1 - 5
- Shinde, Gitanjali Rahul, 1983- author.
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource : illustrations (chiefly color) Digital: text file.PDF.
- Summary
-
- Introduction.- Data Analysis and Mathematical Modeling for Covid-19 Pandemic.- Influence of Covid-19 on Quality of Work Life in Real Estate Sector.- Influence of Covid-19 on Quality of Work Life in Education Sector.- Influence of Covid-19 on Quality of Work Life in Information Technology/ Software Industries.- Influence of Covid-19 on Quality of Work Life in Agriculture Sector. .
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Shinde, Gitanjali Rahul, 1983- author.
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource (xiii, 78 pages) : color illustrations Digital: text file.PDF.
- Summary
-
- Introduction.- IoT Overview.- Emerging Trends in IoT.- IoT Use Cases.- Energy and Utilities.- Context Management in IoT.- Context and Context Management.- Context-aware Architecture.- Augmented Reality and IoT.- Augmented Reality and IoT design Issues.- Augmented Reality and IoT enabled Architecture.- Conclusions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mahalle, Parikshit N., author.
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource : illustrations (chiefly color) Digital: text file.PDF.
- Summary
-
- Introduction to Data Science.- Data Collection and Preparation.- Data Analysis and Machine learning Algorithms.- Data Visualization Tools and Data Modelling.- Data Science in Information, Communication and Technology.- Data Science in Civil & Mechanical Engineering.- Data Science in Clinical Decision System.- Conclusions.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Mahalle, Parikshit N., author.
- Singapore : Springer, 2021.
- Description
- Book — 1 online resource
- Summary
-
- Intro
- Preface
- Acknowledgements
- Contents
- About the Authors
- 1 Introduction to Underwater Wireless Sensor Networks
- 1.1 Basics of Underwater Wireless Sensor Networks
- 1.1.1 Underwater Wireless Sensor Network (UWSN)
- 1.1.2 History of UWSN
- 1.1.3 Difference Between TWSN and UWSN
- 1.2 UWSN: A Need of Today's World
- 1.3 Components of UWSN
- 1.3.1 Acoustic Modem
- 1.3.2 Optical Sensors
- 1.3.3 Autonomous Underwater Vehicle (AUV)
- 1.3.4 Remotely Operated Underwater Vehicle (ROUV/ROV)
- 1.3.5 Buoys
- 1.3.6 Transducers
- 1.3.7 On-Shore Station
- 1.4 Architectural Models in UWSN
- 1.4.1 One-Dimensional UWSN Architecture (1D-UWSN)
- 1.4.2 Two-Dimensional UWSN Architecture (2D-UWSN)
- 1.4.3 Three-Dimensional UWSN Architecture (3D-UWSN)
- 1.4.4 Four-Dimensional UWSN Architecture (4D-UWSN)
- References
- 2 Communication Mediums in UWSN
- 2.1 Wired Underwater Sensor Network (W-USN)
- 2.2 Underwater Wireless Sensor Network (UWSN)
- 2.3 Types of Wireless Communication Mediums in UWSN
- 2.3.1 Radio-Frequency Communication
- 2.3.2 Acoustic Communication
- 2.3.3 Optical Communication
- 2.4 Challenges in UWSN
- 2.4.1 Propagation Delay
- 2.4.2 Limited Bandwidth
- 2.4.3 Noise
- 2.4.4 Doppler Spread
- 2.4.5 Path Loss
- 2.4.6 Multipath Effect
- 2.4.7 Properties of Water
- 2.4.8 Energy Constraints
- 2.5 Comparative Study of UWSN Communication Mediums
- 2.6 Future of Underwater Communication Mediums
- References
- 3 Protocol Layers
- 3.1 Physical Layer
- 3.2 Data-Link Layer
- 3.3 Network Layer
- 3.4 Transport Layer
- References
- 4 Threats and Attacks in UWSN
- 4.1 Information Security and UWSN
- 4.2 Threats in UWSN
- 4.3 Attack Modelling
- 4.3.1 Attacks on Protocol Layers
- 4.3.2 Attacks Based on Capability of Attacker
- 4.3.3 Attacks on Information in Transit
- 4.4 Cross-Layer Approach in UWSN
- 4.5 Attack-Resistant Strategies for UWSN
- References
- 5 Applications of UWSN
- 5.1 Surveillance Applications
- 5.1.1 Survelling Water Territory of Country via UWSN
- 5.1.2 Submarine Target Localization
- 5.1.3 European Project UAN
- 5.1.4 Seaweb
- 5.2 Environment Monitoring
- 5.2.1 Water Quality Monitoring Systems
- 5.2.2 Tsunami Monitoring Systems
- 5.2.3 Aquatic Monitoring Systems
- 5.2.4 Oil Spill Leakage Detection
- 5.3 Microsoft Project Natick
- 5.4 Deep Sea Mining
- References
- 6 Conclusion
- 6.1 Summary
- 6.2 Open Research Issues
- 6.3 Future of UWSN
(source: Nielsen Book Data)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource (xxi, 246, C1 pages)
- Summary
-
- Part I. Threats and Issues in Ubiquitous Computing
- Introduction
- Taxonomy of threats to ubiquitous computing
- Cyber Crime and Their Restriction Through Laws and Techniques for Protecting Security Issues and Privacy Threats
- Recent challenges in IoT
- Data Acquisition and Knowledge Management in IoT: Security Issues, Challenges, and Road Map Ahead
- Part II. Security Measures and Frameworks
- OAuth-Based Authorization and Delegation in Smart Home for the Elderly Using Decentralized Identifiers and Verifiable Credentials
- Dynamic Access Control Solution for Cross-Tenancy in a Cloud Environment
- Distributed Access Control Scheme for Machine-to-Machine Communication in IoT Using Trust Factor
- Game Theory Approach for Trust Management in the Realm of IoT
- Ransomware Attack Detection and Prevention for Android Devices
- A Comparative Analysis of Machine Deep Learning Algorithms for Intrusion Detection in WSN
- Base for Trust Score Estimation for Device to Device Communication in Internet of Thing Using Fuzzy Approach and Machine Learning
- Systematic Review of Resource Allocation Methods Using Scheduling for M2M (Machine to Machine Communication) in IoT Network
- Part III. Social Aspects of Smart Ubiquitous Computing
- Sarcasm Detection in Online Social Network: Myths, Realities, and Issues
- Farmer-Assistive Chatbot in Indian Context Using Learning Techniques
- Correction to: A Comparative Analysis of Machine Enep Learning Algorithms for Intrusion Entection in WSN.
- Taxonomy of Threats to Ubiquitous Computing
- Cyber Crime and Their Restriction through Laws and Techniques for Protecting Security Issues and Privacy Threats
- Data Acquisition and Knowledge Management in IoT: Security Issues, Challenges and Road Map ahead
- Dynamic Access control Solution for Cross-tenancy in a Cloud Environment
- Game Theory Approach for Trust Management in the realm of IoT
- A Comparative Analysis of Machine and Deep Learning Algorithms for Intrusion Detection in WSN
- Sarcasm Detection in Online Social Network Myths, Realities and Issues
- Farmer assistive chatbot in Indian context using learning techniques.
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.