Internet of Things: Energy, Industry, and Healthcare
- Length: 310 pages
- Edition: 1
- Language: English
- Publisher: CRC Press
- Publication Date: 2021-10-20
- ISBN-10: 036768652X
- ISBN-13: 9780367686529
- Sales Rank: #0 (See Top 100 Books)
Internet of things (IoT) is the connection and communication of physical objects (smart devices) over the internet. In this recent age, people’s daily lives are dependent on the internet through their smartphones, tablets, Smart TVs, micro-controllers, Smart Tags, computers, laptops, and cars to name a few. This book discusses different ways to create a better IoT network and/or IoT platforms to improve the efficiency and quality of these products and subsequently their users’ lives. In addition, this book provides future research directions in energy, industry, and healthcare, and explores the different applications of IoT and its associated technologies. It provides an overview and explanation of the software architecture, middleware, data processing and data management as well as security, sensors, actuators and algorithms used to create a working IoT platform. The editors then go on to examine IoT networks and platforms as they relate to energy industry including, energy efficiency and management, intelligent energy management, smart energy through blockchain and energy-efficient/aware routing/scheduling challenges and issues. They then explore IoT as it applies to healthcare including biomedical image and signal analysis and disease prediction and diagnosis. Finally the editors examine the prospects and applications of IoT for industry through the concepts of smart industry, including architecture, blockchain, and Industry 4.0. This book is intended for senior undergraduate and graduate students, researchers and industry professionals working on IoT applications and infrastructure.
Cover Half Title Title Page Copyright Page Contents Editor Biographies Contributors 1. VANET-Based Intelligent Traffic Light Control System by Detecting Congestion Using Fuzzy C-Means Clustering Technique in a Smart City 1.1 Introduction 1.2 Literature Review 1.3 Proposed Method 1.3.1 Parameter Extraction 1.3.2 Clustering Algorithm for Congestion Detection 1.3.3 LabVIEW for Traffic Light Operation 1.4 Model Description 1.5 System Implementation 1.5.1 Software Section 1.5.2 Hardware Section 1.6 Experimental Results and Observations 1.7 Conclusion References Appendix B 2. Internet of Things Advancements in Healthcare 2.1 Introduction to IoT in Healthcare 2.1.1 The Internet of Things and Healthcare 2.1.2 The Growth of the Internet of Things in a Changing Data Environment 2.1.3 IoT Analytics in Healthcare 2.1.4 Future Aspects of IoT in Healthcare 2.1.5 Telehealth and Self-Monitoring with Mobile Applications 2.2 Wearable Sensors and IoT applications in Healthcare 2.2.1 IoT Devices and Protocols 2.2.2 IoT Applications in Healthcare 2.2.3 IoT in Home Rehabilitation 2.3 Conclusion References 3. IoT-Based Artificial Intelligence System in Object Detection 3.1 Introduction 3.2 Proposed Methodology 3.2.1 Object Detection 3.2.2 Comparison of Static Techniques of Object Detection 3.3 Object Tracking 3.4 Experimental Analysis 3.5 Conclusion References 4. A Value Parity Combination-Based Scheme for Heartbeat Sounds Protection 4.1 Introduction 4.2 Related Works 4.2.1 Spatial Domain Audio Watermarking Methods 4.2.2 Transform Domain Audio Watermarking Methods 4.2.3 Multi-Resolutional Domain Audio Watermarking Methods 4.3 Proposed Approaches 4.3.1 Spatial Domain 4.3.2 Frequency Domain 4.3.2.1 The Discreet Cosine Transform (DCT) 4.3.2.2 Quantification Process 4.3.2.3 Integration Process 4.3.3 Multi-Resolution Domain 4.4 Experiments and Results 4.4.1 Performance Measurement Metrics 4.4.2 Application of Our Approaches in the Spatial Domain 4.4.3 Application of Our Approaches in the Frequency Domain 4.4.4 Application of Our Approaches in the Multi-Resolution Domain 4.4.5 Imperceptibility Tests 4.4.6 Robustness Test 4.5 Conclusion 4.6 Compliance with Ethical Standards References 5. Sentiment Analysis of Product Reviews Using IoT 5.1 Introduction 5.1.1 Sentiment Analysis 5.1.2 Sentiment Analysis Application 5.1.3 Different Levels of Analysis 5.1.4 Opinion 5.1.5 IoT 5.1.6 Machine Learning 5.1.7 IoT Using Machine learning 5.2 Related Work 5.3 Methodology 5.3.1 Dataset 5.3.2 IoT Device 5.3.2.1 Raspberry Pi (RPi) 5.3.3 Preprocessing of Reviews 5.3.4 Feature Extraction 5.3.5 Sentiment Analysis 5.3.6 Summary 5.4 Experiment and Results 5.5 Conclusion References 6. Saccadic Scan Path Predicting Using Convolutional Auto Encoders 6.1 Introduction 6.2 Related Works 6.3 Pre-requisites 6.3.1 Convolutional Auto-Encoder 6.4 Proposed Model 6.5 Experiment 6.6 Results and Conclusion References 7. Impact of IIOT in Future Industries: Opportunities and Challenges 7.1 Introduction 7.2 Research Efforts in Industrial IoT 7.3 Empowering Technologies for IIoT 7.3.1 Internet of Things 7.3.2 Blockchain Technology 7.3.3 Cloud Computing 7.3.4 Big Data Analytics 7.3.5 Cyber Physical Systems (CPS) and Artificial Intelligence (AI) 7.3.6 Augmented and Virtual Reality 7.4 Challenges 7.4.1 Efficient Management Procedure for Data 7.4.2 Heterogeneous IIoT Systems' Collaborations 7.4.3 Robust and Scalable Analytical Techniques for Big Data 7.4.4 Trust in Industrial IoT-Based Frameworks 7.4.5 Wireless Technology and Protocols Coexistence with IIoT 7.4.6 Enabling Decentralization on the Edge 7.4.7 Development of IoT-Specific Operating Systems 7.4.8 Public Safety in IIoT 7.5 Conclusion References 8. Privacy and Ethical Issues in Digitalization World 8.1 Introduction 8.2 Literature Review 8.3 Challenges in the Stream of Data Privacy 8.4 Ethical Issues in Data Privacy 8.5 Conclusion References 9. A Review on Smart Traffic Management System 9.1 Introduction 9.2 Decrease of traffic movement through the Smart signals 9.3 Role of IoT and Big data in traffic management 9.4 Advantages and disadvantages of Traffic Management System 9.4.1 Advantages 9.4.2 Disadvantages Compatibility 9.5 Literature review 9.6 Conclusion References 10. A Robust Context and Role-Based Dynamic Access Control for Distributed Healthcare Information Systems 10.1 Introduction 10.2 Related Works 10.2.1 Role-Based Access Control 10.2.1.1 State-of-the-Art in RBAC Model 10.2.1.2 Benefits of RBAC 10.2.2 Other Access Control Models 10.2.3 Role Hierarchy 10.2.3.1 Separation of Duty (SoD) 10.3 Research Methodology 10.3.1 Conceptual Design 10.3.1.1 Population of the Study 10.3.1.2 Sample Size of the Study 10.3.1.3 Sampling Technique 10.3.2 Data Collection Instruments 10.3.3 Validation of Data Collection Instruments 10.3.4 Data Collection Procedure 10.3.5 Procedure for Data Analysis 10.3.6 Setting Up the UATH Computing Environment 10.3.7 Systems Functional Requirement Analysis 10.3.7.1 Grouping of Users 10.3.7.2 User Definition 10.3.7.3 Role Definition 10.3.7.4 Permission Definition 10.3.7.5 Resource Definition 10.3.8 Analysis of Existing RBAC Models 10.3.9 Modification of Existing RBAC Models 10.3.10 System Architecture and the Technical Approach to System Design 10.3.10.1 Software Design Platform 10.4 System Design and Architecture 10.4.1 The Basic RBAC System Structure 10.4.2 Technical Approach to System Design 10.4.3 Code Architecture 10.4.3.1 Role-Based Security in .NET 10.4.3.2 The Authentication and Authorization Process Using Identity and Principal Objects 10.4.4 System Implementation 10.4.4.1 System Implementation Environment 10.4.4.2 Main Features of the Developed Software 10.5 Results and Discussion 10.5.1 System Testing 10.5.2 Database 10.5.3 Relationships Between the System User Database Tables 10.5.4 Infusing Purpose and Context into the System Design 10.5.5 Analysis of Hypotheses 10.5.6 Testing of Hypothesis 10.6 Conclusion References 11. Impact of ICT on Handicrafts Marketing in Delhi NCR Region 11.1 Introduction 11.2 Information and Communication Technologies (ICT) in Handicraft 11.3 Uses of Information Technology for Marketing 11.3.1 Advertising of Handicrafts products 11.4 Tools of Information Technology 11.5 Challenges for E-Tailing in Handicrafts Marketing 11.6 Conclusion References 12. Intelligent Amalgamation of Blockchain Technology with Industry 4.0 to Improve Security 12.1 Introduction 12.2 Historical Look Back of Industrial Revolution 12.2.1 Industry 1.0 12.2.2 Industry 2.0 12.2.3 Industry 3.0 12.2.4 Industry 4.0 12.3 Literature Review 12.4 Security Preferences for Industry 4.0 12.5 How Blockchain Caters Security to Support Industry 4.0 12.6 Conclusion References 13. Sensor Networks and Internet of Things in Agri-Food 13.1 Introduction 13.2 Summary 13.2.1 Component Level 13.2.1.1 Sensing Unit 13.2.1.2 Data Processing Unit 13.2.1.3 Communication Unit 13.2.1.4 Power Sources 13.2.2 System Level 13.2.3 Application Level 13.2.4 Design Issues and Challenges 13.2.4.1 Faults Tolerance and Adaptability 13.2.4.2 Network Topology Issue 13.2.4.3 Energy Consumption with Network Accuracy 13.2.4.4 Coverage Efficiency and Connectivity 13.2.4.5 Scalability in Architecture 13.2.4.6 Data Aggregation 13.2.4.7 Data Delivery Modes 13.2.4.8 Self-Configuration 13.2.4.9 Safety and Security 13.2.4.10 Quality of Service (QoS) 13.2.4.11 Hardware Constraints 13.2.4.12 Optimization for Robustness 13.2.4.13 Production Costs 13.2.5 Case Study: Sensor Networks and IoT in the Food Chain 13.2.5.1 Food Quality Assurance Through Smart Thermostats 13.2.5.2 Waspmote Devices in Food Production, Distribution, Supply, and Waste Management 13.2.5.3 Wireless Nodes in Granary Monitoring 13.2.5.4 Milk Production in Voshazhnikovo Farm Increased from 28 to 35 Liters Per Cow and Day Using IoT and Machine Learning 13.2.5.5 An IoT-based Agro-Tech Measurement System in Aragon, Spain References 14. Design and Development of Hybrid Algorithms to Improve Cyber Security and Provide Securing Data Using Image Steganography with Internet of Things 14.1 Outline 14.2 Literature Review 14.3 Comparison Study 14.4 Proposed Methodology 14.5 Conclusion References 15. Optimal Automatic Power Generation Using Modified Hybrid Soft Computing Techniques 15.1 Introduction 15.2 Modeling of Load Frequency Control System With and Without the Effect of Dead Band 15.2.1 Problem Formulation 15.3 Overview of Soft Computing Techniques 15.4 Overview and Solution Methodology Using Hybrid Statistical Tracked Particle Swarm Optimization (STPSO) 15.4.1 Overview of Hybrid STPSO 15.4.2 Computational Algorithm Using Hybrid STPSO Method 15.5 Implementation on Benchmark Functions 15.5.1 Performance Evaluation 15.6 Implementation on Proposed Automatic Generation Control Systems 15.6.1 Performance Evaluation 15.7 Conclusion 15.7.1 Guide Line for Future Work References 16. Steganography and Steganalysis Using Machine Learning 16.1 Introduction 16.2 Steganography 16.3 Steganalysis 16.4 Machine Learning 16.5 Steganalysis Tests 16.6 Conclusion References 17. Gender Detection Based on Machine Learning Using Convolutional Neural Networks 17.1 Introduction 17.1.1 Problem Statement 17.2 Literature Survey 17.3 Implementation and Design 17.3.1 Hardware Architecture and Block Diagram 17.3.2 Hardware Tools 17.3.2.1 Raspberry Pi 4 Board 17.3.3 Software Architecture and Algorithm 17.3.3.1 Installation Steps on Raspberry Pi Board 17.4 Simulation Results 17.5 Conclusion References 18. Smart Technologies and Social Impact: An Indian Perspective of Contactless Technologies for Pandemic 18.1 Introduction 18.2 Taxonomy of Technologies 18.2.1 The Internet of Things 18.2.2 Application of IoT in Different Scenarios of COVID 18.2.2.1 Quarantine Tracking 18.2.2.2 Pre-Screening 18.2.2.3 Disinfecting and Cleaning 18.2.2.4 Drone-Based Surveillance 18.2.2.5 In-Home Infection Reduction 18.2.3 Applications of Internet and Smart Technologies and Their Impact on Society 18.2.4 Impact of COVID-19 on IoT Applications 18.2.4.1 Remote Asset Access 18.2.4.2 Digital Twin 18.2.4.3 IoT Health Application Surge 18.2.4.4 Technologies Taking-Off 18.3 Smart Tracing Technologies 18.3.1 Contact Tracing Technologies (Figure 18.1) - Review 18.3.2 Popular Applications for Contact Tracing 18.3.3 Outcome of Contract Tracing Applications 18.3.4 Popular Applications Payment System and Impact 18.3.5 Popular Applications for Education and Impact 18.4 Analysis and Social Impact 18.4.1 Privacy Concern 18.4.2 User Adoption, Etc. 18.5 Conclusion References 19. Agriculture-Internet of Things (A-IoT): Key Roles in Addressing Some Challenges in Agriculture 19.1 Introduction 19.2 Background and Concept of IoT 19.3 IoT Architecture in Agriculture 19.4 IoT Application or Role in Agriculture 19.5 Examples of Apps of Internet of Things (IoT) Used in Agriculture 19.6 Conclusion References Index
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.