sustainability challenges in an increasingly connected world.
Table of ContentsPreface
1. Enhancing Digital Learning Pedagogy for Lecture Video Recommendation Using Brain Wave SignalRabi Shaw, Simanjeet Kalia and Sourabh Mohanty
1.1 Introduction
1.2 Related Work
1.2.1 E-Learning, M-Learning, and T-Learning
1.2.2 Involvement of Networking Reforms in Education
1.2.3 Literature Review for Use of NeuroSky Headset in Education Domain
1.3 Background
1.4 Dataset
1.5 Proposed Method and Result
1.5.1 Collaborative Filtering Using Brain Signal–Induced Preferences
1.5.1.1 Neurophysiological Experiment
1.5.1.2 Deducing Preferences from Brain Signals
1.5.2 Proposed Methodology for FlipRec Model
1.5.2.1 Module for Data Preparation
1.5.2.2 FlipRec: Preferred Recommendation Model
1.5.3 Using Brain Signal Technology, a Cognitively Aware Lecture Video Recommendation System in Flipped Learning
1.5.3.1 Finding Successful Cognitive States with a Clustering Method
1.5.3.2 Feature Derivation for Estimating Attention
1.6 Result Analysis
1.7 Conclusion and Future Research
References
2. Blockchain-Based Sustainable Supply Chain ManagementAnuja Ajay, Saji M. S. and Subhasis Dash
2.1 Introduction
2.1.1 Significance of Blockchain for SCM
2.1.2 Introduction to Blockchain Interoperability
2.2 Blockchain for Supply Chain Management
2.2.1 Characteristics and Requirements of Blockchain-Based Supply Chain
2.2.1.1 Characteristics of Supply Chain
2.2.1.2 Requirements of Supply Chain
2.2.2 Blockchain-Based Data Sharing for Supply Chain
2.2.3 Access Control and Trust Management in Blockchain-Based SCM
2.2.3.1 Access Control Mechanisms in SCM
2.2.3.2 Trust Management in Supply Chain
2.3 Interoperability in Blockchain
2.3.1 Overview of Blockchain Interoperability Approaches
2.3.1.1 Public Connectors
2.3.1.2 Blockchain of Blockchains (BoB)
2.3.1.3 Hybrid Connectors
2.3.2 Gateways for Interoperability and Manageability
2.3.3 Interoperability Approaches
2.4 Design Considerations and Open Challenges
2.5 Summary
2.5.1 Advantages of Blockchain for SSCM
2.6 Scope of Future Work Emphasis
References
3. Revolutionizing Aquaculture With the Internet of Things (IoT): An Insightful LearningArpita Nayak, Atmika Patnaik, Ipseeta Satpathy, Veena Goswami and B.C.M. Patnaik
3.1 Introduction
3.2 Environmental Monitoring via IoT for Sustainable Aquaculture
3.3 The Primacy of IoT in Enhancing Fish Health Monitoring
3.4 Delving Into IoT: Improving Agricultural Water Quality Management
3.5 Connecting the Dots: Using IoT Fish Behavior Monitoring to Improve Aquaculture Practices
3.6 The Worldwide Deployment of IoT in Aquaculture: Advantages and Success Factors
3.7 Conclusion
Acknowledgment
References
4. Energy Consumption Optimization in Wireless Sensor NetworksAvik Das, Shatyaki Ghosh and Arindam Basak
4.1 Introduction
4.1.1 WSN Application and Hardware Characteristics
4.2 MAC Layer Approaches
4.2.1 IEEE 802.15.4 Standard along with the ZigBee Technology
4.2.2 Different Other MAC Approaches
4.3 Routing Approaches
4.4 Transmission Power Control Approaches
4.5 Autonomic Approaches
4.6 Application of ZigBee in a WSN
4.7 WSN with Cloud Computing
4.8 Final Considerations and Future Directions
References
5. Airline Prediction Using Customer Feedback and Rating Using Machine Learning and Deep LearningCh Sambasiva Rao, Pabbathi Manobhi Ram, Viswanadhapalli Siva and Motakatla Satya Sai Krishna Reddy
5.1 Introduction
5.1.1 Customer Ratings and Recommendation
5.2 Literature Survey
5.3 System Design
5.4 Methodology
5.4.1 Modules
5.4.1.1 Data Collection
5.4.1.2 Review-Based Airline Prediction
5.4.1.3 Rating-Based Airline Prediction
5.5 Algorithm Used: Random Forest, Convolutional Neural Network, and AdaBoost
5.5.1 Random Forest System
5.5.2 Convolutional 1D Neural Network–Based Training
5.5.2.1 Sequential Model
5.5.2.2 Add 1D Convolutional Layer
5.5.2.3 Adding 1D Max Pooling Layer
5.5.2.4 Adding Dense Layer
5.5.2.5 Neural Network Training
5.5.3 AdaBoost Algorithm
5.6 Experimental Results and Evaluations
5.7 Screenshots
5.8 Conclusion
References
6. The Breakthrough of Future Delivery: Delivery RobotsAyushi Gupta
6.1 Introduction
6.2 Related Work
6.3 Evolution of Delivery Robot
6.4 Working Principal/Model of Delivery Robots
6.5 Benefits of Delivery Robots
6.6 Applications of Delivery Robots
6.7 Development Projects
6.8 Challenging Issues with Delivery Robots
6.9 Conclusion and Future Work
References
7. Emergence of Cloud Computing in IoT ApplicationsPriyanshu Sonthalia and Doddi Puneet
7.1 Introduction
7.1.1 Characteristics of Cloud Computing
7.1.2 Types of Cloud Deployment Models
7.1.3 Categories of Cloud Computing Architectures
7.1.4 Types of Cloud Service Models
7.2 Benefits of IoT and Cloud Integration
7.2.1 Scalability and Elasticity of Cloud Resources for Managing IoT Data
7.2.2 Reduced Infrastructure Costs with Cloud-Based Solutions
7.2.3 Improved Accessibility and Availability of IoT Services with Cloud Deployment
7.2.4 Enhanced Processing Power and Analytics Capabilities with Cloud Computing
7.2.5 Reduced Time to Market and Increased Innovation with Cloud-Based IoT Development
7.3 Cloud-Based IoT Architecture
7.3.1 Four Layers of Cloud-Based IoT Architecture
7.3.2 Role of Gateways in Linking IoT Devices to the Cloud
7.3.3 Overview of Cloud-Based IoT Platforms and Services
7.3.4 Cloud-Based IoT Standards and Protocols, such as MQTT, CoAP, AMQP, and HTTP
7.4 Cloud-Based IoT Applications
7.5 Challenges in IoT Cloud Integration
7.5.1 Security Risks and Challenges Associated with Cloud-Based IoT Solutions
7.5.2 Latency and Bandwidth Constraints of IoT Systems Hosted in the Cloud
7.5.3 Interoperability Issues Between Different IoT Devices and Cloud Platforms
7.5.4 Legal and Regulatory Challenges Associated with IoT Using Cloud Solutions
7.6 Open Issues and Research Directions
7.6.1 Future Trends and Developments in Cloud-Based IoT Solutions
7.6.2 Opportunities for Research in Cloud-Based IoT Solutions
7.6.3 Overview of Emerging Cloud-Based IoT Standards and Protocols
7.7 Case Study 1: Smart Home Automation Using Cloud-Based IoT
7.8 Case Study 2: Industrial IoT Optimization Using Cloud-Based IoT
7.9 Conclusion
References
8. Conceptual Assessment of Sensory Networks and Its Functional AspectsBarat Nikhita, Siddhant Prateek Mahanayak and Kunal Anand
8.1 Introduction
8.2 Evolution of IoT
8.2.1 Phase 1: Early Adopters (Pre-2010)
8.2.2 Phase 2: Connectivity and Smart Devices (2010–2015)
8.2.3 Phase 3: Big Data and Cloud Computing (2015 to Present)
8.2.4 Phase 4: Artificial Intelligence and Edge Computing (Present and Future)
8.3 Features of IoT
8.4 Architectural Framework of IoT
8.4.1 Device Layer
8.4.2 Network Layer
8.4.3 Platform Layer
8.4.4 Application Layer
8.5 Components of IoT
8.6 Applications of IoT
8.7 Case Study
8.7.1 Overview of Barcelona Smart City Project
8.7.2 Methodology
8.8 Conclusion
References
9. System Security Using Artificial Intelligence and Reduction of Data BreachM. Avrit, G. P. Siranjeevi, Shruti Mishra, Sandeep Kumar Satapathy, Priyanka Mishra, Pradeep Kumar Mallick and Gyoo Soo Chae
9.1 Introduction
9.2 Related Work
9.3 Methodology
9.3.1 Implementation of Socket Programming Concept
9.3.2 Machine Learning
9.3.3 Deep Learning
9.3.4 Human Assistance
9.4 Proposed Model
9.5 Experimental Result/Result Analysis
9.6 Conclusion and Future Work
References
10. Mitigating DDoS Attacks: Empowering Network Infrastructure Resilience with AI and MLTeja Pasonri, Saurav Singh, Vedant Shirapure, Sandeep Kumar Satapathy, Sung-Bae Cho, Shruti Mishra and Pradeep Kumar Mallick
10.1 Introduction
10.1.1 Categories of DDoS Attack
10.1.1.1 SYN Flood Attacks
10.1.1.2 UDP Flood Attacks
10.1.1.3 MSSQL Attacks
10.1.1.4 LDAP Attacks
10.1.1.5 Portmap Attacks
10.1.1.6 NetBIOS Attacks
10.1.2 Harnessing Machine Learning for DDoS Threat Detection
10.1.3 AI Models for DDoS Threat Detection
10.1.4 Beyond Classification: AI for Real-Time Detection and Mitigation
10.1.5 Collaboration and Knowledge Sharing
10.2 Related Work
10.3 Methodology
10.3.1 Pseudocode-1: Jupyter Project Code
10.3.2 Pseudocode-2: Project KNN Model
10.3.3 Hyperparameter Tuning and Evaluation
10.3.4 Enhancing Model Accuracy
10.3.5 Ping Request and DDoS Attack
10.4 Proposed Model
10.5 Experimental Result/Result Analysis
10.5.1 Demo of DDoS Attack
10.5.2 Packet Sniffing and Detecting Traffic
10.5.3 Accuracy Graph
10.5.4 Precision Graph
10.6 Conclusion/Future Work
References
11. CyberEDU: An Interactive Educational Tool for DDoS Attack Simulation and PreventionPulkit Srivastava, Vedant Shah, Priyanshu Singh, Sandeep Kumar Satapathy, Sung-Bae Cho, Shruti Mishra and Pradeep Kumar Mallick
11.1 Introduction
11.2 Related Work
11.3 Methodology
11.4 Proposed Model
11.5 Experimental Result/Result Analysis
11.6 Conclusion and Future Work
References
12. Resource Management and Performance Optimization in Constraint Network SystemsAmarendra Kumar Mohanty
12.1 Introduction
12.2 Resource Allocation Principles
12.3 Network Capacity and Utilization
12.4 Performance Optimization Strategies
12.4.1 Resource Management in Physical Networks
12.4.2 Resource Management in Virtual Networks
12.4.3 Resource Management in Software-Defined Networking (SDN)
12.5 Real-World Applications
12.5.1 Data Plane Development Kit Libraries
12.5.2 Virtual Machine Device Queues (VMDQ)
12.6 Conclusion and Future Directions
References
13. Resource-Constrained Network Management Using Software-Defined NetworksSayan Bhattacharyya, Manas Ranjan Lenka and Subhasis Dash
13.1 Introduction
13.2 Software-Defined Network Architecture and Its Key Components
13.2.1 Application Plane
13.2.1.1 Network Application
13.2.1.2 Language-Level Virtualization
13.2.2 Control Plane
13.2.2.1 Network Operating System (NOS)
13.2.2.2 Network Hypervisor
13.2.3 Data Plane
13.2.3.1 Network Infrastructure
13.2.4 SDN Protocols
13.2.4.1 Northbound Protocol
13.2.4.2 Southbound Protocol
13.2.4.3 Eastbound Protocol
13.2.4.4 Westbound Protocol
13.2.5 SDN Workflows
13.3 Challenges and Opportunities of SDN in Resource-Constrained Scenarios
13.4 State-of-the-Art Techniques and Tools for Efficient Network Resource Management in SDN Environments
13.5 Performance of the Existing Techniques and Tools with Use Case
13.6 Conclusion and Future Scope
References
14. Vehicles Smoke Monitoring Using Internet of Things and Machine LearningDhavakumar P. and Selvakumar Samuel
14.1 Introduction
14.2 Vehicle CO2 Emissions
14.2.1 Impacts of CO2 Emissions
14.3 Recommended Solutions with Internet of Things
14.3.1 IoT System and CO2 Sensors
14.3.2 Benefits of the IoT System
14.3.3 Air Quality Monitoring System (AQMS)
14.4 ML Algorithms
14.4.1 K-Means Algorithm (KM)
14.4.2 Decision Tree Algorithm (DT)
14.4.3 Naive Bayes Algorithm (NB)
14.4.4 Controlling Carbon Unlimited Flow Operation with Machine Learning Approach (CULTML)
14.5 Proposed System Architectures and Designs
14.5.1 Vehicular Unit
14.5.2 Software Unit
14.5.3 Road Transport Office (RTO) Unit
14.6 Logical Design of the Proposed System
14.6.1 Summation Detector Using Artificial Intelligence
14.6.2 Digit Recognition
14.7 Experimental Results
14.8 Physical Design of the Proposed System
14.9 Conclusion
References
15. Enhancing Home Security through IoT Innovation: Recommendations for Biometric Door Lock System to Deter Break-InsMuhammad Ehsan Rana, Kamalanathan Shanmugam, Lim Enya and Hrudaya Kumar Tripathy
15.1 Introduction
15.2 Literature Review
15.2.1 Home Security Concerns in Malaysia
15.2.2 Introduction to Biometric Solutions
15.2.3 Enhancing Biometrics with Machine Learning
15.2.4 Biometrics in the Realm of Smart Home Security
15.2.5 Review of Existing Commercial Systems
15.2.5.1 Samsung Smart Door Lock
15.2.5.2 Philips EasyKey
15.2.5.3 Comparison of Systems
15.3 Recommendations for the Implementation of the Proposed Biometric Door Lock System
15.3.1 Software Requirements
15.3.2 Key Hardware Requirements
15.3.2.1 Arduino Nano
15.3.2.2 DFRobot HuskyLens
15.3.2.3 DFRobot UART Fingerprint Scanner
15.3.2.4 Five-Volt Single-Channel Relay Module
15.3.2.5 12VDC Solenoid Lock
15.3.3 Workflow of the Proposed System
15.3.4 Key Features of the Proposed System
15.3.5 Testing the Biometric Door Lock System
15.3.5.1 Fingerprint Authentication Test
15.3.5.2 Facial Recognition Test
15.3.5.3 Dual Authentication Test
15.3.5.4 Access Log Test
15.3.5.5 Mobile Application Integration Test
15.3.5.6 Scalability Test
15.3.5.7 Accuracy Result Analysis
15.4 Conclusion and Future Recommendations
References
IndexBack to Top