Vai al contenuto principale della pagina

Computer communication, networking and IoT . Volume 2 : proceedings of 5th ICICC 2021 / / Suresh Chandra Satapathy [and four others], editors



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Computer communication, networking and IoT . Volume 2 : proceedings of 5th ICICC 2021 / / Suresh Chandra Satapathy [and four others], editors Visualizza cluster
Pubblicazione: Gateway East, Singapore : , : Springer, , [2023]
©2023
Descrizione fisica: 1 online resource (439 pages)
Disciplina: 004.6
Soggetto topico: Computer networks
Persona (resp. second.): SatapathySuresh Chandra
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Conference Organization Committee -- Preface -- Contents -- Editors and Contributors -- Cloud-Based E-learning: Scaffolding the Environment for Adaptive E-learning Ecosystem Based on Cloud Computing Infrastructure -- 1 Introduction -- 2 Overview of Cloud Computing -- 3 The Implications of Cloud Computing for E-learning -- 4 Methodological Provisions for Rendering Cloud-Based E-learning -- 5 Vantages of Cloud Computing Adoption for E-learning Solutions -- 6 Comparing Different Authoring Tools Based on Cloud Computing -- 6.1 Easy Generator -- 6.2 Lectora Online -- 6.3 eCoach -- 6.4 Ruzuku -- 6.5 iSpring Learn LMS -- 7 Concluding Remarks -- References -- Web Crawling-Based Search Engine for Programming Languages -- 1 Introduction -- 2 Web Crawling -- 3 Literature Review -- 4 Methodology -- 4.1 Database -- 4.2 Crawling, Indexing and Page Ranking -- 4.3 Search Engine -- 5 Results -- 6 Conclusion -- References -- Smart Helmet for Coal Mine Monitoring -- 1 Introduction -- 2 System Architecture -- 2.1 Block Diagram -- 2.2 Components -- 3 Proposed Methodology -- 4 Experimental Result and Analysis -- 4.1 Temperature and Air Quality Test -- 4.2 Fall Detection Test -- 5 Conclusion and Future Scope -- References -- K-Weighted Cluster Head Selection in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 2.1 Overall Inference and Motivation -- 3 Proposed K-weighted Cluster Head Selection (K-WCH) Algorithm -- 4 Simulation and Performance Analysis -- 4.1 Reaching 10% of Dead Nodes -- 4.2 Energy Efficiency -- 5 Conclusion -- References -- Implementation and Performance Analysis of PEGASIS and MIEEPB Protocols in Wireless Sensor Networks -- 1 Introduction -- 2 Previous Works -- 3 Objective -- 4 Chain-Based Protocols -- 4.1 Power Efficient Gathering in Sensor Information Systems (PEGASIS) Protocol.
4.2 Mobile Sink Improved Energy-Efficient PEGASIS-Based Routing Protocol (MIEEPB) -- 5 Conclusion -- References -- A Queue Management System for Cloud Data Processing -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results and Discussion -- 5 Conclusion -- 6 Future Scope -- References -- Sensor Integration and Information Sharing for Automated Electric Vehicles for Better Estimation of the Surroundings -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Implementation and Results -- 5 Conclusion -- References -- Cloud-Computed Solar Tracking System -- 1 Introduction -- 2 Monitoring System -- 2.1 Hardware System -- 2.2 Data Gathering System -- 2.3 Data Collecting Process -- 2.4 Cloud System -- 3 Experimental Analysis -- 3.1 Data Gathering System Interface -- 3.2 Cloud System -- 3.3 Analysis of Experimental Data for Fault Diagnosis -- 4 Conclusion -- References -- Patient Identifier Using Biometric Authentication -- 1 Introduction -- 2 Literature Survey -- 3 The Proposed Work -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- Recognition of Hand Gesture-Based Sign Language Using Transfer Learning -- 1 Introduction -- 1.1 Sensor-Based -- 1.2 Image-Based -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Methodology -- 4 Experimental Results -- 5 Conclusion -- References -- Robustness Indices of 3R and 4R Planar Serial Manipulators with Fixed Actuation Scheme -- 1 Introduction -- 2 Mathematical Modeling and Jacobian Matrix of Planar 3R Serial Manipulator -- 3 Performance Indices of the 3R Planar Serial Manipulator -- 4 Results 3R Serial Manipulator -- 5 Planar 4R Serial Manipulator -- 6 Results of 4R Manipulator -- 7 Conclusions -- References -- Deterioration of Daily Life in COVID-19 -- 1 Introduction -- 2 Literature Survey -- 3 Data Collection and Preprocessing -- 4 Result and Discussion.
5 Conclusions and Future Scope -- References -- A Design Model of Copyright Protection System Based on Distributed Ledger Technology -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Model -- 3.1 System Security Requirements -- 3.2 Solution Model Architecture -- 3.3 Smart Contract Design -- 4 System Implementation -- 5 Conclusions -- References -- Secure Electronic Voting (E-voting) System Based on Blockchain on Various Platforms -- 1 Introduction -- 2 Background and Literature Review -- 2.1 Blockchain Architecture's Basic Elements -- 2.2 Blockchain Architecture's Crucial Characteristics -- 2.3 Review of Related Literature -- 3 Deployment of the System -- 4 Voting Protocol -- 4.1 Voting Process Entities -- 4.2 Registration of Voters -- 5 Conclusions -- References -- Dynamic Authentication Using Visual Cryptography -- 1 Introduction -- 2 Current Trends in One-Time Passwords -- 2.1 SMS-Based OTP -- 2.2 Proprietary Tokens -- 2.3 Grid Cards -- 2.4 Software Tokens -- 3 Proposed Methodology -- 3.1 Proposed System Merits -- 3.2 Proposed System Demerits -- 4 Experiment Results -- 5 Conclusion and Future Works -- 5.1 Conclusion -- 5.2 Future Work -- References -- Browser Extension for Digital Signature -- 1 Introduction -- 1.1 Importance of Digital Signature -- 1.2 Importance of Certificate-Based Digital Signature -- 2 Digital Signature Based on Digital Certificate -- 2.1 Creating a pfx Certificate -- 3 Proposed System -- 3.1 Methodology of Proposed System -- 4 Browser Extension -- 4.1 Integration of an Extension with Digital Signature Functionality -- 5 Conclusion and Future Work -- References -- Design and Implementation of Cyber Threat Intelligence Data Mining Model -- 1 Introduction -- 2 Literature Survey -- 3 Analysis for Data Mining Model -- 3.1 Data Collection -- 3.2 API Implementation -- 3.3 Integration with Snort -- 3.4 Blacklist.
3.5 Algorithm 1-Data Collection and Processing -- 3.6 Algorithm 2-LICIT Prediction -- 4 Proposed Methodologies -- 4.1 Experimental Setup -- 4.2 Rule Creation in SNORT -- 4.3 SNORT Rule Syntax -- 5 Conclusion -- References -- Gameplay Cognitive Decision Support Using Statistical and Non-statistical Parametric Fusion -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- Securing Communication in IoT Environment Using Lightweight Key Generation-Assisted Homomorphic Authenticated Encryption -- 1 Introduction -- 1.1 Organization of the Paper -- 2 Related Work -- 3 Proposed Framework -- 3.1 Authentication -- 3.2 Key and Other Parameters Generation -- 3.3 IoT Sensor Node Side Computation -- 3.4 Computation on Encrypted Data -- 3.5 Decryption Circuit Evaluation -- 4 Empirical Analysis of Proposed Oracle -- 4.1 Computational Complexity Analysis -- 4.2 Security and Correctness Analysis -- 5 Experimental Evaluation and Results Discussion -- 5.1 Comparative Analysis -- 6 Conclusion -- References -- Gas Leakage Detection and Control System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Advanced Face Mask Detection System -- 1 Introduction -- 1.1 OpenCV -- 1.2 TensorFlow -- 1.3 Keras -- 1.4 Imutils -- 1.5 MobileNetV2 -- 1.6 Related Work -- 2 Methodology -- 2.1 Data Set Collection -- 2.2 Model Training -- 2.3 Detection -- 3 Results -- 4 Conclusion -- References -- Meta-Analysis of Nanostructured Sensors for Toxic Gas Sensing -- 1 Introduction -- 2 Gas Sensing Platforms -- 3 Conclusion -- References -- High-Impedance Surface Backed Circular Patch Antenna for Wireless Communications -- 1 Introduction -- 2 High-Impedance Surface Structures -- 3 Design of Circular Patch Antenna on HIS -- 4 Results -- 4.1 Optimization and Effect of the Gap.
4.2 Return Loss -- 4.3 Radiation Pattern -- 4.4 Gain -- 4.5 Current Density -- 5 Conclusion -- References -- A Critical Analysis on Attacks and Challenges in VANETs -- 1 Introduction -- 2 Characteristics of VANET -- 3 Challenges and Future Perspectives -- 4 Applications of VANETs -- 5 Conclusion -- References -- Development of 5G Array Antenna Using 2 × 1 Power Divider for Enhancing Gain in Wireless Applications -- 1 Introduction -- 2 Analysis and Design -- 3 Design Methodology -- 4 Conclusion -- References -- Novel Technique for Identification of False Coconuts to Avoid Genetic Diseases Using Classifiers -- 1 Introduction -- 2 Problem Statement -- 3 System Model -- 4 Classifiers -- 5 Conclusion -- References -- Privacy Preserving Datamining Techniques with Data Security in Data Transformation -- 1 Introduction -- 1.1 Problem of the Statement -- 1.2 K-Means Clustering -- 2 Survey About Previous Research Contribution -- 2.1 Objectives PPDM Data Security Data Mining -- 3 Data Processing and Transformation -- 3.1 Data Transformation -- 3.2 Data Reduction -- 3.3 Discretization and Concept Hierarchy Generation -- 3.4 Transformation Flow Chart -- 4 Algorithm Approach -- 4.1 Transformation Algorithm and Methodology -- 4.2 Data Security -- 4.3 Distributed Method-Based PPDM -- 5 Conclusions and Future Objective -- References -- Rectangular Slotted Elliptically Placed Compact Antenna For Wide Band Applications at K and Ka Bands -- 1 Introduction -- 2 Design of Antenna and Simulation -- 3 Results and Discussion -- 4 Conclusions -- CAN Intrusion Detection Using Long Short-Term Memory (LSTM) -- 1 Introduction -- 2 Related Work -- 2.1 CAN Intrusion Detection Models -- 2.2 Models Based on Nature of Data -- 3 In-Vehicle Network Overview -- 3.1 Controller Area Network (CAN) -- 3.2 Injection of Messages -- 4 Model for Intrusion Detection -- 5 Experiments.
6 Discussion.
Titolo autorizzato: Computer Communication, Networking and IoT  Visualizza cluster
ISBN: 981-19-1976-3
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910627269303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture notes in networks and systems.