Index

  • ADC, 81
  • Advantages, 5–7, 10–11, 17
  • AES and Blowfish encryption, 156
  • Agility, 2
  • Agriculture, 1–4, 11, 21–22
  • Application layer, 202, 208
  • Applications of cloud computing, 206–207
  • Applications of cloud-based IoT, 208
  • Applications of deep learning neural networks, 292
  • Architecture, 7–8, 116–122
    • analysis, 9
    • API architecture, 117
    • data care, 9
    • file structure, 117–118
    • simulator architecture, 118–122
    • storage collection system, 8
    • workflow in application, 122
    • workflow of Google APIs in the application, 122
  • Arduino mega, 79
  • Artificial intelligence, 1, 9, 20–21
  • Artificial neural network, 131, 137
  • Attacks in IoT, 45
  • Automation, 183, 186, 187, 191, 194
  • Big data analysis, 5–6
  • Big data challenges, 6–7
  • Big data classification, 4–5
  • Big data definition, 3–4
  • Bird swarm algorithm, 311
    • flight behaviour, 313
    • forging behaviour, 313
    • vigilance behaviour, 313
  • Bluetooth, 78, 154
  • Botnet, 323
  • Business layer, 202
  • Campus, 3–4, 7, 22
  • Challenges in IoT, 202
  • Cloud, 251–263, 266, 268, 269–274
  • Cloud computing, 1, 5–6, 9, 203, 319
    • view on cloud comptuing and big data, 9–10
  • Cloud computing characteristics, 205–206
  • Cloud framework, 14
    • Cassandra, 15
    • Hadoop, 14–15
    • Voldemort, 16
      • a comparison with relational databases and benefits, 16–17
  • Cloud IoT, 207
  • Cloud IoT in healthcare, 208
  • Cloud IoT in logistics, 209
  • Cloud provider selection, 301
  • Cloud service providers, 335
  • Cloud-based IoT architecture, 208
  • CNN fuzzy inference engine, 61
  • Coding layer, 201
  • Cognitive Science, 1, 20–21
  • Communicating sequential processes, 156
  • Communication network, 1, 17
  • Constitution of India, 331
  • Convolution neural network, 60–61, 131
  • Copyright, 330
  • Correspondence in IoT devices, 43
  • Cost, 5–9, 11, 13–15, 17, 19
  • Cryptojacking, 324
  • Cyber security, 322, 328
  • Cybernetics, 3
  • Data acquition system (DAS), 2
  • Data analytics, 251, 252, 258, 263, 265–270, 272, 274
  • Data breach, 323
  • Data driven, 5
  • Data protection bill, 331
  • Data redundancy, 202
  • Decryption, 320
  • Deep learning, 147–149
  • Degradation modeling, 1
  • Denial of service, 323
  • Deployment models of cloud computing, 204
  • Device and the location independence, 206
  • Device capacity, 202
  • Domain specific language, 157
  • ECDH calculation, 156
  • Edge computing, 1, 6, 8
  • Education, 1–2, 4
  • Efficiency, 9–12, 21, 252
  • Encryption, 320
  • Energy management, 3, 12
  • Energy-efficient, 1, 3–4, 6, 12, 22
  • ERP, 191
  • Expert model, 58–62, 65, 67
  • Exponential degradation model, 14
  • Failure mode effect and criticality analysis (FMECA), 13
  • Field programmable gate array, 155
  • Filters, 34, 35
  • FIND, 183
  • Fire alarm, 89
  • Firewall, 29, 34, 35, 36, 37, 38
  • Flame sensor, 87
  • Float sensor, 158
  • Fog computing, 1, 10
  • Fog computing model, 42
  • Framework, 268, 274
  • Gadget, 76
  • Gaussian process, 7
  • Generic architecture, 199
    • generic architecture of IoT, 199
    • six-layer architecture, 200
    • three-layer architecture of IoT, 200
  • Generic scenario of IoT, 198
  • GENI, 183, 195
  • GPRS, 155
  • GPS, 78
  • Green computing, 1, 4, 7, 12, 21–22
  • GSM (global system for mobile communications), 89, 154
  • Industrial revolution, 2
  • Industry 4.0, 15–16
  • Information technology act, 333
  • Infrastructure as a service (IaaS), 205, 252, 253
  • Innovations in neural networks,
    • convolutional neural network (convnet), 288–289
    • LSTM, 291–292
    • recurrent neural network, 289–290
  • Insight of big data and cloud computing, 10
    • cloud services, 13–14
    • cloud-based services, 11–13
  • Intellectual property, 333
  • Intelligence, 1, 3–4, 9–10, 20–21
  • Intermediary, 335
  • Internet of Things, 1, 21–22, 73, 154
  • Internet service provider, 335
  • Interoperability, 1, 4, 14, 16–20, 22, 327, 338
  • IoT architecture, 211
  • IoT business & products, 217, 218
  • IoT cloud computing technologies, 225
  • IoT core, 212–227
  • IoT networking, 222
  • IoT signal, 1
  • IoT technologies, 214
  • IoTGC, 12, 13
  • IR sensors, 81
  • Jaya algorithm, 309
  • Job cycle, 189
  • Jurisdiction, 337
  • Kalman filter, 5
  • Knowledgebase, 60–62, 65
  • LED, 81
  • Liability, 335
  • Linear temporal logic, 158
  • Literature review, 112–113, 345–348
    • current scenario, 346
    • proposal, 347–348
  • Literature survey, 48
  • M2M, 15–17
  • Machine, 1, 8, 17, 20–21
  • Machine learning, 7, 131, 132, 135, 137, 140, 141, 147–149, 251, 258, 266, 271
  • Markov model, 8
  • MATLAB, 74
  • Mean absolute error (MAE), 6
  • Mean square error (MSE), 6
  • Methodology, 113–116, 349–354
  • Microcontroller, 79
  • Middleware layer, 202
  • Monitoring environment, 209
  • MQTT (message queuing telemetry transport), 80, 87
  • Multi-layer neural network, 7
  • Multi-tenant, 254
  • Necessity for fusing IoT and cloud computing, 207
  • Need of fog computing, 227–230
  • Network address translation, 34
  • Network capacity, 202
  • Network layer, 201, 208
  • Neural networks—an overview, 278
  • NSF, 183
  • Ontology, 58–59, 64–68
  • Ontology model of expert system, 66
  • Opportunities and challenges of using neural networks, 293
  • PaaS, 252, 253
  • Patent, 333
  • PDA, 154
  • Pearson’s correlation, 7
  • Perception extension system layer, 200
  • Perception layer, 201, 208
  • Performance analysis, 52
  • Perplexing coding, 74
  • PIC microcontroller, 161
  • PIR, 154
  • PIR sensor, 161
  • Platform as a service (PaaS), 205
  • Policy-based IoT, 3
  • Practical application of neural networks using computer codes, 293
  • Precision agriculture, 131, 132, 134, 149
  • Predictive maintenance, 1
  • Principal comopnent analysis (PCA), 6
  • Privacy, 329
  • Private cloud, 204
  • Prognostic health management (PHM), 6
  • Prognostics, 5
  • Proposed model for attack identification using fog computing, 49
  • Public cloud, 204
  • Pulse width modulated, 79
  • Radio-frequency identification (RFID), 197, 200, 201, 203
  • Raspberry Pi, 82, 90
  • Real-time traffic, 111–112
  • Regression models, 5
  • Relevance vector machine, 8
  • Reliability, 4, 8, 11
  • RFID, 78
  • RGB-HSV, 82
  • Robust match point algorithm, 77
  • ROI, 73
  • Root mean squared error (RMSE), 7
  • Route break, 202
  • RS-232 protocol, 159
  • RST, 76
  • RUL, 4
  • Scalability, 6, 8, 12, 202, 252, 254
  • SCM (single chip microcontroller), 89
  • Security, 2–5, 6, 8–11, 16–17, 19–20, 22, 203
  • Semantic IoT, 1, 13, 19–20
  • Sensing layer, 200
  • Sensitive personal information, 329
  • Sensors, 203
  • Service, 251–262, 267–271
  • Service layer, 200
  • Service models of cloud computing, 204–205
  • Service provider, 251, 253, 254, 256, 257, 261, 262, 270
  • Smart, 1–4, 7, 11–12, 14–15, 18–22
  • Smart healthcare system, 229
  • Smart home, 32
  • Smart manufactory, 230
  • Smart vision framework, 73
  • Smartphone, 75
  • Socio-ethical, 28, 29
  • Software, 251–255, 269, 270
  • Software as a service (SaaS), 204, 254
  • Standardization, 1, 15, 17
  • Structural health monitoring (SHM), 11
  • Support vector machine, 131, 132, 138, 140, 147
  • Technologies used in IoT, 203
  • Technology optimization, 184
  • Telecommuting, 5, 11
  • TLBO algorithm, 307
    • learner phase, 309
    • teacher phase, 308
  • Traffic scenario, 122–125
    • high traffic, 125
    • low traffic, 124
    • moderate traffic, 124
    • speed viewer, 125–126
  • Traffic simulation, 112
  • Traffic simulator, 126–128
    • 1st view, 126–128
    • 2nd view, 128
    • 3rd view, 128
  • Transport layer, 200
  • Transportation, 2, 5, 9, 11, 21
  • Ubiquitous network layer, 200
  • Ultrasonic sensor, 79
  • UML analysis of expert model,
    • expert module activity diagram, 63
    • ontology class collaboration diagram, 65
    • use case analysis, 58, 62
  • UNCITRAL model, 338
  • USART, 159
  • User interaction web module, 60
  • Wassenar arrangement, 334
  • Wavelet packet transform, 7
  • Webcam, 72
  • Why study neural networks, 279
  • Wi-Fi (wireless-fedilty), 87
  • Working of artificial neural networks,
    • activation functions, 284–288
    • gradient descent algorithm, 282–284
    • multi-layer perceptron, 280–281
    • single-layer perceptron, 279–280
    • training a neural network, 281
  • Workspace, 191
  • World Health Organisation, 26
  • World intellectual property organisation, 333
  • World Wide Web, 25
  • WSN (wireless sensor network), 90
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.138.179.119