Editor Biographies |
|
xv | |
List of Contributors |
|
xvii | |
Chapter 1 VANET-Based Intelligent Traffic Light Control System by Detecting Congestion Using Fuzzy C-Means Clustering Technique in a Smart City |
|
1 | (18) |
|
|
|
|
|
1 | (1) |
|
|
2 | (2) |
|
|
4 | (3) |
|
1.3.1 Parameter Extraction |
|
|
4 | (1) |
|
1.3.2 Clustering Algorithm for Congestion Detection |
|
|
5 | (1) |
|
1.3.3 Labview for Traffic Light Operation |
|
|
5 | (2) |
|
|
7 | (1) |
|
1.5 System Implementation |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
1.6 Experimental Results and Observations |
|
|
9 | (3) |
|
|
12 | (4) |
|
|
16 | (3) |
Chapter 2 Internet of Things Advancements in Healthcare |
|
19 | (14) |
|
|
|
|
2.1 Introduction to IoT in Healthcare |
|
|
19 | (7) |
|
2.1.1 Internet of Things and Healthcare |
|
|
20 | (1) |
|
2.1.2 Growth of Internet of Things in Changing Data Environment |
|
|
21 | (1) |
|
2.1.3 IoT Analytics in Healthcare |
|
|
22 | (4) |
|
2.1.4 Future Aspects of IoT in Healthcare |
|
|
26 | (1) |
|
2.1.5 Telehealth and Self-Monitoring with Mobile Applications |
|
|
26 | (1) |
|
2.2 Wearable Sensors and IoT Applications in Healthcare |
|
|
26 | (5) |
|
2.2.1 IoT Devices and Protocols |
|
|
28 | (1) |
|
2.2.2 IoT Applications in Healthcare |
|
|
29 | (1) |
|
2.2.3 IoT in Home Rehabilitation |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (2) |
Chapter 3 IoT-Based Artificial Intelligence System in Object Detection |
|
33 | (18) |
|
|
|
|
33 | (1) |
|
|
34 | (6) |
|
|
34 | (5) |
|
3.2.2 Comparison of Static Techniques of Object Detection |
|
|
39 | (1) |
|
|
40 | (2) |
|
3.4 Experimental Analysis |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (8) |
Chapter 4 A Value Parity Combination-Based Scheme for Heartbeat Sounds Protection |
|
51 | (18) |
|
|
|
|
|
|
51 | (1) |
|
|
52 | (3) |
|
4.2.1 Spatial Domain Audio Watermarking Methods |
|
|
53 | (1) |
|
4.2.2 Transform Domain Audio Watermarking Methods |
|
|
53 | (1) |
|
4.2.3 Multi-Resolutional Domain Audio Watermarking Methods |
|
|
54 | (1) |
|
|
55 | (2) |
|
|
55 | (1) |
|
|
55 | (2) |
|
4.3.3 Multi-Resolution Domain |
|
|
57 | (1) |
|
4.4 Experiments and Results |
|
|
57 | (7) |
|
4.4.1 Performance Measurement Metrics |
|
|
58 | (1) |
|
4.4.2 Application of Our Approaches in the Spatial Domain |
|
|
58 | (1) |
|
4.4.3 Application of Our Approaches in the Frequency Domain |
|
|
58 | (1) |
|
4.4.4 Application of Our Approaches in the Multi-Resolution Domain |
|
|
59 | (4) |
|
4.4.5 Imperceptibility Tests |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
64 | (1) |
|
4.6 Compliance with Ethical Standards |
|
|
65 | (1) |
|
|
65 | (4) |
Chapter 5 Sentiment Analysis of Product Reviews Using IoT |
|
69 | (16) |
|
|
|
|
69 | (5) |
|
|
70 | (1) |
|
5.1.2 Sentiment Analysis Application |
|
|
70 | (1) |
|
5.1.3 Different Levels of Analysis |
|
|
70 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
|
73 | (1) |
|
5.1.7 IoT Using Machine Learning |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (4) |
|
|
75 | (1) |
|
|
76 | (1) |
|
5.3.3 Preprocessing of Reviews |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
79 | (1) |
|
5.4 Experiment and Results |
|
|
79 | (2) |
|
|
81 | (1) |
|
|
81 | (4) |
Chapter 6 Saccadic Scan Path Predicting Using Convolutional Auto Encoders |
|
85 | (16) |
|
|
|
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (2) |
|
6.3.1 Convolutional Auto-encoder |
|
|
87 | (2) |
|
|
89 | (4) |
|
|
93 | (3) |
|
6.6 Results and Conclusion |
|
|
96 | (3) |
|
|
99 | (2) |
Chapter 7 Impact of IIOT in Future Industries: Opportunities and Challenges |
|
101 | (12) |
|
|
|
101 | (2) |
|
7.2 Research Efforts in Industrial IoT |
|
|
103 | (1) |
|
7.3 Empowering Technologies for IoT |
|
|
103 | (4) |
|
|
103 | (1) |
|
7.3.2 Blockchain Technology |
|
|
103 | (2) |
|
|
105 | (1) |
|
|
106 | (1) |
|
7.3.5 Cyber Physical Systems (CPS) and Artificial Intelligence (AI) |
|
|
106 | (1) |
|
7.3.6 Augmented and Virtual Reality |
|
|
107 | (1) |
|
|
107 | (3) |
|
7.4.1 Efficient Management Procedure for Data |
|
|
107 | (1) |
|
7.4.2 Heterogeneous IoT Systems' Collaborations |
|
|
108 | (1) |
|
7.4.3 Robust and Scalable Analytical Techniques for Big Data |
|
|
108 | (1) |
|
7.4.4 Trust in Industrial IoT-Based Frameworks |
|
|
108 | (1) |
|
7.4.5 Wireless Technology and Protocols Coexistence with IIoT |
|
|
109 | (1) |
|
7.4.6 Enabling Decentralization on the Edge |
|
|
109 | (1) |
|
7.4.7 Development of IoT Specific Operating Systems |
|
|
109 | (1) |
|
7.4.8 Public Safety in IIoT |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (2) |
Chapter 8 Privacy and Ethical Issues in Digitalization World |
|
113 | (6) |
|
|
|
113 | (1) |
|
|
114 | (1) |
|
8.3 Challenges in the Stream of Data Privacy |
|
|
114 | (1) |
|
8.4 Ethical Issues in Data Privacy |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (3) |
Chapter 9 A Review on Smart Traffic Management System |
|
119 | (12) |
|
|
|
|
|
119 | (1) |
|
9.2 Decrease of Traffic Movement Through the Smart Signals |
|
|
120 | (1) |
|
9.3 Role of IoT and Big Data in Traffic Management |
|
|
120 | (1) |
|
9.4 Advantages and Disadvantages of Traffic Management System |
|
|
121 | (2) |
|
|
121 | (1) |
|
9.4.2 Disadvantages Compatibility |
|
|
122 | (1) |
|
|
123 | (5) |
|
|
128 | (1) |
|
|
128 | (3) |
Chapter 10 A Robust Context and Role-Based Dynamic Access Control for Distributed Healthcare Information Systems |
|
131 | (22) |
|
Abdulkadir Abdulkadir Adamu |
|
|
|
|
|
131 | (1) |
|
|
132 | (3) |
|
10.2.1 Role-Based Access Control |
|
|
132 | (2) |
|
10.2.2 Other Access Control Models |
|
|
134 | (1) |
|
|
135 | (1) |
|
10.3 Research Methodology |
|
|
135 | (5) |
|
|
135 | (1) |
|
10.3.2 Data Collection Instruments |
|
|
136 | (1) |
|
10.3.3 Validation of Data Collection Instruments |
|
|
136 | (1) |
|
10.3.4 Data Collection Procedure |
|
|
137 | (1) |
|
10.3.5 Procedure For Data Analysis |
|
|
137 | (1) |
|
10.3.6 Setting Up the Uath Computing Environment |
|
|
137 | (1) |
|
10.3.7 Systems Functional Requirement Analysis |
|
|
137 | (1) |
|
10.3.8 Analysis of Existing RBAC Models |
|
|
138 | (1) |
|
10.3.9 Modification of Existing RBAC Models |
|
|
139 | (1) |
|
10.3.10 System Architecture And the Technical Approach To System Design |
|
|
140 | (1) |
|
10.4 System Design and Architecture |
|
|
140 | (5) |
|
10.4.1 The Basic RBAC System Structure |
|
|
140 | (1) |
|
10.4.2 Technical Approach to System Design |
|
|
141 | (1) |
|
|
142 | (1) |
|
10.4.4 System Implementation |
|
|
143 | (2) |
|
10.5 Results and Discussion |
|
|
145 | (5) |
|
|
145 | (1) |
|
|
145 | (1) |
|
10.5.3 Relationships Between the System User Database Tables |
|
|
145 | (1) |
|
10.5.4 Infusing Purpose And Context Into the System Design |
|
|
146 | (2) |
|
10.5.5 Analysis of Hypotheses |
|
|
148 | (2) |
|
10.5.6 Testing of Hypothesis |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (2) |
Chapter 11 Impact of ICT on Handicrafts Marketing in Delhi NCR Region |
|
153 | (12) |
|
|
|
153 | (4) |
|
11.2 Information and Communication Technologies (ICT) in Handicraft |
|
|
157 | (3) |
|
11.3 Uses of Information Technology for Marketing |
|
|
160 | (1) |
|
11.3.1 Advertising of Handicrafts Products |
|
|
160 | (1) |
|
11.4 Tools of Information Technology |
|
|
161 | (1) |
|
11.5 Challenges for E-Tailing in Handicrafts Marketing |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
163 | (2) |
Chapter 12 Intelligent Amalgamation of Blockchain Technology with Industry 4.0 to Improve Security |
|
165 | (12) |
|
|
|
|
165 | (1) |
|
12.2 Historical Look Back of Industrial Revolution |
|
|
166 | (2) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (2) |
|
12.4 Security Preferences for Industry 4.0 |
|
|
170 | (2) |
|
12.5 How Blockchain Caters Security to Support Industry 4.0 |
|
|
172 | (2) |
|
|
174 | (1) |
|
|
174 | (3) |
Chapter 13 Sensor Networks and Internet of Things in Agri-Food |
|
177 | (18) |
|
Moses Oluwafemi Onibonoje |
|
|
|
177 | (3) |
|
|
180 | (12) |
|
|
180 | (2) |
|
|
182 | (1) |
|
|
183 | (1) |
|
13.2.4 Design Issues and Challenges |
|
|
183 | (3) |
|
13.2.5 Case Study: Sensor Networks and IoT in the Food Chain |
|
|
186 | (6) |
|
|
192 | (3) |
Chapter 14 Design and Development of Hybrid Algorithms to Improve Cyber Security and Provide Securing Data Using Image Steganography with Internet of Things |
|
195 | (14) |
|
|
|
|
195 | (2) |
|
|
197 | (3) |
|
|
200 | (1) |
|
14.4 Proposed Methodology |
|
|
200 | (6) |
|
|
206 | (1) |
|
|
207 | (2) |
Chapter 15 Optimal Automatic Power Generation Using Modified Hybrid Soft Computing Techniques |
|
209 | (40) |
|
|
|
|
|
209 | (1) |
|
15.2 Modeling of Load Frequency Control System with and Without the Effect of Dead Band |
|
|
210 | (7) |
|
15.2.1 Problem Formulation |
|
|
215 | (2) |
|
15.3 Overview of Soft Computing Techniques |
|
|
217 | (9) |
|
15.4 Overview and Solution Methodology Using Hybrid Statistical Tracked Particle Swarm Optimization (STPSO) |
|
|
226 | (4) |
|
15.4.1 Overview of Hybrid STPSO |
|
|
226 | (2) |
|
15.4.2 Computational Algorithm Using Hybrid STPSO Method |
|
|
228 | (2) |
|
15.5 Implementation of Benchmark Functions |
|
|
230 | (4) |
|
15.5.1 Performance Evaluation |
|
|
232 | (2) |
|
15.6 Implementation of Proposed Automatic Generation Control Systems |
|
|
234 | (8) |
|
15.6.1 Performance Evaluation |
|
|
236 | (6) |
|
|
242 | (5) |
|
15.7.1 Guide Line for Future Work |
|
|
244 | (3) |
|
|
247 | (2) |
Chapter 16 Steganography and Steganalysis Using Machine Learning |
|
249 | (10) |
|
|
|
|
|
249 | (1) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
252 | (3) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
256 | (3) |
Chapter 17 Gender Detection Based on Machine Learning Using Convolutional Neural Networks |
|
259 | (16) |
|
|
|
|
|
|
|
259 | (1) |
|
|
260 | (1) |
|
|
260 | (2) |
|
17.3 Implementation and Design |
|
|
262 | (7) |
|
17.3.1 Hardware Architecture and Block Diagram |
|
|
262 | (1) |
|
|
262 | (2) |
|
17.3.2.1 Raspberry Pi 4 Board |
|
|
264 | (1) |
|
17.3.3 Software Architecture and Algorithm |
|
|
264 | (5) |
|
|
269 | (2) |
|
|
271 | (1) |
|
|
272 | (3) |
Chapter 18 Smart Technologies and Social Impact: An Indian Perspective of Contactless Technologies for Pandemic |
|
275 | (26) |
|
|
|
|
|
275 | (6) |
|
18.2 Taxonomy of Technologies |
|
|
281 | (4) |
|
18.2.1 The Internet of Things |
|
|
281 | (1) |
|
18.2.2 Application of lot in Different Scenarios of Covid |
|
|
282 | (1) |
|
18.2.3 Applications of Internet and Smart Technologies and their Impact on Society |
|
|
283 | (1) |
|
18.2.4 Impact of COVID-19 on IoT Applications |
|
|
284 | (1) |
|
18.3 Smart Tracing Technologies |
|
|
285 | (6) |
|
18.3.1 Contact Tracing Technologies (Figure 18.1) - Review |
|
|
285 | (2) |
|
18.3.2 Popular Applications for Contact Tracing |
|
|
287 | (1) |
|
18.3.3 Outcome of Contract Tracing Applications |
|
|
288 | (1) |
|
18.3.4 Popular Applications Payment System and Impact |
|
|
288 | (1) |
|
18.3.5 Popular Applications for Education and Impact |
|
|
289 | (2) |
|
18.4 Analysis and Social Impact |
|
|
291 | (2) |
|
|
292 | (1) |
|
18.4.2 User Adoption, Etc |
|
|
292 | (1) |
|
|
293 | (1) |
|
|
293 | (8) |
Chapter 19 Agriculture-Internet of Things (A-IoT) Key Roles in Addressing Some Challenges in Agriculture |
|
301 | (8) |
|
|
|
301 | (1) |
|
19.2 Background and Concept of IoT |
|
|
302 | (1) |
|
19.3 IoT Architecture in Agriculture |
|
|
303 | (1) |
|
19.4 IoT Application or Role in Agriculture |
|
|
304 | (3) |
|
19.5 Examples of Apps of Internet of Things (IoT) Used in Agriculture |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
308 | (1) |
Index |
|
309 | |