The Smart Cyber Ecosystem for Sustainable Development

The Smart Cyber Ecosystem for Sustainable Development
Автор книги: id книги: 2155462     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 22792,2 руб.     (248,34$) Читать книгу Купить и скачать книгу Электронная книга Жанр: Техническая литература Правообладатель и/или издательство: John Wiley & Sons Limited Дата добавления в каталог КнигаЛит: ISBN: 9781119761662 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

The Cyber Ecosystem can be a replica of our natural ecosystem where different living and non-living things interact with each other to perform specific tasks. Similarly, the different entities of the cyber ecosystem collaborate digitally with each other to revolutionize our lifestyle by creating smart, intelligent, and automated systems/processes. The main actors of the cyber ecosystem, among others, are the Internet of Things (IoT), Artificial Intelligence (AI), and the mechanisms providing cybersecurity. This book documents how this blend of technologies is powering a digital sustainable socio-economic infrastructure which improves our life quality. It offers advanced automation methods fitted with amended business and audits models, universal authentication schemes, transparent governance, and inventive prediction analysis.

Оглавление

Группа авторов. The Smart Cyber Ecosystem for Sustainable Development

Table of Contents

List of Figures

List of Table

Guide

Pages

The Smart Cyber Ecosystem for Sustainable Development

Preface

1. Voyage of Internet of Things in the Ocean of Technology

1.1 Introduction

1.1.1 Characteristics of IoT

1.1.2 IoT Architecture

1.1.3 Merits and Demerits of IoT

1.2 Technological Evolution Toward IoT

1.3 IoT-Associated Technology

1.4 Interoperability in IoT

1.5 Programming Technologies in IoT

1.5.1 Arduino

1.5.2 Raspberry Pi

1.5.3 Python

1.6 IoT Applications

Conclusion

References

2. AI for Wireless Network Optimization: Challenges and Opportunities

2.1 Introduction to AI

2.2 Self-Organizing Networks

2.2.1 Operation Principle of Self-Organizing Networks

2.2.2 Self-Configuration

2.2.3 Self-Optimization

2.2.4 Self-Healing

2.2.5 Key Performance Indicators

2.2.6 SON Functions

2.3 Cognitive Networks

2.4 Introduction to Machine Learning

2.4.1 ML Types

2.4.2 Components of ML Algorithms

2.4.3 How do Machines Learn?

2.4.3.1 Supervised Learning

2.4.3.2 Unsupervised Learning

2.4.3.3 Semi-Supervised Learning

2.4.3.4 Reinforcement Learning

2.4.4 ML and Wireless Networks

2.5 Software-Defined Networks

2.5.1 SDN Architecture

2.5.2 The OpenFlow Protocol

2.5.3 SDN and ML

2.6 Cognitive Radio Networks

2.6.1 Sensing Methods

2.7 ML for Wireless Networks: Challenges and Solution Approaches

2.7.1 Cellular Networks. 2.7.1.1 Energy Saving

2.7.1.2 Channel Access and Assignment

2.7.1.3 User Association and Load Balancing

2.7.1.4 Traffic Engineering

2.7.1.5 QoS/QoE Prediction

2.7.1.6 Security

2.7.2 Wireless Local Area Networks

2.7.2.1 Access Point Selection

2.7.2.2 Interference Mitigation

2.7.2.3 Channel Allocation and Channel Bonding

2.7.2.4 Latency Estimation and Frame Length Selection

2.7.2.5 Handover

2.7.3 Cognitive Radio Networks

References

3. An Overview on Internet of Things (IoT) Segments and Technologies

3.1 Introduction

3.2 Features of IoT

3.3 IoT Sensor Devices

3.4 IoT Architecture

3.5 Challenges and Issues in IoT

3.6 Future Opportunities in IoT

3.7 Discussion

3.8 Conclusion

References

4. The Technological Shift: AI in Big Data and IoT

4.1 Introduction

4.2 Artificial Intelligence

4.2.1 Machine Learning

4.2.2 Further Development in the Domain of Artificial Intelligence

4.2.3 Programming Languages for Artificial Intelligence

4.2.4 Outcomes of Artificial Intelligence

4.3 Big Data

4.3.1 Artificial Intelligence Methods for Big Data

4.3.2 Industry Perspective of Big Data

4.3.2.1 In Medical Field

4.3.2.2 In Meteorological Department

4.3.2.3 In Industrial/Corporate Applications and Analytics

4.3.2.4 In Education

4.3.2.5 In Astronomy

4.4 Internet of Things

4.4.1 Interconnection of IoT With AoT

4.4.2 Difference Between IIoT and IoT

4.4.3 Industrial Approach for IoT

4.5 Technical Shift in AI, Big Data, and IoT

4.5.1 Industries Shifting to AI-Enabled Big Data Analytics

4.5.2 Industries Shifting to AI-Powered IoT Devices

4.5.3 Statistical Data of These Shifts

4.6 Conclusion

References

5. IoT’s Data Processing Using Spark

5.1 Introduction

5.2 Introduction to Apache Spark

5.2.1 Advantages of Apache Spark

5.2.2 Apache Spark’s Components

5.3 Apache Hadoop MapReduce

5.3.1 Limitations of MapReduce

5.4 Resilient Distributed Dataset (RDD)

5.4.1 Features and Limitations of RDDs

5.5 DataFrames

5.6 Datasets

5.7 Introduction to Spark SQL

5.7.1 Spark SQL Architecture

5.7.2 Spark SQL Libraries

5.8 SQL Context Class in Spark

5.9 Creating DataFrames

5.9.1 Operations on DataFrames

5.10 Aggregations

5.11 Running SQL Queries on DataFrames

5.12 Integration With RDDs

5.12.1 Inferring the Schema Using Reflection

5.12.2 Specifying the Schema Programmatically

5.13 Data Sources

5.13.1 JSON Datasets

5.13.2 Hive Tables

5.13.3 Parquet Files

5.14 Operations on Data Sources

5.15 Industrial Applications

5.16 Conclusion

References

6. SE-TEM: Simple and Efficient Trust Evaluation Model for WSNs

6.1 Introduction

6.1.1 Components of WSNs

6.1.2 Trust

6.1.3 Major Contribution

6.2 Related Work

6.3 Network Topology and Assumptions

6.4 Proposed Trust Model

6.4.1 CM to CM (Direct) Trust Evaluation Scheme

6.4.2 CM to CM Peer Recommendation (Indirect) Trust Estimation (PRx,y(∆t))

6.4.3 CH-to-CH Direct Trust Estimation

6.4.4 BS-to-CH Feedback Trust Calculation

6.5 Result and Analysis

6.5.1 Severity Analysis

6.5.2 Malicious Node Detection

6.6 Conclusion and Future Work

References

7. Smart Applications of IoT

7.1 Introduction

7.2 Background. 7.2.1 Enabling Technologies for Building Intelligent Infrastructure

7.3 Smart City

7.3.1 Benefits of a Smart City

7.3.2 Smart City Ecosystem

7.3.3 Challenges in Smart Cities

7.4 Smart Healthcare

7.4.1 Smart Healthcare Applications

7.4.2 Challenges in Healthcare

7.5 Smart Agriculture

7.5.1 Environment Agriculture Controlling

7.5.2 Advantages

7.5.3 Challenges

7.6 Smart Industries

7.6.1 Advantages

7.6.2 Challenges

7.7 Future Research Directions

7.8 Conclusions

References

8. Sensor-Based Irrigation System: Introducing Technology in Agriculture

8.1 Introduction

8.1.1 Technology in Agriculture

8.1.2 Use and Need for Low-Cost Technology in Agriculture

8.2 Proposed System

8.3 Flow Chart

8.4 Use Case

8.5 System Modules. 8.5.1 Raspberry Pi

8.5.2 Arduino Uno

8.5.3 DHT 11 Humidity and Temperature Sensor

8.5.4 Soil Moisture Sensor

8.5.5 Solenoid Valve

8.5.6 Drip Irrigation Kit

8.5.7 433 MHz RF Module

8.5.8 Mobile Application

8.5.9 Testing Phase

8.6 Limitations

8.7 Suggestions

8.8 Future Scope

8.9 Conclusion

Acknowledgement

References

Suggested Additional Readings

Key Terms and Definitions

Appendix

Example Code

9. Artificial Intelligence: An Imaginary World of Machine

9.1 The Dawn of Artificial Intelligence

9.2 Introduction

9.3 Components of AI

9.3.1 Machine Reasoning

9.3.2 Natural Language Processing

9.3.3 Automated Planning

9.3.4 Machine Learning

9.4 Types of Artificial Intelligence

9.4.1 Artificial Narrow Intelligence

9.4.2 Artificial General Intelligence

9.4.3 Artificial Super Intelligence

9.5 Application Area of AI

9.6 Challenges in Artificial Intelligence

9.7 Future Trends in Artificial Intelligence

9.8 Practical Implementation of AI Application

References

10. Impact of Deep Learning Techniques in IoT

10.1 Introduction

10.2 Internet of Things

10.2.1 Characteristics of IoT

10.2.2 Architecture of IoT

10.2.2.1 Smart Device/Sensor Layer

10.2.2.2 Gateways and Networks

10.2.2.3 Management Service Layer

10.2.2.4 Application Layer

10.2.2.5 Interoperability of IoT

10.2.2.5.1 Types of Interoperability

10.2.2.5.1.1 TECHNICAL INTEROPERABILITY

10.2.2.5.1.2 SYNTACTICAL INTEROPERABILITY

10.2.2.5.1.3 SEMANTIC INTEROPERABILITY

10.2.2.5.1.4 ORGANIZATIONAL INTEROPERABILITY

10.2.2.6 Security Requirements at a Different Layer of IoT

10.2.2.6.1 Application Layer

10.2.2.6.2 Service Support Layer

10.2.2.6.3 Network Layer

10.2.2.6.4 Smart Object/Sensor

10.2.2.7 Future Challenges for IoT

10.2.2.8 Privacy and Security

10.2.2.9 Cost and Usability

10.2.2.10 Data Management

10.2.2.11 Energy Preservation

10.2.2.12 Applications of IoT

10.2.2.12.1 Smart Living

10.2.2.12.2 Smart Cities

10.2.2.12.3 Smart Environment

10.2.2.12.4 Smart Industry

10.2.2.12.5 Smart Energy

10.2.2.12.6 Smart Agriculture

10.2.2.13 Essential IoT Technologies

10.2.2.13.1 Radio Frequency Identification

10.2.2.13.2 Wireless Sensor Networks

10.2.2.13.3 Middleware

10.2.2.13.4 Cloud Computing

10.2.2.13.5 IoT Application Software

10.2.2.14 Enriching the Customer Value

10.2.2.14.1 Monitoring and Control

10.2.2.14.2 Big Data and Business Analytics

10.2.2.14.3 Information Sharing and Collaboration

10.2.2.15 Evolution of the Foundational IoT Technologies

10.2.2.16 Technical Challenges in the IoT Environment

10.2.2.16.1 Data Management Challenge

10.2.2.16.2 Data Mining Challenge

10.2.2.16.3 Privacy Challenge

10.2.2.17 Security Challenge

10.2.2.18 Chaos Challenge

10.2.2.19 Advantages of IoT

10.2.2.20 Disadvantages of IoT

10.3 Deep Learning

10.3.1 Models of Deep Learning

10.3.1.1 Convolutional Neural Network

10.3.1.2 Recurrent Neural Networks

10.3.1.3 Long Short-Term Memory

10.3.1.4 Autoencoders

10.3.1.5 Variational Autoencoders

10.3.1.6 Generative Adversarial Networks

10.3.1.7 Restricted Boltzmann Machine

10.3.1.8 Deep Belief Network

10.3.1.9 Ladder Networks

10.3.2 Applications of Deep Learning

10.3.2.1 Industrial Robotics

10.3.2.2 E-Commerce Industries

10.3.2.3 Self-Driving Cars

10.3.2.4 Voice-Activated Assistants

10.3.2.5 Automatic Machine Translation

10.3.2.6 Automatic Handwriting Translation

10.3.2.7 Predicting Earthquakes

10.3.2.8 Object Classification in Photographs

10.3.2.9 Automatic Game Playing

10.3.2.10 Adding Sound to Silent Movies

10.3.3 Advantages of Deep Learning

10.3.4 Disadvantages of Deep Learning

10.3.5 Deployment of Deep Learning in IoT

10.3.6 Deep Learning Applications in IoT

10.3.6.1 Image Recognition

10.3.6.2 Speech/Voice Recognition

10.3.6.3 Indoor Localization

10.3.6.4 Physiological and Psychological Detection

10.3.6.5 Security and Privacy

10.3.7 Deep Learning Techniques on IoT Devices

10.3.7.1 Network Compression

10.3.7.2 Approximate Computing

10.3.7.3 Accelerators

10.3.7.4 Tiny Motes

10.4 IoT Challenges on Deep Learning and Future Directions

10.4.1 Lack of IoT Dataset

10.4.2 Pre-Processing

10.4.3 Challenges of 6V’s

10.4.4 Deep Learning Limitations

10.5 Future Directions of Deep Learning

10.5.1 IoT Mobile Data

10.5.2 Integrating Contextual Information

10.5.3 Online Resource Provisioning for IoT Analytics

10.5.4 Semi-Supervised Analytic Framework

10.5.5 Dependable and Reliable IoT Analytics

10.5.6 Self-Organizing Communication Networks

10.5.7 Emerging IoT Applications

10.5.7.1 Unmanned Aerial Vehicles

10.5.7.2 Virtual/Augmented Reality

10.5.7.3 Mobile Robotics

10.6 Common Datasets for Deep Learning in IoT

10.7 Discussion

10.8 Conclusion

References

11. Non-Invasive Process for Analyzing Retinal Blood Vessels Using Deep Learning Techniques

11.1 Introduction

11.2 Existing Methods Review

11.3 Methodology

11.3.1 Architecture of Stride U-Net

11.3.2 Loss Function

11.4 Databases and Evaluation Metrics

11.4.1 CNN Implementation Details

11.5 Results and Analysis. 11.5.1 Evaluation on DRIVE and STARE Databases

11.5.2 Comparative Analysis

11.6 Concluding Remarks

References

12. Existing Trends in Mental Health Based on IoT Applications: A Systematic Review

12.1 Introduction

12.2 Methodology

12.3 IoT in Mental Health

12.4 Mental Healthcare Applications and Services Based on IoT

12.5 Benefits of IoT in Mental Health. 12.5.1 Reduction in Treatment Cost

12.5.2 Reduce Human Error

12.5.3 Remove Geographical Barriers

12.5.4 Less Paperwork and Documentation

12.5.5 Early Stage Detection of Chronic Disorders

12.5.6 Improved Drug Management

12.5.7 Speedy Medical Attention

12.5.8 Reliable Results of Treatment

12.6 Challenges in IoT-Based Mental Healthcare Applications. 12.6.1 Scalability

12.6.2 Trust

12.6.3 Security and Privacy Issues

12.6.4 Interoperability Issues

12.6.5 Computational Limits

12.6.6 Memory Limitations

12.6.7 Communications Media

12.6.8 Devices Multiplicity

12.6.9 Standardization

12.6.10 IoT-Based Healthcare Platforms

12.6.11 Network Type

12.6.12 Quality of Service

12.7 Blockchain in IoT for Healthcare

12.8 Results and Discussion

12.9 Limitations of the Survey

12.10 Conclusion

References

13. Monitoring Technologies for Precision Health

13.1 Introduction

13.2 Applications of Monitoring Technologies

13.2.1 Everyday Life Activities

13.2.2 Sleeping and Stress

13.2.3 Breathing Patterns and Respiration

13.2.4 Energy and Caloric Consumption

13.2.5 Diabetes, Cardiac, and Cognitive Care

13.2.6 Disability and Rehabilitation

13.2.7 Pregnancy and Post-Procedural Care

13.3 Limitations

13.3.1 Quality of Data and Reliability

13.3.2 Safety, Privacy, and Legal Concerns

13.4 Future Insights. 13.4.1 Consolidating Frameworks

13.4.2 Monitoring and Intervention

13.4.3 Research and Development

13.5 Conclusions

References

14. Impact of Artificial Intelligence in Cardiovascular Disease

14.1 Artificial Intelligence

14.2 Machine Learning

14.3 The Application of AI in CVD

14.3.1 Precision Medicine

14.3.2 Clinical Prediction

14.3.3 Cardiac Imaging Analysis

14.4 Future Prospect

14.5 PUAI and Novel Medical Mode. 14.5.1 Phenomenon of PUAI

14.5.2 Novel Medical Model

14.6 Traditional Mode. 14.6.1 Novel Medical Mode Plus PUAI

14.7 Representative Calculations of AI

14.8 Overview of Pipeline for Image-Based Machine Learning Diagnosis

References

15. Healthcare Transformation With Clinical Big Data Predictive Analytics

15.1 Introduction

15.1.1 Big Data in Health Sector

15.1.2 Data Structure Produced in Health Sectors

15.2 Big Data Challenges in Healthcare

15.2.1 Big Data in Computational Healthcare

15.2.2 Big Data Predictive Analytics in Healthcare

15.2.3 Big Data for Adapted Healthcare

15.3 Cloud Computing and Big Data in Healthcare

15.4 Big Data Healthcare and IoT

15.5 Wearable Devices for Patient Health Monitoring

15.6 Big Data and Industry 4.0

15.7 Conclusion

References

16. Computing Analysis of Yajna and Mantra Chanting as a Therapy: A Holistic Approach for All by Indian Continent Amidst Pandemic Threats

16.1 Introduction. 16.1.1 The Stats of Different Diseases, Comparative Observation on Symptoms, and Mortality Rate

16.1.2 Precautionary Guidelines Followed in Indian Continent

16.1.3 Spiritual Guidelines in Indian Society. 16.1.3.1 Spiritual Defense Against Global Corona by Swami Bhoomananda Tirtha of Trichura, Kerala, India

16.1.4 Veda Vigyaan: Ancient Vedic Knowledge

16.1.5 Yagyopathy Researches, Say, Smoke of Yagya is Boon

16.1.6 The Yagya Samagri

16.2 Literature Survey. 16.2.1 Technical Aspects of Yajna and Mantra Therapy

16.2.2 Mantra Chanting and Its Science

16.2.3 Yagya Medicine (Yagyopathy)

16.2.4 The Medicinal HavanSamagri Components. 16.2.4.1 Special Havan Ingredients to Fight Against Infectious Diseases

16.2.5 Scientific Benefits of Havan

16.3 Experimental Setup Protocols With Results

16.3.1 Subject Sample Distribution

16.3.1.1 Area Wise Distribution

16.3.2 Conclusion and Discussion Through Experimental Work

16.4 Future Scope and Limitations

16.5 Novelty

16.6 Recommendations

16.7 Applications of Yajna Therapy

16.8 Conclusions

Acknowledgement

References

Key Terms and Definitions

17. Extraction of Depression Symptoms From Social Networks

17.1 Introduction

17.1.1 Diagnosis and Treatments

17.2 Data Mining in Healthcare

17.2.1 Text Mining

17.3 Social Network Sites

17.4 Symptom Extraction Tool

17.4.1 Data Collection

17.4.2 Data Processing

17.4.3 Data Analysis

17.5 Sentiment Analysis

17.5.1 Emotion Analysis

17.5.2 Behavioral Analysis

17.6 Conclusion

References

18. Fog Computing Perspective: Technical Trends, Security Practices, and Recommendations

18.1 Introduction

18.2 Characteristics of Fog Computing

18.3 Reference Architecture of Fog Computing

18.4 CISCO IOx Framework

18.5 Security Practices in CISCO IOx

18.5.1 Potential Attacks on IoT Architecture

18.5.2 Perception Layer (Sensing)

18.5.3 Network Layer

18.5.4 Service Layer (Support)

18.5.5 Application Layer (Interface)

18.6 Security Issues in Fog Computing

18.6.1 Virtualization Issues

18.6.2 Web Security Issues

18.6.3 Internal/External Communication Issues

18.6.4 Data Security Related Issues

18.6.5 Wireless Security Issues

18.6.6 Malware Protection

18.7 Machine Learning for Secure Fog Computing

18.7.1 Layer 1 Cloud

18.7.2 Layer 2 Fog Nodes For The Community

18.7.3 Layer 3 Fog Node for Their Neighborhood

18.7.4 Layer 4 Sensors

18.8 Existing Security Solution in Fog Computing

18.8.1 Privacy-Preserving in Fog Computing

18.8.2 Pseudocode for Privacy Preserving in Fog Computing

18.8.3 Pseudocode for Feature Extraction

18.8.4 Pseudocode for Adding Gaussian Noise to the Extracted Feature

18.8.5 Pseudocode for Encrypting Data

18.8.6 Pseudocode for Data Partitioning

18.8.7 Encryption Algorithms in Fog Computing

18.9 Recommendation and Future Enhancement

18.9.1 Data Encryption

18.9.2 Preventing from Cache Attacks

18.9.3 Network Monitoring

18.9.4 Malware Protection

18.9.5 Wireless Security

18.9.6 Secured Vehicular Network

18.9.7 Secure Multi-Tenancy

18.9.8 Backup and Recovery

18.9.9 Security with Performance

18.10 Conclusion

References

19. Cybersecurity and Privacy Fundamentals

19.1 Introduction

19.2 Historical Background and Evolution of Cyber Crime

19.3 Introduction to Cybersecurity

19.3.1 Application Security

19.3.2 Information Security

19.3.3 Recovery From Failure or Disaster

19.3.4 Network Security

19.4 Classification of Cyber Crimes

19.4.1 Internal Attacks

19.4.2 External Attacks

19.4.3 Unstructured Attack

19.4.4 Structured Attack

19.5 Reasons Behind Cyber Crime

19.5.1 Making Money

19.5.2 Gaining Financial Growth and Reputation

19.5.3 Revenge

19.5.4 For Making Fun

19.5.5 To Recognize

19.5.6 Business Analysis and Decision Making

19.6 Various Types of Cyber Crime

19.6.1 Cyber Stalking

19.6.2 Sexual Harassment or Child Pornography

19.6.3 Forgery

19.6.4 Crime Related to Privacy of Software and Network Resources

19.6.5 Cyber Terrorism

19.6.6 Phishing, Vishing, and Smishing

19.6.7 Malfunction

19.6.8 Server Hacking

19.6.9 Spreading Virus

19.6.10 Spamming, Cross Site Scripting, and Web Jacking

19.7 Various Types of Cyber Attacks in Information Security

19.7.1 Web-Based Attacks in Information Security

19.7.2 System-Based Attacks in Information Security

19.8 Cybersecurity and Privacy Techniques

19.8.1 Authentication and Authorization

19.8.2 Cryptography

19.8.2.1 Symmetric Key Encryption

19.8.2.2 Asymmetric Key Encryption

19.8.3 Installation of Antivirus

19.8.4 Digital Signature

19.8.5 Firewall

19.8.6 Steganography

19.9 Essential Elements of Cybersecurity

19.10 Basic Security Concerns for Cybersecurity

19.10.1 Precaution

19.10.2 Maintenance

19.10.3 Reactions

19.11 Cybersecurity Layered Stack

19.12 Basic Security and Privacy Check List

19.13 Future Challenges of Cybersecurity

References

20. Changing the Conventional Banking System through Blockchain

20.1 Introduction. 20.1.1 Introduction to Blockchain

20.1.2 Classification of Blockchains

20.1.2.1 Public Blockchain

20.1.2.2 Private Blockchain

20.1.2.3 Hybrid Blockchain

20.1.2.4 Consortium Blockchain

20.1.3 Need for Blockchain Technology

20.1.3.1 Bitcoin vs. Mastercard Transactions: A Summary

20.1.3.1.1 Outcomes

20.1.3.1.1.1 BITCOIN TRANSACTIONS

20.1.3.1.1.2 CREDIT CARD TRANSACTIONS

20.1.3.1.1.3 KEY DIFFERENCES

20.1.4 Comparison of Blockchain and Cryptocurrency

20.1.4.1 Distributed Ledger Technology (DLT)

20.1.5 Types of Consensus Mechanism

20.1.5.1 Consensus Algorithm: A Quick Background

20.1.6 Proof of Work

20.1.7 Proof of Stake

20.1.7.1 Delegated Proof of Stake

20.1.7.2 Byzantine Fault Tolerance

20.2 Literature Survey. 20.2.1 The History of Blockchain Technology

20.2.2 Early Years of Blockchain Technology: 1991–2008

20.2.2.1 Evolution of Blockchain: Phase 1—Transactions. 20.2.2.1.1 Blockchain Version 1.0: 2008-2013: Bitcoin Emergence

20.2.2.2 Evolution of Blockchain: Phase 2—Contracts. 20.2.2.2.1 Blockchain Version 2.0:2013-15 Ethereum Development

20.2.2.3 Evolution of Blockchain: Phase 3—Applications. 20.2.2.3.1 Blockchain Version 3.0:2018: The Future Scope

20.2.3 Literature Review

20.2.4 Analysis

20.3 Methodology and Tools. 20.3.1 Methodology

20.3.2 Flow Chart

20.3.3 Tools and Configuration

20.4 Experiment. 20.4.1 Steps of Implementation

20.4.2 Screenshots of Experiment

20.5 Results

20.6 Conclusion

20.7 Future Scope

20.7.1 Blockchain as a Service (BaaS) is Gaining Adoption From Enterprises

References

21. A Secured Online Voting System by Using Blockchain as the Medium

21.1 Blockchain-Based Online Voting System. 21.1.1 Introduction

21.1.2 Structure of a Block in a Blockchain System

21.1.3 Function of Segments in a Block of the Blockchain

21.1.4 SHA-256 Hashing on the Blockchain

21.1.5 Interaction Involved in Blockchain-Based Online Voting System

21.1.6 Online Voting System Using Blockchain – Framework

21.2 Literature Review. 21.2.1 Literature Review Outline

21.2.1.1 Online Voting System Based on Cryptographic and Stego-Cryptographic Model

21.2.1.2 Online Voting System Based on Visual Cryptography

21.2.1.3 Online Voting System Using Biometric Security and Steganography

21.2.1.4 Cloud-Based Secured Online Voting System Using Homomorphic Encryption

21.2.1.5 An Online Voting System Based on a Secured Blockchain

21.2.1.6 Online Voting System Using Fingerprint Biometric and Crypto-Watermarking Approach

21.2.1.7 Online Voting System Using Iris Recognition

21.2.1.8 Online Voting System Based on NID and SIM

21.2.1.9 Online Voting System Using Image Steganography and Visual Cryptography

21.2.1.10 Online Voting System Using Secret Sharing–Based Authentication

21.2.2 Comparing the Existing Online Voting System

References

22. Artificial Intelligence and Cybersecurity: Current Trends and Future Prospects

22.1 Introduction

22.2 Literature Review

22.3 Different Variants of Cybersecurity in Action

22.4 Importance of Cybersecurity in Action

22.5 Methods for Establishing a Strategy for Cybersecurity

22.6 The Influence of Artificial Intelligence in the Domain of Cybersecurity

22.7 Where AI Is Actually Required to Deal With Cybersecurity

22.8 Challenges for Cybersecurity in Current State of Practice

22.9 Conclusion

References

Index

WILEY END USER LICENSE AGREEMENT

Отрывок из книги

Scrivener Publishing

.....

The paper of [46] provides a detailed review of recent studies that combines ML and SDN technology to solve the intrusion detection problem. The authors compare the performance of supervised, unsupervised, semi-supervised, and DL algorithms.

In recent years, we see tremendous widespread of WLANs, as they evolve to meet user’s requirements, especially the high speed Internet connection. Accurate prediction of WLANs performance is important for managing network resources. However, due to interference and the interactions between the physical and data link layers as well as the heterogeneity of WLAN devices, predicting and estimating the performance of WLANs is a difficult task. Many of the solutions use the Signal-to-Noise and Interference Ratio (SNIR) parameter. However, it has been proven that relying on this parameter to estimate the performance does not lead to satisfactory results. In fact, the performance of WLANs is more complex to be measured using SNIR, and it is a function of large number of interacting and related parameters that may change over time.

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу The Smart Cyber Ecosystem for Sustainable Development
Подняться наверх