1. Trang chủ
  2. » Công Nghệ Thông Tin

Pandian a computer networks, big data and iot 2021

980 9 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Cấu trúc

  • Foreword

  • Preface

  • Acknowledgements

  • Contents

  • About the Editors

  • Maximizing Network Lifetime in WSN Using Ant Colony Algorıthm

    • 1 Introduction

    • 2 Review of Related Work

      • 2.1 Routing Protocol

      • 2.2 Traveling Salesman Problem

    • 3 Proposed Scheme

      • 3.1 Greedy Algorithm

      • 3.2 Ant Colony Algorithm for TSP

      • 3.3 Procedure of ACO

      • 3.4 Shortest Path Problem

    • 4 Software Description

      • 4.1 Proteus

    • 5 Results and Discussion

      • 5.1 Schematic Diagram

      • 5.2 Simulation Output

      • 5.3 Power Analysis of Greedy Algorithm

      • 5.4 Simulation Waveform of Greedy Algorithm

      • 5.5 Power Analysis of ACO

      • 5.6 Simulation Waveform of Greedy Algorithm and ACO

    • 6 Conclusion and for Future Work

      • 6.1 Conclusion

      • 6.2 Scope for Future Work

    • References

  • Deep Ensemble Approach for Question Answer System

    • 1 Introduction

    • 2 Literature Review

    • 3 Proposed System

      • 3.1 Long Short Term Memory

      • 3.2 Encoder–Decoder Model

      • 3.3 CatBoost

      • 3.4 Ensemble Model

    • 4 Experimental Setup

    • 5 Results and Discussion

    • 6 Conclusion

    • References

  • Information Sharing Over Social Media Analysis Using Centrality Measure

    • 1 Introduction

    • 2 Related Works

    • 3 Data Analysis

    • 4 Conclusion

    • References

  • AndroHealthCheck: A Malware Detection System for Android Using Machine Learning

    • 1 Introduction

    • 2 Architecture of AndroHealthCheck

    • 3 Deployment of AndroHealthCheck

    • 4 Conclusion

    • References

  • Use of Machine Learning Services in Cloud

    • 1 Introduction

    • 2 Cognitive Services

    • 3 Machine Learning APIs of Google, Amazon, and Microsoft

    • 4 ML Services Serve as a Platform

    • 5 ML Services Serve as an Infrastructure

    • 6 ML for Attack Detection and Prevention

    • 7 Conclusion

    • References

  • An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT

    • 1 Introduction

    • 2 Literature Review

    • 3 Related Work

    • 4 Modified Skellam Distribution -Based Selfish Node Detection Technique (MSD-SNDT)

    • 5 Detection and Isolation of Selfish Nodes Misbehavior Utilizing Computed MSD

      • 5.1 The Proposed Algorithm—MSD-SDNT

    • 6 Experimental Results and Discussions of MSD-SNDT

    • 7 Modified Bates Distribution—Based Selfish Node Detection Technique (MBD-SNDT)

      • 7.1 MBD-SNDT Algorithm

    • 8 Experimental Results and Discussions of MBD-SNDT

    • 9 Conclusion

    • References

  • Metaheuristic-Enabled Shortest Path Selection for IoT-Based Wireless Sensor Network

    • 1 Introduction

    • 2 Literature Review

      • 2.1 Related Works

    • 3 Proposed Routing Strategies in IoT

      • 3.1 Network Model

    • 4 Description on Varied Constraints for Shortest Route Selection

      • 4.1 Distance Model

      • 4.2 Delay

      • 4.3 Energy Model

      • 4.4 PDR

    • 5 Optimal Shortest Path Selection via Dragonfly Algorithm with Brownian Motion

      • 5.1 Objective Function

      • 5.2 Solution Encoding

      • 5.3 Proposed DABR Algorithm

    • 6 Results and Discussion

      • 6.1 Simulation Procedure

      • 6.2 Performance Analysis

      • 6.3 Statistical Analysis

      • 6.4 Overall Analysis of the Proposed Model

    • 7 Conclusion

    • References

  • Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud–Edge Environment

    • 1 Introduction

    • 2 Background and Related Work

    • 3 Model Formulation

    • 4 Proposed Method

    • 5 Experiments

      • 5.1 Simulation Environment Setup

      • 5.2 Comparative Analysis and Discussion

    • 6 Conclusion

    • References

  • Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image

    • 1 Introduction

    • 2 Methodology

    • 3 Results and Discussion

    • 4 Conclusion

    • References

  • Blockchain: Application Domains, Research Issues and Challenges

    • 1 Introduction

    • 2 Overview of Blockchain

      • 2.1 Background

      • 2.2 Blockchain Transaction

      • 2.3 Digital Signature

      • 2.4 Blocks

      • 2.5 Mining and Consensus Algorithms

    • 3 Applications of Blockchain

      • 3.1 Biomedical Domain

      • 3.2 Banking and Finance

      • 3.3 Government and Public Sectors

      • 3.4 Supply Chain

      • 3.5 Internet of Things

    • 4 Open Issues and Challenges

      • 4.1 Scalability

      • 4.2 Attacks on Blockchain

      • 4.3 Privacy Breach

    • 5 Conclusion

    • References

  • A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm

    • 1 Introduction

      • 1.1 MANET

      • 1.2 Characteristics of MANET

      • 1.3 Challenges in Ad hoc Network

    • 2 Overview of routing protocol

      • 2.1 Classification of Routing Protocol

    • 3 Network performance optimization algorithm

      • 3.1 Genetic algorithms (GA)

      • 3.2 Particle Swarm Optimization (PSO)

      • 3.3 Ant Colony Optimization (ACO)

      • 3.4 Artificial Bee Colony Optimization (ABC)

      • 3.5 Bacterial Foraging Optimization Algorithm (BFOA)

      • 3.6 Binary Particle Swarm Optimization (BPSO)

    • 4 PSO Overview

    • 5 Conclusion

    • References

  • Industrial IoT: Challenges and Mitigation Policies

    • 1 Introduction

    • 2 Internet of Things (IoT) and Industrial Internet of Things (IIoT)

      • 2.1 Internet of Things (IoT)

      • 2.2 Industrial IoT (IIoT)

      • 2.3 IIoT Architecture

    • 3 Cyberthreats in IIoT Devices

      • 3.1 Cyberthreat

    • 4 Remedial Measures and Best Practices to Mitigate Cyberthreats

      • 4.1 Security Practices for IoT Devices Developers

      • 4.2 Best Security Practices for Communication Network

      • 4.3 Best Security Practices at the Industry Level

      • 4.4 Best Practices for End Users

    • 5 Challenges Related to Cybersecurity

    • 6 Conclusion and Future Work

    • References

  • EclatRPGrowth: Finding Rare Patterns Using Vertical Mining and Rare Pattern Tree

    • 1 Introduction

    • 2 Related Work

      • 2.1 Apriori Based Rare Pattern Mining Techniques

      • 2.2 FP-Growth Based Rare Pattern Mining Techniques

      • 2.3 Eclat Based Rare Pattern Mining Algorithms

    • 3 Vertical Mining with Rare Pattern Tree

      • 3.1 Basic Concepts and Definitions

      • 3.2 Vertical Mining with BitSets

      • 3.3 Structure of a Rare Pattern Tree (RP Tree)

    • 4 Methodology of EclatRPGrowth

      • 4.1 Schematic Block Diagram of Algorithm EclatRPGrowth

      • 4.2 EclatRPGrowth Example

    • 5 Methodology of EClatPRPGrowth

    • 6 Experimental Results and Discussion

      • 6.1 Comparison of Performance

    • 7 Conclusion

    • References

  • Research Scholars transferring Scholarly Information through Social Medias and Networks in the Selected State Universities of Tamil Nadu

    • 1 Introduction

    • 2 Review of Literature

    • 3 Objectives of the Study

    • 4 Methodology

    • 5 Analysis and Discussion

    • 6 Conclusion

    • References

  • Twitter-Based Disaster Management System Using Data Mining

    • 1 Introduction

    • 2 Related Works

    • 3 Methodology

      • 3.1 Linear Ridge Regression (LRR)

      • 3.2 SGD Classifier

      • 3.3 Naive Bayes Classifier

    • 4 Implementation

    • 5 Result and Discussion

    • 6 Conclusion

    • References

  • Sentimental Analysis on Twitter Data of Political Domain

    • 1 Introduction

      • 1.1 Sentiment Analysis

    • 2 Review of Literature

    • 3 System Architecture

      • 3.1 Data Collection

      • 3.2 Preprocessing

      • 3.3 Word Embedding

      • 3.4 Recurrent Neural Network (ANN)

    • 4 Results and Discussion

    • 5 Conclusion and Future Scope

    • References

  • Cloud-Based Smart Environment Using Internet of Things (IoT)

    • 1 Introduction

    • 2 Literature Survey

    • 3 Methodology

      • 3.1 RFID Technology

      • 3.2 Constrained Node Network (CNN) Technology

      • 3.3 Smart Environment Sensors with the Internet of Things (IoT)

    • 4 Conclusion

    • References

  • A Review of Healthcare Applications on Internet of Things

    • 1 Introduction

    • 2 Role of IoT in HealthCare

    • 3 Literature Review

    • 4 Comparison Table

    • 5 Conclusion

    • References

  • Big Social Media Analytics: Applications and Challenges

    • 1 Introduction

    • 2 Literature Review

    • 3 Applications of Social Media Big Data

      • 3.1 Business

      • 3.2 Healthcare

      • 3.3 Education

      • 3.4 Crisis Management

    • 4 Big Social Media Analytics

      • 4.1 Social Media Business Analytics

      • 4.2 Social Media Healthcare Analytics

      • 4.3 Social Media Education Analytics

      • 4.4 Social Media Crisis Management Analytics

    • 5 Conclusion

    • References

  • A Cost and Power Analysis of Farmer Using Smart Farming IoT System

    • 1 Introduction

    • 2 Earlier Work

    • 3 Smart Farming System

    • 4 Likely Outcomes

      • 4.1 Cost Analysis

      • 4.2 Time Analysis

      • 4.3 Power Analysis

    • 5 Experimental Setup

    • 6 Conclusion and Future Work

    • References

  • Intelligent Computing Application for Cloud Enhancing Healthcare Services

    • 1 Introduction

    • 2 Literature Review

    • 3 Intelligent Computing: A Novel Economic Computing Framework

    • 4 Critical Analysis of the Healthcare Cloud Computing Challenges and Opportunities

    • 5 An Evaluation of Cloud Computing Challenges and Opportunities

      • 5.1 The Management Perspectives

      • 5.2 Technological Aspects

      • 5.3 Privacy Aspects

      • 5.4 Legal Aspects

    • 6 Discussion

      • 6.1 Intelligent Computing Strategy and Planning

    • 7 Conclusion and Future Directions

    • References

  • Coronavirus Detection and Classification Using X-Rays and CT Scans with Machine Learning Techniques

    • 1 Introduction

    • 2 Literature Review

    • 3 Proposed Methodology

    • 4 Experiments

      • 4.1 Dataset Description

      • 4.2 Data Preprocessing

      • 4.3 Feature Extraction Technique

      • 4.4 Analyzing Results

    • 5 Experimental Results

      • 5.1 Results of CT Scan Images

      • 5.2 Results of X-Ray Images

    • 6 Conclusion

    • References

  • Johnson’s Sequencing for Load Balancing in Multi-Access Edge Computing

    • 1 Introduction

    • 2 Load Balancing

      • 2.1 Multi Access/Mobile Computing

      • 2.2 Load Balancing in Multi-Access/Mobile Computing

    • 3 Flow Shop Sequencing

      • 3.1 Proposed Flow Shop Algorithm for Load Balancing

      • 3.2 Flow Shop Sequencing for MEC-LB

      • 3.3 Flow Shop Sequencing Problem

      • 3.4 Johnson’s Sequencing

      • 3.5 Benefits of the Proposed Methods

      • 3.6 Johnson’s Algorithm

      • 3.7 Lemma

      • 3.8 Proof

      • 3.9 Advantages

    • 4 Conclusion

    • References

  • A Study on MPLS Vs SD-WAN

    • 1 Introduction

    • 2 MPLS

      • 2.1 Boon and Bane

      • 2.2 MPLS Future

    • 3 SD-WAN

      • 3.1 Challenges and Benefits

      • 3.2 Features

      • 3.3 SD-WAN Load Balancing

    • 4 SD-WAN or MPLS

      • 4.1 High Bandwidth

      • 4.2 Better Uptime

      • 4.3 Increased Performance

      • 4.4 No More ISP

      • 4.5 SD-WAN and Cloud

    • 5 Conclusion

    • References

  • Security Issues and Solutions in E-Health and Telemedicine

    • 1 Introduction

    • 2 Security Issues

      • 2.1 Masquerade Attack

      • 2.2 Ransomware Attack

      • 2.3 Injection Attacks

      • 2.4 Attacks on Healthcare Cloud Systems

      • 2.5 Attacks on Implantable and Wearable Medical Devices

      • 2.6 Home Network Attack

      • 2.7 Public Network Attack

      • 2.8 End User Attacks

    • 3 Security Considerations in e-Health and Telemedicine Systems

      • 3.1 Authentication

      • 3.2 Integrity

      • 3.3 Confidentiality

      • 3.4 Availability

      • 3.5 Access Control

    • 4 Solutions

      • 4.1 Encryption

      • 4.2 Watermarking

      • 4.3 Message Authentication Code (MAC)

      • 4.4 Digital Signature

      • 4.5 Audit

      • 4.6 Zero Trust Model

    • 5 Conclusion

    • References

  • Accident Alert System with False Alarm Switch

    • 1 Introduction

    • 2 Existing Works

    • 3 Proposed System

      • 3.1 Technical Specification

      • 3.2 Implementation

      • 3.3 False Alarm Switch

      • 3.4 Arduino Mega

    • 4 Result

    • 5 Conclusion and Future Scope

    • References

  • Metaheuristics Algorithms for Virtual Machine Placement in Cloud Computing Environments—A Review

    • 1 Introduction

    • 2 Virtual Machine Placement in Cloud

    • 3 VMP Optimization Approaches

    • 4 VMP Problem Formulation/Objective Functions

      • 4.1 Energy Consumption Minimization

      • 4.2 Cost Optimization

      • 4.3 Network Traffic Minimization

      • 4.4 Resource Utilization

      • 4.5 Quality of Service Maximization

    • 5 Solution Techniques

      • 5.1 Metaheuristics Algorithms

    • 6 Discussion

    • 7 Conclusion

    • References

  • Prostate Image Segmentation Using Ant Colony Optimization-Boundary Complete Recurrent Neural Network (ACO-BCRNN)

    • 1 Introduction

    • 2 Materials and Methods

    • 3 Proposed Methodology

      • 3.1 Ant Colony Optimization

      • 3.2 BCRNN Method

    • 4 Experimental Results

      • 4.1 Experimental Analysis

      • 4.2 Implementation Details

    • 5 Performance Evaluation

    • 6 Conclusion

    • References

  • A Deep Learning Approach to Detect Lumpy Skin Disease in Cows

    • 1 Introduction

    • 2 Data Collection

    • 3 Proposed Approach

    • 4 Results

    • 5 Conclusion

    • References

  • Prediction of Influenza-like Illness from Twitter Data and Its Comparison with Integrated Disease Surveillance Program Data

    • 1 Introduction

    • 2 Related Work

    • 3 Analysis Techniques for Twitter Data

    • 4 Proposed Approach

      • 4.1 Data Gathering

      • 4.2 Data Preprocessing

      • 4.3 Generation of Polarity

      • 4.4 Machine Learning Model

    • 5 Results and Discussions

      • 5.1 Visualization of Twitter Data Using Kibana

      • 5.2 Visualization of IDSP Data Using Kibana

    • 6 Conclusion

    • 7 Limitations and Future Scope

    • References

  • Review of Denoising Framework for Efficient Removal of Noise from 3D Images

    • 1 Introduction

      • 1.1 Understanding the Noise

    • 2 Recapitulating Image Denoising

    • 3 Proposed Denoising Technique

    • 4 Conclusion

    • References

  • Algorithmic Trading Using Machine Learning and Neural Network

    • 1 Introduction

    • 2 Related Works

    • 3 Methodology

    • 4 Proposed Model

    • 5 Experimentation

    • 6 Result Analysis

    • 7 Conclusion

    • 8 Future Scope

    • References

  • Analysis on Intrusion Detection System Using Machine Learning Techniques

    • 1 Introduction

    • 2 Related Work

    • 3 Machine Learning (ML) Techniques

      • 3.1 Classification Techniques

      • 3.2 Naive Bayes Classifier

      • 3.3 Hoeffding Tree Classifier

      • 3.4 Ensemble Classifier

    • 4 Attack Type Classification

      • 4.1 Data Description

      • 4.2 Denial of Service (DOS) Attack

      • 4.3 Probe Attack

      • 4.4 User to Root (U2R) Attack

      • 4.5 Remote to Local (R2L) Attack

    • 5 Performance Evaluation

    • 6 Analysis of Machine Learning (ML) Techniques Performance on Intrusion Detection

    • 7 Conclusion

    • References

  • Content Related Feature Analysis for Fake Online Consumer Review Detection

    • 1 Introduction

    • 2 Related Work

    • 3 Proposed Methodology

      • 3.1 Aspects and Opinion Extraction

      • 3.2 Content-Based Feature Extraction

      • 3.3 Fake Detection Module

    • 4 Experiment and Evaluation

    • 5 Conclusion and Further Work

    • References

  • Big Data Link Stability-Based Path Observation for Network Security

    • 1 Introduction

    • 2 Literature Survey

    • 3 Problem Identification

    • 4 Implementation

      • 4.1 Routing Protocol

      • 4.2 Projected Routing Convention Sending Model

      • 4.3 Routing Measurements Between Crossing Point

    • 5 Result and Discussion

    • 6 Conclusion

    • References

  • Challenging Data Models and Data Confidentiality Through “Pay-As-You-Go” Approach Entity Resolution

    • 1 Introduction

    • 2 Literature Status

    • 3 Detailed Methodologies of the Research

      • 3.1 The Following Portrays the Proposed Model in Detail

      • 3.2 The Methodology Adapted

      • 3.3 Implementation of Pay-AS-You-Go Model Through Ordered Pairs with Sorted List

      • 3.4 Generation

    • 4 Requirements for Experimental Analysis

      • 4.1 Real Data

      • 4.2 Guidelines of Match

    • 5 Conclusion

    • References

  • Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm

    • 1 Introduction

      • 1.1 Data Privacy and Security

      • 1.2 Data Security in Health Care

    • 2 Literature Survey

      • 2.1 Attribute-Based Key Generation Scheme

      • 2.2 Access Control Mechanism

    • 3 Motivation

    • 4 Proposed System

      • 4.1 System Framework

      • 4.2 System Design

    • 5 Performance of Our System

    • 6 Conclusion

    • References

  • Malignant Web Sites Recognition Utilizing Distinctive Machine Learning Techniques

    • 1 Introduction

    • 2 Related Work

    • 3 Methodology

      • 3.1 Dataset

      • 3.2 Selection of Features

      • 3.3 Classification Algorithms

    • 4 Experiment and Result

    • 5 Conclusion and Future Aspects

    • References

  • Speech Parameter and Deep Learning Based Approach for the Detection of Parkinson’s Disease

    • 1 Introduction

      • 1.1 Related Work

    • 2 Methodology

      • 2.1 Data

      • 2.2 Deep Learning

      • 2.3 Proposed Architecture of CNN

    • 3 Experimental Results and Discussion

    • 4 Conclusion

    • References

  • Study on Data Transmission Using Li-Fi in Vehicle to Vehicle Anti-Collision System

    • 1 Introduction

    • 2 Principle of Li-Fi

    • 3 Applications of Li-Fi

      • 3.1 Li-Fi in Medical Department

      • 3.2 Li-Fi in Aircraft

      • 3.3 Underwater Communication System Using Li-Fi

      • 3.4 Li-Fi in Office Rooms

      • 3.5 Li-Fi in V2V and V2I Communication

    • 4 A Comparative Study Between Li-Fi and Wi-Fi

      • 4.1 Wi-Fi Technology

      • 4.2 Comparison with Li-Fi System

    • 5 Li-Fi in the Industry and Convergence of Li-Fi with Emerging Technologies

      • 5.1 Li-Fi and IoT

      • 5.2 Li-Fi and Cloud

      • 5.3 Li-Fi and Real-Time Analytics

    • 6 Prototype Description

      • 6.1 Hardware Requırements

      • 6.2 Software Requırements

    • 7 System Design

      • 7.1 Analog Data Transmission

      • 7.2 Schematic Diagram for Analog Data

    • 8 Digital Data Transmission

      • 8.1 Transmitter Section

      • 8.2 Receıver Sectıon

    • 9 Results

    • 10 Limitations and Challenges

    • 11 Conclusion and Future Works

    • References

  • Approaches in Assistive Technology: A Survey on Existing Assistive Wearable Technology for the Visually Impaired

    • 1 Introduction

      • 1.1 Types of Computer Glasses

      • 1.2 Motivation for Conducting the Survey

      • 1.3 Outline

    • 2 Background

      • 2.1 Review Process

    • 3 Related Works

      • 3.1 BuzzClip [36]

      • 3.2 Aira AR Smart Glasses [37]

      • 3.3 Sunu Band [38]

      • 3.4 Maptic [40]

      • 3.5 MyEye2 [41]

      • 3.6 NuEyes Pro [42]

      • 3.7 OXSIGHT [43]

      • 3.8 Intelligent Reader for the Visually Handicapped [1]

    • 4 Discussion

    • 5 Device Concept

    • 6 Conclusion

    • References

  • Stateless Key Management Scheme for Proxy-Based Encrypted Databases

    • 1 Introduction

    • 2 Related Work

      • 2.1 Threat Model

      • 2.2 Security Overview of Proposed Scheme

    • 3 Approaches for Protection of Outsourced Databases

      • 3.1 Approach-1: Security at Client Side to Protect Confidentiality of Data

      • 3.2 Approach-2: Security at Server Side for the Protection of Sensitive Data

      • 3.3 Approach-3: Security Modules Reside in Proxy

    • 4 Proposed Stateless Key Management Scheme for Protection of Outsourced Databases Using TRUSTED Proxy

      • 4.1 Architecture Overview

      • 4.2 Key Derivation Using PBKDF

      • 4.3 Procedure for Generation of Keys in the Proxy

      • 4.4 Choice of Scheme for OPEN_TO Relation

      • 4.5 Advantage of SKM-PS Scheme over CryptDB Key Management (stored Key)

      • 4.6 Stateless Key Management Performance Statistics

    • 5 Security Analysis of Proposed Stateless Key Management

    • 6 Other Practical Considerations

      • 6.1 Number of Rounds Selection for PBKDF2

      • 6.2 Password Change

      • 6.3 Forget Password

      • 6.4 Adding New Application User

      • 6.5 Proxy Deployment Scenarios

    • 7 Conclusions and Future Scope

    • References

  • Exploration of Blockchain Architecture, Applications, and Integrating Challenges

    • 1 Introduction

    • 2 Blockchain: Overview and Architecture

    • 3 Blockchain: Consensus Algorithms

      • 3.1 Proof of Work (PoW)

      • 3.2 Proof of Stake (PoS)

      • 3.3 Delegated Proof of Stake (DPoS)

      • 3.4 Ripple

      • 3.5 Tendermint

    • 4 Blockchain: Applications

      • 4.1 Bitcoin

      • 4.2 Healthcare Sector

      • 4.3 Ripple

      • 4.4 Smart City

      • 4.5 Agriculture

      • 4.6 Financial Sector

    • 5 Blockchain: Challenges and Possible Solutions

      • 5.1 Challenges in IoT and Blockchain Integration

      • 5.2 Challenges in Big Data and Blockchain Integration

    • 6 Conclusion

    • References

  • Filter Bank Multicarrier Systems Using Gaussian Pulse-Based Filter Design for 5G Technologies

    • 1 Introduction

    • 2 FBMC Technique

    • 3 OGGP Based Filter

    • 4 Proposed Methodology

    • 5 Simulation Results

    • 6 Conclusion

    • References

  • LIMES: Logic Locking on Interleaved Memory for Enhanced Security

    • 1 Introduction

    • 2 Interleaved Memory

    • 3 Threats and Design for Security

      • 3.1 Design for Security

      • 3.2 Choice of Logic Locking

    • 4 Logic Locking

    • 5 Proposed Method

    • 6 Result

    • 7 Conclusion

    • References

  • A Novel IoT Device for Optimizing “Content Personalization Strategy”

    • 1 Introduction

    • 2 Content Filtering Techniques

      • 2.1 Real-Life Examples of Content Personalization

    • 3 Novel IoT Device

      • 3.1 Hardware

      • 3.2 Architecture

      • 3.3 Data Flow

    • 4 Preliminary Research Observations

    • 5 Applications

    • 6 Conclusion

    • References

  • IoT Based Self-Navigation Assistance for Visually Impaired

    • 1 Introduction

    • 2 Existing Work

      • 2.1 Smart Mobility Aid for the Visually Impaired Society

      • 2.2 Real-time Dangling Objects Sensing

      • 2.3 Assistive Infrared Sensor-Based Smart Stick for Blind People

    • 3 System Components

      • 3.1 Arduino Uno

      • 3.2 Ultrasonic Sensor SR-04

      • 3.3 Bluetooth Module

    • 4 System Design

      • 4.1 Design Requirements

      • 4.2 Design Constraints

    • 5 Experimental Results

    • 6 Conclusion

    • References

  • An Overview of Cyber-Security Issues in Smart Grid

    • 1 Introduction

    • 2 Review of Literature

    • 3 State Estimation of Smart Grid

    • 4 Cyber-Security Issues in Smart Grid

    • 5 Possible Solutions of the Cyber-Security Issues

    • 6 Conclusion

    • References

  • Data Streaming Architecture for Visualizing Cryptocurrency Temporal Data

    • 1 Introduction

    • 2 Related Work

    • 3 Methodology

      • 3.1 Tools Used

      • 3.2 Data

      • 3.3 Data Sources

      • 3.4 Data Extraction

      • 3.5 Insert Time stamp

      • 3.6 Append and Compute

      • 3.7 Merge and Aggregation

      • 3.8 Aggregation Results

    • 4 Results and Discussion

    • 5 Conclusions and Future Work

    • References

  • An Overview of Layer 4 and Layer 7 Load Balancing

    • 1 Introduction

      • 1.1 Need for Load Balancing

      • 1.2 Variances of L7 and L4 Load Balancing

      • 1.3 ADC Load Balancing

    • 2 L4 Load Balancing Architectures

      • 2.1 Network Address Translation (NAT)

      • 2.2 Direct Server Return (DSR)

      • 2.3 IP Tunnel Mode

    • 3 L7 Load Balancing Architectures

      • 3.1 Proxy Mode

      • 3.2 Transparent Proxy Mode

    • 4 Conclusion

    • References

  • Integration of IoT and SDN to Mitigate DDoS with RYU Controller

    • 1 Introduction

      • 1.1 Structuring of Paper

    • 2 Related Work in SDN and IoT Integration

    • 3 Related Work of DDoS Attack Detection and Mitigation

    • 4 IoT-SDN Test bed Architecture and Setup

      • 4.1 IoT-Test bed Setup

      • 4.2 SDN-Test bed Setup

      • 4.3 Thingsboard Cloud Platform

    • 5 DDoS Attack and Mitigation Simulation

    • 6 Conclusion

    • References

  • Low Rate Multi-vector DDoS Attack Detection Using Information Gain Based Feature Selection

    • 1 Introduction

      • 1.1 Stealthy Attack Variants

    • 2 Literature Survey

    • 3 Proposed Methodology

    • 4 Result and Discussion

    • 5 Conclusion

    • References

  • A Framework for Monitoring Patient’s Vital Signs with Internet of Things and Blockchain Technology

    • 1 Introduction

    • 2 Motivation

    • 3 Literature Survey

      • 3.1 Blockchain Technology

    • 4 System Architecture

      • 4.1 A Scenario in the Patient Health Monitoring System

      • 4.2 Proposed Algorıthms

    • 5 Results and Discussion

      • 5.1 Advantages

    • 6 Conclusion

    • References

  • IoT Based Smart Transport Management and Vehicle-to-Vehicle Communication System

    • 1 Introduction

      • 1.1 Hardware Component Needed for Li-Fi Technology

      • 1.2 Software Used for Li-Fi Technologies

      • 1.3 Li-Fi Communicator Systems

      • 1.4 Limitation of Li-Fi Technology

    • 2 Radio-Frequency Identification (RFID) Tag Technology

      • 2.1 Working of RFID Tag

      • 2.2 Limitations of RFID Tags

      • 2.3 Vehicle to Everything Communication (V2X Communication)

    • 3 LORAWAN Technology

      • 3.1 Implementation of Proposed Framework

      • 3.2 Proposed Framework

    • 4 Vehicular Adhoc Network (VANET) Technology

      • 4.1 Working of VANET

      • 4.2 Emergency Application for V2V Communication

      • 4.3 Vehicle to Infrastructure Communication

    • 5 Conclusion

    • References

  • An Analytical and Comparative Study of Hospital Re-admissions in Digital Health Care

    • 1 Introduction

    • 2 Existing Work on Re-admission Prediction

    • 3 Causes of Hospital Re-admissions

    • 4 Reduction in Hospital Re-admission

    • 5 Conclusion

    • References

  • An Edge DNS Global Server Load Balancing for Load Balancing in Edge Computing

    • 1 Introduction

      • 1.1 Need for Load Balancing in Edge Computing

      • 1.2 Need for Load Balancing in Edge Computing

      • 1.3 Load Distribution

      • 1.4 Edge Computing and Load Balancing

    • 2 GSLB Load Balancing

      • 2.1 Need for Edge DNS GSLB

    • 3 Edge DNS GSLB and Multi-cloud

      • 3.1 Advanced Disaster Recovery

      • 3.2 Sharing of Network Load Between Multiple Data Centres

      • 3.3 WAN Failure Detection

    • 4 Conclusion

    • References

  • Network Intrusion Detection Using Cross-Bagging-Based Stacking Model

    • 1 Introduction

    • 2 Literature Review

    • 3 Cross-Bagging-Based Stacked Ensemble (CBSE)

    • 4 Data Preprocessing and Segregation

    • 5 Cross-Bagging Ensemble Creation

    • 6 Stacking Phase for Final Prediction

    • 7 Results and Discussion

    • 8 Conclusion

    • References

  • Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall (NGFW)

    • 1 Introduction

    • 2 Related Work

    • 3 Methodology

      • 3.1 IP Spoofing

      • 3.2 Insider Intrusion

      • 3.3 Denial of Service (DDoS)

      • 3.4 No Protection Against Masquerades

      • 3.5 Firewall Trusted and Untrusted Network (LAN & WAN)

    • 4 Implementation

      • 4.1 Devices and Appliances

      • 4.2 Implementation of Firewall with the Integration of Different Policy

      • 4.3 Implementing Port Forwarding and Policy Against Direct Internet Traffic

      • 4.4 Implementation of Internet Protocol Security (IPsec) VPN in Proposed Model

    • 5 Results

      • 5.1 Performance Analysis and Evaluation

    • 6 Conclusions

    • References

  • Comparative Study of Fault-Diagnosis Models Based on QoS Metrics in SDN

    • 1 Introduction

    • 2 Background

      • 2.1 Architecture

      • 2.2 OpenFlow

      • 2.3 Fault Diagnosis

    • 3 Key Concepts and Terminologies

      • 3.1 Reactive Restoration Method

      • 3.2 Proactive Restoration Method

      • 3.3 Carrier-Grade Networks

      • 3.4 Quality of Service Metrics

    • 4 Comparison

      • 4.1 Fast and Adaptive Failure Recovery Using Machine Learning in Software-Defined Networks (FAFRs) [5]

      • 4.2 A Proactive Restoration Technique for SDNs (PRT) [6]

      • 4.3 CORONET: Fault Tolerance for Software-Defined Networks (CN) [3]

      • 4.4 FT‐SDN: A Fault‐Tolerant Distributed Architecture for Software-Defined Network (FT-SDN) [7]

      • 4.5 Proactive Failure Recovery in OpenFlow Based Software Defined

    • 5 Conclusion

    • References

  • A Brief Study on Analyzing Student’s Emotions with the Help of Educational Data Mining

    • 1 Introduction

    • 2 Literature Survey

    • 3 Conclusion

    • References

  • IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages in IoT

    • 1 Introduction

    • 2 Related Work

    • 3 IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages

      • 3.1 Key Generation

      • 3.2 Token Generation

      • 3.3 Shares Generation

      • 3.4 Reconstruct

      • 3.5 Mathematical Model of Share Construction and Reconstruction Process

    • 4 Results and Discussions

    • 5 Conclusion

    • References

  • Investigation and Analysis of Path Evaluation for Sustainable Communication Using VANET

    • 1 Introduction

    • 2 VANET

    • 3 Related Work

    • 4 Proposed System

    • 5 GAD Protocol

    • 6 Algorithm for GAD

    • 7 Genetic Algorithm

    • 8 Sybil Attack

    • 9 Result and Discussion

      • 9.1 Packet Delivery Ratio

      • 9.2 Average End-to-End Delay

      • 9.3 CH Formation Delay

    • 10 Conclusion

    • References

  • Performance Study of Free Space Optical System Under Varied Atmospheric Conditions

    • 1 Introduction

      • 1.1 The System Model

    • 2 Result and Discussion

    • 3 Conclusion

    • References

  • Malicious URL Detection Using Machine Learning and Ensemble Modeling

    • 1 Introduction

    • 2 Literature Review

    • 3 Experiment

      • 3.1 Url Structure

      • 3.2 Dataset

      • 3.3 Pre-processing

      • 3.4 Methodology

      • 3.5 Performance Evaluation

    • 4 Results

    • 5 Conclusion

    • References

  • Review on Energy-Efficient Routing Protocols in WSN

    • 1 Introduction

    • 2 Classification of Routing Protocols in WSN

      • 2.1 Network Structure-Based Routing Protocols

      • 2.2 Protocol Operation-Based Routing Protocols

    • 3 Energy-Efficient Routing Protocols in WSN

      • 3.1 Opportunistic Routing

      • 3.2 Cross-layer Routing

      • 3.3 Cooperative Routing

      • 3.4 Biological Inspired Optimal Routing

      • 3.5 Machine Learning (ML)-Based Routing Techniques Under Opportunistic, Cross-layer, Swarm Intelligence, and Cooperative Protocols

    • 4 Performance Evaluation Metrics of Routing Protocols

    • 5 Future Enhancement

    • 6 Conclusion

    • References

  • Intelligent Machine Learning Approach for CIDS—Cloud Intrusion Detection System

    • 1 Introduction

    • 2 Background and Related Work

    • 3 Proposed Methodology

      • 3.1 Data Collection

      • 3.2 Preprocessing of the Dataset

      • 3.3 Intelligent Agent Based Feature Reduction Method

      • 3.4 Proposed Cloud Intrusion Detection System

    • 4 Results and Discussions

      • 4.1 Performance Analysis

    • 5 Conclusion

    • References

  • In-network Data Aggregation Techniques for Wireless Sensor Networks: A Survey

    • 1 Introduction

    • 2 Data Aggregation

    • 3 Taxonomy on Data Aggregation

      • 3.1 Centralized Aggregation Technique

      • 3.2 Tree-Based Aggregation Technique

      • 3.3 Cluster-Based Aggregation Technique

      • 3.4 In-network Aggregation Technique

    • 4 In-network Aggregation

      • 4.1 Routing Protocols

    • 5 Types of In-network Processing

      • 5.1 Sensor Fusion

      • 5.2 Sensor Compression

      • 5.3 Sensor Filtering

      • 5.4 Sensor Elimination

    • 6 Algorithms of In-network Aggregation

    • 7 Parameters for Analyzing In-network Aggregation

    • 8 Comparison on In-network Data Aggregation Algorithms

    • 9 Conclusion

    • References

  • Comparative Analysis of Traffic and Congestion in Software-Defined Networks

    • 1 Introduction

      • 1.1 Concept of SDN

      • 1.2 SDN Over Traditional Networks

    • 2 Areas of Study

      • 2.1 Traffic Classification

      • 2.2 Congestion Prediction

    • 3 Algorithmic Analysis

      • 3.1 Machine Learning

      • 3.2 Neural Networks

    • 4 Methodology

      • 4.1 SDN Simulation

      • 4.2 Application of Machine Learning

    • 5 Results and Analysis

      • 5.1 Traffic Classification

      • 5.2 Congestion Prediction

    • 6 Conclusion and Future Scope

    • References

  • A Comparative Analysis on Sensor-Based Human Activity Recognition Using Various Deep Learning Techniques

    • 1 Introduction

    • 2 Related Work

      • 2.1 Convolutional Neural Networks in HAR:

      • 2.2 Long Short-Term Memory (LSTM) in HAR

      • 2.3 Extreme Gradient Boosting in HAR

      • 2.4 Multilayer Perceptron in HAR

    • 3 Proposed System

      • 3.1 Convolutional Neural Network

      • 3.2 Long Short-Term Memory

      • 3.3 Extreme Gradient Boosting

      • 3.4 Multilayer Perceptron

      • 3.5 MHEALTH Dataset

    • 4 Result and Performance Analysis

      • 4.1 Accuracy and Loss Results

    • 5 Conclusion and Future Enhancement

    • References

  • FETE: Feedback-Enabled Throughput Evaluation for MIMO Emulated Over 5G Networks

    • 1 Introduction

    • 2 Background

    • 3 Methodology

      • 3.1 Dataset Description

      • 3.2 Exploration and Extrapolation

      • 3.3 Analytical Model

      • 3.4 Signal Continuity

    • 4 Feedback-Enabled Throughput Evaluatıon

      • 4.1 System Informatıon

      • 4.2 Throughput Calculatıon

      • 4.3 Improved Throughput Using MIMO

    • 5 Evaluatıon and Results

    • 6 Conclusion

    • References

  • Automatic Vehicle Service Monitoring and Tracking System Using IoT and Machine Learning

    • 1 Introduction

    • 2 Literature Survey

    • 3 Proposed Framework

      • 3.1 System Design

      • 3.2 Implementation

    • 4 Results

    • 5 Conclusions

    • References

  • Machine Learning-Based Application to Detect Pepper Leaf Diseases Using HistGradientBoosting Classifier with Fused HOG and LBP Features

    • 1 Introduction

    • 2 Related Work

    • 3 Proposed Methodology

      • 3.1 Data Preprocessing

      • 3.2 Feature Extraction

      • 3.3 Dimensionality Reduction

      • 3.4 Classification

    • 4 Experimental Results

      • 4.1 Pepper Leaf Disease Dataset

      • 4.2 Performance Evaluation Measures

      • 4.3 Result Analysis

    • 5 Conclusion

    • References

  • Efficacy of Indian Government Welfare Schemes Using Aspect-Based Sentimental Analysis

    • 1 Introduction

    • 2 Related Work

    • 3 Methodology

    • 4 Results and Discussion

    • 5 Conclusion

    • References

  • Author Index

Nội dung

Lecture Notes on Data Engineering and Communications Technologies 66 A Pasumpon Pandian Xavier Fernando Syed Mohammed Shamsul Islam   Editors Computer Networks, Big Data and IoT Proceedings of ICCBI 2020 Lecture Notes on Data Engineering and Communications Technologies Volume 66 Series Editor Fatos Xhafa, Technical University of Catalonia, Barcelona, Spain The aim of the book series is to present cutting edge engineering approaches to data technologies and communications It will publish latest advances on the engineering task of building and deploying distributed, scalable and reliable data infrastructures and communication systems The series will have a prominent applied focus on data technologies and communications with aim to promote the bridging from fundamental research on data science and networking to data engineering and communications that lead to industry products, business knowledge and standardisation Indexed by SCOPUS, INSPEC, EI Compendex All books published in the series are submitted for consideration in Web of Science More information about this series at http://www.springer.com/series/15362 A Pasumpon Pandian · Xavier Fernando · Syed Mohammed Shamsul Islam Editors Computer Networks, Big Data and IoT Proceedings of ICCBI 2020 Editors A Pasumpon Pandian Department of CSE KGiSL Institute of Technology Coimbatore, India Xavier Fernando Department of Electrical and Computer Engineering Ryerson University Toronto, ON, Canada Syed Mohammed Shamsul Islam Edith Cowan University (ECU) Joondalup, WA, Australia ISSN 2367-4512 ISSN 2367-4520 (electronic) Lecture Notes on Data Engineering and Communications Technologies ISBN 978-981-16-0964-0 ISBN 978-981-16-0965-7 (eBook) https://doi.org/10.1007/978-981-16-0965-7 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021 This work is subject to copyright All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore We are honored to dedicate the proceedings of ICCBI 2020 to all the participants and editors of ICCBI 2020 Foreword It is with deep satisfaction that I write this Foreword to the proceedings of ICCBI 2020 held in Vaigai College of Engineering, Madurai, Tamil Nadu, on December 15–16, 2020 This conference was bringing together researchers, academics and professionals from all over the world, and experts in computer networks, big data and Internet of things This conference particularly encouraged the interaction of research students and developing academics with the more established academic community in an informal setting to present and to discuss new and current work The papers contributed the most recent scientific knowledge known in the field of computer networks, big data and Internet of things Their contributions helped to make the conference as outstanding as it has been The local organizing committee members and their helpers put much effort into ensuring the success of the day-to-day operation of the meeting We hope that this program will further stimulate research in data communication and computer networks, Internet of things, wireless communication, big data and cloud computing and also provide practitioners with better techniques, algorithms, and tools for deployment We feel honored and privileged to serve the best recent developments to you through this exciting program We thank all the guest editors, authors and participants for their contributions Dr P Sugumaran Conference Chair, ICCBI 2020 vii Preface This conference proceedings volume contains the written versions of most of the contributions presented during the conference of ICCBI 2020 The conference provided a setting for discussing recent developments in a wide variety of topics including computer networks, big data and Internet of things The conference has been a good opportunity for participants coming from various destinations to present and discuss topics in their respective research areas This conference tends to collect the latest research results and applications on computer networks, big data and Internet of things It includes a selection of 74 papers from 248 papers submitted to the conference from universities and industries all over the world All of accepted papers were subjected to strict peer-reviewing by 2–4 expert referees The papers have been selected for this volume because of quality and the relevance to the conference We would like to express our sincere appreciation to all the authors for their contributions to this book We would like to extend our thanks to all the referees for their constructive comments on all papers; especially, we would like to thank the organizing committee for their hard work Finally, we would like to thank the Springer publications for producing this volume Coimbatore, India Toronto, Canada Joondalup, Australia Dr A Pasumpon Pandian Dr Xavier Fernando Dr Syed Mohammed Shamsul Islam ix Acknowledgements ICCBI 2020 would like to acknowledge the excellent work of our conference organizing the committee and keynote speakers for their presentation on December 15– 16, 2020 The organizers also wish to acknowledge publicly the valuable services provided by the reviewers On behalf of the editors, organizers, authors and readers of this conference, we wish to thank the keynote speakers and the reviewers for their time, hard work and dedication to this conference The organizers wish to acknowledge Dr R Saravanan, Dr R Thiruchenthuran, Thiru S Kamalakannan, Thiru S Balasubramanian and Thiru S Singaravelan, for the discussion, suggestion and cooperation to organize the keynote speakers of this conference The organizers also wish to acknowledge speakers and participants who attend this conference Many thanks are given to all persons who help and support this conference ICCBI 2020 would like to acknowledge the contribution made to the organization by its many volunteers Members contribute their time, energy and knowledge at a local, regional and international level We also thank all the chair persons and conference committee members for their support xi Contents Maximizing Network Lifetime in WSN Using Ant Colony Algorıthm M D Saranya, G Pradeepkumar, J L Mazher Iqbal, B Maruthi Shankar, and K S Tamilselvan Deep Ensemble Approach for Question Answer System K P Moholkar and S H Patil 15 Information Sharing Over Social Media Analysis Using Centrality Measure K P Ashvitha, B Akshaya, S Thilagavathi, and M Rajendiran 25 AndroHealthCheck: A Malware Detection System for Android Using Machine Learning Prerna Agrawal and Bhushan Trivedi 35 Use of Machine Learning Services in Cloud Chandrashekhar S Pawar, Amit Ganatra, Amit Nayak, Dipak Ramoliya, and Rajesh Patel 43 An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT V Ramesh and C Suresh Kumar 53 Metaheuristic-Enabled Shortest Path Selection for IoT-Based Wireless Sensor Network Subramonian Krishna Sarma 71 Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud–Edge Environment Miodrag Zivkovic, Timea Bezdan, Ivana Strumberger, Nebojsa Bacanin, and K Venkatachalam 87 xiii 976 M B Devi and K Amarendra Table Performance of ML algorithms with LBP features Model Accuracy Precision Recall F1 LR 80.24 80 80 80 Naïve Bayes 67.74 69 68 68 Decision tree 72.58 73 73 73 SVM—linear 81.05 81 81 81 SVM—RBF 81.85 82 82 82 HGB 83.87 84 84 84 Table Performance of ML algorithms with HOG features Model Accuracy Precision Recall F1 LR 73.39 73 73 73 Naïve Bayes 76.21 76 76 76 Decision tree 62.5 62 62 62 SVM—linear 77.98 79 78 79 SVM—RBF 84.27 84 84 84 HGB 85.47 85 85 85 Recall F1 Table Performance of ML algorithms with LBP features Model Accuracy Precision LR 79.44 79 79 79 Naïve Bayes 82.26 82 82 82 Decision tree 77.02 77 77 77 SVM—linear 80.24 80 80 80 SVM—RBF 83.47 83 83 83 HGB 84.27 84 84 84 From previous experiments, it is clear that after applying PCA, there is a significant improvement in the performance of classification models with both, HOG and LBP features HGB classifier followed the same trend and outperformed other classification models with both HOG and LBP features after applying PCA Even after reduced dimension, there is a significant improvement in all measures used to test the efficiency of models 4.3.3 Experiments with Fused Features of HOG and LBP This experiment is conducted to check the performance of ML models with composite representation obtained after blending LBP features with HOG features Machine Learning-Based Application to Detect Pepper Leaf … 977 Table Performance of ML algorithms with fused HOG and LBP features Model Accuracy Precision Recall F1 LR 80.24 80 80 80 Naïve Bayes 75.81 76 76 76 Decision tree 69.35 70 69 69 SVM—linear 81.05 81 81 81 SVM—RBF 88.71 89 89 89 HGB 89.11 89 89 89 From Table 5, it is clear that the HGB classifier trained on fused feature descriptor obtained 89.11% accuracy which is highest when compared with the performance of the same classifier trained on HOG and LBP features before and after applying PCA So, it can be concluded that fused texture representations of pepper leaf images help to identify diseases accurately rather than using conventional usage of LBP and HOG features Conclusion Pepper is the most recently used ingredient in dishes Identifying pepper leaf diseases is a challenge for farmers There is a high requirement to automate the process of detecting pepper leaf diseased for correct usage of pesticides and reduce the loss of yield In this paper, the performance of various classification models along with two different types texture-based features was investigated During our experiments, it can be observed that models can perform well with reduced representations of HOG and LBP features rather than using them directly The fused representation of HOG and LBP features helped the models to perform well, and there is a 4% improvement in accuracy with fused features In our experiments, it can also be observed that the HGB classifier outperforms other ML algorithms in every case References Husin ZB, Aziz AHBA, Shakaff AYBM, Farook RBSM (2012) Feasibility study on plant chili disease detection using image processing techniques In: IEEE 3rd international conference on intelligent system modeling and simulation ISMS, Kota Kinabalu, pp 291–296 Balakrishna G, Moparthi NR (2020) Study report on indian agriculture with IoT Int J Electr Comput Eng 10(3):2322 Barbedo JGA (2016) A review on the main challenges in automatic plant disease identification based on visible range images Biosyst Eng 144:52–60 Mannepalli K, Sastry PN, Suman M (2017) Accent recognition system using deep belief networks for Telugu speech signals Int J Speech Technol 19(1):87–93 978 M B Devi and K Amarendra Rajesh Kumar T, Suresh GR, Kanaga Suba Raja S (2018) Conversion of non audible murmur to normal speech based on full-rank Gaussian Mixture model J Comput Theoretical NanoSci 15(1):185–190 Mahapatra S, Kannoth S, Chiliveri R, Dhannawat R (2020) Plant leaf classification and disease recognition using SVM, a machine learning approach Sustain Humanosphere 16(1):1817– 1825 Ayushree, Balaji GN (2018) Comparative analysis of Coherent routing using machine learning approach in MANET Smart Comput Inform 731–741 Bhagat M, Kumar D, Haque I, Munda HS, Bhagat R (2020) Plant leaf disease classification using grid search based SVM In: 2nd international conference on data, engineering and applications (IDEA) IEEE, pp 1–6 Puri GD, Haritha D (2018) Framework to avoid similarity attack in big streaming data Int J Electr Comput Eng 8(5):2920–2925 10 Anjali Devi S, Siva Kumar S (2018) Comprehensive survey on sentiment analysis based on workflow foundation J Adv Res Dyn Control Syst 10(9 Special Issue):1189–1120 11 Rajesh Kumar T, Vamsidhar T, Harika B, Madan Kumar T, Nissy R (2019) Students performance prediction using data mining techniques IEEE Explorer (ICISS-2019) 978-1-53867798-8 12 Talasila V, Rajesh Kumar T, Sai CP, Satya Sai S, Ayyappa (2019) Predicting the risk of heart failure with EHR sequential data modelling Int J Recent Technol Eng (IJRTE) 6(7):458–461 2277-3878 13 Asfarian A, Herdiyeni Y, Rauf A, Mutaqin KM (2013) Paddy diseases identification with texture analysis using fractal descriptors based on Fourier spectrum In: IEEE international conference on computer, control, informatics and its applications IC3INA, Jakarta, pp 77–81 14 Bommadevara HSA, Sowmya Y, Pradeepini G (2019) Heart disease prediction using machine learning algorithms Int J Innov Technol Exploring Eng 8(5):270–272 15 Khirade SD, Patil AB (2015) Plant disease detection using image processing In: IEEE international conference on computing communication control and automation (ICCUBEA), pp 768–771 16 Rajesh Kumar T, Suresh GR, Kanaga Subaraja S, Karthikeyan C (2020) Taylor-AMS features and deep convolutional neural network for converting non-audible murmur to normal speech Comput Intell 1–24 17 Dudi B, Rajesh V (2018) An efficient algorithm for medicinal plant recognition Int J Pharm Res 10(3):87–93 18 Patil R, Kumar S (2020) Bibliometric survey on diagnosis of plant leaf diseases using artificial intelligence Int J Mod Agric 9(3):1111–1131 19 Dudi B, Rajesh V (2019) Medicinal plant recognition based on cnn and machine learning Int J Adv Trends Comput Sci Eng 8(4):628–631 20 Bodapati JD, Veeranjaneyulu N, Shareef SN, Hakak S, Bilal M, Maddikunta PKR, Jo O (2020) Blended multi-modal deep ConvNet features for diabetic retinopathy severity prediction Electronics 9(6):914 21 Dondeti, V, Bodapati JD, Shareef SN, Naralasetti V (2020) Deep convolution features in nonlinear embedding space for fundus image classification deep convolution features in non-linear embedding space for fundus image classification 22 Bodapati JD, Shaik NS, Naralasetti V, Mundukur NB (2020) Joint training of two-channel deep neural network for brain tumor classification Signal Image Video Process 1–8 23 Bodapati JD, Veeranjaneyulu N, Shaik S (2019) Sentiment analysis from movie reviews using LSTMs Ingénierie Des Systèmes D Inf 24(1):125–129 24 Trivedi J, Shamnani Y, Gajjar R (2020) Plant leaf disease detection using machine learning In: International conference on emerging technology trends in electronics communication and networking Springer, Singapore, pp 267–276 25 Inthiyaz S, Prasad MVD, Lakshmi RUS, Sai NS, Kumar PP, Ahammad SH (2019) Agriculture based plant leaf health assessment tool: a deep learning perspective Int J Emerg Trends Eng Res 7(11):690–694 Machine Learning-Based Application to Detect Pepper Leaf … 979 26 Anila M, Pradeepini G (2017) Study of prediction algorithms for selecting appropriate classifier in machine learning J Adv Res Dyn Control Syst 9(Special Issue 18):257–268 27 Waghmare H, Kokare R, Dandawate Y (2016, February) Detection and classification of diseases of grape plant using opposite colour local binary pattern feature and machine learning for automated decision support system In: 2016 3rd international conference on signal processing and integrated networks (SPIN) IEEE, pp 513–518 28 Shariff MN, Saisambasivarao B, Vishvak T, Rajesh Kumar T (2017) Biometric user identity verification using speech recognition based on ANN/HMM J Adv Res Dyn Control Syst 9(12 Special issue):1739–1748 Efficacy of Indian Government Welfare Schemes Using Aspect-Based Sentimental Analysis Maninder Kaur, Akshay Girdhar, and Inderjeet Singh Abstract One of the simplest methods to understand people’s thoughts using images or text is commonly given as sentiment analysis Sentiment analysis is used mostly in products advertisement and promotion depends on the user’s opinion The process is based on the aspect-based sentiment analysis and it is used to understand and find out what someone is speaking about, and likeness and dislikeness One of the real-world models of the perfect realm of this subject is the huge number of available Indian welfare plans like Swachh Bharat Abhiyan and Jan Dhan Yojna In this paper, labeled data is used on the basis of polarity Tweets are preprocessed and unigram features are then extracted In the initial steps, tokenization process, stop word removal process, and stemming process are performed as preprocessing to remove duplicate data The unigram features and labels trained by support vector machine (SVM), K-nearest neighbor (KNN), and a combination of SVM, KNN, and random forest as a proposed model are used in the presented work Implementation of experimental proposed approach demonstrates that better results in accuracy and precision than SVM and KNN Keywords Sentiment analysis · Aspect · Support vector machine · K-nearest neighbor M Kaur (B) Department of Computer Science and Engineering, Guru Nanak Dev Engineering College, Ludhiana, India A Girdhar Department of Information Technology, Guru Nanak Dev Engineering College, Ludhiana, India e-mail: akshay_girdhar@gndec.ac.in I Singh Information Technology, Govt Polytechnic College, Bathinda, India © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021 A Pasumpon Pandian et al (eds.), Computer Networks, Big Data and IoT, Lecture Notes on Data Engineering and Communications Technologies 66, https://doi.org/10.1007/978-981-16-0965-7_74 981 982 M Kaur et al Introduction In natural language processing, sentiment analysis is considered as most significant tool because it opens up numerous possibilities to understand people’s sentiments on different topics The purpose of an aspect-based sentiment analysis is to detect the features of the particular entity The positive and negative aspects of a particular topic can be analyzed through aspect-based sentiment analysis [1] In this research paper, aspect-based sentiment analysis (ASBA) is implemented on the tweets of the government welfare schemes This type of analysis is mainly domain specific The government has launched the various welfare schemes for schools, states, as well as center The given outlines progress in collaboration with center and state governments The welfare schemes have been mostly introduced to develop the weaker and minority section of the society [2] Many schemes are launched but in this research work is on Swachh Bharat Abhiyan and Jan Dhan Yojna These schemes empower every Indian by helping them financially and providing the basic facilities [3] A Two Types of Sentiment Analysis Document Level: If the analysis is performed using documents to identify the positive and negative view of the single entity, then it is document level analysis [4] Comparative: In many cases, users express their views by comparing with the similar product or entity The main goal is to identify the opinion from the comparative sentence [4] The research work is structured as follows: Related works are presented in Sect 2, proposed model is presented in Sect 3, results and its discussions are presented in Sect 4, and finally, conclusion is presented in Sect Related Work Various approaches proposed by the researchers for sentiment analysis are presented in this section Shidaganti et al [5] presented a technique that used data mining along with machine learning as a combination process Clustering is done by using k-means clustering and hierarchical clustering approach This approach helps to analyze the data of different organizations which helps in understanding the thoughts and opinions related to the product Rout et al [6] presented the way to deal with unstructured data of social media like blogs, Twitter for sentiment and emotion analysis The supervised and unsupervised approaches are performed on different databases The unsupervised approach was used for automatic identification of sentiments for the tweets The sentiment identification is done by using maximum entropy, multinomial Naïve Bayes, and support vector machine classifier This approach also works well if it will apply on the larger dataset in future Mumtaz et al [7] presented an approach which is a combination of lexical-based approach and machine learning In this proposed work, hybrid approach was used, which gave high accuracy than Efficacy of Indian Government Welfare Schemes Using Aspect … 983 the classical lexical method and provides the enhanced redundancy than learning approach Natural language processing to extract sentiments from texts is performed in the approach Al-Smadi et al [8] worked on aspect-based sentiment analysis to review the hotels in Arabic Long short-term memory (LSTM) neural networks are used in the research model and it was implemented in two levels that are character level and aspect based with random field classifier and polarity classification based Chen et al [9] presented a visualization approach called Tag Net which is used for sentiment analysis This approach combines the improved node-link diagrams with tag clouds to obtain heterogeneous time varying information Large datasets scalability is improved using the proposed algorithm Fouad et al [10] presented a model for Twitter sentiment analysis which describes the tweet is positive or negative by using the concept of machine learning The presented work uses different methods to label the input in the training phase using different datasets The classification is also done by using different classifiers to compare their performances The concept of feature selection and information gain is used in this work Jones et al [11] focused on the implication of PMJDY scheme for the development all over India The main aim of scheme was to make India digitized, even the rural areas are conscious about their bank accounts to obtain government offering benefits directly Demonetization of currency and all these measures lead toward the progress in the structure of Indian economy This scheme ensures the better quality of life in the country and helps improve the living status of the people India is the only nation where 50% of people are in the working age group Khan et al [12] focused on the challenges that Twitter information faces, concentrating on order issues, and afterward consider these streams for supposition mining and sentiment analysis To manage gushing unequal classes, the sliding window Kappa measurement for assessment in time-changing information streams was used Utilizing this measurement an investigation is performed on Twitter information for utilizing learning calculations for information streams Greica et al [13] presented an analytic model which performs aspect classification, separation and polarity classification for analysis The testing of domain aspect and sentiment classification is performed on the multilingual SemEval dataset Pham et al [14] presented the multilayer architecture for representing customer review It extracts the views for product from the sentiment aspects and sentences related to review The multilayer architecture represents the different level of sentiments for input text This model is integrated with neural network for prediction of overall ratings of the product Rathan et al [15] worked on the review of mobile phones by using the tweets In this lexicon-based approach is used for data labeling and this improves the classification process The support vector machine classifier classifies the tweets with efficient accuracy level Kim et al [16] worked on the co-occurrence of data by using supervised and unsupervised methods A framework is used for processing texts reviews This work also finds the aspect categories according to review sentences and provides effective outcomes from the F-score Pannala et al [17] presented the existing work for the opinion mining that was done on the word level, not on the sentence level The work was done on the trained dataset In this author presents the combination of natural language (NL) and machine learning (ML) model to process the dataset which has 1654 aspects in the 984 M Kaur et al training dataset with different category annotations and 845 aspects in the test dataset with different category annotations for analysis The performance of software is measured by SVM and logistics regression algorithm Previously, work was done on the static parameters which reduce the effective learning of tweets according to its label The nonparametric approach uses number of coefficient parameters those increase the over fitting In proposed paper, the hyperparameters are used which reduces the adaptive features of learning The analysis is on the combined performance of parametric (SVM), nonparametric (KNN), and the random forest is used Methodology The data is collected for the experiment from Twitter and stored in a database for preprocessing After the preprocessing on the feature label, the processed data is learned by KNN, SVM, and proposed model which is the combination of (KNN, SVM, random forest) these By these respective models, tweets are predicted and classified, respectively The below-given section describes the proposed methodology of the model and the techniques used in this work in detail The pictorial representation of the proposed model is presented in Fig Step 1: Collection of data The proposed model used the data collected from the Twitter, regarding government welfare schemes as input People get easy access to financial and banking services due to Jan Dhan Yojna of government welfare schemes and the main aim of Swachh Bharat Abhiyan is to keep India clean [18]; tweets regarding both the scheme have been used to determine the public review based on aspect-based sentiment analysis The data that retrieved from the social media is in unstructured form due to intensive information Step 2: Data Storing and fetching The retrieved tweets are put in storage as csv files, and it is fetched using a Python tool PyCharm [19] Around 3000 tweets are stored for the purpose of training and testing the datasets Data mining algorithm (SVM, KNN, and hybrid SVM-KNN) is utilized to train and test the fetched tweets Step 3: Preprocessing The redundant and noise contents are removed in preprocessing step which makes the data suitable for training process [20] Data cleaning is performed based on the following steps (i) (ii) (iii) All the uppercase is converted to lowercase Remove all the Internet slangs from the data Removing all the stopping words from the list Efficacy of Indian Government Welfare Schemes Using Aspect … 985 Fig Proposed framework process flow (iv) (v) (vi) Eliminating all the additional white spaces Compress the duplicate words All the hashtags are removed but the hashtags texts are selected Step 4: Classification using data mining techniques Classification is performed using data mining techniques to categorize the data into various aspects such as First aspect: increase fund/decrease fund Second aspect: improvement in growth/not growth/growth Third aspect: goes really fast/works/hard fix Fourth aspect: incredible/good/not good On the basis of these parameters, the data is trained and tested Machine learning models are trained using the training datasets In the proposed framework, training data is implemented for classification, then testing dataset is prepared that is not before used in the proposed model for training 986 M Kaur et al Step 5: Optimize the classification results The classification results are need to be checked to confirm whether the learning models training datasets follow the defined rules or not This process is performed to obtain accurate and error-free results Python is used to train and test the proposed KNN-SVM random forest model The tweets nature is predicted as optimal value based on the classification results Results and Discussion The proposed model classification performance is evaluated and compared with conventional approaches to validate the better performance The experiment result validation is done by using fivefold and tenfold validation approach The data is divided into k subsets in cross validation which has equal size and the training process and testing process are repeated for k-times Every time one group of subset will be used for testing of data and other k-1 subsets of data will be treated as training data The result analysis is done on SVM, KNN, and the combination of proposed model (SVM, KNN and random forest algorithm) The parameters used in this for analysis process are accuracy, precision, recall, and F-measure The classification accuracy of all the three models is depicted in Fig It is observed that the proposed shows the maximum accuracy in both fold testing process KNN obtains the least accuracy performance of 49.23%, 51.23%, respectively, for both processes The precision analysis for proposed model and conventional SVM and KNN model is depicted in Fig The proposed algorithm shows the maximum precision and KNN obtains minimum precision 50.23, 51.23 in fivefold and tenfold validation process, respectively (Fig 4) The overall performance of all the classifiers is presented in figure It is observed that the proposed model (KNN-SVM-random forest) shows the optimum, enhanced results with 82% in comparison with the SVM and KNN Accuracy (%) Fig Accuracy comparison 80 70 60 50 40 30 20 10 SVM KNN Proposed Mode 5-Fold 10-Fold Folds Efficacy of Indian Government Welfare Schemes Using Aspect … Fig Precision analysis 987 Precision 100 80 SVM 60 KNN 40 Proposed Model 20 5-Fold 10-Fold Folds Values Fig Overall performance comparison 90 80 70 60 50 40 30 20 10 Accuracy Precision Recall F-Measure Classifiers Conclusion A hybrid classifier is presented in this research work as sentiment analysis model The proposed hybrid model obtains better results by utilizing part-of-speech (POS) tags and word dependencies for aspect-based sentiment analysis Efficacy of government welfare schemes using the proposed model is computed 82% under the restricted environment In future work, improvement in the accuracy will be considered by reducing the feature sparsely by divergence and optimization approaches, improve the classifier by deep learning approaches Additionally, other tasks that are Aspect Based Sentiment analysis also tested on the applicability on best of learning and concerns with the integration of POS tags, word dependencies, and possibly other NLP tools 988 M Kaur et al References Perikos I, Hatzily geroudis I (2017) Aspect based sentiment analysis in social media with classifier ensembles In: 2017 IEEE/ACIS 16th international conference on computer and information science (ICIS), Wuhan, China, pp 273–278 Tiwari SK (2014) To study awareness of a national mission: Swachh Bharat: Swachh Vidyalaya in the middle school student of private and public schools Paripex-Indian J Res 3(12):23–24 Barhate GH, Jagtap VR (2014) Pradhan Mantri Jan Dhan Yojana: national mission on financial inclusion Indian J Appl Res 4(12):340–342 Lin Y, Zhang J, Wang X, Zhou A (2012) An information theoretic approach to sentiment polarity classification In: Proceedings of the 2nd joint WICOW/AIRWeb workshop on web quality, Lyon,France, 2012, pp 35–40 Shidaganti G, Hulkund RG, Prakash S (2017) Analysis and exploitation of Twitter data using machine learning techniques In International proceedings on advances in soft computing, intelligent systems and applications, pp 135–146 Rout JK et al (2018) A model for sentiment and emotion analysis of unstructured social media text Electr Commerce Res 18(1):181–199 Mumtaz D, Ahuja B (2017) A lexical and machine learning-based hybrid system for sentiment analysis In: Studies in computational intelligence Springer, Singapore (Chap 11, pp 165–175) Al-Smadi M, Talafha B, Al-Ayyoub M, Yaser J (2018) Using long short-term memory deep neural networks for aspect-based sentiment analysis of Arabic reviews Int J Mach Learn Cybern 1–13 Chen Y (2018) TagNet: toward tag-based sentiment analysis of large social media data In: 2018 IEEE Pacific visualization symposium (PacificVis), Kobe, Japan, pp 190–194 10 Fouad Mohammed M, Gharib Tarek F, Mashat Abdulfattah S (2018) Efficient Twitter sentiment analysis system with feature selection and classifier ensemble In: International conference on advanced machine learning technologies and applications, vol 723, pp 516–527 11 Mary Jones T, DivyaSri S, Bavani G (2017) A study on the implications of Pradhan Manthri Jan Dhan Yojana on the growth of indian economy IRA-Int J Manag Soc Sci 6(3):461–466 12 Khan FH, Bashir S, Qamar U (2014) TOM: Twitter opinion mining framework using hybrid classification scheme Decis Support Syst 57:245–257 13 García-Pablos A, Cuadros M, Rigau G (2018) W2VLDA: almost unsupervised system for aspect based sentiment analysis Expert Syst Appl 91:127–137 14 Pham D-H, Le AX (2018) Learning multiple layers of knowledge representation for aspect based sentiment analysis Data Knowl Eng 114:26–39 15 Rathan M, Hulipalled VR, Venugopal KR, Patnaik LM (2018) Consumer insight mining: aspect based Twitter opinion mining of mobile phone reviews Appl Soft Comput 68:765–773 16 Schouten K, van der Wejide O, Frasincar F, Dekker R (2018) Supervised and unsupervised aspect category detection for sentiment analysis with co-occurrence data IEEE Trans Cybern 48(4):1263–1275 17 Pannala NU, Nawarathna CP, Jayakody JTK, Rupasinghe L, Krishnadeva K (2017) Supervised learning based approach to aspect based sentiment analysis In: 2016 IEEE international conference on computer and information technology (CIT), Nadi, Fiji, pp 662–666 18 Thakkar P (2015) Swachh Bharat [CLEAN INDIA] Mission—an analytical study Renew Res J 3(2):168–173 19 Massiris MM, Dennehy BR, Delrieux CA, Thomsen FSL (2017) Python implementation of local intervoxel-texture operators in neuroimaging using Anaconda and 3D Slicer environments In: 2017 XLIII Latin American Computer Conference (CLEI), Cordoba, Argentina, pp 1–3 20 Dwivedi SK, Rawat B (2016) A review paper on data preprocessing: a critical phase in web usage mining process In: 2015 international conference on green computing and Internet of Things (ICGCIoT), Noida, India, pp 506–510 Author Index A Abdow, Hassan I., 827 Acharya, Arup A., 497 Advaith, U., 319 Agarwal, Devansh, 407 Agarwal, Piyush, 709 Agarwal, Vartika, 709 Agrawal, Prerna, 35 Agrawal, Srishti, 541 Ahmad, Mobin, 717 Akshaya, B., 25 Alam, Md Raiyan, 753 Alen, S., 319 AlOsail, Deemah, 305 Amarendra, K., 969 Amino, Noora, 305 Amrutha, A., 939 Ansari, Akbar, 369 Anto Praveena, MD, 697 Arappali, Nedumaran, 459 Arefin, Md Taslim, 753 Aruna, S., 785 Ashvitha, K P., 25 B Bacanin, Nebojsa, 87 Balaji, I., 939 Bandi, Ajay, 651 Barani Sundaram, B., 459 Baskaran, C., 177 Bezdan, Timea, 87 C Chandrasekar, M., 103 Charniya, Nadir N., 839 Cherian, Mimi, 673 Cherwoo, Sameer, 907 Chettri, Sarat Kr., 115 Chitra, S., 227 Christy, A., 697 D Daniel, Ravuri, 217 Darshini, P., 251 Debnath, Dipankar, 115 Deshmukh, Anand B., 395 Devi, Matta Bharathi, 969 Dhanalakshmi, R., 193, 205 Dhanya, V G., 193 Dongre, Nilima M., 483 Dubey, Nilesh, 635 Dudul, Sanjay V., 395 Durga Bhavani, S., 161 E Elamaran, V., 103 Evan, Nawshad Ahmad, 753 G Gabhane, Jyotsna P., 329 Ganatra, Amit, 43, 635 Gandhi, Rishi Kumar, 557 Girdhar, Akshay, 981 Gowtham, Veldi Pream Sai, 277 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd 2021 A Pasumpon Pandian et al (eds.), Computer Networks, Big Data and IoT, Lecture Notes on Data Engineering and Communications Technologies 66, https://doi.org/10.1007/978-981-16-0965-7 989 990 Gummadi, Jose Moses, 217 Gupta, Lavanya, 541 H Haldorai, Anandakumar, 261 Herbert Raj, P., 287, 735 Hussain, Aquib, 369 I Ilavarsan, E., 851 Indumathi, V., 919 J Jacob, Minu Susan, 193 Jagadeesha, S N., 251 Janghel, Rekh Ram, 507 Jayalakshmi, V., 227 John, Jisha, 319 Johnson, Joveal K., 319 Joies, Kesia Mary, 319 K Kalra, Nidhi, 541 Kanade, Vijay A., 627 Karthika, P., 459 Karunananda, Asoka, 443 Kaur, Maninder, 981 Khanduja, Namit, 369 Khot, Jayanth, 939 Kiruthiga, T., 887 Krishna, Akhila, 507 Krishna Mohan, A., 217, 469 Krishnan, Shoba, 839 Krishna Raghavendra, Adapa V., 277 Kumar, Amit, 369 Kumar, Pankaj, 143 Kumar, T G Keerthan, 953 L Ladvaiya, Nikunj, 585 Lahari, Garapati Khyathi, 277 Laxmi Lydia, E., 217, 469 Lingamgunta, Sumalatha, 217, 469 M Madhusudhana Rao, T V., 469 Maheshwari, Sumit, 939 Malik, Monica, 379 Author Index Mallaiah, Kurra, 557 Manavalan, R., 351 Mandpura, Anup K., 827 Manikandan, C., 103 Maruthi Shankar, B., Mazher Iqbal, J L., Meena, K., 813 Mehta, Jigar, 585 Mekonnen, Melaku Tamene, 459 Mohammad, Nazeeruddin, 305 Mohammed, Moulana, 277 Mohana Kumar, S., 251 Mohankumar, N., 613 Mohanty, Sanjukta, 497 Mohapatra, Sunil K., 497 Moholkar, K P., 15 Muneeswari, G., 873 N Naaz, Sameena, 379 Nafis, Md Tabrez, 717 Naik, S., 939 Naveen, 369 Nayak, Amit, 43, 635 Nukapeyi, Sharmili, 217 P Padma Sree, L., 161 Pakhare, Piyusha Sanjay, 839 Pandya, Vidhi, 585 Parihar, Anil Singh, 771, 907 Parveen, M., 797 Patel, Gaurang, 635 Patel, Rajesh, 43 Pathak, Sunil, 329 Patil, S H., 15 Paul, Rosebell, 519 Pawar, Chandrashekhar S., 43 Pedipina, Seenaiah, 205 Pimple, Kshitij U., 483 Pitchaipandi, P., 177 Polara, Vishal, 131 Poovammal, E., 423 Prabakeran, S., 919 Pradeepa, K., 797 Pradeepkumar, G., Prasad, Krishna, 251 Praveenkumar, B., 939 R Rai, Gaurav, 369 Author Index Rajagopalan, S., 297, 663 Rajakumar, R., 743 Rajalakshmi, D., 813 Rajendiran, M., 25 Raju, N., 103 Ramachandram, S., 557 Ramesh, J., 351 Ramesh, V., 53 Ram, G Mohan, 851 Ramoliya, Dipak, 43 Ramu, Arulmurugan, 261 Rathod, Jagdish M., 131 Ravikumar, Aswathy, 319 Rejimol Robinson, R R., 685 S Sahu, Laki, 497 Sahu, Satya prakash, 507 Sai Prasanna, A., 613 Sai Siva Satwik, K., 103 Sankar, S., 205 Saranya, M D., Sarma, Subramonian Krishna, 71 Sasanka, J., 785 Sathiya Devi, S., 743 Sebastian, Neenu, 519 Sengupta, Aritro, 143 Seraphim, B Ida, 423 Shanmugasundaram, N., 887 Sharma, Sachin, 709 Sharma, Seemu, 541 Sharma, Vivek, 953 Shekokar, Narendra, 407 Sheth, Richa, 407 Silva, Thushari, 443 Singh, Amit, 143 Singh, Bikesh Kumar, 507 Singh, Deepak, 601 Singh, Inderjeet, 981 Singh, Paramvir, 907 Singh, Yogendra Narain, 239 Sinha, Kunal, 907 Sowmya, T., 873 Srikanth, M S., 953 Srinivas, P V V S., 277 Srivastava, Mayank, 643 991 Srivastava, Sonam, 239 Strumberger, Ivana, 87 Suganya, S., 939 Suji Helen, L., 697 Sunil, Rahul, 319 Suresh Kumar, C., 53 T Tamilselvan, K S., Tefera, Wondatir Teka, 459 Tejeswini, J., 613 Thakare, Nita M., 329 Thilagavathi, S., 25 Thomas, Ciza, 685 Tiwari, Nandana, 771 Trivedi, Bhushan, 35 U Uddin, Md Raihan, 753 Uganya, G., 813 Urooj, Aksa, 717 V Vaithyasubramanian, S., 697 Vanamala, Sunitha, 161 Varma, Neha, 541 Venkatachalam, K., 87 Verma, Satishkumar, 673 Verma, Vipasha, 541 Vidanagama, Dushyanthi Udeshika, 443 Vijaya Kumar, K., 469 Vijayaraj, N., 813 Vinay, D A., 785 Vinod, Parvathy, 519 Y Yadav, Mukesh, 601 Yadukrishnan, P S., 519 Z Zivkovic, Miodrag, 87 ... 459 Nedumaran Arappali, Melaku Tamene Mekonnen, Wondatir Teka Tefera, B Barani Sundaram, and P Karthika Challenging Data Models and Data Confidentiality Through “Pay-As-You-Go” Approach Entity... Information Sharing Over Social Media Analysis Using Centrality Measure K P Ashvitha, B Akshaya, S Thilagavathi, and M Rajendiran Abstract Instagram and Twitter are popular social media in India... 177 C Baskaran and P Pitchaipandi Twitter-Based Disaster Management System Using Data Mining 193 V G Dhanya, Minu Susan Jacob, and R Dhanalakshmi Sentimental Analysis on Twitter Data of

Ngày đăng: 14/03/2022, 15:09

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN