Vai al contenuto principale della pagina

Intelligent cyber physical systems and internet of things : ICoICI 2022 / / Jude Hemanth, Danilo Pelusi, Joy Iong-Zong Chen, editors



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Intelligent cyber physical systems and internet of things : ICoICI 2022 / / Jude Hemanth, Danilo Pelusi, Joy Iong-Zong Chen, editors Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2023]
©2023
Edizione: 1st ed. 2023.
Descrizione fisica: 1 online resource (896 pages)
Disciplina: 629.8
Soggetto topico: Cooperating objects (Computer systems)
Internet of things
Persona (resp. second.): ChenJoy Iong-zong
PelusiDanilo
HemanthD. Jude
Nota di contenuto: Intro -- Preface -- Contents -- Term Frequency Tokenization for Fake News Detection -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Aquaculture Monitoring System Using Internet of Things -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Extraction -- 3.2 Data Telemetry and Visualization -- 3.3 Parameter Prediction -- 3.4 Chatbot -- 3.5 Water Quality Maintenance -- 4 Design and Implementation -- 4.1 Hardware Details -- 4.2 Software Details -- 4.3 Overview of Implementation -- 4.4 Implementation of pH Prediction -- 5 Results and Discussion -- 5.1 Sensor Data Visualization in IBM Watson Internet of Things Platform -- 5.2 Parameter Prediction -- 5.3 Chatbot -- 5.4 Android App -- 6 Conclusion and Future Scope -- References -- A Comprehensive Study and Implementation of Memory Malware Analysis with Its Application for the Case Study of CRIDEX -- 1 Introduction -- 2 Background Work -- 3 Related Work -- 4 Memory Malware Analysis Approach -- 5 Available Tools -- 6 CRIDEX Case Study -- 7 Conclusion -- References -- IoT Based Anti Poaching of Trees and Protection of Forest -- 1 Introduction -- 2 Related Works -- 3 Proposed Work -- 4 Results -- 5 Conclusion and Future Works -- 5.1 Conclusion -- 5.2 Future Works -- References -- Artificial Intelligence Based Efficient Activity Recognition with Real Time Implementation for ATM Security -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Results and Dıscussıon -- 5 Conclusion -- References -- Terror Attack Classification with the Application of Orange Data Mining Tool and Neo4j Sandbox -- 1 Introduction -- 1.1 Dataset -- 1.2 Graph and Neo4j -- 2 Literature Survey -- 3 Methodology -- 3.1 Graph Creation -- 3.2 Graph Embedding Calculation -- 4 Model Building -- 4.1 Counting Null Values.
4.2 Removal of Redundant Data -- 4.3 Dimension Reduction -- 4.4 Data Scaling -- 5 Results and Analysis -- 6 Conclusion -- References -- Multipurpose IoT Based Camera Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Hardware Integration -- 3.2 Training the Model -- 3.3 Detect and Predict Mask -- 3.4 Eye on Mask -- 3.5 Eye Open or Closed -- 3.6 Eye and Eye Ball Contours -- 3.7 Head Pose of Person -- 3.8 Function Calling and Display of Output -- 4 Result Analysis -- 5 Conclusion -- References -- Dr. Watson AI Based Healthcare Technology Project -- 1 Introduction -- 2 Methodology -- 3 Implementation -- 4 Results -- 4.1 Home Page -- 4.2 Dashboard Page -- 4.3 Medicine Prescriber -- 4.4 Diabetic Analyzer -- 4.5 Covid Predictor -- 4.6 Watson Assistant Chatbot -- 5 Conclusion -- References -- Empirical and Statistical Comparison of RSA and El-Gamal in Terms of Time Complexity -- 1 Introduction -- 2 Literature Review -- 3 Run Time Comparison of RSA and EL Gamal Protocols Used in MANET -- 4 Fundamental Theorem of Finite Difference -- 5 Result and Analysis -- 6 Conclusions and Future Work -- References -- IoT Communication to Capture and Store Data to Thingspeak Cloud Using NodeMCU and Ultrasonic Sensor -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- A Comprehensive Study on Cloud Computing: Architecture, Load Balancing, Task Scheduling and Meta-Heuristic Optimization -- 1 Introduction -- 2 Cloud Computing: Architecture -- 2.1 Overview -- 2.2 Features of Cloud Computing -- 2.3 Architecture -- 2.4 Data Center in Cloud Network -- 2.5 Virtual Machines in Cloud Computing -- 2.6 Motivation of Study -- 3 Load Balancing in Cloud Computing -- 3.1 Classification of LB Techniques -- 3.2 Load Balancing Metrics -- 4 Task Scheduling in Cloud Environment.
4.1 Types of Task Scheduling -- 4.2 Framework of TS in CC Environment -- 5 Meta-Heuristic Optimization Techniques -- 6 Literature Survey -- 6.1 Research Gaps and Issues -- 7 Conclusion -- References -- Balancing Exploration and Exploitation in Nature Inspired Computing Algorithm -- 1 Introduction -- 2 Existing Work -- 2.1 Particle Swarm Optimization -- 3 Proposed Work -- 3.1 Improved Multiple Particle Swarm Optimization (IMPSO) -- 4 Results and Discusssion -- 5 Conclusion -- References -- Blockchain Based Secure, Efficient, and Scalable Platform for the Organ Donation Process of Healthcare Industry -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 Blockchain -- 3.2 Ethereum -- 3.3 Smart Contracts -- 4 The Proposed Organ Donation Platform Using Blockchain Technology -- 5 Results and Analysis -- 6 Conclusions and Future Works -- References -- Image Enhancement in Frequency Domain Fingerprint Detection and Matching Approach -- 1 Introduction -- 2 Frequency Domain Approach in Enhancement -- 3 Adopted Methodology -- 4 Design and Implementation -- 5 Simulation Results and Discussion -- 6 Conclusion -- References -- Developing Machine Learning Based Mobile App for Agriculture Application -- 1 Introduction -- 2 Relevance -- 3 Related Work -- 4 Proposed Work -- 5 Block Diagram -- 6 Architecture Description -- 7 Live Field Status -- 8 Crop Detection and Market Prediction -- 8.1 Data Gathering -- 8.2 Data Pre-processing -- 9 Crop Detection -- 9.1 Image Acquisition -- 9.2 Image Pre-processing -- 9.3 Feature Extraction -- 9.4 SVM Classification -- 9.5 Segmentation -- 10 Implementation and Result Analysis -- 10.1 Home Screen Along with Application Menu -- 10.2 Confusion Matrix -- 10.3 ML Model Comparison -- 10.4 Notification and Information -- 11 Conclusion -- References -- Attack Detection in IoT Using Machine Learning-A Survey -- 1 Introduction.
2 IoT Architectures Attacks and Attacks Detection -- 3 Challenges -- 4 Conclusion -- References -- An Extensive Study on Logic Emerging IoT Adiabatic Techniques for Low-Power Circuit -- 1 Introduction -- 2 Background on Adiabatic Circuits -- 3 Recent Developments -- 3.1 Adiabatic Circuits for RF-Powered IoT Applications -- 3.2 Adiabatic Logic Enhanced Hardware Security -- 4 Avoid Common Mistakes to Adiabatic Logic Design -- 4.1 Don't Use Diodes -- 4.2 Rules of Don't Disobey Transistor -- 4.3 Use Reversible Logic -- 4.4 Don't Over-Constrain the Design -- 5 Conclusion -- References -- A Critical Review of Agri-Food Supply Management with Traceability and Transparency Using Blockchain Technology -- 1 Introduction -- 1.1 Motivation and Contribution of Research Work -- 2 Related Work -- 2.1 Traceability -- 2.2 Efficiency -- 2.3 Privacy -- 2.4 Cost -- 2.5 Inventory Management -- 3 Blockchain Implementation Challenges -- 4 Conclusion -- References -- Face-Anti-spoofing Based on Liveness Detection -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Dataset Gathering -- 3.2 Data Pre-processing -- 3.3 Model Parameter -- 4 Simulation Result -- 4.1 Performance Matrix -- 4.2 Confusion Matrix -- 5 Conclusion -- References -- PDR Analysis and Network Optimization of Routing Protocols for Edge Networks -- 1 Introduction -- 1.1 Dynamic Source Routing (DSR) -- 1.2 Ad-hoc On-demand Distance Vector (AODV) -- 2 Related Work -- 3 Proposed Work -- 4 Result Analysis -- 5 Conclusion -- References -- Privacy Threat Reduction Using Modified Multi-line Code Generation Algorithm (MMLCGA) for Cancelable Biometric Technique (CBT) -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 System Modules -- 3.2 System Architecture -- 4 Implementation Details -- 4.1 Binarization -- 4.2 Contextual Filtering -- 4.3 Thinning -- 4.4 Minutiae Extraction.
4.5 Line Code Algorithm -- 5 Results and Discussion -- 6 Conclusion -- References -- Systematic Literature Review-IoT-Based Supply Chain Management in Industry 4.0 -- 1 Introduction -- 2 IoT Based Supply Chain Management in Industry 4.0 -- 3 Principles and Methods -- 3.1 Review Principles -- 3.2 Systematic Literature Review Method -- 4 Review of Research Trends -- 5 Content Analysis -- 6 Industry 4.0 and IoT in Supply Chain Research (Future Work) -- 7 Conclusion -- References -- A Review on Urban Flood Management Techniques for the Smart City and Future Research -- 1 Introduction -- 2 Related Work -- 3 Analysis and Discussion -- 4 Conclusion -- References -- Application of Distributed Constraint Optimization Technique for Privacy Preservation in Cyber-Physical Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed Mechanism -- 4 Experimental Results -- 5 Future Work -- 6 Conclusion -- References -- Grip Assisting Glove for Charcot-Marie-Tooth Patients -- 1 Introduction -- 2 Literature Survey -- 2.1 Smart Muscle Strength Assessment Glove for Rehabilitation Purposes [7] -- 2.2 Calibration and Evaluation of a Force Measurement Glove for Field-Based Monitoring of Manual Wheelchair Users [8] -- 2.3 A Fabricated Force Glove that Measures Hand Forces During Activities of Daily Living [9] -- 2.4 Wearable System with Embedded Force Sensors for Neurological Rehabilitation Trainings [10] -- 2.5 Tactile Sensorized Glove for Force and Motion Sensing [11] -- 2.6 Smart Glove to Measure a Grip Force of the Workers [12] -- 2.7 Force-Sensing Glove System for Measurement of Hand Forces During Motorbike Riding [13] -- 2.8 Smart Tactile Gloves for Haptic Interaction, Communication and Rehabilitation [14] -- 3 Working/Methodology -- 3.1 Sensing and Analog Signal Condition Block -- 3.2 Continuous Force Monitoring Block -- 3.3 Haptic Feedback Block.
4 Design of the Glove.
Sommario/riassunto: This book highlights the potential research areas of Information and Communication Technologies (ICT), such as the research in the field of modern computing and communication technologies that deal with different aspects of data analysis and network connectivity to develop solution for the emerging real-time information system challenges; contains a brief discussion about the progression from information systems to intelligent information systems, development of autonomous systems, real-time implementation of Internet of Things (IoT) and Cyber Physical Systems (CPS), fundamentals of intelligent information systems and analytical activities; helps to gain a significant research knowledge on modern communication technologies from the novel research contributions dealing with different aspects of communication systems, which showcase effective technological solutions that can be used for the implementation of novel distributed wireless communication systems. The individual chapters included in this book will provide a valuable resource for the researchers, scientists, scholars, and research enthusiasts, who have more interest in Information and Communication Technologies (ICT). Encompassing the contributions of professors and researchers from Indian and other foreign universities, this book will be of interest to students, researchers, and practitioners, as well as members of the general public interested in the realm of Internet of Things (IoT) and Cyber Physical Systems (CPS).
Titolo autorizzato: Intelligent Cyber Physical Systems and Internet of Things  Visualizza cluster
ISBN: 3-031-18497-1
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910647787103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Engineering Cyber-Physical Systems and Critical Infrastructures, . 2731-5010 ; ; 3