Sustainable resource management in next-generation computational constrained networks
The book provides essential insights into cutting-edge networking technologies that not only enhance performance and efficiency but also address critical sustainability challenges in an increasingly connected world.
Saved in:
| Main Author | |
|---|---|
| Other Authors | , , , |
| Format | Electronic eBook |
| Language | English |
| Published |
Hoboken, NJ : Beverly, MA :
John Wiley & Sons, Inc. ; Scrivener Publishing LLC,
2025.
|
| Series | Industry 5. 0 Transformation Applications Series
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781394212781 9781394212798 9781394212569 |
| Physical Description | 1 online zdroj. |
Cover
Table of Contents:
- Cover
- Series Page
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 Enhancing Digital Learning Pedagogy for Lecture Video Recommendation Using Brain Wave Signal
- 1.1 Introduction
- 1.2 Related Work
- 1.2.1 E-Learning, M-Learning, and T-Learning
- 1.2.2 Involvement of Networking Reforms in Education
- 1.2.3 Literature Review for Use of NeuroSky Headset in Education Domain
- 1.3 Background
- 1.4 Dataset
- 1.5 Proposed Method and Result
- 1.5.1 Collaborative Filtering Using Brain Signal-Induced Preferences
- 1.5.1.1 Neurophysiological Experiment
- 1.5.1.2 Deducing Preferences from Brain Signals
- 1.5.2 Proposed Methodology for FlipRec Model
- 1.5.2.1 Module for Data Preparation
- 1.5.2.2 FlipRec: Preferred Recommendation Model
- 1.5.3 Using Brain Signal Technology, a Cognitively Aware Lecture Video Recommendation System in Flipped Learning
- 1.5.3.1 Finding Successful Cognitive States with a Clustering Method
- 1.5.3.2 Feature Derivation for Estimating Attention
- 1.6 Result Analysis
- 1.7 Conclusion and Future Research
- References
- Chapter 2 Blockchain-Based Sustainable Supply Chain Management
- 2.1 Introduction
- 2.1.1 Significance of Blockchain for SCM
- 2.1.2 Introduction to Blockchain Interoperability
- 2.2 Blockchain for Supply Chain Management
- 2.2.1 Characteristics and Requirements of Blockchain-Based Supply Chain
- 2.2.1.1 Characteristics of Supply Chain
- 2.2.1.2 Requirements of Supply Chain
- 2.2.2 Blockchain-Based Data Sharing for Supply Chain
- 2.2.3 Access Control and Trust Management in Blockchain- Based SCM
- 2.2.3.1 Access Control Mechanisms in SCM
- 2.2.3.2 Trust Management in Supply Chain
- 2.3 Interoperability in Blockchain
- 2.3.1 Overview of Blockchain Interoperability Approaches
- 2.3.1.1 Public Connectors
- 2.3.1.2 Blockchain of Blockchains (BoB).
- 2.3.1.3 Hybrid Connectors
- 2.3.2 Gateways for Interoperability and Manageability
- 2.3.3 Interoperability Approaches
- 2.4 Design Considerations and Open Challenges
- 2.5 Summary
- 2.5.1 Advantages of Blockchain for SSCM
- 2.6 Scope of Future Work Emphasis
- References
- Chapter 3 Revolutionizing Aquaculture With the Internet of Things (IoT): An Insightful Learning
- 3.1 Introduction
- 3.2 Environmental Monitoring via IoT for Sustainable Aquaculture
- 3.3 The Primacy of IoT in Enhancing Fish Health Monitoring
- 3.4 Delving Into IoT: Improving Agricultural Water Quality Management
- 3.5 Connecting the Dots: Using IoT Fish Behavior Monitoring to Improve Aquaculture Practices
- 3.6 The Worldwide Deployment of IoT in Aquaculture: Advantages and Success Factors
- 3.7 Conclusion
- Acknowledgment
- References
- Chapter 4 Energy Consumption Optimization in Wireless Sensor Networks
- 4.1 Introduction
- 4.1.1 WSN Application and Hardware Characteristics
- 4.2 MAC Layer Approaches
- 4.2.1 IEEE 802.15.4 Standard along with the ZigBee Technology
- 4.2.2 Different Other MAC Approaches
- 4.3 Routing Approaches
- 4.4 Transmission Power Control Approaches
- 4.5 Autonomic Approaches
- 4.6 Application of ZigBee in a WSN
- 4.7 WSN with Cloud Computing
- 4.8 Final Considerations and Future Directions
- References
- Chapter 5 Airline Prediction Using Customer Feedback and Rating Using Machine Learning and Deep Learning
- 5.1 Introduction
- 5.1.1 Customer Ratings and Recommendation
- 5.2 Literature Survey
- 5.3 System Design
- 5.4 Methodology
- 5.4.1 Modules
- 5.4.1.1 Data Collection
- 5.4.1.2 Review-Based Airline Prediction
- 5.4.1.3 Rating-Based Airline Prediction
- 5.5 Algorithm Used: Random Forest, Convolutional Neural Network, and AdaBoost
- 5.5.1 Random Forest System
- 5.5.2 Convolutional 1D Neural Network-Based Training.
- 5.5.2.1 Sequential Model
- 5.5.2.2 Add 1D Convolutional Layer
- 5.5.2.3 Adding 1D Max Pooling Layer
- 5.5.2.4 Adding Dense Layer
- 5.5.2.5 Neural Network Training
- 5.5.3 AdaBoost Algorithm
- 5.6 Experimental Results and Evaluations
- 5.7 Screenshots
- 5.8 Conclusion
- References
- Chapter 6 The Breakthrough of Future Delivery: Delivery Robots
- 6.1 Introduction
- 6.2 Related Work
- 6.3 Evolution of Delivery Robot
- 6.4 Working Principal/Model of Delivery Robots
- 6.5 Benefits of Delivery Robots
- 6.6 Applications of Delivery Robots
- 6.7 Development Projects
- 6.8 Challenging Issues with Delivery Robots
- 6.9 Conclusion and Future Work
- References
- Chapter 7 Emergence of Cloud Computing in IoT Applications
- 7.1 Introduction
- 7.1.1 Characteristics of Cloud Computing
- 7.1.2 Types of Cloud Deployment Models
- 7.1.3 Categories of Cloud Computing Architectures
- 7.1.4 Types of Cloud Service Models
- 7.2 Benefits of IoT and Cloud Integration
- 7.2.1 Scalability and Elasticity of Cloud Resources for Managing IoT Data
- 7.2.2 Reduced Infrastructure Costs with Cloud-Based Solutions
- 7.2.3 Improved Accessibility and Availability of IoT Services with Cloud Deployment
- 7.2.4 Enhanced Processing Power and Analytics Capabilities with Cloud Computing
- 7.2.5 Reduced Time to Market and Increased Innovation with Cloud-Based IoT Development
- 7.3 Cloud-Based IoT Architecture
- 7.3.1 Four Layers of Cloud-Based IoT Architecture
- 7.3.2 Role of Gateways in Linking IoT Devices to the Cloud
- 7.3.3 Overview of Cloud-Based IoT Platforms and Services
- 7.3.4 Cloud-Based IoT Standards and Protocols, such as MQTT, CoAP, AMQP, and HTTP
- 7.4 Cloud-Based IoT Applications
- 7.5 Challenges in IoT Cloud Integration
- 7.5.1 Security Risks and Challenges Associated with Cloud-Based IoT Solutions.
- 7.5.2 Latency and Bandwidth Constraints of IoT Systems Hosted in the Cloud
- 7.5.3 Interoperability Issues Between Different IoT Devices and Cloud Platforms
- 7.5.4 Legal and Regulatory Challenges Associated with IoT Using Cloud Solutions
- 7.6 Open Issues and Research Directions
- 7.6.1 Future Trends and Developments in Cloud-Based IoT Solutions
- 7.6.2 Opportunities for Research in Cloud-Based IoT Solutions
- 7.6.3 Overview of Emerging Cloud-Based IoT Standards and Protocols
- 7.7 Case Study 1: Smart Home Automation Using Cloud-Based IoT
- 7.8 Case Study 2: Industrial IoT Optimization Using Cloud-Based IoT
- 7.9 Conclusion
- References
- Chapter 8 Conceptual Assessment of Sensory Networks and Its Functional Aspects
- 8.1 Introduction
- 8.2 Evolution of IoT
- 8.2.1 Phase 1: Early Adopters (Pre-2010)
- 8.2.2 Phase 2: Connectivity and Smart Devices (2010-2015)
- 8.2.3 Phase 3: Big Data and Cloud Computing (2015 to Present)
- 8.2.4 Phase 4: Artificial Intelligence and Edge Computing (Present and Future)
- 8.3 Features of IoT
- 8.4 Architectural Framework of IoT
- 8.4.1 Device Layer
- 8.4.2 Network Layer
- 8.4.3 Platform Layer
- 8.4.4 Application Layer
- 8.5 Components of IoT
- 8.6 Applications of IoT
- 8.7 Case Study
- 8.7.1 Overview of Barcelona Smart City Project
- 8.7.2 Methodology
- 8.8 Conclusion
- References
- Chapter 9 System Security Using Artificial Intelligence and Reduction of Data Breach
- 9.1 Introduction
- 9.2 Related Work
- 9.3 Methodology
- 9.3.1 Implementation of Socket Programming Concept
- 9.3.2 Machine Learning
- 9.3.3 Deep Learning
- 9.3.4 Human Assistance
- 9.4 Proposed Model
- 9.5 Experimental Result/Result Analysis
- 9.6 Conclusion and Future Work
- References
- Chapter 10 Mitigating DDoS Attacks: Empowering Network Infrastructure Resilience with AI and ML
- 10.1 Introduction.
- 10.1.1 Categories of DDoS Attack
- 10.1.1.1 SYN Flood Attacks
- 10.1.1.2 UDP Flood Attacks
- 10.1.1.3 MSSQL Attacks
- 10.1.1.4 LDAP Attacks
- 10.1.1.5 Portmap Attacks
- 10.1.1.6 NetBIOS Attacks
- 10.1.2 Harnessing Machine Learning for DDoS Threat Detection
- 10.1.3 AI Models for DDoS Threat Detection
- 10.1.4 Beyond Classification: AI for Real-Time Detection and Mitigation
- 10.1.5 Collaboration and Knowledge Sharing
- 10.2 Related Work
- 10.3 Methodology
- 10.3.1 Pseudocode-1: Jupyter Project Code
- 10.3.2 Pseudocode-2: Project KNN Model
- 10.3.3 Hyperparameter Tuning and Evaluation
- 10.3.4 Enhancing Model Accuracy
- 10.3.5 Ping Request and DDoS Attack
- 10.4 Proposed Model
- 10.5 Experimental Result/Result Analysis
- 10.5.1 Demo of DDoS Attack
- 10.5.2 Packet Sniffing and Detecting Traffic
- 10.5.3 Accuracy Graph
- 10.5.4 Precision Graph
- 10.6 Conclusion/Future Work
- References
- Chapter 11 CyberEDU: An Interactive Educational Tool for DDoS Attack Simulation and Prevention
- 11.1 Introduction
- 11.2 Related Work
- 11.3 Methodology
- 11.4 Proposed Model
- 11.5 Experimental Result/Result Analysis
- 11.6 Conclusion and Future Work
- References
- Chapter 12 Resource Management and Performance Optimization in Constraint Network Systems
- 12.1 Introduction
- 12.2 Resource Allocation Principles
- 12.3 Network Capacity and Utilization
- 12.4 Performance Optimization Strategies
- 12.4.1 Resource Management in Physical Networks
- 12.4.2 Resource Management in Virtual Networks
- 12.4.3 Resource Management in Software-Defined Networking (SDN)
- 12.5 Real-World Applications
- 12.5.1 Data Plane Development Kit Libraries
- 12.5.2 Virtual Machine Device Queues (VMDQ)
- 12.6 Conclusion and Future Directions
- References
- Chapter 13 Resource-Constrained Network Management Using Software-Defined Networks.
- 13.1 Introduction.