Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018)A.Pasumpon Pandian, Tomonobu Senjyu, Syed Mohammed Shamsul Islam, Haoxiang Wang This book presents the proceedings of the International Conference on Computer Networks, Big Data and IoT (ICCBI-2018), held on December 19–20, 2018 in Madurai, India. In recent years, advances in information and communication technologies [ICT] have collectively aimed to streamline the evolution of internet applications. In this context, increasing the ubiquity of emerging internet applications with an enhanced capability to communicate in a distributed environment has become a major need for existing networking models and applications. To achieve this, Internet of Things [IoT] models have been developed to facilitate a smart interconnection and information exchange among modern objects – which plays an essential role in every aspect of our lives. Due to their pervasive nature, computer networks and IoT can easily connect and engage effectively with their network users. This vast network continuously generates data from heterogeneous devices, creating a need to utilize big data, which provides new and unprecedented opportunities to process these huge volumes of data. This International Conference on Computer Networks, Big Data, and Internet of Things [ICCBI] brings together state-of-the-art research work, which briefly describes advanced IoT applications in the era of big data. As such, it offers valuable insights for researchers and scientists involved in developing next-generation, big-data-driven IoT applications to address the real-world challenges in building a smartly connected environment.
|
What people are saying - Write a review
goood one
Contents
1 | |
12 | |
23 | |
31 | |
41 | |
A Review | 56 |
Efficiency Improvement in Code Emulation by Soft Computing Technique | 67 |
Comparative Evaluation of Various Swarm Intelligence Techniques Designed for Routing in Wireless Sensor Networks | 76 |
Smart Garbage Bin | 546 |
An Intelligent Personal Assistant | 552 |
A Comprehensive Study on Data Management Solutions to Internet of Things IoT Based Applications | 560 |
Traffic Prediction Using Decision Tree Classifier in Hive Metastore | 571 |
Preventing Credit Card Fraud Using Dual Layer Security | 579 |
A Network Analysis of the Contributions of Kerala in the Field of Mathematical Research Over the Last Three Decades | 585 |
SoC Based Acoustic Controlled Semi Autonomous Driving System | 591 |
Deep Incremental Learning for Big Data Stream Analytics | 600 |
A Survey | 86 |
Comprehensive Survey on Detection of Living or Dead Humans and Animals Using Different Approaches | 94 |
A Study on Rough Indices in Information Systems with Fuzzy or Intuitionistic Fuzzy Decision AttributesTwo Thresholds Approach | 101 |
Proactive Decision Making Based IoT Framework for an Oil Pipeline Transportation System | 108 |
Analysis of Mirai Botnet Malware Issues and Its Prediction Methods in Internet of Things | 120 |
Contagious Diseases Prediction in Healthcare Over Big Data | 127 |
Securing Data with Selective Encryption Based DAC Scheme for MANET | 133 |
Railway Surface Crack Detection System Based on Intensity Loss of UV Radiation | 140 |
Urban IoT Implementation for Smart Cities | 147 |
Review of CloudBased Natural Language Processing Services and Tools for Chatbots | 156 |
Weighted Trilateration and Centroid Combined Indoor Localization in Wifi Based Sensor Network | 163 |
Comparison of Various Wearable Activity Trackers | 173 |
Review on Security Problems of Bitcoin | 180 |
Review of Security Systems in Vehicles | 185 |
Machine Learning Algorithms in Stock Market Prediction | 192 |
Review of Data Protection Technique | 198 |
Review of Blind Navigation Systems | 204 |
Analyzing DFA Attack on AES192 | 211 |
A Comparative Study on Data Stream Clustering Algorithms | 219 |
Biometric Voting System | 231 |
Implement Improved Intrusion Detection System Using State Preserving Extreme Learning Machine SPELM | 236 |
Prevention and Detection Schemes | 247 |
Enabling Technologies for Internet of Vehicles | 257 |
Video Based Silent Speech Recognition | 269 |
Fusion of Machine Learning Fog and Edge Computing in the Internet of Things | 278 |
Recognition of Characters in a Securely Transmitted Medical Image | 286 |
Educational Data Mining Survey for Predicting Students Academic Performance | 293 |
RFID Based Patient Record Management Information System Using LabVIEW | 303 |
ClientControlled HECCasaService HaaS | 312 |
A NonAdjacent Form NAF Based ECC for Scalar Multiplication that Assure Computation Reduction on Outsourcing | 319 |
Secure and Energy Efficient Based Healthcare Data Transmission Wireless Sensor Network | 327 |
IOT Based Demand Side Management of a Microgrid | 334 |
Real Time Twitter Sentiment Analysis for Product Reviews Using Naive Bayes Classifier | 342 |
A Dynamic Security Model for Visual Cryptography and Digital Watermarking | 351 |
Systematic Approach Towards Sentiment Analysis in Online Reviews | 358 |
A Generic Model for Scheduling IoT Jobs at the Edge | 370 |
A Survey on Different Methodologies Involved in Falling Fire and Smoke Detection Using Image Processing | 378 |
Architecture Algorithm and Comparison | 385 |
Advanced Access Control Mechanism for Cloud Based Ewallet | 392 |
Novel Pentagonal Shape Meander Fractal Monopole Antenna for UWB Applications | 400 |
Gas Leakage Detection Device GLDD Using IoT with SMS Alert | 409 |
Detection of Primary Glaucoma in Humans Using Simple Linear Iterative Clustering SLIC Algorithm | 417 |
Application of Stream Cipher and Hash Function in Network Security | 429 |
Interactive Video Gaming with Internet of Things | 436 |
A Review | 446 |
Set Based Similarity Measure for User Based Collaborative Filtering Recommendation System | 453 |
An IOT Based Weather Monitoring System to Prevent and Alert Cauvery Delta District of Tamilnadu India | 462 |
Summarization of User Reviews on ECommerce Websites Using Hidden Markov Model | 470 |
Multimedia Data Retrieval Using Data Mining Image Pixle Comparison Techniques | 483 |
A Survey of Techniques and Methods | 490 |
Natural Language Interface for Relational Database | 499 |
Security Analysis on Remote User Authentication Methods | 506 |
Human Tracking System Based on GPS and IOT Internet of Things | 514 |
Review on Mechanisms to Ensure Confidentiality and Integrity of the Data in Cloud Storage | 522 |
Cloud Task Scheduling and Load Balancing | 529 |
Classification of Encryption Algorithms Based on Ciphertext Using Pattern Recognition Techniques | 540 |
Internet of Things Based Reliable RealTime Disease Monitoring of Poultry Farming Imagery Analytics | 615 |
Impacts of Nonlinear Effects in DWDM Based Fiber Optic Communication System | 621 |
A Health Monitoring System by Envisagative Computing Using Big Data Analytics | 630 |
Session Layer Security Enhancement Using Customized Protocol and Strong Cryptographic Mechanism | 637 |
Simulation of VANET Using Pointer Base Replacement Mechanism | 645 |
Splicing Detection Technique for Images | 654 |
An Optimized Data Classifier Model Based Diagnosis and Recurrence Predictions of Gynecological Cancer for Clinical Decision Support System | 661 |
Ant Colony Optimization Techniques An Enhancement to Energy Efficiency in WSNs | 670 |
Overview on Cyber Security Threats Involved in the Implementation of Smart Grid in Countries like India | 678 |
IoT Based Medical Diagnosis Expert System Application | 685 |
RGB Component Encryption of Video Using AES256 Bit Key | 693 |
A Generic Approach for Video Indexing | 701 |
Energy Aware Routing Applications for Internet of Things | 709 |
Methods for Finding Brain Diseases Like Epilepsy and Alzheimers | 715 |
Ameliorated Domain Adaptation Using Adaptive Classification Algorithm | 720 |
Fault Tolerance Clustering of Scientific Workflow with Resource Provisioning in Cloud | 737 |
IoT Based Air Quality Monitoring Systems A Survey | 752 |
An NNPSO Approach Network Selection and Fast Delivery Handover Route 5G LTE Network | 759 |
Bluetooth Enabled Electronic Gloves for Hand Gesture Recognition | 771 |
Smart Trolley with Automatic Master Follower and Billing System | 778 |
Biometric Image Processing Recognition in Retinal Eye Using Machine Learning Technique | 792 |
Energy Efficient Dynamic Slot Allocation of Map Reduce Tasks for Big Data Applications | 801 |
A Secure Solution for EBalloting | 811 |
Hybrid HSW Based Zero Watermarking for Tampering Detection of Text Contents | 820 |
Secure TwoPhase Decentralized Data Deduplication with Assured Deletion in Multi User Environment | 827 |
People Technologies and Organizations Interactions in a Social Commerce Era | 836 |
Plant Disease Detection System for Agricultural Applications in Cloud Using SVM and PSO | 850 |
Enhanced Data Security Architecture in Enterprise Networks | 857 |
Challenges and Opportunities | 865 |
A Survey | 873 |
Knowledge Discovery from Mental Health Data | 881 |
A Case Study | 889 |
Secure User Authentication Using Honeywords | 896 |
A Secured Architecture for IoT Healthcare System | 904 |
Topic Based Temporal Generative Short Text Clustering | 912 |
Review of Reinforcement Learning Techniques | 923 |
Machine Learning Algorithms for Diagnosis of Breast Cancer | 928 |
Review of Data Security Frameworks for Secure Cloud Computing | 933 |
Review of Convolutional Neural Network in Video Classification | 942 |
Smart Home Automation Systems | 948 |
A Survey on Attacks of Bitcoin | 953 |
Note Taking Tool for Online Learners | 960 |
Biometric Passport Security Using Encrypted Biometric Data Encoded in the HCC2D Code | 968 |
Survey and Analysis of Pest Detection in Agricultural Field | 976 |
Object Detection Using Convex Clustering A Survey | 984 |
Advanced Load Balancing MinMin Algorithm in Grid Computing | 991 |
Smart Navigation Application for Visually Challenged People in Indoor Premises | 998 |
Orisyncrasy An Ear Biometrics on the Fly Using Machine Learning Techniques | 1005 |
A Comprehensive Study of Various Techniques Used for Flood Prediction | 1017 |
Data Analytics in Steganography | 1032 |
Users Search Satisfaction in Search Engine Optimization | 1035 |
Brain Tumour Identification Through MRI Images Using Convolution Neural Networks | 1046 |
An Efficient Worm Detection System Using Multi Feature Analysis and Classification Techniques | 1054 |
Digital Marketing Framework Strategies Through Big Data | 1065 |
1075 | |