Table of Contents
Preface xv 
1 Enhancing Digital Learning Pedagogy for Lecture Video Recommendation Using Brain Wave Signal 1
 Rabi Shaw, Simanjeet Kalia and Sourabh Mohanty
 1.1 Introduction 2
 1.2 Related Work 4
 1.2.1 E-Learning, M-Learning, and T-Learning 4
 1.2.2 Involvement of Networking Reforms in Education 6
 1.2.3 Literature Review for Use of NeuroSky Headset in Education Domain 6
 1.3 Background 10
 1.4 Dataset 10
 1.5 Proposed Method and Result 11
 1.5.1 Collaborative Filtering Using Brain Signal–Induced Preferences 11
 1.5.1.1 Neurophysiological Experiment 11
 1.5.1.2 Deducing Preferences from Brain Signals 14
 1.5.2 Proposed Methodology for FlipRec Model 16
 1.5.2.1 Module for Data Preparation 16
 1.5.2.2 FlipRec: Preferred Recommendation Model 19
 1.5.3 Using Brain Signal Technology, a Cognitively Aware Lecture Video Recommendation System in Flipped Learning 20
 1.5.3.1 Finding Successful Cognitive States with a Clustering Method 20
 1.5.3.2 Feature Derivation for Estimating Attention 22
 1.6 Result Analysis 23
 1.7 Conclusion and Future Research 25
 References 25
 2 Blockchain-Based Sustainable Supply Chain Management 31
 Anuja Ajay, Saji M. S. and Subhasis Dash
 2.1 Introduction 32
 2.1.1 Significance of Blockchain for SCM 34
 2.1.2 Introduction to Blockchain Interoperability 35
 2.2 Blockchain for Supply Chain Management 35
 2.2.1 Characteristics and Requirements of Blockchain-Based Supply Chain 37
 2.2.1.1 Characteristics of Supply Chain 37
 2.2.1.2 Requirements of Supply Chain 40
 2.2.2 Blockchain-Based Data Sharing for Supply Chain 41
 2.2.3 Access Control and Trust Management in Blockchain- Based SCM 43
 2.2.3.1 Access Control Mechanisms in SCM 43
 2.2.3.2 Trust Management in Supply Chain 44
 2.3 Interoperability in Blockchain 45
 2.3.1 Overview of Blockchain Interoperability Approaches 45
 2.3.1.1 Public Connectors 45
 2.3.1.2 Blockchain of Blockchains (BoB) 46
 2.3.1.3 Hybrid Connectors 46
 2.3.2 Gateways for Interoperability and Manageability 48
 2.3.3 Interoperability Approaches 49
 2.4 Design Considerations and Open Challenges 50
 2.5 Summary 51
 2.5.1 Advantages of Blockchain for SSCM 51
 2.6 Scope of Future Work Emphasis 52
 References 53
 3 Revolutionizing Aquaculture With the Internet of Things (IoT): An Insightful Learning 59
 Arpita Nayak, Atmika Patnaik, Ipseeta Satpathy, Veena Goswami and B.C.M. Patnaik
 3.1 Introduction 60
 3.2 Environmental Monitoring via IoT for Sustainable Aquaculture 63
 3.3 The Primacy of IoT in Enhancing Fish Health Monitoring 67
 3.4 Delving Into IoT: Improving Agricultural Water Quality Management 70
 3.5 Connecting the Dots: Using IoT Fish Behavior Monitoring to Improve Aquaculture Practices 74
 3.6 The Worldwide Deployment of IoT in Aquaculture: Advantages and Success Factors 79
 3.7 Conclusion 81
 Acknowledgment 81
 References 81
 4 Energy Consumption Optimization in Wireless Sensor Networks 87
 Avik Das, Shatyaki Ghosh and Arindam Basak
 4.1 Introduction 87
 4.1.1 WSN Application and Hardware Characteristics 90
 4.2 MAC Layer Approaches 93
 4.2.1 IEEE 802.15.4 Standard along with the ZigBee Technology 94
 4.2.2 Different Other MAC Approaches 95
 4.3 Routing Approaches 98
 4.4 Transmission Power Control Approaches 99
 4.5 Autonomic Approaches 102
 4.6 Application of ZigBee in a WSN 105
 4.7 WSN with Cloud Computing 106
 4.8 Final Considerations and Future Directions 109
 References 110
 5 Airline Prediction Using Customer Feedback and Rating Using Machine Learning and Deep Learning 115
 Ch Sambasiva Rao, Pabbathi Manobhi Ram, Viswanadhapalli Siva and Motakatla Satya Sai Krishna Reddy
 5.1 Introduction 116
 5.1.1 Customer Ratings and Recommendation 116
 5.2 Literature Survey 117
 5.3 System Design 119
 5.4 Methodology 120
 5.4.1 Modules 120
 5.4.1.1 Data Collection 120
 5.4.1.2 Review-Based Airline Prediction 120
 5.4.1.3 Rating-Based Airline Prediction 121
 5.5 Algorithm Used: Random Forest, Convolutional Neural Network, and AdaBoost 121
 5.5.1 Random Forest System 121
 5.5.2 Convolutional 1D Neural Network–Based Training 122
 5.5.2.1 Sequential Model 122
 5.5.2.2 Add 1D Convolutional Layer 123
 5.5.2.3 Adding 1D Max Pooling Layer 123
 5.5.2.4 Adding Dense Layer 123
 5.5.2.5 Neural Network Training 123
 5.5.3 AdaBoost Algorithm 124
 5.6 Experimental Results and Evaluations 125
 5.7 Screenshots 126
 5.8 Conclusion 130
 References 130
 6 The Breakthrough of Future Delivery: Delivery Robots 133
 Ayushi Gupta
 6.1 Introduction 133
 6.2 Related Work 136
 6.3 Evolution of Delivery Robot 138
 6.4 Working Principal/Model of Delivery Robots 141
 6.5 Benefits of Delivery Robots 143
 6.6 Applications of Delivery Robots 149
 6.7 Development Projects 153
 6.8 Challenging Issues with Delivery Robots 158
 6.9 Conclusion and Future Work 165
 References 166
 7 Emergence of Cloud Computing in IoT Applications 169
 Priyanshu Sonthalia and Doddi Puneet
 7.1 Introduction 170
 7.1.1 Characteristics of Cloud Computing 170
 7.1.2 Types of Cloud Deployment Models 171
 7.1.3 Categories of Cloud Computing Architectures 172
 7.1.4 Types of Cloud Service Models 173
 7.2 Benefits of IoT and Cloud Integration 174
 7.2.1 Scalability and Elasticity of Cloud Resources for Managing IoT Data 174
 7.2.2 Reduced Infrastructure Costs with Cloud-Based Solutions 174
 7.2.3 Improved Accessibility and Availability of IoT Services with Cloud Deployment 175
 7.2.4 Enhanced Processing Power and Analytics Capabilities with Cloud Computing 175
 7.2.5 Reduced Time to Market and Increased Innovation with Cloud-Based IoT Development 175
 7.3 Cloud-Based IoT Architecture 175
 7.3.1 Four Layers of Cloud-Based IoT Architecture 175
 7.3.2 Role of Gateways in Linking IoT Devices to the Cloud 176
 7.3.3 Overview of Cloud-Based IoT Platforms and Services 177
 7.3.4 Cloud-Based IoT Standards and Protocols, such as MQTT, CoAP, AMQP, and HTTP 177
 7.4 Cloud-Based IoT Applications 180
 7.5 Challenges in IoT Cloud Integration 181
 7.5.1 Security Risks and Challenges Associated with Cloud-Based IoT Solutions 181
 7.5.2 Latency and Bandwidth Constraints of IoT Systems Hosted in the Cloud 181
 7.5.3 Interoperability Issues Between Different IoT Devices and Cloud Platforms 182
 7.5.4 Legal and Regulatory Challenges Associated with IoT Using Cloud Solutions 182
 7.6 Open Issues and Research Directions 182
 7.6.1 Future Trends and Developments in Cloud-Based IoT Solutions 182
 7.6.2 Opportunities for Research in Cloud-Based IoT Solutions 182
 7.6.3 Overview of Emerging Cloud-Based IoT Standards and Protocols 183
 7.7 Case Study 1: Smart Home Automation Using Cloud-Based IoT 183
 7.8 Case Study 2: Industrial IoT Optimization Using Cloud-Based IoT 184
 7.9 Conclusion 185
 References 186
 8 Conceptual Assessment of Sensory Networks and Its Functional Aspects 189
 Barat Nikhita, Siddhant Prateek Mahanayak and Kunal Anand
 8.1 Introduction 189
 8.2 Evolution of IoT 191
 8.2.1 Phase 1: Early Adopters (Pre-2010) 192
 8.2.2 Phase 2: Connectivity and Smart Devices (2010–2015) 193
 8.2.3 Phase 3: Big Data and Cloud Computing (2015 to Present) 194
 8.2.4 Phase 4: Artificial Intelligence and Edge Computing (Present and Future) 195
 8.3 Features of IoT 196
 8.4 Architectural Framework of IoT 199
 8.4.1 Device Layer 200
 8.4.2 Network Layer 201
 8.4.3 Platform Layer 202
 8.4.4 Application Layer 203
 8.5 Components of IoT 204
 8.6 Applications of IoT 206
 8.7 Case Study 211
 8.7.1 Overview of Barcelona Smart City Project 211
 8.7.2 Methodology 212
 8.8 Conclusion 213
 References 214
 9 System Security Using Artificial Intelligence and Reduction of Data Breach 221
 M. Avrit, G. P. Siranjeevi, Shruti Mishra, Sandeep Kumar Satapathy, Priyanka Mishra, Pradeep Kumar Mallick and Gyoo Soo Chae
 9.1 Introduction 222
 9.2 Related Work 224
 9.3 Methodology 224
 9.3.1 Implementation of Socket Programming Concept 224
 9.3.2 Machine Learning 225
 9.3.3 Deep Learning 225
 9.3.4 Human Assistance 225
 9.4 Proposed Model 225
 9.5 Experimental Result/Result Analysis 227
 9.6 Conclusion and Future Work 231
 References 231
 10 Mitigating DDoS Attacks: Empowering Network Infrastructure Resilience with AI and ML 233
 Teja Pasonri, Saurav Singh, Vedant Shirapure, Sandeep Kumar Satapathy, Sung-Bae Cho, Shruti Mishra and Pradeep Kumar Mallick
 10.1 Introduction 234
 10.1.1 Categories of DDoS Attack 235
 10.1.1.1 SYN Flood Attacks 235
 10.1.1.2 UDP Flood Attacks 235
 10.1.1.3 MSSQL Attacks 235
 10.1.1.4 LDAP Attacks 235
 10.1.1.5 Portmap Attacks 236
 10.1.1.6 NetBIOS Attacks 236
 10.1.2 Harnessing Machine Learning for DDoS Threat Detection 236
 10.1.3 AI Models for DDoS Threat Detection 236
 10.1.4 Beyond Classification: AI for Real-Time Detection and Mitigation 237
 10.1.5 Collaboration and Knowledge Sharing 237
 10.2 Related Work 237
 10.3 Methodology 239
 10.3.1 Pseudocode-1: Jupyter Project Code 240
 10.3.2 Pseudocode-2: Project KNN Model 241
 10.3.3 Hyperparameter Tuning and Evaluation 242
 10.3.4 Enhancing Model Accuracy 242
 10.3.5 Ping Request and DDoS Attack 242
 10.4 Proposed Model 243
 10.5 Experimental Result/Result Analysis 245
 10.5.1 Demo of DDoS Attack 245
 10.5.2 Packet Sniffing and Detecting Traffic 246
 10.5.3 Accuracy Graph 246
 10.5.4 Precision Graph 247
 10.6 Conclusion/Future Work 248
 References 248
 11 CyberEDU: An Interactive Educational Tool for DDoS Attack Simulation and Prevention 251
 Pulkit Srivastava, Vedant Shah, Priyanshu Singh, Sandeep Kumar Satapathy, Sung-Bae Cho, Shruti Mishra and Pradeep Kumar Mallick
 11.1 Introduction 252
 11.2 Related Work 255
 11.3 Methodology 257
 11.4 Proposed Model 260
 11.5 Experimental Result/Result Analysis 263
 11.6 Conclusion and Future Work 267
 References 267
 12 Resource Management and Performance Optimization in Constraint Network Systems 269
 Amarendra Kumar Mohanty
 12.1 Introduction 270
 12.2 Resource Allocation Principles 271
 12.3 Network Capacity and Utilization 274
 12.4 Performance Optimization Strategies 280
 12.4.1 Resource Management in Physical Networks 281
 12.4.2 Resource Management in Virtual Networks 297
 12.4.3 Resource Management in Software-Defined Networking (SDN) 300
 12.5 Real-World Applications 302
 12.5.1 Data Plane Development Kit Libraries 306
 12.5.2 Virtual Machine Device Queues (VMDQ) 309
 12.6 Conclusion and Future Directions 311
 References 312
 13 Resource-Constrained Network Management Using Software-Defined Networks 315
 Sayan Bhattacharyya, Manas Ranjan Lenka and Subhasis Dash
 13.1 Introduction 315
 13.2 Software-Defined Network Architecture and Its Key Components 317
 13.2.1 Application Plane 319
 13.2.1.1 Network Application 320
 13.2.1.2 Language-Level Virtualization 320
 13.2.2 Control Plane 320
 13.2.2.1 Network Operating System (NOS) 320
 13.2.2.2 Network Hypervisor 320
 13.2.3 Data Plane 321
 13.2.3.1 Network Infrastructure 321
 13.2.4 SDN Protocols 321
 13.2.4.1 Northbound Protocol 321
 13.2.4.2 Southbound Protocol 322
 13.2.4.3 Eastbound Protocol 322
 13.2.4.4 Westbound Protocol 323
 13.2.5 SDN Workflows 324
 13.3 Challenges and Opportunities of SDN in Resource- Constrained Scenarios 326
 13.4 State-of-the-Art Techniques and Tools for Efficient Network Resource Management in SDN Environments 327
 13.5 Performance of the Existing Techniques and Tools with Use Case 329
 13.6 Conclusion and Future Scope 330
 References 331
 14 Vehicles Smoke Monitoring Using Internet of Things and Machine Learning 337
 Dhavakumar P. and Selvakumar Samuel
 14.1 Introduction 337
 14.2 Vehicle CO 2 Emissions 338
 14.2.1 Impacts of CO 2 Emissions 339
 14.3 Recommended Solutions with Internet of Things 340
 14.3.1 IoT System and CO 2 Sensors 340
 14.3.2 Benefits of the IoT System 342
 14.3.3 Air Quality Monitoring System (AQMS) 343
 14.4 ml Algorithms 346
 14.4.1 K-Means Algorithm (KM) 346
 14.4.2 Decision Tree Algorithm (DT) 347
 14.4.3 Naive Bayes Algorithm (NB) 347
 14.4.4 Controlling Carbon Unlimited Flow Operation with Machine Learning Approach (CULTML) 347
 14.5 Proposed System Architectures and Designs 348
 14.5.1 Vehicular Unit 349
 14.5.2 Software Unit 350
 14.5.3 Road Transport Office (RTO) Unit 351
 14.6 Logical Design of the Proposed System 352
 14.6.1 Summation Detector Using Artificial Intelligence 352
 14.6.2 Digit Recognition 352
 14.7 Experimental Results 354
 14.8 Physical Design of the Proposed System 356
 14.9 Conclusion 357
 References 357
 15 Enhancing Home Security through IoT Innovation: Recommendations for Biometric Door Lock System to Deter Break-Ins 359
 Muhammad Ehsan Rana, Kamalanathan Shanmugam, Lim Enya and Hrudaya Kumar Tripathy
 15.1 Introduction 360
 15.2 Literature Review 361
 15.2.1 Home Security Concerns in Malaysia 362
 15.2.2 Introduction to Biometric Solutions 363
 15.2.3 Enhancing Biometrics with Machine Learning 364
 15.2.4 Biometrics in the Realm of Smart Home Security 365
 15.2.5 Review of Existing Commercial Systems 367
 15.2.5.1 Samsung Smart Door Lock 367
 15.2.5.2 Philips EasyKey 369
 15.2.5.3 Comparison of Systems 371
 15.3 Recommendations for the Implementation of the Proposed Biometric Door Lock System 372
 15.3.1 Software Requirements 373
 15.3.2 Key Hardware Requirements 374
 15.3.2.1 Arduino Nano 374
 15.3.2.2 DFRobot HuskyLens 375
 15.3.2.3 DFRobot UART Fingerprint Scanner 375
 15.3.2.4 Five-Volt Single-Channel Relay Module 376
 15.3.2.5 12VDC Solenoid Lock 376
 15.3.3 Workflow of the Proposed System 376
 15.3.4 Key Features of the Proposed System 378
 15.3.5 Testing the Biometric Door Lock System 380
 15.3.5.1 Fingerprint Authentication Test 380
 15.3.5.2 Facial Recognition Test 381
 15.3.5.3 Dual Authentication Test 382
 15.3.5.4 Access Log Test 384
 15.3.5.5 Mobile Application Integration Test 385
 15.3.5.6 Scalability Test 386
 15.3.5.7 Accuracy Result Analysis 387
 15.4 Conclusion and Future Recommendations 389
 References 390
 Index 393