Smart and Sustainable Technologies: Rural and Tribal Development Using IoT and Cloud Computing Proceedings of ICSST 2021 /

Chi tiết về thư mục
Tác giả của công ty: SpringerLink (Online service)
Tác giả khác: Patnaik, Srikanta (Biên tập viên), Kountchev, Roumen (Biên tập viên), Jain, Vipul (Biên tập viên)
Tóm tắt:XVI, 384 p. 212 illus., 178 illus. in color.
text
Ngôn ngữ:Tiếng Anh
Được phát hành: Singapore : Springer Nature Singapore : Imprint: Springer, 2022.
Phiên bản:1st ed. 2022.
Loạt:Advances in Sustainability Science and Technology,
Những chủ đề:
Truy cập trực tuyến:https://doi.org/10.1007/978-981-19-2277-0
Định dạng: Điện tử Sách
Mục lục:
  • Section 1: IOT, Big Data and Cloud Computing
  • Chapter 1. Big Data: A Boon to Fight against Cancer Using Mapreduce Framework
  • Chapter 2. Security Attacks and its Countermeasures in RPL
  • Chapter 3. An Optimal Policy with Parabolic Demand Carry Forwarded with Three-Parameter Weibull Distribution Deterioration Rate, Scarcity, and Salvage Value
  • Chapter 4. Information Actions Use for System Activity: Action Modelling Schemas
  • Chapter 5. High-Security Object Integrity and Manipulation of Conceal Information by Hiding Partition Technique
  • Chapter 6. Performance Evaluation of FSO under Different Atmospheric Conditions
  • Section 2: Smart Communication
  • Chapter 7. Design and Performance Analysis of High-Reliability QOS-Oriented Adaptive Routing Protocol for MANET
  • Chapter 8. Circular Patch Antenna with Perturbed Slots for Various Wireless Applications
  • Chapter 9. A Secure Handshaking AODV Routing Protocol (SHS-AODV) with Reinforcement Authentication in MANET
  • Chapter 10. AI-Powered Smart Routers
  • Chapter 11. Modified Sierpinski Gasket Monopole Fractal Antenna for Sub 6GHz 5G Applications
  • Chapter 12. Design of a Dual-Ring Resonator Antenna for WBAN Applications
  • Chapter 13. Performance Analysis of MIMO Antenna for Isolation Improvement
  • Chapter 14. Low Power and High-Speed Full Adder with Complemented Logic and Complemented XOR Gate
  • Chapter 15. Determining the Number of Bit Encryption that is Optimum for Image Steganography in 8 Bit Images. etc.