1.

Record Nr.

UNISA996464411803316

Titolo

Advanced informatics for computing research : 4th international conference, ICAICR 2020, Gurugram, India, December 26-27, 2020, revised selected papers, part II / / Ashish Kumar Luhach [and four others], editors

Pubbl/distr/stampa

Singapore : , : Springer, , [2021]

©2021

ISBN

981-16-3653-2

Descrizione fisica

1 online resource (297 pages)

Collana

Communications in Computer and Information Science ; ; 1394

Disciplina

006.3

Soggetti

Artificial intelligence

Computer networks

Computer architecture

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Hardware -- Design and Simulation of a Coaxial Fed Slotted Wide-Band Rectenna for Wireless Power Transmission -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution -- 1.3 Organisation of the Paper -- 2 Proposed Rectenna Design -- 2.1 Slotted Antenna Design -- 2.2 Greinacher Voltage Doubler Iinspired Rectifier Circuit -- 3 Results and Discussions -- 3.1 Results of Slotted Antenna -- 3.2 Results for Rectifier Circuit -- 4 Conclusion -- 5 Future Work -- References -- Optimised Multi Energy System (OMES) for Electric Vehicle -- 1 Introduction -- 2 Literature Overview -- 3 Proposed Mechanism Using Solar Energy and MESS -- 4 Result Analysis -- 5 Conclusion -- References -- Modeling of Microstrip Patch Antenna Using Artificial Neural Network Algorithms -- 1 Introduction -- 2 Antenna Configuration -- 3 ANN Model of a Patch Antenna -- 4 ANN Algorithms -- 4.1 RBF Model -- 4.2 MLP Model -- 5 Determining the Parameters of Patch Antenna Using ANN -- 6 Modeling the Patch Antenna in CST -- 7 Conclusion -- References -- Smart PDM: A Novel Smart Meter for Design Measurement and Data Collection for Smart



Grid -- 1 Introduction -- 2 Smart Meter -- 2.1 Introduction and Architecture -- 2.2 Challenges of Smart Meter -- 3 Smart PDM 1.0 - Smart Power Data Measurement System -- 3.1 System Model -- 3.2 Architecture -- 4 Working Prototype and Results -- 4.1 Step and Algorithm -- 4.2 Working of System -- 5 Results and Discussion -- 5.1 Test Results at the Laboratory -- 5.2 Test Results at a Household -- 5.3 Testing and Calibration -- 5.4 Conclusion and Future Scope -- References -- GSM Based Remote Distribution Transformer Condition Monitoring System -- 1 Introduction -- 2 Literature Review -- 3 Research Design -- 4 Case Study: PNG Power Ltd.

4.1 Distribution Transformer Current Measurement -- 4.2 Distribution Transformer Voltage Measurement -- 5 Hardware Simulation -- 5.1 Hardware Simulation with LCD Display -- 5.2 Hardware Simulation with GSM SIM808 Alert SMS -- 6 Conclusion -- References -- Networks -- Performance Analysis and Classification of Node Capture Attack Models in WSN -- 1 Introduction -- 2 Related Work -- 3 Modeling in Wireless Network -- 3.1 Key Distribution Modelling -- 3.2 Link-Based Modeling -- 3.3 Network-Based Modeling -- 3.4 Adversarial Based Modeling -- 4 Classification of Node Capture Attack Models -- 4.1 Random Attack (RA) -- 4.2 Maximum Key Attack (MKA) -- 4.3 Maximum Link Attack (MLA) -- 4.4 Dominating Node Attack (DNA) -- 4.5 Maximum Traffic Attack (MTA) -- 4.6 Greedy Node Capture Approximation Using Vulnerability Evaluation (GNAVE) -- 4.7 Matrix Based Attack (MA) -- 4.8 Full Graph Attack (FGA) -- 4.9 Opti-Graph Attack (OGA) -- 4.10 Minimum Resource Expenditure Attack (MREA) -- 4.11 Path Covering Attack (PCA) -- 4.12 Generic Algorithm (GA) -- 4.13 Fruit Fly Optimization Algorithm (FFOA) -- 4.14 Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FiRAO-PG (GA)) -- 5 Simulations and Experiments -- 5.1 Fraction of Compromised Traffic -- 5.2 Energy Cost -- 6 Conclusion and Future Work -- References -- An Efficient IoT Based Framework for Missed Call Messaging Services for Electricity Consumers -- 1 Introduction -- 2 Review of Literature -- 3 Components of the Model -- 4 Block Diagram of Missed Call Messaging Service -- 5 Algorithm/Working of IoT Based Device -- 6 Advantages -- 7 Results and Discussion -- 8 Conclusion -- 9 Future Work -- References -- A Divide and Conquer Based Data Aggregation Technique for WBANs -- 1 Introduction -- 2 Related Work -- 3 Data Aggregation -- 4 Implementation and Observations.

4.1 Performance Evaluation w.r.t. Number of Packets -- 4.2 Performance Evaluation w.r.t. Energy Consumption -- 4.3 Performance Evaluation w.r.t. Average Delay -- 4.4 Performance Evaluation w.r.t. Packet Delivery Ratio -- 4.5 Performance Evaluation w.r.t. Network Lifetime -- 5 Coclusion and Future Scope -- References -- Open Research Challenges and Blockchain Based Security Solution for 5G Enabled IoT -- 1 Introduction -- 2 Open Challenges in 5G and IoT -- 2.1 IoT Emerging Technologies and Challenges -- 2.2 5G Emerging Technologies and Challenges -- 3 5G Enabled IoT Technologies and Challenges -- 3.1 Network Function Virtualization (NFV) -- 3.2 Heterogeneous Network (HetNet) -- 3.3 Device to Device Communication -- 3.4 Advanced Spectrum and Interference Administration -- 4 Suggested Security Solution -- 4.1 Blockchain Technique -- 4.2 Proposed Solution -- 5 Conclusion -- References -- A Performance Discussion of Web Crawler Using Some Advanced Factors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Work -- 5 Results -- 6 Comparison Chart -- 7 Conclusion -- 8 Future Scope -- References -- Internet of Things



in Healthcare: A Review -- 1 Introduction -- 2 IoT in Disease Diagnostics -- 3 IoT for Health Monitoring -- 4 IoT in Predictive Medicine -- 5 IoT in Storage of Medicine -- 6 Challenges -- 7 Discussion and Conclusion -- References -- Inter-Vehicular Communication for Intelligent Collision Avoidance Using Machine Learning: An Overview -- 1 Introduction -- 2 Motivation -- 2.1 The Economy -- 2.2 The Lesson -- 2.3 The Problem -- 3 Background -- 4 Conventional System -- 5 Proposed System -- 5.1 Inter-Vehicular Communication (IVC) -- 5.2 Navigation with Indian Constellation (NavIC) -- 5.3 Machine Learning -- 5.4 Sensors -- 6 Functioning Methodology -- 6.1 Phase-I: Training -- 6.2 Phase-II: Actual Implementation.

7 System Workflow -- 8 Performance Measure -- 9 Observations -- 10 Conclusion -- 11 Limitations -- 12 Future Work -- References -- Wireless Sensor Networks Source Location Privacy Preservation Mechanism -- 1 Introduction -- 2 Existing Works -- 3 Problem Definition -- 4 Network Model -- 5 Adversary Model -- 6 PSLP Implementation -- 7 Phantom Nodes Determination -- 8 Fake Sources Determination -- 9 Performance Evaluation -- 10 Conclusions -- References -- A Study on Secure Data Aggregation and Routing for Wireless Sensor Networks -- 1 Introduction -- 2 Routing Strategy and Design Challenges in WSNs -- 3 Data Aggregation Scheme in WSN -- 4 Related Work -- 5 Security Schemes for Aggregation Routing -- 5.1 Key Management Scheme -- 5.2 Certification -- 5.3 Routing Security -- 6 Research Gap -- 7 Conclusion -- References -- Comparative Analysis of Internet of Things (IoT) Security Models -- 1 Introduction -- 2 Related Work -- 3 Overview of the Existing Security Models -- 3.1 The Amazon Web Service Model -- 3.2 Trust Model in IoT-Enabled Vehicular Netwokrs -- 3.3 Autonomous IoT/IıoT Security Model -- 4 Analysis and Discussion -- 5 Future Scope in IoT-Based Security -- 6 Conclusion -- References -- Study of Energy Efficient Routing Protocols for Adhoc-Wireless Sensor Networks -- 1 Introduction -- 2 Classification of RPs -- 2.1 Proactive RPs -- 2.2 Reactive RPs -- 2.3 Hybrid RPs -- 3 Latest Research Works Reported in Literature -- 4 Conclusion -- References -- IoT Based Smart Transport Management System -- 1 Introduction -- 2 Traffic Congestion Control System -- 3 Traffic Density Monitoring Module (TDMM) -- 4 Traffic Message Channel (TMC) -- 5 Traffic Management Module (TMM) -- 6 Working of Traffic Density Monitoring Module -- 7 Case Study: 1 -- 8 Case Study: 2 -- 9 Vehicle to Vehicle Communication Protocol Design -- 10 Conclusion -- References.

Vehicular Ad Hoc Network: Routing Protocols -- 1 Introduction -- 2 Routings Protocols of VANET -- 2.1 Based on Topology -- 2.2 Based on Position -- 2.3 Based on Cluster -- 2.4 Based on Broadcast -- 2.5 Based on Geo-Cast -- 3 Distance Sequance Distance Vector -- 4 Dynamic Source Routing Protocol -- 5 Zone Routing Protocol -- 6 Conclusion -- References -- A Reluctant Checksum Scheme Based on the Inherent Characteristic of Wireless Networks -- 1 Introduction -- 2 Literature Survey -- 2.1 Enhanced Protection Use of the Physical Layer -- 2.2 GloMoSim: A Library for Large-Scale Wireless Network Emulation -- 2.3 Wireless Protection in the Physical Layer via Pre-coding Transmission via Dispersive Channels -- 2.4 Wireless Protection Physical Layer Made the Channel Independent and Fast -- 2.5 In the Face of a Military Interference with ARQ-Based Wireless Communication Networks -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Security and Privacy -- Anomaly Based Detection of Cross Site Scripting Attack in Web Applications Using Gradient Boosting Classifier -- 1 Introduction -- 1.1 XSS Attack -- 1.2



Gradient Boosting Classifier -- 1.3 Intrusion Detection System -- 2 Literature Survey -- 3 Problem Statement -- 4 Description of the Proposed System -- 4.1 Data Analysis -- 4.2 Feature Selection -- 4.3 Prediction -- 5 Implementation -- 5.1 The Dataset -- 5.2 Correlation -- 5.3 Performance Evaluation Metrics -- 6 Result and Conclusion -- 7 Future Enhancements -- References -- Crypto Key Protection Generated from Images and Chaotic Logistic Maps -- 1 Introduction -- 2 Background Survey -- 3 Proposed Approach with Its Implementation -- 3.1 Basic Terminology -- 3.2 Algorithm -- 3.3 Experimental Evaluation -- 4 Conclusion and Future Scope -- References.

An Effıcıent Fault Management in Communication Networks Usıng On Demand Link State Algorıthm.