دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1st ed.
نویسندگان: Fadi Al-Turjman
سری: EAI/Springer Innovations in Communication and Computing
ISBN (شابک) : 9783030400361, 9783030400378
ناشر: Springer International Publishing;Springer
سال نشر: 2020
تعداد صفحات: 245
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 6 مگابایت
کلمات کلیدی مربوط به کتاب روندهای اینترنت اشیا-مبتنی بر Cloud: مهندسی، مهندسی ارتباطات، شبکه ها، سیگنال، پردازش تصویر و گفتار، معماری پردازنده
در صورت تبدیل فایل کتاب Trends in Cloud-based IoT به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب روندهای اینترنت اشیا-مبتنی بر Cloud نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب به بررسی موضوعات تحقیقاتی در اینترنت اشیا و محاسبات
ابری و مه میپردازد. مشارکتکنندگان به مسائل و چالشهای عمده
در راهحلهای مبتنی بر اینترنت اشیا پیشنهاد شده برای ابر
میپردازند. نویسندگان خدمات هوشمند و کارآمد انرژی ابر را در
کاربردهایی مانند مراقبتهای بهداشتی، ترافیک و سیستمهای
کشاورزی مورد بحث قرار میدهند. خوانندگان هدف از رشته های
مختلفی هستند که به طراحی و استقرار برنامه های کاربردی Cloud
علاقه مند هستند. این کتاب می تواند برای ارائه دهندگان خدمات
اینترنت اشیاء مبتنی بر ابر، مصرف کنندگان خدمات اینترنت اشیاء
مبتنی بر ابر و به طور کلی توسعه دهندگان خدمات ابری برای
دریافت دانش پیشرفته در حوزه اینترنت اشیا در حال ظهور مفید
باشد. این کتاب همچنین پایه ای قوی برای محققان برای پیشرفت
بیشتر در این حوزه فراهم می کند.
This book examines research topics in IoT and Cloud and Fog
computing. The contributors address major issues and
challenges in IoT-based solutions proposed for the Cloud. The
authors discuss Cloud smart and energy efficient services in
applications such as healthcare, traffic, and farming
systems. Targeted readers are from varying disciplines who
are interested in designing and deploying the Cloud
applications. The book can be helpful to Cloud-based IoT
service providers, Cloud-based IoT service consumers, and
Cloud service developers in general for getting the
state-of-the-art knowledge in the emerging IoT area. The book
also provides a strong foundation for researchers to advance
further in this domain.
Preface Contents About the Editor 1 A Blockchain Model for Trustworthiness in the Internet of Things (IoT)-Based Smart-Cities 1.1 Introduction 1.2 Blockchain for IoT: An Overview 1.2.1 What Is Blockchain? 1.2.2 How Blockchain Works? Types of Blockchain Public Blockchain Private Blockchain Hybrid/Consortium Blockchain 1.3 Major Blockchain Technologies: Smart Contract and Consensus Mechanisms 1.3.1 Smart Contract 1.3.2 Consensus Mechanism Proof of Work (PoW) Proof of Service (PoS) Leased Proof of Stake (LPoS) Proof of Burn (PoB) Proof of Importance (PoI) Proof of Activity (PoA) Proof of Elapsed Time (PoET) Practical Byzantine Fault Tolerance (PBFT) 1.4 Proposed Blockchain Model for IoT Trustworthiness 1.5 Conclusions References 2 A Review on the Use of Wireless Sensor Networks in Cultural Heritage: Communication Technologies, Requirements,and Challenges 2.1 Introduction 2.2 Related Works 2.3 WSN Standards and Communication Technologies for CH onitoring 2.3.1 Bluetooth 2.3.2 IEEE 802.15.4 2.3.3 ZigBee 2.3.4 Wi-Fi 2.3.5 WirelessHART 2.3.6 ISA100.11a 2.4 Network Architecture 2.4.1 Sensor Layer 2.4.2 Gateway Layer 2.4.3 Database Layer 2.5 Design Factors of the WSN-Based Monitoring of the CH 2.5.1 Primary Design Factors Energy Efficiency (EE) QoS Coverage and Connectivity (CC) Accuracy 2.5.2 Secondary Design Factors Security Cost Fault Tolerance Reliability 2.6 WSNs Deployment Aspects in CH 2.6.1 Random Deployment 2.6.2 Deterministic Deployment 2.7 Requirements for WSNs-Based Monitoring of CH 2.8 Open Research Issues 2.8.1 Security and Privacy 2.8.2 Coverage and Connectivity 2.8.3 Power Consumption 2.8.4 Scalability 2.8.5 Cost 2.9 Conclusion References 3 Tracking and Analyzing Processes in Smart Production 3.1 Introduction 3.2 Related Work 3.2.1 BPMN and Balance Score Card 3.2.2 KPIs and KPI Tracking 3.2.3 Enabling Technologies for Smart Production Internet of Things (IoT) and Cloud Computing Big Data Smart Factory and Cyber-Physical Systems 3.3 Methodology 3.3.1 Dimensions, KPIs, and Goals Identification 3.3.2 Selection of the Use Case 3.4 Results 3.4.1 Solution as Standalone Application Tracking the KPIs Tracking the Cycle Time 3.4.2 Solution as Part of IoT Infrastructure 3.5 Conclusion References 4 Trust-Based Chaos Access Control Framework by Neural Network for Cloud Computing Environment 4.1 Introduction 4.2 Related Work 4.3 Influence of Neural Network in Trust 4.3.1 Neural Network Classifiers 4.3.2 Back-Propagation Algorithm 4.4 Trust-Based Chaos Access Control (TBCAC) 4.4.1 Trust Manager Work Flow Structure 4.4.2 Role-Based Trust Access Control 4.4.3 User Behavior Trust Calculation 4.4.4 Current Trust (Currtrust) 4.4.5 Past Trust Value (Pasttrust) 4.4.6 Consolidated Trust Value (Construst) 4.4.7 Trust-Level Threshold 4.4.8 Break the Glass Approach 4.5 Experimental Evaluation 4.5.1 Results and Analysis 4.5.2 Training State 4.5.3 Validation State 4.5.4 Testing State 4.5.5 Overall State 4.6 Conclusion References 5 A Survey on Technologies and Challenges of LPWA for Narrowband IoT 5.1 Introduction 5.1.1 Incorporate DSP and RISC Processors 5.2 NB-IoT Architecture 5.2.1 NB-IoT Deployment Schemes 5.2.2 NB-IoT Transmission Schemes 5.3 Physical Features of NB-IoT 5.3.1 Technical Differences of NB-IoT Factors with Other LWPA Technologies 5.4 Advantages of NB-IoT 5.5 Challenges of NB-IoT 5.5.1 Adaption of Tightly Coupled Memory 5.5.2 Direct Memory Access 5.5.3 Privacy and Data Security Challenges of IoT 5.5.4 Models and Algorithms to Counter Attacks Based on Applications 5.5.5 Applications of NB-IoT 5.6 Conclusion References 6 Framework for Realization of Green Smart Cities Through the Internet of Things (IoT) 6.1 Introduction 6.1.1 Introduction to Green Computing Technology An Instance of Green Technology 6.1.2 From Digital City and IC to SC 6.2 Definition of an SC 6.2.1 Review of Definitions Technical Infrastructure Application Domain System Integration Data Processing 6.3 Literature Review 6.4 How Green Software Makes a City Smart 6.4.1 Smart Operating Systems (SOS) 6.4.2 Inter-Software Interaction 6.4.3 Utilization of Smart Power Grids 6.4.4 Feedback Data 6.4.5 Specialized Green Software 6.5 Architecture of Multi-level SC 6.5.1 Architecture of Multi-level SC Phase 1: Information Collection Phase 2: Information Processing Phase 3: Information Integration and Reasoning Phase 4: Device Control and Warnings 6.5.2 Communication Services 6.5.3 Customized Services 6.5.4 The Smart Urban System (SUS) The Smart Network The SOS and Smart Assets Sensors Data Analysis 6.6 Conclusıon References 7 Scheduling of Scientific Workflow in Distributed Cloud Environment Using Hybrid PSO Algorithm 7.1 Introduction to Cloud Computing 7.2 Background 7.3 Hybrid PSO Algorithm 7.4 Experimental Results 7.5 Conclusion References 8 Model-Based Recommender Systems 8.1 Introduction 8.1.1 Brief History of the Recommender Systems 8.1.2 Recommender Systems 8.1.3 Content-Based Recommender Systems Cold Start Problem of the CBF 8.1.4 Collaborative Filtering Recommender Systems Memory-Based Filtering Technique Model-Based Filtering Technique 8.1.5 Hybrid Recommender Systems 8.2 Building Recommender System Using ML.NET 8.2.1 Data Preparation in ML.NET 8.2.2 Transformation Text Based Data 8.3 Building Recommender System on Restaurant Dataset 8.3.1 Dataset Preparation 8.3.2 Model Training and Evaluation 8.3.3 Integration of ML Models in the Cloud Based Applications 8.4 Conclusion References 9 A Decade Bibliometric Analysis of Underwater Sensor Network Research on the Internet of Underwater Things: An African Perspective 9.1 Introduction 9.2 Underwater Sensor Networks and the Internet of Underwater Things 9.2.1 Technical Definitions, Features, Architecture and Communication Capabilities 9.2.2 Applications and Use Case Scenarios in Africa 9.2.3 Underwater Sensor Networks in the Cloud 9.2.4 Design/Implementation Challenges and Solutions 9.3 Methodology 9.3.1 Data Extraction and Search Criteria 9.4 Bibliometric Analysis Results 9.4.1 Global Perspective Research Trend Top 20 Most Productive and Cited Authors Subject Area Analysis Top Document Types and Source Analysis Topmost Countries Top Research Institutions/Affiliations Top Funding Institutions Top 20 Keywords Top 50 Most Significant Articles/Authors 9.5 African Perspective 9.6 Discussion and Analysis 9.6.1 Implication of Findings and Vital Missing Links 9.6.2 Research Directions and Recommendations 9.7 Conclusion References 10 Health Informatics as a Service 10.1 Introduction 10.1.1 The Relevance of Cloud Computing 10.1.2 Hypotheses of the Relationship Between Health Informatics and Cloud Computing 10.2 Literature Review 10.2.1 The State of Cloud Computing in Healthcare 10.2.2 Motivators of Cloud Computing in Healthcare 10.2.3 The Efficiency and Applicability of Cloud Computing in the Handling of Health Care Tasks 10.3 Cloud Computing Application in Healthcare 10.3.1 Data Security Service Provider Data Insurance Shared Liability 10.3.2 Ease of Access Mobile Applications Desktop Management Access Control 10.3.3 Practitioner Collaboration Shared Information Peer-to-Peer Decision-Making Patient and User Satisfaction 10.4 Methodology 10.4.1 Instrument Development 10.4.2 Data Collection Procedure 10.4.3 Sample Demography 10.5 Data Analysis and Discussions 10.5.1 Measurement Model Analysis 10.5.2 Structural Model Analysis 10.5.3 Implications for Research and TheoreticalDevelopment 10.5.4 Limitations and Further Research 10.5.5 Implications for Practice 10.6 Conclusion A.1 Appendix: Definition of Technical Terms References 11 Cloud-Based Smart IoT Architecture and Various Application Domains 11.1 Introduction 11.2 Literature Review 11.3 CBIT Architecture and Design Implementation 11.3.1 Network Architecture of the CBIT 11.3.2 Security and Privacy Authentication for the CBIT 11.3.3 Privacy-Preserving Testimonials in CBIT 11.4 CBIT Applications 11.4.1 Smart Cities 11.4.2 Smart Home 11.4.3 Smart Grids 11.4.4 Smart Energy 11.4.5 Smart Logistics 11.4.6 Video Surveillance 11.4.7 Environment Monitoring 11.4.8 Smart Mobility 11.4.9 Smart Communities 11.4.10 Healthcare 11.5 Analysis and Discussion 11.5.1 Challenges Faced in the CBIT Integration Security and Privacy Heterogeneity Big Data Performance Legal Aspects Monitoring Large Scale 11.5.2 Issues to Integrate the CBIT Standardization Fog Computing Cloud Capabilities SLA Enforcement Big Data Energy Efficiency Security and Privacy 11.5.3 Benefits of the CBIT Communication Storage Processing Capabilities Scope New Abilities New Models 11.5.4 Importance of the CBIT to the UAV 11.6 Conclusion and Future Scope References Index