Internet of Things in Modern Computing Theory and Applications

"The text focuses on the theory, design, and implementation of the Internet of Things in a modern communication system. It will be useful to senior undergraduate, graduate students, and researchers in diverse fields domains including electrical engineering, electronics and communications engine...

Descripción completa

Detalles Bibliográficos
Otros Autores: Chowdary, Vinay, editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press [2024]
Edición:First edition
Colección:Smart Technologies for Engineers and Scientists Series
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009809021706719
Tabla de Contenidos:
  • Cover
  • Half Title
  • Series Page
  • Title Page
  • Copyright Page
  • Table of Contents
  • Preface
  • Acknowledgments
  • Editors
  • Contributors
  • Chapter 1: IoT architecture and design
  • 1.1 Introduction
  • 1.1.1 Challenges: IoT architecture drivers
  • 1.1.2 Classical IoT architecture models
  • 1.1.2.1 oneM2M architecture
  • 1.1.2.2 IoT world forum reference model
  • 1.1.3 Emerging IoT architecture models
  • 1.1.4 Conclusion
  • References
  • Chapter 2: Application of Artificial Intelligence (AI) and the Internet of Things (IoT) in process industries toward Industry 4.0
  • 2.1 Introduction
  • 2.1.1 1st industrial revolution
  • 2.1.2 2nd industrial revolution
  • 2.1.3 3rd industrial revolution
  • 2.1.4 4th industrial revolution
  • 2.2 Industry 4.0
  • 2.2.1 Need for Industry 4.0
  • 2.2.2 The Significance of Industry 4.0
  • 2.2.3 Technologies of Industry 4.0
  • 2.2.4 Nine components that are bringing about the transformation to Industry 4.0
  • 2.2.4.1 Cloud computing
  • 2.2.4.2 Big data
  • 2.2.4.3 The Internet of Things
  • 2.2.4.4 Augmented reality
  • 2.2.4.5 System integration: horizontal and vertical system integration
  • 2.2.4.6 Cybersecurity
  • 2.2.4.7 Simulation
  • 2.2.4.8 Autonomous robot
  • 2.2.4.9 Additive manufacturing
  • 2.2.5 Issues and challenges faced by Industry 4.0
  • 2.3 Artificial intelligence
  • 2.3.1 Artificial Intelligence: a brief history
  • 2.3.2 Approach of Artificial Intelligence in Industry 4.0
  • 2.3.3 Key elements in Industrial AI
  • 2.3.4 Industrial AI ecosystem
  • 2.3.5 Limitations of industrial Artificial Intelligence
  • 2.4 Examples
  • 2.4.1 Automotive
  • 2.4.1.1 Description
  • 2.4.2 Food and beverage
  • 2.4.2.1 Description
  • 2.4.3 Medical equipment
  • 2.4.3.1 Description
  • 2.5 Conclusion
  • Acknowledgements
  • References.
  • Chapter 3: A review on edge computing: Working, comparisons, benefits, vision, instances and illustrations along with challenges
  • 3.1 Introduction
  • 3.2 Literature review
  • 3.3 The working of edge computing
  • 3.4 Comparison-edge computing, cloud computing and fog computing
  • 3.5 The benefits of edge computing
  • 3.6 Instances and illustrations of edge computing
  • 3.7 Edge maintenance
  • 3.8 Opportunities for 5G, IoT with edge computing
  • 3.9 Challenges of edge computing
  • 3.10 Conclusion
  • References
  • Chapter 4: Industrial Internet of Things: IoT and Industry 4.0
  • 4.1 Introduction
  • 4.2 Streamlined work
  • 4.3 Internet of Things
  • 4.4 The Industrial Internet of Things
  • 4.5 Industry 4.0
  • 4.6 Key technologies for the Industrial Internet of Things
  • 4.6.1 Blockchain technology
  • 4.6.2 Cloud computing
  • 4.6.3 Artificial intelligence and cyber physical systems
  • 4.7 Intelligent manufacturing in the context of Industry 4.0
  • 4.8 Open research issues
  • 4.9 Application domains
  • 4.9.1 Healthcare
  • 4.9.2 Smart cities
  • 4.9.3 Smart environments
  • 4.9.4 Industry
  • 4.10 Challenges
  • 4.11 Conclusion
  • References
  • Chapter 5: Denial of Service Attacks in the Internet of Things
  • 5.1 Introduction
  • 5.2 IoT architecture
  • 5.3 Categorization of security issues
  • 5.4 Security issues of the lower layers
  • 5.5 Security issues of the intermediate levels
  • 5.6 Security issues of the higher levels
  • 5.7 Mitigation strategies at various levels of IoT devices
  • 5.8 Distributed Denial of Service (DDoS) attack
  • 5.9 DDoS attack mitigation strategies
  • 5.10 Research gap
  • 5.11 Fuzzy-Neural Network-based cross-layer DoS attack detection framework
  • 5.12 Conclusion
  • 5.13 Future work
  • References.
  • Chapter 6: Extending the Unified Theory of Acceptance and use of technology model to understand the trainees' acceptance and usage of Internet of Things (IoT) by skill development course
  • 6.1 Introduction
  • 6.2 Theoretical background and hypothesis
  • 6.3 Performance expectancy
  • 6.4 Effort expectancy
  • 6.5 Social influence
  • 6.6 Computer self-efficacy
  • 6.7 Relative advantage
  • 6.8 Facilitating conditions
  • 6.9 Behavior intention and actual usage
  • 6.10 Research methodology
  • 6.11 Measurement
  • 6.12 Data analysis and research findings
  • 6.12.1 Descriptive analysis
  • 6.12.2 Measurement model
  • 6.12.3 Structural model
  • 6.13 Discussion and conclusion
  • References
  • Chapter 7: Intelligent approaches for disease detection and prevention
  • 7.1 Introduction
  • 7.2 Artificial intelligence, Internet of Things, and blockchain technology
  • 7.2.1 Artificial intelligence
  • 7.2.2 Machine learning
  • 7.2.3 Internet of Things
  • 7.2.4 Blockchain technology
  • 7.3 Detection, prevention and treatment of disease
  • 7.3.1 Diabetes mellitus
  • 7.3.2 Cardiovascular Disease (CVD)
  • 7.3.3 Chronic Kidney Disease (CKD)
  • 7.3.4 Coronavirus disease (COVID-19)
  • 7.4 Conclusion
  • References
  • Chapter 8: Interoperability in IoT-driven smart buildings: Employing Rule-based decision support systems
  • 8.1 Introduction: background and driving forces
  • 8.2 The necessity of decision support inbuilding energy subsystems
  • 8.3 Decision support model for BEMS
  • 8.4 Opportunities and challenges for BEMS interoperability
  • 8.5 Conclusion and future scope
  • References
  • Chapter 9: IoT-based parking system using Web-App
  • 9.1 Introduction
  • 9.2 Material and methods
  • 9.3 Result and discussion
  • 9.4 Conclusion
  • References
  • Chapter 10: A next-gen IoT-based semi-automatic mobile manipulator
  • 10.1 Introduction
  • 10.1.1 Classification of mobile robots.
  • 10.1.2 Mobile base robotic manipulator
  • 10.1.3 IoT-based robotic manipulator
  • 10.2 Design of the proposed semi-automatic robot manipulator
  • 10.3 Proposed model
  • 10.3.1 Denavit-Hartenberg parameters
  • 10.3.2 Frame Assignment for D-H Parameter Calculation
  • 10.4 Robot control
  • 10.4.1 Joint space control
  • 10.4.2 Task space control
  • 10.4.3 Robotic arm simulation using MATLAB GUI
  • 10.5 Hardware Implementation
  • 10.6 Conclusion and future scope
  • References
  • Chapter 11: Pest identification and classification using IoT enable technique
  • 11.1 Introduction
  • 11.2 Literature survey
  • 11.2.1 Related works
  • 11.2.2 Problem statement
  • 11.3 A novel deep learning framework for IoT-enabled pest identification and classification
  • 11.3.1 Proposed architecture and description
  • 11.3.2 IoT-enabled pest detection and smart agriculture
  • 11.4 Conclusion
  • References
  • Chapter 12: Framework for leveraging diagnostic and vehicle data with emphasis on automotive cybersecurity
  • 12.1 Introduction
  • 12.2 Framework
  • 12.3 Applications and features of the framework
  • 12.4 Conclusion
  • References
  • Chapter 13: An array of Fibonacci series-based wide-band printed antennas for IoT/5G applications
  • 13.1 Introduction
  • 13.2 Proposed single antenna
  • 13.2.1 Formation of the proposed geometry
  • 13.2.2 Depiction of single antenna
  • 13.2.3 Contour length and surface area computation
  • 13.2.4 Time domain analysis
  • 13.3 Proposed array
  • 13.3.1 Construction of power divider network
  • 13.3.2 Development of array
  • 13.3.3 Benefits of the Wilkinson power divider
  • 13.4 Results and discussion
  • 13.5 Conclusion
  • Acknowledgement
  • References
  • Chapter 14: Deep learning IoT platform for dental disease detection
  • 14.1 Introduction
  • 14.2 Literature survey
  • 14.3 Suggested design
  • 14.3.1 YOLO object detection interpretation.
  • 14.4 Overall network structure
  • 14.5 Results and discussion
  • 14.5.1 Performance measure
  • 14.5.2 IoU (Intersection Over Union)
  • 14.5.3 Precision and recall curve
  • 14.5.3.1 Analysis of bounding boxes using histogram
  • 14.5.3.2 Analysis of bounding boxes using different type pf graphs
  • 14.5.3.3 Metrics analysis
  • 14.6 Conclusion
  • References
  • Index.