Integration, Interconnection, and Interoperability of IoT Systems


Book Description

This edited book investigates the lack of interoperability in the IoT realm, including innovative research as well as technical solutions to interoperability, integration, and interconnection of heterogeneous IoT systems, at any level. It also explores issues caused by lack of interoperability such as impossibility to plug non-interoperable IoT devices into heterogeneous IoT platforms, impossibility to develop IoT applications exploiting multiple platforms in homogeneous and/or cross domains, slowness of IoT technology introduction at large-scale: discouragement in adopting IoT technology, increase of costs; scarce reusability of technical solutions and difficulty in meeting user satisfaction.




Interoperability, Safety and Security in IoT


Book Description

This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was collocated with SaSeIoT 2017, and took place in Valencia, Spain, in November 2017. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).




Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing


Book Description

Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. The Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing is a vital reference source that provides valuable insight into current and emergent research occurring within the field of distributed computing. It also presents architectures and service frameworks to achieve highly integrated distributed systems and solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting a range of topics such as data sharing, wireless sensor networks, and scalability, this multi-volume book is ideally designed for system administrators, integrators, designers, developers, researchers, academicians, and students.




Computational Statistics and Mathematical Modeling Methods in Intelligent Systems


Book Description

This book presents real-world problems and exploratory research in computational statistics, mathematical modeling, artificial intelligence and software engineering in the context of the intelligent systems. This book constitutes the refereed proceedings of the 3rd Computational Methods in Systems and Software 2019 (CoMeSySo 2019), a groundbreaking online conference that provides an international forum for discussing the latest high-quality research results.




Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019)


Book Description

This book features selected research papers presented at the First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019), organized by Northwest Group of Institutions, Punjab, India, Southern Federal University, Russia, and IAC Educational Trust, India along with KEC, Ghaziabad and ITS, College Ghaziabad as an academic partner and held on 12–13 October 2019. It includes innovative work from researchers, leading innovators and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.







Data Science and Internet of Things


Book Description

This book focuses on the combination of IoT and data science, in particular how methods, algorithms, and tools from data science can effectively support IoT. The authors show how data science methodologies, techniques and tools, can translate data into information, enabling the effectiveness and usefulness of new services offered by IoT stakeholders. The authors posit that if IoT is indeed the infrastructure of the future, data structure is the key that can lead to a significant improvement of human life. The book aims to present innovative IoT applications as well as ongoing research that exploit modern data science approaches. Readers are offered issues and challenges in a cross-disciplinary scenario that involves both IoT and data science fields. The book features contributions from academics, researchers, and professionals from both fields.




Handbook of Research on Big Data and the IoT


Book Description

The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.




Edge-of-Things in Personalized Healthcare Support Systems


Book Description

Edge-of-Things in Personalized Healthcare Support Systems discusses and explores state-of-the-art technology developments in storage and sharing of personal healthcare records in a secure manner that is globally distributed to incorporate best healthcare practices. The book presents research into the identification of specialization and expertise among healthcare professionals, the sharing of records over the cloud, access controls and rights of shared documents, document privacy, as well as edge computing techniques which help to identify causes and develop treatments for human disease. The book aims to advance personal healthcare, medical diagnosis, and treatment by applying IoT, cloud, and edge computing technologies in association with effective data analytics. - Provides an in-depth analysis of how to model and design applications for state-of-the-art healthcare systems - Discusses and explores the social impact of the intertwined use of emerging IT technologies for healthcare - Covers system design and software building principles for healthcare using IoT, cloud, and edge computing technologies with the support of effective and efficient data analytics strategies - Explores the latest algorithms using machine and deep learning in the areas of cloud, edge computing, IoT, and healthcare analytics




Internet of Things Security


Book Description

The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequate security measures are required to leverage the benefits of this emerging concept. Internet of Things Security: Principles, Applications, Attacks, and Countermeasures is an extensive source that aims at establishing an understanding of the core concepts of IoT among its readers and the challenges and corresponding countermeasures in the field. Key features: Containment of theoretical aspects, as well as recent empirical findings associated with the underlying technologies Exploration of various challenges and trade-offs associated with the field and approaches to ensure security, privacy, safety, and trust across its key elements Vision of exciting areas for future research in the field to enhance the overall productivity This book is suitable for industrial professionals and practitioners, researchers, faculty members, and students across universities who aim to carry out research and development in the field of IoT security.