Third International Conference, ICACDS 2019, Ghaziabad, India, April 12-13, 2019, Revised Selected Papers,
First Statement of Responsibility
edited by Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer Ören, Rekha Kashyap.
Volume Designation
Part II /
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Singapore :
Name of Publisher, Distributor, etc.
Springer Singapore,
Date of Publication, Distribution, etc.
2019
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource (XX, 752 pages) :
Other Physical Details
426 illustrations, 245 illustrations in color
SERIES
Series Title
Communications in computer and information science ;
Volume Designation
1046
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index.
CONTENTS NOTE
Text of Note
Intro; Preface; Organization; Contents -- Part II; Contents -- Part I; Advanced Computing; A Face Detection Using Support Vector Machine: Challenging Issues, Recent Trend, Solutions and Proposed Framework; Abstract; 1 Introduction; 2 Literature Review; 3 Face Detection Approaches; 4 Challenging Issues; 5 Recent Trends; 6 Proposed Framework; 7 Conclusion and Future Work; References; Empirical Study of Test Driven Development with Scrum; Abstract; 1 Introduction; 2 Related Work; 3 Interaction Model; 4 Implementation; 5 Comparison in Terms of Quality and Duration; 6 Conclusion; References
Text of Note
3 Maximin Distance Classifier3.1 Maximin Distance Classifier Algorithm; 4 Fuzzy C-Means Clustering; 5 Bat Based Fuzzy C-Means; 6 Proposed Work; 6.1 Hybrid Clustering Algorithm Using Bat Based Randomized Fuzzy C-Means Algorithm and Maximin Distance Classifier Algorithm; 7 Results and Comparisons; 8 Conclusion; References; Network Motifs: A Survey; Abstract; 1 Introduction; 2 Preliminaries; 3 Application Areas; 4 Applications; 4.1 Motifs in Vehicular Technology [41]; 4.2 Temporal Motifs in Communication Network [18]; 4.3 Spatio Temporal Network Motif Reveals the Biological Traits [16]
Text of Note
3.1 Healthcare3.2 AADHAR Card -- Database Breach; 3.3 ATM Hijacking; 4 Summary of Vulnerabilities; 5 Proposed Preventive Measures; 6 Conclusion and Future Work; Acknowledgement; References; Recognition of Hand Gestures and Conversion of Voice for Betterment of Deaf and Mute People; Abstract; 1 Introduction; 2 Related Works; 3 Gesture Recognition Techniques; 3.1 Glove Based Methods; 3.2 Vision-Based Method; 4 Basic Concepts; 4.1 Grayscaling; 4.2 Canny Edge Detection; 4.3 Gaussian Blur; 5 Proposed System Architecture and Results; 5.1 Image Acquirer; 5.2 Image Processor; 5.3 Feature Extractor
Text of Note
5.4 Image Classifier5.5 Recognition; 6 Conclusion; References; General Outlook of Wireless Body Area Sensor Networks; Abstract; 1 Introduction; 2 The General Architecture of the Healthcare System; 3 Wireless Body Area Sensor Networks (WBASNs); 3.1 Security of WBASN; 4 Need for Security and Privacy of WBASNs; 4.1 Data Storage Threats for WBANs; 4.2 Data Access Security Requirements; 4.3 Other Requirements; 4.4 Open Areas for Research; 5 Summary; References; Hybrid Fuzzy C-Means Using Bat Optimization and Maxi-Min Distance Classifier; 1 Introduction; 2 Related Works
Text of Note
Microprocessor Based Edge Computing for an Internet of Things (IoT) Enabled Distributed Motion ControlAbstract; 1 Introduction; 1.1 Related Work; 2 Work Procedure; 2.1 PMDC Motor Prototype; 2.2 System Identification and PI Controller Design for the PMDC Motor; 3 Proposed Method for PI Controller Integration with IoT Technology; 3.1 Edge Level; 3.2 Gateway Level; 3.3 Cloud Level; 4 Conclusion; References; Cyber Threat Analysis of Consumer Devices; Abstract; 1 Introduction; 2 Smart Home Threat Analysis; 2.1 Smart Lock; 2.2 Smart Thermostat; 2.3 Smart Bulb; 3 Other Cyber-Attacks on IoT Devices
0
8
8
8
8
SUMMARY OR ABSTRACT
Text of Note
This is part 2 of a two-volume set (CCIS 1045 and CCIS 1046) that constitutes the refereed proceedings of the Third International Conference on Advances in Computing and Data Sciences, ICACDS 2019, held in Ghaziabad, India, in April 2019. The 112 full papers were carefully reviewed and selected from 621 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.