Artificial Intelligence of Things (AIoT) Current and Future Trends

Artificial Intelligence of Things (AIoT): Current and Future Trends brings together researchers and developers from a wide range of domains to share ideas on how to implement technical advances, create application areas for intelligent systems, and how to develop new services and smart devices conne...

Descripción completa

Detalles Bibliográficos
Otros Autores: Al-Turjman, Fadi, editor (editor), Altinay, Fahriye, editor, Gazi, Zehra Altinay, editor
Formato: Libro electrónico
Idioma:Inglés
Publicado: Cambridge, MA : Elsevier Inc [2025]
Edición:First edition
Colección:Advanced studies in complex systems.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009849139406719
Tabla de Contenidos:
  • Front Cover
  • Artificial Intelligence of Things (AIoT)
  • Copyright Page
  • Dedication
  • Contents
  • List of contributors
  • About the editors
  • I. AIoT in everything
  • 1 Current developments and trends in video surveillance
  • 1.1 Introduction
  • 1.2 Related studies
  • 1.2.1 The summary of the findings
  • 1.2.1.1 Improvements in the video surveillance system to our well-being
  • 1.2.1.2 The technical challenges of video surveillance and applications
  • 1.2.1.3 The improvement of neural networks in video surveillance systems
  • 1.3 Result and discussion
  • 1.4 Conclusion and recommendation
  • References
  • 2 Application of artificial intelligence in mobile networks: a survey
  • 2.1 Introduction
  • 2.2 Trends of mobile networks
  • 2.3 Mobile network issues
  • 2.3.1 Planning process issues
  • 2.3.2 Maintenance issues
  • 2.4 Motivations for AI-enabled mobile network
  • 2.5 Possibilities of using AI technology to operate mobile networks
  • 2.5.1 The PHY and MAC layers using AI
  • 2.5.1.1 Prediction and channel estimation
  • 2.5.1.2 Processing of reception
  • 2.5.1.3 Decoding a channel
  • 2.5.2 Applying AI to planning and maintenance process
  • 2.5.2.1 Planning process
  • 2.5.2.2 Maintenance process
  • 2.6 Solutions to challenges of AI mobile networks
  • 2.7 Expected development/deployment
  • 2.8 Conclusion
  • Acknowledgment
  • References
  • 3 Metaverse technology in education: an enhancement for the future
  • 3.1 Introduction
  • 3.2 Application of metaverse in education
  • 3.2.1 Augmented reality usage in education
  • 3.2.2 Virtual reality usage in education
  • 3.2.3 Lifelogging usage in education
  • 3.2.4 Mirrow world usage in education
  • 3.3 How does metaverse change education?
  • 3.4 Potential application usage of the metaverse in the education
  • 3.5 Challenges of metaverse in education
  • 3.5.1 Technology challenges.
  • 3.5.2 Addiction challenge
  • 3.5.3 Privacy and security challenge
  • 3.5.4 Ethics and morality challenge
  • 3.6 Conclusion
  • References
  • 4 Web-based brain tumor classification app using convolutional neural network
  • 4.1 Introduction
  • 4.2 Methodology
  • 4.2.1 Data collection
  • 4.2.2 Data augmentation
  • 4.2.3 Splitting
  • 4.2.4 Training settings
  • 4.2.4.1 CNN network architecture
  • 4.2.5 Performance
  • 4.2.6 Hardware and software requirements
  • 4.3 Results
  • 4.3.1 Confusion matrix
  • 4.3.2 Performance metric of model
  • 4.4 Conclusion
  • Acknowledgments
  • References
  • 5 Traffic management system using different Internet of Things devices: literature review
  • 5.1 Introduction
  • 5.1.1 Selecting a template
  • 5.1.2 Types of implementation methods
  • 5.1.2.1 Radio frequency identification
  • 5.1.2.1.1 RFID controller
  • 5.1.2.1.2 RFID tag
  • 5.1.2.1.3 Applications for RFID sensor
  • 5.1.2.2 Analysis of video data
  • 5.1.2.2.1 Problems with video analysis include
  • 5.1.2.3 Wireless sensor network
  • 5.1.2.4 The IR sensor
  • 5.1.2.4.1 Sensor types
  • 5.2 Method of evaluation
  • 5.2.1 IoT device communication and addressing
  • 5.2.2 IoT device security (physical and virtual)
  • 5.3 Results and discussion
  • 5.4 Conclusion
  • References
  • 6 Wireless sensor networks DV-Hop positioning based on artificial intelligence in the IoT era
  • 6.1 Introduction
  • 6.2 Related work
  • 6.3 Methodology
  • 6.4 Results
  • 6.5 Conclusion
  • References
  • 7 Cassava leave disease image classification based on deep convolutional neural network
  • 7.1 Introduction
  • 7.1.1 Objective of the research
  • 7.1.2 Problem of the research
  • 7.2 Work related
  • 7.3 Methodology
  • 7.3.1 Collection of data
  • 7.3.2 Preprocessing and cleaning
  • 7.3.2.1Data split ratio and augmentation
  • 7.4 Results
  • 7.4.1 Matrix of confusion and comparative analysis
  • 7.5 Conclusion.
  • References
  • 8 Cybersecurity using artificial intelligence
  • 8.1 Introduction
  • 8.1.1 Background
  • 8.2 Problems with strategy
  • 8.2.1 Technical challenges
  • 8.2.2 Some nontechnical challenges
  • 8.2.3 Some nontechnical challenges
  • 8.2.4 Needs to make a good trade-off
  • 8.3 Assessment
  • 8.4 Conclusions
  • References
  • Further reading
  • 9 Transformers in wildfire detection
  • 9.1 Introduction
  • 9.1.1 Related works
  • 9.1.1.1 Transformers applications
  • 9.1.1.1.1 Self-attention for object detection
  • 9.1.1.1.2 Self-attention for visual representations
  • 9.1.1.1.3 Pretraining and self-training
  • 9.1.1.2 Machine learning classification
  • 9.2 Methodology
  • 9.2.1 Study design
  • 9.2.2 The model
  • 9.2.3 Feature extraction
  • 9.2.4 Feature selection
  • 9.2.5 Data acquisition
  • 9.2.5.1 Encoder-decoder
  • 9.2.6 Method
  • 9.2.7 Detection transformer architecture
  • 9.3 Results
  • 9.4 Conclusion
  • References
  • 10 Distributed mobile cloud computing services and the internet of things
  • 10.1 Introduction
  • 10.1.1 Motivation
  • 10.1.2 Objectives
  • 10.1.3 Scope and organization
  • 10.2 Amount of previously published work
  • 10.2.1 Internet of Things research
  • 10.2.2 Distributed mobile cloud computing research
  • 10.2.3 Overall assessment
  • 10.3 Internet of things and distributed mobile cloud computing services
  • 10.3.1 Experimental setup
  • 10.3.1.1 Hardware components
  • 10.3.1.2 Software components
  • 10.3.1.3 Network infrastructure
  • 10.4 Distributed mobile cloud computing and the internet of things
  • 10.4.1 Literature review
  • 10.4.2 Experimental design
  • 10.4.3 Implementation
  • 10.4.4 Data collection and analysis
  • 10.4.5 Discussion
  • 10.5 Results and discussion follow
  • 10.5.1 Performance evaluation metrics
  • 10.5.1.1 Latency
  • 10.5.1.2 Energy consumption
  • 10.5.1.3 Computational speed
  • 10.5.1.4 Data transfer rate.
  • 10.5.2 Experimental results
  • 10.5.2.1 Latency evaluation
  • 10.5.2.2 Energy consumption analysis
  • 10.5.2.3 Computational speed assessment
  • 10.5.2.4 Data transfer rate examination
  • 10.5.3 Discussion of results
  • 10.5.3.1 Enhanced connectivity
  • 10.5.3.2 Energy efficiency
  • 10.5.3.3 Scalability and flexibility
  • 10.5.3.4 Trade-offs and challenges
  • 10.5.4 Comparative analysis
  • 10.5.5 Limitations and future directions
  • 10.6 Conclusion
  • Reference
  • 11 Internet of Things and mobile cloud computing service models
  • 11.1 Introduction
  • 11.2 The importance of the Internet of Things and mobile cloud computing
  • 11.2.1 Mobile cloud computing
  • 11.2.2 Internet of Things
  • 11.3 How do service models work?
  • 11.3.1 There are several commonly recognized service models in cloud computing
  • 11.3.1.1 Infrastructure as a service
  • 11.3.1.2 Platform as a service
  • 11.3.1.3 Software as a service
  • 11.4 Service models give consumers and service providers a level of abstraction and accountability
  • 11.5 Overview of the infrastructure as a service and platform as a service common service models for mobile cloud computing...
  • 11.5.1 Infrastructure as a service
  • 11.5.2 Platform as a service
  • 11.6 Explanation of infrastructure as a service in the context of mobile cloud computing and Internet of Things
  • 11.7 Virtualized computing resources are provided by cloud providers
  • 11.8 Examples: virtual machines, storage, and networking infrastructure
  • 11.8.1 Benefits: scalability, flexibility, and cost-effectiveness
  • 11.8.2 Platform as a service
  • 11.9 The following are some crucial features and advantages of platform as a service
  • 11.9.1 Use cases for infrastructure as a service and platform as a service in mobile cloud computing and Internet of Things
  • 11.9.2 Infrastructure as a service use cases.
  • 11.9.3 Platform as a service use cases
  • 11.10 Considerations for choosing service models
  • 11.11 Conclusion
  • Reference
  • II. AIoT in societal research and development
  • 12 Beyond smart networking
  • 12.1 Introduction
  • 12.2 The purpose of networking and beyond
  • 12.3 Benefits of networking and beyond
  • 12.3.1 Access to new opportunities
  • 12.3.2 Personal and professional growth
  • 12.3.3 Better communication and social skills
  • 12.3.4 More visibility and credibility
  • 12.3.5 Positive effects on society
  • 12.4 Different kinds of networking
  • 12.4.1 Networking in person
  • 12.4.2 Online networking
  • 12.4.3 Professional networking organizations
  • 12.4.4 Informal networking
  • 12.4.5 Networking through social media
  • 12.5 The 3P's of networking
  • 12.5.1 Presence
  • 12.5.2 Professionalism
  • 12.5.3 Be persistent
  • 12.6 Four important steps to making networking work well
  • 12.6.1 Figure out what you want
  • 12.6.2 Build your network
  • 12.6.3 Get involved and talk to people
  • 12.6.4 Keep and grow your network
  • 12.7 Several things that make up a network
  • 12.7.1 Interdependence
  • 12.7.2 Connectivity
  • 12.7.3 Diversity
  • 12.7.4 Trust
  • 12.7.5 Influence
  • 12.7.6 Emergence
  • 12.7.7 Resilience
  • 12.8 Some tips for building strong networking skills
  • 12.8.1 Write down your goals and objectives
  • 12.8.2 Build your network
  • 12.8.3 Get involved and talk to people
  • 12.8.4 Work on your communication skills
  • 12.8.5 Build your personal brand
  • 12.8.6 Stay up to date
  • 12.9 How to develop your networking and beyond?
  • 12.9.1 Confidence
  • 12.9.2 Openness
  • 12.9.3 Empathy
  • 12.9.4 Being proactive is important for networking
  • 12.9.5 Gratitude
  • 12.10 What is a synonym for networking?
  • 12.11 Extent of past work of networking and beyond
  • 12.12 Materials and method of networking and beyond.
  • 12.13 The results of networking and what comes next.