| Preface |
|
xiii | |
| 1 Industry 4.0: Smart Water Management System Using IoT |
|
1 | (14) |
|
|
|
|
|
|
|
|
|
|
|
2 | (2) |
|
|
|
2 | (1) |
|
|
|
2 | (1) |
|
|
|
3 | (1) |
|
1.1.4 Smart Water Management |
|
|
3 | (1) |
|
|
|
4 | (3) |
|
1.2.1 Internet World to Intelligent World |
|
|
4 | (1) |
|
1.2.2 Architecture of IoT System |
|
|
4 | (2) |
|
1.2.3 Architecture of Smart City |
|
|
6 | (1) |
|
1.3 Literature Review on SWMS |
|
|
7 | (4) |
|
1.3.1 Water Quality Parameters Related to SWMS |
|
|
8 | (1) |
|
1.3.2 SWMS in Agriculture |
|
|
8 | (1) |
|
1.3.3 SWMS Using Smart Grids |
|
|
9 | (1) |
|
1.3.4 Machine Learning Models in SWMS |
|
|
10 | (1) |
|
|
|
11 | (1) |
|
|
|
11 | (1) |
|
|
|
12 | (3) |
| 2 Fourth Industrial Revolution Application: Network Forensics Cloud Security Issues |
|
15 | (20) |
|
|
|
|
|
|
|
|
|
|
|
16 | (4) |
|
|
|
16 | (1) |
|
2.1.2 The Fourth Industrial Revolution |
|
|
17 | (1) |
|
2.1.2.1 Machine-to-Machine (M2M) Communication |
|
|
18 | (1) |
|
|
|
18 | (6) |
|
2.1.3.1 Infrastructure-as-a-Service (IaaS) |
|
|
19 | (1) |
|
2.1.3.2 Challenges of Cloud Security in Fourth Industrial Revolution |
|
|
19 | (1) |
|
2.2 Generic Model Architecture |
|
|
20 | (4) |
|
|
|
24 | (4) |
|
2.3.1 OpenNebula (Hypervisor) Implementation Platform |
|
|
24 | (1) |
|
2.3.2 NetworkMiner Analysis Tool |
|
|
25 | (2) |
|
2.3.3 Performance Matrix Evaluation & Result Discussion |
|
|
27 | (1) |
|
2.4 Cloud Security Impact on M2M Communication |
|
|
28 | (2) |
|
2.4.1 Cloud Computing Security Application in the Fourth Industrial Revolution (4.0) |
|
|
29 | (1) |
|
|
|
30 | (1) |
|
|
|
31 | (4) |
| 3 Regional Language Recognition System for Industry 4.0 |
|
35 | (20) |
|
|
|
|
|
|
|
|
|
|
|
36 | (3) |
|
3.2 Automatic Speech Recognition System |
|
|
39 | (10) |
|
|
|
41 | (1) |
|
|
|
42 | (4) |
|
3.2.2.1 Linear Predictive Coding (LPC) |
|
|
42 | (2) |
|
3.2.2.2 Linear Predictive Cepstral Coefficient (LPCC) |
|
|
44 | (1) |
|
3.2.2.3 Perceptual Linear Predictive (PLP) |
|
|
44 | (1) |
|
3.2.2.4 Power Spectral Analysis |
|
|
44 | (1) |
|
3.2.2.5 Mel Frequency Cepstral Coefficients |
|
|
45 | (1) |
|
3.2.2.6 Wavelet Transform |
|
|
46 | (1) |
|
3.2.3 Implementation of Deep Learning Technique |
|
|
46 | (10) |
|
3.2.3.1 Recurrent Neural Network |
|
|
47 | (1) |
|
3.2.3.2 Long Short-Term Memory Network |
|
|
47 | (1) |
|
3.2.3.3 Hidden Markov Models (HMM) |
|
|
47 | (1) |
|
3.2.3.4 Hidden Markov Models - Long Short-Term Memory Network (HMM-LSTM) |
|
|
48 | (1) |
|
3.2.3.5 Evaluation Metrics |
|
|
49 | (1) |
|
3.3 Literature Survey on Existing TSRS |
|
|
49 | (3) |
|
|
|
52 | (1) |
|
|
|
52 | (3) |
| 4 Approximation Algorithm and Linear Congruence: An Approach for Optimizing the Security of IoT-Based Healthcare Management System |
|
55 | (34) |
|
|
|
|
|
|
|
56 | (6) |
|
4.1.1 IoT in Medical Devices |
|
|
56 | (1) |
|
4.1.2 Importance of Security and Privacy Protection in IoT-Based Healthcare System |
|
|
57 | (1) |
|
4.1.3 Cryptography and Secret Keys |
|
|
58 | (1) |
|
|
|
58 | (1) |
|
4.1.5 Approximation Algorithm and Subset Sum Problem |
|
|
58 | (1) |
|
4.1.6 Significance of Use of Subset Sum Problem in Our Scheme |
|
|
59 | (1) |
|
|
|
60 | (1) |
|
4.1.8 Linear and Non-Linear Functions |
|
|
61 | (1) |
|
|
|
61 | (1) |
|
|
|
62 | (1) |
|
|
|
63 | (1) |
|
4.4 Solution Domain and Objectives |
|
|
64 | (1) |
|
|
|
65 | (6) |
|
|
|
65 | (1) |
|
4.5.2 Session Key Generation |
|
|
65 | (2) |
|
4.5.3 Intermediate Key Generation |
|
|
67 | (2) |
|
|
|
69 | (1) |
|
4.5.5 Generation of Authentication Code and Transmission File |
|
|
70 | (1) |
|
|
|
71 | (1) |
|
4.6 Results and Discussion |
|
|
71 | (14) |
|
4.6.1 Statistical Analysis |
|
|
72 | (1) |
|
4.6.2 Randomness Analysis of Key |
|
|
73 | (2) |
|
4.6.3 Key Sensitivity Analysis |
|
|
75 | (1) |
|
|
|
76 | (3) |
|
4.6.4.1 Key Space Analysis |
|
|
76 | (1) |
|
4.6.4.2 Brute-Force Attack |
|
|
77 | (1) |
|
4.6.4.3 Dictionary Attack |
|
|
77 | (1) |
|
4.6.4.4 Impersonation Attack |
|
|
78 | (1) |
|
|
|
78 | (1) |
|
|
|
78 | (1) |
|
4.6.5 Comparative Analysis |
|
|
79 | (6) |
|
4.6.5.1 Comparative Analysis Related to IoT Attacks |
|
|
79 | (6) |
|
4.6.6 Significance of Authentication in Our Proposed Scheme |
|
|
85 | (1) |
|
|
|
85 | (1) |
|
|
|
86 | (3) |
| 5 A Hybrid Method for Fake Profile Detection in Social Network Using Artificial Intelligence |
|
89 | (24) |
|
|
|
|
|
|
|
|
|
|
|
90 | (1) |
|
|
|
91 | (3) |
|
|
|
94 | (9) |
|
|
|
94 | (1) |
|
5.3.2 Detection of Fake Account |
|
|
94 | (1) |
|
5.3.3 Suggested Framework |
|
|
95 | (8) |
|
|
|
97 | (1) |
|
5.3.3.2 Principal Component Analysis (PCA) |
|
|
98 | (1) |
|
5.3.3.3 Learning Algorithms |
|
|
99 | (3) |
|
5.3.3.4 Feature or Attribute Selection |
|
|
102 | (1) |
|
|
|
103 | (6) |
|
|
|
103 | (1) |
|
5.4.2 Analysis of Metrics |
|
|
104 | (1) |
|
5.4.3 Performance Evaluation of Proposed Model |
|
|
105 | (1) |
|
5.4.4 Performance Analysis of Classifiers |
|
|
105 | (4) |
|
|
|
109 | (1) |
|
|
|
109 | (4) |
| 6 Packet Drop Detection in Agricultural-Based Internet of Things Platform |
|
113 | (18) |
|
|
|
Geethanjali Purushothaman |
|
|
|
|
113 | (1) |
|
6.2 Problem Statement and Related Work |
|
|
114 | (1) |
|
6.3 Implementation of Packet Dropping Detection in IoT Platform |
|
|
115 | (5) |
|
|
|
120 | (9) |
|
|
|
129 | (1) |
|
|
|
129 | (2) |
| 7 Smart Drone with Open CV to Clean the Railway Track |
|
131 | (10) |
|
|
|
|
|
|
|
132 | (1) |
|
|
|
132 | (2) |
|
|
|
134 | (1) |
|
|
|
134 | (3) |
|
7.4.1 Drones with Human Intervention |
|
|
134 | (1) |
|
7.4.2 Drones without Human Intervention |
|
|
135 | (2) |
|
|
|
137 | (1) |
|
|
|
137 | (2) |
|
|
|
139 | (1) |
|
|
|
139 | (2) |
| 8 Blockchain and Big Data: Supportive Aid for Daily Life |
|
141 | (38) |
|
|
|
|
|
|
|
|
|
142 | (3) |
|
8.1.1 Steps of Blockchain Technology Works |
|
|
144 | (1) |
|
|
|
144 | (1) |
|
8.1.3 Blockchain Security |
|
|
145 | (1) |
|
8.2 Blockchain vs. Bitcoin |
|
|
145 | (6) |
|
8.2.1 Blockchain Applications |
|
|
146 | (1) |
|
8.2.2 Next Level of Blockchain |
|
|
146 | (3) |
|
8.2.3 Blockchain Architecture's Basic Components |
|
|
149 | (1) |
|
8.2.4 Blockchain Architecture |
|
|
150 | (1) |
|
8.2.5 Blockchain Characteristics |
|
|
150 | (1) |
|
8.3 Blockchain Components |
|
|
151 | (4) |
|
|
|
152 | (1) |
|
|
|
153 | (1) |
|
|
|
153 | (1) |
|
8.3.4 Consensus Mechanism |
|
|
154 | (1) |
|
8.3.4.1 Proof of Work (PoW) |
|
|
155 | (1) |
|
8.3.4.2 Proof of Stake (PoS) |
|
|
155 | (1) |
|
8.4 Categories of Blockchain |
|
|
155 | (3) |
|
|
|
156 | (1) |
|
|
|
156 | (1) |
|
8.4.3 Consortium Blockchain |
|
|
156 | (1) |
|
|
|
156 | (2) |
|
8.5 Blockchain Applications |
|
|
158 | (2) |
|
8.5.1 Financial Application |
|
|
158 | (1) |
|
|
|
158 | (1) |
|
|
|
158 | (1) |
|
8.5.2 Non-Financial Applications |
|
|
159 | (28) |
|
|
|
159 | (1) |
|
|
|
159 | (1) |
|
8.6 Blockchain in Different Sectors |
|
|
160 | (1) |
|
8.7 Blockchain Implementation Challenges |
|
|
160 | (3) |
|
8.8 Revolutionized Challenges in Industries |
|
|
163 | (7) |
|
|
|
170 | (2) |
|
|
|
172 | (7) |
| 9 A Novel Framework to Detect Effective Prediction Using Machine Learning |
|
179 | (16) |
|
|
|
|
|
|
|
|
|
|
|
180 | (1) |
|
|
|
180 | (2) |
|
9.3 Prediction in Agriculture |
|
|
182 | (1) |
|
9.4 Prediction in Healthcare |
|
|
183 | (1) |
|
9.5 Prediction in Economics |
|
|
184 | (1) |
|
9.6 Prediction in Mammals |
|
|
185 | (1) |
|
9.7 Prediction in Weather |
|
|
186 | (1) |
|
|
|
186 | (1) |
|
|
|
187 | (2) |
|
|
|
187 | (1) |
|
|
|
188 | (1) |
|
9.9.3 Algorithm Selection |
|
|
188 | (1) |
|
9.9.4 Training the Machine |
|
|
188 | (1) |
|
9.9.5 Model Evaluation and Prediction |
|
|
188 | (1) |
|
|
|
188 | (1) |
|
|
|
189 | (1) |
|
|
|
189 | (3) |
|
9.10.1 Farmers and Sellers |
|
|
189 | (1) |
|
|
|
189 | (1) |
|
|
|
190 | (2) |
|
|
|
192 | (1) |
|
|
|
192 | (3) |
| 10 Dog Breed Classification Using CNN |
|
195 | (12) |
|
|
|
|
|
|
|
195 | (1) |
|
|
|
196 | (2) |
|
|
|
198 | (3) |
|
10.4 Results and Discussions |
|
|
201 | (2) |
|
|
|
201 | (1) |
|
|
|
201 | (2) |
|
|
|
203 | (1) |
|
|
|
203 | (4) |
| 11 Methodology for Load Balancing in Multi-Agent System Using SPE Approach |
|
207 | (22) |
|
|
|
|
|
207 | (1) |
|
11.2 Methodology for Load Balancing |
|
|
208 | (5) |
|
11.3 Results and Discussion |
|
|
213 | (6) |
|
11.3.1 Proposed Algorithm in JADE Tool |
|
|
213 | (5) |
|
11.3.1.1 Sensitivity Analysis |
|
|
218 | (1) |
|
11.3.2 Proposed Algorithm in NetLogo |
|
|
218 | (1) |
|
|
|
219 | (1) |
|
11.5 Results and Discussion |
|
|
219 | (7) |
|
|
|
226 | (1) |
|
|
|
226 | (3) |
| 12 The Impact of Cyber Culture on New Media Consumers |
|
229 | |
|
|
|
|
|
229 | (2) |
|
12.2 The Rise of the Term of Cyber Culture |
|
|
231 | (3) |
|
12.2.1 Cyber Culture in the 21st Century |
|
|
231 | (3) |
|
12.2.1.1 Socio-Economic Results of Cyber Culture |
|
|
232 | (1) |
|
12.2.1.2 Psychological Outcomes of Cyber Culture |
|
|
233 | (1) |
|
12.2.1.3 Political Outcomes of Cyber Culture |
|
|
234 | (1) |
|
12.3 The Birth and Outcome of New Media Applications |
|
|
234 | (10) |
|
12.3.1 New Media Environments |
|
|
236 | (8) |
|
12.3.1.1 Social Sharing Networks |
|
|
237 | (3) |
|
12.3.1.2 Network Logs (Blog, Weblog) |
|
|
240 | (1) |
|
|
|
240 | (1) |
|
12.3.1.4 Digital News Sites and Mobile Media |
|
|
240 | (1) |
|
12.3.1.5 Multimedia Media |
|
|
241 | (1) |
|
12.3.1.6 What Affects the New Media Consumers' Tendencies? |
|
|
242 | (2) |
|
|
|
244 | (1) |
|
|
|
245 | |
| Index |
|
25 | |