top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain technology : from theory to practice / / Sudeep Tanwar
Blockchain technology : from theory to practice / / Sudeep Tanwar
Autore Tanwar Sudeep
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (421 pages)
Disciplina 05.74
Collana Studies in Autonomic, Data-Driven and Industrial Computing
Soggetto topico Blockchains (Databases)
ISBN 9789811914881
9789811914874
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgments -- Contents -- About the Author -- 1 Introduction to Blockchain Technology -- 1.1 Introduction -- 1.1.1 Distributed Systems -- 1.1.2 Decentralized Systems -- 1.2 What Is Blockchain? -- 1.3 Structure of Blockchain -- 1.3.1 Types of Blocks in Blockchain Network -- 1.3.2 Types of Blockchain Nodes -- 1.4 Key Technologies of Blockchain -- 1.4.1 Cryptographic Hash Functions -- 1.4.2 Message Authentication -- 1.4.3 Smart Contract -- 1.4.4 Consensus Mechanism -- 1.5 How Blockchain Works? -- 1.6 Features of Blockchain -- 1.6.1 Peer-to-Peer Network -- 1.6.2 Distributed Ledger -- 1.6.3 Cryptographically Secure -- 1.6.4 Append-only -- 1.7 Growth of Blockchain Technology -- 1.7.1 Blockchain 1.0: Bitcoin -- 1.7.2 Blockchain 2.0: Smart Contracts -- 1.7.3 Blockchain 3.0: DApps -- 1.7.4 Blockchain 4.0: Industry 4.0 -- 1.7.5 Blockchain 5.0 -- 1.8 The Need of Blockchain Technology -- 1.9 Types of Blockchain -- 1.9.1 Public Blockchain -- 1.9.2 Private (permissioned) Blockchain -- 1.9.3 Consortium Blockchain -- 1.10 Implementation Platforms of Blockchain -- 1.10.1 Node.js -- 1.10.2 Remix IDE -- 1.10.3 Ganache -- 1.10.4 Hardhat -- 1.11 Summary -- 1.12 Practice Questions -- 1.12.1 Multiple Choice Questions -- 1.12.2 Fill in the Blanks -- 1.12.3 Short Questions -- 1.12.4 Long Questions -- References -- 2 Blockchain Revolution from 1.0 to 5.0: Technological Perspective -- 2.1 History of Blockchain -- 2.1.1 Blockchain 1.0 -- 2.1.2 Blockchain 2.0 -- 2.1.3 Blockchain 3.0 -- 2.1.4 Blockchain 4.0 -- 2.1.5 Blockchain 5.0 -- 2.2 Summary -- 2.3 Practice Questions -- 2.3.1 Multiple Choice Questions -- 2.3.2 Fill in the Blanks -- 2.3.3 Short Questions -- 2.3.4 Long Questions -- References -- 3 Decentralization and Architecture of Blockchain Technology -- 3.1 Introduction -- 3.1.1 Need for Decentralization.
3.1.2 Comparative Analysis with Other Approaches -- 3.1.3 Methods of Decentralization -- 3.1.4 Correctness of Decentralization -- 3.1.5 Benefits of Decentralization -- 3.1.6 Challenges of Decentralized Organizations -- 3.2 Investigating Decentralized Consensus Mechanisms -- 3.3 Blockchain-Based Decentralized Supply Chain Management System-Case Study -- 3.3.1 Decentralized Supply Chain Management -- 3.3.2 Use Case: Food Supply Chain -- 3.3.3 Use Case-Logistic Supply Chain Management -- 3.4 Blockchain-Based Decentralized Healthcare System-Case Study -- 3.5 Blockchain-Based Decentralized Battlefield System-Case Study -- 3.6 Summary -- 3.7 Practice Questions -- 3.7.1 Multiple Choice Questions -- 3.7.2 Fill in the Blanks -- 3.7.3 Short Questions -- 3.7.4 Long Questions -- References -- 4 Basics of Cryptographic Primitives for Blockchain Development -- 4.1 Introduction -- 4.2 Blockchain Technology Hash Primitives -- 4.2.1 Message Digest in Blockchain -- 4.2.2 Secure Hash Algorithms (SHA) -- 4.2.3 RIPEMD -- 4.2.4 Ethash -- 4.2.5 SCrypt -- 4.3 Digital Signature -- 4.3.1 Authentication -- 4.3.2 Integrity -- 4.3.3 Non-repudiation -- 4.4 Digital Signature in Blockchain -- 4.4.1 Elliptic Curve Digital Signature Algorithm (ECDSA) -- 4.4.2 Schnorr Signatures -- 4.4.3 Multisignatures -- 4.4.4 Ring Signature -- 4.5 Encryption Primitives for Blockchain -- 4.5.1 Symmetric Encryption -- 4.5.2 Asymmetric Encryption -- 4.5.3 Key Management and Exchange -- 4.6 Implementation -- 4.6.1 Elliptic Curve Digital Signature Algorithm (ECDSA) Implementation -- 4.7 Summary -- 4.8 Practice Questions -- 4.8.1 MCQ Questions -- 4.8.2 Fill in the Blanks -- 4.8.3 Short Questions -- 4.8.4 Long Questions -- References -- 5 Smart Contracts for Building Decentralized Applications -- 5.1 Introduction -- 5.1.1 What is Smart Contract? -- 5.1.2 Disadvantages of the Smart Contracts.
5.2 Blockchain Platforms Using Smart Contracts -- 5.3 Deploying Smart Contracts on a Blockchain -- 5.4 Applications of Smart Contract -- 5.5 Implementation Concepts -- 5.5.1 Introduction to Solidity Programming -- 5.5.2 Basics of Solidity Programming -- 5.6 Smart Contracts Case Studies -- 5.6.1 Telesurgery -- 5.6.2 Oil Mining -- 5.6.3 Banking Smart Contract -- 5.6.4 Voting Smart Contract -- 5.6.5 Remote Patient Monitoring -- 5.7 Security Threats on Smart Contracts -- 5.7.1 Known Possible Attacks on the Smart Contracts -- 5.7.2 Cause of the Attacks on Smart Contracts -- 5.8 Summary -- 5.9 Practice Questions -- 5.9.1 MCQ Questions -- 5.9.2 Short Questions -- 5.9.3 Long Questions -- References -- 6 Distributed Consensus for Permissionless Environment -- 6.1 Introduction -- 6.1.1 Notion of Consensus -- 6.1.2 Distributed Consensus -- 6.1.3 Faults in Distributed Systems -- 6.1.4 Properties of Distributed Consensus -- 6.1.5 Correctness of a Distributed Consensus Protocol -- 6.1.6 Types of Consensus Mechanisms -- 6.1.7 Consensus in Blockchain -- 6.2 Taxonomy of Consensus Algorithms for Permissionless Environment -- 6.3 Various Consensus Algorithms -- 6.3.1 Proof of Work (PoW) -- 6.3.2 Proof of Stake (PoS) -- 6.3.3 Proof of Burn (PoB) -- 6.3.4 Proof of Capacity (PoC) -- 6.3.5 Proof of Activity (PoAc) -- 6.3.6 Proof of Weight (PoWe) -- 6.3.7 Proof of Luck (PoL) -- 6.3.8 Proof of Ownership (PoO) -- 6.3.9 Proof of Existence (PoE) -- 6.3.10 Proof of History (PoH) -- 6.3.11 Proof of Believability (PoBe) -- 6.4 Implementation -- 6.4.1 Proof-of-Work Implementation -- 6.4.2 Proof-of-Stake Implementation -- 6.4.3 Proof-of-Burn Implementation -- 6.4.4 Proof-of-Ownership Implementation -- 6.5 Comparison -- 6.6 Summary -- 6.7 Practice Questions -- 6.7.1 MCQ Questions -- 6.7.2 Fill in the Blanks -- 6.7.3 Short Questions -- 6.7.4 Long Questions -- References.
7 Mining Procedure in Distributed Consensus -- 7.1 Introduction -- 7.2 Proof-Based Consensus Mechanism -- 7.2.1 Proof of Work -- 7.2.2 Proof of Stake -- 7.2.3 Proof of Burn -- 7.3 Mining Pools -- 7.3.1 Benefit of Mining Pools -- 7.3.2 Mining Pools Methods -- 7.4 Voting-Based Consensus Mechanism -- 7.4.1 Byzantine Fault Tolerance Consensus -- 7.4.2 Crash Fault Consensus Tolerance -- 7.5 Mining Procedure Implemented with PoW -- 7.5.1 Create Blockchain -- 7.5.2 Block Mining Using PoW -- 7.5.3 Rewards for Miners -- 7.6 Summary -- 7.7 Practice Questions -- 7.7.1 Multiple Choice Questions -- 7.7.2 Fill in the Blanks -- 7.7.3 Short Questions -- 7.7.4 Long Questions -- References -- 8 Distributed Consensus for Permissioned Blockchain -- 8.1 Introduction -- 8.1.1 Provenance Tracking Use Case -- 8.1.2 Design Limitations of Permissioned Environment -- 8.1.3 Challenges Faced by Permissioned Environment -- 8.1.4 Advantages of Permissioned Environment -- 8.2 Taxonomy of Consensus Algorithms for Permissioned Environment -- 8.3 State Machine Replication -- 8.3.1 Working of Distributed State Machine Replication -- 8.4 Voting-Based Consensus -- 8.5 Crash Fault Tolerance-Based Consensus -- 8.5.1 PAXOS -- 8.5.2 RAFT -- 8.6 Notion of Byzantine Fault -- 8.6.1 Three Byzantine Generals Problem -- 8.6.2 Lamport Shostak Pease Algorithm -- 8.7 Byzantine Fault Tolerance-Based Consensus -- 8.7.1 Practical Byzantine Fault Tolerance (PBFT) -- 8.7.2 Delegated Byzantine Fault Tolerance (DBFT) -- 8.7.3 Federated Byzantine Fault Tolerance (FBFT) -- 8.8 Proof-Based Consensus Algorithm -- 8.8.1 Proof of Authority (PoA) -- 8.8.2 Proof of Elapsed Time (PoET) -- 8.9 Implementation -- 8.9.1 Proof of Authority (PoA) Implementation -- 8.10 Comparison -- 8.11 Summary -- 8.12 Practice Questions -- 8.12.1 Muliple Choice Questions -- 8.12.2 Fill in the Blanks -- 8.12.3 Short Questions.
8.12.4 Long Questions -- References -- 9 Consensus Scalability in Blockchain Network -- 9.1 Introduction -- 9.1.1 Bitcoin-NG -- 9.1.2 Scaling Byzantine -- 9.1.3 Helix Byzantine Fault Tolerance Scalable Algorithm -- 9.1.4 Various Byzantine-Based Scalable Consensus Algorithms -- 9.2 Scalability Bottlenecks -- 9.2.1 Scaling the Data -- 9.2.2 Scaling Consensus -- 9.2.3 Scaling Execution -- 9.2.4 RPoC Reputation Based Scalable Consensus Algorithm -- 9.2.5 EBRC Framework -- 9.3 Summary -- 9.4 Question Answers -- 9.4.1 Short Questions -- 9.4.2 Long Questions -- References -- 10 Building Trust in Blockchain Network Using Collective Signing -- 10.1 Introduction -- 10.2 Byzcoin: Securely Scaling Blockchains -- 10.2.1 Byzcoin Architecture -- 10.2.2 Collective Signing-CoSi -- 10.2.3 Byzcoin: Securely Scaling Blockchain -- 10.3 BLS Multisignature -- 10.3.1 Applications of Using BLS Multisignature -- 10.4 Deployment Challenges -- 10.5 Use Case of Collective Signing -- 10.5.1 Determine the Combat Fake Content Using Collective Signing -- 10.6 Summary -- 10.7 Question and Answer -- 10.7.1 MCQ Questions -- 10.7.2 Fill in the Blanks -- 10.7.3 Short Questions -- 10.7.4 Long Questions -- References -- 11 Adoption of Blockchain in Enterprise Computing -- 11.1 Introduction -- 11.1.1 Enterprise Computing -- 11.1.2 Security Flow in Enterprise Computing -- 11.1.3 Motivation -- 11.2 Blockchain Integration in Enterprise Computing -- 11.3 Problem: How It Is Difficult to Track Asset Transfers in a Business Network -- 11.4 Key Concepts and Benefits of Blockchain for Business -- 11.4.1 Key Concepts -- 11.4.2 Benefits -- 11.5 Degree of Centralization: Permission-Less Versus Permissioned Blockchains -- 11.5.1 Permissionless Blockchain -- 11.5.2 Permissioned Blockchain -- 11.5.3 Similarities of Permissioned and Permissionless Blockchains -- 11.6 Actors in BC Solution.
11.7 Components of BC Solution.
Record Nr. UNINA-9910568284103321
Tanwar Sudeep  
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security [[electronic resource] ] : IC4S 2022 / / edited by Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security [[electronic resource] ] : IC4S 2022 / / edited by Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou
Autore Tanwar Sudeep
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (920 pages)
Disciplina 004.6
Altri autori (Persone) WierzchonSlawomir T
SinghPradeep Kumar
GanzhaMaria
EpiphaniouGregory
Collana Lecture Notes in Networks and Systems
Soggetto topico Telecommunication
Signal processing
Computer networks—Security measures
Artificial intelligence
Communications Engineering, Networks
Signal, Speech and Image Processing
Mobile and Network Security
Artificial Intelligence
ISBN 981-9914-79-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Communication and Network Technologies -- Design and Implementation of an IoT-Based Indoor Hydroponics Farm with Automated Climate and Light Control -- 1 Introduction -- 2 Literature Review -- 3 System Design Methodology -- 3.1 System Architecture -- 3.2 IoT System Decision Flow -- 3.3 User Interface Mobile Application -- 4 Results -- 5 Conclusion -- References -- Drone Ecosystem: Architecture for Configuring and Securing UAVs -- 1 Introduction -- 2 UAV Ecosystem Infrastructure -- 3 Communication Architecture-Stage One -- 3.1 UAV or Drones -- 3.2 Light-Weight Cryptographic Function -- 3.3 Ad Hoc Network -- 4 Communication Architecture-Stage Two -- 4.1 5G Cellular Network -- 4.2 5G Cellular Tower -- 4.3 Network Slicing -- 5 Communication Architecture-Stage Three -- 5.1 Ground Station -- 5.2 Sub-ground Station -- 5.3 HTTP-3/QUIC Messaging Protocol -- 5.4 Zero-Round Trip Time (Zero/0-RTT) -- 5.5 Cloud, Cloud-Based Storage, and WAi -- 6 Security: Types of Attacks -- 6.1 Cyberattack Vectors -- 6.2 Physical Threat to Drones -- 7 Conclusion and Future Scope -- References -- An Improved Neural Network-Based Routing Algorithm for Mobile Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Path Finding Mechanism -- 3.2 Management of Event -- 3.3 Evaluation of the QoS Parameters -- 4 Results and Discussion -- 5 Conclusion -- References -- Energy Harvesting in Fifth-Generation Wireless Network: Upcoming Challenges and Future Directions -- 1 Introduction -- 2 Background and Motivation -- 3 Trends in Energy Harvesting -- 4 Challenges -- 5 Future Directions -- 6 Conclusion -- References -- Develop a Quantum Based Time Scheduling Algorithm for Digital Microfluidic Biochips -- 1 Introduction -- 2 Problem Description -- 2.1 Motivation -- 2.2 Problem Formulation.
3 Proposed Algorithm -- 4 Experimental Result -- 5 Conclusion -- References -- Revolution in Agriculture with the Aid of Internet of Things -- 1 Introduction -- 2 Review of Literature -- 3 Benefits of IoT in Agriculture -- 4 Role of IoT in Agriculture -- 5 Proposed Systems -- 6 Conclusion -- References -- Supercontinuum Generation in Dispersion-Tailored Tetrachloroethylene Filled Photonic Crystal Fibers -- 1 Introduction -- 2 Theoretical Model of Tetrachloroethylene PCF -- 3 Dispersion Properties of the Proposed Fiber -- 4 SCG in Optimized Structures -- 5 Conclusion -- References -- Early Detection of Covid-19 Using Wearable Sensors' Data Enabled by Semantic Web Technologies -- 1 Introduction -- 1.1 Motivation -- 1.2 Objective -- 1.3 Contribution -- 2 Literature Survey -- 2.1 IoT and Covid-19 -- 2.2 SWT and SWoT -- 2.3 Related Works-Early Detection of Covid-19 -- 3 Methodology -- 4 Evaluation -- 4.1 Method and Metrics -- 4.2 Results -- 4.3 Discussion -- 5 Conclusion and Future Scope -- References -- Cell Outage Detection in 5G Self-organizing Networks Based on FDA-HMM -- 1 Introduction -- 2 FDA Feature Extraction Method -- 3 Hidden Markov Models -- 4 HMM Training and Detection -- 4.1 Training Stage -- 4.2 Detection Stage -- 5 Simulation Results -- 5.1 FDA-HMM Performance at Different pp and upper LL -- 5.2 FDA-HMM Performance Comparison with Other Detectors -- 6 Conclusion -- References -- IoT-Based Scalable Framework for Pollution Aware Route Recommendation -- 1 Introduction -- 2 Background -- 3 Air Quality Standards -- 4 Proposed Architecture -- 4.1 Air Pollution Tracking -- 4.2 Traffic Re-routing -- 5 Process Methodology -- 6 Experimental Setup -- 6.1 Ingest -- 6.2 Collect -- 6.3 Process -- 6.4 Store -- 6.5 Visualize -- 6.6 Route Recommendation -- 6.7 User Interface -- 6.8 Result Analysis -- 7 Interface -- 8 Conclusion and Future Directions.
References -- Drone: A Systematic Review of UAV Technologies -- 1 Introduction -- 1.1 About the Drone and Its History -- 2 Contextual and Associated Work -- 2.1 Literature Review -- 2.2 Challenges in the Field of UAVs -- 2.3 Applications of Drones -- 2.4 Advantages and Disadvantages of Drones -- 2.5 Simulator Tools -- 3 Future Work and Conclusions -- References -- Reconfigurable Intelligent Surface-Enabled Energy-Efficient Cooperative Spectrum Sensing -- 1 Introduction -- 2 System Model -- 3 Energy Efficiency of RIS-Based CSS -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Resource Sharing in Back Haul Satellite-Based NOMA Network -- 1 Introduction -- 2 System Model -- 2.1 Selection a User for a BS -- 2.2 Access to Satellite -- 3 Results and Simulation -- 4 Conclusion -- References -- Advanced Computing Technologies -- A Review on Various Deepfakes' Detection Methods -- 1 Introduction -- 2 Deepfakes' Generation -- 3 Generative Adversarial Networks (GANs) -- 4 Types of Deepfakes -- 5 Literature Survey -- 6 Conclusion -- References -- Proposed Framework for Implementation of Biometrics in Banking KYC -- 1 Introduction -- 2 Literature Review -- 3 Biometric Security -- 3.1 Biometric Implementation in Banking -- 4 Retinal Biometric Recognition -- 4.1 What Is Retinal Biometric Recognition -- 4.2 Working of Retinal Biometric Recognition -- 4.3 Application of Iris Recognition -- 5 Threats and Attacks on Banking -- 6 Proposed Methodology -- 6.1 Components of the Adaptive Framework -- 6.2 Adaptive Operational Framework -- 7 Strengths of Proposed Methodology -- 7.1 Design Objectives of KYC Framework -- 8 Conclusion and Future Scope -- References -- Paddy Pro: A MobileNetV3-Based App to Identify Paddy Leaf Diseases -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 System Architecture -- 4 Classification Models.
4.1 Convolutional Neural Networks (CNN) -- 4.2 MobileNetV3 -- 4.3 Transfer Learning -- 4.4 Mobile App Development -- 5 Experimental Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Cryptanalysis of RSEAP2 Authentication Protocol Based on RFID for Vehicular Cloud Computing -- 1 Introduction -- 1.1 RFID Communication System Security Standards for IoT -- 2 Literature Review -- 2.1 Definition of the Problem -- 2.2 The Purpose and Signicance of Our Work -- 3 Definitions and Mathematical Preliminaries -- 3.1 Background of ECC -- 4 RSEAP2-Protocol -- 5 Security Analysis of RSEAP2 -- 5.1 Inappropriate Extraction of Keys -- 5.2 Inefficient Mutual Authentication Attack -- 5.3 Inefficient Session Key Establishment Attack -- 5.4 Attack on Denial of Service -- 5.5 Availability Issues -- 6 Performance Analysis -- 7 Concluding Remarks -- References -- A Survey on Code-Mixed Sentiment Analysis Based on Hinglish Dataset -- 1 Introduction -- 2 Related Research -- 3 Datasets -- 4 Challenges and Issues -- 5 Conclusion -- References -- An Alternative to PHP for the Development of Web Applications: Java Server Pages Engine -- 1 Introduction -- 2 Concept Statement -- 2.1 JSP: The Basis and High-Speed Setting -- 2.2 Shell for Java Server Pages -- 3 The Perspectives of Using Java Server Pages -- 4 Conclusions -- References -- Novel Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 1 Introduction -- 1.1 Motivation and Novelty -- 1.2 Load Balancing in Fog Computing -- 2 Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 2.1 Workflow -- 2.2 Details of Microservice in Proposed Healthcare System -- 2.3 Success_factor-Based Load Balancing Algorithm -- 3 Result and Discussion -- 3.1 Throughput -- 3.2 Execution Time -- 4 Conclusion -- References.
Self-improved COOT Algorithm for Resource Allocation in Cloud Data Centers -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Resource Allocation Method in Cloud: An Overview of Proposed Concept -- 3.1 Suggested Resource Allocation Method -- 3.2 Cloud Setup -- 4 Improved K-means-Based Workload Clustering: SUCO-Based Optimal Centroid Identification -- 4.1 Improved K-means Clustering-Based Workload Clustering -- 4.2 Defined Threefold Objectives -- 4.3 Suggested SUCO Model for Resource Allocation and Optimal Centroid Selection -- 5 Results and Discussion -- 5.1 Simulation Procedure -- 5.2 Analysis on Energy Consumption -- 5.3 Analysis on Execution Time -- 5.4 Analysis on Resource Utilization -- 5.5 Convergence Analysis -- 5.6 Performance Analysis -- 5.7 Analysis on Computing Time -- 6 Conclusion -- References -- XGBoost-Based Prediction and Evaluation Model for Enchanting Subscribers in Industrial Sector -- 1 Introduction -- 1.1 Customer Interaction -- 1.2 Customer Engagement Marketing -- 1.3 Implementing a Customer Engagement Marketing Strategy -- 1.4 Customer Interaction Strategies -- 2 Literature Review -- 3 Proposed System Model -- 3.1 Work Flow Classification -- 4 Simulation Results -- 5 Conclusion and Future Work -- References -- CleanO-Renewable Energy-Based Robotic Floor Cleaner -- 1 Introduction -- 2 Product Design -- 2.1 Product Comparison -- 2.2 Empathize and Ideate Phase -- 3 Proposed System Model -- 3.1 Block Diagram -- 3.2 Architectural Diagram of IoT-Based Floor Cleaner -- 3.3 Navigation System -- 4 Proposed Product Prototype -- 5 Challenges and Research Opportunities -- 5.1 Networking -- 5.2 Machine Learning -- 5.3 Blockchain -- 5.4 Artificial Intelligence -- 5.5 Renewable and Reusable Energych23b27 -- 5.6 Future Resources -- 6 Conclusion -- References.
Impact of "COVID-19 Pandemic" on Children Online Education: A Review and Bibliometric Analysis.
Record Nr. UNINA-9910734872903321
Tanwar Sudeep  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui