Advanced Techniques for IoT Applications : Proceedings of EAIT 2020 |
Autore | Mandal Jyotsna Kumar |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (626 pages) |
Altri autori (Persone) | DeDebashis |
Collana | Lecture Notes in Networks and Systems Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-4435-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Advanced Techniques for IoT Applications |
Record Nr. | UNINA-9910497099003321 |
Mandal Jyotsna Kumar | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications of Networks, Sensors and Autonomous Systems Analytics : Proceedings of ICANSAA 2020 |
Autore | Mandal Jyotsna Kumar |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2022 |
Descrizione fisica | 1 online resource (363 pages) |
Altri autori (Persone) |
HincheyMike
SenSabyasachi BiswasPapun |
Collana | Studies in Autonomic, Data-Driven and Industrial Computing Ser. |
Soggetto genere / forma | Electronic books. |
ISBN |
9789811673054
9789811673047 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- 1 Application of IoT in Industries: A Survey of Security Concern -- 1 Introduction -- 1.1 Background -- 1.2 Architecture of IoT -- 2 Security Threats in IoT -- 2.1 Security Threats in Sensing Layer -- 2.2 Security Threats in Network Layer -- 2.3 Security Threats in Service Layer -- 2.4 Security Threats in Interface Layer -- 3 Conclusion -- References -- 2 A Survey on Autonomous Vehicles in the Field of Intelligent Transport System -- 1 Introduction -- 2 Domains of Interaction between Autonomous Vehicles and Humans -- 3 Analysis of Using Electronic Gadgets by Pedestrians and Drivers on Roads -- 4 Approaches for Collision Prevention in Autonomous Vehicle Technology Used in Intelligent Transports System -- 5 Context-Based Pedestrian Path Prediction -- 6 Hand, Eye, and Head Patterns at Intersections -- 7 Conclusion -- References -- 3 Decentralized Voting: A Blockchain-Based Voting System -- 1 Introduction -- 1.1 Decentralized Computing Systems -- 1.2 Blockchain -- 1.3 Ethereum -- 1.4 Smart Contacts -- 1.5 Digital Identity Management Using Blockchain-An Approach Towards Self Sovereign Identity -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Flow of User Registration in Decentralized Voting App -- 3.2 Flow of Admin/Electoral Admin in Decentralized Voting App -- 3.3 Candidate Voting in Decentralized Voting App -- 4 Result Analysis -- 5 Conclusions -- 6 Related Works -- References -- 4 Asymptotic Behaviour for First-Order Difference Equations I -- 1 Introduction -- 2 Sufficient Conditions for Oscillation -- References -- 5 Development of a Framework for Smart Energy Meter Reader Using Image Processing -- 1 Introduction -- 2 Literature Survey -- 3 Architectural Framework -- 4 Description -- 4.1 The Algorithm in the Digit Recognition System -- 5 Implementation and Output -- 6 Conclusion.
References -- 6 Real-Time Air Quality Monitoring System Based on IoT -- 1 Introduction -- 2 Methodology -- 2.1 Hardware Components -- 2.2 Workflow Diagram -- 3 Working Principle -- 4 Result and Discussion -- 5 Conclusion -- 6 Future Scope -- References -- 7 A Comparative Analysis of Sensor-Based Pipe Crack Detection System -- 1 Introduction -- 2 Sensor-Based Methods of Crack Detection -- 3 Comparative Discussion of Various Crack Detection Methods -- 4 Conclusion -- References -- 8 A Two Layer Dynamic Load Balancing Algorithm Applied in Cloud Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Load Balancing -- 2 Proposed Model -- 3 Result Analysis and Discussion -- References -- 9 Brief Study on the Usage of Smart Meter and Artificial Intelligence in Energy Savings -- 1 Introduction -- 2 Methodology -- 3 Result -- 4 Theoretical Deductions and Discussion -- 5 Conclusion -- References -- 10 Application of Blockchain in Healthcare Especially to Fight Against COVID-19-A Survey -- 1 Introduction -- 1.1 What is COVID-19? -- 1.2 Mechanism of Fast Affecting Peoples all Over the World -- 1.3 What is Blockchain Technology? [3] -- 2 What are the Involvements of Blockchain Technology in Healthcare [4] -- 2.1 Management of Medical Information -- 2.2 Evolution in the Medicine-Industry -- 2.3 Medical Tribunals -- 2.4 Safety of Information -- 2.5 Main Challenges of the Pandemic -- 3 Influence of Blockchain Technology in Stopping the COVID-19 [8-10] -- 3.1 Tracing in Spreading of Communicable Illnesses -- 3.2 Contributions Tracing -- 3.3 Crisis Management -- 3.4 Securing Medical Supply Chains -- 3.5 Sharing of Data -- 4 Blockchain Technology Adopted by the World Health Organization and Other Popular Companies to Compete with this Pandemic [1] -- 5 Conclusion -- References -- 11 A Novel Approach to Microgrid Fault Detection Using Empirical Mode Decomposition. 1 Introduction -- 1.1 Background -- 1.2 Microgrid System -- 1.3 Power System Faults -- 2 Literature Survey -- 3 Architecture of the Proposed Fault Diagnosis Approach -- 3.1 Process -- 4 Results -- 5 Conclusion -- References -- 12 Approximate computing: Error Tolerant Adder -- 1 Introduction -- 2 Brief Overview on Error Tolerant -- 3 Block Diagram -- 4 Functional Operation -- 5 Mathematical Deduction -- 6 Calculation of Accurate Section -- 7 Calculation of Inaccurate Section -- 8 Traditional Computing -- 9 Comparison and Selection -- 10 Advantages of Approximate Computing -- 11 Conclusion -- References -- 13 A Low-Latency Scheme Using Real-Time Constraints for V2V Communication in VANET -- 1 Introduction -- 2 Literature Survey -- 3 Present Work -- 3.1 Message Format -- 3.2 Generator Function -- 3.3 Checking Function -- 3.4 Message Interpreter -- 4 Conclusion -- References -- 14 Loopbeat-A Novel Technical Approach to Enhance the Home Automation Ability of a NodeMCU Using Demultiplexer ICs and 555 Timer ICs with Cloud-Based Remote Access -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Cloud Implementation -- 3.2 Software Implementation -- 3.3 Hardware Implementation -- 4 Results and Discussions -- 5 Conclusions -- References -- 15 Prediction of Stock Price Using Machine Learning -- 1 Introduction -- 2 Related Works -- 2.1 Background Study -- 2.2 Brief Description of Used Algorithm -- 3 Literature Review -- 4 Process Involved -- 5 Result Analysis -- 5.1 Visualizing Data -- 5.2 Forecasting Result by Each algorithm -- 5.3 Obtained Accuracy by Each Algorithm -- 6 Conclusions -- 7 Future Scope -- References -- 16 Encryption and Error Control in Satellite Images Using Linear Block Code -- 1 Introduction -- 2 Methodology -- 3 Result -- 4 Conclusion -- References -- 17 A Fundamental Review on Hyperspectral Segmentation Algorithms. 1 Introduction -- 2 Remote Sensing in Digital Image Processing -- 3 Segmentation in Hyperspectral Images -- 4 Conclusion -- References -- 18 A Decision Support System for Big Data Analytics Integrated Internet of Things-Based Condition Monitoring System of Transformers Fleet -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Reduction -- 2.2 Weight Assessment of Attributes -- 2.3 Score Aggregation and Ranking of Attributes -- 2.4 Centrality Estimators -- 2.5 Data Pre-Processing -- 3 Proposed Framework -- 3.1 IoT-BDA-Based CMS Architecture -- 3.2 MCDM Aggregation Engine -- 4 Implementation and Results -- 4.1 Data Pre-Processing -- 4.2 Data Reduction -- 4.3 Weight Assessment -- 4.4 Aggregation of Scores -- 4.5 Fusion of Scores and Ranking -- 5 Conclusion -- References -- 19 A Machine Learning Approach to Predict Disease for Accurate Diagnosis -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Feature Engineering and Data Visualisation -- 3.3 k-NN Used for Classification -- 4 Result and Discussion -- 5 Conclusion -- References -- 20 Rotogravure Printing Band Analysis with the Help of Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Implementation -- 4 Result and Discussions -- 5 Conclusions -- References -- 21 Remote Health Support for a Person with Probable High Risk of COVID-19 Under Machine Learning Framework -- 1 Introduction -- 2 Proposed Model -- 3 Result Analysis and Discussion -- 4 Conclusion -- References -- 22 Credit Card Fraud Detection Using Soft Computing -- 1 Materials and Methods -- 2 Experiment -- 3 Results and Analysis -- 4 Conclusion -- References -- 23 Deep Learning-Based Approach Using Word and Character Embedding for Named Entity Recognition from Hindi-English Tweets -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Approach. 3.1 Training Phase -- 3.2 Testing Phase -- 4 Dataset and Experimental Results -- 5 Result Analysis and Comparison -- 6 Conclusion -- References -- 24 A Survey on COVID-19 Case Analysis Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Comparative Analysis -- 4 Analysis on COVID-19 Patient -- 5 Conclusion -- References -- 25 An Intelligent Approach for Detecting COVID-19 Probability -- 1 Introduction -- 2 Background Study -- 3 Methodology -- 4 Result and Analysis -- 5 Conclusion -- References -- 26 Fuzzy Model for Evaluating Water Quality of Ganga During Durga Puja -- 1 Introduction -- 2 Study Area -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusions -- References -- 27 Vehicle License Plate Image Preprocessing Strategy Under Fog/Hazy Weather Conditions -- 1 Introduction -- 2 Proposed Preprocessing Technique -- 2.1 Description -- 3 Validation -- 4 Conclusions -- 5 Future Works -- References -- 28 Performance Analysis of Hetero-Junction Dielectric TFETs -- 1 Introduction -- 2 Methodology -- 3 Results and Discussions -- 4 Conclusion -- References -- 29 Thermal Entanglement of a Spin-1/2 Transverse Ising Model-Heisenberg Model on a Balanced DNA Helix -- 1 Introduction -- 2 Theoretical Background -- References -- 30 PID Control Parameter Tuning Using Linear Multivariate Model -- 1 Introduction -- 2 PID Controller -- 3 Plant Model -- 4 Partial Least Square Regression -- 5 Simulation -- 6 Results and Discussions -- 6.1 Modeling of Kp -- 6.2 Modeling of Kd -- 6.3 Modeling of Ki -- 6.4 Validation, Calibration, and Prediction of PLSR -- 7 Conclusion -- References -- 31 The Effects of Metal Ion Doped Ceramic Fillers into Poly (Vinylidene Fluoride) Matrix: A Comparative Investigation and Its Application in Micro-Electronics Industry -- 1 Introduction -- 2 Experimental Procedure -- 2.1 Materials -- 2.2 Methodology. 2.3 Investigating Instruments. |
Record Nr. | UNINA-9910510539103321 |
Mandal Jyotsna Kumar | ||
Singapore : , : Springer Singapore Pte. Limited, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of International Conference on Advanced Computing Applications : Icaca 2021 |
Autore | Mandal Jyotsna Kumar |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (837 pages) |
Altri autori (Persone) |
BuyyaRajkumar
DeDebashis |
Collana | Advances in Intelligent Systems and Computing Ser. |
Soggetto genere / forma | Electronic books. |
ISBN |
9789811652073
9789811652066 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510544503321 |
Mandal Jyotsna Kumar | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Recent Advances in Artificial Intelligence and Smart Applications : Proceedings of RAAISA 2023 |
Autore | Mandal Jyotsna Kumar |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (294 pages) |
Altri autori (Persone) |
HincheyMike
ChakrabartiSatyajit |
Collana | Innovations in Sustainable Technologies and Computing Series |
ISBN | 981-9734-85-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910887801503321 |
Mandal Jyotsna Kumar | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Reversible Steganography and Authentication via Transform Encoding / / by Jyotsna Kumar Mandal |
Autore | Mandal Jyotsna Kumar |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xvi, 325 pages) : illustrations |
Disciplina | 003.54 |
Collana | Studies in Computational Intelligence |
Soggetto topico |
Computational intelligence
Computer security Artificial intelligence Computational Intelligence Systems and Data Security Artificial Intelligence |
ISBN | 981-15-4397-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Introduction -- State of the Art in Transform Encoding for Reversible Steganography and Authentication -- Reversible Encoding in Spatial and Spectral Domain -- DFT based Reversible Encoding -- DCT based Reversible Encoding -- Wavelet based Reversible Transform Encoding -- Z-Transformation and Reversible Encoding -- Reversible Encoding in Imaginary components of Transformed Coefficients of Z-Transformation -- Reversible Transform Encoding using Group let Transformation -- Nonlinear Dynamics in Transform Encoding based Authentication -- Metrics of evaluation for Steganography and Authentication -- Analysis and Comparisons of performances on different Transform Encoding Techniques -- Conclusions -- Future Directions. |
Record Nr. | UNINA-9910484042503321 |
Mandal Jyotsna Kumar | ||
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|