دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1st ed. 2021] نویسندگان: A.Pasumpon Pandian (editor), Xavier Fernando (editor), Syed Mohammed Shamsul Islam (editor) سری: ISBN (شابک) : 9811609640, 9789811609640 ناشر: Springer سال نشر: 2021 تعداد صفحات: 1013 [980] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 32 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Computer Networks, Big Data and IoT: Proceedings of ICCBI 2020 (Lecture Notes on Data Engineering and Communications Technologies, 66) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه های کامپیوتری، داده های بزرگ و اینترنت اشیا: مجموعه مقالات ICCBI 2020 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 66) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب بهترین مقالات پژوهشی منتخب ارائه شده در کنفرانس بینالمللی شبکههای کامپیوتری، دادههای بزرگ و اینترنت اشیا (ICCBI 2020)، که توسط Vaigai College Engineering، Madurai، تامیل نادو، هند در 15 تا 16 دسامبر 2020 سازماندهی شده است، ارائه میکند. مقالات اصلی در مورد شبکه های کامپیوتری، پروتکل های شبکه و شبکه های بی سیم، فناوری های ارتباطی داده و امنیت شبکه را پوشش می دهد. این کتاب منبع و مرجع ارزشمندی برای محققان، مدرسان، دانشجویان، دانشمندان، مهندسان، مدیران و دست اندرکاران صنعت در آن حوزه های مهم است.
This book presents best selected research papers presented at the International Conference on Computer Networks, Big Data and IoT (ICCBI 2020), organized by Vaigai College Engineering, Madurai, Tamil Nadu, India, during 15–16 December 2020. The book covers original papers on computer networks, network protocols and wireless networks, data communication technologies and network security. The book is a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers and industry practitioners in those important areas.
Foreword Preface Acknowledgements Contents About the Editors Maximizing Network Lifetime in WSN Using Ant Colony Algorıthm 1 Introduction 2 Review of Related Work 2.1 Routing Protocol 2.2 Traveling Salesman Problem 3 Proposed Scheme 3.1 Greedy Algorithm 3.2 Ant Colony Algorithm for TSP 3.3 Procedure of ACO 3.4 Shortest Path Problem 4 Software Description 4.1 Proteus 5 Results and Discussion 5.1 Schematic Diagram 5.2 Simulation Output 5.3 Power Analysis of Greedy Algorithm 5.4 Simulation Waveform of Greedy Algorithm 5.5 Power Analysis of ACO 5.6 Simulation Waveform of Greedy Algorithm and ACO 6 Conclusion and for Future Work 6.1 Conclusion 6.2 Scope for Future Work References Deep Ensemble Approach for Question Answer System 1 Introduction 2 Literature Review 3 Proposed System 3.1 Long Short Term Memory 3.2 Encoder–Decoder Model 3.3 CatBoost 3.4 Ensemble Model 4 Experimental Setup 5 Results and Discussion 6 Conclusion References Information Sharing Over Social Media Analysis Using Centrality Measure 1 Introduction 2 Related Works 3 Data Analysis 4 Conclusion References AndroHealthCheck: A Malware Detection System for Android Using Machine Learning 1 Introduction 2 Architecture of AndroHealthCheck 3 Deployment of AndroHealthCheck 4 Conclusion References Use of Machine Learning Services in Cloud 1 Introduction 2 Cognitive Services 3 Machine Learning APIs of Google, Amazon, and Microsoft 4 ML Services Serve as a Platform 5 ML Services Serve as an Infrastructure 6 ML for Attack Detection and Prevention 7 Conclusion References An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT 1 Introduction 2 Literature Review 3 Related Work 4 Modified Skellam Distribution -Based Selfish Node Detection Technique (MSD-SNDT) 5 Detection and Isolation of Selfish Nodes Misbehavior Utilizing Computed MSD 5.1 The Proposed Algorithm—MSD-SDNT 6 Experimental Results and Discussions of MSD-SNDT 7 Modified Bates Distribution—Based Selfish Node Detection Technique (MBD-SNDT) 7.1 MBD-SNDT Algorithm 8 Experimental Results and Discussions of MBD-SNDT 9 Conclusion References Metaheuristic-Enabled Shortest Path Selection for IoT-Based Wireless Sensor Network 1 Introduction 2 Literature Review 2.1 Related Works 3 Proposed Routing Strategies in IoT 3.1 Network Model 4 Description on Varied Constraints for Shortest Route Selection 4.1 Distance Model 4.2 Delay 4.3 Energy Model 4.4 PDR 5 Optimal Shortest Path Selection via Dragonfly Algorithm with Brownian Motion 5.1 Objective Function 5.2 Solution Encoding 5.3 Proposed DABR Algorithm 6 Results and Discussion 6.1 Simulation Procedure 6.2 Performance Analysis 6.3 Statistical Analysis 6.4 Overall Analysis of the Proposed Model 7 Conclusion References Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud–Edge Environment 1 Introduction 2 Background and Related Work 3 Model Formulation 4 Proposed Method 5 Experiments 5.1 Simulation Environment Setup 5.2 Comparative Analysis and Discussion 6 Conclusion References Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image 1 Introduction 2 Methodology 3 Results and Discussion 4 Conclusion References Blockchain: Application Domains, Research Issues and Challenges 1 Introduction 2 Overview of Blockchain 2.1 Background 2.2 Blockchain Transaction 2.3 Digital Signature 2.4 Blocks 2.5 Mining and Consensus Algorithms 3 Applications of Blockchain 3.1 Biomedical Domain 3.2 Banking and Finance 3.3 Government and Public Sectors 3.4 Supply Chain 3.5 Internet of Things 4 Open Issues and Challenges 4.1 Scalability 4.2 Attacks on Blockchain 4.3 Privacy Breach 5 Conclusion References A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm 1 Introduction 1.1 MANET 1.2 Characteristics of MANET 1.3 Challenges in Ad hoc Network 2 Overview of routing protocol 2.1 Classification of Routing Protocol 3 Network performance optimization algorithm 3.1 Genetic algorithms (GA) 3.2 Particle Swarm Optimization (PSO) 3.3 Ant Colony Optimization (ACO) 3.4 Artificial Bee Colony Optimization (ABC) 3.5 Bacterial Foraging Optimization Algorithm (BFOA) 3.6 Binary Particle Swarm Optimization (BPSO) 4 PSO Overview 5 Conclusion References Industrial IoT: Challenges and Mitigation Policies 1 Introduction 2 Internet of Things (IoT) and Industrial Internet of Things (IIoT) 2.1 Internet of Things (IoT) 2.2 Industrial IoT (IIoT) 2.3 IIoT Architecture 3 Cyberthreats in IIoT Devices 3.1 Cyberthreat 4 Remedial Measures and Best Practices to Mitigate Cyberthreats 4.1 Security Practices for IoT Devices Developers 4.2 Best Security Practices for Communication Network 4.3 Best Security Practices at the Industry Level 4.4 Best Practices for End Users 5 Challenges Related to Cybersecurity 6 Conclusion and Future Work References EclatRPGrowth: Finding Rare Patterns Using Vertical Mining and Rare Pattern Tree 1 Introduction 2 Related Work 2.1 Apriori Based Rare Pattern Mining Techniques 2.2 FP-Growth Based Rare Pattern Mining Techniques 2.3 Eclat Based Rare Pattern Mining Algorithms 3 Vertical Mining with Rare Pattern Tree 3.1 Basic Concepts and Definitions 3.2 Vertical Mining with BitSets 3.3 Structure of a Rare Pattern Tree (RP Tree) 4 Methodology of EclatRPGrowth 4.1 Schematic Block Diagram of Algorithm EclatRPGrowth 4.2 EclatRPGrowth Example 5 Methodology of EClatPRPGrowth 6 Experimental Results and Discussion 6.1 Comparison of Performance 7 Conclusion References Research Scholars transferring Scholarly Information through Social Medias and Networks in the Selected State Universities of Tamil Nadu 1 Introduction 2 Review of Literature 3 Objectives of the Study 4 Methodology 5 Analysis and Discussion 6 Conclusion References Twitter-Based Disaster Management System Using Data Mining 1 Introduction 2 Related Works 3 Methodology 3.1 Linear Ridge Regression (LRR) 3.2 SGD Classifier 3.3 Naive Bayes Classifier 4 Implementation 5 Result and Discussion 6 Conclusion References Sentimental Analysis on Twitter Data of Political Domain 1 Introduction 1.1 Sentiment Analysis 2 Review of Literature 3 System Architecture 3.1 Data Collection 3.2 Preprocessing 3.3 Word Embedding 3.4 Recurrent Neural Network (ANN) 4 Results and Discussion 5 Conclusion and Future Scope References Cloud-Based Smart Environment Using Internet of Things (IoT) 1 Introduction 2 Literature Survey 3 Methodology 3.1 RFID Technology 3.2 Constrained Node Network (CNN) Technology 3.3 Smart Environment Sensors with the Internet of Things (IoT) 4 Conclusion References A Review of Healthcare Applications on Internet of Things 1 Introduction 2 Role of IoT in HealthCare 3 Literature Review 4 Comparison Table 5 Conclusion References Big Social Media Analytics: Applications and Challenges 1 Introduction 2 Literature Review 3 Applications of Social Media Big Data 3.1 Business 3.2 Healthcare 3.3 Education 3.4 Crisis Management 4 Big Social Media Analytics 4.1 Social Media Business Analytics 4.2 Social Media Healthcare Analytics 4.3 Social Media Education Analytics 4.4 Social Media Crisis Management Analytics 5 Conclusion References A Cost and Power Analysis of Farmer Using Smart Farming IoT System 1 Introduction 2 Earlier Work 3 Smart Farming System 4 Likely Outcomes 4.1 Cost Analysis 4.2 Time Analysis 4.3 Power Analysis 5 Experimental Setup 6 Conclusion and Future Work References Intelligent Computing Application for Cloud Enhancing Healthcare Services 1 Introduction 2 Literature Review 3 Intelligent Computing: A Novel Economic Computing Framework 4 Critical Analysis of the Healthcare Cloud Computing Challenges and Opportunities 5 An Evaluation of Cloud Computing Challenges and Opportunities 5.1 The Management Perspectives 5.2 Technological Aspects 5.3 Privacy Aspects 5.4 Legal Aspects 6 Discussion 6.1 Intelligent Computing Strategy and Planning 7 Conclusion and Future Directions References Coronavirus Detection and Classification Using X-Rays and CT Scans with Machine Learning Techniques 1 Introduction 2 Literature Review 3 Proposed Methodology 4 Experiments 4.1 Dataset Description 4.2 Data Preprocessing 4.3 Feature Extraction Technique 4.4 Analyzing Results 5 Experimental Results 5.1 Results of CT Scan Images 5.2 Results of X-Ray Images 6 Conclusion References Johnson’s Sequencing for Load Balancing in Multi-Access Edge Computing 1 Introduction 2 Load Balancing 2.1 Multi Access/Mobile Computing 2.2 Load Balancing in Multi-Access/Mobile Computing 3 Flow Shop Sequencing 3.1 Proposed Flow Shop Algorithm for Load Balancing 3.2 Flow Shop Sequencing for MEC-LB 3.3 Flow Shop Sequencing Problem 3.4 Johnson’s Sequencing 3.5 Benefits of the Proposed Methods 3.6 Johnson’s Algorithm 3.7 Lemma 3.8 Proof 3.9 Advantages 4 Conclusion References A Study on MPLS Vs SD-WAN 1 Introduction 2 MPLS 2.1 Boon and Bane 2.2 MPLS Future 3 SD-WAN 3.1 Challenges and Benefits 3.2 Features 3.3 SD-WAN Load Balancing 4 SD-WAN or MPLS 4.1 High Bandwidth 4.2 Better Uptime 4.3 Increased Performance 4.4 No More ISP 4.5 SD-WAN and Cloud 5 Conclusion References Security Issues and Solutions in E-Health and Telemedicine 1 Introduction 2 Security Issues 2.1 Masquerade Attack 2.2 Ransomware Attack 2.3 Injection Attacks 2.4 Attacks on Healthcare Cloud Systems 2.5 Attacks on Implantable and Wearable Medical Devices 2.6 Home Network Attack 2.7 Public Network Attack 2.8 End User Attacks 3 Security Considerations in e-Health and Telemedicine Systems 3.1 Authentication 3.2 Integrity 3.3 Confidentiality 3.4 Availability 3.5 Access Control 4 Solutions 4.1 Encryption 4.2 Watermarking 4.3 Message Authentication Code (MAC) 4.4 Digital Signature 4.5 Audit 4.6 Zero Trust Model 5 Conclusion References Accident Alert System with False Alarm Switch 1 Introduction 2 Existing Works 3 Proposed System 3.1 Technical Specification 3.2 Implementation 3.3 False Alarm Switch 3.4 Arduino Mega 4 Result 5 Conclusion and Future Scope References Metaheuristics Algorithms for Virtual Machine Placement in Cloud Computing Environments—A Review 1 Introduction 2 Virtual Machine Placement in Cloud 3 VMP Optimization Approaches 4 VMP Problem Formulation/Objective Functions 4.1 Energy Consumption Minimization 4.2 Cost Optimization 4.3 Network Traffic Minimization 4.4 Resource Utilization 4.5 Quality of Service Maximization 5 Solution Techniques 5.1 Metaheuristics Algorithms 6 Discussion 7 Conclusion References Prostate Image Segmentation Using Ant Colony Optimization-Boundary Complete Recurrent Neural Network (ACO-BCRNN) 1 Introduction 2 Materials and Methods 3 Proposed Methodology 3.1 Ant Colony Optimization 3.2 BCRNN Method 4 Experimental Results 4.1 Experimental Analysis 4.2 Implementation Details 5 Performance Evaluation 6 Conclusion References A Deep Learning Approach to Detect Lumpy Skin Disease in Cows 1 Introduction 2 Data Collection 3 Proposed Approach 4 Results 5 Conclusion References Prediction of Influenza-like Illness from Twitter Data and Its Comparison with Integrated Disease Surveillance Program Data 1 Introduction 2 Related Work 3 Analysis Techniques for Twitter Data 4 Proposed Approach 4.1 Data Gathering 4.2 Data Preprocessing 4.3 Generation of Polarity 4.4 Machine Learning Model 5 Results and Discussions 5.1 Visualization of Twitter Data Using Kibana 5.2 Visualization of IDSP Data Using Kibana 6 Conclusion 7 Limitations and Future Scope References Review of Denoising Framework for Efficient Removal of Noise from 3D Images 1 Introduction 1.1 Understanding the Noise 2 Recapitulating Image Denoising 3 Proposed Denoising Technique 4 Conclusion References Algorithmic Trading Using Machine Learning and Neural Network 1 Introduction 2 Related Works 3 Methodology 4 Proposed Model 5 Experimentation 6 Result Analysis 7 Conclusion 8 Future Scope References Analysis on Intrusion Detection System Using Machine Learning Techniques 1 Introduction 2 Related Work 3 Machine Learning (ML) Techniques 3.1 Classification Techniques 3.2 Naive Bayes Classifier 3.3 Hoeffding Tree Classifier 3.4 Ensemble Classifier 4 Attack Type Classification 4.1 Data Description 4.2 Denial of Service (DOS) Attack 4.3 Probe Attack 4.4 User to Root (U2R) Attack 4.5 Remote to Local (R2L) Attack 5 Performance Evaluation 6 Analysis of Machine Learning (ML) Techniques Performance on Intrusion Detection 7 Conclusion References Content Related Feature Analysis for Fake Online Consumer Review Detection 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Aspects and Opinion Extraction 3.2 Content-Based Feature Extraction 3.3 Fake Detection Module 4 Experiment and Evaluation 5 Conclusion and Further Work References Big Data Link Stability-Based Path Observation for Network Security 1 Introduction 2 Literature Survey 3 Problem Identification 4 Implementation 4.1 Routing Protocol 4.2 Projected Routing Convention Sending Model 4.3 Routing Measurements Between Crossing Point 5 Result and Discussion 6 Conclusion References Challenging Data Models and Data Confidentiality Through “Pay-As-You-Go” Approach Entity Resolution 1 Introduction 2 Literature Status 3 Detailed Methodologies of the Research 3.1 The Following Portrays the Proposed Model in Detail 3.2 The Methodology Adapted 3.3 Implementation of Pay-AS-You-Go Model Through Ordered Pairs with Sorted List 3.4 Generation 4 Requirements for Experimental Analysis 4.1 Real Data 4.2 Guidelines of Match 5 Conclusion References Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm 1 Introduction 1.1 Data Privacy and Security 1.2 Data Security in Health Care 2 Literature Survey 2.1 Attribute-Based Key Generation Scheme 2.2 Access Control Mechanism 3 Motivation 4 Proposed System 4.1 System Framework 4.2 System Design 5 Performance of Our System 6 Conclusion References Malignant Web Sites Recognition Utilizing Distinctive Machine Learning Techniques 1 Introduction 2 Related Work 3 Methodology 3.1 Dataset 3.2 Selection of Features 3.3 Classification Algorithms 4 Experiment and Result 5 Conclusion and Future Aspects References Speech Parameter and Deep Learning Based Approach for the Detection of Parkinson’s Disease 1 Introduction 1.1 Related Work 2 Methodology 2.1 Data 2.2 Deep Learning 2.3 Proposed Architecture of CNN 3 Experimental Results and Discussion 4 Conclusion References Study on Data Transmission Using Li-Fi in Vehicle to Vehicle Anti-Collision System 1 Introduction 2 Principle of Li-Fi 3 Applications of Li-Fi 3.1 Li-Fi in Medical Department 3.2 Li-Fi in Aircraft 3.3 Underwater Communication System Using Li-Fi 3.4 Li-Fi in Office Rooms 3.5 Li-Fi in V2V and V2I Communication 4 A Comparative Study Between Li-Fi and Wi-Fi 4.1 Wi-Fi Technology 4.2 Comparison with Li-Fi System 5 Li-Fi in the Industry and Convergence of Li-Fi with Emerging Technologies 5.1 Li-Fi and IoT 5.2 Li-Fi and Cloud 5.3 Li-Fi and Real-Time Analytics 6 Prototype Description 6.1 Hardware Requırements 6.2 Software Requırements 7 System Design 7.1 Analog Data Transmission 7.2 Schematic Diagram for Analog Data 8 Digital Data Transmission 8.1 Transmitter Section 8.2 Receıver Sectıon 9 Results 10 Limitations and Challenges 11 Conclusion and Future Works References Approaches in Assistive Technology: A Survey on Existing Assistive Wearable Technology for the Visually Impaired 1 Introduction 1.1 Types of Computer Glasses 1.2 Motivation for Conducting the Survey 1.3 Outline 2 Background 2.1 Review Process 3 Related Works 3.1 BuzzClip [36] 3.2 Aira AR Smart Glasses [37] 3.3 Sunu Band [38] 3.4 Maptic [40] 3.5 MyEye2 [41] 3.6 NuEyes Pro [42] 3.7 OXSIGHT [43] 3.8 Intelligent Reader for the Visually Handicapped [1] 4 Discussion 5 Device Concept 6 Conclusion References Stateless Key Management Scheme for Proxy-Based Encrypted Databases 1 Introduction 2 Related Work 2.1 Threat Model 2.2 Security Overview of Proposed Scheme 3 Approaches for Protection of Outsourced Databases 3.1 Approach-1: Security at Client Side to Protect Confidentiality of Data 3.2 Approach-2: Security at Server Side for the Protection of Sensitive Data 3.3 Approach-3: Security Modules Reside in Proxy 4 Proposed Stateless Key Management Scheme for Protection of Outsourced Databases Using TRUSTED Proxy 4.1 Architecture Overview 4.2 Key Derivation Using PBKDF 4.3 Procedure for Generation of Keys in the Proxy 4.4 Choice of Scheme for OPEN_TO Relation 4.5 Advantage of SKM-PS Scheme over CryptDB Key Management (stored Key) 4.6 Stateless Key Management Performance Statistics 5 Security Analysis of Proposed Stateless Key Management 6 Other Practical Considerations 6.1 Number of Rounds Selection for PBKDF2 6.2 Password Change 6.3 Forget Password 6.4 Adding New Application User 6.5 Proxy Deployment Scenarios 7 Conclusions and Future Scope References Exploration of Blockchain Architecture, Applications, and Integrating Challenges 1 Introduction 2 Blockchain: Overview and Architecture 3 Blockchain: Consensus Algorithms 3.1 Proof of Work (PoW) 3.2 Proof of Stake (PoS) 3.3 Delegated Proof of Stake (DPoS) 3.4 Ripple 3.5 Tendermint 4 Blockchain: Applications 4.1 Bitcoin 4.2 Healthcare Sector 4.3 Ripple 4.4 Smart City 4.5 Agriculture 4.6 Financial Sector 5 Blockchain: Challenges and Possible Solutions 5.1 Challenges in IoT and Blockchain Integration 5.2 Challenges in Big Data and Blockchain Integration 6 Conclusion References Filter Bank Multicarrier Systems Using Gaussian Pulse-Based Filter Design for 5G Technologies 1 Introduction 2 FBMC Technique 3 OGGP Based Filter 4 Proposed Methodology 5 Simulation Results 6 Conclusion References LIMES: Logic Locking on Interleaved Memory for Enhanced Security 1 Introduction 2 Interleaved Memory 3 Threats and Design for Security 3.1 Design for Security 3.2 Choice of Logic Locking 4 Logic Locking 5 Proposed Method 6 Result 7 Conclusion References A Novel IoT Device for Optimizing “Content Personalization Strategy” 1 Introduction 2 Content Filtering Techniques 2.1 Real-Life Examples of Content Personalization 3 Novel IoT Device 3.1 Hardware 3.2 Architecture 3.3 Data Flow 4 Preliminary Research Observations 5 Applications 6 Conclusion References IoT Based Self-Navigation Assistance for Visually Impaired 1 Introduction 2 Existing Work 2.1 Smart Mobility Aid for the Visually Impaired Society 2.2 Real-time Dangling Objects Sensing 2.3 Assistive Infrared Sensor-Based Smart Stick for Blind People 3 System Components 3.1 Arduino Uno 3.2 Ultrasonic Sensor SR-04 3.3 Bluetooth Module 4 System Design 4.1 Design Requirements 4.2 Design Constraints 5 Experimental Results 6 Conclusion References An Overview of Cyber-Security Issues in Smart Grid 1 Introduction 2 Review of Literature 3 State Estimation of Smart Grid 4 Cyber-Security Issues in Smart Grid 5 Possible Solutions of the Cyber-Security Issues 6 Conclusion References Data Streaming Architecture for Visualizing Cryptocurrency Temporal Data 1 Introduction 2 Related Work 3 Methodology 3.1 Tools Used 3.2 Data 3.3 Data Sources 3.4 Data Extraction 3.5 Insert Time stamp 3.6 Append and Compute 3.7 Merge and Aggregation 3.8 Aggregation Results 4 Results and Discussion 5 Conclusions and Future Work References An Overview of Layer 4 and Layer 7 Load Balancing 1 Introduction 1.1 Need for Load Balancing 1.2 Variances of L7 and L4 Load Balancing 1.3 ADC Load Balancing 2 L4 Load Balancing Architectures 2.1 Network Address Translation (NAT) 2.2 Direct Server Return (DSR) 2.3 IP Tunnel Mode 3 L7 Load Balancing Architectures 3.1 Proxy Mode 3.2 Transparent Proxy Mode 4 Conclusion References Integration of IoT and SDN to Mitigate DDoS with RYU Controller 1 Introduction 1.1 Structuring of Paper 2 Related Work in SDN and IoT Integration 3 Related Work of DDoS Attack Detection and Mitigation 4 IoT-SDN Test bed Architecture and Setup 4.1 IoT-Test bed Setup 4.2 SDN-Test bed Setup 4.3 Thingsboard Cloud Platform 5 DDoS Attack and Mitigation Simulation 6 Conclusion References Low Rate Multi-vector DDoS Attack Detection Using Information Gain Based Feature Selection 1 Introduction 1.1 Stealthy Attack Variants 2 Literature Survey 3 Proposed Methodology 4 Result and Discussion 5 Conclusion References A Framework for Monitoring Patient’s Vital Signs with Internet of Things and Blockchain Technology 1 Introduction 2 Motivation 3 Literature Survey 3.1 Blockchain Technology 4 System Architecture 4.1 A Scenario in the Patient Health Monitoring System 4.2 Proposed Algorıthms 5 Results and Discussion 5.1 Advantages 6 Conclusion References IoT Based Smart Transport Management and Vehicle-to-Vehicle Communication System 1 Introduction 1.1 Hardware Component Needed for Li-Fi Technology 1.2 Software Used for Li-Fi Technologies 1.3 Li-Fi Communicator Systems 1.4 Limitation of Li-Fi Technology 2 Radio-Frequency Identification (RFID) Tag Technology 2.1 Working of RFID Tag 2.2 Limitations of RFID Tags 2.3 Vehicle to Everything Communication (V2X Communication) 3 LORAWAN Technology 3.1 Implementation of Proposed Framework 3.2 Proposed Framework 4 Vehicular Adhoc Network (VANET) Technology 4.1 Working of VANET 4.2 Emergency Application for V2V Communication 4.3 Vehicle to Infrastructure Communication 5 Conclusion References An Analytical and Comparative Study of Hospital Re-admissions in Digital Health Care 1 Introduction 2 Existing Work on Re-admission Prediction 3 Causes of Hospital Re-admissions 4 Reduction in Hospital Re-admission 5 Conclusion References An Edge DNS Global Server Load Balancing for Load Balancing in Edge Computing 1 Introduction 1.1 Need for Load Balancing in Edge Computing 1.2 Need for Load Balancing in Edge Computing 1.3 Load Distribution 1.4 Edge Computing and Load Balancing 2 GSLB Load Balancing 2.1 Need for Edge DNS GSLB 3 Edge DNS GSLB and Multi-cloud 3.1 Advanced Disaster Recovery 3.2 Sharing of Network Load Between Multiple Data Centres 3.3 WAN Failure Detection 4 Conclusion References Network Intrusion Detection Using Cross-Bagging-Based Stacking Model 1 Introduction 2 Literature Review 3 Cross-Bagging-Based Stacked Ensemble (CBSE) 4 Data Preprocessing and Segregation 5 Cross-Bagging Ensemble Creation 6 Stacking Phase for Final Prediction 7 Results and Discussion 8 Conclusion References Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall (NGFW) 1 Introduction 2 Related Work 3 Methodology 3.1 IP Spoofing 3.2 Insider Intrusion 3.3 Denial of Service (DDoS) 3.4 No Protection Against Masquerades 3.5 Firewall Trusted and Untrusted Network (LAN & WAN) 4 Implementation 4.1 Devices and Appliances 4.2 Implementation of Firewall with the Integration of Different Policy 4.3 Implementing Port Forwarding and Policy Against Direct Internet Traffic 4.4 Implementation of Internet Protocol Security (IPsec) VPN in Proposed Model 5 Results 5.1 Performance Analysis and Evaluation 6 Conclusions References Comparative Study of Fault-Diagnosis Models Based on QoS Metrics in SDN 1 Introduction 2 Background 2.1 Architecture 2.2 OpenFlow 2.3 Fault Diagnosis 3 Key Concepts and Terminologies 3.1 Reactive Restoration Method 3.2 Proactive Restoration Method 3.3 Carrier-Grade Networks 3.4 Quality of Service Metrics 4 Comparison 4.1 Fast and Adaptive Failure Recovery Using Machine Learning in Software-Defined Networks (FAFRs) [5] 4.2 A Proactive Restoration Technique for SDNs (PRT) [6] 4.3 CORONET: Fault Tolerance for Software-Defined Networks (CN) [3] 4.4 FT‐SDN: A Fault‐Tolerant Distributed Architecture for Software-Defined Network (FT-SDN) [7] 4.5 Proactive Failure Recovery in OpenFlow Based Software Defined 5 Conclusion References A Brief Study on Analyzing Student’s Emotions with the Help of Educational Data Mining 1 Introduction 2 Literature Survey 3 Conclusion References IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages in IoT 1 Introduction 2 Related Work 3 IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages 3.1 Key Generation 3.2 Token Generation 3.3 Shares Generation 3.4 Reconstruct 3.5 Mathematical Model of Share Construction and Reconstruction Process 4 Results and Discussions 5 Conclusion References Investigation and Analysis of Path Evaluation for Sustainable Communication Using VANET 1 Introduction 2 VANET 3 Related Work 4 Proposed System 5 GAD Protocol 6 Algorithm for GAD 7 Genetic Algorithm 8 Sybil Attack 9 Result and Discussion 9.1 Packet Delivery Ratio 9.2 Average End-to-End Delay 9.3 CH Formation Delay 10 Conclusion References Performance Study of Free Space Optical System Under Varied Atmospheric Conditions 1 Introduction 1.1 The System Model 2 Result and Discussion 3 Conclusion References Malicious URL Detection Using Machine Learning and Ensemble Modeling 1 Introduction 2 Literature Review 3 Experiment 3.1 Url Structure 3.2 Dataset 3.3 Pre-processing 3.4 Methodology 3.5 Performance Evaluation 4 Results 5 Conclusion References Review on Energy-Efficient Routing Protocols in WSN 1 Introduction 2 Classification of Routing Protocols in WSN 2.1 Network Structure-Based Routing Protocols 2.2 Protocol Operation-Based Routing Protocols 3 Energy-Efficient Routing Protocols in WSN 3.1 Opportunistic Routing 3.2 Cross-layer Routing 3.3 Cooperative Routing 3.4 Biological Inspired Optimal Routing 3.5 Machine Learning (ML)-Based Routing Techniques Under Opportunistic, Cross-layer, Swarm Intelligence, and Cooperative Protocols 4 Performance Evaluation Metrics of Routing Protocols 5 Future Enhancement 6 Conclusion References Intelligent Machine Learning Approach for CIDS—Cloud Intrusion Detection System 1 Introduction 2 Background and Related Work 3 Proposed Methodology 3.1 Data Collection 3.2 Preprocessing of the Dataset 3.3 Intelligent Agent Based Feature Reduction Method 3.4 Proposed Cloud Intrusion Detection System 4 Results and Discussions 4.1 Performance Analysis 5 Conclusion References In-network Data Aggregation Techniques for Wireless Sensor Networks: A Survey 1 Introduction 2 Data Aggregation 3 Taxonomy on Data Aggregation 3.1 Centralized Aggregation Technique 3.2 Tree-Based Aggregation Technique 3.3 Cluster-Based Aggregation Technique 3.4 In-network Aggregation Technique 4 In-network Aggregation 4.1 Routing Protocols 5 Types of In-network Processing 5.1 Sensor Fusion 5.2 Sensor Compression 5.3 Sensor Filtering 5.4 Sensor Elimination 6 Algorithms of In-network Aggregation 7 Parameters for Analyzing In-network Aggregation 8 Comparison on In-network Data Aggregation Algorithms 9 Conclusion References Comparative Analysis of Traffic and Congestion in Software-Defined Networks 1 Introduction 1.1 Concept of SDN 1.2 SDN Over Traditional Networks 2 Areas of Study 2.1 Traffic Classification 2.2 Congestion Prediction 3 Algorithmic Analysis 3.1 Machine Learning 3.2 Neural Networks 4 Methodology 4.1 SDN Simulation 4.2 Application of Machine Learning 5 Results and Analysis 5.1 Traffic Classification 5.2 Congestion Prediction 6 Conclusion and Future Scope References A Comparative Analysis on Sensor-Based Human Activity Recognition Using Various Deep Learning Techniques 1 Introduction 2 Related Work 2.1 Convolutional Neural Networks in HAR: 2.2 Long Short-Term Memory (LSTM) in HAR 2.3 Extreme Gradient Boosting in HAR 2.4 Multilayer Perceptron in HAR 3 Proposed System 3.1 Convolutional Neural Network 3.2 Long Short-Term Memory 3.3 Extreme Gradient Boosting 3.4 Multilayer Perceptron 3.5 MHEALTH Dataset 4 Result and Performance Analysis 4.1 Accuracy and Loss Results 5 Conclusion and Future Enhancement References FETE: Feedback-Enabled Throughput Evaluation for MIMO Emulated Over 5G Networks 1 Introduction 2 Background 3 Methodology 3.1 Dataset Description 3.2 Exploration and Extrapolation 3.3 Analytical Model 3.4 Signal Continuity 4 Feedback-Enabled Throughput Evaluatıon 4.1 System Informatıon 4.2 Throughput Calculatıon 4.3 Improved Throughput Using MIMO 5 Evaluatıon and Results 6 Conclusion References Automatic Vehicle Service Monitoring and Tracking System Using IoT and Machine Learning 1 Introduction 2 Literature Survey 3 Proposed Framework 3.1 System Design 3.2 Implementation 4 Results 5 Conclusions References Machine Learning-Based Application to Detect Pepper Leaf Diseases Using HistGradientBoosting Classifier with Fused HOG and LBP Features 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Data Preprocessing 3.2 Feature Extraction 3.3 Dimensionality Reduction 3.4 Classification 4 Experimental Results 4.1 Pepper Leaf Disease Dataset 4.2 Performance Evaluation Measures 4.3 Result Analysis 5 Conclusion References Efficacy of Indian Government Welfare Schemes Using Aspect-Based Sentimental Analysis 1 Introduction 2 Related Work 3 Methodology 4 Results and Discussion 5 Conclusion References Author Index