Vai al contenuto principale della pagina
Titolo: | Computer networks, big data and IoT : proceedings of ICCBI 2020 ; Madurai, Tamil Nadu, India, 15-16 December 2020 / / editors, A. Pasumpon Pandian, Xavier Fernando, Syed Mohammed Shamsul Islam |
Pubblicazione: | Singapore : , : Springer, , [2021] |
©2021 | |
Descrizione fisica: | 1 online resource (980 pages) : illustrations (some color) |
Disciplina: | 004.678 |
Soggetto topico: | Big data |
Internet of things | |
Persona (resp. second.): | SenjyuTomonobu <1963-> |
WangHaoxiang | |
IslamSyed Mohammed Shamsul | |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | Intro -- Foreword -- Preface -- Acknowledgements -- Contents -- About the Editors -- Maximizing Network Lifetime in WSN Using Ant Colony Algorıthm -- 1 Introduction -- 2 Review of Related Work -- 2.1 Routing Protocol -- 2.2 Traveling Salesman Problem -- 3 Proposed Scheme -- 3.1 Greedy Algorithm -- 3.2 Ant Colony Algorithm for TSP -- 3.3 Procedure of ACO -- 3.4 Shortest Path Problem -- 4 Software Description -- 4.1 Proteus -- 5 Results and Discussion -- 5.1 Schematic Diagram -- 5.2 Simulation Output -- 5.3 Power Analysis of Greedy Algorithm -- 5.4 Simulation Waveform of Greedy Algorithm -- 5.5 Power Analysis of ACO -- 5.6 Simulation Waveform of Greedy Algorithm and ACO -- 6 Conclusion and for Future Work -- 6.1 Conclusion -- 6.2 Scope for Future Work -- References -- Deep Ensemble Approach for Question Answer System -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Long Short Term Memory -- 3.2 Encoder-Decoder Model -- 3.3 CatBoost -- 3.4 Ensemble Model -- 4 Experimental Setup -- 5 Results and Discussion -- 6 Conclusion -- References -- Information Sharing Over Social Media Analysis Using Centrality Measure -- 1 Introduction -- 2 Related Works -- 3 Data Analysis -- 4 Conclusion -- References -- AndroHealthCheck: A Malware Detection System for Android Using Machine Learning -- 1 Introduction -- 2 Architecture of AndroHealthCheck -- 3 Deployment of AndroHealthCheck -- 4 Conclusion -- References -- Use of Machine Learning Services in Cloud -- 1 Introduction -- 2 Cognitive Services -- 3 Machine Learning APIs of Google, Amazon, and Microsoft -- 4 ML Services Serve as a Platform -- 5 ML Services Serve as an Infrastructure -- 6 ML for Attack Detection and Prevention -- 7 Conclusion -- References -- An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT -- 1 Introduction -- 2 Literature Review. |
3 Related Work -- 4 Modified Skellam Distribution -Based Selfish Node Detection Technique (MSD-SNDT) -- 5 Detection and Isolation of Selfish Nodes Misbehavior Utilizing Computed MSD -- 5.1 The Proposed Algorithm-MSD-SDNT -- 6 Experimental Results and Discussions of MSD-SNDT -- 7 Modified Bates Distribution-Based Selfish Node Detection Technique (MBD-SNDT) -- 7.1 MBD-SNDT Algorithm -- 8 Experimental Results and Discussions of MBD-SNDT -- 9 Conclusion -- References -- Metaheuristic-Enabled Shortest Path Selection for IoT-Based Wireless Sensor Network -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Proposed Routing Strategies in IoT -- 3.1 Network Model -- 4 Description on Varied Constraints for Shortest Route Selection -- 4.1 Distance Model -- 4.2 Delay -- 4.3 Energy Model -- 4.4 PDR -- 5 Optimal Shortest Path Selection via Dragonfly Algorithm with Brownian Motion -- 5.1 Objective Function -- 5.2 Solution Encoding -- 5.3 Proposed DABR Algorithm -- 6 Results and Discussion -- 6.1 Simulation Procedure -- 6.2 Performance Analysis -- 6.3 Statistical Analysis -- 6.4 Overall Analysis of the Proposed Model -- 7 Conclusion -- References -- Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud-Edge Environment -- 1 Introduction -- 2 Background and Related Work -- 3 Model Formulation -- 4 Proposed Method -- 5 Experiments -- 5.1 Simulation Environment Setup -- 5.2 Comparative Analysis and Discussion -- 6 Conclusion -- References -- Generation of Random Binary Sequence Using Adaptive Row-Column Approach and Synthetic Color Image -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Blockchain: Application Domains, Research Issues and Challenges -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Background -- 2.2 Blockchain Transaction -- 2.3 Digital Signature. | |
2.4 Blocks -- 2.5 Mining and Consensus Algorithms -- 3 Applications of Blockchain -- 3.1 Biomedical Domain -- 3.2 Banking and Finance -- 3.3 Government and Public Sectors -- 3.4 Supply Chain -- 3.5 Internet of Things -- 4 Open Issues and Challenges -- 4.1 Scalability -- 4.2 Attacks on Blockchain -- 4.3 Privacy Breach -- 5 Conclusion -- References -- A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm -- 1 Introduction -- 1.1 MANET -- 1.2 Characteristics of MANET -- 1.3 Challenges in Ad hoc Network -- 2 Overview of routing protocol -- 2.1 Classification of Routing Protocol -- 3 Network performance optimization algorithm -- 3.1 Genetic algorithms (GA) -- 3.2 Particle Swarm Optimization (PSO) -- 3.3 Ant Colony Optimization (ACO) -- 3.4 Artificial Bee Colony Optimization (ABC) -- 3.5 Bacterial Foraging Optimization Algorithm (BFOA) -- 3.6 Binary Particle Swarm Optimization (BPSO) -- 4 PSO Overview -- 5 Conclusion -- References -- Industrial IoT: Challenges and Mitigation Policies -- 1 Introduction -- 2 Internet of Things (IoT) and Industrial Internet of Things (IIoT) -- 2.1 Internet of Things (IoT) -- 2.2 Industrial IoT (IIoT) -- 2.3 IIoT Architecture -- 3 Cyberthreats in IIoT Devices -- 3.1 Cyberthreat -- 4 Remedial Measures and Best Practices to Mitigate Cyberthreats -- 4.1 Security Practices for IoT Devices Developers -- 4.2 Best Security Practices for Communication Network -- 4.3 Best Security Practices at the Industry Level -- 4.4 Best Practices for End Users -- 5 Challenges Related to Cybersecurity -- 6 Conclusion and Future Work -- References -- EclatRPGrowth: Finding Rare Patterns Using Vertical Mining and Rare Pattern Tree -- 1 Introduction -- 2 Related Work -- 2.1 Apriori Based Rare Pattern Mining Techniques -- 2.2 FP-Growth Based Rare Pattern Mining Techniques -- 2.3 Eclat Based Rare Pattern Mining Algorithms. | |
3 Vertical Mining with Rare Pattern Tree -- 3.1 Basic Concepts and Definitions -- 3.2 Vertical Mining with BitSets -- 3.3 Structure of a Rare Pattern Tree (RP Tree) -- 4 Methodology of EclatRPGrowth -- 4.1 Schematic Block Diagram of Algorithm EclatRPGrowth -- 4.2 EclatRPGrowth Example -- 5 Methodology of EClatPRPGrowth -- 6 Experimental Results and Discussion -- 6.1 Comparison of Performance -- 7 Conclusion -- References -- Research Scholars transferring Scholarly Information through Social Medias and Networks in the Selected State Universities of Tamil Nadu -- 1 Introduction -- 2 Review of Literature -- 3 Objectives of the Study -- 4 Methodology -- 5 Analysis and Discussion -- 6 Conclusion -- References -- Twitter-Based Disaster Management System Using Data Mining -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Linear Ridge Regression (LRR) -- 3.2 SGD Classifier -- 3.3 Naive Bayes Classifier -- 4 Implementation -- 5 Result and Discussion -- 6 Conclusion -- References -- Sentimental Analysis on Twitter Data of Political Domain -- 1 Introduction -- 1.1 Sentiment Analysis -- 2 Review of Literature -- 3 System Architecture -- 3.1 Data Collection -- 3.2 Preprocessing -- 3.3 Word Embedding -- 3.4 Recurrent Neural Network (ANN) -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Cloud-Based Smart Environment Using Internet of Things (IoT) -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 RFID Technology -- 3.2 Constrained Node Network (CNN) Technology -- 3.3 Smart Environment Sensors with the Internet of Things (IoT) -- 4 Conclusion -- References -- A Review of Healthcare Applications on Internet of Things -- 1 Introduction -- 2 Role of IoT in HealthCare -- 3 Literature Review -- 4 Comparison Table -- 5 Conclusion -- References -- Big Social Media Analytics: Applications and Challenges -- 1 Introduction. | |
2 Literature Review -- 3 Applications of Social Media Big Data -- 3.1 Business -- 3.2 Healthcare -- 3.3 Education -- 3.4 Crisis Management -- 4 Big Social Media Analytics -- 4.1 Social Media Business Analytics -- 4.2 Social Media Healthcare Analytics -- 4.3 Social Media Education Analytics -- 4.4 Social Media Crisis Management Analytics -- 5 Conclusion -- References -- A Cost and Power Analysis of Farmer Using Smart Farming IoT System -- 1 Introduction -- 2 Earlier Work -- 3 Smart Farming System -- 4 Likely Outcomes -- 4.1 Cost Analysis -- 4.2 Time Analysis -- 4.3 Power Analysis -- 5 Experimental Setup -- 6 Conclusion and Future Work -- References -- Intelligent Computing Application for Cloud Enhancing Healthcare Services -- 1 Introduction -- 2 Literature Review -- 3 Intelligent Computing: A Novel Economic Computing Framework -- 4 Critical Analysis of the Healthcare Cloud Computing Challenges and Opportunities -- 5 An Evaluation of Cloud Computing Challenges and Opportunities -- 5.1 The Management Perspectives -- 5.2 Technological Aspects -- 5.3 Privacy Aspects -- 5.4 Legal Aspects -- 6 Discussion -- 6.1 Intelligent Computing Strategy and Planning -- 7 Conclusion and Future Directions -- References -- Coronavirus Detection and Classification Using X-Rays and CT Scans with Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Experiments -- 4.1 Dataset Description -- 4.2 Data Preprocessing -- 4.3 Feature Extraction Technique -- 4.4 Analyzing Results -- 5 Experimental Results -- 5.1 Results of CT Scan Images -- 5.2 Results of X-Ray Images -- 6 Conclusion -- References -- Johnson's Sequencing for Load Balancing in Multi-Access Edge Computing -- 1 Introduction -- 2 Load Balancing -- 2.1 Multi Access/Mobile Computing -- 2.2 Load Balancing in Multi-Access/Mobile Computing -- 3 Flow Shop Sequencing. | |
3.1 Proposed Flow Shop Algorithm for Load Balancing. | |
Sommario/riassunto: | This book presents best selected research papers presented at the International Conference on Computer Networks, Big Data and IoT (ICCBI 2020), organized by Vaigai College Engineering, Madurai, Tamil Nadu, India, during 15-16 December 2020. The book covers original papers on computer networks, network protocols and wireless networks, data communication technologies and network security. The book is a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers and industry practitioners in those important areas. |
Titolo autorizzato: | Computer networks, big data and IoT |
ISBN: | 981-16-0965-9 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910485606203321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |