Quality Evaluation Model for Multimedia Internet of Things (MIoT) Applications: Challenges and Research Directions (English)
- New search for: Kumhar, Malaram
- New search for: Raval, Gaurang
- New search for: Parikh, Vishal
- New search for: Nain, Neeta
- New search for: Vipparthi, Santosh Kumar
- New search for: Kumhar, Malaram
- New search for: Raval, Gaurang
- New search for: Parikh, Vishal
In:
4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019
: Internet of Things and Connected Technologies
;
Chapter: 35
;
330-336
;
2020
- Article/Chapter (Book) / Electronic Resource
-
Title:Quality Evaluation Model for Multimedia Internet of Things (MIoT) Applications: Challenges and Research Directions
-
Additional title:Advs in Intelligent Syst., Computing
-
Contributors:Nain, Neeta ( editor ) / Vipparthi, Santosh Kumar ( editor ) / Kumhar, Malaram ( author ) / Raval, Gaurang ( author ) / Parikh, Vishal ( author )
-
Conference:International Conference on Internet of Things and Connected Technologies ; 2019 ; Jaipur, India
-
Published in:4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019 : Internet of Things and Connected Technologies ; Chapter: 35 ; 330-336Advances in Intelligent Systems and Computing ; 1122 ; 330-336
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2020-02-15
-
Size:7 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Structural Feature Based Automatic Vehicle Classification System at Toll PlazaSingh, Vivek / Srivastava, Amish / Kumar, Snehal / Ghosh, Rajib et al. | 2020
- 2
-
Classification of Chronic Kidney Disease with Genetic Search Intersection Based Feature Selection TechniqueSahu, Sanat Kumar / Chandrakar, Prem Kumar et al. | 2020
- 3
-
Analysis of Wormhole Detection Features in Wireless Sensor NetworksPatel, Manish / Aggarwal, Akshai / Chaubey, Nirbhay et al. | 2020
- 4
-
Propagating Minimal Messages Using Multi Set-Cover in Wireless Ad-Hoc NetworkSharmin, Sadia et al. | 2020
- 5
-
Multi Header Based Ultra Low Power MTCMOS Technique to Reduce NBTI Effect in Combinational CircuitKumar, Anjan / Saraswat, Shelesh Krishna / Agrawal, Preeti / Singh, Shweta et al. | 2020
- 6
-
Task Allocation in Distributed Real Time Database Systems in IoTChoudhary, Shetan Ram / Jha, C. K. et al. | 2020
- 7
-
Optimization of Block Diagonalization for MU-MIMO Downlink System Using PSODoneriya, Archana / Panchal, Manish / Lal, Jaya Dipti et al. | 2020
- 8
-
Simulation Analysis of DDoS Attack in IoT EnvironmentKumar, Vikash / Kumar, Vivek / Sinha, Ditipriya / Das, Ayan Kumar et al. | 2020
- 9
-
Blockchain Application Framework for Priority Metric Based Academic Record RepositoryBanerjee, Ajita / Singhal, Arman / Gujral, Lokesh / Choudhary, Kavita et al. | 2020
- 10
-
Design of Attribute Based Authenticated Group Key Agreement Protocol Without PairingVerma, Reshu / Kumar, Abhimanyu et al. | 2020
- 11
-
A Pairing Free Attribute-Based Authenticated Key Agreement Protocol Using ECCVerma, Reshu / Kumar, Abhimanyu et al. | 2020
- 12
-
Analysis of MEMS and Metamaterial Based Sensors and Its Involvement in NanotechnologySharma, Bhupendra / Gupta, Shraddha / Yadav, Ashwani / Runthala, Rahul et al. | 2020
- 13
-
High Gain Patch Array Antenna for 5G Network Communication and IoT ApplicationsKashwan, Kishana Ram et al. | 2020
- 14
-
Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A ReviewDatta, Sreemana / Das, Ayan Kumar / Kumar, Abhijeet / Khushboo / Sinha, Ditipriya et al. | 2020
- 15
-
An IoT Based Agri-Cloud Architectural Framework for Monitoring Presence of Fertilizer Under Multilayered Soil FarmingBhende, Nikhil V. / Purohit, Jayant K. / Junankar, Anup A. et al. | 2020
- 16
-
Analysis of Web Usage Patterns to Identify Most Frequently Accessed Web Page by Multiple UsersVerma, Priyanka / Kesswani, Nishtha et al. | 2020
- 17
-
A Composite Technique to Fortify Security for DaaS Services in Cloud EnvironmentYadav, Samarjeet / Saxena, Pratishtha / Dayal, Neelam / Prakash, Shiv et al. | 2020
- 18
-
Performance of Dual-Input Storage Based Induction Motor Drive for Electric and Fuel Cell Hybrid Electrical Vehicle ApplicationsYadav, Narayan / Gupta, Sushma / Thakur, Tripta et al. | 2020
- 19
-
A Lightweight Authentication Scheme for RFID Using ECCKumar, Atul / Jain, Ankit Kumar et al. | 2020
- 20
-
Lean and Industry 4.0 Strive to Create Smart Factory Through Integration of Systems: An Exploratory ReviewMajiwala, Hardik / Sharma, Suresh / Gandhi, Pankaj et al. | 2020
- 21
-
User Authentication in VANET Using SGSK (Self Generated Session Key)Singh, Lal / Patel, Ram Bahadur et al. | 2020
- 22
-
Grid Scrutinize Based Heuristic Sensor Node Scheduling Protocol with Partial Coverage Constraint in WSNSharma, Anamika / Chauhan, Siddhartha et al. | 2020
- 23
-
Intensity Transformation Fusion of Landsat 8 Thermal Infrared (TIR) ImagerySharma, Kul Vaibhav / Khandelwal, Sumit / Kaul, Nivedita et al. | 2020
- 24
-
Efficient Spectrum Provisioning in Elastic Optical NetworksMahala, Neha / Thangaraj, Jaisingh et al. | 2020
- 25
-
Intrusion Detection and Prevention Mechanism Implemented Using NS-2 Based on State Context and Hierarchical Trust in WSNsVyas, Abhishek / Abimannan, Satheesh et al. | 2020
- 26
-
Hardware Design of 8 × 8 and 16 × 16 2D Discrete Cosine Transform with N/2 Equations for Image CompressionBichwe, Nikhil C. / Chaurasiya, Rahul Kumar et al. | 2020
- 27
-
Security and Efficiency Analysis of Anti-jamming TechniquesPrasadh, S. Kshipra / Jindal, Sumit Kumar et al. | 2020
- 28
-
Generalized Dynamic Multilayer Fog Computing ArchitectureArjun, K. P. / Bhanu, S. Mary Saira et al. | 2020
- 29
-
An Efficient Quantum Key Management SchemeVishal / Taruna, S. et al. | 2020
- 30
-
Privacy Threat Model for IoTJain, Shelendra Kumar / Kesswani, Nishtha et al. | 2020
- 31
-
IoT Based Smart Luggage Monitor Alarm SystemValluripally, Sowmya / Sukheja, Deepak / Ohri, Kriti / Singh, Suyash K. et al. | 2020
- 32
-
Text Steganography Based on Parallel Encryption Using Cover Text (PECT)Panwar, Subhash / Kumar, Mukesh / Sharma, Sakshi et al. | 2020
- 33
-
Intelligence in Station-of-ThingsSaha, Soumya / Bhave, Tejashree / Nene, Manisha et al. | 2020
- 34
-
Mathematical Modeling and Numerical Simulation of a Double Touch-Mode Pressure Sensor with Graphene as the Sensing ElementTripathy, Smiti / Dash, Shiyona / Jindal, Sumit Kumar et al. | 2020
- 35
-
Quality Evaluation Model for Multimedia Internet of Things (MIoT) Applications: Challenges and Research DirectionsKumhar, Malaram / Raval, Gaurang / Parikh, Vishal et al. | 2020
- 36
-
A Study of Intrusion Detection System in Wireless Sensor NetworkAgarwal, Atul / Kaushal, Narottam Chand et al. | 2020
- 37
-
Energy Oriented Routing in Wireless Sensor Networks: Hardware ImplementationDipanshu / Nagaraju, A. et al. | 2020
- 38
-
Text Detection Using Maximally Stable External Regions and Stroke Width VariationSingh, Nishant / Kumar, Vivek / Bhatnagar, Charul et al. | 2020
- 39
-
Digital Image Steganography Using Modified LSB and AES CryptographyPanwar, Subhash / Kumar, Mukesh / Sharma, Sakshi et al. | 2020
- 40
-
Design and Implementation of AES on FPGA for Security of IOT DataBhoyar, Dinesh B. / Wankhede, Shelly R. / Modod, Swati K. et al. | 2020