A Fusion of Artificial Intelligence and Internet of Things for Emerging Cyber Systems
- Length: 477 pages
- Edition: 1
- Language: English
- Publisher: Springer
- Publication Date: 2021-08-24
- ISBN-10: 3030766527
- ISBN-13: 9783030766528
- Sales Rank: #5428814 (See Top 100 Books)
This book aims at offering a unique collection of ideas and experiences mainly focusing on the main streams and merger of Artificial Intelligence (AI) and the Internet of Things (IoT) for a wide slice of the communication and networking community. In the era when the world is grappling with many unforeseen challenges, scientists and researchers are envisioning smart cyber systems that guarantee sustainable development for a better human life. The main contributors that destined to play a huge role in developing such systems, among others, are AI and IoT. While AI provides intelligence to machines and data by identifying patterns, developing predictions, and detecting anomalies, IoT performs as a nerve system by connecting a huge number of machines and capturing an enormous amount of data. AI-enabled IoT, therefore, redefines the way industries, businesses, and economies function with increased automation and efficiency and reduced human interaction and costs.
This book is an attempt to publish innovative ideas, emerging trends, implementation experience, and use-cases pertaining to the merger of AI and IoT. The primary market of this book is centered around students, researchers, academicians, industrialists, entrepreneurs, and professionals working in electrical/computer engineering, IT, telecom/electronic engineering, and related fields. The secondary market of this book is related to individuals working in the fields such as finance, management, mathematics, physics, environment, mechatronics, and the automation industry.
Contents 1 IoT for Better Mobile Health Applications 1.1 Introduction 1.2 Literature Survey 1.3 Integrating IoT with Mobile Health 1.3.1 Appointment Reminders 1.3.2 Telemedicine 1.3.3 Monitoring and Empowerment 1.4 A Proposed Model for Diabetes Self-management 1.5 Discussions 1.5.1 Feasibility of Implementation 1.5.2 Privacy and Confidentiality 1.6 Future Insights 1.7 Conclusions References 2 Energy Efficient Hybrid IoT System for Ambient Living 2.1 Introduction 2.1.1 What Is IoT? 2.1.2 History of IoT 2.1.3 Energy Efficiency Using IoT 2.2 IoT Protocols and Standards 2.2.1 IoT Protocols 2.2.2 Importance of Different IoT Protocols 2.3 IoT in Smart Living 2.3.1 Features of IoT Based Smart Living 2.3.2 IoT Based Smart Products for Ambient Living 2.4 State of the Art in IoT Technologies for Ambient Living 2.5 Future Direction for Ambient Assisted Living 2.5.1 Case Study: Smart Geysers 2.6 Conclusion References 3 Analysis of Agriculture Production and Impacts of Climate Change in South Asian Region: A Concern Related with Healthcare 4.0 Using ML and Sensors 3.1 Introduction 3.1.1 Problem Introduction 3.1.2 Key Areas of Our Concerns 3.2 Literature Survey and Related Previous Work 3.2.1 The Naïve Bayes 3.2.2 The Neural Network 3.2.3 Gist of Literature Survey 3.3 System Design and Methodology 3.3.1 System Design 3.3.2 System Architecture/Diagrammatical View 3.4 Implementation and Results 3.4.1 Software and Hardware Requirements 3.4.2 Assumptions and Dependencies 3.4.3 Implementation Details 3.5 Conclusion 3.5.1 Performance Evaluation 3.5.2 Future Directions and Limitations Appendix References 4 Block Chain Application in Automobile Registration: A Novel Approach for Sustainable Smart Cities with Industry 4.0 4.1 Introduction 4.1.1 Concept of Smart Cities 4.1.2 Problem of Car Registration and Motivation 4.1.3 5-G Technology and Its Implications 4.1.4 IoT and Its Applications in Transportation 4.1.5 Usage of AI, ML in IoT and Blockchain 4.2 Related Work 4.2.1 Carchain 4.2.2 Fabcar IBM Blockchain 4.2.3 Blockchain and Future of Automobiles 4.2.4 Significance of 5-G Technology 4.3 Presented Methodology 4.4 Software Requirement Specification 4.4.1 Product Perspective 4.4.2 System Interfaces 4.4.3 Interfaces (Hardware and Software and Communication) 4.4.4 Operations (Product Functions, User Characteristics) 4.4.5 Use Case, Sequence Diagram 4.4.6 System Design 4.5 Software and Hardware Requirements 4.5.1 Software Requirements 4.5.2 Hardware Requirements 4.6 Implementation Details 4.7 Results and Discussions 4.8 Novelty and Recommendations 4.9 Future Research Directions 4.10 Limitations 4.11 Conclusions References 5 Nonparametric Test for Change-Point Detection of IoT Time-Series Data 5.1 Introduction 5.2 Nonparametric Test for Absolutely Continuous Distribution Functions 5.3 Numerical Experiments 5.4 Results and Discussion 5.5 Conclusion References 6 Internet of Things (IoT) and Vocabulary Learning in the English Language 6.1 Introduction 6.2 Internet of Things (IoT) and Education 6.3 Survey of Literature 6.4 Significance of the Study 6.5 Research Objectives 6.6 Research Questions 6.7 Research Methodology 6.7.1 Sample and Sample Size of the Research Study 6.8 Discussion of the Study 6.8.1 Interactive Whiteboard 6.8.2 E-books 6.8.3 Tablets and Mobile Devices 6.8.4 Web-Recording 6.9 Conclusion References 7 Clustering Based Energy Load Analysis Model (CBELAM) in Wireless Sensor Networks 7.1 Introduction 7.2 Literature Survey 7.3 Research Methodology 7.3.1 Cluster-Based Energy Load Analysis Model 7.3.2 Energy Model 7.3.3 Load Analysis Model 7.4 Performance Analysis 7.5 Conclusion References 8 A Novel Implementation of Linux Based Android Platform for Client and Server 8.1 Introduction 8.2 Proposed Work 8.2.1 Assaulting and Anticipation Stage on the Android Cell Phone 8.2.2 Attack on Android Telephone Utilising Metasploit 8.3 Results 8.3.1 Performance Measures 8.3.2 Code Linux 8.4 Conclusion References 9 Recognizing Unusual Activity with the Deep Learning Perspective in Crowd Segment 9.1 Introduction 9.2 Background and Key Issues 9.2.1 Macroscopic Modeling 9.2.2 Microscopic Modeling 9.2.3 Tracking of Pedestrians in Video Sequences 9.3 Proposed Methodology 9.3.1 Control Flow Model 9.3.2 Area-Wise Approach 9.3.3 Active-Counter-Based-Approach 9.3.4 Model-Based-Approach 9.3.5 Direct-Approach 9.3.6 Indirect-Approach 9.3.7 Behavior-Label-Distribution Algorithm 9.4 Analysis and Result 9.4.1 Dataset Usage 9.4.2 Results of Abnormal Activity Detection 9.5 Conclusion and Future Enhancement 9.6 Future Work References 10 Implementation of Robust Privacy-Preserving Machine Learning with Intrusion Detection and Cybersecurity Protection Mechanism 10.1 Introduction 10.2 Literature Survey 10.2.1 Malware Deduction 10.2.2 Junk Code Insertion Attacks: 10.2.3 Feasibility Study 10.2.4 Technical Feasibility 10.2.5 Budgetary Feasibility 10.2.6 Operational Feasibility 10.2.7 Easy to Understand 10.2.8 Unflinching Quality 10.2.9 Security 10.3 Methodology 10.4 Conclusion References 11 An Optimal Hybrid Solution to Local and Global Facial Recognition Through Machine Learning 11.1 Introduction 11.1.1 Problem Statement 11.2 Literature Review 11.3 Face Recognition Techniques 11.4 Eigenfaces 11.5 Neural Networks 11.6 Geometrical Feature Matching 11.6.1 Fisher Faces 11.6.2 Template Matching 11.6.3 Morphable Model 11.7 Support Vector Machine (SVM) 11.7.1 Harris Corner 11.8 Speeded-Up Robust Features (SURF) 11.9 Independent Component Analysis (ICA) 11.10 Results 11.11 Experimental Results 11.12 Conclusion References 12 Machine Learning Based Online Handwritten Telugu Letters Recognition for Different Domains 12.1 Introduction 12.2 Methodology 12.2.1 Requirements 12.2.2 Data Investigation 12.2.3 Convolution Neural Network Algorithm 12.2.4 Data Pre-processing 12.2.5 Model Evaluation and Validation 12.3 Conclusion 12.3.1 Future Work References 13 Mutation Testing and Web Applications—A Test Driven Development Approach for Web Applications Built with Java Script 13.1 Introduction 13.2 Existing Work 13.3 Mutation Operators and Their Importance 13.3.1 Comprehensive Mutation Test Suite 13.4 Mutation Testing Tools 13.5 Results and Discussion 13.6 Conclusion 13.6.1 Future Enhancements References 14 Recommending Products Based on Visual Similarity Using Machine Learning 14.1 Introduction 14.2 Related Work 14.3 Visual Similarity Based Product Recommendation Using Machine Learning 14.4 Challenges 14.5 Research Directives 14.6 Conclusion References 15 AIIOT: Emerging IoT with AI Technologies 15.1 Introduction 15.1.1 Architecture of IoT 15.1.2 Network Layer 15.1.3 Service Layer 15.1.4 Interface Layer 15.2 Advantages of IoT 15.2.1 Efficiency of Decision Making 15.2.2 Good Maintenance or Predictive Maintenance 15.2.3 Timesaving 15.2.4 Analysation of Data 15.2.5 Safety and Security of a Manufacturing Plant 15.3 Challenges in IoT 15.4 Literature Review 15.5 Applications of IoT 15.5.1 Smart Governance 15.5.2 Smart Homes with IoT 15.5.3 Fastags with IoT 15.5.4 Connected Cars 15.5.5 Agricultural Drone 15.5.6 Smart Grid 15.5.7 IoT in Military Field 15.6 Intrusion Detection in IoT 15.7 Role of Artificial Intelligence in IoT 15.7.1 Artificial Intelligence in Industrial IoT 15.7.2 Increasing Operational Efficiency 15.7.3 Enhancing Risk Management 15.7.4 Voice Assistant 15.7.5 Cyber-Physical System 15.7.6 Artificial Intelligence and IoT CPS 15.7.7 Cognitive AI and IoT CPS System 15.8 AI Using IoT Devices for Security Additions 15.8.1 Network-Based Solution 15.8.2 Device-Based Solution 15.9 Conclusion 15.10 Future Work References 16 Smart HR Competencies and Their Applications in Industry 4.0 16.1 Introduction 16.2 Smart HR 4.0 Advantages, Learnings and Transformations 16.2.1 Management Practices 16.2.2 Impact of Smart HR on the Industry 16.3 Smart HR for Growth and Development 16.4 Implementations and Scope of Research in Industry 4.0 16.4.1 Research Scope and Agendas 16.4.2 Implementations of Industry 4.0 16.5 Enhancement and Digitalization of HRM 16.6 Summary References 17 Ensuring Security of Digital Voting Through Blockchain Technology 17.1 Introduction 17.1.1 Blockchain Environment 17.2 Uses of Blockchain in Different Areas 17.3 Voting Through Blockchain Technology: Motivation 17.4 Implementation 17.4.1 Use-Cases and Requirements 17.4.2 Proposed Design 17.5 Conclusion References 18 A Study on Interaction Effect of Demographic Variables on Customer Satisfaction Towards Organized Retailing 18.1 Introduction 18.1.1 Demographic Variables and Customer Satisfaction 18.2 Review of Literature 18.2.1 Research Gap 18.2.2 Objectives of the Study 18.3 Research Methodology 18.3.1 Analysis and Interpretation of Results 18.3.2 Comparison of Customer Satisfaction Concerning Different Attributes of Organized Retail Marketing Based on Age 18.3.3 Homogeneous Subsets 18.3.4 Comparison of Customer Satisfaction Concerning Different Attributes of Organized Retail Marketing Based on Gender 18.3.5 Comparison of Customer Satisfaction Concerning Different Attributes of Organized Retail Marketing Based on Marital Status 18.3.6 Comparison of Customer Satisfaction Concerning Different Attributes of Organized Retail Marketing Based on Education Qualifications 18.3.7 Homogeneous Subsets 18.3.8 Comparison of Customer Satisfaction Concerning Different Attributes of Organized Retail Marketing Based on Occupation 18.3.9 Comparison of Customer Satisfaction Concerning Different Attributes of Organized Retail Marketing Based on Income 18.4 Conclusion References 19 Challenges in the Adaptation of IoT Technology 19.1 Overview of IoT 19.2 Major Challenges in IoT 19.2.1 Privacy 19.2.2 Security 19.2.3 Cost Factor 19.2.4 Interoperability 19.2.5 Bandwidth 19.2.6 Legal, Regulatory, and Rights 19.2.7 Emerging Economy and Development Issues 19.3 Applications and Services of IoT in Smart Environments 19.3.1 Real Time Data Circulation 19.3.2 Economical Infrastructure 19.3.3 Performance 19.3.4 Opportunities to New Industrial Model 19.4 Challenges of IoT with Respect to Various Smart Environments 19.4.1 Agronomy 19.4.2 Smart Healthcare 19.4.3 Smart Education 19.4.4 Smart Manufacturing 19.4.5 Smart Grid 19.4.6 Smart City 19.5 Blockchain as a Solution 19.6 COVID-19 and IoT 19.6.1 Telemedicine and IoT 19.6.2 E-commerce and IoT 19.6.3 Work from Home and IoT 19.6.4 Blockchain and IoT 19.7 Conclusion References 20 EEG Signals Based Choice Classification for Neuromarketing Applications 20.1 Introduction 20.2 EEG Signal Indices 20.2.1 Valence 20.2.2 Choice Index 20.2.3 Effort Index 20.2.4 AW Index 20.2.5 Task Engagement Index 20.3 Neuromarketing 20.3.1 Ethical Considerations in Neuromarketing 20.4 EEG Based Choice Detection System 20.4.1 The Cognitive Choice Correlations 20.5 Choice Classification Techniques 20.6 Forecasting Choice Features 20.6.1 Transient Behaviors as Features 20.6.2 P300 20.6.3 N200 20.6.4 N400 20.6.5 Brainwaves as Features 20.7 Conclusions and Future Recommendations References 21 A Study on Artificial Intelligence for Economic Renaissance in India 21.1 Introduction 21.1.1 State of Artificial Intelligence in the World 21.2 Literature Survey 21.2.1 AI Potentiality to Progress India 21.2.2 Universities 21.2.3 Startups 21.2.4 Large Companies 21.2.5 Policymakers 21.2.6 Multi-Stakeholders Partnerships 21.2.7 AI Adoption Policies in India 21.3 Methodology 21.3.1 Impact of Artificial Intelligence on the Indian Economy in Select Industries 21.3.2 Barriers to Adopt AI Technologies in India 21.3.3 Challenges for Adoption of AI Technologies in India 21.3.4 Way Out to Overcome Challenges 21.4 Conclusion References 22 A Review of Resource Allocation and Management Methods in IoT 22.1 Introduction 22.1.1 Motivation 22.1.2 Organization 22.2 Cloud, Fog and Edge Computing Systems 22.3 Resource Management in IoT Systems 22.3.1 Resource Allocation Approaches in IoT Systems 22.3.2 Comparison of Resource Allocation Approaches in IoT 22.4 Open Problems 22.5 Conclusion References 23 An Empirical Evaluation of Artificial Intelligence Algorithm for Hand Posture Classification 23.1 Introduction 23.2 Literature Review 23.3 Classifiers 23.3.1 Decision Tree 23.3.2 Discriminant Analysis 23.3.3 Support Vector Machine 23.3.4 K-Nearest Neighborhood 23.3.5 Ensemble 23.4 Dataset 23.5 Analysis and Results 23.6 Conclusion and Future Work References 24 Framework for Mid-Air Traffic Collision Detection Using Data Analytics 24.1 Introduction 24.1.1 Research Work Description 24.1.2 Research Significance 24.2 System Description 24.2.1 Data Acquisition 24.2.2 The Safety Toolkit 24.2.3 The Reporting 24.2.4 The Client/Pilot 24.3 Methodology 24.3.1 Developing the Proximity Algorithm 24.4 Results and Discussion 24.5 Conclusion and Future Works References
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.