INTERCONNECTED WORLDS OF PERVASIVE COMPUTING IOT AND NETWORKING

Authors

marina md arshad (ed)
Syed Hamid Hussain Madni (ed)

Synopsis

"Interconnected Worlds of Pervasive Computing, IoT, and Networking" presents an exploration of pervasive and ubiquitous computing in various real-world applications such as the internet of things (IoT), cloud computing, and 5G networks. This book is divided into four themes, providing a well-structured journey through the many landscapes of pervasive computing. The initial chapters establish the core concepts and look into the empirical evidence of the field. Then, the focus shifts to the practical applications in smart city development and human activity recognition. Subsequent chapters address the technological advancements in the role of machine learning in IoT and 5G networks. The final theme examines the critical aspects of security and efficiency in pervasive computing. This book is not merely a compilation of chapters but it also provides a cohesive narrative that helps researchers, practitioners, and students navigate through specific areas of interest within the broader field of pervasive computing.

Chapters

  • CHAPTER 1
    Introduction to Pervasive and Ubiquitous Computing
    marina md arshad, Syed Hamid Hussain Madni
  • CHAPTER 2
    Bibliometric Analysis of Pervasive and Ubiquitous Computing Research
    marina md arshad, Firoz Yusuf Patel Dawoodi, Muhalim Mohamed Amin
  • CHAPTER 3
    Pervasive Computing in Smart Cities
    Goh Eg Su, Mohd Shahrizal Sunar, Zhan JingChun
  • CHAPTER 4
    Probabilistic Ontology Model for Human Activity Recognition
    Naomie Salim, Pouya Foudeh
  • CHAPTER 5
    Machine and Deep Learning Approaches for IoT Networks
    marina md arshad, Ayesha Altaf, Muhammad Anwar, Hina Kirn
  • CHAPTER 6
    An Adaptive Interoperability Framework for IoT over 5G
    Ismail Fauzi Isnin, Muhammad Kaleem, Salman Rashid, Saria Tasneem
  • CHAPTER 7
    Factor-based Authentications Techniques in Machine-to- Machine Communication
    Raja Zahilah Raja Mohd Radzi, Rashidah Kadir, Shafi Ullah
  • CHAPTER 8
    Comparison of WEP, WPA, WPA2 and WPA3 in Wireless Security Protocols
    Abdul Qahar, Ayaz Hussain, Farkhana Muchtar, Muhammad Anwar
  • CHAPTER 9
    Nature-Inspired Metaheuristic Approach to SD-WAN Controller Placement
    Cindy Ujan, Mohd Murtadha Mohammad
  • CHAPTER 10
    Energy Efficient Opportunistic Routing in Underwater Sensor Networks
    Mohd Murtadha Mohammad, Nasarudin Ismail

Published

17 December 2024

Series

Categories