LEADER 11858nam 2200541 450 001 9910483587203321 005 20221007201432.0 010 $a981-334-909-3 035 $a(CKB)4100000011807184 035 $a(MiAaPQ)EBC6531738 035 $a(Au-PeEL)EBL6531738 035 $a(OCoLC)1244631192 035 $a(PPN)25472017X 035 $a(EXLCZ)994100000011807184 100 $a20211016d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aInternational Conference on Communication, Computing and Electronics Systems $eproceedings of ICCCES 2020 ;PPG Institute of Technology, Coimbatore, India, 21-22 October, 2020 /$feditors, V. Bindhu [et al.] 210 1$aGateway East, Singapore :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (xvi, 835 pages) $cillustrations (some color) 225 1 $aLecture notes in electrical engineering$vv.733 311 1 $a981-334-908-5 327 $aIntro -- Preface -- Contents -- About the Editors -- Security System for Big Data Cloud Computing Using Secure Dynamic Bit Standard -- 1 Introduction -- 2 Security in BD-CC -- 3 Security Attacks -- 3.1 Space Name System (DNS) -- 3.2 Space Hijacking -- 3.3 IP Spoofing Attack -- 3.4 Disavowal of Service (DoS) Attacks -- 3.5 Transmission Control Protocol Synchronize (TCP SYN) Flooding Attack -- 4 Methodology -- 5 Results -- 6 Conclusion -- References -- Distributed DBSCAN Protocol for Energy Saving in IoT Networks -- 1 Introduction -- 2 Related Work -- 3 The DBSCAN Algorithm -- 4 Energy-Efficient Distributed DBSCAN Protocol -- 5 Performance Evaluation, Analysis, and Discussion -- 6 Conclusion -- References -- Hardware Implementation of Automatic Power Source Controller Cum Power Optimizer -- 1 Introduction -- 2 Methodology -- 2.1 AT Mega 2560 Microcontroller -- 2.2 Relay Controller Module -- 2.3 AC to DC Converter -- 2.4 Battery Bank -- 2.5 Charg?ng Controller and Battery Protector -- 2.6 Current Sensor -- 2.7 Display Module -- 2.8 Thermal Protection to the System -- 2.9 Voltage Transformer -- 2.10 Data Access Port -- 2.11 Fuse -- 2.12 Slave Module -- 3 Results and Discussion -- 4 Conclusion and Future Scope -- References -- Texture-Based Face Recognition Using Grasshopper Optimization Algorithm and Deep Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Methods -- 3.1 Dataset Description -- 3.2 Image Pre-processing -- 3.3 Feature Extraction -- 3.4 Feature Optimization -- 3.5 Classification -- 4 Experimental Investigation -- 4.1 Quantitative Investigation on FEI Face Dataset -- 4.2 Quantitative Investigation on ORL Dataset -- 4.3 Comparative Study -- 5 Conclusion -- References -- An Interactive Framework to Compare Multi-criteria Optimization Algorithms: Preliminary Results on NSGA-II and MOPSO -- 1 Introduction. 327 $a2 Multi-criteria Optimization -- 2.1 Metaheuristics -- 3 Comparison Methodology -- 3.1 Error Ratio (E) -- 3.2 Generational Distance (DG) -- 3.3 Spacing (S) -- 4 Experimental Setup -- 4.1 ZDT1 Function -- 4.2 ZDT2 Function -- 4.3 ZDT3 Function -- 4.4 ZDT4 Function -- 4.5 ZDT6 Function -- 4.6 Parameters -- 5 Results and Discussion -- 5.1 ZDT1 Results -- 6 Conclusion and Future Scope -- References -- A Dynamic Programming Approach for Power Curtailment Decision Making on PV Systems -- 1 Introduction -- 2 Background and Problem Statement -- 3 Formulation of the Proposed Mathematical Model -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Arabic Braille Numeral Recognition Using Convolutional Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Description -- 3.2 Preprocessing -- 3.3 Deep Residual Learning -- 4 Results and Discussion -- 5 Conclusion -- References -- In-Silico Modeling of Sleep Stage Classification System Using Covariance Normalization -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 Feature Extraction and Feature Fusion -- 2.3 Baseline System -- 2.4 Covariance Normalization -- 3 Results and Discussion -- 3.1 Support Vector Machines (SVMs) -- 4 Conclusion -- References -- Comparative Analysis of LSTM, One-Class SVM, and PCA to Monitor Real-Time Malware Threats Using System Call Sequences and Virtual Machine Introspection -- 1 Introduction -- 2 Related Work -- 3 System Call Traces with VMI -- 3.1 Feature Engineering for System Call Sequences -- 3.2 Feature Selection -- 4 Detection Algorithms -- 4.1 Long Short-Term Memory (LSTM) Sequence to Sequence (Seq-Seq) -- 4.2 One-Class Support Vector Machine (OCSVM) -- 5 Experimental Setup -- 6 Experimental Results and Discussion -- 6.1 LSTM Seq-Seq Model Results -- 6.2 OCSVM Model Results -- 7 Conclusion -- 8 Future Scope. 327 $aReferences -- SBP: Preparation of Schema Elements to Schema Matching -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 SBP: The Sense-Based Pre-matching -- 4.1 Words Sets Generator -- 4.2 Words Qualifier -- 5 Experimental Results -- 5.1 Experimental Settings -- 5.2 Results and Discussions -- 6 Conclusions and Future Work -- References -- Acceptance of Biometric Authentication Security Technology on Mobile Devices -- 1 Introduction -- 2 Literature Review -- 3 Significance of This Study -- 4 Methodology -- 4.1 Participants of the Study -- 4.2 Research Instruments -- 5 Results -- 5.1 Demographic Characteristics -- 5.2 Statistical Analysis -- 5.3 Regression Analysis -- 6 Discussion -- 7 Limitations and Suggestions for Further Research -- 8 Conclusion -- References -- Impact of Agile Methodology Use on Project Success in South African Banking Sector -- 1 Introduction -- 1.1 Problem Statement -- 2 Related Work -- 2.1 Agile Project Success -- 3 Proposed Work -- 3.1 Sample Size and Profile Participants -- 3.2 Data Collection -- 3.3 Data Analysis -- 4 Results Analysis -- 4.1 Correlation -- 4.2 Regression -- 5 Discussions of Key Findings -- 6 Conclusion -- References -- Automated Industrial Sound Power Alert System -- 1 Introduction -- 2 Design and Working -- 2.1 Software Used -- 3 Results and Discussion -- 4 Conclusion -- References -- Predicting Early Readmission of Diabetic Patients: Toward Interpretable Models -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Preparation and Feature Selection -- 3.3 Data Sampling -- 3.4 Classifiers -- 3.5 Rule-Based Classifiers -- 4 Results -- 4.1 Evaluation Metrics -- 4.2 Results Analysis -- 5 Discussion -- 6 Conclusion -- References -- Design and Analysis of Mobile-Based Tourism Security Application: Concepts, Artifacts and Challenges -- 1 Introduction -- 2 Literature Review. 327 $a3 Research Framework -- 4 System Analysis and Design (Concepts and Artifacts) -- 4.1 User Requirements and Functional Description -- 4.2 Conceptual Design -- 4.3 Use Case Model -- 4.4 The Radius R-algorithm -- 4.5 User Interface Design -- 5 System Design Verification and Validation -- 6 System Security and Testing -- 7 Challenges and Limitations of the System -- 8 Conclusion -- References -- An Efficient Approach to Software Fault Prediction -- 1 Introduction -- 2 Related Work -- 3 Dataset Overview -- 4 Proposed Model for Fault Detection -- 4.1 Data Cleaning -- 4.2 Data Balancing -- 4.3 Feature Selection Techniques -- 4.4 Classification Algorithms -- 5 Results and Analysis -- 5.1 Comparison With no Balancing -- 5.2 Comparison with no Feature Selection -- 5.3 Comparison with Other Feature Selection Methods -- 6 Conclusion and Future Scope -- References -- Indoor Navigation Assistant for Visually Impaired (INAVI) -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Result Analysis -- 5 Novelty -- 6 Conclusion and Future Scope -- References -- On the Evaluation of Effectiveness of eLearning and Blended Learning -- 1 Introduction -- 2 Methods -- 3 Effectiveness of eLearning -- 4 Effectiveness of the Process of Teaching -- 5 Findings -- 6 Conclusion -- References -- Design and Performance Analysis of GaAs-Based P-i-N Photovoltaic Using AlGaAs as Window Layer -- 1 Introduction -- 2 Structure Analysis -- 2.1 Proposed Structure -- 2.2 AlGaAs Seeing that Window Coating -- 3 Computational Methodology -- 3.1 P-i-N Solar Cell -- 4 Numerical Results and Discussion -- 4.1 The Window Layer's Consequence of Thickness -- 4.2 P+ Coating's Consequences of Thickness -- 4.3 P-Coating's Consequences of Thickness -- 4.4 Intrinsic Coating's Consequences of Thickness -- 4.5 N-Coating's Consequences of Thickness -- 4.6 n+ Coating's Consequences of Thickness. 327 $a5 Conclusion -- References -- Impact Analysis of Anti-Reflection Coating on P-i-N Solar Device -- 1 Introduction -- 2 Device Structure -- 3 Simulation Results -- 3.1 SCAPS-1D as the Simulation Tool -- 4 Results and Discussion -- 5 Conclusion -- 6 Limitation and Future Scope of This Study -- References -- Microstrip Antenna with SVASTU Slot for UWB Applications -- 1 Introduction -- 2 Microstrip Antenna -- 3 Antenna Design -- 4 Simulation Result -- 5 Conclusion -- References -- Design and Implementation of a Smart Helmet System for Underground Miner's Safety -- 1 Introduction -- 2 Literature Review -- 3 Hardware Block Diagram of Helmet -- 3.1 Block Diagram of Transmitter -- 4 Hardware Des?gn -- 4.1 System Result -- 5 Result Analysis -- 6 Conclusion and Future Scope -- References -- A Brief Review on Instance Selection Based on Condensed Nearest Neighbors for Data Classification Tasks -- 1 Introduction -- 1.1 Vector Quantization -- 1.2 Condensed Methods -- 1.3 Machine Learning and Feature Selection -- 2 Theoretical Background and Overview -- 2.1 Problem Definition -- 2.2 Prototype-Based Approach on Unsupervised Learning -- 2.3 The Condensed Nearest Neighbor Rule (CNN Rule) -- 3 Results and Discussion -- 3.1 Metric Considerations and Visual Scheme for the CNN -- 4 Conclusion -- References -- Virtual Group Movie Recommendation System Using Social Network Information -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Result Evaluation of the Prototype -- 5 Conclusion -- References -- Hindi to English: Transformer-Based Neural Machine Translation -- 1 Introduction -- 2 Motivation -- 3 NMT Model Architecture -- 3.1 Structure -- 3.2 Working -- 4 Experimental Setup -- 4.1 Dataset -- 4.2 Data Preprocessing -- 4.3 Back-Translation -- 4.4 Training Details -- 5 Results -- 6 Conclusion -- References -- CNN-Based Alphabet Identification and Sorting Robotic Arm. 327 $a1 Introduction. 330 $aThis book includes high-quality papers presented at the International Conference on Communication, Computing and Electronics Systems 2020, held at the PPG Institute of Technology, Coimbatore, India, on 21-22 October 2020. The book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics. 410 0$aLecture notes in electrical engineering ;$v733. 606 $aArtificial intelligence$vCongresses 606 $aComputer networks$vCongresses 615 0$aArtificial intelligence 615 0$aComputer networks 676 $a004.6 702 $aBindhu$b V. 712 12$aInternational Conference on Communication, Computing and Electronics Systems$d(2nd :$f2020 :$ePPG Institute of Technology) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483587203321 996 $aInternational Conference on Communication, Computing and Electronics Systems$91901700 997 $aUNINA