Vai al contenuto principale della pagina

Advances in IoT and Security with Computational Intelligence : Proceedings of ICAISA 2023, Volume 2 / / edited by Anurag Mishra, Deepak Gupta, Girija Chetty



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Mishra Anurag Visualizza persona
Titolo: Advances in IoT and Security with Computational Intelligence : Proceedings of ICAISA 2023, Volume 2 / / edited by Anurag Mishra, Deepak Gupta, Girija Chetty Visualizza cluster
Pubblicazione: Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Edizione: 1st ed. 2023.
Descrizione fisica: 1 online resource (418 pages)
Disciplina: 004.678
Soggetto topico: Computational intelligence
Internet of things
Data protection
Computational Intelligence
Internet of Things
Data and Information Security
Altri autori: GuptaDeepak  
ChettyGirija  
Nota di contenuto: Intro -- Preface -- Contents -- Editors and Contributors -- Comparative Study of Metaheuristic Algorithms for Scheduling in Cloud Computing Based on QoS Parameters -- 1 Introduction -- 1.1 Contributions -- 2 Review Literature -- 3 Scheduling Approaches -- 3.1 Heuristic Approaches -- 3.2 Metaheuristic Approaches -- 4 Problem Description and QoS Parameters -- 5 Comparative Analysis of PSO, GA, and ACO -- 6 Conclusion and Future Work -- References -- Impact of Spatial Distribution of Repeated Samples on the Geometry of Hyperplanes -- 1 Introduction -- 2 Review of SVM Classifiers -- 2.1 Support Vector Machine (SVM) -- 3 Experimental Setup, Results, and Analysis -- 3.1 Dataset Used -- 3.2 Algorithm -- 3.3 Case 1 and Case 3: Repeating the Left-Side Support Vectors Belonging to the Positive and Negative Classes -- 3.4 Case 2 and Case 4: Repeating the Right-Side Support Vectors Belonging to the Positive and Negative Classes -- 4 Conclusion and Future Directions -- References -- IoT-Based Smart Farming for Sustainable Agriculture -- 1 Introduction -- 2 Methodology -- 2.1 IoT in Indian Agriculture and Its Applications -- 2.2 Agridat Package in RStudio -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- ELM-Based Liver Disease Prediction Model -- 1 Introduction -- 2 Extreme Learning Machine -- 3 Dataset -- 4 Proposed Methodology -- 5 Result and Discussion -- 5.1 Performance Analysis of ELM Using 80:20 Training-Testing Ratio -- 5.2 Performance Analysis of ELM Using 70:30 Training-Testing Ratio -- 5.3 Comparison with Other Published Works Done in the Same Domain -- 6 Conclusion -- References -- Intercompatibility of IoT Devices Using Matter: Next-Generation IoT Connectivity Protocol -- 1 Introduction -- 1.1 Current Alternatives -- 2 Need for Matter -- 2.1 Smart Home Ecosystems -- 2.2 Consumer and Manufacturer Standpoint -- 2.3 Security.
3 What is Matter -- 3.1 Architecture -- 3.2 Security -- 4 Thread for Matter -- 5 Outcome -- 5.1 Moving Forward -- References -- Role of Node Centrality for Information Dissemination in Delhi Metro Network -- 1 Introduction -- 1.1 Our Contributions -- 2 Characteristics of the Network -- 2.1 Structural Properties -- 2.2 Centrality Metrics -- 3 Methodology -- 3.1 Construction of Delhi Metro Network -- 3.2 Information Diffusion Model -- 4 Results -- 4.1 Identifying Prominent Metro Stations -- 4.2 Role of the Central Most Station on Information Dissemination -- 4.3 Identifying Efficient Centrality Measure by Regression Analysis -- 4.4 Connectivity Analysis -- 5 Conclusion -- References -- Biometric Iris Recognition System's Software and Hardware Implementation Using LabVIEW Tool -- 1 Introduction -- 2 Methodology -- 3 Drawbacks of the Research Works Done by Earlier Researchers -- 4 Image Analysis and the Image Recognition Algorithmic Steps -- 5 Recognition of Iris Procedures Utilizing Sing DIP Summaries -- 6 Overview of the LabVIEW Concepts -- 7 Proposed Contributions -- 8 Conclusions -- References -- A Unique Method of Detection of Edges and Circles of Multiple Objects in Imaging Scenarios Using Line Descriptor Concepts -- 1 Introduction -- 2 Block-Diagrams/Flow-Charts -- 3 Chain Coding Process -- 4 Approaches -- 5 Introductory Remarks -- 6 Line Descriptors -- 7 Program/Algorithm Developed -- 8 Conclusion -- References -- Robotic Vision: Simultaneous Localization And Mapping (SLAM) and Object Recognition -- 1 Introduction -- 2 Literature Survey -- 3 LiDAR SLAM -- 4 YOLO_v4 -- 5 Hardware Used -- 6 Results -- 7 Conclusion -- References -- Optimum Value of Cyclic Prefix (CP) to Reduce Bit Error Rate (BER) in OFDM -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Simulation Flowchart -- 5 Results and Conclusion.
5.1 BPSK (Binary Phase Shift Keying) -- 5.2 QPSK (Quadrature Phase Shift Keying) -- 5.3 16-QAM (16-Quadrature Amplitude Multiplexing) -- 5.4 32-QAM (32-Quadrature Amplitude Multiplexing) -- References -- Optimum Sizing of Solar/Wind/Battery Storage in Hybrid Energy System Using Improved Particle Swarm Optimization and Firefly Algorithm -- 1 Introduction -- 2 System Configuration, Mathematical Modeling of Components of Hybrid Renewable Energy System, Objective Function and Constraints -- 2.1 Mathematical Modeling of Components of Hybrid Energy System: [15, 17] -- 2.2 Objective Function and Constraints -- 3 Size Optimization Algorithms -- 3.1 Improved Particle Swarm Optimization (IPSO) [15, 17, 18] -- 3.2 Firefly Algorithm (FA): [11, 12, 16]: -- 3.3 Procedure for Implementing IPSO [18] and FA -- 3.4 Comparison of Optimization Methods IPSO and FA -- 4 Results and Discussions -- 5 Conclusions -- References -- Fuzzy Based MPPT Control of Multiport Boost Converter for Solar Based Electric Vehicle -- 1 Introduction -- 2 Proposed System -- 3 Solar PV -- 3.1 Solar PV Array -- 3.2 Fuzzy-Based MPPT Control -- 4 Non-isolated Multiport Boost Converter -- 4.1 Double Output Mode -- 5 Proposed Controller -- 6 Results -- 7 Conclusion -- References -- Image Classification Model Based on Machine Learning Using GAN and CNN Algorithm -- 1 Introduction -- 1.1 Face Detection -- 1.2 Developing Face Recognition Software -- 2 Literature Review -- 3 Experimental Investigation -- 3.1 Description of Modules -- 3.2 Response and Conversation -- 4 Result Analysis -- 5 Data Visualization Techniques -- 6 Conclusion -- References -- Role of Natural Language Processing for Text Mining of Education Policy in Rajasthan -- 1 Introduction -- 1.1 Interpretation with ML for NLP -- 1.2 About Education Policy 2020 -- 2 Methodology -- 2.1 Code and Executed Screenshots of Python for NLP.
3 Results -- 4 Conclusion -- References -- Multilingual and Cross Lingual Audio Emotion Analysis Using RNN -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 3.1 Database -- 3.2 Data Augmentation Technique -- 3.3 Feature Extraction -- 3.4 Convolution Neural Network -- 3.5 LSTM Model -- 4 Proposed Model Framework -- 5 Experimental Results and Discussion- -- 5.1 Some Potential Comparison Studies Based on Mono-lingual Database -- 5.2 Multilingual Database Analysis -- 5.3 Cross-Lingual Database Analysis -- 6 Conclusions -- References -- Multi-modality Brain Tumor Segmentation of MRI Images Using ResUnet with Attention Mechanism -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Preprocessing and Data Augmentation -- 3.2 ResUnet with Attention Mechanism -- 4 Results and Discussion -- 4.1 Dataset (BraTs 2020) -- 4.2 Experimental Setup -- 4.3 Performance Metrics -- 4.4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- CPF Analysis for Identification of Voltage Collapse Point and Voltage Stability of an IEEE-5 Bus System Using STATCOM -- 1 Introduction -- 2 System Structure -- 3 Simulation Results and Discussion -- 4 Conclusion -- References -- Analysis of Various Blockchain-Based Solutions for Electronic Health Record System -- 1 Introduction -- 2 Blockchain Technology/Fundamentals -- 3 Blockchain Development Tools -- 4 Blockchain for EHR -- 5 Comparative Analysis of Existing Blockchain-Based Solutions -- 6 Conclusion -- References -- Coordinated Network of Sensors Over 5G for High-Resolution Protection of City Assets During Earthquakes -- 1 Introduction -- 1.1 Current Technology for Earthquake Early Warning -- 1.2 Proposed Dense Network of Sensors for Individual Asset Damage Assessment -- 2 Mini-Seismic Stations -- 3 Sensors Coordination -- 3.1 Asynchronous Sensor Coordination Algorithm.
3.2 Latency Measurements -- 4 Performance-Based Damage Assessment -- 5 Infrastructures Interdependencies Integration (I2SIM) -- 6 Conclusion -- References -- Detection of COVID-19 Using Medical Image Processing -- 1 Introduction -- 2 Contribution of Medical Image Processing in COVID-19 -- 3 Medical Image Processing with Deep Learning in COVID-19 -- 4 Conclusions -- References -- Text Encryption Using ECC and Chaotic Map -- 1 Introduction -- 2 Preliminaries -- 2.1 Mathematical Computation with Elliptic Curve Over a Finite Field -- 2.2 Chaotic System -- 3 Data Grouping -- 4 Proposed Methodology -- 4.1 Encryption Algorithm -- 4.2 Decryption Algorithm -- 5 Experimental Simulation -- 6 Experimental Analysis -- 6.1 Key Space -- 6.2 Key Sensitivity -- 6.3 Histogram Analysis -- 6.4 Ciphertext Only Attack -- 6.5 Known Plaintext Attack -- 6.6 Performance Comparison -- 7 Conclusion -- References -- Plant Leaf Disease Detection and Classification: A Survey -- 1 Introduction -- 1.1 Motivation -- 2 Related Work -- 2.1 Disease Detection and Classification -- 2.2 Comparative Analysis -- 3 Findings -- 4 Conclusion -- References -- Performance Evaluation of K-SVCR in Multi-class Scenario -- 1 Introduction -- 2 Literature Review -- 3 K-Support Vector Classification Regression -- 4 Experimental Design -- 5 Conclusion and Future Scope -- References -- An Ensemble Method for Categorizing Cardiovascular Disease -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 Feature Engineering -- 4 Model Training and Disease Classification -- 5 Model Performance Evaluation -- 6 Discussion and Conclusion -- References -- Intrusion Detection System for Internet of Medical Things -- 1 Introduction -- 2 IoMT -- 2.1 Components of IoMT -- 2.2 3-Layer Architecture -- 2.3 Intrusion Detection in IoMT -- 3 Integrative Technologies in IoMT.
3.1 Blockchain Technology.
Sommario/riassunto: The book is a collection of peer-reviewed best-selected research papers presented at the International Conference on Advances in IoT and Security with AI (ICAISA 2023), organized by Deen Dayal Upadhyaya College, University of Delhi, New Delhi, India, in collaboration with University of Canberra, Canberra, Australia, and NIT, Arunachal Pradesh, Itanagar, AP, India, during March 24–25, 2023. The book includes various applications and technologies in this specialized sector of Industry 4.0. The book is divided into two volumes. It focuses on recent advances in Internet of Things and security with its applications using artificial intelligence.
Titolo autorizzato: Advances in IoT and Security with Computational Intelligence  Visualizza cluster
ISBN: 9789819950881
9819950880
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910746297503321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems, . 2367-3389 ; ; 756