Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks

Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks
-0 %
Besorgungstitel - wird vorgemerkt | Lieferzeit: Besorgungstitel - Lieferbar innerhalb von 10 Werktagen I

Unser bisheriger Preis:ORGPRICE: 144,50 €

Jetzt 144,49 €*

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9781119682509
Veröffentl:
2022
Erscheinungsdatum:
07.02.2022
Seiten:
320
Autor:
Sherin Zafar
Gewicht:
729 g
Format:
250x175x22 mm
Sprache:
Englisch
Beschreibung:

Sherin Zafar, PhD, Assistant Professor, Department of Computer Science, School of Engineering Sciences and Technology, Jamia Hamdard, New Delhi, India.
SMART AND SUSTAINABLE APPROACHES FOR OPTIMIZING PERFORMANCE OF WIRELESS NETWORKExplores the intersection of sustainable growth, green computing and automation, and performance optimization of 5G wireless networksSmart and Sustainable Approaches for Optimizing Performance of Wireless Networks explores how wireless sensing applications, green computing, and Big Data analytics can increase the energy efficiency and environmental sustainability of real-time applications across areas such as healthcare, agriculture, construction, and manufacturing.Bringing together an international team of expert contributors, this authoritative volume highlights the limitations of conventional technologies and provides methodologies and approaches for addressing Quality of Service (QOS) issues and optimizing network performance. In-depth chapters cover topics including blockchain-assisted secure data sharing, smart 5G Internet of Things (IoT) scenarios, intelligent management of ad hoc networks, and the use of Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL) techniques in smart healthcare, smart manufacturing, and smart agriculture.* Covers design, implementation, optimization, and sustainability of wireless and sensor-based networks* Discusses concepts of sustainability and green computing as well as their relevance to society and the environment* Addresses green automation applications in various disciplines such as computer science, nanoscience, information technology (IT), and biochemistry* Explores various smart and sustainable approaches for current wireless and sensor-based networks* Includes detailed case studies of current methodologies, applications, and implementationsSmart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real-time Applications is an essential resource for academic researchers and industry professionals working to integrate sustainable development and Information and Communications Technology (ICT).
1 Analysis and Clustering of Sensor Recorded Data to Determine Sensors Consuming the Least EnergyPrashant Abbi, Khushi Arora, Praveen Kumar Gupta, K.B. Ashwini, V. Chayapathy, and M.J. Vidya1.1 Importance of Low Energy Consumption Sensors1.2 Methodology: Clustering Using K Means and Classification Using KNN1.3 Objective Realization and Result of Analysis1.4 Introduction1.5 Working of WSNs and Sensor Nodes1.6 Classification of WSNs1.6.1 Benefits and Drawbacks of Centralized Techniques1.6.2 Benefits and Drawbacks of Distributed Techniques1.7 Security Issues1.7.1 Layering of Level Based Security1.8 Energy Consumption Issues1.9 Commonly Used Standards and Protocols for WSNs1.9.1 Slotted Protocols1.9.1.1 Time Division Multiple Access1.9.1.2 Zig Bee/801.15.41.9.1.3 Sensor Medium Access Control1.10 Effects of Temperature and Humidity on the Energy of WSNs1.10.1 Effects of Temperature on Signal Strength1.10.2 Effects of Humidity on Signal Strength1.10.3 Temperature Vs. Humidity1.11 Proposed Methodology1.11.1 Information Gathering and Analysis1.11.2 System Design and Implementation1.11.3 Testing and Evaluation1.12 ConclusionReferences2 Impact of Artificial Intelligence in Designing of 5GK. Maheswari, Mohankumar, and Banuroopa2.1 5G - An Introduction2.1.1 Industry Applications2.1.2 Healthcare2.1.3 Retail2.1.4 Agriculture2.1.5 Manufacturing2.1.6 Logistics2.1.7 Sustainability of 5G Networks2.1.8 Implementation of 5G2.1.9 Architecture of 5G Technology2.2 5G and AI2.2.1 Gaming and Virtual Reality2.3 AI and 5G2.3.1 Continuous Learning AI Model2.4 Challenges and Roadmap2.4.1 Technical Issues2.4.2 Technology Roadmap2.4.3 Deployment Roadmap2.5 Mathematical Models2.5.1 The Insights of Mathematical Modeling in 5G Networks2.6 ConclusionReferences3 Sustainable Paradigm for Computing the Security of Wireless Internet of Things: Blockchain TechnologySana Zeba, Mohammed Amjad, and Danish Raza Rizvi3.1 Introduction3.2 Research Background3.2.1 The Internet of Things3.2.1.1 Security Requirements in Wireless IoT3.2.1.2 Layered Architecture of Wireless IoT3.2.2 Blockchain Technology3.2.2.1 Types of Blockchain3.2.2.2 Integration of Blockchain with Wireless Internet of Things3.3 Related Work3.3.1 Security Issues in Wireless IoT System3.3.2 Solutions of Wireless IoT Security Problem3.4 Research Methodology3.5 Comparison of Various Existing Solutions3.6 Discussion of Research Questions3.7 Future Scope of Blockchain in IoT3.8 ConclusionReferences4 Cognitive IoT Based Health Monitoring Scheme Using Non-Orthogonal MultipleAccessAshiqur Rahman Rahul, Saifur Rahman Sabuj, Majumder Fazle Haider, andShakil Ahmed4.1 Introduction4.2 Related Work4.3 System Model and Implementation4.3.1 Network Description4.3.2 Sensing and Transmission Analysis4.3.3 Pathloss Model4.3.4 Mathematical Model Evaluation4.3.4.1 Effectual Throughput4.3.4.2 Interference Throughput4.3.4.3 Energy Efficiency4.3.4.4 Optimum Power4.3.4.4.1 Optimum Power Derivation for HRC4.2.3.4.2 Optimum Power Derivation for MRC4.4 Simulation Results4.5 Conclusion4.A Appendices4.A.1 Proof of Optimum Power Transmission for HRC Device at EffectualState (z = 0)4.A.2 Proof of Optimum Power Transmission for HRC Device inInterference State (z = 1)4.A.3 Proof of Optimum Power Transmission for MRC Device at EffectualState (z = 0)4.A.4 Proof of Optimum Power Transmission for MRC Device inInterference State (z = 1)References5 Overview of Resource Management for Wireless Adhoc NetworkMehajabeen Fatima and Afreen Khueaheed5.1 Introduction5.1.1 Wired and Wireless Network Design Approach5.1.2 History5.1.3 Spectrum of Wireless Adhoc Network5.1.4 Enabling and Networking Technologies5.1.5 Taxonomy of Wireless Adhoc Network (WANET)5.2 Mobile Adhoc Network (MANET)5.2.1 Introduction to MANET5.2.2 Common Characteristics of MANET5.2.3 Advantages and Disadvantages5.2.4 Applications of MANET5.2.5 Major Issues of MANET5.3 Vehicular Adhoc Network (VANET)5.3.1 Introduction of VANET5.3.2 Common Features of VANET5.3.3 Pros, Cons, Applications5.4 Wireless Mesh Network (WMN)5.4.1 Preface of WMN5.4.2 Common Traits of WMN5.4.3 WMN Has Many Open Issues and Research Challenges5.4.4 Performance Metrics5.4.5 Advantages and Disadvantages5.4.6 Prominent Areas and Challenges of WMN5.5 Wireless Sensor Network (WSN)5.5.1 Overview of WSN5.5.2 Common Properties of WSN5.5.3 Benefits, Harms, and Usage of WSN5.6 Intelligent Management in WANET5.6.1 Major Issues of WANET5.6.2 Challenges of MAC Protocols5.6.3 Routing Protocols5.6.3.1 Challenges of Routing Protocols5.6.3.1.1 Scalability5.6.3.1.2 Quality of Service5.6.3.1.3 Security5.6.4 Energy and Battery Management5.7 Future Research Directions5.8 ConclusionReferences6 Survey: Brain Tumor Detection Using MRI Image with Deep Learning TechniquesChalapathiraju Kanumuri and C.H. Renu Madhavi6.1 Introduction6.2 Background6.2.1 Types of Medical Imaging6.2.2 M. R. Imaging as a Modality6.2.3 Types of Brain Tumor M. R. Imaging Modalities6.2.4 Suitable Technologies Before Machine Learning6.2.5 MRI Brain Image Segmentation6.3 Related Work6.4 Gaps and Observations6.5 Suggestions6.6 ConclusionReferences7 Challenges, Standards, and Solutions for Secure and Intelligent 5G Internet of Things (IoT) ScenariosAyasha Malik and Bharat Bhushan7.1 Introduction7.2 Safety in Wireless Networks: Since 1G to 4G7.2.1 Safety in Non-IP Networks7.2.2 Safety in 3G7.2.3 Security in 4G7.2.4 Security in 5G7.2.4.1 Flashy System Traffic and Radio Visual Security Keys7.2.4.2 Authorized Network Security and Compliance with Subscriber Level Safety Policies7.2.5 Security in 5G and Beyond7.3 IoT Background and Requirements7.3.1 IoT and Its Characteristics7.3.2 Characteristics of IoT Infrastructure7.3.3 Characteristics of IoT Applications7.3.4 Expected Benefits of IoT Adoption for Organization7.3.4.1 Benefits Correlated to Big Data Created by IoT7.3.4.2 Benefits Interrelated to the Openness of IoT7.3.4.3 BenefitsRelated to the Linked Aspect6 of IoT7.4 Non 5G Standards Supporting IoT7.4.1 Bluetooth Low Energy7.4.2 IEEE 802.15.47.4.3 LoRa7.4.4 Sigfox7.4.5. WiFi HaLow7.5 5 G Advanced Security Model7.5.1 Confidentiality7.5.2 Integrity7.5.3 Accessibility7.5.4 Integrated Safety Rule7.5.5 Visibility7.6 Safety Challenges and Resolution of Three-Tiers Structure of 5G Networks7.6.1 Heterogeneous Access Networks7.6.1.1 Safety Challengers7.6.1.2 Safety Resolutions7.6.2 Backhaul Networks7.6.2.1 Safety Challenges7.6.2.2 Safety Resolutions7.6.3 Core Network7.6.3.1 Safety Challenges7.6.3.2 Safety Resolutions7.7 Conclusion and Future Research DirectionsReferences8 Blockchain Assisted Secure Data Sharing in Intelligent Transportation SystemsGujkan Madaan, Avinash Kumar, and Bharat Bhushan8.1 Introduction8.2 Intelligent Transport System8.2.1 ITS Overview8.2.2 Issues in ITS8.2.3 ITS Role in IoT8.3 Blockchain Technology8.3.1 Overview8.3.2 Types of Blockchain8.3.2.1 Public Blockchain8.3.2.3 Private Blockchain8.2.3.2 Federated Blockchain8.3.3 Consensus Mechanism8.3.3.1 Proof of Work8.3.3.2 Proof of Stake8.3.3.3 Delegated Proof of Stake8.3.3.4 Practical Byzantine Fault Tolerance8.3.3.5 Casper8.3.3.6 Ripple8.3.3.7 Proof of Activity8.3.4 Cryptography8.3.5 Data Management and Its Structure8.4 Blockchain Assisted Intelligent Transportation System8.4.1 Security and Privacy8.4.2 Blockchain and Its Application foe Improving Security and Privacy8.4.3 ITS Based on Blockchain8.4.4 Recent Advancement8.5 Future Research Perspectives8.5.1 Electric Vehicle Recharging8.5.2 Smart City Enabling and Smart Vehicle Security8.5.3 Deferentially-Privacy Preserving Solutions8.5.4 Distribution of Economic Profits and Incentives8.6 ConclusionReferences9 Utilization of Agro Waste for Energy Engineering Applications: Toward the Manufacturing of Batteries and Super CapacitorsS.N. Kumar, S. Akhil, R.P. Nishita, O. Lijo Joseph, Aju Matthew George, and I Christina Jane9.1 Introduction9.2 Super Capacitors and Electrode Materials9.2.1 Energy Density9.3 Related Works in the Utilization of Agro Waste for Energy EngineeringApplications9.4 Inferences from Work Related with Utilization of Coconut. Rice Husk, andPineapple Waste for Fabrication of Super Capacitor9.5 Factors Contributing in the Fabrication of Super Capacitor from Agro Waste9.6 ConclusionAcknowledgmentReferences10 Computational Intelligence Techiques for Optimization in NetworksAshu Gautam and Rashima Mahajan10.1 Introduction Focussing on Pedagogy of Impending Approach10.1.1 Security Challenge in Networks10.1.2 Attacks Vulnerability in Complex Networks10.2 Relevant Analysis10.3 Broad Area of Research10.3.1 Routing Protocols10.3.2 Hybrid Protocols10.4 Problem Identification10.5 Objectives of the Study10.6 Methodology to be Adopted10.7 Proposed/Expected Outcome of the ResearchReferences11 R&D Export and ICT Regimes in IndiaZeba, M. Afshar Alam, Harleen Kaur*, Ihtiram Raza Khan, Bhavya AlankarCorresponding Author: Harleen Kaur11.1 Introduction11.2 Artificial Intelligence: the Uptake of Infrastructure Development11.3 Future Analysis and ConclusionReferences12 Metaheuristics to Aid Energy-Efficient Path Selection in Route Aggregated Mobile Ad Hoc NetworksDeepa Mehta, Sherin Zafar, Siddhartha Sankar Biswas, Nida Iftekhar, and Samia Khan12.1 Introduction12.2 Framework12.2.1 Route Aggregation12.3 Clustering12.4 Ant Colony Optimization12.4.1 Setting Parameters and Initializing12.4.2 Generating Solutions12.4.3 Pheromone Update12.5 Methodology12.5.1 Energy Efficient ACO Algorithm12.5.2 ACO Aided Cluster and Head Selection12.5.3 ACO Aided Route Aggregation12.5.4 ACO Aided Energy: Efficient Path Selection12.6 Results12.7 Discussion12.8 ConclusionReferences13 Knowledge Analytics in IOMT-MANET Through QoS Optimization for SustainabilityNeha Sharma, Nida Iftekhar, and Samia Khan13.1 Introduction13.2 Related Work13.3 Proposed Neoteric Nature Inspired IWD Algorithm for ZRP13.4 Simulation Results13.5 Conclusion and Future WorkReferences14 Appraise Assortment of IOT Security OptimizationAyesha Hena Afzal and M. Afshar Alam14.1 Introduction14.2 Literature Review14.3 Analysis of Traditional Security Mechanisms in IOT14.4 Conclusion and Future ScopeReferences15 Trust Based Hybrid Routing Approach for Securing MANETNeha Sharma and Satrupa Biswas15.1 Introduction15.2 Literature Review15.3 Gaps and Objectives from the Literature Review15.4 Methodology to be Adopted15.5 Comparison Analysis15.6 Conclusion and Future ScopeReferences16 Study of Security Issues on Open ChannelMd Mudassir Chaudhary, Siddhartha Sankar Biswas, Md Tabrez Nafis, and Safdar Tenweer16.1 Introduction16.2 Wireless Attacks16.2.1 Reconnaissance Attack16.2.2 Access Attacks16.2.3 Man-in-the-Middle Attack16.2.4 Denial of Services (DOS)16.3 Securing Wireless Transmissions16.3.1 Protecting the Confidentiality16.3.2 Protecting the Modification16.3.3 Preventing Interruption of Denial-of-Service Attack16.4 Proposed Model for Securing the Client Over the Channel16.5 ConclusionReferences

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.