Blockchain technology : from theory to practice / / Sudeep Tanwar |
Autore | Tanwar Sudeep |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (421 pages) |
Disciplina | 05.74 |
Collana | Studies in Autonomic, Data-Driven and Industrial Computing |
Soggetto topico | Blockchains (Databases) |
ISBN |
9789811914881
9789811914874 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Acknowledgments -- Contents -- About the Author -- 1 Introduction to Blockchain Technology -- 1.1 Introduction -- 1.1.1 Distributed Systems -- 1.1.2 Decentralized Systems -- 1.2 What Is Blockchain? -- 1.3 Structure of Blockchain -- 1.3.1 Types of Blocks in Blockchain Network -- 1.3.2 Types of Blockchain Nodes -- 1.4 Key Technologies of Blockchain -- 1.4.1 Cryptographic Hash Functions -- 1.4.2 Message Authentication -- 1.4.3 Smart Contract -- 1.4.4 Consensus Mechanism -- 1.5 How Blockchain Works? -- 1.6 Features of Blockchain -- 1.6.1 Peer-to-Peer Network -- 1.6.2 Distributed Ledger -- 1.6.3 Cryptographically Secure -- 1.6.4 Append-only -- 1.7 Growth of Blockchain Technology -- 1.7.1 Blockchain 1.0: Bitcoin -- 1.7.2 Blockchain 2.0: Smart Contracts -- 1.7.3 Blockchain 3.0: DApps -- 1.7.4 Blockchain 4.0: Industry 4.0 -- 1.7.5 Blockchain 5.0 -- 1.8 The Need of Blockchain Technology -- 1.9 Types of Blockchain -- 1.9.1 Public Blockchain -- 1.9.2 Private (permissioned) Blockchain -- 1.9.3 Consortium Blockchain -- 1.10 Implementation Platforms of Blockchain -- 1.10.1 Node.js -- 1.10.2 Remix IDE -- 1.10.3 Ganache -- 1.10.4 Hardhat -- 1.11 Summary -- 1.12 Practice Questions -- 1.12.1 Multiple Choice Questions -- 1.12.2 Fill in the Blanks -- 1.12.3 Short Questions -- 1.12.4 Long Questions -- References -- 2 Blockchain Revolution from 1.0 to 5.0: Technological Perspective -- 2.1 History of Blockchain -- 2.1.1 Blockchain 1.0 -- 2.1.2 Blockchain 2.0 -- 2.1.3 Blockchain 3.0 -- 2.1.4 Blockchain 4.0 -- 2.1.5 Blockchain 5.0 -- 2.2 Summary -- 2.3 Practice Questions -- 2.3.1 Multiple Choice Questions -- 2.3.2 Fill in the Blanks -- 2.3.3 Short Questions -- 2.3.4 Long Questions -- References -- 3 Decentralization and Architecture of Blockchain Technology -- 3.1 Introduction -- 3.1.1 Need for Decentralization.
3.1.2 Comparative Analysis with Other Approaches -- 3.1.3 Methods of Decentralization -- 3.1.4 Correctness of Decentralization -- 3.1.5 Benefits of Decentralization -- 3.1.6 Challenges of Decentralized Organizations -- 3.2 Investigating Decentralized Consensus Mechanisms -- 3.3 Blockchain-Based Decentralized Supply Chain Management System-Case Study -- 3.3.1 Decentralized Supply Chain Management -- 3.3.2 Use Case: Food Supply Chain -- 3.3.3 Use Case-Logistic Supply Chain Management -- 3.4 Blockchain-Based Decentralized Healthcare System-Case Study -- 3.5 Blockchain-Based Decentralized Battlefield System-Case Study -- 3.6 Summary -- 3.7 Practice Questions -- 3.7.1 Multiple Choice Questions -- 3.7.2 Fill in the Blanks -- 3.7.3 Short Questions -- 3.7.4 Long Questions -- References -- 4 Basics of Cryptographic Primitives for Blockchain Development -- 4.1 Introduction -- 4.2 Blockchain Technology Hash Primitives -- 4.2.1 Message Digest in Blockchain -- 4.2.2 Secure Hash Algorithms (SHA) -- 4.2.3 RIPEMD -- 4.2.4 Ethash -- 4.2.5 SCrypt -- 4.3 Digital Signature -- 4.3.1 Authentication -- 4.3.2 Integrity -- 4.3.3 Non-repudiation -- 4.4 Digital Signature in Blockchain -- 4.4.1 Elliptic Curve Digital Signature Algorithm (ECDSA) -- 4.4.2 Schnorr Signatures -- 4.4.3 Multisignatures -- 4.4.4 Ring Signature -- 4.5 Encryption Primitives for Blockchain -- 4.5.1 Symmetric Encryption -- 4.5.2 Asymmetric Encryption -- 4.5.3 Key Management and Exchange -- 4.6 Implementation -- 4.6.1 Elliptic Curve Digital Signature Algorithm (ECDSA) Implementation -- 4.7 Summary -- 4.8 Practice Questions -- 4.8.1 MCQ Questions -- 4.8.2 Fill in the Blanks -- 4.8.3 Short Questions -- 4.8.4 Long Questions -- References -- 5 Smart Contracts for Building Decentralized Applications -- 5.1 Introduction -- 5.1.1 What is Smart Contract? -- 5.1.2 Disadvantages of the Smart Contracts. 5.2 Blockchain Platforms Using Smart Contracts -- 5.3 Deploying Smart Contracts on a Blockchain -- 5.4 Applications of Smart Contract -- 5.5 Implementation Concepts -- 5.5.1 Introduction to Solidity Programming -- 5.5.2 Basics of Solidity Programming -- 5.6 Smart Contracts Case Studies -- 5.6.1 Telesurgery -- 5.6.2 Oil Mining -- 5.6.3 Banking Smart Contract -- 5.6.4 Voting Smart Contract -- 5.6.5 Remote Patient Monitoring -- 5.7 Security Threats on Smart Contracts -- 5.7.1 Known Possible Attacks on the Smart Contracts -- 5.7.2 Cause of the Attacks on Smart Contracts -- 5.8 Summary -- 5.9 Practice Questions -- 5.9.1 MCQ Questions -- 5.9.2 Short Questions -- 5.9.3 Long Questions -- References -- 6 Distributed Consensus for Permissionless Environment -- 6.1 Introduction -- 6.1.1 Notion of Consensus -- 6.1.2 Distributed Consensus -- 6.1.3 Faults in Distributed Systems -- 6.1.4 Properties of Distributed Consensus -- 6.1.5 Correctness of a Distributed Consensus Protocol -- 6.1.6 Types of Consensus Mechanisms -- 6.1.7 Consensus in Blockchain -- 6.2 Taxonomy of Consensus Algorithms for Permissionless Environment -- 6.3 Various Consensus Algorithms -- 6.3.1 Proof of Work (PoW) -- 6.3.2 Proof of Stake (PoS) -- 6.3.3 Proof of Burn (PoB) -- 6.3.4 Proof of Capacity (PoC) -- 6.3.5 Proof of Activity (PoAc) -- 6.3.6 Proof of Weight (PoWe) -- 6.3.7 Proof of Luck (PoL) -- 6.3.8 Proof of Ownership (PoO) -- 6.3.9 Proof of Existence (PoE) -- 6.3.10 Proof of History (PoH) -- 6.3.11 Proof of Believability (PoBe) -- 6.4 Implementation -- 6.4.1 Proof-of-Work Implementation -- 6.4.2 Proof-of-Stake Implementation -- 6.4.3 Proof-of-Burn Implementation -- 6.4.4 Proof-of-Ownership Implementation -- 6.5 Comparison -- 6.6 Summary -- 6.7 Practice Questions -- 6.7.1 MCQ Questions -- 6.7.2 Fill in the Blanks -- 6.7.3 Short Questions -- 6.7.4 Long Questions -- References. 7 Mining Procedure in Distributed Consensus -- 7.1 Introduction -- 7.2 Proof-Based Consensus Mechanism -- 7.2.1 Proof of Work -- 7.2.2 Proof of Stake -- 7.2.3 Proof of Burn -- 7.3 Mining Pools -- 7.3.1 Benefit of Mining Pools -- 7.3.2 Mining Pools Methods -- 7.4 Voting-Based Consensus Mechanism -- 7.4.1 Byzantine Fault Tolerance Consensus -- 7.4.2 Crash Fault Consensus Tolerance -- 7.5 Mining Procedure Implemented with PoW -- 7.5.1 Create Blockchain -- 7.5.2 Block Mining Using PoW -- 7.5.3 Rewards for Miners -- 7.6 Summary -- 7.7 Practice Questions -- 7.7.1 Multiple Choice Questions -- 7.7.2 Fill in the Blanks -- 7.7.3 Short Questions -- 7.7.4 Long Questions -- References -- 8 Distributed Consensus for Permissioned Blockchain -- 8.1 Introduction -- 8.1.1 Provenance Tracking Use Case -- 8.1.2 Design Limitations of Permissioned Environment -- 8.1.3 Challenges Faced by Permissioned Environment -- 8.1.4 Advantages of Permissioned Environment -- 8.2 Taxonomy of Consensus Algorithms for Permissioned Environment -- 8.3 State Machine Replication -- 8.3.1 Working of Distributed State Machine Replication -- 8.4 Voting-Based Consensus -- 8.5 Crash Fault Tolerance-Based Consensus -- 8.5.1 PAXOS -- 8.5.2 RAFT -- 8.6 Notion of Byzantine Fault -- 8.6.1 Three Byzantine Generals Problem -- 8.6.2 Lamport Shostak Pease Algorithm -- 8.7 Byzantine Fault Tolerance-Based Consensus -- 8.7.1 Practical Byzantine Fault Tolerance (PBFT) -- 8.7.2 Delegated Byzantine Fault Tolerance (DBFT) -- 8.7.3 Federated Byzantine Fault Tolerance (FBFT) -- 8.8 Proof-Based Consensus Algorithm -- 8.8.1 Proof of Authority (PoA) -- 8.8.2 Proof of Elapsed Time (PoET) -- 8.9 Implementation -- 8.9.1 Proof of Authority (PoA) Implementation -- 8.10 Comparison -- 8.11 Summary -- 8.12 Practice Questions -- 8.12.1 Muliple Choice Questions -- 8.12.2 Fill in the Blanks -- 8.12.3 Short Questions. 8.12.4 Long Questions -- References -- 9 Consensus Scalability in Blockchain Network -- 9.1 Introduction -- 9.1.1 Bitcoin-NG -- 9.1.2 Scaling Byzantine -- 9.1.3 Helix Byzantine Fault Tolerance Scalable Algorithm -- 9.1.4 Various Byzantine-Based Scalable Consensus Algorithms -- 9.2 Scalability Bottlenecks -- 9.2.1 Scaling the Data -- 9.2.2 Scaling Consensus -- 9.2.3 Scaling Execution -- 9.2.4 RPoC Reputation Based Scalable Consensus Algorithm -- 9.2.5 EBRC Framework -- 9.3 Summary -- 9.4 Question Answers -- 9.4.1 Short Questions -- 9.4.2 Long Questions -- References -- 10 Building Trust in Blockchain Network Using Collective Signing -- 10.1 Introduction -- 10.2 Byzcoin: Securely Scaling Blockchains -- 10.2.1 Byzcoin Architecture -- 10.2.2 Collective Signing-CoSi -- 10.2.3 Byzcoin: Securely Scaling Blockchain -- 10.3 BLS Multisignature -- 10.3.1 Applications of Using BLS Multisignature -- 10.4 Deployment Challenges -- 10.5 Use Case of Collective Signing -- 10.5.1 Determine the Combat Fake Content Using Collective Signing -- 10.6 Summary -- 10.7 Question and Answer -- 10.7.1 MCQ Questions -- 10.7.2 Fill in the Blanks -- 10.7.3 Short Questions -- 10.7.4 Long Questions -- References -- 11 Adoption of Blockchain in Enterprise Computing -- 11.1 Introduction -- 11.1.1 Enterprise Computing -- 11.1.2 Security Flow in Enterprise Computing -- 11.1.3 Motivation -- 11.2 Blockchain Integration in Enterprise Computing -- 11.3 Problem: How It Is Difficult to Track Asset Transfers in a Business Network -- 11.4 Key Concepts and Benefits of Blockchain for Business -- 11.4.1 Key Concepts -- 11.4.2 Benefits -- 11.5 Degree of Centralization: Permission-Less Versus Permissioned Blockchains -- 11.5.1 Permissionless Blockchain -- 11.5.2 Permissioned Blockchain -- 11.5.3 Similarities of Permissioned and Permissionless Blockchains -- 11.6 Actors in BC Solution. 11.7 Components of BC Solution. |
Record Nr. | UNINA-9910568284103321 |
Tanwar Sudeep | ||
Singapore : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Fifth International Conference on Computing, Communications, and Cyber-Security : IC4S’05 Volume 1 / / edited by Sudeep Tanwar, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou |
Autore | Tanwar Sudeep |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (965 pages) |
Disciplina | 621.382 |
Altri autori (Persone) |
SinghPradeep Kumar
GanzhaMaria EpiphaniouGregory |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Telecommunication
Signal processing Computer networks - Security measures Artificial intelligence Communications Engineering, Networks Signal, Speech and Image Processing Mobile and Network Security Artificial Intelligence |
ISBN | 981-9725-50-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Compatibility Checking To Adopt MANET in LoRaWAN For Long Range Connectivity -- A Novel FR4-Based Slot Antenna with Circular Metasurface for Aerospace CubeSats -- Enabling Modern IoT Solutions with RFID Devices via an Integrated Feeding Network-fed Ultra-Wide HPBW Patch Antenna Array -- Design and Fabrication of PCB based Proximity Sensors for Application in Automatic Railway Crossing System -- Security Threats & Data Protection Methods Used in Cloud Computing: A Review -- Load Balancing Algorithms for Cloud Computing Performance: a Review -- Seamless Mobility: Innovating the Digital Service Landscape in Telecom Industry -- Pandemic Pulse: Unveiling Insights with the Global Health Tracker through AI & ML -- A Systematic Review of Deepfake Detection Using Learning Techniques And Vision Transformer -- Optimizing Graph Colorings: Unleashing the Power of Heuristic Algorithms for Enhanced Problem Solving -- Enhanced Detection of Alzheimer's and Mild Cognitive Impairment: Leveraging Advanced Preprocessing and Convolutional Neural Networks -- Classification of dry beans into Genetic Varieties using deep learning-based Convolutional Neural Networks (CNNs) -- Navigating the Realm of Generative Models: GANs, Diffusion, limitations, and Future Prospects- A review -- Enhancing Software Reliability Through Hybrid Metaheuristic Approaches -- Consumer Perspectives for Purchase Intentions of Online Pharmacy Products Using Generative Artificial Intelligence -- Intelligent Diagnosis of Autism Spectrum Disorder: Harnessing Machine Learning for Enhanced Early Detection -- A Comprehensive Review of Handwriting-Based ADHD Detection in Children with Autism Spectrum Disorder Using Machine Learning -- Bank Churn Prediction: A Holistic Churn Analysis on Imbalanced Data using ML Techniques -- Next-Gen Language Mastery: Exploring Advances in Natural Language Processing Post-Transformers -- Advancements in Machine Learning-Based Mental Health Prediction: A Comprehensive Review -- An economical, time-bound, scalable data platform designed for advanced analytics and AI -- A perspective to Disaster and Emerging technologies for Disaster management -- Machine Learning Innovations in Polycystic Ovarian Syndrome Diagnosis: A Comprehensive Review -- Personality Trait Classification from Online Text using Hybrid Deep Learning Techniques -- Improving Low-Light Images Using an Advanced Histogram Equalization Method and a Self-Calibrated Illumination Technique -- HsMM-based mobility aware cell association method for dynamic bandwidth management in 5G-FRANs -- Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions -- Adoption of Blockchain in Banking Industry: Challenges and Perspectives -- An Empirical Investigation into Quantum Algorithms -- Optimizing Real-Time Performance in ML-Based Application Layer Firewalls -- An empirical evaluation of design smells and code smells over multiple versions of software evolution. |
Record Nr. | UNINA-9910878046603321 |
Tanwar Sudeep | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of Fourth International Conference on Computing, Communications, and Cyber-Security : IC4S 2022 / / edited by Sudeep Tanwar, Slawomir T. Wierzchon, Pradeep Kumar Singh, Maria Ganzha, Gregory Epiphaniou |
Autore | Tanwar Sudeep |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (920 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
WierzchonSlawomir T
SinghPradeep Kumar GanzhaMaria EpiphaniouGregory |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Telecommunication
Signal processing Computer networks—Security measures Artificial intelligence Communications Engineering, Networks Signal, Speech and Image Processing Mobile and Network Security Artificial Intelligence |
ISBN | 981-9914-79-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Communication and Network Technologies -- Design and Implementation of an IoT-Based Indoor Hydroponics Farm with Automated Climate and Light Control -- 1 Introduction -- 2 Literature Review -- 3 System Design Methodology -- 3.1 System Architecture -- 3.2 IoT System Decision Flow -- 3.3 User Interface Mobile Application -- 4 Results -- 5 Conclusion -- References -- Drone Ecosystem: Architecture for Configuring and Securing UAVs -- 1 Introduction -- 2 UAV Ecosystem Infrastructure -- 3 Communication Architecture-Stage One -- 3.1 UAV or Drones -- 3.2 Light-Weight Cryptographic Function -- 3.3 Ad Hoc Network -- 4 Communication Architecture-Stage Two -- 4.1 5G Cellular Network -- 4.2 5G Cellular Tower -- 4.3 Network Slicing -- 5 Communication Architecture-Stage Three -- 5.1 Ground Station -- 5.2 Sub-ground Station -- 5.3 HTTP-3/QUIC Messaging Protocol -- 5.4 Zero-Round Trip Time (Zero/0-RTT) -- 5.5 Cloud, Cloud-Based Storage, and WAi -- 6 Security: Types of Attacks -- 6.1 Cyberattack Vectors -- 6.2 Physical Threat to Drones -- 7 Conclusion and Future Scope -- References -- An Improved Neural Network-Based Routing Algorithm for Mobile Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Path Finding Mechanism -- 3.2 Management of Event -- 3.3 Evaluation of the QoS Parameters -- 4 Results and Discussion -- 5 Conclusion -- References -- Energy Harvesting in Fifth-Generation Wireless Network: Upcoming Challenges and Future Directions -- 1 Introduction -- 2 Background and Motivation -- 3 Trends in Energy Harvesting -- 4 Challenges -- 5 Future Directions -- 6 Conclusion -- References -- Develop a Quantum Based Time Scheduling Algorithm for Digital Microfluidic Biochips -- 1 Introduction -- 2 Problem Description -- 2.1 Motivation -- 2.2 Problem Formulation.
3 Proposed Algorithm -- 4 Experimental Result -- 5 Conclusion -- References -- Revolution in Agriculture with the Aid of Internet of Things -- 1 Introduction -- 2 Review of Literature -- 3 Benefits of IoT in Agriculture -- 4 Role of IoT in Agriculture -- 5 Proposed Systems -- 6 Conclusion -- References -- Supercontinuum Generation in Dispersion-Tailored Tetrachloroethylene Filled Photonic Crystal Fibers -- 1 Introduction -- 2 Theoretical Model of Tetrachloroethylene PCF -- 3 Dispersion Properties of the Proposed Fiber -- 4 SCG in Optimized Structures -- 5 Conclusion -- References -- Early Detection of Covid-19 Using Wearable Sensors' Data Enabled by Semantic Web Technologies -- 1 Introduction -- 1.1 Motivation -- 1.2 Objective -- 1.3 Contribution -- 2 Literature Survey -- 2.1 IoT and Covid-19 -- 2.2 SWT and SWoT -- 2.3 Related Works-Early Detection of Covid-19 -- 3 Methodology -- 4 Evaluation -- 4.1 Method and Metrics -- 4.2 Results -- 4.3 Discussion -- 5 Conclusion and Future Scope -- References -- Cell Outage Detection in 5G Self-organizing Networks Based on FDA-HMM -- 1 Introduction -- 2 FDA Feature Extraction Method -- 3 Hidden Markov Models -- 4 HMM Training and Detection -- 4.1 Training Stage -- 4.2 Detection Stage -- 5 Simulation Results -- 5.1 FDA-HMM Performance at Different pp and upper LL -- 5.2 FDA-HMM Performance Comparison with Other Detectors -- 6 Conclusion -- References -- IoT-Based Scalable Framework for Pollution Aware Route Recommendation -- 1 Introduction -- 2 Background -- 3 Air Quality Standards -- 4 Proposed Architecture -- 4.1 Air Pollution Tracking -- 4.2 Traffic Re-routing -- 5 Process Methodology -- 6 Experimental Setup -- 6.1 Ingest -- 6.2 Collect -- 6.3 Process -- 6.4 Store -- 6.5 Visualize -- 6.6 Route Recommendation -- 6.7 User Interface -- 6.8 Result Analysis -- 7 Interface -- 8 Conclusion and Future Directions. References -- Drone: A Systematic Review of UAV Technologies -- 1 Introduction -- 1.1 About the Drone and Its History -- 2 Contextual and Associated Work -- 2.1 Literature Review -- 2.2 Challenges in the Field of UAVs -- 2.3 Applications of Drones -- 2.4 Advantages and Disadvantages of Drones -- 2.5 Simulator Tools -- 3 Future Work and Conclusions -- References -- Reconfigurable Intelligent Surface-Enabled Energy-Efficient Cooperative Spectrum Sensing -- 1 Introduction -- 2 System Model -- 3 Energy Efficiency of RIS-Based CSS -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Resource Sharing in Back Haul Satellite-Based NOMA Network -- 1 Introduction -- 2 System Model -- 2.1 Selection a User for a BS -- 2.2 Access to Satellite -- 3 Results and Simulation -- 4 Conclusion -- References -- Advanced Computing Technologies -- A Review on Various Deepfakes' Detection Methods -- 1 Introduction -- 2 Deepfakes' Generation -- 3 Generative Adversarial Networks (GANs) -- 4 Types of Deepfakes -- 5 Literature Survey -- 6 Conclusion -- References -- Proposed Framework for Implementation of Biometrics in Banking KYC -- 1 Introduction -- 2 Literature Review -- 3 Biometric Security -- 3.1 Biometric Implementation in Banking -- 4 Retinal Biometric Recognition -- 4.1 What Is Retinal Biometric Recognition -- 4.2 Working of Retinal Biometric Recognition -- 4.3 Application of Iris Recognition -- 5 Threats and Attacks on Banking -- 6 Proposed Methodology -- 6.1 Components of the Adaptive Framework -- 6.2 Adaptive Operational Framework -- 7 Strengths of Proposed Methodology -- 7.1 Design Objectives of KYC Framework -- 8 Conclusion and Future Scope -- References -- Paddy Pro: A MobileNetV3-Based App to Identify Paddy Leaf Diseases -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 System Architecture -- 4 Classification Models. 4.1 Convolutional Neural Networks (CNN) -- 4.2 MobileNetV3 -- 4.3 Transfer Learning -- 4.4 Mobile App Development -- 5 Experimental Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Cryptanalysis of RSEAP2 Authentication Protocol Based on RFID for Vehicular Cloud Computing -- 1 Introduction -- 1.1 RFID Communication System Security Standards for IoT -- 2 Literature Review -- 2.1 Definition of the Problem -- 2.2 The Purpose and Signicance of Our Work -- 3 Definitions and Mathematical Preliminaries -- 3.1 Background of ECC -- 4 RSEAP2-Protocol -- 5 Security Analysis of RSEAP2 -- 5.1 Inappropriate Extraction of Keys -- 5.2 Inefficient Mutual Authentication Attack -- 5.3 Inefficient Session Key Establishment Attack -- 5.4 Attack on Denial of Service -- 5.5 Availability Issues -- 6 Performance Analysis -- 7 Concluding Remarks -- References -- A Survey on Code-Mixed Sentiment Analysis Based on Hinglish Dataset -- 1 Introduction -- 2 Related Research -- 3 Datasets -- 4 Challenges and Issues -- 5 Conclusion -- References -- An Alternative to PHP for the Development of Web Applications: Java Server Pages Engine -- 1 Introduction -- 2 Concept Statement -- 2.1 JSP: The Basis and High-Speed Setting -- 2.2 Shell for Java Server Pages -- 3 The Perspectives of Using Java Server Pages -- 4 Conclusions -- References -- Novel Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 1 Introduction -- 1.1 Motivation and Novelty -- 1.2 Load Balancing in Fog Computing -- 2 Load Balancing Technique for Microservice-Based Fog Healthcare Environment -- 2.1 Workflow -- 2.2 Details of Microservice in Proposed Healthcare System -- 2.3 Success_factor-Based Load Balancing Algorithm -- 3 Result and Discussion -- 3.1 Throughput -- 3.2 Execution Time -- 4 Conclusion -- References. Self-improved COOT Algorithm for Resource Allocation in Cloud Data Centers -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Resource Allocation Method in Cloud: An Overview of Proposed Concept -- 3.1 Suggested Resource Allocation Method -- 3.2 Cloud Setup -- 4 Improved K-means-Based Workload Clustering: SUCO-Based Optimal Centroid Identification -- 4.1 Improved K-means Clustering-Based Workload Clustering -- 4.2 Defined Threefold Objectives -- 4.3 Suggested SUCO Model for Resource Allocation and Optimal Centroid Selection -- 5 Results and Discussion -- 5.1 Simulation Procedure -- 5.2 Analysis on Energy Consumption -- 5.3 Analysis on Execution Time -- 5.4 Analysis on Resource Utilization -- 5.5 Convergence Analysis -- 5.6 Performance Analysis -- 5.7 Analysis on Computing Time -- 6 Conclusion -- References -- XGBoost-Based Prediction and Evaluation Model for Enchanting Subscribers in Industrial Sector -- 1 Introduction -- 1.1 Customer Interaction -- 1.2 Customer Engagement Marketing -- 1.3 Implementing a Customer Engagement Marketing Strategy -- 1.4 Customer Interaction Strategies -- 2 Literature Review -- 3 Proposed System Model -- 3.1 Work Flow Classification -- 4 Simulation Results -- 5 Conclusion and Future Work -- References -- CleanO-Renewable Energy-Based Robotic Floor Cleaner -- 1 Introduction -- 2 Product Design -- 2.1 Product Comparison -- 2.2 Empathize and Ideate Phase -- 3 Proposed System Model -- 3.1 Block Diagram -- 3.2 Architectural Diagram of IoT-Based Floor Cleaner -- 3.3 Navigation System -- 4 Proposed Product Prototype -- 5 Challenges and Research Opportunities -- 5.1 Networking -- 5.2 Machine Learning -- 5.3 Blockchain -- 5.4 Artificial Intelligence -- 5.5 Renewable and Reusable Energych23b27 -- 5.6 Future Resources -- 6 Conclusion -- References. Impact of "COVID-19 Pandemic" on Children Online Education: A Review and Bibliometric Analysis. |
Record Nr. | UNINA-9910734872903321 |
Tanwar Sudeep | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|