Vai al contenuto principale della pagina

IoT and analytics for sensor networks : proceedings of ICWSNUCA 2021 / / Padmalaya Nayak, Souvik Pal, Sheng-Lung Peng, editors



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: IoT and analytics for sensor networks : proceedings of ICWSNUCA 2021 / / Padmalaya Nayak, Souvik Pal, Sheng-Lung Peng, editors Visualizza cluster
Pubblicazione: Singapore : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (502 pages)
Disciplina: 681
Soggetto topico: Wireless sensor networks
Ubiquitous computing
Persona (resp. second.): NayakPadmalaya
PalSouvik
PengSheng-Lung
Nota di contenuto: Intro -- Organizing Committee and Key Members -- Invited Speaker -- Preface and Acknowledgement -- About This Book -- Contents -- About the Editors -- An Interactive Smart Mirror Using Internet of Things and Machine Learning -- 1 Introduction -- 2 Motivation and Related Work -- 3 Architecture, Working and Feature -- 3.1 Hand Gesture-Controlled Music Player -- 3.2 Other Content Features -- 4 Result -- 5 Conclusion and Future Enhancements -- References -- Cluster Formation Algorithm in WSNs to Optimize the Energy Consumption Using Self-Organizing Map -- 1 Introduction -- 2 Existing Literature -- 3 Proposed Heuristic -- 4 Results and Discussion -- 5 Conclusion -- References -- CNN-Based Mobile Device Detection Using Still Images -- 1 Introduction -- 2 Techniques for Source Camera Identification -- 2.1 Image Headers -- 2.2 Images Features -- 2.3 Demosaicing Features -- 2.4 PRNU Feature-Based Approach -- 2.5 Mobile Sensor Fingerprint -- 2.6 Convolutional Neural Networks and Image Noise Pattern -- 3 Dataset Used -- 4 Proposed CNN Model and Its Architecture -- 5 Results and Discussions -- 6 Conclusion -- References -- E-FFTF: An Extended Framework for Flexible Fault Tolerance in Cloud -- 1 Introduction -- 2 Proposed E-FFTF -- 2.1 System Model -- 2.2 Task Execution Model -- 3 Experimental Evaluation -- 3.1 Simulation Settings -- 3.2 Results and Discussion -- 4 Conclusions and Future Research Scope -- References -- Human Abnormal Activity Pattern Analysis in Diverse Background Surveillance Videos Using SVM and ResNet50 Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 SVM Classifier Model -- 3.2 ResNet50 Model -- 4 Experimental Analysis -- 5 Result and Discussion -- 6 Conclusion -- References -- RT-GATE: Concept of Micro Level Polarization in QCA -- 1 Introduction -- 2 QCA Basic Elements.
2.1 Universal Gates Based on Partial Polarization Technique -- 3 Proposed RT-Gate -- 4 Multiplexer -- 4.1 Proposed Multiplexer -- 5 Conclusion -- References -- Comparative Performance Analysis of Tanh-Apodized Fiber Bragg Grating and Gaussian-Apodized Fiber Bragg Grating as Hybrid Dispersion Compensation Model -- 1 Introduction -- 2 Theory -- 2.1 Dispersion Compensation Fiber -- 2.2 Fiber Bragg Grating -- 3 Experimental Results -- 4 Conclusion -- References -- Performance Comparison of Adaptive Mobility Management Scheme with IEEE 802.11s to Handle Internet Traffic -- 1 Introduction -- 2 Hybrid Wireless Mesh Protocol -- 3 Adaptive Mobility Management Technique -- 4 Numerical Analysis -- 4.1 Handoff Cost -- 4.2 Packet Delivery Cost -- 5 Comparison and Simulation -- 5.1 Impact of Network Load -- 5.2 Impact of External STA Speed -- 6 Comparison of Numerical Results and Simulation -- 7 Conclusion and Future Work -- References -- Automatic Attendance Management System Using Face Detection and Face Recognition -- 1 Introduction -- 2 Related Works -- 2.1 Attendance System Using Image Processing Techniques -- 2.2 Attendance System Using Face Detection and Face Recognition -- 2.3 Attendance System Using Deep Learning Framework -- 2.4 Deep Learning Paradigm for Attendance Systems -- 2.5 Attendance System Using FaceNet and SVM -- 3 Motivation -- 4 Proposed System -- 4.1 Input -- 4.2 Image Pre-Processing -- 4.3 Image Processing -- 4.4 Face Classification -- 4.5 Testing -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- ESIT: An Enhanced Lightweight Algorithm for Secure Internet of Things -- 1 Introduction -- 2 Related Works -- 3 Proposed Framework -- 3.1 Key Generation -- 3.2 Encryption -- 3.3 Decryption -- 4 Observations -- 4.1 Evaluation Parameters -- 5 Conclusion -- References.
A Novel Block Diagonalization Algorithm to Suppress Inter-user Interference in a Multi-user Mimo System -- 1 Introduction -- 2 Proposed Methodology -- 2.1 System Model -- 2.2 Broadcast Channel Transmission via Block Diagonalization -- 3 Simulation and Results -- 4 Conclusion -- References -- Prediction of Chemical Contamination for Water Quality Assurance Using ML-Based Techniques -- 1 Introduction -- 2 Related Works -- 3 Study Site -- 4 Materials and Methods -- 4.1 Machine Learning Algorithms -- 5 Results and Discussion -- 5.1 Performance Evaluation -- 6 Conclusion -- References -- Design and Performance Analysis of Two-Port Circularly Polarized MIMO Antenna for UWB Applications -- 1 Introduction -- 2 Antenna Design and Configuration -- 2.1 Evolution Process of the Proposed Antenna -- 2.2 Parametric Study -- 2.3 Surface Current -- 3 Results and Discussion -- 4 Conclusion -- References -- Intelligent Traffic Control System for Emergency Vehicles -- 1 Introduction -- 2 Related Work -- 3 The Proposed Protocol -- 3.1 Problem Statement -- 3.2 Intelligent Traffic Control Model -- 4 Experimental Analysis -- 4.1 Simulation Study -- 4.2 Evaluation Methodology and Parameters -- 4.3 Experimental Results -- 5 Conclusion and Acknowledgement -- References -- Digital Controller-Based Automated Drainage Water Monitoring and Controlling -- 1 Introduction -- 2 Block Diagram -- 3 Implementation of the Project Using PLC -- 4 Results and Discussions -- 4.1 Detailed Description of Stages -- 4.2 PH Level Indications -- 5 Conclusions -- References -- Cooperative Agent-Based Location Validation for Vehicular Clouds -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Security Analysis -- 5 Conclusion -- References -- An Analytical Approach for Traffic Grooming Problems Using Waiting Probability in WDM Networks -- 1 Introduction -- 2 Related Work.
3 Proposed Technique -- 4 Results and Discussions -- 5 Conclusion -- References -- Flow-Based Detection and Mitigation of Low-Rate DDOS Attack in SDN Environment Using Machine Learning Techniques -- 1 Introduction -- 2 Background and Related Work -- 2.1 Software Defined Networking -- 2.2 Low-Rate DDoS Attack -- 2.3 Related Work -- 3 Architectural Design -- 3.1 Detection Phase -- 3.2 Mitigation Phase -- 3.3 Algorithm -- 4 Experimental Setup -- 4.1 Environment Setup -- 4.2 Dataset -- 4.3 Evaluation Metrics -- 5 Conclusion -- References -- Design and Simulation of MEMS Based Capacitive Accelerometer -- 1 Introduction -- 2 Structure Design and Working Phenomenon -- 3 Mathematical Analysis -- 3.1 To Find the Natural Frequency of the Accelerometers -- 3.2 To Find the Damping Ratio of the Accelerometers -- 3.3 To Find the Static Capacitance of the Accelerometers -- 3.4 To Find the Displacements Sensitivity of the Accelerometers -- 4 Simulation and Results -- 4.1 Model X -- 4.2 Model Y -- 4.3 Simulations to Check Variation of Mass and Dimensions of the Proof Mass Over Resonant Frequency -- 4.4 MATALAB Simulations -- 5 Results and Discussions -- 6 Conclusion and Future Scope -- References -- Transport Tracking Using RFID and GSM Based Technique -- 1 Introduction -- 2 Literature Review -- 3 Design and Implementation -- 3.1 Pic 16f877a -- 3.2 RFID Tag -- 3.3 RFID Reader -- 3.4 Temperature Sensor -- 3.5 Accelerated Tilt Sensor -- 3.6 Gas Sensor -- 3.7 GPS Module -- 3.8 GSM Module -- 4 Hardware Implementation -- 5 Results and Discussions -- 6 Conclusion -- References -- An Ultra-Wide Band Patch Antenna for Commercial Communication Applications -- 1 Introduction -- 2 Design of Lotus-Shaped UWB Antenna -- 3 Results and Discussions -- 4 Conclusion -- References -- 8-Bit Carry Look Ahead Adder Using MGDI Technique -- 1 Introduction -- 2 Literature Review.
2.1 Working of CLA -- 3 Methodology -- 3.1 Mod-GDI Technology -- 3.2 Design of 8-bit CLA -- 3.3 Design of AND Gate in MGDI Technique -- 3.4 Design of OR Gate in MGDI Technique -- 3.5 Design of XOR Gate in MGDI Technique -- 3.6 Design of 8-bit CLA in MGDI Technique -- 4 Results and Discussions -- 5 Conclusion -- References -- Improved Scientific Workflow Scheduling Algorithm with Distributed Heft Ranking and TBW Scheduling Method -- 1 Introduction -- 2 Literature Review -- 3 Proposed Ideology -- 3.1 Proposed Representation -- 3.2 Proposed Flowchart and Phases of Proposed Methodology -- 4 Conclusion -- References -- Selection of OLAP Materialized Cube by Using a Fruit Fly Optimization (FFO) Approach: A Multidimensional Data Model -- 1 Introduction -- 2 The Fruit Fly Optimization (FFO) Approach for Selection of OLAP Materialized Cube (A Multidimensional Data Model) -- 2.1 FFO Approach -- 2.2 Lattice Structure -- 2.3 Cube Selection Using FFO Approach -- 3 Result and Analysis -- 4 Conclusion -- References -- Fault Tolerant Multimedia Caching Strategy for Information-Centric Networking -- 1 Introduction -- 2 Related Work -- 3 Problem Statement and Objectives -- 4 System Model -- 5 Implementation -- 5.1 Calculation of Chunk Size -- 5.2 Download File -- 6 Performance Evaluation -- 6.1 Download Time -- 6.2 Throughput -- 7 Conclusion -- References -- Sizing of Wireless Networks with Sensors for Smart Houses with Coverage, Capacity, and Interference Restrictions -- 1 Introduction -- 2 Network Dimensioning Wireless -- 3 Problem Formulation -- 4 Analysis of Results -- 5 Conclusions -- References -- Cloud-Based Parkinson Disease Prediction System Using Expanded Cat Swarm Optimization -- 1 Introduction -- 2 Related Works -- 3 Cloud-Based Parkinson Disease Prediction System -- 3.1 ECSO-Based Feature Selection -- 3.2 Decision Prediction Classifier Model.
4 Experimental Evaluation.
Titolo autorizzato: IoT and analytics for sensor networks  Visualizza cluster
ISBN: 981-16-2919-6
981-16-2918-8
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910743366803321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture notes in networks and systems ; ; Volume 244.