Skip to main content
Top

International Conference on Innovative Computing and Communications

Proceedings of ICICC 2022, Volume 3

  • 2023
  • Book

About this book

This book includes high-quality research papers presented at the Fifth International Conference on Innovative Computing and Communication (ICICC 2022), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on February 19–20, 2022. Introducing the innovative works of scientists, professors, research scholars, students and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.

Table of Contents

Next
  • 1
  • current Page 2
  • 3
  • 4
Previous
  1. Effective Data-Sharing Method for Multiple ICR Management in Autonomous Distributed Control Systems

    Takaaki Kawano, Daiki Nobayashi, Takeshi Ikenaga
    The chapter discusses the challenges of managing multiple ICRs in autonomous distributed control systems, highlighting the need for efficient data-sharing methods. It introduces a sink node-based approach that aggregates and delivers data, reducing wireless communication loads and ensuring reliable information exchange. The proposed method, validated through simulations, demonstrates significant improvements in data packet arrival ratios and reduced communication overhead compared to existing methods.
  2. Applicability of Communication Technologies in Internet of Things: A Review

    Parul Jhingta, Amol Vasudeva, Manu Sood
    The chapter 'Applicability of Communication Technologies in Internet of Things: A Review' delves into the diverse communication technologies essential for IoT, such as RFID, NFC, Bluetooth, Zigbee, LPWAN, Wi-Fi, and cellular communication. It offers a comprehensive analysis of each technology's communication range, frequency spectrum, power consumption, and security features. A comparative study of these technologies is presented, emphasizing their strengths and weaknesses in various IoT applications. The chapter also discusses the security challenges faced by these technologies and the need for enhanced security solutions in the future. This detailed exploration of IoT communication technologies provides valuable insights for professionals seeking to optimize their IoT applications.
  3. A KNN-Based Intrusion Detection Model for Smart Cities Security

    Mohamed Abdedaime, Ahlam Qafas, Mounir Jerry, Azidine Guezzaz
    The chapter delves into the development of a K-NN-based intrusion detection model tailored for smart cities. It begins by highlighting the importance of big data and IoT in transforming urban services and the challenges they pose for security. The authors propose a hybrid approach using K-NN to distinguish between normal and abnormal activities, enhancing detection accuracy. The methodology involves data collection, preparation, and training, with the K-NN algorithm at its core. Experimental results demonstrate the model's superior performance compared to traditional methods like SVM and DT, showcasing its potential to secure smart city networks effectively. The chapter concludes with insights into future work, focusing on improving data quality techniques to bolster detection accuracy.
  4. Design of Asymmetric Microstrip Quad-Band Reconfigurable Antenna

    D. P. Derish, G. Shine Let, C. Benin Pratap, J. John Paul
    The chapter focuses on the design and analysis of an asymmetric microstrip quad-band reconfigurable antenna. The antenna incorporates ideal switches to achieve frequency reconfigurability, enabling operation across four distinct frequency bands: 6, 5.3, 3.38, and 2.84 GHz. The design utilizes a hook-shaped radiating strip and a partial ground plane, with the radiating strip length altered by the switching conditions. The chapter presents a comprehensive analysis of the antenna's performance, including reflection coefficient characteristics, current distribution, and radiation patterns under different switching states. The antenna's efficiency and gain are also evaluated, demonstrating its suitability for wireless communication applications such as WLAN and 5G. The use of ideal switches in the design is highlighted, with future work suggesting the integration of PIN diode RF switches for practical implementation.
  5. COVID-19 and Associated Lung Disease Classification Using Deep Learning

    Yogesh H. Bhosale, Priya Singh, K. Sridhar Patnaik
    The chapter delves into the application of deep learning to diagnose lung diseases, particularly COVID-19, through chest X-ray images. It introduces the DenseNet169 architecture, which is employed to classify nine different lung diseases with high accuracy. The methodology involves data collection, preprocessing, and model training, with a focus on performance metrics such as accuracy, precision, recall, and specificity. The study highlights the potential of deep learning in enhancing diagnostic accuracy and efficiency, especially in the context of the COVID-19 pandemic. The chapter also discusses the limitations and future directions of the proposed model, making it a valuable resource for researchers and practitioners in the field of medical imaging and artificial intelligence.
  6. Type 2 Diabetes Prediction Using Machine Learning and Validation Using Weka Tool

    Govind Madhav, Shalini Goel
    The chapter delves into the growing prevalence of Type 2 Diabetes (T2D) and its associated risk factors, emphasizing the importance of early detection through machine learning techniques. It explores various machine learning algorithms, including logistic regression, decision trees, and support vector machines, to predict T2D using a dataset from Vanderbilt University. The study compares the performance of these algorithms using both Python's sklearn library and the Weka tool, highlighting the superior accuracy of logistic regression. The chapter also discusses the implications of T2D and the potential for developing web-based applications to predict and manage the disease, offering valuable insights for healthcare professionals and researchers alike.
  7. DroidApp: An Efficient Android Malware Detection Technique for Smartphones

    Manish Kumar, Kakali Chatterjee, Ashish Singh
    The chapter 'DroidApp: An Efficient Android Malware Detection Technique for Smartphones' introduces a novel method for detecting malicious Android applications. By employing a graph-based approach, the DroidApp model reduces computational costs and execution times, making it a highly efficient tool for malware detection. The model is validated using the Drebin dataset, demonstrating superior performance in accuracy, precision, recall, and AUC compared to existing methods. This chapter provides a comprehensive analysis of the model's algorithms and results, highlighting its potential to revolutionize the field of mobile malware detection.
  8. A Hybrid Approach to Optimize Handover Margin in UWSN by Integration of ACO with PSO and MVO: A Comparative Analysis

    Seema Rani, Anju, Anupma Sangwan
    The chapter delves into the optimization of handover margin in Underwater Wireless Sensor Networks (UWSNs) using a hybrid approach that combines Ant Colony Optimization (ACO) with Particle Swarm Optimization (PSO) and Multi-Verse Optimizer (MVO). The introduction outlines the critical role of UWSNs in monitoring underwater environments and the challenges they face, such as high costs and equipment failures. The optimization techniques, including PSO, MVO, and ACO, are explained in detail, highlighting their potential to enhance network performance. The proposed model integrates these techniques to optimize handover margin, reduce training time, and increase accuracy. The results and discussions showcase the effectiveness of the hybrid approach, with a particular focus on energy efficiency. The chapter concludes by emphasizing the scalability and flexibility of the proposed solution and its potential for future research in underwater wireless sensor networks.
  9. Cyber Risks and Security—A Case Study on Analysis of Malware

    Moulik Agrawal, Karan Deep Singh Mann, Rahul Johari, Deo Prakash Vidyarthi
    The chapter delves into the intricate world of malware, with a particular focus on Keylogger and Adware. It begins by defining malware and its various types, setting the stage for an in-depth analysis of Keylogger and Adware. The authors demonstrate how these malicious software programs can be used to monitor user activity and display unwanted advertisements, respectively. Real-world case studies, such as the Anthem data breach and the Slammer adware incident, are highlighted to underscore the severe consequences of malware attacks. The chapter also provides a step-by-step guide on how to create and disguise these malware programs, offering a unique perspective on their functionalities. Furthermore, it discusses the social implications of cyber threats, particularly in the context of the COVID-19 pandemic. The authors conclude by proposing prevention techniques to safeguard against such malware, making this chapter a valuable resource for anyone looking to understand and combat these cybersecurity threats.
  10. Hybrid Technique for Human Activities and Actions Recognition Using PCA, Voting, and K-means

    Navjot Kaur Sekhon, Gurpreet Singh
    The chapter delves into the critical role of human activity recognition in various domains, such as senior citizen monitoring and smart home technology. It introduces a hybrid technique that leverages Principal Component Analysis (PCA) for dimensionality reduction, K-means for clustering, and a voting classifier for robust classification. The method addresses the challenge of high-dimensional feature vectors by employing filter and wrapper methods for feature selection. The proposed framework is validated through experiments, demonstrating superior accuracy, precision, and recall compared to traditional logistic regression models. The chapter also provides a detailed review of existing human activity recognition techniques, setting the stage for the innovative hybrid approach presented.
  11. Efficient Authenticated Key Agreement Protocol for Cloud-Based Internet of Things

    V. Muthukumaran, V. Vinoth Kumar, Rose Bindu Joseph, Meram Munirathnam, I. S. Beschi, V. R. Niveditha
    The chapter delves into the critical need for secure and efficient data transmission in cloud-based Internet of Things (IoT) systems. It introduces an innovative authenticated key agreement protocol that integrates encryption and digital signatures, thereby reducing computational costs and enhancing security. The protocol is based on the intractability of the Discrete Logarithm Problem (DLP) and extends the principle of authenticated key agreement to elliptic curve cryptography. The methodology focuses on safeguarding IoT devices and systems, addressing the unique security challenges posed by IoT data storage architecture. The proposed scheme is compared with existing methods, demonstrating superior performance in terms of security features and computational cost. The chapter concludes by highlighting the practical implementation of the protocol in a standard CIoT-based network, showcasing its effectiveness in maintaining data integrity and secrecy.
  12. Atamnirbhar Gaon—An Inhouse Employment Tool for Migrant Workers

    Bhawna Suri, Shweta Taneja, Gaurav Dhingra, Ankush Goyal, Bhavay Sharma
    The chapter delves into the pressing issue of rural-to-urban migration driven by lack of job opportunities and low agricultural returns. It introduces the Atamnirbhar Gaon application, a innovative tool designed to connect rural job seekers with local employers. The application supports multiple languages and voice commands, making it accessible to a broad audience. It also provides essential information on current market trends, expert agricultural advice, and vaccination awareness. The chapter includes a case study from Bakkas village in Uttar Pradesh, demonstrating the application's potential to transform rural employment landscapes. The successful pilot test highlights the application's feasibility and potential impact on reducing urban migration and promoting self-reliant villages.
  13. Deep Learning Approach for Early Diagnosis of Jaundice

    Dhananjay Kalbande, Anuradha Majumdar, Pradeep Dorik, Prachi Prajapati, Samira Deshpande
    The chapter delves into the significance of early diagnosis of jaundice, a condition characterized by elevated bilirubin levels, affecting both newborns and adults. It provides an in-depth look at the pathophysiology and global impact of jaundice, highlighting its severe consequences such as kernicterus. The authors introduce two advanced deep learning models—ResNet50 and Detectron2—for detecting jaundice in eye images. These models demonstrate high accuracy and precision, offering a promising, non-invasive approach to early diagnosis. The chapter concludes by emphasizing the potential of these AI-based tools to enhance medical interventions and improve patient outcomes.
  14. Recent Trends in Opinion Mining using Machine Learning Techniques

    Sandeep Kumar, Nand Kumar
    The chapter delves into the evolution of opinion mining, a critical aspect of data mining that focuses on extracting and understanding public sentiments. It reviews various machine learning techniques, such as Naive Bayes, Support Vector Machines, and deep learning models, and their applications in sentiment classification. The authors discuss the challenges faced in opinion mining, including spam detection and data imbalance, and highlight the potential of advanced deep learning models to address these issues. The chapter also explores the wide-ranging applications of opinion mining, from product and service improvements to policy-making and market analysis, making it a valuable resource for professionals seeking to leverage sentiment analysis in their fields.
  15. Auto Surveillance Using IoT

    Eldho Paul, M. S. Kalepha, T. Naveenkumar, Mugeshbabu Arulmani
    The chapter delves into the advancements of IoT in security systems, highlighting the increasing demand for surveillance due to rising theft rates. It discusses the integration of PIR sensors and GPS for real-time monitoring and alert systems, showcasing a smart surveillance solution that detects unwanted movements and sends alerts to users. The proposed system, using the Esp8266 NodeMCU module, analyzes data from sensors and sends it to the ThingSpeak website, enabling users to monitor and receive notifications via SMS. The chapter also provides a comparative analysis of existing systems and explores the future potential of IoT in security, including video recording and remote monitoring.
  16. Density-Based Traffic Control System Using Artificial Intelligence

    R. S. Sabeenian, R. Ramapriya, S. Swetha
    The chapter delves into the pressing issue of traffic congestion, highlighting the inefficiencies of current traffic control methods. It introduces a novel density-based traffic control system that leverages AI and real-time data from CCTV cameras to optimize traffic signal timing. The proposed system uses the YOLO model for vehicle detection and a custom algorithm for signal time scheduling. Extensive simulations demonstrate the system's superior performance compared to existing static systems, with improvements of up to 38% in certain scenarios. The chapter also discusses potential enhancements and future directions for the system, making it a valuable resource for professionals seeking innovative solutions to traffic management challenges.
  17. Crypto-Economic Model for Data Security in IoT Network

    Sonam, Rahul Johari
    This chapter introduces a Crypto-Economic Model designed to bolster data security in IoT networks. It begins by explaining the Internet of Things (IoT) and its various applications, highlighting the need for robust security measures. The literature survey discusses existing cryptographic techniques and their effectiveness against attacks. The core of the chapter focuses on securing routing in IoT, particularly through the MQTT protocol, and introduces two novel cryptography algorithms to enhance security. The proposed model not only ensures data integrity and confidentiality but also measures the economic value of records, making it a standout solution in the field of IoT security. The chapter concludes by emphasizing the reliability and efficiency of the proposed model, encouraging further exploration and implementation in real-world IoT applications.
  18. Speedy and Secure Remote Management Protocol Using Virtualization

    K. Sudharson, S. Balaji, A. Deepak Reddy, V. Sai Ram
    The chapter introduces a framework for secure remote management of computers using virtualization, specifically focusing on the use of VNC for remote desktop access. It discusses the advantages of this approach, such as high-quality screen capturing and minimal latency, and compares it to existing solutions like Microsoft RDP. The experimental outcomes demonstrate the effectiveness of the proposed solution in handling multiple clients efficiently, highlighting its potential for various applications, including remote support and virtual teaching methods.
Next
  • 1
  • current Page 2
  • 3
  • 4
Previous
Title
International Conference on Innovative Computing and Communications
Editors
Deepak Gupta
Ashish Khanna
Aboul Ella Hassanien
Sameer Anand
Ajay Jaiswal
Copyright Year
2023
Publisher
Springer Nature Singapore
Electronic ISBN
978-981-19-3679-1
Print ISBN
978-981-19-3678-4
DOI
https://doi.org/10.1007/978-981-19-3679-1

Accessibility information for this book is coming soon. We're working to make it available as quickly as possible. Thank you for your patience.