspective (V. Geetha Lekshmy, Jinesh M. Kannimoola)....Pages 873-884
Automatic Network Scanning System for Monitoring 4G and 5G Network Elements (N. Lakshitha Karthik, Shreya S. Gowda, S. B. RudraSwamy, B. M. Sagar)....Pages 885-898
Comparative Study of Introducing Wavelength Converters in Pre-configured (P)-Cycle (Vidhi Gupta, Rachna Asthana)....Pages 899-910
A Novel Approach to Reduce False-Negative Alarm Rate in Network-Based Intrusion Detection System Using Linear Discriminant Analysis (Sona Solani, Nilesh Kumar Jadav)....Pages 911-921
A Low Cost IoT Enabled Device for Monitoring Agriculture Field and Smart Irrigation System (Sai Surya Kiran Pokala, A. A. Bini)....Pages 923-932
Deep Network for Network Intrusion with Concept Drift (Shivam Prasad, Osho Agyeya, Prateek Singh, Shridevi S. Krishnakumar)....Pages 933-940
Paillier Homomorphic Encryption with K-Means Clustering Algorithm (PHEKC) for Data Mining Security in Cloud (G. Smilarubavathy, R. Nidhya, N. V. Abiramy, A. Dinesh Kumar)....Pages 941-948
PortaX Secure Automation System Using Iot—A Survey (Aditya Venkatesh, Aishwarya Alva, Daniya Nausheer, Gagan Deep Shivamadhu, K. A. Sumithra Devi)....Pages 949-960
A Review Paper on the Elimination of Low-Order Harmonics in Multilevel Inverters Using Different Modulation Techniques (Kalagotla Chenchireddy, V. Jegathesan)....Pages 961-971
LNA Architectures for ECG Analog Front End in CMOS Technology (Malti Bansal, Ishita Sagar)....Pages 973-984
Community Detection Using Graphical Relationships ( Rahul, Prateek Bansal, Priyam Goel, Purav Nayak)....Pages 985-996
Back Matter ....Pages 997-1000