11105nam 22004573 450 99660156190331620240529080233.09783031609947(electronic bk.)9783031609930(MiAaPQ)EBC31354979(Au-PeEL)EBL31354979(CKB)32157518800041(EXLCZ)993215751880004120240529d2024 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInternet of Things, Smart Spaces, and Next Generation Networks and Systems 23rd International Conference, NEW2AN 2023, and 16th Conference, RuSMART 2023, Dubai, United Arab Emirates, December 21-22, 2023, Proceedings, Part I1st ed.Cham :Springer,2024.©2024.1 online resource (418 pages)Lecture Notes in Computer Science Series ;v.14542Print version: Koucheryavy, Yevgeni Internet of Things, Smart Spaces, and Next Generation Networks and Systems Cham : Springer,c2024 9783031609930 Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Doppler Radar Performance for UAV Speed Detection in mmWave/sub-THz Systems with Directional Antennas -- 1 Introduction -- 2 Related Work -- 3 System Model -- 4 Speed Detection Probability -- 5 Numerical Results -- 6 Conclusions -- References -- Link-Level Model for SINR and HPBW Evaluation in 5G mmWave UDN with Location-Aware Beamforming -- 1 Introduction -- 2 Link-Level Model for a Set of Directional Links with LAB -- 2.1 Location-Aware Beamforming Model Operation Scenario -- 2.2 Location-Aware Beamforming Model Functional Diagram -- 2.3 Modules for Generation and Processing Directional Links with LAB -- 3 Simulation Model for a Set of Directional Links with LAB -- 4 Simulation Results for a Set of Directional Links with LAB -- 5 Conclusion -- References -- Detecting PII Leakage Using DPI and Machine Learning in an Enterprise Environment -- 1 Introduction -- 2 Literature Review -- 2.1 Naive Bayes -- 2.2 SVM -- 2.3 Neural Networks -- 2.4 Decision Trees -- 2.5 Random Forest -- 3 Proposed System -- 3.1 Network Topology -- 3.2 Machine Learning Module -- 4 Results and Analysis -- 4.1 ML Algorithm Results -- 4.2 System Application -- 4.3 System Performance -- 4.4 Discussion -- 5 Conclusion -- References -- Deep Learning for Preventing Botnet Attacks on IoT -- 1 Introduction -- 2 Literature Review -- 3 Proposed Solution -- 3.1 Dataset and Preprocessing -- 3.2 Prototype -- 4 Results and Analysis -- 4.1 Results -- 4.2 Analysis -- 5 Conclusion and Future Recommendation -- References -- Design of Multi-polarisation MIMO Antenna for Heterogeneous Smartphone Applications -- 1 Introduction -- 2 Related Work -- 3 Methodology and Materials -- 3.1 Characteristics of Proposed Single Antenna Elements -- 3.2 Characteristics of Proposed MIMO Antenna -- 4 Conclusions -- References.Potential Possibilities of Voice Pattern Recognition by a Distributed Fiber Optic Sensor -- 1 Introduction -- 2 User Identification -- 3 The Methodology for Determining Mel-Frequency Cepstral Coefficients -- 4 Signal Restoration -- 5 Identification -- 5.1 Voice Sample Comparison -- 6 Conclusion -- References -- Enhancing Wireless Connectivity Through Bayesian-Optimized UAV-BS Positioning and Charging -- 1 Introduction -- 2 System Model -- 2.1 Path Loss Models -- 2.2 Signal-to-Noise Ratio (SNR) -- 2.3 Achievable Data Rate -- 3 Problem Formulation -- 3.1 Objective Function -- 3.2 Constraints -- 3.3 Energy Management -- 4 Bayesian Optimization for UAV Positioning in Urban Landscapes -- 5 Recharging Strategy -- 5.1 Customized Balconies as Recharging Points -- 5.2 Transformer Lines for High-Capacity Charging -- 5.3 Telecommunication Base Station Integration -- 6 Simulation Results and Discussions -- 7 Conclusions and Future Work -- References -- Comparison of Centralized and Federated Machine Learning Techniques for Beamtracking in 5G/6G Systems -- 1 Introduction -- 2 System Model -- 3 Data Collection -- 4 Federated Learning Approach for Beamtracking -- 5 Simulation Results -- 6 Conclusion -- References -- Exploring the Efficiencies and Vulnerabilities of Smart Door Control Systems: A Systematic Review -- 1 Introduction -- 2 Methodology -- 2.1 Inclusion and Exclusion Criteria -- 2.2 Search Strategy -- 3 Results -- 4 Discussion -- 4.1 Themes: Category of Vulnerabilities -- 4.2 Suggestions for Improvement -- 5 Conclusion -- 6 Limitation -- References -- System-Level Model for SINR and HPBW Evaluation in 5G mmWave UDN with Location-Aware Beamforming -- 1 Introduction -- 2 System-Level Model for a Set of Directional Links with LAB -- 2.1 Directional Radio Links with LAB Generation Module -- 2.2 Directional Radio Link Budget Evaluation Module.2.3 SINR Over a Set of SOI/SNOI Directional Radio Links Evaluation Module -- 2.4 Procedures of the Location-Aware Beamforming System-Level Model -- 2.5 Scenario of the Location-Aware Beamforming System-Level Model -- 3 Simulation Model for a Set of Directional Links with LAB -- 3.1 UDN Simulation Model Terrestrial Scenario Initialization -- 3.2 UE Terrestrial Distribution in UDN Simulation Model -- 3.3 Beam Orientation Control Module, Based on UE Location Estimates -- 3.4 Beamwidth Control Module, Based on UE Location Estimates -- 3.5 Directional Radio Link Budget Evaluation Module -- 3.6 SINR for a Set of SOI/SNOI Directional Radio Links Evaluation Module -- 4 Simulation Results for a Set of Directional Links with LAB -- 4.1 SINR Evaluation Depending on UE Positioning Accuracy -- 4.2 SINR Evaluation Depending on Cell Size -- 4.3 SINR Evaluation Depending on UE Number -- 5 Conclusion -- References -- Reinforcement Learning Based Power Allocation for 6G Heterogenous Networks -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Problem Formulation -- 3.2 Proposed RL-Based Power Allocation -- 4 Simulation and Results -- 5 Conclusion -- References -- The Impact of Capacity Averaging in Packet-Level Modeling of 5G NR with Blockage and Micromobility -- 1 Introduction -- 2 System Model -- 2.1 Deployment -- 2.2 5G NR Radio Interface -- 2.3 Propagation Model -- 2.4 Blockages -- 2.5 Micromobility -- 3 Packet Service Model -- 3.1 Service Rate Model -- 3.2 Packet Transmission Model -- 3.3 Metrics of Interest -- 4 Numerical Results -- 4.1 Capacity Dynamics -- 4.2 Comparison Results -- 5 Conclusion -- References -- Interference Mitigation for Reconfigurable Intelligent Surface (RIS)-Aided Non-terrestrial Base Station (NTBS) in NOMA Downlink HetNets -- 1 Introduction -- 2 Research Contribution -- 3 Related Work -- 4 System Model -- 4.1 Channel Model.4.2 NOMA Transmission -- 4.3 Problem Formulation -- 5 Optimization Algorithm -- 6 Numerical Results and Discussion -- 6.1 Assumptions of the Simulation -- 6.2 Results and Discussion -- 7 Conclusion -- References -- Modeling a Digital Avatar of a Car Drivers Based on the Quantification of the Information Environment -- 1 Introduction -- 2 Research Methodology -- 3 Research Results -- 4 Discussion -- 5 Conclusion -- References -- A New Blockage Detection Approach for 6G THz Systems -- 1 Introduction -- 2 Related Work -- 3 Setup and Experiments -- 3.1 Measurement Equipment and Experiments -- 3.2 Collected Data -- 4 Blockage Detection Techniques -- 4.1 Proactive Approaches -- 4.2 Reactive Approaches -- 5 Numerical Results -- 6 Conclusions -- References -- Real-Time Anomaly Detection in Network Traffic Using Graph Neural Networks and Random Forest -- 1 Introduction -- 1.1 Graph Neural Networks (GNNs) -- 1.2 Graph Convolutional Neural Networks (GCNs) -- 1.3 Random Forests -- 2 Methodology -- 2.1 Graph Neural Networks GNN -- 2.2 Random Forest -- 2.3 Data Collection and Processing -- 3 Discussion -- 3.1 Evaluation -- 3.2 Comparative Analysis of Results -- 4 Future Work -- 5 Conclusion -- References -- Addressing Security and Privacy Issues in a Smart Environment by Using Blockchain as a Preemptive Technique -- 1 Introduction -- 2 IOT Architecture and Services -- 3 Security Breaches and Related Work -- 4 Security -- 5 Simulation Results -- 6 Conclusion and Future Work -- References -- The Role of Cryptocurrencies in the Development of Countries and the Fight Against Financial Problems -- 1 Introduction -- 2 Research Methodology -- 3 Results -- 4 Recommendations -- 5 Conclusions -- References -- Designing the UzBCS Lending Platform Network Based on Blockchain Technology and Ensure Transaction Security -- 1 Introduction -- 2 Literature Review -- 3 Methodology.4 Designing a P2P UzBCS Lending Platform Based on Blockchain Technology -- 5 Result -- 6 Conclusion -- References -- Decentralized Blockchain Networks and Economic Security: Balancing Scalability and Security Tradeoffs -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion and Future Directions -- References -- Study of Machine Learning Models for IoT Based Efficient Classroom Usage -- 1 Introduction -- 2 Related Works -- 3 Problem Setup -- 3.1 Research Methodology -- 4 Data Preparation and Pre-processing -- 5 Results -- 6 Conclusion -- References -- Transforming Higher Education: A Comprehensive Analysis of Blockchain Technologies and Digitalization -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Discussion -- 5 Analysis and Results -- 6 Conclusion -- References -- Mediating Role of ESG Practices in Determining M&amp -- A Premiums in Info-Communications -- 1 Introduction -- 2 M&amp -- A in Global Info-communication Industry: The Outlook -- 3 ESG Performance and M&amp -- A Premiums. Literature Review -- 3.1 ESG in ICT Sector: Impact on Value and Financial Performance -- 3.2 M&amp -- A Rationale and the Acquisition Premiums -- 4 The Data and the Methodology -- 5 Results -- 6 Conclusion -- References -- CIDM-BSC: Cross-platform Infectious Disease Modeling Framework Using Blockchain and Smart Contracts*-8pt -- 1 Introduction -- 2 Related Work -- 3 Approach -- 3.1 Traditional SIR Model -- 3.2 CIDM-BSC Model -- 4 Evaluation Scenarios -- 4.1 Transaction Fee -- 4.2 Gas Limit -- 4.3 Gas Used by Transaction -- 5 Discussion -- 6 Conclusion and Future Work -- References -- Comparative Analysis of Botnet and Ransomware for Early Detection -- 1 Introduction -- 2 Botnets and A Case Study in Mirai -- 2.1 Evolution of Botnets -- 2.2 Mirai: A Case Study -- 3 Ransomware and A Case Study in Wannacry.3.1 Evolution of Ransomware.Lecture Notes in Computer Science SeriesKoucheryavy Yevgeni1740241Aziz Ahmed1740242MiAaPQMiAaPQMiAaPQ996601561903316Internet of Things, Smart Spaces, and Next Generation Networks and Systems4165671UNISA