Limit search to available items
Record 4 of 14
Previous Record Next Record
Book Cover
E-book
Author Intelligent Communication Technologies and Virtual Mobile Networks (2022 : Tamil Nadu, India)

Title Intelligent communication technologies and virtual mobile networks : proceedings of ICICV 2022 / G. Rajakumar, Ke-Lin Du, Chandrasekar Vuppalapati, Grigorios N. Beligiannis, editors
Published Singapore : Springer, [2023]
©2023

Copies

Description 1 online resource (xviii, 825 pages) : illustrations (chiefly color)
Series Lecture notes on data engineering and communications technologies, 2367-4520 ; volume 131
Lecture notes on data engineering and communications technologies ; v. 131. 2367-4520
Contents Intro -- Preface -- Acknowledgments -- Contents -- About the Editors -- Implementation of Machine and Deep Learning Algorithms for Intrusion Detection System -- 1 Introduction -- 2 Previous Research Works -- 3 Dataset -- 4 Proposed Methodology -- 4.1 Data Preprocessing -- 4.2 Feature Selection -- 4.3 Machine Learning -- 4.4 Deep Learning -- 4.5 Models -- 5 Evaluation of Models -- 6 Results and Discussion -- 7 Conclusion -- References -- Selection of a Rational Composition of İnformation Protection Means Using a Genetic Algorithm -- 1 Introduction -- 2 Literature Overview and Analysis -- 3 The Objectives and Aim of the Research -- 4 Models and Methods -- 4.1 Formulation of the Problem -- 4.2 Solution Example -- 5 Software Implementation of the Model and Computational Experiment -- 6 Discussion of the Results of the Computational Experiment -- 7 Conclusions -- References -- Classification of Breast Cancer Using CNN and Its Variant -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Image Preprocessing -- 3.2 Augmentation -- 3.3 Training and Testing the Model -- 3.4 DenseNet Architecture -- 4 Algorithms Used -- 4.1 Histogram Equalization Method -- 4.2 Adaptive Histogram Equalization -- 5 Performance Metrics -- 6 Experimental Setup -- 6.1 Dataset -- 6.2 Result and Discussion -- 7 Conclusion -- References -- Systematic Approach for Network Security Using Ethical Hacking Technique -- 1 Introduction -- 2 Penetration Testing -- 3 Algorithm -- 4 Proposed System -- 5 Result -- 6 Future Work -- 7 Conclusion -- References -- Analysis of Modulation Techniques for Short Range V2V Communication -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 BER Calculation for QPSK Modulation Technique -- 3.2 BER Calculation for BPSK Modulation Technique -- 3.3 Calculation of Spectral Efficiency of BPSK:
3.4 Determination of Spectral Efficiency of QPSK -- 4 Results and Discussion -- 5 Conclusion -- References -- Security Requirement Analysis of Blockchain-Based E-Voting Systems -- 1 Introduction -- 2 Fundamental Concepts -- 3 Related Work -- 4 Requirement Analysis -- 4.1 Functional Requirements (FR) -- 4.2 Nonfunctional Requirements (NFR) -- 4.3 Countermeasures on the Typical Attacks -- 4.4 Security and Privacy Requirements of Voting -- 5 Conclusion -- References -- OTP-Based Smart Door Opening System -- 1 Introduction -- 2 Literature Review -- 3 Existing Method -- 4 Proposed Method -- 4.1 Block Diagram -- 4.2 Flowchart -- 4.3 Arduino -- 4.4 LCD Display -- 4.5 Servomotor -- 4.6 Hardware Specifications -- 5 Result and Discussion -- 6 Conclusion -- References -- Tourist Spot Recognition Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Augmentation -- 3.3 Proposed Method -- 4 Result Analysis -- 5 Conclusion and Future Work -- References -- Heart Disease Predictive Analysis Using Association Rule Mining -- 1 Introduction -- 1.1 Risk Factors Causing Heart Disease -- 2 Literature -- 3 Proposed Method -- 3.1 Association Rule -- 4 Experimental Results -- 5 Conclusion -- References -- Cluster-Enabled Optimized Data Aggregation Technique for WSN -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Performance Evaluation -- 5 Conclusion -- References -- Recreating Poompuhar Ancient History Using Virtual Reality -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Technology Used -- 4.1 Blender -- 4.2 Unity3D -- 4.3 Image-Based Rendering -- 5 Results and Discussion -- 6 Conclusion -- References -- Dynamic Energy Efficient Load Balancing Approach in Fog Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Architecture -- 3.1 System Design and Model
4 Performance Evaluation Parameters -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- Sentiment Analysis Using CatBoost Algorithm on COVID-19 Tweets -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Counter Vectorizer -- 3.4 Classification of Tweets Using CatBoost Algorithm -- 4 Result Analysis -- 4.1 Results and Discussion for Multiclass Classification -- 4.2 Performing Binary Classification on the Dataset -- 5 Conclusion and Future Work -- References -- Analysis and Classification of Abusive Textual Content Detection in Online Social Media -- 1 Introduction -- 2 Defining Abusive Textual Content -- 2.1 Classification of Online Abusive Content -- 3 Approaches for Detecting Textual Abusive Content -- 4 Abusive Content in Social Media -- 5 Discussion -- 6 Conclusion and Future Scope -- References -- A Survey of Antipodal Vivaldi Antenna Structures for Current Communication Systems -- 1 Introduction -- 2 Antipodal Vivaldi Antennas-Performance Enhancement Techniques -- 3 Recently Proposed AVA Structures -- 3.1 UWB End-Fire Vivaldi Antenna with Low RCS Capability -- 3.2 Balanced Antipodal Vivaldi Antenna with Dielectric Director -- 3.3 High-Gain Antipodal Vivaldi Antenna Surrounded by Dielectric -- 3.4 Notched Band Vivaldi Antenna with High Selectivity -- 3.5 Fern Fractal Leaf Inspired Wideband Antipodal Vivaldi Antenna -- 3.6 Comparison of the AVA Structures in the Literature -- 4 Conclusion -- References -- Survey on Wideband MIMO Antenna Design for 5G Applications -- 1 Introduction -- 2 5G MIMO Antenna, Classifications and Its Performance Enhancement Techniques -- 2.1 MIMO Antenna -- 2.2 Suitable Antennas for 5G Applications -- 2.3 Antenna Performance Enhancement Techniques -- 3 MIMO Wideband Antennas -- 3.1 Wideband Decoupled MIMO Antenna -- 3.2 PIFA-Pair-Based MIMO Antenna
3.3 Y-Shaped MIMO Antenna -- 3.4 Highly Isolated MIMO Antenna -- 3.5 Compact Four-Element Optically Transparent MIMO Antenna -- 3.6 Comparison of MIMO Wideband Antennas Structures -- 4 Conclusion -- References -- Transprecision Gaussian Average Background Modelling Technique for Multi-vehicle Tracking Applications -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Proposed Transprecision Gaussian Adaptive Background Subtraction Methodology -- 4.1 Vehicle Tracking and Counting Stage -- 5 Experimental Results and Discussion -- 6 Conclusion -- References -- Spam Message Filtering Based on Machine Learning Algorithms and BERT -- 1 Introduction -- 2 Related Work -- 3 Experiment Design -- 3.1 Pre-processing the Data -- 3.2 NLP Techniques -- 3.3 Modelling -- 4 Results -- 5 Conclusions -- References -- Li-Fi: A Novel Stand-In for Connectivity and Data Transmission in Toll System -- 1 Introduction -- 2 Principle of Li-Fi -- 3 State of Art of Li-Fi -- 3.1 Li-Fi Products -- 3.2 Li-Fi-Based Smart Cities -- 4 Comparison of Different Existing Connection Technologies -- 5 Comparison of Existing Connection Technologies as an Alternative for Conventional Toll System -- 5.1 Wi-Fi -- 5.2 Bluetooth -- 5.3 Zigbee -- 6 Conventional Toll System -- 7 Prototype Description -- 8 System Requirements -- 8.1 Hardware Requirements -- 8.2 Software Requirements -- 9 System Design -- 9.1 Transmitter Section -- 9.2 Receiver Section -- 10 Results -- 11 Challenges in the Implementation of Li-Fi -- 12 Conclusion and Future Works -- References -- Classification of ECG Signal for Cardiac Arrhythmia Detection Using GAN Method -- 1 Introduction -- 2 Review of the Literature -- 3 Methodology -- 3.1 Baseline Wander -- 3.2 Support Vector Regression -- 3.3 Kernel Principal Component Analysis -- 3.4 General Sparsed Neural Network Classifier (GSNN)
3.5 Generative Adversarial Networks -- 3.6 ECG Transformation -- 3.7 MIT-BIH Dataset -- 4 Experimental Results -- 5 Conclusion -- References -- Classifying Pulmonary Embolism Cases in Chest CT Scans Using VGG16 and XGBoost -- 1 Introduction -- 2 Related Work -- 3 Experiment Design -- 3.1 Dataset -- 3.2 Creating Train and Test Subsets -- 3.3 Model Building -- 3.4 Proposed Methodology -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- User Credibility-Based Trust Model for 5G Wireless Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed User Credibility-Based Trust Model for 5G Networks -- 3.1 Direct Credibility Degree Calculation -- 3.2 Indirect Credibility Degree Calculation -- 3.3 Credibility Value Verification -- 4 Conclusion -- References -- Advanced Signature-Based Intrusion Detection System -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Framework -- 4 Experiment and Results -- 5 Conclusion -- References -- A Survey on Detection of Cyberbullying in Social Media Using Machine Learning Techniques -- 1 Introduction -- 1.1 Motivation -- 1.2 Organization -- 2 Background -- 2.1 Impact of Cyberbullying -- 2.2 How to Prevent Cyberbullying -- 3 Related Work -- 4 Conclusion and Future Work -- References -- A Comparison of Similarity Measures in an Online Book Recommendation System -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Similarity Measures -- 5 Conclusion -- References -- Novel Approach for Improving Security and Confidentiality of PHR in Cloud Using Public Key Encryption -- 1 Introduction -- 1.1 Advantages of PHR -- 1.2 PHR Architecture -- 2 Related Work -- 3 Architecture of Proposed Methodology -- 4 Experimental Setup -- 4.1 RSA and ECC Encryption Technique -- 5 Conclusion and Future Work -- References
Summary The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 10-11, 2022. The book shares knowledge and results in theory, methodology and applications of communication technology and mobile networks. The book covers innovative and cutting-edge work of researchers, developers and practitioners from academia and industry working in the area of computer networks, network protocols and wireless networks, data communication technologies and network security
Notes International conference proceedings
Bibliography Includes bibliographical references author index.
Notes Online resource; title from PDF title page (SpringerLink, viewed August 1, 2022)
Subject Wireless communication systems -- Congresses
Computer networks -- Congresses
Computer networks
Wireless communication systems
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Rajakumar, G., editor
Du, K.-L., editor.
Vuppalapati, Chandrasekar, 1972- editor.
Beligiannis, Grigorios N., editor
ISBN 9789811918445
9811918449
Other Titles ICICV 2022