ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements

دانلود کتاب کتابچه راهنمای اینترنت اشیا و بلاک چین: روش ها ، راه حل ها و پیشرفت های اخیر

Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements

مشخصات کتاب

Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements

ویرایش:  
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 1000206351, 9781000206357 
ناشر: CRC Press 
سال نشر: 2020 
تعداد صفحات: 205 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 25 مگابایت 

قیمت کتاب (تومان) : 49,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 9


در صورت تبدیل فایل کتاب Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب کتابچه راهنمای اینترنت اشیا و بلاک چین: روش ها ، راه حل ها و پیشرفت های اخیر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب کتابچه راهنمای اینترنت اشیا و بلاک چین: روش ها ، راه حل ها و پیشرفت های اخیر



راهنمای اینترنت اشیا و بلاک چین: روش‌ها، راه‌حل‌ها و پیشرفت‌های اخیر شامل مشارکت‌هایی از سراسر جهان در مورد پیشرفت‌ها و یافته‌های اخیر در حوزه اینترنت اشیا (IoT) و بلاک چین است. فصل‌ها شامل تجزیه و تحلیل نظری، مفاهیم عملی، و بررسی‌های گسترده با تجزیه و تحلیل در مورد روش‌ها، الگوریتم‌ها و فرآیندهای توسعه محصول جدید است.

IoT و Blockchain موضوعات نوظهور در سناریوی تولید فعلی هستند. این راهنما شامل پیشرفت‌های اخیر است. ; کار تحقیقاتی را در سراسر جهان به نمایش می گذارد. تحلیل نظری و مفاهیم عملی ارائه می دهد. ارائه نظرسنجی های گسترده با تجزیه و تحلیل، مشارکت های جدید، و پیشنهادات در مورد روش ها، الگوریتم ها، و فرآیندها. و همچنین پیشرفت های اخیر از مقالات کمی و کیفی، مطالعات موردی، کارهای مفهومی و پشتوانه نظری را پوشش می دهد.

این کتاب راهنما برای دانشجویان فارغ التحصیل، محققین، دانشگاهیان، موسسات و متخصصان علاقه مند خواهد بود. کاوش در حوزه اینترنت اشیا و بلاک چین.


توضیحاتی درمورد کتاب به خارجی

Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain. Chapters include theoretical analysis, practical implications, and extensive surveys with analysis on methods, algorithms, and processes for new product development.

IoT and Blockchain are the emerging topics in the current manufacturing scenario.This handbook includes recent advances; showcases the work of research around the globe; offers theoretical analysis and practical implications; presents extensive surveys with analysis, new contributions, and proposals on methods, algorithms, and processes; and also covers recent advances from quantitative and qualitative articles, case studies, conceptual works, and theoretical backing.

This handbook will be of interest to graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Blockchain.



فهرست مطالب

Cover
Half Title
Series Information
Title Page
Copyright Page
Table of contents
Preface
Editors
1 Blockchain-Enabled Security and Privacy Schemes in IoT Technologies
	1.1 Introduction and Motivation
		1.1.1 Internet of Things
			1.1.1.1 IoT Architecture
			1.1.1.2 Distinguishing IoT from Conventional Networks
		1.1.2 Blockchain: An Overview
		1.1.3 Generations of Blockchain
			1.1.3.1 Blockchain 1.0: Bitcoin and Cryptocurrency
			1.1.3.2 Blockchain 2.0: Smart Contracts and Ethereum
			1.1.3.3 Blockchain 3.0: Convergence toward Decentralized Applications
			1.1.3.4 Blockchain 4.0: Seamless Integration with Industry 4.0
	1.2 IoT Architecture and Systemic Challenges
		1.2.1 Sensing Layer: Introduction and Challenges in End Nodes
		1.2.2 Threat Based on Network Layer
		1.2.3 Service-Layer Based Threats
		1.2.4 Application Interface Layer
		1.2.5 Cross-Layer Challenges
	1.3 Challenge to Implementation of Blockchain in IoT
		1.3.1 Absence of IoT-Centric Consensus Protocol
		1.3.2 Transaction Validation Rules
		1.3.3 Scalability Challenges
			1.3.3.1 Storage Capacity
			1.3.3.2 Inherent Latency Blockchain
		1.3.4 IoT Device Integration Challenges
		1.3.5 Protection of Devices against Malware and Content Execution Attacks
		1.3.6 Secure and Synchronized Software Updates
	1.4 Application of Blockchain in IoT Sector
		1.4.1 Autonomous Decentralized Peer-to-Peer Telemetry
		1.4.2 Blockchain-Enabled Security for Smart Cities
		1.4.3 Blockchain-Enabled Smart Home Architecture
		1.4.4 Blockchain-Based Self-Managed VaNeTs
		1.4.5 Security and Privacy of Data
	1.5 Conclusion and Future Scope of Work
	References
2 Application and Challenges of IoT in Healthcare
	2.1 Introduction
	2.2 Medicine and Technology
		2.2.1 Information Technology and Medicine
		2.2.2 Medical Equipment Technology
		2.2.3 Technology and Medical Research
		2.2.4 3D Printing
		2.2.5 Digitization of Health Records
			2.2.5.1 Greater Patient care
			2.2.5.2 Improved Public health
			2.2.5.3 Ease of Workflow
			2.2.5.4 Lower Healthcare costs
			2.2.5.5 Disadvantages of EHR
		2.2.6 Big Data
			2.2.6.1 Applications of Big Data in Healthcare
	2.3 Remote Health Monitoring
		2.3.1 Benefits of Remote Health Monitoring
		2.3.2 Challenges of Remote Health Monitoring
		2.3.3 Obstacles of Remote Health Monitoring Usage
			2.3.3.1 Is Not Accessible for Everyone
			2.3.3.2 Patients’ and Doctors’ Skepticism
			2.3.3.3 The Necessity of Extra Custom Healthcare Software
			2.3.3.4 Uncertain Reliability
	2.4 Disadvantages of Using IoT in Healthcare
		2.4.1 Expensive
		2.4.2 Time-consuming Adaption
		2.4.3 Technology Dependent
		2.4.4 Susceptibility to Network Hackers
		2.4.5 Technical Requirements
		2.4.6 Regulatory Concerns
		2.4.7 Scalability
		2.4.8 Time Constraints
		2.4.9 Security
		2.4.10 Managing IoT Obstacles
	2.5 Challenges with Managing IoT Technologies
		2.5.1 Integrating New Technologies into Existing Environments
		2.5.2 Managing Protocol Complexity
		2.5.3 Networking Challenges
		2.5.4 Best Practices in the Era of IoT
	2.6 Security Threats of IoT
		2.6.1 Vulnerability
		2.6.2 Easy Exposure
		2.6.3 Threats
		2.6.4 Insecure Web Interface
		2.6.5 Insufficient Authentications
		2.6.6 Insecure Network Devices
		2.6.7 Lack of Transport Encryption
		2.6.8 Privacy Concerns
		2.6.9 Insecure Cloud Interface
	2.7 Conclusions
	References
3 “IoT”
: Bright Future in Healthcare Industry
	3.1 Introduction
	3.2 Scope of IoT
		3.2.1 Information Accumulation
		3.2.2 Device Integration
		3.2.3 Real-Time Analytics
		3.2.4 Apps and Method Abridgment
	3.3 Healthcare Industry
		3.3.1 Benefits of IoT in Healthcare Industry
			3.3.1.1 Information Agglomeration and Examination
			3.3.1.2 Following and Cautions
			3.3.1.3 Remote Medical Assistance
			3.3.1.4 Simultaneous Reporting and Monitoring
			3.3.1.5 Start to Finish Availability and Moderateness
			3.3.1.6 IoT and Patients
			3.3.1.7 IoT and Physicians
			3.3.1.8 IoT and Hospitals
			3.3.1.9 IoT for Insurance Corporations
			3.3.1.10 Redefining Healthcare
	3.4 Smart Pills
		3.4.1 Technology of WCE
		3.4.2 Capsule
		3.4.3 Information Recorder Belt/Smart Wearable
		3.4.4 Workstation
	3.5 Smart Beds
		3.5.1 Features of Smart Bed
			3.5.1.1 Sleep Tracking
			3.5.1.2 Temperature Control
			3.5.1.3 Air Chambers
			3.5.1.4 App Integration
		3.5.2 Technology of Smart Bed
			3.5.2.1 Sensor
			3.5.2.2 Air System
			3.5.2.3 Three Operating Modes
				3.5.2.3.1 Programmed
				3.5.2.3.2 Position Detection
				3.5.2.3.3 Manual
			3.5.2.4 Network
	3.6 Smart Wearable
		3.6.1 Smart Watch
		3.6.2 How Wearable Works
	3.7 Remote Health Monitoring
		3.7.1 Technological Components
		3.7.2 How RPM Works
		3.7.3 Benefits of Remote Patient Monitoring
	3.8 IoT-Enabled Applications
	3.9 Conclusion
	References
4 Putting Blockchain into Practice
	4.1 What are We Trying to Solve?
	4.2 Some Useful Distinctions
		4.2.1 Difference between Blockchain and Cryptocurrency
		4.2.2 Public Versus Private
	4.3 Possible Applications
		4.3.1 Finance
			4.3.1.1 Know Your Customer
			4.3.1.2 Cross-Border Transfer
			4.3.1.3 Securities Transactions
			4.3.1.4 International Trade
		4.3.2 Smart Contracts
		4.3.3 Property
		4.3.4 Healthcare
		4.3.5 Insurance
		4.3.6 Supply Chain
		4.3.7 Governance
	4.4 Government’s Take
		4.4.1 Summary of IMC Report
		4.4.2 Report of the Steering Committee on FinTech Related Issues
	4.5 Success Stories
		4.5.1 LaVis Wine
		4.5.2 TReDS Bill Discounting
		4.5.3 Travel Insurance
		4.5.4 Sweden Land Records
	4.6 Challenges
		4.6.1 Digitization
		4.6.2 Property Records Complete
		4.6.3 Need for Scale
		4.6.4 Coders
		4.6.5 Smart Contracts
	4.7 Do it Yourself
		4.7.1 HyperLedger
		4.7.2 Bitcoin
		4.7.3 Ethereum Blockchain
		4.7.4 Generate a Hash
	Notes
5 Object Detection System with Image and Speech Recognition
	5.1 Introduction
	5.2 Methodology
		5.2.1 Architecture
		5.2.2 Circuit Diagram
		5.2.3 Speech Recognition
		5.2.4 Tensor Flow
		5.2.5 Proposed Algorithm
	5.3 Results and Discussion
	5.4 Conclusion
	References
6 Blockchain Applications and Implementation
	6.1 Introduction
		6.1.1 What is Blockchain?
		6.1.2 History of Blockchain
		6.1.3 How it is Developed/Implementation
	6.2 Ethereum Blockchain Network
		6.2.1 What is Ethereum?
		6.2.2 Is Ethereum the Future?
		6.2.3 Ethereum Transactions Trend Chart
		6.2.4 Solidity and Other Technologies
	6.3 Applications of Blockchain
		6.3.1 Blockchain in Online Marketing
		6.3.2 Blockchain and Machine Learning
		6.3.3 Blockchain and Decentralized Web Network
		6.3.4 Why Blockchain is Taking over the Internet
	6.4 Conclusion
	References
7 Internet of Things (IoT) Applications with Blockchain Technique
	7.1 Introduction to the Internet of Things (IoT)
	7.2 What is IoT?
	7.3 Benefits of IoT
	7.4 Example of IoT
	7.5 Applications of Internet of Things (IoT)
	7.6 IoT as a Network of Networks
	7.7 The Future of IoT
	7.8 Introduction of Blockchain
		7.8.1 What is Blockchain?
		7.8.2 Architecture of Blockchain
		7.8.3 Genesis Block
			7.8.3.1 Understanding SHA256 Hash
	7.9 Application of Blockchain
		7.9.1 Wireless 2.0—Integrated Networks on the Blockchain
		7.9.2 Mesh Networks Solve a Particular Problem
	7.10 Bitcoin
	7.11 Difference between Bitcoin and Blockchain
8 Security and Privacy-Enhancing Technologies for Blockchain and Cryptocurrency
	8.1 Introduction
	8.2 Related Work on Bitcoin Scalability Trade-Off
		8.2.1 Soft Fork
		8.2.2 Hard Fork
		8.2.3 Efficiency Improvements
	8.3 Effective Attacks on Blockchain
		8.3.1 Man-in-the-Middle Attacks
		8.3.2 Bit-Flipping Attacks
		8.3.3 Sequence Attacks
		8.3.4 Complete Substitution Attacks
		8.3.5 Information Leakage
		8.3.6 Attacks on Control Software
		8.3.7 Modification of Functionality
		8.3.8 Piracy Attacks
		8.3.9 Brute-Force Attacks on the Blockchain
		8.3.10 Reverse Engineering
		8.3.11 Counterfeiting
		8.3.12 Hardware Trojans
		8.3.13 Double Spending
		8.3.14 51% Attack
		8.3.15 Race Attack
		8.3.16 Finney Attack
		8.3.17 Vector76 Attack
		8.3.18 Alternative History Attack
		8.3.19 Selfish Mining Attack
		8.3.20 System Hacking
		8.3.21 Illegal Activities
		8.3.22 Identity Theft
	8.4 Potential Defenses Against Security Threats on Blockchain
	8.5 Comparisons and Results Analysis
		8.5.1 Discussion about Critical Infrastructures for Securing Blockchain
	8.6 Conclusions
	References
9 Security and Privacy in IoT
	9.1 Internet of Things (IoT) Security Technologies
	9.2 IoT Security for Networks
	9.3 Authentication Fixing for IoT Security Issues
	9.4 IoT Security Technologies for Data Encryption
	9.5 Security Analytics as a Dimension of IoT Security Solutions
	9.6 IoT Security Technologies: Core Protection Methods (IoT API)
	9.7 How to Build Trust in IoT
		9.7.1 Enable Device Authentication
		9.7.2 Encryption to Protect Data
	9.8 Blockchain Technology
	9.9 Distributed Consensus Algorithms
	9.10 Consensus In Permissionless Blockchain System
		9.10.1 Bitcoin Consensus
		9.10.2 Proof of Work (PoW)
		9.10.3 Proof of Stake (PoS)
	9.11 Consensus in Permissioned Blockchain System
		9.11.1 Paxos
		9.11.2 Raft
		9.11.3 Byzantine Fault Tolerance and Its Variant
		9.11.4 Security Analysis
		9.11.5 Decentralized Authentication
		9.11.6 Using Decentralized Authentication
	References
10 Geospatial Data Classification using Sequential Pattern Mining with Modified Deep Learning Architecture
	10.1 Introduction
	10.2 Related Works
	10.3 Problem Definition
	10.4 Methodology
	10.5 Expected Outcome
	References
11 Starring Role of Internet of Things (IoT) in the Field of Biomedical Peregrination for Modern Society
	11.1 Introduction
	11.2 Applications of IoT in Medical Domain
		11.2.1 Treating Cancer
		11.2.2 Smart Ceaseless Glucose Checking (CGM) and Insulin Pens
		11.2.3 Closed-Circle Insulin Conveyance
		11.2.4 Associated Inhalers
		11.2.5 Ingestible Sensors
		11.2.6 The Apple Watch Application that Screens Despondency
		11.2.7 Coagulation Testing
		11.2.8 Apple’s Research Kit and Parkinson’s Ailment
		11.2.9 ADAMM Asthma Screen
	11.3 Applications of IoT in Other Domains
		11.3.1 Smart Waste Management
		11.3.2 Security Application
		11.3.3 Smart Hospital Building
		11.3.4 Old-Age / Disable Care
		11.3.5 Medical and Healthcare
		11.3.6 Smart Transportation
		11.3.7 Smart Agriculture for Medicinal Plant
		11.3.8 Smart Infrastructure Deployment
		11.3.9 Environment Monitoring
		11.3.10 Living Lab
	11.4 Conclusions
	References
Index




نظرات کاربران