Elhoseny, Mohamed,Singh, Amit Kuma. (Eds.) () Smart network inspired paradigm and approaches in IoT applications /MLA Citation
Elhoseny, Mohamed,Singh, Amit Kumar, eds. Smart Network Inspired Paradigm And Approaches In IoT Applications. : . Print.
These citations may not conform precisely to your selected citation style. Please use this display as a guideline and modify as needed.
Smart network inspired paradigm and approaches in IoT applications /
editors, Mohamed Elhoseny and Amit Kumar Singh.
|Names:||Elhoseny, Mohamed, | Singh, Amit Kumar|
|Published:||Singapore : Springer, |
|Topics:||Internet of things.|
SpringerLink - Full text online (Opens in a new window)
5 Implementation6 Conclusion; References; Energy-Efficient Broadcasting of Route-Request Packets (E2BR2) in Ad Hoc Networks; 1 Introduction; 2 Related Work; 3 Why Broadcasting of RREQ Is Special?; 4 Proposed Work E2BR2; 4.1 Network Model; 4.2 Broadcast Route Selection for RREQ Packets; 5 Illustration with an Example; 6 Simulation Results; 7 Conclusion; References; Decision Support System for Smart Grid Using Demand Forecasting Models; 1 Introduction; 1.1 Smart Grid Components; 1.2 Challenges in Smart Grid Implementation; 2 Power Demand Forecasting; 2.1 Types of Power Demand Forecasting
2.2 Challenges in Power Demand Forecasting2.3 Difficulties in Demand Forecasting; 3 Short-Term Power Demand Forecasting Methods and Model Results; 3.1 Naive Forecast Method (Same Day/Similar Day Approach); 3.2 Exponential Smoothing Method; 3.3 Autoregressive Moving Average (ARMA) Method; 3.4 Hybrid ARMA (p q) Model; 4 Conclusion; References; Internet of Things-The Concept, Inherent Security Challenges and Recommended Solutions; 1 Introduction; 2 Security-Based Research Evolution in IoT; 3 Prominent Vulnerabilities in IoT; 4 Critical Security Issues in IoT
4.1 Secure Communication Issue Between WSN and IoT4.2 Authentication Issue in the Internet of Things; 4.3 Key Management Issue in the Internet of Things; 5 Recommended Solutions; 5.1 Secure Transmission Between Sensor and IoT; 5.2 Robust Authentication in IoT; 5.3 Enhancing Key Management in IoT; 6 Conclusion; References; Critical Challenges in Access Management Schemes for Smartphones: An Appraisal; 1 Introduction; 2 Background Work; 2.1 Biometric-Based Access Management; 2.2 Non-biometric-Based Access Management; 3 Research Challenges and Open Issues; 4 Conclusion; References
Using Fuzzy Neural Networks Regularized to Support Software for Predicting Autism in Adolescents on Mobile Devices1 Introduction; 2 Literature Review; 2.1 Autistic Spectrum Disorder; 2.2 Expert Systems for the Diagnosis of Autism; 2.3 Techniques of Artificial Neural Networks and Fuzzy Systems; 2.4 Fuzzy Neural Network; 2.5 A Mobile System for Autism Identification-Autism Spectrum Disorder Tests App; 2.6 Self-Organized Direction-Aware Data Partitioning Algorithm-SODA; 2.7 Robust Activation Function-RAF; 3 Fuzzy Neural Network for Autism Spectrum Disorder Test; 3.1 Network Architecture