| 000 | 03613nam a22004697a 4500 | ||
|---|---|---|---|
| 001 | 7036 | ||
| 003 | OSt | ||
| 005 | 20240319115527.0 | ||
| 008 | 240319s2018 -usa|||| |||| 001 0 eng d | ||
| 020 |
_a9781138035003 _qpaper back |
||
| 040 | _cCentral library, KU | ||
| 041 | _2eng | ||
| 082 |
_a004.678 _bTRT |
||
| 245 |
_aInternet of things (IoT) : _btechnologies, applications, challenges and solutions/ _c edited by B. K. Tripathy , J. Anuradha |
||
| 250 | _a1st ed. | ||
| 260 |
_aBoca Raton: _bTaylor & Francis, CRC Press, _c2018 |
||
| 300 |
_axxiii, 334p.: _bill.; _c26 cm. |
||
| 350 | _a4080.00 | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _a1. IoT enabled vision system for Tint level detection. | |
| 505 | _a 2. Supervised and Semi-Supervised Identification of Users and Activities from Wearable Device Brain Signal Recordings. | ||
| 505 | _a3 Internet of Things and Artificial Intelligence: A new road to the future Digital world. | ||
| 505 | _a4 Technical and Societal Challenges: Exploit the Profound Impacts of IoT. | ||
| 505 | _a5. Evolution of Social IoT World: Security Issues and Research Challenges. | ||
| 505 | _a6. User Authentication: Keystroke Dynamics with Soft Biometric Features | ||
| 505 | _a7: Internet of Nano-Things Forensics: Performing Digital Forensics in Nanoscale Systems. | ||
| 505 | _a8: Aspects of Ambient Assisted Living and its Applications. | ||
| 505 | _a9: Naming Services in Internet of Things. | ||
| 505 | _a10: Review on communication security issues in IoT medical device. | ||
| 505 | _a11: IoT challenges: Security. | ||
| 505 | _a12 Non physician Primary Health Care Workers: Making Wearable Computational Devices, Electronic Health Records Work for them. | ||
| 505 | _a13. Semantic Technologies for IoT. Applications of IoT to address the solutions for children affected by Autism Spectrum Disorders | ||
| 520 | _a"The term IoT, which was first proposed by Kevin Ashton, a British technologist, in 1999 has the potential to impact everything from new product opportunities to shop floor optimization to factory worker efficiency gains, that will power top-line and bottom-line gains. As IoT technology is being put to diversified use, the current technology needs to be improved to enhance privacy and built secure devices by adopting a security-focused approach, reducing the amount of data collected, increasing transparency and providing consumers with a choice to opt out. Therefore, the current volume has been compiled, in an effort to draw the various issues in IoT, challenges faced and existing solutions so far. Key Points:" Provides an overview of basic concepts and technologies of IoT with communication technologies ranging from 4G to 5G and its architecture." Discusses recent security and privacy studies and social behavior of human beings over IoT." Covers the issues related to sensors, business model, principles, paradigms, green IoT and solutions to handle relevant challenges." Presents the readers with practical ideas of using IoT, how it deals with human dynamics, the ecosystem, the social objects and their relation." Deals with the challenges involved in surpassing diversified architecture, protocol, communications, integrity and security."--Provided by publisher | ||
| 650 | _aComputer Literacy | ||
| 650 | _aComputer Science | ||
| 650 | _aData Processing | ||
| 650 | _aHardware General | ||
| 650 | _a Information Technology | ||
| 700 |
_aTripathy, B. K. _eEditor |
||
| 700 |
_a Anuradha, J. _eEditor |
||
| 942 | _cBK | ||
| 999 |
_c7036 _d7036 |
||