Reshaping Intelligent Business and Industry Convergence of AI and IoT at the Cutting Edge
The convergence of Artif icial Intelligence (AI) and Internet of Things (IoT) is reshaping the way industries, businesses, and economies function; the 34 chapters in this collection show how the full potential of these technologies is being enabled to create intelligent machines that simulate smart...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ :
Wiley
[2024]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009852332106719 |
Tabla de Contenidos:
- Cover
- Series Page
- Title Page
- Copyright Page
- Dedication Page
- Contents
- List of Figures
- List of Tables
- Foreword
- Preface
- Acknowledgments
- Acronyms
- Part I: Artificial Intelligence Applications
- Chapter 1 Artificial Intelligence Overview: Architecture, Applications and Challenges
- 1.1 Introduction
- 1.1.1 History of Artificial Intelligence
- 1.1.2 Components of Artificial Intelligence
- 1.1.3 Levels of Artificial Intelligence
- 1.2 Artificial Intelligence Agents
- 1.3 Artificial Intelligence Algorithms
- 1.4 Applications of Artificial Intelligence
- 1.4.1 Agriculture
- 1.4.2 Healthcare
- 1.4.3 Education
- 1.4.4 Banking
- 1.4.5 Opportunities and Challenges
- 1.5 Conclusion
- References
- Chapter 2 Video Analytics Using Deep Learning Models
- 2.1 Introduction
- 2.1.1 Artificial Intelligence
- 2.1.2 Deep Learning Overview and Evolution
- 2.1.3 Edge Computing
- 2.1.4 Cloud Computing
- 2.2 Video Analytics
- 2.2.1 Video Surveillance
- 2.2.2 Real-Time Video Mining and Video Monitoring
- 2.2.3 Video Analytics Functional Model
- 2.3 Object Detection and Object Tracking
- 2.3.1 Object Detection
- 2.3.2 Object Tracking
- 2.3.3 Role of Deep Learning in Object Tracking
- 2.3.4 Functional Model
- 2.4 Industrial Application
- 2.4.1 Healthcare
- 2.4.2 Smart City
- 2.4.3 Connected Home
- 2.4.4 Security
- 2.4.5 Sports
- 2.5 Conclusion
- References
- Chapter 3 Optimizing Search Engine for Enhancing Computing and Communication in Real-Time Systems
- 3.1 Introduction
- 3.1.1 Existing System
- 3.1.2 Problem Definition
- 3.1.3 Feasibility Study
- 3.1.4 Experimental Work
- 3.2 Literature Review
- 3.3 Requirement Specification
- 3.3.1 Search Engine Optimization
- 3.3.2 Web Analytics
- 3.3.3 Web Architecture Diagram
- 3.4 Testing and Validation
- 3.4.1 SEO Testing.
- 3.4.2 Google Analytics Testing
- 3.4.3 Structured Data Testing
- 3.4.4 SEO Implementation
- 3.4.5 Google Analytics Implementation
- 3.4.6 Google Data Studio Implementation
- 3.4.7 Tableau Implementation
- 3.5 Result
- 3.6 Conclusion and Future Work
- References
- Chapter 4 The Need for XAI: Challenges and Its Applications
- 4.1 Introduction
- 4.2 Literature Review
- 4.3 The Need for Exploring XAI
- 4.3.1 Explain to Justify
- 4.3.2 Explain to Control
- 4.3.3 Explain to Improve
- 4.3.4 Explain to Discover
- 4.3.5 Challenges in XAI
- 4.4 Scope of Explanation
- 4.4.1 Local Explanation
- 4.4.2 Global Explanations
- 4.5 Differences in Research Methodology
- 4.5.1 Perturbation Based
- 4.5.2 Backpropagation- or Gradient-Based
- 4.5.3 XAI Applications
- 4.6 Conclusion
- References
- Chapter 5 Why Law Firms Need to Embrace Artificial Intelligence to Transform the Indian Legal Industry
- 5.1 Introduction
- 5.1.1 Research Methodology
- 5.1.2 Research Objectives
- 5.2 What Is Artificial Intelligence?
- 5.2.1 Modernization and Delivery of Legal Services
- 5.2.2 AI Technology for Use in Law Firms
- 5.3 The Law and Policy Relating to AI in India
- 5.3.1 Threats that AI Could Pose in India
- 5.3.2 National Data Protection Law
- 5.3.3 Discrimination Law
- 5.3.4 Competition Law
- 5.3.5 Consumer Protection Law
- 5.4 The Morality Debate: The Ethicality of AI in Law
- 5.4.1 Equal Treatment and Non-Discrimination
- 5.4.2 Transparency
- 5.4.3 Accountability in Decision-Making
- 5.5 Conclusion
- References
- Chapter 6 A Comparative Study of Supervised and Unsupervised Machine Learning Algorithms for Predictive Analytics
- 6.1 Introduction
- 6.2 Predictive Analytics
- 6.3 Machine Learning
- 6.3.1 Supervised Machine Learning
- 6.3.2 Unsupervised Learning
- 6.3.3 Supervised vs. Unsupervised Machine Learning Algorithms.
- 6.4 Applications of Supervised and Unsupervised Learning
- 6.5 Conclusion
- References
- Chapter 7 Machine Learning Approach for Predicting the Price of Used Cars
- 7.1 Introduction
- 7.2 Related Work
- 7.3 Research Methodology
- 7.3.1 Dataset Collection
- 7.3.2 Data Preprocessing
- 7.3.3 Data Analysis
- 7.4 Model Description
- 7.5 Conclusion
- References
- PART II: INTERNET OF THINGS APPLICATIONS
- Chapter 8 Recent Industry-Defined and Domain-Specific IoT Architectures
- 8.1 Introduction
- 8.2 Literature Review
- 8.3 Benefits and Major Components of IoT
- 8.3.1 Benefits of IoT
- 8.3.2 Major Components of IoT
- 8.4 IoT Implementation and Building Blocks
- 8.4.1 Various Requirements for IoT Implementation
- 8.4.2 IoT Building Blocks
- 8.5 IoT Architecture
- 8.5.1 Layered Architectures
- 8.5.2 Domain-Specific IoT Architecture
- 8.5.3 Industry-Defined Architectures
- 8.6 Conclusion
- References
- Chapter 9 IoT Devices
- 9.1 Introduction
- 9.1.1 What is IoT?
- 9.1.2 History of IoT
- 9.1.3 Realizing the Concept
- 9.1.4 IoT Takes Off
- 9.1.5 Future of Internet of Things
- 9.2 Application of IoT
- 9.2.1 Transportation
- 9.2.2 Environmental Monitoring
- 9.2.3 Infrastructure Management
- 9.2.4 Medical and Healthcare Management
- 9.2.5 Home Automation
- 9.2.6 Energy Management
- 9.2.7 Agriculture
- 9.2.8 Water Supply
- 9.3 IoT Devices
- 9.3.1 Introduction of IoT Devices
- 9.3.2 Devices
- 9.4 Conclusion
- References
- Chapter 10 IoT Securities: Applications, Security Issues and Solutions Using Diverse Technologies
- 10.1 Introduction
- 10.2 Related Work
- 10.3 Overview of Internet of Things (IoT)
- 10.3.1 Application Areas in IoT Demanding Crucial Security
- 10.3.2 Security Attacks in Internet of Things
- 10.4 Security Issues Addressed Using Diverse Technologies.
- 10.4.1 Security Issues Addressed Using Machine Learning
- 10.4.2 Security Issues Addressed Using Artificial Intelligence
- 10.4.3 Security Issues Addressed Using Blockchain Technology
- 10.5 Open Challenges and Future Research Directions
- 10.5.1 Resource Limitations
- 10.5.2 Heterogeneous Devices
- 10.5.3 Interoperability of Security Protocols
- 10.5.4 Single Points of Failure
- 10.5.5 Hardware/Firmware Vulnerabilities
- 10.5.6 Trusted Updates and Management
- 10.5.7 Blockchain Vulnerabilities
- 10.6 Conclusion
- References
- Chapter 11 FAMoS: Smart Farm Automatic Monitoring System
- 11.1 Introduction
- 11.2 Related Work
- 11.3 Methodologies Proposed
- 11.4 Software Elements
- 11.4.1 Machine Learning Algorithms with Dataset Prediction
- 11.4.2 Design
- 11.4.3 Features and Technologies
- 11.5 Project Cost Estimation
- 11.5.1 Unique Selling Point
- 11.5.2 SWOT
- 11.5.3 STP
- 11.6 Conclusion
- References
- Chapter 12 IoT-Based Module to Control Electronic Devices Through Wi-Fi and Bluetooth
- 12.1 Introduction
- 12.2 Literature Review
- 12.3 Proposed Wi-Fi Communication Module
- 12.3.1 Remotely Access IoT-Based Smart Home Appliances via Wi-Fi
- 12.3.2 Remotely Access IoT-Based Smart Home Appliances via Bluetooth
- 12.4 IR (Infrared) Remote and Arduino Nano
- 12.5 Conclusion
- References
- Chapter 13 An Insight into the IoT Building Blocks: Architecture, Framework, Principles, Applications and Challenges
- 13.1 Introduction
- 13.2 Related Work
- 13.3 Traditional and New Architecture of IoT
- 13.3.1 Traditional Architecture of IoT
- 13.3.2 New Architecture of IoT
- 13.4 Design Principles and Decision Framework of IoT
- 13.4.1 Design Principles of IoT
- 13.4.2 Decision Framework
- 13.5 Applications and Challenges
- 13.5.1 Applications
- 13.5.2 Challenges
- 13.6 Conclusion
- References.
- Chapter 14 Interoperability: A Conceptual Framework
- 14.1 Introduction
- 14.2 Inclusions in IoT Network
- 14.3 IoT Interoperability Protocols
- 14.3.1 IoT Data Protocols
- 14.3.2 IoT Network Protocols
- 14.4 Interoperability Conceptual Framework Proposed
- 14.4.1 IoT Deployment Architecture
- 14.4.2 Understanding Interoperability Model
- 14.4.3 Novel IoT Interoperability Scheme
- 14.5 Conclusion
- References
- Chapter 15 Securing IoT Devices Against MITM and DoS Attacks: An Analysis
- 15.1 Introduction
- 15.2 Architecture of IoT
- 15.3 Attacks on IoT
- 15.3.1 MITM Attacks in IoT
- 15.3.2 DoS Attacks in IoT
- 15.3.3 MITM Targets an IoT Network
- 15.3.4 DoS Targets an IoT Network
- 15.4 Some Possible Solutions to Avoid/Prevent Cyberattacks
- 15.5 Conclusions
- References
- PART III: ARTIFICIAL INTELLIGENCE OF THINGS: SMART CITY AND SOCIAL APPLICATIONS
- Chapter 16 AIoT-Based Smart Cities
- 16.1 What Are Smart Cities?
- 16.2 Internet of Things
- 16.2.1 Applications of IoT
- 16.2.2 Why is IoT on the Rise Today?
- 16.3 Introduction to Artificial Intelligence
- 16.3.1 Types of Artificial Intelligence
- 16.3.2 Why is AI Harmful?
- 16.3.3 Why is AI Useful?
- 16.3.4 Pros and Cons of Artificial Intelligence
- 16.4 AIoT in Smart Cities
- 16.5 Conclusion
- References
- Chapter 17 Integrating Artificial Intelligence and IoT for Smart Cities: Applications and Challenges
- 17.1 Introduction
- 17.2 Overview of Smart Cities
- 17.3 AIoT in Smart Cities
- 17.3.1 Smart Healthcare
- 17.3.2 Smart Education
- 17.3.3 Smart Energy
- 17.3.4 Smart Homes
- 17.3.5 Smart Agriculture
- 17.3.6 Smart Transport
- 17.3.7 Smart City Services
- 17.4 Open Issues and Challenges
- 17.5 Conclusion
- References
- Chapter 18 A Comprehensive Review of the Convergence of Blockchain, AI and IoT for Improving Social Interactions.
- 18.1 Introduction.