Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018)

Front Cover
A.Pasumpon Pandian, Tomonobu Senjyu, Syed Mohammed Shamsul Islam, Haoxiang Wang
Springer, Jul 31, 2019 - Technology & Engineering - 1078 pages
1 Review
Reviews aren't verified, but Google checks for and removes fake content when it's identified

This book presents the proceedings of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018), held on December 19–20, 2018 in Madurai, India.

In recent years, advances in information and communication technologies [ICT] have collectively aimed to streamline the evolution of internet applications. In this context, increasing the ubiquity of emerging internet applications with an enhanced capability to communicate in a distributed environment has become a major need for existing networking models and applications. To achieve this, Internet of Things [IoT] models have been developed to facilitate a smart interconnection and information exchange among modern objects – which plays an essential role in every aspect of our lives. Due to their pervasive nature, computer networks and IoT can easily connect and engage effectively with their network users. This vast network continuously generates data from heterogeneous devices, creating a need to utilize big data, which provides new and unprecedented opportunities to process these huge volumes of data. This International Conference on Computer Networks, Big Data, and Internet of Things [ICCBI] brings together state-of-the-art research work, which briefly describes advanced IoT applications in the era of big data. As such, it offers valuable insights for researchers and scientists involved in developing next-generation, big-data-driven IoT applications to address the real-world challenges in building a smartly connected environment.

 

What people are saying - Write a review

Reviews aren't verified, but Google checks for and removes fake content when it's identified
User Review - Flag as inappropriate

goood one

Contents

Various Steering Conventions in MANET
1
End to End Network Connectivity Detection Using SNMP and CAM
12
Multimodal Web Content Mining to Filter Nonlearning Sites Using NLP
23
Towards Converging Fully Homomorphic Batch Encryption with Data Integrity Assurance in Cloud Setting
31
Approach Based on Network Traffic Prediction
41
A Review
56
Efficiency Improvement in Code Emulation by Soft Computing Technique
67
Comparative Evaluation of Various Swarm Intelligence Techniques Designed for Routing in Wireless Sensor Networks
76
Smart Garbage Bin
546
An Intelligent Personal Assistant
552
A Comprehensive Study on Data Management Solutions to Internet of Things IoT Based Applications
560
Traffic Prediction Using Decision Tree Classifier in Hive Metastore
571
Preventing Credit Card Fraud Using Dual Layer Security
579
A Network Analysis of the Contributions of Kerala in the Field of Mathematical Research Over the Last Three Decades
585
SoC Based Acoustic Controlled Semi Autonomous Driving System
591
Deep Incremental Learning for Big Data Stream Analytics
600

A Survey
86
Comprehensive Survey on Detection of Living or Dead Humans and Animals Using Different Approaches
94
A Study on Rough Indices in Information Systems with Fuzzy or Intuitionistic Fuzzy Decision AttributesTwo Thresholds Approach
101
Proactive Decision Making Based IoT Framework for an Oil Pipeline Transportation System
108
Analysis of Mirai Botnet Malware Issues and Its Prediction Methods in Internet of Things
120
Contagious Diseases Prediction in Healthcare Over Big Data
127
Securing Data with Selective Encryption Based DAC Scheme for MANET
133
Railway Surface Crack Detection System Based on Intensity Loss of UV Radiation
140
Urban IoT Implementation for Smart Cities
147
Review of CloudBased Natural Language Processing Services and Tools for Chatbots
156
Weighted Trilateration and Centroid Combined Indoor Localization in Wifi Based Sensor Network
163
Comparison of Various Wearable Activity Trackers
173
Review on Security Problems of Bitcoin
180
Review of Security Systems in Vehicles
185
Machine Learning Algorithms in Stock Market Prediction
192
Review of Data Protection Technique
198
Review of Blind Navigation Systems
204
Analyzing DFA Attack on AES192
211
A Comparative Study on Data Stream Clustering Algorithms
219
Biometric Voting System
231
Implement Improved Intrusion Detection System Using State Preserving Extreme Learning Machine SPELM
236
Prevention and Detection Schemes
247
Enabling Technologies for Internet of Vehicles
257
Video Based Silent Speech Recognition
269
Fusion of Machine Learning Fog and Edge Computing in the Internet of Things
278
Recognition of Characters in a Securely Transmitted Medical Image
286
Educational Data Mining Survey for Predicting Students Academic Performance
293
RFID Based Patient Record Management Information System Using LabVIEW
303
ClientControlled HECCasaService HaaS
312
A NonAdjacent Form NAF Based ECC for Scalar Multiplication that Assure Computation Reduction on Outsourcing
319
Secure and Energy Efficient Based Healthcare Data Transmission Wireless Sensor Network
327
IOT Based Demand Side Management of a Microgrid
334
Real Time Twitter Sentiment Analysis for Product Reviews Using Naive Bayes Classifier
342
A Dynamic Security Model for Visual Cryptography and Digital Watermarking
351
Systematic Approach Towards Sentiment Analysis in Online Reviews
358
A Generic Model for Scheduling IoT Jobs at the Edge
370
A Survey on Different Methodologies Involved in Falling Fire and Smoke Detection Using Image Processing
378
Architecture Algorithm and Comparison
385
Advanced Access Control Mechanism for Cloud Based Ewallet
392
Novel Pentagonal Shape Meander Fractal Monopole Antenna for UWB Applications
400
Gas Leakage Detection Device GLDD Using IoT with SMS Alert
409
Detection of Primary Glaucoma in Humans Using Simple Linear Iterative Clustering SLIC Algorithm
417
Application of Stream Cipher and Hash Function in Network Security
429
Interactive Video Gaming with Internet of Things
436
A Review
446
Set Based Similarity Measure for User Based Collaborative Filtering Recommendation System
453
An IOT Based Weather Monitoring System to Prevent and Alert Cauvery Delta District of Tamilnadu India
462
Summarization of User Reviews on ECommerce Websites Using Hidden Markov Model
470
Multimedia Data Retrieval Using Data Mining Image Pixle Comparison Techniques
483
A Survey of Techniques and Methods
490
Natural Language Interface for Relational Database
499
Security Analysis on Remote User Authentication Methods
506
Human Tracking System Based on GPS and IOT Internet of Things
514
Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage
522
Cloud Task Scheduling and Load Balancing
529
Classification of Encryption Algorithms Based on Ciphertext Using Pattern Recognition Techniques
540
Internet of Things Based Reliable RealTime Disease Monitoring of Poultry Farming Imagery Analytics
615
Impacts of Nonlinear Effects in DWDM Based Fiber Optic Communication System
621
A Health Monitoring System by Envisagative Computing Using Big Data Analytics
630
Session Layer Security Enhancement Using Customized Protocol and Strong Cryptographic Mechanism
637
Simulation of VANET Using Pointer Base Replacement Mechanism
645
Splicing Detection Technique for Images
654
An Optimized Data Classifier Model Based Diagnosis and Recurrence Predictions of Gynecological Cancer for Clinical Decision Support System
661
Ant Colony Optimization Techniques An Enhancement to Energy Efficiency in WSNs
670
Overview on Cyber Security Threats Involved in the Implementation of Smart Grid in Countries like India
678
IoT Based Medical Diagnosis Expert System Application
685
RGB Component Encryption of Video Using AES256 Bit Key
693
A Generic Approach for Video Indexing
701
Energy Aware Routing Applications for Internet of Things
709
Methods for Finding Brain Diseases Like Epilepsy and Alzheimers
715
Ameliorated Domain Adaptation Using Adaptive Classification Algorithm
720
Fault Tolerance Clustering of Scientific Workflow with Resource Provisioning in Cloud
737
IoT Based Air Quality Monitoring Systems A Survey
752
An NNPSO Approach Network Selection and Fast Delivery Handover Route 5G LTE Network
759
Bluetooth Enabled Electronic Gloves for Hand Gesture Recognition
771
Smart Trolley with Automatic Master Follower and Billing System
778
Biometric Image Processing Recognition in Retinal Eye Using Machine Learning Technique
792
Energy Efficient Dynamic Slot Allocation of Map Reduce Tasks for Big Data Applications
801
A Secure Solution for EBalloting
811
Hybrid HSW Based Zero Watermarking for Tampering Detection of Text Contents
820
Secure TwoPhase Decentralized Data Deduplication with Assured Deletion in Multi User Environment
827
People Technologies and Organizations Interactions in a Social Commerce Era
836
Plant Disease Detection System for Agricultural Applications in Cloud Using SVM and PSO
850
Enhanced Data Security Architecture in Enterprise Networks
857
Challenges and Opportunities
865
A Survey
873
Knowledge Discovery from Mental Health Data
881
A Case Study
889
Secure User Authentication Using Honeywords
896
A Secured Architecture for IoT Healthcare System
904
Topic Based Temporal Generative Short Text Clustering
912
Review of Reinforcement Learning Techniques
923
Machine Learning Algorithms for Diagnosis of Breast Cancer
928
Review of Data Security Frameworks for Secure Cloud Computing
933
Review of Convolutional Neural Network in Video Classification
942
Smart Home Automation Systems
948
A Survey on Attacks of Bitcoin
953
Note Taking Tool for Online Learners
960
Biometric Passport Security Using Encrypted Biometric Data Encoded in the HCC2D Code
968
Survey and Analysis of Pest Detection in Agricultural Field
976
Object Detection Using Convex Clustering A Survey
984
Advanced Load Balancing MinMin Algorithm in Grid Computing
991
Smart Navigation Application for Visually Challenged People in Indoor Premises
998
Orisyncrasy An Ear Biometrics on the Fly Using Machine Learning Techniques
1005
A Comprehensive Study of Various Techniques Used for Flood Prediction
1017
Data Analytics in Steganography
1032
Users Search Satisfaction in Search Engine Optimization
1035
Brain Tumour Identification Through MRI Images Using Convolution Neural Networks
1046
An Efficient Worm Detection System Using Multi Feature Analysis and Classification Techniques
1054
Digital Marketing Framework Strategies Through Big Data
1065
Author Index
1075
Copyright

Other editions - View all

Common terms and phrases