ebook img

Intelligent Cyber Physical Systems and Internet of Things: ICoICI 2022 PDF

896 Pages·2023·24.682 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Intelligent Cyber Physical Systems and Internet of Things: ICoICI 2022

Engineering Cyber-Physical Systems and Critical Infrastructures 3 Jude Hemanth · Danilo Pelusi · Joy Iong-Zong Chen Editors Intelligent Cyber Physical Systems and Internet of Things ICoICI 2022 Engineering Cyber-Physical Systems and Critical Infrastructures Volume 3 SeriesEditor FatosXhafa ,DepartamentdeCiènciesdelaComputació,TechnicalUniversity ofCatalonia,Barcelona,Spain Theaimofthisbookseriesistopresentstateoftheartstudies,researchandbestengi- neeringpractices,real-worldapplicationsandreal-worldcasestudiesfortherisks, security,andreliabilityofcriticalinfrastructuresystemsandCyber-PhysicalSystems. Volumesofthisbookserieswillcovermodelling,analysis,frameworks,digitaltwin simulations of risks, failures and vulnerabilities of cyber critical infrastructures as wellaswillprovideICTapproachestoensureprotectionandavoiddisruptionofvital fields such as economy, utility supplies networks, telecommunications, transports, etc.intheeverydaylifeofcitizens.Theintertwineofcyberandrealnatureofcritical infrastructureswillbe analyzed and challenges of risks,security,and reliabilityof criticalinfrastructuresystemswillberevealed.Computationalintelligenceprovided bysensingandprocessingthroughthewholespectrumofCloud-to-thingcontinuum technologieswillbethebasisforreal-timedetectionofrisks,threats,anomalies,etc. incybercriticalinfrastructuresandwillpromptforhumanandautomatedprotection actions.Finally,studiesandrecommendationstopolicymakers,managers,localand governmentaladministrationsandglobalinternationalorganizationswillbesought. · · Jude Hemanth Danilo Pelusi Joy Iong-Zong Chen Editors Intelligent Cyber Physical Systems and Internet of Things ICoICI 2022 Editors JudeHemanth DaniloPelusi DepartmentofElectronics FacultyofCommunicationSciences andCommunicationEngineering UniversityofTeramo KarunyaInstituteofTechnology Teramo,Italy andSciences Coimbatore,TamilNadu,India JoyIong-ZongChen DepartmentofElectricalEngineering Da-YehUniversity Dacun,Changhua,Taiwan ISSN 2731-5002 ISSN 2731-5010 (electronic) EngineeringCyber-PhysicalSystemsandCriticalInfrastructures ISBN 978-3-031-18496-3 ISBN 978-3-031-18497-0 (eBook) https://doi.org/10.1007/978-3-031-18497-0 ©TheEditor(s)(ifapplicable)andTheAuthor(s),underexclusivelicensetoSpringerNature SwitzerlandAG2023 Thisworkissubjecttocopyright.AllrightsaresolelyandexclusivelylicensedbythePublisher,whether thewholeorpartofthematerialisconcerned,specificallytherightsoftranslation,reprinting,reuse ofillustrations,recitation,broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,and transmissionorinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilar ordissimilarmethodologynowknownorhereafterdeveloped. Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse. Thepublisher,theauthors,andtheeditorsaresafetoassumethattheadviceandinformationinthisbook arebelievedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsor theeditorsgiveawarranty,expressedorimplied,withrespecttothematerialcontainedhereinorforany errorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictional claimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Wearehonoredtodedicatetheproceedings ofICoICI2022toalltheparticipantsand editorsofICoICI2022. Preface ItiswithdeepsatisfactionthatIwritethisprefacetotheproceedingsoftheICoICI 2022heldinJCTCollegeofEngineeringandTechnology,Coimbatore,TamilNadu, India,duringAugust11–12,2022. This conference proceedings volume contains the written versions of most of thecontributionspresentedduringtheconferenceofICoICI2022.Theconference provided a setting for discussing recent developments in a wide variety of topics including Cyber-Physical Systems, Data Communication, Computer Networking, Communicational Technologies, Cryptography, Big Data, Cloud Computing, IoT, andHealthcareInformatics.Theconferencehasbeenagoodopportunityforpartic- ipants coming from various destinations to present and discuss topics in their respectiveresearchareas. ICoICI2022conferencetendstocollectthelatestresearchresultsandapplications onIntelligentCyberPhysicalSystemsandInternetofThings.Itincludesaselection of 65 papers from 302 papers submitted to the conference from universities and industries all over the world. All of accepted papers were subjected to strict peer- reviewing by 2–4 expert referees. The papers have been selected for this volume becauseofqualityandtherelevancetotheconference. ICoICI2022wouldliketoexpressoursincereappreciationtoallauthorsfortheir contributions to this book. We would like to extend our thanks to all the referees for their constructive comments on all papers, especially, we would like to thank tocommitteemembersfortheirhardworking.Finally,wewouldliketothankthe Springerpublicationsforproducingthisvolume. GuestEditors—ICoICI2022 Coimbatore,India Prof.Dr.JudeHemanth Teramo,Italy Dr.DaniloPelusi Dacun,Taiwan Prof.Dr.JoyIong-ZongChen vii Contents TermFrequencyTokenizationforFakeNewsDetection ............... 1 PallaviSuresh, AbhishekShettigar, M.Karunavathi, Ajith, andM.G.RamanathKini AquacultureMonitoringSystemUsingInternetofThings ............. 11 G.V.R.KameshwarRao, T.J.DhivyaShrilaa, I.Akash, andG.Gugapriya AComprehensiveStudyandImplementationofMemoryMalware AnalysiswithItsApplicationfortheCaseStudyofCRIDEX .......... 31 DigvijaySinghandRajeshYadav IoTBasedAntiPoachingofTreesandProtectionofForest ............ 45 E.V.Kameswararao,M.JayaShankar,T.V.SaiLokesh,andE.Terence Artificial Intelligence Based Efficient Activity Recognition withRealTimeImplementationforATMSecurity .................... 57 S.Srinivasan, AL.Vallikannu, AdapaSankarGanesh, IragamreddyRajKumar,andBeereddyVenuGopal TerrorAttackClassificationwiththeApplicationofOrangeData MiningToolandNeo4jSandbox .................................... 69 AnkitRaj,SuchitraA.Khoje,andSagarBhilajiShinde MultipurposeIoTBasedCameraUsingDeepLearning ............... 85 UrvashiDube,SudhishSubramaniam,andG.Sumathi Dr.WatsonAIBasedHealthcareTechnologyProject .................. 101 N.SureshKumar,S.GaneshKarthick,K.P.AswinKumar,S.Balaji, andT.NandhaSastha Empirical and Statistical Comparison of RSA and El-Gamal inTermsofTimeComplexity ....................................... 111 AnkitaKumari,PrashantPranav,SandipDutta,andSoubhikChakraborty ix x Contents IoTCommunicationtoCaptureandStoreDatatoThingspeak CloudUsingNodeMCUandUltrasonicSensor ....................... 121 PriyaJ.PayyappillyandShwetaDour AComprehensiveStudyonCloudComputing:Architecture,Load Balancing,TaskSchedulingandMeta-HeuristicOptimization ......... 137 ShrutiTiwariandChinmayBhatt Balancing Exploration and Exploitation in Nature Inspired ComputingAlgorithm ............................................. 163 K.PraveenKumar, SangeethaSingarapu, MounikaSingarapu, andSwaroopRakeshKarra Blockchain Based Secure, Efficient, and Scalable Platform fortheOrganDonationProcessofHealthcareIndustry ............... 173 KeyurParmar,VadlapudiDevanandKumar,NeduriLeelaPrasanth, Pranoppal,KasaCharanTeja,ShriniwasPatil,andKaushalA.Shah ImageEnhancementinFrequencyDomainFingerprintDetection andMatchingApproach ........................................... 185 SuhasiniS.GoilkarandShashikantS.Goilkar DevelopingMachineLearningBasedMobileAppforAgriculture Application ....................................................... 195 R.DhivyaandN.Shanmugapriya AttackDetectioninIoTUsingMachineLearning—ASurvey .......... 211 SaeedAliHaifaAliandJ.VakulaRani AnExtensiveStudyonLogicEmergingIoTAdiabaticTechniques forLow-PowerCircuit ............................................. 229 T.VijayalakshmiandJ.Selvakumar A Critical Review of Agri-Food Supply Management withTraceabilityandTransparencyUsingBlockchainTechnology ..... 239 SanketAraballiandP.Devaki Face-Anti-spoofingBasedonLivenessDetection ...................... 251 ShivaniMangalandKhushbooAgarwal PDRAnalysisandNetworkOptimizationofRoutingProtocols forEdgeNetworks ................................................. 265 ArchanaRatnaparkhi, RadhikaPurandare, GauriGhule, ShraddhaHabbu,ArtiBang,andPallaviDeshpande Privacy Threat Reduction Using Modified Multi-line Code Generation Algorithm(MMLCGA)forCancelable Biometric Technique(CBT) .................................................. 275 PramodD.Ganjewar,SanjeevJ.Wagh,andAartiL.Gilbile Contents xi Systematic Literature Review—IoT-Based Supply Chain ManagementinIndustry4.0 ........................................ 291 SreeparneshSharmaSivadevuniandSathishKumarRavichandran AReviewonUrbanFloodManagementTechniquesfortheSmart CityandFutureResearch .......................................... 303 AnilMahadeoHingmireandPawanR.Bhaladhare ApplicationofDistributedConstraintOptimizationTechnique forPrivacyPreservationinCyber-PhysicalSystems .................. 319 ManasKumarYogiandA.S.N.Chakravarthy GripAssistingGloveforCharcot-Marie-ToothPatients ............... 329 VarunSarathchandran, JasonVincent, JuelMathaisGeorge, PoluSathwikReddy,andR.Ambika AccidentDetectioninSurveillanceCamera .......................... 345 A.P.Adil,M.G.Anandhu,JeovanElsaJoy,TwinkleS.Karethara, S.Anjali,andB.R.Poorna WheeledRobotsforIsolationWards ................................ 355 U.SahanaandN.Rajesh A Survey on Various Crypto-steganography Techniques forReal-TimeImages .............................................. 365 R.TanyaBinduandT.Kavitha A Lightweight Image Cryptosystem for Multimedia Internet ofThings ......................................................... 375 V.Panchami,ArjunRajasekharan,andMahimaMaryMathews AStudyonParkingSpaceAllocationandRoadEdgeDetection forOptimizingRoadTraffic ........................................ 393 H.VarunChand,SeemaSabharwal,AnilCarie,andS.ArunKumar HumanPhysicalActivitiesBasedCalorieBurnCalculatorUsing LSTM ............................................................ 405 JadhavKalpesh,JadhavRushikesh,KalbandeSwaraj,KattaRohan, andRakhiBharadwaj Alternate Tiny Encryption Algorithm: A Modified Tiny EncryptionAlgorithmforImprovedDataSecurity ................... 425 MehakGupta,NimitAgrawal,andManasRanjanPrusty CrystalClearAnalysisofOpen–SourceAutomationPlatforms ......... 437 KiranJadhav,MangeshNikose,andSagarShinde AReviewPaperonNetworkIntrusionDetectionSystem .............. 453 NongmeikapamThoibaSinghandRamanChadha

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.