ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Internet of Things (IoT): Concepts and Applications (S.M.A.R.T. Environments)

دانلود کتاب اینترنت اشیا (IoT): مفاهیم و کاربردها (محیط های S.M.A.R.T.)

Internet of Things (IoT): Concepts and Applications (S.M.A.R.T. Environments)

مشخصات کتاب

Internet of Things (IoT): Concepts and Applications (S.M.A.R.T. Environments)

ویرایش: 1 
نویسندگان: , ,   
سری: S.M.A.R.T. Environments 
ISBN (شابک) : 303037467X, 9783030374679 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 526 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 مگابایت 

قیمت کتاب (تومان) : 41,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Internet of Things (IoT): Concepts and Applications (S.M.A.R.T. Environments) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اینترنت اشیا (IoT): مفاهیم و کاربردها (محیط های S.M.A.R.T.) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب اینترنت اشیا (IoT): مفاهیم و کاربردها (محیط های S.M.A.R.T.)



هدف این کتاب، کشف مفاهیم و کاربردهای مرتبط با اینترنت اشیا با چشم‌انداز شناسایی و رسیدگی به چالش‌های موجود است. علاوه بر این، این کتاب جهت‌های تحقیقاتی آینده را در این حوزه ارائه می‌کند و کاربردهای مختلف اینترنت اشیا و فناوری‌های مرتبط با آن را بررسی می‌کند. مطالعات کاربردهای سنجش جمعیت و منبع یابی، و همچنین کاربردهای هوشمند برای راه حل های مراقبت های بهداشتی، کشاورزی و مدیریت هوشمند بلایای طبیعی را بررسی می کنند. این کتاب برای دانشجویان، پزشکان، متخصصان صنعت و محققانی که در زمینه IoT و ادغام آن با سایر فناوری‌ها کار می‌کنند برای ایجاد راه‌حل‌های جامع برای مشکلات زندگی واقعی جذاب خواهد بود


توضیحاتی درمورد کتاب به خارجی

This books objective is to explore the concepts and applications related to Internet of Things with the vision to identify and address existing challenges. Additionally, the book provides future research directions in this domain, and explores the different applications of IoT and its associated technologies. Studies investigate applications for crowd sensing and sourcing, as well as smart applications to healthcare solutions, agriculture and intelligent disaster management. This book will appeal to students, practitioners, industry professionals and researchers working in the field of IoT and its integration with other technologies to develop comprehensive solutions to real-life problems



فهرست مطالب

Preface
Acknowledgments
Contents
Contributors
Part I: Internet of Things (IoT) Architecture
	Chapter 1: Foundation of IoT: An Overview
		1.1 Introduction
		1.2 Historical Development
		1.3 Internet of Things (IoT)
		1.4 Smart Object
			1.4.1 Characteristics of Smart Object
			1.4.2 Trends in Smart Object
		1.5 Features and Challenges of IoT
		1.6 IoT as an Industrial Commodity
		1.7 Applications
		1.8 Conclusion
		References
	Chapter 2: Cloud Computing for IoT
		2.1 Introduction
		2.2 Basic Concepts
			2.2.1 Cloud Computing
			2.2.2 Importance of Cloud Computing for IoT
		2.3 Cloud Based IoT Architecture
			2.3.1 Models
		2.4 CloudIoT Applications
		2.5 Cloud Platforms Available for IoT
			2.5.1 Commercial IoT Platform
			2.5.2 Open Source IoT Platform
		2.6 Challenges
		2.7 Conclusion
		References
	Chapter 3: Open Service Platforms for IoT
		3.1 Introduction
		3.2 IoT Reference Architecture
			3.2.1 Sensor Layer
			3.2.2 Gateway and Network Layer
			3.2.3 Service Management Layer
			3.2.4 Application Layer
		3.3 IoT Platform Requirements
			3.3.1 Service Requirements
			3.3.2 Architectural Requirements
		3.4 Case Study of IoT Service Platforms
			3.4.1 Amazon Web Service (AWS IoT)
			3.4.2 Microsoft Azure IoT
			3.4.3 Google Cloud Platform
			3.4.4 IBM Watson IoT
		3.5 Challenges and Open Research Problems
		3.6 Conclusion
		References
Part II: Solutions and Enablers for IoT
	Chapter 4: Resource Management Techniques for Cloud-Based IoT Environment
		4.1 Introduction
		4.2 Basic Concepts of IoT, Cloud and Resource Management
			4.2.1 What Are the Basic Elements of the IoT Environment?
				4.2.1.1 Identifiers
				4.2.1.2 Sensing Devices
				4.2.1.3 Communications Devices
				4.2.1.4 Compute Devices
				4.2.1.5 Services IoT
				4.2.1.6 Semantics
			4.2.2 What Are the Various IoT Architecture Frameworks?
				4.2.2.1 Layer 1: Physical Devices and Controllers
				4.2.2.2 Layer 2: Connectivity
				4.2.2.3 Layer 3: Edge Connecting
				4.2.2.4 Layer 4: Data Accumulation
				4.2.2.5 Layer 5: Data Abstraction
				4.2.2.6 Layer 6: The Application Layer
				4.2.2.7 Layer 7: Collaboration and Processes
			4.2.3 How Cloud Computing Supports IoT Infrastructure?
			4.2.4 Why Resource Allocation Is Important for IoT?
		4.3 Related Works
		4.4 Classification of Cloud-Based IoT Resource Management Techniques
			4.4.1 SLA-Aware IoT Resource Allocation
			4.4.2 Context-Aware IoT Resource Allocation
			4.4.3 QoS-Aware IoT Resource Allocation
			4.4.4 Energy-Aware IoT Resource Allocation
			4.4.5 Cost-Aware IoT Resource Allocation
		4.5 Parameters of IoT Resource Management Techniques
			4.5.1 What Are the Various Parameters of Resource Allocation?
			4.5.2 How Much Degree of Improvement Have Been Done in These Parameters?
			4.5.3 How Much Improvement Is Required in the Remaining Parameters?
		4.6 Challenges and Issues
		4.7 Future Directions
		4.8 Conclusion
		References
	Chapter 5: Data Management for the Internet of Things
		5.1 Introduction
		5.2 Management of Data in IoT
			5.2.1 Life-Cycle of Information
			5.2.2 Management of Information for IoT and Data Management Systems for the Traditional Methods
		5.3 Systematic Survey of the Management for the Devices of IoT and Design Primitives
			5.3.1 Data Collection and Information Management Systems
				5.3.1.1 Collection Strategy for Data
			5.3.2 Design Elements for Database Framework
			5.3.3 Preparing Elements
				5.3.3.1 Access Model
				5.3.3.2 Proficient Handling Procedure
				5.3.3.3 Versatile Query Handling, Streamlining and Optimization
		References
	Chapter 6: Machine Learning for IoT Systems
		6.1 Introduction
		6.2 IoT Overview
		6.3 Machine Learning Taxonomy
			6.3.1 Supervised Learning
			6.3.2 Unsupervised Learning
			6.3.3 Reinforcement Learning
			6.3.4 Evolutionary Computation
			6.3.5 Fuzzy Logic
		6.4 Machine Learning for IoT Basic Operation
			6.4.1 Node Localization
			6.4.2 Clustering
			6.4.3 Routing
			6.4.4 Data Aggregation
		6.5 Machine Learning for IoT Performance Aspects
			6.5.1 Congestion Control
			6.5.2 Fault Detection
			6.5.3 Resource Management
			6.5.4 Security
		6.6 Concluding Remarks
		References
	Chapter 7: Supervising Data Transmission Services Using Secure Cloud Based Validation and Admittance Control Mechanism
		7.1 Introduction
		7.2 Objectives and Challenges of Cloud Based Data Transmission Research
			7.2.1 Objectives
			7.2.2 Challenges
		7.3 Access Control Mechanisms of Data Transmission Using Cloud Services
			7.3.1 Securing Virtual Machines
		7.4 Governance and Operations in Cloud Computing Environment
		7.5 Security Issues for Cloud Servers and Transmission Systems
			7.5.1 Security Concerns in Data/Video Transmission Through Cloud Server
			7.5.2 Transportation System Requirements
			7.5.3 Secure Cloud Test Setup Model
			7.5.4 Performance Evaluation
		7.6 Conclusions
		References
Part III: IoT Challenges and Issues
	Chapter 8: Tackling Jamming Attacks in IoT
		8.1 Introduction
		8.2 Literature Survey
		8.3 Proposed Study
			8.3.1 Notations Used in the Study
			8.3.2 Assumptions Made in the Study
			8.3.3 Creating Awareness
			8.3.4 Identifying the Jammer Location
			8.3.5 Choosing Appropriate Path for Delivery
		8.4 Analysis of the Work
			8.4.1 Energy Consumption
			8.4.2 Taking Jammer into Confidence
			8.4.3 Communication Overhead
			8.4.4 Simulation of the Work
		8.5 Conclusion
		References
	Chapter 9: Bioinspired Techniques for Data Security in IoT
		9.1 Introduction
		9.2 Data Security in IoT
		9.3 Bioinspired Computing
			9.3.1 Relationship Between Traditional and Bio-Inspired Data Security
			9.3.2 Achieving Security in IoT Using Bioinspired Techniques
			9.3.3 Types of Bioinspired Computing Algorithms
		9.4 Different Approaches for Data Security in IoT Using Bioinspired Computing
			9.4.1 Ant Colony Optimization (Birattari et al. 2007; Dorigo and Birattari 2011)
				9.4.1.1 Routing Protocols Derived from Ant Colony Optimization for Data Security in IoT (Liu 2017)
					Types of ACO Inspired Routing in WSNs
					Behavior of Operation
					Main Aim
					Topology of Network
					Probability Transition
				9.4.1.2 Ant Colony Approach to Solve Travelling Salesman Problem (Beckers et al. 1992; Bolondi and Bondanza 1993)
					Ant Specific Algorithm
			9.4.2 Genetic Bee Colony (GBC) Algorithm (Alshamlan et al. 2015)
				9.4.2.1 Bee Colony Algorithm Used for Data Security Using Routing System Protocols (Okdem et al. 2011)
					Fire Evacuation Routing and Artificial Bee Colony Optimization (BCO)
					Bee Colony Algorithm and Applications
					Finding Fire Evacuation Route Using BCO Algorithm
					Optimal Routing Solution for Fire Evacuation
				9.4.2.2 Dependable Data Gathering in IoT Using Bee Colony (Najjar-Ghabel et al. 2018)
					The Proposed Model
					Reliable Spanning Tree-Based Data Gathering in IoT
			9.4.3 Firefly Algorithm (Yang 2008)
				9.4.3.1 Analysis of Performance Using Firefly Algorithm Used for the Purpose of Data Clustering (Banati and Bajaj 2013)
					Analysis of Performance
					Using Artificial Data Sets
					Using Real World Data Sets
					Percentage of Success
				9.4.3.2 Security System for Image in IoT with High Performance (Alam et al. 2013; Suwetha et al. 2017)
					Methodology
					Image Hiding Using Firefly Algorithm
					Process of Hiding Images
		9.5 Conclusion
		References
	Chapter 10: A Chaos-Based Multi-level Dynamic Framework for Image Encryption
		10.1 Introduction
		10.2 Background
			10.2.1 Chaos in Cryptography
			10.2.2 Survey on Dynamism in Encryption
		10.3 Proposed Approach
			10.3.1 Description of the Proposed Framework
			10.3.2 Description of Per-round Operations
			10.3.3 Definition of Diffusion Stage
			10.3.4 Key Description
		10.4 Results
			10.4.1 NPCR, UACI and Co-relation Coefficient
			10.4.2 Histogram and Entropy
			10.4.3 Avalanche Properties
			10.4.4 NIST Statistical Test Suite for Randomness
			10.4.5 Resistance Against Known/Chosen Plaintext Attacks & Differential Cryptanalysis
		10.5 Conclusion & Future Scope
		References
	Chapter 11: Privacy Challenges and Their Solutions in IoT
		11.1 Introduction
		11.2 Privacy Requirements for IoT
		11.3 IoT Privacy Research Analysis
		11.4 Security and Privacy Concerns/Challenges
		11.5 Theoretical Solutions Provided for IoT Technology
		11.6 Privacy or Security Solutions from Technical and Industry Areas
			11.6.1 Impact of Security in Heterogeneous Environment
			11.6.2 Industrial Solutions
				11.6.2.1 Security Embedded with Respect to IOT Design
				11.6.2.2 Data Minimization
				11.6.2.3 Transparency Among Consumers
		11.7 Conclusion
		References
Part IV: The IoT World of Applications
	Chapter 12: Mobile Computing and IoT: Radio Spectrum Requirement for Timely and Reliable Message Delivery Over Internet of Vehicles (IoVs)
		12.1 Introduction
		12.2 System Model
			12.2.1 MAC Layer Models
				12.2.1.1 CSMA/CA Based MAC Algorithm
				12.2.1.2 STDMA Based MAC Algorithm
			12.2.2 PHY Layer Model
		12.3 Performance Analysis
			12.3.1 Safety Message Transmission (MAC-to-MAC) Delay
			12.3.2 Simulation Setup
			12.3.3 Simulation Settings and Assumptions
			12.3.4 Results and Discussion
				12.3.4.1 Probability of Message Reception Failure
				12.3.4.2 Safety Message Transmission Delay
		12.4 Conclusion
		References
	Chapter 13: Single Activity Recognition System: A Review
		13.1 Introduction
		13.2 Smart Home Assisted Living System
		13.3 Assisted Living System for Energy Saving
		13.4 Assisted Living System for Health Care
		13.5 Assisted Living System for Safety and Security
		13.6 Assisted Living System for Anomalous Situation Detection
		13.7 Assisted Living System for Monitoring Daily Activities
		13.8 Activity Recognition in Smart Home Assisted Living
		13.9 Communication System in Smart Home Assisted Living
		13.10 Conclusion
		References
	Chapter 14: Deep Learning and IoT for Agricultural Applications
		14.1 Introduction
		14.2 IoT in Agriculture
		14.3 Deep Learning Overview
		14.4 Deep Learning for Smart Agriculture: Concepts, Algorithms, Frameworks and Applications
			14.4.1 Common Deep Learning Algorithms
				14.4.1.1 Convolutional Neural-Network (CNN)
				14.4.1.2 Recurrent Neural Networks (RNN)
				14.4.1.3 Generative Adversarial Networks (GAN)
				14.4.1.4 Long- Short Term Memory (LSTM)
			14.4.2 Deep Learning Frameworks
				14.4.2.1 TensorFlow
				14.4.2.2 Caffe (Convolution Architecture for Feature Extraction)
				14.4.2.3 PyTorch
				14.4.2.4 Theano
		14.5 Applications of Deep Learning in Agriculture
		14.6 Conclusion
		References
	Chapter 15: IoT for Crowd Sensing and Crowd Sourcing
		15.1 Introduction
		15.2 Internet of Things
		15.3 Crowdsourcing
		15.4 Classification of Crowdsourcing
			15.4.1 Collective Intelligence for Problem Solving
			15.4.2 Learning paradigms
			15.4.3 Open Innovation
			15.4.4 New Product Development or Crowd Creation
			15.4.5 Collaborative Initiative Through Crowd Funding
			15.4.6 Crowd Voting
			15.4.7 Crowd Curation
			15.4.8 User-Generated Content (UGC)
			15.4.9 Crowd Labour
		15.5 Applications of Crowdsourcing in India
		15.6 Crowd Sensing
		15.7 Industry Initiatives
			15.7.1 Challenges Faced by the Industry
		15.8 Conclusion
		References
	Chapter 16: Smart Infrastructures
		16.1 Introduction
		16.2 Smart City
			16.2.1 Components of smart city
				16.2.1.1 Smart Parking
				16.2.1.2 Smart Traffic
					The Need for Smart Traffic Systems
					IOT Based Smart Traffic System
					Smart Lighting
					Smart Hospitals
					Smart Waste Disposal
						IOT Based Smart Waste Disposal System
		16.3 Smart Home
			16.3.1 Purpose of Home Automation
		16.4 Conclusion
		References
Part V: IoT for Smart Cities
	Chapter 17: IoT Application for Smart Cities Data Storage and Processing Based on Triangulation Method
		17.1 Introduction
		17.2 Overview of Related Research
		17.3 Data Processing and Storing in Java NetBeans Environments
		17.4 Triangulation Method for Data Storage in Smart City Space
		17.5 Triangulation Method for Data Processing in Smart City Space
		17.6 Discussion
		17.7 Conclusion
		References
	Chapter 18: Intelligent Environment Protection
		18.1 Introduction
			18.1.1 Environment Protection
			18.1.2 Preventing the Environment Degradation
		18.2 Environmental Issues
			18.2.1 Unauthorized Waste Dumping
			18.2.2 Constitutional Nuisance
			18.2.3 Unregulated Usage of Natural Resources
		18.3 Monitoring of Environmental Hazards
		18.4 Intelligent Environment
			18.4.1 Physical Layer of the IoT Eco-System
			18.4.2 Middleware Layer of the IoT Eco-System
			18.4.3 Security Layer of the IoT Eco-System
			18.4.4 Diagnosis Layer of the IoT Eco-System
		18.5 Protection Policies
			18.5.1 Regulatory Method of Environmental Policy
			18.5.2 Economical Method of Environmental Policy
			18.5.3 Voluntary Method of Environmental Policy
			18.5.4 Education & Information Method of Environmental Policy
		18.6 Conclusions
		References
	Chapter 19: A Decade Survey on Internet of Things in Agriculture
		19.1 Introduction
		19.2 Preliminary Research
			19.2.1 Agriculture
				19.2.1.1 Definition
				19.2.1.2 Branches of Agriculture
				19.2.1.3 Top 10 Agriculture Based Economies
				19.2.1.4 Technologies Associated with Agriculture
			19.2.2 IOT
				19.2.2.1 Definition
				19.2.2.2 Framework
				19.2.2.3 Issues and Challenges
				19.2.2.4 Applications
		19.3 Literature Survey
			19.3.1 Crop Cultivation
			19.3.2 Livestock Production
			19.3.3 Agronomics
			19.3.4 Agriculture Engineering
		19.4 Conclusion
		References
	Chapter 20: Intelligent Healthcare Solutions
		20.1 Introduction
		20.2 IT Platforms in Healthcare
			20.2.1 Device Layer
			20.2.2 Network Layer
			20.2.3 Application Layer
		20.3 Handling Data
			20.3.1 Device Centric
			20.3.2 Gateway Centric
			20.3.3 Fog Centric
			20.3.4 Cloud Centric
			20.3.5 Intelligent Approaches Towards Data Processing
			20.3.6 Data Validation
		20.4 Personalised Healthcare Systems
		20.5 Conclusion
		References
	Chapter 21: Smart Car – Accident Detection and Notification Using Amazon Alexa
		21.1 Introduction
		21.2 Related Work
		21.3 Proposed System
		21.4 Proposed Algorithm
		21.5 Experimental Issues
		21.6 Results and Analysis
			21.6.1 Simulation for Moving Car Accident
		21.7 Conclusion
		References
	Chapter 22: Prioritisation of Challenges Towards Development of Smart Manufacturing Using BWM Method
		22.1 Introduction
		22.2 Literature Review
			22.2.1 Overview of Smart Manufacturing
			22.2.2 Smart Manufacturing Related Studies
		22.3 Research Methodology
		22.4 Result
			22.4.1 Identification of Challenges in Smart Manufacturing
			22.4.2 Prioritisation of the Challenges Towards Development of Smart Manufacturing
		22.5 Discussion on Results
		22.6 Conclusion, Limitations and Future Scope
		References
Part VI: Next Generation Smart Applications
	Chapter 23: Surveillance of Type –I & II Diabetic Subjects on Physical Characteristics: IoT and Big Data Perspective in Healthcare @NCR, India
		23.1 Introduction
			23.1.1 Role of Big Data in Healthcare
				23.1.1.1 Big Data Characteristics and Its Benefits in Healthcare
				23.1.1.2 The Future of Healthcare Big Data
				23.1.1.3 Role of Big Data in IoT
				23.1.1.4 Big Data Tools
				23.1.1.5 Big Data Security
			23.1.2 IoT
				23.1.2.1 Origin of IoT
				23.1.2.2 Applications of IoT
				23.1.2.3 Applying Internet of Things (IoT) for Healthcare
				23.1.2.4 Healthcare Applications of IoT
				23.1.2.5 Critical Issues and Challenges of IoT in Healthcare
				23.1.2.6 Examples of IoT Services in Healthcare
			23.1.3 Artificial Intelligence (AI) & Machine Learning (ML)
			23.1.4 Tension Type and Chronic Headache
				23.1.4.1 TTH Treatment
				23.1.4.2 TTH Preventions
			23.1.5 Diabetes Mellitus and Its Types
				23.1.5.1 Facts for Diabetes Cause Tension Type Headache
				23.1.5.2 Diabetes and Headaches
			23.1.6 Hypoglycemia (Low Blood Sugar)
				23.1.6.1 Hypoglycemia and Diabetes
				23.1.6.2 Hypoglycemia and Headaches
				23.1.6.3 Hyperglycemia and Its Causes
				23.1.6.4 Hyperglycemia and Headaches
				23.1.6.5 The Cases When to See a Doctor
			23.1.7 Depression
				23.1.7.1 Depression: Sign and Symptoms
				23.1.7.2 Depression Causes
				23.1.7.3 Depression Treatment
			23.1.8 Obesity
			23.1.9 CAD
				23.1.9.1 CAD Causes
				23.1.9.2 CAD Symptoms
				23.1.9.3 CAD Treatment
			23.1.10 Insulin
		23.2 Literature Survey
		23.3 Our Experimental Results, Interpretation and Discussion
			23.3.1 Experimental Setup
			23.3.2 About the Study and Analysis
		23.4 Novelty in Presented Work
		23.5 Future Scopes, Limitations and Possible Applications
		23.6 Recommendations and Future Considerations
		23.7 Conclusions
		References
	Chapter 24: Monitoring System Based in Wireless Sensor Network for Precision Agriculture
		24.1 Introduction
		24.2 Related Work
			24.2.1 Agricultural Monitoring System
		24.3 Wireless Sensor Network for Precision Agriculture Application
			24.3.1 System Overview
			24.3.2 Routing Protocol
		24.4 Experimental Results and Discussion
			24.4.1 Packet Delivery Ratio: PDR
			24.4.2 Average Energy Consumption per Node
			24.4.3 Network Lifetime
		24.5 Conclusion
		References
	Chapter 25: Securing E-Health IoT Data on Cloud Systems Using Novel Extended Role Based Access Control Model
		25.1 Introduction to Internet of Things
			25.1.1 Internet of Things
			25.1.2 Key Fundamentals of Internet of Things
			25.1.3 Architecture of IoT
			25.1.4 Standards of IoT Applications
		25.2 Role of IoT in Health Care Systems
		25.3 Background
		25.4 Access Control and Authorization Using Role Based Access Control (RBAC)
			25.4.1 Rules for Defining RBAC
			25.4.2 RBAC Reference Models
		25.5 Security Healthcare Model Based on Extended RBAC
			25.5.1 Extended Role Based Model (ERBAC)
			25.5.2 Proposed Security Model for Storage of Medical IoT Data Using ERBAC
		25.6 Conclusion
		References
	Chapter 26: An Efficient Approach towards Enhancing the Performance of m-Health Using Sensor Networks and Cloud Technologies
		26.1 Introduction
		26.2 Literature Review
		26.3 The Pillars and Paradigms of Mobile Health Systems
		26.4 Proposed Architecture of Mobile Health System
			26.4.1 Awareness Layer
			26.4.2 Middleware and Application Programme Interface Layer
			26.4.3 E-Mobile Health Application and Service Layer
		26.5 Results and Discussions
			26.5.1 Services Provided by Proposed Cloud and IoT Based Healthcare System
				26.5.1.1 Cloud Data Management and Storage Services
				26.5.1.2 Hospital Services
				26.5.1.3 Emergency and Urgent Response Services
				26.5.1.4 Online Health Advice and Necessary Action Services
				26.5.1.5 Online Patient Monitoring Services
			26.5.2 Online Monitoring the Performance of Cloud and IoT Based Healthcare Systems
		26.6 Conclusions
		References
	Chapter 27: Future Internet of Things (IOT) from Cloud Perspective: Aspects, Applications and Challenges
		27.1 Introduction
		27.2 Background
			27.2.1 Understanding IoT
			27.2.2 IoT and Its Relation with Cloud
		27.3 Application of IoT
			27.3.1 Smart Home
			27.3.2 Wearables Technologies
			27.3.3 Smart City
			27.3.4 Smart Grids
			27.3.5 Industrial Internet
			27.3.6 Connected Car
			27.3.7 Connected Health (Digital Health/Tele Health/Tele Medicine)
			27.3.8 Smart Retail
			27.3.9 Smart Supply Chain
			27.3.10 Smart Farming
			27.3.11 Smart Factories
			27.3.12 Smart Food Industry
		27.4 Future of IoT
			27.4.1 IoT Network in Future
		27.5 Conclusion
		References




نظرات کاربران