Vai al contenuto principale della pagina

Mobile computing and sustainable informatics : proceedings of ICMCSI 2021 / / edited by Subarna Shakya [and three others]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Mobile computing and sustainable informatics : proceedings of ICMCSI 2021 / / edited by Subarna Shakya [and three others] Visualizza cluster
Pubblicazione: Singapore : , : Springer, , [2022]
2022
Descrizione fisica: 1 online resource (864 pages)
Disciplina: 006.3
Soggetto topico: Computational intelligence
Mobile and Network Security
Persona (resp. second.): ShakyaSubarna
Note generali: Includes index.
Nota di contenuto: Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer -- 1 Introduction -- 1.1 Problem Formulation -- 2 Relevant Works -- 3 VOIP Technique and Network Structure -- 3.1 Media Gateways and Call Managers -- 3.2 Topologies -- 3.3 Session Initiation Protocol (SIP) -- 3.4 SIP Elements -- 4 Limitations -- 5 The Proposed Solution -- 5.1 Modification in De-Jitter Buffer -- 6 Results and Analysis -- 7 Conclusion -- References -- A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications -- 1 Introduction -- 2 Existing Approach -- 3 Antenna Design -- 3.1 Antenna Configuration -- 3.2 Antenna Performance -- 3.3 Simulated Results -- 3.4 Measured Results -- 4 Conclusion and Future Work -- References -- Keyword Recognition from EEG Signals on Smart Devices a Novel Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Overview -- 2.2 Data Acquisition -- 2.3 Data Preprocessing -- 3 Feature Extraction -- 3.1 DWT Feature Extraction -- 3.2 FFT Feature Extraction -- 3.3 Feature Fusion -- 3.4 Dimensionality Reduction -- 3.5 Command Map Table and Task Observer Thread -- 3.6 Tools and Software -- 4 Classifiers Used -- 4.1 SVM Classifier -- 4.2 KNN Classification -- 4.3 CNN Classifier -- 4.4 Random Forest -- 4.5 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method -- 1 Introduction -- 2 Sybil Attach and Security -- 2.1 WSN on Security Attacks -- 2.2 Sybil the Attack -- 3 Compare with Match-Position and Verification of Method -- 4 Message Authentication and Passing (MAP) -- 5 Result and Discussion -- 6 Conclusion -- References -- Certain Strategic Study on Machine Learning-Based Graph Anomaly Detection.
1 Introduction -- 2 Generalized Machine Learning Approaches Towards Outlier Detection -- 2.1 Key Challenges Identified in ML Techniques -- 3 Graph-Based Anomaly Detection Methods -- 3.1 Moving Towards Graph Representation -- 3.2 Existing Graph Basis Anomaly Detection Methods (GBAD) -- 3.3 Baseline Link Analysis Ranking Algorithms -- 3.4 Structure-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.5 Community-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.6 Graph Compression Strategies -- 4 Open Challenges in GBAD -- 5 Concluding Remarks -- References -- Machine Learning Perspective in VLSI Computer-Aided Design at Different Abstraction Levels -- 1 Introduction to Machine Learning and VLSI CAD -- 2 The Basic Paradigm of Machine Learning -- 3 Areas of Machine Learning -- 4 Machine Learning Algorithms -- 5 Drawbacks of Machine Learning -- 6 Application of Machine Learning in VLSI CAD Abtraction Levels -- 6.1 Machine Learning in Automatic Generation of Assertion in RTL Design -- 6.2 Machine Learning in Chip Testing -- 6.3 Machine Learning for Physical Design Routing -- 6.4 Machine Learning in Physical Design Floor Planning -- 6.5 Machine Learning in Static Timimg Analysis (STA) -- 6.6 Machine Learning in Gate-Level Netlist -- 6.7 Machine Learning in EDA and IC Design -- 7 Conclusion and Future Scope -- References -- A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness -- 1 Introduction -- 2 Energy Versus Power -- 2.1 IT Load -- 2.2 Effect of Outdoor Condition -- 2.3 User Configuration -- 2.4 Product Review Analysis -- 3 Related Work -- 4 Proposed Work -- 5 Result Analysis -- 6 Conclusion -- References -- Advancing e-Government Using Internet of Things -- 1 Introduction -- 2 Social Networks and Machine Learning -- 3 Health Care -- 4 Agriculture -- 4.1 Six-Layer IoT-Based Model [4-6] (Shown in Fig. 3).
4.2 Role of Unmanned Aerial Vehicles (UAVs) -- 5 Voting -- 5.1 IoT-Based Voting Framework -- 5.2 Fingerprint Matching Algorithm -- 5.3 Security -- 6 "Smart" Government? -- 7 Future Prospects -- References -- A New Network Forensic Investigation Process Model -- 1 Introduction -- 1.1 Forensic Science -- 1.2 Network Forensics -- 1.3 Need of Network Forensics -- 2 Literature Survey -- 3 Proposed Network Forensic Investigation Process Model -- 3.1 Network Forensic Readiness Module -- 3.2 Security Incident Alert Module -- 3.3 Data Acquisition Module -- 3.4 Forensic Investigation Module -- 3.5 Presentation Module -- 4 Conclusion -- References -- MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports -- 1 Introduction -- 2 Literature Survey -- 3 System Methodology -- 4 System Design -- 5 System Algorithm -- 5.1 Build Model Algorithm -- 5.2 Feature Extraction Algorithm -- 5.3 Prediction Algorithm -- 6 System Implementation -- 6.1 Data Flow Diagram -- 6.2 Sequence Diagram -- 7 Result Analysis -- 7.1 Accuracy of Malware Detection -- 7.2 Accuracy of Threat Attribution -- 8 Experimentation -- 9 Discussion -- 10 Conclusion -- References -- Investigating the Role of User Experience and Design in Recommender Systems: A Pragmatic Review -- 1 Introduction -- 2 Related Work -- 3 Overview of Usability Engineering -- 4 Experimental Set-Up -- 5 Findings -- 6 Proposed Model -- 7 Conclusion -- 8 Future Scope -- References -- A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment -- 1 Introduction -- 2 Review of Intrusion Detection Frameworks for IoT -- 3 Open Issues -- 4 Discussion on Open Issues and Future Research Direction -- 5 Conclusion -- References -- Future 5G Mobile Network Performance in Webservices with NDN Technology -- 1 Introduction -- 2 Literature Review.
3 Network Testing Considered in Signal Error Detection and Correction Format -- 4 System Analysis -- 5 Enhanced System Design -- 5.1 Steps for Performance Improvements and Existing Analysis -- 5.2 Steps for Overcoming the Issues -- 5.3 Algorithm Equations and Operational Methods -- 6 Conclusion -- References -- Survey for Electroencephalography EEG Signal Classification Approaches -- 1 Introduction -- 1.1 Motivation -- 1.2 Survey Strategy and Evaluation -- 1.3 Paper Organization -- 2 Support Vector Machine for EEG Classification -- 3 Artificial Neural Network (ANN) for EEG Classification -- 4 Convolution Neural Network (CNN) for EEG Classification -- 5 K-Nearest Neighbor (K-NN) for EEG Classification -- 6 Linear Discriminant Analysis (LDA) for EEG Classification -- 7 Multi-classifier Approaches for EEG Classification -- 8 Other Models for EEG Classification -- 9 Analysis and Evaluation -- 10 Conclusion -- References -- Analysis of Road Accidents Using Data Mining Paradigm -- 1 Introduction -- 2 Data and Methods -- 2.1 Data Description -- 2.2 Apriori Algorithm -- 3 Results and Discussion -- 3.1 Road Type -- 3.2 Intoxication -- 4 Conclusions -- References -- Hybrid Approach to Cross-Platform Mobile Interface Development for IAAS -- 1 Introduction -- 2 State of the Art on IAAS -- 2.1 General Mechanism of IAAS -- 2.2 Implementation of IAAS -- 3 State of the Art on Mobile Development Approaches -- 3.1 Native Approach -- 3.2 Web Approach -- 3.3 Hybrid Approach -- 4 Comparative Study and Mobile Solution Proposition for IAAS -- 4.1 Description of the Interface to Be Developed -- 4.2 Proposed Development Approach -- 5 Implementation and Evaluation -- 5.1 Functional Needs Model and Analysis -- 5.2 Realization of the Proposition -- 5.3 Display Tests and Evaluation of the Solution -- 6 Conclusion -- References.
Self-organizing Data Processing for Time Series Using SPARK -- 1 Introduction -- 2 Problem Definition -- 3 Related Work -- 4 Proposed Work -- 5 Results and Evaluation -- 5.1 Data and Preprocessing -- 5.2 Experimental Setup -- 5.3 Results -- 6 Conclusion -- References -- An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms -- 1 Introduction -- 1.1 Kinds of IDS -- 2 Related Work -- 3 Methodology -- 3.1 Machine Learning Techniques -- 3.2 Principal Component Analysis (PCA) -- 4 Experimental Evaluation -- 4.1 Result and Discussion -- 5 Conclusion -- References -- OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks -- 1 Introduction -- 2 Background and Related Studies -- 2.1 Software-Defined Network (SDN) and Openflow -- 2.2 Related Works -- 3 System Design and Implementation -- 3.1 System Architecture -- 3.2 Load Balancing Algorithm -- 4 Performance Evaluation and Results -- 4.1 Performance Parameters -- 4.2 Experimental Environment -- 4.3 Experimental Design -- 4.4 Experimental Results -- 5 Conclusions and Future Works -- References -- A Comparative Study of Classification Algorithms Over Images Using Machine Learning and TensorFlow -- 1 Introduction -- 1.1 Convolutional Neural Networks -- 2 Methodology -- 3 Experimental Results -- 3.1 Model Development -- 3.2 Packages Required -- 4 Conclusion -- References -- Intelligent Routing to Enhance Energy Consumption in Wireless Sensor Network: A Survey -- 1 Introduction -- 2 Wireless Sensor Networks Structure -- 3 The Approaches to Energy Consumption Management -- 3.1 Intelligent Routing Protocols -- 3.2 Duty Cycle -- 3.3 Data Manipulation -- 3.4 Based on Mobility -- 4 Discussions -- 5 Conclusions -- References -- Deep Residual Learning for Facial Emotion Recognition -- 1 Introduction -- 1.1 Background -- 2 Related Works.
3 Proposed Methodology.
Sommario/riassunto: This book gathers selected high-quality research papers presented at International Conference on Mobile Computing and Sustainable Informatics (ICMCSI 2021) organized by Pulchowk Campus, Institute of Engineering, Tribhuvan University, Nepal, during 29-30 January 2021. The book discusses recent developments in mobile communication technologies ranging from mobile edge computing devices, to personalized, embedded and sustainable applications. The book covers vital topics like mobile networks, computing models, algorithms, sustainable models and advanced informatics that supports the symbiosis of mobile computing and sustainable informatics.
Titolo autorizzato: Mobile computing and sustainable informatics  Visualizza cluster
ISBN: 981-16-1865-8
981-16-1866-6
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910743263403321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes on Data Engineering and Communications Technologies