Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download

Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download

Microsoft Safety Scanner 1.347 Crack Free Security Tools. Microsoft Safety Scanner KeepVid Pro 8.1 Crack 2022 Registration Key Lifetime Free Download. Pinnacle Studio 25.0.1.211 Crack With Serial Number 2022 Free Download Latest Microsoft Safety Scanner 1.347.107.0 Crack Full Free Download Latest. Microsoft Safety Scanner 1.349.2146.0 Crack With Keygen Download 2022 Microsoft Safety There are loads of free antivirus programs.

Related Videos

Microsoft Safety Scanner, Free On-Demand Virus Scanner by Britec s1J

(1)

t1I

After applying Bayes’ theorem, Eq. 1 is given as      = arg max Pr t1I .Pr s1J

Microsoft Safety Scanner

Microsoft Safety Scanner 1.349.1231.0 (64-bit) Crack + Keygen Free Download

Microsoft Safety Scanner 1.349.1231.0 (64-bit) Crack Zero is a device built to discover and remove malware. Download it and run a scan and try to undo modifications made through dangers. The Microsoft Safety Scanner changed into made for emergencies wherein your computer was infected with malicious spyware programs or even an endemic. Also, you’re stuck for things to do to repair it. As a remaining inn, you may download this application on a one-of-a-kind computer, provide it a try to move it. Microsoft Safety Scanner 64bit is a scanning device made to find and remove malware from Windows computer systems. Download it and run a test and try to undo modifications made by way of risks. We advocate which you download Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download latest version of the device. This tool doesn’t replace your antimalware product, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. All these products also provide sturdy removal capacities.

Microsoft Safety Scanner isn’t alleged to be applied as a tool. Download the Microsoft Safety Scanner tool and execute it on your laptop; this is inflamed. Run the tool and see whether or not it ends up a hassle. It is going to suggest a treatment for your query, or it’ll isolate the problem. Follow the pointers if it affords any and whether or not or not it separates the hassle that you will try you’re looking to get your pc. The justification is sound earlier than moving it around. Still, it’s nonetheless traumatic as it shows that the device cannot be downloaded and stored earlier than the use of and upgrading, download a bundle, probably directly to a pc. The download includes the definitions within the degree that the program has downloaded the size.

 Microsoft Safety Scanner Keygen expires ten Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download on account that, you recognize, after downloading, it’s miles Microsoft. As a result of this, our hyperlinks take you immediately to Microsoft to ensure which you’ve were Adobe CS3 Design Premium crack serial keygen the most recent model. For actual-time safety, which facilitates to safeguard your private home or small business enterprise PCs from viruses, adware, viruses, and different malicious applications, download Microsoft Security Essentials. And that’s pretty tons it. The download includes all the trendy definitions at the point this system changed into downloaded, subsequently the massive download size. There’s no update facility inside it; as an alternative, the program will expire ten days after downloading, forcing you to download it again earlier than walking it.

Microsoft Safety Scanner Activation Key

Microsoft Security Scanner Activation Key is one of those tools that use virus definitions and technologies (such as the Microsoft Security Accessories Suite) but does not provide real-time protection. Download the correct version, double the requirements, and follow the instructions. Start a quick scan from a scan that you don’t trust and can’t find anything. The device will try to eliminate them when sick.

Microsoft Safety Scanner keygen Likewise, the latest version of Microsoft Safety Scanner consists of lightweight applications. Download the Microsoft Safety Scanner to detect potential threats on the computer. Microsoft Online Security deletes viruses, spyware, and other harmful files. The system will scan in a few minutes. Various statistical information is displayed in the Microsoft secure download file, such as: for example, the number of scanned data records, the number of affected and scanned files, and the start time and time.

Feature:

  • Easy to apply.
  • Protect the background.
  • Control mechanically updates.
  • Available in extra than 33 languages.
  • Secure security application for each person.
  • Massive collection of up to date capabilities.
  • Free from any error to interrupt you.
  • Completely supported all previous home windows.
  • Scans your PC by the usage of the maximum affecting tools.
  • The necessity for every PC user.
  • Provide your complete-time protection against malware.
  • Give full safety for your property or small enterprise PCs.
  • Full depended on and well co-operative malware detecting tool.
  • Hold you a complete replacement and guard against all affected troubles.
  • Free Registration and no period and situations follow.

Microsoft Safety Scanner

Latest Feature:

  • The software presentations a few data a bit just like the accessible record
  • The quantity of inflamed & scanned folder, begin time + time.
  • What’s higher significant that the Microsoft Safety simple is highly powerful
  • This doesn’t suggest it’s attending to trade an antivirus product ultimately.
  • There’s no time protection to be had &, later, began for the very 1st time.
  • It might use for ten days.
  • Microsoft Safety Scanner works ideally like 7, Vista, and XP, and not using a requirement for administrator privileges.
  • The Microsoft Safety Scanner can also be a free safety device that gives on-demand scanning and assists in disposing of malicious applications, adware, and viruses.
  • It works along with your modern-day anti-virus software program.

Microsoft Safety Scanner Activation Key:

OIUTY-ERWRT-YUIOU-TYERR-TYUIO UTREW-RYUIY-RERTY-UIUTY-RERTY UIYTR-ETYUI-YTRET-YUYTR-YUYTR TYUYU-TRTYU-GHJKJ-GFDHJ-GFDGH

Microsoft Safety Scanner Serial Key:

YUIDE-GFTRH-JYGUF-TRYUI-ZAGWE Star Wars Jedi: Fallen Order (PC) Dublado | Download Torrent SRTYB-UICRT-VYNUI-MOCRT-VBYGU IMOCR-VTBYN-UMHIO-XCRTV-BYUNZ

How to install & Crack?

  • First of all, Click to the Download button.
  • Now click it and Download it on your computer.
  • After that, Installinto your System
  • Run and Check it
  • Enjoy and Done

Official Download t1I

(2)

t1I

    Equation 2 provides the language model Pr t1I and the target model Pr s1J Crack Download

Источник: [https://torrent-igruha.org/3551-portal.html]

Information and Communication Technology for Intelligent Systems: Proceedings of ICTIS 2020, Volume 2 [1st ed.] 9789811570612, 9789811570629

Table of contents :
Front Matter .Pages i-xxii
Internet of Things: Challenges, Security Issues and Solutions (Sweta Singh, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Rakesh Kumar).Pages 1-16
Modeling and Performance Evaluation of Auction Model in Cloud Computing (Gagandeep Kaur).Pages 17-23
Framework for Resource Management in Cloud Computing (Gagandeep Kaur).Pages 25-32
Unique Ableton Live 11.0.2 Crack With Keygen [Win/Mac] Free Download Key Generation from Fingerprint Image in Image Steganography (A. Anuradha, Hardik B. Pandit).Pages 33-42
Self-powered IoT-Based Design for Multi-purpose Smart Poultry Farm (Tajim Md. Niamat Ullah Akhund, Shouvik Roy Snigdha, Md. Sumon Reza, Nishat Tasnim Newaz, Mohd. Saifuzzaman, Masud Rana Rashel).Pages 43-51
Phrase-Based Statistical Machine Translation of Hindi Poetries into English (Rajesh Kumar Chakrawarti, Pratosh Bansal, Jayshri Bansal).Pages 53-65
A Smart Education Model for Future Learning and Teaching Using IoT (Swati Jain, Dimple Chawla).Pages 67-75
Internet of Things (IoT)-Based Advanced Voting Machine System Enhanced Using Low-Cost IoT Embedded Device and Cloud Platform (Miral M. Desai, Jignesh J. Patoliya, Hiren K. Mewada).Pages 77-86
IoT: Security Issues and Challenges (Er Richa).Pages 87-96
Coronary Artery Disease Prediction Using Neural Network and Random Forest-Based Feature Selection (Aman Shakya, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Neerav Adhikari, Basanta Joshi).Pages 97-105
A Collaborative Approach to Decision Making in Decentralized IoT Devices (Venus Kaurani, Himajit Aithal).Pages 107-115
Analysis of MRI Images for Brain Tumor Detection Using Fuzzy C-Means and LSTM (Sobit Thapa, Sanjeeb Prasad Panday).Pages 117-125
A Survey on Recognizing and Significance of Self-portrait Images (Jigar Bhatt, Mangesh Bedekar).Pages 127-138
Anomaly Detection in Distributed Streams (Rupesh Karn, Suvrat Ram Joshi, Umanga Bista, Basanta Joshi, Daya Sagar Baral, Aman Shakya).Pages 139-147
Envisaging Bugs by Means of Entropy Measures (Anjali Munde).Pages 149-156
TRANSPR—Transforming Public Accountability Through Blockchain Technology (P. R. Sriram, N. J. Subhashruthi, M. Muthu Manikandan, Karthik Gopalan, Sriram Kaushik).Pages 157-166
The Scope of Tidal Energy in UAE (Abaan Ahamad, A. R. Abdul Rajak).Pages 167-175
Knowledge Engineering in Higher Education (Shankar M. Patil, Vijaykumar N. Patil, Sonali J. Mane, Shilpa M, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Satre).Pages 177-191
Building a Graph Database for Storing Heterogeneous Healthcare Data (Goutam Kundu, Nandini Mukherjee, Safikureshi Mondal).Pages 193-201
Analysis and Optimization of Cash Withdrawal Process Through ATM in India from HCI and Customization (Abhishek Jain, Shiva Subhedar, Naveen KumarGupta).Pages 203-211
Survey of Mininet Challenges, Opportunities, and Application in Software-Defined Network (SDN) (Dhruvkumar Dholakiya, Tanmay Kshirsagar, Amit Nayak).Pages 213-221
Some Novelties in Map Reducing Techniques to Retrieve and Analyze Big Data for Effective Processing (Prashant Bhat, Prajna Hegde).Pages 223-232
A Study Based on Advancements in Smart Mirror Technology (Aniket Dongare, Indrajeet Devale, Aditya Dabadge, Shubham Bachute, Sukhada Bhingarkar).Pages 233-240
Unidirectional Ensemble Recognition and Translation of Phrasal Sign Language from ASL to ISL (Anish Sujanani, Shashidhar Pai, Aniket Udaykumar, Vivith Bharath, V. R. Badri Prasad).Pages 241-249
Unravelling SAT: Discussion on the Suitability and Implementation of Graph Convolutional Networks for Solving SAT (Hemali Angne, Aditya Atkari, Nishant Dhargalkar, Dilip Kale).Pages 251-258
CES: Design and Implementation of College Exam System (Punya Mathew, Rasesh Tongia, Kavish Mehta, Vaibhav Jain).Pages 259-267
ANN-Based Multi-class Malware Detection Scheme for IoT Environment (Vaibhav Nauriyal, Kushagra Mittal, Sumit Pundir, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Mohammad Wazid, D. P. Singh).Pages 269-277
Secure Web Browsing Using Trusted Platform Module (TPM) (Harshad S. Wadkar, Arun Mishra).Pages 279-290
CP-ABE with Hidden Access Policy and Outsourced Decryption for Cloud-Based EHR Applications (Kasturi Routray, Kamalakanta Sethi, Bharati Mishra, Padmalochan Bera, Debasish Jena).Pages 291-301
Viral Internet Challenges: A Study on the Motivations Behind Social Media User Participation (Naman Shroff, G. Shreyass, Deepak Gupta).Pages 303-311
Early Flood Monitoring System in Remote Areas (John Colaco, R. B. Lohani).Pages 313-322
A Survey on Securing Payload in MQTT and a Proposed Ultra-lightweight Cryptography (Edward Nwiah, Shri Kant).Pages 323-335
Life Cycle Assessment and Management in Hospital Units Using Applicable and Robust Dual Group-Based Parameter Model (Vitaliy Sarancha, Leo Mirsic, Stjepan Oreskovic, Vadym Sulyma, Bojana Kranjcec, Ksenija Vitale).Pages 337-346
A Novel Approach to Stock Market Analysis and Prediction Using Data Analytics (Sangeeta Kumari, Kanchan Chaudhari, Rohan Deshmukh, Rutajagruti Naik, Amar Deshmukh).Pages 347-356
Energy Trading Using Ethereum Blockchain (M. Mrunalini, D. Pavan Kumar).Pages 357-365
Supply Chain Management for Selling Farm Produce Using Blockchain (Anita Chaudhari, Jateen Vedak, Raj Vartak, Mayuresh Sonar).Pages 367-375
Design and Construction of a Multipurpose Solar-Powered Water Purifier (Ayodeji Olalekan Salau, Dhananjay S. Deshpande, Bernard Akindade Adaramola, Abdulkadir Vector Magic 1.22 Product Key With Crack [Latest Version] 377-387
Named Entity Recognition for Rental Documents Using NLP (Chinmay Patil, Sushant Patil, Komal Nimbalkar, Dhiraj Chavan, Sharmila Sengupta, Devesh Rajadhyax).Pages Wondershare Filmora crack serial keygen Empirical Analysis of Various Seed Selection Methods (Kinjal Rabadiya, Ritesh Patel).Pages 399-407
A Comparative Study on Interactive Segmentation Algorithms for Segmentation of Animal Images (N. Manohar, S. Akshay, N. Shobha Rani).Pages 409-417
Implications of Quantum Superposition in Cryptography: A True Random Number Generation Algorithm (Dhananjay S. Deshpande, Aman Kumar Nirala, Ayodeji Olalekan Salau).Pages 419-431
Influences of Purchase Involvement on the Relationship Between Customer Satisfaction and Loyalty in Vietnam (Pham Van Tuan).Pages 433-444
A Study on Factors Influencing Consumer Intention to Use UPI-Based Payment Apps in Indian Perspective (Piyush Kumar Mallik, Deepak Gupta).Pages 445-452
A Proposed SDN-Based Cloud Setup in the Virtualized Environment to Enhance Security (H. M. Anitha, P. Jayarekha).Pages 453-461
A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0 (B. R. Yogeshwar, M. Sethumadhavan, Seshadhri Srinivasan, P. P. Amritha).Pages 463-472
Conventional Biometrics and Hidden Biometric: A Comparative Study (Shaleen Bhatnagar, Nidhi Mishra).Pages 473-481
Performance Analysis of Various Trained CNN Models on Gujarati Script (Parantap Vakharwala, Riya Chhabda, Vaidehi Painter, Urvashi Pawar, Sarosh Dastoor).Pages 483-492
Real-Time Human Intrusion Detection for Home Surveillance Based on IOT (Mohith Sai Subhash Gaddipati, S. Krishnaja, Akhila Gopan, Ashiema G. A. Thayyil, Amrutha S. Devan, Aswathy Nair).Pages 493-505
Token Money: A Study on Purchase and Spending Propensities in E-Commerce and Mobile Games (N. P. Sreekanth, Deepak Gupta).Pages 507-514
Data Augmentation for Handwritten Character Recognition of MODI Script Using Deep Learning Method (Solley Joseph, Jossy George).Pages 515-522
Improved Automatic Speaker Verification System Using Deep Learning (Saumya Borwankar, Shrey Bhatnagar, Yash Jha, Shraddha Pandey, Khushi Jain).Pages 523-531
Detection and Prevention of Attacks on Active Directory Using SIEM (S. Muthuraj, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, M. Sethumadhavan, P. P. Amritha, R. Santhya).Pages 533-541
Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices (Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Indu, Ajay Kaushik, Alok Kumar Singh).Pages 543-553
Implication of Web-Based Open-Source Application in Assessing Design Practice Reliability: In Case of ERA’s Road Projects (Bilal Kedir Mohammed, Sudhir Kumar Mahapatra, Avinash M. Potdar).Pages 555-564
Influencer Versus Peer: The Effect Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download Product Involvement on Credibility of Endorsers (S. Rajaraman, Deepak Gupta, Jeeva Bharati).Pages 565-571
The Influence of Fan Behavior on the Purchase Intention of Authentic Sports Team Merchandise (Anand Vardhan, N. Arjun, Shobhana Palat Madhavan, Deepak Gupta).Pages 573-579
Purchase Decisions of Brand Followers on Instagram (R. Dhanush Shri Vardhan, Shobhana Palat Madhavan, Deepak Gupta).Pages 581-587
Deep Learning Based Parking Prediction Using LSTM Approach (Aniket Mishra, Sachin Deshpande).Pages 589-597
Beyond Kirana Stores: A Study on Consumer Purchase Intention for Buying Grocery Online (R. Sowmyanarayanan, Gowtam Krishnaa, Deepak Gupta).Pages 599-606
Car Damage Recognition Using the Expectation Maximization Algorithm and Mask R-CNN (Aseem Patil).Pages 607-616
Deep Learning Methods for Animal Recognition and Tracking to Detect Intrusions (Ashwini V. Sayagavi, T. S. B. Sudarshan, Prashanth C. Ravoor).Pages 617-626
VR Based Underwater Museum of Andaman and Nicobar Islands (T. Manju, Allen Francis, Nikil Sankar, Tharick Azzarudin, B. Magesh).Pages 627-632
Network Performance Evaluation in Software-Defined Networking (Shilpa M. Satre, Nitin S. Patil, Shubham V. Khot, Ashish A. Saroj).Pages 633-645
Performance Improvement in Web Mining Using Classification to Investigate Web Log Access Patterns (Charul Nigam, Arvind Kumar Sharma).Pages 647-658
Array Password Authentication Using Inhibitor Arc Generating Array Language and Colored Petri Net Generating Square Arrays of Side 2k (S. Vaithyasubramanian, D. Lalitha, A. Christy, M. I. Mary Metilda).Pages 659-667
sVana—The Sound of Silence (Nilesh Rijhwani, Pallavi Saindane, Janhvi Patil, Aishwarya Goythale, Sartha Tambe).Pages 669-680
Coreveillance—Making Our World a “SAFER” Place (C. S. Lifna, Akash Narang, Dhiren Chotwani, Priyanka Lalchandani, Chirag Raghani).Pages 681-688
Large-Scale Video Classification with Convolutional Neural Networks (Bh. SravyaPranati, D. Suma, Ch. ManjuLatha, Sudhakar Putheti).Pages 689-695
Saathi—A Smart IoT-Based Pill Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download for IVF Patients (Pratiksha Wadibhasme, Anjali Amin, Pragya Choudhary, Pallavi Saindane).Pages 697-705
Predictive Analysis of Alzheimer’s Disease Based on Wrapper Approach Using SVM and KNN (Bali Devi, Sumit Srivastava, Vivek Kumar Verma).Pages 707-715
A Novel Method for Enabling Wireless Communication Technology in Smart Cities (Vijay A. Kanade).Pages 717-726
Electronic Aid Design of Fruits Image Classification for Visually DigiDNA iMazing 2.14.2 Crack + Activation Number {Latest Version} People (V. Srividhya, K. Sujatha, M. Aruna, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Sangeetha).Pages 727-734
Temperature Regulation Based on Occupancy (Rajesh Kr. Yadav, Shanya Verma, Prishita Singh).Pages 735-744
Score Prediction Model for Sentiment Classification Using Machine Learning Algorithms (Priti Sharma, Arvind Kumar Sharma).Pages 745-753
CFD Analysis Applied to Hydrodynamic Journal Bearing (Mihir H. Amin, Monil M. Bhamare, Ayush V. Patel, Darsh P. Pandya, Rutvik M. Bhavsar, Snehal N. Patel).Pages 755-776
Back Matter .Pages 777-780

Citation preview

Smart Innovation, Systems and Technologies 196

Tomonobu Senjyu Parikshit N. Mahalle Thinagaran Perumal Amit Joshi   Editors

Information and Communication Technology for Intelligent Systems Proceedings of ICTIS 2020, Volume 2

Smart Innovation, Systems and Technologies Volume 196

Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download Editors Robert J. Howlett, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Bournemouth University and KES International, Shoreham-by-sea, UK Lakhmi C. Jain, Faculty of Engineering and Information Technology, Centre for Artificial Intelligence, University of Technology Sydney, Sydney, NSW, Australia

The Smart Innovation, Systems and Technologies book series encompasses the topics of knowledge, intelligence, innovation and sustainability. The aim of the series is to make available a platform for the publication of books on all aspects of single and multi-disciplinary research on these themes in order to make the latest results available in a readily-accessible form. Volumes on interdisciplinary research combining two or more of these areas is particularly sought. The series covers systems and paradigms that employ knowledge and intelligence in a broad sense. Its scope is systems having embedded knowledge and intelligence, which may be applied to the solution of world problems in industry, the environment and the community. It also focusses on the knowledge-transfer methodologies and innovation strategies employed to make this happen effectively. The combination of intelligent systems tools and a broad range of applications introduces a need for a synergy of disciplines from science, technology, business and the humanities. The series will include conference proceedings, edited collections, monographs, handbooks, reference books, and other relevant types of book in areas of science and technology where smart systems and technologies can offer innovative solutions. High quality content is an essential feature for all book proposals accepted for the series. It is expected that editors of all accepted volumes will ensure that contributions are subjected to an appropriate level of reviewing process and adhere to KES quality principles. ** Indexing: The books of this series are submitted to ISI Proceedings, EI-Compendex, SCOPUS, Google Scholar and Springerlink **

More information about this series at http://www.springer.com/series/8767

Tomonobu Senjyu Parikshit N. Mahalle Thinagaran Perumal Amit Joshi •





Editors

Information and Communication Technology for Intelligent Systems Proceedings of ICTIS 2020, Volume 2

123

Editors Tomonobu Senjyu Department of Electrical and Electronics Engineering University of the Ryukyus Nishihara, Japan Thinagaran Perumal Universiti Putra Malaysia Serdang, Malaysia

Parikshit N. Mahalle Sinhgad Technical Education Society SKNCOE Pune, India Amit Joshi Global Knowledge Research Foundation Udaipur, Rajasthan, India

ISSN 2190-3018 ISSN 2190-3026 (electronic) Smart Innovation, Systems and Technologies ISBN 978-981-15-7061-2 ISBN 978-981-15-7062-9 (eBook) https://doi.org/10.1007/978-981-15-7062-9 © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd. The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Organizing Committee

Technical Program Committee Chairs Tomonobu Senjyu, Editorial Advisory Board, Renewable Energy Focus, University of the Ryukyus, Okinawa, Japan Thinagaran Perumal, Faculty of Computer Science and Information Technology, University Putra Malaysia, Serdang, Malaysia Dr. Parikshit N. Mahalle, Singhad Group, Pune, India Dr. Nilanjan Dey, Techno India Institute of Technology, Kolkata, India Dr. Nilesh Modi, Chairman, Professor, Dr. Baba Saheb Ambedkar University, Ahmedabad, India

Technical Program Committee Members Dr. Aynur Unal, Standford University, USA Prof. Brent Waters, University of Texas, Austin, TX, USA Er. Kalpana Jain, CTAE, Udaipur, India Prof. (Dr.) Avdesh Sharma, Jodhpur, India Er. Nilay Mathur, Director, NIIT Udaipur, India Prof. Philip Yang, Price water house Coopers, Beijing, China Mr. Jeril Kuriakose, Manipal University, Jaipur, India Prof. R. K. Bayal, Rajasthan Technical University, Kota, Rajasthan, India Prof. Martin Everett, University of Manchester, England Prof. Feng Jiang, Harbin Institute of Technology, China Dr. Savita Gandhi, Professor, Gujarat University, Ahmedabad, India Prof. Xiaoyi Yu, National Laboratory of Pattern Recognition, Institute of Automation, Chinese Academy of Sciences, Beijing, China Prof. Gengshen Zhong, Jinan, Shandong, China

v

vi

Organizing Committee

Prof. A. R. Abdul Rajak, Department of Electronics and Communication Engineering, Birla Institute of Dr. Nitika Vats Doohan, Indore, India Dr. Harshal Arolkar, Immd. Past Chairman, CSI Ahmedabad Chapter, India Mr. Bhavesh Joshi, Advent College, Udaipur, India Prof. K. C. Roy, Principal, Kautaliya, Jaipur, India Dr. Mukesh Shrimali, Pacific University, Udaipur, India Mrs. Meenakshi Tripathi, MNIT, Jaipur, India Prof. S. N. Tazi, Government Engineering College, Ajmer, Rajasthan, India Shuhong Gao, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Mathematical Sciences, Clemson University, Clemson, SC, USA Sanjam Garg, University of California, Los Angeles, CA, USA Garani Georgia, University Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download North London, UK Chiang Hung-Lung, China Medical University, Taichung, Taiwan Kyeong Hur, Department of Computer Education, Gyeongin National University of Education, Incheon, Korea Sudath Indrasinghe, School of Computing and Mathematical Sciences, Liverpool John Moores University, Liverpool, England Ushio Inoue, Department of Information and Communication Engineering, Engineering Tokyo Denki University, Tokyo, Japan Dr. Stephen Intille, Associate Professor, College of Computer and Information Science and Department of Health Sciences, Northeastern University, Boston, MA, USA Dr. M. T. Islam, Institute of Space Science, Universiti Kebangsaan Malaysia, Selangor, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Malaysia Lillykutty Jacob, Professor, Department of Electronics and Communication Engineering, NIT, Calicut, Kerala, India Dagmar Janacova, Tomas Bata University in Zlín, Faculty of Applied Informatics nám. T. G, Czech Republic, Europe Jin-Woo Kim, Department of Electronics and Electrical Engineering, Korea University, Seoul, Korea Muzafar Khan, Computer Sciences Department, COMSATS University, Pakistan Jamal Akhtar Khan, Department of Computer Science College of Computer Engineering and Sciences, Salman bin Abdulaziz University, Kingdom of Saudi Arabia Kholaddi Kheir Eddine, University of Constantine, Algeria Ajay Kshemkalyani, Department of Computer Science, University of Illinois, Chicago, IL, USA Madhu Kumar, Associate Professor, Computer Engineering Department, Nanyang Technological University, Singapore Rajendra Kumar Bharti, Assistant Professor, Kumaon Engineering College, Dwarahat, Uttarakhand, India Prof. Murali Bhaskaran, Dhirajlal Gandhi College of Technology, Salem, Tamil Nadu, India Prof. Komal Bhatia, YMCA University, Faridabad, Haryana, India Prof. S. R. Biradar, Department of Information Science and Engineering, SDM College of Engineering and Technology, Dharwad, Karnataka, India

Organizing Committee

vii

A. K. Chaturvedi, Department of Electrical Engineering, IIT Kanpur, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, India Jitender Kumar Chhabra, NIT, Kurukshetra, Haryana, India Pradeep Chouksey, Principal, TIT College, Bhopal, Madhya Pradesh, India Chhaya Dalela, Associate Professor, JSSATE, Noida, Uttar Pradesh, India Jayanti Dansana, KIIT University, Bhubaneswar, Odisha, India Soura Dasgupta, Department of TCE, SRM University, Chennai, India Dr. Apurva A. Desai, Veer Narmad South Gujarat University, Surat, India Dr. Sushil Kumar, School of Computer and Systems Sciences, Jawaharlal Nehru University, New Delhi, India Amioy Kumar, Biometrics Research Lab, Department of Electrical Engineering, IIT Delhi, India Prof. L. C. Bishnoi, GPC, Kota, India Dr. Vikarant Bhateja, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Lucknow, India Dr. Satyen Parikh, Dean, Ganpat University, Ahmedabad, India Dr. Puspendra Singh, JKLU, Jaipur, India Dr. Aditya Patel, Ahmedabad University, Gujarat, India Mr. Ajay Choudhary, IIT Roorkee, India Prashant Panse, Associate Professor, Medi-Caps University, India Roshani Raut, Associate Professor, Vishwakarma Institute of Information Technology, Pune, India Rachit Adhvaryu, Assistant Professor, Marwadi University, India Purnima Shah, Assistant Professor, Adani Institute of Infrastructure and Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, India Mohd. Saifuzzaman, Lecturer, Daffodil International University, Bangladesh Nandakumar Iyengar, Professor, City Engineering College, India Nilu Singh, Assistant Professor, SoCA, BBD University, Lucknow, India Habib Hadj-Mabrouk, Researcher in Artificial Intelligence and Railway Safety, University Gustave Eiffel, France Ankita Kanojiya, Assistant Professor, GLS University, India Ripal Ranpara, Assistant Professor and DBA, Atmiya University, India Santhosh John, Institute Director, Middle East Institute for Advanced Training, Oman Nageswara Rao Moparthi, Professor, KL University India Akhilesh Sharma, Associate Professor, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Manipal University Jaipur, India Sylwia Werbińska-Wojciechowska, Associate Professor, Wroclaw University of Science and Technology, Poland Divya Srivastava, Ph.D. Scholar, Indian Institute of Technology Jodhpur, India Dr. Debajyoti Mukhopadhyay, Professor, WIDiCoReL Research Lab, India Dr. Neelam Chaplot, Associate Professor, Poornima College of Engineering, India Shruti Suman, Associate Professor, K L University, Andhra Pradesh, India M. V. V. Prasad Kantipudi, Associate Professor, Sreyas Institute of Engineering and Technology, Hyderabad, India Urmila Shrawankar, Professor, G H Raisoni College of Engineering, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Nagpur, India Dr. Pradeep Laxkar, Associate Professor, Mandsaur University, India Muhammad Asif Khan, Researcher, Qatar University, Qatar

viii

Organizing Committee

Dr. Gayatri, Associate Professor, CEPT University, India Jagadeesha Bhat, Associate Professor, St. Joseph Engineering College, Mangalore, India Dr. Madhan Kumar Srinivasan, Associate Vice President, Accenture Technology, India Ajay Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Assistant Professor, Adani Institute of Infrastructure Engineering, India Mounika Neelam, Assistant Professor, PSCMRCET, India Prakash Samana, Assistant Professor, Gokula Krishna College of Engineering, India Dr. Monika Jain, Professor and Head-ECE, I.T.S Engineering College, Greater Noida, India Dr. K. Srujan Raju, Professor and Dean Student Welfare, CMR Technical Campus, Telengana, India Dr. Narendrakumar Dasre, Associate Professor, Ramrao Adik Institute of Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, India Anand Nayyar, Professor, Researcher and Scientist, Duy Tan University, Vietnam Sakshi Arora, Assistant Professor, SMVD University, India Dr. Ajay Roy, Associate Professor, Lovely Professional University, India Prasanth Vaidya, Associate Professor, Sanivarapu, India Dr. Jeevanandam Jotheeswaran, Director, Amity University Online, India John Moses C., Associate Professor, JNTUH, India S. Vaithyasubramanian, Assistant Professor, Sathyabama University, India Ashish Revar, Assistant Professor, Symbiosis University of Applied Sciences, Indore, India

Organizing Chair Mr. Bharat Patel, Chairman, CEDB Dr. Priyanka Sharma, Raksha Shakti University, Ahmedabad, India Amit Joshi, Director—Global Knowledge Research Foundation

Organizing Secretary Mr. Mihir Chauhan, Organizing Secretary, ICTIS 2020

Conference Secretary Mr. Aman Barot, Conference Secretary, ICTIS 2020

Organizing Committee

Supporting Chairs Dr. Vijay Singh Rathore, Professor and Head, JECRC, Jaipur, India Dr. Nilanjan Dey, Techno India Institute of Technology, Kolkata, India Dr. Nisarg Pathak, Swarnim Gujarat Sports University, Gandhinagar, India

ix

Preface

This SIST volume contains the papers presented at the ICTIS 2020: Fourth International Conference on Information and Communication Technology for Intelligent Systems. The conference was held during May 15–16, 2020, organized on a digital platform ZOOM due to pandemic COVID-19. The supporting partners were InterYIT IFIP and Knowledge Chamber of Commerce and Industry (KCCI). This conference aimed at targeting state of the art as well as emerging topics pertaining to ICT and effective strategies for its implementation in engineering and intelligent applications. The objective of this international conference is to provide opportunities for the researchers, academicians, industry persons, and students to interact and exchange ideas, experience, and expertise in the current trend and strategies for information and communication technologies. Besides this, participants will also be enlightened about the vast avenues and current and emerging technological developments in the field of ICT in this era and its applications will be thoroughly explored and discussed. The conference is anticipated to attract a large number of high-quality submissions and stimulate the cutting-edge research discussions among many academic pioneering researchers, scientists, industrial engineers, students from all around the world and provide a forum to researchers; propose new technologies, share their experiences, and discuss future solutions for design infrastructure for ICT; provide a common platform for academic pioneering researchers, scientists, engineers, and students to share their views and achievements; enrich technocrats and academicians by presenting their innovative and constructive ideas; and focus on innovative issues at the international level by bringing together the experts from different countries. Research submissions in various advanced technology areas were received, and after a rigorous peer review process with the help of the program committee members and external reviewers, 75 papers were Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download with an acceptance rate of 0.19 for this Volume. The conference featured many distinguished personalities like Mike Hinchey— Ph.D., University of Limerick, Ireland, President, International Federation of Information Processing; Bharat Patel—Honorary Secretary General, Knowledge Chamber of Commerce and Industry, India; Aninda Bose—Sr. Editor, Springer, India; Mufti Mahmud—Ph.D., Nottingham Trent University, UK; Suresh Chandra xi

xii

Preface

Satapathy—Ph.D., Kalinga Institute of Industrial Technology, Bhubaneswar, India; Neeraj Gupta—Ph.D., School of Engineering and Computer Science, Oakland University, USA; Nilanjan Dey—Ph.D., Techno India College of Technology, Kolkata, India. We are indebted to all our Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download partners for their immense support to make this virtual conference successfully possible. A total of 23 sessions were organized as a part of ICTIS 2020 including 22 technical and 1 inaugural session. Approximately, 154 papers were presented in 22 technical sessions with high discussion insights. Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download total number of accepted submissions was 112 with a focal point on ICT and intelligent systems. Our sincere thanks to our Organizing Secretary, ICTIS 2020—Mihir Chauhan and Conference Secretary, ICTIS 2020— Aman Barot and the entire team of Global Knowledge Research Foundation and Conference committee for their hard work and support for the entire shift of ICTIS 2020 from physical to digital modes in these new normal times. Nishihara, Japan Pune, India Serdang, Malaysia Udaipur, India

Tomonobu Senjyu Parikshit N. Mahalle Thinagaran Perumal Amit Joshi

Contents

Internet of Things: Challenges, Security Issues and Solutions .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . Sweta Singh and Rakesh Kumar Modeling and Performance Evaluation of Auction Model in Cloud Computing. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . Your Uninstaller 7.5 crack serial keygen.. . Gagandeep Kaur Framework for Resource Management in Cloud Computing. Gagandeep Kaur Unique Stego Key Generation from Fingerprint Image in Image Steganography. A. Anuradha and Hardik B. Pandit Self-powered IoT-Based Design for Multi-purpose Smart Poultry Farm. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download.. Tajim Md. Niamat Ullah Akhund, Shouvik Roy Snigdha, Md. Sumon Reza, Nishat Tasnim Newaz, Mohd. Saifuzzaman, and Masud Rana Rashel

1

17 25

33

43

Phrase-Based Statistical Machine Translation of Hindi Poetries into English. . Rajesh Kumar Chakrawarti, Pratosh Bansal, and Jayshri Bansal

53

A Smart Education Model for Future Learning and Teaching Using IoT. Swati Jain and Dimple Chawla

67

Internet of Things (IoT)-Based Advanced Voting Machine System Enhanced Using Low-Cost IoT Embedded Device and Cloud Platform. . .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Miral M. Desai, Jignesh J. Patoliya, and Hiren K. Mewada

77

xiii

xiv

Contents

IoT: Security Issues and Challenges. . .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . Er Richa Coronary Artery Disease Prediction Using Neural Network and Random Forest-Based Feature Selection. Aman Shakya, Neerav Adhikari, and Basanta Joshi

87

97

A Collaborative Approach to Decision Making in Decentralized IoT Devices. . 107 Venus Kaurani and Himajit Aithal Analysis of MRI Images for Brain Tumor Detection Using Fuzzy C-Means and LSTM. . 117 Sobit Thapa and Sanjeeb Prasad Panday A Survey on Recognizing and Significance of Self-portrait Images. 127 Jigar Bhatt and Mangesh Bedekar Anomaly Detection in Distributed Streams. . 139 Rupesh Karn, Suvrat Ram Joshi, Umanga Bista, Basanta Joshi, Daya Sagar Baral, and Aman Shakya Envisaging Bugs by Means of Entropy Measures. 149 Anjali Munde TRANSPR—Transforming Public Accountability Through Blockchain Technology. . 157 P. R. Sriram, N. J. Subhashruthi, M. Muthu Manikandan, Karthik Gopalan, and Sriram Kaushik The Scope of Tidal Energy in UAE. 167 Abaan Ahamad and A. R. Abdul Rajak Knowledge Engineering in Higher Education. 177 Shankar M. Patil, Vijaykumar N. Patil, Sonali J. Mane, and Shilpa M. Satre Building a Graph Database for Storing Heterogeneous Healthcare Data. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. 193 Goutam Kundu, Nandini Mukherjee, and Safikureshi Mondal Analysis and Optimization of Cash Withdrawal Process Through ATM in India from HCI and Customization. . Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download.. 203 Abhishek Jain, Shiva Subhedar, and Naveen KumarGupta Survey of Mininet Challenges, Opportunities, and Application in Software-Defined Network (SDN). 213 Dhruvkumar Dholakiya, Tanmay Kshirsagar, and Amit Nayak Some Novelties in Map Reducing Techniques to Retrieve and Analyze Big Data for Effective Processing. . 223 Prashant Bhat and Prajna Hegde

Contents

xv

A Study Based on Advancements in Smart Mirror Technology. . 233 Aniket Dongare, Indrajeet Devale, Aditya Dabadge, Shubham Bachute, and Sukhada Bhingarkar Unidirectional Ensemble Recognition and Translation of Phrasal Sign Language from ASL to ISL. . Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download.. . 241 Anish Sujanani, Shashidhar Pai, Aniket Udaykumar, Vivith Bharath, and V. R. Badri Prasad Unravelling SAT: Discussion on the Suitability and Implementation of Graph Convolutional Networks for Solving SAT. 251 Hemali Angne, Aditya Atkari, Nishant Dhargalkar, and Dilip Kale CES: Design and Implementation of College Exam System. . 259 Punya Mathew, Rasesh Tongia, Kavish Mehta, and Vaibhav Jain ANN-Based Multi-class Malware Detection Scheme for IoT Environment. . .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 269 Vaibhav Nauriyal, Kushagra Mittal, Sumit Pundir, Mohammad Wazid, and D. P. Singh Secure Web Browsing Using Trusted Platform Module (TPM). . 279 Harshad S. Wadkar and Arun Mishra CP-ABE with Hidden Access Policy and Outsourced Decryption for Cloud-Based EHR Applications. 291 Kasturi Routray, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download Sethi, Bharati Mishra, Padmalochan Bera, and Debasish Jena Viral Internet Challenges: A Study on the Motivations Behind Social Media User Participation. . Education News Archives - My Personal News for Recruitment and Counselling - MPNRC.Org.. 303 Naman Shroff, G. Shreyass, and Deepak Gupta Early Flood Monitoring System in Remote Areas .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 313 John Colaco and R. B. Lohani A Survey on Securing Payload in MQTT and a Proposed Ultra-lightweight Cryptography. . 323 Edward Nwiah and Shri Kant Life Cycle Assessment and Management in Hospital Units Using Applicable and Robust Dual Group-Based Parameter Model. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. 337 Vitaliy Sarancha, Leo Mirsic, Stjepan Oreskovic, Vadym Sulyma, Bojana Kranjcec, and Ksenija Vitale A Novel Approach to Stock Market Analysis and Prediction Using Data Analytics. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. 347 Sangeeta Kumari, Kanchan Chaudhari, Rohan Deshmukh, Rutajagruti Naik, and Amar Deshmukh

xvi

Contents

Energy Trading Using Ethereum Blockchain. 357 M. Mrunalini and D. Pavan Kumar Supply Chain Management for Selling Farm Produce Using Blockchain. . .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 367 Anita Chaudhari, Jateen Vedak, Raj Vartak, and Mayuresh Sonar Design and Construction of a Multipurpose Solar-Powered Water Purifier. 377 Ayodeji Olalekan Salau, Dhananjay S. Deshpande, Bernard Akindade Adaramola, and Abdulkadir Habeebullah Named Entity Recognition for Rental Documents Using NLP. 389 Chinmay Patil, Sushant Patil, Komal Nimbalkar, Dhiraj Chavan, Sharmila Sengupta, and Devesh Rajadhyax Empirical Analysis of Various Seed Selection Methods. 399 Kinjal Rabadiya and Ritesh Patel A Comparative Study on Interactive Segmentation Algorithms for Segmentation of Animal Images. 409 N. Manohar, S. Akshay, and N. Shobha Rani Implications of Quantum Superposition in Sony Vegas Pro 20 Crack 2022 With Full Keygen Download Free A True Random Number Generation Algorithm. . 419 Dhananjay S. Deshpande, Aman Kumar Nirala, and Ayodeji Olalekan Salau Influences of Purchase Involvement on the Relationship Between Customer Satisfaction and Loyalty in Vietnam. . 433 Pham Van Tuan A Study on Factors Influencing Consumer Intention to Use UPI-Based Payment Apps in Indian Perspective. . 445 Piyush Kumar Mallik and Deepak Gupta A Proposed SDN-Based Cloud Setup in the Virtualized Environment to Enhance Security. 453 H. M. Anitha and P. Jayarekha A Light-Weight Cyber Security Implementation for Industrial SCADA Systems in the Industries 4.0. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 463 B. R. Yogeshwar, M. Sethumadhavan, Seshadhri Srinivasan, and P. P. Amritha Conventional Biometrics and Hidden Biometric: A Comparative Study. . 473 Shaleen Bhatnagar and Nidhi Mishra

Contents

xvii

Performance Analysis Fallout 4 Full Crack Latest PC Game [2021] Free Download With Keygen Various Trained CNN Models on Gujarati Script. Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download.. 483 Parantap Vakharwala, Riya Chhabda, Vaidehi Painter, Urvashi Pawar, and Sarosh Dastoor Real-Time Human Intrusion Detection for Home Surveillance Based on IOT. 493 Mohith Sai Subhash Gaddipati, S. Krishnaja, Akhila Gopan, Ashiema G. A. Thayyil, Amrutha S. Devan, and Aswathy Nair Token Money: A Study on Purchase and Spending Propensities in E-Commerce and Mobile Games .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 507 N. P. Sreekanth and Deepak Gupta Data Augmentation for Handwritten Character Recognition of MODI Script Using Deep Learning Method. . 515 Solley Joseph and Jossy George Improved Automatic Speaker Verification System Using Deep Learning. . .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 523 Saumya Borwankar, Shrey Bhatnagar, Yash Jha, Shraddha Pandey, and Khushi Jain Detection and Prevention of Attacks on Active Directory Using SIEM. . .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download.. . 533 S. Muthuraj, M. Sethumadhavan, P. P. Amritha, and R. Santhya Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices. . .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. 543 Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, S. Indu, Ajay Kaushik, and Alok Kumar Singh Implication of Web-Based Open-Source Application in Assessing Design Practice Reliability: In Case of ERA’s Road Projects. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 555 Bilal Kedir Mohammed, Sudhir Kumar Mahapatra, and Avinash M. Potdar Influencer Versus Peer: The Effect of Product Involvement on Credibility of Endorsers. Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download.. . Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download.. 565 S. Rajaraman, Deepak Gupta, and Jeeva Bharati The Influence of Fan Behavior on the Purchase Intention of Authentic Sports Team Merchandise. 573 Anand Vardhan, N. Arjun, Shobhana Palat Madhavan, and Deepak Gupta Purchase Decisions of Brand Followers on Instagram. . 581 R. Dhanush Shri Vardhan, Shobhana Palat Madhavan, and Deepak Gupta Deep Learning Based Parking Prediction Using LSTM Approach. 589 Aniket Mishra and Sachin Deshpande

xviii

Contents

Beyond Kirana Stores: A Study on Consumer Purchase Intention for Buying Grocery Online. . 599 R. Sowmyanarayanan, Gowtam Krishnaa, and Deepak Gupta Car Damage Recognition Using the Expectation Maximization Algorithm and Mask R-CNN. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 607 Aseem Patil Deep Learning Methods for Animal Recognition and Tracking to Detect Intrusions. 617 Ashwini V. Sayagavi, T. S. B. Sudarshan, and Prashanth C. Ravoor VR Based Underwater Museum of Andaman and Nicobar Islands. 627 T. Manju, Allen Francis, Nikil Sankar, Tharick Azzarudin, and B. Magesh Network Performance Evaluation in Software-Defined Networking. 633 Shilpa M. Satre, Nitin S. Patil, Shubham V. Khot, and Ashish A. Saroj Performance Improvement in Web Mining Using Classification to Investigate Web Log Access Patterns. Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download Charul Nigam and Arvind Kumar Sharma Array Password Authentication Using Inhibitor Arc Generating Array Language and Colored Petri Net Generating Square Arrays of Side 2k. 659 S. Vaithyasubramanian, D. Lalitha, A. Christy, and M. I. Mary Metilda sVana—The Sound of Silence. 669 Nilesh Rijhwani, Pallavi Saindane, Janhvi Patil, Aishwarya Goythale, and Sartha Tambe Coreveillance—Making Our World a “SAFER” Place. . 681 C. S. Lifna, Akash Narang, Dhiren Chotwani, Priyanka Lalchandani, and Chirag Raghani Large-Scale Video Classification with Convolutional Neural Networks. . 689 Bh. SravyaPranati, D. Suma, Ch. ManjuLatha, and Sudhakar Putheti Saathi—A Smart IoT-Based Pill Reminder for IVF Patients. 697 Pratiksha Wadibhasme, Anjali Amin, Pragya Choudhary, and Pallavi Saindane Predictive Analysis of Alzheimer’s Disease Based on Wrapper Approach Using SVM and KNN. . 707 Bali Devi, Sumit Srivastava, and Vivek Kumar Verma A Novel Method for Enabling Wireless Communication Technology in Smart Cities. .Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. . 717 Vijay A. Kanade

Contents

xix

Electronic Aid Design of Fruits Image Classification for Visually Impaired People. . 727 V. Srividhya, K. Sujatha, M. Aruna, and D. Sangeetha Temperature Regulation Based on Occupancy. 735 Rajesh Kr. Yadav, Shanya Verma, and Prishita Singh Score Prediction Model for Sentiment Classification Using Machine Learning Algorithms. . 745 Priti Sharma and Arvind Kumar Sharma CFD Analysis Applied to Hydrodynamic Journal Bearing. . 755 Mihir H. Amin, Monil M. Bhamare, Ayush V. Patel, Darsh P. Pandya, Rutvik M. Bhavsar, and Snehal N. Patel Author Index. 777

About the Editors

Dr. Tomonobu Senjyu received his B.S. and M.S. degrees in Electrical Engineering from the University of the Ryukyus in 1986 and 1988, respectively, and his Ph.D. degree in Electrical Engineering from Nagoya University in 1994. Since 1988, he has been with the Department of Electrical and Electronics Engineering, University of the Ryukyus, where he is currently a Professor. His research interests include stability of AC machines, power system optimization and operation, advanced control of electrical machines and power electronics. He is a member of the Institute of Electrical Engineers of Japan and IEEE. Dr. Parikshit N. Mahalle holds a B.E. degree in CSE and an M.E, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. degree in Computer Engineering. He completed his Ph.D. at Aalborg University, Denmark. Currently, he is working as a Professor and Head of the Department of Computer Engineering at STES Smt. Kashibai Navale College of Engineering, Pune, India. He has over 18 years of teaching and research experience. Dr. Mahalle has published over 140 research articles and eight books, and has edited three books. He received the “Best Faculty Award” from STES and Cognizant Technologies Solutions. Dr. Thinagaran Perumal received his B.Eng., M.Sc. and Ph.D. Smart Technologies and Robotics from Universiti Putra Malaysia in 2003, 2006 and 2011, respectively. Currently, he is an Associate Professor at Universiti Putra Malaysia. He is also Chairman of the TC16 IoT and Application WG National Standard Committee and Chair of IEEE Consumer Electronics Society Malaysia Chapter. Dr. Thinagaran Perumal is the recipient of 2014 IEEE Early Career Award from IEEE Consumer Electronics Society. His recent research activities include proactive architecture for IoT systems; development of the cognitive IoT frameworks for smart homes; and wearable devices for rehabilitation purposes.

xxi

xxii

About the Editors

Dr. Amit Joshi is currently the Director of the Global Knowledge Research Foundation. An entrepreneur & researcher, he holds B.Tech., M.Tech. and Ph.D. degrees. His current research focuses on cloud computing and cryptography. He is an active member of ACM, IEEE, CSI, AMIE, IACSIT, Singapore, IDES, ACEEE, NPA and several other professional societies. He is also the International Chair of InterYIT at the International Federation of Information Processing (IFIP, Austria). He has published more than 50 research papers, edited 40 books and organized over 40 national and international conferences and workshops through ACM, Springer and IEEE across various countries including India, Thailand, Egypt and Europe.

Internet of Things: Challenges, Security Issues and Solutions Sweta Singh and Rakesh Kumar

Abstract Today Internet has become a part of our daily life, enabling not only people and the computing component to connect and communicate with each other but also has extended its domain to the objects or the ‘things’ which are embedded with electronic components, software, communication technologies, sensors and actuators. The main aim of Internet of things (IoT) is to configure a “smart environment” with everything getting smarter providing advanced services, reducing human effort and making use of the technologies to its true potential. With IoT, the computation and communication is now not restricted to computing devices only but now everything around us will get connected, developing a new and advanced era of communication. But as more and more things are getting connected, has given way for more issues, challenges and more security threats. This Jogos de Faça o que Quiser de Graça para Baixar aims at focusing on the key concept of IoT, issues, challenges involved in its deployment, basically emphasizing on the security challenges and also highlighting the proposed solutions by different researchers so far.

1 Introduction With Internet becoming ubiquitous [1], providing services anytime, anywhere and affecting everyday life of human is now seeking for a technological forward shift where the computation and communication capability is not only confined to computing devices but to the everyday objects too. With this objective of “connecting the unconnected world” has brought up the concept of “Internet of things (IoT).” IoT is defined to be the next era of communication which basically focuses S. Singh (B) · R. Kumar Department of Computer Science Engineering, Madan Mohan Malaviya University of Technology, Gorakhpur, India e-mail: [email protected] R. Kumar e-mail: [email protected] © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 T. Senjyu et al. (eds.), Information and Communication Technology for Intelligent Systems, Smart Innovation, Systems and Technologies 196, https://doi.org/10.1007/978-981-15-7062-9_1

1

2

S. Singh and R. Kumar

at “how devices or things can be made smarter?” and “how the smart things can be connected through an intelligent network?” Different researcher has a different way of defining IoT, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Vermesan et al. [2] define IoT as an interaction between the physical and the digital world. Sethi and Sarangi [3] have defined it as an agglomeration of different technologies working Rosetta Stone 5.12.8 Full Torrent Archives aiming at a meaningful objective. Authors of [4] define IoT as a fusion of technology which aim at bringing everything under a common infrastructure with an objective to control thing and have knowledge of its state too. Peña-López et al. [5] define it as a paradigm where networking and computation capability is embedded in any type of conceivable thing or object. Chen et al. [6] define it as a smart network which connects everything to the Internet. Madakam et al. [7] define IoT as a comprehensive network of intelligent or smart devices which are capable of sharing data, information, resources have capability to autoconfigure itself and take intelligent action in case of any change in the environment or on encountering certain event. Considering the several definitions for IoT, Internet of things can be summarized as a paradigm which involves convergence of multiple technologies including embedded systems, machine learning, networking, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, cloud computing, artificial intelligence, big data, etc. Thus, proving a platform for objects embedded with sensors, actuators, electronics, software, computation and communication technologies [8] to connect to each other and communicate with each other to meet certain objective or to develop certain meaningful applications. According to Zhao and Ge [9] by 2015–2020, the devices are considered to be semi-intelligent, whereas targeted to achieve Comprehensively Intelligent Object after 2020. The target is being achieved where around 50 billion of devices have been connected and soon will come an era where the number of connected things will surpass the number of people and will develop a smart and automated world. IoT aims at easing human effort, has control over everything by automating things, configuring a smart environment where system provides advanced services, making use of existing technologies to its true potential, connects everything around us by extending the connectivity, computation and communication to things such as fan, light bulb, microwave, cars, coffee machine, street lights, garbage bins, etc. With various advantages or applications, IoT also has certain drawbacks where it faces certain challenges or issues [6] including technical challenges, architectural challenges, managerial challenges, data management challenges and security challenges. Here, in this paper, aim at focusing the security challenges of IoT which has given way to attackers to exploit the system and hindering its acceptance or advancement. The paper also discusses certain attacks which could be made due to the integration of physical and the cyberdomain [10], the solutions which have been presented by several researchers to overcome the security issues, with several considerations to be kept in mind while proposing a new solution. Generally, the type of application defines the security issue and the complexity in defining the appropriate solutions [9]. Thus, to ensure a more efficient secure solution, one needs to uncover the vulnerability which could be exploited by the attacker. Whatever the solution may be, it must ensure confidentiality, availability, integrity, data privacy and trust, authentication and identity [11].

Internet of Things: Challenges, Security Issues …

3

Internet

Sensing

Local Local Storage Processing

cloud Processing and Storage

Fig. 1 Working of IoT

IoT is a paradigm which aims at embedding computation and communication capability in the conceivable objects so that the “things” can communicate with each other and exchange data and information. It aims at expanding the interdependence Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download humans to interact, collaborate and contribute to things. With IoT, the physical world can be transformed to a smart digital world where everything will be connected and can communicate with each other forming a smart environment. Here, the intelligent things are capable of auto-organization, sensing environment, collecting data from the external world, and react to certain changes in the environment. Generally, the devices are constrained devices with limited memory, limited power, low computation power and size. This nature of devices has made the traditional security measure to be unacceptable. Sensors and actuators are the key elements of the IoT which gathers data from outside environment and transferred for further processing and decision making according to which actuators respond or take required action. IoT is basically characterized by four essential features [9, 12], i.e., comprehensive perception or sensing which means detailed information or data can be collected anytime and anywhere from the environment. Reliable transmission which means the data collected by the smart thing has to be transmitted either via wired or wireless medium in real time for further processing. Intelligent processing where the transmitted data is processed and analyzed and last is appropriate action where according to the decision made by the processing system is brought to action by the actuators. The working of IoT is depicted in Fig. 1.

2 Issues and Challenges in IoT Every technology is developed to reduce human effort, improve performance, maximize and make better use of resources, increase efficiency and achieve an advanced level of service. In simple words, it can be simply stated as the advantage of technology is undisputable with its objective unquestionable but with advantages brings up few concerns or certain challenge. Internet of things (IoT) has its advancement

4

S. Singh and R. Kumar Addressing and Identification Issue Constraint Device/ Hardware Challenge

Common Addressing mechanism Identification of device in heterogeneous environment

Limited Memory, Computation, battery, size Incompatibility, Interconnectivity

Architectural Challenge

Security and Privacy Issue Data Privacy Confidentiality Authentication and Identification Access Control Light weight cryptographic measure Failure resilience

Scalability and heterogeneity Communication Protocol Dynamic topology Integrated security Device mobility Choosing right component and right technology

Technical Challenge

Business Challenge/ Industrial Issue Domain Extension Failure handling with abstraction handling

Reliability and discoverability Fault tolerance Heterogeneous technology, standard and devices Packet filtering with device authenticity Secure booting Traffic management Bandwidth issue Distributed nature Hardware and Software compatibility

Real Time services Issue Temero-Spatial data services

Fig. 2 Challenges in deployment of IoT

in certain applications with advanced services but it also encounters certain issues which serve as a hindrance in meeting out its goal. Few issues in deployment of IoT are depicted in Fig. 2.

2.1 Security Threats Sources in IoT (1) Security issues and Attacks at the Perception Layer [9, 11, 13, 14]: Perception or the sensing layer in the IoT comprises of sensor nodes or the smart devices with local connectivity and the responders or actuators [15]. The sensors could be mechanical sensor, electrical, chemical or any other which aims at accumulating the data from the physical environment. The sensing layer technology includes

Internet of Things: Challenges, Security Issues …

5

RFID, RSN’s, WSN etc., to collect the data from external environment and object identification. Since data serves to be the core of IoT, any threat or intended target to these data could lead to severe or unintended consequences. Few threats are described as under. (a) Physical tampering or hardware corruption: The sensors nodes are generally placed as well operate at some external environment or remote areas. Any physical access or intended tampering of the physical device may hinder the real-time capturing of data or even gather incorrect data by making use of smart malicious technical gadgets and connecting it to the device. Hardware failure or corruption of theses smart devices can also hinder the entire system functioning or result in system failure, i.e., no data collection--no processing--no action. (b) Node hijacking/capturing: An IoT application does not comprises a single node but a number of constrained nodes with sensors which could be the prime target of the adversaries. The malicious attacker may attempt to capture the node by taking control over the node or replace part of the device with its own such that it could now act as a part of Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download system comprising the overall security of the application. (c) Frequency interference: RFID technology is used in this layer to identify object and to collect the data from the device. Any interference in the radio waves may lead to data loss or corrupted data. Thus, ensuring a lightweighted RFID authentication security measure [16, 17] is attempted in ensuring data privacy. (d) Sleep deprivation attack: The devices in perception layer are power constrained. Hence, they are programmed to undergo sleep mode in case of inactiveness. The attacker can target this behavior of the node by sending unnecessary data or running infinite loops using malicious codes which aim to drain the battery of the device. The drainage of battery will make the particular node/device inactive and will result in stopping or denial of service from that particular node. (e) Trust gaining attack using node authentication: Another mechanism which could be opted by the attacker is to win the trustworthiness of the system by claiming to be an authorized node and become part of the IoT system. It is often termed as replay attack. The attacker by claiming to be a new device attempts to be a part of system and attain the authenticity certificate or can capture a packet from the node and send response claiming its genuine identity but with a mollifying intention. In simple words, “first gain trust and then attack.” (f) Side channel attack: Side channel attack is a technique used by the attacker to capture the data. In this electromagnetic waves leaking from the sides of the device are analyzed to attain the data. This attack aims at compromising the physical system. The attacker continuously monitors the behavior of the victim node such as the electromagnetic leaks, power consumption, sound monitoring, etc. to gain information which is exploited to compromise the

6

S. Singh and R. Kumar

victim system. Cache attack, timing attack electromagnetic attack, power attacks are few examples of side channel attack. Here, time analysis attack is most common where the attacker compromises the victim by analyzing the computation time of the node or analysis of encryption time of the node. Based on this analysis, information is collected and is exploited to compromise the targeted device. (g) False data injection attack/malicious coding attack: An injection of erroneous data or wrong code or fake data may result in uncorrected data processing with undertaking of inappropriate action. This attack targets the overall characteristics of IoT resulting in malfunctioning of the system or false system outcome. In certain application, it could lead to severe consequences. (h) Data leakage: Sensors are connected to local network to communicate with other devices or to push the gathered data to the processing nodes. During this transmission, the real-time collected data is prone to leakage, data copying or confidentiality leakage. (i) Booting attack: IoT framework consists of number of smart devices connected together, working cooperatively accomplishing a specific task. Since size of IoT network varies from few devices to thousand of devices with each device produced by different vendor. When these devices are assembled together to form an IoT system, it leaves a small loophole, i.e., security at the time of booting of these very devices while switching from non-operational mode to operational mode. This is the point where the inbuilt security mechanism lacks. Taking advantage of this the attacker can attempt to target the nodes when they are getting started or restated. (2) Security issues and attacks at the network layer [9, 11, 13, 14, 18] (a) Diverse target communication/routing-based attack: IoT is characterized by scalability, i.e., IoT operates in a geometrically large environment comprising of large number of nodes/devices. IoT involves communication between the devices and forward transmission of data to the processing nodes or the cloud and reverse transmission of the instruction based on the decision made from the cloud to the actuator. This involves routing of data from nodes to cloud and cloud to the devices. Malicious attacker may target this and may attempt redirection of packet to itself or an unauthorized device or aim at making the packets to get trapped in infinite loop. By routing the packet to an unintended location may result in loss of confidentiality and data privacy as data could be either forged or be copied/read by an unauthorized entity. It may also lead to power consumption of the nodes leading to denial-of-service attack. Wormhole attack, Blackhole attack and Sinkhole attack are examples of this type of attack. (b) Traditional network attacks: IoT being interconnection of devices with heterogeneous network and communication protocols, it gives an opportunity to the attacker to stay as a part of the system for relatively large time period launching several traditional network attacks with

Internet of Things: Challenges, Security Issues …

(c)

(d)

(e)

(f)

7

an aim of traffic diversion, data loss, data forging, data capturing and copying, congestion, resource exhaustion and many more. Few common network attacks include man-in-the-middle attack, denial-of-service attack, snooping attack, sniffing attack, etc. Data-in-transit attack: It is considered that the data in transit is more vulnerable to attack than the data stored at a site/location. Since IoT involves transmission of large number of valuable information exchange between number of devices, to the processing nodes, to gateway and cloud gives a handful opportunity for the adversary to target the data. The data movement in IoT incurs number of communication technologies which are targeted by the attackers for data breaching. Network congestion/data traffic [3]: Data being valuable is not always attacked for access or get monitored by the attacker but the malicious attacker may target the data to get lost in the network resulting in system failure or false/unexpected results. The attacker may get into the system and attempt to send bulk of meaningless or unimportant and unnecessary data in the network such that the entire bandwidth of channel gets occupied and the data from the authorized devices gets dropped due to network congestion. Another possibility due to network congestion is the shutdown or denial of service. When attacker sends enormous number of fake or invalid requests in the network and in general the IoT comprise of lossy network with limited bandwidth, will occupy the entire bandwidth or the communication channel denying the genuine packets to move through the network resulting in denial-of-service attack. Identity masking: Spoofing or identity masking is another common attack where attacker claims to an authorized device by masking itself as an authorized one thus gaining access to the valuable data. Here, instead of data reaching to legitimate devices reaches the attacker who claims to be the authorized device. Sybil attack: An attack where a device/node claims or holds multiple identities thus misleading the data traffic. The attacker can claim to be an authorized/legitimate device by faking itself thus causing the data traffic intended for the authorized device, to reach the attacker. Another possibility due to Sybil attack is, the attacker holding multiple identity being a part of the route through which the data flows to reach the destination can read or capture the data packets while passing through it. Sybil attack also leads to routing table overflows (routing table is filled with invalid entries or entry of the attacker holding multiple identities such that there is no memory space left in the memory restricted nodes for valid entry) and routing table poisoning (resulting in unnecessary route confusion).

(3) Security issues and attacks at the application layer [9, 11, 13, 14] (a) Data privacy threat: For IoT application, data plays a significant role. Data in motion is more vulnerable and is highly targeted by the attacker than the data at rest. Targeting these data and launching attack may lead to

8

S. Singh and R. Kumar

(b)

(c)

(d)

(e)

unintended disclosure or fabrication of data by the attacker compromising the IoT system. Phishing attack: An attack targeting multiple devices with minimum effort. Since all the devices are connected and controlled at a user interface. Any disclosure of the user account Id and password (authenticating credentials) can make the entire IoT system comprising of thousands of devices to get targeted. Unauthorized access: Obtaining the authenticating credentials of the use, the attacker can gain uncontrolled and unauthorized access to data and the user account. Once gaining access the attacker may be able to corrupt or make the system vulnerable to multiple threats or attacks. Software vulnerability: Software attack may attempt at exploiting the system by sending trozans, worms, viruses, malicious scripts, spywares, etc. to attain the confidential credentials and data. They are basically sent using emails or in software updates. Once entering the system exploiting the entire system, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Data loss: Due to massive collection of data attained from number of sensors deployed over a large geographical area calls for requirement of data analytics and management. Data needs to be stored or processed at a central site which may be targeted by the attacker. Data storage and management consumes a reasonable system resource which could Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download a reason for data loss.

(4) Security issue at the cloud and gateway [13] (a) Malicious code or malware injection attack: The cloud serves as the backend supporting technology in IoT, which manages and processes the data and derive inference on basis of which actuator responds to the environment. In centralized IoT, the attacker may target this central server by sending malicious code or injecting malware using cross site scripting which in turn can paralyze the entire IoT system by malfunctioning or inappropriate service provision by cloud. Once the cloud server is targeted may lead to incorrect data analytics, processing, inappropriate service provision and action. (b) Cloud service interruption: Cloud server provides several types of services such as proving platform, analytics tools, software tools, data storage and access mechanism and different resources according to requirement. It plays a major role in scaling up and down of resources with load balancing, serving as the backbone or support system of IoT. Paralyzing the support can hinder the functioning of IoT and result in failure of IoT application. Cloud also plays an essential role in providing real-time data support. (c) Flooding at cloud attack: With malicious intention of flooding the cloud, the attacker may intend to send a bulk of unnecessary service request over the cloud, which may result in providing the resources or services to number of unauthorized and fake devices, leading to resource exhaustion and blocking the services to the authorized devices. This type of attempt

Internet of Things: Challenges, Security Issues …

9

Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download a massive number of devices which are targeted as victims forming a “botnet.” (d) On-board attack: This type of attack generally occurs when attacker install itself as a new device and attempt to join the IoT network. Scalability allows any number of devices to be a part of IoT system. This attack targets the gateway as in communication the gateway serving in between the network and the devices is responsible for key distribution and sharing of key. Thus, the attacker may target the gateway to capture the key and get access to the system. (e) Encryption-Decryption attack: End-to-end encryption is done to ensure privacy of data such that only the designated authorized entity can access the valuable data. But with gateway sitting in between, the encrypted data is first decrypted and then re-encrypted to be further relayed to the cloud. This decryption of data at the gateway can make the data susceptible to breach. (f) Update attack: For advanced application, there emerges the need to regularly update the firmware and software. Being resource constrained (low computation and storage), the smart devices are incapable of downloading and installing the updates. Thus, this downloading of firmware updates is made at the gateway which is then applied on the devices. By inserting malicious script or viruses to these updates, the attacker can breach the IoT security. Table 1 provides a summarized picture of issues with the possible solution.

3 Existing Security Solutions (a) Blockchain Technology [10, 13, 20]: It is a new technology contributing to a secure and transparent IoT system distributed across a network ensuring confidentiality, integrity and privacy. It serves a backbone technology to secure digital transactions termed digital cryptocurrency. It is a chain of block termed as ledger which includes data, timestamp, hash of current block and the previous block. This hash enables the blocks to be chained together. Here, the hash can simply be considered as a unique identifier similar to fingerprint. For every new block has a new hash. Thus, if anyone tries to forge, the data creates a new block/hash or need to change the entire chain hash value which is just impossible. The security and functioning of blockchain is basically dependent on ‘proof of work’ and ‘distributed hash keys.’ The data structure used to hold records of transaction is the Merkle tree. The first block in the ledger is the genesis block. The entire blockchain forms a peer-to-peer network architecture such that the entire ledger is distributed to each node/miner which identifies the block. The distributed concept makes it more secure. The concept of blockchain was initially introduced for secure digital transaction removing the role of third party (bank) but

10

S. Singh and R. Kumar

Table 1 Security issues with the possible solutions Security issues/challenges

Possible solutions

Physical tampering/hardware corruption

Tamper proof shielding

Node capturing

Access control mechanism

Radio frequency interference

Anti-collision protocol such as binary tree protocol and collision tree protocol [19]

RFID security threat

RFID security using access control, RFID tag chip protection [16, 19]

Sleep deprivation attack

Authentication of nodes such that only authorized node can send data packets or communicate with the nodes

Side channel attack

Channel tracing/complementary duals

False data injection

Access control

Replay attack

Kerberos authentication protocol

Routing attack

Secure routing mechanism/RPL [14]

False data packet

Authentication/intrusion detection system

Communication threat/MITM

Key agreement/node authentication, lightweight cryptographic solution

Unauthorized access

Authentication/encryption/access control

Network congestion

Queuing/priority messaging

Booting attack

Secure booting/bootstrapping device authentication and identity management

Software vulnerability

Firewall/anti-spyware/anti-virus

Data-in-transit attack

End-to-end encryption

Denial-of-service attack

Device authentication

Sybil attack

Key agreement/mutual authentication

Unauthorized access

Access control

Data loss/theft

End-to-end encryption

Gateway encryption-decryption attack

Protocol supporting end-to-end encryption

On-board attack

Encrypted key

Update attack

Signature validation

Architectural issue

Black SDN

Interoperability and heterogenity issue

Middleware solution [13]

now has been introduced in several applicable areas such as automatic cars, in IoT for a secure transparent infrastructure. The key benefits of IoT are data privacy, secure distributed data storage, encrypted data and access control. (b) Software defined network (SDN) [6, 10, 21]: Major contribution of a software defined network is defined in developing a secure framework for smart cities. It comprises of four basic functional unit named black network [22] that defines a network that provides a secure transmission or carriage of data or metadata

Internet of Things: Challenges, Security Issues …

(c)

(d)

(e)

(f)

(g)

11

associated with each data frame in the IoT network. The main contribution of it is to encrypt the payload and the data held in IoT link layer which is later decrypted by the receipt. Black network contributes to integrity, confidentiality and privacy of data in IoT network, hence contributing to network security. The second component is the SDN controller that manages the communication taking place between the IoT nodes and the entire IoT framework components. It also contributes to routing resolution in the black network by creating random or dynamic routes through the intermediate awaken nodes. The remaining components are the Unified Registry and Key Management component. The Registry contributes in provision of database (holding records on nodes and their attributes), heterogeneous technology, translation and addressing schemes. Key management component ensures a secure communication via exchanging and distributing key between the IoT devices in the entire network. End-to-end encryption [10, 12, 14, 23]: For secure data transmission and communication between the IoT devices, is it required for the data packets to be encrypted such that only the authorized entity can access the data ensuring data integrity. Traditional encryption mechanism could not be applicable to IoT due to the constrained nature of device. Here, several lightweight and cost-effective cryptographic solutions have Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download proposed by the researchers [10]. RFID security [16, 17, 24]: In RFID, the data is transmitted in form of radio frequency signals which is interrupted or prone to security breach attack. To protect the data, the RF signals must be encrypted. Several algorithms are defined to ensure lightweight encryption of these signals to prevent any data theft. It is also required to use protective chips, etc. to prevent the data to be read from the RFID tags. Secure/lightweight booting: A secure bootstrapping measure is defined by [25] to ensure authentication of low powered and constrained device before they operate, i.e., before they switch from non-operational to operational mode, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. They contribute to physical layer security where the device gets a secret key to reach the server. Access control: [21, 23, 26, 27]: Access control ensures the integrity, availability and confidentiality of data. Several research works have been proposed defining various access control mechanism to address and resolve the security issues. Some model and mechanism of IoT security are addressed in [21]. Access control for data stream is provided in [not good]. Several access control mechanisms include, role-based access control, ID-based access control, attribute-based, trust-based and several other schemes. Authentication [10, 14, 23, 27–30]: This mechanism contributes to 60% of IoT security by identifying the devices and the user in the IoT network such that only authorized personal or devices which are not under the control of an unauthorized entity (non-manipulated device) could only access the system or data. It is successful countermeasures for several attacks such as MITM attack, Sybil attack, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, relay attack, etc. Key establishment and key distribution are the primary tasks in user/device authentication. For device authentication, a mutual authentication scheme is provided where a key is shared between the nodes and

12

(h)

(i)

(j)

(k)

S. Singh and R. Kumar

both agree and share the key information forehand. A symmetric, asymmetric and hybrid crypto-based authentication scheme has been defined by the authors to ensure authentication between the users/devices. Researchers are motivated in defining lightweight and multi-factor authentication scheme for IoT security. Device identification and authentication in general combine together such that only recognized/authenticated device contributes Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download the IT heterogeneous system. Authors of [9] have produced a mutual authentication scheme based on hashing and feature extraction. Another work has been contributed by [23] for ID based authentication. By use of shared time-stamped keys that change regularly. Secure routing [10, 14]: To ensure secure communication of data and ensure availability of data to the authorized user or device, a secure routing protocol must be defined. The Internet Engineering Task Force (IETF) working group for routing over low powered lossy networks has standardized a routing protocol which is based on IPv6 especisally designed for constrained devices, RPL [31]. The key consideration while proposing a secure routing solution is the constrained nature of nodes as it has limited memory while cannot store a large routing table or handle complex route calculations and second is the lossy network in IoT system. Several researchers have contributed to target certain attacks and have proposed am effective solution to mitigate and defend such types of attack. Trust Vodafone recharge coupon crack serial keygen [10, 14, 21]: Trust management contributes to nearly 20% of IoT security which aims at identifying and removal of fake/malicious nodes. It incurs trust entity to ensure that all security parameters are ensured and a secure communication is established. It involves an automated o dynamic calculation of trust value of each node in the network to detect the malicious node. Another approach is using token or key [14]. Trust management plays a significant role in establishment of trust between the devices/users and during the interaction between them. It involves an agreement between the IoT systems from secure communication [23]. A concept of mutual trust in [4] for inter-model security is defined by creating an access control mechanism. Federated architecture: Since IoT incurs no well-defined fixed architecture with universal policy and standard from controlling the system and implementation has made it difficult to define a secure IoT framework or solution. At attempt of a federated architecture is made by [14] which is based on access control ensuring flexibility and scalability of IoT system. Another attempt is proposed by [14] proposing concept of Secure Mediation Gateway focusing on distributed architecture. Designing of attack resistant systems [9]: Designing of tamper proof system could be a solution from physical layer attacks, where the attackers target the nodes placed in the external world to attain the information, or tamper the collected data. It involves a proper node and antenna designing such as hardware design, selecting appropriate security chip, data acquisition unit, circuit design as well antenna design for communication distance and stability. It also should

Internet of Things: Challenges, Security Issues …

13

ensure the Sylenth1 Crack 2021 With Torrent Version Full Download For [Mac & Win] of garbage data collected such that it does not create a mess or overhead on the cloud. (l) Auto-immunity through machine learning: Another contribution which can be undertaken in field of IoT security is by introducing several machine learning algorithm, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, such that the nodes itself draw up pattern and analyze the data before transmission [13]. This feature will further enhance security feature by ensure secure data transmission and undertaking relevant action. Artificial neural network and machine learning may contribute to adaptive learning, fault tolerance, prevent privacy leakage, and a defense against spoofing, eaves dropping and other network attacks. Table 2 aims at highlighting the key areas to which the security solutions are contributing. Table 2 Security solutions proposed with their area under consideration Security solutions

Concerned area

Blockchain mechanism

Data security ensuring privacy, data integrity by encrypted data, transparency and confidentiality Data protection from spoofing attack

Fog computing [32]

Decentralization, data distribution with secure data sharing, real-time service with reduce latency and data security

Authentication and identity management [33]

Device authentication Prevent unauthorized access

Fuzzy based/lightweight encryption [17, 34, 35]

Secure communication or transmission of data between devices and between different layers

Trust-based solution

Calculate trust value to hold trustworthiness between the devices in layer, between the layers and between the IoT system and the user

Federated architecture

Interoperability and secure information sharing in semi-autonomous and distributed system

Black SDN/black network [22]

Data security, data privacy, integrity and secure data transmission

Edge computing [36]

Prevent data breaches as data is processed at the node itself, data security, solve bandwidth issue, immediate decision making leading to quick service

Firewall/IDS/software solution

Application layer/interface security

RPL

Secure routing

Key agreement

Secure communication between authorized device

14

S. Singh and R. Kumar

4 Conclusion and Future Scope While working on IoT security and meeting the various challenges incurred in IoT, the researchers need to consider few parameters which should be kept in mind while proposing a solution or working on the security measures. It can be categorized into primary considerations which are the essential or mandatory parameters and must to be considered. Since IoT includes, constraint devices, it is necessary that whatever security measure is chosen or proposed must be lightweight, and compatible with the resource constraint devices consuming low power, low memory and little or no complex computation. The second is the low power lossy network, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, the communication network or Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download in IoT is generally lossy, thus the security measure must consider the communication channel or transmission network such that there is no or acceptable loss of data. The second category is the secondary factors extending additional coverage which include device authentication, data encryption, lightweight solutions, packet filtering, packet routing in the lossy network, and software update with no additional bandwidth requirement with a reliable and cost-effective solution. The survey has contributed in highlighting the security aspects, i.e., the possible threats in IoT system. Since the success of any technology and its acceptance basically depends on how quickly the problem is identified and how effectively is resolved. Several works have been proposed by the researchers and still contribution is being made to ensure the adaption and extension of IoT from personal domain to an enterprise level. The major security areas which could be contributed by the researchers are in ensuring data privacy, network security, cloud security, gateway security, contributing a lightweight security solution which is compatible in the constraint, mobile and heterogeneous IoT environment. With new application brings up a new challenge; thus, it is essential to consider all the aspects of IoT and create a secure session of nodes communication. This survey may contribute in serving a valuable resource in further advancements and works of researchers in upcoming application areas and security challenges.

References 1. Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011) 2. Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., Jubert, I.S., Mazura, M., Harrison, M., Eisenhauer, M., Doody, P.: Internet of things strategic research roadmap. Int. Things-Glob. Technol. Soc. Trends 1, 9–52 (2011) 3. Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. (2017) 4. Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the internet of things. In 2015 IEEE World Congress on Services, pp. 21–28 (2015) 5. Peña-López, I.: ITU Internet Report 2005: The Internet of Things (2005) 6. Chen, S., Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Xu, H., Liu, D., Hu, B., Wang, H.: A vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet Things J. 1(4), 349–359 (2014)

Internet of Things: Challenges, Security Issues …

15

7. Madakam, S., Lake, V., Lake, V., Lake, V.: Internet of Things (IoT): a literature review. J. Comput. Commun. 3(05), 164 (2015) 8. Goyal, K.K., Garg, A., Rastogi, A., Singhal, S.: A literature survey on Internet of Things (IoT). Int. J. Adv. Netw. Appl. 9(6), 3663–3668 (2018) 9. Zhao, K., Ge, L.: A survey on the internet of things security. In: 2013 Ninth International Conference on Computational Intelligence and Security, pp. 663–667 (2013) 10. Hassan, W.H.: Current research on Internet of Things (IoT) security: a survey. Comput. Netw. 148, 283–294 (2019) 11. Lin, J., Yu, W., Zhang, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, N., Acid Pro 4.0 by Sonic Foundry crack serial keygen, X., Zhang, H., Zhao, W.: A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J. 4(5), 1125–1142 (2017) 12. Gou, Q., Yan, L., Liu, Y., Li, Y.: Construction and strategies in IoT security system. In 2013 IEEE ˙International Conference on Green Computing and Communications and IEEE ˙Internet of Things and IEEE Cyber, Physical and Social Computing, pp. 1129–1132 (2013) 13. Hassija, V., Chamola, V., Saxena, V., Jain, D., Goyal, P., Sikdar, B.: A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7, 82721–82743 (2019) 14. Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: Security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pp. 180–187 (2015) 15. Kelly, S.D.T., Suryadevara, N.K., Mukhopadhyay, S.C.: Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens. J. 13(10), 3846–3853 (2013) 16. Phan, R.C.W.: Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI. IEEE Trans. Dependable Secure Comput. 6(4), 316–320 (2008) 17. Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., Marrocco, G.: RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet Things J. 1(2), 144–152 (2014) 18. Sharma, R., Pandey, N., Khatri, S. K.: Analysis of IoT security at network layer. In: 2017 6th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), pp. 585–590 (2017) 19. Jia, X., Feng, Q., Ma, C.: An efficient anti-collision protocol for RFID tag identification. IEEE Commun. Lett. 14(11), 1014–1016 (2010) 20. Khan, M.A., Salah, K.: IoT security: Review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395–411 (2018) 21. Flauzac, O., González, C., Hachani, A., Nolot, F.: SDN based architecture for IoT and improvement of the security. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp. 688–693 (2015) 22. Chakrabarty, S., Engels, D.W.: A secure IoT architecture for Smart Cities. In: 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 812–813 (2016) 23. Abomhara, M., Køien, G.M.: Security and privacy in the Internet of Things: Current status and open issues. In: 2014 ˙International Conference on Privacy and Security in Mobile Systems (PRISMS), pp. 1–8 (2014) 24. Fan, K., Gong, Y., Easeus data recovery wizard, C., Li, H., Yang, Y.: Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G. Secur. Commun. Netw. 9(16), 3095–3104 (2016) 25. Hossain, M.M., Hasan, R.: Boot-IoT: a privacy-aware authentication scheme for secure bootstrapping of IoT Nodes. In ICIOT, pp. 1–8 (2017) 26. Ouaddah, A., Mousannif, H., Elkalam, A.A., Ouahman, A.A.: Access control in the Internet of Things: big challenges and new opportunities. Comput. Netw. 112, 237–262 (2017) 27. Neto, A.L.M., Souza, A.L., Cunha, I., Nogueira, M., Nunes, I.O., Cotta, L., Gentille, N., Loureiro, A.A., Aranha, D.F., Patil, H.K., Oliveira, L. B.: AOT: Authentication and access control for the entire iot device life-cycle. In: Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD-ROM, pp. 1–15 (2016) 28. Ye, N., Zhu, Y., Wang, R.C., Malekian, R., Lin, Q.M.: An efficient authentication and access control scheme for perception layer of internet of things (2014)

16

S. Singh and R. Kumar

29. Hernández-Ramos, J.L., Jara, A.J., Marin, L., Skarmeta, A.F.: Distributed capability-based access control for the internet of things. J. Internet Serv. Inf. Secur. (JISIS) 3(3/4), 1–16 (2013) 30. Crossman, M.A., Liu, H.: Study of authentication with IoT testbed, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. In: 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1–7 (2015) 31. Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4):2347–2376 32. Chiang, M., Zhang, T.: Fog and IoT: an overview of research opportunities. IEEE Internet Things J. 3(6), 854–864 (2016) 33. Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity establishment and capability based access control (IECAC) scheme for internet of things. In: The 15th International Symposium on Wireless Personal Multimedia Communications pp. 187–191 (2012) 34. Al Salami, S., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference YourSiteUp Pro 3.02 crack serial keygen Availability, Reliability and Security (ARES) pp. 382–388 (2016) 35. Mao, Y., Li, J., Chen, M.R., Liu, J., Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Xie, C., Zhan, Y:, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Fully secure fuzzy identity-based encryption for secure IoT communications. Comput. Stand. Interf. 44, 117–121 (2016) 36. Yu, W., Liang, F., He, X., Hatcher, W.G., Lu, C., Lin, J., Yang, X.: A survey on the edge computing for the Internet of Things. IEEE Access 6, 6900–6919 (2017)

Modeling and Performance Evaluation of Auction Model in Cloud Computing Gagandeep Kaur

Abstract Cloud computing addresses various issues in modern technology such as resource allocation, resources adaption, and resource provisioning. To provide better services to users in cloud computing, economic models have been used. This research work provides the definition of game theory and Pareto optimality. The proposed work in cloud computing (CC) is performed for users who are using cloud for the execution of their applications and uses game Label crack serial keygen auction model to achieve outcomes and proposes metrics such as resource utilization and profit maximization. The proposed metrics are simulated using Cloudsim simulator for parallel workflow tasks and achieve Nash equilibrium point for non-cooperative users even when users have insufficient knowledge of the environment.

1 Introduction The most complicated issue in CC is the problem of RA. This problem is modeled to help cloud customer in making a rational decision in competitive market. To design and model RA problem in CC, several consumer characteristics should be highlighted. For example: 1. Users always try to get better service at lesser price. 2. In organization practice, buyers of the cloud resources have more than one behavioral limitation, so they have to make a trade-off of one limitation for another. 3. Cloud uses ‘pay-as-you-go’ feature and bidding can be modified by each user which corresponds to previous behaviors of the participants. 4. Consumers are unknown to each other because they are distributed globally throughout the cloud. Therefore, Game Theory (GT) auctions are used to answer the problem of RA in clouds.

G. Kaur (B) Panjab University, Chandigarh, India e-mail: [email protected] © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 T. Senjyu et al. (eds.), Information and Communication Technology for Intelligent Systems, Smart Innovation, Systems and Technologies 196, https://doi.org/10.1007/978-981-15-7062-9_2

17

18

G. Kaur

2 Motivation There are several economic market models such as tendering model, auction model, posted price model, bid-based proportional resource sharing model, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, commodity model, and bargaining model. These models are applied in different scenarios. Commodity model balances the price by evaluating demand and supply standards from the market participants [1]. Grid RA market models such as posted price model, states that distributing resources are established on discussing the flat fee, usage interval or period, QoS among the provider and the consumer of grid resource [2]. Modern resource management systems such as grid computing [3], utility computing [4], data mining [5], agent systems [6] are using market mechanisms. These systems use various context such as pricing, control, delivery, and routing. Zong et al. [7] combine the cloud resources’ characteristics and describe the combinatorial double auction of cloud service problem as a 0--1 integer programming problem, then match resources and price the cloud products after sorting the resource packages’ average price. Also, it improves the utility of buyers and providers in the algorithm implementation, so as to get the CDATM model based on the average price of the cloud service combination. Zhang et al. [8] model the RA process of a mobile CC system as an auction mechanism. The evaluation of the individual rationality and incentive compatibility (truthfulness) properties of the customers is proposed in this method. Jafari [9] provides a wide range of survey and analysis of the auctionbased RA method. This work classifies the important cloud RA mechanisms into different categories such as double-sided, one-sided, combinatorial, and other types of auction-based mechanisms.

3 Modeling of Proposed Problem Definition 1 The game G is represented as a three-tuple vector. P is the players in the allocation game such that P = {1, 2,  3, …, m}. S are set of players’ strategies. Strategy space for player k is Sk = sk1sk2. .skn. U is the utility function of game players. At the outcome of one game, the utility received by a single player is payoff which determines the players’ preference. Definition 2 (Pareto optimality). An allocation is Pareto 007 DVD Copy 5.1 crack serial keygen and if there is no other allocation in which some other individual is better off, and no individual is worse off. The proposed problem in this research work is solved using game theory. Each player intends to select a strategy to maximize its own utility so that the objective of a resource allocation game would be considered as the following optimization problem: Maximize u i (ai ) subject to

 ai j∈ai

ai j = k(i), ai j ≥ 0

Modeling and Performance Evaluation of Auction …

19

where aij is assignment vector and is represented by selective strategy of player. k(i) is the tasks of user U i. The constant elasticity of substitution (CES) function is  C=

n 

1 s

s−1 s

s  s−1

ai ci

i=1

ln C =

ln

n  1−r r ci i=1 ai r

Apply Hoptial law lim ln C =

r →0

n i=1 ai ln ci  n i=1 ai

3.1 Allocation Model To get rapid access for low cost and flexible resources, cloud users no longer need to make large upfront investments due to virtualization. The main aim of virtualization is to get rid of several user concerns such as server upkeep, constraints, and scalability. Different clouds provide different  N i purchasing options for its customers. It is assumed bk. that sum of bids is k = i=1 Sum of bids by competitors is θk−i =

N 

j

bk

j=i

Execution time of task i on resource k is tki =

−i xki i i θk = μ + μ k k i C k qki bk

Execution cost of task k is eki = bki tki = μik θk−i + μik bki Payoff is the amount of resource received and each player selects their best strategy. To achieve an equilibrium point, in bids offered by different players, following steps are taken:

20

G. Kaur

1k =



bki

n

. h ik (1) k

So bki(m) = h ik (m) k xki(m) =

bki(m) (m+1) k

For all satisfied players, the price flows:(m+1) = m k k.  bki∗ = maxx bkiθk−i∗ where bki∗ is equilibrium bid 

xki(m) = 1.

N ∗ ∗ = θk2 Different resource prices are θk1  Different values for resource  prices are N xki Equilibrium price θk∗ that let N xki = 1 is unique and Nash equilibrium exists.

4 Performance Evaluation 4.1 Metrics To evaluate the proposed model, following metrics are used: • Execution time = Total task length/(Allocated Vms * Basic Capacity) • Payoff of the user = Execution time * bid • Resource Utility: Resource utility is the measure of percentage of satisfied users. Satisfied users are the users whose task execution is completed within deadline. • Average resource utility = ((successful users + 0.0)/num user) * 100 • Profit: Profit is the measure of total execution time at the server side for the users’ tasks.

Profit = [1 − ((Total Execution Time−Actual Time)/Actual Time)] ∗ 100

Modeling and Performance Evaluation of Auction … Table 1 Workloads used to evaluate the auction model

Workload name

21 No. of users

Jobs

NASA iPSC

69

18,239

LANL CM5

213

122,060

SDSC Par95

98

53,970

SDSC Par96

60

32,135

LLNL T3D (original)

153

22,779

SDSC SP2

437

59,715

DAS2 fs1 (original)

36

40,315

DAS2 fs3 (original)

64

12

4.2 Performance Evaluation of Proposed Model Using Different Workloads Cloudsim simulator is used for the performance evaluation of proposed model and has been executed for different number of workloads. In this research, the proposed model has been evaluated using PWA workload (Parallel Workload Archive) [10]. There are totally 38 logs but the model has been evaluated using eight logs. The original logs come in different formats [10]. All logs are converted to the standard workload format (SWF). Archives are chosen to different number of users and jobs (Table 1). The proposed model has been executed for different workloads. Performance Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download been evaluated for average resource utility and profit with normal distribution (Figs. 1 and 2). Fig. 1 Performance evaluation of proposed auction model for average resource utility with normal distribution

22

G. Kaur

Fig. 2 Performance evaluation of proposed auction model for profit with normal distribution

5 Conclusion Non-cooperative auction game is proposed to evaluate the performance of proposed model in cloud scenarios. The performance evaluation of proposed auction Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download gives 100% average resource utility for all parallel workload archive workloads except SDSC SP2. The performance is evaluated for profit for different parallel workload archive and workload DAS2 fs3 gives higher profit while workload LLNL T3D gives lower profit.

References 1. Stuer, G., Vanmechelen, K., Broeckhove, J.: A commodity market algorithm for pricing substitutable grid resources. Futur. Gener. Comput. Syst. 23(5), 688–701 (2007) 2. Posted price model based on GRS and its optimization using in grid resource allocation. In: 2007 International Conference on Wireless Communications, Networking and Mobile Computing 3. Towards a micro-economic model for resource allocation in grid computing systems. 2002 ieeeexplore.ieee.org 4. Yolken, B., Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Bambos, N.: Game based capacity allocation for utility computing environments 5. Joita, L., Rana, O.F., Freitag, F., Chao, I., Chacin, P., Navarro, L., Ardaiz, O.: A catallactic market for data mining services. Futur. Gener. Comput. Syst. 23(1), 146–153 (2007) 6. Shehorya, O., Kraus, S.: Methods for task allocation via agent coalition formation. Artif. Intell. 101 (1998) 7. Zong, X., Zhang, T., Wang, Y., Li, L.: A combinatorial double auction model for cloud computing based on the average price of cloud resource packages. Researchgate.net/publication/311928001 8. Zhang, Y., Niyato, D., Wang, P.: An auction mechanism for resource allocation in mobile cloud computing systems. In: International Conference on Wireless Algorithms, Systems, and Applications WASA 2013

Modeling and Performance Evaluation of Auction …

23

9. Sheikholeslami, F., Nima Jafari, N: Auction-based resource allocation mechanisms in the cloud environments: a review of the literature and reflection on future challenges. 12 Mar 2018. https:// doi.org/10.1002/cpe.4456 10. Parallel workloads archive from large scale parallel supercomputers. https://cs.huji.ac.il/lab/ parallel/workloads

Framework for Resource Management in Cloud Computing Gagandeep Kaur

Abstract Cloud computing has become popular in these days as it provides ondemand availability of computer resources such as processor, storage, and bandwidth throughout the world. Virtualization helps in the growth Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download data and computation centers and makes workload balancing much simpler and easier. Virtualization in modern days makes the things easier for cloud users as they no longer need to make large upfront investments and get rapid access to low-cost and flexible resources. Virtualization aims to reduce end-user apprehensions concerning server upkeep, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, and scalability. Cloud computing uses the concept of virtualization and uses IT assets as utilities in todays’ world. Cloud computing uses cloud marketplace to access and integrate the services and offerings. Cloud users and cloud providers have different aims when managing the resources, policies, and demand patterns in real-world scenario, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. In this paper, a new three-tier architecture has been presented to manage the resources in economic cloud market considering deadline and execution time of the tasks for users.

1 Introduction Cloud providers provide various benefits like scalability, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, flexibility, reducing IT costs, rapid elasticity, and on-demand self-service but despite these benefits, many users hesitate in moving their IT systems to the cloud. This is due to problems like loss of control, lack of trust, and multitenancy introduced by cloud environments. This paper proposes an architecture for resource management in cloud computing systems. The proposed model is based on three-tier architecture that help cloud service providers in (i) managing their infrastructure resources efficiently (ii) maximizing their revenue. The proposed model meets the demands of consumers and service providers while following various system policies and demand patterns, follows economic method, G. Kaur (B) Panjab University, Chandigarh, India e-mail: [email protected] © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 T. Senjyu et al. (eds.), Information and Communication Technology for Intelligent Systems, Smart Innovation, Systems and Technologies 196, https://doi.org/10.1007/978-981-15-7062-9_3

25

26

G. Kaur

and provides a fair basis in efficiently managing decentralization and heterogeneity that is present in human economics.

2 Related Work The concept of utility computing has been inspired and recently combined with the requirements and standards of Web 2.0 [1] to create cloud computing [2, 3]. Lu and Bharghavan [4] propose the structure for resource management in current indoor mobile computing environment. This work investigates methodologies for the organization of crucial networking resources in internal mobile computing situations: adaptively re-adjusting the superiority of service within pre-assigned bounds in request to adjust network dynamic range and consume flexibility. Kailasam et al. [5] state that the objective of resource allocation is to assign appropriate resources to the suitable workloads on time, so that applications can utilize the resources effectively. Islam et al. [6] present a model for resource management in cluster computing that accepts numerous scheduling strategies to survive dynamically. This work built Octopus, an extensible and distributed hierarchical scheduler that implements new space sharing, gang scheduling and load sharing strategies. Czajkowski et al. [7] state that metacomputing systems are expected to Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download remote and/or simultaneous use of geographically distributed computational resources. Resource management in such systems is difficult by five concerns that do not normally occur in other circumstances: site autonomy and heterogeneous substrates at the resources, and application constraints for Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download extensibility, co-allocation, and online control. Raman et al. [8] state that traditional resource management systems use a system model to define resources and a centralized scheduler to manage their allocation. The research created and implemented the classified advertisement (classad) matchmaking structure, common method to resource management in distributed environment with decentralized possession of resources. Jhawar et al. [9] categorize and formalize several requirements Name:Theorb14 Serial:CXU5C-ZZDHJ-A6JTD-ZWVQD-K29RB|Please Go To youtub users and service providers with respect to security, reliability, and availability of the service and address the satisfaction of such requirements in the overall problem of resource allocation in infrastructure clouds.

3 Design of the Proposed Model There are two significant players in the proposed model: provider and consumer/broker. For the trading of resources and deciding service access pricing, both cloud consumer/broker and Cloud Service Provider (CSP) use economic models and interaction protocols. IT assets and services are considered as utilities and it is clear that there is trade-off between service provider and consumer. This allows the use of service by the user under provided SLA.

Framework for Resource Management …

27

3.1 Architecture Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download the Proposed Model The architecture of the proposed model is three-tier and classifies the requirements of cloud providers and end users. The proposed three-tier architecture system is illustrated in Fig. 1 and shows the partition of Cloud Computing Layer (CCL), Virtual Layer (VL), and Physical Layer (PL). The CCL and VL give the high-level activities that include the information transferred by several physical agents such as servers. Cloud Computing Layer In the proposed model, the CCL organizes the cloud activities on top of the VL and is known as CCL. In this layer, the proposed model provides behavior such as cloud service model, cloud deployment model, and various tasks running in various applications make requests on the other layers such as ondemand allocation and reliability. Cloud service model provides services to virtual data center for virtualization within virtualized infrastructure and cloud deployment model provides the isolation of virtualized infrastructure within virtual layer for virtual machines.

Fig. 1 Three-tier architecture of the proposed model

28

G. Kaur

Virtual Layer In the proposed model, VL provides virtual instances such as virtual machines to the cloud users. This research work utilizes virtual machines for the execution of tasks. The main purpose of developing virtual machines is to achieve the advantage of scalability and to handle the allocation of cloud computing resources, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. VMs are multiplexed among the resources of a physical machine allowing multitenancy and resource distribution such as server, I/O, and software. Virtualization offers a layer of abstraction above the physical resource, allowing two methodologies such as users and providers to resource management Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download cloud implementation model. The proposed model assigns virtual machines according to FCFS policies. The VL consists of following component. Virtualized Infrastructure (VI) is described as a complex network structure where some or all of the elements such as servers are virtualized. The proposed cloud computing platform consists of VIs which depend on virtualization approaches to distribute resources among users. Virtualization techniques used for VI are: Server Virtualization (SV): SV resolves the challenge of VM provisioning in cloud computing. SV is a chunk of hardware that is virtualized by applying Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download or firmware called a hypervisor which separates the equipment into numerous remote and autonomous virtual requests. Resource Virtualization (RV): RV resolves the VIs needs for resource allocation and controlling of VMs. I/O Virtualization: IOV is a technology that divides logical and physical resources. IOV is considered as an enabling data center technology that gathers IT infrastructure as a shared pool of resources such as storage, computing, and networking. The proposed cloud service model achieves the market goals of the CSP that correctly converges to the optimal resource allocation based on maximizing resource utilization and profit and cloud users achieve high performance by maintaining a pool of resources in a cost-effective way by dynamic resource allocation and job scheduling simultaneously in a heterogeneous cloud environment. Physical Layer The proposed model uses PL to model hardware resources such as CPU, memory, and bandwidth for the execution of tasks. These hardware resources are provided by the cloud providers through data centers. In the proposed model, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, data centers are used for the execution of large number of tasks and responsible for providing both physical and virtual resources. The proposed research work employs IaaS as a service model in cloud computing. The objective of an IaaS provider in Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download research work is to maximize revenue which involves the maximization of resource utility by the establishment of VMs onto physical machines. The proposed model evaluates the online current state of the cloud while allocating the VMs to a suitably underutilized resources that meets the QoS requirements. Workloads used for the evaluation of the model do not remain static and change during periods of peak user activity. Thus, a VM that is utilizing several resources can have a possibility for QoS influence on additional VMs running in the similar physical machine and must migrate to a resource with appropriate spare capacity.

Framework for Resource Management …

29

3.2 Modeling of Resource Allocation Model The proposed system is evaluated at the Infrastructure as a Service (Iaas) level. In the proposed system, it is assumed that the IaaS provider manages an infrastructure which can provide to his users best combination of VMs and to give the best combination of VMs, providers should have information regarding the execution of tasks. Assume that r resources are allocated to t tasks. Users U i have a number of similar independent K i tasks which require equal amount of computing. The sum of total cost of each resource should be minimized and t appropriate tasks are executed in the least time along with minimal cost. In the proposed solution, it is assumed that matrix m consisting of t rows each for one user and r columns each for one resource. Also, mi is the representative of ith row of the matrix m and mij signifies the amount of each task of user U i that is allocated to Ri. The allocation vector of mi is represented as:  mi j = Ki m i j ∈m i

The objective of the proposed problem is to minimize expenses and increase utility and the utility for U i can be evaluated as: Ui (m i ) = Total1Cost Resource Allocation Game. Game theory is a mathematical method which attempts to solve the exchanges between all players of game to produce certain the best outcomes for themselves. A game comprises of three components, a set of players, all the potential approaches every player will select, and the specific utilities of players linked with the strategy accomplished by every player. At each step, players decide one of their strategies and acquire a utility in return. Each player of a game attempts to maximize its individual utility by choosing the extremely profitable approach as compared to other players’ options. In a cloud market, customers are conscious in making the choice, seek to minimize the expenses, and make certain limitations of cost E = (E 1E 2…, E N ) and time T = (T 1T 2…, T N ). Every player can consider a deadline displayed with T 0and a maximum budget amount, E 0the optimum objective function of the user is: min e s.t.

K  k=1

eik ≤ E 0 ,

K 

tki ≤ T 0

k=1

Cloud provider is responsible for the execution of tasks and provides resources to the users. A cloud provider develops the requested software/platform/infrastructure services, handles the technical infrastructure required for providing the services, provisions the services at agreed-upon service levels, and protects the security and privacy of the services. Data center: Data center is used to provide various resources to the users such as virtual machines, storage, hardware, etc. Data center forms the foundation of a broad

30

G. Kaur

selection of services presented across the Internet involving Webhosting, ecommerce, and common services such as software as a service (SaaS), platform as a service (PaaS), and grid/cloud computing. Cloud service management: This service allows service providers to ensure optimal performance, stability, and competence in virtualized on-demand environments. Provisioning/configuration: Cloud provisioning refers to the processes for the deployment and integration of cloud computing services in the proposed model. Cloud broker: Cloud broker is an entity that handles the negotiation among providers and consumers. In the proposed architecture, users’ request for the resources through brokers.

4 Evaluation This work uses Cloudsim tool to simulate the cloud-based infrastructures and application service. Cloudsim is created to evaluate the application benchmark study in a controlled environment to reproduce the results. This tool models the datacenter, processors, storage, bandwidth, operating system, virtualization standard and machine location throughout the initialization of the heterogeneous computing resources configuration. Table 1 shows the characteristics of resources used in simulation. Two common distributions, Normal and Pareto, signify preferences about the prices.

4.1 Metrics Sum of bids for tasks for all users = m Bid for task = n Bid for other competitors = m − n Execution speed u = Length/MIPS Execution time = u + u (Bid of other competitors/Bid for medium task) Table 1 Resource characteristics

Characteristics

Parameters

VM monitor

Xen, VMware

Number of PE

2, 4, 8

MIPS rating per PE

100, 200, 300, 400

Memory

512, 1024, 2048

Storage

160G, 320G, 500G

Bandwidth

128M, 256M, 512M

Framework for Resource Management …

31

Fig. 2 Deadline and execution time for 50 users

Fig. 3 Payoff for 50 users

Completion cost = Execution Time * Bid of the user Minimum deadline: 48.82 Maximum deadline: 390.62 Figure 2 shows deadline and execution time for 50 users. Figure 3 shows payoff for 50 users. Figure 4 shows bids for 50 users.

5 Conclusion This research work proposes a model to manage the resources in cloud environment and concludes that in the proposed work, the resource allocation problem can be

32

G. Kaur

Fig. 4 Bids for 50 users

solved by using different metrics such as deadline and execution time and tested on 50 users. The minimum deadline for 50 users is 48.82 and maximum deadline is 390.62 and execution time for user 13 is infinity.

References 1. Alexander, B.: Web 2.0: a new wave of innovation for teaching and learning? Learning 41(2), 32–44 (2006) 2. Buyya, R., Yeo, C., Venugopal, S.: Market-oriented cloud computing: vision, hype, and reality for delivering it services as computing utilities. In: Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications (HPCC-08, IEEE CS Press, Los Alamitos, CA, USA) (2008) 3. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: Grid Computing Environments Workshop, GCE’08, 2008, pp. 1–10 (2008) 4. Lu, S.W., Bharghavan, V.: Adaptive resource management algorithms for indoor mobile computing environments 5. Kailasam, S., Gnanasambandam, N., Janakiram, D., Sharma, N. (2010). Optimizing service level agreements for autonomic cloud bursting schedulers. In: Proceedings of the In ICPP Workshops, pp. 285–294. https://doi.org/10.1109/icppw.2010.54 6. Islam, N., Prodromidis, A.L., Fong, L.L.: Extensible resource management for cluster computing. In: Computer Science Published in Proceedings of 17th International Conference on Distributed Computing Systems Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download https://doi.org/10.1109/icdcs.1997.603418 7. Czajkowski, K., Foster, I., Karonis, N., Kesselman, C., Martin, S., Smith, W., Tuecke, S.: Resource Management Architecture for Metacomputing Systems (1998) 8. Raman, R., Livny, M., Solomon, M.: Matchmaking: distributed resource management for high throughput computing (1998) 9. Jhawar, R., Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, V., Samarati, P.: Supporting security requirements for resource management in cloud computing. 2012 IEEE 15th International Conference on Computational Science and Engineering

Unique Stego Key Generation from Fingerprint Image in Image Steganography A. Anuradha and Hardik B. Pandit

Abstract The concept of image steganography involves concealing secret message, using stego key and cover image. The stego key is used both at the sender side and the receiver side, for insertion as well Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download for extraction of secret message. Thus, the stego key and the insertion algorithm are connected closely in image steganography. The process of insertion requires a unique method of embedding data in the original cover image for generating the stego image, such that it is difficult for the hacker to know the presence of secret data. This process in turn depends on the stego key to a large extent. On the other hand, biometrics has been accepted as one of the strongest ways of confirming the identity of any individual. This paper focuses both on biometrics and steganography for the secret transmission of data. Thus, a unique key has been generated from the fingerprint image, as a part of biometrics, where the special features of the image have been extracted. The special features and their corresponding locations have been found. These locations are used for data embedding in the cover image, thus paving the path for a unique way of insertion of secret bits.

1 Introduction Whenever the concept of image steganography comes into picture, based on the generalized model, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, three things always come into picture: stego key, cover image, and secret data, resulting in the final stego image. The requirement for the stego key is that it defines the method for hiding the data in the image [1]. The steganographic method can be applied, with the availability of the stego key. A. Anuradha (B) L. J. Institute of Computer Applications, L. J. Group of Institutes, Ahmedabad, India e-mail: [email protected] H. B. Pandit Department of Computer Science, Sardar Patel University, Vallabh Vidyanagar, India e-mail: [email protected] © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. forza horizon 2 licence key [july 2019]  ❌ T. Senjyu et al. (eds.), Information and Communication Technology for Intelligent Systems, Smart Innovation, Systems and Technologies 196, https://doi.org/10.1007/978-981-15-7062-9_4

33

34

A. Anuradha and H. B. Pandit

Further, the same stego key will be utilized to get the data back from the stego image at the receiver side. It is very much similar to the key being used in cryptography for extracting the hidden data from the stego image [2]. The embedding algorithm must be very strong so that, even if the presence of data is known to the intruder, the extraction of data is nearly impossible. This makes a reference to the concept of open security, which tells that even if the design methodology is known to the public, it should safeguard the data. This idea can be supported with Kerckhoff’s principle [3, 4]. The principle says that, the system remains safe, under the circumstances when all the details (including the algorithm) to make public, except the key. So it is the key, whose selection makes everything special [5]. But to ensure the expected sender of the message, some identification can be sent in the coded form. Hence, if a key is generated from the unique identification of the sender, it can support both the demands of authenticity and designing the algorithm for embedding data secretly. Advanced SystemCare Pro 14.5.0 Crack With License Key for the most efficient and unique identification of any individual, biometrics can be utilized. The biometrics will take care of the identification of the sender and ensure that the correct sender has transferred the secret message. In support of this, only the authenticated persons are authorized to send data. Thus, it should not lead into any security issues, when the system is in the hands of the enemy [6]. Thus, the essential elements which can enhance the robustness of the system are: • Identification, authentication, and authorization of the sender • Robustness of the embedding algorithm • Open security or secret transmission.

2 Review of Literature The steganography corresponds to “invisible communication,” with the objective of securing it from eavesdroppers [7]. It refers to the Greek words “stegos” and “grafia.” The meanings are “cover” and “writing,” respectively. Thus, it is based on the concept of covered writing. Different steganographic types are there like audio, video and image steganography. Among these types, image steganography has been proved to be the robust one. The steganographic process begins with the generation of stego key. The key will then be used to embed the required message in a cover image. The key can be generated using any process. Thus, the final stego image will be created, containing the secret message to be transferred in a concealed way to the intended recipient (see Fig. 1). Different approaches have been used by different authors for image steganography. LSB technique has been used for embedding secret bits in the least significant bits. In [8], based on a random generated key, text is embedded in the least significant bits of the color matrices of RGB image. The concept of pixel value differencing (PVD) and modulo operation (MO) has been implemented in [9], with the intention of increasing the peak signal-to-noise ratio and hiding capacity, by embedding data in non-overloading blocks of image. A combined approach of data

Unique Stego Key Generation from Finger …

35

Fig. 1 Model of steganography

compression, data embedding and also neural network for maintaining the quality of the communication channel, for better results [10]. For data embedding, the Wtfast activation key free Archives concept has been applied in this paper. The scheme of least significant bits is used, for embedding in edge positions, in color images [11]. The color image is divided into three components. One component is used as an index to find the edges, while the other two components are used for embedding purpose. So as to come up with a bigger capacity in comparison with the other methods of image steganography, data is embedded by changing the color palette of the image in [12]. This mechanism comes under color palette transformation, where pixels with the same color will be changed into the same color. The method found to be one of the best, according to structural similarity index (SSIM) and peak signal-to-noise ratio (PSNR) values. To increase security and imperceptibility of embedded message, spread spectrum embedding techniques are implemented with chaotic encryption, for spreading the message in the cover image, so that message embedding is possible on the smallest bit of the cover image [13]. Thus, making it difficult for the attacker for guessing the existence of the secret message, it has been implemented the concept of mapping the pixels in an image to 26 alphabets of English alphabets, along with some special characters for maximum use of bits of pixels for data embedding [14]. The idea worked effectively, with different short and long messages leading to less suspicion for the attackers. An improved reversible image steganography method based on pixel value ordering (PVO) is proposed in [15], where every three continuous and neighboring pixels are grouped, in the rows and columns of the image. The pixels with more steganographic difference value which is the difference between maximum and minimum value are used for data hiding, showing higher capacity and acceptable PSNR value. A histogram of oriented gradient (HOG) algorithm is proposed, where blocks of interests find out, based on the gradient magnitude and angle of the cover image [16]. After that PVD algorithm is used to insert data in the prominent edge direction, LSB substitution is used, in the remaining two pixels [16].

36

A. Anuradha and H. B. Pandit

3 Limitations of Existing Systems All the recent methodologies almost tried to follow some unique methods for hiding data. However, none of these methods adopted the combined concept of real-time embedding, dynamic embedding, and biometrics together. The distinctive approach of data embedding always can be defined in the form of a stego key. Consequently, in the current proposal, the stego key has been adopted in the form of biometrics, fingerprint image, and feature extraction, leading to a robust technique of data embedding based on image steganography.

4 Overview of Feature Extraction “Interest point detection” refers to the identification of interest points in an image, which are actually somehow “special.” Actually, an image has many elements like “corners” and “blobs” and “special” features. These features can be extracted using some detectors. Detector is an algorithm that selects the special points in an image satisfying some criterion. On the other hand, descriptors that describe the image patch around the interest points are a vector. The interest points along with the descriptors are called the “local features.” Local features can be referred to some distinct features of an image like points, edges, and small image patches. Normally, local feature detection and extraction are used for applications like image registration, object detection, and classification, tracking and motion estimation [17]. Image registration is the process of aligning images of the same scene, which is used to compare common features in different images. This concept is helpful for discovering whether a river has migrated or to know how an area became flooded [17]. Object detection refers to identifying objects like faces or vehicles in images or videos based on extracted features. In object classification, objects are identified and then they are classified into different categories based on their specific features being extracted. Object tracking refers to estimate the trajectory of an object during its motion [18], whereas motion estimation determines the movement of objects in an image sequence [19]. However, the research paper focuses on the extraction of the unique features of a finger image with the intention of generating a unique stego key, to be used for image steganography. Actually, the location of the unique features of the fingerprint image has been extracted as a part of the stego key.

Unique Stego Key Generation from Finger …

37

5 Biometrics and Authentication Identification, authentication, and authenticity are the three buzzing words in the field of information security, satisfying three important requirements of information, i.e., confidentiality, integrity, and availability. The person with proper identification is considered as the authorized person. Accordingly, the person will be authorized to give a particular role in any defined system. Behalf of identification, different approaches have been used such as password mechanism or tokens. Password refers to knowledge-based authentication mechanism, which requires precise recall [20], and also there are fair chances of its misuse if disclosed somehow. Tokens like bank cards are used for ATM transactions which may be stolen or lost [21]. But these days, IT is dependent on a more trustworthy system known as the biometrics. Biometric authentication is based on the biological characteristics of any individual, thus verifying the individuality. Biometrics is the measurable, physical or physiological traits of any individual, being used for the verification of the claimed identity [22]. Since biometrics is non-transferable, stable, and enduring in nature, it provides one of the strongest authentication mechanisms. Also, it is a convenient practice of authentication. Fingerprinting, retina, voice recognition, and face recognition are some of the mechanisms of biometric systems, used as a part of authentication. The research has selected fingerprinting, being the most convenient way of identification or authentication. Thus, fingerprinting has been selected not only for getting the stego key to be used for image steganography, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, but also to identify the valid sender. Hence, the intended recipient can get the message being sent, with the conformity that it is from the authorized sender only.

6 Unique Key Generation Among different biometric mechanisms, fingerprinting is the best, reliable, and fastest way of personal identification [23]. It can provide the high level of security because of unique identification property [24]. Fingerprints are unique collection of patterns called the ridges (single-curved segments) and valleys (region between two adjacent ridges) [24]. Two Antares AutoTune Pro 9.0.1 serial key Archives characteristics of fingerprints that make them the best choice for biometric identification are [25]: • Individuality and • Persistence.

38

A. Anuradha and H. B. Pandit

It is difficult to find two people with the same fingerprints [26]. Most of the research has been done on fingerprints for “fingerprint recognition and matching.” Almost all of them have tried to extract the minutiae extraction for recognition and matching. However in the current research, instead of only identifying the ridges or valleys, special features of the fingerprint image have been extracted, where the unique feature includes corners and blob features. These features are called the local features like points, edges, or small image patches. These features are not for any recognition of matching, but for the unique stego key generation for creating the stego image in the best possible manner. Thus both the objectives of confirming the valid sender as Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download as concealing of the secret message can be fulfilled simultaneously. One of the advantages of this approach is Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download due to the unique key generation, though the length of the message can be known by some steganalysis process, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, since the research is based on the “Kerckhoff’s principle,” the intruder cannot extract the secret bits being embedded.

7 The Model A small portion of the location coordinates, collected from the variable descriptor, has been represented in Table 1. Fingerprints are used as a part of biometrics vigorously these days for the identification of persons. Thus for unique key generation, the uniqueness of fingerprint image can be used. Thus, the unique features of the fingerprint image and their locations have been extracted. Figure 2 depicts that, corner features have been detected first, i.e., the FAST features have been extracted using “detectFASTFeatures()” function. Table 1 Location vector for unique key

Unique Stego Key Generation from Finger …

39

Fig. 2 Model of unique key generation from fingerprint image

Following this, the feature vectors have been extracted using extractFeatures() function. Along with the descriptors, the model resulted in an array containing the pair of X- and Y-coordinates for the local features. Though different methods are available for detecting corner and blob features, the research has used “detectFASTFeatures()” function, for detecting corner features, that returns the corner point objects. The minimum accepted quality of corners (“MinContrast”) has been taken as “0.1”, followed by “extractFeatures()” function, for extracting the feature vectors or the descriptors, and their corresponding locations. These locations will be used for embedding the secret bits in the cover image for the purpose of image steganography in the next step of the research.

8 Results The size of the fingerprint image taken in the research is 470 × 450 (unit 8), being downloaded from Internet [27]. The algorithm could able to extract 883 corner points, in the form of a 883 × 1 cornerPoints, using “detectFASTFeatures()” function. Through “extractFeatures()” function, 763 valid corners have been identified. Thus, the valid corner locations found is a 763 × 2 matrix (single), containing the X- and Y-coordinates of the locations of the valid corner points (Figs. 3, 4, and 5).

40 Fig. 3 Original fingerprint image

Fig. 4 Detected corner points plotted with insertMarker() function

A. Anuradha and H. B. Pandit

Unique Stego Key Generation from Finger …

41

Fig. 5 Plotted corner points for the fingerprint image

References 1. https://www.trustwave.com. Last accessed 10 Mar 2020 2. Bhanupriya Katre, B.: Dynamic key based LSB technique for steganography. Int. J. Comput. Appl. 167(13), 0975–8887 (2017) 3, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. http://whatis.techtarget.com. Last accessed 10 Mar 2020 4. https://www.techrepublic.com. Last accessed 10 Mar 2020 5. https://link.springer.com. Last accessed 21 Feb 2019 6. https://en.wikipedia.org. Last accessed 10 Mar 2020 7. Kharrazi, M., Sencar, H.T., Memon, N.: Image steganography: concepts and practice. 22 Apr 2004, 1:49 WSPC/Lecture Notes Series: 9in x 6in MAIN 8. Srilakshmi, P., Himabindu, Ch., Chaitanya, N., Muralidhar, S.V., Sumanth, M.V., Vinay, K.: Text embedding using image steganography in spatial domain. Int. J. Eng. Technol. 7(3.6) 1–4 (2018) 9. Sahu, A.K., Swain, G.: Digital image The Sims 4 PC SERIALS crack serial keygen using PVD and modulo operation. Internetworking Indonesia J. 10(2) (2018) 10. Majumder, J., Pradhan, C.: High capacity image steganography using pixel value differencing method with data compression using neural network. Int. J. Innov. Technol. Explor. Eng. (IJITEE). 8(12) (2019). ISSN: 2278–3075 11. Rashid, RD, Majeed, TF: Edge based image steganography: problems and solution. In: 2019 International Conference on Communications, Signal Processing, and their Applications (ICCSPA), Electronic ISBN: 978-1-7281-2085-0, USB ISBN: 978-1-7281-2084-3, Print on Demand (PoD) ISBN: 978-1-7281-2086-7 (March 2019) 12. Margalikas, E., Ramanauskait˙e, S.: Image steganography based on color palette transformation in color space. EURASIP J. Image Video Process. Article number: 82 (2019) 13. Rachmawanto, E.H., Rosal, D., Setiadi, I.M., Sari, C.A., Andono, P.N., Farooq, O., Pradita, N.: Spread embedding technique in LSB image steganography based on chaos theory. In: 2019 International Seminar on Application for Technology of Information and Communication (iSemantic), Electronic ISBN: 978-1-7281-3832-9, USB ISBN: 978-1-7281-3831-2, Print on Demand (PoD) ISBN: 978-1-7281-3833-6 (2019) 14. Al-Husainy, M.A.F.: Image steganography by mapping pixels to letters. J. Comput. Sci. 5(1):33–38 (2009). ISSN 1549-3636 © 2009 Science Publications 15. Liu, H.-H., Lee, C.-M.: High-capacity reversible image steganography based on pixel value ordering. EURASIP J. Image Video Process. Article number: 54 (2019) 16. Hameed, M.A., Hassaballah, M., Aly, S., Awad, A.I.: An adaptive image steganography method based on histogram of oriented gradientand PVD-LSB techniques. Digital Object Identifier 10.1109/ACCESS.2019.2960254. 17th Dec 2019

42

A. Anuradha and H. B. Pandit

17. https://in.mathworks.com. Last accessed 10 Mar 2020 18. https://www.igi-global.com/dictionary/moving-object-detection-and-tracking-based-on-thecontour-extraction-and-centroid-representation/20697. Last accessed 10 Mar 2020 19. https://www.cmlab.csie.ntu.edu.tw/cml/dsp/training/coding/motion/me1.html. Last accessed 10 Mar 2020 20. https://www.usenix.org/legacy/publications/library/proceedings/sec2000/full_papers/dha mija/dhamija_html/node2.html. Last accessed 10 Mar 2020 21. https://thenextweb.com/future-of-communications/2016/02/17/the-ultimate-guide-to-select ing-a-device-authentication/. Last accessed 10 Mar 2020 22. The Irish Council for Bioethics, Biometrics: Enhancing Security or Invading Privacy? www. bioethics.ie 23. Tukur, A.: Fingerprint recognition and matching using matlab. Int. J. Eng. Sci. (IJES) 4(12), 01–06 (2015), ISSN(e):2319-1813, ISSN (p): 2319-1805 24. Bansal, R., Sehgal, P., Bedi, P.: Minutiae extraction from fingerprint images—a review. IJCSI Int. J. Comput. Sci. 8(5), No 3, ISSN (Online): 1694–0814. www.IJCSI.org (September 2011) 25. http://biometrics.cse.msu.edu/Publications/Fingerprint/PankantiPrabhakarJain_FpIndividual ity_PAMI02.pdf. Last accessed 10 Mar 2020 26. http://kaheel7.com/eng/index.php/gods-creations/580-humans-fingerprints. Last accessed 10 Mar 2020 27. https://openclipart.org/tags/fingerprint. Last accessed 10 Mar 2020 28. Zahed, A., Sakhi, M.R.: A novel technique for enhancing security Edraw Max 10.1.6 Crack Archives biometric based authentication systems. Int. J. Comput. Electr. Eng. 3(4) (2011) 29. Fridrich, J., Goljan, M.: On estimation of secret message length in LSB steganography in spatial domain. http://www.ws.binghamton.edu/fridrich 30. Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.) Information hiding, LNCS 1525, pp. 344–354. Springer, Berlin (1998) 31. Rana, M.S., Sangwan, B.S., Jangir, J.S.: Art of Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download an introduction to steganography. Int. J. Eng. Comput. Sci. 1(1), 11–22 (2012) 32. Kumar, A., Pooja, K.M.: Steganography—a data hiding technique. Int. J. Comput. Appl. 9(7), 0975–8887 (2010) 33. Sharma, V., Kumar, S.: A new approach to hide text in images using steganography. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(4) (2013). ISSN: 2277-128X 34. Kabay, M.E.: Identification, Authentication and Authorization on the World Wide Web. M. E. Kabay & ICSA (1997) 35. Zaeri, N.: Minutiae-based fingerprint extraction and recognition. INTECH, Open Science/Open Minds 36. Keerthana, M.S.: Fingerprint matching incorporating ridge features using contourlet transforms. Int. J. Innov. Res. Comput. Commun. Eng. ISSN(Online): 2320–9801, ISSN (Print): 2320-9798 37. Parra, P.: Fingerprint Minutiae Extraction and Matching for Identification Procedure. Department of Computer Science and Engineering, University of California, San Diego 38. Barham, Z.S.: Finger print recognition using MATLAB 39. Fridrich, J., Goljan, M., Soukal, D.: Searching for the Stego-Key. http://www.ws.binghamton. edu/fridrich 40. http://blogs.getcertifiedgetahead.com. Last accessed 14 Mar 2019 41. https://securitycommunity.tcs.com. Last accessed 18 Feb 2019 42. http://onin.com. Last accessed 15 Apr 2019

Self-powered IoT-Based Design for Multi-purpose Smart Poultry Farm Tajim Md. Niamat Ullah Akhund, Shouvik Roy Snigdha, Md. Sumon Reza, Nishat Tasnim Newaz, Mohd. Saifuzzaman, and Masud Rana Rashel

Abstract The purpose of the present work is to make an IoT-based smart poultry farm system. In this work, the power supply is developed using renewable energy mainly with solar energy and nano-hydro. This IoT-based module helps to develop the system’s productivity to ensure farm’s constant healthy condition. The proposed system collects several types of sensor data from the farm, such as temperature, humidity, toxic gas, water level, and moisture. Then the overall conditions will 98lite III Professional crack serial keygen controlled and be kept proper level with the developed system automatically. This system stores all the data in the central database for further analysis and getting knowledge from them also gives notifications. Optimal values for the power and health condition are obtained through the stored data. It helps to predict future conditions too. The electrical devices, doors, and dustbins of the farm can be controlled via IoT systems through mobile phones and online platforms from remote locations and from anywhere in the world with Internet connectivity.

1 Introduction The goal of this project is to produce healthy and sustainable poultry meat and also data analysis for qualitative and quantitative research, where people can get fresh meat with profit. Most importantly, solar energy and hydro energy are used in the proposed system. In Bangladesh, farmers are not conscious about health and automation for growing up chicken so that, most of the time they use the medicine, which is the most injurious for our health. For fresh chicken, farmers have to maintain the medium level T. Md. N. U. Akhund (B) · S. R. Snigdha · Md. S. Reza · Mohd. Saifuzzaman · M. R. Rashel Daffodil International University, Dhaka, Bangladesh e-mail: [email protected] T. Md. N. U. Akhund · N. T. Newaz · Mohd. Saifuzzaman Jahangirnagar University, Savar, 1342 Dhaka, Bangladesh M. R. Rashel University of Evora, Largo dos Colegiais 2, 7000-645 Évora, Portugal © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 T. Senjyu et al. (eds.), Information and Communication Technology for Intelligent Systems, Smart Innovation, Systems and Technologies 196, https://doi.org/10.1007/978-981-15-7062-9_5

43

44

T. Md. N. U. Akhund et al.

of automation but due to the reduction of skill. Likewise, the room temperature will be 35 °C when the chicken appears. At present, meat and egg production can adhere only 68–64% of the national demand as the report of Kris Gunnar’s, BSc on July 5, 2018 [1]. But if we consider what type of poultry chicken we eat, that is harmful for health. The chickens are given antibiotic injections seven days after birth and when we eat this type of chicken our antibiotic resistance became more weak. Also, the food made for poultry chicken is combined with chromium and arsenic. Chromium is not banished even after cooking because its temperature tolerance is 2900 °C but we are normally cooking at 100–150 °C so that is not possible to destroy chromium. By eating this type of chicken, our kidney becomes affected and it also increases the chance of cancer. Due to arsenic, diabetics and neurological difficulty may attack us. In Bangladesh, there are 64,769 register poultry farms, but that is not enough to maintain public demand said Bangladesh Livestock Research Institute [2]. Including human life, electronic world, voting everything are related with IoT nowadays [3, 4]. A current report shows that there are total 14.2 billion devices connected Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download 2019 and it will reach 25 billion by 2021. Use of IoT is increasing in robotics and daily life [5, 6]. The embedded devices and sensors create revolution in our world through a new era such as homes, mobiles, supermarket, industry as well as farm instrumentation and voting too [7]. All of these motivated us to develop such an IoT smart farm system with renewable energy for poultry farms. This work has the following specific objectives: 1. As we consider Bangladesh, we cannot get fresh poultry meat as well as egg. In that case, our fundamental target is to produce healthy and sustainable meat owing to monitoring farming environmental parameter like temperature, humidity, CO, LPG, smoke, and so on. 2. In addition, the total power comes from the solar panel and nano-hydro generator that means we try to introduce the most convenient renewable energy. 3. Another more, by analyzing data we predict the weather and disease of poultry chicken and take the suitable step. The rest of the paper is organized as follows: related research has been presented in Sect. 2. The system model and methodology have been presented in Sect. 3. Obtained results and related discussion have been presented in Sect. 4, while conclusions and future works have been outlined in Sect. 5.

2 Related Work Authors of [1] proposed wireless controlling method on their paper where they control the whole system through customer command. By using the application of wireless sensor network, quality of chicken can be improved ultimately that leads to improving human health, and a wearable wireless sensor can detect tainted chickens [2], Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Authors of [8] implement Environment Controlled Poultry Management System (ECPMS) using temperature and humidity sensor, gas sensor, and LDR, Raspberry

Self-powered IoT-Based Design for Multi-purpose …

45

Pi, and camera monitoring the poultry farm can handle the situations like turn on or off light and fan. Authors of [9] have mentioned IoT-based smart farming systems including GSM in 2019. But GSM systems may not be cost-effective for rural people of Bangladesh. Authors of [10] developed a fire base alarm system using Raspberry Pi and Arduino Uno; if the smoke sensor detected any smoke because of fire, the camera captures the images and provides notification. The main advantages of this system are it will provide the right information to the firefighter and reduce the false report. They have proposed a technique to improve the productivity of a chicken farm by using modern technology of wireless sensor networks. Authors of [11] have proposed an IoT-based electronic voting system, that is automated and controlled with embedded systems. Authors of [12] have proposed an IoT-based system that for food’s cultivation and protection, they irritate bats from the fruit trees. Authors of [13] have proposed an IoT-based robot that can be controlled via the gestures of human body parts. In 2018, authors of [14] represent a statistic of Zambia and proposed an IoT-based monitoring system in a poultry house with GSM and GPRS. Here, they just monitored the current temperature but did not develop any controlling system. Moreover, today’s smart world looks into smart city [15, 16], security [17, 18], and many more, so toward making the world smarter our research will definitely add great value.

3 System Model and Methodology The working process of the proposed system is as follows: 1. The total system is consisted of temperature sensor, humidity sensor, gas sensor, water-level sensor, moisture sensor, multiple node MCU, Arduino, OLED display, relay module, HC-05 Bluetooth sensor, LCD display, fan, light, cooler, heater, servomotors, etc. 2. All the sensors collect data from the environment then pass data in Arduino. Arduino sends the data to cloud server through GSM module or Wi-Fi module node MCU and also stores information in SD card. 3. All the electrical devices, doors, dustbins, lights, and fans are automated and those can be controlled via Bluetooth, Wi-Fi, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, and Internet from anywhere in the world. 4. The comfortable environment for chicken is kept via automatic controlling. User can set the threshold values of temperature, humidity, and water level. If the temperature increased more than the threshold, the fans and cooler will turn on automatically. Heater will turn on if opposite things happen. If the water level of the water pot decreases, the pumps will automatically turn on to supply water. 5. The full system is powered by solar and nano-hydro system. Backup power is stored in the batteries during daytime. The full developed system concept is illustrated in (Fig. 1). The system flow diagram is mentioned in (Fig. 2).

46

T. Md. N. U. Akhund et al.

Fig. 1 Conceptual diagram of the system

According to the Bangladesh Livestock Research Institute, the temperature is one of the great facts for growing up poultry chicken naturally. Also, they ensure about 90% of chicken is dead due to lack of monitoring and controlling. This proposed system will control the temperature of the farm as our findings of recommended temperature (Table 1) for particular days of chicken.

4 Result and Discussion The proposed system results the following features and outputs: 1. 2. 3.

4. 5. 6. 7. 8. 9.

Power supply of the system obtained from battery, solar, and portable nanohydro power generator from water flow of the system. It can measure temperature, humidity, water level, moisture, and toxic gas. Light and fan depend on the temperature level, and when the temperature is below 20 °C, all the heating light will turn on, likewise when the temperature is up to 24 °C, automatically the heating light will be turning off and the cooling fan will be on due to temperature control. This threshold value can be changed by the user. It includes insect repelling system with ultrasonic sound. All the electronic devices can be controlled via Android phone from short distance via Bluetooth and from all over the world via Internet. Humidity between 60 and 80% is sufficient for poultry chicken. The system can maintain that. Gets data in CVS, XML, and JSON format suitable for MATLAB and Python analysis. Monitoring, analyzing, and controlling can be done from anywhere in the world. Auto-water supply sensing water sensor.

Self-powered IoT-Based Design for Multi-purpose … Fig. 2 System flowchart

47

48 Table 1 Recommended temperature for chicken

T. Md. N. U. Akhund et al. Age of chicken

Temperature in degree celsius (°C)

First day

30–32

First Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download 30

Second week

26

Third week

24

Fourth week

22

Overall Recommend

28 (normal body temperature)

10. Used MQ-135 gas sensor module detects the amount of ammonia (NH3 ), nitrogen oxides (NOx ), alcohol, benzene, smoke, and CO2 in the farm. 11. Shows sensor values, voltage, and current in OLED display. 12. It sends data with Wi-Fi to cloud database. 13. Collected data can be seen from mobile app. 14. Sends data via mobile SMS. 15. Predict and further analysis with machine learning in future. 16. All the data are saved in the cloud database of ThingSpeak. The channel link is: https://thingspeak.com/channels/685524. 17. Through the developed smart farm app, the user can get update and control farm from anywhere. By this app, the user can monitor multiple farm conditions. Also, this app stores all the information about the user to get appropriate information about the farm. If the system is applied in real-time world, the chicken can live with the natural food rather than artificial or tannery food. In this regard, some statistics are found which prove that natural foods for poultry will increase health and decrease cost (see Table 2). In overall research for highly productive and hygienic chicken, this kind of feature is really effective for to reach our main goal. The device is already tested in real environment in a poultry farm and huge data are collected. These data may be used to extract valuable information through artificial intelligent algorithms in future. The prototype is shown in (Fig. 3). This system is also installed in real-time environment (Fig. 4). The collected data can be monitored from developed app and Web site, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, and the electric devices and doors are controlled via Bluetooth and Internet through Android apps (Fig. 5). The collected sensor data can be downloaded as csv or Excel format from the cloud server and mobile app (see Fig. 6). This system collected a poultry farms data for 3 months. 117,414 entries have been collected. Among them, 500 values of temperature, humidity, and water level were considered to draw the graph. There were 500 chickens. Among them, only 3 chickens died after applying this system. The collected unanalyzed data are visualized in (Fig. 6).

Self-powered IoT-Based Design for Multi-purpose … Table 2 Natural feed cost versus tannery feed for poultry

49

Materials

Quantity (kg)

Estimated value (TK)

Wheat/crushed corn/crushed rice

800

(800 × 15 − 18) = 12,000–14,400 tk

Wheat husk

100

(100 × 10 − 15) = 5000–7500 tk

Rice paddy

500

(500 × 10 − 15) = 5000–7500 tk

Sesame foul

240

(240 × 20 − 22) = 4800–5280 tk

Dried fish powder

200

(200 × 55 − 60) = 11,000–12,000 tk

Oyster powder

140

(140 × 20 − 25) = 2800–3500 tk

Salt

10

(10 × 7.5 − 8.5) = 150–170 tk

Total (1990 kg) natural food cost = 40750–50350 tk Total cost of 1990 kg with tannery food Provita Feed Ltd. (1990 kg)

= 73,630–79,600

Agata Feed Mills Ltd. (1990 kg)

= 70,446–88,555

Bengal feed (1990 kg)

= 71,640–83,580

Fig. 3 System prototype

5 Conclusion and Future Work This century is the era of Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Things are changing very rapidly. It is important to adopt the technology to give service to all levels of people. IoT-based solution is needed of time to get better result from farming in every sector. This work has developed a device that establishes directional communication between actors. This focuses on poultry industry. Its work is to improve and ensure healthy condition in the poultry farm. This system collects lots of data and stores them in cloud server.

50

T. Md. N. U. Akhund et al.

Fig. 4 IoT-based smart poultry farm system in real environment

App Home

Data visualization in app

Controlling from anywhere through Internet and Bluetooth

Fig. 5 Real-time data monitoring Android app

Fig. 6 Data downloading and visualizing (suitable for MATLAB analysis)

Self-powered IoT-Based Design for Multi-purpose …

51

Those data can be analyzed and predict about future conditions of the farm. This system’s future work will focus on that.

References 1. Mahale, R.B., Sonavane, D.S.: Smart poultry farm: an integrated solution using WSN and GPRS based network. Int. J. Adv. Res. Comput. Eng. Technol. 5(6) (2016) 2. Ayaz, M., Ammad-uddin, M., Baig, I.: Wireless sensor’s civil applications, prototypes, and future integration possibilities: a review. IEEE Sens. J. 18(1), 4–30 (2017) 3. Akhund, T.M.N.U., Mahi, M.J.N., Tanvir, A.H., Mahmud, M., Kaiser, M.S.: ADEPTNESS: Alzheimer’s disease patient management system using pervasive sensors-early prototype and preliminary results. In: International Conference on Brain Informatics, pp. 413–422. Springer, Cham (2018) 4. Sarker, M.M., Akhund, T.M.N.U.: The roadmap to the electronic voting system development: a literature review. Int. J. Adv. Eng. Manage. Sci. 2(5) 5. Akhund, T.M.N.U.: Study and implementation of multi-purpose IoT nurse-BoT 6. Akhund, T.M.N.U., Sagar, I.A., Sarker, M.M.: Remote temperature sensing line following robot with bluetooth data sending capability 7. Akhund, T.M.N.U.: Remote sensing IoT based android controlled robot. Methodology 9, 11 8. Islam, M.M., Tonmoy, S.S., Quayum, S., Sarker, A.R., Hani, S.U., Mannan, M.A.: Smart poultry farm incorporating GSM and IoT. In: 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), pp. 277–280. IEEE (2019) 9. Mitkari, S., Pingle, A., Sonawane, Y., Walunj, S., Shirsath, A.: IOT based smart poultry farm. System 6(03) (2019) 10. Paplicki, P.: Simplified reluctance equivalent circuit for hybrid excited ECPMS-machine modelling. In: 2016 21st International Conference on Methods and Models in Automation and Robotics (MMAR), pp. 241–244. IEEE (2016) Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Sarker, M.M., Shah, M.A.I., Akhund, T.M.N.U., Uddin, M.S.: An approach of automated electronic voting management system for Bangladesh using biometric fingerprint. Int. J. Adv. Eng. Res. Sci. 3(11) (2016) 12. Akhund, T.M.N.U., Rahman, M.H., Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, Banisher, B.: An approach to create a high frequency ultrasound system to protect agricultural field from bats 13. Akhund, T.M.N.U.: Designing and implementation of a low-cost wireless gesture controlled robot for disable people 14. Phiri, H., Kunda, D., Phiri, J.: An IoT smart broiler farming model for low income farmers. Int. J. Recent Contrib. Eng. Sci. IT (iJES) 6(3), 95–110 (2018) 15. Saifuzzaman, M., Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, N.N., Nur, F.N.: IoT based street lighting and traffic management system. In: 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC), Dec 21–23 2017 16. Siddique, M.J., Islam, M.A., Nur, F.N., Moon, N.N., Saifuzzaman, M.: BREATHE SAFE: a smart garbage collection system for Dhaka city. In: 2018 10th International Conference on Electrical and Computer Engineering (ICECE), pp. 401–404 (2018) 17. Shetu, S.F., Saifuzzaman, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, M., Moon, N.N., Nur, F.N.: A survey of Botnet in cyber security. In: 2019 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT), Jaipur, India, 2019, pp. 174–177 18. Saifuzzaman, M., Khan, A.H., Moon, N.N., Nur, F.N.: Smart security for an organization based on IoT. Int. J. Comput. Appl. 165(10), 33–38 (2017)

Phrase-Based Statistical Machine Translation of Hindi Poetries into English Rajesh Kumar Chakrawarti, Pratosh Bansal, and Jayshri Bansal

Abstract Statistical machine translation (SMT) is a variant of machine translation where the translations are handled with statistically defined rules. Numerous researchers have attempted to build the framework which can comprehend the different dialects to translate from one source language to another target language. However, the focus on the translation of poetry is less. Reliable and rapid transliteration of the poetry is very mandatory for the execution of the computer to translate the poem from one language to another. The existing approach has several issues such as time consumption, quality of the translation process, and matching of similar words. To overcome these issues, we propose a phrase-based statistical machine translation (PSMT) with special adherence to word sense disambiguation (WSD), Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Quality of the translation is increased by sensing the ambiguous words with WSD. The Hindi WordNet along with the Lesk algorithm identifies the ambiguous words and senses the exact meaning before the phrase extraction. Finally, the proposed method is compared with machine translation schemes such as rule-based machine translation and transfer-based machine translation. The experimental results suggest that the proposed method performed well with the inclusion of WSD in the PSMT technique.

R. K. Chakrawarti (B) Department of Computer Engineering, Institute of Engineering and Technology, Devi Ahilya Vishwavidyalaya, Indore 452020, Madhya Pradesh, India e-mail: [email protected] P. Bansal Department of Information Technology, Institute of Engineering and Technology, Devi Ahilya Vishwavidyalaya, Indore 452020, Madhya Pradesh, India e-mail: [email protected] J. Bansal Human Resource Development (HRD) Centre, Devi Ahilya Vishwavidyalaya, Indore 452020, Madhya Pradesh, India e-mail: [email protected] © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021 T. Senjyu et al. (eds.), Information and Communication Technology for Intelligent Systems, Smart Innovation, Systems and Technologies 196, https://doi.org/10.1007/978-981-15-7062-9_6

53

54

R. K. Chakrawarti et al.

1 Introduction India being a multilingual nation has various languages for communication. Yet Indians accentuate on Hindi for communication. Across the country, there is a large population that is not aware of linguistics and semantics of the English language. In this manner, there is a need to build up a machine translation application for the poems that will cross over any barrier between these two languages [1, 2]. Today, most nations acknowledge Indian societies and attempt to Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download familiar with the Hindi language to learn the Indian culture. Hence, interpretations of Hindi writing and sonnets are extremely basic and significant to understand. The machine translation systems are automated computer programs (software) capable of translating information available in one language (called the source language) into different dialects (called the objective language) [3]. With the support of machine translation frameworks, interpretations of Hindi writing into English are made simple. Existing frameworks on interpretations of Hindi sonnets into English is vital and an inconceivable exercise in machine translation model. In this, lyrics assume a significant role in contrast with the written work of interpretations. Since ballads give sentiments, feelings, expression, and more, the genuine interpretations of the sonnets are extremely significant. The substantial data for the interpretation remained gathered to interpret the Hindi lyric into English. Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download Hindi does not pursue any typical standard but, represented in various ways, a standard-based interpretation has been pursued in which many linguistic principles have been built to actualize in a POS Tagger. Moreover, Hindi words can be written in various ways but it does not pursue a particular spelling design. To address this problem, an accumulation of the corpus in an information base recognizes the right significance of phrase or word concerning its context by the word sense disambiguation (WSD) [4, 5]. WSD has many applications such as document indexing, theme extraction, semantic annotation, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download, genre identification, semantic web search, and information retrieval [6–9]. The machine translation techniques are direct machine translation (DMT), rule-based machine translation (RMT), example-based machine translation (EMT), interlingua machine translation (IMT), knowledge-based machine translation McAfee SafeKey crack serial keygen, statistical-based machine translation (SMT), and hybridbased machine translation (HMT) [10]. Among various MT systems, the SMT plays a significant role in the translation process. SMT is a technique widely used for translation purposes with the help of statistical analysis in order to formulate rules which are best for the translation of a target sentence [11]. The SMT categorized into four different types, namely word-based, syntax-based, phrase-based and hierarchical phrase-based. The word-based SMT utilizes the words and their neighbor’s during the translation process. While the phrase-based methods use phrases instead of words, it also considers the neighboring phrases while translation [12]. The syntax-based machine translation incorporates the syntax representation in order to find the best of the words. The hierarchical phrase-based is a hybrid approach which combines the strength of phrase- and syntax-based methods. It employs the synchronous contextfree grammar for the translation purpose [13, 14]. The proposed method employs the

Phrase-Based Statistical Machine Translation …

55

phrase-based SMT in order to solve Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download problems through the statistically devised rules. Some of the problems faced during the translation process are discussed as follows the machine transliteration technique deals with the problem such as retrieval of cross-lingual, probability evaluation of translation, difficult to find the sentence with the prime and highest probability, multiple representations of one word [13]. In the Trans tech system, several words and grammatical rules arise the problem for translating into another language [15]. The example-based machine translation is good for translating the short sentence but it is worst for translating long sentences of the poem [16], Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. The word substitution in the hybrid approach does not provide desired results as it does not care about the syntactic and semantic constraints of the target language [17, 18]. The machine translation system needed to enhance the performance of the system with complex sentences. The major problem arises in machine translation is due to the unavailability of structural, morphological differences, and word-aligned data during the translation of different languages [19–21]. Contribution In this paper, we aim to discuss the machine translation system based on the statistical machine translation system (SMT). The study on various SMT and translation models of morphologically rich languages has been carried out. The study gives an insight into how the translation models have been carried out in each of the works. The research finds various challenges associated with the translation of Indian languages into English. One of the challenges is the words sense ambiguity widely found in the Indian language. The sense ambiguity occurs when the certain words sounds and spells similar but the sense of the word differs based on the context of the sentence. Generally, in SMT this problem is not addressed in most of the research. The proposed phrase SMT solves this problem by integrating the WSD with the SMT to improve the translation quality. Organization The remaining section of the paper is described as follows: Sect. 1 discusses the background information. Section 2 provides the literature review, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Section 3, explains the proposed PSMT method in detail. In Sect. 4, we present the implementation details and results. Finally, Sect. 5 concludes the work.

2 Literature Review A few sorts of research have been carried out for the poetry translation, accessible in one language to other languages around the globe. Machine translation has rolled out a major improvement in making the Indian language progressively adaptable to learn and comprehend which has been considered by different translation techniques but has to face a few difficulties during translation. The research on the SMT and the details of various translation models carried out are discussed in this section.

56

R. K, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Chakrawarti et al.

Xiong et al. [11] proposed a maximum entropy-based segmentation model for STM. The sentences are spitted into sequences of segments which can be translated. The phrasal extraction is a small module among the collection of modules used in the SMT; after extracting the phrases by maximum entropy, the result is integrated with the SMT. The experiment is conducted with the news domain and is the method that has improved the quality of translation in terms of BELU, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. Ilknur and Kemal [22] proposed PSMT with the aid of local word reordering. The local word reordering concentrated to obtain the word order of certain English prepositional phrases and verb with respect to the morpheme order of corresponding Turkish verbs and nouns. A morpheme-based language model is used for decoding, and with the aid of wordbased model, re-ranking of n best list is handled by the decoder. The decoder output is repaired by correcting the words which have problems like incorrect morphological structure and words which are outside of the vocabulary. Liu et al. [23] proposed a framework where the translation memory is joined with the phrase-based statistical machine translation. The translation memory is integrated with the phrase-based MT through this approach. In the unified framework, different informations are extracted from translator machine (TM) in order to ease the SMT decoding process. The experiment is simulated in a Chinese English TM database. The result shows that there is an improvement in BLEU score. The approach is tested with different models and training data in order to prove the sturdiness of the approach. Pathak et al. [24] proposed a method to translate from Hindi to English with an automatic parallel corpus generation system. The contents of Hindi news and its headline obtained from the media named Navbharat Times are extracted based on the month and year. The unwanted data are removed in the preprocessing step, and with the aid of Google translator API, the crawled contents are translated into English contents. Then align both the news and compare it with the fuzzy string matching algorithm by finding its similarity which was based on Levenshtein distance. Finally, the threshold value was taken from the matching algorithm and if the ratio was more than the threshold value save both the news content as a part of the parallel corpus process. This approach needs to augment the parallel corpus for the translation among two languages. Sharma and Mittal [25] proposed a dictionary-based query translation system that aims to translate the Hindi words into English. In this Lucky Patcher Mod Apk 9.6.9 Crack Free Version 2022 Download, first, tokenize the queries and before removing the stop words create the multi-word terms by using the ngram technique for the translation. Next, match the source language terms with the bilingual dictionary if the terms are not translated then move to other cases by calculating the percentage match of the highest common subsequence of the source query. If the query terms are not translated in both the cases then, out-of-vocabulary (OOV) term was used by a rule-based approach would convert them into a roman format. Finally, collect the target language document from the input dataset and the query term was mapped to match the words for the translation. This approach was difficult to translate the named entities into the English language. Subalalitha et al. [26] proposed a template-based information extraction (IE) framework for translating the Tamil poem to English. In this framework, the information can be extracted by template-based information and n-grams-based information. Initially, bilingual mapping was used to translate each word and two features are required to

Phrase-Based Statistical Machine Translation …

57

design templates such as term-based and universal networking language knowledge base (UNL KB) which are used to match the words. In the term-based features, there would be an appropriate match between the input and the feature. In some cases, some features were not present in the template, and then UNL KB is used to add semantic constraints for the poem. Finally, the part-of-speech of the words presented in the poem identified by the Tamil morphological analyzer that analyze the noun, verb, adverb, and adjective which extracts the information by n-grams to check its grammar for the translation. This approach has high computational complexity for the translation process. Natu et al. [27] introduced transfer-based machine translation (TBMT) scheme that aims to translate the Hindi text into English. This scheme performed several phases such as preprocessing, tokenizer, part-of-speech (POS) tagging, translation, and grammar check. Initially, the translated sentence should be sophisticated in the preprocessing stage and each word required POS tagging should be segmented into tokens. Then, the Viterbi algorithm used with the hidden Markov model assign sequence of POS tag for the translated words. The segmented words find their translated word from the database for translation. Finally, check the grammar for the words and arranged to determine the final structure of the translated words. This approach needs to enhance the quality of translation gender, number, and tense. Mishra et al. [28] presented the rule-based machine translation (RBMT) scheme to translate Hindi idioms into English. This technique contains two phases such as comparison and translation phases. In the first phase, the system compares the words with the comparison algorithm where the input was searched by the Hindi database. If the input was present in the database, then input belongs to case 1 such as different meanings and different forms in both the language and sends to transferbased module. Otherwise, it belongs to two cases such as case 2 and case 3 where input idioms with the same meaning and same form, others have the same meaning but different form in both the language in the database, in such a case send them to interlingual-based module. The transfer-based module composed of tokenizer, parser, POS tagger, and declension tagger which translates the idiom by case 2 and case 3. The interlingual-based module composed of input, mapper, database, transfer-based module, and output which translate by case 1. Finally, these modules are used to produce the English translation. This approach needs to enhance the efficiency of the translation of idiom.

3 Proposed Phrase-Based Statistical Machine Translation The detail of the proposed SMT is discussed in this section. Generally, SMT-based translation methods consist of the collection of small modules which are involved in the translation process. The PSMT is used to translate the Hindi poetry along with incorporating the WSD approach to sense the disambiguation. The PSMT makes use of the phrases of one or more words in the translation process. The PSMT model first divides the input into phrases. The PSMT is based on the noisy channel model in the information theory.

58

R. K. Chakrawarti et al.

Fig. 1 Proposed PSMT technique

Source and Target text Preprocessing

Input text

Translation model WSD + Hindi WordNet

Language Model

Training module Phrase Table Extraction

Input

Decoding

Target

Figure 1 shows the block diagram of the proposed approach. Consider a sentence S of a target language, Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download. The sentence S consists of a series of words. The machine translation transfers the source language Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download is given as s1J = s1. . s j. . S J into a target language t1I = t1. . ti. . TI. In SMT, the conditional probability  I sentence  J is given as Pr t1 t1IThe phrase-based translation utilizes the phrase which is the sequence of word. In PBT, the source sentence is segmented into phrase, and each phrase is translated and the target sentence is obtained from the phrase translation.

3.1 Word Alignment Model Initially, preprocessing is carried with the raw data. In the preprocessing stage, extra spaces and character encoding are resolved by using the AntConc tool from the annotated corpus. With the help of Tag: Ableton Live Keygen tokenizer, the Hindi poem is divided into

Phrase-Based Statistical Machine Translation …

59

Источник: [https://torrent-igruha.org/3551-portal.html]
s1 .The probability model is used for translation by finding solution for the maximization problem.    tˆ1I = arg max Pr t1I Microsoft Safety Scanner 1.347 Crack 2022 Keygen Free Download

2 comments

  1. I had the full name of wanted criminals saved in my notepad, but I deleted it because I didn’t want to snitch on them. After they’ve backstabbed me. I’m planning to release the full name of those guys.

Leave a Reply

Your email address will not be published. Required fields are marked *