- ADC, 81
- Advantages, 5–7, 10–11, 17
- AES and Blowfish encryption, 156
- Agility, 2
- Agriculture, 1–4, 11, 21–22
- Application layer, 202, 208
- Applications of cloud computing, 206–207
- Applications of cloud-based IoT, 208
- Applications of deep learning neural networks, 292
- Architecture, 7–8, 116–122
- analysis, 9
- API architecture, 117
- data care, 9
- file structure, 117–118
- simulator architecture, 118–122
- storage collection system, 8
- workflow in application, 122
- workflow of Google APIs in the application, 122
- Arduino mega, 79
- Artificial intelligence, 1, 9, 20–21
- Artificial neural network, 131, 137
- Attacks in IoT, 45
- Automation, 183, 186, 187, 191, 194
- Big data analysis, 5–6
- Big data challenges, 6–7
- Big data classification, 4–5
- Big data definition, 3–4
- Bird swarm algorithm, 311
- flight behaviour, 313
- forging behaviour, 313
- vigilance behaviour, 313
- Bluetooth, 78, 154
- Botnet, 323
- Business layer, 202
- Campus, 3–4, 7, 22
- Challenges in IoT, 202
- Cloud, 251–263, 266, 268, 269–274
- Cloud computing, 1, 5–6, 9, 203, 319
- view on cloud comptuing and big data, 9–10
- Cloud computing characteristics, 205–206
- Cloud framework, 14
- Cassandra, 15
- Hadoop, 14–15
- Voldemort, 16
- a comparison with relational databases and benefits, 16–17
- Cloud IoT, 207
- Cloud IoT in healthcare, 208
- Cloud IoT in logistics, 209
- Cloud provider selection, 301
- Cloud service providers, 335
- Cloud-based IoT architecture, 208
- CNN fuzzy inference engine, 61
- Coding layer, 201
- Cognitive Science, 1, 20–21
- Communicating sequential processes, 156
- Communication network, 1, 17
- Constitution of India, 331
- Convolution neural network, 60–61, 131
- Copyright, 330
- Correspondence in IoT devices, 43
- Cost, 5–9, 11, 13–15, 17, 19
- Cryptojacking, 324
- Cyber security, 322, 328
- Cybernetics, 3
- Data acquition system (DAS), 2
- Data analytics, 251, 252, 258, 263, 265–270, 272, 274
- Data breach, 323
- Data driven, 5
- Data protection bill, 331
- Data redundancy, 202
- Decryption, 320
- Deep learning, 147–149
- Degradation modeling, 1
- Denial of service, 323
- Deployment models of cloud computing, 204
- Device and the location independence, 206
- Device capacity, 202
- Domain specific language, 157
- ECDH calculation, 156
- Edge computing, 1, 6, 8
- Education, 1–2, 4
- Efficiency, 9–12, 21, 252
- Encryption, 320
- Energy management, 3, 12
- Energy-efficient, 1, 3–4, 6, 12, 22
- ERP, 191
- Expert model, 58–62, 65, 67
- Exponential degradation model, 14
- Failure mode effect and criticality analysis (FMECA), 13
- Field programmable gate array, 155
- Filters, 34, 35
- FIND, 183
- Fire alarm, 89
- Firewall, 29, 34, 35, 36, 37, 38
- Flame sensor, 87
- Float sensor, 158
- Fog computing, 1, 10
- Fog computing model, 42
- Framework, 268, 274
- Gadget, 76
- Gaussian process, 7
- Generic architecture, 199
- generic architecture of IoT, 199
- six-layer architecture, 200
- three-layer architecture of IoT, 200
- Generic scenario of IoT, 198
- GENI, 183, 195
- GPRS, 155
- GPS, 78
- Green computing, 1, 4, 7, 12, 21–22
- GSM (global system for mobile communications), 89, 154
- Hackers, 32, 35
- Hardware, 251, 256, 260, 269
- Healthcare, 3–4, 21–22
- Heterogeneity, 207
- Homes, 1–4, 15, 21
- HSSIN, 155
- Human intervention, 1
- Hybrid cloud, 204
- Industrial revolution, 2
- Industry 4.0, 15–16
- Information technology act, 333
- Infrastructure as a service (IaaS), 205, 252, 253
- Innovations in neural networks,
- convolutional neural network (convnet), 288–289
- LSTM, 291–292
- recurrent neural network, 289–290
- Insight of big data and cloud computing, 10
- cloud services, 13–14
- cloud-based services, 11–13
- Intellectual property, 333
- Intelligence, 1, 3–4, 9–10, 20–21
- Intermediary, 335
- Internet of Things, 1, 21–22, 73, 154
- Internet service provider, 335
- Interoperability, 1, 4, 14, 16–20, 22, 327, 338
- IoT architecture, 211
- IoT business & products, 217, 218
- IoT cloud computing technologies, 225
- IoT core, 212–227
- IoT networking, 222
- IoT signal, 1
- IoT technologies, 214
- IoTGC, 12, 13
- IR sensors, 81
- Jaya algorithm, 309
- Job cycle, 189
- Jurisdiction, 337
- Kalman filter, 5
- Knowledgebase, 60–62, 65
- LED, 81
- Liability, 335
- Linear temporal logic, 158
- Literature review, 112–113, 345–348
- current scenario, 346
- proposal, 347–348
- Literature survey, 48
- M2M, 15–17
- Machine, 1, 8, 17, 20–21
- Machine learning, 7, 131, 132, 135, 137, 140, 141, 147–149, 251, 258, 266, 271
- Markov model, 8
- MATLAB, 74
- Mean absolute error (MAE), 6
- Mean square error (MSE), 6
- Methodology, 113–116, 349–354
- Microcontroller, 79
- Middleware layer, 202
- Monitoring environment, 209
- MQTT (message queuing telemetry transport), 80, 87
- Multi-layer neural network, 7
- Multi-tenant, 254
- Necessity for fusing IoT and cloud computing, 207
- Need of fog computing, 227–230
- Network address translation, 34
- Network capacity, 202
- Network layer, 201, 208
- Neural networks—an overview, 278
- NSF, 183
- Ontology, 58–59, 64–68
- Ontology model of expert system, 66
- Opportunities and challenges of using neural networks, 293
- PaaS, 252, 253
- Patent, 333
- PDA, 154
- Pearson’s correlation, 7
- Perception extension system layer, 200
- Perception layer, 201, 208
- Performance analysis, 52
- Perplexing coding, 74
- PIC microcontroller, 161
- PIR, 154
- PIR sensor, 161
- Platform as a service (PaaS), 205
- Policy-based IoT, 3
- Practical application of neural networks using computer codes, 293
- Precision agriculture, 131, 132, 134, 149
- Predictive maintenance, 1
- Principal comopnent analysis (PCA), 6
- Privacy, 329
- Private cloud, 204
- Prognostic health management (PHM), 6
- Prognostics, 5
- Proposed model for attack identification using fog computing, 49
- Public cloud, 204
- Pulse width modulated, 79
- Radio-frequency identification (RFID), 197, 200, 201, 203
- Raspberry Pi, 82, 90
- Real-time traffic, 111–112
- Regression models, 5
- Relevance vector machine, 8
- Reliability, 4, 8, 11
- RFID, 78
- RGB-HSV, 82
- Robust match point algorithm, 77
- ROI, 73
- Root mean squared error (RMSE), 7
- Route break, 202
- RS-232 protocol, 159
- RST, 76
- RUL, 4
- Scalability, 6, 8, 12, 202, 252, 254
- SCM (single chip microcontroller), 89
- Security, 2–5, 6, 8–11, 16–17, 19–20, 22, 203
- Semantic IoT, 1, 13, 19–20
- Sensing layer, 200
- Sensitive personal information, 329
- Sensors, 203
- Service, 251–262, 267–271
- Service layer, 200
- Service models of cloud computing, 204–205
- Service provider, 251, 253, 254, 256, 257, 261, 262, 270
- Smart, 1–4, 7, 11–12, 14–15, 18–22
- Smart healthcare system, 229
- Smart home, 32
- Smart manufactory, 230
- Smart vision framework, 73
- Smartphone, 75
- Socio-ethical, 28, 29
- Software, 251–255, 269, 270
- Software as a service (SaaS), 204, 254
- Standardization, 1, 15, 17
- Structural health monitoring (SHM), 11
- Support vector machine, 131, 132, 138, 140, 147
- Technologies used in IoT, 203
- Technology optimization, 184
- Telecommuting, 5, 11
- TLBO algorithm, 307
- learner phase, 309
- teacher phase, 308
- Traffic scenario, 122–125
- high traffic, 125
- low traffic, 124
- moderate traffic, 124
- speed viewer, 125–126
- Traffic simulation, 112
- Traffic simulator, 126–128
- 1st view, 126–128
- 2nd view, 128
- 3rd view, 128
- Transport layer, 200
- Transportation, 2, 5, 9, 11, 21
- Ubiquitous network layer, 200
- Ultrasonic sensor, 79
- UML analysis of expert model,
- expert module activity diagram, 63
- ontology class collaboration diagram, 65
- use case analysis, 58, 62
- UNCITRAL model, 338
- USART, 159
- User interaction web module, 60
- Vehicles, 1–4, 22
- Virtual, 251, 256, 258, 260, 262, 269
- Virtual computing, 1, 5
- Virtualization-based IoT, 12
- Wassenar arrangement, 334
- Wavelet packet transform, 7
- Webcam, 72
- Why study neural networks, 279
- Wi-Fi (wireless-fedilty), 87
- Working of artificial neural networks,
- activation functions, 284–288
- gradient descent algorithm, 282–284
- multi-layer perceptron, 280–281
- single-layer perceptron, 279–280
- training a neural network, 281
- Workspace, 191
- World Health Organisation, 26
- World intellectual property organisation, 333
- World Wide Web, 25
- WSN (wireless sensor network), 90
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.