Amazon cover image
Image from Amazon.com

Internet of things (IoT) : technologies, applications, challenges and solutions / edited by B. K. Tripathy and J. Anuradha.

Contributor(s): Publication details: Boca Raton, [Florida] ; London, [England] ; New York : CRC Press, Taylor & Francis Group, c2018Description: xxiii, 334 pages : illustrations ; 26 cmISBN:
  • 9781138035003 (Hardback)
  • 9781351980296 (ebook)
Subject(s): Additional physical formats: Print version:: Internet of things (IoT) : technologies, applications, challenges and solutions.DDC classification:
  • 004.678 23
LOC classification:
  • TK5105.8857 .I57 2018
Contents:
1. IoT enabled vision system for Tint level detectionIntroductionLiterature SurveyOverview of the Proposed MethodologyImplementation DetailsResults and ConclusionsScope for future studiesAcknowledgementsReferences 2. Supervised and Semi-Supervised Identification of Users and Activities from Wearable Device Brain Signal RecordingsIntroductionReview of WearablesReview of Supervised Learning Semi-Supervised Learning with Genetic Algorithms and Rough Set Theory Study DataKnowledge RepresentationExperimental DesignClassification ResultsSemi-Supervised Evolutionary Learning Results ConclusionsReferences 3 Internet of Things and Artificial Intelligence: A new road to the future Digital worldIntroductionArtificial intelligenceIoT BasicsIoT and Artificial IntelligenceDeep Learning and its Role for IoT Proposed Methodology and Datasets usedExperimental Results and DiscussionConclusions and Future ScopeReferences 4 Technical and Societal Challenges: Exploit the Profound Impacts of IoTIntroductionStandards and InteroperabilitySecurityData Collection, Protection and PrivacySocio Ethical ConsiderationsScaleRadio Spectrum Other BarriersGreen IoTConclusionsReferences5. Evolution of Social IoT World: Security Issues and Research ChallengesIntroductionSocial Networking PopularityEvolution of IoT and TechnologiesOn Emergence of Social IoT Security Issues and Research Challenges Conclusion References 6. User Authentication: Keystroke Dynamics with Soft Biometric FeaturesIntroductionRelated WorksKeystroke DynamicsEvaluation of Behavioural Biometric TechniquesBenchmark Soft Biometric Datasets on Keystroke DynamicsProposed MethodologyExperimental ResultsDiscussionsConclusionsReferences 7: Internet of Nano-Things Forensics: Performing Digital Forensics in Nanoscale SystemsIntroduction Background Internet of Nano-Things ForensicsIoNT Forensics Investigation ModelConclusions and Future DirectionsBibliography 8: Aspects of Ambient Assisted Living and its ApplicationsIntroduction Introduction to Ambient Assisted Living (AAL)Sensors and Devices for AALWearable Sensors for AALAAL ArchitectureAnalytics in Internet of ThingsStages of Transforming Raw Data into Meaningful AnalyticsCommon Healthcare Analytics Solutions and Their PitfallsAmbient Intelligence (Aml) for AALSoftware Engineering Approach for AAL SystemsCognitive AALApplications of AALConclusionsReferences 9: Naming Services in Internet of ThingsIntroductionName ServiceObject Naming Service (ONS)Efficient Naming, Addressing and Profile Services in Internet-of-Things Sensory EnvironmentsConclusionsReferences 10: Review on communication security issues in IoT medical devicesIntroductionBackgroundRecent Incidents in Medical Device SecurityTechnology used for Securing IoTSolutions and Recommendations ConclusionsReferences 11: IoT challenges: SecurityIntroductionLiterature ReviewHow Security Threats Affect the UsersSecurity Requirements for the Internet of Secure ThingsTowards the Secure Solutions The Domino Effect of IoT Safety Bottom-Up Approach for Ensuring Security Security Framework of the IoT Related to Perceptual Layer An Innovative Framework for IoT SecuritySecurity Authentication and Confirmation System Conclusions Future ScopeReferences12 Non physician Primary Health Care Workers: Making Wearable Computational Devices, Electronic Health Records Work for themIntroductionObjectiveProblems in Health Information System in the CountryProblems with Traditional EHR SoftwareElectronic Health Records: Challenges and Solution to the ChallengesBest Practices for Usage of Electronic Health RecordsConclusions and Future WorksReferences 13. Semantic Technologies for IoTIntroductionSemantic TechnologyExisting Standardizations in IoT SemanticsSemantic Web Rule Language (SWRL)SPARQL Case StudyConcluding RemarksReferences 14. Applications of IoT to address the solutions for children affected by Autism Spectrum Disorders (ASDs)IntroductionBackground & functionality of IoT solutionsStrategies for Use of IoT and Media-Based ToolsCurrent Developments &Applications of IoT technologiesWearable DevicesTracking DevicesHead Mounted Display Products - Google GlassIoT Apps for Children with ASDsBenefits of Using Assistive IoT Technologies to Support ASD ChildrenFuture ScopeConclusionsReferences
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Call number Copy number Status Date due Barcode Item holds
Book Book Ayesha Abed Library General Stacks Ayesha Abed Library General Stacks 004.678 INT (Browse shelf(Opens below)) 1 Available 3010034436
Total holds: 0

Includes bibliographical references and index.

1. IoT enabled vision system for Tint level detectionIntroductionLiterature SurveyOverview of the Proposed MethodologyImplementation DetailsResults and ConclusionsScope for future studiesAcknowledgementsReferences 2. Supervised and Semi-Supervised Identification of Users and Activities from Wearable Device Brain Signal RecordingsIntroductionReview of WearablesReview of Supervised Learning Semi-Supervised Learning with Genetic Algorithms and Rough Set Theory Study DataKnowledge RepresentationExperimental DesignClassification ResultsSemi-Supervised Evolutionary Learning Results ConclusionsReferences 3 Internet of Things and Artificial Intelligence: A new road to the future Digital worldIntroductionArtificial intelligenceIoT BasicsIoT and Artificial IntelligenceDeep Learning and its Role for IoT Proposed Methodology and Datasets usedExperimental Results and DiscussionConclusions and Future ScopeReferences 4 Technical and Societal Challenges: Exploit the Profound Impacts of IoTIntroductionStandards and InteroperabilitySecurityData Collection, Protection and PrivacySocio Ethical ConsiderationsScaleRadio Spectrum Other BarriersGreen IoTConclusionsReferences5. Evolution of Social IoT World: Security Issues and Research ChallengesIntroductionSocial Networking PopularityEvolution of IoT and TechnologiesOn Emergence of Social IoT Security Issues and Research Challenges Conclusion References 6. User Authentication: Keystroke Dynamics with Soft Biometric FeaturesIntroductionRelated WorksKeystroke DynamicsEvaluation of Behavioural Biometric TechniquesBenchmark Soft Biometric Datasets on Keystroke DynamicsProposed MethodologyExperimental ResultsDiscussionsConclusionsReferences 7: Internet of Nano-Things Forensics: Performing Digital Forensics in Nanoscale SystemsIntroduction Background Internet of Nano-Things ForensicsIoNT Forensics Investigation ModelConclusions and Future DirectionsBibliography 8: Aspects of Ambient Assisted Living and its ApplicationsIntroduction Introduction to Ambient Assisted Living (AAL)Sensors and Devices for AALWearable Sensors for AALAAL ArchitectureAnalytics in Internet of ThingsStages of Transforming Raw Data into Meaningful AnalyticsCommon Healthcare Analytics Solutions and Their PitfallsAmbient Intelligence (Aml) for AALSoftware Engineering Approach for AAL SystemsCognitive AALApplications of AALConclusionsReferences 9: Naming Services in Internet of ThingsIntroductionName ServiceObject Naming Service (ONS)Efficient Naming, Addressing and Profile Services in Internet-of-Things Sensory EnvironmentsConclusionsReferences 10: Review on communication security issues in IoT medical devicesIntroductionBackgroundRecent Incidents in Medical Device SecurityTechnology used for Securing IoTSolutions and Recommendations ConclusionsReferences 11: IoT challenges: SecurityIntroductionLiterature ReviewHow Security Threats Affect the UsersSecurity Requirements for the Internet of Secure ThingsTowards the Secure Solutions The Domino Effect of IoT Safety Bottom-Up Approach for Ensuring Security Security Framework of the IoT Related to Perceptual Layer An Innovative Framework for IoT SecuritySecurity Authentication and Confirmation System Conclusions Future ScopeReferences12 Non physician Primary Health Care Workers: Making Wearable Computational Devices, Electronic Health Records Work for themIntroductionObjectiveProblems in Health Information System in the CountryProblems with Traditional EHR SoftwareElectronic Health Records: Challenges and Solution to the ChallengesBest Practices for Usage of Electronic Health RecordsConclusions and Future WorksReferences 13. Semantic Technologies for IoTIntroductionSemantic TechnologyExisting Standardizations in IoT SemanticsSemantic Web Rule Language (SWRL)SPARQL Case StudyConcluding RemarksReferences 14. Applications of IoT to address the solutions for children affected by Autism Spectrum Disorders (ASDs)IntroductionBackground & functionality of IoT solutionsStrategies for Use of IoT and Media-Based ToolsCurrent Developments &Applications of IoT technologiesWearable DevicesTracking DevicesHead Mounted Display Products - Google GlassIoT Apps for Children with ASDsBenefits of Using Assistive IoT Technologies to Support ASD ChildrenFuture ScopeConclusionsReferences

CSE

There are no comments on this title.

to post a comment.
Share