Amazon cover image
Image from Amazon.com

Internet of Things and Data Analytics Handbook.

By: Publisher: New York : John Wiley & Sons, Incorporated, 2017Copyright date: ©2017Description: 1 online resource (811 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781119173632
Subject(s): Genre/Form: Additional physical formats: Print version:: Internet of Things and Data Analytics HandbookDDC classification:
  • 004.67/8
LOC classification:
  • TK5105.8857.I58 2017
Online resources:
Contents:
Intro -- TITLE PAGE -- COPYRIGHT PAGE -- CONTENTS -- LIST OF CONTRIBUTORS -- FOREWORD -- TECHNICAL ADVISORY BOARD MEMBERS -- PREFACE -- ACKNOWLEDGMENTS -- ABOUT THE COMPANION WEBSITE -- PART I INTERNET OF THINGS -- CHAPTER 1 INTERNET OF THINGS AND DATA ANALYTICS IN THE CLOUD WITH INNOVATION AND SUSTAINABILITY -- 1.1 INTRODUCTION -- 1.2 THE IoT AND THE FOURTH INDUSTRIAL REVOLUTION -- 1.3 INTERNET OF THINGS TECHNOLOGY -- 1.4 STANDARDS AND PROTOCOLS -- 1.5 IoT ECOSYSTEM -- 1.6 DEFINITION OF BIG DATA -- 1.7 IoT, DATA ANALYTICS, AND CLOUD COMPUTING -- 1.8 CREATIVITY, INVENTION, INNOVATION, AND DISRUPTIVE INNOVATION -- 1.9 POLYA'S "HOW TO SOLVE IT" -- 1.10 BUSINESS PLAN AND BUSINESS MODEL -- 1.11 CONCLUSION AND FUTURE PERSPECTIVES -- REFERENCES -- FURTHER READING -- USEFUL WEBSITES -- CHAPTER 2 DIGITAL SERVICES AND SUSTAINABLE SOLUTIONS -- 2.1 INTRODUCTION -- 2.2 WHY IoT IS NOT JUST "NICE TO HAVE" -- 2.3 SERVICES IN A DIGITAL REVOLUTION -- 2.4 MOBILE DIGITAL SERVICES AND THE HUMAN SENSOR -- 2.5 NOT JUST ANOTHER APP -- 2.6 THE HIDDEN LIFE OF THINGS -- 2.7 THE UMBRELLAS ARE NOT WHAT THEY SEEM -- 2.8 INTERACTING WITH THE INVISIBLE -- 2.9 SOCIETY AS OPEN SOURCE -- 2.10 LEARN FROM YOUR HACKERS -- 2.11 ENSURING HIGH-QUALITY SERVICES TO CITIZENS -- 2.12 GOVERNMENT AS A PLATFORM -- 2.13 CONCLUSION -- REFERENCES -- CHAPTER 3 THE INDUSTRIAL INTERNET OF THINGS (IIoT): APPLICATIONS AND TAXONOMY -- 3.1 INTRODUCTION TO THE IIoT -- 3.2 SOME EXAMPLES OF IIoT APPLICATIONS -- 3.3 TOWARD A TAXONOMY OF THE IIoT -- 3.4 STANDARDS AND PROTOCOLS FOR CONNECTIVITY -- 3.5 CONNECTIVITY ARCHITECTURE FOR THE IIoT -- 3.6 DATA-CENTRICITY MAKES DDS DIFFERENT -- 3.7 THE FUTURE OF THE IIoT -- REFERENCES -- CHAPTER 4 STRATEGIC PLANNING FOR SMARTER CITIES -- 4.1 INTRODUCTION -- 4.2 WHAT IS A SMART CITY? -- 4.3 SMART CITIES AND THE INTERNET OF THINGS -- 4.4 WHY STRATEGIC PLANNING MATTERS.
4.5 BEGINNING THE JOURNEY: FIRST THINGS FIRST -- 4.6 FROM VISION TO OBJECTIVES TO EXECUTION -- 4.7 PULLING IT ALL TOGETHER -- REFERENCES -- CHAPTER 5 NEXT-GENERATION LEARNING: SMART MEDICAL TEAM TRAINING -- 5.1 INTRODUCTION -- 5.2 LEARNING, ANALYTICS, AND INTERNET OF THINGS -- 5.3 IoT LEARNING DESIGN PROCESS -- 5.4 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 6 THE BRAIN-COMPUTER INTERFACE IN THE INTERNET OF THINGS -- 6.1 INTRODUCTION -- 6.2 THE SCIENCE BEHIND READING THE BRAIN -- 6.3 THE SCIENCE OF WRITING TO THE BRAIN -- 6.4 THE HUMAN CONNECTOME PROJECT -- 6.5 CONSUMER ELECTROENCEPHALOGRAPHY DEVICES -- 6.6 SUMMARY -- REFERENCES -- CHAPTER 7 IoT INNOVATION PULSE -- 7.1 THE CONVERGENCE OF EXPONENTIAL TECHNOLOGIES AS A DRIVER OF INNOVATION -- 7.2 SIX DIMENSIONS OF THE PLECOSYSTEM -- 7.3 FIVE PRINCIPLES OF THE PLECOSYSTEM -- 7.4 THE BIOLOGIC ORGANISM ANALOGY FOR THE IoT -- 7.5 COMPONENTS FOR INNOVATION WITH THE ORGANISMAL ANALOG -- 7.6 SPINOZAN VALUE TRADE-OFFS -- 7.7 HUMAN IoT SENSOR NETWORKS -- 7.8 ROLE OF THE IoT IN SOCIAL NETWORKS -- 7.9 SECURITY AND CYBERTHREAT RESILIENCE -- 7.10 IoT OPTIMIZATION FOR SUSTAINABILITY OF OUR PLANET -- 7.11 MAINTENANCE OF COMPLEX IoT NETWORKS -- 7.12 THE ACCORDION MODEL OF LEARNING AS A SOURCE OF INNOVATION -- 7.13 SUMMARY -- REFERENCES -- FURTHER READING -- PART II INTERNET OF THINGS TECHNOLOGIES -- CHAPTER 8 INTERNET OF THINGS OPEN-SOURCE SYSTEMS -- 8.1 INTRODUCTION -- 8.2 BACKGROUND OF OPEN SOURCE -- 8.3 DRIVERS FOR OPEN SOURCE -- 8.4 BENEFITS OF USING OPEN SOURCE -- 8.5 IoT OPEN-SOURCE CONSORTIUMS AND PROJECTS -- 8.6 FINDING THE RIGHT OPEN‐SOURCE PROJECT FOR THE JOB -- 8.7 CONCLUSION -- GLOSSARY -- REFERENCES -- FURTHER READING -- CHAPTER 9 MEMS: AN ENABLING TECHNOLOGY FOR THE INTERNET OF THINGS (IoT) -- 9.1 THE ABILITY TO SENSE, ACTUATE, AND CONTROL -- 9.2 WHAT ARE MEMS?.
9.3 MEMS AS AN ENABLING TECHNOLOGY FOR THE IoT -- 9.4 MEMS MANUFACTURING TECHNIQUES -- 9.5 EXAMPLES OF MEMS SENSORS -- 9.6 EXAMPLE OF MEMS ACTUATOR -- 9.7 THE FUTURE OF MEMS FOR THE IoT -- 9.8 CONCLUSION -- REFERENCES -- OTHER INFORMATION -- CHAPTER 10 ELECTRO-OPTICAL INFRARED SENSOR TECHNOLOGIES FOR THE INTERNET OF THINGS -- 10.1 INTRODUCTION -- 10.2 SENSOR ANATOMY AND TECHNOLOGIES -- 10.3 DESIGN CONSIDERATIONS -- 10.4 APPLICATIONS -- 10.5 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 11 IPv6 FOR IoT AND GATEWAY -- 11.1 INTRODUCTION -- 11.2 IP: THE INTERNET PROTOCOL -- 11.3 IPv6: THE NEXT INTERNET PROTOCOL -- 11.4 6LoWPAN: IP FOR IoT -- 11.5 GATEWAYS: A BAD CHOICE -- 11.6 EXAMPLE IoT SYSTEMS -- 11.7 AN IoT DATA MODEL -- 11.8 THE PROBLEM OF DATA OWNERSHIP -- 11.9 MANAGING THE LIFE OF AN IoT DEVICE -- 11.10 CONCLUSION: LOOKING FORWARD -- FURTHER READING -- CHAPTER 12 WIRELESS SENSOR NETWORKS -- 12.1 INTRODUCTION -- 12.2 CHARACTERISTICS OF WIRELESS SENSOR NETWORKS -- 12.3 DISTRIBUTED COMPUTING -- 12.4 PARALLEL COMPUTING -- 12.5 SELF-ORGANIZING NETWORKS -- 12.6 OPERATING SYSTEMS FOR SENSOR NETWORKS -- 12.7 WEB OF THINGS (WoT) -- 12.8 WIRELESS SENSOR NETWORK ARCHITECTURE -- 12.9 MODULARIZING THE WIRELESS SENSOR NODES -- 12.10 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 13 NETWORKING PROTOCOLS AND STANDARDS FOR INTERNET OF THINGS -- 13.1 INTRODUCTION -- 13.2 IoT DATA LINK PROTOCOLS -- 13.3 NETWORK LAYER ROUTING PROTOCOLS -- 13.4 NETWORK LAYER ENCAPSULATION PROTOCOLS -- 13.5 SESSION LAYER PROTOCOLS -- 13.6 IoT MANAGEMENT PROTOCOLS -- 13.7 SECURITY IN IoT PROTOCOLS -- 13.8 IoT CHALLENGES -- 13.9 SUMMARY -- REFERENCES -- CHAPTER 14 IoT ARCHITECTURE -- 14.1 INTRODUCTION -- 14.2 ARCHITECTURAL APPROACHES -- 14.3 BUSINESS MARKITECTURE -- 14.4 FUNCTIONAL ARCHITECTURE -- 14.5 APPLICATION ARCHITECTURE -- 14.6 DATA AND ANALYTICS ARCHITECTURE.
14.7 TECHNOLOGY ARCHITECTURE -- 14.8 SECURITY AND GOVERNANCE -- REFERENCES -- CHAPTER 15 A DESIGNER'S GUIDE TO THE INTERNET OF WEARABLE THINGS -- 15.1 INTRODUCTION -- 15.2 INTERFACE GLANCEABILITY -- 15.3 THE RIGHT DATA AT THE RIGHT TIME -- 15.4 CONSISTENCY ACROSS CHANNELS -- 15.5 FROM PUBLIC TO PERSONAL -- 15.6 NONVISUAL UI -- 15.7 EMERGING PATTERNS -- 15.8 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 16 BEACON TECHNOLOGY WITH IoT AND BIG DATA -- 16.1 INTRODUCTION TO BEACONS -- 16.2 WHAT IS BEACON TECHNOLOGY -- 16.3 BEACON AND BLE INTERACTION -- 16.4 WHERE BEACON TECHNOLOGY CAN BE APPLIED/USED -- 16.5 BIG DATA AND BEACONS -- 16.6 SAN FRANCISCO INTERNATIONAL AIRPORT (SFO) -- 16.7 FUTURE TRENDS AND CONCLUSION -- REFERENCES -- CHAPTER 17 SCADA FUNDAMENTALS AND APPLICATIONS IN THE IoT -- 17.1 INTRODUCTION -- 17.2 WHAT EXACTLY IS SCADA? -- 17.3 WHY IS SCADA THE RIGHT FOUNDATION FOR AN IoT PLATFORM? -- 17.4 CASE STUDY: ALGAE LAB SYSTEMS -- 17.5 THE FUTURE OF SCADA AND THE POTENTIAL OF THE IoT -- REFERENCES -- FURTHER READING -- PART III DATA ANALYTICS TECHNOLOGIES -- CHAPTER 18 DATA ANALYSIS AND MACHINE LEARNING EFFORT IN HEALTHCARE: ORGANIZATION, LIMITATIONS, AND DEVELOPMENT OF AN APPROACH -- 18.1 INTRODUCTION -- 18.2 DATA SCIENCE PROBLEMS IN HEALTHCARE -- 18.3 QUALIFICATIONS AND PERSONNEL IN DATA SCIENCE -- 18.4 DATA ACQUISITION AND TRANSFORMATION -- 18.5 BASIC PRINCIPLES OF MACHINE LEARNING -- 18.6 CASE STUDY: PREDICTION OF RARE EVENTS ON NONSPECIFIC DATA -- 18.7 FINAL REMARKS -- REFERENCES -- CHAPTER 19 DATA ANALYTICS AND PREDICTIVE ANALYTICS IN THE ERA OF BIG DATA -- 19.1 DATA ANALYTICS AND PREDICTIVE ANALYTICS -- 19.2 BIG DATA AND IMPACT TO ANALYTICS -- 19.3 CONCLUSION -- REFERENCES -- CHAPTER 20 STRATEGY DEVELOPMENT AND BIG DATA ANALYTICS -- 20.1 INTRODUCTION -- 20.2 MAXIMIZING THE INFLUENCE OF INTERNAL INPUTS FOR STRATEGY DEVELOPMENT.
20.3 A HIGHER EDUCATION CASE STUDY -- 20.4 MAXIMIZING THE INFLUENCE OF EXTERNAL INPUTS FOR STRATEGY DEVELOPMENT -- 20.5 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 21 RISK MODELING AND DATA SCIENCE -- 21.1 INTRODUCTION -- 21.2 WHAT IS RISK MODELING -- 21.3 THE ROLE OF DATA SCIENCE IN RISK MANAGEMENT -- 21.4 HOW TO PREPARE AND VALIDATE RISK MODEL -- 21.5 TIPS AND LESSONS LEARNED -- 21.6 FUTURE TRENDS AND CONCLUSION -- REFERENCES -- CHAPTER 22 HADOOP TECHNOLOGY -- 22.1 INTRODUCTION -- 22.2 WHAT IS HADOOP TECHNOLOGY AND APPLICATION? -- 22.3 WHY HADOOP? -- 22.4 HADOOP ARCHITECTURE -- 22.5 HDFS: WHAT AND HOW TO USE IT -- 22.6 YARN: WHAT AND HOW TO USE IT -- 22.7 MAPREDUCE: WHAT AND HOW TO USE IT -- 22.8 APACHE: WHAT AND HOW TO USE IT -- 22.9 FUTURE TREND AND CONCLUSION -- REFERENCES -- CHAPTER 23 SECURITY OF IoT DATA: CONTEXT, DEPTH, AND BREADTH ACROSS HADOOP -- 23.1 INTRODUCTION -- 23.2 IoT DATA IN HADOOP -- 23.3 SECURITY IN IoT PLATFORMS BUILT ON HADOOP -- 23.4 ARCHITECTURAL CONSIDERATIONS FOR IMPLEMENTING SECURITY IN HADOOP -- 23.5 BREADTH OF CONTROL -- 23.6 CONTEXT FOR SECURITY -- 23.7 SECURITY POLICIES AND RULES BASED ON  PxP ARCHITECTURE -- 23.8 CONCLUSION -- REFERENCES -- PART IV SMART EVERYTHING -- CHAPTER 24 CONNECTED VEHICLE -- 24.1 INTRODUCTION -- 24.2 CONNECTED, AUTOMATED, AND AUTONOMOUS VEHICLE TECHNOLOGIES -- 24.3 CONNECTED VEHICLES FROM THE DEPARTMENT OF TRANSPORTATION PERSPECTIVE -- 24.4 POLICY ISSUES AROUND DSRC -- 24.5 ALTERNATIVE FORMS OF V2X COMMUNICATIONS -- 24.6 DOT CONNECTED VEHICLE APPLICATIONS -- 24.7 OTHER CONNECTED VEHICLE APPLICATIONS -- 24.8 MIGRATION PATH FROM CONNECTED AND AUTOMATED TO FULLY AUTONOMOUS VEHICLES -- 24.9 AUTONOMOUS VEHICLE ADOPTION PREDICTIONS -- 24.10 MARKET GROWTH FOR CONNECTED AND AUTONOMOUS VEHICLE TECHNOLOGY -- 24.11 CONNECTED VEHICLES IN THE SMART CITY.
24.12 ISSUES NOT DISCUSSED IN THIS CHAPTER.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Ebrary Ebrary Afghanistan Available EBKAF-N00068300
Ebrary Ebrary Algeria Available
Ebrary Ebrary Cyprus Available
Ebrary Ebrary Egypt Available
Ebrary Ebrary Libya Available
Ebrary Ebrary Morocco Available
Ebrary Ebrary Nepal Available EBKNP-N00068300
Ebrary Ebrary Sudan Available
Ebrary Ebrary Tunisia Available
Total holds: 0

Intro -- TITLE PAGE -- COPYRIGHT PAGE -- CONTENTS -- LIST OF CONTRIBUTORS -- FOREWORD -- TECHNICAL ADVISORY BOARD MEMBERS -- PREFACE -- ACKNOWLEDGMENTS -- ABOUT THE COMPANION WEBSITE -- PART I INTERNET OF THINGS -- CHAPTER 1 INTERNET OF THINGS AND DATA ANALYTICS IN THE CLOUD WITH INNOVATION AND SUSTAINABILITY -- 1.1 INTRODUCTION -- 1.2 THE IoT AND THE FOURTH INDUSTRIAL REVOLUTION -- 1.3 INTERNET OF THINGS TECHNOLOGY -- 1.4 STANDARDS AND PROTOCOLS -- 1.5 IoT ECOSYSTEM -- 1.6 DEFINITION OF BIG DATA -- 1.7 IoT, DATA ANALYTICS, AND CLOUD COMPUTING -- 1.8 CREATIVITY, INVENTION, INNOVATION, AND DISRUPTIVE INNOVATION -- 1.9 POLYA'S "HOW TO SOLVE IT" -- 1.10 BUSINESS PLAN AND BUSINESS MODEL -- 1.11 CONCLUSION AND FUTURE PERSPECTIVES -- REFERENCES -- FURTHER READING -- USEFUL WEBSITES -- CHAPTER 2 DIGITAL SERVICES AND SUSTAINABLE SOLUTIONS -- 2.1 INTRODUCTION -- 2.2 WHY IoT IS NOT JUST "NICE TO HAVE" -- 2.3 SERVICES IN A DIGITAL REVOLUTION -- 2.4 MOBILE DIGITAL SERVICES AND THE HUMAN SENSOR -- 2.5 NOT JUST ANOTHER APP -- 2.6 THE HIDDEN LIFE OF THINGS -- 2.7 THE UMBRELLAS ARE NOT WHAT THEY SEEM -- 2.8 INTERACTING WITH THE INVISIBLE -- 2.9 SOCIETY AS OPEN SOURCE -- 2.10 LEARN FROM YOUR HACKERS -- 2.11 ENSURING HIGH-QUALITY SERVICES TO CITIZENS -- 2.12 GOVERNMENT AS A PLATFORM -- 2.13 CONCLUSION -- REFERENCES -- CHAPTER 3 THE INDUSTRIAL INTERNET OF THINGS (IIoT): APPLICATIONS AND TAXONOMY -- 3.1 INTRODUCTION TO THE IIoT -- 3.2 SOME EXAMPLES OF IIoT APPLICATIONS -- 3.3 TOWARD A TAXONOMY OF THE IIoT -- 3.4 STANDARDS AND PROTOCOLS FOR CONNECTIVITY -- 3.5 CONNECTIVITY ARCHITECTURE FOR THE IIoT -- 3.6 DATA-CENTRICITY MAKES DDS DIFFERENT -- 3.7 THE FUTURE OF THE IIoT -- REFERENCES -- CHAPTER 4 STRATEGIC PLANNING FOR SMARTER CITIES -- 4.1 INTRODUCTION -- 4.2 WHAT IS A SMART CITY? -- 4.3 SMART CITIES AND THE INTERNET OF THINGS -- 4.4 WHY STRATEGIC PLANNING MATTERS.

4.5 BEGINNING THE JOURNEY: FIRST THINGS FIRST -- 4.6 FROM VISION TO OBJECTIVES TO EXECUTION -- 4.7 PULLING IT ALL TOGETHER -- REFERENCES -- CHAPTER 5 NEXT-GENERATION LEARNING: SMART MEDICAL TEAM TRAINING -- 5.1 INTRODUCTION -- 5.2 LEARNING, ANALYTICS, AND INTERNET OF THINGS -- 5.3 IoT LEARNING DESIGN PROCESS -- 5.4 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 6 THE BRAIN-COMPUTER INTERFACE IN THE INTERNET OF THINGS -- 6.1 INTRODUCTION -- 6.2 THE SCIENCE BEHIND READING THE BRAIN -- 6.3 THE SCIENCE OF WRITING TO THE BRAIN -- 6.4 THE HUMAN CONNECTOME PROJECT -- 6.5 CONSUMER ELECTROENCEPHALOGRAPHY DEVICES -- 6.6 SUMMARY -- REFERENCES -- CHAPTER 7 IoT INNOVATION PULSE -- 7.1 THE CONVERGENCE OF EXPONENTIAL TECHNOLOGIES AS A DRIVER OF INNOVATION -- 7.2 SIX DIMENSIONS OF THE PLECOSYSTEM -- 7.3 FIVE PRINCIPLES OF THE PLECOSYSTEM -- 7.4 THE BIOLOGIC ORGANISM ANALOGY FOR THE IoT -- 7.5 COMPONENTS FOR INNOVATION WITH THE ORGANISMAL ANALOG -- 7.6 SPINOZAN VALUE TRADE-OFFS -- 7.7 HUMAN IoT SENSOR NETWORKS -- 7.8 ROLE OF THE IoT IN SOCIAL NETWORKS -- 7.9 SECURITY AND CYBERTHREAT RESILIENCE -- 7.10 IoT OPTIMIZATION FOR SUSTAINABILITY OF OUR PLANET -- 7.11 MAINTENANCE OF COMPLEX IoT NETWORKS -- 7.12 THE ACCORDION MODEL OF LEARNING AS A SOURCE OF INNOVATION -- 7.13 SUMMARY -- REFERENCES -- FURTHER READING -- PART II INTERNET OF THINGS TECHNOLOGIES -- CHAPTER 8 INTERNET OF THINGS OPEN-SOURCE SYSTEMS -- 8.1 INTRODUCTION -- 8.2 BACKGROUND OF OPEN SOURCE -- 8.3 DRIVERS FOR OPEN SOURCE -- 8.4 BENEFITS OF USING OPEN SOURCE -- 8.5 IoT OPEN-SOURCE CONSORTIUMS AND PROJECTS -- 8.6 FINDING THE RIGHT OPEN‐SOURCE PROJECT FOR THE JOB -- 8.7 CONCLUSION -- GLOSSARY -- REFERENCES -- FURTHER READING -- CHAPTER 9 MEMS: AN ENABLING TECHNOLOGY FOR THE INTERNET OF THINGS (IoT) -- 9.1 THE ABILITY TO SENSE, ACTUATE, AND CONTROL -- 9.2 WHAT ARE MEMS?.

9.3 MEMS AS AN ENABLING TECHNOLOGY FOR THE IoT -- 9.4 MEMS MANUFACTURING TECHNIQUES -- 9.5 EXAMPLES OF MEMS SENSORS -- 9.6 EXAMPLE OF MEMS ACTUATOR -- 9.7 THE FUTURE OF MEMS FOR THE IoT -- 9.8 CONCLUSION -- REFERENCES -- OTHER INFORMATION -- CHAPTER 10 ELECTRO-OPTICAL INFRARED SENSOR TECHNOLOGIES FOR THE INTERNET OF THINGS -- 10.1 INTRODUCTION -- 10.2 SENSOR ANATOMY AND TECHNOLOGIES -- 10.3 DESIGN CONSIDERATIONS -- 10.4 APPLICATIONS -- 10.5 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 11 IPv6 FOR IoT AND GATEWAY -- 11.1 INTRODUCTION -- 11.2 IP: THE INTERNET PROTOCOL -- 11.3 IPv6: THE NEXT INTERNET PROTOCOL -- 11.4 6LoWPAN: IP FOR IoT -- 11.5 GATEWAYS: A BAD CHOICE -- 11.6 EXAMPLE IoT SYSTEMS -- 11.7 AN IoT DATA MODEL -- 11.8 THE PROBLEM OF DATA OWNERSHIP -- 11.9 MANAGING THE LIFE OF AN IoT DEVICE -- 11.10 CONCLUSION: LOOKING FORWARD -- FURTHER READING -- CHAPTER 12 WIRELESS SENSOR NETWORKS -- 12.1 INTRODUCTION -- 12.2 CHARACTERISTICS OF WIRELESS SENSOR NETWORKS -- 12.3 DISTRIBUTED COMPUTING -- 12.4 PARALLEL COMPUTING -- 12.5 SELF-ORGANIZING NETWORKS -- 12.6 OPERATING SYSTEMS FOR SENSOR NETWORKS -- 12.7 WEB OF THINGS (WoT) -- 12.8 WIRELESS SENSOR NETWORK ARCHITECTURE -- 12.9 MODULARIZING THE WIRELESS SENSOR NODES -- 12.10 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 13 NETWORKING PROTOCOLS AND STANDARDS FOR INTERNET OF THINGS -- 13.1 INTRODUCTION -- 13.2 IoT DATA LINK PROTOCOLS -- 13.3 NETWORK LAYER ROUTING PROTOCOLS -- 13.4 NETWORK LAYER ENCAPSULATION PROTOCOLS -- 13.5 SESSION LAYER PROTOCOLS -- 13.6 IoT MANAGEMENT PROTOCOLS -- 13.7 SECURITY IN IoT PROTOCOLS -- 13.8 IoT CHALLENGES -- 13.9 SUMMARY -- REFERENCES -- CHAPTER 14 IoT ARCHITECTURE -- 14.1 INTRODUCTION -- 14.2 ARCHITECTURAL APPROACHES -- 14.3 BUSINESS MARKITECTURE -- 14.4 FUNCTIONAL ARCHITECTURE -- 14.5 APPLICATION ARCHITECTURE -- 14.6 DATA AND ANALYTICS ARCHITECTURE.

14.7 TECHNOLOGY ARCHITECTURE -- 14.8 SECURITY AND GOVERNANCE -- REFERENCES -- CHAPTER 15 A DESIGNER'S GUIDE TO THE INTERNET OF WEARABLE THINGS -- 15.1 INTRODUCTION -- 15.2 INTERFACE GLANCEABILITY -- 15.3 THE RIGHT DATA AT THE RIGHT TIME -- 15.4 CONSISTENCY ACROSS CHANNELS -- 15.5 FROM PUBLIC TO PERSONAL -- 15.6 NONVISUAL UI -- 15.7 EMERGING PATTERNS -- 15.8 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 16 BEACON TECHNOLOGY WITH IoT AND BIG DATA -- 16.1 INTRODUCTION TO BEACONS -- 16.2 WHAT IS BEACON TECHNOLOGY -- 16.3 BEACON AND BLE INTERACTION -- 16.4 WHERE BEACON TECHNOLOGY CAN BE APPLIED/USED -- 16.5 BIG DATA AND BEACONS -- 16.6 SAN FRANCISCO INTERNATIONAL AIRPORT (SFO) -- 16.7 FUTURE TRENDS AND CONCLUSION -- REFERENCES -- CHAPTER 17 SCADA FUNDAMENTALS AND APPLICATIONS IN THE IoT -- 17.1 INTRODUCTION -- 17.2 WHAT EXACTLY IS SCADA? -- 17.3 WHY IS SCADA THE RIGHT FOUNDATION FOR AN IoT PLATFORM? -- 17.4 CASE STUDY: ALGAE LAB SYSTEMS -- 17.5 THE FUTURE OF SCADA AND THE POTENTIAL OF THE IoT -- REFERENCES -- FURTHER READING -- PART III DATA ANALYTICS TECHNOLOGIES -- CHAPTER 18 DATA ANALYSIS AND MACHINE LEARNING EFFORT IN HEALTHCARE: ORGANIZATION, LIMITATIONS, AND DEVELOPMENT OF AN APPROACH -- 18.1 INTRODUCTION -- 18.2 DATA SCIENCE PROBLEMS IN HEALTHCARE -- 18.3 QUALIFICATIONS AND PERSONNEL IN DATA SCIENCE -- 18.4 DATA ACQUISITION AND TRANSFORMATION -- 18.5 BASIC PRINCIPLES OF MACHINE LEARNING -- 18.6 CASE STUDY: PREDICTION OF RARE EVENTS ON NONSPECIFIC DATA -- 18.7 FINAL REMARKS -- REFERENCES -- CHAPTER 19 DATA ANALYTICS AND PREDICTIVE ANALYTICS IN THE ERA OF BIG DATA -- 19.1 DATA ANALYTICS AND PREDICTIVE ANALYTICS -- 19.2 BIG DATA AND IMPACT TO ANALYTICS -- 19.3 CONCLUSION -- REFERENCES -- CHAPTER 20 STRATEGY DEVELOPMENT AND BIG DATA ANALYTICS -- 20.1 INTRODUCTION -- 20.2 MAXIMIZING THE INFLUENCE OF INTERNAL INPUTS FOR STRATEGY DEVELOPMENT.

20.3 A HIGHER EDUCATION CASE STUDY -- 20.4 MAXIMIZING THE INFLUENCE OF EXTERNAL INPUTS FOR STRATEGY DEVELOPMENT -- 20.5 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 21 RISK MODELING AND DATA SCIENCE -- 21.1 INTRODUCTION -- 21.2 WHAT IS RISK MODELING -- 21.3 THE ROLE OF DATA SCIENCE IN RISK MANAGEMENT -- 21.4 HOW TO PREPARE AND VALIDATE RISK MODEL -- 21.5 TIPS AND LESSONS LEARNED -- 21.6 FUTURE TRENDS AND CONCLUSION -- REFERENCES -- CHAPTER 22 HADOOP TECHNOLOGY -- 22.1 INTRODUCTION -- 22.2 WHAT IS HADOOP TECHNOLOGY AND APPLICATION? -- 22.3 WHY HADOOP? -- 22.4 HADOOP ARCHITECTURE -- 22.5 HDFS: WHAT AND HOW TO USE IT -- 22.6 YARN: WHAT AND HOW TO USE IT -- 22.7 MAPREDUCE: WHAT AND HOW TO USE IT -- 22.8 APACHE: WHAT AND HOW TO USE IT -- 22.9 FUTURE TREND AND CONCLUSION -- REFERENCES -- CHAPTER 23 SECURITY OF IoT DATA: CONTEXT, DEPTH, AND BREADTH ACROSS HADOOP -- 23.1 INTRODUCTION -- 23.2 IoT DATA IN HADOOP -- 23.3 SECURITY IN IoT PLATFORMS BUILT ON HADOOP -- 23.4 ARCHITECTURAL CONSIDERATIONS FOR IMPLEMENTING SECURITY IN HADOOP -- 23.5 BREADTH OF CONTROL -- 23.6 CONTEXT FOR SECURITY -- 23.7 SECURITY POLICIES AND RULES BASED ON  PxP ARCHITECTURE -- 23.8 CONCLUSION -- REFERENCES -- PART IV SMART EVERYTHING -- CHAPTER 24 CONNECTED VEHICLE -- 24.1 INTRODUCTION -- 24.2 CONNECTED, AUTOMATED, AND AUTONOMOUS VEHICLE TECHNOLOGIES -- 24.3 CONNECTED VEHICLES FROM THE DEPARTMENT OF TRANSPORTATION PERSPECTIVE -- 24.4 POLICY ISSUES AROUND DSRC -- 24.5 ALTERNATIVE FORMS OF V2X COMMUNICATIONS -- 24.6 DOT CONNECTED VEHICLE APPLICATIONS -- 24.7 OTHER CONNECTED VEHICLE APPLICATIONS -- 24.8 MIGRATION PATH FROM CONNECTED AND AUTOMATED TO FULLY AUTONOMOUS VEHICLES -- 24.9 AUTONOMOUS VEHICLE ADOPTION PREDICTIONS -- 24.10 MARKET GROWTH FOR CONNECTED AND AUTONOMOUS VEHICLE TECHNOLOGY -- 24.11 CONNECTED VEHICLES IN THE SMART CITY.

24.12 ISSUES NOT DISCUSSED IN THIS CHAPTER.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.