Advanced Machine Learning and Deep Learning Approaches for Remote Sensing / / edited by Gwanggil Jeon |
Pubbl/distr/stampa | [Place of publication not identified] : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2023 |
Descrizione fisica | 1 online resource (362 pages) |
Disciplina | 621.3678 |
Soggetto topico |
Deep learning (Machine learning)
Machine learning Remote sensing |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910734348503321 |
[Place of publication not identified] : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial Intelligence-Based Learning Approaches for Remote Sensing |
Autore | Jeon Gwanggil |
Pubbl/distr/stampa | Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 |
Descrizione fisica | 1 electronic resource (382 p.) |
Soggetto topico |
Technology: general issues
History of engineering & technology Environmental science, engineering & technology |
Soggetto non controllato |
pine wilt disease dataset
GIS application visualization test-time augmentation object detection hard negative mining video synthetic aperture radar (SAR) moving target shadow detection deep learning false alarms missed detections synthetic aperture radar (SAR) on-board ship detection YOLOv5 lightweight detector remote sensing image spectral domain translation generative adversarial network paired translation synthetic aperture radar ship instance segmentation global context modeling boundary-aware box prediction land-use and land-cover built-up expansion probability modelling landscape fragmentation machine learning support vector machine frequency ratio fuzzy logic artificial intelligence remote sensing interferometric phase filtering sparse regularization (SR) deep learning (DL) neural convolutional network (CNN) semantic segmentation open data building extraction unet deeplab classifying-inversion method AIS atmospheric duct ship detection and classification rotated bounding box attention feature alignment weather nowcasting ResNeXt radar data spectral-spatial interaction network spectral-spatial attention pansharpening UAV visual navigation Siamese network multi-order feature MIoU imbalanced data classification data over-sampling graph convolutional network semi-supervised learning troposcatter tropospheric turbulence intercity co-channel interference concrete bridge visual inspection defect deep convolutional neural network transfer learning interpretation techniques weakly supervised semantic segmentation |
ISBN | 3-0365-6084-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910639984703321 |
Jeon Gwanggil
![]() |
||
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cybersecurity Vigilance and Security Engineering of Internet of Everything / / edited by Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri |
Autore | Naseer Qureshi Kashif |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (229 pages) |
Disciplina | 621.382 |
Altri autori (Persone) |
NeweThomas
JeonGwanggil ChehriAbdellah |
Collana | Internet of Things, Technology, Communications and Computing |
Soggetto topico |
Telecommunication
Cooperating objects (Computer systems) Internet of things Security systems Communications Engineering, Networks Cyber-Physical Systems Internet of Things Security Science and Technology |
ISBN | 3-031-45162-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Part A: Security Threats and Vulnerabilities -- Internet of Everything: Evolution and fundamental concepts -- Cybersecurity Threats and Attacks in IoE Networks -- Attacks Detection Mechanism for IoE Networks -- Cyber Resilience, Principles, and Practices -- Future Cybersecurity Challenges for IoE Networks -- Part B: Security Vigilance and Security Engineering for IoE Networks -- Networking and Security Architectures for IoE Networks -- Machine Learning-Based Detection and Prevention Systems for IoE -- Role of Blockchain Models for IoE Infrastructures and Applications -- Cybersecurity as a Service -- Big data Analytics for Cybersecurity in IoE Networks -- Cybersecurity Standards and Policies for CPS in IoE -- Future Privacy, and Trust Challenges for IoE Networks -- Conclusion. |
Record Nr. | UNINA-9910767586503321 |
Naseer Qureshi Kashif
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data analytics for internet of things infrastructure / / Rohit Sharma, Gwanggil Jeon, Yan Zhang, editors |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2023 |
Descrizione fisica | 1 online resource (xv, 326 pages) : illustrations |
Disciplina | 004.678 |
Altri autori (Persone) |
SharmaRohit (Rohit Y.)
JeonGwanggil ZhangYan |
Collana | Internet of Things Series |
ISBN | 3-031-33808-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Key Features -- Contents -- About the Editors -- Big Data in Cloud Today: A Comprehensive Survey -- 1 Introduction -- 2 Characteristics of Big Data -- 3 Classification of Big Data -- 4 Importance of Big Data -- 5 Examples for Big Data -- 6 Tools and Techniques -- 7 Big Data Analytics and Its Benefits -- 8 Cloud Computing -- 9 Working of Cloud Computing -- 10 Conclusion -- References -- Cloud of Things Platform for a Water Meter Network -- 1 Introduction -- 2 Related Work and Problem Motivation -- 2.1 Related Work -- 2.2 IoT Paradigm -- 2.3 Problem Motivation -- 3 Proposed IoT Architecture -- 3.1 System Model -- 3.2 Methodology -- 3.3 Development of Active Switch -- 3.4 Development of an Active Sensor -- 3.5 Integration -- 4 Simulation and Result -- 4.1 Setup Process -- 4.2 Analysis -- 5 Conclusion -- References -- Online Newspaper Development within the Internet of Things Environment: The Role of Computer-Mediated Communication -- 1 Computer-Mediated Communication -- 2 Scholarly Information Related to CMC -- 3 CMC and Development of Online Newspapers -- 3.1 Advantages of Online Newspapers -- 3.2 Delivery of Online News and Information -- 3.3 CMC Journalism Is a Better Option -- 4 Interactivity with News Through CMC and Issues Within IoT Environment -- 4.1 CMC as a Tool for Organizations and Governments to Spread Information and News -- 4.2 The Use of Social Media and Its Social Outcomes Concerning CMC -- 4.3 Emerging Issues Related to the Use of CMC -- 4.4 Reconfiguration of Territorially and Interest-Based Associations -- 4.5 Introduction of New Artifacts and Their Social Outcomes -- 4.6 The Mutual Shaping of Consumers and Technologies -- 5 Conclusion -- References -- FATS (Fuzzy Authentication to Provide Trust-Based Security) in VANET to Mitigate Black Hole Attack -- 1 Introduction -- 2 VANET Architecture.
3 Attacks and Threats Generated in VANET -- 3.1 Selfish Node Attack -- 3.2 Jellyfish Attack -- 3.3 Data Flooding Attack -- 3.4 Black Hole Attack -- 4 Prominent Issues Caused by a Black Hole Node -- 5 Fuzzy Logic and Its Role in the Proposed Approach -- 5.1 Introduction About Fuzzy Logic -- 5.2 Mamdani Fuzzy Inference System -- 5.2.1 Max-Min Inference Method -- 5.2.2 Max-product inference method -- 6 Fuzzy Logic Trust-Based Authentication Schemes in VANET -- 7 Proposed Algorithm FATS (Fuzzy Authentication to Provide Trust-Based Security) for Black Hole Attack Detection -- 7.1 Pseudocode for Providing a Communication Link to the New Node -- 7.2 Formation of Fuzzy Rules Using Mamdani Inference System in MATLAB -- 8 Implementation of FATS -- 9 Conclusion -- References -- AI-Based Chatbot Agents as Drivers of Purchase Intentions: An Interdisciplinary Study -- 1 Introduction -- 2 Conceptual Background and Development of Hypothesis -- 3 Informational Support of Chatbots and Predicting Purchase Intentions -- 4 Trust, Emotional Credibility, and Predicting Purchase Intentions -- 5 Research Gap -- 6 Objectives -- 7 Methods -- 7.1 Sampling Framework and Questionnaire Design -- 7.2 Measures -- 8 Research Tools and Techniques -- 9 Measurement Model -- 10 Analysis of Structural Model -- 11 Conclusion and Future Research Works -- 12 Limitations -- References -- An Intelligent Model for Identifying Fluctuations in the Stock Market and Predicting Investment Policies with Guaranteed Returns -- 1 Introduction -- 2 Literature Survey -- 3 Impact of Big Data in Stock Market -- 3.1 Big Data -- 3.1.1 Big Data Architecture -- 3.2 Structure of Big Data -- 3.2.1 Structured Data -- 3.2.2 Unstructured Data -- 3.2.3 Semistructured Data -- 3.3 Big Data in the Stock Market -- 3.4 Nature of Dynamic Data in the Stock Market -- 4 Proposed Model (Fig. 2) -- 4.1 Objectives. 4.2 Mathematical Implementation -- 4.2.1 Statistical Analysis -- 4.2.2 Fuzzy Inferences -- 5 Implementation -- 5.1 Data Preparation -- 5.2 Data Cleaning and Data Preprocessing -- 5.2.1 Data Normalisation -- 5.3 Fuzzy Inference -- 5.3.1 Axis Bank -- 5.3.2 Tata Steel -- 5.3.3 Titan -- 5.3.4 Threshold Value -- 5.3.5 Parameters -- 5.3.6 Fuzzy Rules -- 6 Results and Discussion -- 6.1 Performance Analysis -- 7 Conclusion -- References -- Sandwiched Metasurface Antenna for Small Spacecrafts in IoT Infrastructure -- 1 Introduction -- 2 Antenna Design and Geometrical Analysis -- 3 Results, Data Analysis, and Discussions -- 4 Conclusions and Future Works -- References -- Development of Laser-Beam Cutting-Edge Technology and IOT-Based Race Car Lapse Time Computational System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Block Diagram -- 3.2 Simulation of Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Study of Cloud-Based Solution for Data Analytics -- 1 Introduction -- 2 Methodology -- 2.1 Amazon Web Services (AWS) Cloud Platform for Data Analytics -- 2.1.1 Architecture Study of a Data Analytics System Using AWS -- 2.1.2 Data Ingestion and Processing -- 2.1.3 Data Preparation -- 2.1.4 AI/ML Workbench -- 2.2 Google Cloud Platform (GCP) for Data Analytics -- 2.2.1 Architecture Study of a Data Analytics System Using GCP -- 2.2.2 Data Ingestion and Processing -- 2.2.3 Data Preparation -- 3 Comparative Analysis of Services Required from AWS and GCP -- 4 Challenges -- 5 Conclusion -- References -- An Intelligent Model for Optimizing Sparsity Problem Toward Movie Recommendation Paradigm Using Machine Learning -- 1 Introduction -- 2 Similar Works Done -- 3 Fundamentals of Big Data -- 3.1 Properties of Big Data -- 3.2 Big Data in Entertainment Industry -- 3.2.1 Uses of Big Data in Media and Entertainment. 4 Proposed Model -- 4.1 Mathematical Background -- 4.2 Ant Colony Optimization (ACO) -- 4.2.1 Theoretical Considerations on ACO -- 4.3 Data Preparation -- 5 Results and Discussion -- 5.1 Performance Analysis -- 5.1.1 Evaluation Metrics -- 6 Conclusion -- References -- Techniques to Identify Image Objects Under Adverse Environmental Conditions: A Systematic Literature Review -- 1 Introduction -- 1.1 Morphological Operations on Image -- 1.2 Impact of the Environment on Objects -- 2 Methodology and Research Description -- 3 Findings and Results -- 4 Conclusion -- References -- Technology-Enhanced Teaching and Learning During the COVID-19 Pandemic -- 1 Introduction -- 2 Current Perspectives on Technology-Enhanced Language Teaching and Learning -- 3 Computer-Mediated Communication and Interaction Approach -- 4 Research on Remote Teaching in Crisis Situations -- 5 Technology Acceptance Model -- 6 Responsive Online Teaching in Crises -- 7 Bloom's Digital Taxonomy -- 8 Recommendations -- 9 Conclusion -- References -- The Symbiotic Relation of IoT and AI for Applications in Various Domains: Trends and Future Directions -- 1 Introduction -- 2 Recent Works on IoT and AI in Various Domains -- 2.1 Healthcare -- 2.2 Sustainability -- 2.3 Information Security -- 2.4 Education -- 2.5 Pollution Monitoring (Table 5) -- 2.6 Robotics (Table 6) -- 2.7 Other Related Works -- 3 Conclusion and Future Directions -- References -- Text Summarization for Big Data Analytics: A Comprehensive Review of GPT 2 and BERT Approaches -- 1 Introduction -- 2 Related Works -- 2.1 Text Summarization Using Deep Learning -- 2.2 Need for Text Summarization in Big Data Analytics -- 3 BERT -- 3.1 BERT Architecture -- 3.2 Phases in Generating the Summary -- 3.2.1 Input Document -- 3.2.2 Interval Segment Embedding -- 3.2.3 Embedding -- 3.2.4 Segment Embeddings -- 3.2.5 Position Embeddings. 3.2.6 Summarization -- 3.2.7 Inter Sentence Transformer -- 4 GPT-2 -- 5 Experiment Setup -- 5.1 About the Dataset -- 5.2 Training the Models -- 5.3 Evaluation Metrics -- 5.4 Summary Snippets -- 6 Comparison of Results -- 7 Conclusion -- References -- Leveraging Secured E-Voting Using Decentralized Blockchain Technology -- 1 Introduction -- 2 Blockchain -- 2.1 What Is Blockchain? -- 2.2 Working of a Blockchain -- 2.2.1 Elliptic Curve Digital Signature Technique (ECDSA) -- 2.3 Features of Blockchain Technology -- 2.3.1 Immutability -- 2.3.2 Auditability -- 2.3.3 Persistency -- 2.3.4 Decentralization -- 2.3.5 Anonymity -- 3 Types, Consensus Protocols, and Unfilled Gaps -- 3.1 Types of Blockchain -- 3.1.1 Public Blockchain -- 3.1.2 Private Blockchain -- 3.1.3 Consortium Blockchain -- 3.1.4 Hybrid Blockchain -- 3.2 Consensus Protocols -- 3.2.1 Proof of Work -- 3.2.2 Proof of Burn -- 3.2.3 Proof of Stake -- 3.2.4 Delegated Proof of Stake -- 3.2.5 Proof of Elapsed Time -- 3.2.6 Proof of Participation -- 3.2.7 Proof of Authority -- 3.2.8 Proof of Importance -- 3.2.9 Proof of Capacity -- 3.2.10 Proof of History -- 3.3 Challenges Faced by Existing Systems -- 3.3.1 Paper and Ballot Systems -- 3.3.2 Digital E-Voting Systems -- 4 Recent Advances -- 5 Conclusion -- References -- Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends -- 1 The Internet of Things -- 2 Architecture and Technologies of IoT -- 3 Security Requirements in Distributed IoT Applications -- 4 Existing Challenges and Issues in IoT -- 4.1 Security Issues in the Network Layer -- 4.2 Security Issues at Physical Layer -- 5 Countermeasures for Security in IoT -- 5.1 Attacks on and Threats to IoT -- 5.2 Defenses Against IoT Attacks on Each Layer -- 6 Privacy Issues in IoT -- 6.1 Existing Security Models for IoT Networks -- 7 The Future of IoT -- 7.1 Top-Ten IoT Developments. |
Record Nr. | UNISA-996550554203316 |
Cham : , : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Data analytics for internet of things infrastructure / / Rohit Sharma, Gwanggil Jeon, Yan Zhang, editors |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2023 |
Descrizione fisica | 1 online resource (xv, 326 pages) : illustrations |
Disciplina | 004.678 |
Altri autori (Persone) |
SharmaRohit (Rohit Y.)
JeonGwanggil ZhangYan |
Collana | Internet of Things Series |
ISBN | 3-031-33808-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Key Features -- Contents -- About the Editors -- Big Data in Cloud Today: A Comprehensive Survey -- 1 Introduction -- 2 Characteristics of Big Data -- 3 Classification of Big Data -- 4 Importance of Big Data -- 5 Examples for Big Data -- 6 Tools and Techniques -- 7 Big Data Analytics and Its Benefits -- 8 Cloud Computing -- 9 Working of Cloud Computing -- 10 Conclusion -- References -- Cloud of Things Platform for a Water Meter Network -- 1 Introduction -- 2 Related Work and Problem Motivation -- 2.1 Related Work -- 2.2 IoT Paradigm -- 2.3 Problem Motivation -- 3 Proposed IoT Architecture -- 3.1 System Model -- 3.2 Methodology -- 3.3 Development of Active Switch -- 3.4 Development of an Active Sensor -- 3.5 Integration -- 4 Simulation and Result -- 4.1 Setup Process -- 4.2 Analysis -- 5 Conclusion -- References -- Online Newspaper Development within the Internet of Things Environment: The Role of Computer-Mediated Communication -- 1 Computer-Mediated Communication -- 2 Scholarly Information Related to CMC -- 3 CMC and Development of Online Newspapers -- 3.1 Advantages of Online Newspapers -- 3.2 Delivery of Online News and Information -- 3.3 CMC Journalism Is a Better Option -- 4 Interactivity with News Through CMC and Issues Within IoT Environment -- 4.1 CMC as a Tool for Organizations and Governments to Spread Information and News -- 4.2 The Use of Social Media and Its Social Outcomes Concerning CMC -- 4.3 Emerging Issues Related to the Use of CMC -- 4.4 Reconfiguration of Territorially and Interest-Based Associations -- 4.5 Introduction of New Artifacts and Their Social Outcomes -- 4.6 The Mutual Shaping of Consumers and Technologies -- 5 Conclusion -- References -- FATS (Fuzzy Authentication to Provide Trust-Based Security) in VANET to Mitigate Black Hole Attack -- 1 Introduction -- 2 VANET Architecture.
3 Attacks and Threats Generated in VANET -- 3.1 Selfish Node Attack -- 3.2 Jellyfish Attack -- 3.3 Data Flooding Attack -- 3.4 Black Hole Attack -- 4 Prominent Issues Caused by a Black Hole Node -- 5 Fuzzy Logic and Its Role in the Proposed Approach -- 5.1 Introduction About Fuzzy Logic -- 5.2 Mamdani Fuzzy Inference System -- 5.2.1 Max-Min Inference Method -- 5.2.2 Max-product inference method -- 6 Fuzzy Logic Trust-Based Authentication Schemes in VANET -- 7 Proposed Algorithm FATS (Fuzzy Authentication to Provide Trust-Based Security) for Black Hole Attack Detection -- 7.1 Pseudocode for Providing a Communication Link to the New Node -- 7.2 Formation of Fuzzy Rules Using Mamdani Inference System in MATLAB -- 8 Implementation of FATS -- 9 Conclusion -- References -- AI-Based Chatbot Agents as Drivers of Purchase Intentions: An Interdisciplinary Study -- 1 Introduction -- 2 Conceptual Background and Development of Hypothesis -- 3 Informational Support of Chatbots and Predicting Purchase Intentions -- 4 Trust, Emotional Credibility, and Predicting Purchase Intentions -- 5 Research Gap -- 6 Objectives -- 7 Methods -- 7.1 Sampling Framework and Questionnaire Design -- 7.2 Measures -- 8 Research Tools and Techniques -- 9 Measurement Model -- 10 Analysis of Structural Model -- 11 Conclusion and Future Research Works -- 12 Limitations -- References -- An Intelligent Model for Identifying Fluctuations in the Stock Market and Predicting Investment Policies with Guaranteed Returns -- 1 Introduction -- 2 Literature Survey -- 3 Impact of Big Data in Stock Market -- 3.1 Big Data -- 3.1.1 Big Data Architecture -- 3.2 Structure of Big Data -- 3.2.1 Structured Data -- 3.2.2 Unstructured Data -- 3.2.3 Semistructured Data -- 3.3 Big Data in the Stock Market -- 3.4 Nature of Dynamic Data in the Stock Market -- 4 Proposed Model (Fig. 2) -- 4.1 Objectives. 4.2 Mathematical Implementation -- 4.2.1 Statistical Analysis -- 4.2.2 Fuzzy Inferences -- 5 Implementation -- 5.1 Data Preparation -- 5.2 Data Cleaning and Data Preprocessing -- 5.2.1 Data Normalisation -- 5.3 Fuzzy Inference -- 5.3.1 Axis Bank -- 5.3.2 Tata Steel -- 5.3.3 Titan -- 5.3.4 Threshold Value -- 5.3.5 Parameters -- 5.3.6 Fuzzy Rules -- 6 Results and Discussion -- 6.1 Performance Analysis -- 7 Conclusion -- References -- Sandwiched Metasurface Antenna for Small Spacecrafts in IoT Infrastructure -- 1 Introduction -- 2 Antenna Design and Geometrical Analysis -- 3 Results, Data Analysis, and Discussions -- 4 Conclusions and Future Works -- References -- Development of Laser-Beam Cutting-Edge Technology and IOT-Based Race Car Lapse Time Computational System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Block Diagram -- 3.2 Simulation of Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Study of Cloud-Based Solution for Data Analytics -- 1 Introduction -- 2 Methodology -- 2.1 Amazon Web Services (AWS) Cloud Platform for Data Analytics -- 2.1.1 Architecture Study of a Data Analytics System Using AWS -- 2.1.2 Data Ingestion and Processing -- 2.1.3 Data Preparation -- 2.1.4 AI/ML Workbench -- 2.2 Google Cloud Platform (GCP) for Data Analytics -- 2.2.1 Architecture Study of a Data Analytics System Using GCP -- 2.2.2 Data Ingestion and Processing -- 2.2.3 Data Preparation -- 3 Comparative Analysis of Services Required from AWS and GCP -- 4 Challenges -- 5 Conclusion -- References -- An Intelligent Model for Optimizing Sparsity Problem Toward Movie Recommendation Paradigm Using Machine Learning -- 1 Introduction -- 2 Similar Works Done -- 3 Fundamentals of Big Data -- 3.1 Properties of Big Data -- 3.2 Big Data in Entertainment Industry -- 3.2.1 Uses of Big Data in Media and Entertainment. 4 Proposed Model -- 4.1 Mathematical Background -- 4.2 Ant Colony Optimization (ACO) -- 4.2.1 Theoretical Considerations on ACO -- 4.3 Data Preparation -- 5 Results and Discussion -- 5.1 Performance Analysis -- 5.1.1 Evaluation Metrics -- 6 Conclusion -- References -- Techniques to Identify Image Objects Under Adverse Environmental Conditions: A Systematic Literature Review -- 1 Introduction -- 1.1 Morphological Operations on Image -- 1.2 Impact of the Environment on Objects -- 2 Methodology and Research Description -- 3 Findings and Results -- 4 Conclusion -- References -- Technology-Enhanced Teaching and Learning During the COVID-19 Pandemic -- 1 Introduction -- 2 Current Perspectives on Technology-Enhanced Language Teaching and Learning -- 3 Computer-Mediated Communication and Interaction Approach -- 4 Research on Remote Teaching in Crisis Situations -- 5 Technology Acceptance Model -- 6 Responsive Online Teaching in Crises -- 7 Bloom's Digital Taxonomy -- 8 Recommendations -- 9 Conclusion -- References -- The Symbiotic Relation of IoT and AI for Applications in Various Domains: Trends and Future Directions -- 1 Introduction -- 2 Recent Works on IoT and AI in Various Domains -- 2.1 Healthcare -- 2.2 Sustainability -- 2.3 Information Security -- 2.4 Education -- 2.5 Pollution Monitoring (Table 5) -- 2.6 Robotics (Table 6) -- 2.7 Other Related Works -- 3 Conclusion and Future Directions -- References -- Text Summarization for Big Data Analytics: A Comprehensive Review of GPT 2 and BERT Approaches -- 1 Introduction -- 2 Related Works -- 2.1 Text Summarization Using Deep Learning -- 2.2 Need for Text Summarization in Big Data Analytics -- 3 BERT -- 3.1 BERT Architecture -- 3.2 Phases in Generating the Summary -- 3.2.1 Input Document -- 3.2.2 Interval Segment Embedding -- 3.2.3 Embedding -- 3.2.4 Segment Embeddings -- 3.2.5 Position Embeddings. 3.2.6 Summarization -- 3.2.7 Inter Sentence Transformer -- 4 GPT-2 -- 5 Experiment Setup -- 5.1 About the Dataset -- 5.2 Training the Models -- 5.3 Evaluation Metrics -- 5.4 Summary Snippets -- 6 Comparison of Results -- 7 Conclusion -- References -- Leveraging Secured E-Voting Using Decentralized Blockchain Technology -- 1 Introduction -- 2 Blockchain -- 2.1 What Is Blockchain? -- 2.2 Working of a Blockchain -- 2.2.1 Elliptic Curve Digital Signature Technique (ECDSA) -- 2.3 Features of Blockchain Technology -- 2.3.1 Immutability -- 2.3.2 Auditability -- 2.3.3 Persistency -- 2.3.4 Decentralization -- 2.3.5 Anonymity -- 3 Types, Consensus Protocols, and Unfilled Gaps -- 3.1 Types of Blockchain -- 3.1.1 Public Blockchain -- 3.1.2 Private Blockchain -- 3.1.3 Consortium Blockchain -- 3.1.4 Hybrid Blockchain -- 3.2 Consensus Protocols -- 3.2.1 Proof of Work -- 3.2.2 Proof of Burn -- 3.2.3 Proof of Stake -- 3.2.4 Delegated Proof of Stake -- 3.2.5 Proof of Elapsed Time -- 3.2.6 Proof of Participation -- 3.2.7 Proof of Authority -- 3.2.8 Proof of Importance -- 3.2.9 Proof of Capacity -- 3.2.10 Proof of History -- 3.3 Challenges Faced by Existing Systems -- 3.3.1 Paper and Ballot Systems -- 3.3.2 Digital E-Voting Systems -- 4 Recent Advances -- 5 Conclusion -- References -- Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends -- 1 The Internet of Things -- 2 Architecture and Technologies of IoT -- 3 Security Requirements in Distributed IoT Applications -- 4 Existing Challenges and Issues in IoT -- 4.1 Security Issues in the Network Layer -- 4.2 Security Issues at Physical Layer -- 5 Countermeasures for Security in IoT -- 5.1 Attacks on and Threats to IoT -- 5.2 Defenses Against IoT Attacks on Each Layer -- 6 Privacy Issues in IoT -- 6.1 Existing Security Models for IoT Networks -- 7 The Future of IoT -- 7.1 Top-Ten IoT Developments. |
Record Nr. | UNINA-9910746286103321 |
Cham : , : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Analytics for Smart Grids Applications--A Key to Smart City Development |
Autore | Kumar Sharma Devendra |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (466 pages) |
Altri autori (Persone) |
SharmaRohit
JeonGwanggil KumarRaghvendra |
Collana | Intelligent Systems Reference Library |
ISBN | 3-031-46092-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- About This Book -- Key Features -- Contents -- About the Editors -- 1 Data Analytics for Smart Grids and Applications-Present and Future Directions -- 1.1 Introduction -- 1.2 Literature Review -- 1.3 Smart Grid Infrastructure -- 1.4 Data Analytics in Smart Grids -- 1.4.1 Data Pre Processing Techniques in Smart Grids -- 1.4.2 Case Study of Data Analytics in Smart Grids -- 1.5 Artificial Intelligence in Smart Grids -- 1.5.1 Event Detection Using Data Analytics and Cloud Computing for Intelligent IoT System -- 1.6 Conclusion -- References -- 2 Design, Optimization and Performance Analysis of Microgrids Using Multi-agent Q-Learning -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Proposed Model -- 2.4 Experiments -- 2.5 Conclusion -- References -- 3 Big Data Analytics for Smart Grid: A Review on State-of-Art Techniques and Future Directions -- 3.1 Introduction -- 3.2 State-of-Art Techniques for Big Data Analytics in Smart Grids -- 3.3 Challenges in Big Data Analytics for Smart Grids -- 3.4 Big Data Analytics for Smart Grids -- 3.5 Applications of Big Data Analytics in Smart Grids -- 3.6 Challenges and Future Directions for Big Data Analytics in Smart Grids -- 3.7 Case Studies of Big Data Analytics in Smart Grids -- 3.7.1 Case Study 1: Duke Energy's Grid Modernization Program -- 3.7.2 Case Study 2: National Grid's Smart Grid Program -- 3.7.3 Case Study 3: ENEL's Smart Grid Program -- 3.8 Future Directions for Big Data Analytics in Smart Grids -- 3.9 Real-Time Big Data Analytics for Smart Grids -- 3.10 Conclusion -- References -- 4 Smart Grid Management for Smart City Infrastructure Using Wearable Sensors -- 4.1 Introduction -- 4.1.1 Smart Grid Versus Traditional Electricity Grids -- 4.1.2 Why Do We Need Smart Grids? -- 4.1.3 Smart Grid Features -- 4.1.4 Smart Grid Technologies -- 4.1.5 Smart Grid Approaches.
4.1.6 Smart Meters and Home EMS -- 4.1.7 Smart Appliances -- 4.1.8 Home Power Generation -- 4.1.9 Machine Learning for Data Analytics in Smart Grids and Energy Management -- 4.1.10 Security for Industrial Control Systems in Smart Grids -- 4.1.11 Power Flow Modelling and Optimization in Smart Grids -- 4.1.12 Grid Stability and Security in Smart Grids -- 4.1.13 Integration of Renewable Energy Sources in Smart Grid Management -- 4.1.14 Demand Response Strategies for Efficient Smart Grid Management -- 4.1.15 Cybersecurity Measures for Smart Grid Management -- 4.1.16 Energy Storage Systems and Their Role in Smart Grid Management -- 4.1.17 Data Analytics and Artificial Intelligence in Smart Grid Management -- 4.1.18 Smart Grid Communication Protocols and Infrastructure -- 4.1.19 Advantages of Smart Grids -- 4.1.20 Disadvantages of Smart Grids -- 4.2 Conclusion -- References -- 5 Studies on Conventional and Advanced Machine Learning Algorithm Towards Framing of Robust Data Analytics for the Smart Grid Application -- 5.1 Introduction -- 5.2 Review of Different Smart Grid Based Approaches -- 5.3 Smart Grid Model -- 5.3.1 Smart Grids as Coordinators for Data Flow and Energy Flow -- 5.3.2 Big Data -- 5.4 Features of Big Data to Be Integrated into the Smart Grid -- 5.5 Contribution of the Smart Grid as Data Source -- 5.6 Smart Grid in Supply of Data Gathering -- 5.6.1 Data Transmission Methodology -- 5.6.2 Data Analysis Methodology -- 5.6.3 Data Extraction from Smart Grid -- 5.6.4 Grid for Production of Renewable Source of Energy -- 5.6.5 Big Data in Smart Grid -- 5.6.6 Machine Learning Approach to the Data Grid -- 5.6.7 Application of IOT to the Smart Grid Technology -- 5.7 IOT Based Solutions Towards Grid Problems -- 5.7.1 Stability of IOT Based Connection -- 5.7.2 Cost Effectiveness in Implementation -- 5.7.3 Security to the Information. 5.8 Application of Data Grid in Mobile Sink Based Wireless Sensor Network -- 5.8.1 Assumptions of Network Characteristics -- 5.9 Virtual Grid Architecture -- 5.9.1 Different Structures of Virtual Grids -- 5.9.2 Virtual Grid Construction Cost -- 5.9.3 Reading of the Smart Meter Data and Its Analysis by the Smart Grid with Future Prediction -- 5.9.4 Prediction Analysis of Smart Meter Data -- 5.10 Future Research Direction -- 5.11 Conclusion -- References -- 6 Prediction and Classification for Smart Grid Applications -- 6.1 Introduction -- 6.2 Smart Grid -- 6.3 Predictive and Classification Models in Smart Grid Applications -- 6.4 Predictive Modeling -- 6.5 Classification Modeling -- 6.6 Smart Grid Management -- 6.7 Intelligent Data Collection Devices -- 6.8 Data Science Pertaining to Smart Grid Analytics -- 6.9 Machine Learning for Data Analytics -- 6.10 Data Security for Smart Grid Applications -- 6.11 Conclusion -- References -- 7 A Review on Smart Metering Using Artificial Intelligence and Machine Learning Techniques: Challenges and Solutions -- 7.1 Introduction -- 7.1.1 Trends of the Smart Metering Systems -- 7.1.2 Challenges of Smart Meters -- 7.1.3 Key Elements of Smart Meter -- 7.1.4 IoT in Smart Metering -- 7.1.5 Integration of IoT with AI and Machine Learning for Smart Meter -- 7.1.6 Artificial Intelligence Techniques -- 7.2 Conclusion -- References -- 8 Machine Learning Applications for the Smart Grid Infrastructure -- 8.1 Introduction -- 8.2 IoT in Distribution System -- 8.3 Techniques Using Machine Learning -- 8.4 Conclusion -- References -- 9 A Privacy Mitigating Framework for the Smart Grid Internet of Things Data -- 9.1 Introduction -- 9.1.1 Overview of the Smart Grid and Its Significance in Modern Energy Systems -- 9.1.2 Introduction to the IoT and Its Integration with the Smart Grid -- 9.1.3 Importance of Privacy in Smart Grid IoT Data. 9.2 Privacy Challenges in Smart Grid IoT Data -- 9.3 Privacy Mitigation Techniques -- 9.4 Privacy Mitigation Framework for Smart Grid -- 9.4.1 Privacy Monitoring Engine Description -- 9.5 Results -- 9.6 Conclusion -- References -- 10 Protecting Future of Energy: Data Security and Privacy for Smart Grid Applications Using MATLAB -- 10.1 Introduction -- 10.1.1 Data Security and Privacy Threats -- 10.1.2 Data Security and Privacy Solutions -- 10.1.3 MATLAB Solution -- 10.1.4 Key Features and Capabilities -- 10.2 MATLAB Tools and Inbuilt Functions for Data Security in Applications of Smart Grid -- 10.3 MATLAB Functions for Data Security and Privacy in Smart Grid Applications Include -- 10.4 MATLAB Techniques for Data Security and Privacy in Smart Grid Applications -- 10.5 Matlab Algorithm for Privacy-Preserving Data Mining for Smart Grid Applications -- 10.6 Threats to Data Security and Privacy in Smart Grid Applications -- 10.6.1 Preventive Measures -- 10.7 Case Studies and Practical Implementations of Data Security and Privacy in Smart Grid Applications -- 10.7.1 Case Study 1: Securing Smart Meters Using Blockchain -- 10.7.2 Case Study 2: Machine Learning-Based Anomaly Detection in Power Grids -- 10.7.3 Case Study 3: Privacy-Preserving Data Aggregation in Smart Grids -- 10.7.4 Case Study 4: Secure Data Sharing in Smart Grids Using Homomorphic Encryption -- 10.7.5 Case Study 5: Anomaly Detection in Smart Grids Using Machine Learning (ML) with Matlab -- 10.8 Conclusion -- References -- 11 Revolutionizing Smart Grids with Big Data Analytics: A Case Study on Integrating Renewable Energy and Predicting Faults -- 11.1 Introduction -- 11.2 Current Trends in Smart Grid Based Big Data Analytics -- 11.2.1 There is a Notable Surge in Speculation in Smart Grid Projects and, Consequently, Smart Grid Analytics [9-11]. 11.2.2 Smart Grid Analytics Effectively Handle Real-Time Data Despite the Increased Speed and Diverse Requirements -- 11.2.3 Digital Technologies and Cloud Computing Will Continue to Improve, Facilitating Enhanced Data Computation Capabilities -- 11.2.4 Smart Grid and Its Benefits for Renewable Energy -- 11.3 Challenges of Smart Grid Analytics -- 11.3.1 Benefits of Analytics in Smart Grid -- 11.3.2 Trends in the Utility Industry -- 11.4 Technologies for Smart Grid Analytics and Its Importance -- 11.4.1 Business Intelligence (BI) and Data Analysis -- 11.4.2 Other Framework Technologies-Databases Such as Apache Hadoop, MapReduce, and SQL -- 11.4.3 The Significance of Big Data in Smart Grid Analytics -- 11.5 Gaining Perceptions Through a Smart Grid and Big Data: A Case Study -- 11.5.1 Case Studies in Focus -- 11.5.2 Smart Grid Based Data Analytics Use-Cases in Europe -- 11.6 Future and Scope of Big Data Analytics in Smart Grids -- 11.6.1 Customer Acceptance and Engagement -- 11.6.2 Regulatory Policies -- 11.6.3 Innovative Structures -- 11.7 Conclusion -- References -- 12 Fake User Account Detection in Online Social Media Networks Using Machine Learning and Neural Network Techniques -- 12.1 Introduction -- 12.1.1 Statistics of Social Media Usage -- 12.1.2 Why Are Fake Profiles Created? -- 12.2 Literature Review -- 12.3 Proposed System for Detecting Fake Accounts on Twitter Using AI -- 12.3.1 Artificial Neural Network (ANN) -- 12.3.2 Support Vector Machine (SVM) -- 12.3.3 Random Forest (RF) -- 12.4 Findings and Discussions -- 12.5 Conclusion -- References -- 13 Data Analytics for Smart Grids Applications to Improve Performance, Optimize Energy Consumption, and Gain Insights -- 13.1 Introduction -- 13.2 Leveraging Smart Grids for Predictive Energy Analytics -- 13.3 Big Data Analytics for Grid Resiliency and Security. 13.4 Machine Learning Techniques for Smart Grid Optimization. |
Record Nr. | UNINA-9910767529203321 |
Kumar Sharma Devendra
![]() |
||
Cham : , : Springer International Publishing AG, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|