ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Second International Conference on Computer Networks and Communication Technologies: ICCNCT 2019 (Lecture Notes on Data Engineering and Communications Technologies, 44)

دانلود کتاب دومین کنفرانس بین المللی شبکه های کامپیوتری و فناوری های ارتباطی: ICNCT 2019 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 44)

Second International Conference on Computer Networks and Communication Technologies: ICCNCT 2019 (Lecture Notes on Data Engineering and Communications Technologies, 44)

مشخصات کتاب

Second International Conference on Computer Networks and Communication Technologies: ICCNCT 2019 (Lecture Notes on Data Engineering and Communications Technologies, 44)

ویرایش:  
نویسندگان: , ,   
سری:  
ISBN (شابک) : 303037050X, 9783030370503 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 982 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 96 مگابایت 

قیمت کتاب (تومان) : 31,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Second International Conference on Computer Networks and Communication Technologies: ICCNCT 2019 (Lecture Notes on Data Engineering and Communications Technologies, 44) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب دومین کنفرانس بین المللی شبکه های کامپیوتری و فناوری های ارتباطی: ICNCT 2019 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 44) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب دومین کنفرانس بین المللی شبکه های کامپیوتری و فناوری های ارتباطی: ICNCT 2019 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 44)



این کتاب فناوری‌های ارتباطی و شبکه‌ای جدید را ارائه می‌کند، حوزه‌ای که در سال‌های اخیر توجه پژوهشی قابل توجهی را از سوی دانشگاه و صنعت به خود جلب کرده است. همچنین در مورد توسعه فن‌آوری‌های ارتباطی هوشمندتر و کارآمدتر، که بخش مهمی از زندگی روزمره کنونی هستند، بحث می‌کند و از نوآوری‌های اخیر در فناوری‌ها، معماری‌ها و استانداردهای مرتبط با این فناوری‌ها گزارش می‌دهد.</ p>

این کتاب شامل تحقیقاتی است که طیف وسیعی از فناوری‌های ارتباطی و شبکه‌ای از جمله شبکه‌های حسگر بی‌سیم، داده‌های بزرگ، اینترنت اشیاء، شبکه‌های نوری و مخابراتی، هوش مصنوعی، رمزنگاری، شبکه‌های نسل بعدی را در بر می‌گیرد. رایانش ابری و پردازش زبان طبیعی علاوه بر این، بر راه‌حل‌های جدید در زمینه چالش‌های ارتباطی و شبکه‌ای، مانند الگوریتم‌های بهینه‌سازی، قابلیت همکاری شبکه، خوشه‌بندی شبکه مقیاس‌پذیر، تکنیک‌های چندپخشی و تحمل‌پذیر خطا، مکانیسم‌های احراز هویت شبکه، و تحلیل‌های پیش‌بینی‌کننده تمرکز دارد.


توضیحاتی درمورد کتاب به خارجی

This book presents new communication and networking technologies, an area that has gained significant research attention from both academia and industry in recent years. It also discusses the development of more intelligent and efficient communication technologies, which are an essential part of current day-to-day life, and reports on recent innovations in technologies, architectures, and standards relating to these technologies.

The book includes research that spans a wide range of communication and networking technologies, including wireless sensor networks, big data, Internet of Things, optical and telecommunication networks, artificial intelligence, cryptography, next-generation networks, cloud computing, and natural language processing. Moreover, it focuses on novel solutions in the context of communication and networking challenges, such as optimization algorithms, network interoperability, scalable network clustering, multicasting and fault-tolerant techniques, network authentication mechanisms, and predictive analytics .



فهرست مطالب

Foreword
Preface
Acknowledgements
Contents
Monitoring Air Pollutants Using Wireless Sensor Networks
	Abstract
	1 Introduction
	2 Existing System
	3 System Architecture
	4 Results and Discussions
		4.1 Hardware Implementation of Transmitter Section
		4.2 GSM Section
	5 Applications
	6 Conclusion
	References
Framework for Data Hiding Operation Using Motion Vectors for Effective Imperceptibility Performance
	Abstract
	1 Introduction
	2 Related Work
	3 Problem Description
	4 Proposed Methodology
	5 System Implementation
		5.1 Algorithm for Reversible Data Hiding
	6 Result Analysis
	7 Conclusion
	References
Privacy Protection and Con Dentiality in Medical IoT
	Abstract
	1 Introduction
	2 Literature Survey
		2.1 Security in the Internet of Things
		2.2 Security Model for IoT
		2.3 IoT Device Security Based on Proxy Re-encryption
		2.4 A Lightweight and Flexible Encryption Scheme to Protect Sensitive Data in Smart Building Scenarios
		2.5 A Survey on Authentication Techniques for Internet of Things
		2.6 Identity-Based Authentication Scheme for the Internet of Things
		2.7 Authentication and Access Control in E-Health Systems in the Cloud
		2.8 E-Health Care and Le Hierarchical Encryption
		2.9 Attribute Based Encryption for Secure Sharing of E-Health Data
	3 Comparison of Existing Techniques
	4 Proposed Work
	5 Methodology
	6 Conclusion
	7 Future Scope
	References
Review on Evacuation Systems for Indoor Fire Situation
	Abstract
	1 Introduction
	2 Literature Review
		2.1 Building Information Modelling (BIM)
		2.2 Agent-Based Modelling
		2.3 Network-Optimization Based Algorithms for Fire Evacuation
		2.4 Behavior Based Modelling of Crowd in Fire Emergency
		2.5 Multi-objective Optimization Based Approaches for Fire Evacuation
		2.6 Some Interdisciplinary Frameworks
	3 Challenging Issues in Existing Systems
		3.1 Complexity of Decision-Making
		3.2 Route Searching
		3.3 Communication Delays and Network Security
	4 Conclusion
		4.1 Updation of Dynamic Signs with Enhanced Frequency
		4.2 Performance Gauged During Low-Occupancy Scenarios
		4.3 Performance of Simulation Models
	5 Future Research Plan
	Acknowledgements
	References
A Healthcare Application Model for Smarthome Using Frequent Pattern Based KNN Algorithm
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed System
		3.1 Preparation of Data
		3.2 Selection of Frequent Patterns of Human Activities
		3.3 Data Clustering by Incremental K-Means
		3.4 Frequent Pattern Based K-Nearest Neighbours Algorithm for Activity Prediction
	4 Result Analysis and Discussion
	5 Conclusion and Future Work
	Acknowledgemnet
	References
Application of Big Data in Health Care with Patient Monitoring and Future Health Prediction
	Abstract
	1 Introduction
	2 Related Works
	3 Proposed System
		3.1 Data Collection
		3.2 Data Analysis
			3.2.1 Analysis in Map Reduce Framework
			3.2.2 Correlation Analysis Using Map Reduce
	4 Future Health Prediction
	5 Performance Evaluation
	6 Conclusion and Future Work
	Acknowledgement
	References
Data Science for Internet of Things (IoT)
	Abstract
	1 Introduction
	2 Data Science Subdomain for IoT
	3 Traditional Data Science Vs. IoT
	4 Open Research Problems in IoT for Data Science
	5 Languages Used for Data Science
	6 IoT and Data Relationship
	7 Challenges of IoT Applications in Data Science
	8 Ways to Spread Over Data Science Algorithms to IoT Data
	9 Differences Between Data Science for IoT and Traditional Data Science
	10 Impact of IoT on Data Science
	11 IoT Changing the Appearance Of Data Science
	12 IoT Data Science for Altering the World
	13 Conclusion
	References
ECDSEC: An Efficient Group Key Management Scheme for Secure Data Sharing Among Mobile Users in Cloud Environments
	Abstract
	1 Introduction
	2 Literature Survey
	3 Proposed ECDSEC Scheme
		3.1 System Initialization
		3.2 Cloud Server Registration Phase
		3.3 User Registration Phase
		3.4 File Upload Phase
		3.5 File Download Phase
	4 Performance Evaluation
	5 Security Analysis
		5.1 Forward Secrecy
		5.2 Backward Secrecy
		5.3 Providing Security Over Insecure Communication Channels
		5.4 Resistance to Collusion Attack
	6 Implementation
	7 Conclusions
	References
Comparative Study on Deep Learning Frameworks for Object Detection
	Abstract
	1 Introduction
		1.1 Traditional Object Detection Models
		1.2 Deep Learning and Open Datasets
	2 Literature Survey
	3 Comparative Results
	4 Conclusion
	References
An Adaptive Neighbour Knowledge-Based Hybrid Broadcasting for Emergency Communications
	Abstract
	1 Introduction
	2 Related Work
	3 Adaptive Neighbour Knowledge-Based Hybrid Broadcasting Method
	4 Performance Study
		4.1 Comparative Methods
		4.2 Evaluation Setup
		4.3 Performance Measures
	5 Conclusion
	References
Traffic Congestion Control Using Hierarchical Decision Model
	Abstract
	1 Introduction
	2 Proposed Solution
		2.1 Local Controller
		2.2 Global Controller
	3 Simulation
		3.1 Simulator Setup
			3.1.1 Simulation Element
			3.1.2 Communication Element
	4 Results
	5 Conclusion
	References
A Proposed Blockchain Model to Enhance Student Knowledge
	Abstract
	1 Introduction
	2 Motivation of Proposed Model
	3 Proposed SIBC for Academic Institution
	4 Conclusion and Future Work
	Compliance with Ethical Standards
	References
Heuristic Solutions Supported by GPON for Future Telecommunication Optical Network
	Abstract
	1 Introduction
	2 GPON
	3 Fiber Bragg Grating
	4 Simulation Setup and Results
	5 Conclusion and Future Scope
	References
An IoT Based Weather Monitoring System Using Node MCU and Fuzzy Logic
	Abstract
	1 Introduction
	2 Related Work
	3 System Architecture
		3.1 Node MCU
		3.2 DHT 11(Temperature & Humidity Sensor)
		3.3 Raindrop Detection Sensor
		3.4 Thingspeak
	4 Implementation and Setup
		4.1 Hardware Components
		4.2 Software Components
	5 Result and Discussion
		5.1 For Model 1 Result
			5.1.1 Humidity and Rain Result
		5.2 For Model 2 Result
	6 Conclusion and Future Scope
	References
Android Based Ripening Stage Identification for Peppercorns
	Abstract
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Experimental Results
	5 Conclusion and Future Work
	References
Energy Efficient Heterogeneous Wireless Sensor Networks - Recent Trends & Research Challenges
	Abstract
	1 Introduction
	2 Literature Survey
	3 HWSNs - Network Model
	4 Future Research Challenges
	5 Conclusion
	References
A Novel Security Scheme of Temporal-Key Based Encryption Policy in Sensor Applications
	Abstract
	1 Introduction
	2 Related Work
	3 Problem Description
	4 Proposed Methodology
	5 Algorithm Implementation
		5.1 Algorithm for Constructing Communication Vector
		5.2 Algorithm for Clustering
		5.3 Algorithm for Applying Encryption
	6 Results Discussion
	7 Conclusion
	References
A Survey on Next Generation Networks
	Abstract
	1 Introduction
	2 Next Generation Network Architecture
	3 xG Network Functions
		3.1 xG Networks on Licensed Bands
		3.2 xG Networks on Unlicensed Bands
	4 xG Networks Applications
	5 Challenges of Next Generation Networks
	6 Conclusion
	References
The New Approach for Creating the Knowledge Base Using WikiPedia
	Abstract
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Results and Discussion
		4.1 Experimental Setup
		4.2 Results
	5 Conclusion and Future Work
	References
Ethereum Based IoT Architecture
	Abstract
	1 Introduction
	2 Proposed Architecture
		2.1 Blockchain
		2.2 Types of Blockchain Nodes
		2.3 İmplementation
		2.4 Procedure for Deploying Ethereum Private Chain on Raspberry Pi
	3 Evaluation
	4 Conclusion
	References
Motorbike Helmet with Heads-Up Display Navigation and Fall Detection System
	Abstract
	1 Introduction
	2 Study of Existing Work
	3 Proposed Solution
		3.1 System Architecture Diagram
		3.2 Shell Design
		3.3 Fall Detection System
		3.4 System Methodology
	4 Conclusion
	5 Future Scope
	References
A Crypto-Blocking Approach for the Security Paradigm for Aadhar Towards Privacy Preservation on Cloud Infrastructure
	Abstract
	1 Introduction
	2 Review of Literature
	3 System Model: ECrypto-AaDhaar
		3.1 Aadhaar Input Model
		3.2 Aadhaar Protector Model
			3.2.1 Sampling
			3.2.2 Quantization
		3.3 Statistical Structuring Model
		3.4 Analysis of Pixel Transformation Modeling
		3.5 Experimental Assessment of ECrypto-AaDhaar
	4 Conclusion
	Acknowledgement
	References
PMI-IR Based Sentiment Analysis Over Social Media Platform for Analysing Client Review
	Abstract
	1 Introduction
	2 Sentiment Analysis
		2.1 Components of Sentiment Analysis
		2.2 Semantic Orientation
		2.3 Categories of Classification for Sentiment
	3 Natural Language Processing
	4 Literature Review
	5 Proposed Work
		5.1 Text Acquisition and Document Storage
		5.2 Text Transformation
		5.3 Finding Review Sentences
		5.4 Parts-of Speech Tagging and Opinion Phrase Extraction
		5.5 Semantic Orientation of Phrases (Modified PMI-IR Method)
	6 Result Analysis
	7 Conclusion
	References
Analyzing User Awareness on Security in Android Smartphone Devices
	1 Introduction
	2 Android Operating System
		2.1 Android Platform Architecture
		2.2 Android App Structure
		2.3 Security Features for Android Smartphone
	3 Vulnerabilities in Android Smartphones
	4 Awareness for ASUs to Secure Android Smartphones
		4.1 Security Areas
	5 User Awareness Survey
	6 Conclusion
	7 Compliance with Ethical Standards:
	References
A Systematic Review of Different Data Compression Technique of Cloud Big Sensing Data
	Abstract
	1 Introduction
	2 Data Compression of Big Sensing Processing
		2.1 Big Data
		2.2 Cloud Computing
		2.3 Big Sensing Processing
		2.4 Review on Compression of Big Streaming Data on Cloud
	3 Comparative Analysis
	4 Conclusion
	References
A Survey on Big Data Solution for Complex Bio-medical Information
	Abstract
	1 Introduction
	2 Healthcare and Big Data
		2.1 EHR
		2.2 Big Data and Medical Research
		2.3 Examples to Complex Biomedical Information
			2.3.1 DELL Healthcare Solutions
			2.3.2 IBM Healthcare and Life Sciences
			2.3.3 Intel Healthcare
			2.3.4 Amazon Web Services
			2.3.5 GE Healthcare Life Science
			2.3.6 Oracle Life Sciences
			2.3.7 Cisco Healthcare Solutions
	3 Personalized Medicines
		3.1 Counsyl
		3.2 Foundation
		3.3 Knome
	4 Conclusion
	References
Optimized Real Time Drowsy Driver Warning System Using Raspberry Pi
	Abstract
	1 Introduction
	2 Existing Approaches
	3 Overview of the Proposed System
		3.1 Image Pre-processing
		3.2 Drowsiness Detection
			3.2.1 Comparison and Assigning of Threshold Values
		3.3 Alert Generation
	4 Optimization Techniques
		4.1 Single Eye Optimization
		4.2 Optimization by Frame Skip
	5 Results and Analysis
	6 Conclusion and Future Work
	Acknowledgement
	References
Blockchain Based Efficient and Accurate Property Title Retrieval and Secured Storage System
	Abstract
	1 Introduction
	2 Literature Survey
	3 Proposed Work
	4 Result and Discussion
	5 Conclusion
	6 Future Work
	References
Multi Keyword Search on Encrypted Text Without Decryption
	Abstract
	1 Introduction
	2 Preliminaries
		2.1 CryptDB
		2.2 Cosine Similarity
	3 System Model
	4 MKSE Algorithm
		4.1 Finding Cosine Similarity
	5 Experimental Setup
	6 Results and Discussion
	7 Conclusion and Future Work
	Acknowledgement
	References
An Efficient Approach for Traffic Monitoring System Using Image Processing
	Abstract
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Experimental Setup
	5 Results and Discussion
	6 Conclusion
	References
Analysis of Breast Cancer Dataset Using Big Data Algorithms for Accuracy of Diseases Prediction
	Abstract
	1 Introduction
	2 Background
	3 Experimental Setup
	4 Classification Algorithm
		4.1 Decision Tree
		4.2 Naive Bayes Classifier
		4.3 Support Vector Machine
		4.4 k-Nearest Neighbour
	5 Problem Definition of Predictive Analysis of Breast Cancer
		5.1 Data Source
		5.2 Comparative Analysis
	6 Conclusion and Future Work
	References
CPW Fed Antenna with Beveled Radiating Strip and Ground Plane for Ultra Wide Band Applications
	Abstract
	1 Introduction
	2 Design of Proposed Antenna
	3 Simulation and Results
		3.1 Return Loss (RL)
		3.2 VSWR
		3.3 Gain (G)
		3.4 Radiation Pattern (R)
		3.5 Current Distribution
	4 Conclusion
	Acknowledgment
	References
Two-Level Text Summarization with Natural Language Processing
	Abstract
	1 Introduction
		1.1 Extractive Text Summarization
		1.2 Abstractive Text Summarization
	2 Related Work
		2.1 Two-Level Text Summarization
		2.2 TextRank Algorithm
		2.3 TextRank with TF-IDF Factor
		2.4 Sentiment Analysis
	3 Architecture and Methodology
		3.1 First-Level Summary
		3.2 Sentiment Analysis and Second-Level Summary
	4 Evaluation of Summaries
	5 Conclusion
	References
Visual Cryptography and Image Processing Based Approach for Bank Security Applications
	Abstract
	1 Introduction
	2 Literature Survey
	3 Methodology
	4 Implementation
	5 Results
	6 Conclusion
	References
Data Streaming Framework on Cloud Platform for Surveillance of Unmanned Sensors
	Abstract
	1 Introduction
	2 Proposed Method
		2.1 Background Cloud Architecture
		2.2 Event/Data Streaming
		2.3 Data Storage
		2.4 Data Visualization
	3 Implementation
	4 Results
	5 Conclusion and Future Work
	References
High-Speed Big Data Streams: A Literature Review
	Abstract
	1 Introduction
		1.1 Big Data and High Speed Data Streams
		1.2 Challenges in Big Data
	2 Literature Review
		2.1 Distributed Data Analysis and Topology Based Analysis
		2.2 Study on Security and Privacy of Big Data
		2.3 Applications of Data Streams and Big Data
		2.4 Data Stream Processing and Clustering
	3 Conclusion
	References
Towards Power Aware Data Transmission in Sensor Cloud: A Survey
	Abstract
	1 Introduction
	2 Background
		2.1 Wireless Sensor Network
		2.2 Cloud Computing
		2.3 Sensor Cloud: Major Applications, Advantages and Issues
		2.4 Data Transmission in Sensor Cloud
	3 Literature Survey
	4 Conclusion and Future Directions
	References
Real-Time Environment Description Application for Visually Challenged People
	Abstract
	1 Introduction
	2 Overview
	3 The Proposed Model
		3.1 The Convolution Operator
		3.2 Introducing Non-linearity
		3.3 Spatial Pooling
		3.4 Fully-Connected Layer
	4 Conclusion
	5 Result
	References
A Survey on Internet of Things (IoT): Layer Specific vs. Domain Specific Architecture
	Abstract
	1 Introduction
	2 Basic Elements of IoT
	3 Architectures of IoT
		3.1 Layer-Specific Architectures
		3.2 Domain-Specific Architectures
		3.3 Industry-Defined Architectures
	4 Conclusion
	References
RETRACTED CHAPTER: A Study on Email Security Through Cryptographic Techniques
Page Locked GPGPU Rotational Visual Secret Sharing
	1 Introduction
	2 Related Works
		2.1 The VSS Schemes
		2.2 Parallel Rotational VSS Scheme
		2.3 Trends in Heterogeneous Computing and CUDA
	3 The Proposed Page Locked GPGPU Streaming Rotational VSS
	4 Experimental Results
	5 Conclusion
	References
Opinion Mining Based on People’s Feedback About Engineering Degree
	Abstract
	1 Introduction
	2 Basic Principles of the Decision Tree
	3 Basic Principles of Support Vector Machine
	4 Engineering Dataset [8]
	5 Workflow of the Proposed System
	6 Analysis and Result
	7 Conclusion
	Compliance with Ethical Standards
	References
Design and Implementation of Steering Based Headlight Control System Using CAN Bus
	Abstract
	1 Introduction
	2 Related Works
	3 Proposed Architecture
		3.1 Sensor Module
		3.2 Controller Module
		3.3 Headlight Control Module
	4 Results and Discussion
	5 Conclusion
	References
RETRACTED CHAPTER: Enhanced Energy Efficient Bio-trusted Anonymous Authentication Routing Technique of Wireless Body Area Network
	1 Introduction
	2 Literature Review
	3 Proposed Work
	4 Experimental Results
	5 Conclusion
	References
An Efficient Replica Management Based Disaster Recover Using Elephant Herding Optimization Algorithm
	Abstract
	1 Introduction
	2 Proposed Replica Management
		2.1 Data Uploading Process
		2.2 Replica Generation
		2.3 Data Backup Process
	3 Result and Discussion
	4 Conclusion
	References
An Efficient High Utility Pattern Mining for Finding Time Based Customer Purchase Behavior
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed System
		3.1 Mining High Utility Patterns Over Data Streams Using Sliding Window Technique
		3.2 Problem Definition
		3.3 Construction of List Structure
		3.4 Updating Global SHUP-Lists
		3.5 Mining High Utility Patterns from the List Structure
		3.6 Mining Patterns with TCs
		3.7 Algorithm 1: SHPM Algorithm [10]
	4 Result Analysis and Discussion
	5 Conclusion
	References
Plant Disease Detection Using Deep Learning
	Abstract
	1 Introduction
	2 Overall View
	3 Implementation
	4 Evaluation
	5 Graphs and Reports
	6 Conclusion
	7 Future Scope
	References
Study and Implementation of Ethernet Based Synchronization in Distributed Data Acquisition System
	Abstract
	1 Introduction
	2 Literature Review
	3 Architecture Design and Implementation
		3.1 IEEE 1588 Synchronization
		3.2 Architecture Design
		3.3 Implementation
	4 Experimental Setup and Result
	5 Conclusion
	Acknowledgements
	References
Prevention of DDoS Attack Through Trust Management System for VANET Environment
	Abstract
	1 Introduction
	2 Related Works
	3 Trust Based Recommended Scheme
	4 Simulation Results
	5 Conclusion
	6 Limitation and Future Work
	References
DENCLUE-DE: Differential Evolution Based DENCLUE for Scalable Clustering in Big Data Analysis
	Abstract
	1 Introduction
		1.1 Density Based Clustering
		1.2 Differential Evolution Algorithm (DE)
	2 Proposed Algorithm: DENCLUE-DE
	3 Experimental Analysis
		3.1 Cluster Validity Metrics
		3.2 Cluster Performance
	4 Conclusion and Future Scope
	References
Utility Mining Algorithms: A Bird’s Eye View
	Abstract
	1 Introduction
		1.1 Association Rule Mining (ARM)
		1.2 Frequent Itemset Mining (FIM)
		1.3 High Utility Itemset Mining (HUIM)
	2 Literature Survey
	3 Comparative Analysis
	4 Conclusion
	References
A Survey of Datalink Layer Protocol for IoT
	Abstract
	1 Introduction
		1.1 Physical Layer
		1.2 Data Link Layer
		1.3 Network Layer
		1.4 Transport Layer
		1.5 Application Layer
	2 Related Work
	3 Data Link Layer Protocols
		3.1 IEEE 802.11 (Wi-Fi)
		3.2 IEEE 802.3 (Ethernet)
		3.3 IEEE 802.15.4
		3.4 ZigBee
		3.5 Z-Wave
		3.6 NFC
			3.6.1 NFC Device Types
		3.7 Sigfox
		3.8 Nuel
		3.9 LoRaWAN
		3.10 Cellular
		3.11 Bluetooth
		3.12 HART & Wireless HART
	4 Conclusion
	References
ASL Recognition and Conversion to Speech
	Abstract
	1 Introduction
	2 ASL Gestures Dataset
	3 Background and Drawbacks of the Current Sign Language Recognition Methods
	4 Brief Methodology
	5 Algorithm
	6 Results and Discussion
	7 Conclusion
	References
Efficient Fuzzy-Based Multi-constraint Multicasting with Fault Tolerance Routing Mechanism
	Abstract
	1 Introduction
	2 Related Work
	3 System Model
	4 Simulations and Analysis
		4.1 Throughput
		4.2 Routing Overhead
		4.3 End-to-End Delay
		4.4 Energy Cost Per Packet
		4.5 Packet Delivery Ratio (PDR)
		4.6 Packets Dropped
	5 Conclusion
	References
Performance Evaluation of Filtering Techniques in Filtered OFDM for 5G Technology
	Abstract
	1 Introduction
	2 System Model
	3 System Design
	4 Simulation Results
	5 Comparative Analysis of Windowing Functions
	6 Conclusion
	References
Multifactor User Authentication Mechanism Using Internet of Things
	Abstract
	1 Introduction
	2 Literature Survey
	3 Proposed Two Step Authentication Process
	4 Usability and Security
	5 Conclusion
	References
Auto Emergent System (AES)
	Abstract
	1 Introduction
	2 Classifications of Accidents
		2.1 Pedestrians
		2.2 Pedal Cyclists
		2.3 Animal Collision
		2.4 MCI (Mass Casualty Incident)
	3 Types of Rescue Systems
	4 Different Types of Vehicles and Accident Detections
	5 Proposed Solution
		5.1 Accident Detection
		5.2 Victim Count
		5.3 Search for the Nearest Ambulance
		5.4 Allocate the Shortest Path
		5.5 Finding the Need Based Hospital
		5.6 Sharing Data
	6 Conclusion
	7 Future Work
	Acknowledgment
	References
Cloud Container Placement Policies: A Study and Comparison
	Abstract
	1 Introduction
	2 Containerization
	3 Containerization Tools
	4 Comparison with Virtualization
	5 Container Placement Policies in CloudSim
	6 Conclusion and Future Work
	References
Internet of Energy: A Deep Learning Based Load Prediction
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Model for Load Forecasting
		3.1 Data Set
		3.2 Missing Value Processing
		3.3 Load Forecasting Using Deep Learning
	4 Experimental Results and Analysis
	5 Conclusion
	References
Alert Generation Framework from Twitter Data Stream During Disaster Events
	Abstract
	1 Introduction
	2 Related Works
	3 Alert Generation Framework
		3.1 Disaster-Related Tweet Retrieval
		3.2 Preprocessing of Tweets
		3.3 Filtering Out Non-contextual Tweet
		3.4 Classification of Contextual Tweets into Subclasses
		3.5 Geocoding of Tweets
	4 Result
	5 Conclusion
	References
Potential and Extention of Internet of Things
	Abstract
	1 Introduction
		1.1 Facts About IOT
	2 Technologies Used in IOT
		2.1 Sensors in IOT
		2.2 Near Field Communication (NFC)
		2.3 Radio Frequency Identification Technology (RFID)
		2.4 Actuator
		2.5 ZigBee
	3 Applications
		3.1 IOT in Medical and Health Care
		3.2 IOT for Smart Home
		3.3 IOT in Vehicle Management
		3.4 IOT in Agriculture
		3.5 IOT in Education
		3.6 IOT in Smart Industry
	4 Proposed Work
	5 Challenges in IOT
	6 Conclusion
	References
Real Time Data Warehouse Updates Through Extraction-Transformation-Loading Process Using Change Data Capture Method
	Abstract
	1 Introduction
	2 Related Work
		2.1 Existing System Current Change Data Capture Approaches
	3 Method/Proposed System
		3.1 Timestamp
		3.2 Modified Date Using Timestamp
		3.3 Attunity Tool Replication
		3.4 Views Using Delta Loads
	4 Experimental Results
	5 Conclusion & Future Work
	References
Predicting Stock Market Movement Based on Twitter Data and News Articles Using Sentiment Analysis and Fuzzy Logic
	Abstract
	1 Introduction
	2 Related Work
	3 Data Acquisition
		3.1 Twitter Data Collection
		3.2 Stock Market Data Collection
		3.3 News Articles Data Collection
	4 Data Preprocessing
		4.1 Separating Emoticons from Tweet
		4.2 Tokenization
		4.3 Pattern Matching
	5 Sentiment Analysis
	6 Implementation Details
		6.1 Data Acquisition
		6.2 Data Preprocessing
		6.3 Sentiment Analysis
	7 Results and Discussion
	8 Conclusion and Future Work
	References
Distributed Storage Hash Algorithm (DSHA) for File-Based Deduplication in Cloud Computing
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed System Architecture
		3.1 System Components
		3.2 Client API
		3.3 Hash Value Generation
		3.4 Storage Node
	4 Implementation and Test Analysis
		4.1 Experimentation
		4.2 Test Analysis
	5 Conclusion
	References
Comparative Analysis of Heart Disease Classification Algorithms Using Big Data Analytical Tool
	Abstract
	1 Introduction
	2 Heart Disease
	3 Literature Survey
	4 Work Flow Design
	5 Classification Algorithm
		5.1 Decision Tree
		5.2 Naive Bayes Classifier
		5.3 Svm
		5.4 K-NN
	6 Data Set Elucidation
	7 Comparison Table of Different Classification Techniques
	8 Conclusion
	References
PT-GA-IRIAL: Enhanced Energy Efficient Approach to Select Migration VMs for Load Balancing in Cloud Computing Environment
	Abstract
	1 Introduction
	2 Literature Survey
	3 Proposed Methodology
		3.1 GA Based Selection of Overloaded VMs and Destination PMs for Migration
	4 Results and Discussion
		4.1 Communication Cost Reduction
		4.2 Total Number of Migrations
		4.3 Reduction in Performance Degradation
		4.4 Overall Comparison
	5 Conclusion
	References
An Area Effective and High Speed SAR ADC Architecture for Wireless Communication
	Abstract
	1 Introduction
	2 Proposed Methadology
		2.1 SIQ Comparator
		2.2 Multi-phase Clocking (MPC) Technique
		2.3 R-2R Ladder DAC
		2.4 Successive Approximation Register
	3 Results and Discussion
		3.1 Simulatıon Result of SIQ Comparator
		3.2 Simulation Result of MPC Based D-FF
		3.3 Simulation Result of SAR ADC
	4 Conclusion
	Funding
	References
CharityChain - Donations Using Blockchain
	Abstract
	1 Introduction
	2 Related Work
	3 Methodology
	4 System Design
		4.1 Testrpc
		4.2 Metamask
	5 Development
	6 Conclusion
	References
A Survey of Wireless Communication Technologies from 1G to 5G
	Abstract
	1 Introduction
	2 Telecommunication Technologies
		2.1 Legacy Technologies
		2.2 Third Generation (3G)
		2.3 IP Multimedia Subsystems (IMS)
	3 Fourth Generation (4G)
		3.1 4G Architecture
	4 Next Generation Network (5G)
		4.1 SDN Based 5G Mobile Network Architecture
		4.2 5G Services
		4.3 5G Enabling Technologies
		4.4 Key Advantages of 5G
		4.5 Research Issues in 5G
	5 Comparison
	6 Conclusion
	References
A Virtual Assistant Chatbot for College Advising System
	Abstract
	1 Introduction
	2 Related Work
	3 Developed System
		3.1 System Architecture
		3.2 System Implementation
		3.3 Knowledge-Base Design Methodology
		3.4 Chatbot Generator Algorithm
		3.5 Results
	4 Conclusion
	References
Performance Comparison of Machine Learning Algorithms in P300 Detection Using Balanced Mind-Speller Dataset
	1 Introduction
	2 Materials and Methods
		2.1 Dataset and Tools
		2.2 Signal Processing
	3 Classifiers
	4 Performance Metrics
	5 Results and Discussions
	6 Conclusion
	References
Deep Learning Enabled Physical Layer Security to Combat Eavesdropping in Massive MIMO Networks
	Abstract
	1 Introduction
	2 System Model
	3 Methodology
	4 Results and Discussions
	5 Conclusions and Future Scopes
	References
Microcontroller Based Low Cost Robotic Arm for Rehabilitation of Patients with Set Back in Arm Movement
	Abstract
	1 Introduction
	2 Robot Dynamics
	3 Proposed Methodology
		3.1 Kinematic Equations
		3.2 Torque Calculatıon
	4 Sımulatıon Results
	5 Hardware Implementation
	6 Conclusion
	References
IoT Based Landslide Disaster Management System
	Abstract
	1 Introduction
	2 Related Works
	3 Proposed System
	4 Hardware Description
		4.1 Soil Moisture Sensor
		4.2 Accelerometer
		4.3 Vibration Sensor
		4.4 Arduino Nano
		4.5 Raspberry Pi Zero-W
	5 Software Algorithm
	6 Result and Analysis
	7 Conclusion and Future Work
	References
IOT Based School Bus Monitoring System With Child Security
	Abstract
	1 Introduction
	2 Architecture of School Bus Monitoring System
	3 Integrated Model of Child Monitoring System
	4 Algorithmic Flow
		4.1 RFID Detection System
		4.2 Bus Location Tracking System
	5 Result and Discussion
	6 Conclusion
	Acknowledgement
	Reference
Rubik’s Cube Encryption for Securing Cloud Stored Data
	Abstract
	1 Introduction
	2 Related Works
	3 Cloud Data Security System
		3.1 Third Party Authentication Module
		3.2 Data Analyzing Module
		3.3 Encryption Module
		3.4 Decryption Module
	4 Result
	5 Conclusion
	References
Comparative Study on Face Detection by GPU, CPU and OpenCV
	Abstract
	1 Introduction
	2 Related Works
		2.1 Viola Jones Face Detection Algorithm
		2.2 CUDA
	3 Proposed Work
		3.1 Proposed Flow Chart
		3.2 Algorithm
	4 Result
	5 Conclusion
	References
Resource Scheduling Using Modified FCM and PSO Algorithm in Cloud Environment
	Abstract
	1 Introduction
		1.1 Cloud Computing
		1.2 Load Balancing
		1.3 Resource Scheduling
	2 Contribution of Work
	3 Literature Survey
	4 Gaps Identified in the Existing System
	5 Proposed Work
		5.1 Particle Swarm Optimization (PSO)
		5.2 Fuzzy C Means Algorithm (FCM)
	6 Proposed Architecture
	7 Hybridization of FCM and PSO
	8 Conclusion
	References
Network Behaviour of Open vSwitch as Per the Anticipated Functionality of Network Application Programmed Over SDN Using Pox Controller
	Abstract
	1 Introduction
	2 Implementation and Results
	3 Conclusion and Future Scope
	References
Review on Quantum Computing Tools and Algorithms
	Abstract
	1 Introduction
	2 Basics of Quantum Computing
	3 Quantum Algorithms
	4 Quantum Vs Classical
	5 Quantum Computing Architecture
		5.1 Trapped Ion Architecture
		5.2 Quantum Computing Using Superconducting Qubits
	6 Tools of Quantum Computing
		6.1 IBM Quantum Experience
		6.2 Microsoft Quantum Development Kit
		6.3 ProjectQ
		6.4 Cirq
	7 Conclusion and Future Scope
	References
Application of Cooperative Communication System in Driverless Car
	Abstract
	1 Introduction
	2 Description About the Proposed System
		2.1 Block Diagram
		2.2 Flow Chart
		2.3 Circuit Diagram
	3 Conclusion
	Acknowledgements
	References
RETRACTED CHAPTER: ID Card Detection Using Histograms of Oriented Gradients
	Abstract
	1 Introduction
	2 Related Works
	3 Local Binary Patterns
	4 Working Principle
	5 Experimental Results
	Acknowledgement
	References
Resolving Unfairness Issues in Cognitive Radio Networks with Collision Based Primary Users
	Abstract
	1 Introduction
	2 Literature Survey
	3 Cognitive Radio
	4 Issues of Cognitive Radio Network
	5 System Model
	6 Performance Evaluation
		6.1 Fairness Feature
	7 Conclusion
	References
New Adaptive Resonance Theory Based Intrusion Detection System
	Abstract
	1 Introduction
	2 Literature Survey
	3 Intrusion Detection System
	4 Overview of K-Means and Projective Adaptive Resonance Theory
	5 Proposed System Architecture of Intrusion Detection System
	6 Dataset Selection and Experimental Results
	7 Conclusion
	References
RDD-Eclat: Approaches to Parallelize Eclat Algorithm on Spark RDD Framework
	Abstract
	1 Introduction
	2 Preliminaries
		2.1 Frequent Itemset Mining and Eclat Algorithm
		2.2 Apache Spark
	3 Related Work
	4 RDD-Eclat Algorithms
		4.1 EclatV1
		4.2 EclatV2
		4.3 EclatV3
		4.4 EclatV4 and EclatV5
	5 Experimental Results
		5.1 Execution Time on Varying Value of Minimum Support
		5.2 Execution Time on Increasing Number of Executor Cores
		5.3 Scalability on Increasing Size of Dataset
	6 Conclusions and Future Directions
	References
An Effective Paradigm on Self-regulating Cautious Strategy
	Abstract
	1 Introduction
	2 Literature Survey
	3 SSS Model
	4 Process Control
		4.1 Driver Consumed Alcohol
		4.2 Passenger Consumed Alcohol
	5 Results and Discussion
	6 Conclusion
	7 Future Work
	References
A Smart System for Detection, Restoration, Optimization and Preservation of Fresh Water
	Abstract
	1 Introduction
	2 Literature Review
		2.1 The Real Time Monitoring of Water Quality in IoT Environment
		2.2 Leak Detection
		2.3 Water Level Controlling System
	3 Proposed Model
	4 Design and Methodology
		4.1 Master Module
		4.2 Outlet Control Module
		4.3 Tap Control
		4.4 Overflow Control
	5 Conclusion
	References
Variants of Cuckoo Search with Levy Flight and Dynamic Strategy Based Cuckoo Search (DSBCS)
	Abstract
	1 Introduction of CS
		1.1 Some Important Aspects of Cuckoo Search Algorithm [1, 2]
		1.2 CS Algorithm, in Three Assumptions
	2 Levy Flight Algorithms
	3 Variants of Cuckoo Search
		3.1 Binary Cuckoo Search
		3.2 Improved Cuckoo Search
	4 Variants of Levy Flight (Random Walk)
		4.1 Mantegna Algorithm (Equation)
		4.2 Cauchy Random Distribution
		4.3 Gaussian Distribution
	5 Comparison Among Variants of Cuckoo Search & Levy Flights
	6 Proposed DSBCS (Dynamic Strategy Based Cuckoo Search)
	7 Conclusion
	References
RETRACTED CHAPTER: Secure IoT Systems Using Raspberry Pi Machine Learning Artificial Intelligence
	Abstract
	1 Introduction
	2 Analytical Methodology
		2.1 Performance Analytics
		2.2 Security Strength Analytics
	3 Experimental Results
	4 Conclusion
	References
IDS: Signature Based Peer-to-Peer Intrusion Detection System for Novice Users
	Abstract
	1 Introduction
	2 Related Studies
	3 Architecture Design
	4 Implementation and Results
		4.1 Essential Packet Sniffers
		4.2 Active Connection
		4.3 Active Services
		4.4 Get Location
		4.5 Port Range
		4.6 Check Port
		4.7 DNS Resolver Dialogue
	5 Conclusions
	References
Data Security Using Extended ECS (Encryption, Compression, Steganography)
	Abstract
	1 Introduction
		1.1 Our Contribution
		1.2 Organization
	2 Cryptography
		2.1 Goals
		2.2 Security Attacks
		2.3 Classification and Comparison
		2.4 Symmetric Key Ciphers
		2.5 Asymmetric Key Ciphers & Comparisons
		2.6 Hashing Functions & Comparison
	3 Compression
		3.1 Goals
		3.2 Classification & Comparisons
	4 Steganography
		4.1 Goals
	5 Proposed Work
		5.1 Example 1
		5.2 Example 2
	6 Conclusion & Future Scope
	References
Dual-Band Graphene Based Planar Antenna for WLAN Communication Applications
	Abstract
	1 Introduction
	2 Proposed Antenna Desıgn
	3 Results and Discussion
	4 Conclusion
	References
Identity Based Reliable Data Sharing with Revoked System in Cloud
	Abstract
	1 Introduction
	2 Literature Review
	3 Proposed Approach
		3.1 Problem Statement
		3.2 Proposed System Overview
		3.3 Algorithm
		3.4 Mathematical Model
	4 Result and Discussion
		4.1 Experimental Setup
		4.2 Result and Analysis
	5 Conclusion and Future Scope
	References
A Study: Machine Learning and Deep Learning Approaches for Intrusion Detection System
	Abstract
	1 Introduction
	2 Machine Learning Techniques
	3 Deep Learning Techniques
	4 Intrusion Types
	5 Comparative Analysis
	6 Conclusion
	References
Systematic Literature Survey on IDS Based on Data Mining
	Abstract
	1 Introduction
	2 Research Access
		2.1 Research Issues
		2.2 Requirement System
		2.3 Paper Enclosure Standard
		2.4 Data Compilation
	3 Outcome and Discussion
		3.1 Data Mining Techniques with Their Merits and Demerits (RQ1, RQ2)
		3.2 Techniques Proposed to Solve Issues (RQ4)
	4 Introduction Detection Systems Based on Data Mining—Issues and Challenges (RQ3)
	5 Research Result
	6 Conclusion
	Acknowledgements
	References
Implementation of Reputation Based Framework for Detecting Misbehaving Nodes and Illustration of Vampire Attack in Manets
	Abstract
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 Final Reputation Score Calculation
		3.2 Formulae Used
		3.3 Vampire Attack Cases
	4 Results and Discussion
		4.1 Throughput Comparison and Simulation Results
	5 Conclusion and Future Work
	References
Design and Implementation of Smart Mirror for Pilot Assistance
	Abstract
	1 Introductıon
	2 Literature View
	3 Methodology
	4 Workıng and Requırements
		4.1 Workıng
		4.2 Requırements
			4.2.1 Dısplay Unit
			4.2.2 Intel Atom Processor
	5 Experimental Results
	6 Conclusıon
	References
A Novel Hybrid RNN-ELM Architecture for Crime Classification
	Abstract
	1 Introduction
	2 Related Works
	3 Hybrid Architecture of Our RNN-ELM Model
		3.1 Design of RNN-ELM Hybrid Architecture
	4 Results and Discussions
	5 Conclusion
	References
Cohort of Crowdsourcıng – Survey
	Abstract
	1 Introduction
		1.1 Crowdsourcing
		1.2 Crowdsourcıng Data Through Mobıle Devıces
	2 Taxonomy of Crowdsourcıng System
		2.1 Crowdsourcing Users
			2.1.1 Requestors
			2.1.2 Workers
		2.2 Database Used in Crowdsourcing System
		2.3 Query Optimization
		2.4 Crowdsourcing Operators
		2.5 Human Intelligent Tasks (HIT’s) [R5]
	3 Survey on Declaratıve Crowdsourcıng
		3.1 Crowdop: Query Optimization for Declarative Crowdsourcing Systems
		3.2 Crowdsourced Databases: Query Processing with People (Qurk)
		3.3 Deco: Declarative Crowdsourcing
		3.4 So Who Won? Dynamic Max Discovery with the Crowd
		3.5 CrowdDB: Answering Queries with Crowdsourcing
		3.6 CrowdScreen: Algorithms for Filtering Data with Human
		3.7 Finding with the Crowd
		3.8 Counting with the Crowd
		3.9 CrowdMiner: Mining Association Rules from the Crowd
		3.10 Crowdsourcing Based Description of Urban Emergency Events Using Social Media Big Data
		3.11 Using the Crowd for Top-k and Group-by Queries
	4 Research Challenges
	5 Inferences
	References
	T1. “Fundamentals of Database Systems” by Ramez Elmasri, 5th Edition
Analysis for Optimal Interleaver in Multi-user IDMA Communication System
	Abstract
	1 Introduction
	2 IDMA System Description
	3 Interleavers in IDMA
		3.1 Random Interleaver
		3.2 Tree Based Interleaver
		3.3 Chaos Based Interleaver
	4 Execution Analysis of IDMA with Various Interleavers
		4.1 Computational Complexity
		4.2 Error - Rate Examination
		4.3 Memory Requirement
	5 Conclusion
	References
RETRACTED CHAPTER: A Study on Home Automation System for Dysarthric Persons Dependent on Speech Recognition
	1 Introduction
	2 Previous Self Assessment Studies
		2.1 Dysarthria
		2.2 Speech Recognition
	3 Discussion
	4 Software Details
	5 Conclusion
	References
Performance Evaluation of Methods for Mining Frequent Itemsets on Temporal Data
	Abstract
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Result and Disscussion
	5 Conclusion and Future Scope
	References
A Novel Framework for Spam Hunting by Tracking Concept Drift
	Abstract
	1 Introduction
	2 State of the Art
	3 Concept Drift
		3.1 Change Types
		3.2 Drift Detection Methods
	4 Concept Drift in the E-mail Domain
	5 A System Framework for Hunting Concept Drift in Email Domain
	6 Conclusion and Future Outlook
	References
Product Design Using Virtual Reality
	Abstract
	1 Introduction
	2 Hardware Description
		2.1 VR Headset
		2.2 LeapMotion Sensor
		2.3 3D Printer
	3 Working
	4 Results
		4.1 Sketching Tool
		4.2 Extrude Tool
		4.3 Cutout Tool
	5 Conclusion
	References
Smart Museum Using Li-Fi Technology
	Abstract
	1 Introduction
	2 Related Work
	3 System Design and Working
	4 Results and Discussions
	5 Conclusion
	References
Analyzing the Power of Social Media in Solving Urban Issues: A New Aged Community Helper
	Abstract
	1 Introduction
		1.1 Smart Government
		1.2 Social Media
		1.3 Social Media Analytics
	2 Existing Work
	3 Analysis
	4 Conclusion
	References
Review of Handover in Li-Fi and Wi-Fi Networks
	Abstract
	1 Introduction
	2 Modulation Techniques for Li-Fi
		2.1 Single-Carrier Modulation (SCM)
		2.2 Multi-carrier Modulation (MCM)
	3 Hybrid Li-Fi/Wi-Fi Networks
		3.1 Hybrid Li-Fi/Wi-Fi System Model
		3.2 System Load Balancing
	4 Dynamic Handover
	5 Comaprison Between Li-Fi and Wi-Fi
	6 Advantages, Applications And Limitations of Li-Fi
	7 Conclusion
	References
Retraction Note to: A Study on Email Security Through Cryptographic Techniques
	Retraction Note to: Chapter “A Study on Email Security Through Cryptographic Techniques” in: S. Smys et al. (Eds.): ICCNCT 2019, LNDECT 44, pp. 342–348, 2020. https://doi.org/10.1007/978-3-030-37051-0_40
Retraction Note to: Second International Conference on Computer Networks and Communication Technologies
Author Index




نظرات کاربران