Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real-time Applications
SMART AND SUSTAINABLE APPROACHES FOR OPTIMIZING PERFORMANCE OF WIRELESS NETWORK
Explores the intersection of sustainable growth, green computing and automation, and performance optimization of 5G wireless networks
Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks explores how wireless sensing applications, green computing, and Big Data analytics can increase the energy efficiency and environmental sustainability of real-time applications across areas such as healthcare, agriculture, construction, and manufacturing.
Bringing together an international team of expert contributors, this authoritative volume highlights the limitations of conventional technologies and provides methodologies and approaches for addressing Quality of Service (QOS) issues and optimizing network performance. In-depth chapters cover topics including blockchain-assisted secure data sharing, smart 5G Internet of Things (IoT) scenarios, intelligent management of ad hoc networks, and the use of Artificial Intelligence (AI), Machine Learning (ML) and Deep Learning (DL) techniques in smart healthcare, smart manufacturing, and smart agriculture.
- Covers design, implementation, optimization, and sustainability of wireless and sensor-based networks
- Discusses concepts of sustainability and green computing as well as their relevance to society and the environment
- Addresses green automation applications in various disciplines such as computer science, nanoscience, information technology (IT), and biochemistry
- Explores various smart and sustainable approaches for current wireless and sensor-based networks
- Includes detailed case studies of current methodologies, applications, and implementations
Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real-time Applications is an essential resource for academic researchers and industry professionals working to integrate sustainable development and Information and Communications Technology (ICT).
Cover Table of Contents Title Page Copyright About the Editors List of Contributors 1 Analysis and Clustering of Sensor Recorded Data to Determine Sensors Consuming the Least Energy 1.1 Introduction 1.2 The Working of WSNs and Sensor Nodes 1.3 Classification of WSNs 1.4 Security Issues 1.5 Energy Consumption Issues 1.6 Commonly Used Standards and Protocols for WSNs 1.7 Effects of Temperature and Humidity on the Energy of WSNs 1.8 Proposed Methodology 1.9 Conclusion References 2 Impact of Artificial Intelligence in Designing of 5G 2.1 5G – An Introduction 2.2 5G and AI 2.3 AI and 5G 2.4 Challenges and Roadmap 2.5 Mathematical Models 2.6 Conclusion References 3 Sustainable Paradigm for Computing the Security of Wireless Internet of Things: Blockchain Technology 3.1 Introduction 3.2 Research Background 3.3 Related Work 3.4 Research Methodology 3.5 Comparison of Various Existing Solutions 3.6 Discussion of Research Questions 3.7 Future Scope of Blockchain in IoT 3.8 Conclusion References 4 Cognitive IoT‐Based Health Monitoring Scheme Using Non‐Orthogonal Multiple Access 4.1 Introduction 4.2 Related Work 4.3 System Model and Implementation 4.4 Simulation Results 4.5 Conclusion 4.A Appendix References 5 Overview of Resource Management for Wireless Ad Hoc Network 5.1 Introduction 5.2 Mobile Ad Hoc Network (MANET) 5.3 Vehicular Ad Hoc Network (VANET) 5.4 Wireless Mesh Network (WMN) 5.5 Wireless Sensor Network (WSN) 5.6 Intelligent Resource Management Concerns in WANET 5.7 Future Research Directions 5.8 Conclusion References 6 A Survey: Brain Tumor Detection Using MRI Image with Deep Learning Techniques 6.1 Introduction 6.2 Background 6.3 Related Work 6.4 Gaps and Observations 6.5 Suggestions 6.6 Conclusion References 7 Challenges, Standards, and Solutions for Secure and Intelligent 5G Internet of Things (IoT) Scenarios 7.1 Introduction 7.2 Safety in Wireless Networks: Since 1G to 4G 7.3 IoT Background and Requirements 7.4 Non 5G Standards Supporting IoT 7.5 5G Advanced Security Model 7.6 Safety Challenges and Resolution of Three‐Tiers Structure of 5G Networks 7.7 Conclusion and Future Research Directions References 8 Blockchain Assisted Secure Data Sharing in Intelligent Transportation Systems 8.1 Introduction 8.2 Intelligent Transport System 8.3 Blockchain Technology 8.4 Blockchain Assisted Intelligent Transportation System 8.5 Future Research Perspectives 8.6 Conclusion References 9 Utilization of Agro Waste for Energy Engineering Applications: Toward the Manufacturing of Batteries and Super Capacitors 9.1 Introduction 9.2 Super Capacitors and Electrode Materials 9.3 Related Works in the Utilization of Agro‐Waste for Energy Engineering Applications 9.4 Inferences from Works Related with Utilization of Coconut, Rice Husk, and Pineapple Waste for Fabrication of Super Capacitor 9.5 Factors Contributing in the Fabrication of Super Capacitor from Agro‐Waste 9.6 Conclusion Acknowledgment References 10 Computational Intelligence Techniques for Optimization in Networks 10.1 Introduction Focussing on Pedagogy of Impending Approach 10.2 Relevant Analysis 10.3 Broad Area of Research 10.4 Problem Identification 10.5 Objectives of the Study 10.6 Methodology to be Adopted 10.7 Proposed/Expected Outcome of the Research References 11 R&D Export and ICT Regimes in India 11.1 Introduction 11.2 Artificial Intelligence the Uptake of Infrastructure Development 11.3 Future Analysis and Conclusion References 12 Metaheuristics to Aid Energy‐Efficient Path Selection in Route Aggregated Mobile Ad Hoc Networks 12.1 Introduction 12.2 Framework 12.3 Clustering 12.4 Ant Colony Optimization 12.5 Methodology 12.6 Results 12.7 Discussion 12.8 Conclusion References 13 Knowledge Analytics in IOMT‐MANET Through QoS Optimization for Sustainability 13.1 Introduction 13.2 Related Work 13.3 Proposed Neoteric Nature Inspired IWD Algorithm for ZRP 13.4 Simulation Results 13.5 Conclusion and Future Work References 14 Appraise Assortment of IoT Security Optimization 14.1 Introduction 14.2 Literature Review 14.3 Analysis of Traditional Security Mechanisms in IOT 14.4 Conclusion and Future Scope References 15 Trust‐Based Hybrid Routing Approach for Securing MANET 15.1 Introduction 15.2 Literature Review 15.3 Gaps and Objectives from the Literature Review 15.4 Methodology to be Adopted 15.5 Comparison Analysis 15.6 Conclusion and Future Scope References 16 Study of Security Issues on Open Channel 16.1 Introduction 16.2 Wireless Attacks 16.3 Securing Wireless Transmissions 16.4 Proposed Model for Securing the Client Over the Channel 16.5 Conclusion References Index End User License Agreement
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.