ORPP logo
Image from Google Jackets

Internet of Things and Data Analytics Handbook.

By: Material type: TextTextPublisher: Newark : John Wiley & Sons, Incorporated, 2017Copyright date: ©2017Edition: 1st edDescription: 1 online resource (811 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781119173632
Subject(s): Genre/Form: Additional physical formats: Print version:: Internet of Things and Data Analytics HandbookLOC classification:
  • TK5105.8857.I58 2017
Online resources:
Contents:
Intro -- TITLE PAGE -- COPYRIGHT PAGE -- CONTENTS -- LIST OF CONTRIBUTORS -- FOREWORD -- TECHNICAL ADVISORY BOARD MEMBERS -- PREFACE -- ACKNOWLEDGMENTS -- ABOUT THE COMPANION WEBSITE -- PART I INTERNET OF THINGS -- CHAPTER 1 INTERNET OF THINGS AND DATA ANALYTICS IN THE CLOUD WITH INNOVATION AND SUSTAINABILITY -- 1.1 INTRODUCTION -- 1.2 THE IoT AND THE FOURTH INDUSTRIAL REVOLUTION -- 1.3 INTERNET OF THINGS TECHNOLOGY -- 1.4 STANDARDS AND PROTOCOLS -- 1.5 IoT ECOSYSTEM -- 1.6 DEFINITION OF BIG DATA -- 1.7 IoT, DATA ANALYTICS, AND CLOUD COMPUTING -- 1.8 CREATIVITY, INVENTION, INNOVATION, AND DISRUPTIVE INNOVATION -- 1.9 POLYA'S "HOW TO SOLVE IT" -- 1.10 BUSINESS PLAN AND BUSINESS MODEL -- 1.11 CONCLUSION AND FUTURE PERSPECTIVES -- REFERENCES -- FURTHER READING -- USEFUL WEBSITES -- CHAPTER 2 DIGITAL SERVICES AND SUSTAINABLE SOLUTIONS -- 2.1 INTRODUCTION -- 2.2 WHY IoT IS NOT JUST "NICE TO HAVE" -- 2.3 SERVICES IN A DIGITAL REVOLUTION -- 2.4 MOBILE DIGITAL SERVICES AND THE HUMAN SENSOR -- 2.5 NOT JUST ANOTHER APP -- 2.6 THE HIDDEN LIFE OF THINGS -- 2.7 THE UMBRELLAS ARE NOT WHAT THEY SEEM -- 2.8 INTERACTING WITH THE INVISIBLE -- 2.9 SOCIETY AS OPEN SOURCE -- 2.10 LEARN FROM YOUR HACKERS -- 2.11 ENSURING HIGH-QUALITY SERVICES TO CITIZENS -- 2.12 GOVERNMENT AS A PLATFORM -- 2.13 CONCLUSION -- REFERENCES -- CHAPTER 3 THE INDUSTRIAL INTERNET OF THINGS (IIoT): APPLICATIONS AND TAXONOMY -- 3.1 INTRODUCTION TO THE IIoT -- 3.2 SOME EXAMPLES OF IIoT APPLICATIONS -- 3.3 TOWARD A TAXONOMY OF THE IIoT -- 3.4 STANDARDS AND PROTOCOLS FOR CONNECTIVITY -- 3.5 CONNECTIVITY ARCHITECTURE FOR THE IIoT -- 3.6 DATA-CENTRICITY MAKES DDS DIFFERENT -- 3.7 THE FUTURE OF THE IIoT -- REFERENCES -- CHAPTER 4 STRATEGIC PLANNING FOR SMARTER CITIES -- 4.1 INTRODUCTION -- 4.2 WHAT IS A SMART CITY? -- 4.3 SMART CITIES AND THE INTERNET OF THINGS -- 4.4 WHY STRATEGIC PLANNING MATTERS.
4.5 BEGINNING THE JOURNEY: FIRST THINGS FIRST -- 4.6 FROM VISION TO OBJECTIVES TO EXECUTION -- 4.7 PULLING IT ALL TOGETHER -- REFERENCES -- CHAPTER 5 NEXT-GENERATION LEARNING: SMART MEDICAL TEAM TRAINING -- 5.1 INTRODUCTION -- 5.2 LEARNING, ANALYTICS, AND INTERNET OF THINGS -- 5.3 IoT LEARNING DESIGN PROCESS -- 5.4 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 6 THE BRAIN-COMPUTER INTERFACE IN THE INTERNET OF THINGS -- 6.1 INTRODUCTION -- 6.2 THE SCIENCE BEHIND READING THE BRAIN -- 6.3 THE SCIENCE OF WRITING TO THE BRAIN -- 6.4 THE HUMAN CONNECTOME PROJECT -- 6.5 CONSUMER ELECTROENCEPHALOGRAPHY DEVICES -- 6.6 SUMMARY -- REFERENCES -- CHAPTER 7 IoT INNOVATION PULSE -- 7.1 THE CONVERGENCE OF EXPONENTIAL TECHNOLOGIES AS A DRIVER OF INNOVATION -- 7.2 SIX DIMENSIONS OF THE PLECOSYSTEM -- 7.3 FIVE PRINCIPLES OF THE PLECOSYSTEM -- 7.4 THE BIOLOGIC ORGANISM ANALOGY FOR THE IoT -- 7.5 COMPONENTS FOR INNOVATION WITH THE ORGANISMAL ANALOG -- 7.6 SPINOZAN VALUE TRADE-OFFS -- 7.7 HUMAN IoT SENSOR NETWORKS -- 7.8 ROLE OF THE IoT IN SOCIAL NETWORKS -- 7.9 SECURITY AND CYBERTHREAT RESILIENCE -- 7.10 IoT OPTIMIZATION FOR SUSTAINABILITY OF OUR PLANET -- 7.11 MAINTENANCE OF COMPLEX IoT NETWORKS -- 7.12 THE ACCORDION MODEL OF LEARNING AS A SOURCE OF INNOVATION -- 7.13 SUMMARY -- REFERENCES -- FURTHER READING -- PART II INTERNET OF THINGS TECHNOLOGIES -- CHAPTER 8 INTERNET OF THINGS OPEN-SOURCE SYSTEMS -- 8.1 INTRODUCTION -- 8.2 BACKGROUND OF OPEN SOURCE -- 8.3 DRIVERS FOR OPEN SOURCE -- 8.4 BENEFITS OF USING OPEN SOURCE -- 8.5 IoT OPEN-SOURCE CONSORTIUMS AND PROJECTS -- 8.6 FINDING THE RIGHT OPEN‐SOURCE PROJECT FOR THE JOB -- 8.7 CONCLUSION -- GLOSSARY -- REFERENCES -- FURTHER READING -- CHAPTER 9 MEMS: AN ENABLING TECHNOLOGY FOR THE INTERNET OF THINGS (IoT) -- 9.1 THE ABILITY TO SENSE, ACTUATE, AND CONTROL -- 9.2 WHAT ARE MEMS?.
9.3 MEMS AS AN ENABLING TECHNOLOGY FOR THE IoT -- 9.4 MEMS MANUFACTURING TECHNIQUES -- 9.5 EXAMPLES OF MEMS SENSORS -- 9.6 EXAMPLE OF MEMS ACTUATOR -- 9.7 THE FUTURE OF MEMS FOR THE IoT -- 9.8 CONCLUSION -- REFERENCES -- OTHER INFORMATION -- CHAPTER 10 ELECTRO-OPTICAL INFRARED SENSOR TECHNOLOGIES FOR THE INTERNET OF THINGS -- 10.1 INTRODUCTION -- 10.2 SENSOR ANATOMY AND TECHNOLOGIES -- 10.3 DESIGN CONSIDERATIONS -- 10.4 APPLICATIONS -- 10.5 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 11 IPv6 FOR IoT AND GATEWAY -- 11.1 INTRODUCTION -- 11.2 IP: THE INTERNET PROTOCOL -- 11.3 IPv6: THE NEXT INTERNET PROTOCOL -- 11.4 6LoWPAN: IP FOR IoT -- 11.5 GATEWAYS: A BAD CHOICE -- 11.6 EXAMPLE IoT SYSTEMS -- 11.7 AN IoT DATA MODEL -- 11.8 THE PROBLEM OF DATA OWNERSHIP -- 11.9 MANAGING THE LIFE OF AN IoT DEVICE -- 11.10 CONCLUSION: LOOKING FORWARD -- FURTHER READING -- CHAPTER 12 WIRELESS SENSOR NETWORKS -- 12.1 INTRODUCTION -- 12.2 CHARACTERISTICS OF WIRELESS SENSOR NETWORKS -- 12.3 DISTRIBUTED COMPUTING -- 12.4 PARALLEL COMPUTING -- 12.5 SELF-ORGANIZING NETWORKS -- 12.6 OPERATING SYSTEMS FOR SENSOR NETWORKS -- 12.7 WEB OF THINGS (WoT) -- 12.8 WIRELESS SENSOR NETWORK ARCHITECTURE -- 12.9 MODULARIZING THE WIRELESS SENSOR NODES -- 12.10 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 13 NETWORKING PROTOCOLS AND STANDARDS FOR INTERNET OF THINGS -- 13.1 INTRODUCTION -- 13.2 IoT DATA LINK PROTOCOLS -- 13.3 NETWORK LAYER ROUTING PROTOCOLS -- 13.4 NETWORK LAYER ENCAPSULATION PROTOCOLS -- 13.5 SESSION LAYER PROTOCOLS -- 13.6 IoT MANAGEMENT PROTOCOLS -- 13.7 SECURITY IN IoT PROTOCOLS -- 13.8 IoT CHALLENGES -- 13.9 SUMMARY -- REFERENCES -- CHAPTER 14 IoT ARCHITECTURE -- 14.1 INTRODUCTION -- 14.2 ARCHITECTURAL APPROACHES -- 14.3 BUSINESS MARKITECTURE -- 14.4 FUNCTIONAL ARCHITECTURE -- 14.5 APPLICATION ARCHITECTURE -- 14.6 DATA AND ANALYTICS ARCHITECTURE.
14.7 TECHNOLOGY ARCHITECTURE -- 14.8 SECURITY AND GOVERNANCE -- REFERENCES -- CHAPTER 15 A DESIGNER'S GUIDE TO THE INTERNET OF WEARABLE THINGS -- 15.1 INTRODUCTION -- 15.2 INTERFACE GLANCEABILITY -- 15.3 THE RIGHT DATA AT THE RIGHT TIME -- 15.4 CONSISTENCY ACROSS CHANNELS -- 15.5 FROM PUBLIC TO PERSONAL -- 15.6 NONVISUAL UI -- 15.7 EMERGING PATTERNS -- 15.8 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 16 BEACON TECHNOLOGY WITH IoT AND BIG DATA -- 16.1 INTRODUCTION TO BEACONS -- 16.2 WHAT IS BEACON TECHNOLOGY -- 16.3 BEACON AND BLE INTERACTION -- 16.4 WHERE BEACON TECHNOLOGY CAN BE APPLIED/USED -- 16.5 BIG DATA AND BEACONS -- 16.6 SAN FRANCISCO INTERNATIONAL AIRPORT (SFO) -- 16.7 FUTURE TRENDS AND CONCLUSION -- REFERENCES -- CHAPTER 17 SCADA FUNDAMENTALS AND APPLICATIONS IN THE IoT -- 17.1 INTRODUCTION -- 17.2 WHAT EXACTLY IS SCADA? -- 17.3 WHY IS SCADA THE RIGHT FOUNDATION FOR AN IoT PLATFORM? -- 17.4 CASE STUDY: ALGAE LAB SYSTEMS -- 17.5 THE FUTURE OF SCADA AND THE POTENTIAL OF THE IoT -- REFERENCES -- FURTHER READING -- PART III DATA ANALYTICS TECHNOLOGIES -- CHAPTER 18 DATA ANALYSIS AND MACHINE LEARNING EFFORT IN HEALTHCARE: ORGANIZATION, LIMITATIONS, AND DEVELOPMENT OF AN APPROACH -- 18.1 INTRODUCTION -- 18.2 DATA SCIENCE PROBLEMS IN HEALTHCARE -- 18.3 QUALIFICATIONS AND PERSONNEL IN DATA SCIENCE -- 18.4 DATA ACQUISITION AND TRANSFORMATION -- 18.5 BASIC PRINCIPLES OF MACHINE LEARNING -- 18.6 CASE STUDY: PREDICTION OF RARE EVENTS ON NONSPECIFIC DATA -- 18.7 FINAL REMARKS -- REFERENCES -- CHAPTER 19 DATA ANALYTICS AND PREDICTIVE ANALYTICS IN THE ERA OF BIG DATA -- 19.1 DATA ANALYTICS AND PREDICTIVE ANALYTICS -- 19.2 BIG DATA AND IMPACT TO ANALYTICS -- 19.3 CONCLUSION -- REFERENCES -- CHAPTER 20 STRATEGY DEVELOPMENT AND BIG DATA ANALYTICS -- 20.1 INTRODUCTION -- 20.2 MAXIMIZING THE INFLUENCE OF INTERNAL INPUTS FOR STRATEGY DEVELOPMENT.
20.3 A HIGHER EDUCATION CASE STUDY -- 20.4 MAXIMIZING THE INFLUENCE OF EXTERNAL INPUTS FOR STRATEGY DEVELOPMENT -- 20.5 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 21 RISK MODELING AND DATA SCIENCE -- 21.1 INTRODUCTION -- 21.2 WHAT IS RISK MODELING -- 21.3 THE ROLE OF DATA SCIENCE IN RISK MANAGEMENT -- 21.4 HOW TO PREPARE AND VALIDATE RISK MODEL -- 21.5 TIPS AND LESSONS LEARNED -- 21.6 FUTURE TRENDS AND CONCLUSION -- REFERENCES -- CHAPTER 22 HADOOP TECHNOLOGY -- 22.1 INTRODUCTION -- 22.2 WHAT IS HADOOP TECHNOLOGY AND APPLICATION? -- 22.3 WHY HADOOP? -- 22.4 HADOOP ARCHITECTURE -- 22.5 HDFS: WHAT AND HOW TO USE IT -- 22.6 YARN: WHAT AND HOW TO USE IT -- 22.7 MAPREDUCE: WHAT AND HOW TO USE IT -- 22.8 APACHE: WHAT AND HOW TO USE IT -- 22.9 FUTURE TREND AND CONCLUSION -- REFERENCES -- CHAPTER 23 SECURITY OF IoT DATA: CONTEXT, DEPTH, AND BREADTH ACROSS HADOOP -- 23.1 INTRODUCTION -- 23.2 IoT DATA IN HADOOP -- 23.3 SECURITY IN IoT PLATFORMS BUILT ON HADOOP -- 23.4 ARCHITECTURAL CONSIDERATIONS FOR IMPLEMENTING SECURITY IN HADOOP -- 23.5 BREADTH OF CONTROL -- 23.6 CONTEXT FOR SECURITY -- 23.7 SECURITY POLICIES AND RULES BASED ON  PxP ARCHITECTURE -- 23.8 CONCLUSION -- REFERENCES -- PART IV SMART EVERYTHING -- CHAPTER 24 CONNECTED VEHICLE -- 24.1 INTRODUCTION -- 24.2 CONNECTED, AUTOMATED, AND AUTONOMOUS VEHICLE TECHNOLOGIES -- 24.3 CONNECTED VEHICLES FROM THE DEPARTMENT OF TRANSPORTATION PERSPECTIVE -- 24.4 POLICY ISSUES AROUND DSRC -- 24.5 ALTERNATIVE FORMS OF V2X COMMUNICATIONS -- 24.6 DOT CONNECTED VEHICLE APPLICATIONS -- 24.7 OTHER CONNECTED VEHICLE APPLICATIONS -- 24.8 MIGRATION PATH FROM CONNECTED AND AUTOMATED TO FULLY AUTONOMOUS VEHICLES -- 24.9 AUTONOMOUS VEHICLE ADOPTION PREDICTIONS -- 24.10 MARKET GROWTH FOR CONNECTED AND AUTONOMOUS VEHICLE TECHNOLOGY -- 24.11 CONNECTED VEHICLES IN THE SMART CITY.
24.12 ISSUES NOT DISCUSSED IN THIS CHAPTER.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- TITLE PAGE -- COPYRIGHT PAGE -- CONTENTS -- LIST OF CONTRIBUTORS -- FOREWORD -- TECHNICAL ADVISORY BOARD MEMBERS -- PREFACE -- ACKNOWLEDGMENTS -- ABOUT THE COMPANION WEBSITE -- PART I INTERNET OF THINGS -- CHAPTER 1 INTERNET OF THINGS AND DATA ANALYTICS IN THE CLOUD WITH INNOVATION AND SUSTAINABILITY -- 1.1 INTRODUCTION -- 1.2 THE IoT AND THE FOURTH INDUSTRIAL REVOLUTION -- 1.3 INTERNET OF THINGS TECHNOLOGY -- 1.4 STANDARDS AND PROTOCOLS -- 1.5 IoT ECOSYSTEM -- 1.6 DEFINITION OF BIG DATA -- 1.7 IoT, DATA ANALYTICS, AND CLOUD COMPUTING -- 1.8 CREATIVITY, INVENTION, INNOVATION, AND DISRUPTIVE INNOVATION -- 1.9 POLYA'S "HOW TO SOLVE IT" -- 1.10 BUSINESS PLAN AND BUSINESS MODEL -- 1.11 CONCLUSION AND FUTURE PERSPECTIVES -- REFERENCES -- FURTHER READING -- USEFUL WEBSITES -- CHAPTER 2 DIGITAL SERVICES AND SUSTAINABLE SOLUTIONS -- 2.1 INTRODUCTION -- 2.2 WHY IoT IS NOT JUST "NICE TO HAVE" -- 2.3 SERVICES IN A DIGITAL REVOLUTION -- 2.4 MOBILE DIGITAL SERVICES AND THE HUMAN SENSOR -- 2.5 NOT JUST ANOTHER APP -- 2.6 THE HIDDEN LIFE OF THINGS -- 2.7 THE UMBRELLAS ARE NOT WHAT THEY SEEM -- 2.8 INTERACTING WITH THE INVISIBLE -- 2.9 SOCIETY AS OPEN SOURCE -- 2.10 LEARN FROM YOUR HACKERS -- 2.11 ENSURING HIGH-QUALITY SERVICES TO CITIZENS -- 2.12 GOVERNMENT AS A PLATFORM -- 2.13 CONCLUSION -- REFERENCES -- CHAPTER 3 THE INDUSTRIAL INTERNET OF THINGS (IIoT): APPLICATIONS AND TAXONOMY -- 3.1 INTRODUCTION TO THE IIoT -- 3.2 SOME EXAMPLES OF IIoT APPLICATIONS -- 3.3 TOWARD A TAXONOMY OF THE IIoT -- 3.4 STANDARDS AND PROTOCOLS FOR CONNECTIVITY -- 3.5 CONNECTIVITY ARCHITECTURE FOR THE IIoT -- 3.6 DATA-CENTRICITY MAKES DDS DIFFERENT -- 3.7 THE FUTURE OF THE IIoT -- REFERENCES -- CHAPTER 4 STRATEGIC PLANNING FOR SMARTER CITIES -- 4.1 INTRODUCTION -- 4.2 WHAT IS A SMART CITY? -- 4.3 SMART CITIES AND THE INTERNET OF THINGS -- 4.4 WHY STRATEGIC PLANNING MATTERS.

4.5 BEGINNING THE JOURNEY: FIRST THINGS FIRST -- 4.6 FROM VISION TO OBJECTIVES TO EXECUTION -- 4.7 PULLING IT ALL TOGETHER -- REFERENCES -- CHAPTER 5 NEXT-GENERATION LEARNING: SMART MEDICAL TEAM TRAINING -- 5.1 INTRODUCTION -- 5.2 LEARNING, ANALYTICS, AND INTERNET OF THINGS -- 5.3 IoT LEARNING DESIGN PROCESS -- 5.4 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 6 THE BRAIN-COMPUTER INTERFACE IN THE INTERNET OF THINGS -- 6.1 INTRODUCTION -- 6.2 THE SCIENCE BEHIND READING THE BRAIN -- 6.3 THE SCIENCE OF WRITING TO THE BRAIN -- 6.4 THE HUMAN CONNECTOME PROJECT -- 6.5 CONSUMER ELECTROENCEPHALOGRAPHY DEVICES -- 6.6 SUMMARY -- REFERENCES -- CHAPTER 7 IoT INNOVATION PULSE -- 7.1 THE CONVERGENCE OF EXPONENTIAL TECHNOLOGIES AS A DRIVER OF INNOVATION -- 7.2 SIX DIMENSIONS OF THE PLECOSYSTEM -- 7.3 FIVE PRINCIPLES OF THE PLECOSYSTEM -- 7.4 THE BIOLOGIC ORGANISM ANALOGY FOR THE IoT -- 7.5 COMPONENTS FOR INNOVATION WITH THE ORGANISMAL ANALOG -- 7.6 SPINOZAN VALUE TRADE-OFFS -- 7.7 HUMAN IoT SENSOR NETWORKS -- 7.8 ROLE OF THE IoT IN SOCIAL NETWORKS -- 7.9 SECURITY AND CYBERTHREAT RESILIENCE -- 7.10 IoT OPTIMIZATION FOR SUSTAINABILITY OF OUR PLANET -- 7.11 MAINTENANCE OF COMPLEX IoT NETWORKS -- 7.12 THE ACCORDION MODEL OF LEARNING AS A SOURCE OF INNOVATION -- 7.13 SUMMARY -- REFERENCES -- FURTHER READING -- PART II INTERNET OF THINGS TECHNOLOGIES -- CHAPTER 8 INTERNET OF THINGS OPEN-SOURCE SYSTEMS -- 8.1 INTRODUCTION -- 8.2 BACKGROUND OF OPEN SOURCE -- 8.3 DRIVERS FOR OPEN SOURCE -- 8.4 BENEFITS OF USING OPEN SOURCE -- 8.5 IoT OPEN-SOURCE CONSORTIUMS AND PROJECTS -- 8.6 FINDING THE RIGHT OPEN‐SOURCE PROJECT FOR THE JOB -- 8.7 CONCLUSION -- GLOSSARY -- REFERENCES -- FURTHER READING -- CHAPTER 9 MEMS: AN ENABLING TECHNOLOGY FOR THE INTERNET OF THINGS (IoT) -- 9.1 THE ABILITY TO SENSE, ACTUATE, AND CONTROL -- 9.2 WHAT ARE MEMS?.

9.3 MEMS AS AN ENABLING TECHNOLOGY FOR THE IoT -- 9.4 MEMS MANUFACTURING TECHNIQUES -- 9.5 EXAMPLES OF MEMS SENSORS -- 9.6 EXAMPLE OF MEMS ACTUATOR -- 9.7 THE FUTURE OF MEMS FOR THE IoT -- 9.8 CONCLUSION -- REFERENCES -- OTHER INFORMATION -- CHAPTER 10 ELECTRO-OPTICAL INFRARED SENSOR TECHNOLOGIES FOR THE INTERNET OF THINGS -- 10.1 INTRODUCTION -- 10.2 SENSOR ANATOMY AND TECHNOLOGIES -- 10.3 DESIGN CONSIDERATIONS -- 10.4 APPLICATIONS -- 10.5 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 11 IPv6 FOR IoT AND GATEWAY -- 11.1 INTRODUCTION -- 11.2 IP: THE INTERNET PROTOCOL -- 11.3 IPv6: THE NEXT INTERNET PROTOCOL -- 11.4 6LoWPAN: IP FOR IoT -- 11.5 GATEWAYS: A BAD CHOICE -- 11.6 EXAMPLE IoT SYSTEMS -- 11.7 AN IoT DATA MODEL -- 11.8 THE PROBLEM OF DATA OWNERSHIP -- 11.9 MANAGING THE LIFE OF AN IoT DEVICE -- 11.10 CONCLUSION: LOOKING FORWARD -- FURTHER READING -- CHAPTER 12 WIRELESS SENSOR NETWORKS -- 12.1 INTRODUCTION -- 12.2 CHARACTERISTICS OF WIRELESS SENSOR NETWORKS -- 12.3 DISTRIBUTED COMPUTING -- 12.4 PARALLEL COMPUTING -- 12.5 SELF-ORGANIZING NETWORKS -- 12.6 OPERATING SYSTEMS FOR SENSOR NETWORKS -- 12.7 WEB OF THINGS (WoT) -- 12.8 WIRELESS SENSOR NETWORK ARCHITECTURE -- 12.9 MODULARIZING THE WIRELESS SENSOR NODES -- 12.10 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 13 NETWORKING PROTOCOLS AND STANDARDS FOR INTERNET OF THINGS -- 13.1 INTRODUCTION -- 13.2 IoT DATA LINK PROTOCOLS -- 13.3 NETWORK LAYER ROUTING PROTOCOLS -- 13.4 NETWORK LAYER ENCAPSULATION PROTOCOLS -- 13.5 SESSION LAYER PROTOCOLS -- 13.6 IoT MANAGEMENT PROTOCOLS -- 13.7 SECURITY IN IoT PROTOCOLS -- 13.8 IoT CHALLENGES -- 13.9 SUMMARY -- REFERENCES -- CHAPTER 14 IoT ARCHITECTURE -- 14.1 INTRODUCTION -- 14.2 ARCHITECTURAL APPROACHES -- 14.3 BUSINESS MARKITECTURE -- 14.4 FUNCTIONAL ARCHITECTURE -- 14.5 APPLICATION ARCHITECTURE -- 14.6 DATA AND ANALYTICS ARCHITECTURE.

14.7 TECHNOLOGY ARCHITECTURE -- 14.8 SECURITY AND GOVERNANCE -- REFERENCES -- CHAPTER 15 A DESIGNER'S GUIDE TO THE INTERNET OF WEARABLE THINGS -- 15.1 INTRODUCTION -- 15.2 INTERFACE GLANCEABILITY -- 15.3 THE RIGHT DATA AT THE RIGHT TIME -- 15.4 CONSISTENCY ACROSS CHANNELS -- 15.5 FROM PUBLIC TO PERSONAL -- 15.6 NONVISUAL UI -- 15.7 EMERGING PATTERNS -- 15.8 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 16 BEACON TECHNOLOGY WITH IoT AND BIG DATA -- 16.1 INTRODUCTION TO BEACONS -- 16.2 WHAT IS BEACON TECHNOLOGY -- 16.3 BEACON AND BLE INTERACTION -- 16.4 WHERE BEACON TECHNOLOGY CAN BE APPLIED/USED -- 16.5 BIG DATA AND BEACONS -- 16.6 SAN FRANCISCO INTERNATIONAL AIRPORT (SFO) -- 16.7 FUTURE TRENDS AND CONCLUSION -- REFERENCES -- CHAPTER 17 SCADA FUNDAMENTALS AND APPLICATIONS IN THE IoT -- 17.1 INTRODUCTION -- 17.2 WHAT EXACTLY IS SCADA? -- 17.3 WHY IS SCADA THE RIGHT FOUNDATION FOR AN IoT PLATFORM? -- 17.4 CASE STUDY: ALGAE LAB SYSTEMS -- 17.5 THE FUTURE OF SCADA AND THE POTENTIAL OF THE IoT -- REFERENCES -- FURTHER READING -- PART III DATA ANALYTICS TECHNOLOGIES -- CHAPTER 18 DATA ANALYSIS AND MACHINE LEARNING EFFORT IN HEALTHCARE: ORGANIZATION, LIMITATIONS, AND DEVELOPMENT OF AN APPROACH -- 18.1 INTRODUCTION -- 18.2 DATA SCIENCE PROBLEMS IN HEALTHCARE -- 18.3 QUALIFICATIONS AND PERSONNEL IN DATA SCIENCE -- 18.4 DATA ACQUISITION AND TRANSFORMATION -- 18.5 BASIC PRINCIPLES OF MACHINE LEARNING -- 18.6 CASE STUDY: PREDICTION OF RARE EVENTS ON NONSPECIFIC DATA -- 18.7 FINAL REMARKS -- REFERENCES -- CHAPTER 19 DATA ANALYTICS AND PREDICTIVE ANALYTICS IN THE ERA OF BIG DATA -- 19.1 DATA ANALYTICS AND PREDICTIVE ANALYTICS -- 19.2 BIG DATA AND IMPACT TO ANALYTICS -- 19.3 CONCLUSION -- REFERENCES -- CHAPTER 20 STRATEGY DEVELOPMENT AND BIG DATA ANALYTICS -- 20.1 INTRODUCTION -- 20.2 MAXIMIZING THE INFLUENCE OF INTERNAL INPUTS FOR STRATEGY DEVELOPMENT.

20.3 A HIGHER EDUCATION CASE STUDY -- 20.4 MAXIMIZING THE INFLUENCE OF EXTERNAL INPUTS FOR STRATEGY DEVELOPMENT -- 20.5 CONCLUSION -- REFERENCES -- FURTHER READING -- CHAPTER 21 RISK MODELING AND DATA SCIENCE -- 21.1 INTRODUCTION -- 21.2 WHAT IS RISK MODELING -- 21.3 THE ROLE OF DATA SCIENCE IN RISK MANAGEMENT -- 21.4 HOW TO PREPARE AND VALIDATE RISK MODEL -- 21.5 TIPS AND LESSONS LEARNED -- 21.6 FUTURE TRENDS AND CONCLUSION -- REFERENCES -- CHAPTER 22 HADOOP TECHNOLOGY -- 22.1 INTRODUCTION -- 22.2 WHAT IS HADOOP TECHNOLOGY AND APPLICATION? -- 22.3 WHY HADOOP? -- 22.4 HADOOP ARCHITECTURE -- 22.5 HDFS: WHAT AND HOW TO USE IT -- 22.6 YARN: WHAT AND HOW TO USE IT -- 22.7 MAPREDUCE: WHAT AND HOW TO USE IT -- 22.8 APACHE: WHAT AND HOW TO USE IT -- 22.9 FUTURE TREND AND CONCLUSION -- REFERENCES -- CHAPTER 23 SECURITY OF IoT DATA: CONTEXT, DEPTH, AND BREADTH ACROSS HADOOP -- 23.1 INTRODUCTION -- 23.2 IoT DATA IN HADOOP -- 23.3 SECURITY IN IoT PLATFORMS BUILT ON HADOOP -- 23.4 ARCHITECTURAL CONSIDERATIONS FOR IMPLEMENTING SECURITY IN HADOOP -- 23.5 BREADTH OF CONTROL -- 23.6 CONTEXT FOR SECURITY -- 23.7 SECURITY POLICIES AND RULES BASED ON  PxP ARCHITECTURE -- 23.8 CONCLUSION -- REFERENCES -- PART IV SMART EVERYTHING -- CHAPTER 24 CONNECTED VEHICLE -- 24.1 INTRODUCTION -- 24.2 CONNECTED, AUTOMATED, AND AUTONOMOUS VEHICLE TECHNOLOGIES -- 24.3 CONNECTED VEHICLES FROM THE DEPARTMENT OF TRANSPORTATION PERSPECTIVE -- 24.4 POLICY ISSUES AROUND DSRC -- 24.5 ALTERNATIVE FORMS OF V2X COMMUNICATIONS -- 24.6 DOT CONNECTED VEHICLE APPLICATIONS -- 24.7 OTHER CONNECTED VEHICLE APPLICATIONS -- 24.8 MIGRATION PATH FROM CONNECTED AND AUTOMATED TO FULLY AUTONOMOUS VEHICLES -- 24.9 AUTONOMOUS VEHICLE ADOPTION PREDICTIONS -- 24.10 MARKET GROWTH FOR CONNECTED AND AUTONOMOUS VEHICLE TECHNOLOGY -- 24.11 CONNECTED VEHICLES IN THE SMART CITY.

24.12 ISSUES NOT DISCUSSED IN THIS CHAPTER.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.