Cognitive Computing and Internet of Things


Book Description

Cognitive Computing and Internet of Things Proceedings of the 13th International Conference on Applied Human Factors and Ergonomics (AHFE 2022), July 24–28, 2022, New York, USA




Internet-of-Things (IoT) Systems


Book Description

This book covers essential topics in the architecture and design of Internet of Things (IoT) systems. The authors provide state-of-the-art information that enables readers to design systems that balance functionality, bandwidth, and power consumption, while providing secure and safe operation in the face of a wide range of threat and fault models. Coverage includes essential topics in system modeling, edge/cloud architectures, and security and safety, including cyberphysical systems and industrial control systems.




Industrial IoT


Book Description

The proliferation of Internet of Things (IoT) has enabled rapid enhancements for applications, not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to industry, with applications ranging from remote sensing and actuating, to de-centralization and autonomy. In this book, the editor presents the IIoT and its place during the new industrial revolution (Industry 4.0) as it takes us to a better, sustainable, automated, and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, the book includes practical use-case scenarios from the industry for the application of IIoT on smart factories, smart cities, and smart grids. IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as an example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented to give a better understanding of the enabling technologies, potential advantages, and challenges of the Industry 4.0 and IIoT. Finally, yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. User privacy, data ownership, and proprietary information handling related to IIoT networks are all investigated. Intrusion prevention, detection, and mitigation are all covered at the conclusion of the book.




RF CMOS Oscillators for Modern Wireless Applications


Book Description

The main goal of this book is to bring forth the exciting and innovative RF oscillator structures that demonstrate better phase noise performance, lower cost, and higher power efficiency than currently achievable.




Recent Trends and Advances in Artificial Intelligence and Internet of Things


Book Description

This book covers all the emerging trends in artificial intelligence (AI) and the Internet of Things (IoT). The Internet of Things is a term that has been introduced in recent years to define devices that are able to connect and transfer data to other devices via the Internet. While IoT and sensors have the ability to harness large volumes of data, AI can learn patterns in the data and quickly extract insights in order to automate tasks for a variety of business benefits. Machine learning, an AI technology, brings the ability to automatically identify patterns and detect anomalies in the data that smart sensors and devices generate, and it can have significant advantages over traditional business intelligence tools for analyzing IoT data, including being able to make operational predictions up to 20 times earlier and with greater accuracy than threshold-based monitoring systems. Further, other AI technologies, such as speech recognition and computer vision can help extract insights from data that used to require human review. The powerful combination of AI and IoT technology is helping to avoid unplanned downtime, increase operating efficiency, enable new products and services, and enhance risk management.




Deep Learning and Convolutional Neural Networks for Medical Image Computing


Book Description

This book presents a detailed review of the state of the art in deep learning approaches for semantic object detection and segmentation in medical image computing, and large-scale radiology database mining. A particular focus is placed on the application of convolutional neural networks, with the theory supported by practical examples. Features: highlights how the use of deep neural networks can address new questions and protocols, as well as improve upon existing challenges in medical image computing; discusses the insightful research experience of Dr. Ronald M. Summers; presents a comprehensive review of the latest research and literature; describes a range of different methods that make use of deep learning for object or landmark detection tasks in 2D and 3D medical imaging; examines a varied selection of techniques for semantic segmentation using deep learning principles in medical imaging; introduces a novel approach to interleaved text and image deep mining on a large-scale radiology image database.




Breaking the Unbreakable


Book Description

In this thesis we study device-independent quantum key distribution based on energy-time entanglement. This is a method for cryptography that promises not only perfect secrecy, but also to be a practical method for quantum key distribution thanks to the reduced complexity when compared to other quantum key distribution protocols. However, there still exist a number of loopholes that must be understood and eliminated in order to rule out eavesdroppers. We study several relevant loopholes and show how they can be used to break the security of energy-time entangled systems. Attack strategies are reviewed as well as their countermeasures, and we show how full security can be re-established. Quantum key distribution is in part based on the profound no-cloning theorem, which prevents physical states to be copied at a microscopic level. This important property of quantum mechanics can be seen as Nature's own copy-protection, and can also be used to create a currency based on quantummechanics, i.e., quantum money. Here, the traditional copy-protection mechanisms of traditional coins and banknotes can be abandoned in favor of the laws of quantum physics. Previously, quantum money assumes a traditional hierarchy where a central, trusted bank controls the economy. We show how quantum money together with a blockchain allows for Quantum Bitcoin, a novel hybrid currency that promises fast transactions, extensive scalability, and full anonymity. En viktig konsekvens av kvantmekaniken är att okända kvanttillstånd inte kan klonas. Denna insikt har gett upphov till kvantkryptering, en metod för två parter att med perfekt säkerhet kommunicera hemligheter. Ett komplett bevis för denna säkerhet har dock låtit vänta på sig eftersom en attackerare i hemlighet kan manipulera utrustningen så att den läcker information. Som ett svar på detta utvecklades apparatsoberoende kvantkryptering som i teorin är immun mot sådana attacker. Apparatsoberoende kvantkryptering har en mycket högre grad av säkerhet än vanlig kvantkryptering, men det finns fortfarande ett par luckor som en attackerare kan utnyttja. Dessa kryphål har tidigare inte tagits på allvar, men denna avhandling visar hur även små svagheter i säkerhetsmodellen läcker information till en attackerare. Vi demonstrerar en praktisk attack där attackeraren aldrig upptäcks trots att denne helt kontrollerar systemet. Vi visar också hur kryphålen kan förhindras med starkare säkerhetsbevis. En annan tillämpning av kvantmekanikens förbud mot kloning är pengar som använder detta naturens egna kopieringsskydd. Dessa kvantpengar har helt andra egenskaper än vanliga mynt, sedlar eller digitala banköverföringar. Vi visar hur man kan kombinera kvantpengar med en blockkedja, och man får då man en slags "kvant-Bitcoin". Detta nya betalningsmedel har fördelar över alla andra betalsystem, men nackdelen är att det krävs en kvantdator.




iSCSI Implementation and Best Practices on IBM Storwize Storage Systems


Book Description

This IBM® Redbooks® publication helps administrators and technical professionals understand Internet Small Computer System Interface (iSCSI) and how to implement it for use with IBM Storwize® storage systems. iSCSI can be used alone or with other technologies. This publication provides an overview of the iSCSI protocol and helps you understand how it is similar to and different from Fibre Channel (FC) technology. It helps you plan and design your network topology. It explains how to configure your IBM Storwize storage systems and hosts (including IBM AIX®, Linux, VMware, and Microsoft Windows hosts) to interact with it. It also provides an overview of using IBM Storwize storage systems with OpenStack. This book describes configuring iSCSI for IBM Storwize and SAN Volume Controller storage systems at Version 7.6 or later. In addition to configuration, this publication provides information about performance and troubleshooting.




Wireless Sensor and Actuator Networks


Book Description

This timely book offers a mixture of theory, experiments, and simulations that provides qualitative and quantitative insights in the field of sensor and actuator networking. The chapters are selected in a way that makes the book comprehensive and self-contained. It covers a wide range of recognized problems in sensor networks, striking a balance between theoretical and practical coverage. The book is appropriate for graduate students and practitioners working as engineers, programmers, and technologists.




Advances in Lightweight Materials and Structures


Book Description

This book presents select proceedings of the International Conference on Advanced Lightweight Materials and Structures (ICALMS) 2020, and discusses the triad of processing, structure, and various properties of lightweight materials. It provides a well-balanced insight into materials science and mechanics of both synthetic and natural composites. The book includes topics such as nano composites for lightweight structures, impact and failure of structures, biomechanics and biomedical engineering, nanotechnology and micro-engineering, tool design and manufacture for producing lightweight components, joining techniques for lightweight structures for similar and dissimilar materials, design for manufacturing, reliability and safety, robotics, automation and control, fatigue and fracture mechanics, and friction stir welding in lightweight sandwich structures. The book also discusses latest research in composite materials and their applications in the field of aerospace, construction, wind energy, automotive, electronics and so on. Given the range of topics covered, this book can be a useful resource for beginners, researchers and professionals interested in the wide ranging applications of lightweight structures.