دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
دسته بندی: کامپیوتر ویرایش: 1 نویسندگان: Joanna F. DeFranco, Mohamad Kassab سری: ISBN (شابک) : 0367462729, 9780367462727 ناشر: CRC Press سال نشر: 2021 تعداد صفحات: 217 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 6 مگابایت
کلمات کلیدی مربوط به کتاب آنچه هر مهندس باید در مورد اینترنت اشیا بداند: اینترنت اشیا، اینترنت اشیا، CPS، سیستمهای فیزیکی-سایبری، بلاک چین
در صورت تبدیل فایل کتاب What Every Engineer Should Know About the Internet of Things به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب آنچه هر مهندس باید در مورد اینترنت اشیا بداند نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
محصولات اینترنت اشیا (IoT) و سیستمهای فیزیکی سایبری (CPS) تقریباً در هر رشتهای مورد استفاده قرار میگیرند و همچنان افزایش قابل توجهی در هزینههای طراحی، توسعه، و استقرار برنامههای کاربردی اینترنت اشیا و تجزیه و تحلیل در هر حوزه وجود دارد. از خانه ها، مدارس، دولت و صنعت ما. این متن عملی مقدمهای بر اینترنت اشیا ارائه میکند که برای هر رشته مهندسی قابل درک است و کاربردهای دقیق اینترنت اشیا را مورد بحث قرار میدهد. این کار برای کمک به مهندسان در جهتیابی به این موضوع مهم و بین رشتهای طراحی شده است:
نوشته شده تا برای افراد غیر متخصص در دسترس باشد. موضوع، این کار اهمیت این فناوری و اینکه چگونه میتواند از همه بازیگران مرتبط و همچنین همه داراییهای درگیر در بسیاری از حوزهها پشتیبانی و به چالش بکشد، بیان میکند.
Internet of Things (IoT) products and cyber-physical systems (CPS) are being utilized in almost every discipline and there continues to be significant increases in spending on design, development, and deployment of IoT applications and analytics within every domain, from our homes, schools, government, and industry. This practical text provides an introduction to IoT that can be understood by every engineering discipline and discusses detailed applications of IoT. Developed to help engineers navigate this increasingly important and cross-disciplinary topic, this work:
Written to be accessible to non-experts in the subject, this work communicates the importance of this technology and how it can support and challenge all interrelated actors as well as all involved assets across many domains.
Cover Half Title Series Page Title Page Copyright Page Table of Contents Preface Authors Acknowledgments Chapter 1 Internet of Things Defined 1.1 Introduction 1.2 IoT Defined 1.3 IoT Ecosystems 1.4 IoT Applications 1.5 IoT Challenges 1.6 IoT Development Approach Further Reading Chapter 2 Networks of ‘Things’ 2.1 Introduction 2.2 Networks of ‘Things’ 2.3 The Primitives 2.3.1 Primitive #1: Sensor 2.3.2 Primitive #2: Aggregator 2.3.2.1 Actor #1: Cluster (or “Sensor Cluster”) 2.3.2.2 Actor #2: Weight 2.3.3 Primitive #3: Communication Channel 2.3.4 Primitive #4: eUtility (External Utility) 2.3.5 Primitive #5: Decision Trigger 2.3.6 Additional Notes on the Primitives 2.4 The Elements 2.5 Additional Considerations 2.5.1 Open, Closed 2.5.2 Patterns 2.5.3 Composition and Trust 2.5.4 NoT Testability 2.5.5 Environment 2.6 Reliability and Security Primitive Scenarios 2.7 Summary 2.8 Additional Takeaway Messages 2.9 Acronym Glossary Further Reading Chapter 3 Smart Cities 3.1 Introduction 3.2 Motivational Example 3.3 Background 3.4 The Anatomy of a Smart City under IoT Perspective 3.5 Challenges for Using IoT as the Backbone of Smart Cities 3.6 Conclusion Further Reading Chapter 4 Smart Cities – Energy 4.1 Introduction 4.2 IoT for Smart Energy 4.3 Examples of overcoming Smart Energy Challenges 4.3.1 Gorona del Viento Wind-Hydro at El Hierro Canary Island in Spain 4.3.2 Virtual Powerplant and Microgrid at Aruba Caribbean Island 4.4 Conclusion Further Reading Chapter 5 Smart Cities – Security 5.1 Introduction 5.2 Smart City Architecture 5.3 Attack Point Examples in a Smart City 5.3.1 Device/Sensor Level 5.3.2 Application Level 5.3.3 Network Level 5.3.4 Edge/Cloud Level 5.4 Threat Scenarios 5.4.1 Traffic Chaos 5.4.2 Medical Ransomware 5.4.3 Energy System Hacking 5.4.4 Building Attack 5.4.5 Privacy Breach 5.5 Securing Smart Cities 5.5.1 Cybersecurity Risk Management 5.5.2 Cyber Patrol Bot 5.5.3 Security and Privacy Label 5.5.4 Nurturing Talented Cybersecurity Personnel 5.6 Conclusion Further Reading Chapter 6 Smart Homes 6.1 Introduction 6.2 Security Design and Management 6.2.1 Smart Home Security Overview 6.2.2 Smart Home Design and Management 6.2.3 Physical Security 6.3 Smart Home Products/Tools/Application 6.3.1 Smart Home Products Examples 6.3.2 Smart Home Products Design Considerations 6.3.2.1 User Acceptance/User Experience 6.3.2.2 Data Transfer 6.3.2.3 System Integration 6.3.2.4 Artificial Intelligence 6.4 Activity/Behavior Patterns 6.5 Power Efficiency 6.5.1 Managing activity and daily consumption 6.6 Systems Design 6.6.1 Architecture 6.6.2 Requirements 6.6.3 Simulations/Modeling 6.7 Constructing an IoT Home Device 6.7.1 Smart Garden 6.7.2 Smart Trashcan 6.7.2.1 Concept 6.8 Conclusion Further Reading Chapter 7 IoT in Education 7.1 Introduction 7.2 What Are the Benefits of the Adopted Scenarios of IoT in Education? 7.2.1 Applying IoT in different Education Levels and Subjects 7.2.2 Perception 7.2.3 Learning Principles 7.2.4 Delivery Mode 7.3 What Are the Challenges of Incorporating IoT in Education? 7.3.1 Security 7.3.2 Scalability 7.3.3 Humanization 7.4 Monitoring Emotional State of Online Learner: A Tool 7.5 Discussion 7.5.1 What Are the Right Devices and Processing Components for IoT Pedagogy? 7.5.2 How Are Instructors, Staff, and Students Going to Connect and Use the IoT Network for Teaching and Learning? 7.5.3 What Can Educational Institutes Do to Mitigate These Complexities? 7.6 Conclusion Further Reading Chapter 8 IoT Education 8.1 Introduction 8.2 Internet of Things 8.3 The ACM and IEEE Computer Science Knowledge Areas 8.4 Mapping Study and Programs Review 8.4.1 Overview of Courses from the Mapping Study 8.4.2 Overview of Courses from the Programs Review 8.5 CPS/IoT Courses and the IoT Primitives 8.6 CPS /IoT Courses and Knowledge Areas of Computer Science 8.7 Recommendations References Chapter 9 IoT in Healthcare 9.1 Introduction 9.2 General Classification for Use Cases for IoT in Healthcare 9.3 IoT for Tracking Humans 9.3.1 Alcoholism Use Case 9.3.2 Digital Surveillance to Combat COVID-19 9.3.2.1 Digital Tracking with Nonmobile Technologies 9.3.2.2 Digital Tracking with Mobile Technologies 9.4 Consideration for Quality Requirements for IoT in Healthcare Applications 9.4.1 Privacy Requirements 9.4.1.1 Privacy Concerns with Contact-Tracing Applications 9.4.2 Safety Concerns 9.4.3 Technology and Social Constraints 9.4.4 Emerging Quality Requirements for IoT in Healthcare 9.5 Smart Medical Devices References Chapter 10 IoT Trust Concerns 10.1 Introduction 10.2 Executive Summary of NISTIR 8222 (DRAFT) 10.2.1 Scalability 10.2.3 Heterogeneity 10.2.4 Ownership and Control 10.2.5 Composability, Interoperability, Integration, and Compatibility 10.2.6 “Ilities” 10.2.7 Synchronization 10.2.8 Measurement 10.2.9 Predictability 10.2.10 Testing and Assurance 10.2.11 Certification 10.2.12 Security 10.2.13 Reliability 10.2.14 Data Integrity 10.2.15 Excessive Data 10.2.16 Performance 10.2.17 Usability 10.2.18 Visibility and Discovery 10.3 Introduction of NISTIR 8222 (DRAFT) 10.4 Overwhelming Scalability 10.5 Heterogeneity 10.6 Loss of Ownership and Control 10.7 Composability, Interoperability, Integration, and Compatibility 10.8 Abundance of “Ilities” 10.9 Synchronization 10.10 Lack of Measurement 10.11 Predictability 10.12 Few IoT-Specific Testing and Assurance Approaches 10.13 Lack of IoT Certification Criteria 10.14 Security 10.14.1 Security of ‘Things’ 10.14.2 Passwords 10.14.3 Secure Upgrade Process 10.14.4 Summary 10.15 Reliability 10.16 Data Integrity 10.17 Excessive Data 10.18 Speed and Performance 10.19 Usability 10.20 Visibility and Discoverability 10.21 Summary 10.22 Additional Supporting Information 10.22.1 Insurability and Risk Measurement 10.22.2 Regulatory Oversight and Governance 10.22.3 Six Trustworthiness Elements in NIST SP 800-183 Acronym Glossary References Chapter 11 Blockchain Technologies and IoT 11.1 Introduction 11.2 The Idea of Cryptocurrencies 11.3 Bitcoin 11.3.1 The Bitcoin Address 11.3.2 The Bitcoin Blockchain 11.3.3 The Bitcoin Transaction 11.4 Smart Contracts 11.5 IoT and Smart Contracts: A Food Traceability System 11.5.1 A Practical Example: Cheese Production Supply-Chain 11.6 Conclusion Further Reading Chapter 12 IoT Requirements and Architecture: A Case Study 12.1 Introduction 12.2 Case Study Description: Home Automation Management System (HAMS) 12.3 Requirements for the Home Automation Management System (HAMS) 12.4 Architectural Options for HAMS 12.5 Conclusion Further Reading Index