Skip to main content

Abstract

More detail about the proposed prediction algorithm, as well as the many components that comprise our design, is given here. A Moving Window Regression with Adaptive Weights is an example of a regression model (AMWR).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Biswal AK, Singh D, Pattanayak BK, Samanta D, Yang M (2021) IoT-Based smart alert system for drowsy driver detection. Wirel Commun Mob Comput 2021:13, Article ID 6627217. https://doi.org/10.1155/2021/6627217

  2. Pramanik S, Samanta D, Dutta S, Ghosh R, Ghonge M, Pandey D (2020) Steganography using improved LSB Approach and asymmetric cryptography. In: 2020 IEEE international conference on advent trends in multidisciplinary research and innovation (ICATMRI), Buldhana, India, 2020, pp 1–5. https://doi.org/10.1109/ICATMRI51801.2020.9398408.

  3. Maheswari M, Geetha S, kumar SS, Karuppiah M, Samanta D, Park Y (2021) PEVRM: probabilistic evolution based version recommendation model for mobile applications. IEEE Access. https://doi.org/10.1109/ACCESS.2021.3053583

  4. Kumar R, Kumar R, Samanta D, Paul M, Kumar V (2017) A combining approach using DFT and FIR filter to enhance impulse response. In: 2017 International conference on computing methodologies and communication (ICCMC), Erode, India, 2017, pp 134–137. https://doi.org/10.1109/ICCMC.2017.8282660

  5. Gomathy V, Padhy N, Samanta D et al (2020) Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks. J Ambient Intell Human Comput 11:4995–5001. https://doi.org/10.1007/s12652-020-01797-3

    Article  Google Scholar 

  6. Ghosh G, Samanta D, Paul M, Janghel NK (2017) Hiding based message communication techniques depends on divide and conquer approach. In: 2017 international conference on computing methodologies and communication (ICCMC), Erode, 2017, pp 123–128. https://doi.org/10.1109/ICCMC.2017.8282658

  7. Sivakumar P, Nagaraju R, Samanta D et al (2020) A novel free space communication system using nonlinear InGaAsP microsystem resonators for enabling power-control toward smart cities. Wireless Netw 26:2317–2328. https://doi.org/10.1007/s11276-019-02075-7

    Article  Google Scholar 

  8. Samanta D, Sanyal G (2012) A novel approach of SAR image classification using color space clustering and watersheds. In: 2012 4th international conference on computational intelligence and communication networks, Mathura, India, 2012, pp 237–240. https://doi.org/10.1109/CICN.2012.27.

  9. Khamparia A, Singh PK, Rani P, Samanta D, Khanna A, Bhushan B (2020) An internet of health things‐driven deep learning framework for detection and classification of skin cancer using transfer learning. Trans Emerg Telcommun Technol 2020:e3963. https://doi.org/10.1002/ett.3963

  10. Hossain MA, Samanta D, Sanyal G (2012) Statistical approach for extraction of panic expression. In: 2012 4th international conference on computational intelligence and communication networks, Mathura, India, 2012, pp 420–424. https://doi.org/10.1109/CICN.2012.189

  11. Althar RR, Samanta D (2021) The realist approach for evaluation of computational intelligence in software engineering. Innov Syst Softw Eng. https://doi.org/10.1007/s11334-020-00383-2

    Article  Google Scholar 

  12. Singh RK, Begum T, Borah L, Samanta D (2017) Text encryption: character jumbling. In: 2017 International conference on inventive systems and control (ICISC), Coimbatore, India, 2017, pp 1–3. https://doi.org/10.1109/ICISC.2017.8068691

  13. Guha A, Samanta D (2021) Hybrid approach to document anomaly detection: an application to facilitate RPA in title insurance. Int J Autom Comput 18:55–72. https://doi.org/10.1007/s11633-020-1247-y

    Article  Google Scholar 

  14. Agarwal M, Sarkhel D, Samanta D (2018) Architecture of ‘loop’ without ‘for’ & ‘while.’ In: 2018 2nd international conference on inventive systems and control (ICISC), Coimbatore, India, 2018, pp 491–494. https://doi.org/10.1109/ICISC.2018.8399121

  15. Samanta D, Sivaram M, Rashed A, Boopathi CS, Amiri IS, Yupapin P (2020) Distributed feedback laser (DFB) for signal power amplitude level improvement in long spectral band. J Opt Commun. https://doi.org/10.1515/joc-2019-0252

  16. Chakrabarti S, Samanta D (2015) Notice of removal: a novel approach to digital image steganography of key-based encrypted text. In: 2015 International conference on electrical, electronics, signals, communication and optimization (EESCO), Visakhapatnam, India, 2015, pp 1–6. https://doi.org/10.1109/EESCO.2015.7254009

  17. Pramanik S, Samanta D, Bandyopadhyay S, Ghosh R (2021) A new combinational technique in image steganography. Int J Inf Secur Priv (IJISP) 15(3). ISSN: 1930–1650|EISSN: 1930–1669

    Google Scholar 

  18. Rao KR, Samanta D, Somashekara MT, Gurunath R, Paul A (2019) Automatic segmentation based graphical interface for recognition of tomography image analysis of damage cell. In: 2019 3rd international conference on inventive systems and control (ICISC), Coimbatore, India, 2019, pp 52–55. https://doi.org/10.1109/ICISC44355.2019.9036343

  19. Gurunath R, Agarwal M, Nandi A, Samanta D (2018) An overview: security issue in IoT network. In: 2018 2nd international conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 2018, pp 104–107. https://doi.org/10.1109/I-SMAC.2018.8653728

  20. Ghosh G, Samanta D, Paul M (2016) Approach of message communication based on twisty “Zig-Zag.” In: 2016 International conference on emerging technological trends (ICETT), Kollam, 2016, pp 1–5. https://doi.org/10.1109/ICETT.2016.7873676

  21. Dhanush V, Mahendra AR, Kumudavalli MV, Samanta D (2017) Application of deep learning technique for automatic data exchange with air-gapped systems and its security concerns. In: 2017 International conference on computing methodologies and communication (ICCMC), Erode, India, 2017, pp 324–328. https://doi.org/10.1109/ICCMC.2017.8282701

  22. Hossain MA, Samanta D, Sanyal G (2012) Extraction of panic expression depending on lip detection. In: 2012 International conference on computing sciences, Phagwara, India, 2012, pp 137–141. https://doi.org/10.1109/ICCS.2012.35

  23. Hossain MA, Samanta D, Sanyal G (2012) A novel approach for panic-face extraction based on mutation. In: 2012 IEEE International conference on advanced communication control and computing technologies (ICACCCT), Ramanathapuram, India, 2012, pp 473–477. https://doi.org/10.1109/ICACCCT.2012.6320825

  24. Szilagyi I, Wira P (2016) Ontologies and semantic web for the internet of things—a survey, IECON 2016—42nd annual conference of the IEEE industrial electronics society. Florence 2016:6949–6954. https://doi.org/10.1109/IECON.2016.7793744

    Article  Google Scholar 

  25. Raptis TP, Passarella A (2017) A distributed data management scheme for industrial IoT environments. In: IEEE 13th international conference on wireless and mobile computing, networking and communications (WiMob), pp 196–203. https://doi.org/10.1109/WiMOB.2017.8115846

  26. Uy NQ, Nam VH (2019) A comparison of AMQP and MQTT protocols for Internet of Things. In: 6th NAFOSTED conference on information and computer science (NICS), Hanoi, Vietnam, pp 292–297. https://doi.org/10.1109/NICS48868.2019.9023812

  27. Wang X, Ellul J, Azzopardi G (2020) Elderly fall detection systems: a literature survey. Front Robot AI. https://doi.org/10.3389/frobt.2020.00071

    Article  Google Scholar 

  28. Wukkadada B, Wankhede K, Nambiar R, Nair A (2018) Comparison with HTTP and MQTT in Internet of Things (IoT). In: International conference on inventive research in computing applications (ICIRCA), Coimbatore, pp 249–253. https://doi.org/10.1109/ICIRCA.2018.8597401

  29. Xiao S, Liu T, Wang X, Liu X, Zhou C (2020) Tailoring the absorption bandwidth of Graphene at critical coupling. Phys Rev B. https://doi.org/10.1103/PhysRevB.102.085410

    Article  Google Scholar 

  30. Xingyuan W, Suo G (2020) Image encryption algorithm for synchronously updating boolean networks based on matrix semi-tensor product theory. Inf Sci 507:16–36. https://doi.org/10.1016/j.ins.2019.08.041

    Article  MathSciNet  MATH  Google Scholar 

  31. Xu X, Zhong M, Wan J et al (2016) Health monitoring and management for manufacturing workers in adverse working conditions. J Med Syst 40(222). https://doi.org/10.1007/s10916-016-0584-4

  32. Yacchirema DC, Sarabia-Ja´come D, Palau CE, Esteve M (2018) A smart system for sleep monitoring by integrating IoT with big data analytics. IEEE Access 6:35988–36001

    Google Scholar 

  33. Yahaya AS, Javaid N, Fahad A, Rehman A, Ullah I, Shahid A, Shafiq M (2020) Blockchain based sustainable local energy trading considering home energy management and demurrage mechanism. Sustainability 12:3385. https://doi.org/10.3390/su12083385

  34. Yang C (2020) The inequity of conscientious objection: refusal of emergency contraception. Nurs Ethics 27(6). https://doi.org/10.1177/0969733020918926

  35. Yuan X, Wang Y, Liu J, Xu X, Yuan X (2018) Experimental and numerical study of airflow distribution optimization in high-density data center with flexible baffles. Build Environ 140:128–139. https://doi.org/10.1016/j.buildenv.2018.05.043

  36. Zhang C, Liu Z (2019) Application of big data technology in agricultural internet of things. Int J Distrib Sens Netw 15:10. https://doi.org/10.1177/1550147719881610

  37. Zhang P, Yin ZY, Jin FY, Chan THT (2020) A novel hybrid surrogate intelligent model for creep index prediction based on particle swarm optimization and random forest. Eng Geol 265. https://doi.org/10.1016/j.enggeo.2019.105328

  38. Jalasri M, Lakshmanan L (2018) A survey: integration of IoT and fog computing. In: 2018 2nd international conference on green computing and internet of things (ICGCIoT), Bangalore, India, pp 235–239. https://doi.org/10.1109/ICGCIoT.2018.8753010

  39. Jerald F, Anand M, Deepika N (2019) Design of an industrial IoT architecture based on MQTT protocol for end device to cloud communication. Int J Recent Technol Eng 7(6S2):552–554

    Google Scholar 

  40. Karthigha M, Latha L, Sripriyan K (2020) A comprehensive survey of routing attacks in wireless mobile ad hoc networks. In: 2020 International conference on inventive computation technologies (ICICT), Coimbatore, India, pp 396–402. https://doi.org/10.1109/ICICT48043.2020.9112588

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Samanta, D., Banerjee, A. (2021). Future of Intelligent IoT. In: Computationally Intensive Statistics for Intelligent IoT. Studies in Autonomic, Data-driven and Industrial Computing. Springer, Singapore. https://doi.org/10.1007/978-981-16-5936-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-5936-2_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-5935-5

  • Online ISBN: 978-981-16-5936-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics