0%

The book aims to integrate the aspects of IoT, Cloud computing and data analytics from diversified perspectives. The book also plans to discuss the recent research trends and advanced topics in the field which will be of interest to academicians and researchers working in this area. Thus, the book intends to help its readers to understand and explore the spectrum of applications of IoT, cloud computing and data analytics.

Here, it is also worth mentioning that the book is believed to draw attention on the applications of said technology in various disciplines in order to obtain enhanced understanding of the readers. Also, this book focuses on the researches and challenges in the domain of IoT, Cloud computing and Data analytics from perspectives of various stakeholders.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Preface
  5. Acknowledgement
  6. 1 Internet of Things: A Key to Unfasten Mundane Repetitive Tasks
    1. 1.1 Introduction
    2. 1.2 The IoT Scenario
    3. 1.3 The IoT Domains
    4. 1.4 Green Computing (GC) in IoT Framework
    5. 1.5 Semantic IoT (SIoT)
    6. 1.6 Conclusions
  7. 2 Measures for Improving IoT Security
    1. 2.1 Introduction
    2. 2.2 Perceiving IoT Security
    3. 2.3 The IoT Safety Term
    4. 2.4 Objectives
    5. 2.5 Research Methodology
    6. 2.6 Security Challenges
    7. 2.7 Securing IoT
    8. 2.8 Monitoring of Firewalls and Good Management
    9. 2.9 Conclusion
  8. 3 An Efficient Fog-Based Model for Secured Data Communication
    1. 3.1 Introduction
    2. 3.2 Attacks in IoT
    3. 3.3 Literature Survey
    4. 3.4 Proposed Model for Attack Identification Using Fog Computing
    5. 3.5 Performance Analysis
    6. 3.6 Conclusion
  9. 4 An Expert System to Implement Symptom Analysis in Healthcare
    1. 4.1 Introduction
    2. 4.2 Related Work
    3. 4.3 Proposed Model Description and Flow Chart
    4. 4.4 UML Analysis of Expert Model
    5. 4.5 Ontology Model of Expert Systems
    6. 4.6 Conclusion and Future Scope
  10. 5 Traffic Prediction Using Machine Learning and IoT
    1. 5.1 Introduction
    2. 5.2 Related Work
    3. 5.3 System Design
    4. 5.4 Results and Discussion
    5. 5.5 Conclusion
    6. 5.6 Future Work
  11. 6 IoT Protocol for Inferno Calamity in Public Transport
    1. 6.1 Introduction
    2. 6.2 Literature Survey
    3. 6.3 Methodology
    4. 6.4 Implementation
    5. 6.5 Results
    6. 6.6 Conclusion and Future Work
  12. 7 Traffic Prediction Using Machine Learning and IoT
    1. 7.1 Introduction
    2. 7.2 Literature Review
    3. 7.3 Methodology
    4. 7.4 Architecture
    5. 7.5 Results
    6. 7.6 Conclusion and Future Scope
  13. 8 Application of Machine Learning in Precision Agriculture
    1. 8.1 Introduction
    2. 8.2 Machine Learning
    3. 8.3 Agriculture
    4. 8.4 ML Techniques Used in Agriculture
    5. 8.5 Conclusion
  14. 9 An IoT-Based Multi Access Control and Surveillance for Home Security
    1. 9.1 Introduction
    2. 9.2 Related Work
    3. 9.3 Hardware Description
    4. 9.4 Software Design
    5. 9.5 Conclusion
  15. 10 Application of IoT in Industry 4.0 for Predictive Analytics
    1. 10.1 Introduction
    2. 10.2 Past Literary Works
    3. 10.3 Methodology and Results
    4. 10.4 Conclusion
  16. 11 IoT and Its Role in Performance Enhancement in Business Organizations
    1. 11.1 Introduction
    2. 11.2 Technology and Productivity
    3. 11.3 Technology and Future of Human Work
    4. 11.4 Technology and Employment
    5. 11.5 Conclusion
  17. 12 An Analysis of Cloud Computing Based on Internet of Things
    1. 12.1 Introduction
    2. 12.2 Challenges in IoT
    3. 12.3 Technologies Used in IoT
    4. 12.4 Cloud Computing
    5. 12.5 Cloud Computing Characteristics
    6. 12.6 Applications of Cloud Computing
    7. 12.7 Cloud IoT
    8. 12.8 Necessity for Fusing IoT and Cloud Computing
    9. 12.9 Cloud-Based IoT Architecture
    10. 12.10 Applications of Cloud-Based IoT
    11. 12.11 Conclusion
  18. 13 Importance of Fog Computing in Emerging Technologies-IoT
    1. 13.1 Introduction
    2. 13.2 IoT Core
    3. 13.3 Need of Fog Computing
  19. 14 Convergence of Big Data and Cloud Computing Environment
    1. 14.1 Introduction
    2. 14.2 Big Data: Historical View
    3. 14.3 Big Data Challenges
    4. 14.4 The Architecture
    5. 14.5 Cloud Computing: History in a Nutshell
    6. 14.6 Insight of Big Data and Cloud Computing
    7. 14.7 Cloud Framework
    8. 14.8 Conclusions
    9. 14.9 Future Perspective
  20. 15 Data Analytics Framework Based on Cloud Environment
    1. 15.1 Introduction
    2. 15.2 Focus Areas of the Chapter
    3. 15.3 Cloud Computing
    4. 15.4 Data Analytics
    5. 15.5 Real-Time Data Analytics Support in Cloud
    6. 15.6 Framework for Data Analytics in Cloud
    7. 15.7 Data Analytics Work-Flow
    8. 15.8 Cloud-Based Data Analytics Tools
    9. 15.9 Experiment Results
    10. 15.10 Conclusion
  21. 16 Neural Networks for Big Data Analytics
    1. 16.1 Introduction
    2. 16.2 Neural Networks—An Overview
    3. 16.3 Why Study Neural Networks?
    4. 16.4 Working of Artificial Neural Networks
    5. 16.5 Innovations in Neural Networks
    6. 16.6 Applications of Deep Learning Neural Networks
    7. 16.7 Practical Application of Neural Networks Using Computer Codes
    8. 16.8 Opportunities and Challenges of Using Neural Networks
    9. 16.9 Conclusion
  22. 17 Meta-Heuristic Algorithms for Best IoT Cloud Service Platform Selection
    1. 17.1 Introduction
    2. 17.2 Selection of a Cloud Provider in Federated Cloud
    3. 17.3 Algorithmic Solution
    4. 17.4 Analyzing the Algorithms
    5. 17.5 Conclusion
  23. 18 Legal Entanglements of Cloud Computing In India
    1. 18.1 Cloud Computing Technology
    2. 18.2 Cyber Security in Cloud Computing
    3. 18.3 Security Threats in Cloud Computing
    4. 18.4 Cloud Security Probable Solutions
    5. 18.5 Cloud Security Standards
    6. 18.6 Cyber Security Legal Framework in India
    7. 18.7 Privacy in Cloud Computing—Data Protection Standards
    8. 18.8 Recognition of Right to Privacy
    9. 18.9 Government Surveillance Power vs Privacy of Individuals
    10. 18.10 Data Ownership and Intellectual Property Rights
    11. 18.11 Cloud Service Provider as an Intermediary
    12. 18.12 Challenges in Cloud Computing
    13. 18.13 Conclusion
  24. 19 Securing the Pharma Supply Chain Using Blockchain
    1. 19.1 Introduction
    2. 19.2 Literature Review
    3. 19.3 Methodology
    4. 19.4 Results
    5. 19.5 Conclusion and Future Scope
  25. Index
  26. End User License Agreement
3.128.79.88