ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Internet of Things (IoT)-Systems and Applications

دانلود کتاب اینترنت اشیا (IoT) - سیستم ها و برنامه های کاربردی

Internet of Things (IoT)-Systems and Applications

مشخصات کتاب

Internet of Things (IoT)-Systems and Applications

ویرایش: 1 
نویسندگان: ,   
سری:  
ISBN (شابک) : 9789814800297, 9780429678035 
ناشر: Jenny Stanford Publishing 
سال نشر: 2019 
تعداد صفحات: 366 
زبان:  
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 26 مگابایت 

قیمت کتاب (تومان) : 35,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 7


در صورت تبدیل فایل کتاب Internet of Things (IoT)-Systems and Applications به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اینترنت اشیا (IoT) - سیستم ها و برنامه های کاربردی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی درمورد کتاب به خارجی



فهرست مطالب

Cover
Half Title
Title Page
Copyright Page
Contents
Preface
1 Introduction to IoT Systems
	1.1 Introduction
	1.2 Overview of IoT Applications
		1.2.1 Healthcare
		1.2.2 Utility Services
		1.2.3 Automotive/Vehicular IoT
		1.2.4 Smart Agriculture
		1.2.5 Smart City
	1.3 IoT System Architectures and Design Approaches
	1.4 IoT Standards
	1.5 Summary
2 Big Data in IoT Systems
	2.1 Introduction
		2.1.1 The Digital Economy and Ubiquitous Computing Systems
		2.1.2 The Internet of Things
	2.2 Theoretical Approaches to UCS
		2.2.1 Category Theory
		2.2.2 Process Algebras
	2.3 Core Digital Technologies for UCS
		2.3.1 Semantic Technologies
		2.3.2 Cognitive Computing and Deep Learning
	2.4 Big Data and Its Sources
		2.4.1 Radio Frequency Identification
		2.4.2 Wireless Sensor Networks
		2.4.3 Machine-to-Machine Communications
		2.4.4 Cloud Computing
	2.5 Big Data in IoT Application Areas
		2.5.1 Healthcare Systems
		2.5.2 Food Supply Chains
		2.5.3 Smart Environment Domain
			2.5.3.1 Smart power system
			2.5.3.2 Smart home
			2.5.3.3 Smart environment control
			2.5.3.4 Safety and surveillance
			2.5.3.5 Smart city
		2.5.4 Safer Mining Production
		2.5.5 Transportation and Logistics
		2.5.6 Firefighting
	2.6 Challenges of Big Data in IoT Systems
		2.6.1 Big Data Mining
		2.6.2 Proposed Big Data Management and Analysis Techniques
	2.7 New Product Development and UCS
	2.8 Organizational and Policy Implications
3 Basics of Communication Networks
	3.1 Introduction
	3.2 Basic Networking Techniques
		3.2.1 Network Architecture
			3.2.1.1 Wide area network
			3.2.1.2 Local area network
			3.2.1.3 Personal area network
			3.2.1.4 Infrastructure and ad hoc networks
	3.3 Packet Communication Protocols
		3.3.1 Communication Protocols/Software Models
		3.3.2 Data Link Layer Protocols
			3.3.2.1 LLC sublayer
			3.3.2.2 Forward error correction techniques
			3.3.2.3 MAC sublayer
			3.3.2.4 Static channelization: TDMA
			3.3.2.5 Dynamic medium access control techniques
			3.3.2.6 Polling access technique
			3.3.2.7 Random access technique
			3.3.2.8 Network protocols
		3.3.3 Transport Protocols
	3.4 Wireless Networking Basics
		3.4.1 Radio Propagation Environment
	3.5 Traffic Modeling
	3.6 Summary
4 Low-Power Wide-Area Networks
	4.1 Introduction
		4.1.1 IoT Communication Requirements
	4.2 IoT Network Design Fundamentals
	4.3 LPWAN Standards
		4.3.1 Long-Range Wide-Area Network (LoRaWAN)
		4.3.2 SigFox
	4.4 Open Short-Range Networking Techniques
		4.4.1 IEEE802.11 Standards
		4.4.2 IEEE802.11ah Standard
		4.4.3 IEEE802.15.4 Standard
		4.4.4 Extension of the IEEE802.15.4 Standard
	4.5 A Heterogeneous IoT Network Architecture
		4.5.1 MFDRR Architecture
		4.5.2 The Blank Burst Algorithm
	4.6 Performance Evaluation of the Heterogeneous Network
	4.7 Conclusions
5 Energy-Harvesting IoT Networks
	5.1 Review of Energy Harvesting Techniques
		5.1.1 Solar-Based Energy Harvesting Technique
		5.1.2 Thermal Energy Harvesting Technique
		5.1.3 Vibration-Based Energy Harvesting Technique
		5.1.4 Radio Frequency (RF) Energy Harvesting Technique
	5.2 Energy-Harvested Sensor Network Architecture
		5.2.1 Radio Frequency (RF) Energy Harvesting Technique
		5.2.2 An Energy Consumption Model for the IEEE 802.15.4 EHWSN
	5.3 A Proposed Algorithm for Kinetic Energy–Based Energy Harvesting
		5.3.1 System Model
		5.3.2 Vehicle Energy Generation Model
		5.3.3 Piezoelectric Roadway Energy Harvester
		5.3.4 An Adaptive Beacon Order, Superframe Order, and Duty Cycle (ABSD) Algorithm
			5.3.4.1 Incoming traffic load estimation
			5.3.4.2 Node’s queue state estimation
			5.3.4.3 Algorithm description
		5.3.5 EH-ABSD Algorithm
			5.3.5.1 Energy back-off process
			5.3.5.2 Algorithm description
	5.4 A Proposed Model for RF-Based Energy Harvesting
		5.4.1 System Model
		5.4.2 RF Energy Harvesting Process
		5.4.3 RF-AASP Algorithm
			5.4.3.1 Incoming harvested RF energy estimation
			5.4.3.2 Algorithm description
	5.5 A Proposed Model for Solar-Based Energy Harvesting
		5.5.1 System Model
		5.5.2 Energy Consumption Model
		5.5.3 Energy Harvesting Prediction
		5.5.4 Energy Harvesting Process
			5.5.4.1 Case 1: Level 3 ≤ E[sup(i) sub(r)]≤ Level 2
			5.5.4.2 Case 2: 0 < E[sup(i) sub(r)]< Level 3
		5.5.5 Proposed Routing Algorithm
	5.6 Performance Analysis of Energy-Harvested Wireless Sensor Network
		5.6.1 EH-ABSD Algorithm
			5.6.1.1 Vehicular traffic simulation
			5.6.1.2 Harvested energy at sensor nodes
		5.6.2 RF-AASP Algorithm
		5.6.3 Solar-Based Routing Algorithm Performance
	5.7 Conclusion
6 Wide-Area Wireless Networks for IoT Applications
	6.1 Introduction
	6.2 Evolution of Wide-Area Wireless Standards
	6.3 LTE, LTE Advanced, and LTE Advanced Pro Overview
		6.3.1 Overall Roadmap
		6.3.2 LTE
		6.3.3 LTE Advanced
		6.3.4 LTE Advanced Pro
	6.4 M2M/IoT Challenges and Opportunities
	6.5 Employing LTE Advanced and LTE Advanced Pro for M2M/IoT Applications
		6.5.1 Random Access Overload
		6.5.2 PDCCH Saturation
		6.5.3 Exploiting Spatial and Temporal Correlation
		6.5.4 LTE-M and Narrowband LTE-M
	6.6 Summary
7 Low-Power Design Considerations for IoT Sensors
	7.1 Introduction
	7.2 Transmission Frequency of IoT Wireless Sensors
	7.3 IoT Hardware Platform
	7.4 IoT Wireless Sensor Network Platforms
		7.4.1 Waspmote
		7.4.2 MySignals
		7.4.3 MEMSIC
		7.4.4 WiSense
	7.5 IoT Sensor Node with Energy Harvesting
	7.6 A Self-Powered IoT Sensor Node Design (A Case Study)
		7.6.1 Hardware Design
		7.6.2 Software Design
		7.6.3 Performance Analysis
	7.7 Conclusions
8 Energy Harvesting Solutions for Internet of Things (IoT) Sensors
	8.1 Introduction
	8.2 Solar Energy Harvesting
		8.2.1 Photovoltaic Effect
		8.2.2 I–V Characteristics
		8.2.3 Maximum Power Point Tracking
		8.2.4 Power Conditioning Topologies
		8.2.5 Boost Converter with MPPT
		8.2.6 Charge Pump
		8.2.7 Transformer or Self-Starting Converter
	8.3 Sensor Nodes with Solar Energy Harvesting
	8.4 Vibration-Based Harvesting Techniques
	8.5 RF Energy Harvesting
	8.6 Commercial Conditioning Chips and Circuits
	8.7 Conclusions
9 Network Security for IoT and M2M Communications
	9.1 Introduction
	9.2 Network Technologies for IoT and M2M
		9.2.1 IETF IoT and M2M Communications
			9.2.1.1 6LoWPAN (network-layer communications)
			9.2.1.2 ROLL RPL (routing)
			9.2.1.3 CoAP (application-layer communications)
		9.2.2 ETSI IoT and M2M Communications
			9.2.2.1 High-level ETSI M2M architecture
			9.2.2.2 Service capabilities layers
			9.2.2.3 Secure M2M device registration
	9.3 Security for IoT and M2M Network Technologies
		9.3.1 Attacks and Threats
		9.3.2 Security Requirements
	9.4 Security in IETF M2M Network Technologies
		9.4.1 Security in 6LoWPAN
		9.4.2 Security in RPL
		9.4.3 Security in CoAP
		9.4.4 Open Research Opportunities
			9.4.4.1 Research challenges and proposals at the network-layer
			9.4.4.2 Research challenges and proposals for routing security
			9.4.4.3 Research challenges and proposals for application-layer security
	9.5 Security in ETSI M2M Network Technologies
	9.6 Other M2M Standard Efforts
	9.7 Conclusions
Index




نظرات کاربران