Smart grid and Internet of Things : third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings /: third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings. (2020)
- Record Type:
- Book
- Title:
- Smart grid and Internet of Things : third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings /: third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings. (2020)
- Main Title:
- Smart grid and Internet of Things : third EAI International Conference, SGIoT 2019, TaiChung, Taiwan, December 5-6, 2019, Proceedings
- Other Titles:
- SGIoT 2019
- Further Information:
- Note: Der-Jiunn Deng, Ai-Chun Pang, Chun-Cheng Lin (eds.).
- Other Names:
- Deng, Der-Jiunn
Pang, Ai-Chun
Lin, Chun-Cheng
EAI International Conference on Smart Grid and Internet of Things, 3rd - Contents:
- Intro -- Preface -- Organization -- Contents -- Smart Grid and Internet of Things -- Flag-Assisted Early Release of RRC Scheme for Power Saving in NB-IoT System -- 1 Introduction -- 2 CP CIoT EPS Optimization -- 3 Flag-Assisted Early Release of RRC -- 4 The Analytical Model -- 4.1 Output Measures -- 4.2 Stationary Probabilities -- 4.3 State Holding Time -- 4.4 Validation -- 5 Performance Evaluation -- 6 Conclusion -- References -- DTMFTalk: A DTMF-Based Realization of IoT Remote Control for Smart Elderly Care -- 1 Introduction -- 2 The Software Architecture of DTMFTalk 2.1 Overview of the DTMFTalk Software Architecture -- 2.2 The Functionalities of the CDS -- 2.3 The Functionalities of the DHA -- 3 The Design and Implementation of the DTMF Key Extractor -- 3.1 The Operation of the DTMF Key Extractor -- 3.2 The Fast Fourier Transform for DTMF Signal Detection -- 3.3 Real Testbed Deployment -- 4 Conclusion -- References -- IoT Insider Attack -- Survey -- 1 Introduction -- 2 Survey on IoT Attacks -- 2.1 IoT Attack Taxonomy -- 2.2 IoT Routing Attacks -- 2.3 RFID Attacks -- 3 IoT Attacks and Future Research -- 4 Conclusion -- References Energy Management for Zones-Based Isolated DC Multi-microgrids -- 1 Introduction -- 2 System Description and Modeling -- 2.1 Zonal Multi-microgrids -- 2.2 Load Model -- 2.3 Energy Storage Modeling -- 2.4 Distributed Generation Models -- 2.5 Demand Response Program -- 3 Proposed Scheme -- 3.1 Microgrids Objective Function -- 3.2 DNO ObjectiveIntro -- Preface -- Organization -- Contents -- Smart Grid and Internet of Things -- Flag-Assisted Early Release of RRC Scheme for Power Saving in NB-IoT System -- 1 Introduction -- 2 CP CIoT EPS Optimization -- 3 Flag-Assisted Early Release of RRC -- 4 The Analytical Model -- 4.1 Output Measures -- 4.2 Stationary Probabilities -- 4.3 State Holding Time -- 4.4 Validation -- 5 Performance Evaluation -- 6 Conclusion -- References -- DTMFTalk: A DTMF-Based Realization of IoT Remote Control for Smart Elderly Care -- 1 Introduction -- 2 The Software Architecture of DTMFTalk 2.1 Overview of the DTMFTalk Software Architecture -- 2.2 The Functionalities of the CDS -- 2.3 The Functionalities of the DHA -- 3 The Design and Implementation of the DTMF Key Extractor -- 3.1 The Operation of the DTMF Key Extractor -- 3.2 The Fast Fourier Transform for DTMF Signal Detection -- 3.3 Real Testbed Deployment -- 4 Conclusion -- References -- IoT Insider Attack -- Survey -- 1 Introduction -- 2 Survey on IoT Attacks -- 2.1 IoT Attack Taxonomy -- 2.2 IoT Routing Attacks -- 2.3 RFID Attacks -- 3 IoT Attacks and Future Research -- 4 Conclusion -- References Energy Management for Zones-Based Isolated DC Multi-microgrids -- 1 Introduction -- 2 System Description and Modeling -- 2.1 Zonal Multi-microgrids -- 2.2 Load Model -- 2.3 Energy Storage Modeling -- 2.4 Distributed Generation Models -- 2.5 Demand Response Program -- 3 Proposed Scheme -- 3.1 Microgrids Objective Function -- 3.2 DNO Objective Function -- 4 Case Study Simulation -- 4.1 Step 1 -- 4.2 Step 2 -- 5 Conclusion -- References -- Mining Network Security Holes Based on Data Flow Analysis in Smart Grid -- 1 Introduction -- 2 Related Work -- 3 Preliminaries 3.1 Big Data Security Analysis Technology -- 3.2 Application and Platform of Big Data Security -- 4 System Model -- 5 System Design -- 5.1 System Design Based on Big Data Detection -- 5.2 Feature Extraction -- 6 Decision Tree Algorithm -- 7 Performance Evaluation -- 7.1 Analysis of Decision Tree Environment -- 7.2 Simulation Results -- 7.3 Performance Analysis -- 8 Conclusion and Feature Work -- References -- Architecture and Network Design for Industrial Internet of Things -- 1 Introduction -- 2 Architecture Model for Industrial Internet of Things 3 Network Design Model for Industrial Internet of Things -- 3.1 Comparison of Wireless Network Protocols -- 4 Results for Industrial Internet of Things Architecture Model -- 4.1 Testing -- 5 Conclusion -- References -- Applications and Technologies -- Power Prediction via Module Temperature for Solar Modules Under Soiling Conditions -- 1 Introduction -- 2 Hardware Setup -- 3 Data Analysis -- 3.1 Soiling and Module Cooling -- 3.2 Power Prediction via Module Temperature -- 4 Conclusion -- References -- Customized Attack Detection Under Power Industrial Control System -- 1 Introduction … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Copyright Date:
- 2020
- Extent:
- 1 online resource (141 pages)
- Subjects:
- 621.319
Smart power grids -- Congresses
Internet of things -- Congresses
Algorithms & data structures
Information technology: general issues
Computer security
Network hardware
Computers -- Information Theory
Computers -- Data Processing
Computers -- Security -- General
Computers -- Hardware -- Network Hardware
Smart power grids
Internet of things
Application software
Computer networks
Data protection
Data structures (Computer science)
Conference papers and proceedings
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783030496104
- Related ISBNs:
- 9783030496098
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.508782
- Ingest File:
- 04_029.xml