LEADER 11102nam 2200553 450 001 9910554858203321 005 20221104000538.0 010 $a1-119-88439-X 010 $a1-119-88437-3 035 $a(MiAaPQ)EBC6931163 035 $a(Au-PeEL)EBL6931163 035 $a(CKB)21410032300041 035 $a(EXLCZ)9921410032300041 100 $a20221104d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 04$aThe new advanced society $eartificial intelligence and industrial Internet of Things paradigm /$fedited by Ke Zhang, Yang Hong, and Amir AghaKouchak 210 1$aHoboken, New Jersey :$cJohn Wiley & Sons, Incorporated,$d[2022] 210 4$d©2022 215 $a1 online resource (512 pages) 225 1 $aWiley-Scrivener Ser. 311 08$aPrint version: Panda, Sandeep Kumar The New Advanced Society Newark : John Wiley & Sons, Incorporated,c2022 9781119824473 320 $aIncludes bibliographical references and index. 327 $aCover -- Half-Title Page -- Series Page -- Title Page -- Copyright Page -- Dedication -- Contents -- Preface -- Acknowledgments -- 1 Post Pandemic: The New Advanced Society -- 1.1 Introduction -- 1.1.1 Themes -- 1.1.1.1 Theme: Areas of Management -- 1.1.1.2 Theme: Financial Institutions Cyber Crime -- 1.1.1.3 Theme: Economic Notion -- 1.1.1.4 Theme: Human Depression -- 1.1.1.5 Theme: Migrant Labor -- 1.1.1.6 Theme: Digital Transformation (DT) of Educational Institutions -- 1.1.1.7 School and College Closures -- 1.2 Conclusions -- References -- 2 Distributed Ledger Technology in the Construction Industry Using Corda -- 2.1 Introduction -- 2.2 Prerequisites -- 2.2.1 DLT vs Blockchain -- 2.3 Key Points of Corda -- 2.3.1 Some Salient Features of Corda -- 2.3.2 States -- 2.3.3 Contract -- 2.3.3.1 Create and Assign Task (CAT) Contract -- 2.3.3.2 Request for Cash (RT) Contract -- 2.3.3.3 Transfer of Cash (TT) Contract -- 2.3.3.4 Updation of the Task (UOT) Contract -- 2.3.4 Flows -- 2.3.4.1 Flow Associated With CAT Contract -- 2.3.4.2 Flow Associated With RT Contract -- 2.3.4.3 Flow Associated With TT Contract -- 2.3.4.4 Flow Associated With UOT Contract -- 2.4 Implementation -- 2.4.1 System Overview -- 2.4.2 Working Flowchart -- 2.4.3 Experimental Demonstration -- 2.5 Future Work -- 2.6 Conclusion -- References -- 3 Identity and Access Management for Internet of Things Cloud -- 3.1 Introduction -- 3.2 Internet of Things (IoT) Security -- 3.2.1 IoT Security Overview -- 3.2.2 IoT Security Requirements -- 3.2.3 Securing the IoT Infrastructure -- 3.3 IoT Cloud -- 3.3.1 Cloudification of IoT -- 3.3.2 Commercial IoT Clouds -- 3.3.3 IAM of IoT Clouds -- 3.4 IoT Cloud Related Developments -- 3.5 Proposed Method for IoT Cloud IAM -- 3.5.1 Distributed Ledger Approach for IoT Security -- 3.5.2 Blockchain for IoT Security Solution. 327 $a3.5.3 Proposed Distributed Ledger-Based IoT Cloud IAM -- 3.6 Conclusion -- References -- 4 Automated TSR Using DNN Approach for Intelligent Vehicles -- 4.1 Introduction -- 4.2 Literature Survey -- 4.3 Neural Network (NN) -- 4.4 Methodology -- 4.4.1 System Architecture -- 4.4.2 Database -- 4.5 Experiments and Results -- 4.5.1 FFNN -- 4.5.2 RNN -- 4.5.3 CNN -- 4.5.4 CNN -- 4.6 Discussion -- 4.7 Conclusion -- References -- 5 Honeypot: A Trap for Attackers -- 5.1 Introduction -- 5.1.1 Research Honeypots -- 5.1.2 Production Honeypots -- 5.2 Method -- 5.2.1 Low-Interaction Honeypots -- 5.2.2 Medium-Interaction Honeypots -- 5.2.3 High-Interaction Honeypots -- 5.3 Cryptanalysis -- 5.3.1 System Architecture -- 5.3.2 Possible Attacks on Honeypot -- 5.3.3 Advantages of Honeypots -- 5.3.4 Disadvantages of Honeypots -- 5.4 Conclusions -- References -- 6 Examining Security Aspects in Industrial-Based Internet of Things -- 6.1 Introduction -- 6.2 Process Frame of IoT Before Security -- 6.2.1 Cyber Attack -- 6.2.2 Security Assessment in IoT -- 6.2.2.1 Security in Perception and Network Frame -- 6.3 Attacks and Security Assessments in IIoT -- 6.3.1 IoT Security Techniques Analysis Based on its Merits -- 6.4 Conclusion -- References -- 7 A Cooperative Navigation for Multi-Robots in Unknown Environments Using Hybrid Jaya-DE Algorithm -- 7.1 Introduction -- 7.2 Related Works -- 7.3 Problem Formulation -- 7.4 Multi-Robot Navigation Employing Hybrid Jaya-DE Algorithm -- 7.4.1 Basic Jaya Algorithm -- 7.5 Hybrid Jaya-DE -- 7.5.1 Mutation -- 7.5.2 Crossover -- 7.5.3 Selection -- 7.6 Simulation Analysis and Performance Evaluation of Jaya-DE Algorithm -- 7.7 Total Navigation Path Deviation (TNPD) -- 7.8 Average Unexplored Goal Distance (AUGD) -- 7.9 Conclusion -- References -- 8 Categorization Model for Parkinson's Disease Occurrence and Severity Prediction -- 8.1 Introduction. 327 $a8.2 Applications -- 8.2.1 Machine Learning in PD Diagnosis -- 8.2.2 Challenges of PD Detection -- 8.2.3 Structuring of UPDRS Score -- 8.3 Methodology -- 8.3.1 Overview of Data Driven Intelligence -- 8.3.2 Comparison Between Deep Learning and Traditional Machine -- 8.3.3 Deep Learning for PD Diagnosis -- 8.3.4 Convolution Neural Network for PD Diagnosis -- 8.4 Proposed Models -- 8.4.1 Classification of Patient and Healthy Controls -- 8.4.2 Severity Score Classification -- 8.5 Results and Discussion -- 8.5.1 Performance Measures -- 8.5.2 Graphical Results -- 8.6 Conclusion -- References -- 9 AI-Based Smart Agriculture Monitoring Using Ground-Based and Remotely Sensed Images -- 9.1 Introduction -- 9.2 Automatic Land-Cover Classification Techniques Using Remotely Sensed Images -- 9.3 Deep Learning-Based Agriculture Monitoring -- 9.4 Adaptive Approaches for Multi-Modal Classification -- 9.4.1 Unsupervised DA -- 9.4.2 Semi-Supervised DA -- 9.4.3 Active Learning-Based DA -- 9.5 System Model -- 9.6 IEEE 802.15.4 -- 9.6.1 802.15.4 MAC -- 9.6.2 DSME MAC -- 9.6.3 TSCH MAC -- 9.7 Analysis of IEEE 802.15.4 for Smart Agriculture -- 9.7.1 Effect of Device Specification -- 9.7.1.1 Low-Power -- 9.7.2 Effect of MAC Protocols -- 9.8 Experimental Results -- 9.9 Conclusion & -- Future Directions -- References -- 10 Car Buying Criteria Evaluation Using Machine Learning Approach -- 10.1 Introduction -- 10.2 Literature Survey -- 10.3 Proposed Method -- 10.4 Dataset -- 10.5 Exploratory Data Analysis -- 10.6 Splitting of Data Into Training Data and Test Data -- 10.7 Pre-Processing -- 10.8 Training of Our Models -- 10.8.1 Gaussian Naïve Bayes -- 10.8.2 Decision Tree Classifier -- 10.8.3 Tuning the Model -- 10.8.4 Karnough Nearest Neighbor Classifier -- 10.8.5 Tuning the Model -- 10.8.6 Neural Network -- 10.8.7 Tuning the Model -- 10.9 Result Analysis. 327 $a10.9.1 Confusion Matrix -- 10.9.2 Gaussian Naïve Bayes -- 10.9.3 Decision Tree Classifier -- 10.9.4 Karnough Nearest Neighbor Classifier -- 10.9.5 Neural Network -- 10.9.6 Accuracy Scores -- 10.10 Conclusion and Future Work -- References -- 11 Big Data, Artificial Intelligence and Machine Learning: A Paradigm Shift in Election Campaigns -- 11.1 Introduction -- 11.2 Big Data Reveals the Voters' Preference -- 11.2.1 Use of Software Applications in Election Campaigns -- 11.2.1.1 Team Joe App -- 11.2.1.2 Trump 2020 -- 11.2.1.3 Modi App -- 11.3 Deep Fakes and Election Campaigns -- 11.3.1 Deep Fake in Delhi Elections -- 11.4 Social Media Bots -- 11.5 Future of Artificial Intelligence and Machine Learning in Election Campaigns -- References -- 12 Impact of Optimized Segment Routing in Software Defined Networks -- 12.1 Introduction -- 12.2 Software-Defined Network -- 12.3 SDN Architecture -- 12.4 Segment Routing -- 12.5 Segment Routing in SDN -- 12.6 Traffic Engineering in SDN -- 12.7 Segment Routing Protocol -- 12.8 Simulation and Result -- 12.9 Conclusion and Future Work -- References -- 13 An Investigation into COVID-19 Pandemic in India -- 13.1 Introduction -- 13.1.1 Symptoms of COVID-19 -- 13.1.2 Precautionary Measures -- 13.1.3 Ways of Spreading the Coronavirus -- 13.2 Literature Survey -- 13.3 Technologies Used to Fight COVID-19 -- 13.3.1 Robots -- 13.3.2 Drone Technology -- 13.3.3 Crowd Surveillance -- 13.3.4 Spraying the Disinfectant -- 13.3.5 Sanitizing the Contaminated Areas -- 13.3.6 Monitoring Temperature Using Thermal Camera -- 13.3.7 Delivering Essential Things -- 13.3.8 Public Announcement in the Infected Areas -- 13.4 Impact of COVID-19 on Business -- 13.4.1 Impact on Financial Markets -- 13.4.2 Impact on Supply Side -- 13.4.3 Impact on Demand Side -- 13.4.4 Impact on International Trade -- 13.5 Impact of COVID-19 on Indian Economy. 327 $a13.6 Data and Result Analysis -- 13.7 Conclusion and Future Scope -- References -- 14 Skin Cancer Classification: Analysis of Different CNN Models via Classification Accuracy -- 14.1 Introduction -- 14.2 Literature Survey -- 14.3 Methodology -- 14.3.1 Dataset Preparation -- 14.3.2 Dataset Loading and Data Pre-Processing -- 14.3.3 Creating Models -- 14.4 Models Used -- 14.5 Simulation Results -- 14.5.1 Changing Size of MaxPool2D(n,n) -- 14.5.2 Changing Size of AveragePool2D(n,n) -- 14.5.3 Changing Number of con2d(32n-64n) Layers -- 14.5.4 Changing Number of con2d-32*n Layers -- 14.5.5 ROC Curves and MSE Curves -- 14.6 Conclusion -- References -- 15 Route Mapping of Multiple Humanoid Robots Using Firefly-Based Artificial Potential Field Algorithm in a Cluttered Terrain -- 15.1 Introduction -- 15.2 Design of Proposed Algorithm -- 15.2.1 Mechanism of Artificial Potential Field -- 15.2.1.1 Potential Field Generated by Attractive Force of Goal -- 15.2.1.2 Potential Field Generated by Repulsive Force of Obstacle -- 15.2.2 Mechanism of Firefly Algorithm -- 15.2.2.1 Architecture of Optimization Problem Based on Firefly Algorithm -- 15.2.3 Dining Philosopher Controller -- 15.3 Hybridization Process of Proposed Algorithm -- 15.4 Execution of Proposed Algorithm in Multiple Humanoid Robots -- 15.5 Comparison -- 15.6 Conclusion -- References -- 16 Innovative Practices in Education Systems Using Artificial Intelligence for Advanced Society -- 16.1 Introduction -- 16.2 Literature Survey -- 16.2.1 AI in Auto-Grading -- 16.2.2 AI in Smart Content -- 16.2.3 AI in Auto Analysis on Student's Grade -- 16.2.4 AI Extends Free Intelligent Tutoring -- 16.2.5 AI in Predicting Student Admission and Drop-Out Rate -- 16.3 Proposed System -- 16.3.1 Data Collection Module -- 16.3.2 Data Pre-Processing Module -- 16.3.3 Clustering Module -- 16.3.4 Partner Selection Module. 327 $a16.4 Results. 410 0$aWiley-Scrivener Ser. 606 $aArtificial intelligence$xIndustrial applications$vCongresses 606 $aInternet of things 608 $aElectronic books. 615 0$aArtificial intelligence$xIndustrial applications 615 0$aInternet of things. 676 $a620.0028563 702 $aHong$b Yang$f1973- 702 $aZhang$b Ke$c(Professor), 702 $aAghaKouchak$b Amir 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910554858203321 996 $aThe New Advanced Society$92839639 997 $aUNINA LEADER 06903nam 22008415 450 001 9910484098203321 005 20250416121804.0 010 $a1-280-94927-9 010 $a9786610949274 010 $a3-540-72697-7 024 7 $a10.1007/978-3-540-72697-5 035 $a(CKB)1000000000478501 035 $a(EBL)3061549 035 $a(SSID)ssj0000272572 035 $a(PQKBManifestationID)11204293 035 $a(PQKBTitleCode)TC0000272572 035 $a(PQKBWorkID)10308827 035 $a(PQKB)10741573 035 $a(DE-He213)978-3-540-72697-5 035 $a(MiAaPQ)EBC3061549 035 $a(MiAaPQ)EBC6386431 035 $a(PPN)123162580 035 $a(EXLCZ)991000000000478501 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aWired/Wireless Internet Communications $e5th International Conference, WWIC 2007, Coimbra, Portugal, May 23-25, 2007, Proceedings /$fedited by Fernando Boavida, Edmundo Monteiro, Saverio Mascolo, Yevgeni Koucheryavy 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (393 p.) 225 1 $aComputer Communication Networks and Telecommunications,$x2945-9184 ;$v4517 300 $aDescription based upon print version of record. 311 08$a3-540-72694-2 320 $aIncludes bibliographical references and index. 327 $aTransport Layer Issues -- TCP Contention Control: A Cross Layer Approach to Improve TCP Performance in Multihop Ad Hoc Networks -- Providing Relative Service Differentiation to TCP Flows over Split-TCP Geostationary Bandwidth on Demand Satellite Networks -- An Analytical Comparison of the Slow-but-Steady and Impatient Variants of TCP New Reno -- SCTP Performance Issue on Path Delay Differential -- Handover and QoS -- Handover for Seamless Stream Media in Mobile IPv6 Network -- A Secure Handover Protocol Design in Wireless Networks with Formal Verification -- Seamless Handover for Multi-user Sessions with QoS and Connectivity Support -- QoS and Authentication Experiences in a Residential Environment Within a Broadband Access Framework -- QoS and Traffic Engineering -- Security and Service Quality Analysis for Cluster-Based Wireless Sensor Networks -- Admission Control for Inter-domain Real-Time Traffic Originating from Differentiated Services Stub Domains -- Fault Tolerant Scalable Support for Network Portability and Traffic Engineering -- Class-Based OSPF Traffic Engineering Inspired on Evolutionary Computation -- Audio/Video over IP -- An Experimental Investigation of the Congestion Control Used by Skype VoIP -- A Quality Adaptation Scheme for Internet Video Streams -- Performance Analysis of VoIP over HSDPA in a Multi-cell Environment -- Feasibility of Supporting Real-Time Traffic in DiffServ Architecture -- IEEE 802.11 WLANs -- Multi-rate Relaying for Performance Improvement in IEEE 802.11 WLANs -- Performance Analysis of IEEE 802.11b Under Multiple IEEE 802.15.4 Interferences -- Characterization of Service Times Burstiness of IEEE 802.11 DCF -- ID-Based Multiple Space Key Pre-distribution Scheme for Wireless Sensor Networks -- Sensor Networks and Location-Aware Systems -- Distributed Event Localization and Tracking with Wireless Sensors -- Cross-Layer Distributed Diversity for Heterogeneous Wireless Networks -- Location-Aware Signaling Protocol for WWAN and WLAN Interworking -- Performance Evaluation of Non-persistent CSMA as Anti-collision Protocol for Active RFID Tags -- Protocols for Ad Hoc and Mesh Networks -- Multicast Overlay Spanning Tree Protocol for Ad Hoc Networks -- Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks -- Reliable Geographical Multicast Routing in Vehicular Ad-Hoc Networks -- A Flexible Tree-Based Routing Protocol with a Mesh Relaying Node in Multi-hop Wireless Mesh Networks -- Efficient Spectrum Use -- An Interference-Robust Transmission Method for OFDMA Uplink -- An Efficient Heterogeneous Wireless Access Based on Region and Time Partitioning in D-TDD OFDM Systems -- Cognitive Radio Based Bandwidth Sharing Among Heterogeneous OFDM Access Systems -- CDMA Power Control Using Channel Prediction in Mobile Fading Channels. 330 $aWWIC 2007 was organized by the University of Coimbra, Portugal, and it was the fifth event of a series of International Conferences on Wired/Wireless Internet Communications, addressing research topics such as the design and evaluation of protocols, the dynamics of the integration, the performance trade-offs, the need for new performance metrics, and cross-layer interactions. Previous events were held in Berne (Switzerland) in 2006, Xanthi (Greece) in 2005, Frankfurt (Germany) in 2004, and Las Vegas (USA) in 2002. As in 2005 and 2006, WWIC was selected as the official conference by COST Action 290 (Wi-QoST?Traffic and QoS Management in Wireless Multimedia Networks). WWIC 2007 brought together active and proficient members of the networking community, from both academia and industry, thus contributing to scientific, strategic, and practical advances in the broad and fast-evolving field of wired/wireless Internet communications. The WWIC 2007 call for papers attracted 257 submissions from 36 different countries in Asia, Australia, Europe, North America, and South America. These were subject to thorough review work by the Program Committee members and additional reviewers. The selection process was finalized in a Technical Program Committee meeting held in Malaga, Spain, on February 15, 2007. 410 0$aComputer Communication Networks and Telecommunications,$x2945-9184 ;$v4517 606 $aComputer science 606 $aComputer networks 606 $aApplication software 606 $aSoftware engineering 606 $aData protection 606 $aMicrocomputers 606 $aComputer Science 606 $aComputer Communication Networks 606 $aComputer and Information Systems Applications 606 $aSoftware Engineering 606 $aData and Information Security 606 $aPersonal Computing 615 0$aComputer science. 615 0$aComputer networks. 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aData protection. 615 0$aMicrocomputers. 615 14$aComputer Science. 615 24$aComputer Communication Networks. 615 24$aComputer and Information Systems Applications. 615 24$aSoftware Engineering. 615 24$aData and Information Security. 615 24$aPersonal Computing. 676 $a004.678 702 $aBoavida$b Fernando$f1959- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484098203321 996 $aWired$9772061 997 $aUNINA