دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed. 2022 نویسندگان: Padmalaya Nayak (editor), Souvik Pal (editor), Sheng-Lung Peng (editor) سری: ISBN (شابک) : 9811629188, 9789811629181 ناشر: Springer سال نشر: 2021 تعداد صفحات: 502 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 14 مگابایت
در صورت تبدیل فایل کتاب IoT and Analytics for Sensor Networks: Proceedings of ICWSNUCA 2021 (Lecture Notes in Networks and Systems, 244) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب اینترنت اشیا و تجزیه و تحلیل برای شبکه های حسگر: مجموعه مقالات ICWSNUCA 2021 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 244) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مقالات تحقیقاتی با کیفیت بالا است که در اولین کنفرانس بینالمللی شبکههای حسگر بیسیم، محاسبات همه جا حاضر و کاربردها (ICWSNUCA، 2021)، که در موسسه مهندسی و فناوری Gokaraju Rangaraju، حیدرآباد، هند، طی 26 تا 27 فوریه برگزار شد، ارائه شده است. ، 2021. این جلد بر کاربردها، موارد استفاده، معماری ها، استقرارها و پیشرفت های اخیر شبکه های حسگر بی سیم و همچنین محاسبات فراگیر تمرکز دارد. موضوعات تحقیقاتی مختلف در این کتاب نشان داده شده است، مانند شبکه های حسگر بی سیم برای اینترنت اشیا. برنامه های IoT برای سلامت الکترونیک؛ شهرهای هوشمند؛ معماریهای WSN و IoT، سختافزار WSN و دستگاههای جدید؛ فن آوری های بی سیم کم مصرف؛ شبکه های حسگر موقت بی سیم؛ مسیریابی و انتقال داده در WSN ها. ارتباطات چندپخشی در WSN ها. مدیریت امنیت در WSN ها و در سیستم های اینترنت اشیا؛ و بهینه سازی مصرف برق در شبکه های بی سیم
This book includes high-quality research papers presented at the 1st International Conference on Wireless Sensor Networks, Ubiquitous Computing and Applications (ICWSNUCA, 2021), which is held at Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India, during 26–27 February, 2021. This volume focuses on the applications, use-cases, architectures, deployments, and recent advances of wireless sensor networks as well as ubiquious computing. Different research topics are illustrated in this book, like wireless sensor networks for the Internet of Things; IoT applications for eHealth; smart cities; architectures for WSNs and IoT, WSNs hardware and new devices; low-power wireless technologies; wireless ad hoc sensor networks; routing and data transfer in WSNs; multicast communication in WSNs; security management in WSNs and in IoT systems; and power consumption optimization in WSNs.
Organizing Committee and Key Members Invited Speaker Preface and Acknowledgement About This Book Contents About the Editors An Interactive Smart Mirror Using Internet of Things and Machine Learning 1 Introduction 2 Motivation and Related Work 3 Architecture, Working and Feature 3.1 Hand Gesture-Controlled Music Player 3.2 Other Content Features 4 Result 5 Conclusion and Future Enhancements References Cluster Formation Algorithm in WSNs to Optimize the Energy Consumption Using Self-Organizing Map 1 Introduction 2 Existing Literature 3 Proposed Heuristic 4 Results and Discussion 5 Conclusion References CNN-Based Mobile Device Detection Using Still Images 1 Introduction 2 Techniques for Source Camera Identification 2.1 Image Headers 2.2 Images Features 2.3 Demosaicing Features 2.4 PRNU Feature-Based Approach 2.5 Mobile Sensor Fingerprint 2.6 Convolutional Neural Networks and Image Noise Pattern 3 Dataset Used 4 Proposed CNN Model and Its Architecture 5 Results and Discussions 6 Conclusion References E-FFTF: An Extended Framework for Flexible Fault Tolerance in Cloud 1 Introduction 2 Proposed E-FFTF 2.1 System Model 2.2 Task Execution Model 3 Experimental Evaluation 3.1 Simulation Settings 3.2 Results and Discussion 4 Conclusions and Future Research Scope References Human Abnormal Activity Pattern Analysis in Diverse Background Surveillance Videos Using SVM and ResNet50 Model 1 Introduction 2 Related Work 3 Methodology 3.1 SVM Classifier Model 3.2 ResNet50 Model 4 Experimental Analysis 5 Result and Discussion 6 Conclusion References RT-GATE: Concept of Micro Level Polarization in QCA 1 Introduction 2 QCA Basic Elements 2.1 Universal Gates Based on Partial Polarization Technique 3 Proposed RT-Gate 4 Multiplexer 4.1 Proposed Multiplexer 5 Conclusion References Comparative Performance Analysis of Tanh-Apodized Fiber Bragg Grating and Gaussian-Apodized Fiber Bragg Grating as Hybrid Dispersion Compensation Model 1 Introduction 2 Theory 2.1 Dispersion Compensation Fiber 2.2 Fiber Bragg Grating 3 Experimental Results 4 Conclusion References Performance Comparison of Adaptive Mobility Management Scheme with IEEE 802.11s to Handle Internet Traffic 1 Introduction 2 Hybrid Wireless Mesh Protocol 3 Adaptive Mobility Management Technique 4 Numerical Analysis 4.1 Handoff Cost 4.2 Packet Delivery Cost 5 Comparison and Simulation 5.1 Impact of Network Load 5.2 Impact of External STA Speed 6 Comparison of Numerical Results and Simulation 7 Conclusion and Future Work References Automatic Attendance Management System Using Face Detection and Face Recognition 1 Introduction 2 Related Works 2.1 Attendance System Using Image Processing Techniques 2.2 Attendance System Using Face Detection and Face Recognition 2.3 Attendance System Using Deep Learning Framework 2.4 Deep Learning Paradigm for Attendance Systems 2.5 Attendance System Using FaceNet and SVM 3 Motivation 4 Proposed System 4.1 Input 4.2 Image Pre-Processing 4.3 Image Processing 4.4 Face Classification 4.5 Testing 5 Experimental Results 6 Conclusion and Future Work References ESIT: An Enhanced Lightweight Algorithm for Secure Internet of Things 1 Introduction 2 Related Works 3 Proposed Framework 3.1 Key Generation 3.2 Encryption 3.3 Decryption 4 Observations 4.1 Evaluation Parameters 5 Conclusion References A Novel Block Diagonalization Algorithm to Suppress Inter-user Interference in a Multi-user Mimo System 1 Introduction 2 Proposed Methodology 2.1 System Model 2.2 Broadcast Channel Transmission via Block Diagonalization 3 Simulation and Results 4 Conclusion References Prediction of Chemical Contamination for Water Quality Assurance Using ML-Based Techniques 1 Introduction 2 Related Works 3 Study Site 4 Materials and Methods 4.1 Machine Learning Algorithms 5 Results and Discussion 5.1 Performance Evaluation 6 Conclusion References Design and Performance Analysis of Two-Port Circularly Polarized MIMO Antenna for UWB Applications 1 Introduction 2 Antenna Design and Configuration 2.1 Evolution Process of the Proposed Antenna 2.2 Parametric Study 2.3 Surface Current 3 Results and Discussion 4 Conclusion References Intelligent Traffic Control System for Emergency Vehicles 1 Introduction 2 Related Work 3 The Proposed Protocol 3.1 Problem Statement 3.2 Intelligent Traffic Control Model 4 Experimental Analysis 4.1 Simulation Study 4.2 Evaluation Methodology and Parameters 4.3 Experimental Results 5 Conclusion and Acknowledgement References Digital Controller-Based Automated Drainage Water Monitoring and Controlling 1 Introduction 2 Block Diagram 3 Implementation of the Project Using PLC 4 Results and Discussions 4.1 Detailed Description of Stages 4.2 PH Level Indications 5 Conclusions References Cooperative Agent-Based Location Validation for Vehicular Clouds 1 Introduction 2 Related Work 3 Proposed Work 4 Security Analysis 5 Conclusion References An Analytical Approach for Traffic Grooming Problems Using Waiting Probability in WDM Networks 1 Introduction 2 Related Work 3 Proposed Technique 4 Results and Discussions 5 Conclusion References Flow-Based Detection and Mitigation of Low-Rate DDOS Attack in SDN Environment Using Machine Learning Techniques 1 Introduction 2 Background and Related Work 2.1 Software Defined Networking 2.2 Low-Rate DDoS Attack 2.3 Related Work 3 Architectural Design 3.1 Detection Phase 3.2 Mitigation Phase 3.3 Algorithm 4 Experimental Setup 4.1 Environment Setup 4.2 Dataset 4.3 Evaluation Metrics 5 Conclusion References Design and Simulation of MEMS Based Capacitive Accelerometer 1 Introduction 2 Structure Design and Working Phenomenon 3 Mathematical Analysis 3.1 To Find the Natural Frequency of the Accelerometers 3.2 To Find the Damping Ratio of the Accelerometers 3.3 To Find the Static Capacitance of the Accelerometers 3.4 To Find the Displacements Sensitivity of the Accelerometers 4 Simulation and Results 4.1 Model X 4.2 Model Y 4.3 Simulations to Check Variation of Mass and Dimensions of the Proof Mass Over Resonant Frequency 4.4 MATALAB Simulations 5 Results and Discussions 6 Conclusion and Future Scope References Transport Tracking Using RFID and GSM Based Technique 1 Introduction 2 Literature Review 3 Design and Implementation 3.1 Pic 16f877a 3.2 RFID Tag 3.3 RFID Reader 3.4 Temperature Sensor 3.5 Accelerated Tilt Sensor 3.6 Gas Sensor 3.7 GPS Module 3.8 GSM Module 4 Hardware Implementation 5 Results and Discussions 6 Conclusion References An Ultra-Wide Band Patch Antenna for Commercial Communication Applications 1 Introduction 2 Design of Lotus-Shaped UWB Antenna 3 Results and Discussions 4 Conclusion References 8-Bit Carry Look Ahead Adder Using MGDI Technique 1 Introduction 2 Literature Review 2.1 Working of CLA 3 Methodology 3.1 Mod-GDI Technology 3.2 Design of 8-bit CLA 3.3 Design of AND Gate in MGDI Technique 3.4 Design of OR Gate in MGDI Technique 3.5 Design of XOR Gate in MGDI Technique 3.6 Design of 8-bit CLA in MGDI Technique 4 Results and Discussions 5 Conclusion References Improved Scientific Workflow Scheduling Algorithm with Distributed Heft Ranking and TBW Scheduling Method 1 Introduction 2 Literature Review 3 Proposed Ideology 3.1 Proposed Representation 3.2 Proposed Flowchart and Phases of Proposed Methodology 4 Conclusion References Selection of OLAP Materialized Cube by Using a Fruit Fly Optimization (FFO) Approach: A Multidimensional Data Model 1 Introduction 2 The Fruit Fly Optimization (FFO) Approach for Selection of OLAP Materialized Cube (A Multidimensional Data Model) 2.1 FFO Approach 2.2 Lattice Structure 2.3 Cube Selection Using FFO Approach 3 Result and Analysis 4 Conclusion References Fault Tolerant Multimedia Caching Strategy for Information-Centric Networking 1 Introduction 2 Related Work 3 Problem Statement and Objectives 4 System Model 5 Implementation 5.1 Calculation of Chunk Size 5.2 Download File 6 Performance Evaluation 6.1 Download Time 6.2 Throughput 7 Conclusion References Sizing of Wireless Networks with Sensors for Smart Houses with Coverage, Capacity, and Interference Restrictions 1 Introduction 2 Network Dimensioning Wireless 3 Problem Formulation 4 Analysis of Results 5 Conclusions References Cloud-Based Parkinson Disease Prediction System Using Expanded Cat Swarm Optimization 1 Introduction 2 Related Works 3 Cloud-Based Parkinson Disease Prediction System 3.1 ECSO-Based Feature Selection 3.2 Decision Prediction Classifier Model 4 Experimental Evaluation 5 Conclusion and Future Works References Electric Vehicle Monitoring System Based on Internet of Things (IoT) Technologies 1 Introduction 2 System Description 2.1 EV Load Forecasting and SOC Measurement 3 Proposed IoT-Based EV Management 3.1 Test Method for Calculating SOC 3.2 Algorithm of CS Selection 3.3 Applications 4 Conclusion References Dynamic Analysis and Projective Synchronization of a New 4D System 1 Introduction 2 Description of the System 2.1 Equilibrium Points, the Jacobian Matrix, and Divergence 2.2 Lyapunov Exponents and Dimensions 2.3 Multistability 2.4 Projective Synchronization 3 Conclusions References Improving the Protection of Wireless Sensor Network Using a Black Hole Optimization Algorithm (BHOA) on Best Feasible Node Capture Attack 1 Introduction 2 BHOA for Node Capture Attack 2.1 Vertex Participation 2.2 Black Hole Optimization Algorithm (BHOA) 3 Results and Analysis 3.1 Traffic Compromised Ratio 3.2 Power Consumption Cost 3.3 Attacking Time 4 Conclusion References A Systematic Analysis of the Human Activity Recognition Systems for Video Surveillance 1 Introduction 2 Human Activity Recognition Systems for Video Surveillance 3 Systematic Analysis and Discussion 4 Conclusion References Integrating IoT with Blockchain: A Systematic Review 1 Introduction 2 IoT 2.1 Introduction of IoT 2.2 Challenges in IoT 3 About Blockchain Technology 3.1 Security Features of Blockchain 3.2 Key Characteristics of Blockchain 4 Literature Review of Integration Between IoT and Blockchain 4.1 Privacy of IoT via Blockchains 5 Convergence of BC and IoT 5.1 Issues Faced in the IoT 5.2 Benefits of Integrating Blockchain with IoT 6 IoT-Blockchain Applications 6.1 Chain of Things [17] 6.2 My Bit [18] 6.3 Slock.It [19] 6.4 Riddle and Code [20] 6.5 Modem [21] 7 Integration Challenges in Blockchain and IoT 7.1 Scalability Issue 7.2 Processing Power and Time 7.3 Storage 7.4 Interoperability 7.5 Legal and Compliance Issues 8 Conclusion and Future Work References Quality Assisted Spectrum Allocation in Cognitive NOMA Networks 1 Introduction 2 Joint Spectrum Resource Allocation 3 Quality Assisted Spectrum Allocation 4 Experimental Results 5 Conclusion References Proficient Dual Secure Multi Keyword Search by Top-K Ranking Based on Synonym Index and DNN in Untrusted Cloud 1 Introduction 2 Related Work 3 Proposed Work 3.1 System Overview 3.2 Multi-keyword Search 3.3 Document Retrieval 4 Experimental Evaluation 4.1 Simulation Setup 4.2 Comparative Analysis 5 Conclusion References Transfer Learning-Based Detection of Covid-19 Using Chest CT Scan Images 1 Introduction 2 Methodology 2.1 Data Description 2.2 Data Augmentation 2.3 Model Architectures 3 Results 4 Conclusion References A Hybridized Machine Learning Model for Optimal Feature Selection and Attack Detection in Cloud SaaS Framework 1 Introduction 2 Literature Review 3 Proposed Attack Detection Framework 3.1 Feature Selection Using OCSA 3.2 DBN Based Attack Detection 4 Experimental Results 4.1 Execution Setup 4.2 Performance Metrics 4.3 Performance Analysis with Respect to Feature Selection 4.4 Performance Analysis of the Classifier 5 Conclusions and Future Work References English Master AMMU: Advanced Spoken English Chatbot 1 Introduction 2 Chatbot Development Framework 2.1 IBM Watson Assistant 2.2 Azure Cognitive Services 2.3 Google Dialogflow 3 System Design 3.1 System Architecture 3.2 Implementation 4 Experimental Results 5 Conclusion References Investigation of CNN-Based Acoustic Modeling for Continuous Hindi Speech Recognition 1 Introduction 2 CNN-Based Acoustic Modeling for Hindi Language 3 Dataset Details 4 Experimental Setup and Results 4.1 Experiments with Baseline System 4.2 Experiments with Different Activation Function and Optimization Techniques 5 Conclusion References Energy Conserving Techniques of Data Mining for Wireless Sensor Networks—A Review 1 Introduction 2 Overview of Methods Used 3 Classification of Compression Techniques 3.1 String Based Compression Techniques 3.2 RLE and K-RLE 3.3 Coding by Ordering 3.4 Pipelined In-Network Compression 3.5 Distributed Compression 4 Conclusion References Iot Based Healthcare System for Patient Monitoring 1 Introduction 2 Objectives 3 Proposed System 4 Hardware Implementation 5 Conclusion References Detection and Classification of Intracranial Brain Hemorrhage 1 Introduction 2 Literature Survey 3 Proposed Method 3.1 Preprocessing 3.2 Segmentation 3.3 Morphological Techniques 3.4 Obtaining Region of Interest 4 Experimentation and Results 5 Conclusion References Implementation of Efficient Technique to Conduct DDoS Attack Using Client–Server Paradigm 1 Introduction 2 DDoS: A Major Threat to the Isps 3 History of DDoS Attacks 4 DDoS Client/Server Attack 5 Implementation of Techniques to Generate DDoS Attack 5.1 Number of Attacks Sent 5.2 Attacks Per Second 5.3 Total attacks at instant 5.4 Server Performance (Z) 6 Results of DDoS Attack Using Client/Server Paradigm 7 Conclusion and Future Work References Design and Development of Retrieval-Based Chatbot Using Sentence Similarity 1 Introduction 2 Motivation 3 Related Work 4 Proposed Approach 5 Results and Discussion 6 Conclusion References A Pragmatic Study on Movie Recommender Systems Using Hybrid Collaborative Filtering 1 Introduction 2 Literature Review 3 Proposed Methodology 4 Conclusion References An Anatomization of FPGA-Based Neural Networks 1 Introduction 2 Literature Review 3 Overview of CNN 3.1 Model of Convolutional Layer 3.2 Model of Pooling Layer 3.3 Full Connection Layer 3.4 Activation Layer 4 Challenges in FPGA 4.1 Tradeoff Between RTL and HLS Approaches 4.2 Necessity of Diligent Design 4.3 FPGAs Over GPUs/ASICs/CPUs 4.4 A Comparative Study Between FPGA, ASIC, and GPU 5 A Compendium of Numerous Hardware Implementations 6 Conclusion and Future Work References Author Index