11469nam 2200565 450 991073370830332120231110223326.0981-19-2277-2(MiAaPQ)EBC7052879(Au-PeEL)EBL7052879(CKB)24286022200041(PPN)263900576(EXLCZ)992428602220004120230106d2022 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSmart and sustainable technologies: rural and tribal development using IoT and cloud computing proceedings of ICSST 2021 /Srikanta Patnaik, Roumen Kountchev, Vipul Jain, editorsSingapore :Springer,[2022]©20221 online resource (377 pages)Advances in sustainability science and technologyPrint version: Patnaik, Srikanta Smart and Sustainable Technologies: Rural and Tribal Development Using IoT and Cloud Computing Singapore : Springer,c2022 9789811922763 Includes bibliographical references and index.Intro -- Committee Members -- Preface -- Contents -- About the Editors -- IOT, Big Data and Cloud Computing -- Big Data: A Boon to Fight Against Cancer Using Map Reduce Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 MapReduce Architecture -- 4 Conclusion -- References -- Security Attacks and Its Countermeasures in RPL -- 1 Introduction -- 2 Related Work -- 3 About RPL -- 3.1 Control Messages in RPL -- 3.2 Traffic and Modes of Operation in RPL -- 4 Attacks in RPL -- 4.1 Attacks Against Resources -- 4.2 Attacks Against Topology -- 4.3 Attacks Against Traffic -- 5 Analysis -- 6 Conclusion and Future Scope -- References -- An Optimal Policy with Parabolic Demand Carry Forwarded with Three-Parameter Weibull Distribution Deterioration Rate, Scarcity and Salvage Value -- 1 Introduction -- 2 Model Formulation -- 2.1 Assumptions -- 2.2 Notations -- 2.3 Mathematical Formulation -- 3 Numerical Examples -- 3.1 Sensitivity Analysis -- 4 Conclusion -- References -- Information Actions Use for System Activity: Action Modeling Schemas -- 1 Introduction -- 2 The Need in Information Actions Use for System Activity -- 3 Action Modeling Schemas for the Theory of Information Actions Use for System Activity -- 4 Conclusion -- References -- High Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique -- 1 Introduction -- 2 Requirements of Hiding Information Digitally -- 3 Digital Image Forensic Techniques for Feature Extraction -- 4 Spatial Transform Techniques -- 5 Conclusion -- References -- Performance Evaluation of FSO Under Different Atmospheric Conditions -- 1 Introduction -- 2 Simulation Setup -- 2.1 Simulation Result and Analysis -- 3 Conclusion -- References -- Smart Communication -- Design and Performance Analysis of High Reliability QOS-Oriented Adaptive Routing Protocol for MANET.1 Introduction -- 2 MANET -- 2.1 MANETS Characteristics -- 2.2 Application Areas of MANETS -- 2.3 Link Stability -- 3 Literature Survey -- 4 QOS-Oriented Adaptive Routing Protocol for 'MANET' -- 4.1 Formulas -- 4.2 Algorithm -- 5 Results -- 6 Conclusion -- References -- Circular Patch Antenna with Perturbed Slots for Various Wireless Applications -- 1 Introduction -- 2 Parameters for the Proposed Design -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- A Secure Handshaking AODV Routing Protocol (SHS-AODV) with Reinforcement Authentication in MANET -- 1 Introduction -- 2 Ad Hoc on Demand Distance Vector -- 2.1 Path Discovery -- 2.2 Reverse-Path Setup -- 2.3 Forward-Path Setup -- 2.4 Route Table Management -- 2.5 Path Maintenance -- 2.6 Local Connectivity Management -- 3 Literature Survey -- 4 SHS-AODV Routing Protocol -- 4.1 Key Generation -- 4.2 Elliptic Curve Cryptographic Algorithm (Ecc) -- 4.3 Algorithm -- 5 Results -- 5.1 Simulation Environment -- 5.2 Performance Metrics -- 6 Conclusion -- References -- AI-Powered Smart Routers -- 1 Introduction -- 2 Related Work -- 2.1 Ununified Routing (Loosely Coupled Mono-Cum-Multi-agent Evolution Strategies) -- 2.2 Unified Routing (Close-Coupled Single-Cum-Multi-agent Evolution Strategies) -- 3 AI-Powered Network Routing -- 3.1 Regenerative Control Paradigm -- 3.2 Unified and Ununified AI-Powered Networking -- 4 Brainy (SMART/Intelligent) Network -- 4.1 Unified and Ununified AI-Powered Networking -- 5 Simulation -- 6 AI-Powered and Brainy Hardware Routers -- 6.1 Framework Design Formulation -- 6.2 Simulation Results -- 7 Conclusion -- References -- Modified Sierpinski Gasket Monopole Fractal Antenna for Sub 6 GHz 5G Applications -- 1 Introduction -- 2 Evaluation of Antenna Design -- 3 Performance Analysis of Proposed Antenna -- 4 Performance Analysis of Proposed Antenna -- 5 Conclusion.References -- Design of a Dual-Ring Resonator Antenna for WBAN Applications -- 1 Introduction -- 2 Implementation of Dual-Ring Resonator -- 3 Results -- 4 Conclusion -- References -- Performance Analysis of MIMO Antenna for Isolation Improvement -- 1 Introduction -- 2 Single Antenna Design Calculations -- 3 Design of MIMO Antenna -- 4 Analysis of the Space Diversity of MIMO Antenna -- 5 Analysis of Prototype Orthogonal MIMO -- 6 Conclusion -- References -- Low Power and High-Speed Full Adder with Complemented Logic and Complemented XOR Gate -- 1 Introduction -- 2 Review of Full Adders -- 2.1 Hybrid Full Adder [9] -- 3 Proposed Full Adder -- 3.1 Sum Output Generation Using XNOR Cell -- 3.2 Carry Output Using XNOR Cell -- 4 Delay Analysis -- 5 4-Bit Adder -- 6 Power Analysis -- 7 Conclusion -- References -- Determining the Number of Bit Encryption That Is Optimum for Image Steganography in 8 Bit Images -- 1 Introduction -- 2 Various Techniques of Image Steganography -- 2.1 LSB Method -- 2.2 Palette-Based Technique -- 2.3 Secure Cover Selection -- 3 Terms Used -- 4 Proposed Method -- 5 Result -- 6 Discussion -- 7 Conclusion -- References -- Design and Analysis of 2nd-Order Bandpass Filters Using SIW and Microstrip Patch Transitions with Stub Matching -- 1 Introduction -- 2 Design-1 -- 3 Design 2 -- 4 Results Analysis -- 5 Conclusions -- References -- Planar Split Ring Resonating Antenna Design -- 1 Introduction -- 2 Antenna Design -- 3 Simulation Results -- 4 Conclusion -- References -- Pentagonal Microstrip Patch Antenna with Circular Slot for 9 GHz Applications -- 1 Introduction -- 2 Design of Pentagonal Patch with Slot -- 3 Results of the Proposed Antenna -- 4 Conclusion -- References -- Simulation and Analysis of an Optical Communication System Implementing DCF with Various Pulse Generators -- 1 Introduction -- 2 Simulation and Design.3 Result and Discussion -- 4 Conclusion -- References -- Simulation and Analysis of an 8 Channel CWDM Optical Network Suitable for Smart City Applications -- 1 Introduction -- 1.1 Multiplexing -- 1.2 DWDM -- 1.3 CWDM -- 2 Simulation Setup -- 3 Result and Discussion -- 4 Conclusion -- References -- Design of Low-Power Dynamic Threshold MOSFET (DTMOS) Push-Pull Inverter -- 1 Introduction -- 2 Proposed Design and Analysis -- 3 Simulation Results -- 4 Conclusion -- References -- Epileptic Seizure Detection Using Deep Learning Architecture -- 1 Introduction -- 2 Literature Review -- 3 Method Initiation with Improved Techniques -- 3.1 Data Extraction -- 3.2 Data Classification -- 4 Proposed Model -- 5 Result and Discussion -- 6 Conclusion -- References -- Ultra High Rate Inter-Satellite Optical Wireless Transmission Using DP-QPSK -- 1 Introduction -- 2 Modulation Format and Inter-Satellite Link -- 3 Proposed Set up -- 4 Results and Discussion -- 5 Conclusion -- References -- Investigation on Reactive Power Compensation Using STATCOM -- 1 Introduction -- 2 Research Method -- 2.1 Block Description and Operational Strategy -- 2.2 Network Description and Simulation -- 3 Results and Discussion -- 4 Conclusion -- References -- Smart Energy Systems -- Optimization of Set-Point Deviation and Current Ripple of PMSM by CCS-MPC Method -- 1 Introduction -- 2 PMSM Model Description -- 3 Model Description of CCS-MPC Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Study, Design and Performance Analysis of Grid-Connected Solar PV System of Two Different Places Using PV syst Software -- 1 Introduction -- 2 Grid-Tied PV System -- 3 Methodology -- 3.1 PV Syst Software -- 3.2 Case Study -- 4 Input Requirement -- 4.1 Location -- 4.2 Tilt Angle -- 4.3 Albedo -- 4.4 Module and Inverter Specification -- 4.5 Economics Analysis.5 Simulation and Result -- 6 Conclusion -- References -- Transparent Solar Cell: A Powerful Device of Upcoming Era -- 1 Introduction -- 2 Discussion -- 2.1 Working Principle of Transparent Solar Cells -- 2.2 Different Types of Transparent Solar Cell -- 3 Applications -- 4 Conclusion -- References -- Machine Learning Techniques and Applications -- An Adaptive Firefly Optimization Algorithm for Human Gait Recognition -- 1 Introduction -- 2 Framework of the Proposed Approach -- 2.1 Gait Template Extraction -- 2.2 Introduction to Standard Firefly Algorithm (FA) -- 2.3 Adaptive Firefly Algorithm for Feature Selection -- 2.4 Pseudo-Code of an Adaptive Firefly Algorithm for Feature Selection -- 2.5 Combination of PCA and LDA -- 3 Experimental Analysis -- 3.1 Parameter Setting -- 3.2 Performance Evaluation Metrics of Classification -- 3.3 Results and Discussion -- 4 Conclusion -- References -- Job Prediction Astrology for Using Classification Techniques in Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Set (HOROSCOPE) -- 3.2 Feature Extraction -- 4 Data Processing Techniques -- 4.1 Logistic Regression -- 4.2 Naïve Bayes Classification -- 4.3 DTNB -- 5 Experiments and Analysis -- 6 Conclusion -- References -- Developed Face and Fingerprint-Based Multimodal Biometrics System to Enhance the Accuracy by SVM -- 1 Introduction -- 1.1 Face Recognition -- 1.2 Fingerprint Recognition -- 1.3 Fusion -- 2 Literature Review -- 3 Methodology -- 3.1 Face -- 3.2 Finger -- 3.3 Principal Component Analysis -- 3.4 SVM Classifier -- 4 Result and Experiments -- 5 Conclusion -- References -- A Survey on Deep Learning Techniques for Anomaly Detection in Human Activity Recognition -- 1 Introduction -- 2 Deep Learning -- 3 Methods and Implementation -- 4 Discussions -- 5 Conclusion -- References.Evaluation of Different Paradigms of Machine Learning Classification for Detection of Breast Carcinoma.Advances in Sustainability Science and Technology Artificial intelligenceArtificial intelligenceCongressesCloud computingArtificial intelligence.Artificial intelligenceCloud computing.006.3Patnaik SrikantaKountchev RoumenJain VipulMiAaPQMiAaPQMiAaPQBOOK9910733708303321Smart and sustainable technologies: rural and tribal development using IoT and cloud computing3397864UNINA