Unlimited Access
For Registered Users
To contact us, you can contact us via the following mobile numbers by calling and WhatsApp
For Registered Users
100% Secure Payment
10 Days Returns
Call Us Anytime
edition: 1st ed. Authors: Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mohamed Guerroumi serie: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 256 ISBN : 9783030059279, 9783030059286 publisher: Springer International Publishing publish year: 2019 pages: 151 language: English ebook format : PDF (It will be converted to PDF, EPUB OR AZW3 if requested by the user) file size: 13 MB
Front Matter ....Pages I-X
Front Matter ....Pages 1-1
An Implementation of Harmonizing Internet of Things (IoT) in Cloud (Md. Motaharul Islam, Zaheer Khan, Yazed Alsaawy)....Pages 3-12
IoT Big Data Analytics with Fog Computing for Household Energy Management in Smart Grids (Shailendra Singh, Abdulsalam Yassine)....Pages 13-22
Secured Cancer Care and Cloud Services in IoT/WSN Based Medical Systems (Adeniyi Onasanya, Maher Elshakankiri)....Pages 23-35
Privacy Preserving for Location-Based IoT Services (Yue Qiu, Maode Ma)....Pages 36-45
Smart Home Security Application Enabled by IoT: (Chad Davidson, Tahsin Rezwana, Mohammad A. Hoque)....Pages 46-56
An MQTT-Based Scalable Architecture for Remote Monitoring and Control of Large-Scale Solar Photovoltaic Systems (Salsabeel Shapsough, Mohannad Takrouri, Rached Dhaouadi, Imran Zualkernan)....Pages 57-67
A Smart Meter Firmware Update Strategy Through Network Coding for AMI Network (Syed Qaisar Jalil, Stephan Chalup, Mubashir Husain Rehmani)....Pages 68-77
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid (Md Zakirul Alam Bhuiyan, Mdaliuz Zaman, Guojun Wang, Tian Wang, Md. Arafat Rahman, Hai Tao)....Pages 78-84
A Chain Based Signature Scheme for Uplink and Downlink Communications in AMI Networks (Samer Khasawneh, Michel Kadoch)....Pages 85-99
Robustness Situations in Cases of Node Failure and Packet Collision Enabled by TCNet: Trellis Coded Network - A New Algorithm and Routing Protocol (Diogo F. Lima Filho, José R. Amazonas)....Pages 100-110
Front Matter ....Pages 111-111
Effectiveness of Hard Clustering Algorithms for Securing Cyber Space (Sakib Mahtab Khandaker, Afzal Hussain, Mohiuddin Ahmed)....Pages 113-120
On Data Driven Organizations and the Necessity of Interpretable Models (Tony Lindgren)....Pages 121-130
A Multi-factor Authentication Method for Security of Online Examinations (Abrar Ullah, Hannan Xiao, Trevor Barker)....Pages 131-138
Evaluation Metrics for Big Data Project Management (Munir Ahmad Saeed, Mohiuddin Ahmed)....Pages 139-142
Back Matter ....Pages 143-143