ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Computer Networks, Big Data and IoT: Proceedings of ICCBI 2020 (Lecture Notes on Data Engineering and Communications Technologies, 66)

دانلود کتاب شبکه های کامپیوتری، داده های بزرگ و اینترنت اشیا: مجموعه مقالات ICCBI 2020 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 66)

Computer Networks, Big Data and IoT: Proceedings of ICCBI 2020 (Lecture Notes on Data Engineering and Communications Technologies, 66)

مشخصات کتاب

Computer Networks, Big Data and IoT: Proceedings of ICCBI 2020 (Lecture Notes on Data Engineering and Communications Technologies, 66)

ویرایش: [1st ed. 2021] 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 9811609640, 9789811609640 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 1013
[980] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 32 Mb 

قیمت کتاب (تومان) : 39,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Computer Networks, Big Data and IoT: Proceedings of ICCBI 2020 (Lecture Notes on Data Engineering and Communications Technologies, 66) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب شبکه های کامپیوتری، داده های بزرگ و اینترنت اشیا: مجموعه مقالات ICCBI 2020 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 66) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب شبکه های کامپیوتری، داده های بزرگ و اینترنت اشیا: مجموعه مقالات ICCBI 2020 (یادداشت های سخنرانی در مورد مهندسی داده و فناوری های ارتباطات، 66)



این کتاب بهترین مقالات پژوهشی منتخب ارائه شده در کنفرانس بین‌المللی شبکه‌های کامپیوتری، داده‌های بزرگ و اینترنت اشیا (ICCBI 2020)، که توسط Vaigai College Engineering، Madurai، تامیل نادو، هند در 15 تا 16 دسامبر 2020 سازمان‌دهی شده است، ارائه می‌کند. مقالات اصلی در مورد شبکه های کامپیوتری، پروتکل های شبکه و شبکه های بی سیم، فناوری های ارتباطی داده و امنیت شبکه را پوشش می دهد. این کتاب منبع و مرجع ارزشمندی برای محققان، مدرسان، دانشجویان، دانشمندان، مهندسان، مدیران و دست اندرکاران صنعت در آن حوزه های مهم است.


توضیحاتی درمورد کتاب به خارجی

This book presents best selected research papers presented at the International Conference on Computer Networks, Big Data and IoT (ICCBI 2020), organized by Vaigai College Engineering, Madurai, Tamil Nadu, India, during 15–16 December 2020. The book covers original papers on computer networks, network protocols and wireless networks, data communication technologies and network security. The book is a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers and industry practitioners in those important areas.



فهرست مطالب

Foreword
Preface
Acknowledgements
Contents
About the Editors
Maximizing Network Lifetime in WSN Using Ant Colony Algorıthm
	1 Introduction
	2 Review of Related Work
		2.1 Routing Protocol
		2.2 Traveling Salesman Problem
	3 Proposed Scheme
		3.1 Greedy Algorithm
		3.2 Ant Colony Algorithm for TSP
		3.3 Procedure of ACO
		3.4 Shortest Path Problem
	4 Software Description
		4.1 Proteus
	5 Results and Discussion
		5.1 Schematic Diagram
		5.2 Simulation Output
		5.3 Power Analysis of Greedy Algorithm
		5.4 Simulation Waveform of Greedy Algorithm
		5.5 Power Analysis of ACO
		5.6 Simulation Waveform of Greedy Algorithm and ACO
	6 Conclusion and for Future Work
		6.1 Conclusion
		6.2 Scope for Future Work
	References
Deep Ensemble Approach for Question Answer System
	1 Introduction
	2 Literature Review
	3 Proposed System
		3.1 Long Short Term Memory
		3.2 Encoder–Decoder Model
		3.3 CatBoost
		3.4 Ensemble Model
	4 Experimental Setup
	5 Results and Discussion
	6 Conclusion
	References
Information Sharing Over Social Media Analysis Using Centrality Measure
	1 Introduction
	2 Related Works
	3 Data Analysis
	4 Conclusion
	References
AndroHealthCheck: A Malware Detection System for Android Using Machine Learning
	1 Introduction
	2 Architecture of AndroHealthCheck
	3 Deployment of AndroHealthCheck
	4 Conclusion
	References
Use of Machine Learning Services in Cloud
	1 Introduction
	2 Cognitive Services
	3 Machine Learning APIs of Google, Amazon, and Microsoft
	4 ML Services Serve as a Platform
	5 ML Services Serve as an Infrastructure
	6 ML for Attack Detection and Prevention
	7 Conclusion
	References
An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT
	1 Introduction
	2 Literature Review
	3 Related Work
	4 Modified Skellam Distribution -Based Selfish Node Detection Technique (MSD-SNDT)
	5 Detection and Isolation of Selfish Nodes Misbehavior Utilizing Computed MSD
		5.1 The Proposed Algorithm—MSD-SDNT
	6 Experimental Results and Discussions of MSD-SNDT
	7 Modified Bates Distribution—Based Selfish Node Detection Technique (MBD-SNDT)
		7.1 MBD-SNDT Algorithm
	8 Experimental Results and Discussions of MBD-SNDT
	9 Conclusion
	References
Metaheuristic-Enabled Shortest Path Selection for IoT-Based Wireless Sensor Network
	1 Introduction
	2 Literature Review
		2.1 Related Works
	3 Proposed Routing Strategies in IoT
		3.1 Network Model
	4 Description on Varied Constraints for Shortest Route Selection
		4.1 Distance Model
		4.2 Delay
		4.3 Energy Model
		4.4 PDR
	5 Optimal Shortest Path Selection via Dragonfly Algorithm with Brownian Motion
		5.1 Objective Function
		5.2 Solution Encoding
		5.3 Proposed DABR Algorithm
	6 Results and Discussion
		6.1 Simulation Procedure
		6.2 Performance Analysis
		6.3 Statistical Analysis
		6.4 Overall Analysis of the Proposed Model
	7 Conclusion
	References
Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud–Edge Environment
	1 Introduction
	2 Background and Related Work
	3 Model Formulation
	4 Proposed Method
	5 Experiments
		5.1 Simulation Environment Setup
		5.2 Comparative Analysis and Discussion
	6 Conclusion
	References
Generation of Random Binary Sequence Using Adaptive Row–Column Approach and Synthetic Color Image
	1 Introduction
	2 Methodology
	3 Results and Discussion
	4 Conclusion
	References
Blockchain: Application Domains, Research Issues and Challenges
	1 Introduction
	2 Overview of Blockchain
		2.1 Background
		2.2 Blockchain Transaction
		2.3 Digital Signature
		2.4 Blocks
		2.5 Mining and Consensus Algorithms
	3 Applications of Blockchain
		3.1 Biomedical Domain
		3.2 Banking and Finance
		3.3 Government and Public Sectors
		3.4 Supply Chain
		3.5 Internet of Things
	4 Open Issues and Challenges
		4.1 Scalability
		4.2 Attacks on Blockchain
		4.3 Privacy Breach
	5 Conclusion
	References
A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm
	1 Introduction
		1.1 MANET
		1.2 Characteristics of MANET
		1.3 Challenges in Ad hoc Network
	2 Overview of routing protocol
		2.1 Classification of Routing Protocol
	3 Network performance optimization algorithm
		3.1 Genetic algorithms (GA)
		3.2 Particle Swarm Optimization (PSO)
		3.3 Ant Colony Optimization (ACO)
		3.4 Artificial Bee Colony Optimization (ABC)
		3.5 Bacterial Foraging Optimization Algorithm (BFOA)
		3.6 Binary Particle Swarm Optimization (BPSO)
	4 PSO Overview
	5 Conclusion
	References
Industrial IoT: Challenges and Mitigation Policies
	1 Introduction
	2 Internet of Things (IoT) and Industrial Internet of Things (IIoT)
		2.1 Internet of Things (IoT)
		2.2 Industrial IoT (IIoT)
		2.3 IIoT Architecture
	3 Cyberthreats in IIoT Devices
		3.1 Cyberthreat
	4 Remedial Measures and Best Practices to Mitigate Cyberthreats
		4.1 Security Practices for IoT Devices Developers
		4.2 Best Security Practices for Communication Network
		4.3 Best Security Practices at the Industry Level
		4.4 Best Practices for End Users
	5 Challenges Related to Cybersecurity
	6 Conclusion and Future Work
	References
EclatRPGrowth: Finding Rare Patterns Using Vertical Mining and Rare Pattern Tree
	1 Introduction
	2 Related Work
		2.1 Apriori Based Rare Pattern Mining Techniques
		2.2 FP-Growth Based Rare Pattern Mining Techniques
		2.3 Eclat Based Rare Pattern Mining Algorithms
	3 Vertical Mining with Rare Pattern Tree
		3.1 Basic Concepts and Definitions
		3.2 Vertical Mining with BitSets
		3.3 Structure of a Rare Pattern Tree (RP Tree)
	4 Methodology of EclatRPGrowth
		4.1 Schematic Block Diagram of Algorithm EclatRPGrowth
		4.2 EclatRPGrowth Example
	5 Methodology of EClatPRPGrowth
	6 Experimental Results and Discussion
		6.1 Comparison of Performance
	7 Conclusion
	References
Research Scholars transferring Scholarly Information through Social Medias and Networks in the Selected State Universities of Tamil Nadu
	1 Introduction
	2 Review of Literature
	3 Objectives of the Study
	4 Methodology
	5 Analysis and Discussion
	6 Conclusion
	References
Twitter-Based Disaster Management System Using Data Mining
	1 Introduction
	2 Related Works
	3 Methodology
		3.1 Linear Ridge Regression (LRR)
		3.2 SGD Classifier
		3.3 Naive Bayes Classifier
	4 Implementation
	5 Result and Discussion
	6 Conclusion
	References
Sentimental Analysis on Twitter Data of Political Domain
	1 Introduction
		1.1 Sentiment Analysis
	2 Review of Literature
	3 System Architecture
		3.1 Data Collection
		3.2 Preprocessing
		3.3 Word Embedding
		3.4 Recurrent Neural Network (ANN)
	4 Results and Discussion
	5 Conclusion and Future Scope
	References
Cloud-Based Smart Environment Using Internet of Things (IoT)
	1 Introduction
	2 Literature Survey
	3 Methodology
		3.1 RFID Technology
		3.2 Constrained Node Network (CNN) Technology
		3.3 Smart Environment Sensors with the Internet of Things (IoT)
	4 Conclusion
	References
A Review of Healthcare Applications on Internet of Things
	1 Introduction
	2 Role of IoT in HealthCare
	3 Literature Review
	4 Comparison Table
	5 Conclusion
	References
Big Social Media Analytics: Applications and Challenges
	1 Introduction
	2 Literature Review
	3 Applications of Social Media Big Data
		3.1 Business
		3.2 Healthcare
		3.3 Education
		3.4 Crisis Management
	4 Big Social Media Analytics
		4.1 Social Media Business Analytics
		4.2 Social Media Healthcare Analytics
		4.3 Social Media Education Analytics
		4.4 Social Media Crisis Management Analytics
	5 Conclusion
	References
A Cost and Power Analysis of Farmer Using Smart Farming IoT System
	1 Introduction
	2 Earlier Work
	3 Smart Farming System
	4 Likely Outcomes
		4.1 Cost Analysis
		4.2 Time Analysis
		4.3 Power Analysis
	5 Experimental Setup
	6 Conclusion and Future Work
	References
Intelligent Computing Application for Cloud Enhancing Healthcare Services
	1 Introduction
	2 Literature Review
	3 Intelligent Computing: A Novel Economic Computing Framework
	4 Critical Analysis of the Healthcare Cloud Computing Challenges and Opportunities
	5 An Evaluation of Cloud Computing Challenges and Opportunities
		5.1 The Management Perspectives
		5.2 Technological Aspects
		5.3 Privacy Aspects
		5.4 Legal Aspects
	6 Discussion
		6.1 Intelligent Computing Strategy and Planning
	7 Conclusion and Future Directions
	References
Coronavirus Detection and Classification Using X-Rays and CT Scans with Machine Learning Techniques
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
	4 Experiments
		4.1 Dataset Description
		4.2 Data Preprocessing
		4.3 Feature Extraction Technique
		4.4 Analyzing Results
	5 Experimental Results
		5.1 Results of CT Scan Images
		5.2 Results of X-Ray Images
	6 Conclusion
	References
Johnson’s Sequencing for Load Balancing in Multi-Access Edge Computing
	1 Introduction
	2 Load Balancing
		2.1 Multi Access/Mobile Computing
		2.2 Load Balancing in Multi-Access/Mobile Computing
	3 Flow Shop Sequencing
		3.1 Proposed Flow Shop Algorithm for Load Balancing
		3.2 Flow Shop Sequencing for MEC-LB
		3.3 Flow Shop Sequencing Problem
		3.4 Johnson’s Sequencing
		3.5 Benefits of the Proposed Methods
		3.6 Johnson’s Algorithm
		3.7 Lemma
		3.8 Proof
		3.9 Advantages
	4 Conclusion
	References
A Study on MPLS Vs SD-WAN
	1 Introduction
	2 MPLS
		2.1 Boon and Bane
		2.2 MPLS Future
	3 SD-WAN
		3.1 Challenges and Benefits
		3.2 Features
		3.3 SD-WAN Load Balancing
	4 SD-WAN or MPLS
		4.1 High Bandwidth
		4.2 Better Uptime
		4.3 Increased Performance
		4.4 No More ISP
		4.5 SD-WAN and Cloud
	5 Conclusion
	References
Security Issues and Solutions in E-Health and Telemedicine
	1 Introduction
	2 Security Issues
		2.1 Masquerade Attack
		2.2 Ransomware Attack
		2.3 Injection Attacks
		2.4 Attacks on Healthcare Cloud Systems
		2.5 Attacks on Implantable and Wearable Medical Devices
		2.6 Home Network Attack
		2.7 Public Network Attack
		2.8 End User Attacks
	3 Security Considerations in e-Health and Telemedicine Systems
		3.1 Authentication
		3.2 Integrity
		3.3 Confidentiality
		3.4 Availability
		3.5 Access Control
	4 Solutions
		4.1 Encryption
		4.2 Watermarking
		4.3 Message Authentication Code (MAC)
		4.4 Digital Signature
		4.5 Audit
		4.6 Zero Trust Model
	5 Conclusion
	References
Accident Alert System with False Alarm Switch
	1 Introduction
	2 Existing Works
	3 Proposed System
		3.1 Technical Specification
		3.2 Implementation
		3.3 False Alarm Switch
		3.4 Arduino Mega
	4 Result
	5 Conclusion and Future Scope
	References
Metaheuristics Algorithms for Virtual Machine Placement in Cloud Computing Environments—A Review
	1 Introduction
	2 Virtual Machine Placement in Cloud
	3 VMP Optimization Approaches
	4 VMP Problem Formulation/Objective Functions
		4.1 Energy Consumption Minimization
		4.2 Cost Optimization
		4.3 Network Traffic Minimization
		4.4 Resource Utilization
		4.5 Quality of Service Maximization
	5 Solution Techniques
		5.1 Metaheuristics Algorithms
	6 Discussion
	7 Conclusion
	References
Prostate Image Segmentation Using Ant Colony Optimization-Boundary Complete Recurrent Neural Network (ACO-BCRNN)
	1 Introduction
	2 Materials and Methods
	3 Proposed Methodology
		3.1 Ant Colony Optimization
		3.2 BCRNN Method
	4 Experimental Results
		4.1 Experimental Analysis
		4.2 Implementation Details
	5 Performance Evaluation
	6 Conclusion
	References
A Deep Learning Approach to Detect Lumpy Skin Disease in Cows
	1 Introduction
	2 Data Collection
	3 Proposed Approach
	4 Results
	5 Conclusion
	References
Prediction of Influenza-like Illness from Twitter Data and Its Comparison with Integrated Disease Surveillance Program Data
	1 Introduction
	2 Related Work
	3 Analysis Techniques for Twitter Data
	4 Proposed Approach
		4.1 Data Gathering
		4.2 Data Preprocessing
		4.3 Generation of Polarity
		4.4 Machine Learning Model
	5 Results and Discussions
		5.1 Visualization of Twitter Data Using Kibana
		5.2 Visualization of IDSP Data Using Kibana
	6 Conclusion
	7 Limitations and Future Scope
	References
Review of Denoising Framework for Efficient Removal of Noise from 3D Images
	1 Introduction
		1.1 Understanding the Noise
	2 Recapitulating Image Denoising
	3 Proposed Denoising Technique
	4 Conclusion
	References
Algorithmic Trading Using Machine Learning and Neural Network
	1 Introduction
	2 Related Works
	3 Methodology
	4 Proposed Model
	5 Experimentation
	6 Result Analysis
	7 Conclusion
	8 Future Scope
	References
Analysis on Intrusion Detection System Using Machine Learning Techniques
	1 Introduction
	2 Related Work
	3 Machine Learning (ML) Techniques
		3.1 Classification Techniques
		3.2 Naive Bayes Classifier
		3.3 Hoeffding Tree Classifier
		3.4 Ensemble Classifier
	4 Attack Type Classification
		4.1 Data Description
		4.2 Denial of Service (DOS) Attack
		4.3 Probe Attack
		4.4 User to Root (U2R) Attack
		4.5 Remote to Local (R2L) Attack
	5 Performance Evaluation
	6 Analysis of Machine Learning (ML) Techniques Performance on Intrusion Detection
	7 Conclusion
	References
Content Related Feature Analysis for Fake Online Consumer Review Detection
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Aspects and Opinion Extraction
		3.2 Content-Based Feature Extraction
		3.3 Fake Detection Module
	4 Experiment and Evaluation
	5 Conclusion and Further Work
	References
Big Data Link Stability-Based Path Observation for Network Security
	1 Introduction
	2 Literature Survey
	3 Problem Identification
	4 Implementation
		4.1 Routing Protocol
		4.2 Projected Routing Convention Sending Model
		4.3 Routing Measurements Between Crossing Point
	5 Result and Discussion
	6 Conclusion
	References
Challenging Data Models and Data Confidentiality Through “Pay-As-You-Go” Approach Entity Resolution
	1 Introduction
	2 Literature Status
	3 Detailed Methodologies of the Research
		3.1 The Following Portrays the Proposed Model in Detail
		3.2 The Methodology Adapted
		3.3 Implementation of Pay-AS-You-Go Model Through Ordered Pairs with Sorted List
		3.4 Generation
	4 Requirements for Experimental Analysis
		4.1 Real Data
		4.2 Guidelines of Match
	5 Conclusion
	References
Preserving and Scrambling of Health Records with Multiple Owner Access Using Enhanced Break-Glass Algorithm
	1 Introduction
		1.1 Data Privacy and Security
		1.2 Data Security in Health Care
	2 Literature Survey
		2.1 Attribute-Based Key Generation Scheme
		2.2 Access Control Mechanism
	3 Motivation
	4 Proposed System
		4.1 System Framework
		4.2 System Design
	5 Performance of Our System
	6 Conclusion
	References
Malignant Web Sites Recognition Utilizing Distinctive Machine Learning Techniques
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Dataset
		3.2 Selection of Features
		3.3 Classification Algorithms
	4 Experiment and Result
	5 Conclusion and Future Aspects
	References
Speech Parameter and Deep Learning Based Approach for the Detection of Parkinson’s Disease
	1 Introduction
		1.1 Related Work
	2 Methodology
		2.1 Data
		2.2 Deep Learning
		2.3 Proposed Architecture of CNN
	3 Experimental Results and Discussion
	4 Conclusion
	References
Study on Data Transmission Using Li-Fi in Vehicle to Vehicle Anti-Collision System
	1 Introduction
	2 Principle of Li-Fi
	3 Applications of Li-Fi
		3.1 Li-Fi in Medical Department
		3.2 Li-Fi in Aircraft
		3.3 Underwater Communication System Using Li-Fi
		3.4 Li-Fi in Office Rooms
		3.5 Li-Fi in V2V and V2I Communication
	4 A Comparative Study Between Li-Fi and Wi-Fi
		4.1 Wi-Fi Technology
		4.2 Comparison with Li-Fi System
	5 Li-Fi in the Industry and Convergence of Li-Fi with Emerging Technologies
		5.1 Li-Fi and IoT
		5.2 Li-Fi and Cloud
		5.3 Li-Fi and Real-Time Analytics
	6 Prototype Description
		6.1 Hardware Requırements
		6.2 Software Requırements
	7 System Design
		7.1 Analog Data Transmission
		7.2 Schematic Diagram for Analog Data
	8 Digital Data Transmission
		8.1 Transmitter Section
		8.2 Receıver Sectıon
	9 Results
	10 Limitations and Challenges
	11 Conclusion and Future Works
	References
Approaches in Assistive Technology: A Survey on Existing Assistive Wearable Technology for the Visually Impaired
	1 Introduction
		1.1 Types of Computer Glasses
		1.2 Motivation for Conducting the Survey
		1.3 Outline
	2 Background
		2.1 Review Process
	3 Related Works
		3.1 BuzzClip [36]
		3.2 Aira AR Smart Glasses [37]
		3.3 Sunu Band [38]
		3.4 Maptic [40]
		3.5 MyEye2 [41]
		3.6 NuEyes Pro [42]
		3.7 OXSIGHT [43]
		3.8 Intelligent Reader for the Visually Handicapped [1]
	4 Discussion
	5 Device Concept
	6 Conclusion
	References
Stateless Key Management Scheme for Proxy-Based Encrypted Databases
	1 Introduction
	2 Related Work
		2.1 Threat Model
		2.2 Security Overview of Proposed Scheme
	3 Approaches for Protection of Outsourced Databases
		3.1 Approach-1: Security at Client Side to Protect Confidentiality of Data
		3.2 Approach-2: Security at Server Side for the Protection of Sensitive Data
		3.3 Approach-3: Security Modules Reside in Proxy
	4 Proposed Stateless Key Management Scheme for Protection of Outsourced Databases Using TRUSTED Proxy
		4.1 Architecture Overview
		4.2 Key Derivation Using PBKDF
		4.3 Procedure for Generation of Keys in the Proxy
		4.4 Choice of Scheme for OPEN_TO Relation
		4.5 Advantage of SKM-PS Scheme over CryptDB Key Management (stored Key)
		4.6 Stateless Key Management Performance Statistics
	5 Security Analysis of Proposed Stateless Key Management
	6 Other Practical Considerations
		6.1 Number of Rounds Selection for PBKDF2
		6.2 Password Change
		6.3 Forget Password
		6.4 Adding New Application User
		6.5 Proxy Deployment Scenarios
	7 Conclusions and Future Scope
	References
Exploration of Blockchain Architecture, Applications, and Integrating Challenges
	1 Introduction
	2 Blockchain: Overview and Architecture
	3 Blockchain: Consensus Algorithms
		3.1 Proof of Work (PoW)
		3.2 Proof of Stake (PoS)
		3.3 Delegated Proof of Stake (DPoS)
		3.4 Ripple
		3.5 Tendermint
	4 Blockchain: Applications
		4.1 Bitcoin
		4.2 Healthcare Sector
		4.3 Ripple
		4.4 Smart City
		4.5 Agriculture
		4.6 Financial Sector
	5 Blockchain: Challenges and Possible Solutions
		5.1 Challenges in IoT and Blockchain Integration
		5.2 Challenges in Big Data and Blockchain Integration
	6 Conclusion
	References
Filter Bank Multicarrier Systems Using Gaussian Pulse-Based Filter Design for 5G Technologies
	1 Introduction
	2 FBMC Technique
	3 OGGP Based Filter
	4 Proposed Methodology
	5 Simulation Results
	6 Conclusion
	References
LIMES: Logic Locking on Interleaved Memory for Enhanced Security
	1 Introduction
	2 Interleaved Memory
	3 Threats and Design for Security
		3.1 Design for Security
		3.2 Choice of Logic Locking
	4 Logic Locking
	5 Proposed Method
	6 Result
	7 Conclusion
	References
A Novel IoT Device for Optimizing “Content Personalization Strategy”
	1 Introduction
	2 Content Filtering Techniques
		2.1 Real-Life Examples of Content Personalization
	3 Novel IoT Device
		3.1 Hardware
		3.2 Architecture
		3.3 Data Flow
	4 Preliminary Research Observations
	5 Applications
	6 Conclusion
	References
IoT Based Self-Navigation Assistance for Visually Impaired
	1 Introduction
	2 Existing Work
		2.1 Smart Mobility Aid for the Visually Impaired Society
		2.2 Real-time Dangling Objects Sensing
		2.3 Assistive Infrared Sensor-Based Smart Stick for Blind People
	3 System Components
		3.1 Arduino Uno
		3.2 Ultrasonic Sensor SR-04
		3.3 Bluetooth Module
	4 System Design
		4.1 Design Requirements
		4.2 Design Constraints
	5 Experimental Results
	6 Conclusion
	References
An Overview of Cyber-Security Issues in Smart Grid
	1 Introduction
	2 Review of Literature
	3 State Estimation of Smart Grid
	4 Cyber-Security Issues in Smart Grid
	5 Possible Solutions of the Cyber-Security Issues
	6 Conclusion
	References
Data Streaming Architecture for Visualizing Cryptocurrency Temporal Data
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Tools Used
		3.2 Data
		3.3 Data Sources
		3.4 Data Extraction
		3.5 Insert Time stamp
		3.6 Append and Compute
		3.7 Merge and Aggregation
		3.8 Aggregation Results
	4 Results and Discussion
	5 Conclusions and Future Work
	References
An Overview of Layer 4 and Layer 7 Load Balancing
	1 Introduction
		1.1 Need for Load Balancing
		1.2 Variances of L7 and L4 Load Balancing
		1.3 ADC Load Balancing
	2 L4 Load Balancing Architectures
		2.1 Network Address Translation (NAT)
		2.2 Direct Server Return (DSR)
		2.3 IP Tunnel Mode
	3 L7 Load Balancing Architectures
		3.1 Proxy Mode
		3.2 Transparent Proxy Mode
	4 Conclusion
	References
Integration of IoT and SDN to Mitigate DDoS with RYU Controller
	1 Introduction
		1.1 Structuring of Paper
	2 Related Work in SDN and IoT Integration
	3 Related Work of DDoS Attack Detection and Mitigation
	4 IoT-SDN Test bed Architecture and Setup
		4.1 IoT-Test bed Setup
		4.2 SDN-Test bed Setup
		4.3 Thingsboard Cloud Platform
	5 DDoS Attack and Mitigation Simulation
	6 Conclusion
	References
Low Rate Multi-vector DDoS Attack Detection Using Information Gain Based Feature Selection
	1 Introduction
		1.1 Stealthy Attack Variants
	2 Literature Survey
	3 Proposed Methodology
	4 Result and Discussion
	5 Conclusion
	References
A Framework for Monitoring Patient’s Vital Signs with Internet of Things and Blockchain Technology
	1 Introduction
	2 Motivation
	3 Literature Survey
		3.1 Blockchain Technology
	4 System Architecture
		4.1 A Scenario in the Patient Health Monitoring System
		4.2 Proposed Algorıthms
	5 Results and Discussion
		5.1 Advantages
	6 Conclusion
	References
IoT Based Smart Transport Management and Vehicle-to-Vehicle Communication System
	1 Introduction
		1.1 Hardware Component Needed for Li-Fi Technology
		1.2 Software Used for Li-Fi Technologies
		1.3 Li-Fi Communicator Systems
		1.4 Limitation of Li-Fi Technology
	2 Radio-Frequency Identification (RFID) Tag Technology
		2.1 Working of RFID Tag
		2.2 Limitations of RFID Tags
		2.3 Vehicle to Everything Communication (V2X Communication)
	3 LORAWAN Technology
		3.1 Implementation of Proposed Framework
		3.2 Proposed Framework
	4 Vehicular Adhoc Network (VANET) Technology
		4.1 Working of VANET
		4.2 Emergency Application for V2V Communication
		4.3 Vehicle to Infrastructure Communication
	5 Conclusion
	References
An Analytical and Comparative Study of Hospital Re-admissions in Digital Health Care
	1 Introduction
	2 Existing Work on Re-admission Prediction
	3 Causes of Hospital Re-admissions
	4 Reduction in Hospital Re-admission
	5 Conclusion
	References
An Edge DNS Global Server Load Balancing for Load Balancing in Edge Computing
	1 Introduction
		1.1 Need for Load Balancing in Edge Computing
		1.2 Need for Load Balancing in Edge Computing
		1.3 Load Distribution
		1.4 Edge Computing and Load Balancing
	2 GSLB Load Balancing
		2.1 Need for Edge DNS GSLB
	3 Edge DNS GSLB and Multi-cloud
		3.1 Advanced Disaster Recovery
		3.2 Sharing of Network Load Between Multiple Data Centres
		3.3 WAN Failure Detection
	4 Conclusion
	References
Network Intrusion Detection Using Cross-Bagging-Based Stacking Model
	1 Introduction
	2 Literature Review
	3 Cross-Bagging-Based Stacked Ensemble (CBSE)
	4 Data Preprocessing and Segregation
	5 Cross-Bagging Ensemble Creation
	6 Stacking Phase for Final Prediction
	7 Results and Discussion
	8 Conclusion
	References
Enterprise Network: Security Enhancement and Policy Management Using Next-Generation Firewall (NGFW)
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 IP Spoofing
		3.2 Insider Intrusion
		3.3 Denial of Service (DDoS)
		3.4 No Protection Against Masquerades
		3.5 Firewall Trusted and Untrusted Network (LAN & WAN)
	4 Implementation
		4.1 Devices and Appliances
		4.2 Implementation of Firewall with the Integration  of Different Policy
		4.3 Implementing Port Forwarding and Policy Against Direct Internet Traffic
		4.4 Implementation of Internet Protocol Security (IPsec) VPN in Proposed Model
	5 Results
		5.1 Performance Analysis and Evaluation
	6 Conclusions
	References
Comparative Study of Fault-Diagnosis Models Based on QoS Metrics in SDN
	1 Introduction
	2 Background
		2.1 Architecture
		2.2 OpenFlow
		2.3 Fault Diagnosis
	3 Key Concepts and Terminologies
		3.1 Reactive Restoration Method
		3.2 Proactive Restoration Method
		3.3 Carrier-Grade Networks
		3.4 Quality of Service Metrics
	4 Comparison
		4.1 Fast and Adaptive Failure Recovery Using Machine Learning in Software-Defined Networks (FAFRs) [5]
		4.2 A Proactive Restoration Technique for SDNs (PRT) [6]
		4.3 CORONET: Fault Tolerance for Software-Defined Networks (CN) [3]
		4.4 FT‐SDN: A Fault‐Tolerant Distributed Architecture for Software-Defined Network (FT-SDN) [7]
		4.5 Proactive Failure Recovery in OpenFlow Based Software Defined
	5 Conclusion
	References
A Brief Study on Analyzing Student’s Emotions with the Help of Educational Data Mining
	1 Introduction
	2 Literature Survey
	3 Conclusion
	References
IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages in IoT
	1 Introduction
	2 Related Work
	3 IoT-PSKTS: Public and Secret Key with Token Sharing Algorithm to Prevent Keys Leakages
		3.1 Key Generation
		3.2 Token Generation
		3.3 Shares Generation
		3.4 Reconstruct
		3.5 Mathematical Model of Share Construction and Reconstruction Process
	4 Results and Discussions
	5 Conclusion
	References
Investigation and Analysis of Path Evaluation for Sustainable Communication Using VANET
	1 Introduction
	2 VANET
	3 Related Work
	4 Proposed System
	5 GAD Protocol
	6 Algorithm for GAD
	7 Genetic Algorithm
	8 Sybil Attack
	9 Result and Discussion
		9.1 Packet Delivery Ratio
		9.2 Average End-to-End Delay
		9.3 CH Formation Delay
	10 Conclusion
	References
Performance Study of Free Space Optical System Under Varied Atmospheric Conditions
	1 Introduction
		1.1 The System Model
	2 Result and Discussion
	3 Conclusion
	References
Malicious URL Detection Using Machine Learning and Ensemble Modeling
	1 Introduction
	2 Literature Review
	3 Experiment
		3.1 Url Structure
		3.2 Dataset
		3.3 Pre-processing
		3.4 Methodology
		3.5 Performance Evaluation
	4 Results
	5 Conclusion
	References
Review on Energy-Efficient Routing Protocols in WSN
	1 Introduction
	2 Classification of Routing Protocols in WSN
		2.1 Network Structure-Based Routing Protocols
		2.2 Protocol Operation-Based Routing Protocols
	3 Energy-Efficient Routing Protocols in WSN
		3.1 Opportunistic Routing
		3.2 Cross-layer Routing
		3.3 Cooperative Routing
		3.4 Biological Inspired Optimal Routing
		3.5 Machine Learning (ML)-Based Routing Techniques Under Opportunistic, Cross-layer, Swarm Intelligence, and Cooperative Protocols
	4 Performance Evaluation Metrics of Routing Protocols
	5 Future Enhancement
	6 Conclusion
	References
Intelligent Machine Learning Approach for CIDS—Cloud Intrusion Detection System
	1 Introduction
	2 Background and Related Work
	3 Proposed Methodology
		3.1 Data Collection
		3.2 Preprocessing of the Dataset
		3.3 Intelligent Agent Based Feature Reduction Method
		3.4 Proposed Cloud Intrusion Detection System
	4 Results and Discussions
		4.1 Performance Analysis
	5 Conclusion
	References
In-network Data Aggregation Techniques for Wireless Sensor Networks: A Survey
	1 Introduction
	2 Data Aggregation
	3 Taxonomy on Data Aggregation
		3.1 Centralized Aggregation Technique
		3.2 Tree-Based Aggregation Technique
		3.3 Cluster-Based Aggregation Technique
		3.4 In-network Aggregation Technique
	4 In-network Aggregation
		4.1 Routing Protocols
	5 Types of In-network Processing
		5.1 Sensor Fusion
		5.2 Sensor Compression
		5.3 Sensor Filtering
		5.4 Sensor Elimination
	6 Algorithms of In-network Aggregation
	7 Parameters for Analyzing In-network Aggregation
	8 Comparison on In-network Data Aggregation Algorithms
	9 Conclusion
	References
Comparative Analysis of Traffic and Congestion in Software-Defined Networks
	1 Introduction
		1.1 Concept of SDN
		1.2 SDN Over Traditional Networks
	2 Areas of Study
		2.1 Traffic Classification
		2.2 Congestion Prediction
	3 Algorithmic Analysis
		3.1 Machine Learning
		3.2 Neural Networks
	4 Methodology
		4.1 SDN Simulation
		4.2 Application of Machine Learning
	5 Results and Analysis
		5.1 Traffic Classification
		5.2 Congestion Prediction
	6 Conclusion and Future Scope
	References
A Comparative Analysis on Sensor-Based Human Activity Recognition Using Various Deep Learning Techniques
	1 Introduction
	2 Related Work
		2.1 Convolutional Neural Networks in HAR:
		2.2 Long Short-Term Memory (LSTM) in HAR
		2.3 Extreme Gradient Boosting in HAR
		2.4 Multilayer Perceptron in HAR
	3 Proposed System
		3.1 Convolutional Neural Network
		3.2 Long Short-Term Memory
		3.3 Extreme Gradient Boosting
		3.4 Multilayer Perceptron
		3.5 MHEALTH Dataset
	4 Result and Performance Analysis
		4.1 Accuracy and Loss Results
	5 Conclusion and Future Enhancement
	References
FETE: Feedback-Enabled Throughput Evaluation for MIMO Emulated Over 5G Networks
	1 Introduction
	2 Background
	3 Methodology
		3.1 Dataset Description
		3.2 Exploration and Extrapolation
		3.3 Analytical Model
		3.4 Signal Continuity
	4 Feedback-Enabled Throughput Evaluatıon
		4.1 System Informatıon
		4.2 Throughput Calculatıon
		4.3 Improved Throughput Using MIMO
	5 Evaluatıon and Results
	6 Conclusion
	References
Automatic Vehicle Service Monitoring and Tracking System Using IoT and Machine Learning
	1 Introduction
	2 Literature Survey
	3 Proposed Framework
		3.1 System Design
		3.2 Implementation
	4 Results
	5 Conclusions
	References
Machine Learning-Based Application to Detect Pepper Leaf Diseases Using HistGradientBoosting Classifier with Fused HOG and LBP Features
	1 Introduction
	2 Related Work
	3 Proposed Methodology
		3.1 Data Preprocessing
		3.2 Feature Extraction
		3.3 Dimensionality Reduction
		3.4 Classification
	4 Experimental Results
		4.1 Pepper Leaf Disease Dataset
		4.2 Performance Evaluation Measures
		4.3 Result Analysis
	5 Conclusion
	References
Efficacy of Indian Government Welfare Schemes Using Aspect-Based Sentimental Analysis
	1 Introduction
	2 Related Work
	3 Methodology
	4 Results and Discussion
	5 Conclusion
	References
Author Index




نظرات کاربران