دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Sundresan Perumal, Mujahid Tabassum, Moolchand Sharma, Saju Mohanan سری: Future Generation Information Systems ISBN (شابک) : 1032392657, 9781032392653 ناشر: CRC Press سال نشر: 2022 تعداد صفحات: 239 [240] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 46 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Next Generation Communication Networks for Industrial Internet of Things Systems به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه های ارتباطی نسل بعدی برای سیستم های صنعتی اینترنت اشیا نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب فناوری اینترنت اشیا (IoT) و راه حلهای مرتبط با امنیت را ارائه میکند که از فناوریهای پردازش هوشمند داده و رویکردهای یادگیری ماشین (ML) برای تجزیه و تحلیل دادهها استفاده میکند. این سناریوهای عملی از صنعت برای استفاده از اینترنت اشیا در حوزه های مختلف ارائه می دهد. شبکه های ارتباطی نسل بعدی برای سیستم های صنعتی اینترنت اشیا مفاهیم و چالش های تحقیقاتی در شبکه های ارتباطی برای سیستم های اینترنت اشیاء صنعتی را ارائه می دهد.
ویژگی ها:
به عنوان یک متن مرجع ایده آل برای دانشجویان ارشد، دانشجویان کارشناسی ارشد و محققان دانشگاهی در زمینه های مهندسی برق، الکترونیک و مهندسی ارتباطات، مهندسی کامپیوتر و فناوری اطلاعات.
This book presents Internet of Things (IoT) technology and security-related solutions that employ intelligent data processing technologies and machine learning (ML) approaches for data analytics. It presents practical scenarios from the industry for the application of the internet of things in various domains. Next Generation Communication Networks for Industrial Internet of Things Systems presents concepts and research challenges in communication networking for Industrial internet of things systems.
Features:
It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in the areas of electrical engineering, electronics, and communications engineering, computer engineering, and information technology.
Cover Half Title Series Page Title Page Copyright Page Dedication Table of Contents Preface About the Book Editors Contributors Chapter 1: Fuzzy logic applications in healthcare: A review-based study 1.1 Introduction 1.1.1 Fuzzy logic 1.1.2 Structure of fuzzy logic 1.2 Applications of fuzzy logic techniques in medical domain 1.2.1 Neuro-fuzzy system 1.2.2 Fuzzy-based dynamic release of healthcare datasets 1.3 Internet of Things 1.3.1 IoT in healthcare 1.3.2 Internet of Things in monitoring the health 1.4 Implications and benefits of fuzzy logic in healthcare industry 1.5 A roadmap of fuzzy logic applications in healthcare 1.6 Some findings 1.7 Conclusion 1.8 Future scope References Chapter 2: A comparative study of certificate and certificate-less cryptographic algorithm and its energy consumption analysis in WSN 2.1 Introduction 2.2 Information about network security 2.2.1 Security in wireless sensor networks 2.2.2 Digital signatures in network security 2.2.3 ID-based encryption 2.2.4 Related work in wireless sensor network 2.3 Algorithm used 2.4 Implementation 2.4.1 ECC algorithm performed 2.4.2 RSA algorithm 2.4.3 Implementation of LEACH algorithm 2.4.4 Implementation of PEGASIS algorithm 2.5 Analysis 2.6 Conclusion References Chapter 3: A novel approach to indoor air quality monitoring by Cisco IoT-based toxic measurement system 3.1 Introduction 3.1.1 Affected criteria for indoor air quality 3.1.2 Leading carbon monoxide sources 3.1.3 Technological impact on Covid-19 pandemic 3.2 System measurements and problem 3.3 Specification and the measurements 3.4 Literature review 3.4.2 Indoor air pollution study: NO, CO, CO2 3.4.3 Indoor air quality and coronavirus disease 3.4.4 Indoor air quality: carbon monoxide and carbon dioxide (AEN 125) 3.5 Cisco Internet of Things based toxic measurement system 3.6 Methods of proposal 3.7 Experimental setup 3.8 Results and discussion 3.9 System performance analysis 3.10 Conclusion References Chapter 4: Babies’ movement detection and constant monitoring in the crib by using Internet of Things (IoT): Ultrasonic sensor 4.1 Introduction 4.2 Literature review 4.3 Background 4.3.1 Ultrasonic sensor 4.3.2 Breadboard 4.3.3 NodeMCU ESP8266 4.3.4 Temperature and humidity sensor (DHT11) 4.3.5 Blynk mobile application 4.3.6 RTSP IP camera application 4.4 Experimental set-up 4.4.1 Design of a transmitter 4.4.2 System flowchart 4.4.3 Design of receiver 4.5 Result and discussion 4.5.1 Simulation environment experiment 4.5.2 Real environment design 4.6 Conclusion and future work Notes References Chapter 5: Cloud security still an unsolved puzzle: A complete overview 5.1 Introduction 5.2 Need for layered security 5.3 Attacks and vulnerabilities 5.4 Usage of blockchain in cloud 5.4.1 Consensus algorithm 5.5 Limitation of cloud computing 5.6 Comparative study of machine learning for cloud security 5.7 Conclusion References Chapter 6: A layered architecture for delay tolerant networks and routing mechanism 6.1 Introduction 6.2 A delay tolerant message-based overlay architecture 6.2.1 Regions and border gateways 6.2.2 Path selection and scheduling 6.3 Architecture of delay tolerant networks 6.3.1 Layer communication 6.3.2 Internal arrangement of border gateways 6.4 Conclusion 6.5 Future work References Chapter 7: A lightweight identity-based authentication scheme using elliptic curve cryptography for resource-constrained IoT devices 7.1 Introduction 7.2 Related work 7.3 Definitions 7.3.1 Internet of things (IoT) 7.3.2 Architecture of Internet of Things 7.3.2.1 Perception layer 7.3.2.2 Network layer 7.3.2.3 Application layer 7.3.3 Resource-constrained Internet of Things devices 7.3.4 Elliptic curve cryptograph (ECC) 7.3.4.1 Point addition 7.3.4.2 Point subtraction 7.3.4.3 Point doubling 7.3.4.4 Scalar multiplication 7.3.4.5 Elliptic curve discrete logarithm problem (ECDLP) 7.3.5 Identity-based encryption (IBE) 7.4 Proposed scheme 7.4.1 Set-up phase 7.4.2 Things/device register phase 7.4.3 Mutual authentication phase 7.4.4 Message phase 7.5 Implementation of the proposed scheme 7.6 Security requirements 7.6.1 Privacy 7.6.2 Data integrity 7.6.3 Mutual authentication 7.6.4 Accessibility 7.6.5 Non-repudiation 7.6.6 Identity privacy 7.7 Security analysis 7.7.1 Mutual authentication 7.7.2 Privacy 7.7.3 Data integrity 7.7.4 Identity privacy 7.7.5 Non-repudiation 7.7.6 Forward security 7.7.7 Random oracle model security 7.8 Performance analysis 7.8.1 Computation cost analysis 7.8.2 Communication cost analysis 7.9 Conclusion References Chapter 8: Protocol stack in wireless sensor networks for IoT-based applications 8.1 Introduction 8.2 Communication protocols 8.2.1 Zigbee 8.2.2 Open source IPv6 automation network (OSIAN) 8.2.3 DASH7 8.2.4 Bluetooth low energy (Bluetooth LE) 8.2.5 Amazon sidewalk 8.2.6 Design issues in communication protocol 8.3 Medium access control protocols 8.3.1 Self-organizing medium access control for sensornets (SMACS) 8.3.2 Bluetooth 8.3.3 Low energy adaptive clustering hierarchy (LEACH) 8.3.4 Berkeley media access control (B-MAC) 8.3.5 Sensor media access control (S-MAC) 8.3.6 Design issues in MAC protocols 8.4 Routing protocols 8.4.1 Regular ad hoc network routing approaches 8.4.1.1 Proactive routing 8.4.1.2 Reactive routing 8.4.1.3 Hybrid routing 8.4.2 Wireless sensor network routing protocol approaches 8.4.2.1 Flat network system 8.4.2.2 Clustering system 8.4.2.3 Data-based protocols 8.4.2.4 Location-based protocols 8.4.3 Wireless sensor network routing techniques 8.4.3.1 Flooding 8.4.3.2 Gossiping 8.4.3.3 Sensor protocols for information via negotiation (SPIN) 8.4.3.4 Low energy adaptive clustering hierarchy 8.4.3.5 Design issues in routing protocols 8.5 Transmission control protocols 8.5.1 Traditional transmission control protocols 8.5.1.1 User datagram protocol 8.5.1.2 Transmission control protocol 8.5.2 Wireless sensor network transmission control protocols 8.5.2.1 Congestion detection and avoidance 8.5.2.2 Event-to-sink reliable transport 8.5.2.3 Reliable multi-segment transport 8.5.2.4 Pump slowly, fetch quickly 8.5.2.5 GARUDA 8.5.2.6 Ad hoc transport protocol 8.5.3 Design issues in transmission control protocols 8.6 IoT applications of wireless sensor networks 8.7 Conclusion References Chapter 9: Secure communication in Internet of Things devices using steganography 9.1 Introduction 9.1.1 Objectives of the paper 9.1.2 Overview of the proposed model 9.1.2.1 Sender side 9.1.2.2 Receiver side (Figures 9.5 and 9.6) 9.1.3 Proposed embedding and extraction algorithm 9.1.3.1 Rivest Shamir Adleman algorithm 9.1.3.2 Embedding algorithm 9.1.3.3 Extraction algorithm 9.2 Analysis 9.3 Conclusion References Chapter 10: Next-generation networks enabled technologies: Challenges and applications 10.1 Introduction 10.2 Architecture of next-generation network 10.2.1 Need for next-generation network 10.2.2 Features of next-generation network 10.3 Next-generation network enabling technologies 10.3.1 5G 10.3.2 Edge intelligence 10.3.3 Cloud-based Internet of Things 10.3.3.1 Importance of integrating cloud computing with Internet of Things network 10.3.4 Software-defined networks 10.4 Open research challenges and issues in next-generation network 10.4.1 Challenges and issues in 5G 10.4.2 Challenges and issues in edge intelligence 10.4.3 Challenges and issues in Cloud-based Internet of Things network 10.4.4 Challenges and issues in software-defined network 10.5 Applications 10.5.1 Intelligent healthcare 10.5.2 Supply chain management 10.5.3 Smart education 10.5.4 Intelligent disaster management system 10.6 Conclusion and future scope References Index