Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by
Integration of Cloud Computing with Internet of Things
Cover
Title Page
Copyright
Preface
Acknowledgement
1 Internet of Things: A Key to Unfasten Mundane Repetitive Tasks
1.1 Introduction
1.2 The IoT Scenario
1.3 The IoT Domains
1.4 Green Computing (GC) in IoT Framework
1.5 Semantic IoT (SIoT)
1.6 Conclusions
2 Measures for Improving IoT Security
2.1 Introduction
2.2 Perceiving IoT Security
2.3 The IoT Safety Term
2.4 Objectives
2.5 Research Methodology
2.6 Security Challenges
2.7 Securing IoT
2.8 Monitoring of Firewalls and Good Management
2.9 Conclusion
3 An Efficient Fog-Based Model for Secured Data Communication
3.1 Introduction
3.2 Attacks in IoT
3.3 Literature Survey
3.4 Proposed Model for Attack Identification Using Fog Computing
3.5 Performance Analysis
3.6 Conclusion
4 An Expert System to Implement Symptom Analysis in Healthcare
4.1 Introduction
4.2 Related Work
4.3 Proposed Model Description and Flow Chart
4.4 UML Analysis of Expert Model
4.5 Ontology Model of Expert Systems
4.6 Conclusion and Future Scope
5 Traffic Prediction Using Machine Learning and IoT
5.1 Introduction
5.2 Related Work
5.3 System Design
5.4 Results and Discussion
5.5 Conclusion
5.6 Future Work
6 IoT Protocol for Inferno Calamity in Public Transport
6.1 Introduction
6.2 Literature Survey
6.3 Methodology
6.4 Implementation
6.5 Results
6.6 Conclusion and Future Work
7 Traffic Prediction Using Machine Learning and IoT
7.1 Introduction
7.2 Literature Review
7.3 Methodology
7.4 Architecture
7.5 Results
7.6 Conclusion and Future Scope
8 Application of Machine Learning in Precision Agriculture
8.1 Introduction
8.2 Machine Learning
8.3 Agriculture
8.4 ML Techniques Used in Agriculture
8.5 Conclusion
9 An IoT-Based Multi Access Control and Surveillance for Home Security
9.1 Introduction
9.2 Related Work
9.3 Hardware Description
9.4 Software Design
9.5 Conclusion
10 Application of IoT in Industry 4.0 for Predictive Analytics
10.1 Introduction
10.2 Past Literary Works
10.3 Methodology and Results
10.4 Conclusion
11 IoT and Its Role in Performance Enhancement in Business Organizations
11.1 Introduction
11.2 Technology and Productivity
11.3 Technology and Future of Human Work
11.4 Technology and Employment
11.5 Conclusion
12 An Analysis of Cloud Computing Based on Internet of Things
12.1 Introduction
12.2 Challenges in IoT
12.3 Technologies Used in IoT
12.4 Cloud Computing
12.5 Cloud Computing Characteristics
12.6 Applications of Cloud Computing
12.7 Cloud IoT
12.8 Necessity for Fusing IoT and Cloud Computing
12.9 Cloud-Based IoT Architecture
12.10 Applications of Cloud-Based IoT
12.11 Conclusion
13 Importance of Fog Computing in Emerging Technologies-IoT
13.1 Introduction
13.2 IoT Core
13.3 Need of Fog Computing
14 Convergence of Big Data and Cloud Computing Environment
14.1 Introduction
14.2 Big Data: Historical View
14.3 Big Data Challenges
14.4 The Architecture
14.5 Cloud Computing: History in a Nutshell
14.6 Insight of Big Data and Cloud Computing
14.7 Cloud Framework
14.8 Conclusions
14.9 Future Perspective
15 Data Analytics Framework Based on Cloud Environment
15.1 Introduction
15.2 Focus Areas of the Chapter
15.3 Cloud Computing
15.4 Data Analytics
15.5 Real-Time Data Analytics Support in Cloud
15.6 Framework for Data Analytics in Cloud
15.7 Data Analytics Work-Flow
15.8 Cloud-Based Data Analytics Tools
15.9 Experiment Results
15.10 Conclusion
16 Neural Networks for Big Data Analytics
16.1 Introduction
16.2 Neural Networks—An Overview
16.3 Why Study Neural Networks?
16.4 Working of Artificial Neural Networks
16.5 Innovations in Neural Networks
16.6 Applications of Deep Learning Neural Networks
16.7 Practical Application of Neural Networks Using Computer Codes
16.8 Opportunities and Challenges of Using Neural Networks
16.9 Conclusion
17 Meta-Heuristic Algorithms for Best IoT Cloud Service Platform Selection
17.1 Introduction
17.2 Selection of a Cloud Provider in Federated Cloud
17.3 Algorithmic Solution
17.4 Analyzing the Algorithms
17.5 Conclusion
18 Legal Entanglements of Cloud Computing In India
18.1 Cloud Computing Technology
18.2 Cyber Security in Cloud Computing
18.3 Security Threats in Cloud Computing
18.4 Cloud Security Probable Solutions
18.5 Cloud Security Standards
18.6 Cyber Security Legal Framework in India
18.7 Privacy in Cloud Computing—Data Protection Standards
18.8 Recognition of Right to Privacy
18.9 Government Surveillance Power vs Privacy of Individuals
18.10 Data Ownership and Intellectual Property Rights
18.11 Cloud Service Provider as an Intermediary
18.12 Challenges in Cloud Computing
18.13 Conclusion
19 Securing the Pharma Supply Chain Using Blockchain
19.1 Introduction
19.2 Literature Review
19.3 Methodology
19.4 Results
19.5 Conclusion and Future Scope
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
19 Securing the Pharma Supply Chain Using Blockchain
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset