ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Internet of Things: 5th The Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20–23, 2022, Revised Selected Papers

دانلود کتاب اینترنت اشیا: پنجمین اجلاس جهانی اینترنت اشیا، GIoTS 2022، دوبلین، ایرلند، 20 تا 23 ژوئن 2022، مقالات منتخب اصلاح شده

Internet of Things: 5th The Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20–23, 2022, Revised Selected Papers

مشخصات کتاب

Internet of Things: 5th The Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20–23, 2022, Revised Selected Papers

ویرایش:  
نویسندگان: , , , ,   
سری: Lecture Notes in Computer Science, 13533 
ISBN (شابک) : 3031209354, 9783031209352 
ناشر: Springer 
سال نشر: 2023 
تعداد صفحات: 431
[432] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 50 Mb 

قیمت کتاب (تومان) : 49,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 8


در صورت تبدیل فایل کتاب Internet of Things: 5th The Global IoT Summit, GIoTS 2022, Dublin, Ireland, June 20–23, 2022, Revised Selected Papers به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب اینترنت اشیا: پنجمین اجلاس جهانی اینترنت اشیا، GIoTS 2022، دوبلین، ایرلند، 20 تا 23 ژوئن 2022، مقالات منتخب اصلاح شده نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب اینترنت اشیا: پنجمین اجلاس جهانی اینترنت اشیا، GIoTS 2022، دوبلین، ایرلند، 20 تا 23 ژوئن 2022، مقالات منتخب اصلاح شده

این کتاب شامل مقالات منتخب اصلاح شده از جلسات داوری پنجمین اجلاس جهانی اینترنت اشیا، GIoTS 2022 است که در دوبلین، ایرلند، در 20 تا 23 ژوئن 2022 برگزار شد. 
33 مقاله کامل موجود در این مقاله کتاب با دقت بررسی شد و از بین 75 مورد ارسالی انتخاب شد. آنها در بخش های موضوعی به شرح زیر سازماندهی شدند: فناوری های فعال کننده اینترنت اشیا. برنامه های کاربردی اینترنت اشیا، خدمات و پیاده سازی واقعی؛ امنیت اینترنت اشیا، حریم خصوصی و حفاظت از داده ها؛ و آزمایش‌های آزمایشی، آزمایش‌ها و نتایج آزمایش‌های اینترنت اشیا.


توضیحاتی درمورد کتاب به خارجی

This book constitutes revised selected papers from the refereed proceedings of the 5th The Global IoT Summit, GIoTS 2022, which took place in Dublin, Ireland, in June 20–23, 2022. 
The 33 full papers included in this book were carefully reviewed andselected from 75 submissions. They were organized in topical sections as follows: ioT enabling technologies; ioT applications, services and real implementations; ioT security, privacy and data protection; and ioT pilots, testbeds and experimentation results.



فهرست مطالب

Preface
Organization
Contents
IoT Enabling Technologies
Overview of Drone Communication Requirements in 5G
	1 Introduction
	2 Applications of Drones
	3 Essential Parameters for Drone Communication and Navigation
		3.1 Government Rules and Regulations
		3.2 Technical Parameters
		3.3 3GPP Vision
	4 Related Work
	5 Role of 5G in Drone Applications
	6 Conclusion
	References
Accurate Indoor Positioning Based on Beacon Weighting Using RSSI
	1 Introduction
	2 Related Studies
	3 Proposed Method
	4 Implementation and Experimentation
	5 Results and Evaluation
	6 Discussions
	7 Conclusion
	References
Adaptive Data-Driven Routing for Edge-to-Cloud Continuum: A Content-Based Publish/Subscribe Approach
	1 Introduction
	2 Related Work
	3 Adaptive Data-Driven Routing Architecture for the ECC
		3.1 ECC Topology Setup
		3.2 Data Routing Mechanism
	4 Content-Based Publish/Subscribe for Adaptive Data-Driven Routing
	5 Case Study: Federated Learning for Digital Twins
	6 Evaluation Study
		6.1 Performance Evaluation Scenarios
		6.2 Evaluation Results
	7 Conclusion and Future Work
	References
Online Decentralized Frank-Wolfe: From Theoretical Bound to Applications in Smart-Building
	1 Introduction
		1.1 Our Contribution
		1.2 Related Work
	2 Conditional Gradient Based Algorithm
		2.1 Preliminaries and Notations
		2.2 An Algorithm with Exact Gradients
		2.3 Algorithm with Stochastic Gradients
	3 Experiments
		3.1 Prediction Performance
		3.2 Effect of Network Topology
		3.3 Effect of Decentralization
	4 Concluding Remarks
	References
IntellIoT: Intelligent IoT Environments
	1 Introduction
	2 Next Generation IoT Use Cases
		2.1 Autonomous Operation of Agriculture Vehicle Fleets
		2.2 Collaborative Intelligence for Remote Patient Monitoring
		2.3 Autonomous Collaboration of Production Machines
	3 A Next Generation IoT Framework: The IntellIoT Approach
		3.1 Distributed, Self-aware, Semi-autonomous IoT Applications
		3.2 Autonomy Defined by a Human-in-the-Loop
		3.3 Efficient, Reliable and Trustworthy Computation and Communication Infrastructure
		3.4 Bringing All Together - The IntellIoT High-Level Architecture
	4 State of the Art and Research Challenges
		4.1 Autonomy and Distributed Intelligence
		4.2 Next Generation IoT Computation and Communication Infrastructure
		4.3 Humans and Trust in Intelligent IoT
	5 Conclusions and Future Work
	References
An Interoperable Framework for Heterogeneous IoT infrastructure to Unlock Data Value
	1 Introduction
	2 Problem Statement
	3 Proposed Framework Architecture
	4 Data Model
		4.1 Devices Information Model
		4.2 Interface Model
		4.3 OPC-UA Interfaces ObjectType for Sensor Device
	5 Provisioning Server for Fixable Device Connectivity
	6 Conclusion
	References
Task Offloading in Computing Continuum Using Collaborative Reinforcement Learning
	1 Introduction
	2 Related Work
	3 Task Assignment Problem
		3.1 System Model
		3.2 Problem Definition
	4 RL-Based Task Offloading Algorithm
	5 Performance Evaluation
		5.1 Methodology
		5.2 Experiment Setup
		5.3 Metrics
		5.4 Compared Methods
		5.5 Experimental Results and Analysis
	6 Conclusion
	References
Assessing Efficiency Benefits of Edge Intelligence
	1 Introduction
	2 Methods
		2.1 Devices, Models, and Frameworks
		2.2 Power and Energy Measurements
		2.3 Recognition Gradient
	3 Results
		3.1 Energy and Accuracy
		3.2 Energy-Precision Ratio
		3.3 Recognition Efficiency
		3.4 Cloud-Centric and Federated Learning
		3.5 Life Cycle Aspects
	4 Discussion, Summary, and Outlook
		4.1 Discussion
		4.2 Summary and Outlook
	References
IoT Applications, Services and Real Implementations
A Smart IoT Gateway Capable of Prescreening for Atrial Fibrillation
	1 Introduction
		1.1 Existing Techniques for AF Detection
	2 Data Preparation
		2.1 Data Source
		2.2 Prepossessing
	3 Deep Learning Models
		3.1 Development
		3.2 Deployment
		3.3 Gateway
	4 Results
	5 Analysis
	6 Conclusions
	References
Internet of Things with Web Technologies Solution for Flood Notification in São Paulo
	1 Introduction
	2 Objective
	3 System Architecture
		3.1 API, Sensors, and Web Server
		3.2 Notifications Web Application
		3.3 Public Website
		3.4 Administrative Web Interface
	4 Results
	5 Future Work
	References
Wi-Monitor: Wi-Fi Channel State Information-Based Crowd Counting with Lightweight and Low-Cost IoT Devices
	1 Introduction
	2 Background and Related Work
		2.1 CSI-Based Crowd Counting
		2.2 Related Work
	3 Problems
	4 System Design
		4.1 CSI Data Extraction
		4.2 Noise Removal
		4.3 DNN Model Building
	5 Evaluation
		5.1 Scenario 1: In a Corridor
		5.2 Scenario 2: In a Meeting Room
		5.3 Discussion
	6 Conclusion
	References
Design of a Next-Generation Interoperable Cognitive Port Solution
	1 Introduction
	2 Context, Motivation and Related Work
	3 Design of the Proposed Solution
		3.1 Data Access Component
		3.2 Data Processing Services
		3.3 Data Analytics Services and Cognitive Applications
	4 Use Case Driven Validation
		4.1 Provision of Data
		4.2 Data Analytics
	5 Future Work and Conclusions
	References
Conceptual Framework of Contact-Less Consumer Products Industry During and Post-pandemic Era
	1 Introduction
	2 Conceptual Framework of Contact-Less Consumer Products Industry
		2.1 Physical Layer
		2.2 Digital Twins Layer
		2.3 Industrial Technologies Layer
		2.4 Contact-Less Remote Applications Layer
	3 Contact-Less Delivery Service for Consumer Products Industry During and Post-pandemic Era
	4 Open Challenges and Discussion
	5 Conclusion
	References
Blockchain for Economy of Scale in Wind Industry: A Demo Case
	1 Introduction
		1.1 The Fastener Lifecycle: Events and Data-Points in the Blockchain
	2 Business and Sustainability Implications of Blockchain Technology in Large Scale Wind Turbine Setups
	3 Realization of Demonstrator in Controlled Environment
		3.1 Overall High-Level Architecture
		3.2 Demonstrator Realization and Code Snippet
	4 Conclusions
	References
Sleep Stage Detection on a Wearable Headband Using Deep Neural Networks
	1 Introduction
	2 Background
	3 Methodology
		3.1 Experimental Setup
	4 Sleep Stage Detection Model
		4.1 Data Preprocessing
		4.2 Deep Learning Model
		4.3 Model Results
	5 Conclusion
	References
A Comparative Study on Energy Consumption Models for Drones
	1 Introduction
	2 Background: Drone Power Models
		2.1 D'Andrea Energy Model
		2.2 Dorling et al. Energy Model
		2.3 Stolaroff et al. Energy Model
		2.4 Kirchstein Energy Model
		2.5 Tseng Energy Model
	3 Data-Driven Model and Proposed LSTM Architecture
		3.1 Problem Statement
		3.2 Experimental Dataset
		3.3 System Architecture
	4 Results and Discussion
		4.1 Performance Evaluation
		4.2 Sensitivity Analysis
	5 Conclusion
	References
ConQeng: A Middleware for Quality of Context Aware Selection, Measurement and Validation
	1 Introduction
	2 Motivating Scenario
	3 Related Work
	4 ConQeng's Design and Process
	5 Implementation and Simulation Setup
	6 Evaluation and Results
	7 Conclusion and Future Work
	References
Automating Heterogeneous IoT Device Networks from Multiple Brokers with Multiple Data Models
	1 Introduction
	2 Requirements Analysis and Related Work
	3 The Role of IoT Directory in Snap4City Architecture
		3.1 Registration of IoT Devices on Internal Brokers
		3.2 Discovering and Registering IoT Devices from External Brokers
	4 Validation Experiments
	5 Conclusions
	References
A Persuasive System for Stress Detection and Management in an Educational Environment
	1 Introduction
	2 Persuasive System
		2.1 Architecture
		2.2 Methodology
	3 Study Design
	4 Results
	5 Conclusions
	References
Domain Generalization on Constrained Platforms: On the Compatibility with Pruning Techniques
	1 Introduction
	2 Background
		2.1 Single Domain Generalization
		2.2 Neural Network Pruning
	3 Experiments on Digit Recognition Benchmark
		3.1 Datasets and Setup
		3.2 Unstructured Pruning at Initialization
		3.3 Iterative Unstructured Pruning
		3.4 Iterative Structured Pruning
	4 Experiments on RealWorld HAR Dataset
		4.1 Datasets and Setup
		4.2 Impact of the Pruning Settings
	5 Conclusion
	References
IoT Security, Privacy and Data Protection
A Low-Overhead Approach for Self-sovereign Identity in IoT
	1 Introduction
	2 Related Work
	3 Background
		3.1 Self-sovereign Identity
		3.2 Swarm
	4 Proposal
		4.1 Self-sovereign Identification and Communication of IoT Agents
		4.2 The Swarm DID Method
		4.3 Optimized DDo Serialization with CBOR-DI
		4.4 Secure Communication with DIoTComm
		4.5 Implementation
	5 Evaluation
		5.1 DID and DDo sizes
		5.2 Secure Envelope Overhead
	6 Conclusion
	References
An Analysis of Process Parameters for the Optimization of Specific Emitter Identification Under Rayleigh Fading
	1 Introduction
	2 Background
		2.1 Signal Collection, Detection & Pre-processing
	3 Methodology
		3.1 Filter Design
		3.2 Multipath Channel Model
		3.3 Nelder-Mead Channel Estimation and Equalization
		3.4 RF Fingerprint Generation
		3.5 Radio Classification
	4 Results
		4.1 Filter Analysis: Average Squared Error
		4.2 Filter Analysis: Average Percent Correct Classification
		4.3 Gabor Analysis Window Width
		4.4 Candidate Signal Set Analysis
		4.5 Parallel Optimization
		4.6 SEI Performance
		4.7 Comparison with State of the Art
	5 Conclusion
	References
Secure Image Data Storage and Transmission Using ESP32-Cam and Raspberry Pi with Steganography
	1 Introduction
		1.1 BPCS (Bit Plane Complexity Segmentation)
		1.2 LSB (Least Significant Bit)
		1.3 Haar Discrete Wavelet Transform
		1.4 AES (Advanced Encryption Standard)
		1.5 RGB (Red, Green and Blue)
	2 Literature Review
	3 Construction
	4 Result
	5 Conclusion
	6 Future Scope
	References
Modelling of Resource-Aware Information Flows for Resource Constraint IoT Devices
	1 Introduction
	2 Related Work
	3 Information Exchange Model
		3.1 Information Flow F
		3.2 Devices and Resources Concept
		3.3 Performance Concept
		3.4 Security Specification and Configuration Concept
	4 High-level Security Policy Language (HSPL) to IEM Transformation
		4.1 Element Identification
		4.2 Grouping Modes
		4.3 Resource Annotation
	5 Implementation
	6 Conclusion and Future Work
	References
IRIS Advanced Threat Intelligence Orchestrator- A Way to Manage Cybersecurity Challenges of IoT Ecosystems in Smart Cities
	1 Introduction
		1.1 Data Sources in Smart Cities
		1.2 State of the Art of Tools Used into SOAR
		1.3 SOAR Solutions
		1.4 SOAR Benefits
	2 Specifications of Advance Threat Intelligence Orchestrator
		2.1 Orchestrator’s Subcomponents
		2.2 Technologies
		2.3 Failed SSH Login Scenario
		2.4 Stakeholders Communication Through Orchestrator
	3 Conclusions
	References
Federated Learning-Based IoT Intrusion Detection on Non-IID Data
	1 Introduction
	2 Background
		2.1 Internet of Things
		2.2 Federated Learning
		2.3 Intrusion Detection
	3 A Data Sharing Strategy for IoT IDS Based on Federated Learning
	4 Evaluation Methodology
		4.1 Data Description
		4.2 Experimental Setup
		4.3 Evaluation Metrics
	5 Experimentation Result
		5.1 Federated Learning in IoT Intrusion Detection Baseline Scenarios
		5.2 Clusters of Trust vs Globally Shared Data
	6 Conclusions
	References
A Holistic Approach for IoT Networks’ Identity and Trust Management – The ERATOSTHENES Project
	1 Introduction
		1.1 Internet of Things, Status and Applications
		1.2 Risk Impediments to IoT Evolution
		1.3 The ERATOSTHENES Project
	2 Industrial Requirements over Digital Identity and Trust
		2.1 Industrial Orientation of ERATOSTHENES
	3 ERATOSTHENES IoT Lifecycle Approach for Trust and Identity Management
	4 Upcoming Work and Next Steps
	References
ARCADIAN-IoT - Enabling Autonomous Trust, Security and Privacy Management for IoT
	1 Introduction
	2 Related Work
	3 ARCADIAN-IoT Framework
		3.1 Overview
		3.2 Horizontal Planes
		3.3 Vertical Planes
	4 Reference Use Cases
		4.1 Domain A: Emergency and Vigilance Using Drones
		4.2 Domain B: Grid Infrastructure Monitoring
		4.3 Domain C: Medical IoT for Remote Monitoring of Patients
		4.4 Common Trust, Security and Privacy Management Challenges
	5 Conclusions
	References
IoT Pilots, Testbeds and Experimentation Results
GAIA 5G: A Multi-access Smart-Campus Architecture
	1 Introduction
	2 Background
	3 GAIA 5G: A Smart-Campus Architecture
		3.1 Technical Description
	4 Use Cases
		4.1 5G Connectivity
		4.2 NFV Management
		4.3 Cybersecurity
	5 Conclusion
	References
IoT Device for Reduction of Roe Deer Fawn Mortality During Haymaking
	1 Introduction
		1.1 Motivation
		1.2 Structure
	2 Related Work
		2.1 Available Methods for Detection and Rescue of Fawns
		2.2 Auditory and Visual Sensitivity of Roe Deer
	3 Implementation
		3.1 Network Overview
		3.2 Wireless Communication
		3.3 Web Application
		3.4 Design of Field Effectors
	4 Evaluation
		4.1 Scaring Effectiveness
	5 Conclusion
	References
Latency and Energy Consumption of Convolutional Neural Network Models from IoT Edge Perspective
	1 Introduction
	2 System Setup and Methodology
		2.1 Hardware
		2.2 Convolutional Neural Network Models and Classification Patterns
		2.3 Measurements
	3 Results
		3.1 Edge Processing
		3.2 Cloud Processing
		3.3 Edge Versus Cloud Processing
	4 Conclusion and Future Work
	References
Industry-Academia Cooperation: Applied IoT Research for SMEs in South-East Sweden
	1 Introduction
	2 The Applied IoT Lab
	3 Education and Industry-Academic Cooperation
		3.1 Workshops
		3.2 Pilot Cases
	4 Lessons Learned
	5 Conclusion
	References
Experiment to Scope Low Carbon Electricity Based Additive Manufacturing with IoT
	1 Introduction
	2 Methodology
		2.1 Deploying the Experimental Setup
	3 Results
		3.1 Energy Consumption Data
	4 Discussion
		4.1 CO2 Emissions Data for Integration
		4.2 Limitations
	5 Conclusion
	References
Author Index




نظرات کاربران