Foreword
Preface
Acknowledgements
Contents
About the Editors
Maximizing Network Lifetime in WSN Using Ant Colony Algorıthm
Deep Ensemble Approach for Question Answer System
1 Introduction
2 Literature Review
3 Proposed System
4 Experimental Setup
5 Results and Discussion
6 Conclusion
References
Information Sharing Over Social Media Analysis Using Centrality Measure
1 Introduction
2 Related Works
3 Data Analysis
4 Conclusion
References
AndroHealthCheck: A Malware Detection System for Android Using Machine Learning
Use of Machine Learning Services in Cloud
1 Introduction
2 Cognitive Services
3 Machine Learning APIs of Google, Amazon, and Microsoft
4 ML Services Serve as a Platform
5 ML Services Serve as an Infrastructure
6 ML for Attack Detection and Prevention
7 Conclusion
References
An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT
1 Introduction
2 Literature Review
3 Related Work
4 Modified Skellam Distribution -Based Selfish Node Detection Technique (MSD-SNDT)
5 Detection and Isolation of Selfish Nodes Misbehavior Utilizing Computed MSD
6 Experimental Results and Discussions of MSD-SNDT
7 Modified Bates Distribution—Based Selfish Node Detection Technique (MBD-SNDT)
8 Experimental Results and Discussions of MBD-SNDT
9 Conclusion
References
Metaheuristic-Enabled Shortest Path Selection for IoT-Based Wireless Sensor Network
1 Introduction
2 Literature Review
3 Proposed Routing Strategies in IoT
4 Description on Varied Constraints for Shortest Route Selection
4.1 Distance Model
4.2 Delay
4.3 Energy Model
4.4 PDR
5 Optimal Shortest Path Selection via Dragonfly Algorithm with Brownian Motion
6 Results and Discussion
7 Conclusion
References
Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud–Edge Environment
Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image
1 Introduction
2 Methodology
3 Results and Discussion
4 Conclusion
References
Blockchain: Application Domains, Research Issues and Challenges
A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm
Industrial IoT: Challenges and Mitigation Policies
1 Introduction
2 Internet of Things (IoT) and Industrial Internet of Things (IIoT)
3 Cyberthreats in IIoT Devices
4 Remedial Measures and Best Practices to Mitigate Cyberthreats
4.1 Security Practices for IoT Devices Developers
4.2 Best Security Practices for Communication Network
4.3 Best Security Practices at the Industry Level
4.4 Best Practices for End Users
5 Challenges Related to Cybersecurity
6 Conclusion and Future Work
References
EclatRPGrowth: Finding Rare Patterns Using Vertical Mining and Rare Pattern Tree
1 Introduction
2 Related Work
2.1 Apriori Based Rare Pattern Mining Techniques
2.2 FP-Growth Based Rare Pattern Mining Techniques
2.3 Eclat Based Rare Pattern Mining Algorithms
3 Vertical Mining with Rare Pattern Tree
3.1 Basic Concepts and Definitions
3.2 Vertical Mining with BitSets
3.3 Structure of a Rare Pattern Tree (RP Tree)
4 Methodology of EclatRPGrowth
5 Methodology of EClatPRPGrowth
6 Experimental Results and Discussion
7 Conclusion
References
Research Scholars transferring Scholarly Information through Social Medias and Networks in the Selected State Universities of Tamil Nadu
Twitter-Based Disaster Management System Using Data Mining
1 Introduction
2 Related Works
3 Methodology
4 Implementation
5 Result and Discussion
6 Conclusion
References
Sentimental Analysis on Twitter Data of Political Domain
Cloud-Based Smart Environment Using Internet of Things (IoT)
1 Introduction
2 Literature Survey
3 Methodology
4 Conclusion
References
A Review of Healthcare Applications on Internet of Things
Big Social Media Analytics: Applications and Challenges
A Cost and Power Analysis of Farmer Using Smart Farming IoT System
Intelligent Computing Application for Cloud Enhancing Healthcare Services
1 Introduction
2 Literature Review
3 Intelligent Computing: A Novel Economic Computing Framework
4 Critical Analysis of the Healthcare Cloud Computing Challenges and Opportunities
5 An Evaluation of Cloud Computing Challenges and Opportunities
6 Discussion
7 Conclusion and Future Directions
References
Coronavirus Detection and Classification Using X-Rays and CT Scans with Machine Learning Techniques
1 Introduction
2 Literature Review
3 Proposed Methodology
4 Experiments
5 Experimental Results
6 Conclusion
References
Johnson’s Sequencing for Load Balancing in Multi-Access Edge Computing
1 Introduction
2 Load Balancing
3 Flow Shop Sequencing
3.1 Proposed Flow Shop Algorithm for Load Balancing
3.2 Flow Shop Sequencing for MEC-LB
3.3 Flow Shop Sequencing Problem
3.4 Johnson’s Sequencing
3.5 Benefits of the Proposed Methods
3.6 Johnson’s Algorithm
3.7 Lemma
3.8 Proof
3.9 Advantages
4 Conclusion
References
A Study on MPLS Vs SD-WAN
1 Introduction
2 MPLS
2.1 Boon and Bane
2.2 MPLS Future
3 SD-WAN
4 SD-WAN or MPLS
5 Conclusion
References
Security Issues and Solutions in E-Health and Telemedicine
Accident Alert System with False Alarm Switch
Metaheuristics Algorithms for Virtual Machine Placement in Cloud Computing Environments—A Review
1 Introduction
2 Virtual Machine Placement in Cloud
3 VMP Optimization Approaches
4 VMP Problem Formulation/Objective Functions
4.1 Energy Consumption Minimization
4.2 Cost Optimization
4.3 Network Traffic Minimization
4.4 Resource Utilization
4.5 Quality of Service Maximization
5 Solution Techniques
6 Discussion
7 Conclusion
References
Prostate Image Segmentation Using Ant Colony Optimization-Boundary Complete Recurrent Neural Network (ACO-BCRNN)
1 Introduction
2 Materials and Methods
3 Proposed Methodology
4 Experimental Results
5 Performance Evaluation
6 Conclusion
References
A Deep Learning Approach to Detect Lumpy Skin Disease in Cows
1 Introduction
2 Data Collection
3 Proposed Approach
4 Results
5 Conclusion
References
Prediction of Influenza-like Illness from Twitter Data and Its Comparison with Integrated Disease Surveillance Program Data
1 Introduction
2 Related Work
3 Analysis Techniques for Twitter Data
4 Proposed Approach
5 Results and Discussions
6 Conclusion
7 Limitations and Future Scope
References
Review of Denoising Framework for Efficient Removal of Noise from 3D Images
Algorithmic Trading Using Machine Learning and Neural Network
1 Introduction
2 Related Works
3 Methodology
4 Proposed Model
5 Experimentation
6 Result Analysis
7 Conclusion
8 Future Scope
References
Analysis on Intrusion Detection System Using Machine Learning Techniques
1 Introduction
2 Related Work
3 Machine Learning (ML) Techniques
3.1 Classification Techniques
3.2 Naive Bayes Classifier
3.3 Hoeffding Tree Classifier
3.4 Ensemble Classifier
4 Attack Type Classification
4.1 Data Description
4.2 Denial of Service (DOS) Attack
4.3 Probe Attack
4.4 User to Root (U2R) Attack
4.5 Remote to Local (R2L) Attack
5 Performance Evaluation
6 Analysis of Machine Learning (ML) Techniques Performance on Intrusion Detection
7 Conclusion
References
Content Related Feature Analysis for Fake Online Consumer Review Detection
Big Data Link Stability-Based Path Observation for Network Security
1 Introduction
2 Literature Survey
3 Problem Identification
4 Implementation
5 Result and Discussion
6 Conclusion
References
Challenging Data Models and Data Confidentiality Through “Pay-As-You-Go” Approach Entity Resolution
Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm
Malignant Web Sites Recognition Utilizing Distinctive Machine Learning Techniques
Speech Parameter and Deep Learning Based Approach for the Detection of Parkinson’s Disease
Study on Data Transmission Using Li-Fi in Vehicle to Vehicle Anti-Collision System
1 Introduction
2 Principle of Li-Fi
3 Applications of Li-Fi
3.1 Li-Fi in Medical Department
3.2 Li-Fi in Aircraft
3.3 Underwater Communication System Using Li-Fi
3.4 Li-Fi in Office Rooms
3.5 Li-Fi in V2V and V2I Communication
4 A Comparative Study Between Li-Fi and Wi-Fi
5 Li-Fi in the Industry and Convergence of Li-Fi with Emerging Technologies
6 Prototype Description
7 System Design
8 Digital Data Transmission
8.1 Transmitter Section
8.2 Receıver Sectıon
9 Results
10 Limitations and Challenges
11 Conclusion and Future Works
References
Approaches in Assistive Technology: A Survey on Existing Assistive Wearable Technology for the Visually Impaired
1 Introduction
2 Background
3 Related Works
4 Discussion
5 Device Concept
6 Conclusion
References
Stateless Key Management Scheme for Proxy-Based Encrypted Databases
1 Introduction
2 Related Work
3 Approaches for Protection of Outsourced Databases
3.1 Approach-1: Security at Client Side to Protect Confidentiality of Data
3.2 Approach-2: Security at Server Side for the Protection of Sensitive Data
3.3 Approach-3: Security Modules Reside in Proxy
4 Proposed Stateless Key Management Scheme for Protection of Outsourced Databases Using TRUSTED Proxy
4.1 Architecture Overview
4.2 Key Derivation Using PBKDF
4.3 Procedure for Generation of Keys in the Proxy
4.4 Choice of Scheme for OPEN_TO Relation
4.5 Advantage of SKM-PS Scheme over CryptDB Key Management (stored Key)
4.6 Stateless Key Management Performance Statistics
5 Security Analysis of Proposed Stateless Key Management
6 Other Practical Considerations
6.1 Number of Rounds Selection for PBKDF2
6.2 Password Change
6.3 Forget Password
6.4 Adding New Application User
6.5 Proxy Deployment Scenarios
7 Conclusions and Future Scope
References
Exploration of Blockchain Architecture, Applications, and Integrating Challenges
1 Introduction
2 Blockchain: Overview and Architecture
3 Blockchain: Consensus Algorithms
4 Blockchain: Applications
4.1 Bitcoin
4.2 Healthcare Sector
4.3 Ripple
4.4 Smart City
4.5 Agriculture
4.6 Financial Sector
5 Blockchain: Challenges and Possible Solutions
6 Conclusion
References
Filter Bank Multicarrier Systems Using Gaussian Pulse-Based Filter Design for 5G Technologies
1 Introduction
2 FBMC Technique
3 OGGP Based Filter
4 Proposed Methodology
5 Simulation Results
6 Conclusion
References
LIMES: Logic Locking on Interleaved Memory for Enhanced Security
A Novel IoT Device for Optimizing “Content Personalization Strategy”
IoT Based Self-Navigation Assistance for Visually Impaired
1 Introduction
2 Existing Work
2.1 Smart Mobility Aid for the Visually Impaired Society
2.2 Real-time Dangling Objects Sensing
2.3 Assistive Infrared Sensor-Based Smart Stick for Blind People
3 System Components
4 System Design
4.1 Design Requirements
4.2 Design Constraints
5 Experimental Results
6 Conclusion
References
An Overview of Cyber-Security Issues in Smart Grid
1 Introduction
2 Review of Literature
3 State Estimation of Smart Grid
4 Cyber-Security Issues in Smart Grid
5 Possible Solutions of the Cyber-Security Issues
6 Conclusion
References
Data Streaming Architecture for Visualizing Cryptocurrency Temporal Data
An Overview of Layer 4 and Layer 7 Load Balancing
Integration of IoT and SDN to Mitigate DDoS with RYU Controller
1 Introduction
2 Related Work in SDN and IoT Integration
3 Related Work of DDoS Attack Detection and Mitigation
4 IoT-SDN Test bed Architecture and Setup
5 DDoS Attack and Mitigation Simulation
6 Conclusion
References
Low Rate Multi-vector DDoS Attack Detection Using Information Gain Based Feature Selection
1 Introduction
2 Literature Survey
3 Proposed Methodology
4 Result and Discussion
5 Conclusion
References
A Framework for Monitoring Patient’s Vital Signs with Internet of Things and Blockchain Technology
1 Introduction
2 Motivation
3 Literature Survey
4 System Architecture
5 Results and Discussion
6 Conclusion
References
IoT Based Smart Transport Management and Vehicle-to-Vehicle Communication System
An Analytical and Comparative Study of Hospital Re-admissions in Digital Health Care
1 Introduction
2 Existing Work on Re-admission Prediction
3 Causes of Hospital Re-admissions
4 Reduction in Hospital Re-admission
5 Conclusion
References
An Edge DNS Global Server Load Balancing for Load Balancing in Edge Computing
Network Intrusion Detection Using Cross-Bagging-Based Stacking Model
1 Introduction
2 Literature Review
3 Cross-Bagging-Based Stacked Ensemble (CBSE)
4 Data Preprocessing and Segregation
5 Cross-Bagging Ensemble Creation
6 Stacking Phase for Final Prediction
7 Results and Discussion
8 Conclusion
References
Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall (NGFW)
1 Introduction
2 Related Work
3 Methodology
3.1 IP Spoofing
3.2 Insider Intrusion
3.3 Denial of Service (DDoS)
3.4 No Protection Against Masquerades
3.5 Firewall Trusted and Untrusted Network (LAN & WAN)
4 Implementation
4.1 Devices and Appliances
4.2 Implementation of Firewall with the Integration of Different Policy
4.3 Implementing Port Forwarding and Policy Against Direct Internet Traffic
4.4 Implementation of Internet Protocol Security (IPsec) VPN in Proposed Model
5 Results
6 Conclusions
References
Comparative Study of Fault-Diagnosis Models Based on QoS Metrics in SDN
A Brief Study on Analyzing Student’s Emotions with the Help of Educational Data Mining
1 Introduction
2 Literature Survey
3 Conclusion
References
IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages in IoT
Investigation and Analysis of Path Evaluation for Sustainable Communication Using VANET
1 Introduction
2 VANET
3 Related Work
4 Proposed System
5 GAD Protocol
6 Algorithm for GAD
7 Genetic Algorithm
8 Sybil Attack
9 Result and Discussion
10 Conclusion
References
Performance Study of Free Space Optical System Under Varied Atmospheric Conditions
1 Introduction
2 Result and Discussion
3 Conclusion
References
Malicious URL Detection Using Machine Learning and Ensemble Modeling
1 Introduction
2 Literature Review
3 Experiment
4 Results
5 Conclusion
References
Review on Energy-Efficient Routing Protocols in WSN
1 Introduction
2 Classification of Routing Protocols in WSN
3 Energy-Efficient Routing Protocols in WSN
3.1 Opportunistic Routing
3.2 Cross-layer Routing
3.3 Cooperative Routing
3.4 Biological Inspired Optimal Routing
3.5 Machine Learning (ML)-Based Routing Techniques Under Opportunistic, Cross-layer, Swarm Intelligence, and Cooperative Protocols
4 Performance Evaluation Metrics of Routing Protocols
5 Future Enhancement
6 Conclusion
References
Intelligent Machine Learning Approach for CIDS—Cloud Intrusion Detection System
In-network Data Aggregation Techniques for Wireless Sensor Networks: A Survey
1 Introduction
2 Data Aggregation
3 Taxonomy on Data Aggregation
3.1 Centralized Aggregation Technique
3.2 Tree-Based Aggregation Technique
3.3 Cluster-Based Aggregation Technique
3.4 In-network Aggregation Technique
4 In-network Aggregation
5 Types of In-network Processing
5.1 Sensor Fusion
5.2 Sensor Compression
5.3 Sensor Filtering
5.4 Sensor Elimination
6 Algorithms of In-network Aggregation
7 Parameters for Analyzing In-network Aggregation
8 Comparison on In-network Data Aggregation Algorithms
9 Conclusion
References
Comparative Analysis of Traffic and Congestion in Software-Defined Networks
A Comparative Analysis on Sensor-Based Human Activity Recognition Using Various Deep Learning Techniques
FETE: Feedback-Enabled Throughput Evaluation for MIMO Emulated Over 5G Networks
Automatic Vehicle Service Monitoring and Tracking System Using IoT and Machine Learning
1 Introduction
2 Literature Survey
3 Proposed Framework
3.1 System Design
3.2 Implementation
4 Results
5 Conclusions
References
Machine Learning-Based Application to Detect Pepper Leaf Diseases Using HistGradientBoosting Classifier with Fused HOG and LBP Features
1 Introduction
2 Related Work
3 Proposed Methodology
4 Experimental Results
5 Conclusion
References
Efficacy of Indian Government Welfare Schemes Using Aspect-Based Sentimental Analysis
1 Introduction
2 Related Work
3 Methodology
4 Results and Discussion
5 Conclusion
References
Author Index