Disruptive technologies in Computing and Communication Systems
eBook - ePub

Disruptive technologies in Computing and Communication Systems

Proceedings of the 1st International Conference on Disruptive technologies in Computing and Communication Systems

  1. 458 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Disruptive technologies in Computing and Communication Systems

Proceedings of the 1st International Conference on Disruptive technologies in Computing and Communication Systems

About this book

The 1st International Conference on Disruptive Technologies in Computing and Communication Systems (ICDTCCS - 2023) has received overwhelming response on call for papers and over 119 papers from all over globe were received. We must appreciate the untiring contribution of the members of the organizing committee and Reviewers Board who worked hard to review the papers and finally a set of 69 technical papers were recommended for publication in the conference proceedings. We are grateful to the Chief Guest Prof Atul Negi, Dean โ€“ Hyderabad Central University, Guest of Honor Justice John S Spears -Professor University of West Los Angeles CA, and Keynote Speakers Prof A. Govardhan, Rector JNTU H, Prof A.V.Ramana Registrar โ€“ S.K.University, Dr Tara Bedi Trinity College Dublin, Prof C.R.Rao โ€“ Professor University of Hyderabad, Mr Peddigari Bala, Chief Innovation Officer TCS, for kindly accepting the invitation to deliver the valuable speech and keynote address in the same. We would like to convey our gratitude to Prof D. Asha Devi - SNIST, Dr B.Deevena Raju โ€“ ICFAI University, Dr Nekuri Naveen - HCU, Dr A.Mahesh Babu - KLH, Dr K.Hari Priya โ€“ Anurag University and Prof Kameswara Rao โ€“SRK Bhimavaram for giving consent as session Chair. We are also thankful to our Chairman Sri Teegala Krishna Reddy, Secretary Dr. T.Harinath Reddy and Sri T. Amarnath Reddy for providing funds to organize the conference. We are also thankful to the contributors whose active interest and participation to ICDTCCS - 2023 has made the conference a glorious success. Finally, so many people have extended their helping hands in many ways for organizing the conference successfully. We are especially thankful to them.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weโ€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere โ€” even offline. Perfect for commutes or when youโ€™re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Disruptive technologies in Computing and Communication Systems by K. Venkata Murali Mohan,M. Suresh Babu in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Table of contents

  1. Cover Page
  2. Half Title page
  3. Title Page
  4. Copyright Page
  5. Contents
  6. List of Figures
  7. List of Tables
  8. Preface
  9. 1. Spatiotemporal Mobility Based Trajectory Privacy-Preserving in Ubiquitous Computing Environment
  10. 2. Usage of Artificial Neural Networks to Detect Fake Social Media Accounts
  11. 3. Performance Evaluation of Text Classifier for NLP using Machine Learning Techniques
  12. 4. A Secure AOMDV Protocol's Design and Implementation in Mobile Adhoc Network Cryptography
  13. 5. Enhancing Cyber security: Evaluating Machine Learning Algorithms for Effective Threat Detection and Classification
  14. 6. AI Based Improved Vehicle Detection and Classification in Patterns Using Deep Learning
  15. 7. Enhancing Cyber security: Evaluating Machine Learning Algorithms for Effective Threat Detection and Classification
  16. 8. Machine Learning Technique for Parkinson's Disease Prediction
  17. 9. Detection and Prevention of DDoS Attacks in Software-Defined Cloud Networks Using Advanced Support Vector Machine
  18. 10. An Efficient Early Software Reliability Prediction using Particle Swarm Optimization (PSO)
  19. 11. Enhanced Decision-Making and Predictive Analytics in IoT Implementing Random Forest Classifier
  20. 12. A Survey of IoT Considerations, Requirements, Architectures and Their Potentials for Machine Learning Applications
  21. 13. Design and Implementing of Brain Tumor Detection with Multilevel Roi-Based Features Using ANN
  22. 14. Role of Machine Learning in Food Industry: A Survey
  23. 15. An Intrusion Detection System Using Principal Component Analysis and Extreme Gradient Boosting
  24. 16. A Cloud Computing Hierarchical Hybrid Intrusion Detection System Using Machine Learning
  25. 17. Design and Development of Secured Blockchain-based Platform in Edge Computing Environment
  26. 18. Event Cameras for Parkinson's Disease Diagnosis: A Preliminary Study
  27. 19. Novel Computer Vision and Color Image Segmentation for Agriculture Application
  28. 20. Attention-based Multi-Task CNN U-Net for Kidney Tumor Segmentation and Classification
  29. 21. A critical Analysis for Early Chronic Liver Disease Detection by using Machine Learning Techniques
  30. 22. Internet of Vehicle Ad Hoc Networks (VANETs): Anomaly Detection Algorithms
  31. 23. Supervisory Approach Applying AWS Services
  32. 24. Summarizing Customer Reviews Based on Feature Extraction and Opinion Mining for Online Products
  33. 25. Secure Efficient and Cloud-Centric Smart Healthcare System with Public Verifiability and Internet of Medical Things (IoMT)
  34. 26. Pancreatic Cancer Disease Prediction with Ensemble Learning and Regularization Techniques for Outlier Handling and Overfitting Mitigation
  35. 27. Integrating Sentiment Analysis and LSTM to Predict Price Movements in Stocks
  36. 28. Enhancing Disease Prediction Accuracy: Leveraging Random Forest Out of Bag for Early Detection and Diagnosis in Healthcare
  37. 29. Effective Unauthorized Vehicle Detection System for Intelligent Transportation
  38. 30. Privacy and Security in Intelligent Devices
  39. 31. Accident Analysis and Detection System Based on Traffic Surveillance Videos
  40. 32. A Comprehensive Survey on Brain Tumor Classification from MRI Images Using Artificial Intelligence
  41. 33. Performance Analysis of Text Classification Machine Learning Models
  42. 34. A Secure Routing Machine Learning Algorithms for Driverless Vehiclesform
  43. 35. GUI Based Market Movement Using Digital and Binarynonlinear
  44. 36. Extracting Trending Topics from Social Media Posts Using Word Embedding Based Clustering
  45. 37. Heart Disease Prediction System Using Machine Learning
  46. 38. A Systematic Review on Predicting Skin Cancer Disease Using Deep Learning
  47. 39. Privacy Preservation in Dynamic Data Through Synonymous Linkage on Micro Aggregation
  48. 40. Design a Secure Authentication Protocol for Blockchain Based Sharing of Electronic Health Records
  49. 41. Enhanced Feature Based Attribute Encryption for Data Privacy and Access Control
  50. 42. Image Forgery Detection Using Sobel Edge Detection, Feature Extraction
  51. 43. K Nearest Neighbour: A Dynamic Model
  52. 44. A Survey on Efficient Memory Management in Large-Scale Deep Learning Optimization
  53. 45. Firmware Security: Challenges, Vulnerabilities, and Mitigation Strategiesaddress
  54. 46. Designing a Multi-Sensor Based Wireless Sensor Network System for Monitoring the Wellness of Elderly Individuals: Experimental Studiesdaily
  55. 47. Transfer Learning Based Kidney Stone Detection in Patients Using ResNet50 with Medical Images 47
  56. 48. System for Managing Batteries in Electric Vehiclesover
  57. 49. Improved Light Weight Crypto System for Secure Image Sharing Using IoTpeople.
  58. 50. An Approach to Recognize Hand Gestures Using Convolution Neural Networks and Recurrent Neural Networks
  59. 51. Comparative Study of Spatial and Frequency DomainImage Steganography Techniques on Grayscale Images
  60. 52. Molecular Interactions in Binary Liquid Mixtures
  61. 53. ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks
  62. 54. Enhanced Power Quality Management with DSTATCOM and Model Predictive Control
  63. 55. Design and Implementation of Area Efficient MAC Unit Using Reversible Logic Gates
  64. 56. A Novel Bionic Eye with a Nanowire Array Artificial Retinal Regeneration
  65. 57. ICU Monitoring System Using Zynq Architecture Based SoC
  66. 58. Noise Cancellation of Electrocardiogram Signal Using Moving Average Filter
  67. 59. The Smart Home Technology by WSN and GSM Using Mobile Applications MAN
  68. 60. Grid-connected Single-stage PV System
  69. 61. Reliability Evaluation of Distribution System Using Micro-Grid Model
  70. 62. Design of Electrical Vehicle Lithium Battery Charger Using MATLAB Simulink
  71. 63. Design of Highly Isolated Wearable Textile MIMO Antenna for Portable Wireless Applications in Sub-6GHz Band
  72. 64. Brain Tumor Based on Berkley Wavelet Transformation by Using Image Processing
  73. 65. Enhancing Visual Features Investigating the Synergy of Gamma Correction and Wavelet Transform in Image Enhancement
  74. 66. Numerical study of MHD Stagnation-Point Flow of Nanofluid Flow Past a 3-D Sinusoidal Cylinder with Thermophoresis and Brownian Motion Effects
  75. 67. Network Slicing in 5G for the Emerging Commercial Needs and Networking Challenges
  76. 68. Digital Electronic Voting Machine Using Verilog
  77. 69. Live Sketch for Computer Vision