Advanced Techniques for IoT Applications: Proceedings of EAIT 2020
- Length: 631 pages
- Edition: 1
- Language: English
- Publisher: Springer
- Publication Date: 2021-08-03
- ISBN-10: 9811644349
- ISBN-13: 9789811644344
- Sales Rank: #0 (See Top 100 Books)
This book includes original, unpublished contributions presented at the Sixth International Conference on Emerging Applications of Information Technology (EAIT 2020), held at the University of Kalyani, Kalyani, West Bengal, India, on November 2020. The book covers the topics such as image processing, computer vision, pattern recognition, machine learning, data mining, big data and analytics, information security and privacy, wireless and sensor networks, and IoT. It will also include IoT application-related papers in pattern recognition, artificial intelligence, expert systems, natural language understanding, image processing, computer vision, applications in biomedical engineering, artificial neural networks, fuzzy logic, evolutionary optimization, data mining, Web intelligence, intelligent agent technology, virtual reality, and visualization.
Preface Contents About the Editors Image Processing, Computer Vision and Pattern Recognition Genetic Dropout: An Application to Handwritten Indic Script Classification Abstract 1 Introduction 2 Dataset Description 3 Feature Descriptors 4 Genetic Dropout 5 Experiments and Results Analysis 6 Conclusion References Encryption of Optically Compressed Medical Images Using Phase Matrix Abstract 1 Introduction 2 Theory 2.1 Diffraction Grating 3 Results and Discussions 3.1 Chosen Ciphertext Attack 4 Conclusion References Application of Image Processing for Reconstruction of PATHA Art, A Cultural Heritage of Eastern India: An Approach Using Particle Swarm Optimization Technique Abstract 1 Introduction 2 Relevance of Particle Swarm Optimization 3 PSO Based Algorithm 4 Result and Discussion 5 Conclusion Acknowledgement References A Transfer Learning Based Approach for Lung Inflammation Detection Abstract 1 Introduction 2 Literature Survey 3 Description of Dataset 4 Our Approach 5 Experimental Setup and Result 5.1 Analysis of Loss 6 Conclusion References Captionbot for Assistive Vision Abstract 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Data Collection 3.2 Data Pre-processing 3.3 Proposed Methodology 3.3.1 Feature Extraction 3.3.2 Caption Generation 3.3.3 Caption to Voice 4 Design and Implementation 4.1 Overall Design 4.2 Extract Features 4.3 Tokenizing the Vocabulary 4.4 Defining CNN-RNN Model 4.5 Training the Model With Keras 4.6 Caption Generation 4.7 Voice Generation 5 Results and Discussion 5.1 Metrics 5.1.1 Bilingual Evaluation Understudy Score 5.1.2 Cumulative N-gram Scores 5.2 Results 5.2.1 Model Testing 6 Conclusion and Future Analysis References Tiny Vessels Exploration in Retinal Image Using BFS Influenced Flood Filling 1 Introduction 2 Gray Conversion and Contrast Enhancement 3 Vessel Exploration with Binarization 4 Image Synthesis and Vessels Reconstruction 5 Study and Analysis of the Results 6 Summary and Future Scope References A Reliable and Fast Detection Technique for Lung Cancer Using Digital Image Processing Abstract 1 Introduction 2 Literature Survey 3 Proposed Framework 4 Algorithm and Methodology 4.1 Image Enhancement 4.2 Image Segmentation 4.3 Histogram Equalization 5 Results and Analysis 5.1 Results for Image Enhancement 5.2 Results for Image Enhancement 5.3 Histogram Equalization 6 Conclusion References Correlation Based Cluster Validity Index for Recognition of Leukemia Mediating Biomarkers 1 Introduction 2 Methodology 2.1 Preprocessing 2.2 Correlation Cluster Validity Index (CRI) for Cluster Validation-1 3 Results and Validation 3.1 Datasets 3.2 Evaluation Metrics 3.3 Comparative Result Analysis 3.4 Validation 4 Conclusion References Analyzing Gene-Coexpression Patterns for Parkinson's Disease Using Module Preservation Statistics 1 Introduction 2 Materials and Methods 2.1 Differentially Coexpressed Module Identification 2.2 Measuring Module Preservation of Differentially Coexpressed Modules 2.3 Module Rank Determination 3 Result and Discussion 3.1 Dataset Preparation 3.2 Module Identification and Their Rank Determination 3.3 Biological Significance Study 4 Conclusion References An Approach for Ultrasound Image Enhancement Using Deep Convolutional Neural Network Abstract 1 Introduction 2 Proposed Schemes 2.1 Network Architecture 2.2 Data Set 3 Results 3.1 Investigational Surroundings 3.2 Presentation Assessment 4 Conclusions References Food Calorie Estimation System Using ImageAI with RetinaNet Feature Extraction Abstract 1 Introduction 2 Literature Survey 3 Proposed Method 4 Results and Discussions 5 Conclusion References Sketch-Based Image Retrieval Using Convolutional Neural Networks Based on Feature Adaptation and Relevance Feedback 1 Introduction 2 Related Work 3 Methodology 3.1 Image Pre-processing 3.2 Feature Extraction 3.3 Image Similarity Matching 3.4 Relevance Feedback 4 Experimental Results and Analysis 5 Conclusion and Future Work References Dual Image Based Watermarking Scheme Using Quorum Function 1 Introduction 2 Related Work 3 Proposed Techniques 4 Analysis and Discussion 5 Conclusion References Intelligent Information Systems Pathway Marker Identification Using Gene Expression Data Analysis: A Particle Swarm Optimisation Approach Abstract 1 Introduction 2 Methodologies 2.1 Conventional Particle Swarm Optimization (PSO) 2.2 Binary Particle Swarm Optimization (BPSO) 2.3 Proposed Mutated Binary Particle Swarm Optimization (MBPSO) 2.4 Preprocessing of Microarray Datasets 2.5 Fitness Computation 2.5.1 Pathway Activity Computation 2.5.2 t-Score Computation 2.5.3 Average t-Score (Fitness) 2.6 Classification and Validation 3 Experimental Results and Discussion 3.1 Gene Expression Data 3.2 Comparative Results and Performance Analysis 3.3 Biological Significance 4 Conclusion References Forecasting of the WPI of Textiles in India: An Neural Approach Abstract 1 Introduction 2 Literature Review 3 Research Gap 4 Objectives of the Study 5 Methodology 6 Data Analysis and Findings 7 Conclusion References Determining Dark Diversity of Different Faunal Groups in Indian Estuarine Ecosystem: A New Approach with Computational Biodiversity 1 Introduction 2 Data and Methodology 2.1 Applying UNO Function 2.2 Normalization and Binarization of the Result Dataset 2.3 Applying Data Mining Methodology 3 Result Analysis 4 Conclusions References Forecasting COVID-19 Outbreak in India Using Time Series Dataset: An Ensemble of ARIMA, Abbasov-Mamedova, and Multilayer Perceptron Models Abstract 1 Introduction 1.1 Motivations and Contributions 1.2 Dataset 2 Background Study 3 Methodology 4 Results and Discussion 4.1 Hyper-parameter Tuning and Results 4.2 Proposed Final MLP Model 4.3 Perspective of Forecasting 5 Conclusion References Integration of ETL in Cloud Using Spark for Streaming Data 1 Introduction 2 Current Requirements of ETL 3 Related Work 4 Benefits of ETL in Cloud 5 Challenges of ETL in Cloud 6 Migrating ETL Workload in Cloud 6.1 Proposed Solution: Streaming ETL Framework 7 Conclusion and Future Work References Alzheimer’s Disease Detection Using Speech Dataset Abstract 1 Introduction 2 Literature Survey 3 Proposed System 3.1 Data Collection 3.2 Data Pre-processing 3.2.1 Pre-processing of the Audio Dataset 3.2.2 Pre-processing of the Transcripts Dataset 3.3 Proposed Methodology 3.3.1 Convolutional Neural Network 3.3.2 Long Short Time Memory Input Gate Forget Gate Output Gate Cell State 4 Workflow of the Proposed System 4.1 Block Diagram of CNN Model 4.2 Block Diagram of LSTM Model 4.3 Block Diagram of CNN-LSTM Model 4.4 Block Diagram of Encoder CNN-Decoder LSTM Model 5 Experimental Results 5.1 Convolutional Neural Network Model 5.2 Long Short Term Memory Model 5.3 CNN-LSTM Model 5.4 CNN Features to LSTM Model 6 Conclusion and Future Analysis References Materialized View Creation by Fuzzy MAX-MIN Composition Abstract 1 Introduction 2 Motivation of Work 3 Proposed Methodology 3.1 Step-by-Step Description for Analysis of Attribute Inter-relationship 3.2 Algorithm of Sect. 3.3 Step-by-Step Description of Materialized View Creation 3.4 Algorithm of Sect. 4 A Descriptive Example 5 Case Study 6 Conclusion and Future Work References A Novel Approach for Extraction of Knowledge in Data Analysis Using Meta Heuristic Models Abstract 1 Introduction 1.1 Background Study 1.2 Objective of the Work 2 Methodology 2.1 Harmony Search (HS) Algorithm 2.2 Modified Harmony Search (HS) Algorithm 3 Data Cleaning and Formation of Association Rule 3.1 Experiment Set Up 3.2 The Whole Work of the Experiment has been Divided in Following Steps 4 Summary of Result 4.1 Computational Complexity 4.2 Reliability Test 4.3 Comparative Analysis on Absolute Error on Actual Data 5 Conclusion and Future Scope References A Markovian Analysis of Low Back Pain on Jute Mill Workers Abstract 1 Introduction 2 Markovian Approach 2.1 Markov Chain 2.2 Proposed Methodology 3 AI-Based Solution: An Outline 4 Results and Discussions 5 Conclusion Acknowledgements References Word Sense Disambiguation System for Information Retrieval in Telugu Language Abstract 1 Introduction 2 Literature Survey 3 Baseline Method 4 Proposed Methdology for Word Sense Disambiguation (WSD) 5 Results 6 Conclusion Acknowledgement References A Convolutional Neural Network Model for Automatic Leaf Recognition 1 Introduction 2 Essential Prerequisites 2.1 System Design 2.2 Brief Overview of CNN 3 Description of the Proposed Model 3.1 Image Acquisition 3.2 Image Pre-processing 3.3 Classification Using CNN 4 Experimental Setup 5 Results and Discussions 6 Conclusion and Future Scope A Dataset Description References Generation of High-Resolution Spectra from Multispectral Imagery Using Derivative Based Learning Method Abstract 1 Introduction 2 Study Area 3 Methodology 3.1 Acquisition of Data 3.2 Spectral Library 3.3 Cubic Spline Interpolation Method 3.4 Calculation of Derivative and Slope of a Graph 3.5 Generating Function 3.6 Architecture of Proposed Model 3.7 Accuracy Assessment 4 Result and Analysis 5 Conclusion References A Novel Fuzzy Based Weighted Differential Evolution Algorithm for Clustering Gene Expression Data 1 Introduction 2 Fuzzy Based Weighted Differential Evolution (WDE) Algorithm (Proposed) 2.1 Initialization and Representation of Pattern Vector 2.2 Computation of Fitness Value 2.3 Selection of Three Subpopulation from P 2.4 Mutation and Crossover Process 2.5 Boundary Control Process 2.6 Updation of Fitness Value 2.7 Selection Process 2.8 Terminating Criteria and Return the Best Global Solution 3 Experimental Results and Analysis 3.1 Discussion of Clustering Results 4 Conclusion and Discussion References Development of Neural Machine Translator for English-Assamese Language Pair Abstract 1 Introduction 2 Literature Review 3 Neural Machine Translation 4 Development of Neural Machine Translator 4.1 Recurrent Neural Networks (RNNs) 4.2 Long Short-Term Memory (LSTMs) 4.3 Gated Recurrent Units (GRUs) 5 Word Embedding 6 Attention Mechanism 7 Experimentation and Results 7.1 Evaluation Metrics 7.2 Corpus Statistics 7.3 Data Pre-processing 7.4 System Specifications and Training Details 7.5 Result Comparison of Implemented Models 8 Analysis 9 Conclusion References Automatic Citation Contextualization Based Scientific Document Summarization Using Multi-objective Differential Evolution 1 Introduction 2 Related Work 2.1 Multi-objective Differential Evolution (MODE) 3 Proposed Approach 3.1 Pre-processing Module 3.2 Text Formation and Representation Module 3.3 Summary Generation Module 4 Result Analysis and Discussion 4.1 Data-Set Description 4.2 System Description 5 Conclusion References Design of a Bio-molecular Metal Binding Site Detection Model 1 Introduction 2 Preliminary Background 3 Materials and Methods 4 Software Engineering Based Test Case Design 5 Results and Discussion 6 Conclusion References Machine Learning Based Malicious Node Detection in IoT Environment Abstract 1 Introduction 2 IoT Architecture 2.1 Perception Layer 2.2 Network Layer 2.3 Edge Layer 2.4 Application Layer 3 Threats in IoT 3.1 Security Issues at Perception Layer 3.2 Security Issues at Network Layer 3.3 Security Issues at Edge Layer and Application Layer 4 Proposed Architecture 4.1 Mal-EdgeNet 4.2 Malicious Node Detection Module 5 Experimental Results 5.1 Performance Evaluation Metrics 5.2 Comparative Analysis 6 Conclusion References Information Security and Privacy Shared Memory Based Parallel Enactment of a Hybrid Authentication Technique Abstract 1 Introduction 2 Methodology 2.1 RPSP Based Image Encryption Technique 2.2 Chaos Based LSB Steganography 2.2.1 Embedding Algorithm: Hiding Encrypted Secret Image into Cover Image 2.2.2 Extraction: Retrieving Secret Image from Stego Image 2.3 RPSP Based Secret Image Decryption Technique 3 Parallel Implementations 4 Results 4.1 Statistical Validation of the Cryptographic and Stenographic Technique 4.1.1 Histogram Analysis 4.1.2 Structural Similarity Index (SSIM) 4.1.3 Peak Signal to Noise Ratio (PSNR) 4.2 Scalability Analysis 5 Conclusion References A Novel Analysis of Efficient Energy Architecture in Cryptography Abstract 1 Introduction 2 Visual Cryptography Schemes 3 EVCS by Using Halftone Visual Cryptography 4 Visual-Cryptography Structures 5 Proposed Scheme 5.1 Generated Shares 5.2 Embedded Phase 5.3 Extracting Phase 6 Digital Image Data Hiding Techniques 7 Secure Image Transmissions 8 Results 9 Conclusion References Power-Efficient Protocol Stack and Working Model of Femto-Cloud Based 5G Network Abstract 1 Introduction 2 Proposed Model for the Low Power Sensor Based Femto-Cloud Network 2.1 Architecture 2.2 Components and Their Functionalities 2.3 Protocol Stack 2.3.1 Radio Network Layer Protocol 2.3.2 Transport Network Layer Protocol 2.3.3 Cloud Layer Protocol 3 Power Consumption Model 3.1 Power Consumption 3.2 Parameters Used 3.3 Comparison with Existing Scheme 4 Conclusion References Secure Data Sharing in Images Using Cryptographic Approach Abstract 1 Introduction 2 Literature Survey 3 Proposed System 4 Results and Discussions 5 Conclusion Acknowledgement References Smartphones Verification and Identification by the Use of Fingerprint Abstract 1 Introduction 2 Literature Review 3 Design and Implementation 4 Conclusion and Recommendation References A Novel Three-Level Voting Model for Detecting Misleading Information on COVID-19 1 Introduction 2 Related Works 3 Proposed News Classification Model 3.1 Dataset Description 3.2 Data Preprocessing 3.3 Dataset Dividation 3.4 Feature Extraction 3.5 Classification Process 4 Experimental Results 5 Conclusion and Future Works References Wireless and Sensor Networks and IoT A Scalable, Lightweight and Secure IoT Device Connector Service Using MQTT and ECC 1 Introduction 2 Objective of the Proposed System 2.1 Scalability 2.2 Lightweightness 2.3 Security 3 Brief Overview of MQTT 4 Brief Overview of Elliptic Curve Cryptography 4.1 Overview of NACL 5 Proposed System Design and Implementation 5.1 Server Side Implementation 5.2 Device Side Implementation 6 Results from Implemented System 6.1 Experimental Setup Configuration 6.2 IoT Device Connector Service API List and Usage 6.3 Round Trip Time Measurement 6.4 Packet Sniffing of MQTT Using Wireshark Tool 7 Performance Measurement 7.1 REST API Throughput Measurement 8 Conclusion and Further Research References Application of Flower Pollination Algorithm in Designing of a Multi-crystal Superachromatic Quarter-Wave Phase Retarder Abstract 1 Introduction 2 Theoretical Background 2.1 Characteristics of Flower Pollination 3 Simulation Results and Discussions 4 Conclusion References Real Time Nitrogen, Phosphorus, Potassium (NPK) Detection in Soil Using IoT Abstract 1 Introduction 2 Literature Survey 3 Real Time Analysis of NPK Using Sensors 3.1 Preprocessing of the Soil 3.2 Adding Reagents to Estimate NPK Values 3.3 Color Detection Using Color Sensor 3.4 Estimation of NPK Level in the Soil 4 Results 5 Conclusion References SIW Based Cavity-Backed Slot Antenna for WiMAX Applications Abstract 1 Introduction 2 SIW Based Rectangular Cavity-Backed Slot Antenna 2.1 Design Parameter for Parent Antenna 2.2 Design Parameters for Proposed Antenna 3 Results and Discussion 4 Conclusion References Block Compressed Sensing Based on Non-local Self-similarity Patches 1 Introduction 2 Literature Review 3 Proposed Method 3.1 Complexity Analysis 4 Simulations and Results 5 Comparisons 6 Conclusion References Pothole Detection Using Arduino and Ultrasonic Sensors Abstract 1 Introduction 2 Existing System 3 Proposed System 3.1 Ultrasonic Sensor 3.2 Arduinouno 4 Result and Discussions 5 Inference and Future Scope Acknowledgements References A Great Adaptive SNR Assumed Low Power LDPC Decoder Abstract 1 Introduction 2 Adaptive Coding and Modulation 3 The Suggested LDPC Decoder 4 Synthesis and Results 5 Conclusion References Approximate Multiplier with Low Power Encoded Partial Products and Approximate Compressors Abstract 1 Introduction 2 Required Prerequiste 2.1 Sum of Partial Products 2.2 Accurate Compressor 3 Proposed Designs of Multiplier 3.1 Two Rough 4 × 4 Multipliers 4 Performance Evaluation 5 Analysis of Delay, Power and Area 6 Applications 7 Result Analysis 8 Conclusion References sIntelligent Drunk and Drive Alert System (ADAS) Abstract 1 Introduction 2 Objectives 3 Impact and Social Relevance 4 Challenges in Existing Methods 5 Scope of the Project 6 [5] Novelty of the Project 7 Block Diagram 8 Flow Chart 9 Software Required 10 Hardware Requirement 11 NI myRIO 12 MEMS Sensor 13 MQ3 Sensor 14 Pulse Sensor 15 Global System for Mobile Commucation (GSM) 16 Gobal Positing System (GPS) 17 Motor Drivers 18 Working 19 Future Enhancement 20 Applications References An Investigation on Collecting Based Augmented Routing Proprieties in WSN Abstract 1 Introduction 2 Conversation of Several Energy Effective Collecting Based Routing Proprieties 3 Investigation of Research Works 4 Conclusion References Design and Implementation of Ultra Low Power Operational Trans-conductance Amplifier (OTA) for Biomedical Applications Abstract 1 Introduction 2 Design of Bulk Driven OTA 3 Proposed Current Reused OTA 3.1 OTA Design 3.2 Design and Implementation of OTA 3.3 Common Mode Input Range 3.4 Noise Analysis of OTA 3.5 Monte Carlo Simulations 4 Measurement Results 5 Outputs 6 Conclusions References Smart Erobern of Vehicles on Crosswalks Abstract 1 Introduction 2 Theory on Components 2.1 Arduino 2.2 Pin Description 2.3 ESP32 Camera Module 2.4 Camera 2.5 Led Signal 3 Block Diagram 4 Working 5 Software 6 Conclusion References Smart Health Assistance Using IOT Abstract 1 Introduction 1.1 Existing System 1.2 Proposed System 2 Literature Survey 3 Implementation 3.1 Modules Description 4 Results 5 Limitations and Future Enhancement 6 Conclusion References Geometric Piercing Set Problem in Wireless Sensor Networks 1 Introduction 1.1 Motivation 1.2 Problem Definition and Terminology 1.3 Our Result 2 Approximation Algorithm 3 Conclusions References Comparative Analysis of Bio-inspired Dragonfly and Honeybee Algorithm-Based Routing Protocols with the Ant Colony Algorithm for MANET 1 Introduction 1.1 A Subsection Sample 2 Literature Review 3 Motivation 3.1 Problem Formulation 3.2 Objectives of the Study 4 Contribution 4.1 Honeybee Algorithm 4.2 Dragonfly Algorithm 5 Proposed Dragonfly-Bee Routing Algorithm 6 Simulation 7 Comparative Analysis of Proposed and Existing Work 8 Conclusion References Application of Dynamic Weight with Distance to Reduce Packet Loss in RED Based Algorithm Abstract 1 Introduction 2 Motivation and Objectives 3 Proposed Scheme: Model: ADWD-RED-IP and AQM-RED-RPL 4 Algorithm of the Proposed Model: ADWD-RED-IP 5 Algorithm of the Proposed Model: AQM-RED-RPL 6 Simulation Results and Comparison 7 Conclusion References Recognition of Moving Human Targets by Through the Wall Imaging RADAR Using RAMA and SIA Algorithms Abstract 1 Introduction 2 Methodology 3 Imaging Algorithm 4 DQ and GUI 5 System Design 6 Wall Imagery 7 Wall Imagery Human Targets 8 Detection Algorithm 9 Discussion and Conclusion References An IOT Based Building Occupancy Estimation Using SIMCA and KNN as Classification Models Abstract 1 Introduction 2 Estimation Models 2.1 Soft Independent Modelling Class Analogy Classification 2.2 K- Nearest Neighboring Classification 3 System Model 4 Results and Discussions 4.1 Simulation Results of SIMCA 4.2 Simulation Results of K-NN 4.3 Comparison with Similar Work 5 Conclusion and Future Work References Comparative Study on the Role of Different Optical Amplifiers for the Quality Improvement of Distorted Signal: A Simulation Approach Abstract 1 Introduction 2 Theory and Mathematical Calculation 2.1 SOA 2.2 EDFA 2.3 Optical Amplifier 2.4 Noise figure (NF) 3 Result and discussion 4 Conclusion Acknowledgement References Design of All Optical Binary Comparator Abstract 1 Introduction 2 Optical Circuits 3 Proposed Binary Comparator 3.1 Binary Comparator 3.2 Proposed All-Optical Realization 4 Parameter Calculation 5 Comparison with Conventional Logic 6 Conclusion and Future Scope Acknowledgements References Design of 1-Bit FinFET Sum Circuit for Computational Applications Abstract 1 Introduction 2 Overview of FinFETs 3 1-Bit Full Adder Building Block 4 Proposed Circuits 5 Simulation Results 6 Conclusion References Universal Shift Register Designed at Low Supply Voltages in 15 nm CNTFET Using Multiplexer Abstract 1 Introduction 2 Construction and Operational Features of the CNTFET Based 4-Bit Universal Shift Register 3 Performance Validation of 4-bit Universal Shift Register 4 Conclusion References Millimeter Wave Based Reliable V2X Communication Abstract 1 Introduction 2 Preparation C-V2X System at 28 GHz and Sub-6 GHz 2.1 Antenna Performances of Millimeterwave at 28 GHz in Comparison to Microwave at Sub-6 GHz 2.2 C-V2X LOS Link Simulation 2.3 C-V2X LOS Link Hardware Validation 3 Limitatıons and Future Work 4 Conclusion References Author Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.