Muutke küpsiste eelistusi

E-raamat: Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real-time Applications

Edited by , Edited by (School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, India), Edited by , Edited by (School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, India), Edited by (University of Technology and Applied Sciences, Al Musannah Sultanate of )
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 28-Jan-2022
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119682530
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 137,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 28-Jan-2022
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119682530
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

SMART AND SUSTAINABLE APPROACHES FOR OPTIMIZING PERFORMANCE OF WIRELESS NETWORK

Explores the intersection of sustainable growth, green computing and automation, and performance optimization of 5G wireless networks

Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks explores how wireless sensing applications, green computing, and Big Data analytics can increase the energy efficiency and environmental sustainability of real-time applications across areas such as healthcare, agriculture, construction, and manufacturing.

Bringing together an international team of expert contributors, this authoritative volume highlights the limitations of conventional technologies and provides methodologies and approaches for addressing Quality of Service (QOS) issues and optimizing network performance. In-depth chapters cover topics including blockchain-assisted secure data sharing, smart 5G Internet of Things (IoT) scenarios, intelligent management of ad hoc networks, and the use of Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL) techniques in smart healthcare, smart manufacturing, and smart agriculture.

  • Covers design, implementation, optimization, and sustainability of wireless and sensor-based networks
  • Discusses concepts of sustainability and green computing as well as their relevance to society and the environment
  • Addresses green automation applications in various disciplines such as computer science, nanoscience, information technology (IT), and biochemistry
  • Explores various smart and sustainable approaches for current wireless and sensor-based networks
  • Includes detailed case studies of current methodologies, applications, and implementations

Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real-time Applications is an essential resource for academic researchers and industry professionals working to integrate sustainable development and Information and Communications Technology (ICT).

About the Editors xv
List of Contributors
xix
1 Analysis and Clustering of Sensor Recorded Data to Determine Sensors Consuming the Least Energy
1(32)
Prashant Abbi
Khushi Arora
Praveen Kumar Gupta
K.B. Ashwini
V. Chayapathy
M.J. Vidya
1.1 Introduction
1(1)
1.2 The Working of WSNs and Sensor Nodes
2(1)
1.3 Classification of WSNs
3(3)
1.3.1 Benefits and Drawbacks of Centralized Techniques
5(1)
1.3.2 Benefits and Drawbacks of Distributed Techniques
6(1)
1.4 Security Issues
6(2)
1.4.1 Layer-or Level-based Security
7(1)
1.5 Energy Consumption Issues
8(1)
1.6 Commonly Used Standards and Protocols for WSNs
9(3)
1.6.1 Slotted Protocols
10(1)
1.6.1.1 Time Division Multiple Access
10(1)
1.6.1.2 ZigBee/802.15.4
10(1)
1.6.1.3 Sensor Medium Access Control
11(1)
1.7 Effects of Temperature and Humidity on the Energy of WSNs
12(2)
1.7.1 Effects of Temperature on Signal Strength
13(1)
1.7.2 Effects of Humidity on Signal Strength
13(1)
1.7.3 Temperature vs. Humidity
14(1)
1.8 Proposed Methodology
14(7)
1.8.1 Information Gathering and Analysis
16(1)
1.8.2 System Design and Implementation
16(3)
1.8.3 Testing and Evaluation
19(2)
1.9 Conclusion
21(12)
References
22(11)
2 Impact of Artificial Intelligence in Designing of 5G
33(18)
Maheswari K. Mohankumar
Banuroopa
2.1 5G -- An Introduction
33(4)
2.1.1 Industry Applications
34(1)
2.1.2 Healthcare
34(1)
2.1.3 Retail
34(1)
2.1.4 Agriculture
35(1)
2.1.5 Manufacturing
35(1)
2.1.6 Logistics
35(1)
2.1.7 Sustainability of 5G Networks
35(1)
2.1.8 Implementation of 5G
36(1)
2.1.9 Architecture of 5G Technology
36(1)
2.2 5G and AI
37(2)
2.2.1 Gaming and Virtual Reality
38(1)
2.3 AI and 5G
39(5)
2.3.1 Continuous Learning AI Model
42(2)
2.4 Challenges and Roadmap
44(3)
2.4.1 Technical Issues
45(1)
2.4.2 Technology Roadmap
46(1)
2.4.3 Deployment Roadmap
46(1)
2.5 Mathematical Models
47(2)
2.5.1 The Insights of Mathematical Modeling in 5G Networks
48(1)
2.6 Conclusion
49(2)
References
49(2)
3 Sustainable Paradigm for Computing the Security of Wireless Internet of Things: Blockchain Technology
51(16)
Sana Zeba
Mohammed Amjad
Danish Raza Rizvi
3.1 Introduction
51(2)
3.2 Research Background
53(4)
3.2.1 The Internet of Things
53(1)
3.2.1.1 Security Requirements in Wireless IoT
53(1)
3.2.1.2 Layered Architecture of Wireless IoT
54(1)
3.2.2 Blockchain Technology
55(1)
3.2.2.1 Types of Blockchain
55(1)
3.2.2.2 Integration of Blockchain with Wireless Internet of Things
56(1)
3.3 Related Work
57(2)
3.3.1 Security Issues in Wireless IoT System
57(1)
3.3.2 Solutions of Wireless IoT Security Problem
58(1)
3.4 Research Methodology
59(3)
3.5 Comparison of Various Existing Solutions
62(1)
3.6 Discussion of Research Questions
62(1)
3.7 Future Scope of Blockchain in IoT
63(1)
3.8 Conclusion
63(4)
References
64(3)
4 Cognitive IoT-Based Health Monitoring Scheme Using Non-Orthogonal Multiple Access
67(24)
Ashiqur Rahman Rahul
Saifur Rahman Sabuj
Majumder Fazle Haider
Shakil Ahmed
4.1 Introduction
67(1)
4.2 Related Work
68(2)
4.3 System Model and Implementation
70(6)
4.3.1 Network Description
70(1)
4.3.2 Sensing and Transmission Analysis
70(1)
4.3.3 Pathloss Model
71(1)
4.3.4 Mathematical Model Evaluation
72(1)
4.3.4.1 Effectual Throughput
72(1)
4.3.4.2 Interference Throughput
73(1)
4.3.4.3 Energy Efficiency
73(1)
4.3.4.4 Optimum Power
74(2)
4.4 Simulation Results
76(4)
4.5 Conclusion
80(1)
4.A Appendix
80(11)
4.A.1 Proof of Optimum Power Transmission for HRC Device at Effectual State (z = 0)
80(2)
4.A.2 Proof of Optimum Power Transmission for HRC Device in Interference State (z = 1)
82(1)
4.A.3 Proof of Optimum Power Transmission for MRC Device at Effectual State (z = 0)
83(1)
4.A.4 Proof of Optimum Power Transmission for MRC Device in Interference State (z = 1)
84(2)
References
86(5)
5 Overview of Resource Management for Wireless Ad Hoc Network
91(34)
Mehajabeen Fatima
Afreen Khursheed
5.1 Introduction
91(9)
5.1.1 Wired and Wireless Network Design Approach
93(3)
5.1.2 History
96(1)
5.1.3 Spectrum of Wireless Ad Hoc Network
97(1)
5.1.4 Enabling and Networking Technologies
98(2)
5.1.5 Taxonomy of Wireless Ad Hoc Network (WANET)
100(1)
5.2 Mobile Ad Hoc Network (MANET)
100(4)
5.2.1 Introduction to MANET
101(1)
5.2.2 Common Characteristics of MANET
102(1)
5.2.3 Disadvantages
102(1)
5.2.4 Applications of MANET
103(1)
5.2.5 Major Issues of MANET
104(1)
5.3 Vehicular Ad Hoc Network (VANET)
104(3)
5.3.1 Introduction to VANET
104(1)
5.3.2 Common Features of VANET
105(1)
5.3.3 Pros, Cons, Applications
106(1)
5.4 Wireless Mesh Network (WMN)
107(4)
5.4.1 Preface of WMN
107(1)
5.4.2 Common Traits of WMN
108(1)
5.4.3 WMN Open Issues and Research Challenges
109(1)
5.4.4 Performance Metrics
109(1)
5.4.5 Advantages and Disadvantages
110(1)
5.4.6 Prominent Areas and Challenges of WMN
110(1)
5.5 Wireless Sensor Network (WSN)
111(2)
5.5.1 Overview of WSN
111(1)
5.5.2 Common Properties of WSN
112(1)
5.5.3 Benefits, Harms, and Usage of WSN
112(1)
5.6 Intelligent Resource Management Concerns in WANET
113(6)
5.6.1 Major Issues of WANET
114(1)
5.6.2 Challenges of MAC Protocols
115(1)
5.6.3 Routing Protocols
116(1)
5.6.3.1 Challenges of Routing Protocols
116(2)
5.6.4 Energy and Battery Management
118(1)
5.7 Future Research Directions
119(2)
5.8 Conclusion
121(4)
References
121(4)
6 A Survey: Brain Tumor Detection Using MRI Image with Deep Learning Techniques
125(14)
Chalapathiraju Kanumuri
C.H. Renu Madhavi
6.1 Introduction
125(1)
6.2 Background
126(4)
6.2.1 Types of Medical Imaging
126(2)
6.2.2 MR Imaging as a Modality
128(1)
6.2.3 Types of Brain Tumor MR Imaging Modalities
128(1)
6.2.4 Suitable Technologies Before Machine Learning
129(1)
6.2.5 MRI Brain Image Segmentation
130(1)
6.3 Related Work
130(3)
6.4 Gaps and Observations
133(1)
6.5 Suggestions
134(1)
6.6 Conclusion
135(4)
References
135(4)
7 Challenges, Standards, and Solutions for Secure and Intelligent 5G Internet of Things (IoT) Scenarios
139(28)
Ayasha Malik
Bharat Bhushan
7.1 Introduction
139(2)
7.2 Safety in Wireless Networks: Since 1G to 4G
141(6)
7.2.1 Safety in Non-IP Networks
142(1)
7.2.2 Safety in 3G
143(1)
7.2.3 Security in 4G
143(1)
7.2.4 Security in 5G
144(1)
7.2.4.1 Flashy System Traffic and Radio Visual Security Keys
145(1)
7.2.4.2 User Plane Integrity
145(1)
7.2.4.3 Authorized Network Security and Compliance with Subscriber Level Safety Policies
145(1)
7.2.5 Security in 5G and Beyond
145(2)
7.3 IoT Background and Requirements
147(3)
7.3.1 IoT and Its Characteristics
147(1)
7.3.2 Characteristics of IoT Infrastructure
147(1)
7.3.3 Characteristics of IoT Applications
148(1)
7.3.4 Expected Benefits of IoT Adoption for Organization
149(1)
7.3.4.1 Benefits Correlated to Big Data Created by IoT
149(1)
7.3.4.2 Benefits Interrelated to the Openness of IoT
149(1)
7.3.4.3 Benefits Related to the Linked Aspect of IoT
150(1)
7.4 Non 5G Standards Supporting IoT
150(2)
7.4.1 Bluetooth Low Energy
150(1)
7.4.2 IEEE 802.15.4
151(1)
7.4.3 LoRa
151(1)
7.4.4 Sigfox
152(1)
7.4.5 Wi-Fi HaLow
152(1)
7.5 5G Advanced Security Model
152(3)
7.5.1 Confidentiality
154(1)
7.5.2 Integrity
154(1)
7.5.3 Accessibility
154(1)
7.5.4 Integrated Safety Rule
154(1)
7.5.5 Visibility
155(1)
7.6 Safety Challenges and Resolution of Three-Tiers Structure of 5G Networks
155(3)
7.6.1 Heterogeneous Access Networks
155(1)
7.6.1.1 Safety Challenges
155(1)
7.6.1.2 Safety Resolutions
156(1)
7.6.2 Backhaul Networks
156(1)
7.6.2.1 Safety Challenges
156(1)
7.6.2.2 Safety Resolutions
157(1)
7.6.3 Core Network
157(1)
7.6.3.1 Safety Challenges
157(1)
7.6.3.2 Safety Resolutions
157(1)
7.7 Conclusion and Future Research Directions
158(9)
References
159(8)
8 Blockchain Assisted Secure Data Sharing in Intelligent Transportation Systems
167(22)
Gunjan Madaan
Avinash Kumar
Bharat Bhushan
8.1 Introduction
167(2)
8.2 Intelligent Transport System
169(3)
8.2.1 ITS Overview
169(2)
8.2.2 Issues in ITS
171(1)
8.2.3 ITS Role in IoT
171(1)
8.3 Blockchain Technology
172(106)
8.3.1 Overview
173(1)
8.3.2 Types of Blockchain
173(1)
8.3.2.1 Public Blockchain
173(1)
8.3.2.2 Private Blockchain
173(1)
8.3.2.3 Federated Blockchain
174(1)
8.3.3 Consensus Mechanism
174(1)
8.3.3.1 Proof of Work
174(1)
8.3.3.2 Proof of Stake
174(1)
8.3.3.3 Delegated Proof of Stake
175(1)
8.3.3.4 Practical Byzantine Fault Tolerance
175(1)
8.3.3.5 Casper
175(1)
8.3.3.6 Ripple
175(1)
8.3.3.7 Proof of Activity
176(1)
8.3.4 Cryptography
176(1)
8.3.5 Data Management and Its Structure
177(1)
8.4 Blockchain Assisted Intelligent Transportation System
178(1)
8.4.1 Security and Privacy
178(1)
8.4.2 Blockchain and Its Applications for Improving Security and Privacy
178(1)
8.4.3 ITS Based on Blockchain
179(1)
8.4.4 Recent Advancement
180(1)
8.5 Future Research Perspectives
180(2)
8.5.1 Electric Vehicle Recharging
180(1)
8.5.2 Smart City Enabling and Smart Vehicle Security
181(1)
8.5.3 Deferentially-Privacy Preserving Solutions
181(1)
8.5.4 Distribution of Economic Profits and Incentives
182(1)
8.6 Conclusion
182(7)
References
182(7)
9 Utilization of Agro Waste for Energy Engineering Applications: Toward the Manufacturing of Batteries and Super Capacitors
189(12)
S.N. Kumar
Akhil Sabuj
R. P. Nishitha
O. Lijo Joseph
Aju Mathew George
I. Christina Jane
9.1 Introduction
189(1)
9.2 Super Capacitors and Electrode Materials
190(2)
9.2.1 Energy Density
191(1)
9.3 Related Works in the Utilization of Agro-Waste for Energy Engineering Applications
192(3)
9.4 Inferences from Works Related with Utilization of Coconut, Rice Husk, and Pineapple Waste for Fabrication of Super Capacitor
195(1)
9.5 Factors Contributing in the Fabrication of Super Capacitor from Agro-Waste
195(2)
9.6 Conclusion
197(4)
Acknowledgment
197(1)
References
197(4)
10 Computational Intelligence Techniques for Optimization in Networks
201(16)
Ashu Gautam
Rashima Mahajan
10.1 Introduction Focussing on Pedagogy of Impending Approach
201(4)
10.1.1 Security Challenges in Networks
202(1)
10.1.2 Attacks Vulnerability in Complex Networks
203(2)
10.2 Relevant Analysis
205(2)
10.3 Broad Area of Research
207(4)
10.3.1 Routing Protocols
208(2)
10.3.2 Hybrid Protocols
210(1)
10.4 Problem Identification
211(1)
10.5 Objectives of the Study
211(1)
10.6 Methodology to be Adopted
212(1)
10.7 Proposed/Expected Outcome of the Research
212(5)
References
213(4)
11 R&D Export and ICT Regimes in India
217(10)
Sana Zeba
11.1 Introduction
217(2)
11.2 Artificial Intelligence the Uptake of Infrastructure Development
219(3)
11.3 Future Analysis and Conclusion
222(5)
References
225(2)
12 Metaheuristics to Aid Energy-Efficient Path Selection in Route Aggregated Mobile Ad Hoc Networks
227(18)
Deepa Mehta
Sherin Zafar
Siddhartha Sankar Biswas
Nida Iftekhar
Samia Khan
12.1 Introduction
227(2)
12.2 Framework
229(1)
12.2.1 Route Aggregation
229(1)
12.3 Clustering
229(1)
12.4 Ant Colony Optimization
229(3)
12.4.1 Setting Parameters and Initializing Pheromone Trails
230(1)
12.4.2 Generating Solutions
230(1)
12.4.3 Pheromone Update
231(1)
12.5 Methodology
232(4)
12.5.1 Energy Efficient ACO Algorithm
233(2)
12.5.2 ACO-Aided Cluster Design and Head Selection
235(1)
12.5.3 ACO-Aided Route Aggregation
236(1)
12.5.4 ACO-Aided Energy: Efficient Path Selection
236(1)
12.6 Results
236(3)
12.7 Discussion
239(1)
12.8 Conclusion
240(5)
References
240(5)
13 Knowledge Analytics in IOMT-MANET Through QoS Optimization for Sustainability
245(16)
Neha Sharma
Nida Iftekhar
Samia Khan
13.1 Introduction
245(2)
13.2 Related Work
247(1)
13.3 Proposed Neoteric Nature Inspired IWD Algorithm for ZRP
248(1)
13.4 Simulation Results
249(8)
13.5 Conclusion and Future Work
257(4)
References
258(3)
14 Appraise Assortment of IoT Security Optimization
261(10)
Ayesha Hena Afzal
14.1 Introduction
261(3)
14.2 Literature Review
264(3)
14.3 Analysis of Traditional Security Mechanisms in IOT
267(2)
14.4 Conclusion and Future Scope
269(2)
References
269(2)
15 Trust-Based Hybrid Routing Approach for Securing MANET
271(8)
Neha Sharma
Satrupa Biswas
15.1 Introduction
271(1)
15.2 Literature Review
272(2)
15.3 Gaps and Objectives from the Literature Review
274(1)
15.4 Methodology to be Adopted
275(1)
15.5 Comparison Analysis
276(1)
15.6 Conclusion and Future Scope
277(2)
References
277(2)
16 Study of Security Issues on Open Channel
279(4)
Md Mudassir Chaudhary
Siddhartha Sankar Biswas
Md Tabrez Nafis
Safdar Tanweer
16.1 Introduction
279(1)
16.2 Wireless Attacks
279(1)
16.2.1 Reconnaissance Attack
279(1)
16.2.2 Access Attacks
280(1)
16.2.3 Man-in-the-Middle Attack
280(1)
16.2.4 Denial of Services (DoS)
280(1)
16.3 Securing Wireless Transmissions
280(1)
16.3.1 Protecting the Confidentiality
280(1)
16.3.2 Protecting the Modification
281(1)
16.3.3 Preventing Interruption or Denial-of-Service Attack
281(1)
16.4 Proposed Model for Securing the Client Over the Channel
281(1)
16.5 Conclusion
282(1)
References
282(1)
Index 283
Sherin Zafar, PhD, Assistant Professor, Department of Computer Science, School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, India.

Mohd Abdul Ahad, PhD, Assistant Professor, Department of Computer Science and Engineering, School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, India.

Syed Imran Ali, PhD, Lecturer, University of Technology and Applied Sciences, Al Musannah Sultanate of Oman.

Deepa Mehta, PhD, Senior Data Scientist, Great Learning.

M. Afshar Alam, PhD, Vice Chancellor Jamia Hamdard, New Delhi, India.