دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: الکترونیک: ارتباطات از راه دور ویرایش: نویسندگان: Nikhil Marriwala, C.C. Tripathi, Dinesh Kumar, Shruti Jain سری: Lecture Notes in Networks and Systems, 140 ISBN (شابک) : 9789811571299, 9789811571305 ناشر: Springer Singapore سال نشر: 2020 تعداد صفحات: 780 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 31 مگابایت
در صورت تبدیل فایل کتاب Mobile Radio Communications and 5G Networks: Proceedings of MRCN 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ارتباطات رادیویی موبایل و شبکه های 5G: مجموعه مقالات MRCN 2020 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب حاوی مقالات اصلی توسط محققان فعال است که در کنفرانس بین المللی ارتباطات رادیویی سیار و شبکه های 5G ارائه شده است. این شامل پیشرفتهای اخیر و فناوریهای آتی در زمینه سیستمهای سلولی، 2G/2.5G/3G/4G/5G و فراتر از آن، LTE، WiMAX، WMAN، و سایر شبکههای بیسیم پهن باند نوظهور، WLAN، WPAN و شبکههای مختلف خانگی/شخصی است. فناوریها، محاسبات و شبکههای فراگیر و پوشیدنی، شبکههای سلولی کوچک و فمتوسل، شبکههای مش بیسیم، شبکههای بیسیم خودرو، شبکههای رادیویی شناختی و کاربردهای آنها، شبکههای چندرسانهای بیسیم، شبکههای بیسیم سبز، استانداردسازی فناوریهای بیسیم در حال ظهور، مدیریت توان و تکنیکهای صرفهجویی در انرژی .
The book features original papers by active researchers presented at the International Conference on Mobile Radio Communications and 5G Networks. It includes recent advances and upcoming technologies in the field of cellular systems, 2G/2.5G/3G/4G/5G and beyond, LTE, WiMAX, WMAN, and other emerging broadband wireless networks, WLAN, WPAN, and various home/personal networking technologies, pervasive and wearable computing and networking, small cells and femtocell networks, wireless mesh networks, vehicular wireless networks, cognitive radio networks and their applications, wireless multimedia networks, green wireless networks, standardization of emerging wireless technologies, power management and energy conservation techniques.
Preface Contents Editors and Contributors Analysis and Application of Vehicular Ad hoc Network as Intelligent Transportation System 1 Introduction 2 Related Works 3 Comparative Analysis 4 Research Challenges 5 Conclusion References Comprehensive Study on Internet of Things (IoT) and Design Considerations of Various Microstrip Patch Antennas for IoT Applications 1 Introduction 2 Applications of IoT for Microstrip Patch Antenna 3 Conclusion References Nonclassicality Used as Quantum Information Processing in Nonlinear Optical Systems 1 Introduction 2 Condition of Nonclassicality of a Nonlinear Optical System 2.1 Condition of Normal Squeezing 2.2 Condition of Photon Statistics 2.3 Condition of Higher Order Antibunching (HOA) of Photons 3 Seven-Wave Mixing Process in Pump Mode 3.1 Squeezing in Seven-Wave Mixing Process 3.2 Sub-Poissonian Photon Statistics in Seven-Wave Mixing Process 3.3 Antibunching of Photons in Seven-Wave Mixing Process 4 Result 5 Conclusion References Investigation of SNR in VLC-Based Intelligent Transportation System Under Environmental Disturbances 1 Introduction 2 Topology 3 Methodology 3.1 Simulation and Formulations 4 Results and Analysis 5 Conclusion References An Algorithm for Target Detection, Identification, Tracking and Estimation of Motion for Passive Homing Missile Autopilot Guidance 1 Introduction 2 Proposed Algorithm to Detect Object 3 Results and Discussion 4 Motion Estimation and Tracking 5 Conclusion References Community Discovery and Behavior Prediction in Online Social Networks Employing Node Centrality 1 Introduction 2 The Proposed Algorithm 2.1 Objective Tasks 2.2 Objective Tasks Employing Count of Detected Clusters 2.3 Mutation 2.4 Crossover 2.5 Crossover on the Basis of Objective Task 3 Experimentation Results 4 Conclusion References IoT–Blockchain Integration-Based Applications Challenges and Opportunities 1 Introduction 2 Blockchain 2.1 Challenges 3 IoT and Blockchain Integration 3.1 Advantages of IoT and Blockchain Integration 3.2 Integration Schemes for IoT and Blockchain 3.3 Challenges in Blockchain IoT Integration 4 IoT–Blockchain-Based Platforms and Applications 4.1 Smart Contract 4.2 Hyperledger 4.3 Lisk Framework 4.4 Quorum 5 Experimental Analysis of Various Smart Contracts Used in IoT 6 Conclusion and Future Work References Analysis on Detection of Shilling Attack in Recommendation System 1 Introduction 2 Shilling Attack 3 Categorization of Shilling Attack 3.1 Intent Based 3.2 Based on Knowledge 4 Related Work 5 Detection Attributes 5.1 Generic Attributes 5.2 Model Specific Attributes 6 Evaluation Metrics 6.1 Prediction Shift 6.2 Recall 6.3 Precision 6.4 F1 Measure 6.5 Mean Absolute Error 7 Conclusion and Future Work References A Comparative Analysis of Improvements in Leach Protocol: A Survey 1 Introduction 2 LEACH Protocols with Single-Hop Communication 3 LEACH Protocols with Multi-Hop Communication 4 Conclusion and Future Directions References Deep Learning in Health Care: Automatic Cervix Image Classification Using Convolutional Neural Network 1 Introduction 2 Cervix Taxonomy 3 Literature Survey 4 Dataset 5 Proposed Methodology 5.1 Convolutional Neural Network(ConvNet) 5.2 Pooling Layer 6 Result and Discussion 7 Conclusion and Future Work References Review Paper on Leaf Diseases Detection and Classification Using Various CNN Techniques 1 Introduction 2 Literature Survey 3 Conclusion References Artificial Intelligence and Virtual Assistant—Working Model 1 Introduction 1.1 Difference Between Virtual Assistant and Chatbots 2 Training Automation 3 Analytics 4 Related Work 5 Future Work 6 Conclusion References Data Security in Wireless Sensor Networks: Attacks and Countermeasures 1 Introduction 2 Attacks in WSN 3 Security Requirements in WSN 3.1 Security Service 4 Cryptographic Techniques 4.1 Secret Key Cryptography 5 Attacks on Cryptosystem 5.1 Types of Active Attacks 6 Existing Methods 6.1 Application Based Methods 6.2 Technique Based Methods 7 Proposed Solution 8 Conclusion References Emerging Next-Generation TWDM-PON with Suitable Modulation Format 1 Introduction 2 TWDM-PON Architecture for Different Modulation Formats 2.1 Downstream System Design 2.2 Upstream System Design 2.3 Different Modulation Formats 3 Results and Discussion 3.1 Comparative Analysis for Downstream Transmission 3.2 Comparative Analysis for Upstream Transmission 4 Conclusion References Big Data and Analytics in Higher Educational Institutions 1 Introduction 2 Evolution of Big Data 2.1 Data Collection 2.2 Data Analysis 2.3 Data Visualization 3 Big Data and Analytics in Higher Education 3.1 Institutional Analytics 3.2 Information Technology (IT) Analytics 3.3 Academic Analytics 3.4 Learning Analytics 4 Opportunities 5 Challenges of Implementation 6 Conclusion References A Hybrid Channel Access Method to Optimize Congested Switched Network 1 Introduction 2 Related Work 3 Contributions 4 Design Philosophy 4.1 Network Parametric Analysis 4.2 HMCC Procedure 4.3 Exponential Back-Off Algorithm 5 Findings 6 Conclusions References Automated Object Detection System in Marine Environment 1 Introduction 2 Proposed Methodology 3 Experimental Results and Discussion 4 Conclusion and Future Work References Passive Authentication Image Forgery Detection Using Multilayer CNN 1 Introduction 1.1 Types of Image Forgery 1.2 Passive Image Forgery Attacks 2 Related Work 3 Proposed Model 3.1 Architecture of Model 3.2 Preprocessing 3.3 Convolution Layer 3.4 Polling Layer 3.5 Dense Layer 3.6 Dropout Layer 3.7 Completing the Network 3.8 Database Specification 4 Results 5 Conclusion References Contiki Cooja Security Solution (CCSS) with IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) in Internet of Things Applications 1 Introduction 2 Literature Review 3 Methodology 4 Result and Analysis 5 Conclusions and Future Scope References Characterization of Thimbles Based upon Different Sensors 1 Introduction 2 Architecture of the Thimbles 3 Methods 4 Data Recording 5 Data Analysis 6 Results 7 Discussion References Application of the Optimization Technique in Analytical and Electrochemistry for the Anticorrosive and Complexing Activity of 2,4-Dihydroxyacetophenone Benzoylhydrazone 1 Introduction 2 Experimental 2.1 Preparation of 2,4-Dihydroxyacetophenone Benzoylhydrazone (DHABH) 2.2 Materials Required for Anti-corrosion Potential 2.3 Instrumentation and Materials Required for Spectrophotometric Determination of Tungsten (VI) 3 Result and Discussion 3.1 Anticorrosive Behaviour 3.2 Electrochemical Measurements 3.3 Adsorption Isotherms 3.4 Quantum Chemical Parameters 3.5 Spectrophotometric Determination of W(VI) Using DHABH as Complexing Agents 3.6 Procedure Recommended for Extraction and Determination of Tungsten (VI) 3.7 Stoichiometry of the Complex 4 Computational Studies for Structural Elucidation 5 Conclusions References A Comprehensive Overview of Sentiment Analysis and Fake Review Detection 1 Introduction to Sentiment Analysis 1.1 Levels of Sentiment Analysis (SA) 1.2 Architecture of Sentiment Analysis 2 Fake Review 3 Literature Review 4 Approaches Used for Sentiment Analysis 5 Real-Life Applications of Sentiment Analysis 6 Conclusion References Information Security in Software-Defined Network 1 Introduction 2 Virtualized Network Functions and Software-Defined Networks 3 Related Work 4 Proposed Work 4.1 Requirement Specification 4.2 Methodology 5 Experimental Results 5.1 Screenshots 6 Conclusion 6.1 Proposed Work Achievement 6.2 Findings 6.3 Advantages 7 Future Scope References Emotions Recognition Based on Wrist Pulse Analysis 1 Introduction 2 Methodology 2.1 Data Acquisition 2.2 Preprocessing 2.3 Feature Extraction 3 Result 4 Conclusion References Trace Determination of Zirconium (IV) as its 3-Hydroxy-2-[2′-(5′-Methylthienyl)]-4H-Chromen-4-One Complex and Structural Elucidation by Quantization Technique 1 Introduction 2 Experimental 2.1 Equipments, Reagents and Solutions 2.2 Synthetic and Technical Samples 2.3 Procedure for Extraction and Determination 3 Results and discussion 3.1 Effect of Anions/Complexing Agents and Cations 3.2 Spectral Characteristics 3.3 Stoichiometry of Zr (IV)-HMTC Complex 3.4 Structural Elucidation by Optimization Technique 3.5 Analytical Applications 4 Conclusion References Barriers Which Impede the Implementation of an Effective Deep Web Data Extraction in VBPS 1 Introduction 1.1 The Recent Trends 1.2 The Working Architecture 2 Objectives 3 Research Background 4 Vision-Based Page Segmentation (VBPS) 4.1 Deep Web Data Extraction in VBPS 4.2 Barriers for Deep Web Data Extraction in VBPS 5 Conclusions and Recommendations References The Prediction of Stock Market Trends Using the Hybrid Model SVM-ICA-GA 1 Introduction 2 Literature Review 3 Overview of SVM 4 SVM with ICA and GA 5 Proposed Methodology 6 Results and Discussions 7 Conclusion References Bone Fractured Detection Using Machine Learning and Digital Geometry 1 Introduction 2 Literature Review 3 Methodology 4 The Model 5 Result 6 Conclusion References Assessment of Microgrid Communication Network Performance for Medium-Scale IEEE Bus Systems Using Multi-Agent System 1 Introduction 2 Materials and Methods 2.1 Multi-Agent System 2.2 IEEE Bus Systems for Microgrid 2.3 Network Performance 2.4 Protocol and Algorithm Description 3 Performance Metrics 4 Results and Discussion References Optimum Digital Filter Design for Removal of Different Noises from Biomedical Signals 1 Introduction 2 Methodology 3 Results and Discussion 4 Conclusion References 5G Inset Feed Antenna Array for 28 GHz Wireless Communication 1 Introduction 2 Antenna Design 3 Result and Discussion 3.1 Resonant Frequency 3.2 Gain 3.3 Radiation Pattern 4 Conclusion References Comparison of Various Attacks on WSN Layers—Based on the Site of the Attacker and Access Level 1 Introduction 2 WSN Architecture 2.1 Organization of Wireless Sensor Network 3 Limitations of Wireless Sensor Networks 4 Security in WSN 5 Classification of Attacks in WSN 5.1 Based on the Site of the Attacker 5.2 Attacks Based on Access Level 5.3 Attacks Based on Network Layer 6 Conclusion References Non-conventional Energy Source-Based Home Automation System 1 Introduction 2 System Model 3 System Design 3.1 Logic Circuit 3.2 Inverter Circuit 3.3 Microcontroller Connections 4 Results 5 Conclusion References Resource Scheduling on Basis of Cost-Effectiveness in Cloud Computing Environment 1 Introduction 2 Related Work 3 Resource Scheduling 3.1 Resource Scheduling Algorithms Based on Energy Conservation in Cloud Computing 3.2 Resource Scheduling Algorithms Based on Virtualization in Cloud Computing 3.3 Resource Scheduling Algorithms Based on Service-Level Agreement (SLA) in Cloud Computing 3.4 Resource Scheduling Algorithms Based on Cost in Cloud Computing 4 Directed Acyclic Graph 5 Conclusion References Optimized Multi-level Data Aggregation Scheme (OMDA) for Wireless Sensor Networks 1 Introduction 1.1 Requirements of Data Aggregation Over WSN 1.2 Constraints for Data Aggregation Over WSN 2 Existing Solutions for Data Aggregation Over WSN 3 Optimized Multi-level Data Aggregation Scheme (OMDA) for WSN 4 Simulation Scenario 5 Simulation Results and Performance Analysis 5.1 Throughput 5.2 End-To-End Delay 5.3 Energy Consumption 5.4 Number of Alive Sensors Using TD-DA and OMDA 6 Conclusion References Potentiality of Nanotechnology in Development of Biosensors 1 Introduction 2 Intertwining Nanotechnology in Biosensors 3 Different Components of Nanotechnology 3.1 Nanotubes 3.2 Nanoparticles 3.3 Nanocrystals 3.4 Nanowires 3.5 Nanorods 4 Conclusion References Microstrip Patch Antenna for Future 5G Applications 1 Introduction 2 Antenna Structure and Dimensions 3 Simulation Results 3.1 Plot of Return Loss 3.2 Plot of VSWR 3.3 Gain Plot 3.4 Radiation Pattern 4 Conclusion References Multilayer Perceptron and Genetic Algorithm-Based Intrusion Detection Framework for Cloud Environment 1 Introduction 1.1 Cloud Computing Environment 2 Literature Review 3 Methodologies Used 3.1 Multilayer Perceptron 4 The Proposed System 4.1 Workflow of the Proposed System 5 Experimentation and Results 5.1 Experimental Dataset 6 Conclusions and Future Work References Position Falsification Misbehavior Detection in VANETs 1 Introduction 2 Related Work 3 Methodology 3.1 Statistical Approach 3.2 Machine Learning Approach 4 Results 5 Conclusion References Artificial Intelligence Fuelling the Health Care 1 Introduction and Impact of AI 2 Scenario of AI with Health Care 3 AI is the Future of Health Care 4 Conclusion References A Systematic Review of Risk Factors and Risk Assessment Models for Breast Cancer 1 Introduction 1.1 Overview of Breast Cancer Risk 1.2 Significance of Risk Assessment 1.3 Risk Assessment Modeling 2 Risk Factors for Breast Cancer 2.1 Risk Factors 2.2 Lifestyle-Related Risk Factors 2.3 Other Risk Factors 3 Risk Factor Incorporation in Models for Risk Estimation 4 Comparative Analysis of Model Accuracy 5 Machine Learning in Breast Cancer Prediction 6 Conclusion References Reflection of Plane Harmonic Wave in Transversely Isotropic Magneto-thermoelastic with Two Temperature, Rotation and Multi-dual-Phase Lag Heat Transfer 1 Introduction 2 Basic Equations 3 Formulation and Solution of the Problem 4 Plane Wave Propagation 4.1 Phase Velocity 4.2 Attenuation Coefficient 4.3 Specific Loss 4.4 Penetration Depth 5 Reflection at the Boundary Surfaces 6 Boundary Conditions 7 Numerical Results and Discussion 7.1 Amplitude Ratios 7.2 Energy Ratios 7.3 Phase Velocity 7.4 Attenuation Coefficients 7.5 Specific Loss 7.6 Penetration Depth 8 Conclusions References Deformation in Generalized Transversely Isotropic Magneto-Thermoelastic Rotating Solid Due to Inclined Load and Thermal Laser Pulse 1 Introduction 2 Basic Equations 3 Formulation and Solution of the Problem 4 Boundary Conditions 5 Applications 6 Special Cases 6.1 Concentrated Force 6.2 Uniformly Distributed Force 6.3 Linearly Distributed Force 7 Inversion of the Transformation 8 Particular Cases 9 Numerical Results and Discussion 9.1 Concentrated Force Due to Inclined Load and with Laser Pulse 10 Conclusions References Impact of Integration of Wind Turbine on Dynamics of a Power System 1 Introduction 2 Problem Formulation 3 System Model 4 Wind Energy Source 5 ANFIS 6 Simulation Results 7 Conclusion References Hybrid Version of Apriori Using MapReduce 1 Introduction 2 Literature Review 3 The Proposed Model 4 Result 5 Conclusion and Future Work References A New Time Varying Adaptive Filtering System (TVAFS) for Ambulatory ECG Signals 1 Introduction 2 Adaptive Filtering System 3 Proposed TVAFS Algorithm 4 Experiments and Results 5 Conclusion References Ultrathin Compact Triple-Band Polarization-Insensitive Metamaterial Microwave Absorber 1 Introduction 2 Design and Simulation 2.1 Design 2.2 Simulation 2.3 Absorption Mechanism 3 Experimental Measurements 4 Conclusion References Optical Wireless Channel Characterization Based on OOK Modulation for Indoor Optical Wireless Communication System Using WT-ANN 1 Introduction 2 Indoor Optical Wireless Communication 3 Wavelet Transform 3.1 Discrete Wavelet Transform 3.2 Stationary Wavelet Transform 4 System Design 5 Simulations 6 Results and Discussions 6.1 SNR Versus BER 6.2 Efficiency 6.3 NOPR Versus Data Rate 7 Conclusion References Indoor Optical Wireless Communication System Using Wavelet Transform and Neural Network Based on Pulse Position Modulation Intended for Optical Wireless Channel Characterization 1 Introduction 2 Indoor Optical Wireless Communication 3 Discrete Wavelet Transform 4 Stationary Wavelet Transform 5 System Design 6 Simulations 7 Results and Discussions 7.1 SNR Versus BER 7.2 Efficiency 8 Conclusion References GDH Key Exchange Protocol for Group Security Among Hypercube Deployed IoT Devices 1 Introduction 2 Literature Survey 3 Proposed Work to Preserve Group Security Among Hypercube Deployed IoT Devices 4 Conclusion and Future Scope References Depression Detection in Cancer Communities Using Affect Analysis 1 Introduction 2 Related Work 3 Proposed Work 4 Result and Analysis 5 Conclusions and Future Work References Triple-Band Polarization-Insensitive Wide Angle Ultrathin Hexagonal Circumscribed Metamaterial Absorber 1 Introduction 2 Unit Cell Design 3 Simulation 4 Absorption Mechanism 5 Experimental Measurements 6 Conclusion References An Effective Fusion of a Color and Texture Descriptor for an Image Retrieval System: An Exploratory Analysis 1 Introduction 2 Related Work 3 Proposed Methodology 3.1 Color Feature Extraction 3.2 Texture Feature Extraction 3.3 Combination Techniques 4 Experimental Setup and Results 4.1 Experimental Setup 4.2 Results 5 Conclusion and Future Trends References Power Consumption Reduction in IoT Devices Through Field-Programmable Gate Array with Nanobridge Switch 1 Introduction 1.1 Field-Programmable Gate Arrays (FPGA) 2 Literature Survey 3 Nanobridge Technology 3.1 Performance Analysis of Nanobridge-FPGA 4 Conclusion References Li-Fi Technology—A Study on a Modernistic Way of Communication 1 Introduction 2 Li-Fi Design and Working 2.1 How Does Li-Fi Work? 3 Performance of Li-Fi 3.1 Advantages of Li-Fi Over Wi-Fi 4 Li-Fi Strengths and Weaknesses 5 Applications of Li-Fi References A 28 GHz Corporate Series-Fed Taper Antenna Array for Fifth-Generation Wireless Communication 1 Introduction 2 Antenna Design 3 Result and Discussion 3.1 Resonant Frequency 3.2 Gain 3.3 Radiation Pattern 4 Conclusion References Design and Analysis of Gain Enhancement THz Microstrip Curvature Patch PBG Antenna with Inset Feed 1 Introduction 2 Antenna Design 3 Result and Discussion 3.1 Resonant Frequency 3.2 Gain 3.3 Effect of Radius of Curvature on the Proposed Antenna 3.4 Effect of Photonic Band Gap Hole Size on the Proposed Antenna 3.5 Effect of Separation Distance Between the Photonic Crystals on the Proposed Antenna 3.6 Radiation Pattern 4 Conclusion References Performance Analysis of Classification Methods in the Diagnosis of Heart Disease 1 Introduction 2 Research Methodology 2.1 The Datasets 2.2 The Software Tool 2.3 The Performance Indicators 3 Results and Discussion 3.1 Cleveland Dataset 3.2 Hungarian Dataset 3.3 Switzerland Dataset 3.4 VA Long Beach Dataset 4 Conclusion References A Critical Evaluation of Mathematical Modeling Approaches in the Scientific Research 1 Introduction 2 Theoretical Approach 3 Qualitative Approach 4 Dimensional Analysis Approach 5 Specific Quantitative Approach 6 General Quantitative Approach (Statistical Approach) 7 Conclusion References Cloud Load Balancing Using Optimization Techniques 1 Introduction 1.1 Load Balancing in Cloud Computing 1.2 Load Balancing Optimization Algorithms 2 Comparison and Important Findings 3 Conclusion References QoS Sensible Coalition-Based Radio Resource Management Scheme for 4G Mobile Networks 1 Introduction 2 Literature Survey 3 Proposed Work 4 Result and Discussion 5 Conclusion References Reliable and Energy-Efficient Data Transfer Routing in Wireless Body Area Networks 1 Introduction 2 Wireless Sensor Node 3 Wireless Sensor Network 4 Literature Review 5 Problem Formulation 6 Methodology 7 Implementation and Results 8 Radio Model 9 Network Parameter 10 Discussion 11 Conclusion References A Model on IoT Security Method and Protocols for IoT Security Layers 1 Introduction 2 Security Challenges in IoT 2.1 Data Integrity 2.2 Encryption and Decryption Capabilities 2.3 Privacy Issues 2.4 Common Framework 2.5 Automation 2.6 Updations 3 Literature Review 4 Proposed Model of IoT Security 4.1 Implementation of Proposed Model 4.2 Flowchart of Proposed Model 5 Conclusion References Structural Health Monitoring System for Bridges Using Internet of Things 1 Introduction 2 Related Work 3 Problem Formulation 4 Problem Statement 5 Proposed Solution 6 Iot Platform for Shm 7 Challenges 8 Conclusion and Future Scope References Author Index