Multimedia Technologies in the Internet of Things Environment, Volume 3

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book proposes a comprehensive overview of the state-of-the-art research work on multimedia analysis in IoT applications. This is a third volume by editors which provides theoretical and practical approach in the area of multimedia and IOT applications and performance analysis. Further, multimedia communication, deep learning models to multimedia data, and the new (IOT) approaches are also covered. It addresses the complete functional framework in the area of multimedia data, IoT, and smart computing techniques. It bridges the gap between multimedia concepts and solutions by providing the current IOT frameworks, their applications in multimedia analysis, the strengths and limitations of the existing methods, and the future directions in multimedia IOT analytics.

Author(s): Raghvendra Kumar, Rohit Sharma, Prasant Kumar Pattnaik
Series: Studies in Big Data, 108
Publisher: Springer
Year: 2022

Language: English
Pages: 236
City: Singapore

Preface
Contents
Editors and Contributors
Quantum Blockchain Approach for Security Enhancement in Cyberworld
1 Introduction
2 Attacks in Cyber Security
2.1 Man-In-the-Middle Attack
2.2 Denial-of-Service Attack
2.3 Photon Number-Splitting Attack
2.4 Malware Attack
2.5 Time-Shift Attack
2.6 Side-Channel Attack
2.7 Eavesdropping Attack
2.8 Intercept-Resend Attack
2.9 Brute-Force Attack
3 Quantum Key Distribution for Securing Information
3.1 Security of Quantum Key Distribution
3.2 Device-Independent (DI), Measurement Device-Independent (MDI) and Detector Device Independent (DDI)
3.3 Semi-QKD (SQKD)
3.4 Fibre-Based QKD
3.5 Free Space-Based QKD
3.6 QKD Network
4 Quantum Blockchain Approach for Security
4.1 Code-Based Cryptosystem
4.2 Multivariate-Based Cryptosystem
4.3 Lattice-Based Cryptosystem
4.4 Super-Singular-Based Cryptosystem
4.5 Hash-Based Signature Schemes
5 Conclusion and Future Research Directions
References
Quantum Computing for Health Care: A Review on Implementation Trends and Recent Advances
1 Introduction
2 Overview of Quantum Computing
2.1 Quantum Philosophy
2.2 Three Major Applications of Quantum Computing
3 Quantum Implementation in Healthcare
3.1 Public-Key Cryptography in Quantum Computing
3.2 Post-quantum Cryptography Projects
3.3 Standardization Initiatives
3.4 Post-quantum Code-Based Cryptography
3.5 Post-quantum Multivariate-Based Cryptosystems
4 Conclusion and Future Research Directions
References
Toward Task Scheduling Approaches to Reduce Energy Consumption in Cloud Computing Environment
1 Introduction
2 Energy Consumption and Scheduling Issues
3 Current Task Scheduling Approaches
3.1 Cloud Service Scheduling
3.2 Heuristic Scheduling
3.3 Real-Time Scheduling
3.4 Workflow Scheduling
4 Improved Task Scheduling Approaches to Reduce Energy Consumption
4.1 Energy-Efficient Scheduling in Private Cloud
4.2 Energy-Efficient in Real-Time Scheduling
4.3 Energy-Efficient Scheduling Using Hybrid Approach
5 Conclusion
References
An Efficient Data Transferring Through Li-Fi Technology: A Smart Home Appliance
1 Introduction
2 Related Works
3 Basic Architecture of Li-Fi
4 Learning Factory of Li-Fi: Industries 4.0 Aspect
5 Li-Fi with IoT
6 Smart Personalized Homes: A Li-Fi Model
7 Mathematical Treatment
7.1 Modulation
7.2 Circuit Diagram
8 Results
9 Conclusion
References
Modeling of Fuzzy Logic-Based Classification System Using the Gravitational Search Algorithm
1 Introduction
2 Implement Ability–Precision Trade-off
3 Gravitational Search Algorithm
4 GSA Algorithm
5 Fuzzy Logic-based Data Clustering
5.1 Design of FL-dependent Classification Module
5.2 Representation for Rule Set
5.3 Fitness Module Generation
6 Simulation Result
6.1 Normalization Capability
6.2 Interpretability
6.3 Statistical and Significant Test
6.4 Performance Comparison
7 Conclusion
References
Big Data-Based Image Handling—A Review of Implementation Using Amazon Web Services
1 Introduction
2 Related Works
3 Discussion
4 Conclusion
References
Real-Time System for Forecasting Natural Disasters Using the Social Network
1 Introduction
2 Literature Survey
3 Framework Descriptions
3.1 Interaction Between Analysts and Public
3.2 Activities Between the Users
4 Methodologies
4.1 Data Collection
4.2 Tweet Crawler
4.3 Location Identification
4.4 Event Prediction
5 Conclusions
References
Call-Based Smart Transportation Using Artificial Intelligence
1 Introduction
1.1 Setup of Call Service
1.2 Setup of NLP-Based Speech Recognition
1.3 Matching Customer with Driver
2 Literature Review
3 Problem Definition
3.1 Twilio—Programmable Voice
3.2 Twilio—Programmable SMS
3.3 TwiML
3.4 Rest API
4 Artificial Intelligence
4.1 Speech Recognition Using RNN
5 Process Flow
6 Test Outcomes and Outputs
7 Conclusion
References
Design Issues for Developing Routing Protocols for Flying Ad Hoc Network
1 Introduction
2 Literature Review
3 Overview of Routing Protocols
3.1 Location-Based Routing Protocol
3.2 Topology-Based Routing
3.3 Energy-Based Routing Protocols
3.4 Swarm Intelligence-Based Routing Protocols
4 Different Issues and Challenges for Designing UAV Routing Protocols
5 Conclusion
References
Online Stream Processing and Multimedia-Oriented IoT: Tools for Sustainable Development of Smart Cities
1 Introduction
1.1 What is the Internet of Things (IoT)?
1.2 IoT Implementation and How Does It Works?
1.3 Examples of IoT
1.4 Deep Learning Embedding Multimedia Data in the Internet of Things
1.5 How Do Smart Cities Make Advantage of the Internet of Things?
1.6 Need of Technology in Smart City Vision
1.7 Implementation of Multimedia Workplace with Multilayer
1.8 What is Online Streaming of Media?
1.9 Multimedia Stream Processing for Smart Cities
2 Applications of Online Stream Processing and Multimedia-Oriented IoT in Smart City Vision
2.1 Multilayer Perceptron as a Means of Multimedia-Oriented Action Recognition in Smart City-Based IoT
2.2 Leveraging Edge Intelligence for Video Analytics in Smart City Applications
2.3 Adaptive Traffic-Based Techniques for Live Multimedia Streaming
2.4 Pollution Monitoring and Security Challenges in Smart Cities: An IoT Solution
2.5 Smart Healthcare Monitoring Using Big Data and IoT in Smart Cities
2.6 Distributed Stream Processing Systems for Smart City Data Analytics
2.7 Motion Detection and Analysis Using Stream Processing and IoT in Smart Cities
2.8 Smart Parking Using Online Stream Processing, Big Data and IoT in Smart Cities
2.9 SmartSpot Gateways
2.10 Smart Grids and Energy Saving System of Smart Cities Enabled by Online Stream Processing and IoT
2.11 Role of Air Quality Management with IoT and Online Stream Processing in Smart Cities
2.12 In a Smart City Paradigm, Proactive IoT Applications Serve as Enablers for Smart Homes
2.13 In Order to Ensure Optimum Strategic Planning for IoT-Based Applications, Smart Towns that Are Green and Sustainable
2.14 An Internet of Things and Big Multimedia Data Course of Action for Smart City Transport System Adaptability Executives
2.15 Smart Path planning in Smart Cities: Probabilistic Trip Scheduling
3 Challenges
4 Conclusion
References
Big Data Analytics and Data Mining for Healthcare Informatics (HCI)
1 Introduction
2 Big Data Analytics
2.1 Overview
2.2 Big Data System
2.3 Big Data Challenges
2.4 Applications
3 Big Data for Healthcare Informatics (HCI)
3.1 Healthcare Informatics and Analysis (HCI&A) 1.0
3.2 HCI&A 2.0
3.3 HCI&A 3.0
4 Concerns on Privacy and Security of Electronic Health Records
4.1 Privacy Challenges
4.2 Security Challenges
5 Data Mining Tools for Health Care
5.1 Capabilities of Data Mining Tools for Health Care
5.2 Open-Source Data Mining Tools
6 Big Data-Based Healthcare Applications
6.1 Health Policy
6.2 Healthcare Insurance
6.3 Healthcare Securities
6.4 Smart Services
7 Future Research Direction and Conclusion
References
Integration of Quantum Computing and Blockchain Technology: A Cryptographic Perspective
1 Introduction
2 Blockchain Background
2.1 Blockchain Architecture
2.2 Key Properties of Blockchains
2.3 Types of Blockchains
2.4 Mining a Block
2.5 Privacy Requirements and Threats for Blockchain
3 Quantum Computing and Blockchain Technology
3.1 Threat of Quantum Attacks
3.2 Quantum-Level Vulnerabilities in Blockchain Platforms
4 Overview of Used Cryptographic Concepts in Blockchain
4.1 Signature Scheme
4.2 Zero-Knowledge Proofs
4.3 Access Control
4.4 Encryption Scheme
4.5 Secure Multi-Party Computation (SMPC)
4.6 Secret Sharing
4.7 Accumulator
4.8 Lightweight Cryptography
5 Pre-Quantum to Post-Quantum Blockchain
5.1 Blockchain Public Key Security
5.2 Hash Function Security
5.3 Initiatives of Post-Quantum Blockchain
5.4 Ideal Characteristics of Post-Quantum Schemes
6 Post-Quantum Cryptosystems for Blockchain
6.1 Code-Based
6.2 Multivariate-Based
6.3 Lattice-Based
6.4 Supersingular Elliptic Curve Isogeny
6.5 Hash-Based Signature Schemes
7 Conclusion
References