ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب IoT and Analytics for Sensor Networks: Proceedings of ICWSNUCA 2021 (Lecture Notes in Networks and Systems, 244)

دانلود کتاب اینترنت اشیا و تجزیه و تحلیل برای شبکه های حسگر: مجموعه مقالات ICWSNUCA 2021 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 244)

IoT and Analytics for Sensor Networks: Proceedings of ICWSNUCA 2021 (Lecture Notes in Networks and Systems, 244)

مشخصات کتاب

IoT and Analytics for Sensor Networks: Proceedings of ICWSNUCA 2021 (Lecture Notes in Networks and Systems, 244)

ویرایش: 1st ed. 2022 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 9811629188, 9789811629181 
ناشر: Springer 
سال نشر: 2021 
تعداد صفحات: 502 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 مگابایت 

قیمت کتاب (تومان) : 37,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 11


در صورت تبدیل فایل کتاب IoT and Analytics for Sensor Networks: Proceedings of ICWSNUCA 2021 (Lecture Notes in Networks and Systems, 244) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اینترنت اشیا و تجزیه و تحلیل برای شبکه های حسگر: مجموعه مقالات ICWSNUCA 2021 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 244) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب اینترنت اشیا و تجزیه و تحلیل برای شبکه های حسگر: مجموعه مقالات ICWSNUCA 2021 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 244)

این کتاب شامل مقالات تحقیقاتی با کیفیت بالا است که در اولین کنفرانس بین‌المللی شبکه‌های حسگر بی‌سیم، محاسبات همه جا حاضر و کاربردها (ICWSNUCA، 2021)، که در موسسه مهندسی و فناوری Gokaraju Rangaraju، حیدرآباد، هند، طی 26 تا 27 فوریه برگزار شد، ارائه شده است. ، 2021. این جلد بر کاربردها، موارد استفاده، معماری ها، استقرارها و پیشرفت های اخیر شبکه های حسگر بی سیم و همچنین محاسبات فراگیر تمرکز دارد. موضوعات تحقیقاتی مختلف در این کتاب نشان داده شده است، مانند شبکه های حسگر بی سیم برای اینترنت اشیا. برنامه های IoT برای سلامت الکترونیک؛ شهرهای هوشمند؛ معماری‌های WSN و IoT، سخت‌افزار WSN و دستگاه‌های جدید؛ فن آوری های بی سیم کم مصرف؛ شبکه های حسگر موقت بی سیم؛ مسیریابی و انتقال داده در WSN ها. ارتباطات چندپخشی در WSN ها. مدیریت امنیت در WSN ها و در سیستم های اینترنت اشیا؛ و بهینه سازی مصرف برق در شبکه های بی سیم


توضیحاتی درمورد کتاب به خارجی

This book includes high-quality research papers presented at the 1st International Conference on Wireless Sensor Networks, Ubiquitous Computing and Applications (ICWSNUCA, 2021), which is held at Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India, during 26–27 February, 2021. This volume focuses on the applications, use-cases, architectures, deployments, and recent advances of wireless sensor networks as well as ubiquious computing. Different research topics are illustrated in this book, like wireless sensor networks for the Internet of Things; IoT applications for eHealth; smart cities; architectures for WSNs and IoT, WSNs hardware and new devices; low-power wireless technologies; wireless ad hoc sensor networks; routing and data transfer in WSNs; multicast communication in WSNs; security management in WSNs and in IoT systems; and power consumption optimization in WSNs.



فهرست مطالب

Organizing Committee and Key Members
Invited Speaker
Preface and Acknowledgement
About This Book
Contents
About the Editors
An Interactive Smart Mirror Using Internet of Things and Machine Learning
	1 Introduction
	2 Motivation and Related Work
	3 Architecture, Working and Feature
		3.1 Hand Gesture-Controlled Music Player
		3.2 Other Content Features
	4 Result
	5 Conclusion and Future Enhancements
	References
Cluster Formation Algorithm in WSNs to Optimize the Energy Consumption Using Self-Organizing Map
	1 Introduction
	2 Existing Literature
	3 Proposed Heuristic
	4 Results and Discussion
	5 Conclusion
	References
CNN-Based Mobile Device Detection Using Still Images
	1 Introduction
	2 Techniques for Source Camera Identification
		2.1 Image Headers
		2.2 Images Features
		2.3 Demosaicing Features
		2.4 PRNU Feature-Based Approach
		2.5 Mobile Sensor Fingerprint
		2.6 Convolutional Neural Networks and Image Noise Pattern
	3 Dataset Used
	4 Proposed CNN Model and Its Architecture
	5 Results and Discussions
	6 Conclusion
	References
E-FFTF: An Extended Framework for Flexible Fault Tolerance in Cloud
	1 Introduction
	2 Proposed E-FFTF
		2.1 System Model
		2.2 Task Execution Model
	3 Experimental Evaluation
		3.1 Simulation Settings
		3.2 Results and Discussion
	4 Conclusions and Future Research Scope
	References
Human Abnormal Activity Pattern Analysis in Diverse Background Surveillance Videos Using SVM and ResNet50 Model
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 SVM Classifier Model
		3.2 ResNet50 Model
	4 Experimental Analysis
	5 Result and Discussion
	6 Conclusion
	References
RT-GATE: Concept of Micro Level Polarization in QCA
	1 Introduction
	2 QCA Basic Elements
		2.1 Universal Gates Based on Partial Polarization Technique
	3 Proposed RT-Gate
	4 Multiplexer
		4.1 Proposed Multiplexer
	5 Conclusion
	References
Comparative Performance Analysis of Tanh-Apodized Fiber Bragg Grating and Gaussian-Apodized Fiber Bragg Grating as Hybrid Dispersion Compensation Model
	1 Introduction
	2 Theory
		2.1 Dispersion Compensation Fiber
		2.2 Fiber Bragg Grating
	3 Experimental Results
	4 Conclusion
	References
Performance Comparison of Adaptive Mobility Management Scheme with IEEE 802.11s to Handle Internet Traffic
	1 Introduction
	2 Hybrid Wireless Mesh Protocol
	3 Adaptive Mobility Management Technique
	4 Numerical Analysis
		4.1 Handoff Cost
		4.2 Packet Delivery Cost
	5 Comparison and Simulation
		5.1 Impact of Network Load
		5.2 Impact of External STA Speed
	6 Comparison of Numerical Results and Simulation
	7 Conclusion and Future Work
	References
Automatic Attendance Management System Using Face Detection and Face Recognition
	1 Introduction
	2 Related Works
		2.1 Attendance System Using Image Processing Techniques
		2.2 Attendance System Using Face Detection and Face Recognition
		2.3 Attendance System Using Deep Learning Framework
		2.4 Deep Learning Paradigm for Attendance Systems
		2.5 Attendance System Using FaceNet and SVM
	3 Motivation
	4 Proposed System
		4.1 Input
		4.2 Image Pre-Processing
		4.3 Image Processing
		4.4 Face Classification
		4.5 Testing
	5 Experimental Results
	6 Conclusion and Future Work
	References
ESIT: An Enhanced Lightweight Algorithm for Secure Internet of Things
	1 Introduction
	2 Related Works
	3 Proposed Framework
		3.1 Key Generation
		3.2 Encryption
		3.3 Decryption
	4 Observations
		4.1 Evaluation Parameters
	5 Conclusion
	References
A Novel Block Diagonalization Algorithm to Suppress Inter-user Interference in a Multi-user Mimo System
	1 Introduction
	2 Proposed Methodology
		2.1 System Model
		2.2 Broadcast Channel Transmission via Block Diagonalization
	3 Simulation and Results
	4 Conclusion
	References
Prediction of Chemical Contamination for Water Quality Assurance Using ML-Based Techniques
	1 Introduction
	2 Related Works
	3 Study Site
	4 Materials and Methods
		4.1 Machine Learning Algorithms
	5 Results and Discussion
		5.1 Performance Evaluation
	6 Conclusion
	References
Design and Performance Analysis of Two-Port Circularly Polarized MIMO Antenna for UWB Applications
	1 Introduction
	2 Antenna Design and Configuration
		2.1 Evolution Process of the Proposed Antenna
		2.2 Parametric Study
		2.3 Surface Current
	3 Results and Discussion
	4 Conclusion
	References
Intelligent Traffic Control System for Emergency Vehicles
	1 Introduction
	2 Related Work
	3 The Proposed Protocol
		3.1 Problem Statement
		3.2 Intelligent Traffic Control Model
	4 Experimental Analysis
		4.1 Simulation Study
		4.2 Evaluation Methodology and Parameters
		4.3 Experimental Results
	5 Conclusion and Acknowledgement
	References
Digital Controller-Based Automated Drainage Water Monitoring and Controlling
	1 Introduction
	2 Block Diagram
	3 Implementation of the Project Using PLC
	4 Results and Discussions
		4.1 Detailed Description of Stages
		4.2 PH Level Indications
	5 Conclusions
	References
Cooperative Agent-Based Location Validation for Vehicular Clouds
	1 Introduction
	2 Related Work
	3 Proposed Work
	4 Security Analysis
	5 Conclusion
	References
An Analytical Approach for Traffic Grooming Problems Using Waiting Probability in WDM Networks
	1 Introduction
	2 Related Work
	3 Proposed Technique
	4 Results and Discussions
	5 Conclusion
	References
Flow-Based Detection and Mitigation of Low-Rate DDOS Attack in SDN Environment Using Machine Learning Techniques
	1 Introduction
	2 Background and Related Work
		2.1 Software Defined Networking
		2.2 Low-Rate DDoS Attack
		2.3 Related Work
	3 Architectural Design
		3.1 Detection Phase
		3.2 Mitigation Phase
		3.3 Algorithm
	4 Experimental Setup
		4.1 Environment Setup
		4.2 Dataset
		4.3 Evaluation Metrics
	5 Conclusion
	References
Design and Simulation of MEMS Based Capacitive Accelerometer
	1 Introduction
	2 Structure Design and Working Phenomenon
	3 Mathematical Analysis
		3.1 To Find the Natural Frequency of the Accelerometers
		3.2 To Find the Damping Ratio of the Accelerometers
		3.3 To Find the Static Capacitance of the Accelerometers
		3.4 To Find the Displacements Sensitivity of the Accelerometers
	4 Simulation and Results
		4.1 Model X
		4.2 Model Y
		4.3 Simulations to Check Variation of Mass and Dimensions of the Proof Mass Over Resonant Frequency
		4.4 MATALAB Simulations
	5 Results and Discussions
	6 Conclusion and Future Scope
	References
Transport Tracking Using RFID and GSM Based Technique
	1 Introduction
	2 Literature Review
	3 Design and Implementation
		3.1 Pic 16f877a
		3.2 RFID Tag
		3.3 RFID Reader
		3.4 Temperature Sensor
		3.5 Accelerated Tilt Sensor
		3.6 Gas Sensor
		3.7 GPS Module
		3.8 GSM Module
	4 Hardware Implementation
	5 Results and Discussions
	6 Conclusion
	References
An Ultra-Wide Band Patch Antenna for Commercial Communication Applications
	1 Introduction
	2 Design of Lotus-Shaped UWB Antenna
	3 Results and Discussions
	4 Conclusion
	References
8-Bit Carry Look Ahead Adder Using MGDI Technique
	1 Introduction
	2 Literature Review
		2.1 Working of CLA
	3 Methodology
		3.1 Mod-GDI Technology
		3.2 Design of 8-bit CLA
		3.3 Design of AND Gate in MGDI Technique
		3.4 Design of OR Gate in MGDI Technique
		3.5 Design of XOR Gate in MGDI Technique
		3.6 Design of 8-bit CLA in MGDI Technique
	4 Results and Discussions
	5 Conclusion
	References
Improved Scientific Workflow Scheduling Algorithm with Distributed Heft Ranking and TBW Scheduling Method
	1 Introduction
	2 Literature Review
	3 Proposed Ideology
		3.1 Proposed Representation
		3.2 Proposed Flowchart and Phases of Proposed Methodology
	4 Conclusion
	References
Selection of OLAP Materialized Cube by Using a Fruit Fly Optimization (FFO) Approach: A Multidimensional Data Model
	1 Introduction
	2 The Fruit Fly Optimization (FFO) Approach for Selection of OLAP Materialized Cube (A Multidimensional Data Model)
		2.1 FFO Approach
		2.2 Lattice Structure
		2.3 Cube Selection Using FFO Approach
	3 Result and Analysis
	4 Conclusion
	References
Fault Tolerant Multimedia Caching Strategy for Information-Centric Networking
	1 Introduction
	2 Related Work
	3 Problem Statement and Objectives
	4 System Model
	5 Implementation
		5.1 Calculation of Chunk Size
		5.2 Download File
	6 Performance Evaluation
		6.1 Download Time
		6.2 Throughput
	7 Conclusion
	References
Sizing of Wireless Networks with Sensors for Smart Houses with Coverage, Capacity, and Interference Restrictions
	1 Introduction
	2 Network Dimensioning Wireless
	3 Problem Formulation
	4 Analysis of Results
	5 Conclusions
	References
Cloud-Based Parkinson Disease Prediction System Using Expanded Cat Swarm Optimization
	1 Introduction
	2 Related Works
	3 Cloud-Based Parkinson Disease Prediction System
		3.1 ECSO-Based Feature Selection
		3.2 Decision Prediction Classifier Model
	4 Experimental Evaluation
	5 Conclusion and Future Works
	References
Electric Vehicle Monitoring System Based on Internet of Things (IoT) Technologies
	1 Introduction
	2 System Description
		2.1 EV Load Forecasting and SOC Measurement
	3 Proposed IoT-Based EV Management
		3.1 Test Method for Calculating SOC
		3.2 Algorithm of CS Selection
		3.3 Applications
	4 Conclusion
	References
Dynamic Analysis and Projective Synchronization of a New 4D System
	1 Introduction
	2 Description of the System
		2.1 Equilibrium Points, the Jacobian Matrix, and Divergence
		2.2 Lyapunov Exponents and Dimensions
		2.3 Multistability
		2.4 Projective Synchronization
	3 Conclusions
	References
Improving the Protection of Wireless Sensor Network Using a Black Hole Optimization Algorithm (BHOA) on Best Feasible Node Capture Attack
	1 Introduction
	2 BHOA for Node Capture Attack
		2.1 Vertex Participation
		2.2 Black Hole Optimization Algorithm (BHOA)
	3 Results and Analysis
		3.1 Traffic Compromised Ratio
		3.2 Power Consumption Cost
		3.3 Attacking Time
	4 Conclusion
	References
A Systematic Analysis of the Human Activity Recognition Systems for Video Surveillance
	1 Introduction
	2 Human Activity Recognition Systems for Video Surveillance
	3 Systematic Analysis and Discussion
	4 Conclusion
	References
Integrating IoT with Blockchain: A Systematic Review
	1 Introduction
	2 IoT
		2.1 Introduction of IoT
		2.2 Challenges in IoT
	3 About Blockchain Technology
		3.1 Security Features of Blockchain
		3.2 Key Characteristics of Blockchain
	4 Literature Review of Integration Between IoT and Blockchain
		4.1 Privacy of IoT via Blockchains
	5 Convergence of BC and IoT
		5.1 Issues Faced in the IoT
		5.2 Benefits of Integrating Blockchain with IoT
	6 IoT-Blockchain Applications
		6.1 Chain of Things [17]
		6.2 My Bit [18]
		6.3 Slock.It [19]
		6.4 Riddle and Code [20]
		6.5 Modem [21]
	7 Integration Challenges in Blockchain and IoT
		7.1 Scalability Issue
		7.2 Processing Power and Time
		7.3 Storage
		7.4 Interoperability
		7.5 Legal and Compliance Issues
	8 Conclusion and Future Work
	References
Quality Assisted Spectrum Allocation in Cognitive NOMA Networks
	1 Introduction
	2 Joint Spectrum Resource Allocation
	3 Quality Assisted Spectrum Allocation
	4 Experimental Results
	5 Conclusion
	References
Proficient Dual Secure Multi Keyword Search by Top-K Ranking Based on Synonym Index and DNN in Untrusted Cloud
	1 Introduction
	2 Related Work
	3 Proposed Work
		3.1 System Overview
		3.2 Multi-keyword Search
		3.3 Document Retrieval
	4 Experimental Evaluation
		4.1 Simulation Setup
		4.2 Comparative Analysis
	5 Conclusion
	References
Transfer Learning-Based Detection of Covid-19 Using Chest CT Scan Images
	1 Introduction
	2 Methodology
		2.1 Data Description
		2.2 Data Augmentation
		2.3 Model Architectures
	3 Results
	4 Conclusion
	References
A Hybridized Machine Learning Model for Optimal Feature Selection and Attack Detection in Cloud SaaS Framework
	1 Introduction
	2 Literature Review
	3 Proposed Attack Detection Framework
		3.1 Feature Selection Using OCSA
		3.2 DBN Based Attack Detection
	4 Experimental Results
		4.1 Execution Setup
		4.2 Performance Metrics
		4.3 Performance Analysis with Respect to Feature Selection
		4.4 Performance Analysis of the Classifier
	5 Conclusions and Future Work
	References
English Master AMMU: Advanced Spoken English Chatbot
	1 Introduction
	2 Chatbot Development Framework
		2.1 IBM Watson Assistant
		2.2 Azure Cognitive Services
		2.3 Google Dialogflow
	3 System Design
		3.1 System Architecture
		3.2 Implementation
	4 Experimental Results
	5 Conclusion
	References
Investigation of CNN-Based Acoustic Modeling for Continuous Hindi Speech Recognition
	1 Introduction
	2 CNN-Based Acoustic Modeling for Hindi Language
	3 Dataset Details
	4 Experimental Setup and Results
		4.1 Experiments with Baseline System
		4.2 Experiments with Different Activation Function and Optimization Techniques
	5 Conclusion
	References
Energy Conserving Techniques of Data Mining for Wireless Sensor Networks—A Review
	1 Introduction
	2 Overview of Methods Used
	3 Classification of Compression Techniques
		3.1 String Based Compression Techniques
		3.2 RLE and K-RLE
		3.3 Coding by Ordering
		3.4 Pipelined In-Network Compression
		3.5 Distributed Compression
	4 Conclusion
	References
Iot Based Healthcare System for Patient Monitoring
	1 Introduction
	2 Objectives
	3 Proposed System
	4 Hardware Implementation
	5 Conclusion
	References
Detection and Classification of Intracranial Brain Hemorrhage
	1 Introduction
	2 Literature Survey
	3 Proposed Method
		3.1 Preprocessing
		3.2 Segmentation
		3.3 Morphological Techniques
		3.4 Obtaining Region of Interest
	4 Experimentation and Results
	5 Conclusion
	References
Implementation of Efficient Technique to Conduct DDoS Attack Using Client–Server Paradigm
	1 Introduction
	2 DDoS: A Major Threat to the Isps
	3 History of DDoS Attacks
	4 DDoS Client/Server Attack
	5 Implementation of Techniques to Generate DDoS Attack
		5.1 Number of Attacks Sent
		5.2 Attacks Per Second
		5.3 Total attacks at instant
		5.4 Server Performance (Z)
	6 Results of DDoS Attack Using Client/Server Paradigm
	7 Conclusion and Future Work
	References
Design and Development of Retrieval-Based Chatbot Using Sentence Similarity
	1 Introduction
	2 Motivation
	3 Related Work
	4 Proposed Approach
	5 Results and Discussion
	6 Conclusion
	References
A Pragmatic Study on Movie Recommender Systems Using Hybrid Collaborative Filtering
	1 Introduction
	2 Literature Review
	3 Proposed Methodology
	4 Conclusion
	References
An Anatomization of FPGA-Based Neural Networks
	1 Introduction
	2 Literature Review
	3 Overview of CNN
		3.1 Model of Convolutional Layer
		3.2 Model of Pooling Layer
		3.3 Full Connection Layer
		3.4 Activation Layer
	4 Challenges in FPGA
		4.1 Tradeoff Between RTL and HLS Approaches
		4.2 Necessity of Diligent Design
		4.3 FPGAs Over GPUs/ASICs/CPUs
		4.4 A Comparative Study Between FPGA, ASIC, and GPU
	5 A Compendium of Numerous Hardware Implementations
	6 Conclusion and Future Work
	References
Author Index




نظرات کاربران