ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Internet of Things. A Confluence of Many Disciplines: Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 – ... and Communication Technology, 574)

دانلود کتاب اینترنت اشیا تلاقی بسیاری از رشته ها: دومین کنفرانس بین المللی بین دامنه ای IFIP، IFIPoT 2019، تامپا، FL، ایالات متحده آمریکا، 31 اکتبر - ... و فناوری ارتباطات، 574)

Internet of Things. A Confluence of Many Disciplines: Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 – ... and Communication Technology, 574)

مشخصات کتاب

Internet of Things. A Confluence of Many Disciplines: Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 – ... and Communication Technology, 574)

ویرایش:  
نویسندگان: , , ,   
سری:  
ISBN (شابک) : 3030436047, 9783030436049 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 333 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 51 مگابایت 

قیمت کتاب (تومان) : 57,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 12


در صورت تبدیل فایل کتاب Internet of Things. A Confluence of Many Disciplines: Second IFIP International Cross-Domain Conference, IFIPIoT 2019, Tampa, FL, USA, October 31 – ... and Communication Technology, 574) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اینترنت اشیا تلاقی بسیاری از رشته ها: دومین کنفرانس بین المللی بین دامنه ای IFIP، IFIPoT 2019، تامپا، FL، ایالات متحده آمریکا، 31 اکتبر - ... و فناوری ارتباطات، 574) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب اینترنت اشیا تلاقی بسیاری از رشته ها: دومین کنفرانس بین المللی بین دامنه ای IFIP، IFIPoT 2019، تامپا، FL، ایالات متحده آمریکا، 31 اکتبر - ... و فناوری ارتباطات، 574)



این کتاب مجموعه مقالات داوری پس از کنفرانس دومین کنفرانس بین‌المللی بین‌دامنه‌ای IFIP در اینترنت اشیاء، IFIPoT 2019، در تامپا، ایالات متحده آمریکا، در اکتبر/ نوامبر 2019 است.</ p>

11 مقاله کامل ارائه شده به دقت بررسی و از بین 22 مقاله ارسالی انتخاب شدند. همچنین در این جلد 8 مقاله دعوت شده گنجانده شده است. مقالات در بخش های موضوعی زیر سازماندهی شده اند: برنامه های کاربردی اینترنت اشیا. استدلال زمینه و آگاهی موقعیتی؛ امنیت اینترنت اشیا؛ اینترنت اشیاء هوشمند و کم مصرف؛ معماری شبکه های هوشمند؛ و طراحی سیستم هوشمند و آموزش اینترنت اشیا.


توضیحاتی درمورد کتاب به خارجی

This book constitutes the refereed post-conference proceedings of the Second IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2019, held in Tampa, USA, in October/ November 2019.

The 11 full papers presented were carefully reviewed and selected from 22 submissions. Also included in this volume are 8 invited papers. The papers are organized in the following topical sections: IoT applications; context reasoning and situational awareness; IoT security; smart and low power IoT; smart network architectures; and smart system design and IoT education.



فهرست مطالب

Preface
Organization
Contents
IoT Applications
Architecting Systems-of-Systems of Self-driving Cars for Platooning on the Internet-of-Vehicles with SosADL
	Abstract
	1 Introduction
	2 Internet-of-Vehicles and Vehicle Platooning
	3 Enhancing SosADL for the Internet-of-Vehicles
		3.1 Extending SosADL with Digital Twins of “Things”
		3.2 Constructs for Autonomous Constituent Systems in SosADL
		3.3 Extending SosADL with Constructs for Connected Constituent Systems
	4 SoS Architecture Description for UGV-Based Platooning
	5 SosADL Implementation
	6 SosADL Validation for the IoV by Controlled Experiment
	7 Related Work
	8 Conclusion and Future Work
	References
Energy Efficiency in Smart Buildings: An IoT-Based Air Conditioning Control System
	1 Introduction
	2 Related Work
	3 Smart Place
		3.1 Hardware Devices
		3.2 Middleware
		3.3 Web Platform
	4 Results and Discussion
	5 Concluding Remarks
	References
Toward Blockchain Technology in IoT Applications: An Analysis for E-health Applications
	1 Introduction
	2 Background
		2.1 Internet of Things and E-health
		2.2 Blockchain
	3 Related Work
	4 Description of Our Approach
	5 Experimental Design
		5.1 Goals
		5.2 Materials and Methods
		5.3 Metrics
	6 Experiments and Results
		6.1 Discussion
	7 Conclusion
	References
Context Reasoning and Situational Awareness
I2VSM Approach: Self-monitoring of Patients Exploring Situational Awareness in IoT
	1 Introduction
	2 Scope
		2.1 Situational Awareness
		2.2 Vital Signs
		2.3 Tracking and Monitoring Scoring Systems
		2.4 Medical Information Mart for Intensive Care (MIMIC)
	3 Related Works
	4 EXEHDA Middleware
	5 I2VSM: Conception and Functionalities
		5.1 Environment Interoperation Block
		5.2 Edge Processing Block
		5.3 User Interface Block
	6 I2VSM: Evaluation
	7 Final Considerations
	References
An IoT Proposal for the Irrigation Management Exploring Context Awareness
	1 Introduction
	2 Background
		2.1 Context Awareness
		2.2 EXEHDA Middleware
	3 Related Work
	4 EXEHDA-SF: Organization and Functionalities
		4.1 Environment Interoperation Block
		4.2 Irrigation Control Block
		4.3 User Interface Block
	5 EXEHDA-SF: Prototyping and Results
		5.1 Hardware Adopted
		5.2 Software Frameworks Adopted
		5.3 Evaluation
	6 Conclusions
	References
An IoT Architecture to Provide Hybrid Context Reasoning
	1 Introduction
	2 Related Work
	3 Software Architecture Proposed
	4 Evaluation
	5 Conclusion
	References
IoT Security
REDEM: Real-Time Detection and Mitigation of Communication Attacks in Connected Autonomous Vehicle Applications
	1 Introduction
	2 Background and Related Work
		2.1 Connected Car Applications and Security Challenges
		2.2 State of the Practice and Related Research
	3 REDEM Vision
		3.1 Design Constraints
		3.2 REDEM Approach and Viability
		3.3 Threat Model and Design Assumptions
	4 REDEM On-board Architecture
	5 Prediction Models
	6 REDEM Evaluation
	7 Case Study: Secure CACC
		7.1 CACC Functional Overview
		7.2 REDEM for CACC
	8 Conclusion and Future Work
	References
Trust in IoT Devices: A Logic Encryption Perspective
	1 Introduction
	2 Logic Encryption Techniques
	3 Logic Decryption Strategies
	4 Attack Resiliency of Encryption Schemes
	5 Cost Analysis - Area and Power
		5.1 Experimental Setup
		5.2 Results
	6 Conclusion
	References
Latent Space Modeling for Cloning Encrypted PUF-Based Authentication
	1 Introduction
	2 Background and Related Work
		2.1 Physically Unclonable Functions
		2.2 PUFs for IoT Node Security
		2.3 Cloning Attacks on PUF Models
		2.4 Encryption Protocols for IoT Node Authentication
	3 Learning a Latent Subspace for Encrypted CRPs
		3.1 Variational Autoencoders
		3.2 Multi-headed Decoding for Robust Latent Subspace Modeling
		3.3 Implementation Details and Training Strategy
	4 Experimental Evaluation
		4.1 Baseline Approach: A Brute Force Attack on Encrypted PUFs
		4.2 Quantitative Evaluation
	5 Conclusion and Future Work
	References
Lightweight Countermeasure to Differential-Plaintext Attacks on Permutation Ciphers
	1 Introduction
	2 Background and Related Work
		2.1 Cryptography and Information Security
		2.2 PRESENT-80 Cipher
		2.3 Attack Model
		2.4 Interconnection Networks
		2.5 Interconnection Networks in Crpytography
		2.6 Key-Dependency in Cryptography
	3 Key-Dependent Interconnection Network Structures
	4 Experimental Evaluation
		4.1 Analysis of Results
	5 Analysis
		5.1 Differential-Plaintext Attacks
		5.2 Application to SBox
		5.3 Application to Other Ciphers
		5.4 Use with Other Methods
	6 Conclusion
	References
Smart and Low Power IoT
Challenges in the Design of Integrated Systems for IoT
	Abstract
	1 Introduction
	2 Internet of Things
	3 Power Consumption
	4 Reliability
	5 Security
	6 3D Circuits
	7 Hardware Accelerators
	8 Conclusions
	Acknowledgements
	References
Mixed Precision Quantization Scheme for Re-configurable ReRAM Crossbars Targeting Different Energy Harvesting Scenarios
	1 Introduction
	2 Background and Related Work
		2.1 Quantized Neural Networks
		2.2 ReRAM Crossbar-Based Accelerator
		2.3 Energy Harvesting System
	3 Quantization for Different Power Levels
	4 Precision Configurable ReRAM Crossbar
	5 Power Prediction
		5.1 NN-Based Power Prediction
		5.2 Augmented Power Prediction
	6 Experiments
		6.1 Experimental Settings
		6.2 Results
	7 Conclusion
	References
Smart Network Architectures
Toward Holistic Integration of Computing and Wireless Networking
	1 Introduction
	2 Applications of ML in IoT Wireless Networking
		2.1 MAC Protocol: Wireless Access, Routing and Others
		2.2 MEC: Caching and Offloading
		2.3 IoT Security and Reliability
		2.4 Low-Power Operation and Sensor Networks
	3 Machine Learning in Smart Factory
		3.1 Computing and Networking Systems in Smart Factories
		3.2 Vertical Integration
		3.3 Horizontal Integration
	4 Future Networking and Computing Architecture
		4.1 State-of-the-Art Applications of Machine Learning to Future Wireless Network Architecture
		4.2 Networked Multi-agent Systems
	5 Conclusions
	References
The Thing About the Internet of Things: Scoping the Social Science Discourse in IoT Research
	Abstract
	1 Introduction
	2 Research Methodology
		2.1 Literature Selection
		2.2 Literature Analysis
	3 Results
		3.1 Keywords Within the Social Science Subject-Field Literature
		3.2 Themes Based on Keywords from the Social Science Subject-Field Litterature Analysis
	4 Discussion
		4.1 Suggestions for a New Thematic Scope
		4.2 Why Should the Social Sciences Care
	5 Conclusions and Suggestions for Future Research
	References
Evaluating Edge Processing Requirements in Next Generation IoT Network Architectures
	1 Introduction
	2 Background
		2.1 IoT Architectures
		2.2 Image Processing
	3 Edge Node Design and Analysis Framework
		3.1 Limited Network Connectivity
		3.2 Privacy and Security Concerns
		3.3 Transmission Power Exceeds Local Processing Power
	4 Preliminary Results
	5 Conclusion
	References
Smart System Design and IoT Education
Good-Eye: A Combined Computer-Vision and Physiological-Sensor Based Device for Full-Proof Prediction and Detection of Fall of Adults
	1 Introduction
	2 Related Research Overview
	3 Novel Contributions
	4 Are Falls Related to Physiological Parameters?
		4.1 Sweat
		4.2 Heart Rates and Blood Pressures
		4.3 Temperature
		4.4 Vision
	5 System Level Modeling of Good-Eye
		5.1 Architecture of Good-Eye
		5.2 The Parameters Considered for Good-Eye System
		5.3 Design Flow
		5.4 Parameter Analysis Unit
		5.5 Fall Prediction and Detection Unit
		5.6 Working Principle of the Proposed Good-Eye Model
	6 Implementation and Validation
		6.1 Implementation
		6.2 Validation
	7 Conclusions and Future Research
	References
Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory
	1 Introduction
		1.1 Need for Promoting Education in IoT Security
		1.2 Need for Low-Cost and High-Quality Hardware Platforms for IoT Security Education
	2 A Capable and Low-Cost IoT Laboratory
		2.1 Low-Cost IoT Development Kit and Laboratory
		2.2 Creating an Integrated Development Environment (IDE) for IoT Security Education
	3 Developing Teaching Labs for IoT Security
		3.1 Developing Teaching Modules on Hardware Security
		3.2 Developing Teaching Modules on Secure Key Storage on ESP32
		3.3 Developing Teaching Modules on System/Firmware Security
		3.4 Developing Teaching Modules on Data Security
		3.5 Developing Teaching Modules on Network Security on ESP32
		3.6 Developing Teaching Modules on Secure Firmware Upgrade
		3.7 Secure Over-the-Air Updates (OTA) on ESP32
		3.8 Developing Teaching Modules on Crypto Co-processor
		3.9 Developing Case Studies
	4 Conclusion
	References
Curriculum Design Requirements and Challenges for the First Bachelor\'s Degree on IoT in the US
	1 Introduction
	2 Where Is the Need?
		2.1 IoT vs Computer Science/Engineering
		2.2 IoT vs IT
	3 IoT Technology Degree Curriculum
		3.1 University Core Requirements
		3.2 Four Pillars of IoT
	4 Proposed IoT Program Map
		4.1 Prerequisites
		4.2 Online vs Onsite
	5 Other Related Issues
		5.1 Potential Jobs
		5.2 Tracks or Other Joint Programs
	6 Conclusion
	References
IoT in Smart Grid: Energy Management Opportunities and Security Challenges
	Abstract
	1 Introduction
		1.1 Background
		1.2 Contributions
	2 Problem Formulation
		2.1 Cost Function
		2.2 Constraints
	3 Solution Implementation
		3.1 Machine Learning Substitution for Optimization Algorithm
		3.2 Online Discrepancy Test
	4 Conclusion
	References
Author Index




نظرات کاربران