International Conference on Communication, Computing and Electronics Systems -

International Conference on Communication, Computing and Electronics Systems (eBook)

Proceedings of ICCCES 2019
eBook Download: PDF
2020 | 1st ed. 2020
XXII, 757 Seiten
Springer Singapore (Verlag)
978-981-15-2612-1 (ISBN)
Systemvoraussetzungen
213,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book includes high impact papers presented at the International Conference on Communication, Computing and Electronics Systems 2019, held at the PPG Institute of Technology, Coimbatore, India, on 15-16 November, 2019. Discussing recent trends in cloud computing, mobile computing, and advancements of electronics systems, the book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics.



Dr. V. Bindhu is a Professor at the Department of ECE, PPG Institute of Technology, Coimbatore, India. She completed her Ph.D. in Information and Communication Engineering at Anna University, M.E. at Maharaja Engineering College, and B.E. at Government College of Technology, Coimbatore.

Joy Chen received his B.Sc. degree in Electronics Engineering from the National Taiwan Technical University, Taipei, Taiwan, his M.Sc. degree in Electrical Engineering from Dayeh University, Changhua, Taiwan, in 1985 and 1995, respectively, and his Ph.D. degree in Electrical Engineering from the National Defense University, Taoyuan, Taiwan, in 2001. He is currently a Professor at the Department of Communication Engineering, Dayeh University at Changhua, Taiwan. Prior to joining Dayeh University, he worked as a technical manager at the Control Data Company (Taiwan). He has published about 40 international journal papers and acted as guest editor for several international journals. His research interests include AI, IoT development, wireless communications, spread spectrum technical, OFDM systems, and wireless sensor networks.

Dr. João Manuel R. S. Tavares graduated in Mechanical Engineering from the University of Porto - Portugal (1992). He holds an M.Sc. in Electrical and Computer Engineering, with a focus on industrial informatics, from the University of Porto (1995); and a Ph.D. in Electrical and Computer Engineering, from the University of Porto (2001). From 1995 to 2000, he was a researcher at the Institute of Biomedical Engineering (INEB). He is the co-author of more than 350 scienti?c papers published in national and international journals and conferences, co-editor of 18 international books, and guest editor of several special issues of international journals. In addition, he is editor-in-chief and associate editor of various journals and also a reviewer for several international scienti?c journals. He has also supervised and co-supervised several M.Sc. and Ph.D. books and been involved in numerous research projects, both as a researcher and as a scienti?c coordinator.

Additionally, he is co-author of 3 international patents and 2 national patents. His main research areas include computational vision, medical imaging, computational mechanics, scienti?c visualization, human-computer interaction, and new product development. He has been the co-chairman of various international conferences and numerous mini-symposia, workshops, and thematic sessions. In addition, he has been a member of scienti?c and organizing committees of several national and international conferences.


This book includes high impact papers presented at the International Conference on Communication, Computing and Electronics Systems 2019, held at the PPG Institute of Technology, Coimbatore, India, on 15-16 November, 2019. Discussing recent trends in cloud computing, mobile computing, and advancements of electronics systems, the book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics.

Preface 7
Acknowledgements 8
About the Conference 9
Contents 10
About the Editors 17
Enhancing the Performance of Software-Defined Wireless Mesh Network 19
1 Introduction 19
2 Literature Survey 20
3 Proposed System 21
3.1 LEACH Algorithm 22
3.2 Mathematical Equation of SD-WMN 23
3.3 System Architecture 24
3.4 Performance Evaluation 26
4 Implementation 26
5 Results and Analysis 28
5.1 Node Creation in Net Animator 28
5.2 Data Transmission Between the Nodes in Net Animator 28
5.3 Graphical Approach 29
6 Conclusion and Future Enhancement 29
References 30
Performance Comparison of Machine Learning-Based Classification of Skin Diseases from Skin Lesion Images 33
1 Introduction 33
2 Related Work 34
3 Overview of Convolutional Neural Network 35
3.1 Convolutional Layer 35
3.2 Pooling Layer 36
3.3 Fully Connected Layer 36
4 Proposed Methodology 36
4.1 Dataset 36
4.2 Proposed Methodology 37
5 Experimental Results 40
6 Conclusion 43
References 43
FastICA Algorithm Applied to Scattered Electromagnetic Signals 44
1 Introduction 44
2 Theory 45
3 Results and Discussion 47
4 Conclusion 50
References 50
Deep Convolution Neural Network Model for Indian Sign Language Classification 52
1 Introduction 52
2 Indian Sign Language: Number Datasets 54
3 Methodologies 54
4 Result Analysis 56
5 Conclusion 59
References 60
Opinion Mining of Bengali Review Written with English Character Using Machine Learning Approaches 62
1 Introduction 63
2 Literature Survey 64
3 Methodology 64
4 Result and Discussions 66
5 Conclusion 73
References 74
Big Data Feature Selection to Achieve Anonymization 75
1 Introduction 75
1.1 Our Contributions 77
2 Background and Key Issues 77
2.1 Data Preprocessing Dealing with Big Data Scalability Problem 77
2.2 Anonymization Algorithm—K-Anonymity 78
3 Big Data: MapReduce 78
3.1 Preprocessing Algorithm—A Correlation-Based Filter Approach 79
3.2 Algorithm and Analysis 79
4 Empirical Study 80
4.1 FCBF and k-Anonymity in MapReduce Framework 81
5 Conclusion 82
References 82
Interoperability in Smart Living Network—A Survey 84
1 Introduction 84
2 Related Works 85
3 Home Framework Designing 86
3.1 Middleware or Gateway 87
3.2 Communication Protocols 87
3.3 Home API 89
3.4 Service Projects 89
4 Proposed Interoperability in Living Network System 90
5 Research Consideration 92
6 Conclusion 92
References 93
Sentiment Analysis of Bengali Reviews for Data and Knowledge Engineering: A Bengali Language Processing Approach 95
1 Introduction 96
2 Methodology 97
2.1 Objective of the Research 98
2.2 Designing System 98
2.3 Data Procession, Parts of Speech Tagging and Identify Negative Words (Phrase) 99
2.4 Classifier Description 99
2.5 Implementation of the Work 101
3 Result and Discussions 101
4 Conclusion 104
References 105
Imbalanced Dataset Analysis with Neural Network Model 106
1 Introduction 106
2 Related Works 108
3 Methodology 109
4 SCRUM Database 110
5 Results and Discussion 111
6 Conclusion 114
References 116
Review of Parallel Processing Methods for Big Image Data Applications 118
1 Introduction 118
2 Literature Review 120
2.1 Review of Parallel Processing Methods—Many Applications 120
2.2 Review of Parallel Processing Methods—Image Processing Applications 122
3 Inference from the Review 123
4 Solutions 123
5 Conclusion and Future Work 127
References 127
Exploring the Potential of Virtual Reality in Fire Training Research Using A’WOT Hybrid Method 130
1 Introduction 130
2 Fire Training in a VR 131
3 Research Methodology 131
3.1 SWOT Analysis 131
3.2 The AHP Method 132
3.3 A’WOT (SWOT-AHP) Methodology 132
4 Results and Discussion 134
5 Conclusion 137
Appendix 137
References 139
Two-Way Sequence Modeling for Context-Aware Recommender Systems with Multiple Interactive Bidirectional Gated Recurrent Unit 141
1 Introduction 141
2 Related Work 143
3 Proposed Two-Way Sequence Modeling Approach 145
3.1 Problem Definition 145
3.2 The MiBiGRU Model 145
3.3 Back Ground 146
4 Conclusion and Future Work 148
References 148
Stage Audio Classifier Using Artificial Neural Network 150
1 Introduction 150
2 Paper Preparation 151
2.1 Description of Speech Classification 151
3 Proposed Model 152
3.1 Scope of Neural Networks 152
3.2 Feature Selection 153
4 Results and Discussion 155
4.1 Database 155
4.2 Training Set 155
4.3 Evaluation 156
5 Conclusion 157
References 157
Predicting Short-Term Electricity Demand Through Artificial Neural Network 159
1 Introduction 160
2 Development 160
2.1 The Training Set 160
2.2 Validation Set 160
2.3 Test Set 160
2.4 Selection of the Neural Network Architecture 161
2.5 Evaluation Criteria 162
2.6 Implementation of the Prediction Model with Neural Networks 162
2.7 Calculation of the Error of the Proposed Model 163
3 Results 164
4 Conclusions 166
References 166
Detection of Tomatoes Using Artificial Intelligence Implementing Haar Cascade Technique 168
1 Introduction 169
2 Flow Chart 169
3 Procedure 170
3.1 Collection of Data Set 171
3.2 Collection of Images 171
3.3 Image Classification 171
3.4 Haar Cascade 173
3.5 Haar Features 173
3.6 Algorithm: AdaBoost Classifier 174
3.7 Integral Images 174
3.8 Generating Model Using Haar Classifier 175
3.9 Using PyCharm to Demonstrate Classifier 176
3.10 Important Packages in Our Programme 176
3.11 Important Function Calls in Our Programme 177
4 Results 179
5 Conclusion 180
6 Future Scope 180
Passive Safety System for Two- and Four-Wheeled Vehicles 181
1 Introduction 181
2 Literature Survey 182
3 Technical Studies 183
3.1 Arduino Nano Microcontroller 183
3.2 RF Communicator 184
3.3 LM35 Temperature Sensor 184
3.4 Ultrasonic Sensor 185
3.5 Radio Frequency Identification (RFID) 185
4 Construction 186
4.1 Two-Wheeler Unit 186
4.2 Four-Wheeler Unit 187
5 Results and Discussion 188
6 Conclusion and Future Scope 189
References 191
Measuring the Financial Performance of MSMEs Through Artificial Neural Networks 193
1 Introduction 194
2 Methodology 194
2.1 Sample Data 194
2.2 Methods 195
3 Results and Analysis 196
3.1 Econometric Application 196
3.2 The ANN Model 197
4 Conclusions 199
References 200
Automation of Admission Enquiry Process Through Chatbot—A Feedback-Enabled Learning System 201
1 Introduction 201
2 Related Work 202
3 Proposed Methodology 203
3.1 Preprocessing 204
3.2 TF-IDF Approach 204
3.3 Identifying the Search Text 205
3.4 Generating Response and Analyzing the Feedback 205
4 Experimental Setup 205
5 Experimental Results and Analysis 207
6 Conclusions 208
References 209
Hardware-Assisted QR Code Generation Using Fault-Tolerant TRNG 210
1 Introduction 210
1.1 Reversible versus Fault-Tolerant Reversible Gates 211
2 Proposed Design 213
3 Results and Analysis 215
4 Conclusion 218
References 218
Classification of Digitized Documents Applying Neural Networks 220
1 Introduction 221
2 Method 221
2.1 Sample Data 221
2.2 Network Architecture Design 222
2.3 Learning from the Network 223
3 Results 224
3.1 Sample 1 224
3.2 Sample 2 224
4 Conclusions 226
References 226
Plant Leaf Diseases Recognition Using Convolutional Neural Network and Transfer Learning 228
1 Introduction 228
2 Related Work 229
3 Feature Extraction 230
3.1 Image Pre-processing and Labeling 230
3.2 Dataset 231
3.3 Augmentation Process 231
4 Convolutional Neural Network Training 232
4.1 Transfer Learning 233
4.2 Performed Tests 233
5 Experimental Results and Discussions 233
6 Conclusion 235
References 235
A Shape-Based Character Segmentation Using Artificial Neural Network for Mizo Script 237
1 Introduction 237
2 Related Work 239
3 Proposed Work 240
3.1 Find the Area of Isolated Shape (Blobs) 240
3.2 Find the Required Amount of Morphological Value 241
3.3 Train ANN 241
3.4 Load Model 241
3.5 Line Segmentation 242
3.6 Character Segmentation 242
4 Result Analysis 243
5 Conclusion 244
References 244
Feasibility Study for a Mini-Hydropower Plant in Dreznica, Bosnia, and Herzegovina 246
1 Introduction 246
2 Technical and Energy Analysis 247
3 Hydrologic Study 248
4 Economic Analysis 251
5 Environment Analysis 253
5.1 Inventory of the Environment 253
5.2 Project Analysis 253
5.3 Identification and Evaluation of Environmental Influences 254
5.4 Program for the Protection of the Environment 254
5.5 Positive Effects 255
6 Conclusions 255
References 255
Feature Selection Using Neighborhood Component Analysis with Support Vector Machine for Classification of Breast Mammograms 257
1 Introduction 257
2 Methodology 258
3 Results 261
4 Conclusion 262
References 264
Performance Analysis of Implicit Pulsed and Low-Glitch Power-Efficient Double-Edge-Triggered Flip-Flops Using C-Elements 265
1 Introduction 265
2 Circuit Description 267
3 Modified LG-C Flip-Flop 268
3.1 Modified Implicit DET Flip-Flop 269
4 Results and Discussion 270
4.1 Temperature Variation 272
4.2 Supply Variation 273
4.3 Process Variation 274
5 Conclusion 276
References 278
Cost-Effective Waste Collection System Based on the Internet of Wasted Things (IoWT) 280
1 Introduction 281
2 Related Work 282
3 Proposed Work 283
3.1 System Design and Implementation 284
3.2 Shortest Path Implementation 285
4 Prototype Testing and Result 285
5 Conclusions and Further Work 288
References 289
Leveraging Artificial Intelligence for Effective Recruitment and Selection Processes 290
1 Introduction 290
2 Related Work 292
3 Proposed Conceptual Model 293
4 Conclusion 294
References 296
Trust Computing Model Based on Meta-Heuristic Approach for Collaborative Cloud Environment 297
1 Introduction 298
2 Motivation 298
3 Related Work on Cloud Monitoring and Trustworthy Cloud Service [5, 9, 12] 298
4 Trust-Based Pricing Includes Two Main Problems that Need to Be Addressed 302
5 Analysis and Discussions 303
6 Conclusion and Feature Scope 304
References 304
Integration of Generation Y Academician Attributions with Transformational Leadership Style: Association Rules Technique on Minimizing Turnover Intention 305
1 Introduction 306
2 Literature Review 307
2.1 Related Work 307
3 Methodology 309
3.1 Data Sets 309
3.2 Association Rules Algorithms 311
4 Results and Discussion 311
5 Conclusion 313
References 314
An Improved Self-tuning Control Mechanism for BLDC Motor Using Grey Wolf Optimization Algorithm 316
1 Introduction 316
2 Design of BLDC Motor 317
2.1 Modelling of BLDC Motor 317
2.2 Modelling of Encoder 318
3 Design of Grey Wolf Algorithm 319
4 Results and Discussion 321
5 Conclusion and Future Scope 323
References 323
A Wearable Wrist-Based Pulse Oximetry for Monitoring Cardiac Activities—A Pilot Study 325
1 Introduction 325
1.1 Background of PPG 326
1.2 Related Work 327
2 Methodology 327
2.1 Data Collection 327
2.2 Hardware Development 329
3 Results 330
4 Conclusion 331
References 333
Data Sciences and Teaching Methods—Learning 334
1 Introduction 335
2 Description of Methods 335
2.1 Artificial Neural Networks (ANN) 335
2.2 Artificial Vision (CV) 336
2.3 Natural Language Processing (NLP) 337
3 Results 338
4 Conclusions 340
References 341
Data Security in Cloud Computing Using Three-Factor Authentication 342
1 Introduction 343
2 Related Work 343
3 Proposed Work 346
3.1 Elliptical Curve Cryptosystem 346
3.2 Fuzzy Extractor 346
3.3 Three-Factor Authentication 346
4 Result 350
5 Conclusion 352
6 Future Scope 352
References 353
An Effective Machine Learning-Based File Malware Detection—A Survey 354
1 Introduction 354
2 Literature Review 356
3 Discussion 357
4 Conclusion 358
References 358
Data Mining and Neural Networks to Determine the Financial Market Prediction 360
1 Introduction 361
2 Method 362
3 Results 363
4 Conclusions 365
References 366
Research on the Cloud Archiving Process and Its Technical Framework of Government Website Pages 368
1 Introduction 368
2 Connotation of Government Web site Pages’ Cloud Archive 369
2.1 Conceptual Definition 369
2.2 The Basic Characteristics 369
3 Government Web site Pages Cloud Archiving Processes 370
3.1 Collection Strategy for Cloud Archiving of Government Web Pages 371
3.2 Data Management for Cloud Archiving of Government Web Pages 373
3.3 Cloud Storage Architecture for Archiving Government Web Pages 374
3.4 Government Web Page “Cloud” Utilization Services and Safety 375
4 Technical Framework for Cloud Archiving of Government Web Pages 376
5 Conclusion 378
References 378
Determination of Contents Based on Learning Styles Through Artificial Intelligence 380
1 Introduction 381
2 Method 381
2.1 Search, Analysis and Classification of Information About the Content Generation Process for the Courses 382
2.2 Analysis and Coding of the Software Component for Content Generation According to Learning Styles 382
2.3 Validation and Acceptance Tests 382
3 Experimental Design 383
3.1 Analysis and Determination of Functional Requirements, Roles and Actors 383
3.2 Design of the System Knowledge Base Model 383
4 Results 385
4.1 Knowledge Base 385
5 Conclusions 386
References 386
Evaluation Computing of Cultural Tourism Resources Potential Based on SVM Intelligent Data Analysis and IoT 388
1 Introduction 388
2 The Proposed Methodology 391
2.1 Resources Potential Model 391
2.2 SVM Data Analytic Framework 392
2.3 IoT Framework for the Measurement 393
2.4 Evaluation Computing of Cultural Tourism Resources Potential 395
3 Conclusion 396
References 396
Data Mining and Social Network Analysis on Twitter 399
1 Introduction 400
2 Data 400
3 Method 400
4 Results 401
5 Conclusions 404
References 405
Numerical Modeling and Simulation of High-Efficiency Thin Cu(In,Ga)Se Photovoltaic by WxAMPS 407
1 Introduction 408
2 Simulation and Modeling 409
2.1 Simulations Details 409
2.2 Reference Cell 410
3 Results and Discussions 413
3.1 I–V Characteristics of Single Junction CIGS Solar Cell at 300 K 414
4 Conclusion 419
References 419
Design of a Two-Stage Folded Cascode Amplifier Using SCL 180nm CMOS Technology 420
1 Introduction 420
2 Architecture of the Two-Stage Amplifier Circuit 421
2.1 Proposed Circuit of Folded Cascode Amplifier 421
2.2 Methodology 421
3 Folded Cascode Amplifier Design 421
3.1 Design Procedure 423
4 Simulation results 425
5 Conclusion 427
References 427
Electromagnetic Simulation of Optical Devices 428
1 Introduction 428
2 Related Work 429
3 Proposed Work 429
4 Result Analysis 430
5 Discussion 430
References 433
Review on Radio Frequency Micro Electro Mechanical Systems (RF-MEMS) Switch 434
1 Introduction 434
2 Classification of RF Switches 435
3 Classification of MEMS-Based RF Switches 436
3.1 Configuration 437
3.2 Actuation Mechanism 438
3.3 Contact Type 439
3.4 Structure 440
4 Design Considerations of RF-MEMS Switch 441
4.1 Effect of Beam 441
4.2 Effect of Dielectric 442
4.3 Gap Between Membrane and Dielectric 443
5 MEMS Capacitance and RF Parameter 443
6 Effect of Perforation on the Beam 445
7 Material Selection 445
8 Conclusion 446
References 447
Design of Generalized Rational Sampling Rate Converter Using Multiple Constant Multiplication 451
1 Introduction 451
2 Overall System Model 453
3 MCM-Based Design 454
4 Results and Analysis 457
5 Conclusion 459
References 461
Comparison of Decoupled and Coupled PWM Techniques for Open-End Induction Motor Drives 463
1 Introduction 463
2 Dual-Based Inverter Configuration 464
3 PWM Methods Designed for Dual-Inverter (DI) Configuration 464
3.1 Decoupled PWM Techniques 465
3.2 Coupled PWM Methods 466
4 Summary 469
References 469
Computer Tools for Energy Systems 471
1 Introduction 471
2 Computer Tools for Energy System 472
2.1 AEOLIUS 473
2.2 BALMOREL 473
2.3 BCHP Screening Tool 473
2.4 COMPOSE 474
2.5 E4cast 474
2.6 EMCAS 474
2.7 EMINENT 475
2.8 EMPS 475
2.9 Energy PLAN 475
2.10 Energy PRO 476
2.11 ENPEP-BALANCE 476
2.12 GTMax 477
2.13 H2RES 477
2.14 HOMER 477
2.15 HYDROGEMS 478
3 Conclusion 478
References 478
Three-Interacting Tank Controlled with Decentralized PI Controller Tuned Using Grey Wolf Optimization 481
1 Introduction 482
2 Cylindrical Three-Tank Interacting System 483
3 Interaction Analysis 487
4 Decentralized Controller Design Tuning Using Grey Wolf Optimizer 488
4.1 Grey Wolf Optimizer 488
4.2 Online Optimization of the Decentralized Controller Using Grey Wolf Optimizer 491
5 Conclusion 495
References 495
An IEC 61131-3-Based PLC Timers Module Implemented on FPGA Platform 497
1 Introduction 498
2 Materials and Methods 498
2.1 Materials 498
2.2 Methods 499
3 Theory 501
3.1 Results of Literature Survey 501
4 Results and Discussions 502
4.1 Timer ON Delay 502
4.2 Timer OFF Delay 503
4.3 Retentive Timer ON Delay 503
4.4 Retentive Timer OFF Delay 504
4.5 Pulse Timer 504
4.6 Oscillator Timer 505
4.7 Real-Time Applications of Timers 506
4.8 Comparative Result Analysis of Proposed FPGA-Based PLC Design with Existing PLC 508
5 Conclusion 510
References 511
Impact of Temperature on Circuit Metrics of Various Full Adders 513
1 Introduction 513
2 Distinct Full Adder Structures 514
2.1 Conventional CMOS Logic Adder 514
2.2 Complementary Pass-Transistor Logic Adder 515
2.3 Transmission Gate Logic Adder 516
3 Experimental Set-up 516
4 Results and Discussion 516
5 Conclusion 519
References 520
Novel Approach for Power Analysis in Microcontrollers 521
1 Introduction 521
2 Related Work 522
3 Methods of Fault Attacks 522
3.1 Fault Attack—Non-invasive 522
3.2 Fault Attack—Semi-invasive 523
3.3 Invasive Fault Attacks 523
4 Power Analysis 523
4.1 Fault Injection Attack 523
4.2 Clock Glitch?ng Attack 524
5 Proposed System 524
6 Experimental Results 525
6.1 Power Analysis for Addition Operation 525
7 Conclusion 526
References 527
Evolving Reversible Fault-Tolerant Adder Architectures and Their Power Estimation 528
1 Introduction 528
2 Literature Survey 529
2.1 Reversible Gates 529
2.2 Proposed Adder Architectures 530
2.3 Ripple Carry Adder 531
2.4 Carry Skip Adder 531
2.5 Carry Look-Ahead Adder 531
2.6 Power Estimation and Hardware Complexity 531
3 Conclusion 533
References 534
A Wide-Band, Low-Power Grounded Active Inductor with High Q Factor for RF Applications 536
1 Introduction 536
2 Background 537
3 Proposed AI Circuit 538
4 Simulation Results and Discussions 539
5 Conclusion 542
References 542
Design and FPGA Realization of Digital Lightweight Numerically Controlled Quadrature Wave Oscillator 544
1 Introduction 544
2 Literature Survey 545
3 NCO Architecture 546
4 Building a Numerically Controlled Quadrature Wave Oscillator (NCQO) 546
5 Components of NCQO 547
6 Simulation Results 549
7 Results and Analysis 550
8 Conclusion 551
References 552
Efficient Multimedia Data Transmission Model for Future Generation Wireless Network 553
1 Introduction 554
2 Efficient Multimedia Data Transmission Model for Future Generation High-Speed Wireless Network with Proposed Compression Technique 556
3 Experimental Outcome and Discussion 560
3.1 Bit Error Rate Performance Evaluation Considering Varied SNR 560
3.2 Symbol Error Rate Performance Evaluation Considering Varied SNR 561
3.3 Throughput (Sum Rate) Performance Evaluation Considering Varied SNR 561
3.4 Compression Ratio Performance Evaluation 562
4 Conclusion 562
References 563
Smart Fleet Monitoring System in Indian Armed Forces Using Internet of Things (IoT) 566
1 Introduction 566
2 Literature Review 567
3 IoT Architecture 568
4 Related Work 568
5 Working of Fleet Monitoring 569
5.1 GPS Tracker Module 570
5.2 Load Management Module 570
5.3 Fuel Monitoring Module 571
6 Results and Applications 571
6.1 Implementation 571
6.2 Results 571
7 Conclusion 573
8 Future Work 573
References 573
Greenhouse Monitoring System Based on Internet of Things 574
1 Introduction 574
2 Related Works 575
3 System Architecture 576
3.1 DHT11 Sensor 576
3.2 Soil Moisture Sensor 577
3.3 Arduino Uno 577
3.4 Ultrasonic Module HC-SR04 577
3.5 LDR Sensor 577
3.6 Pressure Sensor 578
3.7 PIR Sensor 578
3.8 Motor Module 578
4 Results and Discussion 578
5 Conclusion 583
References 584
Building Personal Marionette (Ritchie) Using Internet of Things for Smarter Living in Homes 585
1 Introduction 585
2 Background and Key Issues 586
2.1 Marionette System 586
2.2 System Architecture 587
3 Home Automation 590
3.1 Structural Design of the System 591
3.2 Predictable Results and Analysis 591
4 Conclusion and Future Work 593
References 593
The Internet of Things (IoT) Routing Security—A Study 595
1 Introduction 595
2 Related Works 596
2.1 Authentication and Integrity 597
2.2 Access Control for Ensuring Security 597
2.3 Privacy and Confidentiality 597
3 IoT Routing Attacks 598
3.1 Grouping of Attacks 598
4 Proposed Work Discussing the Attacks and Techniques Which Addresses the IoT Attacks 601
5 Future Research Direction 601
6 Conclusion 601
References 603
Efficient Hybrid Method for Intrinsic Security Over Wireless Sensor Network 605
1 Introduction 606
2 Literature Review 607
3 Proposed Methodology 608
3.1 Network Module 608
3.2 Wireless Tap Channel in Network Setting 610
4 Simulation Results 611
4.1 Packet Delivery Ratio (PDR) 612
4.2 End-to-End Delay 612
4.3 Throughput 612
5 Conclusion 615
References 616
Cloud-Based Healthcare Portal in Virtual Private Cloud 617
1 Introduction 617
2 Requirements 618
2.1 Confidentiality 618
2.2 Integrity 619
2.3 Collision Resistance 619
2.4 Anonymity 619
3 Architecture Design 619
3.1 Healthcare System (HCS) in the Public Cloud Service 619
3.2 Proposed Architecture 620
4 Establish Flexibility of Access in VPC 621
4.1 Create the Public and Private Subnet for VPC IP Address 10.0.0.0/16 622
4.2 Network Address Translation (NAT) 622
5 Evaluation Framework 624
6 Conclusion and Proposed Work 624
References 624
Interference Aware Cluster Formation in Cognitive Radio Sensor Networks 626
1 Introduction 626
2 Related Work 627
3 Proposed Protocol 629
4 Channel Allotment Scheme 630
5 Clustering Process 632
6 Performance Evaluation 633
7 Conclusion 634
References 635
Efficient Utilization of Resources of Virtual Machines Through Monitoring the Cloud Data Center 636
1 Introduction 636
2 Related Work 637
3 Proposed System 638
4 Experimental Results 641
5 Conclusion 642
References 644
A Study of Energy Management Techniques for Smart City Applications on Educational Campus 645
1 Introduction 645
2 Data 646
3 Results and Discussion 647
3.1 Data Monitoring and Supervision 647
3.2 Data Storage 648
3.3 Server 648
3.4 Information System 650
4 Conclusions 654
References 655
Low-Noise Amplifier for Wireless Local Area Network Applications 656
1 Introduction 656
2 Wireless Local Area Network 658
3 Low-Noise Amplifier Topologies Used for WLAN Applications 658
4 Conclusion and Future Scope 665
References 668
Indoor Mobile Robot Path Planning Using QR Code 670
1 Introduction 670
2 Literature Survey 671
3 Implementation 672
3.1 Architecture of Proposed System 672
3.2 Flow Diagram of the System 672
3.3 Proposed Path Planning Algorithm 675
4 Results 676
5 Conclusion 679
References 681
A Novel Privacy Preservation Scheme for Internet of Things Using Blockchain Strategy 683
1 Introduction 684
1.1 IoT and Attacks 684
2 Related Work 685
2.1 Review Stage 1: Security Issues in Various Layers of IoT 685
2.2 Review Stage 2: Security Solutions for IoT 687
2.3 Overview of Blockchain Technology 688
2.4 Problem Statement 688
3 Proposed Work 689
3.1 Security Framework for IoT 689
3.2 Implementation 689
4 Result Analysis 690
5 Conclusion and Future Work 690
References 692
Logically Locked I2C Protocol for Improved Security 694
1 Introduction 694
1.1 Problems with I2C 695
2 Literature Survey 695
2.1 Logic Locking 696
3 Securing I2C Protocol 697
4 Conclusion 701
References 702
Broadband Circularly Polarized Microstrip Patch Antenna with Fractal Defected Ground Structure 704
1 Introduction 704
2 Proposed Antenna Design 705
3 Parametric Analysis 705
3.1 Varying the Parameters 706
4 Results and Discussion 707
5 Conclusion 710
References 710
A Novel Technique for Vehicle Theft Detection System Using MQTT on IoT 712
1 Introduction 712
2 Literature Review 713
3 System Design 714
4 System Implementation 715
5 Conclusion 719
6 Future Work 719
References 720
Secure Wireless Internet of Things Communication Using Virtual Private Networks 721
1 Introduction 721
2 USP of IoT—Challenges for Security 722
3 Approaches and Their Feasibility 722
3.1 Hardware-Implemented Security 722
3.2 Device Authentication 723
3.3 Lightweight Encryption 723
3.4 Securing the Network 723
4 Tunneling 724
4.1 Point-to-Point Tunneling Protocol 724
4.2 Layer 2 Tunneling Protocol 724
5 Campus Building Network 725
6 Major IoT Cybersecurity Concerns 727
6.1 Network Attacks 727
6.2 Other Attacks 727
7 Future Work 727
8 Conclusion 728
References 728
A Contingent Exploration on Big Data Tools 729
1 Introduction 729
2 Characteristic Features of Big Data 731
3 Beyond 5 V’s, 3 P’s 731
4 Levels of Big Data Tools 732
5 Exploration of Big Data Tools 733
6 Key Technologies 735
7 Big Data Applications 735
8 A Comparative Analysis of Big Data Tools 735
9 Conclusion 738
10 Limitation 738
11 Future Scope 738
References 739
Author Index 740

Erscheint lt. Verlag 4.3.2020
Reihe/Serie Lecture Notes in Electrical Engineering
Zusatzinfo XXII, 757 p. 394 illus., 281 illus. in color.
Sprache englisch
Themenwelt Informatik Theorie / Studium Künstliche Intelligenz / Robotik
Technik Elektrotechnik / Energietechnik
Technik Maschinenbau
Technik Nachrichtentechnik
Schlagworte Computing and Computers • Electronics • Electronic systems • ICCCES 2019 • Informatics • machine learning and optimization • VLSI Design and Automation
ISBN-10 981-15-2612-5 / 9811526125
ISBN-13 978-981-15-2612-1 / 9789811526121
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 30,6 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
der Praxis-Guide für Künstliche Intelligenz in Unternehmen - Chancen …

von Thomas R. Köhler; Julia Finkeissen

eBook Download (2024)
Campus Verlag
38,99
Wie du KI richtig nutzt - schreiben, recherchieren, Bilder erstellen, …

von Rainer Hattenhauer

eBook Download (2023)
Rheinwerk Computing (Verlag)
24,90