|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910733708303321 |
|
|
Titolo |
Smart and sustainable technologies: rural and tribal development using IoT and cloud computing : proceedings of ICSST 2021 / / Srikanta Patnaik, Roumen Kountchev, Vipul Jain, editors |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (377 pages) |
|
|
|
|
|
|
Collana |
|
Advances in sustainability science and technology |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Artificial intelligence |
Cloud computing |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Committee Members -- Preface -- Contents -- About the Editors -- IOT, Big Data and Cloud Computing -- Big Data: A Boon to Fight Against Cancer Using Map Reduce Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 MapReduce Architecture -- 4 Conclusion -- References -- Security Attacks and Its Countermeasures in RPL -- 1 Introduction -- 2 Related Work -- 3 About RPL -- 3.1 Control Messages in RPL -- 3.2 Traffic and Modes of Operation in RPL -- 4 Attacks in RPL -- 4.1 Attacks Against Resources -- 4.2 Attacks Against Topology -- 4.3 Attacks Against Traffic -- 5 Analysis -- 6 Conclusion and Future Scope -- References -- An Optimal Policy with Parabolic Demand Carry Forwarded with Three-Parameter Weibull Distribution Deterioration Rate, Scarcity and Salvage Value -- 1 Introduction -- 2 Model Formulation -- 2.1 Assumptions -- 2.2 Notations -- 2.3 Mathematical Formulation -- 3 Numerical Examples -- 3.1 Sensitivity Analysis -- 4 Conclusion -- References -- Information Actions Use for System Activity: Action Modeling Schemas -- 1 Introduction -- 2 The Need in Information Actions Use for System Activity -- 3 Action Modeling Schemas for the Theory of Information Actions Use for System Activity -- 4 Conclusion -- References -- High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique |
|
|
|
|