0%

Book Description

"Today we live in an era of internet where there are more connected devices than humans. The ecosystem of these interrelated computing devices, over the internet, for data sharing, communication and automation is called Internet of Things (IoT). Internet of Things not only exposes the learners to the world of IoT but also takes them deep into implementation, security and testing. The text is supplemented with case studies and real-world examples to enable the learners efficiently to implement the concepts discussed. Table of Contents: Chapter 1. Internet of Things—An Answer to the Next Generation Automated World Chapter 2. IoT Frameworks Chapter 3. Design Patterns for IoT Chapter 4. IoT Architecture Choices Chapter 5. IoT Core Modules Chapter 6. Essential Elements for Designing IoT Architecture Chapter 7. IoT Implementation Strategies Chapter 8. Types of Testing in IoT Chapter 9. Artificial Intelligence for IoT Chapter 10. Data Analytics and Machine Learning for IoT Chapter 11. Security Challenges for IoT Chapter 12. Holistic View on IoT Security Chapter 13. Hands-On Examples of IoT Experiments Chapter 14. IoT Project Ideas"

Table of Contents

  1. Cover
  2. About Pearson
  3. Title page
  4. Copyright Page
  5. Dedication Page
  6. Brief Content page
  7. Contents Page (1/3)
  8. Contents Page (2/3)
  9. Contents Page (3/3)
  10. Foreword Page
  11. Preface
  12. About the Author
  13. Chapter 1: Internet of Things—An Answer to theNext GenerationAutomated World
    1. WHAT IS INTERNET OF THINGS?
    2. BRIEF INTRODUCTION TO VARIOUSTECHNOLOGIES USED IN IoT
      1. Understanding the Tiers
      2. The Use of Sensors
      3. The Use of Microcontrollers and Internet Connectivity
      4. Using the Service Platforms
    3. IoT REVOLUTION
    4. BENEFITS OF IoT
      1. Benefits to End Users
      2. Benefits to Businesses
      3. IoT Implementation Challenges
      4. Real World Applications of IoT (1/2)
      5. Real World Applications of IoT (2/2)
        1. Industrial & Manufacturing
        2. Consumer
        3. Retail
        4. Marketing
        5. Finance
        6. Healthcare
        7. Transportation and Logistics
        8. Agriculture and Environment
        9. Energy
        10. Smart City
        11. Government
        12. Military
    5. IoT AND ROBOTIC WORK AUTOMATION
    6. WHAT IS THE FUTURE OF IoT?
      1. Yesterday’s Science Fiction is Today’s Consumer Electronic
        1. The Presence of IoT Devices
      2. Here are 10 predictions for the future of IoT:
    7. Exercises
    8. Review Questions
    9. Challenge Questions
    10. Project Idea
    11. CASE STUDY 1: 3D AIR QUALITY MODELLING BY USINGSENSOR DRONES
      1. Introduction and Objectives
      2. Methods
      3. Main contributions required for the project:
      4. Advantages of using 3D air quality modelling drones:
    12. Recommended Readings
    13. SUMMARY
  14. Internet_of_Things_CH02_pp027-054
  15. Chapter 2: IoT Frameworks
    1. IoT VALUE CHAIN
    2. IoT FRAMEWORKS AND PLATFORMS
      1. Real-Time Innovations (RTI)
      2. Cisco
      3. Salesforce
      4. Azure IoT
      5. Eclipse IoT
      6. ThingWorx
      7. GE Predix
    3. AWS IoT
    4. WATSON IoT PLATFORM
      1. Kaa
    5. IoT ECOSYSTEM
      1. Devices and Sensors
      2. Gateway
      3. Cloud
      4. Analytics
      5. User Interface
    6. ELEMENTS FOR IoT IMPLEMENTATION
      1. Security
      2. Data Sensitivity
      3. Scalability
      4. AI
      5. Interoperability
    7. KEY TAKEAWAY
      1. Exercises
      2. Review Questions
      3. Project Idea
  16. CASE STUDY 1: E-HEALTH SYSTEM WITH LOW COST FOREARLY DETECTION OF CHILDHOODDISEASES
    1. A pocket-friendly platform for e-health
    2. Enhanced accuracy in breath rate testing
    3. Journey: From prototyping to clinical trials
  17. CASE STUDY 2: ENVIRONMENTAL MONITORINGAT ATHENS AIRPORT BY USING IOTPLATFORM
    1. Air quality monitoring
    2. Determining aircraft location on the airfi eld
    3. A High-tech, expandable and reliable platform
  18. CASE STUDY 3: FISH FARMING BY CONTROLLING WATERTANKS IN VIETNAM
    1. Real-time monitoring system
    2. Lowered losses
    3. Recommended Readings
  19. SUMMARY
  20. Internet_of_Things_CH03_pp055-080
  21. Chapter 3: Design Patterns for IoT
    1. VARIOUS DESIGN PATTERNS
      1. Design Patterns for Common IoT Deployments
        1. Network Connected Devices (Things
      2. Software Abstraction for Virtualization of Things
      3. Virtualization of Things through Middleware
      4. Design Patterns for Edge Deployment, Provisioning, andOrchestration
        1. Edge Code Deployment Pattern
        2. Edge Orchestration Pattern
        3. Edge Provisioning Pattern
      5. Design Patterns for Node Connections
        1. Connected Sensor Pattern
        2. Remote Read Pattern
        3. Remote Control Pattern
      6. Design Patterns for Deployment Strategies
        1. Single Environment Deployment Pattern
        2. Heterogeneous Deployment Pattern
        3. Distributed System Deployment Pattern
      7. Design Patterns for Infrastructure
        1. WSN Access Point
        2. 6LoWPAN Edge Router
        3. Mesh Routing
        4. Behind NAT Connectivity
        5. Application Gateway
        6. M2M WAN
      8. Design Patterns for Security
        1. Access Control
        2. Asymmetric Public-key Cryptography on Devices
        3. Datagram Transport Layer Security (DTLS) for UDP
        4. End-to-End Encryption
        5. Device Management
    2. CHALLENGES AND SOLUTIONS FOR DESIGNINGARCHITECTURE FOR IoT
      1. Challenge #1: Security
      2. Challenge #2: Scalability
      3. Challenge #3: Latency
      4. Challenge #4: Quality of Service
      5. Exercises
      6. Review Questions
      7. Project Idea
    3. CASE STUDY 1: IoT LAB THAT MONITORS PARKING,WATER QUALITY, AMBIENT, ANDENVIRONMENTAL CONDITIONS
      1. An establishment connected to the cloud
      2. Deployment is done outside:
      3. Deployment is done indoors:
      4. Recommended Readings
    4. SUMMARY
  22. Internet_of_Things_CH04_pp081-104
  23. Chapter 4: IoT ArchitectureChoices
    1. FOUR-LAYER ARCHITECTURE
      1. First Layer (Sensors and Actuators)
      2. Second Layer (The Internet Gateway)
      3. Third Layer (Edge IoT)
      4. Fourth Layer (The Data Center and the Cloud)
    2. SEVEN-LAYER ARCHITECTURE
      1. Layer 1 (Physical Devices)
      2. Layer 2 (Connectivity
      3. Layer 3 (Edge Computing)
      4. Layer 4 (Data Accumulation
      5. Layer 5 (Data Abstraction)
      6. Layer 6 (Application)
      7. Layer 7 (Collaboration and Processes)
      8. Fog Computing
      9. Dilemma
      10. Solution
      11. Advantages
      12. Open Stack Cloud Architecture
      13. OpenStack Approach
    3. HADOOP
      1. Pattern 1 (Real-Time IoT Events Streaming)
      2. Problems with IoT Streaming Ingestion
      3. Managing Bad Data
      4. Firmware Multiplicity
      5. Enhancing Data in Stream
      6. Processing Data at Scale
      7. Pattern 2 (Batch-Oriented Data Transfer)
      8. Hadoop Data Processing and Visualizing
    4. FINAL CONSIDERATIONS
      1. Cloud Service Models
      2. Infrastructure as a Service (IaaS)
      3. Platform as a Service (PaaS)
      4. Software as a Service (SaaS)
      5. Cloud Topologies
      6. Public Cloud
      7. Dedicated Private Cloud
      8. Managed Private Cloud
      9. Hybrid Cloud
      10. Role of the Cloud in IoT
      11. Exercises
      12. Review Questions
      13. Project Idea
    5. CASE STUDY 1: MONITORING ENVIRONMENTAL ANDAQUATIC PARAMETERS TO ENCOURAGESALMON IN OSLO
      1. Operating in Extreme Cold Conditions
      2. The Connecting River
      3. The Connecting Air
    6. CASE STUDY 2: MONITORING ROAD OCCUPANCYPATTERNS AND MOBILITY INDORDRECHT SMART CITY
      1. Real-Time City Monitoring
      2. Urban Planning Is the Key for Smart Cities
      3. Recommended Readings
    7. SUMMARY
  24. Internet_of_Things_CH05_pp105-140
  25. Chapter 5: IoT Core Modules
    1. PROTOCOLS
      1. Infrastructure Protocols
        1. 6LowPAN
        2. IPv6
        3. Different Types of IPv6 Address
        4. Features of IPv6:
        5. RPL
        6. Protocol Configuration
        7. How the RPL Protocol gets Implemented?
      2. Identification Protocols
        1. EPC
        2. uCode
        3. URIs
      3. Communication/Transport Protocols
        1. Bluetooth
        2. ZigBee
        3. Z-Wave
        4. Wi-Fi
        5. Cellular
        6. LPWAN
      4. Discovery Protocols
        1. Physical Web
        2. mDNS
        3. DNS-SD
        4. Some Notable Features of DNSs-SD:
      5. Data Protocols
        1. MQTT
        2. Message Types in MQTT
        3. Real world Application that uses MQTT
        4. CoAP
        5. AMQP
      6. Device Management Protocols
        1. TR-069
        2. OMA-DM
      7. Semantic Protocols
        1. JSON-LD
      8. Security Protocols
        1. X.509
      9. SENSORS (1/2)
      10. SENSORS (2/2)
        1. Temperature Sensors
        2. Proximity Sensor
        3. Pressure Sensor
        4. Water Quality Sensor
        5. Chemical Sensor
        6. Gas Sensor
        7. Smoke Sensor
        8. IR Sensors
        9. Level Sensors
        10. Image Sensors
        11. Motion Detection Sensors
        12. Accelerometer Sensors
        13. Gyroscope Sensors
        14. Optical Sensors
        15. ENDPOINTS
        16. Endpoint Model
        17. Lightweight Endpoint
        18. The Complex Endpoint
        19. The Gateway
    2. DATA COMMUNICATION
      1. Device-to-Device
      2. Device-to-Cloud
      3. Device-to-Gateway
      4. Back-End Data-Sharing
    3. IoT DATA MANAGEMENT
      1. IoT Data Lifecycle
      2. Querying
      3. Production
      4. Collection
      5. Aggregation/Fusion
      6. Delivery
      7. Preprocessing
      8. Storage/Update
      9. Processing/Analysis
    4. ANALYTICS
      1. Structure
      2. Volume
      3. Targeting Revenue
      4. Edge
      5. Streaming Analytics
      6. Spatial Analytics
      7. Time Series Analytics
      8. Prescriptive Analysis
      9. Exercises
      10. Review Questions
      11. Challenge Questions
      12. Project Idea
    5. CASE STUDY 1: MONITORING SNOW AND ICE IN UKHIGHWAYS DURING WINTERS
      1. Weather Station to help in the Decision Making
      2. Saving Money and Improving the Environment
    6. CASE STUDY 2: PREDICTING VOLCANIC ERUPTIONS IN MASAYA WITH SMART WIRELESS SENSORS
      1. Real-time Monitoring at Masaya Volcano with 80 Sensors
      2. Saving Lives by Opening Data
    7. CASE STUDY 3: PROTECTING BELUGA WHALES INALASKA BY USING FLEXIBLE SENSORPLATFORM
      1. Recommended Readings
    8. SUMMARY
  26. Internet_of_Things_CH06_pp141-170
  27. Chapter 6: Essential Elementsfor Designing IoTArchitecture
    1. WHAT IS UML?
    2. WHY DO WE USE UML?
      1. Sketch
      2. Forward Design
      3. Backward Design
      4. Blueprint
      5. Pseudo Programming Language
    3. DIFFERENT TYPES OF UML DIAGRAMS
      1. Behavioral UML Diagram
      2. Structural UML Diagram
      3. Activity Diagrams
        1. What Are Activity Diagrams?
        2. Why Do We Use Activity Diagrams?
        3. How Do We Draw an Activity Diagram?
        4. Example:
      4. Use Case Diagrams
    4. INTERACTION OVERVIEW DIAGRAM
    5. TIMING DIAGRAM
      1. What are the main components of a Timing UML Diagram?
    6. SEQUENCE UML DIAGRAM
    7. COMMUNICATION UML DIAGRAM
    8. CLASS DIAGRAM
    9. OBJECT DIAGRAM
    10. COMPOSITE STRUCTURE DIAGRAMS
      1. The Structure
      2. Components of the Diagram
      3. State Chart Diagrams
      4. Why Do We Use State Chart Diagrams?
      5. How Can We Draw a State Chart Diagram?
      6. Component Diagrams
        1. Why Do We Use Component Diagrams?
        2. The Main Purpose behind Using a Component Diagram:
        3. How Do We Draw a Component Diagram?
        4. How Can We Use Component Diagrams?
        5. Advantages of Using Component Diagrams
    11. DEPLOYMENT DIAGRAM
    12. PACKAGE DIAGRAM
    13. PROFILE DIAGRAM
      1. What Are Stereotypes?
      2. What Are Tagged Values?
      3. What Are Constraints?
      4. Tools to Draw UML Diagrams
      5. Pen and Paper
      6. Online Tools
      7. Free Online Tools
      8. Desktop Applications
      9. Exercises
      10. Review Questions
      11. Project Idea
        1. Using UML Diagrams for Ticket Vending Machine
    14. CASE STUDY 1: PROTECTING ENDANGEREDFRESHWATER MUSSELS IN THEOHIO RIVER
      1. Automatic Monitoring of Dredging Activities
      2. Reducing the Risk of Divers while Protecting Mussels
    15. CASE STUDY 2: SMART AGRICULTURE IN AUSTRALIA TOENSURE HEALTHY CROPS AND REDUCELOSSES
      1. Introduction
      2. Attaching Plants Nursery with IoT
      3. Recommended Readings
    16. SUMMARY
  28. Internet_of_Things_CH07_pp171-200
  29. Chapter 7: IoT ImplementationStrategies
    1. CHALLENGES AND SOLUTIONS
      1. The Cost
      2. Security
      3. Infrastructure for Technology
      4. Infrastructure for Communication
      5. IoT Standards
      6. Procurement
    2. WHAT TO KNOW BEFORE AN IoT IMPLEMENTATION?
      1. Cultural Shift
      2. Time for Projects
      3. Necessary Skills
      4. Security
      5. Interconnectivity
      6. Scalability
      7. Exercises
      8. Review Questions
      9. Project Idea
      10. Analysis of a Research Paper
      11. Implementing an Access Point with IoT in a Smart Home
      12. Technical Depth and Challenges
      13. Related Works
      14. IoT AP System Architecture
      15. Access Point System Architecture
      16. System Implementation
      17. Designing Smart Home
      18. ZigBee Home Automation Device Configuration
      19. ZigBee/Wi-Fi Configuration
      20. Remote Users Access Verification
      21. Performance Evaluation
      22. Conclusion
      23. Recommended Readings
    3. SUMMARY
  30. Internet_of_Things_CH08_pp201-230
  31. Chapter 8: Types of Testingin IoT
    1. TYPES OF TESTING IN IoT
      1. Usability Testing
      2. Navigation of Security Protocols
      3. User Behavior
      4. Unexpected Stumbling Blocks
      5. Selection of Testers
      6. Functional Testing
      7. Scalability Testing
      8. Compatibility Testing
      9. Performance Testing
    2. IoT TESTING CHALLENGES
      1. Cloud IoT Platforms
      2. Data Concerns for Cyber Threats
      3. IoT Data Protocol Testing
      4. Battery Life
      5. Standardization
      6. Network
    3. IoT TESTING TOOLS
      1. IoTIFY
      2. LoadRunner
      3. VUGen
      4. Controller
      5. Injectors/LoadGenerators/Agents Machine
      6. Analysis
      7. Gatling
    4. TESTING SMART WEARABLES
      1. Material Testing
      2. Hardware Testing
      3. Firmware Testing
      4. External Testing
    5. FUTURE OF TESTING IN THE INTERNET OF THINGS
      1. Testing for Wireless Connectivity
      2. Smart Homes
      3. Security Aspect
      4. Numerous Interfaces
    6. TEST AUTOMATION IN IoT
      1. Importance of Test Automation
      2. Exercises
      3. Review Questions
      4. Project Idea
    7. CASE STUDY 1: MONITORING TRAFFIC VOLUME INPETROL STATIONS TO IMPROVE SALESSTRATEGIES
      1. The main objectives behind the installation of the project:
    8. CASE STUDY 2: SMARTPHONE DETECTION SYSTEMTO KNOW THE CROWD BEHAVIOR INTRADE FAIR OF UK
      1. The main areas of the analysis were:
      2. Recommended Readings
    9. SUMMARY
  32. Internet_of_Things_CH09_pp231-248
  33. Chapter 9: ArtificialIntelligence for IoT
    1. EXPLORING THE WORLD OF AI
      1. What is AI?
      2. Different Types of Artificial Intelligence
        1. Type 1: Based on the Capabilities of AI
        2. Type 2: Based on the Functionalities of AI
      3. How do we develop such intelligent AI?
      4. Biggest Challenge for AI
      5. Industry Adaptation of AI
    2. AI AND IoT: A LOGICAL COMBINATION
    3. IoT AND AI IN THE CONTEXT OF INDUSTRY 4.0
      1. What is Industry 4.0?
      2. Benefits of AI for IoT
      3. Use of AI in IoT with Real Life Examples
        1. IIoT (Industrial IoT)
        2. Farming
        3. Self-driving Vehicles
        4. Health
      4. Exercises
      5. Review Questions
      6. Project Idea
    4. CASE STUDY 1: SMART FACTORY SYSTEM TO REDUCEPRODUCTION AND ENHANCEMANUFACTURING PROCESS
      1. Project Overview
      2. Connecting Machines and Sensors to the Cloud
      3. How does System Work?
      4. Hardware for the Project
      5. Advanced Gateway to the Cloud
      6. The data is Accessible Anywhere and Anytime
    5. CASE STUDY 2: SMART IRRIGATION TO SAVE WATERIN BARCELONA
      1. One Click Operation to Manage the Irrigation System
      2. Cutting Down Wastage of Water and Money
    6. CASE STUDY 3: USING SMART SENSORS TO MONITOROZONE LAYER BY EUROPEAN UNION
      1. To tackle this complex set of problem, a wide range of networksensors were installed to measure ozone in the affected areas:
    7. CASE STUDY 4: WARNING SYSTEM TO AVOID FLOODSAND ALLOW DISASTER MANAGEMENT INCOLOMBIAN RIVERS
      1. Recommended Readings
    8. SUMMARY
  34. Internet_of_Things_CH10_pp249-270
  35. Chapter 10: Data Analyticsand MachineLearning for IoT
    1. IMPACT OF DATA ANALYTICS AND MACHINELEARNING IN IoT
      1. Data Analytics Need and Strategy with IoT
      2. Use of Machine Learning in IoT with Real Life
    2. MACHINE LEARNING MODELS
      1. Regression
      2. Classification (1/2)
      3. Classification (2/2)
      4. Exercises
      5. Review Questions
      6. Project Idea
    3. CASE STUDY 1: SMART PARKING SYSTEM IN MONTPELLIERTO MANAGE TRAFFIC JAMS
    4. CASE STUDY 2: USING SMART SENSOR TECHNOLOGIESTO MONITOR AIR QUALITY IN PLAY AREASTO PREVENT ASTHMA ATTACKS IN KIDS
      1. Recommended Readings
    5. SUMMARY
  36. Internet_of_Things_CH11_pp271-308
  37. Chapter 11: Security Challengesfor IoT
    1. BOTNETS
      1. How Do They Attack?
      2. What Makes the IoT Devices a Target of Botnets?
      3. Monetization
      4. Examples of Botnet Attacks
    2. MIRAI
      1. How Does Mirai Work?
    3. SPAM EMAILS
    4. RANSOMWARE
      1. How Ransomware Works?
      2. Ransomware Attacks in IoT
    5. MEDICAL IoT DEVICES
      1. Insulin Pump Demonstration
    6. MAN IN THE MIDDLE ATTACK
      1. Man in the Middle Attack Tools
      2. Man in the Middle in IoT
      3. Bluetooth Devices at Risk
    7. REMOTE VEHICLE ACCESS
      1. Chrysler Debacle
      2. The Chinese Attack on Tesla
    8. WEAK PASSWORDS
      1. California Ban
      2. OWASP
    9. DDoS ATTACK
      1. How Does It Work?
      2. DDoS Attacks in the IoT Sector
      3. Constrained Application Protocol
    10. LACK OF UPDATES
    11. IP SPOOFING
      1. How Does IP Spoofing Work?
    12. TARGETING CAMERAS IN IoT ECOSYSTEM
      1. Hack of 175,000 Cameras
      2. IP Cameras
      3. Zero-Day Bug
    13. ANATOMY OF AN IoT CYBER ATTACK
      1. IoT Device’s Anatomy
      2. Hardware
      3. Internet of Things Device Firmware
      4. Internet of Things Device Management
      5. Anatomy of Internet of Things Malware Cyber Attacks
      6. Exercises
      7. Review Questions
      8. Project Idea
    14. CASE STUDY 1: SMART WATER MANAGEMENTSYSTEM IN SPAIN
      1. Water Effi ciency and Safety Solution
        1. The system comprises:
      2. Cutting Down the Costs by Nearly 50%
      3. Recommended Readings
    15. SUMMARY
  38. Internet_of_Things_CH12_pp309-326
  39. Chapter 12: Holistic Viewon IoT Security
    1. CYBER SECURITY
    2. PHYSICAL AND HARDWARE SECURITY
      1. What Is Physical Security?
      2. Importance of Physical Security
    3. CRYPTOGRAPHY
      1. Encrypted Communication Protocols
      2. Hashed Passwords
      3. Private Key Authentication
      4. Signed Firmware
      5. Resource Constraints
    4. BLOCKCHAIN IN IoT
      1. What Is Blockchain?
      2. Decentralizing IoT
      3. Examples
    5. IDENTITY MANAGEMENT FOR DEVICES
      1. How IoT Is Altering IAM
      2. Offering Convenience
      3. Providing Customization
      4. Empowering Customers
    6. BEST SECURITY PRACTICES
      1. Avoid Botnets
      2. Testing and Verifying of Code
      3. Protect Devices from Identity Spoofing
      4. Assess Network Approvals
      5. Carefully Choose IoT Vendors
      6. Alter Default Security Settings
      7. Exercises
      8. Review Questions
      9. Project Idea
    7. CASE STUDY 1: USING IoT TO MONITOR THE LARGESTGOLD MINE IN THAILAND
      1. Recommended Readings
    8. SUMMARY
  40. Internet_of_Things_CH13_pp327-348
  41. Chapter 13: Hands-On Examplesof IoT Experiments
    1. ARDUINO
      1. What Is Arduino?
      2. Boards
      3. IDE
      4. Arduino Programming
    2. RASPBERRY PI
      1. Introduction to Raspberry Pi
      2. Install the Operating System on Raspberry Pi
      3. Development Environment
      4. Python IDEs
      5. Programming in Python
      6. Exercises
      7. Review Questions
      8. Challenge Questions
      9. Hands-On Practice Task
      10. Practice Task 1: Arduino Robot
      11. Practice Task 2: Building up a Robot Buggy by usingRaspberry PI
      12. Project Idea
      13. Detecting Santa
    3. CASE STUDY 1: THE PI REVOLUTION THAT TRANSFORMEDTHE FACE OF LEARNING IN UK’SST JOSEPH’S SCHOOL
    4. CASE STUDY 2: ASSISTING THE DEMENTED PATIENTS
      1. Recommended Readings
    5. SUMMARY
  42. Internet_of_Things_CH14_pp349-372
  43. Chapter 14: IoT Project Ideas
    1. PROJECT 1: VEHICLE TRACKING SYSTEM BASED ON GPSAND GSM
      1. Introduction and Objectives
      2. Methods
      3. Benefits and Applications of the Vehicle Tracking System
    2. PROJECT 2: BABY MONITORING SYSTEM USINGRASPBERRY PI
      1. Introduction and Objectives
      2. Methods
    3. PROJECT 3: IoT BASED AIR QUALITY MONITORINGSYSTEM
      1. Introduction and Objectives
      2. Methods
    4. PROJECT 4: SMART CAMERA BASED ON IoT BY USINGANDROID AND RASPBERRY PI
      1. Introduction and Objectives
      2. Method and Approach
    5. PROJECT 5: RUNNING WINDOWS 10 ON RASPBERRY PI 2
      1. Introduction and objectives
      2. Requirements for the Project
      3. Methods
    6. PROJECT 6: SMART PARKING SYSTEM BASED ON IoT BYUSING RFID
      1. Introduction and objectives
      2. Methods
    7. PROJECT 7: SMART STREET LIGHT BASED ON IoT
      1. Introduction and Objectives
      2. Methods
    8. PROJECT 8: SMART WATER MANAGEMENT SYSTEMBASED ON IoT BY USING RASPBERRY PI
      1. Introduction and Objectives
      2. Methods
      3. Outcome
    9. PROJECT 9: IoT BASED SMART DOORBELL SYSTEM
      1. Introduction and Objectives
      2. Methods
      3. Circuit Explanation
      4. Outcome
    10. PROJECT 10: SMART WALKING STICK FOR VISUALLYIMPAIRED BASED ON RASPBERRY PI
      1. Introduction and Objectives
      2. Methods
      3. Outcome
      4. Exercises
      5. Review Questions
      6. Recommended Readings
    11. SUMMARY
  44. Internet_of_Things_CH15_Index_p373-380
  45. Index
18.216.186.164