Description
Efnisyfirlit
- Cover
- Half Title
- Title Page
- Copyright Page
- Contents
- Editor Biographies
- List of Contributors
- Chapter 1: VANET-Based Intelligent Traffic Light Control System by Detecting Congestion Using Fuzzy C-Means Clustering Technique in a Smart City
- 1.1 Introduction
- 1.2 Literature Review
- 1.3 Proposed Method
- 1.3.1 Parameter Extraction
- 1.3.2 Clustering Algorithm for Congestion Detection
- 1.3.3 Labview for Traffic Light Operation
- 1.4 Model Description
- 1.5 System Implementation
- 1.5.1 Software Section
- 1.5.2 Hardware Section
- 1.6 Experimental Results and Observations
- 1.7 Conclusion
- References
- Chapter 2: Internet of Things Advancements in Healthcare
- 2.1 Introduction to IoT in Healthcare
- 2.1.1 Internet of Things and Healthcare
- 2.1.2 Growth of Internet of Things in Changing Data Environment
- 2.1.3 IoT Analytics in Healthcare
- 2.1.4 Future Aspects of IoT in Healthcare
- 2.1.5 Telehealth and Self-Monitoring with Mobile Applications
- 2.2 Wearable Sensors and IoT applications in Healthcare
- 2.2.1 IoT Devices and Protocols
- 2.2.2 IoT Applications in Healthcare
- 2.2.3 IoT in Home Rehabilitation
- 2.3 Conclusion
- References
- Chapter 3: IoT-Based Artificial Intelligence System in Object Detection
- 3.1 Introduction
- 3.2 Proposed Methodology
- 3.2.1 Object Detection
- 3.2.2 Comparison of Static Techniques of Object Detection
- 3.3 Object Tracking
- 3.4 Experimental Analysis
- 3.5 Conclusion
- References
- Chapter 4: A Value Parity Combination-Based Scheme for Heartbeat Sounds Protection
- 4.1 Introduction
- 4.2 Related Works
- 4.2.1 Spatial Domain Audio Watermarking Methods
- 4.2.2 Transform Domain Audio Watermarking Methods
- 4.2.3 Multi-Resolutional Domain Audio Watermarking Methods
- 4.3 Proposed Approaches
- 4.3.1 Spatial Domain
- 4.3.2 Frequency Domain
- 4.3.3 Multi-Resolution Domain
- 4.4 Experiments and Results
- 4.4.1 Performance Measurement Metrics
- 4.4.2 Application of Our Approaches in the Spatial Domain
- 4.4.3 Application of Our Approaches in the Frequency Domain
- 4.4.4 Application of Our Approaches in the Multi-Resolution Domain
- 4.4.5 Imperceptibility Tests
- 4.4.6 Robustness Test
- 4.5 Conclusion
- 4.6 Compliance with Ethical Standards
- References
- Chapter 5: Sentiment Analysis of Product Reviews Using IoT
- 5.1 Introduction
- 5.1.1 Sentiment Analysis
- 5.1.2 Sentiment Analysis Application
- 5.1.3 Different Levels of Analysis
- 5.1.4 Opinion
- 5.1.5 IoT
- 5.1.6 Machine Learning
- 5.1.7 IoT Using Machine learning
- 5.2 Related Work
- 5.3 Methodology
- 5.3.1 Dataset
- 5.3.2 IoT Device
- 5.3.3 Preprocessing of Reviews
- 5.3.4 Feature Extraction
- 5.3.5 Sentiment Analysis
- 5.3.6 Summary
- 5.4 Experiment and Results
- 5.5 Conclusions
- References
- Chapter 6: Saccadic Scan Path Predicting Using Convolutional Auto Encoders
- 6.1 Introduction
- 6.2 Related Works
- 6.3 Pre-requisites
- 6.3.1 Convolutional Auto-Encoder
- 6.4 Proposed Model
- 6.5 Experiment
- 6.6 Results and Conclusion
- References
- Chapter 7: Impact of IIOT in Future Industries: Opportunities and Challenges
- 7.1 Introduction
- 7.2 Research Efforts in Industrial IoT
- 7.3 Empowering Technologies for IoT
- 7.3.1 Internet of Things
- 7.3.2 Blockchain Technology
- 7.3.3 Cloud Computing
- 7.3.4 Big Data Analytics
- 7.3.5 Cyber Physical Systems (CPS) and Artificial Intelligence (AI)
- 7.3.6 Augmented and Virtual Reality
- 7.4 Challenges
- 7.4.1 Efficient Management Procedure for Data
- 7.4.2 Heterogeneous IoT Systems’ Collaborations
- 7.4.3 Robust and Scalable Analytical Techniques for Big Data
- 7.4.4 Trust in Industrial IoT-Based Frameworks
- 7.4.5 Wireless Technology and Protocols Coexistence with IIoT
- 7.4.6 Enabling Decentralization on the Edge
- 7.4.7 Development of IoT Specific Operating Systems
- 7.4.8 Public Safety in IIoT
- 7.5 Conclusion
- References
- Chapter 8: Privacy and Ethical Issues in Digitalization World
- 8.1 Introduction
- 8.2 Literature Review
- 8.3 Challenges in the Stream of Data Privacy
- 8.4 Ethical Issues in Data Privacy
- 8.5 Conclusion
- References
- Chapter 9: A Review on Smart Traffic Management System
- 9.1 Introduction
- 9.2 Decrease of Traffic Movement Through the Smart Signals
- 9.3 Role of IoT and Big Data in Traffic Management
- 9.4 Advantages and Disadvantages of Traffic Management System
- 9.4.1 Advantages
- 9.4.2 Disadvantages Compatibility
- 9.5 Literature review
- 9.6 Conclusion
- References
- Chapter 10: A Robust Context and Role-Based Dynamic Access Control for Distributed Healthcare Information Systems
- 10.1 Introduction
- 10.2 Related Works
- 10.2.1 Role-Based Access Control
- 10.2.2 Other Access Control Models
- 10.2.3 Role Hierarchy
- 10.3 Research Methodology
- 10.3.1 Conceptual Design
- 10.3.2 Data Collection Instruments
- 10.3.3 Validation of Data Collection Instruments
- 10.3.4 Data Collection Procedure
- 10.3.5 Procedure for Data Analysis
- 10.3.6 Setting Up the Uath Computing Environment
- 10.3.7 Systems Functional Requirement Analysis
- 10.3.8 Analysis of Existing RBAC Models
- 10.3.9 Modification of Existing RBAC Models
- 10.3.10 System Architecture and the Technical Approach to System Design
- 10.4 System Design and Architecture
- 10.4.1 The Basic RBAC System Structure
- 10.4.2 Technical Approach to System Design
- 10.4.3 Code Architecture
- 10.4.4 System Implementation
- 10.5 Results and Discussion
- 10.5.1 System Testing
- 10.5.2 Database
- 10.5.3 Relationships Between the System User Database Tables
- 10.5.4 Infusing Purpose And Context Into the System Design
- 10.5.5 Analysis of Hypotheses
- 10.5.6 Testing of Hypothesis
- 10.6 Conclusion
- References
- Chapter 11: Impact of ICT on Handicrafts Marketing in Delhi NCR Region
- 11.1 Introduction
- 11.2 Information and Communication Technologies (ICT) in Handicraft
- 11.3 Uses of Information Technology for Marketing
- 11.3.1 Advertising of Handicrafts Products
- 11.4 Tools of Information Technology
- 11.5 Challenges for E-Tailing in Handicrafts Marketing
- 11.6 Conclusion
- References
- Chapter 12: Intelligent Amalgamation of Blockchain Technology with Industry 4.0 to Improve Security
- 12.1 Introduction
- 12.2 Historical Look Back of Industrial Revolution
- 12.2.1 Industry 1.0
- 12.2.2 Industry 2.0
- 12.2.3 Industry 3.0
- 12.2.4 Industry 4.0
- 12.3 Literature Review
- 12.4 Security Preferences for Industry 4.0
- 12.5 How Blockchain Caters Security to Support Industry 4.0
- 12.6 Conclusion
- References
- Chapter 13: Sensor Networks and Internet of Things in Agri-Food
- 13.1 Introduction
- 13.2 Summary
- 13.2.1 Component Level
- 13.2.2 System Level
- 13.2.3 Application Level
- 13.2.4 Design Issues and Challenges
- 13.2.5 Case Study: Sensor Networks and Iot in the Food Chain
- References
- Chapter 14: Design and Development of Hybrid Algorithms to Improve Cyber Security and Provide Securing Data Using Image Steganography with Internet of Things
- 14.1 Outline
- 14.2 Literature Review
- 14.3 Comparison Study
- 14.4 Proposed Methodology
- 14.5 Conclusion
- References
- Chapter 15: Optimal Automatic Power Generation Using Modified Hybrid Soft Computing Techniques
- 15.1 Introduction
- 15.2 Modeling of Load Frequency Control System With and Without the Effect of Dead Band
- 15.2.1 Problem Formulation
- 15.3 Overview of Soft Computing Techniques
- 15.4 Overview and Solution Methodology Using Hybrid Statistical Tracked Particle Swarm Optimization (STPSO)
- 15.4.1 Overview of Hybrid STPSO
- 15.4.2 Computational Algorithm Using Hybrid STPSO Method
- 15.5 Implementation of Benchmark Functions
- 15.5.1 Performance Evaluation
- 15.6 Implementation of Proposed Automatic Generation Control Systems
- 15.6.1 Performance Evaluation
- 15.7 Conclusion
- 15.7.1 Guide Line for Future Work
- References
- Chapter 16: Steganography and Steganalysis Using Machine Learning
- 16.1 Introduction
- 16.2 Steganography
- 16.3 Steganalysis
- 16.4 Machine Learning
- 16.5 Steganalysis Tests
- 16.6 Conclusion
- References
- Chapter 17: Gender Detection Based on Machine Learning Using Convolutional Neural Networks
- 17.1 Introduction
- 17.1.1 Problem Statement
- 17.2 Literature Survey
- 17.3 Implementation and Design
- 17.3.1 Hardware Architecture and Block Diagram
- 17.3.2 Hardware Tools
- 17.3.2.1 Raspberry Pi 4 Board
- 17.3.3 Software Architecture and Algorithm
- 17.4 Simulation Results
- 17.5 Conclusion
- References
- Chapter 18: Smart Technologies and Social Impact: An Indian Perspective of Contactless Technologies for Pandemic
- 18.1 Introduction
- 18.2 Taxonomy of Technologies
- 18.2.1 The Internet of Things
- 18.2.2 Application of Iot in Different Scenarios of Covid
- 18.2.3 Applications of Internet and Smart Technologies and their Impact on Society
- 18.2.4 Impact of COVID-19 on IoT Applications
- 18.3 Smart Tracing Technologies
- 18.3.1 Contact Tracing Technologies (Figure 18.1) – Review
- 18.3.2 Popular Applications for Contact Tracing
- 18.3.3 Outcome of Contract Tracing Applications
- 18.3.4 Popular Applications Payment System and Impact
- 18.3.5 Popular Applications for Education and Impact
- 18.4 Analysis and Social Impact
- 18.4.1 Privacy Concern
- 18.4.2 User Adoption, Etc.
- 18.5 Conclusion
- References
- Chapter 19: Agriculture-Internet of Things (A-IoT) Key Roles in Addressing Some Challenges in Agriculture
- 19.1 Introduction
- 19.2 Background and Concept of IoT
- 19.3 IoT Architecture in Agriculture
- 19.4 IoT Application or Role in Agriculture
- 19.5 Examples of Apps of Internet of Things (IoT) Used in Agriculture
- 19.6 Conclusion
- References
- Index