Integration of Cloud Computing with Internet of Things. Группа авторов. Читать онлайн. Newlib. NEWLIB.NET

Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Программы
Год издания: 0
isbn: 9781119769309
Скачать книгу
href="#ulink_8b70a780-b9fc-58be-81ed-a48b5a8b2247">18.10 Data Ownership and Intellectual Property Rights 18.11 Cloud Service Provider as an Intermediary 18.12 Challenges in Cloud Computing 18.13 Conclusion

      24  19 Securing the Pharma Supply Chain Using Blockchain 19.1 Introduction 19.2 Literature Review 19.3 Methodology 19.4 Results 19.5 Conclusion and Future Scope

      25  Index

      26  End User License Agreement

       List of Figures

      1 Chapter 1Figure 1.1 Major areas of IoT platform.Figure 1.2 Policy-based IoT applications.Figure 1.3 Softwarebased IoT applications.Figure 1.4 The benefits of CC.Figure 1.5 The hierarchy of EC.Figure 1.6 The benefits of EC.Figure 1.7 The concept of cloud, edge, and FC.Figure 1.8 The benefits and limitations of the IoTGC.Figure 1.9 The steps of SIoT (SEG 3.0 methodology) [27].Figure 1.11 A generalized architecture of including semantics.Figure 1.10 Intersection of different IoT visions [2].Figure 1.12 Different layers of interoperability.

      2 Chapter 2Figure 2.1 Types of data.Figure 2.2 IoT and its components.Figure 2.3 IoT access control.Figure 2.4 Concept of firewall.Figure 2.5 Privacy in IoT.Figure 2.6 Internal and external attacker on IoT Infrastructure.Figure 2.7 Different data sources of IoT.Figure 2.8 Firewall that allows remote user access to a firewall device.Figure 2.9 Where is security in IoT needed.

      3 Chapter 3Figure 3.1 Cloud computing vs fog computing.Figure 3.2 Basic fog computing model.Figure 3.3 Communication in IoT devices.Figure 3.4 Attacks in IoT.Figure 3.5 Fog layered model.Figure 3.6 Time levels for IoT group establishment.Figure 3.7 Computational time levels for data processing.Figure 3.8 Malicious node detection rate.Figure 3.9 Fog computational security levels for data storage.

      4 Chapter 4Figure 4.1 Expert model in the healthcare domain for capturing patient symptoms.Figure 4.2 Expert module interaction process.Figure 4.3 Use case diagram of patient and expert module.Figure 4.4 Expert module activity diagram for decision logic.Figure 4.5 Class collaboration diagram.Figure 4.6 Ontological knowledge base diagram.

      5 Chapter 5Figure 5.1 Proposed system.Figure 5.2 Flow graph of over all process.Figure 5.3 Hardware in monitoring system.Figure 5.4 Product identification.Figure 5.5 Person identification.Figure 5.6 Comparison process in MATLAB.

      6 Chapter 6Figure 6.1 System architecture as shown as functional block diagram.Figure 6.2 MQTT protocol: publish–subscribe model.Figure 6.3 MQTT protocol message exchanges.Figure 6.4 ESP 32 board.Figure 6.5 Flame sensor.Figure 6.6 MQ2 gas sensor.Figure 6.7 DHT11 sensor.Figure 6.8 Actuator valve.Figure 6.9 Initial window of Arduino IDE.Figure 6.10 Sample Arduino IDE toolbar.Figure 6.11 Sample compiling arduino IDE status window.Figure 6.12 Logs file messages on the serial monitor window.Figure 6.13 MQTT broker architecture built on cloud MQTT.Figure 6.14 Interfacing flame sensor with Arduino.Figure 6.15 IoT system data flow for PUBLISH/SUBSCRIBE in MQTT broker.Figure 6.16 Testing of fire detection.Figure 6.17 Flame placed within the range of flame sensor.Figure 6.18 Flame placing outside the range of flame sensor.Figure 6.19 Flame is placed within 60° range of flame sensor.Figure 6.20 Flame is placed outside the 60-degree range of flame sensor.

      7 Chapter 7Figure 7.1 Transmodeler.Figure 7.2 API Gateway. Image Source-https://docs.microsoft.com/en-us/azure/arch...Figure 7.3 Application file structure.Figure 7.4 Road transplant simulation board with extra road patch.Figure 7.5 Workflow in application.Figure 7.6 Workflow of Google API in the application.Figure 7.7 Low traffic.Figure 7.8 Moderate traffic.Figure 7.9 High traffic.Figure 7.10 Speed status screen.Figure 7.11 Traffic simulator 1st view.Figure 7.12 Traffic simulator 2nd view.Figure 7.13 Traffic simulator 3rd view.

      8 Chapter 8Figure 8.1 Machine learning techniques with commonly adopted algorithms.Figure 8.2 (a) Classification technique, (b) Regression technique.Figure 8.3 Clustering technique.Figure 8.4 Reinforcement learning.Figure 8.5 Decision tree.Figure 8.6 Structure of ANN.Figure 8.7 Classification using Support Vector Machine (SVM).Figure 8.8 IoT device used for field data collection. Reprinted with permission ...Figure 8.9 Pie chart showing the distribution of data. Reprinted with permission...Figure 8.10 Cassava disease detection model accuracy. Reprinted with permission ...

      9 Chapter 9Figure 9.1 Block diagram of home security system using IoT.Figure 9.2 Schematic diagram of home security system.Figure 9.3 Block diagram of proposed system.

      10 Chapter 10Figure 10.1 Architectural layers of industrial-IoT.Figure 10.2 Stages of industrial-IoT.Figure 10.3 RUL as a tool in industrial decision making.Figure 10.4 Schematic of RUL prediction.Figure 10.5 Layers of industrial-IoT platform showing the hardware level to the ...Figure 10.6 Sequence of steps in RUL computation.Figure 10.7 Plot of smoothened feature health indicator.Figure 10.8 Plot of estimated RUL with true RUL along with their confidence boun...

      11 Chapter 11Figure 11.1 Data exchange in IoT.Figure 11.2 Providing advantages of IoT in roles such as SCM [58].Figure 11.3 IoT and service adaption.Figure 11.4 Success of IoT.Figure 11.5 IoT benefits. Source: CompTIA’s Internet of Things insights and Oppo...Figure 11.6 Disadvantages of IoT. Source: Cyfuture.com.Figure 11.7 Technology change benefits to work.Figure 11.8 IoT and increase in Productivity.

      12 Chapter 12Figure 12.1 Generic scenario of IoT.Figure 12.2 Layer defied by generic architecture of IoT.Figure 12.3 Three layer architecture of IoT.Figure 12.4 Six-layer architecture of IoT.Figure 12.5 Deployment models for cloud computing.Figure 12.6 Basic service models.Figure 12.7 Architecture of cloud-based IoT.

      13 Chapter 13Figure 13.1 Different IoT Cores.Figure 13.2 IoT architecture.Figure 13.3 Sensor layer architecture.Figure 13.4 Gateway and network layer architecture.Figure 13.5 Management service layer architecture.Figure 13.6 Application layer architecture.Figure 13.7 North America IoT market & industry.Figure 13.8 IoT unit installed base on consumer unit.Figure 13.9 IoT endpoint spending on product of IoT.Figure 13.10 IoT market & industry.Figure 13.11 Connected apps & process of IoT.Figure 13.12 Connected intelligence.Figure 13.13 Connected edge (connected & autonomous things).Figure 13.14 Architecture of android things.Figure 13.15 Products manufactured by Samsara company.Figure 13.16 M2M ecosystem.Figure 13.17 M2M ecosystem.Figure 13.18 Networking Technologies—IoT.Figure 13.19 3GPP & IoT.Figure 13.20 MCC over LTE networks.Figure 13.21 IoT & Mobile cloud technology.Figure 13.22 Fog computing architecture.Figure 13.23 IoT & Fog based smart healthcare system architecture.Figure 13.24 IoT and Fog based smart manufacturer factory baseline architecture.

      14 Chapter 14Figure 14.1 Next generation convergence technologies.Figure 14.2 Four vs of Big data: Data scientist view.Figure 14.3 Big data classification.Figure 14.4 A big data view on smart city formation.Figure 14.5 Programmers challenges with big data analytics.Figure 14.6 Cloud convergence with Big data in its architecture.Figure 14.7 Application of Big data in cloud services.Figure 14.8 Utility model of cloud based computing.Figure 14.9 Three layered of cloud as a