New Trends and Applications in Internet of Things (IoT) and Big Data Analytics

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book focuses on the use of The Internet of Things (IoT) and big data in business intelligence, data management, Hadoop, machine learning, cloud, smart cities, etc. IoT and big data emerged from the early 2000s data boom, driven forward by many of the early internet and technology companies. The Internet of Things (IoT) is an interconnection of several devices, networks, technologies, and human resources to achieve a common goal. There are a variety of IoT-based applications being used in different sectors and have succeeded in providing huge benefits to the users. The generation of big data by IoT has ruptured the existing data processing capacity of IoT and recommends to adopt the data analytics to strengthen solutions. The success of IoT depends upon the influential association of big data analytics. New technologies like search engines, mobile devices, and industrial machines provided as much data as companies could handle―and the scale continues to grow. In a study conducted by IDC, the market intelligence firm estimated that the global production of data would grow 10x between 2015 and 2020. So, the proposed book covers up all the aspects in the field discuss above.

Author(s): Rohit Sharma, Dilip Sharma
Series: Intelligent Systems Reference Library, 221
Publisher: Springer
Year: 2022

Language: English
Pages: 277
City: Cham

Preface
About This Book
Contents
About the Editors
1 PQD Analysis in Smart Grid System Using Attention-Based Neural Network
1.1 Introduction
1.2 Related Works
1.3 Global Attention-Based Long Short-Term Memory Network
1.3.1 Global Attention Mechanism
1.3.2 Long Short-Term Memory
1.4 Experiment Setup
1.5 Experiment #1: Single PQD
1.6 Experiment #2: Multiple PQDs
1.7 Conclusion
References
2 Internet of Things Enabled Waste Detection and Classification Using Optimal Deep Learning Model
2.1 Introduction
2.2 Related Works
2.3 The Proposed IoTWDC-ODL Technique
2.3.1 IoT Enabled Data Collection Process
2.3.2 Waste Object Detection Using SSD Model
2.3.3 Hyperparameter Optimization Using FFA
2.3.4 GNB Based Classification
2.4 Experimental Validation
2.5 Conclusion
References
3 A Smart Record System for Driver Accidental Details Using Blockchain
3.1 Introduction
3.2 Background
3.3 How Blockchain Works
3.4 Proposed Framework
3.5 Smart Contracts
3.6 System Design
3.7 Proposed Architecture
3.8 Security Analysis
3.9 Case Study
3.9.1 Conclusion
References
4 Computer Mediated Communication in Second Language Education
4.1 Introduction
4.2 Social Constructivism and Computer-Mediated Communication
4.3 Potential of CMC in Language Learning Platforms
4.4 Computer-Mediated Communication in the Lens of Second Language Acquisition Perspectives
4.5 Projects Using Computer-Mediated Communication in Teaching Language Skills
4.6 Effects of Online Interaction on Language Competency
4.7 Computer-Mediated Communication in Asian Second Language Learning Contexts
4.8 Conclusion
References
5 Comparative Analysis of Rectenna Systems for Radio Frequency Energy Harvesting
5.1 Introduction
5.2 Design of Rectenna—Steps and Processing
5.2.1 Microstrip Patch Antenna
5.2.2 Coaxial Probe Feeding Technique
5.2.3 Return Loss
5.2.4 Voltage Standing Wave Ratio (VSWR)
5.2.5 3D—Polar Plot
5.2.6 Matching Network
5.2.7 Rectifier Circuit
5.3 Literature Review
5.4 Result Analysis and Discussion
5.5 Conclusion and Future Scope
References
6 Real-Time Data-Based Smart Hitech Classroom Using Internet of Things
6.1 Introduction
6.2 Related Works
6.3 Materials and Methods
6.4 Results and Discussions
6.5 Conclusion
References
7 Design and Analysis of Outer Rotor Brushless DC Motor for Robotics Using Ansys Maxwell Software
7.1 Introduction
7.2 Basic Mathematical Formulas Used
7.3 Methods and Materials
7.3.1 Motor Design
7.4 Result and Discussion
7.4.1 Results Obtained for 24 Slots and 16 Pole BLDC Motor
7.4.2 Results Obtained for 36 Slots and 18 Pole BLDC Motor
7.5 Conclusion
References
8 Scaffolding Language Learning in the Online Classroom
8.1 Introduction
8.2 Scaffolding Strategies
8.3 Current Perspectives on Effective Online Teaching
8.4 Recent Studies on Online Language Teaching and Learning
8.5 Scaffolding Student Uptake of Knowledge and Skills in Online L2 Learning
8.6 Training Teachers for Online Education
8.7 Conclusion
References
9 Network Resource Allocation Security Techniques and Challenges for Vehicular Communication Network Management
9.1 Introduction
9.2 Literature Review
9.3 Overview of Vehicular Communication Network
9.4 Properties of Vehicular Communication Network
9.5 Requirements of Network Resource Allocation for Vehicular Communication Network Management
9.6 Importance of Vehicular Communication Network
9.7 IOT in Vehicular Communication Network
9.8 Challenges of Network Resource Allocation Security Techniques
9.9 Network Resource Allocation Security Techniques
9.10 Comparative Study and Discussion
9.11 Conclusion and Future Scope
References
10 An Optical Solution for High-Density Data Storage Using Plasmonic Based MZI Nano-Structures
10.1 Introduction
10.2 Device Description
10.2.1 Surface Plasmonic Modes at MZI Cavity
10.3 Results and Discussion
10.3.1 Optical Field Propagation in Mach-Zhender Waveguide
10.3.2 Checking for the Bi-Stability of the Device
10.3.3 Optical Transmissions Depicting Different Binary States
10.3.4 Discussion
10.4 Conclusions
10.5 Conflicts of Interest
References
11 An Intelligent Health Diagnosis System Based on a Secure Data Transfer Through Li-Fi Technology
11.1 Introduction
11.2 Related Works
11.3 Big Data in Real Time Application
11.3.1 Components of Big Data
11.3.2 Application of Big Data in Medical Aspect
11.3.3 IoT Using Li-Fi Technology
11.4 Proposed Model
11.5 Mathematical Treatment
11.5.1 Mathematical Operation for Data Transmission
11.5.2 Data Encryption Technique
11.6 Data Preparation
11.6.1 Data Analysis
11.6.2 Fuzzy Implementation
11.7 Results and Simulations
11.7.1 Performance Analysis
11.8 Conclusion
References
12 Management of Information from Surveillance Cameras at the Infrastructure Facility
12.1 Introduction
12.2 Existing Means of Remote Monitoring and Information Management of Video Surveillance Systems at Infrastructure Facilities
12.3 System of a Complex Monitoring for Movements at Infrastructure Facilities Based on Video Surveillance Data
12.4 Development of a Method for Determining the Geographical Coordinates of an Object by an Image from a Video Surveillance Camera
12.5 Implementation and Testing of Components of the Infrastructure Facility Monitoring System
12.6 Conclusion
References
13 Assimilation of Blockchain with Internet of Things (IoT) with Possible Issues and Solutions for Better Connectivity and Proper Security
13.1 Introduction
13.2 Blockchain
13.2.1 Characteristics of Blockchain
13.2.2 Categories of Blockchain
13.3 Blockchain for the IoT
13.4 Issues Faced During the Integration of the Internet of Things and Blockchain
13.4.1 Barriers to IoT Resources
13.4.2 Safety Risks
13.4.3 Possible Breach of Confidentiality
13.4.4 Choosing an Incentive Method
13.4.5 Accomplishment of Big Data Analytics
13.4.6 Integrated System Measurement
13.4.7 Navigation and Design of IoT Devices
13.4.8 Implementation of Smart Agreement
13.4.9 Blockchain Normalization
13.5 Solution to the Above-Discussed Issues for Integration of IoT and Blockchain
13.5.1 Termination of Central Authority
13.5.2 Direct Texting to Peers
13.5.3 Automation and Utilization of Resources
13.5.4 Protect Codes from Unauthorized Use
13.5.5 Built-In Trust
13.5.6 Safety
13.5.7 Data Confidentiality
13.5.8 Records of Historical Acts
13.5.9 Reducing the Cost of Upgrading Large Internet Infrastructure
13.5.10 Transparency
13.5.11 Improve IoT Systems Integration
13.5.12 Access Control and Ownership Control
13.5.13 Honesty and Resilience
13.6 Future Research Direction
13.6.1 Stability Concerns
13.6.2 Confidentiality Worries Interrelated to Unauthorized Blockchains
13.6.3 Extending IoT Through ML and Big Data
13.6.4 Compound Substructure and Experiments
13.7 Conclusion
References
14 Opportunistic Internet of Things (OIoT): Elucidating the Active Opportunities of Opportunistic Networks on the Way to IoT
14.1 Introduction
14.2 IoT with Opportunistic Network
14.3 Routing Protocols for IoT Based Opportunistic Networks
14.3.1 Flooding Based Approach
14.3.2 Forwarding Based Approach
14.4 Challenges and Applications of Opportunistic Network
14.5 Implementation
14.6 Conclusion
References
15 Blockchain Based Big Data Solutions for Internet of Things (IoT) and Smart Cities
15.1 Introduction
15.2 Background Knowledge
15.2.1 Overview of Blockchain
15.2.2 Overview of BD
15.3 Motivation Behind Blockchain and Data Integration
15.3.1 Improving BD Privacy and Security
15.3.2 Improving Data Integrity
15.3.3 Fraud Prevention
15.3.4 Real-Time Data Analytics
15.3.5 Enhancement of Data Sharing
15.3.6 Quality Enhancement of the BD
15.4 Blockchain Based BD Projects and Their Application
15.4.1 Blockchain and BD in Smart City
15.4.2 Blockchain and BD in Smart Healthcare
15.4.3 Blockchain and BD in Smart Transportation
15.4.4 Blockchain and BD Projects
15.5 Privacy and Security Issues
15.5.1 Data Privacy-Preservation
15.5.2 Authorization and Authentication
15.5.3 Identity and Access Control Management
15.5.4 Data Ownership
15.5.5 Policy Management
15.6 Integration of BD and Blockchain
15.6.1 Blockchain for BD Acquisition
15.6.2 Blockchain for Storage of BD
15.6.3 Blockchain for BDA Report
15.6.4 Blockchain for Preservation of BD Privacy
15.7 Blockchain Solution to BD Challenges
15.7.1 Decentralized Protection of Personal Data
15.7.2 Digital Property
15.7.3 Internet of Things (IoT)
15.8 Conclusion
References
16 Natural Language Processing and Big Data: A Strapping Combination
16.1 Introduction
16.2 The Rising Force in AI Family—NLP
16.2.1 NLP Core Tasks and Features
16.3 NLP Applications
16.4 Phases of NLP
16.5 NLP Techniques
16.6 NLP Frameworks
16.7 Challenges of NLP
16.8 Future of NLP
16.9 Big Data
16.9.1 Characteristics of Big Data
16.9.2 Tools for Big Data Processing
16.9.3 Natural Language Processing and Big Data—A Dominant Amalgamation
16.9.4 NLP for Making Unstructured Big Data Finer—What Problems Can NLP Solve for Big Data?
16.9.5 Trends in NLP Big Data
16.9.6 Discussion
16.9.7 Conclusion
References