Computer networks, big data and IoT : proceedings of ICCBI 2020 ; Madurai, Tamil Nadu, India, 15-16 December 2020 / / editors, A. Pasumpon Pandian, Xavier Fernando, Syed Mohammed Shamsul Islam |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (980 pages) : illustrations (some color) |
Disciplina | 004.678 |
Collana | Lecture notes on data engineering and communications technologies |
Soggetto topico |
Big data
Internet of things |
ISBN | 981-16-0965-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Preface -- Acknowledgements -- Contents -- About the Editors -- Maximizing Network Lifetime in WSN Using Ant Colony Algorıthm -- 1 Introduction -- 2 Review of Related Work -- 2.1 Routing Protocol -- 2.2 Traveling Salesman Problem -- 3 Proposed Scheme -- 3.1 Greedy Algorithm -- 3.2 Ant Colony Algorithm for TSP -- 3.3 Procedure of ACO -- 3.4 Shortest Path Problem -- 4 Software Description -- 4.1 Proteus -- 5 Results and Discussion -- 5.1 Schematic Diagram -- 5.2 Simulation Output -- 5.3 Power Analysis of Greedy Algorithm -- 5.4 Simulation Waveform of Greedy Algorithm -- 5.5 Power Analysis of ACO -- 5.6 Simulation Waveform of Greedy Algorithm and ACO -- 6 Conclusion and for Future Work -- 6.1 Conclusion -- 6.2 Scope for Future Work -- References -- Deep Ensemble Approach for Question Answer System -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Long Short Term Memory -- 3.2 Encoder-Decoder Model -- 3.3 CatBoost -- 3.4 Ensemble Model -- 4 Experimental Setup -- 5 Results and Discussion -- 6 Conclusion -- References -- Information Sharing Over Social Media Analysis Using Centrality Measure -- 1 Introduction -- 2 Related Works -- 3 Data Analysis -- 4 Conclusion -- References -- AndroHealthCheck: A Malware Detection System for Android Using Machine Learning -- 1 Introduction -- 2 Architecture of AndroHealthCheck -- 3 Deployment of AndroHealthCheck -- 4 Conclusion -- References -- Use of Machine Learning Services in Cloud -- 1 Introduction -- 2 Cognitive Services -- 3 Machine Learning APIs of Google, Amazon, and Microsoft -- 4 ML Services Serve as a Platform -- 5 ML Services Serve as an Infrastructure -- 6 ML for Attack Detection and Prevention -- 7 Conclusion -- References -- An Experimental Analysis on Selfish Node Detection Techniques for MANET Based on MSD and MBD-SNDT -- 1 Introduction -- 2 Literature Review.
3 Related Work -- 4 Modified Skellam Distribution -Based Selfish Node Detection Technique (MSD-SNDT) -- 5 Detection and Isolation of Selfish Nodes Misbehavior Utilizing Computed MSD -- 5.1 The Proposed Algorithm-MSD-SDNT -- 6 Experimental Results and Discussions of MSD-SNDT -- 7 Modified Bates Distribution-Based Selfish Node Detection Technique (MBD-SNDT) -- 7.1 MBD-SNDT Algorithm -- 8 Experimental Results and Discussions of MBD-SNDT -- 9 Conclusion -- References -- Metaheuristic-Enabled Shortest Path Selection for IoT-Based Wireless Sensor Network -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Proposed Routing Strategies in IoT -- 3.1 Network Model -- 4 Description on Varied Constraints for Shortest Route Selection -- 4.1 Distance Model -- 4.2 Delay -- 4.3 Energy Model -- 4.4 PDR -- 5 Optimal Shortest Path Selection via Dragonfly Algorithm with Brownian Motion -- 5.1 Objective Function -- 5.2 Solution Encoding -- 5.3 Proposed DABR Algorithm -- 6 Results and Discussion -- 6.1 Simulation Procedure -- 6.2 Performance Analysis -- 6.3 Statistical Analysis -- 6.4 Overall Analysis of the Proposed Model -- 7 Conclusion -- References -- Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud-Edge Environment -- 1 Introduction -- 2 Background and Related Work -- 3 Model Formulation -- 4 Proposed Method -- 5 Experiments -- 5.1 Simulation Environment Setup -- 5.2 Comparative Analysis and Discussion -- 6 Conclusion -- References -- Generation of Random Binary Sequence Using Adaptive Row-Column Approach and Synthetic Color Image -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 4 Conclusion -- References -- Blockchain: Application Domains, Research Issues and Challenges -- 1 Introduction -- 2 Overview of Blockchain -- 2.1 Background -- 2.2 Blockchain Transaction -- 2.3 Digital Signature. 2.4 Blocks -- 2.5 Mining and Consensus Algorithms -- 3 Applications of Blockchain -- 3.1 Biomedical Domain -- 3.2 Banking and Finance -- 3.3 Government and Public Sectors -- 3.4 Supply Chain -- 3.5 Internet of Things -- 4 Open Issues and Challenges -- 4.1 Scalability -- 4.2 Attacks on Blockchain -- 4.3 Privacy Breach -- 5 Conclusion -- References -- A Study of Mobile Ad hoc Network and Its Performance Optimization Algorithm -- 1 Introduction -- 1.1 MANET -- 1.2 Characteristics of MANET -- 1.3 Challenges in Ad hoc Network -- 2 Overview of routing protocol -- 2.1 Classification of Routing Protocol -- 3 Network performance optimization algorithm -- 3.1 Genetic algorithms (GA) -- 3.2 Particle Swarm Optimization (PSO) -- 3.3 Ant Colony Optimization (ACO) -- 3.4 Artificial Bee Colony Optimization (ABC) -- 3.5 Bacterial Foraging Optimization Algorithm (BFOA) -- 3.6 Binary Particle Swarm Optimization (BPSO) -- 4 PSO Overview -- 5 Conclusion -- References -- Industrial IoT: Challenges and Mitigation Policies -- 1 Introduction -- 2 Internet of Things (IoT) and Industrial Internet of Things (IIoT) -- 2.1 Internet of Things (IoT) -- 2.2 Industrial IoT (IIoT) -- 2.3 IIoT Architecture -- 3 Cyberthreats in IIoT Devices -- 3.1 Cyberthreat -- 4 Remedial Measures and Best Practices to Mitigate Cyberthreats -- 4.1 Security Practices for IoT Devices Developers -- 4.2 Best Security Practices for Communication Network -- 4.3 Best Security Practices at the Industry Level -- 4.4 Best Practices for End Users -- 5 Challenges Related to Cybersecurity -- 6 Conclusion and Future Work -- References -- EclatRPGrowth: Finding Rare Patterns Using Vertical Mining and Rare Pattern Tree -- 1 Introduction -- 2 Related Work -- 2.1 Apriori Based Rare Pattern Mining Techniques -- 2.2 FP-Growth Based Rare Pattern Mining Techniques -- 2.3 Eclat Based Rare Pattern Mining Algorithms. 3 Vertical Mining with Rare Pattern Tree -- 3.1 Basic Concepts and Definitions -- 3.2 Vertical Mining with BitSets -- 3.3 Structure of a Rare Pattern Tree (RP Tree) -- 4 Methodology of EclatRPGrowth -- 4.1 Schematic Block Diagram of Algorithm EclatRPGrowth -- 4.2 EclatRPGrowth Example -- 5 Methodology of EClatPRPGrowth -- 6 Experimental Results and Discussion -- 6.1 Comparison of Performance -- 7 Conclusion -- References -- Research Scholars transferring Scholarly Information through Social Medias and Networks in the Selected State Universities of Tamil Nadu -- 1 Introduction -- 2 Review of Literature -- 3 Objectives of the Study -- 4 Methodology -- 5 Analysis and Discussion -- 6 Conclusion -- References -- Twitter-Based Disaster Management System Using Data Mining -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Linear Ridge Regression (LRR) -- 3.2 SGD Classifier -- 3.3 Naive Bayes Classifier -- 4 Implementation -- 5 Result and Discussion -- 6 Conclusion -- References -- Sentimental Analysis on Twitter Data of Political Domain -- 1 Introduction -- 1.1 Sentiment Analysis -- 2 Review of Literature -- 3 System Architecture -- 3.1 Data Collection -- 3.2 Preprocessing -- 3.3 Word Embedding -- 3.4 Recurrent Neural Network (ANN) -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Cloud-Based Smart Environment Using Internet of Things (IoT) -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 RFID Technology -- 3.2 Constrained Node Network (CNN) Technology -- 3.3 Smart Environment Sensors with the Internet of Things (IoT) -- 4 Conclusion -- References -- A Review of Healthcare Applications on Internet of Things -- 1 Introduction -- 2 Role of IoT in HealthCare -- 3 Literature Review -- 4 Comparison Table -- 5 Conclusion -- References -- Big Social Media Analytics: Applications and Challenges -- 1 Introduction. 2 Literature Review -- 3 Applications of Social Media Big Data -- 3.1 Business -- 3.2 Healthcare -- 3.3 Education -- 3.4 Crisis Management -- 4 Big Social Media Analytics -- 4.1 Social Media Business Analytics -- 4.2 Social Media Healthcare Analytics -- 4.3 Social Media Education Analytics -- 4.4 Social Media Crisis Management Analytics -- 5 Conclusion -- References -- A Cost and Power Analysis of Farmer Using Smart Farming IoT System -- 1 Introduction -- 2 Earlier Work -- 3 Smart Farming System -- 4 Likely Outcomes -- 4.1 Cost Analysis -- 4.2 Time Analysis -- 4.3 Power Analysis -- 5 Experimental Setup -- 6 Conclusion and Future Work -- References -- Intelligent Computing Application for Cloud Enhancing Healthcare Services -- 1 Introduction -- 2 Literature Review -- 3 Intelligent Computing: A Novel Economic Computing Framework -- 4 Critical Analysis of the Healthcare Cloud Computing Challenges and Opportunities -- 5 An Evaluation of Cloud Computing Challenges and Opportunities -- 5.1 The Management Perspectives -- 5.2 Technological Aspects -- 5.3 Privacy Aspects -- 5.4 Legal Aspects -- 6 Discussion -- 6.1 Intelligent Computing Strategy and Planning -- 7 Conclusion and Future Directions -- References -- Coronavirus Detection and Classification Using X-Rays and CT Scans with Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Experiments -- 4.1 Dataset Description -- 4.2 Data Preprocessing -- 4.3 Feature Extraction Technique -- 4.4 Analyzing Results -- 5 Experimental Results -- 5.1 Results of CT Scan Images -- 5.2 Results of X-Ray Images -- 6 Conclusion -- References -- Johnson's Sequencing for Load Balancing in Multi-Access Edge Computing -- 1 Introduction -- 2 Load Balancing -- 2.1 Multi Access/Mobile Computing -- 2.2 Load Balancing in Multi-Access/Mobile Computing -- 3 Flow Shop Sequencing. 3.1 Proposed Flow Shop Algorithm for Load Balancing. |
Record Nr. | UNINA-9910485606203321 |
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Evolutionary Computing and Mobile Sustainable Networks : Proceedings of ICECMSN 2020 / / edited by V. Suma, Noureddine Bouhmala, Haoxiang Wang |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (XXII, 1008 p. 516 illus., 386 illus. in color.) |
Disciplina | 929.374 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Electrical engineering
Computer networks - Security measures Big data Algorithms Artificial intelligence Communications Engineering, Networks Mobile and Network Security Big Data Algorithm Analysis and Problem Complexity Artificial Intelligence |
ISBN | 981-15-5258-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Optimal Resource Sharing amongst Device-to-Device Communication using Particle Swarm Algorithm -- Real Time Human Locator and Advance Home Security Appliances -- A Novel Implementation of Haptic Robotic Arm -- Design of Book Recommendation System Using Sentiment Analysis -- Review of Python for Solar Photovoltaic Systems -- Key Stroke Dynamics for User Verification -- The Role of Predictive Data Analytics in Retailing -- Improved Scheduling Algorithm for Load Balancing in Cloud Computing -- Generating Automobile Images Dynamically from Text Description -- Generating Automobile Images Dynamically from Text Description -- Identification of Online Auction Bidding Robots using Machine Learning -- Analysis of Attention Deficit Hyperactivity Disorder using Various Classifiers -- Generating Feasible Path Between Path Testing and Data Flow Testing -- Parking Management System Using Internet of Things -- Binomial Logistic Regression Resource Optimized Routing In MANET -- Homo Sapiens Sapiens Diabetes Mellitus Detection and Classification -- Improved Logistic Map based Algorithm for Biometric Image Encryption -- Accuracy Analysis of Similarity Measures in Surprise Framework -- Tunable Access Control for Data Sharing in Cloud -- Conceptual Online Education using E-Learning Platform of Cloud Computing -- Efficient Deployment of Web Application in Serverless Environment. |
Record Nr. | UNINA-9910484304303321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Inventive systems and control : proceedings of ICISC 2021 ; Coimbatore, India, 7-8 January 2021 / / V. Suma [et al.] editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XXIX, 995 p. 521 illus., 398 illus. in color. ) |
Disciplina | 620.001171 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Systems engineering
Electronic systems Artificial intelligence |
ISBN | 981-16-1395-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Knowledge Graphs in Recommender Systems -- Chapter 2. Cyberbullying Detection on Social Media using SVM -- Chapter 3. Ultraviolet Radiation in Healthcare Applications: A Decades-old Game Changer Technology in COVID'19 -- Chapter 4. Multi-agent Ludo Game Collaborative Path Planning based on Markov Decision Process -- Chapter 5. An Analysis of Epileptic Seizure Detection and Classification using Machine Learning based Artificial Neural Network -- Chapter 6. Improving Image Resolution On Surveillance Images using SRGAN -- Chapter 7. Smart City: Recent Advances and Research Issues -- Chapter 8. HOUSEN: Hybrid Over-Under Sampling and Ensemble Approach for Imbalance Classification -- Chapter 9. E-Pro: Euler Angle and Probabilistic Model for Face Detection and Recognition -- Chapter 10. Classification of Covid-19 Tweets Using Deep Learning Techniques -- Chapter 11. Applied Classification Algorithms used in Data Mining During the Vocational Guidance Process in Machine Learning -- Chapter 12. Meta-heuristic Algorithm for the Global Optimization: Intelligent Ice Fishing Algorithm -- Chapter 13. Progression of EEG-BCI Classification Techniques : A Study -- Chapter 14. Cuckoo Scheduling Algorithm for Lifetime Optimization in Sensor Networks of IoT -- Chapter 15. Design & Development of an Automated Snack Maker with CNN based Quality Monitoring. |
Record Nr. | UNINA-9910483731703321 |
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018) / / edited by A.Pasumpon Pandian, Tomonobu Senjyu, Syed Mohammed Shamsul Islam, Haoxiang Wang |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (1,096 pages) : illustrations |
Disciplina |
004
004.678 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Electrical engineering
Computational intelligence Artificial intelligence Communications Engineering, Networks Computational Intelligence Artificial Intelligence |
ISBN | 3-030-24643-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Comprehensive Survey on Detection of Living or Dead Humans and Animals Using Different Approaches -- Biometric Passport Security Using Encrypted Biometric Data Encoded in the HCC2D Code -- Brain tumour Identification through MRI Images Using Convolution Neural Networks -- Contagious Diseases Prediction in Healthcare over Big Data -- Recognition of Characters in a Securely Transmitted Medical Image -- Efficiency Improvement in Code Emulation by Soft Computing Technique -- Energy Aware Routing Applications for Internet of Things -- Ameliorated Domain Adaptation Using Adaptive Classification Algorithm -- Biometric Image Processing Recognition in Retinal Eye using Machine Learning Technique. |
Record Nr. | UNINA-9910366577303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|