Vai al contenuto principale della pagina

IoT based control networks and intelligent systems : proceedings of 3rd ICICNIS 2022 / / P. P. Joby, Valentina E. Balas, and Ram Palanisamy



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Joby P. P. Visualizza persona
Titolo: IoT based control networks and intelligent systems : proceedings of 3rd ICICNIS 2022 / / P. P. Joby, Valentina E. Balas, and Ram Palanisamy Visualizza cluster
Pubblicazione: Singapore : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (892 pages)
Disciplina: 629.8
Soggetto topico: Intelligent control systems
Internet of things
Persona (resp. second.): BalasValentina E.
PalanisamyRam
Nota di contenuto: Intro -- Preface -- Contents -- About the Editors -- LabVIEW Based Anomaly Detection for Screening Diabetic Retinopathy -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Data Pre-processing -- 5 EfficientNet Model Based DR Classification -- 5.1 Architecture of EfficientNet Model -- 6 Real Time DR Diagnosis -- 7 Conclusion -- References -- Early Stage Parkinson's Disease Diagnosis and Detection Using K-Nearest Neighbors Algorithm -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Data Pre-processing -- 5 Data Exploration -- 6 Model Building -- 6.1 Training and Testing -- 6.2 Classification -- 7 Conclusion -- References -- IoT Crypto Security Communication System -- 1 Introduction -- 2 Implementation Details -- 2.1 Protocol Stack -- 2.2 IoT-Crypto Device Software -- 2.3 IoT-Crypto Cloud Server Software -- 2.4 IoT-Crypto Gateway Software -- 3 Experiments and Tests -- 3.1 Protocol Overhead Related to the Cryptographic Techniques -- 3.2 Comparison of Encoding -- 3.3 Suitability of the Wireless Standard -- 4 Conclusion and Future Work -- References -- CNN and XGBoost Based Hybrid Model in Classification of Fetal Ultrasound Scan Planes Images in Detection of Congenital Heart Defects -- 1 Introduction -- 2 Related Works -- 3 Proposed Hybrid Model -- 3.1 CNN + XGBoost Hybrid Model -- 4 Result Analysis -- 4.1 Accuracy -- 4.2 Precision -- 4.3 Recall -- 4.4 F1-Score -- 4.5 Loss -- 4.6 Time -- 4.7 ROC Curve -- 4.8 Sensitivity and Specificity -- 5 Conclusion -- References -- Review on Web Application Based Infant Health Management -- 1 Introduction -- 2 Types of Web Applications -- 2.1 Internet of Things -- 2.2 Embedded Systems -- 2.3 Image Processing -- 2.4 Smart Incubator -- 2.5 E-Health -- 2.6 Temperature and Real-Time Monitoring -- 3 Conclusion -- References -- IEEE 802.11g Wireless Protocol Standard: Performance Analysis.
1 Introduction -- 1.1 WLAN- Physical Architecture -- 2 References -- 3 Selection of Access Point -- 3.1 Delay Analysis -- 3.2 Media Access Delay -- 3.3 Queue Size -- 3.4 Throughput -- 4 Software Requirement -- 5 Network Design -- 6 Simulation Results -- 6.1 Delay Study -- 6.2 Media Access Delay Study -- 6.3 Queue Size Study -- 6.4 Throughput Study -- 7 Analysis of Access Point Using HTTP -- 8 Analysis of Voice Application Based on Different Parameters -- 9 Conclusion -- References -- Optimal Cluster Head Selection Using Vortex Search Algorithm with Deep Learning-Based Multipath Routing in MANET -- 1 Introduction -- 2 Literature Review -- 2.1 Objectives Identified and Proposed -- 3 Proposed Methodology -- 3.1 Network Ideal and Energy Ideal -- 3.2 Energy Model -- 3.3 Cluster Formation -- 3.4 CH Selection -- 3.5 Multipath Routing -- 4 Results and Discussion -- 5 Conclusion -- References -- Secure Wireless Smart Car Door Unlocking System -- 1 Introduction -- 1.1 Organization of the Paper -- 2 Related Work -- 2.1 Pseudorandom Numbers -- 2.2 Rolling Code -- 2.3 Hashing -- 3 Methodology -- 3.1 Objective -- 3.2 Modules -- 4 Performance Evaluation -- 4.1 Type -- 4.2 Function Analysis -- 4.3 Key Size -- 4.4 Rounds -- 4.5 Time complexity -- 4.6 Space Complexity -- 4.7 Common attacks -- 4.8 Comparison with DSA Algorithm Standard -- 4.9 Usage of SHA vs MD5 in Our Proposed Method -- 5 Conclusion -- References -- A Comprehending Deep Learning Approach for Disease Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Restaurant Automation Through IoT and NLP Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusion and Future Work -- References -- Comprehensive Assessment of Big Data in Recommendation Systems -- 1 Introduction.
2 Big Data Based Recommendation Systems -- 2.1 Data Collection Used in Recommendation Systems Approaches -- 2.2 Methods Used in Recommendation Systems -- 2.3 Contextual Suggestions -- 2.4 Neighbourhood-Based Approaches for Big Data Scaling -- 2.5 Evaluation Score Estimation -- 2.6 Evaluation of Recommendation Systems Metrics Used -- 3 Conclusion -- References -- Review on Application of Wireless Technology Using IoT -- 1 Introduction -- 2 Application of Wireless Technology -- 2.1 Structural Health Monitoring -- 2.2 Structural Damage Detection -- 2.3 Detection of Bridge Damage -- 3 Conclusion -- References -- Comparative Study of Conditional Generative Models for ISL Generation -- 1 Introduction -- 2 Literature Review -- 3 CGAN Preliminaries and ISL Dataset -- 3.1 Conditional GAN -- 3.2 ISL Dataset -- 4 Training Configuration of Models -- 5 Results of Conditional GANs on ISL Dataset -- 5.1 Results of ContraGAN on ISL Dataset -- 5.2 Results of ACGAN on ISL Dataset -- 5.3 Results of ReACGAN on ISL Dataset -- 5.4 Results of MHGAN on ISL Dataset -- 5.5 Results of BigGAN on ISL Dataset -- 5.6 Results of StyleGAN2-ADA on ISL Dataset -- 5.7 Results of StyleGAN2-DiffAug on ISL Dataset -- 5.8 Results of StyleGAN3 on ISL Dataset -- 5.9 FID Score and IS of CGANs on ISL Dataset -- 6 Conclusion -- References -- A Novel Approach for Segmenting Coronary Artery from Angiogram Videos -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Proposed Research Method -- 4.1 Extracting the Frames from the Angiogram Video -- 4.2 Frame Pre-processing -- 4.3 Segmenting the Region of Interest -- 4.4 Detecting the Keyframe -- 5 Experimental Results and Analysis -- 6 Conclusion -- References -- Analysis of Different Cryptographic Algorithms in Cloud-Based Multi-robot Systems -- 1 Introduction -- 1.1 Cryptography Security Services -- 2 Literature Review -- 3 Background.
3.1 Symmetric Key Cryptography -- 3.2 Asymmetric Key Cryptography -- 4 Elliptic Curve Integrated Encryption Scheme (ECIES) -- 4.1 Encryption Algorithm For ECIES -- 4.2 Decryption Algorithm for ECIES -- 4.3 Notations -- 5 Result and Discussion -- 5.1 Encryption and Decryption Time -- 6 Conclusion and Future Scope -- References -- An IoT Based Environment Monitoring & -- Controlling System for Food Grain Warehouse -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 System Components -- 4 Results and Discussions -- 5 Conclusion -- References -- Numerical Analysis and ANN Modeling of the Intercooled, Reheat and Regenerative Gas Turbine Cycle -- 1 Introduction -- 2 Cycle Description and Thermal Model -- 2.1 Thermodynamic Cycle -- 2.2 Thermal Model -- 3 Results and Discussion -- 3.1 Effect of Pressure Ratio and Turbine Inlet Temperature (TIT) -- 3.2 Effect of Pressure Ratio and Compressor Inlet Temperature (CIT) -- 3.3 Effect of Effectiveness of the Heat Exchanger -- 3.4 Development of ANN Prediction Model -- 3.5 Results of the ANN Prediction Model -- 4 Conclusion -- References -- Implementation of IoT Enabled Home Automation System -- 1 Introduction -- 2 Functional Requirements -- 2.1 Internet of Things -- 2.2 System Architecture -- 3 Proposed Model -- 4 Implementation Design -- 4.1 Arduino Nano Board -- 4.2 Bluetooth HC05 Module -- 4.3 Relay Board Module -- 5 Proposed IOT Architecture -- 6 User Interaction -- 7 Implementation Details -- 8 Conclusion and Future Work -- References -- Scheduled Line of Symmetry Solar Tracker with MPT and IoT -- 1 Introduction -- 2 Existing System -- 2.1 Optimized Single-Axis Schedule Solar Tracker in Different Weather Conditions -- 2.2 Coordinated Power Management and Control of Renewable Energy Sources Based Smart Grid -- 3 Proposed System -- 3.1 Calculation of Azimuthal Angle.
3.2 Circuit Diagram -- 3.3 Flow Chart -- 4 Results and Discussion -- 5 Conclusion -- References -- A New Method for Secure Transmission of Medical Images Using Wavelet Transform and Steganography -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Materials -- 4.1 Discrete Wavelet Transform (DWT) -- 4.2 Least Significant Bits (LSB) Steganography -- 4.3 Bit-Plane Reversal -- 5 Results and Conclusion -- References -- Deep Learning Based Hand Sign Recognition in the Context of Indian Greetings and Gestures -- 1 Introduction -- 1.1 Sign Language Translation -- 1.2 Deep Learning -- 1.3 Convolutional Neural Networks -- 1.4 Object Detection -- 1.5 Neural Network Approaches -- 1.6 You Only Look Once -- 2 Related Work -- 3 Technologies -- 3.1 Python -- 4 Methodology -- 4.1 Algorithm -- 4.2 Dataset -- 4.3 Architecture -- 5 Result -- 6 Conclusion -- 7 Future Scope -- References -- Pedestrian Detection Using MobileNetV2 Based Mask R-CNN -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 MobileNetV2 -- 3.2 Proposed Mask R-CNN -- 4 Result and Experimentation -- 5 Conclusion -- References -- Localization of Calcifications in Mammograms Using CNN with GAP Layer -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Pre-processing of Data -- 3.3 Localization -- 3.4 Model -- 4 Results and Analysis -- 5 Conclusion -- 6 Future Work -- References -- Comparative Analysis of Machine Learning and Deep Learning Algorithms for Real-Time Posture Detection to Prevent Sciatica, Kyphosis, Lordosis -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Visualization -- 3.4 Model Training -- 3.5 Evaluating the Model -- 3.6 Model Selection -- 3.7 Integrating with OpenCV -- 4 Results Analysis -- 5 Conclusions -- References.
Lightweight Block Cipher for Resource Constrained IoT Environment-An Survey, Performance, Cryptanalysis and Research Challenges.
Titolo autorizzato: IoT based control networks and intelligent systems  Visualizza cluster
ISBN: 981-19-5845-9
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910627258503321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture notes in networks and systems.