G. Ranganathan Álvaro Rocha Editors Inventive ... · Wewelcome youto the 2019 International...
Transcript of G. Ranganathan Álvaro Rocha Editors Inventive ... · Wewelcome youto the 2019 International...
Lecture Notes in Networks and Systems 89
G. RanganathanJoy ChenÁlvaro Rocha Editors
Inventive Communication and Computational TechnologiesProceedings of ICICCT 2019
Lecture Notes in Networks and Systems
Volume 89
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,Warsaw, Poland
Advisory Editors
Fernando Gomide, Department of Computer Engineering and Automation—DCA,School of Electrical and Computer Engineering—FEEC, University of Campinas—UNICAMP, São Paulo, BrazilOkyay Kaynak, Department of Electrical and Electronic Engineering,Bogazici University, Istanbul, TurkeyDerong Liu, Department of Electrical and Computer Engineering, Universityof Illinois at Chicago, Chicago, USA; Institute of Automation, Chinese Academyof Sciences, Beijing, ChinaWitold Pedrycz, Department of Electrical and Computer Engineering,University of Alberta, Alberta, Canada; Systems Research Institute,Polish Academy of Sciences, Warsaw, PolandMarios M. Polycarpou, Department of Electrical and Computer Engineering,KIOS Research Center for Intelligent Systems and Networks, University of Cyprus,Nicosia, CyprusImre J. Rudas, Óbuda University, Budapest, HungaryJun Wang, Department of Computer Science, City University of Hong Kong,Kowloon, Hong Kong
The series “Lecture Notes in Networks and Systems” publishes the latestdevelopments in Networks and Systems—quickly, informally and with high quality.Original research reported in proceedings and post-proceedings represents the coreof LNNS.Volumes published in LNNS embrace all aspects and subfields of, as well as new
challenges in, Networks and Systems.The series contains proceedings and edited volumes in systems and networks,
spanning the areas of Cyber-Physical Systems, Autonomous Systems, SensorNetworks, Control Systems, Energy Systems, Automotive Systems, BiologicalSystems, Vehicular Networking and Connected Vehicles, Aerospace Systems,Automation, Manufacturing, Smart Grids, Nonlinear Systems, Power Systems,Robotics, Social Systems, Economic Systems and other. Of particular value to boththe contributors and the readership are the short publication timeframe and theworld-wide distribution and exposure which enable both a wide and rapiddissemination of research output.
The series covers the theory, applications, and perspectives on the state of the artand future developments relevant to systems and networks, decision making, control,complex processes and related areas, as embedded in the fields of interdisciplinaryand applied sciences, engineering, computer science, physics, economics, social, andlife sciences, as well as the paradigms and methodologies behind them.
** Indexing: The books of this series are submitted to ISI Proceedings,SCOPUS, Google Scholar and Springerlink **
More information about this series at http://www.springer.com/series/15179
G. Ranganathan • Joy Chen • Álvaro RochaEditors
Inventive Communicationand ComputationalTechnologiesProceedings of ICICCT 2019
123
EditorsG. RanganathanElectronics and Communication EngineeringGnanamani College of TechnologyNamakkal, Tamil Nadu, India
Joy ChenDepartment of Electrical EngineeringDayeh UniversityChang-Hwa, Taiwan
Álvaro RochaUniversity of CoimbraRio Tinto, Portugal
ISSN 2367-3370 ISSN 2367-3389 (electronic)Lecture Notes in Networks and SystemsISBN 978-981-15-0145-6 ISBN 978-981-15-0146-3 (eBook)https://doi.org/10.1007/978-981-15-0146-3
© Springer Nature Singapore Pte Ltd. 2020This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or partof the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmissionor information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilarmethodology now known or hereafter developed.The use of general descriptive names, registered names, trademarks, service marks, etc. in thispublication does not imply, even in the absence of a specific statement, that such names are exempt fromthe relevant protective laws and regulations and therefore free for general use.The publisher, the authors and the editors are safe to assume that the advice and information in thisbook are believed to be true and accurate at the date of publication. Neither the publisher nor theauthors or the editors give a warranty, expressed or implied, with respect to the material containedherein or for any errors or omissions that may have been made. The publisher remains neutral with regardto jurisdictional claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,Singapore
We dedicated to all the participants of theconference ICICCT 2019
Foreword
We welcome you to the 2019 International Conference on Inventive Communicationand Computational Technologies (ICICCT 2019) held on April 29–30, 2019, atGnanamani College of Technology, Namakkal, Tamil Nadu. ICICCT 2019 providesa highly competitive forum for reporting the latest developments in the research andapplication of communication and computational technologies. We are pleased topresent the proceedings of the conference as its published record.
The conference particularly encouraged the interaction of research students anddeveloping academics with the more established academic community in aninformal setting to present and to discuss new and current work. Their contributionshelped to make the conference as outstanding as it has been. The papers contributedthe most recent scientific knowledge known in the fields of modern communicationsystems which include informatics, data communication and computer networking,wireless communication, electronics, software engineering, machine learning andoptimization, VLSI design and automation, networking, computing systems, socialnetworks, Internet of things, cloud and big data.
We hope that this program will further stimulate research in advanced elec-tronics and communication technologies, artificial intelligence and capsule net-works, data communication and computer networking and communicating thingsnetworks. We feel honored and privileged to serve the best recent developments inall the areas of communication technologies to you through this exciting program.
We thank all the authors and participants for their contributions.
Namakkal, India Dr. G. RanganathanConference Chair
ICICCT 2019
vii
Preface
The 2019 International Conference on Inventive Communication and ComputationalTechnologies (ICICCT 2019) was held on April 29–30, 2019, at Gnanamani Collegeof Technology, Namakkal, India. ICICCT 2019 aims to cover the recent advance-ment and trends in the area of communication and computational technologies tofacilitate knowledge sharing and networking interactions on emerging trends andnew challenges.
ICICCT 2019 tends to collect the latest research results and applications on datacommunication and computer networking, software engineering, wireless com-munication, VLSI design and automation, networking, Internet of things, cloud andbig data. It includes a selection of 136 papers from 430 papers submitted to theconference from universities and industries all over the world. All of the acceptedpapers were subjected to strict peer-reviewing by 2–4 expert referees. The papershave been selected for this volume because of quality and the relevance to theconference.
We would like to express our sincere appreciation to all the authors for theircontributions to this book. We would like to extend our thanks to all the referees fortheir constructive comments on all papers, especially we would like to thank theOrganizing Committee for their hard work. Finally, we would like to thank theSpringer publications for producing this volume.
Namakkal, India Dr. G. RanganathanConference Chair
ICICCT 2019
ix
Acknowledgements
We would like to acknowledge the contribution made to the organization by itsmany volunteers. Members contribute their time, energy and knowledge at a local,regional and international level.
We also thank all the chair persons and conference committee members for theirsupport.
xi
Contents
Enhanced Security Mechanism in Cloud Based on DNA Excess3 Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Manjot Kaur and Kiranbir Kaur
TensorFlow-Based Semantic Techniques for Multi-cloud ApplicationPortability and Interoperability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13Tanveer Kaur and Kiranbir Kaur
Enhancing High Availability for NoSQL Database SystemsUsing Failover Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23Priyanka Gotter and Kiranbir Kaur
Implementation of Automated Bottle Filling System Using PLC . . . . . 33S. V. Viraktamath, A. S. Umarfarooq, Vinayakgouda Yallappagoudarand Abhilash P. Hasankar
An Integrated Approach to Network Intrusion Detectionand Prevention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43B. Bhanu Prakash, Kaki Yeswanth, M. Sai Srinivas, S. Balaji,Y. Chandra Sekhar and Aswathy K. Nair
A New Design of Equiangular Circular Cum Elliptical HoneycombPhotonic Crystal Fiber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53Ashish Jain, Ravindra Kumar Sharma, Vimal Agarwal and Sunil Sharma
Survey of Different Countermeasure on Network Layer Attackin Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61Amruta Chavan, Dipti Jadhav, Nilesh Marathe and Nilima Dongre
Internet of Things: Service-Oriented Architecture Opportunitiesand Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71G. R. Sagar and N. Jayapandian
xiii
Performance Comparison of Multicast Routing ProtocolsBased on Route Discovery Process for MANET . . . . . . . . . . . . . . . . . . 79Kinjal Adhvaryu
New Complex Hybrid Security Algorithm (CHSA) for NetworkApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Haider K. Hoomod, Ali Jameel Al-Mousawi and Jolan Rokan Naif
Performance Assessment of Various Encoding Schemeswith Bit Stuffing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105S. Bharath and Gayathri Narayanan
3D(Dimensional)—Wired and Wireless Network-on-Chip (NoC) . . . . . 113N. Ashokkumar, P. Nagarajan and P. Venkatramana
Performance Analysis of Unified Threat Management (UTM) . . . . . . . 121Jatin Gharat, Amarsinh Vidhate and Amit Barve
Development of an Efficient Nondestructive Grading Methodfor Pomegranate Using Magnetic Resonance Imagingand Neural Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135Surekha Yakatpure and Krupa Rasane
Implementation of Differential Privacy Using Diffie–Hellmanand AES Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143P. V. Vivek Sridhar Mallya, Aparna Ajith, T. R. Sangeetha, Arya Krishnanand Gayathri Narayanan
Implementation of Neural Signals in MATLAB (Thought Signals) . . . . 153Kambhampati Sai Sandilya, Poornima Mohan,Madiraju Akshay Bharadwaj, B. Maragatha Eswari, K. Namitha,O. Rajasekhar Reddy and J. Vaishnu Saran
A Framework for Formal Verification of Security Protocolsin C++ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163R. Pradeep, N. R. Sunitha, V. Ravi and Sushma Verma
Locality—Aware Scheduling for Containers in Cloud Computing . . . . 177G. Charles Babu, A. Sai Hanuman, J. Sasi Kiran and B. Sankara Babu
TorBot: Open Source Intelligence Tool for Dark Web . . . . . . . . . . . . . 187P. S. Narayanan, R. Ani and Akeem T. L. King
A Novel Approach to View and Modify Data in Cloud EnvironmentUsing Attribute-Based Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Swaminathan Subbiah, S. Palaniappan, Sigamani Ashokkumarand Ananthakrishnan BalaSundaram
xiv Contents
Root Cause Detection of Oscillation in Shell and Tube HeatExchanger Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205S. Abirami and S. Sivagamasundari
Performance Assessment of Spread Spectrum CommunicationReceivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215P. Anand Krisshna, K. Vandith Sreenivas and Gayathri Narayanan
Computationally-Light Metrics to Quantify Link Stability in MobileSensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227Natarajan Meghanathan
MockRest—A Generic Approach for Automated Mock Frameworkfor REST APIs Generation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237Anshu Soni, Virender Ranga and Sandeep Jadhav
Syntactic Interoperability in Real-Time Systems, ROS 2,and Adaptive AUTOSAR Using Data Distribution Services:An Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257Navrattan Parmar, Virender Ranga and B. Simhachalam Naidu
IoT-Enabled Water Quality Monitoring System . . . . . . . . . . . . . . . . . . 275G. Kanagaraj, T. Primya, K. Sashi Rekha, C. Vinothini and P. Anitha
Energy-Efficient Routing-Based Clustering Approaches and SleepScheduling Algorithm for Network Lifetime Maximization in SensorNetwork: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293Rajiv R. Bhandari and K. Rajasekhar
Journey of Wireless Communication . . . . . . . . . . . . . . . . . . . . . . . . . . 307Vignesh Parameswaran and M. Shanmugasundaram
A Survey on K-Means Clustering for Analyzing Variationin Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317Pratik Patil and A. Karthikeyan
A Review on Mobile Cloud Computing Interoperability Issuesand Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325Tribid Debbarma and K. Chandrasekaran
Filter Bank Modulation in Massive MIMO Scenario . . . . . . . . . . . . . . 335S. Sruthi and J. Dhoulath Beegum
Autonomous Farming—Visualization of Image Processingin Agriculture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345Shivam Thakur, Sushant Bawiskar, Sachin Kumar Singhand M. Shanmugasundaram
Design and Development of End Effector for Domestic Robots . . . . . . 353V. Indu, Putchala Vinay, Narjala Rohith, Kuppili Puneeth and S. Pramod
Contents xv
Total Variation and Alternate Direction Method for Deblurringof Digital Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361S. Rinesh, C. Prajitha, V. Karthick and S. Palaniappan
Design of MIMO Triangular Microstrip Patch Antennafor IEEE 802.11a Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369M. Arulaalan, K. Mahendran, P. Prabakaran and G. Manikannan
A Hollow Core Bragg Fiber with Multilayered Random Defectfor Refractive Index Sensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381K. Ben Franklin, R. Kumar and C. Nayak
Generation of Multiple Key Based on Monitoring the UserBehavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391S. Palaniappan, Steward Kirubakaran, V. Parthipan and S. Rinesh
Towards Convolution Neural Networks (CNNs): A Brief Overviewof AI and Deep Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399Preetjot Kaur and Roopali Garg
Populating Indian GST Details into Java Apache Derby DatabasePowered by Glassfish Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409R. Sridevi and S. Srimathi
Intrusion Detection System Using WoSAD Method . . . . . . . . . . . . . . . 423R. Sridevi and N. Nithya
Blackhole Attack Implementation and Its Performance EvaluationUsing AODV Routing in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431Anshu Kumari, Madhvi Singhal and Nishi Yadav
Enhancement of Security Using B-RSA Algorithm . . . . . . . . . . . . . . . . 439Aman Gupta, Saurabh Gupta and Nishi Yadav
Analyzing Different Multiparty Computation Techniques . . . . . . . . . . 451Tanmay Borade, Dhananjay Dakhane and Tushar Ghorpade
Power and Delay Comparison of 7:3 Compressor DesignsBased on Different Architectures of XOR Gate . . . . . . . . . . . . . . . . . . 461Rekib Uddin Ahmed and Prabir Saha
Survey of Big Data Warehousing Techniques . . . . . . . . . . . . . . . . . . . . 471Jaspreet Kaur, Rajashree Shedge and Bharti Joshi
Detecting Denial-of-Service Attacks Using sFlow . . . . . . . . . . . . . . . . . 483Shivaraj Hublikar, Vijaya Eligar and Arun Kakhandki
Area and Power Efficient Multiplier-Less Architecture for FIRDifferentiator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493Sanjay Eligar and R. M. Banakar
xvi Contents
Optimized Prediction Model to Diagnose Breast Cancer Riskand Its Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503Athira Vinod and B. R. Manju
Smart Cane Design for Indoor and Outdoor Navigation:A Cost-Effective Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517Vandana Mansur and R. Sujatha
Triclustering of Gene Expression Microarray DataUsing Coarse-Grained Parallel Genetic Algorithm . . . . . . . . . . . . . . . . 529Shubhankar Mohapatra, Moumita Sarkar, Anjali Mohapatraand Bhawani Sankar Biswal
Ensemble Feature Selection to Improve Classification Accuracyin Human Activity Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541Nivetha Gopalakrishnan, Venkatalakshmi Krishnanand Vinodhini Gopalakrishnan
An Exploration on Cloud Computing Security Strategiesand Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549Amrita Raj and Rakesh Kumar
A Hybrid Approach-Based Energy Aware Cluster Head Selectionfor IOT Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563A. Kannammal and S. Suresh
Modified Dive and Rise Technique Incorporating EnhancedWeighted Centroid Localization Algorithm with Ocean CurrentMobility Model in Underwater Acoustic Sensor Networks . . . . . . . . . . 569R. Bhairavi and Gnanou Florence Sudha
Tree-Based Approaches for Improving Energy Efficiency and LifeTime of Wireless Sensor Networks (WSN): A Survey and FutureScope for Research . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583Pranesh and Santhosh L. Deshpande
Automated Cyber Threat Intelligence Generation from HoneypotData . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591Kumar Sanjeev, B. Janet and R. Eswari
Analysis of MPTCP Packet Scheduling, The Need of Data HungryApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599Neha Rupesh Thakur and Ashwini S. Kunte
Voice Controlled Home Automation Using Blynk, IFTTT with LiveFeedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 619M. Rajasekhar Reddy, P. Sai Siddartha Reddy, Suthapalli Akhil Sri Harshaand D. Vishnu Vashista
Contents xvii
AD-LIB: Automated Library System . . . . . . . . . . . . . . . . . . . . . . . . . . 635Dattatray Sawant and Rohan Patil
Design and Integrate IoT Sensors to RO Water Purifiers for RemoteMonitoring and Allowing Users to Pay Per Usage on the RentedRO System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 647H. D. Sundresh and D. Priya
MPTCP a Solution Over Crunch in Bandwidth Requirementfor Multimedia Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 653Vidya Kubde and Sudhir Sawarkar
Design of AYUSH: A Blockchain-Based Health Record ManagementSystem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665A. V. Aswin, K. Y. Basil, Vimal P. Viswan, Basil Rejiand Bineeth Kuriakose
Support Vector Machine-Based Focused Crawler . . . . . . . . . . . . . . . . 673Vanshita R. Baweja, Rajesh Bhatia and Manish Kumar
Indoor Object Tracking Using Wi-Fi Access Points . . . . . . . . . . . . . . . 687Vinit Asher, Hardik Thakkar, Suyog Tambe and Prasenjit Bhavathankar
Crime Analysis and Prediction Using Graph Mining . . . . . . . . . . . . . . 699A. G. Sreejith, Alan Lansy, K. S. Ananth Krishna, V. J. Haranand M. Rakhee
A Semi-supervised Approach to Detect Malicious Nodes in OBSNetwork Dataset Using Gaussian Mixture Model . . . . . . . . . . . . . . . . . 707Muhammad Kamrul Hossain Patwary and Md. Mokammel Haque
Apache Spark Methods and Techniques in Big Data—A Review . . . . . 721H. P. Sahana, M. S. Sanjana, N. Mohammed Muddasirand K. P. Vidyashree
Artificial Intelligence Applications in Defense . . . . . . . . . . . . . . . . . . . . 727C. Sinchana, K. Sinchana, Shahid Afridi and M. R. Pooja
Hybrid Approach to Enhance Data Security on Cloud . . . . . . . . . . . . . 735Pratishtha Saxena, Samarjeet Yadav and Neelam Dayal
Security Threats of Embedded Systems in IoT Environment . . . . . . . . 745Sreeja Rajendran and R Mary Lourde
Decentralized Bagged Stacking Ensemble Mechanism (DBSEM)for Anomaly Detection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755S. L. Sanjith and E. George Dharma Prakash Raj
The Process and Application of Dual Extruder Three-DimensionPrinter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 767Kunal Sekhar Pati and A. Karthikeyan
xviii Contents
Face Detection and Natural Language Processing SystemUsing Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773H. S. Avani, Ayushi Turkar and C. D. Divya
A Review on Detection of Online Abusive Text . . . . . . . . . . . . . . . . . . 781Bhumika Jain, Chaithra Bekal and S. P. PavanKumar
Security of an IoT Network: A VLSI Point of View . . . . . . . . . . . . . . . 789Sreeja Rajendran, Azhar Syed and R. Mary Lourde
Anomaly Detection Techniques in Data Mining—A Review . . . . . . . . . 799K. N. Lakshmi, N. Neema, N. Mohammed Muddasir and M. V. Prashanth
MAIC: A Proficient Agricultural Monitoring and Alerting SystemUsing IoT in Cloud Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805A. Srilakshmi, K. Geetha and D. Harini
Open Set Domain Adaptation for Hyperspectral Image ClassificationUsing Generative Adversarial Network . . . . . . . . . . . . . . . . . . . . . . . . 819S. Nirmal, V. Sowmya and K. P. Soman
AHP-FVIKOR Based Access Network Selection in VehicularCommunications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829C. Suganthi Evangeline and Vinoth Babu Kumaravelu
Measuring Web Content Credibility Using Predictive Models . . . . . . . 839R. Manjula and M. S. Vijaya
Survey on Privacy-Preserving and Other Security Issuesin Data Mining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849K. Karthika, R. Devi Priya and S. Sathishkumar
A Study on Different Types of Robotics Applications . . . . . . . . . . . . . . 859B. U. Meghana and M. V. Prashanth
UVRento—Online Product Rental Application Using Cross-PlatformService . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 865Rahul Patil, Siddaram Sonnagi, Ashwini Dhummal, Subhas Kadamand V. Sanju
Autonomous Unmanned Ground Vehicle for Enhancementof Defence Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873M. Someshwaran, Deepa Jose and P. Paul Jefferson
A Parametric Study of Load Balancing Techniques in CloudEnvironment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881Insha Naz, Sameena Naaz and Ranjit Biswas
Logical Clustering of Similar Vertices in Complex Real-WorldNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891Md A. Rahman and Natarajan Meghanathan
Contents xix
Capacity Enhancement Using Delay-Sensitive Protocolin MANETs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 901V. Sivakumar, J. Kanimozhi, B. Keerthana and R. Muthulakshmi
SCO-RNN: A Behavioral-Based Intrusion Detection Approachfor Cyber Physical Attacks in SCADA Systems . . . . . . . . . . . . . . . . . . 911N. Neha, S. Priyanga, Suresh Seshan, R. Senthilnathanand V. S. Shankar Sriram
SSO-IF: An Outlier Detection Approach for Intrusion Detectionin SCADA Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 921P. S. Chaithanya, S. Priyanga, S. Pravinraj and V. S. Shankar Sriram
EDF-VD Scheduling-Based Mixed Criticality Cyber-PhysicalSystems in Smart City Paradigm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 931G. Naveen Balaji, M. Sethupathi, N. Sivaramakrishnan and S. Theeijitha
Automatic Solid Waste Dumping Alert System . . . . . . . . . . . . . . . . . . 947K. Bhuvana, S. Deeksha, M. Deepthi and A. D. Radhika
User Authentication for Mobile Phones by Pseudo SignatureUsing CNN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 955Christy James Jose and M. S. Rajasree
Autonomous Mobile Robot Using RGB-D SLAM and RobotOperating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 963Jash Mota, Prutha Edwankar, Yash Shetye, Manisha Sampatand Dattatray Sawant
Survey on Data Mining and Predictive Analytics Techniques . . . . . . . 971S. Sathishkumar, R. Devi Priya and K. Karthika
Implementation of In-flight Entertainment System Using LightFidelity Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 983Viraj Savaliya, Kalp Shah, Dharmil Shah, Henish Shahand Poonam Kadam
A Survey of Pre-processing Techniques Using Waveletsand Empirical-Mode Decomposition on Biomedical Signals . . . . . . . . . 993Prasanth M. Warrier, B. R. Manju and Rajkumar P. Sreedharan
Analysis of Process Scheduling Using Neural Networkin Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1003Harshit Agarwal and Gaurav Jariwala
An Enhanced Trust Based Fuzzy Implicit Cross-Layer Protocolfor Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015Kompalli Anusha and Ambidi Naveena
xx Contents
Implementation of Public-Key Infrastructure for Smart ParkingSystem Using MQTT Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029Rajilal Manathala Vijayan, R. Ezhilarasie and A. Umamakeswari
Non-bipolar Evaluation and Visualization of Online Text Reviews . . . . 1039Keerthana Chigateri and Rekha Bhandarkar
Status Monitoring System-Based Defense Mechanism (SMS-BDM)for Preventing Co-resident DoS Attacks in Cloud Environment . . . . . . 1047S. Rethishkumar and R. Vijayakumar
Resource Scheduling Algorithms for Cloud ComputingEnvironment: A Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059V. Arulkumar and N. Bhalaji
Cloud-Based Healthcare Portal in Virtual Private Cloud . . . . . . . . . . . 1071R. Mahaveerakannan, C. Suresh Gnana Dhas and R. Rama Devi
A Hybrid Approach for Video Steganography by Stretchingthe Secret Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081B. Karthikeyan, M. M. Anishin Raj, D. Yuvarajand K. Joseph Abraham Sundar
An Acknowledgment-Based Approach for Implementing TrustedRouting Protocol in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089K. Dhanya, C. Jeyalakshmi and A. Balakumar
On-line Frequency Reallocation for Call Requests in Linear WirelessCellular Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1097Narayan Patra
A Novel Secure IoT Based Optimizing Sensor Network for AutomaticMedicine Composition Prescribe System . . . . . . . . . . . . . . . . . . . . . . . 1109M. Bowya and V. Karthikeyan
High-Speed Polar Decoder Architecture for Next Generation 5GApplications Using Radix-k Processing Engine . . . . . . . . . . . . . . . . . . . 1119R. Kavipriya and M. Maheswari
PAPR Reduction in F-OFDM Modulation Scheme for 5G CellularNetworks Using Precoding Technique . . . . . . . . . . . . . . . . . . . . . . . . . 1127Sasidharan Jiji and M. Ponmani Raja
Privacy Preservation Using Top K Multi-Keyword Synonym FuzzySearch Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1139Manjubala Sekar and Kamalanathan Kandasamy
High-Speed Variable-Length Decoder Using Segmented Code book . . . 1151Sujata Bhavikatti and R. M. Banakar
Contents xxi
Efficient Cruise Control of Electric Motorcycle Using PID . . . . . . . . . . 1161Rohan Sawant and Andrew Kidd
Transmission of Watermarked Image in WSN Using ELSMAlgorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1171A. Umapriya and P. Nagarajan
International Students’ Gender Impact to Use Mobile Learningin Tertiary Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1179Sujit Kumar Basak, Marguerite Wotto and Paul Bélanger
Industrial Automation of Process for Transformer MonitoringSystem Using IoT Analytics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191Vaishali Khairnar, Likhesh Kolhe, Sudhanshu Bhagat, Ronak Sahu,Ankit Kumar and Sohail Shaikh
A Comparative Study on Various Search Techniques for GamingApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201B. Sunil, M. R. Naveen Kumar, B. N. Gowrishankar and N. S. Prema
Crowdsourcing Data Analysis for Crowd Systems . . . . . . . . . . . . . . . . 1207Vignesh Loganathan, Gopinath Subramani and N. Bhaskar
Optimized Database Using Crowdsourcing . . . . . . . . . . . . . . . . . . . . . . 1217Vignesh Balakrishnan and N. Bhaskar
Anti-Counterfeit on Medicine Detection Using BlockchainTechnology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1223R. Anand, Khadheeja Niyas, Sorjeeta Gupta and S. Revathy
Fault Detection in an Indoor Wireless Sensor NetworkUsing RSSI-Based Machine Learning Technique . . . . . . . . . . . . . . . . . 1233R. Pradheepa, M. Bhuvaneshwar, S. Ajay Kumar, B. Ajay Rajand K. S. Anusha
Image Description Generation Using Deep Learning . . . . . . . . . . . . . . 1239Neha Supe, Deepti Patil, Revathi Mahadevan, Tanvi Pandhreand Bharti Joshi
Multi-agent-Based Interference Mitigation Technique in WirelessCommunication System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1245P. Aruna and A. George
Implementing Machine Learning on Edge Devices with LimitedWorking Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1255A. Harish, Saksham Jhawar, B. S. Anisha and P. Ramakanth Kumar
xxii Contents
Smart Transportation: An Edge-Cloud Hybrid ComputingPerspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1263Aashish Jaisimha, Salman Khan, B. S. Anisha and P. Ramakanth Kumar
A Low-Cost Ideal Fish Farm Using IoT: In the Contextof Bangladesh Aquaculture System . . . . . . . . . . . . . . . . . . . . . . . . . . . 1273Md. Kalim Amzad Chy, Abdul Kadar Muhammad Masum,Mohammad Emdad Hossain, Md. Golam Rabiul Alam,Shahidul Islam Khan and Mohammed Shamsul Alam
IoT-Based Smart Monitoring System to Ensure Worksite Safety—AContext of Garment Industry in Bangladesh . . . . . . . . . . . . . . . . . . . . 1285Abdul Kadar Muhammad Masum, Ahmed Shan-A-Alahi,Abdullah Al Noman, Mohammad Nazim Uddin, Khairul Islam Azamand Mohammed Golam Sarwar Rakib
Evading Gratuitous Energy Consumption Due to Activationof Superfluous Nodes in WSN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1295Alok Misra and Divakar Singh Yadav
Detection of Phishing Websites Using Machine Learning . . . . . . . . . . . 1307Ahmed Raad Abbas, Sukhvir Singh and Mandeep Kau
Smart Drip Irrigation Using IOT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1315Smita Deshmukh, Swati Chavan, Prajakta Zodge, Pooja Dalviand Akshaykumar Jadhav
An Efficient Scheduling Algorithm for Sensor-Based IoT Networks . . . 1323M. Deva Priya, T. Suganya, A. Christy Jeba Malar, E. Dhivyaprabha,Prajith Kesava Prasad and L. R. Vishnu Vardhan
Cost-Based Meta-Task Scheduling Algorithm for MultiCloudComputing (CBMTSA) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1333B. J. Hubert Shanthan and L. Arockiam
Implementation of Low-Cost Mobile Robot for Rescue Challenges . . . 1345Rajesh Kannan Megalingam, Shree Rajesh Raagul Vadivel,Prasant Kumar Yadav, Katta Nigam, Ravi Teja Geesalaand Ruthvik Chanda
Smog Detection and Pollution Alert System Using Wireless SensorNetwork . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1357Manita Rajput, Mrudula Geddam, Priyanka Jondhale and Priyanka Sawant
IoT-Based Women Security System . . . . . . . . . . . . . . . . . . . . . . . . . . . 1369Megalingam Rajesh Kannan, K. Jyothsna, T. S. Aparna, T. Anjali,M. Meera and S. D. Amrutha
Contents xxiii
IoT-based Wearable Micro-Strip Patch Antenna withElectromagnetic Band Gap Structure for Gain Enhancement . . . . . . . 1379M. Ameena Banu, R. Tamilselvi, M. Rajalakshmiand M. Pooja Lakshmi
Design and Implementation of a 3 DOF Arm for DisasterManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1397Rajesh Kannan Megalingam, Shree Rajesh Raagul Vadivel, Vamsi Gontu,Deepak Nagalla, Ravi Kiran Pasumarthi and Phanindra Kumar Allada
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1411
xxiv Contents
Editors and Contributors
About the Editors
Dr. G. Ranganathan has been a Professor at Gnanamani College of Technologysince 2017. Previously, he has worked at Ranganathan Engineering College andJayalakshmi Institute of Technology. He has also worked as a Professor at RVSTechnical Campus, KarpagamCollege of Engineering and P.R. Engineering College.He completed his Ph.D. andM.E. at the Information andCommunication EngineeringDepartment, Anna University. His areas of interest include biomedical signal pro-cessing, neural networks, fuzzy logic, networking andVLSI signal processing. He haspublished five books and numerous research papers in international journals.
Dr. Joy Chen received his B.Sc. in Electronics Engineering from the NationalTaiwanTechnical University, Taipei, Taiwan, and hisM.Sc. in Electrical Engineeringfrom Dayeh University, Changhua, Taiwan, in 1985 and 1995, respectively. Hecompleted his Ph.D. in Electrical Engineering at the National Defense University,Tao-Yuan, Taiwan, in 2001 and is currently a Full Professor at the Department ofCommunication Engineering, DayehUniversity. Prior to joiningDayeh, heworked atthe Control Data Company (Taiwan branch) as a Technical Manager from 1985 to1996. His research interests include wireless communications, MIMO systems,OFDM systems, and wireless sensor networks. Dr. Joy I.-Z. Chen has publishednumerous SCI/EI journal papers and holds several patents in Taiwan.
Dr. Álvaro Rocha holds a Habilitation (postdoc) in Information Science, Ph.D. inInformation Systems and Technologies, andM.Sc. in InformationManagement. He iscurrently a Professor of Information Systems and Software Engineering at theUniversity of Coimbra, President of AISTI (the Iberian Association for InformationSystems and Technologies), and Chair of IEEE SMC Portugal Section SocietyChapter. He served as Vice-Chair of Experts for the European Commission’s Horizon2020 Programme, and as an expert at the Italian Ministry of Education, Universityand Research. His main research interests are information systems planning and
xxv
management, maturity models, information system quality, online service quality,intelligent information systems, software engineering, e-government, e-health, and ITin education.
Contributors
Ahmed Raad Abbas Department of Information Technology Development (IT),University Institute of Engineering and Technology (UIET), Punjab University,Chandigarh, India
S. Abirami Department of Electronics and Instrumentation Engineering,Annamalai University, Chidambaram, India
Kinjal Adhvaryu Computer Engineering Department, Sankersinh Vaghela BapuInstitute of Technology, Gandhinagar, Gujarat, India
Shahid Afridi Department of Computer Science and Engineering, VidyavardhakaCollege of Engineering, Mysuru, Karnataka, India
Vimal Agarwal Apex Institute of Engineering & Technology, Jaipur, India
Harshit Agarwal Sarvajanik College of Engineering and Technology, Surat, India
Rekib Uddin Ahmed National Institute of Technology Meghalaya, Shillong,India
S. Ajay Kumar Department of Electronics and Communication Engineering,Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
B. Ajay Raj Department of Electronics and Communication Engineering, AmritaSchool of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
Aparna Ajith Department of Electronics and Communication Engineering,Amrita Vishwa Vidyapeetham, Amritapuri, Kerala, India
Suthapalli Akhil Sri Harsha School of Electrical and Electronics Engineering,SASTRA Deemed to Be University, Thanjavur, India
Abdullah Al Noman Department of Computer Science and Engineering,International Islamic University Chittagong, Chittagong, Bangladesh
Mohammed Shamsul Alam Department of Computer Science and Engineering,International Islamic University Chittagong, Chittagong, Bangladesh
Phanindra Kumar Allada Department of Electronics and CommunicationEngineering, Amrita Vishwa Vidyapeetham, Amritapuri, India
Ali Jameel Al-Mousawi Information Technology Regulation Directory—Communication and Media Commission of Iraq (CMC), Baghdad, Iraq
xxvi Editors and Contributors
M. Ameena Banu Department of Electronics and Communication Engineering,Sethu Institute of Technology, Pulloor, Virudhunagar District, Tamilnadu, India
S. D. Amrutha Department of Electronics and Communication Engineering,Amrita Vishwa Vidyapeetham, Amritapuri, India
R. Anand Department of Information Technology, KCG College of Technology,Chennai, India
R. Ani Department of Computer Science and Applications, Amrita VishwaVidyapeetham, Kollam, India
B. S. Anisha Information Science and Engineering, R.V. College of Engineering,Bengaluru, India
P. Anitha Dr. N.G.P. Institute of Technology, Coimbatore, India
T. Anjali Department of Electronics and Communication Engineering, AmritaVishwa Vidyapeetham, Amritapuri, India
K. S. Anusha Department of Electronics and Communication Engineering, AmritaSchool of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
Kompalli Anusha Branch of WMC, G. Narayanamma Institute of Technologyand Science, JNTUH, Hyderabad, India
T. S. Aparna Department of Electronics and Communication Engineering, AmritaVishwa Vidyapeetham, Amritapuri, India
L. Arockiam Department of Computer Science, St. Joseph’s College, Trichy,India
M. Arulaalan CK College of Engineering & Technology, Cuddalore, India
V. Arulkumar Department of Information Technology, SSN College ofEngineering, Chennai, India
P. Aruna Department of Software Engineering, Periyar Maniammai Institute ofScience and Technology, Thanjavur, India
Vinit Asher Sardar Patel Institute of Technology, Mumbai, India
N. Ashokkumar Department of Electronics and Communication Engineering,Centre for VLSI and Embedded Systems, Sree Vidyanikethan Engineering College,Tirupati, India
Sigamani Ashokkumar Department of Computer Science and Engineering,Saveetha School of Engineering, SIMATS, Chennai, India
A. V. Aswin Muthoot Institute of Technology and Science, Ernakulam, India
H. S. Avani Department of Computer Science and Engineering, VidyavardhakaCollege of Engineering, Mysuru, Karnataka, India
Editors and Contributors xxvii
Khairul Islam Azam Department of Computer Science and Engineering,International Islamic University Chittagong, Chittagong, Bangladesh
S. Balaji Department of Electronics and Communications Engineering, AmritaVishwa Vidyapeetham, Amritapuri, India
Vignesh Balakrishnan Department of Information Technology, KCG College ofTechnology, Chennai, India
A. Balakumar K. Ramakrishnan College of Engineering, Trichy, India
Ananthakrishnan BalaSundaram Department of Computer Science andEngineering, Saveetha School of Engineering, SIMATS, Chennai, India
R. M. Banakar BVB College of Engineering and Technology, Hubli, India
Amit Barve Ramrao Adik Institute of Technology, Navi Mumbai, India
Sujit Kumar Basak Université du Québec à Montréal (UQÀM), Montreal,Canada
K. Y. Basil Muthoot Institute of Technology and Science, Ernakulam, India
Vanshita R. Baweja Computer Science, PEC University of Technology,Chandigarh, India
Sushant Bawiskar Department of Embedded Technology, VIT, Vellore, India
Chaithra Bekal Department of Computer Science and Engineering,Vidyavardhaka College of Engineering, Mysuru, Karnataka, India
Paul Bélanger Université du Québec à Montréal (UQÀM), Montreal, Canada
Sudhanshu Bhagat Information Technology, Terna Engineering College, NaviMumbai, India
R. Bhairavi Department of Electronics and Communication Engineering,Pondicherry Engineering College, Puducherry, India
N. Bhalaji Department of Information Technology, SSN College of Engineering,Chennai, India
Rajiv R. Bhandari Department of Computer Science Engineering, KoneruLakshmaiah Education Foundation Green Fields, Guntur District, Vaddeswaram,Andhra Pradesh, India
Rekha Bhandarkar Department of ECE, N.M.A.M.I.T, Nitte, India
Madiraju Akshay Bharadwaj Department of Electronics and CommunicationEngineering, Amrita School of Engineering, Kollam, Kerala, India
S. Bharath Departtment of Electronics and Communication Engineering, AmritaVishwa Vidyapeetham, Amritapuri, India
xxviii Editors and Contributors
N. Bhaskar Department of Information Technology, KCG College ofTechnology, Chennai, India
Rajesh Bhatia Computer Science, PEC University of Technology, Chandigarh,India
Prasenjit Bhavathankar Sardar Patel Institute of Technology, Mumbai, India
Sujata Bhavikatti Tontadarya College of Engineering, Gadag, India
K. Bhuvana Department of Computer Science and Engineering, VidyavardhakaCollege of Engineering, Mysuru, Karnataka, India
M. Bhuvaneshwar Department of Electronics and Communication Engineering,Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Coimbatore, India
Bhawani Sankar Biswal DST-FIST Bioinformatics Laboratory, IIITBhubaneswar, Bhubaneswar, India
Ranjit Biswas Department of Computer Science and Engineering, JamiaHamdard, New Delhi, India
Tanmay Borade Ramrao Adik Institute of Technology, Navi Mumbai, India
M. Bowya Department of ECE, Vivekanandha College of Engineering forWomen, Namakkal, India
P. S. Chaithanya School of Computing, Centre for Information Super Highway(CISH), SASTRA Deemed to be University, Thanjavur, Tamil Nadu, India
Ruthvik Chanda Department of Electronics and Communication Engineering,Amrita Vishwa Vidyapeetham, Amritapuri, India
K. Chandrasekaran Department of Computer Science and Engineering, NationalInstitute of Technology Karnataka, Surathkal, Mangalore, India
G. Charles Babu Department of CSE, Malla Reddy Engineering College(Autonomous), Secunderabad, Telangana, India
Swati Chavan IT Department, Terna Engineering College, Mumbai University,Navi Mumbai, Maharashtra, India
Amruta Chavan Department of IT Engineering, RAIT, Nerul, Navi Mumbai,India
Keerthana Chigateri Department of CSE, N.M.A.M.I.T, Nitte, India
A. Christy Jeba Malar Sri Krishna College of Technology, Coimbatore, TamilNadu, India
Dhananjay Dakhane Ramrao Adik Institute of Technology, Navi Mumbai, India
Pooja Dalvi IT Department, Terna Engineering College, Mumbai University, NaviMumbai, Maharashtra, India
Editors and Contributors xxix
Neelam Dayal Department of Computer Science & Engineering, Centre forAdvanced Studies, AKTU, Lucknow, India
Tribid Debbarma Department of Computer Science and Engineering, NationalInstitute of Technology Agartala, Agartala, India
S. Deeksha Department of Computer Science and Engineering, VidyavardhakaCollege of Engineering, Mysuru, Karnataka, India
M. Deepthi Department of Computer Science and Engineering, VidyavardhakaCollege of Engineering, Mysuru, Karnataka, India
Smita Deshmukh IT Department, Terna Engineering College, MumbaiUniversity, Navi Mumbai, Maharashtra, India
Santhosh L. Deshpande Department of Post Graduate Studies, VisvesvarayaTechnological University (VTU), Belgaum, Karnataka, India
M. Deva Priya Sri Krishna College of Technology, Coimbatore, Tamil Nadu,India
R. Devi Priya Department of Information Technology, Kongu EngineeringCollege, Erode, India
K. Dhanya K. Ramakrishnan College of Engineering, Trichy, India
E. Dhivyaprabha Sri Krishna College of Technology, Coimbatore, Tamil Nadu,India
J. Dhoulath Beegum Department of ECE, TKM College of Engineering, Kollam,Kerala, India
Ashwini Dhummal Department of Computer Science and Engineering,NMAMIT, Nitte, Karnataka, India
C. D. Divya Department of Computer Science and Engineering, VidyavardhakaCollege of Engineering, Mysuru, Karnataka, India
Nilima Dongre Department of IT Engineering, RAIT, Nerul, Navi Mumbai, India
Prutha Edwankar Department of Mechatronics Engineering, MPSTME, NMIMSUniversity, Mumbai, India
Vijaya Eligar KLE Technological University, Hubballi, India
Sanjay Eligar BVB College of Engineering and Technology, Hubli, India
B. Maragatha Eswari Department of Electronics and CommunicationEngineering, Amrita School of Engineering, Kollam, Kerala, India
R. Eswari National Institute of Technology, Tiruchirappalli, India
xxx Editors and Contributors
C. Suganthi Evangeline Karunya Institute of Technology and Sciences,Coimbatore, India;Vellore Institute of Technology, Vellore, India
R. Ezhilarasie School of Computing, SASTRA Deemed University, Thanjavur,India
K. Ben Franklin Department of Electronics and Communication Engineering,SRMIST, Kattankulathur, Chennai, India
Roopali Garg Associate Professor, UIET, Panjab University, Chandigarh, India
Mrudula Geddam Department of Electronics and TelecommunicationEngineering, Fr. C.R.I.T, Vashi, Navi, Mumbai, India
Ravi Teja Geesala Department of Electronics and Communication Engineering,Amrita Vishwa Vidyapeetham, Amritapuri, India
K. Geetha SASTRA Deemed to be University, Thanjavur, India
A. George Department of Mathematics, Periyar Maniammai Institute of Scienceand Technology, Thanjavur, India
E. George Dharma Prakash Raj Bharathidasan University, Tiruchirappalli,Tamilnadu, India
Jatin Gharat Ramrao Adik Institute of Technology, Navi Mumbai, India
Tushar Ghorpade Ramrao Adik Institute of Technology, Navi Mumbai, India
Md. Golam Rabiul Alam Department of Computer Science and Engineering,BRAC University, Dhaka, Bangladesh
Vamsi Gontu Department of Electronics and Communication Engineering,Amrita Vishwa Vidyapeetham, Amritapuri, India
Nivetha Gopalakrishnan Department of Electronics and CommunicationEngineering, University College of Engineering Panruti, Panruti, Tamilnadu, India
Vinodhini Gopalakrishnan Department of Computer Science Engineering,Annamalai University, Chidambaram, Tamilnadu, India
Priyanka Gotter Computer Engineering and Technology, Guru Nanak DevUniversity, Amritsar, Punjab, India
B. N. Gowrishankar Department of Information Science and Engineering,Vidyavardhaka College of Engineering, Mysuru, Karnataka, India
Aman Gupta Department of C.S.E, Guru Ghasidas Central University, Bilaspur,India
Saurabh Gupta Department of C.S.E, Guru Ghasidas Central University,Bilaspur, India
Editors and Contributors xxxi
Sorjeeta Gupta Department of Information Technology, KCG College ofTechnology, Chennai, India
V. J. Haran Muthoot Institute of Technology and Science, Kochi, India
D. Harini SASTRA Deemed to be University, Thanjavur, India
A. Harish Information Science and Engineering, R.V. College of Engineering,Bengaluru, India
Abhilash P. Hasankar Department of E&CE, SDMCET, Dharwad, Karnataka,India
Haider K. Hoomod Computer Science Department, College of Education—Mustansiriyah University, Baghdad, Iraq
Mohammad Emdad Hossain Department of Business Administration,International Islamic University Chittagong, Chittagong, Bangladesh
B. J. Hubert Shanthan Department of Computer Science, St. Joseph’s College,Trichy, India
Shivaraj Hublikar KLE Technological University, Hubballi, India
V. Indu Department of Electrical and Electronics Engineering, Amrita VishwaVidyapeetham, Amritapuri, India
Akshaykumar Jadhav IT Department, Terna Engineering College, MumbaiUniversity, Navi Mumbai, Maharashtra, India
Dipti Jadhav Department of IT Engineering, RAIT, Nerul, Navi Mumbai, India
Sandeep Jadhav KPIT Technologies Limited, Pune, Maharashtra, India
Ashish Jain Apex Institute of Engineering & Technology, Jaipur, India
Bhumika Jain Department of Computer Science and Engineering, VidyavardhakaCollege of Engineering, Mysuru, Karnataka, India
Aashish Jaisimha Information Science and Engineering, R.V. College ofEngineering, Bengaluru, India
B. Janet National Institute of Technology, Tiruchirappalli, India
Gaurav Jariwala Sarvajanik College of Engineering and Technology, Surat, India
N. Jayapandian Department of Computer Science and Engineering, CHRIST(Deemed to Be University), Bangalore, India
C. Jeyalakshmi K. Ramakrishnan College of Engineering, Trichy, India
Saksham Jhawar Information Science and Engineering, R.V. College ofEngineering, Bengaluru, India
xxxii Editors and Contributors
Priyanka Jondhale Department of Electronics and TelecommunicationEngineering, Fr. C.R.I.T, Vashi, Navi, Mumbai, India
Christy James Jose Government Engineering College, Barton Hill,Thiruvananthapuram, Kerala, India
Deepa Jose Electronics and Communication, KCG College of Technology,Chennai, India
K. Joseph Abraham Sundar Computer Vision & Soft Computing Lab, School ofComputing, SASTRA Deemed University, Thanjavur, India
Bharti Joshi Ramrao Adik Institute of Technology, Navi Mumbai, India
K. Jyothsna Department of Electronics and Communication Engineering, AmritaVishwa Vidyapeetham, Amritapuri, India
Poonam Kadam Department of Electronics and Telecommunication, DwarkadasJ. Sanghvi College of Engineering, Mumbai, India
Subhas Kadam Department of Computer Science and Engineering, NMAMIT,Nitte, Karnataka, India
Arun Kakhandki KLSs VDRIT, Haliyal, India
Md. Kalim Amzad Chy Department of Computer Science and Engineering,International Islamic University Chittagong, Chittagong, Bangladesh
G. Kanagaraj Kumaraguru College of Technology, Coimbatore, India
Kamalanathan Kandasamy Amrita Center for Cyber Security Systems &Networks, Amrita Vishwa Vidyapeetham, Amrita University, Kollam, Kerala, India
J. Kanimozhi Department of IT, Adhiyamaan College of Engineering, Hosur,Tamilnadu, India
A. Kannammal Department of Computer Science and Engineering, JayamCollege of Engineering and Technology, Dharmapuri, TamilNadu, India
V. Karthick Department of Computer Science and Engineering, Saveetha Schoolof Engineering, Saveetha Institute of Medical and Technical Sciences, Chennai,India
K. Karthika Department of Information Technology, Adhiyamaan College ofEngineering, Hosur, India
A. Karthikeyan School of Electronics Engg, VIT, Vellore, Tamil Nadu, India;Department of Embedded System Technologies, VIT, Vellore, India
B. Karthikeyan Computer Vision & Soft Computing Lab, School of Computing,SASTRA Deemed University, Thanjavur, India
V. Karthikeyan Department of ECE, Vivekanandha College of Engineering forWomen, Namakkal, India
Editors and Contributors xxxiii