A Survey on Internet of Things (IoT): Layer Specific vs. Domain Specific Architecture (English)
- New search for: Pratap Singh, Sharad
- New search for: Kumar, Vinesh
- New search for: Kumar Singh, Akhilesh
- New search for: Singh, Shalini
- New search for: Smys, S.
- New search for: Senjyu, Tomonobu
- Further information on Senjyu, Tomonobu:
- https://orcid.org/https://orcid.org/0000-0003-4494-6773
- New search for: Lafata, Pavel
- New search for: Pratap Singh, Sharad
- New search for: Kumar, Vinesh
- New search for: Kumar Singh, Akhilesh
- New search for: Singh, Shalini
In:
Second International Conference on Computer Networks and Communication Technologies
: ICCNCT 2019
;
Chapter: 39
;
333-341
;
2020
- Article/Chapter (Book) / Electronic Resource
-
Title:A Survey on Internet of Things (IoT): Layer Specific vs. Domain Specific Architecture
-
Additional title:Lect. Notes on Data Eng. and Comms.Technol.
-
Contributors:Smys, S. ( editor ) / Senjyu, Tomonobu ( editor ) / Lafata, Pavel ( editor ) / Pratap Singh, Sharad ( author ) / Kumar, Vinesh ( author ) / Kumar Singh, Akhilesh ( author ) / Singh, Shalini ( author )
-
Conference:International Conference on Computer Networks and Inventive Communication Technologies ; 2019 ; Coimbatore, India
-
Published in:Second International Conference on Computer Networks and Communication Technologies : ICCNCT 2019 ; Chapter: 39 ; 333-341
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2020-01-22
-
Size:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Monitoring Air Pollutants Using Wireless Sensor NetworksPatil, Shweta A. / Deshpande, Pradeep et al. | 2020
- 2
-
Framework for Data Hiding Operation Using Motion Vectors for Effective Imperceptibility PerformanceManjunath Kamath, K. / Sanjeev Kunte, R. et al. | 2020
- 3
-
Privacy Protection and Con Dentiality in Medical IoTGeorge, Anjana / Alunkal, Anu S. / Nair, Gopika G. / Mohan, Poornasree R. / A, Fasila K. et al. | 2020
- 4
-
Review on Evacuation Systems for Indoor Fire SituationGhorpade, Pallavi S. / Rudrawar, Shilpa K. et al. | 2020
- 5
-
A Healthcare Application Model for Smarthome Using Frequent Pattern Based KNN AlgorithmRaveendran, Amrutha / Barakkath Nisha, U. et al. | 2020
- 6
-
Application of Big Data in Health Care with Patient Monitoring and Future Health PredictionThasni, K. M. / Haroon, Rosna P. et al. | 2020
- 7
-
Data Science for Internet of Things (IoT)Devi, M. / Dhaya, R. / Kanthavel, R. / Algarni, Fahad / Dixikha, Pooja et al. | 2020
- 8
-
ECDSEC: An Efficient Group Key Management Scheme for Secure Data Sharing Among Mobile Users in Cloud EnvironmentsMilton Ganesh, S. / Manikandan, S. P. et al. | 2020
- 9
-
Comparative Study on Deep Learning Frameworks for Object DetectionKurian, Elizebeth / Mathew, Justin et al. | 2020
- 10
-
An Adaptive Neighbour Knowledge-Based Hybrid Broadcasting for Emergency CommunicationsDeshmukh, Manjusha / Kakarwal, S. N. / Deshmukh, Ratnadeep et al. | 2020
- 11
-
Traffic Congestion Control Using Hierarchical Decision ModelGandhi, Suprit Atul / Desai, Vinay Prakash / Abhyankar, Akshay Sameer / Attar, Vahida et al. | 2020
- 12
-
A Proposed Blockchain Model to Enhance Student KnowledgeSiva Kumar, P. V. / Sriramudu / Palli, Chaitanya / Adarshavathi, J. / Guddeti, Padmavathi et al. | 2020
- 13
-
Heuristic Solutions Supported by GPON for Future Telecommunication Optical NetworkSıngh, Jasmeena / Garg, Amıt Kumar et al. | 2020
- 14
-
An IoT Based Weather Monitoring System Using Node MCU and Fuzzy LogicSrivastava, Meenakshi / Kumar, Rakesh et al. | 2020
- 15
-
Android Based Ripening Stage Identification for PeppercornsMythri, K. J. / Divya Ravi, N. / Poojitha / Prajna, M. / Pavan Kumar, M. R. et al. | 2020
- 16
-
Energy Efficient Heterogeneous Wireless Sensor Networks - Recent Trends & Research ChallengesManjunath, H. R. / Guruprakash, C. D. et al. | 2020
- 17
-
A Novel Security Scheme of Temporal-Key Based Encryption Policy in Sensor ApplicationsPremakumar, M. N. / Ramesh, S. et al. | 2020
- 18
-
A Survey on Next Generation NetworksVaishnavi, Veeragandham Sree / Roopa, Y. Mohana / Srinivasa Murthy, P. L. et al. | 2020
- 19
-
The New Approach for Creating the Knowledge Base Using WikiPediaGanesh, Prasad E. / Manjunath, H. R. / Deepashree, V. / Kavana, M. G. / Raviraja et al. | 2020
- 20
-
Ethereum Based IoT ArchitectureKadam, Sandeep B. / John, Shajimon K. et al. | 2020
- 21
-
Motorbike Helmet with Heads-Up Display Navigation and Fall Detection SystemGupta, Ritik / Singh, Rashmi / Pawar, Vaibhav E. / Patel, Shital V. et al. | 2020
- 22
-
A Crypto-Blocking Approach for the Security Paradigm for Aadhar Towards Privacy Preservation on Cloud InfrastructureDule, Chhaya S. / Girijamma, H. A. / Rajasekharaiah, K. M. et al. | 2020
- 23
-
PMI-IR Based Sentiment Analysis Over Social Media Platform for Analysing Client ReviewPatel, Jyoti / Dubey, Rahul / gupta, Rajeev kumar et al. | 2020
- 24
-
Analyzing User Awareness on Security in Android Smartphone DevicesSambaraju, Aedunuri / Pantula, Muralidhar / Kuppusamy, K. S. et al. | 2020
- 25
-
A Systematic Review of Different Data Compression Technique of Cloud Big Sensing DataSandhya Rani, I. / Venkateswarlu, Bondu et al. | 2020
- 26
-
A Survey on Big Data Solution for Complex Bio-medical InformationMoharana, Meena / Rautaray, Siddharth Swarup / Pandey, Manjusha et al. | 2020
- 27
-
Optimized Real Time Drowsy Driver Warning System Using Raspberry PiRoshni, A. Almah / Balaji, J. / Kaushik, D. / Chandran, K. R. Sarath et al. | 2020
- 28
-
Blockchain Based Efficient and Accurate Property Title Retrieval and Secured Storage SystemJoshi, Saee M. / Umale, Jayant / Rajeswari, K. et al. | 2020
- 29
-
Multi Keyword Search on Encrypted Text Without DecryptionSridhar, Vemula / Ram-Mohan Rao, K. et al. | 2020
- 30
-
An Efficient Approach for Traffic Monitoring System Using Image ProcessingPinto, Minal / Pais, Sharan Lional / Nisha / Gowri, Swarna / Puthi, Vishwath et al. | 2020
- 31
-
Analysis of Breast Cancer Dataset Using Big Data Algorithms for Accuracy of Diseases PredictionSinha, Ankita / Sahoo, Bhaswati / Rautaray, Siddharth Swarup / Pandey, Manjusha et al. | 2020
- 32
-
CPW Fed Antenna with Beveled Radiating Strip and Ground Plane for Ultra Wide Band ApplicationsAnsal, K. A. / Jose, Divya Susan / Cherian, Riboy et al. | 2020
- 33
-
Two-Level Text Summarization with Natural Language ProcessingHande, Rupali / Sidhwani, Avinash / Sidhwani, Deepesh / Shiv, Monil / Kewalramani, Divesh et al. | 2020
- 34
-
Visual Cryptography and Image Processing Based Approach for Bank Security ApplicationsPathak, Bageshree / Pondkule, Darshana / Shaha, Rasika / Surve, Apurva et al. | 2020
- 35
-
Data Streaming Framework on Cloud Platform for Surveillance of Unmanned SensorsManjushree, G. / Kalpana, A. / Rajashekhar, N. H. / Shivakumar, B. R. et al. | 2020
- 36
-
High-Speed Big Data Streams: A Literature ReviewPatil Sneha, R. / Dharwadkar Nagaraj, V. et al. | 2020
- 37
-
Towards Power Aware Data Transmission in Sensor Cloud: A SurveyKhan, Mohammad Farhan / Dwivedi, Rajendra Kumar / Kumar, Rakesh et al. | 2020
- 38
-
Real-Time Environment Description Application for Visually Challenged PeopleArvind Bhile, Amey / Hole, Varsha et al. | 2020
- 39
-
A Survey on Internet of Things (IoT): Layer Specific vs. Domain Specific ArchitecturePratap Singh, Sharad / Kumar, Vinesh / Kumar Singh, Akhilesh / Singh, Shalini et al. | 2020
- 40
-
RETRACTED CHAPTER: A Study on Email Security Through Cryptographic TechniquesSingh, Akhilesh Kumar / Kumar, Vinesh / Singh, Sharad Pratap et al. | 2020
- 41
-
Page Locked GPGPU Rotational Visual Secret SharingRaviraja Holla, M. / Suma, D. et al. | 2020
- 42
-
Opinion Mining Based on People’s Feedback About Engineering DegreeKarpagam, M. / Kanthimathi, S. / Akila, S. / Kanimozhi Suguna, S. et al. | 2020
- 43
-
Design and Implementation of Steering Based Headlight Control System Using CAN BusDhivya, M. / Gayathri Devi, K. / Kanimozhi Suguna, S. et al. | 2020
- 44
-
RETRACTED CHAPTER: Enhanced Energy Efficient Bio-trusted Anonymous Authentication Routing Technique of Wireless Body Area NetworkSudha, R. et al. | 2020
- 45
-
An Efficient Replica Management Based Disaster Recover Using Elephant Herding Optimization AlgorithmSasikumar, K. / Vijayakumar, B. et al. | 2020
- 46
-
An Efficient High Utility Pattern Mining for Finding Time Based Customer Purchase BehaviorAziya Shirin, V. S. / George, Joona et al. | 2020
- 47
-
Plant Disease Detection Using Deep LearningBhatia, Gresha S. / Ahuja, Pankaj / Chaudhari, Devendra / Paratkar, Sanket / Patil, Akshaya et al. | 2020
- 48
-
Study and Implementation of Ethernet Based Synchronization in Distributed Data Acquisition SystemManjaly, Jismi S. / Krishnan, Abi K. / Bonifus, P. L. et al. | 2020
- 49
-
Prevention of DDoS Attack Through Trust Management System for VANET EnvironmentChouhan, Piyush / Jain, Swapnil et al. | 2020
- 50
-
DENCLUE-DE: Differential Evolution Based DENCLUE for Scalable Clustering in Big Data AnalysisSantosh, Thakur / Ramesh, Dharavath et al. | 2020
- 51
-
Utility Mining Algorithms: A Bird’s Eye ViewAarthi, D. / Lavanya, S. / Kannimuthu, S. / Subhashree, K. et al. | 2020
- 52
-
A Survey of Datalink Layer Protocol for IoTDey, Dipasree / Dansana, Jayanti / Behura, Ashutosh et al. | 2020
- 53
-
ASL Recognition and Conversion to SpeechKharpude, Simran / Hardikar, Vaishnavi / Munot, Gautam / Lonkar, Omkar / Agarwal, Vanita et al. | 2020
- 54
-
Efficient Fuzzy-Based Multi-constraint Multicasting with Fault Tolerance Routing MechanismSivapriya, N. / Ravi, T. N. et al. | 2020
- 55
-
Performance Evaluation of Filtering Techniques in Filtered OFDM for 5G TechnologyTank, Hardik B. / Sedani, Bhavin S. / Kotak, Nirali A. et al. | 2020
- 56
-
Multifactor User Authentication Mechanism Using Internet of ThingsSanthi, S. G. / Kameswara Rao, M. et al. | 2020
- 57
-
Auto Emergent System (AES)Sureshkumar, S. / Saad Ahamed, M. / Sanjay, P. / Saravanan, R. et al. | 2020
- 58
-
Cloud Container Placement Policies: A Study and ComparisonMishra, Piyush / Bhatnagar, Shubham / Katal, Avita et al. | 2020
- 59
-
Internet of Energy: A Deep Learning Based Load PredictionSharma, Jahanvi / Garg, Ritu et al. | 2020
- 60
-
Alert Generation Framework from Twitter Data Stream During Disaster EventsHasla, M. / Swaraj, K. P. et al. | 2020
- 61
-
Potential and Extention of Internet of ThingsNag, Animesh / Kesharwani, Anand / Sharma, Bharti / Gupta, Ishu / Tiwari, Abhishek / Singh, Ashutosh Kumar et al. | 2020
- 62
-
Real Time Data Warehouse Updates Through Extraction-Transformation-Loading Process Using Change Data Capture MethodThulasiram, Sunaadh / Ramaiah, Nagaraja et al. | 2020
- 63
-
Predicting Stock Market Movement Based on Twitter Data and News Articles Using Sentiment Analysis and Fuzzy LogicPal, Roshni / Pawar, Utkarsha / Zambare, Karishma / Hole, Varsha et al. | 2020
- 64
-
Distributed Storage Hash Algorithm (DSHA) for File-Based Deduplication in Cloud ComputingHema, S. / Kangaiammal, A. et al. | 2020
- 65
-
Comparative Analysis of Heart Disease Classification Algorithms Using Big Data Analytical ToolNayak, Sinkon / Gourisaria, Mahendra Kumar / Pandey, Manjusha / Rautaray, Siddharth Swarup et al. | 2020
- 66
-
PT-GA-IRIAL: Enhanced Energy Efficient Approach to Select Migration VMs for Load Balancing in Cloud Computing EnvironmentRadhamani, V. / Dalin, G. et al. | 2020
- 67
-
An Area Effective and High Speed SAR ADC Architecture for Wireless CommunicationPrathiba, G. / Santhi, M. et al. | 2020
- 68
-
CharityChain - Donations Using BlockchainHande, Rupali / Agarwal, Tarasha / Monde, Ranjeet / Sirisha, N. Sai / Yadav, Richa et al. | 2020
- 69
-
A Survey of Wireless Communication Technologies from 1G to 5GGoyal, Jyoti / Singla, Khushboo / Akashdeep / Singh, Sarbjeet et al. | 2020
- 70
-
A Virtual Assistant Chatbot for College Advising SystemMohamed, Hadeel / Badawy, Osama / Eskaf, Khaled / Zaghloul, Mohamed Saad et al. | 2020
- 71
-
Performance Comparison of Machine Learning Algorithms in P300 Detection Using Balanced Mind-Speller DatasetPhilip, Jobin T. / George, S. Thomas / Subathra, M. S. P. et al. | 2020
- 72
-
Deep Learning Enabled Physical Layer Security to Combat Eavesdropping in Massive MIMO NetworksSiyad, C. Ismayil / Tamilselvan, S. et al. | 2020
- 73
-
Microcontroller Based Low Cost Robotic Arm for Rehabilitation of Patients with Set Back in Arm MovementSivapalanirajan, M. / Aravindhan, R. / Kartheeswaran, M. / Ariharan, S. / Prasanna Venketeshan, N. et al. | 2020
- 74
-
IoT Based Landslide Disaster Management SystemSajith, P. S. Muhammed / Nair, Vandana / Suresh, Venkatesh Pillai / Madhu, Arun et al. | 2020
- 75
-
IOT Based School Bus Monitoring System With Child SecurityNaik, Sandeep Seetaram / Harshitha, T. G. / Spoorthy, H. D. / Vedashree, B. S. / Taj, G. S. Samrin / Vetrivelan, P. et al. | 2020
- 76
-
Rubik’s Cube Encryption for Securing Cloud Stored DataAnusree, T. T. / Swaraj, K. P. et al. | 2020
- 77
-
Comparative Study on Face Detection by GPU, CPU and OpenCVPatidar, Sanjay / Singh, Upendra / Patidar, Ashish / Munsoori, Riyaz Ali / Patidar, Jyoti et al. | 2020
- 78
-
Resource Scheduling Using Modified FCM and PSO Algorithm in Cloud EnvironmentRudhrra Priyaa, A. / Rini Tonia, E. / Manikandan, N. et al. | 2020
- 79
-
Network Behaviour of Open vSwitch as Per the Anticipated Functionality of Network Application Programmed Over SDN Using Pox ControllerSachin, Darekar / Shaikh, M. Z. / Kondke, Harshal B. et al. | 2020
- 80
-
Review on Quantum Computing Tools and AlgorithmsMadhu, M. P. / Dixit, Sunanda et al. | 2020
- 81
-
Application of Cooperative Communication System in Driverless CarMukherjee, Subhajit / Mukherjee, Ritwick / Dey, Abhishek et al. | 2020
- 82
-
RETRACTED CHAPTER: ID Card Detection Using Histograms of Oriented GradientsMurali, Bala / Akula, Abhilash / Jeshwanth, Ega / Kalyan Kumar, Thota et al. | 2020
- 83
-
Resolving Unfairness Issues in Cognitive Radio Networks with Collision Based Primary UsersChaudhari, Chaitali / Patil, Hemlata / Kadam, Sujata et al. | 2020
- 84
-
New Adaptive Resonance Theory Based Intrusion Detection SystemTiwari, Purnesh / Mishra, Prakash / Singh, Upendra / Itare, Ravikant et al. | 2020
- 85
-
RDD-Eclat: Approaches to Parallelize Eclat Algorithm on Spark RDD FrameworkSingh, Pankaj / Singh, Sudhakar / Mishra, P. K. / Garg, Rakhi et al. | 2020
- 86
-
An Effective Paradigm on Self-regulating Cautious StrategySubramanium, Malathy / Jaipriya, S. / Anitha, G. / Janani, V. S. / Bharathipriya, V. et al. | 2020
- 87
-
A Smart System for Detection, Restoration, Optimization and Preservation of Fresh WaterSekhar, Aswin S. / Bassam, V. P. / Asokan, Amrutha P. / Cherian, Joice Anna / Kizhakkethottam, Jubilant J. et al. | 2020
- 88
-
Variants of Cuckoo Search with Levy Flight and Dynamic Strategy Based Cuckoo Search (DSBCS)Kumbhkar, Akhilesh / Garg, Deepak / Lamba, Sarita / Pingolia, Mahaveer et al. | 2020
- 89
-
RETRACTED CHAPTER: Secure IoT Systems Using Raspberry Pi Machine Learning Artificial IntelligenceBabu, R. Ganesh / Karthika, P. / Rajan, V. Aravinda et al. | 2020
- 90
-
IDS: Signature Based Peer-to-Peer Intrusion Detection System for Novice UsersJoyo, Wasim Abbas / Samual, Joshua / Elango, Sangeetha / Ismail, Mohamed / Johari, Zainudin / Stephen, Daniel et al. | 2020
- 91
-
Data Security Using Extended ECS (Encryption, Compression, Steganography)Verma, Surbhi / Kaur, Gagandeep / Garg, Deepak et al. | 2020
- 92
-
Dual-Band Graphene Based Planar Antenna for WLAN Communication ApplicationsVashi, Ronak / Upadhyaya, Trushit / Desai, Arpan / Patel, Riki et al. | 2020
- 93
-
Identity Based Reliable Data Sharing with Revoked System in CloudRaut, Sneha D. / Bogiri, Nagaraju et al. | 2020
- 94
-
A Study: Machine Learning and Deep Learning Approaches for Intrusion Detection SystemSekhar, C. H. / Rao, K. Venkata et al. | 2020
- 95
-
Systematic Literature Survey on IDS Based on Data MiningAmali Pushpam, C. / Gnana Jayanthi, J. et al. | 2020
- 96
-
Implementation of Reputation Based Framework for Detecting Misbehaving Nodes and Illustration of Vampire Attack in ManetsSheikh, Hasansab / Geetha, V. / Hariprasad, S. A. et al. | 2020
- 97
-
Design and Implementation of Smart Mirror for Pilot AssistanceDhanalakshmi, G. / BalaGuru, T. / Selvakumar, T. / Mohammed Imran, A. et al. | 2020
- 98
-
A Novel Hybrid RNN-ELM Architecture for Crime ClassificationSundhara Kumar, K. B. / Bhalaji, N. et al. | 2020
- 99
-
Cohort of Crowdsourcıng – SurveyBhaskar, N. / Mohan Kumar, P. et al. | 2020
- 100
-
Analysis for Optimal Interleaver in Multi-user IDMA Communication SystemSaraswat, Shelesh Krishna / Deolia, Vinay Kumar / Shukla, Aasheesh et al. | 2020
- 101
-
RETRACTED CHAPTER: A Study on Home Automation System for Dysarthric Persons Dependent on Speech RecognitionShenbagalakshmi, V. / Jaya, T. et al. | 2020
- 102
-
Performance Evaluation of Methods for Mining Frequent Itemsets on Temporal DataTripathi, Tripti / Yadav, Divakar et al. | 2020
- 103
-
A Novel Framework for Spam Hunting by Tracking Concept DriftBindu, V. / Thomas, Ciza et al. | 2020
- 104
-
Product Design Using Virtual RealityAnsal, V. / Shruthi, M. / D’Mello, Grynal / Antony, Subhin / Sharath, I. C. et al. | 2020
- 105
-
Smart Museum Using Li-Fi TechnologyKavitha, T. / Angel Reena, C. R. et al. | 2020
- 106
-
Analyzing the Power of Social Media in Solving Urban Issues: A New Aged Community HelperYenkar, Pranali / Sawarkar, S. D. et al. | 2020
- 107
-
Review of Handover in Li-Fi and Wi-Fi NetworksSanusi, Jaafaru / Aibinu, Abiodun Musa / Adeshina, Steve / Koyunlu, Gokhan / Idris, Sadiq et al. | 2020