LEADER 00882nam2-22003131i-450- 001 990000264280403321 005 20001010 035 $a000026428 035 $aFED01000026428 035 $a(Aleph)000026428FED01 035 $a000026428 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $a15. : VII, [3], 331 p. ill. 23 cm. -clc.:024-031/15 210 $aNew York$cAcademic Press$d1971- 215 $av. 23 cm 461 0$1001000026037$12001$aAdvances in geophysics 610 0 $aFisica generale 702 1$aLandsberg,$bHelmut Erich 702 1$aMieghem,$bJ. Van 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000264280403321 952 $a09 024-031/15$b2888$fDINAE 959 $aDINAE 996 $a15. : VII, , 331 p. ill. 23 cm. -clc.:024-031$9118809 997 $aUNINA DB $aING01 LEADER 11043nam 2200517 450 001 9910637714503321 005 20230429235306.0 010 $a3-031-20936-2 035 $a(MiAaPQ)EBC7165973 035 $a(Au-PeEL)EBL7165973 035 $a(CKB)25913968100041 035 $a(PPN)267813104 035 $a(EXLCZ)9925913968100041 100 $a20230429d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aInternet of Things $e5th the Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20-23, 2022, Revised Selected Papers /$fAurora Gonza?lez-Vidal [and four others], editors 210 1$aCham, Switzerland :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (432 pages) 225 1 $aLecture Notes in Computer Science Series ;$vVolume 13533 311 08$aPrint version: González-Vidal, Aurora Internet of Things Cham : Springer International Publishing AG,c2023 9783031209352 320 $aIncludes bibliographical references and index. 327 $aIntro -- Preface -- Organization -- Contents -- IoT Enabling Technologies -- Overview of Drone Communication Requirements in 5G -- 1 Introduction -- 2 Applications of Drones -- 3 Essential Parameters for Drone Communication and Navigation -- 3.1 Government Rules and Regulations -- 3.2 Technical Parameters -- 3.3 3GPP Vision -- 4 Related Work -- 5 Role of 5G in Drone Applications -- 6 Conclusion -- References -- Accurate Indoor Positioning Based on Beacon Weighting Using RSSI -- 1 Introduction -- 2 Related Studies -- 3 Proposed Method -- 4 Implementation and Experimentation -- 5 Results and Evaluation -- 6 Discussions -- 7 Conclusion -- References -- Adaptive Data-Driven Routing for Edge-to-Cloud Continuum: A Content-Based Publish/Subscribe Approach -- 1 Introduction -- 2 Related Work -- 3 Adaptive Data-Driven Routing Architecture for the ECC -- 3.1 ECC Topology Setup -- 3.2 Data Routing Mechanism -- 4 Content-Based Publish/Subscribe for Adaptive Data-Driven Routing -- 5 Case Study: Federated Learning for Digital Twins -- 6 Evaluation Study -- 6.1 Performance Evaluation Scenarios -- 6.2 Evaluation Results -- 7 Conclusion and Future Work -- References -- Online Decentralized Frank-Wolfe: From Theoretical Bound to Applications in Smart-Building -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Conditional Gradient Based Algorithm -- 2.1 Preliminaries and Notations -- 2.2 An Algorithm with Exact Gradients -- 2.3 Algorithm with Stochastic Gradients -- 3 Experiments -- 3.1 Prediction Performance -- 3.2 Effect of Network Topology -- 3.3 Effect of Decentralization -- 4 Concluding Remarks -- References -- IntellIoT: Intelligent IoT Environments -- 1 Introduction -- 2 Next Generation IoT Use Cases -- 2.1 Autonomous Operation of Agriculture Vehicle Fleets -- 2.2 Collaborative Intelligence for Remote Patient Monitoring. 327 $a2.3 Autonomous Collaboration of Production Machines -- 3 A Next Generation IoT Framework: The IntellIoT Approach -- 3.1 Distributed, Self-aware, Semi-autonomous IoT Applications -- 3.2 Autonomy Defined by a Human-in-the-Loop -- 3.3 Efficient, Reliable and Trustworthy Computation and Communication Infrastructure -- 3.4 Bringing All Together - The IntellIoT High-Level Architecture -- 4 State of the Art and Research Challenges -- 4.1 Autonomy and Distributed Intelligence -- 4.2 Next Generation IoT Computation and Communication Infrastructure -- 4.3 Humans and Trust in Intelligent IoT -- 5 Conclusions and Future Work -- References -- An Interoperable Framework for Heterogeneous IoT infrastructure to Unlock Data Value -- 1 Introduction -- 2 Problem Statement -- 3 Proposed Framework Architecture -- 4 Data Model -- 4.1 Devices Information Model -- 4.2 Interface Model -- 4.3 OPC-UA Interfaces ObjectType for Sensor Device -- 5 Provisioning Server for Fixable Device Connectivity -- 6 Conclusion -- References -- Task Offloading in Computing Continuum Using Collaborative Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 Task Assignment Problem -- 3.1 System Model -- 3.2 Problem Definition -- 4 RL-Based Task Offloading Algorithm -- 5 Performance Evaluation -- 5.1 Methodology -- 5.2 Experiment Setup -- 5.3 Metrics -- 5.4 Compared Methods -- 5.5 Experimental Results and Analysis -- 6 Conclusion -- References -- Assessing Efficiency Benefits of Edge Intelligence -- 1 Introduction -- 2 Methods -- 2.1 Devices, Models, and Frameworks -- 2.2 Power and Energy Measurements -- 2.3 Recognition Gradient -- 3 Results -- 3.1 Energy and Accuracy -- 3.2 Energy-Precision Ratio -- 3.3 Recognition Efficiency -- 3.4 Cloud-Centric and Federated Learning -- 3.5 Life Cycle Aspects -- 4 Discussion, Summary, and Outlook -- 4.1 Discussion -- 4.2 Summary and Outlook. 327 $aReferences -- IoT Applications, Services and Real Implementations -- A Smart IoT Gateway Capable of Prescreening for Atrial Fibrillation -- 1 Introduction -- 1.1 Existing Techniques for AF Detection -- 2 Data Preparation -- 2.1 Data Source -- 2.2 Prepossessing -- 3 Deep Learning Models -- 3.1 Development -- 3.2 Deployment -- 3.3 Gateway -- 4 Results -- 5 Analysis -- 6 Conclusions -- References -- Internet of Things with Web Technologies Solution for Flood Notification in São Paulo -- 1 Introduction -- 2 Objective -- 3 System Architecture -- 3.1 API, Sensors, and Web Server -- 3.2 Notifications Web Application -- 3.3 Public Website -- 3.4 Administrative Web Interface -- 4 Results -- 5 Future Work -- References -- Wi-Monitor: Wi-Fi Channel State Information-Based Crowd Counting with Lightweight and Low-Cost IoT Devices -- 1 Introduction -- 2 Background and Related Work -- 2.1 CSI-Based Crowd Counting -- 2.2 Related Work -- 3 Problems -- 4 System Design -- 4.1 CSI Data Extraction -- 4.2 Noise Removal -- 4.3 DNN Model Building -- 5 Evaluation -- 5.1 Scenario 1: In a Corridor -- 5.2 Scenario 2: In a Meeting Room -- 5.3 Discussion -- 6 Conclusion -- References -- Design of a Next-Generation Interoperable Cognitive Port Solution -- 1 Introduction -- 2 Context, Motivation and Related Work -- 3 Design of the Proposed Solution -- 3.1 Data Access Component -- 3.2 Data Processing Services -- 3.3 Data Analytics Services and Cognitive Applications -- 4 Use Case Driven Validation -- 4.1 Provision of Data -- 4.2 Data Analytics -- 5 Future Work and Conclusions -- References -- Conceptual Framework of Contact-Less Consumer Products Industry During and Post-pandemic Era -- 1 Introduction -- 2 Conceptual Framework of Contact-Less Consumer Products Industry -- 2.1 Physical Layer -- 2.2 Digital Twins Layer -- 2.3 Industrial Technologies Layer. 327 $a2.4 Contact-Less Remote Applications Layer -- 3 Contact-Less Delivery Service for Consumer Products Industry During and Post-pandemic Era -- 4 Open Challenges and Discussion -- 5 Conclusion -- References -- Blockchain for Economy of Scale in Wind Industry: A Demo Case -- 1 Introduction -- 1.1 The Fastener Lifecycle: Events and Data-Points in the Blockchain -- 2 Business and Sustainability Implications of Blockchain Technology in Large Scale Wind Turbine Setups -- 3 Realization of Demonstrator in Controlled Environment -- 3.1 Overall High-Level Architecture -- 3.2 Demonstrator Realization and Code Snippet -- 4 Conclusions -- References -- Sleep Stage Detection on a Wearable Headband Using Deep Neural Networks -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Experimental Setup -- 4 Sleep Stage Detection Model -- 4.1 Data Preprocessing -- 4.2 Deep Learning Model -- 4.3 Model Results -- 5 Conclusion -- References -- A Comparative Study on Energy Consumption Models for Drones -- 1 Introduction -- 2 Background: Drone Power Models -- 2.1 D'Andrea Energy Model -- 2.2 Dorling et al. Energy Model -- 2.3 Stolaroff et al. Energy Model -- 2.4 Kirchstein Energy Model -- 2.5 Tseng Energy Model -- 3 Data-Driven Model and Proposed LSTM Architecture -- 3.1 Problem Statement -- 3.2 Experimental Dataset -- 3.3 System Architecture -- 4 Results and Discussion -- 4.1 Performance Evaluation -- 4.2 Sensitivity Analysis -- 5 Conclusion -- References -- ConQeng: A Middleware for Quality of Context Aware Selection, Measurement and Validation -- 1 Introduction -- 2 Motivating Scenario -- 3 Related Work -- 4 ConQeng's Design and Process -- 5 Implementation and Simulation Setup -- 6 Evaluation and Results -- 7 Conclusion and Future Work -- References -- Automating Heterogeneous IoT Device Networks from Multiple Brokers with Multiple Data Models -- 1 Introduction. 327 $a2 Requirements Analysis and Related Work -- 3 The Role of IoT Directory in Snap4City Architecture -- 3.1 Registration of IoT Devices on Internal Brokers -- 3.2 Discovering and Registering IoT Devices from External Brokers -- 4 Validation Experiments -- 5 Conclusions -- References -- A Persuasive System for Stress Detection and Management in an Educational Environment -- 1 Introduction -- 2 Persuasive System -- 2.1 Architecture -- 2.2 Methodology -- 3 Study Design -- 4 Results -- 5 Conclusions -- References -- Domain Generalization on Constrained Platforms: On the Compatibility with Pruning Techniques -- 1 Introduction -- 2 Background -- 2.1 Single Domain Generalization -- 2.2 Neural Network Pruning -- 3 Experiments on Digit Recognition Benchmark -- 3.1 Datasets and Setup -- 3.2 Unstructured Pruning at Initialization -- 3.3 Iterative Unstructured Pruning -- 3.4 Iterative Structured Pruning -- 4 Experiments on RealWorld HAR Dataset -- 4.1 Datasets and Setup -- 4.2 Impact of the Pruning Settings -- 5 Conclusion -- References -- IoT Security, Privacy and Data Protection -- A Low-Overhead Approach for Self-sovereign Identity in IoT -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 Self-sovereign Identity -- 3.2 Swarm -- 4 Proposal -- 4.1 Self-sovereign Identification and Communication of IoT Agents -- 4.2 The Swarm DID Method -- 4.3 Optimized DDo Serialization with CBOR-DI -- 4.4 Secure Communication with DIoTComm -- 4.5 Implementation -- 5 Evaluation -- 5.1 DID and DDo sizes -- 5.2 Secure Envelope Overhead -- 6 Conclusion -- References -- An Analysis of Process Parameters for the Optimization of Specific Emitter Identification Under Rayleigh Fading -- 1 Introduction -- 2 Background -- 2.1 Signal Collection, Detection & -- Pre-processing -- 3 Methodology -- 3.1 Filter Design -- 3.2 Multipath Channel Model. 327 $a3.3 Nelder-Mead Channel Estimation and Equalization. 410 0$aLecture notes in computer science ;$vVolume 13533. 606 $aInternet of things 606 $aInternet of things$vCongresses 615 0$aInternet of things. 615 0$aInternet of things 676 $a004.678 702 $aGonza?lez-Vidal$b Aurora 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910637714503321 996 $aInternet of things$9226025 997 $aUNINA LEADER 03185nam 2200397z- 450 001 9910410647703321 005 20210212 035 $a(CKB)4100000011354956 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/61616 035 $a(oapen)doab61616 035 $a(EXLCZ)994100000011354956 100 $a20202102d2020 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aUnited by Violence, Divided by Cause?$eA Comparison of Drivers of Radicalisation and Violence in Asia and Europe 210 $cNomos Verlagsgesellschaft mbH & Co. KG$d2020 215 $a1 online resource 311 08$a3-8487-6449-0 311 08$a3-7489-0573-4 330 $aZusammenfassung Politische Gewalt gibt es u?berall. Aber wie und wieso entsteht sie, und was kann sie verhindern? Dieses Buch befasst sich mit der Vielfalt politischer Gewalt in Westeuropa, Su?d- und Su?dostasien sowie der Vielfalt ihrer Begru?ndungen. Es bietet Einblicke in verschiedene ideologische, strukturelle, soziale und politische Hintergru?nde, Beziehungen und Ziele von nicht-staatlichen Gewaltakteuren in Asien und Europa. Dabei werden verschiedene disziplina?re und theoretische Ansa?tze sowie eine Vielzahl an Fallbeispielen vorgestellt. Ziel des Bandes ist es, Pha?nomene zu vergleichen und vereinfachten, eindimensionalen Erkla?rungen, warum nicht-staatliche Akteure Gewalt anwenden, komplexere Erkla?rungsansa?tze entgegenzusetzen. Abschließend bietet das Buch Empfehlungen fu?r politisches Handeln an. Mit Beitra?gen von Greg Barton, D. SubaChandran, Aurel Croissant, Rohan Gunaratna, Kevin McDonald, Subrata K. Mitra, Khuram Iqbal, Serina Rahman, La Toya Waha und Christian Echle Abstract Political violence is everywhere. But how does it emerge and what can be done about it? This book addresses the diversity of violence in South Asia, South East Asia and Western Europe. It examines the various forms of ideological backgrounds, structural conditions, relations and aims of non-state actors who are involved in violence in these regions and certain countries. Thereby, this book presents a similar diversity of theoretical and disciplinary approaches towards explaining the same phenomenon: violence. The rationale behind this collection of approaches and case studies is to identify communalities on the one hand, and to counter simple, unidimensional explanations of why non-state actors resort to violence on the other. Finally, it provides policy recommendations on how to counter violence. With contributions by Greg Barton, D. SubaChandran, Aurel Croissant, Rohan Gunaratna, Kevin McDonald, Subrata K. Mitra, Khuram Iqbal, Serina Rahman, La Toya Waha and Christian Echle 610 $aAngriff 610 $aGewalt 610 $aInterdisziplinarita?t 610 $aIslam 610 $apolitische Gewalt 610 $aRadikalisierung 610 $aTerrorismus 610 $aVergleich 700 $aWaha$b La Toya$4auth$01314779 906 $aBOOK 912 $a9910410647703321 996 $aUnited by Violence, Divided by Cause$93031957 997 $aUNINA