Smart Systems for Industrial Applications. Группа авторов. Читать онлайн. Newlib. NEWLIB.NET

Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Программы
Год издания: 0
isbn: 9781119762041
Скачать книгу
Bluetooth module [35].Figure 14.11 ZigBee technology [7].Figure 14.12 Zigbee architecture [7].Figure 14.13 ZigBee protocol architecture [7].Figure 14.14 Physical layer of ZigBee [7].Figure 14.15 Zigbee communication operation [7].Figure 14.16 Zigbee topologies [7].Figure 14.17 Wireless local area network [36].Figure 14.18 GSM network [20].Figure 14.19 (a) Sensor. (b) Smart sensor [37].Figure 14.20 Siemens SITRAN TF functions diagram [37].Figure 14.21 Internal parts of Smart Sensor [37].Figure 14.22 (a) Packaged CO2 sensor. (b) Packaged O2 sensor. (c) Overall exerci...Figure 14.23 Flood monitoring systems [8].Figure 14.24 Traffic monitoring system [9].

      List of Tables

      1 Chapter 1Table 1.1 Role of communication technologies in healthcare.Table 1.2 Applications of AI in healthcare.Table 1.3 Impact of AI-mHealth communication system in healthcare.Table 1.4 Role of AI in wireless body area networks.Table 1.5 Role of AI-driven IoT in healthcare services.Table 1.6 Impact of AI-driven augmented and virtual reality in healthcare.

      2 Chapter 2Table 2.1 Analysis report.

      3 Chapter 3Table 3.1 Nomenclature.Table 3.2 Proposed IWDH-HP-RDD scheme: warning message dissemination rate and ch...Table 3.3 Proposed IWDH-HP-RDD scheme: rate of neighborhood awareness and succes...

      4 Chapter 4Table 4.1 Sallen-Key LPF degradation model parameters.Table 4.2 Performance result of proposed UPF and UKF.

      5 Chapter 9Table 9.1 Results of classifiers for prediction of heart disease.

      6 Chapter 11Table 11.1 Accuracy for different classifiers.Table 11.2 Performance metrics.

      7 Chapter 12Table 12.1 Water density table approved by ITS-90.Table 12.2 Water density table.Table 12.3 Output at significant percentage for the sensor.Table 12.4 Testing results of petrol density measurement.

      8 Chapter 13Table 13.1 Threats and their influences in the IoT environment.Table 13.2 IMH-TF-SMA: Computational times required for crypto-operations.Table 13.3 Security-based functionality features of the proposed and compared au...

      9 Chapter 14Table 14.1 Sensor level indication via SMS.

      Pages

      1  v

      2  ii

      3  iii

      4  iv

      5  xvii

      6  xviii

      7  1

      8  2

      9  3

      10  4

      11  5

      12  6

      13  7

      14  8

      15  9

      16  10

      17  11

      18  12

      19  13

      20  14

      21  15

      22  16

      23  17

      24  18

      25  19

      26  20

      27  21

      28  22

      29  23

      30  24

      31  25

      32  26

      33  27

      34  28

      35  29

      36  30

      37  31

      38  32

      39  33

      40  34

      41  35

      42  36