دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Brojo Kishore Mishra, Sanjay Kumar Kuanar, Sheng-Lung Peng, Daniel D. Dasig. Jr. سری: ISBN (شابک) : 1000206351, 9781000206357 ناشر: CRC Press سال نشر: 2020 تعداد صفحات: 205 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 25 مگابایت
در صورت تبدیل فایل کتاب Handbook of IoT and Blockchain: Methods, Solutions, and Recent Advancements به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب کتابچه راهنمای اینترنت اشیا و بلاک چین: روش ها ، راه حل ها و پیشرفت های اخیر نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
راهنمای اینترنت اشیا و بلاک چین: روشها، راهحلها و پیشرفتهای اخیر شامل مشارکتهایی از سراسر جهان در مورد پیشرفتها و یافتههای اخیر در حوزه اینترنت اشیا (IoT) و بلاک چین است. فصلها شامل تجزیه و تحلیل نظری، مفاهیم عملی، و بررسیهای گسترده با تجزیه و تحلیل در مورد روشها، الگوریتمها و فرآیندهای توسعه محصول جدید است.
IoT و Blockchain موضوعات نوظهور در سناریوی تولید فعلی هستند. این راهنما شامل پیشرفتهای اخیر است. ; کار تحقیقاتی را در سراسر جهان به نمایش می گذارد. تحلیل نظری و مفاهیم عملی ارائه می دهد. ارائه نظرسنجی های گسترده با تجزیه و تحلیل، مشارکت های جدید، و پیشنهادات در مورد روش ها، الگوریتم ها، و فرآیندها. و همچنین پیشرفت های اخیر از مقالات کمی و کیفی، مطالعات موردی، کارهای مفهومی و پشتوانه نظری را پوشش می دهد.
این کتاب راهنما برای دانشجویان فارغ التحصیل، محققین، دانشگاهیان، موسسات و متخصصان علاقه مند خواهد بود. کاوش در حوزه اینترنت اشیا و بلاک چین.
Handbook of IoT and Blockchain: Methods, solutions, and Recent Advancements includes contributions from around the globe on recent advances and findings in the domain of Internet of Things (IoT) and Blockchain. Chapters include theoretical analysis, practical implications, and extensive surveys with analysis on methods, algorithms, and processes for new product development.
IoT and Blockchain are the emerging topics in the current manufacturing scenario.This handbook includes recent advances; showcases the work of research around the globe; offers theoretical analysis and practical implications; presents extensive surveys with analysis, new contributions, and proposals on methods, algorithms, and processes; and also covers recent advances from quantitative and qualitative articles, case studies, conceptual works, and theoretical backing.
This handbook will be of interest to graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Blockchain.
Cover Half Title Series Information Title Page Copyright Page Table of contents Preface Editors 1 Blockchain-Enabled Security and Privacy Schemes in IoT Technologies 1.1 Introduction and Motivation 1.1.1 Internet of Things 1.1.1.1 IoT Architecture 1.1.1.2 Distinguishing IoT from Conventional Networks 1.1.2 Blockchain: An Overview 1.1.3 Generations of Blockchain 1.1.3.1 Blockchain 1.0: Bitcoin and Cryptocurrency 1.1.3.2 Blockchain 2.0: Smart Contracts and Ethereum 1.1.3.3 Blockchain 3.0: Convergence toward Decentralized Applications 1.1.3.4 Blockchain 4.0: Seamless Integration with Industry 4.0 1.2 IoT Architecture and Systemic Challenges 1.2.1 Sensing Layer: Introduction and Challenges in End Nodes 1.2.2 Threat Based on Network Layer 1.2.3 Service-Layer Based Threats 1.2.4 Application Interface Layer 1.2.5 Cross-Layer Challenges 1.3 Challenge to Implementation of Blockchain in IoT 1.3.1 Absence of IoT-Centric Consensus Protocol 1.3.2 Transaction Validation Rules 1.3.3 Scalability Challenges 1.3.3.1 Storage Capacity 1.3.3.2 Inherent Latency Blockchain 1.3.4 IoT Device Integration Challenges 1.3.5 Protection of Devices against Malware and Content Execution Attacks 1.3.6 Secure and Synchronized Software Updates 1.4 Application of Blockchain in IoT Sector 1.4.1 Autonomous Decentralized Peer-to-Peer Telemetry 1.4.2 Blockchain-Enabled Security for Smart Cities 1.4.3 Blockchain-Enabled Smart Home Architecture 1.4.4 Blockchain-Based Self-Managed VaNeTs 1.4.5 Security and Privacy of Data 1.5 Conclusion and Future Scope of Work References 2 Application and Challenges of IoT in Healthcare 2.1 Introduction 2.2 Medicine and Technology 2.2.1 Information Technology and Medicine 2.2.2 Medical Equipment Technology 2.2.3 Technology and Medical Research 2.2.4 3D Printing 2.2.5 Digitization of Health Records 2.2.5.1 Greater Patient care 2.2.5.2 Improved Public health 2.2.5.3 Ease of Workflow 2.2.5.4 Lower Healthcare costs 2.2.5.5 Disadvantages of EHR 2.2.6 Big Data 2.2.6.1 Applications of Big Data in Healthcare 2.3 Remote Health Monitoring 2.3.1 Benefits of Remote Health Monitoring 2.3.2 Challenges of Remote Health Monitoring 2.3.3 Obstacles of Remote Health Monitoring Usage 2.3.3.1 Is Not Accessible for Everyone 2.3.3.2 Patients’ and Doctors’ Skepticism 2.3.3.3 The Necessity of Extra Custom Healthcare Software 2.3.3.4 Uncertain Reliability 2.4 Disadvantages of Using IoT in Healthcare 2.4.1 Expensive 2.4.2 Time-consuming Adaption 2.4.3 Technology Dependent 2.4.4 Susceptibility to Network Hackers 2.4.5 Technical Requirements 2.4.6 Regulatory Concerns 2.4.7 Scalability 2.4.8 Time Constraints 2.4.9 Security 2.4.10 Managing IoT Obstacles 2.5 Challenges with Managing IoT Technologies 2.5.1 Integrating New Technologies into Existing Environments 2.5.2 Managing Protocol Complexity 2.5.3 Networking Challenges 2.5.4 Best Practices in the Era of IoT 2.6 Security Threats of IoT 2.6.1 Vulnerability 2.6.2 Easy Exposure 2.6.3 Threats 2.6.4 Insecure Web Interface 2.6.5 Insufficient Authentications 2.6.6 Insecure Network Devices 2.6.7 Lack of Transport Encryption 2.6.8 Privacy Concerns 2.6.9 Insecure Cloud Interface 2.7 Conclusions References 3 “IoT” : Bright Future in Healthcare Industry 3.1 Introduction 3.2 Scope of IoT 3.2.1 Information Accumulation 3.2.2 Device Integration 3.2.3 Real-Time Analytics 3.2.4 Apps and Method Abridgment 3.3 Healthcare Industry 3.3.1 Benefits of IoT in Healthcare Industry 3.3.1.1 Information Agglomeration and Examination 3.3.1.2 Following and Cautions 3.3.1.3 Remote Medical Assistance 3.3.1.4 Simultaneous Reporting and Monitoring 3.3.1.5 Start to Finish Availability and Moderateness 3.3.1.6 IoT and Patients 3.3.1.7 IoT and Physicians 3.3.1.8 IoT and Hospitals 3.3.1.9 IoT for Insurance Corporations 3.3.1.10 Redefining Healthcare 3.4 Smart Pills 3.4.1 Technology of WCE 3.4.2 Capsule 3.4.3 Information Recorder Belt/Smart Wearable 3.4.4 Workstation 3.5 Smart Beds 3.5.1 Features of Smart Bed 3.5.1.1 Sleep Tracking 3.5.1.2 Temperature Control 3.5.1.3 Air Chambers 3.5.1.4 App Integration 3.5.2 Technology of Smart Bed 3.5.2.1 Sensor 3.5.2.2 Air System 3.5.2.3 Three Operating Modes 3.5.2.3.1 Programmed 3.5.2.3.2 Position Detection 3.5.2.3.3 Manual 3.5.2.4 Network 3.6 Smart Wearable 3.6.1 Smart Watch 3.6.2 How Wearable Works 3.7 Remote Health Monitoring 3.7.1 Technological Components 3.7.2 How RPM Works 3.7.3 Benefits of Remote Patient Monitoring 3.8 IoT-Enabled Applications 3.9 Conclusion References 4 Putting Blockchain into Practice 4.1 What are We Trying to Solve? 4.2 Some Useful Distinctions 4.2.1 Difference between Blockchain and Cryptocurrency 4.2.2 Public Versus Private 4.3 Possible Applications 4.3.1 Finance 4.3.1.1 Know Your Customer 4.3.1.2 Cross-Border Transfer 4.3.1.3 Securities Transactions 4.3.1.4 International Trade 4.3.2 Smart Contracts 4.3.3 Property 4.3.4 Healthcare 4.3.5 Insurance 4.3.6 Supply Chain 4.3.7 Governance 4.4 Government’s Take 4.4.1 Summary of IMC Report 4.4.2 Report of the Steering Committee on FinTech Related Issues 4.5 Success Stories 4.5.1 LaVis Wine 4.5.2 TReDS Bill Discounting 4.5.3 Travel Insurance 4.5.4 Sweden Land Records 4.6 Challenges 4.6.1 Digitization 4.6.2 Property Records Complete 4.6.3 Need for Scale 4.6.4 Coders 4.6.5 Smart Contracts 4.7 Do it Yourself 4.7.1 HyperLedger 4.7.2 Bitcoin 4.7.3 Ethereum Blockchain 4.7.4 Generate a Hash Notes 5 Object Detection System with Image and Speech Recognition 5.1 Introduction 5.2 Methodology 5.2.1 Architecture 5.2.2 Circuit Diagram 5.2.3 Speech Recognition 5.2.4 Tensor Flow 5.2.5 Proposed Algorithm 5.3 Results and Discussion 5.4 Conclusion References 6 Blockchain Applications and Implementation 6.1 Introduction 6.1.1 What is Blockchain? 6.1.2 History of Blockchain 6.1.3 How it is Developed/Implementation 6.2 Ethereum Blockchain Network 6.2.1 What is Ethereum? 6.2.2 Is Ethereum the Future? 6.2.3 Ethereum Transactions Trend Chart 6.2.4 Solidity and Other Technologies 6.3 Applications of Blockchain 6.3.1 Blockchain in Online Marketing 6.3.2 Blockchain and Machine Learning 6.3.3 Blockchain and Decentralized Web Network 6.3.4 Why Blockchain is Taking over the Internet 6.4 Conclusion References 7 Internet of Things (IoT) Applications with Blockchain Technique 7.1 Introduction to the Internet of Things (IoT) 7.2 What is IoT? 7.3 Benefits of IoT 7.4 Example of IoT 7.5 Applications of Internet of Things (IoT) 7.6 IoT as a Network of Networks 7.7 The Future of IoT 7.8 Introduction of Blockchain 7.8.1 What is Blockchain? 7.8.2 Architecture of Blockchain 7.8.3 Genesis Block 7.8.3.1 Understanding SHA256 Hash 7.9 Application of Blockchain 7.9.1 Wireless 2.0—Integrated Networks on the Blockchain 7.9.2 Mesh Networks Solve a Particular Problem 7.10 Bitcoin 7.11 Difference between Bitcoin and Blockchain 8 Security and Privacy-Enhancing Technologies for Blockchain and Cryptocurrency 8.1 Introduction 8.2 Related Work on Bitcoin Scalability Trade-Off 8.2.1 Soft Fork 8.2.2 Hard Fork 8.2.3 Efficiency Improvements 8.3 Effective Attacks on Blockchain 8.3.1 Man-in-the-Middle Attacks 8.3.2 Bit-Flipping Attacks 8.3.3 Sequence Attacks 8.3.4 Complete Substitution Attacks 8.3.5 Information Leakage 8.3.6 Attacks on Control Software 8.3.7 Modification of Functionality 8.3.8 Piracy Attacks 8.3.9 Brute-Force Attacks on the Blockchain 8.3.10 Reverse Engineering 8.3.11 Counterfeiting 8.3.12 Hardware Trojans 8.3.13 Double Spending 8.3.14 51% Attack 8.3.15 Race Attack 8.3.16 Finney Attack 8.3.17 Vector76 Attack 8.3.18 Alternative History Attack 8.3.19 Selfish Mining Attack 8.3.20 System Hacking 8.3.21 Illegal Activities 8.3.22 Identity Theft 8.4 Potential Defenses Against Security Threats on Blockchain 8.5 Comparisons and Results Analysis 8.5.1 Discussion about Critical Infrastructures for Securing Blockchain 8.6 Conclusions References 9 Security and Privacy in IoT 9.1 Internet of Things (IoT) Security Technologies 9.2 IoT Security for Networks 9.3 Authentication Fixing for IoT Security Issues 9.4 IoT Security Technologies for Data Encryption 9.5 Security Analytics as a Dimension of IoT Security Solutions 9.6 IoT Security Technologies: Core Protection Methods (IoT API) 9.7 How to Build Trust in IoT 9.7.1 Enable Device Authentication 9.7.2 Encryption to Protect Data 9.8 Blockchain Technology 9.9 Distributed Consensus Algorithms 9.10 Consensus In Permissionless Blockchain System 9.10.1 Bitcoin Consensus 9.10.2 Proof of Work (PoW) 9.10.3 Proof of Stake (PoS) 9.11 Consensus in Permissioned Blockchain System 9.11.1 Paxos 9.11.2 Raft 9.11.3 Byzantine Fault Tolerance and Its Variant 9.11.4 Security Analysis 9.11.5 Decentralized Authentication 9.11.6 Using Decentralized Authentication References 10 Geospatial Data Classification using Sequential Pattern Mining with Modified Deep Learning Architecture 10.1 Introduction 10.2 Related Works 10.3 Problem Definition 10.4 Methodology 10.5 Expected Outcome References 11 Starring Role of Internet of Things (IoT) in the Field of Biomedical Peregrination for Modern Society 11.1 Introduction 11.2 Applications of IoT in Medical Domain 11.2.1 Treating Cancer 11.2.2 Smart Ceaseless Glucose Checking (CGM) and Insulin Pens 11.2.3 Closed-Circle Insulin Conveyance 11.2.4 Associated Inhalers 11.2.5 Ingestible Sensors 11.2.6 The Apple Watch Application that Screens Despondency 11.2.7 Coagulation Testing 11.2.8 Apple’s Research Kit and Parkinson’s Ailment 11.2.9 ADAMM Asthma Screen 11.3 Applications of IoT in Other Domains 11.3.1 Smart Waste Management 11.3.2 Security Application 11.3.3 Smart Hospital Building 11.3.4 Old-Age / Disable Care 11.3.5 Medical and Healthcare 11.3.6 Smart Transportation 11.3.7 Smart Agriculture for Medicinal Plant 11.3.8 Smart Infrastructure Deployment 11.3.9 Environment Monitoring 11.3.10 Living Lab 11.4 Conclusions References Index