دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: A. Pasumpon Pandian (editor), Ram Palanisamy (editor), Klimis Ntalianis (editor) سری: ISBN (شابک) : 3030431916, 9783030431914 ناشر: Springer سال نشر: 2020 تعداد صفحات: 1019 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 97 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) (Lecture Notes on Data Engineering and Communications Technologies, 49) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب مجموعه مقالات کنفرانس بین المللی شبکه های کامپیوتری، داده های بزرگ و اینترنت اشیا (ICCBI - 2019) (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 49) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعه مقالات کنفرانس بینالمللی شبکههای محاسباتی، دادههای بزرگ و اینترنت اشیا [ICCBI 2019] را ارائه میکند که در تاریخ 19 تا 20 دسامبر 2019 در دانشکده مهندسی Vaigai، مادورای، هند برگزار شد.
سالهای اخیر شاهد توسعه درهم تنیده اینترنت اشیا و کلان دادهها بودهایم که به طور فزایندهای در معماری شبکههای کامپیوتری مستقر شدهاند. با هوشمندتر شدن جامعه، جایگزینی فناوریهای سنتی با معماریهای مدرن فناوری اطلاعات و ارتباطات ضروری است. در این زمینه، اینترنت اشیا اشیاء هوشمند را از طریق اینترنت به هم متصل می کند و در نتیجه داده های بزرگ تولید می کند. این منجر به ایجاد امکانات محاسباتی جدید برای استخراج تصمیمات هوشمند در محیط کلان داده شده است.
این کتاب موضوعات مختلفی از جمله مدیریت اطلاعات، محاسبات تلفن همراه و برنامههای کاربردی، برنامههای کاربردی اینترنت اشیا، شبکههای ارتباطی توزیعشده، محاسبات ابری و کلان دادههای مراقبتهای بهداشتی را پوشش میدهد. همچنین مسائل امنیتی و حریم خصوصی، تشخیص نفوذ شبکه، رمزنگاری، شبکه های 5G/6G، تجزیه و تحلیل شبکه های اجتماعی، هوش مصنوعی، تعامل انسان و ماشین، خانه هوشمند و برنامه های کاربردی شهر هوشمند را مورد بحث قرار می دهد.
This book presents the proceedings of the International Conference on Computing Networks, Big Data and IoT [ICCBI 2019], held on December 19–20, 2019 at the Vaigai College of Engineering, Madurai, India.
Recent years have witnessed the intertwining development of the Internet of Things and big data, which are increasingly deployed in computer network architecture. As society becomes smarter, it is critical to replace the traditional technologies with modern ICT architectures. In this context, the Internet of Things connects smart objects through the Internet and as a result generates big data. This has led to new computing facilities being developed to derive intelligent decisions in the big data environment.
The book covers a variety of topics, including information management, mobile computing and applications, emerging IoT applications, distributed communication networks, cloud computing, and healthcare big data. It also discusses security and privacy issues, network intrusion detection, cryptography, 5G/6G networks, social network analysis, artificial intelligence, human–machine interaction, smart home and smart city applications.
Foreword Preface Acknowledgments Contents Wireless Sensor Networks Security Issues, Attacks and Challenges: A Survey Abstract 1 Introduction 2 Wireless Sensor Network Architecture and Its Background 3 Wireless Sensor Network Applications 3.1 Industry Related Applications 3.2 Society 3.3 Agriculture 3.4 Environmental Protection 4 Requirements and Security Issues in Wireless Sensor Networks 4.1 Security on Data Level 4.2 Security in Node Level 4.3 Security in Network Level 5 Attacks on Wireless Sensor Networks 5.1 Physical Attack 5.2 Communication Attack 5.3 Attack on Base Station 5.4 Routing Protocols Attack 6 Challenges for Wireless Sensor Network 6.1 Well-Built Routing Protocols 6.2 Application Challenges 6.3 Key Administration and Challenging Paradigms 7 Conclusion References A Survey on Machine Learning Based Fault Tolerant Mechanisms in Cloud Towards Uncertainty Analysis Abstract 1 Introduction 2 Related Work 2.1 Existing Work on Fault Tolerance in Cloud Based on Machine Learning Algorithms 3 Taxonomy of Faults, Error and Failures 3.1 Fault Tolerant System 3.2 Approaches for Fault Tolerance in Cloud 3.2.1 Reactive Fault Tolerance 3.2.2 Proactive Fault Tolerance 4 Metrics for Occurrence of Fault in Cloud Environment 4.1 Performance Metrics 4.2 Economic Metrics 4.3 General Metrics 5 Conclusion References IoT Based Attendance Management System Using Google Assistant Abstract 1 Introduction 2 Project Survey 3 Proposed Method 4 Implementation 4.1 Platforms Required 4.2 Hardware Required 4.3 Working 5 Results 6 Analysis 7 Conclusion 8 Compliance with Ethical Standards References A Survey on Privacy Preserving Approaches on Health Care Big Data in Cloud Abstract 1 Introduction 2 Security and Privacy Requirement of Medical Big Data in Cloud 3 Overview of Security Techniques for E-Health Cloud 3.1 Proxy Re-Encryption Using Time Limit Model in Cloud 3.2 Attribute-Based Information Retrieval with Semantic Keyword Search 3.3 Search Mechanism Using Attribute-Based Encryption 3.4 Conjunctive Keyword Search to Secure Healthcare Data 3.5 Cloud-Based Medical Record Access 3.6 A Security Model Using a Fog Computing Facility with Pairing-Based Cryptography 4 Conclusion References Effective Record Search and Update Using Design Patterns - A Case Study of Blood Bank Mobile Application Abstract 1 Introduction 2 Literature Review 2.1 Publisher Subscriber Pattern 3 Implementation 3.1 Interface Security 3.2 Request Handling 3.3 Data Management and Portability 4 Methodology 5 Conclusion and Future Scope References Comprehensive and Comparative Study of Efficient Location Tracking Based on Apriori and Dijkstra Algorithms Abstract 1 Introduction 2 Literature Review 2.1 GIS in Tracking System 2.2 Tracking System Using GPS 3 Adaption of Apriori Algorithm 4 Adaption of Dijkstra Algorithm 5 Data Model 6 Use Case Diagram 7 Implementation of Algorithms Using Datasets 7.1 Apriori Algorithm 7.2 Dijkstra’s Algorithm 8 Comparative Analysis of Algorithm’s 9 Conclusion 9.1 Future Scope References Weather Data Analysis for Jaipur City: Using MongoDB Abstract 1 Introduction 2 Literature Review 3 Methodology 4 Conclusion References A Survey on Intrusion Detection System Using Artificial Intelligence Abstract 1 Introduction 1.1 Cybersecurity and Its Domain 1.2 Solution Related Problem 1.3 Major Problem- Malicious Network Traffic 1.4 Techniques to Resolve 1.5 IDS 1.6 IDS with Traditional Methods 1.7 Why AI? 2 IDS/IPS 2.1 How IDS/IPS Works? 2.2 Different Types of IPS 2.3 Problem in IDS 2.4 Different Tools of IDS 2.5 How AI Can Improvise the IDS Detection Result 3 Artificial Intelligence and It’s Different Area 3.1 Machine Learning 3.2 Deep Learning 4 Conclusion References Trusted and Secured E-Voting Election System Based on Block Chain Technology Abstract 1 Introduction 2 Literature Survey 3 Existing System 3.1 Proposed System 3.2 Benefits of the Proposed System 3.3 Steps Involved in the Blockchain-Based E-Voting System 3.4 System Overview 3.5 Applications 4 Conclusion Competing Interest References Users’ Attitude on Perceived Security of Enterprise Systems Mobility: A Conceptual Model Abstract 1 Introduction 2 Literature Review 2.1 Research Model 2.2 Enterprise Systems Mobility 2.3 Perceived Security of ES Mobility 2.4 Users’ Attitude Towards Mobile Device Security Issues 2.4.1 Mobile Device Security Issues 2.5 Users’ Attitude Towards Wireless Network Security Issues 2.6 Users’ Attitude Towards Cloud Computing Security Issues 2.7 Users’ Attitude Towards Application Level Security Issues 2.8 Users’ Attitude Towards Data (Access) Level Security Issues 2.9 Users’ Attitude Towards Enterprise Level Security Issues 2.10 Research Hypotheses 3 Research Methodology 4 Conclusion Acknowledgements References Smart Old Age Home Using Zigbee Abstract 1 Introduction 2 Literature Overview 2.1 Fire/Gas Leakage 2.2 ZigBee 2.3 Smart Door 2.4 Smart Gardens and Water Level Detection 2.5 Lighting 2.6 Society 3 Interface Diagram and Proposed Work 4 Overall Working of the Module 5 Implementation and Results 6 Snapshots 7 System Testing 8 Analysis 9 Conclusion Acknowledgment References Performance Improvement in 6G Networks Using MC-CDMA and mMIMO Abstract 1 Introduction 2 MC-CDMA and mMIMO Towards Future Wireless Communication Networks 2.1 Underwater Acoustic Channels 2.2 Visible Light Communication (VLC) 2.3 Terahertz (THz) Communication 2.4 Large Intelligent Surface (LIS) 2.5 Artificial Intelligence (AI) and Machine Learning (ML) 2.6 Holographic Beamforming (HBF) 2.7 Blockchain-Based Spectrum Sharing 3 Conclusion References An Adaptive and Opportunistic Based Routing Protocol in Flying Ad Hoc Networks (FANETs): A Survey Abstract 1 Introduction 1.1 Advantages of Multi-UAV Systems 1.2 Unique Challenges of Multi-UAV Systems 1.3 Difference Between MANET, VANET and FANET 2 FANET Routing Protocols 3 Comparison of Routing Protocols 4 Functionality of FANET 4.1 Scalability Extension of Multi-UAV Operation 4.2 Trustworthy Multi-UAV Communication 4.3 UAV Swarms 4.4 FANET to Decrease Payload and Cost 5 FANET Design Considerations 5.1 Adaptability 5.2 Scalability 5.3 Latency 5.4 UAV Platform Constraints 5.5 Bandwidth Requirement 6 FANET Communication Protocols 6.1 Physical Layer 6.2 MAC Layer 6.3 Network Layer 6.4 Transport Layer 6.5 Cross-Layer 7 Conclusion References A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection Abstract 1 Introduction 2 Attacks on Digital Images 2.1 Chosen Plaintext Attack 2.2 Noise Attack 2.3 Geometrical Attack 3 Image Encryption Methods 3.1 Add-Image-Feature Algorithm 3.2 Association of Plaintext Information with Secret Key 3.3 Two-Dimensional Logistic Adjusted Sine Map Based Image Encryption Scheme 4 Image Watermarking Methods 4.1 Optimal DCT - Psychovisual Threshold 4.2 Logistic Maps and RSA Encryption 5 Comparison and Analysis 5.1 Image Encryption Schemes 5.2 Image Watermarking Schemes 6 Conclusion References Comparing Sentiment Analysis from Social Media Platforms – Insights and Implications Abstract 1 Introduction 2 Methodology 3 Analysis 4 Results 4.1 Insights and Implications from This Study 5 Conclusion References A Smart Farm – An Introduction to IoT for Generation Z Abstract 1 Introduction 2 Technologies Used 2.1 Hardware 2.2 Software 2.3 Server 3 Materials and Methods 4 Results and Discussion 5 Conclusions Compliance with Ethical Standards References Algorithms Used for Scene Perception in Driverless Cars Abstract 1 Introduction 2 Problems Encountered in Scene Segmentation 2.1 Mixed Matched Relationship in Images 2.2 Gridding in Samples 2.3 Speed Efficiency of Perception 3 Counter-Measure Algorithms 3.1 Pyramid Based Pooling Method 3.2 Hybrid Dilated Convolution (HDC) 3.3 SegNet 3.4 E-Net (Efficient Neural Network) 4 Conclusion and Future Work References Machine Learning Algorithms for Early Prediction of Heart Disease Abstract 1 Introduction 2 Challenges in Conventional Method of Diagnosis 3 Classifiers 3.1 Supervised Learning Algorithm 3.2 Unsupervised Learning Algorithm 4 Methodology 4.1 Support Vector Machine 4.2 Artificial Neural Network 4.3 Decision Tree 4.4 Naïve Bayes 5 Comparison of Algorithms 6 Conclusion and Future Scope References Analysis and Review of Cloud Based Encryption Methods Abstract 1 Introduction 2 Privacy Issues in Cloud Computing 2.1 Data Encryption Is Required as the Service Providers Are Semi-trusted 3 Encryption Methods 3.1 Key-Policy Attribute-Based Encryption [7] 3.2 Multi-authority Proxy Re-encryption [2] 3.3 Dynamic Encrypted Data Sharing Scheme [3] 3.4 Cipher Text-Policy Attribute-Based Encryption [9] 4 Comparison and Analysis 4.1 Encryption Schemes 5 Conclusion References Data Storage Security Issues in Cloud Computing Abstract 1 Introduction 2 Issues and Challenges 2.1 Data Loss Issues 2.2 Data Breaches Issues 2.3 Malicious Insiders 2.4 Data Location Issues 2.5 Data Integrity Issues 2.6 Data Confidentiality Issues 3 Solutions 3.1 Methods to Prevent Data Loss 3.1.1 Strong API 3.1.2 Protection of Data 3.1.3 Backup, Clearing of Data and Key Maintenance 3.2 Methods for Avoiding Malicious Insiders 3.2.1 Creating Processes and Transparency 3.2.2 Human Resources Requirements and Use of IDs 3.3 Solutions to Data Location Issues 3.3.1 Informed About Location 3.3.2 Backup 3.4 Protecting Data Integrity 3.4.1 Appointing Third Party 3.4.2 Using a Hash Tree 3.4.3 Using Provable Data Possession (PDP) 3.4.4 Using Basic PDP Scheme Based on MAC 3.4.5 Using Scalable PDP 3.4.6 Using Dynamic PDP 3.4.7 By Using Proof of Reliability (POR) 3.4.8 Using POR Based on Keyed Hash Function hk(F) 3.4.9 Using Hail 3.5 Encryption Techniques to Prevent Data Confidentiality Issues 3.5.1 Advanced Encryption Standard (AES) 3.5.2 Blowfish Algorithm 3.5.3 IDEA Algorithm 3.5.4 RSA Algorithm 3.5.5 Homomorphic Encryption 3.5.6 Diffie Hellman Key Exchange 4 Analysis of the Methods Used 5 Conclusion and Future Work References Challenges and Solutions in Recommender Systems Abstract 1 Introduction 2 Issues and Challenges 3 Solutions 4 Analysis/Review 5 Conclusion References Review of Machine Learning in Geosciences and Remote Sensing Abstract 1 Introduction 2 Related Work 3 Problems in Geosciences and Remote Sensing 3.1 Choosing the Right Machine Learning Model 3.2 Classifying and Characterizing Airborne Particulate Matter Using Machine Learning 3.3 Change Detection in Satellite Images in Delhi, India 3.4 Classification of Satellite Images in a Hybrid Environment 4 Solutions and Countermeasures for Geosciences and Remote Sensing 4.1 Using Machine Learning Techniques as an Efficient and Accurate Solution to Geo-Scientific Problems of Classification and Characterization 4.1.1 Genetic Programming 4.1.2 Support Vector Machine 4.2 Using Machine Learning to Analyze Aerosol and Particulate Matter 4.2.1 Using a Gradient Boosting Machine Learning Model 4.2.2 Linear Support Vector Machine 4.3 Using Machine Learning Algorithms to Analyses Satellite Images 4.3.1 K Means (Partition Based - Clustering) 4.3.2 FCM (Fuzzy Network – Fuzzy C Means) 4.3.3 EM (Probability Based – Expectation Maximization) 4.4 Classification and Analysis of Images Using Machine Learning 4.4.1 K Nearest Neighbour 4.4.2 Support Vector Machine 4.4.3 Random Forrest 5 Analysis of the Methods Used 6 Conclusion References Data Storage Security Issues and Solutions in Cloud Computing Abstract 1 Introduction 1.1 Cloud Storage 1.1.1 Personal Cloud Storage [1] 1.1.2 Public Cloud Storage 1.1.3 Private Cloud Storage 1.1.4 Hybrid Cloud Storage 1.1.5 Community Cloud Storage 2 Issues and Attacks in Cloud Computing Data Storage 2.1 Weak Cryptography 2.2 Lack of Secure Client Confirmation Access to the Cloud Storage 2.3 Attack on Storage Server 2.4 Types of Attacks 2.4.1 Side Channel Attack 2.4.2 DoS (Denial of Service) 2.4.3 Malware Injection 3 Countermeasures for Storage Issues in Cloud 3.1 Integrating Transposition and Substitution for Encryption [3] 3.1.1 Encryption Algorithm for Integrated Transposition and Substitution Encryption [3] 3.1.2 Decryption Algorithm for Integrated Transposition and Substitution Encryption [3] 3.2 Kerberos Protocol for Storage Access Authentication [5] 3.3 Encrypted Data Storage Coprocessor for Separate Encryption and Storage [1] 3.4 Searchable Encryption [1] 3.5 Data Obfuscation and Steganography for Enhanced Public Cloud Storage [13] 3.5.1 MRADO Technique [14] 3.5.2 Pixel Processing Using Least Significant Bit (LSB) [15] 4 Analysis/Review 5 Conclusion References Big Data and Internet of Things for Smart Data Analytics Using Machine Learning Techniques Abstract 1 Introduction 2 Related Works 3 System Overview 3.1 IOT Applications Connected with Sensors 3.2 Analyzing the Data, Generating and Storing Big Data 3.2.1 Storing the Big Data 3.3 Applying Machine Learning Techniques on the Big Data, the Stored Data 3.3.1 Classification 3.3.2 Regression 3.3.3 Clustering 4 IOT Applications and Algorithms for Smart Data Analysis 4.1 Smart Traffic and Environment 4.2 Smart Weather Prediction 4.3 Smart Market Analysis 4.4 Smart Citizen and Agriculture 4.5 Analysis on Smart Home and Smart City 4.6 Smart Health Analysis 4.7 Smart Monitoring 5 Use Case for Smart Parking System 5.1 Hardware 5.2 Software Used 5.3 Programming Language 5.4 Project Implementation 6 CNN Algorithm (Convolution Neural Networks) of Machine Learning for Smart Parking Analysis 6.1 Collecting the Data 6.2 Data Preprocessing 6.3 Test Case Creation 6.4 Model Implementation 6.5 Evaluation of the Model 7 Conclusion References Comparison of Cloud Computing Security Threats and Their Counter Measures Abstract 1 Introduction 2 Security Issues in Cloud Computing 2.1 Data Threats 2.1.1 Data Breaches 2.1.2 Data Loss 2.2 Network Threats 2.2.1 Account or Service Hijacking 2.2.2 Denial of Service Attack 2.3 Cloud Environment Specific Threats 2.3.1 Insecure Interfaces and APIs 2.3.2 Malicious Insiders 2.3.3 Insufficient Due Diligence 2.4 Abuse and Nefarious Use 2.5 Issues Due to Shared Technology 2.6 Security Challenges in the Authentication and Access Control 3 Solutions to Security Issues in Cloud Computing 3.1 Data Security 3.1.1 Protection from Data Breaches 3.1.2 Protection from Data Losses 3.2 Network Security 3.2.1 Protection from Account or Service Hijacking 3.2.2 Protection from Denial of Service 3.3 Cloud Environment Security 3.3.1 Protection from Insecure Interfaces and APIs 3.3.2 Protection from Malicious Insiders 3.3.3 Protection from Insufficient Due Diligence 3.4 Protection from Abuse and Nefarious Use 3.5 Protection from Issues Due to Shared Technology 3.6 Protection from Threats in Authentication and Access Control 4 Analysis/Review 5 Conclusion References An Effective Kapur’s Segmentation Based Detection and Classification Model for Citrus Diseases Diagnosis System Abstract 1 Introduction 2 Proposed Work 2.1 Pre-processing 2.2 Kapur’s Method for Segmentation 2.3 PSO-SVM Based Classification 3 Performance Validation 4 Conclusion References Anomaly Detection Using Anomalous Behavior at Program Environment Through Relative Difference Between Return Addresses Abstract 1 Introduction 1.1 Anomaly Detection 2 Related Work 3 Proposed Work: Programming Environment 4 Datasets: Artificial Datasets 5 Implementation: Experiments and Results 5.1 Discussions 6 Conclusion and Future Work References Satellite Image Enhancement and Restoration Abstract 1 Introduction 2 Literature Review 3 Methodology 3.1 Contrast Enhancement 3.2 Intensity Equalization 4 Result 5 Conclusion References Role of AI in Gaming and Simulation Abstract 1 Introduction 2 AI in Simulation 3 AI in Gaming 4 Objective and Methodology 5 Conclusion References Analysis of MRI Images Using Image Processing Technique Abstract 1 Introduction 2 Related Research Work 3 MRI 4 Proposed Technique 4.1 Pre-processing 4.1.1 Histogram Equalization 4.1.2 Median Filtering 4.2 Feature Segmentation 4.2.1 Prewitt 4.2.2 Morphological Transformation 5 Result and Discussion 6 Conclusion References Recent Trends of IoT in Smart City Development Abstract 1 Introduction 2 Internet of Things 3 Smart City 4 IoT Supporting Security 5 IoT in Healthcare 6 IoT in Energy Saving 7 IoT in Providing Adequate Water Supply 8 IoT in Transportation and Logistics 9 IoT in Traffic Control 10 Challenges Faced in Building a Smart City 11 Conclusion and Future Scope References Analysis of Biometric Modalities Abstract 1 Introduction 2 Biometrics Framework 3 Biometric Modalities 4 Voice, Gait and Signatures 5 Retina Scanner 6 Unique Mark Scanner 7 Conclusion Compliance with Ethical Standards References Comparative Analysis of Contrast Enhancement Techniques for MRI Images Abstract 1 Introduction 2 Methodology 3 Result and Discussion 4 Future Work 5 Conclusion References Global User Social Networking Ranking Statistics Abstract 1 Introduction 2 Literature Survey 3 Proposed System 4 Result and Discussions 5 Conclusion References Detecting Spam Emails/SMS Using Naive Bayes, Support Vector Machine and Random Forest Abstract 1 Introduction 2 Literature Review 3 Problem Definition 4 Proposed Work 5 Experimental Analysis 6 Conclusion References Detection of Flooding Attacks Using Multivariate Analysis Abstract 1 Introduction 2 Related Work 3 Abnormality Analysis Methodology 3.1 Multivariate Statistical Analysis 3.2 Hotelling’s T2 Method 3.3 Mean Vector and Covariance Matrix 3.4 Attack Detection Approach Using Abnormality Distance Metric 4 Implementation 4.1 Configuration 4.2 Generating and Sending Flooding Attack Packets 4.3 Capturing the Attack Packet 4.4 Testing the Attack 5 Results and Discussion 5.1 TCP-SYN Attack Results 5.2 UDP Attack Results 5.3 ICMP Attack Results 6 Conclusion and Future Work References Human Gait Recognition Abstract 1 Introduction 2 Techniques Used for Obtaining Gait Parameters 2.1 Non-Wearable Sensors 2.1.1 Image Processing 2.1.2 Floor Sensors 2.2 Wearable Sensors 2.2.1 Pressure and Force Sensors 3 Detection of Gait Events 3.1 ANN Classifier 3.1.1 Training Data Collector 3.1.2 Training Data Analyzer 3.2 Inductive Learning Technique (Decision Tree) 3.3 Fuzzy Logic 4 Analysis and Comparison 5 Conclusion and Future Work References Reduction of Traffic on Roads Using Big Data Applications Abstract 1 Introduction 2 Ease of Use 3 Literature Survey 4 Proposed System 4.1 HDFS 4.2 Sqoop 4.3 Hive 4.4 Pig 4.5 MySQL 5 Conclusion and Future Enhancements References Survey on Utilization of Internet of Things in Health Monitoring Systems Abstract 1 Introduction 2 Survey Classification 3 Literature Survey 4 Research Gap 5 Conclusion and Future Work References AgroFarming - An IoT Based Approach for Smart Hydroponic Farming Abstract 1 Introduction 2 Related Work 3 Shortcomings in the Previous Solutions, Which Were Not Addressed 3.1 No Real Time Notifications to the User [7, 8] 3.2 No Customization of Sensors Available [12] 3.3 Addition of the Off-Shelf Camera Is Not Possible in Any of the Current Solutions [11] 3.4 Different Modes of Operation Is Not Present [11] 3.5 E-Recipes for Different Plants Is Not Present [13] 3.6 Open Source Is Not Present 3.7 No Suitable Size 3.8 No User Friendliness 4 Current Solutions in the Market 4.1 iHydroMobile 4.2 Plant Talk 4.3 Robot Farm 4.4 MicroCEA: Developing a Personal Urban Smart Farming Device 4.5 Personal Food Computer (PFC):- A New Device for Controlled-Environment Agriculture [19] 5 Comparison of the Hydroponic Solutions 6 Conclusion References Review on Dimensionality Reduction Techniques Abstract 1 Introduction 2 Problems Faced While Handling High Dimensional Data 3 Various Methods for Dimension Reduction 3.1 Feature Selection 3.1.1 Variance Threshold 3.1.2 Feature Ranking 3.1.3 High Correlation Factor 3.2 Linear Dimensionality Reduction Algorithms 3.2.1 Principle Component Analysis 3.2.2 Linear Discriminant Analysis (LDA) 3.3 Non Linear Dimensionality Reduction 3.3.1 Kernel PCA 3.3.2 Isomap 4 Analysis/Review 5 Conclusion References Security Issues in Cloud Computing Abstract 1 Introduction 2 Issues in Security of Cloud Computing 2.1 Data Breaches 2.2 Reduced Network Security 2.3 Advanced Persistent Threat Parasite (APT Parasite) 2.4 Side Channel Attack 2.5 No Recovery 2.6 Wrapping Attack 2.7 Malware Injection Attack (Meta Data Spoofing Attack) 2.8 Cross Scripting Acting 2.9 Breakage of Information 2.10 Permanent Data Loss 2.11 DOS Attacks 2.11.1 Direct Denial of Service 2.11.2 Indirect Denial of Service 2.12 Flooding Attack 3 Solutions to Security Issues 3.1 Authenticated Access to Data 3.2 End to End Encryption 3.3 Image Steganography 3.4 Prevention of APTs (Advanced Persistent Threat) 3.5 Solution to Side Channel Attack 3.6 Secure the Data Destruction 3.7 Wrapping Attack Solution 3.8 Malware Injection Attack Solution 3.9 Cross Scripting Attack Solution 3.10 Multifactor Authentication 3.11 Encryption of Backups 3.12 Prevention of Dos Attacks 3.13 Solution to Flooding Attack 4 Analysis/Review 5 Conclusion References A Review on Predicting Cardiovascular Diseases Using Data Mining Techniques Abstract 1 Introduction 2 Cardiovascular Diseases and Its Risk Factors 2.1 Risk Factors and Symptoms in Cardiovascular Diseases 3 Review on Cardiovascular Diseases Prediction Using Data Mining Techniques 4 Conclusion Adaptive Object Tracking Using Algorithms Employing Machine Learning Abstract 1 Introduction 2 Problems in Adaptive Object Tracking 2.1 Selecting Sub-optimal Examples for Training 2.2 Detector Errors 2.3 Training Data Set for Convolutional Neural Network 2.4 Drifting in Stochastic Gradient Descent 2.5 Target Object Occlusions 3 Solutions/Countermeasures 3.1 Multiple Instance Learning Track (MIL Track) 3.2 P-N Learning in TLD Framework 3.3 Stochastic Gradient Descent in MDNet 3.4 Hard Mini-Batch Mining 3.5 Handling Target Object Occlusions 3.5.1 Depth Analysis Method 4 Analysis/Review 4.1 Comparison Table 5 Conclusion and Future Work Emotion Recognition Using Physiological Signals Abstract 1 Introduction 2 Problems in Emotion Recognition 2.1 Presence of Outliers 2.2 Vanishing Gradient 2.3 Local Minima 2.4 Manual Feature Extraction 3 Solutions 3.1 PNN 3.2 LSTM (Long Short-Term Memory) 3.3 Deep Belief Networks 3.4 Convolutional Neural Networks 4 Analysis of Solutions 4.1 Comparison Table 5 Conclusion References Prediction of Sudden Cardiac Arrest Due to Diabetes Mellitus Using Fuzzy Based Classification Approach Abstract 1 Introduction 2 Related Works 3 Proposed Work 3.1 Dataset 3.2 Methodology 3.3 Classification on Risk Score 3.4 Fuzzification 3.5 Rule Based Classification 3.6 Defuzzification 4 Numerical Results 5 Conclusion References Suggesting a System to Enhance Decision Making in Location Based Social Networks Abstract 1 Introduction 1.1 Data Mining 1.2 Market Analysis and Management 1.3 Spatial Database 1.4 Techniques 1.5 R-Tree Index 2 Need for the Study 2.1 Issues 2.2 Objective of the Study 3 Proposed Flow Diagram 4 Results and Discussion 5 Conclusion and Future Enhancement References Security Challenges in NoSQL and Their Control Methods Abstract 1 Introduction 2 Vulnerabilities in NoSQL 2.1 Lack of Encryption 2.2 Malware 2.3 No Authentication 2.4 No Authorization 2.5 PHP Array Injection Attack 2.6 SQL ‘OR’ Injection Attack 2.7 NoSQL JavaScript Injection Attack 2.8 Denial of Service Attack 3 Solutions to the Vulnerabilities in NoSQL 3.1 Mitigate the Injection Attacks 3.1.1 Static Application Security Testing 3.1.2 Dynamic Application Security Testing 3.2 Access Control 3.2.1 Mandatory Access Control 3.2.2 Discretionary Access Control 3.2.3 Role-Based Access Control 3.3 Protection Against Malware 3.3.1 Firewall 3.3.2 Antivirus 3.4 Mitigate Denial of Service Attack 3.5 Implement Encryption in NoSQL 4 Analysis/Review 4.1 Comparison Table 5 Future Scope 6 Conclusion References Linux Server Based Automatic Online Ticketing Kiosk Abstract 1 Introduction 1.1 Methodology 1.2 Contemplated Requirements 2 Project Methodology 2.1 GUI Design 2.2 Server Design 3 Discussion References A Reliable Automation of Motorized Berth Climb Abstract 1 Introduction 2 Methodology 3 Discussion 4 Conclusion References Requirement Gathering for Multi-tasking Autonomous Bus for Smart City Applications Abstract 1 Introduction 2 About the Method 3 Conclusion References Offline Handwritten Devanagari Character Identification Abstract 1 Introduction 2 Preceding Data Study 3 Purposes of OCR 4 Conclusion Acknowledgement References Behavior Anomaly Detection in IoT Networks 1 Introduction 2 Related Work 3 Solution Architecture 4 Data Collection and Features 5 Experiment Results 5.1 Evaluation of Novelty Detection 5.2 Evaluation of Classification 6 Discussion 7 Conclusion References Review of Digital Data Protection Using the Traditional Methods, Steganography and Cryptography Abstract 1 Introduction 1.1 Hardware Means for Protection of the Software [3] 1.2 Methods of Protecting a Software with Support of Hardware 1.3 Software Means of Protection [1] 1.4 Exposure of the Techniques Using Hardware Means, Software Means of Protection 1.5 Multilevel Hiding Text Security Technique 2 Analysis/Review 2.1 Applications of the Hardware Means for Protection of the Software [3] 2.2 Protection of Software with Support of Hardware [2] 2.3 Applications Used for the Software Means of Protection 2.4 StegoDB Model 2.5 Multilevel Hiding Text Security Technique 3 Conclusion and Future Work References (IEEE format) Waste Management Techniques for Smart Cities Abstract 1 Introduction 2 Issues Related to Waste Management 2.1 Environment Pollution 2.2 Municipal Solid Waste (MSW) 2.3 e-Waste 2.4 Hazardous Waste 3 Solutions 3.1 Smart Bins 3.2 Disposal Methods for MSW [5, 7] 3.2.1 Sanitary Landfills 3.2.2 Composting 3.3 Disposal Methods for e-Waste [4] 3.3.1 Landfill Disposal 3.3.2 Open Sky Incineration 3.4 Methods Used for the Ultimate Disposal of Hazardous Waste [6] 3.4.1 Secured Landfill 3.4.2 Incineration 3.4.3 Lagooning 4 Analysis 5 Conclusion and Future Work References A Light Modulating Therapeutic Wearable Band for ‘Vision Health’ Abstract 1 Introduction 2 Method 2.1 Thermoelectric Effect 3 Operative Principle 3.1 Mirage Effect 4 Therapeutic Wearable Device 5 Diagnosing Medical Ailments 5.1 Hypermetropia 5.2 Spherical vs Cylindrical Optical Number 6 Advantages 7 Conclusion Acknowledgement References “Health Studio” – An Android Application for Health Assessment Abstract 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Health Trackers 3.2 Convertors 3.3 Mental Health Awareness Platform 3.4 Local Maps 4 Experimental Results 5 Conclusion References Potential Candidate Selection Using Information Extraction and Skyline Queries Abstract 1 Introduction 2 Related Work 3 System Architecture and Design 3.1 Processing Module 3.2 Query Execution Module 3.3 Storage Module 3.4 Analysis and Output Module 4 Implementations and Experiments 4.1 Experimental Setup 4.2 Implementation 4.3 Performance Evaluation 5 Conclusion Acknowledgement References An Effective Feature Extraction Based Classification Model Using Canonical Particle Swarm Optimization with Convolutional Neural Network for Glaucoma Diagnosis System Abstract 1 Introduction 2 Proposed Work 2.1 Preprocessing 2.2 Segmentation 2.3 Hough Transform Based Feature Extraction 2.4 Classification 3 Performance Validation 4 Conclusion References Dominant Feature Descriptors with Self Organising Map for Image Retrieval Abstract 1 Introduction 2 Proposed Feature Extraction Method 2.1 Dominant Rotated LBP 2.2 Histogram of Dominant Edgels 2.3 Self Organizing Map 2.4 Measure of Likeness 3 Experimental Results 4 Conclusion References Medical Image Retrieval Using Efficient Texture and Color Patterns with Neural Network Classifier Abstract 1 Introduction 2 Proposed Work 2.1 Feature Extraction 2.1.1 Color Feature Extraction Using Auto Correlogram 2.1.2 Texture Feature Extraction Using DLTerQEP Model 2.2 NN Model 3 Performance Validation 4 Conclusion References Deterministic Type 2 Fuzzy Logic Based Unequal Clustering Technique for Wireless Sensor Networks Abstract 1 Introduction 2 Proposed Work 3 Performance Validation 4 Conclusion References Android Application Based Solid Waste Management Abstract 1 Introduction 2 Literary Survey 3 Proposed System 4 Dataflow Diagram 5 Sequence Diagram 6 Comparison Table 7 Experimentation 8 Conclusion References An Approach for Detecting Man-In-The-Middle Attack Using DPI and DFI Abstract 1 Introduction 2 Related Work 3 Types of Man-In-The-Middle Attack 3.1 Spoofing Based MITM Attack 3.2 SSL (Secure Socket Layer) MITM Attack 3.3 BGP (Border Gateway Protocol) Based MITM Attack 3.4 Cookie Hijacking 3.5 Man-In-The-Browser 3.6 Wireless MITM Attack 4 Deep Packet Inspection and Deep Flow Inspection 5 Approach for Detecting Man-In-The-Middle Attack Using Deep Packet Inspection and Deep Flow Inspection 6 Experimental Evaluation 7 Conclusion and Future Work Acknowledgements References Smart Irrigation and Crop Disease Detection Using Machine Learning – A Survey Abstract 1 Introduction 2 Literature Review 3 Comparison of Different Detection Method for Smart Irrigation and Detection of Crop Diseases 4 Conclusion References Wireless-Sensor-Network with Mobile Sink Using Energy Efficient Clustering Abstract 1 Introduction 2 Related Work 3 Mobility Model 4 Radio Energy Mode 5 Finite State Machine 6 Architecture 7 Results 8 Conclusion References Internet of Things and Blockchain Based Distributed Energy Management of Smart Micro-grids Abstract 1 Introduction 2 Energy Management of Micro-grid 2.1 Smart-Grid 2.2 Micro-grid 2.3 Internet of Things (IOT) 3 Implementation of Micro-grid Energy Management 3.1 Energy Management Implementation 3.2 Implementation of Block Chain in Micro Grids 4 Conclusion References Bio-inspired Deoxyribonucleic Acid Based Data Obnubilating Using Enhanced Computational Algorithms Abstract 1 Introduction 2 Organism Anatomy 3 DNA Cryptography 4 Types of DNA Cryptography 4.1 Symmetric Key DNA Cryptography 4.2 Asymmetric Key DNA Cryptography 4.3 Pseudo DNA Cryptography 4.4 DNA Steganography 5 DNA Binary Coding 6 DNA Data Obnubilating Techniques 6.1 Insertion Technique 6.2 Complementary Pair Rule Techniques 6.3 Substitution Technique 7 Performance Analysis 8 Conclusion References Detection of Type 2 Diabetes Using Clustering Methods – Balanced and Imbalanced Pima Indian Extended Dataset Abstract 1 Introduction 2 Literature Survey 3 Dataset Description 4 Proposed Work 4.1 Attribute Selection Using Wrapper Method 4.1.1 Wrapper Attribute Selection 4.2 Oversampling 4.2.1 SMOTE Method of Oversampling 4.3 Clustering Algorithm 4.3.1 K-Means Clustering 4.3.2 Farthest First Clustering 4.3.3 Density Based Clustering 4.3.4 Filtered Clustering 4.3.5 X-Means Clustering 5 Results 5.1 Clustering of Imbalanced Dataset 5.2 Clustering of Balanced Datasets 6 Conclusion References Detection of Depression Related Posts in Tweets Using Classification Methods – A Comparative Analysis Abstract 1 Introduction 2 Related Works 3 Dataset Description 4 Methodology 4.1 Data Pre-processing Module 4.1.1 Converting Emoticons to Text Form 4.1.2 Converting to Lower Case 4.1.3 Removing URL 4.1.4 Removing User Name 4.1.5 Removing Punctuations and Special Characters 4.1.6 Removing HTML Character 4.1.7 Converting Slang Words to Normal Form 4.1.8 Converting Contracted Words to Full Forms 4.1.9 Converting Elongated Words to Normal Form 4.1.10 Splitting Attached Words 4.1.11 Removing Digits 4.1.12 Removing Non Lexical Words 4.1.13 Removing Stop Words 4.1.14 Lemmatization 4.1.15 Stemming 4.2 Feature Extraction Module 4.2.1 n-grams 4.2.2 Bag of Words (BOW) 4.2.3 TF-IDF 5 Classification Module 6 Results and Discussion 7 Conclusion and Future Work References Aspect Based Sentiment Classification and Contradiction Analysis of Product Reviews Abstract 1 Introduction 2 Related Work 3 System Architecture and Design 3.1 Dataset Preprocessing 3.2 Segmentation 3.3 Aspect Detection 3.4 Parts of Speech (POS) Tagging 3.5 Sentiment Classification Method 3.6 Contradiction Analysis 4 System Implementation and Experiments 4.1 Experimental Setup 4.2 Implementation 4.3 Performance Evaluation 5 Conclusion References A Novel Approach to Extract and Analyse Trending Cuisines on Social Media Abstract 1 Introduction 2 Literature Survey 3 Proposed Approach 3.1 Data Collection 3.2 Preprocessing the Data 3.3 Parts of Speech Tagging of the Tweets 3.4 Creating a Food Lexicon 3.5 Extraction of Food Items 3.6 TF-IDF and Logistic Regression for Cuisine Classification 4 Software Implementation 4.1 Tweet Processing 4.2 Creating Our Food Lexicon 4.3 Parts of Speech Tagging of the Tweets 4.4 Food Matching Using Fuzzy Parsing 4.5 Cuisine Classification Using Logistic Regression and TFIDF 5 Results 5.1 Pre-processing the Data 5.2 Preparing the Food Lexicon 5.3 Parts of Speech Tagging the Tweets 5.4 Food Matching Using Fuzzy Parsing 5.5 Cuisine Classification Using Logistic Regression and TFIDF 6 Conclusion 7 Future Work Acknowledgement References Alphanumeric Character Recognition on Tiny Dataset Abstract 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Image Character Identification 3.2 Image Generation by Changing of Instantiation Parameters 4 Experiments and Results 4.1 Alphanumeric Character Classification 4.2 Image Creation Technique Results 5 Conclusion References Sentiment Analysis in Movie Reviews Using Document Frequency Difference, Gain Ratio and Kullback-Leibler Divergence as Feature Selection Methods and Multi-layer Perceptron Classifier Abstract 1 Introduction 2 Related Work 3 Proposed Framework for Sentiment Extraction and Classification 3.1 Data Source 3.2 Data Preprocessing 3.3 Vectorization 3.4 Feature Selection 3.5 Opinion Classification 4 Results and Performance Analysis 4.1 Evaluation Methods 4.2 Results 5 Conclusion References A Patch - Based Analysis for Retinal Lesion Segmentation with Deep Neural Networks Abstract 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Preprocessing 3.2 Network Details 4 Results and Discussion 4.1 Dataset Description 4.2 Training 4.3 Performance Evaluation 4.4 Results 5 Conclusion References Survey of Onion Routing Approaches: Advantages, Limitations and Future Scopes Abstract 1 Introduction 2 Background 3 Process Flow of Onion Routing 4 Literature Survey 5 Analysis 6 Applications of Onion Routing 7 Discussion and Future Scope 8 Conclusion References A Technical Paper Review on Vehicle Tracking System Abstract 1 Introduction 2 Literature Survey 2.1 A Real-Time GSM/GPS Based Tracking System Using Mobilephone 2.2 GSM Technology 2.3 System Overall Plan Design 2.4 Design and Development of Bus Tracking System 2.5 Implementation of Vehicle Terminal 3 Conclusion References Role of Wireless Communications in Railway Systems: A Global Perspective Abstract 1 Introduction 2 Research Efforts in HST Communication Systems 2.1 Train – Ground Communication Model 2.2 On – Board Transceivers Communication System 2.3 High Speed Linear Cell Communication System 3 Metro/Subway Rapid Transit System 4 Driverless Train Operation for Urban Rail Transit Systems 5 Conclusion References Protection of Microgrid with Ideal Optimization Differential Algorithm Abstract 1 Introduction 2 Problem Evolution 2.1 Operating Time Problem Formation 2.2 Non Linear Objective Function with Constraint 3 DWT-Differential Analysis 3.1 Algorithm and Flow Chart 4 Simulation Case Study 4.1 DWT Analysis of Fault Current 4.2 Comparative Analysis 5 Conclusion References An Improved Energy Efficient Scheme for Data Aggregation in Internet of Things (IoT) Abstract 1 Introduction 2 Literature Review 3 Research Gaps and Problem Formulation 4 Proposed Work 5 Experimental Results 6 Conclusion References A Hybrid Approach for Credit Card Fraud Detection Using Naive Bayes and Voting Classifier Abstract 1 Introduction 2 Literature Review 3 Research Gaps and Problem Formulation 4 Proposed Work 5 Experimental Results 6 Conclusion References Quantum Inspired Evolutionary Algorithm for Web Document Retrieval Abstract 1 Introduction 2 Evolutionary Algorithms 2.1 Quantum Computing 2.2 Quantum Inspired Evolutionary Algorithms (QIEAs) 3 Proposed Objectives 3.1 Artificial Life Agents 3.2 Proposed Algorithm 4 Experimental Results 5 Conclusion References Signature Recognition and Verification Using Zonewise Statistical Features Abstract 1 Introduction 2 Related Works 3 Proposed Methodology 3.1 Image Acquisition 3.2 Preprocessing 3.3 Feature Extraction 3.4 Construction of Knowledge Base 3.5 Training and Signature Recognition and Verification with Neural Network Classifier 4 Experimental Results and Analysis 4.1 An Experimental Analysis of a Sample Signature Image 4.2 An Experimental Analysis Dealing with Various Issues 5 Conclusion and Future Work References Home Security Using Smart Photo Frame Abstract 1 Introduction 2 Related Work 3 Issues and Challenges 4 Proposed System 5 Experimentation 6 Results and Analysis 6.1 Face and Eye Detection Using Haar Cascade Classifier 7 Conclusion and Scope for Future Work References Automated System for Detecting Mental Stress of Users in Social Networks Using Data Mining Techniques Abstract 1 Introduction 2 Review of Literature 3 Proposed Methodology 4 Simulation Details 4.1 Performance Metrics 4.2 Accuracy by Category 4.3 Accuracy Rate 5 Conclusion References Intelligent Request Grabber: Increases the Vehicle Traffic Prediction Rate Using Social and Taxi Requests Based on LSTM Abstract 1 Introduction 2 Related Works 3 System Model 3.1 Request Grabber 3.2 Requests from Social Transportation 3.3 Requests from Taxi Data 3.4 Recurrent Network Model 3.5 Request Format 3.6 Cumulative Request 4 Experimental Analysis 5 Conclusion References Aggregation in IoT for Prediction of Diabetics with Machine Learning Techniques Abstract 1 Introduction 2 Related Work 3 Research Problem Definition 4 Proposed Architecture 4.1 Architecture 4.2 Process Flow of Smart Dıabetıc System 4.3 Machine Learning Algorithms 4.4 Implementation 5 Result and Discussion 6 Conclusion References EWS: An Efficient Workflow Scheduling Algorithm for the Minimization of Response Time in Cloud Environment Abstract 1 Introduction 2 Related Works 3 Problem Description 4 Proposed EWS: Efficient Workflow Scheduling Algorithm 5 Mathematical Model 6 Results and Discussions 7 Conclusion References An Investigation Report on Spotting and Diagnosing Diseases from the Images of Plant Leaves Abstract 1 Introduction 2 Literature Review 3 Discussion 4 Conclusion References Test Case Minimization for Object Oriented Testing Using Random Forest Algorithm Abstract 1 Introduction 2 Related Work 3 Proposed Methodology 4 Implementation 5 Results and Discussion 6 Conclusion and Future Scope References Exploring the Design Considerations for Developing an Interactive Tabletop Learning Tool for Children with Autism Spectrum Disorder Abstract 1 Introduction 2 Related Works 3 Study Methodology 3.1 Ethnographic Study 3.2 Semi Structured Interview 4 Data Analysis and Findings 5 Proposed Design of the Tabletop Learning Tool 5.1 Module 1 (Learning Alphabet and Constructing Words) 5.2 Module 2 (Appearing Test on Alphabet and Constructing Words) 5.3 Module 3 (Daily Communicator) 5.4 Module 4 (Playing Rhyme and Music) 6 Discussion and Conclusions Declarations References A Cloud-Fog Based System Architecture for Enhancing Fault Detection in Electrical Secondary Distribution Network Abstract 1 Introduction 2 Electrical Secondary Distribution Network Monitoring 3 System Requirements and Design 3.1 Requirements 3.2 System Design 4 System Architecture for Implementation 5 Microservice-Based Architecture Application Design 5.1 Use Case 5.2 Workflow 6 Conclusion and Future Work Informed Consent References An Autonomous Intelligent Ornithopter Abstract 1 Introduction 2 Literature Survey 2.1 Existing System and Its Comparison 2.2 The Lacuna of the Existing System 2.3 Proposed Solution 3 Methodology Used 3.1 Ornithopter 4 Implementation Details 5 Conclusion Acknowledgments References Detection of Distributed Denial of Service Attack Using NSL-KDD Dataset - A Survey Abstract 1 Introduction 1.1 Distributed Denial of Service Attack (DDoS) 1.2 Teardrop Attack 1.3 Smurf Attack 1.4 Ping of Death Attack 1.5 Land Attack 1.6 SYN Flood Attack 1.7 Machine Learning Algorithms 1.7.1 Supervised Learning 1.7.2 Unsupervised Learning 1.7.3 Reinforcement Learning 1.8 NSL-KDD Dataset 2 Related Work 3 Promising Technique for DDoS Detection 3.1 Preprocessing 3.1.1 String to Integer 3.1.2 Min-Max Normalization 4 Feature Selection 4.1 Methods Forward 4.2 Performance Evaluation with Machine Learning 4.2.1 K-NN 4.2.2 Naive Bayes 4.2.3 Decision Tree 4.3 Inferences 5 Conclusion References A Survey on Efficient Storage and Retrieval System for the Implementation of Data Deduplication in Cloud Abstract 1 Introduction 2 Literature Survey 2.1 Randomized Tag 2.2 Convergent Key Management 2.3 Dynamic Updates 2.4 Run Length Encoding 2.5 Leveraging Data Deduplication 2.6 Reducing Fragmentation for In-Line Deduplication 2.7 FP-Tree 2.8 Deduplication for Distributed Big Data Storage 3 Analysis on Existing Work 3.1 Based on Plain Text 3.2 Based on Security 3.3 Based on Time of Matching 3.4 Based on Cipher Text 4 Conclusion and Future Work References Comparison of Decision Tree-Based Learning Algorithms Using Breast Cancer Data Abstract 1 Introduction 2 Related Studies 3 Methodology 3.1 Basic Concepts of Data Mining 3.2 Decision Tree Classifier 3.3 Tools Used 3.4 Data Pre-processing 3.5 Attribute Selection 4 Experimental Result 5 Conclusion References Stock and Financial Market Prediction Using Machine Learning Abstract 1 Introduction 2 Methods 2.1 Ant Optimization Algorithm 2.2 Support Vector Machines 2.3 Multi-level Perceptron 3 Analysis 4 Conclusion References Review of Prediction of Chronic Disease Using Different Prediction Methods Abstract 1 Introduction 2 Related Work 2.1 Collection of Big Data 2.2 Prediction of Medical Condition 3 Solutions 3.1 Data Mining 3.2 NB (Naïve Bayes) 3.3 KNN (K-Nearest Neighbor) 3.4 Smart Clothing 3.5 CNN-Based Uni-modal and Multimodal Prediction 4 Comparison Table 5 Conclusion and Future Work References Review of Software Defined Networking Based Firewall Issues and Solutions Abstract 1 Introduction 2 Related Work 2.1 Connection Tracking 2.2 Security Issue 3 Solutions 3.1 Connection Tracking Module 3.2 Proactive Rule Caching 3.3 Enqueue Thread 3.3.1 Statistic Firewall Thread 3.3.2 Stateful Firewall Thread 3.4 Replication 4 Analysis/Review 5 Conclusion References Database Security: Attacks and Solutions Abstract 1 Introduction 2 Attacks on Database Security 2.1 Privilege 2.1.1 Excessive Privilege 2.1.2 Unauthorized Privilege Elevation 2.1.3 Legitimate Privilege Abuse 2.2 Platform Vulnerabilities 2.3 SQL Injection 2.4 Weak Audit Trail 2.5 Denial of Service 2.6 Protocol Vulnerabilities 2.7 Weak Authentication 2.8 Exposure of Backup Data 3 Solutions to Database Security Attacks 3.1 Privilege Solutions 3.1.1 Access Control 3.1.2 Mandatory Access Management 3.1.3 Owner Approval and Tracking 3.2 Secured Gateways and Data Masking 3.3 Data Sanitization, Smart Driver and IPS 3.4 Deter Attackers, Detection and Recovery 3.5 Configuration and Database Activity Monitoring 3.6 Protocol Validation 3.7 Define and Implement SSL (Security Socket Layer) 3.8 Encryption Process and Backup Management 4 Analysis 5 Conclusion and Future Work References Cloud Based Heterogeneous Big Data Integration and Data Analysis for Business Intelligence Abstract 1 Introduction 2 Literature Review 3 Proposed Methodology 3.1 Heterogeneous Data Integration Module 3.2 Data Analysis Module 3.3 Data Visualization 4 Experimental Analysis 4.1 System Configuration and Data Set 5 Conclusion References Search Engine Optimization Challenges and Solutions Abstract 1 Introduction 1.1 Types of SEO Techniques 1.1.1 On Page Optimization 1.1.2 Off Page Optimization 1.2 Working of a Search Engine 2 Search Engine Algorithms 2.1 An Overview of the Search Engine Algorithms 3 Shortcomings in Search Engine Algorithms 3.1 Impartiality [6] 3.2 Content Spamming 3.2.1 Spam Comments [7] 3.2.2 Article Spinning [7] 3.2.3 Keyword Stuffing [1, 7] 3.2.4 Link Farm and Exchange [1] 3.2.5 URL Redirection [1] 3.2.6 Doorway Pages [7] 3.2.7 Cloaking [4] 4 Overcoming SEO Challenges 4.1 Providing Results on the Biasis of Their Own Database 4.2 Detection of Spammed Websites [4] 4.2.1 Creating a Root Database 4.2.2 Refining the Result 4.3 Combining Spam Detection with Weighted Page Rank [4] 5 Analysis/Review of Solutions 6 Conclusion and Future Work References Performance Assessment of Different Machine Learning Algorithms for Medical Decision Support Systems Abstract 1 Introduction 2 Literature Survey 3 Proposed Work 3.1 RBF Classifier 3.2 The Input Vector 3.3 The RBF Neurons 3.4 The Output Nodes 3.5 RBF Neuron Activation Function 3.6 LR Classifier 4 Performance Validation 5 Conclusion References Implementation of IOT in Multiple Functions Robotic Arm: A Survey Abstract 1 Introduction 2 Literature Survey 3 Conclusion Real Time Traffic Signal and Speed Violation Control System of Vehicles Using IOT Abstract 1 Introduction 2 Related Work 3 System Analysis 4 Result and Discussion 5 Conclusion and Future Work References Enhanced Financial Module in Intelligent ERP Using Cryptocurrency Abstract 1 Introduction 1.1 Crypto-Currency 2 Literature Review 2.1 Digital Currency 2.2 ERP 3 Types of Crypto-Currency 3.1 Bit Coin 4 Maintain of Accounts Using Block Chain in ERP 4.1 Block Chain 5 Architecture of ERP Using Crypto Currency 6 Relationship Between ERP and Block Chain 7 Distributed Ledger 8 Future the Digital Money Brings the Transparency in the Business 9 Conclusion and Future Explorative Study of Artificial Intelligence in Digital Marketing Abstract 1 Introduction 2 Literature Review of AI and Digital Marketing 2.1 Uses of AI in Digital Marketing 3 Impact of AI on Digital Marketing in Today’ Market 4 Some Strategies of Digital Marketing Using AI 5 Some Companies Transforming Digital Marketing Using AI 6 Future Scope of AI with Digital Marketing 7 Future Impacts of Digital Marketing with Artificial Intelligence 8 Conclusion A Security Model for Enhancement of Social Engineering Process with Implementation of Multifactor Authentication Abstract 1 Introduction 2 Related Work 3 Proposed Model 4 Methodology 4.1 Authentication of User 4.2 Iris Recognition 4.3 Random Numbers Generation Using Gaussian Distribution Method 4.4 Counter Measures 5 Experimental Results 5.1 Password and Username 5.2 Iris Recognition 5.3 Session Key Generation 5.4 Counter Measure 6 Conclusion References Implementation of IoT for Trash Monitoring System Abstract 1 Introduction 2 Literature Review 2.1 Trash Monitoring System 2.2 Hardware Description 3 Problem Statement 3.1 Advantage of the Existing System 3.2 Limitation of the Existing System 4 Proposed System 5 Platforms 6 Conclusion and Future Scope References Author Index