Linked e-resources

Details

Intro; Preface; Special Acknowledgements; Contents; About the Editors; A Reactive Hybrid Metaheuristic Energy-Efficient Algorithm for Wireless Sensor Networks; 1 Introduction; 2 Network Model; 2.1 Energy Model; 2.2 Cluster Head (CH) Formation; 3 Proposed RAP Algorithm; 3.1 ACO Based Path Selection; 3.2 PSO Algorithm; 3.3 Reactive Data Transmission; 4 Results and Discussion; 5 Conclusion; References; Maintaining Consistent Firewalls and Flows (CFF) in Software-Defined Networks; 1 Introduction; 2 Related Work; 3 CFF-Explained with an Example; 4 Modification in Firewall Rule Table and Flow Table

5 Implementation6 Conclusion; References; Energy-Efficient Broadcasting of Route-Request Packets (E2BR2) in Ad Hoc Networks; 1 Introduction; 2 Related Work; 3 Why Broadcasting of RREQ Is Special?; 4 Proposed Work E2BR2; 4.1 Network Model; 4.2 Broadcast Route Selection for RREQ Packets; 5 Illustration with an Example; 6 Simulation Results; 7 Conclusion; References; Decision Support System for Smart Grid Using Demand Forecasting Models; 1 Introduction; 1.1 Smart Grid Components; 1.2 Challenges in Smart Grid Implementation; 2 Power Demand Forecasting; 2.1 Types of Power Demand Forecasting

2.2 Challenges in Power Demand Forecasting2.3 Difficulties in Demand Forecasting; 3 Short-Term Power Demand Forecasting Methods and Model Results; 3.1 Naive Forecast Method (Same Day/Similar Day Approach); 3.2 Exponential Smoothing Method; 3.3 Autoregressive Moving Average (ARMA) Method; 3.4 Hybrid ARMA (p q) Model; 4 Conclusion; References; Internet of Things-The Concept, Inherent Security Challenges and Recommended Solutions; 1 Introduction; 2 Security-Based Research Evolution in IoT; 3 Prominent Vulnerabilities in IoT; 4 Critical Security Issues in IoT

4.1 Secure Communication Issue Between WSN and IoT4.2 Authentication Issue in the Internet of Things; 4.3 Key Management Issue in the Internet of Things; 5 Recommended Solutions; 5.1 Secure Transmission Between Sensor and IoT; 5.2 Robust Authentication in IoT; 5.3 Enhancing Key Management in IoT; 6 Conclusion; References; Critical Challenges in Access Management Schemes for Smartphones: An Appraisal; 1 Introduction; 2 Background Work; 2.1 Biometric-Based Access Management; 2.2 Non-biometric-Based Access Management; 3 Research Challenges and Open Issues; 4 Conclusion; References

Using Fuzzy Neural Networks Regularized to Support Software for Predicting Autism in Adolescents on Mobile Devices1 Introduction; 2 Literature Review; 2.1 Autistic Spectrum Disorder; 2.2 Expert Systems for the Diagnosis of Autism; 2.3 Techniques of Artificial Neural Networks and Fuzzy Systems; 2.4 Fuzzy Neural Network; 2.5 A Mobile System for Autism Identification-Autism Spectrum Disorder Tests App; 2.6 Self-Organized Direction-Aware Data Partitioning Algorithm-SODA; 2.7 Robust Activation Function-RAF; 3 Fuzzy Neural Network for Autism Spectrum Disorder Test; 3.1 Network Architecture

Browse Subjects

Show more subjects...

Statistics

from
to
Export